text stringlengths 12 4.76M | timestamp stringlengths 26 26 | url stringlengths 32 32 |
|---|---|---|
China’s Five-hundred-metre aperture spherical telescope (FAST) in Guizhou province is expected to be ready to search for distant alien life by September. Photo: Getty | 2024-05-17T01:27:17.568517 | https://example.com/article/3914 |
Background {#Sec1}
==========
Loneliness experience is an important aspect of the mental health of older individuals \[[@CR1]\]. Loneliness is also an important indicator for measuring the subjective well-being of the older population \[[@CR2]\]. Surveys have shown that loneliness has become one of the prominent problems threatening the quality of life and personal happiness of older individuals \[[@CR3]\].
The aging process of China's population is obviously faster than that of other middle- and low-income countries. By 2040, the proportion of people aged 60 and over will rise to 28% from 12.4% in 2010. The life expectancy of women is higher than that of men, and the proportion of older people in rural areas is higher than that in urban areas (2016 National Assessment Report on Aging and Health in China).
According to a survey conducted by the China Aging Science Research Center, more than 1/3 of the older population in rural areas often feel severely lonely. In particular, the psychological impact of having an "empty nest" on older adults and the psychological problems of this population need to be addressed and solved \[[@CR4], [@CR5]\]. Peplau et al. began to study the loneliness of adults in the 1970s \[[@CR6]\]. They proposed that loneliness is a negative emotion experienced by an individual when his or her social network is insufficient, including in terms of the inadequacy, low quality and low quantity of their social relationships \[[@CR7], [@CR8]\].
In the past 10 years, American scholar Dr. Cacioppo and his colleagues have conducted research on loneliness. They proposed an evolutionary theory of loneliness (ETL) that proposes that an individual's genes determine his or her loneliness level \[[@CR9]\]. Dr. Cacioppo also suggested that loneliness spreads similarly to an infectious disease \[[@CR10]\]. The reported prevalence of loneliness in the older Chinese population varies greatly due to differences in research design, sample size, measurement of loneliness, regional economic and health threats and so on \[[@CR4], [@CR11]\].
Many factors have been indicated to be associated with loneliness. These factors include demographic characteristics, such as gender, age, education level \[[@CR12]\], marital and economic status, social interaction \[[@CR13], [@CR14]\], race \[[@CR15]\], experience of stress or depression \[[@CR16], [@CR17]\], poor lifestyle \[[@CR18]\], single relationship status, malnutrition, relationships with family members \[[@CR19]\], life satisfaction \[[@CR20]\], alcohol consumption \[[@CR21]\], smoking behavior, quality of life, noncommunicable disease (NCD) experience \[[@CR22]\], and experience of psychological problems \[[@CR23]\]. However, these factors, including gender, age, marriage, race, chronic disease experience and other demographic characteristics, are often difficult or impossible to change, so it is undoubtedly important to study factors that can be easily targeted by interventions, such as sleep, life satisfaction, and nutrition, to improve the loneliness of aging adults.
Loneliness is associated with poor health outcomes, including depression, sleep quality, heart disease and all-cause mortality \[[@CR24]\]. Among the psychological and behavioral problems experienced by lonely people, poor sleep quality has received considerable attention in recent years \[[@CR25]\]. Studies have suggested that loneliness causes poor sleep quality and insomnia. In the ETL, Cacioppo \[[@CR26]\] proposed that loneliness leads to poor sleep quality and insomnia (and other results) because it signals that one exists in an environment where others are likely to behave selfishly. This signal triggers a physiological response to the perceived possibility of a social threat (even if there is no threat), including increased cortisol secretion, which is a common substance secreted when one is awake that can have a negative impact on sleep initiation and that is not conducive to high-quality sleep \[[@CR27]\]. This theory was supported by Matthews \[[@CR28]\], who found that the link between loneliness and sleep quality was particularly significant in young people who had experienced trauma, such as violence/neglect.
Loneliness and poor sleep quality are common phenomena in advanced age and are not conducive to physical and mental health. Although it may be difficult to provide effective interventions for loneliness, there may be some related adjustable factors, such as sleep. If sleep disorders are relieved, the impact of loneliness on the health of the older population can be reduced. McHugh \[[@CR29]\] found that the effect of loneliness, especially emotional loneliness, on the sleep quality of older individuals was partly mediated by perceived stress. The research results on loneliness and sleep quality in the older population are mixed. A study with a large sample of older adults in China showed that compared with older individuals with an empty nest, older individuals who lived with their spouse and children together or family members had better sleep quality \[[@CR30]\]. The study also found that loneliness was associated with a decline in the subjective sleep quality of older individuals \[[@CR31]\]. Another study reported that loneliness did not affect sleep duration or subjective sleep quality \[[@CR32]\]. The reasons for the inconsistency in the research on the relationship between sleep problems and loneliness may be related to the participants' national background, the research population, a small sample size, the use of different evaluation tools for loneliness and sleep, and the absence of analysis of socioeconomic factors that affect loneliness. Therefore, it is necessary to select a larger sample size and measurement tools with greater validity to study the relationship between sleep problems and loneliness under the control of socioeconomic and other factors. Wakefield's research suggested that loneliness is an important predictor of depression and sleep deprivation. Conversely, sleep problems may be an antecedent of loneliness \[[@CR33]\]. However, the prediction of loneliness based on sleep has not been determined, and other variables that may predict loneliness have not been fully studied \[[@CR27]\].
A study by Chris Segrin conducted among 255 couples in the United States indicated an association between loneliness and sleep quality \[[@CR25]\]. The relationship between loneliness and sleep quality was also explored among American college students \[[@CR24]\]. Another study showed that loneliness in young adults could affect their sleep quality \[[@CR28]\]. However, most of the above studies focused on young people or college students.
A survey of 447 older individuals in an urban Irish community showed an effect of emotional loneliness on the quality of sleep, but the study used the De Jong Gierveld Loneliness Scale with a small sample size \[[@CR29]\]. An ongoing longitudinal study of a sample in Taiwan has not revealed an association between loneliness and sleep quality in older people \[[@CR34]\]. In view of the uncertainty of the above findings and the frequent use of small sample sizes, it is necessary to conduct a study with a large sample on the relationship between loneliness and sleep quality.
Therefore, we recruited a large sample of people from rural areas in Shandong Province, China, to study the association between loneliness and sleep quality in the older population. To this end, we established the following specific objectives. First, we aimed to identify the prevalence of loneliness among the older population in Shandong Province, China. Second, we studied the relationship between loneliness and sleep quality in the older population.
Methods {#Sec2}
=======
Settings and participants {#Sec3}
-------------------------
A village-based cross-sectional study was conducted among 1658 older.
people over 60 years of age in five cities in Shandong Province. The participants were selected by three-stage cluster sampling. First, according to the geographical location of Shandong Province, each district and county was divided into five groups: east, south, west, north and central. Second, we chose one city from each of the five groups: Yantai (east), Jining (south), Liaocheng (west), Binzhou (north) and Zibo (central). Similarly, four towns were sampled from each sample city according to their geographical locations. Finally, one village was sampled from each town, and all older individuals in these 20 villages were included in this study. The average number of people in each village was 90, the response rate was 94.27%, and the effective rate was 97.82%.
Data collection {#Sec4}
---------------
The entire survey was conducted from December 2016 to February 2017. All of the older adults were interviewed face to face by trained investigators who were undergraduates of Binzhou Medical University School of Public Health and Management. Information on demographics, loneliness, sleep quality, quality of life, health-related behaviors, diseases and symptoms was collected with a structured questionnaire. To ensure quality, inspectors checked each completed questionnaire daily and sought supplementary information and corrected errors in a timely manner.
Measures {#Sec5}
--------
### Sociodemographic variables {#Sec6}
Sociodemographic characteristics, such as sex, age, economic status (source and quantity of economic income), marital status, education, and occupation, were investigated. The ages of the participants were categorized as follows: 60--69, 70--79 and 80+ years old. Other demographic characteristics were classified as follows: sex (male vs. female), quantity of economic income (\< 1000 yuan, 1000--3000 yuan, 3000--5000 yuan, and ≥ 5000 yuan), source of economic income (farming income vs. support from children and others), marital status (couple vs. other), education (primary school or below, junior school, and senior high school and above), occupation (manual labor vs. mental labor), number of children (0, 1, 2, and 3+), relationship with family members (good vs. bad), and empty nester (yes vs. no).
### Health-related behaviors {#Sec7}
Smoking behavior and alcohol consumption were assessed by asking the participants whether they had smoked or consumed alcohol in the past 6 months \[[@CR35]\].
### Diseases and symptoms {#Sec8}
Self-reported noncommunicable diseases (NCDs) were also investigated, especially NCDs in the past year (yes vs. no). Weight and height were measured in this study, and body mass index (BMI) was calculated as weight (kg) divided by height (m) divided by height (m) again. Participants were divided into 3 categories (lean, normal and overweight+) according to the Chinese standard.
### Quality of life scale {#Sec9}
The Medical Outcomes Study 36-item Short Form Health Survey (SF-36) is a generic tool for assessing health-related quality of life \[[@CR36]\]. The results are evaluated through the assignment of scores for each question and then the transformation of the scores based on a scale from 0 to 100, with a higher score reflecting better perceived health \[[@CR37]\]. The Cronbach's α is 0.825 in this study.
### Loneliness assessment {#Sec10}
The University of California at Los Angeles (UCLA) Loneliness Scale (version 3) compiled by Russell et al. was administered to all groups \[[@CR38]\]. The advantage of the third version of the scale is the reverse-scored items, which prevent false responses. The UCLA Loneliness Scale contains 20 items, and each item has a 4-point rating scale in which 1 = never and 4 = always. The item scores are summed to produce a total score, with potential scores ranging from 20 to 80. A higher score indicates a higher level of perceived loneliness. The scale is the most commonly used tool for assessing loneliness \[[@CR39], [@CR40]\]; the Cronbach's α was 0.860 in this study. According to Perry's loneliness classification scheme \[[@CR41]\], a score of 20--34 is classified as a low level of loneliness experience, 35--49 is classified as a moderate level of loneliness experience, and a score of over 50 is classified as a high level of loneliness experience. The test-retest reliability of the scale is relatively high, which makes it suitable to measure loneliness in a sample of older adults \[[@CR42]\].
### Sleep quality assessment {#Sec11}
We used the Pittsburgh Sleep Quality Index (PSQI), which is used worldwide, to evaluate sleep quality in the sample of older adults \[[@CR43]\]. The scale includes the following 7 dimensions: subjective sleep quality, sleep latency, sleep duration, habitual sleep efficiency, sleep disturbances, use of sleeping medication, and daytime dysfunction \[[@CR44]\]. Each dimension score ranges from 0 to 3 points. The sum of the 7 dimension scores is the total score of the PSQI (range of 0--21) \[xir45\]. The Cronbach's α of the PSQI in this study was 0.840. In Li J's research on the analysis of sleep quality characteristics and related factors in the older population in rural China, when 7 was used as the cutoff, the sensitivity and specificity were 98.3 and 90.2%, respectively \[[@CR45]\]. The threshold for poor sleep quality was seven, with higher scores indicating poorer sleep quality \[[@CR46]\].
Statistical analysis {#Sec12}
--------------------
EpiData version 3.1 (The EpiData Association, Odense, Denmark) was used for data entry and verification. SPSS version 22.0 (IBM Corp., Armonk, NY) statistical software was used for statistical analysis. The differences in the loneliness scores by sociodemographic, health, quality of life and sleep quality factors were examined using independent sample *t*-tests or analysis of variance (ANOVA). An ordinal logistic regression model was employed to assess the association between sleep quality and loneliness. Three models were fitted for the outcome. An adjusted model (Model 1) was constructed first to examine the effects of different demographic variables on loneliness. A fully adjusted model (Model 2) was constructed to examine the associations between sleep quality and loneliness with sociodemographic variables, health-related behaviors, quality of life variables and NCDs controlled. Model 3 was constructed through the addition of all seven dimensions of sleep quality and loneliness to the fully adjusted model. A sensitivity analysis was conducted in which participants with 1 or 0 children were excluded. Leanness or obesity were considered to be the main risk factors for poor sleep quality, which can lead to poor quality of life. Therefore, subjects with BMI ≥ 24 or BMI \< 18.5 were excluded from the second sensitivity analysis, and those with poor quality of life were excluded from the third sensitivity analysis. All reported CIs were calculated at the 95% level. Statistical significance was assessed at the 5% level.
Results {#Sec13}
=======
Basic information of the participants {#Sec14}
-------------------------------------
Table [1](#Tab1){ref-type="table"} shows the basic information collected from the 1658 participants. The average age of the respondents was 70.41 years old (SD 7.63). The loneliness scores in the survey ranged between 21 and 80. A total of 31 (18.4%), 924 (55.7%), and 429 (25.9%) of the respondents were assessed as having low, moderate, and high levels of loneliness, respectively, and the mean overall score of the participants was 43.17 ± 9.46. Of all the participants, 50.7% were female, and 15.2% were over 80 years of age. Individuals who were in a couple relationship accounted for 69.8% of the respondents, and 31.1% of the participants reported less than 1000 yuan in economic income. A total of 62.1% of the participants reported that their income came from their children; 69.1% had a primary school education or below, and 63.0% worked in manual labor. In total, 30.9% reported smoking, and 46.1% reported consuming alcohol. In addition, 94.7% had good relationships with their family members, 30.2% reported being empty nesters, and 17.3% reported having either 1 child or 0 children. A total of 32.8% reported having a chronic disease. Table 1Comparison of Loneliness Scores among Rural Elderly with Different Characteristics (Mean ± SD)VariablesN(%)Loneliness scoreF/tPSex: Male818 (49.3)42.81 ± 9.54−1.5310.126 Female840 (50.7)43.52 ± 9.37Age: 60 \~ 69840 (50.7)42.24 ± 9.4710.7810.000 70 \~ 79566 (34.1)43.64 ± 9.50 80 + years older252 (15.2)45.21 ± 8.94Marital status: Couple1158 (69.8)42.65 ± 9.40−3.4310.001 Others^a^500 (30.2)44.38 ± 9.49Occupation: Manual labour1045 (63.0)41.37 ± 9.34−10.5880.000 Mental labour613 (37.0)46.24 ± 8.86Degree of education: Primary school or below1145 (69.1)42.06 ± 9.4826.5000.000 Junior school266 (16.0)45.82 ± 9.13 High school and above247 (14.9)45.47 ± 8.72Economic sources: Farming income628 (37.9)40.44 ± 9.63−9.2440.000 Support from children and others1030 (62.1)44.83 ± 8.96Economic income (yuan): \< 1000516 (31.1)42.66 ± 9.544.8520.002 1000 \~ 3000401 (24.2)42.71 ± 9.00 3000 \~ 5000415 (25.0)42.86 ± 9.42 ≥ 5000326 (19.7)44.95 ± 9.75Smoking: Yes512 (30.9)41.92 ± 9.88−3.5150.000 No1146 (69.1)43.73 ± 9.21Drinking: Yes765 (46.1)42.14 ± 9.45−4.1340.000 No893 (53.9)44.05 ± 9.38Relationship with family members: Good1570 (94.7)43.06 ± 9.42−2.0070.045 Bad88(5.3)45.14 ± 9.89Empty nester: Yes501 (30.2)45.77 ± 8.9156.2990.000 No1157 (69.8)42.04 ± 9.47Number of children: 036(2.2)44.64 ± 7.4517.1620.000 1251 (15.1)46.76 ± 9.08 2453 (27.3)43.34 ± 9.58 3+918 (55.4)42.05 ± 9.32BMI: Lean146(8.8)42.95 ± 9.571.9800.138 Normal776 (46.8)42.73 ± 9.63 Overweight+736 (44.4)43.68 ± 9.22NCDs: Yes668 (32.8)44.80 ± 8.9333.7690.000 No990 (67.2)42.07 ± 9.65^a^ others means those who are unmarried (1.7%), divorced (6.5%), widowed (22.0%)
Comparison of loneliness scores {#Sec15}
-------------------------------
There were significant differences in loneliness scores among older adults with different characteristics, mainly including age (*p \<* 0.001), marital status (*p* = 0.001), occupation (*p \<* 0.001), education (*p \<* 0.001), source of economic income (*p \<* 0.001), quantity of economic income (*p* = 0.002), smoking behavior (*p \<* 0.001), alcohol consumption (*p \<* 0.001), relationships with family members (*p* = 0.045), empty nester status (*p \<* 0.001), number of children (*p \<* 0.001) and NCD experience (*p \<* 0.001), as shown in Table [1](#Tab1){ref-type="table"}. The average loneliness score of older individuals with poor sleep quality was 45.04 ± 8.86, which was significantly higher than that of older individuals with good sleep quality (41.66 ± 9.65) (*t* = 7.742, *p \<* 0.001).
Comparison of PSQI total and dimension scores {#Sec16}
---------------------------------------------
The mean sleep quality score was 6.67 ± 3.42. Among the 1658 rural older people in Shandong Province with global scores greater than 7, which accounted for 44.9% of the sample, the prevalence rate of poor sleep quality was 44.9%. As shown in Table [2](#Tab2){ref-type="table"}, the average scores for sleep quality, subjective sleep quality, sleep latency, sleep duration, habitual sleep efficiency, sleep disturbances, use of sleeping medication, and daytime dysfunction were 6.67 ± 3.42, 1.14 ± 0.76, 1.24 ± 0.90, 0.61 ± 0.84, 0.84 ± 1.04, 1.34 ± 0.67, 0.36 ± 0.76 and 1.15 ± 0.78, respectively. There were statistically significant differences in the total sleep quality scores and 5 of the PSQI dimensions scores (all except subjective sleep quality and habitual sleep efficiency) among participants with different levels of loneliness (*p* \< 0.05). Table 2Comparison of the PSQI and its component scores with different levels of loneliness in Shandong, China (2016) (mean ± s)VariablesTotal scoreDifferent levels of lonelinessFPLowModerateHigh**Total PSQI**6.67 ± 3.425.36 ± 2.836.69 ± 3.237.55 ± 3.8938.1040.000**Components of PSQI** Subjective sleep quality1.14 ± 0.761.06 ± 0.641.17 ± 0.721.11 ± 0.912.6800.069 Sleep latency1.24 ± 0.900.90 ± 0.831.23 ± 0.911.48 ± 0.8638.5830.000 Sleep duration0.61 ± 0.840.30 ± 0.620.58 ± 0.830.88 ± 0.9145.3370.000 Habitual sleep efficiency0.84 ± 1.040.78 ± 1.010.85 ± 1.050.87 ± 1.050.8400.432 Sleep disturbances1.34 ± 0.671.21 ± 0.501.36 ± 0.611.38 ± 0.866.6670.001 Use of sleeping medication0.36 ± 0.760.17 ± 0.520.32 ± 0.690.59 ± 0.9632.3020.000 Daytime dysfunction1.15 ± 0.780.94 ± 0.631.17 ± 0.711.23 ± 0.9913.3170.000
Contour analysis of the average PSQI scores of participants with different levels of loneliness {#Sec17}
-----------------------------------------------------------------------------------------------
A contour analysis of the average PSQI total scores of rural older people with different levels of loneliness was conducted. The profiles of older people in rural areas who experienced low, moderate, and high levels of loneliness were not parallel to each other (*F* = 12.000, *p* = 0.000), and the contours of the high group were higher than those of the moderate and low groups. In the horizontal profile analysis, the average scores for the 7 dimensions, namely, subjective sleep quality, sleep latency, sleep duration, habitual sleep efficiency, sleep disturbances, use of sleeping medication and daytime dysfunction, were different (*F* = 38.103, *p* = 0.000), as shown in Fig. [1](#Fig1){ref-type="fig"}. Fig. 1Profile chart of mean of the PSQI scores for different levels of loneliness in rural elderly people
Association between sleep quality and loneliness {#Sec18}
------------------------------------------------
The level of loneliness in the rural older population was used as the dependent variable (Y = 0, low level of loneliness; Y = 1, moderate level of loneliness; and Y = 2, high level of loneliness). The sleep quality score was used as the independent variable, and age, marital status, occupation, source and quantity of economic income, relationships with family members, empty nester status, number of children, smoking behavior, alcohol consumption, BMI, chronic disease experience and quality of life were used as the control variables. The relationship between the sleep quality and loneliness of older people was analyzed by the three ordinal regression models. Even after marital status, alcohol consumption, relationships with family members, occupation, source and quantity of economic income, chronic disease experience and quality of life were controlled, an increase in the odds of loneliness was associated with an increase in the sleep quality score (adjusted odds ratio \[aOR\] = 1.111, 95% confidence interval \[95% CI\] = 1.078--1.145). The worse the quality of sleep was, the higher the degree of loneliness in the older adult sample. Scores for subjective sleep quality (aOR = 0.765, 95% CI = 0.649--0.902), sleep latency (aOR = 1.346, 95% CI = 1.178--1.537), sleep duration (aOR = 1.316, 95% CI = 1.139--1.522), use of sleeping medication (aOR = 1.175, 95% CI = 1.005--1.372), and daytime dysfunction (aOR = 1.267, 95% CI = 1.079--1.487) were significantly different between older adults with high levels of loneliness and those with moderate and low levels of loneliness. Older adults with higher PSQI scores for these 5 dimensions had a higher risk of loneliness. Although older adults with higher scores for habitual sleep efficiency and sleep disturbances had a higher risk of loneliness, these differences were not statistically significant, as shown in Table [3](#Tab3){ref-type="table"}. Table 3Associations between sleep quality and loneliness in the rural elderly individuals in Shandong, China (2016)VariablesLonelinessModel 1Model 2Model 3***OR(*95%CI)*p**OR(*95%CI)*p**OR(*95%CI)*p***Age: 60's111 70's1.950 (1.448--2.627)0.0001.465 (1.167--1.839)0.0131.443 (1.148--1.815)0.002 80+1.470 (0.172--1.840)0.0011.866 (1.382--2.519)0.0001.795 (1.324--2.433)0.000Sex: Female111 Male0.885 (0.722--1.085)0.2410.898 (0.732--1.102)0.3040.904 (0.736--1.112)0.340Marital status: Others^a^111 Couple1.148 (0.917--1.438)0.2311.191 (0.949--1.495)0.1311.172 (0.933--1.473)0.172Degree of education: Primary school or below111 Junior school1.752 (1.306--2.351)0.0001.749 (1.300--2.351)0.0001.664 (1.234--2.243)0.001 High school and above0.937 (0.666--1.319)0.9011.040 (0.638--1.271)0.5520.876 (0.620--1.239)0.455Occupation: Mental labour111 Manual labour0.478 (0.369--0.619)0.0000.491 (0.379--0.637)0.0000.552 (0.422--0.722)0.000Economic income:(RMB) less than 1000111 1000 \~ 30001.169 (0.981--1.786)0.2451.220 (0.937--1.589)0.1401.225 (0.939--1.598)0.134 3000 \~ 50000.923 (0.701--1.214)0.5650.980 (0.744--1.292)0.8870.982 (0.744--1.296)0.897 5000and above1.324 (0.981--1.786)0.0661.201 (0.890--1.632)0.2261.115 (0.820--1.517)0.488Family relationship: Good111 Bad1.517 (0.987--2.333)0.0581.543 (1.002--2.425)0.0491.547 (1.001--2.387)0.049Empty nester: No1 Yes1.519 (1.207 \~ 1.912)0.0001.553 (1.231 \~ 1.958)0.0001.514 (1.198 \~ 1.912)0.000Number of children: 3+1 21.132 (0.895 \~ 1.433)0.3011.126 (0.890 \~ 1.428)0.3221.065 (0.839 \~ 1.351)0.607 11.950 (1.420 \~ 2.678)0.0001.946 (1.415 \~ 2.680)0.0001.833 (1.327 \~ 2.529)0.000 01.235 (0.628 \~ 2.428)0.5401.150 (0.583 \~ 2.270)0.6871.041 (0.525 \~ 2.063)0.910Smoking: NO111 Yes0.746 (0.592--0.939)0.0130.855 (0.676--1.081)0.1900.890 (0.715--1.131)0.342Drinking: NO111 Yes0.992 (0.803--1.228)0.9440.949 (0.766--1.176)0.6341.022 (0.819--1.276)0.847BMI: Normal111 Lean1.206 (0.849--1.714)0.2951.212 (0.850--1.725)0.2881.158 (0.811--1.652)0.418 Overweight+1.140 (0.930--1.398)0.2081.078 (0.877--1.324)0.4741.059 (0.861--1.302)0.588NCDs: No111 Yes1.319 (1.079--1.613)0.0071.270 (1.037--1.556)0.0211.287 (1.048--1.579)0.016Quality of life1.006 (1.001--0.010)0.0091.007 (1.002--1.011)0.0021.007 (1.002--1.011)0.003Sleep quality1.111 (1.078--1.145)0.000Subjective sleep quality0.765 (0.649--0.902)0.001Sleep latency1.346 (1.178--1.537)0.000Sleep duration1.316 (1.139--1.522)0.000Habitual-sleep efficiency1.350 (0.925--1.148)0.588Sleep disturbances0.984 (0.811--1.194)0.873Use of sleeping medication1.175 (1.005--1.372)0.042Daytime dysfunction1.267 (1.079--1.487)0.004
Sensitivity analysis {#Sec19}
--------------------
We conducted a sensitivity analysis to further assess the robustness of the model and better explain the reliability of the results. A sensitivity analysis that excluded participants with either one child or no children (*n* = 287) yielded a similar result to that of Model 2 (OR 1.102; 95% CI 1.064--1.141; *p* = 0.000). The second sensitivity analysis that excluded participants with a BMI ≥ 24 or a BMI \< 18.5 (*n* = 882) also yielded a result similar to that of Model 2 (OR 1.113; 95% CI 1.063--1.164; *p* = 0.000). The third sensitivity analysis that excluded participants with poor quality of life (*n* = 160) also yielded a result similar to that of Model 2 (OR 1.105; 95% CI 1.070--1.141; *p* = 0.000).
Discussion {#Sec20}
==========
The overall loneliness score of rural older adults from Shandong Province rural was 43.17 ± 9.46, and 25.9% of the study sample had a strong sense of loneliness. This percentage is higher than the 11.6% reported for a population of English-speaking U.S. residents aged more than 65 years \[[@CR20]\]. It is also higher than the 10.5% reported for the general population in Germany \[[@CR23]\]. However, the percentage is lower than the 38.22% reported in a study of older individuals with similar ages in urban communities of Xiamen, China \[[@CR47]\]. Differences in socioeconomic development might explain the variations between our study findings and those of studies carried out in the U.S. and Germany \[[@CR46]\]. The acceleration of rural urbanization caused by socioeconomic development in China has led to a rapid increase in the number of empty nesters, and having an empty nest eventually leads to social isolation and an increase in psychological problems for rural older individuals who are not accompanied by their children. The difference between the results of our research and those of the study of urban Xiamen may be due to differences in the geographical location. Our research was conducted in rural Shandong Province, while the study in Xiamen was conducted in urban areas. Compared with older adults living in urban areas, older adults living in rural regions have better neighborhood relationships, which can meet the needs of older adults by providing opportunities for social activities and emotional contact to alleviate loneliness. However, due to retirement, older people in cities experience a loss of social relations. In addition, the prevalence of chronic diseases and the divorce rate of older adults in rural areas are lower than those in urban areas. Physical diseases limit older adults' ability to participate in social activities, and the absence of spouses also reduces the social support of older adults, thus reducing social ties and leading to loneliness. In addition, the differences between our research and the Xiamen study can be explained by the use of different investigative tools. We used a universal scale to evaluate loneliness. However, in the Xiamen study, only 1 question was used to test loneliness.
The main factors affecting loneliness in this study were age, marriage, education, occupation, source and quantity of economic, family relations, empty nester status, number of children, smoking behavior, alcohol consumption, NCD experience and so on, which is consistent with the findings of previous studies \[[@CR48]\]. Many studies have suggested that social and economic factors play an important role in the development of loneliness among older individuals in rural areas \[[@CR49]\]. Among these factors, the empty nest phenomenon is the most obvious social factor in China's rural areas. Since the 1980s, a large portion of the rural labor force has continuously migrated into the city, which intensifies the empty nest phenomenon among the rural older population. In this study, the level of loneliness of older empty nesters was significantly higher than that of older individuals who were not empty nesters, which is consistent with previous studies. Furthermore, chronic diseases leads to a decline in the health status of older individuals, which makes social communication difficult. Social support by children for older individuals decreases when children move away from home and their parents become empty nesters. The death of a spouse also reduces the social support of older individuals, further promoting the loneliness of the older population \[[@CR50]\]. The influence of the number of children (a specifically added variable) on the loneliness of older individuals showed that having no children or only 1 child was associated with higher levels of loneliness than having 2 or more children, which further demonstrates the importance of the companionship of children for older individuals.
Research shows that deficiencies in the quantity and quality of sleep can predict some health problems \[[@CR51], [@CR52]\]. This is consistent with previous studies in different populations that have found a negative correlation between loneliness and sleep quality. Matthews et al. \[[@CR28]\] found evidence of this correlation in young people, as did Wakefield \[[@CR27]\] in a group of individuals aged 18--76 years old. Although the research populations were different, these findings are consistent with the ETL \[[@CR26]\] tested by Matthews et al. Because loneliness promotes the perception of social threats, there is a negative correlation between loneliness and sleep quality. The perception of social threats in turn triggers physiological reactions, such as cortisol production, which can disrupt sleep attempts. This may be one of the reasons why loneliness is negatively related to sleep. McHugh \[[@CR29]\] proposed that emotional loneliness in the older population may lead to an increase in perceived stress, which in turn affects sleep quality. Although some possible explanations have been provided for the relationship between loneliness and sleep, it seems to be easier and more effective to improve the quality of life of older individuals through sleep interventions than through efforts to improve loneliness.
This study attempted to explore whether loneliness affects the sleep quality of rural older people. To reduce the possibility of finding an association between loneliness and sleep caused by mixed bias, our study further excluded other factors related to loneliness. When covariates such as age, marital status, education, occupation, economic status, family relationships, lifestyle, smoking behavior, alcohol consumption, BMI, NCD experience and quality of life were controlled, the PSQI total score in the sample of older adults was higher, and the level of loneliness experience decreased \[[@CR53]\]. Our results are consistent with those of studies by Matthews et al. on the relationship between sleep quality and loneliness in young people, suggesting that poor sleep quality increases the risk of loneliness even after many other factors are controlled \[[@CR28], [@CR32], [@CR54], [@CR55]\]. Our findings are not consistent with previous studies in older adults in the Taiwan area \[[@CR34]\]. The difference between our study and the study of Yu B et al., in addition to geographical differences, may be related to the use of different survey tools to evaluate loneliness. In the research on Taiwan, loneliness was evaluated by only one question, whereas we used the UCLA Loneliness Scale to evaluate loneliness. Some physiological processes may also explain the association between loneliness and sleep quality. Dream disturbances are associated with greater stress and anxiety \[[@CR56]\] and may represent a further manifestation of emotional distress in lonely individuals \[[@CR28]\].
Our study also showed that 5 dimensions of sleep quality, including subjective sleep quality, sleep latency, sleep duration, use of sleeping medication, and daytime dysfunction, were associated with loneliness. In previous studies of loneliness and sleep in young adults, only subjective sleep quality and daytime dysfunction were associated with loneliness \[[@CR28], [@CR32]\]; however, the study of the older population in Taiwan did not explore the dimensions of the PSQI scale. A study of 95 young people showed that loneliness was related to sleep quality, but no relationship between loneliness and sleep duration was found \[[@CR54]\]. Older people with poorer subjective sleep quality are more likely to become restless than are those with no subjective sleep quality \[[@CR57]\]. Poor subjective sleep quality is harmful to a person's physical and mental health. Studies have shown that physical and mental health are related to loneliness \[[@CR18]\]. These negative effects may in turn promote increased loneliness. The influence of the dimensions of sleep quality on loneliness should be further studied.
Based on the findings in this sample, the relationship between sleep quality and loneliness is very strong in the older population in China. Previous studies have also shown a relationship between loneliness and sleep quality, indicating that loneliness affects sleep and that sleep also affects loneliness \[[@CR55], [@CR58]\]. The connection between the two is exacerbated by stress \[[@CR25]\]. Whether there are intermediate variables between loneliness and sleep quality and how these intermediate variables function need to be explored in future studies; however, the relationship between the loneliness and sleep quality of the older population in rural areas is self-evident and should be important to decision makers. Psychological interventions to improve the loneliness of older adults or measures to improve their sleep quality would ultimately improve their quality of life.
Our study has some limitations that must be considered in the interpretation of the findings. First, loneliness and sleep quality were measured cross-sectionally, so no conclusions can be drawn about the directionality of the associations. There is not enough evidence to determine whether loneliness precedes sleep disorders or vice versa. Therefore, follow-up studies should be carried out in the future to demonstrate the direction of the causal relationship between sleep disorders and loneliness. Second, the assessment of both loneliness and sleep quality was based on self-reported measures that can cause reporting bias. Therefore, we suggest that direct and indirect loneliness measurement methods should be used in future work to explore their predictive validity in more detail. Regarding the evaluation of sleep quality, we also suggest that future research should focus on more objective sleep measurement methods (such as actigraphy, the use of actigraphy watches, and polysomnography) to further study the relationship between loneliness and sleep in older adults. Third, unknown variables were not included in the designed questionnaire, which may have led to some deviations in the results. For example, the weakening of the social communication ability of older adults is significant to their feeling of loneliness \[[@CR59]\], but it was not included as a confounding factor in this study. The exclusion of such variables may have affected the validity of our findings.
Conclusion {#Sec21}
==========
In summary, our study demonstrated that sleep quality was significantly associated with loneliness in the rural older population in China. We also found that several variables, such as subjective sleep quality, sleep latency, sleep duration, use of sleeping medication, and daytime dysfunction, were significantly different between participants with high levels of loneliness and those with moderate and low levels of loneliness. Interventions should be developed to help older individuals with sleep disorders improve their sleep quality so that high levels of loneliness are prevented in the older population in China. Therefore, corresponding intervention measures should be formulated to reduce the loneliness of older individuals and improve the quality of sleep in the older population.
BMI
: Body mass index
PSQI
: Pittsburgh Sleep Quality Index
CI
: Confidence interval
OR
: Odds ratio
SD
: Standard deviation
SPSS
: Statistical Package for the Social Sciences
NCDs
: Noncommunicable diseases
**Publisher's Note**
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
The authors would like to thank all the participants, who showed great patience in answering the questionnaires.
PY was responsible for the study concept and design. GJ performed the statistical analyses and wrote the first draft of the manuscript. GJ and PY were responsible for the critical revision of the manuscript. All authors approved the final manuscript.
This work was supported by the Social Science Planning Project of Yantai in Shandong Province (No. ytsk2013--070). The sponsors did not have a role in the design of the study; in the collection, analysis, or interpretation of the data; in writing the manuscript; or in the decision to submit the manuscript for publication.
The datasets used and/or analyzed during the article are available on reasonable request to jiagzh221\@163.com.
The study design was approved by the Ethical Committee of Binzhou Medical College (No. ytsk2013--070). All the older adults gave written informed consent before participating in the house-to-house survey.
Not applicable.
The authors declare that they have no competing interests.
| 2023-10-08T01:27:17.568517 | https://example.com/article/5769 |
Remaco Spur
The Remaco Spur was a U.S. government-owned railway line constructed from the Golden-Denver "Tramway Route 84" (Denver Tramway Corporation's 1908 electric Denver & Interurban Railroad) for transporting supplies and munitions to/from the Denver Ordnance Plant in Lakewood, Colorado. The line connected between Oak and Quail streets at the Morningside shelter and was operated by the Remington Arms Company with railyard trackage in the Denver Ordnance Zone of ~.
References
External links
Category:Defunct Colorado railroads
Category:Remington Arms | 2024-01-07T01:27:17.568517 | https://example.com/article/4137 |
/* Copyright 2016 The TensorFlow Authors. All Rights Reserved.
Licensed under the Apache License, Version 2.0 (the "License");
you may not use this file except in compliance with the License.
You may obtain a copy of the License at
http://www.apache.org/licenses/LICENSE-2.0
Unless required by applicable law or agreed to in writing, software
distributed under the License is distributed on an "AS IS" BASIS,
WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
See the License for the specific language governing permissions and
limitations under the License.
==============================================================================*/
#include "tensorflow/core/lib/core/bitmap.h"
#include <string.h>
namespace tensorflow {
namespace core {
void Bitmap::Reset(size_t n) {
const size_t num_words = NumWords(n);
if (num_words != NumWords(nbits_)) {
// Reallocate.
Word* w = new Word[num_words];
delete[] word_;
word_ = w;
}
memset(word_, 0, sizeof(word_[0]) * num_words);
nbits_ = n;
}
// Return 1+index of the first set bit in w; return 0 if w == 0.
static size_t FindFirstSet(uint32 w) {
// TODO(jeff,sanjay): If this becomes a performance issue, we could
// use the __builtin_ffs(w) routine on GCC, or the ffs(w) routine on
// some other platforms.
// clang-format off
static uint8 kLowestBitSet[256] = {
/* 0*/ 0, 1, 2, 1, 3, 1, 2, 1, 4, 1, 2, 1, 3, 1, 2, 1,
/* 16*/ 5, 1, 2, 1, 3, 1, 2, 1, 4, 1, 2, 1, 3, 1, 2, 1,
/* 32*/ 6, 1, 2, 1, 3, 1, 2, 1, 4, 1, 2, 1, 3, 1, 2, 1,
/* 48*/ 5, 1, 2, 1, 3, 1, 2, 1, 4, 1, 2, 1, 3, 1, 2, 1,
/* 64*/ 7, 1, 2, 1, 3, 1, 2, 1, 4, 1, 2, 1, 3, 1, 2, 1,
/* 80*/ 5, 1, 2, 1, 3, 1, 2, 1, 4, 1, 2, 1, 3, 1, 2, 1,
/* 96*/ 6, 1, 2, 1, 3, 1, 2, 1, 4, 1, 2, 1, 3, 1, 2, 1,
/*112*/ 5, 1, 2, 1, 3, 1, 2, 1, 4, 1, 2, 1, 3, 1, 2, 1,
/*128*/ 8, 1, 2, 1, 3, 1, 2, 1, 4, 1, 2, 1, 3, 1, 2, 1,
/*144*/ 5, 1, 2, 1, 3, 1, 2, 1, 4, 1, 2, 1, 3, 1, 2, 1,
/*160*/ 6, 1, 2, 1, 3, 1, 2, 1, 4, 1, 2, 1, 3, 1, 2, 1,
/*176*/ 5, 1, 2, 1, 3, 1, 2, 1, 4, 1, 2, 1, 3, 1, 2, 1,
/*192*/ 7, 1, 2, 1, 3, 1, 2, 1, 4, 1, 2, 1, 3, 1, 2, 1,
/*208*/ 5, 1, 2, 1, 3, 1, 2, 1, 4, 1, 2, 1, 3, 1, 2, 1,
/*224*/ 6, 1, 2, 1, 3, 1, 2, 1, 4, 1, 2, 1, 3, 1, 2, 1,
/*240*/ 5, 1, 2, 1, 3, 1, 2, 1, 4, 1, 2, 1, 3, 1, 2, 1,
};
// clang-format on
if (w & 0xff) {
return kLowestBitSet[w & 0xff];
} else if ((w >> 8) & 0xff) {
return kLowestBitSet[(w >> 8) & 0xff] + 8;
} else if ((w >> 16) & 0xff) {
return kLowestBitSet[(w >> 16) & 0xff] + 16;
} else if ((w >> 24) & 0xff) {
return kLowestBitSet[(w >> 24) & 0xff] + 24;
} else {
return 0;
}
}
size_t Bitmap::FirstUnset(size_t start) const {
if (start >= nbits_) {
return nbits_;
}
// Mask to or-into first word to account for bits to skip in that word.
size_t mask = (1ull << (start % kBits)) - 1;
const size_t nwords = NumWords(nbits_);
for (size_t i = start / kBits; i < nwords; i++) {
Word word = word_[i] | mask;
mask = 0; // Only ignore bits in the first word we process.
size_t r = FindFirstSet(~word);
if (r) {
size_t result = i * kBits + (r - 1);
if (result > nbits_) result = nbits_;
return result;
}
}
return nbits_;
}
string Bitmap::ToString() const {
string result;
result.resize(bits());
for (size_t i = 0; i < nbits_; i++) {
result[i] = get(i) ? '1' : '0';
}
return result;
}
} // namespace core
} // namespace tensorflow
| 2024-06-27T01:27:17.568517 | https://example.com/article/6831 |
The "very liberal" bundle included an estimated audience of 28.6 million people broken down into three groups — “youthful urbanites,” “transitionals,” and “politically engaged city dwellers.” The "very conservative" bundle included an estimated audience of 22.8 million people broken down into three groups — “post grad nest builders," “family values,” and “the great outdoors.”
According to a political advertising sales pitch obtained by BuzzFeed News, Facebook carved the US electorate into 14 segments — from left-leaning "youthful urbanites" to a pro-NRA, pro–Tea Party group it bizarrely labeled as "the great outdoors." It detailed their demographic information — including religion and race in some cases — and offered them to political advertisers via Facebook’s sales teams. For advertisers using Facebook’s self-serve platform, the segments could be reached by purchasing larger bundles ranging from “very liberal” to “very conservative.”
During the 2016 election season, Facebook provided political advertisers with a targetable breakdown of a fractured United States, which could’ve been used as a blueprint for exploiting the country’s divisions.
“We typically help marketers across all verticals understand audiences this way, and we briefly used this framework to help inform how a small number of marketers built their campaigns,” a Facebook spokesperson told BuzzFeed News, adding the pitch had been removed as part of a "regular refresh." Said the spokesperson, “these segments are no longer available.”
A senior Democratic operative who’s run extensive digital political campaigns suggested political targeting options of the sort Facebook offered might be particularly intriguing to people looking to sow discord in the political system. “Any legitimate, aboveboard organization that is trying to actually win an election is going to have a much higher set of standards,” the operative told BuzzFeed News. “This type of approach is almost exclusively designed for nonpolitical professional people who want to mix it up,” or cause chaos.
Campaigns looking to win elections, the operative said, would likely target more sophisticated, granular segments built using voter file and email data. But to those without access to proprietary data, the targeting options Facebook detailed in its pitch could be appealing.
“Small town America,” one of the segments, was made up of 5.7 million people who were “anti-Obama,” for instance. A bad actor looking to sow division in the country might use such information to create ads exploiting some people’s disdain for the then-president.
A person familiar with the Trump campaign’s Facebook operation told BuzzFeed News the campaign used some the company's broader targeted categories — such as “conservative” or “very conservative” — during the US 2016 presidential primary in an effort to spread Trump's message wide and take advantage of cheaper ad rates. The Trump campaign went on to use microtargeting on a more specific basis than Facebook’s categories allowed for during the general election.
It’s worth noting that simply showing political advertisers how segments of Americans might feel about certain issues doesn't necessarily fuel further division in the country. “Anything on Facebook could be used to polarize — segments existing aren’t the problem,” the person close to the Trump campaign told BuzzFeed News.
But making such segments available, marketing them in a way in which the could be used to exploit divisions, and failing to safeguard against such exploitation is where this could become a problem. Said the same person,“The [real issue] is — will Facebook self-regulate and police this?”
Indeed, it's increasingly clear that Facebook did not police its platform effectively during the 2016 election. This week, the company will have to answer questions from Congress about its missteps, including how it allowed a $100,000 Kremlin-linked ad buy intended to influence the election and sow discord in its aftermath. Asked if any of the 14 segments were targeted in that ad buy, a Facebook spokesperson said they were not, noting that the segments were available only through sales teams from whom the Russians did not buy ads. Asked if the Russians used the broader, umbrella categories in their targeting, a Facebook spokesperson reiterated Facebook's intention to let Congress decide whether to release the ads and associated data. | 2024-06-20T01:27:17.568517 | https://example.com/article/7146 |
As filed with the Securities and Exchange Commission on November 18, 2013
File Nos. 033-12113
811-05028
UNITED STATES
SECURITIES AND EXCHANGE COMMISSION
Washington, D.C. 20549
Form N-1A
REGISTRATION STATEMENT UNDER THE SECURITIES ACT OF 1933
x
Post-Effective Amendment No. 254
x
And
REGISTRATION STATEMENT UNDER THE INVESTMENT COMPANY ACT OF 1940
x
Amendment No. 336
x
PIMCO Funds
(Exact name of Registrant as Specified in Charter)
840 Newport Center Drive
Newport Beach, California 92660
(Address of Principal Executive Offices) (Zip Code)
Registrant’s Telephone Number, including area code:
(866) 746-2606
Robert W. Helm, Esq.
Brendan C. Fox, Esq.
Dechert LLP
1900 K Street, N.W.
Washington, D.C. 20006
Brent R. Harris
Pacific Investment Management Company LLC
840 Newport Center Drive
Newport Beach, California 92660
(Name and Address of Agent for Service)
It is proposed that this filing will become effective (check appropriate box):
x
immediately upon filing pursuant to paragraph (b)
o
on (date) pursuant to paragraph (b)
o
60 days after filing pursuant to paragraph (a)(1)
o
on (date) pursuant to paragraph (a)(1)
o
75 days after filing pursuant to paragraph (a)(2)
o
on (date) pursuant to paragraph (a)(2) of rule 485.
If appropriate, check the following box:
o
This post-effective amendment designates a new effective date for a previously filed post-effective amendment.
SIGNATURES
Pursuant to the requirements of the Securities Act of 1933, as amended (the “1933 Act”) and the Investment Company Act of 1940, as amended, the Registrant certifies that it meets all the requirements of effectiveness of this Post-Effective Amendment No. 254 to its Registration Statement under Rule 485(b) of the 1933 Act and has duly caused this Post-Effective Amendment No. 254 to be signed on its behalf by the undersigned, thereunto duly authorized, in the city of Washington in the District of Columbia on the 18th day of November 2013.
PIMCO FUNDS(Registrant)
By:
Brent R. Harris*, President
*By:
/s/ BRENDAN C. FOX
Brendan C. Foxas attorney-in fact
Pursuant to the requirements of the Securities Act of 1933, this Registration Statement has been signed by the following persons in the capacities and on the dates indicated:
Signature
Title
Date
Brent R. Harris*
Trustee
November 18, 2013
William J. Popejoy*
Trustee
November 18, 2013
Vern O. Curtis*
Trustee
November 18, 2013
E. Philip Cannon*
Trustee
November 18, 2013
J. Michael Hagan*
Trustee
November 18, 2013
Douglas M. Hodge*
Trustee
November 18, 2013
Ronald C. Parker*
Trustee
November 18, 2013
Brent R. Harris*
President(Principal Executive Officer)
November 18, 2013
Trent W. Walker**
Treasurer(Principal Financial and Accounting Officer)
November 18, 2013
*By:
/s/ BRENDAN C. FOX
Brendan C. Foxas attorney-in-fact
________
* Pursuant to power of attorney filed with Post-Effective Amendment No. 177 to Registration Statement No. 33-12113 on July 27, 2010.
** Pursuant to power of attorney to be filed by amendment.
EXHIBIT LIST
EX-101.INS
XBRL Instance Document
EX-101.SCH
XBRL Taxonomy Extension Schema Document
EX-101.DEF
XBRL Taxonomy Extension Definition Linkbase Document
EX-101.LAB
XBRL Taxonomy Extension Labels Linkbase Document
EX-101.PRE
XBRL Taxonomy Extension Presentation Linkbase Document
EX-101.INS
2
pimcotrdsmfsf-20131030.xml
XBRL INSTANCE DOCUMENT
00008108932013-10-302013-10-300000810893pimcotrdsmfsf-20131030:S000042791Memberpimcotrdsmfsf-20131030:AAAAMember2013-10-302013-10-300000810893pimcotrdsmfsf-20131030:S000042791Memberpimcotrdsmfsf-20131030:C000132356Memberpimcotrdsmfsf-20131030:AAAAMember2013-10-302013-10-300000810893pimcotrdsmfsf-20131030:S000042791Memberpimcotrdsmfsf-20131030:C000132357Memberpimcotrdsmfsf-20131030:AAAAMember2013-10-302013-10-300000810893pimcotrdsmfsf-20131030:S000042791Memberpimcotrdsmfsf-20131030:C000132358Memberpimcotrdsmfsf-20131030:AAAAMember2013-10-302013-10-300000810893pimcotrdsmfsf-20131030:S000042791Memberpimcotrdsmfsf-20131030:C000132359Memberpimcotrdsmfsf-20131030:AAAAMember2013-10-302013-10-300000810893pimcotrdsmfsf-20131030:S000042791Memberpimcotrdsmfsf-20131030:C000132360Memberpimcotrdsmfsf-20131030:AAAAMember2013-10-302013-10-300000810893pimcotrdsmfsf-20131030:S000042791Memberpimcotrdsmfsf-20131030:C000132361Memberpimcotrdsmfsf-20131030:AAAAMember2013-10-302013-10-300000810893pimcotrdsmfsf-20131030:S000042791Memberpimcotrdsmfsf-20131030:C000132362Memberpimcotrdsmfsf-20131030:AAAAMember2013-10-302013-10-30xbrli:pureiso4217:USDxbrli:sharesiso4217:USDxbrli:shares485BPOS2013-10-30PIMCO FUNDS0000810893false2013-10-302013-10-302013-10-30
<p style="font-size:12;padding-top:2;padding-bottom:0;padding-left:0;"><b>
Investment Objective
</b></p>
<p style="font-size:12;padding-top:2;padding-bottom:0;padding-left:0;">The Fund seeks absolute risk-adjusted returns.</p>
<p style="font-size:12;padding-top:2;padding-bottom:0;padding-left:0;"><b>
Fees and Expenses of the Fund
</b></p>
<p style="font-size:12;padding-top:2;padding-bottom:0;padding-left:0;">This table describes the fees and expenses that you may pay if you buy and hold shares of the Fund. You may qualify for sales charge discounts if you and your family invest, or agree to invest in the future, at least $100,000 in Class A shares of eligible funds offered by PIMCO Equity Series and PIMCO Funds. More information about these and other discounts is available in the "Classes of Shares" section on page 12 of the Fund's prospectus or from your financial advisor.</p>
<p style="font-size:12;padding-top:2;padding-bottom:0;padding-left:0;"><b>
<b>Shareholder Fees (fees paid directly from your investment):</b>
</b></p>
<p style="font-size:12;padding-top:2;padding-bottom:0;padding-left:0;"><b>
<b>
Annual Fund Operating Expenses (expenses that you pay each year as a percentage of the value of your investment):
</b>
</b></p>
<p style="font-size:12;padding-top:2;padding-bottom:0;padding-left:0;">
<b>Example</b>. The Example is intended to help you compare the cost of investing in Institutional Class, Class P, Administrative Class, Class D, Class A, Class C or Class R shares of the Fund with the costs of investing in other mutual funds. The Example assumes that you invest $10,000 in the noted class of shares for the time periods indicated and then redeem all your shares at the end of those periods. The Example also assumes that your investment has a 5% return each year and that the Fund's operating expenses remain the same. Although your actual costs may be higher or lower, based on these assumptions your costs would be:</p>
<p style="font-size:12;padding-top:2;padding-bottom:0;padding-left:0;"><b>
If you redeem your shares at the end of each period:
</b></p>
<p style="font-size:12;padding-top:2;padding-bottom:0;padding-left:0;"><b>
If you do not redeem your shares:
</b></p>
<p style="font-size:12;padding-top:2;padding-bottom:0;padding-left:0;"><b>
Portfolio Turnover
</b></p>
<p style="font-size:12;padding-top:2;padding-bottom:0;padding-left:0;">
The Fund pays transaction costs when it buys and sells securities (or "turns over" its portfolio). A higher portfolio turnover rate may indicate higher transaction costs and may result in higher taxes when Fund shares are held in a taxable account. These costs, which are not reflected in the Annual Fund Operating Expenses or in the Example tables, affect the Fund's performance. The Fund has not yet commenced operations as of the most recent fiscal year end. Thus, no portfolio turnover rate is provided for the Fund.
</p>
<p style="font-size:12;padding-top:2;padding-bottom:0;padding-left:0;"><b>
Principal Investment Strategies
</b></p>
<p style="font-size:12;padding-top:2;padding-bottom:0;padding-left:0;">The Fund seeks to achieve its investment objective by pursuing a quantitative trading strategy intended to capture the persistence of price trends (up and/or down) observed in global financial markets and commodities. The Fund's investment strategy represents a composite of financial and commodity futures designed to provide exposure to global financial market and commodity price trends. Within the strategy's allocations, contracts are positioned either long or short based on various characteristics related to their prices. When making allocation decisions for the strategy, PIMCO considers various qualitative and quantitative factors relating to the U.S. and non-U.S. economies, and securities and commodities markets. PIMCO uses these qualitative and quantitative factors to help determine the Fund's target asset allocation and to identify potentially attractive relative value and risk hedging strategies.</p>
<p style="font-size:12;padding-top:2;padding-bottom:0;padding-left:0;">The Fund will invest under normal circumstances in derivative instruments linked to interest rates, currencies, mortgages, credit, commodities (including individual commodities and commodity indices), equity indices and volatility-related instruments. The Fund invests in derivative instruments, including futures, options on futures, options and swap agreements. The Fund may invest in derivative instruments on a speculative basis. The Fund's investments in derivative instruments will be backed by a portfolio of cash equivalent securities and short to intermediate duration Fixed Income Instruments. "Fixed Income Instruments" include bonds, debt securities and other similar instruments issued by various U.S. and non-U.S. public- or private-sector entities.</p>
<p style="font-size:12;padding-top:2;padding-bottom:0;padding-left:0;">The Fund may seek to gain exposure to the commodity futures markets primarily through investments in swap agreements and futures, and through investments in the PIMCO Cayman Commodity Fund VIII, Ltd., a wholly-owned subsidiary of the Fund organized under the laws of the Cayman Islands (the "Subsidiary"). The Fund may invest up to 25% of its total assets in the Subsidiary. The Subsidiary is advised by PIMCO, and has the same investment objective as the Fund. As discussed in greater detail elsewhere in the prospectus, the Subsidiary (unlike the Fund) may invest without limitation in commodity-linked swap agreements and other commodity-linked derivative instruments. The value of commodity-linked derivative instruments may be affected by overall market movements and other factors affecting the value of a particular industry or commodity, such as weather, disease, embargoes, or political and regulatory developments. The Fund and the Subsidiary may also temporarily hold physical commodities directly as a means of settling derivatives transactions.</p>
<p style="font-size:12;padding-top:2;padding-bottom:0;padding-left:0;">The Fund may also invest in leveraged or unleveraged commodity index-linked notes, which are derivative debt instruments with principal and/or coupon payments linked to the performance of commodity indices. These commodity index-linked notes are sometimes referred to as "structured notes" because the terms of these notes may be structured by the issuer and the purchaser of the note. The value of these notes will rise or fall in response to changes in the underlying commodity or related index.</p>
<p style="font-size:12;padding-top:2;padding-bottom:0;padding-left:0;">The Fund is non-diversified, which means that it may invest its assets in a smaller number of issuers than a diversified fund. In addition, the Fund may invest its assets in particular sectors of the commodities futures market.</p>
<p style="font-size:12;padding-top:2;padding-bottom:0;padding-left:0;">The Fund may invest in high yield securities ("junk bonds") rated below investment grade by Moody's Investors Service, Inc. ("Moody's"), or equivalently rated by Standard & Poor's Ratings Services ("S&P") or Fitch, Inc. ("Fitch"), or, if unrated, determined by PIMCO to be of comparable quality. The Fund may invest without limitation in securities denominated in foreign currencies and in U.S. dollar-denominated securities of foreign issuers. The Fund may obtain foreign currency exposure (from non-U.S. dollar-denominated securities or currencies) without limitation. The Fund may invest without limitation in securities and instruments that are economically tied to emerging market countries. The Fund may, without limitation, seek to obtain market exposure to the securities in which it primarily invests by entering into a series of purchase and sale contracts or by using other investment techniques (such as buy backs or dollar rolls). The Fund may purchase and sell securities on a when-issued, delayed delivery or forward commitment basis and may engage in short sales.</p>
<p style="font-size:12;padding-top:2;padding-bottom:0;padding-left:0;"><b>
Principal Risks
</b></p>
<p style="font-size:12;padding-top:2;padding-bottom:0;padding-left:0;">It is possible to lose money on an investment in the Fund. The principal risks of investing in the Fund, which could adversely affect its net asset value, yield and total return are:</p>
<p style="font-size:12;padding-top:2;padding-bottom:0;padding-left:0;">
<b>Interest Rate Risk:</b> the risk that fixed income securities will decline in value because of an increase in interest rates; a fund with a longer average portfolio duration will be more sensitive to changes in interest rates than a fund with a shorter average portfolio duration</p>
<p style="font-size:12;padding-top:2;padding-bottom:0;padding-left:0;">
<b>Credit Risk:</b> the risk that the Fund could lose money if the issuer or guarantor of a fixed income security, or the counterparty to a derivative contract, is unable or unwilling to meet its financial obligations</p>
<p style="font-size:12;padding-top:2;padding-bottom:0;padding-left:0;">
<b>High Yield Risk:</b> the risk that high yield securities and unrated securities of similar credit quality (commonly known as "junk bonds") are subject to greater levels of credit and liquidity risks. High yield securities are considered primarily speculative with respect to the issuer's continuing ability to make principal and interest payments
</p>
<p style="font-size:12;padding-top:2;padding-bottom:0;padding-left:0;">
<b>Market Risk:</b> the risk that the value of securities owned by the Fund may go up or down, sometimes rapidly or unpredictably, due to factors affecting securities markets generally or particular industries</p>
<p style="font-size:12;padding-top:2;padding-bottom:0;padding-left:0;">
<b>Issuer Risk:</b> the risk that the value of a security may decline for a reason directly related to the issuer, such as management performance, financial leverage and reduced demand for the issuer's goods or services</p>
<p style="font-size:12;padding-top:2;padding-bottom:0;padding-left:0;">
<b>Liquidity Risk:</b> the risk that a particular investment may be difficult to purchase or sell and that the Fund may be unable to sell illiquid securities at an advantageous time or price or achieve its desired level of exposure to a certain sector</p>
<p style="font-size:12;padding-top:2;padding-bottom:0;padding-left:0;">
<b>Derivatives Risk:</b> the risk of investing in derivative instruments, including liquidity, interest rate, market, credit and management risks, mispricing or improper valuation. Changes in the value of the derivative may not correlate perfectly with the underlying asset, rate or index, and the Fund could lose more than the principal amount invested</p>
<p style="font-size:12;padding-top:2;padding-bottom:0;padding-left:0;">
<b>Futures Contract Risk:</b> the risk that while the value of a futures contract tends to correlate with the value of the underlying asset that it represents, differences between the futures market and the market for the underlying asset may result in an imperfect correlation. Futures contracts may involve risks different from, and possibly greater than, the risks associated with investing directly in the underlying assets. The purchase or sale of a futures contract may result in losses in excess of the amount invested in the futures contract</p>
<p style="font-size:12;padding-top:2;padding-bottom:0;padding-left:0;">
<b>Model Risk:</b> the risk that the Fund's investment models used in making investment allocation decisions may not adequately take into account certain factors and may result in a decline in the value of your investment</p>
<p style="font-size:12;padding-top:2;padding-bottom:0;padding-left:0;">
<b>Commodity Risk:</b> the risk that investing in commodity-linked derivative instruments may subject the Fund to greater volatility than investments in traditional securities. The value of commodity-linked derivative instruments may be affected by changes in overall market movements, commodity index volatility, changes in interest rates, or factors affecting a particular industry or commodity, such as drought, floods, weather, livestock disease, embargoes, tariffs and international economic, political and regulatory developments
</p>
<p style="font-size:12;padding-top:2;padding-bottom:0;padding-left:0;">
<b>Equity Risk:</b> the risk that the value of equity securities, such as common stocks and preferred stocks, may decline due to general market conditions which are not specifically related to a particular company or to factors affecting a particular industry or industries. Equity securities generally have greater price volatility than fixed income securities</p>
<p style="font-size:12;padding-top:2;padding-bottom:0;padding-left:0;">
<b>Mortgage-Related and Other Asset-Backed Securities Risk:</b> the risk of investing in mortgage-related and other asset-backed securities, including interest rate risk, extension risk and prepayment risk</p>
<p style="font-size:12;padding-top:2;padding-bottom:0;padding-left:0;">
<b>Issuer Non-Diversification Risk:</b> the risk of focusing investments in a small number of issuers, including being more susceptible to risks associated with a single economic, political or regulatory occurrence than a more diversified portfolio might be. Funds that are "non-diversified" may invest a greater percentage of their assets in the securities of a single issuer (such as bonds issued by a particular state) than funds that are "diversified"
</p>
<p style="font-size:12;padding-top:2;padding-bottom:0;padding-left:0;">
<b>Foreign (Non-U.S.) Investment Risk:</b> the risk that investing in foreign (non-U.S.) securities may result in the Fund experiencing more rapid and extreme changes in value than a fund that invests exclusively in securities of U.S. companies, due to smaller markets, differing reporting, accounting and auditing standards, and nationalization, expropriation or confiscatory taxation, currency blockage, or political changes or diplomatic developments. Foreign securities may also be less liquid and more difficult to value than securities of U.S. issuers
</p>
<p style="font-size:12;padding-top:2;padding-bottom:0;padding-left:0;">
<b>Emerging Markets Risk:</b> the risk of investing in emerging market securities, primarily increased foreign (non-U.S.) investment risk</p>
<p style="font-size:12;padding-top:2;padding-bottom:0;padding-left:0;">
<b>Currency Risk:</b> the risk that foreign currencies will decline in value relative to the U.S. dollar and affect the Fund's investments in foreign (non-U.S.) currencies or in securities that trade in, and receive revenues in, or in derivatives that provide exposure to, foreign (non-U.S.) currencies</p>
<p style="font-size:12;padding-top:2;padding-bottom:0;padding-left:0;">
<b>Leveraging Risk:</b> the risk that certain transactions of the Fund, such as reverse repurchase agreements, loans of portfolio securities, and the use of when-issued, delayed delivery or forward commitment transactions, or derivative instruments, may give rise to leverage, causing the Fund to be more volatile than if it had not been leveraged</p>
<p style="font-size:12;padding-top:2;padding-bottom:0;padding-left:0;">
<b>Management Risk:</b> the risk that the investment techniques and risk analyses applied by PIMCO will not produce the desired results and that legislative, regulatory, or tax developments may affect the investment techniques available to PIMCO and each individual portfolio manager in connection with managing the Fund. There is no guarantee that the investment objective of the Fund will be achieved</p>
<p style="font-size:12;padding-top:2;padding-bottom:0;padding-left:0;">
<b>Short Sale Risk:</b> the risk of entering into short sales, including the potential loss of more money than the actual cost of the investment, and the risk that the third party to the short sale may fail to honor its contract terms, causing a loss to the Fund</p>
<p style="font-size:12;padding-top:2;padding-bottom:0;padding-left:0;">
<b>Tax Risk:</b> the risk that the tax treatment of swap agreements and other derivative instruments, such as commodity-linked derivative instruments, including commodity index-linked notes, swap agreements, commodity options, futures, and options on futures, may be affected by future regulatory or legislative changes that could affect whether income from such investments is "qualifying income" under Subchapter M of the Internal Revenue Code, or otherwise affect the character, timing and/or amount of the Fund's taxable income or gains and distributions</p>
<p style="font-size:12;padding-top:2;padding-bottom:0;padding-left:0;">
<b>Subsidiary Risk:</b> the risk that, by investing in the Subsidiary, the Fund is indirectly exposed to the risks associated with the Subsidiary's investments. The Subsidiary is not registered under the 1940 Act and may not be subject to all the investor protections of the 1940 Act. There is no guarantee that the investment objective of the Subsidiary will be achieved</p>
<p style="font-size:12;padding-top:2;padding-bottom:0;padding-left:0;">
Please see "Description of Principal Risks" in the Fund's prospectus for a more detailed description of the risks of investing in the Fund. An investment in the Fund is not a deposit of a bank and is not insured or guaranteed by the Federal Deposit Insurance Corporation or any other government agency.
</p>
<p style="font-size:12;padding-top:2;padding-bottom:0;padding-left:0;"><b>
Performance Information
</b></p>
<p style="font-size:12;padding-top:2;padding-bottom:0;padding-left:0;">The Fund does not have a full calendar year of performance. Thus, no bar chart or Average Annual Total Returns table is included for the Fund. Performance for the Fund is updated daily and quarterly and may be obtained as follows: daily updates on the net asset value and performance page at http://investments.pimco.com/DailyPerformance and quarterly updates at http://investments.pimco.com/QuarterlyPerformance.</p>
<p style="font-size:12;padding-top:2;padding-bottom:0;padding-left:0;">The Fund's benchmark index is the 3-Month USD LIBOR Index. LIBOR (London Interbank Offered Rate) is an average interest rate, determined by the British Bankers Association, that banks charge one another for the use of short-term money (3 months) in England's Eurodollar market.</p>
<div style="display:none">~http://pimcotrdsmfsf-20131030/role/ShareholderFeesDataAAAA column period compact * column rr_ProspectusShareClassAxis compact * row primary compact * row dei_LegalEntityAxis compact pimcotrdsmfsf-20131030_S000042791Member ~</div>000000000.0550.0100.0100<div style="display:none">~ http://pimcotrdsmfsf-20131030/role/OperatingExpensesDataAAAA column period compact * column rr_ProspectusShareClassAxis compact * row primary compact * row dei_LegalEntityAxis compact pimcotrdsmfsf-20131030_S000042791Member ~</div>0.0140.00180.0010.0168-0.00530.01150.0150.00180.0010.0178-0.00530.01250.0140.00250.00180.0010.0193-0.00530.0140.01550.00250.00180.0010.0208-0.00530.01550.01550.00250.00180.0010.0208-0.00530.01550.01550.010.00180.0010.0283-0.00530.0230.01550.0050.00180.0010.0233-0.00530.018<div style="display:none">~ http://pimcotrdsmfsf-20131030/role/ExpenseExampleAAAA column period compact * column rr_ProspectusShareClassAxis compact * row primary compact * row dei_LegalEntityAxis compact pimcotrdsmfsf-20131030_S000042791Member ~</div>1171271431586993331834194504965421062770619<div style="display:none">~ http://pimcotrdsmfsf-20131030/role/ExpenseExampleNoRedemptionAAAA column period compact * column rr_ProspectusShareClassAxis compact * row primary compact * row dei_LegalEntityAxis compact pimcotrdsmfsf-20131030_S000042791Member ~</div>1171271431586992331834194504965421062770619You may qualify for sales charge discounts if you and your family invest, or agree to invest in the future, at least $100,000 in Class A shares of eligible funds offered by PIMCO Equity Series and PIMCO Funds. More information about these and other discounts is available in the "Classes of Shares" section on page 12 of the Fund's prospectus or from your financial advisor.100000An investment in the Fund is not a deposit of a bank and is not insured or guaranteed by the Federal Deposit Insurance Corporation or any other government agency. It is possible to lose money on an investment in the Fund.Issuer Non-Diversification Risk: the risk of focusing investments in a small number of issuers, including being more susceptible to risks associated with a single economic, political or regulatory occurrence than a more diversified portfolio might be. Funds that are "non-diversified" may invest a greater percentage of their assets in the securities of a single issuer (such as bonds issued by a particular state) than funds that are "diversified"Performance for the Fund is updated daily and quarterly and may be obtained as follows: daily updates on the net asset value and performance page at http://investments.pimco.com/DailyPerformance and quarterly updates at http://investments.pimco.com/QuarterlyPerformance. 2015-07-31
PIMCO has contractually agreed, through July 31, 2015, to reduce its advisory fee by 0.25% of the average daily net assets of the Fund. This Fee Limitation Agreement renews annually unless terminated by PIMCO upon at least 30 days' prior notice to the end of the contract term. Under certain conditions, PIMCO may recoup amounts reduced in future periods, not exceeding three years.
"Other Expenses" reflect estimated organizational expenses for the Fund's first fiscal year.
PIMCO has contractually agreed to waive the Fund's advisory fee and the supervisory and administrative fee in an amount equal to the management fee and administrative services fee, respectively, paid by the PIMCO Cayman Commodity Fund VIII, Ltd. (the "Subsidiary") to PIMCO. The Subsidiary pays PIMCO a management fee and an administrative services fee at the annual rates of 0.49% and 0.20%, respectively, of its net assets. This waiver may not be terminated by PIMCO and will remain in effect for as long as PIMCO's contract with the Subsidiary is in place.
PIMCO has contractually agreed, through July 31, 2015, to waive its supervisory and administrative fee, or reimburse the Fund, to the extent that organizational expenses and pro rata Trustees' fees exceed 0.0049% of the Fund's average net assets attributable to Institutional Class, Class P, Administrative Class, Class D, Class A, Class C and Class R shares, respectively (the "Expense Limit"). Under the Expense Limitation Agreement, which renews annually for a full year unless terminated by PIMCO upon at least 30 days' notice prior to the end of the contract term, PIMCO may recoup these waivers and reimbursements in future periods, not exceeding three years, provided organizational expenses and pro rata Trustees' fees, plus such recoupment, do not exceed the Expense Limit.
EX-101.SCH
3
pimcotrdsmfsf-20131030.xsd
XBRL TAXONOMY EXTENSION SCHEMA DOCUMENT
010001 - Document - Document And Entity Information {Elements}link:presentationLinklink:calculationLinklink:definitionLink010002 - Document - PIMCO TRENDS Managed Futures Strategy Fund {Unlabeled}link:presentationLinklink:calculationLinklink:definitionLink020032 - Schedule - Expense Example {Transposed}link:presentationLinklink:calculationLinklink:definitionLink020022 - Schedule - Annual Fund Operating Expenseslink:presentationLinklink:calculationLinklink:definitionLink020012 - Schedule - Shareholder Feeslink:presentationLinklink:calculationLinklink:definitionLink020042 - Schedule - Expense Example, No Redemption {Transposed}link:presentationLinklink:calculationLinklink:definitionLinkEX-101.DEF
4
pimcotrdsmfsf-20131030_def.xml
XBRL TAXONOMY EXTENSION DEFINITION LINKBASE DOCUMENT
EX-101.LAB
5
pimcotrdsmfsf-20131030_lab.xml
XBRL TAXONOMY EXTENSION LABELS LINKBASE DOCUMENT
Expense Example, No Redemption:Shareholder Fees [Table]Annual Fund Operating Expenses [Table]Expense Example, With Redemption [Table]Bar Chart [Table]Performance [Table]Expense Example, No Redemption Narrative [Text Block]Market Index Performance [Table]Expense Example, No Redemption [Table]Performance Measure [Axis]Before TaxesAfter Taxes on DistributionsAfter Taxes on Distributions and SalesAmendment DescriptionAmendment FlagDocument Creation DateDocument Effective DateDocument [Axis]ProspectusDocument Period End DateDocument TypeEntities [Table]Entity [Text Block]SeriesTrading SymbolRegistrant NameCentral Index KeySeries [Axis]Risk/Return [Heading]Objective Section:Objective [Heading]Objective, Primary [Text Block]Objective, Secondary [Text Block]Strategy Section:Strategy [Heading]Strategy Narrative [Text Block]Strategy Portfolio Concentration [Text]Bar Chart and Performance Table [Heading]Performance Narrative [Text Block]Performance Past Does Not Indicate Future [Text]Performance Information Illustrates Variability of Returns [Text]Performance One Year or Less [Text]Performance Additional Market Index [Text]Bar Chart [Heading]Bar Chart Narrative [Text Block]Bar Chart Does Not Reflect Sales Loads [Text]Bar Chart, Returns for Class Not Offered in Prospectus [Text]Bar Chart, Reason Selected Class Different from Immediately Preceding Period [Text]Annual Return Caption [Text]CaptionAnnual Return, Column [Text]ColumnAnnual Return, Inception DateInception DateAnnual Return 1990Annual Return 1991Annual Return 1992Annual Return 1993Annual Return 1994Annual Return 1995Annual Return 1996Annual Return 1997Annual Return 1998Annual Return 1999Annual Return 2000Annual Return 2001Annual Return 2002Annual Return 2003Annual Return 2004Annual Return 2005Annual Return 2006Annual Return 2007Annual Return 2008Annual Return 2009Annual Return 2010Annual Return 2011Annual Return 2012Year to Date Return, LabelBar Chart, Year to Date ReturnBar Chart, Year to Date Return, DateHighest Quarterly Return, LabelLabelHighest Quarterly ReturnHighest Quarterly Return, DateLowest Quarterly Return, LabelLabelLowest Quarterly ReturnLowest Quarterly Return, DateBar Chart Closing [Text Block]Performance Table HeadingPerformance Table NarrativePerformance Table Does Reflect Sales LoadsPerformance Table Market Index ChangedPerformance Table Uses Highest Federal RatePerformance Table Not Relevant to Tax DeferredPerformance Table Explanation after Tax HigherCaptionColumnLabel1 Year5 Years10 YearsSince InceptionInception DateMoney Market Seven Day Yield, Caption [Text]Money Market Seven Day Yield Column [Text]Money Market Seven Day Yield PhoneMoney Market Seven Day YieldMoney Market Seven Day Tax Equivalent YieldThirty Day Yield CaptionThirty Day Yield Column [Text]Thirty Day Yield PhoneThirty Day YieldThirty Day Tax Equivalent YieldPerformance Table FootnotesPerformance Table Closing [Text Block]Risk Section:Risk [Heading]Risk Narrative [Text Block]Risk Nondiversified Status [Text]Risk Lose Money [Text]Risk Money Market Fund [Text]Risk Not Insured Depository Institution [Text]Risk CaptionRisk Column [Text]Risk [Text]Risk Footnotes [Text Block]Risk Closing [Text Block]Expense [Heading]Expense Narrative [Text Block]Expense Breakpoint Discounts [Text]Expense Exchange Traded Fund Commissions [Text]Shareholder Fees Caption [Text]Shareholder Fees Column [Text]Maximum Sales Charge (Load) Imposed on Purchases (as a percentage of offering price)Maximum Cumulative Sales Charge (as a percentage)Maximum Sales Charge Imposed on Purchases (as a percentage of Offering Price)Maximum Deferred Sales Charge (Load) (as a percentage of the lower of the original purchase price or redemption price)Maximum Deferred Sales Charge (as a percentage of Offering Price)Maximum Sales Charge on Reinvested Dividends and Distributions (as a percentage)Redemption Fee (as a percentage of Amount Redeemed)Redemption Fee (as a percentage of Amount Redeemed)Redemption FeeRedemption FeeExchange Fee (as a percentage of Amount Redeemed)Exchange FeeMaximum Account Fee (as a percentage of Assets)Maximum Account FeeShareholder Fee, OtherOperating Expenses Caption [Text]Operating Expenses Column [Text]Management FeesDistribution and/or Service (12b-1) FeesDistribution or Similar (Non 12b-1) FeesOther ExpensesOther ExpensesComponent1 Other ExpensesComponent2 Other ExpensesComponent3 Other ExpensesAcquired Fund Fees and ExpensesTotal Annual Fund Operating ExpensesTotal Annual Fund Operating ExpensesFee Waiver and/or Expense ReimbursementFee Waiver and/or Expense ReimbursementTotal Annual Fund Operating Expenses After Fee Waiver and/or Expense ReimbursementTotal Annual Fund Operating Expenses After Fee Waiver and/or Expense ReimbursementExpenses Represent Both Master and Feeder [Text]Expenses Other Expenses Had Extraordinary Expenses Been Included [Text]Expenses Restated to Reflect Current [Text]Expense Example [Heading]Expense Example Narrative [Text Block]Expense Example by Year [Heading]Expense Example by, Year, Caption [Text]Expense Example, By Year, Column [Text]ColumnExpense Example, with Redemption, 1 Year1 YearExpense Example, with Redemption, 3 Years3 YearsExpense Example, with Redemption, 5 Years5 YearsExpense Example, with Redemption, 10 Years10 YearsExpense Example, No Redemption, By Year, Caption [Text]Expense Example, No Redemption, By Year, Column [Text]ColumnExpense Example, No Redemption, 1 Year1 YearExpense Example, No Redemption, 3 Years3 YearsExpense Example, No Redemption, 5 Years5 YearsExpense Example, No Redemption, 10 Years10 YearsExpense Example Closing [Text Block]Prospectus DateProspectus:Share Class [Axis]Share ClassesProspectus [Line Items]Form N-1A:Risk/Return:Portfolio Turnover [Heading]Portfolio Turnover [Text Block]Bar Chart and Performance Table Section:Bar Chart Narrative:Bar Chart Table:Bar Chart Closing:Average Annual Return:Market Index Return:Performance Narrative:Performance Table Section:Performance Table Closing:Expenses:Shareholder Fees:Operating Expenses:Net Expenses (as a percentage of Assets):Expenses (as a percentage of Assets):Other Expenses over Assets:Expense Footnotes:Expense Footnotes [Text Block]Expense Example Narrative:Expense Example:Expense Example Closing:Expense Example Footnotes [Text Block]Portfolio Turnover:Fee Waiver or Reimbursement over Assets, Date of TerminationPortfolio Turnover, RateExpense Breakpoint, Minimum Investment Required [Amount]Performance Table Footnotes, Reason Performance Information for Class Different from Immediately Preceding Period [Text]Bar Chart Footnotes [Text Block]Performance Table One Class of after Tax Shown [Text]Other Expenses, New Fund, Based on Estimates [Text]Acquired Fund Fees and Expenses, Based on Estimates [Text]Expenses Deferred Charges [Text Block]Expenses Range of Exchange Fees [Text Block]Expenses Not Correlated to Ratio Due to Acquired Fund Fees [Text]Expenses Explanation of Nonrecurring Account Fee [Text]Index No Deduction for Fees, Expenses, Taxes [Text]Annual Return 2013Annual Return 2014Performance Availability Website Address [Text]Performance Availability Phone [Text]S000042791 Member(PIMCO TRENDS Managed Futures Strategy Fund)AAAA MemberPIMCO FUNDSC000132360 MemberClass AC000132358 MemberAdministrative ClassC000132361 MemberClass CC000132359 MemberClass DC000132356 MemberInstitutional ClassC000132357 MemberClass PC000132362 MemberClass REX-101.PRE
6
pimcotrdsmfsf-20131030_pre.xml
XBRL TAXONOMY EXTENSION PRESENTATION LINKBASE DOCUMENT
GRAPHIC
8
x13111901530100.jpg
GRAPHIC
begin 644 x13111901530100.jpg
M_]C_X``02D9)1@`!`0$`8`!@``#_VP!#``H'!P@'!@H("`@+"@H+#A@0#@T-
M#AT5%A$8(Q\E)"(?(B$F*S7J#A(6&AXB)BI*3E)66EYB9FJ*CI*6FIZBI
MJK*SM+6VM[BYNL+#Q,7&Q\C)RM+3U-76U]C9VN'BX^3EYN?HZ>KQ\O/T]?;W
M^/GZ_]H`"`$!```_`(?A=X`\.>)?"YOM5LGFG$S+N$S+P/8&NLOOAW-H=N;W
MP5JEY87H^G?\`
M&MJ:>"W4//-'$I[NP4?K3D=)$#HRLIZ%3D&G5#%=VT[F.&XBD=>JHX)'X"N)
M^*O_`!Z^'O\`L-0?UKMY[JVMB//N(HMW3S'"Y_.I`00"""#T(ILTT-NF^:5(
ME_O.P4?K2QR1RH'C=70]&4Y!IH_%I:N+PJ.Q*LQQ5GPO
MX2MO%FG)XF\61?VC=Z@#+#!(Y\JVB/W55>G3G--:Q'P]\:Z5'ICR)H>MR&WE
MM&\_Q?XZ_X13[3+!I5A;BXOQ"Y1IV;[L>1SCD'\ZGU
M;X8:$VGLV@VW]DZG"-UK=6\C*0XZ!N>0>]8?Q'DUJ+P9X&/#D'CFV/BKQ1&;TWC,;*T=SY5M""0N%
M!Y8XZTW4=-C^'7B;2K_1C)!H^IW(M+RR+EHT=ONNN>AZ_P"369XHMM2U+XR#
M2M/NI+47NFK'<3QGYHX=Q+E?0D#&?>NK3X6>#%0*VD&0@&]9\.SW6H:8)IDOI8U;S7&%4C`X-:?P/_`.1(;_KX;^=>@W-S!9VLMU1V.`H'4UY5H-G>?$B^M-2TSP[2*%)]/A@+%MIM]W
M)]RM7W^'OB'7I%3Q?XKDO+)6#&SM(_*1R/[Q&/Y5WEK:6]E:16EK"D4$2!$C
M48"J.UR:=JMB2;:\B&2N>JL.Z
MGTK,N/#GC;6(#8:MXELX+%QMF:PMBLTJ]QDG"Y]JL:[X&CO-'T72](:&SM]+
MO8[@*X)W*N.9)[&[A,D)?^\N.5J2W\&ZGJFL6VI^+M5AU#[$=]M96T
M.R!'_OG/+'ZU=7PS`2TF3C\!61JUC>ZEXCO8;-"LJ06YCN3T/_H;5Z/9
-?\C+J7_7O;_^U*__V3\_
`
end
EXCEL
9
Financial_Report.xlsx
IDEA: XBRL DOCUMENT
begin 644 Financial_Report.xlsx
M4$L#!!0`!@`(````(0!\;)@6;`$``*`%```3``@"6T-O;G1E;G1?5'EP97-=
M+GAM;""B!`(HH``"````````````````````````````````````````````
M````````````````````````````````````````````````````````````
M````````````````````````````````````````````````````````````
M````````````````````````````````````````````````````````````
M````````````````````````````````````````````````````````````
M````````````````````````````````````````````````````````````
M````````````````````````````````````````````````````````````
M````````````````````````````````````````````````````````````
M````````````````````````````````````````````````````````````
M````````````````````````````````````````````````````````````
M````````````````````````````````````````````````````````````
M``````````````````````````````````````#,E%U+PS`4AN\%_T/)K339
M)HC(NEWXD:EB8A)YO;O_M/0YISW?9(T[W"\:DRV
MA(#:V8+U>8]E8$NGM)T5[&WZE-^R#*.T2AIGH6!K0#8>75X,IVL/F%&WQ8+5
M,?H[(;"LH9'(G0=+,Y4+C8ST&F;"RW(N9R`&O=Z-*)V-8&,>6PTV&CY`)1;PM:K8-)[HTL9B50LK?KFDF\=.'6F&JRUQRO"8*+3H9WY
MV6#;]T);$[2";")#?)8-88B5$1\NS-^=F_/#(AV4KJIT"B?&:1=7Q(^D6/P3SBN_X@CTO\/(CU_?R1)YL@!
M8%P;P#.O=B-ZS+F6`=1K#)049P?XJGV(@^[1)#B/E"@!3M^%762TW;DG(0A1
MPSXTNB[?WI'2Z'3#;[P"3N'[6-HR1`
M]_:$`X)*8]O1]N?//UO>[N9I5!\<8B].P[HH0;$S8GO7:GBMGU8/H&(B9VD4
MQQJ.'&%7W=YL7WBDE)MBU_NHLHN+&KJ4_"-B-!U/%`OQ['*ED3!1RF%HT9,9
MJ&74"T\U$SO+=N5#
M9@NIS]NHFD++28,5\YS3$$X4UD^&'!Q0]47P```/__`P!02P,$%``&``@````A`-X)
M_2@"`0``U`,``!H`"`%X;"]?#)/Q]/]"G_>&G
M[\07!FJ=59`E*0BTI:M:VRCX.+T^/(,@UK;2G;.H8$""0W%_MW_#3G/\1*;U
M)***)06&V>^DI-)@KREQ'FV=8-RCQ-MS+\U8!BIBF.E8)P
MK#8@3H./SO]KN[IN2WQQY6>/EJ]8R&\7SF00.8KJT"`KF%HDQ\DFB<0@K\/D
M-X;)EV"R&\-D2S#;-6'(Z(#5.X>80KJL:M9>@GE:%8:'+H9^"@R-]9+]XYKV
M'$\)+^YC*<=WVH>\:I4@(G3L[,>+Z\]Y+9XE!I\A^<5]9D='25
M4`(FMU*974:?MW>7ORCQ01@IM#60T2-XNIA?_)BUUNW?K-T3!!B?T3*$>LJ8
MSTNHA+^R-1B3HZ(J.L'4:'N@Z9$"Q]64@60&?V)I6WA4\,U
M]6VC-$Y_CY,Q9?.SR4=')!2BT6&+]GHZYI5.TO0ZWHQ1O"AH_<=2+,GA51EI
MVW@5HSV>JS$*:+O1JY*AQ'F2).?>7U"[,O1-Q+,!OTL0W].=Q'3V^D3XC9%\
M98(*1[XVI_25Q4\84U^CLQ$E;JKPP:WE*`H?4A[7]W_^\>UF];!\XO?"B!U(
M?M>$QH'G3P/*9$!)OU(VRN\W@$N&+R$(I?E2!#'81IMG#5W,K+>4"YUCUO&(
M8I.(9OV?-G\'``#__P,`4$L#!!0`!@`(````(0#[8J5ME`8``*&PO=&AE;64O=&AE;64Q+GAM;.Q93V_;-A2_#]AW('1O;2>V&P=UBMBQFZU-
M&\1NAQYIF9984Z)`TDE]&]KC@`'#NF&7`;OM,&PKT`*[=)\F6X>M`_H5]DA*
MLAC+2](&&];5AT0B?WS_W^,C=?7:@XBA0R(DY7';JUVN>HC$/A_3.&A[=X;]
M2QL>D@K'8\QX3-K>G$COVM;[[UW%FRHD$4&P/I:;N.V%2B6;E8KT81C+RSPA
M,S*A/D%#3=+;RHCW&+S&
M2NH!GXF!)DVU?R\RM;5
M"MY,%S&U8FUA7=_\TG7I@O%TS?`4P2AG6NO76U=VJ^>?__J^5/TZOF3XX?/
MCA_^=/SHT?'#'RTM9^$NCH/BPI???O;GUQ^C/YY^\_+Q%^5X6<3_^L,GO_S\
M>3D0,F@AT8LOG_SV[,F+KS[]_;O')?!M@4=%^)!&1*);Y`@=\`AT,X9Q)2"M.69EN`YQC7=70/$H`UZ?W7=D'81BIF@)YQMA
MY`#W.&<=+DH-UO5D"53,+2L?VW9`X
M8NXS'"LY1ZMAUC_J"2SY1Z!Y%'4Q+33*D(R>0%HMV:01^
MF9?I#*YV;+-W%W4X*]-ZAQRZ2$@(S$J$'Q+FF/$ZGBD".S1P
M1%H$B)Z9B1)?7B?-AOZ'&(KA\1JCX_M\+H>
MSHX;.1DC56#.M!FC=4W@K,S6KZ1$0;?785;30IV96\V(9HJBPRU769O8G,O!
MY+EJ,)A;$SH;!/T06+D)QW[-&LX[F)&QMKOU4>86XX6+=)$,\9BD/M)Z+_NH
M9IR4Q>Q,O91&\\!)0.YF.
M+"XF)XO14=MK-=8:'O)QTO8F[\JIB4OR!5BF'\/U-%[R=P!;$^UA[PX7988*0SI>UQH4(.52@)J=\7T#B8
MV@'1`E>\,`U!!7?4YK\@A_J_S3E+PZ0UG"35`0V0H+`?J5`0L@]ER43?*<1J
MZ=YE2;*4D(FH@K@RL6*/R"%A0UT#FWIO]U`(H6ZJ25H.YD_+GO:0:-`MWD
M%//-J63YWFMSX)_N?&PR@U)N'38-36;_7,2\/5CLJG:]69[MO45%],2BS:IG
M60',"EM!*TW[UQ3AG%NMK5A+&J\U,N'`B\L:PV#>$"5PD83T']C_J/"9_>"A
M-]0A/X#:BN#[A28&80-1?F#R`Y+<7'N]O;T_VWP^/=Z>;XX_"$EB_'Y\>[%_SG\]?;TX_G
MP]WGKM/C]]OY;+:^?;Q[>+KNC_#N^2W'.'[Y\G!_*([WOS\>GE[Z@SP?OM^]
MX/Q/WQY^G(:C/=Z_Y7"/=\^__?[CE_OCXP\7O[J#7E\]WK]KOSX=
MG^\^?4?>?V;+N_OAV-U_T.$?'^Z?CZ?CEY7>[N\61/K[__(`,
M1/:KY\.7#]>_9N_:;+&[OOWXOE/H?Q\./T_1_[\Z?3O^K)\?/O_SX>D`N5$H
M*KSXGR0L0%)[O[\T?J/>]B]G[&*F=],J)%$1*(A61FDA#I(W)+7+W`F"\_`T"
MR%&,`"N3OP_Q^1,IB)1$*B(UD89(&Q.5/VH6YY^^W(8Z2W"7YI##GDA.I"!2
M$JF(U$0:(FU,5%:X'-^>E00C*_PKC-Z-J9Z/&3+/B11$2B(5D9I(0Z2-B | 2024-05-21T01:27:17.568517 | https://example.com/article/7332 |
Q:
Commits done to view the KMZ file on Openlayers3?
Before, I used Google Earth as a mapping but now I am trying to migrate to GE OpenLayers3.
commits can we do to show the KMZ file on Open layers3?
A:
You need to unzip the KMZ with a library like zip.js, and then to use the KML format to read uncompress data.
You can find a working example for this purpose (caution: it's a kmz calling other kmz ;) )
I repeat here the warning here I have in my github repo
Demo depends from alerts provided by NOAA National
Weather Service at their Storm prediction center, so display can be
empty)
However, if demo does not show geometry, you can look the log in the console for learning purpose (KMZ uncompressed but just with no geometry)
| 2024-03-24T01:27:17.568517 | https://example.com/article/4943 |
Q:
IOS - SWIFT - CollectionView With images, loading URLs from array
I have a collection view and array with URLs of different images. and when i launch the app, collection view starts to load images through the array:
func collectionView(collectionView: UICollectionView, cellForItemAtIndexPath indexPath: NSIndexPath) -> UICollectionViewCell
{
var cell = collectionView.dequeueReusableCellWithReuseIdentifier("cell", forIndexPath: indexPath) as! CellView
var url = arr[indexPath.row]
var urls = NSURL(string: url)
var data = NSData(contentsOfURL: urls!)
cell.ImageView.image = UIImage(data: data!)
return cell
}
and the trouble appearse:
for example on 4th cell collection view loading all 4 urls for all 4 cells and it takest alot time. how can collection view load particular url for particular cell and don't spend time to load urls to cells that already loaded?
Thanks for any help!!
A:
I suggest using a third party library for this matter, it called SDWebImage.
And than for each image view inside a cell set:
self.imageView.sd_setImageWithURL(url, completed: block)
| 2024-02-02T01:27:17.568517 | https://example.com/article/2306 |
Free radical production induced by methamphetamine in rat striatal synaptosomes.
The pro-oxidative effect of methamphetamine (METH) in dopamine terminals was studied in rat striatal synaptosomes. Flow cytometry analysis showed increased production of reactive oxygen species (ROS) in METH-treated synaptosomes, without reduction in the density of dopamine transporters. In synaptosomes from dopamine (DA)-depleted animals, METH did not induce ROS production. Reserpine, in vitro, completely inhibited METH-induced ROS production. These results point to endogenous DA as the main source of ROS induced by METH. Antioxidants and inhibitors of neuronal nitric oxide synthase and protein kinase C (PKC) prevented the METH-induced oxidative effect. EGTA and the specific antagonist methyllycaconitine (MLA, 50 microM) prevented METH-induced ROS production, thus implicating calcium and alpha7 nicotinic receptors in such effect. Higher concentrations of MLA (>100 microM) showed nonspecific antioxidant effect. Preincubation of synaptosomes with METH (1 microM) for 30 min reduced [(3)H]DA uptake by 0%. The METH effect was attenuated by MLA and EGTA and potentiated by nicotine, indicating that activation of alpha(7) nicotinic receptors and Ca(2+) entry are necessary and take place before DAT inhibition. From these findings, it can be postulated that, in our model, METH induces DA release from synaptic vesicles to the cytosol. Simultaneously, METH activates alpha(7) nicotinic receptors, probably inducing depolarization and an increase in intrasynaptosomal Ca(2+). This would lead to DAT inhibition and NOS and PKC activation, initiating oxidation of cytosolic DA. | 2023-09-08T01:27:17.568517 | https://example.com/article/9152 |
Green Operations
Volvo Begins Selling Trucks That Meet 2010 Emissions Standards
June 23, 2009
• by Staff
GREENSBORO, NC – Volvo Trucks North America has begun selling vehicles that meet the new U.S. Environmental Protection Agency (EPA) emissions standards, which come into effect in 2010. The trucks meet the standards using SCR, Selective Catalytic Reduction, which also increases fuel efficiency and reduces carbon emissions. Initial production is scheduled for autumn 2009, according to a statement by the automaker.
By beginning the process this early, the plant in New River Valley, Virginia can commence the production of trucks that meet the new emissions standards already prior to them coming into effect next year. The plant's production processes have been modified in recent months in preparation for 2010 and to enhance the efficiency and quality of manufacturing.
By mid-June, customers had placed orders via distributors for approximately 50 trucks that meet EPA2010 standards.
"Several customers have expressed an interest in placing SCR-equipped vehicles in their fleets ahead of 2010," said Scott Kress, senior vice president sales and marketing at Volvo Trucks North America, in the statement. "This gives early adopters the opportunity to gain familiarity with the technology and the benefits of SCR."
Clean vehicle technology is advancing by leaps and bounds, but the direction it is moving is not always clear. A panel discussion at a recent alt fuel conference explored global trends in the space and the need for more certainty.
The key event of Shell Lubricants' Make the Future California and Eco-marathon Americas 2018 festival was the Eco-marathon mileage challenge. The competition featured 99 high school teams vying to set a new mileage mark while piloting their class-constructed vehicles around the Sonoma Raceway track. Photos: Jim Beach
The California Air Resources Board has fined Marten Logistics and Roadrunner Transportation Systems for failing to verify that trucks hired or dispatched were compliant with the state’s truck emissions regulations.
Is being green just a matter of buying the latest trucks with hyper-compliant engines? Of spec’ing the latest in aerodynamics? It’s both, of course – and much more besides says Executive Contributing Editor Rolf Lockwood. | 2024-07-07T01:27:17.568517 | https://example.com/article/4965 |
Q:
how is hashCode() implemented in Java
How is hashCode() implemented?
My assumption is that it uses the object memory location as the initial number (the seed) on which it runs the hash function. However, this is not the case.
I've also looked at Hash : How does it work internally? but it does not answer my question.
Yes I could download the SDK, but before I do that and look at the code, perhaps someone else already has knowledge of it.
Thanks :)
EDIT:
I know it should be overridden and such, so please try to stay on topic :)
A:
No, no, no. All answers in this thread are wrong or at least only partially correct.
First:
Object.hashCode() is a native method, so its implementation depends solely on the JVM. It may vary between HotSpot and other VM implementations like JRockit or IBM J9.
If you are asking:
how is hashCode() implemented in Java?
Then the answer is: it depends on which VM you are using.
Assuming that you are using Oracle's default JVM—which is HotSpot, then I can tell you that HotSpot has six hashCode() implementations. You can choose it using the -XX:hashCode=n flag running JVM via command line, where n can be:
0 – Park-Miller RNG (default)
1 – f(address, global_statement)
2 – constant 1
3 – Serial counter
4 – Object address
5 – Thread-local Xorshift
The above is copied from this post.
And if you dig a little bit around in the HotSpot source code, you may find below snippet:
if (hashCode == 0) {
value = os::random();
} else {
...
os::random() is just the implementation of the Park-Miller Pseudo Random Generator algorithm.
That's all. There isn't any notion of memory address. Although two other implementations, 1 and 4, use an object's memory address, the default one doesn't use it.
The notion that Object.hashCode() is based on the object's address is largely a historic artefact - it is no longer true.
I know that inside Object#hashCode() JavaDoc we can read:
(...) this is typically implemented by converting the internal address of the object into an integer, but this implementation technique is not required by the Java™ programming language.
But it is obsolete and misleading.
A:
Of course it is implementation specific, but generally the hash code for an object will be computed lazily and stored in the object header. Odd things are done with headers to keep them small whilst allowing complex locking algorithms.
In the OpenJDK/Oracle JVM the usual method of computing the initial hash code is based on the memory address at the time of the first request. Objects move about in memory, so using the address each time would not be a good choice. The hash code isn't the actual address - that would typically be a multiple of eight which isn't great for using straight in a hash table particularly with a power of two size. Note identity hash codes are not unique.
HotSpot has build time options to always use zero or use a secure random number generator (SRNG) for testing purposes.
| 2023-10-18T01:27:17.568517 | https://example.com/article/4220 |
Q:
document.evaluate - Cross browser?
I have been looking for a CSS selector function other than Sizzle and I have come across this function.
function SparkEn(xpath,root) {
xpath = xpath
.replace(/((^|\|)\s*)([^/|\s]+)/g,'$2.//$3')
.replace(/\.([\w-]+)(?!([^\]]*]))/g, '[@class="$1" or @class$=" $1" or @class^="$1 " or @class~=" $1 "]')
.replace(/#([\w-]+)/g, '[@id="$1"]')
.replace(/\/\[/g,'/*[');
str = '(@\\w+|"[^"]*"|\'[^\']*\')';
xpath = xpath
.replace(new RegExp(str+'\\s*~=\\s*'+str,'g'), 'contains($1,$2)')
.replace(new RegExp(str+'\\s*\\^=\\s*'+str,'g'), 'starts-with($1,$2)')
.replace(new RegExp(str+'\\s*\\$=\\s*'+str,'g'), 'substring($1,string-length($1)-string-length($2)+1)=$2');
var got = document.evaluate(xpath, root||document, null, 5, null);
var result=[];
while (next = got.iterateNext())
result.push(next);
return result;
}
I just feel like it is too good to be true, is this a firefox only function (xpath?) or is it slow? Basically why would I use Sizzle over this?
A:
I believe no stable version of IE supports document.evaluate, so you're limited to every other browser. It's not slow since it's a native implementation of XPath.
Sizzle is useful because it uses the native support browsers offer when available (such as document.getElementsByClassName), but falls back to doing it itself when unavailable (IE). It's also used by jQuery and Prototype, so it's heavily, heavily tested and is unlikely to give you any trouble. Sizzle is also heavily speed-tested and optimized (they have a whole speed test suite), which is more work you don't have to do.
I'd say go with jQuery, Prototype, or just Sizzle by itself unless you are doing something incredibly performance-sensitive (which, honestly, is probably an indicator that you've structured your application poorly).
| 2024-05-01T01:27:17.568517 | https://example.com/article/6088 |
Q:
Focusing on a composite when tabbing through children?
I have developed a custom component that needs to gain focus when I tab through a main Composite. How do I go about doing that?
A:
Add a key listener to the composite so that it can gain focus, using Control#addKeyListener(..).
| 2024-06-27T01:27:17.568517 | https://example.com/article/5674 |
Q:
Should I fix my overheating problem or invest in a new laptop?
So I am running into overheating issues, constant shutdowns and lagging when I open multiple tabs on the browser, which is not convenient at all.
Here are my laptop specs:
Intel(R) Core(TM) i7 CPU L 640 @ 2.13GHz
8 GB Ram
Harddisk 160 gb
Intel® Ironlake Mobile
Currently running Ubuntu 14.04 and the machine is almost 5 years old, but it has served me well and I honestly abused it.
So should I try to send it to be fixed or is there anything else I can do other than dust off and reapply the thermal paste apply or get a new one?
A:
You could invest in a laptop fan cooler. You know those ones you put under the laptop to make sure the intake fans are getting extra air flow. Some laptops later in their life get clogged up. It might be worth it to take it apart and just blow it out. Generally this is easy to do.
More targeting the Ubuntu side of things. You can turn the CPU frequency down in ubuntu.
sudo apt-get install indicator-cpufreq
You also then need to make it apart of the startup process by adding a startup script. Just type "Startup Applications" in the dash and add your bash script starting that application there.
If it is GPU you might want to think about switching to open drivers, or closed drivers and see if that helps. You could also try something that requires less system resources and turning of system effects with something like Compiz Config Settings Manager. It is slightly advanced so just be a little careful what you turn off.
sudo apt-get install compizconfig-settings-manager
| 2023-09-08T01:27:17.568517 | https://example.com/article/4916 |
1. Introduction {#sec1}
===============
The *in vitro* generation of hematopoietic stem cells (HSC) and mature hematopoietic cells from embryonic stem cells (ESC) promises to provide an alternative source of cells that could replace total bone marrow cells or HSC-enriched fractions of them. This is especially necessary in the case of human cells in clinical settings for HSC transplantations. In addition, studying hematopoiesis *in vitro* bypasses the need of donor cells, in particular to study hematopoietic disorders in human. ESC lines can be cultured long term and allow, in contrast to HSC, homologous recombination of DNA, that is, the insertion of exogenously modified genes into the appropriate sites in the genome. Thus, genetically altered, ESC-derived HSC might allow the proper genetic repair of defective cells of the hematopoietic system, including those of the innate and the adaptive immune system. However, for transplantations of human cells histoincompatibilities between the ESC-derived HSC and the transplanted host might be the cause of transplant rejections.
Since it has now become possible to generate ESC-like induced pluripotent stem cells (iPSC) from differentiated peripheral cells \[[@B1], [@B2]\], HSC as well as mature hematopoietic cells might in the future be generated from differentiated cells of a patient via iPSC. Somatic cells that are either mature, fully differentiated cells or are restricted in their ability to develop into a limited collection of cell types can be induced to become pluripotent, so that they exhibit higher differentiation capacity. This process is called reprogramming. It is not yet clear whether reprogramming will always equal dedifferentiation. The original, and most widely employed method to induce iPSC from somatic cells uses ectopic expression of the transcription factors Oct-4, Sox-2, and Klf-4, either with or without c-myc \[[@B1], [@B3]--[@B8]\]. However, concerns limiting clinical applications of patient-derived, that is, directly converted iPSC, include potential epigenetic differences between iPSC and ESC \[[@B9]--[@B18]\], and possible modifications of the genome by insertions and continued expression of the transcription factors that could affect the capacities of reprogrammed iPSC to properly differentiate. In our case of interest, we discuss some limitations to develop them into HSC and their differentiated hematopoietic cell lineages.
Several studies have improved the procedure of the generation of iPSC from a variety of different types of differentiated cells to find the most efficient method. In general, attempts to optimize both cell-intrinsic and exogenous factors to achieve optimal growth, survival, and differentiation requirements, first for the transfection phase and, thereafter, for the conversion from the differentiated cells to the iPSC have been made \[[@B1], [@B3]--[@B8]\]. Many studies exist showing that iPSC share the characteristic of ESC, that is, they can give rise to all cell types of a proper body, proven by the development of chimeric animals and teratoma formation \[[@B1]\]. However, these qualitative analyses do not provide information about the quantitative efficiency of development. Thus, to investigate whether iPSC can replace ESC to study development and for clinical applications, efficiencies of development are needed.
Here, we summarize our experience with Oct-4/Sox-2/Klf-4-transduced mouse embryonic fibroblasts (MEF), mouse bone marrow-derived (MBM) hematopoietic progenitors, and mouse fetal liver-derived preB lymphocytes in the *in vitro* generation of iPSC that show varying levels of continued expression of the transduced transcription factors in iPSC and in differentiating hematopoietic cells. These levels of transgenic expression relate to the potency of the iPSC to differentiate subsequently *in vitro* to hematopoietic cells.
Hematopoietic development from ESC and iPSC is one of the best-studied differentiation programs. Culture systems have been developed that allow the differentiation of hematopoietic lineages *in vitro* from ESC and iPSC \[[@B19]--[@B27]\] which we have attempted to optimize for myeloid, T, NK, and B cells \[[@B28]\]. However, the efficient development and maintenance of *in vivo* reconstituting HSC from ESC and iPSC remains challenging. For a clinically relevant procedure of generating transplantable HSC, first, the best type of differentiated cell for conversion to iPSC with the best cell-intrinsic and extrinsic factors have to be found. Thereafter, improved methods need to be developed to generate and stabilize the pluripotent, long-term reconstituting potentials of transplantable HSC.
2. Reprogrammed Somatic Cells as New Sources for the Generation of Hematopoietic Cells {#sec2}
======================================================================================
2.1. Step 1: From Differentiated Cells to iPSC {#sec2.1}
----------------------------------------------
Somatic cells were first reprogrammed by somatic cell nuclear transfer \[[@B29]--[@B31]\]. Later, lineage-associated transcription factors were identified within a pool of 24 pluripotency-associated factors that had the potential to reprogram adult cells into pluripotent cells upon retroviral transduction \[[@B1]\]. Thus, transduction of mouse fibroblasts with Oct-4, Sox-2, Klf-4, and c-myc-generated iPSC by selection for *Fbxo15* activation that expressed pluripotency markers, generated teratomas upon subcutaneous injection, and contributed to different tissues upon blastocyst injection \[[@B1]\]. Transcription factor-based reprogramming has been optimized, so that c-myc was omitted and cells were selected with reactivation of *Nanog* and Oct-4 as well as by checking the ESC-like morphology \[[@B4], [@B6], [@B8], [@B32]\]. Facts, hypotheses, and unresolved issues of cellular reprogramming \[[@B33]\] and the maintenance and change of epigenetic memory in iPSC \[[@B34]\] have recently been discussed extensively. As summarized by Hanna et al. \[[@B33]\], gene expressions and biological characteristics of iPSC may be influenced by genetic backgrounds (different strains of mice, healthy donor-derived versus patient-derived iPSC), incomplete or heterogeneous iPSC formation, additional or alternate reprogramming factors, and transgene-expressing iPSC.
In our experiments, we have used the method of retroviral transduction with three vectors that constitutively express Sox-2, Oct-4, and Klf-4, respectively, and in which the transcription factor genes are not excisable, for example, by cre/lox-mediated deletion. We have generated iPSC lines from MEFs, and MBM. All of our iPSC lines express ESC-characteristic markers and form teratomas *in vivo* \[[@B28]\].
Continued transgene expression in our iPSC lines at different levels, even throughout differentiation to hematopoiesis *in vitro,* appeared possible. When this was measured, a remarkable difference became apparent. All MEF-iPSC lines showed expression patterns of the three transgenic transcription factors that were hardly above those of the corresponding endogenous genes, while all MBM-iPSC lines showed a markedly higher expression of Oct-4,Klf-4 and Sox-2. It appears that a higher threshold expression of the three factors is needed to reprogram MBM-iPSC than MEF-iPSC.
Distinct differentiated cells need different culture conditions, for example, different stromal cells or other cytokines ([Figure 1](#fig1){ref-type="fig"}). While MBM-derived cells do not grow well in the iPSC condition without IL-6 and SCF, MEF do. This may contribute to our observations that the efficiencies of establishing MEF-derived iPSC are higher than that of MBM-derived iPSC in our experiments. This indicates that the establishment of iPSC is more difficult if the original somatic cells from which the iPSC are intended to be induced do not fit iPSC media conditions on MEF and LIF.
The tissue culture conditions for the transduction and subsequent *in vitro* conversion to iPSC appear markedly different. Thus, when we consider the changes that MEF proliferating in medium alone, compared with MBM proliferating in medium substituted with SCF and IL-6 have to undergo after viral transduction to become iPSC MEF should find it easier to continue proliferation and survival in LIF-substituted media. Maybe the higher expression of the three transduced transcription factors is favourable for the more difficult conversion of MBM to iPSC. Thus, we suggest that the ability of cells to grow in "iPSC selection media" might influence their efficiency to reprogram.
2.2. Step 2: From ESC and iPSC to HSCs and Mature Hematopoietic Lineage Cells {#sec2.2}
-----------------------------------------------------------------------------
For the differentiation of ESC towards several types of mature hematopoietic cells, two protocols have been developed---the formation of embryoid bodies (EB) that form in suspension culture and the co-cultivation of ESC with stromal cells. In the first protocol, ESC are allowed to grow in suspension in the absence of feeder cells and LIF, differentiate spontaneously, and form spheroidal aggregates mimicking embryonic tissues, so called embryoid bodies \[[@B35]--[@B38]\]. Cells within developing EB can differentiate to mature cells, including hematopoietic lineage cells \[[@B39], [@B40]\]. Hematopoietic progenitor cells, which have the tendency to exist as mobile, nonaggregated single cells, must be freed by dissociating procedures from these EB aggregates.
In the second protocol, cocultivation of ESC with pre-adipocytic stromal cells allows a two-dimensional differentiation into hematopoietic cells without the formation of those complex aggregated structures and, thus, an easier, gentle isolation of progenitors of hematopoietic development \[[@B21], [@B27]\]. Furthermore, the use of the M-CSF-deficient stromal cell line OP9 avoids premature differentiation to myeloid lineage cells and allows the development of T, NK, and B lymphoid cells \[[@B21]\]. In our *in vitro* differentiation experiments comparing ESC and iPSC \[[@B28]\]---the latter generated by retroviral transduction with Sox-2, Oct-4, and Klf-4---we did observe a reduced ability of iPSC-derived mesodermal-like cells to differentiate into hematopoietic progenitors in vitro. When Oct-4, Sox2, and Klf-4 were still highly expressed in the differentiating cells. The overexpression of Sox-2 appeared to be inversely related to hematogenic potency (data are summarized in [Table 1](#tab1){ref-type="table"}).
In conclusion, our experiments suggest---as those of others \[[@B41]\]---that expression of virally transduced genes must be terminated before the induction of differentiation. The three different transcription factors appear to impede hematopoietic development to different extents. While Oct-4 and Klf-4 appear to be tolerated at continuously elevated levels to generate at least progenitors and precursors of T, NK, B, and myeloid cell development, levels of Sox-2 need to be downregulable for hematopoietic development. From these results, it appears that overexpression of the transgenic transcription factors inhibits development of Flk-1^+^ mesodermal to CD45^+^ hematopoietic progenitors. Constitutive expression has been shown by others not to affect the development of iPS cells into cells of the hematopoietic system \[[@B42], [@B43]\]. We would expect from our results that the transgenic expression of the three transcription factors in their iPSC lines should be as low as that of our MEF-iPSC lines.
If normal mouse or human somatic cells are used for the generation of iPSC the viral vectors should be deletable \[[@B44]\] without mutagenic consequences or should be introduced as proteins \[[@B45]\] or as synthetic modified mRNA \[[@B46]\].
3. Generation of HSC from ESC and iPSC Still Needs to Be Improved {#sec3}
=================================================================
Even if the procedures for the generation of iPSC will eventually be faithful and efficient enough to yield cells with the same differentiation potencies as those of ESC the subsequent efficient generation of transplantable, reconstituting HSC derived from ESC and iPSC cells still has been difficult until today. Murine iPSC can be used to generate new mouse strains in which bone marrow should, in most cases, become the source of normal numbers of long-term reconstituting HSC. In contrast, human iPSC, obviously, can not be used for such an *in vivo*development of HSC. Hence, the development of human HSC from ESC and iPSC must be attempted by differentiation in tissue cultures. The most successful method to obtain HSC *in vitro* from ESC is to transduce the cells with HOXB4 \[[@B23], [@B25], [@B47]--[@B54]\].
However, such retroviral modifications generate cells in which the "per cell" hematopoietic potency is still inferior to the same number of unseparated total bone marrow cells. Furthermore, retrovirally transduced cells carry the risk of mutations which might lead to malignant transformations, for example, leukaemia in the case of HOXB4 \[[@B55]\]. A few studies have reported transplantations of non-HOXB4-transduced cells resulting in long-term engraftment of both the lymphoid and myeloid compartments, but none of them could reconstitute hematopoiesis in secondary transfers, \[[@B56]--[@B59]\]. The question remains which kind of progenitor is developed under these conditions.
It has been shown that yolk sac progenitors display minimal HSC potential \[[@B60]--[@B62]\]. In contrast, para-aortic splanchnopleura-derived cells can give rise to bone marrow reconstituting HSC which are capable of definitive hematopoiesis \[[@B60], [@B61], [@B63]\]. It might be that ESC differentiation *in vitro* generates only HSC capable of primitive, but not of definitive hematopoietic potency. That would explain the inability of ESC-derived hematopoietic progenitors to generate HSC with the capacity to develop into lymphoid cells upon transplantation. This possibility ignores the fact that ESC and iPSC can be differentiated into primitive, that is, erythrocytes expressing fetal-type haemoglobin, and definitive cells, that is, lymphocytes, *in vitro*. HOXB4 overexpression in hematopoietic cells derived from ESC and from yolk sac enables the detection of transplantable HSC \[[@B47]\] ([Figure 1](#fig1){ref-type="fig"}). Hence, HOXB4 works in two ways. One is to increase the number of transplantable HSC. The second is to make HSC transplantable by modifying the homing receptors. Therefore, the injection of hematopoietic cells from human ESC directly into the bone marrow results in the detection of repopulatable HSC \[[@B49]\]. In conclusion, we need to understand the molecular program that induces this switch in greater detail to induce the formation of long-term reconstituting HSC with definitive hematopoietic potential, as HOXB4 does, but without retroviral insertion.
Finally, nonhematopoietic cells provide niches in bone marrow for the proper hematopoietic differentiation that are yet to be defined, and that are missing in the culture conditions of differentiating ESC. Furthermore, long-term repopulating HSC that reside in the bone marrow are in a deeply quiescent (*G*~0~) state and lose engraftment potential during their *S*/*G*~2~/*M* transit \[[@B64]--[@B67]\]. The present tissue culture conditions favor proliferation of HSC candidate cells. The development of conditions allowing cells to enter into and survive in the *G*~0~/*G*~1~ phase would be another important step towards establishing HSC *in vitro*.
4. Conclusions {#sec4}
==============
Both stages of the *in vitro* development, first, from somatic, differentiated cells into iPSC and second, from iPSC into HSC are still so inefficient, even with murine cells, that the clinical use of human HSC derived from a patient\'s somatic cells are far from reality. It will need many more improvements at the various stages of reprogramming and differentiations of cells ([Figure 1](#fig1){ref-type="fig"}). Different somatic cell types represent different differentiation states, which have different growth abilities *in vitro*, different susceptibilities to be transduced by retroviral vectors and other yet unidentified factors, that make differently capable to become reprogrammed with different efficiencies. To allow effective reprogramming to iPSC, reversibly inducible or nonintegrative methods for reprogramming need to be used, since constitutive overexpression of reprogramming factors has been shown to interfere with differentiation. ES cells, and, to a lesser degree also, iPSC can be developed into all types of hematopoietic lineages in vitro. However, the reproducible generation of transplantable, engraftable HSC in vitro from pluripotent cells without overexpression of HOXB4 is still challenging ([Figure 1](#fig1){ref-type="fig"}).
The authors have no conflicting financial interests.
The studies were supported by a grant from the MPG to F. Melchers.
{#fig1}
######
Differentiation of MBM- and MEF-derived iPSC lines in comparison to ESC lines. Numbers of cells indicate those developed from 4 × 10^3^ undifferentiated cells (day 0). Expression levels represent amounts of mRNA determined by quantitative RT-PCR, normalized to GAPDH expression, and calculated as expression values of the respective genes in undifferentiated Bruce4 ES cells (day 0).
Cell line Number of Flk1^+^ cells on day 5 Number of CD45^+^ cells on day 10 Sox-2 expression on day 5 relative to Bruce 4 on day 0 Sox-2 expression on day 10 relative to Bruce 4 on day 0 Oct-4 expression on day 5 relative to Bruce 4 on day 0 Oct-4 expression on day 10 relative to Bruce 4 on day 0 Klf-4 expression on day 5 relative to Bruce 4 on day 0 Klf-4 expression on day 10 relative to Bruce 4 on day 0
------------ ---------------------------------- ----------------------------------- -------------------------------------------------------- --------------------------------------------------------- -------------------------------------------------------- --------------------------------------------------------- -------------------------------------------------------- ---------------------------------------------------------
J1 ES 2.7 5.5 1.3 0.2 31 0.2 480 1.7
Bruce 4 ES 3.2 23 0.5 0.04 41 0.08 32 0.04
MBM-iPS A 3.1 10 1.0 6.3 2600 120 3600 83
MBM-iPS C 2.2 0.1 18 1050 11000 2500 3700 700
MEF-iPS 1 2.6 7.3 16 21 12 56 3.2 5.8
MEF-iPS 5 4.0 18 45 71 0.65 70 22 5.6
[^1]: Academic Editor: Ken-ichi Isobe
| 2023-11-15T01:27:17.568517 | https://example.com/article/6377 |
2.
-2, x, u
Suppose 2*x + 13 = 3*c, -x - 17 = -3*c - 3*x. Suppose c = -s + 6. Put -2, -5, s in ascending order.
-5, -2, s
Let f = 0.2 - 0. Let z = -0.262 + -11.438. Let v = 12 + z. Put f, 0, v in ascending order.
0, f, v
Let r = 20 + 0. Let x = r + -20.5. Let j = 0 + 0. Sort -0.4, x, j in descending order.
j, -0.4, x
Let l be (-3)/(-84) - (-2)/(-7). Let g be (-2*1)/(24/18). Put l, g, 2/9 in ascending order.
g, l, 2/9
Let o(a) = a**3 + 2*a**2 + a - 1. Let m be o(-2). Let p = 15 + -7. Let w = p + -4. Sort m, w, -1 in increasing order.
m, -1, w
Let b = -2.3 + 2.7. Sort b, -2, -0.6.
-2, -0.6, b
Suppose 3*y + t - 3 = -4*t, 0 = -5*y + 5*t + 5. Let z = 172 + -172. Put 5, z, y in decreasing order.
5, y, z
Let o = 11 - 10.9. Let b = 0 + o. Let q be -3*(-1)/(0 + -4). Sort -0.2, b, q in decreasing order.
b, -0.2, q
Let z be (28 + -26)*4/(-2). Put 4, -29, z in decreasing order.
4, z, -29
Let a(k) be the third derivative of k**6/120 - k**5/10 + k**4/4 - k**3/2 - 4*k**2. Let m be a(5). Let f be 1/(1/(m/1)). Sort f, 0.4, 1.
0.4, 1, f
Let i(a) = -2*a + 24. Let g be i(12). Put g, 1, -2 in increasing order.
-2, g, 1
Let b be (-47)/9 + 8/36. Suppose 4 + 5 = -3*d. Let m = -1 - d. Sort b, m, -1.
b, -1, m
Let z(p) = p**3 + p**2 - 4*p - 3. Let g be z(-2). Let w = -1 + 1.4. Sort w, g, 4 in ascending order.
w, g, 4
Suppose -7*y - 13 = 8. Sort y, -1, -4 in decreasing order.
-1, y, -4
Let q(h) = -h**2 - 6*h - 1. Let k be q(-5). Suppose -3*v + 2*i + 12 = v, 0 = 3*v - 3*i - 12. Put v, k, -4 in descending order.
k, v, -4
Suppose -i - 4*t = 2, 0*i + 3*t = i - 5. Sort i, -5, 3 in descending order.
3, i, -5
Let s = 10408/5 - 2094. Let a = s + 64/5. Sort 4, -2/3, a.
-2/3, a, 4
Let c = 29 - 27. Suppose -3*u - 4 = -5*u. Suppose 2*g - u = 6. Sort g, c, 3 in descending order.
g, 3, c
Let g be 54/(-24) + 6/(-8). Sort -6, -5, -1, g.
-6, -5, g, -1
Suppose -2*b - 28 = 5*b. Sort 3/2, b, -0.4.
b, -0.4, 3/2
Let a be -3 - -3 - (0 - 0 - 0). Put -0.05, 1, a in increasing order.
-0.05, a, 1
Let y be 8/48*(-4)/(-1). Sort 1/9, -0.08, y in increasing order.
-0.08, 1/9, y
Let o = -12 + 8. Sort -3, o, -2 in descending order.
-2, -3, o
Let y(g) = g**3 - 2*g**2 - 2*g - 2. Let j be y(3). Suppose -1 = 3*v + b + 2, -v - 2*b - j = 0. Sort 1, v, -5 in ascending order.
-5, v, 1
Let o be (6/(-8))/((-6)/72). Let l be -2 - (-30)/o - 0. Put -4, -3/4, l in decreasing order.
l, -3/4, -4
Let v = -0.9 + 1.2. Let q be (-2)/6 + (-16)/(-12). Suppose -q = -s - 2. Put v, s, 2/9 in increasing order.
s, 2/9, v
Suppose -3*u = k + 5, 2*k - 11 = u - 0. Let x = k + -6. Let f(w) = -2*w**2 - 3*w - 3. Let p be f(x). Sort 1, 4, p.
p, 1, 4
Suppose -4*h - 29 = -5*z, 3*h + 17 + 6 = 4*z. Suppose -r + z*l = -0*r - 22, 5*r = -5*l - 40. Put 5, -1, r in ascending order.
r, -1, 5
Suppose 0 = -4*v - 7 - 21. Let g = v + 5. Put -3, g, 0 in descending order.
0, g, -3
Let c = 1 + 3. Let o be (0 - -25)*(-4)/4. Let n be (-2)/9 - o/(-9). Sort -4, c, n in ascending order.
-4, n, c
Let s = -3 - -5. Let x(d) = -d**2 + 10*d - 5. Let j be x(9). Put s, j, 5 in decreasing order.
5, j, s
Let s be -1*8/(-4)*1. Suppose 0 = r, 3 = -5*h + 3*r - s. Sort 1/5, h, 0 in decreasing order.
1/5, 0, h
Let t be (6/(-54))/(1/3). Suppose -c + 3*c - 14 = 0. Let h = c + -10. Put h, 2, t in increasing order.
h, t, 2
Let s = -14 + 9. Sort 2, s, 0.1.
s, 0.1, 2
Let a(s) = s - 2*s**2 - 3 - s**3 - 3*s + 1. Let c be a(-2). Suppose 0 = 4*u + 3*z + 12, 6*z - 2*z + 6 = -c*u. Sort u, 5, -4 in decreasing order.
5, u, -4
Let w = 48 + -7211. Let x = w + 42743/6. Let h = x + 39. Sort 1/4, h, -0.4 in decreasing order.
1/4, h, -0.4
Let d be 51/(-6) + (-2)/4. Suppose -9*m + 7*m = 4. Put d, -1, m in ascending order.
d, m, -1
Let s(h) be the first derivative of h**2/2 - 3*h - 2. Let o be s(6). Let t = -2 + 2.3. Put o, 1, t in ascending order.
t, 1, o
Let h = -2.1 + 1.2. Let b = -0.3 + 1.3. Let a = b + h. Sort -3, a, 2/13 in ascending order.
-3, a, 2/13
Suppose 5*g - 7 = -4*q, -16 = 2*q - 4*g - 0*g. Sort 1, -4, 3, q in descending order.
3, 1, q, -4
Let t(w) = -w**2 + 5*w - 1. Let p be t(4). Suppose -l = -z - 4*l + 8, -5*l + 16 = p*z. Let s be (((-6)/(-5))/(-3))/2. Put s, -2, z in decreasing order.
z, s, -2
Let g be (2 - 0) + (-1 - -2). Suppose 0 = -c - g*c + 2*u + 22, -4*u = 12. Suppose -3*h - 1 = -4. Put 0, c, h in decreasing order.
c, h, 0
Let x = -0.095 + -0.105. Let c be -9 + 3 + (-1 - -3). Sort c, 1/5, x.
c, x, 1/5
Let s = 2/17 - -11/51. Put 4/9, -5, s, -1/6 in increasing order.
-5, -1/6, s, 4/9
Let v(q) = q - 3. Let f be v(5). Suppose 2*g = -4, -3 = -5*u + 3*g + 3. Sort 5, f, u in descending order.
5, f, u
Let k be (7/5 - 1) + (-510)/150. Sort -5, 2, k, -4 in increasing order.
-5, -4, k, 2
Let y(m) = -m - 6. Suppose 12 = 3*b - 5*b. Let a be y(b). Put 1, -1, a in descending order.
1, a, -1
Suppose -l = 2*l + 3. Sort 3, 2/13, l in increasing order.
l, 2/13, 3
Let o(u) = u**3 - 10*u**2 - 12*u + 13. Let s be o(11). Let m be -5*(-2)/s - 2. Suppose -3*y = -0*y + 15. Sort y, m, 2 in descending order.
m, 2, y
Let u = -71.7 - -72. Put u, -0.1, 3 in ascending order.
-0.1, u, 3
Let p(m) = 2*m**2 - 42*m + 27. Let w be p(20). Sort -5, 0, w.
w, -5, 0
Let c = -2 + 3. Let s(v) = -5*v + 3 + c - 5. Let k be s(-1). Put -5, k, -2 in descending order.
k, -2, -5
Let p be (4/(-32))/(4 - 3). Sort 2, -0.1, p, -0.2.
-0.2, p, -0.1, 2
Let s = 7 - 6.9. Let w = 1 + -4/3. Sort w, -3, s in increasing order.
-3, w, s
Let x = 11 - 9. Let w = x - 3. Let l = w + 0.6. Put 1, l, 0 in increasing order.
l, 0, 1
Suppose 4*k = n + 12, 3*n - k = -5*k + 28. Let b(o) = o**2 - 5*o - 5. Suppose 2*q - 14 + 4 = 0. Let u be b(q). Sort 1, u, n in descending order.
n, 1, u
Let v = 11 - 14. Let g = 3 + -4. Let d = g - -1.2. Sort d, v, -2/7.
v, -2/7, d
Let g = 7 + -6. Let q = -4 - g. Put q, 1, 2 in increasing order.
q, 1, 2
Suppose 4*d - 7 = 5. Suppose -3*r + 5*r = 0. Let g be (-12)/4 + (-19)/(-7). Sort g, r, d in decreasing order.
d, r, g
Let a(b) = b + 19. Let x be a(-23). Put -2, 0, x, -1 in descending order.
0, -1, -2, x
Suppose 0 = -l - 0*l + 3*x - 12, 4*l - x = -15. Suppose 3*p - 4*p + 5 = 0. Suppose 2*r - p*j + 29 = 0, 0 = r + 2*j - 5*j + 17. Put -4, r, l in descending order.
r, l, -4
Suppose 3*m - 3 = 0, 19 = 4*b + 5*m - 6. Sort -2, b, -3.
-3, -2, b
Let h be (-10)/(-3) - (-1 - -13 - 9). Sort 0.4, 61, h.
h, 0.4, 61
Let b be 18/4 - (-3)/(-6). Let c = b + -6. Sort 0, c, -3 in descending order.
0, c, -3
Suppose 3*j + 4 - 1 = 0, -v + 2 = -5*j. Let k = 20 - 24. Let q(x) = 2*x**3 + 4*x**2 + 4*x + 3. Let y be q(-2). Sort k, y, v in descending order.
v, k, y
Let j = 0.1 - -0.2. Let g = -0.21 + 1.21. Sort g, j, 5.
j, g, 5
Let f be (-22)/6 - (-7 - (-22)/3). Let v be (2/6)/((-35)/15). Put f, -1/5, v in decreasing order.
v, -1/5, f
Suppose 2*v - 15 = -v. Suppose -12 = 7*a - 3*a. Suppose -3*f - 9 + 15 = 0. Sort a, v, f in descending order.
v, f, a
Suppose 0*g = g - 54. Suppose -g = -5*p - 14. Suppose 5*v = 4*b + p + 8, b = -2*v + 9. Sort b, -4, -3 in descending order.
b, -3, -4
Let v = 1934 + -68269/35. Let c = v - -82/5. Sort 0.3, -2/15, c in decreasing order.
0.3, -2/15, c
Suppose -19*q = -20*q + 4, 0 = 2*k + 4*q - 18. Suppose 0 = 4*h - 0*h + 12. Sort h, k, -5 in descending order.
k, h, -5
Let x be 1*(-1)/(-7) + 0. Sort x, 3/5, 4 in decreasing order.
4, 3/5, x
Let w = 11 - 8. Let t be 1/(-2)*(-2 + 0). Let y be (-5)/w + 0 + t. Put y, 0.5, 4 in descending order.
4, 0.5, y
Let a = -0.07 + 0.67. Let w = 0.93 + -0.03. Let v = a - w. Sort 5, v, 0.1.
v, 0.1, 5
Let w be (-4)/14 + 34/70. Sort 1/3, 2, w in decreasing order.
2, 1/3, w
Let u(v) = v**2 - 20. Let g be u(5). Let l = 28 + -17. Let c = -8 + l. Put g, c, -0.2 in increasing order.
-0.2, c, g
Let r be (-4)/6 - 14/6. Let v(k) = -k**3 + 14*k**2 - 13*k - 3. Let z(u) = -1. Let b(c) = -v(c) - 2*z(c). Let h be b(13). Sort -5, h, r in increasing order.
-5, r, h
Let x be (1 - (-6)/(-14))/(102/21). Put 5, 0.3, x in ascending order.
x, 0.3, 5
Let h(q) = -q**3 + 9*q**2 + 4. Let u be h(9). Let x = -0.1 + 0.1. Put x, -0.3, u in decreasing order.
u, x, -0.3
Let t be 1/(-8) - 5/(-40). Sort t, -4, 17 in decreasing order.
17, t, -4
Let g = -15 + 17. Sort -19, g, -2.
-19, -2, g
Let d = 0.49 - 0.09. Put -3/2, -3, -1, d in decreasing order.
d, -1, -3/2, -3
Suppose 4 = i, 8 = -s + 3*i - 6. Suppose 0 = 4*v - v | 2024-02-21T01:27:17.568517 | https://example.com/article/7194 |
Note : All characters portrayed in this story are over 18 years of age.
This story takes place in the near future in a world where sex-related disputes, such as adultery, incest, voyeurism, exhibitionism, and other sexual misconducts that don't involve other physical violence are judged in a special court. The defendant and the plaintiff, each represented by a specialized attorney, confront each other trying to prove or invalidate the accusations. The process normally involves sexual activity in front of the audience in order to obtain pieces of evidence, thus the special nature of this court. Also, the penalties, if any, are always sex-related, and don't include fines or confinement. Finally, the hearings are recorded on camera, and broadcast live on television and on two giant monitors in the court, to allow the people present to see everything in detail. These hearings, due to their heavy sexual content and voyeur tendencies, draw massive audiences, and equally massive controversy. Because of all this, people who are brought to trial here often see their lives changed forever.
Now, the story of Audrey Saunders.
*
Audrey was way past the point where she wondered why this was happening to her. All she could think of now was what kind of ordeal she was going to have to go through. Though the trials were broadcast live on television, she had never watched one, thinking it lacked decency. So she didn't really know what to be expecting. Her attorney had told her she would probably be put through humiliating situations to prove her innocence, but she didn't know how far it was going to go. Audrey was a 26 years old teacher who taught french at South Lake, and was standing in court accused of having had illicit sexual relations with one of her students. This student, Bud Chadwick, was standing as the plaintiff, claiming she had threatened to give him bad grades if he didn't respond positively to her attempts at seducing him. In reality, his bad grades were fully deserved, and the whole accusation was a perverse game of his, with the objective of abusing his attractive teacher, and humiliating her. This wasn't very rare in these trials, but few knew about it because usually no one besides the defendant cared to look into the matter and expose the fallacy of the accusations.
She was sitting next to her attorney, on the left half of the hemisphere that formed the courtroom. On her right were Chadwick and his attorney. Behind and around them, there was an audience of approximately 200 people. Facing everyone, two meters higher, there was Judge McKinley. Below him, two strong men were standing still, facing the audience. In the middle of the room, between the judge's desk and the attorneys and their clients, was an empty space of roughly ten meters. There were two giant monitors in the room. One was on the wall behind the judge, facing the audience, and the other one was behind the audience, facing the judge and the two men. Right now, the camera was filming the judge as he bent to his microphone.
"How will the prosecution prove that miss Saunders had sexual relations with mister Chadwick?"
Bud's attorney stood up to answer :
"We will provide information regarding miss Saunders' intimacy, that my client could only have had by seeing her naked and engaged in sexual activity."
Judge McKinley nodded and invited Bud to stand as a witness.
"Please stand up, mister Chadwick, the court will now hear your testimony. What information du you have for us?"
"First of all, your honor, I can tell you her pussy... I mean, her sex, is shaven."
Hearing this made Audrey jump. "How the hell does he know that?" she thought. "Is he just guessing? He seems pretty sure..." The judge turned to her.
"We will now verify this information. Miss Saunders, please stand up and move to the center of the room."
Her heart missed a beat as she realized what was going to happen. Audrey always displayed dignity, and was used to dressing in a rather strict manner at school. Everyone found her attractive, but her general behavior and the way she dressed were always modest, self-respecting and never provocative. She also wasn't one to sleep with any man, and few were the men who had ever seen her naked. The thought that everyone in the room and all the TV viewers would soon see her without clothes was terrifying. She quickly realized that her colleagues and friends were following the trial from home, as well as her family. She briefly thought about her younger brother who had always tried to catch glimpses of her naked when she got out of the shower or changed her clothes at her parent's house. Up to now she had escaped his prying eyes. Then she thought about all her students. Knowing how they were, and how attractive they found her, she had little doubt that all of them were home with their eyes glued to the screen right now. She blushed at the thought of all her students seeing her naked. It was only now that she was confronted with humiliation that she realized how many people were watching the hearing. She tried to find a way to avoid what was coming. She swallowed her pride, then stood up and said to the judge :
"Your honor, there is no need to verify this information. I confess that my sex is shaven."
"Miss Saunders, we are here to verify affirmations with facts, not the other way round. Now, please move to the center of the room."
Resigned, Audrey did as she was told. As she arrived at the designated place, one of the two men made a small gesture to tell her to turn and face the audience. She saw the judge's face on the giant monitor, and his words clattered like a death sentence :
"Now, miss Saunders, please remove all your clothes."
The picture on the screen now displayed her own face, and it was clearly visible how frightened and embarrassed she was. People who knew her had never seen her like that. She was always proud and confident, without being haughty. At school, she was seen as a figure of authority. And now she felt so small and vulnerable. Everyone in the room was staring at her. She imagined how many more people were looking at her through the camera. Bud had a vicious look in his eyes that had little consistency with his accusations ; he was clearly not a victim here. But, as he knew, no one was looking at him right now. Seeing that she was not moving, the judge called to the two men who were standing below him, on both sides of his high desk :
"Since miss Saunders isn't cooperative, gentlemen, please help her remove her clothes."
The two men approached her from both sides. Within seconds the first one was unzipping her grey skirt, while the other unmade the buttons of her white blouse. Audrey didn't resist, partly because she couldn't stop them if she wanted to, and partly because she was too petrified to move at all. One of the men was now pulling down her skirt, and the second one removing her blouse. They weren't brutal but moved with confidence, without eagerness. They had obviously done that many times before. The crowd watched, enthralled, as her clothes were swiftly pulled from her. Audrey passively lifted one foot after the other to help remove her skirt, and was now standing in her underwear. She blushed and twitched as she felt the cold fingers of the men on her back and her hips. One was unclasping her bra while the other slid his indexes on the sides of her panties.
Bud had his teacher exactly where he wanted her. So far everything had played out as planned. He thought : "isn't she so cute in her pink little bras and panties!" Audrey was 5.5ft tall, and blessed with a slender body that was drawing away the breath of the entire audience. Her long brown hair outlined her equally beautiful face, though at that moment her expression wasn't exactly winsome. Through the thin glasses she was wearing, she was looking at the floor, trying to avoid the lustful stares of all the men around her. The women were looking, too, some of them jealous of her assets. Almost drooling, Bud was thinking : "Come on, show everyone your cute tits and your little pussy!" He had no trouble concealing the painful bulge in his pants, as all the seats in the room were purposely designed to hide the lower body of their occupants.
She closed her eyes for a second as her bra went loose and fell before her, revealing her breasts to the crowd. At the same time, she felt the cold fingers on her hips sliding along her shapely legs, bringing with them her panties, removing what was left of her dignity. She stood there naked in front of thousands of people washing away with their shameless stares her last bits of intimacy. The giant screens were showing her body in all its nakedness. After a while, the picture zoomed in on her sex. As bud had said, it was shaven. Audrey thought briefly about the people watching her from their house. Surely some of them were already masturbating while looking at this close up of her sex. She felt degraded at that thought, and was now hoping she could get her clothes back and be done with this. She didn't really think about the implications, or the outcome of the trial. She just wanted what was happening right now to be over. Bud's attorney stood up and declared with a seemingly detached tone :
"Please add to the file that miss Saunders' sex is indeed shaven, as stated by my client."
"I can see mister Chadwick's declaration was accurate, thank you. Now, mister Chadwick, I believe you had further elements to share with us, besides what we can all already see?"
"Yes, your honor. I can tell you that miss Saunders is a squirter."
"Can you clarify for the rest of the audience?"
Bud's attorney answered like a schoolboy reciting his lesson :
"A "squirter," to use my client's words, is a woman that squirts transparent and odorless liquid in variable quantity during intercourse, usually when she reaches orgasm. This is also called female ejaculation."
Bud added :
"She squirts when she reaches orgasm. A lot."
The words resounding in Audrey's head shook the very foundation of her sanity. She couldn't believe the words that had just come out of Bud's mouth. She felt she was about to faint right in the middle of the courtroom. At the same time, she was shocked to hear that said so openly and publicly about her, and by the fact that it was actually true. In her panic, she wondered how Bud could possibly know about that. But soon another thought chased the question and chilled her to the bone : what was going to happen now? The judge spoke :
"The court will now verify this new information. Miss Saunders, there are several ways we can do this : either you will masturbate in front of this audience, or you can request to be masturbated by someone else. If you find it more appropriate, we can also provide a dildo operated by a machine. Either way, you will have to reach an orgasm."
Audrey's mind refused to accept what she had just heard. She just stood there, staring bewildered at the floor, her mouth slightly open. Bud, on his side, was boiling with excitement. "So far, so good," he thought. He had spent a week going to his teacher's house every night and spying on her, trying to catch her in an intimate moment. He knew any information he would give at a trial would be taken as evidence, because no one would try to find another explanation. After seven nights looking discreetly through her window, he had finally gotten what he wanted. On the first day, he already knew she liked to sleep in the buff. In fact, she seemed to always sleep naked, and, in the heat of summer, without anything to cover herself. He'd thought : "Little bitch, you like pretending you're all prudish when we're around!" He had thoroughly enjoyed looking at her body, watching her breasts move ever so slightly as she breathed deeply, and even when he knew he wouldn't get anything new, he just stayed at her window, admiring the perfection of her figure, often silently masturbating at his sleeping teacher. Of course, in the morning no one would notice the drops of sperm on the ground beneath her window. Finally, after seven days of spying on her, he finally saw something he could use in court : she had just gotten out of the shower, and had let her towel drop to the floor. She had then grabbed a dildo from her cupboard and masturbated with it. What he saw when she came was what he had just said to the judge.
After a while, Audrey finally managed to articulate :
"I... will... I'll masturbate."
So many thoughts were rushing through her mind right now, she couldn't make out anything clear. Several men brought in a heavy chair and placed it in the middle of the room. It looked like an obstetric table, with legrests and armrests. They were all padded in black leather. One of the two men who had undressed her took her by the hand and led her to the chair. She followed without saying anything, and sat. He lowered the backrest to about 30 degrees. Then the man removed the shoes Audrey was still wearing, leaving her with only her glasses, and placed her feet in the footrests. Doing this spread her legs, and she started blushing again when she felt the cold air of the courtroom brushing against her feminity. Once she was in place, he raised the footrests. She felt like she was back at the gyn, about to be examined. Except there were about two hundred people in the room, and right now most of them had their eyes on her sex. When he raised the footrests, Audrey had had to bend her legs and pull up her knees back to her chest. In this humiliating position, her vulva was wide open for everyone to see, her labia spread, showing her clitoris and the entrance of her vagina. She could hear faint voices from the audience. They all stopped when the judge spoke.
"You are now in position. You can start masturbating. And remember, don't stop until you reach orgasm."
Though Judge McKinley was behind her, she could see him talking through the huge monitor that was right in front of her. A second after he finished speaking, the view on the screen shifted to her. She realized how exposed she was. The camera zoomed in to bring a closer view of her opened womanhood. The detailed close-up left very little to imagination. Aware of what was expected of her now, Audrey slowly brought her right hand to her sex. She closed her eyes when she saw her own hand on the monitor. She was all dry because she wasn't the slightest bit excited. But she thought there was no way of reaching climax if she wasn't. So she tried to block out everything around her, and imagined she was alone, at home. With her fingers, she slowly caressed her inner thighs a few times, all the way from her knees to her pelvis. It felt nice and helped her get started. After about twenty seconds, she felt the first signs of arousal. As she continued caressing her thigh with her left hand, she rested the palm of her right hand on all the length of her awakening womanhood, and started a slow, circular motion.
She could feel her clitoris slowly growing under her hand. She continued this motion for a while, and began to feel some wetness inside her. Her hand still resting on her crotch, she reached with her middle finger and her ring finger for the opening between her labia, and in a single motion, coated them in the hot juice that had begun lubricating her. She then parted her middle finger and her ring finger, and applied her natural lubricant on both sides of her still growing clitoris. She moved her hand up and down, the two fingers gliding around her clitoris. It was finally fully erect. Audrey reached the inside of her vagina with her middle finger, once again coating it with her juices, which she then used to lubricate her clitoris. It was now very sensitive, and glistening with the juice of her arousal. She started rubbing it in a circular motion, slowly at first, but increasingly fast after a few seconds. Her breath was becoming heavier.
The two giant monitors were displaying her intimate performance in full detail. By now, many men in the audience were discreetly touching themselves, though it was hard to tell which ones. Bud was among them. He just couldn't help it. He had waited for this. He had dreamed about it. His hand had slipped inside his jeans and he was gently rubbing the tip of his penis, which was all wet with precum. His mind was full of dirty thoughts. "That's it, miss Saunders! Show us how you fuck yourself! I want to hear you scream in the sweet agony of your pleasure!" Thousands of people were watching her from their homes. As Audrey had suspected earlier, her younger brother, Kevin, was among them. Alone in his room, he was bent forward, to get as close to the screen as possible. This was way more than he had ever seen before. His sister had thought she had never been caught naked, but she didn't know of the times he had left a small camera in the bathroom or in her bedroom. He had masturbated many times to these videos of his beautiful sister showering or undressing, and had even shared them with some friends, and she never knew. But this was different. She was now actively pleasuring herself. His pants at his knees, he grabbed his erect member and started stroking it fast. That's when he heard her : her eyes closed, her cheeks red and her head turned to the side, her slightly opened mouth let out a soft moan. Her fingers were now moving towards her inner labia. She delicately parted them, and then eagerly buried her fingers inside her craving womanhood.
In the living room, Audrey's father, John, was also watching. She hadn't suspected this, or at least hoped he wouldn't watch. But there he was. His wife, Audrey's mother, would have probably killed him right there and then if she had seen him, but she was on a trip to Europe. John felt incredibly guilty about this, but he couldn't help it. For years, he had had incestuous thoughts about his daughter, but had always managed to seal them off. But this was too much, she was practically being offered to him. His hand was no longer his to control when it slipped inside his pants and grabbed his fully erect penis, before pulling it out, freeing it from its restraints. He started stroking it at the same rhythm as his daughter was fingering herself. With her left hand, she was now actively groping her left breast. Now and then, one could hear a soft moan escaping her lips.
While deep inside her she felt the utmost humiliation, she tried to block everything out. What she didn't realize was that most people weren't seeing her as degraded. On the contrary, they were subjugated by the glory of her exposed feminity, and in their excitement, were all praying they could touch her, if only with the tip of their fingers. In his room, Kevin was now on his knees right in front of his television, his right hand stroking furiously his penis while his left caressed the picture of his sister's open vagina on his screen. Back in the courtroom, Audrey reached for her sex with her left hand and coated her fingers with her juice, and gently applied it on both her erect nipples with circular motions. She did this a few times, each time broadening the area she was covering with her hot fluid. After a while, her left hand went down to stimulate her clitoris, while she kept fingering herself with her right hand. She felt a familiar tingling sensation when she touched her clitoris. She could feel an orgasm was beginning to build inside her. She began to accelerate her movement, letting out several small moans in the process. Everyone watched intensely as she began moving her pelvis faster and faster. Her breasts, still glistening with her love fluid, began bouncing on her chest rapidly, and her hands were now moving very fast. With each pelvic thrust her back seemed to arch a bit more. Audrey let out a long moan that emptied her lungs. As she inhaled, her left hand went back to her chest to resume groping her left breast, this time with much more intensity. Her right hand was now moving in and out of her vagina so fast the move was hard to follow, bringing her ever closer to the edge. Finally she felt her body explode, ecstasy filling her being. One last long moan escaped her lips, louder this time, as her orgasm invaded her, soon followed by screams of pleasure. In his room, Kevin could not hold it any longer, and ejaculated on the carpet as he watched his sister riding the waves of her intense pleasure. In the living room, his father was still masturbating furiously, hypnotized by the glorious beauty of his magnificent daughter as she let go of all her inhibitions in a moment of absolute bliss.
| 2024-03-17T01:27:17.568517 | https://example.com/article/2637 |
RALEIGH, N.C. – After approximately 150 protesters from the Forward Together Moral Movement flooded the North Carolina General Assembly rotunda on Wednesday, 10 participants were arrested and jailed upon their refusal to vacate the building. While four of these demonstrators – including North Carolina NAACP president Rev. Dr. William J. Barber, II – had planned to refuse bail and remain in detention overnight, all 10 arrestees are expected to be released from jail on Wednesday night.
Unlike the procedure followed in previous arrests from 2015 “Forward Together” rallies, magistrates at the Wake County Detention Center decided not to issue secured bonds to most of Wednesday night’s arrestees. Because most participants were issued unsecured bonds, unlike previous weeks, they were released without having to post bail.
The protesters were charged with violating the fire code, second-degree trespass, and violation of the General Assembly building rules.
“We were planning to stay in jail overnight as an act of defiance against being arrested in the first place, unconstitutionally, based on the sound or volume of our voices,” Rev. Dr. Barber said, following his release. “We will continue to fight these charges that attempt to limit how loudly we can express our First Amendment rights. We will also continue to challenge our legislature, which wants to make it easier to buy a gun than to vote.”
Wednesday’s demonstration was one in a continuing series of “Moral Monday” protests, which were initiated in 2013 in response to an avalanche of extreme policies pursued by Gov. Pat McCrory and the General Assembly. This week’s protest focused on opposition to H.B. 589, North Carolina’s sweeping voter suppression law. Among other changes to North Carolina’s voting system, the measure shortens the early voting period by a full week, bans same-day registration, requires strict forms of photo ID to vote, prohibits ballots cast out of precinct from being counted, expands the ability to challenge voters, and ends a voter pre-registration program for 16- and 17-year olds.
The North Carolina NAACP is the lead plaintiff in a major voting rights lawsuit against H.B. 589. The case, which goes to trial on July 13 in Winston-Salem, challenges the discriminatory measure under Section 2 of the Voting Rights Act. Coinciding with the first day of the trial on July 13, the Forward Together Moral Movement will also convene a march for voting rights in Winston-Salem, under the heading: North Carolina is Our Selma.
Photo: Rev. Barber (in red sash, toward right) leads protesters toward the North Carolina General Assembly building. | Chris Seward/AP & The News Observer | 2023-10-27T01:27:17.568517 | https://example.com/article/3448 |
.entry
%div.title-container
%p.entry-title Project
%div
%span= t("audits.name")
%span= @history.auditable.name
%div
%span= t("audits.client")
%span= @history.auditable.client.name if @history.auditable.client
%div
%span= t("audits.description")
%span= @history.auditable.description
%div
%span= t("audits.budget")
%span= @history.auditable.budget
%div
%span= t("audits.billable")
%span= t("boolean.#{@history.auditable.billable}")
%div
%span= t("audits.archived")
%span= t("boolean.#{@history.auditable.archived}")
= render partial: "audits"
| 2024-05-04T01:27:17.568517 | https://example.com/article/7018 |
SlNAC2 overexpression in Arabidopsis results in enhanced abiotic stress tolerance with alteration in glutathione metabolism.
Plant NAC (NAM, ATAF, and CUC) transcription factors (TF) have important roles to play in abiotic stress responses through activation of a battery of functional genes/transcriptional regulators responsible for stress tolerance. Here we report the cloning of a novel Solanum lycopersicum L., NAC2 TF having 960 nucleotides long CDS (GenBank: KT740994.1). Phylogenetic analysis depicted the similarity of SlNAC2 to other orthologs. SlNAC2 was overexpressed in Arabidopsis thaliana to assess and characterize its role in plant abiotic stress responses. The transgenic events were first confirmed by genomic DNA PCR and qRT PCR; then the T3 generation plants were used for stress assays. Soil stress assay depicted better survivability of the transgenic plants under both salt (NaCl) and drought (PEG) stress. The transgenic plants showed enhanced endurance; with better antioxidative response, reduced accumulation of reactive oxygen species (ROS) molecules and better retention of water in tissue. This study for the very first time analyzed the different stakeholders of the glutathione metabolism in SlNAC2 overexpressing transgenic lines on exposure to both salinity and PEG stress. The expression of the two genes (ɤ-ECS, GS) responsible for glutathione biosynthesis increased with SlNAC2 overexpression. Further glutathione reductase responsible for reduction of glutathione disulfide (GSSG) to glutathione (GSH) also increased significantly which suggested the regulation of glutathione metabolism as a mechanism for the osmotic stress tolerance conferred to plants upon NAC overexpression. | 2023-09-26T01:27:17.568517 | https://example.com/article/1477 |
Adding to the tension: the central bank’s wiggle room is limited. Its key interest rate, the one it charges commercial banks for its regular loans, is at a record low of 0.25%. The rate it pays on overnight deposits is zero. A move into negative territory would be unprecedented and could bring unexpected results. Other possible measures may include steps to increase the amount of surplus cash in the financial system to keep a lid on money-market rates.
European Central Bank President Mario Draghi.
Reuters
So what does everyone think? Here’s a newly updated rundown of what investors and analysts are saying ahead of the interest-rate announcement at 0745 ET and the press conference that begins at 0830 ET.
Andrew Bosomworth, portfolio manager at PIMCO
We think the ECB will again keep all policy-levers unchanged at Thursday’s meeting while emphasizing the fragile recovery and signaling a readiness to ease further if needed. The ECB has been very transparent as to how it will react to either an unwarranted tightening of financial conditions or an unwelcome negative shock to the inflation outlook. The pertinent question is what likelihood of these negative events, or a third, a strengthening of the recovery, unfolding over the policy relevant time horizon?
Sandra Holdsworth, fixed income investment manager at Kames Capital
The difficulty that the ECB faces is that interest rates are already very low. Cutting the deposit rate below zero would be a big leap while there are also doubts over the efficacy of certain non-standard measures. If you look at recent economic data in the euro-zone, there has been more improvement so the ECB may decide to keep interest rates unchanged for now. Liquidity in money markets has been a concern and the ECB may take steps to address this issue rather than cutting interest rates.
Markets are increasingly moving towards pricing some form of policy action by the European Central Bank as concerns over possible deflation in the euro-zone have risen but I am not so convinced that the ECB will act on Thursday. We’re still in an environment of economic improvement in the euro-zone and countries have also found it easy to refinance their debts.
Guillaume Menuet, economist at Citigroup Global Markets
The fall in euro area flash January harmonized index of consumer prices increases the pressure on the ECB. But we believe that the Governing Council is unlikely to announce a cut in its refi rate just yet, preferring to wait for the March meeting to review its macroeconomic forecasts and whether its monetary policy stance needs adjusting. We still forecast that the ECB will cut the refi rate to 0% and the negative deposit rate to -0.1% in 2Q. But with a modest rebound in economic activity and reduced fragmentation, the timing is uncertain.
We expect the ECB to wait for the March staff forecast update before taking decisions. The risks of course lie to the dovish side, with many in the market now hoping for action today, in the form of a small refi rate cut (10-15 basis points) or the Securities Markets Programme sterilisation rate (currently capped at the refi rate) or a temporary interruption of SMP sterilisation. Those however aren’t bazookas. They would trigger a limited reaction, with both the euro and country spreads contracting slightly, on signs that the ECB is still willing to deliver further easing.
We forecast a 15bps cut in the main refinancing rate to 0.1% combined with a 10 basis points cut to -0.1% in the deposit rate, implying that the ECB could effectively start to charge banks for holding excess liquidity. A negative deposit rate would have a very strong signaling effect, besides its effect on the euro exchange rate, demonstrating that the ECB was ready to explore uncharted territory, but it would come at a heavy political cost in Germany and other core countries shortly before EU elections and Germany’s constitutional court ruling on the ECB’s Outright Monetary Transactions.
We think the ECB will ease the refi rate to 10 basis points. Even if the ECB does not ease – Draghi is likely to be super-aggressive on the language, in order to make it clear that the ECB is ready willing and able to react. We do not expect the depo rate to be cut. The costs versus benefits are not seen as so persuasive as yet – and perhaps one of the messages from Draghi’s interview in Davos is that the deflation fight is done via quantitative easing rather than negative rates.
The market chatter on imminent ECB action this week appears misguided. Admittedly, monetary developments have been poor with credit contraction accelerating in December and inflation matching the post-crisis low of 0.7% in January. However, more forward-looking indicators such as Eurozone PMI have been painting a much more upbeat picture. In addition, money market tensions have most recently eased significantly while the euro is at roughly similar levels as in the run-up to the ECB December inflation forecasts.
We think the most likely scenario is that the ECB chooses to bring the refi rate down to 0.1%. This could have a positive impact on inflation and, at the same time, help to push short-term money market rates down. We think the ECB will keep the deposit rate on hold on Thursday. The Governing Council may also consider using non-standard measures. The most plausible instrument would be to stop sterilising SMP bond purchases. This would add almost €180 billion ($244.8 billion) to excess liquidity and should thus reduce money-market tensions and help to lift inflation.
Interest rate strategists at RBC Capital Markets
Our call is – and remains – for a March announcement, but the ECB Governing Council under President Draghi’s tutelage has shown a remarkable alacrity for acting sooner rather than later. Consequently, there has to be a considerable risk that the rate cut we have in place for March instead comes as soon as this Thursday. We look for a dovish press conference with a Q&A that is likely to see a wider-than-usual range of questions – spanning not only the euro area’s economic outlook, but also how policymakers view money market conditions, recent volatility in emerging markets, and the details of the looming bank stress tests.
We continue to believe that the ECB will remain on hold in the short term as: 1) soft inflation prints were already expected in the first part of the year, and the downside surprise remains limited; 2) recent volatility of EONIA (euro overnight index average rate) fixings has proven to be temporary thereby reducing the need of an ECB response; 3) emerging market spillover is expected to remain modest on developed markets’ macro outlook. | 2024-06-07T01:27:17.568517 | https://example.com/article/8943 |
But how surprised and concerned should Cameroonians and the international community actually be about what’s happened since Sunday’s election? I asked Cameroonian political science professor Landry Signé to help make sense of what just happened in the nation’s elections. Here’s what you need to know:
AD
AD
Kim Yi Dionne: Analysts expect President Paul Biya (of the ruling CPDM party) to win reelection for his seventh term in office. Still, Cameroon Renaissance Movement party candidate Maurice Kamto proclaimed Monday to have won the election. What should we know about Kamto’s claim?
Landry Signé: First, even some voices from Kamto’s coalition believe Biya to have received more votes than Kamto. Second, in addition to the government, other key opposition parties have condemned Kamto’s proclamation — largely because it is prohibited to self-proclaim results. Finally, we might interpret Kamto’s action as a strategy to gain more international attention, put pressure on the incumbent and gain more legitimacy nationally in order to be perceived as the main voice of the opposition — and the most credible alternative to President Biya.
K.Y.D.: Even setting Kamto’s claim aside, should there be concern about the fact that it’s been five days since the polls closed and the elections board still hasn’t released the results?
AD
AD
L.S.: Electoral law in Cameroon actually gives the institutions in charge of elections up to 15 days to announce the results. Even if this period seems long, it is consistent with previous elections and the rules regulating electoral administration in Cameroon. This period cannot be circumvented except through legal proceedings that would have had to occur before the election.
K.Y.D.: But there have been reports of election irregularities in the elections, right?
L.S.: Yes, observers noted there was unbalanced media coverage of candidates (Biya received three times more coverage than any other presidential candidate), issues with voters having the resources they need to cast their votes, and there were allegations of interference with the electoral process on Election Day. But this is not surprising: Cameroon has a long history of imperfect elections, and it is difficult to change old habits.
AD
AD
To be sure, I’m not saying the instigators of irregularities should get a pass, but the extent of incidents is not significant enough to affect the final outcome. Even without these irregularities, Biya would still win.
K.Y.D.: Why do you think Biya would still win?
L.S.: This is largely explained by a very good but divided opposition. With so many good candidates this year, they have managed to divide the popular vote.
In addition, an area where Biya would have received the least support had very low turnout. Voter turnout in the Anglophone regions was quite low, given a separatist crisis. Separatists in the northwest and southwest regions clashed with state forces in the period leading up to the election and on Election Day, causing many to avoid going out to vote.
AD
Even without a divided opposition and without the separatist crisis, an opposition victory would have still been unlikely. Only 50 percent of eligible Cameroonians registered to vote, and registered voters tend to be pro-CPDM (the ruling party). Furthermore, CPDM’s resources and organizational capabilities are unmatched.
AD
K.Y.D.: I know it’s still early, but does this election leave you resigned or hopeful?
L.S.: I’m actually optimistic about Cameroon’s democratic future. The number of good opposition candidates, the realization of the importance of registering and voting, as well as the current debate on policy options that each candidate has to create a better future for Cameroonians, are giving hope that a transition may be less far off than we think and may possibly happen at the ballot box. There are also emerging voices within CPDM that are advocating for the renewal of the political elite through democratic means. But, if there is really an interest in seriously challenging the CPDM, the opposition will have to come together to mount a successful challenge. | 2023-12-25T01:27:17.568517 | https://example.com/article/7926 |
New US law would force the federal government to treat marijuana like alcohol
On Thursday, March 30, 2017, a new set of bills was introduced in the U.S. Senate and House that would drastically reform the way marijuana is regulated at the federal level and allow state-legal marijuana programs to move forward without federal intervention.The bill was Introduced by Sen. Ron Wyden and Rep. Earl Blumenauer, the legislative package would remove marijuana from the Controlled Substance Act’s list of most dangerous drugs and set up a federal framework for regulating it.
The lawmakers say this would close the gap between federal and state-level marijuana policy, keep people out of jail for minor drug offenses and allow marijuana businesses to thrive.
“As more states follow Oregon’s leadership in legalizing and regulating marijuana, too many people are trapped between federal and state laws, it’s not right, and it’s not fair” Blumenauer said in a statement.
On Thursday, March 30, 2017, a new set of bills was introduced in the U.S. Senate and House that would drastically reform the way marijuana is regulated at the federal level and allow state-legal marijuana programs to move forward without federal intervention.
The bill was Introduced by Sen. Ron Wyden... | 2023-10-21T01:27:17.568517 | https://example.com/article/4141 |
Suze Morrison
Suze Morrison is a Canadian politician, who was elected to the Legislative Assembly of Ontario in the 2018 provincial election. She represents the riding of Toronto Centre as a member of the Ontario New Democratic Party, and is the Ontario New Democratic Party's Caucus Critic for both Housing and Women's Issues.
Background
Of mixed European and Indigenous heritage, Morrison was born in the Parry Sound District before moving to Toronto in childhood. She took her B.A.A degree in media studies from Guelph-Humber, and has worked in communications and public relations in the non-profit sector. She first became prominent within the riding as an advocate for community safety after witnessing the drive-by shooting of Lemard Champagnie in Toronto's Regent Park neighbourhood in 2017.
Morrison is a motorsports enthusiast, and competes in autocross events. She is a two-time winner of the Lorna Wilson Ladies Championship, which is awarded by the Western Ontario Sports Car Association.
Politics
During the election campaign, she participated alongside Liberal MPP Steven Del Duca and Progressive Conservative MPP Lisa Thompson in Election Brew, a non-partisan event sponsored by Equal Voice and Labatt to increase citizen engagement in politics through a friendly competition to create craft beer brews; Morrison's beer, an India pale ale, won the competition.
She was one of three MPPs of Indigenous heritage elected in 2018, alongside caucus colleagues Guy Bourgouin and Sol Mamakwa.
She serves as a member of the Standing Committee on Public Accounts, and as the official opposition critic for housing and women's issues.
Electoral record
References
Category:Ontario New Democratic Party MPPs
Category:21st-century Canadian politicians
Category:21st-century Canadian women politicians
Category:Living people
Category:Women MPPs in Ontario
Category:Politicians from Toronto
Category:First Nations women in politics
Category:University of Guelph alumni
Category:1988 births | 2023-10-12T01:27:17.568517 | https://example.com/article/7552 |
// Copyright 2015 The Neugram Authors. All rights reserved.
// Use of this source code is governed by a BSD-style
// license that can be found in the LICENSE file.
package ngcore
import (
"fmt"
"io"
"os"
"path/filepath"
"sort"
"strings"
"neugram.io/ng/syntax/shell"
"neugram.io/ng/syntax/token"
)
func (s *Session) Completer(mode, line string, pos int) (prefix string, completions []string, suffix string) {
switch mode {
case "ng":
return s.completerNg(line, pos)
case "sh":
return s.completerSh(line, pos)
default:
panic("ngcore: unknown completer: " + mode)
}
}
func (s *Session) completerNg(line string, pos int) (prefix string, completions []string, suffix string) {
if pos != len(line) { // TODO mid-line matching
return line, nil, ""
}
if strings.TrimSpace(line) == "" {
return line, nil, ""
}
// TODO match on word not line.
var res []string
for keyword := range token.Keywords {
if strings.HasPrefix(keyword, line) {
res = append(res, keyword)
}
}
for scope := s.Program.Cur; scope != nil; scope = scope.Parent {
if strings.HasPrefix(scope.VarName, line) {
res = append(res, scope.VarName)
}
}
res = append(res, s.Program.Types.TypesWithPrefix(line)...)
return "", res, ""
}
func (s *Session) completerSh(line string, pos int) (prefix string, completions []string, suffix string) {
if pos != len(line) { // TODO mid-line matching
return line, nil, ""
}
mustBeExec := false
i := strings.LastIndexByte(line, ' ')
i2 := strings.LastIndexByte(line, '=')
if i2 > i {
i = i2
}
if i == -1 {
//i = 0
mustBeExec = true
//prefix, completions = completePath(line, true)
//return prefix, completions, ""
}
prefix, word := line[:i+1], line[i+1:]
if word != "" && word[0] == '-' {
// TODO: word="--flag=$V" should complete var
return prefix, s.completeFlag(word, line), ""
}
resPrefix, completions := s.completePath(word, mustBeExec)
return prefix + resPrefix, completions, ""
}
func (s *Session) completeFlag(prefix, line string) (res []string) {
return res // TODO
}
func (s *Session) completePath(prefix string, mustBeExec bool) (resPrefix string, res []string) {
dirPath, filePath := filepath.Split(prefix)
dirPrefix := dirPath
if dirPath == "" {
dirPath = "."
} else {
var err error
dirPath, err = shell.ExpandTilde(dirPath)
if err != nil {
return prefix, []string{}
}
dirPath, err = shell.ExpandParams(dirPath, s.ShellState.Env)
if err != nil {
return prefix, []string{}
}
}
if len(filePath) > 0 && filePath[0] == '$' {
res = s.ShellState.Env.Keys(filePath[1:])
for i, s := range res {
res[i] = "$" + s + " "
}
return dirPrefix, res
}
dir, err := os.Open(dirPath)
if err != nil {
return prefix, []string{}
}
var fi []os.FileInfo
for {
potentials, err := dir.Readdir(64)
if err != nil {
if err == io.EOF {
break
}
fmt.Fprintf(s.Stderr, "ng: %v\n", err)
return prefix, []string{}
}
// TODO: can we use directory order to skip some calls?
for _, info := range potentials {
if filePath == "" && strings.HasPrefix(info.Name(), ".") {
continue
}
if !strings.HasPrefix(info.Name(), filePath) {
continue
}
// Follow symlink.
info, err := os.Stat(filepath.Join(dirPath, info.Name()))
if err != nil {
fmt.Fprintf(s.Stderr, "ng: %v\n", err)
continue
}
if info.Name() == "a_file" {
fmt.Fprintf(s.Stdout, "a_file: mustBeExec=%v, mode=0x%x\n", mustBeExec, info.Mode())
}
if mustBeExec && !info.IsDir() && info.Mode()&0111 == 0 {
continue
}
if strings.HasPrefix(info.Name(), filePath) {
fi = append(fi, info)
}
}
}
for _, info := range fi {
if info.IsDir() {
res = append(res, info.Name()+"/")
} else {
p := info.Name()
if len(fi) == 1 {
p += " "
}
res = append(res, p)
}
}
sort.Strings(res)
return dirPrefix, res
}
| 2024-04-17T01:27:17.568517 | https://example.com/article/4296 |
12)
Simplify (b**(-34)*b)/b*b*b**(4/9)*b assuming b is positive.
b**(-284/9)
Simplify (r/r**18*r)/(r*r**(-2/13)*r) assuming r is positive.
r**(-232/13)
Simplify (t**(-1/3))**(-1/23)*(t**(-2/7))**(4/27) assuming t is positive.
t**(-121/4347)
Simplify (o**(2/7))**(-14/3)/(o/(o*o**(-5/4))*o/o**1) assuming o is positive.
o**(-31/12)
Simplify ((m/m**(-6/5)*m)/m*m)**49 assuming m is positive.
m**(784/5)
Simplify v**(4/3)/v**(7/4) assuming v is positive.
v**(-5/12)
Simplify n/n**7*n*(n**1*n)/n*n*(n**0)**0 assuming n is positive.
n**(-3)
Simplify (b**3)**(-8/3) assuming b is positive.
b**(-8)
Simplify ((b*b**(-3))/b**0)/(b/(b*b/b**(-1/4)))**(-2/55) assuming b is positive.
b**(-45/22)
Simplify (b/b**(-6)*b*b/((b*b**(-1/2))/b*b))**(3/28) assuming b is positive.
b**(51/56)
Simplify (b**(-2/13)/b*(b*(b*b*b**8)/b)/b*b)/(b*b*b**(1/3))**16 assuming b is positive.
b**(-1111/39)
Simplify (o**(-6)*o**(-3/2)/o)**(3/35) assuming o is positive.
o**(-51/70)
Simplify g/(g*g**21)*g**(-9) assuming g is positive.
g**(-30)
Simplify q**(-4/15)*q*q**(-5)*q*q assuming q is positive.
q**(-34/15)
Simplify (h*h/(h*h*h**0))**28*(((h**(-3/5)/h)/h)/h)**(-5/16) assuming h is positive.
h**(9/8)
Simplify (g**1)**15*g**(1/2)/(g**9/g) assuming g is positive.
g**(15/2)
Simplify ((j/j**(1/10))/j)/(j*j*j**(-23)*j) assuming j is positive.
j**(199/10)
Simplify ((z/(z**0/z))**(2/5))**(-50) assuming z is positive.
z**(-40)
Simplify y**(-11)/y*y**(2/3)/y assuming y is positive.
y**(-37/3)
Simplify (z*z**(2/47)/z)/(z*z**(-1/7)/z*z) assuming z is positive.
z**(-268/329)
Simplify (n**(3/10)/(n**(-3/10)*n))/((n*n*n/(n/(n*n*n/(n/((n/(n*n**(-1/3)/n))/n))*n*n))*n)/n)**(-13/7) assuming n is positive.
n**(1193/105)
Simplify ((b*b/(b/b**(2/3))*b)**29)**25 assuming b is positive.
b**(5800/3)
Simplify ((i**(-3/5)/i)/i*i*((i*i/((i**(-5)/i)/i))/i)/i*i)**(1/10) assuming i is positive.
i**(16/25)
Simplify r**(-11)*(r*r**(1/9))/r assuming r is positive.
r**(-98/9)
Simplify w**(-2/31)/(w**3/w) assuming w is positive.
w**(-64/31)
Simplify (t/t**(5/2))/t*t*t/(t*t**(-16))*t assuming t is positive.
t**(31/2)
Simplify n**(-14)/n*n*n/n**(-1/4) assuming n is positive.
n**(-51/4)
Simplify (b**4/b)**(2/49) assuming b is positive.
b**(6/49)
Simplify ((d*d*d/(((d**7*d*d)/d*d*d)/d))/(d/(d*d/d**(-5))))/(d**(-6)*d**6*d) assuming d is positive.
1/d
Simplify ((u*(u**1*u)/u*u)**(-37))**(-2/3) assuming u is positive.
u**74
Simplify (((m**(1/2)*m)/m)/m**(3/4))/((m*(m/(m**(1/10)/m))/m)/(m**0/m)) assuming m is positive.
m**(-63/20)
Simplify v*((v**(-1/3)/v)/v)/v*v*v**(1/2) assuming v is positive.
v**(-5/6)
Simplify (y*y**(-2/9)*y**6)/((y**(-1)/y)/y)**(13/3) assuming y is positive.
y**(178/9)
Simplify u**(-1/3)/(u/((u/(u/(u*u**(-1))*u)*u)/u*u))*(u*(u*u**(-5))/u)/u**5 assuming u is positive.
u**(-31/3)
Simplify a*a**12*a*a**(-3/2) assuming a is positive.
a**(25/2)
Simplify ((j*j*j/(j*j*j/(j*j**(-36)))*j)/j*j)**(4/7) assuming j is positive.
j**(-136/7)
Simplify z*z/(z**4*z*z*z*z)*z**(7/2) assuming z is positive.
z**(-5/2)
Simplify ((q**3*q)/(q*q*q/(q*q**2)))/(q**9*q/(q*q**(2/17)/q)) assuming q is positive.
q**(-100/17)
Simplify t**(-6)*((t/t**(-8)*t)/t)/t*t*t**8*t**0 assuming t is positive.
t**11
Simplify n**(15/8)/n*n**(-2/63) assuming n is positive.
n**(425/504)
Simplify m**(-2/9)*m*m**(-3) assuming m is positive.
m**(-20/9)
Simplify (v/(v**(5/2)/v*v))/(v/(v*(v/((v**3/v)/v))/v))*(v/(v*v**(1/4)*v))/((((v/v**1)/v*v*v*v)/v)/v) assuming v is positive.
v**(-15/4)
Simplify a/(a**(-7/2)*a)*a**(-7) assuming a is positive.
a**(-7/2)
Simplify (x**0*x*x**(1/4))/(x**(-2/5)/x**(-10)) assuming x is positive.
x**(-167/20)
Simplify ((q/(q*q/(((q/(((q*q**(-4))/q)/q))/q)/q)))/q*q*q**0)**(3/8) assuming q is positive.
q**(9/8)
Simplify ((x*x*(x/(((x*x*x**(-6))/x)/x))/x)/(x*x**3))/(x*x**4*x*x*x**(-5)/x) assuming x is positive.
x**3
Simplify c*c**(1/21)/c*c*c**(4/3) assuming c is positive.
c**(50/21)
Simplify ((q/q**(-1/6))/q**2)/((q/(q/q**1))/(q/q**(-2/7))) assuming q is positive.
q**(-23/42)
Simplify (b**(-46))**(-4/15) assuming b is positive.
b**(184/15)
Simplify (l*l**(-1/3))**(-1/28)/(l/(l**1/l*l*l))**(-34/3) assuming l is positive.
l**(-159/14)
Simplify ((m**(3/7))**20)**(2/73) assuming m is positive.
m**(120/511)
Simplify (h*h/h**(-1/6)*h)**(-46) assuming h is positive.
h**(-437/3)
Simplify (c*c*c*c**26)**24 assuming c is positive.
c**696
Simplify ((p**(1/2)*p)/(p**6/p*p))/((p*p/p**5*p)/(p*p**(-1/9))) assuming p is positive.
p**(-29/18)
Simplify (f/(((f**2*f)/f)/f)*f**(-3)/f)**(-15) assuming f is positive.
f**60
Simplify (q*q/(q/(q**26/q)))/q*q**(-1/18) assuming q is positive.
q**(449/18)
Simplify (u**1)**(-23)/(u/(u/(u/(u*u*(u*u**0)/u)*u))*u)**11 assuming u is positive.
u**(-34)
Simplify (b**(1/3))**(12/13)/((b/b**4)/(b/((b**(-5/6)*b)/b))) assuming b is positive.
b**(401/78)
Simplify v*v/((v**(-24)/v)/v)*v*v/(v**27*v) assuming v is positive.
v**2
Simplify u**(-17)/(u/u**(-28)) assuming u is positive.
u**(-46)
Simplify ((n**(-2)/n)/((n/(n*n/n**3))/n))**50 assuming n is positive.
n**(-200)
Simplify (k**11)**14 assuming k is positive.
k**154
Simplify (v**7/v*v)**(-2/69) assuming v is positive.
v**(-14/69)
Simplify ((b*(b/(b*(b*b/(b/((b/b**(2/7))/b*b*b)*b))/b))/b)/b)**(-3/4)*(b/b**0*b)**(-2/47) assuming b is positive.
b**(395/329)
Simplify (w**(2/7)/w)**(-40/3)*(w*w**0)/w**(-1) assuming w is positive.
w**(242/21)
Simplify (v/(v**(-2/9)*v*v))**5 assuming v is positive.
v**(-35/9)
Simplify (t**0)**(-12/11)/(t**5*t*t*t/t**(2/11)*t) assuming t is positive.
t**(-97/11)
Simplify g**(-3/2)*(g**(-6)/g)/g*g*g**(-6/11)/g**(-1) assuming g is positive.
g**(-177/22)
Simplify k*k/(k*k/((k*k**(9/5))/k))*(k*k**(1/23)*k)/k assuming k is positive.
k**(327/115)
Simplify h*h/h**35*h**(-46) assuming h is positive.
h**(-79)
Simplify ((q**5/q)/(q**(-9)*q))**(-12/5) assuming q is positive.
q**(-144/5)
Simplify (t**(-1))**(-13/3) assuming t is positive.
t**(13/3)
Simplify (c**23*c*c)/c**4 assuming c is positive.
c**21
Simplify u**(-1/22)*u/(((u**(-2/47)/u)/u)/u) assuming u is positive.
u**(4133/1034)
Simplify (c/(((c**(-11/2)/c*c)/c)/c))**(1/37) assuming c is positive.
c**(17/74)
Simplify a**(-3/13)*a**(-21) assuming a is positive.
a**(-276/13)
Simplify ((p**(-1/4)*p)/(p*p/p**(-2/9)))**(-5/2) assuming p is positive.
p**(265/72)
Simplify f**13*f**(4/5) assuming f is positive.
f**(69/5)
Simplify ((b/(b/(b**1/b*b)))/b)**2*b*b/((b*b/(b*b*((b*(b/(b*b**(-2/5)))/b)/b)/b*b))/b)*b*b/(b**(3/7)*b) assuming b is positive.
b**(104/35)
Simplify ((h**(-2/5)*h)**(-13))**45 assuming h is positive.
h**(-351)
Simplify ((a*a**(-2/3))/a)**(-36)/(a**(-2))**(-5/11) assuming a is positive.
a**(254/11)
Simplify (d/d**(-3/2))/(((d*d**1)/d)/d)*((d**0*d)/d)**4 assuming d is positive.
d**(5/2)
Simplify ((l*l/((l*l**(-6))/l)*l*l*l)/l**(-2/13))**(-3) assuming l is positive.
l**(-435/13)
Simplify m**(-4/7)*m**0 assuming m is positive.
m**(-4/7)
Simplify (y/y**(2/43))/((y*y/y**21*y)/y) assuming y is positive.
y**(858/43)
Simplify o/((o**(-29)/o)/o)*o**21 assuming o is positive.
o**53
Simplify (r*r*r*r/(r/(r**4*r))*r**(-10))**(-17) assuming r is positive.
r**34
Simplify (m*m*m**2*m)**30*(m**2/m)**(-36) assuming m is positive.
m**114
Simplify ((f/(f**(2/3)*f))/f*f*f*f*((f*f**(1/6)*f)/f)/f)/((f*f**(-2/5))/f**(1/4)) assuming f is positive.
f**(23/20)
Simplify ((t**(-3)/t)/t**(5/2))/(t**(-4)/(t**(-2)/t)) assuming t is positive.
t**(-11/2)
Simplify t**(1/8)/t**(-2/15) assuming t is positive.
t**(31/120)
Simplify ((h**(2/3)*h)/h*h)**(-46)/(h**(-1/2)/h**3) assuming h is positive.
h**(-439/6)
Simplify z**(11/3)*z**(-9)/z*z assuming z is positive.
z**(-16/3)
Simplify (f**(-7/5)*(f*f/(f/(f**(-8/5)/f))*f)/f)**(-37) assuming f is positive.
f**111
Simplify (o**9)**41 assuming o is positive.
o**369
Simplify b**(-35)/(b**(-17)/b) assuming b is positive.
b**(-17)
Simplify (z/z**(-1)*z)**(-10)*((z*z**3*z)/z)/((z/((z*((z/(z*(z*z**(-6)*z*z*z*z)/z))/z)/z*z)/z)*z)/z) assuming z is positive.
z**(-26)
Simplify ((y/(y*y/y**(-7)*y))/y)**(13/3) assuming y is positive.
y**(-130/3)
Simplify (r**(3/8)/(r**7*r))**44 assuming r is positive.
r**(-671/2)
Simplify ((c*c**2*c)/c*(c*c*c*c**(-3)/c)/c)/((c/(c/(c*c/(c**(-1/4)*c))))/c)**(7/8) assuming c is positive.
c**(25/32)
Simplify (l**(1/6)/(l*l*l**(-1/3)*l))/(l**(-1)/l*l*l**(-1/6)*l) | 2024-07-09T01:27:17.568517 | https://example.com/article/5719 |
So, I found my Saturn and 6 Man Scramble. I was hoping to spend some time converting some defaults, but I've run into a snag.
I can't seem to find a way to access the defaults move list or CPU logic. It doesn't seem to be like more modern Fire Pro's where basing a new edit on a model brings the model's moves and logic to the new edit. The only thing that I seem to be able to convert is the appearance.
I found a thread that gives skills and parameters for 6MS defaults, but what about moves and logic? I see people converting defaults from games even older than 6MS, so how is this being done?
I haven't messed with making any wrestlers in 6MS other than looking through all the additional models that are visually precreated but you have to do everything else for.
I went through the trouble of renaming everyone to their real name on the first Gameboy Advance one which came out five years later, but unfortunately they changed almost everyone's colors to make them less recognizable in the US version. I used a char restore FAQ on gamefaqs to restore Undertaker and Jericho, but some color values seemed to be off for Undertaker and I made them closer. AND unfortunately in that you had to make a new edit instance of the char to be restored where you're left with skills and abilities left at crappy default minimal values. The FAQ gives seemingly proper values, but I'm not sure how much the moveset stays intact and I think logic is set to a clean slate.
So I have no idea where people are getting correct values for the older games. It's possible they could be hacking them and finding them in a hex editor or something.
Super Fire Pro Wrestling X had all the moves/logic ripped from the game data, unfortunately the same cant be done for this one for some reason. I think the only unique character is Tony Halme. Some characters have big moveset changes from later games, they are much more heelish/"Attitude Era" in FPG and beyond. | 2023-11-13T01:27:17.568517 | https://example.com/article/4351 |
Details, Fiction and 24 hour homecare
Menu
Details, Fiction and 24 hour homecare
The support from Homewatch Caregivers has become a phenomenal enable to me. I could not have progressed so far as I've without the assistance they've offered.
away from all of the businesses we checked out, they had the ideal provider! the caregivers were being welcoming and excellent. I Extremely advise!
Our encounter with 24Hr House Care was excellent following my mom's coronary heart attack. She wanted special focus also for the reason that she was so accustomed to foremost an exceptionally unbiased existence and the staff members and her caregiver, Angel, had been really knowing and delicate to her wishes whilst simultaneously ensuring that she was properly supervised and taken care of.
What on earth is included in overnight care? Overnight treatment is every time a caregiver will be able to be there a couple of hours right before your liked one goes to mattress, they sleepover and can be obtained a few instances in the night in the event your cherished just one demands assist, and They're also there for any number of hours when they get up.
Cease subsequent Ashley C. 6/seven/2017 Since signing up for the 24hr Property Care team, I have had the satisfaction of working with a lot of the most astounding and intriguing consumers, in by far the most favourable configurations I've skilled With this field. Jacqueline Gradyz has out accomplished herself in each and every assignment she has given me.
Extremely terrific firm to operate for, good shoppers. Educating all to Keep to the care prepare as directed by supervising nurse. Assisting with batghing and grooming- This tends to involve but just isn't limited to: shampooing hair, finger and toes care, brushing teething and shower assistance. This corporation offers pamphlets on staying the most effective household care aide.
Ahead of hiring 24 Hr HomeCare I did the ideal Google lookup homework I could and concluded which they gave the impression to be best in class or near to it. We have now made use of 24 Hr HomeCare over the last various Months for my Mother as she's in failing health.
With right away treatment, a caregiver comes by your house to offer a number of hours of care before mattress and in the morning. Along with supplying homemaking and companionship services, overnight caregivers can provide quite a few personal treatment solutions, which include:
At Preferred Care in your house, we’re dedicated to honoring and celebrating the lives of our clients in the security house offers. We recognize that frequently for elderly folks, their property is all the things. It’s the window to your past, a safe haven with the present and a legacy for the future.
1 Check out-in I have been intending to go away a review for some time, but have not experienced the prospect right until now. I'm more than happy with 24hr HomeCare~
I felt excellent trust in her abilities and since of her close awareness to element we were being in the position to head off likely ailment. i would like revenue have been no item as I'd personally use 24 hr care for or 24 hour requires.
Stop pursuing Cindy M. 5/ten/2017 The care, compassion, and tolerance which was shown to me by Jacqueline was much more than I deserved. I used to be confused After i referred to as and it had been Whilst on a lengthy travel which i had to arrange added look after a relative. She spelled out Obviously everything I needed to understand about 24 Hr Treatment an listened intently to my requires.
Our caregivers are all adequately skilled to provide the type of care your beloved a person necessitates to steer a more unbiased Life style, whether or not they are diagnosed with dementia, have snooze complications for example insomnia or are recovering pursuing an health issues or injury.
Besides high-quality treatment, we also guarantee continuity. You don’t have to bother with frequent modifications in caregivers—needing to get acquainted again and again.
We offer treatment services for seniors with a variety of well being problems, including, arthritis, diabetes, higher visit hypertension, heart problems, dementia and Alzheimer’s. We also provide excellent functions for our seniors like artwork therapy for Alzheimer’s and Actual physical therapy routines.
Companion treatment is support and help for seniors who want to remain of their residences. It consists of 24 hour treatment, personal care, and routines for day by day living to help make aging in place safer and much more comfy.
(310) 375-5353 The treatment, compassion, and tolerance which was shown to me by Jacqueline was much more than I deserved. I was confused After i referred to as and it had been Even though on an extended travel which i needed to set up excess care for a relative. She spelled out Plainly all that I required to understand about 24 Hr Care an listened intently to my requires.
There isn't any extra prices for area and board for live-in care, however the loved ones normally covers the expense of foods (or supplies a meal stipend). Alternatively, the caregiver can Prepare dinner the meals for the consumer and dine along with the loved ones.
You can find often again up caregivers for our customers in case of emergencies. Now we have coverage coverage for our staff members to ensure the security compliance amongst our shoppers! one hundred% Pleasure promise!!
We not long ago had sudden need to have site for caregiver services for my Grandmother on lower than 24 hour see and to top it off, with a weekend! The team at 24 Hour HomeCare Completely stunned me with how effortless they produced this transpire. From start out to complete, they knocked it out from the park! Lorraine, our caregiver, arrived on time, in and jumped right in that can help out and put our loved ones fully here at relieve.
I hugely advocate requesting Tatiana, Jesse, Amaris or Michelle. They ended up all good in speaking with me and designed it really easy with the process of getting a caregiver. If you want South Bay's Greatest caregivers, provide them with a get in touch with 1st!
"I want you to know that I value The type care that your staff members is giving my mom. She appreciates all of that is finished for her."
If you are feeling hesitated about this sort of provider as a consequence of some uncertainty or price tag, Do that location, it will certainly alter the way you believe.
Your retirement many years needs to be savored with fantastic enterprise, protection in addition to a caring location so that you can connect with dwelling. For that reason, for the assurance and stability, you and your family members should take into account 24 Hours Household Treatment, your house away from your home.
Thanks a great deal of on your review. We've been so happy that we could aid your family through a… Hi Laura,
Education We’ve built education to help you be the top caregiver! You could acquire certifications as well as continuing training units!
She's professional and punctual in all her responses to thoughts and fears. She has definitely designed my task as a HCA so easier by her hard work and diligence. Thank you Jacqueline! You're a enjoyment to work with and I look forward to continuing Using the 24hr Property Treatment workforce.
Our Live-in caregivers have advanced coaching to help seniors with age associated ailments like Dementia, Alzheimer’s, Parkinson’s or are recovering from a stroke or slide. | 2023-11-30T01:27:17.568517 | https://example.com/article/3892 |
// Copyright © 2017 - 2018 Chocolatey Software, Inc
// Copyright © 2011 - 2017 RealDimensions Software, LLC
//
// Licensed under the Apache License, Version 2.0 (the "License");
// you may not use this file except in compliance with the License.
//
// You may obtain a copy of the License at
//
// http://www.apache.org/licenses/LICENSE-2.0
//
// Unless required by applicable law or agreed to in writing, software
// distributed under the License is distributed on an "AS IS" BASIS,
// WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
// See the License for the specific language governing permissions and
// limitations under the License.
namespace chocolatey.infrastructure.adapters
{
using System;
using System.ComponentModel;
using System.IO;
using System.Reflection;
// ReSharper disable InconsistentNaming
public interface IAssembly
{
/// <summary>
/// Gets the display name of the assembly.
/// </summary>
/// <returns>
/// The display name of the assembly.
/// </returns>
string FullName { get; }
/// <summary>
/// Gets the path or UNC location of the loaded file that contains the manifest.
/// </summary>
/// <returns>
/// The location of the loaded file that contains the manifest. If the loaded file was shadow-copied, the location is that of the file after being shadow-copied. If the assembly is loaded from a byte array, such as when using the
/// <see
/// cref="M:System.Reflection.Assembly.Load(System.Byte[])" />
/// method overload, the value returned is an empty string ("").
/// </returns>
/// <PermissionSet>
/// <IPermission
/// class="System.Security.Permissions.FileIOPermission, mscorlib, Version=2.0.3600.0, Culture=neutral, PublicKeyToken=b77a5c561934e089"
/// version="1" Unrestricted="true" />
/// </PermissionSet>
string Location { get; }
/// <summary>
/// Gets the location of the assembly as specified originally, for example, in an <see cref="T:System.Reflection.AssemblyName"/> object.
///
/// </summary>
///
/// <returns>
/// The location of the assembly as specified originally.
///
/// </returns>
/// <PermissionSet><IPermission class="System.Security.Permissions.FileIOPermission, mscorlib, Version=2.0.3600.0, Culture=neutral, PublicKeyToken=b77a5c561934e089" version="1" Unrestricted="true"/></PermissionSet>
string CodeBase { get; }
/// <summary>
/// Returns the underlying Assembly when necessary for libraries outside of the internal.
/// </summary>
/// <value>
/// System.Reflection.Assembly
/// </value>
[EditorBrowsable(EditorBrowsableState.Never)]
System.Reflection.Assembly UnderlyingType { get; }
/// <summary>
/// Returns the names of all the resources in this assembly.
/// </summary>
/// <returns>
/// An array of type String containing the names of all the resources.
/// </returns>
string[] GetManifestResourceNames();
AssemblyName GetName();
Type GetType(String name);
Type GetType(String name, bool throwOnError);
Type GetType(String name, bool throwOnError, bool ignoreCase);
/// <summary>
/// Loads the specified manifest resource from this assembly.
/// </summary>
/// <returns>
/// A <see cref="T:System.IO.Stream" /> representing the manifest resource; null if no resources were specified during compilation, or if the resource is not visible to the caller.
/// </returns>
/// <param name="name">
/// The case-sensitive name of the manifest resource being requested.
/// </param>
/// <exception cref="T:System.ArgumentNullException">
/// The <paramref name="name" /> parameter is null.
/// </exception>
/// <exception cref="T:System.ArgumentException">
/// The <paramref name="name" /> parameter is an empty string ("").
/// </exception>
/// <exception cref="T:System.IO.FileLoadException">
/// A file that was found could not be loaded.
/// </exception>
/// <exception cref="T:System.IO.FileNotFoundException">
/// <paramref name="name" /> was not found.
/// </exception>
/// <exception cref="T:System.BadImageFormatException">
/// <paramref name="name" /> is not a valid assembly.
/// </exception>
Stream GetManifestResourceStream(string name);
/// <summary>
/// Loads the specified manifest resource, scoped by the namespace of the specified type, from this assembly.
/// </summary>
/// <returns>
/// A <see cref="T:System.IO.Stream" /> representing the manifest resource; null if no resources were specified during compilation or if the resource is not visible to the caller.
/// </returns>
/// <param name="type">
/// The type whose namespace is used to scope the manifest resource name.
/// </param>
/// <param name="name">
/// The case-sensitive name of the manifest resource being requested.
/// </param>
/// <exception cref="T:System.ArgumentNullException">
/// The <paramref name="name" /> parameter is null.
/// </exception>
/// <exception cref="T:System.ArgumentException">
/// The <paramref name="name" /> parameter is an empty string ("").
/// </exception>
/// <exception cref="T:System.IO.FileLoadException">
/// A file that was found could not be loaded.
/// </exception>
/// <exception cref="T:System.IO.FileNotFoundException">
/// <paramref name="name" /> was not found.
/// </exception>
/// <exception cref="T:System.BadImageFormatException">
/// <paramref name="name" /> is not a valid assembly.
/// </exception>
Stream GetManifestResourceStream(Type type, string name);
}
// ReSharper restore InconsistentNaming
} | 2024-06-28T01:27:17.568517 | https://example.com/article/8418 |
President Trump Donald John TrumpOmar fires back at Trump over rally remarks: 'This is my country' Pelosi: Trump hurrying to fill SCOTUS seat so he can repeal ObamaCare Trump mocks Biden appearance, mask use ahead of first debate MORE suggested in an interview broadcast early Thursday that those who can't "stand proudly" during the national anthem "shouldn't be in the country" after the NFL passed a rule banning kneeling during "The Star-Spangled Banner."
The president during an interview with "Fox & Friends" touted the NFL's new rule, which bans on-field protests during the national anthem, and chided the league for allowing players to remain in the locker room.
ADVERTISEMENT
"I think that’s good. I don’t think people should be staying in the locker rooms, but still, I think it’s good. You have to stand proudly for the national anthem," Trump said.
"You shouldn’t be playing, you shouldn’t be there. Maybe they shouldn’t be in the country," he added.
"You have to stand proudly for the National Anthem. You shouldn't be playing, you shouldn't be there. Maybe they shouldn't be in the country...the NFL owners did the right thing" -President @realDonaldTrump pic.twitter.com/bt36t4EX5u — FOX & friends (@foxandfriends) May 24, 2018
Team owners on Wednesday decided to allow NFL Commissioner Roger Goodell to impose "appropriate discipline on league personnel who do not stand and show respect for the flag and the Anthem." Teams will be fined if players do not stand and "show respect for the flag."
Vice President Pence reacted to the league's decision on Wednesday, calling it a victory for both NFL fans and the Trump administration.
"Today’s decision by the @NFL is a win for the fans, a win for @POTUS, and a win for America. Americans can once again come together around what unites us – our flag, our military, and our National Anthem. Thank you NFL. #ProudToStand," he tweeted.
Players began kneeling during the anthem in 2016 as a means of protesting social injustice in the U.S., sparking criticism from Trump.
--Updated at 8:56 a.m. | 2024-03-08T01:27:17.568517 | https://example.com/article/5067 |
Q:
Flutter - ChangeNotifierProxyProvider package
I have been using the Provider package 3.1.0 version last year to share value between providers ,like that :
...
return MultiProvider(
providers: [
ChangeNotifierProvider.value(
value: Auth(),
),
ChangeNotifierProxyProvider<Auth, Products>(
builder: (ctx, auth, previousProd) => Prod(
auth.cred,
previousProd,
),
),
),
],)
...
Now with the version 4.1.3 two parameters are required : create and update
And i got stuck editing my application , I tried that :
...
return MultiProvider(
providers: [
ChangeNotifierProvider.value(
value: Auth(),
),
ChangeNotifierProxyProvider<Auth, Products>(
update: (ctx, auth, previousProd) => Prod(
auth.cred,
previousProd,
),
),
),
],)
...
It shows that the create parameter is required as i said
But i cannot figure out how to use that parameter ,
Can someone please help me ,i would appreciate that ,
Thanks !
A:
ProxyProvider doesn't require the create parameter but ChangeNotifierProxyProvider does, to avoid creating a ChangeNotifier each time (with ProxyProvider there is no problem because is a simple class with no listeners). The create is called once, while the update can be called multiple times, so the code for a ChangeNotifierProxyProvider should look like this
ChangeNotifierProxyProvider<Auth, Products>(
create: (_) => Prod(),
update: (_, auth, product) => product..credential = auth.cred,
//instead of creating a new object Prod(), just reuse the existing one and set the new values
child: ...
)
And the Prod class
class Prod extends ChangeNotifier{
Credential _cred;
Prod(){
//if you want to initialize some values
}
set credential(Credential credential) => _cred = credential;
//or some other logic you do here with the auth.cred
}
Now each time Auth change and notifies the ProxyProvider it will reuse the same object created in create and just change the parameter credential (_cread)
| 2024-07-10T01:27:17.568517 | https://example.com/article/2599 |
Marcia and Alan continue to pressure Adrian into taking a position as a judge. Vigilante continues to try and find out who Henry Ebert was stealing a microchip for but his next lead is also taken out by the Electrocutioner (just like poor Henry). The villain accuses Vigilante of selling out for not being willing to kill the bad guys he pursues. J.J. gets a lead on a warehouse tied to the microchip mystery, but when he drives out to investigate, he is shot by the Controller's goons. | 2023-11-07T01:27:17.568517 | https://example.com/article/1537 |
Palacio de los Reyes de Navarra
Palacio de los Reyes de Navarra (Palace of the Kings of Navarre) may refer to:
Palacio de los Reyes de Navarra, Estella, Romanesque former royal palace of the Kings and Queens of Navarre from the late twelfth century to the mid-fifteenth
Palace of the Kings of Navarre of Olite, palace and castle of Kings of Navarre, constructed between 13th and 15th centuries at Olite, major seat of the royal court during the reign of Charles III | 2024-06-29T01:27:17.568517 | https://example.com/article/3504 |
Apartment buildings are rising across Atlanta, and with them, so too are rents — outrageous case in point: Avalon. While many of the developments have been focused on the north and central parts of the city, the Atlanta City Council has brought the trend to the southeast side, giving Euramex the go-ahead for a building in Kirkwood. And the best news is the units trend toward the "marginally more affordable than most new buildings" end of the spectrum, with rents projected between $1,100 for a one-bedroom and $1,600 for a two-bedroom. Located behind Kirkwood Station, the proposed building gained neighborhood approval a few months back, and with the blessing of the city can now proceed. But don't get too excited about these attractively priced new digs coming any time soon. Decaturish reports that while the company intends for a timeline that is "shorter rather than longer," planning and permitting the project may not be realized for at least two years. The developers, unlike many others in the sizzling Atlanta market, are in no rush to erect these rentals, which could make you wonder if the hesitation is justified.
· Zoning approved for Euramex's Kirkwood project [Decaturish]
[ABOVE: Image via Decaturish.] | 2024-03-12T01:27:17.568517 | https://example.com/article/6228 |
Q:
Magento 2 MSI - How to listen the event of all source item stock update API
Am using the below rest API to update bulk product's Stock information
/rest/all/V1/inventory/source-items
My requirement is that I need to listen the observer or some file whenever this API is triggered to write my custom logic.
Can anyone help me on how this can be done?
A:
Add an after plugin to \Magento\InventoryApi\Api\SourceItemsSaveInterface::execute API
| 2023-08-19T01:27:17.568517 | https://example.com/article/7294 |
Edward Jełowicki
Edward Bożeniec Jełowicki born 1803 in Hubnik Western Ukraine, died 10 November 1848 in Vienna, was a Polish landowner, decorated Colonel in the Polish army, insurgent, officer in the Foreign Legion and commander of the Vienna artillery. He was an engineer and inventor.
Descended from Ruthenian aristocracy, his family had been integrated into the Polish Szlachta and converted from Orthodoxy to Roman Catholicism during the Republic of Two Nations. Edward was the eldest of four children and an alumnus of the Vienna Theresian Military Academy, after which he was elected Marshal of the Haisyn district. He took a leading part in the November Uprising in Ukraine, with his father and two brothers, until its undoing in 1831 when with his younger brother, Alexander, he evaded capture by escaping into Austria-Hungary. After much travel across Europe he pursued further studies such as the postgraduate École d’état-major in Paris and the Ecole Centrale Paris. In 1836 during a quiet spell in London, he designed and took out a British Patent on his Steam turbine. In Paris he frequented Adam Mickiewicz, whose Paris publisher was Edward's brother, Alexander Jełowicki. He also met with Frederic Chopin.
Caught up in the Spring of Nations that swept over Europe in 1848, he was executed in Vienna on the order of Alfred I, Prince of Windisch-Grätz. He left a widow and two children.
See also
Great Emigration
References
External links
http://www.sejm-wielki.pl/b/9.5.303 - Genealogy of Edward Jełowicki in Polish
Category:1803 births
Category:1848 deaths
Category:Dukes of Poland
Category:Polish Army officers
Category:École Centrale Paris alumni
Category:Polish exiles
Category:Polish inventors
Category:Mechanical engineers
Category:Polish Roman Catholics
Category:Recipients of the Legion of Honour
Category:Recipients of the Virtuti Militari
Category:People executed by Austria-Hungary
Category:Executed Polish people
Category:19th-century executions by Austria | 2023-11-30T01:27:17.568517 | https://example.com/article/6074 |
One of the biggest challenges in eventing is simply time... we essentially train a horse in 3 disciplines and wonder why it's difficult to make progress. My way to combat this challenge is to make the most of my training rides by incorporating multiple elements. It keeps things interesting for the horse and sharpens the rider without having to subject the horse to any excess pounding. Whether it's working on my dressage out on hilly terrain or frequently incorporating cavaletti into my daily work I am able to address many issues that I face in the jumping phases while continuing to develop the physical and mental aspects needed in the dressage ring. The photo above is a view of my ring with a variety of exercises set up, one in particular that I will describe as I have used it for horses at all levels of training and fitness.
To me, cavaletti can range from rails on the ground to small jumps depending on the level of the horse and how challenging the exercise is intended to be. The focus for this exercise is on the raised cavaletti bounce rails (6 in total) so ignore the brown verticals for now. I simply set up my ring with a variety of exercises at a time. I prefer to ride these exercises in my jump saddle for the most part but with the rider staying in the saddle and around the horse to have a better feel of the horses balance and rideability.Set up: Begin with rails on the ground set 9 feet apart for each bounce element. The distance between bounce "sets" is 15 meters so if you were to connect all three "sets" on a serpentine you would be making 15 meter loops (the most challenging version of this exercise).
Tips: As with all of my cavaletti exercises I use them at the walk to begin, simply adding them in during my warm up. Since the distance is not set specifically for the walk you can use an individual bounce set to allow the horse to think for itself. Be aware of keeping the horse straight even when on a loose rein so they do not learn to deal with awkward distances by bulging or drifting through the body. This is an exercise that will also focus on turning so also be aware of keeping the horse aligned through the turns so that they are straight as they come out of the turn and approach the cavaletti.
How to: Looking at the set up you'll find that there are many options. I'll outline a typical pattern...
Trot the 2 outside cavaletti sets staying on a 30 meter oval so that you are straight for at least 4 steps before and after the rails and making an even arc between the 2 sets. Find the correct quality to the trot to allow for an even 2 steps between the 2 rails without altering the horses frame or alignment. Repeat several times in each direction.
Add the middle cavaletti set while at the trot. Now the turns will be 15 meter arcs so give the horse a slightly longer straight path before and after each set in order to allow for enough time to balance both before and after the rails. As a challenge for the rider change your posting diagonal by staying up the extra beat as you go through the middle cavaletti rather than sitting to change.
When you're ready to work at work on the canter go back to the 30 meter arc and use the outside sets again. Give yourself 3-4 strides both before and after the rails to ensure balance and straightness. Again the goal is to find the right base canter to keep the exercise smooth for your horse. The more you remain aware of the quality of the canter around the arc the better your chances of finding a good stride to the bounce. For many horses this exercise is as far as I would need to go as I can modify it to work on lengthening on the curve and being able to transition back to my working canter for the rails. I can also play around with how many strides before and after the rails I need in order to achieve straightness following the curve. Counting those strides and trying to replicate the same number several times is a great exercise for the rider.
With a lower level horse I may wait to add this additional challenge until another day. If your horse has sailed through the first stages then I continue right on to adding the middle element just as in the trot. There is the option of either working on flying changes through the middle bounce set or, just as beneficial, work on efficient simple changes after the middle set.
As you can see in the photo I also have this exercise tied into small jumps to add to the challenge so check back for the additional exercises... | 2024-03-15T01:27:17.568517 | https://example.com/article/3127 |
, -3, 7/8, -1/2, -0.527 in increasing order.
-3, -0.527, -1/2, 1/3, 7/8
Put -2/7, 6692, -1/7, 0.354 in descending order.
6692, 0.354, -1/7, -2/7
Put 19/1566, 4, -0.04, 5 in descending order.
5, 4, 19/1566, -0.04
Put -1/836, -51, 0.15, -1/3 in ascending order.
-51, -1/3, -1/836, 0.15
Put 6, -1, 4, -10, 2/8405 in descending order.
6, 4, 2/8405, -1, -10
Sort -6975, -5, -28, 1, 13, -4, -2 in increasing order.
-6975, -28, -5, -4, -2, 1, 13
Put -6/73, 4, -52, -1.273 in decreasing order.
4, -6/73, -1.273, -52
Sort 0.3, -3, 102, -1/5, -1, 2/45 in decreasing order.
102, 0.3, 2/45, -1/5, -1, -3
Put 561/8, 2/5, -4, 6/125 in descending order.
561/8, 2/5, 6/125, -4
Put 2, 1, 249, 11718 in ascending order.
1, 2, 249, 11718
Sort 1, 4, -137, 214, 0.
-137, 0, 1, 4, 214
Put -7, 1228, 4, -269 in descending order.
1228, 4, -7, -269
Sort 2, 2/23, -1240471/5 in increasing order.
-1240471/5, 2/23, 2
Sort -312, 9, 1, -114.
-312, -114, 1, 9
Put -1/7, 20, -59962 in descending order.
20, -1/7, -59962
Sort 112, 2, 381 in decreasing order.
381, 112, 2
Sort -0.21, 10/1029, 0.2, 0.15 in ascending order.
-0.21, 10/1029, 0.15, 0.2
Put 5, 4725, 0, 140, 1 in descending order.
4725, 140, 5, 1, 0
Put 16, 1, 0, -31, -3, 20, 3 in increasing order.
-31, -3, 0, 1, 3, 16, 20
Put 5/1048, -7, 5, 11, -9 in descending order.
11, 5, 5/1048, -7, -9
Sort 2/7, 5, -296, -577.83 in descending order.
5, 2/7, -296, -577.83
Put 2, 3, 75, 121, 2754 in ascending order.
2, 3, 75, 121, 2754
Put -51, -18, 4, 1, 22, 2 in decreasing order.
22, 4, 2, 1, -18, -51
Put -3, 76, 0, -141, 4, -8, 5 in increasing order.
-141, -8, -3, 0, 4, 5, 76
Put 2/25, -0.4, 111, 2, 15, 620 in ascending order.
-0.4, 2/25, 2, 15, 111, 620
Sort 55069, 2, 1, 0, -3, 3, -5 in descending order.
55069, 3, 2, 1, 0, -3, -5
Put -4, -5, -215, -4995 in ascending order.
-4995, -215, -5, -4
Put -726, 156, -50 in decreasing order.
156, -50, -726
Sort -26, -4, 0, -54, 5, 1, 2 in decreasing order.
5, 2, 1, 0, -4, -26, -54
Sort 2, 82, -3, -2, 1, -8, 54 in descending order.
82, 54, 2, 1, -2, -3, -8
Sort 18698816, -3, -1.
-3, -1, 18698816
Sort -42, -3, -3369 in increasing order.
-3369, -42, -3
Sort -0.5, -2040.9147, 5 in ascending order.
-2040.9147, -0.5, 5
Put 0, -2, 32, 1, 6007, 7, -1 in decreasing order.
6007, 32, 7, 1, 0, -1, -2
Put -14, -4, 5, 485, -115 in decreasing order.
485, 5, -4, -14, -115
Sort 15/2, 0.2, -1163, -1030.
-1163, -1030, 0.2, 15/2
Sort 87, -59/2, 608, 5, 0.5 in descending order.
608, 87, 5, 0.5, -59/2
Put 0.07, 826/211, 0.061 in decreasing order.
826/211, 0.07, 0.061
Sort -445, -3, 18, 0, 31, 49 in decreasing order.
49, 31, 18, 0, -3, -445
Put 19, 3/8, -1/9, 134967, 2 in decreasing order.
134967, 19, 2, 3/8, -1/9
Put -12116414, 15, -2 in decreasing order.
15, -2, -12116414
Sort 91147, -0.3, 2/3.
-0.3, 2/3, 91147
Put 7, -2, 10, 3, 5, 67 in ascending order.
-2, 3, 5, 7, 10, 67
Sort -48, -4, 129, -28 in increasing order.
-48, -28, -4, 129
Sort -5, 0.09, -1669/7, 1/3, -2, 12 in increasing order.
-1669/7, -5, -2, 0.09, 1/3, 12
Put 4, 1, -270722, -5 in decreasing order.
4, 1, -5, -270722
Put 74, 501, -2, 6, -6, -4 in ascending order.
-6, -4, -2, 6, 74, 501
Put 0.277, -67, -0.428 in increasing order.
-67, -0.428, 0.277
Put -1, 1, 13, 5, 5916 in descending order.
5916, 13, 5, 1, -1
Sort 1, -29, -60239.
-60239, -29, 1
Sort 4, 1, -32, -14, -111, 0.
-111, -32, -14, 0, 1, 4
Sort 4, 5, -5974, -1347, 6.
-5974, -1347, 4, 5, 6
Sort 6/13, 3, 6, -3/764 in descending order.
6, 3, 6/13, -3/764
Sort 145, 10, -13, 1, 32.
-13, 1, 10, 32, 145
Sort -79, 1, 44, 5.
-79, 1, 5, 44
Sort 1/5, -809, 3, 5, -3, 0.1, 16.
-809, -3, 0.1, 1/5, 3, 5, 16
Sort -14, -11, 34, 2, 23, -2, 0.
-14, -11, -2, 0, 2, 23, 34
Put -1, 154333, 2, 3, -21 in ascending order.
-21, -1, 2, 3, 154333
Sort -2/5, 0.42, -3, -0.2, -0.8 in decreasing order.
0.42, -0.2, -2/5, -0.8, -3
Sort -152, -1141, 231, 0 in increasing order.
-1141, -152, 0, 231
Put 4, 5, 841, 1.633 in decreasing order.
841, 5, 4, 1.633
Sort -1/3, 1, 378/11, 2/5, -1, 5/9 in ascending order.
-1, -1/3, 2/5, 5/9, 1, 378/11
Sort 16, -12, 3, -43, -2, 0.
-43, -12, -2, 0, 3, 16
Sort -937, 1, -12.7, 0.04 in ascending order.
-937, -12.7, 0.04, 1
Put 0, 2, 3, 31, 213 in descending order.
213, 31, 3, 2, 0
Put 9, 0, 1, -9756, -4, -2 in descending order.
9, 1, 0, -2, -4, -9756
Put -1.4, 59/52, -0.4 in ascending order.
-1.4, -0.4, 59/52
Put -13, -110, -0.0317 in increasing order.
-110, -13, -0.0317
Sort 168975, 105, -4 in increasing order.
-4, 105, 168975
Sort -5, 6, -9, -50, 20, -8 in increasing order.
-50, -9, -8, -5, 6, 20
Sort -5, -4, 2, 7, -4532 in descending order.
7, 2, -4, -5, -4532
Sort 0, -14, 1/4, 1, -2, -277, -3.
-277, -14, -3, -2, 0, 1/4, 1
Put 3951, -12, -3 in descending order.
3951, -3, -12
Put -4/161, -1/5, 35.6, 53, -2/9 in decreasing order.
53, 35.6, -4/161, -1/5, -2/9
Put -21620539, -5, 14 in descending order.
14, -5, -21620539
Sort -12520263, -18, 2 in ascending order.
-12520263, -18, 2
Sort -25, 32228, -9 in ascending order.
-25, -9, 32228
Sort -14, 0, -307504, 3, 5 in descending order.
5, 3, 0, -14, -307504
Put 0, -415, 81, 8, 24 in decreasing order.
81, 24, 8, 0, -415
Sort -114, 0, 25, -16, 1.4.
-114, -16, 0, 1.4, 25
Sort -2, -0.4, -1844, 5, 0, 0.52.
-1844, -2, -0.4, 0, 0.52, 5
Sort -4675, 0, -3, -1, -4, -18, 4.
-4675, -18, -4, -3, -1, 0, 4
Put -3/7, 4, -9643/12, 19 in descending order.
19, 4, -3/7, -9643/12
Sort 2, 1, 4, 121, -12023, -4 in ascending order.
-12023, -4, 1, 2, 4, 121
Sort 126, 12, -12, -4, -8, 0 in increasing order.
-12, -8, -4, 0, 12, 126
Put -2, 6, 3, -5, 4, -3343, 25 in decreasing order.
25, 6, 4, 3, -2, -5, -3343
Put 1, 5, -4, -257008 in increasing order.
-257008, -4, 1, 5
Sort 4, -16482, -2494 in ascending order.
-16482, -2494, 4
Put -0.4, 2/13, 2475/27197 in increasing order.
-0.4, 2475/27197, 2/13
Put 46, -5/4, -71.76 in ascending order.
-71.76, -5/4, 46
Put -105, 86, 1828 in decreasing order.
1828, 86, -105
Put 1/42, 1, 0.101, -4 in ascending order.
-4, 1/42, 0.101, 1
Sort -2925963, -4, -13 in descending order.
-4, -13, -2925963
Sort 0, -757, -2518.
-2518, -757, 0
Sort 8, 1997542, 5, 1.
1, 5, 8, 1997542
Sort 1/4, -1/311741, -3/2 in decreasing order.
1/4, -1/311741, -3/2
Put -5, -997, 1, -11, -450 in increasing order.
-997, -450, -11, -5, 1
Sort 2, 1, 1650, -1, 4, -32 in ascending order.
-32, -1, 1, 2, 4, 1650
Sort -606, 38, -37, 1/4, -1.
-606, -37, -1, 1/4, 38
Put 0.09, 125, 1/2, -2, 4, -1/12 in descending order.
125, 4, 1/2, 0.09, -1/12, -2
Put 0.2, -5, 100, 1180 in decreasing order.
1180, 100, 0.2, -5
Sort 65, 2/1421, -8, 2/463 in descending order.
65, 2/463, 2/1421, -8
Sort -11, -2, 2702, 5.
-11, -2, 5, 2702
Put 4, 3, 230857, 14 in increasing order.
3, 4, 14, 230857
Sort -7, -1, -1297904 in decreasing order.
-1, -7, -1297904
Put 289, 5, 955 in descending order.
955, 289, 5
Sort 1111, 0.2, -24050, 2 in increasing order.
-24050, 0.2, 2, 1111
Sort -5, 3/2, 1953, 0.056, -1/2.
-5, -1/2, 0.056, 3/2, 1953
Sort 2, 32, 176, -208, 1.
-208, 1, 2, 32, 176
Put 4, -1, 132, 3333 in descending order.
3333, 132, 4, -1
Sort -1072, 1360, 0.
-1072, 0, 1360
Put -25, -2.313479, 5 in descending order.
5, -2.313479, -25
Put -0.2, -639, 0, 290 in increasing order.
-639, -0.2, 0, 290
Put -3, -17, -4, 88299 in descending order.
88299, -3, -4, -17
Put -1/8, 5, 4/5449, 152 in descending order.
152, 5, 4/5449, -1/8
Sort 322, 23, -2, -6.
-6, -2, 23, 322
Sort -2, -11, 4, -3, -277, 2, -609 in decreasing order.
4, 2, -2, -3, -11, -277, -609
Put -0.5, -0.1, -1, 4, -1773 in increasing order.
-1773, -1, -0.5, -0.1, 4
Sort 6, 43, 1144, 0, 411 in descending order.
1144, 411, 43, 6, 0
Put 1, 4, -2, 53, -7491, 0 in increasing order.
-7491, -2, 0, 1, 4, 53
Sort -2/9, -5, 0, 1, 24.4, -15, 1/2 in increasing order.
-15, -5, -2/9, 0, 1/2, 1, 24.4
Sort 5, 84, -4, 1, 4, 1939, -2 in descending order.
1939, 84, 5, 4, 1, -2, -4
Put 4, -2, 0, 28067 in descending order.
28067, 4, 0, -2
Sort 1, 2, 0.2, 4, -1/13, -44 in descending order.
4, 2, 1, 0.2, -1/13, -44
Sort 0.291, -80, 3, 0, 2/19, 1/8 in increasing order.
-80, 0, 2/19, 1/8, 0.291, 3
Sort 3, 2, 1, 6, 1900, -5, -7.
-7, -5, 1, 2, 3, 6, 1900
Sort 1, 18008, -1113 in ascending order.
-1113, 1, 18008
Put -4, 36352.4, 15/8 in descending order.
36352.4, 15/8, -4
Sort 31/354, 0, 2/9, | 2023-10-05T01:27:17.568517 | https://example.com/article/5326 |
The baffled journalists at CBS finally discovered what should be a massive story: ObamaCare premiums will skyrocket in 2017 by 25 percent. Yet, after ignoring the story on Monday, CBS This Morning allowed a scant 88 seconds on Tuesday. This is despite the fact that co-host Norah O’Donnell called the development a “big story” and “really interesting.” NBC, which also initially skipped the report, managed to cover it on Tuesday.
On CBS, Gayle King explained that “millions of Americans face a huge increase in ObamaCare premiums and fewer insurance choices.” She oddly stated that “about one in five consumers will be able to choose from only one provider.” (If you have only one option, it’s not a “choice.”) After O’Donnell’s 32 second news brief, O’Donnell, without any irony, marveled, “That’s a big story.”
In the 8AM hour, the show’s hosts came back to the story, but only for another 56 seconds. After explaining that consumers in 39 states will be hit by this price hike, O’Donnell marveled, “We need a bigger understanding of why this is happening.” As though the problems with ObamaCare were completely foreign, she sputtered:
NORAH O’DONNELL: Because the idea was not only to spread coverage around, but that by spreading the coverage around, not only help people get more preventative care. But then it would ultimately bring costs down. And instead, the premiums are skyrocketing! CHARLIE ROSE: And so the question is, what happened? O'DONNELL: Yeah. And who's profiting on this?
She closed the brief segment by reiterating, “It's a really interesting story.” Of course, considering that the CBS program allowed less than a minute and a half total, it can’t be that “big” or interesting."
<<< Please consider helping NewsBusters financially with your tax-deductible contribution today >>>
NBC censored the health care news on Monday night, but mentioned it in on NBC’s Today for a mere 58 seconds (in a news brief and as part of a separate story). Matt Lauer used the same contradictory language, saying, “Many consumers will only have one insurer to choose from.” Reporter Hallie Jackson included the President’s spin, promoting, “The administration argues things are better now than before the law was passed.”
ABC covered the price increase on World News Tonight, Monday, but only in a brief. On Good Morning America, Amy Robach allowed 13 seconds:
AMY ROBACH: Well, get ready for sticker shock if you're looking into the price of ObamaCare plans. The average premiums are expected to rise by 25 percent next year. Many consumers will also be limited to choosing plans from just one provider.
Notice that she, too, used the language of one option being a “choice.”
The totals for Tuesday: CBS allowed 88 seconds. NBC managed 58 seconds and ABC just 13 seconds. Perhaps the networks just aren’t interested in talking about an issue that could be very unpopular for Hillary Clinton.
Transcripts of the CBS coverage can be found below: | 2024-06-12T01:27:17.568517 | https://example.com/article/8801 |
Q:
Play Framework Scala: Run "test" before "run" in the triggered execution mode
Everytime I change code in the project I would like to run two separate sbt actions in this order:
test
run
I thought it is possible with activator/sbt commands like ~ ; test ; run, but it sticks to "run" and don't do any testing until I break sequence with Ctrl-D.
Is this possible to run "test" action before "run" in triggered execution mode?
A:
Because of the nature of run it won't re-run test on a code change. What perhaps might work for you is to have 2 sbt shells open, one with ~test and one with ~run.
A note of warning though, multiple sbt shells, especially in trigger execution, can trip over itself because there's limited locking on the relevant files - which is one of the things sbt server hopes to solve.
| 2024-02-20T01:27:17.568517 | https://example.com/article/4811 |
#
# SPARQL
#
# SELECT ?X ?Y1 ?Y2 ?Y3 WHERE {
# ?X ub:memberOf %<fromPredicate> .
# ?X ub:name ?Y1 .
# ?X ub:advisor ?Y2 .
# ?Y2 ub:emailAddress ?Y3 .
# }
#
#
# Plan
#
# SELECT ?X ?Y1 ?Y2 ?Y3 WHERE {
# ?X ub:memberOf %<fromPredicate> <-
# ?X ub:name ?Y1 .
# ?X ub:advisor ?Y2 .
# ?Y2 ub:emailAddress ?Y3 .
# }
#
1 <
2 >
3 >
4 >
| 2024-06-27T01:27:17.568517 | https://example.com/article/1803 |
Logansport Pharos-Tribune from Logansport, Indiana · Page 21
Page 21 article text (OCR)
To
go
Below
Us
in
Price,
is
to
go
Below
Us
in
Quality.
Some
Surprise
for
You
We
want
to
show
you
a
kind
of
clothing
that
yon
won't
find
in
•Another
store
in
Logansport.
Perhaps
better
than
some
of
you
have
any
idea
is
made
up,
ready
to
wear.
It's
the
kind
that
you
-would
credit
to
the
custom
tailors.
The
"kind
you'd
think
would
cost
twice
as
much
as
it
will.
The
kind
the
most
particular
dresser
will
find
satisfactory.
Full
of
fashions,
whims,
'
-full
of
quality,
full
of
bestness,
'til
there's
uo
room
for
fault
finding.
;
"We've
got
these
up-to-date
exclusive
styles
in
Suits
and
Overcoats
because
we
make
mem
ourselves.
Our
work
rooms
are
manned
by
the
cleverest
talent
in
the
country.
We
have
brought
fit
down
to
the
fine
point
of
perfection.
We
import
direct
from
the
looms,
the
latest
•weaves
in
the
newest
paterns.
/There
Positively
can
be
Nothing
Better
Than
the
Grarments
We
Turn
Out.
|(
And
all
this
fineness
is
in
our
grades
from
$7.oO
to
$18.00.
I
We're
not
talking
to
your
purses,
but
to
your
good
judgement
,f
We're
not
talking
a
saving
in
momey,
but
an
quality
and
satisfaction
that
many
will
buy.
increase
in
the
We
win
patronage
by
deserving
it.
If
you
want
I
the
best
go
to*^^^
THR
HUB,
Harry
Fraik's
Old
Stand.
313
Fourth
Street.
for
50c
Underwear,
and
White
Body
Fancy
Front
Shirts,
with
extra
'•••Cuffs,
the
best
in
Logansport
at
"THE
HUB."
Young,
THE
MERCHANT
TAILOR
THIS
FALL
For
A
Si-iit
or
Overcoat
<He
Makes
Stylish
Garments.
All
Work
Guaranteed.
304
Market
Street,
Over
Coulson's
Drug
Store.
/W.
R.
HENING
&
CO.
Successor;
to
Equitable
Produce
and.
Htoek
Kxchansre.
I.
Capital
Stook
flOO.OOO,
fully
paid.
Members
I
of
Consolidated
Produce
and
atook
Exchange,
]
.
We
furnish
our
customers
dally
market
re-
i
tport*
over
cur
private
wires
In
thlBOitr.
we
*e*peotfully
solicit
your
vatronage
through
.
our
local
OjrreBp&ndenta
W.
W.
Milner-
«.
A.
«.
BniKUnx.
Locauapurt.
Bell
Telephone
260,
Mutual
Telephone
213,
Ind.
INSURANCE
Of
all
Kinds
Written
by
GEO.
GONSER.
C.
0.
Heffley,
Insurance,
Real
Estate
And
Loans.
308
Fourth
Street.
ELECTRIC
LIGET
PLANT.
The
Origin
of
ihe
Project
and
the
Obstacles
Overcome
In
its
Construction.
Eitlmated
Yalne
of
tbe
Plant
Based
on
It*
Earning
Capacity.
Mr.
Editor:
Owing
to
the
many
uncalled
for
charges
made
by
some
citizens
of
Logaosport
either
through
Ignorance
or
motives
of
some
otner
nature
against
the
electric
light
plant
and
Its
promoters,
causes
me
to
come
forward
with
this
statement
of
facts
in
order
that
the
people
of
Logansport,
and
particularly
the
few
who
seemed
to
be
cbe
loudest
In
con-j
'demning
this
plant
will
see
the
ab
surdity
of
their
actions
and
recal
their
charges,
which
was
made
b;
them
without
the
least
knowledge
o
the
genuine
truths
concerning
the
construction
of
this
splendid
plant
It
is
partly
for
their
interest)
make
this
statement
public,
and
hope
they
will
be
charitable
enough
to
believe
every
word
of
It,
for
'.
make
It
in
a
spirit
of
candor
am
hope
that
all
who
read
it
will
coin
clfle
with
me
that
the
Investment
ii
one
of
the
most
sagacious
and
best
financiered
plans
that
was
ever
made
for
the
benefit
of
Logansport
and
her
citizens,
and
you
can
Imagine
how
harrowing
it
Is
to
me,
knowing
as
I
do,
the
great
benefits
that
are
forthcoming
from
the
earnings
of
this
plant,
which
In
fact
at
this
early
day
hat
been
fully
shown
to
the
satisfaction
of
all
who
want
to
be
lleve.
Therefore
I
say
that
It
is
un
just
for
people
to
cast
uncharitable
insinuations
on
the
plant
or
it«
promoters
when
they
are
not
in
possession
of
the
facts
to
justify
such
charges,
but
like
a
great
many
other
things
that
are
being
continually
repeated,
the
people
become
confident
that
they
are
facts,
and
believe
them.
Such
must
be
the
case
with
some
of
the
members
of
the
common
council
at
their
last
meeting,
judging
from
their
remarks,
and
particularly
so
with
Mr.
Boyer
when
he
openly
declared
that
he
was
not
to
blame
for
the
purchase
of
the
machinery
of
the
electric
light
plant,
that
it
was
a
committee
of
Demo
crats
which
had
a
Democratic
majority
who
was
to
blame
for
all
such
baa
Investments.
Granting
Mr.
Boyer
that
he
wan
not
with
the
majority
at
the
time
when
the
original
purchase
was
made
and
that
it
was
a
DR.
F.
M.
BOZER'S
DENTAL
PARLORS.
Over
City
National
Bank
Corner
ot
Fourth
and
Broadwa^
Insurance
and
Loans.
All
kinds
of
Insurance
and
Bonds
written
In
first
class
com
tlouej
to
loan
8
per
cent,
S.
M.
Closson,319
Pearl
St.
Kroeger
&
Strain.
UN
D
HRTAKHR8
Call*
promptly
attended
to
Day
or
r«L«PHON«
—
Office,
«.
Krooget.
Mratn.
H.
If
You
Want
to
Borrow
Money
On
City
or
Farm
Property
c*li
on
8RTH
M.
YHLxSR.Y,
—804
Fourth
Street.—
He
can
make
you
a
Loan
ot
»25
and
upward
'nterett
ou
sums
over
fSOO
8
per
cent.
HENRY
WEBER,
The
Merchant
Tailor,
doe*
first
class
work.
Stylish
and
well
fitting
clothes
made.
Cleaning-
and
repair-
Ing
neatly
iloce.
See
him.
324
PEARL
STREET.
D.
E.
DELZELL,
Dentist,
416
MARKET
STREET
•Dpetalrs
over
Bruggeman's
Millinery
Store.
GEOBGrE
W.
RODEFER,
feal
Estate,
Loans.
Bomfet,aoldorKxohaiiaed.
4*mortO(eorp«r*onaT»Muril7.
Gallon
me
••r
witt*
to
me
at
So.
U
Bel
Hirer
»*eAU«,eaK
•••ft
ookarlrat
«ree«
bridge.;
OITY
NBLWS.
Judge
Lalry
was
In
Peru
today
on
legal
business.
John
Dunn,
jr.,
18
down
from
Chicago,
visiting
his
parents.
Go
with
the
crowds
to
the
great
autumn
sale—Golden
Rule.
M1S9
Grace
Tyner,
of
Helm
street,
baa
returned
from
a
visit
to
Kokomo
anl
Tipton.
7-yard
French
Imported
pattern
sultsi
12.69
at
the
great
October
sale.
—Golden
Rule.
Peru
Journal:
Mrs.
Howe,
of
Logansport,
Is
visiting
her
sister,
Mrs.
Patrick
Glennon.
Mrs.
A,
E.
Borgess,
of
Lafayette,
Is
the
guest
of
her
sister,
Mrs.
S.
&.
Eldrlge,
of
Toledo
street.
County
Auditor
Powell
was
In
Harttord
City
today
looking
after
his
farming
Interests
there,
St.
George
Commandery,
Kolghts
of
St.
John,
gave
an
exhibition
drill
last
evening
at
the
St.
Joseph's
bazaar.
The
members
of
the
W.
C.
T.
U.
held
their
regular
meeting
at
2:30
this
afternoon
at
the
Home
for
the
Friendless.
Wanted—An
energetic
educated
man,
weekly
salary.
Call
at
414
North
street,
from
9
to
12
a.
m.
L.
H,
Beeler.
I
want
to
buy
$25,000;
good
notes
and
judgments.
I
want
to
loan,
to
good
people,
$50,000,
on
mortgage,
or
personal
security—Geo.
B.
Forgy.
Esquire
Fender
went
to
Royal
Center
today
to
consult
with
Esquire
Klstler
and
Dr.
Klstler
in
regard
to
the
alleged
Insanity
of
a
Miss
Berkshire.
Richmond
Item:
Patrick
Flannl-
jan,
formerly
of
this
city
and
now
of
Chicago,
who
has
been
visiting
'rlends
here,
went
to
Logansport
ilonday
evening.
Mrs.
Charles
H.
Davis
and
Mrs.
Edith
Wilson,
of
Wabash,
visiting
members
to
the
banquet
of
the
Order
3f
Eastern
Star;
are
guests
of
Mrs.
•eorge
P.
Bliss,
of
916
Market
street.
Last
evening
while
Walter
Brown
was
visiting
at
the
residence
of
John
Murphy,
No.
604
Miami
street,
some
mischievous
person
took
his
bicycle
rom
the
front
yard
where
he
had
eft
it
and
placed
It
in
a
yard
a
few
squares
west.
Brown
reported
the
matter
to
the
police
and
the
wheel
wu
brought
in
two
hours
later
by
Patrolman
Nadlng.
Democratic
chairman
who
formulated
the
plans
to
buy
for
the
city
without
any
money
the
magnificent
plant
which
she
owns
today,
which
can
be
sold
ror
$250,000
to
syndicates
and
at
that
price
bring
10
per
cent
net
on
the
investment.
We
have
today
159
arc
lights
on
our
streets
and
In
the
neighborhood
of
30
merchant
arc
lights,
making
in
round
numbers
189,
which
are
worth
per
year
ISO
each
light—total
$15,120.
We
have
demands
for
10.000
Incandescent
lamps,
which,
at
a
low
estimate,
calculating
for
each
lamp
82.25
per
year,
122,500,
making
a
total
of
137,620.
The
total
running
expenses
,
for
everything
per
year,
liberal
estimate,
112,000—balance,
125,620;
interest
on
1250,000
at
6
per
cent,
$15,000;
balance
to
apply
on
princlpaH10,620
each
year
shows
that
the
Investment
would
be
a
good
one
at
1250,000.
Thus
you
see
how
profitable
this
Investment
can
be
made
with
the
proper
intelligent
economical
management,
so
that
its
income
will
be
$20,000
to
$25,000
a
year
net,
water'
workfi
net
earnings
816,000
to
$IS,
000,
liquor
license
113,500,
making
responsible
for
any
bsd
Judgment
used
in
tbe
purchase
of
the
plant,
h
knows
that
he
was
with
me
as
the
principal
advocate
In
the
purchase
of
this
plant,
and
I
am
proud
of
ray
knowledge
in
engineering
the
whole
matter.
I
had
more
experience
in
that
line
than
any
of
the
other
members,
having
had
tbe
manage-
of
tbe
old
plant
for
about
three
years,
so
I
wish
my
friends
and
Democrats
at
large
will
not
charge
the
mistake
if
any
In
their
own
opinion
for
the
purchase
of
all
the
machinery
that
it
took
to
complete
the
plant
originally,
for
it
was
I
that
dictated
the
original
purchase,
and
I
with
pleasure
accept
all
the
responsibility
of
any
bad
judgment
used
in
that
purchase.
This
purchase
was
made
a
short
time
before
I
left
the
council.
Any
changes
made
for
Increased
ma
chlnery
made
after
that
time
I
am
not
responsible
for.
I
will
now
explain
and
defend
the
original
purchase
to
your
satisfaction.
As
stated
before,
we
had
no
money
to
purchase,
aod
constructed
a
plant
that
cost
originally
»60,000.
except
about
19,000
acquired
from
a
levy
of
15
per
cent
the
year
before
contract
ing,
I
had
formulated
the
plan
of
payments
same
as
we
were
paying
the
old
company
for
lights,
which
was
nearly
11,000
per
month.
I
submitted
these
plans
to
all
the
electrical
manufacturing
companies
and
had
their
prices
sent
in,
which
were
afterwards
all
withdrawn
on
account
of
our
condition
finaacially,
which
forbid
us
from
going
in
debt,
as
we
were
then
in
debt
more
than
tbe
law
allowed,
hence
In
every
Instance
our
proposition
to
purchase
on
the
installment
plan
was
rejected
and
the
newly
designed
plant
was
about
to
be
abandoned,
and
my
time
In
the
council
would
expire
in
four
weeks,
when
I
took
a
trip
to
Ohlcagro
to
see
the
Standard
Electric
company
and
see
If
I
could
Induce
them
to
accept
the
contract
on
the
installment
plan.
I
succeeded
In
getting
them
to
accept
the
proposition,
iind
hence
the
contract
was
made
l!or
the
machinery,
lines,
poles
and
everything
complete
put
up,
ready
to
run,
for
$35,000.
Ten
thousand
dollars
was
paid
when
the
machinery
was
running
and
the
balance
was
paya.ble
in
twenty-five
months,
at
the
rate
of
$1,000
per
month,payment
to
be
made
about
the
same
as
we
were
paying
the
old
company
per
month,
hence
a
saving
of
^5,000,
which
would
have
been
paid
to
the
company,
and
g
better
lighted
an
income
from
these
150,000
to
should
be
$55,000
a
enough
to
resources
o
year,
which
pay
all
the
general
fund
expenses
of
running
the
city,
whereby
our
town
would
be
come
popular
for
capitalists
to
invesi
their
money,
and
general
prosperity
woulcl
prevail
all
over
the
clcy.
So
much
said
for
the
electric
light
plant
and
Us
Income,
I
will
now
proceed
to
explain
why
the
connnittes
originally
did
not
purchase
larger
incan
descent
machinery.
You
are
all
aware
that
the
cllty
is
today
largely
In
debt,
and
had
been
when
the
electric
light
plant
was
contracted
for,
much
over
the
2
per
cent
valuation
law,
which
debarred
the
council
from
going
any
more
in
debt.
TOD
are
also
aware
that
the
city
was
paying
an
electric
light
plant
which
was
charging
$100
per
year
for
each
lamp
on
oar
streets,
wh'ch
amounted
yearly
to
about
»10,'000.
This
had
been
the
case
with
the
city,
and
the
old
electric
light
plant
since
1S32,
I
think,
and
continued
up
to
1893.
making
a
period
of
eleven
years.
Think
of
the
enormous
sum
of
money
paid
out
to
these
Dtople
at
such
'enormous
prices.
The
members
of
the
council
always
felt
anxious
to
change
this
condition,
but
was
always
confronted
with
the
bad
condition
of
the
treasury
and
therefore
could
not
change
from
purchasing
the
old
lights
at
»100
per
year
for
about
two-thirds
of
the
lights
we
have
now.
At
last
we
got
a
council
that
*was
Democratic
in
members,bnt
in
transacting
the
business
interests
of
the
city
thew
was
no
political
interests
adhered
to,
and
while
Mr.
Boyer
remarked
tiiat
the
Democrats
was
towc,as
we
have
sixty-five
more
lights
on
the
streets
than
we
had
before.
So
much
for
small
machinery,
and
this
same
machinery
is
running
the
157
street
lamps
and
about
thirty
merchant
arc
lamps
with
the
same
dentical
dynamos,engines
and
water
wheels
that
were
originally
purcbasec
'or
that
use.
When
the
origica
committee
purchased
the
plant
the
did
not
make
much
ado
about
the
in
candescent
part
of
It.
We
had
n
money
and
we
did
not
want
to
go
In
•ery
largely
in
the
iccandescen
tghting
business
for
the
reason
tha
1
t
would
take
a
great
deal
of
mone;
iO
extend
a
heavy^copper
wire
line
al
iver
the
city.
We
also
had
the
old
ilectrlc
light
plant
to
contend
with
,nd
we
therefore
contented
ourselvei
with
the
purchase
of
two
1,200
light
ynamos,
which
would
produce
2,400
Ights
for
merchant
lighting
where
he
consumers
were
largis
and
close
ogether.
Reasoning
with
this
reposition
that
as
we
had
no
money
we
would
wait
until
the
plant
would
make
money
before
we
would
go
farther
in
debt,
when
we
would
extend
the
incandescent
line
as
consumers
became
more
concentrated,
whereby
we
would
not
go
so
far
for
a
few
lights,
at
a
great
expense.
These
two
incandescent
dynamos,
with
a
capacity
of
2,400
lamps,
were
replaced
a
few
monttxs
after
they
were
started
with
two
larger
dynamos
of
3,600
lights,
thus
getting
an
increase
of
1,200
lights
for
an
additional
cost
of
1500,
which
was
only
about
one-
third
the
price
of
the
additional
1,200
lights,
which
was
an
exceptionally
good
bargain
for
the
city.
These
two
1,800
light
dynamos
are
doing
>
»«»«»••••»»•••»*«»»••»»»•»«»«•««»«»»••»••••••••••«»+
J.
D.
Ferguson
&
Jenks.
322
Market
Street,
Loganspcrt,
Indiana,
t
Men's
Suits.
Boys'
"
Chld'ns
"
Men's
Overcoats
and
Ulsters
Boys'
Children's
((
It
t«
-MACKINTOSHES.
Fall
and
Winter
Underwear,
"
"
"
Hats
and
Caps,
"
"
"
Shirts,
Sweaters,
etc.
"
"
[j
u
Gloves
and
Mittens,
"
"
"
Neckwear.
Children's
Department
Complete
i
We
have
used
our
BEST
JUDGMENT,
and
the
utmost
caution
in
the
selection
ol
our
present
FALL
STOCK,
and
undoubtedly
have
the
finest
line
of
goods,
in
all
departments
ever
offered
the
citizens
of
tku
county,
at
very
Lowest
Prices.
•Call
and
see
us.
We
will
be
glad
to
show
«nr
goods,
and
are
satisfitd
we
can
save
you
money.
Money
Back
if
Goods
are
Not
Satisfactory.
flood
service
today.
I
make
this
itatement
In
order
that
you
may
know
what
was
done
while
I
wag
chairman
of
the
electric
light
committee,
which
was
Democratic,
and
I
can
assure
you
that
I
am
exceedingly
proud
of
It
and
defy
intelligent
censure
in
any
shape
or
form,
and
I
will
again
repeat
chat
the
plant
can
be
sold
today
lor
1250,000.
Yours
truly,
WM.
AMUSEMENTS,
FOOTLI6BT
FLASHES.
Robert
Downing
In
"Tho
Gladiator"
Tonight—Tim
Mnrphy
In
"Old
Innocence"
Friday
Night.
Poor
aid
Weak
Catarrh
and
Bronchial
Trouble
—
Had
no
Appetite—Now
Better
In
Every
Way-A
Delicate
Child.
"Some
time
since
I
'took
a
sudden
cold
and
conld
not
get
rid
of
it.
Being
subject
to
catarrh
and
bronchial
trouble
I
coughed
terribly.
I
loft
my
appetite
and
grew
poor
and
weak
and
I
did
not
feel
like
work.
I
began
taking
Hood's
Sarsapa-
rilia.
In
a
short
time
the
cough
disappeared,
I
slept
well,
had
a
good
appetite
and
I
was
better
in
every
way.
Last
spring
I
was
not
feeling
well,
I
had
no
appetite
and
no
strength.
I
resorted
to
Hood's
Sarsaparilla
and
soon
felt
more
like
work.
My
little
nephew
was
a
delicate
child
and
had
a
humor
which
tron-
bled
M™
so
he
could
not
rest
at
night.
He
has
taken
a
few
bottles
of
Hood's
Sai-
gaparilla
and
now
he
has
a
good
appetite
arid
is
able
to
uleep."
MEM
ABBIE
J.
,
South
Dnibory,
Mass.
Sarsaparilla
ti
the
One
True
Blood
Purifier.
AB
druggists.
»T.
Hood's
Hnnri'e
Pillc
»«the
best
atar-dlmier
llOOU
S
rlllS
pQjj,
aid
digestion.
Vc.
Logansport
play
goers
still
have
heir
choice
of
two
extremes
this
week,
and
in
arranging
the
bill
Manager
Dolan
has
displayed
ercel-
ent
judgment.
Tonight
that
splendid
young
tragedian,
Robert
Downing,
supported
y
a
select
company,
will
present
'The
Gladiator."
It
Is
In
connection
with
this
famous
play
that
Mr.
Downing's
great-
st
successes
have
been
achieved,
and
his
superb
rendition
of
the
leading
ole
has
given
it
a
place
among
the
lassies
o£
the
stage.
Since
his
first
reduction
of
the
p'ay
which
brought
him
fame
and
artistic
success
he
has
essayed
nearly
all
the
more
prominent
roies
of
the
legitimate
drama,
and
with
pronounced
success,
but
he
still
retains
his
fondness
for
his
first
triumph
and
declares
that
it
will
always
have
a
prominent
place
in
his
repertoire
The
thoughtful
observer
of
our
stage
sees
In
Robert
Downing
an
adequate
representation
of
the
persons
and
the
ideas
that,
are
embodied
in
these
heroes
of
t
je
drama,
and
finds
exceptional
satt
.faction
in
the
sense
of
magnificent
^ower
which
he
conveys
in
his
interpretation
of
the
role.
TIM
MURPI.Y.
There
is
nothing
h'/h-sounding
or
inspiring
in
that
nime.
But
what
is
there
in
a
name?
Tim
Murphy
is
already
a
popular
favorite
in
Logansport.
He
is
an
artist
whose
versatility
is
an
unknown
quantity
and
in
his
present
dpuble
bill
he
presents
at
each
performance
he
assumes
many
widely
different
chtracters,
from
tragedy
to
comedy,
a
performance
simply
marvelous
and
ascritl-
Ized
by
a
prominent
critic
stamps
Mr.
Murphy
the
nineteenth
century
David
Garrlct.
He
and
his
merry
assistants,
including
dainty
and
vivacious
Dorothy
Sherwood,
will
hold
the
boards
at
Dolan's
Friday
night.
D
OLA/T8
OPBRA
HOPSB.
•
*
•
•
i
Wednesday,
Oct.
22.
12th
Annual
Tour,
AMERICA'S
TRAGEDIAN,
••
RoBerf
Downing
••
Supported
by
a
company
who
can
aet.
Directed
by
W,
A.
McOonnell.
Presenting
Samuel's
Sublime
Tragedy,
THE
GLADIATOR.
Prices—25c
35o
50c
75c
and
•!.
D
OLAN'S
OPEBA
HOtJtiE.
me.
DOLAN,
MANAGES.
Friday
Eve.
Oct.
29.
Return
Engagement
of
the
Eminent
Comedian.
TIM
MURPHY
In
a
Great
Double
Bill
The
Laughing-
Success
In
Three
Acto,
"OLD
INNOCENCE"
and
the
Great
Character
Novelty
"Sir
Henry
Hypnotized"
In
which
Mr,
Murphy
ffiveg
hli
impersonation*
of
Famous
Actors,
MgiMed
by
Dorothy
Sherrod
and
Gluey
J.
Griffin.
PRICES.
.,25c,
50o,
75c
and
11.00.
Seat
a
on
gale
at
Johnston'1
drug
«tor*.
McCoy's
New
European
Hotel
COR.
CLARK
AND
VAN
BOftEh
.H.
CHICAGO.
Circuit
Conrt.
The
suit
o?
Wm.
Dolan
against
George
A.
Helvle
and
others
on
a
0
note,
which
proved
a
forgery,
was
dismissed
at
plaintiff's
cost.
la
the
suit
of
George
T.
McGrifl,
John
W.
McGrlfT
and
Euth
Martin
.gainst
Wm.
T.
McGriff
plaintiffs
were
each
awarded
judgment
in
the
um
of
1200.
Abram
H.
Wolf
was
awarded
judgment
against
Maudel
Dlamondstone
or
$3,671.80
and
against
Marshall,
Field
&
Co.,
for
$735.87.
Both
cases
were
appealed
to
the
Supreme
court.
A.
Bnnaway.
Mrs.
William
Arnold,
of
the
Southside,
sustained
a
very
serious
njnjy
yesterday
while
out
riding.
The
horse
started
to
ran
at
a
point
n
Burlington
avenue,
and
Mrs.
Arnold
was
thrown
out,
and
falling
n
her
head
received
very
ptln-
al
business.
She
was
taken
to
her
10me
in
an
unconscious
condition.
FIRE
PROOF.
One
block
from
C.
R.
I.
it
P.
and.
L.
S.
A.
W.
8.
Railroad,
depot.
Improvements
costing
$75,000.00
hlvt
just
been
completed,
and
the
house
now
offers
every
convenience
to
b«
found
in
any
hotel,
including
hot
and
cold
water,
electric
light
and
steam
heat
In
every
room.
Rates
75
cents
per
day
and
upwards.
First
class
restaurant
in
connection.
WILLIAM
McCOY,
Owner
ud
Proprietor,
Smoke'the
Oolnnbis
cigar
THR
City
National
Bank.
LOOAXSPOHT,
IJDO.
CAPITAL
......
$200.000
GHAT,
President,
L
N.
CRAWFORD,
Vice
Pret.
F.
R.
FOWLER,
Cashier.
-DIBECTOR8-
Joto
Graj,
I.
S
Crawford,
J.
T.
Elliott,
Dr.
W.
H.
B«li.
A.
P.
Jenm,
W.
C.
Pennock,
Iiae*
Shldeler.
Creo.
w,
Fujik
and
John
C.
Intmn
.
-
Loan
money
on
penonal
and
oollateru
security.
Bur
and
sell
Gorernment
boodi.
Wilt
pay
2
per
oeni
nor
annum
on
oertiftoatet
of
depoditg,
when
deposited
sii
month*
;
(
per
cent
per
annum
when
left
one
Tear.
Boze«
In
Safety
Deposit
Vaulta,
for
ialo
keeplag
of
vuluibte
papers,
rented
a*
fK
to
$15
per
r
oar.
_
_^_____
The
soothing,
lung-healing
virtue*
01
the
newly
eat
pine
are
all
embodied
In
Dr.
Wood'i
Norway
Pln«
Syr
op,
the
sovereign
remedy
for
ooogbt,
and
colfli,
and
lung
Gtroa&M
of
all
aorta. | 2023-09-20T01:27:17.568517 | https://example.com/article/4052 |
Numerous display boards are available on the market today for displaying certain data for use in programming or scheduling. One of the problems with these prior art boards is their initial cost to the ultimate user. Another problem is that these boards usually have a finite capability for displaying data thus limiting the amount of material that can be displayed. Another problem is that these boards usually have a relatively heavy frame approximately the same size as the maximum display area of the board. This makes the board cumbersome to mount and use. Another problem with the prior art boards is the inability of the board to be quickly rearranged for different types of display. This has caused the user to maintain a substantial inventory of boards for use with different displays. Also, the prior art has, in many instances, been unable to have the projects thereon reordered as required without requiring a substantial number of man hours. Yet, another problem with prior art boards has been the inability to provide a permanent record once the project was complete. | 2024-07-27T01:27:17.568517 | https://example.com/article/2073 |
{*
* 2007-2016 PrestaShop
*
* NOTICE OF LICENSE
*
* This source file is subject to the Academic Free License (AFL 3.0)
* that is bundled with this package in the file LICENSE.txt.
* It is also available through the world-wide-web at this URL:
* http://opensource.org/licenses/afl-3.0.php
* If you did not receive a copy of the license and are unable to
* obtain it through the world-wide-web, please send an email
* to license@prestashop.com so we can send you a copy immediately.
*
* DISCLAIMER
*
* Do not edit or add to this file if you wish to upgrade PrestaShop to newer
* versions in the future. If you wish to customize PrestaShop for your
* needs please refer to http://www.prestashop.com for more information.
*
* @author PrestaShop SA <contact@prestashop.com>
* @copyright 2007-2016 PrestaShop SA
* @license http://opensource.org/licenses/afl-3.0.php Academic Free License (AFL 3.0)
* International Registered Trademark & Property of PrestaShop SA
*}
{if isset($display_multishop_checkboxes) && $display_multishop_checkboxes}
<div class="panel clearfix">
<label class="control-label col-lg-3">
<i class="icon-sitemap"></i> {l s='Multistore'}
</label>
<div class="col-lg-9">
<div class="row">
<div class="col-lg-4">
<span class="switch prestashop-switch">
<input type="radio" name="multishop_{$product_tab}" id="multishop_{$product_tab}_on" value="1" onclick="$('#product-tab-content-{$product_tab} input[name^=\'multishop_check[\']').attr('checked', true); ProductMultishop.checkAll{$product_tab}()">
<label for="multishop_{$product_tab}_on">
{l s='Yes'}
</label>
<input type="radio" name="multishop_{$product_tab}" id="multishop_{$product_tab}_off" value="0" checked="checked" onclick="$('#product-tab-content-{$product_tab} input[name^=\'multishop_check[\']').attr('checked', false); ProductMultishop.checkAll{$product_tab}()">
<label for="multishop_{$product_tab}_off">
{l s='No'}
</label>
<a class="slide-button btn"></a>
</span>
</div>
</div>
<div class="row">
<div class="col-lg-12">
<p class="help-block">
<strong>{l s='Check / Uncheck all'}</strong> {l s='(If you are editing this page for several shops, some fields may be disabled. If you need to edit them, you will need to check the box for each field)'}
</p>
</div>
</div>
</div>
</div>
{/if}
| 2023-08-13T01:27:17.568517 | https://example.com/article/7233 |
Katy
Katy, Texas, is located west of Houston along I-10. A smaller community sitting in three different counties, Katy is home to about 15,000 residents. The city of Katy is rich with history dating back to the 1800s, when the area was originally named Cane Island after a creek flourishing with cane plants that is still in present-day Katy. The town was not officially named Katy until 1896.
Today, Katy is a vibrant community known for its continued dedication to growth and sustainability. The greater Katy area is much larger than the city itself, and houses nearly 300,000 residents. With several upscale neighborhoods in Katy, the community is thriving and continues to be a great place live in close proximity to Houston, but with the comforts of small-town living. | 2024-05-14T01:27:17.568517 | https://example.com/article/4596 |
---
abstract: 'We calculate the decay rate $\Gamma (B\to X_s\gamma\gamma )$ via intermediate psuedoscalar charmonium $\eta_c$. This process is thought to be the main long-distance contribution which dominates the corresponding inclusive rare B decay. We point out that once the momentum dependence of $\eta_c\to\gamma\gamma$ conversion strength, due to off-shellness of the intermediate $\eta_c$, is taken into account, the rate of this decay mode is reduced. The change in differential decay rate in region of spectrum immediately below $m_{\eta_c}$ is more significant. On the other hand, we point out that the unexpectedly large branching ratio for $B\to X_s\eta''$ which is recently observed by CLEO could indicate a potentially larger long-distance contribution via $\eta''$ resonance.'
address: |
$^a$LINAC Laboratory, The Institute of Physical and Chemical Research (RIKEN)\
2-1 Hirosawa, Wako, Saitama 351-01, Japan\
$^b$ Department of Physics, Ochanomizu University\
1-1 Otsuka 2, Bunkyo-ku,Tokyo 112, Japan
author:
- 'Mohammad R. Ahmady$^a$ [^1] , Emi Kou$^b$[^2] and Akio Sugamoto$^b$[^3]'
date: August 1997
title: |
Intermediate psuedoscalar resonance contributions to $B\to
X_s\gamma \gamma$
---
epsf.tex (\#1 width \#2)[=\#2 ]{}
The rare decays of B meson are quite interesting since, among other reasons, their measurement could point to some clues on physics beyond Standard Model. For this purpose, however, it is essential to isolate the short-distance(SD) contributions from the long-distance(LD) background as only the former is sensitive to virtual exotic particles from “new physics”. For example, the rare dileptonic B decay $B\to
X_s\ell^+\ell^-$($\ell =\mu ,e$) in which the total decay rate is dominated by the LD resonance contribution from intermediate $\psi$ and $\psi'$ vector mesons, much theoretical attentions have been focused on searching for observables and regions of various decay distributions where one can probe SD physics without significant LD interference[@ld; @prd96]. Therefore, for the purpose of extracting reliable conclusions on parameters of Standard Model and beyond from rare B decays, careful consideration of LD effects is of utmost importance.
In this paper, we examine the pure LD contribution to $B\to
X_s\gamma\gamma$ via intermediate psuedoscalar $\eta_c$. This is expected to be the main process dominating the corresponding flavor changing neutral current (FCNC) decay channel[@rrs]. However, we show that a careful consideration of the off-shellness of the intermediate $\eta_c$ could reduce the contribution of this LD mode. In fact, a model calculation of $\eta_c$-photon-photon coupling reveals a drastic suppression of this vertex form factor $f(q^2)$ when $q^2$, the invariant mass of the two photons, is small as compared to when $q^2\approx m_{\eta_c}^2$. Indeed, similar suppression of $\psi$-$\gamma$ conversion strength on photon mass shell as compared to when $\psi$ is on its mass-shell was shown to be responsible for significant reduction of resonance to non-resonance interference in dileptonic rare decays $B\to X_s \ell^+\ell^-$ [@prd96]. Inclusion of this form factor for $\eta_c\to \gamma\gamma$ in the evaluation of $B\to X_s\gamma\gamma$ via $\eta_c$ is our main point in this paper. We also comment on the possibility that the recent CLEO measurement of a large $B\to X_s\eta'$ decay rate could indicate a potentially larger LD contribution to $B\to X_s\gamma\gamma$ via $\eta'$.
We start by writing the effective Hamiltonian for LD $B\to
X_s\gamma\gamma$ via $\eta_c$ which is approximated by quark level decay $b\to s\eta_c\to s\gamma\gamma$. The $\eta_c\to\gamma\gamma$ transition is modeled by a triangle quark loop (Fig. 1) where the coupling of the psuedoscalar meson $\eta_c$ to charm quarks is taken to be a constant: $$T^{\mu\nu}(\eta_c\to\gamma\gamma )=
Nf(q^2)\epsilon^{\mu\nu\alpha\beta}p_{1\alpha}p_{2\beta} \;\; ,$$ where $p_1$ and $p_2$ are the four-momenta of the photons and $q=p_1
+p_2$. The form factor $f(q^2)$ is obtained from the quark loop calculation: $$f(q^2)
\begin{array}[t]{l}
\displaystyle = \int^1_0dx\int_0^{1-x}dy\frac{1}{m_c^2-q^2xy} \\
=\left \{ {
\begin{array}{l}
\displaystyle
\frac{-2}{q^2}arcsin^2\sqrt{\frac{q^2}{4m_c^2}}\;\;\; 0\le q^2\le 4m_c^2
\\
\displaystyle\frac{2}{q^2}{\left [ Ln\left
(\sqrt{\frac{q^2}{4m_c^2}}+\sqrt{\frac{q^2}{4m_c^2}-1}\right
)-\frac{I\pi}{2}\right ]}^2 \;\;\; 4m_c^2\le q^2
\end{array}}
\right .
\;\; ,
\end{array}$$ where $m_c$ is the charm quark mass. The constants are all swept into the factor $N$ which can be obtained using the requirement that for $q^2=m_{\eta_c}^2$ eqn. (1) should yield the experimentally measured decay rate $\Gamma (\eta_c\to\gamma\gamma )$. Consequently, we obtain the following form for the $\eta_c$-$\gamma\gamma$ transition amplitude: $$\displaystyle
A(\eta_c\to\gamma\gamma)= \frac{16i\sqrt{m_{\eta_c}\Gamma
(\eta_c\to\gamma\gamma
)}}{\pi^{3/2}}f(q^2)\epsilon^{\mu\nu\alpha\beta}\epsilon_\mu
(p_1)\epsilon_\nu (p_2)p_{1\alpha}p_{2\beta}\;\; .$$ $\epsilon (p_i)$ is the polarization of the photon with momentum $p_i$. Throughout this paper, we assume weak binding for charmonium and therefore $m_{\eta_c}\approx 2m_c$ is used in our calculations.
Neglecting penguin operators, the relevant effective Hamiltonian for $B\to
X_s\eta_c$ can be written as: $$H_{eff}=\displaystyle \frac{G_F}{\sqrt{2}}V_{cb}^*V_{cs}
\begin{array}[t]{l} \left [ \left ( C_2(\mu ) + \frac{1}{3}C_1(\mu )
\right )
{\bar s}^i\gamma^\mu (1-\gamma_5)b^i
{\bar c}^j\gamma_\mu (1-\gamma_5)c^j \right .\\
\displaystyle\;\; + \left . C_1(\mu ){\bar
s}^i\gamma^\mu
(1-\gamma_5)T^a_{in}b^n{\bar c}^j\gamma_
\mu (1-\gamma_5)T^a_{jm}c^m \right ] +H.C. \; ,
\end{array}$$ where $i$ and $j$ are color indices, $T^a$ ($a=1..8$) are generators of $SU(3)_{\rm color}$, and $C_1(\mu )$ and $C_2(\mu )$ are QCD improved Wilson coefficients. Consequently, assuming factorization, the matrix element for the underlying quark level decay can be simplified as follows: $$<\eta_c s|H_{eff}|b>
\begin{array}[t]{l}
\displaystyle =\frac{G_F}{\sqrt{2}}V_{cb}^*V_{cs}
\left ( C_2(\mu ) + \frac{1}{3}C_1(\mu ) \right ) f_{\eta_c}\bar
s\gamma^\mu (1-\gamma_5)bq_\mu \\
\displaystyle =\frac{G_F}{\sqrt{2}}V_{cb}^*V_{cs}
\left ( C_2(\mu ) + \frac{1}{3}C_1(\mu ) \right ) f_{\eta_c}
\left [ -m_s\bar s(1-\gamma_5)b+m_b\bar s(1+\gamma_5)b\right ]\;\; .
\end{array}$$ In writing (5), the following definition for psuedoscalar decay constant has been utilized: $$<0|\bar c\gamma^\mu\gamma_5c|\eta_c(q)>=f_{\eta_c}q^\mu\;\; .$$ Using (3) and (5), the amplitude for $B\to X_s\gamma\gamma$ via $\eta_c$ can be expressed as: $$A^{LD(\eta_c)}(B\to X_s\gamma\gamma )=
\begin{array}[t]{l}
\displaystyle C f(q^2)\bar s(-m_s(1-\gamma_5)+m_b(1+\gamma_5))b \\
\displaystyle \times
\frac{1}{q^2-m_{\eta_c}^2+im_{\eta_c}\Gamma_{\eta_c}}\epsilon^{\mu\nu\alpha\beta}\epsilon_\mu
(p_1)\epsilon_\nu (p_2)p_{1\alpha}p_{2\beta}\;\; ,
\end{array}$$ where $$C=
\displaystyle
\frac{16iG_F}{\sqrt{2}\pi^{3/2}}\sqrt{m_{\eta_c}\Gamma
(\eta_c\to\gamma\gamma )}V_{cb}^*V_{cs}
\left ( C_2(\mu ) + \frac{1}{3}C_1(\mu ) \right ) f_{\eta_c}\;\; ,$$ and $\Gamma_{\eta_c}$ is the total decay width of $\eta_c$. It is then straightforward to calculate the differential decay rate from (7): $$\frac{d\Gamma^{LD(\eta_c )}(B\to X_s\gamma\gamma )}{ds}=
\begin{array}[t]{l}
\displaystyle \frac{m_b}{512\pi^3}{\vert C\vert}^2{\vert \bar
f(s)\vert}^2\frac{s^2}{{(s-y)}^2+y\frac{\Gamma^2_{\eta_c}}{m_b^2}}\\
\displaystyle \left [ {(1-x)}^2-s(1+x)\right ](1-x) \;\; ,
\end{array}$$ where $${\vert\bar f(s)\vert}^2=\displaystyle \frac{4}{s^2} \left \{
\begin{array}{l}
\displaystyle
arcsin^4\sqrt{\frac{s}{y}}\;\;\; 0\le s\le y \\
\displaystyle {\left [ Ln^2\left
(\sqrt{\frac{s}{y}}+\sqrt{\frac{s}{y}-1}\right )+\frac{\pi^2}{4}\right
]}^2 \;\;\; y\le s
\end{array}
\right .
\;\; .$$ The dimensionless quantities $s$, $x$ and $y$ are $q^2/m_b^2$, $m_s^2/m_b^2$ and $m_{\eta_c}^2/m_b^2$, respectively. In Fig. 2, the form factor ${\vert \bar f(s)\vert}^2$ normalized to its value on $\eta_c$ mass-shell ${\vert \bar f(y)\vert}^2$ is depicted. We notice that for values of $q^2$ immediately below $m_{\eta_c}^2$, ${\vert
f(q^2)\vert}^2$ decreases steeply from ${\vert
f(q^2=m_{\eta_c}^2)\vert}^2$. In fact, ${\vert f^2(0)\vert}^2/{\vert
f^2(q^2=m^2_{\eta_c})\vert}^2\approx 0.16$ which indicates that the momentum dependence of this form factor is quite significant. As we mentioned before, a similar mechanism for intermediate vector mesons $\psi$ and $\psi'$ is believed to suppress the LD contributions to rare decay $B\to X_s\gamma$ [@bsg] and significantly reduces the resonance to nonresonance interference in dileptonic rare B decays $B\to
X_s\ell^+\ell^-$[@prd96].
In our numerical calculations $m_b$, $m_s$ and $f_{\eta_c}$ are taken as $4.8$, $0.5$ and $0.48$ GeV, respectively, and $C_1(\mu )+1/3C_2(\mu
)=0.155$ for $\mu\approx m_b$ is adopted from next-to-leading order calculation[@buras]. Using $$\displaystyle
\frac{G_f^2m_b^5{\vert V_{cb}\vert}^2}{192\pi^3 \Gamma_B} \approx 0.2\;\;
,$$ from semileptonic $B$ decay $B\to X_c\ell\bar{\nu_\ell}$, we obtain $$BR^{LD(\eta_c )}(B\to X_s\gamma\gamma )=9.1\times 10^{-7}\;\; ,$$ which is of the same order of magnitude as the estimated $(2-8)\times
10^{-7}$ SD contributions[@rrs]. At this point, we would like to remark that the total LD branching ratio (via $\eta_c$) is dominated by the peak at $s=m^2_{\eta_c}/m^2_b$. However, had we inserted the constant form factor $f(q^2=m_{\eta_c}^2)$ in (9) rather than $f(q^2)$, a larger branching ratio $BR^{LD(\eta_c )}(B\to X_s\gamma\gamma )=10.1\times
10^{-7}$ would have been resulted. In fig. 3, the invariant mass distribution of the decay rate has been shown (eqn. (9)) and for comparison, the case where $f(q^2=m^2_{\eta_c})$ replaces $f(q^2)$ in (9) is depicted as well. We observe that due to the significant decrease in $\eta_c$-photon-photon coupling strength for $q^2$ values immediately below $m_{\eta_c}^2$, the LD differential decay rate in this region is further reduced. For example, even at $s=0.2$ which is not too close to the resonance, the reduction factor is around $1/3$. This means that a wider range of invariant mass spectrum below $\eta_c$ resonance $0\le s\le 0.39$ is available for probing SD physics.
Now, we turn to another potentially large source of LD contribution to $B\to X_s\gamma\gamma$. Recently, CLEO discovered an unexpectedly large branching ratio for $B\to X_s\eta'$[@cleo] $$BR(B\to X_s\eta'\;\;\;\; 2.2\le E_{\eta'}\le 2.7 {\rm GeV})
=(7.5\pm 1.5\pm 1.1)\times 10^{-4} \;\; .$$ This decay mode can contribute to LD $B\to X_s\gamma\gamma$ by subsequent $\eta'$ decay to two photons. To make a rough estimate of this contribution, we compare the relevant branching ratios for $\eta'$ and $\eta_c$ cases: $$\displaystyle
\frac{BR(B\to X_s\eta' )BR(\eta'\to\gamma\gamma )}{BR(B\to
X_s\eta_c)BR(\eta_c\to\gamma\gamma )}\approx 6 \;\; ,$$ where $BR(B\to X_s\eta_c )\approx 8.7\times 10^{-3}$ has been used[@ak]. This could be an indication that the LD $B\to
X_s\gamma\gamma$ via $\eta'$ may surpass that of $\eta_c$. However, to calculate this contribution more accurately, we need to know the mechanism of such a large $\eta'$ production in nonleptonic $B$ decay. Unfortunately, so far a clear process for $B\to X_s\eta'$ has not been established yet and there are various reservations with regard to suggested mechanisms[@etap]. In any case, a large peak at low $s=m_{\eta'}^2/m_b^2\approx 0.04$ is expected.
In conclusion, we calculated the LD decay process $B\to X_s\gamma\gamma$ via $\eta_c$ taking into account the momentum dependence of $\eta_c$-photon-photon vertex for off mass-shell $\eta_c$. We indicated that a wider range of the invariant mass spectrum below $\eta_c$ resonance could be available for probing SD physics. However, the decay mode via $\eta'$ could be a larger source of LD background to $B\to
X_s\gamma\gamma$ rare decay which ought to be investigated once the mechanism for $B\to X_s\eta'$ is established.
1.0cm [**Acknowledgement**]{}
The authors would like to thank T. Morozumi for useful discussions. M. A. acknowledges support from the Science and Technology Agency of Japan under an STA fellowship.
See for example, A. Ali, T. Mannel and T. Morozumi, Phys. Lett. [**B237**]{} (1991) 505;\
P. J. O’Donnell, M. Sutherland and H. K. K. Tung, Phys. Rev. [**D46**]{} (1992) 4091.
M. R. Ahmady, Phys. Rev. [**D53**]{} (1996) 2843.
L. Reina, G. Ricciardi and A. Soni, HEP-PH/9706253.
N. G. Deshpande, Xiao-Gang He and J. Trampetic, Oregon University Report No. OITS-564 (unpublished);\
G. Eilam, A. Ioannissian, R. R. Mendel and P. Singer, Phys. Rev. [**D53**]{} (1996) 3629.
A. J. Buras, Nucl. Phys. [**B434**]{} (1995) 606.
P. Kim (CLEO), talk at FCNC 97, Santa Monica CA (Feb, 1997).
M. R. Ahmady and E. Kou, HEP-PH/9701224, to appear in Z. Phys. C.
D. Atwood and A. Soni, Phys. Lett. [**B405**]{} (1997) 150;\
I. Halperin and A. Zhitnitsky, HEP-PH/9705251;\
W.-S. Hou and B. Tseng, HEP-PH/9705304;\
A. L. Kagan and A. A. Petrov, HEP-PH/9707354.\
3.0cm [**Figure 1**]{}: The triangle quark loop diagram for $\eta_c$-photon-photon coupling.\
0.5cm [**Figure 2**]{}: The variation of the form factor ${\vert\bar
f(s=q^2/m_b^2)\vert}^2$ normalized to ${\vert\bar
f(y=m_{\eta_c}^2/m_b^2)\vert}^2$ as a function of $s$.\
0.5cm [**Figure 3**]{}: The invariant mass spectrum of the two photons in $B\to
X_s\gamma\gamma$ decay for momentum dependent (solid line) and constant (dashed line) $\eta_c$-photon-photon coupling. The differential branching ratio is in units of $10^{-7}$.
[^1]: Email: ahmady@riken.go.jp
[^2]: Email: kou@fs.cc.ocha.ac.jp
[^3]: Email:sugamoto@phys.ocha.ac.jp
| 2024-01-15T01:27:17.568517 | https://example.com/article/7779 |
Q:
When is $ x(n) = A \cos (\omega_0 n + \phi)\ ,\ n \in \mathbb{Z} $ periodic?
I know that sometimes, discrete time sinusoids are not periodic.
But how can you figure that out?
A:
So, for anyone wondering, as I found here, we're looking for the integer period $N\ ,\ N > 0$ such that
$$ \begin{align}
x(n) &= x(n + N)\\
A \cos (\omega n + \phi) &= A \cos (\omega (n + N) + \phi )\\
A \cos (\omega n + \phi + 2\pi k) &= A \cos (\omega n + \phi + \omega N)\\
\therefore\ 2\pi k &= \omega N\\
N &= \frac{2\pi k}{\omega}
\end{align}
$$
, where $k \in \mathbb{Z}$.
Notice that there may not exist a $k \in \mathbb{Z}$ such that $\frac{2\pi k}{\omega}$ is an integer.
| 2023-12-08T01:27:17.568517 | https://example.com/article/3365 |
Management Team
Chief Instructor
Travis is the Chief Instructor and has over 30 years of consistent and continuous training and study of martial arts and combative engagement. Travis has been awarded his 4th and 3rd degree gradings in Hapkido by Master Fari Salievski. His first degree was also endorsed by Hapkido founder and great: Dojunim Ji and 2nd &1st Degrees were earned under the International Hapkido Alliance by Master Geoff Booth. Travis also holds a 3rd dan grade in Shotokan Karate with his Dan gradings being awarded by the Karate greats: Kanazawa Sensei and Kasuya Sensei. He feels privileged to study grappling under Brazilian Jiu Jitsu (BJJ) great Professor John Will and Mr Danny Weir (EPIC BJJ -Canberra).Travis has also been awarded instructor status under Floro Fighting Systems (FFS) founder Ray Floro.
Travis has also had the honour of studying, and continuing to study with the world leader in Hopology, Mr Hunter Armstrong. In addition, to this Travis has studied various other styles and continuous to improve his knowledge by continuing to study other styles. Travis vows that his mission with ASD is to provide students with martial arts and self defence that are practical and taught professionally and responsibly. He says, “Our students will always have access to the latest in martial arts Best Practice education and benefit of the pre-eminent traditional teachings passed down through the ages.”
Program Director
Elizabeth is the Program Director for ASD and all its courses. Her background in primary teaching, coaching, social work, and corporate training and course writing lends itself well to ensuring the high quality of our curriculum and instructors. Elizabeth’s passion has always been about giving people the chance and tools to improve their lives and have fun along the way. Elizabeth believes that martial arts is unique in its ability to provide people with:
Physical betterment
Liz says “our new students are always reporting in surprise how much stronger and healthier they feel after a few months of our course!”
Cognitive improvement
“Parents frequently comment how much more focused their child is at home and school and how Hapkido seems to lift their performance at school” Liz remarks “.We know that it is the engagement of left and right brain activities”
Affective development
“Motivation, interest, attention and effort are headings that we recognise and fall under affect and it’s influence on our learning,” points out Liz. “Our students learn how to manage affect to their advantage.”
Social extension
“In our urban, fragmented society, families often live away from extended families and the social interaction and connection they provide. We find that parents and adult student often comment how classes, and the before and after interaction with others, often feels like an extended family. We believe that this is a result of the positive role modelling structure set up by martial arts” Says Liz. “We are not a school that believes in ‘survival of the fittest’. We believe that we are part of a community and everyone’s job is the help each other to lift their performance.” | 2024-04-23T01:27:17.568517 | https://example.com/article/6596 |
Solubilities of carbon dioxide and oxygen in the ionic liquids methyl trioctyl ammonium bis(trifluoromethylsulfonyl)imide, 1-butyl-3-methyl imidazolium bis(trifluoromethylsulfonyl)imide, and 1-butyl-3-methyl imidazolium methyl sulfate.
Ionic liquids (ILs) are being considered as solvents for gas absorption processes as they have the potential, in general, for improved efficiency of gas separations, as well as lower capital and operating costs compared to current commercial processes. In this study the solvent properties of ILs are investigated for use in the absorption of carbon dioxide (CO2) and oxygen (O2). The absorption of these gases in ILs was measured in the temperature range 303.15-333.15 K and at pressures up to 1.5 MPa by gravimetric analysis. The ILs used were methyl trioctyl ammonium bis (trifluoromethylsulfonyl) imide ([MOA][Tf2N]), 1-butyl-3-methyl imidazolium bis (trifluoromethylsulfonyl) imide ([BMIM][Tf2N]), and 1-butyl-3-methyl imidazolium methyl sulfate ([BMIM][MeSO4]). The measurement technique employed in this study is fast and accurate, and requires small quantities of solvent. The results indicated that absorption of both gases increased with a decrease in operating temperature and an increase in pressure. [MOA][Tf2N] had the highest CO2 and O2 solubility. [BMIM][Tf2N] was determined to have the highest selectivity for CO2 absorption. [BMIM][MeSO4] achieved the lowest CO2 absorption with a moderate O2 absorption, revealing this IL to be the least desirable for CO2 and O2 absorption. Calculation of Henry's law constants for all systems confirmed the deductions made from absorption data analysis. Calculation of enthalpy and entropy of absorption for each system revealed CO2 absorption in [MOA][Tf2N] to be the least sensitive to temperature increases. The absorption data was modeled using the generic Redlich-Kwong cubic equation of state (RK-EOS) coupled with a group contribution method. | 2024-07-23T01:27:17.568517 | https://example.com/article/7756 |
Iran said it has transited a major consignment of tangerines from Pakistan to Kazakhstan in an initiative that could open a new corridor for shipment of food items from Southeast Asia to markets as far as Russia.
A freight train set about its long journey from Muslim-residing Yinchuan, the capital of the Ningxia Hui Autonomous Region, central China, on Tuesday to come to Tehran in the framework of the new Silk Road plan, named the One Belt One Road Initiative (OBOR).
Despite tight budget and little investment, the government was able to raise the share of railways in cargo transportation in Iran, setting the stage for achieving the ambitious targets of the sixth five-year development plan (2017-22).
A Turkish cargo jet crashed near Kyrgyzstan's Manas airport on Monday, killing at least 37 people, most of them residents of a village struck by the Boeing 747 as it tried to land in dense fog, Kyrgyz officials said.
Europe's largest engineering company, Siemens has released the first cargo of properties Iran had ordered for developing South Pars Gas Field before the intensification of Western sanctions in 2012, an operator of some phases of the field said.
A provincial prosecutor's office in Turkey has sought life imprisonment terms for four local prosecutors and a gendarmerie officer allegedly involved in searching Turkish Intelligence Service (MIT) trucks engaged in transporting weapons to foreign-backed militants in Syria. | 2024-02-27T01:27:17.568517 | https://example.com/article/8021 |
EDMONTON – Albertans who oppose the province’s new education guidelines are using social media to try to get their message across to the government, but the group’s #protectABkids hashtag is also being used by those who support the policy in question.
On Tuesday, a group said 1,000 Albertans will “Twitter bomb” Minister of Education David Eggen and Premier Rachel Notley to show their opposition of the “Guidelines to Best Practices” document established by the education minister.
Related
“We’ve written our letters and we’ve called our MLAs, but we don’t feel our collective voice is being heard. In fact, we feel Minister Eggen has dismissed, misrepresented and minimized our concerns as Albertans,” Theresa Ng, an Edmonton mother who helped organize the social media event, said.
Donna Trimble, a Calgary mother, said her concerns with the guidelines centre around parental rights.
“The Alberta government has become confused about its role and placed itself in the position of caregiver, which has thus led to guidelines that remove parents from their rightful position as the primary caregivers of their children. This will not help students, it will harm them.”
The group is asking the education minister to stop the mandatory requirement for school boards to develop LGBTQ-specific policies. The group would rather school boards use their own judgement regarding any policy regarding LGBTQ students.
Eggen said the guidelines were meant to help school boards see how LGBTQ rights have been dealt with across Canada and throughout the world, in order for them to be in a better place to draft their own policies.
“What the school boards must do is make sure there’s policy there that reflects that, but it doesn’t have to be exhaustive like the guidelines,” Eggen said.
“It’s very important for us to remember that this is an educative process that we’re going through as well, and as we have this interaction I know that it will help for people to clarify that we’re not looking to diminish in any way anyone else’s human rights.”
While the hashtag #protectABkids was initially used to Twitter bomb the province, a number of LGBTQ advocates and supporters took to the social media network to turn the conversation around, in support of the policy.
Why we really need to #protectABkids? Because nearly two thirds of #LGBTQ youth feel unsafe at school. I was one of them.
Eggen has issued a March 31 deadline for Alberta’s 61 school boards to develop policies on how they will protect LGBTQ students. He said he’s already received draft policies from about one third of the province’s school boards. | 2024-07-29T01:27:17.568517 | https://example.com/article/7379 |
Monday, February 16, 2009
Sweet Potato Fries
I've tried making sweet potato fries by baking it. It was good and healthy, however, I like it much better deep fried. Why is it that the unhealthy foods I eat always taste better then the healthy ones? I guess I better go eat an apple, even though I like apple pie better.
No comments:
About Me
I enjoy outdoors and nature. Some of my interests are hiking, photography and new technology. I also like taking digital photos of food so I can enjoy every byte. I've been a video blogger here since 2005. | 2024-05-29T01:27:17.568517 | https://example.com/article/4118 |
The methionine salvage pathway compound 4-methylthio-2-oxobutanate causes apoptosis independent of down-regulation of ornithine decarboxylase.
4-Methylthio-2-oxobutanoic acid (MTOB) is the final compound of the methionine salvage pathway that converts the polyamine byproduct methylthioadenosine to adenine and methionine. Here we find that MTOB inhibits growth of several human cell lines in a dose-dependent manner. Growth inhibition was specific for MTOB as we did not observe any inhibition with other chemically related compounds. MTOB treatment causes apoptosis and reduction of ornithine decarboxylase (ODC) activity but not ODC mRNA. To determine if MTOB exerts its effects primarily via ODC inhibition, we compared the effects of MTOB with the ODC-specific inhibitor difluoromethylornithine (DFMO). We found that MTOB was a more potent inducer of apoptosis than DFMO, lacked activation of caspase 3/7, and was able to induce apoptosis in cells lacking p53. Our results show that MTOB-induced growth inhibition and apoptosis is not simply secondary due to ODC inhibition and implies that MTOB activates apoptosis via other mechanisms. | 2023-12-30T01:27:17.568517 | https://example.com/article/2174 |
Blast at university in Syria causes casualties
DAMASCUS, Syria (AP) — A large explosion struck the main university in the northern city of Aleppo on Tuesday, causing an unknown number of casualties, activists and Syrian state TV said.
It was not immediately clear what caused the blast at Aleppo University, which was in session Tuesday. There were also conflicting reports about which part of the campus was hit.
The Britain-based Syrian Observatory for Human Rights, which has a network of activists around the country, said 15 people were killed and “tens” wounded in two explosions near the university’s dorms, but said it was not clear whether the blasts were the result of shells or bombs.
State TV didn’t offer any details about the explosion or specify the number of victims. However, a Syrian government official in Damascus said two rockets hit the university’s Information Technology Academy. The official, who spoke on condition of anonymity in line with regulations, said the two rockets were fired from a rebel-held area in Aleppo.
Advertisement
Syria’s largest city and a former commercial hub, Aleppo has been a major front in the country’s civil war since July, and the fight between regime troops and rebels there has settled into a bloody stalemate. Government troops and rebels usually exchange rockets and mortar rounds in the city.
Over recent months, Aleppo and the Syrian capital, Damascus, have been hit by a wave of explosions that have killed scores of people. Many of the bombings, which have largely targeted government buildings, have been claimed by Islamic extremists fighting on the rebel side.
Elsewhere in Syria, troops and rebels fought in embattled suburbs of Damascus Tuesday, as government air raids and shelling in the other regions killed several dozen people, activists said.
The violence came a day after Syria’s deputy foreign minister said President Bashar Assad will not step down before scheduled presidential elections in mid-2014. Faisal Mekdad said Assad will run again for the post next year — a declaration which lowers already diminished expectations that a political settlement can be reached.
Since Syria’s crisis began in March 2011, the opposition has said it will not accept anything less than Assad’s departure.
Mekdad’s comments appear to contradict a plan proposed by international envoy Lakhdar Brahimi. Since starting his job in the summer, Brahimi has sought to advance an international plan that calls for an open-ended cease-fire between rebels and government troops and the formation of a transitional government to run the country until elections can be held.
Brahimi did not mention Assad by name in the plan, but he has said the transitional government would have “full executive powers,” meaning “all the authority of the state should be possessed by that government” — a description that would seem to exclude the incumbent Assad from a role.
Asked by a BBC interviewer if the president says he wants to run in 2014, Mekdad answered, “What’s wrong with that?”
“The president and many other candidates who may run will go to the people put their programs and to be elected by the people,” Mekdad said in English. “The ballot box will be the place where the future of the leadership of Syria will be decided.”
“It is a coup d’etat ... if we listen to what the armed groups and those enemies of Syria are proposing,” Mekdad said, referring to the opposition and countries that support it.
Earlier this month, Assad dismissed calls from the U.S. and others that he step down and vowed to keep fighting until the country is free of “terrorists” — his government’s shorthand for rebels.
Last year, a new constitution drafted in Syria imposed a limit of two seven-year terms on the president, but the limit would not count the nearly 13 years that he has already held office. It means Assad could remain legally in power through 2028.
Assad took office in 2000 after the death of his father, Hafez Assad, who ruled Syria for 30 years.
Mekdad said it would be undemocratic to tell Assad not to run for the post again.
Also Tuesday, Syrian Prime Minister Wael al-Halqi arrived in Iran, Syria’s strongest ally in the region, where he will discuss the country’s crisis, including Assad’s proposal to end the fighting, with Iranian officials.
Iran has tried to mediate in the past but the opposition rejected the offer saying Tehran is taking sides in the conflict.
Meanwhile, activists reported clashes in suburbs south of Damascus. The government is trying to drive rebels from their bases around Damascus from which they can threaten key facilities.
Away from Damascus, the Observatory and the Local Coordination Committees activist groups said troops bombarded the Houla region in the central province of Homs, killing at least 10 people including five women and two children. The LCC said 17 people were killed in Homs, most of them in Houla.
The U.N. says at least 60,000 people have been killed in the war and millions have fled their homes. | 2023-08-27T01:27:17.568517 | https://example.com/article/3297 |
india
Updated: Feb 05, 2019 10:11 IST
Congress President Rahul Gandhi has dismissed the charge that his party has not come out on the issue of building a Ram temple in Ayodhya - now the matter of a title dispute in the Supreme Court - and said his party does not believe in having a view on something before the country’s top court.
In an interview to Hindustan Times, Rahul Gandhi said, “It’s not correct to say that (the Congress view on the temple isn’t clearly articulated)... The Congress party respects India’s institutional and judicial processes. This matter is sub-judice. It would not be fair for me to opine as the highest court in the country is deliberating on it. There is absolute clarity.”
His party would accept the court’s verdict, he said. “I would say that what the Supreme Court decides is what the Congress and everyone will accept.”
Also read| ‘I give a job, then...’: Rahul Gandhi on Priyanka’s new role in Congress
The Congress has, for at least the past year-and-a-half, been seen by political analysts as practicing what they term “soft Hindutva”, which manifests itself, in its simplest form, as frequent visits to temples by Rahul Gandhi. Its chief rival, the BJP, has called it an attempt by Rahul Gandhi to woo Hindu voters.
The Congress President dismissed such characterisation as simplistic.
Also read| Modi nothing like Indira, comparisons an insult: Rahul Gandhi
“What is soft Hindutva? Where did you get the idea? If you asked Buddha or you asked Mahaveer or you asked Guru Nanak, or any of the great people of this country to go to a temple - do you think they would decline? Guru Nanak went to Mecca,” he said, adding that too much shouldn’t be read into a politician going to a temple.
“Anybody including a politician has the right to pay respects and have faith. And I absolutely refuse to let the right wing tell me that you can’t go to a temple,” he said.
Also read| ‘Recent results were just the tip of the backlash’: Q & A with Rahul Gandhi | 2024-04-16T01:27:17.568517 | https://example.com/article/3470 |
---
abstract: 'Upon application of a sufficiently strong electric field, electrons break away from thermal equilibrium and approach relativistic speeds. These highly energetic runaway electrons ($\sim$ MeV) play a crucial role in understanding tokamak disruption events, and therefore their accurate understanding is essential to develop reliable mitigation strategies. For this purpose, we have developed a fully implicit, scalable relativistic Fokker-Planck kinetic electron solver. Energy and momentum conservation are ensured for the electron-electron relativistic collisional interactions. Electron-ion interactions are modeled using the Lorentz operator, and synchrotron damping using the Abraham-Lorentz-Dirac reaction term. We use a positivity-preserving finite-difference scheme for both advection and tensor-diffusion terms. The proposed numerical treatment allows us to investigate accurately phenomena spanning a wide range of temporal scales. We demonstrate the proposed scheme with numerical results ranging from small electric-field electrical conductivity measurements, to the accurate reproduction of runaway tail dynamics when strong electric fields are applied.'
author:
- '[Don Daniel[^1]]{} , William T. Taitano, and Luis Chacón'
bibliography:
- 'manuscript\_v7.bib'
title: 'A fully implicit, scalable, nonlinear, conservative, relativistic Fokker-Planck solver for runaway electrons'
---
Los Alamos National Laboratory, New Mexico, USA
Introduction
============
The relativistic Fokker-Planck collision operator models Coulomb collisional effects between species under the assumption of small-angle binary collisions [@BB55; @BK87]. Similarly to its non-relativistic counterpart [@Rosenbluth], the operator is well-posed, and features strict conservation of number density, total momentum and total energy [@BK89]. Understanding the evolution of relativistic electron dynamics under weak and strong electric fields is crucial to understand plasma disruptions in fusion devices such as tokamaks.
In tokamak disruptions, the plasma is unable to sustain itself due to rising instabilities. The subsequent plasma cooling results in a significant induced loop voltage [@Woods]. Because of the induced electric field, some of the electrons break away from the thermal bulk. These electrons are referred to as ‘runaway’ electrons, and the resulting large electron current can severely damage the plasma facing materials in tokamaks. Runaway current can also be amplified by secondary mechanisms such as the transfer of energy from the primary runaway electron current to the thermal ‘bulk’ electrons through knock-on (large-angle) collisions. Understanding these nonlinear mechanisms is crucial to develop avoidance and mitigation strategies of runaway electrons in tokamaks. In this study, as a first step, we primarily focus on capturing accurately runaway electrons produced by the primary mechanism of a large induced loop voltage.
A solver designed to capture runaway-electron dynamics requires certain features. For example, capturing small amplitude tails necessitates strict positivity-preservation. Runaway-electron generation time may be large: a sizeable runaway tail length may take $\mathcal{{O}}(10^{3})$ electron-electron collisional thermal time scales to develop. Therefore, one requires an implicit solver that can step over stiff thermal collisional time scales. The ability to use large time steps also demands that the scheme be asymptotic preserving, which in turn requires enforcing strict conservation properties [@WT2015]. It is also essential that the solver is optimal and scales with the number of mesh points, as capturing small-scale features may require fine grids. The relativistic Fokker-Planck operator can be expressed either in integral form [@BB55] or in differential form [@BK87]. We employ the differental form, in which the collisional coefficients are expressed in terms of relativistic potentials. This form is more conductive to an optimal $\mathcal{{O}}(N)$ solver, where $N$ is the number of grid points, as the integral form inevitably produces an $\mathcal{{O}}(N^{2})$ scaling.
With regard to time-stepping, a fully implicit time stepping scheme method is more suitable than either linearly implicit or explicit schemes, as the former are not asymptotic preserving (and therefore feature time-step constraints for accuracy reasons), and the latter can be expensive (one needs to resolve stiff collisional time scales). NORSE [@NORSE], a recently developed relativistic electron solver, employs a linearly implicit method. The potentials are expressed in terms of Legendre modes, which are individually solved for using the distribution at the beginning of a time step. CQL3D [@Harvey2000], a bounce-averaged Fokker-Planck code, also solves for the potentials in a similar manner [@CQL3D] but does so fully implicitly. However, neither of these codes are asymptotic preserving, because of the linearizations involved and/or the lack of discrete conservation properties. In this study, we propose a fully nonlinear implicit solver for solving the relativistic Fokker-Plank equation that has discrete conservation properties and is also optimally preconditioned and scalable in parallel.
The paper is organized as follows. In $\S$\[sec:Formulation\], we discuss the full relativistic electron-electron operator, the Lorentz operator for electron-ion interactions, and the Abraham-Lorentz-Dirac reaction term for modeling losses due to synchrotron damping. Then in $\S$\[sec:Algorithm-1\] we discuss the algorithmic aspects with regard to the discrete conservation strategy, positivity preservation, and our optimal strategy for determination of the potentials. In $\S$\[sec:Nonlinear-Solver-Strategy-1\], we briefly describe our fully implicit nonlinear solver using an Anderson Acceleration scheme. In $\S$\[sec:Numerical-results\], we discuss the numerical results that demonstrate the correctness of our implementation, and finally in $\S$\[sec:Conclusion-and-Future\] we list the conclusions and scope for future work.
Formulation\[sec:Formulation\]
===============================
We model a homogeneous quasi-neutral plasma. We evolve the electron species with the relativistic Fokker-Planck equation for the electron distribution function, $f_{e}$, in the presence of background species $\beta$,
$$\partial_{t}f_{e}+\partial_{\vec{{p}}}.\left[({\vec{{E}}}+\vec{{F}}_{S})f_{e}\right]=\sum_{\beta=i,e}C(f_{\beta},f_{e}),\label{eq:RFP-1}$$
where $t$ is time normalized with the relativistic electron collision time, $$\tau_{ee}^{relativistic}=\frac{{4\pi\epsilon_{0}^{2}m_{e}^{2}c^{3}}}{q_{e}^{4}n_{e}\ln\Lambda_{ee}},$$ $\vec{{p}}$ is the momentum vector normalized with $m_{e}c$, $m_{e}$ is the electron mass, $c$ is the speed of light, $q_{e}$ is the electron charge, $\vec{{E}}$ is the electric field normalized with the critical value for runaway electron generation [@CH75], $E_{c}=n_{e}q_{e}^{3}\ln\Lambda_{ee}/4\pi\epsilon_{0}^{2}m_{e}c^{2}$, $n_{e}$ is the electron number density, $\epsilon_{0}$ is the electrical permittivity, $\ln\Lambda_{ee}$ is the Coulomb logarithm, $\vec{{F}}_{S}$ refers to the electron friction coefficients associated with synchrotron radiation damping effects, and $C$ is the collision operator. Though the equation in principle may be used for multiple species, here we only consider the evolution of electrons interacting with themselves, ions and external electric fields.
The distribution function is described in a two-dimensional cylindrical domain $(p_{\parallel},p_{\perp}$), with the subscripts $\parallel$ and $\perp$ referring to directions parallel and perpendicular to the magnetic field, respectively, see Fig. \[fig:domain\]. The azimuthal direction is ignored because the distribution is axisymmetric. The electron-electron interactions are described using the full form of the collision operator, while the electron-ion interaction is modeled with the Lorentz operator (which assumes the ions to be cold and infinitely massive, $m_{i}>>\gamma m_{e}$ with $\gamma$ the Lorentz factor $\gamma=\sqrt{{1+p^{2}}}$).
$\qquad$![We consider a cylindrical geometry representation $(p_{\parallel,}p_{\perp})$ with azimuthal symmetry (left). Following a finite volume formulation, we define the distribution function on cell centers (crosses) and fluxes on edges (arrows). The ghost cells (circles) are exterior to domain boundaries. A typical stencil is shown on the right. The discrete volume for cell $(j,k)$ is computed as $\Delta V_{j,k}=2\pi p_{\perp,k}\Delta p_{\parallel,j}\Delta p_{\perp,k},$ where $\Delta p_{\parallel,j}$ and $\Delta p_{\perp,k}$ are the discrete momentum space cell sizes in the parallel and perpendicular directions.\[fig:domain\] ](domain.pdf "fig:")
The collision operator $C$ can be expressed as:
$$C(f_{\beta},f_{e})=\partial_{\vec{{p}}}\cdot\left[\overline{{\overline{{D}}}}_{\beta}\cdot\partial_{\vec{{p}}}f_{e}-\frac{{m_{e}}}{m_{\beta}}\vec{{F_{\beta}}}f_{e}\right],\label{eq:collision-1}$$
where $\overline{{\overline{{D}}}}_{\beta}$ represents the collisional diffusion tensor coefficients and $\vec{{F}}_{\beta}$ represents the collisional friction vector coefficients (computed based on the appropriate background species).
Electron-electron collisions
----------------------------
The collisional coefficients, $\overline{{\overline{{D}}}}_{\beta}$ and $\vec{{F}}_{\beta}$, for electrons are expressed in a purely differential form in terms of potentials. We adopt the differential form for algorithmic scalability reasons [\[]{}$\mathcal{{O}}(N)$ versus $\mathcal{{O}}(N^{2})$[\]]{}. The potentials are obtained by inverting a set of elliptic equations. This elliptic solve is performed optimally, $\mathcal{{O}}(N)$, with multigrid techniques. The collisional coefficients are given by [@BK87]:
$$\begin{aligned}
\overline{{\overline{{D}}}}_{e} & = & -\frac{{4\pi}}{n_{\beta}}\gamma^{-1}[\overline{{\overline{{L}}}}+\overline{{\overline{{P}}}}]h_{1}+4\gamma^{-1}[\overline{{\overline{{L}}}}-\overline{{\overline{{P}}}}]h_{2},\label{eq:D-1}\\
\vec{{F}_{e}} & = & -\frac{{4\pi}}{n_{\beta}}\gamma^{-1}\vec{{K}}(g_{0}-2g_{1}),\label{eq:A-1}\end{aligned}$$
where the operators $\overline{{\overline{{L}}}}$, $\vec{{K}}$, and $\overline{{\overline{{P}}}}$ are defined as: $$\begin{aligned}
\overline{{\overline{{L}}}}\psi & = & \overline{{\overline{{P}}}}\cdot\frac{{\partial^{2}\psi}}{\partial{\vec{{p}}}\partial{\vec{{p}}}}\cdot\overline{{\overline{{P}}}}-\overline{{\overline{{P}}}}\left(\vec{{p}}\cdot\frac{{\partial{\psi}}}{\partial\vec{{p}}}\right),\\
\vec{{K}}\psi & = & \overline{{\overline{{P}}}}\cdot\frac{{\partial{\psi}}}{\partial{\vec{{p}}}},\\
\overline{{\overline{{P}}}} & = & \overline{{\overline{{I}}}}+\vec{{p}}\vec{{p}}.\end{aligned}$$ To obtain the transport coefficients, we first compute the $h$ potentials by solving the partial differential equations,
$$\begin{aligned}
[L+1]h_{0} & = & f_{e},\nonumber \\{}
[L-3]h_{1} & = & h_{0},\label{eq:hpotentials-1}\\{}
[L-3]h_{2} & = & h_{1},\nonumber \end{aligned}$$
and then the $g$ potentials by solving:
$$\begin{aligned}
Lg_{0} & = & f_{e},\nonumber \\
Lg_{1} & = & g_{0}.\label{eq:gpotentials-1}\end{aligned}$$
Here, the operator $L$ is defined as: $$L\,\psi=\overline{{\overline{{P}}}}:\frac{{\partial^{2}\psi}}{\partial{\vec{{p}}}\partial{\vec{{p}}}}+3\vec{{p}}\cdot\frac{{\partial{\psi}}}{\partial\vec{{p}}}.\label{eq:potentialoperator}$$ To solve these linear potential equations, we require boundary conditions. They are determined from the Green’s function solution of the elliptic equations, Eqs. (\[eq:hpotentials-1\],\[eq:gpotentials-1\]) [@BB55]:
$$\begin{aligned}
h_{0} & = & -\frac{{1}}{4\pi}\int(r^{2}-1)^{-1/2}\frac{{f_{\beta}(\vec{{p'}})}}{\gamma'}\mathrm{{d}^{3}\vec{{p}'},}\nonumber \\
h_{1} & = & -\frac{{1}}{8\pi}\int\sqrt{{r^{2}-1}}\frac{{f_{\beta}(\vec{{p'}})}}{\gamma'}\mathrm{{d}^{3}\vec{{p}'},}\nonumber \\
h_{2} & = & -\frac{{1}}{32\pi}\int(r\cosh^{-1}{r}-\sqrt{{r^{2}-1}})\frac{{f_{\beta}(\vec{{p'}})}}{\gamma'}\mathrm{{d}^{3}\vec{{p}'},}\label{eq:potentialGreen-1}\\
g_{0} & = & -\frac{{1}}{4\pi}\int r(r^{2}-1)^{-1/2}\frac{{f_{\beta}(\vec{{p'}})}}{\gamma'}\mathrm{{d}^{3}\vec{{p}'},}\nonumber \\
g_{1} & = & -\frac{{1}}{8\pi}\int\cosh^{-1}{r}\frac{{f_{\beta}(\vec{{p'}})}}{\gamma'}\mathrm{{d}^{3}\vec{{p}'},}\nonumber \end{aligned}$$
where $r=\gamma\gamma'-\vec{{p}}\cdot\vec{{p'}}$. Note that the integral kernels of $h_{0}$ and $g_{0}$ are singular when $r\rightarrow1\,(\vec{{p}}\rightarrow\vec{{p'}}),$ which requires a specialized numerical treatment, as described later in $\S$\[subsec:collisionalpotentials\].
Modeling external effects\[subsec:Modeling-external-effects\]
-------------------------------------------------------------
We consider several external effects, including an imposed electric field, $\vec{{E}}=(E_{\parallel},0)$, ions, and synchrotron radiation.
Electron-ion scattering is modeled with the Lorentz or pitch-angle scattering operator [@decker2016numerical], which assumes ions are cold and infinitely massive. The operator causes scattering of the electrons in the pitch angle $(\arccos[p_{\parallel}/p])$ direction and, in this simplified form, it preserves kinetic energy. It has finite diffusion coefficients and zero friction coefficients, given by:
$$D_{i,\parallel\parallel}=\frac{{Z_{\mathrm{{eff}}}}}{2v}\frac{{p_{\perp}^{2}}}{p^{2}},\qquad D_{i,\parallel\perp}=D_{i,\perp\parallel}=-\frac{{Z_{\mathrm{{eff}}}}}{2v}\frac{{p_{\perp}p_{\parallel}}}{p^{2}},\qquad D_{i,\perp\perp}=\frac{{Z_{\mathrm{{eff}}}}}{2v}\frac{{p_{\parallel}^{2}}}{p^{2}},\qquad\vec{{F}}_{i}=\vec{{0}},\label{eq:electron-ion-scattering}$$
where $p^{2}=p_{\perp}^{2}+p_{\parallel}^{2}$, $v$ is the velocity magnitude (normalized with $c$), and $Z_{\mathrm{{eff}}}=\sum n_{i}Z_{i}^{2}/\sum n_{i}Z_{i}$ is the effective ion charge state ($n_{i}$ and $Z_{i}$ refers to ion densities and charges). For a quasi-neutral plasma, $\sum n_{i}Z_{i}=n_{e}.$ Note that the electron-ion collisional operator becomes singular at the origin $v\rightarrow0$. We modify this singularity by reformulating the singular part, as:
$$\frac{{1}}{v}\approx\frac{{1}}{\sqrt{{v^{2}+v_{cut}^{2}}}},$$ where $v_{cut}=p_{cut}/\sqrt{{1+p_{cut}^{2}}}$ is the velocity cut-off, with $p_{cut}=2\Delta p$. Note this approximation of the singular term in the cylindrical space introduces a finite but small amount of heating as $p\rightarrow0$.
Finally, we consider synchrotron radiation, which results in loss of momentum for the electrons. We model this with the Abraham-Lorentz-Dirac reaction term [@decker2016numerical]. The reaction term has finite friction coefficients, given by:
$$F_{S,\perp}=-S\frac{{p_{\perp}}}{\gamma}(1+p_{\perp}^{2}),\qquad F_{S,\parallel}=-S\frac{{p_{\parallel}}}{\gamma}p_{\perp}^{2},\label{eq:synchrotron_damping}$$
where $S=\tau_{ee}^{relativistic}/\tau_{r}$ controls the time scale of the synchrotron radiation damping $\tau_{r}$ to that of relativistic electron-electron collisions $\tau_{ee}^{relativistic}$.
Algorithm\[sec:Algorithm-1\]
============================
General discretization strategy
-------------------------------
We employ conservative finite differences. The distribution is evaluated at cell centers, while the friction and diffusion fluxes are evaluated at cell faces. The distribution function has Neumann boundary conditions, $\vec{{\eta}}_{surface}\cdot\nabla_{p}f_{e}=0$, where $\vec{{\eta}}_{surface}$ is the unit normal to the surface. Recall the electron-electron collision operator is the divergence of a collisional flux,
$$C(f_{e},f_{e})=\partial_{\vec{{p}}}\cdot(\overline{{\overline{D}}}_{e}\nabla_{p}f_{e}-\vec{{F_{e}}}f_{e})\approx\delta_{\vec{{p}}}\cdot(\vec{{R}}_{D}-\vec{R}_{F})=\delta_{\vec{{p}}}\cdot\vec{{R}},\label{eq:FPflux}$$
where $\vec{{R}}_{D}$ and $\vec{{R}}_{F}$ are the diffusion and friction fluxes, and $\delta_{\vec{{p}}}\cdot$ denotes the discrete form of the divergence operator. We discretize Eq. (\[eq:FPflux\]) in cylindrical-momentum space as:
$$\left(\delta_{\vec{{p}}}\cdot\vec{{R}}\right)_{j,k}=\left(\frac{{R_{\parallel,j+1/2,k}-R_{\parallel,j-1/2,k}}}{\Delta p_{\parallel,j}}+\frac{{p_{\perp,k+1/2}R_{\perp,j,k+1/2}-p_{\perp,k-1/2}R_{\perp,j,k-1/2}}}{p_{\perp,k}\Delta p_{\perp,k}}\right)\label{eq:fluxformulation}$$
Fluxes at cell faces are given by:
$$R_{D,\parallel,j+\frac{{1}}{2},k}=\left(D_{\parallel\parallel}\partial_{p_{\parallel}}f_{e}+D_{\parallel\perp}\partial_{p_{\perp}}f_{e}\right)_{j+\frac{1}{2},k},\quad R_{D,\perp,j,k+\frac{{1}}{2}}=\left(D_{\perp\parallel}\partial_{p_{\parallel}}f_{e}+D_{\perp\perp}\partial_{p_{\perp}}f_{e}\right)_{j,k+\frac{{1}}{2}},$$
$$R_{F,\parallel,j+\frac{{1}}{2},k}=F_{\parallel,j+\frac{1}{2},k}f_{e,j+\frac{1}{2},k},\quad R_{F,\perp,j,k+\frac{{1}}{2}}=F_{\perp,j+\frac{1}{2},k}f_{e,j,k+\frac{{1}}{2}}.$$
The potential operator $L$ (Eq. \[eq:potentialoperator\]) is discretized using central differences (see App. A1 for details). The potentials are evaluated at cell centers and their boundary conditions are specified at ghost cells. For the potential Eqs. (\[eq:hpotentials-1\])-(\[eq:gpotentials-1\]), we apply Dirichlet boundary conditions using Eqs. (\[eq:potentialGreen-1\]) as we discuss in $\S$\[subsec:collisionalpotentials\]. The collisional coefficients, $\overline{{\overline{{D}}}}_{\beta}$ and $\vec{{F}}_{\beta}$, are also evaluated at cell centers using the computed potentials (see App. A2 for discretization details). The collisional coefficients at the ghost cells are evaluated by linearly extrapolating the values from adjacent cell-centered values.
The external effects on the electron system (such as scattering due to ion interactions, Eq. (\[eq:electron-ion-scattering\]), synchrotron damping effects, Eq. (\[eq:synchrotron\_damping\]), and electric field acceleration terms) are expressed in terms of momentum coordinates $(p_{\parallel},p_{\perp})$. The coefficients are evaluated at cell-centers. Where needed, values at cell faces are found by linear averaging of two adjacent cell-centered values within the computational domain.
Discrete conservation strategy\[subsec:Discrete-conservation-strategy\]
-----------------------------------------------------------------------
The relativistic electron-electron collisions conserve the number density, $n_{e}$, momentum, $\vec{{p}}=\gamma\vec{{v}}$, and energy $E=\gamma$, as the moments of the collision operator satisfy:
$$\begin{aligned}
\langle1,C(f_{e},f_{e})\rangle_{p} & = & 0,\label{eq:massconservation}\\
\langle p_{\parallel},C(f_{e},f_{e})\rangle_{p} & = & 0,\label{eq:pconservation}\\
\langle\gamma,C(f_{e},f_{e}\rangle_{p} & = & 0,\label{eq:Econservation}\end{aligned}$$
where $\langle a,b\rangle_{p}=\int_{p}ab2\pi p_{\perp}\mathrm{{d}}p_{\parallel}\mathrm{{d}}p_{\perp}$. Discretely, these inner products may approximated via mid-point quadrature rule as:
$$\langle A,B\rangle_{p}^{D}\approx2\pi\sum_{j=1}^{N_{\parallel}}\sum_{k=1}^{N_{\perp}}A_{j,k}B_{j,k}p_{\perp,k}\Delta p_{\parallel,j}\Delta p_{\perp,k},$$ where the superscript $D$ refers to the discrete representation of the summation operator, and $\Delta p_{\parallel,j}$ and $\Delta p_{\perp,k}$ are the width and height of a rectangular cell located at $(j,k).$ The conservation of the moments of the collisional operator will be disrupted due to numerical errors. Discrete mass conservation (Eq. \[eq:massconservation\]) is satisfied by setting the normal component of diffusion and friction fluxes to zero at the boundary. Enforcing the cancellations in Eqs. (\[eq:pconservation\],\[eq:Econservation\]) is more challenging. A recent study [@WT2015] enforced these conservation properties discretely by redistributing the numerical errors via discrete nonlinear constraints. We employ a similar methodology here. Firstly, we multiply the diffusion flux by a factor
$$\eta=1+\eta_{0}+\eta_{1}(p_{\parallel}-\bar{{p}}_{\parallel}),$$ where the magnitudes of $\eta_{0}$ and $\eta_{1}$ are expected to be of the order of truncation error, and $\bar{{p}}_{\parallel}=\langle f_{e},p_{\parallel}\rangle_{p}/\langle1,f_{e}\rangle_{p}$ is the mean momentum. Thus, the discrete collisional operator is of the form,
$$C^{D}(f_{e},f_{e})=\delta_{\vec{{p}}}\cdot(\vec{\eta{R_{D}}}-\vec{R}_{F}),$$ Integrating over the cylindrical-momentum domain,
$$\begin{aligned}
\langle p_{\parallel},C^{D}(f_{e},f_{e})\rangle_{p}^{D} & = & 0,\nonumber \\
\langle\gamma,C^{D}(f_{e},f_{e})\rangle_{p}^{D} & = & 0,\label{eq:discretesum}\end{aligned}$$
we obtain a system of two equations,
$$\left[\begin{array}{cc}
\langle\gamma\delta_{\vec{{p}}}\cdot\vec{{R}}\rangle_{p}^{D} & \langle\gamma(p_{\parallel}-\bar{{p}}_{\parallel})\delta_{\vec{{p}}}\cdot\vec{{R}}_{D}\rangle_{p}^{D}\\
\langle p_{\parallel}\delta_{\vec{{p}}}\cdot\vec{{R}}_{D}\rangle_{p}^{D} & \langle p_{\parallel}(p_{\parallel}-\bar{{p}}_{\parallel})\delta_{\vec{{p}}}\cdot\vec{{R}}_{D}\rangle_{p}^{D}
\end{array}\right]\left[\begin{array}{c}
\eta_{0}\\
\eta_{1}
\end{array}\right]=\left[\begin{array}{c}
\langle\gamma\delta_{\vec{{p}}}\cdot(\vec{{R}}_{F}-\vec{{R}}_{D})\rangle_{p}^{D}\\
\langle p_{\parallel}\delta_{\vec{{p}}}\cdot(\vec{{R}}_{F}-\vec{{R}}_{D})\rangle_{p}^{D}
\end{array}\right],$$ for unknowns $[\eta_{0},\:\eta_{1}]$, which can be inverted straightforwardly. This strategy conserves momentum and energy at the discrete level for electron-electron collisions. Note that, because we assume the ions to be cold and infinitely massive, there are no conservation properties associated with electron-ion collisions (i.e. electron energy and momentum transferred to ions is a net loss).
Time stepping strategy\[subsec:Time-stepping-strategy\]
-------------------------------------------------------
A huge separation in time scales exists in runaway-electron dynamics. Long time-scales are of the order of the relativistic collision times, $\mathcal{{O}}(\tau_{ee}^{relativistic})$. For typical bulk temperatures $\Theta=T/m_{e}c^{2}\sim10^{-4}$, this implies a time-scale separation of six orders of magnitude between thermal and relativistic time scales (as $\tau_{ee}^{thermal}=\Theta^{3/2}\tau_{ee}^{relativistic}$). Stepping over fast time scales demands a fully implicit temporal scheme with strict conservation and positivity preservation properties. We describe our approach next.
The discrete system of equations representing the effects of electron-electron collisional interactions $C$ and external effects $\mathcal{{E}}$ on electron evolution can be written as:
$$\delta_{t}f_{e}^{n}=C^{D}(f_{e}^{n},f_{e}^{n})+\underbrace{{C^{D}(f_{i,}^{n}f_{e}^{n})-\delta_{\vec{{p}}}.\left[(\vec{{F}}_{S}+\vec{{E}})f_{e}^{n}\right]}}_{\mathcal{{E}}(f_{e}^{n})},\label{eq:timeadvancement}$$
where the superscript $D$ represents the appropriate discrete form defined in $\S$\[subsec:Discrete-conservation-strategy\]. For a general implicit backward time discretization scheme at time step $n$, we have,
$$\delta_{t}f_{e}^{n}=\sum_{i=0,1,2...}\frac{{b_{i}f_{e}^{n-i}}}{\Delta t},$$ where constants $b_{i}$ satisfy $\sum_{i}b_{i}=0.$ We use both first-order (Euler, BDF1) and second-order (BDF2) schemes for time advancing. For BDF1, $b_{0}=-1$ and $b_{1}=1$ and for BDF2 with constant time steps, $b_{o}=3/2,$ $b_{1}=-2$, $b_{2}=1/2$. The coefficients can be generalized for non-constant time steps.
Discrete conservation properties are crucial when investigating long-time dynamics, $\tau\gg\tau_{ee}^{thermal}$. Multiplying Eq. (\[eq:timeadvancement\]) with $\vec{{c}}=(1,p_{\parallel},\gamma$), and averaging over the momentum space, we obtain:
$$\sum_{i=0,1,2...}\frac{{b_{i}\langle\vec{{c}},f_{e}^{n-i}\rangle_{p}^{D}}}{\Delta t}=\langle\vec{{c}},C^{D}(f_{e}^{n},f_{e}^{n})\rangle_{p}^{D}+\langle\vec{{c}},\mathcal{{E}}(f_{e}^{n})\rangle_{p}^{D}.$$ Because of discrete conservation properties of the electron-electron collisional operator, the first term in the right hand side vanishes. Therefore, any overall change in momentum or energy of electrons can only be due to external effects such as ion-electron collisions, synchrotron radiation, and electric field acceleration.
Positivity-preserving strategy
------------------------------
Positivity-preserving schemes are essential to capture small-amplitude runaway tails. Our strategy is to leverage the structure of the differential operators (advection-diffusion), and use existing positivity-preserving discretizations for these terms.
For all advective terms in the relativistic kinetic equation, we use the positivity-preserving SMART flux limiter [@SMART] to construct the associated fluxes. For the diagonal components of the tensor diffusion term, $\overline{{\overline{{D}}}}\cdot\nabla_{p}f_{e}\,|_{\parallel\parallel}$ and $\overline{{\overline{{D}}}}\cdot\nabla_{p}f_{e}\,|_{\perp\perp}$, we employ a standard second-order discretization:
$$(\overline{{\overline{{D}}}}\cdot\nabla_{p}f_{e}\,)_{\parallel\parallel,j+\frac{{1}}{2},k}=\left(D_{\parallel\parallel}\partial_{p_{\parallel}}f_{e}\right)_{j+\frac{{1}}{2},k}\approx\frac{{D_{\parallel\parallel,j+1,k}+D_{\parallel\parallel,j,k}}}{2}\frac{{f_{e,j+1,k}-f_{e,j,k}}}{\Delta p_{\parallel,j+\frac{{1}}{2}}},$$
$$(\overline{{\overline{{D}}}}\cdot\nabla_{p}f_{e}\,)_{\perp\perp,j,k+\frac{{1}}{2}}=\left(D_{\perp\perp}\partial_{p_{\perp}}f_{e}\right)_{j,k+\frac{{1}}{2}}\approx\frac{{D_{\perp\perp,j,k+1}+D_{\perp\perp,j,k}}}{2}\frac{{f_{e,j,k+1}-f_{e,j,k}}}{\Delta p_{\perp,k+\frac{{1}}{2}}},$$ which is numerically well-posed (does not feature a null space and features a maximum principle). However, the off-diagonal diffusion tensor terms do not feature a discrete maximum principle, resulting in loss of boundedness, unless care is taken. To address this issue, we reformulate the off-diagonal components as effective friction forces as proposed in Ref. [@DOV]:
$$\begin{aligned}
(\overline{{\overline{{D}}}}\cdot\nabla_{p}f_{e}\,)_{\parallel\perp} & = & D_{\parallel\perp}\partial_{p_{\perp}}f_{e}=f_{e}\underbrace{D_{\parallel\perp}\partial_{p_{\perp}}\ln f_{e}}_{F_{\parallel}^{\mathrm{{eff}}}}=f_{e}F_{\parallel}^{\mathrm{{eff}}}=R_{F,\parallel}^{\mathrm{{eff}}},\nonumber \\
(\overline{{\overline{{D}}}}\cdot\nabla_{p}f_{e}\,)_{\perp\parallel} & =f_{e} & \underbrace{D_{\perp\parallel}\partial_{p\parallel}\ln f_{e}}_{F_{\perp}^{\mathrm{{eff}}}}=f_{e}F_{\perp}^{\mathrm{{eff}}}=R_{F,\perp}^{\mathrm{{eff}}}.\label{eq:Feff}\end{aligned}$$
Once formulated as advective terms, we use flux-limiting advective schemes (similar to the collisional friction terms) to calculate the effective flux. Discretization details can be found in App. A3.
Strategy for evaluating boundary conditions of collision potentials\[subsec:collisionalpotentials\]
----------------------------------------------------------------------------------------------------
The boundary conditions for the relativistic potential equations for $h$ and $g$ are found using the integral formulations (\[eq:potentialGreen-1\]). For the $h_{1},h_{2},g_{1}$ relativistic potentials, we use a trapezoidal-rule numerical integration with 24 discrete points in the $\phi$ angle. However, the kernels in $g_{0},h_{0}$ become singular in the limit of $p'\rightarrow p\implies r\rightarrow1,$ complicating direct numerical integration. However, these complexities can be eliminated by reformulating these integrals in terms of complete elliptic integrals. We begin by noting that, because the distribution is axisymmetric, the 3D momentum-space integration can be rewritten as a 2D momentum space integration over the PDF and a 1D azimuthal angle integration as:
$$\begin{aligned}
h_{\beta,0} & = & -\frac{{1}}{4\pi}\int\frac{{f_{\beta}(p'_{\parallel},p'_{\perp})}}{\gamma'}p_{\perp}dp'_{\parallel}dp'_{\perp}\underbrace{{\int_{\phi}\frac{{1}}{(r^{2}-1)^{1/2}}d\phi}}_{I}=-\frac{{1}}{4\pi}\int\frac{{f_{\beta}(p'_{\parallel},p'_{\perp})}}{\gamma'}I(p_{\parallel},p{}_{\perp},p'_{\parallel},p'_{\perp})p_{\perp}dp'_{\parallel}dp'_{\perp},\\
g_{\beta,0} & = & -\frac{{1}}{4\pi}\int\frac{{f_{\beta}(p'_{\parallel},p'_{\perp})}}{\gamma'}p_{\perp}dp'_{\parallel}dp'_{\perp}\underbrace{{\int_{\phi}\frac{{r}}{(r^{2}-1)^{1/2}}d\phi}}_{H}=-\frac{{1}}{4\pi}\int\frac{{f_{\beta}(p'_{\parallel},p'_{\perp})}}{\gamma'}H(p_{\parallel},p{}_{\perp},p'_{\parallel},p'_{\perp})p_{\perp}dp'_{\parallel}dp'_{\perp},\end{aligned}$$
The segregated integrals $I$ and $H$ are written in terms of complete integrals of the first and third kind (see App. B).
1. Initialize a set of knots
2. Evaluate potential integrals and create cubic spline
3. Bisect original knots to create new knots
4. Evaluate potential integrals at each knot and check error using Eq. (\[eq:boundaryerror\]) : $\lvert{\phi_{I}-\phi_{S}}\rvert$
5. Where error is small, stop local bisection. Where error is large, go to step 3.
However, evaluating potentials at all ghost points in the boundary is expensive. There are approximately $\mathcal{}{O}(N^{1/2})$ ghost cell boundary points, each point requiring $\mathcal{}{O}(N)$ integrals when using Eqs. (\[eq:potentialGreen-1\]). This makes the potential boundary evaluations scale poorly with the number of mesh points $N$, $\mathcal{{O}}(N^{3/2})$. To recover optimal scaling $\mathcal{{O}}(N)$ for the boundary condition treatment, we select a small number of boundary points for the potential evaluations, with the remaining ghost points found by interpolation using a cubic spline. It is not $a\,priori$ clear what the optimal number of spline knots is, or what their optimal locations are. To overcome this, we have devised an algorithm to find the minimum number of spline knots needed for a given tolerance, as outlined in Algorithm 1, and illustrated in Fig. \[fig:Visualizing-adaptive-spline\]. We begin with a set of uniformly distributed ghost points at the boundary, for example four points (black crosses in first row) and evaluate the values of the potential integral. We fit a cubic spline through these values (blue crosses in second row). New knots are then created (black crosses in third row) where integrals are evaluated, and then the absolute error is computed as the difference between the value given by the spline interpolation, $\phi_{S}$, and the actual value of the potential integral at a given point, $\phi_{I}$:
$$a_{b}=\lvert{\phi_{I}-\phi_{S}}\rvert.\label{eq:boundaryerror}$$
This results in a set of knots which do not satisfy the prescribed tolerance (red knot in fourth row), and need to be bisected further. This process is continued until a spline fit of desired accuracy is obtained.
$\hspace{5cm}$![Illustration of adaptive spline technique.\[fig:Visualizing-adaptive-spline\]](splineknots "fig:")
![Adaptive spline knots in a uniform computational domain with $N_{\parallel}=2048$ and $N_{\perp}=64.$ The figure illustrates the $g_{0}$ potential for a Maxwell-Juttner distribution of $\Theta=10^{-4}$. The red dots represent the location of the spline knots. \[fig:Adaptive-spline-knots\]](splineknots1)
To ensure the spline error is commensurate with other sources of error in the algorithm, the absolute tolerance criteria is chosen to be a function of the momentum mesh spacing as:
$$a_{b}\sim0.1\Delta p_{\perp}\Delta p_{\parallel}.$$
Figure \[fig:Adaptive-spline-knots\] illustrates the adaptive knots generated with the adaptive spline algorithm for the $g_{0}$ potential for a Maxwell-Juttner distribution of $\Theta=10^{-4}$ in a mesh of $N_{\parallel}=2048$ and $N_{\perp}=64.$ The red dots along the left, top, and right boundaries point to the location of the spline knots generated using Algorithm 1. The contour of $g_{0}$ is also illustrated to demonstrate the variation of $g_{0}$ at points close and far away from the distribution. The algorithm generates more spline knots when the function varies significantly. At the far right boundary, the points are few and equally spaced, as the function variation is small. A clear benefit of the adaptive spline approach can be seen at the top boundary, where it is determined that only 43 functional evaluations are needed for an accurate estimate of the potential along the entire boundary, which spans a total of $2048$ mesh points.
Nonlinear solver \[sec:Nonlinear-Solver-Strategy-1\]
====================================================
The spatial and temporal discretization techniques prescribed in $\S$\[sec:Algorithm-1\] lead to a coupled nonlinear system of equations, which requires an iterative nonlinear solver for the distribution function. We use an Anderson Acceleration scheme [@Anderson] to converge iteratively the system, which we briefly summarize next.
Given a fixed point map based Picard iteration,
$$f^{k+1}=G(f^{k}),$$ where the superscript $k$ denotes the iteration step, Anderson Acceleration scheme [@walker2011anderson] accelerates the convergence of the Picard iteration by using the history of past nonlinear solutions via:
$$f^{k+1}=\sum_{i=0}^{m_{k}}\alpha_{i}^{k}\underbrace{G(f^{k-m_{k}+i})}_{f^{k-m_{k}+i+1}},\label{eq:anderson}$$
where in this study $m_{k}=\min(5,k).$ The coefficients $\alpha_{i}^{k}$ are determined via an optimization procedure that minimizes,
$$\left\Vert \sum_{i=0}^{m_{k}}\alpha_{i}^{k}\left(G(f^{k-m_{k}+i})-f^{k-m_{k}+i}\right)\right\Vert ,$$ subject to $\sum_{i=0}^{m_{k}}\alpha_{i}^{k}=1$.
We use a quasi-Newton fixed-point iteration map where:
$$f^{k+1}=G(f^{k})=f^{k}+\delta f^{k}=f^{k}-\left(P^{k}\right)^{-1}\mathcal{{R}}^{k},\label{eq:fixedpointmap}$$
with $P^{k}$ the preconditioner, $\delta f^{k}$ the nonlinear increment, and $\mathcal{{R}}^{k}$ the nonlinear residual. Given an electron distribution, $f_{e}$, the residual for the nonlinear system is evaluated as outlined in Algorithm 2. Note that if $P$ is the Jacobian, i.e. $P^{k}=(\partial\mathcal{{R}}/\partial f_{e})^{k}$, then Eq. (\[eq:fixedpointmap\]) becomes a Newton iteration.
The residual contribution from electron-electron collisions requires the solutions of five potentials, which require inversions of the linear equations in Eqs. (\[eq:hpotentials-1\],\[eq:gpotentials-1\]). These are inverted for each nonlinear iteration at flux-assembly time along with the computation of conservation constraints $\eta$. The nonlinear elimination from the residuals of the potentials and conservation constraints follows from previous studies [@Chacon2000; @WT2015], and enables a conservative, optimal $\mathcal{{O}}(N)$ solver when the Poisson operators are inverted optimally and scalably. Here, the linear potential equations are solved using a multigrid-preconditioned GMRES [@GMRES] solver. The multigrid preconditioner features 1 V cycle with 4 passes of damped Jacobi (damping factor of 0.7), along with agglomeration for restriction and a second-order prolongation. At the beginning of the solve, the five potentials are solved using a tighter relative tolerance criteria of $10^{-8}$ and then followed by a looser relative tolerance criteria of $10^{-5}-10^{-7}$ during each nonlinear solve, depending on the problem.
The preconditioner in Eq. (\[eq:fixedpointmap\]) is obtained by Picard linearization of the potentials and subsequent discretization of the full system,
$$P^{k}=\delta_{t}f_{e}^{k}-C(f_{e}^{k-1},f_{e}^{k})-\mathcal{{E}}(f_{e}^{k}),$$ where $\mathcal{{E}}$ represents the net external effects on electrons, see Eq. (\[eq:timeadvancement\]). The transport coefficients in the electron-electron collision operator $C$ are Picard-linearized and computed at the previous nonlinear iteration, $k-1$. All advective terms in the preconditioner are discretized using a linear upwinding scheme. During each nonlinear step $k$, the linear system $P^{k}\delta f^{k}=-\mathcal{{R}}^{k}$ is solved with one multigrid V-cycle and 3 passes of damped Jacobi (with damping constant 0.7). We use agglomeration for restriction and second-order prolongation.
The nonlinear iteration ends when the desired relative nonlinear residual convergence ratio $r_{NL}$ is reached,
$$r_{NL}=\frac{\|{\mathcal{{R}}}\|_{t}}{\|{\mathcal{{R}}}\|_{t=0}}.$$ Cases with large disparities in signal amplitudes, for example a Maxwellian thermal bulk along with small amplitude runaway tail, may require a tighter convergence ratio, $r_{NL}=10^{-7}$. In contrast, a single deforming electron thermal bulk requires a significantly looser nonlinear convergence, $r_{NL}=10^{-4}$.
1. Initialize residual by calculating time derivative using given electron distribution $f_{e}$
2. Compute $\delta_{t}f_{e}$ and boundary conditions for potentials
3. Invert potential equations for $h_{0},h_{1},h_{2},g_{0},g_{1}$ using Eqs. (\[eq:hpotentials-1\]-\[eq:gpotentials-1\]) and evaluate collisional coefficients
4. Compute collisional operator and enforce conservation symmetries, $C(f_{e},f_{e})$
5. Compute external physics: electron-ion scattering operator $C(f_{i,}f_{e})$, synchrotron damping radiation and parallel electric field acceleration$,\,\delta_{\vec{{p}}}\cdot\left[(\vec{{F}}_{S}+\vec{{E}})f_{e}\right]$
6. Assemble nonlinear residual: $$\mathcal{{R}}(f_{e})=\delta_{t}f_{e}-C(f_{e},f_{e})-C(f_{i,}f_{e})+\delta_{\vec{{p}}}\cdot\left[(\vec{{F}}_{S}+\vec{{E}})f_{e}\right]$$
Results\[sec:Numerical-results\]
================================
We begin this section with some verification studies, and finish it with scalability and accuracy studies to assess the performance of the algorithm.
Verification
------------
### Preservation of stationary and boosted Maxwell-Jüttner distributions.
The computational domain is uniform with $N_{\parallel}=256$ and $N_{\perp}=128.$ The nonlinear residual is converged to a relative tolerance of $10^{-4}$ unless otherwise specified. The discrete conservation properties are satisfied to nonlinear tolerance and are independent of the time step used. The electron density is normalized, $n_{e}=1$. The domain is chosen such that the distribution function is sufficiently small at boundaries. The entire domain is shown in the figures illustrating the distribution function. Figure \[fig\_ee\_conservation\]$(a)$ illustrates a static Maxwell-Jüttner (MJ):
$$f_{e}^{MJ}=\frac{{n_{e}}}{4\pi\Theta K_{2}(1/\Theta)}\exp{\left[-\frac{{\gamma(p)}}{\Theta}\right]}$$ in log scale with normalized temperature, $\Theta=T/m_{e}c^{2}=1$ and $K_{2}$ is the modified Bessel function of the second kind. We observe that the distribution retains its initial shape for the whole simulation. To illustrate this, figure \[fig\_ee\_conservation\] $(b)$ demonstrates the evolution of the relative errors in the number density, momentum and energy for 200 electron-electron collision times. The relative errors are measured as,
$$\mathrm{{relative\,error}}=\frac{\lvert g(t)-g(0)\rvert}{g(0)}.$$ where $g$ is either the number density, momentum or energy. The figure shows that the relative errors in number density are one part in $10^{11}$, while errors in relativistic momentum and energy remain smaller than one part in $10^{8}$.
$(a)\hspace{8cm}(b)$
![Preservation of a stationary Maxwell-Jüttner distribution for $\Theta=1$,$n_{e}=1,N_{\parallel}=256,N_{\perp}=128.$ $(a)$ Log contour of electron distribution $f_{e}$, it remains unchanged as a function of time. $(b)$ Time evolution of relative errors of number density (blue), relativistic momentum (red) and relativistic energy (green). Note time is normalized with $\tau_{ee}$. Relativistic and thermal collision times are identical. []{data-label="fig_ee_conservation"}](MJ "fig:")$\hspace{1cm}$![Preservation of a stationary Maxwell-Jüttner distribution for $\Theta=1$,$n_{e}=1,N_{\parallel}=256,N_{\perp}=128.$ $(a)$ Log contour of electron distribution $f_{e}$, it remains unchanged as a function of time. $(b)$ Time evolution of relative errors of number density (blue), relativistic momentum (red) and relativistic energy (green). Note time is normalized with $\tau_{ee}$. Relativistic and thermal collision times are identical. []{data-label="fig_ee_conservation"}](RE_1_MJ "fig:")
In a boosted frame, the equilibrium distribution appears deformed and is given by:
$$f_{e}^{BMJ}=\frac{{n_{e}}}{4\pi\Theta_{b}K_{2}(1/\Theta_{b})}\exp{\left[-\frac{{\gamma_{b}\gamma-p_{b}p_{\parallel}}}{\Theta_{b}}\right]},$$ where the subscript $b$ stands for the boosted values. Fig. \[fig\_ee\_boosted\] illustrates a boosted MJ equilibrium distribution with $\Theta_{b}=0.15$, in a frame boosted by 2 units, $p_{b}=2$ and with $\gamma_{b}=\sqrt{{1+p_{b}^{2}}}.$ The relative errors are shown for 10 relativistic collision times, demonstrating identical behavior as in the static MJ case.
$(a)\hspace{9cm}(b)$
![Preservation of a boosted Maxwell-Jüttner distribution for $n_{e}=1,\Theta_{b}=0.15,$ $p_{b}=2,N_{\parallel}=256,N_{\perp}=128$. (a) Log contour of electron distribution, $f_{e}$. (b) Time evolution of relative errors in number density, momentum and energy. \[fig\_ee\_boosted\]](MBJ "fig:")$\hspace{1cm}$![Preservation of a boosted Maxwell-Jüttner distribution for $n_{e}=1,\Theta_{b}=0.15,$ $p_{b}=2,N_{\parallel}=256,N_{\perp}=128$. (a) Log contour of electron distribution, $f_{e}$. (b) Time evolution of relative errors in number density, momentum and energy. \[fig\_ee\_boosted\]](RE_BMJ "fig:")
### Conservation properties during collisional relaxation dynamics
We consider first the case of two boosted MJ electron distributions which collide and result in a single MJ distribution. Figure \[fig\_ee\_ci\_2MJ\](a) illustrates the collisional relaxation of two MJ distributions boosted by 2 units in opposite directions. Figure \[fig\_ee\_ci\_2MJ\](b) demonstrates the relative errors in number density, momentum and energy. After an initial transient stage $t\in(0,300)$, the relative errors in momentum and number density remain small and asymptotes in time.
$(a)\hspace{7cm}(b)$
![Collisional relaxation of two boosted Maxwell-Jüttner distributions with $n_{e}=1$, $p_{b}=-2,2$, $\Theta_{b}=0.15,N_{\parallel}=256,N_{\perp}=128.$ (a) Evolution of electron distribution contours from two distinct distributions at initial time (top) to a single Maxwell-Jüttner (bottom) (b) Time evolution of relative errors measured during the collisional relaxation process. \[fig\_ee\_ci\_2MJ\]](MJ_Boosted_Combined "fig:")$\hspace{2cm}$![Collisional relaxation of two boosted Maxwell-Jüttner distributions with $n_{e}=1$, $p_{b}=-2,2$, $\Theta_{b}=0.15,N_{\parallel}=256,N_{\perp}=128.$ (a) Evolution of electron distribution contours from two distinct distributions at initial time (top) to a single Maxwell-Jüttner (bottom) (b) Time evolution of relative errors measured during the collisional relaxation process. \[fig\_ee\_ci\_2MJ\]](RE_BoostColl "fig:")
To demonstrate that the discrete conservation strategy works in more complicated cases, we consider the thermalization of a random distribution, see Fig. \[fig\_ee\_random\], of the form:
$$f_{e}^{rand}=\frac{{\mathcal{{P}}}}{\langle\mathcal{{P}},1\rangle_{p}^{D}},\qquad\mathrm{{where}}\qquad\mathcal{{P}}(p_{\parallel},p_{\perp})=\frac{J(p_{\parallel},p_{\perp})}{4\pi\Theta K_{2}(1/\Theta)}\exp{\left[-\frac{{\gamma(p)}}{\Theta}\right]},\label{eq:ferandom}$$
where $\Theta=1$ and $J$ is a random number function with a uniform distribution in the range $[0,0.2]$. The presence of large gradients in the distribution and small tails makes this an excellent problem to test discrete conservation errors and positivity preservation. For a nonlinear relative tolerance of $10^{-4}$, the relative errors in momentum are larger than in previous cases, 1 part in $10^{4}$. Upon tightening the relative tolerance to $10^{-6},$ we find that we can decrease the errors to 1 part in $10^{6}$. We also observed a further decrease in the relative errors of momentum when tightening the relative tolerance to $10^{-8}$ (not shown).
$(a)\hspace{5cm}\qquad(b)\hspace{5cm}(c)$
![Thermal relaxation of a random perturbed Maxwell-Jüttner distribution for $N_{\parallel}=256,N_{\perp}=128$. (a) Initial random electron distribution, see Eq. (\[eq:ferandom\]). (b)-(c) Evolution of relative errors in discrete conservation properties for a nonlinear relative tolerance of $10^{-4}$ in $(b)$ and $10^{-6}$ in $(c).$ \[fig\_ee\_random\]](fig_random_initial "fig:"){width="6cm"}![Thermal relaxation of a random perturbed Maxwell-Jüttner distribution for $N_{\parallel}=256,N_{\perp}=128$. (a) Initial random electron distribution, see Eq. (\[eq:ferandom\]). (b)-(c) Evolution of relative errors in discrete conservation properties for a nonlinear relative tolerance of $10^{-4}$ in $(b)$ and $10^{-6}$ in $(c).$ \[fig\_ee\_random\]](conservationr1e-4 "fig:")![Thermal relaxation of a random perturbed Maxwell-Jüttner distribution for $N_{\parallel}=256,N_{\perp}=128$. (a) Initial random electron distribution, see Eq. (\[eq:ferandom\]). (b)-(c) Evolution of relative errors in discrete conservation properties for a nonlinear relative tolerance of $10^{-4}$ in $(b)$ and $10^{-6}$ in $(c).$ \[fig\_ee\_random\]](conservationr1e-6 "fig:")
### Electrical conductivity in weak and strong electric fields
We consider next the case where collisional friction balances an externally imposed electric field, leading to finite electrical conductivity. We have verified the code for a wide range of initial temperatures for a Maxwell-Jüttner distribution by comparing the electrical conductivity to results provided by Braams and Karney [@BK89]. To measure conductivity, we apply a small electric field, $\hat{{E}}_{\parallel}=10^{-3}E_{D}$ where $E_{D}$ is the Dreicer field, $E_{D}=E_{c}/\Theta$, with $E_{c}$ the Connor-Hastie critical electric field [@CH75]. The electron distribution is initialized using the Maxwell-Jüttner distribution at various temperatures $\Theta$ and the normalized electrical conductivity is computed as:
$$\bar{{\sigma}}=\frac{{Z_{\mathrm{{eff}}}}}{n_{e}q_{e}\Theta^{3/2}}\frac{j}{E_{\parallel}},\qquad,\qquad j=-n_{e}q_{e}v_{\parallel},$$ where $v_{\parallel}=p_{\parallel}/\gamma$. A small electric field deforms the Maxwellian slightly to produce a net electron flow in the positive $p_{\parallel}$ direction. Figure \[fig\_sigma\_weak\](a) depicts $\bar{\sigma}/Z_{\mathrm{{eff}}}$ at various temperatures. The numerical simulation results (circles) are in excellent agreement with the analytical results (lines) from Ref. [@BK89].
$(a)\hspace{8cm}(b)$
![Verification under weak and strong electric fields. The computational domain is uniform with $N_{\parallel}=512$ and $N_{\perp}=256.$ (a) Normalized electrical conductivity vs. $\Theta$ for different effective ion charges. The momentum domain sizes varied with a minimum of $p_{\perp}\in(0,0.12)$ and $p_{\parallel}\in(-0.12,0.12)$ for $\Theta=10^{-4}$ and a maximum of $p_{\perp}\in(0,40)$ and $p_{\parallel}\in(-40,40)$ for $\Theta=5$. (b) Time evolution of electrical conductivity for various strengths of the electric field. The electron distribution was initialized with a Maxwellian for $\Theta=10^{-4}$ and $Z_{\mathrm{{eff}}}=1$. The momentum domain is $p_{\perp}\in(0,0.3)$ and $p_{\parallel}\in(-0.3,0.3)$ for strong electric field and $p_{\perp}\in(0,0.12)$ and $p_{\parallel}\in(-0.12,0.12)$ for weak electric field limits.\[fig\_sigma\_weak\]](fig_sigma_complete "fig:")![Verification under weak and strong electric fields. The computational domain is uniform with $N_{\parallel}=512$ and $N_{\perp}=256.$ (a) Normalized electrical conductivity vs. $\Theta$ for different effective ion charges. The momentum domain sizes varied with a minimum of $p_{\perp}\in(0,0.12)$ and $p_{\parallel}\in(-0.12,0.12)$ for $\Theta=10^{-4}$ and a maximum of $p_{\perp}\in(0,40)$ and $p_{\parallel}\in(-40,40)$ for $\Theta=5$. (b) Time evolution of electrical conductivity for various strengths of the electric field. The electron distribution was initialized with a Maxwellian for $\Theta=10^{-4}$ and $Z_{\mathrm{{eff}}}=1$. The momentum domain is $p_{\perp}\in(0,0.3)$ and $p_{\parallel}\in(-0.3,0.3)$ for strong electric field and $p_{\perp}\in(0,0.12)$ and $p_{\parallel}\in(-0.12,0.12)$ for weak electric field limits.\[fig\_sigma\_weak\]](sigmaevolution "fig:"){width="8cm" height="6cm"}
Fig. \[fig\_sigma\_weak\](b) illustrates the time evolution of electrical conductivity for various electric-field strengths in the non-relativistic limit. Results of NORSE [@NORSE] (circles) and Weng et. al [@Weng] (squares) are also shown. The electron distribution is initialized with Maxwellian corresponding to an initial temperature of $\Theta=10^{-4}$ and $n_{e}=1$. Note that the study in Ref. [@Weng] uses the nonrelativistic Fokker-Planck operator. For all values of electric field, we have good agreement with previous methods. For the case of $\hat{{E}}_{\parallel}=0.01E_{D},$ we have better agreement with NORSE than Weng et al., as expected.
### Reproducing runaway-electron tail dynamics
To verify runaway dynamics with existing studies, we performed two linearized numerical simulations where we kept the collisional cofficients fixed with time and used an initial Maxwell-Jüttner distribution of $n_{e}=1$ and $\Theta=1$. In the first simulation, we applied an electric field that was 2.25 times the critical value, i.e $E_{\parallel}=2.25.$ This caused some electrons to overcome the frictional force and accelerate to high speeds. Figure \[fig:runaway\_tail\] demonstrates the evolution of the runaway tail at $42000\,\tau_{ee}^{thermal}$ collision times. The asymptotic slope of the runaway tail as predicted by Connor-Hastie [@CH75] is:
$$f_{e}^{tail}\propto\frac{1}{p_{\parallel}}\exp\left(-\frac{{(E_{\parallel}+1)p_{\perp}^{2}}}{2(1+Z_{\mathrm{{eff}}})p_{\parallel}}\right).$$ As can be seen in the figure, the runaway tail produced by the algorithm is in excellent agreement with the asymptotic theoretical results.
![Electron distribution function vs. $p_{\parallel}$ for $p_{\perp}=\Delta p_{\perp}/2,\,E_{\parallel}=2.25,\,\Theta=0.01$ and $Z_{\mathrm{{eff}}}=1$. The computational domain is uniform with $N_{\parallel}=2048$ and $N_{\perp}=512$ with $p_{\perp}\in(0,10)$ and $p_{\parallel}\in(-10,60)$. The initial Maxwellian is represented by the blue line concentrated at the origin, $p_{\parallel}=0.$ At 7000 $\tau_{ee}^{thermal}$ (green line), we see a finite tail develop from the Maxwellian. This tail grows steadily as time increases. Time step $\Delta t=0.01$ i.e. 10 thermal collision time scales, and the tolerances are $r_{NL}=10^{-6}$. \[fig:runaway\_tail\]](CHastie.pdf)
In the second simulation, we verified runaway electron dynamics in the presence of the synchrotron radiation damping term in Eq. (\[eq:synchrotron\_damping\]). Figure \[synchrotron damping\] shows a steady-state contour of the electron distribution function when we use a damping coefficient of $S=0.1$. Other parameters are $E_{\parallel}=2.25,\Theta=0.01,Z_{\mathrm{{eff}}}=1$. As can be seen, the electrons accumulate in the momentum space around $p_{0}\approx18$, forming a second maximum, and in good agreement with Ref. [@Guo17].
![Electron distribution function in the $(p_{\parallel},p_{\perp})$ space for $E_{\parallel}=2.25\,,\Theta=0.01,$ $Z_{\mathrm{{eff}}}=1$ and synchrotron damping factor $S=0.1$. The second maximum is located at $p\approx18.$ The computational domain is uniform with $N_{\parallel}=2048$ and $N_{\perp}=512.$ The contour is plotted at time $t=777.$ Time step, $\Delta t=0.5$ i.e. 500 $\tau_{ee}^{thermal}$, and the tolerances are $r_{NL}=10^{-6}$. []{data-label="synchrotron damping"}](withSdamping.pdf)
Solver performance
------------------
### Algorithmic and parallel scalability.\[subsec:Algorithmic-and-parallel\]
Table \[tab:Parallel-and-algorithmic-random\] lists weak parallel scalability results for the thermalization of a random electron distribution of unit number density. These results include the wall clock time (WCT) per time step, the number of nonlinear iterations (NI) per implicit time step $\Delta t$, the ratio WCT/NI (which is an indirect measure of the parallel performance), and the ratio between implicit and explicit time steps (which is a measure of numerical stiffness). The potential linear iterations (PLI) is the average number of GMRES iterations required for each potential solve. The absolute tolerances are set to $10^{-8}$. For the initial solve, the potentials are converged tightly to a relative tolerance of $10^{-8}$, with a looser tolerance of $10^{-6}$ used for subsequent nonlinear iterations. The explicit time step is calculated as:
$$\Delta t_{\mathrm{{explicit}}}=0.25\min_{\beta=i,e}\left(\frac{{\Delta}p_{\parallel}^{2}}{\max({D_{\beta,\parallel\parallel}})},\frac{{\Delta}p_{\perp}^{2}}{\max({D_{\beta,\perp\perp}})},\frac{{\Delta}p_{\perp}}{\max({A_{\beta,\perp}})},\frac{{\Delta}p_{\parallel}}{\max({A_{\beta,\parallel}})}\right).$$ Table \[tab:Parallel-and-algorithmic-random\] demonstrates excellent parallel scalability (WCT/NI) up to 4096 processors. When increasing the number of processors while keeping the problem size per processor constant, we are effectively increasing the resolution of the problem, thus making the problem harder to solve for a fixed time step (as evidenced by the increasing implicit-to-explicit timestep ratio). This manifests in a mild growth of the number of nonlinear iterations (NLI) as we increase the number of cores.
Table \[tab:Parallel-and-algorithmic\_MJ\] lists parallel and algorithmic scalability results for the case of collisional relaxation of two Maxwell-Jüttner distributions, boosted by one momentum unit in opposite directions and a normalized temperature of $10^{-1}$ in their frames of reference. We observe good parallel (WCT/NI) and algorithmic scalability (NI) up to 4096 processors with $\Delta t/\Delta t_{\mathrm{{explicit}}}\sim460$ for the high resolution case of $4096\times2048$. Figure \[scaling\] illustrates weak scaling results of the wall clock time per nonlinear iteration (WCT/NI) vs. the number of cores for the random electron thermalization (red line, Table \[tab:Parallel-and-algorithmic-random\]) and the boosted MJ relaxation (blue line, Table \[tab:Parallel-and-algorithmic\_MJ\]). We observe excellent parallel scalability in both cases.
$N_{\parallel}$ $N_{\perp}$ $np$ NI per $\Delta t$ WCT (sec) per $\Delta t$ WCT/NI $\Delta t/\Delta t_{\mathrm{{explicit}}}$ PLI
----------------- ------------- ------ ------------------- -------------------------- -------- ------------------------------------------- -------
128 64 4 5 14.55 2.918 82 7.8
256 128 16 4 14.95 3.7 329 9.14
512 256 64 4 17.68 4.42 1318 9.475
1024 512 256 4.5 20.83 4.628 5270 9.088
2048 1024 1024 6.5 29.03 4.4669 21083 8.969
4096 2048 4096 10.5 46.3 4.409 84331 9.0
: Parallel and algorithmic scaling: Collisional relaxation of two boosted Maxwell-Jüttner distributions in domain with $p_{\parallel}\in(-15,15)$ and $p_{\perp}\in(0,15).$ The results are averaged over 10 time steps with $r_{NL}=10^{-5}$ . \[tab:Parallel-and-algorithmic\_MJ\]
$N_{\parallel}$ $N_{\perp}$ $np$ NI per $\Delta t$ WCT (sec) per $\Delta t$ WCT/NI $\Delta t/\Delta t_{\mathrm{{explicit}}}$ PLI
----------------- ------------- ------ ------------------- -------------------------- -------- ------------------------------------------- -------
128 64 4 3.3 15.1 4.57 0.45 8.5
256 128 16 3.3 17.3 5.24 1.8 8.6
512 256 64 3 18.6 6.2 7.2 10.8
1024 512 256 3 19.1 6.4 29 11.6
2048 1024 1024 3 23.1 7.7 115 12.4
4096 2048 4096 4 30.6 7.65 460 13.55
: Parallel and algorithmic scaling: Collisional relaxation of two boosted Maxwell-Jüttner distributions in domain with $p_{\parallel}\in(-15,15)$ and $p_{\perp}\in(0,15).$ The results are averaged over 10 time steps with $r_{NL}=10^{-5}$ . \[tab:Parallel-and-algorithmic\_MJ\]
![Weak scaling test with local processor size of $64\times32$.[]{data-label="scaling"}](Figure_1)
### Spatial and temporal accuracy
$(a)\hspace{8cm}(b)$
![Spatial and temporal accuracy measurement of the proposed scheme using the two boosted MJ configuration. \[fig:accuracy\]](spatial_error "fig:"){width="8cm" height="6cm"}![Spatial and temporal accuracy measurement of the proposed scheme using the two boosted MJ configuration. \[fig:accuracy\]](temporal_error "fig:"){width="8cm" height="6cm"}
Figure \[fig:accuracy\]$(\emph{{a}}$) illustrates the spatial accuracy of the proposed scheme with the boosted MJ problem described in $\S$\[subsec:Algorithmic-and-parallel\]. The ’exact’ electron distribution $f_{e}^{exact}$ is obtained at $t=0.15$ with $N_{\parallel}=1024$, $N_{\perp}=512$ and $\Delta t=0.01$, while the three data points (solid dots) correspond to coarser grids of $128\times64$, $256\times128$ and $512\times256$. The blue dashed line corresponds to a second-order decrease in the error. The $\ell_{2}-$norm of the error between the ’exact’ and numerical electron distributions is computed as:
$$\|f_{e}-f_{e}^{exact}\|_{2}=\left(\sum_{j=1}^{N_{\parallel}}\sum_{k=1}^{N_{\perp}}(f_{e,j,k}-f_{e,j,k}^{exact})^{2}2\pi p_{\perp,k}\Delta p_{\parallel,j}\Delta p_{\perp,k}\right)^{0.5}.$$ We confirm that the proposed implementation is second-order accurate in space.
Figure \[fig:accuracy\]$(\emph{{b}}$) illustrates the temporal accuracy of the implementation. In this case, the ’exact’ electron distribution $f_{e}^{exact}$ is obtained in a $256\times128$ grid using the BDF2 time advancement scheme with $\Delta t=5\times10^{-4}$, see description in $\S$\[subsec:Time-stepping-strategy\]. The four data points correspond to larger time steps of $\Delta t=10^{-4},2\times10^{-4},4\times10^{-4},$ and $10^{-3}$. As expected, the proposed implementation is second-order accurate in time.
Conclusions and future work\[sec:Conclusion-and-Future\]
========================================================
We have developed a fully implicit, optimal $\mathcal{{O}}(N)$ relativistic nonlinear Fokker-Plank solver for runaway electrons, where $N$ is the number of grid points. We considered a 0D2P cylindrical momentum space representation. Our implementation is parallel and scalable. Our solver employs the differential form of the Fokker-Planck equation, which requires the solution of five relativistic potentials in momentum space to obtain the collisional coefficients. To ensure optimal scaling with mesh points, we have developed an adaptive spline technique for filling potential ghost cells at boundaries. Using multi-grid preconditioned GMRES solve for the potentials, and a robust Anderson Acceleration fixed-point iteration scheme for our nonlinear solves, we are able to obtain $\mathcal{{O}}(N)$ scaling for the overall algorithm. Our solver has been implemented with both first-order and second-order backward differentiation formulas. We verified our solver by comparing with previous results for electrical conductivity measurements in the weak and strong electric field limits. We demonstrated the accuracy of conserved quantities in electron-electron collisions, with small relative errors, in number density, relativistic momentum, and energy. In addition, we have examined runaway dynamics and verified it by comparing to known results [@CH75; @Guo17]. In future work, we will extend this method to study inhomogeneous plasmas by considering the spatial dependence of the electron distribution function.
Acknowledgements {#acknowledgements .unnumbered}
================
The authors would like to thank E. Hirvijoki for useful discussions on the properties of the relativistic operator and Z. Guo for help in verifying the algorithm. The authors also thank C. McDevitt and X. Tang for useful inputs during the course of this project. This work was supported by the US Department of Energy through the Los Alamos National Laboratory. Los Alamos National Laboratory is operated by Triad National Security, LLC, for the National Nuclear Security Administration of U.S. Department of Energy (Contract No. 89233218CNA000001). This research used resources provided by the Los Alamos National Laboratory Institutional Computing Program.
Appendix A. Discretization of operators in potential equations and collisional coefficients {#appendix-a.-discretization-of-operators-in-potential-equations-and-collisional-coefficients .unnumbered}
===========================================================================================
A1. Linear potential equations. {#a1.-linear-potential-equations. .unnumbered}
--------------------------------
The potential operator $L$ consists of Hessian and advective terms,
$$L\,\psi=({\overline{{I}}}+\vec{{p}}\vec{{p}}):\frac{{\partial^{2}\psi}}{\partial{\vec{{p}}}\partial{\vec{{p}}}}+3\vec{{p}}.\frac{{\partial{\psi}}}{\partial\vec{{p}}}.$$ The terms are discretized using central differencing. The Laplacian piece is computed as:
$$\left(\overline{{\overline{{I}}}}:\frac{{\partial^{2}\psi}}{\partial\vec{{p}}\partial{\vec{{p}}}}\right)_{j,k}=\left(\frac{{\partial^{2}\psi}}{\partial p_{\parallel}^{2}}+\frac{{\partial^{2}\psi}}{\partial p_{\perp}^{2}}\right)_{j,k}=\frac{{X_{j+\frac{{1}}{2},k}-X_{j-\frac{{1}}{2},k}}}{\Delta p{}_{\parallel,j}}+\frac{{p_{\perp,k+\frac{{1}}{2}}Y_{j,k+\frac{{1}}{2}}-p_{\perp,k-\frac{{1}}{2}}Y_{j,k-\frac{{1}}{2}}}}{p_{\perp,k}\Delta p{}_{\perp,k}},$$ where,
$$X_{j+\frac{{1}}{2},k}=\frac{{\psi_{j+1,k}-\psi_{j,k}}}{\Delta p_{\parallel,j+\frac{{1}}{2}}},\qquad\qquad Y_{j,k+\frac{{1}}{2}}=\frac{{\left(\psi_{j,k+1}-\psi_{j,k}\right)}}{\Delta p_{\perp,k+\frac{{1}}{2}}}.$$ The remaining Hessian piece is computed as:
$$\begin{aligned}
\left(\vec{{p}}\vec{{p}}:\frac{{\partial^{2}\psi}}{\partial\vec{{p}}\partial{\vec{{p}}}}\right)_{j,k} & = & \left[\begin{array}{cc}
p_{\parallel,j}p_{\parallel,j} & p_{\perp,k}p_{\parallel,j}\\
p_{\parallel,j}p_{\perp,k} & p_{\perp,k}p_{\perp,k}
\end{array}\right]:\left[\begin{array}{cc}
\frac{{\partial^{2}\psi}}{\partial p_{\parallel}^{2}} & \frac{{\partial^{2}\psi}}{\partial p_{\parallel}\partial p_{\perp}}\\
\frac{{\partial^{2}\psi}}{\partial p_{\perp}\partial p_{\parallel}} & \frac{{\partial^{2}\psi}}{\partial p_{\perp}^{2}}
\end{array}\right]_{j,k}\\
& = & p_{\parallel,j}p_{\parallel,j}\frac{{Q_{j+\frac{{1}}{2},k}-Q_{j-\frac{{1}}{2},k}}}{\Delta p{}_{\parallel,j}}+p_{\perp,k}p_{\perp,k}\frac{{R_{j,k+\frac{{1}}{2}}-R_{j,k-\frac{{1}}{2}}}}{\Delta p{}_{\perp,k}}\\
& + & 2p_{\perp,k}p_{\parallel,j}\frac{{T_{j,k+\frac{{1}}{2}}-T_{j,k-\frac{{1}}{2}}}}{\Delta p{}_{\perp,k}},\end{aligned}$$
where
$$Q_{j+\frac{{1}}{2},k}=\frac{{\psi_{j+1,k}-\psi_{j,k}}}{\Delta p_{\parallel,j+\frac{{1}}{2}}},\quad R_{j,k+\frac{{1}}{2}}=\frac{{\psi_{j,k+1}-\psi_{j,k}}}{\Delta p_{\perp,k+\frac{{1}}{2}}},$$
$$T_{j,k+\frac{{1}}{2}}=\frac{{1}}{2}\left(\frac{{\psi_{j+\frac{{1}}{2},k+1}-\psi_{j-\frac{{1}}{2},k+1}}}{\Delta p_{\parallel,j}}+\frac{{\psi_{j+\frac{{1}}{2},k}-\psi_{j-\frac{{1}}{2},k}}}{\Delta p_{\parallel,j}}\right).$$ The advective piece is computed as:
$$\left(3\vec{{p}}.\frac{{\partial{\psi}}}{\partial\vec{{p}}}\right)_{j,k}=3\left(p_{\parallel,j}\frac{{\psi_{j+\frac{{1}}{2},k}-\psi_{j-\frac{{1}}{2},k}}}{\Delta p_{\parallel,j}}+p_{\perp,k}\frac{{\psi_{j,k+\frac{{1}}{2}}-\psi_{j,k-\frac{{1}}{2}}}}{\Delta p_{\perp,k}}\right).$$ Note the cell faced values of $\psi$ are found by linear averaging across cell centered values, for example $\psi_{j+1/2,k}=0.5(\psi_{j,k}+\psi_{j+1,k})$ and $\psi_{j,k+1/2}=0.5(\psi_{j,k}+\psi_{j,k+1})$.
A2. Collisional coefficients. {#a2.-collisional-coefficients. .unnumbered}
------------------------------
Once the potentials are determined, the friction coefficients are evaluated using Eq. (\[eq:A-1\]). The components of $\vec{{K}}\psi$ at the cell center are defined as:
$$\begin{aligned}
(K\psi)_{j,k} & = & \left(\overline{{\overline{{I}}}}+\vec{{p}}\vec{{p}}\right)_{j,k}\cdot\left(\frac{{\partial\psi}}{\partial\vec{{p}}}\right)_{j,k}\\
& = & \left[\begin{array}{c}
(1+p_{\parallel,j}p_{\parallel,j})\left(\frac{{\psi_{j+\frac{{1}}{2},k}-\psi_{j-\frac{{1}}{2},k}}}{\Delta p_{\parallel,j}}\right)+p_{\parallel,j}p_{\perp,k}\left(\frac{{\psi_{j,k+\frac{{1}}{2}}-\psi_{j,k-\frac{{1}}{2}}}}{\Delta p_{\perp,k}}\right)\\
(1+p_{\perp,k}p_{\perp,k})\left(\frac{{\psi_{j,k+\frac{{1}}{2}}-\psi_{j,k-\frac{{1}}{2}}}}{\Delta p_{\perp,k}}\right)+p_{\parallel,j}p_{\perp,k}\left(\frac{{\psi_{j+\frac{{1}}{2},k}-\psi_{j-\frac{{1}}{2},k}}}{\Delta p_{\parallel,j}}\right)
\end{array}\right]\end{aligned}$$
The cell face values of $\psi$ are found by taking the average of cell-centered values. A similar discretization approach is used when evaluating the diffusion coefficient, Eq. (\[eq:D-1\]) .
A3. Reformulated off-diagonal tensor diffusion terms (effective friction coefficients). {#a3.-reformulated-off-diagonal-tensor-diffusion-terms-effective-friction-coefficients. .unnumbered}
----------------------------------------------------------------------------------------
The off-diagonal diffusion coefficients are expressed as effective friction coefficients of the form $D_{\parallel\perp}\partial\ln{f}/\partial p_{\perp}$ and $D_{\perp\parallel}\partial\ln{f}/\partial p_{\parallel}$, see Eq (\[eq:Feff\]). The momentum-space derivatives of $\ln{f}$ at cell centers are evaluated by averaging the cell vertex values, for example:
$$\left(\frac{{\partial\ln{f}}}{\partial p_{\perp}}\right)_{j,k}=\frac{{1}}{4}\left(\left(\frac{{\partial\ln{f}}}{\partial p_{\perp}}\right)_{j+\frac{{1}}{2},k+\frac{{1}}{2}}+\left(\frac{{\partial\ln{f}}}{\partial p_{\perp}}\right)_{j-\frac{{1}}{2},k+\frac{{1}}{2}}+\left(\frac{{\partial\ln{f}}}{\partial p_{\perp}}\right)_{j-\frac{{1}}{2},k-\frac{{1}}{2}}+\left(\frac{{\partial\ln{f}}}{\partial p_{\perp}}\right)_{j+\frac{{1}}{2},k-\frac{{1}}{2}}\right),$$ where the cell vertex value is obtained by averaging over adjacent face-centered values:
$$\left(\frac{{\partial\ln{f}}}{\partial p_{\perp}}\right)_{j+\frac{{1}}{2},k+\frac{{1}}{2}}=\frac{{1}}{2}\left(\frac{{\ln(\lvert{f_{j,k+1}}\rvert+\epsilon_{l})-\ln{(\lvert f_{j,k}\rvert+\epsilon_{l})}}}{\Delta p_{\perp,k+\frac{{1}}{2}}}+\frac{{\ln{(\vert{f}}_{j+1,k+1}\rvert+\epsilon_{l})-\ln{(\lvert{f}_{j+1,k}}\rvert+\epsilon_{l})}}{\Delta p_{\perp,k+\frac{{1}}{2}}}\right),$$
$$\left(\frac{{\partial\ln{f}}}{\partial p_{\perp}}\right)_{j+\frac{{1}}{2},k-\frac{{1}}{2}}=\frac{{1}}{2}\left(\frac{{\ln(\vert{f}_{j,k}\rvert+\epsilon_{l})-\ln{(\lvert f_{j,k-1}\rvert+\epsilon_{l})}}}{\Delta p_{\perp,k-\frac{{1}}{2}}}+\frac{{\ln{(\vert{f}}_{j+1,k}\rvert+\epsilon_{l})-\ln{(\vert{f}_{j+1,k-1}}\rvert+\epsilon_{l})}}{\Delta p_{\perp,k-\frac{{1}}{2}}}\right),$$
$$\left(\frac{{\partial\ln{f}}}{\partial p_{\perp}}\right)_{j-\frac{{1}}{2},k+\frac{{1}}{2}}=\frac{{1}}{2}\left(\frac{{\ln(\vert{f}_{j-1,k+1}\rvert+\epsilon_{l})-\ln{(\lvert f_{j-1,k}\rvert+\epsilon_{l})}}}{\Delta p_{\perp,k+\frac{{1}}{2}}}+\frac{{\ln{(\lvert{f}}_{j,k+1}\rvert+\epsilon_{l})-\ln{(\vert{f}_{j,k}}\rvert+\epsilon_{l})}}{\Delta p_{\perp,k+\frac{{1}}{2}}}\right),$$
$$\left(\frac{{\partial\ln{f}}}{\partial p_{\perp}}\right)_{j-\frac{{1}}{2},k-\frac{{1}}{2}}=\frac{{1}}{2}\left(\frac{{\ln(\vert{f_{j-1,k}}\rvert+\epsilon_{l})-\ln{(\vert f_{j-1,k-1}\rvert+\epsilon_{l})}}}{\Delta p_{\perp,k-\frac{{1}}{2}}}+\frac{{\ln{(\lvert{f}}_{j,k}\rvert+\epsilon_{l})-\ln{(\vert{f}_{j,k-1}}\rvert+\epsilon_{l})}}{\Delta p_{\perp,k-\frac{{1}}{2}}}\right),$$ where $\epsilon_{l}=10^{-30}$ is added to mollify singularities. Once computed at the cell centers, the friction coefficients at the cell faces are found by linear averaging.
Appendix B: Solution of singular integrals in relativistic potentials {#app:potential_elliptic_kernel .unnumbered}
======================================================================
B1. Solution of first singular integral {#b1.-solution-of-first-singular-integral .unnumbered}
---------------------------------------
We seek a solution of the integral: $$I=\int_{0}^{2\pi}\frac{d\phi}{\sqrt{r^{2}-1}},\label{eq:integral}$$ with: $$r=\sqrt{(1+p^{2})(1+(p')^{2})}-\mathbf{p}\cdot\mathbf{p}'=\underbrace{\sqrt{(1+p^{2})(1+(p')^{2})}-p_{\parallel}p'_{\parallel}}_{a^{2}}-\underbrace{p_{\perp}p'_{\perp}}_{b^{2}}\cos\phi=a^{2}-b^{2}\cos\Phi.$$ We consider the case of $b^{2}>0$ (strictly positive; this is the case of interest numerically). Note $r^{2}-1=(r+1)(r-1)$. Since $r\geq1$, it follows that: $$a^{2}\geq b^{2}+1.\label{eq:coeffs_constraint}$$
To begin, we consider the change of variable $t=\cos\phi$. The integration limits for this change of variable needs to be treated carefully, as otherwise one may conclude the integral $I$ is zero! We consider the following cases: $$\begin{aligned}
t=\cos\phi & , & \phi\in[0,\frac{\pi}{2}],\phi\in[\frac{3\pi}{2},2\pi]\,;\,d\phi=\frac{-dt}{\sqrt{1-t^{2}}}\\
t=-\cos\phi & , & \phi\in[\frac{\pi}{2},\frac{3\pi}{2}]\,;\,d\phi=\frac{dt}{\sqrt{1-t^{2}}}.\end{aligned}$$ This gives: $$I=2\underbrace{\int_{0}^{1}\frac{dt}{\sqrt{(1-t^{2})(a^{2}+1-b^{2}t)(a^{2}-1-b^{2}t)}}}_{I_{1}}+2\underbrace{\int_{0}^{1}\frac{dt}{\sqrt{(1-t^{2})(a^{2}+1+b^{2}t)(a^{2}-1+b^{2}t)}}}_{I_{2}}.$$
### Solution of $I_{2}$ integral {#solution-of-i_2-integral .unnumbered}
We begin with the integral $I_{2}$. We follow Abramowitz & Stegun [@abramowitz], and consider the polynomials: $$\begin{aligned}
Q_{1} & = & 1-t^{2},\\
Q_{2} & = & (a^{2}+1+b^{2}t)(a^{2}-1+b^{2}t).\end{aligned}$$ These polynomials have real roots $\pm1$, $-\frac{a^{2}+1}{b^{2}}$, $-\frac{a^{2}-1}{b^{2}}$. Because of Eq. (\[eq:coeffs\_constraint\]), it is apparent that the last two roots are $\leq-1$, and hence $Q_{1}$ and $Q_{2}$ do not have nested roots. In this case, one can consider the transformation to the canonical forms of the elliptic integrals by constructing the polynomial: $$Q_{1}-\lambda Q_{2}=-(1+\lambda b^{4})t^{2}-2b^{2}a^{2}\lambda t+1-\lambda(a^{4}-1).\label{eq:Q1-Q2-transformation}$$ Seeking a zero discriminant for the quadratic form in $t$ gives the following value for $\lambda$: $$\begin{aligned}
b^{4}a^{4}\lambda^{2} & = & (\lambda(a^{4}-1)-1)(1+\lambda b^{4})\Rightarrow\lambda^{2}b^{4}-\lambda(a^{4}-b^{4}-1)+1=0\nonumber \\
& \Rightarrow & \lambda_{\pm}=\frac{(a^{4}-b^{4}-1)\pm\sqrt{(a^{4}-b^{4}-1)^{2}-4b^{4}}}{2b^{4}}.\label{eq:lambda-def}\end{aligned}$$ Note that these roots are real and semi-positive, since, by Eq. (\[eq:coeffs\_constraint\]): $$(a^{4}-b^{4}-1)\geq2b^{2}.$$ Also, it is obvious that $$\lambda_{+}>\lambda_{-}>0,\label{eq:lambda-root-ranking}$$ and that: $$\lambda_{+}\lambda_{-}=\frac{1}{b^{4}}.\label{eq:lambda-root-product}$$ Since the discriminant for Eq. (\[eq:Q1-Q2-transformation\]) vanishes, it follows that the roots of $Q_{1}-\lambda Q_{2}$ are perfect squares and are given by: $$t=-t_{\pm}\,\,;\,\,t_{\pm}=\frac{\lambda_{\pm}b^{2}a^{2}}{1+\lambda_{\pm}b^{4}}.\label{eq:t-roots}$$ Therefore: $$\begin{aligned}
Q_{1}-\lambda_{+}Q_{2} & = & -(1+\lambda b^{4})(t+t_{+})^{2},\label{eq:Q1-Q2-plus}\\
Q_{1}-\lambda_{-}Q_{2} & = & -(1+\lambda b^{4})(t+t_{-})^{2}.\label{eq:Q1-Q2-minus}\end{aligned}$$
At this point, it is useful to point out a few properties of the roots $t_{\pm}$ in Eq. (\[eq:t-roots\]). Firstly, from Eq. (\[eq:lambda-root-ranking\]) it follows that: $$t_{+}>t_{-}.\label{eq:t-root-ranking}$$ Secondly, from the polynomial in Eq. (\[eq:Q1-Q2-transformation\]) and the properties of the quadratic equations, we can write: $$t_{\pm}^{2}=\frac{\lambda_{\pm}(a^{4}-1)-1}{1+\lambda_{\pm}b^{4}},\label{eq:t-squared}$$ which can be used to prove that: $$t_{-}\leq1\label{eq:tminus<1}$$ (needed for later) as follows: $$t_{-}^{2}\leq1\Leftrightarrow\lambda_{-}\underbrace{(a^{4}-b^{4}-1)}_{\geq2b^{2}}<2\Leftrightarrow\lambda_{-}\leq1/b^{2},\label{eq:lambda_minus_ineq}$$ which can be shown to be true when noting that: $$(a^{4}-b^{4}-1)^{2}-4b^{4}=(a^{4}-b^{4}-1-2b^{2})(a^{4}-b^{4}-1+2b^{2})\geq(a^{4}-b^{4}-1-2b^{2})^{2}.$$ The inequality follows from Eq. (\[eq:lambda-def\]). Finally, using Eq. (\[eq:lambda\_minus\_ineq\]) and the inequality above, we can also readily prove that: $$t_{+}=\frac{\lambda_{+}b^{2}a^{2}}{1+\lambda_{+}b^{4}}=\frac{a^{2}}{b^{2}}\frac{1}{\lambda_{-}+1}\geq\frac{a^{2}}{b^{2}+1}\geq1,\label{eq:tplus>one}$$ which will be important later.
Eqs (\[eq:Q1-Q2-plus\], \[eq:Q1-Q2-minus\]) can be solved for $Q_{1}$ and $Q_{2}$ as follows: $$\begin{aligned}
Q_{2} & = & a_{2+}(t+t_{+})^{2}-a_{2-}(t+t_{-})^{2},\\
Q_{1} & = & a_{1+}(t+t_{+})^{2}-a_{1-}(t+t_{-})^{2}.\end{aligned}$$ Here: $$a_{2\pm}=\frac{1+\lambda_{\pm}b^{4}}{\lambda_{+}-\lambda_{-}}\,\,;\,\,a_{1\pm}=\frac{\lambda_{\mp}(1+\lambda_{\pm}b^{4})}{\lambda_{+}-\lambda_{-}}.$$ Note that:
- $a_{2+}>a_{2-}$ (from Eq. \[eq:lambda-root-ranking\]).
- $a_{1+}/a_{1-}=t_{-}/t_{+}<1$ (from Eq. \[eq:t-root-ranking\]).
From the expressions of $Q_{1}$, $Q_{2}$, one can write: $$Q_{1}Q_{2}=(t+t_{+})^{4}\left[a_{2+}-a_{2-}\frac{(t+t_{-})^{2}}{(t+t_{+})^{2}}\right]\left[a_{1+}-a_{1-}\frac{(t+t_{-})^{2}}{(t+t_{+})^{2}}\right].$$ Following Ref. [@abramowitz], we postulate the change of variables: $$w=\frac{(t+t_{-})}{(t+t_{+})}\Rightarrow dw=\frac{t_{+}-t_{-}}{(t_{+}+t)^{2}}dt.$$ Hence: $$I_{2}=\int_{0}^{1}\frac{dt}{\sqrt{Q_{1}Q_{2}}}=\frac{1}{t_{+}-t_{-}}\int_{w_{0}}^{w_{1}}\frac{dw}{\sqrt{\left[a_{2+}-a_{2-}w^{2}\right]\left[a_{1+}-a_{1-}w^{2}\right]}}.\label{eq:I2-dw}$$ Here: $$w_{0}=\frac{t_{-}}{t_{+}}<1\,\,;\,\,w_{1}=\frac{1+t_{-}}{1+t_{+}}\,\,;\,\,w_{0}<w_{1}<1.$$ The result in Eq. (\[eq:I2-dw\]) can be written as a canonical elliptic integral by considering: $$\frac{a_{1+}}{a_{1-}}=\frac{t_{-}}{t_{+}}=w_{0}=e^{2}<1\,\,;\,\,\frac{a_{2+}}{a_{2-}}=\frac{1+\lambda_{+}b^{4}}{1+\lambda_{-}b^{4}}=d^{2}>1,\label{eq:defs-e-d}$$ to find: $$I_{2}=\int_{0}^{1}\frac{dt}{\sqrt{Q_{1}Q_{2}}}=\frac{1}{(t_{+}-t_{-})\sqrt{a_{2-}a_{1-}}}\int_{e^{2}}^{e}\frac{dw}{\sqrt{\left[d^{2}-w^{2}\right]\left[e^{2}-w^{2}\right]}}.$$ Here, we have used the surprising property that: $$w_{1}^{2}=\left(\frac{1+t_{-}}{1+t_{+}}\right)^{2}=\frac{t_{-}}{t_{+}}=e^{2}\Rightarrow w_{1}=e,$$ which can be demonstrated by using the definition of $t_{\pm}$ (Eq. \[eq:t-roots\]) and $t_{\pm}^{2}$ (Eq. \[eq:t-squared\]).
### Solution of $I_{1}$ integral {#solution-of-i_1-integral .unnumbered}
The solution of the integral $I_{1}$ follows a similar development, except now: $$\begin{aligned}
Q_{1} & = & 1-t^{2},\\
Q_{2} & = & (a^{2}+1-b^{2}t)(a^{2}-1-b^{2}t).\end{aligned}$$ With these definitions, it can be shown that the discriminant of the combination $Q_{1}-\lambda Q_{2}$ is exactly the same, and therefore so are the solutions $\lambda_{\pm}$. However the roots in $t$ now have opposite signs: $$t=t_{\pm}\,\,;\,\,t_{\pm}=\frac{\lambda_{\pm}b^{2}a^{2}}{1+\lambda_{\pm}b^{4}},\label{eq:t-roots-1}$$ and the factorization of $Q_{1,2}$ reads: $$\begin{aligned}
Q_{2} & = & a_{2+}(t-t_{+})^{2}-a_{2-}(t-t_{-})^{2},\\
Q_{1} & = & a_{1+}(t-t_{+})^{2}-a_{1-}(t-t_{-})^{2}.\end{aligned}$$ From the expressions of $Q_{1}$, $Q_{2}$, one can write: $$Q_{1}Q_{2}=(t-t_{+})^{4}\left[a_{2+}-a_{2-}\frac{(t-t_{-})^{2}}{(t-t_{+})^{2}}\right]\left[a_{1+}-a_{1-}\frac{(t-t_{-})^{2}}{(t-t_{+})^{2}}\right].$$ Following Ref. [@abramowitz], we postulate the change of variables: $$w=\frac{(t-t_{-})}{(t_{+}-t)}\Rightarrow dw=\frac{t_{+}-t_{-}}{(t_{+}-t)^{2}}dt.$$ When postulating this change of variables, we have taken into account the fact that $t\leq1<t_{+}$ (Eq. \[eq:tplus>one\]), and that $t_{-}<1$ (Eq. \[eq:tminus<1\]). It follows that: $$I_{1}=\int_{0}^{1}\frac{dt}{\sqrt{Q_{1}Q_{2}}}=\frac{1}{t_{+}-t_{-}}\int_{w_{0}}^{w_{1}}\frac{dw}{\sqrt{\left[a_{2+}-a_{2-}w^{2}\right]\left[a_{1+}-a_{1-}w^{2}\right]}},\label{eq:I1-dw}$$ where: $$w_{0}=-\frac{t_{-}}{t_{+}}=-e^{2}<0\,\,;\,\,w_{1}=\frac{1-t_{-}}{t_{+}-1}>0.$$ As before, one can readily prove that: $$w_{1}^{2}=\left(\frac{1-t_{-}}{t_{+}-1}\right)^{2}=\frac{t_{-}}{t_{+}}=e^{2},$$ and therefore $w_{1}=e$. There results: $$I_{1}=\int_{0}^{1}\frac{dt}{\sqrt{Q_{1}Q_{2}}}=\frac{1}{(t_{+}-t_{-})\sqrt{a_{2-}a_{1-}}}\int_{-e^{2}}^{e}\frac{dw}{\sqrt{\left[d^{2}-w^{2}\right]\left[e^{2}-w^{2}\right]}}.\label{eq:I1-dw-1}$$
### Solution of total integral $I$ {#solution-of-total-integral-i .unnumbered}
When combining these two solutions, we find: $$\begin{aligned}
I & = & 2(I_{1}+I_{2})=\frac{2}{(t_{+}-t_{-})\sqrt{a_{2-}a_{1-}}}\left[\int_{e^{2}}^{e}\frac{dw}{\sqrt{\left[d^{2}-w^{2}\right]\left[e^{2}-w^{2}\right]}}+\int_{-e^{2}}^{e}\frac{dw}{\sqrt{\left[d^{2}-w^{2}\right]\left[e^{2}-w^{2}\right]}}\right]\\
& = & \frac{2}{(t_{+}-t_{-})\sqrt{a_{2-}a_{1-}}}\left[\int_{e^{2}}^{e}+\int_{0}^{e}+\int_{-e^{2}}^{0}\right]=\frac{2}{(t_{+}-t_{-})\sqrt{a_{2-}a_{1-}}}\left[\int_{e^{2}}^{e}+\int_{0}^{e}+\int_{0}^{e^{2}}\right]\\
& = & \frac{4}{(t_{+}-t_{-})\sqrt{a_{2-}a_{1-}}}\int_{0}^{e}\frac{dw}{\sqrt{\left[d^{2}-w^{2}\right]\left[e^{2}-w^{2}\right]}},\end{aligned}$$ which can be written in terms of the complete elliptic integral of the second kind as [@abramowitz]: $$I=\frac{4K(m)}{d(t_{+}-t_{-})\sqrt{a_{2-}a_{1-}}}=\frac{4K(m)}{(t_{+}-t_{-})\sqrt{a_{2+}a_{1-}}},$$ where in the last step we have used the definition of $d$ (Eq. \[eq:defs-e-d\]), and where: $$m=e^{2}/d^{2}.$$
B2. Solution of second singular integral {#b2.-solution-of-second-singular-integral .unnumbered}
----------------------------------------
In the previous section, we determined the root structure of the radicand and removed the odd terms in the radicand. We employ this approach and also use ideas from Ref. [@labahn-1] to express the following elliptic integral,
$$H=\int_{o}^{2\pi}\frac{{r\,d\phi}}{\sqrt{{r^{2}-1}}},$$ in terms of Legendre’s elliptic functions. Recall that
$$r=a^{2}-b^{2}\cos{\phi}.$$ The integral can thus be expressed as,
$$\begin{aligned}
H & = & 2\int_{0}^{1}\frac{(a^{2}-b^{2}t)dt}{\sqrt{(1-t^{2})(a^{2}+1-b^{2}t)(a^{2}-1-b^{2}t)}}+2\int_{0}^{1}\frac{(a^{2}+b^{2}t)dt}{\sqrt{(1-t^{2})(a^{2}+1+b^{2}t)(a^{2}-1+b^{2}t)}}.\end{aligned}$$
We can regroup as we know from $\S$B1 the solution when the numerator is unity,
$$H=a^{2}I+2\underbrace{\int_{0}^{1}\frac{-b^{2}t\,dt}{\sqrt{(1-t^{2})(a^{2}+1-b^{2}t)(a^{2}-1-b^{2}t)}}}_{H_{1}}+2\underbrace{\int_{0}^{1}\frac{b^{2}t\,dt}{\sqrt{(1-t^{2})(a^{2}+1+b^{2}t)(a^{2}-1+b^{2}t)}}}_{H_{2}}.\label{eq:H}$$
Removing the odd terms in the radicand, we obtain,
$$H_{1}=\int_{0}^{1}\frac{-b^{2}t\,dt}{\sqrt{Q_{1}Q_{2}}}=\frac{-b^{2}}{(t_{+}-t_{-})\sqrt{a_{2-}a_{1-}}}\int_{-e^{2}}^{e}\frac{(wt_{+}+t_{-})/(1+w)dw}{\sqrt{\left[d^{2}-w^{2}\right]\left[e^{2}-w^{2}\right]}}$$
$$=\frac{-b^{2}}{(t_{+}-t_{-})\sqrt{a_{2-}a_{1-}}}\int_{-e^{2}}^{e}\frac{R_{1}(w)dw}{\sqrt{\left[d^{2}-w^{2}\right]\left[e^{2}-w^{2}\right]}},$$ and
$$H_{2}=\int_{0}^{1}\frac{b^{2}t\,dt}{\sqrt{Q_{1}Q_{2}}}=\frac{b^{2}}{(t_{+}-t_{-})\sqrt{a_{2-}a_{1-}}}\int_{e^{2}}^{e}\frac{(-wt_{+}+t_{-})/(-1+w)dw}{\sqrt{\left[d^{2}-w^{2}\right]\left[e^{2}-w^{2}\right]}}$$
$$=\frac{b^{2}}{(t_{+}-t_{-})\sqrt{a_{2-}a_{1-}}}\int_{e^{2}}^{e}\frac{R_{2}(w)dw}{\sqrt{\left[d^{2}-w^{2}\right]\left[e^{2}-w^{2}\right]}}.$$ The rational functions of $w$, $R_{1}$ and $R_{2}$, can be expressed in terms of odd and even functions. This is because the odd term can be simplified into elementary functions via trigonometric substitutions, see Ref. [@labahn-1].
$$R_{1}(w)=\frac{w}{1-w^{2}}(t_{+}-t_{-})+\frac{{t_{-}-w^{2}t_{+}}}{1-w^{2}}$$
$$R_{2}(w)=\frac{w}{1-w^{2}}(t_{+}-t_{-})-\frac{{t_{-}-w^{2}t_{+}}}{1-w^{2}}$$ However, in our case we observe that these terms cancel each other. Examining the odd terms in $R_{1}$ and $R_{2}$, and adding together their contribution to $H$, we find:
$$H_{1}^{odd}+H_{2}^{odd}=-\int_{-e^{2}}^{e}+\int_{e^{2}}^{e}=-\int_{-e^{2}}^{e^{2}}=0,$$ as the odd function is asymmetric about the origin. The even term can be further factorized into:
$$\frac{t_{-}-w^{2}t_{+}}{1-w^{2}}=t_{+}-\frac{t_{+}-t_{-}}{1-w^{2}}.$$ Putting the above expression into $H_{1}$ and $H_{2}$ , the contributions of the even terms may be expressed as,
$$H_{1}+H_{2}=-\frac{b^{2}t_{+}}{(t_{+}-t_{-})\sqrt{a_{2-}a_{1-}}}\left(\int_{-e^{2}}^{e}\frac{dw}{\sqrt{\left[d^{2}-w^{2}\right]\left[e^{2}-w^{2}\right]}}+\int_{e^{2}}^{e}\frac{dw}{\sqrt{\left[d^{2}-w^{2}\right]\left[e^{2}-w^{2}\right]}}\right)$$
$$+\frac{b^{2}}{\sqrt{a_{2-}a_{1-}}}\left(\int_{-e^{2}}^{e}\frac{dw}{(1-w^{2})\sqrt{\left[d^{2}-w^{2}\right]\left[e^{2}-w^{2}\right]}}+\int_{e^{2}}^{e}\frac{dw}{(1-w^{2})\sqrt{\left[d^{2}-w^{2}\right]\left[e^{2}-w^{2}\right]}}\right)$$ Simplifying and regrouping, we obtain the expression for H, see Eq. (\[eq:H\]) as,
$$H=(a^{2}-b^{2}t_{+})I+\frac{{4b^{2}}}{\sqrt{{a_{2+}a_{1-}}}}\Pi(e^{2},m)\label{eq:finalH}$$
where $\Pi$ is the complete elliptic integral of the third kind, with $e^{2}<1$. This formula has been verified numerically. Also in the above, we made use of the following step which was described earlier in the previous section. It is as follows,
$$\int_{-e^{2}}^{e}+\int_{e^{2}}^{e}=\int_{-e^{2}}^{0}+2\int_{0}^{e}-\int_{0}^{e^{2}}$$ Then substituting $t=w/e$ to get the final form (\[eq:finalH\]). The complete elliptic integral of the third kind is given by,
$$\Pi(e^{2},m)=\int_{0}^{1}\frac{{dt}}{(1-e^{2}t)\sqrt{(1-t^{2})(1-mt^{2})}}.$$
[^1]: corresponding author: dond@lanl.gov
| 2024-01-23T01:27:17.568517 | https://example.com/article/1773 |
{
"meta": {
"generated": 1575727891.596
},
"data": [
{
"ix_id": 1,
"status": "ok",
"asn": 65536,
"updated": "2018-09-24T15:16:52Z",
"name": "Mocked",
"created": "2010-07-29T00:00:00Z",
"speed": 100000,
"notes": "",
"ipaddr4": "203.0.113.1",
"net_id": 1,
"is_rs_peer": false,
"ipaddr6": "2001:db8::1",
"ixlan_id": 1,
"id": 1
},
{
"ix_id": 1,
"status": "ok",
"asn": 65536,
"updated": "2018-09-24T15:16:52Z",
"name": "Mocked",
"created": "2010-07-29T00:00:00Z",
"speed": 100000,
"notes": "",
"ipaddr4": "203.0.113.2",
"net_id": 1,
"is_rs_peer": false,
"ipaddr6": "2001:db8::2",
"ixlan_id": 1,
"id": 2
}
]
}
| 2023-09-30T01:27:17.568517 | https://example.com/article/7463 |
Conservative musings and comments.
Now I am sure that when I was voting in our ‘monumental’ CF elections I was wooed by the promises that there would be a concerted effort to make national CF events that everybody could attend (in essence, something in the Midlands) and that the organisation would not be so London-centric… Well, I was duped!
I have more correspondence from ConWayFor then I do from CF, I don’t think, since the elections, I have recieved one e-mail telling me what they intend to be, or rather are, doing. This is pathetic, a national organisation supposedly representing every Conservative under 30 and yet nobody knows what they are doing? I’m sure there is very adequate reasons for this, such as the usual, e.g lack of money, lack of time or even lack of effort.
I must admit that I voted for the Forward Together ticket as I liked what they said, they were a team and so would have clearly been able to work together, and because they seemed like they genuinely cared by going out of their way to make a website, get in touch, and just present what they wanted to do. It was more about us and less about them. To be honest, I don’t regret voting for them and I wish more people had because we wouldn’t have the ghost of a committee that we have now!
The committee need to get their act together, as it is no suprise that we are not, as an organisation taken seriously, by either the Party or the members. A word of advice, get in touch with the members or risk being slated with everything you try and do in the Party later on (although I must excuse ABB from this, she is working on causes on her own it seems).
Well, it’s the first ever blog and so I shall address something that is particularly important to me; the Education system. As a student, I feel i’m in quite a good position to criticise what I believe is a failing Labour system. I am completely against the Labour Policy that 50% of young people should be in University as I strongly believe that only the best should be there! If you, reader, can give me a strong argument for the amount of people going to University on, as Boris Johnson put it, “Mickey Mouse courses” then fair play, I will retract this blog, however, I fail to see how it can possibly be good for our country that everyone has a degree and that the best students are being discriminated against in the name of positive discrimination?!
Now, this might well be controversial (although only to those who recieve it) but i hate EMA! Why on earth should the taxpayer be giving their hard earned money away for someone to recieve ‘my first Handout’, it’s a disgrace! What I propose would be a far better solution would be to have an incentives based system, in which, if students attain the best grades they are rewarded with the money that those who recieve EMA are getting. For example, teachers should set work every week, and if the children return this work and gain high grades such as A’s and B’s, then they should recieve the bonus of the ten or thirty pounds a week that others are for turning up and distracting others.
I am by no means saying that if a child needs money to get to college don’t give it to them, far from it, in fact, if the said child presents bus tickets and receipts showing that they have bought what they need for college, and, if they fall in between what is deemed an income in which the money is needed, then yes, give them that money back. However, it is not right and should never be considered right that the system is punishing children who are born into families where they get opportunities, and where it is so easily exploited it is drank away every weekend, whilst other students, who don’t recieve EMA, are working their fingers to the bone in the hope of making something of themselves and getting to the best universities.
In my opinion, individualism and competition gains better results, yes, it is fine to present a level playing field, however, if you do find better students, then give them the chance to go as far as they can! Rather than wasting time on students who are only there for the money, give backing to the students who are going to reward the country by becoming doctors, barristers, nurses, teachers etc.
Finally, as I have already shown my dislike fpr the Educational Maintenance Allowance, I will make my final point, bring back Grammar Schools! They are the only possible way to foster the competitiveness that our country needs to be great again, take the students on the basis of their Year 6 SATs though, and not on the basis of an 11+ test that is easily manipulated to favour the advantaged, because, after all, we want education to be competitive, not exploited. | 2024-06-19T01:27:17.568517 | https://example.com/article/3592 |
The sky must be falling or pigs must be flying.
You know its bad for “Crooked” Hillary Clinton when even fake news CNN is mocking her for finally getting around to visiting Michigan and Wisconsin…albeit for her book tour (and to sell very overpriced tickets, because when it comes to money Hillary will always show up), but at least the pathetic presidential loser will finally visit states she should have visited when she was actually running against Donald Trump.
Via The Gateway Pundit…
Hillary Clinton has been busy promoting her new book What Happened which of course is her version of her crushing election loss (lies). She shamelessly promoted it during Hurricane Harvey while barely mentioning the poor people affected by the storm.
Hillary also announced that she would FINALLY be visiting Wisconsin and Michigan, two states she ignored during the Presidential election and ultimately lost to Donald Trump-JUST to promote her new book. Hillary has no shame. She’ll travel to places to collect money and peddle her book, but didn’t care enough to talk to the American people face to face during the election.
She is also charging Toronto residents $2400 each to meet her on her book tour.
You know it’s bad when CNN is mocking Hillary. CNN carried the water for her during the 2016 presidential election so to see them laughing at her is a big blow to the failed presidential hopeful.
“On her book tour she’s going to Michigan and Wisconsin. Really?! Really?!” CNN’s John King said as the panel laughed.
“If she had been to Michigan and Wisconsin during the campaign…” John King continued as the panel snickered.
But Russia, right? She lost because of Russia. | 2023-08-30T01:27:17.568517 | https://example.com/article/7912 |
Thursday, November 3, 2011
North Carolina's utilities commission wants Duke Energy and Progress Energy to answer more than two dozen lingering questions on their planned merger.
Some queries are left over from the commission's September hearing. Others arose when the companies filed a proposal Oct. 17 to sell excess wholesale power, responding to anti-competition concerns of the Federal Energy Regulatory Commission.
The N.C. commission wants answers by Nov. 17. Among its questions:
-- Does the power-sale plan submitted to federal regulators change the joint operating agreement between Duke and Progress, a key to the merger?
-- What is the companies' employee-reduction plan? Are more staff cuts (Duke and Progress have said they expect to trim about 2,000 jobs) expected after the merger?
-- Is the offer of a $15 million contribution to workforce preparedness connected to the merger's expected impact on the N.C. workforce?
-- What factors will the companies include in the "service quality measurement" proposed in the merger settlement with the commission's Public Staff?
Tuesday, November 1, 2011
With two months left in 2011, it's looking less likely Duke Energy and Progress Energy can meet their goal of merging by year's end.
"Given the amount of approvals needed, you could certainly look at it that way," said Duke spokesman Tom Williams.
On Monday the companies fired off a request that the Federal Energy Regulatory Commission reconsider the conditions it attached to its Sept. 30 approval of the merger. The filing accused the commission, in evaluating the impacts to wholesale-power markets, of holding the companies to a higher bar than it had previous mergers.
Duke and Progress still hope FERC will approve their offer to sell off excess power, addressing the competition concerns, by Dec. 15. Even if it does, much work remains.
The N.C. Utilities Commission, which has not yet ruled on the merger, will have to review the power-sale proposal if FERC approves it. South Carolina's utility commission has to rule on the companies' plan to jointly operate their power plant fleets in the Carolinas. FERC has not yet addressed the joint-operating proposal or a power transmission agreement among Duke and Progress subsidiaries.
Duke's last merger, with Cincinnati-based Cinergy, took 11 months to complete in 2006. Williams said Duke and Progress are eager to close this deal, which was announced in early January, to reduce the "internal churn" of assigning roles for their combined 29,000 employees. The companies expect to cut about 2,000 positions through voluntary departures and, if needed, layoffs. | 2024-01-17T01:27:17.568517 | https://example.com/article/2402 |
Recent highlights in electro-driven separations- selected applications of alkylthiol gold nanoparticles in capillary electrophoresis and capillary electro-chromatography.
To date, alkylthiol gold nanoparticles (AuNPs) have been widely used in electro-chromatographic separation techniques as a viable alternative to traditional stationary phases. This is mainly due to their stability, chemical inertness, ease of functionality, increased phase ratio, ability to form self-assembled monolayers. They also yield versatile stationary phases with highly specific targeted functionalities. At the nanoscale region, the chemical and physical properties of a molecule display different attributes to that of the parent molecules or material, hence these features can be harnessed in electro-driven chromatographic separations. Application areas illustrating the use of AuNPs in separation science continue to grow and expand to cover many different kinds of analysis. The last decade has witnessed a successful trend in miniaturisation of chemical separation systems toward the micro and nanoscale ranges. Nanoparticle-based stationary phases fit well with performing chemical separations on microfluidic and capillary platforms. In this review the theory of the use of alkylthiol gold nanoparticles in electro-chromatographic driven separation methods will be discussed. This will be followed by details of recent and selected applications showing alkylthiol gold nanoparticles in capillary electrophoretic and open-tubular electro-chromatographic separations. This review will focus solely on alkylthiol based gold nanoparticles, therefore other kinds of chemical moieties bonded to gold nanoparticles are outside the scope of this review. Finally the future outlook of this exciting technology will be outlined in some detail in the final section. | 2024-01-28T01:27:17.568517 | https://example.com/article/3321 |
{-# LANGUAGE OverloadedStrings #-}
{-# LANGUAGE RecordWildCards #-}
module Smos.Query.Commands.Work
( smosQueryWork,
)
where
import Conduit
import Data.List (intersperse)
import Data.List.NonEmpty (NonEmpty)
import qualified Data.Map as M
import Data.Maybe
import qualified Data.Text as T
import Data.Time
import Rainbow
import Smos.Query.Config
import Smos.Query.Formatting
import Smos.Query.OptParse.Types
import Smos.Report.Entry
import Smos.Report.Filter
import Smos.Report.Projection
import Smos.Report.Work
import System.Exit
smosQueryWork :: WorkSettings -> Q ()
smosQueryWork WorkSettings {..} = do
src <- asks smosQueryConfigReportConfig
liftIO $ when (not workSetSmartMode && isNothing workSetTime) $ die "No time filter provided."
now <- liftIO getZonedTime
let wc = smosReportConfigWorkConfig src
let contexts = workReportConfigContexts wc
let baseFilter = workReportConfigBaseFilter wc
case M.lookup workSetContext contexts of
Nothing -> liftIO $ die $ unwords ["Context not found:", T.unpack $ contextNameText workSetContext]
Just cf -> do
let wrc =
WorkReportContext
{ workReportContextNow = now,
workReportContextBaseFilter = baseFilter,
workReportContextCurrentContext = cf,
workReportContextTimeProperty = workSetTimeProperty,
workReportContextTime = workSetTime,
workReportContextAdditionalFilter = workSetFilter,
workReportContextContexts = contexts,
workReportContextChecks = workSetChecks,
workReportContextSorter = workSetSorter
}
wr <- produceWorkReport workSetHideArchive (smosReportConfigDirectoryConfig src) wrc
liftIO $ putTableLn $ renderWorkReport now workSetProjection wr
renderWorkReport :: ZonedTime -> NonEmpty Projection -> WorkReport -> Table
renderWorkReport now ne WorkReport {..} =
mconcat
$ (concat . concat)
$ intersperse [spacer]
$ filter
(not . null)
[ unlessNull
workReportNextBegin
[ sectionHeading "Next meeting:",
[formatAsTable $ maybe [] ((: []) . formatAgendaEntry now) workReportNextBegin]
],
unlessNull
workReportAgendaEntries
[ sectionHeading "Deadlines:",
[agendaTable]
],
unlessNull
workReportResultEntries
[sectionHeading "Next actions:", [entryTable workReportResultEntries]],
unlessNull
workReportEntriesWithoutContext
[ warningHeading "WARNING, the following Entries don't match any context:",
[entryTable workReportEntriesWithoutContext]
],
unlessNull
workReportCheckViolations
[ warningHeading "WARNING, the following Entries did not pass the checks:",
concat
$ flip concatMap (M.toList workReportCheckViolations)
$ \(f, violations) ->
unlessNull violations [warningHeading (renderFilter f), [entryTable violations]]
]
]
where
unlessNull l r =
if null l
then []
else r
sectionHeading t = heading $ underline $ fore white $ chunk t
warningHeading t = heading $ underline $ fore red $ chunk t
heading c = [formatAsTable [[c]]]
spacer = [formatAsTable [[chunk " "]]]
entryTable = renderEntryReport . makeEntryReport ne
agendaTable = formatAsTable $ map (formatAgendaEntry now) workReportAgendaEntries
| 2024-07-07T01:27:17.568517 | https://example.com/article/4693 |
Q:
Is ok to urlencode the value in header(Location: value)?
This is PHP.
I do
header("Location: " . $url)
and works great. But If I do
header("Location: " . urlencode($url))
I'm redirected to some weird place like $url/$url which gives me a 404, of course.
But I do want to urlencode my url because it's made of user provided data. How can I do it? Can i break it un "http://" and "the rest" and only urlencode "the rest"?
Which is the recommended practice in this situation?
Thanks
A:
But I do want to urlencode my url because it's made of user provided data
The solution is don't encode the full URL, encode only the bits that need encoding. Just encoding "the rest" is bound to fail as well. In this example for example, all slashes, the ? and the = must stay intact:
http://www.example.com/rewritten directory/index.php?id=Hello World, how are you?
but you do need to encode rewritten directory and Hello World, how are you?
in order for the whole thing to form a valid URL.
Like with character encodings, you need to make sure from the start to know what is encoded how. The solution to your problem (if there is one at all - header() is likely to work without urlencode() in the first place!) is likely to be further up in your code.
| 2023-11-23T01:27:17.568517 | https://example.com/article/8090 |
Evaluating medical resource utilization and costs associated with thrombocytopenia in chronic liver disease patients.
Thrombocytopenia (TCP), defined as platelet counts <150,000/µL, is a common complication of severe chronic liver disease (CLD). This retrospective study estimated the prevalence of thrombocytopenia in a large population of CLD patients and compared medical resource utilization and medical care costs by TCP status. A retrospective analysis was conducted on a longitudinal administrative claims database from a large US commercial health plan. Patients assigned CLD diagnosis codes from January 1, 2000-December 31, 2003 were identified; annual ambulatory visits, ER visits, inpatient stays, and general and CLD-related medical care costs for patients with vs without TCP (identified using diagnosis codes and platelet count data if available) were compared. Of 56,445 patients with an ICD-9-CM diagnosis for CLD, 1289 (2.3%) had a diagnosis for TCP. CLD patients with vs without a TCP diagnosis had >2.5-times the annual number of liver disease-related ambulatory visits (3.6 vs 1.4; odds ratio [OR] = 2.6, p < 0.01); were 13-times more likely to have a liver-related inpatient stay (OR = 13.0, p < 0.01); were nearly 4-times more likely to have a liver-related ER visit (OR = 3.9, p < 0.01); had 3.5-fold greater mean annual overall medical care costs ($43,560 vs $12,270, p < 0.01); and had 7-fold greater annual liver disease-related medical care costs ($9940 vs $1420, p < 0.01). Similar results were seen for patients with platelet count data indicating TCP. CLD and TCP are not always diagnosed, nor is diagnosis uniform or standardized; administrative claims data are subject to coding errors, and individuals covered are not necessarily representative of the general US population. The number of CLD patients in this study with TCP (n = 1289) is small relative to that expected in the general US population. In this analysis, CLD patients with TCP used significantly more medical resources and incurred significantly higher medical care costs than those without TCP. | 2024-07-06T01:27:17.568517 | https://example.com/article/8218 |
/****************************************************************************
**
** This file is part of the LibreCAD project, a 2D CAD program
**
** Copyright (C) 2010 R. van Twisk (librecad@rvt.dds.nl)
** Copyright (C) 2001-2003 RibbonSoft. All rights reserved.
**
**
** This file may be distributed and/or modified under the terms of the
** GNU General Public License version 2 as published by the Free Software
** Foundation and appearing in the file gpl-2.0.txt included in the
** packaging of this file.
**
** This program is distributed in the hope that it will be useful,
** but WITHOUT ANY WARRANTY; without even the implied warranty of
** MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
** GNU General Public License for more details.
**
** You should have received a copy of the GNU General Public License
** along with this program; if not, write to the Free Software
** Foundation, Inc., 51 Franklin Street, Fifth Floor, Boston, MA 02110-1301 USA
**
** This copyright notice MUST APPEAR in all copies of the script!
**
**********************************************************************/
#ifndef QG_DIALOGFACTORY_H
#define QG_DIALOGFACTORY_H
#include "rs_dialogfactoryinterface.h"
class QG_PolylineEquidistantOptions;
class QG_SnapMiddleOptions;
class QG_SnapDistOptions;
class QG_ModifyOffsetOptions;
class QWidget;
class QToolBar;
class QG_CoordinateWidget;
class QG_SelectionWidget;
class QG_MouseWidget;
class QG_ArcTangentialOptions;
class QG_PrintPreviewOptions;
//class PrintPreviewOptions;
class QG_CommandWidget;
class RS_Document;
class QG_LineAngleOptions;
class RS_Vector;
#define QG_DIALOGFACTORY (RS_DialogFactory::instance()->getFactoryObject())
/**
* This is the Qt implementation of a widget which can create and
* show dialogs.
*/
class QG_DialogFactory: public RS_DialogFactoryInterface {
public:
QG_DialogFactory(QWidget* parent, QToolBar* ow);
~QG_DialogFactory() override;
protected:
/**
* Links factory to a widget that can host tool options.
*/
void setOptionWidget(QToolBar* ow);
public:
/**
* Links this dialog factory to a coordinate widget.
*/
void setCoordinateWidget(QG_CoordinateWidget* cw) override{
coordinateWidget = cw;
}
/**
* Links this dialog factory to a mouse widget.
*/
void setMouseWidget(QG_MouseWidget* mw) override{
mouseWidget = mw;
}
/**
* Links this dialog factory to a selection widget.
*/
void setSelectionWidget(QG_SelectionWidget* sw) override{
selectionWidget = sw;
}
/**
* Links this dialog factory to a command widget.
*/
void setCommandWidget(QG_CommandWidget* cw) override{
commandWidget = cw;
}
/**
* @return command widget or nullptr.
*/
QG_CommandWidget* getCommandWidget() const{
return commandWidget;
}
/**
* Links the dialog factory to a main app window.
*/
void requestWarningDialog(const QString& warning) override;
RS_Layer* requestNewLayerDialog(
RS_LayerList* layerList = nullptr) override;
RS_Layer* requestLayerRemovalDialog(
RS_LayerList* layerList = nullptr) override;
QStringList requestSelectedLayersRemovalDialog(
RS_LayerList* layerList = nullptr) override;
RS_Layer* requestEditLayerDialog(
RS_LayerList* layerList = nullptr) override;
RS_BlockData requestNewBlockDialog(RS_BlockList* blockList) override;
RS_Block* requestBlockRemovalDialog(
RS_BlockList* blockList) override;
QList<RS_Block*> requestSelectedBlocksRemovalDialog(
RS_BlockList* blockList = nullptr) override;
RS_BlockData requestBlockAttributesDialog(
RS_BlockList* blockList) override;
void requestEditBlockWindow(RS_BlockList* /*blockList*/) override{}
void closeEditBlockWindow(RS_Block* /*blockList*/) override{}
//QString requestFileSaveAsDialog() override;
//QString requestFileOpenDialog() override;
QString requestImageOpenDialog() override;
void requestOptions(RS_ActionInterface* action,
bool on, bool update = false) override;
protected:
void requestPrintPreviewOptions(RS_ActionInterface* action,
bool on, bool update);
void requestLineOptions(RS_ActionInterface* action,
bool on);
void requestPolylineOptions(RS_ActionInterface* action,
bool on, bool update);
void requestPolylineEquidistantOptions(RS_ActionInterface* action, bool on, bool update=false);
void requestLineAngleOptions(RS_ActionInterface* action,
bool on, bool update);
void requestLineRelAngleOptions(RS_ActionInterface* action,
bool on, bool update);
void requestLineParallelOptions(RS_ActionInterface* action,
bool on, bool update);
void requestLineParallelThroughOptions(RS_ActionInterface* action,
bool on, bool update);
void requestLineBisectorOptions(RS_ActionInterface* action,
bool on, bool update);
void requestLinePolygonOptions(RS_ActionInterface* action,
bool on, bool update);
void requestLinePolygon2Options(RS_ActionInterface* action,
bool on, bool update);
void requestArcOptions(RS_ActionInterface* action,
bool on, bool update);
void requestArcTangentialOptions(RS_ActionInterface* action,
bool on, bool update);
void requestCircleOptions(RS_ActionInterface* action,
bool on, bool update);
void requestCircleTan2Options(RS_ActionInterface* action,
bool on, bool update);
void requestSplineOptions(RS_ActionInterface* action,
bool on, bool update);
void requestMTextOptions(RS_ActionInterface* action,
bool on, bool update);
void requestTextOptions(RS_ActionInterface* action,
bool on, bool update);
void requestDimensionOptions(RS_ActionInterface* action,
bool on, bool update);
void requestDimLinearOptions(RS_ActionInterface* action,
bool on, bool update);
void requestInsertOptions(RS_ActionInterface* action,
bool on, bool update);
void requestImageOptions(RS_ActionInterface* action,
bool on, bool update);
void requestTrimAmountOptions(RS_ActionInterface* action,
bool on, bool update);
void requestMoveRotateOptions(RS_ActionInterface* action,
bool on, bool update);
void requestBevelOptions(RS_ActionInterface* action,
bool on, bool update);
void requestRoundOptions(RS_ActionInterface* action,
bool on, bool update);
void requestLibraryInsertOptions(RS_ActionInterface* action,
bool on, bool update);
public:
void requestSnapDistOptions(double& dist, bool on) override;
void requestSnapMiddleOptions(int& middlePoints, bool on) override;
public:
bool requestAttributesDialog(RS_AttributesData& data,
RS_LayerList& layerList) override;
bool requestMoveDialog(RS_MoveData& data) override;
bool requestRotateDialog(RS_RotateData& data) override;
bool requestScaleDialog(RS_ScaleData& data) override;
bool requestMirrorDialog(RS_MirrorData& data) override;
bool requestMoveRotateDialog(RS_MoveRotateData& data) override;
bool requestRotate2Dialog(RS_Rotate2Data& data) override;
bool requestModifyEntityDialog(RS_Entity* entity) override;
void requestModifyOffsetOptions(double& dist, bool on) override;
bool requestMTextDialog(RS_MText* text) override;
bool requestTextDialog(RS_Text* text) override;
bool requestHatchDialog(RS_Hatch* hatch) override;
void requestOptionsGeneralDialog() override;
void requestOptionsDrawingDialog(RS_Graphic& graphic) override;
bool requestOptionsMakerCamDialog() override;
QString requestFileSaveAsDialog(const QString& caption = QString(),
const QString& dir = QString(),
const QString& filter = QString(),
QString* selectedFilter = 0) override;
void updateCoordinateWidget(const RS_Vector& abs, const RS_Vector& rel, bool updateFormat=false) override;
/**
* \brief updateMouseWidget Called when an action has a mouse hint.
* \param left mouse hint for left button
* \param right mouse hint for right button
*/
void updateMouseWidget(const QString& left=QString(),
const QString& right=QString()) override;
void updateSelectionWidget(int num, double length) override;//updated for total number of selected, and total length of selected
void commandMessage(const QString& message) override;
static QString extToFormat(const QString& ext);
void updateArcTangentialOptions(const double& d, bool byRadius) override;
protected:
//! Pointer to the widget which can host dialogs
QWidget* parent;
//! Pointer to the widget which can host individual tool options
QToolBar* optionWidget;
//! Pointer to the coordinate widget.
QG_CoordinateWidget* coordinateWidget;
//! Pointer to the mouse widget.
QG_MouseWidget* mouseWidget;
//! Pointer to the selection widget.
QG_SelectionWidget* selectionWidget;
//! Pointer to the command line widget
QG_CommandWidget* commandWidget;
//! Pointer to arcTangential Option widge
QG_ArcTangentialOptions* arcTangentialOptions;
QG_PolylineEquidistantOptions* polylineEquidistantOptions;
private:
// pointers to snap option widgets
QG_SnapMiddleOptions* snapMiddleOptions;
QG_SnapDistOptions* snapDistOptions;
QG_ModifyOffsetOptions* modifyOffsetOptions;
QG_PrintPreviewOptions* printPreviewOptions;
QG_LineAngleOptions* m_pLineAngleOptions;
};
#endif
| 2024-01-16T01:27:17.568517 | https://example.com/article/9149 |
I received an email this morning from Meghann, who successfully supervises entry level/college students. Since I frequently hear what a difficult demographic this is to motivate, I thought I would share what she has to say, word for word: Morning Cindy! My number one piece of “recognition” lately is flexibility. When a hard working staff […]
I recently had the pleasure of “sharing the stage” with Marnie Green of Management Education Group. My program on Employee Recognition followed hers on Corrective Feedback and Painless Performance Evaluations. We chatted during lunch and shared our books with each other. On my flight home I had a chance to read Painless Performance Evaluations and […]
Last week Wired ran a story on how Facebook was testing new performance feedback software from Rypple.The core idea behind the software is that annual reviews don’t provide frequent enough feedback, an idea I completely agree with! Frequent feedback is especially important with younger workers. Research that I completed in 2008 showed that those in […] | 2024-04-06T01:27:17.568517 | https://example.com/article/4008 |
Q:
How do you alias a command in JunOS?
I was searching for an easy way to do this over the last few days and found that there wasn't a SIMPLE way to do this. The majority of the answers were:
Too complex for the problem at hand.
Difficult to understand without prior knowledge of SLAX.
A:
I was working with a customer who was implementing OAM in JunOS, the show commands to display statistics are unwieldy. They wanted a way not to have to type the full command everytime they needed to retrieve statistics.
Here's what I mean:
show oam ethernet connectifity-fault-management sla-iterator-statistics sla-iterator ITERATOR maintenance-domain MD maintenance-association MA local-mep 100 remote-mep 101
I can see why this would get pretty annoying, so how can we turn that into a much shorter one-liner? JunOS doesn't have the ability to alias a command built into the OS. What we can do, is use a SLAX script. It's a bit more obnoxious at first, but it's kind of nice.
The "script":
I'll use a much more basic command to keep everything short, but you can replace the show command you see in the code with any other show command you would want to use. Feel free to also make the variables a more coherent name for your use case.
version 1.0;
ns junos = "http://xml.juniper.net/junos/*/junos";
ns xnm = "http://xml.juniper.net/xnm/1.1/xnm";
ns jcs = "http://xml.juniper.net/junos/commit-scripts/1.0";
import "../import/junos.xsl";
match / {
<op-script-results> {
var $variable1 = <rpc> {
<command format="text"> "show interfaces terse";
}
var $variable2 = jcs:invoke($variable1);
<output> $variable2;
}
}
Running the Script:
Your script (filename) must end in .slax
Your script must be located in /var/db/scripts/op/ on the box. If you are using redundant routing engines, it must be present on both RE's in the same directory mentioned above. Here's how you copy a file from one RE to another:
file copy re0:/var/db/scripts/op/filename.slax re1:/var/db/scripts/op/filename.slax
file list re1:/var/db/scripts/op/
Once your file(s) are copied, you must enable them. This prevents anyone who can copy files to the device from executing potentially destructive scripts.
R1# set system scripts op file filename.slax
R1# show | compare
R1# commit and-quit
If you're using multiple RE's:
R1# commit synchronize and-quit
At the operational mode prompt:
R1> op filename.slax
And you're done, I hope this helps.
| 2024-04-19T01:27:17.568517 | https://example.com/article/3797 |
Q:
Is $\int\left(\sin^2x + \cos^2x\right)\;dx = \int 1 \; dx$ ?
I have just begun my 2nd calculus course and so far have just been applying the substitution method for solving anti derivatives and other basic rules.
I have a question that is probably very easy to answer.
Is $\displaystyle\int \left(\sin^2x + \cos^2x\right)\;dx = \int 1 \; dx$ ?
Thanks,
Sam
A:
Yes, that s right.
You don't even need to use any of the calculus you may have seen in the course, it just follows straight from the fact, that $\sin^2x + \cos^2x = 1 $
To see this just consider any right angled triangle, write down what the equation is in terms of the sides of that triangle, and use the Pythagorean Identity to finish it off.
| 2023-09-13T01:27:17.568517 | https://example.com/article/4033 |
Contact Info
Social
Store Hours
Sun
CLOSED
Mon
8:00 am - 5:00 pm
Tue
8:00 am - 5:00 pm
Wed
8:00 am - 5:00 pm
Thu
8:00 am - 5:00 pm
Fri
8:00 am - 5:00 pmClosed
Sat
CLOSED
About
Welcome to Avenue Body Shop !
Superlative Auto Body Repair
For over thirty years, Avenue Body Shop has provided superlative service to a diverse range of auto body repair clientele. Setting the gold standard for honesty and integrity, our professional team of auto body repair experts work on e... Read More
How much does it cost to fix front end damage in San Francisco CA?
One of the most common types of car accident damage that comes through the shop doors at Avenue Body Shop San Francisco involves some kind of front end damage. The severity of the front end damage runs the gamut from minor scrapes and dents to severe front end damage that requires a total rebuild. Some front end damage is so sever that it can total out the car.
Cars that are built today are designed to absorb most of the energy from a crash and keep it out of the occupant compartment where the driver and passengers are seated. As a result when a car hits something such as another vehicle, the car almost explodes into chunks of bumper gill headlights and fender. The energy from the impact is designed to spread out over the easily replaceable panels. How many times have you seen entire bumper covers lying on the side of a highway when driving around San Francisco?
Most of the minor front bumper damage we see is a result of customers pulling up too far in parking spaces, getting hit by debris on an San Francisco road, bumping into a tow hitch, hitting a steep curb, bottoming out, or scraping another car in a parking lot.
The major front end damage usually happens during collisions with other cars on the road, collisions with deer, or with guard rails and other structures. Front end damage can range from being unsightly to making your car undrivable. In the San Francisco market, the cost to repair this damage can be as little as $200 or as much as several thousand dollars.
To determine the cost of your car’s front bumper repair, any auto body shop in San Francisco would need to look at the following factors:
Number of damaged front-end components.
If you have just a small dent in your bumper cover or a broken fog light, then your repair won’t cost much in parts and labor. In calculating your estimate, we would examine your bumper cover, headlights, fog lights, grill, splash shield, and more.
Repair or Replace.
We will also need to see which parts can be repaired and which ones might need to be replaced. Because bumper covers are made of plastic, instead of metal, they tend to require replacement. However we do have plastic repair equipment at our San Francisco shop and can sometimes literally melt the bumper back together just like we would weld metal. It really depends on the extent of your damage.
Structural Damage
Is there any structural damage to the bumper supports behind the plastic portion? If you have structural damage, it can increase the cost of your repair. To determine if you have any structural damage, we’ll take a look at your strut towers, hood, radiator support, fenders, and other elements.
Mechanical damage
We will need to determine if your collision caused any damage to your suspension, radiator, condenser, and more. Sometimes, your car won’t appear all that damaged, but there will be costly mechanical and electrical damage beneath the surface in need of repair. Because the car is designed to transfer the energy of the crash away from the passenger compartment, it is not unusual for engine mounts, transmission mounts, exhaust and other components to become damaged even if they are far away from the are of the damage.
Paint work
If any of your damaged auto body parts are in need of replacement, the new parts will need to be primed and painted. If any damaged parts can be repaired, we will likely need to sand and paint them in order to have them looking brand new again.
Airbags
Did one or more of your airbags deploy? If so you could be looking at as much as $1500 per airbag to replace those.
So how much does it cost to get fixed in San Francisco?
I always like to leave you with an answer and not a series of more questions. So I would say that if the car is more repairable than replaceable you are looking at anywhere from $500- $5,000. This would be for a car that is still drivable.
If your car is severely damaged and not drivable you are looking at anywhere from $5,000 to possibly being totaled.
Hopefully your car is still drivable and can be fixed. If you need a quote to get an accurate auto body estimate, be sure to give us a call at Avenue Body Shop. | 2023-09-20T01:27:17.568517 | https://example.com/article/4005 |
Městský stadion (Znojmo)
Městský stadion, also known as Městský stadion v Horním parku (formerly known as Stadion v Husových sadech), is a multi-purpose stadium in Znojmo, Czech Republic. It is mainly used for football matches and is the home ground of 1. SC Znojmo. The stadium has a capacity of 2 599 people.
References
Městský stadion at 1. SC Znojmo website
Stadium profile at vysledky.cz
https://int.soccerway.com/teams/czech-republic/1-sc-znojmo/venue/
Category:Football venues in the Czech Republic
Category:1. SC Znojmo
Category:Multi-purpose stadiums in the Czech Republic
Category:Buildings and structures in Znojmo | 2023-12-05T01:27:17.568517 | https://example.com/article/9392 |
---
title: On Beyond Magpie 2 - entity analysis
description: An introduction to the Cloud Natural Language API, aimed at Advanced Placement Computer Science classes who have worked on the Magpie lab, but suitable for most people starting with the Cloud Natural Language API. Demonstrates how to parse JSON results from the Cloud Natural Language API.
author: Annie29
tags: Cloud Natural Language API, APCS, JSON, Magpie, education
date_published: 2017-03-28
---
The Advanced Placement Computer Science A program provides the [Magpie lab](http://media.collegeboard.com/digitalServices/pdf/ap/ap-compscia-magpie-lab-student-guide.pdf) for students to practice using basic control structures to parse user input as part of a chatbot. This tutorial is designed to be an additional enrichment exercise (typically used after the AP exam) to go beyond basic parsing and instead use Google's [Cloud Natural Language API][nlp], a pretrained machine learning model that will do text analysis for the user. The lab demonstrates how to use the Cloud Natural Language API to extract entities from user input.
The major new skill covered in this lab is how to parse JSON results in Java.
This tutorial is written for an audience of CS teachers who are exposing their students to the Cloud Natural Language API, but should be usable by any interested individual.
## Prerequisites
If you've completed [On Beyond Magpie, Part 0][magpie0], you should have all of the prerequisites completed. Otherwise,
1. Create a project in the [Google Cloud Platform Console][console].
1. Enable billing for your project.
1. Ensure the Cloud Natural Language API is enabled by going to the [API manager][manager] from the main GCP menu.
1. Generate an API key for your project.
Sample code for a complete chatbot and full description of the steps involved in making a POST call in Java are included in [On Beyond Magpie: Part 1, Sentiment Analysis][magpie1].
## Accessing the API
The Cloud Natural Language API can be accessed directly using an [HTTP POST request][restdocs]. There are also client libraries created for C#, Go, Java, Node.js, PHP, Python, and Ruby. In order to keep this tutorial simple and as general as possible, it will make its own HTTP requests. Details on how to use the client libraries are available in the Cloud Natural Language API Docs.
## Making the HTTP request with Java
For simplicity, this example shows how to make an HTTP request using just the core Java libraries. This should be put in the `getResponse` method of the Magpie class. A full explanation of the code below is in [On Beyond Magpie: Part 1, Sentiment Analysis][magpie1].
The complete code to call the API and put the results in a string is below:
final String TARGET_URL = "https://language.googleapis.com/v1/documents:analyzeEntities?";
final String API_KEY = "key=your key";
URL serverUrl = new URL(TARGET_URL + API_KEY);
URLConnection urlConnection = serverUrl.openConnection();
HttpURLConnection httpConnection = (HttpURLConnection) urlConnection;
httpConnection.setRequestMethod("POST");
httpConnection.setRequestProperty("Content-Type", "application/json");
httpConnection.setDoOutput(true);
BufferedWriter httpRequestBodyWriter = new BufferedWriter(
new OutputStreamWriter(httpConnection.getOutputStream()));
httpRequestBodyWriter.write("{\"document\": { \"type\": \"PLAIN_TEXT\", \"content\":\""
+ statement + "\"}, \"encodingType\": \"UTF8\"}");
httpRequestBodyWriter.close();
httpConnection.getResponseMessage();
String results = "";
if (httpConnection.getInputStream() != null) {
Scanner httpResponseScanner = new Scanner(httpConnection.getInputStream());
while (httpResponseScanner.hasNext()) {
String line = httpResponseScanner.nextLine();
results += line;
}
httpResponseScanner.close();
}
### Parsing the JSON results
The results of the POST call are returned using JSON format. There are numerous libraries which will do JSON parsing in Java but currently there is no standard library. This tutorial will use the GSON library, available at [Github] (https://github.com/google/gson) and for [download as a jar file](https://repo1.maven.org/maven2/com/google/code/gson/gson/2.6.2/).
Once a string representing the JSON data is created, it can be sent to the GSON library, which will return an object that represents the data. You will need to create a class that represents the data you are interested in, based on the return types of the [Cloud Natural Language API](https://cloud.google.com/natural-language/docs/reference/rest/v1beta1/documents/analyzeEntities). This object is an instance of the class `AnalyzeEntitiesResponse`, shown below. You will need to define this class in your `Magpie` class.
```java
public class AnalyzeEntitiesResponse {
private Entity [] entities;
public Entity [] getEntities () {
return entities;
}
}
```
Notice that even though there is another field in the response (the language), since this example doesn't need it, it does not have to be included in the class.
This example is concerned with entities though, so it needs to define a class that represents an entity:
```java
public class Entity {
private String name;
private String type;
// Currently type is one of UNKNOWN, PERSON, LOCATION, ORGANIZATION, EVENT, WORK_OF_ART, CONSUMER_GOOD, OTHER
private Map<String, String> metadata;
public String getName() {
return name;
}
public String getType() {
return type;
}
public Map<String, String> getMetadata() {
return metadata;
}
}
```
Additional information returned about an entity (such as mentions and salience) are not included since this example does not need them. Once the classes that represent the results you want are defined, you can create a `Gson` object and use it to parse the string you have created as shown below. In this example, it will just return a list of the entities in the user input.
```java
private List<String> getEntities (String jsonString) {
List<String> result = new ArrayList<String>();
Gson gson = new GsonBuilder().create();
AnalyzeEntitiesResponse json = (AnalyzeEntitiesResponse)gson.fromJson(jsonString, AnalyzeEntitiesResponse.class);
if (json != null) {
for (Entity entity:json.getEntities()) {
result.add (entity.getName());
}
}
return result;
}
```
At this point, you can call this method and use the results to have your chatbot respond to the entities in user statements. A simple response would be to react to the first entity it finds.
```java
List<String> entities = getEntities(results);
if (entities.size() > 0) {
// Pick the first entity and ask about it
response = "I've always been interested in " + entities.get(0)
+ ". Can you tell me more about it?";
}
else if (statement.indexOf("cats") >= 0) { ...
```
## Going beyond the basics
While this tutorial just finds the first entity, there is so much more your chatbot can do. Some things to try out:
* Instead of selecting the first entity, select a random one.
* Prioritize the type of entities your chatbot will respond to. Perhaps look for any WORK_OF_ART first. If one isn't found, try EVENT, then LOCATION, etc..
* For entities which have Wikipedia links, learn more about the [Wikipedia API](https://www.mediawiki.org/wiki/API:Main_page) and include information from Wikipedia in your response.
## Summary
* You can use the Cloud Natural Language API to analyze the entities in a string.
* You'll need to provide a Java class (or classes) that represent the information you want from the JSON result of an API call.
* You can get the type of these entities and additional information like Wikipedia links if you want to make your chatbot more responsive.
[console]:https://console.cloud.google.com/
[magpie0]:https://cloud.google.com/community/tutorials/on-beyond-magpie0
[magpie1]:https://cloud.google.com/community/tutorials/on-beyond-magpie1
[manager]:https://console.cloud.google.com/apis/
[nlp]:https://cloud.google.com/natural-language/
[restdocs]:https://cloud.google.com/natural-language/docs/reference/rest/
| 2023-11-29T01:27:17.568517 | https://example.com/article/3949 |
Arrow Season 1 Episode 13
Quentin Lance’s ongoing attempt to capture the vigilante is put to a halt when a recently released criminal kidnaps his daughter to get to Arrow. Meanwhile, John Diggle insists on spying on Moira Queen to learn her secrets.
The Mentalist is an American police procedural television series that follows former “psychic” Patrick Jane, who is a consultant to the California Bureau of Investigation, using the highly developed observational… | 2024-03-31T01:27:17.568517 | https://example.com/article/7740 |
Transcript for This day in history: Oct. 10, 1981
No surprise gunshots are riots or mishaps. But the thing security that enable dozens of world leaders to mourn safely for their fallen colleague. Also made it possible for a man who focused on the future to be buried in an ancient ritual. We have two reports tonight first bill Blakemore. Early this morning in the Cairo suburb not far from denial the funeral ceremony for Anwar Sadat begin. As an ambulance bearing his casket craft a short distance from the military hospital where he was taken in the futile effort to save his life on Tuesday. To a nearby mosque. The dog only done 44 year old Kamal. His two Brothers and three sons in law to let the mourners in the mosque all of whom were men in accordance with Muslim tradition. OK. Yeah. Go public displays of grief for president but dot have been noticeably lacking. There were individuals and small groups of people today close enough to the well guarded ceremonial. To be moved at the passing. No hysterical counting millions to see the casket through the streets of downtown Cairo for Saddam. And there were eleven years ago when Egyptian president Nasser died. The slain president body today was flown by helicopter. Another cover for the final. The Cairo street the scene on the way to the final ceremony by the guests. Who in all numbered about 300 Egyptian and foreign dignitaries along with 500 journalists from around the world were quiet some of them empty. Security entering the military parade ground funeral site for the assassination occurred four days ago he was layers deep. No public permitted anywhere near it. The final focus of the ceremony was to be the towering pyramid shaped tomb of Egypt's unknown soldier. But president Sadat will be laid in a temporary crypt removed eventually to a permanent resting place in a mausoleum built for him 200 yards away. On the spot at the front of the reviewing stand where he was gunned down. And where the first to arrive today we're misses him on the daughter her three daughters. The wives of the late Shah of Iran and the president of the sedan. And a party of close friends. The traditional military honors its flag draped coffin was loaded onto a gun carriage drawn by six horses. And then the extraordinary cluster of world leaders which have been kept so protected but was moved as one group. They're individual personalities melding briefly together for the show of unity. Into position for the half mile walk down the parade route but it soon. There together pondering on the court the doctor had belonged to. So close together we can hardly make them out we're leaders from America Britain Germany France and Italy delegate from somebody even. From Arab. Somalia and a walk to honor the men would make me. Possibly for security reasons. The three former American president defended British prime minister bacon walk the second group behind. The main body of foreign dignitaries. Tightly hedged in by their bodyguard. They all gathered on the reviewing stand where the killing had happened many aware that their lives as world leaders were often similarly threatened. One by one the delegation filed off the pay private condolences to mrs. Sadat and her party. Before each left and the extraordinary security problem of so many world leaders in one place began to disperse. It's a traditionalist Muslim funerals often for only the family party to be present at the last moment. It's common that many funeral at the last moment are often overwhelming for those most personally. From islam's holy Koran the Muslim preacher sang remember that god created you and god will call you back to him. Anwar Sadat died a controversial leaders in Egypt and in the Arab world he had asked his people to make peace with an old enemy. And then he put. Over his whom he got the epitaph he had wanted. President Anwar Sadat hero of war and peace. Who died for his principles. Bill Blakemore ABC news Cairo.
This transcript has been automatically generated and may not be 100% accurate. | 2023-10-19T01:27:17.568517 | https://example.com/article/8947 |
500 things that piss me off
GetAnnoyed.com
The Web's Largest List of Pet Peeves (things that annoy you)
Drivers who don't use a turn signal.
People who read out loud what they're typing in an email or letter.
Kids who tease dogs through a fence.
People who drink directly out of the milk/orange juice containter.
Couples who sit on the same side of the booth when there is no one on the other side.
Parents who bring their young kids to R rated films.
People that don't use coasters.
People who blame anything but themselves for THEIR failure.
People who sit next to you on public transportation even when there are other seats available.
Noisy eaters.
Students who prolong class by asking the most inane questions.
Women who wear jewelry that clinks and clacks and makes noise when they're at their desk or keyboard. When people take 20 napkins, use one, then throw them all away.
Going through the drive thru, then having to go back when they screw your order up.
People walking around in ridiculous 'fashionable' shoes that are clearly hurting their feet.
Whenever anyone says "Ya, know what I'm sayin"...
Using speaker phones in public areas at work.
Roadmaps that aren't folded correctly.
Finding a shoe and not finding its mate next to it
Made up car names that are not even real words.
People who are mean to animals.
When a person makes a sucking noise with a straw when the cup becomes almost empty.
People with bad table manners.
People that snoop.
People who read the paper while driving.
People that interrupt you when your telling a story and then they continue to tell you their story and then ask you in an uninterested tone to continue on with your story when they are finished talking.
Drivers who won't turn right on red.
Vulgar talk at the dinner table.
People who chat online (instant messaging) while I'm on the phone with them.
Not having enough quarters to do laundry.
Couples that own a dog together and call themselves mommy and daddy.
When drivers bring their car to the wrong side of the gas pump.
When you genuinely ask someone what's wrong (when there obviously is something wrong) and they respond half-heartedly, "hmmm? oh nothing..."
People who ignore yield signs.
Double negatives.
Conspiracy theories.
Being asked my telephone number/account number AFTER I already entered in using the keypad on my phone. I thought I was supposed enter that info to "better assist me".
Not washing hands after using the bathroom.
People who push alcohol at social functions.
The noise people make when they rub their fingers on balloons.
When your spouse/roommate uses the butter to put on their toast, and leaves crumbs in the container.
People who don't perform their duties at work.
Guys who leave the toilet seat up.
Celebrities claiming to be environmentalists.
Dining with a picky eater (they can never order off the menu without customizing every aspect of the meal).
Tapping.
Men on trains who insist on sitting with their legs spread wide like they got something there.
When ice cream drips out of the bottom of a sugar cone.
Dirty keyboards.
People who zig zag in and out of lanes on the expressway.
People who ride their bikes in the road when a sidewalk is right there.
When people don't send thank you notes.
When somebody tosses something toward a garbage can, like they think they're a basketball star, then leave it on the ground after they miss!
People who take forever to order food while I'm in line.
When you open the DVD case and it is empty or a different movie is in it.
Car alarms that signal that they are on by honking.
People who walk their dogs and let them poop indiscriminately (like on someone's lawn), and does not pick it up.
The way people walk in flip flops.
Someone standing over my shoulder reading the computer screen.
People who write "Noone" instead of "No one".
Explanations that begin with the word "Again".
People who don't cover their mouth while sneezing or coughing.
Dirty dishes in the sink.
People who habitually need favors.
How opening any cheap electronic item these days requires cutting up your finger with cheap impossible to open plastic molding covering.
When you're eating candy and someone asks if they can have a red one.
Airline speak (like: "The lavatories ARE equipped with smoke detectors, so DO refrain...")
When you bite into a jelly bean and it's a different flavor than what you thought it was.
Having to go to a UPS / FEDEX office to pickup a package.
Uncomfortable chairs.
Chasing after a ping pong ball.
Jerks who take up 2 parking spaces.
Films censored and cut (for length) to be put on television.
When something I've been into for a long time becomes popular.
People who overuse quotes from movies or TV.
People who act like they're in their own living room at an event (concert, ballgame, play, movies or a restaurant).
People who give their kids weird names
People that don't list prices on websites, stores, and infomercials.
The creepers at red lights. You know, those people that start inching forward in their cars slowly until the light turns green.
People who clear their throats in a disgusting way.
People that pop and smack their chewing gum.
When people leave the cap off the toothpaste.
People who style their hair during Mass.
People who invite you out somewhere then cancel.
Women who wear too much perfume.
Relying on someone else to take a picture because I want to be in it, and it ends up coming out off-centered and out-of-focus.
Cutesy intentional misspellings: lite kwik R for are.
You know when you ask someone a simple, straightforward question and they spend ten solid minutes rambling on about everything in the world EXCEPT the answer to your simple, straightforward question? I hate that.
When you order a salad at a restaurant and they bring it to you at the same time as your dinner.
Children's hand prints on the windows in car.
People who don't know the difference between its/its and theyre /their/there.
People who carry a one sided conversation
When you can't tell if someone is male or female.
People who leave the door open when they go to the bathroom.
Sick people who cough near you.
People who talk, whistle or sing to themselves at work.
People putting their feet out of car windows.
Greeting cards that throw sparkles, sequins or confetti on the hapless recipient
Having to use more than one remote control (one for TV, dvd player, cable box, TIVO, etc.)
Paying alot of money for a meal and getting a baby sitter only to have someone elses kids screaming.
When you're invited to a party (or any event) with people you have never met, and the host doesn't introduce you to anyone.
When you find a really cute piece of clothing on the rack and they have like twenty in size XS, two in size 3X, and not a single one in your size.
People who throw cigarette butts on the beach.
Saying "Let there be light" every time any light switch is flipped on.
When people say "What's up?" instead of saying "hi or hello".
People who leave shopping carts in the parking lot instead of taking them back to the corral.
People who go the wrong way in a parking lot.
People who write "Keep in touch!" in your yearbook but never talk to you again.
Unexpected company.
When someone with a full cart of groceries gets into the 10 items or less line.
Cats and dogs that are inconsiderate of their human's sleeping habits, and decide to romp, play, and destroy stuff at 4 AM.
People letting their dogs use my yard as their toilet.
Ignorant people.
People who read over your shoulder on public transportation.
Driving somewhere and having the sun in my eyes.
Not knowing if you've taken two pictures with a camera or there are just two left
When you adjust the volume of the TV and the volume display blocks the subtitles during an important dialogue.
People who think that they are the only one with correct background for understanding an issue.
Being the first one at any party.
People throwing trash into a recycle bin.
The naming of celebrity couples (Bennifer, TomKat, etc.)
Movie sequels that are unnecessary.
Litterbugs.
Drivers who tailgate.
Anyone male or female- who says We're pregnant. Are they sharing a uterus?
The "yes but" people.
When you have an itch on the bottom of your foot and you can't scratch it because you have shoes on.
When someone leaves their phone number at the end of a long message and they say it so fast you can't understand it and have to listen multiple times to figure it out.
People who don't dress their age
Suburban kids who think they are gangstas.
Peop;e who chew with their mouth open
People When they clean the tables nearby with a bleach solution. While I am glad they are sanitary, the smell of bleach can really quelch my appetite. having obviously PRIVATE conversations on their cell phone in public places.
When people put the spoons/forks in the wrong section of the utensil separator.
People who let dogs that jump up on everyone loose in public.
Clipping your nails at work.
When your eating something and a person will just steal a little bit of it.
Retail clerks that ignore the live customer to help somebody that interrupts by phone
People who don't pick up after themselves.
People who use the word "gay" to mean "lame".
When people refuse to be the decision maker about something simple (which restaurant to eat at, what movie to see, etc.).
When people say 'supposebly' instead of 'supposedly'.
In an obviously crowded restaurant, people who linger long after receiving their check.
When you pull a string hanging from your shirt and it doesn't break, but only becomes longer.
People who put salt on everything without tasting it first.
Not Washing Hands After Using the Restroom
Skinny jeans on men
No toilet paper or paper towels in public bathrooms.
When you will be talking to someone, and their replies seem to be limited to "ya", "cool", and "ok".
When somebody turns off the lights when you are still in the room.
People who can't complete a sentence without saying "you know".
When people don't clear the microwave numbers.
Finding the end of the program hasn't taped after sitting riveted for almost two hours.
People who say "It's always in the last place you look".
When people ask me for advice and do the opposite of what I tell them.
When people don't RSVP to an event.
People who will write something borderline mean, but then follow it up with a smiley face :)
People who don't control their bratty children.
People who refer to themselves in the third person.
People who leave their children in their cars while they run into the store.
People who snap their gum.
Caps Lock in text or in email, when PEOPLE SHOUT.
Girls who wear way too much make up.
People who always have to be right and have the last word.
People that cannot simply take their trash to the trash bin in places such as fast food restaurants, shopping malls etc.
People who no matter what relate to something you have done and try to "one up" you.
When someone is writing on a chalkboard and then they erase it to write something new, but they don't erase all of it, so you still see half of a letter here and there.
People that tailgate when your driving.
People who whistle when they are happy.
Fax machines that call my home number.
Rappers who thank God at awards cermonies.
Mumbling, then annoyedly saying "Forget it!" when people don't hear you.
People who use a calculator to figure out the tip at a restuarant.
Drivers who signal after they make a lane change.
People who spell "you're" as "your."
People who don't cash checks you give them in a timely manner.
The noise styrofoam makes when you rub it together.
People who blow their horn at you the nano-second the light changes to green.
When the garbage man turns my can upside down after dumping MOST of the garbage in it into the garbage truck. I go to collect the can and when I turn it right side up, the remaining garbage spills out on the sidewalk.
People who don't use deoderant.
When people continue to stare after they ask you a question, as if they need you to expand more on your answer.
Ice cream with freezer burn.
When the person who takes the last of something puts the empty package back.
Flakes! People that cancel plans constantly.
Hair strands left on shower walls.
When you first meet someone and can't remember the person's name by the end of the conversation.
Taking forever to leave a parking space while others are clearly waiting for it
Business buzz words: synergistic, globalize, paradigm shift, etc.
When people are using armrests on both sides of you.
Bosses who think your job is your life.
People sitting at a red light and continuing to sit there when the light turns green because they're on their cell phone.
Grocery clerks that want to bundle the receipt with my change. Hand me the money separately so I can put it in my pocket, and then hand me the receipt or place it in the bag.
People who dress their pets.
People who buy animals, only to get rid of them a week later because it was harder to take care of them than they thought.
People who mumble.
Whisteling out of tune.
Conversational High-Fives: High-fiving at any time other than when one is actively playing a sport
People who are always late.
When there are no hot dog buns left and you have to eat your hot dog on a folded piece of bread.
Men who ogle or whistle at women who walk down the street.
People who honk in front of a house instead of getting out of the car and ringing the doorbell.
Annoying nervous (forced sounding) laughs.
When you are asleep at a hotel and the alarm clock goes off in the middle of the night because the person who was there before you set it and never turned it off.
When you have to walk out of the shower naked because you forgot to bring a towel with you.
Needless meetings.
People who don't look at you when they are talking, or you are talking to them.
People who turn their stereos up full blast in their apartment building and have no consideration of others.
When you're driving down the road and a cigarette butt comes out the window of a car in front of you and it bounces off your car.
People who stare.
People who use the phrase "110%" (or even more % sometimes).
People who leave food that can spoil (milk, butter, etc.) out too long, instead of putting it back in the fridge when they are done.
People who put their feet up on the seat in front of them in movie theaters.
People who say the time like "Eight AM in the morning".
People who won't take their kid out of a restaurant when they are crying, screaming, etc.
Having to dress up for work just to have it downpour when you step outside.
When the host/hostess at a restaurant totally underestimates how long a wait there will be.
When people inturrupt you.
Guys who wear wifebeaters (and nothing else for a shirt) in public.
Forks whose tines don't stand up in a perfectly straight line
The sound of too much spit in someone's mouth when they talk.
Athletes who point to the sky after scoring.
Someone opening a cabinet door or drawer and leaving it open.
People say "carmel" instead of "caramel". Is it really that hard to pronounce that extra letter?
Bathroom stalls with a mirror so you can see your whole self while seated
Drivers who make u-turns where they are not allowed to.
In mini golf when you miss the hole three times in a row less than a foot away.
When someone starts to watch a show or movie in the middle of it and expect you to tell them what's happening.
People who think the seat next to them is a place to plunk down their gym bag/back pack on a crowded bus.
Clipping toenails in bed.
People who ask "Can I ask you a question?"
People who leave farts in elevators that I subsequently enter. Then the next person thinks it's me.
Commercials in movie theaters.
Keeping your Christmas lights up until February.
Overuse of the word "Like"
People who read a story, and purposely skip pages so that it ends quicker.
When you score a goal on yourself in foosball or air hockey.
People who drive past me on a crosswalk.
When the tiolet paper roll is backwards.
People who ask you what time it is.
People with poor umbrella etiquette.
When other people sleep on my pillow.
When you are hanging out with someone and they make plans to do something else right in front of you.
When people scratch their fingernails on a blackboard.
People who can't wait to file a lawsuit in order to get rich quick.
Wet, dirty, stinky, slimy dishrags left in a heap in the bottom of the sink.
Websites with horizontal scrolling.
People who use unnecessary abbreviations, like w/e (whatever), w/o (without) and j/k (just kidding).
People at Wal*Mart Supercenter who enter thru the exit and exit thru the enter.
Getting fruit in your bag on Halloween.
Going to a restaurant within the last hour before closing and everyone is cleaning,sweeping and slamming stuff around to get out of their quickly and at buffet the food is gone or old and dried up.
Walking into spider webs.
When the cashier gives you the change with the coins on top of the bills and for a moment you look like a fool jamming a large wad of cash into your pocket.
People who use self checkout lanes but don't know how to use them and slow us all down.
Hearing classic songs that I grew up with...pimping products on commericals.
Stomping on the floor to simulate knocking on a door.
Using your finger as a gun.
Telemarketers.
Waiters/waitress who put their fingers on the top of the glass (where you drink from) when they deliver it to you.
Bars where the music is too loud.
People that don't answer e-mail.
People who are clearly unhappy and yet pretend like everything is just fine.
Failing to take a backpack into account when turning or backing into people
Yelling "drop it" the moment a conversation veers into an unwanted direction.
Cell Phone Drivers
Lawn ornaments.
People who borrow stuff and never give it back.
When people call me but are talking to someone else when I answer and I have to wait till they stop talking.
When you sit down at a restaurant and the waiter/waitress spends time cleaning other tables, when there are lots of empty tables, instead of taking your order.
When the tracking system for delivery isn't up-to-date.
Gray snow that won't melt; piled up on the side of the road
Bad breath.
People who refuse to expand their musical horizons.
People who complain out loud while waiting in a long line at the store.
People who say "Bra" or "bro" when it's not their brother.
When people put (sp?) after words when the spell check button is right there in front of them.
People who can't seem to see any faults in their kids or their mothers.
Piling up clothes in the corner of the room instead of putting them in the hamper.
Hair on the soap.
Mispronunciation of words.
People who are stingy with money when they clearly have a lot of it.
People who cook for you, and use the same spoon multiple times to taste what they are cooking while cooking it, like for pasta sauce or soup.
Having a drawer full of unknown cords, transformers, adapeter, etc.
I hate it when people take healthy food and fry it up in butter and eat it because it's "good for them".
Loud motorcycles.
When people trip over your their foot in the hallway and start running to pretend like they meant to do it.
When you ask for LOTS of ketchup and they give you only two or three packets.
Shopping carts with a broken wheel.
The sound of somebody playing with silverware on a plate.
Going out to dinner with a big group, eating $10 worth of food and having to split the whole bill and ending up paying much more than you ate.
When the waiter/waitress asks whether you want dessert, but smiles in a way that means she is clearly judging you.
Sitting in the movies and hearing someone eating popcorn.
Bathing suit tops as clothing.
People who pick their nose in public.
Car passengers that throw their doors wide open without first checking to make sure it is safe to do so.
Lazy people.
People who talk about their favorite sports team and say "WE" like they are a part of the team.
People who love to point out how wrong everyone else is while they are a walking train wreck
People who don't care what's going on in our country.
People who are over age 21 who say the word "dude".
People who spit on the ground and don't look first to see if anybody is around.
People who use their caller ID like an answering service. Example: "Hello?" "Yeah, someone call me from this number?" "Umm, who are you?" "Who is this?" "You called this number. Did you get a message?" "I haven't checked my messages. This number just came up". Etc..
Being put on the speakerphone without warning
Obnoxious doorbell ringers.
Adware, spyware, popups, viruses and other things that download themselves and install automatically
When people say the word huge incorrectly by dropping the 'H' and pronouncing it Uge.
When people change the TV channel without asking
People who make you take off your shoes when you go into their house.
People at a store/supermarket who wait in a long checkout line, and then when they finally need to pay they take forever to find their checkbook/cash/credit card.
Stores/companies that charge extra if you pay by credit card.
I hate slow people walking in front of me.
People who stop at the top or bottom of an escalator.
At a restuarant, when they clean the tables nearby with a bleach solution, smelling up my area.
People who point at their wrist while asking for the time.
Dog poop on the sidewalk.
When those little hinges on the CD case break, and now you can't open and close it.
I know they have to do this, but I hate having servers recite the specials to me. Because I have never ordered a special, and hate having to feign interest in them.
The use of redundant statements like ATM Machine or PIN Number
Hair in the shower drain.
Men who refer to "babysitting" their own children.
People who are late.
People who don't use their turn signal, tailgate, and cut you off
How hard it is to open a new music CD.
Pee anywhere other than in a toilet.
Watching people put their contacts in.
How commercials are so much louder than the TV shows.
People who don't want to learn anything new because they know it all.
When you bend over to pick something up and miss the object multiple times, and the final attempt is a violent grab as if to say it was the object's fault.
Feeling a little juvenile when the waitress sees your drawings on the table at the Macaroni Grille and you're over the age of eight.
When you get out of the pool and your bathing suit sticks to you and exposes your crotch.
Singing along with the music when you don't actually know the words.
People who write checks during check-out. I hate waiting.
Men who talk down to women.
Email with no subject.
Grocery shopping carts with a bad wheel.
How clothes hangers get all tangeled with each other
Double dippers.
When people don't pick up their feet to walk and you hear the scuff... scuff... scuff.
People who brag about how trashed they got the night before.
Unsolicited advice.
Co-workers that try to sell stuff to you at work.
Trying to get assistance over the telephone, only to be directed to "press this number", umpteen times.
When adults cuss in front of children.
At a restuarant, bread cut only halfway, instead of into slices.
People who say I can't, without even trying.
People who leave their pets in their hot cars in the summer.
Speed bumps.
People who constantly get up in movie theaters.
When you are changing the TV channel and it goes black of a second before the channel comes up.
Dogs running around on a flatbed truck, which is going highway speed.
Parents who have their children on leashes.
PeOpLe WhO tYpE LiKe ThIs.
Restaurants that put too much ice in your drink.
Anti-climactic ends to long lists.
People who double park.
People who people park a shopping cart in the middle of the aisle in Wal-Mart or grocery store, blocking the way for others and then walking away to gather items.
When people use the word "literally" inappropriately. I.e. "I literally almost jumped out of my skin."
People who make out in public.
Babies sitting on laps in cars.
People who bring their babies to the movies.
People who stick their USED gum just about anywhere (under a table or chair, on the ground, etc.)
Dried toothpaste in the sink.
Junk mail.
People who talk on their cell phone at the movies.
When someone blows their nose in your presence and then proceeds to look at what just filled their tissue/handkerchief.
When people don't rinse their dishes before they put them in the sink.
Not letting things go the first time someone says stop.
People who don't accelerate fast enough at a stop light, especially if you're in the left lane.
People who stop right infront of you when your walking through town.
People that do not flush the toliet in public restrooms.
When you apply too much deodorant and you have to make a running-in-place type of motion.
I hate people who have no idea what "personal space" is.
Pants on men that are too short.
Dirty restaurant bathrooms. It makes me wonder how clean the kitchen is.
People who don't stop at stop signs.
People who smoke right outside the door of a nonsmoking establishment, getting smoke all over everybody who enters/leaves.
People who don't listen when you are talking to them. How many times have you said a few sentences to someone only to have them suddenly say "what did you just say? I wasn't paying attention."
People that don't return your phone calls.
Referring to any government agency as "the Fed".
If you are able to drink everything but one little drop of milk or juice, whatever...DON'T put it back in the fridge! Just finish it.
Air Guitar. Don't do it. You look like a dork.
Dull pencils.
People who can't decide on one radio/tv station, and constantly flip back and forth.
The habit of tossing dirty silverware into garbage disposal part of the sink
Getting behind someone that will not drive up to the speed limit.
People who straddle multiple lines at the drug store.
When you're with a group of people and you think nobody saw that you just tripped, and you think you're in the clear. But the one person who did see it points it out to everybody else.
Family members who do not talk to you for years, but when they need or want something, act like nothing happened.
I hate it when people tickle me.
Gossip.
People who blow their nose at the dinner table or in the kitchen when you're eating or cooking.
Things sticking out of drawers
Utility/Cable service people that don't show up on time.
When someone is giving a speech in class and they won't stop looking at you as they speak.
A dirty stove top. When finished cooking, all food particles should be cleaned off the stove.
Using the toilet paper down to the last few squares without getting a new roll
Restaurants that have a no smoking section which is only several feet away from the smoking section.
People who don't move to the back of the bus when there is plenty of room to do so.
People who write on dirty car windshields
When shirts shrink in the dryer.
When you are trying to wax something, and you pull hard but nothing comes off and yet you still feel the pain.
Cussing in public, especially in front of senior citizens.
People who don't hold the elevator for you.
When you're trying to walk in the mall and there's a kiosk and they hound you to try their cell phone service or whatever.
People that say they don't like a certain food before they try it, and refuse to eat it .
People abbreviating words when they speak.
Barbecue restaurants with happy pigs on the sign.
Motel pillows.
Making me talk to your boyfriend/girlfriend who i have never actually met when i call you on the phone, saying something like, "oh here - talk to [---]".
Used grocery bags that aren't folded correctly.
Pieces of fat on meat.
Companies that outsource their customer service to India, but then those support reps don't have full access to all the needed info, so eventually they transfer you back to a manager in the US to deal with it.
Water stains on the cutlery (from the dishwasher).
Cracking your knuckles.
Speed Bumps.
People who tell you "Oh! You have to try this! It's the best thing ever!" And when you do try it and it sucks.
Drivers who drive slow in the left lane.
People who eat while talking on the phone to me.
People that fart in public.
People who invade my seat space, like on airplanes or in movie theaters.
People that make tons and tons of noise while working out.
Women who are obviously bottle blondes who still blame their stupidity on being blonde, as in: "Oh, no! I'm having a blonde moment!"
People/kids who tap their pencil during a test.
Sneezing in your hand and shaking someone's hand afterward.
Kids with baggy pants hangin below their ass.
Movie talkers
People who always look to start a fight.
When a utility sends you a letter about a rate increase that opens with: "In order to serve you better."
People who spit when they talk.
When men you don't know very well at all assume it is okay to call you "hun" or "babe."
When people bite their nails in the dead of silence and you hear them eating it.
Water running while brushing teeth.
Women who use PMS as an excuse to be bitchy.
People who finish my sentences for you.
People who constantly sniffle.
People who interrupt you to correct your grammar/speech, paying no attention to the point your are trying to make.
People who make up words.
Tangled phone cords
Using a napkin for eating messy food & leaving it on the table throughout the meal
When people say "you and I" when it should be "you and me".
When the string on the hood of your sweatshirt goes inside the hood.
People trying to enter an elevator when people IN the elevator haven't left yet.
When you have to go to the bathroom really bad after getting out of the shower and you don't dry off all the way, making the toilet seat all slippery.
People who are always negative.
If you pee on the seat, wipe it off.
Driveways that make cars bottom out.
Clicking pens.
People who assume far too much.
An unmade bed.
Barking dogs when I am trying to sleep.
People that realize that a lane of traffic is backed up so they go into the next lane over because it is moving quicker and they go up to the front and expect someone to just let them back over in that lane.
Having to explain the same thing more than once.
People who wear sunglasses indoors.
People who don't say "thank you" or even acknowledge you when you hold the door for them.
People who bite their nails.
When people cough in front of you without covering their mouth.
People who quote movies just because they can.
Getting stuck at red lights, while nobody is going the other direction.
People who don't put two spaces after a period when they type.
When people don't flush the toilet.
Broken spines on paperback books.
Restaurants that give you rolls, but never enough butter to go with them.
A well done steak or burger when it was ordered "rare"
When people that say that they read something at a certain site but don't add the link.
People who whistle through their noses while just breathing.
When I'm having a coversation with someone, & I'm in the middle of telling a story and some rude idiot comes walking up and starts a conversation with the person I'm talking to...as if I'm not even there!
People that wait until the last minute.
Incorrect use of apostrophe's.
Parents who plead with toddlers.
People that burp loudly in public.
Wobbly tables.
People who text during a movie.
When it's raining and you turn your car off before you turn the wipers off, and they stop in the middle of the windshield, so you turn the car back on, the wipers off, and then the car off.
Chewing gum on the sidewalk.
Free offer that always have a catch.
When someone tries to talk to you when you have headphones on.
People who respond to my emails but don't include the text of the previous email in their email.
Men who refer to their wife as the wife - a wife is not an object.
When coffee spills out of the top drinking hole of lids on to-go coffee cups.
How commercialized the holidays are.
People who pick their teeth in public.
Snorting when you laugh.
Hypocrites (yeah, you know who your are)
People who interrupt you and direct the conversation to themselves.
People who make small talk with a cashier when there's a long line behind them.
Stores with TV monitors at the checkouts that play commercials.
Spit flying out of people's mouth by accident.
TV shows and commercials ads with ringing doorbells or phones, which make you into thinking the sound is coming from your house.
I hate when restaurant staff starts clearing dishes away when not everyone has finished eating -- leaving the one person at a table of four to feel bad they haven't finished yet.
People who can't seem to understand that " red eyes" are possible to remove in photos.
Improper use of the word ironic
Waitors/waitresses with dirty fingernails.
People who scrape their fork around the plate.
Backwash.
Eating in bed and leaving crumbs
Spammers.
Fake laughter.
People who call but don't leave a message.
Wasting food, like when a person takes a full plateful of food and then eat two bites.
People who don't vote and then complain about the results.
People who try to talk to you when you are going to the bathroom.
When you're wearing a hat, after a while it feels like it's not there. When you take it off, it feels like it's still there.
Famous people name their kids stange names.
Tables at restuarants that are next to or in the direct line of view of the restrooms. I don't want to look at and think about people going to the bathroom while I eat.
People who say, "Goddamnit" or "Jesus Christ" when they're angry.
People that give you something and say "Do you still have that thing I let you borrow?" eight months later.
People who assume they know what you are talking about when you are halfway through making your point, only to contest what they think you are saying.
People who think that the word "Fuck" is worse than telling you about their bathroom or coital activities.
People who dress their 2-6 year old children like hookers- regardless of gender. | 2024-04-15T01:27:17.568517 | https://example.com/article/8655 |
Androgen receptor enhances myogenin expression and accelerates differentiation.
Animal and clinical studies indicated that the androgen-AR signaling pathway is required for appropriate development of sexually dimorphic skeletal muscles and increases lean muscle mass, muscle strength, and muscle protein synthesis. However, the detailed mechanisms by which the androgen-AR signaling pathway regulates skeletal muscle development need further study at the molecular level. C2C12 myoblast cells stably transfected with the Flag-tagged AR were used to analyze the role of androgen-AR signaling pathway in skeletal muscle development. The results indicate that the androgen-AR signaling pathway may suppress skeletal myoblast cell growth and accelerate myoblast cell differentiation via enhanced myogenin expression. This is a first report showing the role of androgen-AR signaling pathway in regulation of myoblast cell growth and myogenic regulatory factors. | 2024-04-11T01:27:17.568517 | https://example.com/article/4287 |
This is the Starry Lights lamp designed by Anna Farkas. It projects accurate constellations on the ceiling and comes in four different models (based on the way the stars appear during different seasons): vernal equinox, summer solstice, autumnal equinox and winter solstice. A... / Continue → | 2023-11-23T01:27:17.568517 | https://example.com/article/3427 |
Friday, November 28, 2008
FRIDAY NIGHT FIGHTS!
After a one-week hiatus, I'm back with another entry in the Webwide smackdown event. Tonight's Round 3 clobberation comes from the far-flung future via 1952, the 5th issue of Jetta, to be precise. I don't know a damn thing about this title, but it seems to be mixing Archie with The Jetsons, a good ten years before the Jetsons even existed. In this story, poor Zoomer Brown wants to join a college fraternity, and the fratboys are really putting him through the business, so to speak, here getting him in deep doo-doo with his cute girlfriend. Said girlfriend makes her feelings known with a whizzz and a clunk.
Thursday, November 27, 2008
Even though this less-than-cheery image would suggest otherwise (I'm on vacation, and just don't have time to search for covers), I hope you all have a very Happy Thanksgiving. Time now for the footsball and the eatings.
Monday, November 24, 2008
CONFESSIONS OF A SPINNER RACK JUNKIE.
Here we go again with CONFESSIONS OF A SPINNER RACK JUNKIE, that more-or-less ongoing and often overdue feature in which I write shortish reviews of various works of sequential fiction that I have perused in the interval since the last time I inflicted such reviews upon one and all, or to be specific, the period from approximately November 7 through the 24th, some of which may even still be on sale at finer comics selling establishments worldwide if you're lucky. Or not, as the case may be.
100 BULLETS #97: Yep, you guessed it: another well-done issue what will engage the already engaged, baffle the uninitiated, and even baffle the initiated upon occasion. I think I'll continue to cut and paste this review for the next 3 issues. Wow. Three issues to go. Seems like only yesterday that this title premiered. A-
BATMAN: CACOPHONY #1: In which Kevin Smith once more deigns to dabble in comic book scripting, in between simultaneously wallowing in his established film style (via Clerks II, which had its moments) and trying to escape from it (via Zach and Miri make a Porno, which I haven't seen). I liked his early Daredevil OK, but after that he went to often-ridiculously-overdue projects in which I had no interest (Spidey/Black Cat) and one which offended the old-school, uptight DC fanman in me (I really try to suppress that guy, really I do, but I couldn't help it this time), his disgusting revamp of Stanley and his Monster in his Green Arrow stint- I mean that one really chapped my ass- and I've managed to avoid his comics work ever since. Unfortunately, he's in similar lowbrow mode here. While the basic "Deadshot attempts to take out hit on Joker in Arkham at the behest of Max Zeus" storyline is decent enough, no better or no worse than those which have appeared in hundreds of Batman comics over the last fifty years, Smith's execution of same is so smirky and juvenile that he effectively hamstrings any chance it has to get off the ground. It reads more like Jay wrote it, actually, snootches. He complicates it a bit by inserting one of his old self-created Green Arrow badguys, Onomatopoeia (the only comic book villain to share a name with a Todd Rundgren song title), giving the miniseries its name, but this character doesn't make a hell of a lot of sense, nor does he make things more interesting. Not helping is the staggeringly ordinary art of one Walt Flanagan (just who the hell IS this guy, anyway?); it's absolutely stunning in its stunning competence, and total lack of anything that approaches a recognizable, individual style. Was a time when crap like this would come and go as a 2-or-3 issue stint in an anthology book like Legends of the Dark Knight- now, it gets its own miniseries and the attendant attention that comes along, not a little due to the presence of Smith, who still has a little cachet among the faithful and which DC hopes will translate into sales of more than 20K copies. That may happen, and he may have a great comic series in him somewhere, but based on the evidence in this first issue, this ain't it. C-
B.P.R.D.: THE WARNING #5: Mostly neat and tidy wrap-up of what has been a very messy, overblown, all-over-the-place five-issue chapter of this ongoing saga. If I wasn't necessarily blown away, I did like a few things here and there- Kate Corrigan finding a boyfriend; the small character bits involving Krauss, Panya and Abe- and Guy Davis art always makes it worthwhile. And once more, the familiar refrain: this will probably read better collected. B+DEAD OF NIGHT FEATURING DEVIL-SLAYER #'s 1,2: Last time I saw this 70's character, he was in the pages of Warren Ellis' lamented-by-me Hellstorm, an alcoholic pawn of Heaven in its war on Hell. Don't know what's been done with him since, but it doesn't matter because this is something totally different, as a soldier in Iraq gets mixed up with demonic activity and discovers that he's heir to a devil-fighting tradition that dates back centuries. The plot is nothing new, but the setting is somewhat novel and gives this some juice. Mostly, I checked this out because of Chris Samnee, whose art impressed me a while back when I saw it on his website. Here, he kinda comes across as similar to Kano of early issues of Dial H For Hero fame or Pete Snejbjerg, slightly cartoonish but not excessively so. I don't see this going in a particularly innovative direction, but as long as Samnee draws it, it's worth a look. B+
DETECTIVE COMICS #850: Look- this whole "Hush removes Catwoman's HEART" crap is hooey of the first order, as Dr. Polite Scott will tell you. But Paul Dini is skillful enough to serve you a bullshit sandwich and convince you that it's prime rib, and that's roughly equivalent to the trick he pulls in this, the finale to that storyline. Even though I only skimmed the first couple of chapters, I had no trouble following along with this last one, and kudos to Dini for that as well. The action stuff worked well, the character stuff did too, and it's all drawn well by Dustin Nguyen, whose style kinda looks sketchy and unfinished sometimes, and is just too manga-derived for me to embrace it completely, but is stylish nonetheless and not hard to look at. I don't regret missing the previous issues by this team, but I thought this was a pretty good read. B+
DIANA PRINCE WONDER WOMAN TP VOL 03: Three issues into this most unlikely reprint collection series, and it's more of the same genre-hopping that we saw in the previous two; in one story, Diana does the government spy thing, in another she's taking part in a sword-and-sorcery adventure, here she's in a Gothic horror story right out of Dark Mansion of Forbidden Love; there, she's in a Prince and the Pauper scenario. It's as if Mike Sekowsky was choosing plots out of a hat. Despite this, it's his most consistently good run, script-wise, yet- coincidental plot twists are kept to a minimum, the sexism and slight racism is downplayed, almost nonexistent, and his dialogue scans easy as well. Still, one wishes he'd chosen a direction and stayed with it; no doubt he thought he was exploring possibilities, but the tone shifts from one story to the next are kinda jarring. Yeah, I know, these were never intended for collection and reading in one sitting like many of today's series are, so slack will be given. Most of these stories had Sekowsky pencils with inks by Dick Giordano; An adaptable inker, Giordano pretty much just emphasizes all the hard edges in Sekowsky's style; not as streamlined and slick as his own inked pencils or his work with Neal Adams, it kinda looks crude more often as not and while it's tolerable, I've always preferred the more softer-edged inks of someone like Sid Greene on Sekowsky's pencils. Wally Wood inks one episode, and not having seen Wood over MS before, it was interesting...sometimes Woody could overwhelm a penciller, but not in this case. They looked pretty good together, I thought. Also rounding out this collection is a World's Finest teamup with Superman; scripted by Dennis O'Neil and drawn by Justice League stalwart Dick Dillin, it suffers from lifeless art and a dated, terribly dialogued script, even though it does feature an early instance of Supes being attracted to, and hitting on even, Ms. Prince. I don't know if I can recommend these volumes to fans of today's comics, but they do have their charms and I, for one, am continuing to enjoy the series. B+
FABLES #78: Well, I don't mind telling you that seeing the fate of the Fafhrd and Mouser anagrams in this one didn't bum me out quite a lot; I guess Ningauble and Sheelba weren't paying attention this time, because I don't think they'd approve of what this Morpheus-alike is doing to their boys. Otherwise, another solid issue of this most engrossing and consistently readable series; far from casting around directionless in the wake of the Homelands coup, we now have what seems like a dozen possible storylines popping up, all of them intriguing. Good times. A-
FINAL CRISIS: RESIST #1: I read a few early issues of Checkmate, but just couldn't hang; the book was just so exposition-heavy that it was often a chore to read. I've liked Greg Rucka's work in the past, but in this case his apparent need to be constantly explaining and identifying just wore me down. It changed writers at least once not long after I dropped it, and of course had a merry-go-round of artists, but I was never really tempted to revisit it, until now we get a last hurrah of sorts as Rucka (with Eric Trautmann) once more writes the book in service of yet another Final Crisis tie-in- and I don't know whether he abandoned his overwriting tendency earlier, or figured it wasn't necessary this time out, but this is a lean, mean little comic book story, as he gives us an account of the organization's struggle against the spread of Anti-Life and the minions of Darkseid. Good character spotlights on a disparate bunch- Mr. Terrific (a busy fella, between this and the JSA), Snapper Carr, and the Cheetah all getting a little face time, and in the case of the last two, some of the highly random and very intimate type. We also revisit the whole Brother Eye/OMAC thing, which I missed out on because I, well, resisted buying the previous crossover event that spotlighted them, and only experienced through the crossovers in books like Manhunter. Nice job on art by Ryan Sook, as always; it's interesting to see how his style has evolved from its Mignola-lite early days to something which is now more reminiscent of J.H. Williams III. One of the better chapters in this increasingly-messy event. A-
GALVESTON #1: In which we get an imagined team up between Alamo hero Jim Bowie, of all people, and Jean Lafitte (not to be confused with Jean LaFoote, the barefoot pirate) as they have a Pirates of the Caribbean-flavored adventure on a ship on the Gulf of Mexico. Seems the crew of Lafitte's ship wants some gold they think he has, and is willing to mutiny to get it. Buddy-pic hijinks ensue. It's a neat foundation on which to build an adventure, I guess, and it's not like there's a plethora of Jean Lafitte and Jim Bowie adventures out there...but the adventure itself is one we've all seen before so that's a bit of a drawback. It may get better, though; according to the credits many and divers hands have been involved with this title's gestation...Grand High Poobah Ross Richie, nominal scripter Johanna Stokes, and credit is given for plotting to Old Man Tom and Young Pup (I presume) Mark Rahner. One would like to think that those heads, when put together, can come up with at least a few ideas between them. Artwise, the first few pages are drawn by an aspiring Maleev named Greg Scott; the remainder by one Todd Herman, whose style is a bit more crisp and angular and comes across a bit more lively because of it. Pirates may be so 2005, but this is a title worth watching for the novelty of the leads, if nothing else. And maybe, just maybe, if it becomes a TV series then Glen Campbell will sing the theme song! B-HOUSE OF MYSTERY #7: Most of the cast is still working their way down into the lower floors of the House, trying to find a way out, and snark/bicker/make love etc., as well as make a most pathetic discovery in this issue's cliffhanger. This is wrapped around a neat little interlude that scans like a Fables inventory story (unsurprisingly scripted by Bill Willingham, with slightly Corbenish art by Mouse Police's David Peterson), told by one of the HoM Tavern patrons, about a war between cats and birds. Here's another title which isn't exactly blowing me away by any stretch, but remains interesting enough to hold my interest. It might help if the cast didn't seem to either be stereotypes or ciphers. Still time, I guess, to improve. B+
JACK STAFF #19:Jack keeps rolling merrily along, in a readable if a bit complacent groove, with Grist entertaining us as always with his ADD (not this guy) storytelling style and wry tweaking of superhero story conventions. As so often is the case, this time out our hero really doesn't do much except get into mischief in Tom Tom's command center; the spotlight is ceded to a rotating cast of backups, including the guy on the cover, one Somerset Stone, whom I dare you to read his dialogue and not hear Sean Connery. If you're attuned to what Grist is doing, then this is another good issue. If not, get thee to some trade collections forthwith and report back here! A-JUSTICE SOCIETY OF AMERICA KINGDOM COME SPECIAL: SUPERMAN #1:Reviewed at PopSyndicate.com. B+
MANHUNTER #36: They finally wind up that whole Meta-factory in Mexico thing, which really dragged on an issue or two too long; Kate gets to deliver an impassioned speech and deal with the aftermath of her cowboy actions in shutting it down; more with her kid who now has superpowers; and preggers Chase continues to try and find unworthy boyfriend (well, in my opinion anyway) Dylan Battles, on the run from the Joker, and considers abortion. Unfortunately, Andreyko felt the need to undercut Kate's victory, realistic I guess, but also deflating to say the least. Oh well, in a couple more months this book will be dead, she'll go on to make many anonymous appearances in whatever will take the place of Birds of Prey or some team-up book or another, and it won't make any difference whatsoever. Welcome to being a comics fan in 2008, kids. B+
PUSH #1: Another movie tie-in, way in advance of what I understand is a film seeing release next year; it appears to be a kinda by-the-numbers X-Files meets Heroes meets, oh, I don't know, pick your own favorite government conspiracy/group of misfits with extraordinary powers/wannabe action thriller kinda thing. Whatever you choose, it will apply; this is a smorgasbord. I like the work that writers Adam Freeman and Marc Bernardin have done in other places, and I know they're capable of better; the always-outspoken Bernardin has of course Said the Right Thing and has defended this on the Web here and there, 'cause he seems to be a stand-up dude and really, this is work-for-hire, nothing more, so I don't blame him, really. The artist choice didn't do them any favors, either- utterly bland and generic, it's competent, but the figure drawing is often stiff and the layouts just sort of lie there on the page; servicing the story and little more. Good cover by Jock, as usual, but believe me when I tell you that you've read this before many times. If you want to drop tree-fitty to read it again, well, that's your business. Don't say I didn't warn ya. C+
TERRA #1: Can anybody out there give me a reason why this should even exist, except as a vehicle for the lovely artwork of Amanda Connor? Anybody? Outside of fanfic writers, is there a huge Terra cult who has been clamoring for a revised version of Marv Wolfman and George Perez' bucktoothed blonde team chemistry saboteur? I don't know- but somehow, I doubt it. Then again, I am a heathen infidel stranger to the ways of Titan fandom, if such a thing exists...I stopped buying Teen Titans in the late 80s and have rarely been moved to revisit. Anyway, the art is excellent. Story, servicable but again, what's the point here? Trees are dying, maaan... B+
TOP TEN: SEASON TWO #2: Just between you and me and the entire internet, I know that Zander Cannon isn't Alan Moore (I don't think...), but I'll be damned if I can tell all that much difference between Moore's original series and this continuation. I'm sure there are subtle differences, but for my money, I'm getting a good recognition buzz as Cannon puts the myriad of characters through their paces, and that's incredibly wonderful to see. Especially impressive is the dramatics involving the new Girl 2, and the grief that Irma Geddon is feeling over her predecessor (who was her partner)'s death; there's a great scene towards the end of this issue in which Irma calls Synathesia, who feels responsible for Li (Girl 1)'s demise, taking up Syn's offer...but in an example of how people can be unwittingly cruel, the latter winds up getting the emotional release of conversation at the expense of the former. There's a lot of psychological drama going on there that I can't adequately articulate, but I don't think Moore could have handled it any better. Perhaps it's because Gene Ha is back this time as well; it looks like Top 10, so all the appropriate visual cues are intact. Ha thankfully eases up on the soft-focus stuff that slightly marred #1, and the work is more pleasing to the eye because of it. I liked the "bad guy" in the hostage situation early in this issue; a relative of Danny the Street, perhaps? A
UNCLE SLAM FIGHTS BACK #1: Heavy handed political satire, slightly past its sell-by date. Rude, crude and occasionally chuckleworthy, but too often it reminds me of a lot of the emails I get from a right-wing friend of mine...so I guess this sort of thing is the opposite end of that spectrum. I think as a writer Ande Parks (whom I know more as an inker, and a darn good one) is capable of much better, and I really need to get my hands on Capote in Kansas (with art by that Samnee fella, see above) one of these days. Artist T.J. Kirsch has a decent enough cartooning style; if I squint I sometimes see some Gilbert Hernandez in there, believe it or not. Not really my cup of tea, but I'm sure some out there might find this amusing. C+
THE X-FILES #1: Holy crap, another lazy, uninspired, TV show/film tie-in. I sure do miss Gold Key comics sometimes; they knew how to do this shit back in the day. Storywise, it hits every beat that the old TV show did, with absolutely no spark or enthusiasm whatsoever. One would expect more from the co-scripter of July's motion picture, you'd think. The art is equally as static and lifeless, and it doesn't seem like the illustrator has much confidence in his own ability to work from photo-reference; he hits likenesses as often as he misses. I can see why DC might have wanted to have this in stores and bookshelves when the movie came out earlier this year, but that was months ago, and it wouldn't surprise me if it shipped late. Maybe it can tie in with the DVD release, which must be imminent. Fox, TimeWarner, listen: X-Files is played out. Let's just let it reside with the fond memories we had of 1994, OK? D+
I'm done for now, FINALLY, but I'll have more later, including a pair of books from Oni, Labor Days and Love the Way You Love, but I haven't had much time to read them lately, and a whole new box arriving Friday...I also received current copies of The Damned: Prodigal Sons (#3), Wasteland, and Tek Jansen, but I'm waiting for the trade on the first two, and my opinion hasn't changed about the latter.
Thursday, November 20, 2008
Sweet cover by Dave Johnson for a comic I'll probably never buy, since I've never really been much of a Punisher fan. Oh well.
Just wanted to put something up since I haven't done so in a while; thanks to work, a part-time graphics job, and real-world distractions and stresses I'm not getting a lot of time to sit and write, and not a lot of inspiration when I do...so, for the hundred thousandth time, please bear with and I'll have stuff soon- hopefully, a bunch of comics reviews if nothing else by the end of the weekend. Or not.
Sunday, November 16, 2008
Y'see kids, back in the dim and distant era pre-internet message boards and blogs, readers were often moved to comment on comics via the antiquated means of typewriter and paper and snail mail. And from time to time, some editor would be moved enough to earmark these missives for publication. It became kind of a thing for those of us who wanted to opine and have said opinions read, not to mention the attraction of seeing these opinions sharing actual physical space in the very same publications we were opining upon. Now some were more proficient at this than others, and therefore some were published more often of course- I was never in the same area code, literally and figuratively, as the T.M. Maples and Olav Beemers- but my brief career as a letterhack encompassed a period from 1974, in Brave and the Bold #116 (my first few were mostly one-or-two-line team-up suggestions) through sometime in the late 70's, either with a letter in Unknown Soldier #210, August 1978, or, in the only letter I ever had printed in a Marvel comic, Captain Marvel #57 (July 1978), in which (if memory serves) I complained about Pat Broderick's rendition of cornfields in Kentucky. After that, it just ceased to be a priority as I started working full-time and got married not long after...but I was moved enough, sometime early in 1984, to shoot off a missive to DC that saw print in the final issue, #12, of Thriller. The above image is one other that I had see print at about this time, in Batman Family #20 (cover date October/November 1978) and since I recently ran across a scan of the letters page, I thought I'd share, even though I kinda cringe at my choice of words in this one- Mike Golden has become a "mature artist"! Guess this means he shaves and everything! And the Man-Bat "strip". Uh, kid, this isn't a comic strip.
I can still understand, though, why I was so excited by Golden's version of the Demon- Golden was the first person that drew Etrigan in a different fashion than that which Kirby established; he accentuated the eyes, making them bigger on his face and emphasized the eyelids, and made the ears longer and more pointed..where Kirby's Etrigan looked pugnacious and gnomish, Golden's looked reptilian and evil, and it was such a radical change that I'm surprised Vinnie Colletta and Carmine Infantino let it pass. It excited me, I'll tell you that- Golden's art blew me away when I first saw it, and his Demon was icing on the cake. I look back at it now, and I'm not so wild about it; since so much time has passed and so many artists have been influenced by him and his contemporaries at the time, it has lost its radical edge and just looks kinda dumpy and stiff to my eyes now. I'm still fond of it in a nostalgic way, though. Golden's work these days is far more polished and streamlined, and as so often is the case is technically better, even if it lacks the spunk of the early stuff. At right is a Golden page from this issue, a conversation between Batman and his co-star in this issue, Ragman, with inks by Bob Smith. Click to see it bigger.
Anyway, this one was kinda exciting to me, as I recall, because I was a fan of the still-newish Ragman character, and was really digging the Batman Family book in general at the time, as it was featuring some good Batman & co. tales with art by Mike Golden, Jim Starlin, and others, and the Man-Bat feature, written by Bob Rozakis, was pretty good too. As it turned out, the promise of a Len Wein/Mike Golden Demon did came to pass, but not in the pages of Batman Family- it was a victim of the DC Implosion, and many of the scheduled BF stories ended up in Detective, I believe. I don't think that there were very many more Wein/Golden Demon stories all totaled, either. Oh well, water under the bridge.
Saturday, November 15, 2008
(click to supersize each page)
For your reading pleasure, one of my absolute favorite Jerry Grandenetti Warren stories, from Eerie #9: "Rub the Lamp"- in which an antiques dealer finds a magic lamp, and gets more than he bargained for. This is the story which got me to notice Grandenetti's hallucinogenic 60's style when I was a kid, even though I'd seen it in other stories in previous issues. Everything in this story, with its distorted figures, brittle, jagged panel borders and vertiginous perspectives literally radiates dismay, greed, and fear; I don't know if the term "expressionistic" applies exactly, but I think it's awfully close. His was never an attractive in a conventional sense sort of style, especially when compared to the Adamses, Woods, Crandalls, Kirbys and Morrows that were his contemporaries, but when it came to helping the reader get a feel for the vibe that this sort of horror tale was trying to get across, as far as I'm concerned it really did the job in excellent fashion. Joe Orlando's work at this time looked a lot like this- in fact, there were a couple of Warren stories that I had associated with Grandenetti for decades that I came to find out were actually Orlando's. But Grandenetti, I think, did it with a bit more gusto. I'm not familiar with the writer of this tale, one Allan Jadro; I wonder if it wasn't a pseudonym. Archie Goodwin wrote most of the stories in those days for this magazine, but it stands to reason that he couldn't write everything...someday I'll have to dig out my Warren Companion and see if it can shed some light on Mr. Jadro's identity.
These days, when comics readers think of JG at all, it's mostly in terms of the mostly lackluster work he did later in his career with Joe Simon on stuff like The Green Team and Prez, or perhaps even the Eisnerish work he did pre-DC War comics...but for me, this is genius stuff, and I wanted to share.
Friday, November 14, 2008
FRIDAY NIGHT FIGHTS!
It's a whole new day at Friday Night Fights; the mighty Bahlactus has passed the torch to the somewhat curiously-namedSpacebooger, and after a short break we're back and in effect. The theme this time is onomatopoeia, defined by Mr. Webster as "the naming of a thing or action by a vocal imitation of the sound associated with it " or "the use of words whose sound suggests the sense". I think the fifth panel, and its attendant visual sound effect, qualifies in the case of the second definition- unless you're fond of Kevin Smith Green Arrow comics, you won't find too many examples of people shouting out "BAM" or "POW" as the slug someone. Anyway, I found this page at CSBG this morning; it's from Hulk #142, and it's one of those "you gotta see it to believe it" type stories (click on the CSBG link to read the pertinent pages) that only could have been conceived at the dawn of the 1970's, featuring a cameo from Tom Wolfe and the use of his "Radical Chic" stories as the springboard for a superhero slugfest. Weird.
Wednesday, November 12, 2008
Well! Those of us who get our comics shipped to us from DCBS via DHL are all a bit nonplussed by the news that the shipping service has decided to suspend operations in the US. How will they ship our precious books now? UPS? FedEx? USPS, even? Who knows. Anyway, regardless, IMA GUNNA GET NOO COMEEKS this weekend, I hope, and this is what they be, along with commentary when applicable:
DIANA PRINCE WONDER WOMAN TP VOL 03: More madness from Mike Sekowsky; I'm not digging these stories quite as much as I thought I would, but they're still good, albeit somewhat sexist and even slightly racist, fun. These seem to be coming out quickly, with a Vol. 4 scheduled soon (with Fafhrd and the Gray Mouser!). I still wish I had the originals, but these are a hell of a lot easier to find at an affordable price.
TOP TEN: SEASON TWO #2: I found myself really liking #1; hope it continues.
JACK STAFF #19: Paul Grist. It's been too long between issues, but I, for one, am a patient sort.
BPRD THE WARNING #5 (OF 5): Guy Davis. I'm beginning to take him for granted on these books, I believe.
I also made out my November DCBS order, and it looks like this:
FINAL CRISIS #7100 BULLETS #99FABLES #80HELLBLAZER #251 (I used to go out of my way to add the John Constantine: part, but the hell with it.)SCALPED #25JACK STAFF #21 (This one has the horrible Ian Churchill cover. I like my Jack by Grist or not at all)DAREDEVIL #115HELLBOY: THE WILD HUNT #2 UMBRELLA ACADEMY: DALLAS #3 (This issue has the big Jerry Jones cameo, I think)BLUE BEETLE #35 (How many more of these will there be, I wonder?)MANHUNTER #38SANDMAN: DREAM HUNTERS #3UNKNOWN SOLDIER #4INCOGNITO #2THE BOYS #26B.P.R.D.: BLACK GODDESS #1 (Beyonce or Haille Berry, I wonder? Aw, I kid)DIANA PRINCE WONDER WOMAN TP VOL 04 (See? These things come out fast!)TOP 10 SEASON TWO #4
Monday, November 10, 2008
CONFESSIONS OF A SPINNER RACK JUNKIE.
Time once more for CONFESSIONS OF A SPINNER RACK JUNKIE, that more-or-less ongoing and often overdue feature in which I write shortish reviews of various works of sequential fiction that I have perused in the interval since the last time I inflicted such reviews upon one and all, or to be specific, the period from approximately October 26 through November 7, some of which may even still be on sale at finer comics selling establishments worldwide if you're lucky. Or not, as the case may be.BLUE BEETLE #32: Plot wheels grind slowly in this issue, and they're being spread awfully thin; we're still dealing with the leftover threads from the last few issues, and this time we get extended face time with legacy badguy Dr. Polaris, in a series of scenes designed to show us what an evil mofo he apparently is these days. As fast-paced as always, but this is coming across as inconsequential and slight, and that's not gonna move a whole lot of units...which is something this terribly sales-challenged book needs to survive. B+
THE BOYS #24: All the gross-out fratboy hijinks are clamoring to be the focus, but I'm liking the subtle character stuff more, such as the quieter scenes between the Frenchman and the Female, and Mother's Milk and the town cop as he investigates the death of Silver Kincaid. Here's the best-kept secret about ol' Garthie boy, y'see- while everybody remembers all the gross, irreligious, irreverent stuff in better works like Hitman, Hellblazer and Preacher, the glue that held them all together was the more-deeply-felt-than-you'd-think relatonship stuff as best exemplified by the three-way romance between Jesse Custer, Tulip, and Cassidy, John Constantine and Kit, or the BFF-style hijinx of Tommy Monaghan and Nat the Hat. It's here, too, but sometimes it hides. I can see it, though, and I hope you can too because that, and (once more) Garth's willingness to let his "good guys" be just as ruthless and arrogant as the "bad guys" is what keeps me reading. A-
CRIMINAL 2 #6: I said at the beginning of this arc that it this was not gonna turn out well for our kinda-sorta hero, and nothing I've seen since has convinced me otherwise, so there's a grim sort of inevitability to this story which truncates my enjoyment somewhat. Still, when you've got Sean Phillips illustrating your slow march to doom, that makes it worthwhile. A-
DAREDEVIL #112: Better than last issue, because if nothing else Brubaker once again gets to write Iron Fist for a few pages. Otherwise, this book remains in the same stylistic rut it's been in forever and a day now, but at least it's a still-mildly-interesting one, especially since Ed has expanded the focus a bit to work in even more recycled Miller concepts, the aforementioned Danny Rand, and that Tarantula dude he seems so fond of. Also nice to see Mike Lark back on pencils. I still have no use for this uninspired Lady Bullseye character though. B+
EL DIABLO #3: Writer Jai Nitz continues to establish the boundaries of his Robert Rodriguez-meets-Bernard Baily opus, working that "supernatural avenger from beyond the grave" thing for all it's worth as he establishes the ground rules as far as who's who and what's what. It's OK, even though we've seen it all before. I'm still enjoying the Phil Hester/Ande Parks art, too; it's as edgy and intense as the script demands. That said, I wish the parallel fight scenes in this issue had been spelled out a little more clearly; when you have your protagonists gain and/or lose their advantage off-screen, well, it doesn't help reader comprehension, I'm afraid. B+
FINAL CRISIS #4: There's so much noise going on with this book that it's hard sometimes to just look at it and see what's happening; between the scheduling gaffes and the artist foibles and adjusted expectations and so on, it sometimes seems that the actual story here is secondary to all the hoo-hah that has accumulated around it. Problem is, when you do actually try to look at this latest mega-event objectively, it presents itself as another ordinary "invasion of Earth by hostile extraterrestrials" saga, albeit one infused with the ideas of the King of Comics himself, Jack Kirby. I've come to expect greatness from Morrison (and I'm not alone), but sadly, this is a mess, and it's a bit disingenuous on Grant's part as well since this is merely the basic template he seems to always follow when writing this sort of story- his JLA comes to mind, and it seems like one of his New X-Men arcs was similar in execution. Which is not to say it's a mess like his concurrent Batman: RIP, which suffers from poor art as well as overstuffed plot; there is some imagination, spark, and Morrison's trademark succinct dialogue style in its favor. But really, the only thing that's in doubt is just how the good guys will triumph and reestablish status quo...and that's an awfully ordinary objective to strive towards. So perhaps Grant is just the victim of heightened, maybe even unrealistic expectations here, but in my opinion it seems like he's aware of this- and figures that he can't win no matter what so why not just try meet them halfway and be done with it. Another bone of contention lately has been the change in artists, as J.G. Jones has found himself unable to meet the arbitrary deadlines that have become attached to this project and had to bow out. That's a shame, because Morrison and Jones have a good sort of synchronicity when they collaborate under normal circumstances...however, this isn't a normal project and deadlines are more of an issue, especially when retailers get in the mix. In this issue, he gets assistance from Carlos Pacheco and Jesus Merino, whose work, with its dynamic action poses and lively layout style, has pleased me greatly in the past. They seem to be sublimating their tendencies in order to merge more smoothly with Jones' more designerly style here, however, and while overall the look is consistent, it doesn't really play to Pacheco and Merino's strengths at all. Anyway, come what may (as they sang in Moulin Rouge!) I'm in for the long haul, so we'll see how this all turns out. Is it wrong of me to hope that somebody shoots the Atom into Darkseid's ear again, just like Grant did in JLA? B+
HELLBLAZER #248: I'm really going to miss Andy Diggle on this book; nothing against Pete Milligan at all, and I'm sure he'll take ol' Conjob into some interesting places, but Diggle has such a great grasp of John's personality that it's been a pleasure to read his run so far. In this issue, we're still dealing with loose ends and characters from the last couple of storylines; John seems to sort things out in his typical fashion...but it seemed too easy, and it turns out there was a reason that it went as smoothly as it did. I have to give props to Leo Manco for really stepping it up a notch on art; his work is as good now as it's ever been since he came on board. A-HELLBOY: IN THE CHAPEL OF MOLOCH:Reviewed at PopSyndicate.com.B+
THE IMMORTAL IRON FIST #19: For the second issue in a row, writer Duane Swierczynski's best efforts are undercut by murky, incoherent art by Travel Foreman, especially in the big showcase fight scene department- I mean, I've read this issue three times now, and I'll be damned if I can tell you much of anything about the battle between the Iron Fist Killer and the Mystical Cities Champions other than it seems to have ended at some point in a stalemate of some sort. It's just that choppy and poorly staged. I think he has a good handle on the characters, though, and this arc has been enjoyable enough- the opening confrontation is sparked by a pretty nifty twist (that I suppose I gave away earlier in this review, sorry), and even though the sudden-but-inevitable-betrayal at the end loses a little of its shock value because let's face it, the betrayer wasn't exactly one we had gotten to know very well, I'm engaged enough to see it through for the time being. I really wish that Travel would travel on, and give way to an artist that can compliment, rather than compete for attention with, Swierczynski's scripts. B+
INCREDIBLE HERCULES #122: I like fun as much as anybody out there, believe me, so when I kept seeing pages from this posted all around the Net, with its "CRAKKAJAMMA" and the admittedly hilarious "Prince of Atlantis! Check thyself!" line from the lead, well, I got curious. I don't fully understand everything that's at stake here, despite Sappho's best efforts to get me up to speed in the intro...but I don't guess it matters; breezy scripting, eye-pleasing art that's only a little stiff- that adds up to an entertaining comic that has me curious about others in the run. Hercules, or at least Marvel's version anyway, has always been a fun character, so it's good to see the tradition continuing in these troubled times. A-
JUSTICE SOCIETY OF AMERICA #20: On the other hand, this is not so much fun and is mostly devoted to that ongoing saga of Power Girl and her intradimensional adventures. I was never a fan of the old Infinity, Inc. book, nor of the 70's Justice Society revival (although I did have a fair amount of issues, mostly for the Wood inks), so most of this kinda leaves me cold. But, the characterization is solid if a little soapy, and even though competent but unexciting old pro Jerry Ordway draws about half of it, young buck Dale Eaglesham acquits himself well by comparison on his pages. Another good-enough chapter in the ongoing saga. B+
MADAME XANADU #5: In which Wagner and Hadley give us Madame X as a supporting character in Sofia Coppola's Marie Antoinette, continuing their Magical History Tour in mostly clever fashion. I like the on-again, off-again romance stuff with the Phantom Stranger, who conveniently keeps popping up when MadX is about to get in deep merde. I also thinkHadley's pretty-face manga-esque style works very well with the Revolutionary French settings. Xanadu remains, if not essential, still interesting and enjoyable. A-
MIRROR'S EDGE #1: What sets this, the umpteenth attempt to capture the attention of the gaming crowd with comics (which is kinda akin to trying to capture the attention of hunters by promoting trap shooting), apart from other similar attempts is the stylized Oeming-cum-Mignola art of Matt Smith, he of The Keep, Astronauts in Trouble, and Day of Judgment fame. Even though his work is not quite on par with those gentlemen, he is a talented artist in his own right and he makes this visually interesting, at least, and certainly does a great job of reproducing the look of the game. Not being a gamer, I don't know what the lore is or what the objectives are, so I don't know how close this comics' account of a young, high-nerd-appeal Asian girl who gets recruited into what seems to be a group of people, couriers of a kind, who leap about on rooftops as they deliver sensitive information or what-have-you to people actually is to the source material. I do know that it can't be especially easy to craft any sort of narrative or storyline to what appears to be your basic running, jumping, shooting kind of game, and I'll give new-to-me writer Rhianna Pratchett, who apparently is involved in the game project in some capacity, credit for that. Well-drawn and mildly interesting, unlike about 99.9% of the rest of this genre, and if you're not expecting much, you might find this enjoyable. B+
SCALPED #22: I wonder how, sometimes, I can be so dismayed by the constantly-bleak tone of books like Daredevil, but continue to champion this, one of the most unremittingly dismal narratives to be found in sequential fiction these days. I know that it has a lot to do with the fact that this is straight-up real world drama, with no fantastic elements, and it achieves a resonance that other more larger-than-life, fantastical narratives have no hope of achieving. Anyway, we continue our focus on Chief Red Crow, the nominal bad guy of the piece, who is besieged from all sides by all sorts of threats even as he struggles to come to grips with his past even as he is trying to carry out a heartbreaking task in memory of his late love/adversary Gina Bad Horse. Jason Aaron and R.M. Guera achieve an amazing synchronicity in their depictions of his memories and inner struggle; it's really something to see. Also, to a lesser extent we are watching young Dino Poor Bear, as he gets himself in deeper in his own troubles, which will certainly intersect with Red Crow's eventually. Another absolutely outstanding, deeply resonant issue. And yet, this comic sells less that 8,000 copies a month, no doubt due to the lack of magical fairy creatures or people who shoot force beams out of their hands...all I can do is hope, I suppose, that enough people are buying the trades (I myself bought the first two, foolishly dismissing this title after skimming issue #1) to make a difference and keep this going, at least until Aaron can bring it to some sort of conclusion. A
SGT. ROCK: THE LAST BATTALION #1: I'm not sure of Billy Tucci's research for this project went much deeper than screening Flags of Our Fathers and Saving Private Ryan, which this resembles, but I will say that I am absolutely amazed that his art, which I've previously associated with overly fussy and stiffly posed depictions of long-legged, Playboy-magazine-posed female ninja warriors and such, looks as good as it does on this subject matter- the soft focus touches, which seem to be so popular these days among some artists (Gene Ha is one which immediately comes to mind), really help add to the nostalgic air. Sure, Tucci's Sgt. Rock is downright metrosexual compared to the canonical versions by the likes of Joe Kubert, Ross Andru, Jerry Grandenetti and others, more Tyrone Power than John Wayne, I suppose- but not really ever having been much of a Rock fan in general (I was always more of a Sgt. Fury kid myself), I don't really care all that much. It's his scripting that bothers me a lot more- in attempting to pay tribute to, if not outright imitate, the inimitable Robert Kanigher dialogue cadences he just doesn't cut it, and the dialogue reads awkwardly to me. The everyman-whose-eyes-we-see-Easy cartoonist is a nod to Ryan, but it works OK and gives Tucci an opportunity to show us that he can do other styles as well. Setting Rick in the middle of a real-life wartime incident isn't a bad idea, however, so as far as I'm concerned the jury's still out. All in all, this turned out a lot better than I expected, and I appreciate the opportunity to be surprised...doesn't happen as much as it should. B+
SOLOMON KANE #2: Pretty much on a par with issue #1; well-written, passably drawn. Scott Allie has a good handle on Kane, and nails this issue's would-be seduction scene. Not having read the source for this tale, I'm looking forward to what develops. A-
SUB-MARINER: THE DEPTHS #2: Two issues in, and still no appearances by the fella whose name is on the front of the book...but that won't be such a problem when this is collected, which is probably how this should be read. I'm kinda liking this slow-moving, but dramatically valid, story which treats Namor like some sort of legendary creature being sought by a not-so-intrepid Skeptical Man of Reason, and the painterly soft-focus Esad Ribac art, which reminds me a bit of the visual style of Sky Captain. If you're the patient sort, you might too. B+
VIXEN: RETURN OF THE LION #2: This remains a resolutely mediocre showcase for a character that DC really, really wants us to like a lot. Storywise, fine if a bit on the cliched side as our girl, badly wounded by the supernatural badguy she scrapped with last issue, goes off into the plains to heal and see visions and stuff. Artwise, although the candy-colored color scheme is novel, "Cafu"'s figures are still stiff and his staging is bland. Showcases just aren't what they used to be. C+
Friday, November 07, 2008
I'm a little surprised that I'm not seeing this at the comics news sites like Deppey, Tom, and Heidi...but hey, I was so impressed by this that I'll share and they can take credit later. Jill Thompson has posted three pages she found from an aborted Nightmare Before Christmas graphic novel adaptation, and I can't think of many more perfect matches of artist and subject matter. To be honest, I'm not that big a fan of the film, but these are wonderful- too bad that it didn't get greenlighted. Here's one page, click to see all bigga; for two more and the full story go here. And tell her Johnny B sent ya.
Wednesday, November 05, 2008
My father-in-law has a lot of irons in a lot of fires, and one of the biggest he has is in the auction business. I don't know if you're familiar with the estate auction end of it, but it's often a tedious and laborious process that involves cataloging and distributing the items that are for sale, as well as the physical labor involved when it's necessary to take these items, usually grouped into lots, outside into the designated areas (often onto large flatbed wagons) to be auctioned. Because I never seem to have enough extra income, and also because I want to help out, I often find myself working for him at these auction sales, which provides me with opportunities to see what's available before it goes up for bidding. Many of the houses and belongings he auctions were once owned by elderly people, and he often has many antiques available as well...so another reason why I help out is (at least at first it was, anyway) because you never know when you'll run across an interesting old album or stack of magazines...or comics. Unfortunately, this hasn't happened very much at all, only once or twice in the 20+ years I've been involved with this, which is kinda discouraging to say the least- either no one in the five-county south central Kentucky area collected old comics and albums, or the families kept them and handed them down to survivors.
But, that isn't always the case, and in an auction about a month ago, I ran across a single copy, with no other comics in sight, of the book you see above left: BIG TOWN #26, cover date March-April 1954. It was intact, although the cover is torn, missing a chunk, and isn't attached to the body of the book. The pages are very yellowed. Now, I know most of you were under the impression that I go back as far as the James Knox Polk administration, but that's just not the case- while I'm aware of a great many TV shows, movies, etc., I had never heard of the television show this comics series was based on. Understandable- it last aired four years before I came into this world, 1956 to be precise. However, it was a DC Comic, so I contrived to have it added to another lot (which contained an intact APBA baseball game, with the 1979 season cards- more on that some other time, perhaps), and I was able to take the whole thing for a mere $2.50. When I got home, I did a little looking around on Wikipedia and found out that not only was Big Town a TV series, but also a radio show before that. The comics series, spawned by the advent of the TV show, lasted until 1958, two years before I was born.
So- is it any good? Actually, yes- it features three 7-page stories scripted by Silver Age Green Lantern stalwart John Broome, and art by veteran Manny Stallman, with inks by John Giunta, who did solid, if not especially memorable work for a number of publishers in the 40's on into the 60's and 70's, including a long stint drawing Big Boy comics. Mark Evanier posted a nice obit, as is his wont, for Stallman here. Typically, their work here is good, if not especially exciting or memorable- it's an unexceptional sort of style. The cover is by none other than Gil Kane, although obviously he had yet to develop his idiosyncratic style of later years. Big Town was, as TV.com succinctly describes it, a "...live dramatic series about a small town newspaper." Each story stars newspaper reporter Steve Wilson, a dashing, intrepid hero type who is determined to solve mysteries and bring justice whenever possible, just like newspaper reporters always were, apparently, back in the 1950's. First tale gives us a fellow who is taking out ads all over town claiming that he intends to blow up a bridge in the city; of course Wilson gets to the bottom of it and discovers a bigger plot...and yes, the cover scene is indeed represented in this installment. Story two is an account of a Newsboy Legion-type group of Big Town kids, who Wilson organizes to get them off the streets. Of course, they get mixed up in a crime wave of robberies pulled off by an organized gang, and help Wilson bring the mob to justice. Finally, story three is about a Houdini type who seals himself in a safe and gets submerged into the river- when they pull him up, he appears to have been shot in the head and leaves a letter blaming a rival for the crime. Wilson is of course skeptical, and sets out to find out the truth and save the man from the electric chair. Each vignette ends with Wilson slugging the perp in true two-fisted newsman fashion. There are also several of those public service announcement-type pages we all know and love, as well as a couple of fun facts pages. A typical DC comic of 1954, I suppose- but I was a little surprised at how content-heavy these stories were; even though they were only 7 pages long, I had to take my time and read the things- there was (of course) a ton of expository dialogue, people constantly explaining everything to each other (this is a John Broome story, after all), and caption after caption explaining the stuff that the characters didn't- but these were also full of action, with several plot twists taking place in each short story. These are, I would imagine, quite indicative of the sorts of tales that were told in the television series.
Devoid of the science-fiction or supernatural (superheroes were, with the exception of Superman and Batman, remember, still yet to make their comeback) trappings of the pre-Code era, I get the distinct impression that DC wasn't aiming these comics at the average 10-year-old reader. Even though they scan a lot like the 60's Silver Age DC stuff we all know and love, really, the dialogue and situations are of a more adult, that is to say grown-up, nature. Surprisingly so, at least to me. Readers today, especially those who are enthralled with noir-type comics such as Brubaker and Phillips' Criminal, might find something of interest in this series (at least, that's an assumption based on a very limited sample group). This was a nice and unexpected find; however, the mundanity of the subject matter ensures that I'm not especially moved to go out and seek any more. It is interesting to note, though, that it is a TV tie-in publication- even featuring a little ad for the show at the end of the last story (Thursday night, 9:30 Eastern, CBS in case you were wondering)...and that's something that's going on even today, what with DC's recent hardcover collection of Heroes (which is sitting on the stereo over there, daring me to unwrap it even now), as well as the Dark Horse Joss Whedon adaptations and others. The more things change, I guess, the more they stay the same.
Tuesday, November 04, 2008
Please allow me to get political, just for a few minutes.
Look, I think by now most of you have made up your mind about whether or not you're going to vote, or who you're going to vote for. I seriously doubt that I will be able to sway your opinion one way or the other at this point, if I ever could.
But, today is a very important day, not just in and of itself because of Election Day, but of its potential implications for the near and far future...so I thought I'd say a few words, and you can take them as you will. Or leave them. Or whatever.
I voted early this morning for Barack Obama. You know, this guy:
There are a lot of people out there who are doubters, haters and skeptics, for various reasons. Maybe they've been disappointed too many times by corrupt and just plain stupid elected officials who have far too often taken the low road. Maybe they're just conditioned to expect the worst of people and always expect the worst possible thing to happen...if nothing else, so if something positive happens they'll be pleasantly surprised. Perhaps they're laboring under the delusion that the Republican party is the party of belief in God, and a vote for any Republican candidate is a vote for someone who is as religious as they perceive themselves to be, or want to be. There are some who just want to be contrary- they fancy themselves as iconoclasts, able to read between the lines and glean insight that seems to elude those not as smart or gifted as they perceive themselves to be.
And I'm here to tell you that I have, in years past, found myself in that skeptical role. I always held that all politicians are bought and sold, and beholden to special interests to some degree. That kept me from registering to vote when I was 18; In 1980 I knew Reagan was a pandering sham and a front for more shadowy interests, but Carter's performance in office was underwhelming, so registering was not a priority (C'mon, I was 20. Callow youth.) and by the time my conscience got to me it was too late to register. Finally, in 1984, I put my name down and cast my vote for Mondale (and my uncle at the time, who ran for sheriff and brought me the paperwork)...but America didn't agree with me. Perhaps it was all the right-wing writing I was reading in Rolling Stone and other publications, who knows, but I've always leaned liberal even though politicians of both stripes have consistently let me down- even Bill Clinton, who struck me as a smooth-talking snake-oil salesman type, but also who I thought had some good intentions, even though he didn't get a lot of cooperation in getting them carried out. The whole Monica thing didn't bother me in the slightest, not being one who is especially concerned about the moral foibles of our Commanders-in-Chiefs, as long as the decisions they make about other, non-personal-life matters are sound. I knew back in 2000 that we were in trouble when Bush Junior got himself placed in office, though- he just seemed like an idiot through and through, coasting along and getting where he was through connections and family, and wrapping himself in the flag with a Bible held in front of him to charm the God-botherers who voted for him in droves. Nothing I have seen in the last eight years has made me rethink this conviction.
Anyway, to rein this in a bit, I too have been very skeptical about politicians of both parties for a long time now. Which is why I am surprised to find myself liking Obama so much. I remember when I first heard of him, he sounded promising but a bit green, and I was surprised when he threw his hat in the ring as soon as he did. He may be as untested as they say (exactly how "tested" does one need to be? How "tested" was Dubya? It's all in who you surround yourself with), and may turn out to be scamming us all...and he may have some sort of baleful hidden agenda that will cause everyone who votes him into office to regret it for the rest of their lives. But I don't think so. He seems to be the polar opposite of Bush Jr.; a reasoner. A thinker. Someone who respects the opinions of others and encourages dissent in order to get insight, rather than someone who shoots from the hip with snap judgments, shooting first and asking questions later, afraid to appear tentative or indecisive lest he be perceived as weak. I, for one, want an intelligent man in that position in the White House.
He's going to have a tough row to hoe, no doubt about it. The mess that 8 years of Bush and Cheney (and yes, some of Clinton's mess too) is not going to be cleaned up quickly or easily. However, I believe that having Obama in office will open doors that are now shut to those who would be able to assist, and I believe that he will surround himself with people who are similarly inclined to thought and discourse. Not yes-men, but people who can provide important input. And the thought of having such people in these positions of influence fills me with a cautious optimism...which is a refreshing change from the resigned cynicism I've had before. And this is not to mention the mostly positive effect it will have on our relations with the rest of the world.
I don't know. Obama may get in over his head, and be a spectacular failure. And if that happens, we're all well and truly screwed. But I like our chances with a man like him in charge. I hope you agree.
Sunday, November 02, 2008
Sending out Bacardi Show Birthday Greetings, whether he wants them or not, to the great STEVE DITKO, who observed his 81st today. Hasn't been all that long ago that I held forth on the Sturdy One, so I won't bore you again, but I didn't want to let the occasion pass without at least making note of it and taking the opportunity to post just a fraction of his work, including a knockout interior page below from one of his Warren stories- Eerie #10 to be precise. Hope he's had a great day, and is happy and loved. Really. | 2023-11-24T01:27:17.568517 | https://example.com/article/3095 |
Q:
F# - On the parameters passed to C# methods - are they tuples or what?
I've read many times that
Assemblies generated from F# or any other .NET language are (almost) indistinguishable.
I was then experimenting with F# and C# interop on .NET 4 (beta 2). I created a new solution, and a C# project, with the following class:
public class MyClass {
public static int Add(int a, int b) { return a + b; }
}
Then, on a F# project, after referencing the C# project, I tried:
MyClsas.Add(4, 5) |> printfn "%d" // prints 9 (no kidding!)
So far so good. Then another sentence I've read many times (perhaps on different books) came to my mind:
When passing arguments to functions from other .NET libraries, you use a syntax like ".MethodName(parm1, parm2)", that is, the parameters are passed as a Tuple.
Add that to something that I've once read here on SO (but wasn't able find it to link to), on a question where the OP was trying to create a using like [ 4, 5, 6 ] (when he meant [4; 5; 6]):
"Comma is the 'tuple creating operator', for everything else use semi-colon."
Then I modified my class to the following:
public class MyClass {
public static int Add(int a, int b) { return a + b; }
public static int Add(Tuple<int, int> a) { return a.Item1; }
}
Now I tried to use it on F#:
MyClass.Add(4, 5) |> printf "%d" // prints ... (keep reading!)
So, adding up the three quotations above, one can conclude that:
F# will create a Tuple when it sees (4, 5)
Then it will call the overload Add(Tuple<int, int>)
So it will print 4
To my surprise, it printed 9. Isn't it interesting?
What is really happening here? The above quotations and this practical observations seems to be in contradiction. Can you justify F#'s "reasoning", and maybe pointing to some MSDN docs if possible?
Thanks!
EDIT
(to add more information (from Blindy's answer))
If you do:
MyClass.Add((4, 5)) |> printfn "%d" // prints 9
F# calls the Add(Tuple<int, int>) overload.
However, if you create another F# project (so a different assembly) with this:
namespace MyFSharpNamespace
type MyFShapClass = class
static member Add x y = x + y
end
You can use it on C# like this
public static void Main(string[] args) {
MyFSharpNamespace.MyFSharpClass.Add(4, 5);
}
So far so good. Now, when you try to use it from F# (from another project, another assembly), you have to do:
MyFSharpNamespace.MyFSharpClass.Add 4 5 |> printfn "%d"
If you pass the arguments as (4, 5) F# will not compile because Add is int -> int -> int, and not (int * int) -> int.
What is happening?!?
A:
When passing arguments to functions from other .NET libraries, you use a syntax like ".MethodName(parm1, parm2)", that is, the parameters are passed as a Tuple.
It's more hideous than that. See the description of method overload resolution strait from the language spec.
What it says, basically, is that argument in a method invocation isn't really a tuple. It's a syntactic tuple, meaning a comma-separated list of something, but the parentheses are part of the method call syntax, and so are the commas. It's why, for example, o.M(a=1, b=2) isn't a method call with a tuple of two booleans, but rather two named arguments.
So, normally, every comma-separated component just maps to a distinct argument. Hence why Add(1, 2) calls Add(int, int) overload, and Add((1, 2)) calls Add(Tuple<int, int>). There is no ambiguity here.
However, a special case that kicks in for your particular case is this:
If there are no named actual arguments, and there is only one candidate method in M, accepting only one non-optional argument, then the decomposition of arg to tuple form is ignored and there is one named actual arg which is arg itself.
So when you removed all overloads except for the tuple one, suddenly the entire thing inside the parentheses is effectively treated as a tuple constructor in a call. But if you'd e.g. have two overloads, Add(int) and Add(Tuple<int,int>), then a call of the form Add(1,2) wouldn't resolve at all.
A:
I don't have F# installed right now, but it seems to me that
MyClass.Add(4, 5) |> printf "%d"
would print 9 whereas
MyClass.Add((4, 5)) |> printf "%d"
would print.. 4 right? Notice the double parantheses, the inner pair marking a tuple and the outer pair marking the function call.
A:
It's just compiler magic.
let add a b = a+b
add compiles down to add(a,b), making it easy to call from C#. However, F# programs still see it as add a b due to an attribute in the IL.
When calling C# functions in F#, it may help to think of the C# function as having only one parameter -- a tuple, whose elements determine the correct overload. So you can write:
// MyClass.Add(5,3) = 8
let eight = (5,3) |> MyClass.Add
| 2024-03-21T01:27:17.568517 | https://example.com/article/5775 |
Q:
Select Top and Last rows in a table (SQL server)
I'm using this statement in SQLServer and it works fine:
SELECT TOP 1000 *
FROM [SomeTable]
It gives me the TOP 1000 records from SomeTable, now which keyword should I use instead of Top if I need the Bottom 1000 records from the table?
A:
To get the bottom 1000 you will want to order it by a column in descending order, and still take the top 1000.
SELECT TOP 1000 *
FROM [SomeTable]
ORDER BY MySortColumn DESC
If you care for it to be in the same order as before you can use a common table expression for that:
;WITH CTE AS (
SELECT TOP 1000 *
FROM [SomeTable]
ORDER BY MySortColumn DESC
)
SELECT *
FROM CTE
ORDER BY MySortColumn
A:
You must sort your data according your needs (es. in reverse order) and use select top query
| 2024-04-23T01:27:17.568517 | https://example.com/article/2378 |
Q:
How to uninstall my own Android application without user intervention?
The only way I know of for uninstalling an application is by sending an intent (as described here), but this opens an activity for the user to confirm the uninstall.
I'm aware of the fact that there's no other way to uninstall other applications without user intervention (unless you have the DELETE_PACKAGES permission, which means you are the OEM).
But, is there a way to uninstall my own application without user intervention?
A:
There is a hidden function in PackageManager named deletePackage (it can be called via reflection). But it requires android.permission.DELETE_PACKAGES permission. It doesn't matter whether you are the owner of the app or not, you must have this permission granted. And this permission will not be granted to 3rd party apps.
So, basically, you can't uninstall application even if its yours. This actually makes sense, because user should be in control of such key events as installation and uninstallation of apps. Just imagine the frustration of user if he or she just installed the app from market but cann't find it (or similar scenarios).
You should just disable you application functionality with a proper message. This will be much more user-friendly.
| 2023-12-16T01:27:17.568517 | https://example.com/article/3066 |
Easy To Use Patents Search & Patent Lawyer Directory
At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.
Methods and apparatus to modify a recipe process flow associated with a
process control system during recipe execution
Abstract
Example methods and apparatus to modify a recipe process flow during
recipe execution are disclosed. A disclosed example method involves
executing a recipe, and before completion of execution of the recipe,
receiving process flow change information indicative of a modification to
a process flow of the recipe. Process flow rules are then retrieved from
a process flow rules data structure. The recipe process flow is modified
based on the process flow change information in response to determining
that at least one requested change indicated by the process flow change
information does not violate one of the process flow rules.
1. A method to modify a recipe process flow during recipe execution, the method comprising: executing a recipe using a plurality of manufacturing equipment resources; and
before completion of execution of the recipe: receiving process flow change information indicative of a modification to a process flow of the recipe; determining, via a processor, whether a process step being executed by one of the manufacturing
equipment resources can be stopped prematurely; and stopping the executing process step prematurely and modifying a process flow of the recipe based on the process flow change information in response to determining that the executing process step can be
stopped prematurely.
2. A method as defined in claim 1, further comprising receiving a process flow change request to modify the process flow based on the process flow change information and modifying the process flow in response to receiving the process flow
change request.
3. A method as defined in claim 1, further comprising configuring the execution of the recipe to not execute a subsequent process step prior to modifying the process flow.
4. A method as defined in claim 1, further comprising identifying at least one active process step to be deactivated and at least one target process step to be activated based on the process flow change information.
5. A method as defined in claim 1, further comprising when the executing process step cannot be stopped prematurely, waiting for the executing process step to finish execution prior to modifying the recipe process flow in response to
determining that the executing process step cannot be stopped prematurely.
6. A method as defined in claim 1, further comprising determining whether the executing process step can be stopped prematurely based on rules stored in at least one of the process flow change information or a process flow rules data structure.
7. A method as defined in claim 6, wherein the process flow rules data structure is to store at least one of manufacturer-defined process flow rules or industry-defined process flow rules, and wherein the process flow rules are applicable to
any other recipe executed by a process control system used to execute the recipe.
8. A method as defined in claim 1, wherein the process flow of the recipe is modified based on the process flow change information in response to a user performing only the procedures of selecting a process step to be activated and selecting a
step change user interface button.
9. A method as defined in claim 1, wherein the process flow of the recipe is modified based on the process flow change information in response to a user selecting only a step change user interface button.
10. A method as defined in claim 1, wherein determining whether the process step being executed by one of the manufacturing equipment resources can be stopped prematurely comprises determining whether the process step being executed by one of
the manufacturing equipment resources can be stopped prematurely based on maintaining a safe operating condition or based on maintaining a particular quality for a product being produced by the manufacturing equipment resources.
11. An apparatus to modify a recipe process flow during recipe execution, the apparatus comprising: a user input interface to receive process flow change information indicative of a modification to a process flow of a recipe before completion
of execution of the recipe, the execution of the recipe being carried out using a plurality of manufacturing equipment resources; a process step terminator to stop an executing process step prematurely in response to determining, via a processor, that
the executing process step can be stopped prematurely, the executing process step being executed by one of the manufacturing equipment resources; and a process step activator to modify the process flow based on the process flow change information.
12. An apparatus as defined in claim 11, wherein the user interface is further to receive a process flow change request to modify the process flow based on the process flow change information.
13. An apparatus as defined in claim 11, further comprising a process step deactivator to identify at least one active process step to be deactivated based on the process flow change information, and wherein the process step activator is to
identify at least one target process step to be activated based on the process flow change information.
14. An apparatus as defined in claim 11, wherein the process step terminator is further to determine whether a wait period is required to wait for the executing process step to finish execution prior to modifying the recipe process flow.
15. An apparatus as defined in claim 11, wherein the process step terminator is to determine whether the executing process step can be stopped prematurely based on rules stored in at least one of the process flow change information or a process
flow rules data structure.
16. An apparatus as defined in claim 15, wherein the process flow rules data structure is to store at least one of manufacturer-defined process flow rules or industry-defined process flow rules, and wherein the process flow rules are applicable
to any other recipe executed by a process control system used to execute the recipe.
17. A non-transitory machine accessible medium having instructions stored thereon that, when executed, cause a machine to at least: execute a recipe using a plurality of manufacturing equipment resources; and before completion of execution of
the recipe: receive process flow change information indicative of a modification to a process flow of the recipe; determine whether a process step being executed by one of the manufacturing equipment resources can be stopped prematurely; and stop the
executing process step prematurely and modify a process flow of the recipe based on the process flow change information in response to determining that the executing process step can be stopped prematurely.
18. A machine accessible medium as defined in claim 17 having instructions stored thereon that, when executed, cause the machine to receive a process flow change request to modify the process flow based on the process flow change information
and modify the process flow in response to receiving the process flow change request.
19. A machine accessible medium as defined in claim 17 having instructions stored thereon that, when executed, cause the machine to configure the execution of the recipe to not execute a subsequent process step prior to modifying the process
flow.
20. A machine accessible medium as defined in claim 17 having instructions stored thereon that, when executed, cause the machine to identify at least one active process step to be deactivated and at least one target process step to be activated
based on the process flow change information.
21. A machine accessible medium as defined in claim 17 having instructions stored thereon that, when executed, cause the machine to, when the executing process step cannot be stopped prematurely, wait for the executing process step to finish
execution prior to modifying the process flow.
22. A machine accessible medium as defined in claim 17 having instructions stored thereon that, when executed, cause the machine to determine whether the executing process step can be stopped prematurely based on rules stored in at least one of
the process flow change information or a process flow rules data structure.
23. A machine accessible medium as defined in claim 22, wherein the process flow rules data structure is to store at least one of manufacturer-defined process flow rules or industry-defined process flow rules, and wherein the process flow rules
are applicable to any other recipe executed by a process control system used to execute the recipe.
24. A machine accessible medium as defined in claim 17 having instructions stored thereon that, when executed, cause the machine to modify the process flow of the recipe based on the process flow change information in response to a user
performing only the procedures of selecting a process step to be activated and selecting a step change user interface button.
25. A machine accessible medium as defined in claim 17 having instructions stored thereon that, when executed, cause the machine to modify the process flow of the recipe based on the process flow change information in response to a user
selecting only a step change user interface button.
Description
FIELD OF THE DISCLOSURE
The present disclosure relates generally to process control systems and, more particularly, to methods and apparatus to modify a recipe process flow associated with a process control system during recipe execution.
BACKGROUND
Process control systems, like those used in chemical, petroleum or other processes, typically include one or more process controllers and input/output (I/O) devices communicatively coupled to at least one host or operator workstation and to one
or more field devices via analog, digital or combined analog/digital buses. The field devices, which may be, for example, valves, valve positioners, switches and transmitters (e.g., temperature, pressure and flow rate sensors), perform functions within
the process such as opening or closing valves and measuring process parameters. The process controllers receive signals indicative of process measurements made by the field devices and/or other information pertaining to the field devices, use this
information to implement a control routine, and then generate control signals that are sent over the buses or other communication lines to the field devices to control the operation of the process. In this manner, the process controllers may execute and
coordinate control strategies using the field devices via the busses and/or other communication links communicatively coupling the field devices.
Process control systems are often configured to perform processes in accordance with batch recipes to produce products. Product designers or engineers prepare recipes during a design time and store the recipes to be subsequently used a
plurality of times by a process control system. A recipe typically includes a combination of unit procedures, operations, and phases, all of which include instructions to control process equipment (e.g., tanks, vats, mixers, boilers, evaporators, pumps,
valves, etc.) to transfer, mix, etc. ingredients in a process control system to generate a product.
In a typical scenario, a process control system executes the recipe from start to finish to produce a desired product. However, in some cases, a need arises to depart from the normal process flow of a recipe due to, for example, an error in an
ingredient, a need to refine a product, an external or environmental factor (e.g., temperature, humidity, etc.) that adversely affects certain operations, etc. Recipes are often intended to execute from start to finish without interruption or
modification of the recipe. Thus, there are currently no easy methods by which a recipe can be modified once its execution has begun. If an error has occurred in a process during execution of a recipe for whatever reason or if modification of the
recipe is desired after execution has begun, costly ingredients that have been partially processed may have to be scrapped to redesign the recipe during a design time and followed by a restart of the recipe. One traditional method of modifying a recipe
during its execution requires an experienced operator or group of operators working together to manually shutdown certain process steps of the recipe, remove or circumvent unwanted process steps from the recipe, and insert desired process steps while
ensuring that none of the modifications violate company standard process flow rules and/or industry standard process flow rules. Such a manual process is tedious, costly, and time consuming and prone to error because it requires significant expertise on
the part of operator(s) to ensure that product quality is not adversely affected and/or that safe operating conditions are maintained.
SUMMARY
Example apparatus and methods to modify a recipe process flow associated with a process control system during recipe execution are described. In accordance with one described example, a method involves executing a recipe, and before completion
of execution of the recipe, receiving process flow change information indicative of a modification to a process flow of the recipe. Process flow rules are then retrieved from a process flow rules data structure. The recipe process flow is modified
based on the process flow change information in response to determining that at least one requested change indicated by the process flow change information does not violate one of the process flow rules.
In accordance with another described example, an apparatus includes a user input interface to receive process flow change information indicative of a modification to a process flow of a recipe before completion of execution of the recipe. In
addition, the example apparatus includes a rules compliance verifier to determine whether at least one requested change indicated by the process flow change information violates at least one of a plurality of process flow rules in a process flow rules
data structure. The example apparatus also includes a process step activator to modify the recipe process flow based on the process flow change information in response to determining that at least one requested change indicated by the process flow
change information does not violate one of the process flow rules.
BRIEF DESCRIPTION OF THE DRAWINGS
FIG. 1 is a block diagram illustrating an example enterprise in which the example methods and apparatus described herein may be implemented.
FIG. 3 is a block diagram of an example apparatus that may be used to dynamically modify recipes during their execution.
FIGS. 4A and 4B depict a flow diagram of an example method that may be used to implement the example apparatus of FIG. 3 to modify a recipe during execution of the recipe.
FIG. 5 is a block diagram of an example processor system that may be used to implement the apparatus and methods described herein.
DETAILED DESCRIPTION
Although the following describes example methods and apparatus including, among other components, software and/or firmware executed on hardware, it should be noted that these examples are merely illustrative and should not be considered as
limiting. For example, it is contemplated that any or all of the hardware, software, and firmware components could be embodied exclusively in hardware, exclusively in software, or in any combination of hardware and software. Accordingly, while the
following describes example methods and apparatus, persons of ordinary skill in the art will readily appreciate that the examples provided are not the only way to implement such methods and apparatus.
The methods and apparatus described herein can be used to dynamically modify recipe process flows while the recipes are being executed by process control systems. While executing a recipe (e.g., a batch, a procedure, etc.) a problem or other
situation may arise that an operator may wish to correct by modifying the process flow of the currently active or running batch recipe. The identified problem or situation can be caused by factors external to the process control system (e.g., delivery
of the wrong ingredient), incorrect process settings, or merely by a desire to modify the composition of an end product. For example, while running a batch recipe, an operator may determine that one or more process steps in the batch recipe need to be
rerun to change the consistency of a mixture. In another example, one or more process steps may need to be skipped because the mixture is further along than usual.
Traditional methods of changing the process flow of a recipe while the recipe is being executed require an operator to put the active recipe into a manual execution mode, select an active step change (ASC) option, identify every process step in
the recipe that the operator wishes to remove from an active list, and identify all the process steps that the operator wishes to be active. During this entire process, the operator must recognize that removal of process steps and addition of other
process steps cannot violate any process flow rules. Process flow rules can be industry standards or manufacturer standards and are used to ensure safe operations and to promote high-quality process operations. An example standard that defines process
flow rules is the S-88 ANSI/ISA-S88.01-1995 Batch Standard. However, other standards for process flow rules may additionally or alternatively be used in connection with the example methods and apparatus described herein.
Using traditional techniques to perform an ASC is a very difficult and complex process that is prone to errors, which could result in costly mistakes (e.g., needing to discard large amounts of wasted product) and loss of time (e.g., the time
required to reconfigure a recipe and restart a process). Modifying a recipe during execution is often done at the risk of losing an entire product batch. In addition, modifying the active recipe could also lead to lost time by the operator or operators
trying repeatedly to correctly modify the recipe.
Unlike the traditional methods used to modify a recipe during execution that require significant user interaction and expertise, the example methods and apparatus described herein enable users to modify recipes during execution with
significantly less user interaction. In particular, the example methods and apparatus described herein provide an automatic ASC process that is cognizant of recipe process steps to be eliminated and added and the process flow rules with which such
process flow changes must comply. The process flow rules are arranged and stored in a database to be referenced by the automatic ASC process during a process flow change, thereby eliminating the need for a user to be aware of or remember and apply all
of the rules that may be pertinent to a particular recipe modification. In this manner, the methods and apparatus described herein can substantially reduce or eliminate costly mistakes and loss of time by end users of process control systems.
The example methods and apparatus described herein enable users to predefine any number of different process flow change configuration modules for which the users may foresee a need when running their recipes. For example, a user may know that
a product (e.g., paint) is prepared differently for different customers by varying the percentage of one or more ingredients. Instead of preparing numerous different recipes for respective customers or instead of performing the laborious and complex
process of manually modifying the process flow of a general paint recipe during execution for each customer, a user may instead use the general paint recipe and define different process flow change configuration modules, each corresponding to a
respective customer. In this manner, using the example methods and apparatus described herein to implement an ASC, the user may identify the process flow change configuration module to be implemented and select an ASC option to initiate the process flow
modification. The example methods and apparatus described herein can then modify the process flow of the recipe in an orderly manner to prevent damage to the product being prepared by controlling deactivation and activation of process steps and ensuring
that none of the changes violates process flow rules.
In another example, a user can identify different operations or phases in a process at which it may be desired to skip certain process steps. The user may predefine process flow configuration modules that deactivate process steps to advance a
product batch to process steps further along in the recipe.
In yet another example, a user may identify several risk mitigation points in a recipe at which it may be desirable to discard a product batch containing deficiencies or errors to prevent having to carryout the remainder of a recipe that would
only lead to wasting further ingredients added to the product batch that would eventually be discarded anyway.
Now turning to FIG. 1, an example enterprise 100 in which the example methods and apparatus described herein may be implemented includes a process control system 110 having an application station 102, an operator station 104, and a controller
106, all of which may be communicatively coupled via a bus or local area network (LAN) 108. The LAN 108 is commonly referred to as an application control network (ACN) and may be implemented using any desired wired or wireless communication medium and
protocol. Although one process control system is illustrated, the example enterprise 100 may include any number of distributed process control systems.
The application station 102 may be configured to perform operations associated with one or more software applications such as, for example, process control-related applications and communication applications that enable the application station
102, the operator station 104, and/or the controller 106 to communicate with other devices or systems. The application station 102 may also be configured to execute batch recipes to control the operations of the process control system 110 and/or any
other process control system needed to execute the batch recipes. For example, the application station 102 can be provided with a batch recipe processor or application (not shown) that can acquire any necessary controllers (e.g., the controller 106)
and/or any other resources (e.g., process equipment, field devices, instrumentation, etc.) to execute recipes. In addition, the application station 102 can perform operations associated with one or more application(s) used to implement the example
methods and apparatus described herein to modify a recipe process flow during execution. In some example implementations, the application station 102 and the operator station 104 may be configured to perform the same functions, while in other example
implementations the operator station 104 may be primarily configured to display process status and allow minimal, restricted user interaction with the process. The application station 102 and the operator station 104 may be implemented using one or more
workstations or any other suitable computer systems or processing systems (e.g., the processor system 510 of FIG. 5) including, for example, single processor personal computers, single or multi-processor workstations, etc.
The controller 106 may be coupled to a plurality of field devices 112 via a digital data bus 114 and an input/output (I/O) device 116. The field devices 112 may be Fieldbus compliant valves, actuators, sensors, etc. Of course, other types of
field devices and communication protocols (e.g., Profibus devices and protocol, HART devices and protocol, etc.) could be used instead. Additional I/O devices (similar or identical to the I/O device 116) may be coupled to the controller 106 to enable
additional groups of field devices, which may be Fieldbus devices, HART devices, etc., to communicate with the controller 106.
The controller 106 may be, for example, a DeltaV.TM. controller sold by Emerson Process Management. However, any other controller could be used instead. Further, while only one controller is shown in FIG. 1, additional controllers of any
desired type or combination of types could be coupled to the LAN 108. In any case, the controller 106 may perform one or more process control routines that have been generated by a system engineer or other system operator using the application station
102, the operator station 104, or any workstation and which have been downloaded to and instantiated in the controller 106.
The enterprise 100 also includes a workstation 118 that is communicatively coupled to the application station 102 via another LAN 124 and to the operator station 104 and the controller 106 via the application station 102. The workstation 118
may be configured to perform enterprise-level or plant-wide functions. The workstation 118 may be associated with another process control system network (not shown) and configured to perform primarily process control functions, one or more communication
functions, etc. In addition, the workstation 118 may be geographically remotely located, in which case the workstation may be communicatively coupled to the LAN 124 via a wide area network (WAN) that is implemented using, for example, a wireless
communication link, an Internet-based or other switched packet-based communication network, telephone lines (e.g., digital subscriber lines), or any combination thereof.
In the illustrated example, each of the field devices 112 is coupled to process equipment to control the flow of fluid or material to be processed. In particular, each of the field devices 112 is coupled to a respective valve to control flow
from a tank 122 to mixers 124a-c and from the mixers 124a-c to another process phase. The controller 106 is provided with a recipe or a portion of a recipe, which may be distributed among multiple controllers. A recipe can define a procedure to prepare
a particular product (e.g., a paint, a fuel, a pharmaceutical, etc.) and includes, one or more unit procedures, which include one or more operations, each of which includes one or more phases (i.e., process steps). In the illustrated example of FIG. 1,
a procedure can define multiple unit procedures to prepare a paint of a particular color. Each unit procedure can define a different mixing phase. For example, a first unit procedure can define a pre-mix procedure used to mix base ingredients (e.g.,
latex, oil, solvent, etc.), a second unit procedure may be used to mix intermediary ingredients (e.g., a binder, a surfactant, etc.), and another unit procedure may be used to mix colored pigments into the product.
Each unit procedure is implemented using one or more operations, each having one or more phases or process steps. A phase can correspond to particular process equipment (e.g., one of the mixers 124a-c). In the illustrated example of FIG. 1,
executing an operation may involve using an ingredient addition phase corresponding to the tank 122 and a mixing or agitation phase corresponding to the mixer 124a. The addition phase may involve adding an ingredient from the tank 122 to another
ingredient already in the mixer 124a and controlling the mixer 124a to mix the ingredients. After the mixer 124a is finished mixing the ingredients, the field devices 112d-e can be controlled to allow the mixed compound to flow from the mixer 124a to
another phase, which may be part of the same or another operation.
Traditionally, recipes are designed at a design time and executed at runtime without an opportunity to modify the recipe in an automated fashion to add, modify, and/or eliminate phases, operations, and/or unit procedures. The methods and
apparatus described herein enable operators or other users to modify the process flow of a recipe while the recipe is running without having to stop the recipe, discard the already mixed ingredients, modify the recipe in a design phase, and restart the
recipe. For example, an original recipe may include a pre-mix operation to mix an ingredient from the tank 122 with another ingredient in the mixer 124a and then dump or transfer the resulting mixture to another phase. If, during operation, an operator
or other user wishes to mix another component part in the mixer 124b, the operator or other user can use the methods and apparatus described herein to make the desired change while the recipe process is running and effectuate the change so that the
running process can perform the additional operation(s) without stopping and restarting the recipe execution from the beginning.
The example methods and apparatus allow substantially all of the recipe modification process to be transparent to the user such that the user need not be aware of special operating conditions or use configurations (e.g., safety rules, quality
control rules, etc.) that may prevent particular changes from being made. Instead, the example methods and apparatus enable a user to enter the desired modifications and select an active step change button on a user interface display to initiate an
automated recipe modification process that involves comparing the changes to rules to ensure that the requested modifications are valid and do not violate any process flow rules (e.g., the ANSI/ISA S88 Batch Standard rules). In addition, the example
methods and apparatus described herein can be used to ensure that the changes for a particular recipe do not interfere with or adversely impact other phases or operations.
The example enterprise 100 is provided to illustrate one type of system within which the example methods and apparatus described in greater detail below may be advantageously employed. However, the example methods and apparatus described herein
may, if desired, be advantageously employed in other systems of greater or less complexity than the example enterprise 100 shown in FIG. 1 and/or systems that are used in connection with process control activities, enterprise management activities,
communication activities, etc.
FIG. 2 is a graphical user interface (GUI) of an example procedural function chart (PFC) view interface 200. The example PFC view interface 200 can be displayed by one or more of the application station 102, the operator station 104, and/or the
workstation 118 of FIG. 1. The example PFC view interface 200 includes a procedural function chart (PFC) 202 of an example recipe 204. The PFC 202 depicts a recipe having process steps or phases 206a-j to be executed in accordance with a pre-configured
flow to implement a process. In the illustrated example, the predetermined flow of the recipe 204 involves executing the process step 206a followed by the process step 206b. After completion of the process step 206b, the process steps 206c-e execute in
parallel, and process step 206f executes after completion of the process steps 206c-e. After completion of the process step 206f, the process steps 206g and 206h execute in parallel, and the process step 206i executes after completion of the process
steps 206g and 206h. After completion of the process step 206i, the process step 206j is executed. Control then returns to the process step 206f after the process step 206j is complete, and the process step 206f is re-executed. The recipe 204 in the
illustrated example is implemented in accordance with process flow rules so that transitions between process steps do not violate any of the process flow rules (e.g., the ANSI/ISA S88 Batch Standard rules).
The example methods and apparatus described herein can be used to modify a process flow during runtime of a recipe so that process steps can be executed out of order relative to a normal or pre-configured flow of a recipe, process steps that are
not part of a pre-configured flow of a recipe can be made to execute as part of the recipe, and/or process steps of the pre-configured recipe can be eliminated. In the illustrated example of FIG. 2, the PFC view interface 200 is provided with a
one-click active step change (ASC) graphical button (or input control) 210 that can be selected by a user to modify the process flow of the recipe 204 during execution of the recipe 204. To modify the flow of the recipe 204, a user selects a process
step change configuration module (e.g., one or more target process steps) to be activated and then selects or clicks on the one-click ASC button 210. In the illustrated example, the process step change configuration module includes the target process
step 206i. The example methods and apparatus described herein automatically perform operations described below in response to selection of the one-click ASC button 210 to modify the process flow of the recipe 204 without requiring further interaction by
the user. In this manner, the amount of user interaction to perform an active step change to modify the flow of an executing recipe is kept to a substantially minimal amount, which in some cases may involve only selecting a process step change
configuration module and clicking on the one-click ASC button 210 and in other cases may involve only clicking on the one-click ASC button 210.
FIG. 3 is a block diagram of an example apparatus 300 that may be used to dynamically modify recipes during their execution. The example apparatus 300 includes a user input interface 302, a display interface 304, a process status identifier
306, an operating mode selector 308, a process step deactivator 310, a process step activator 312, a process step terminator 314, a process flow change configuration modules data structure 316 (e.g., a database), a rules compliance verifier 318, and a
process flow rules data structure 320 (e.g., a database), all of which may be communicatively coupled as shown or in any other suitable manner. The example apparatus 300 may be implemented using any desired combination of hardware, firmware, and/or
software. For example, one or more integrated circuits, discrete semiconductor components, or passive electronic components may be used. Additionally or alternatively, some or all of the blocks of the example apparatus 300, or parts thereof, may be
implemented using instructions, code, and/or other software and/or firmware, etc. stored on a machine accessible medium that, when executed by, for example, a processor system (e.g., the processor system 510 of FIG. 5) perform the operations represented
in the flow diagrams of FIGS. 4A and 4B. Although the example apparatus 300 is described as having one of each block described below, the example apparatus 300 may be provided with two or more of any block described below. In addition, some blocks may
be disabled, omitted, or combined with other blocks.
To receive inputs from a user, the example apparatus 300 is provided with the user input interface 302. The user input interface 302 may be implemented using a graphical user interface (GUI) and/or a mechanical (e.g., physical buttons)
interface. Referring to the illustrated example of FIG. 2, the user input interface 302 may be implemented using the PFC view interface 200 including the one-click ASC graphical button 210. To display information to a user, the example apparatus 300 is
provided with a display interface 304. The display interface 304 may be configured to display the PFC interface 200 and/or any other information related to modifying a recipe.
To identify the status of processes used to implement a recipe, the example apparatus is provided with the process status identifier 306. For example, the process status identifier 306 may be used to determine which process steps or phases are
being executed and whether process steps have completed execution. The process status information may be used to determine whether execution of a recipe is in a state that allows for safe removal of process steps and/or whether a wait period is required
to permit a recipe transition to a particular state in which the recipe can be modified safely without, for example, adversely impacting product quality.
To change the operating modes of a recipe, the example apparatus 300 is provided with the operating mode selector 308. For example, the operating mode selector 308 can be used to change the operating mode of a recipe from a normal execution
mode to a halt mode, thereby causing any subsequent process steps of a recipe not to be executed. Such a change in operating modes can be used to prepare an executing recipe for an active step change.
To deactivate process steps to prevent them from being executed, the example apparatus 300 is provided with the process step deactivator 310. The process step deactivator 310 can be configured to identify process steps that need to be
deactivated to implement a process flow change in accordance with a process flow change configuration module selected by a user. To activate process steps that a user desires to be executed but that would not otherwise be executed under a present recipe
configuration, the example apparatus 300 is provided with a process step activator 312. The process step activator 312 can be configured to identify process steps that are to be activated to implement a process flow change in accordance with a process
flow change configuration module selected by a user.
To terminate a process step to place a recipe in a state that allows the recipe to be modified, the example apparatus 300 is provided with the process step terminator 314. The process step terminator 314 can be configured to receive process
status information from the process status identifier 306 to determine whether process steps are still being executed. In addition, the process step terminator 314 can receive information from process flow change configuration modules selected by users
to determine which process steps can be prematurely terminated and which process steps must not be terminated prematurely. For example, during a design of a process flow change configuration module, a system engineer may identify that implementing a
particular process flow change will occur after execution of another process flow change. If the process step being executed at the time prior to performing a process flow change is one that should not be prematurely terminated (e.g., for safety or
product quality reasons), the system engineer can create a setting in the process flow change configuration module instructing that the process step terminator 314 should not prematurely terminate the executing process step and that the example apparatus
300 should instead wait to implement the requested process flow change until the process status identifier 306 determines that the executing process step has ended on its own. In some example implementations, the process step terminator 314 can
additionally or alternatively determine whether a process step can be prematurely terminated based on rules stored in the process flow rules database 320.
To store process flow change configuration modules indicative of process flow changes that can be selected by users, the example apparatus 300 is provided with the process flow change configuration modules data structure 316. To determine
whether requested process flow changes comply with process flow rules, the example apparatus 300 is provided with the rules compliance verifier 318 and the process flow rules database 320. The process flow rules database 320 is configured to store rules
with which process flows changes must comply to ensure safe operation and/or maintaining product quality. For example, the process flow rules may indicate that certain process steps must be executed in parallel or in seriatim. The process flow rules
may also indicate that certain process flow modifications cannot be implemented until other currently executing recipes are finished or release equipment (e.g., the tank 122, the mixers 124a-c of FIG. 1, etc.) necessary to execute the proposed modified
process flow. Other rules may also be used. The rules compliance verifier 316 is configured to verify that the process flow changes to be made based on a selected process flow change configuration module comply with the rules stored in the process flow
rules database 320. If any process flow change violates a rule, the display interface 304 can display an error message.
FIGS. 4A and 4B depict a flow diagram of an example method that may be used to implement the example apparatus 300 of FIG. 3 to modify a process flow of a recipe during execution of the recipe. In some example implementations, the example
method of FIGS. 4A and 4B may be implemented using machine readable instructions comprising a program for execution by a processor (e.g., the processor 512 shown in the example processor system 510 of FIG. 5). The program may be embodied in software
stored on a tangible medium such as a CD-ROM, a floppy disk, a hard drive, a digital versatile disk (DVD), or a memory associated with the processor 512 and/or embodied in firmware and/or dedicated hardware in a well-known manner. Further, although the
example program is described with reference to the flow diagram illustrated in FIGS. 4A and 4B, persons of ordinary skill in the art will readily appreciate that many other methods of implementing the example apparatus 300 may alternatively be used. For
example, the order of execution of the blocks may be changed, and/or some of the blocks described may be changed, eliminated, or combined.
The example method of FIG. 4 is described in connection with modifying the process flow of the example recipe 204 of FIG. 2. Initially, a batch processor (not shown) receives the recipe 204 (block 402) and acquires resources (e.g., the
controller 106, one or more tanks 122, one or more of the mixers 124a-c, one or more of the field devices 112a-e, etc.) required to execute the recipe 204 (block 404). In some example implementations, if the recipe 204 includes multiple unit procedures,
the batch processor can acquire resources for only the unit procedure that is about to execute. Upon completion of a unit procedure, the batch processor can release the acquired resources for that unit procedure and acquire other resources for a
subsequent unit procedure. The batch processor then executes the recipe 204 (block 406).
During execution of the recipe 204, the user input interface 302 (FIG. 3) determines whether it has received a user request to modify the process flow of the recipe 204 (block 408). In the illustrated example, the user input interface 302
receives a user request to modify the process flow (i.e., a process change request) when a user has selected a process flow change configuration module from the process flow change configuration modules database 316 (FIG. 3) and selects the one-click ASC
button 210 of FIG. 2.
When the user input interface 302 receives a user selection to modify the process flow (block 408), the operating mode selector 308 (FIG. 3) places the execution of the recipe 204 in a do-not-execute-next-step(s) mode (block 410). The
do-not-execute-next-step(s) mode prevents the batch processor from executing the process steps or phases that sequentially follow the currently executing process step(s) to enable the example apparatus 300 to modify the process flow of the recipe 204
after completion of the currently executing process step(s), but before another process step begins execution. Referring to the illustrated example of FIG. 2, the do-not-execute-next-step(s) mode prevents the process steps 206f from executing after the
process steps 206c-e finish executing.
The process step deactivator 310 (FIG. 3) then identifies (or selects) the currently active process step(s) to be deactivated (block 412) based on the process flow change configuration module provided by the user at block 408. In the
illustrated example of FIG. 2, the process steps 206c-e are the currently active step(s) to be deactivated because those steps were running when the batch processor received the user selection to modify the process flow at block 408. The process step
activator 312 then identifies one or more target process steps to be activated (block 414). In the illustrated example of FIG. 2, the process flow change configuration module indicates that the phase 206i is the target process step to be activated. The
rules compliance verifier 318 then determines whether the flow modification proposed in the process flow change configuration module violates any process flow rules (block 416) by, for example, comparing characteristics of the target step 206i and the
characteristics of the current active process steps (e.g., the process steps 206c-e) with process flow rules to ensure that the transition does not violate any of the process flow rules. If the rules compliance verifier 318 determines that the proposed
flow modification violates one or more process flow rules (block 416), the display interface 304 displays an error message (block 418) and control returns to block 408.
If the proposed flow modification does not violate any of the process flow rules (block 416), the process status identifier 306 (FIG. 3) determines whether the execution of the currently active process steps 206c-e is complete (block 420) (FIG.
4B). If the execution of the currently active process steps 206c-e is not complete (block 420), the process step terminator 314 (FIG. 3) determines whether it should terminate execution of the active process steps 206c-e (block 422). Some process steps
may be terminated prematurely without affecting the product being produced, while other process steps should not be terminated prematurely because doing so may have an adverse or unwanted effect on the product or may otherwise be undesirable. Rules
indicative of whether a process step can be terminated prematurely may be stored in the process flow change configuration module selected by the user. Additionally or alternatively, the process step terminator 314 can use the rules stored in the process
flow rules database 320 to determine whether a step can be terminated.
If the process step terminator 314 determines that it should not terminate the currently active process steps 206c-e (block 422), control returns to block 420 to wait until the active process step(s) 206c-e are complete. Otherwise, if the
process step terminator 314 determines that it can terminate the currently active process steps 206c-e (block 422), the process step terminator 314 terminates execution of the active process step(s) 206c-e (block 424). After terminating execution of the
active process step(s) 206c-e (block 424) or if the process step terminator 314 determines that execution of the active process steps 206c-e is complete (block 420), the process step deactivator 312 deactivates the completed active steps 206c-e and the
intervening steps 206f-h between the process steps 206c-e and the process step 206i (block 426). The process step activator 312 then activates the target process step 206i (block 428), and the operating mode selector 308 places the execution of the
recipe 204 in an execution mode (block 430). The batch processor then executes the user-selected target process step 206i (block 432). After executing the selected target step 206i (block 432) or if the user input interface 302 does not receive a user
selection to modify the process flow of the recipe 204 (block 408) (FIG. 4A), the process status identifier 306 determines whether the recipe 204 has completed execution (block 434). If the recipe execution has not completed, control returns to block
408 (FIG. 4A). Otherwise, the example process of FIGS. 4A and 4B is ended.
FIG. 5 is a block diagram of an example processor system 510 that may be used to implement the apparatus and methods described herein. As shown in FIG. 5, the processor system 510 includes a processor 512 that is coupled to an interconnection
bus 514. The processor 512 includes a register set or register space 516, which is depicted in FIG. 5 as being entirely on-chip, but which could alternatively be located entirely or partially off-chip and directly coupled to the processor 512 via
dedicated electrical connections and/or via the interconnection bus 514. The processor 512 may be any suitable processor, processing unit or microprocessor. Although not shown in FIG. 5, the system 510 may be a multi-processor system and, thus, may
include one or more additional processors that are identical or similar to the processor 512 and that are communicatively coupled to the interconnection bus 514.
The processor 512 of FIG. 5 is coupled to a chipset 518, which includes a memory controller 520 and a peripheral input/output (I/O) controller 522. As is well known, a chipset typically provides I/O and memory management functions as well as a
plurality of general purpose and/or special purpose registers, timers, etc. that are accessible or used by one or more processors coupled to the chipset 518. The memory controller 520 performs functions that enable the processor 512 (or processors if
there are multiple processors) to access a system memory 524 and a mass storage memory 525.
The peripheral I/O controller 522 performs functions that enable the processor 512 to communicate with peripheral input/output (I/O) devices 526 and 528 and a network interface 530 via a peripheral I/O bus 532. The I/O devices 526 and 528 may
be any desired type of I/O device such as, for example, a keyboard, a video display or monitor, a mouse, etc. The network interface 530 may be, for example, an Ethernet device, an asynchronous transfer mode (ATM) device, an 802.11 device, a DSL modem, a
cable modem, a cellular modem, etc. that enables the processor system 510 to communicate with another processor system.
While the memory controller 520 and the I/O controller 522 are depicted in FIG. 5 as separate functional blocks within the chipset 518, the functions performed by these blocks may be integrated within a single semiconductor circuit or may be
implemented using two or more separate integrated circuits.
Although certain methods, apparatus, and articles of manufacture have been described herein, the scope of coverage of this patent is not limited thereto. To the contrary, this patent covers all methods, apparatus, and articles of manufacture
fairly falling within the scope of the appended claims either literally or under the doctrine of equivalents. | 2024-02-11T01:27:17.568517 | https://example.com/article/1908 |
The Warrior Princess
Monday, September 19, 2016
Have you ever put on a piece of clothing and thought to yourself: I'm never taking this off? I mean I could wear this to work, the mall and the gym right? Okay maybe not the gym because my sweat would probably ruin it but I will be finding every excuse I can to wear this because I'm in love.
There is something to be said about the perfect maxi dress and I think I hit the lottery with this one. Comfort, quality and class can be found in this simple yet elegant piece. If you really want to kick up your look a notch, you can add statement jewelry, like this gold choker from Aldo. I feel like Xena, Warrior Princess and I'm ready to kick some butt.
Ps. If you do end up purchasing this dress, you will need to pin the slit or sew a little stitch unless you're okay with your hooha hanging out. To each their own!
You look even prettier than Xena as a warrior princess wearing that cameo colour strappy plunge dress from Lookbook Store! you are absolutely stunning in all of these photos!!! That Aldo choker really adds a lot to the look. With Halloween 2017 coming up, I was just thinking that you would look striking dressed as Wonder Woman as well! | 2023-09-28T01:27:17.568517 | https://example.com/article/1996 |
Vithukal
Vithukal is a 1971 Indian Malayalam film, directed and produced by P. Bhaskaran. The film stars Madhu, Sheela, Sukumari and Kaviyoor Ponnamma in the lead roles. The film had musical score by Pukazhenthi.
Cast
Madhu as Unnikrishnan
Sheela as Sarojini
Sukumari as Sarada
Kaviyoor Ponnamma as Ammini
Adoor Bhasi as Eravan Nair
Sankaradi as Achuthan Nair
Kannan
Adoor Bhavani as Amma
Baby Indira
Balakrishna Menon
K. P. Ummer as Chandran
N. Govindankutty as Raghavan
Nambiar
Raghava Menon
Vanchiyoor Radha as Madhavi
Renuka
P. R. Menon
Soundtrack
The music was composed by Pukazhenthi and the lyrics were written by P. Bhaskaran.
References
External links
Category:1971 films
Category:Indian films
Category:1970s Malayalam-language films | 2024-07-15T01:27:17.568517 | https://example.com/article/4565 |
import React from 'react';
import {shallow, mount} from 'enzyme';
import Announce from '../Announce';
describe('Announce', () => {
test('should have an announce method on the component', () => {
const subject = shallow(
<Announce />
);
const node = subject.instance();
const expected = 'function';
const actual = typeof node.announce;
expect(actual).toBe(expected);
});
test('should update the aria-label with the provided message', () => {
const message = 'message';
const subject = mount(
<Announce />
);
const node = subject.instance();
node.announce(message);
const expected = message;
// since we're manually updating the node in Announce, we have to manually check the node here
const actual = node.alert.getAttribute('aria-label');
expect(actual).toBe(expected);
});
});
| 2024-01-01T01:27:17.568517 | https://example.com/article/8808 |
by Hector Hugh Munro
Post navigation
FATE
Rex Dillot was nearly twenty-four, almost good-looking and quite penniless. His mother was supposed to make him some sort of an allowance out of what her creditors allowed her, and Rex occasionally strayed into the ranks of those who earn fitful salaries as secretaries or companions to people who are unable to cope unaided with their correspondence or their leisure. For a few months he had been assistant editor and business manager of a paper devoted to fancy mice, but the devotion had been all on one side, and the paper disappeared with a certain abruptness from club reading-rooms and other haunts where it had made a gratuitous appearance. Still, Rex lived with some air of comfort and well- being, as one can live if one is born with a genius for that sort of thing, and a kindly Providence usually arranged that his week-end invitations coincided with the dates on which his one white dinner- waistcoat was in a laundry-returned condition of dazzling cleanness. He played most games badly, and was shrewd enough to recognise the fact, but he had developed a marvellously accurate judgement in estimating the play and chances of other people, whether in a golf match, billiard handicap, or croquet tournament. By dint of parading his opinion of such and such a player’s superiority with a sufficient degree of youthful assertiveness he usually succeeded in provoking a wager at liberal odds, and he looked to his week-end winnings to carry him through the financial embarrassments of his mid-week existence. The trouble was, as he confided to Clovis Sangrail, that he never had enough available or even prospective cash at his command to enable him to fix the wager at a figure really worth winning.
“Some day,” he said, “I shall come across a really safe thing, a bet that simply can’t go astray, and then I shall put it up for all I’m worth, or rather for a good deal more than I’m worth if you sold me up to the last button.”
“It would be awkward if it didn’t happen to come off,” said Clovis.
“It would be more than awkward,” said Rex; “it would be a tragedy. All the same, it would be extremely amusing to bring it off. Fancy awaking in the morning with about three hundred pounds standing to one’s credit. I should go and clear out my hostess’s pigeon-loft before breakfast out of sheer good-temper.”
“Your hostess of the moment mightn’t have a pigeon-loft,” said Clovis.
“I always choose hostesses that have,” said Rex; “a pigeon-loft is indicative of a careless, extravagant, genial disposition, such as I like to see around me. People who strew corn broadcast for a lot of feathered inanities that just sit about cooing and giving each other the glad eye in a Louis Quatorze manner are pretty certain to do you well.”
“Young Strinnit is coming down this afternoon,” said Clovis reflectively; “I dare say you won’t find it difficult to get him to back himself at billiards. He plays a pretty useful game, but he’s not quite as good as he fancies he is.”
“I know one member of the party who can walk round him,” said Rex softly, an alert look coming into his eyes; “that cadaverous-looking Major who arrived last night. I’ve seen him play at St. Moritz. If I could get Strinnit to lay odds on himself against the Major the money would be safe in my pocket. This looks like the good thing I’ve been watching and praying for.”
“Don’t be rash,” counselled Clovis, “Strinnit may play up to his self-imagined form once in a blue moon.”
“I intend to be rash,” said Rex quietly, and the look on his face corroborated his words.
“Are you all going to flock to the billiard-room?” asked Teresa Thundleford, after dinner, with an air of some disapproval and a good deal of annoyance. “I can’t see what particular amusement you find in watching two men prodding little ivory balls about on a table.”
“Oh, well,” said her hostess, “it’s a way of passing the time, you know.”
“A very poor way, to my mind,” said Mrs. Thundleford; “now I was going to have shown all of you the photographs I took in Venice last summer.”
“You showed them to us last night,” said Mrs. Cuvering hastily.
“Those were the ones I took in Florence. These are quite a different lot.”
“Oh, well, some time to-morrow we can look at them. You can leave them down in the drawing-room, and then every one can have a look.”
“I should prefer to show them when you are all gathered together, as I have quite a lot of explanatory remarks to make, about Venetian art and architecture, on the same lines as my remarks last night on the Florentine galleries. Also, there are some verses of mine that I should like to read you, on the rebuilding of the Campanile. But, of course, if you all prefer to watch Major Latton and Mr. Strinnit knocking balls about on a table–”
“They are both supposed to be first-rate players,” said the hostess.
“I have yet to learn that my verses and my art causerie are of second-rate quality,” said Mrs. Thundleford with acerbity. “However, as you all seem bent on watching a silly game, there’s no more to be said. I shall go upstairs and finish some writing. Later on, perhaps, I will come down and join you.”
To one, at least, of the onlookers the game was anything but silly. It was absorbing, exciting, exasperating, nerve-stretching, and finally it grew to be tragic. The Major with the St. Moritz reputation was playing a long way below his form, young Strinnit was playing slightly above his, and had all the luck of the game as well. From the very start the balls seemed possessed by a demon of contrariness; they trundled about complacently for one player, they would go nowhere for the other.
“A hundred and seventy, seventy-four,” sang out the youth who was marking. In a game of two hundred and fifty up it was an enormous lead to hold. Clovis watched the flush of excitement die away from Dillot’s face, and a hard white look take its place.
“How much have you go on?” whispered Clovis. The other whispered the sum through dry, shaking lips. It was more than he or any one connected with him could pay; he had done what he had said he would do. He had been rash.
“Two hundred and six, ninety-eight.”
Rex heard a clock strike ten somewhere in the hall, then another somewhere else, and another, and another; the house seemed full of striking clocks. Then in the distance the stable clock chimed in. In another hour they would all be striking eleven, and he would be listening to them as a disgraced outcast, unable to pay, even in part, the wager he had challenged.
“Two hundred and eighteen, a hundred and three.” The game was as good as over. Rex was as good as done for. He longed desperately for the ceiling to fall in, for the house to catch fire, for anything to happen that would put an end to that horrible rolling to and fro of red and white ivory that was jostling him nearer and nearer to his doom.
“Two hundred and twenty-eight, a hundred and seven.”
Rex opened his cigarette-case; it was empty. That at least gave him a pretext to slip away from the room for the purpose of refilling it; he would spare himself the drawn-out torture of watching that hopeless game played out to the bitter end. He backed away from the circle of absorbed watchers and made his way up a short stairway to a long, silent corridor of bedrooms, each with a guests’ name written in a little square on the door. In the hush that reigned in this part of the house he could still hear the hateful click-click of the balls; if he waited for a few minutes longer he would hear the little outbreak of clapping and buzz of congratulation that would hail Strinnit’s victory. On the alert tension of his nerves there broke another sound, the aggressive, wrath-inducing breathing of one who sleeps in heavy after-dinner slumber. The sound came from a room just at his elbow; the card on the door bore the announcement “Mrs. Thundleford.” The door was just slightly ajar; Rex pushed it open an inch or two more and looked in. The august Teresa had fallen asleep over an illustrated guide to Florentine art-galleries; at her side, somewhat dangerously near the edge of the table, was a reading-lamp. If Fate had been decently kind to him, thought Rex, bitterly, that lamp would have been knocked over by the sleeper and would have given them something to think of besides billiard matches.
There are occasions when one must take one’s Fate in one’s hands. Rex took the lamp in his.
“Two hundred and thirty-seven, one hundred and fifteen.” Strinnit was at the table, and the balls lay in good position for him; he had a choice of two fairly easy shots, a choice which he was never to decide. A sudden hurricane of shrieks and a rush of stumbling feet sent every one flocking to the door. The Dillot boy crashed into the room, carrying in his arms the vociferous and somewhat dishevelled Teresa Thundleford; her clothing was certainly not a mass of flames, as the more excitable members of the party afterwards declared, but the edge of her skirt and part of the table-cover in which she had been hastily wrapped were alight in a flickering, half-hearted manner. Rex flung his struggling burden on the billiard table, and for one breathless minute the work of beating out the sparks with rugs and cushions and playing on them with soda-water syphons engrossed the energies of the entire company.
“It was lucky I was passing when it happened,” panted Rex; “some one had better see to the room, I think the carpet is alight.”
As a matter of fact the promptitude and energy of the rescuer had prevented any great damage being done, either to the victim or her surroundings. The billiard table had suffered most, and had to be laid up for repairs; perhaps it was not the best place to have chosen for the scene of salvage operations; but then, as Clovis remarked, when one is rushing about with a blazing woman in one’s arms one can’t stop to think out exactly where one is going to put her.
Post navigation
Your email address will not be published. Required fields are marked *
Comment
Name *
Email *
Website
Search for:
Hector Hugh Munro
These short stories constitute some of the best in the English language. They have quite a range in tone, from the extremely humorous Unrest Cure to the mystery of Sredni Vashtar. Written in an Edwardian prose that never disappoints, read it like it was one of life's little luxuries. | 2024-02-24T01:27:17.568517 | https://example.com/article/5113 |
Q:
How to return an error to ValidationSummry in MVC 3
I have an idea which I dont know how to implement.
In MVC 3 controller I have an if statement, and I want the controller to return an error message if the if statement fails. And I have a ValidationSummery on that page, so its better if it will catch the error message and present it..
How do I do this?
Thanks
A:
In the controller you can add an error message by
ModelState.AddModelError(string key, string errorMessage);
| 2024-06-02T01:27:17.568517 | https://example.com/article/4168 |
Timestamp feature
We can edit the posts up to 60 minutes. I am fine with that. But a timestamp feature would also be nice. It would show the last time the poster edited the post. So in livecalls we could easier check, if the poster is posting real data and not editing it later.
I used to post on another website and I really liked the timestamp feature. Several times I decided not to correct typos or grammar, because that would have altered the time and I wanted to make sure, everybody sees that I am not doctoring the data...
Look, I post I just went short of YMs. In 5 minutes the Dow rallies 30 points. Then I quickly go and edit in the original post that I went LONG. See? I immediatelly look genious....
More...
Hi Pekelo,
Easy solution...
You and those that your concerned about should post a screen image of the broker trade execution (end of day) after the live-call or use ET chat room where editing cannot occur.
My point...look at the Trader P/L thread...you don't see those traders worried about the same thing as you're concerned about.
Another possible solution...not verified...
You can subscribe to a particular thread here at ET and get an email whenever a new message is posted.
However, what I don't know is if it's just a notification or the actual content of the message.
Thus, if its the actual content that's sent in the notification...you can compare what you got in the email to the final edited version (if editing occurred) when you go to the actual thread itself to read the message. | 2024-04-03T01:27:17.568517 | https://example.com/article/5034 |
Introduction
============
Lung cancer is one of the leading causes of morbidity and mortality worldwide ([@b1-etm-06-02-0355]). Non-small cell lung cancer (NSCLC) accounts for \>80% of total lung cancer cases. NSCLC may be removed surgically if diagnosed in the early stages ([@b2-etm-06-02-0355]). However, the majority of patients are diagnosed at more advanced stages of the disease when surgery is no longer possible. Such patients are candidates for chemotherapy, which is associated with high toxicity and high cost, with limited efficacy.
Patients undergoing chemotherapy require monitoring to assess tumor progression. Various techniques, including computed tomography (CT) and positron-emission tomography (PET), alone and in combination with specific biomarkers are routinely used ([@b3-etm-06-02-0355]). Compared with other methods, tumor markers provide an economical and convenient method for detecting early tumor recurrence ([@b4-etm-06-02-0355],[@b5-etm-06-02-0355]). Several markers have been shown to be sensitive and effective in monitoring NSCLC ([@b5-etm-06-02-0355],[@b6-etm-06-02-0355]). However, due to their lack of specificity, the identification of new markers for NSCLC progression in patients undergoing different chemotherapy regimens is required.
Cytokeratin 19 (CK 19) is a constituent of the intermediate filament protein responsible for the structural integrity of epithelial cells. It has been used as a surrogate biomarker of circulating tumor cells of epithelial origin, including adenocarcinoma. A fragment of CK 19, CYFRA 21-1, has been proposed as a tumor marker for several malignancies, including NSCLC ([@b5-etm-06-02-0355],[@b7-etm-06-02-0355]).
Carcinoembryonic antigen (CEA) is a cell surface anchoring protein. It is a member of the immunoglobulin cell adhesion molecule (IgCAM) superfamily and participates in cell adhesion. High serum concentrations of CEA have been shown to be associated with advanced disease and tumor relapse in patients with NSCLC and other cancers ([@b8-etm-06-02-0355],[@b9-etm-06-02-0355]).
The neuroendocrine marker neuron-specific enolase (NSE) is a glycolytic enzyme associated with high diagnostic sensitivity and specificity in small cell lung cancer (SCLC); however, its use in monitoring the effect of chemotherapy in NSCLC is controversial ([@b10-etm-06-02-0355],[@b11-etm-06-02-0355]).
The aim of the present study was to evaluate the prognostic significance of serum tumor markers in predicting the response to different chemotherapy regimens in patients with NSCLC.
Patients and methods
====================
Patients
--------
Data from 276 patients diagnosed with NSCLC at the Department of Pulmonary and Critical Care Medicine, Beijing Shijitan Hospital, Capital Medical University (Beijing, China) between February 2009 and October 2012 were retrospectively reviewed. All patients had a recent histological diagnosis of NSCLC classified according to the World Health Organization criteria ([@b12-etm-06-02-0355]). None of the patients had received previous treatment for NSCLC and none had a history of other forms of malignancies. Clinical data were recorded, including age, gender, disease stage and Eastern Cooperative Oncologic Group (ECOG) performance status.
The majority of the patients (180 patients, 65.22%) received a four-cycle chemotherapy regimen or 4 months of treatment with an epidermal growth factor receptor (EGFR) tyrosine kinase inhibitor (TKI). A number of patients (63 patients, 22.83%) received no further treatment. However, 33 patients (11.96%), who were in disease progression, only received two cycles of chemotherapy or 2 months of treatment with an EGFR kinase inhibitor.
Chemotherapy included third-generation platinum-based regimens used in combination with gemcitabine, paclitaxel, docetaxel or pemetrexed. Response, based on CT scans performed every 2 months after treatment, was evaluated according to the Response Evaluation Criteria in Solid Tumors (RECIST) criteria ([@b13-etm-06-02-0355]). Outcomes were classified as complete response (CR), partial response (PR), progressive disease (PD) or no change (NC). Written informed content was obtained from the patients. The study was approved by the Ethics Committee of Beijing Shijitan Hospital, Capital Medical University.
Blood samples
-------------
Blood samples were collected within 14 days before surgery or chemotherapy and 3 weeks after completion of the second or fourth chemotherapy cycles. On the two occasions, CYFRA 21-1, CEA, NSE, CA 125 and CA 19-9 were measured by automated electrochemiluminescent assays (Roche Diagnostics GmbH, Mannheim, Germany).
Statistical analysis
--------------------
Statistical analysis was performed using SPSS version 16.0 (SPSS, Inc., Chicago, IL, USA). χ^2^ and logistic regression analyses were used to evaluate associations between tumor response and baseline clinical variables. Independent sample t-tests were used to analyze correlations between outcome and blood levels of CEA, CYFRA 21-1, CA 125, CA 19-9 and NSE. Numerical values for the tumor markers were transformed using natural logarithms to obtain near normal data distribution. Receiver operating characteristic (ROC) curves were created to evaluate the role of different tumor markers in predicting the response to chemotherapy. Cut-off values were determined by the Youden's index and the area under the curve was used as a measure of sensitivity. P\<0.05 was considered to indicate a statistically significant difference.
Results
=======
Decline in CYFRA 21-1 predicts response for different chemotherapy in NSCLC
---------------------------------------------------------------------------
The baseline characteristics of the patients included in the study are shown in [Table I](#t1-etm-06-02-0355){ref-type="table"}. The study included 172 males and 104 females with a median age of 63 years (range, 29--88 years). The majority of tumors were adenocarcinoma (70.7%); squamous cell carcinoma (SCC) accounted for 26.1% of tumors and other histological types for 3.2%. The majority of patients (51.8%) received surgery, with the exception of those diagnosed as clinical Stage IV.
The treatment response was CR in 64 patients, PR in 47 patients, NC in 69 patients and PD in 96 patients. Based on the different treatment options, patients were divided into five groups as follows: a surgery only group (25 SCC and 38 adenocarcinoma patients); a paclitaxel or docetaxel (TP) group (19 SCC and 54 adenocarcinoma patients); a gemcitabine (GP) group (24 SCC and 30 adenocarcinoma patients); a pemetrexed (PP) group (0 SCC and 47 adenocarcinoma patients) and a TKI group (0 SCC and 33 adenocarcinoma patients). Thirty-two samples (11.6%) were collected following the second cycle of treatment in cases where the patients were unable to tolerate further chemotherapy or their response was evaluated as PD.
Multivariate analysis revealed that performance status, age, postoperative stage and surgery were significantly correlated with the response to chemotherapy ([Table II](#t2-etm-06-02-0355){ref-type="table"}). However, there was no significant association between tumor response and gender, tumor type, chemotherapy regimen or baseline serum levels of tumor markers.
Patients were further divided into high and low tumor marker groups based on the pretreatment marker levels. The cut-off values that defined these groups are shown in [Table III](#t3-etm-06-02-0355){ref-type="table"}. Correlation analysis revealed that baseline CYFRA 21-1 (P= 0.047) and CA 19-9 (P\<0.001) were significantly correlated with effectiveness of chemotherapy ([Table III](#t3-etm-06-02-0355){ref-type="table"}). No similar associations were identified for CEA, CA 19-9 and NSE ([Table III](#t3-etm-06-02-0355){ref-type="table"}).
[Table IV](#t4-etm-06-02-0355){ref-type="table"} shows the correlations between changes in tumor markers following chemotherapy and the effectiveness of different chemotherapy regimens. Reductions in the serum levels of CYFRA 21-1, CEA, CA 19-9 and CA 125 were significantly associated with outcome in the surgery only group. Reduced serum levels of CEA, CYFRA 21-1 and CA 19-9 were significantly correlated with effectiveness of TP and PP chemotherapy. CYFRA 21-1 and NSE were significantly associated with responses to gemcitabine. Responses in the TKI group were associated with reductions in the serum levels of CEA, CYFRA 21-1 and CA 125.
The reductions of tumor markers in relation to the effectiveness of chemotherapy are shown in [Fig. 1](#f1-etm-06-02-0355){ref-type="fig"} and [Table V](#t5-etm-06-02-0355){ref-type="table"}. Among all relevant markers, CYFRA 21-1 yielded the most promising sensitivity at 90%. The corresponding area under the ROC curve was 0.779 (95% CI, 0.700--0.858; P\<0001).
Discussion
==========
Chemotherapy is one of the main methods of treatment for NSCLC. Efficacy is routinely evaluated on the basis of radiological findings; however, this is not conducive to the early detection of recurrence and metastasis. Consequently, there is growing demand for convenient tools for estimating prognosis and for detecting responsiveness to therapy in order to optimize disease management on an individual basis. Several tumor markers, including CEA and CYFRA 21-1 in NSCLC, have been previously shown to provide useful estimates of prognosis ([@b14-etm-06-02-0355]--[@b16-etm-06-02-0355]). However, their role in the evaluation of treatment effectiveness is controversial, partly due to the lack of comparative studies evaluating different chemotherapy regimens.
It is well recognized that baseline parameters, including histology, gender, World Health Organization performance status, number of positive lymph nodes, gross tumor volume and high levels of tumor markers are associated with poor chemotherapy efficacy and poor survival ([@b5-etm-06-02-0355],[@b6-etm-06-02-0355],[@b17-etm-06-02-0355]). In the present study we identified significant associations between performance status, age, postoperative stage and chemotherapy response; however, we did not identify similar associations for gender, tumor type, chemotherapy regimen or baseline tumor markers.
CYFRA 21-1 is a fragment of CK 19, mainly present in the cytoplasm of tumor cells of epithelial origin, including lung and esophageal cancer. Expression of CYFRA 21-1 has been detected in lung adenocarcinoma and SCC ([@b15-etm-06-02-0355]). CYFRA 21-1 has also been identified as a potential tumor marker for the diagnosis and prognosis of NSCLC. CYFRA 21-1 has previously been identified as a valuable marker for the individual management of patients with recurrent NSCLC receiving second-line chemotherapy ([@b18-etm-06-02-0355]). In the present study we demonstrated that high serum CYFRA 21-1 levels are indicative of chemotherapeutic effectiveness in NSCLC. This observation is consistent with a previous study reporting that baseline serum levels and changes in CYFRA 21-1 are reliable markers for chemotherapy response in NSCLC ([@b15-etm-06-02-0355]).
In the present study patients were analyzed in five groups according to the type of chemotherapy received. The majority of patients in the TP and GP groups had NSCLC, while all patients in the PP and TKI groups had adenocarcinoma. Comparison of the changes in serum tumor markers in the different groups revealed that reductions in CYFRA 21-1 were significantly associated with a positive response to chemotherapy in all groups. This finding may be related to the fact that CYFRA 21-1 expression is dependent on tumor stage as opposed to histological type ([@b7-etm-06-02-0355],[@b18-etm-06-02-0355]--[@b20-etm-06-02-0355]). Two previous studies ([@b21-etm-06-02-0355],[@b22-etm-06-02-0355]) demonstrated that CYFRA 21-1 is an independent prognostic factor in the earlier stages of SCC. However, data from another study ([@b5-etm-06-02-0355]) suggest that CYFRA 21-1 may be a reliable surrogate marker of chemotherapy efficacy in patients with advanced NSCLC.
CYFRA 21-1 is ubiquitously found in a number of body tissues and has been described as a marker of apoptotic cell death ([@b23-etm-06-02-0355]). This suggests that CYFRA 21-1 may be a tumor marker in SCLC as well as in NSCLC. One study demonstrated that high levels and insufficient reductions of CYFRA 21-1 during the first and second cycles of chemotherapy were correlated with poor outcome in 128 patients with newly diagnosed SCLC receiving first-line chemotherapy ([@b19-etm-06-02-0355]).
CEA is widely used as a tumor marker in lung, gastrointestinal and gynecological cancers, as well as other tumors. The majority of patients with NSCLC who have elevated CEA levels have adenocarcinoma ([@b23-etm-06-02-0355]--[@b26-etm-06-02-0355]). CEA is a member of the IgCAM superfamily and is involved in cell adhesion and transfer ([@b27-etm-06-02-0355],[@b28-etm-06-02-0355]). High serum levels of CEA have been shown to be a risk factor for the development of brain metastasis and are associated with poor prognosis ([@b9-etm-06-02-0355]). We identified no significant association between high baseline serum CEA levels and a poor response to chemotherapy. However, there was a significant association between decreased serum CEA levels and the effectiveness of chemotherapy in the groups where the majority of patients had adenocarcinoma. CEA may, therefore, represent a molecular target for lung adenocarcinoma. Similar results were observed for reductions in serum CA 125 and CA 19-9. All three markers are derived from glandular cells, which may make them suitable for monitoring the effectiveness of treatment in lung adenocarcinoma ([@b29-etm-06-02-0355]--[@b31-etm-06-02-0355]). However, these three markers are non-specific and it may be necessary to combine results for other biomarkers in order to increase sensitivity and specificity ([@b6-etm-06-02-0355],[@b32-etm-06-02-0355],[@b33-etm-06-02-0355]).
Changes in serum NSE predicted responses only in the GP group. This may be explained by the fact that the majority of patients receiving this form of chemotherapy had SCC. Previous studies have identified NSE as a sensitive tumor marker for SCLC ([@b10-etm-06-02-0355]), but not for NSCLC ([@b20-etm-06-02-0355],[@b34-etm-06-02-0355]). More recent results are contradictory. One study concluded that patients without elevated NSE mRNA had a better prognosis compared with patients who experienced an increase in NSE, while another study concluded that pretreatment NSE mRNA had potential as a prognostic biomarker for advanced NSCLC ([@b20-etm-06-02-0355],[@b35-etm-06-02-0355]).
Published evidence indicates that the most convincing data available among potential tumor markers for NSCLC, is that obtained with CYFRA 21-1 ([@b15-etm-06-02-0355],[@b18-etm-06-02-0355],[@b36-etm-06-02-0355],[@b37-etm-06-02-0355]). In the present study, CYFRA 21-1 yielded the most promising sensitivity (90%) and the largest area under the ROC curve, compared with the other tumor markers.
This retrospective investigation of prognostic tumor markers suggests that changes in serum levels of CYFRA 21-1 may be helpful in predicting the effectiveness of different chemotherapy regimens used to treat NSCLC. We also identified serum CEA, CA 125 and CA 19-9 as possible prognostic factors in lung adenocarcinoma.
{#f1-etm-06-02-0355}
######
Baseline characteristics.
Variable N (%)
--------------------------- ----- ------
Gender
Male 172 62.3
Female 104 37.7
ECOG PS score
≤1 233 84.4
\>1 43 15.6
Histological type
Squamous cell carcinoma 72 26.1
Other 204 73.9
Postoperative stage
I 34 12.6
II 44 15.9
IIIa 27 9.8
IIIb 28 10.1
IV 143 51.8
Surgery
Yes 143 51.8
No 133 48.2
First line treatment
NO 63 22.8
TP 73 26.4
GP 54 19.6
PP 47 17.0
TKI 33 12.0
Other 6 2.2
ECOG, Eastern Cooperative Oncology Group; PS, performance status; NO, surgery only; TP, paclitaxel or docetaxel; GP, gemcitabine; PP, pemetrexed; TKI, tyrosine kinase inhibitor.
######
Logistic regression analysis of the correlation between effectiveness of chemotherapy and clinical factors.
Variable Odds ratio 95% CI P-value
---------------------- ------------ -------- --------- -------------------------------------------------------
ECOG PS score 2.225 1.073 4.616 0.032[^a^](#tfn2-etm-06-02-0355){ref-type="table-fn"}
Age 1.053 1.009 1.099 0.018[^a^](#tfn2-etm-06-02-0355){ref-type="table-fn"}
Gender 0.759 0.353 1.631 0.480
Histological type 0.977 0.422 2.263 0.957
Stage 2.366 1.038 5.395 0.041[^a^](#tfn2-etm-06-02-0355){ref-type="table-fn"}
Surgery 3.441 1.431 8.273 0.006[^a^](#tfn2-etm-06-02-0355){ref-type="table-fn"}
Chemotherapy regimen 1.033 0.759 1.407 0.837
CEA 1.000 0.997 1.002 0.679
CYFRA 21-1 1.010 0.983 1.038 0.465
CA 125 0.999 0.997 1.002 0.327
P\<0.05. ECOG, Eastern Cooperative Oncology Group; PS, performance status; CEA, carcinoembryonic antigen; CYFRA 21-1, cytokeratin 19 fragment; CA 125; carbohydrate antigen 125.
######
Correlation between effectiveness of chemotherapy and baseline serum levels of tumor markers.
Variables N CR + PR NC + PD χ^2^ P-value
-------------------- ----- --------- --------- -------- ---------------------------------------------------------
CYFRA 21-1 (ng/ml)
\<3.3 98 53 45
≥3.3 130 50 80 3.935 0.047[^a^](#tfn3-etm-06-02-0355){ref-type="table-fn"}
CEA (ng/ml)
\<5.0 143 63 80
≥5.0 129 47 82 1.636 0.201
CA 125 (U/ml)
\<35 135 69 66
≥35 107 34 73 0.710 0.791
CA 19-9 (U/ml)
\<37 210 81 119
≥37 42 12 30 21.885 \<0.001[^a^](#tfn3-etm-06-02-0355){ref-type="table-fn"}
NSE (ng/ml)
\<17 145 70 75
≥17 68 25 43 2.482 0.115
P\<0.05. CYFRA 21-1, cytokeratin 19 fragment; CEA, carcinoembryonic antigen; CA, carbohydrate antigen; NSE, neuron-specific enolase; CR, complete response; PR, partial response; NC, no change; PD, progressive disease.
######
Correlation between responses of tumor markers and effectiveness of different chemotherapy regimens.
Regimen CR + PR NC + PD t-value P-value
-------------- --------- --------- --------- ---------------------------------------------------------
NO
CEA 25 36 3.953 \<0.001[^a^](#tfn4-etm-06-02-0355){ref-type="table-fn"}
CYFRA 21-1 17 29 2.838 0.007[^a^](#tfn4-etm-06-02-0355){ref-type="table-fn"}
CA 19-9 21 25 2.178 0.039[^a^](#tfn4-etm-06-02-0355){ref-type="table-fn"}
CA 125 21 30 2.361 0.025[^a^](#tfn4-etm-06-02-0355){ref-type="table-fn"}
NSE 19 22 1.303 0.200
TP
CEA 34 39 4.889 \<0.001[^a^](#tfn4-etm-06-02-0355){ref-type="table-fn"}
CYFRA 21-1 32 30 3.975 \<0.001[^a^](#tfn4-etm-06-02-0355){ref-type="table-fn"}
CA 19-9 24 26 2.290 0.026[^a^](#tfn4-etm-06-02-0355){ref-type="table-fn"}
CA 125 32 32 1.952 0.059
NSE 23 21 1.571 0.124
GP
CEA 25 27 1.912 0.062
CYFRA 21-1 22 20 2.419 0.020[^a^](#tfn4-etm-06-02-0355){ref-type="table-fn"}
CA 19-9 21 22 1.004 0.327
CA 125 22 25 0.968 0.338
NSE 20 18 3.003 0.004[^a^](#tfn4-etm-06-02-0355){ref-type="table-fn"}
PP
CEA 21 26 3.813 \<0.001[^a^](#tfn4-etm-06-02-0355){ref-type="table-fn"}
CYFR 21-1 20 17 2.715 0.010[^a^](#tfn4-etm-06-02-0355){ref-type="table-fn"}
CA 19-9 18 20 2.563 0.015[^a^](#tfn4-etm-06-02-0355){ref-type="table-fn"}
CA 125 10 19 1.201 0.238
NSE 16 12 1.286 0.224
TKI
CEA 5 22 4.696 \<0.001[^a^](#tfn4-etm-06-02-0355){ref-type="table-fn"}
CYFRA 21-1 6 21 4.219 \<0.001[^a^](#tfn4-etm-06-02-0355){ref-type="table-fn"}
CA 19-9 5 20 0.656 0.519
CA 125 5 19 2.424 0.024[^a^](#tfn4-etm-06-02-0355){ref-type="table-fn"}
NSE 6 16 1.492 0.151
P\<0.05. NO, surgery only; TP, paclitaxel or docetaxel; GP, gemcitabine; PP, pemetrexed; TKI, tyrosine kinase inhibitor; CEA, carcinoembryonic antigen; CYFRA 21-1, cytokeratin 19 fragment; CA, carbohydrate antigen; NSE, neuron-specific enolase; CR, complete response; PR, partial response; NC, no change; PD, progressive disease.
######
Prognostic profile of biomarkers for responses to chemotherapy.
Marker AUC Sensitivity (%) Specificity (%) 95% CI
------------ ------- ----------------- ----------------- -------- -------
CEA 0.738 81.4 55.6 0.654 0.822
CYFRA 21-1 0.779 90.0 60.3 0.700 0.858
CA 19-9 0.610 62.9 54.0 0.514 0.705
CA 125 0.628 90.0 30.2 0.533 0.722
NSE 0.747 70.0 74.6 0.663 0.831
AUC, area under the curve; CEA, carcinoembryonic antigen; CYFRA 21-1, cytokeratin 19 fragment; CA, carbohydrate antigen; NSE, neuron-specific enolase.
| 2024-03-14T01:27:17.568517 | https://example.com/article/1357 |
Learn From Vern: Vases
Vern Yip of Live in Vern's House shares his best tips with HGTV Magazine for picking the perfect container.
Pin
Like
Tweet
Google +
Email
Open Gallery
8 Photos
Perfect Choice Every Time
For a no-fail shape that makes any flower look good, try a trumpet vase. It flares out at the top, so stems always fall in a pretty cluster. Fiesta 9 3/4"H x 4"-diameter vitrified china vase in sunflower, $62, kohls.com
Quality Picks
A well-made vase should be at least 1/8-inch thick, and it should have some heft to it so it doesn’t topple over when you fill it with water and flowers. Bliss 3 1/2"W x 6"D x 7"H glass vase in peridot square, $36.50, chive.com
Varying Heights
Vase heights range from just a few inches to well over two feet. Any vase you use on a dining table should be no more than a foot tall so you can see the people sitting across from you. Free-Form Art 13 1/4"W x 7 3/4"D x 15"H glass vase, $60, pier1.com; Trough Matte Aqua 8 1/4"W x 3 3/4"D x 6 1/2"H stoneware vase, $13, cb2.com
Easy Arrangement
Not super confident arranging flowers? Put one or two standout blooms, such as lilies, in a vase with a small mouth for a dramatic look. Lola 10"H x 8"-diameter terra-cotta vase, $45, crateandbarrel.com
Let Blooms Have the Spotlight
If you usually buy brightly colored flowers, stick with a vase in a neutral material like wood, metal, or mercury glass, or try a solid, pale hue so the flowers can be the star. Steven Alan Striped 9 1/2"H x 3 1/2"-diameter earthenware and terra-cotta vase in yellow, $29, westelm.com
Go for Low Maintenance
Clear glass vases are classics, but they require work to look neat. You may need to strip the leaves off the stems, and you should change the water daily so it doesn’t get discolored. Opaque glass, metal, and ceramic are more forgiving. Iittala Colored Aalto 4 3/4"H x 6"-diameter glass vase in dark lilac, $140, macys.com | 2023-08-14T01:27:17.568517 | https://example.com/article/2089 |
Es por ti.
¡Por favor no!
Lan Anh, ¡Te amo!
Por favor no me hagas sufrir así.
Mamá! Mamá! Agarra el teléfono.
¿Por qué no tomas el elevador?
Está fuera de servicio.
¡Pobre de ti!
¿Estás cansada(o) después de subir todas esas escaleras?
Para nada.
Cuando vives aquí arriba, en el verano puedes disfrutar la brisa. Un poco de dolor no mata a nadie.
No hay tal cosa como vivir en “lo gordo de la tierra”.
¿Quién te dijo eso?
¡Mamá! Fue mi profesor, el Sr. Thu.
Para ti mamá.
¿De dónde vinieron esas flores silvestres?
Hay muchas de ellas en el patio detrás de mi escuela, el Sr. Thu y yo las agarramos juntos.
Las pondré dentro de un recipiente para decorar tu oficina, ¿ok?
Puedes usarlas para decorar tu cuarto de estudio.
¿Qué pasa con eso?
¿Por qué haría eso?
El Sr. Thu dijo que esas flores eran para ti, mamá.
No, Nada.
Eres tan complicada mamá. No pienses tanto las cosas, te hará envejecer más rápido.
Pero soy vieja de hecho.
De ningún modo. Aún estás joven. Muy joven.
Las personas siguen diciendo que somos hermanas.
Es tan gracioso.
El día que fuimos al parque,
y allí estaba este tipo que era sólo unos años mayor que yo, pero seguía coqueteando contigo.
Estaba tan entretenida.
¡Disparates! Eres la mejor distorsionando las cosas.
Te digo la verdad. Aún eres joven y hermosa. Si no me crees, mírame a los ojos.
Toda mamá es linda a los ojos de su hija.
¿Estoy en lo cierto?
No. En verdad eres hermosa.
El Sr. Thu dijo que soy igual de hermosa que tú. Cuando crezca, haré a otras personas sufrir.
¿Cuándo te dijo eso?
No recuerdo.
Me dijo que me parezco a m madre desde la forma en que camino hasta la forma en que hablo.
Deja de hablar.
Incluso tengo tus pómulos altos que se ven lindos. Y…
Deja de hablar.
Hola señor.
¿Está tu mamá en casa?
Sí. Por favor pase.
Hola señor.
¡Ngan! Tráele algo de beber.
Sí mamá.
Discúlpame; tengo que terminar mi trabajo.
¿Algo pasó entre ustedes dos?
No señor.
¿Entonces por qué…?
Mi mamá está realmente rara estos días.
Puede estar feliz y luego triste de repente. No entiendo qué pasa.
Especialmente desde que nos regresamos de Con Son. Puede enojarse sin mera razón.
¿Te dijo algo acerca de cuando regresó de Con Son?
Estabas en ese mismo viaje a Con Son, ¿cierto?
Um…
¿Estudiaremos?
Hablaremos acerca de la vida de Nguyen Trai y su carrera.
[Sermoneando ]
Profesor, ¿la Sra. Thi vino a con son con él o se quedó en la capital para enseñar a los hijos del rey?
En aquél entonces…
Discúlpame. Tengo que bajar las escaleras par cuidar de un amigo(a) enfermo (a). Por favor dile a mamá por mí.
¿Por qué estás llorando?
Señor…
Por favor no hagas esto.
¿Por qué me sigues llamando “señor”?
Soy el profesor de tu hija.
No el tuyo.
Te llamo así …
Porque…
Quiero que sepas.
Que ya soy madre.
Estoy vieja.
Y tú…
Y yo,
Te amo con todo mi corazón.
Pero has olvidado que
Tengo un hijo.
¿Y entonces qué?
¿Qué hay del futuro?
En el futuro, ella será nuestra hija. La amaré tanto como te amo a ti.
¿Alguna vez has pensado en por qué tengo una hija tan grande?
Te amo; claro que sé la razón.
Digamos, que eras una chica ingenua cuando tenías 15 años.
¿Entonces eso es lo que piensas?
Nunca has mencionado al padre de Ngan.
Y no hay razón para que lo menciones igual, puesto que quieres dejar el pasado atrás-
Intentaré ignorar tu entusiasmo, para que podamos vivir una vida feliz.
¿Eres realmente noble eh?
No es por mi nobleza. Es porque te amo.
No entiendes nada.
No me diste la oportunidad.
¿Oportunidad?
Nadie puede darte eso. Tienes que encontrarla tu mismo, querido señor.
¿Me puedo sentar contigo?
De hecho… todo lo que necesito es silencio.
Entiendo.
Por favor comparte tu dolor conmigo, quiero escuchar.
Sólo un poco estaría bien.
Por favor mantén la calma, no te lastimaré. Sólo quiero tu consejo.
Te he visto sentándote aquí sólo(a) muchas veces.
Igual de solo(a) que yo, supongo que debes tener compasión.
Realmente necesito tu consejo.
¿Puedo comenzar?
Acomódate.
Mi esposa me dejó hace seis meses.
Aún la amo mucho.
Aún la visito para ver si está feliz o no.
El otro día, lucía muy pálida.
Era un esqueleto ambulante.
Me siento muy mal por ella, duele.
Incluso hice un poema de eso.
Cuando se está enfermo de amor, cualquiera puede volverse un poeta.
Bueno, supongo.
[Leyendo poema]
¿Por qué no intentas leerle esto a ella?
Lo hice.
¿Lloró?
Cuando escuchó mi poema, me vio directamente a los ojos y dijo…
“¡Estúpido poema! ¡Eres un fenómeno!
Estoy teniendo un hijo.
Es por eso que luzco tan enfermo(a) estos días.
¡Quien necesita tu lástima igual!”
¿De verdad soy un fenómeno?
¿Por qué te ríes?
¿Entonces soy tal fenómeno?
¿No ves que me estoy riendo pero hay lágrimas en mis ojos?
Ma’am…
¿Es cierto que una mujer embarazada usualmente es bastante agresiva?
¡Oye! ¿Dónde está el poeta solitario?
¿Dónde estás poeta?
¿Por qué este restaurant está tan vacío?
¿Estás con una belleza eh?
Incluso te atreviste a llamar este restaurant “solitario”.
¿Cómo pudo llegar un hombre como tú a este lugar?
Me complace perdonar pero carezco de tristeza.
Necesito algo para mí.
Eres tan escandaloso(a).
Ve a disculparte con la belleza que necesita silencio por allá.
Cariño por favor perdóname.
¿Eres tú Lan Anh?
¿Me recuerdas? Soy Tuc. Tuc K10
Aún eres muy linda.
Hola.
Oh Dios, qué belleza.
El tiempo no te afecta para nada.
¿Entonces ustedes son conocidos chicos, eh?
No solo somos conocidos, solíamos ser amantes. ¿Cierto, Lan Anh?
Espera, no hagas eso. Déjame.
Adiós.
¡Lan Anh! ¡Lan Anh! ¡Lan Anh! Quédate un rato. Han pasado años desde la última vez que nos vimos.
Gracias pero estoy apurada.
Venir aquí significa que tienes tiempo libre.
¡Lan Anh! ¿Sabes cuánto significas para mí?
¡Tuc! Por favor no me molestes más.
Te adoro. Deseo morir por ti. ¿Llamas a eso molestar?
Sí, es bastante molesto.
No eres su tipo. No mal gastes tu tiempo con ella.
Me subestimas. Espera aquí, la traeré de vuelta.
¡Mamá!
¡Mamá! Despierta.
¡Mamá! ¿No tienes que entrenar?
Estar acostado(a) a tu lado se siente tan bien. Vendré a dormir contigo esta noche.
¡Disparates! Ya estás grande.
¡Mamá despierta! Vamos a jugar bádminton.
Pero estoy muy cansada.
¿Entonces por qué la gente dice que eres realmente atlética?
¿Cuándo?
Cuando aún estabas en la universidad.
El pasado, ¿eh? Parece que fue apenas ayer.
Se fuerte y protege nuestro país.
Se fuerte y protege nuestro país.
¡Lan Anh! No grites tan fuerte, o si no vas a pescar un resfriado.
¡Lan Anh! ¡Espérame! ¡Lan Anh!
¡Lan Anh! ¿Quieres un poco de limonada? La hice para ti.
Beber mientras corres no es bueno. Si tienes sed entonces bébelo. Gracias igual.
¿Por qué ella sigue diciendo “gracias”?
¡Frena!
¿Entonces? ¿No correrás más con ella? ¡Oye! Parece que te gusta mucho.
Si no me gustara estaría acostado en la cama justo ahora. ¿Por qué vendría aquí?
¿Cuánto llevas ligando con ella?
10 días más y serán 2 años completos.
De verdad te admiro.
Pero tienes que apurarte, o sino alguien más la tendrá.
Ya he bloqueado todas las direcciones. Nadie se le puede acercar.
Quiero comer también.
¿Por qué tienes que comer tanto?
¡Oye! ¿Por qué no estás estudiando?
¡Vete! No es tu problema.
¡Lan Anh! ¿Puedo pedirte prestado tu cuaderno para estudiar?
Es por esto que no deberías salir mucho. Espera a que Can venga a enseñarte.
¡Hola chicas!
Oh Dios, sólo lo mencioné y ya está aquí.
Aquí están sus regalos.
¡Ten! Uno más para ti. ¿Alguien quiere más?
Aquí están los tuyos.
¿Quién necesita esos? ¿A dónde fuiste toda la tarde?
Lo siento.
Vete.
¡Sal! No estoy bromeando.
¡Silencio! Tenemos que estudiar.
[Gritando.]
Que se jodan. Sólo ponte tus audífonos y estudia.
[Gritando]
Cálmate, vas a romper nuestras cosas.
[Gritando.]
Ups.
¿Qué fue eso?
¿Qué fue eso chicas?
Nada.
Me voy, ¿ok?
¡Adiós! ¡Adiós!
Me voy, ¿ok?
¡Adiós! ¡Adiós!
¿Qué estabas pensando?
¿Qué? No hicimos nada.
Lo vi todo, no intentes esconderlo de mi.
Oh Dios.
¡Hoa!
Para.
No te pongas al aire tan rápido.
Mañana cuando Tuc venga, les prestaré a ustedes dos esta cama.
¡Hoa!
¿Cómo pudiste?
Él viene a nuestro cuarto unas pocas veces por día.
Él y su botella de limonada te siguen cada mañana cuando vas a trotar.
Un hombre no puede servirte de gratis así.
Te da una cosa y se lleva otras cosas al mismo tiempo.
¡Hoa! ¿Cómo pudiste decirle eso a ella?
Lo siento. Por favor perdóname.
Si la vida me diera una relación apropiada entonces no sería tan cruel.
¡Oh Hoa!
Mi llegada a Hanoi es una carga para ti.
No vengo aquí por Quang.
Estoy aquí porque su papá sigue insistiendo en que deberíamos estar juntos.
Mañana me iré a casa.
Acabas de llegar, quédate un tiempo. Está un poco lleno, pero aún es bastante divertido.
Quang ya nos ha pedido cuidarte.
No tengas pena.
La fiesta de cumpleaños de Lan Anh será bastante divertida.
Gracias por ayudarnos.
Debo ser yo quien muestre aprecio.
¿A qué se debe eso?
Porque Lan Anh es mi novia.
No bromees así, las personas lo malinterpretarán.
La harás sufrir.
No bromeo. La amo.
¿Pero ella te corresponde?
Aún no. Pero algún día lo hará.
Dices que la amas, pero eres como un caracol arrastrándose a su alrededor.
¿Por qué no le pides salir? ¿O tienes miedo?
¿Tengo miedo?
¿Tienes miedo de ser asesinado por sus pómulos? ¡Eres un cobarde!
¿Dónde está tu novia Quang?
Está con Lan Anh.
¿Entonces cuando te casarás?
No… uhm…
Sólo somos amigos.
Tu autoestima es muy alta. ¿Tienes miedo de que tus amigos se burlarán porque tu chica es del campo?
[Gente hablando.]
Gracias por venir a mi fiesta de cumpleaños.
[Aplaudiendo.]
Amo la forma en que esas velas brillan.
Lan Anh, ¿puedo abrir esta botella de vino?
¡Adelante!
[Gente aplaudiendo]
Eres tan bueno ¡Tuc!
Dame esa copa.
Toma esto.
Discúlpame.
Lamento venir sin invitación.
Esto es para ti.
Felices 20.
Gracias Hung. ¿Por qué no vienes y te nos unes?
Ya soy un invitado sin invitación. No quiero molestarte más.
Estoy aquí para desearte un feliz cumpleaños. Espero que siempre sigas siendo bella e inteligente.
Gracias. Puedes unírtenos un rato.
Sólo vine a desearte un feliz cumpleaños. Ya me voy.
Ven un rato, ¿ok?
Definitivamente. Por favor, ve y únete a tus amigos.
De acuerdo entonces. Adiós.
Lan Anh. ¿Qué es él para ti?
Un amigo.
¿Amigos? Lo dudo.
[HOA] ¿Quién era ese?
[LAN ANH] Él es Son Hung de la Escuela de Drama. Es un amigo mío.
¿Por qué no le pediste que se nos uniera?
Tengo pena. A penas lo conozco.
Ven para acá, ¡Lan Anh!
¡Levanten sus copas!
[Aplaudiendo]
Enciendan la música.
Vy acaba de llegar. No la hagan molestar.
Después de que esta canción termine tienes que hacer que se nos una, ¿correcto?
¿A qué le temes?
Yo… Yo le temo a que no podamos lograrlo.
Soy el único hijo de mis padres.
Si no me amas más sólo dímelo. No pongas excusas.
Oh Dios. ¡Me asustaste!
Oh Dios.
La próxima vez usa las escaleras, recuerda ponerte un par de pantalones.
Oh.
La próxima vez lo recordaré. No verás nada desde abajo. Créeme.
Dame una mano.
Esto es tan genial. Es tan diferente de nuestro dormitorio.
¡Lan Anh! ¿No tienes miedo de la idea de yo viviendo contigo?
¿Miedo de qué?
Como la vez que llamé a mi novio a nuestros dormitorios.
Eres una chica atrevida. Cuando tengas que hacer eso, sólo dime.
Me iré de inmediato.
No necesito más eso.
¿Por qué?
Estoy muy enojada con él. Le dije que alquilara una casa en la calle pero siguió dudando.
Can es realmente inteligente y guapo, pero es muy pobre.
Es por eso que lo amo.
Si lo amas entonces no lo trates tan mal.
Si siguen viviendo así, pronto se enfermarán el uno del otro.
Si lo amo entonces me quedaré. Si estoy enferma de él entonces me iré. Esa es quién soy.
Oh Dios, nunca te entenderé.
Creo que si amas u odias a alguien, deberías decirlo en voz alta.
Me enferma la forma en que nosotras las chicas damos respuestas sin compromiso.
¿De quién hablas?
Sólo lo digo. Aquella que se excusa a sí misma, se acusa.
Seamos honestos(as). No tienes ningún sentimiento por el tipo que se arrastra afuera, ¿cierto?
Es correcto.
¿Entonces por qué lo mantienes cerca? Le pides hacer todo, como si fuese tu esclavo.
El viene por su cuenta.
“Él viene por su cuenta” ,¿eh?
Si no le dieras todas esas sonrisas y miradas coquetas, entonces el no vendría a ti como una polilla volando hacia el fuego.
Creo que la cosa que más odio de las chicas es la forma en que dan respuestas sin compromiso.
La cosa que más odio de los chicos es su estúpida imaginación.
¿Tú de nuevo?
¿Es cierto que Lan Anh recientemente se mudó?
¿Cómo supiste eso?
Lo saqué del dormitorio 306 de la casa B4 del dormitorio. ¿Estoy en el lugar correcto?
Sí. Por favor pasa.
Discúlpame.
Acabo de llegar aquí.
Esta casa está realmente desordenada.
Vine al dormitorio pero m dijeron que te habías mudado aquí.
Tu lugar es tan lindo.
Mis parientes trabajan en Rusia así que me pidieron cuidar la casa.
Esto es una pintura que he hecho para ti.
Gracias.
¡Es tan hermosa! Hoa, ¡Mira!
¡Oh vaya! ¡Es tan hermosa!
¡Eres tan afortunada Lan Anh! Tuc, ven a ver si se parece a ella o no.
Sí se parece a ella. Pero sus labios están muy rellenos.
Eres bastante listo. Es mi intención hacerlo así para hacerla ver mucho más de principios.
Mi novia está llena de principios. ¿Quién necesita que añadas más?
¿Cuándo le pediste modelar para la pintura?
Todo lo que necesito es mi recuerdo de ella.
Eso significa que ustedes dos se han estado viendo por un tiempo.
¿O has estado observándola silenciosamente por un largo tiempo? ¿Estoy en lo cierto?
¡Oh querido Tuc! No deberías hacerle eso a nuestro invitado.
Vamos a presentarnos. Este es Tuc, nuestro amigo. Este es Son Hung.
Soy Hoa, el/la compañero(a) de cuarto de Lan Anh.
Un placer conocerte. ¿Cómo puedo ayudar?
Por favor se nuestro(a) invitado(a). Ya casi termina igual.
¿O puedes ayudarme a encontrar un buen lugar para colgar esta pintura?
¿Qué tal aquí? Puedes verlo después de llegar a casa de clases.
¿Estás loco(a)? Ahí es donde va el altar.
Tus celos son suficientes. Se ve ridículo.
Esta no es tu casa.
Lo siento, me tengo que ir. La próxima vez, ¿ok?
Por favor perdóname.
Te veré de nuevo.
Adiós.
Hasta luego.
¡Tuc! ¿Por qué le hiciste eso a mi amigo(a)?
¡Eres tan descortés!
Esas palabras no significan nada para un tipo que le gusta coquetear con chicas como él.
Si sigue apareciendo, ¿quién sabe qué pasará?
Lo que te hace pensar que tienes el derecho a…
Es mi derecho a protegerte.
¡No tienes tal derecho!
A ti… te gusta ese bastardo, ¿cierto?
¡Vete!
¡Hoa! Soy tan miserable.
Pero creo que es el comienzo de un tiempo placentero.
Cuando una chica finalmente muestra su compromiso.
Cuando se corta la “cola” por una relación mejor y más seria. Allí es cuando la felicidad viene a ella.
¿Quién te enseñó eso?
Mi pasado me hizo comprenderlo.
Estás enamorado(a) de Son Hung, ¿verdad?
Pero no hay nada entre nosotros. Tung no me ha dicho nada aún.
Y yo no le he dicho nada tampoco.
¿Entonces crees que el amor sólo aparece luego de que un chico o chica dice “te amo”?
Ese tipo de amor sólo está disponible en la pantalla, no en la vida real.
Las señales del amor aparecen en tus ojos, en la forma que actúas con él.
Así es como son Lan Anh y Son Hung.
Mañana me tengo que ir por negocios.
¿A dónde vas?
Tengo que ir a la isla para terminar algo de trabajo.
Quiero ir también.
Ya estás grande. Escúchame. Si alguien pregunta por mí, diles que estoy en Lang Son, cerca de la frontera.
¿Por qué tienes que mentir?
Es por motivo de negocios.
¿Pero qué tal si el Sr. Thu me pregunta?
Dile exactamente lo mismo.
Pero no sé como mentir. No puedo hacerlo.
La vez que fui a Con Son, fuiste tú quien le dijo. ¿cierto?
Sí. ¿Pero qué pasa? ¿No estás bien con eso?
No, está bien.
¡Lan Anh! ¡Lan Anh!
¿Por qué estás aquí?
Te estoy buscando.
¿Cómo supiste que estaba aquí?
Mi corazón me lo dijo.
Ngan debe haberte dicho, ¿cierto?
No puede guardarte ningún secreto.
No la culpes.
Soy yo quien debería tomar la culpa. Quiero huir, pero le dije que guardara esto como un secreto.
Eso es como decirle que te diga para que me encuentres.
¿Por qué tienes que huir? ¿Por qué? ¡Lan Anh!
No por favor. El bote está llegando para llevarme a la isla Hon Khoai para trabajar.
¿Puedo ir contigo?
Me has seguido hasta aquí.
Eso significa que el destino ha decidido que no te puedo esconder nada de ahora en adelante.
Te contaré todo. Pero tienes que regresar tan pronto como lleguemos a Hon Khoai. ¿Puedes hacerlo?
Sí puedo. Me quedaré aquí esperando por ti.
Te esperaré hasta que regreses.
¡Oh Thu! Acepté el amor de Son Hung tan rápido que ni siquiera pude creerlo.
Hoa dijo que fue amor a primera vista.
Pero creo que la razón por la que caí por él tan rápido fue por el comportamiento de Tuc.
Estaba locamente enamorada de ese tipo artístico.
Sólo necesitaba unas pocas pinceladas para crear una pintura para mí.
Éramos tan felices juntos.
Esa mañana, la playa estaba muy vacía.
Hola.
¡Cariño! Nadie nunca me ha hecho esto.
Para. Espera hasta esta noche. Seré tuyo(a).
Por qué tengo que esperar cuando ya somos…
Hung, ¿estás despierto? ¡Levántate!
¿Qué te pasa?
En el pasado, cuando una mamá se casaba, su madre le daría una aguja.
De modo que si su marido fuese golpeado por el viento durante el sexo,
ella podría revivirlo poniéndola en su espina.
No, no era así.
¿Entonces qué demonios podría ser?
Es por mí. La vida es tan cruel.
Es mi destino. No puedo escapar de él.
Las cicadas aún cantan tan fuerte como recuerdo.
Han pasado 10 años, pero todo parece haber pasado ayer.
- [LAN ANH] Qué tal si
- [THUC] Deja de pensar en el pasado. Tienes que vivir el presente.
Prometí al hombre muerto que te cuidaría a ti y a Ngan.
No seas tan apresurado.
¿Qué quieres decir?
Ngan no es la hija de Hung.
¿Qué?
¿Entonces quién es su padre?
¿Has estado viendo a Tuc?
¿Crees que es la hija deTuc? Como no.
No es lo que quise decir.
Tenemos que decir adiós ahora. Hablaremos la próxima vez.
¡Oh Dios! ¡Eres un(a) infiel! ¡Eres un(a) traidor(a)! ¡Eres un(a) mentiroso(a)!
¿Estás viendo a alguien más de nuevo?
[Gritando y peleando]
Eres la esposa de Tuc después de todo. No actúes así.
¡Cállate!
Tengo que enseñarle una lección.
¡Tuc! ¿A quién estabas viendo en el cruce del Mercado Verde? ¡Dime!
Mong Dung, no fui a ningún lado. He estado sentada(o) con el poeta solitario, hablando de literatura y arte toda la mañana.
Te daré otra oportunidad.
Yo sólo… vine directo a casa desde allí. ¿Cierto?
¡No lo defiendas!
Está viejo ahora.
Eres como él.
Cuida tu boca. Llamaré a la policía si te sigues metiendo conmigo.
¡Qué vergüenza! ¿A quién conociste?
Ya te he dicho. Me vine directo a casa.
“Me vine directo a casa,” ¿eh? ¿Qué tan lejos?
4km.
4km, ¿eh?
¿Qué es esto? Has viajado un total de 25km. ¿Dónde has estado?
Sólo hice una parada para desayunar.
En la mañana, el odómetro estaba a 5204 km. Pero ahora está en 5229km. ¿Cuál es tu excusa ahora?
El odómetro está descompuesto. No le creas.
Eres vieja(o) pero estás mimando todo el tiempo.
Incluso limpiaste la motocicleta. ¿Para quién?
En tu cara.
Te enseñaré una lección.
¡Oh Dios mío!
¡Es de marca nueva! ¡Qué cara!
Mira mamá, nadie sabe que soy una niña.
Chica lista.
Tocaré la bocina.
Recuerda darle estas flores.
¿Por qué yo?
Eres tan problemática. Yo tocaré la bocina.
Hola mis invitados.
Puedo reconocerte por el sonido de la motocicleta.
Lo lamento mucho. Yo vivo sólo(a) así que tengo que preparar la comida en la cocina.
Sostén esto.
No, sostenlo tú.
Pasa.
¡Feliz cumpleaños!
¡Feliz cumpleaños!
Gracias. Pasa.
Chica traviesa.
Sube las escaleras.
De acuerdo.
Pasa, mamá.
Eres tan hermosa. ¿Cuándo tomaste esta fotografía?
¿Quién la tomó? O…
Por favor siéntate y espera sólo unos minutos. Traeré la comida.
Quizás la próxima vez.
Tengo que irme ya.
Pero sólo los/las invité a ustedes dos. Si se van entonces tendré que comer solo(a).
¡ Quédate mamá! Quiero comer con él.
No puedes hacerle eso en su cumpleaños. ¡Le traerá mala suerte!
Todo lo que haces es oponerte a mí.
¿Puedo pedirte prestada tu llave? Casi olvido su regalo de cumpleaños.
Ten cuidado, ¿ok?
No te preocupes mamá.
Sé rápida. Te esperaré.
Regresaré enseguida.
¡Lan Anh! Por favor perdóname.
El día que te conocí en la isla,
Era muy torpe.
Te hice enojar y te tuviste que ir.
Soy una mujer extraña.
No le cuentes al resto de la gente acerca de mi vida privada.
Pero si alguien me malinterpreta, me pondré furiosa sin razón aparente.
Sólo una persona que realmente me ame puede…
En el primer aniversario de la muerte de Hung…
Traje algo de fruta aquí para honrarlo.
Aquí hay algo de sopa de pollo. Es buena para ti. Estás realmente pálido(a) y flaco(a).
No he muerto todavía.
Por favor no bromees en un momento tan sagrado.
Entonces no vengas durante estos días. Sabes cuánto lo amo.
Pero yo te amo lo mismo.
He estado amándote y esperándote por 2 años.
¿Sabes cuánto sufrí cuando te fuiste de vacaciones con Son Hung?
¡Lan Anh! Quiero decirte cuanto te amo.
Levántate, Tuc.
No, no me levantaré. A menos que me permitas contarte mis sentimientos.
¿Qué puedes decirme ahora¡
Por favor déjame arrodillarme ante el espíritu de Hung. Luego te diré.
El espíritu de Hung puede presenciar mis palabras.
Pero quiero decir en voz alta los sentimientos que nunca he tenido las agallas de contarte.
La muerte de Hung me ha liberado.
La gente dice que las mujeres con pómulos altos son como asesinas de hombres.
Pero ahora que Hung está muerto en lugar de yo, finalmente puedo amarte y darte toda mi vida.
Estoy realmente agradecido. ¡Lan Anh! ¡Te amo! ¡Te amo!
¿Qué tipo de amor tiene que ser tan cobarde y calculado?
No es así. Te amo y también estoy muy agradecido de que Hung salvara mi vida.
¡Vete! No quiero ver tu cara nunca más. ¡Vete!
Lan Anh…
¡Vete!
¡Oh Hung!
¿Moriste por mis pómulos altos?
¿Lo hiciste?
Esa es la historia.
Thu es el único que escuchó la historia completa.
Desde ese día, ¿Tuc ha tenido suficiente coraje de verte de nuevo?
Olvídalo. Nunca menciones su nombre de nuevo.
¿Dónde está Ngan? Se ha ido por un tiempo.
¡Chico listo! Haces una pregunta por la que no me puedo molestar, a diferencia de la última vez.
Bueno, de ahora en adelante no tengo nada que esonderte.
No di a luz a Ngan.
Una vez, cuando estaba en la frontera investigando, la encontré.
Sólo tenía 2 o 3 años. Estaba muy delgada y sucia.
No tenía ningún recuerdo de sus padres.
Decidí contarle todo cuando cumplió 15
Le dije, que en el futuro, si era capaz de encontrar a su familia, entonces podría irse a vivir con ellos.
Me abrazó y me dijo entre lágrimas:
“Eres mi madre de nacimiento.”
¡Mamá! ¡El Sr. Thu!
¿Qué te tomó tanto? Déjame ayudarte.
Es tu regalo de cumpleaños.
¿Qué?
¿Por qué compraste estos pies para celebrar su cumpleaños?
Por favor deséale un feliz cumpleaños por mí. Mamá.
¡Feliz cumpleaños!
¡Feliz cumpleaños! Y felicidades por tu recién encontrada felicidad también.
[Parlante]
¿Cómo podemos disfrutar un viaje sin ti Ngan? Eres una buena hija.
Luego de visitar Lao Cai y Sa Pa, incluso vamos a visitar China también. ¿Alguna queja?
Por supuesto que me quejo de no ir con ustedes chicos. Pero sólo hay dos personas en mi familia.
Tengo que quedarme a cuidar de mi mamá.
Tu mamá aún está joven. Necesita a un hombre que la cuide.
¡Diviértanse! Ya me voy.
¿Por qué actúa como si fuéramos a un campo de batalla?
Súbete. Puedes llamar a tu mamá después.
De ninguna forma, debo ir a casa.
Por favor discúlpame. Adiós Thu.
¡Hola mamá!
¡Hola!
Te he traído algo de protector solar, y un sombrero también. Pruébatelo.
Gracias.
¿El Sr. Thu te llamó?
Nos pidió ir de vacaciones a Nha Trang con él.
¡Me encanta!
Pero lo rechacé.
¿Qué? ¿Por qué? Eres tan problemática. Mi vieja dama, por favor encuentra un esposo.
Soy una señora ya. Si me caso la gente se reirá de mí.
Lo siento mamá. Sólo bromeaba.
Estaba bromeando también. Pasa, te lavaré tu cabello y luego cenaremos.
Oh y recuerda, si el Sr. Thu te pregunta, no digas que vamos a la playa también.
De acuerdo. Eres tan impredecible.
Por favor guarda estos tickets como un recuerdo de mí.
¿Ya llegamos? Vamos.
¡Mamá!
¿Qué pasa?
Me dijiste que iríamos a Nha Trang con el Sr. Thu.
Ven.
¡Mamá!
¡Todos! Este es Hon Trong (la roca masculina) y Hon Mai (la roca femenina) – las famosas atracciones turísticas de Sam Son.
Si vienen a Sam Son, no pueden ignorarlas.
Son rocas, pero aún así tienen sus propias personalidades.
¿Pueden verlo?
Si tocas a Hon Mai, temblará como una chica.
Por favor continúe.
¿Chicas, quieren tomarse una fotografía con Hon Trong y Hon Mai?
¿”Chicas”?
Somos madre e hija.
¿De verdad?
¿Por qué mentiría?
No seas tan descarada.
Verás, incluso el fotógrafo te confundió con mi hermana. Estoy enojada también peor también muy emocionada.
¿Por qué?
Porque significa que sigues siendo joven.
Ve y descansa un poco. Iré a comprarlas.
No estoy cansada. Puedo hacerlo yo misma.
Recuerda, estás embarazada.
La cosa acerca del mundo espiritual es que tienes que hacerlo todo tú para mostrar aprecio.
Sostén mi bolsa.
Tomaré 5 por favor.
Una es suficiente.
Este Dios es realmente piadoso. No necesita mucho.
He cometido muchos errores. Tengo que ir a cada puerta para pedirle a los dioses que me cuiden.
Acomódate.
Queridos dioses del cielo.
Hola.
Hola. ¿Has venido aquí para inclinarte ante los dioses también?
No, estoy aquí sólo por una persona. ¿Puedes adivinar quién es?
Es ella, ¿verdad?
Es correcto. Ves, tenía razón.
Las mujeres embarazadas son muy agresivas. Pero finalmente ha vuelto a mi.
Ya no es el “Restaurant solitario” de ahora en adelante.
Felicidades.
Gracias. Estamos muy felices juntos.
Algunas personas dicen que me encargo del hijo de otro hombre. Pero no me importa.
Cuando estás enamorado, esa persona es lo que más importa.
Sí, no soy el padre de nacimiento de este bebé. Pero si este niño nace en mi casa, él o ella es mi hijo(a) también.
Discúlpame.
¿A dónde fuiste? Te he estado buscando.
¡Ngan! ¡Ven aquí!
¿No estás cansado(a)?
De ninguna forma. Ayer, cuando regresamos del templo, tuve un sueño.
¿Qué tipo de sueño?
Soñé que el Sr. Thu se nos unía auqí.
¡Disparates!
Te digo la verdad.
Incluso nos llevó a comer cangrejos en la playa.
Deja de fanfarronear. Ve a bañarte de modo que podamos comer algo.
Ve primero. Regresaré después para comprar una revista de adolescentes.
¿Regresa ok? Te esperaré.
Sí mamá.
Sí, soy yo. Ven rápido, ¿de acuerdo? Te recogeré en la estación.
¡Lan Anh! ¡Lan Anh! ¿Eres tú? ¡Lan Anh!
Soy yo. Soy Vy. ¿Me reconoces?
¡Oh Vy! Te ves más joven y lindo(a) que antes. A penas te reconozco.
Aún luces igual. Te puedo reconocer sólo por una mirada. Ven aquí.
Es mi tienda. Te daré algo de jugo de coco. Los cocos de mi jardín son realmente dulces.
¿Viniste solo(a)?
¿Dónde está él? ¿Dónde están tus niños? ¿Por qué no los trajiste contigo?
No hay ningún “él” en mi vida.
Eres tan difícil.
La gente dice que tengo un topo que puede matar hombres.
Pero aquí estoy, felizmente casada y una madre para mis hijos.
Si un chica con pómulos altos como tu vive en el campo, entonces es realmente difícil para ella conseguir marido.
Pero vives en la ciudad donde hay muchos hombres intentando ligar contigo. Pero no les correspondes.
La gente en el campo es realmente anticuada. ¿Cómo puedes soportarlos?
Lucho con ellos también. Ahora que lo pienso, estoy horrorizada.
Han pasado 10 años.
¡Para el coche! ¡Para el coche!
Salte del coche.
¡Agarren sus cosas gente!
¿Estás cansado(a) Quang?
Sí.
Entonces déjame ayudarte con esas bolsas.
Está bien.
Vy, no quiero que vayas a casa más.
¿Entonces a dónde quieres ir?
Tu madre está terriblemente enferma. Tu padre me pidió venir a Hanoi para buscarte.
¡Oh dios! ¿Por qué no se lo pidió a alguien más?
Me lo pidió porque sé dónde vives.
A pesar de eso, todos piensan que soy la futura nuera de tu familia.
Mi suegra está enferma, ¿cómo no podría ir?
¡Oh dios!
¿Sabes que él sólo quiere que regrese para que me pueda casar contigo antes de la muerte de mi madre?
Vamos a casarnos igual. Si lo hacemos ahora, tus padres estarán felices.
¡Oh dios!
¿Qué pasa? Sólo dime, saldré con una solución.
¿ De verdad?
Por supuesto.
Lo juro. Mientras seas feliz, puedo hacer lo que sea.
Las pajeras necesitan estar enamoradas mutuamente, pero no tengo ningún sentimiento…
Deja de hablar.
Lo entiendo ahora.
Te he amado con todo mi corazón. Pero si no sientes lo mismo, entonces te dejaré ir.
Eres un buen tipo. Gracias por decirme la verdad, igual.
Realmente estoy agradecida(o) de que me entiendas.
Por favor ve a casa y dile eso a mi padre.
¿Entonces a dónde vas?
Me esconderé en algún lugar en la aldea.
Si mi madre muere, iré de inmediato.
Si voy a casa ahora, mi padre me forzará a casarme contigo. No puedo desobedecerlo.
Todo depende de ti. Tu padre no puede decidir eso.
No sabes nada de él. Me voy ya.
Vy… por favor ayúdame.
¡Quang! ¡Quang!
¡Quang! ¿Puedes escucharme?
¡Quang! ¡Quang! ¿Qué te pasa?
¿Por qué eres tan frío?
¡Por favor despierta! ¡Quang! ¡No me asustes!
¡Quang! ¡Despierta! ¡Quang!
¡Oh Dios!
Tu hijo está enfermo. Tu esposa también está enferma. ¿Cómo puedes permanecer tan calmado?
¡Oh Dios! Aún es joven. Se mejorará pronto. No hay nada de qué preocuparse.
Por favor ayúdame. Tengo que darle una boda.
¿Tienes alguna idea?
Por la forma en que se ve Vy, creo que ella sólo traerá mala suerte a tu familia.
Una mujer con un topo como esa es muy desafortunada.
La suerte es algo que debes ganarte tu mismo.
Un topo no le hará ningún daño a su familia política.
Bueno, velo tu mismo. Quang apenas llegó a ella se enfermó inmediatamente.
Aún está bien. Dile a Vy que traiga algo de jengibre y vino para hacerle gua-sha.
Sólo una mujer puede curarlo.
¿Es esto una broma para ti?
Cariño, ¡para! Date la vuelta; te haré gua-sha en tu pecho.
Cierra la puerta, o de lo contrario el viento me golpeará de nuevo.
¿Ayer te acostaste en el piso frío del templo y ahora le tienes miedo al viento?
Te odio.
Pero creo que eres realmente hermosa(o). Me gustas.
Te digo la verdad.
¡Disparates!
Te digo la verdad. Eres realmente hermosa.
Sólo tú piensas así. La gente dice otra cosa.
Que se jodan.
Acuéstate conmigo como hiciste ayer.
Eres tan asqueroso(a).
Si Quang está bien entonces ven aquí a cuidar a tu madre.
Pasa.
Ma’am, tu futura nuera está aquí.
¡Mamá! Soy yo, Vy. ¡Mamá! Despieta.
¡Oh Dios! ¡Ma’am! ¡Ma’am! ¿Qué te pasa?
¡Ma’am por favor despirta! ¡Despierta!
No fue así.
Afortunadamente, luego de ese día, mi suegra se mejoró.
¡Qué suerte!
¿Qué hay de Quang? ¿Cómo está?
Es realmente gracioso. Ya tenemos hijos pero aún me ama cómo cuando éramos jóvenes.
Porque él te ama Vy.
¿Es cierto?
¡Mamá! ¡Mamá!
Te he estado buscando por todos lados.
¿Es él?
Ahí estás. Te ha estado esperando.
Este es Vy. Ella es mi amiga. Y ese es Thu.
Hola.
Hola Vy.
Hola Sra. Vy.
Ya has crecido. ¿Cuándo te casaste? No sabíamos nada.
| 2024-07-05T01:27:17.568517 | https://example.com/article/1427 |
import numpy as np
import torch
def ReplaceDenormals(net):
for name, param in net.named_parameters():
np_arr = param.data.numpy()
for x in np.nditer(np_arr, op_flags=['readwrite']):
if abs(x) < 1e-30:
x[...] = 1e-30
param.data = torch.from_numpy(np_arr)
| 2023-10-31T01:27:17.568517 | https://example.com/article/6177 |
Q:
What are the applications of primitive recursive functions?
So I was studying primitive recursive functions and I thought what could be their possible. Is the property of not having infinite loops used somewhere? Because since they do not represent the set of all computable problems,what is their use exactly?
A:
The thing that is actually important is being a total computable function, which is to say that there is an algorithm that can compute any value of the function in finite time.
The primitive recursive function are an important, but proper, subset of the total computable functions. Some reasons for this include:
It is relatively easy to convince oneself that every primitive recursive function is total computable, even if you're being skeptical about high-powered proof methods that may be needed to prove other algorithms total (such as inifinitary set theory).
It is easy to prove things about the primitive recursive functions, because their definition gives rise to a structural induction principle.
Most functions that we need to consider in computability theory, proof theory, etc. are in fact primitive recursive, which means that we don't need to go beyond primitive recursion and look for proof techniques that work for more general total computable functions.
| 2023-10-07T01:27:17.568517 | https://example.com/article/8574 |
Luis Arellano
Luis Eduardo Arellano Moreno (born January 4, 1989 in Caracas), is a Venezuelan professional footballer who plays for Spanish club Real Jaén as a goalkeeper.
References
External links
Category:1989 births
Category:Living people
Category:Sportspeople from Caracas
Category:Venezuelan footballers
Category:Association football goalkeepers
Category:Segunda División B players
Category:Tercera División players
Category:CD Tenerife B players
Category:CD Tenerife players
Category:Atlético Albacete players
Category:Albacete Balompié players
Category:CD Mensajero players
Category:CF Badalona players
Category:Real Jaén footballers
Category:Atlético Astorga FC players
Category:La Roda CF players | 2023-10-15T01:27:17.568517 | https://example.com/article/2474 |
WASHINGTON – Why didn't the media go after President Obama for collusion with Russia?
Was it simply because he wasn't President Trump?
To be clear, ace investigative reporter Sharyl Attkisson does not believe the sometimes cozy contacts between the Obama administration and Moscow amounted to collusion, but, she observed, "under the definition currently used by Trump critics, it would be."
In other words, if the media had applied the same standards to Obama that it is applying to Trump, they should have gone after the former president for collusion with Russia. Probably Iran, too.
TRENDING: 3 ways Red China is helping elect Joe Biden
The 5-time Emmy award winning reporter and host of the Sunday show "Full Measure with Sharyl Attkisson" spelled out her reasoning in a series of incisive insights she shared with WND.
Like the reporting you see here? Sign up for free news alerts from WND.com, America's independent news network.
In her estimation, how much of the media hysteria has been fueled by those whose primary goal is to get Trump out of the White House?
"The media hysteria is clear," she mused, "when one plays what I call the 'substitution game' and considers how the same 'news' is treated if the parties are switched."
The latest hysteria is over an allegation that Trump adviser (and son-in-law) Jared Kushner attempted to establish a back-channel line of communication between the Russian government and Trump’s transition team.
In its analysis, the Associated Press noted, "Back-channel talks have been common in U.S. diplomacy, especially when Washington lacks formal ties with another government it wants to speak with."
As an example, it cited how the Obama administration "approved months of secret meetings between U.S. and Iranian officials to clinch an interim 2013 nuclear deal."
So, how does the alleged collusion between the Trump administration compare to Obama's use of back-channels with Iran, before he was elected?
First of all, Attkisson observed, "Frankly, I haven’t heard anyone even play out what the supposed collusion was."
"For example," she wondered, "do they allege that Trump secretly met with (Russian President Vladimir) Putin and told him that if Putin hacked into the DNC (Democratic National Committee) computers and released any damaging emails to WikiLeaks, that he (Trump) would lift sanctions against Russia if he got elected?"
Bottom line?
"It’s hard to know what the supposed collusion would amount to."
"On the other hand," she stated, "We know factually that the Obama administration had secret dealings outside of the public and Congress with the world’s largest state sponsor of terrorism, Iran."
"And that, as part of the deal, the Obama administration unilaterally decided to return a great deal of money, in cash, to Iran in amounts that were misrepresented to the public."
Attkisson also noted that, in fact, reporters have no way to verify or know for sure what exactly transpired.
She segued to the current scenario by first observing, "I would also say that I disagree that all contacts with Russia are inherently suspicious, but if they are when Trump-related officials make them, then one has to consider that the Obama administration state department under John Kerry had a record number of contacts with his Russian counterpart in the first months of the election year 2016."
She rattled off other examples of Obama's close contacts with Russia:
"President Obama once sent a message to Putin that he (Obama) would have 'more flexibility' on certain issues after his re-election (would conspirators say that was a proposal to collude in an election?);
"The Obama administration had longstanding discussions with Russia on possible joint military operations in Syria;
"And Obama secretary of state Hillary Clinton wanted to reach out to Russia and 'reset' relations, among other connections."
That's when Attkisson observed, "Again, I don’t think any of this amounts to collusion between the Obama administration and Russia, but under the definition currently used by Trump critics, it would be."
How would she respond to those who say that Obama's back-channeling with Iran was different than what Trump is accused of doing with Russia because Iran wasn't trying to interfere with our elections?
Injecting a big-picture perspective, Attkisson said, "I think it could be argued that Iran is a more serious threat to the U.S. because it’s the world’s largest state sponsor of terrorism."
"And through our nuclear deal we quite literally provided them with enormous sums that can be directly spent to further terrorist acts against us and our allies."
She soberly added, "Although Russia is a serious concern, Iran has indicated it would like the U.S. and Israel wiped off the face of the planet."
Had she seen hard evidence of collusion or improper ties between the Trump administration or campaign team and Russia?
"No," was the simple answer.
She added, "Nobody has, to my knowledge."
Attkisson is hardly alone in that assessment.
As WND has reported repeatedly, top Democrats have all admitted investigators have not found any evidence of any collusion between Russia and the Trump campaign or administration.
Sen. Dianne Feinstein, D-Calif., who serves on the Senate Judiciary and Intelligence committees, twice said she had seen no such evidence. Other Democrats on the Senate Intelligence Committee have said they don’t expect to find any evidence of collusion.
Fierce Trump critic Rep. Adam Schiff, D-Calif, the ranking member of the House Intelligence Committee, has had to admit there is no evidence of collusion between the Trump campaign and Russia.
Obama’s own former top spies, CIA chief John Brennan, director of national intelligence James Clapper, as well as former acting CIA Director Michael Morell, have all said they have seen no evidence of collusion between the Trump team and the Russian government.
On Tuesday, Clapper reiterated that point, telling CNN, "As I’ve said before, I’ve testified to this effect, I saw no direct evidence of political collusion between the campaign, the Trump campaign and the Russians."
He also said he saw nothing to indicate that the content of conversations between Russian officials and the Trump team were anything but routine and appropriate.
So why do the media and Trump critics keep insisting there was collusion?
It seems to come from the mistaken belief, repeated endlessly by the media as gospel, that all 17 intelligence agencies had come to the conclusion, in a report ordered by Obama, that Russia interfered with the election.
The mistaken belief is so prevalent, even among powerful elected officials, that one prominent senator, and one of Trump's biggest critics, was surprised to be publicly corrected by Clapper when he tried to assert it as an indisputable fact during a hearing.
This is the exchange during a Senate Judiciary subcommittee hearing on May 8, in which Sen. Al Franken, D-Minn., learned the truth about that report.
Franken: And I want to thank General Clapper and – and Attorney General Yates for – for appearing today. We have – the intelligence communities have concluded, all 17 of them, that Russia interfered with this election. And we all know how that’s right. Clapper: Senator, as I pointed out in my statement Senator Franken, it was there were only three agencies that directly involved in this assessment plus my office… Franken: But all 17 signed on to that? Clapper: Well, we didn’t go through that – that process, this was a special situation because of the time limits and my – what I knew to be to who could really contribute to this and the sensitivity of the situation, we decided it was a constant judgment to restrict it to those three. I’m not aware of anyone who dissented or – or disagreed when it came out.
But, despite what Clapper asserted, it wasn't even a finding of those three agencies, the CIA, FBI and NSA.
It was a conclusion made by an irregular and hand-picked panel of what were called experts, who actually may have been, according to a former CIA officer, highly politicized.
Fred Fleitz served in U.S. national security positions for 25 years at the CIA, DIA, Department of State and the House Intelligence Committee staff.
As someone intimately familiar with the inner workings of the intelligence community, Fleitz penned an article for Fox News on May 12, that spelled out what really happened.
He had written previously that when the U.S. Intelligence Community issued an 'Intelligence Community Assessment' (ICA) on January 6, 2017, that found Russia deliberately interfered in the 2016 presidential election to benefit Trump’s candidacy, he "was suspicious because it reached unusually clear judgments on a politically explosive issue with no dissenting views."
Fleitz was then surprised to hear Clapper explain in his testimony that two dozen or so "seasoned experts" were "handpicked" from the contributing agencies and drafted the ICA “under the aegis of his former office” (the Office of the Director of National Intelligence.)
Wrote Fleitz, "This process drastically differed from the Intelligence Community’s normal procedures."
Describing just how unusual that was, he said, "Hand-picking a handful of analysts from just three intelligence agencies to write such a controversial assessment went against standing rules to vet such analyses throughout the Intelligence Community within its existing structure."
Furthermore, "The idea of using hand-picked intelligence analysts selected through some unknown process to write an assessment on such a politically sensitive topic carries a strong stench of politicization."
Fleitz also noted that former FBI Director James Comey had testified that the report's conclusion of Russian interference was based on logic, not evidence.
"So we now know," surmised the former CIA officer, "this was a subjective judgment made by a hand-picked group of intelligence analysts."
"One has to ask how these hand-picked analysts were picked. Who picked them? Who was excluded?"
Fleitz called it a major problem that "the process gave John Brennan, CIA’s hyper-partisan former director, enormous influence over the drafting of the ICA."
"Given Brennan’s scathing criticism of Mr. Trump before and after the election, he should have had no role whatsoever in the drafting of this assessment. Instead, Brennan probably selected the CIA analysts who worked on the ICA and reviewed and approved their conclusions."
In other words, it seems Fleitz thought it not impossible that Brennan rigged the report to arrive at the conclusion he wanted.
Which makes Brennan's testimony before the House Intelligence Committee on May 24, all the more relevant, because even though he testified he saw no evidence of collusion, the former CIA director admitted it was he who set in motion the FBI's investigation into whether the Trump team colluded with the Russians.
As WND reported, Brennan testified that although he saw no collusion, he saw some "contacts" between Trump associates and Russians.
And he was worried that might lead to collusion.
"I had unresolved questions in my mind as to whether or not the Russians had been successful in getting U.S. persons, involved in the campaign or not, to work on their behalf, again, either in a witting or unwitting fashion.”
Former federal prosecutor Andrew McCarthy wrote, “That’s a weasel’s way of saying he’s got nothing.”
Nonetheless, Brennan asserted, “And so, therefore, I felt as though the FBI investigation was certainly well-founded and needed to look into those issues.”
Now McCarthy thinks it's the spies who need investigating.
He is calling for the appointment of a special counsel to investigate political spying, including unmasking and leaks to the media by the Obama administration.
McCarthy detailed his proposal in National Review on May 24:
"First, the Justice Department should appoint a special counsel to investigate the potential abuse of government surveillance powers for the purposes of political spying and leaks to the media. The investigation should scrutinize all unmasking of Americans to determine whether it conformed to court-ordered restrictions. The president should immediately announce that he is ordering U.S. intelligence agencies to cooperate fully. He should add that he is willing to declassify forthwith relevant reports and the identities of officials involved in the unmasking of Americans – with the caveat that important intelligence secrets will be safeguarded. It should be made clear that any official who had access to classified information that was leaked to the media should expect to be summoned for grand-jury testimony about his or her handling of it."
And, Fleitz wants Congress to investigate the spies. He wrote:
"The unusual way that the January 6, 2017 Intelligence Community Assessment was drafted raises major questions as to whether it was rigged by the Obama administration to produce conclusions that would discredit the election outcome and Mr. Trump’s presidency. The House and Senate Intelligence Committees therefore should add investigations of whether this ICA was politicized to their investigations of Russian interference in the 2016 presidential election."
Someone else agrees.
On Friday, Trump tweeted: "The big story is the 'unmasking and surveillance' of people that took place during the Obama Administration."
Get the hottest, most important news stories on the Internet – delivered FREE to your inbox as soon as they break! Take just 30 seconds and sign up for WND's Email News Alerts! | 2024-05-22T01:27:17.568517 | https://example.com/article/3055 |
The new fee will be $39.50 a ton, up from the current level of $32. It’s the first increase since 1992, OConnell said in an email.
The increase is no surprise; OConnell has been warning for years that the cost to dump trash in Rhode Island would need to rise as the landfill fills up. The hike was approved a year after officials began burying trash in the last empty section of the landfill, which is expected to be used up by 2038.
“Significant upfront capital investment is now required to build the cell infrastructure over the next few years and that is what has triggered this first increase in 25 years,” OConnell said.
The increased cost for an average-sized municipality will be $55,000 in the 2017-18 budget year, he said, adding that communities can also consider other options to reduce costs, such as pay-as-you-throw rules or eliminating the contamination of recycled waste.
According to the agency, the new fee will still be below the actual cost of trash disposal, which OConnell pegged at $54 a ton. The agency’s fee for businesses is $65 a ton, which effectively subsidizes the municipal fee.
“It is also well below the market rate in Connecticut and Massachusetts which is between $65 and $80 per ton,” OConnell said. | 2023-09-25T01:27:17.568517 | https://example.com/article/1835 |
Search Results for : "jaco beach"
This two bedroom condo in Corteza Del Sol is an oasis in Jaco Beach. Located just on the outskirts of downtown, this peaceful and serene community offers tranquility yet is within close striking distance to all the amenities of town. Community and Condo Highlights: Two bedrooms, 1 bathroom 726 square feet Fully furnished and turn key Stainless steel appliances Granite counter tops Low HOA …
Jaco Beach 3 bedroom tiny condo one block from the beach.This condo has a great location right in downtown Jaco and steps to the beach, It has nice common areas and clubhouse and it is well maintained , Condo fees are low , only $ 130 per month. It has 24 / 7 security. The condo is located in the quietes area , it …
Affordable Jaco Beach Residential Property is located steps away for the town center and Pacific Ocean in the gated community Sol Dorado. The 3 bedroom, 2 bath home had been recently upgraded with new windows, the addition of the second bathroom (with extra separate septic tank), gutters and roof (2years old), smoothed walls, repainted, new pvc ceiling, upgraded ceilings fans, brand new a/c in …
Location and Low Fees = The Best Vacation Property! This condominium is located in the south area of Jaco. This beachfront condo comes completely furnished with security throughout. This quiet, very peaceful condominium development features 24 hour security, private parking, gym, cable tv, WiFi, Olympic size pool. Stroll 30 seconds down the beach in either direction for surf rental, lessons, breathtaking sunsets. This beach …
This beautiful house is located in the middle of Jaco Beach. 1.15 hour from the International Airport. The house has 3 bedrooms on the second floor. The master suite has a walk in closet and full bathroom. There are two other bedrooms that share a bathroom. The ground floor has living room, dinning room, kitchen and half bathroom. There is a small pool and …
The twin houses are two completely identical houses with a unique colonial style, with private pool each, green area, each house has 3 bedrooms, 1 bathroom, located just 2 minutes from the center of jaco in a very exclusive area, 1 hour from the principal airport of Costa Rica juan Santa Maria.
Jaco beach magnifies commercial property,this property is located in the center of jaco, in the street the central that is the most popular street in town, is just a 1 minute to the supermarket and main restaurants, just 30 meters from the sea, this property has, 1 restaurant, 1 bar, 1 disco, 1 house, 3 apartments, more than $8.000 thousand dollars a month with …
Jaco beach great commercial opportunity just 100 meters from the ocean and in the most traveled street of jaco beach, this attractive property has 600 cubic meters of construction, a restaurant and 10 commercial premises that grant monthly 18 thousand dollars of profit, located in the center of jaco and 1 hour from the main airport of costa rica
Business opportunity,restaurant in jaco beach costa rica, with more than 3 thousand square feet of construction and 4 thousand square meters of property, a unique opportunity to develop or siemplemente as incredible investment, this property is located on the south east side of jaco, surrounded by new projects and hotels, just 1 hour from the airport juan santa maria
This downtown Jaco Beach property is prime for development. Located in the heart of town, this property measures 31,047 square feet (2,885.37 square meters) and is just steps to the ocean behind the Cocal Casino. The Sellers of this property have blueprints for a 14 floor hi-rise building that was designed with 20 condominiums and 125 hotel rooms. Property Features • FULLY TITLED • …
Jaco Beach Tiny house is a one bedroom one bath with jacuzzi and a second little bedroom at a mezzanine. The location is great, in downtown and one block from the beach. This is also a great rental income property if you are looking for an investment option. The condominium has nice common areas and HOA fees are low, It has been renew recently …
Jacó is a town on the Pacific coast of Costa Rica, southwest of the capital city, San José. It’s known for its surf beaches and nightlife, and as a gateway to national parks. Rocky, gray-sand Jacó Beach is west of town. Southeast, Hermosa Beach has big waves. To the north, Carara National Park has crocodiles at Tárcoles River and scarlet macaws. A path through …
This beautiful “tico” style house is located in a calm, safe neighborhood. Close to downtown and yet far enough to feel relaxed in your private home. Two bedrooms, one bathroom. All construction is concrete. Big beautiful yard. Walking distance to the new open air shopping center Jacó Walk! Jacó Beach is a beautiful, energetic beach town well known for it´s friendly locals and amazing …
Jaco large House gated community private pool and ranch just 5 minutes from the beach. This House was built 2007 and is in perfect shape. It has a private yard and several parking spaces. Living space is very spacious and facing the pool area ns ranch. The master bedroom has a pool view and a large bedroom with jacuzzi and high end finishings and …
Location! This condominium is located in the south area of Jaco. This beachfront condo comes completely furnished with security throughout. Unit is nicely furnished, all you have to do is unpack your suitcase and slip into your bathing suit! Master bedroom has a nice king size bed. This quiet, very peaceful condominium development features 24 hour security, private parking, gym, cable tv, WiFi, Olympic …
5 acre mountain view property only 40 minutes from Jaco Beach. This is a nice property if someone is looking for land and a place to buld or fix up the existing house there. It is a older little country house with one bath room , 2 bedroom and a living space. not furnished. It has two public road access and a little creek …
Overview of the 6 Most Popular Central Pacific Communities Communities Near Jaco Beach Costa Rica We are often ask about where to live and what are the different amenities of Jaco Beach Costa Rica and the neighboring communities. Therefore; we want to present a brief overview of each of them. Jaco Beach The coastal city of Jaco Beach is located on the Pacific Region …
Modern boutique hotel for sale walking distance to the most famous beach in Costa Rica. Excellent income, offers 8 standard rooms and 2 rooms with kitchenette. All rooms with A/C, tv, wi fi, hot water and private bathroom. A beautiful top terrace plus a spacious deck by the pool with BBQ offer a great relaxing and social area. Located on one of the most …
Costa Rica Jaco Beach Condos For Sale What are my options when looking for Jaco Beach Condos for Sale in Costa Rica? Fortunately the answer to that question is that you have many places to choose from when in comes to Jaco Beach Condos for Sale in Costa Rica. There is something for every taste, every budget and every lifestyle. We wanted to compile a …
Jaco Beach first floor large studio apartment one block from the beach. This condo is fully furnished and in very goos shape, It is also a very good rental income option. Ii si located at first floor close to the common areas. It is a small condominium project , very quiet and easy to manage. On site property manager is available. Downtown Jaco is …
Jaco Beach large river lot by the shore. This is a unique and excellent opportunity to get in to the newest developing area in Jaco Beach, For years this was a not easy accessible area in the north end of Jaco. Now are new infrastructure coming in to develop a large portion of the northern farming land and this gives a great access to …
Jaco beach downtown Hotel for Sale . Wit excellent income, 10 rooms in different sizes with Bath and some with kitchenette plus an extra administrator apartment. It hace large pool , all rooms facing the common areas. Steps from Downtown and 2 clocks to the beach.This is an excellent option and easy to run with minimum employees. Jaco beach is a fast growing little …
Paradise Condo M19 in Jaco Beach features 1 spacious bedroom, 1 bathroom along with kitchen, living area and laundry closet. The residence is being offered furnished including a new washer/dryer and is ready to move in or to rent. The Paradise Condos are conveniently located on the main strip in Jaco meaning that you can walk to all the amenities that Jaco has to …
Large prime location building just 30 meters away from the beach in the center of the popular city of Jaco. The property measures 281 square meters and the location could not be better. This property is currently an apartment building with 8 apartments that rent for $600 each for a monthly income adding to $4800 per month. Prime Location Building for Sale in Downtown …
This grand view property offers an unique opportunity to finish your dream home with your taste in mind without having to wait long for the final result to be enjoyed. This listing consist on two hectares with four thousand five hundred meters of incredible view land. The property has a large home that is already 70% completed. Firesale Grand View Property with Financing Available …
This Incredible firesale Comercial property has a record of producing around $95,000 per year. This listing is on the market for just $800,000. The return on investments makes this property a dream for investors. The property is locate at just two blocks from the beach. This property is apt for all types of services like supermarkets, restaurants and apartments. Incredible Firesale Commercial Property in …
This is a Jaco Beach 4 bedroom oversize property in a residential area near all the amenities. The listing is located 8 blocks from the beach and close to downtown. The home has a nice pool in a spacious backyard with space to build. There are lots of fruit trees and tropical flowers. It has a very welcoming feeling and a traditional caribbean architecture, …
This is a turn key unique luxury condo in a low density community of only 24 units and two floors. The property is maintained very very well and the landscaping is amazing. There is 24 hour security as well as low monthly fees ($200). King size bed in the master bedroom and 2 single beds that can be made into a king size bed in …
Downtown Jaco Beach Sol Dorado home for sale with 3 bedrooms, 2 bathrooms large green areas and located on a corner lot. Downtown Jaco Beach Sol Dorado Home Priced to Sell in Costa Rica The community of Sol Dorado has 24 hour security and is one of the most sough after neighborhoods in Jaco Beach. The residential development is just one block away from …
Incredible large corner lot ready to be develop in the heart of Jaco Beach, Costa Rica. The property is in a very popular comercial sector of the city. Located only three blocks from the ocean this is a great opportunity at a great price. The land is listed at $350,000 Downtown Jaco Beach Large Corner Lot for Sale in Costa Rica Jaco Beach is …
This incredible oceanfront Jaco Beach Acqua Condo is going to sale fast. The luxury condominium is listed at the incredible price of $270,000. For an oceanfront property, this is is the deal you have been looking for. Oceanfront Jaco Beach Acqua Condo Firesale at $270,0000 ! You need to see the view from the amazing terrace to truly appreciate how magnificent it is. The …
Downtown Jaco Beach Hotel for Sale 30 Meters from the most popular beach in Costa Rica. The Hotel has fourteen well equipped bedrooms. You can enjoy the sea view, the very large pool which is completely private. You can also have access to the private bar which can be used for private events. Downtown Jaco Beach Hotel for Sale 30 Meters from the Sand …
Tropical Condo downtown Jaco Beach, Costa Rica! This is a very good rental income opportunity. The unit has two bedrooms & two bathrooms,a little terrace and living space with back patio. The second floor is has a mezzanine, very cozy. Tropical Condo Downtown Jaco Beach, Costa Rica! This condominium is located right in downtown Jaco, just one block from the beach, This is probably …
This is a commercial opportunity downtown Jaco to own a very large real estate property with great equity potential. The listing is in the heart of the city one block away from the main street of Jaco and just thirty meters away from the beach. Commercial Opportunity Downtown Jaco Beach Costa Rica The listing is 750 square meters and it has 2 houses and …
September 2018, price reduced $20,000 BEAUTIFUL Jaco Beach Home for sale in Hacienda Jaco! Featuring one of our most unique, stylish homes in a quiet, hidden area of Jaco, with a great potential due to the huge yard and layout of this charming home. Beautiful Jaco Beach Home For Sale in Hacienda Jaco, Costa Rica! Enter the compound-style high walled entrance of this very …
Downtown shopping center for sale in the main strip of Jaco Beach, Costa Rica. This is the most visited area in town and the commercial center is right in the middle of all the action. Downtown Shopping Center for Sale in Jaco Beach Costa Rica This listing is an excellent investment if you are looking at a quick equity gain. If your main interest …
Jaco Beach Main Street Commercial Property for sale in the most coveted area in the entire city. This is a large property of 220 square meter property, approximately 2400 square feet. The listing is located in the middle of the most visited city of the central pacific coast of Costa Rica. Jaco Beach Main Street Commercial Property for Sale in Costa Rica The exact …
Jaco Beach Commercial Property in Prime Downtown Location suitable for a shopping center, a condo development or home constructions. If we are talking location it does not get any more centric and convenient than this property. Jaco Beach Commercial Property in Prime Downtown Location We are talking about 14 hectares in the heart of Jaco Beach Costa Rica! The location is only 3 minutes …
La Paloma Blanca A2 is a front row oceanfront condo on the desirable south end of Jaco Beach. This unit features two levels meaning that there are two separate balconies from which to enjoy the ocean view. The kitchen and living area as well as a full bathroom is located on the ground level that has direct access to the oceanfront pools and beach. …
Jaco Beach incredible view land at just 5 minutes form downtown and the beach. The property is listed at the the great price of $500,000 which is a surprising deal for that location and that amazing view. Jaco Beach Incredible View Land Near City and Sand in Costa Rica’s Pacific Coast The city of Jaco Beach is the heart of the Pacific Region of …
This is a wonderful opportunity to own a Jaco Beach Prime Commercial Real Estate property. This listing is located in the main strip of the city which is the street named ” Pastor Diaz” and the intersection with the “Morales” street. This location is ideal for a commercial property. Jaco Beach Prime Commercial Real Estate Location for Sale in Costa Rica The property is …
On offer are THREE OCEANFRONT residential lots fully titled in central Jaco Beach! Oceanfront properties in Jaco Beach are scarce and beachfront titled properties only exist in 5% of Costa Rica, making this a very rare opportunity. To be able to find a land right in front of the sand and in a city with so many amenities and entertainment at this price point …
This impeccable Jaco Beach home offers the best of nature and location in one place. You will be surrounded by mountains yet the property is located just one mile from the beach and all the amenities and entertainment available downtown. Priced at $130,000 this is an incredible value. Pristine Jaco Beach Home for Sale in the Pacific of Costa Rica! The property has two …
High end condo for sale in La Vereda Jaco Beach. The property has been designed for those who love the amenities of the modern architecture and the tranquility of the beach life.Located only 600 meters to the ocean and to all the services that the beautiful town of Jaco beach has to offer. Nearby amenities include gyms, shopping center, restaurants, hiking trails gorgeous nature …
This is a beautiful downtown Jaco Beach turnkey hotel for sale at an incredible price. The property is located just one kilometer away from the beach. Downtown Jaco Beach Turnkey Hotel The hotel has five two story units for rent.Three of the apartments have two bedrooms and three bathrooms. Two of the apartments have three bedrooms and three bathrooms. The hotel has a large …
Exclusive Luxury Condo for sale in downtown Jaco Beach, Costa Rica. The property is located at just one kilometer from the beach. This is a two story unit in a very exclusive complex with only five condominiums in the development which provides great privacy and exclusivity. Exclusive Luxury Condo for sale in downtown Jaco Beach, Costa Rica The property has incredible finishes from granite …
Jaco Beach Holiday Events If you are in Costa Rica this Christmas and New Year you will want to enjoy the following Jaco Beach holiday events. From the team at Remax Oceanside Jaco in Costa Rica we would like to wish you a wonderful holiday season! There is no grater gift than the joy to be able to help you find your perfect home. Thank you …
Jaco Beach fixer upper opportunity is waiting for you! This is a small house in avery nice and quiet residential community close to downtown and the beach. Jaco Beach Fixer Upper Opportunity for Sale in Costa Rica! Jaco Beach is a fast growing new town with very good rental income records. This city is host to the closest beach from San Jose, the capital …
Beach Community Condo 3 bedroom 2 bath condominium located in a beachfront gated community at the north end of Jaco Beach, next to Croc´s Casino and Resort. It is spacious and it has a large terrace overviewing pool and beach. Beach Community Condo High end finishing’s, granite countertop, hard wood cabinets and closets and very nice furnished. This beach community condo is located …
The poolside condo is located in the desirable Tropical gated community on the main strip of Jaco Beach.. This 1 bedroom, 1 bathroom residence is conveniently located next to the pool and just a stones throw away from all the amenities of town. From the condo you have views to the lush tropical mountains and the beach is just a short 5 minute walk. … | 2024-05-16T01:27:17.568517 | https://example.com/article/7235 |
apiVersion: v1
kind: Service
metadata:
name: {{ include "geektime-mobile-gateway.fullname" . }}
labels:
{{- include "geektime-mobile-gateway.labels" . | nindent 4 }}
spec:
type: {{ .Values.service.type }}
ports:
- port: {{ .Values.service.port }}
targetPort: http
protocol: TCP
name: http
selector:
{{- include "geektime-mobile-gateway.selectorLabels" . | nindent 4 }}
| 2024-07-01T01:27:17.568517 | https://example.com/article/3288 |
This application is based upon and claims benefit of priority of Japanese Patent Application No. 2002-78731 filed on Mar. 20, 2002, the content of which is incorporated herein by reference.
1. Field of the Invention
The present invention relates to a semiconductor dynamic sensor such as an acceleration sensor for use in an automotive vehicle.
2. Description of Related Art
An example of a conventional acceleration sensor for use in an automobile is shown in FIG. 4. The acceleration sensor 110 includes a package case 101, a circuit chip 103 and a semiconductor sensor chip 105 supported on the circuit chip 103 via an adhesive film 104. The circuit chip 103 is mounted on the package case 101 with an adhesive 102 in which beads 109 made of resin are dispersed. The beads 109 have a high elasticity modulus of bout 5 giga-Pascal (5 GPa) to maintain a certain space between the circuit chip 103 and a mounting surface of the package case 101.
A beam structure including movable electrodes 156 that detect an amount of acceleration imposed thereon is formed on the semiconductor sensor chip 105. Signals representing the detected acceleration are processed in the circuit chip 103 and fed to an outside circuit. When heat is applied to the package case 101, for example, in a re-flow soldering process, the heat is transferred from the package case 101 to the circuit chip 103 and the semiconductor sensor chip 105. Since thermal expansion coefficients of those components are different from one another, a thermal stress is generated in the semiconductor sensor chip 105. The sensor characteristics change due to the thermal stress.
To suppress transmission of the thermal stress from the circuit chip 103 to the semiconductor sensor chip 105, the adhesive film 104 having a low elasticity modulus (about 1 MPa) is interposed therebetween. The thermal stress transferred to the circuit chip 103 from the package case 101 is not suppressed by the adhesive 102 because it contains the beads 109 having a high elasticity modulus. Although transmission of the thermal stress from the circuit chip 103 to the semiconductor sensor chip 105 is suppressed by the adhesive film 104, it cannot be completely interrupted. Because the semiconductor sensor chip 105 is highly sensitive to the thermal stress, its characteristics are affected by the transferred thermal stress even if its amount is small.
The present invention has been made in view of the above-mentioned problem, and an object of the present invention is to provide an improved semiconductor dynamic sensor having stable characteristics, avoiding thermal stress transfer to a semiconductor sensor chip.
A semiconductor dynamic sensor such as an acceleration sensor is composed of a semiconductor sensor chip, a circuit chip for processing outputs from the sensor chip and a package case for containing the sensor and circuit chips therein. The circuit chip is mounted on a mounting surface of the package case, and the sensor chip is supported on the circuit chip. In order to prevent a thermal stress from being transferred from the package case to the sensor chip through the circuit chip, an adhesive film having an elasticity modulus lower than 10 MPa is interposed between the package case and the circuit chip.
Preferably, another adhesive film having a low elasticity modulus is interposed between the sensor chip and the circuit chip. The adhesive film interposed between the package case and the circuit chip may be made of silicone or the like.
In this manner, thermal stress transfer from the package case to the semiconductor sensor chip through the circuit chip is suppressed, and thereby characteristics of the semiconductor sensor chip are kept stable.
Other objects and features of the present invention will become more readily apparent from a better understanding of the preferred embodiment described below with reference to the following drawings. | 2023-11-18T01:27:17.568517 | https://example.com/article/4311 |
Parallel pathways of potassium transport in the alga Hydrodictyon reticulatum. Effects of calcium.
Inflow of potassium ions into the alga Hydrodictyon reticulatum is reduced in the dark, the reduction being accompanied by a change in the selectivity pattern with respect to alkali metal ions, observed in competition experiments and evaluated by the gnostic analysis as described by Kovanic. This suggests that in the light a special mechanism of potassium uptake with a characteristic selectivity is switched on. This mechanism can be also suppressed by too high (2 mmol/l) or too low (EGTA) concentration of calcium ions in the medium. Since the same applies to the light-induced alkalinization of the algal surroundings it seems that the light-induced potassium uptake is related to the light-induced alkalinization, e.g., via exchange of external potassium cations for intracellular protons. | 2023-08-03T01:27:17.568517 | https://example.com/article/8788 |
Could Habs Bergevin Be Closing in On a Trade?
It’s never been more difficult to conclude trades according to NHL General Managers around the league, yet it’s been a long time since traditional media have had so much trade material to talk about. The Columbus Dispatch added fuel to the fire today yesterday by announcing that disgruntled 21 year old forward Kerby Rychel has requested a trade in the summer and still wants out.
PENTICTON, BC. – So looking at the names being thrown around in the last few weeks, and knowing that Marc Bergevin has stated in a few occasions that he’s not looking for short term help, just who might he just have a chance to acquire once the right deal comes about? Let’s have a look at the names which have made the traditional media news in the last few weeks. | 2024-06-08T01:27:17.568517 | https://example.com/article/5864 |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.