text
stringlengths 12
4.76M
| timestamp
stringlengths 26
26
| url
stringlengths 32
32
|
|---|---|---|
New York Jets News and Rumors
Who says you can't go home again? Receiver Braylon Edwards, who played with the New York Jets in 2009 and 2010, has been claimed through waivers by that team after the Seattle Seahawks gave him a waived/injured designation and the Jets' Stephen Hill was…
Mehta: Making playoffs D-lightful dream for Jets
When Woody Johnson examines the good, bad and ugly from the 2012 season in a few weeks, he should know this: The Jets were still in the playoff conversation down the stretch, thanks to a defense that re-established itself as the team’s backbone.
Ellis Lankster: Hero on and off the Field
Jake Steinberg, theJetsBlog.com Many professional football players are known for their work on the field. Very few of these players, however, are known for their work off the field as well. New York Jets cornerback, Ellis Lankster, makes his mark in b
Wilkerson Settling Into His Role in Jets Defense
The Jets defense has been in a groove in recent weeks, and a big factor in the unit tightening things up can be traced to Muhammad Wilkerson and his emergence now that he’s been around the league for almost two years. “I think I’m doing pretty good,
|
2024-07-10T01:26:28.774034
|
https://example.com/article/7792
|
Q:
What to do when too much liquid added to flour mixture?
I seem to have a bad habit of mis-calculating ingredients, particularly the liquid ones. Can I just boil off excess water that I've added to a flour mixture (in this case a pizza dough)? Any other tricks, other than adding more flour (= huge amount of dough)?
A:
If everything is already combined, you can't really boil off the liquid without also cooking the flour, killing the yeast, and ruining your dough. If you don't want the large amount of dough you would have from just adding flour to what you have, your best bet is to just throw away a portion of what you've made, add flour to the remainder, and proceed. In the future, try adding 75% of the water, then adding the rest as needed. Sometimes this is the only way to account for additional moisture your flour may have absorbed in humid environments.
In the case of pizza dough though, if you have too much, if you portion it, lightly oil the portions, and freeze them individually, they should keep fairly well.
A:
How much extra water are you adding? If it's so much that simply adding a bit of extra flour won't do, I'd probably first looking at why you're measuring wrong. I don't imagine boiling it is a good idea. You don't want to boil your dough.
I would suggest whenever you are dealing with flour, to do it by weight. Google out a similar recipe that gives you weights instead of (or in addition to volume). Measuring flour by volume is notorious affected by humidity, how long the flour has been sitting in it's container, and numerous other things.
If you don't have or don't want to use a scale, you can follow the process found on King Arthur's site (and numerous other places) for accurately measuring flour. The short version is that it tells you to "fluff up" your flour first. If you fluff up the flour and then measure out the cup (scraping a straight line across the top of the measuring cup with a chopstick or something), it is almost always sufficient for my purposes.
|
2023-08-08T01:26:28.774034
|
https://example.com/article/5175
|
Q:
How to request Tumblr like button status after a new page is loaded with infinite scroll
This is the instruction from Tumblr documentation:
Tumblr.LikeButton.get_status_by_page(n): Call this function after requesting a new page of Posts. Takes the page number that was just loaded as an integer.
Tumblr.LikeButton.get_status_by_post_ids([n,n,n]): Request Like status for individual posts. Takes an array of post IDs.
This question has been asked few times with solutions here and here both answers can tell you how to request like button status with post IDs. So is there a easier and probably faster solution?
I'll share how i do it, please share your opinions too.
A:
What's happening in the accepted answer here is:
First you have to give IDs to all the posts.
After new posts are loaded, find all the elements(posts) with class (.post).
Get IDs of the new posts.
Request like button status with array of new post IDs
Now this is how you can request like button status after new page is loaded with page numbers.
First get number of posts in the page.
Get number of the posts again after new posts are loaded.
Divide current numbers of posts by initial number of posts to get the page number.
Request like button status with page number.
var $initialNumberOfPosts = $('.post').length; // Get number of posts
$('#posts').infinitescroll({
loading: {
msgText: "Loading..",
img: "/loading_image.gif",
finishedMsg: "End!"
},
navSelector : "#pagination",
nextSelector : "#nextpage",
itemSelector: ".post"
},
function(newElements) {
var $currentNumberOfPosts = $('.post').length; // Get current number of posts
var pageNumber = Math.ceil($currentNumberOfPosts / $initialNumberOfPosts); // Get page number
Tumblr.LikeButton.get_status_by_page(pageNumber); // Request like button status
});
*Using (.ceil) because user might have selected 15 posts per page but there can be less than that in the last page.
Update: March 5, 2014.
Their is more simple way to get the page number using Tumblr variable and increase it when the new page loads. Try the following:
First get the page number using Tumblr variable: {CurrentPage}.
After a new page is loaded increase the current page number.
Request like button status with current page number.
var pageNumber = {CurrentPage}; // Get current Page number ( Will not work in external file)
$('#posts').infinitescroll({
loading: {
msgText: "Loading..",
img: "/loading_image.gif",
finishedMsg: "End!"
},
navSelector : "#pagination",
nextSelector : "#nextpage",
itemSelector: ".post"
},
function(newElements) {
pageNumber++; // Get page number after new page is loaded.
Tumblr.LikeButton.get_status_by_page(pageNumber); // Request like button status
});
// End update.
*This is an example script for how you can request like button status with Paul Irish's infinite scroll.
So in both way, it's roughly 3 - 4 steps. My solution seems easier to set up for me so i use it. You can use what seems better to you.
I think my solution is faster 'cause it uses simple functions, but that's just what i think; i don't have any evidence for now. Thank you!
|
2023-09-27T01:26:28.774034
|
https://example.com/article/8710
|
Hilarious Notes That Fathers Left To Their Kids
Our dads can be totally hilarious and annoying at times, like when they try to bug you about what you’re wearing, tease you about something, or crack a lame joke. They definitely have their own brand of dad humor. But admit it, we’ve learned not to take things too seriously from our fathers. And really, where would we be without our dads? Here’s a list of amusing and sweet notes that fathers left for their kids that shows us just how funny they can be!
Animal Lover
This dad’s note surely gave an impression that he is serious about the pets, and the instructions on the note are not meant to be toyed with. Hmm, it seems like dad has a favorite child and it’s a furry one! Who can blame the father, though? A dog is a man’s best friend after all, and they don’t come with tantrums (or maybe they do, but it’s the adorable kind).
Dog dads are as serious about their parenting skills as they are at being a human dad. Or maybe this father was simply looking out for both of them. But for sure, this note just shows us how a dad can always inject humor, even when giving instructions.
Another Level of Laziness
To some of us, our fathers are our mentors on how to fix things. They are the ones we run to when we need a solution to a problem. But what is it with dads and their inability to look for things—things that are often right under their noses? Hilarious, isn’t it?
The Wisdom Segment
I
In 1534, the Church of England was established by King Henry VIII for personal and political rather than religious purposes. Henry desperately wanted to annul his marriage with his first wife, Queen Catherine of Aragon, who never bore him a son. He planned to marry his new mistress, Anne Boleyn, with whom he had become infatuated. However, the Pope did not approve of the annulment. The king was undeterred and decided to separate England from the Roman Catholic church and establish the Church of England.
II
Since this historic separation of church and state, the Church of England has become the main religion in the country. The overseer of the church is none other than the British monarch. This meant old Henry had the power to approve the appointment of archbishops, as well as the Bishop of Canterbury (the church leader). As with the Catholic church, its principle foundation is the Bible, and it observes the sacraments of baptism and holy communion.
III
The Church of England could be described as a mix between the Catholic and Reformed churches. It preserves many early Christian doctrines such as the Nicene Creed and the Apostles' Creed, but at the same time approves of Protestant Reformation ideas such as the Book of Common Prayer and the Thirty-Nine Articles.
IV
The Church of England decreed in 1992 that women may be ordained as priests. While this sparked much debate within the community, it also promotes female empowerment within the church. There have also been attempts over recent years to allow women to become bishops. However, these were continuously rejected by fierce opponents within the church.
V
The fight did not end there, however, and finally, in 2014, the church passed a bill to allow women to become bishops. The bill was then approved in 2015 by the Archbishops of Canterbury and York (the churchs highest officials). Reverend Libby Lane, the first ever female bishop of the Church of England was consecrated in January of 2015.
VI
The Church of England has also allowed gay priests to be ordained since 2005, under the agreement that they would remain celibate. They were also permitted to become bishops in 2013. In the same year, the House of Commons legalized same-sex marriage. However, the Church of England has not agreed to perform them.
|
2024-04-23T01:26:28.774034
|
https://example.com/article/2876
|
"The police have become more militarized, more soldier-like in the last generation or two," explains journalist and author Radley Balko. "It applies to the weapons they are using, the uniforms they wear…to the tactics they use, to what I think is the most pervasive problem which is the mindset that police officers take to the job."
Balko, author of the new book Rise of the Warrior Cop: The Militarization of America's Police Forces, sat down with ReasonTV to discuss the book, the growth and development of SWAT forces, and how the drug war has fostered an "us against them" mentality within police departments.
Balko is a senior writer and investigative reporter at the Huffington Post. His work primarily focuses on the drug war and police abuse. Previously, Balko worked as a senior editor for Reason Magazine.
About 12 minutes.
Camera by Todd Krainin and Amanda Winkler. Edited by Winkler.
Scroll down for downloadable versions and subscribe to Reason TV's YouTube Channel to receive automatic updates when new material goes live.
|
2024-07-21T01:26:28.774034
|
https://example.com/article/8722
|
Six great black and red posters for Anthony and Joe Russo's Captain America: The Winter Soldier
Disney has released 6 cool new posters for their upcoming Marvel Phase 2 film, Captain America: The Winter Soldier.
The film follows on from the events of Marvel’s Avengers Assemble and sees Captain America and the Black Widow join forces to stop a covert enemy that is hiding in Washington D.C.
Chris Evans returns in the title role, aided by an all-star cast that includes Anthony Mackie, Frank Grillo, Cobie Smulders, Samuel L. Jackson, Sebastian Stan, Scarlett Johansson, Toby Jones, Emily VanCamp and Robert Redford. Welcome to Collinwood directors Anthony and Joe Russo are in charge for this outing.
Captain America: The Winter Soldier is due for release on March 26th.
Captain America: The Winter Soldier will pick-up where Marvel’s Avengers Assemble left off, as Steve Rogers struggles to embrace his role in the modern world and teams up with Natasha Romanoff, aka Black Widow, to battle a powerful yet shadowy enemy in present-day Washington, D.C.
About The Author
Founder and Managing Editor of Scannain. Head of Business Affairs at Treasure Entertainment.
If found please return to a cinema. Always willing to lend a hand to an Irish film, actor or director in need.
|
2023-08-22T01:26:28.774034
|
https://example.com/article/7692
|
Oh my fxcking god. I'm reading through all the old fanfic in my library that I've forgotten the story line to and I s2g this better not be what I think it is. I'm prepared to choke Alex and Scott for what he did to Mitch. Omfg I'm already pissed.
|
2023-08-02T01:26:28.774034
|
https://example.com/article/8278
|
Community members host prayer service for Kayleigh McClendon
This is an archived article and the information in the article may be outdated. Please look at the time stamp on the story to see when it was last updated.
Please enable Javascript to watch this video
HARTSELLE, Ala. -- Kayleigh McClendon has impacted the lives of so many people. At 7 years old, she was fighting a rare brain disease, but finished that battle on Tuesday. "She is in a place right now where there's never going to be any more pain or suffering," Pastor Steve Burgett said.
Jessica Wilson is just one of 49,000 people to watch Kayleigh's story unfold on Facebook. She said after hearing the news, she felt called to do something. So she hosted a prayer service. Several other Hartselle community members came to pray as well.
Wilson is a mom of two young daughters. She said she's tried to place herself in Kayleigh's mom's shoes, but feels like they would just be too big. She doesn't know if she could be just as strong. "You're just somebody special to take your situation and turn it into look what God has done for us. Look what God can do for you," Wilson said.
She knows life without Kayleigh is going to be hard for the family, but said the community is here to be a shoulder to cry on, and offer prayers to the family.
|
2023-09-07T01:26:28.774034
|
https://example.com/article/5224
|
Finding inheritance hierarchies in fuzzy-valued concept-networks.
In this paper, we extend the works of Chen and Horng (1996) and Itzkovich and Hawkes (1994) to present a new method for finding the inheritance hierarchies in fuzzy-valued concept-networks, where the relevant values (degrees of generalization or degrees of similarity) between concepts in a fuzzy-valued concept network are represented by fuzzy numbers. The proposed method is more flexible than the ones presented previously due to the fact that it allows the grades of similarity and the grades of generalization between concepts to be represented by fuzzy numbers rather than crisp real values between zero and one or interval values in [0,1].
|
2024-05-24T01:26:28.774034
|
https://example.com/article/4658
|
Q:
How to create GridView in ASP.NET with Horizontal Scroll but 2 first columns are fixed
I want to create a Gridview with columns ID, Name and 20 other columns. So it overflow and I need use scroll but ID and Name are fixed.
A:
Do you mean you want fixed header and freeze some column?
If yes, i wrote jQuery plug-in can do this!
look the website: http://gridviewscroll.aspcity.idv.tw/
Supported Browsers
Internet Explorer 7, 8 (IE 9 Compatibility)
Internet Explorer 9 (9.0.8112)
Internet Explorer 10 on Windows 7 Preview
Google Chrome(23.0.1271.64 m)
Mozilla Firefox (16.0.2)
Apple Safari (5.1.7)
|
2024-06-09T01:26:28.774034
|
https://example.com/article/2237
|
Q:
Make differents between setOnClickListener and setOnTouchListener
I need some help. In my android app I have a ViewFlipper that contains some LinearLayout. On every LinearLayout I have a ImageView. For switching between screens I use this code :
LinearLayout layMain = (LinearLayout) findViewById(R.id.layout_main);
layMain.setOnTouchListener((OnTouchListener) this);
//--------------
public boolean onTouch(View arg0, MotionEvent arg1) {
// Get the action that was done on this touch event
switch (arg1.getAction()) {
case MotionEvent.ACTION_DOWN: {
// store the X value when the user's finger was pressed down
downXValue = arg1.getX();
break;
}
case MotionEvent.ACTION_UP: {
// Get the X value when the user released his/her finger
float currentX = arg1.getX();
// going backwards: pushing stuff to the right
if (downXValue < currentX) {
// Get a reference to the ViewFlipper
ViewFlipper vf = (ViewFlipper) findViewById(R.id.details);
// Set the animation
vf.setOutAnimation(AnimationUtils.loadAnimation(this,
R.anim.push_right_out));
vf.setInAnimation(AnimationUtils.loadAnimation(this,
R.anim.push_right_in));
// Flip!
vf.showPrevious();
}
// going forwards: pushing stuff to the left
if (downXValue > currentX) {
// Get a reference to the ViewFlipper
ViewFlipper vf = (ViewFlipper) findViewById(R.id.details);
// Set the animation
// vf.setInAnimation(AnimationUtils.loadAnimation(this,
// R.anim.push_left_in));
vf.setOutAnimation(AnimationUtils.loadAnimation(this,
R.anim.push_left_out));
vf.setInAnimation(AnimationUtils.loadAnimation(this,
R.anim.push_left_in));
// Flip!
vf.showNext();
}
break;
}
}
// if you return false, these actions will not be recorded
return true;
}
Every screen contains a ImageView.So, when I switch the screens the imageview is changing. Now I want to implement this: When an image is clicked a url to be open. Here is my code :
ViewFlipper vf = (ViewFlipper) findViewById(R.id.details);
for (i = 0; i < jArray.length(); i++) {
LinearLayout l = new LinearLayout(this);
l.setLayoutParams(new LayoutParams(LayoutParams.FILL_PARENT,
LayoutParams.FILL_PARENT));
l.setBackgroundColor(0x000000);
l.setOrientation(LinearLayout.VERTICAL);
vf.addView(l);
ImageView img = new ImageView(this);
img.setLayoutParams(new LayoutParams(LayoutParams.FILL_PARENT,
LayoutParams.FILL_PARENT));
Drawable image1 = ImageOperations(getBaseContext(), url[i]);
img.setImageDrawable(image1);
System.out.println("target" + target[i]);
img.setOnClickListener(new OnClickListener() {
@Override
public void onClick(View v) {
// TODO Auto-generated method stub
Intent browserIntent = new Intent(Intent.ACTION_VIEW, Uri
.parse("http://google.com"));
startActivity(browserIntent);
}
});
l.addView(img);
}
The problem is that everytime I touch the screen the url is open and now I can't switch between screens. How to do this, to make the differents between onClick() and on Touch()?
Please help me..
Thanks in advance
A:
I think you use image View like a background for Linear Layout , it seems Activity handle the touch for ImageView , to achieve your Functionality setTouch listener for imageView and we can handle the click for image view indirectly using following code in OntouchListener,
if (downXValue == currentX) {
Intent browserIntent = new Intent(Intent.ACTION_VIEW, Uri
.parse("http://google.com"));
startActivity(browserIntent);}
|
2023-09-17T01:26:28.774034
|
https://example.com/article/6751
|
Ray Lawler
Raymond Evenor Lawler OBE (born 23 May 1921) is an Australian actor, dramatist, producer and director. His most notable play was his tenth, Summer of the Seventeenth Doll (1953), which had its premiere in Melbourne in 1955. The play changed the direction of Australian drama. The story of The Doll is preceded by Kid Stakes, set in 1937, when the characters of The Doll are young adults, and then Other Times, which is set in 1945 and includes most of the same characters.
Early life
Lawler was born in the Melbourne suburb of Footscray on 23 May 1921, second of eight children of a council worker. He left school at 13 to work in a factory and attended evening acting classes. He wrote his first play at 19, and his play Hal's Belles had good notices in early 1946. It was described as "...easy to stage and is a slick, finished work", then being offered by J. and N. Tait in London and New York.
Career
He first attracted attention as a writer in 1952 when his play Cradle of Thunder was presented by the National Theatre Competition. In 1955, Summer of the Seventeenth Doll gained first prize in the Playwright Advisory Board Competition with Oriel Gray’s The Torrents and was subsequently presented by the Union Theatre. Lawler played the role of Barney at the premiere of Summer of the Seventeenth Doll in 1955. The play was taken up by the Australian Elizabethan Theatre Trust and presented in all Australian states as well as London and New York. It won the Evening Standard Award for the best new play on the London stage in 1957. Since then it has been translated into many languages and performed in many countries.
Lawler went to London with the cast and lived in Denmark, England and then in Ireland. Summer of the Seventeenth Doll was followed by The Piccadilly Bushman (1959), presented in Australia by J. C. Williamson’s and published by Angus & Robertson (1961); The Unshaven Cheek, presented at the 1963 Edinburgh International Festival; and A Breach in the Wall, about St Thomas Becket (televised in 1967, produced at Canterbury in 1970).
In 1972, he visited Australia for the Melbourne Theatre Company’s production of The Man Who Shot the Albatross, a version of the Governor Bligh story.
In 1975, Lawler returned to settle in Australia as associate director of the Melbourne Theatre Company, with an agreement to complete a trilogy based on Summer of the Seventeenth Doll. The first play, Kid Stakes, opened in December 1975 and the second, Other Times, in December 1976. The Doll Trilogy had its first full performance at the Russell Street Theatre, Melbourne, on 12 February 1977.
Personal life
Lawler married actress Jacklyn Kelleher in 1956. They had twins sons, Adam and Martin, born in London in May 1957, and a subsequent daughter, Kylie.
Honours and legacy
Lawler was named an Officer of the Order of the British Empire (OBE) in 1980. The smaller theatre space, the Lawler, in the Melbourne Theatre Company's Southbank Theatre is named after him.
Works
Stage
Cradle of Thunder (1949)
The Bluff and the Fair (1952 - a reworked version of Hal's Belles, 1945)
The Adventures of Ginger Meggs (1952, children's musical)
Tram Stop 10! (1954, co-writer of revue)
Summer of the Seventeenth Doll (1955)
Return Fare (1955, co-writer of revue)
The Piccadilly Bushman (1959)
The Unshaven Creek (1963)
A Breach in the Wall (1970)
The Man Who Shot the Albatross (1971)
Kid Stakes (1975)
Other Times (1976)
Godsend (1982)
References
External links
Category:1921 births
Category:Living people
Category:Australian dramatists and playwrights
Category:Australian male stage actors
Category:Writers from Melbourne
Category:Australian Officers of the Order of the British Empire
Category:Australian_male_writers
|
2023-11-02T01:26:28.774034
|
https://example.com/article/2977
|
Effect of probiotic lozenges containing Lactobacillus reuteri on oral wound healing: a pilot study.
It has been suggested that beneficial bacteria may stimulate wound healing. The aim was to investigate the effect of topical applications of probiotic lactobacilli on the healing of standardised oral wounds. This pilot study employed a randomised, placebo-controlled, double-blind cross-over design. Standardised biopsies were punched in the oral mucosa of 10 healthy volunteers, with and without exposure to two strains of Lactobacilli reuteri administrated as lozenges and topical oil. The healing was scored clinically after 2, 5 and 8 days. The amount of exudate was quantified through filter papers and the levels of selected cytokines and chemokines were determined with multiplex immunoassays. Saliva samples were collected before the biopsy and after healing for determination of oxytocin with ELISA. Subjectively perceived pain and discomfort was reported through a daily logbook. There was a clear tendency of improved healing in test group at the 2-and 5-day check-ups but the difference compared with the placebo intervention was not statistically significant (P=0.08). Higher but non-significant expressions of the tumour necrosis factor (TNF) superfamily ligand members 13 (APRIL) and 13B (BAFF), as well as the chemokine interleukin 8 (IL-8), were displayed in wound exudates from the probiotic group as compared with placebo, particularly after 5 and 8 days. The salivary levels of oxytocin were significantly lower (P<0.05) in the placebo group at the 8-day follow-up. The mean number of days with pain and/or discomfort after the biopsies was similar in both groups. No side-effects were reported. The findings of this pilot study justify a larger clinical trial to elucidate the possible role of probiotic supplements on oral wound healing.
|
2024-01-09T01:26:28.774034
|
https://example.com/article/9221
|
HEB is a large Austin based grocery store chain. A very good one too I'll add. H-E-B stands for, "Here Everything's Better. They also own the upscale Central Market stores which are aimed at the (and I hate the word) "yuppie foodie" customer.
The news said the thieves were walking out with the meat hidden on their persons. Now I was born but not yeaterday. How are you gonn stuff a brisket down the front of your jeans. You'd have to go about ten times a day to make it profitable. My son works for HEB and he says its Howard E Butt.
I find it hard to believe that people shoplifting meat from grocery stores were able to supply 3 large scale BBQ operations. We all know theft is common in supermarkets but they would be on this as soon as 2 or 3 briskets were missing. There are cameras everywhere and all suspicious types are watched as soon as they enter a store.
I doubt they did supply the entire amount of meat needed to run the operations. I got the impression that the restaurant would buy whenever the shoplifters brought it around. If the restaurant was able to buy a couple of Briskets a week for 1/3 to 1/2 of their normal cost that was quite a bit of extra profit.
Once again our esteemed city has become a laughing stock. That's why I live in Georgetown. Wonder why the thieves didn't drive a few miles north and sell their ill gotten loot to Rudy's. The bbq couldn't be any worse than it is now.
Once again our esteemed city has become a laughing stock. That's why I live in Georgetown. Wonder why the thieves didn't drive a few miles north and sell their ill gotten loot to Rudy's. The bbq couldn't be any worse than it is now.
Here in Austin, some people are putting cold things in their pants just to keep cool. When I enter the store, I do the same thing, but return it back before I leave.... If these guys stole HEB's prepared, cooked and sliced brisket and these places served it, that is a capital crime...... Might tenderize it though.
Makes me wonder how you get a ten pound brisket down your trousers. Down' the front, down the back how in gods name did they do it. Guess I'll start watching some guy with a huge ass to see if there's a packer trimmed hunk of beef down there. HAH!
scrumptiouschefSam's has reopened as of two days ago [Tue Aug 16th]. We went by there last night and had some brisket fresh off the pit at midnight. Pics and a chat with the owner who still has significant legal trouble in front of him here http://www.scrumptiousche...eopened?adminview=true
I visited your web site. You have some nice recipes!If Terrell Pryor can get into the NFL I guess this guy can re-open his BBQ pit!
Sam's Barbecue has recovered nicely from the scandal. I've eaten there a couple times in the past month. It looks like Brian Mays, owner, is out of hot water. His attorney managed to get the most serious charges tossed. I believe he has one more court appearance.
|
2024-02-27T01:26:28.774034
|
https://example.com/article/7065
|
In Anglo-Saxon times, you had to choose carefully who you messed with. If you happened to kill someone, then the more important he was, the more it cost you – a serf came in at 40 shillings, a freeman 100 and a prince 1,500. Today, things are different, of course. Everyone mucks in together and we don’t have privileged classes entitled to special protections.
Or do we? One of the sideshows of the General Election might make you think again. Ex-Tory Remainer Anna Soubry, standing in Broxtowe, faced a persistent and vocal opponent called Amy Dalla Mura (known online as Based Amy). Dalla Mura is a member of the nationalist English Democrats and is a fanatical Brexiteer. Last January, during one of Soubry’s question-and-answer sessions, in a swish London hotel shortly before she resigned the Tory whip, Dalla Mura intervened loudly throughout. She accused Soubry of not respecting the referendum vote and got into arguments with the audience. Two months later, while Soubry (by then in the Independent Group) was giving an interview to BBC Newsnight in the central lobby at Westminster, Dalla Mura was there again. She interrupted to say, ‘Anna Soubry is traitor’. ‘Get the police’, said Soubry.
You might think this was just part of the political rough-and-tumble. Far from it. The police now have a special unit called PLAIT – the parliamentary liaison and investigations team – dedicated to dealing with ‘attacks’ on MPs. Police intervened and Dalla Mura was arrested and prosecuted at Westminster Magistrates’ Court for harassment. In November she was convicted. Despite the fact that she was standing as a candidate in Broxtowe, she was bailed for sentence on condition that she neither visit Broxtowe nor mention Soubry in any of her literature. She won 432 votes despite these handicaps (beating another independent). Last week she was sentenced to 28 days in jail. There is so much wrong with this. Nothing Dalla Mura did should have been treated as a criminal offence. However much Soubry affected to be frightened for her safety, Dalla Mura never threatened violence. Reduced to its essentials, all she did was consistently and effectively embarrass Soubry and make it difficult for her to get her message across. No doubt this was frustrating. But it is what any robust politician ought to have to put up with. If the law on harassment prevents it, then it needs to be reined in, not have its use extended. Yet in this trivial case, Dalla Mura was not only given a criminal record — she was actually imprisoned.
Secondly, it is hard to see any justification for the restrictions placed on Dalla Mura’s election campaigning while she was on bail. Broxtowe is a large constituency consisting of three towns. What possible harm could be done to Soubry by the mere presence of an opponent in one or more of them is entirely unclear. As for the prohibition against any mention of Soubry in her campaign literature, this was simply bizarre. Any politician who is so oversensitive as to be distressed by the uncomplimentary mention of her own name in a General Election campaign does not deserve to be in politics. Thirdly, the comments made by chief magistrate Emma Arbuthnot in the case are alarming. Having started by saying that this was not a freedom-of-speech case – always a surefire indication that free speech really is at stake – Arbuthnot went on to refer to Dalla Mura’s activities as ‘intimidation’ (which they were not). Then, like too many people who should know better, she invoked the murder of Jo Cox by a madman. As if there could be any reasonable comparison between heckling a self-important politician and murder. Arbuthnot then suggested that Dalla Mura was damaging democracy and insisted that ‘MPs should be able to do their jobs without putting up with harassment’. Finally, she added that: ‘You insulted her by calling her a traitor among other things. This behaviour against elected representatives carrying out their duties will not be tolerated by this court.’ In other words, insults against politicians will be criminalised.
This isn’t the first time we have seen the heavy-handed treatment of political protest. In July this year, the same chief magistrate gave a suspended sentence to another anti-Soubry protester who called her a ‘Nazi’ and a ‘traitor’. For good measure, Arbuthnot also banned him from Parliament Square. Such ‘tirades’ were unacceptable in the face of a ‘vulnerable’ Soubry who had shown ‘great courage’, she said. So, the ‘safeguarding’ of democracy apparently now means that MPs and politicians must be given a special protected status. They must have the right – unlike the rest of us – to protection from stinging insults under threat of imprisonment.
The establishment is, of course, delighted with this state of affairs. Chillingly, immediately after the Dalla Mura hearing, a spokesman for the Metropolitan Police said that his force had a ‘commitment to dealing robustly with incidents of harassment and abuse against MPs’. He added, menacingly, that having strong political opinions was ‘absolutely no excuse’. Let that sink in. Andrew Tettenborn is a professor of commercial law and a former Cambridge admissions officer.
|
2024-02-26T01:26:28.774034
|
https://example.com/article/6311
|
in -71.99, 3, 11?
-71.99
What is the biggest value in 1/15, -2, 1.6, -0.3, -1/21, -1?
1.6
What is the smallest value in 62291, -5, 2, -1/5?
-5
Which is the third smallest value? (a) -0.126 (b) -175 (c) -0.1
c
Which is the biggest value? (a) 3 (b) -1 (c) 0.3 (d) -2/19 (e) 936
e
Which is the biggest value? (a) 6 (b) -2/9 (c) 0.1 (d) 0.5 (e) -410
a
Which is the fourth smallest value? (a) 0.22 (b) 19 (c) 5 (d) -98
b
Which is the second smallest value? (a) -23275 (b) -0.04 (c) -0.1
c
Which is the fifth smallest value? (a) 0.36 (b) 1/5 (c) -0.3 (d) 229/3 (e) -1
d
What is the second smallest value in 3.7, -9, 168?
3.7
Which is the third biggest value? (a) -2/17 (b) 1/23 (c) -1/4 (d) 0 (e) -2/165
e
Which is the biggest value? (a) 1 (b) 0.3 (c) 1/9 (d) 28
d
What is the third smallest value in 7, 3, -2, -1/5, -2/7?
-1/5
What is the third biggest value in 6, -4, 1/8, 9/5, 1, 0.19?
1
Which is the biggest value? (a) 3 (b) -576 (c) -3
a
Which is the second smallest value? (a) -2 (b) 3/4 (c) -77/5 (d) 4 (e) 2
a
What is the smallest value in -0.03, -0.4, 7.3, 2/13, 0.01, 1?
-0.4
What is the fourth biggest value in 3, 2/9, -0.2, 4, -312?
-0.2
Which is the third smallest value? (a) 5 (b) -0.051 (c) 17 (d) -2/17
a
Which is the second smallest value? (a) 1 (b) -0.4 (c) 1/20 (d) 1.85 (e) -3/4
b
Which is the biggest value? (a) -0.31 (b) 1.2 (c) 21 (d) 2
c
Which is the fifth biggest value? (a) -5 (b) 0.4 (c) -142 (d) 5 (e) -0.34
c
Which is the second smallest value? (a) 11/2 (b) -3/5 (c) 0.35 (d) 1/7 (e) -4
b
What is the smallest value in 0.3, 2, -12/209, -3, -2/9, -15?
-15
What is the third biggest value in -9/82, 0, -6?
-6
Which is the biggest value? (a) -2/5 (b) -0.1 (c) -0.5 (d) 19094
d
Which is the second smallest value? (a) 4 (b) 1/23 (c) 49/20
c
What is the second smallest value in -496.6, -7, 0.3, -1?
-7
What is the fifth biggest value in -2/13, 2/15, -7, -3, 9/2?
-7
What is the second biggest value in -1, -2/1871, 0?
-2/1871
What is the smallest value in -29/9, 1, 453?
-29/9
What is the smallest value in 5, -1716.2, 0, 4?
-1716.2
What is the third biggest value in -3/5, -0.08, -2, -3698?
-2
Which is the third biggest value? (a) -0.6 (b) -1 (c) -2764 (d) 0.5 (e) -2/7
a
What is the biggest value in 3/259, 0.0057, -2?
3/259
Which is the fourth biggest value? (a) 4/5 (b) 0.5 (c) 0.004 (d) -2.5 (e) -2
e
What is the fourth biggest value in 11, -1, 2, 3?
-1
What is the smallest value in 259, -26, 1?
-26
What is the biggest value in 57, 1/5, 5, -0.4, -3, 2/7?
57
Which is the second biggest value? (a) 13 (b) -0.1 (c) 4074
a
What is the biggest value in 4, 1, -0.00272?
4
What is the smallest value in -0.5, 7, 137, 1/4, 0.3?
-0.5
What is the smallest value in 4, 2, -0.01, -599, 0.5, -1/3?
-599
Which is the third smallest value? (a) 0.3 (b) -2 (c) -1041 (d) 59
a
What is the biggest value in -29, 1.88, 2, -4?
2
Which is the third biggest value? (a) -912 (b) 2/5 (c) -16
a
Which is the third biggest value? (a) 11 (b) -3 (c) -15/14 (d) -2/41
c
Which is the third biggest value? (a) -4 (b) 131594 (c) -3
a
What is the second biggest value in 3176, 0.5, 2, -0.26?
2
Which is the fourth smallest value? (a) -2/7 (b) -1317 (c) 0.3 (d) -1 (e) 3 (f) -1/10
f
Which is the smallest value? (a) -1/4 (b) 5 (c) -12252 (d) -1/3 (e) -2/11 (f) -1
c
What is the biggest value in 0.05, -190, -2?
0.05
Which is the smallest value? (a) -3/7 (b) -48 (c) 3/8 (d) 16 (e) -1/3
b
Which is the smallest value? (a) -4/3 (b) -7/5849 (c) -3 (d) 4/3 (e) 5
c
What is the biggest value in 0, 1/12, -357?
1/12
Which is the second biggest value? (a) 1 (b) 0.01 (c) -1367 (d) 6
a
Which is the third smallest value? (a) 2/5 (b) -1/4 (c) -3.7 (d) -2/11
d
What is the fourth biggest value in 0.8, -3, -43, -0.4, 0.3, 2/79?
-0.4
What is the third biggest value in 0.06697, 3, 56?
0.06697
Which is the smallest value? (a) 83/50 (b) -2 (c) -1
b
Which is the smallest value? (a) 1/3 (b) 0.0189 (c) -1 (d) -8/7
d
Which is the second biggest value? (a) -19 (b) -0.146 (c) -1/4 (d) -0.001
b
What is the second smallest value in -20, 0.1, -3, 1/6?
-3
What is the sixth smallest value in -18, -3, -0.3, 50, -2/5, -2?
50
Which is the third biggest value? (a) -7 (b) 2/15 (c) 956
a
Which is the smallest value? (a) -0.3 (b) 0.2 (c) 38 (d) 0.282
a
What is the biggest value in 4/231, 8, 4?
8
What is the second smallest value in 323, 1, 3, -0.3?
1
What is the smallest value in -1/4, -11, -5, -73?
-73
Which is the fourth smallest value? (a) -5 (b) -492 (c) 0.4 (d) 1 (e) -2/49
c
Which is the third smallest value? (a) 3.5 (b) -1/13 (c) -0.4
a
Which is the second smallest value? (a) 1 (b) 343 (c) 5 (d) 11 (e) 0.2
a
Which is the fourth biggest value? (a) -62/199 (b) 0.5 (c) 2/9 (d) 4
a
What is the fifth smallest value in 20, 3, 2, -182/5, -2/3?
20
What is the smallest value in -2/3, -6/7, 216?
-6/7
Which is the third biggest value? (a) -1/4 (b) 0.16 (c) 8 (d) 4 (e) -2/19
b
What is the third smallest value in 0, -1, 1/6, -8, 4?
0
Which is the fourth biggest value? (a) -0.4 (b) 0.05 (c) 0.4 (d) 1/3 (e) -0.12
e
Which is the fourth biggest value? (a) 182 (b) -3 (c) 2 (d) 3 (e) -1/4
e
What is the third smallest value in 21, 16, 1/5?
21
What is the sixth biggest value in 2/11, 60/13, -2, 3, 20, 2?
-2
What is the smallest value in 4.5, 2/9, -45, -1/7, -5?
-45
Which is the fourth biggest value? (a) -2/5 (b) 3236 (c) 2 (d) -2/7 (e) 1/2
d
What is the third biggest value in -288, 4, -0.04, -0.1, -5, 5?
-0.04
Which is the second biggest value? (a) -8 (b) 12 (c) 33 (d) -2/53
b
What is the fourth biggest value in -5, 6, 0.096, -1/4?
-5
What is the biggest value in -0.4, 0.1, 92/9, -1/3, 292?
292
What is the third smallest value in 1/3, -1/3, -29601?
1/3
Which is the smallest value? (a) 0.059 (b) 258 (c) 0
c
What is the second biggest value in 5/4, 2, 1/10, 3545, 0?
2
What is the third biggest value in 0, -3438, -1?
-3438
Which is the third biggest value? (a) -1 (b) 0.3 (c) -18441
c
What is the second smallest value in -3/4, -1631, -242?
-242
What is the fifth smallest value in -2, -4/45, 19, -4, 2/9?
19
Which is the third biggest value? (a) 32/17 (b) -1/5 (c) -3/7 (d) -60 (e) 17
b
What is the biggest value in -3/4, -4, -0.5, -15, -2, -0.01?
-0.01
Which is the second biggest value? (a) 0.2 (b) 65/4 (c) 1 (d) 1/7 (e) 4
e
Which is the smallest value? (a) 961 (b) 0.2 (c) -0.016
c
Which is the fifth smallest value? (a) 183 (b) 0.5 (c) 4 (d) -0.5 (e) 21 (f) 5
e
What is the sixth biggest value in -0.5, 3/10, 1/9, -0.22, 2/53, 0.02?
-0.5
Which is the third biggest value? (a) 0 (b) 5 (c) 2 (d) -0.3 (e) -1932 (f) -5/3
a
Which is the biggest value? (a) 47.7 (b) -3/5 (c) 0.0215
a
What is the fifth smallest value in 0, 59, -1/6, 7, -29, 0.4?
7
Which is the second smallest value? (a) -33 (b) -1.4 (c) -0.92
b
Which is the fourth biggest value? (a) 0.01 (b) 2/13 (c) 2/3 (d) 7 (e) 5
b
What is the fourth biggest value in -18, -1, 0, 1009, 3, 0.02?
0
Which is the biggest value? (a) 0.3 (b) 2/13 (c) -2/3 (d) 2/17 (e) -44.9
a
Which is the second smallest value? (a) -707 (b) -4 (c) -22/7 (d) -0.06 (e) -1/5
b
What is the third biggest value in 319, -14, -1.8?
-14
Which is the smallest value? (a) 5 (b) -443498 (c) 0.3
b
Which is the biggest value? (a) 1/6 (b) -0.11 (c) -12 (d) -4 (e) -2/13 (f) 0.1
a
Which is the biggest value? (a) -5 (b) 0.5 (c) 1 (d) 4858
d
Which is the smallest value? (a) 4 (b) -2/5 (c) -272 (d) -4/9
c
Which is the fifth biggest value? (a) -0.1 (b) -11/85 (c) -8 (d) 3 (e) 1/5
c
What is the biggest value in 0.3, 1176, 0.1?
1176
Which is the third biggest value? (a) -10/291 (b) 2 (c) -2 (d) -0.11
d
Which is the fifth biggest value? (a) -1/4 (b) -5 (c) -3 (d) -0.5 (e) -0.545
b
Which is the fifth smallest value? (a) 2 (b) -84 (c) 1 (d) 1/2 (e) 5/3
a
Which is the biggest value? (a) -5 (b) 321.72 (c) 4/3
b
What is the fourth smallest value in -6, 2, -24772/5, -0.1?
2
Which is the third smallest value? (a) 10075 (b) -7 (c) -0.4 (d) 0.4
d
Which is the smallest value? (a) 102.962 (b) -1.4 (c)
|
2023-10-18T01:26:28.774034
|
https://example.com/article/6386
|
687 F.Supp. 67 (1987)
Daniel SILVERMAN, Regional Director of Region 2 of the National Labor Relations Board For and on Behalf of the NATIONAL LABOR RELATIONS BOARD, Plaintiff,
v.
EHRLICH BEER CORP., Defendant.
Irving Ehrlich, President Scott Ehrlich, Respondents in Contempt Proceeding.
No. 87 Civ. 0100 (LBS).
United States District Court, S.D. New York.
December 21, 1987.
*68 N.L.R.B., New York City (Elbert F. Tellem, Acting Regional Director, Carole Sobin, of counsel), for plaintiff.
Arthur Liberstein, New York City, for respondents.
MEMORANDUM & ORDER
KEVIN THOMAS DUFFY, District Judge:
In this proceeding the National Labor Relations Board ("NLRB" or "Board") attempted to have this court find the respondents in contempt of an order directing them to offer reinstatement to certain employees or to place them on a preferential hiring list and further to post a notice to employees in the work place.
After a full and fair hearing, this court, on June 4, 1987 refused to hold the respondents in contempt and requested that defense counsel submit an affidavit in connection with an award of counsel fees. Defense counsel submitted the requested affidavit on June 8, 1987. It is uncontroverted that the affidavit was served on the NLRB before it was filed with the court.
I waited what I considered a reasonable time (over four weeks) for a response from the NLRB, but none was forthcoming. On July 8, 1987 I filed a Memorandum and Order making findings of fact and conclusions of law and awarding counsel fees to respondents. Specifically I found that:
[n]o credible evidence has been presented that Muniz was discharged or Mendez not rehired for reasons other than that Ehrlich no longer required their services. The NLRB alleges that other employees have been hired to fill the positions at issue, that Ehrlich has contracted out work formerly performed by the discharged employees, that Ehrlich indeed has work that at least some of the discharged employees could perform, and that Ehrlich has not posted the required notice. However, the NLRB offers no *69 proof of these allegations. No NLRB representative has visited the Ehrlich premises to explore the circumstances.
Memorandum and Order of July 8, 1987, at 5, (emphasis added).
After the NLRB had finished with its direct case, the respondents put in their evidence. As to the Ehrlichs' defense, I found as follows:
Finally, Ehrlich presents credible evidence, uncontroverted by the NLRB, that it has complied with the March 4, 1987 Order. Ehrlich asserts that for the fiscal year ending June 30, 1986 it made only $5,000 profit. Since then, it claims to have broken even, and may have experienced a net loss. Because of these conditions, Ehrlich claims that the operational changes that terminated the positions of the employees at issue were motivated by a need to increase its efficiency in order to remain in business. Ehrlich also asserts that the notice required by the March 4, 1987 Order was posted on its premises.
Memorandum and Order of July 8, 1987, at 6.
I also awarded counsel fees in the amount of $4,200. This Order clearly terminated the contempt proceeding.
No Notice of Appeal was ever filed. No application for rehearing or reargument of the contempt proceeding was ever made. Instead, on August 7, 1987, the NLRB filed this motion to vacate the award of attorneys fees. The NLRB posits its motion on the following grounds:
1) that the Board did not have the opportunity to respond to respondents' application for attorneys fees (Memorandum of Law of the National Labor Relations Board in Support of Motion to Vacate Award of Attorneys' Fees or in the Alternative Response of Petitioner to Application by Respondent for Attorneys' Fees Pursuant to the Equal Access to Justice Act ("Board's Memo" at 4);
2) that the application was made in the attorney's name rather than in the name of the respondents in the contempt proceeding (Board's Memo at 4-5);
3) that there was no final judgment entered in the proceeding, thus rendering the award premature (Board's Memo at 2-3); and
4) that the initiation of the contempt proceeding was not "unwarranted" because the Board made out a prima facie case for contempt and the result depended mostly on credibility (Board's Memo at 5-18).
The first three arguments are meritless. The Board cannot argue that it did not have notice of the application or opportunity to respond when Ms. Carol Sobin, the attorney handling this matter for the Board, was present in court when I told defense counsel to file the affidavit for attorneys fees. Proof that the affidavit was served four days later is adequate to establish that someone at the Board had knowledge of the affidavit. It seems clear that the movant here intentionally made a choice not to reply. Having made that choice it ill behooves the Board to complain about not having had an opportunity to respond.
The argument that the application is not in proper form because the affidavit is sworn to by the attorney is similarly meritless. Who else could swear to an affidavit concerning how many hours the attorney expended in the defense of the Board's application? Certainly that affidavit could not be signed by the respondents.
The argument advanced by the Board that there is no final judgment in this proceeding is likewise meritless. The contempt proceeding is a separate proceeding, ancillary to the main action. If the respondents had been held in contempt, they would clearly have had the right to appeal from a final order. Similarly, my dismissal of the contempt proceeding constituted a final Order from which the Board could have appealed. Since no Notice of Appeal was ever filed by the Board, the dismissal of the proceeding is final.
In dealing with the fourth argument raised by the Board, I believe it is necessary to emphasize certain fundamentals which can bear repetition. First, an attorney *70 in the employ of the government is not on the same footing as a private attorney. He or she has the august majesty of the sovereign behind his or her every utterance; the economic power in the hands of some individual government lawyers can wreak total devastation on the average citizen. As a result, the attorney representing the government must be held to a higher standard than that of the ordinary lawyer. This rule is particularly appropriate when the government attorney is bringing charges, even quasi-criminal in nature, against the ordinary citizen. Contempt proceedings are at least quasi-criminal; they can result in fines and imprisonment. In the usual criminal proceeding the public is protected from an over-zealous prosecutor by the institution of the grand jury. There is no such safeguard in a contempt proceeding. Thus, the law must require other safeguards to protect innocent citizens.
Fed.R.Civ.P. 11 exists partly to protect against ill-considered and frivolous contempt proceedings. In particular, Rule 11 provides that:
[t]he signature of an attorney or party constitutes a certificate by the signer that the signer has read the pleading, motion or other paper; that to the best of the signer's knowledge, information, and belief formed after reasonable inquiry it is well grounded in fact and is warranted by existing law.... (Emphasis added).
Another safeguard is the government's burden of proof. It is more stringent in a contempt proceeding than in an ordinary civil case. It is not enough to prove that the alleged contemnor did the offending act by a fair preponderance of the evidence. The complainant must prove the contempt by clear and convincing evidence.
A final safeguard is Rule 43 of the Local Rules of the Southern District of New York. It provides that upon dismissal of a contempt proceeding "a reasonable counsel fee" may be recovered against the complainant. This rule has applied to all parties except the government, by reason of sovereign immunity, until recently when the Equal Access to Justice Act ("EAJA") applied that rule to the government. 28 U.S.C. § 2412 (1982 & Supp. III).
Thus, the law protects citizens from being named respondents in unwarranted contempt proceedings by requiring:
1) that there be an investigation prior to the time that the contempt proceeding is filed;
2) that the complainant meet a higher standard of proof than that required in an ordinary civil case; and
3) that the complainant face the potential economic sanction of paying reasonable attorneys fees if the proceeding is dismissed.
With these requirements in mind, I turn to set out the reasons for which I required the payment of attorneys fees in this case.
First, the attorney handling this matter did not even attempt to do the investigation required by Fed.R.Civ.P. 11. An attorney must do something more than act as a scrivener for his client's complaints; he must do a reasonable investigation to make sure that there is some foundation for those allegations. As I have stated before, Rule 11 applies to the government and government lawyers. Equal Employment Opportunity Comm'n v. Waterfront Comm'n, 665 F.Supp. 197, 200, Memorandum & Order of April 22, 1987 (S.D.N.Y.). Here no investigation was made. This is not a situation where the attorney and client are bereft of assets. The government has the funds to do an investigation. Indeed, the NLRB has investigators on its payroll. All that would have been necessary was for an investigator to visit the respondent's place of business to determine if the notice was posted and if the respondents had in fact replaced the protected employees. This visit, however, was not made. As far as I can ascertain, a complaint was made by Mendez, obviously an interested person with a great deal of animus for the respondents, and the action was instituted. The absence of any real investigation doomed the proceeding. This does not meet the requirements of Rule 11.
*71 As set out in my Memorandum and Order of July 8, 1987 [available on WESTLAW, 1987 WL 46937]:
The NLRB alleges that other employees have been hired to fill the positions at issue, that Ehrlich has contracted out work formerly performed by the discharged employees, that Ehrlich indeed has work that at least some of the discharged employees could perform, and that Ehrlich has not posted the required notice. However, the NLRB offers no proof of these allegations.
Memorandum and Order of July 8, 1987, at 5. What a difference it would make if the Board could have pointed to any person hired to fill the positions at issue, to the other parties to the contracts under which the work formerly performed by the discharged employees was contracted out, or to the work that was available for the discharged employees. Contrary to the Board's argument, this is not a question of credibility this is a total failure of proof.
Accordingly, this contempt proceeding cannot be deemed "substantially justified," as the Board argues. I have already indicated that the case did not meet the requirements of Rule 11. It follows that it cannot be deemed "substantially justified" for purposes of the EAJA. See the comprehensive discussion of this axiom by Chief Judge Weinstein in Zimmerman v. Schweiker, 575 F.Supp. 1436, 1440-1 (E.D. N.Y.1983).
The only question remaining is whether I calculated the award of attorneys fees properly under the EAJA. The NLRB argues that the award of counsel fees is improper because it exceeds $75 per hour, the rate set by the EAJA. 28 U.S.C. § 2412(d) (2)(A) (1982 & Supp. III). The short answer to the NLRB's argument is that it comes too late. If the Board was to be heard on this question, it should have made these arguments prior to the time the award was made. Furthermore, the EAJA provides for flexibility in the amount of attorneys fees awarded under the statute in appropriate cases. Id. While I am not known for largesse with the federal fisc, this case demands the payment of fees at a rate higher than the ordinary. Because of the NLRB's failure to properly investigate and present this case, the burden fell to the defense attorney not only to defend but also to do the work normally undertaken by the NLRB. Only a skilled attorney, living by the highest standards, would undertake to do this. This was done with tact and without recrimination.
Finally, I consider whether attorneys fees should be paid to counsel for respondents for his work resisting this motion by the NLRB to vacate the award of attorneys fees. I am sure that this payment must be made. The Court of Appeals for this Circuit has recently reminded us that lawyers are entitled to be compensated for time spent in the application for fees under the EAJA. See Trichilo v. Secretary of Health and Human Serv., 832 F.2d 743, 744-745 (2d Cir.1987) (per curiam). It follows that resisting an untimely and frivolous motion concerning fees under EAJA should also be compensated. A further award of $975 is deemed appropriate.
The Board's motion to vacate the award of attorneys fees is denied. The award is to be increased by $975.
SO ORDERED.
|
2024-02-09T01:26:28.774034
|
https://example.com/article/8039
|
1. Technical Field
The present invention relates to a demodulation method and a demodulation device for demodulating data of a navigation message modulated by the BPSK (Binary Phase Shift Keying) modulation system.
2. Related Art
As a positioning system utilizing a position signal, the GPS (Global Positioning System) is widely known and used for a receiving device installed inside a mobile phone, car navigation system and the like. In the GPS, the positions of plural GPS satellites, the pseudo-distance from each GPS satellite to the receiving device and the like are found, using clocked time of the GPS receiver, and ultimately the position is computed.
A GPS satellite includes information about satellite orbit, time and the like into a navigation message and transmits the information at a bit rate of 50 bps (bits per second). A navigation message includes a master frame. A master frame includes 25 1500-bit frames.
The receiving environment of GPS satellite signals varies depending on the position of the receiving device and the like. In a weak electric field environment, since the signal intensity of a received signal is very weak, there is a possibility that a change in the bit value (bit transition) of a navigation message cannot be detected accurately, causing an error in demodulation of the received signal. Therefore, as a technique for determining whether a received signal is correctly modulated or not, error detection is known in which whether each word included in each sub-frame of a navigation message is correctly demodulated or not is examined, using an error detection bit included in the navigation message. However, in a weak electric field environment, as described above, since the signal intensity of the received signal is very weak, a change in the bit value (bit transition) of the navigation message cannot be detected accurately. Therefore, in some cases, whether a bit determined as having an error really has an error, and whether the other bits really have no errors cannot be determined accurately. Thus, a technique in which the bit value of each bit is decided by adding a bit transition if there is a bit determined as having an error is known (see, for example, U.S. Pat. No. 5,768,319).
However, U.S. Pat. No. 5,768,319 has a problem that a bit transition is added to all the 1500 bits, that is, even to the bit of a word that is not used for positioning, thus leasing to an increase in memory volume in demodulation processing.
|
2023-10-04T01:26:28.774034
|
https://example.com/article/1924
|
Newborn Photography
October 4, 2016
In home newborn photographer
You just had a beautiful baby. You are amazed at how quickly they are growing day by day. Their little noses and pouty lips will never look the same. What is next? You should most definitely hire an in home newborn photographer.
Indoor photography is an art that only an experienced photographer can master beautifully while using available light. As an in home newborn photographer I focus on my clients comfort right after having a baby. Rather than having to pack everything and head to a studio to a capture your baby’s first professional photos, why not have them captured right in the comfort of your own home. You spent months preparing your baby nursery, you should use that as a backdrop to all of your beautiful newborn pictures.
As your newborn photographer I will go through your house and find the rooms that offer the best available light. Only in desperate measures will I use flash photography. I like to capture the beauty of your house as you know it. No need to clean up everything and have the room in perfect condition (I’m jealous of any new mom that can do this) because I was not one of them!
|
2024-07-10T01:26:28.774034
|
https://example.com/article/8661
|
Still feeding 2-mo old twice a night - help
I am breastfeeding my 10 week old twice during the night still. After the 11pm feeding, I still have to get up to feed him around 2 and then around 5. And then he wakes up around 7am. Shouldn't he be sleeping through the night by now? Or at least feed only once. Why am I still having to feed him about 3 hours at nights. And then during the day, he still eats about every two hours. (I am exclusively BF). He doesn't seem to sleep through the night. I do swaddle him, and that still doesn't seem to get him through the night. Also, do I have to burp him during my night feeds?
I am breastfeeding my 10 week old twice during the night still. After the 11pm feeding, I still have to get up to feed him around 2 and then around 5. And then he wakes up around 7am. Shouldn't he be sleeping through the night by now? Or at least feed only once. Why am I still having to feed him about 3 hours at nights. And then during the day, he still eats about every two hours. (I am exclusively BF). He doesn't seem to sleep through the night. I do swaddle him, and that still doesn't seem to get him through the night. Also, do I have to burp him during my night feeds?
It's completely normal for some babies, my 7 month old DD who is also ebf wakes up every 2-3 hours at night to eat and then on bad nights every hour! When your LO is ready, that's when the sttn will happen.
It's completely normal for some babies, my 7 month old DD who is also ebf wakes up every 2-3 hours at night to eat and then on bad nights every hour! When your LO is ready, that's when the sttn will happen.
Girl I know some moms that would kill u for complaining about waking up twice! lol, my son wakes up 2x as well, and then up at 7:30-8:00. Some days he sleeps until 10:30am. But that's crazy rare!!! My son isn't swaddled. Your baby is on track don't worry. ps I ebf
Girl I know some moms that would kill u for complaining about waking up twice! lol, my son wakes up 2x as well, and then up at 7:30-8:00. Some days he sleeps until 10:30am. But that's crazy rare!!! My son isn't swaddled. Your baby is on track don't worry. ps I ebf
Sttn is five to six hours straight without waking so if your lo is doing this already then lo is already sttn. Some babies sleep longer and others donts, it is not a rule that babies should be sttn, every baby is different. Also if baby wakes up to eat then they are going through a growth spurt
Sttn is five to six hours straight without waking so if your lo is doing this already then lo is already sttn. Some babies sleep longer and others donts, it is not a rule that babies should be sttn, every baby is different. Also if baby wakes up to eat then they are going through a growth spurt
Not to depress you, but I'm still feeding my 9-month old at midnight and at 5:00 am (which is sometimes 3:00 am!), and I bottle feed. I hear breastfed babies actually need to be fed more often too. But don't worry, somehow you'll be less tired and more used to it as the weeks go by...Good luck to you with your little one! :)
Not to depress you, but I'm still feeding my 9-month old at midnight and at 5:00 am (which is sometimes 3:00 am!), and I bottle feed. I hear breastfed babies actually need to be fed more often too. But don't worry, somehow you'll be less tired and more used to it as the weeks go by...Good luck to you with your little one! :)
My LO is 4 months and Ebf. I have a similar schedule (2-3 times during a good night). Bf babies do need to eat more often but it's those sleepy feeds that are so precious since they don't last. Try to sleep when your LO naps to catch up on your sleep. I bf one side usually then change a diaper then the other side but it's whatever works best for you. I recommend contacting Le Leche league for bf advice... Great resource.
My LO is 4 months and Ebf. I have a similar schedule (2-3 times during a good night). Bf babies do need to eat more often but it's those sleepy feeds that are so precious since they don't last. Try to sleep when your LO naps to catch up on your sleep. I bf one side usually then change a diaper then the other side but it's whatever works best for you. I recommend contacting Le Leche league for bf advice... Great resource.
Thanks for all your responses. Helps to know I'm not alone. I was just feeling discouraged when I read about other 2 or 3 month old babies who are STTN and wondered why we were not there yet. But you are right, all babies are different.
Thanks.
Thanks for all your responses. Helps to know I'm not alone. I was just feeling discouraged when I read about other 2 or 3 month old babies who are STTN and wondered why we were not there yet. But you are right, all babies are different.
Hi Kchamp2010. You said you change diapers in b/w breasts. I had tried that a few times ...it worked to wake him up enough to feed the other breast but he would only feed the other side for about 2-3 minutest and stop. And then he was too awake to put back to sleep easily. So now I just feed one side for 10-12 minutes and he's done. THen I put him back to sleep...pretty easily b/c he hasn't really woken up. How do you manage?
Hi Kchamp2010. You said you change diapers in b/w breasts. I had tried that a few times ...it worked to wake him up enough to feed the other breast but he would only feed the other side for about 2-3 minutest and stop. And then he was too awake to put back to sleep easily. So now I just feed one side for 10-12 minutes and he's done. THen I put him back to sleep...pretty easily b/c he hasn't really woken up. How do you manage?
You know what I think when I see stories of 2-3 month olds sleeping through the night? I feel sorry for the hungry babies! At that age, they shouldn't be sleeping through the night! It might be more convenient for the parents, but it isn't best for the baby, especially a breast fed baby who is feeding on demand. Studies have shown that babies who eat more frequently grow more quickly during the first year because their bodies need small, frequent meals to keep a steady supply of energy. My 3 month old eats 2-3 times a night and I have found that co-sleeping makes it much easier for us. He eats when he needs to, and we return to sleep peacefully. He started small--6 lbs when we came home from the hospital--but is now in the 80th percentile for height and 70th for weight. The frequent feedings helped him "catch up" and people always comment on how happy and content he always seems to be. I think it is the frequent attention and closeness that makes him feel safe and secure so I don't mind the night feedings :)
You know what I think when I see stories of 2-3 month olds sleeping through the night? I feel sorry for the hungry babies! At that age, they shouldn't be sleeping through the night! It might be more convenient for the parents, but it isn't best for the baby, especially a breast fed baby who is feeding on demand. Studies have shown that babies who eat more frequently grow more quickly during the first year because their bodies need small, frequent meals to keep a steady supply of energy. My 3 month old eats 2-3 times a night and I have found that co-sleeping makes it much easier for us. He eats when he needs to, and we return to sleep peacefully. He started small--6 lbs when we came home from the hospital--but is now in the 80th percentile for height and 70th for weight. The frequent feedings helped him "catch up" and people always comment on how happy and content he always seems to be. I think it is the frequent attention and closeness that makes him feel safe and secure so I don't mind the night feedings :)
It's actually more normal and natural for a baby to not sleep through the night. I'm sure there is an age where this changes, but definitely not that early. LO is 6 months and still wakes up twice to eat. Trust me, it gets easier with time! :)Oh, and if you want to read an article on that, one I found very helpful is by Dr. Jen called "On Sleeping Through the Night". I'd post the link, but I'm on my phone... a quick google search should pull it up though!
It's actually more normal and natural for a baby to not sleep through the night. I'm sure there is an age where this changes, but definitely not that early. LO is 6 months and still wakes up twice to eat. Trust me, it gets easier with time! :)Oh, and if you want to read an article on that, one I found very helpful is by Dr. Jen called "On Sleeping Through the Night". I'd post the link, but I'm on my phone... a quick google search should pull it up though!
Thank you, ThatWave and SweetBea! Your words will help me get through my night feedings. I think the small frequent feedings makes so much more sense also for their little tummies. I just read the article by Dr. Jen recommended by SweetBea (I think you are referrring to this... http://www.drjen4kids.com/soap%20box/sleep%20stuff.htm).It's great. It makes so much sense and makes me feel so much better.
Thanks so much.
Thank you, ThatWave and SweetBea! Your words will help me get through my night feedings. I think the small frequent feedings makes so much more sense also for their little tummies. I just read the article by Dr. Jen recommended by SweetBea (I think you are referrring to this... http://www.drjen4kids.com/soap%20box/sleep%20stuff.htm).It's great. It makes so much sense and makes me feel so much better.
My 9 week old is the same:( I am up every 2-3 hrs at night and he feeds every 2-4hrs during the day. I am praying he only gets up once during the night very soon, but somehow I don't see this happening. After reading some other stories about you ladies still getting up with 7 month olds?! Oh no!
My 9 week old is the same:( I am up every 2-3 hrs at night and he feeds every 2-4hrs during the day. I am praying he only gets up once during the night very soon, but somehow I don't see this happening. After reading some other stories about you ladies still getting up with 7 month olds?! Oh no!
MY 2 MONTH OLD SLEEPS 6 HOURS AT NIGHT BUT WE GIVE HIM 1 FORMULA BOTTLE BEFORE BED. ALL THE REST OF HIS MEALS ARE BOOBIES BUT I HAD TO GO BACK TO WORK AT 6 WEEKS SO DH FEEDS HIM A FORMULA BOTTLE AND HE LOVES IT. I WORK THIRD SHIFT SO DH GETS ALL THE SLEEP. IT MIGHT WORK FOR YOU
MY 2 MONTH OLD SLEEPS 6 HOURS AT NIGHT BUT WE GIVE HIM 1 FORMULA BOTTLE BEFORE BED. ALL THE REST OF HIS MEALS ARE BOOBIES BUT I HAD TO GO BACK TO WORK AT 6 WEEKS SO DH FEEDS HIM A FORMULA BOTTLE AND HE LOVES IT. I WORK THIRD SHIFT SO DH GETS ALL THE SLEEP. IT MIGHT WORK FOR YOU
The material on this website is provided for educational purposes only and is not to be used for medical advice, diagnosis, or treatment, or in place of therapy or medical care. Use of this site is subject to our terms of use and privacy policy
Advertising Notice
This Site and third parties who place advertisements on this Site may collect and use information about your visits to this Site and other websites in order to provide advertisements about goods and services of interest to you. If you would like to obtain more information about these advertising practices and to make choices about online behavioral advertising, please click here
|
2024-07-01T01:26:28.774034
|
https://example.com/article/4915
|
Parents
Carbohydrates and Diabetes
Carbohydrates, like proteins and fats, are one of the three main components of food that provide energy and other things the body needs. They should be part of a healthy diet for all kids, including kids with diabetes.
But carbohydrates (carbs), which are found in foods such as bread, fruit, and candy, can affect a person's blood sugar level. So kids with diabetes might need to track how many carbohydrates they eat.
Following a meal plan can help kids balance carbs with medications and exercise so that they maintain healthy blood sugar levels. Like exercising and testing blood sugar regularly, tracking carbs is just another step many kids with diabetes take to stay healthy.
Carbohydrates and Blood Sugar
The two main forms of carbohydrates are sugars and starches. Types of sugars include fructose (sugar found in fruit and some baked goods), glucose (the main sugar in our bodies that's also found in foods like cake, cookies, and soft drinks), and lactose (sugar found in milk and yogurt). Types of starches include vegetables like potatoes, corn, and peas; grains, rice, and cereals; and breads.
The body breaks down or converts most carbs into glucose, which is absorbed into the bloodstream. As the glucose level rises in the blood, the pancreas releases the hormone insulin. Insulin is needed to move glucose from the blood into the cells, where it's used as an energy source.
In people with diabetes, the pancreas does not make enough insulin (type 1 diabetes) or the body can't respond normally to the insulin that is made (type 2 diabetes). In both types of diabetes, glucose can't get into the cells normally, so a person's blood sugar level gets too high. High blood sugar levels can make people sick if they don't receive treatment.
Carbs Can Be Part of a Healthy Diet
Eating carbohydrates makes blood sugar levels rise, but that doesn't mean that people with diabetes should avoid them. In fact, carbs are a healthy and important part of a nutritious diet.
For everyone — including people with diabetes — some carbohydrate-containing foods have more health benefits than others. Whole-grain foods, vegetables, candy, and soda all have carbohydrates. But fruits, vegetables, and whole-grain foods are generally healthier than sugary foods like candy and soda because they provide fiber, vitamins, and other nutrients.
On the other hand, some foods containing carbs — like sugary snacks — contain "empty calories." That means their calories lack nutritional value. Eating too many empty calories can contribute to being overweight or obese and can crowd out more nutritious foods from a daily diet. These foods can also cause tooth decay.
Fiber is the one type of carbohydrate that does not raise blood sugar. Everyone needs fiber — it helps you feel full and keeps the digestive system running smoothly. Most people don't get enough of it. Some experts think that people with diabetes should have more fiber than others to help control blood sugar levels.
Whichever type of carbohydrates your child eats, remember this: Generally, the amount of sugar that gets into the blood after eating depends on the amount of carbs eaten, not the type of carbs. So basically, as far as managing diabetes is concerned, a carb is a carb. Again, the one exception to this is fiber: It is the one type of carbohydrate that does not raise blood sugar because the body doesn't digest or absorb it.
Your goal is to help your child achieve the right balance between the insulin in the body and the carbs in food.
Balancing Carbohydrates
In addition to serving a balanced diet of carbs, proteins, and fats, you can also help keep your child's blood sugar at a healthy level by:
making sure blood sugar is tested regularly
encouraging plenty of exercise
making sure your child gets insulin and other medications for diabetes according to schedule and in the right amounts
Following a meal plan helps kids with diabetes track their carbohydrate intake. You'll work with your child and the diabetes health care team to create a meal plan that will include general guidelines for carbohydrate intake. The team will consider your child's age, size, weight goal, exercise level, medications, and other medical issues, and will try to incorporate foods your child enjoys.
Usually, it's easier for most people with diabetes to control their blood sugar levels if they eat carbs in fairly consistent amounts and at regular times each day.
Three general types of meal plans can help achieve the proper balance:
An exchange meal plan lists items in six food groups and sets a serving size for each food. You can mix and match the foods while keeping track of what your child is eating, including how many carbohydrates.
With the constant carbohydrate meal plan, people eat about the same amount of carbs and other foods every day. This can be a good approach for those who take insulin only once or twice a day or who don't take insulin at all to control their diabetes.
The third type of plan, carbohydrate counting, matches a person's insulin dosage to the amount of carbs eaten. This plan offers more flexibility and can be a good fit for people who take insulin with each major meal and snack.
Keeping Carbs in Check
Kids may be tempted to sneak sugary snacks between meals without accounting for insulin coverage. You might discuss this with your child, even if it hasn't happened yet. It's healthier to create open communication about food instead of making kids feel like they need to hide dietary slip-ups.
Emphasize that most people eat unhealthy snack food occasionally, but eating lots of sugary junk foods can make it hard to keep a healthy blood sugar level, especially for kids who don't take insulin. And it can lead to weight gain and painful cavities!
If you're not sure how many carbohydrates a food contains, check the food label or ask someone — like a waiter or chef — about unlabeled foods like restaurant entrees.
Also, check the labels of diet foods. These foods may contain extra sugar as a substitute for fat calories. Try to include your child or teen as you evaluate and select healthy carbohydrate-containing foods. With your guidance and the meal plan, your child can begin to choose foods and learn how carbs affect blood sugar.
By taking a smart approach to balancing carbohydrates, medications, and activity, you can help your child enjoy food and stay healthy at the same time.
|
2023-11-29T01:26:28.774034
|
https://example.com/article/3708
|
A Mother Brings Her Son To be Shot
When Kevin Barry O’Donnell is introduced to us, it comes as a shock as this child, who can’t be more than thirteen, explains how tools such as a hammer, saw, and axe, can be used as weapons. The mother and son that the film title refers to are his mother, Majella O’Donnell, and older brother, Philly, and in this documentary, shot over a period of five years, we learn just how the titular incident occurred, what its aftermath was on the family, and how the event reflects wider politics in contemporary Northern Ireland.
‘A Mother Brings Her Son to Be Shot’ looks at what has happened in Derry following the Troubles and Good Friday Agreement. Primarily it is concerned with how in a place where the police have little support, the community takes action against those exhibiting anti-social behaviour. One of the vigilantes’ victims is Philly, whose mother took him to be shot in the legs when it was threatened that he would be killed if he wasn’t punished.
As well as Majella, Philly and Kevin Barry – the latter of whom is truly frightening, at one point gleefully detailing to his shaken mother the different types of guns and bullet wounds – other figures we are introduced to who reflect the times include Hugh Brady, a former IRA member now working with the Rosemount research centre, whose job is to mediate between armed dissident groups and the individuals they deem problematic. We also meet Darren O’Reilly and follow his campaign as an independent candidate running for Derry County Council, but the film’s emotional pivotal hook remains the O’Donnell family.
The system that has developed in Derry – where people don’t report IRA incidents for fear of being deemed an informer, and where so-called ‘punishment shootings’ are accepted as part of life – seems bats**t crazy to us, but it is the reality. The conflicting accounts given by every documentary subject shows them all trying to push their own agenda. Such different perspectives are hard to reconcile and there is no resolution in sight, no solution that suits everyone. Certainly the use of violence is causing more harm than good, as reflected by the alarming documentation of suicide rates in Derry.
The director behind the film, Sinéad O’Shea, has made an extraordinary film that packs much discernment and information into a film that is only about 80 minutes long. She herself features in the documentary in an investigative journalist role, and does an excellent job of knowing what questions to ask to get people to start to open up, and knowing when she can push that bit further to get more in-depth answers. This cannot be an easy task given the hazardous nature of the place she is in and people she is surrounded by.
What O’Shea has given us is an eye-opening, rattling insight into modern-day Northern Ireland, where few outside the place realise that the war is far from over.
|
2023-10-22T01:26:28.774034
|
https://example.com/article/5380
|
Earlier this week, a Russian state hospital said that Navalny had tested negative for poison, but his personal doctor, Anastasia Vasilyeva, warned the findings were inconclusive and could be wrong. Navalny's allies have taken the T-shirt the opposition leader was wearing when he fell ill as well as hair samples in order to get an independent test carried out.
Russian labs are “afraid” to test samples taken from jailed opposition leader Alexei Navalny after he was briefly hospitalized with an acute allergic reaction which he claims was the result of poison, his personal doctor has said.
Independent examinations of Navalny’s samples “turned out to be difficult in Russia, everyone is afraid,” Vasilyeva, told the MBKh Media news website Thursday.
Vasilyeva added that the samples would be sent abroad, despite the high costs, if Russian toxicology labs continued to refuse to carry out tests.
Navalny filed an official complaint Thursday saying he was poisoned while in custody on Sunday, his lawyer said on social media. His legal team has asked investigators to conduct a forensic examination to identify the agent used, and to examine the video surveillance in Navalny's detention room, the lawyer added.
Navalny was jailed for 30 days last week for urging people to take part in unauthorized protests in Moscow last Saturday.
Police detained more than 1,300 people at the rally in one of the biggest crackdowns of recent years on an increasingly defiant opposition decrying the Kremlin’s tight grip on power.
Russian police have so far identified 10 key suspects involved in what they call mass civil unrest and have already made five arrests, investigators said on Thursday.
The Investigative Committee said ahead of another opposition protest planned this Saturday that police planned to arrest more people suspected of involvement in unrest. Charges of organizing mass civil unrest in Russia carry a penalty of up to 15 years in jail.
Reuters contributed reporting to this article.
|
2023-08-24T01:26:28.774034
|
https://example.com/article/1912
|
Q:
How to update specific column without duplicate and like replace the value
I need to update a row in my table.
This task like a replace the value of specific column in table.
I'm not using PRIMARY KEY or UNIQUE KEY (Because I can't insert duplicate value in that particular column).
+-----+-----+-----+
| id |col1 |col2 |
+-----+-----+-----+
| 1 | a | 404 |
+-----+-----+-----+
| 2 | b | 22 |
+-----+-----+-----+
Now I update my table :
UPDATE table_name SET col2 = 0 WHERE col2 = 404;
UPDATE table_name SET col2 = 404 WHERE id = 2;
This result I want.
+-----+-----+-----+
| id |col1 |col2 |
+-----+-----+-----+
| 1 | a | 0 |
+-----+-----+-----+
| 2 | b | 404 |
+-----+-----+-----+
I have used two query in order to get it done.
Is there any possible function in a single query?
(OR)
is there any simpler method?
A:
You could use a case expression:
UPDATE table_name
SET col2 = CASE col2 WHEN 0 THEN 404 WHEN 404 THEN 2 END
WHERE col2 IN (2, 404);
But frankly, using two separate statements seems clearer to me.
|
2023-08-19T01:26:28.774034
|
https://example.com/article/9540
|
Study of the interaction between rabbit cardiac contractile and regulatory proteins. An in vitro motility assay.
A series of experiments was performed in an in vitro motility assay with reconstructed thin filaments to obtain pCa-force relationships for cardiac isomyosins V1 and V3. Two concentrations of each isomyosin (200 and 300 microg/ml) on the surface of a flow cell were tested. Isometric force was estimated as the amount of actin-binding protein, alpha-actinin, stopping thin filament movement. It was found that the amount of alpha-actinin stopping the movement at saturating calcium concentration for V3 was twice higher than for V1 at both concentrations of isoforms. Hill coefficients of cooperativity (h) were determined for pCa-force relationships. The value of h did not differ significantly for isoforms at 300 microg/ml of protein (h was 1.56 for V1 and 1.54 for V3). However, the Hill coefficient was higher for V3 isoform at 200 microg/ml (h = 2.00 and 1.76 for V3 and V1, respectively). Importantly, the Hill coefficient increased for both isoenzymes when their concentrations were decreased. The connection between Hill coefficient and cooperative interactions between cardiac contractile and regulatory proteins is analyzed in detail.
|
2024-01-28T01:26:28.774034
|
https://example.com/article/8023
|
Q:
What's the name of that old Italian comedy movie with a suitcase full of money?
So I saw part of this movie in an Italian restaurant (with English subtitles) and it seemed really funny so here are all the details I remember :
The movie is old, Italian, black and white, probably from the 50's
The characters are all trying to get a suitcase with a lot of money in it since they are poor
They steal it from a guy who asks them to knock him off so that he can say it was stolen and he couldn't do anything about it
They had a technique so that their car could change color and that it won't be recognized by the police
There is a man that was hidden in a dumpster and goes back to his wife to tell her they're about to be rich since his friends found the suitcase
That's about all that I can remember since it was playing during a dinner with my family in the background of the restaurant.
A:
That'd be L'audace colpo dei soliti ignoti (see here for the English Wikipedia and here for the Italian one, with more details), also known as Fiasco in Milan, directed in 1959 by Nanni Loy, with Vittorio Gassman, Renato Salvatori and Claudia Cardinale.
It was a sequel to the more renowned I soliti ignoti (1958) by Mario Monicelli.
(I am not sure whether it is legit, but the film can be found on YouTube, with the not-exactly-hi-tech colour-changing car from 56:20.)
|
2023-12-07T01:26:28.774034
|
https://example.com/article/4505
|
Q:
What is the best way to improve my cycling distance over mountainous terrain?
So for years I've been doing long distance biking from my home on my mountain bike, and recently I've been trying to push north into the Hudson Valley. However, even though I'm pretty decent at handling very long, non-stop bike rides, the mountainous terrain has made things extremely difficult for me to keep going past the first two bike path (especially since I have to already clear a good 10 mi. to get there).
Does anyone have any tips for improving the distance I can cover on my bike when it comes to mountainous terrain?
A:
You and I are in a similar place. I can do 150 km flat rides with no problem, but 1000 metres of elevation increase wears me out.
So the longterm solution is to practice by doing more. I've set a climbing goal in strava of 50 km vertical for the calendar year 2017. As of Jan 15 I have done 3,435 metres, which is well on track, but its summer here.
Technique helps - learning to gain momentum from any downhill or flat bit and then carry that momentum as far up the next slope as possible. Don't coast down grades.
Pacing is a big thing too - working your body to a point that is not your maximum, so you can maintain a speed up the whole climb. No point going mad for the first quarter and then needing a rest stop.
Equipment - climbing is hard work. I have an unfashionable road bike with a triple front, and a low gear that's below 1:1 (ie 26 teeth on the front and 28 on the rear cassette largest cog) Roadies look down on triples, but this is about YOUR performance, not theirs. Many MTBs had triple chainrings too, but 1x have become more popular lately.
In short, you might benefit from adding bigger gears, so that you can increase your cadence while climbing. Mashing is not as efficient as spinning up a steep grade. This might mean changing your cassette for a larger one, or having a choice of rear wheels available.
Weight - If you're lugging 2 bottles of water up, do you need them? Its hard to justify carrying stuff that you might need, but some things like pumps are non negotiable. Are you carrying too much food?
On the same vein - your bike's weight. I changed from a 20 KG steel MTB to a 12 KG aluminium road bike and my segment times all dropped by 10% immediately.
This image shows how much of your energy goes into different things as the slope increases. This one is aimed at MTB riders, road is worse.
Timing - riding in the heat takes energy out of you. Consider riding when its cooler, like earlier morning rather than noon or afternoon. Also, looking at the local weather forecast for a nice tailwind could help your climb.
Training - Doing specific training to target climbing, like hill intervals where you go hard-out up a grade for 30 seconds and then 2 minutes of relaxed climbing. Repeat 6-10 times.
Motivation - go out riding with someone who is better than you. Track your progress on climb segments in Strava, to see your progress. Here's an 800 metre segment at the top of a climb, where I got a PR today. You can clearly see a decrease in my times over the last 20 months. A bit more work and I might get to half the initial time, which would be awesome!
Other than that - practice. You can't improve without doing.
A:
Have you monitored your cadence during your climbs? Or asked differently: why can't you climb further? Is it because your legs give in or because your whole system us exhausted?
Two things I can recommend:
Nutrition. Eat and drink enough during your ride.
Do some intervals in your training. Besides your long and steady rides, spice up your training with intervals. You could do something like 2-3min with a cadence of 60 and 1min rest for something like 4-6 times.
|
2024-03-15T01:26:28.774034
|
https://example.com/article/5721
|
Relatives say at least five US citizens, including four children, who live in a religious community in northern Mexico were killed in a shooting attack they suspect may have been a case of mistaken identity by drug cartel gunmen.
As many as 13 other members of La Mora — a decades-old settlement in Sonora state founded as part of an offshoot of The Church of Jesus Christ of Latter-day Saints — were missing after the attack on a convoy of three SUVs carrying community members, said a relative who asked not to be named for fear of reprisals.
The relative said he had located the burned-out, bullet-ridden SUV containing the remains of his nephew’s wife and her four children — twin 6-month old babies and two other children aged eight and 10.
Authorities in Sonora state and the US Embassy did not immediately respond to requests for comment.
Mexico’s federal Department of Security and Citizens’ Protection said security forces were reinforced with National Guard, army, and state police troops in the area following “the reports about disappearance and aggression against several people.” The troops were searching for the missing community members, believed to include 11 children or more.
Another relative, Julian LeBaron, said on his Facebook page the dead woman was Rhonita Maria LeBaron.
The first relative said a convoy of three vehicles had set out Monday from La Mora, about 110 kilometers south of Douglas, Arizona, but was attacked by cartel gunmen in a possible case of mistaken identity by gunmen. Many of the church’s members were born in Mexico and thus have dual citizenship.
While he said he found the first vehicle, the other two SUVs were missing along with their passengers.
Jhon LeBaron, another relative, posted on his Facebook page that his aunt and another woman were dead, which could bring the death toll to at least seven. He also posted that six of his aunt’s children had been left abandoned but alive on a roadside.
It would not be the first time that members of the break-away church had been attacked in northern Mexico, where their forebears settled — often in Chihuahua state — decades ago.
In 2009, Benjamin LeBaron, an anti-crime activist who was related to those killed in Monday’s attack, was murdered in 2009 in neighboring Chihuahua state.
Last Update: Wednesday, 20 May 2020 KSA 09:56 - GMT 06:56
|
2023-11-10T01:26:28.774034
|
https://example.com/article/6511
|
The invention relates to a membrane arrangement for a pressure switch or for a pressure-responsive transmitter and to a process for connecting the membrane to a membrane supporting plate. The invention also relates to an apparatus for assembling the arrangement.
In the high-precision pressure field, for example, in gas-fired heating boilers, switching accuracies of a few Pascals are required for the monitoring of waste gases. Such accuracies can not be ensured by pressure switches of known construction. Operating pressure adjustments in the order of magnitude of less than 200 Pa or pressure differentials of less than 20 Pa are generally involved in these applications.
Pressure regulators and pressure switches for very small pressure differentials in the high-precision pressure field generally require relatively large-surface membranes offering extremely low friction resistances. Very thin membranes made from highly elastic material are especially suitable for use in high precision pressure measuring. In order to ensure the necessary stability of such membranes and to transmit the energy provided by the pressure differential to a switching or transmitter mechanism, it is commonly known to support such a membrane with a membrane supporting plate consisting of a relatively stiff material.
In order to reduce material and weight, it is advantageous to form the membrane in an annular configuration, so that it joins radially onto the membrane supporting plate without spanning the entire surface area thereof. However, the handling the storage of full-surface membrane require special care before installation. In contrast, annular membranes are substantially less sensitive, so that they can be treated harmlessly, like bulk material. As a result of such a simplification, lower production costs are obtained.
In a known arrangement, an annular membrane is fastened to a membrane supporting plate in a radially disposed groove. In this case, the membrane supporting plate is injected onto the membrane.
|
2023-09-20T01:26:28.774034
|
https://example.com/article/6126
|
The test/unit directory contains unit tests for Scintilla data structures.
The tests can be run on Windows, OS X, or Linux using g++ and GNU make.
The Catch test framework is used.
https://github.com/philsquared/Catch
The file catch.hpp is under the Boost Software License which is contained in LICENSE_1_0.txt
To run the tests on OS X or Linux:
make test
To run the tests on Windows:
mingw32-make test
Visual C++ (2010+) and nmake can also be used on Windows:
nmake -f test.mak test
|
2023-11-01T01:26:28.774034
|
https://example.com/article/2481
|
Q:
Can't get FindId to work (GO + MGO)
Not sure what's going on here... but I'm having a heck of a time trying to get a simple operation done. I'm new to GO (trying to switch from Node) so it's probably a Type thing...
User struct {
ID_ bson.ObjectId `bson:"_id,omitempty" json:"_id,omitempty"`
UTC time.Time `bson:"utc,omitempty" json:"utc,omitempty"`
USR string `bson:"usr,omitempty" json:"usr,omitempty"`
PWD string `bson:"pwd,omitempty" json:"pwd,omitempty"`
}
func save(w http.ResponseWriter, r *http.Request) {
m := s.Copy()
defer m.Close()
user := m.DB("0").C("user")
var a User
json.NewDecoder(r.Body).Decode(&a)
err := user.FindId(a.ID_)
if err != nil {
panic(err)
}
}
This returns the following error
http: panic serving [::1]:53092: &{{0 0} 0xc208062600 {{0.user [{_id TE?????}] 0 0 ?
reflect.Value? 0 <nil> {?reflect.Value? ?reflect.Value? ?reflect.Value? false false [] 0}
false []} 0.25 0}}
When I run:
a.ID_.Valid()
I get "true".
PS. I can get this to work:
func user(w http.ResponseWriter, r *http.Request) {
m := s.Copy()
defer m.Close()
user := m.DB("0").C("user")
a := &User{ID_:bson.NewObjectId(), UTC:time.Now()}
b, _ := json.Marshal(a)
user.Insert(a)
}
Any help would be really appreciated.
A:
The FindId method returns a Query, not an error. Call the Query One method to get the document.
A:
As per the docs http://godoc.org/labix.org/v2/mgo#Collection.FindId
FindId returns a Query struct which you can then call any of its functions. FindId does not return an error.
Try
var userDoc interface{}
if err := user.FindId(a.ID_).One(&userDoc); err != nil {
panic(err)
}
You can change interface{} with whatever struct you are using for users.
|
2024-07-27T01:26:28.774034
|
https://example.com/article/2421
|
Q:
Equivalent weight of the anhydrous acid
The cupric salt of a monobasic acid contains $3$ molecules of water of hydration per atom of $\ce{Cu}$. $\pu{1 g}$ of hydrated salt yielding on strong heating $\pu{0.3306 g}$ of $\ce{CuO}$. What is the equivalent weight of anhydrous acid?
My approach:
Let the formula of the acid be $\ce{HE}$ (where $\ce{E}$ is some element). So, the formula of the salt is $\ce{CuE2*3H2O}$
Don't know how to proceed from here. Any help would be appreciated.
A:
Let the anhydrous acid be $\ce{HA}$ and assume its Molar Mass to be $X$. There is no a priori reason to assume $\ce{A}$ is a mere element.
The copper salt in question is $\ce{CuA2.3H2O}$.
Its Molar Mass is:
$$63.55+2\times(X-1)+3\times 18=115.55+2X$$
Assume reasonably and without losses, that:
$$\ce{CuA2.3H2O(s) -> CuO(s)}$$
So that $1\ \mathrm{mol}$ of the hydrated salt decomposes to $1\ \mathrm{mol}$ of cupric oxide.
The Molar Mass of $\ce{CuO}$ is $79.545$, so $0.3306\ \mathrm{g}$ of it is:
$$\frac{0.3306}{79.545}=4.156\times 10^{-3}\ \mathrm {mol}$$
So now we know that $1\ \mathrm{g}$ of the hydrated salt is $4.156\times 10^{-3}\ \mathrm {mol}$, so its Molar Mass is:
$$\frac{1}{4.156\times 10^{-3}}=240.6\ \mathrm{g/mol}$$
And with the above:
$$115.55+2X=240.6$$
Solve for $X$.
As the acid is monobasic, its Molar Mass is also its Equivalent Mass.
|
2023-12-30T01:26:28.774034
|
https://example.com/article/4624
|
Developmental Disabilities Unit
Role
Itasca County offers services to individuals with developmental disabilities to maximize their independence while ensuring their health and safety.
Eligibility
Eligibility is determined based on an individual's testing of cognitive (IQ) abilities and daily living skills. Individuals must have an IQ below 70, or a condition that causes them to function in a similar manner.
Eligible individuals will then be assigned a case manager from the county. The case manager reviews various appropriate service possibilities with the eligible individual and their parents or guardians. The availability of specific services will vary depending on budget resources. Some services have waiting lists. A person eligible for services can receive case management as long as eligibility standards continue to be met.
|
2023-08-03T01:26:28.774034
|
https://example.com/article/2066
|
next Image 1 of 2
prev Image 2 of 2
The Latest on protests in Hong Kong against extradition bill (all times local):
11:30 a.m.
Hong Kong's chief executive has met with her Executive Council as pressure mounts for her to delay or withdraw an unpopular extradition bill.
Carrie Lam, who was appointed by Beijing, is expected to speak with media later Saturday. TV networks showed members of the Executive Council, or cabinet, headed by car into a government compound.
Some Executive Council members have urged Lam to suspend debate on the bill, which would allow Hong Kong suspects to be tried in mainland China.
Another mass protest is expected Sunday after clashes turned violent on Wednesday, leaving about 80 people injured including 22 police officers.
___
10 a.m.
Pressure on Hong Kong's chief executive Carrie Lam has been mounting, with signs emerging that she may delay an unpopular extradition bill that has drawn hundreds of thousands of people into the streets in protest.
Reports say Lam is expected to make an announcement Saturday after talks that continued late into Friday night. Another mass protest is expected Sunday.
The pressure on Lam to withdraw the bill is intense, with many protesters demanding she quit. The Beijing-appointed leader of the former British colony is caught between a public anxious to protect civil liberties and legal protections guaranteed when control of the territory was handed to China in 1997, and her Communist Party bosses.
Protests died down late in the week after clashes with police that turned violent on Wednesday.
|
2024-07-27T01:26:28.774034
|
https://example.com/article/6262
|
This opinion will be unpublished and
may not be cited except as provided by
Minn. Stat. § 480A.08, subd. 3 (2014).
STATE OF MINNESOTA
IN COURT OF APPEALS
A15-0071
Kelly Elizabeth Nolan,
Relator,
vs.
Great River Federal Credit Union,
Respondent,
Department of Employment and Economic Development,
Respondent.
Filed November 2, 2015
Affirmed
Rodenberg, Judge
Department of Employment and Economic Development
File No. 32888824-3
Kelly Nolan, Sartell, Minnesota (pro se relator)
Great River Federal Credit Union, St. Cloud, Minnesota (respondent)
Lee B. Nelson, Department of Employment and Economic Development, St. Paul,
Minnesota (for respondent DEED)
Considered and decided by Reyes, Presiding Judge; Connolly, Judge; and
Rodenberg, Judge.
UNPUBLISHED OPINION
RODENBERG, Judge
In this certiorari appeal, relator Kelly Nolan challenges the decision of the
unemployment-law judge (ULJ) that she is ineligible for unemployment benefits.
Despite multiple unsupported findings of fact and other errors by the ULJ, because
relator’s testimony amounts to an admission of employment misconduct, we affirm.
FACTS
Relator was employed by Great River Federal Credit Union from May 2007 until
her discharge in September 2014. The credit union’s policies prohibit employees from
performing transactions concerning family members’ accounts, including inducing other
employees to conduct specific transactions for family members that violate the credit
union’s procedures. Employees are also prohibited from accessing unauthorized
accounts, including family members’ accounts. In her application for unemployment
benefits, Relator stated that she was discharged because “we are not suppose[d] to help
family members in any[ ]way” due to the policies’ prohibition against employees doing
“anything [concerning] a relative[’]s account.”
On September 12, 2014, relator’s mother contacted relator at work and asked her
to transfer money from the mother’s account. Relator “looked at [the first teller and] said
my mom is on the phone, she wants to know if she can transfer money.” The first teller
accessed the mother’s account and told relator that she could not process the transfer
because the mother’s loan was past due and there was a memo placing a hold on the
2
account. Relator told her mother about the situation, and her mother indicated that there
must have been a mistake because the loan was not past due.
Relator then contacted the collections representative to discuss the hold on her
mother’s account. Relator agrees that she electronically accessed her mother’s account
statement during this conversation. After the conversation concluded, Relator again
communicated with the first teller concerning the transfer. The first teller processed the
transaction. Later that afternoon, relator communicated with a loan officer, who stated
that the hold would remain on the account until an audit was completed, and therefore no
money could be transferred from the account.
Relator’s mother went to the credit union the following day to request a
withdrawal. Relator explained the situation to a second teller. She told her that making
the transfer was “completely [the second teller’s] decision.” The second teller processed
the transaction.
On September 15, 2014, relator was discharged for violating the credit union’s
internal accounts, personal conduct, and fraud policies. Relator sought unemployment
benefits from the Minnesota Department of Employment and Economic Development
(DEED). On September 26, 2014, DEED issued its determination, concluding that
relator was ineligible for benefits because she had been discharged for misconduct.
A telephone hearing was held on October 28, 2014. The ULJ heard testimony
from relator, relator’s mother, the credit union’s chief operations officer, the credit
union’s human resources administrator, and the credit union’s teller supervisor. The
credit union’s live witnesses based their testimony regarding relator’s discharge on the
3
involved individuals’ unsworn, unsigned statements, and the live witnesses had no
personal knowledge of the events surrounding relator’s discharge. The chief operations
officer testified that the second teller told her that the teller had been uncomfortable
processing the transaction because of the hold. Relator testified that she had only
violated the policy of accessing a family member’s account by “pulling up” her mother’s
statement, but had not “physically” performed any transactions on her mother’s account
and did not tell anyone else to conduct the transactions. Relator’s mother confirmed that
relator assisted her in addressing issues with her account.
The ULJ concluded that relator was discharged because of employment
misconduct and was therefore ineligible for unemployment benefits. The ULJ found that
relator’s act of asking the second teller to conduct the transaction without informing her
that the hold remained on the account pending an audit amounted to “a breach of trust
and honesty owed” that relator owed to the credit union, which constituted a “serious
violation of standards of behavior which [the credit union] had a right to reasonably
expect of her.” The ULJ affirmed his decision on reconsideration, concluding that relator
failed to show good cause for not having submitted additional evidence at the initial
hearing that she requested to be considered on reconsideration, and that the evidence was
not likely to change the outcome of the decision in any event. The ULJ purported to find
on reconsideration that the testimony given by the credit union’s witnesses was the “more
probable, realistic and plausible description of the events surrounding” relator’s
discharge. This certiorari appeal followed.
4
DECISION
The purpose of chapter 268 is to assist those who are unemployed through no fault
of their own. Minn. Stat. § 268.03, subd. 1 (2014). The chapter is remedial in nature and
must be applied in favor of awarding benefits, and any provision precluding receipt of
benefits must be narrowly construed. Minn. Stat. § 268.031, subd. 2 (2014).
When reviewing the decision of the ULJ, we defer to the ULJ’s credibility
determinations if they are supported by substantial evidence. Compare Skarhus v.
Davanni’s Inc., 721 N.W.2d 340, 345 (Minn. App. 2006) (stating that “[c]redibility
determinations are the exclusive province of the ULJ and will not be disturbed on
appeal”) with Wichmann v. Travalia & U.S. Directives, Inc., 729 N.W.2d 23, 29 (Minn.
App. 2007) (stating that the ULJ’s credibility determinations will be upheld if supported
by substantial evidence) (citing Ywswf v. Teleplan Wireless Servs., Inc., 726 N.W.2d 525,
532-33 (Minn. App. 2007) (upholding a ULJ’s credibility determination after subjecting
it to substantial evidence review)). In conducting this review, we may reverse or modify
the ULJ’s decision if “substantial rights . . . may have been prejudiced” because the
findings are “unsupported by substantial evidence in view of the entire record as
submitted.” Minn. Stat. § 268.105, subd. 7(d) (Supp. 2015).
An employee who is discharged for employment misconduct is ineligible to
receive unemployment benefits. Minn. Stat. § 268.095, subd. 4(1) (2014). “Employment
misconduct” is “any intentional, negligent, or indifferent conduct, on the job or off the
job that displays clearly: (1) a serious violation of the standards of behavior the employer
has the right to reasonably expect of the employee; or (2) a substantial lack of concern for
5
the employment.” Minn. Stat. § 268.095, subd. 6(a)(1)-(2) (2014). “Whether an
employee committed employment misconduct is a mixed question of fact and law.”
Peterson v. Nw. Airlines Inc., 753 N.W.2d 771, 774 (Minn. App. 2008). Whether the
employee committed the act is a fact question. Skarhus, 721 N.W.2d at 344. But
whether the employee’s act constitutes employment misconduct is a question of law,
which we review de novo. Stagg v. Vintage Place Inc., 796 N.W.2d 312, 315 (Minn.
2011).
“An employer has a right to expect that its employees will abide by reasonable
instructions and directions.” Vargas v. Nw. Area Found., 673 N.W.2d 200, 206 (Minn.
App. 2004), review denied (Minn. Mar. 30, 2004). “As a general rule, refusing to abide
by an employer’s reasonable policies and requests amounts to disqualifying misconduct.”
Schmidgall v. FilmTec Corp., 644 N.W.2d 801, 804 (Minn. 2002). A knowing violation
of an employer’s directives, policies, or procedures is employment misconduct because it
demonstrates a willful disregard of the employer’s interests. Id. at 806.
Relator challenges the ULJ’s findings, arguing that they are not supported by
substantial evidence. Relator makes two arguments concerning the ULJ’s factual
findings: (1) that the ULJ’s finding that relator failed to let the second teller know about
the audit on her mother’s account is unsupported by the second teller’s written
statements; and (2) that relator never told either teller to “perform illegal transactions”
and that both tellers were “aware of what was happening” on the account.
The ULJ did not find that the second teller was unaware of the audit as relator
argues. Instead, the ULJ found that relator failed to tell the second teller that the hold on
6
her mother’s account “would not be removed until an audit.” But the second teller’s
written statements indicate that she was aware that the hold on the account prohibited
withdrawals. Relator explained the situation to the second teller and told her that it was
her decision whether or not to process the transaction. Additionally, the chief operations
officer testified that the second teller told her that she had been uncomfortable processing
the transaction because of the hold. On this issue, the record supports no conclusion
other than that the second teller was aware that the hold existed during the pendency of
the audit and completed the transaction anyway.
Concerning relator’s second argument that the ULJ found that relator induced the
tellers to “perform illegal transactions,” relator misreads the ULJ’s decision, which
apparently focuses solely on the second transaction. And the ULJ’s findings concerning
that second transaction find no support in the record.
Our review of the record reveals several additional factual errors in the ULJ’s
decision, including findings concerning the amount of time relator worked for the credit
union and relator’s hourly wage, and references to relator by two separate, incorrect
names. Moreover, the ULJ’s claimed credibility determination that the testimony given
by the credit union’s witnesses was the “more probable, realistic and plausible
description of the events surrounding” relator’s discharge appears to be nothing more
than boilerplate language that makes no sense in context. The credit union’s live
witnesses based their testimony concerning relator’s discharge exclusively on the
involved individuals’ unsworn, unsigned statements because the live witnesses lacked
personal knowledge of the events surrounding the discharge. There was hearsay
7
testimony through the chief operations officer of what the second teller said, but the
second teller did not testify at the hearing. While a ULJ “may receive any evidence that
possesses probative value, including hearsay, if it is the type of evidence on which
reasonable, prudent persons are accustomed to rely in the conduct of their serious
affairs,” Minn. R. 3310.2922 (2015), it is unclear how the ULJ could find the unsworn
and hearsay statements of non-witnesses more credible than relator’s without expressly
evaluating the credibility of the written statements in some fashion. The ULJ engaged in
no such evaluation that we can discern.
Notwithstanding the glaring errors by the ULJ, relator’s own testimony
conclusively shows that she committed employment misconduct. The credit union’s
policies prohibit employees from performing transactions on family member’s accounts,
inducing other employees to conduct specific transactions for family members that
violated the credit union’s procedures, or accessing unauthorized or family members’
accounts. These policies are reasonable and require that employees show “no preferential
treatment” and demonstrate “sound fiduciary responsibility.” Relator agrees that she was
aware of these policies, describing them as “we are not suppose[d] to help family
members in any[ ]way” and that employees are prohibited from doing anything regarding
a relative’s account. Despite this knowledge, relator admits that she “looked at [the first
teller and] said my mom is on the phone, she wants to know if she can transfer money.”
Relator admits that, upon the first teller’s discovery of the hold, relator involved herself
in the transaction and contacted the collections representative to discuss the hold on her
mother’s account. Relator also admits that she violated the credit union’s policy of
8
accessing a family member’s account by “pulling up” her mother’s account statement.
Relator admits that she explained her mother’s situation to the second teller before that
teller processed the second transaction. While relator denies that she instructed the tellers
to conduct the transactions, her own testimony conclusively establishes that she violated
the credit union’s policy by engaging with these employees on her mother’s behalf.
Relator’s knowing disregard of the credit union’s reasonable policies constitutes
employment misconduct. Even accepting all of relator’s testimony as true, she is
ineligible for unemployment benefits.
Affirmed.
9
|
2023-08-10T01:26:28.774034
|
https://example.com/article/2817
|
Yuliya Chekalyova
Yuliya Vladimirovna Chekalyova, also romanized Yulia Tchekaleva (; born 6 February 1984) is a Russian cross-country skier who has competed since 2004.
Career
Her best World Cup finish was 11th in a 15 km event in Russia in 2007.
At the FIS Nordic World Ski Championships 2007 in Sapporo, she finished 16th in the 10 km and 22nd in the 30 km events.
Chekalyova is married to Alexey Kuritsyn, with whom she has a son, Matvey, born in 2012.
On 1 December 2017 she was disqualified from the 2014 Winter Olympics, her results (including sixth place in the relay) were annulled, and she was banned for life from the Olympic games as a result of a positive doping test.
Cross-country skiing results
All results are sourced from the International Ski Federation (FIS).
Olympic Games
World Championships
2 medals – (2 bronze)
World Cup
Season standings
Individual podiums
1 victory – (1 )
5 podiums – (4, 1 )
Team podiums
2 podiums
References
External links
Category:1984 births
Category:Living people
Category:Russian female cross-country skiers
Category:Cross-country skiers at the 2014 Winter Olympics
Category:Olympic cross-country skiers of Russia
Category:Tour de Ski skiers
Category:People from Vologda
Category:FIS Nordic World Ski Championships medalists in cross-country skiing
Category:Universiade medalists in cross-country skiing
Category:Russian sportspeople in doping cases
Category:Doping cases in cross-country skiing
Category:Universiade silver medalists for Russia
Category:Competitors at the 2009 Winter Universiade
|
2024-05-01T01:26:28.774034
|
https://example.com/article/5007
|
diesel_darlin:
I am recently divorced. Earlier, I was at a ladies supper held by the ladies ministry of my church. The hostess was asking me if my divorce was final, and I told her yes it was. She immediately started in on how she had the most wonderful guy for me and she wanted me to meet him. What is an ehell approved way of telling people that I'm not in the market to be "hooked up"?
PastryGoddess:
This happens to me all of the time. Apparently being 30ish with no long term boyfriend is a sin...or something. ::)
I just say "Thank you, but I'm not interested" and keep repeating over and over and over again.
Here's the thing, they're not doing you a favor. And if you try to explain things, then that just gives them the idea that they have a right to poke into your private life. And they don't. So don't JADE, just say no thanks. If someone gets miffed, it's on them. Them being mad doesn't make you wrong.
greencat:
"I'm not on the market, right now, but thanks for thinking of me." This method, of course, presumes that you're dealing with someone reasonable.
"Tell me all about him...Oh he's a smoker/cat hater/alien abductee? No thanks, I don't date guys like that." When dealing with the type of unreasonable person that starts this kind of conversation in the first place, this is the way that I usually shut down individual conversations of this nature, after which I avoid the busybody like the plague.
Stricken_Halo:
These are good responses, along with "I'm not ready to date again" if you're recently divorced/getting over a difficult breakup.
But I'm going to dissent a bit from previous posters. Unless the person making the "offer" is really intrusive as a habit, or tries to fix you up with really undesirable types, I personally wouldn't shut her (it's generally a "her) down for good. The time may come when you actually want someone in your life, and friends and relatives generally have a good idea of who you are. I'm at the age when no one even bothers any more, and that can be painful too.
TurtleDove:
I would be gracious. Smile and say, "Oh, how sweet of you to think of me but I'm not interested in being set up." Don't get angry or sad. Show you are happy without being set up. Just smile and move the conversation in another direction.
|
2024-03-15T01:26:28.774034
|
https://example.com/article/7638
|
Democrats are channeling their post-election disappointment — and pouring buckets of donor cash — into a long-shot bid for the Louisiana Senate seat.
The odds are not good for Louisiana Democrat Foster Campbell, who is facing off against GOP state Treasurer John Kennedy in the runoff on Dec. 10. President-elect Donald Trump just carried the state by 20 percentage points in November, and Kennedy led Campbell 52 percent to 38 percent in a poll this week. And Trump's running mate, Vice President-elect Mike Pence, was scheduled to give Kennedy's base an energy boost by appearing at a rally with Kennedy in New Orleans on Saturday.
But Campbell, a state public service commissioner, has raised $2.5 million over the past month, much of it in small-dollar donations from Democrats around the country looking for some way to strike back against Trump. Kennedy raised $1.6 million over the same time frame. Each man had about $1.4 million left in his campaign account.
Campbell brought in $43,000 from small donors from January to Oct. 20; since then, $1.7 million in small donations have poured in as Democrats — like former Obama administration staffers Dan Pfeiffer and Jon Favreau, who recently had Campbell on their podcast — hold up Campbell’s race as the final fight of the 2016 election and hope for an upset.
“Based on demographics and what’s going on in Louisiana, [Campbell] faces an uphill climb,” said Trey Ourso, a Democratic consultant who ran a super PAC backing Gov. John Bel Edwards in his upset of Sen. David Vitter last year. “But voters this year have shown they like to surprise us.”
Campbell’s bid is, in many ways, a second go-round for the team that elected Edwards, who endorsed Campbell early. Mary-Patricia Wray, a top Edwards strategist, is playing the same role for Campbell. Edwards’ ad-maker, Jared Arsement, is making spots for Defend Louisiana, a pro-Campbell super PAC.
Recapturing that magic will be difficult. While Kennedy has his flaws — the Campbell campaign and Republicans have regularly attacked him for flip-flopping — he’s not Vitter, who was dogged by a prostitution scandal. Campbell shares Edwards’ rural credentials and opposition to abortion rights, but he lacks the West Point background that helped the governor woo Louisiana conservatives in his stunning 2015 upset victory.
Kennedy, meanwhile, is tying himself closely to Trump. “I’ve been with our new president from day one,” Kennedy says in a television ad. “Because I believe we don’t have time for political correctness anymore. And the swamp in Washington, D.C., has to be drained.”
Still, Campbell has a history of winning over Republican-leaning voters, and his team insists the race is in the single digits. In 2014, he won 61 percent of the vote in his North Louisiana-based district even as former Sen. Mary Landrieu won just 41 percent of the vote in the same area. (Landrieu lost the statewide vote, 56 percent to 44 percent, to now-GOP Sen. Bill Cassidy.) And Campbell will need crossover votes, especially if the electorate skews away from his party, as it has in early voting so far. When Edwards pulled off his upset in 2015, defeating Vitter with 56 percent of the vote, 30 percent of early voters were black and 52 percent were Democratic. So far, the early runoff vote in 2016 has been just 21 percent black and 44 percent Democratic.
Campbell's allies have alighted on abortion in an attempt to deepen Campbell's conservative appeal. Defend Louisiana has started running an ad attacking Kennedy for supporting abortion rights when he was a Democrat. (2016 marks Kennedy's third bid for Senate; he ran as a Democrat in 2004 and as a Republican in 2008.)
“He’s been a Democrat. He’s been a Republican. John Kennedy’s been everything but a Baptist preacher,” Campbell said in a phone interview. “John Kennedy’s been what’s best for John Kennedy.”
Kennedy’s team scoffs at such attacks, and notes that Pence will be campaigning with Kennedy to shore up the latter’s conservative credentials this weekend.
And a message blasting Kennedy for supporting abortion rights makes for an odd fit for Campbell, who has generated support from coastal liberals, attracted both to his populist and environmentalist standards and to their last chance in 2016 to get a win. White House economist Gene Sperling recently hosted a fundraiser for Campbell in Los Angeles, and other Democratic heavyweights like former White House communications director Pfeiffer have encouraged liberals to donate to his campaign. (Edwards, the governor, also hosted a Wednesday fundraiser for the Defend Louisiana PAC with Landrieu, New Orleans Mayor Mitch Landrieu, and Rep. Cedric Richmond.)
“West Coast liberals think they can buy this election for Foster Campbell,” Kennedy spokesman Lionel Rainey said. “John Kennedy has received the support of donors from across Louisiana who understand he is the only conservative in this race who supports our values. Foster Campbell represents the views of Democrats from California.”
Even with Campbell’s strong fundraising — Kennedy still hasn’t released his own fundraising report — Republicans are still outspending Democrats on television in the state. With Kennedy's own funds, the Ending Spending Action super PAC and a coordinated buy between Kennedy and the National Republican Senatorial Committee, Republican groups spent about $524,000 on TV last week. Campbell and his allies have spent just $307,000.
And the NRSC’s independent expenditure arm is spending about $10,000 on radio advertisements in the state starting on Monday, according to a media-buying source.
One thing that appears unlikely: any help from the Democratic Senatorial Campaign Committee, which declined to comment for this story.
But Campbell thinks he can pull off a solo upset. Asked whether he needed the DSCC’s help, Campbell had a simple response: “Nope.”
|
2024-05-19T01:26:28.774034
|
https://example.com/article/8999
|
{% extends settings.TEMPLATE_LAYOUT %}
{% load static %}
{% load i18n %}
{% load widget_tweaks %}
{% load account socialaccount %}
{% block head_title %}{% trans "Signup" %}{% endblock %}
{% block content %}
{% get_providers as socialaccount_providers %}
<div class="row justify-content-center logreg">
<div class="col-sm-12 col-md-10 col-lg-8 col-xl-6">
<div id="logreg-forms">
<h1 class="text-center">{% trans "Sign Up" %}</h1>
<div style="margin-bottom: 1rem; padding-left: 24px;">
<div class="custom-control custom-checkbox form-check-inline">
<input type="checkbox" class="custom-control-input" id="tos-checkbox">
<label class="custom-control-label" style="font-size: 16px;" for="tos-checkbox">By signing up, I agree to The
Spaghetti Detective's <a class="link" href="https://www.thespaghettidetective.com/terms.html">Terms of
Use</a> and <a class="link" href="https://www.thespaghettidetective.com/privacy.html">Privacy
Policy</a></label>
</div>
</div>
{% if socialaccount_providers %}
<div class="social-login">
<a href="{% provider_login_url "facebook" method="oauth2" %}" class="btn facebook-btn social-btn disabled"
role="button"><span><i class="fab fa-facebook-f"></i> Sign up with Facebook</span> </a>
<a href="{% provider_login_url "google" method="oauth2" %}" class="btn google-btn social-btn disabled"
role="button"><span><i class="fab fa-google-plus-g"></i> Sign up with Google+</span> </a>
</div>
{% endif %}
<div style="width: 100%; height: 20px; border-bottom: 1px solid white; margin-bottom: 16px;"></div>
<form class="signup form-signup" id="signup_form" method="POST" action="{% url 'account_signup' %}">
{% csrf_token %}
<input type="hidden" name="recaptcha_token" id='recaptcha'>
{% with WIDGET_ERROR_CLASS='field_error' WIDGET_REQUIRED_CLASS='field_required' %}
<div class="form-group">
{% render_field form.email class="form-control" aria-describedby="emailHelp" placeholder="Email address" %}
{% if form.email.errors %}
<small id="emailHelp" class="text-danger">
{% for error in form.email.errors %}
{{ error|escape }}
{% endfor %}
</small>
{% else %}
<small id="emailHelp" class="form-text">We'll never share your email with anyone else.</small>
{% endif %}
</div>
<div class="form-group">
{% render_field form.password1 class="form-control" aria-describedby="password1Help" placeholder="Password" %}
{% if form.password1.errors %}
<small id="password1Help" class="text-danger">
{% for error in form.password1.errors %}
{{ error|escape }}
{% endfor %}
</small>
{% else %}
<small id="password1Help" class="form-text">At least 6 characters. And be secure, please.</small>
{% endif %}
</div>
<div class="form-group">
{% render_field form.password2 class="form-control" aria-describedby="password2Help" placeholder="Password. Again" %}
{% if form.password2.errors %}
<small id="password2Help" class="text-danger">
{% for error in form.password2.errors %}
{{ error|escape }}
{% endfor %}
</small>
{% endif %}
</div>
{% endwith %}
{% if redirect_field_value %}
<input type="hidden" name="{{ redirect_field_name }}" value="{{ redirect_field_value }}" />
{% endif %}
<button type="submit" class="btn btn-primary btn-block" disabled>{% trans "Sign Up" %}</button>
<a class="button secondaryAction float-right pt-2"
href="{% url 'account_login' %}{% if redirect_field_value %}?next={{redirect_field_value}}{% endif %}">{% trans "Sign In" %}
>>></a>
</form>
</div>
</div>
</div>
{% endblock %}
{% block page_js %}
<script src="{% static 'js/signup.js' %}"></script>
{% if settings.RECAPTCHA_SITE_KEY %}
<script src="https://www.google.com/recaptcha/api.js?render={{ settings.RECAPTCHA_SITE_KEY }}"></script>
<script>
grecaptcha.ready(function() {
$('#signup_form').submit(function(e){
var form = this;
e.preventDefault()
grecaptcha.execute('{{ settings.RECAPTCHA_SITE_KEY }}', {action: 'signup_form'}).then(function(token) {
$('#recaptcha').val(token)
form.submit()
});
})
});
</script>
{% endif %}
{% endblock page_js %}
|
2024-04-04T01:26:28.774034
|
https://example.com/article/1970
|
# not yet implemented
if you'd like to help with this guide please submit a pull request to (guardian)[https://github.com/ueberauth/guardian] in the `guides/plug/start-plug.md` file.
|
2024-03-13T01:26:28.774034
|
https://example.com/article/4475
|
Paediatric utilization of an emergency department in Italy.
The purpose of this study was to determine the frequency and characteristics of paediatric attendance as a source of medically non-urgent problems at an accident and emergency department (ED) of a public non-teaching hospital in Crotone (Italy). For each patient aged 16 years or younger, there were collected information on demographics and socioeconomic characteristics, medical history, route of referral, clinical complaints that they presented at the moment of their presentation at the ED, duration of presenting problems prior to arrival, hour of arrival, day of the week of arrival, and reason for attending the ED. Data about the consultation process and the final decision made were also recorded. Of a total of 980 patients included in the study, 27.6% had conditions that were definitely non-urgent. Multiple logistic regression analysis showed that the visit was non-urgent in younger population, in females, and in those attending the ED on the weekend. The results of the second multivariable regression analysis model indicate that patients who did not receive medical or surgical examination at the ED, with problems of longer duration prior to arrival at the ED, with non-traumatic injuries, and who did not require inpatient hospital admission were more likely to use the ED as a source of non-urgent care. The most frequent presenting problems for patient visits to ED were injury, respiratory diseases, and digestive symptoms. A closer cooperation within the health care organization system to provide a service responsive to the real needs of patients is essential.
|
2023-11-09T01:26:28.774034
|
https://example.com/article/7442
|
[Ion chromatographic analysis of cations and anions in mineral water].
For the simultaneous analysis of the cations Li, Na, K, Ca, and Mg as well as Mn and the anions hydrogen carbonate, chloride, sulfate and nitrate, silica gel- and polymer-based ion exchange materials with conductivity and spectrophotometric detection combined with a post-column derivatization system (PAR-Zn-EDTA for Ca, Mg, Mn) and also an ion-pair system with RP-18 phase were compared with a view to their application to mineral water samples. It is possible to determine Li, Na, and K in such samples with or without the suppressor technique using polymer columns. A polybutadiene maleic acid silica gel cation exchanger material makes feasible simultaneous analysis of alkaline and earth alkaline metals. Ca, Mg, and hydrogen carbonate, chloride, sulfate and nitrate are analyzed in less than 16 min using a silica gel anion exchanger with EDTA as the eluent. To stay within the linear range of the calibration function it is necessary to perform two injections in different dilutions (between 1:4 and 1:500) due to the different concentration ratios. For the analysis of manganese above 100 micrograms/L a system with the cation exchanger Partisil SCX and the eluent ethylenediamine/oxalate with post-column derivatization is used. The sample pretreatment is done by reduction with thiosulfate. A total of 15 different mineral waters were analyzed with all the systems and the results were compared with those of reference methods (AAS, potentiometry), showing good conformity.
|
2023-08-16T01:26:28.774034
|
https://example.com/article/8767
|
A wind turbine in the Brittany of France is photographed against the summer Milky Way in the constellation Cygnus. Click on the constellation icon above the image to see the labels and constellation lines. Laurent Laveder/Pixheaven.net.
|
2024-06-21T01:26:28.774034
|
https://example.com/article/6484
|
Imported from Japan! The popular Japanese anime Tiger & Bunny imagines an alternate New York City filled with super-powered heroes, and two of those heroes are the unlikely team of the Wild Tiger and Barnaby "Bunny" Brooks. The Kotetsu T. Kaburagi G.E.M. PVC Figure recreates the civilian identity of the Wild Tiger as a stylish young man than stands slightly over 9" tall.
|
2024-07-19T01:26:28.774034
|
https://example.com/article/6997
|
CHIGWELL.
Etymology.
This place is called, in the most ancient records, Cingwella,
which some suppose to signify the King's Well; others derive
the last syllable from the Saxon word Weald, or wood (fn. 1). This etymology, perhaps, is the more probable, as it was in ancient times a
part of the royal demesnes. Later records have varied the name to
Chykwell and Chigwell.
Situation.
Boundaries.
Quantity of land.
Soil.
Land-tax.
This village lies in the hundred of Ongar, at the distance of about
ten miles and a half from London on the Ongar road. The parish
is bounded on the east by Lambourn, north-east by Loughton, north
by Chingford, west by Woodford, south-west by Barking, and south
by Dagenham. It contains, according to a survey made in 1611 (fn. 2),
2527 acres of cultivated land. The proportion of arable to pasture
is about three to one. Its share of Epping and Hainault forests (both
included in the ancient forest of Waltham) is not ascertained, but is
known to be very considerable (fn. 3). The soil in the neighbourhood of
the village is a light gravel mixed with sand, and abounding with
springs; in other parts of the parish a stiff clay, without water.
This parish pays the sum of 577l. 2s. to the land-tax, which is at
the rate of about 2s. in the pound.
Manor of Chigwell-hall.
The manor of Chigwell-hall was held under Edward the Confessor by Earl Harold. In William the Conqueror's reign it was
the property of Ralph de Limesei (fn. 4), whose great grandson Alan
granted it to Richard de Luci, and the latter to Ralph Briton (fn. 5). A
subsequent grant was made by Richard de Luci to William Goldyngham, at the petition of Briton; and another at the request of
Goldyngham to Robert, son of Ralph Briton, to whom Goldyngham granted this manor in see and for ever. A sum of money
was given each time, and homage paid (fn. 6). All this happened in the
reign of Henry II.: the manor, nevertheless, appears to have been
continued after this for several generations in the family of Goldyngham, who held it under the Lords Fitzwalter (fn. 7). In the year
1382, Sir Alexander Goldyngham had the royal licence to impark
50 acres of land in Waltham forest, adjoining to his manor of
Chigwell (fn. 8). It appears to have been afterwards in the Bourchier
family (fn. 9). John Mannock died seised of it in 1476 (fn. 10). In 1534, his
son George sold it to Sir Thomas Audley and others (fn. 11) for the use
of the crown, as it is supposed. In 1538, being then vested in the
crown, it was leased to William Rolt (fn. 12). King Edward VI. in 1550,
granted it to Sir Thomas Wroth (fn. 13); in whose family it continued till
the year 1669, when it was sold to Sir William Hickes, Bart. (fn. 14); from
whom it has descended to the present proprietor Michael Hickes
Beach, Esq. M. P. for Cirencester, (second son of Sir Howe
Hickes, Bart.) who enjoys it under the wills of Sir Harry
Hickes, who died in 1755, and Michael Hickes, Esq. who died
in 1764.
Manor-house and demesne lands.
Sir Harry Hickes sold the manor-house (called Chigwell Hall)
and the demesne lands to William Davy, Esq.; of whose executors
they were purchased by James Urmston, Esq.: Mr. Urmston sold
this estate to — Mossat, Esq.; of whom it was purchased by
Eliab Harvey, Esq. the present proprietor. The house is in the
occupation of Mr. Blackman.
Manor of West-hatch.
The manor of West-hatch was the property of the Goldynghams.
In the year 1410, Sir Walter Goldyngham settled it (in default of
issue from himself and his wife Elizabeth) on Robert Wrytele or
Writtle (fn. 15). Walter Writtle died seised of it in 1476 (fn. 16). In 1534, it
was vested in George Mannock, Esq. who then sold it with the
manor of Chigwell Hall to Sir Thomas Audley, and others (fn. 17). It
has since passed through the same hands.
The manor-house, which stands about a mile from the church, on
the road to Woodford, was the residence of Sir William Nutt, who
died in 1673 (fn. 18). James Crokatt, Esq. of Luxborough-house, having
purchased it (about the middle of this century), it was sold by his
heirs to Sir Edward Walpole, K. B. It afterwards became the
property of Mr. Nutt, whose widow conveyed it to George Curling, Esq.; Mr. Curling sold it to Lady Hughes, (relict of Sir
Edward Hughes, K. B.) the present proprietor. A new house
having been lately built near the same site, the old house is about to
be taken down.
The manor of Barringtons, alias Rolls, is supposed to have been
that estate, which, in the reign of King Edward the Confessor, was
held by one Doth; and at the time of the Norman survey, by
Anschetill, under Robert Gernon (fn. 19). The manor of Barringtons was
granted about the reign of Henry II. by Alberic de Vere to Sir
Humphrey, son of Eustace de Barentone. It continued in this
family (being still held under the Veres, Earls of Oxford, and called
the manor of Chigwell, alias Little Chigwell,) as late as the year
1537, when John Barrington, Esq. died seised of it. Stephen
Wiseman died seised of it in 1563 (fn. 20); Thomas Wiseman, Esq. in
1584. It was sold by another Thomas Wiseman to John Hawkins;
and about the middle of the last century a moiety of it was purchased
Eliab Harvey, Esq. (brother of the celebrated Dr. Harvey),
whose descendant of the same name (Captain of the Valiant man of
war) is the present proprietor. The other moiety was in the
Comyns family about the year 1695, and afterwards came, by intermarriage, to Sir Hugh Myddelton, Bart. of whom it was purchased
by the Harveys (fn. 21).
Rolls.
The manor-house is about a mile north of the church, and is the
residence of Capt. Harvey. It was not originally the site of the
manor, but a mansion unconnected with it, called Rolls, which was
purchased by Sir Eliab Harvey, (son of Mr. Harvey who bought the
manor,) and made the manerial residence (fn. 22).
Manor of Woolston, or Wolverstone.
The manor of Woolston or Wolverstone, anciently called Ulfeestun, was the property of Earl Harold. When the Norman
survey was taken, it was a part of the royal demesnes (fn. 23). Henry the
Second granted it to the family of Sandford (fn. 24), who held it in grand
serjeanty as chamberlains to the Queen (fn. 25). Hugh Earl of Oxford
purchased the wardship and marriage of Alice, daughter and heir of
Gilbert de Saundford, for a thousand marks, as some records state it,
King Henry III.; or, as others seem to represent it, of Fulk Basset,
Bishop of London, who had bought it of the King for the same
sum (fn. 26), perhaps as a trustee for the Earl; who bestowed her in marriage
on his eldest son Robert, who succeeded him in the title, and in
right of his wife became Baron Sandford. By this lady (besides
Robert his son and heir) he had a daughter Joan, who married
William, the eldest son of John Earl Warren and of Surrey, and
had the reversion of this manor (fn. 27) as a part of her marriage portion.
On the death of John Earl of Surrey (son of the said William and
Joan) without lawful issue, in 1347, this and his other estates
devolved upon his sister Alice, wife of Edmund Earl of Arundel (fn. 28).
The possessions of this family were twice forfeited by attainder, and
restored; after which Thomas Earl of Arundel died seised of this
manor in 1414, when the inheritance came between his three
surviving sisters (fn. 29). Sir Rowland Lenthall, who married Margaret
Fitzalan, leaving no issue at his death, in 1451 (fn. 30), his share was
divided between the Norfolk and Bergavenny families, who represented the other coheirs. John Duke of Norfolk was slain at
Bosworth-field, and his estates became forfeited (fn. 31). The whole of
this manor, being afterwards vested in the crown, was granted, about
the beginning of Henry the Seventh's reign, to William Scott, Esq.
a lineal descendant of Sir William Scott, Lord Chief Justice of the
King's Bench, who died in 1346 (fn. 32). It continued in that family till
the death of George Scott, LL. D. in 1780, when it was inherited
by Robert, son of William Bodle, Esq. (by Elizabeth, daughter of
George Scott, Esq. who died in 1710 (fn. 33) ). It is now the property
of Robert Bodle, Esq. son of Robert above mentioned.
The manor-house stands about a mile and a half eastward from
the church: it is at present unoccupied.
Manor of Grange-hill.
The manor of Grange-hill, or Chigwell Grange, belonged to the
priory of Tiltey; on the suppression of which it was granted, anno
1537, to Thomas Addington (fn. 34), who, in 1554, sold it to James
Altham, Esq. (fn. 35) : of him it was purchased by Sir Anthony Browne,
who made it a part of the endowment of his free school at
Brentwood (fn. 36).
Manor of Luxbo-rough.
Luxbo-rough-house.
The first mention I have found of the manor of Luxborough is in
1605, when Sir Robert Wroth died seised of it (fn. 37); since that time it
has passed with the manor of Chigwell-hall. The demesne lands of
the manor of Luxborough were purchased in the early part of this
century by Robert Knight, Esq. cashier of the South Sea Company,
who built on them a noble mansion called Luxborough-house, which,
upon the estates being seized and sold by the South Sea Company,
was purchased by Sir Joseph Eyles (fn. 38). Upon his death, in 1740, it
was repurchased by Mr. Knight. His son, who succeeded to this
estate, was, in 1746, created an Irish peer, by the title of Baron
Luxborough, and in 1763, Earl of Catherlough. In 1749, he sold
the estate at Luxborough-house to James Crokatt, Esq. (fn. 39), whose
heirs aliened it to Sir Edward Walpole, K. B.; Sir Edward sold it to
Samuel Peach, Esq. who soon afterwards conveyed it to Sir Edward
Hughes, K. B. That eminent naval officer made it his countryhouse, and died there, Jan. 17, 1794. It is now the property and
residence of his widow.
Ancient palace, called Potteles, or Langford's, now King's-place farm.
Within this parish, in the forest, was an ancient palace, called
Potteles, alias Langford's. A purchase was made by the crown in
this parish as early as the year 1350 (fn. 40), and another purchase of a
house and lands, by Edward IV. of Robert Langford, in 1477 (fn. 41). It
is probable that the King granted this house and lands to his brother
the Duke of Clarence; for it appears upon record, that Potteles-place,
alias Langford's, came to the crown on the death of that prince (fn. 42).
Henry VII. appointed Sir John Risley keeper of his palace at
Chigwell (fn. 43); and, on his death, Sir William Compton had a grant of
that place, anno 1513 (fn. 44). William Lord Compton obtained a
renewed grant from Queen Elizabeth in 1596 (fn. 45). Sir Thomas
Perient was possessed of the fee of this estate in 1650 (fn. 46). It was then
called the manor or reputed manor of King's-place, alias Langford's,
&c. Henry Goodricke, Esq. having married Mary Ernle, a relation
of Lady Perient (fn. 47), this estate was settled on her; and, in 1658,
was conveyed by the said Henry Goodricke and his wife Mary to
William Livesaye, Gent. In 1679, William Livesaye the elder,
and William Livesaye the younger, aliened it to Mrs. Elizabeth
Collwall, widow. Thomas Gibson and John Jacob, trustees under
the will of Daniel Colwall, Esq. who died in 1707 (fn. 48), conveyed it,
in 1716, to Percival Chandler, whose son Thomas, in 1741, sold
it to Oliver Marton, Esq. In 1759, it was purchased of the Rev.
Oliver Marton, (brother and heir of Edward Marton, Esq. who was
son and heir of Oliver,) by Robert Jones, Esq. It is now the property of his grandson R. Jones Adeane, Esq.
Buckhurst, alias Monk-hill, now Monkhams.
An estate in this parish and Woodford, called Buckhurst, alias
Monkenhill, (now Monkhams,) belonged to the abbot and convent
of Stratford Langthorn (fn. 49), and was granted, anno 1547, to John
Lyon and his heirs (fn. 50). Henry Lyon died seised of it anno 1590 (fn. 51).
It is now the property of Lady Hughes (fn. 52).
Buckhurst, alias Goldhurst.
There was an estate also (in the parishes of Chigwell and Barking)
called Buckhurst, alias Goldhurst, which Sir Walter Goldyngham
settled on Robert Writtle. Walter Writtle died seised of it in
1476 (fn. 53). It is most probable that it descended, with the manors of
Chigwell-hall and West-hatch, which were also in the Goldynghams
and the Writtles.
The church.
The parish-church, dedicated to St. Mary, consists of a chancel,
nave, and north aisle. At the west end is a wooden belfry, with a
spire. The south door is of Saxon architecture, with lozenge
mouldings.
Monument of Thomas Coleshill.
Against the south wall of the chancel is a monument of alabaster
and veined marble, (with the effigies of the deceased in kneeling
attitudes,) to the memory of Thomas Coleshill, Esq. (fn. 54), servant to
King Edward IV., Queen Mary, and Queen Elizabeth, and inspector
of the customs for the city of London, ob. 1595. Mary, his wife,
daughter of George Crayford, Esq. died in 1599: they were married fifty years. The monument was put up by Sufanna, wife of Sir
Edward Stanhope, and Anne, wife of Jasper Leeke, Esq. daughters and coheirs of the deceased.
Monument of Archbishop Harsnet.
On the north side of the chancel, against the wall, is fixed
the effigies, in brass, of Archbishop Harsnet. It was removed
from the floor, and is in perfect preservation. It is surrounded
with a border of brass, on which is the following inscription,
written by himself, and directed by his will to be put on his
tomb (fn. 55) : "Hic jacet Samuel Harsnett, quondam vicarius (fn. 56) hujus
ecclesiæ, primùm indignus Episcopus Cicestrensis, dein indignior
Episcopus Norwicensis; demùm indignissimus Archiepiscopus
Eboracensis qui obiit xxv die Maii, anno Domini 1631."
On the chancel floor are the tombs of Elizabeth, wife of Francis
Langston, Esq. serjeant at arms, and daughter of Sir Edwin
Sandys, Knt. 1639; Anne, wife of John Nutt, Esq. and daughter
of Sir Edward Master of East Langdon in Kent, 1641; Susanna,
wife of William Nutt, and daughter of John James, Esq. 1643;
Sir William Nutt, her husband, 1673; and Capt. Joseph Cave of
the Royal Navy, 1781.
Scott's Chancel.
The east end of the north aisle is called Scott's Chancel, and
belongs to Woolston-hall. In this chancel are monuments to the
memory of George Scott, Esq. (fn. 57), 1683; Elizabeth, his wife, daughter of Robert Cheyne, Esq. of Bramhanger, 1705; William Scott,
Esq. (fn. 58), 1725; Catherine, his wife, daughter of Thomas Luther,
Esq. 1710; and Thomas Scott, Esq. 1732. In this chancel also is
an achievement for William Derham, D. D. president of St. John's
College in Oxford, who died in 1757, and one for Bishop Gibson,
whose daughter Jane married George Scott, LL. D.
In the north aisle is the monument of John Thomas Kilpatrick,
1791; on the south side, affixed to one of the pews, is a brass plate
(with the effigies of the deceased) to the memory of John Hodgson,
Gent. of the Middle Temple, (son of John Hodgson, merchant,) who
married Mary, daughter of John Penington of Chigwell, ob. 1620.
On the floor are the tombs of John Penington, Esq. (fn. 59), 1702; Sarah
his wife, daughter of Sir Robert Abdy, Bart. 1690; Mrs. Ann
Pelling, widow, 1712; and Mrs. Sarah Hunt, 1769.
Near the door of the north aisle is a brass plate with the following
inscription: "Pray for the soule of Thomas Ilderton, stoksemonger of
"London, who dyde inlentle (lengthen) this isle from ye northe dore
hitherto; and also dide gyfe certen lands towards ye sustentation
of a chantre prest to synge at treneteal, and to helpe devyne service
in the quere upon holy daies, as by his wyll there made it does
apere, on whos soule Jhu have mercy; whiche Thomas decessyd
the day of—, an° Domini 1500."
On the pillars between the nave and the chancel on the north side
are the monuments of Martin Capron (fn. 60), 1715; and the Rev. George
Heriott (fn. 61), rector of South Fambridge, 1723.
The advowson of the church of Chigwell (which is in the diocese
of London and the deanery of Ongar) was formerly annexed to the
manor, and held together with it by the family of Goldyngham. In
the year 1350, Thomas Ecclesle, parson of Lambeth, and others,
had licence to appropriate the church of Chigwell (held under the
Lords Fitzwalter) to the priory of Latton (fn. 62). How it became vested
in the above parties, or how long it continued appropriated to that
priory, does not appear; nor does it appear that they ever presented
to the vicarage. In 1404, Bartholomew Lord Bourchier granted
the church of Chigwell to John Doreward (fn. 63), who, in 1439, gave it
to the priory of St. Botolph in Colchester (fn. 64), to which convent it was
afterwards appropriated; but they had not been long in possession,
before (by some exchange, it is probable) it came into the hands of
Bishop Kemp, who, having founded a chantry in St. Paul's cathedral,
made this rectory a part of its endowment (fn. 65). In 1474, the prebend of
Pancras was appropriated also to the same chantry: after the chantry
was suppressed, the rectory of Chigwell continued to be, as it still is,
annexed to the prebend of Pancras (fn. 66), under which the great tithes
are held upon a lease for three lives. In Bishop Grindall's time (the
latter end of the sixteenth century) the rectory was on lease to
Nicholas Fulham (fn. 67). In the year 1650, it was reported by the
commissioners appointed to inquire into the state of ecclesiastical
benefices, that there belonged to the parsonage of Chigwell (which
was a sinecure) 28 acres of glebe, besides a grove of about 20 acres,
which, with the great tithes, they valued all together at 70l. per
annum, out of which a reserved rent of 15l. was payable to the
prebendary of Pancras; the parsonage was then on lease to Thomas
Andrews, Esq. (fn. 68) In the beginning of the present century, the lease
was vested in Sir Joseph Eyles; it was afterwards purchased by
James Crokatt, Esq. who, by his will dated 1776, bequeathed his
interest therein to his daughter Jane, wife of Sir Alexander Craufurd,
Bart. (since deceased). A new lease was granted, in 1791, to Sir
Alexander Craufurd for the lives of his three children, James, John,
and Cecilia (fn. 69).
The Vicarage.
The present prebendary of Pancras, and, as such, rector of Chigwell, is the Rev. William Paley, Archdeacon of Carlisle.
The vicarage.
It appears that in ancient time a rector of this parish, having
a plurality of benefices, instituted a vicarage here, and gave it to his
kinsman, allowing him half the profits of the rectory. This practice
of appointing vicars continued after his death; and in 1374, Henry
Marmion being then rector, a vicarage was endowed with a house
and glebe, the usual vicarial tithes, and the tithes of certain watermills (fn. 70). In 1440, the vicarage was valued at 18 marks per annum.
In the King's books it was rated at 18l. Since its connexion with
the prebend of Pancras it has been in the gift of the prebendary (fn. 71).
Guild of the Holy Trinity.
There was a guild, brotherhood or fraternity in the church of
Chigwell, founded by Thomas Ilderton, and dedicated to the Holy
Trinity; the lands belonging to which (being then valued at 2l. 3s.
4d. per annum) were granted to John Whitehorn and John Bailey,
to be held of the manor of Sidmouth in Devonshire (fn. 72).
Vicars: Samuel Harsnet;
Samuel Harsnet, who was instituted to this vicarage in 1597, was
a native of Colchester, and in the early part of his life was master
of the grammar-school at that place. He afterwards became successively Bishop of Chichester and Norwich, and Archbishop of York.
Before he was made a bishop, (being then chaplain to Bishop
Bancroft,) he published an account of the impostures of one John
Darrell, who had pretended to cure several persons possessed with
devils. He was author also of a few other tracts (fn. 73). The Archbishop, after he had resigned the vicarage, continued to reside
at Chigwell, where he had purchased a house and estate, now the
property and residence of his descendant Mrs. Fisher.
Emanuel Utey.
Emanuel Utey, D. D. was ejected from this vicarage in the year
1641, in consequence of a petition from the inhabitants of Chigwell
to the parliament, charging him with having erected an altar in
the church, and having used offensive bowing and cringing; with
having kissed the altar twice in one day; having read the prayers
with his face to the altar, and his back to the people; and various
other allegations of the like nature. A printed copy of the petition
is in the British Museum. The commissioners, in 1650, found that
there had been no settled minister at Chigwell since Dr. Utey's
removal (fn. 74).
The present vicar is the Rev. Walter Kerrich, M. A. canon
residentiary of Salisbury, collated in 1764, on the death of Fifield
Allen, D.D.
There are several entries relating to the Harvey family. The
present Eliab Harvey, Esq. married Lady Louisa, daughter of Earl
Nugent, by whom he has one son and four daughters.
Archbishop Harsnet's schools.
Archbishop Harsnet, in the year 1629, founded two free-schools
in this parish; the one for teaching children to read, write, and cast
accounts, and the accidence; the other for teaching the Greek and
Latin tongues. The Archbishop had previously built two schoolhouses at his own expence, and a house for the Latin master; he
purchased also a house for the other master, and a garden for each
house. The Archbishop, by an indenture, bearing date April 13,
1629, vested the above premises in certain feoffes (fn. 81), together with
the impropriated rectory of Tottington in Norfolk, which he
assigned as an endowment (fn. 82) for his schools. The advowson of the
vicarage was vested also in the said feoffees, who were to present
to it a fit person, who had been either educated at the Latin school
at Chigwell, or was a native of that place; if such could be found.
The vicar of Chigwell, and the rector of Loughton, are always to
be among the number of the feoffees, and to be governors of the
schools, together with ten other persons, being the most able and
substantial parishioners of Chigwell (fn. 83). The governors elect the
schoolmasters; the election must take place within ten days after the
vacancy, otherwise the nomination lapses to the Bishop of London.
The Latin schoolmaster must be a graduate in one of the universities; a man skilful in the Greek and Latin "tongues; a good
"poet; of a sound religion; neither Papist nor Puritan; of a grave
behaviour; of a sober and honest conversation; no tipler, nor
haunter of alehouses; no puffer of tobacco; and, above all, apt to
teach, and severe in his government." He is directed to teach
Lilly's Latin, and Cleonard's Greek grammar;—for phrase and
style, to infuse into his scholars no other than Tully and
Terence;—for poets, to read the ancient Greek and Latin; no
novelties, nor conceited modern writers." The qualifications
requisite for the other master are, "that he write fair secretary and
Roman hands; that he be skilful in cyphering and casting of
accounts; and that he teach his scholars the same faculty."
The present grammar-master is James Stewart Freeman, B. D.;
the English and writing-master, Mr. John Vickery.
The founder's ordinances contain many regulations for the
government of his schools, and the behaviour of the scholars;
prosessing himself much more solicitous that they should be instructed in the principles of the Christian religion (fn. 84), and nurtured
and disciplined in good manners, than instructed in good arts.
The founder directs, that twelve, boys, natives of Chigwell, two
of Loughton, two of Woodford, and two of Lambourn, shall be
instructed gratis in the Latin school; in the other school, all the
children of Chigwell, with the same number from Woodford,
Loughton, and Lambourn, as in the other school. When it was
found necessary to reduce the salary of the masters, the children in
the Latin school were limited to half the number ordered by the
founder; and those in the other school to twelve children of Chigwell, one of Woodford, one of Loughton, and one of Lambourn.
This was done with the sanction of the Bishop of London, whom
the founder appointed visitor; and to whom he directs the governors to present yearly an angel of gold as a new-year's gift (fn. 85).
William Penn educated at Chigwell. Girls' school.
William Penn, founder of Pennsylvania, was educated at Chigwell; most probably at Archbishop Harsnet's school.
There is a charity-school in this parish for twelve girls, established
about the beginning of the present century, and supported by the
collections at an annual sermon, and the interest of 100l. left to it,
in 1725, by William Scott. Esq.
Alms-houses.
There are alms-houses at Chigwell for three poor widows, who
receive 1l. 5s. 8d. per annum each, paid quarterly, out of lands
called Cardhams; formerly belonging to the Peningtons. It is not
known by whom this endowment was left.
Benefactions.
Robert Rampston, anno 1585, gave 1l. per annum to the poor
of this parish. Archbishop Harsnet charged the parsonage of Tottington with 10l. per annum, to be distributed weekly in bread to
twenty-four poor persons of this parish.
Ancient benefaction for the repair of a footpath.
Mrs. Joan Sympson of Chigwell, in the year 1357, left certain
lands, (now let at 14l. 14s. per annum,) for the purpose of keeping
in repair the foot-path from Abridge in the parish of Lambourn, to
Wynbridge in Woodford, being five miles in length, and leading
through the village and parish of Chigwell from east to west.
Spring of mineral water.
There is a spring near the windmill at Chigwell-row, of a
cathartic quality; the water of which was recommended by the
celebrated physician Dr. Frewen, who was a native of this parish (fn. 86).
It is now quite neglected.
Footnotes
4. The estate of Ralph de Limesei is
thus described in the record of Doomsday:
Ralph holds Cinghewell, in the hundred of
Ongar, in demesne, which Earl Harold
held of King Edward, as a manor of seven
hides. There were always nineteen villans,
two bordars, and two ploughs on the demesne lands. In King Edward's time the
tenants had sixteen ploughs; now eleven.
There is pannage for 700 hogs, and 31
acres of meadow. There has always been
a mill on the estate. It was valued, in
the Confessor's time, at 8l.; now at 10l.—Some other estates in the parish of Chigwell are thus described:—Six freemen held
formerly in their own hands two hides and
fifteen acres, which Robert Gernon enjoys
now, by the King's grant, as he says; there
were formerly three ploughs on this estate,
now two; there is pannage for 40 hogs, and
eight acres of meadow; in King Edward's
time there was a mill, there is now none;
this estate was always valued at 40s. A
certain freeman held 30 acres, which Peter
the sheriff now has. There was formerly
a plough employed on it, but there is now
only half employment for a plough; there
is pannage for 30 hogs, and two acres of
meadow; it is valued at 5s. Peter had
livery of this land with his fee; and he
found six beasts, 17 sheep, and 11 hogs;
there are now 10 beasts, 60 sheep, and 20
hogs. Ralph de Limesei holds six acres
within the King's jurisdiction; but his predecessor took possession of them illegally.
11. Madox's Formulare.—The premises
then conveyed (for the sum of 1000 marks)
consisted of the manors of Chigwell Hall
and West-hatch, with their appurtenances,
viz. six messuages, 300 acres of arable land,
300 of meadow, 300 of pasture, 80 of
wood; and 12l. rents, in Chigwell, Theydon, Lambourn, and Barking.
19. It is thus described in that record,
(being placed in Chelmsford hundred.)—Anschetill holds Cingewell of Robert
(Gernon) which Doth formerly held as a
manor of two hides. There was always
one villan, two bordars, and two ploughs
on the demesnes; the tenants have always
employed one plough: there is pannage for
30 hogs, and 20 acres of meadow: there
was always one sumpter-horse, six beasts,
twelve sheep, and fourteen hogs. It was
valued, in King Edward's time, at 40s.;
now at 4l.
23. It is thus described in the record: —Harold holds Ulfemestun for a manor, and
three hides, and 40 acres. It is now
the King's. There were always four vils; formerly two bordars, now six; the
tenants have always employed one plough.
There is pannage for 60 hogs, and four
acres of meadow. In King Edward's time
it was valued at 20s.; now 40s. A certain
freeman held 20 acres, in King Edward's
time, which are now uncultivated. They
were always a part of the demesne, and are
now in the hands of the sheriff as a farm of
the King's.
54. Arms—1. Checky O. and S. a chief
G. guttèe des larmes—Coleshill. 2. S. a
cross flory O.—Upton. 3. Checky G. and O.
on a bend of the second three horse-shoes Az.
4. Six lozenges, 3, 2, 1. 5. G. a bend of
mascles O. 6. Arg. a tower between eight
fl. de lis S.— Sumester. 7. Arg. a chevron
between three bears' heads erased with
muzzles S.—Penarth. 8. Az. three waterbougets O. in chief three bezants—West.
9. Arg. a hand and arm issuing from a
cloud on the sinister side fesseways and
grasping a dexter hand erected and couped
at the wrist, all proper—Oliver. 10. O. a
chevron between three bats displayed G.—Battesford. 11. O. a saltier between four
eagles displayed Az.—impaling, 1 and 4. O.
on a chevron V. three eagles' heads erased
of the field—Crayford; 2 and 3. G. five
martlets O. on a chief indented of the
second, three crowns Az.
55. Archbishop Harsnet directed, by his
will, that a stone should be put over his
grave, with the above inscription, and the
effigies of a bishop fastened into the stone
an inch thick, and so riveted down that
sacrilegious hands should not rend off the
one without breaking the other. He left
10l. to be spent at his funeral in a sober,
civil banquet, by as many of his parishioners
as should choose to attend.
57. Arms—Per pale indented A. and S.
a faltier counterchanged—Scott of Stapleford Tany, impaling, Checky O. and Az.
a fesse G. fretty Erm.—Cheyne.
On another escutcheon—1 and 4. Scott;
2. G. three boars' heads erased between
nine cross crosslets O.—Swinbourn; 3. Per
pale S. and Erm. a fesse counterchanged—Fitz-Richard—impaling, S. three pickaxes
Arg.—Pigot. George Scott, Esq. who died
in 1588, married Margaret Pigot. It is
probable that she was his second wife. Morant, in his account of the family, does not
mention this match. He was great uncle
to George Scott, who died in 1683.—There
is another impalement—G. three demi-lions
ramp. O. The said George Scott married
also Dorothy, daughter of John Franck,
Esq. of Hatfield Broadoak. See Morant.
59. The family of the Peningtons, who had
been settled at Chigwell for many generations, became extinct by his death. The
house in which they resided, with the lands
belonging to it, descended to John Branston, Esq.; who married Mary, one of this
Mr. Penington's daughters. On the death
of Mary, daughter of Mr. Branston, and
wife of the Hon. Edward Byng, most of
the lands were sold to Sackville Bale, Esq.:
the house was purchased by Edward Tymewell, Esq.; after his death, was sold to
John Raymond Esq. and is now the property of James Urmston, Esq. a captain in
the service of the East India Company.
See Morant, vol. i. p. 170.
60. Arms—S. two chevronels Arg. between three lozenges of the second, each
charged with a Cornish chough.
75. The old register-books have been
handsomely bound in Russian leather, by
the churchwarden Mr. Sotheby, bookseller
in York-street, Covent-Garden, who has a
house at Chigwell.
76. The village itself is but small; there
are about 60 houses at a hamlet called Chigwell-row, a mile S. E. from the church;
there are several houses also at Grangehill, and Buckhurst-hill; and scattered
about Horn-lane, Gravel-lane, and Vicarage-lane.
77. Son, it is probable, of Jasper Leeke,
Esq.; who married one of the coheirs of
Thomas Coleshill, Esq. See p. 119, 120.
80. I suppose this to have been the celebrated naval officer who was promoted to
the rank of admiral in 1743: his name is
well known on account of the memorable
dispute between him and Admiral Matthews, relating to the conduct: of each, in
an engagement with the fleets of France
and Spain off Toulon, in 1744. It terminated in the acquittal of Lestock, (who
had been suspended by Matthews, his superior in command,) and in the dismissal of
the latter from the service.
81. Twenty-one in number; the trust to
be renewed whenever they should be reduced to five.
82. It was then worth 60l. per annum,
clear of all deductions; the founder, in his
ordinances, expresses his confidence that it
would always produce that rent. It sell so
low in value, nevertheless, that, in 1691,
it was let only at 30l. per annum. In
1712, it was raised to 40l.; it is now let
at 210l. During the abatement of the
rent, it became necessary to reduce, considerably, the salaries of the masters, which
the founder had fixed at 20l. per annum
for the Latin master, and 25l. per annum
for the other; the overplus, after deducting
10l. per annum given to the poor in bread,
was appropriated for repairs and incidental
expences.
84. The Archbishop built a gallery in the
church for the use of his scholars; who are
enjoined to attend divine service every Sunday and holiday.
85. The above abstract is taken from documents relating to the schools, printed for
the use of the governors; and obligingly
communicated by Mr. Layton, to whom I
am indebted for other assistance during my
inquiries in this parish.
|
2023-08-25T01:26:28.774034
|
https://example.com/article/1655
|
[bits 32]
%define ERROR_CODE nop ; 若在相关的异常中cpu已经自动压入了错误码,为保持栈中格式统一,这里不做操作.
%define ZERO push 0 ; 若在相关的异常中cpu没有压入错误码,为了统一栈中格式,就手工压入一个0
extern idt_table ;idt_table是C中注册的中断处理程序数组
section .data
global intr_entry_table
intr_entry_table:
%macro VECTOR 2
section .text
intr%1entry: ; 每个中断处理程序都要压入中断向量号,所以一个中断类型一个中断处理程序,自己知道自己的中断向量号是多少
%2 ; 中断若有错误码会压在eip后面
; 以下是保存上下文环境
push ds
push es
push fs
push gs
pushad ; PUSHAD指令压入32位寄存器,其入栈顺序是: EAX,ECX,EDX,EBX,ESP,EBP,ESI,EDI
; 如果是从片上进入的中断,除了往从片上发送EOI外,还要往主片上发送EOI
mov al,0x20 ; 中断结束命令EOI
out 0xa0,al ; 向从片发送
out 0x20,al ; 向主片发送
push %1 ; 不管idt_table中的目标程序是否需要参数,都一律压入中断向量号,调试时很方便
call [idt_table + %1*4] ; 调用idt_table中的C版本中断处理函数
jmp intr_exit
section .data
dd intr%1entry ; 存储各个中断入口程序的地址,形成intr_entry_table数组
%endmacro
section .text
global intr_exit
intr_exit:
; 以下是恢复上下文环境
add esp, 4 ; 跳过中断号
popad
pop gs
pop fs
pop es
pop ds
add esp, 4 ; 跳过error_code
iretd
VECTOR 0x00,ZERO
VECTOR 0x01,ZERO
VECTOR 0x02,ZERO
VECTOR 0x03,ZERO
VECTOR 0x04,ZERO
VECTOR 0x05,ZERO
VECTOR 0x06,ZERO
VECTOR 0x07,ZERO
VECTOR 0x08,ERROR_CODE
VECTOR 0x09,ZERO
VECTOR 0x0a,ERROR_CODE
VECTOR 0x0b,ERROR_CODE
VECTOR 0x0c,ZERO
VECTOR 0x0d,ERROR_CODE
VECTOR 0x0e,ERROR_CODE
VECTOR 0x0f,ZERO
VECTOR 0x10,ZERO
VECTOR 0x11,ERROR_CODE
VECTOR 0x12,ZERO
VECTOR 0x13,ZERO
VECTOR 0x14,ZERO
VECTOR 0x15,ZERO
VECTOR 0x16,ZERO
VECTOR 0x17,ZERO
VECTOR 0x18,ERROR_CODE
VECTOR 0x19,ZERO
VECTOR 0x1a,ERROR_CODE
VECTOR 0x1b,ERROR_CODE
VECTOR 0x1c,ZERO
VECTOR 0x1d,ERROR_CODE
VECTOR 0x1e,ERROR_CODE
VECTOR 0x1f,ZERO
VECTOR 0x20,ZERO ;时钟中断对应的入口
VECTOR 0x21,ZERO ;键盘中断对应的入口
VECTOR 0x22,ZERO ;级联用的
VECTOR 0x23,ZERO ;串口2对应的入口
VECTOR 0x24,ZERO ;串口1对应的入口
VECTOR 0x25,ZERO ;并口2对应的入口
VECTOR 0x26,ZERO ;软盘对应的入口
VECTOR 0x27,ZERO ;并口1对应的入口
VECTOR 0x28,ZERO ;实时时钟对应的入口
VECTOR 0x29,ZERO ;重定向
VECTOR 0x2a,ZERO ;保留
VECTOR 0x2b,ZERO ;保留
VECTOR 0x2c,ZERO ;ps/2鼠标
VECTOR 0x2d,ZERO ;fpu浮点单元异常
VECTOR 0x2e,ZERO ;硬盘
VECTOR 0x2f,ZERO ;保留
;;;;;;;;;;;;;;;; 0x80号中断 ;;;;;;;;;;;;;;;;
[bits 32]
extern syscall_table
section .text
global syscall_handler
syscall_handler:
; 系统调用传入的参数在用户栈中,此时是内核栈
;1 保存上下文环境
push 0 ; 压入0, 使栈中格式统一
push ds
push es
push fs
push gs
pushad ; PUSHAD指令压入32位寄存器,其入栈顺序是:
; EAX,ECX,EDX,EBX,ESP,EBP,ESI,EDI
push 0x80 ; 此位置压入0x80也是为了保持统一的栈格式
;2 从内核栈中获取cpu自动压入的用户栈指针esp的值
mov ebx, [esp + 4 + 48 + 4 + 12]
;3 再把参数重新压在内核栈中, 此时ebx是用户栈指针
; 由于此处只压入了三个参数, 所以目前系统调用最多支持3个参数
push dword [ebx + 12] ; 系统调用的第3个参数
push dword [ebx + 8] ; 系统调用的第2个参数
push dword [ebx + 4] ; 系统调用的第1个参数
mov edx, [ebx] ; 系统调用的子功能号
; 编译器会在栈中根据C函数声明匹配正确数量的参数
call [syscall_table + edx*4]
add esp, 12 ; 跨过上面的三个参数
;4 将call调用后的返回值存入待当前内核栈中eax的位置
mov [esp + 8*4], eax
jmp intr_exit ; intr_exit返回,恢复上下文
|
2023-08-07T01:26:28.774034
|
https://example.com/article/2422
|
name: coverity-scan
on:
schedule:
- cron: '0 9 * * 1,5' # Bi-weekly at 09:00 UTC on Monday and Thursday
jobs:
latest:
runs-on: ubuntu-latest
steps:
- uses: actions/checkout@v1
with:
submodules: true
- uses: actions/setup-python@v1
with:
python-version: 3.7.x
- name: Download Coverity Build Tool
run: |
wget -q https://scan.coverity.com/download/cxx/linux64 --post-data "token=$TOKEN&project=radareorg%2Fcutter" -O cov-analysis-linux64.tar.gz
mkdir cov-analysis-linux64
tar xzf cov-analysis-linux64.tar.gz --strip 1 -C cov-analysis-linux64
env:
TOKEN: ${{ secrets.COVERITY_SCAN_TOKEN }}
- name: Fixed world writable dirs
run: |
chmod go-w $HOME
sudo chmod -R go-w /usr/share
- name: apt dependencies
run: sudo apt-get install ninja-build libgraphviz-dev mesa-common-dev
- name: py dependencies
run: |
pip install meson
- name: CMake
run: |
scripts/fetch_deps.sh
source cutter-deps/env.sh
export LD_LIBRARY_PATH="`llvm-config --libdir`:$LD_LIBRARY_PATH"
mkdir build
cd build
cmake -DCUTTER_USE_BUNDLED_RADARE2=ON ../src
- name: Build with cov-build
run: |
export PATH=`pwd`/cov-analysis-linux64/bin:$PATH
cd build
cov-build --dir cov-int make
- name: Submit the result to Coverity Scan
run: |
cd build
tar czvf cutter.tgz cov-int
curl \
--form project=radareorg-cutter \
--form token=$TOKEN \
--form email=noreply@radare.org \
--form file=@cutter.tgz \
--form version=trunk \
--form description="Cutter" \
https://scan.coverity.com/builds?project=radareorg%2Fcutter
env:
TOKEN: ${{ secrets.COVERITY_SCAN_TOKEN }}
|
2024-04-28T01:26:28.774034
|
https://example.com/article/4244
|
I have to take a closer look. It was DjRobX that updated the table script, enabling modulated flashers. What can happen is that you have tweaked it to look a curtain way, but, because it is getting the values from the rom it has changed. That is at least what I’ve understand from the code. If you want to fix it. It would be to revert the flasher in question to its original code.
Some things like all the shadow work or the clock are obvious, but to better see the differences in detail, I did some side by side comparison in PS. Lots of stuff, you don’t realize at first glance, so super interesting. What made me really wow is, you even tweaked the look of the small TV (look at the antenna base)
|
2023-10-08T01:26:28.774034
|
https://example.com/article/1467
|
1. Field of the Invention
The present invention relates generally to carrying devices, and more particularly, to devices which aid in the stabilizing of a load to be transported.
2. Description of the Prior Art
Aids for transporting a load generally are well known. For example, U.S. Pat. No. 5,017,080 dated May 21, 1991 discloses a hand truck including an elongated frame attached to a wheel assembly. Similarly, U.S. Pat. No. 3,674,164 dated Jul. 4, 1972 discloses a hand truck having a swingably mounted wheel and axle assembly and a supporting frame. Likewise, U.S. Pat. No. 4,793,623 dated Dec. 27, 1988 discloses a load gripping handcart including a wheel supported frame with a projectionless load abutment surface. U.S. Pat. Des. No. 318,356 dated Jul. 16, 1991 discloses an ornamental design for a hand truck. Finally, U.S. Pat. No. 3,499,658 discloses a tiltable hand truck having a frame and primary wheels. Such hand trucks are useful but do not include removable device for steadying the load carried on them. A need exists, therefore, for a device which may be easily transported and used on any hand truck or the like for steadying the load carried. This will prevent unnecessary swaying and spilling of the load.
The foregoing need is met by the present invention as will be made apparent from the following description thereof. Other advantages of the present invention over the prior art also will be rendered evident.
|
2024-02-07T01:26:28.774034
|
https://example.com/article/2715
|
Age-dependent epidemioloy of depression.
An analysis of epidemiological studies on depression in the elderly using a specific approach, which separated severe and mild forms of depressive disorders, and compared the results with the rates in younger age groups, has been undertaken. This did not provide a clear answer to the question of whether there is an increase in depressive disorders in the elderly. The prevalence of severe depressive disorders (endogenous depression) varied between 1 and 3.7% according to different epidemiological surveys. The incidence seemed to be about 1-2 patients per 1,000 population with a slight preponderance of females. Milder forms of depression, corresponding with DSM III diagnoses of dysphoria or dysthymic disorders, were found to have slightly higher prevalence rates. Results of research amongst the elderly on age-dependent increases in depression are conflicting. Some authors have reported a slight increase in both the prevalence and incidence of depression in the elderly, particularly in males, others have reported a decrease particularly in females. While the increase of suicides amongst the elderly, particularly in males has been documented this appears to be in conflict with the reported prevalence rates of depression in the elderly.
|
2023-10-30T01:26:28.774034
|
https://example.com/article/9115
|
Image copyright EPA Image caption The bus crashed into three other vehicles before the driver eventually got out
A bus carrying 51 schoolchildren was hijacked by its driver and set alight near Milan in Italy.
The children, some of them tied up, were rescued through smashed windows at the back of the bus and no-one was badly hurt. Fourteen people suffered smoke inhalation.
The driver, a 47-year-old Italian citizen originally from Senegal, has been arrested.
"No-one will survive," the driver was alleged to have said.
"It was a miracle, it could have been a massacre," Milan chief prosecutor Francesco Greco was quoted as saying.
A teacher who had been on the bus said the suspect - named by police as Ousseynou Sy - was known to be angry about Italy's immigration policy and about the deaths of migrants in the Mediterranean.
"He shouted, 'Stop the deaths at sea, I'll carry out a massacre'," police spokesman Marco Palmieri said.
Prosecutors said the suspect faced charges of kidnapping, attempted mass murder, causing a fire and resisting arrest.
Mr Greco said officials were still weighing terrorism charges against him.
The suspect was known to police, having been previously convicted of assault and for driving while intoxicated, Alberto Nobili, head of counter-terrorism at the Milan public prosecutor's office, told a news conference.
How the drama started
Two classes of teenagers and their adult supervisors were being driven from a school in Vailati di Crema to a gym but the driver suddenly took a different route, apparently heading for Milan's Linate airport, reports said.
When the suspect began threatening passengers with a knife, a boy phoned his parents who alerted the police.
Officers then tried to intercept the bus. The vehicle rammed into police cars before slowing down.
Image copyright EPA Image caption Parents collected their children from police after the bus rescue
Once the bus stopped, the driver jumped off and set it alight, having already doused it in petrol. Police were able to smash the rear windows and get passengers off before the vehicle was engulfed in flames.
"It was a miracle they [the children] survived and we have to thank the Carabinieri for that," Mr Greco said.
Interior ministry officials are investigating the possibility of annulling the driver's Italian citizenship, the AFP news agency reports.
A decree issued in September makes it easier to deport migrants and take away their citizenship if they commit serious crimes.
Italy's tough stance on migrants
Since coming into power in June, Italy's ruling right-wing League party and populist Five Star Movement have established a strong anti-immigration stance.
Located at the frontline of migrants crossing the Mediterranean Sea into Europe, Italy has tried to close its ports to boats.
On Tuesday, around 50 people were rescued by a charity ship from a rubber boat off the coast of Libya and taken to the island of Lampedusa. Italian authorities ordered that the ship be seized and launched an investigation into the alleged aiding of clandestine immigration.
Earlier this month, around 200,000 people attended an anti-racism march in Milan.
|
2023-09-05T01:26:28.774034
|
https://example.com/article/7314
|
Low-frequency electroacupuncture suppresses zymosan-induced peripheral inflammation via activation of sympathetic post-ganglionic neurons.
Electroacupuncture (EA) is used to treat a variety of inflammatory diseases; however, the neurophysiological mechanisms underlying EA's anti-inflammatory effect remain unclear. Accumulating evidence suggests that the sympathetic nervous system regulates immunologic and inflammatory responses and thus we hypothesized that this system could be involved in EA's anti-inflammatory effect (EA-AI). The goal of the present study was to evaluate whether the sympathetic nervous system plays a critical role in EA-AI using a mouse air pouch inflammation model. We found that bilateral low-frequency (1 Hz) EA applied to the Zusanli acupoint significantly suppressed the number of zymosan-induced leukocytes migrating into the air pouch. Furthermore, double-labeling immunohistochemical experiments showed that EA stimulation increased Fos expression in choline acetyltransferase (ChAT)-positive sympathetic pre-ganglionic neurons in the intermediolateral region of thoracic spinal cord segments. Chemical sympathetic denervation by intraperitoneal injection of 6-hydroxydopamine (which spares sympathetic adrenal medullary innervation) significantly inhibited EA-AI. In contrast, adrenalectomy did not alter EA-AI. Finally, systemic propranolol administration significantly inhibited EA's anti-inflammatory effect, suggesting that beta-adrenoceptors are involved. Collectively, these results suggest that EA produces an anti-inflammatory effect in this mouse air pouch model by activating the sympathetic nervous system leading to the release of catecholamines from post-ganglionic nerve terminals, which act on beta-adrenoceptors on immune cells to inhibit their migration.
|
2024-04-17T01:26:28.774034
|
https://example.com/article/8223
|
Among neuropsychiatric disorders, tic disorders including Tourette syndrome, affects a large number of children: approximately 1% of those in the general population and up to 20% of students in Exceptional Student Educational classrooms. Of those with a chronic course, the illness spans most of their pediatric development as many cases develop in preschool and persist through late adolescence. Tic disorders are often associated with adverse developmental outcomes or comorbidities that can have a major impact on life adjustment even into adulthood. Although evidence-based interventions for tics and associated conditions (e.g., OCD, ADHD) currently exist, the interaction of treatment with the clinical presentation across development has not been fully realized. Moreover, due to developmental shifts in decision making power and in relationships with parents and peers, utilization of health care services likely will change as children mature;yet, the factors that influence this change are not well understood. We also know that some individuals with severe TS show remarkable resiliency and adapt well against the apparent odds but we know little about what makes one child with tics more resilient and why another begins to lead a life of disability. Efforts to devise and test interventions to improve equitable access to treatment must be preceded by careful exploration of these individual and community based dynamics, best achieved in a parallel quantitative-qualitative research design. To better understand resources, services and medical risks across youth development, we propose to examine existing insurance database of youth identified with tics in comparison to those with ADHD and to those without neuropsychiatric disorders (N=300 per group). Concurrently, we plan to intimately examine the lived experiences and perspectives of youth in their day to day challenges of adjusting to a visibly apparent neuropsychiatric illness by qualitative process via experience sampling (N=100) and focus group (N=40) with youth and their contacts at the center and in the field. By combining both quantitative and qualitative data, we will better understand components of youth presentation that lead to poor as well as good illness adaptation by converging the characteristics of services received via database analysis with the qualitative experiences of youth via experience sampling (qualitative interviews of selected school district teachers/ personnel and medical treatment providers) and focus groups. From this collected information, a survey will be developed to test and expand on the needs and perspectives of an additional 150 youth identified as having tics. This proposal will generate information about continuities and discontinuities of clinical presentation, perception of self, access to care, and treatment strategies spanning four developmental phases (early and middle childhood, and early and late adolescence) that will allow us to identify characteristics of each phase for those most at risk for persistent unmet treatment needs and for poor outcomes.
|
2023-10-25T01:26:28.774034
|
https://example.com/article/8324
|
---
abstract: 'In this paper, we analyse the bosonic current densities induced by a magnetic flux running along the core of an idealized cosmic string in a high-dimensional AdS spacetime, admitting that an extra dimension coordinate is compactified. Additionally we admit the presence of a magnetic flux enclosed by the compactified axis. In order to develop this analysis we calculate the complete set of normalized bosonic wave-functions obeying a quasiperiodicity condition, with arbitrary phase $\beta$, along the compactified extra dimension. In this context, only azimuthal and axial currents densities take place. As to the azimuthal current, two contributions appear. The first one corresponds to the standard azimuthal current in high-dimensional AdS spacetime with a cosmic string without compactification while the second contribution is a new one, induced by the compactification itself. The latter is an even function of the magnetic flux enclosed by the compactified axis and is an odd function of the magnetic flux along its core with period equal to quantum flux, $\Phi_0=2\pi/e$. On the other hand, the nonzero axial current density is an even function of the magnetic flux along the core of the string and an odd function of the magnetic flux enclosed by the compactified axis. We also find that the axial current density vanishes for untwisted and twisted bosonic fields in the absence of the magnetic flux enclosed by the compactified axis. Some asymptotic expressions for the current density are provided for specific limiting cases of the physical parameter of the model.'
author:
- |
W. Oliveira dos Santos[^1], H. F. Mota[^2] and E. R. Bezerra de Mello.\
\
*Departamento de Física, Universidade Federal da Paraíba*\
*58059-900, Caixa Postal 5008, João Pessoa, PB, Brazil.*\
title: 'Induced current in high-dimensional AdS spacetime in the presence of a cosmic string and a compactified extra dimension'
---
PACS numbers: 03.70.+k 04.62.+v 04.20.Gz 11.27.+d\
Introduction {#Int}
============
The physics underlying quantum vacuum fluctuations arises once quantum aspects of relativistic phenomena are taken into account. That means a quantized relativistic field (scalar, electromagnetic or fermionic) will have a fluctuating ground state. In Minkowski spacetime, for instance, the Vacuum Expectation Value (VEV) of physical observables, as a consequence of quantum vacuum fluctuations of relativistic fields, is zero unless the vacuum is somehow ‘perturbed’ by external influences. These external influences are in general boundary conditions of some sort or coupled external fields. One very known physical observable that gets a nonzero VEV under external influences is the energy density that characterizes the Casimir effect [@Mostepanenko:1997sw; @bordag2009advances; @Milton:2001yy]. Another physical observable of interest that averages to a nonzero value under these circunstances is the four-current density due to charged fields. This is of special importance since the VEV of the four-current density can provide a better understanding of the dynamics of the electromagnetic field once it is used as a source in the semiclassical Maxwell equations.
An additional feature related to modifications of quantum vacuum fluctuations of relativistic fields is its occurrence face a curved background. It has been known that geometrical and topological aspects of a curved spacetime also induce a nonzero VEV of physical observables [@Mostepanenko:1997sw; @bordag2009advances; @Milton:2001yy]. In particular, the induced VEV of the four-current density by curved backgrounds has been investigated in Refs. [@Braganca:2014qma; @deMello:2014hya; @deMello:2014ksa; @deMello:2013loa; @BezerradeMello:2009km; @BezerradeMello:2010ii; @Mohammadi:2014oga; @deSousa:2015bvy]. Among these curved backgrounds, the anti-de Sitter (AdS) spacetime carries very interesting properties which provide strong motivations to study it [@Sokolowski:2016tar; @deMello:2011ji; @Santos:2015mja; @deMello:2015yda; @Bellucci1; @Bellucci2].
By considering a negative cosmological constant, the AdS spacetime is obtained as a solution of the Einstein’s equations and thus, is characterized by a constant negative curvature. Thereby, from a theoretical and fundamental point of view, the AdS spacetime makes possible several problems to be solved exactly as a consequence of its high symmetry, allowing the quantization of fields more easily, besides offering better insights into the quantization of fields in other curved spacetimes. Moreover, the AdS spacetime arises as a ground state solution of string and supergravity theories and also appears in the context of AdS/CFT correspondence, scenario which makes possible the realization of the holographic principle, relating string theory (supergravity) in a high-dimensional AdS spacetime with a conformal field theory constructed in its boundary [@Aharony:1999ti]. In addition, the AdS background geometry is relevant in branewold scenarios with large extra dimensions, offering a way to solve the hierarchy problem between the gravitational and electroweak mass scales [@Brax:2003fv].
The combination of the AdS spacetime with the spacetime of a cosmic string is even more interesting, since this combined geometry makes possible to identify in the VEV of some observable, the contributions come from either parts, namely, from the AdS geometry and cosmic string topology. Cosmic strings are linear topological defects that are predicted in the context of both gauge field theories and supersymmetric extensions of the Standard Model of particle physics, as well as in the context of string theory [@VS; @hindmarsh; @escidoc:153364; @Copeland:2011dx; @Hindmarsh:2011qj; @Chernoff:2017pui]. The spacetime of a straight, infinitely long and structureless cosmic string is characterized by a conical topology arising due to the angle deficit in the plane perpendicular to it [@VS; @hindmarsh; @escidoc:153364]. Phenomenologically, current observations of CMB suggest cosmic strings can contribute to a small percentage of the primordial density perturbations [@Ade:2013xla] in the universe and can also play a important role in other cosmological, astrophysical and gravitational phenomena [@escidoc:153364; @Copeland:2011dx; @Hindmarsh:2011qj; @Chernoff:2017pui].
In the present paper we are interested in calculating the VEV of current density associated with a charged scalar field, and investigate the effects arising from the geometry and topology of a high-dimensional AdS spacetime in the presence of a cosmic string carrying a magnetic flux. In addition we will assume a compactification of one extra dimension and the existence of a constant vector potential along it. Thus, the presence of these magnetic fluxes as well as the compactified extra dimension will also provide additional contributions to the VEV of the current density, as we shall see.
The presence of extra compact dimensions is a characteristic aspect of all the theories mentioned before where the AdS spacetime plays a key role and, as previously said, induce nonzero contributions to physical observables such as the energy-momentum tensor which has not only the energy density component but also the stresses components (see [@deMello:2014hya] and references therein). In this case, for instance, the vacuum energy density induced by the extra compact dimensions offers an explanation for the observed and still unexplained accelerated expansion of the universe. In Kaluza-Klein-type models and in braneworld scenarious, on the other hand, the dependence of the size of the compact extra dimension by the vacuum energy density serves as mechanism to stabilize fields known as moduli fields.
This paper is organized as follows. In section \[sec2\] we present the high-dimensional AdS spacetime in the presence of a cosmic string and obtain the complete set of normalized solutions of the Klein-Gordon equation associated with a charged scalar field in this background, considering the presence of a azimuthal and axial vector potentials . This solution is then submitted to a nontrivial boundary condition that compactifies an extra dimension. This set of solution is used to construct the Wightman function. In section \[sec3\] we first prove that the VEV’s of the charge density, radial current density and current density associated with the extra dimensions, except the one that is compactifed, are all zero. Finally, the rest of the section 3 is devoted to compute the nonzero azimuthal current density and the nonzero current density associated with the compactified extra dimension. In this case, we show that the azimuthal current density has a pure contribution due to the high-dimensional AdS spacetime with a cosmic string plus a second contribution due to the compactification of the extra dimension. Moreover, we also show that the current density associated with the compactified extra dimension has only the contribution due to the compactification. The section \[sec4\] is devoted to the main conclusions about our results. Throughout the paper we use natural units $G=\hbar = c = 1$.
Klein-Gordon equation and Wightman function {#sec2}
===========================================
The main objective of this section is to obtain the positive frequency Wightman function associated with a massive scalar field in a $(D+1)$-dimensional AdS spacetime, with $D>3$, in presence of a cosmic string and a compactified extra dimension. This function is important in the calculation of vacuum polarization effects. In order to do that we first obtain the complete set of normalized mode functions for the Klein-Gordon equation admitting an arbitrary curvature coupling parameter.
In cylindrical coordinates, the geometry associated with a cosmic string in a $(3+1)$-dimensional AdS spacetime is given by the line element below (considering a static string along the $y$-axis): $$ds^{2}=e^{-2y/a}[dt^{2}-dr^{2}-r^{2}d\phi ^{2}]-dy^{2}\ , \label{ds1}$$ where $r\geqslant 0$ and $\phi \in \lbrack 0,\ 2\pi /q]$ define the coordinates on the conical geometry, $(t, \ y)\in (-\infty ,\ \infty )$, and the parameter $a$ determines the curvature scale of the background spacetime. The parameter $q\geq 1$ codifies the presence of the cosmic string. Using the *Poincaré* coordinate defined by $w=ae^{y/a}$, the line element above is written in the form conformally related to the line element associated with a cosmic string in Minkowski spacetime: $$ds^2 = \left(\frac{a}{w}\right)^2[dt^2 - dr^2 - r^2d\phi^2 - dw^2 ]
\label{ds2}$$ For the new coordinate one has $w\in \lbrack 0,\ \infty )$. Specific values for this coordinates deserve to be mentioned: $w=0$ and $w=\infty $ correspond to the AdS boundary and horizon, respectively.
For an idealized cosmic string, i.e., an infinitely thin and long straight cosmic string in the background of Minkowski spacetime, the line element expression inside the brackets of the right-hand side of (\[ds2\]), has been derived in [@Vile81] by making use of two approximations: the weak-field approximation and the thin-string one. In this case the parameter $q$ is related to the mass per unit length $\mu $ of the string by the formula $1/q=1-4G\mu $, where $G$ is the Newton’s gravitational constant. However, the validity of the line element with the planar angle deficit has been extended beyond linear perturbation theory by [@Gott85; @VS]. In this case the parameter $q$ need not to be close to 1. Note that in braneworld scenarios based on AdS spacetime, to which the results given in this paper could be applied, the fundamental Planck scale is much smaller than $m_{\mathrm{Pl}}$ and can be of order of string formation energy scale.
The generalization of (\[ds2\]) to $(D+1)$-dimensional AdS spacetimes is done in the usual way, by adding extra Euclidean coordinates [@deMello:2011ji]: $$\label{HDCS}
ds^2 = \left(\frac{a}{w}\right)^2\bigg[dt^2 - dr^2 - r^2d\phi^2 - dw^2 - \sum_{i=4}^{D}(dx^i)^2\bigg] \ .$$ The Euclidean version of the line element expressed inside the bracket of the above equation, has been presented in [@Linet], and called as [*conical-type line singularity*]{} in arbitrary dimension; therefore, we consider the line element inside as a Minkowski version of the cosmic string metric spacetime for higher-dimension. Moreover, a discussion about the generalization of the cosmic string spacetime can also be found in [@Sitenko].
The curvature scale $a$ in is related to the cosmological constant, $\Lambda $, and the Ricci scalar, $R$, by the formulas $$\Lambda =-\frac{D(D-1)}{2a^{2}} \ ,\ \ R=-\frac{D(D+1)}{a^{2}}\ .
\label{LamR}$$
The analysis of induced current density for a charged massive scalar field in the anti-de Sitter (AdS) space described in Poincaré coordinates with toroidally compact dimensions, has been developed in [@deMello:2014hya]. In the latter it is assumed that, in addition to compact dimensions, the field obeys periodicity conditions with general phases. Moreover, the presence of constant vector potentials has also been considered.
In this present paper we are interested in calculating the induced vacuum current density, $\langle j_{\mu}\rangle$, associated with a charged scalar quantum field, $\varphi (x)$, in the cosmic string spacetime in the AdS bulk induced by the presence of magnetic flux running along the string’s core. Moreover, we also assume the compactification along only one extra coordinate, defined by $z$ in the expression below, $$ds^2 = \left(\frac{a}{w}\right)^2\bigg[dt^2 - dr^2 - r^2d\phi^2 - dw^2 -dz^2- \sum_{i=5}^{D}(dx^i)^2\bigg] \ .
\label{le2}$$ Note that we will also consider the presence of a constant vector potential along the extra compact dimension. This compactification is implemented by assuming that $z\in[0, \ L]$, and the matter field obeys the quasiperiodicity condition below, $$\varphi(t,r,\phi, w, z + L, x^5,...,x^{D}) = e^{2\pi i\beta}\varphi(t,r,\phi, w, z, x^5,...,x^{D}),
\label{QPC}$$ where $0\leq\beta\leq 1$. The special cases $\beta =0$ and $\beta =1/2$ correspond to the untwisted and twisted fields, respectively, along the $z$-direction.
The field equation which governs the quantum dynamics of a charged bosonic field with mass $m$, in a curved background and in the presence of an electromagnetic potential vector, $A_\mu$, reads $$(g^{\mu\nu}D_{\mu}D_{\nu} + m^2 + \xi R)\varphi(x) = 0 \ ,
\label{KGE}$$ being $D_{\mu}=\nabla_{\mu}+ieA_{\mu}$. In addition, we have considered the presence of a non-minimal coupling, $\xi$, between the field and the geometry represented by the Ricci scalar, $R$. Two specific values for the curvature coupling are $\xi = 0$ and $\xi = \frac{D - 1}{4D}$, that correspond to minimal and conformal coupling, respectively. Also we shall assume the existence of the following constant vector potentials, $$A_{\mu} = (0,0,A_{\phi}, 0, A_z, 0,...,0) \ ,
\label{VP}$$ with $A_{\phi}=-q\Phi_\phi/(2\pi)$ and $A_{z}=-\Phi_z/L$, being $\Phi_\phi$ and $\Phi_z$ the corresponding magnetic fluxes. In quantum field theory the condition changes the spectrum of the vacuum fluctuations compared with the case of uncompactified dimension and, as a consequence, the induced vacuum current density changes.
In the spacetime defined by and in the presence of the vector potentials given above, the equation becomes $$\begin{aligned}
\left[\frac{\partial^2}{\partial t^2} - \frac{\partial^2}{\partial r^2} - \frac{1}{r}\frac{\partial}{\partial r} - \frac{1}{r^2}\left(\frac{\partial}{\partial\phi} + ieA_{\phi}\right)^2 -
\left(\frac{\partial}{\partial z} + ieA_{z}\right)^2\right.\nonumber\\
\left.
- \frac{\partial^2}{\partial w^2}-\frac{(1-D)}{w}\frac{\partial}{\partial w} + \frac{M(D,m,\xi)}{w^2} - \sum_{i=5}^{D}\frac{\partial^2}{\partial (x^i)^2} \right]\varphi(x) = 0 \ .
\label{KGE2}\end{aligned}$$ where $M(D,m,\xi) = a^2m^2 - \xi D(D+1)$.
The equation above is completely separable and its positive energy and regular solution at origin is given by, $$\varphi(x) = Cw^{\frac{D}{2}}J_{\nu}(pw)J_{q|n +\alpha|}(\lambda r)e^{-iE t + iqn\phi + ik_{z}z + i\vec{k}\cdot\vec{x}_{\parallel}}.
\label{Solu1}$$ In the expression above $\vec{x}_{\parallel}$ represents the coordinates along the $(D-4)$ extra dimensions, and $\vec{k}$ the corresponding momentum. Moreover, $$\begin{aligned}
\nu &=& \sqrt{\frac{D^2}{4} + a^2m^2 - \xi D(D+1)},\nonumber\\
E &=& \sqrt{\lambda^2 + p^2 + \vec{k}^2 + (k_{z} + eA_z)^2},\nonumber\\
\alpha &=& \frac{eA_{\phi}}{q} = -\frac{\Phi_{\phi}}{\Phi_0}.
\label{const}\end{aligned}$$ being $\Phi_0=\frac{2\pi}{e}$, the quantum flux. In $J_\mu(z)$ represents the Bessel function [@Abra].
The quasiperiodicity condition provides a discretization of the quantum number $k_z$ as shown below: $$k_z = k_l = \frac{2\pi}{L}(l + \beta), \qquad \text{with}\qquad l = 0,\pm 1, \pm2,...\;.
\label{momentum}$$ Therefore $$\begin{aligned}
E=E_{l} = \sqrt{\lambda^2 + p^2 + \vec{k}^2 + \tilde{k}_l^2},
\label{const2}\end{aligned}$$ where $$\begin{aligned}
\tilde{k}_l &=& \frac{2\pi}{L}(l + \tilde{\beta}),\nonumber\\
\tilde{\beta} &=& \beta + \frac{eA_zL}{2\pi} = \beta - \frac{\Phi_z}{\Phi_0}.
\label{const3}\end{aligned}$$
The constant $C$ in can be obtained by the normalization condition below, $$\begin{aligned}
\int d^Dx\sqrt{|g|}g^{00}\varphi_{\sigma'}^{*}(x)\varphi_{\sigma}(x)= \frac{1}{2E}\delta_{\sigma,\sigma'} \ ,
\label{NC}\end{aligned}$$ where the delta symbol on the right-hand side is understood as Dirac delta function for the continuous quantum number, $\lambda$, $p$ and ${\vec{k}}$, and Kronecker delta for the discrete ones, $n$ and $k_l$. From one finds $$\begin{aligned}
|C|= \sqrt{\frac{qa^{1-D}\lambda p}{2E (2\pi)^{D-3}L}}.
\label{NC3}\end{aligned}$$
So, the normalized bosonic wave-function reads, $$\varphi_{\sigma}(x) = \sqrt{\frac{qa^{1-D}\lambda p}{2E (2\pi)^{D-3}L}}w^{\frac{D}{2}}J_{\nu}(pw)J_{q|n +\alpha|}(\lambda r)e^{-iE_{l} t + iqn\phi + ik_{l}z + i\vec{k}\cdot\vec{x}_{\parallel}} \ .
\label{COS}$$
The properties of the vacuum state can be given by the positive frequency Wightman function, $W(x,x')=\left\langle 0|\hat{\varphi}(x) \hat{\varphi}^{*}(x')|0 \right\rangle$, where $|0 \rangle$ stands for the vacuum state with respect to the observer placed at rest with respect to the string. To evaluate it we use the mode sum formula below, $$W(x,x') = \sum_{\sigma}\varphi_{\sigma}(x)\varphi_{\sigma}^{*}(x') \ .
\label{wight}$$ Substituting into we obtain, $$\begin{aligned}
W(x,x')& =& \frac{qa^{1-D}(ww')^{\frac{D}{2}}}{2(2\pi)^{D-3}L} \sum_{n=-\infty}^{\infty}e^{inq\Delta\phi}\sum_{l=-\infty}^{\infty}\int d\vec{k}\int_0^{\infty}dpp\int_0^{\infty}d\lambda\lambda\nonumber\\
&\times& J_{q|n +\alpha|}(\lambda r)J_{q|n +\alpha|}(\lambda r')J_{\nu}(pw)J_{\nu}(pw')\frac{e^{-iE_{l}\Delta t+ ik_{l}\Delta z + i\vec{k}\cdot\Delta\vec{x}_{\parallel}}}{E_{l}} \ ,
\label{wight2}\end{aligned}$$ where $\Delta t=t-t', \Delta \phi=\phi-\phi', \Delta z=z-z'$ and $\Delta \vec{x}_{\parallel}= \vec{x}_{\parallel}-\vec{x}_{\parallel}'$.
In order to develop the summation over the quantum number $l$ we shall apply the Abel-Plana summation formula [@Saharian2010], which is given by $$\begin{aligned}
\sum_{l=-\infty}^{\infty}g(l+\tilde{\beta})f(|l+\tilde
{\beta}|)&=&\int_{0}^{\infty}du[g(u)+g(-u)]f(u)\nonumber\\
&+&i\int_{0}^{\infty}du[f(iu)-f(-iu)]\sum_{j=\pm1}^{}\frac{g(i j u)}{e^{2\pi(u+i j\tilde{\beta})}-1} \ .
\label{Abel-Plana}\end{aligned}$$ For this case, we can identify $$\begin{aligned}
g(u)&=&e^{2\pi i u\Delta z/L} \nonumber\\
f(u)&=&\frac{e^{-i\Delta t\sqrt{\lambda^2+p^2+\vec{k}^2+(2\pi u/L)^2}}}{\sqrt{\lambda^2+p^2+\vec{k}^2+(2\pi u/L)^2}} \ , \end{aligned}$$
Using , we can write the Wightman function as $$W(x,x')=W_{cs}(x,x')+W_{c}(x,x') \ .
\label{propagator}$$ The first term represents the contribution due to the AdS bulk without compactification, which, for our analysis, besides to present dependence on the magnetic fluxes also depends on the conical structure induced by the presence of the cosmic string. As to the second term it is induced by the compactification and contains contributions due to the magnetic flux enclosed by the compactified axis. Both expressions are explcitly wrtten in and , respectively.
The first term on the right hand of , derived from the first integral of , can be written as, $$\begin{aligned}
W_{cs}(x,x')&=&\frac{q(ww')^{\frac{D}{2}}e^{ -ieA_z\Delta z}}{2(2\pi)^{D-2}a^{D-1}}\int d\vec{k}e^{i\vec{k}\cdot\Delta\vec{x}_{\parallel}}\int_0^{\infty}dppJ_{\nu}(pw)J_{\nu}(pw')
\sum_{n=-\infty}^{\infty}e^{inq\Delta\phi}\nonumber\\
&\times&\int_0^{\infty}d\lambda\lambda J_{q|n +\alpha|}(\lambda r)J_{q|n +\alpha|}(\lambda r')\int dk_z e^{ik_z\Delta z}\frac{e^{-i\Delta t\sqrt{\lambda^2+p^2+\vec{k}^2+k_z^2}}}{\sqrt{\lambda^2+p^2+\vec{k}^2+k_z^2}} \ ,
\label{propagator-cs}\end{aligned}$$ where we have defined a new variable $k_z=2\pi u/L$.[^3] Now performing a Wick rotation, and using the following identity below, $$\frac{e^{-\Delta\tau\omega}}{\omega}=\frac2{\sqrt{\pi}}\int_0^\infty ds e^{-s^2\omega^2-\Delta\tau^2/(4s^2)} \ ,
\label{identity}$$ the integration over $k_z$ can be evaluated, and the result is $$\begin{aligned}
W_{cs}(x,x')&=&\frac{q(ww')^{\frac{D}{2}}e^{ -ieA_z\Delta z}}{(2\pi)^{D-2}a^{D-1}}\int d\vec{k}e^{i\vec{k}\cdot\Delta\vec{x}_{\parallel}}\int_0^{\infty}dppJ_{\nu}(pw)J_{\nu}(pw')\sum_{n=-\infty}^{\infty}e^{inq\Delta\phi}\nonumber\\
&\times&\int_0^{\infty}d\lambda\lambda J_{q|n +\alpha|}(\lambda r)J_{q|n +\alpha|}(\lambda r')\int_{0}^{\infty}\frac{ds}{s}e^{-s^2(\lambda^2+p^2+\vec{k}^2)-(\Delta z^2-\Delta t^2)/4s^2}\ .
\label{propagator-cs-2}\end{aligned}$$
Now let us concentrate on the second term of . Defining again the variable $k_z=2\pi u/L$, the integral over this variable must be considered in two different intervals: In the first interval $[0,\ \sqrt{\lambda^2+p^2+\vec{k}^2}]$, the integral vanishes, so it remains the contribution coming from the second interval, $[\sqrt{\lambda^2+p^2+\vec{k}^2}, \ \infty)$. So, taking into account this analysis we get, $$\begin{aligned}
\label{W_compact}
W_{c}(x,x')&=&\frac{q(ww')^{\frac{D}{2}}e^{ -ieA_z\Delta z}}{(2\pi)^{D-2}a^{D-1}}\int d\vec{k}e^{i\vec{k}\cdot\Delta\vec{x}_{\parallel}}\int_0^{\infty}dppJ_{\nu}(pw)J_{\nu}(pw')\nonumber\\
&\times&\sum_{n=-\infty}^{\infty}e^{inq\Delta\phi}\int_0^{\infty}d\lambda\lambda J_{q|n +\alpha|}(\lambda r)J_{q|n +\alpha|}(\lambda r')\nonumber\\
&\times&\int_{\sqrt{\lambda^2+p^2+\vec{k}^2}}^{\infty}dk_z\frac{\cosh{\big(\Delta t\sqrt{k_z^2-\lambda^2-p^2-\vec{k}^2}\big)}}{\sqrt{k_z^2-\lambda^2-p^2-\vec{k}^2}}
\times\sum_{j=\pm 1}^{\infty}\frac{e^{-jk_z\Delta z}}{e^{Lk_z+2\pi ij\tilde{\beta}}-1}.\end{aligned}$$ Developing the series expansion $(e^y-1)^{-1}=\sum_{l=1}^{\infty}e^{-ly}$, and with the help of [@Prud], it is possible to integrate over $k_z$, obtaining $$\begin{aligned}
W_{c}(x,x')&=&\frac{q(ww')^{\frac{D}{2}}e^{-ieA_z\Delta z}}{(2\pi)^{D-2}a^{D-1}}\int d\vec{k}e^{i\vec{k}\cdot\Delta\vec{x}_{\parallel}}\int_0^{\infty}dppJ_{\nu}(pw)J_{\nu}(pw')
\nonumber\\
&\times&\sum_{n=-\infty}^{\infty}e^{inq\Delta\phi}\int_0^{\infty}d\lambda\lambda J_{q|n +\alpha|}(\lambda r)J_{q|n +\alpha|}(\lambda r')\nonumber\\
&\times&\sum_{j=\pm 1}^{}\sum_{l=1}^{\infty}e^{-2\pi i\tilde{\beta} jl}K_{0}\big(\sqrt{(\lambda^2+p^2+\vec{k}^2)[(lL+j\Delta z)^2-\Delta t^2]}\big) \ .
\label{propagator-compactification}\end{aligned}$$ Clearly we notice that for $L\rightarrow\infty$, the function above vanishes. By using the integral representation below for the Macdonald function [@Grad], $$K_{\nu}(x)=\frac{1}{2}\bigg(\frac{x}{2}\bigg)^{\nu}\int_{0}^{\infty}d\tau\frac{e^{-\tau-x^2/4\tau}}{\tau^{\nu+1}},
\label{representation-Macdonald}$$ we can rewrite Eq. as $$\begin{aligned}
W_{c}(x,x')&=&\frac{q(ww')^{\frac{D}{2}}e^{-ieA_z\Delta z}}{(2\pi)^{D-2}a^{D-1}}\int d\vec{k}e^{i\vec{k}\cdot\Delta\vec{x}_{\parallel}}\int_0^{\infty}dppJ_{\nu}(pw)J_{\nu}(pw')\nonumber\\
&\times&\sum_{n=-\infty}^{\infty}e^{inq\Delta\phi}\int_0^{\infty}d\lambda\lambda J_{q|n +\alpha|}(\lambda r)J_{q|n +\alpha|}(\lambda r')\nonumber\\
&\times& \sum_{j=\pm 1}^{}\sum_{l=1}^{\infty}e^{-2\pi i\tilde{\beta}jl}\int_{0}^{\infty}\frac{ds}{s}e^{-s^2(\lambda^2+p^2+\vec{k}^2)-[(lL+j\Delta z)^2-\Delta t^2]/4s^2} \ .
\label{propagator-compactification-2}\end{aligned}$$
Substituting and into , and after some manipulations, we get a compact expression for the total Wigthman function given below, $$\begin{aligned}
W(x,x')&=&\frac{q(ww')^{\frac{D}{2}}e^{-ieA_z\Delta z}}{(2\pi)^{D-2}a^{D-1}}\int d\vec{k}e^{i\vec{k}\cdot\Delta\vec{x}_{\parallel}}\int_0^{\infty}dppJ_{\nu}(pw)J_{\nu}(pw')\nonumber\\
&\times& \sum_{n=-\infty}^{\infty}e^{inq\Delta\phi}\int_0^{\infty}d\lambda\lambda J_{q|n +\alpha|}(\lambda r)J_{q|n +\alpha|}(\lambda r')\nonumber\\
&\times&\sum_{l=-\infty}^{\infty}e^{-2\pi i\tilde{\beta}l}\int_{0}^{\infty}\frac{ds}{s}e^{-s^2(\lambda^2+p^2+\vec{k}^2)-[(lL+j\Delta z)^2-\Delta t^2]/4s^2} \ .\end{aligned}$$ Now using the integral below [@Grad], $$\int_0^{\infty}d\eta\eta e^{-\eta^2s^2}J_{\gamma}(\eta\rho)J_{\gamma}(\eta\rho') = \frac{e^{-\frac{(\rho^2 + \rho'^2)}{4s^2}}}{2s^2}I_{\gamma}\left(\frac{\rho\rho'}{2s^2}\right) \ ,
\label{id2}$$ we can integrate over $\lambda$, $p$ and $\vec{k}$, obtaining $$\begin{aligned}
W(x,x')&=&\frac{qe^{-ieA_z\Delta z}}{2(2\pi)^{\frac{D}{2}}a^{D-1}}\bigg(\frac{ww'}{rr'}\bigg)^{\frac{D}{2}}\sum_{l=-\infty}^{\infty}e^{-2\pi i\tilde{\beta}l}\int_{0}^{\infty}d\chi \chi^{\frac{D}{2}-1}e^{-\chi u_{l}^{2}/2rr'}
I_{\nu}\bigg(\frac{ww'}{rr'}\chi\bigg)\nonumber\\
&\times&\sum_{n=-\infty}^{\infty}e^{iqn\Delta\phi}I_{q|n+\alpha|}(\chi) \ ,
\label{propagator-to-sum}\end{aligned}$$ where we have introduced a new variable $\chi=rr'/2s^2$, and defined $$u_{l}^{2}=r^2+r'^2+w^2+w'^2+(lL+\Delta z)^2+\Delta \vec{x}^{2}_{\parallel}-\Delta t^2 \ .$$ The parameter $\alpha$ in Eq. can be written in the form $$\alpha=n_{0}+\varepsilon, \ \textrm{with}\ |\varepsilon|<\frac{1}{2},
\label{const-2}$$ being $n_{0}$ is an integer number. This allow us to sum over the quantum number $n$ in , using the result obtained in [@deMello:2014ksa], given below, $$\begin{aligned}
&&\sum_{n=-\infty}^{\infty}e^{iqn\Delta\phi}I_{q|n+\alpha|}(\chi)=\frac{1}{q}\sum_{k}e^{\chi\cos(2\pi k/q-\Delta\phi)}e^{i\alpha(2\pi k -q\Delta\phi)}\nonumber\\
&-&\frac{e^{-iqn_{0}\Delta\phi}}{2\pi i}\sum_{j=\pm1}je^{ji\pi q|\varepsilon|}
\int_{0}^{\infty}dy\frac{\cosh{[qy(1-|\varepsilon|)]}-\cosh{(|\varepsilon| qy)e^{-iq(\Delta\phi+j\pi)}}}{e^{\chi\cosh{(y)}}\big[\cosh{(qy)}-\cos{(q(\Delta\phi+j\pi))}\big]},
\label{summation-formula}\end{aligned}$$ where $$-\frac{q}{2}+\frac{\Delta\phi}{\Phi_{0}}\le k\le \frac{q}{2}+\frac{\Delta\phi}{\Phi_{0}} \ .$$ In short, the obtainment of the above expression is through the integral representation for the modified Bessel function [@Abra], $$I_{q|n+\alpha|}(z)=\frac{1}{\pi }\int_{0}^{\pi }dy\;\cos (q|n+\alpha|
y)e^{z\cos y}-\frac{\sin (\pi q|n+\alpha|)}{\pi }\int_{0}^{\infty
}dye^{-z\cosh y-q|n+\alpha| y} \ ,$$ following by the summation of the quantum number $n$ and some additional intermediate steps.
Thus, the substitution of into , allow us to integrate over $\chi$ with the help of [@Grad], yielding $$\begin{aligned}
W(x,x')&=&\frac{e^{-ieA_z\Delta z}}{(2\pi)^{\frac{D+1}{2}}a^{D-1}}\sum_{l=-\infty}^{\infty}e^{-2\pi i\tilde{\beta}l}\Bigg\{\sum_{k}e^{i\alpha(2\pi k-q\Delta\phi)}F_{\nu-1/2}^{(D-1)/2}({u}_{lk})\nonumber\\
&-&q\frac{e^{-iqn_{0}\Delta\phi}}{2\pi i}\sum_{j=\pm1}je^{ji\pi q|\varepsilon|}
\int_{0}^{\infty}dy\frac{\cosh{[(1-|\varepsilon|)qy]}-\cosh{(|\varepsilon|q y)e^{-iq(\Delta\phi+j\pi)}}}{\cosh{(qy)}-\cos{(q(\Delta\phi+j\pi))}}\nonumber\\
&\times&F_{\nu-1/2}^{(D-1)/2}({u}_{ly})\Bigg\},
\label{full-propagator}\end{aligned}$$ where we have introduced the notation $$\begin{aligned}
F_{\gamma}^{\mu}(u)&=&e^{-i\pi\mu}\frac{Q^{\mu}_{\gamma}(u)}{(u^2-1)^{\mu/2}} \nonumber\\
&=&\frac{\sqrt{\pi}\Gamma(\gamma+\mu+1)}{2^{\gamma+1}\Gamma(\gamma+3/2)u^{\gamma+\mu+1}}F\bigg(\frac{\gamma+\mu}{2}+1,\frac{\gamma+\mu+1}{2};\gamma+\frac{3}{2};\frac{1}{u^{2}}\bigg).
\label{function-2}\end{aligned}$$ being $Q_{\gamma}^{\mu}(u)$ the associated Legendre function of second kind and $F(a,b;c;z)$ the hypergeometric function [@Abra]. In , the arguments of the function $F_{\gamma}^{\mu}$ are given by $$\begin{aligned}
u_{lk}&=&1+\frac{r^2+r'^2-2rr'\cos{(2\pi k/q-\Delta\phi)}+\Delta w^2+(lL+\Delta z)^2+\Delta\vec{x}^{2}_{\parallel}-\Delta t^2}{2ww'}\nonumber\\
u_{ly}&=&1+\frac{r^2+r'^2+2rr'\cosh{(y)}+\Delta w^2+(lL+\Delta z)^2+\Delta\vec{x}^{2}_{\parallel}-\Delta t^2}{2ww'}.\end{aligned}$$ So, is the the most compact expression to the Wightman function. In this format the $l=0$ component corresponds to the contribution due to the cosmic string only, and $l\neq0$ is the contribution due to the compactification.
Having obtained the above result, we are in position to calculate the induced current densities. This new subject is left to the next sections.
Bosonic Current {#sec3}
===============
The bosonic current density operator is given by, $$\begin{aligned}
\hat{j_{\mu }}(x)&=&ie\left[\hat{\varphi} ^{*}(x)D_{\mu }\hat{\varphi} (x)-
(D_{\mu }\hat{\varphi})^{*}\hat{\varphi}(x)\right] \nonumber\\
&=&ie\left[\hat{\varphi}^{*}(x)\partial_{\mu }\hat{\varphi} (x)-\hat{\varphi}(x)
(\partial_{\mu }\hat{\varphi}(x))^{*}\right]-2e^2A_\mu(x)|\hat{\varphi}(x)|^2 \ .
\label{eq20}\end{aligned}$$ Its vacuum expectation value (VEV) can be evaluated in terms of the positive frequency Wightman function as exhibited below: $$\left\langle j_{\mu}(x) \right\rangle=ie\lim_{x'\rightarrow x}
\left\{(\partial_{\mu}-\partial_{\mu}')W(x,x')+2ieA_\mu W(x,x')\right\} \ .
\label{eq21}$$
As we will see, this VEV is a periodic function of the magnetic fluxes $\Phi_\phi$ and $\Phi_z$ with period equal to the quantum flux. This can be observed writing the parameter $\alpha$ as in .
Charge Density
--------------
Let us begin with the calculation of the charge density. Since $A_{0}=0$, we have $$\langle j_{0}(x)\rangle=ie\lim\limits_{x'\rightarrow x}(\partial_{t}-\partial'_{t})W(x,x').
\label{charge-density}$$ Substituting Eq. into the above expression, taking the time derivatives and finally the coincidence limit, we obtain a divergent result. To avoid this problem a regularization procedure is necessary. Many regularization procedure can be applied; however for the present problem the most convenient is the Pauli-Villars gauge-invariant (PV) one. Adopting this procedure, regulator fields with large masses are introduced. The number of these fields depends on the specific problem. As we will see below, a single regulator field with mass $M$ is sufficient. By using PV the regularized VEV of the charge density reads, $$\begin{aligned}
\langle j^{0}(x)\rangle_{Reg}&=&\frac{2ie}{(2\pi)^{\frac{D+1}{2}}a^{D+1}} \lim\limits_{t'\rightarrow t}\Delta t\sum_{l=-\infty}^{\infty}e^{-2\pi i\tilde{\beta}l}\left[\sum_{k}e^{2\pi ki\alpha}\sum_{n=0,1}c_{n}F_{\nu_{(n)}-1/2}^{(D+1)/2}(\tilde{u}_{lk})\right.\nonumber\\
&-&\left.\frac{q}{2\pi i}\sum_{j=\pm1}je^{ji\pi q|\varepsilon|}
\int_{0}^{\infty}dy\frac{\cosh{[(1-|\varepsilon|)qy]}-\cosh{(|\varepsilon|qy)e^{-iqj\pi}}}{\cosh{(qy)}-\cos{(qj\pi)}}\right.\nonumber\\
&\times&\left.\sum_{n=0,1}c_nF_{\nu_{(n)}-1/2}^{(D+1)/2}(\tilde{u}_{ly})\right] ,
\label{charge-density-2}\end{aligned}$$ where $c_0=1$, $\nu_{(0)}=\nu$, given by , $c_{1}=-1$ and $\nu_{(1)}$ is the corresponding parameter associated with the mass $M$. Moreover, in the arguments of the functions are, $$\begin{aligned}
\label{variables-u}
\tilde{u}_{lk}&=&1+\frac{4r^2\sin^2{(\pi k/q)}+(lL)^2-\Delta t^2}{2w^2}\nonumber\\
\tilde{u}_{ly}&=&1+\frac{4r^2\cosh^2{(y)}+(lL)^2-\Delta t^2}{2w^2} \ .\end{aligned}$$ In the obtainment of the above result we have used the following relation $$\partial_{x}F_{\gamma}^{\mu}(u(x))=-(\partial_{x}u(x))F_{\gamma}^{\mu+1}(u(x)) \ ,
\label{derivative}$$ by using the recurrence relations for the associated Legendre function of second kind [@Abra].
We can see from , that the arguments of the functions $F_{\nu_{(n)}-1/2}^{(D+1)/2}$ above, for $l\neq0$, are bigger than unity. Consequently the corresponding compactified contributions inside the brackets of are finite, providing a vanishing contribution for the charge density when we take the time coincidence limit, $\Delta t\to 0$. On the other hand for cosmic string contribution ($l=0$) for $k=0$ and for $k\neq 0$ but with $r=0$, the arguments of the functions go to unit for the time coincidence limit. However, in the limit of argument close to $1$, by using the asymptotic formula for the hypergeometric function, we get a divergent result below which does not depend on the parameter $\nu$, $$\begin{aligned}
F_{\nu-1/2}^{(D+1)/2}(u)\approx\frac{\Gamma((D+1)/2)}{2(u-1)^{(D+1)/2}} \ .\end{aligned}$$ So, the divergent behavior of the combination, $F_{\nu_{(0)}-1/2}^{(D+1)/2}(u)- F_{\nu_1-1/2}^{(D+1)/2}(u)$, is canceled. Finally taking the time coincidence limit in these contributions also provide a vanishing result. So, we conclude that the charge density vanishes.
Following similar procedure we also can prove that no radial current density, $\langle j^r\rangle$, currents densities along $w$, $\langle j^w\rangle$, and extra dimensions, $\langle j^i\rangle$ for $i=5, \ 6, \ ... \ $, are induced by this system.
Azimuthal Current
-----------------
The VEV of the azimuthal current density is given by $$\langle j_{\phi}(x)\rangle =ie\lim\limits_{x'\rightarrow x}\{(\partial_{\phi}-\partial'_{\phi })W(x,x')+2ieA_{\phi}W(x,x')\} \ .
\label{eqn:azimuthal-current}$$
Substituting into the above equation, we formally can express the azimuthal current as, $$\begin{aligned}
\langle j_{\phi}(x)\rangle&=&-\frac{qea^{1-D}w^{D}}{(2\pi)^{D-3}L} \sum_{n=-\infty}^{\infty}q(n+\alpha)\int d\vec{k}\int_{0}^{\infty}\lambda J_{q|n+\alpha|}^{2}(\lambda r)d\lambda
\nonumber\\
&\times&\int_{0}^{\infty}pJ_{\nu}^{2}(pw)dp
\sum_{l=-\infty}^{\infty}\frac{1}{\sqrt{\lambda^{2}+p^{2}+\vec{k}^{2}+\tilde{k}_{l}^{2}}} \ .
\label{eqn:azimuthal-current-2}\end{aligned}$$
Identifying $g(u)=1$ and $$f(u)=\frac{1}{\sqrt{\lambda^{2}+p^{2}+\vec{k}^{2}+(2\pi u/L)^{2}}},
\label{function}$$ we can use to develop the summation on the quantum number $l$. Doing this, the VEV is decomposed as $$\langle j_{\phi}(x)\rangle= \langle j_{\phi}(x)\rangle_{cs}+\langle j_{\phi}(x)\rangle_{c} \ ,
\label{current-decomposition}$$ where $\langle j_{\phi}(x)\rangle_{cs}$ corresponds the contribution from the cosmic string without compactification, which comes from the first integral on the right hand side of the Eq.. This component reads, $$\begin{aligned}
\langle j_{\phi}(x)\rangle_{ cs}&=&-\frac{2qew^{D}}{(2\pi)^{D-2}a^{D-1}} \sum_{n=-\infty}^{\infty}q(n+\alpha)\int d\vec{k}\int_{0}^{\infty}d\lambda\lambda J_{q|n+\alpha|}^{2}(\lambda r)
\nonumber\\
&\times&\int_{0}^{\infty}pJ_{\nu}^{2}(pw)dp\int_{0}^{\infty}\frac{dk_z}{\sqrt{\lambda^{2}+p^{2}+\vec{k}^{2}+k_z^{2}}} \ ,
\label{eqn:azimuthal-current-first-part}\end{aligned}$$ where we have defined $k_z=2\pi u/L$.
Using the identity below, $$\frac{1}{\sqrt{\lambda^{2}+p^{2}+\vec{k}^{2}+k_z^{2}}
} = \frac{2}{\sqrt{\pi}}\int_{0}^{\infty}dse^{-s^2(\lambda^2+p^2+\vec{k}^2+k_z^2)},
\label{eqn:identity}$$ and we can perform the integrations over all but $s$ variable, obtaining $$\begin{aligned}
\langle j_{\phi}(x)\rangle_{cs}=-\frac{eq^2w^D}{(2\pi)^{\frac{D}{2}}a^{D-1}r^D}\int_{0}^{\infty}d\chi \chi^{\frac{D}{2}-1}e^{-\chi[1+(w/r)^2]}I_{\nu}\bigg(\frac{w^2\chi}{r^2}\bigg)\sum_{n=-\infty}^{\infty}(n+\varepsilon)I_{q|n+\varepsilon|}(\chi) \ .
\label{azimuthal-current-first-part-2}\end{aligned}$$ We have written $\alpha$ in the form and also introduced a new variable, $\chi=r^2/2s^2$. In [@Braganca:2014qma] it has been derived a compact expression for the summation over the quantum number $n$. This result we reproduce below, $$\begin{aligned}
\sum_{n=-\infty}^{\infty}(n+\varepsilon)I_{q|n+\varepsilon|}(\chi)&=&\frac{2\chi}{q^2}\sideset{}{'}\sum_{j=1}^{[q/2]}\sin{(2\pi j/q)}\sin{(2\pi j\varepsilon)}e^{\chi\cos(2\pi j/q)}\nonumber\\
&+&\frac{\chi}{q\pi}\int_{0}^{\infty}dy\sinh{(y)}\frac{e^{-\chi\cosh{(y)}}g(q,\varepsilon,y)}{\cosh{(qy)}-\cos{(\pi q)}} \ ,
\label{Summation-formula}\end{aligned}$$ where $[q/2]$ represents the integer part of $q/2$, and the prime on the sign of the summation means that in the case $q=2p$ the term $k=q/2$ should be taken with the coefficient $1/2$. Moreover the function, $g(q,\varepsilon,y)$, is defined as $$g(q,\varepsilon,y)=\sin{(q\pi \varepsilon)} \sinh{((1-|\varepsilon|)qy)}-\sinh{(q\varepsilon y)}\sin{((1-|\varepsilon|)\pi q)}.
\label{eqn:summation-formula-2}$$
Substituting the above result into and with the help of [@Grad], we get, $$\begin{aligned}
\langle j^{\phi}(x)\rangle_{cs}&=&\frac{4ea^{-(1+D)}}{(2\pi)^{\frac{D+1}{2}}}\Bigg[\sideset{}{'}\sum_{j=1}^{[q/2]}\sin{(2\pi j/q)}\sin{(2\pi j\varepsilon)}F_{\nu-1/2}^{(D+1)/2}(u_{j})\nonumber\\
&+&\frac{q}{\pi}\int_{0}^{\infty}dy\frac{\sinh{(2y)}g(q,\varepsilon,2y)}{\cosh{(2qy)}-\cos{(\pi q)}}F_{\nu-1/2}^{(D+1)/2}(u_{y})\Bigg],
\label{azimuthal-current-first-part-3}\end{aligned}$$ where the arguments of the functions are given by $$\begin{aligned}
u_{j}&=&1+2(r/w)^2\sin^2{(\pi j/q)}, \nonumber\\
u_{y}&=&1+2(r/w)^2\cosh^2{(y)} \ .\end{aligned}$$ From , we can see that $\langle j^{\phi}(x)\rangle_{cs}$ is an odd function of $\varepsilon$ with period equal to quantum flux, $\Phi_0=2\pi/e$; moreover, for $1\leq q<2$ the first term on the right hand side is absent. In Fig. \[fig1\] we exhibit the behavior of the azimuthal current as function of $\varepsilon$, considering $D=4$, the minimal curvature coupling, $\xi=0$, $r/w=ma=1$ and for different values of $q$. As we can see the intensity of the current depends strongly on the value of $q$. Increasing $q$ its intensity also increases.
![The azimuthal current density without compactification for $D=4$ in Eq. is plotted, in units of “$ea^{-5}$”, in terms of $\varepsilon$, for $r/w=1$, $ma=1$, $\xi=0$ and $q=1,1.5$ and $2.5$.[]{data-label="fig1"}](Fig1-Plot-current-phi-ma1-xi0-JxEpsilon.pdf)
\
In Fig.\[fig2\] we plot the behavior the azimuthal current, $\langle j^{\phi}(x)\rangle_{cs}$ as function of $r/w$ for $D=4$, considering $\varepsilon=0.25$ and $\xi=0$, for different values of the parameter $q$. In the left panel we adopted $ma=1$, and in the right panel $ma=5$.
![The azimuthal current density without compactification for $D=4$ in Eq. is plotted, in units of “$ea^{-5}$”, in terms of the proper distance, $r/w$, for $\varepsilon=0.25$, $\xi=0$ and $q=1,1.5,2.5.$ The plot on the left is for $ma=1$ while the plot on the right is for $ma=5$.[]{data-label="fig2"}](Fig2a-Plot-current-phi-ma1-xi0 "fig:") ![The azimuthal current density without compactification for $D=4$ in Eq. is plotted, in units of “$ea^{-5}$”, in terms of the proper distance, $r/w$, for $\varepsilon=0.25$, $\xi=0$ and $q=1,1.5,2.5.$ The plot on the left is for $ma=1$ while the plot on the right is for $ma=5$.[]{data-label="fig2"}](Fig2b-Plot-current-phi-ma5-xi0 "fig:")
After the numerical analyses for $\langle j^{\phi}(x)\rangle_{cs}$, we will develop its behavior for some specific regimes of the physical variables. We start considering $r/w\rightarrow0$. We can use the asymptotic formula for the hypergeometric function for small arguments [@Abra] to rewrite Eq. as $$\begin{aligned}
\langle j^{\phi}(x)\rangle_{cs}&\approx& \frac{4e\Gamma(\frac{D+1}{2})}{(4\pi)^{\frac{D+1}{2}}}\bigg(\frac{w}{ar}\bigg)^{D+1}\Bigg[\sideset{}{'}\sum_{j=1}^{[q/2]}\frac{\cot{(\pi j/q)}\sin{(2\pi j\varepsilon)}}{\sin^{D-1}{(\pi j/q)}}\nonumber\\
&+&\frac{q}{\pi}\int_{0}^{\infty}dy\frac{\tanh{(y)}}{\cosh^{D-1}{(y)}}\frac{g(q,\varepsilon,2y)}{\cosh{(2qy)}-\cos{(\pi q)}}\Bigg] \ .
\label{azimuthal-current-first-asymptotic}\end{aligned}$$ Apart form the conformal factor, $(w/a)^{(D+1)}$, the above expression coincides with the corresponding one in Minkowski background for points near the string [@Braganca:2014qma]. On the other hand, for $r/w\gg1$, we have $$\begin{aligned}
\langle j^{\phi}(x)\rangle_{cs}&\approx& \frac{2^{1-2\nu}e\Gamma(D/2+\nu+1)}{(4\pi)^{\frac{D}{2}}\Gamma(\nu+1)
a^{D+1}}\bigg(\frac{w}{r}\bigg)^{D+2\nu+2}\bigg\{\sideset{}{'}\sum_{j=1}^{[q/2]}\frac{\cot{(\pi j/q)}\sin{(2\pi j\varepsilon)}}{\sin^{D+2\nu}{(\pi j/q)}}\nonumber\\
&+&\frac{q}{\pi}\int_{0}^{\infty}dy\frac{\tanh{(y)}}{\cosh^{D+2\nu}(y)}\frac{g(q,\varepsilon,2y)}{\cosh{(2qy)}-\cos{(\pi q)}}\Bigg\} \ .
\label{azimuthal-current-first-asymptotic-2}\end{aligned}$$ Another interesting asymptotic behavior is for $\nu\gg1$. For this case reads, $$\begin{aligned}
\langle j^{\phi}(x)\rangle_{cs}&\approx& \frac{2e\nu^{D/2}}{(2\pi)^{\frac{D}{2}}a^{1+D}}\Bigg[\sideset{}{'}\sum_{j=1}^{[q/2]}\sin{(2\pi j/q)}\sin{(2\pi j\varepsilon)}\frac{\big(u_{j}+\sqrt{u_{j}^{2}-1}\big)^{-\nu}}{(u_{j}^{2}-1)^{\frac{D+2}{4}}}\nonumber\\
&+&\frac{q}{\pi}\int_{0}^{\infty}dy\frac{\sinh{(2y)}g(q,\varepsilon,2y)}{\cosh{(2qy)}-\cos{(\pi q)}}\frac{\big(u_{y}+\sqrt{u_{y}^{2}-1} \big)^{-\nu}}{(u_{y}^{2}-1)^{\frac{D+2}{4}}}\Bigg] \ .
\label{azimuthal-current-first-part-4}\end{aligned}$$
For a conformally coupled massless scalar field we have $\nu=1/2$, and by expressing the associated Legendre function in terms of hypergeometric function [@Abra; @Grad], we can write a more convenient expression for $F_{\nu-1/2}^{(D+1)/2}(u)$ [@deMello:2014hya], given by $$\begin{aligned}
F_{0}^{(D+1)/2}(u)=-\frac{\Gamma\big(\frac{D+1}{2}\big)}{2}\bigg[(1+u)^{-(D+1)/2}-(u-1)^{-(D+1)/2}\bigg].
\label{function-3}\end{aligned}$$ Substituting into , we obtain $$\begin{aligned}
\label{j_conf}
\langle j^{\phi}(x)\rangle_{cs}&=&\bigg(\frac{w}{a}\bigg)^{D+1} \Bigg\{\frac{4e\Gamma\big(\frac{D+1}{2}\big)}{(4\pi)^{\frac{D+1}2}{r^{(D+1)}}}\Bigg[\sideset{}{'}\sum_{j=1}^{[q/2]}\frac{\cos{(\pi j/q)}\sin(2\pi j\varepsilon)}{\sin^{D}(\pi j/q)}
\nonumber\\
&+&\frac{q}{\pi}\int_{0}^{\infty}dy\frac{\sinh{(y)}}{\cosh{(2qy)-\cos{(\pi q)}}}\frac{g(q,\varepsilon,2y)}{\cosh^{D}{(y)}}\Bigg]
\nonumber\\
&-&\frac{2e\Gamma\big(\frac{D+1}{2}\big)}{(4\pi)^{\frac{D+1}2}{r^{(D+1)}}}\Bigg[\sideset{}{'}\sum_{j=1}^{[q/2]}\sin{(2\pi j/q)\sin{(2\pi j\varepsilon)}\bigg(\frac{w^2}{r^2}+\sin^2(\pi j/q)\bigg)^{-\frac{D+1}{2}}}\nonumber\\
& &+\frac{q}{\pi}\int_{0}^{\infty}dy\frac{\sinh{(2y)}g(q,\varepsilon,2y)}{\cosh{(2qy)-\cos{(\pi q)}}}\bigg(\frac{w^2}{r^2}+\cosh^2(y)\bigg)^{-\frac{D+1}{2}}\Bigg]
\Bigg\} \ .\end{aligned}$$ We notice that two different set of contributions appear in the expression above. Apart from the conformal factor, the first set coincides with the induced massless scalar azimuthal current in the Minkowski background [@Braganca:2014qma]. It is divergent for $r\to 0$. As to the second set, it is a new contribution. This part is induced by the boundary located at $w=0$. It is finite at the string’s core for $w\neq 0$. In addition, for $r\gg w$ this part tends to cancel the first one. Finally, taking $D=4$ in the above expression, we obtain $$\begin{aligned}
\langle j^{\phi}(x)\rangle_{cs}&=&\bigg(\frac{w}{a}\bigg)^{5} \Bigg\{\frac{3e}{32\pi^{2}r^5}\Bigg[\sideset{}{'}\sum_{j=1}^{[q/2]}\frac{\cot{(\pi j/q)}\sin(2\pi j\varepsilon)}{\sin^{3}(\pi j/q)}
\nonumber\\
&+&\frac{q}{\pi}\int_{0}^{\infty}dz\frac{\tanh{(z)}}{\cosh{(2qz)-\cos{(\pi q)}}}\frac{g(q,\epsilon,2z)}{\cosh^{3}{(z)}}\Bigg]
\nonumber\\
& -&\frac{3e}{64\pi^{2}r^5}\Bigg[\sideset{}{'}\sum_{j=1}^{[q/2]}\sin{(2\pi j/q)\sin{(2\pi j\varepsilon)}\bigg(\frac{w^2}{r^2}+\sin^2(\pi j/q)\bigg)^{-5/2}}\nonumber\\
&+&\frac{q}{\pi}\int_{0}^{\infty}dy\frac{\sinh{(2y)}g(q,\varepsilon,2y)}{\cosh{(2qy)-\cos{(\pi q)}}}\bigg(\frac{w^2}{r^2}+\cosh^2(y)\bigg)^{-5/2}\Bigg]\Bigg\} \ .\end{aligned}$$
The compactified contribution for the azimuthal current, $\langle j_{\phi}(x)\rangle_{c}$, can be obtained using . So, we have, $$\begin{aligned}
\langle j_{\phi}(x)\rangle_{c}&=&-\frac{2qew^{D}} {(2\pi)^{D-2}a^{D-1}}\sum_{n=-\infty}^{\infty}q(n+\alpha)\int d\vec{k}\int_{0}^{\infty}\lambda J^{2}_{q|n+\alpha|}(\lambda r)d\lambda\nonumber\\
&\times&\int_{0}^{\infty}p J^{2}_{\nu}(pw)dp\int_{\sqrt{\lambda^2+p^2+\vec{k}^2}}^{\infty}\frac{dk_z}{\sqrt{k_z^2-\lambda^2-p^2-\vec{k}^2}}\sum_{j=\pm1}^{}\frac{1}{e^{Lk_z+2\pi ij\tilde{\beta}}-1}.
\label{compactification-contribuition}\end{aligned}$$
To proceed with our analysis, it is necessary to use the series expansion $(e^y-1)^{-1}=\sum_{l=1}^{\infty}e^{-ly}$, and with the help of [@Grad] we can integrate over $k_z$, obtaining $$\begin{aligned}
\langle j_{\phi}(x)\rangle_{c}&=&- \frac{4qew^{D}}{(2\pi)^{D-2}a^{D-1}}\sum_{l=1}^{\infty}\cos(2\pi l\tilde{\beta})\sum_{n=-\infty}^{\infty}q(n+\alpha)\int d\vec{k}\int_{0}^{\infty} d\lambda\lambda J^{2}_{q|n+\alpha|}(\lambda r)\nonumber\\
&\times&\int_{0}^{\infty}dp \ p J^{2}_{\nu}(pw) \ K_{0}\left(lL\sqrt{\lambda^2+p^2+\vec{k}^2}\right) \ .
\label{compactification-contribuition-2}\end{aligned}$$ Using the integral representation for the Macdonald function given in , it is possible to integrate over the variables $ \lambda$, $p$ and $\vec{k}$, getting $$\begin{aligned}
\langle j_{\phi}(x)\rangle_{c}&=&- \frac{2q^2ew^D}{(2\pi)^{D/2}a^{D-1}r^D} \sum_{l=1}^{\infty}\cos(2\pi l\tilde{\beta})\int_{0}^{\infty} d\chi\chi^{(D-2)/2}e^{-\chi[1+(l^2L^2+2w^2)/2r^2]}\nonumber\\
&\times&I_{\nu}\bigg(\frac{w^2\chi}{r^2}\bigg)\sum_{n=-\infty}^{\infty}(n+\varepsilon)I_{q|n+\varepsilon|}(\chi) \ ,\end{aligned}$$ where we have written $\alpha$ in the form of and defined the variable, $\chi=\frac{2tr^2}{(lL)^2}$. Now using the sum formula given in , we are able to integrate over $\chi$, obtaining the final form of contribution to the azimuthal current density induced by the compactification: $$\begin{aligned}
\langle j^{\phi}(x)\rangle_{c}&=& \frac{8ea^{-(D+1)}}{(2\pi)^{(D+1)/2}}\sum_{l=1}^{\infty}\cos(2\pi l\tilde{\beta})\Bigg[\sideset{}{'}\sum_{j=1}^{[q/2]}\sin(2\pi j/q)\sin(2\pi j\varepsilon)F_{\nu-1/2}^{(D+1)/2}(v_{lj})\nonumber\\
&+&\frac{q}{\pi}\int_{0}^{\infty}dy\frac{\sinh{(2y)}g(q,\varepsilon,2y)}{\cosh(2qy)-\cos(\pi q)}F_{\nu-1/2}^{(D+1)/2}(v_{ly})\Bigg],
\label{azimuthal-current-second-part}\end{aligned}$$ being $$\begin{aligned}
v_{lj}&=&1+\frac{(lL)^2+4r^2\sin^2{(\pi j/q)}}{2w^2}\nonumber\\
v_{ly}&=&1+\frac{(lL)^2+4r^2\cosh^2{(y)}}{2w^2} \ .\end{aligned}$$
From the above expression we can see that the contribution due to the compactification on the azimuthal current density is an even function of the parameter $\tilde{\beta}$ and is an odd function of the magnetic flux along the core of the string, with period equal to $\Phi_0$. In particular, in the case of an untwisted bosonic field, $\langle j^{\phi }(x)\rangle _{{\rm c}}$ is an even function of the magnetic flux enclosed by the compactified dimension. In Fig \[fig3\] we plot as function of $\tilde{\beta}$ for $D=4$, considering $ma=1$, $\xi=0$, $\varepsilon=0.25$ and different values of $q$. As we can see, besides $\langle j^{\phi}(x)\rangle_{c}$ to present a strong dependence on the parameter $q$, its direction depends on the value of $\tilde{\beta}$.
![ The azimuthal current density induced by compactification for $D=4$ is plotted, in units of “$ea^{-5}$”, in terms of $\tilde{\beta}$ for $ma=1$, $\xi=0$, $\varepsilon=0.25$ and $q=1,1.5$ and $2.5$.[]{data-label="fig3"}](Fig3-Plot-phi-current-compac-JxBeta-ok)
In the regime $L/w\gg1$, presents the following asymptotic behavior $$\begin{aligned}
\langle j^{\phi}(x)\rangle_{c}&\approx& \frac{2^{1-2\nu}e\Gamma(D/2+\nu+1)}{(4\pi)^{\frac{D}{2}}\Gamma(\nu+1)a^{D+1}}\bigg(\frac{w}{L}\bigg)^{D+2\nu+2}\sum_{l=1}^{\infty}\cos(2\pi l\tilde{\beta})\nonumber\\
&\times&\Bigg\{\sideset{}{'}\sum_{j=1}^{[q/2]}\sin(2\pi j/q)\sin(2\pi j\varepsilon)
\bigg[\frac{l^2}{4}+\bigg(\frac{r}{L}\bigg)^{2}\sin^2(\pi j/q)\bigg]^{-\frac{D}{2}-\nu-1}
\nonumber\\
&+&\frac{q}{\pi}\int_{0}^{\infty}dy\frac{\sinh{(2y)}g(q,\varepsilon,2y)} {\cosh(2qy)-\cos(\pi q)}\bigg[\frac{l^2}{4}+\bigg(\frac{r}{L}\bigg)^{2} \cosh^2(y)\bigg]^{-\frac{D}{2}-\nu-1}\Bigg\} \ .
\label{azimuthal-current-second-part-asymptotic}\end{aligned}$$ For a conformally coupled massless scalar field and taking $D=4$, a much simpler expression can be provided. It reads, $$\begin{aligned}
\label{current1}
\langle j^{\phi}(x)\rangle_{c}&=& \bigg(\frac{w}{aL}\bigg)^{5}\frac{3e}{\pi^2}\Bigg\{\sideset{}{'}\sum_{j=1}^{[q/2]}\sin(2\pi j/q)\sin(2\pi j\varepsilon)\bigg[G_{c}(\tilde{\beta},\rho_{j})-G_{c}(\tilde{\beta},\sigma_{j})\bigg]
\nonumber\\
&+&\frac{q}{\pi}\int_{0}^{\infty}dy\frac{\sinh{(2y)}g(q,\varepsilon,2y)}{\cosh(2qy)-\cos(\pi q)}\bigg[G_{c}(\tilde{\beta},\eta(y))-G_{c}(\tilde{\beta},\tau(y))\bigg]\Bigg\} \ ,\end{aligned}$$ where we have defined the function $$G_{c}(\tilde{\beta},x)=\sum_{l=1}^{\infty}\frac{\cos{(2\pi l\tilde{\beta})}}{(l^2+x^2)^{5/2}},$$ and introduced new variables $$\begin{aligned}
\rho_{j}&=&\frac{2r\sin{(\pi j/q)}}{L}\ \ , \quad\quad\quad\quad\quad\quad\quad\eta(y)=\frac{2r\cosh(y)}{L}
\nonumber\\
\sigma_{j}&=&\frac{2}{L}\sqrt{w^2+r^2\sin^2{(\pi j/q)}} \ \ , \quad\quad\quad\tau(y)=\frac{2}{L}\sqrt{w^2+r^2\cosh^2(y)}.
\label{variables}\end{aligned}$$ Similarly to what happened with the , two different contributions appear in . The positive contribution is due to the compactification only, and the negative one is induced by the boundary located at $w=0$. Also we can observe that for $r\gg w$ the latter tends to cancel the former.
Current along the compactified dimension
----------------------------------------
In this section we want to analyze the current density along the compactified axis, named axial current. As we shall see, due to the compactification an axial current will be induced. This current goes to zero in the limit $L\to \infty$. The VEV of the axial current is calculated by $$\langle j_{z}(x)\rangle =ie\lim\limits_{x'\rightarrow x}\{(\partial_{z}-\partial'_{z })W(x,x')+2ieA_{z}W(x,x')\}
\label{eqn:axial-current}$$ Substituting Eq. into the above expression and using the fact that $A_{z} = -\Phi_{z}/L$, we obtain $$\begin{aligned}
\langle j_{z}(x)\rangle&=&-\frac{qea^{1-D}w^{D}} {(2\pi)^{D-3}L}\sum_{n=-\infty}^{\infty}\int d\vec{k} \int_{0}^{\infty}\lambda J^{2}_{q|n+\alpha|}(\lambda r)d\lambda
\int_{0}^{\infty}p J^{2}_{\nu}(pw)dp\nonumber\\
&\times&\sum_{l=-\infty}^{\infty}\frac{\tilde{k}_{l}}{\sqrt{\lambda^{2}+p^{2}+\vec{k}^{2}+\tilde{k}_{l}^{2}}} \ ,\end{aligned}$$ where $\tilde{k}_{l}$ is given by .
The sum over the quantum number $l$ is again evaluated by using the Abel-Plana formula given in . In this case we identify $g(u)=2\pi u/L$, and $f(u)$ is given by . The first integral on the right hand side is zero due the fact that $g(u)$ is an odd function. Therefore, it remains only the second integral. It reads, $$\begin{aligned}
\langle j_{z}(x)\rangle&=&-\frac{2iqea^{1-D}w^{D}} {(2\pi)^{D-2}} \int d\vec{k}
\int_{0}^{\infty}p J^{2}_{\nu}(pw)dp\sum_{n=-\infty}^{\infty}\int_{0}^{\infty}\lambda J^{2}_{q|n+\alpha|}(\lambda r)d\lambda\nonumber\\
&\times&\int_{\sqrt{\lambda^2+p^2+\vec{k}^2}}^{\infty}dk_{z}\frac{ k_{z}}{\sqrt{k_{z}^2-\lambda^2-p^2-\vec{k}^2}}\sum_{j=\pm1}^{}\frac{j}{e^{Lk_{z}+2\pi ij\tilde{\beta}}-1} \ ,\end{aligned}$$ where we have defined the variable $k_{z}=2\pi u/L$. Again by using the series expansion, $(e^y-1)=\sum_{l=1}^{\infty}e^{-ly}$, in the above expression, we have $$\begin{aligned}
\langle j_{z}(x)\rangle&=&- \frac{4qea^{1-D}w^{D}}{(2\pi)^{D-2}}\sum_{l=1}^{\infty}\sin(2\pi l\tilde{\beta})\int d\vec{k} \int_{0}^{\infty}p J^{2}_{\nu}(pw)dp\sum_{n=-\infty}^{\infty}\int_{0}^{\infty}\lambda J^{2}_{q|n+\alpha|}(\lambda r)d\lambda\nonumber\\
&\times&\int_{\sqrt{\lambda^2+p^2+\vec{k}^2}}^{\infty}dk_z\frac{ k_ze^{-lLk_z}}{\sqrt{k_z^2-\lambda^2-p^2-\vec{k}^2}} \ .
\label{axial-current}\end{aligned}$$ We can evaluated the integral over $k_z$ with the help of [@Grad], the result is given terms of the Macdonald function of the first order, $K_{1}(z)$. Using the integral representation again, and the fact that $K_{\nu}(y)=K_{-\nu}(y)$, we obtain $$\begin{aligned}
\int_{\sqrt{\lambda^2+p^2+\vec{k}^2}}^{\infty}dk_{z}\frac{ k_{z}e^{-lLk_{z}}}{\sqrt{k_{z}^2-\lambda^2-p^2-\vec{k}^2}}=\frac{1}{lL}\int_{0}^{\infty}dte^{-t-(lL)^2(\lambda^2+p^2+\vec{k}^2)/4t}
\label{integral}\end{aligned}$$ Substituting into , it is possible to evaluate the integrals over $\lambda$, $p$ and $\vec{k}$, obtaining $$\begin{aligned}
\langle j_{z}(x)\rangle&=&-\frac{2qea^{1-D}w^{D}L}{(2\pi)^{D/2}r^{D+2}}\sum_{l=1}^{\infty}l\sin(2\pi l\tilde{\beta})\int_{0}^{\infty}d\chi\chi^{D/2} e^{-\chi[1+(l^2L^2+2w^2)/2r^2]}\nonumber\\
&\times&I_{\nu}\bigg(\frac{w^2\chi}{r^2}\bigg)\sum_{n=-\infty}^{\infty}I_{q|n+\varepsilon|}(\chi) \ ,
\label{axial-current-2}\end{aligned}$$ where we have introduced the variable $\chi=2tr^2/(lL)^2$. The summation over $n$, can be found in [@Braganca:2014qma], and also given by by taking $\Delta\varphi=0$. This sum is: $$\begin{aligned}
\sum_{n=-\infty}^{\infty}I_{q|n+\varepsilon|}(\chi)=\frac{e^\chi}{q}-\frac{1}{\pi}\int_{0}^{\infty}dy\frac{e^{-\chi\cosh{(y)}}f(q,\varepsilon,y)}{\cosh{(qy)}-\cos{(\pi q})}+\frac{2}{q}\sideset{}{'}\sum_{k=1}^{[q/2]}\cos{(2\pi k\varepsilon)}e^{\chi\cos{(2\pi k/q)}} \ .
\label{summation-formula-2}\end{aligned}$$ The function, $f(q,\varepsilon,y)$, is defined as $$f(q,\varepsilon,y)=\sin{[(1-|\varepsilon|)q\pi]}\cosh(|\varepsilon|qy)+\sin{(|\varepsilon|q\pi)}\cosh{[(1-|\varepsilon|)qy]}.$$ Finally substituting into , we get $$\begin{aligned}
\label{axial_1}
\langle j_{z}(x)\rangle&=&-\frac{2qea^{1-D}w^{D}L} {(2\pi)^{D/2}r^{D+2}}\sum_{l=1}^{\infty}l\sin(2\pi l\tilde{\beta})\int_{0}^{\infty}d\chi\chi^{D/2}e^{-\chi[1+(l^2L^2+2w^2)/2r^2]}I_{\nu}\bigg(\frac{w^2\chi}{r^2}\bigg)\nonumber\\
&\times&\Bigg[\frac{e^\chi}{q}-\frac{1}{\pi}\int_{0}^{\infty}dy\frac{e^{-\chi\cosh{(y)}}f(q,\varepsilon,y)}{\cosh{(qy)}-\cos{(\pi q})}+\frac{2}{q}\sideset{}{'}\sum_{k=1}^{[q/2]}\cos{(2\pi k\varepsilon)}e^{\chi\cos{(2\pi k/q)}}\Bigg].\end{aligned}$$
At this point, we may decompose the current above as $$\langle j_{z}(x)\rangle= \langle j_{z}(x)\rangle_{c}^{(0)}+\langle j_{z}(x)\rangle_{c}^{(q,\varepsilon)}.
\label{axial-current-decomposition}$$ where the first term on the right hand side of the above expression, $$\begin{aligned}
\langle j^{z}(x)\rangle_{c}^{(0)}= \frac{4ea^{-(1+D)}L}{(2\pi)^{\frac{D+1}{2}}}\sum_{l=1}^{\infty}l\sin(2\pi l\tilde{\beta})F_{\nu-1/2}^{(D+1)/2}(u_{l0}) \ ,
\label{topol}\end{aligned}$$ with $u_{l0}$ given below in , is purely due to the compactification. It does not depend on $\varepsilon$ and $q$. For a conformally coupled massless scalar field and taking $D=4$, this contribution reads, $$\begin{aligned}
\langle j^{z}(x)\rangle_{c}^{(0)}=\bigg(\frac{w}{a}\bigg)^5\frac{3e} {2\pi^2L^4}\Bigg\{\sum_{l=1}^{\infty}\frac{\sin{(2\pi \tilde{\beta}l)}}{l^{4}}-\sum_{l=1}^{\infty}\frac{l\sin{(2\pi\tilde{\beta}l)}}{\big[l^2+\big(\tiny\frac{2w}{L}\big)^{ \text{\tiny 2}}\big]^{\frac{5}{2}}}\Bigg\} \ .\end{aligned}$$ The second contribution to the axial current depends on the magnetic fluxes and the parameter associated with the cosmic string. It is given by, $$\begin{aligned}
\label{axial}
\langle j^{z}(x)\rangle_{c}^{(q,\varepsilon)}&=& \frac{8ea^{-(1+D)}L}{(2\pi)^{\frac{D+1}{2}}}\sum_{l=1}^{\infty}l\sin{(2\pi l\tilde{\beta})}\Bigg[\sideset{}{'}\sum_{k=1}^{[q/2]}\cos{(2\pi k\varepsilon)}F_{\nu-1/2}^{(D+1)/2}(u_{lk})\nonumber\\
&-&\frac{q}{\pi}\int_{0}^{\infty}dy\frac{f(q,\varepsilon,2y)}{\cosh{(2qy)}-\cos{(\pi q})}F_{\nu-1/2}^{(D+1)/2}(u_{ly})\Bigg] \ ,\end{aligned}$$ where we have adopted the following notation, $$\begin{aligned}
u_{lk}&=&1+\frac{(lL)^2+4r^2\sin^2{(\pi k/q)}}{2w^2}\nonumber\\
u_{ly}&=&1+\frac{(lL)^2+4r^2\cosh^2{(y)}}{2w^2} \ .
\label{variables-2}\end{aligned}$$ Notice that this term depends on the radial distance, $r$, and is finite on the string’s core. We also can notice that axial current vanishes for integer and half-integer values of $\tilde{\beta}$. In Fig \[fig4\] we plot the axial current density, Eq., for $D=4$ as function of $\tilde{\beta}$ for $\varepsilon=0$ and $\varepsilon=0.25$, considering $ma=1$, $\xi=0$, $L/a=1$ and different values of $q$.
![The axial current density is plotted for $D=4$, in units of “$ea^{-4}$”, as function of $\tilde{\beta}$ for $ma=1$, $\xi=0$, $L/a=1$ and $q=1,1.5$ and $2.5$. In the left plot we consider $\varepsilon=0$, while in the right plot we take $\varepsilon=0.25$.[]{data-label="fig4"}](Fig4a-Plot-z-current-compac-jXbeta-epsilon0-ok "fig:") ![The axial current density is plotted for $D=4$, in units of “$ea^{-4}$”, as function of $\tilde{\beta}$ for $ma=1$, $\xi=0$, $L/a=1$ and $q=1,1.5$ and $2.5$. In the left plot we consider $\varepsilon=0$, while in the right plot we take $\varepsilon=0.25$.[]{data-label="fig4"}](Fig4b-Plot-z-current-compac-jXbeta-epsilon025-ok "fig:")
We can also analyze the axial current in the regime $L/w\gg1$. Using the asymptotic behavior for the hypergeometric function for large arguments, we get the following expression, $$\begin{aligned}
\langle j^{z}(x)\rangle_{c}^{(q,\varepsilon)}&\approx& \frac{2^{1-2\nu}e\Gamma(D/2+\nu+1)L}{(4\pi)^{\frac{D}{2}}\Gamma(\nu+1)a^{D+1}}\bigg(\frac{w}{L}\bigg)^{D+2\nu+2}\sum_{l=1}^{\infty}l\sin(2\pi l\tilde{\beta})\nonumber\\
&\times&\Bigg\{\sideset{}{'}\sum_{k=1}^{[q/2]}\cos(2\pi k\varepsilon)
\bigg[\frac{l^2}{4}+\bigg(\frac{r}{L}\bigg)^{2}\sin^2(\pi k/q)\bigg]^{-\frac{D}{2}-\nu-1}
\nonumber\\
&-&\frac{q}{\pi}\int_{0}^{\infty}dy\frac{f(q,\varepsilon,2y)}{\cosh(2qy)-\cos(\pi q)}\bigg[\frac{l^2}{4}+\bigg(\frac{r}{L}\bigg)^{2}\cosh^2(y)\bigg]^{-\frac{D}{2}-\nu-1}\Bigg\}.
\label{current-z-second-part-asymptotic}\end{aligned}$$ Finally for a conformally coupled massless scalar field and assuming $D=4$, we obtain $$\begin{aligned}
\label{axial1}
\langle j^{z}(x)\rangle_{c}^{(q,\varepsilon)}&=& \bigg(\frac{w}{a}\bigg)^5\frac{3e}{\pi^2L^4}\Bigg\{ \sideset{}{'}\sum_{k=1}^{[q/2]}\cos{(2\pi k\varepsilon)}\bigg[V_{c}(\tilde{\beta},\rho_{k})-V_{c}(\tilde{\beta},\sigma_{k})\bigg]\nonumber\\
&-&\frac{q}{\pi}\int_{0}^{\infty}dy\frac{f(q,\varepsilon,2y)}{\cosh{(2qy)}-\cos{(\pi q})}\bigg[V_{c}(\tilde{\beta},\eta(y))-V_{c}(\tilde{\beta},\tau(y))\bigg]\Bigg\} \ , \end{aligned}$$ where we have introduced the function $$V_{c}(\tilde{\beta},x)=\sum_{l=1}^{\infty}\frac{l\sin{(2\pi\tilde{\beta}l)}} {(l^2+x^2)^{5/2}} \ ,$$ in the integrands of , with the corresponding arguments defined in .
Conclude Remarks {#sec4}
================
In this paper we have investigated the induced scalar current density, $\langle j^\mu\rangle$, in a $(D+1)$- dimensional AdS space, with $D\geq 4$, admitting the presence of a cosmic string having a magnetic flux running along its axis. In addition we assume the compactification of just one extra dimension in a circle of perimeter $L$ and the existence of a constant vector potential along this direction. This compactification is implemented by assuming that the matter field obeys a quasiperiodicity condition along it, Eq. . In order to develop this analysis we construct the positive energy Wightman function, by solving the Klein-Gordon equation in the corresponding background. By using the Poincaré coordinate and admitting a general curvature coupling constant the normalized solution is given by . The Wightman function is evaluated by summing over all set of normalized solution . By using the Abel-Plana summation formula, Eq., the Wightman function is decomposed in two contributions, one due only to the cosmic string in the AdS background, and the other is induced by the compactification. Fortunately we were able to express this function in a compact form in Eq. .
In our analysis we have proved that only azimuthal and axial current densities are induced. Due to the compactification, the azimuthal current has been decomposed in two parts. The first one corresponds to the expression in the geometry of a cosmic string in AdS bulk without compactification, and the second is induced by the compactification, both are presented by equations and , respectively. Both contributions are odd functions of $\varepsilon$, with period equal to the quantum flux $\Phi_0$. This is an Aharonov-Bohm-like effect. The pure cosmic string contribution is plotted for $D=4$, in units of the inverse of $a^{5}e^{-1}$, as function of $\varepsilon$ as shown in Fig.\[fig1\]. By this graph we can see that the intensity of this current increases with the parameter $q$; also we have plotted this contribution for two different values of the product $ma$ as function of dimensionless variable $r/w$ for different values of $q$. These graphs are presented in Fig.\[fig2\]. By them we can see a strong decay in the intensity of $\langle j\rangle_{cs}$; moreover, carefully we can identify that for bigger value of $ma$ the decay is more accentuated. Some asymptotic expressions for this current are provided for specific limiting cases of the physical parameter of the model. For small and larger values of $r/w$, the corresponding asymptotic expressions are given by and , respectively. For $\nu\gg1$ it is given by . Finally for a conformally coupled massless field, the induced current assume the form .
As to the azimuthal current density induced by the compactification, Eq. , we can observed that it is an even function of the parameter $\tilde{\beta}$ and is an odd function of the magnetic flux along the core of the string, with period equal to $\Phi_0$. Its dependence on $\tilde{\beta}$ is plotted in Fig.\[fig3\], considering the interval $[-0.5, \ 0.5]$ and different values of $q$. Here we also observe that this component depends strongly with $q$. Its asymptotic behavior for large values of $L/w$ is presented in , where we can observe that this current decays with a specific power of $w/L$.
Due to the compactification, there appears an induced current along the compactified extra dimension presented in a complete expression by . It has a purely compactification origin and vanishes when $\tilde{\beta}=0,1/2$ and $1$. This current can be expressed as the sum of two terms. One of them is given by Eq.. It is explicit shown that it is independent of the radial distance $r$, the cosmic string parameter $q$ and $\varepsilon$. The other contribution is given by Eq. . It depends on the magnetic fluxes and the planar angle deficit, it is an odd function of the parameter $\tilde{\beta}$ and is an even function of $\varepsilon$, with period equal to the quantum flux $\Phi_0$. For the particular case when $\beta=0$, Eq. becomes an odd function of the magnetic flux enclosed by the compactified dimension. A plot of the azimuthal current as function ${\tilde{\beta}}$ is presented in Fig.\[fig4\] for two different values of $\varepsilon$ and considering $D=4$. By this graph we can see that the amplitude of the current increases with the parameter $q$ and the effect of $\varepsilon$ is to change the orientation of the current.
Before to finish this paper, we would like to mention that the currents densities analyzed in this paper refer to the vacuum ones induced by the presence of magnetic fluxes and the compactification. As was exhibited by all the graphs provided the planar angle deficit associated with the cosmic string spacetime increases the intensity of the azimuthal current density, and the compactification introduces additional contribution to it; moreover the latter induces a new current density along the compactified dimension.
Acknowledgments {#acknowledgments .unnumbered}
===============
W.O.S thanks CAPES for financial support. H.F.M thanks CNPq. for partial financial support under Grants n$\textsuperscript{\underline{o}}$ 305379/2017-8. E.R.B.M is partially supported by CNPq under Grant n$\textsuperscript{\underline{o}}$ 313137/2014-5.
[10]{}
V. M. Mostepanenko and N. N. Trunov, *[The Casimir effect and its applications]{}*, [*Oxford, UK: Clarendon (1997) 199 p* (1997) ]{}.
M. Bordag, G. L. Klimchitskaya, U. Mohideen and V. M. Mostepanenko, *Advances in the Casimir effect*, vol. 145. OUP Oxford, 2009.
K. A. Milton, *[The Casimir effect: Physical manifestations of zero-point energy]{}*, [*River Edge, USA: World Scientific (2001) 301 p* (2001) ](http://dx.doi.org/10.1142/4505).
E. A. F. Bragança, H. F. Santana Mota and E. R. Bezerra de Mello, *[Induced vacuum bosonic current by magnetic flux in a higher dimensional compactified cosmic string spacetime]{}*, [*Int. J. Mod. Phys.* [**D24**]{} (2015) 1550055](http://dx.doi.org/10.1142/S0218271815500558), \[[[1410.1511]{}](https://arxiv.org/abs/1410.1511)\].
E. R. Bezerra de Mello, A. A. Saharian and V. Vardanyan, *[Induced vacuum currents in anti-de Sitter space with toral dimensions]{}*, [*Phys. Lett.* [**B741**]{} (2015) 155–162](http://dx.doi.org/10.1016/j.physletb.2014.12.036), \[[[1410.2860]{}](https://arxiv.org/abs/1410.2860)\].
E. R. Bezerra de Mello, V. B. Bezerra, A. A. Saharian and H. H. Harutyunyan, *[Vacuum currents induced by a magnetic flux around a cosmic string with finite core]{}*, [*Phys. Rev.* [**D91**]{} (2015) 064034](http://dx.doi.org/10.1103/PhysRevD.91.064034), \[[[1411.1258]{}](https://arxiv.org/abs/1411.1258)\].
E. R. Bezerra de Mello and A. A. Saharian, *[Fermionic current induced by magnetic flux in compactified cosmic string spacetime]{}*, [*Eur. Phys. J.* [**C73**]{} (2013) 2532](http://dx.doi.org/10.1140/epjc/s10052-013-2532-5), \[[[1305.6902]{}](https://arxiv.org/abs/1305.6902)\].
E. R. Bezerra de Mello, *[Induced fermionic current densities by magnetic flux in higher dimensional cosmic string spacetime]{}*, [*Class. Quant. Grav.* [**27**]{} (2010) 095017](http://dx.doi.org/10.1088/0264-9381/27/9/095017), \[[[0907.4139]{}](https://arxiv.org/abs/0907.4139)\].
E. R. Bezerra de Mello, V. B. Bezerra, A. A. Saharian and V. M. Bardeghyan, *[Fermionic current densities induced by magnetic flux in a conical space with a circular boundary]{}*, [*Phys. Rev.* [**D82**]{} (2010) 085033](http://dx.doi.org/10.1103/PhysRevD.82.085033), \[[[1008.1743]{}](https://arxiv.org/abs/1008.1743)\].
A. Mohammadi, E. R. Bezerra de Mello and A. A. Saharian, *[Induced fermionic currents in de Sitter spacetime in the presence of a compactified cosmic string]{}*, [*Class. Quant. Grav.* [**32**]{} (2015) 135002](http://dx.doi.org/10.1088/0264-9381/32/13/135002), \[[[1407.8095]{}](https://arxiv.org/abs/1407.8095)\].
M. S. Maior de Sousa, R. F. Ribeiro and E. R. Bezerra de Mello, *[Induced fermionic current by a magnetic tube in the cosmic string spacetime]{}*, [*Phys. Rev.* [**D93**]{} (2016) 043545](http://dx.doi.org/10.1103/PhysRevD.93.043545), \[[[1511.02745]{}](https://arxiv.org/abs/1511.02745)\].
L. M. Sokolowski, *[The bizarre anti-de Sitter spacetime]{}*, [*Int. J. Geom. Meth. Mod. Phys.* [**13**]{} (2016) 1630016](http://dx.doi.org/10.1142/S0219887816300166), \[[[1611.01118]{}](https://arxiv.org/abs/1611.01118)\].
E. R. B. de Mello and A. A. Saharian, *[Vacuum polarization induced by a cosmic string in anti-de Sitter spacetime]{}*, [*J. Phys.* [**A45**]{} (2012) 115402](http://dx.doi.org/10.1088/1751-8113/45/11/115402), \[[[1110.2129]{}](https://arxiv.org/abs/1110.2129)\].
A. de Pádua Santos and E. R. Bezerra de Mello, *[Non-Abelian cosmic strings in de Sitter and anti-de Sitter space]{}*, [*Phys. Rev.* [**D94**]{} (2016) 063524](http://dx.doi.org/10.1103/PhysRevD.94.063524), \[[[1509.04668]{}](https://arxiv.org/abs/1509.04668)\].
E. R. Bezerra de Mello, A. A. Saharian and M. R. Setare, *[Vacuum densities for a brane intersecting the AdS boundary]{}*, [*Phys. Rev.* [**D92**]{} (2015) 104005](http://dx.doi.org/10.1103/PhysRevD.92.104005), \[[[1502.05397]{}](https://arxiv.org/abs/1502.05397)\].
S. Bellucci, A.A. Saharian and V. Vardanyan, *[Vacuum currents in braneworlds on AdS bulk with compact dimensions]{}*, [*JHEP* [**11**]{} (2015) 092](https://doi.org/10.1007/JHEP11(2015)092), \[[[1508.07255]{}](https://arxiv.org/abs/1508.07255)\].
S. Bellucci, A.A. Saharian, and V. Vardanyan, *[Hadamard function and the vacuum currents in braneworlds with compact dimensions: Two-brane geometry]{}*, [*Phys. Rev.* [**D93**]{} (2016) 084011](https://doi.org/10.1103/PhysRevD.93.084011), \[[[1512.06569]{}](https://arxiv.org/abs/1512.06569)\].
O. Aharony, S. S. Gubser, J. M. Maldacena, H. Ooguri and Y. Oz, *[Large N field theories, string theory and gravity]{}*, [*Phys. Rept.* [**323**]{} (2000) 183–386](http://dx.doi.org/10.1016/S0370-1573(99)00083-6), \[[[hep-th/9905111]{}](https://arxiv.org/abs/hep-th/9905111)\].
P. Brax and C. van de Bruck, *[Cosmology and brane worlds: A Review]{}*, [*Class. Quant. Grav.* [**20**]{} (2003) R201–R232](http://dx.doi.org/10.1088/0264-9381/20/9/202), \[[[hep-th/0303095]{}](https://arxiv.org/abs/hep-th/0303095)\].
A. Vilenkin and E. P. S. Shellard, [*[Cosmic strings and other topological defects]{}*]{}. Cambridge monographs on mathematical physics. Cambridge Univ. Press, Cambridge, 1994.
M. Hindmarsh and T. Kibble, [*[Cosmic strings]{}*]{}, [*Rept.Prog.Phys.*]{} [ **58**]{} (1995) 477–562, \[[[ hep-ph/9411342]{}](http://xxx.lanl.gov/abs/hep-ph/9411342)\].
J. M. Hyde, A. J. Long, and T. Vachaspati, [*[Dark Strings and their Couplings to the Standard Model]{}*]{}, [*Phys.Rev.*]{} [**D89**]{} (2014) 065031, \[[[arXiv:1312.4573]{}](http://xxx.lanl.gov/abs/1312.4573)\].
B. Allen and E. P. S. Shellard, *[On the evolution of cosmic strings]{}*, in *[The formation and evolution of cosmic strings: proceedings of a workshop supported by the SERC and held in Cambridge, 3-7 July, 1989]{}* (G. W. Gibbons, S. W. Hawking and T. Vachaspati, eds.), (Cambridge), pp. 421–448, Cambridge University Press, 1990.
E. J. Copeland, L. Pogosian and T. Vachaspati, *[Seeking String Theory in the Cosmos]{}*, [*Class.Quant.Grav.* [**28**]{} (2011) 204009](http://dx.doi.org/10.1088/0264-9381/28/20/204009), \[[[1105.0207]{}](https://arxiv.org/abs/1105.0207)\].
M. Hindmarsh, *[Signals of Inflationary Models with Cosmic Strings]{}*, [*Prog.Theor.Phys.Suppl.* [**190**]{} (2011) 197–228](http://dx.doi.org/10.1143/PTPS.190.197), \[[[1106.0391]{}](https://arxiv.org/abs/1106.0391)\].
D. F. Chernoff and S. H. Henry Tye, *[Inflation, string theory and cosmic strings]{}*, in *One Hundred Years of General Relativity: From Genesis and Empirical Foundations to Gravitational Waves, Cosmology and Quantum Gravity (Volume 2)*, vol. Volume 2, pp. 273–322. 2017. [DOI](http://dx.doi.org/10.1142/9789814678506_0007).
collaboration, P. A. R. Ade et al., *[Planck 2013 results. XXV. Searches for cosmic strings and other topological defects]{}*, [*Astron. Astrophys.* [**571**]{} (2014) A25](http://dx.doi.org/10.1051/0004-6361/201321621), \[[[1303.5085]{}](https://arxiv.org/abs/1303.5085)\].
A. Vilenkin, Phys. Rev. D **23**, 852 (1981).
J. R. Gott III, Astrophys. J. **288**, 422 (1985); W. Hiscock, Phys. Rev. D **31**, 3288 (1985); B. Linet, Gen. Relativ. Gravit. **17**, 1109 (1985); D. Garfinkle, Phys. Rev. D **32**, 1323 (1985).
M. E. X. Guimarães and B. Linet, Commun.Math.Phys., (1994) 165:297.
Yu A Sitenko and N D Vlasii, Class.Quan.Grav **29**, 095002 (2012).
*Handbook of Mathematical Functions*, edited by M. Abramowitz and I.A. Stegun (Dover, New York, 1972).
S. Bellucci, A. Saharian, and V. Bardeghyan, [*[Induced fermionic current in toroidally compactified spacetimes with applications to cylindrical and toroidal nanotubes]{}*]{}, [*Phys.Rev.*]{} [**D82**]{} 065011, (2010) \[[[arXiv:1002.1391]{}](http://xxx.lanl.gov/abs/1002.1391)\].
I. S. Gradshteyn and I. M. Ryzhik. *Table of Integrals, Series and Products* (Academic Press, New York, 1980)
A. P. Prudnikov, Yu. A. Brychkov and O. I. Marichev, *Integrals and Series* (Gordon and Breach, New York, 1986), Vol. 2.
[^1]: E-mail: wagner.physics@gmail.com
[^2]: E-mail: hmota@fisica.ufpb.br
[^3]: For the case of vanishing magnetic fluxes and the absence of cosmic string, i.e, $q=1$, the expression reduces itself to the Wightmann function in a Ads bulk only.
|
2023-08-30T01:26:28.774034
|
https://example.com/article/2949
|
Causes of death among people with convulsive epilepsy in rural West China: a prospective study.
Epilepsy is a serious health problem associated with an increased risk of premature mortality. Few studies have investigated risk factors for this. Understanding these risks may enable the implementation of preventative measures to reduce premature mortality. A management program for convulsive forms of epilepsy has been in place at the primary health care level in rural West China since May 2005. Demographic data and putative causes of death of attendees of the program since inception to the end of December 2009 have been recorded. Case fatality (CF), the proportional mortality ratios (PMRs) for each cause, and standardized mortality ratios (SMRs) for each age and cause were estimated based on the 2007 Chinese rural population. There were 106 reported deaths (70 male) among 3,568 people. CF was 2.97% during a median of 28 months' follow-up. The highest PMRs were for accidental death (59%) including drowning (45.1%); probable sudden unexpected death in epilepsy (SUDEP) (14.7%); status epilepticus (6.9%), and neoplasm (6.9%). The overall SMR was 4.92 (95% confidence interval 4.0-6.1); the risks were high in young people. The risk of drowning was 82-fold higher in the cohort than the general population. In rural West China, the risk of premature death is nearly 5 times higher in people with convulsive epilepsy than in the general Chinese population and especially high among young people. Accidental death, including drowning, and probable SUDEP are the leading putative causes of death in people with convulsive epilepsy in rural West China.
|
2023-09-18T01:26:28.774034
|
https://example.com/article/7659
|
New Hampshire's attorney general's office on Tuesday sued drug manufacturer Purdue Pharma over its marketing of OxyContin.
The state alleged the manufacturer was deceptive about the drug's risks and benefits, fueling the state's opioid epidemic.
“To defeat the epidemic, we must stop creating new users, and part of that is making sure these highly addictive and dangerous drugs are marketed truthfully and without deception and in such a way as not to minimize addiction risks or overstate benefits to patients,” said Deputy Attorney General Ann Rice, according to The Associated Press.
ADVERTISEMENT
A spokesman for Purdue Pharma said OxyContin "accounts for less than 2% of the opioid analgesic prescription market nationally."
"But we are an industry leader in the development of abuse-deterrent technology, advocating for the use of prescription drug monitoring programs and supporting access to Naloxone — all important components for combating the opioid crisis,” Robert Josephson said.
Other states have also sued prescription opioid manufacturers over their marketing practices.
President Trump on Tuesday promised an intense effort to take on the nation's opioid crisis.
He said he would work with "drug dealers that poison our communities” both inside and outside the country ahead of a private briefing with advisers and administration officials on the crisis.
“We're being very, very strong on our southern border — and I would say the likes of which this country certainly has never seen that kind of strength,” Trump said, according to a White House pool report of his remarks.
During a heated phone call in January with the Mexican president, Trump called New Hampshire a “drug-infested den," according to a transcript obtained by The Washington Post.
New Hampshire lawmakers have since pushed back against that characterization.
|
2024-02-24T01:26:28.774034
|
https://example.com/article/3199
|
Background
==========
RCC is one of the most common malignant tumors in urology. RCC accounts for 2-3% of all malignant tumors in adults, afflicts about 209,000 people, and causes 102,000 deaths per year worldwide. The incidence and mortality rate of RCC have increased over the past several years \[[@B1],[@B2]\]. RCC is classified into five major subtypes: clear cell (the most common type, which accounts for 82%), papillary, chromophobe, collecting duct and unclassified RCC. Many renal masses remain asymptomatic and nonpalpable until the late stages of the disease. Curative nephrectomy is the first treatment choice for RCC. However, metastatic disease recurs in a third of these patients. Still, About 30% of patients already have metastasis at the time of diagnosis \[[@B3]\]. Although several promising biomarkers for RCC such as Carbonic anhydrase IX, B7-H1 and P53 have been investigated, none have been validated \[[@B4],[@B5]\]. RCC is resistant to chemotherapy, radiotherapy and immunotherapy. Although several targeted therapies, such as multitargeted tyrosine kinase inhibitors (TKIs) and Temsirolimus, which target the VHL-HIF-VEGF and/or mTOR pathways, have been approved for the treatment of advanced RCC, complete responses are rare and resistance ultimately will occur after a few months or a few years \[[@B6]\]. Thus, the identification and application of novel therapeutic targets for RCC are urgently needed.
Epithelial and endothelial tyrosine kinase (ETK), also known as bone marrow X kinase (BMX), is one member of the Tec family of non-receptor tyrosine kinases. ETK contains a PH (pleckstrin homology) domain, a SH3 (SRC homology 3) domain, a SH2 (SRC homology 2) domain from the amino terminus, and the kinase domain in the carboxyl terminus \[[@B7],[@B8]\]. ETK is expressed in epithelial cells and distributed in lympho-haematopoietic cells \[[@B9]\]. ETK can be activated by several extracellular stimuli, including growth factors, cytokines, extracellular matrix and hormones \[[@B10]\]. ETK is a major regulatory molecule in various cell signal pathways, and therefore plays an important role in the initiation, transformation, progression and metastasis of cancer \[[@B11],[@B12]\]. It has been proven that ETK is a critical mediator of Src-induced cell transformation and STAT3 activation. Src-ETK-STAT3 is an important pathway in cellular transformation \[[@B13]\]. However the expression and role of ETK in renal cell carcinoma still remain unclear.
In the present study, we demonstrated that ETK expression was upregulated in RCC tissue samples and cell lines. The overexpression of ETK was correlated with clinical stage, tumor grade, metastasis and survival time. Furthermore, ETK regulated cell proliferation, apoptosis, migration, and invasion of RCC. Our results suggest that ETK is a potential prognostic factor and may serve as a drug therapeutic target for RCC.
Methods
=======
Tissue microarrays
------------------
Our tissue microarrays contain 90 specimens of RCC and 30 specimens of paracancerous normal renal tissues from the First Affiliated Hospital of Sun Yat-sen University (Guangzhou, China) between January 2005 and November 2011. All RCC patients were treated by radical nephrectomy. All samples were histologically confirmed. Among 90 RCC patients, there were 55 male and 35 female at a mean age of 55.2 years (ranging from 19 to 80 years). Tumors were staged according to the 2009 TNM staging system \[[@B14]\] and graded according to the criteria of the World Health Organization \[[@B15],[@B16]\]. The Medical Ethics Committee of Sun Yat-sen University approved this study's protocol.
Cell culture
------------
Five human RCC cell lines 786-O, 769-P, A-498, ACHN, OS-RC-2 and a normal renal proximal tubular cell line HK-2 were used in this study. 786-O, 769-P, ACHN and OS-RC-2 were purchased from the Cell Bank of the Chinese Academy of Sciences. A-498 and HK-2 were conserved in the lab of Research Center for Clinical Laboratory Standard of Sun Yat-sen University. 786-O, 769-P and OS-RC-2 were cultured in RPMI-1640 (Gibco, USA); A-498, ACHN and HK-2 were maintained in DMEM (Gibco, USA) containing 10% fetal bovine serum (Gibco, USA) at 37°C in a 5% CO~2~ atmosphere.
Immunohistochemistry and evaluation of ETK expression
-----------------------------------------------------
Tissue microarrays were deparaffinized with xylene and rehydrated through graded alcohol washes, followed by antigen retrieval by heating sections in sodium citrate buffer (10 mM, pH 6.0) for 10 min. The sections were incubated with 3% hydrogen peroxide for 10 min to block endogenous peroxidase activity at room temperature. Nonspecific reactions were blocked by incubating the sections in a solution containing normal goat serum (dilution 1:10). Then the slides were incubated with a 1:100 dilution of monoclonal mouse IgG anti-ETK antibody (BD, USA) at 4°C overnight. Following washing with PBS, slides were incubated with biotinylated secondary antibodies and avidin-biotin peroxidase complex (Dako Inc.) for 30 min. Reaction products were visualized by 3,3′-diaminobenzidine (DAB) and then counterstained with hematoxylin. The negative control was prepared by replacing the primary antibody with a primary antibody dilution buffer.
Using a microscope, two independent pathologists observed the distribution, staining intensity and positive ratio of ETK expression. The ETK immunohistochemical staining was classified as follows \[[@B17],[@B18]\]: no staining scored 0; faint or moderate staining in ≤ 25% of tumor cells scored 1; moderate or strong staining in 25% to 50% of tumor cells scored 2; strong staining in ≥ 50% of tumor cells scored 3. For each sample, 4 randomly selected areas were observed under high magnification and 100 tumor cells in each area were counted to calculate the proportion of positive cells. Positively high expression of ETK was defined as staining index ≥ 2. Low expression of ETK was defined as staining index\<2, accordingly.
Western blot analysis
---------------------
The expression of ETK in 786-O, 769-P, A-498, ACHN, OS-RC-2 and HK-2 cells was detected by Western blot as described previously \[[@B19]\]. Briefly, total proteins were extracted from RCC cell lines and denatured in a sodium dodecyl sulfate (SDS) sample buffer, then equally loaded onto 10% polyacrylamide gel. After electrophoresis, the proteins were transferred to a polyvinylidene difluoride membrane. Blots were incubated with the indicated primary antibodies overnight at 4°C and detected with horseradish peroxidase-conjugated secondary antibody (dilution 1:10,000, Abcam, USA). The mouse monoclonal anti-ETK antibody (BD, USA), the rabbit monoclonal anti-STAT3 antibody (Abcam, USA), the rabbit monoclonal anti-phospho-STAT3 antibody (Abcam, USA) and the rabbit monoclonal anti-VEGF antibody (Abcam, USA) were used at the dilution of 1:1,000, whereas anti-β-actin (Santa Cruz, USA) was used at the dilution of 1:2,000.
RNA interference (RNAi) to knockdown ETK
----------------------------------------
We chose two typical clear cell RCC cell lines 786-O and 769-P for further study. As described in the literature \[[@B20],[@B21]\], 786-O and 769-P cells were transfected with small interfering RNA (siRNA) against ETK and negative control siRNA by Lipofectamine 2000 and Opti-MEM I (Gibco, USA) according to the manufacturer's protocol. All siRNAs were purchased from RiboBio Co. China, siRNA concentrations were 100 nM. Briefly, 1 × 10^5^ cells were plated in each well of 6-well plates and cultured to reach a 80% confluence. Cells were then transfected with siRNA by using the transfection reagent in serum-free medium. Total RNA and protein were isolated at 48 h after transfection. ETK expression was monitored by real-time reverse transcription-polymerase chain reaction (RT-PCR) and Western blot, as mentioned above.
Real-time reverse transcription-polymerase chain reaction
---------------------------------------------------------
For real-time RT-PCR, total RNA was isolated from 786-O and 769-P cells transfected with ETK siRNA or control siRNA using Trizol Reagent (Invitrogen, USA) as the manufacturer's protocol required, and subjected to reverse transcription in 20 μl using reverse transcriptase of First Strand cDNA Synthesis Kit (Invitrogen, USA). RNA concentrations were 1--5 μg/μl. Then amplification was carried out in a total volume of 25 μl using SYBR Premix Ex Taq Kit (ABI, USA). The sequences of ETK primers were as follows: forward, 5′-GAGCCGAAGTCAGTGGTTGA-3′; reverse, 5′-ACTTCCCGTCCACGAAGAAC-3′. The sequences of internal control glyceraldehyde-3-phosphate dehydrogenase (GAPDH) were as follows: forward, 5′-TGTTCGTCATGGGTGTGAAC-3′; reverse, 5′-ATGGCATGGACTGTGGTCAT-3′. All PCR were performed in triplicate.
Cell proliferation assay
------------------------
3-(4,5-Dimethylthiazol-2-yl)-2,5-diphenyltetrazolium bromide (MTT) assays were performed by the following well-established method. In a 96-well plate, 1.0 × 10^4^ cells were plated in each well. The cells were incubated for 48 h. MTT was dissolved in phosphate-buffered saline (5 mg/ml) and filter-sterilized. Before the incubation, 20 μl of MTT solution was added to each well. The plate was incubated in an incubator at 37°C for 4 h. Media were aspirated gently, and 150 μl of dimethyl sulfoxide (DMSO) was added to each well to dissolve formazan crystals. The absorbance was measured at 490 nm. All experiments were performed in triplicate, and the cell proliferation was tested using the absorbance.
Flow cytometry analysis for apoptosis
-------------------------------------
Detection of apoptosis by flow cytometry was performed using the Annexin V-FITC/PI Apoptosis Detection Kit (Roche, Switzerland). The transfected cells were harvested with trypsinization (no Ethylene Diamine Tetraacetic Acid, EDTA containing). Staining was performed according to the producer's manual. Flow cytometry (BD, USA) was performed immediately.
Migration and invasion assay
----------------------------
Cell migration and invasion were assessed using the 24 well-plate transwell insert (BD, USA) according to the manufacturer's instructions. For cell migration, a transwell insert without matrigel was used; while for cell invasion, the transwell filters were pre-coated with matrigel \[[@B22]\]. In brief, 500 μl of prepared serum-free suspension of transfected cells with ETK siRNA or negative control siRNA (1 × 10^5^ cells/ml) was added into the interior of each insert (8 μm pore size); 500 μl of medium containing 10% fetal bovine serum was added to the lower chamber of the insert. Cells were incubated at 37°C in a 5% CO~2~ atmosphere for 36 h to 48 h. Then, non-invading cells in the interior of the insert were gently removed with a cotton-tipped swab; invasive cells on the lower surface of the inserts were stained with the staining solution for 20 min and counted under a microscope. All experiments were performed in triplicate.
Statistical analysis
--------------------
Statistical analysis was performed using SPSS 16.0 software. The relationship between ETK expression and the clinicopathologic features of RCC was assessed by chi-square test or Fisher's exact test. Continuous data was analyzed by *t*-test or one-way analysis of variance (ANOVA) followed by Bonferroni's post-hoc test. Survival curves were plotted using the Kaplan-Meier method and compared with the log-rank test. *P* value of less than 0.05 was considered statistically significant.
Results
=======
ETK overexpression in RCC tissues and its relationship with the clinicopathological parameters
----------------------------------------------------------------------------------------------
Immunochemical staining tests showed that ETK protein was mostly located in the cytoplasm as yellow-to-brown staining in the RCC tissues. ETK expression was weak in normal renal tissues, but stronger staining was observed in RCC tissues (Figure [1](#F1){ref-type="fig"}). As shown in Table [1](#T1){ref-type="table"}, ETK protein was highly expressed in 56 of 90 (62.2%) primary RCC, while only expressed in 2 of 30 (6.7%) normal tissues. The difference was statistically significant (*P*\<0.001). Furthermore, ETK expression was significantly correlated with clinical staging (*P* = 0.005), pathological grade (*P* = 0.001) and metastasis (*P* = 0.002). However, it was not associated with age (*P* = 0.788), gender (*P* = 0.322) or position of the tumor (*P* = 0.351). Taken together, these observations showed that high level of ETK expression were closely associated with the clinical progession of RCC.
{#F1}
######
Correlation between ETK expression and the clinicopathological parameters of RCC
**Clinical data** ***n*** **ETK** ***P*value**
------------------------------- --------- --------- -------------- ---------
Normal renal tissus 30 2 28 \<0.001
RCC tissues 90 56 34
Age (years) 0.788
≤50 28 16 12
50\~70 50 32 18
≥70 12 8 4
Gender 0.322
Male 55 32 23
Female 35 24 11
Position of the tumor 0.351
Upper pole 36 20 16
Central part 19 11 8
Lower pole 35 25 10
TNM stage 0.005
I + II 67 36 31
III + IV 23 20 3
Grade (Differentiation level) 0.001
Well 66 34 32
Moderately and poorly 24 22 2
Metastasis 0.002
No 72 39 33
Yes 18 17 1
Correlation of ETK expression with overall survival
---------------------------------------------------
Clinical outcome analysis was performed on all of the 90 RCC patients underwent radical nephrectomy who were followed up for a median of 49.6 months. There were 56 tumors (62.2%) with high expression (ETK staining index ≥ 2) and 34 tumors (37.8%) with low expression (ETK staining index\<2). Kaplan-Meier survival analysis indicated higher levels of ETK expression were associated with shorter survival time. Moreover, the log-rank test showed that overall survival was significantly different between the low and high ETK expression groups (*P*\<0.05). As shown in Figure [2](#F2){ref-type="fig"}, the cumulative 5-year survival rate was 83.2% in the low-ETK-expression group, and 65.5% in the high-ETK-expression group.
{#F2}
Upregulation of ETK in RCC cell lines
-------------------------------------
We detected the expression of ETK in five RCC cell lines (786-O, 769-P, A-498, ACHN, OS-RC-2) and a normal renal proximal tubular cell line HK-2 using Western blot. The results showed that ETK was highly expressed in all RCC cell lines, whereas it was hardly detected in the normal renal proximal tubular cell HK-2 (Figure [3](#F3){ref-type="fig"}).
{#F3}
Effects of ETK on cell proliferation, apoptosis, migration and invasion
-----------------------------------------------------------------------
To examine the functions of ETK, we knocked down ETK by tranfecting ETK siRNA into RCC cells. We chose two typical clear cell RCC cell lines 786-O and 769-P for further study. The mRNA and protein expression of ETK were significantly weaker in ETK siRNA-transfected cells than that in control siRNA-tranfected cells (*P*\<0.01) (Figure [4](#F4){ref-type="fig"}). For 786-O and 769-P respectively, the mRNA expression of ETK was decreased by 96.7% and 97.3% in the siRNA group compared with the negative control group (Figure [4](#F4){ref-type="fig"}A). Western blot showed that the expression level of ETK was decreased by 51.2% in 786-O and 79.8% in 769-P in the siRNA group compared with the negative control group (Figure [4](#F4){ref-type="fig"}B). These results suggested we have succeeded in knocking down ETK expression.
{#F4}
In order to detect the role of ETK in RCC cell proliferation, we examined the effect of ETK siRNA on RCC cell growth. ETK siRNA significantly decreased cell proliferation by 32.4% in 786-O and 28.9% in 769-P at 48 h compared with the negative control group (*P*\<0.01) (Figure [5](#F5){ref-type="fig"}A). And we used flow cytometry to reveal the effect of ETK on RCC cell apoptosis. ETK siRNA can promote cell apoptosis (Figure [5](#F5){ref-type="fig"}B). We used transwell assay to assess cell migration and invasion. The number of migrating cells was significantly decreased in ETK siRNA group compared with control siRNA group (30.0 ± 3.7 vs. 113.8 ± 3.3 in 786-O and 15.8 ± 2.5 vs. 104.8 ± 6.0 in 769-P, respectively) (*P*\<0.01) (Figure [5](#F5){ref-type="fig"}C). The number of invading cells was significantly decreased in ETK siRNA group compared with control siRNA group (9.8 ± 1.0 vs. 30.5 ± 2.1 in 786-O and 7.3 ± 1.3 vs. 37.0 ± 7.9 in 769-P, respectively) (*P*\<0.01) (Figure [5](#F5){ref-type="fig"}D). Our data implied that ETK knockdown inhibited cell migration and invasion *in vitro*.
{#F5}
ETK knockdown regulates VEGF and STAT3 expression in RCC
--------------------------------------------------------
To explore the relationship between VEGF, STAT3 and ETK, we examined the expression of VEGF, STAT3 and p-STAT3 using Western blot after downregulating ETK. As shown in Figure [6](#F6){ref-type="fig"}, the expression of VEGF and p-STAT3 were decreased, especially the expression of p-STAT3 (*P*\<0.01). The unactivated STAT3 protein meanwhile remained invariable (*P*\>0.05). The expression of VEGF has changed but not of STAT3. Only STAT3s activity was altered as indicated by the expression of p-STAT3, whereas the expression of STAT3 remained unchanged.
{#F6}
Discussion
==========
In the recent few years, increasing evidences indicates that ETK is overexpressed in various cancer types, including prostate cancer, bladder cancer, nasopharyngeal carcinoma, lung cancer and breast cancer \[[@B18],[@B22]-[@B25]\]. In this study, we evaluated the expression and role of ETK in RCC. Our results also showed that ETK was overexpressed in RCC tissues when compared with that in normal renal tissues. Furthermore, immunostaining data indicated that the expression level of ETK was closely correlated with clinical stage, histological grade and metastasis of the RCC. In addition, we also found that patients with higher ETK expression had shorter overall survival time than those with lower ETK expression. ETK may potentially be used as a prognostic factor for RCC patients.
ETK has been shown to regulate many cellular processes, including cell proliferation, apoptosis, migration, invasion, differentiation and chemo-resistance \[[@B26]-[@B28]\]. We found that ETK was highly expressed in all five RCC cell lines, whereas it was hardly detected in the normal renal proximal tubular cell HK-2. Frequently elevated ETK expression in RCC cells suggested that ETK may play a causal role in disease development and progression of RCC. We then adopted a strategy of RNA interference to inhibit ETK expression in two typical clear cell RCC cell lines 786-O and 769-P. Our results revealed that cell growth, migration and invasion were inhibited after transfection with ETK siRNA, and cell apoptosis increased instead. ETK is a major regulatory molecule in various cell signal pathways; multiple mechanisms are involved in ETK-regulated tumorigenesis. Experiments have documented that ETK overexpression can increase proliferation in mouse prostate epithelium and result in development of prostatic intraepithelial neoplasia (PIN) by increasing AKT and STAT3 activity \[[@B21],[@B29]\]. ETK is an upstream activator of STAT family and links Src to STAT3 activation \[[@B13]\]. In addition, ETK can confer drug resistance by interacting with p53 and inhibiting its nuclear transduction function in prostate cancer \[[@B30]\]. It has been reported that ETK utilizes both MEK/ERK and PI3-K/Pak1 signaling pathways in concert to activate VEGF transcription. VEGF is both an ETK downstream target gene and an ETK upstream activator, constituting a reciprocal ETK-VEGF autoregulatory loop \[[@B31]\]. These mechanisms may explain the inhibited function of RCC cells by ETK knockdown in our study. As a result, we hypothesize the VEGF-ETK-STAT3 loop in RCC. Since ETK knockdown can regulate the expression of VEGF and STAT3 in RCC, ETK may play a key role in the VEGF-ETK-STAT3 loop which might be helpful to the theoretical treatment of RCC.
Like other cancer types, relapse and metastasis are the main causes of surgery failure in RCC treatment. RCC is resistant to chemotherapy, radiotherapy and immunotherapy. Patients with RCC respond to postoperative adjuvant therapy at various levels and usually cannot achieve expected outcomes \[[@B32]\]. For metastatic or non-resectable RCC, several targeted therapies, such as multitargeted tyrosine kinase inhibitors (TKIs) and Temsirolimus, have been approved for the treatment. They target the VHL-HIF-VEGF and/or mTOR pathways. Combination targeted therapy in advanced RCC is recommended. Even with improvements in survival, disease progresses in all patients. Resistance ultimately will occur after a few months or a few years \[[@B6],[@B33]\]. Thus, the identification and application of novel therapeutic targets for RCC are urgently needed. The phenotype of tumor metastasis presents with promotion of cell proliferation, escape from apoptosis, and dysregulation of cellular adhesion and migration. The invasion of cancer cells to surrounding tissues and spreading to distal sites rely on cell migration ability \[[@B34]\]. In the present study, we found that ETK was highly expressed in about 90% of the advanced RCC patients. We stated that ETK expression was associated with high stage, bad differentiation level, and metastasis of RCC and higher levels of ETK expression were associated with shorter survival time. After silencing ETK by RNAi *in vitro*, the migration and invasion of RCC cells were significantly inhibited, suggesting that ETK may be one of the potential treatment targets for RCC.
Conclusions
===========
Our study indicated that the high expression of ETK could promote the carcinogenesis and progression of RCC and result in a poor overall survival. ETK may be involved in the VEGF-ETK-STAT3 loop and served as a potential therapeutic target for RCC, which warrants verification in further studies.
Competing interests
===================
The authors declare that they have no competing interests.
Authors' contributions
======================
GSJ, MXP and PJC evaluated the immunostaining. CKY, HB and CX performed the statistical analysis. ZJT and QSP participated in the design of the study. ZJT and TXA drafted the manuscript. QSP and GY revised the manuscript. All authors read and approved the final manuscript.
Acknowledgements
================
This study was supported by grants from the National Natural Science of Foundation of China (No. 81272809, No. 81172432 and No. 81302223), Guangdong Provincial Ministry of Cooperation Project (No. 2011B090400034), and Guangdong Scientific and Technical Project (No. 2011B050400021); and supported by Guangdong Key Laboratory of Urology, The First Affiliated Hospital of Guangzhou Medical University (No. 2010A060801016).
|
2023-11-05T01:26:28.774034
|
https://example.com/article/1175
|
Design of three-layer antireflection coatings: a generalized approach.
A generalized theoretical formulation for multilayer antireflection coatings (ARCs) has been established, which has scope for considering both zero and nonzero reflectance at one or more than one wavelength. Starting with this, a new design method for three-layer ARCs making use of input reflectance parameters at two wavelengths (R(1) and R(2) at lambda(1) and lambda(2)) has been developed. It allows for determination of all the unknown design parameters explicitly without any a priori conditions on them. The scope of the method has been extended by incorporating optimization of the resultant solutions through an optimizing parameter, integrated reflection loss R* to obtain efficient designs with respect to spectral bandwidth, residual reflection loss, etc. The resulting hybrid methodology is found to be generalized in that it can be used to design a wide range of ARC systems, broad band to V-type, irrespective of the nature of the substrate (absorbing or nonabsorbing) and spectral region of use, with adaptability to simpler/complex ARC systems and other thin film systems such as dichroics/beam splitters and achromatic reflectors.
|
2023-09-29T01:26:28.774034
|
https://example.com/article/7932
|
Novel nonsense mutation of the endothelin-B receptor gene in a family with Waardenburg-Hirschsprung disease.
Waardenburg syndrome (WS) comprises sensorineural hearing loss, hypopigmentation of skin and hair, and pigmentary disturbances of the irides. Four types of WS have been classified to date; in WS type IV (WS4), patients additionally have colonic aganglionosis (Hirschsprung disease, HSCR). Mutations in the endothelin-3 (EDN3), endothelin-B receptor (EDNRB), and Sox10 genes have been identified as causative for WS type IV. We screened a family with a combined WS-HSCR phenotype for mutations in the EDNRB locus using standard DNA mutation analysis and sequencing techniques. We have identified a novel nonsense mutation at codon 253 (CGA-->TGA, Arg-->STOP). This mutation leads to a premature end of the translation of EDNRB at exon 3, and it is predicted to produce a truncated and nonfunctional endothelin-B receptor. All affected relatives were heterozygous for the Arg(253)-->STOP mutation, whereas it was not observed in over 50 unrelated individuals used as controls. These data confirm the role of EDNRB in the cause of the Waardenburg-Hirschsprung syndrome and demonstrate that in WS-HSCR there is a lack of correlation between phenotype and genotype and a variable expression of disease even within the same family.
|
2024-05-24T01:26:28.774034
|
https://example.com/article/7792
|
Selecting single-nucleotide polymorphisms for association studies with SNPbrowser software.
The design of genetic association studies using single-nucleotide polymorphisms (SNPs) requires the selection of subsets of the variants providing high statistical power at a reasonable cost. SNPs must be selected to maximize the probability that a causative mutation is in linkage disequilibrium (LD) with at least one marker genotyped in the study. The HapMap Project performed a genome-wide survey of genetic variation with over 3 million SNPs typed in four populations, providing a rich resource to inform the design of association studies. A number of strategies have been proposed for the selection of SNPs based on observed LD, including construction of metric LD maps and the selection of haplotype-tagging SNPs. Power calculations are important at the study design stage to ensure successful results. Integrating these methods and annotations can be challenging: the algorithms required to implement these methods are complex to deploy, and all the necessary data and annotations are deposited in disparate databases. Here, we review the typical workflows for the selection of markers for association studies utilizing the SNPbrowser software, a freely available, stand-alone application that incorporates the HapMap database together with gene and SNP annotations. Selected SNPs are screened for their conversion potential to genotyping platforms, expediting the set up of genetic studies with an increased probability of success.
|
2023-11-08T01:26:28.774034
|
https://example.com/article/6167
|
The reward for a season of hard work for the Burbank High girls' volleyball team culminated with it capturing a share of the Pacific League championship. The title was the first for the program in 37 years.
Shortly thereafter, the Bulldogs were rewarded for their fine season when the All-Pacific League list was released. Burbank landed six players on the all-league ledger, including a co-player-of-the-year honor for senior setter Tyler Brooks.
Making the first team for Burbank was senior opposite/middle Stephanie Eskander, senior opposite Katie Hooper and junior outside hitter/middle Sharon Youn. Senior outside hitter Jamie Gonzalez was a second-team pick and Stephanie Lin was an honorable mention choice.
Burroughs had two first-team honorees in junior outside hitter Kaitlin Cottrell and junior setter/opposite Katie Rutecki. Teammate Dani Gonzalez, a junior libero, was named to the second team and senior middle Laura Howard was an honorable mention selection.
Brooks proved to be a steadying force for the Bulldogs (18-4), who shared the league crown with Arcadia after the teams split their two league contests.
“I was a little bit surprised when I first found out that I had won it,” said Brooks, who shared the honor with Arcadia’s Lexi Resch. “It was something that I had thought about, but it really wasn’t something I was trying to win. I just went out and played hard because I needed to play hard. But winning MVP is something that is pretty cool.”
Brooks definitely made her presence known on the court, finishing with 359 assists, 151 digs and 52 aces to go along with 22 kills.
The Bulldogs had to defeat cross-town rival Burroughs in the final regular season match to secure a portion of the league championship.
“We came back this year and we really made it a goal to win a league title,” said Brooks, who was a second-team all-league selection in 2011. “We realized that we really had a shot this year and we all worked really hard to make that happen. Being the first team to win it in such a long time made it that much more special.”
“I feel that everybody we wanted to make all-league made the list,” said Burbank Coach Sarah Brown, who guided the Bulldogs to the league title after not finishing higher than third in her seven years. “Since you can’t vote for your own players, it’s really a cool thing to see the other coaches acknowledge our players.”
Burroughs (19-6) finished third in league and then went on to success in the CIF Southern Section II-A playoffs, advancing to the quarterfinals.
Cottrell, who earned All-CIF first-team accolades early this week, was a driving force for the team — especially in the playoffs — as she averaged 12 kills and 1.2 aces a match.
Rutecki proved to be a solid all-around player, averaging 13 assists, five kills and 1.1 aces a match.
“This was the first time in about three or four years that we were peaking at the right time at the end of the season,” Burroughs Coach Edwin Real said. “And you could see that by how well we did in the playoffs. The girls progressed through the season and many of them got better as the season went on.”
|
2024-04-19T01:26:28.774034
|
https://example.com/article/1272
|
You can keep on catching them all: Pokémon fans will soon be able to revisit their favorite Pokémon shows and movies on Hulu. Pokémon and Hulu cut a pact to stream a number of animated titles based on the uber-popular video games on Hulu Plus, as Variety reports.
Casual watchers will be able to stream “Pokémon Origins” (which tells the story featured in the first videogames) and the first two episodes of the new Pokémon XY show for free on Hulu; those with a more fanatical interest will be able to access several other seasons of the various Pokémon shows as well as three Pokémon movies on Hulu Plus with a $7.99 per month subscripion.
The deal will likely draw to Hulu’s site droves of nostalgic young adults who long packed away their Game Boys, as well as the crop of kids still playing the new Pokémon XY game (released Oct. 2013). Pokémon was first introduced as a Nintendo game in 1996; since then, more than 245 million videogames and 20 billion Pokémon trading cards have been sold. In total, there are over 7000 animated episodes of the Pokémon show and 16 full-length films.
|
2023-09-16T01:26:28.774034
|
https://example.com/article/9959
|
The brilliant ‘Dark Matter‘ returns to Syfy UK for it’s Season 3, launching with a double bill from Monday the 12th June at 8pm, then continuing weekly at 9pm. Syfy are also going to be airing companion show ‘After Dark‘ which will follow the main show, bringing together cast, crew, fans and experts to discuss events of the episode.
Life just doesn’t get any easier for the crew of the Raza… Since they awoke on the derelict spaceship with no memory of who they were or how they got there, they have managed to piece together some of their past – but only at the price of becoming ensnared in betrayal, vengeance and deadly interplanetary secrets, culminating at the end of Season 2 with the EOS 7 space station blowing up with some of the team still aboard. Now,the survivors must stay alive and find the missing.
Joining the cast this season are Ayisha Issa (12 Monkeys), Mishka Thébaud (Bitten) and Andrew Moodie (Trust No One).
Coming straight after the main show is a new short-form companion fan show called ‘After Dark’. Each episode brings together cast, crew, fans and experts to discuss storylines, go behind the scenes, and debate what’s next for the series’ protagonists. Zoie Palmer, who plays the Android, will host the show, with the actors who portray Two, Three, Four, Five and Six all lined up to join over the course of the run, along with showrunner Joe Mallozzi.
You can join the crew of the Raza when Dark Matter Season 3 lands on Syfy UK with a double bill from Monday the 12th June at 8pm, then continuing weekly at 9pm. The companion show ‘After Dark’ will follow straight after the main episode.
( Editor/Owner ) Dave has over 20 years experience in the digital industry, and is founder and editor of Geektown. Obviously a huge geek himself, he can often be found in front of the latest tv show or movie, on various video games, or with his head in a comic book.
|
2023-12-25T01:26:28.774034
|
https://example.com/article/8464
|
Pages
Monday, 10 August 2009
Subquery Factoring Clause - WITH
Through general experience I've found the WITH statement either underutilised or people haven't been aware of it's existence, although that seems to be changing - it has been around since 9i.
For me, two typical examples come to mind.1) I was demonstrating recently an example of using SUBSTR & INSTR together to extract certain parts of a string. I built up the expressions step by step, then to test the example with a slightly different string, I would normally be forced to do a search and replace. Depending on the example, this can be annoying.
Other times recently I have used the WITH statement to essentially encapsulate a unit of work. I had extracted a SQL statement from some PL/SQL and wanted to run it with my own restrictions, but leave the original untouched - this allowed me to test without worrying if I've disrupted the original join behaviour.
WITH original as ({copy of embedded sql})select *from originalwhere {my own restrictions}
These are ad hoc reasons, there is also a potential performance benefit from using the WITH clause.
I'm sure I've seen an example where using the WITH clause provided a performance benefit, but memory is fallible so I thought I'd see what the documentation had to say.It says it will give the optimiser more choice about what to do, and that we can improve the query by using the WITH syntax.After comparing explain plans from the example straight out of the documentation, I wasn't convinced. So I ran timings over different versions of the database - 1000 iterations each. I was surprised at the results (sounds like tabloid journalism, doesn't it?):
Not only has it not performed better, its comparative performance has deteriorated as versions go up. So while we have removed duplicate code and enhanced the readability of our code, this example shows it's not necessarily more efficient.
It may just be a poor example to illustrate the performance benefit of this feature. It shows while a documented effect may be true in some circumstances, you must always test your particular scenario on your framework to get accurate comparisons. For further comment on this paradigm, I highly recommend reading this. Twice.
1. I used this in an ETL process to great benefit. The SELECT in the WITH clause was against a small table (maybe 30 or 40 rows) and the bulk was against a table with 40 to 50 million rows.
2. Sometimes I'll add the WITH statement just to show off (not really...kind of) to the non SQL types. I did it recently and performance was not improved what-so-ever. In fact, I saw numbers like you mentioned. In that particular instance there was a bigger gain in another part of the code (removed the cursor loop DELETE).
|
2024-02-02T01:26:28.774034
|
https://example.com/article/2065
|
// Massgate
// Copyright (C) 2017 Ubisoft Entertainment
//
// This program is free software: you can redistribute it and/or modify
// it under the terms of the GNU General Public License as published by
// the Free Software Foundation, either version 2 of the License, or
// (at your option) any later version.
//
// This program is distributed in the hope that it will be useful,
// but WITHOUT ANY WARRANTY; without even the implied warranty of
// MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
// GNU General Public License for more details.
//
// You should have received a copy of the GNU General Public License
// along with this program. If not, see <https://www.gnu.org/licenses/>.
#include "StdAfx.h"
#include "MMS_ClanColosseum.h"
MMS_ClanColosseum* MMS_ClanColosseum::ourInstance = new MMS_ClanColosseum();
MMS_ClanColosseum::MMS_ClanColosseum()
{
myEntries.Init(256, 256);
}
MMS_ClanColosseum::~MMS_ClanColosseum()
{
}
void
MMS_ClanColosseum::Register(
int aProfileId,
int aClanId,
MMG_ClanColosseumProtocol::Filter& aFilter)
{
if(aFilter.fromRanking != 0 && aFilter.toRanking != 0 && aFilter.fromRanking > aFilter.toRanking)
{
int t = aFilter.fromRanking;
aFilter.fromRanking = aFilter.toRanking;
aFilter.toRanking = t;
}
MT_MutexLock lock(myMutex);
bool found = false;
for(int i = 0; i < myEntries.Count(); i++)
{
if(myEntries[i].clanId == aClanId && myEntries[i].profileId == aProfileId)
{
myEntries[i].filter = aFilter;
found = true;
break;
}
}
if(!found)
{
ColosseumEntry entry;
entry.clanId = aClanId;
entry.profileId = aProfileId;
entry.filter = aFilter;
myEntries.Add(entry);
}
}
void
MMS_ClanColosseum::Unregister(
int aProfileId)
{
MT_MutexLock lock(myMutex);
bool found = false;
for(int i = 0; i < myEntries.Count(); i++)
{
if(myEntries[i].profileId == aProfileId)
{
myEntries.RemoveCyclicAtIndex(i);
break;
}
}
}
void
MMS_ClanColosseum::GetFilterMaps(
int aProfileId,
int aClanId,
MC_HybridArray<uint64, 255>& aMapList)
{
MT_MutexLock lock(myMutex);
for(int i = 0; i < myEntries.Count(); i++)
{
ColosseumEntry& entry = myEntries[i];
if(entry.profileId == aProfileId && entry.clanId == aClanId)
{
for(int j = 0; j < entry.filter.maps.Count(); j++)
aMapList.Add(entry.filter.maps[j]);
break;
}
}
}
bool
MMS_ClanColosseum::GetOne(
int aProfileId,
int aClanId,
MMG_ClanColosseumProtocol::GetRsp& theRsp)
{
MT_MutexLock lock(myMutex);
for(int i = 0; i < myEntries.Count(); i++)
{
ColosseumEntry& entry = myEntries[i];
if(entry.clanId == aClanId && entry.profileId == aProfileId)
{
MMG_ClanColosseumProtocol::GetRsp::Entry e;
e.clanId = myEntries[i].clanId;
e.profileId = myEntries[i].profileId;
e.filter = myEntries[i].filter;
theRsp.entries.Add(e);
return true;
}
}
return false;
}
void
MMS_ClanColosseum::FillResponse(
MMG_ClanColosseumProtocol::GetRsp& theRsp)
{
MT_MutexLock lock(myMutex);
for(int i = 0; i < myEntries.Count(); i++)
{
ColosseumEntry& entry = myEntries[i];
MMG_ClanColosseumProtocol::GetRsp::Entry e;
e.clanId = entry.clanId;
e.profileId = entry.profileId;
e.filter = entry.filter;
theRsp.entries.Add(e);
}
}
|
2023-10-12T01:26:28.774034
|
https://example.com/article/1779
|
Cooperative and Collaborative Learning
Cooperative (and collaborative, as the terms are often used interchangeably in the literature) learning is an approach to teaching that departs from the traditional lecture-base format. Slavin (1983, p. 3) defines it as: "A set of task structures that require students to spend much of their class time working together in 4-6 member heterogeneous groups. They also use cooperative incentive structures, in which students earn recognition, rewards, or (occasionally) grades based on the academic performance of their groups."
Even though faculty may have the best of intentions when using cooperative learning to teach their course, it turns out that many students dread the idea of working with their peers on team-based projects and activities. Although students realize they will have to work in teams when "working out there in the real world," they tend to have the following real concerns/fears when working cooperatively with their classmates on team-based projects and activities:
Slackers or lazy team members — only one or two will do the work.
They cannot control their grades; it depends on contribution of others.
Over-controlling members or perfectionists.
Lack of cooperation among members.
Conflict among members.
Not having the time to meet with their group outside of class.
Members who are not punctual for meetings.
The fears and concerns of students are very real and can hamper their effectiveness as part of a team, especially when their grade depends upon it. It helps to take time early on in the course being taught to provide students with insights as to how to work effectively in a team. There are many things that educators can do to prepare students to work in teams. Students can be prepared to work in teams in some of the following ways:
Students can be given readings on effective teamwork, then asked to discuss them in class.
Guest speakers can be brought in to class to share what they did to be part of a successful team (including members of the school's coaching staff).
Students can brainstorm a list of things they hated about working on other team-based projects or activities, then challenged to not repeat the mistakes of past teams.
Students can be involved in team-building activities to get them used to working together in general before working on class projects and activities.
Students can be shown videotapes on how to be part of an effective team.
Bear in mind that if students are to have a positive experience working on team-based projects, it is also important to monitor their feelings during the semester. This can be done in ways seen and unseen. In ways seen, students can be required to produce tangible evidence that they are supporting the efforts of their team to accomplish its objectives through means such as attendance, having assignments with them when they come to class, peer performance evaluations, etc. In ways unseen, the teacher can casually observe how well teams are working together. Those students who appear to not be engaged can be quizzed to see whether or not they are doing their part to make the team successful by accomplishing its objectives.
It is also important to evaluate students at both the team and individual level to reduce the fears and concerns they have about team-based projects. Grading students at the team level gives every member something to aspire to, be it on a team exam or project. However, it is critical that students be evaluated at the individual level, on such things as attendance or preparedness for a group exercise, to help hold students accountable to their team. When done properly, you will find that the students who work to make their team successful end up earning the "A" while those who contribute less end up with a lower grade — even in the case where the majority of assignments are done using cooperative learning.
In sum, cooperative learning holds great promise for preparing students to do well in academia and the workplace. It is a way to get students to become very much involved in the learning process so that they will be accomplished students now and go on to have successful careers later. However, it is important to consider that cooperative learning is far more effective when the teacher prepares the students to work together as a team and monitors and evaluates them to ensure they work together effectively to accomplish course objectives while earning the grade desired by the majority of the team.
Words of Wisdom
Smartly implemented group learning is powerful and significantly more effective than the traditional lecture, lecture/discussion strategies. It is worth incorporating into every course and curriculam we teach.
Cooperative learning is extremely powerful when combined with other tools such as active learning.
Cooperative learning tasks can sometimes be less time consuming for faculty. Because students are working together, they can often answer each other's questions. It can also reduce the grading load.
Teams can be nearly any size; however, 3-5 is the most common size and the size often recommended in the literature.
For long term teams, consider having students develop a set of team rules with which all students agree and that a signed copy be submitted. Be sure that the teams include penalties for disobeying those rules. Make it clear to students that if they sign the list of rules, they are agreeing to abide by them. This can help reduce potential team participation issues, as you as the instructor can fall back on the rules that the team chose and agreed to.
|
2023-11-15T01:26:28.774034
|
https://example.com/article/7115
|
Silver halide has been widely used as a light sensitive component in photographic compositions and elements. Because silver halide is intrinsically sensitive only to blue light, it has often been desirable to impart to silver halide sensitivity to other wavelengths of radiation. This has generally been accomplished through the use of one or more spectral sensitizing dyes, such as cyanine dyes. The dye is adsorbed to the surface of the silver halide. The dye absorbs light or radiation of a certain wavelength. The energy thus absorbed by the dye is transferred to the silver halide to form a latent image exposure from which a visible image can be developed during photographic processing.
Cyanine dyes have been used to sensitize silver halide to various portions of the spectrum, such as red, green, and blue, as well as invisible radiation, such as infrared, depending on the radiation source to which a photographic element is intended to be exposed. In recent years, diode lasers that emit infrared radiation have become increasingly popular as exposure sources for a number of applications, such as for making prints from computer assisted tomography scanners, various graphic arts products that are exposed by diode lasers, and infrared sensitive false color-sensitized photographic materials as described in Simpson et al. U.S. Pat. No. 4,619,892.
While traditional infrared recording films designed for infrared radiation given off or reflected by various objects (e.g., aerial photography film for detection of vegetation growth) require fairly broad sensitivity in the region of about 700 nm to 900 nm, infrared laser diodes emit radiation at one specific wavelength, which is often longer than 800 nm and may be as deep as 850 nm or even deeper.
With the increasing popularity of infrared laser diodes emitting at specific wavelengths in the deep infrared (e.g., up to about 900 nm) as exposure sources for photographic elements, it is desirable to provide silver halide emulsions offering high peak sensitivity to infrared radiation at wavelengths where laser diodes emit.
|
2023-10-28T01:26:28.774034
|
https://example.com/article/2790
|
Asthma Treatments Dover DE
This page provides relevant content and local businesses that can help with your search for information on Asthma Treatments.
You will find informative articles about Asthma Treatments, including "Asthma".
Below you will also find local businesses that may provide the products or services you are looking for.
Please scroll down to find the local resources in Dover, DE that can help answer your questions about Asthma Treatments.
Asthma
Think you might have asthma ? What is asthma and what relation does it have to your weight, if any? Read below. While you are here, why not try our Diet Wizard to find out which weight loss programs can help you lose the weight?
Asthma
Note: BestDietForMe.com does NOT provide medical advice or diagnoses. You should always consult your physician first, before beginning any weight loss regimen or if suffering from a medical condition.
Fact: Of the thousands of BestDietForMe.com visitors taking the online survey in the 2nd quarter of 2007, 6.8% of them reported having asthma.
What Is Asthma?
Asthma is a chronic disease that affects your airways. The airways are the tubes that carry air in and out of your lungs. If you have asthma, the inside walls of your airways are inflamed (swollen). The inflammation makes the airways very sensitive, and they tend to react strongly to things that you are allergic to or find irritating. When the airways react, they get narrower, and less air flows through to your lung tissue. This causes symptoms like wheezing (a whistling sound when you breathe), coughing, chest tightness, and trouble breathing, especially at night and in the early morning.
Obesity may be linked to asthma, as well as other health problems.
Asthma cannot be cured, but most people with asthma can control it so that they have few and infrequent symptoms and can live active lives.
When your asthma symptoms become worse than usual, it is called an asthma episode or attack. During an asthma attack, muscles around the airways tighten up, making the airways narrower so less air flows through. Inflammation increases, and the airways become more swollen and even narrower. Cells in the airways may also make more mucus than usual. This extra mucus also narrows the airways. These changes make it harder to breathe.
Asthma attacks are not all the same—some are worse than others. In a severe asthma attack, the airways can close so much that not enough oxygen gets to vital organs. This condition is a medical emergency. People can die from severe asthma attacks.
So, if you have asthma, you should see your doctor regularly. You will need to learn what things cause your asthma symptoms and how to avoid them. Your doctor will also prescribe medicines to keep your asthma under control.
How Is Asthma Diagnosed?
Some things your doctor will ask about include:
Periods of coughing, wheezing, shortness of breath, or chest tightness that come on suddenly, occur often, or seem to happen during certain times of the year or season Colds that seem to "go to the chest" or take more than 10 days to get over Medicines you may have used to help your breathing Your family history of asthma and allergies Things that seem to cause your symptoms or make them worse
Your doctor will listen to your breathing and look for signs of asthma or allergies.
This page provides relevant content and local businesses that can help with your search for information on Rosacea Treatments.
You will find informative articles about Rosacea Treatments, including "Rosacea".
Below you will also find local businesses that may provide the products or services you are looking for.
Please scroll down to find the local resources in Dover, DE that can help answer your questions about Rosacea Treatments.
We do NOT operate a weight loss program.
We simply help you find the best diets
for YOUR needs. The information on this
web site is intended for information
purposes only and is not intended as a
substitute for medical advice. Always
seek healthy weight loss and balanced
nutrition. Before starting any weight
loss program
consult your physician.
|
2024-04-16T01:26:28.774034
|
https://example.com/article/4045
|
Endometrial glands are required for preimplantation conceptus elongation and survival.
Endometrial glands secrete molecules hypothesized to support conceptus growth and development. In sheep, endometrial gland morphogenesis occurs postnatally and can be epigenetically ablated by neonatal progestin exposure. The resulting stable adult uterine gland knockout (UGKO) phenotype was used here to test the hypothesis that endometrial glands are required for successful pregnancy. Mature UGKO ewes were bred repeatedly to fertile rams, but no pregnancies were detected by ultrasound on Day 25. Day 7 blastocysts from normal superovulated ewes were then transferred synchronously into Day 7 control or UGKO ewes. Ultrasonography on Days 25-65 postmating indicated that pregnancy was established in control, but not in UGKO ewes. To examine early uterine-embryo interactions, four control and eight UGKO ewes were bred to fertile rams. On Day 14, their uteri were flushed. The uterus of each control ewe contained two filamentous conceptuses of normal length. Uteri from four UGKO ewes contained no conceptus. Uteri of three UGKO ewes contained a single severely growth-retarded tubular conceptus, whereas the remaining ewe contained a single filamentous conceptus. Histological analyses of these uteri revealed that endometrial gland density was directly related to conceptus survival and developmental state. Day 14 UGKO uteri that were devoid of endometrial glands did not support normal conceptus development and contained either no conceptuses or growth-retarded tubular conceptuses. The Day 14 UGKO uterus with moderate gland development contained a filamentous conceptus. Collectively, these results demonstrate that endometrial glands and, by inference, their secretions are required for periimplantation conceptus survival and development.
|
2023-08-11T01:26:28.774034
|
https://example.com/article/2104
|
Teratogenic potential of blighted potato concentrate in rabbits, hamsters, and miniature swine.
Freeze-dried preparations of potatoes infected with phytophthora infestans or Alternaria solani were fed to pregnant hamsters, rabbits, and miniature swine. No evidence was observed that these diets or the extracts of respective blights were capable of producing teratologic effects in hamsters. Lesions of neurulation and anencephaly were noticed in rabbits and swine, respectively. The need for further pharmacological and toxicological evaluation in sensitive species is emphasized.
|
2023-10-04T01:26:28.774034
|
https://example.com/article/4956
|
/*
* Copyright (C) 2007, 2008 Apple Inc. All rights reserved.
*
* Redistribution and use in source and binary forms, with or without
* modification, are permitted provided that the following conditions
* are met:
* 1. Redistributions of source code must retain the above copyright
* notice, this list of conditions and the following disclaimer.
* 2. Redistributions in binary form must reproduce the above copyright
* notice, this list of conditions and the following disclaimer in the
* documentation and/or other materials provided with the distribution.
*
* THIS SOFTWARE IS PROVIDED BY APPLE COMPUTER, INC. ``AS IS'' AND ANY
* EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
* IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR
* PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL APPLE COMPUTER, INC. OR
* CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL,
* EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO,
* PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR
* PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY
* OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT
* (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE
* OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
*/
#include "config.h"
#include "CSSFontFace.h"
#include "CSSFontFaceSource.h"
#include "CSSFontSelector.h"
#include "CSSSegmentedFontFace.h"
#include "FontDescription.h"
#include "SimpleFontData.h"
namespace WebCore {
CSSFontFace::~CSSFontFace()
{
deleteAllValues(m_sources);
}
bool CSSFontFace::isLoaded() const
{
unsigned size = m_sources.size();
for (unsigned i = 0; i < size; i++) {
if (!m_sources[i]->isLoaded())
return false;
}
return true;
}
bool CSSFontFace::isValid() const
{
unsigned size = m_sources.size();
if (!size)
return false;
for (unsigned i = 0; i < size; i++) {
if (m_sources[i]->isValid())
return true;
}
return false;
}
void CSSFontFace::addedToSegmentedFontFace(CSSSegmentedFontFace* segmentedFontFace)
{
m_segmentedFontFaces.add(segmentedFontFace);
}
void CSSFontFace::removedFromSegmentedFontFace(CSSSegmentedFontFace* segmentedFontFace)
{
m_segmentedFontFaces.remove(segmentedFontFace);
}
void CSSFontFace::addSource(CSSFontFaceSource* source)
{
m_sources.append(source);
source->setFontFace(this);
}
void CSSFontFace::fontLoaded(CSSFontFaceSource*)
{
// FIXME: Can we assert that m_segmentedFontFaces is not empty? That may
// require stopping in-progress font loading when the last
// CSSSegmentedFontFace is removed.
if (m_segmentedFontFaces.isEmpty())
return;
HashSet<CSSSegmentedFontFace*>::iterator end = m_segmentedFontFaces.end();
for (HashSet<CSSSegmentedFontFace*>::iterator it = m_segmentedFontFaces.begin(); it != end; ++it)
(*it)->fontLoaded(this);
// Use one of the CSSSegmentedFontFaces' font selector. They all have
// the same font selector, so it's wasteful to store it in the CSSFontFace.
CSSFontSelector* fontSelector = (*m_segmentedFontFaces.begin())->fontSelector();
fontSelector->fontLoaded();
}
SimpleFontData* CSSFontFace::getFontData(const FontDescription& fontDescription, bool syntheticBold, bool syntheticItalic)
{
if (!isValid())
return 0;
ASSERT(!m_segmentedFontFaces.isEmpty());
CSSFontSelector* fontSelector = (*m_segmentedFontFaces.begin())->fontSelector();
SimpleFontData* result = 0;
unsigned size = m_sources.size();
for (unsigned i = 0; i < size && !result; i++)
result = m_sources[i]->getFontData(fontDescription, syntheticBold, syntheticItalic, fontSelector);
return result;
}
}
|
2024-04-24T01:26:28.774034
|
https://example.com/article/3394
|
Correction: Simulations of the water exchange dynamics of lanthanide ions in 1-ethyl-3-methylimidazolium ethyl sulfate ([EMIm][EtSO4]) and water.
Correction for 'Simulations of the water exchange dynamics of lanthanide ions in 1-ethyl-3-methylimidazolium ethyl sulfate ([EMIm][EtSO4]) and water' by Yi-Jung Tu et al., Phys. Chem. Chem. Phys., 2016, DOI: 10.1039/c6cp04957e.
|
2024-06-16T01:26:28.774034
|
https://example.com/article/4537
|
# Copyright 2013 the V8 project authors. All rights reserved.
# Copyright (C) 2005, 2006, 2007, 2008, 2009 Apple Inc. All rights reserved.
#
# Redistribution and use in source and binary forms, with or without
# modification, are permitted provided that the following conditions
# are met:
# 1. Redistributions of source code must retain the above copyright
# notice, this list of conditions and the following disclaimer.
# 2. Redistributions in binary form must reproduce the above copyright
# notice, this list of conditions and the following disclaimer in the
# documentation and/or other materials provided with the distribution.
#
# THIS SOFTWARE IS PROVIDED BY APPLE INC. AND ITS CONTRIBUTORS ``AS IS'' AND ANY
# EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED
# WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE
# DISCLAIMED. IN NO EVENT SHALL APPLE INC. OR ITS CONTRIBUTORS BE LIABLE FOR ANY
# DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES
# (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES;
# LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON
# ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT
# (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS
# SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
Tests whether bytecode codegen properly handles assignment as righthand expression.
On success, you will see a series of "PASS" messages, followed by "TEST COMPLETE".
PASS assign_as_rexp_1() is 'PASS'
PASS assign_as_rexp_2() is 'PASS'
PASS successfullyParsed is true
TEST COMPLETE
|
2024-03-21T01:26:28.774034
|
https://example.com/article/4360
|
package gw.internal.gosu.compiler.blocks
uses java.util.concurrent.Callable
class BlockTypeVariableTest extends gw.test.TestClass
{
function testNestedBlockInMethodReturnsProperTypeVar() {
assertEquals( String, returnsBlockOfBlockToT1( String )() )
assertEquals( String, returnsBlockOfBlockToT2( String )()() )
assertEquals( String, returnsBlockOfBlockToT3( String )()()() )
assertEquals( String, returnsBlockOfBlockToT4( String )()()()() )
}
function testNestedBlockInStaticMethodReturnsProperTypeVar() {
assertEquals( String, staticReturnsBlockOfBlockToT1( String )() )
assertEquals( String, staticReturnsBlockOfBlockToT2( String )()() )
assertEquals( String, staticReturnsBlockOfBlockToT3( String )()()() )
assertEquals( String, staticReturnsBlockOfBlockToT4( String )()()()() )
}
reified function returnsBlockOfBlockToT1<T>( t : Type<T> ) : block():Type {
return \->T
}
reified function returnsBlockOfBlockToT2<T>( t : Type<T> ) : block():block():Type {
return \->\->T
}
reified function returnsBlockOfBlockToT3<T>( t : Type<T> ) : block():block():block():Type {
return \->\->\->T
}
reified function returnsBlockOfBlockToT4<T>( t : Type<T> ) : block():block():block():block():Type {
return \->\->\->\->T
}
reified static function staticReturnsBlockOfBlockToT1<T>( t : Type<T> ) : block():Type {
return \->T
}
reified static function staticReturnsBlockOfBlockToT2<T>( t : Type<T> ) : block():block():Type {
return \->\->T
}
reified static function staticReturnsBlockOfBlockToT3<T>( t : Type<T> ) : block():block():block():Type {
return \->\->\->T
}
reified static function staticReturnsBlockOfBlockToT4<T>( t : Type<T> ) : block():block():block():block():Type {
return \->\->\->\->T
}
}
|
2023-08-20T01:26:28.774034
|
https://example.com/article/6296
|
import _ from 'lodash'
import Base from './Base'
/**
* @extends Base
* @property {string} backgroundColor '#ffffff'
* @property {array} platforms ['ios', 'android']
* @property {array} orientations ['portrait', 'landscape']
*/
export default class Scene extends Base {
/**
* @param {object} options
* @constructor
*/
constructor (options = {}) {
super(options)
_.assignIn(this, {
proto: 'Scene',
backgroundColor: '#ffffff',
platforms: ['ios', 'android'],
orientations: ['portrait', 'landscape'],
hidden: false,
objects: []
}, options)
}
clone () {
const n = super.clone()
n.objects = this.objects.map(v => v.clone())
return n
}
}
|
2023-08-19T01:26:28.774034
|
https://example.com/article/3189
|
Acute respiratory tract infections (ARTI) are among the most frequent reasons for seeking medical attention in primary care. Although from predominantly viral origin, ARTIs are the most important condition for the prescription of antibiotics (AB), mainly due to the difficulty in primary care to differentiate between viral and bacterial etiology. Unnecessary AB use increases drug expenditures, side effects and AB resistance. A novel approach is to guide AB use by procalcitonin (ProCT), since serum levels are elevated in bacterial infections but remain lower in viral infections and inflammatory diseases.
We aim to compare a strategy based on evidence-based guidelines with ProCT guided AB therapy in ARTIs with respect to outcome (days with restriction) and AB use. Patients presenting with ARTIs to primary care physicians and are intended to be treated with AB based on guidelines will be included and randomized 1:1 either to standard management or to the ProCT guided prescription of AB. All participating physicians will receive evidence-based guidelines for the management of patients with ARTIs. Patients with ARTI and in need of ABs by physicians’ clinical judgment and with informed consent will be randomized to ProCT plus guidelines ("ProCT group") versus only guidelines guided AB treatment ("control group"). In patients randomized to the ProCT group, the use of antibiotics will be more or less discouraged (<0.1 or <0.25 ug/L) or encouraged (>0.5 or >0.25 ug/L), respectively. A re-evaluation in patients with ProCT (<0.1 or <0.25 ug/L) after 6 to 24 hours is mandatory. All patients will be reassessed at day 3 and it is recommended to stop AB in the ProCT group as described above. Structured phone interviews at days 14 and 28 will be done in all patients from both groups.
In need of ABs based on the clinical judgment of the primary care physician
Exclusion Criteria:
Patients without informed consent
Not fluent in German
AB pretreatment in previous 28 days
Severe immune-suppression
Contacts and Locations
Choosing to participate in a study is an important personal decision. Talk with your doctor and family members or friends about deciding to join a study.
To learn more about this study, you or your doctor may contact the study research staff using the Contacts provided below.
For general information, see Learn About Clinical Studies.
Please refer to this study by its ClinicalTrials.gov identifier: NCT00099840
|
2024-05-12T01:26:28.774034
|
https://example.com/article/7804
|
ive prob of sequence uz.
3/110
Two letters picked without replacement from kpkagipipkpkipaiqpip. Give prob of sequence kg.
1/95
Two letters picked without replacement from zrqvrvdrddrr. What is prob of sequence vd?
1/22
Three letters picked without replacement from xxoxdoxoodx. Give prob of sequence xoo.
2/33
What is prob of sequence xx when two letters picked without replacement from {s: 1, p: 1, w: 1, x: 2, f: 2}?
1/21
Calculate prob of sequence ayz when three letters picked without replacement from {z: 8, y: 3, f: 1, a: 2, v: 1, o: 2}.
1/85
Four letters picked without replacement from {j: 2, v: 5, p: 2}. What is prob of sequence pvvp?
5/378
Two letters picked without replacement from gtgyyyyyyqq. What is prob of sequence tq?
1/55
Three letters picked without replacement from fmfffmffmmf. What is prob of sequence mmm?
4/165
What is prob of sequence draz when four letters picked without replacement from {d: 4, r: 3, w: 4, a: 3, z: 2}?
3/1820
What is prob of sequence rnr when three letters picked without replacement from {r: 2, z: 1, c: 1, n: 1}?
1/30
Three letters picked without replacement from {o: 1, w: 1, s: 3, l: 1, v: 1}. Give prob of sequence slo.
1/70
What is prob of sequence ujxe when four letters picked without replacement from yddddddeyxxdueejx?
3/19040
What is prob of sequence owa when three letters picked without replacement from {o: 2, h: 1, a: 1, w: 1}?
1/30
Calculate prob of sequence ibbb when four letters picked without replacement from {t: 3, z: 1, i: 2, h: 1, b: 3, y: 1}.
1/660
Two letters picked without replacement from {g: 1, f: 2, p: 1, d: 5, q: 7, u: 1}. What is prob of sequence dd?
5/68
What is prob of sequence wkz when three letters picked without replacement from zzzzzzzzwzwkk?
3/143
Two letters picked without replacement from npiiiqlipqbni. What is prob of sequence iq?
5/78
Calculate prob of sequence zz when two letters picked without replacement from {g: 4, c: 2, z: 5}.
2/11
Four letters picked without replacement from oowopwooowowwowooww. Give prob of sequence wowp.
35/5814
Three letters picked without replacement from {b: 13, a: 3}. What is prob of sequence bbb?
143/280
Four letters picked without replacement from yerya. Give prob of sequence rerr.
0
Two letters picked without replacement from {i: 2, k: 2, t: 2}. Give prob of sequence ti.
2/15
Calculate prob of sequence ggkk when four letters picked without replacement from gkkdgnnkrrnkd.
1/715
Two letters picked without replacement from jmehejmhm. Give prob of sequence jm.
1/12
Two letters picked without replacement from {u: 3, t: 1, s: 11, m: 3, y: 1, j: 1}. Give prob of sequence uy.
3/380
Two letters picked without replacement from xoyryotorrtorrxrtr. Give prob of sequence xr.
7/153
Calculate prob of sequence qzk when three letters picked without replacement from kzffkfrqlffllzz.
1/455
Two letters picked without replacement from {i: 7, z: 1}. Give prob of sequence ii.
3/4
Two letters picked without replacement from {k: 1, t: 2, n: 1, x: 4, u: 3, h: 7}. What is prob of sequence nu?
1/102
What is prob of sequence yo when two letters picked without replacement from ldloohddhhdyjy?
2/91
Calculate prob of sequence zbn when three letters picked without replacement from {b: 2, n: 1, m: 4, z: 1, c: 1}.
1/252
Three letters picked without replacement from cccccccccc. What is prob of sequence ccc?
1
Four letters picked without replacement from imoeooiiedimio. Give prob of sequence midm.
5/12012
What is prob of sequence exxe when four letters picked without replacement from xebxeb?
1/90
What is prob of sequence lq when two letters picked without replacement from {l: 7, q: 12}?
14/57
Two letters picked without replacement from fhhhhhwhhhh. What is prob of sequence wf?
1/110
What is prob of sequence kqa when three letters picked without replacement from {q: 1, n: 4, a: 1, m: 1, k: 5}?
1/264
Calculate prob of sequence sxss when four letters picked without replacement from xxsspss.
2/35
Three letters picked without replacement from {o: 2, q: 2}. What is prob of sequence ooq?
1/6
Four letters picked without replacement from plerree. Give prob of sequence rere.
1/70
What is prob of sequence ch when two letters picked without replacement from chkhkkhkcchhk?
5/52
What is prob of sequence yy when two letters picked without replacement from {y: 9, n: 3}?
6/11
Three letters picked without replacement from ddssdccs. What is prob of sequence ssc?
1/28
What is prob of sequence mll when three letters picked without replacement from {b: 1, l: 2, m: 1, i: 2, x: 1}?
1/105
Four letters picked without replacement from wwwwwwwwwwuwuu. Give prob of sequence uuww.
5/182
Calculate prob of sequence mm when two letters picked without replacement from {m: 10}.
1
Four letters picked without replacement from mnnuueuul. Give prob of sequence eulm.
1/756
Two letters picked without replacement from jaqqaqqqvqqqqjajaaa. What is prob of sequence aj?
1/19
What is prob of sequence jdjo when four letters picked without replacement from {j: 4, d: 1, h: 1, o: 1, i: 1}?
1/140
Calculate prob of sequence hhfh when four letters picked without replacement from {h: 4, z: 1, o: 4, f: 5, k: 6}.
1/969
Three letters picked without replacement from nxcanaxmaxtntmcmxa. Give prob of sequence mmm.
1/816
Two letters picked without replacement from {c: 3, z: 3}. Give prob of sequence cc.
1/5
Two letters picked without replacement from {x: 2, l: 1, i: 1, a: 1, z: 1, s: 1}. What is prob of sequence ia?
1/42
Four letters picked without replacement from wwhw. Give prob of sequence wwhw.
1/4
Two letters picked without replacement from epyhmmmmmmmmep. Give prob of sequence mh.
4/91
Calculate prob of sequence ul when two letters picked without replacement from {j: 1, u: 2, c: 2, l: 2, g: 1}.
1/14
Calculate prob of sequence aa when two letters picked without replacement from {q: 1, z: 8, g: 5, a: 2}.
1/120
Calculate prob of sequence ifi when three letters picked without replacement from iiffifiiff.
5/36
Calculate prob of sequence bt when two letters picked without replacement from {j: 6, b: 6, t: 3}.
3/35
What is prob of sequence qq when two letters picked without replacement from qeeqqe?
1/5
Calculate prob of sequence plpp when four letters picked without replacement from ppmllmmplmmllp.
5/1001
What is prob of sequence xjn when three letters picked without replacement from {n: 2, x: 2, j: 2}?
1/15
Three letters picked without replacement from {v: 7, h: 9, l: 2}. Give prob of sequence hll.
1/272
What is prob of sequence mdmd when four letters picked without replacement from {d: 10, m: 2}?
1/66
Two letters picked without replacement from ggqgqkgqggqmwggqq. What is prob of sequence mq?
3/136
What is prob of sequence jj when two letters picked without replacement from jjjjjjqaqajq?
7/22
Four letters picked without replacement from {d: 2, l: 5, a: 12}. What is prob of sequence llll?
5/3876
Four letters picked without replacement from {c: 4, s: 2, r: 1, f: 3}. What is prob of sequence cfsc?
1/70
Four letters picked without replacement from {f: 2, t: 7}. What is prob of sequence ttft?
5/36
Calculate prob of sequence gxq when three letters picked without replacement from {g: 3, x: 2, q: 2, s: 2}.
1/42
Two letters picked without replacement from {i: 6, c: 2, b: 1, g: 2, d: 3}. Give prob of sequence gg.
1/91
Three letters picked without replacement from {m: 5, t: 9}. Give prob of sequence mmt.
15/182
What is prob of sequence bnn when three letters picked without replacement from bbnbbbbbbbbnbbn?
12/455
Two letters picked without replacement from kknggkkknnkkkkkkk. What is prob of sequence ng?
3/136
What is prob of sequence zy when two letters picked without replacement from zeeszessyezsss?
3/182
Four letters picked without replacement from {h: 7, l: 5}. Give prob of sequence lllh.
7/198
What is prob of sequence hkpp when four letters picked without replacement from {k: 1, u: 2, p: 6, n: 6, h: 2}?
1/952
Four letters picked without replacement from {q: 1, b: 7}. What is prob of sequence bbqb?
1/8
Calculate prob of sequence hvhc when four letters picked without replacement from vceeveehvivhh.
1/715
Two letters picked without replacement from {c: 1, k: 1, i: 2}. Give prob of sequence ck.
1/12
Two letters picked without replacement from hgh. W
|
2023-10-31T01:26:28.774034
|
https://example.com/article/7709
|
REDDEN: Then they were all given a brand new antibiotic they had never taken before and they all had serious allergic reactions. What happened to them?
HOROWITZ: OK, what you're looking at with this upper respiratory infection is that it is a multi-factoral illness. It's associated with a variety of chemical and biological co-factors. Just like with AIDS, it's not the AIDS virus that ultimately kills, it's co-factor microbes such as the mycoplasma. What you have could be described as an ideal Russian biological cocktail. And I suppose it's called a Russian biological cocktail because the Americans most likely invented it.
What they determined would be the best biological chemical warfare approach was a combination of chemicals and biologicals, so that it would be very difficult to diagnose and then treat the illnesses.
|
2024-04-02T01:26:28.774034
|
https://example.com/article/8801
|
Turkey arrested more than 50 alleged members of the Islamic State (IS) group on Saturday, some of whom were suspected of planning an attack on Turkey's national holiday on Sunday, the state-run Anadolu news agency reported.
Most of the arrests were made in the capital Ankara, where 49 suspects were picked up a day before celebrations across the country for the 94th anniversary of Republic Day.
Another four people were arrested in Istanbul's commercial district, suspected of preparing an attack in the name of IS, the Anadolu agency reported.
A homemade bomb was found in their car, according to the Dogan news agency, which reported that one of the suspects was injured during the arrests.
Anadolu reported that Turkish authorities issued warrants for 55 suspected foreign IS members but did not provide further details.
Turkey has been hit by several bloody attacks blamed on IS militants over the past two years, including a New Year attack this year on an elite Istanbul nightclub by an IS gunman, during which 39 people were killed.
There has been a lull in attacks since, but tensions remain high and Turkish police launch raids almost daily against suspected IS cells across the country.
|
2024-05-04T01:26:28.774034
|
https://example.com/article/1707
|
Q:
Help with proof that $\sum_{n \in \Bbb{N}} \frac{1}{an + b}$ also diverges?
We know that $\sum_{n \in \Bbb{N}} \frac{1}{n}$ diverges. So it seems likely that $\sum_{n \in \Bbb{N}} \frac{1}{a n + b}$ will for any real $a, b$. I'm having trouble proving it just for the $\frac{1}{n + c}$ form special case. Any hints?
A:
Let $a,b \in \mathbb{R}$ and let $a \neq 0$. Since
$$
\frac{1}{an+b} \sim \frac{1}{an}
$$
as $n$ grows,
that is to say,
$$
\frac{n}{an+b} \to \frac{1}{a}
$$
as $n$ grows,
so by the limit comparison test the series $\sum 1/(an+b)$ diverges.
|
2023-08-27T01:26:28.774034
|
https://example.com/article/9312
|
You know I should be doing something else when I do these..
3. Porridge - made with milk or water?I like my oats uncooked in muesli.
4. Do you like salt, sugar or honey on your porridge?n/a
5. Loose tea or teabags?I don't do tea.
6. Where on your door is your letterbox?It's not on the door, waist height to one side.
7. What's your favourite curry?Mild. I stopped being able to do chilli some years ago.
8. What age is the place where you live?85 years.
9. Where do the folks running your local corner shop come from?Around here.
10. Instant or fresh coffee?I only do coffee about once a month or so, but fresh.
11. How far are you from the sea?Erm, what counts as 'sea'? Looking at a map, about 35 miles, and it's not the bit of sea that I thought it was.
12. Have you travelled via Eurostar?Yes. Much better than flying to Paris / Brussels etc in multiple ways.
13. If you were going to travel abroad, where's the nearest country to you?I've just put the map away! France, Scotland and the Isle of Man are roughly equidistant from here.
14. If you're female (or possible even some males) do you carry a handbag?Only if I am carrying someone else's.
15. Do you have a garden? What do you like growing?Yes. I'd like raspberries to grow, rather than be eaten by pests.
16. Full cream, semi skimmed or skimmed?Full cream.
17. Which London terminal would you travel into if going to the capital?Kings Cross, but it depends on the route.
18. Is there a local greasy spoon where you live?Erm, depends on what counts. Plenty of small cafes within about 10mins walk.
19. Do you keep Euros in the house?Yes. Not much, but one Euro coins are ideal for supermarket trolleys.
20. Does your home town have a Latin, Gaelic or Welsh alternative name?It's Saxon.
21. Do you have a well known local artist or author?Living, erm... Dead, Thomas William Robertson was born here and is credited with, amongst other things, inventing modern stage direction and having control over his plays, including their casting and getting a royalty per performance.
22. Do you have a favourite Corrie character?Never watched it.
23. Are your kitchen sink taps separate or a mixer?Mixer.
24. Do you have a favourite brand of blended tea?No. See earlier tea question for why.
25. What's in your attic if you have one?Almost nothing here. The entrance is small and inconveniently located.
26. If you go out for a cream tea, what jam do you like on your scone?I don't.
27. Talking of scones- scon or scown? Jam or cream first?Scon. Who cares?
28. Barth or bath?Barth.
29. Carstle or castle?Carstle.
30. What flavour of crisps do you favour?Only un- or ready salted.
31. If you go to the chippie, what do you like with your chips?Vinegar.
32. Take away, take out or carry out?Takeaway.
33. If you have one, what colour is your wheelie bin?Green for general, brown for recycling.
34. What colour skips does your local skip hire use?Dunno. Depends which one you use, I suspect.
35. Do you celebrate Guy Fawkes?What he tried to do or his failure? :)
36. Dettol or TCP?Depends on what it's for.
37. Do you have a bidet in the bathroom?No.
38. Do you prefer courgettes or aubergines?Courgettes.
39. In the 'real world' Do you have friends of other nationalities? Which nationalities?Yes. Can't count them.
40. Do you have a holy book of any sort in the house?The Kinsey Reports.
41. Do you prefer a hankie or tissues?Hankie.
42. Are you a fan of crumpets? What do you like on them?No.
43. Doorbell, knocker or both?Bell.
44. Do you own a car? What sort?Yes, a Toyota Corolla.
45. What sort of pants do you guys prefer? Y fronts or boxers?None.
46. Anyone still a fan of suspenders?Not on me.
47. Do you have a favourite quote from the bard?"To be or what?" - a joke version of Hamlet starring Sylvester Stallone.
48. Do you like toasted muffins?No.
49. Do you think a traditional trifle should contain jelly?I don't like any trifle that has blancmange.
50. Do you attend regular religious worship? Of what kind?No.
This entry was originally posted at http://lovingboth.dreamwidth.org/550087.html, because despite having a permanent account, I have had enough of LJ's current owners trying to be evil. Please comment there using OpenID - have and if you have an LJ account, you can use it for your OpenID account. Or just join Dreamwidth! It only took a couple of minutes to copy all my entries here to there.
|
2023-11-15T01:26:28.774034
|
https://example.com/article/1388
|
Control of persistent asthma in Spain: associated factors.
The main objective of asthma treatment is tailored control for each patient. However, despite the excellent therapeutic arsenal currently available, many patients remain unable to achieve adequate control of this disease. The main objective this study was to evaluate the degree of control and the determinants of asthma in patients with persistent asthma in Spain in usual clinical practice. This was a cross-sectional epidemiological study. The patients enrolled were 18 years of age or over, with a 6-month history of diagnosed persistent asthma, who were followed up by primary care physicians in Spain between the months of June and December 2006. Demographic and socioeconomic data were collected, as were anthropometric data and different clinical variables. The control of asthma was evaluated using the Asthma Control Questionnaire (ACQ). The study included 6,824 patients, of whom 306 were excluded; therefore the final number of patients analyzed was 6,518 (95.5%). According to severity, 41.4% of patients had mild persistent asthma, 51.2% had moderate persistent asthma, and the remainder severe persistent asthma. The mean score in the ACQ was 1.4 +/- 1.0, distributed as follows: in 28.4% of cases, the score was below 0.75; in 31.6%, it was between 0.75 and 1.5; and in 39.7% it was above 1.5. Multiple regression analysis showed that the factor that most affected the degree of control of the disease was classification by severity. Other associated factors were sex, race, body mass index, smoking, level of education, habitual activity, years since diagnosis of asthma, number of exacerbations and admissions to hospital during the last year, and basic treatment of the disease. The number of patients with poorly controlled persistent asthma in Spain is high (71.6%). There are demographic, socioeconomic, anthropometric, and clinical variables that affect the level of control of this disease.
|
2023-09-24T01:26:28.774034
|
https://example.com/article/7343
|
Expression of mouse tyrosine hydroxylase in Escherichia coli.
Enzymatically active mouse tyrosine hydroxylase (TH) was successfully expressed at a high level in Escherichia coli using a T7 RNA polymerase directed expression system. The specific activity of mouse TH in E. coli cell lysate was 7.5 nmol/mg protein/min. Kinetic characteristics of recombinant TH were examined. Km for tyrosine and (6R)-tetrahydrobiopterin (6R-BH4) cofactor were determined to be 7.2 microM (420 microM 6R-BH4), 19 microM [( 6R-BH4] less than 55 microM, 20 microM tyrosine) and 54 microM [( 6R-BH4] greater than 55 microM, 20 microM tyrosine), respectively. These were in good agreement with previously reported values for this enzyme.
|
2024-03-04T01:26:28.774034
|
https://example.com/article/9345
|
Krauthammer on New Trump 'Scandals': If That's the Best They've Got, Then Plan for Inauguration
Gutfeld: 'Media Says Minorities Are Victims of Police, Yet More Die When Cops Back Off'
A "Blue Lives Matter" display at Dartmouth College to pay tribute to law enforcement officers was torn down on Friday and replaced with Black Lives Matter signs.
The school's College Republicans had received permission to put up the display in honor of National Police Week on a bulletin board in the school's student center.
But within hours, the display was torn down and in its place were flyers, which read: “You cannot co-opt the movement against state violence to memorialize its perpetrators. #blacklivesmatter.”
The activists who put the new flyers stood guard over the bulletin board for the whole day, while the College Republicans worked to resolve the situation through the school's administration.
The school eventually intervened, granting Black Lives Matter control over a bulletin board down the hall from the Blue Lives Matter display.
College Republicans wrote a letter to Dartmouth's president and board of Trustees asking for equal treatment.
“All we ask is that the protections and freedoms of self-expression afforded to other student organizations be extended to us," the letter said. "We do not see the Black Lives Matter and Blue Lives Matter movements as mutually exclusive.
“It is possible to recognize the service and contributions of law enforcement officers while simultaneously pushing for reform to correct the grave mistakes of the small minority of officers. On National Law Enforcement Appreciation Week, we just hoped to highlight the monumental sacrifices made by these officers to protect us every day.”
The president of the College Republicans, Michelle Knesbach, joined On the Record to explain the full story. She said that the school's administration applied a double standard by letting Black Lives Matter have their own billboard without making them go through the three-week process to get approved.
Watch the interview above and read more about the story here.
Trump's Ex-Girlfriend: NY Times Misquoted Me in Anti-Trump 'Hit Piece'
'I Don't Need Hillary 'Fighting for Me'': Female Voters Sound Off in Luntz Focus Group
Clarence Thomas: Don't Hide Your Faith in a 'World That Seems to Have Gone Mad with Political Correctness'
|
2023-09-14T01:26:28.774034
|
https://example.com/article/1327
|
04/11/2019
At one end of the spectrum is the young Zuck encouraging his hackers to “move fast and break things.” And then there’s Hillel Wayne with a very different sort of advice: move a bit slower and get things right. Unsurprisingly, the more mature Mark Zuckerberg of today would now agree with Hillel. “When you build something that you don’t have to fix 10 times, you can move forward on top of what you’ve built,” Zuckerberg told BI.
Hillel’s road to this wisdom was much shorter than Zuck’s. A couple years ago Hillel was working at a web development company that ran into a hairy distributed systems problem. The sheer complexity of it was overwhelming, so he starting looking for a way to make it manageable. That’s when he stumbled on TLA+. Long story short: Hillel fell in love.
Now Hillel is a renowned formal methods consultant, advising and training companies on TLA+, Alloy, and various other formal methods. It’s part of his personal mission to evanalize the benefits of formal methods to everyday programmers.
Most engineers in industry don’t get particularly excited with they hear “formal methods.” They seem like they’d be, well, formal. But that’s not entirely true. Formal methods is a big field, and some parts are more “formal” than others. There are two main categories: specification and verification. And then within each of those two categories there are: design and code. In other words, there’s:
Most of us are familiar with the benefits (and detriments) of a few kinds of code verification: type systems, tests, contracts, etc. Hillel’s schtick is educating the public on the virtues of a more obscure corner of formal methods: design specification.
TLA+ isn’t the first design specification language created, but it was the first Hillel came in contact with, and it’s still his favorite. It was created by Leslie Lamport, better known for LaTex and his seminal work on distributed computing (earning him the 2013 Turing Award). Hillel explains that the main benefit behind TLA+ is codifying all the scattered whiteboardings, UML diagrams, and documentation into a single formal notation that can also be automatically stress-tested for issues. It’s documentation for the broader system’s design, with the added assurances provided for by the TLA+ brute-force model checker. From Wikipedia: “TLA+ has been described as exhaustively-testable pseudocode, and its use likened to drawing blueprints for software systems.”
As Hillel would be the first to tell you, formal methods aren’t going to change your life. If you aren’t getting enough sleep currently, do that first. Then maybe consider formal methods, such as TLA+ or Alloy. If you want less customers getting upset at you for production bugs, and don’t want to ever again spend two weeks of your life crawling through distributed systems logs: formal methods may be right for you.
Transcript sponsored by repl.it
Corrections to this transcript are much appreciated!
SK: Hello, and welcome to the Future of Coding. This is Steve Krouse. Today, we have a guest on the podcast that, if you've been listening carefully to the other interviews, has actually been mentioned at least two, maybe more, times by other guests. Hillel Wayne is best known for his work trying to explain and promote TLA+ to a broader audience of more practical engineers, people who might not think that what we call, "formal methods" would apply to, you know, building products, building web applications, building technologies for the startup they work for. Hello, and welcome to the Future of Coding. This is Steve Krouse. Today, we have a guest on the podcast that, if you've been listening carefully to the other interviews, has actually been mentioned at least two, maybe more, times by other guests. Hillel Wayne is best known for his work trying to explain and promote TLA+ to a broader audience of more practical engineers, people who might not think that what we call, "formal methods" would apply to, you know, building products, building web applications, building technologies for the startup they work for.
SK: If you aren't familiar with the term, "formal methods," I think this is a really great podcast to get your foot in the door. We start by contextualizing what formal methods are. We break up the field into four quadrants, and we go kind of quadrant by quadrant, and think about what each of the different techniques is used for, and the practicality of it. Well, I think I might be overselling how ordered this conversation is. Hillel will explain something, and I'll think I understand it, and then maybe 10 minutes later, I'll be like, "Wait a second. How is that different from that other thing we were talking about?" Then he kind of has to backtrack and clarify for me. But I think you'll be able to follow. And I think you'll get a greater sense for this small but active community of research that has a lot to offer to the future of what software engineering could look like. If you aren't familiar with the term, "formal methods," I think this is a really great podcast to get your foot in the door. We start by contextualizing what formal methods are. We break up the field into four quadrants, and we go kind of quadrant by quadrant, and think about what each of the different techniques is used for, and the practicality of it. Well, I think I might be overselling how ordered this conversation is. Hillel will explain something, and I'll think I understand it, and then maybe 10 minutes later, I'll be like, "Wait a second. How is that different from that other thing we were talking about?" Then he kind of has to backtrack and clarify for me. But I think you'll be able to follow. And I think you'll get a greater sense for this small but active community of research that has a lot to offer to the future of what software engineering could look like.
SK: Before I bring you Hillel, a quick message from our sponsor, Repl.it. Before I bring you Hillel, a quick message from our sponsor, Repl.it.
SK: Repl.it is an online REPL for over 30 languages. It started out as a code playground, but now it scales up to a full development environment where you can do everything from deploying web servers to training ML models, all driven by the REPL. They're a small startup in San Francisco, but they reach millions of programmers, students, and teachers. They're looking for hackers interested in the future of coding and making software tools more accessible and enjoyable. So email jobs@repl.it if you're interested in learning more. Repl.it is an online REPL for over 30 languages. It started out as a code playground, but now it scales up to a full development environment where you can do everything from deploying web servers to training ML models, all driven by the REPL. They're a small startup in San Francisco, but they reach millions of programmers, students, and teachers. They're looking for hackers interested in the future of coding and making software tools more accessible and enjoyable. So email jobs@repl.it if you're interested in learning more.
SK: Without any further ado, I bring you Hillel Wayne. Welcome, Hillel. Without any further ado, I bring you Hillel Wayne. Welcome, Hillel.
HW: Thanks for having me on. Thanks for having me on.
SK: Yeah. It's really great to have you. I'm excited for this conversation. Yeah. It's really great to have you. I'm excited for this conversation.
HW: Mm-hmm (affirmative). Mm-hmm (affirmative).
SK: I think I originally heard of you as the TLA+ guy. Potentially, I think I may have heard of you for the first time via another interview or two on this podcast. I think we have a few mutual friends in common. I think I originally heard of you as the TLA+ guy. Potentially, I think I may have heard of you for the first time via another interview or two on this podcast. I think we have a few mutual friends in common.
HW: Yeah. I think it was a couple people. I think it was Kevin and I think James Koppel, both ... I think they were both interviewed by you, and they're sort of, we're sort of in the same circles, so I imagine it's one of those too. Yeah. I think it was a couple people. I think it was Kevin and I think James Koppel, both ... I think they were both interviewed by you, and they're sort of, we're sort of in the same circles, so I imagine it's one of those too.
SK: Yeah, and I think it may have actually been both of them saying- Yeah, and I think it may have actually been both of them saying-
HW: Oh, hey. Oh, hey.
SK: ... "You really have to talk to-" ... "You really have to talk to-"
HW: I'm popular. I'm popular.
SK: Yeah, I think you are. I think you are. At least with the people I talk to. You have the illusion of popularity, given who I talk to. So, given that I know you as the TLA+ guy, I'd be curious to hear about your origin stories as this TLA+ superhero. Were you originally bitten by a radioactive Leslie Lamport, or did it happen some other way? Yeah, I think you are. I think you are. At least with the people I talk to. You have the illusion of popularity, given who I talk to. So, given that I know you as the TLA+ guy, I'd be curious to hear about your origin stories as this TLA+ superhero. Were you originally bitten by a radioactive Leslie Lamport, or did it happen some other way?
HW: God, you sort of put me on the spot there, because now I've got to think of like a really clever comeback to that, but I can't. So actually, it wasn't really anything that interesting. I was doing some work at a web development company, and ran into a really complicated distributed systems problem with their product. And what happened is I was looking for ways to make it a little bit more manageable. I stumbled on TLA+ and it worked out really well in my favor. And I'm like, "Hey, this is really great. Like, this is incredibly useful for my problem, and nobody really expected it to be that way. Why is there so little documentation?" So I figured I'd write some documentation for it, and then I wrote documentation. Then I figured I'd give a talk on it, and then I figured I'd write a book on it, and then it just kept going from there. God, you sort of put me on the spot there, because now I've got to think of like a really clever comeback to that, but I can't. So actually, it wasn't really anything that interesting. I was doing some work at a web development company, and ran into a really complicated distributed systems problem with their product. And what happened is I was looking for ways to make it a little bit more manageable. I stumbled on TLA+ and it worked out really well in my favor. And I'm like, "Hey, this is really great. Like, this is incredibly useful for my problem, and nobody really expected it to be that way. Why is there so little documentation?" So I figured I'd write some documentation for it, and then I wrote documentation. Then I figured I'd give a talk on it, and then I figured I'd write a book on it, and then it just kept going from there.
SK: Yeah, okay, so you have, I think the first thing I saw was Yeah, okay, so you have, I think the first thing I saw was learntla.com . Was that the documentation you were talking about?
HW: Yeah. It was supposed to be a tutorial, because there weren't any easy tutorials online that I could find. And then it just kept going from there, but that was the first thing. That was like early 2017. Yeah. It was supposed to be a tutorial, because there weren't any easy tutorials online that I could find. And then it just kept going from there, but that was the first thing. That was like early 2017.
SK: Yeah, and then I saw some talks. Yeah, and then I saw some talks.
HW: Yeah. Yeah.
SK: And then you also have a workshop too? And then you also have a workshop too?
HW: Yeah. I also published a book on it, actually just a few months back, Practical TLA+, with Apress. Yeah. I also published a book on it, actually just a few months back, Practical TLA+, with Apress.
SK: Cool, and then I saw that, consulting, that's TLA+ specific? You do trainings? Is that- Cool, and then I saw that, consulting, that's TLA+ specific? You do trainings? Is that-
HW: Well, it's a lot of TLA+ but I also do a few other things. I do Alloy, I've done some consulting on Minizinc constraint optimization. Just essentially whatever I feel comfortable with in the formal method space that I feel like I can really teach well. It's a lot of those stuff too. Well, it's a lot of TLA+ but I also do a few other things. I do Alloy, I've done some consulting on Minizinc constraint optimization. Just essentially whatever I feel comfortable with in the formal method space that I feel like I can really teach well. It's a lot of those stuff too.
SK: Yeah. I just find it fascinating that you came across formal methods in your start-up work, and it seems like you just, "Well, now I just want to do this and only this for my life, for my career." Is that kind of like how it happened? You fell in love with this topic? Yeah. I just find it fascinating that you came across formal methods in your start-up work, and it seems like you just, "Well, now I just want to do this and only this for my life, for my career." Is that kind of like how it happened? You fell in love with this topic?
HW: Well, sort of. Because, I mean, it's definitely a really interesting topic. I obviously relate to it. But I think what I really enjoy, sort of technical writing and technical communication. If you see a lot of the writings I do, a lot of it is on formal methods because that's what I think I'm best at. Some of it's on accent analysis, lightweight specification, and the history of programming. I just really like communicating and teaching ideas. And I think formal methods at this stage has the highest sort of strength to obscurity ratio, where it's way more useful to a lot of people than know about it. And that's sort of why I focus on teaching it, for that reason. Well, sort of. Because, I mean, it's definitely a really interesting topic. I obviously relate to it. But I think what I really enjoy, sort of technical writing and technical communication. If you see a lot of the writings I do, a lot of it is on formal methods because that's what I think I'm best at. Some of it's on accent analysis, lightweight specification, and the history of programming. I just really like communicating and teaching ideas. And I think formal methods at this stage has the highest sort of strength to obscurity ratio, where it's way more useful to a lot of people than know about it. And that's sort of why I focus on teaching it, for that reason.
SK: Got it. Got it. That makes a lot of sense. Yeah, I can tell from the way that you write that you enjoy it. Or at least it feels that way, that you enjoy writing. I enjoy your writing and I think it comes across. Got it. Got it. That makes a lot of sense. Yeah, I can tell from the way that you write that you enjoy it. Or at least it feels that way, that you enjoy writing. I enjoy your writing and I think it comes across.
HW: Nobody actually enjoys writing. It's more of a compulsive thing for most people, for most writers. Nobody actually enjoys writing. It's more of a compulsive thing for most people, for most writers.
SK: Yeah. I liked, in one of your essays you talked about how you asked your editor to be needlessly cruel and that he gets extra points if he makes you cry. Yeah. I liked, in one of your essays you talked about how you asked your editor to be needlessly cruel and that he gets extra points if he makes you cry.
HW: Yeah. He didn't. I win. Yeah. He didn't. I win.
SK: Did he make you cry? Did he make you cry?
HW: No. He didn't. I won. No. He didn't. I won.
SK: You won. Yeah, I feel empathy for you, because, maybe we'll talk about it later, but I think you'd have interesting things to say about this, but I spent a lot of time writing an essay this past week, and I got some terrible reviews that almost but didn't quite bring me to tears. So it is hard getting cruel feedback. Or not cruel, but just harsh feedback. You won. Yeah, I feel empathy for you, because, maybe we'll talk about it later, but I think you'd have interesting things to say about this, but I spent a lot of time writing an essay this past week, and I got some terrible reviews that almost but didn't quite bring me to tears. So it is hard getting cruel feedback. Or not cruel, but just harsh feedback.
HW: Yeah. Yeah.
SK: Okay. So let's get into the formal method stuff. I thought it would be useful to start by situating ourselves and defining terms. I think your recent essay, "Why People Don't Use Formal Methods", that was on the front page of Hacker News, I think you did a really wonderful job. Okay. So let's get into the formal method stuff. I thought it would be useful to start by situating ourselves and defining terms. I think your recent essay, "Why People Don't Use Formal Methods", that was on the front page of Hacker News, I think you did a really wonderful job.
HW: Thank you. Thank you.
SK: Yeah. There are a lot of separate topics, and they all, I think the words that correspond to those topics are pretty good, and I'm glad that there are separate words for all these things. Could you roll off the top of your head? Or I wrote some of them down if you want me to kind of tee them up for you... Yeah. There are a lot of separate topics, and they all, I think the words that correspond to those topics are pretty good, and I'm glad that there are separate words for all these things. Could you roll off the top of your head? Or I wrote some of them down if you want me to kind of tee them up for you...
HW: Sure, I can talk a little bit more about this. So one thing to keep in mind is that any sort of field in programming, formal methods is a big field. Saying, "I do formal methods", is kind of like saying, "I do web." It kind of gives somebody an impression, but there's a lot of nuance there. But also given that is that, a lot of fields in programming are sort of very big. For example, with web, there's probably more people who do web development than live in New York, the State. But formal methods is extremely small, and it's also very fractured because people, everybody who sort of is in it often knows one or two things but doesn't really know the whole space of it. And the consequence of that is that there's a lot of ideas in there and some of the ideas overlap, but the people who overlapped with their ideas don't necessarily share the same terms. Sure, I can talk a little bit more about this. So one thing to keep in mind is that any sort of field in programming, formal methods is a big field. Saying, "I do formal methods", is kind of like saying, "I do web." It kind of gives somebody an impression, but there's a lot of nuance there. But also given that is that, a lot of fields in programming are sort of very big. For example, with web, there's probably more people who do web development than live in New York, the State. But formal methods is extremely small, and it's also very fractured because people, everybody who sort of is in it often knows one or two things but doesn't really know the whole space of it. And the consequence of that is that there's a lot of ideas in there and some of the ideas overlap, but the people who overlapped with their ideas don't necessarily share the same terms.
HW: So I ended up inventing a lot of new terms for that essay, not necessarily because I think these are better terms, but just because since, again, not everybody sort of shares the same terminology. It was easier for me to talk to a public audience about it by just inventing terms of being clear, that they were terms that I just invented on the spot to talk about differences. So I ended up inventing a lot of new terms for that essay, not necessarily because I think these are better terms, but just because since, again, not everybody sort of shares the same terminology. It was easier for me to talk to a public audience about it by just inventing terms of being clear, that they were terms that I just invented on the spot to talk about differences.
SK: Oh. Okay. Yeah, that's a good clarification. Oh. Okay. Yeah, that's a good clarification.
HW: Yeah. So yeah, I divided into two categories. Again, these are very, very fuzzy categories. There's a lot of overlap and there's things that don't belong to either category, things that belong to both categories of thinking about code and thinking about designs. And then we divide each of those into two separate categories of how do we specify and how do we verify. Specifying being how do we describe what we want to be the case. And verification being how we show that what we want to be the case is the case. And that's pretty much all formal methods is specification and verification to one or two degrees. Yeah. So yeah, I divided into two categories. Again, these are very, very fuzzy categories. There's a lot of overlap and there's things that don't belong to either category, things that belong to both categories of thinking about code and thinking about designs. And then we divide each of those into two separate categories of how do we specify and how do we verify. Specifying being how do we describe what we want to be the case. And verification being how we show that what we want to be the case is the case. And that's pretty much all formal methods is specification and verification to one or two degrees.
SK: Got it. Okay. So just to recap, so is it like we imagine is four quadrants specifying, verifying on one axis and code and design on the other? Got it. Okay. So just to recap, so is it like we imagine is four quadrants specifying, verifying on one axis and code and design on the other?
HW: Yeah. Yeah.
SK: So there are four? Yeah. So there are four? Yeah.
HW: Again, yeah, very, very, very, very, broad, probably wrong, but wrong in a very useful way. Again, yeah, very, very, very, very, broad, probably wrong, but wrong in a very useful way.
SK: Okay. So yeah, do you want to talk about each of the four quadrants a bit? Or what's the next important distinctions to make? Okay. So yeah, do you want to talk about each of the four quadrants a bit? Or what's the next important distinctions to make?
HW: Yeah, so actually, I should probably just mention this right now is that, because I realized I didn't actually define the term. Formal methods is sort of the study of how we can show that things are correct in ways that are sort of irrefutable. So for example, you might be familiar with say testing, right? Yeah, so actually, I should probably just mention this right now is that, because I realized I didn't actually define the term. Formal methods is sort of the study of how we can show that things are correct in ways that are sort of irrefutable. So for example, you might be familiar with say testing, right?
SK: Yeah. Yeah.
HW: So testing works, but it only shows very limited amounts of sort of verification. If you prove your thing works through inputs one through a hundred, maybe it fails for input 101. So formal verification is a way of sort of saying, "Okay, we're going to test every possible thing, and we're going to show that no matter what you put in, it will always give what we expect." So testing works, but it only shows very limited amounts of sort of verification. If you prove your thing works through inputs one through a hundred, maybe it fails for input 101. So formal verification is a way of sort of saying, "Okay, we're going to test every possible thing, and we're going to show that no matter what you put in, it will always give what we expect."
SK: Well, so I think you use a few terms there that are interesting. You use, in particular, irrefutable. Well, so I think you use a few terms there that are interesting. You use, in particular, irrefutable.
HW: Yeah. Yeah.
SK: I think is an interesting word. I think is an interesting word.
HW: Which is also incredibly misleading. Which is also incredibly misleading.
SK: Okay. Okay.
HW: Yeah. Yeah.
SK: Okay, well, I'll let you go give the high level and then we'll drill down into the specifics in a sec. Okay, well, I'll let you go give the high level and then we'll drill down into the specifics in a sec.
HW: Yeah. So, drill down into irrefutable or give the high level of the rest of the space first? Which would you prefer? Yeah. So, drill down into irrefutable or give the high level of the rest of the space first? Which would you prefer?
SK: Yeah, yeah, sorry. Let's give the high level and then we'll drill down into some of the specifics later. Yeah, yeah, sorry. Let's give the high level and then we'll drill down into some of the specifics later.
HW: Okay, so, in those four quadrant-ish things, and again, this sort of a formal methods thing of just always qualifying all my statements. Qualifying, again, this is more of just like a very rough model than anything else. So for code specification, you have a few different things. You have external theorem, which is essentially writing your code and writing in a separate file, essentially, here are the properties of this code. That's very similar to what we call testing, but more rigorous. We have really strong type systems, like dependent types or refinement types. Again, some were static types, but harder to check but more comprehensive. And then we have this thing called logics and conditions, originally called Hoare Logic, but now there's a bunch of different branches, where you essentially say in a function given these inputs, this probably should be true of the outputs. And this corresponds to something called contracts in programming, which is a very powerful verification technique. But of the three ways that we verify code informally, it's the most obscure by far. Essentially, the easiest way to describe it is assertions. Okay, so, in those four quadrant-ish things, and again, this sort of a formal methods thing of just always qualifying all my statements. Qualifying, again, this is more of just like a very rough model than anything else. So for code specification, you have a few different things. You have external theorem, which is essentially writing your code and writing in a separate file, essentially, here are the properties of this code. That's very similar to what we call testing, but more rigorous. We have really strong type systems, like dependent types or refinement types. Again, some were static types, but harder to check but more comprehensive. And then we have this thing called logics and conditions, originally called Hoare Logic, but now there's a bunch of different branches, where you essentially say in a function given these inputs, this probably should be true of the outputs. And this corresponds to something called contracts in programming, which is a very powerful verification technique. But of the three ways that we verify code informally, it's the most obscure by far. Essentially, the easiest way to describe it is assertions.
SK: Yep. Yep. Okay. And so just to, this question probably should have been asked earlier, but you just in the last description informally versus formally. Yep. Yep. Okay. And so just to, this question probably should have been asked earlier, but you just in the last description informally versus formally.
HW: Yeah. Yeah.
SK: The way you're using that term, informally means kind of like eyeballing it and formally means a computer is checking something? The way you're using that term, informally means kind of like eyeballing it and formally means a computer is checking something?
HW: Informally, here what I'm using informally to mean it can be automated. In fact, it usually should be automated, but it's automated in a way that doesn't give you complete confidence. Essentially, informal verification is still automated verification, it's just done in a way that's one, much easier and two, not as comprehensive as formal verification. Informally, here what I'm using informally to mean it can be automated. In fact, it usually should be automated, but it's automated in a way that doesn't give you complete confidence. Essentially, informal verification is still automated verification, it's just done in a way that's one, much easier and two, not as comprehensive as formal verification.
SK: Okay, so I guess it's a spectrum-y thing? Okay, so I guess it's a spectrum-y thing?
HW: Yes, it's a spectrum-y thing. Yes, it's a spectrum-y thing.
SK: Okay, so formal is at 100 or it's just past 50%? Okay, so formal is at 100 or it's just past 50%?
HW: It's basically 100%. In fact, that's one of the things that people miss, is that for the most part, formal verification is, while the most powerful sort of way of sort of verifying that stuff is correct, probably not the most productive in most cases. Because to get to 100%, you have to go much, much, much harder than it takes to go to 99%. It's basically 100%. In fact, that's one of the things that people miss, is that for the most part, formal verification is, while the most powerful sort of way of sort of verifying that stuff is correct, probably not the most productive in most cases. Because to get to 100%, you have to go much, much, much harder than it takes to go to 99%.
SK: But 99% is informal. But 99% is informal.
HW: Yes, ish. I mean, that's why we have to sort of put these things on a spectrum because what does it mean to be 99% Correct versus 98% correct, right? Yes, ish. I mean, that's why we have to sort of put these things on a spectrum because what does it mean to be 99% Correct versus 98% correct, right?
SK: Yes. Well, I guess I'm just trying to figure out what the whole field is because, you know, when you talk about formal methods versus informal, I don't know. Maybe this was a bad digression. I'll let you get back to the high level. Yes. Well, I guess I'm just trying to figure out what the whole field is because, you know, when you talk about formal methods versus informal, I don't know. Maybe this was a bad digression. I'll let you get back to the high level.
HW: I know. We should probably drill into that digression at some point. So in any case, now the thing is that like all these ways that we can spec, we could test both formally and informally. For example, if I write sort of this is the specification of my function, I could test it using full verification or I could write a million auto manual tests or put it through a really intense code review. But if I want to sort of formally verify it, what I could do is I could write, for example, what's called a proof. Which is essentially a mathematical statement sort of showing from our basic premises how we can conclude that this is going to be correct in a way that a machine can check. Often these days, that's considered really, really hard. So when we can we usually shell out to a solver. For example, a SAT solver or what's called an SMT solver to automate some steps for us. That's pretty much the main way that we verify code is correct formally. I know. We should probably drill into that digression at some point. So in any case, now the thing is that like all these ways that we can spec, we could test both formally and informally. For example, if I write sort of this is the specification of my function, I could test it using full verification or I could write a million auto manual tests or put it through a really intense code review. But if I want to sort of formally verify it, what I could do is I could write, for example, what's called a proof. Which is essentially a mathematical statement sort of showing from our basic premises how we can conclude that this is going to be correct in a way that a machine can check. Often these days, that's considered really, really hard. So when we can we usually shell out to a solver. For example, a SAT solver or what's called an SMT solver to automate some steps for us. That's pretty much the main way that we verify code is correct formally.
HW: And it works but it's also really intensive, labor intensive. I think the fastest anybody's ever done it was four lines a day using cutting edge, all the resources of Microsoft combined. And that's one of the reasons why, for the foreseeable future, code verification is probably going to remain in the realm of experts. Code specification is really powerful and I think could be more widely used. But code verification at least formally isn't really on the horizon for mainstream use. And it works but it's also really intensive, labor intensive. I think the fastest anybody's ever done it was four lines a day using cutting edge, all the resources of Microsoft combined. And that's one of the reasons why, for the foreseeable future, code verification is probably going to remain in the realm of experts. Code specification is really powerful and I think could be more widely used. But code verification at least formally isn't really on the horizon for mainstream use.
SK: Got it. Okay. So, okay, so just to recap because I feel like that got a little bit messy there. Got it. Okay. So, okay, so just to recap because I feel like that got a little bit messy there.
HW: Yeah. No. It's messy topic. Yeah. No. It's messy topic.
SK: Yeah. Yeah. And I interrupted with sorts of things. Yeah. Yeah. And I interrupted with sorts of things.
HW: No worries. No worries.
SK: I thought, maybe let's just start over in a sense of- I thought, maybe let's just start over in a sense of-
HW: With an example? With an example?
SK: Well, I was thinking maybe, just a picture in my head to, even just for me, the field is called formal methods. Well, I was thinking maybe, just a picture in my head to, even just for me, the field is called formal methods.
HW: Yes. Yes.
SK: And in that field has four subcategories: code verification, design verification, code specifications, design specification. Is that correct? And in that field has four subcategories: code verification, design verification, code specifications, design specification. Is that correct?
HW: Four ways of thinking about it. Usually people do either code or design. So they do both code verification specification or design verification specification. I mostly make that division to make it a big clear, what we're talking about, we talk about sort of like proven correct for specifying correct whatnot. Four ways of thinking about it. Usually people do either code or design. So they do both code verification specification or design verification specification. I mostly make that division to make it a big clear, what we're talking about, we talk about sort of like proven correct for specifying correct whatnot.
SK: So what you're saying usually any given person would only deals with code or design? So what you're saying usually any given person would only deals with code or design?
HW: Usually, and I'm waving my hands very dramatically here when I say usually. Usually, and I'm waving my hands very dramatically here when I say usually.
SK: Okay. So does that hold for you too? Okay. So does that hold for you too?
HW: I'm mostly design verification and specification. I mostly do design work. I'm mostly design verification and specification. I mostly do design work.
SK: Design and specification like the same thing? Design and specification like the same thing?
HW: So when I say sort of I do design, most people when they say that they do formal spec, okay, this is weird. Usually if a person says that they primarily work with specification language, they mostly do formal specification, they usually mean that they do design specification and design verification. So when I say sort of I do design, most people when they say that they do formal spec, okay, this is weird. Usually if a person says that they primarily work with specification language, they mostly do formal specification, they usually mean that they do design specification and design verification.
SK: Yep, okay. Yep, okay.
HW: Which you'd not be surprised because I said formal specification why are they doing verification. But you know, again, fuzzy terms, small field, fractured field, lots of different pieces to it. Which you'd not be surprised because I said formal specification why are they doing verification. But you know, again, fuzzy terms, small field, fractured field, lots of different pieces to it.
SK: Okay. One question that I have here my notes, I wrote down was what's the difference between verification and validation? Okay. One question that I have here my notes, I wrote down was what's the difference between verification and validation?
HW: So verification is basically taking a description of how the code should be and proving the code matches that. So for example, let's say I say that this code should always sort a list in descending order, the specification would be that say every two indices if one indice is longer than the other one, it's going to be higher than that one. And then verification is basically showing how that's going to always be true, right? Validation is when you say "Wait, do we actually need this sorting function, maybe we actually need a maximum function. Maybe we are doing the wrong thing entirely." It's sort of at the level of what are the human requirements we need and how do we show we match the human requirements of the total system. So yeah. And that's usually outside the scope of formal methods because that deals a lot more with sort of social systems and understanding customer requirements. So verification is basically taking a description of how the code should be and proving the code matches that. So for example, let's say I say that this code should always sort a list in descending order, the specification would be that say every two indices if one indice is longer than the other one, it's going to be higher than that one. And then verification is basically showing how that's going to always be true, right? Validation is when you say "Wait, do we actually need this sorting function, maybe we actually need a maximum function. Maybe we are doing the wrong thing entirely." It's sort of at the level of what are the human requirements we need and how do we show we match the human requirements of the total system. So yeah. And that's usually outside the scope of formal methods because that deals a lot more with sort of social systems and understanding customer requirements.
SK: Okay. So it sounds like you have on one level, you have reality and you're trying to match your specification to reality. And then below that you have a code and trying to match the code to a specification. Okay. So it sounds like you have on one level, you have reality and you're trying to match your specification to reality. And then below that you have a code and trying to match the code to a specification.
HW: Yeah. That's, I think, a really good way of putting it. And then the formal would be validation. The second one would be verification. Yeah. That's, I think, a really good way of putting it. And then the formal would be validation. The second one would be verification.
SK: Okay, got it. Yeah. So we're trying to validate our business specification with the market and then we're trying to verify that our code meets the business specification? Okay, got it. Yeah. So we're trying to validate our business specification with the market and then we're trying to verify that our code meets the business specification?
HW: Exactly. Exactly.
SK: Got it. And that involves both code verification and design verification because in order to validate that the specification meets a business needs, we then will do the design verification stuff. And then once the design is verified, then we'll write the code and then try and verify that the code meets the specifications. Got it. And that involves both code verification and design verification because in order to validate that the specification meets a business needs, we then will do the design verification stuff. And then once the design is verified, then we'll write the code and then try and verify that the code meets the specifications.
HW: Yeah. In an ideal world with an infinite amount of resources, yes, that's how it would look. Yeah. In an ideal world with an infinite amount of resources, yes, that's how it would look.
SK: Got it. Okay. And so today, and what you were alluding to, is that, you know, at fastest you can do four lines of code, potentially, in 100 years will have some improvements in theoretical understanding of this stuff, or just machines will be a lot faster and potentially we'll be able to do all this stuff for every line of code and it'll be just as fast as we write code today? Got it. Okay. And so today, and what you were alluding to, is that, you know, at fastest you can do four lines of code, potentially, in 100 years will have some improvements in theoretical understanding of this stuff, or just machines will be a lot faster and potentially we'll be able to do all this stuff for every line of code and it'll be just as fast as we write code today?
HW: I don't know. I'm hesitant to sort of make predictions about 10 years from now. Because again, remember, 50 years ago we first started doing formal verification. We were like, "Oh, yeah, in 10 years, we're going to have everything verified." As it was like, "No, that's crazy. In like 20 years we'll have everything verified." And now it's been 50 years and nothing's verified. So I mean, it's really hard. I mean, look, proofs are hard, validation's hard. We often don't really know how to represent specs, these are all really difficult topics. It's hard to sort of make predictions of how things will go out. I think that there's definitely going to be expansive design of verification. But just because I think that right now we've seen it be really successful. But code verification, I think, for the foreseeable future, will remain sort of a niche topic that's done in special cases by experts. And I don't know if or when it will ever be a thing that everybody's doing. I don't know. I'm hesitant to sort of make predictions about 10 years from now. Because again, remember, 50 years ago we first started doing formal verification. We were like, "Oh, yeah, in 10 years, we're going to have everything verified." As it was like, "No, that's crazy. In like 20 years we'll have everything verified." And now it's been 50 years and nothing's verified. So I mean, it's really hard. I mean, look, proofs are hard, validation's hard. We often don't really know how to represent specs, these are all really difficult topics. It's hard to sort of make predictions of how things will go out. I think that there's definitely going to be expansive design of verification. But just because I think that right now we've seen it be really successful. But code verification, I think, for the foreseeable future, will remain sort of a niche topic that's done in special cases by experts. And I don't know if or when it will ever be a thing that everybody's doing.
SK: Okay. Interesting. Okay. Interesting.
HW: Yeah. Yeah.
SK: I guess to drill down a bit, you talked about irrefutable proofs, things that are checked by the computer. I guess to drill down a bit, you talked about irrefutable proofs, things that are checked by the computer.
HW: Yeah. Yeah.
SK: One of the things I found in your writing that relates to this is you were talking about how 20% of published mathematical proofs aren't actually correct. There is an error that the person who wrote it missed and the reviewers missed? One of the things I found in your writing that relates to this is you were talking about how 20% of published mathematical proofs aren't actually correct. There is an error that the person who wrote it missed and the reviewers missed?
HW: At least according to that one reference I found. It could be that reference is wrong or could be that reference to understating things. At least according to that one reference I found. It could be that reference is wrong or could be that reference to understating things.
SK: Yes. Well, yeah, I agree. You know, for you to question in the spirit of, you know, questioning everything, you have to even question the thing that refutes things. Yes. Well, yeah, I agree. You know, for you to question in the spirit of, you know, questioning everything, you have to even question the thing that refutes things.
HW: Yeah. So when I say the proof is irrefutable, I mean, assuming the following is true: assuming that the prover is correct, assuming that sort of any auxiliary tools that are using with the prover is correct, and finally, assuming that you have all the requirements. At which point we show it's irrefutable for the specific context you're talking about. So a common thing gets sort of said, "You can never actually prove a thing will always work because for all you know you're going to start the equation, somebody's going to hit the server with a baseball bat." Yeah. So when I say the proof is irrefutable, I mean, assuming the following is true: assuming that the prover is correct, assuming that sort of any auxiliary tools that are using with the prover is correct, and finally, assuming that you have all the requirements. At which point we show it's irrefutable for the specific context you're talking about. So a common thing gets sort of said, "You can never actually prove a thing will always work because for all you know you're going to start the equation, somebody's going to hit the server with a baseball bat."
SK: Yes, of course. And so, I guess that's, I think the word irrefutable is interesting because you could say the same thing about mathematics. A proof is irrefutable if the people who reviewed it for the journal didn't make any mistakes. Yes, of course. And so, I guess that's, I think the word irrefutable is interesting because you could say the same thing about mathematics. A proof is irrefutable if the people who reviewed it for the journal didn't make any mistakes.
HW: Yeah. Yeah.
SK: If you assume that to be true. Because that's essentially what you're doing when you're assuming that the code verifier has no bugs. If you assume that to be true. Because that's essentially what you're doing when you're assuming that the code verifier has no bugs.
HW: Yeah. Yeah, so I think, I believe that some of them for example, I believe the core for Coq, and don't quote me on this, but the core for the Coq prover has been sort of proven by hand to be correct. So that we know that the core is essentially irrefutable. But all the auxiliary tooling is sort of hodgepodge together as academic projects. So that's less trustworthy. Yeah. Yeah, so I think, I believe that some of them for example, I believe the core for Coq, and don't quote me on this, but the core for the Coq prover has been sort of proven by hand to be correct. So that we know that the core is essentially irrefutable. But all the auxiliary tooling is sort of hodgepodge together as academic projects. So that's less trustworthy.
SK: Well, so I'm struggling. Why is Coq irrefutably correct? Because it was done by hand? Well, so I'm struggling. Why is Coq irrefutably correct? Because it was done by hand?
HW: So here's the thing, that's what I've heard and this is like what I've heard from people who worked on it, I cannot say exactly how that's the case and I cannot, if you basically put a gun to my head said, "Is this true?" I'll say, "Maybe." I don't know enough about the topic. Yeah, again, I do have to clarify here that one of the things that has been affected by me talking a lot about formal methods and working with it is that I don't really, I'm not really comfortable saying things I don't know are absolutely the case. So given that I've not worked direct with Coq and I haven't looked at the papers, I don't know enough about how they verified it to tell you how it's been verified. So here's the thing, that's what I've heard and this is like what I've heard from people who worked on it, I cannot say exactly how that's the case and I cannot, if you basically put a gun to my head said, "Is this true?" I'll say, "Maybe." I don't know enough about the topic. Yeah, again, I do have to clarify here that one of the things that has been affected by me talking a lot about formal methods and working with it is that I don't really, I'm not really comfortable saying things I don't know are absolutely the case. So given that I've not worked direct with Coq and I haven't looked at the papers, I don't know enough about how they verified it to tell you how it's been verified.
SK: I see. I see. So I guess what I'm driving towards is that the main difference between formal methods, like computer methods, and mathematical proofs is whether a human or computer is doing the checking? I see. I see. So I guess what I'm driving towards is that the main difference between formal methods, like computer methods, and mathematical proofs is whether a human or computer is doing the checking?
HW: Mathematical proofs tend to be less rigorous than formal methods. Mathematical proofs tend to be less rigorous than formal methods.
SK: Yeah, why is that? Yeah, why is that?
HW: Because most mathematical proofs aren't automated. So the thing is, is that if we have sort of a computer checking the things, assuming that we built this all correctly, assuming, assuming, assuming, we can essentially say whether every step is a correct or incorrect type inference, given that we had to break it down for level compute. But with mathematics often, the purpose of mathematical proof is to convince people not to 100% prove something's the case. So there will be things like this one step, we can sort of show what this heuristic argued. And everybody looks at it and goes like, "Yeah, that makes sense." They can sort of skip that one step of it, of the mathematical proof. And that's often done because, you know, you don't want to sort of sit down and sort of say, "Okay, in this context, we can prove that we can associative addition, and this kind of is we're going to prove that we can use induction and that induction is actually a reasonable theorem to have in the first place." Whereas the computer will have to do all that stuff. So it reduces the chance that you will accidentally assume something is possible or easy when it turns out that in this one very particular instance, you can't do it. Because most mathematical proofs aren't automated. So the thing is, is that if we have sort of a computer checking the things, assuming that we built this all correctly, assuming, assuming, assuming, we can essentially say whether every step is a correct or incorrect type inference, given that we had to break it down for level compute. But with mathematics often, the purpose of mathematical proof is to convince people not to 100% prove something's the case. So there will be things like this one step, we can sort of show what this heuristic argued. And everybody looks at it and goes like, "Yeah, that makes sense." They can sort of skip that one step of it, of the mathematical proof. And that's often done because, you know, you don't want to sort of sit down and sort of say, "Okay, in this context, we can prove that we can associative addition, and this kind of is we're going to prove that we can use induction and that induction is actually a reasonable theorem to have in the first place." Whereas the computer will have to do all that stuff. So it reduces the chance that you will accidentally assume something is possible or easy when it turns out that in this one very particular instance, you can't do it.
SK: I see. That's quite a claim. I think I've heard it before, but I just want to repeat what you said, that mathematics is about convincing and explaining to other humans, it's not about making sure that you're not fooling yourself. Is that kind of what you're getting at? I see. That's quite a claim. I think I've heard it before, but I just want to repeat what you said, that mathematics is about convincing and explaining to other humans, it's not about making sure that you're not fooling yourself. Is that kind of what you're getting at?
HW: I mean, you're trying to convince other humans who are very, very invested in not fooling themselves. I mean, you're trying to convince other humans who are very, very invested in not fooling themselves.
SK: I see. I see.
HW: I think one good example of what I mean, this was something I read, I think it was my Terence Tao, one difference between sort of the recent proof of the ABC conjecture, the proof of Fermat's Last Theorem is that the first five pages of the proof Fermat's Last Theorem, people were getting interesting results from it. So even though it was a really, really, really huge proof, very early on in the proof people were saying, "Oh, this is interesting. This gives us some really cool new machinery to work with. This is already been useful to us." That convinces people that there's something apparently interesting here. Whereas with the ABC proof, that I think has recently been claimed to be invalid, you had to read the entire thousand page document to get any value out of it whatsoever. So that made people less convinced, mathematicians less convinced that it was all correct, that it was a useful document. Does that make sense? I think one good example of what I mean, this was something I read, I think it was my Terence Tao, one difference between sort of the recent proof of the ABC conjecture, the proof of Fermat's Last Theorem is that the first five pages of the proof Fermat's Last Theorem, people were getting interesting results from it. So even though it was a really, really, really huge proof, very early on in the proof people were saying, "Oh, this is interesting. This gives us some really cool new machinery to work with. This is already been useful to us." That convinces people that there's something apparently interesting here. Whereas with the ABC proof, that I think has recently been claimed to be invalid, you had to read the entire thousand page document to get any value out of it whatsoever. So that made people less convinced, mathematicians less convinced that it was all correct, that it was a useful document. Does that make sense?
SK: So I understand the story. I'm not exactly sure how it relates, what I supposed to get out of the story. So I understand the story. I'm not exactly sure how it relates, what I supposed to get out of the story.
HW: Yeah, basically just the idea that mathematics, any anything else we do is sort of also in addition to being a technical institution is also social institution, it's all about how mathematicians interact and how we all do things as a group. And similarly, formal methods is also social institution as well as a technical institution. One of the consequences of this is that with mathematics as the social institution, some amount of mathematics is in the social act of convincing and rhetoric, which is how it should be given that we're not machines. Whereas with formal verification, often the only thing that we care about is sort of make something pass the formal verification tooling, which means that it's almost entirely in that one context about making sure that every single thing is correct. Yeah, basically just the idea that mathematics, any anything else we do is sort of also in addition to being a technical institution is also social institution, it's all about how mathematicians interact and how we all do things as a group. And similarly, formal methods is also social institution as well as a technical institution. One of the consequences of this is that with mathematics as the social institution, some amount of mathematics is in the social act of convincing and rhetoric, which is how it should be given that we're not machines. Whereas with formal verification, often the only thing that we care about is sort of make something pass the formal verification tooling, which means that it's almost entirely in that one context about making sure that every single thing is correct.
SK: Got it. Okay. Well, I think this is a good point to transition to the difference between theorem provers, which I think most of what we've been talking about, and model checkers. Got it. Okay. Well, I think this is a good point to transition to the difference between theorem provers, which I think most of what we've been talking about, and model checkers.
HW: So essentially, there's two ways to sort of show something's correct. You can either sort of construct a rigorous argument showing it's correct or you can sort of show how it's impossible to be incorrect by brute force of the entire possibilities. So I guess, here's a simple example of what I'm talking about. Let's say you have sort of something that works over 32 bit floats, right, you have some function that takes two 32 bit floats and returns a float, right? So essentially, there's two ways to sort of show something's correct. You can either sort of construct a rigorous argument showing it's correct or you can sort of show how it's impossible to be incorrect by brute force of the entire possibilities. So I guess, here's a simple example of what I'm talking about. Let's say you have sort of something that works over 32 bit floats, right, you have some function that takes two 32 bit floats and returns a float, right?
SK: Sure. Sure.
HW: So there's only about two/three billion 32 bit floats, right? So you could literally just go by hand and check every single one of those combinations. And if you do that, you can actually just check and brute force and make sure that every single thing does what you expect it to. And that does sound like a bit of a burden, but proving stuffs kind of also a giant like cluster, so... That make sense? So there's only about two/three billion 32 bit floats, right? So you could literally just go by hand and check every single one of those combinations. And if you do that, you can actually just check and brute force and make sure that every single thing does what you expect it to. And that does sound like a bit of a burden, but proving stuffs kind of also a giant like cluster, so... That make sense?
SK: Yeah, that makes a lot of sense. Yeah, that makes a lot of sense.
HW: Yeah. Yeah.
SK: And then the last kind of thing I'll ask in this abstracting before we get concrete is, I think, a very common programmer question. You know, I don't even have to speak for other programmers, I could just speak very personally. When I hear about specification and verification, I really want these things to be tied to my code. I don't having to duplicate the effort of specifying and then writing code and then having to eyeball or verify. Basically, you know, I wonder if I could just write the specification and then the compiler writes the code for me, or the specification is the code. So I feel like you have terms for that...? And then the last kind of thing I'll ask in this abstracting before we get concrete is, I think, a very common programmer question. You know, I don't even have to speak for other programmers, I could just speak very personally. When I hear about specification and verification, I really want these things to be tied to my code. I don't having to duplicate the effort of specifying and then writing code and then having to eyeball or verify. Basically, you know, I wonder if I could just write the specification and then the compiler writes the code for me, or the specification is the code. So I feel like you have terms for that...?
HW: Yeah. So the term for sort of taking a specification and generating the code from that is called synthesis. This is not something that we can do mainstream, it's still a very niche academic topic, and one that a lot of people are obviously working really hard on. But it turns out that generating code is really hard. I can actually link some stuff, because Nadia Polikarpova is one of the big people doing a lot of the really cool work in this space. And she recently did a talk at Strange Loop about some of the work she did. And it's all really cool stuff. But she's also very clear this is not going to be mainstream in the next 10 years. Not gonna be getting close to mainstream the next 10 years. So yeah, it turns out that that's a lot harder to do than just sitting down and showing that code matches specification, which is itself a lot harder to do than showing that code almost, most likely, matches specification informally. So yeah, there's all these terms of difficulty. And I think one of the things that happens is that people get fixated on sort of the golden mean, the sort of end state, but to the point where they sort of ignore all the really big benefits that we can get in between. Yeah. So the term for sort of taking a specification and generating the code from that is called synthesis. This is not something that we can do mainstream, it's still a very niche academic topic, and one that a lot of people are obviously working really hard on. But it turns out that generating code is really hard. I can actually link some stuff, because Nadia Polikarpova is one of the big people doing a lot of the really cool work in this space. And she recently did a talk at Strange Loop about some of the work she did. And it's all really cool stuff. But she's also very clear this is not going to be mainstream in the next 10 years. Not gonna be getting close to mainstream the next 10 years. So yeah, it turns out that that's a lot harder to do than just sitting down and showing that code matches specification, which is itself a lot harder to do than showing that code almost, most likely, matches specification informally. So yeah, there's all these terms of difficulty. And I think one of the things that happens is that people get fixated on sort of the golden mean, the sort of end state, but to the point where they sort of ignore all the really big benefits that we can get in between.
SK: Okay, yeah. Yeah, I know what you mean. And so I think let's start talking about some of those benefits you can get even now, even in the not end perfect state, in the imperfect world we live in. You have been singing from the rooftops the virtues of using TLA+ for design verification. So let's hear more about that. Okay, yeah. Yeah, I know what you mean. And so I think let's start talking about some of those benefits you can get even now, even in the not end perfect state, in the imperfect world we live in. You have been singing from the rooftops the virtues of using TLA+ for design verification. So let's hear more about that.
HW: Yes. So one thing I do want to say first, really quickly, we do also get benefits with code verification. For example, a lot of type systems do some partial verification. Rust has a borrow checker and that basically let's you do a lot of verification automatically. So we are making a lot of steps to make certain aspects of verifying code more accessible and we've seen a lot of success for a lot those steps. So it's not just sort of working with designs where we see immediate benefits. Yes. So one thing I do want to say first, really quickly, we do also get benefits with code verification. For example, a lot of type systems do some partial verification. Rust has a borrow checker and that basically let's you do a lot of verification automatically. So we are making a lot of steps to make certain aspects of verifying code more accessible and we've seen a lot of success for a lot those steps. So it's not just sort of working with designs where we see immediate benefits.
SK: Got it. So you're saying that, both for designs and for code, even though we're not at the end stage, intermediate or 80/20 versions of these formal methods are useful, both in code and design? Got it. So you're saying that, both for designs and for code, even though we're not at the end stage, intermediate or 80/20 versions of these formal methods are useful, both in code and design?
HW: Yes. But I think what happens is that a lot of sort of the code verification stuff has basically been tied to a language, which is really good. But design verification has not been tied to language, so you don't have to use a particular language in your code base to get the benefits of design verification, which is one of the reasons I think it's so valuable. One of the reasons I think things like TLA+ and Alloy have a lot of really good uses even today. Yes. But I think what happens is that a lot of sort of the code verification stuff has basically been tied to a language, which is really good. But design verification has not been tied to language, so you don't have to use a particular language in your code base to get the benefits of design verification, which is one of the reasons I think it's so valuable. One of the reasons I think things like TLA+ and Alloy have a lot of really good uses even today.
SK: Oh, interesting. So if you're using Agda you can get those benefits. But if you're not, then you're kind of screwed. And that's the appeal of something like TLA+, you can use it with any language? Oh, interesting. So if you're using Agda you can get those benefits. But if you're not, then you're kind of screwed. And that's the appeal of something like TLA+, you can use it with any language?
HW: Yes? Part of the appeal anyway. Yes? Part of the appeal anyway.
SK: Part of the appeal. I see. Part of the appeal. I see.
HW: Yeah. Yeah.
SK: Yeah, that definitely makes a lot of sense. And I guess it's similar to test driven development, like unit tests can be done in any language. Yeah, that definitely makes a lot of sense. And I guess it's similar to test driven development, like unit tests can be done in any language.
HW: Exactly. Exactly.
SK: Yeah. Okay. Same idea. Or Agile, Agile can be done in any language. Yeah. Okay. Same idea. Or Agile, Agile can be done in any language.
HW: Yeah. And that ends up being really important for the development, socially, a lot of these ideas because if you can start getting the benefits without having to change your entire code base, you're more likely to do it than if you have to sort of rewrite everything from scratch to get some value out of it. Yeah. And that ends up being really important for the development, socially, a lot of these ideas because if you can start getting the benefits without having to change your entire code base, you're more likely to do it than if you have to sort of rewrite everything from scratch to get some value out of it.
SK: Yeah, of course. Okay, so let's finally dig into it. TLA+. So for those who aren't familiar, could you do your, you know, whatever, two minute spiel of what TLA+ is, the motivations behind it, how it came about? All that jazz. Yeah, of course. Okay, so let's finally dig into it. TLA+. So for those who aren't familiar, could you do your, you know, whatever, two minute spiel of what TLA+ is, the motivations behind it, how it came about? All that jazz.
HW: Okay. Sure. It's actually one of the interesting challenges for how do you explain this without demos? I found that the easiest way to describe it is to show people demos, but obviously we can't do that on a podcast. So okay, so obviously when we sort of are designing, basically, we're building systems that involve say, multiple actors or multiple programs or client servers. We have the code, right, that actually embeds all of these thing. But the code is simply how we do these implementations. It doesn't sort of show our high level understanding what should be going on what is going on. For example, imagine that you sort of even have something as simple as say, a web app that has both a front end and a back end and then service in a deployment system. You're sort of looking at a space that can't really be encoded in just a single code base. You're at the very least looking at multiple code bases all interacting with each other. Right? Okay. Sure. It's actually one of the interesting challenges for how do you explain this without demos? I found that the easiest way to describe it is to show people demos, but obviously we can't do that on a podcast. So okay, so obviously when we sort of are designing, basically, we're building systems that involve say, multiple actors or multiple programs or client servers. We have the code, right, that actually embeds all of these thing. But the code is simply how we do these implementations. It doesn't sort of show our high level understanding what should be going on what is going on. For example, imagine that you sort of even have something as simple as say, a web app that has both a front end and a back end and then service in a deployment system. You're sort of looking at a space that can't really be encoded in just a single code base. You're at the very least looking at multiple code bases all interacting with each other. Right?
SK: Yep. Yep.
HW: So none of this, of the code that you've written, really expresses or is aware of the full design of your system. And because of that, it can't really help you with verifying the design itself. So people sort of implicitly understand this. That's why people do things like whiteboarding or draw UML diagrams or sort of talk about doing acceptance driven development. And sort of this is additional understanding of, "Hey, there's this broader design that has its own challenges beyond just how we're each in the line of code is working or not working." But if we have this idea that we have a larger scale design that we care about, why not specify it and then why not test that specification for issues. And that's sort of a lot of the motivation behind TLA+, which is by Leslie Lamport, the same who did Latex and basically half of distributed computing. So none of this, of the code that you've written, really expresses or is aware of the full design of your system. And because of that, it can't really help you with verifying the design itself. So people sort of implicitly understand this. That's why people do things like whiteboarding or draw UML diagrams or sort of talk about doing acceptance driven development. And sort of this is additional understanding of, "Hey, there's this broader design that has its own challenges beyond just how we're each in the line of code is working or not working." But if we have this idea that we have a larger scale design that we care about, why not specify it and then why not test that specification for issues. And that's sort of a lot of the motivation behind TLA+, which is by Leslie Lamport, the same who did Latex and basically half of distributed computing.
SK: So it sounds like you can almost think about TLA+ as a direct replacement for documentation or whiteboarding or UML diagrams? So it sounds like you can almost think about TLA+ as a direct replacement for documentation or whiteboarding or UML diagrams?
HW: Augmentation not replacement. Still write your documents, please document stuff. Augmentation not replacement. Still write your documents, please document stuff.
SK: Okay. Because the specification isn't understandable, you can't just read a specification and understand the system. You still need documentation. Okay. Because the specification isn't understandable, you can't just read a specification and understand the system. You still need documentation.
HW: Oh, no, you can totally read, often people, you can read a specification and can give you a lot of insight. But I think it was David McKeever who was like, "Sure, caffeine can help you replace sleep, but caffeine isn't sleep." Things like tests and specifications can help you understated a system, but they're not documentation. Documentation exists at a human level, even higher than any specifications you can write. Still write your documentation, write your requirements analysis and then write your specifications. Oh, no, you can totally read, often people, you can read a specification and can give you a lot of insight. But I think it was David McKeever who was like, "Sure, caffeine can help you replace sleep, but caffeine isn't sleep." Things like tests and specifications can help you understated a system, but they're not documentation. Documentation exists at a human level, even higher than any specifications you can write. Still write your documentation, write your requirements analysis and then write your specifications.
SK: Yeah. Yeah.
HW: I'm not really selling using TLA+, am I? Basically just going like, "No, it's not that great. It's not a great everyone." I'm not really selling using TLA+, am I? Basically just going like, "No, it's not that great. It's not a great everyone."
SK: Well, I guess what I'm reacting to is it seems like we just keep layering things on, you know? Well, I guess what I'm reacting to is it seems like we just keep layering things on, you know?
HW: Yes. Yes.
SK: We have our code and then, okay, well actually, you have to write these tests for code. Oh, I have to do all this Agile stuff to write the code in the right way. And oh, actually, you also need these integration tests. And oh, actually, now you need to document your code. And then also, you have to write now this TLA+ specification for your code. So it would be nice if one of these things could replace some of the other ones so we can simplify some of these other things. It feels like we're just going to keep layering on things, and eventually will all be stuck writing four lines of code a day. We have our code and then, okay, well actually, you have to write these tests for code. Oh, I have to do all this Agile stuff to write the code in the right way. And oh, actually, you also need these integration tests. And oh, actually, now you need to document your code. And then also, you have to write now this TLA+ specification for your code. So it would be nice if one of these things could replace some of the other ones so we can simplify some of these other things. It feels like we're just going to keep layering on things, and eventually will all be stuck writing four lines of code a day.
HW: I mean, there's a reason we're paid a lot of money as engineers. This is hard stuff. I mean, this is really fundamentally hard stuff. And there's a reason we're paid a lot of money do software. Right? I mean, there's a reason we're paid a lot of money as engineers. This is hard stuff. I mean, this is really fundamentally hard stuff. And there's a reason we're paid a lot of money do software. Right?
SK: Well, I think that's an interesting claim. Are we paid a lot of money to do software because it's fundamentally hard or is it, you know, incidentally hard? Well, I think that's an interesting claim. Are we paid a lot of money to do software because it's fundamentally hard or is it, you know, incidentally hard?
HW: I guess both. Okay. So I guess what you're sort of asking is because just to clarify, it's like you're sort of asking it seems like we have to do all this extra stuff is it worth the effort? Because you're sort of talking about it from a productivity perspective, you're worried about it sort of slowing everything down, right? I guess both. Okay. So I guess what you're sort of asking is because just to clarify, it's like you're sort of asking it seems like we have to do all this extra stuff is it worth the effort? Because you're sort of talking about it from a productivity perspective, you're worried about it sort of slowing everything down, right?
SK: It's not is it all worth it, it's more that it feels like each thing we add on, unit test, integration tests, formal specification, documentation, feels a bit like an ad hoc solution to one part of the problem. And it's not like a unified solution to anything, does that make sense at all? It's not is it all worth it, it's more that it feels like each thing we add on, unit test, integration tests, formal specification, documentation, feels a bit like an ad hoc solution to one part of the problem. And it's not like a unified solution to anything, does that make sense at all?
HW: It does. It does.
SK: Yeah. Okay. Yeah. Okay.
HW: So my thoughts there is that a unified solution would be nice, that sort of solves everything for us. Historically and empirically, almost all the ones we've tried have not worked out. It turns out that coding, it turns out that complicated problems often do unfortunately require complicated solutions. So my thoughts there is that a unified solution would be nice, that sort of solves everything for us. Historically and empirically, almost all the ones we've tried have not worked out. It turns out that coding, it turns out that complicated problems often do unfortunately require complicated solutions.
SK: Yeah, well, actually, now just hearing myself talk and hearing what you just said, it reminds me of the no silver bullet essay. Yeah, well, actually, now just hearing myself talk and hearing what you just said, it reminds me of the no silver bullet essay.
HW: Yeah. Yeah.
SK: Which most people misunderstand. But the the central metaphor of that, that I remember, is medicine, how before germ theory we thought there'd be some magical cure, some simple magical cure to diseases. But then once we finally accepted germ theory, we realized that there would be no one big solution, it'd be a lot of tiny little solutions that'd be hard to find. Which most people misunderstand. But the the central metaphor of that, that I remember, is medicine, how before germ theory we thought there'd be some magical cure, some simple magical cure to diseases. But then once we finally accepted germ theory, we realized that there would be no one big solution, it'd be a lot of tiny little solutions that'd be hard to find.
HW: Yeah. Yeah.
SK: I guess that's kind of what you're saying with software. There's gonna be no unified one solution. It's going to be a bunch of little add on things that we'll have to keep adding on to software to make it better incrementally over time. I guess that's kind of what you're saying with software. There's gonna be no unified one solution. It's going to be a bunch of little add on things that we'll have to keep adding on to software to make it better incrementally over time.
HW: Yeah. Yeah.
SK: Just like we have to take a flu shot every year and we also take a tetanus shot and we also take a polio vaccine, there's no one magical shot that will do all of those vaccines. We have to take them all. Just like we have to take a flu shot every year and we also take a tetanus shot and we also take a polio vaccine, there's no one magical shot that will do all of those vaccines. We have to take them all.
HW: Yeah. And I think that that's true with almost any sort of human system. I think with almost every system you're gonna look at, whether it's sort of software engineering or medicine, and I'm assuming and I could be wrong, as we all know, we do not know other fields very well. With other kinds of engineering and also with [inaudible] such, it's just that there's really complicated problems that there's a million small solutions for and no one ever finds one magical thing that just fixes everything. Yeah. And I think that that's true with almost any sort of human system. I think with almost every system you're gonna look at, whether it's sort of software engineering or medicine, and I'm assuming and I could be wrong, as we all know, we do not know other fields very well. With other kinds of engineering and also with [inaudible] such, it's just that there's really complicated problems that there's a million small solutions for and no one ever finds one magical thing that just fixes everything.
SK: Yep. So I hear that for sure. And then I feel like on the other hand, there are times when you have the geocentric theory and you add epicycles and epicycles and epicycles, and all of a sudden you realize, "Oh, wait, if we just make it a heliocentric theory, we get rid of all those epicycles and everything's more elegant." And we've replaced these ad hoc things with a new elegant foundation. So that happens too sometimes. Yep. So I hear that for sure. And then I feel like on the other hand, there are times when you have the geocentric theory and you add epicycles and epicycles and epicycles, and all of a sudden you realize, "Oh, wait, if we just make it a heliocentric theory, we get rid of all those epicycles and everything's more elegant." And we've replaced these ad hoc things with a new elegant foundation. So that happens too sometimes.
HW: And then you have to start figuring out the perceptions of stuff, then you realize you have to add in general relativity and special relativity to sort of adjust for other things, which are verified but also incredibly complicated. And then you have to start figuring out the perceptions of stuff, then you realize you have to add in general relativity and special relativity to sort of adjust for other things, which are verified but also incredibly complicated.
SK: Yeah, yeah. Well, I guess that's kind of the beginning of infinity thing. And we'll never quite be able to explain everything. Yeah, yeah. Well, I guess that's kind of the beginning of infinity thing. And we'll never quite be able to explain everything.
HW: Yeah. Yeah.
SK: I guess, to go back to my original skepticism, it's really skepticism of ad hoc-ness. I guess, to go back to my original skepticism, it's really skepticism of ad hoc-ness.
HW: Can you clarify what you mean by ad hoc-ness? Can you clarify what you mean by ad hoc-ness?
SK: Yeah. Ad hoc-ness is a hard thing to define. But I guess what I'm getting at is if I asked you to list all of the practices you would recommend for an engineering team, like unit tests, maybe just list them for example. What would what would be all of the, so writing code, version control, you know, maybe just list some of the things you would recommend. Yeah. Ad hoc-ness is a hard thing to define. But I guess what I'm getting at is if I asked you to list all of the practices you would recommend for an engineering team, like unit tests, maybe just list them for example. What would what would be all of the, so writing code, version control, you know, maybe just list some of the things you would recommend.
HW: I guess some of the ones that I think would be recommended would be formal specification, I think obviously, I've got to sort of say that. Obviously writing code, you have to do writing code. Version control is important. Code review is extremely important. It's one of the few things that we are empirically sure, with multiple studies, is a great idea. I guess some of the ones that I think would be recommended would be formal specification, I think obviously, I've got to sort of say that. Obviously writing code, you have to do writing code. Version control is important. Code review is extremely important. It's one of the few things that we are empirically sure, with multiple studies, is a great idea.
SK: Code review, probably? Code review, probably?
HW: Yeah, sorry. Code review. Did I say something else? Yeah, sorry. Code review. Did I say something else?
SK: Oh, I thought maybe you said, I'm sorry. Nevermind. I'm sure that's what you said. Oh, I thought maybe you said, I'm sorry. Nevermind. I'm sure that's what you said.
HW: Yeah. Yeah.
SK: You're just dropping out a it. You're just dropping out a it.
HW: Yeah. My mistake. Yeah, basically, code review, really, really good. Taking time to do stuff, adequate sleep, exercise, good relationships with clients, constant feedback, really careful post mortem system analysis, really careful pre mortems. I realize a lot of this isn't actually in the code level. Do you want what I think would be effective things for coding? Yeah. My mistake. Yeah, basically, code review, really, really good. Taking time to do stuff, adequate sleep, exercise, good relationships with clients, constant feedback, really careful post mortem system analysis, really careful pre mortems. I realize a lot of this isn't actually in the code level. Do you want what I think would be effective things for coding?
SK: Oh, well, yes. Oh, well, yes.
HW: Yeah. Yeah.
SK: Yeah, go for it. Yeah, go for it.
HW: Coding, probably unified style, randomized testing, although that sort of is interesting, because we're not quite sure what are the best test to write. I think a lot of people are really fond of unit tests. I think those are great and you can write them really fast. But there's also other things that are really powerful large scale testing, probably some measure of observability. I'm not sure if this is really supporting your point or mine here. Coding, probably unified style, randomized testing, although that sort of is interesting, because we're not quite sure what are the best test to write. I think a lot of people are really fond of unit tests. I think those are great and you can write them really fast. But there's also other things that are really powerful large scale testing, probably some measure of observability. I'm not sure if this is really supporting your point or mine here.
SK: Yeah, I'm not sure either, but I kind of like where this is going. I think neither of us really know where it's going. Yeah, I'm not sure either, but I kind of like where this is going. I think neither of us really know where it's going.
HW: Yeah. Yeah.
SK: Yeah, I guess maybe this is just how it is. To pick another example, if you were to say if you want to be the best tennis player in the world what are all the things you have to do. I guess the list would kind of be long and complicated. And then someone be like, "No, actually, you have to add this thing too no that we know this feature of our rackets are important." You have to worry about that too. And actually, you know, we didn't really that gluten was bad or whatever, gluten was good or whatever it is. Yeah, I guess maybe this is just how it is. To pick another example, if you were to say if you want to be the best tennis player in the world what are all the things you have to do. I guess the list would kind of be long and complicated. And then someone be like, "No, actually, you have to add this thing too no that we know this feature of our rackets are important." You have to worry about that too. And actually, you know, we didn't really that gluten was bad or whatever, gluten was good or whatever it is.
HW: Yeah. Yeah.
SK: I guess- I guess-
HW: I do see one simplification that I think you would find as interesting as simplification. I think a lot of unit tests, integration tests, not all of them, but a lot of them can be folded into a combination of property tests and contracts. I do see one simplification that I think you would find as interesting as simplification. I think a lot of unit tests, integration tests, not all of them, but a lot of them can be folded into a combination of property tests and contracts.
SK: Okay. Okay.
HW: That's just my opinion though. That's just my opinion though.
SK: Yeah, yeah. Tell me more about that. Yeah, yeah. Tell me more about that.
HW: So are you familiar with contracts? So are you familiar with contracts?
SK: Yes, but let's assume not. Yes, but let's assume not.
HW: Okay. So essentially, a contract is an assertion that you make as either usually a pre condition or condition of your function. So say, if you have something that takes the tail of a list, you can make the post condition saying that it will have one less element than the original list. And also if you append to the head of the list to the output you'll get the same thing. So essentially, these are essentially specifications that ride in the code itself. And they can be used for formal verification, but they can also be, and are more commonly used for run time verification. Every time you call the function, you just check the preconditions and post conditions. And if they're wrong, you just sort of stopped execution; raise an error. And it turns out that if you do this, one, it's really effective, but two, you can now start to test by just randomized inputs, pumping it through a system. And just if you have a bug, the appropriate contract will stop and raise the issue. So you start to get really simple integration tests from that. Okay. So essentially, a contract is an assertion that you make as either usually a pre condition or condition of your function. So say, if you have something that takes the tail of a list, you can make the post condition saying that it will have one less element than the original list. And also if you append to the head of the list to the output you'll get the same thing. So essentially, these are essentially specifications that ride in the code itself. And they can be used for formal verification, but they can also be, and are more commonly used for run time verification. Every time you call the function, you just check the preconditions and post conditions. And if they're wrong, you just sort of stopped execution; raise an error. And it turns out that if you do this, one, it's really effective, but two, you can now start to test by just randomized inputs, pumping it through a system. And just if you have a bug, the appropriate contract will stop and raise the issue. So you start to get really simple integration tests from that.
SK: Okay, yeah, that's very interesting. Okay, yeah, that's very interesting.
HW: Yeah. Yeah.
SK: So, you know, the chaos monkey approach. Well, chaos monkey, I guess, is more about letting servers do it and stuff. So, you know, the chaos monkey approach. Well, chaos monkey, I guess, is more about letting servers do it and stuff.
HW: Yeah, but essentially, the randomized testing with fine grained responses. Yeah, but essentially, the randomized testing with fine grained responses.
SK: Well, the randomized testing reminds me of Haskell's QuickCheck, where you generate tests based on types. Well, the randomized testing reminds me of Haskell's QuickCheck, where you generate tests based on types.
HW: Yeah. Yeah.
SK: And then these are runtime assertions, which I guess in a type world would be kind of like dependent types. And then these are runtime assertions, which I guess in a type world would be kind of like dependent types.
HW: Sort of. So the thing is, is that contracts, so I guess a quick description between contracts and types, a lot of overlap between the two ideas. The main difference is that types aim for what's called legibility. They aim for being able to really easily analyze them statically, while contracts aim for expressivity. They aim for the ability to encode arbitrary assertions. So, for example, if you really wanted to, you could write a contract that says this function is only called by functions that have palindromic names. Sort of. So the thing is, is that contracts, so I guess a quick description between contracts and types, a lot of overlap between the two ideas. The main difference is that types aim for what's called legibility. They aim for being able to really easily analyze them statically, while contracts aim for expressivity. They aim for the ability to encode arbitrary assertions. So, for example, if you really wanted to, you could write a contract that says this function is only called by functions that have palindromic names.
SK: I see. I see. I see. I see.
HW: Yeah, which is probably not something you want to do, but you can easily do things like say refinement typing, this should only be called with values that are greater zero and will always return values that are less than zero. Yeah, which is probably not something you want to do, but you can easily do things like say refinement typing, this should only be called with values that are greater zero and will always return values that are less than zero.
SK: That's more of a type level thing. But you're saying that contracts are much more expressive? That's more of a type level thing. But you're saying that contracts are much more expressive?
HW: Yeah. Yeah.
SK: It sounds like contracts have access to not only the static AST, but also the actual code. So you can get the the name of the function and also have access to runtime information. It sounds like contracts have access to not only the static AST, but also the actual code. So you can get the the name of the function and also have access to runtime information.
HW: Yeah. Yeah.
SK: Maybe even have access to past runs. If I've been tested three times before then fail? Maybe even have access to past runs. If I've been tested three times before then fail?
HW: I mean, I think that's probably not something you want to be doing. But it's more long line. I guess, here's the more reasonable thing, after this is run, this mutation should happen in this class kind of thing. I mean, I think that's probably not something you want to be doing. But it's more long line. I guess, here's the more reasonable thing, after this is run, this mutation should happen in this class kind of thing.
SK: Yeah. Okay. Got it. So, yeah, well, I think that's, I agree that that's something that excites me. I like the idea of simplifying. It's like a mathematical idea. You know, being able to describe the same amount of things or more things with less words. But then, yeah, I also understand the no silver bullet solution of it's a complicated thing, we just have to keep layering on improvements over time. Yeah. Okay. Got it. So, yeah, well, I think that's, I agree that that's something that excites me. I like the idea of simplifying. It's like a mathematical idea. You know, being able to describe the same amount of things or more things with less words. But then, yeah, I also understand the no silver bullet solution of it's a complicated thing, we just have to keep layering on improvements over time.
HW: Yeah. Yeah.
SK: Or maybe, at one point, we'll get a paradigm shift and we can have a new foundation. But yeah, anyway. Or maybe, at one point, we'll get a paradigm shift and we can have a new foundation. But yeah, anyway.
HW: I mean, and also, the thing is that you might end up in a case where things are simplified but on the whole, things are more complicated. It might turn out that we can fold five ideas into one, but also, we need six ideas total. So I'm not doing a great job explaining this. I'm sorry. I mean, and also, the thing is that you might end up in a case where things are simplified but on the whole, things are more complicated. It might turn out that we can fold five ideas into one, but also, we need six ideas total. So I'm not doing a great job explaining this. I'm sorry.
SK: No, no. No, no.
HW: There's a reason I'm much better at writing than public speaking. There's a reason I'm much better at writing than public speaking.
SK: Yeah, well, you're quite a good writer. So well, I guess, let's focus on the things that I think we do a good job of, focusing on the discussion kinds of things. Because your essays, and I've done this a lot in other podcasts too, when I interview people who are good writers, I try and start with their writing as a foundation and then kind of go where I find interesting. And hopefully that's where other people who will read your things and wish that they could have asked you this question, hopefully. Yeah, well, you're quite a good writer. So well, I guess, let's focus on the things that I think we do a good job of, focusing on the discussion kinds of things. Because your essays, and I've done this a lot in other podcasts too, when I interview people who are good writers, I try and start with their writing as a foundation and then kind of go where I find interesting. And hopefully that's where other people who will read your things and wish that they could have asked you this question, hopefully.
HW: Oh, I see. Okay. So in that case, let me try changing sort of my answer to that. Oh, I see. Okay. So in that case, let me try changing sort of my answer to that.
SK: Sure. Sure.
HW: Because, okay, so I think that I'm going to actually shift this about why do we have to keep on layering stuff. And I'm going to sort of shift this in a slightly different direction then. Into something that I think might be more interesting for discussion. Are you familiar with systems theory? Because, okay, so I think that I'm going to actually shift this about why do we have to keep on layering stuff. And I'm going to sort of shift this in a slightly different direction then. Into something that I think might be more interesting for discussion. Are you familiar with systems theory?
SK: Let's drill into it regardless. Let's drill into it regardless.
HW: Okay. So it's a mixture of really interesting ideas and really cultish ideas that sort of started forming around early last century and sort of developing, which is the idea that often we approach systems, we approach problems and think, "Oh, this really complicated problem, there's actually a simplification to it that we can make, that makes it easy and we can sort of abstract it out." And the systems theory is the group of people going, "Wait a minute, what if that's actually not always the right approach? Maybe there's a better approach, which is what if we sort of look at this complicated problem and say, 'Hey, this complicated problem is actually still a complicated problem. And what we should be doing instead is trying to find all the patterns inside the complicated problems that helps make it complicated. And then try to sort of think of the complicated solutions, or the simple solutions that address all these interconnected issues.'" Okay. So it's a mixture of really interesting ideas and really cultish ideas that sort of started forming around early last century and sort of developing, which is the idea that often we approach systems, we approach problems and think, "Oh, this really complicated problem, there's actually a simplification to it that we can make, that makes it easy and we can sort of abstract it out." And the systems theory is the group of people going, "Wait a minute, what if that's actually not always the right approach? Maybe there's a better approach, which is what if we sort of look at this complicated problem and say, 'Hey, this complicated problem is actually still a complicated problem. And what we should be doing instead is trying to find all the patterns inside the complicated problems that helps make it complicated. And then try to sort of think of the complicated solutions, or the simple solutions that address all these interconnected issues.'"
HW: So the idea here is that instead of sort of saying, "Oh, there's an easy answer here," we say, "No, there's no easy answer. And now that we accept that there's no easy answer, how does this help us, to have that revelation?" Does that make sense? So the idea here is that instead of sort of saying, "Oh, there's an easy answer here," we say, "No, there's no easy answer. And now that we accept that there's no easy answer, how does this help us, to have that revelation?" Does that make sense?
SK: Yeah. Well, maybe, can you walk us through a concrete example? Yeah. Well, maybe, can you walk us through a concrete example?
HW: Okay, sure. So here's a concrete example and this is the stuff that I've mostly been interested in applying to a system safety, which is how properties of safety and security arise in a system emergently. So actually, yeah, actually, I think I might have actually had a better idea for an example here, which is future direction, which I think is a little bit easier to talk about. So imagine you have a system where you've got the following. People can sort of sign up and register for an account. And they have to validate the email address, right? Okay, sure. So here's a concrete example and this is the stuff that I've mostly been interested in applying to a system
|
2024-05-19T01:26:28.774034
|
https://example.com/article/2064
|
# This file is part of the Sylius package.
# (c) Paweł Jędrzejewski
sylius:
review:
accept: 'Review telah berhasil diterima.'
reject: 'Review berhasil ditolak.'
wait_for_the_acceptation: 'Kajian Anda sedang menunggu akseptasi.'
|
2024-07-20T01:26:28.774034
|
https://example.com/article/7523
|
Q:
Merge two properties to Entity Framework entity with partial class
I'm using Entity Framework.
My Customer Entity is:
public partial class Customer
{
public virtual int ID { get; set; }
public virtual string FirstName { get; set; }
public virtual string LastName { get; set; }
public virtual string CompanyName { get; set; }
}
And I have a BaseEntity class which is inherited by partial Customer class.
public class BaseEntity
{
public virtual int ID { get; set; }
}
public partial class Customer : BaseEntity
{
}
After that, I created a generic method as follows:
public static int GetId<T>(T entity) where T : BaseEntity
{
// id is zero after savechanges
var id = entity.ID;
return id;
}
My problem occurs when I want to get the id after SaveChanges() in the generic method, it's zero.
My test code is:
var db = new ContextDb();
db.Customers.Add(customer);
db.SaveChanges();
WriteLine($@"{customer.ID}"); // OK
WriteLine($@"{GetId(customer)}"); // Not OK --> ZERO
Thanks everyone for taking the time to try and help explain.
A:
It is caused by the fact that, indeed, you have two ID fields: one (hidden) from BaseEntity (which has a value of zero) and one from Customer (which is not zero). Try to override the ID property or simply remove it from the Customer class declaration:
public partial class Customer
{
public override int ID { get; set; }
public virtual string FirstName { get; set; }
public virtual string LastName { get; set; }
public virtual string CompanyName { get; set; }
}
You can also mark the ID property and BaseEntity class as abstract to force to override the ID property in inherited classes:
public abstract class BaseEntity
{
public abstract int ID { get; set; }
}
|
2024-05-28T01:26:28.774034
|
https://example.com/article/9825
|
Blunt Traumatic Abdominal Wall Hernias: A Surgeon's Dilemma.
Traumatic abdominal wall hernias (TAWH) have been recognized for more than a century since they were first reported by Selby (JAMA 47:1485-1486, 1906). They continue to be a rare diagnosis, encountered in approximately 1% blunt trauma admissions. The present study is a 10-year retrospective review of patients presenting with TAWH to a State Major Trauma Unit in Western Australia. We hypothesized that the timing of the repair of TAWH was dependent on the severity of the abdominal wall injury, as well as associated injuries, and in turn, this may affect patient outcomes. The Trauma Registry at Royal Perth Hospital (the only Level I Trauma Centre for adults in Western Australia) was scrutinized for TAWH, between 2003 and 2013. The injuries were graded by the classification system of Dennis et al. (Am J Surg 197:413-417, 2009). Patients with TAWH following penetrating trauma were excluded. During the study period, 44 patients were diagnosed to have TAWH accounting for 0.08% of admissions. Thirty (68%) of the patients were male and the median age was 36 years (IQR 24-54). The median BMI was between 25 and 30. The majority of the patients sustained trauma secondary to motor vehicle crashes and the commonest associated injury was a pelvic fracture. Grades 3 and 4 injuries were found to have an association with a pelvic fracture (p < 0.001). No association was seen in the present study between seat belt use and the development of TAWH or between the location of TAWH and seat belt pattern. The median time of diagnosis of TAWH following arrival to hospital was 18 hours while the median time of surgery from diagnosis was 15.5 hours. Forty-one (93%) of the patients underwent surgery. Of these, 8 (20%) were emergent due to a simultaneous bowel perforation and another five had primary mesh repairs. Three of the patients suffered superficial complications (7.5%) and there were 3 (7%) recurrences at a mean time of 7.25 months from the first repair. The follow-up period ranged from 1 to 51 months with an average time of 16 months. This series is the largest single institution study conducted on TAWH to date. Despite its retrospective nature and small numbers, it has generated some important questions. A larger prospective study with a longer follow-up period is required to generate reliable treatment algorithms as well as to standardize the management of TAWH.
|
2024-06-05T01:26:28.774034
|
https://example.com/article/7244
|
Q:
How to process a multiline string line at a time
I'd like to get a substring between two delimiters (regexes) from a string. I want to use this:
while (<>) {
if (/START/../END/) {
next if /START/ || /END/;
print;
}
}
But this works on lines of stdin. I'd like make it work on lines of a string. How?
A:
If you mean you want to process a string that already contains multiple lines then use split:
foreach (split(/\n/, $str)) {
if (/START/../END/) {
next if /START/ || /END/;
print;
}
}
A:
Simply:
my ($between) = $string =~ /START(.*?)END/s;
Alternatively, read from the string:
use 5.010;
open my $string_fh, "<", \$string or die "Couldn't open in-memory file: $!";
while ( <$string_fh> ) {
...
|
2024-05-07T01:26:28.774034
|
https://example.com/article/5239
|
445 B.R. 1 (2011)
In re Martha A. AKERS, Debtor.
Martha A. Akers, Plaintiff,
v.
Windward Capital Corporation, et al., Defendants.
Bankruptcy No. 07-00662. Adversary No. 10-10006.
United States Bankruptcy Court, District of Columbia.
February 11, 2011.
*3 Martha A. Akers, Washington, DC, pro se.
August W. Steinhilber III, Brault Palmer Grove Steinhilber & Robbin, Fairfax, VA, Jane Saindon Rogers, Tiffany R. Murray, Whiteford, Taylor & Preston, LLP, Washington, DC, for Defendants.
MEMORANDUM DECISION AND ORDER RE DEFENDANTS' MOTION FOR SUMMARY JUDGMENT
S. MARTIN TEEL, JR., Bankruptcy Judge.
The debtor commenced this adversary proceeding by the filing of a complaint against Windward Capital Corporation, the debtor's mortgage lender, and Mooring Financial Corporation, the servicer of the loan, for breach of contract. The debtor's property was damaged by a fire that started in a neighbor's adjoining property. In her complaint (including the amended complaint which merely added claims against another party),[1] the debtor contends that the Windward and Mooring failed to take proper steps to recover a claim for the fire damage under a force-placed hazard insurance policy taken out by the lender pursuant to the terms of the deed of trust. The court viewed the initial motion for summary judgment filed by Windward and Mooring as inadequately addressing the issues, but permitted them to file a supplemental motion. For the reasons that follow, I will grant their supplemental motion for summary judgment, and dismiss this adversary proceeding as to them.[2] The debtor also claims that Windward and Mooring failed to properly notice up a foreclosure sale of the property, but that was not pled by her in the initial or amended complaint, and ought not delay resolution of the claims that were pled, the monetary claims asserted by the debtor regarding the insurance claim.
I
The following facts are not in genuine dispute.
Akers was the owner of a parcel of real property located in the District of Columbia and commonly known as 1368 H Street, NE, Washington, D.C. 20002 (the "Property"). On or about July 26, 2000, Akers executed a promissory note in the loan amount of $63,7500.00 with Windward Capital Corporation (the "Lender"). Mooring Financial Corporation services the loan for the Lender. To secure payment of the Promissory Note, Akers granted the Lender a deed of trust against the Property. The defendants contend that, at the time of the filing of the petition, Akers was in default under the terms of the Note in the aggregate amount of *4 $1,600.06. Akers disputes that she was in default.
The deed of trust provided that the borrower was required to maintain insurance on the property, and failing to do so, the Lender had the option to obtain such insurance and charge the cost of premiums to the borrower. Specifically, the deed of trust provided as follows with respect to property damage insurance:
Maintenance of Insurance. Grantor shall procure and maintain policies of fire insurance with standard extended coverage endorsements on a replacement basis for the full insurable value covering all improvements on the Real Property in an amount sufficient to avoid application of any coinsurance clause, and with a standard mortgagee clause in favor of the Lender. . . .
Expenditures by Lender: If Grantor fails to comply with any provision of this Deed of Trust . . . Lender on Grantor's behalf may, but shall not be required to, take action that Lender deems appropriate. Any amount that Lender expends in so doing will bear interest at the rate provided in the Note from the date incurred or paid by Lender to the date of repayment of the Grantor. . . .
Application of Proceeds. Grantor shall promptly notify Lender of any loss or damage to the Property if the estimated cost of repair or replacement exceeds $5,000.00. Lender may make proof of loss if Grantor fails to do so within fifteen (15) days of the casualty. Whether or not Lender's security is impaired, Lender may, at its election, receive and retain the proceeds of any insurance and apply the proceeds to the reduction of the indebtedness, payment of any lien affecting the Property, or the restoration and repair of the Property. If Lender elects to apply the proceeds to restoration and repair, grantor shall repair or replace the damaged or destroyed improvements in a manner satisfactory to Lender. Lender shall, upon satisfactory proof of such expenditure, pay or reimburse Grantor from the proceeds for the reasonable cost of repair or restoration if Grantor is not in default under this Deed of Trust. Any proceeds which have not been disbursed within 180 days after their receipt and which Lender has not committed to the repair or restoration of the Property shall be used first to pay any amount owing to Lender under this Deed of Trust, then to pay accrued interest, and the remainder, if any, shall be applied to the principal balance of the indebtedness. If Lender holds any proceeds after payment in full of the indebtedness, such proceeds shall be paid to Grantor as Grantor's interests may appear.
Believing that Akers had failed to obtain property damage insurance in accordance with the deed of trust, on or about July 22, 2008, Mooring purchased a fire insurance policy through Proctor Financial Insurance.[3] On April 28, 2009, Windward and Mooring were informed that a fire at an adjacent building had caused damage to the Property. On May 13, 2009, Mooring filed an insurance claim under the Proctor policy, and Windward and Mooring received an insurance claim response from the United States Liability Insurance Group, which estimated the cost of repair to be $1,842.66, on July 15, 2009. This amount was less than the force-placed insurance policy's $2,500 deductible. The defendants offered to pay the $1,842.66 to Akers.[4]
*5 Akers contends, and for purposes of disposing of this motion the court will accept as true, that she notified Liz Schalow, a representative of Windward, by phone that the $1,842.66 estimated cost of repair was incomplete and flawed. Ms. Schalow acknowledged the error and indicated that she would notify the insurance carrier.[5] The agent never came to the Property and United States Liability Insurance Group never adjusted their estimated cost of repair. Proctor never paid any amounts to the defendants or Akers in settlement of the claim.
II
Akers contends that the force-placed insurance obtained by Mooring in accordance with the deed of trust was obtained for her benefit, and that Windward and Mooring had an obligation to mitigate Akers' losses by more zealously pursuing the true value of the insurance claim for her benefit. Windward and Mooring, in turn, argue that the insurance was obtained for their benefit and their benefit alone, and that they owed no duties to Akers with respect to the force-placed insurance under which Akers was not a named insured. Although the court concludes that the policy was obtained for the mutual benefit of the lender and Akers, and that the Windward and Mooring did take on certain duties when they exercised their option to insure the property, the court also concludes that they did not breach those limited duties, and that the fact that the insurance was taken out for the mutual benefit of the parties does not entitle Akers to pursue policy-related damages from Windward and Mooring. The court further concludes that Windward and Mooring had no affirmative duty to pursue and maximize recovery of the claim under the force-placed insurance policy on Akers' behalf. Rather, if Akers was not satisfied with their handling of the claim, her remedy, to the extent one exists, was limited to an independent right to seek recovery, as a possible third-party beneficiary of the policy, against Proctor.
A
THE FORCE-PLACED INSURANCE WAS PROCURED FOR THE MUTUAL BENEFIT OF MOORING AND AKERS
Although not a named insured under the insurance policy, the language in the Deed of Trust authorizing the Lender to obtain force-placed insurance on the property makes clear that any such policy would be obtained for the mutual benefit of the Lender and Akers. The deed of trust provides as follows:
Maintenance of Insurance: Grantor shall procure and maintain policies of fire insurance with standard extended coverage endorsements on a replacement basis for the full insurable value covering all Improvements on the real Property in an amount sufficient to avoid application of any coinsurance clause, and with a standard mortgagee clause in favor of Lender. . . .
The deed of trust further provides:
Expenditures by Lender: If Grantor fails to comply with any provision of this *6 Deed of Trust . . . Lender on Grantor's behalf may, but shall not be required to, take action that Lender deems appropriate. Any amount that Lender expends in so doing will bear interest at the rate provided in the Note from the date incurred or paid by Lender to the date of repayment of the Grantor. . . .
It further provides:
Application of Proceeds. Grantor shall promptly notify Lender of any loss or damage to the Property if the estimated cost of repair or replacement exceeds $5,000. Lender may make proof of loss if Grantor fails to do so within fifteen (15) days of the casualty. Whether or not Lender's security is impaired, Lender may, at its election, receive and retain the proceeds of any insurance and apply the proceeds to the reduction of the indebtedness, payment of any lien affecting the Property, or the restoration and repair of the Property. If Lender elects to apply the proceeds to restoration and repair, Grantor shall repair or replace the damaged or destroyed improvements in a manner satisfactory to Lender. Lender shall, upon satisfactory proof of such expenditure, pay or reimburse Grantor from the proceeds for the reasonable cost of repair or restoration if Grantor is not in default under this Deed of Trust. Any proceeds which have not been disbursed within 180 days after their receipt and which Lender has not committed to the repair or restoration of the Property shall be used first to pay any amount owing to Lender under this Deed of Trust, then to pay accrued interest, and the remainder, if any, shall be applied to the principal balance of the indebtedness. If Lender holds any proceeds after payment in full of the indebtedness, such proceeds shall be paid to Grantor as Grantor's interests may appear.
The only fair reading of the above-quoted policy provisions is that any insurance obtained under the terms of the deed of trust was intended for the mutual benefit of the Lender and Akers. The deed of trust specifically provides that the Lender's authorization to obtain insurance on the property is such that the action is to be taken on the borrower's behalf. Likewise, the provision addressing the application of insurance proceeds does not distinguish between proceeds recovered under a policy obtained by the borrower and those obtained under a policy obtained by the Lender on the borrower's behalf. In either case, the proceeds may help protect the Lender's security, and are to be applied in a fashion that either reduces the borrower's obligation under the note or improves or repairs the property. See Warrener v. Federal Land Bank, 266 Ky. 668, 99 S.W.2d 817, 820 (1936) (mortgagor has "vital interest" in the mortgagee's undertaking to procure insurance and it was for the parties' mutual benefit).
B
WHEN MOORING EXERCISED ITS RIGHT UNDER THE DEED OF TRUST TO OBTAIN INSURANCE, VERY LIMITED DUTIES AROSE IN FAVOR OF AKERS AND THOSE DUTIES HAVE NOT BEEN BREACHED
The deed of trust did not obligate the defendants to insure Akers' property. However, "even when the mortgagee is not under a duty to effect insurance, but merely has the option to do so, an election to exercise such option obligates it to look after the interests of the mortgagor as well as its own." Couch § 65:7, citing Warrener v. Federal Land Bank, 266 Ky. 668, 99 S.W.2d 817 (1936) (finding a cause of action for either negligence or malfeasance when mortgagor advised mortgagee *7 that it was taking out insurance policy in accordance with its right (not obligation) to do so, mortgagor relied upon that representation, and following fire damage to the lender's collateral it came to light that mortgagee had failed to procure insurance as indicated). The case law supporting this proposition makes clear that the limited duty that arises is the duty to insure that the policy sought to be obtained is then validly placed. The record reflects that Windward and Mooring met that duty by successfully obtaining and maintaining the force-placed insurance policy at issue in this dispute. Akers has not identified any other legal duties that arose in her favor incidental to the defendants' having obtained force-placed insurance, and as such, the court concludes that Akers has likewise failed to demonstrate how the defendants' handling of the claim arising under the policy constituted a breach of duty arising under the deed of trust.
Akers has alleged only a breach of the deed of trust, not an obligation arising under the insurance policy. Theoretically, had the insurance policy expressly provided a mechanism for resolving disputes over the value of a claim that might arise between the Lender, insurer, and borrower, and had the Lender then settled the insurance claim without following those procedures, Akers might have grounds to complain about the Lender's handling of the insurance claim. See In re Williams, 360 B.R. 99 (Bankr.W.D.Pa.2007) (insurance policy provided a mechanism for resolving a dispute between the insurer, the lender, and the borrower as to the amount of the loss, and the lender was found liable to the borrower when, in contravention of that procedure, it accepted an amount in settlement of the insurance claim without consulting with the borrower about the amount of the loss).
Here, none of the parties have offered the insurance policy into evidence, making it impossible to scrutinize the particulars of that contract. Moreover, Williams, the case cited to above and a case in which the mortgagee was found liable to the mortgagor for having accepted a check in settlement of an insurance claim in an amount insufficient to cover the loss, is distinguishable on its facts. In that case, the mortgagee affirmatively settled the insurance claim without consulting with the borrower, thereby cutting off any further rights to collect under the policy. Here, by contrast, Akers' claim is that the Lender failed to pursue the claim after receiving a damage calculation that fell below the policy's deductible. Nothing in the record suggests that the Lender's failure to contest the insurer's cost estimate, which estimate led the insurer to conclude that no amounts would be paid, terminated any independent rights Akers might have to enforce the policy.
In short, Akers has not shown that the Lender had any duty to instruct her on how independently to pursue recovery under the policy, and she has likewise not shown how the Lender's actions prevented her from pursuing recovery under the policy. See Barbel v. Chase Manhattan Bank, 191 Fed.Appx. 101 (3d Cir.2006) (mortgagor does not have a duty to advise a borrower on how to deal with an insurance company).
C
AKERS IS A THIRD-PARTY BENEFICIARY OF THE INSURANCE POLICY, BUT THAT DOES NOT ENTITLE HER TO RECOVER FROM DEFENDANTS FOR BREACH OF THE DEED OF TRUST
Contrary to the position adopted by Windward and Mooring, the court concludes *8 that, on this record, Akers is a third-party beneficiary of the insurance policy between Mooring and Proctor.
"Applying the principle that a person may enforce a contract made by others for his or her benefit, a mortgagor may bring an action upon a policy of fire insurance taken out by the mortgagee to protect the mortgagor." 17 Couch on Ins. § 242:65, citing American Sur. Co. Of New York v. Martinez, 73 S.W.2d 109 (Tex.Civ. App. El Paso 1934) (policy was obtained by lender without property owner's knowledge, consent, or authority, but the owner's suing on the policy is a manifestation of the owner's acceptance and ratification of the contract), and Palma v. Verex Assur., Inc., 79 F.3d 1453 (5th Cir.1996) (under Texas law, mortgagor was found to be a third-party beneficiary of mortgagee's insurance contract in part because of mortgagor had a contract with the named insured, paid the insurance premiums, and was designated by name in the certificate of insurance issued by the insurer). But see Mergenthal v. Star Banc Corp., 122 Ohio App.3d 100, 701 N.E.2d 383, 385 (1997) (mortgagor was only incidental beneficiary to mortgagee's force-placed insurance policy, and thus lacked standing to challenge the terms of the insurance settlement agreement).
"Under District of Columbia law, insurance contracts are governed by the substantive law of the state in which the policy is delivered." Sidibe v. Traveler's Ins. Co., 468 F.Supp.2d 97, 100 (D.D.C.2006). Assuming that the force-placed insurance policy at issue in this proceeding was delivered in the District of Columbia, then District of Columbia law would apply. In the District of Columbia, "[o]ne who is not a party to a contract nonetheless may sue to enforce its provisions if the contracting parties intend the third party to benefit directly thereunder." Western U. Telegraph Co. v. Massman Constr. Co., 402 A.2d 1275, 1277 (D.C. 1979). The court "will read the contract as a whole to determine whether the third party's benefit under the contract is intended or incidental. . . . [, and] the absence of the third party's name from the contract is not fatal to his claim, especially when the surrounding circumstances tend to identify the third-party beneficiary." Id. Nevertheless, "the parties to a contract must directly and unequivocally intend to benefit a third-party to be considered an intended beneficiary . . ., [and t]he parties' mere knowledge or awareness that a contract may benefit a third-party is insufficient, without more, to demonstrate an intent to confer a benefit on the third party." Bowhead Information Tech. v. Catapult Tech., 377 F.Supp.2d 166, 171 (D.D.C.2005) (finding that successor contractor was not an intended third-party beneficiary of a continuity of services agreement between the Department of Transportation and the original contractor, which agreement required the original contractor to, inter alia, allow as many personnel as practicable to remain on the job to help the successor contractor maintain the continuity and consistency of services provided to the Department of Transportation); see also Sidibe v. Traveler's Ins. Co., 468 F.Supp.2d 97, 100 (D.D.C.2006) (nothing in the record to reflect that either party to the insurance contract intended plaintiff or any person similarly situated to the plaintiff to be a beneficiary of the policy).
Although the deed of trust contemplated that any insurance policy taken out by the mortgagee would be for the mutual benefit of the borrower and the lender, the parties have failed to submit any relevant excerpts from the insurance policy reflecting whether the insurer intended Akers to be a beneficiary of the policy. In light of the unambiguous language in the deed of trust establishing that *9 a force-placed insurance policy would be for the mutual benefit of the mortgagor and mortgagee, and because the policy necessarily insured property of the debtor, the only reasonable inference on this record is that Akers was a third-party beneficiary to the insurance policy. See Jones v. General Ins. Co. of America, 2009 WL 1537866, *9-10, 2009 U.S. Dist. LEXIS 45014 *42 (S.D.Ala. May 29, 2009), citing Palma v. Verex Assur., Inc., 79 F.3d 1453 (5th Cir.1996), Schlehuber v. Norfolk & Dedham Mut. Fire Ins. Co., 281 So.2d 373 (Fla.App. 3 Dist.1973), and Wunschel v. Transcontinental Ins. Co., 17 Kan.App.2d 457, 839 P.2d 64, 70 (Kan.App.1992).[6]
Even treating Akers as a third-party beneficiary of the insurance contract, however, that would not entitle her to recover damages from Windward and Mooring. Mooring, as the named insured, has no obligation under the insurance policy to pay a claim. Likewise, neither Windward nor Mooring is alleged to have accepted amounts from Proctor in settlement of the claim as to which Akers could claim an entitlement under the terms of the deed of trust or otherwise. Instead, if Akers were found to be a third-party beneficiary of the insurance contract, that would simply provide a legal avenue for her directly to enforce the policy against Proctor notwithstanding that she is not a named insured.
III
NOTICE OF THE FORECLOSURE SALE
In her opposition to the supplemental motion for summary judgment, the debtor argues:
Notices of Sale. Lender shall give Grantor written certified notice, return receipt of any sale of real property at least 30 days in advance of the intended date of the sale. The notice was note [sic] sent to Grantor's address of record 1319 Fairmont St NW, Washington, DC, 2009 by certified mail, return receipt or at all, pursuant to Deed of Trust[.] Plaintiff pick up the postal notice at 1368 H St, NE, Washington, DC, just days before the date listed in the notice and retrieved the letter from the main post office (See Heather James Affidavit which does not affirm proper notice to the address of record for notice of sale, there is no return postal document submitted as proof of receiving date.)
The complaint and the amended complaint did not raise this claim. Indeed, this claim is based on events arising after the filing of the amended complaint, and, accordingly, could only be asserted via a supplemental complaint. Fed. R. Civ. Proc. 15(d). No motion was filed under Rule 15(d) to file a supplemental complaint. Accordingly, this is not a valid defense to the supplemental motion for summary judgment seeking dismissal of the complaint and amended complaint. The debtor remains free to pursue, outside of this adversary proceeding, the issue of whether the foreclosure sale was void for lack of proper notice.
The issue of the validity of the foreclosure sale was raised by the debtor by way of a motion to void the foreclosure sale. The Heather James Affidavit to which the *10 debtor refers is Exhibit F to the opposition (Dkt. No. 66) to the debtor's motion to void the foreclosure sale. That motion to void the foreclosure sale was filed by the debtor without obtaining leave to file a supplemental complaint. Unfortunately, Windward and Mooring responded to the motion without insisting that the claim that the sale was void must be pursued by a supplemental complaint, and was not properly before the court. In denying the motion, the court similarly overlooked the lack of any supplemental complaint raising that claim, treated the motion as a request for a preliminary injunction, and reasoned as follows:
The plaintiff has offered no evidence in support of her motion, and instead offers only conclusory assertions of wrong unsupported by a recitation of specific facts establishing a wrong.
. . .
The debtor's reply, like the motion, offers no specific facts or evidence in support of the debtor's requested relief, and it likewise fails to rebut or even respond to the evidence offered by the defendants in support of their opposition. Accordingly, the court finds that the debtor has failed to establish a likelihood of prevailing on the merits such that she would be entitled to a preliminary injunction. The court likewise finds that the debtor has failed adequately to raise any issue that would warrant a hearing.
The debtor has attempted unsuccessfully in numerous ways to prevent the foreclosure sale from being held and to set aside the foreclosure sale, but when the debtor pursued her motion to void the foreclosure sale, this contention that the foreclosure notice was not sent to her by certified mail was not clearly identified as a ground for setting aside the foreclosure sale.[7] In any event, the court's order disposed of the motion to void the foreclosure sale as though it were a preliminary injunction. Had the debtor pled such a claim in a supplemental complaint, it would have been before the court for plenary determination in accordance with orderly procedures (including the opportunity for an answer or motion to be filed in response to the supplemental complaint, and pretrial procedures such as discovery). It was never properly pled as part of a complaint, and cannot be viewed as having been disposed of in a plenary fashion, having preclusive effect, by reason of the court's denial of the motion to void the foreclosure sale. Accordingly, I view the issue of proper mailing of the notice of foreclosure as still an open issue.
Nevertheless, if the debtor wanted to seek in this adversary proceeding to void the foreclosure sale for lack of proper notice, she ought to have obtained leave to file a supplemental complaint to seek such a ruling. The supplemental motion for summary judgment appropriately addressed the only claims raised by the debtor's complaint and amended complaint, namely, the issues arising from the insurance dispute. In order to dispose of this adversary proceeding in an orderly fashion, the court is entitled to limit the claims adjudicated to those that have been pled in the plaintiff's complaint and amended complaint. *11 Windward and Mooring are entitled to a final adjudication of the only claims pled. The supplemental motion for summary judgment will be granted.
IV
CONCLUSION
The court concludes that the handling of the insurance claim by Windward and Mooring did not constitute a breach of contract, and that summary judgment is appropriate.[8] That having been the only claim pled in the complaint and the amended complaint, it is
ORDERED that summary judgment is granted in favor of Windward and Mooring. It is further
ORDERED that this ruling is without prejudice to the debtor's claims regarding notice of the foreclosure sale. It is further
ORDERED that the court expressly determines that there is no just reason for delay, and directs the entry of final judgment as to Windward and Mooring regarding the claims asserted against them.
NOTES
[1] The initial complaint was erroneously titled an amended complaint, but I will refer to it as the complaint. The amended complaint, filed on April 30, 2010, only named Capitol Insurance as a defendant and did not amend the allegations directed to Windward and Mooring. To avoid any ambiguity, however, I will address whether summary judgment is appropriate as to both the initial complaint and the amended complaint.
[2] The debtor amended her complaint to add Capitol Insurance, the neighbor's insurance company, as an additional defendant, but there is no indication that the summons to Capitol Insurance was ever executed. The court is issuing an order to show cause why the adversary proceeding ought not be dismissed, without prejudice, as to Capitol Insurance pursuant to Rule 4(m) of the Federal Rules of Civil Procedure (made applicable by Fed. R. Bankr.P. 7004(a)(1)).
[3] The defendants contend that Akers failed to obtain the requisite insurance, while Akers contends that she provided proof of insurance coverage, as required.
[4] The defendants contend that the loan was in default and they had no legal obligation to make this offer, but rather, that it was simply an accommodation.
[5] Akers' contention is supported by Exhibit A to her December 16, 2010 Opposition to Summary Judgment (Dkt. No. 107), which is a letter from Liz Schalow directed to Ms. Akers reflecting that Akers had informed Mooring that the damage was more significant than the estimate provided by United States Liability Insurance Group, and notified her of her Mooring's decision to hire an independent claims adjuster to examine the damage to the property.
[6] Alternatively, there is case law to support the proposition that Akers can achieve standing to seek relief against the insurer by naming the mortgagee in the complaint as a necessary party. See N.Y. Underwriters Ins. Co. v. Jarvis, 196 Ark. 770, 120 S.W.2d 8, 9 (1938) see also, Schlehuber v. Norfolk & Dedham Mutual Fire Ins. Co., 281 So.2d 373, 375 (Fla.App.1973) (relying in part on Florida statute, court concluded that mortgagee payment clause was a promise that could be enforced by property owner as third-party beneficiary even though he possessed no policy in his name).
[7] The Heather James Affidavit established that she sent a notice of the foreclosure sale to the debtor at her Fairmont Street address. That notice included a heading indicating that it was sent by certified mail and regular mail, and included a Certified Article Number. The Heather James Affidavit did not specifically state that the notice was mailed by certified mail, but if the debtor pursues the claim that the notice was not mailed by certified mail, a new affidavit could be filed to address that point.
[8] Windward and Mooring requested attorney's fees, and the promissory note executed pursuant to the loan may entitle them to recover such fees. Nevertheless, at this juncture (with the collateral securing the loan obligation having been sold at foreclosure) they may deem the pursuit of such fees as likely to be unproductive. I will give them a 21-day opportunity to file a motion for such fees, but if no such motion is filed, the claim for attorney's fees can be pursued outside of this adversary proceeding.
|
2023-10-26T01:26:28.774034
|
https://example.com/article/7422
|
"Nearly every film that Aristide Massaccesi made contains elements of the horror genre, starting with "Heroes in Hell" and "Diary of a Roman Virgin" up to the recent "Fatal Seduction", whose form is an erotic thriller, with elements that one expects in a horror film." "Think of the persistent recurrence of the theme of castration in Massaccesi's work, from "More Sexy Canterbury Tales" in '72, to" ""Chinese Kamasutra", in the '90's." "We can see how certain macabre and fetishistic elements in world cinema got their start in Massaccesi's films." "It's not surprising, therefore, that at the end of the '70's, when traditional horror was updated by more gory American films," "Massaccesi found himself at home in this new type of cinema." "It was a type of filmmaking he'd been long practicing." "His were internationally renowned films that reached cult status, such as" ""Buried Alive", "Anthropophagus" and "Absurd"." ""Death Smiles at Murder", from 1973, is a film which, despite echoes of the nascent mystery-thriller genre begun by Dario Argento with "The Bird with the Crystal Plumage", still follows the gothic model" "that characterizes the previous decade, as seen in the work of directors like Mario Bava, Riccardo Freda and Antonio Margheriti." ""Death", the first and only work he shot using his own name, and not the usual pseudonym, seems to follow closely" "Sheridan Le Fanu's story, "Carmilla"." "The leads in "Death Smiles at Murder" included the blonde actress" "Eva Aulin, who appeared in hits such as "I Am What I Am"" "by Tinto Brass, or "Death Laid an Egg" by Giulio Questi." "We also see the Italian star Angela Bo, unforgettable as Rosy Steward and who appeared in so many spaghetti westerns." "In addition, we see Klaus Kinksi, even stormier than usual, who plays a mad doctor convinced he can bring the dead to life with an ancient Aztec formula." "It was the first time I'd done a horror film, and the material interested me a lot." "For that reason I wanted to sign it with my own name " "Aristide Massaccesi." "There were also actors you might call important." "There were Klaus Kinski, Eva Aulin, who'd had a hit... afterwards she totally disappeared - but at the time she was very famous." "The film was special so I signed it with my own name, Aristide Massacessi." "Just for the pleasure of putting my own name on a piece, you know?" "It looks like someone's in a real hurry." " Yes." "Odd." "The story for "Death Smiles at Murder", which is part yours ...and part Scandigliato's." "How did you get the idea of making a horror film set in such a gothic environment?" "Were you attracted to that type of film?" "Yes, from taking photographs and so on, I really liked creating a sort of film that was, as you say, gothic, based partly on photographs and cheap special effects, that sort of stuff." "Everything started like that." "Romano Scadigliato had been a friend of mine for years, he used to work as assistant director while I was working as a cinematographer and so on, and so we were friends." "He was easy to work with, so we did the story together." "Klaus Kinski was also in it." " Klaus Kinski was in it for the money." "You'd call him, give him the money, he'd be there two days." "A complete whore." "But I must say he gave you something more for your money." "He was very flexible, got into the character - even if it was a form of madness on his part - not done in a very lucid manner." "He was fascinated by parts calling for insanity." "He got a kick out of doing films that were sort of over the top." "Luciano Rossi is also in the film - he's a very special sort of character." "What ever became of him?" " Luciano Rossi was a very sweet guy." "I wouldn't say he was completely normal, either." "In fact the poor guy's in a nursing home." "He went crazy suddenly, apparently." "But last I heard, he'd got out and become a sort of tramp who hangs around town." "He's from the town of Alatri, near Frosinone..." "They gave me some sad news concerning him, to tell the truth." "The availability of film footage from World War II convinced..." "Massaccesi and Franco Gaudenzi, the producer, to make "Heroes in Hell", 1973." "The film includes such excellent actors as Ettore Manni, Lars Bloch and Klaus Kinski." "However, its theatrical release lasted a very short time, possibly due to the fact that the war film genre had already seen its glory days during the previous decade." "The film is worth a look, however, for the way in which original footage is mixed into the story, and also for some strong scenes." "For example when a bullet is extracted from a body, they show every last detail." "You change genres after "More Sexy Canterbury Tales", and make" ""Heroes in Hell", produced by Gaudenzi, which is a war movie." "Naturally there was discovered footage stuck in there, too." "In fact if you look, you see material in black and white, dogfights, battles and bombardments." "That all came from footage Gaudenzi bought." "We were supposed to use it somehow, so we built a story around it." "I changed my name for this film because at the time directors from Eastern Europe were all the rage." "I called myself Mikail Wotruba." "It sounds like an Eastern European director..." "Stay still, damn you, or I'll kill you!" "Stay still, damn you, or I'll kill you!" "Stay still!" "Done." "Let's go." "I'll take these." "One film that stands out among Massaccesi's works is "Naked Warriors", made in 1971 ." "It stands aside "Diary of a Roman Virgin", since Aristide made the two films in rapid succession, using many of the same extras." ""Naked Warriors" was made in co-production with an American company and represents a rare example of the re-vitalization of the gladiator genre after it had appeared to be extinct for years." ""Naked Warriors", "Duel of the Champions" by Terrance Young, and "The Magnificent Gladiator" by Alfonso Brescia are rare 1960's examples of historic films set in the ancient world." "Massaccesi's film stands out for its almost entirely female cast, along with its use of a colorful and experimental eroticism." ""Naked Warriors" was brought to life by Gaudenzi in co-production with" "Roger Corman." "Corman sent this young man, Steve Carver, who'd made maybe one or two films - maybe only one." "Guadenzi didn't really want to rely on him, so I went over to handle the cinematography and to direct two other movies connected with this one." "One was "Una vergine per l'impero romano", which never came out" " I don't know why - and the other was" ""The Arena." I directed the scenes in the arena and the action scenes," "Carver directed some because - at that time my English wasn't too good - and nearly all the actresses spoke English." "So Steve Carver did the scenes with more dialogue, and I did the action scenes." "Pam Grier is one of the actresses." " She was a black American girl who was extremely good." "Now she made a comeback with Tarantino's film." "She was a very good person, very flexible, a real pro." "There was also Rosalba Neri playing the head of the women gladiators." "You worked as cinematographer on a film made that same year called" ""The Devil's Wedding Night", in which Rosalba Neri appeared again... along with Mark Damon." "What do you recall about that film?" "Was it a horror film?" " It was a Dracula film, if I remember correctly." "The director was a certain Paolo Solvay (Luigi Batzella)." "We called him the bus driver 'cause he seemed more a like bus driver than director." "But he had his talents, too." "A capable commercial director." "Mark Damon was then a distributor for Park Films." "He was involved somehow in the film..." "it was later distributed by Pack." "It's a film with all the elements of a horror movie, set in a town called Bassolano, inside a castle there." "Rosalba Neri?" "What do you remember about her?" "Rosalba Neri at the time was a sort of poor man's Barbara Steele..." "Barbara cost too much to get at that time, so we used Rosalba..." "She had the same dark hair, was a little vampire-like, if you will..." "Another film you made was "Pugni, pirati e karate", with the pirate theme you've handled also recently, in both the porn genre and in non-porn." "Yes. "Pugni, pirati e karate" came out of the fact that Gaudenzi again had bought some pirate film stock." "But there was enough for 7 films." "So we came up with a little story that we first called" ""Pantagruel and Gargantua"." "We realized nobody knew who they were, so we changed it to "Pugni, pirati e karate"." "That too was made in 6 days." "It was an action and adventure film." " What have you done lately?" "Lately I've made a film called "The Predator of the Antilles"." "That was also made with stock pirate footage." "It's what you might call a more big budget film." "I mean a budget that's big for me, of course!" "One that I could afford..." "But it's pretty good, I'm getting a lot of satisfaction out of it, also in terms of money." "Together with film, since we built a piece of a ship, a Spanish galleon, in a field in Hungary, I made 3 or 4 porno films." "That was in order to cover the costs of building that ship." "But you didn't have problems getting normal actors to act in a porn film?" "I didn't make the movies at the same time." "I did the porn films first using the section of the ship, near the bow, and then I returned to Rome for a week, then went to Hungary to do "Tortuga", as it was called then." "Now it's called "The Predator of the Antilles", which is not a porn film." "At first it was announced as being directed by Mario Bianchi." "Who's Mario Bianchi and what's your relationship with him?" "Mario Bianchi directed regular films until about 7 or 8 years ago." "He's made a lot more porn films than I have, with Moana and Cicciolina..." "So he's been in porn a lot longer than I have." "He's very talented, however..." "A very patient guy." "He manages better than I can, doing soft-core versions of porn films." "It's hard for me to get porn actors to do soft-core acting." "He's a lot more patient and manages to get them to act." "He's a lot better than me at turning out soft-core versions of his porn." "We were supposed to do a film in Hungary about a year and a half ago." "I think it was called "Pirates"." "He gave me that part" " I don't remember much now" " I memorized my lines..." "And we worked on a Disney set in Budapest." "There was a large set, a large ship." "But production was blocked." "I ended up packing my suitcase..." "It was postponed and that was the last I heard of it." ""Red Coat" represents Massaccesi's first chance with a budget that is large compared to his previous work." "It also afforded him the chance to work with actors who, at the time, were well-known, including Fabio Testi, who was on his way to becoming a star of action films, especially crime drama." "The film also included an upcoming young female star, Renata Cestie who had appeared in a series of tear-jerkers that made her name." "Written in 2 days by Luigi Montefiori and loosely based on "White Fang"," ""Red Coat" is a sort of western set amid the snows of Canada." "Despite the fact that it's a family film, there are some violent scenes and its rather sad story line sets it apart from the films of that time." "I was supposed to do a sequel to a film that Lucio Fulci was directing, called "White Fang"." "I went to Canada to take dog sled lessons." "The film went well - they also made a documentary that won a prize." "I was sent to do the sequel, sent by the father of Donati, who was head of Coralta Film, a company in which Ermanno Donati headed all the production." "For my film, we used some of the unused footage from "White Fang" and we made "Red Coat"." "Was the story yours?" " Montefiori and I wrote the script." "That is, he was writing it already, he was working with Donati." "The problem was, we had only three days there also, a long weekend, during which I wrote the script with Aristide, who was continually afraid that I'd fall asleep and not get any writing done..." "I remember he went to buy me a roast chicken and would feed me chicken as I was typing, since we absolutely had to finish the script by Monday morning." "There was a very rigid deadline for this film since Fabio Testi, or De Rita," "I don't remember which, were under contract for another movie." "So we were forced to begin at a set time." "The producer forced me to stay glued to Montefiori for 2 days, in order to get the script done." "I remember I'd go get him stuff to eat - he ate a lot, since he's very tall - he still eats a lot..." "I'd go get him chickens that I'd hold up to his mouth as he was writing..." "That was also to keep him awake so he'd finish." "Three days without sleep, with Montefiori eating chicken non-stop and me trying to keep him awake..." "Smells good, doesn't it?" "Try it..." "You cowardly bastard!" " No!" "Let him eat in peace..." "Come on... eat up..." "You've eaten enough to choke a horse..." "You've killed him, you idiot!" "He's worth a million dollars and you've killed him!" "Fun like this is worth even two million!" "So I'll kill you instead, you bastard!" " We have to go, Haggard, or else..." "Leone's dead and there's nothing we can do about it." ""Tough to Kill" I made with Giuseppe Zaccariello, who'd made a film before that called "The Bermuda Triangle" or something like that." "It was a big success." "He had a story by Donati, a great story, which we sort of ruined..." "In fact the film wasn't too good, because the script we got out of it was no good." "Zaccariello wanted to change some things, and in fact the film suffered because of that." "But it was an action film with Donald Brough, Luke Merenda," "Where did you shoot the film?" " ln Santo Domingo." "Did you go there just to shoot this film, or did you shoot anything else?" "Just to shoot this one." "I'd been in Santo Domingo for a lot of other things," "I'd shot "Papaya dei Caraibi", "Erotic Nights of the Living Dead", etc." "All these films, "Papaya" and "Erotic Nights" and so on, including "Hard Sensation", include horror elements, apart from their erotic content." "In "Erotic Nights of the Living Dead"" "where the horror elements come to the fore, riding on the success of films like Lucio Fulci's "Zombie 2"." "Yes." "This was just to wring as much emotion out of it as possible, you might say." "That's the only reason." "Aristide's talent was..." "The first film he worked on as director, as director and producer, was made in Santo Domingo." "I don't know if I've already told this story." "We'd gone to Santo Domingo, invited there by Aristide, to make a series of three movies." "One was supposed to be a serious film, and the other two were sort of erotic, movies you don't have to do much work to make." "He showed me pictures of Santo Domingo, which I liked, so I went there, really for a vacation." "While we were shooting these three films, I was crazy about gambling at the time, and I lost my entire pay for the these films and all the other money I had in a week." "So I was penniless at the end of the first week." "Not even enough to pay for the hotel room." "In fact I had to share a room with Dirce Funari, one of the actresses, despite the fact that we weren't romantically involved." "I'd be sleeping at 4 a.m., she'd come in - we caught some sleep when we could." "Since I had no money, and Aristide refused to give me an advance on other jobs, I tried to convince him to do another movie." "I said, "Why don't you shoot something of your own?" "You have the actors, the location..." So while we were shooting the other films - we'd do a scene, change our clothes, shot the scene of another film - to use the same set" " I'd be the good guy one minute and the bad guy the next" " So I said, "Let's do another story." "You can bring home another film that's all yours when we leave."" "He said, "No, I don't have a story..." and I'd say "I'll write it for you."" "So we agreed on my salary, and in 3 days I wrote "Sesso nero"." "When it came out it made a lot of money." "He read it, liked it, and made it." "I played a small part, as a nightclub manager, in a scene we shot back in Rome, however." "I was paid two million lira." "It cost him about 20 million to make." "It ended up making hundreds of millions, a great success." "That was the first film produced and directed by Aristide." "Of course he'd directed others, but none that were completely his." "Massaccesi's filmography is distinguished as much by horror as by erotic works." "His horror films have earned him an international reputation as on of the genre's most interesting directors." "But his horror films represent a small part of his vast production." "Few, but especially valuable films, such as "Buio Omega", from 1979, six years after his first and successful experiment in the gothic genre," ""Death Smiles at Murder"."Beyond the Darkness" is also inspired by" "Italian horror films of the 60's. "Beyond the Darkness" is nearly a remake of Mino Guerrini's film, "Il terzo occhio"." "Guerrini, in fact, is responsiblefor the screenplay of this new version." "But similarities between "Beyond the Darkness", and Guerrini's 1967 film end here." "At least on the surface." "Massaccesi, in recounting this story of necrophiliac love, as Guerrini had done before him, adds his own brand of exceptionally perverse and sick atmospherics, and an extremely black sense of desolation." "The film's gore, which made it famous, is less impressive, in the end, than the subterranean, nightmarish world in which the main character lives, next to the embalmed corpse of his girlfriend, Cinzia Morreale." "That was a great experience." "I made that with Ermanno Donato, too, he was the producer." "People think I shot scenes of a real autopsy." "But there's no sense in going to shoot a real autopsy, since everything's made up." "There's no point." "I shot it by going to the butcher near where we were shooting, and buying pounds and pounds of innards." "We shot close-ups of these innards." "We did the scene of the incision" " I learnt this from Giannetto de Rossi, who was and probably still is a great make-up artist - using pork rind." "We'd go buy loads of pork rind, that we'd lay over the body, completely covering the breasts or wherever it was, and then we could cut without worries, having placed some protective stuff underneath, of course, since without it we'd have" "cut her belly open along with the pork rind..." ""Beyond the Darkness" was re-issued then in '86 as "In quella casa buio omega"." "Both versions, the 1976 one and that one, were edited versions of the film that made the rounds abroad." "Was that your doing, or was it the result of censorship cuts?" "It was the censors." "They determined that it was too violent." "The sexual elements were also determined to be too explicit also." "So they made a lot of cuts." "What do you think of censorship in general?" "It doesn't exist anymore." "It's been completely abolished, unfortunately." "It's unfortunate because back then, when a porno film came out, the fact that it was in some way "banned" acted as an added incentive to seek it out, since there was that taboo element." "You earned more money, because of the banning of the movie." "But censorship, in my opinion, is anachronistic, it's hard to understand why an 18-year-old kid who can get sent off to war to be killed, can't go see two people making love." "It's a hold-over from ancient times." "In your opinion, is it true that a scene that's particularly violent and gory can harm the tension you want to maintain in the film?" "That is, is it better to have a film with more violence and gore that lacks tension, or vice-versa?" "Can you reconcile the two things?" "Of course you can reconcile them, since - well, it's well known how women or girls close their eyes during scenes that are particularly violent." "Well, something that comes just before convinces them, in fact, to close their eyes!" "Let's look at another film that's especially crude: "Anthropophagus"." "This is one of the films that made your name abroad." "How did the idea of shooting a horror film during a period when you were doing mainly porn come to you?" "Well, Montefiori once again wrote the story." "It was very good." "The film was made precisely to sell in other countries." "We went to Greece to shoot certain parts, also to give it a certain international flavor." "Something interesting about Anthropophagus:" "There's a scene we shot in some 2000 year old Roman catacombs." "In the niches of these catacombs, there are niches carved into the walls, there are the corpses of the Christians buried there." "After 2000 years there were a few skulls, some bones..." "When we went to shot there, I sent someone to rent gunny sacks full of fake, plastic bones to add to the real ones, in order to make the catacomb much more macabre looking." "So we placed rented, plastic skulls and bones all over." "There were three huge sacks of them." "When we finished the day's shoot," "I said, Let's gather all the fake bones up and go." "The guy who was gathering up all the bones took everything." "He even took the real bones that had already been there." "So I found it all stored at my house, in a space on the ground floor, even the ancient Christian bones mixed up with the fake ones." "And when we returned the fake, rented bones to the shop, they found the real ones mixed in, and brought those back to me, because they couldn't bring themselves to bring them back to the Catacombs." "So I ended up with these bones, enough to build myself a little ossuary." "Maybe someday someone will want to make a pilgrimage to my house..." "He had a story he got from someone I don't remember, that began pretty well." "There was a boat in the middle of the ocean, with a man, a woman and a child who'd died or fainted, three castaways." "From those elements we had to invent the rest, there was just that." "So I took that scene to use as a recurrent flashback in order to tell the story of this group of people going to an island where this man had gone crazy after he'd eaten his son, during the time at sea and so on..." "The film was basically quite banal." "I've really never liked it." "I mean, I had fun making it..." "The scene, for example, with the fetus and Serena Grandi... the cruder things got, the harder we laughed!" "But I honestly can't say I'm proud of that film." "I can imagine Aristide who shot the film using a rabbit..." "Yeah, with a rabbit..." "The people who were a bit shocked by the film were the actors who didn't yet know him." "He had a language all his own." "He'd talk about the crudest things in the sweetest voice." "There was an enormous contrast." "You can imagine a director who comes up to you and says sweetly, "Please spread your thighs and put this dead rabbit..."" "He wasn't vulgar at all, he was very kind." "But he'd say the damnedest things!" "So they go like this for a second..." "But in the end everyone did what he told them to." "The film included the very young Serena Grandi, who used a pseudonym." "How did you get in touch with the actress?" "A distributor practically forced me to take her, I can't remember the name." "This distributor sent her to me saying she was a young actress who might make it big." "Serena Grandi..." "There was the scene with the fetus," "Montefiori rips the baby right out of her and eats it..." "Everybody has wild ideas about that scene... it was just a rabbit we bought at the butchers on the corner, the ones hanging on hooks..." "We shaped it so that it looked like a fetus, and put a little blood on it to make it look real, fake blood, of course..." "And we had Montefiori eating this dead rabbit..." "Tisa Farrow is an actress who'd already done "Zombie 2" and Margheriti's" ""The Last Hunter"." "How did you get her?" "I contacted her because I'd seen her in those other movies, Fulci's "Zombie"." "She had a very genuine face, especially good in a horror film." "She wasn't a great beauty, but she was intriguing." "I got in touch with her through my brother, who'd been in a relationship with her." "So I called her and she came to Italy for the movie." "To tell the truth, she wasn't a professional actress, not really." "She was professional when she was working, but when she wasn't acting she worked as a taxi driver in New York." "She did that even though she was Mia Farrow's sister..." " Yes." "And Saverio Vallone?" " Saverio Vallone was chosen because he was a handsome kid, so we chose him." "Where did you shoot "Anthropophagus"?" "We went to Greece, a very short trip." "But we shot the rest at Sperlonga, which seems like a Greek village by the sea." "Claudio Bernabei and I were in back of a couple at the Metropolitan Cinema in Rome, there were maybe four people in the whole place." "Just those two in front of us, quietly watching the film." "When we got to the scene of the rabbit ripped out of Serena's womb, they got up in disgust, I can't remember their comments, and walked out." "Claudio and I were the only ones watching the rest." "The movie had only a 2 day run..." "The film was completely panned by the Italian critics, like all my films to tell the truth." "There was never a single one they liked, never." "In other countries it had a great success, and is still talked about." "It was such a success that you made a sequel." " Yes, a sequel..." "A film first called "Rosso sangue", and then "Absurd"." "It was really a prequel to "Anthropophagus", with Montefiori without the monster makeup." "There was Montefiori, and then the actor who played the priest who's chasing him here..." "Edmund Purdom." "You've worked with him a lot." " Yes, a bunch of times." "He was well-known, but he wasn't very good, not really." "But he did The Egyptian, an American film that was a big hit, so for that reason we hired Purdom." "For a cameo." "Anyway, he was always professional, a professional actor in short." ""Absurd" is memorable for another reason, also." "There for the first time you meet Michele Soavi, who played a small part, one of the motorcyclists." "Then you went on to have a relationship that was..." "Michele Soavi's a kid who loves to make horror films." "I think he's one of the best young directors in Italy." "In "Absurd" I tried to do a little bit more." "But later on I lost that enthusiasm as it became clear that it would end up being something with a little bit less, as usual." "He always went for the bone, never wanted to experiment." "I remember I tried..." "How did you meet Aristide?" "He phoned me one day, I remember, and said, "Listen, Pierluigi, I want to make a film." "Come to my office and we'll talk."" "I said, "Listen, Mr. Massaccesi" - since I didn't know him - "Listen," "I don't work on those kinds of movies." He said "No, you idiot, it's an adventure picture." So I went over, and we hit it off." "Can you shoot a gun if necessary?" "I do, but the others don't." "If you shoot a man, the only thing you see is a body falling." "But someone who's telepathic feels the mind of the dying person invaded with pain and terror." "It's as if he were dying, too." "He knew his stuff inside and out, having worked as cameraman and so on." "He knew how to frame a scene, even with a low budget for lighting etc." "He knew his trade completely." "Was there a problem wearing those heavy clothes?" "Yeah, they'd put very thick clothes on me, and boots that weighed a ton." "So I had a bit of a hard time walking and so on." "But when you saw the movie, it looked all right..." "Yeah, he'd make fun of me during the shoot, saying "Look how you walk you clumsy fool" and that kind of thing." "Then the American buyer came and told him "That guys walks really well, gosh!" - so I wore those boots for every film, in order to walk that way..." "You remember another film you did with Aristide, but directed by Montefiori?" "I vaguely remember it..." "Your character is killed halfway through, you were playing a good guy ..." "Do you remember whether Montefiori directed the whole film, or was part of it directed by Aristide?" "No, I think Montefiori directed the whole thing." "Aristide was good with that sort of thing." "When he's entrusted the direction to someone, he didn't interfere with it, unlike the usual producer." "To be honest, when he said, "Let's direct it together", I answered" ""No, I'll direct, and you can watch and learn how it's done."" "He got really pissed off." "No, I told him that the first day on the set." "On the first day of the shoot, we were in the basement of the Hilton hotel, you know, where there are all the pipes, for heating and so on - in order to shoot a strange scene, like out of James Bond " "Aristide and Donatella were on the set." "He stood there like this, watching me." "He wanted to see what I would say." "Then the cameraman showed up, and I said "Put the camera here, with this lens, then we'll do a dolly shot..."" "And he was totally quiet." "After five minutes I was thinking he'd come up..." "I was saying to myself "it's impossible for him to hold his tongue"." "And in fact he comes up and goes "why'd you put the camera there?"" "I said "Aha!" "Aristide!" I must say that I hadn't asked him for a salary as director." "When he'd proposed we direct together, I knew it was because he didn't want to pay me!" "So I said, "I'll direct"." "He started to object and I told him to pay me an assistant director's salary." "I didn't care about the money - at the time I didn't give a damn about money." "So when he came up to me and asked why I'd placed the camera there" "I said: "Ari, you're paying me to direct, not to teach you how to direct."" "He got really pissed off, called me every name in the book and split." "Afterwards he didn't appear on the set anymore..." "But I must say he always let me work in peace, since of course he knew me." "The thing that was fun for me was to do something that everyone said couldn't be done." "We'd just answer:" ""It can be done, don't worry"." "Tell us about the series of the three "Ghosthouse" movies..." "Which one were you most pleased with?" ""Ghosthouse 4"." "Umberto Lenzi made one." "Fabrizio Laurenti made another that was the one that made the most money and was the best... since Linda Blair was in it, David Hasselhoff, and a lot of actors that really stood out in that kind of movie..." "And perhaps the place it was shot in, a nice place in Massachusetts..." "Then we did another "Ghosthouse" with Fragasso, which didn't do too well..." "That was "Ghosthouse 5"." "Anyway they weren't a great success." "What do you think of Fulci's films?" "Fulci's films were the best I produced." "Unfortunately the ones I worked on weren't so successful, maybe because of distribution problems, or financial problems and so on..." "Even that one was affected..." "It didn't do well, even if I think it's the best film I've worked on." "It was a great film, with a great atmosphere, Fulci's very good so the shoot went great, with John Savage, and we brought a jazz band in to do the music, since there was a jazz soundtrack..." "We had helicopters..." "But it didn't make a single cent..." "But it's probably not the movie's fault." "It's maybe the fault of the mess we'd found ourselves in at the time." "How was it with Fulci and D'Amato?" "What's the difference between them?" "Working with them?" "It's hard to answer that question." "Aristide was more sort of part of the trade." "He had less illusions." "He was like a guy born on a movie set." "Fulci had his intellectual side." "Fulci might say stuff, make references on the set that Aristide wouldn't dream of." "Fulci believed more in what he was doing." "They were both true professionals, they knew the pitfalls..." "Aristide was more..." "Roman." "Your last horror film, "Frankenstein 2000", also had distribution problems..." "That got caught up in the mess I referred to that happened back then." "What's your opinion of the movie?" "It's good..." " But the special effects weren't as convincing as in earlier ones." "Why do you think that was?" "Financial reasons." "When money's lacking even special effects suffer." "I also think it's an excess of ambition or presumption." "You have this presumption that makes you try things that don't turn out well." "I think I know it all sometimes when I don't really understand shit." "In keeping with the horror theme, we've spoken about 2 films," ""Killing Birds" and "Deep Blood"." "What can you say about them?" "The first one's credited to Claudio Lattanzi." " Yes." "But you were really the director." " Yes, I was really the one who made it." "Even the other one, that's signed by Rafael La Palma, I made." "That was done in order not to over-use my name." "I'd just done a film with Laurenti, so we decided to put me down as simply the producer and not have me as producer and director." "I would have signed them if I'd been paid like I was with Laurenti or Michele Soavi..." "And then I'd been hired to work with those two, who are in fact real people..." "And they didn't work out, so I had to do them..." "What about the lastest soft-core movies, "Top Girl", "Provokation"" "and "Fatal Seduction"?" "They came about in order to vary the porn offerings, and since I was in Los Angeles, and there was a huge apparatus to use..." "I think "Fatal Seduction" is more ambitious than the other two..." "Yes." " There's a quote out of "Anthropophagus"..." " Yes." ""Fatal Seduction" is a thriller, sort of, better made..." "The story's also better..." "It's entirely set in a house, a delineated space..." "The suspense is greater that way than with a film made on larger sets..." "One defect in "Fatal Seduction", I think, is that the sex scenes are shot as if they were edited porn scenes, which weighs the film down." "Yes." "That's my fault." "It's become a habit of mine." "Because..." "It's just my fault." "All my fault..." "Have critics re-evaluated Joe D'Amato films, after the initial bad reception," ""Emanuelle", for example?" "I don't think so." "In Italy we're very..." "what's the word presumptuous." "The presumption of someone who's panned a film would never admit, you couldn't do anything to get him to change that initial opinion, not even now." "Maybe some young person who comes along..." "But I think any re-evaluation now is due to nostalgia..." "The movies I made ten or fifteen years ago,the fact that they're now considered good, especially in other countries, is due to nostalgia." "We don't make them anymore." "So my films, Fulci's films or Freda's...." "Our kind is becoming extinct." "And yet not all the directors of that time are as renowned as you are now..." "That's because I made so many films, Manlio!" "I don't think it's due only to that." "Do you think you're cynical about your career?" "No, I think..." "What do you think is your greatest asset?" " My modesty, I think." "And your greatest defect?" " Modesty!"
|
2023-09-03T01:26:28.774034
|
https://example.com/article/8668
|
VH gene family utilization of anti-acetylcholine receptor antibodies in experimental autoimmune myasthenia gravis.
The immunoglobulin heavy chain (VH) gene family usage in experimental autoimmune myasthenia gravis (EAMG) model was investigated by RNA slot blot hybridization using VH gene family specific probes. Anti-acetylcholine receptor (AChR) monoclonal antibodies (mAbs) isolated from susceptible C57BL/6 and resistant BALB/c mice were found to be encoded by VH genes from at least six different families. The Vgam3.8 family was overrepresented in alpha-bungarotoxin blocking mAbs. Expression of cross-reactive idiotypes by anti-AChR mAbs was irrespective of the VH gene family usage. Strain dependent differences in susceptibility for EAMG were not reflected in an aberrant VH gene family usage of anti-AChR mAbs.
|
2024-02-26T01:26:28.774034
|
https://example.com/article/4076
|
Iraqi Christians have not only suffered genocide at the hands of the Islamic State (ISIL/ISIS), the jihadist group has vandalized and destroyed many ancient churches in an attempt to erase all traces of their existence in the cradle of Christianity.
ISIS defaced many churches, some of them hundreds of years old, and targeted other key cultural and religious landmarks, replacing crosses with their jihadi flags. Northern Iraq’s Nineveh Plains, a region in Nineveh province outside Mosul, is the historical homeland of the region’s Christian community, one of the oldest in the world.
The Clarion Project has published pictures showing “a snapshot of ISIS crimes against Iraq’s Christian community.”
“As the Iraqi army liberates territory from Islamic State jihadists they are uncovering the damage done to Iraq’s ancient Christian heritage,” notes the organization.
The Clarion Project
The pictures show the devastation inside many of the Christian Churches in Iraq.
Christian militias in Iraq have recently joined forces to fight as one force in an effort to recapture and protect their historical homeland.
A U.S.-backed force of tens of thousands of Iraqi Security Forces, Kurdish Peshmerga troops, Sunni Arab tribesman, Iran-allied Shiite militias, and Christian fighters are participating in the ongoing offensive to retake Mosul, which is also located in Nineveh province.
Iraq’s Nineveh province had once been considered home by the largest concentration of Christians and other ethnoreligious minorities in Iraq. Mosul had been the heartland of the Iraqi Christian community.
The United States and the United Nations has acknowledged that Christians and other ethnoreligious minorities in Iraq and Syria have been victims of genocide at the hands of ISIS.
|
2024-04-14T01:26:28.774034
|
https://example.com/article/8239
|
1,25-dihydroxyvitamin D3 receptors and hormonal responses in cloned human skeletal muscle cells.
Although skeletal muscle is a major calcium-regulated organ, there remains uncertainty about whether muscle is a target organ for the action of 1,25-dihydroxyvitamin D3 [1,25-(OH)2D3]. In this study we examine pure populations of clonally derived human muscle cells for the presence of 1,25-(OH)2D3 receptors and direct responses to the hormone. All of the clones tested exhibited specific [3H]1,25-(OH)2D3 binding, with values ranging from 5-70 fmol/mg protein. Scatchard analysis of binding data revealed a dissociation constant (approximately 100 pM) comparable to that of classical receptors in other target organs. The 1,25-(OH)2D3 receptors sedimented at 3.3S on hypertonic sucrose gradients. Specificity for [3H]1,25-(OH)2D3 was demonstrated on gradients by substantially better competition by 1,25-(OH)2D3 than 25-hydroxyvitamin D3 for the 3.3S receptor binding peak. The 1,25-(OH)2D3 receptor complex bound to DNA-cellulose and eluted as a single peak at 0.2 M KCl. Myoblasts and myotubes did not show significant differences in either the amount or characteristics of the 1,25-(OH)2D3 receptor. In addition to the presence of receptors, cells were tested for functional responsiveness to 1,25-(OH)2D3. Both cell types exhibited a dose-dependent induction of 25-hydroxyvitamin D3-24-hydroxylase enzyme activity after treatment of monolayers with 1,25-(OH)2D3. Incorporation of both leucine and thymidine into growing myoblasts and fused myotubes was inhibited in a dose-dependent fashion after treatment with 1,25-(OH)2D3. In summary, cloned human skeletal muscle cells contain a binding protein compatible with classical 1,25-(OH)2D3 receptors as well as functional responsiveness to 1,25-(OH)2D3 at physiological concentrations of hormone.
|
2024-05-30T01:26:28.774034
|
https://example.com/article/4227
|
UK borrowing running more than 25pc over target
Government borrowing for the first five months of the financial year is
running at more than 25pc above target, official figures showed as the
deficit in August hit a record high, casting further doubt over the
Chancellor's debt reduction goals.
In the five months to August, and excluding the one-off savings created by the Royal Mail pension fund and the Bank of England’s Special Liquidity Scheme, the Government has borrowed £61.3bn – 26.7pc more than in the same period last year. The official borrowing target for the whole year is an increase of just 0.5pc.
Economists said the scale of the current overshoot, which has been caused by falling tax receipts and rising spending, is so large that the Chancellor will not be able to claw it back in the final seven months.
<noframes>Interactive chart: National debt</noframes>
Both the British Chambers of Commerce and the CBI expect the Government to borrow £20bn more than planned this year, while IHS Global Insight UK economist Howard Archer said that “if this trend were to continue, borrowing would come in at £25bn above target”.
The bleak picture on borrowing, which is on course to rise sharply despite £18bn of austerity this year, threatens to undermine the Chancellor’s fiscal rules. “It is likely in his autumn statement that he will either have to acknowledge that he will be unable to start bringing down debt as a percentage of GDP by 2015/16,” Mr Archer said.
Sir Mervyn King, the Governor of the Bank of England, has also suggested that the debt reduction target will be missed, but he claimed that abandoning the pledge would be “acceptable” as long as it was due to a slowdown in global growth.
Despite the warnings, borrowing in August was marginally lower than expected. Although it hit a record of £14.41bn, slightly up from £14.37bn in August last year, economists had feared borrowing would hit £15bn in the month.
However, the figures were helped by revenue from the sale of Olympic tickets, which were booked in the month and trimmed borrowing by £500m, the Office for National Statistics said.
The national debt edged up to £1.04 trillion, or to 66.1pc of GDP.
The public finances have been hit by weak tax receipts and higher spending as a result of slower growth. In August, receipts were £41.4bn, a 1.8pc fall on the same month last year. For the first five months together, though, receipts have been 0.4pc higher. Spending in August was 2.5pc higher than last year at £52.5bn, and is so far 3pc higher than for the year to date in 2011.
Net investment in capital projects in August was 5.1pc higher in August at £1.7bn and, excluding the Royal Mail and SLS effects, is £1.2bn so far this year – £1.2bn more than in 2011.
Chris Leslie, Labour’s shadow Treasury minister, said: “These figures show that the deficit is rising because the Government’s economic plan is failing.”
The Telegraph Investor
Editor's comment:
Priced to be great value for new investors and those with large portfolios.
|
2024-01-18T01:26:28.774034
|
https://example.com/article/4042
|
## 1.0.5 (09 May 2014)
FEATURES
- Provision for windows VM.
- Windows VM has to be specifically mentioned in the Vagrantfile with
`config.vm.guest = :windows`
- Chef, Puppet and Shell provision for Linux and Windows VM.
- **SyncedFolders**
- Linux VM uses `rsync` and has be mentioned in the VagrantFile.
- Windows VM will default to use PowerShell to copy files.
IMPROVEMENTS
- Better exception handling when VM fails to get created in cloud.
- Better exception handling for WinRM session errors.
BUGFIXES
- Cleaned up few typo in README
- Compatible with Vagrant 1.6 [GH-15]
## Previous
See git commits
|
2024-06-09T01:26:28.774034
|
https://example.com/article/4176
|
Q:
Mongoose : update collection with previous data
I am learning NodeJs and for a demo project i need to use MonGoDB with Mongoose.
I created a collection for a photo album.
The first row is : albumName and the second row is : pictures.
I don't undersand how i can save all my pictures in the row pictures without erasing old entries.
It will be awesome if i can work like this. So i can fetch all data (and pictures) of a album with one query :-)
the results must be an output like this :
{
album : album1,
pictures{
1.jpg,
2.jpg,
3.jpg
}
}
Actually, the update query for a album look like this :
I save big pictures and thumbnail pictures
uploader.on('end', function() {
console.log("done uploading big pics");
//SAVE DB
AlbumPhoto.update({album:'album1'}, {$set: {pictures:file_name}}, function(err, data){
if(err){
console.log(err);
}
})
});
uploader2.on('end', function() {
console.log("done uploading mini pics");
//SAVE DB
AlbumPhoto.update({album:'album1'}, {$set: {pictures:mini}}, function(err, data){
if(err){
console.log(err);
}
})
});
Someone can give me the directives and a example to do that?
A:
First of all the schema you posted is off, should be
{
album : "album1",
pictures: [
1.jpg,
2.jpg,
3.jpg
]
}
note "pictures" is an array not an object.
You can add to the array with
//SAVE DB
AlbumPhoto.update({album:'album1'}, {$push: {pictures: "new.jpg"}}, function(err, data){
if(err){
console.log(err);
}
})
|
2024-07-16T01:26:28.774034
|
https://example.com/article/4327
|
<?php
/*
* This file is part of Flarum.
*
* For detailed copyright and license information, please view the
* LICENSE file that was distributed with this source code.
*/
namespace Flarum\Post;
use Flarum\Event\ConfigurePostTypes;
use Flarum\Foundation\AbstractServiceProvider;
class PostServiceProvider extends AbstractServiceProvider
{
/**
* {@inheritdoc}
*/
public function boot()
{
CommentPost::setFormatter($this->app->make('flarum.formatter'));
$this->registerPostTypes();
$events = $this->app->make('events');
$events->subscribe(PostPolicy::class);
}
public function registerPostTypes()
{
$models = [
CommentPost::class,
DiscussionRenamedPost::class
];
$this->app->make('events')->dispatch(
new ConfigurePostTypes($models)
);
foreach ($models as $model) {
Post::setModel($model::$type, $model);
}
}
}
|
2023-12-19T01:26:28.774034
|
https://example.com/article/6205
|
Q:
Bind ASP.net object fails on test server, but not dev
I am getting the following error for an item in a GridView:
**A call to Bind was not well formatted. Please refer to documentation for the correct parameters to Bind.
**
<ItemTemplate>
<asp:LinkButton ID="lnkColumn" runat="server" CausesValidation="False" CommandName="Select"
Text='<%# Bind("TableName.Column") %>' />
</ItemTemplate>
I can't work out why it works fine on my dev server, but not on the test machine. It also works on the production box? We are running ASP.NET 3.5 for the website.
A:
I found the solution. The test server was the only one without .NET 3.5 SP1. I installed the SP and rebooted - problem solved.
|
2023-09-26T01:26:28.774034
|
https://example.com/article/2862
|
The place of annihilation anxieties in psychoanalytic theory.
Survival-related clinical reports are abundantly found in the works of classical, object-relational, and self psychological writers, but are underrepresented in major theoretical formulations on anxiety. Fears of being overwhelmed, merged, penetrated, fragmented, and destroyed, as contents of unconscious and conscious fantasies, are regularly interrelated with the typical dangers. Fifteen preliminary propositions invite closer study of such apprehensions and provide definitional components. Annihilation anxieties are triggered by survival threat; are found early but can be engendered throughout the life cycle; constitute a basic danger; are residuals of psychic trauma; have specifiable subdimensions; may occur in presymbolic form or be associated with fantasies in conflict/compromise formation; may arise with or without anticipation; may be accompanied by controlled or uncontrolled anxiety; are motives for defense; and may be associated with particularly recalcitrant resistances. The study of annihilation anxieties in relation to the basic danger series has both theoretical and clinical advantages, especially for understanding traumatic, anxiety, phobic, psychosomatic, addictive, narcissistic, borderline, and psychotic manifestations, as well as sexual problems (including perversions), nightmares, dissociative and panic states, and especially difficult resistances.
|
2024-02-06T01:26:28.774034
|
https://example.com/article/9346
|
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.