text
stringlengths
12
4.76M
timestamp
stringlengths
26
26
url
stringlengths
32
32
Monsall tram stop Monsall is a tram stop on the Oldham and Rochdale Line (ORL) of Greater Manchester's light-rail Metrolink system in the Monsall area of Manchester in North West England. It was built as part of Phase 3a of the system's expansion, on the route of the former Oldham Loop Line, and opened to passengers on 13 June 2012. The station is on the ex-Lancashire and Yorkshire Railway's Cheetham Hill Loop line between the former Thorpe's Bridge Junction (near Newton Heath TMD) and Irk Valley Junction, where the Oldham route joins the line from Bury en route to Victoria. The line through the station had previously been used by Manchester to and Leeds services via the Caldervale Line to avoid the notorious Miles Platting incline and also by trains accessing the Red Bank carriage sidings until its closure in 1998 as part of the Manchester North re-signalling scheme. Service pattern 12 minute service to with double trams in the peak 12 minute service to with double trams in the peak 6 minute service to with double trams in the peak Connecting bus routes The 151, operated by Stotts tours, stops nearby and runs between Hightown and Hollinwood. References External links https://web.archive.org/web/20120211143030/http://www.lrta.org/Manchester/Oldham_Rochdale.html Metrolink stop information Monsall area map Category:Tram stops in Manchester Category:Railway stations opened in 2012 Category:Tram stops on the East Didsbury to Rochdale line
2024-06-19T01:27:13.970301
https://example.com/article/9122
Estimation of the design effect in community intervention studies. This paper considers the estimation of the variance of a mortality rate in community intervention studies with little or no replication of intervention regimens. Our approach in estimation of this cluster sampling variance is to determine the variance for simple random sampling and multiply it by a design effect which we calculate with use of information obtained from other sources. When the county is the unit of randomization and the outcome is mortality, we calculate the design effect as the ratio of the age adjusted mortality rates for single stage cluster sampling relative to simple random sampling; we use information from all counties in a state in the calculations. We apply this approach empirically for breast cancer mortality. We found that these design effects were dependent on length of time for accumulation of deaths (1.1 for one year up to 3.5 for eight years) and were quite consistent for the three states and nine years considered in the investigation. We present a model that accounts for the time dependence of the design effect and we show it provides a good representation of the observed relationship.
2023-08-25T01:27:13.970301
https://example.com/article/4795
--- abstract: 'A line pattern in a free group $F$ is defined by a malnormal collection of cyclic subgroups. Otal defined a decomposition space $\mathcal{D}$ associated to a line pattern. We provide an algorithm that computes a presentation for the Čech cohomology of $\mathcal{D}$, thought of as a $F$-module. This answers a relative version of a question of Epstein about boundaries of hyperbolic groups.' author: - Benjamin Barrett bibliography: - 'decompositionspace.bib' title: Computing the Čech cohomology of decomposition spaces --- Introduction ============ Epstein asked whether there is an algorithm that computes the Cech cohomology of the Gromov boundary of a hyperbolic group $\Gamma$, thought of as a $\Gamma$-module. Our purpose is to answer a relative version of this question in the case of Otal’s decomposition space, a special case of the Bowditch boundary of a relatively hyperbolic group. Fix a free group $F$ of rank $n$ with free basis $\mathcal{B}$. Let $\mathcal{T}$ be the corresponding Cayley graph containing a vertex $e$ corresponding to the identity in $F$. Fix a finite set $\left\{w_i \right\}$ of words in $F$. Then the line pattern $\mathcal{L}$ associated to this set is defined to be the set of lines $\left\{gw_i^k\right\}_k$, $g \in F$. Let $\mathcal{D}$ be the associated decomposition space: this is the quotient of ${\partial_\infty}F$ by the equivalence relation that identifies the two end points of each line in $\mathcal{L}$. These objects are defined in [@Otal]. Let $q \colon {\partial_\infty}F \to \mathcal{D}$ be the quotient projection. Equivalently, $\mathcal{D}$ is the Bowditch boundary of the relatively hyperbolic group $(F, \mathcal{P})$ where $\mathcal{P}$ is a peripheral family of cyclic subgroups [@Manning]. We present an algorithm that computes the Čech cohomology of $\mathcal{D}$. $F$ acts on ${\partial_\infty}F$ and this action descends to an action on $\mathcal{D}$. This gives the cohomology groups of $\mathcal{D}$ the structure of a right $F$-module. As a corollary to our main result, we shall see that the Čech cohomology of $\mathcal{D}$ is finitely presented as an $F$-module. The Čech cohomology of $\mathcal{D}$ is defined to be the direct limit over open covers $\mathcal{U}$ that provide successively better combinatorial approximations to $\mathcal{D}$ of the singular cohomology of the nerve of $\mathcal{U}$. In Section \[sec:whitehead\] we shall see how to associate an open cover of $\mathcal{D}$ to a finite subtree of $\mathcal{T}$. Then refining to a finer open cover of $\mathcal{D}$ corresponds to taking a larger subtree of $\mathcal{T}$. We shall see that the combinatorial properties of this open cover can be read from the Whitehead graphs associated to the subtrees and that any open cover of $\mathcal{D}$ can be refined to an open cover of this form. These open covers have no triple intersections, so we immediately see that the Čech cohomology is concentrated in the 0th and 1st dimensions. In Sections \[sec:0th\] and \[sec:1st\] we show how to compute the 0th and 1st Čech cohomology respectively. Our methods rely on showing that some (large) finite subtree of $\mathcal{T}$ contains sufficient information to compute the Čech cohomology. This approach is based on the proof of [@CM Lemma 4.12]. As corollaries we show that there are algorithms that detect the connectedness of $\mathcal{D}$ and the triviality of ${\check{\mathrm{H}}}{}^1\left(\mathcal{D}, \mathbb{Z} \right)$. The former of these corollaries is proved by a different argument in [@CM]. Whitehead graphs and open covers {#sec:whitehead} ================================ For $\mathcal{X}$ a subtree of $\mathcal{T}$, let [$\mathrm{Wh}\left(\mathcal{X}\right)$]{} be the Whitehead graph of $\mathcal{L}$ at $\mathcal{X}$ as defined in [@CM]; briefly, it is a graph with a vertex corresponding to each vertex of $\mathcal{T}$ adjacent to $\mathcal{X}$ and an edge connecting a pair of vertices for each line in $\mathcal{L}$ between that pair. For more information about Whitehead graphs and their applications, see [@Manning2]. For $v \in T$ let $S^e\left(v\right) \subset {\partial_\infty}\mathcal{T}$ be the shadow of $v$ from $e$ as defined in [@CM]: the set of boundary points $\xi$ such that the geodesic $\left[e, \xi\right]$ contains $v$. These sets are open and closed and the collection of such sets as $v$ varies in $\mathcal{T}$ is a basis for the topology on ${\partial_\infty}\mathcal{T}$. \[lem:construction\] Let $\mathcal{X}$ be a finite subtree of $\mathcal{T}$ containing $e$. Then there is a covering of $\mathcal{D}$ by a collection of open sets $U_i$ in bijection with the vertices $a_i$ of ${\ensuremath{\mathrm{Wh}\left(\mathcal{X}\right)}}$ such that: - $q\left(S^e\left(a_i\right)\right) \subset U_i$, - $U_i {\cap}U_j \neq \emptyset$ iff there is an edge connecting $a_i$ and $a_j$ in ${\ensuremath{\mathrm{Wh}\left(\mathcal{X}\right)}}$, and - there are no triple intersections. We aim to construct open sets $V_i$ covering ${\partial_\infty}\mathcal{T}$ such that - $V_i$ contains $S^e\left(a_i\right)$, - $V_i {\cap}V_j = \emptyset$ iff there is an edge connecting $a_i$ and $a_j$ in ${\ensuremath{\mathrm{Wh}\left(\mathcal{X}\right)}}$, - there are no triple intersections, and - for each line $l$ in the line pattern, each $V_i$ contains either both of $l^{\pm\infty}$ or neither. Then the projection of these sets in $\mathcal{D}$ satisfies the requirements of the lemma. We build these inductively. For the first step, take $V_i^0 = S^e\left(a_i\right)$. Then, for each $i$, there are finitely many lines in the line pattern passing through $a_i$. Add to $V_i^0$ an open neighbourhood of the end point not in $V_i^0$ of each such line to obtain $V_i^1$. We do this in a way as to ensure that $V_i^1$ is the union of $V_i^0$ and finitely many other shadows, that the open sets added are all disjoint, and that no line in the line pattern has an end in two different added sets. This is possible since if a subset of ${\partial_\infty}\mathcal{T}$ is a union of finitely many shadows then only finitely many lines in the line pattern have exactly one end in that subset. After each $V_i^1$ is defined, continue inductively, ensuring that each $V_i^k$ is the union of finitely many shadows, so that if a line in the line pattern has one end in $V_i^k$ then its other end is in $V_i^{k+1}$. We can do this without introducing any new intersections, so all intersections correspond to lines from $S^e\left(a_i\right)$ to $S^e\left(a_j\right)$ for some $i$ and $j$, so all intersections correspond to edges in the Whitehead graph and there are no triple intersections. Then let $U_i = q\left({\cup}_k V_i^k\right)$; these sets cover $D$ and have the required properties. For $\mathcal{X}$ a finite subtree of $\mathcal{T}$, we shall denote by $\mathcal{U}_\mathcal{X}$ a cover of $\mathcal{D}$ associated to $\mathcal{X}$. Then if $\mathcal{X} \subset \mathcal{X}'$, $\mathcal{U}_{\mathcal{X}'}$ can be chosen to be a refinement of $\mathcal{U}_\mathcal{X}$. Note that refinement between different open covers associated to $\mathcal{X}$ as in Lemma \[lem:construction\] induces a natural isomorphism between the singular cochain complexes of the nerves of those covers. It will be convenient to define an open cover associated to the empty subtree of $\mathcal{X}$: this is the trivial covering $\mathcal{U}_\emptyset = \left\{\mathcal{D}\right\}$. \[lem:refining\] Let $\mathcal{W}$ be a finite open cover of $\mathcal{D}$. Then some refinement of $\mathcal{W}$ is of the form given in Lemma \[lem:construction\]. Let $\mathcal{V}$ be the pullback of $\mathcal{W}$ to ${\partial_\infty}\mathcal{T}$. Consider the set $$C = \left\{a \in \mathcal{T} \vert S^e\left(a\right) \subset V \text{ for some } V \in \mathcal{V}\right\}\textup{.}$$ The collection $\left\{S^e\left(x\right) \vert x \in \mathcal{T}\right\}$ is a basis for the topology on ${\partial_\infty}\mathcal{T}$ so sets of the form $S^e\left(a\right)$, $a\in C$, cover each $V \in \mathcal{V}$. Hence such sets cover ${\partial_\infty}\mathcal{T}$. ${\partial_\infty}\mathcal{T}$ is compact, so there is a finite set of points $a_1, \dots , a_n$ such that $\left\{S^e\left(a_i\right) \right\}$ covers ${\partial_\infty}\mathcal{T}$ and each $S^e \left(a_i\right)$ is contained in some $V_{\sigma\left(i\right)} \in \mathcal{V}$. Let $\mathcal{H}$ be the convex hull of $\left\{a_i\right\} {\cup}\left\{e\right\}$. Call vertices of $\mathcal{H}$ adjacent to vertices in $\mathcal{T} - \mathcal{H}$ boundary vertices. If we take $\left\{a_i\right\}$ to be minimal with its covering property then the set of boundary points of $\mathcal{H}$ is precisely $\left\{a_i\right\}$. Let $\mathcal{X}$ be the subtree of $\mathcal{H}$ obtained by pruning off its boundary vertices. Let $\mathcal{U}_\mathcal{X} = \left\{U_i\right\}$ be the finite cover of $\mathcal{D}$ corresponding to $\mathcal{X}$ as in Lemma \[lem:construction\]. Define a new set $\mathcal{U}'$ of open subsets of $\mathcal{D}$ by $$\mathcal{U}' = \left\{U_i \cap q\left(V_{\sigma\left(i\right)}\right)\right\} \text{.}$$ $\mathcal{U'}$ covers $\mathcal{D}$ since it covers $q\left(S^e\left(a_i\right)\right)$ for each $i$. It is certainly a refinement of $\mathcal{W}$ and it is easy to check that it corresponds to $\mathcal{X}$ in the sense of the statement of Lemma \[lem:construction\]. The results of this section together imply the following corollary: $${\check{\mathrm{H}}}{}^n\left(\mathcal{D}, \mathbb{Z}\right) = \varinjlim_\mathcal{X}{\check{\mathrm{H}}}{}^n \left(\mathcal{U}_\mathcal{X}, \mathbb{Z}\right)$$ with subtrees $\mathcal{X}$ ordered by inclusion. Hence the Čech cohomology of the decomposition space is determined by the finite Whitehead graphs. Computing H0(D,Z) {#sec:0th} ================= For each element $\left[\sigma\right] \in {\check{\mathrm{H}}}{}^0\left(\mathcal{D}, \mathbb{Z}\right)$ there exists a subtree $\mathcal{X} \subset \mathcal{T}$ such that $\left[\sigma\right]$ is represented by some $$\sigma \in {\check{\mathrm{H}}}{}^0\left(\mathcal{U}_\mathcal{X}, \mathbb{Z}\right) = \ker\left( d^0 \colon {\check{\mathrm{C}}}{}^0\left(\mathcal{U}_\mathcal{X}, \mathbb{Z}\right) \to {\check{\mathrm{C}}}{}^1\left(\mathcal{U}_\mathcal{X}, \mathbb{Z}\right)\right);$$ such an element is an assignment of an integer to each connected component of [$\mathrm{Wh}\left(\mathcal{X}\right)$]{}. In this situation we shall say that $\left[\sigma\right]$ is supported on $\mathcal{X}$ and we shall refer to the minimal such subtree as the support of $\left[\sigma\right]$. A unique minimal such subtree exists by the following lemma: \[lem:intersections\] Suppose that $\left[\sigma\right] \in {\check{\mathrm{H}}}{}^0\left(\mathcal{D}, \mathbb{Z}\right)$ is supported on $\mathcal{X}_1$ and on $\mathcal{X}_2$. Then it is also supported on $\mathcal{X}_1 {\cap}\mathcal{X}_2$. We prove this by induction on the number of vertices in the symmetric difference of $\mathcal{X}_1$ and $\mathcal{X}_2$. If the symmetric difference is non-empty then without loss of generality $\mathcal{X}_1$ has a leaf $v$ that is not contained in $\mathcal{X}_2$. It is easy to see that $\left[\sigma\right]$ is supported on $\mathcal{X}_1 - v$. As discussed in the introduction, $F$ acts on $\mathcal{D}$ by homeomorphisms, giving the Čech cohomology the structure of a right $F$-module. In terms of Whitehead graphs, any $g\in F$ induces a map $$g \colon {\check{\mathrm{H}}}{}^0\left(\mathcal{U}_\mathcal{X}, \mathbb{Z}\right) \to {\check{\mathrm{H}}}{}^0\left(g^{-1}\mathcal{U}_\mathcal{X}, \mathbb{Z}\right) = {\check{\mathrm{H}}}{}^0\left(\mathcal{U}_{g^{-1}\mathcal{X}}, \mathbb{Z}\right);$$ this map takes an element represented by a $\mathbb{Z}$-labelling of the connected components of [$\mathrm{Wh}\left(\mathcal{X}\right)$]{} to the element represented by the translate by $g^{-1}$ of this diagram. We now aim to find an algorithm that computes a presentation for this $F$-module. First we describe an algorithm that computes a generating set. The argument is loosely based on the proof of lemma [4.12]{} in [@CM]. \[thm:generators0\] There exists a finite number $N$, computable from $n$ and $\mathcal{L}$, such that ${\check{\mathrm{H}}}{}^0\left(\mathcal{D}, \mathbb{Z}\right)$ is generated as an abelian group by 0-cycles supported on subtrees of $\mathcal{T}$ with at most $N$ vertices. Let $\left[\sigma\right]$ be a 0-cycle supported on a subtree $\mathcal{X}$ of $\mathcal{T}$ with more than $N$ vertices, where $N$ is to be chosen later. Then by induction it is sufficient to show that $\left[\sigma\right]$ can be written as the sum of 0-cycles supported on strictly smaller subtrees. The idea is that if $N$ is large enough then there will be two vertices in $\mathcal{X}$ at which $\left[\sigma\right]$ looks similar and cutting out everything between these vertices allows us to split $\left[\sigma\right]$ into strictly smaller summands. ${\check{\mathrm{H}}}{}^0\left(\mathcal{U}_\mathcal{X}, \mathbb{Z}\right)$ is generated by 0-cycles represented by Whitehead diagrams at $\mathcal{X}$ with one connected component labelled 1 and the others labelled 0; we can assume without loss of generality that $\left[\sigma\right]$ is such a 0-cycle. Then $\left[\sigma\right]$ is can be thought of as a partition of ${\ensuremath{\mathrm{Wh}\left(\mathcal{X}\right)}}$ into a connected component and its complement. An example of such a partition is shown pictorially in figure \[fig:partition\]. (-1,0) – (1,0) node\[black,anchor=north\] [$a$]{}; (0,-1) – (0,1) node\[black,anchor=east\] [$b$]{}; (-1.2,1) node [${\ensuremath{\mathrm{Wh}\left(e\right)}}$]{}; (-0.24,0.24) node [$e$]{}; (-0.8,0.1) – (-0.2,0.1) – (-0.1,0.2) – (-0.1,0.8); (-0.8,0) – (-0.1,0) – (0.1,0.2) – (0.1,0.8); (-0.8,-0.1) – (-0.1,-0.1) – (0.1,0.1) – (0.8,0.1); (-0.1,-0.8) – (-0.1,-0.2) – (0.1,0) – (0.8,0); (0.1,-0.8) – (0.1,-0.2) – (0.2,-0.1) – (0.8,-0.1); (-2.5,1.75) node [${\ensuremath{\mathrm{Wh}\left(\mathcal{X}\right)}}$]{}; (-2.5,0) – (1,0); (-1,1.5) – (2.5,1.5); (-1.5,1) – (-1.5,-1); (0,2.5) – (0,-1); (1.5,2.5) – (1.5,0.5);; \[disc/.style=[circle,draw=red,fill=red,very thin,inner sep=0pt,minimum size=1mm]{}\] at (-0.8,1.5) \[disc\] ; at (0,2.3) \[disc\] ; at (1.5,2.3) \[disc\] ; at (-2.3,0) \[disc\] ; at (-1.5,0.8) \[disc\] ; \[disc/.style=[circle,draw=blue,fill=blue,very thin,inner sep=0pt,minimum size=1mm]{}\] at (-1.5,-0.8) \[disc\] ; at (0,-0.8) \[disc\] ; at (0.8,0) \[disc\] ; at (2.3,1.5) \[disc\] ; at (1.5,0.7) \[disc\] ; (-2.3,0) – (-2.2,0.1) – (-1.7,0.1) – (-1.6,0.2) – (-1.6,0.7) – (-1.5,0.8); (-2.3,0) – (-1.6,0) – (-1.4,0.2) – (-1.4,0.7) – (-1.5,0.8); (-0.8,1.5) – (-0.7,1.6) – (-0.2,1.6) – (-0.1,1.7) – (-0.1,2.2) – (0,2.3); (-0.8,1.5) – (-0.1,1.5) – (0.1,1.7) – (0.1,2.2) – (0,2.3); (-2.3,0) – (-2.2,-0.1) – (-1.6,-0.1) – (-1.4,0.1) – (-0.2,0.1) – (-0.1,0.2) – (-0.1,1.3) – (0.1,1.5) – (1.4,1.5) – (1.6,1.7) – (1.6,2.2) – (1.5,2.3); (-0.8,1.5) – (-0.7,1.4) – (-0.1,1.4) – (0.1,1.6) – (1.3,1.6) – (1.4,1.7) – (1.4,2.2) – (1.5,2.3); (0,-0.8) – (-0.1,-0.7) – (-0.1,-0.2) – (0.1,0) – (0.8,0); (0,-0.8) – (0.1,-0.7) – (0.1,-0.2) – (0.2,-0.1) – (0.7,-0.1) – (0.8,0); (1.5,0.7) – (1.4,0.8) – (1.4,1.3) – (1.6,1.5) – (2.3,1.5); (1.5,0.7) – (1.6,0.8) – (1.6,1.3) – (1.7,1.4) – (2.2,1.4) – (2.3,1.5); (-1.5,-0.8) – (-1.4,-0.7) – (-1.4,-0.2) – (-1.3,-0.1) – (-0.1,-0.1) – (0.1,0.1) – (0.7,0.1) – (0.8,0); (-1.5,-0.8) – (-1.6,-0.7) – (-1.6,-0.2) – (-1.4,0) – (-0.1,0) – (0.1,0.2) – (0.1,1.3) – (0.2,1.4) – (1.4,1.4) – (1.6,1.6) – (2.2,1.6) – (2.3,1.5); Suppose that $N$ is large enough that any subtree of $\mathcal{T}$ with more than $N$ vertices is guaranteed to contain an embedded arc of length at least $M+2$, where $M$ is a computable function of $n$ and $\mathcal{L}$ to be chosen later. Then let $v_1, \ldots, v_M$ be the interior vertices of such an embedded arc in $\mathcal{X}$. Traversing this arc in the direction from $v_1$ to $v_M$, record for each vertex $v_i$ an ordered pair $\left(s_i, t_i\right)$ of elements of $\mathcal{B}^\pm$, where $s_i$ labels the incoming edge at $v_i$ of the embedded arc at and $t_i$ labels the outgoing edge. Suppose that $M$ is large enough that at least $K$ of these pairs are equal. Here $K$ is a computable function of $\mathcal{L}$ to be chosen later. Then let $v_{i_1}, \ldots, v_{i_K}$ be vertices with equal associated edge pairs. The edges of each ${\ensuremath{\mathrm{Wh}\left(v_{i_j}\right)}}$ extend to edges in ${\ensuremath{\mathrm{Wh}\left(\mathcal{L}\right)}}$, hence the partition of [$\mathrm{Wh}\left(\mathcal{L}\right)$]{} associated to $\left[\sigma\right]$ gives a partition of the edges of ${\ensuremath{\mathrm{Wh}\left(v_{i_j}\right)}}$ into a subset and its complement. Treating the $v_{i_j}$ as elements of $F$, the translation of ${\ensuremath{\mathrm{Wh}\left(v_{i_j}\right)}}$ by $v_{i_j}^{-1}$ gives a partition on the edges of ${\ensuremath{\mathrm{Wh}\left(e\right)}}$. There is a finite number of such partitions; let $K$ be greater than that number. Then we obtain $v, w=g\left(v\right) \in \left\{v_{i_1}, \ldots v_{i_K}\right\}$ such that these translates of the associated partitions agree. Now we define two disjoint subsets of $\mathcal{X}$. Let $A$ be the vertices $u \neq v$ of $\mathcal{X}$ such that the geodesic in $\mathcal{T}$ from $w$ to $u$ passes through $v$, and let $B$ be the same with the rôles of $v$ and $w$ reversed. Without loss of generality, $A$ contains at least as many vertices as $B$ does. Then let $A' = A {\cup}\left\{v\right\}$. See figure \[fig:cutting\]. (-4,0) – (4,0); (-4,1.5) – (-2,1.5); (2,1.5) – (4,1.5); (-3,-1) – (-3,2.5); (-1.5,-1) – (-1.5,1); (0,-1) – (0,1); (1.5,-1) – (1.5,1); (3,-1) – (3,2.5); \[disc/.style=[circle,draw=gray,fill=gray,very thin,inner sep=0pt,minimum size=1mm]{}\] at (-1.74,0.24) [$v$]{}; at (1.26,0.24) [$w$]{}; at (-1.5,0) \[disc\] ; at (1.5,0) \[disc\] ; in [-1.5,1.5]{} (-0.7+,0.1) – (-0.2+,0.1) – (-0.1+,0.2) – (-0.1+,0.7); (-0.7+,0) – (-0.1+,0) – (0.1+,0.2) – (0.1+,0.7); (-0.7+,-0.1) – (-0.1+,-0.1) – (0.1+,0.1) – (0.7+,0.1); (0.7+,-0.1) – (0.2+,-0.1) – (0.1+,-0.2) – (0.1+,-0.7); (0.7+,0) – (0.1+,0) – (-0.1+,-0.2) – (-0.1+,-0.7); (-4.25,-1.25) rectangle (-0.5,2.75) node\[anchor=north east\] [$A'$]{}; (2.5,-1.25) – (4.25,-1.25) – (4.25,2.75) – (1.75,2.75) – (1.75,0.25) – (2.5,0.25) – cycle; (4.25,2.75) node\[anchor=north east\] [$B$]{}; We now cancel off the part of $\left[\sigma\right]$ supported on $A$. Let $\mathcal{Y} = A' {\cup}vw^{-1} B$, where we treat $v$ and $w$ as elements of the group $F$. As described above, $\sigma$ induces a partition on the edges of ${\ensuremath{\mathrm{Wh}\left(u\right)}}$ for each vertex $u$ in $A'$ and $B$, and hence by translation on ${\ensuremath{\mathrm{Wh}\left(u\right)}}$ for each vertex $u$ in $\mathcal{Y}$. The partitions at $v \in A'$ and the vertex of $vw^{-1}B$ adjacent to $v$ are consistent with respect to the splicing map, so we obtain a partition of the graph ${\ensuremath{\mathrm{Wh}\left(\mathcal{Y}\right)}}$. Hence we can define $\tau \in {\check{\mathrm{H}}}^{0}\left(\mathcal{Y}, \mathbb{Z}\right)$ to be a cycle represented by assigning the integer 1 to one component of ${\ensuremath{\mathrm{Wh}\left(\mathcal{Y}\right)}}$ and 0 to the others in a way that agrees at the vertices of $A'$ with the labelling of components represented by $\sigma$. Then $\left[\tau\right]$ is supported on $\mathcal{Y}$, which contains at most $\left|A'\right| + \left|B\right| < \left|\mathcal{X}\right|$ vertices, and $\left[\sigma\right]-\left[\tau\right]$ is supported on $\left( \mathcal{X} - A\right) {\cup}g^{-1}B$, which has fewer vertices than $\mathcal{X}$ since $A'$ has more vertices than $B$. We can give bounds on the function $N\left(\mathcal{L}, n\right)$ explicitly: let $k$ be the number of edges in ${\ensuremath{\mathrm{Wh}\left(e\right)}}$; this is equal to the sum of the lengths of the words that generate $\mathcal{L}$. Then: $$\begin{aligned} N &= \left(2n\right)^{\left(2n\right)^2\left(2^k+1\right)+1}\left(1+2n\right)+1\end{aligned}$$ ${\check{\mathrm{H}}}{}^0\left(\mathcal{D}, \mathbb{Z}\right)$ has a computable finite generating set. Theorem \[thm:generators0\] implies that ${\check{\mathrm{H}}}{}^0\left( \mathcal{D}, \mathbb{Z} \right)$ is generated as an $F$-module by the set of 0-cycles supported on subtrees of the ball of radius $N$ centred at $e$. If $\mathcal{X}$ is this ball then ${\check{\mathrm{H}}}{}^0\left(\mathcal{U}_\mathcal{X}, \mathbb{Z}\right)$ has a computable finite generating set as a $\mathbb{Z}$-module, since ${\ensuremath{\mathrm{Wh}\left(\mathcal{X}\right)}}$ can be partitioned into its connected components algorithmically. There is an algorithm that determines whether or not $\mathcal{D}$ is connected. This corollary is proved by a different argument in [@CM]. In that paper it is shown that, after simplifying ${\ensuremath{\mathrm{Wh}\left(e\right)}}$ as much as possible using Whitehead moves, $\mathcal{D}$ is connected if and only if ${\ensuremath{\mathrm{Wh}\left(e\right)}}$ is connected. $\mathcal{D}$ is connected if and only if ${\check{\mathrm{H}}}{}^0\left( \mathcal{D}, \mathbb{Z}\right)$ is generated by the cochain supported on the trivial covering that assigns the integer $1$ to the only open set in that covering; in this case it is isomorphic to $\mathbb{Z}$ with trivial $F$ action. Equivalently, $\mathcal{D}$ is connected if and only if any $\sigma \in {\check{\mathrm{H}}}{}^0\left(\mathcal{U}_\mathcal{X}, \mathbb{Z}\right)$ is represented by the assignment of the same integer to each component of ${\ensuremath{\mathrm{Wh}\left(\mathcal{X}\right)}}$ for all subtrees $\mathcal{X} \subset \mathcal{T}$. It is sufficient to check this on a generating set, and we have already shown that ${\check{\mathrm{H}}}{}^0\left( \mathcal{D}, \mathbb{Z}\right)$ has a computable finite generating set. We now have an algorithm that gives a finite set $\left[\sigma_1\right], \ldots , \left[\sigma_k\right]$ of cohomology classes that generate ${\check{\mathrm{H}}}^0\left(\mathcal{D}, \mathbb{Z}\right)$ as a right $F$-module. This is equivalent to a surjection $\left(p \colon \mathbb{Z}F^k \to {\check{\mathrm{H}}}^0 \left( \mathcal{D}, \mathbb{Z}\right)\right)$ of right $F$-modules. Let $e_i$ be the $i$th basis vector in the free module, and let it be mapped to $\left[\sigma_i\right]$ under $p$. To complete the computation of a presentation for of ${\check{\mathrm{H}}}^0\left(\mathcal{D}, \mathbb{Z}\right)$ we need an algorithm that computes a generating set for the kernel of $p$. For each $\left[\sigma_i\right]$ let $\mathcal{X}_i$ be the support of $\left[\sigma_i\right]$ is supported. A general element $x \in \mathbb{Z}F^k$ is of the form $$\begin{aligned} \label{eqn:freemodule} x = \sum\limits_{i, j} n_{ij}\left(e_{j}g_{ij}\right), \text{where $n_{ij} \in \mathbb{Z}$, $g_{ij} \in F$}.\end{aligned}$$ Define the support of $x$ to be $$\begin{aligned} {\mathrm{hull}}\left(\bigcup\limits_{i, j} g_{ij}^{-1}\mathcal{X}_j\right).\end{aligned}$$ Note that the support of $px$ is contained in the support of $x$. We can now state and prove a theorem that shows that the kernel of $p$ is generated by elements of bounded size, in the same way that Theorem \[thm:generators0\] shows that ${\check{\mathrm{H}}}{}^0\left(\mathcal{D}, \mathbb{Z}\right)$ is generated by elements of bounded size. \[thm:relators0\] $\ker p$ is generated as an abelian group by elements whose supports have at most $N$ vertices, where $N$ is a computable function of $\mathcal{L}$ and $n$. Our approach here is similar to that in the proof of Theorem \[thm:generators0\]: we show that—for sufficiently large (computable) $N$—an element of $\ker p$ supported on a set with more than $N$ vertices can be written as the sum of two elements of $\ker p$ supported on strictly smaller sets. Let $D$ be the maximum of the diameters of the $\mathcal{X}_i$. Let a ball of diameter $D$ contain $L$ vertices. From the proof of Theorem \[thm:generators0\] it is clear that in picking a preimage $x$ under $p$ of an element $\left[\sigma\right] \in {\check{\mathrm{H}}}{}^0\left( \mathcal{D}, \mathbb{Z}\right)$ it might well be necessary for the support of $x$ to be strictly larger than the support of $\left[\sigma\right]$. We will need to be able to bound the size of the support of $x$ for $\left[\sigma\right]$ supported on a ball of radius at most $D$. We deal with this first. With some care, the proof of Theorem \[thm:generators0\] gives an explicit bound. At each step, the cochain is split into two pieces, each supported on a set with strictly fewer vertices. Hence, since $\left[\sigma\right]$ is supported on a set with $L$ vertices, it can certainly be written as a $\mathbb{Z}$-linear combination of at most $2^L$ elements of our generating set. So if each generator has at most $M$ vertices, any $\left[\sigma\right]$ supported on a ball of radius $D$ has a preimage supported on a set with at most $2^L M$ vertices. By construction, this set can be taken to be connected. Let $K=2^L M$. Let $N$ be large enough that any subtree $\mathcal{X}$ of $\mathcal{T}$ with at least $N$ vertices contains a vertex $v$ such that $\mathcal{X} - v$ is the union of two (disconnected) subgraphs of $\mathcal{X}$ each with at least $K+L$ vertices. For example, this holds if $\mathcal{X}$ is guaranteed to contain an embedded arc of length at least $2\left(K+L\right) +1$. Then suppose that some relator $x \in \ker p$ is supported on a subtree $\mathcal{X} \subset \mathcal{T}$ with at least $N$ vertices. Let $v$ be as in the definition of $N$. Then we aim to divide $x$ as the sum of two smaller relators by cutting at $v$. $x$ is of the form of equation \[eqn:freemodule\] and is such that $g_{ij}^{-1}\mathcal{X}_j \subset \mathcal{X}$ for each pair $i, j$. Let $A$ and $B$ be the two components of $\mathcal{X} - v$ as described above, and let $C$ be the ball in $\mathcal{X}$ of radius $D$ centred at $v$. Let $y \in \mathbb{Z}F^k$ be the sum of those summands of $x$ in equation \[eqn:freemodule\] whose supports are contained in $A$. Then the support of $y$ is a subset of $A$ and the support of $x-y$ is a subset of $B {\cup}C$. Roughly, $y$ and $x-y$ will be the two desired smaller relators whose sum is $x$. However $py \neq 0$, so we shall need to add a small correction term. In order to ensure that the correction term is indeed small (in the sense of having small support) we use Lemma \[lem:intersections\]. Since $py = -p\left(x-y\right)$, $py$ is supported on $A {\cap}\left(B {\cup}C\right) = A {\cap}C$. This is a subtree of a tree of diameter $2D$, so by assumption $py$ has a preimage $w$ under $p$ that is supported on a set with at most $K$ vertices. Then $p\left(y-w\right) = 0$ and $x = \left(y-w\right) + \left(x-y+w\right)$ so it remains to show that $y-w$ and $x-y+w$ have strictly smaller supports than $x$. But the support of $x$ has $\left|A\right| + \left|B\right| + 1$ vertices, while $y-w$ and $x-y+w$ are supported on sets with at most $\left|A\right| + K$ and $\left| B \right| + \left|C\right| + K$ vertices respectively. $\left| A \right|$ and $\left|B\right|$ have at least $K + \left|C\right|$ vertices, so this completes the proof. There is an algorithm that computes a finite presentation for ${\check{\mathrm{H}}}{}^0\left(\mathcal{D}, \mathbb{Z}\right)$. Note that $F$ acts on $\mathbb{Z}F^k$ by translation in the sense that if the support of $x \in \mathbb{Z}F^k$ is $\mathcal{X}$ then the support of $xg$ is $g^{-1}\mathcal{X}$. Hence if $N$ is as in the statement of Theorem \[thm:relators0\] then that theorem shows that $\ker p$ is generated as an $F$-module by those of its elements that are supported on a ball of radius $N$ ball centred at $e$. In other words, $\ker p$ is generated by its intersection with the set of those $\mathbb{Z}$-linear combinations of translates of the $\left\{ e_i\right\}$ by $F$ whose supports are contained in this ball of radius $N$. To find all such linear combinations is simply to solve a finite dimensional $\mathbb{Z}$-linear equation, which can be done algorithmically, for example using Smith normal form. Computing H1(D,Z) {#sec:1st} ================= ${\check{\mathrm{H}}}{}^1\left(\mathcal{U}_\mathcal{X}, \mathbb{Z}\right)$ is the quotient of ${\check{\mathrm{C}}}{}^1\left(\mathcal{U}_\mathcal{X}, \mathbb{Z}\right)$ by $d{\check{\mathrm{C}}}{}^0\left(\mathcal{U}_\mathcal{X}, \mathbb{Z}\right)$, since ${\check{\mathrm{C}}}{}^2\left(\mathcal{U}_\mathcal{X}, \mathbb{Z}\right)$ is trivial. Since taking direct limits of families of $\mathbb{Z}$-modules is an exact functor, ${\check{\mathrm{H}}}{}^1\left(\mathcal{D}, \mathbb{Z}\right)$ is also a quotient: \(a) \[matrix of nodes, row sep=3em, column sep = 2em, text height = 1.5ex, text depth=0.25ex\] [ $0$ & $d\varinjlim_\mathcal{X}{\check{\mathrm{C}}}{}^0\left(\mathcal{U}_\mathcal{X}, \mathbb{Z} \right)$ & $\varinjlim_\mathcal{X} {\check{\mathrm{C}}}^1\left( \mathcal{U}_\mathcal{X}, \mathbb{Z} \right)$ & ${\check{\mathrm{H}}}{}^1\left(\mathcal{D}, \mathbb{Z}\right)$ & $0$\ ]{}; (a-1-1) edge (a-1-2) (a-1-2) edge (a-1-3) (a-1-3) edge (a-1-4) (a-1-4) edge (a-1-5); is exact. As in the previous section, each of these abelian groups can be endowed with the structure of an $F$-module so that the homomorphisms in the short exact sequence are homomorphisms of $F$-modules. Now finding a presentation for ${\check{\mathrm{H}}}{}^1\left(\mathcal{D}, \mathbb{Z}\right)$ is equivalent to finding a presentation for $\varinjlim_\mathcal{X} {\check{\mathrm{C}}}^1\left( \mathcal{U}_\mathcal{X}, \mathbb{Z}\right)$ and a generating set for $d\varinjlim_\mathcal{X}{\check{\mathrm{C}}}{}^0\left(\mathcal{U}_\mathcal{X}, \mathbb{Z} \right)$. We present an algorithm that does the former in theorems \[thm:generators1\] and \[thm:relators1\] and an algorithm that does the latter in Lemma \[lem:image\]. As in the previous section, cochains have a convenient representation in terms of the Whitehead graph. A 1-cochain (with respect to an open cover $\mathcal{U}$) is a map that associates an integer to each pair $U_1, U_2 \in \mathcal{U}$ with $U_1 {\cap}U_2 \neq \emptyset$. Equivalently, if $\mathcal{U}$ is the open cover associated to a Whitehead graph ${\ensuremath{\mathrm{Wh}\left(\mathcal{X}\right)}}$, this is the assignment of an integer to each edge in the Whitehead graph, with the restriction that if two edges connect the same pair of vertices then they are assigned the same integer. Refinement to the open cover associated to a larger Whitehead graph preserves the labelling of the old edges, and assigns the integer 0 to each new edge. \[thm:generators1\] There is a computable function $N$ of $\mathcal{L}$ and $n$ so that $\varinjlim {\check{\mathrm{C}}}{}^1\left( \mathcal{U}_\mathcal{X}, \mathbb{Z} \right)$ is generated as an abelian group by elements supported on sets with fewer than $N$ vertices. A subset $\mathcal{X} \subset \mathcal{C}$ gives a partition $P_\mathcal{X}$ on the edges of ${\ensuremath{\mathrm{Wh}\left(v\right)}}$ for each vertex $v$ of $\mathcal{X}$: in this partition, two edges are related if those edges extend to edges between the same pair of vertices in ${\ensuremath{\mathrm{Wh}\left(\mathcal{X}\right)}}$. For each element $a \in \mathcal{B}^{\pm}$ and partition $P$ on the edges of ${\ensuremath{\mathrm{Wh}\left(e\right)}}$ there exists a subset $\mathcal{X} \subset {\mathrm{hull}}\left(e {\cup}S^e\left(a\right)\right) {\cap}\mathcal{T}$ such that $P$ is at least as fine as $P_\mathcal{X}$. Let $\mathcal{X}_{\left(a, P\right)}$ be a minimal such subset; it is easy to see that it is contained in any other subset with this property. Let $N$ be the maximum number of vertices in any $\mathcal{X}_{\left(a, P\right)}$. We now prove that $\varinjlim {\check{\mathrm{C}}}{}^1\left( \mathcal{U}_\mathcal{X}, \mathbb{Z}\right)$ is generated as an abelian group by elements supported on sets with at most $N$ vertices. Let $\left[\sigma\right]$ be a 1-cochain supported on $\mathcal{X}$ and let $\sigma \in {\check{\mathrm{C}}}^1\left(\mathcal{U}_\mathcal{X}, \mathbb{Z}\right) $ represent $\left[\sigma\right]$. Let $v$ be a leaf of $\mathcal{X}$. Then $\sigma$ defines a partition $P$ on the edges of ${\ensuremath{\mathrm{Wh}\left(v\right)}}$ by relating two edges if they are assigned the same integer by $\sigma$. $P_\mathcal{X}$ is at least as fine as $P$. By translating $P$ by $v^{-1}$ (considering the vertex as an element of the group $F$) we obtain a partition on ${\ensuremath{\mathrm{Wh}\left(e\right)}}$, which we shall also denote by $P$. Let $a \in \mathcal{B}$ be the label on the edge connecting $v$ to the rest of $\mathcal{X}$. By the definition of $N$, $\mathcal{X}_{\left(a, P\right)}$ has at most $N$ vertices. Let $\tau$ be a 1-cochain supported on this set that assigns to each edge of ${\ensuremath{\mathrm{Wh}\left(e\right)}}$ the same integer that $\sigma v$ does; note that $\tau$ satisfies the requirement that if two edges connect the same pair of vertices in the Whitehead graph then they are assigned the same integer. Since $v\mathcal{X}_{\left(a, P\right)} \subset \mathcal{X}$, $\tau v^{-1}$ is supported on $\mathcal{X}$ and then it is easy to see that $\sigma - \tau v^{-1}$ is supported on $\mathcal{X} - v$. Proceeding by induction on the number of vertices in the support of $\sigma$ we obtain the required result. This immediately implies the following corollary: $\varinjlim {\check{\mathrm{C}}}{}^1\left(\mathcal{U}_\mathcal{X}, \mathbb{Z} \right)$ is generated as an $F$-module by those of its elements that are supported on a ball centred at $e$ of computable finite diameter. To proceed to compute a set of relators for $\varinjlim {\check{\mathrm{C}}}{}^1\left( \mathcal{U}_\mathcal{X}, \mathbb{Z}\right)$ we require the following lemma, which is analagous to Lemma \[lem:intersections\]. \[lem:intersections2\] Let $D$ be the maximum of the diameters of the supports of the generators computed in Theorem \[thm:generators1\]. Suppose that $\left[\sigma\right] \in \varinjlim {\check{\mathrm{C}}}{}^1\left( \mathcal{U}_\mathcal{X}, \mathbb{Z}\right)$ is supported on $\mathcal{X}_1$ and on $\mathcal{X}_2$ where $\mathcal{X}_1$ and $\mathcal{X}_2$ are subtrees of $\mathcal{C}$ with non-trivial intersection. Then $\left[\sigma\right]$ it is also supported on a $D$-neighbourhood of $\mathcal{X}_1 {\cap}\mathcal{X}_2$. $\left[\sigma\right]$ is represented by a labelling of the edges of ${\ensuremath{\mathrm{Wh}\left(\mathcal{X}_1 {\cup}\mathcal{X}_2\right)}}$ by integers such that each edge that does not pass through $\mathcal{X}_1 {\cap}\mathcal{X}_2$ is labelled by 0. Any such 1-cycle is supported on a $D$-neighbourhood of this subset. \[thm:relators1\] There is an algorithm that computes a set of relators for the $F$-module $\varinjlim {\check{\mathrm{C}}}{}^1\left( \mathcal{U}_\mathcal{X}, \mathbb{Z}\right)$ with respect to the basis computed by the algorithm of Theorem \[thm:generators1\]. The proof of Theorem \[thm:relators0\] works here too; Lemma \[lem:intersections2\] has a weaker hypothesis than Lemma \[lem:intersections\] does but this makes no difference to the proof. Theorems \[thm:generators1\] and \[thm:relators1\] together give an algorithm that computes a finite presentation for $\varinjlim{\check{\mathrm{C}}}{}^1 \left(\mathcal{U}_\mathcal{X}, \mathbb{Z}\right)$. ${\check{\mathrm{H}}}{}^1\left( \mathcal{D}, \mathbb{Z}\right)$ is the quotient of this abelian group by the image under the boundary map of $\varinjlim{\check{\mathrm{C}}}{}^0\left( \mathcal{U}_\mathcal{X}, \mathbb{Z}\right)$, so it remains to show that this image has a computable generating set. \[lem:image\] $d\varinjlim{\check{\mathrm{C}}}{}^0\left(\mathcal{U}_\mathcal{X}, \mathbb{Z} \right)$ is generated as an $F$-module by those of its elements that are supported on ${\ensuremath{\mathrm{Wh}\left(e\right)}}$. ${\check{\mathrm{C}}}{}^0\left(\mathcal{U}_\mathcal{X}, \mathbb{Z} \right)$ is generated as an abelian group by those elements that are supported on ${\ensuremath{\mathrm{Wh}\left(v\right)}}$ for some $v \in \mathcal{X}$, and if $\left[\sigma\right]$ is supported on $\mathcal{X}$ then so is $d\left[\sigma\right]$. Putting the results of this section together we conclude: There is an algorithm that determines a presentation for the $F$-module ${\check{\mathrm{H}}}{}^{1}\left(\mathcal{D}, \mathbb{Z}\right)$. There is an algorithm that determines whether or not ${\check{\mathrm{H}}}{}^{1}\left(\mathcal{D}, \mathbb{Z}\right)$ is trivial. Since ${\check{\mathrm{H}}}{}^{1}\left(\mathcal{D}, \mathbb{Z}\right)$ has a computable finite generating set, it is sufficient to be able to determine whether or not each generator is trivial. But each ${\check{\mathrm{H}}}{}^{1}\left(\mathcal{U}_\mathcal{X}, \mathbb{Z}\right)$ includes injectively into ${\check{\mathrm{H}}}{}^{1}\left(\mathcal{D}, \mathbb{Z}\right)$, so it is sufficient to be able to determine whether or not a given element of some ${\check{\mathrm{H}}}{}^1\left(\mathcal{U}_\mathcal{X}, \mathbb{Z}\right)$ is trivial; that is, whether or not it is in the image of $d$. But the problem of determining whether or not such an element has a preimage under $d$ is equivalent to determining whether or not some finite dimensional $\mathbb{Z}$-linear equation has a solution, so can be done algorithmically.
2024-07-11T01:27:13.970301
https://example.com/article/4732
ON TARGET: NATO film rewrites history, glorifies Nazis Russian President Vladimir Putin arrives to attend City Day festivities at the Red Square, commemorating Moscow's 870th anniversary, in Russia, Saturday. A new NATO film about anti-Soviet fighters in the Baltic States attempts to draw parallels between their situation and our current troubles with an aggressive Russia. The only problem is that those Baltic fighters were former Nazis. (Yuri Kadobnov/AP) There is a controversial new video out on NATO’s official YouTube channel entitled Forest Brothers. The gist of the 8-minute film is to lionize the brave Latvian, Lithuanian and Estonian fighters who took to the woods to resist the Soviet Union’s 1945 occupation of the Baltic States. These desperate guerrillas were supported by many of the local population and were thus able to continue resisting the Soviets until the 1980s. This is a virtually unknown chapter of the Cold War, as it occurred within the Soviet-occupied territory. No one talked about armed resistance by nationalist groups, as the Soviets presented themselves to the world as one big happy family. The theme of this new piece of NATO propaganda is to liken the resolve and heroism of these historical ‘Forest Brothers’ to the current special forces units of Lithuania, Estonia and Latvia. According to the film, the modern-day Baltic warriors, like their Forest Brother forefathers, are facing overwhelming odds — this time at the hands of President Putin and his murderous Russian horde. The timing of the release of the NATO short film is no doubt aimed at magnifying the threat posed by Russia conducting major military exercises this summer on their side of the border. Unfortunately for students of this era, the film totally rewrites history with the purpose of demonizing Russians. The bigger problem is that the movie is also exonerating Nazis, many of whom were complicit in the atrocities of the Holocaust. The narration in the film claims that, in 1945, Baltic fighters “who had fought on both sides” during the Second World War took to the forests to fight for their national interests. This statement makes no sense and it is practically false. The Baltic states had the unfortunate geographical situation that put them between Hitler’s Germany and Stalin’s Soviet Union. In the 1939 non-aggression pact signed between the two, Hitler allowed Stalin to occupy and annex the three Baltic states. When Hitler broke that pact in June 1941, his troops pushed the Soviets out of the Baltic. Very few Latvians, Lithuanians, or Estonians chose to withdraw and fight for Stalin, but in a dark chapter of Baltic history, they volunteered in droves to fight for the Nazis. Anti-Semitic militias quickly and aggressively rounded up the Jewish population for extermination. One of the most ruthless of these militias was the Latvian Arajs Kommando unit. In 1943, Germany formalized the alliance by forming Baltic volunteers into Waffen SS troops. Latvia alone provided enough volunteers to man both the 15th and 19th Waffen SS divisions. As the fortunes of the war turned against Hitler, the Germans and their allies were forced back. The 15th Latvian SS Division was able to surrender to Western allies, but the 19th found itself trapped on the Courland Peninsula battling the Soviets to the very end. Once Adolf Hitler committed suicide in Berlin and the dream of his Third Reich was extinguished, those Baltic volunteers in SS uniforms took to the woods to avoid capture. Because of their affiliation with the Waffen SS and, in particular, the hard-core Arajs Kommandos who perpetrated the Holocaust on the Baltic Jews, they faced either the Soviet Gulags or execution. To be fair, the re-enactors in the NATO Forest Brothers film clearly show these Soviet resisters using German weaponry and wearing German-style uniforms. To say that they fought on both sides of the war is untrue, and to lionize those who were in any way involved in the Nazi Holocaust is abhorrent. Canada currently has 400 soldiers forward deployed in Latvia to provide a deterrent to Russian aggression. Next March 19, the Latvians will stage their annual parade in Riga to commemorate the glory of their WWII Waffen SS Legion. That’s right, Canadian troops will be present as Latvians pay tribute to Nazis. Latvians are at least honest enough to commemorate their past openly. For NATO to retell history and to glorify the Waffen SS as anti-Soviet heroes is simply wrong — no matter how much they want to demonize Russia.
2023-10-01T01:27:13.970301
https://example.com/article/5487
Gender differences in acute congestive heart failure. Little is known about sex differences in baseline characteristics and outcomes in patients with acute congestive heart failure (CHF). This prospective observational study evaluated gender differences among 217 consecutive patients (124 men and 93 women) presenting with acute CHF to the emergency department. The primary endpoint was all-cause mortality. Women were older, and had less pulmonary comorbidity, but more noticeable jugular venous distension, as well as higher diastolic blood pressure and troponin level at presentation. Among contributing causes of acute CHF, myocardial ischaemia and anaemia were more frequent in women. Adequate medical CHF therapy was initiated more rapidly in women. Initial resource utilisation, time to discharge, and mortality were similar. Important differences to the disadvantage of women were noted during long-term follow-up. Mean cumulative survival was 619 (95% CI, 533-705) days in women as compared with 669 (95% CI, 601-737; p = 0.0663) in men. However, after multivariate adjustment female sex was not an independent predictor of long-term mortality (hazard ratio 1.14, 95% CI, 0.68-1.90; p = 0.619). Total spending for treatment cost was 11,858 US dollars University of Basel, University Hospital, Department of Internal Medicine, Switzerland (95% CI, 8921-14794) in women compared to 15,965 US dollars (95% CI, 12328-18003; p = 0.115) in men after 1 year. Functional status was similar in women and men at 6 and 12 months. The trend towards lower survival in women seems primarily related to higher age and other factors rather than gender itself. Female sex is not an independent predictor of long-term mortality in acute CHF.
2024-05-28T01:27:13.970301
https://example.com/article/9489
Q: triangular float Is there a way to make a triangular float so that a page looks something like the following: This is a sampe Page that has a Triangle left float That looks kind of cool. Theoretically the content inside is naturally going to be variable, so I'd prefer to do it in an 'automatic' way so that when the actual words/descriptions come in it doesn't affect where I have to place content. You have free form to use whatever HTML/CSS/JS combo, but the simpler the better =) If it helps, Originally I tried putting divs of varying lengths float left with a clear left, but naturally when I placed the text, it came after everything and floating it right didn't work. A: Here's an idea: put some floating blocks next to each other, each one line higher than the next. That will create a (transparent) triangular block. body {line-height:1.2em} .blk1 {float:left; width:10px; height:6.0em} .blk2 {float:left; width:10px; height:4.8em} .blk3 {float:left; width:10px; height:3.6em} .blk4 {float:left; width:10px; height:2.4em} .blk5 {float:left; width:10px; height:1.2em} And the HTML will be <div class="blk1"></div> <div class="blk2"></div> <div class="blk3"></div> <div class="blk4"></div> <div class="blk5"></div> <div>Your text here.</div> Example jsFiddle. Can you work with that?
2023-12-20T01:27:13.970301
https://example.com/article/2359
This week’s BBC Panorama programme What Have The Drugs Done To Dad? has caused more questions than it answered for me, in some ways, and it’s left me with a feeling that we really could do better, if we cared. The programme began with the statistic that 180,000 people with dementia are being given – as a matter of routine – powerful anti-psychotic drugs which in the majority of cases harm them and may be shortening their lives. It was described as the scandalous abuse of some of the most vulnerable people in our society. I must add a qualification here: some people are content that their relative with dementia is being prescribed anti-psychotics, both in residential care and in their own home. It is not my purpose to deny them the right for that to be seen as appropriate in their own circumstances. But the programme’s purpose was to look at the inappropriate over-medication of people in care, and the over-prescribing of anti-psychotic meds that were never designed or legally licensed for dementia. Paul Burstow, Minister for Care Services, used the words ‘shocking’, and ‘unacceptable’, stating that these drugs kill people, cutting their lives short once they have already reduced the quality of their lives. I have no reason to doubt Professor Sube Banerjee’s assertion that the drugs are being used much too often and much too freely. If their use is beneficial in only one-fifth of cases, it’s serious cause for concern. I have no personal family experience of the use of such powerful anti-psychotics for people with dementia, but I do have personal family experience of powerful drugs being prescribed for my own relative with dementia, and with a few other physical problems that were causing pain and distress. Like Cheryl Byrne and Glynne Thompson who appeared in the Panorama programme, I too noticed a dramatic decline in the general well-being of my relative – even though I had no idea then what had been prescribed. Within a matter of weeks, all conversation stopped; there was a huge change in awareness and sociability; posture went from upright to stooped; the ability to engage with anything at all was non-existent; agitation; insomnia; disinhibited behaviour; and the remains of what once was a definite joie de vivre went right out of the window. My request, in the mental health assessment unit, to be allowed to know which medications my own relative was being given, was met with verbal abuse by the deputy in charge of the ward. No matter how much I explained that I was shocked to see such a huge decline in such a very short space of time, the brick wall of refusal came my way. She refused to give me any information at all, even though I was listed as one of only two close relatives still alive and caring about a very vulnerable elderly person with dementia. It was only after the death of my relative that I discovered – when I obtained a copy of the medical records – that a doctor had written into those notes “this is a massive amount of NSAIDs and anti-depressants for a frail elderly person”. They had prescribed an opioid drug to control the pain and the patient. Then, the anti-depressant was introduced to someone who had no history of depression at all – it was prescribed as a way of controlling the manifestation of ever increasing physical pain, discomfort and distress. It made it easier for the staff in the mental health unit to manage – they could then manage to huddle round and watch TV, rather than needing to interact with their patients. Neither the opioid drug nor the anti-depressant controlled the pain. Did they control the patient sufficiently in the best interests of the nursing/care staff? Did they contribute to a sudden death? After watching Panorama, I looked around for more information about the use of anti-psychotics to control, to quieten, to make manageable those vulnerable elderly people with dementia and living in care homes. What did I find? This from the Alzheimer’s Society dated 3 December 2007, which was when Panorama last looked at the abuse of elderly people in residential care homes by over-medicating them. Neil Hunt, then Chief Executive of the Alzheimer’s Society, said: “Today is D-Day for dangerous drug prescribing. Sedating a person with dementia should be a last resort but too often doctors are turning to the medicine cabinet without considering the alternatives. Today Panorama is shining a light on the widespread drug abuse of people with dementia, which has been hidden away for too long. The first parliamentary inquiry into the practice is also an important step to uncovering the true scale of the problem, and we look forward to its findings. Over 100,000 people are being prescribed these drug treatments that leave people with dementia in a zombie like state, robbed of their quality of life. Research shows that anti-psychotics have minimal benefit and drastically increase the risk of death and stroke. It is absurd that we are wasting millions of pounds prescribing these drugs when this money would be much better spent training health professionals in dementia care. Dementia isn’t only about memory loss; more than half of all people with dementia experience behavioural symptoms as part of their condition.” But I can’t find a statement from the Alzheimer’s Society commenting on this more recent Panorama programme. Three years on from 2007, when the Alzheimer’s Society called for an end to the widespread drug abuse of people with dementia after the 2007 BBC Panorama programme, we are now promised that within another year, by November 2011, the use of anti-psychotics prescribed to people with dementia will be reduced by two thirds. Why should it take so long? How many more people will have died before action is taken? And finally, for anyone with an interest in the shocking statistics of medication abuse of vulnerable elderly people in need of care, click here for a read of this document from 31March 2008, which also bears the name of Paul Burstow, then in Opposition and MP for Sutton and Cheam: Keep Taking the Medicine 4 The scandal of the inappropriate medication of older people in care Had it appeared just one day later, it would have appeared on 1 April. No excuse for lack of action is acceptable, said Paul Burstow in Opposition. He’s been arguing his point since 2001, and probably before that. He was lonely in the House of Commons then – nobody listened to him, championing in debate the cause of vulnerable elderly people. Now that he’s in Government and Minister for Care Services, he says that he stands by that statement, it is now his mantra, and he nodded when told that he would be held to account in the future. Please widen the scope of your concern, Mr Burstow. Look at the abusive over-medication of elderly people, especially those with dementia and in care, in its entirety. In fact, widen the scope of your concern to the abuse of elderly people with dementia in care. Full stop! Nobody listens to us either, so you should know how we feel. Let’s hope that you are not Home Alone now, and that people listen and act.
2023-11-12T01:27:13.970301
https://example.com/article/4318
Going “undercover” as a yoga student Visiting San Francisco last summer, I took a few classes at the Iyengar Yoga Institute of San Francisco, within walking distance from my friend’s house. “Have you done Iyengar yoga before?” a front-desk staffer asked me when I arrived. “Yes,” I nodded and smiled, but said nothing more. Away from home, I look for yoga classes not only to boost my practice, but to get to know a place. If I’m a repeat visitor (or if I return to Berkeley), teachers recognize me. But, if not, I might reveal only the bare minimum about myself. “I’m visiting from Vancouver,” I said that day. Entering the studio, I recognized nobody. Yet it was an altogether familiar scene. Shoes at the door. Hardwood floors and walls lined with ropes. Shelves of matching bolsters, blankets, blocks, and mats. Students stretching or gathering props in silence. While I enjoy chatting with my classmates back home, it can be a relief to be anonymous. To an introvert like me, the social aspect of yoga class is both gift and distraction. There, people knew me only by what was observable: my expression, my handling of props, my yoga poses. It crossed my mind: Does my yoga practice speak for itself? It got me thinking about how people immediately define themselves. I’m from _____. I’m a _____. I graduated from _____. In Japan, people hand out business cards to establish social hierarchy. Where I grew up in Hawaii, people are curious to know who is kama‘aina or local. If I had walked in and immediately mentioned that I’m certified or that I’ve studied with so-and-so, wouldn’t that somehow have affected the dynamics? The human mind is quick to categorize. Of course, sometimes credentials matter. If I were practicing law, I wouldn’t hesitate to name my law school to my advantage. That by itself would give me instant credibility. Likewise, connections can get you that special discount or prompt medical consult. What about yoga? As a teacher, it makes sense to provide details on my training and experience. As a student, however, why should I advertise my background? If I end up talking with the teacher after class, my background, including my own teaching, does emerge. It might further connect us. Nice. But I can also appreciate that pure, fleeting moment of anonymity.
2023-11-25T01:27:13.970301
https://example.com/article/5253
Q: Qt: When QTimer actually started? When application calls QTimer::start() is it started immediately or will be started after current event processed ? In other words, should I use single-shot timer with time correction in case of long-time processing in its timeout() slot ? A: To answer with certainty would require inspecting platform-specific code within Qt. That's a good sign that this is not something you should be depending on. Moreover, QTimer doesn't promise much in terms of accuracy: Timers will never time out earlier than the specified timeout value and they are not guaranteed to time out at the exact value specified. In many situations, they may time out late by a period of time that depends on the accuracy of the system timers. The accuracy of timers depends on the underlying operating system and hardware. Most platforms support a resolution of 1 millisecond, though the accuracy of the timer will not equal this resolution in many real-world situations. If Qt is unable to deliver the requested number of timer clicks, it will silently discard some. If you need to know precisely how much time has passed between timeout signals, use your QTimer in conjunction with a QElapsedTimer.
2023-08-25T01:27:13.970301
https://example.com/article/8228
Practice becomes firmly grounded when well attended to for a long time, without break and in all earnestness. The first qualification for the practice is that it should be done for a long time. Unfortunately, we just want the result immediately. If I ask you to repeat a mantra and tell you that you will become more peaceful and realize beautiful things within, you will go back home, repeat it for three days and then call me: “I’ve repeated it for three days but nothing happened. Maybe this is not a suitable mantra for me. Can you give me a different one?” See? So Patañjali says, “for a long time.” He doesn’t say how long. And then it should be without break. I often hear, “Oh, I’ve been practicing Yoga for the past ten years but I’m still the same.” “How often?” “Oh, off and on.” So it must be continuous practice also. And the last qualification is “in all earnestness.” That means with full attention, with the entire application of your mind and with full faith in your achievement. Even when you want something or somebody on the worldly level, you will be after it day and night. You don’t sleep, you don’t even eat— you are always at it. If this quality is necessary to achieve even worldly success, how much more so for success in Yoga. So let us not be like little children who sow a seed today and dig it up tomorrow to see how much the root went down. We need all these three qualities: patience, devotion and faith. This reminds me of a small story given in the Hindu scriptures. In the Deva Loka, or the heavenly plane where the divine beings live, there is a great mahaṛṣi (sage) called Nārada. Just as there are great Yogis here, so there are also among the gods. So Nārada travels all over and sometimes comes to earth to see how we are doing. One day, he was passing through a forest and saw a Yoga student who had been meditating for so long that the ants had built an anthill around his body. The Yogi looked at Nārada and said, “Nārada, Sir, where are you going?” “To Heaven, to Lord Śiva’s place.” “Oh, could you please do something for me there?” “Sure, what can I do?” “Could you find out from the Lord for how many more births I must meditate? I have been sitting here for quite a long time, so please find out.” “Sure.” Then Nārada walked a few miles farther and saw another man, but this one was jumping and dancing and singing with all joy: “Hare Rāma Hare Rāma Rāma Rāma Hare Hare; Hare Kṛṣṇa Hare Kṛṣṇa Kṛṣṇa Kṛṣṇa Hare Hare!” When he saw Nārada, he said, “Hi, Nārada! Where are you going?” “To Heaven.” “Oh, that’s great. Could you please find out for how long I have to be here like this? When will I get final liberation?” “Sure, I will.” So, after many years Nārada happened by the same route again and saw the first man. The Yogi recognized Nārada. “Nārada, I haven’t had any answer from you. Did you go to Heaven? What did the Lord say?” “I asked, but the Lord said you have to take another four births.” “Another . . . FOUR . . . births!? Haven’t I waited long enough!?” He started shouting and lamenting. Nārada walked further and saw the second man still singing and dancing. “Hi, Nārada. What happened? Did you get some news for me?” “Yes.” “Well, tell me.” “Do you see that tree there?” “Sure.” “Can you count the leaves on it?” “Sure, I have the patience to do it. Do you want me to count them right away?” “No, no, no. You can take your time to count.” “But what has that got to do with my question?” “Well, Lord Śiva says you will have to take as many births as the number of leaves of that tree.” “Oh, is that all? So at least it’s a limited number then. Now I know where it ends. That’s fine. I can quickly finish it off. Thank God that he didn’t say the leaves of the entire forest!” Just then, a beautiful palanquin came down from Heaven, and the driver said, to the second man, “Come on, would you mind getting in? Lord Śiva has sent for you.” “I’m going to Heaven now?” “Yes.” “But just now Nārada said I have to take so many more births first.” “Yes, but it seems that you were ready and willing to do that, so why should you wait? Come on.” “And what about the other man?” “He’s not even ready to wait four more births— let him wait and work more.” This is not a mere story. You can easily see the truth behind it. If you are that patient, your mind is more settled, and what you do will be more perfect. If you are unsettled and anxious to get the result, you are already disturbed; nothing done with that disturbed mind will have quality. So, it is not only how long you practice, but with what patience, what earnestness and what quality also.
2024-01-16T01:27:13.970301
https://example.com/article/7927
RootDir = . ModelDir = "models" command = "MultiView_Test" precision = "float" modelPath = "$ModelDir$/ImageReaderMultiView_Model.dnn" # deviceId = -1 for CPU, >= 0 for GPU devices deviceId = -1 outputNodeNames = "Dummy" traceLevel = 1 MultiView_Test = [ # Parameter values for the reader reader = [ # reader to use readerType = "ImageReader" file = "$RootDir$/ImageReaderMultiView_map.txt" randomize = "none" verbosity = 1 numCPUThreads = 1 features=[ width=2 height=2 channels=3 cropType=Multiview10 sideRatio=0.5 jitterType=UniRatio interpolations=linear #meanFile=$RootDir$/ImageReaderMultiView_mean.xml ] labels=[ labelDim=4 ] ] ]
2024-03-20T01:27:13.970301
https://example.com/article/5876
A systematic review of cognitive behavioural therapy for anxiety in adults with intellectual disabilities. Anxiety disorders have high prevalence in people with intellectual disabilities. In populations without intellectual disabilities, cognitive behavioural therapy is a first line psychological therapy for these presentations. There is no existing review of the range of methods and outcomes from intervention studies in this area. A systematic review was carried out following guidance in the Cochrane handbook for systematic reviews of interventions. Nineteen studies were identified. The majority of reports were descriptive case studies; the most frequently described presentations were non-specific anxiety disorders and post-traumatic stress disorder; the most frequently described cognitive techniques were psycho-education and interventions directly aimed at thoughts and beliefs and most studies reported positive outcomes, although the better controlled studies tended to report less comprehensive impacts. A range of presentations have been described although the area is still at a primarily descriptive stage. We discuss intervention structures and approaches that require further research.
2024-04-19T01:27:13.970301
https://example.com/article/3553
George Goad (cricketer) George Goad (4 April 1806 – 1878) was an English cricketer. Goad's batting and bowling styles are unknown. He was born at Brighton, Sussex. Goad made his first-class debut for Sussex against Kent in 1826. He made six further first-class appearances for the county, the last of which came against England in 1834. In his six first-class matches, he took 7 wickets, though his bowling average and best figures are unknown due to incomplete records. With the bat, he scored 21 runs at an average of 1.50, with a high score of 6. He died at the town of his birth in 1878. References External links George Goad at ESPNcricinfo George Goad at CricketArchive Category:1806 births Category:1878 deaths Category:Sportspeople from Brighton Category:English cricketers Category:Sussex cricketers Category:English cricketers of 1826 to 1863
2024-03-27T01:27:13.970301
https://example.com/article/2201
We are back and now I bring you a new handmade design in which I was working these days of absence. The shapes and colors were the protagonists of this woven to hang without forgetting the cotton rope that was also included giving a different touch. I chose forms practicing more often in them, leaving open spaces and tones in dance to match with the background. I chose the combination of beige tones to give a radical change to the dark tones I always use.I like the idea to start with something simple and clean that anyone with different stature and body shape can wear. The elegance of warm tones never goes out of style, you will notice every time you go to a clothing store, there will always be an area dedicated especially with soft beige tones. Contact Form Name Email * Message * ABOUT MARISA Welcome! I am a photographer and artisan from México now living in Atlanta. TERRA DA FLOR is a blog designed to share handmade art,photography, DIY and cooking recipes. Feedback is welcome and encouraged!
2024-02-02T01:27:13.970301
https://example.com/article/4885
/* Copyright 2016 The Kubernetes Authors. Licensed under the Apache License, Version 2.0 (the "License"); you may not use this file except in compliance with the License. You may obtain a copy of the License at http://www.apache.org/licenses/LICENSE-2.0 Unless required by applicable law or agreed to in writing, software distributed under the License is distributed on an "AS IS" BASIS, WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. See the License for the specific language governing permissions and limitations under the License. */ package storage import ( "os" "reflect" "testing" "k8s.io/apimachinery/pkg/apimachinery/announced" "k8s.io/apimachinery/pkg/apimachinery/registered" metav1 "k8s.io/apimachinery/pkg/apis/meta/v1" "k8s.io/apimachinery/pkg/runtime" "k8s.io/apimachinery/pkg/runtime/schema" "k8s.io/apimachinery/pkg/runtime/serializer" "k8s.io/apiserver/pkg/apis/example" exampleinstall "k8s.io/apiserver/pkg/apis/example/install" examplev1 "k8s.io/apiserver/pkg/apis/example/v1" "k8s.io/apiserver/pkg/storage/storagebackend" ) var ( v1GroupVersion = schema.GroupVersion{Group: "", Version: "v1"} registry = registered.NewOrDie(os.Getenv("KUBE_API_VERSIONS")) announce = make(announced.APIGroupFactoryRegistry) scheme = runtime.NewScheme() codecs = serializer.NewCodecFactory(scheme) parameterCodec = runtime.NewParameterCodec(scheme) ) func init() { metav1.AddToGroupVersion(scheme, metav1.SchemeGroupVersion) scheme.AddUnversionedTypes(v1GroupVersion, &metav1.Status{}, &metav1.APIVersions{}, &metav1.APIGroupList{}, &metav1.APIGroup{}, &metav1.APIResourceList{}, ) exampleinstall.Install(announce, registry, scheme) } type fakeNegotiater struct { serializer, streamSerializer runtime.Serializer framer runtime.Framer types, streamTypes []string } func (n *fakeNegotiater) SupportedMediaTypes() []runtime.SerializerInfo { var out []runtime.SerializerInfo for _, s := range n.types { info := runtime.SerializerInfo{Serializer: n.serializer, MediaType: s, EncodesAsText: true} for _, t := range n.streamTypes { if t == s { info.StreamSerializer = &runtime.StreamSerializerInfo{ EncodesAsText: true, Framer: n.framer, Serializer: n.streamSerializer, } } } out = append(out, info) } return out } func (n *fakeNegotiater) UniversalDeserializer() runtime.Decoder { return n.serializer } func (n *fakeNegotiater) EncoderForVersion(serializer runtime.Encoder, gv runtime.GroupVersioner) runtime.Encoder { return n.serializer } func (n *fakeNegotiater) DecoderToVersion(serializer runtime.Decoder, gv runtime.GroupVersioner) runtime.Decoder { return n.serializer } func TestConfigurableStorageFactory(t *testing.T) { ns := &fakeNegotiater{types: []string{"test/test"}} f := NewDefaultStorageFactory(storagebackend.Config{}, "test/test", ns, NewDefaultResourceEncodingConfig(registry), NewResourceConfig()) f.AddCohabitatingResources(example.Resource("test"), schema.GroupResource{Resource: "test2", Group: "2"}) called := false testEncoderChain := func(e runtime.Encoder) runtime.Encoder { called = true return e } f.AddSerializationChains(testEncoderChain, nil, example.Resource("test")) f.SetEtcdLocation(example.Resource("*"), []string{"/server2"}) f.SetEtcdPrefix(example.Resource("test"), "/prefix_for_test") config, err := f.NewConfig(example.Resource("test")) if err != nil { t.Fatal(err) } if config.Prefix != "/prefix_for_test" || !reflect.DeepEqual(config.ServerList, []string{"/server2"}) { t.Errorf("unexpected config %#v", config) } if !called { t.Errorf("expected encoder chain to be called") } } func TestUpdateEtcdOverrides(t *testing.T) { registry := registered.NewOrDie(os.Getenv("KUBE_API_VERSIONS")) announced := make(announced.APIGroupFactoryRegistry) exampleinstall.Install(announced, registry, scheme) testCases := []struct { resource schema.GroupResource servers []string }{ { resource: schema.GroupResource{Group: example.GroupName, Resource: "resource"}, servers: []string{"http://127.0.0.1:10000"}, }, { resource: schema.GroupResource{Group: example.GroupName, Resource: "resource"}, servers: []string{"http://127.0.0.1:10000", "http://127.0.0.1:20000"}, }, { resource: schema.GroupResource{Group: example.GroupName, Resource: "resource"}, servers: []string{"http://127.0.0.1:10000"}, }, } defaultEtcdLocation := []string{"http://127.0.0.1"} for i, test := range testCases { defaultConfig := storagebackend.Config{ Prefix: "/registry", ServerList: defaultEtcdLocation, Copier: scheme, } storageFactory := NewDefaultStorageFactory(defaultConfig, "", codecs, NewDefaultResourceEncodingConfig(registry), NewResourceConfig()) storageFactory.SetEtcdLocation(test.resource, test.servers) var err error config, err := storageFactory.NewConfig(test.resource) if err != nil { t.Errorf("%d: unexpected error %v", i, err) continue } if !reflect.DeepEqual(config.ServerList, test.servers) { t.Errorf("%d: expected %v, got %v", i, test.servers, config.ServerList) continue } config, err = storageFactory.NewConfig(schema.GroupResource{Group: examplev1.GroupName, Resource: "unlikely"}) if err != nil { t.Errorf("%d: unexpected error %v", i, err) continue } if !reflect.DeepEqual(config.ServerList, defaultEtcdLocation) { t.Errorf("%d: expected %v, got %v", i, defaultEtcdLocation, config.ServerList) continue } } }
2023-12-19T01:27:13.970301
https://example.com/article/1557
"Disodium guanylate." "Diacetyl tartaric acid." "I don't feel good about this, Bud." "I mean, I know we're mad at Dad for not letting us have a party and everything but even he doesn't deserve this." "This is cool and unusable punishment." "Desperate times call for desperate measures, Kel." "Now, just a little pyridoxine hydrochloride and voilá." "Snack mountain." "Now, once Dad washes this down with tonight's episode of Psycho Dad he'll say yes quicker than you do on a first date." "Sure hope you're right." "Oh, good morning, kids." "Gee, you guys are up early." "What time is it?" "Five p.m." "Oh, darn, I slept through my afternoon nap." "So, what are you up to?" "Oh, just trying to bribe Daddy into letting us have a party." "You know, that could be tough." "I don't think he's forgotten the last one." "You know, the nightsticks, the sirens, the strip-searches..." "Not to mention what happened after the police got here." "Mom, a woman only turns 12 once." "I'm much more of an adulteress now." "So you think Dad'll go for it, Ma?" "Well, I don't know but at least you have his two favourite food groups here." "Greasy and salty." "And to seal the deal, Psycho Dad's on tonight." "Yeah, for the sake of the party, I hope he still likes the show." "Who's that riding into the sun?" "Who's the man with the itchy gun?" "Who's the man who kills for fun?" "Psycho Dad, Psycho Dad Psycho Dad" "Hi, Bud." "Hi, Kelly." "Hi, couch monster." "Anybody know what night it is?" "The night the rest of your body secedes from your armpits?" "Peg, how do you think of those and fight gravity at the same time?" "Anyway, tonight there's a very special episode of the Dad on." "He caught his wife and the schoolmarm teaching his son housework but he's only got one cartridge left." "What does he do?" "What would any of us do?" "Dad, did you...?" "Did you notice we made you some Psycho Dad vittles?" "Yes, a veritable coronary-copia of your favourites." "I'm sorry, but they were out of the twice- fried gristle logs." "You two are the best kids any father accidentally ever had." "Now, come on, beat it." "Psycho Dad's coming on." " When do we ask him about the party?" " Okay, as soon as Psycho Dad is over." " Okay." " And now, ladies and gentlemen..." "Psycho Dad!" " will not be seen tonight so we may present the All Barbara Special." "Stay tuned as Barbara Walters interviews Barbra Streisand Barbara Bush, and then Barbra Streisand again." "No Psycho Dad?" "How can this be, Peg?" "What moron is behind this?" "Who's the guy whose show is done?" "Whose TV hero's on the run?" "Who'll be watching VH1?" "Loser Al, Loser Al Loser Al" "Marcie, I don't think this is a very good time." "Are you kidding?" "This is a great time." "My women's group finally helped get Psycho Dad cancelled." "Cancelled?" "You got it cancelled?" "Indeed- y do." " Okay, now can we ask him?" " No." "Why not?" "The show couldn't be more over." "Why, Marcie?" "Because Psycho Dad was the most violent programme on TV." "Did you know that they portrayed an average of 84 killings per one- hour show?" "Well, a man's got to reload." "My point, earwig is that violence on TV desensitizes people." "Well, so does marriage, and they haven't cancelled that yet." "Despite all my letters." "And I don't want to hear any of that politically-correct rooster poop that television is the cause of all our problems." "People don't act a certain way just because it's on TV." "You know, that's true." "Al watches a lot of sex on HBO." "And Peg watches a lot of Models Inc." "Al, violence has no place on the streets or on TV." "And we've got to start somewhere." "Today Psycho Dad, tomorrow everything else that men enjoy." "Okay, now can we ask him?" "Are you for real or has someone switched you with a pod from the planet Bimbo?" "And if so, are...?" "Are there more like you?" "Hey, Al, what gives?" "Yeah." "Yeah." "Did they take off Psycho Dad on your TV too?" "Oh, hey." "Hey." "Ranch style." "Stand back, kids." "Huey, Dewey and Ewey are here." "Men, listen up." "They've cancelled Psycho Dad." " What?" " Yes." "And you know who's behind it?" " Women?" " No." "Marcie D'Arcy, chicken- at-large." "Well, I say there's no way we'll give up our Psycho Dad." " What can we do?" " We can write letters." " Well, real men don't write letters." " They do to Penthouse." "They got letters in Penthouse?" "Of course they have letters in Penthouse." "So you have something to do right after you..." "Right after you..." "You finish reading the interviews." "They got interviews in Penthouse?" "All right, come on, everyone, think." "We're men." "Let's use the power of our giant manly brains." "Ma, they've been like that for hours now." "Should we get the jumper cables?" "No need." "I got it!" "We'll picket the TV stations." "Once word gets out, men will come from every part of the country." "Men, gather the troops." "This will be the biggest demonstration Chicago has ever had." "Yeah." " Hey, Al." " Yeah?" "You remember that letter- writing idea I had?" "Bring back Psycho Dad." "Bring back Psycho Dad." "Bring back Psycho Dad." "Bring back Psycho Dad." "Bring back the feeling in my feet." "All right, take a two-minute break." " How long have we been here?" " Counting the break 2 and a half minutes." "Say, Al, don't think that I'm not grateful for your dragging me out of a warm pool hall to picket on this balmy winter morn." "But are you sure that anyone is giving oh, say, a rat's patoot about this?" "Boy, you don't know anything about America, do you?" "Lts landscape will be littered with frozen dead guys if we don't get the hell out of here." "Well, for your information, ladies this country was founded on the power of protest." "From the Boston Tea Party to the March of Dimes." "The strong and the brave have always stood up to make their voices heard." "Well, Al Bundy, too, will make his voice heard." "I will stand, I will fight, I will..." "Boys, here comes the cops." "Ditch the signs." "Well?" "Hey, Officer Dan." "How's the wife and kids?" "Warm." "Why aren't I?" "Well, if by that you mean what are we doing here, well, we..." "Tell him, Jefferson." "Al made us come." " Thanks, Jefferson." "Nice cover." " Okay." "Okay, boys, let's head for the squad car." "Aren't you even gonna search us?" "It's 13 degrees out here." "I don't even care what I've got concealed." "Oh, come on, Dan." "Give us a break." "We're just protesting, that's all." "Protest or no protest." "You just can't gather a..." "Psycho Dad?" "They took off Psycho Dad?" "Bring back Psycho Dad." "Bring back Psycho Dad." "Bring back Psycho Dad." "Bring back Psycho Dad." "I don't understand it." "The press must have gotten wind of this by now." " What could be keeping them?" " Polar bears, maybe?" "All right, a couple of more times around and we'll take a few months off." "Hey, look, I think I see another protestor coming." "Okay, snap to, boys." "Make him feel welcome." " Bring back Psycho Dad." " Let your kids have a party." " Bring back Psycho Dad." " Let your kids have a party." "Bring back Psycho Dad." " Let..." " Hey now!" "Sergeant at Arms lke eject the infidel." " Yeah, get him." " Get him, Ike!" "Get him!" "Hey, Al, I've got an idea." "Bob Rooney's got a heated garage." "Yeah, and he's got the profile of a manatee too." "What's your point?" "Well, we could protest there and be warm." "Protest in Bob Rooney's garage." "But how can we be sure our message will reach the people?" "We'll leave our signs outside." "Genius." "Now, let's see." "It's 40 degrees below zero with 20 mile an hour winds." "Who do we send outside today?" "One of our many Aryan anchormen or the woman from a country named after the equator?" " You're on." " Hi." "This is Miranda Veracruz de la Jolla Cardenal." "And we are here live outside the studios of WHBZ where some sort of pro-violence demonstration was supposed to be held." "But the only evidence we could find is a crumpled copy of Penthouse Magazine and the name "Al" mysteriously written in the snow." "So once again, it seems the joke's on me." "This is Miranda Veracruz de la Jolla Cardenal saying:" "I'd have that anchor job by now if I had just slept with Peter Jennings instead of Andy Rooney." "Hi, Daddy." "How are you feeling?" "Well, let's see." "I'm dead." "Oh, good." "Now, what would you say if I told you that Bud and I got Psycho Dad back on the air?" "You got Psycho Dad back on the air?" "You better not be kidding or you're gonna have to outrun the Dodge." "Rush Limbaugh can outrun the Dodge." "No, seriously, Dad, if we could get Psycho Dad back on the air would you let us throw a party?" " Lf you got Psycho Dad back on air, not only would I let you throw a party, I'd provide the fake vomit." "Well, break out the barf, Dad, because we got Psycho Dad back on the air, and it's on right now." "But close your eyes first, Dad because there's a few minutes left of Saved by the Bell, The Prison Years." "And now, the return of your favourite Western, Psycho Dad." "Well, shut my mouth and call me Mary." "That is Psycho Dad." "That is Psycho Dad." " What...?" "What's wrong?" " Just my stinking luck." "It's a rerun." " A rerun?" " Yeah, yeah, I recognize this episode." "This is the part where he's gonna shoot his wife she ducks and he accidentally kills President Lincoln instead." "Damn women." "That's no problem." "I'll just fast-forward the tape to the part you don't remember." "Dad, we only did this to make you happy." "It wasn't to trick you into letting us have a party or that nifty vomit thing or anything." "I knew it was too good to be true." " So can we have a party?" " Begone, children of the corn." "Way to go, VCR Minus." "Well, like they say in France, comme ci, comme di." "Al, turn on the TV." "Psycho Dad's on." "Yeah, and my wife and kids are just figments of Stephen King's imagination." "No, really." "It's on the news." "He's holding a press conference." "He is?" "He is." "I knew he wouldn't take this lying down." " Hey, I bet he got my letter." " You wrote Psycho Dad a letter?" "Not actually a letter, but I cut out some letters from the newspaper and taped it in, you know." "Like the way Psycho Dad did when he kidnapped the circuit judge so there couldn't be no wedding." "I knew the Psychster wouldn't let his biggest fans down." "Sure the cancellation was a shock." "I felt hurt, I'd been rejected." "I thought, "Well, nobody cares anymore about a simple saga of a guy run amok in the old West."" "The man's a freaking poet." "And while I was at my lowest, this letter arrived." "Maybe that's my letter." "It came postage due." "It is my letter." "I'd like to read it to you now." ""Dear, Syko Dad," spelled S-Y-K-O." "What?" "You try to find P's and H's in USA Today." ""Hi, my name is Al." "I'm just a regular Joe." "Sure I scored four touchdowns in a game once." "But that's not the point." "The point is I like you, Psycho Dad, I really, really like you." "No, not in that way." "So please don't let them take you off." "I beg you, fight this thing like you would fight a varmint or an ex-wife." "Your friend, Al." "P.S., What does Barbara Eden look like naked?"" " Barbara Eden?" " She's 1000." "I didn't mean now." "Ladies and gentlemen, this letter has made clear to me that if Psycho Dad elicits this kind of response from the public..." " ... there's only one thing I can do." " Fight!" "Fight!" " Quit." " What?" "Yes, quit." "Quit, apologize, and renounce forever the character of Psycho Dad." "If this is the kind of following that I inspire then I'm afraid I must stop leading." "However, since the network's offering me big bucks be sure to watch me in my new show:" "Lefkowitz, Special Education Teacher's Aide." "Thank you." "And to you, Al, goodbye and get help." "I can't believe Psycho Dad would sell us out." "That's not Psycho Dad talking." "He doesn't use words like "character" or "education" or "Lefkowitz."" "He's been brainwashed by people like Marcie and her do-gooders." "Well, we've got to think of something." "Use the power of our giant manly brains?" "No, that would take too long." "Yeah." "What would Psycho Dad do if he were one of us?" "He would..." "He'd take some women hostage and make them do laundry." "No, Psycho Dad don't have no laundry." "He's been wearing the same Psycho suit for 7 years." "And now he's hanging it up for good." "Well, we can't just sit here and let it happen." "What do you want us to do?" "We're not going back to ice station Zebra again." "No." "I'm taking this fight to the place that stands for liberty." " That stands for freedom of expression." " The nudie bar?" "No." "Well, maybe first." "Then we're going to our nation's capital." "Gentlemen, NO MA'AM is going to Washington!"
2024-04-18T01:27:13.970301
https://example.com/article/1285
Chris Perkins, Dungeon Master extraordinaire, invites you to join him in creating and playing in a custom campaign for D&D video game Sword Coast Legends. PLAY SWORD COAST LEGENDS WITH DM CHRIS PERKINS Chris Perkins, Dungeon Master for Acquisitions Inc. and principal story designer on the Dungeons & Dragons team, is gearing up to run some D&D—and you have the opportunity to join him. Chris is setting out to design a D&D adventure in Sword Coast Legends, and you can help him create the experience. And a few fans will even get to play! Follow @Wizards_DnD, @ChrisPerkinsDnD, and @SwordCoast on Twitter to keep apprised of the event or like us on Facebook. We’ll post more details as they became available. In the mean time, check out Sword Coast Legends, which is now available on PC, Mac, and Linux.
2024-01-06T01:27:13.970301
https://example.com/article/2306
Voltaic Union Voltaic Union (in French: Union Voltaïque) was a political party in Upper Volta. It was formed soon after World War II on the initiative of the French governor Albert Mouragues, and Mouragues was accused of interference in the June 1948 local elections on behalf of the party. Also known as the Union pour la Défense des Interêts de la Haute Volta (UDIHV), it was an alliance of young Catholic-trained Voltaics and traditional chiefs opposed to domination by the Ivory Coast. Early members included Joseph Conombo, Henri Guissou, Joseph Ouedraogo and Maurice Yaméogo. In the 1951 elections UV sent four members to the National Assembly: Dr. Joseph Conombo, Henri Guissou, Nazi Boni and Mamadou Ouédraogo. However, when its main backer, Governor Mouragues, left Upper Volta in 1953, the unity of UV became fragile. In 1955 Conombo and Guissou formed a new party, the Social Party for the Emancipation of the African Masses (PSEMA). Similarly Nazi Boni founded the African Popular Movement (MPA) the same year. References Englebert, Pierre. La Revolution Burkinabè. Paris: L'Harmattan, 1986. Category:Defunct political parties in Burkina Faso Category:Political parties established in the 1940s
2024-02-22T01:27:13.970301
https://example.com/article/3915
Jon Stewart. Screenshot/YouTube Jon Stewart thinks Democrats hold some level of responsibility for the rise of Donald Trump to his current status as the presumptive Republican nominee. Stewart sat down to discuss the presidential race and American politics with former Obama senior adviser David Axelrod for a taping of "The Axe Files" podcast Monday at the University of Chicago's Institute of Politics. He held back little while lambasting "man-baby" Trump, Republicans who stoked the flames that led to his candidacy, and network executives who he also partially blamed for the Manhattan billionaire's rise. In criticizing most facets of the political system, the former host of "The Daily Show" also reserved some choice words for Democrats, who he said hadn't backed up their party's message. "What's incumbent on those who believe government can make a difference in people's lives is to try and make it more efficient," he said. "And I think that's where the Democrats fail in an enormous way. In their world, if you believe government can make a difference in people's lives, well then, make the bureaucracies work more efficiently." Stewart questioned why President Barack Obama could sign an executive order to "kill an American citizen" in a drone strike, for instance, but couldn't sign a similar executive order to reevaluate the Department of Defense and the Department of Veterans Affairs. "It doesn't wash," Stewart said. "And at some level, and I'll lay the blame then on the Democrats. The door is open to an asshole like Donald Trump because the Democrats haven't done enough to show to people that government that can be effective for people, can be efficient for people." "And if you can't do that, then you've lost the right to make that change, and someone is going to come in and demagogue you," he continued. "And that's what happens." He and Axelrod engaged in a spirited discussion, with Axelrod attempting to explain that the federal government simply doesn't work as easily as Stewart would like. Watch Stewart's remarks beginning around the 36:10 mark below:
2024-02-08T01:27:13.970301
https://example.com/article/2701
Friday, June 12, 2009 Back in 1954 a woman was hit by a fist sized one that crashed through her roof while she was sleeping and left a good bruise, but didn't leave any real injuries. But this past week, a UK boy was hit by one without the luck of a roof in the way. This one left a nasty scar. Meanwhile, I'm skeptical about the claims of speed the article has listed. 30,000 mph? Seriously? And just left a scar? The muzzle velocity of high speed guns is only 4,000 mph. 30k mph is a perfectly respectable speed for a meteor before it hits our atmosphere, but they slow considerably. Additionally, I think the chance of getting hit by a meteor is far less than "one in a million". I think that's just their innumerate way of saying "very unlikely". Despite the sloppy journalism I've come to expect from science, it's still a pretty monumental occurrence. It's good to hear the kid's into science and hopefully this event will promote an interest that lasts as long as that scar.
2023-10-05T01:27:13.970301
https://example.com/article/7302
Q: need help regarding submit event I am trying to develop a form. Before submitting to server i validate it using jquery, everything is working fine except function on submit event, form is being submitted with errors, while checking in console window, error is like this, "unreachable code after return statement",please give some suggestions Excerpt of html: <form name="empform" action="editformProcess.php" method="POST" id="empform1"><a name="profileform1"></a> <div class="row"> <div class="col-md-5 box"><label>First Name </label></div> <div class="col-md-7 boxinput"><span class="colenSpan">:&nbsp;</span><input type="text" name="firstName" id="fName" required /></div> </div> <div class="row ErrorMessg"> <div class="col-md-5 "></div> <div class="col-md-7 " id="firstNameErrorMsg"> </div> </div> <div class="row"> <div class="col-md-5 box"><label>Last Name </label></div> <div class="col-md-7 boxinput"><span class="colenSpan">:&nbsp;</span><input type="text" name="lastName" /></div> </div> <div class="row"> <h3>Contact Details </h3> <div class="col-md-5 box"><label>Email Id </label></div> <div class="col-md-7 boxinput"><span class="colenSpan">:&nbsp;</span><input type="email" name="emailId" required /></div> </div> <div class="row"> <div class="col-md-5 box"><label>Mobile Number </label></div> <div class="col-md-7 boxinput"><span class="colenSpan">:&nbsp;</span><input type="text" name="mobileNumber" id= "mobNum" required /></div> <div id="mobbox"></div> </div> <div class="row ErrorMessg"> <div class="col-md-5"><label></label></div> <div class="col-md-7" id="mobileNumMess"> </div> <div id="mobbox"></div> </div> <input type="submit" name="submitDetails" value="Submit Details" id="submit"/> </form> excerpt of jquery: $(function(){ //firstNameErrorMsg $("#firstNameErrorMsg").hide(); $("#mobileNumMess").hide(); var errorFirstName= false; var mobileNum= false; $("#fName").focusout(function(){ checkFirstName(); }); $("#mobNum").focusout(function(){ checkMobNum(); }); function checkFirstName(){ var fNameLength = $("#fName").val().length; if(fNameLength < 5 || fNameLength > 20){ $("#firstNameErrorMsg").html("sholud be between 5-20 charecters "); $("#firstNameErrorMsg").show(); errorFirstName= true; }else { $("#firstNameErrorMsg").hide(); } } function checkMobNum(){ var pattern = new RegExp(/^\(?([0-9]{3})\)?[-. ]?([0-9]{3})[-. ]?([0-9]{4})$/); if(pattern.test($("#mobNum").val())){ $("#mobileNumMess").hide(); }else{ $("#mobileNumMess").html("Invalid Mobile Number"); $("#mobileNumMess").show(); mobileNum = true; console.log("h from begin sub"); } } $("#empform1").on('submit',function(){ //return true; //console.log("h from begin2 sub1"); var errorFirstName= false; var mobileNum= false; checkFirstName(); checkMobNum(); //console.log("under var"); if(errorFirstName == false){ return true; console.log("under if"); }else{ return false; } }) }); A: You need to correct your code in 2 places. To solve form submit issue, you need to remove the variable declaration inside submit method $("#empform1").on('submit',function(){ //return true; //console.log("h from begin2 sub1"); //var errorFirstName= false; //var mobileNum= false; Dont forget to reset the var errorFirstName inside checkFirstName method } else { $("#firstNameErrorMsg").hide(); errorFirstName = false; }]
2024-04-07T01:27:13.970301
https://example.com/article/3828
Brutal ! Captured Man Getting Head Chop Off with an Axe Unsuccessful Beheading So Lets Ripped Out His Guts - Part 2 You Must Be 18 Years of Age or Over to Use the Site.
2023-11-16T01:27:13.970301
https://example.com/article/9004
Q: Publish Firefox extensions automatically Is it possible to publish Firefox extensions hosted by Mozilla automatically through the API (like through the Google Web Store API)? I can not find any documentation about this. I want to publish my extensions automatically using Bitbucket Pipelines and the only option I see at the moment is to host my extensions by myself. A: I'm quite sure you can use npm to fetch 'web-ext', the command line tool that is able to upload new versions to addons.mozilla.org. Have a look at the documentation: https://developer.mozilla.org/en-US/docs/Mozilla/Add-ons/WebExtensions/Getting_started_with_web-ext
2024-06-11T01:27:13.970301
https://example.com/article/7979
1. Technical Field The field of this invention is fluorescent labeled primers and their use. 2. Background There is an increasing demand to be able to identify and quantify components of mixtures. The greater the complexity of the mixture, the greater the interest in being able to simultaneously detect a plurality of the components present. As illustrative of this situation is DNA sequencing, where it is desirable to efficiently excite from one to four fluorescently tagged components with a laser source, while providing for fluorescent signal emission at a plurality of distinctive wavelengths, where the fluorescence signals should be as intense as possible. In this situation, the different labels should not adversely affect the electrophoretic mobility of the sequences to which they are attached. Currently, there are four methods used for automated DNA sequencing: (1) the DNA fragments are labeled with one fluorophore and then the fragments run in adjacent sequencing lanes (Ansorge et al., Nucleic Acids Res. 15, 4593-4602 (1987); (2) the DNA fragments are labeled with four different fluorophores and all the fragments are electrophoretically separated and detected in a single lane (Smith et al., Nature 321, 674-679 (1986); (3) each of the dideoxynucleosides in the termination reaction is labeled with a different fluorophore and the four sets of fragments are run in the same lane (Prober et al., Science 238, 336-341 (1987); or (4) the sets of DNA fragments are labeled with two different fluorophores and the DNA sequences coded with the dye ratios (Huang et al., Anal. Chem. 64, 2149-2154 (1992). All of these techniques have significant deficiencies. Method 1 has the potential problems of lane-to-lane variations in mobility, as well as a low throughput. Methods 2 and 3 require that the four dyes be well excited by one laser source and that they have distinctly different emission spectra. In practice, it is very difficult to find two or more dyes that can be efficiently excited with a single laser and that emit well separated and intense fluorescent signals. As one selects dyes with distinctive red-shifted emission spectra, their absorption maxima will also move to the red and all the dyes can no longer be efficiently excited by the same laser source. Thus, the detection sensitivity for these dyes will suffer. Also, as more different dyes are selected, it becomes more difficult to select all the dyes such that they cause the same mobility shift of the labeled molecules. It is therefore of continued interest that improved labels be developed which have strong absorption at a common wavelength, have a high quantum yield for fluorescence, have intense fluorescence signals and have a large Stokes shift of the emission. U.S. Pat. No. 4,996,143 reports the preparation of oligonucleotide probes comprising donor and acceptor fluorophores designed for the detection of complementary DNA target sequences by hybridization to form labeled double-strand DNA fragments. These probes were specifically labeled in the middle of the probe, explicitly excluding the 5xe2x80x2 or 3xe2x80x2 end base unit. Smith et al., Nucleic Acids Research (1986) 321:674-679 reports the synthesis of oligonucleotides having an aliphatic amino group at the 5xe2x80x2 terminus, as well as the preparation of fluorescent derivatives thereof, containing only a single fluorescent label. cl SUMMARY OF THE INVENTION Labels comprising at least one pair of fluorophores, wherein a pair is comprised of a donor and acceptor fluorophore, in energy transfer relationship, and methods for their use, are provided. To generate the labels, pairs or families of fluorophores are bound to a backbone, particularly a nucleic acid backbone, where one member of the pair is bonded to a terminus of the backbone. The range of distances between donor and acceptor fluorophores is chosen to ensure efficient energy transfer, and can be modulated to affect the label mobility. The subject labels find particular use as primers in nucleotide chain extension applications, such as sequencing, PCR and the like.
2023-10-29T01:27:13.970301
https://example.com/article/1237
SAN DIEGO -- While talk circulated quickly around the start of the Winter Meetings that the Mariners were zeroing in on a deal with free-agent outfielder Melky Cabrera, word emerged Monday afternoon that the two sides weren't that close and the club was widening its search for a right fielder. General manager Jack Zduriencik declined comment on Cabrera or any specific free agents, but said Monday evening that nothing was imminent on any fronts after meeting with numerous teams and player agents in the opening day of baseball's annual gathering of executives. "We have dialogue with a lot of clubs and free agents, but I could not say that we're close to anything right now," Zduriencik said. Video: Johns discusses Mariners' goals at Winter Meetings A year ago, the Mariners had a number of vacancies to fill as Zduriencik went about rebuilding his roster in the wake of a 71-win season that led to the resignation of manager Eric Wedge. But Zduriencik went into this winter with far fewer needs -- as well as the rising buzz from an 87-75 club that just missed an American League Wild Card playoff berth -- and thus has focused now on available right-field options to fill the one remaining hole on a club looking like a rising contender in the AL West under skipper Lloyd McClendon. The Mariners already did much of their heavy lifting before arriving in San Diego, having signed slugger Nelson Cruz to fill their cleanup spot last week and then trading Michael Saunders for veteran Blue Jays left-hander J.A. Happ to fill out their rotation. If the remaining available free agents and trade partners set the bar too high, Zduriencik says he won't feel pressured to make moves that don't make sense. "We like where we're at. We like our club right now," he said. "We've addressed some needs, both short term and long term. If this is the club we went to Spring Training with, we have some flexibility and can look at some options internally that would help us. We'll still continue to pursue other options." Video: McClendon joins MLB Now Cabrera, 30, is the best remaining corner outfielder on a free-agent market that saw most of the top offensive names signed even before executives from all 30 clubs arrived in San Diego. The 10-year Major League veteran certainly would fill Seattle's largest remaining need, given the desire to bolster corner-outfield production. McClendon is pretty set on Dustin Ackley in left field and Austin Jackson in center, but the club traded Saunders and now only has returning rookies James Jones and Stefen Romero in right field, though Cruz could also see some action there when he's not at designated hitter. Cabrera isn't a big power bat, but he's a quality hitter with a career .286/.339/.415 line who put up an OPS over .800 in three of the past four seasons with the Royals, Giants and Blue Jays. Alex Rios, 33, is another free-agent option who has been a productive Major Leaguer for the past 11 years. Rios dealt with ankle and thumb issues last season that curtailed his production, though he still hit .280 with 54 RBIs in 131 games for the Rangers. But Rios could be a strong bounceback candidate, as he's put up a .278/.323/.439 line for his career and averaged 18 home runs and 76 RBIs a year for nine seasons before seeing his numbers dip last season. After being hit with a 50-game PED suspension in the Biogenesis case in 2013, Cabrera came back to hit .301 with 16 home runs and 73 RBIs in 139 games last season before breaking his finger diving back to first base on Sept. 5. Cabrera was second in the AL with 171 hits at the time, but missed the rest of the season. Cabrera rejected a $15.3 million qualifying offer from the Blue Jays, so any team that signs him will forfeit a Draft choice. But the Mariners have already surrendered their first-round pick by signing Cruz, so Cabrera would only cost them a second-rounder if he also signs. Like Cruz, Cabrera is long-time friends with Robinson Cano, having come up in the Yankees organization together as youngsters out of the Dominican Republic. But that doesn't mean the Mariners will pay any price for a player who earned $8 million in the final year of his deal with Toronto. The trade market could also yield some possibilities, though the Mariners appear increasingly reluctant to give up any of their prize young pitchers to get a player in the final year of his deal, like a Justin Upton or Yoenis Cespedes. Zduriencik said he's been asked about all his young pitchers at some point, as well as young shortstops Chris Taylor and Brad Miller. But again, he sounded like a GM who liked what he's already got -- and didn't necessarily like the offers he was hearing on Monday. "You always keep all your options open and see where dialogue goes, but I think we're in a good position, where we've got really good starting pitching, a really good bullpen and we've added a middle-of-the-order hitter," Zduriencik said. "Everybody else is going to be a year older, so the growth these guys have gone through, the struggles they had a couple years ago, got cleaned up a little last year, and we should see even more of that this year."
2024-07-21T01:27:13.970301
https://example.com/article/4531
Sin miedo a la verdad: Ya no estás solo The first season of the Mexican anthology television series Sin miedo a la verdad created by Rubén Galindo premiered on Las Estrellas on 8 October 2018, and concluded on 4 November 2018. The first season consists of 21 episodes. Plot Manu is an introverted man with special abilities, not only to repair cell phones, but to violate systems and passwords. Thanks to Doña Cata, his mentor, he has managed to survive hidden from a cruel past that still haunts him, leaving a terrible shadow in his soul and marking on his face. Manu works in the Plaza de la Computación, where they repair, adjust and get any kind of electronic devices and the only way Manu has to deal with the pain his past causes him is, helping others, so that through his vlog "Sin miedo a la verdad", he will be who anonymously protects those who have been victims of some injustice. As Manu goes about solving cases, he is persecuted by devil policeman Horacio, a corrupt cop, main perpetrator and responsible for the murder of Manu and Estefani's father, who wants to take revenge on Manu for killing his rapist brother and dirty cop. Cast Alex Perea as Manuel "Manu" Montero Dacia González as Catalina Gómez Tania Niebla as Berenice Hidalgo Ligia Uriarte as Lety Fermín Martínez as Horacio Escamilla Israel Islas as Isidro Escamilla Paola Miguel as María José Hidalgo Arturo Nahum as Alberto Gómez "Pila" Carlos Barragán as Cuauhtémoc Sánchez "El Bolillo" Ana Cristina Rubio as Estefani Montero Catalina López as Amanda Víctor Cerveira as Chicho Eugenio Montessoro as Alfredo Alonso Episodes References Category:2018 Mexican television seasons
2023-12-04T01:27:13.970301
https://example.com/article/4839
An Extraordinary Story I have mentioned before that wall plaques in the places I visit pique my interest, and that was certainly the case at St. George’s Memorial Church in Ypres. The church, built after the First World War for those Anglophones working in the area, was funded entirely by memorial donations, recorded on the brass plaques. It seems as if every spare piece of wall is covered with a commemorative plaque. My initial interest was in finding the plaques commemorating Canadian soldiers or regiments; I found plenty of those, such as the one for Cpl. Howard Ferguson of Princess Patricia’s Canadian Light Infantry, who survived the war, and Private Archibald W.G. Marshall, of the Canadian Mounted Rifles, who was killed in action in 1916. While I had never before heard of those two soldiers, there were plaques for people whose names I did indeed recognize, such as Field Marshall Sir Douglas Haig, Commander of the British Army during the First World War. Reading all the tributes takes time, there are so many, but one stood out for me because it was the only one I saw dedicated to a woman. War has traditionally been a man’s occupation. I have heard it suggested that if women were in charge there would be no war because they are too smart to lead their countries into conflict. Unfortunately history does not bear that out. A tribute to a woman, among all the commemorations of men and regiments piqued my curiosity, to say the least. And I had never heard of Violette Szabo before, but it was obvious she had served in the Second World War, not the WWI: the plaque said she had been executed at the Ravensbruck concentration camp in January 1945. The words after her name were familiar, not a regiment name but “Special Operations Executive.” I had seen that name before; the people in that organization were not soldiers, they were spies. There is a certain amount of romance attached to spies and the profession of espionage, at least if they are on our side. Mind you, that romance mostly comes from fictional spy tales such as Ian Fleming’s James Bond novels (I must confess I have never watched any of the movies in the James Bond franchise). The real thing is probably sordid and much less romantic, but fraught with danger nonetheless. James Bond is fiction, not reality. When we got back to Canada I looked her up. Violette Szabo was a real spy, not fiction. Turns out she and her husband, Etienne were the most decorated married couple of the Second World War. (He was a soldier, not a spy, killed in action in North Africa.) I’m not going to give you her life story; you can check it out on Wikipedia if you so desire. She parachuted into occupied France twice, operating behind enemy lines gathering information. She was arrested twice and escaped her captors, but the third time she was not as fortunate. Hers is a story of courage and bravery, the sort of tale Hollywood movies are made of. Which may explain why Hollywood did make a movie, or at least British film makers did. Carve Her Name With Pride was released in 1958. I haven’t seen the movie yet, but I have promised myself I will find the time soon to watch it. In wartime ordinary people frequently are called upon to do extraordinary things. I had never before heard of Violette Szabo before seeing her name on the wall of St. George’s Memorial Church. After reading her story, I wish I had had the opportunity to meet such a remarkable person.
2023-08-02T01:27:13.970301
https://example.com/article/3898
Anomalous signed passive fathometer impulse response when using adaptive beam forming (L). The impulse response of the seabed can be extracted from sea surface ambient noise by cross-correlating the time series from an upward and a downward steered beam. When the steering for each beam is standard minimum variance adaptive beam forming it has been found that the impulse response for significant echoes appears to have the same amplitude but opposite sign. A mathematical explanation is offered for this strange phenomenon. Crucial contributing factors are that the cross-spectral density matrix for the vertical array typically consists of the sum of a Toeplitz matrix and a much weaker Hankel matrix and that it is ill-conditioned.
2023-09-18T01:27:13.970301
https://example.com/article/1465
An indole diterpenoid isolated from the fungus Drechmeria sp. and its antimicrobial activity. One new indole diterpenoid, drechmerin I (1), was isolated from the fermentation broth of Drechmeria sp. isolated from the root of Panax notoginseng. Its structure was elucidated based on 1 D and 2 D nuclear magnetic resonance (NMR), high resolution electrospray ionization mass spectrum (HRESIMS), and electronic circular dichroism (ECD) spectroscopic analyses as well as TD DFT calculations of ECD spectra. Drechmerin I (1) was assayed for its antimicrobial activity against Candida albicans, Staphylococcus aureus, Bacillus cereus, B. subtillis, Pseudomonas aeruginosa, and Klebsiella pneumonia, respectively. Drechmerin I (1) showed antimicrobial activities against B. subtillis with an MIC value of 200 μg/mL. The interaction of S. aureus peptide deformylase with drechmerin I (1) was investigated by molecular docking.
2024-01-02T01:27:13.970301
https://example.com/article/9374
Reprodução/Youtube Da Agência Minas A Escola Estadual Ari da Franca, em Belo Horizonte, é uma das dez contempladas com o prêmio do projeto “Educar para Transformar”, promovido pelo Instituto MRV e a Fundação Pitágoras. Como premiação, vai receber R$ 30 mil em investimentos de infraestrutura e capacitação para colocar em prática o projeto “Ludo Aprendiz”, idealizado pelo professor de filosofia Felipe Pinheiro. O propósito do “Ludo Aprendiz” é usar jogos de tabuleiro para facilitar e tornar mais prazeroso o entendimento dos estudantes sobre matemática, física, biologia, língua portuguesa e outros componentes curriculares do ensino médio regular e para Educação de Jovens e Adultos (EJA), modalidades atendidas pela escola. Dessa forma, a intenção também é atrair mais atenção dos alunos para os conteúdos ensinados em sala de aula, aumentar a frequência e diminuir a evasão escolar dos estudantes. “Desde o ano passado, eu já usava jogos para relacionar ao conteúdo estudado. Comecei a perceber o quanto os alunos curtiam e se interessavam mais quando havia esse tipo de atividade. Muitos perceberam que os jogos estavam realmente ajudando a compreender melhor as disciplinas, outros passaram a se interessar mais em ir às aulas por causa desse momento lúdico. Termos sido contemplados com o prêmio é uma felicidade sem tamanho, um reconhecimento do nosso trabalho e um incentivo muito grande para irmos além”, diz o idealizador do projeto, professor Felipe. Com o aporte do “Transformar para Educar”, a escola vai comprar os jogos e o mobiliário para montar a “ludoteca” e também investir na capacitação dos professores para executar o projeto em todas as disciplinas. A Ari da Franca foi a única escola mineira selecionada como finalista da competição nacional, que recebeu mais de 150 inscrições de unidades de ensino das redes estadual e municipal de 45 municípios brasileiros. O diretor da E.E. Ari da Franca, Igor de Alvarenga Oliveira Icassati Rojas, conta que a escola está em festa. “Como a votação foi online, fizemos uma mobilização muito grande. Professores, estudantes, familiares de alunos, todos se envolveram na divulgação do projeto. É uma emoção muito grande sermos destaque no cenário nacional com um projeto pedagógico como esse. Temos muito trabalho pela frente agora, e estamos muito animados”, disse. Educar para Transformar Conduzido pelo Instituto MRV e, nesta sexta edição, em parceria com a Fundação Pitágoras, o “Educar para Transformar” busca propostas com foco em desenvolvimento sustentável para resolver problemáticas de comunidades por meio da Educação. Durante quatro meses, os projetos selecionados receberão aporte financeiro e suporte da equipe, que atuará em encontros presenciais e virtuais, auxiliando no desenvolvimento, capacitando em novos conteúdos e acompanhando a aplicação dos recursos. Com foco em escolas municipais e estaduais da rede pública de ensinos fundamental e médio, esta edição do “Educar para Transformar” busca envolver todo o corpo escolar de forma coparticipativa na melhoria do clima, do ambiente e das atividades escolares, em diversos aspectos. Confira o vídeo sobre o Projeto Ludo Aprendiz:
2023-09-13T01:27:13.970301
https://example.com/article/5623
Q: $n$ books and 3 friends expected value of $X$ = no. weeks all friends read the same book There are 3 friends each with $n$ books, each friend has a set of their own $n$ same books, each one takes a random permutation of the $n$ books. They all read one book every week (n consecutive weeks). Now, we let $X$= no. of weeks they all read the same book. The problem is asking for the variance, but I figured the first thing to do was to figure out the expected value or more importantly the probability of reading the same book for no. of weeks. I did some math and I was able to figure out that there is $3 (n!)^3$ outcomes in the sample space. I did the same problem with 3 friends and two books (n=2) and I figured out the probability of all the books matching for $X$= 2 weeks is $\frac{1}{4}$ or maybe $\frac{1}{n!}$ and for $X$ = 0 weeks is $\frac{1}{2}$ or perhaps $\frac{1}{n}$. I am not sure if the problem applies to the other, because the middle ranges are not accounted for i.e $x=1,3,4,...,n-1$ so I am not sure if this scales. If you can point me in the right direction, I would greatly appreciate it! A: For the mean, for $i=1$ to $n$, let $X_i=1$ if they are all reading the same book, and $X_i=0$ otherwise. The number $Y$ of weeks they are reading the same book is given by $Y=X_1+\cdots+X_n$. By the linearity of expectation, we have $E(Y)=E(X_1)+\cdots+E(X_n)$. For any $i$, the probability they are reading the same book in Week $i$ is $\frac{1}{n^2}$. So $E(X_i)=\frac{1}{n^2}$ and therefore $E(Y)=\frac{1}{n}$. Remark: The variance is found by a similar but but more complicated calculation. It is enough to find $E(Y^2)$. Expand $Y^2$. We get $$\sum_1^n X_i^2 +2\sum_{1\le i\lt j\le n} X_iX_j.$$ We will need $E(X_iX_j)$, so we will need the probability that $X_i=1$ and $X_j=1$.
2023-12-11T01:27:13.970301
https://example.com/article/6157
--- abstract: | In 2006 Quesne and Tkachuk (J. Phys. A: Math. Gen. [**39**]{}, 10909, 2006) introduced a (D+1)-dimensional $(\beta,\beta')$-two-parameter Lorentz-covariant deformed algebra which leads to a nonzero minimal length. In this work, the Lagrangian formulation of the spinor field in a (3+1)-dimensional space-time described by Quesne-Tkachuk Lorentz-covariant deformed algebra is studied in the case where $\beta'=2\beta$ up to first order over deformation parameter $\beta$. It is shown that the modified Dirac equation which contains higher order derivative of the wave function describes two massive particles with different masses. We show that physically acceptable mass states can only exist for $\beta<\frac{1}{8m^{2}c^{2}}$. Applying the condition $\beta<\frac{1}{8m^{2}c^{2}}$ to an electron, the upper bound for the isotropic minimal length becomes about $3 \times 10^{-13}m$. This value is near to the reduced Compton wavelength of the electron $(\mathchar'26\mkern-10mu\lambda_{c}= \frac{\hbar}{m_{e}c}=3.86\times 10^{-13} m)$ and is not incompatible with the results obtained for the minimal length in previous investigations.\ [**Keywords:**]{} Quantum gravity; Generalized uncertainty principle; Minimal length; Spinor field; Dirac equation author: - | S. K. Moayedi $^{a}$[^1] , M. R. Setare $^{b}$ [^2] and H. Moayeri $^{a}$[^3]\ $^a$\ $^{b}$\ title: '**Formulation of the Spinor Field in the Presence of a Minimal Length Based on the Quesne-Tkachuk Algebra**' --- Introduction ============ The unification between general relativity and quantum mechanics is one of the major subjects of recent studies in theoretical physics. The most interesting consequence of the above unification is that in quantum gravity there is a minimal observable distance on the order of the Planck length, $l_{P}=\sqrt{\frac{G\hbar}{c^{3}}}\simeq 1.6 \times 10^{-35}m$, where $G$ is the Newton’s constant. The existence of this minimal observable length which is motivated from various theories of quantum gravity (such as perturbative string theory) and black hole gedanken experiments, leads to a generalization of Heisenberg uncertainty principle. This generalized or gravitational uncertainty principle (GUP) can be written as $$\triangle X\geq \frac{\hbar}{2\triangle P}+\frac{\hbar}{2}\beta\triangle P,$$ where $\beta$ is a positive parameter \[1-19\]. At high energies, the second term on the right-hand side of (1) becomes significant and leads to important deviations from the usual quantum mechanics. With the GUP even at high momenta $\triangle X$ is limited in resolution because of quantum gravitational effects. In other words, independent of momentum, $\triangle X$ is always larger than a minimal observable length $(\triangle X)_{min}=\hbar\sqrt{\beta}.$ Nowadays, physicists are trying to reformulate the quantum field theory in the presence of a minimal observable length and there is hoping that this approach causes unwanted divergencies can be eliminated or modified in quantum field theory \[7\]. In Ref. \[10\], the real Klein-Gordon field in the presence of a minimal observable length was studied and the authors estimated the minimal observable length must be in the range $10^{-17}m<(\triangle X)_{min}<10^{-15}m$. SI units are used throughout this work.\ This paper is organized as follows. In Sect. 2, the (3+1)-dimensional $(\beta,\beta')$-two-parameter Lorentz-covariant deformed algebra introduced by Quesne and Tkachuk is reviewed and it is shown that the above algebra leads to a minimal observable length \[5,6\]. In Sect. 3, the Lagrangian formulation of the Dirac spinor field in a (3+1)-dimensional space-time described by Quesne-Tkachuk algebra is presented in the case where $\beta'=2\beta$ up to first order over deformation parameter $\beta$. In Sect. 4, the solutions of the modified spinor field equation for free motion of a Dirac particle are obtained and it is shown that these solutions are associated with two different mass states. We find that the minimal observable length in the modified spinor theory is of the order of about $3 \times 10^{-13}m$. Finally, Sect. 5 is devoted to the conclusions. A Brief Review of the Quesne-Tkachuk Algebra ============================================ Let us start with a quick review of the Quesne-Tkachuk algebra, which is a Lorentz-covariant deformed algebra that describes a $(D+1)$-dimensional quantized space-time \[5,6\]. The $(3+1)$-dimensional Quesne-Tkachuk algebra is characterized by the following modified commutation relations $$[X^{\mu},P^{\nu}]=-i\hbar(g^{\mu\nu}(1-\beta P_{\rho}P^{\rho})-\beta'P^{\mu}P^{\nu}),$$ $$[X^{\mu},X^{\nu}]=i\hbar\frac{2\beta-\beta'-(2\beta+\beta')\beta P_{\rho}P^{\rho}}{1-\beta P_{\rho}P^{\rho}}(P^{\mu}X^{\nu}-P^{\nu}X^{\mu}),$$ $$[P^{\mu},P^{\nu}]=0,$$ where $\mu,\nu,\rho =0,1,2,3$ and $\beta,\beta'$ are two deformation parameters which are assumed non-negative $(\beta,\beta'\geq 0)$. In terms of length $(L)$, mass $(M)$, and time $(T)$ the deformation parameters $\beta$ and $\beta'$ have the same dimensions $M^{-2}L^{-2}T^{2}$, i.e., $[\beta]=[\beta']=(momentum)^{-2}$. Also, $X^{\mu}$ and $P^{\mu}$ are deformed position and momentum operators and $g_{\mu\nu}=g^{\mu\nu}=diag(1,-1,-1,-1)$. Using (2) and the Schwarz inequality for a quantum state, the uncertainty relation for position and momentum by assuming that $\triangle P^{i}$ is isotropic $(\triangle P^{i}=\triangle P,\hspace{2mm} i=1,2,3)$ becomes $$\triangle X^{i}\triangle P\geq\frac{\hbar}{2}\left|1-\beta\left\{\langle(P^{0})^{2}\rangle -3(\triangle P)^{2}-\sum^{3}_{j=1}\langle P^{j}\rangle^{2}\right\}+\beta'\left[(\triangle P)^{2}+\langle P^{i}\rangle^2\right]\right|.$$ Hence, we arrive at an isotropic absolutely smallest uncertainty in position given by $$(\triangle X^{i})_{0}=\hbar\sqrt{(3\beta+\beta')\left[1-\beta\langle (P^{0})^{2}\rangle\right]}\hspace{2mm}, \hspace{5mm}i\in \{1,2,3\}.$$ In \[8,11\], Samar and Tkachuk introduced a representation which satisfies the modified commutation relations (2)-(4) up to first order in $\beta,\beta'$. The Samar-Tkachuk representation is given by $$X^{\mu}=x^{\mu}- \frac{2\beta - \beta'}{4}(x^{\mu}p^{2}+p^{2}x^{\mu}),$$ $$P^{\mu}=(1-\frac{\beta'}{2}p^{2})p^{\mu},$$ where $x^{\mu}, p^{\mu}=i\hbar\frac{\partial}{\partial x_{\mu}}=i\hbar\partial^{\mu}$ are position and momentum operators in ordinary relativistic quantum mechanics, and $p^{2}=p_{\alpha}p^{\alpha}=(p^{0})^{2}-\bf{p}.\bf{p}$ .\ In this paper, we only consider the special case $\beta'=2\beta$, wherein the position operators commute with each other in linear approximation over the deformation parameters, i.e., $[X^{\mu},X^{\nu}]=0$. In such a linear approximation, the Quesne-Tkachuk algebra reads $$[X^{\mu},P^{\nu}]=-i\hbar(g^{\mu\nu}(1-\beta P_{\rho}P^{\rho})-2\beta P^{\mu}P^{\nu}),$$ $$[X^{\mu},X^{\nu}]=0,$$ $$[P^{\mu},P^{\nu}]=0.$$ It is easy to show that the following representations satisfy (9)-(11), at the first order in $\beta$, $$X^{\mu}=x^{\mu},$$ $$P^{\mu}= (1-\beta p^{2})p^{\mu}.$$ It should be noted that the representations (7),(8) and (12),(13) coincide when $\beta'=2\beta$. Lagrangian Formulation of the Spinor Field Based on the Quesne-Tkachuk Algebra ============================================================================== The Dirac Lagrangian density for a spinor $(spin-\frac{1}{2})$ field is \[20\] $${\cal L}(\Psi , \overline{\Psi} , \partial_{\mu}\Psi , \partial_{\mu}\overline{\Psi})= \frac{i\hbar c}{2}\left[\hspace{1mm}\overline{\Psi}\gamma^{\mu}(\partial_ {\mu}\Psi)-(\partial_{\mu}\overline{\Psi})\gamma^{\mu}\Psi\right]-mc^{2}\overline{\Psi}\Psi,$$ where $\Psi$ is a Dirac spinor, $\gamma^{\mu}$ are the Dirac matrices, and $\overline{\Psi} :=\Psi^{\dag} \gamma^{0}$ is the adjoint spinor. The Euler-Lagrange equation for $\overline{\Psi}$ is $$\frac{\partial {\cal L}}{\partial \overline{\Psi}}-\partial_{\mu}\left(\frac{\partial {\cal L}}{\partial (\partial_{\mu}\overline{\Psi})} \right)=0 .$$ If we substitute the Lagrangian density (14) into the Euler-Lagrange equation (15), we will obtain the Dirac equation as follows $$\left(i\hbar\gamma^{\mu}\partial_{\mu}- mc\right)\Psi=0.$$ If we apply the Euler-Lagrange equation to $\Psi$, we obtain $$i\hbar\left(\partial_{\mu}\overline{\Psi}\right)\gamma^{\mu} + mc\overline{\Psi}=0,$$ which is the adjoint of the Dirac equation. Now we want to obtain the Lagrangian density for the spinor field in the presence of a minimal length based on the Quesne-Tkachuk algebra. For such a purpose, let us write the Lagrangian density by using the representations (12) and (13), i.e., $$x^{\mu}\longrightarrow x^{\mu},$$ $$\partial^{\mu}\longrightarrow (1+ \beta\hbar^{2}\Box)\partial^{\mu},$$ where $\Box := \partial_{\mu}\partial^{\mu}$ is the d’Alembertian operator.\ The result reads $${\cal L}= \frac{i \hbar c}{2}\left\{\overline{\Psi} \gamma^{\mu}(\partial_{\mu}\Psi)-(\partial_{\mu}\overline{\Psi})\gamma^{\mu}\Psi +\beta\hbar^{2} [\hspace {1mm} \overline{\Psi}\gamma^{\mu}(\Box \partial_{\mu} \Psi)- (\Box \partial_{\mu}\overline{\Psi})\gamma^{\mu}\Psi]\right\}-mc^{2}\overline{\Psi}\Psi + {\cal O} (\beta^{2}).$$ The term $\beta \frac{i \hbar^{3} c}{2}[ \hspace {1mm} \overline{\Psi}\gamma^{\mu}(\Box \partial_{\mu} \Psi)- (\Box \partial_{\mu}\overline{\Psi})\gamma^{\mu}\Psi]$ in (20) can be considered as a minimal length effect. The generalized Euler-Lagrange equation for the adjoint spinor $\overline{\Psi}$ is \[21,22\] $$\frac{\partial{\cal L}}{\partial \overline{\Psi}}-\partial_{\mu}\left(\frac{\partial{\cal L}}{\partial(\partial_{\mu}\overline{\Psi})}\right)+ \partial_{\mu}\partial_{\nu}\left(\frac{\partial {\cal L}}{\partial(\partial_{\mu}\partial_{\nu}\overline{\Psi})}\right) -\partial_{\mu}\partial_{\nu}\partial_{\lambda}\left(\frac{\partial {\cal L}}{\partial(\partial_{\mu}\partial_{\nu}\partial_{\lambda}\overline{\Psi})}\right)+\cdot \cdot \cdot =0.$$ If we substitute the Lagrangian density (20) into the generalized Euler-Lagrange equation (21) and neglecting terms of order $\beta^{2}$, we will obtain the modified Dirac equation as follows $$[i\hbar \gamma^{\mu} (1+ \beta \hbar^{2} \Box)\partial_{\mu}-mc]{\Psi}=0.$$ The term $i\hbar^{3}\beta \gamma^{\mu}\Box \partial_{\mu}\Psi$ in (22) shows the minimal length effects. The wave equation (22) is a third order relativistic wave equation that in the limit of $\beta\longrightarrow 0$ turns in to the ordinary Dirac equation. Applying the generalized Euler-Lagrange equation to $\Psi$, i.e., $$\frac{\partial{\cal L}}{\partial \Psi}-\partial_{\mu}\left(\frac{\partial{\cal L}}{\partial(\partial_{\mu}\Psi)}\right)+ \partial_{\mu}\partial_{\nu}\left(\frac{\partial {\cal L}}{\partial(\partial_{\mu}\partial_{\nu}\Psi)}\right) -\partial_{\mu}\partial_{\nu}\partial_{\lambda}\left(\frac{\partial {\cal L}}{\partial(\partial_{\mu}\partial_{\nu}\partial_{\lambda}\Psi)}\right)+\cdot \cdot \cdot =0,$$ and neglecting terms of order $\beta^{2}$, we find $$i\hbar [(1+\beta\hbar^{2}\Box)\partial_{\mu}\overline{\Psi}]\gamma^{\mu}+mc\overline{\Psi}=0,$$ which is the adjoint of the modified Dirac equation. Plane-Wave Solutions of the Modified Dirac Equation =================================================== In this section, the notation and conventions are the same as in Greiner, Relativistic Quantum Mechanics: Wave Equations, 3rd edn (Springer 2000) \[23\]. Now, we will obtain the plane-wave solutions of the modified Dirac equation (22). The modified Dirac equation (22) can be written as $$\left[i\hbar(1+\beta\hbar^{2}\Box)\frac{\partial}{\partial t}+i\hbar c(1+\beta\hbar^{2}\Box)\boldsymbol{\hat{\alpha}}.\boldsymbol{\nabla}-mc^{2}\hat{\beta}\right]\Psi=0,$$ where $$\hat{\beta}=\gamma^{0}= \left( {\begin{array}{*{20}c} I & 0 \\ 0 & -I \\ \end{array} } \right),\qquad \gamma^{i}= \left( {\begin{array}{*{20}c} 0 & \sigma_{i} \\ -\sigma_{i} & 0 \\ \end{array} } \right),\qquad \hat{\alpha}^{i}=\hat{\beta}\gamma^{i}.$$ In equation (26) $\sigma_{i}$ are the $2\times2$ Pauli matrices, $I$ is the $2\times2$ unit matrix, and $0$ is the $2\times2$ null matrix.\ To solve equation (25), we try the following ansatz $$\Psi(\textbf{r},t)=\psi(\textbf{r})exp(-\frac{i}{\hbar}\varepsilon t),$$ where $\varepsilon$ describes the time evolution of the stationary state $\psi(\textbf{r})$. If we substitute (27) into (25), we will obtain $$[(1-\beta \frac{\varepsilon^{2}}{c^{2}}-\beta\hbar^{2}\nabla^{2})(\varepsilon +i\hbar c \boldsymbol{\hat{\alpha}}.\boldsymbol{\nabla})-m c^{2}\hat{\beta}]\psi(\textbf{r})=0.$$ The four-component spinor $\psi(\textbf{r})$ splits up into two two-component spinors $\phi$ and $\chi$, i.e., $$\psi=\left( {\begin{array}{*{20}c} \psi_{1} \\ \psi_{2} \\ \psi_{3} \\ \psi_{4} \end{array} } \right)=\left( {\begin{array}{*{20}c} \phi \\ \chi \\ \end{array} } \right),$$ with $$\phi=\left( {\begin{array}{*{20}c} \psi_{1} \\ \psi_{2} \\ \end{array} } \right)\qquad , \qquad \chi=\left( {\begin{array}{*{20}c} \psi_{3} \\ \psi_{4} \\ \end{array} } \right).$$ Using the explicit form (26) for the $\hat{\alpha}^{i}$ and $\hat{\beta}$ matrices (28) can be written as $$(1-\beta\frac{\varepsilon^{2}}{c^{2}}-\beta \hbar^{2}\nabla^{2})\varepsilon\phi=(1-\beta\frac{\varepsilon^{2}}{c^{2}}-\beta \hbar^{2}\nabla^{2})c\boldsymbol{\sigma}.\frac{\hbar}{i}\boldsymbol{\nabla}\chi +mc^{2}\phi,$$ $$(1-\beta\frac{\varepsilon^{2}}{c^{2}}-\beta \hbar^{2}\nabla^{2})\varepsilon\chi=(1-\beta\frac{\varepsilon^{2}}{c^{2}}-\beta \hbar^{2}\nabla^{2})c\boldsymbol{\sigma}.\frac{\hbar}{i}\boldsymbol{\nabla}\phi -mc^{2}\chi.$$ If we substitute the following ansatz $$\left( {\begin{array}{*{20}c} \phi \\ \chi \\ \end{array} } \right)=\left( {\begin{array}{*{20}c} \phi_{0} \\ \chi_{0} \\ \end{array} } \right) exp(\frac{i}{\hbar}\textbf{p}.\textbf{r})$$ into the equations (31) and (32), we will obtain $$[\varepsilon(1-\beta\frac{\varepsilon^{2}}{c^{2}}+\beta\textbf{p}^{2})-mc^{2}]\phi_{0} -c(1-\beta\frac{\varepsilon^{2}}{c^{2}}+\beta\textbf{p}^{2})(\boldsymbol{\sigma}.\textbf{p})\chi_{0}=0,$$ $$-c(1-\beta\frac{\varepsilon^{2}}{c^{2}}+\beta\textbf{p}^{2})(\boldsymbol{\sigma}.\textbf{p})\phi_{0}+ [\varepsilon(1-\beta\frac{\varepsilon^{2}}{c^{2}}+\beta\textbf{p}^{2})+mc^{2}]\chi_{0}=0.$$ So we have a linear homogeneous system of equations for $\phi_{0}$ and $\chi_{0}$, and it has nontrivial solutions only in the case of a vanishing determinant of the coefficients, that is $$\left| \begin{matrix} [\varepsilon(1-\beta\frac{\varepsilon^{2}}{c^{2}}+\beta\textbf{p}^{2})-mc^{2}]I & -c(1-\beta\frac{\varepsilon^{2}}{c^{2}}+\beta\textbf{p}^{2})(\boldsymbol{\sigma}.\textbf{p}) \\ -c(1-\beta\frac{\varepsilon^{2}}{c^{2}}+\beta\textbf{p}^{2})(\boldsymbol{\sigma}.\textbf{p}) & [\varepsilon(1-\beta\frac{\varepsilon^{2}}{c^{2}}+\beta\textbf{p}^{2})+mc^{2}]I \end{matrix}\right|=0.$$ Using the identity $$(\boldsymbol{\sigma}.\textbf{A})(\boldsymbol{\sigma}.\textbf{B})=\textbf{A}.\textbf{B}I+i\boldsymbol{\sigma}.(\textbf{A}\times\textbf{B}),$$ equation (36) transforms into $$(\varepsilon^{2}-c^{2}\textbf{p}^{2})(1-\beta\frac{\varepsilon^{2}}{c^{2}}+\beta\textbf{p}^{2})^{2}-m^{2}c^{4}=0.$$ We observe that for $\beta\longrightarrow 0$, equation (38) leads to the conventional result $$\varepsilon^{2}=c^{2}\textbf{p}^{2}+m^{2}c^{4},$$ from which follows $$\varepsilon=\pm E_{p}\qquad\qquad,\qquad\qquad E_{p}=c\sqrt{\textbf{p}^{2}+m^{2}c^{2}},$$ as it should be. The two signs of the time evolution factor $\varepsilon$ in (40) correspond to positive and negative energy solutions of the conventional Dirac equation, respectively. But for the case $\beta\neq 0$, neglecting terms of order $\beta^{2}$ provides us with two sets of results $$\varepsilon_{-}=\pm E_{p}^{(-)}\qquad\qquad,\qquad\qquad E_{p}^{(-)}=c\sqrt{\textbf{p}^{2}+ m_{-}^{2}c^{2}},$$ $$\varepsilon_{+}=\pm E_{p}^{(+)}\qquad\qquad,\qquad\qquad E_{p}^{(+)}=c\sqrt{\textbf{p}^{2}+ m_{+}^{2}c^{2}},$$ where the non-degenerate effective masses $m_{-}$ and $m_{+}$ are defined as $$m_{-}=\frac{1}{2\sqrt{2\beta}c}\left[\sqrt{1+2\sqrt{2\beta}mc}-\sqrt{1-2\sqrt{2\beta}mc}\:\right],$$ $$m_{+}=\frac{1}{2\sqrt{2\beta}c}\left[\sqrt{1+2\sqrt{2\beta}mc}+\sqrt{1-2\sqrt{2\beta}mc}\:\right].$$ From the standpoint of quantum mechanics, (43) and (44) indicate that our modified spinor field is associated with particles having the effective masses $m_{-}$ and $m_{+}$. To avoid particles of complex mass, (43) and (44) require that $$\beta<\frac{1}{8m^{2}c^{2}}.$$ It should be noted that at $\beta = \frac{1}{8m^{2}c^{2}}$ both effective masses are equal, i.e., $m_{-}=m_{+}=m\sqrt{2}$. From equation (35) we obtain $$\chi_{0}=\frac{c(1-\beta\frac{\varepsilon^{2}}{c^{2}}+\beta\textbf{p}^{2})(\boldsymbol{\sigma}.\textbf{p})} {\varepsilon(1-\beta\frac{\varepsilon^{2}}{c^{2}}+\beta\textbf{p}^{2})+mc^{2}}\phi_{0}.$$ If we denote the two-component spinor $\phi_{0}$ in the form $$\phi_{0}=U=\left( {\begin{array}{*{20}c} U_{1} \\ U_{2} \\ \end{array} } \right),$$ with the normalization condition $U^{\dag}U=U_{1}^{*}U_{1}+U_{2}^{*}U_{2}=1$ and using (27), (29), (33) and (46), we will obtain two complete sets of positive and negative energy solutions of the modified Dirac equation as $$\Psi_{\textbf{p}\lambda}^{(\mp)}(\textbf{r},t)=\frac{N^{(\mp)}}{(2\pi\hbar)^{\frac{3}{2}}}\left( {\begin{array}{*{20}c} U \\ \frac{c(1-\frac{\beta}{c^{2}}E_{p}^{(\mp)2}+\beta\textbf{p}^{2})(\boldsymbol{\sigma}.\textbf{p})} {\lambda E_{p}^{(\mp)}(1-\frac{\beta}{c^{2}}E_{p}^{(\mp)2}+\beta\textbf{p}^{2})+mc^{2}}U \\ \end{array} } \right) exp(\frac{i}{\hbar}(\textbf{p}.\textbf{r}-\lambda E_{p}^{(\mp)}t)).$$ Here $\lambda=\pm1$ characterizes the positive and negative energy solutions with the time evolution factors $\varepsilon_{\mp}=\lambda E_{p}^{(\mp)}$. The normalization factors $N^{(\mp)}$ in (48) are determined from the conditions $$\int \Psi_{\textbf{p}\lambda}^{(\mp)\dag}(\textbf{r},t)\Psi_{\textbf{p}'\lambda'}^{(\mp)}(\textbf{r},t) d^{3}r=\delta_{\lambda\lambda'}\delta(\textbf{p}-\textbf{p}').$$ Using equations (48) and (49) together with identity (37), the normalization factors $N^{(\mp)}$ will be determined as $$N^{(\mp)}=\left\{\frac{\left[\lambda E_{p}^{(\mp)}(1-\beta m_{\mp}^{2}c^{2})+mc^{2} \right]^{2}}{\left[\lambda E_{p}^{(\mp)}(1-\beta m_{\mp}^{2}c^{2})+mc^{2} \right]^{2}+c^{2}\textbf{p}^{2}(1-\beta m_{\mp}^{2}c^{2})^{2}} \right\}^{\frac{1}{2}}.$$ If we expand the mass parameter $m_{-}$ in (43) to first order in $\beta$ we will obtain $$m_{-}=m+\beta m^{3}c^{2}.$$ Inserting (51) into (41) we find the following relation $$E_{p}^{(-)2}=m^{2}c^{4}+c^{2}\textbf{p}.\textbf{p}+2\beta m^{4}c^{6},$$ which is a modification of Einstein relation for a free particle in special relativity. After simplification, the generalized Dirac spinor $\Psi_{\textbf{p}\lambda}^{(-)}(\textbf{r},t)$ in (48) to first order in $\beta$ can be written as $$\Psi_{\textbf{p}\lambda}^{(-)}(\textbf{r},t) =\frac{1}{(2\pi\hbar)^{\frac{3}{2}}}\sqrt{\frac{\lambda E_{p}^{(-)}(1-\beta m^{2}c^{2})+mc^{2}}{2\lambda E_{p}^{(-)}(1-\beta m^{2}c^{2})}} \left( {\begin{array}{*{20}c} U \\ \frac{c(1-\beta m^{2}c^{2})(\boldsymbol{\sigma}.\textbf{p})}{\lambda E_{p}^{(-)}(1-\beta m^{2}c^{2})+mc^{2}}U \\ \end{array} } \right) exp(\frac{i}{\hbar}(\textbf{p}.\textbf{r}-\lambda E_{p}^{(-)}t)),$$ where $E_{p}^{(-)}$ was given in (52).\ It is clear that for $\beta\longrightarrow 0$ the generalized Dirac spinor $\Psi_{\textbf{p}\lambda}^{(-)}(\textbf{r},t)$ in (53) will be converted into the conventional Dirac spinor $\Psi_{\textbf{p}\lambda}(\textbf{r},t)$ for a free particle in relativistic quantum mechanics \[23\], i.e., $$\Psi_{\textbf{p}\lambda}(\textbf{r},t)=\lim_{\beta\rightarrow 0}\Psi_{\textbf{p}\lambda}^{(-)}(\textbf{r},t)=\frac{1}{(2\pi\hbar)^{\frac{3}{2}}}\sqrt{\frac{\lambda E_{p}+mc^{2}}{2\lambda E_{p}}}\left( {\begin{array}{*{20}c} U \\ \frac{c(\boldsymbol{\sigma}.\textbf{p})}{\lambda E_{p}+ mc^{2}}U \\ \end{array} } \right) exp(\frac{i}{\hbar}(\textbf{p}.\textbf{r}-\lambda E_{p}t)).$$ For small $\beta$ the effective mass $m_{+}$ in (44) reduces to $$m_{+}=\frac{1}{\sqrt{2\beta}c}-\frac{m^{2}}{2}\sqrt{2\beta}c,$$ which diverges for $\beta\longrightarrow 0$.\ Thus we have two massive particles in our theory, one with the usual mass $m$ $(\lim_{\beta \rightarrow 0}\: m_{-})$ and the other a heavy-mass particle of mass $\frac{1}{\sqrt{2\beta}c}(\lim_{\beta\rightarrow 0}\: m_{+})$ which, leads to an indefinite metric in our model. Until all the energies of the system are kept below the production threshold of the $\frac{1}{\sqrt{2\beta}c}-$mass particle, the indefinite metric does not enter and the theory obeys all physical requirements such as unitarity. The generalized Dirac spinor $\Psi_{\textbf{p}\lambda}^{(+)}(\textbf{r},t)$ in (48) which describes a particle with effective mass $m_{+}$ is entirely new and does not have a counterpart in the conventional Dirac equation. The essential feature that is responsible for the existence of the generalized Dirac spinor $\Psi_{\textbf{p}\lambda}^{(+)}(\textbf{r},t)$ is that the modified Dirac equation (22) is third order in space-time derivatives in the presence of a minimal length, whereas the ordinary Dirac equation is only first order in space-time derivatives.\ Now, let us estimate the numerical value of the minimal length in our work. By putting $\beta'=2\beta$ into (6) and neglecting terms of order $\beta^{2}$, the isotropic minimal length becomes $(\bigtriangleup X^{i})_{0}\simeq\hbar \sqrt{5\beta}$. The upper bound for deformation parameter $\beta$ $(\beta_{upper-bound}\simeq\frac{1}{8m^{2}c^{2}})$ together with isotropic minimal length $\hbar\sqrt{5\beta_{upper-bound}}$ for an electron $(m_{e}=9.11\times 10^{-31}kg)$ are respectively $\beta_{upper-bound}\simeq1.67\times10^{42}\frac{s^{2}}{kg^{2}m^{2}}$ and $(\bigtriangleup X^{i})_{0}\simeq 3\times 10^{-13}m$. Conclusions =========== Heisenberg in 1938 wrote an article about the significance of a minimal length in physics \[24\]. He believed that every theory of elementary particles must contain a minimal length besides two fundamental constants, $c$ and $h$. The hope was that the introduction of such a minimal length would eliminate the ultraviolet divergencies from quantum field theory. This minimal length scale leads to a GUP. An immediate consequence of the GUP is a generalization of momentum operator according to (13) for $\beta'=2\beta$. This generalized form of momentum operator leads to a modified Dirac equation. We have shown that our modified Dirac equation which contains higher order derivative of the wave function describes two massive particles, one particle with the effective mass $m_{-}$ and the other a very heavy particle with the effective mass $m_{+}$ according to (43) and (44). From (43) and (44) the restriction on the deformation parameter $\beta$ becomes $\beta<\frac{1}{8m^{2}c^{2}}$. This restriction leads to an isotropic minimal length $(\triangle X^{i})_{0}\simeq\frac{\sqrt{10}}{4}\frac{\hbar}{mc}$. In \[13-18\] considering the Lamb shift the authors estimated $(\triangle X^{i})_{0}\leq 10^{-16}- 10^{-17} m$, analysis of electron motion in a Penning trap also gives $(\triangle X^{i})_{0}\leq 10^{-16}m$ \[19\]. The obtained value for upper bound of the isotropic minimal length in this work is $(\triangle X^{i})_{0}\simeq 3\times 10^{-13}$m. Although the above value for the isotropic minimal length is about 2 orders of magnitude larger than that was proposed by Heisenberg $(10^{-15}m)$ \[25\], this value is near to the reduced Compton wavelength of the electron $(\mathchar'26\mkern-10mu\lambda_{c}= \frac{\hbar}{m_{e}c}=3.86\times 10^{-13} m)$. Acknowledgements {#acknowledgements .unnumbered} ================ We are grateful to M. Poorakbar for helpful discussions. [11]{} Capozziello, S., Lambiase, G., Scarpetta, G.: Int. J. Theor. Phys. **39**, 15 (2000) Kober, M.: Phys. Rev. D **82**, 085017 (2010) Dehghani, M., Farmany, A.: Int. J. Theor. Phys. **49**, 1633 (2010) Dehghani, M.: Phys. Lett. A **374**, 3012 (2010) Quesne, C., Tkachuk, V.M.: J. Phys. A: Math. Gen. **39**, 10909 (2006) Quesne, C., Tkachuk, V.M.: Czech. J. Phys. **56**, 1269 (2006) Bouaziz, D., Bawin, M.: Phys. Rev. A **76**, 032112 (2007) Samar, M.I., Tkachuk, V.M.: J. Phys. Stud. **14**, 1001 (2010) Setare, M.R.: Phys. Rev. D **70**, 087501 (2004) Moayedi, S.K., Setare, M.R., Moayeri, H.: Int. J. Theor. Phys. **49**, 2080 (2010) Tkachuk, V.M.: J. Phys. Stud. **11**, 41 (2007) Kempf, A., Mangano, G., Mann, R.B.: Phys. Rev. D **52**, 1108 (1995) Das, S., Vagenas, E.C.: Phys. Rev. Lett. **101**, 221301 (2008) Das, S., Vagenas, E.C.: Can. J. Phys. **87**, 233 (2009) Brau, F.: J. Phys. A: Math. Gen. **32**, 7691 (1999) Benczik, S., Chang, L.N., Minic, D., Takeuchi, T.: Phys. Rev. A **72**, 012104 (2005) Stetsko, M.M., Tkachuk, V.M.: Phys. Rev. A **74**, 012101 (2006) Stetsko, M.M.: Phys. Rev. A **74**, 062105 (2006) Chang, L.N., Minic, D., Okamura, N., Takeuchi, T.: Phys. Rev. D **65**, 125027 (2002) Griffiths, D.: Introduction to Elementary Particles. Wiley, New York (1987) Magueijo, J.: Phys. Rev. D **73**, 124020 (2006) Moeller, N., Zwiebach, B.: JHEP **10**, 034 (2002) Greiner, W.: Relativistic Quantum Mechanics: Wave Equations, 3rd edn. Springer, Berlin (2000) Heisenberg, W.: Ann. Physik **32**, 20 (1938) Heisenberg, W.: Z. Naturforsch. **5a**, 251 (1950) [^1]: E-mail: s-moayedi@araku.ac.ir [^2]: E-mail: rezakord@ipm.ir [^3]: E-mail: h-moayeri@phd.araku.ac.ir
2024-02-17T01:27:13.970301
https://example.com/article/9854
abstract class Prova2 extends Dynamic { def applyDynamic(m: String)(): Unit private def privateMethod() = println("private method") } object Test extends App { val prova= new Prova2 { def applyDynamic(m: String)() = println("applyDynamic") } prova.privateMethod() }
2024-03-18T01:27:13.970301
https://example.com/article/4203
(-5 + (((sqrt(95) + sqrt(95)*1)/sqrt(5) + sqrt(19) + (sqrt(114)*1)/sqrt(6))**2 - (((1 + sqrt(2736))**2 + sqrt(2736) - sqrt(19) - sqrt(19)) + 5))). -2443 - 34*sqrt(19) Simplify (-1 + -2 + -2*sqrt(162)*1 + sqrt(162) + ((1 + sqrt(162) - sqrt(162))*-2 - sqrt(162)))**2. 180*sqrt(2) + 673 Simplify -4*(-3 + sqrt(2057) + -1 + sqrt(2057) + 4 + (((sqrt(2057) + -1 - sqrt(2057)) + 4 - sqrt(2057)) + sqrt(2057))**2)*4. -352*sqrt(17) - 144 Simplify 4 + (sqrt(72) + -2*sqrt(72) + -3)**2 + ((sqrt(36)*3)/sqrt(9))/sqrt(2). 39*sqrt(2) + 85 Simplify 3*(((1 + sqrt(99))*-1 - sqrt(99)) + 2 + sqrt(99)*2 + sqrt(99) + -5) + 5. -7 + 9*sqrt(11) Simplify -2 + sqrt(171)*-2 + -2 + 4 + 2*sqrt(19)*3. 0 Simplify 5 + (-2*sqrt(52) + -3 - (sqrt(143) + sqrt(143)*-1*5)/sqrt(11)). 2 Simplify (-6*-2*sqrt(110)*2)/(sqrt(90) - -3*sqrt(90)*1). 2*sqrt(11) Simplify 4 + (5*(2*(-1 + sqrt(1900) + -2) + 0))**2. -6000*sqrt(19) + 190904 Simplify (-3*(-5 + -2 + (-2*sqrt(5) - sqrt(5))))**2 + -6*((sqrt(5) + (sqrt(5) + 0)*-3 + sqrt(5))**2 + ((sqrt(240)/sqrt(4))/sqrt(12))**2). 786 + 378*sqrt(5) Simplify (sqrt(153))**2*-6 + ((1*sqrt(136))/sqrt(8))**2 + sqrt(85)/sqrt(5)*1 + 5*(sqrt(17) + 2). -891 + 6*sqrt(17) Simplify ((sqrt(114) - (sqrt(114) + sqrt(114) + sqrt(114)*-1))*1*-1)/(-6*sqrt(6)*-2 - (sqrt(726) - 1*sqrt(726))). 0 Simplify sqrt(35)/((sqrt(98)/sqrt(2))/sqrt(7)) + (sqrt(20) + (sqrt(200)*2)/sqrt(10))**2. sqrt(5) + 180 Simplify (-5*(sqrt(136)*4 - sqrt(136)))/((4*sqrt(24))/sqrt(3) + sqrt(8)). -3*sqrt(17) Simplify (sqrt(108) + 1 + sqrt(108))**2*6 + (sqrt(108) - (-2*sqrt(108) - sqrt(108))) + 4 + -3. 168*sqrt(3) + 2599 Simplify (sqrt(243) - (sqrt(243) + 2)) + -5 - (-3*sqrt(243) + -2)**2. -2198 - 108*sqrt(3) Simplify 1*(3*3*sqrt(162)*-3*-4)**2. 1889568 Simplify (sqrt(80) - (-2 + sqrt(80)))**2 - (sqrt(110)/sqrt(2))/sqrt(11) - (sqrt(180)/(sqrt(9) + sqrt(36)))/(sqrt(28)/(sqrt(14)/sqrt(2))). -4*sqrt(5)/3 + 4 Simplify (6*(sqrt(90)/(sqrt(18)/sqrt(3)))/sqrt(432))**2 + 4. 21/4 Simplify -1*((((sqrt(475) + 0)*-1 - sqrt(475)) + sqrt(475)*2 + -2)**2 - (2 + 1*sqrt(475)*4)). -2 + 20*sqrt(19) Simplify (-5 + -3*sqrt(13) + 1)**2 + (sqrt(65) - (-3*sqrt(65)*-3 + sqrt(65)))/sqrt(5). 15*sqrt(13) + 133 Simplify 2*((sqrt(110)*-5 - sqrt(110))*-4)/(sqrt(120)/sqrt(972)). 432*sqrt(11) Simplify -5*2*((sqrt(171)*-2)**2 - sqrt(171))*-5*3. -450*sqrt(19) + 102600 Simplify 5 + 2*(((sqrt(252) - (sqrt(252) - (sqrt(252) + -2))) + 1)**2 + sqrt(252) - (sqrt(252)*1*1 + sqrt(252))). -36*sqrt(7) + 511 Simplify (2 + (-6*3*(sqrt(396) + 3))**2)*-4. -524888 - 46656*sqrt(11) Simplify (-2*(sqrt(80) + 3 + (sqrt(80) + sqrt(80) + 5 + sqrt(80) - sqrt(80))))**2 + -4. 768*sqrt(5) + 3132 Simplify ((-3 + sqrt(108) + sqrt(108) + 1 + 4)*2 + -2)**2 + 1. 96*sqrt(3) + 1733 Simplify sqrt(363)*-1 + -5 - (sqrt(96)/sqrt(2) - (sqrt(3)*2*-6)**2). -15*sqrt(3) + 427 Simplify ((0 + sqrt(1008) - sqrt(7)) + 5 + sqrt(28) + -3 + 2)**2. 104*sqrt(7) + 1199 Simplify -1*-1*(sqrt(2448) + sqrt(2448)*5 + 0)**2. 88128 Simplify ((sqrt(1539)*2 + 5 + 2)*-5 + 5)**2. 5400*sqrt(19) + 154800 Simplify (0 + sqrt(52))**2 + -2 - sqrt(52)/(sqrt(4) + (sqrt(4) - 1*(sqrt(4) - sqrt(4)*1))). -sqrt(13)/2 + 50 Simplify 0 + (sqrt(1700) - (0 + (sqrt(1700) - (sqrt(1700) + -2)**2))) - ((sqrt(1700) - (sqrt(1700) + (sqrt(1700)*4 - sqrt(1700)) + -1)) + 3)**2. -13612 + 200*sqrt(17) Simplify (2*sqrt(99)*-2 - sqrt(99))/sqrt(9) + 1*(-2 + sqrt(11) + sqrt(44)). -2*sqrt(11) - 2 Simplify (sqrt(1200)*-1)/(sqrt(4) + -4*sqrt(12)/sqrt(3)) - (-4 + (sqrt(4752)*2)/sqrt(11)). -62*sqrt(3)/3 + 4 Simplify (sqrt(140)/sqrt(40))/sqrt(2) + (sqrt(7) + (sqrt(567)*1 - sqrt(7)))**2 + 2*sqrt(847). 45*sqrt(7)/2 + 567 Simplify (5*3*sqrt(91)*1)/(1*5*sqrt(21)/sqrt(3)). 3*sqrt(13) Simplify ((2 + sqrt(175) + -1 + sqrt(175) - -5*-2*sqrt(175)) + (-2*sqrt(175)*-6 - (4 + sqrt(175) + 0)))**2. -90*sqrt(7) + 1584 Simplify (sqrt(396) + 1)**2 - sqrt(11) - (3 + sqrt(11) + 1 + sqrt(11)) - (sqrt(99) + sqrt(99)*3*-5). 51*sqrt(11) + 393 Simplify 3 + ((-1 + sqrt(2) + -2)*-4 - sqrt(8)/(sqrt(24)/sqrt(6))*-6)**2. 48*sqrt(2) + 155 Simplify ((sqrt(136) + 6*(sqrt(136) + (sqrt(136) + -2*sqrt(136) - sqrt(136))))/(sqrt(288)*1 + sqrt(288) - sqrt(288)))**2. 425/36 Simplify (2*(-3 + sqrt(176) + 0)*-5*3)**2. -21600*sqrt(11) + 166500 Simplify (sqrt(150)/(2*sqrt(5)))/(sqrt(6)*-5*-3). sqrt(5)/30 Simplify (1 + -4 + 3*sqrt(1200)*2 + sqrt(1200))**2. -840*sqrt(3) + 58809 Simplify 4 + sqrt(2) + sqrt(450) + sqrt(50) + -5 + -3 + 5. 1 + 21*sqrt(2) Simplify (sqrt(39) + sqrt(4719) + (sqrt(4719) - sqrt(4719)*-2) + sqrt(4719) + sqrt(39) - sqrt(468)/(-1*sqrt(12)))/(sqrt(300)*-2*3 - sqrt(300) - sqrt(300)). -29*sqrt(13)/40 Simplify sqrt(7) + sqrt(21)/(sqrt(15)/sqrt(5)) + 4 - ((0 + sqrt(28))**2 + (sqrt(7) - (sqrt(343) + -1)**2)). -13*sqrt(7) + 320 Simplify (sqrt(88) - 3*-2*sqrt(88) - sqrt(88)*1*-6)/(((sqrt(648)*-1 - sqrt(648)) + sqrt(648) - sqrt(648))*5). -13*sqrt(11)/90 Simplify 2 + (-4*(sqrt(272) + -2*sqrt(272) + 1))**2. -128*sqrt(17) + 4370 Simplify 5 + 0 + (sqrt(52)/(sqrt(4) + sqrt(20)/sqrt(5)))**2 + (-3*sqrt(208) - sqrt(208))**2 + 1. 13349/4 Simplify (sqrt(1900) + 1)*3 + -4*sqrt(2736)*-4 + sqrt(2736). 3 + 234*sqrt(19) Simplify 5*(5 + (6*(-6*(sqrt(171) - -1*sqrt(171)) - (sqrt(171) + -5 + (sqrt(171) - (sqrt(171) + 0 + sqrt(171))) - sqrt(171))))**2). -59400*sqrt(19) + 3728905 Simplify -6*(-3 + (3 + (sqrt(2736) - ((sqrt(2736) - (sqrt(2736) - (-1*sqrt(2736) + -5))) + sqrt(2736))))**2). -16782 - 1152*sqrt(19) Simplify (-2*4*(sqrt(2057) + -2 + (sqrt(2057) - (3 + sqrt(2057))))*-2)**2. -28160*sqrt(17) + 532992 Simplify (((sqrt(540)/sqrt(9) + sqrt(60))*-3)/sqrt(12))**2 + -1 + -3. 176 Simplify (-4*(-2 + sqrt(567)))**2 - ((sqrt(112) - (sqrt(112) + sqrt(112) + (sqrt(112) - (1*sqrt(112) + sqrt(112) + sqrt(112) - sqrt(112)))))/sqrt(4))**2. -576*sqrt(7) + 9136 Simplify ((sqrt(98) - 5*sqrt(98)*2)**2 - sqrt(98)) + 1 + (sqrt(98) - (sqrt(98) + -2*sqrt(98))) - 3*(sqrt(98) + 2*(sqrt(98) + -1)). -56*sqrt(2) + 7945 Simplify 1*((sqrt(343) - (sqrt(343) + sqrt(343) + -1))*2 + sqrt(343)) + (((sqrt(343) - (2 + sqrt(343) + -3) - sqrt(343))**2 - sqrt(343)) + sqrt(343))*-5. -1718 + 63*sqrt(7) Simplify ((-3*(-1 + sqrt(475)) + (2*sqrt(475) + sqrt(475) - sqrt(475)) + 1 + -4 + (sqrt(475) - (sqrt(475) + 0))*2)*2)**2. 1900 Simplify (-6*(sqrt(19) + -1)*-4)**2 + (sqrt(3078)*2)/sqrt(2). -1134*sqrt(19) + 11520 Simplify -3 + (sqrt(5) - (-3 + (sqrt(5) - sqrt(5)*-1))**2) + sqrt(405) + 2. -30 + 22*sqrt(5) Simplify 2*(-6*((sqrt(190) + (sqrt(190) - (-1*sqrt(190) + sqrt(190))))*-5)/(sqrt(10) - (sqrt(10) + 2*sqrt(490))))**2. 34200/49 Simplify (sqrt(612) + (-3 + sqrt(612))*4 + 0 + (0 + sqrt(612) - sqrt(612)))*5. -60 + 150*sqrt(17) Simplify ((sqrt(33)/sqrt(3) + -5 - (sqrt(110)/sqrt(5))/sqrt(2)) + 4 + -2)**2. 9 Simplify ((4*(sqrt(190) + 2*sqrt(190) + sqrt(190) + sqrt(190))*5)/(sqrt(70)/(sqrt(35)/sqrt(5))*-6))**2. 47500/9 Simplify -3 + 0 + sqrt(320) + 2*(sqrt(320)*-2)**2 - (-3 + sqrt(320) + (1 + sqrt(320))**2 + sqrt(320) + -3). -24*sqrt(5) + 2242 Simplify -4*(5*(sqrt(102) - sqrt(102)*2))/((sqrt(210)/sqrt(7))/sqrt(5))*-5. -100*sqrt(17) Simplify (sqrt(91)/sqrt(7) + 3)**2 + sqrt(468) + -2 + ((sqrt(13) + sqrt(65)/sqrt(5))*6 + 3)*1. 23 + 24*sqrt(13) Simplify ((-4*sqrt(6)*1 + sqrt(384)*-2)/(sqrt(98) - (6*sqrt(98)*1 + sqrt(98))))**2. 100/147 Simplify (sqrt(1225)*2 - (sqrt(3136) - (sqrt(3136)*1 - sqrt(3136))))/(sqrt(21)/(sqrt(288)/sqrt(6))). 8*sqrt(7) Simplify (3 + -2*sqrt(448))*-1 - (5*(-1 + sqrt(448) + -2 - sqrt(448)))**2. -228 + 16*sqrt(7) Simplify (1*((sqrt(847) - (sqrt(847) - (2 + sqrt(847)))*-1) + -3)*-3)**2. -990*sqrt(7) + 7848 Simplify sqrt(18)/(-2*sqrt(1296)) + (-3 + sqrt(8) + -1)**2. -385*sqrt(2)/24 + 24 Simplify sqrt(2736)*3 + 2 + ((sqrt(57)/sqrt(3) + 0 - sqrt(19))*3)**2. 2 + 36*sqrt(19) Simplify (-2*sqrt(30)*-2)/sqrt(10) + 0 + -1 + sqrt(363) + 3. 2 + 15*sqrt(3) Simplify (sqrt(18) - (sqrt(144) + 2*sqrt(144))/sqrt(8))/(sqrt(144)*-4). sqrt(2)/8 Simplify ((sqrt(330)*-1)/sqrt(11)*1)/(2*(sqrt(10) - (sqrt(10) - sqrt(30)/sqrt(3) - sqrt(10)))*-1). sqrt(3)/4 Simplify (4*(6*(sqrt(2299) + sqrt(2299) + sqrt(2299) + -1 + 0) - (sqrt(2299) + (-3*(sqrt(2299) - (sqrt(2299) + 1 + sqrt(2299))) - sqrt(2299)))*3))**2. -47520*sqrt(19) + 2983104 Simplify (5*sqrt(98)*-1 + sqrt(4)/(sqrt(2)*-2) + 3)**2*3. -639*sqrt(2) + 15177/2 Simplify ((sqrt(42) + (sqr
2024-04-05T01:27:13.970301
https://example.com/article/2543
[ { "outputFile": "D:\\MPAndroidChartDemoByJin\\MPAndroidChartDemo\\app\\build\\intermediates\\incremental\\mergeDebugResources\\merged.dir\\values-sw720dp-land-v13\\values-sw720dp-land-v13.xml", "map": [ { "to": { "startLine": 2, "startColumn": 4, "startOffset": 55, "endColumn": 58, "endOffset": 109 }, "from": { "file": "D:\\MPAndroidChartDemoByJin\\MPAndroidChartDemo\\app\\src\\main\\res\\values-sw720dp-land\\dimens.xml", "position": { "startLine": 6, "startColumn": 4, "startOffset": 206, "endColumn": 58, "endOffset": 260 } } } ] } ]
2024-05-17T01:27:13.970301
https://example.com/article/9528
Image copyright Reuters Image caption Hani Mulki had refused to scrap a controversial tax bill Jordan's Prime Minister Hani Mulki has resigned after days of protests against tax rises and austerity measures. The recent demonstrations in the country, which is a key Western ally, are the biggest in years. Protesters have chanted anti-government slogans and clashed with police, who have fired tear gas and blocked roads. The demonstrators say a new tax bill backed by the International Monetary Fund (IMF) will hurt the poor and middle class. The protests have continued for four consecutive nights, and police say dozens of people have been detained and more than 40 members of the security forces have been injured. Why did the prime minister raise taxes? Mr Mulki had refused to scrap the bill, saying it was up to parliament to decide whether to pass it or not. His government said it needed the money to fund public services and said the new tax bill would mean higher earners pay more. But protesters feared it would further worsen living standards. In recent years, Jordanians have seen prices rise with salaries failing to keep up. Image caption Demonstrators have scuffled with police Mr Mulki was sworn in as prime minister in June 2016. He is a former diplomat and government minister, and the son of former Prime Minister Fawzi Mulki. On Monday, he was summoned by King Abdullah who demanded his resignation. "Prime Minister Hani Mulki submitted his resignation to the king this afternoon during a meeting at the Husseiniyeh Palace and the king accepted the resignation," a government source told AFP news agency. In Jordan, the monarch has extensive powers and can appoint governments and approve legislation. King Abdullah has reportedly asked Omar al-Razzaz, the education minister and a former World Bank economist, to form a new government. Earlier this year, sales tax was increased and bread subsidies were scrapped as part of a plan to cut the country's debt. Mr Mulki said he hoped the reforms, which were needed to get Jordan's economy "back on track", would be complete by mid-2019. Why is Jordan important? Jordan is a key Western ally and was largely spared the major turmoil that led to the overthrow of long-term leaders in Egypt and Tunisia and the outbreak of war in neighbouring Syria in 2011. But as a country with limited natural resources which now hosts over 700,000 refugees - most of them from the Syrian conflict - Jordan has been deeply affected by the events of the Arab Spring. The situation has been compounded by high rates of unemployment and inflation. Protests have broken out in Jordan before, most notably in response to high fuel costs or the withdrawal of subsidies, but King Abdullah remains a unifying force. The country hosts foreign military forces active in the Syria conflict and is a major recipient of US aid. After the capture and brutal murder of one of its pilots by the Islamic State group in 2015, Jordan launched air strikes against it.
2024-01-17T01:27:13.970301
https://example.com/article/1183
Sir James Dyson, one of Britain's most prominent inventors and business leaders, has described Theresa May's plan to expel international students on graduation as a short-term vote winner that will harm the economy by
2024-01-15T01:27:13.970301
https://example.com/article/5410
Lite, Stated, No Ratio and No Documentation: Available only on single family residential investment properties and multi-family residential investment properties on a case-by-case basis. Please speak to one of our experienced mortgage specialists to determine whether or not your mortgage transaction qualifies. No Ratio Documentation (Self-Employed Only): Provide Full Income Documentation (tax returns) and 50% Debt To Income Ratio is not a factor (Must show ability to repay within reason). For purchases, must provide proof of verified assets to close. No Documentation: For purchases, must provide proof of verified assets to close.
2024-07-21T01:27:13.970301
https://example.com/article/8546
"I'LL LOVE YOU TILL THE DAY I DIE" THEN ATTACKED BY MONSTERA young blonde woman professes her love for the skipper of a boat telling him she'll love him till the day she dies only to be attacked by a bug-eyed seaweed monster that comes out of the water killing her and nearly everyone on board. One couple and the skipper escape. GAMMERA ATTACKSGammera, a giant monster turtle, destroys a Japanese oil refinery. Lots of explosions. A line of fuel cars on a train track are driven toward the monster in a futile attempt to blow him up. GAMMERA DESTROYS SHIPGammera has awoken from his Arctic slumber, and he is not happy! A Japanese research vessel has the misfortune of being in his way, and the giant turtle destroys the ship by breathing fire. Great shot of radio operator. eFootage is a premier HD, film and video stock footage archive (contemporary and vintage) specializing in news, industrial, and more. We have over one million additional stock footage clips that we can search upon request.Content LicensePrivacy PolicyTerms of Use Featuring Data Refinery® and WebMagic® search and data technology.
2024-01-21T01:27:13.970301
https://example.com/article/2503
J-A25007-18 NON-PRECEDENTIAL DECISION - SEE SUPERIOR COURT I.O.P. 65.37 ELIZABETH ROBINSON, M.D. : IN THE SUPERIOR COURT OF : PENNSYLVANIA Appellant : : : v. : : : MADELINE C. WEISER, M.D., P.C. : No. 1242 EDA 2018 Appeal from the Judgment Entered April 16, 2018 In the Court of Common Pleas of Montgomery County Civil Division at No(s): No. 2011-27436 ELIZABETH ROBINSON, M.D. : IN THE SUPERIOR COURT OF : PENNSYLVANIA : v. : : : MADELINE C. WEISER, M.D., P.C. : : Appellant : No. 1284 EDA 2018 Appeal from the Judgment Entered April 16, 2018 In the Court of Common Pleas of Montgomery County Civil Division at No(s): 2011-27436 BEFORE: PANELLA, J., DUBOW, J., and KUNSELMAN, J. MEMORANDUM BY DUBOW, J.: FILED JUNE 27, 2019 In these consolidated cross-appeals, Elizabeth Robinson, M.D. (“Employee”), and Madeline C. Weiser, M.D., P.C. (“Employer”),1 appeal from ____________________________________________ 1 Employee named only Employer, Madeline C. Weiser, M.D., P.C., as a defendant in this action. Madeline C. Weiser, M.D. (“Dr. Weiser”) is the president and sole shareholder of Employer. As discussed infra, on June 20, 2014, the court denied Employee’s request to add Dr. Weiser individually as an additional defendant. Thus, Dr. Weiser did not participate in this action individually. J-A25007-18 the Judgment entered on April 16, 2018, in the Montgomery Court of Common Pleas following a non-jury trial in this action arising from a breach of an employment contract. After careful review, we affirm. On May 29, 2007, Employee, a pediatrician, executed a written employment contract (the “Contract”) with Employer. Dr. Weiser alone prepared the Contract. The Contract provided, inter alia, that Employee would work for Employer for a three-year term commencing on June 1, 2007. Employer agreed to pay Employee a set salary for the first two years of the contract term. In the third year—June 1, 2009 to May 31, 2010—Employer agreed to pay Employee “the greater of $135,000 or 49% of [Employee’s] ‘net collected receipts with the cost of malpractice insurance deducted.’” Contract, 5/29/07, at 1. Notably, the Contract did not define “net collected receipts,” nor did it include language indicating how the parties would allocate the expense of purchasing vaccines administered by Employee. Relevant to the instant appeal, Employer initially paid Employee a $135,000 salary for the third year of her contract term. 2 Employer’s records ____________________________________________ 2 Understanding that Employee’s compensation for year three would be at least $135,000, and, depending on Employee’s productivity, might be more than $135,000, in year three Employer paid Employee a “salary” of $135,000 over the course of the year so that Employee would have “cash flow. . . to pay bills[, etc.]” N.T., 9/7/17, at 137-38. -2- J-A25007-18 reflected that Employee’s total receipts3 in the third year of her contract were $424,478.03.4 The cost of Employee’s vaccines in the third year of the contract term was $132,415.62, and the cost of Employee’s malpractice insurance for the third year of the contract was $13,147. Employer calculated Employee’s third-year salary by subtracting the cost of the vaccines Employee administered and the cost of Employee’s malpractice insurance premium from her total receipts, and then multiplying by a factor of 49%. Thus, Employer calculated that Employee’s third year salary was $136,668.55. Because Employer had already paid Employee a third-year salary of $135,000, at the conclusion of the third year, Employer paid Employee an additional $2,468.55. This figure represented the payment of an additional $1,668.55 owed to Employee under Employer’s interpretation of 49% of Employee’s “net collected receipts”—the difference between $136,668.55 and $135,000—as well as reimbursement of $810 that the parties agreed Employer had improperly deducted from the amount paid to Employee.5 ____________________________________________ 3 Employee’s total receipts is comprised of the money actually collected from insurance companies and patient co-pays by Employer in exchange for services performed by Employee. 4 The record also reflects that on October 31, 2009, Employee administered at least 25 H1N1 flu vaccines to patients who each paid a $20 co-pay. 5 Employer reimbursed Employee $810 based on Dr. Weiser’s mischaracterization of a “Verruca-Freeze” chemical cauterization as a vaccine. N.T., 9/6/17, at 48, 55. -3- J-A25007-18 After Employer paid Employee, Employee disagreed with Employer’s interpretation of “net collected receipts” and claimed that Employer had miscalculated the amount of compensation due to her for her third year of employment. On September 30, 2011, Employee commenced this action against Employer claiming that Employer had breached the terms of the Contract by failing to compensate her fully for the third year of her employment. In particular, Employee disagreed with Employer’s treatment of the cost of vaccines administered by Employee and its payment of her medical malpractice insurance premium. Employee sought damages for Breach of Contract and a violation of Pennsylvania’s Wage Payment and Collection Law (the “WPCL”), 43 P.S. §§ 260.1-260.45. On September 4, 2014, Employee filed an Amended Complaint. On November 14, 2014, Employer filed an Answer. Employer also filed a Counterclaim alleging that Employee had breached a covenant not to compete.6 A non-jury trial took place on September 6, 2017, and September 19, 2017. Employee argued at trial that the Contract term “net collected receipts” meant the total receipts collected by Employer from insurance companies and patients—$424,478.03. Employee testified that the parties did not have an oral or written agreement to deduct the cost of vaccines from the amount ____________________________________________ 6 At trial, Employer withdrew its claim for damages due to the alleged breach of the covenant not to compete. -4- J-A25007-18 Employer collected in order to calculate Employee’s “net collected receipts.” She further testified that she never would have agreed to include deduction of vaccines from her “net collected receipts” as part of a Contract with Employer. With respect to the treatment of her medical malpractice insurance payment, Employee testified that she did not have a particular understanding of whether Employer’s cost would be deducted before or after applying the 49% factor. Employer claimed that, even though not stated in the Contract, “net collected receipts” included the cost of vaccines, which should be deducted from Employee’s total receipts before the 49% factor is calculated to determine whether Employee’s salary exceeded $135,000 in her third year of employment. Dr. Weiser testified that she told Employee before she executed the Contract that Employer would charge its vaccine costs to Employee. Dr. Weiser also testified that the parties agreed that Employer would deduct the cost of Employee’s medical malpractice insurance premium after determining Employee’s 49% portion of her net collected receipts.7 Dr. Weiser testified ____________________________________________ 7 Our review of the record indicates that there is a substantial inconsistency between Weiser’s testimony that Employer would deduct the cost of Employee’s medical malpractice insurance premium after determining Employee’s 49% portion of her net collected receipts and the method by which Employer actually calculated Employee’s compensation. Contrary to this testimony, Employer actually calculated Employee’s compensation by subtracting Employee’s vaccine costs and medical malpractice insurance premium her collected receipts before applying the 49% factor, as set forth in detail supra. -5- J-A25007-18 that she did not seek to include other categories of expenses in the “net” calculation because they are not easily allocable among Employer’s doctors. On October 20, 2017, the court issued its Findings and Decision in Employee’s favor. Relevantly, the trial court concluded that the term “net collected receipts” was ambiguous and construed it against Employer. It found Employee’s testimony credible that the parties had not agreed, either orally or in writing, to deduct the cost of vaccines when calculating Employee’s “net collected receipts.” Thus, the court concluded that Employer should not have deducted the cost of vaccines from Employee’s compensation. In particular, the court determined that 49% of Employee’s “net collected receipts” equaled $207,994.23.8 In calculating Employee’s damages, the court subtracted $13,147—the cost of her medical malpractice insurance premium—and the $135,000 salary and the $2,468.55 Employer paid Employee from $207,994.23, and added $245.9 The court, thus, determined that Employer owed Employee $57,623.68 in compensatory damages. The court also determined that Employer had a good faith basis for withholding payment. Both parties filed Post-Trial Motions. On February 28, 2018, the court heard argument on the Motions. On April 11, 2018, the court denied ____________________________________________ 8 $207,994.23 is 49% of Employee’s total receipts of $424,478.03. 9$245 is equal to 49% of the $500 in co-pays Employee generated from 25 vaccines administered on October 31, 2010. -6- J-A25007-18 Employer’s Motion. The next day, the court denied Employee’s Motion for additional compensatory and liquidated damages, but granted the Motion insofar as Employee sought statutory attorney’s fees.10 The court molded the verdict to include the fees and entered Judgment of $111,170.89. These cross-appeals followed. Both parties and the trial court complied with Pa.R.A.P. 1925. Employee raises the following issues on appeal: 1. Did the lower court miscalculate the compensatory damages to which [Employee] is entitled in view of [Employer’s] mistakes and admissions? 2. Did [Employer] fail to carry its burden of proving, by clear and convincing evidence, that it withheld payment of [Employee’s] compensation in good faith? 3. Did the lower court err in denying [Employee’s] timely motion to join [Dr. Weiser] individually, as an additional defendant? Employee’s Brief at 4. Employer raises the following issues on appeal: 1. Did the trial court err as a matter of law by concluding that the contractual term, “net collected receipts,” is ambiguous? 2. Did the trial court err as a matter of law by interpreting the contractual term, “net collected receipts,” to preclude deducting the medical practice’s cost of purchasing vaccinations from [Employee’s] compensation? 3. Did the trial court err in determining as a factual matter—based solely on [Employee’s] unsubstantiated, conflicting, and imprecise testimony—that she was not compensated for administering “at least twenty-five” H1N1 flu vaccines on October 31, 2009? ____________________________________________ 10 The parties stipulated to fees of $53,547.21. -7- J-A25007-18 Employer’s Brief at 6. Employee’s first issue challenges the trial court’s calculation of her compensatory damages. When reviewing a trial court’s decision after a non- jury trial, our standard of review is well-established. “We may reverse the trial court only if its findings of fact are predicated on an error of law or are unsupported by competent evidence in the record. As fact finder, the judge has the authority to weigh the testimony of each party’s witnesses and to decide which are most credible.” Parker Oil Co. v. Mico Petro and Heating Oil, LLC, 979 A.2d 854, 856 (Pa. Super. 2009) (citation omitted). The trial judge’s findings must be given the same weight and effect as a jury verdict and will not be disturbed on appeal unless they are not supported by competent evidence in the record. Levitt v. Patrick, 976 A.2d 581, 589 (Pa. Super. 2009). “Furthermore, our standard of review demands that we consider the evidence in the light most favorable to the verdict winner.” Id. (citation omitted). Employee claims that the trial court underestimated the amount of compensatory damages owed to her. In support of her claim, she argues that the court erred in disregarding Employer’s admission that, with respect to accounting for the payment of Employee’s malpractice insurance premium, Employer mistakenly subtracted the cost of the premium after applying the 49% factor to Employee’s total receipts of $424,478.03. Employee’s Brief at 18-20. Employee claims that Employer should have subtracted the cost of Employee’s premium before applying the 49% factor, as she alleges -8- J-A25007-18 Employer admitted.11 Id. She avers that this mistake resulted in a diminution in her compensatory damages of nearly $6,700.12 Employee’s issue requires this Court to interpret the contract between the parties. “Because contract interpretation is a question of law, this Court is not bound by the trial court’s interpretation.” Ragnar Benson, Inc. v. Hempfield Tp. Mun. Authority, 916 A.2d 1183, 1188 (Pa. Super. 2007) (citation omitted). “Our standard of review over questions of law is de novo and to the extent necessary, the scope of our review is plenary as the appellate court may review the entire record in making its decision.” Id. (citation omitted). Our Supreme Court has set forth the principles governing contract interpretation as follows: The fundamental rule in contract interpretation is to ascertain the intent of the contracting parties. In cases of a written contract, the intent of the parties is the writing itself. Under ordinary principles of contract interpretation, the agreement is to be construed against its drafter. When the terms of a contract are clear and unambiguous, the intent of the parties is to be ascertained from the document itself. When, however, an ambiguity exists, parol evidence is admissible to explain or clarify or resolve the ambiguity, irrespective of whether the ambiguity is patent, created by the language of the instrument, or latent, created by extrinsic or collateral circumstances. A contract is ____________________________________________ 11 Employee also argues in her Brief that Employer erroneously deducted its vaccines cost from Employee’s compensation. Employee’s Brief at 16-17. The trial court, however, decided this issue in Employee’s favor. Thus, we do not consider it here. 12Employee asserts that she is entitled to an award of $64,313.65 instead of $57,623.68. -9- J-A25007-18 ambiguous if it is reasonably susceptible of different constructions and capable of being understood in more than one sense. While unambiguous contracts are interpreted by the court as a matter of law, ambiguous writings are interpreted by the finder of fact. Insurance Adjustment Bureau, Inc. v. Allstate Ins. Co., 905 A.2d 462, 468-69 (Pa. 2006) (citations omitted). With respect to whether the terms of the Contract required Employer to subtract its payment of Employee’s medical malpractice insurance premium before or after it applied the 49% factor to Employee’s net collected receipts, the Contract provides that Employee’s salary in the third year will be the greater of $135,000 and “49% of your net collected receipts with the cost of malpractice deducted.” Contract at 1. The trial court concluded that the plain and ordinary meaning of this term meant “the cost of malpractice insurance should be deducted from [Employee’s] 49% portion of her net collected receipts,” i.e. deducted after applying the 49% factor. Trial Ct. Op., 6/14/18, at 10. In so concluding, the trial court noted that it found Dr. Weiser’s testimony that the parties had agreed that the cost for Employee’s malpractice insurance should be deducted from Employee’s 49% portion of her net collected receipts credible and consistent with the plain language of the Contract. We agree with the trial court’s interpretation of the plain language of the Contract. Following our review, we conclude, as the trial court did, that the ordinary meaning of the phrase “49% of your collected receipts with the cost of malpractice insurance deducted” means that the cost of Employee’s malpractice insurance should be deducted after calculating her portion of net - 10 - J-A25007-18 collected receipts. This interpretation is in conformance with the unambiguous language of the Contract and ensures that Employee—who testified that she would have been “fine either way”—is wholly responsible for payment of her own malpractice insurance. Employee is, thus, not entitled to relief on this claim. Employee also faults the trial court for failing to treat Employer’s Answer to Paragraph 16 of her Amended Complaint as a deemed admission under Pa.R.C.P. 1029(a) and (b). Employee’s Brief at 21. Employee avers Employer failed to deny with specificity Employee’s allegation that Employer did not pay Employee her share of not less than $28,646.81 representing additional receipts generated after the end of the Contract term. Id. at 21-23. Employee claimed that her total compensatory damages amounted to $80,744.96. Id. at 24. Employee alleges that Paragraph 16 did not, as averred by Employer, constitute a conclusion of law, but rather a factual allegation that required Employer’s specific denial. “[T]he interpretation and application of a Pennsylvania Rule of Civil Procedure presents a question of law.” Barrick v. Holy Spirit Hosp. of the Sisters of Christian Charity, 32 A.3d 800, 808 (Pa. Super. 2011) (citation omitted). Therefore, “our standard of review is de novo, and our scope of review is plenary.” Id. Pa.R.C.P. 1029 governs denials in pleadings, and the effect of the failure to deny allegations. See Pa.R.C.P. 1029. Rule 1029 provides, in relevant part, as follows: - 11 - J-A25007-18 (a) A responsive pleading shall admit or deny each averment of fact in the preceding pleading or any part thereof to which it is responsive. A party denying only a part of an averment shall specify so much of it as is admitted and shall deny the remainder. Admissions and denials in a responsive pleading shall refer specifically to the paragraph in which the averment admitted or denied is set forth. (b) Averments in a pleading to which a responsive pleading is required are admitted when not denied specifically or by necessary implication. A general denial or a demand for proof, except as provided by subdivisions (c) and (e) of this rule, shall have the effect of an admission. Pa.R.C.P. 1029(a), (b). In Paragraph 16 of her Amended Complaint, Employee alleged that “[b]egining May 25, 2010, [Employer] collected additional receipts on account of professional services rendered by [Employee] while employed by [Employer] under the Contract but has failed to pay [Employee] such additional sum to which [Employee] is entitled under the Contract, said additional receipts being an amount not less than $28,464.81, 49% of which is $13,947.76.” Amended Complaint, 9/4/14, at ¶ 16. Employer’s Answer to Paragraph 16 stated that “[t]he averments of this Paragraph are a legal conclusion which is denied.” Answer, 11/14/14, at ¶16. Before we reach the merits of this claim, we must determine whether Employee has preserved it for our review. The record reflects that Employee has failed to cite to the place in the record where she presented this specific issue to the trial court, and our review does not disclose that she has preserved it for appellate review. As noted by the trial court, Employee did not preserve this issue in her written Post-Trial Motion. Accordingly, Employee - 12 - J-A25007-18 may not raise this issue for the first time on appeal. See Pa.R.A.P. 302(a) (“[i]ssues not raised in the lower court are waived and cannot be raised for the first time on appeal[]”); Pa.R.A.P. 2117(c) (requiring citation to place in record where issue has been preserved); L.B. Foster Co. v. Lane Enterprises, Inc., 710 A.2d 55, 55 (Pa. 1998) (“If an issue has not been raised in a post-trial motion, it is waived for appeal purposes) (memorandum opinion). Thus, Employee has waived her claim that the court erred in failing to deem Employer’s answer to Paragraph 16 of her Amended Complaint an admission. In her second issue, Employee claims that court erred in not awarding her liquidated damages under the WPCL alleging that Employer failed to prove by clear and convincing evidence that it withheld payment of Employee’s compensation in good faith. Employee’s Brief at 31. In support of this claim, Employee cites, among other things, Employer’s failure to advise her that vaccine vendors had granted Employer credits, Employer’s attempt to retain fees earned by Employee during the contract term, and the trial court’s finding that Weiser was not credible. Id. at 26, 29-30. Employee further avers that Employer waived a “good faith” defense by failing to raise it in its Answer and New Matter, Pre-Trial Settlement Conference Statement, or at trial. Id. at 26-27. Last, Employee claims she is entitled to pre-judgment interest and statutory post-judgment interest. Id. at 31-32. Under the WPCL, a plaintiff is entitled to liquidated damages “equal to twenty-five percent (25%) of the total amount of wages due, or five hundred - 13 - J-A25007-18 dollars ($500), whichever is greater.” 43 P.S. § 260.10. However, a plaintiff is only entitled to said damages if “no good faith contest or dispute of any wage claim including the good faith assertion of a right of set-off or counter- claim exists accounting for such non-payment.” Id. A defendant must prove good faith by clear and convincing evidence. Hartman v. Baker, 766 A.2d 347, 354 (Pa. Super. 2000). “[M]ere bad judgment is not bad faith . . . mere bad judgment does not prevent an employer from acting in good faith under the WPCL.” Braun v. Wal-Mart Stores, Inc., 24 A.3d 875, 964 (Pa. Super. 2011). The trial court found by clear and convincing evidence that Employer was acting in good faith when it withheld payment to Employee. Trial Ct. Op. at 11. The following facts informed the court’s decision: (1) Weiser’s credible testimony that she believed that although vaccines were not mentioned in the Contract, the expense was inferred as a “common cost of doing business;” (2) Weiser’s credible testimony that she believed that by not deducting the cost of vaccines in calculating the net collected receipts, she would lose money every time Employee administered a vaccine; and (3) the cost of vaccines is unique because it is the largest category of expenses besides salary and benefits that can be attributed to a specific physician. Id. at 11-12. The trial court’s findings are supported by competent record evidence. Thus, this claim lacks merit. See Levitt, 976 A.2d at 589; Englert v. Fazio Mech. Servs., Inc., 932 A.2d 122, 126 (“The trial court’s [determination] - 14 - J-A25007-18 that [the appellant] made a good faith effort . . . is a factual matter within its sound discretion.”). We are likewise unpersuaded by Employee’s claim that Employer waived a “good faith” defense by not raising it in its Answer and New Matter. With respect to this claim, the trial court aptly noted that Employee failed to present any authority in support of her claim that ‘“good faith” is an affirmative defense which must be pleaded in a responsive pleading under the heading “New Matter” or raised in its pre-trial memorandum.” Trial Ct. Op. at 12. Contrary to Employee’s assertion, an employer does not waive a “good faith” defense where it pleaded “a good faith right to set-off or counter-claim[.]” Hirsch v. EPL Tech., Inc., 910 A.2d 84, 93 (Pa. Super. 2006). See also 43 P.S. § 260.10. Here, Employer filed a Counterclaim against Employee claiming that Employee had breached the Contract. Employer diligently pursued this claim until trial and withdrew it at trial only because Employer “believed that [Employee] failed to carry her burden on her claims.” Employer’s Responsive Brief at 17. Accordingly, our review of the record reveals that Employer did not waive its defense that it acted in good faith when it withheld payment from Employee. Employee is, thus, not entitled to relief on this claim. Employee next claims that the court erred in refusing to award her pre- judgment interest and statutory post-judgment interest. Employee’s Brief at 31-33. With respect to her allegation of error regarding the award of pre- judgment interest, we find that Employee has waived this claim because she - 15 - J-A25007-18 did not include it in her Pa.R.A.P. 1925(b) Statement. See Pa.R.A.P. 1925(b)(4)(vii) (“Issues not included in the Statement and/or not raised in accordance with the provisions of this paragraph (b)(4) are waived.”). Similarly, we find that Employee waived her claim for post-judgment interest by not raising this issue in her Post-Trial Motion. See L.B. Foster Co., 710 A.2d at 55. In her final issue, Employee avers that the trial court erred in denying her May 15, 2014 Motion to Amend Complaint to join Weiser as an additional defendant in her WPCL claim.13, 14, 15 Employee’s Brief at 33. In support of this claim, Employee explains that the WPCL permits suit against a corporate officer who takes an active role in decision-making. Id. at 34. She, therefore, concludes that, as the president and sole shareholder of Employer, “it is self- evident [that] Weiser, individually is subject to liability to [Employee].” Id. ____________________________________________ 13In her Brief, Employee discusses Pa.R.C.P. 2252—“Right to Join Additional Defendants”—in support of her claim. Rule 2252 is inapplicable to the instant case, however, as the relief requested by Employee, and denied by the court, was in the nature of permission to amend the Complaint pursuant to Pa.R.C.P. 1033. 14In this Motion, Employee also sought leave to amend the Complaint to add additional damages. The court granted Employee’s request to amend the Complaint, but denied her request to add Weiser as an additional defendant. 15 On May 16, 2014, Employee filed an Emergency Motion requesting, on an expedited basis, the same relief sought in the Motion to Amend and Join filed the previous day. In the Emergency Motion, Employee alleged that the statute of limitations would expire two weeks hence, on May 30, 2014. Employer disputed Employee’s contention that the statute of limitations was set to expire on May 30, 2014, and instead represented that the statute of limitations had expired one year earlier, on May 31, 2013. - 16 - J-A25007-18 See also Memorandum of Law in Support of Motion to Amend, 5/15/14, at 3. Employer argued in opposition that the statute of limitations had expired, that Employee’s failure to exercise reasonable diligence prejudiced Weiser, and that the WPCL intended the individual liability of corporate managers to be contingent on the corporation’s inability to pay its debts, and there is no indication here that Employer will be unable to pay its debts. Employer’s Brief in Opposition, 6/4/14, at 3-7. We review the decision of the trial court to deny a motion to amend a complaint for an abuse of discretion. Ferraro v. McCarthy-Pascuzzo, 777 A.2d 1128, 1132 (Pa. Super. 2001). We will not disturb the trial court’s determination absent an abuse of that discretion. Id. Pa.R.C.P. 1033 provides, in relevant part, that a party may, at any time either with consent of the adverse party or with leave of court, add a person as a party. Pa.R.C.P. 1033. However, a plaintiff may not add a new defendant after the statute of limitations has run. Anderson Equip. Co. v. Huchber, 690 A.2d 1239, 1241 (Pa. Super. 1997). As a prefatory matter, we note that in her Brief, Employee has limited her argument to the propriety of amending her WPCL claim to include Weiser as a defendant, and has not set forth any argument pertaining to the denial of her request to amend her Breach of Contract claim. Thus, we address only the trial court’s denial of Employee’s Motion to Amend Complaint only as to the WPCL claim raised therein. - 17 - J-A25007-18 In denying the Motion, the trial court explained that the statute of limitations on Employee’s WPCL claim had run almost one year earlier. Trial Ct. Op., 2/28/19, at 4. In particular, the trial court found as follows: The employment contract that is the subject of this dispute terminated on May 31, 2010. [Employee] alleged in the original [C]omplaint that wages remain unpaid from the “regularly scheduled payday of [Employee] which occurred in May, 2010.” [] All remuneration contemplated thereunder which had not already been paid became due and owing on that date or within 15 days thereafter pursuant to 43 P.S. § 260.3. The WPCL provides that “[n]o administrative proceedings or legal action shall be instituted under the provisions of this act for the collection of unpaid wages or liquidated damages more than three years after the day on which such wages were due and payable. . . . 43 P.S. § 260.9a(g). Hence, the statute of limitations for a WCPL claim under the subject employment [Contract] expired no later than June 15, 2013. Id. at 3-4. Because the statute of limitations had run at the time Employee sought to amend the Complaint, and a plaintiff may not add a new defendant after the statute of limitations has run, we find no error in the trial court’s order denying Employee’s Motion to Amend Complaint to join Weiser as an additional defendant. Employer’s Appeal Employer’s first two claims are interrelated. Therefore, we address them together. In its first issue, Employer claims that the trial court erred in finding the Contract term “net collected receipts,” as it pertained to the allocation of the cost of vaccines administered by Employee, ambiguous simply because the Contract did not define it and the parties offered two - 18 - J-A25007-18 different interpretations of it. Employer’s Brief at 16-17. Employer emphasizes that the “mere existence of differing contractual interpretations by contracting parties does not render a contract ambiguous.” Id. at 17 (quoting Krizovensky v. Krizovensky, 624 A.2d 638, 643 (Pa. Super. 1993)). Employer suggests that, rather than “prematurely conclude” that an ambiguity existed, the court should have consulted the dictionary to understand the plain meaning of “net collected receipts.” Id. at 17-18. Had the court done so, Employer concludes that the court would have “recognized that the distinct and substantial ‘expense’ the medical practice incurred by pre-purchasing vaccines out-of-pocket clearly should be excluded from ‘net collected receipts.’” Id. at 18. Relatedly, in its second issue, Employer claims that the court’s interpretation of “net collected receipts” was unreasonable because it was contrary to the weight of the evidence elicited at trial and the established rules of contract construction. Id. at 18-19, 21-22. In particular, Employer alleges that the trial court “made no attempt . . . to weigh the extrinsic evidence to discern the most reasonable, probable, and natural interpretation of ‘net collected receipts.’” Id. at 20. Employer argues that, in adopting Employee’s “extreme and implausible” interpretation of “net collected receipts,” the court erroneously excluded one of Employer’s “largest identifiable and attributable expense outlays” from Employee’s compensation calculation. Id. at 20. Employer also alleges that the court erred in construing this term against Employer as the drafter. Id. - 19 - J-A25007-18 As noted supra, it is well-settled that “[a]contract is ambiguous if it is reasonably susceptible of different constructions and capable of being understood in more than one sense.” Insurance Adjustment Bureau, Inc., 905 A.2d at 468-69. “A contract is not ambiguous if the court can determine its meaning without any guide other than knowledge of the simple facts on which, from the nature of the language in general, its meaning depends.” Trombetta v. Raymond James Fin. Servs., Inc., 907 A.2d 550, 562 (Pa. Super. 2006). “A contract is not rendered ambiguous by the mere fact the parties do not agree on the proper construction.” Id. “It is the function of the court to decide, as a matter of law, whether the contract terms are clear or ambiguous.” Tuthill v. Tuthill, 763 A.2d 417, 420 (Pa. Super. 2000) (citations omitted). Instantly, the parties offered the trial court two differing definitions of “net collected receipts.” Employee suggested that the term meant simply the amount of money actually collected by Employer from insurance companies and from patient co-pays. Employer interpreted the term to mean the amount of money Employer collected from insurance companies and patients, less the cost of vaccines purchased by Employer and other expenses. The trial court found that it was unable to ascertain the definition of “net collected receipts” from the Contract’s plain language. Thus, the term “net collected receipts” was ambiguous as a matter of law, and, the court construed it against Employer to exclude Employer’s vaccine costs from the calculation of Employee’s compensation. Trial Ct. Op., 6/14/18, at 6-7. - 20 - J-A25007-18 In particular, it explained as follows: The subject [Contract] never explicitly defines the term “net collected receipts.” There is no mention of what is to be deducted from receipts to obtain the amount of net collected receipts. In particular, there is no mention of vaccines anywhere in the [Contract]. . . . The term “net collected receipts” could mean the net amount collected from the insurance company from the amount actually billed, or it could imply deductions of unspecified expenses. [] Weiser testified that many categories of expenses do not figure in the “net” calculation because they are not easily discernable in terms of which doctor is responsible for which expenses. The selection of which costs, if any, were to be deducted in calculating [Employee’s] net collected receipts is not clear in the [Contract] and disputed by the parties. Since the [Contract] did not define how “net collected receipts” should be calculated, the indefiniteness of the term rendered it susceptible to different construction. Id. at 6-7. In sum, the trial court found that: (1) the parties presented two competing interpretations of the definition of “net collected receipts”; and (2) the court was unable to determine its meaning from the plain language of the Contract. Given this, we agree with the trial court that the term “net collected receipts” is ambiguous. Employer also suggests that had the court simply consulted a dictionary to ascertain the definition of “net” it would have concluded that the term is unambiguous. We agree with the trial court that this contention lacks merit. The court considered this argument, but found that the Black’s Law Dictionary definition of “net”—“[c]lear of anything extraneous; with all deductions, such as charges, expenses, discounts, commissions, taxes, etc.; free from - 21 - J-A25007-18 expenses”—“is not precise enough to interpret the [Contract] when considering [Weiser’s] own testimony that one unspecified category of expenses (cost of vaccines) was included in the [Contract] and not other expenses.” Id. at 7 (citing Black’s Law Dictionary, 10th ed. 2014). With respect to Employer’s claim that the court erred in construing the Contract against it, the court explained that it reached its conclusion that “‘net collected receipts’ was intended to have a meaning consistent with [Employee’s] testimony” based primarily on its review of the extrinsic evidence, including Employee’s and Weiser’s testimony. Trial Ct. Op., 6/14/18, at 7-8. It noted that the fact that Weiser drafted the Contract was “merely an additional reason to interpret the [Contract] against” Employer. Id. at 8. Because the court appropriately concluded that the term “net collected receipts” is ambiguous,” as the fact-finder, it properly considered extrinsic evidence, including the testimony of the parties as to their understanding of the meaning of the term. The trial court’s findings are supported by the competent evidence of record. Accordingly, Employer is not entitled to relief on these claims. In its final issue, Employer claims the trial court erred in determining that Employee administered at least 25 H1N1 flu vaccines on October 31, 2009, for which Employer did not compensate her. Employer’s Brief at 25. Employer characterizes Employee’s testimony about this allegation variously as “mistaken and conflicting,” “uncertain, unsubstantiated, and conflicting,” - 22 - J-A25007-18 and undermined by her failure to present any documentary evidence in support. Id. at 26, 28. Essentially, Employer challenges the weight the trial court gave to Employee’s testimony. This court will not substitute its assessment of credibility for that of the finder of fact. Commonwealth v. Manley, 985 A.2d 256, 262 (Pa. Super. 2009). The trial court’s denial of a weight claim is the least assailable of its rulings. Commonwealth v. Diggs, 949 A.2d 873, 879-80 (Pa. 2008). See Commonwealth v. Morgan, 913 A.2d 906, 909 (Pa. Super. 2006) (stating that because the trial court is in the best position to view the evidence presented, an appellate court will give that court “the utmost consideration” when reviewing its weight determination). Here, the trial court found that Employee “testified credibly regarding at least twenty-five H1N1 flu vaccines that she administered on October 31, 2009.” Trial Ct. Op., 6/14/18, at 8 (internal quotation marks omitted). It explained that the credible record evidence supported its finding that Employee was uncompensated for the patient co-pays received by Employer for administering those vaccines. Id. Employer asks us to reweigh the evidence and the trial court’s credibility determination and reach a different conclusion. We cannot and will not do so. Accordingly, this claim also fails. Judgment affirmed. Judge Panella joins the memorandum. Judge Kunselman files a Concurring and Dissenting Memorandum. - 23 - J-A25007-18 Judgment Entered. Joseph D. Seletyn, Esq. Prothonotary Date: 6/27/19 - 24 -
2023-11-20T01:27:13.970301
https://example.com/article/9135
Broadview Returns With a Healthier Balance Sheet Broadview Networks is back from its prepackaged Chapter 11 surgery and ready to unveil its new look, emerging from an 11 week trip through chapter 11. With a new balance sheet in place, they hope to use the extra financial flexibility to invest in the cloud services market. Broadview had announced its intentions to restructure back in August, and after a brief look by an Icahn affiliate it followed through back in August. As a result, the company's debt has been chopped in half to $150M of senior secured notes and a $25M revolving credit facility. Annual interest payments will be reduced by $18M. Revenues for Q3 fell sequentially to $82.6M according to the company's 10-Q, filed late last week. Adjusted EBITDA checked in at $14.8M, so margins were pretty much steady at 17.9%. Broadview certainly has a healthier balance sheet, but it does face the same structural issues as in the past: a declining base of traditional, lower margin CLEC revenues and a relatively small supply of fiber to fight it with. Like others, they are looking to shift their model to depend on more cloud-based services sold to their existing customer base, but it takes time to ramp such services. One can't help but wonder, though, if that look they got by Icahn back in August isn't suggestive of further M&A potential. XO is still a possible fit, as are Earthlink and perhaps Windstream.
2023-11-22T01:27:13.970301
https://example.com/article/8653
Recently, I posted several tips for smoother tear-downs, to help planners wrap-up and clear out of event venues more quickly – but for those of us who produce night-time events that often end in the wee hours, here are three more tips to keep in mind, no matter how late it gets. Make these tips part of your late night tear-down routine and they could wind up saving you time, money and possibly a tussle with the venue should problems arise after you’ve cleared out: Shoot 'em up. It’s the end of the night. You’re tired and just want to go home and crash for the night. Not so fast! Take 5 minutes to walk through the venue and thoroughly video or photograph the spaces so you have visual documentation of exactly what it looked like when you left, in case there's a question later. Don’t wrap and dash – do a farewell walk-thru. Just like you did when you first toured the venue, do an end-of-the-night walk-thru with the venue’s on-site manager, as soon as you are ready to leave for the night. Verbally confirm with the manager that everything is in order and that all is in good condition. Doing so will help guard against a venue’s ability to try to bill you later for damages not caused by your team. Drop a line and a hint. After you’ve vacated the space, that night or first thing in the morning, send a follow-up email to your primary contact for the venue. Offer kudos where appropriate and mention that you walked the space with the night manager, who confirmed that the space was in order when you left – in other words, politely document just the highlights of the conversation. Though it might not stand up in court, a well-worded follow-up note will give the impression that you paid attention, took special care and can go to the mat if you have to.
2024-01-26T01:27:13.970301
https://example.com/article/8794
More Views Note: We confirm your order by telephone, then we will ship your Free Fabric Sample within one business day day via First Class US Mail. Our sample includes our current brochure, a swatch sample of our Select-fit (Indoor/Outdoor) Silver Fabric and a swatch sample of our Select-Fleece (Indoor/Show) Fabric. We also include a copy of our installation and care instructions. We want you to see why Microbead has changed the car cover business with these revolutionary new products! Order your sample today and tell us how you found us! Also include what you are driving and when you are looking to purchase a cover for your vehicle. If you have lots of vehicles, we can provide discounts on multi-vehicle purchases. Still have questions? Give us a call and we would be happy to help with any questions you might have! Features: * Microbead Silver Select-fit (R) Material is a 150 denier woven material (150 threads per square inch). The underside coated so it never sticks to the paint of the car and completely safe for clear coat finishes. Practically waterproof, yet breathable to prevent rust. Microbead gets its name from the way the water beads right off your cover! * Microbead Select-Fleece (R) Material is the thickest Fleece Cover Material in the industry! Ultra Soft Select-Fleece(R) Indoor Car Cover Kit. Our new Microbead Select-Fleece® car cover kit is designed for customers that store their cars inside and want to treat their car to the kind of fleece you would wear yourself. Black satin feel on the outside; super soft and fuzzy underside. This cover will baby your car. And the stretchy fabric accentuates the beautiful silhouette of your vehicle. It is like wearing a fleece jacket or sweatshirt, but for your car! Perfect for the garage and the show field, it is practically custom-fit for less than half the price. Compare Select-Fleece to other manufacturers covers costing $400 or more. Note: We confirm your order by telephone, then we will ship your Free Fabric Sample within one business day day via First Class US Mail. Our sample includes our current brochure, a swatch sample of our Select-fit (Indoor/Outdoor) Silver Fabric and a swatch sample of our Select-Fleece (Indoor/Show) Fabric. We also include a copy of our installation and care instructions. We want you to see why Microbead has changed the car cover business with these revolutionary new products! Order your sample today and tell us how you found us! Also include what you are driving and when you are looking to purchase a cover for your vehicle. If you have lots of vehicles, we can provide discounts on multi-vehicle purchases. Still have questions? Give us a call and we would be happy to help with any questions you might have! Features: * Microbead Silver Select-fit (R) Material is a 150 denier woven material (150 threads per square inch). The underside coated so it never sticks to the paint of the car and completely safe for clear coat finishes. Practically waterproof, yet breathable to prevent rust. Microbead gets its name from the way the water beads right off your cover! * Microbead Select-Fleece (R) Material is the thickest Fleece Cover Material in the industry! Ultra Soft Select-Fleece(R) Indoor Car Cover Kit. Our new Microbead Select-Fleece® car cover kit is designed for customers that store their cars inside and want to treat their car to the kind of fleece you would wear yourself. Black satin feel on the outside; super soft and fuzzy underside. This cover will baby your car. And the stretchy fabric accentuates the beautiful silhouette of your vehicle. It is like wearing a fleece jacket or sweatshirt, but for your car! Perfect for the garage and the show field, it is practically custom-fit for less than half the price. Compare Select-Fleece to other manufacturers covers costing $400 or more.
2024-03-09T01:27:13.970301
https://example.com/article/1763
Q: open word document inside a windows 8 metro application Now i'm open a word document in windows 8 Metro apps. I don't know if is it possible. but i have open the word document inside a windows 8 Metro apps. ex: open the word document in gmail using iPad. here is my code, string file = @"Assets\sample.docx"; var getFile = await Windows.ApplicationModel.Package.Current.InstalledLocation.GetFileAsync(file); if (getFile != null) { var success = await Windows.System.Launcher.LaunchFileAsync(getFile); } this is open for a word file. but i have open inside a windows 8 metro application. thanks in advance. A: You should be able to open a Word file from a Windows 8 Metro/Windows Store app just using file activation. Since a .docx or .doc file is already associated with the Word program, it should launch Word as a separate process and open the file within Word, from your app. However, it doesn't run Word inside of your app. That is not possible.
2024-06-10T01:27:13.970301
https://example.com/article/6631
Game of Thrones Limited Edition Following the first set of pens celebrating the great houses in Game of Thrones, Montegrappa has issued a new series of limited edition Iron Throne pens. Capturing the essence of the most coveted seat in Westeros, the Iron Throne pens will provide fans with a talisman to cherish. To represent the intricacies and complexities of the Iron Throne itself, Montegrappa’ s artisans have fashioned a cap formed of overlapping swords representing the seven kingdoms. Their hilts rise above the cap’s top to create a crown, the pommels and blades running the length of the cap itself. Standing proud is a sword that serves as the pocket clip, its hilt bearing a fiery red ruby. At the cap’s top, surrounded by the swords’ hilts, is the Game of Thrones logo. The pen’s barrel, a truly virtuous artwork fashioned in precious metal with the lost-wax casting technique, represents the saga through symbols evocative of the houses, from dragons to stags. Details of the pen are enriched with Flaming White celluloid. The Iron Throne Pen is limited to 300 fountain pens and 300 rollerball pens in Sterling Silver with Vermeil accents, denoting the year of settlement of the last of the Targaryen Kings (300AC). 7 exclusive fountain and 7 rollerball pens cast in solid 18k Gold represent the number of Kingdoms. The fountain pen is piston fed, with nib traditionally made in 18k gold, engraved with the image of the throne itself.
2024-06-04T01:27:13.970301
https://example.com/article/9087
Description This beautiful, nicely upgraded and well-maintained Stanford model is on a corner lot in a great location close to all the amenities. The pride of ownership really shows with an upgraded kitchen including nice wood cabinets, Stainless Steel oven, glass cook top, Kenmore side by side refrigerator and tile in all the right places. Plantation shutters and updated dual pane windows really help with energy efficiency and comfort. The home has a very nice layout, neutral paint and carpet. The large corner lot has a huge covered patio across the back, plenty of citrus trees and lush desert landscaping. Newer roof, Carrier AC unit and a Ruud hot water tank. The garage is a hobbyist dream containing a workbench, built in storage cabinets and has plenty of room for a golf cart, motorcycle, scooter. School Information Description This beautiful, nicely upgraded and well-maintained Stanford model is on a corner lot in a great location close to all the amenities. The pride of ownership really shows with an upgraded kitchen including nice wood cabinets, Stainless Steel oven, glass cook top, Kenmore side by side refrigerator and tile in all the right places. Plantation shutters and updated dual pane windows really help with energy efficiency and comfort. The home has a very nice layout, neutral paint and carpet. The large corner lot has a huge covered patio across the back, plenty of citrus trees and lush desert landscaping. Newer roof, Carrier AC unit and a Ruud hot water tank. The garage is a hobbyist dream containing a workbench, built in storage cabinets and has plenty of room for a golf cart, motorcycle, scooter. Property Description This beautiful, nicely upgraded and well-maintained Stanford model is on a corner lot in a great location close to all the amenities. The pride of ownership really shows with an upgraded kitchen including nice wood cabinets, Stainless Steel oven, glass cook top, Kenmore side by side refrigerator and tile in all the right places. Plantation shutters and updated dual pane windows really help with energy efficiency and comfort. The home has a very nice layout, neutral paint and carpet. The large corner lot has a huge covered patio across the back, plenty of citrus trees and lush desert landscaping. Newer roof, Carrier AC unit and a Ruud hot water tank. The garage is a hobbyist dream containing a workbench, built in storage cabinets and has plenty of room for a golf cart, motorcycle, scooter.
2024-05-06T01:27:13.970301
https://example.com/article/8782
Q: How to remove files from a Git repository using Windows Tortoise? I see a lot of answers on the Web but this does not work for me. So, I do right click on the file and select “TortoiseGit”/”delete (keep local)”. The file icon becomes red and all above directories also. If I clone this directory again I still check out this file I tried to do “TortoiseGit”/”push” from the directory above. Options were default in push. TortoiseGit creates the dialog boxes for username and password. However, this does not change anything – still files are not removed from the repository A: After deleting the file from Tortoise git do a commit and then push it up to the repository, this will add the deletion to the remote repository and then any subsequent pulls will have have this commit and you will no longer be getting that file.
2024-04-24T01:27:13.970301
https://example.com/article/5144
New enzymatic assay, parasite lactate dehydrogenase, in diagnosis of malaria in Kenya. The unique ability of plasmodial lactate dehydrogenase p(LDH) to utilise 3-acetyl pyridine dinucleotide (APAD) in lieu of NAD as a coenzyme in the conversion of pyruvate to lactate, led to the development of a biochemical assay for the detection of plasmodial parasitaemia. Researchers have reported that p(LDH) activity of plasmodia could be used as an assessment of parasitaemia since human red blood cells do not utilise APAD in the metabolism of glucose. To use p(LDH) for field and clinical diagnosis of malaria in endemic regions of Kenya. Prospective field and clinical study. Kisumu District Hospital and Walter Reed malaria laboratory in Kenya. The study subjects were of three different categories: the healthy non-infected individuals staying out of malaria endemic region (controls group 1), the nonparasitaemic and parasitaemic non- symptomatic healthy individuals living in endemic region {both field study group 2}, the non-parasitaemic and parasitaemic symptomatic individuals living in endemic region {both clinical study group 3}. In the clinical studies, thin smear microscopy gave the highest sensitivity as 75.6% for plasma, while the highest specificity was 71.4%. For red blood cells, the highest sensitivity was 78.4% while specificity was 80%. In the field trials, the highest sensitivity was 89% using thin smear microscopy whereas the specificity was 45% for plasma cut off using thick smear. For red blood cells, the highest sensitivity was 79% while specificity was 66.7%. The variations in sensitivity and specificity of this assay in comparison to microscopy is a strong indication that p(LDH) may be measuring even the sequestered parasites that cannot be visualised by microscopy. The results of this study validates the use of p(LDH) as an alternative objective test for malaria diagnosis against microscopy.
2024-05-16T01:27:13.970301
https://example.com/article/1828
Mitt Romney Debate: His 2002 Performance Gives Telling Clues By Sam Stein and Jason Cherkis FILE - In this Sept. 26, 2012 file photo, Republican presidential candidate, former Massachusetts Gov. Mitt Romney speaks in Westerville, Ohio. On the eve of the first presidential debate, the early autumn Republican reviews are in for Mitt Romney's presidential campaign, and they are not pretty. In some states, candidates who share the Nov. 6 ballot with the former Massachusetts governor already have taken steps to establish independence from him. Party strategists predict more will follow, perhaps as soon as next week, unless Romney can dispel fears that he is headed for defeat despite the weak economy that works against President Barack Obama's prospects. (AP Photo/Jay LaPrete, File) WASHINGTON -- Mitt Romney has won only one election in his two-decade political career. And that election changed, quite dramatically, on a high-stakes debate. The parallels between Romney's 2002 run for governor of Massachusetts and his current White House quest are limited. Romney was a different Republican then, emphasizing moderation on social issues and open-minded pragmatism for a liberal-leaning state. But as political trajectories go, 2002 provides a template for Romney in 2012. Then, as now, he dealt with a deficit of trust among women, calls to release tax returns and questions about his years in private equity. Over an intense monthlong period featuring five debates, he persevered. And for those Republicans worried about the current state of the presidential race, a look back offers some relief. The Huffington Post watched the full footage of all the 2002 debates available in CSPAN archives, reviewed hundreds of newspaper articles, and conducted interviews with several key gubernatorial campaign players, in hopes of getting a clear sense of what worked for Romney and what didn't. Several conclusions were reached. For one, Romney improved with experience. His breakthrough against Democrat Shannon O'Brien didn't come in the early debates, but only after tinkering with his approach. Moreover, he was able to catapult into the lead by being perceived as the victim, not by playing the role of aggressor. During the first debate, on Sept. 24, Romney presented himself as a political outsider eager to apply a fresh, business-savvy touch. Then, as now, tax returns came up, with Romney explaining that he valued his privacy too much to release them. "I made more money than I expected," he said. "But I am in this race not because of money, but because I want to make sure Beacon Hill works for people who don't have money." Throughout the debate's 17 questions, Romney came back to that theme repeatedly. "I'm not in this race because of rich people," he said in his closing statement. "Rich people can take care of themselves." The line is almost identical to what Romney has said in 2012 -- save when captured on hidden camera. But for the most part, in the 2002 debate, it didn't move the dial. Both campaigns left that night believing that Romney came across as too timid. "He was very stiff," O'Brien recalled in an interview. "He didn't quite know what to make of me. ... I was taking it to him pretty strong. He seemed unsure of himself." Dwight Robson, O'Brien's campaign manager, remembered Romney making headway by playing up his outsider status. But he felt that his candidate got the best of the night. "Our goal had to be to knock him off his prepared lines," Robson explained. Romney had tasked Beth Myers, his longtime aide, to play a sharp, no-nonsense O'Brien during practice sessions. And in those sessions, he prepared for tough barbs. But even then, he was wary that pushing back too hard would produce a Rick Lazio moment, when the New York Republican infamously invaded Hillary Clinton's space during their 2000 Senate debate. "As a Republican man, you got to be careful," recalled one paid staffer from Romney's 2002 campaign. "It's almost like [Romney] had to take one for the team in that first debate. She beat him pretty good. I think he was a little stunned." A Boston Globe poll on Sept. 29 had O'Brien with 42 percent of the vote, compared with Romney's 36 percent. On Oct. 1, 2002, the two candidates met again in a debate moderated by Judy Woodruff. Twenty three questions produced few memorable results. Romney, asked if he would pay $1 million if he left the governor's chair for higher office before his term ended, joked that the check "would bounce anyway." O'Brien, perhaps overconfident, called for additional debates, to which Romney replied that viewers would be "bored to tears." The reviews were mixed. Romney, wrote the Boston Herald, was "mostly reluctant to fire back." Even his advisers, it wrote, said he had "failed to hammer home his [reformer] campaign theme." The Globe gave Romney kudos for doing better at "relating to average people's problems." But internally, the Romney campaign was starting to panic. His inner circle organized an all-staff meeting at the candidate's Belmont home. Over Domino's Pizza (a Bain company), they plotted a change in debate strategy. The staffer likened it to the kind of meeting corporations give before announcing layoffs. "People are calling you a wimp. Now, you got to fight for yourself," was the gist, the staffer recalled. The Globe reported that "after a huddle at his Belmont home," Romney would "shed the posture that at times made him appear the smug, programmed front-runner." Instead, he would be "a much sharper, less gentlemanly candidate." Around that time, a Suffolk University poll found O'Brien with a "commanding lead" -- 42 percent to 30 percent. "I probably was just physically more energized," O'Brien recalled of those early rounds. "I kind of knew my stuff. I just was comfortable." The next debate took place on Oct. 9 and was the first to feature the three other minor party candidates. The additions made for a disjointed affair, confusing Romney. "Carla, I agree," Romney said at one point, addressing, who he thought was, Libertarian candidate Carla Howell. He was actually talking to Green Party candidate Jill Stein. "He is as warm and fuzzy in person as he is on TV," Stein recalled in an interview with The Huffington Post. It was a small slip. The next day, the Telegram and Gazette wrote that "Mitt needs an image overhaul to win the race." And yet, polling started to point to a Romney resurgence, with the University of Massachusetts having O'Brien's lead at 42 percent to 39 percent. His momentum picked up in the next debate -- another meeting of all five candidates -- in which he came off more confident and direct in responding to attacks. "Romney appeared the more aggressive of the two last night and was more focused than he has been in previous encounters," the Globe wrote the next day. "For the past two weeks, Shannon P. O'Brien has been pummelled on the airwaves by GOP rival Mitt Romney, and last night she looked like it," the Herald added. O'Brien's camp was getting flustered. Robson said the bigger debates proved tougher for the candidate, who had to fend off attacks on her progressive bonafides from Stein and compete for time with all the others. And yet, on Oct. 29, the Herald had O'Brien leading 44 percent to 38 percent. Harvard's Institute of Politics had it closer: 41 percent to 39 percent. The fifth and final debate would be the turning point, underscoring both the breadth of Romney's evolution as a debater and how unpredictable the forums can be. At the suggestion of Sen. Ted Kennedy, longtime Democratic strategist Bob Shrum had come in to help O'Brien, though he recalled that she was more than adequately prepared. "She was pretty clear in her head about what she wanted to do," Shrum said. But what O'Brien wanted to do ended up backfiring. With Tim Russert moderating, she attacked Romney for flip-flopping, casually joked about having a tattoo when asked why a 16-year-old girl needed parental consent to put ink on her body but not have an abortion, and routinely interrupted Romney's responses. "Go ahead Tim," Romney complained at one point, "you're going to have to take it over." "Your effort to try and create fear and deception here is unbecoming," Romnney declared at another. The O'Brien team pointed to the "unbecoming" line as evidence of a condescending attitude or, worse, sexism. But by the time that the scorecards were handed out, the consensus was that Romney had been victimized. The Globe, watching the debate with eight residents of Marlborough, told the story in its first sentence: "She drove them crazy here last night. And not in a good way." Five of the eight residents -- who had said they were undecided -- came away supporting Romney. None had positive reactions to O'Brien. The Globe's editorial page, restating its prior endorsement of O'Brien, called the debate "hardly ennobling." The Lowell Sun, Telegram & Gazette and Herald endorsed Romney. The polls turned drastically. Romney's six-point deficit in the Herald poll became a one-point deficit on Nov. 3. Nearly 44 percent of voters had watched the debate. Of those, Romney enjoyed a seven-point lead. The Romney team saw the debate as a clear victory, while both campaigns saw the tattoo joke as an O'Brien misstep. "She was done after that," explained one former Romney campaign staffer. Campaign manager Robson said, "She did not look good." Reflecting on it 10 years later, O'Brien said she regrets that people ever thought she had a tattoo (she doesn't). "I was tired," she added, noting that she had just come from a union rally prior to the debate. "I was bitchy." She also offered some reflections on Romney that could provide some lessons for Obama in Wednesday's debate. Romney, she said, had adopted a rope-a-dope strategy, playing tentative through much of the debates before finally punching back at a critical moment. "They wanted me to be tough," she said. "That was a strategy to get me into a conflict. I took the bait. I kept going at him. I don't think that helped me." It was a bit of political skill from her opponent that neither she or her advisers had expected. "I think [Obama] has to be careful being too negative, too nasty," she said. "He has to be very matter of fact."
2024-03-27T01:27:13.970301
https://example.com/article/4110
A Democrat running for a state House seat in North Carolina has caused a stir in the election by claiming at a campaign event this week that he’s “a member of the African-American community.” The candidate, Gary Shipman – one of three Democrats seeking the party’s nomination to take on incumbent state Rep. Holly Grange, a Republican, is white. "I'm a member of the African-American community," Shipman said. "I've been where you are. I've been in your communities." Shipman, an attorney and party official, tried to clarify his remark afterward, claiming he meant to say that he is out and about among the community, meeting with African-Americans and other voters, so he feels confident that they know him and he knows them, the News & Observer of Raleigh reported. "I’ve eaten at many a fish fry held by my 'brothers' and 'sisters,' 'aunts' and 'uncles' in that community." — Gary Shipman, Democrat running for Congress in North Carolina “I’ve eaten at many a fish fry held by my 'brothers' and 'sisters,' 'aunts' and 'uncles' in that community; I’ve celebrated birthdays, births, marriages, graduations, Christmas, Thanksgiving, July 4, etc., with many members of the African-American community," Shipman wrote in an email to the newspaper. "There are people within that community and elsewhere that refer to me (and treat me) like their 'brother' or 'pops' or 'uncle', and I refer to them (and treat them) like my 'brothers', 'sisters' and children," he wrote. He added: "Like other members of my family, many members of the African-American community have called me in the middle of the night when someone was sick or to come help them or some other member of their family, and I’ve responded — because they are my family.” Shipman and his Democratic opponents in the 20th District race – Leslie Cohen and John Bauer – were asked at the campaign event how they would promote inclusion and get African-American voters interested in their campaigns, the News & Observer reported. Shipman said his remarks were intended as a response to Cohen, who said she would accept any invitations to meet with African-American voters. Ultimately, said Dallas Woodhouse, executive director of North Carolina’s Republican Party, it’s the voters who will decide who represents their values and their community. But Shipman might not believe that his community spirit extends to private organizations such as golf clubs. In 2013, he told WECT-TV that he did not believe that private clubs such as Georgia’s Augusta National were obligated to admit women or minorities, as Augusta did in 2012 when it admitted former U.S. Secretary of State Condoleezza Rice and South Carolina financier Darla Moore. “Private organizations that are not open to the public are run by their members who make the rules as to whether to admit or expel members in accordance with those rules,” Shipman told the station, “and courts, except under extremely limited circumstances, don't get involved.”
2024-04-12T01:27:13.970301
https://example.com/article/1918
A new botnet appeared over the weekend, and it's targeting Android devices by scanning for open debug ports so it can infect victims with malware that mines the Monero cryptocurrency. The botnet came to life on Saturday, February 3, and is targeting port 5555, which on devices running the Android OS is the port used by the operating system's native Android Debug Bridge (ADB), a debugging interface that grants access to some of the operating system's most sensitive features. Only devices running the Android OS have been infected until now, such as smartphones, smart TVs, and TV top boxes, according to security researchers from Qihoo 360's Network Security Research Lab [Netlab] division, the ones who discovered the botnet, which the named ADB.miner. Botnet appears to have infected around 7,400 devices The botnet has been extremely aggressive and has grown each day, exhibiting a worm-like behavior, with infected devices scanning the Internet for other victims. "The number of scan [sources] has doubled every 12 [hours]," said Yiming Gong, Director of the Network Security Research Lab at Qihoo 360. "We will see how big this botnet gets." Currently, Netlab has detected ADB.miner scans coming from nearly 7,400 unique IP addresses, based on public data collected by Netlab's Scanmon system. Scanning for this port has been so widespread that port 5555 shot to the #4 spot in Netlab's most scanned ports. Previously, it wasn't even in the top 10. Most IP addresses scanning for other devices (meaning they are already infected) are located in China (~40%) and South Korea (~30%). Yiming told Bleeping Computer that the botnet has mostly infected "TV-related" devices, rather than smartphones. ADB.miner borrows Mirai code ADB.miner also marks the first time an Android malware strain has borrowed code from Mirai, a strain of Linux-based malware that has previously targeted only networking and IoT devices. Netlab says ADB.miner used some of Mirai's port scanning code. Researchers didn't provide any details regarding the ADB vulnerability attackers are using to take over devices but clarified that they don't think the bug is specific to any particular vendor. This most likely means the bug affects the core of the Android ADB component itself. By default, all Android OS instances ship out with the ADB port disabled. The devices taken over by this botnet are devices where vendors or users intervened and enabled port 5555 by hand. An analysis of the ADB.miner malware source code revealed that crooks are mining Monero using the same Monero wallet address on two different mining pools. At the time of writing, attackers didn't cash out any of their mined Monero.
2024-04-03T01:27:13.970301
https://example.com/article/5259
Q: Problem Writing Linq2Xml Query I'm trying to write a Linq2XML query to query the following XML. I need it to pull back all photos for a given GalleryID. <Albums> <Album GalleryId="1" Cover="AlbumCover1.jpg" Title="Album 1"> <Photos> <Photo Title="Image1" URL="img1.jpg" DateAdded="01/01/2010 09:20"/> <Photo Title="Image2" URL="img2.jpg" DateAdded="01/01/2010 09:20"/> <Photo Title="Image3" URL="img3.jpg" DateAdded="01/01/2010 09:20"/> </Photos> </Album> <Album GalleryId="2" Cover="AlbumCover1.jpg" Title="Album 2"> <Photos> <Photo Title="Image1" URL="img1.jpg" DateAdded="01/01/2010 09:20"/> <Photo Title="Image2" URL="img2.jpg" DateAdded="01/01/2010 09:20"/> </Photos> </Album> </Albums> The best I've come up with is XDocument xmlDoc = XDocument.Load(GalleryFilePath); var x = from c in xmlDoc.Descendants("Album") where int.Parse(c.Attribute("GalleryId").Value) == GalleryId orderby c.Attribute("Title").Value descending select new { Title = c.Element("Photos").Element("Photo").Attribute("Title").Value, URL = c.Element("Photos").Element("Photo").Attribute("URL").Value, DateAdded = c.Element("Photos").Element("Photo").Attribute("DateAdded").Value }; This returns nothing, I'm guessing this is because I'm telling it to query the Album element then trying to loop through the photo elements. Any tips as to how this should be done? Thanks Edit : Code updated to reflect answers A: It's a common mistake to confuse the Attribute object with a value. You should use Attribute("x").Value to retrieve it's value. Try this corrected code: XDocument xmlDoc = XDocument.Load(GalleryFilePath); var x = from c in xmlDoc.Descendants("Photo") where c.Parent.Parent.Attribute("GalleryId").Value.Equals(GalleryId) orderby c.Parent.Parent.Attribute("Title").Value descending select new { Title = c.Attribute("Title").Value, URL = c.Attribute("URL").Value, DateAdded = c.Attribute("DateAdded").Value }; [Update] To retrieve a list of photo's, I've set the from to the photo elements, and the where to the album, which is 2 levels up in the provided sample XML.
2024-05-18T01:27:13.970301
https://example.com/article/9487
package co.aikar.commands.annotation; import java.lang.annotation.ElementType; import java.lang.annotation.Retention; import java.lang.annotation.RetentionPolicy; import java.lang.annotation.Target; /** * The {@link SelfUser} annotation is to define whether the parameter should be represented by JDA's user object * or if it should be parsed from command input. */ @Target(ElementType.PARAMETER) @Retention(RetentionPolicy.RUNTIME) public @interface SelfUser { }
2023-08-21T01:27:13.970301
https://example.com/article/7595
Formation of integrated circuit structures upon a semiconductor wafer may require photoresist patterning and subsequent electroplating processes. During electroplating, a metal or other electrically conductive material is plated from the wafer surface within the openings of the patterned photoresist. In certain implementations the electrically conductive material take the form of solder bumps utilized in controlled collapse chip connection (C4) to interconnect a semiconductor device to external circuitry via the solder bumps. Subsequent to plating, the photoresist is stripped from the semiconductor wafer utilizing a photoresist stripping solution. The Restriction of Hazardous Substances Directive (RoHS) restricts the use of certain hazardous substances in electrical and electronic equipment and has driven the electronics industry to move away from solders that contain Lead (Pb). As a result, lead-free solder bumps may now be electroplated upon a lead-free semiconductor wafer within the patterned photoresist. In some instances, the photoresist upon the lead-free wafer may be stripped in the same photoresist stripping tool and photoresist stripping solution as leaded (non lead-free) semiconductor wafers.
2024-03-05T01:27:13.970301
https://example.com/article/2316
<?xml version="1.0" encoding="UTF-8"?> <thing:thing-descriptions bindingId="rfxcom" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xmlns:thing="https://openhab.org/schemas/thing-description/v1.0.0" xsi:schemaLocation="https://openhab.org/schemas/thing-description/v1.0.0 https://openhab.org/schemas/thing-description-1.0.0.xsd"> <thing-type id="temperaturehumiditybarometric"> <supported-bridge-type-refs> <bridge-type-ref id="bridge"/> <bridge-type-ref id="tcpbridge"/> <bridge-type-ref id="RFXtrx433"/> <bridge-type-ref id="RFXrec433"/> </supported-bridge-type-refs> <label>RFXCOM Temperature-Humidity-Barometric Sensor</label> <description>A Temperature-Humidity-Barometric device.</description> <channels> <channel id="temperature" typeId="temperature"/> <channel id="humidity" typeId="humidity"/> <channel id="humidityStatus" typeId="humiditystatus"/> <channel id="pressure" typeId="pressure"/> <channel id="forecast" typeId="forecast"/> <channel id="signalLevel" typeId="system.signal-strength"/> <channel id="batteryLevel" typeId="system.battery-level"/> <channel id="lowBattery" typeId="system.low-battery"/> </channels> <config-description> <parameter name="deviceId" type="text" required="true"> <label>Device Id</label> <description>Sensor Id. Example 59648</description> </parameter> <parameter name="subType" type="text" required="true"> <label>Sub Type</label> <description>Specifies device sub type.</description> <options> <option value="THB1">BTHR918, BTHGN129</option> <option value="THB2">BTHR918N, BTHR968</option> </options> </parameter> </config-description> </thing-type> </thing:thing-descriptions>
2024-04-21T01:27:13.970301
https://example.com/article/4238
A microtourniquet carrier for use in the microsurgical laboratory. The construction of a simple, inexpensive microtourniquet carrier is described. The carrier can be made from materials readily available in the microsurgical laboratory or the operating room. The carrier increases the ease of occluding a vessel with a microtourniquet and increases the speed of applying a number of tourniquets sequentially, thereby making the microtourniquet an attractive alternative to the more expensive and less flexible microvascular clip for temporary vascular occlusion.
2024-02-21T01:27:13.970301
https://example.com/article/6762
Captopril and enalapril improve cognition and depressed mood in hypertensive patients. In this study, we evaluate the effects of two angiotensin converting enzyme inhibitors (ACEIs), captopril and enalapril given chronically as antihypertensive treatment, on certain cognitive and emotional processes in humans. Thirty-nine subjects with mild to moderate hypertension and fifteen normotensive controls were divided into four groups consisting of normotensive and hypertensive subjects taking captopril, enalapril, or no medication at all. The Rey Auditory Verbal Learning Test and the Wechsler Memory Scale were used to evaluate their cognitive functioning. Mood changes in all subjects were assessed using the Beck Depression Inventory and the Hopkins Symptom Check- list (HSC). Untreated hypertensive patients scored lower than normotensive controls in cognitive tests and significantly worse in cumulative recall (P < 0.05) and paired words association (P < 0.01). When compared with normotensive subjects, untreated hypertensive patients also scored significantly higher on the depression with anxiety subscale in HSC (P < 0.05). No significant influence of hypertension was found in any other examined aspect of cognition and mood. In most cases captopril improved and enalapril reversed the adverse memory effects of hypertension. High arterial blood pressure is significantly associated with an impairment of cognition and the occurrence of depression with anxiety in humans. Enalapril and, to a lesser extent, captopril reversed these deficits.
2024-05-23T01:27:13.970301
https://example.com/article/5806
Out Of Stock OR Equip your kids with shoes that feel as free as they are. The Brooks PureFlow Running Shoe for boys is awesomely light and bendy with enough cushion for total comfort and a reinforced toe to increase durability. A miniature version of the grown-up PureFlow, your little person will love the natural fit and squishy bounce of every step, jump, and cartwheel. BioMoGo – Brooks took the long-lasting cushioning of their MoGo midsole and made it more environmentally friendly. A non-toxic, natural additive in the BioMoGo compound encourages anaerobic microbes to munch away 50 times faster once it hits the landfill. Brooks DNA – Brooks DNA is a groundbreaking cushioning material that provides a customized ride for runners of all sizes and speeds Working with BioMoGo, Brooks DNA responds to your every step, Dispersing impact and providing ideal comfort and protection as the pace changes. IDEAL Heel - Brooks’ signature inverted heel promotes a natural foot strike by landing in a more forward position on the foot. This aligns the runner’s center of gravity and encourages optimal energy return. Toe Flex - A toe box split allows the big toe to function independently and engage the runner’s natural balance. Flexible materials empower a more efficient push off during the propulsion phase. Nav Band - This flexible band wraps over the instep to comfortably secure the foot in place. The dynamic stretch provides just the right amount of reinforcement and conforms to individual foot shapes and sizes. Anatomical Last - Designed from an anatomical form, the shoe’s shape contours the foot for a glove-like feel and provides support for every part of the foot. Weight: 8.3oz.
2024-06-26T01:27:13.970301
https://example.com/article/5427
# -*- coding: utf-8 -*- # Copyright (C) 2011 Chris Dekter # # This program is free software: you can redistribute it and/or modify # it under the terms of the GNU General Public License as published by # the Free Software Foundation, either version 3 of the License, or # (at your option) any later version. # # This program is distributed in the hope that it will be useful, # but WITHOUT ANY WARRANTY; without even the implied warranty of # MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the # GNU General Public License for more details. # # You should have received a copy of the GNU General Public License # along with this program. If not, see <http://www.gnu.org/licenses/>. import logging, sys from PyKDE4.kdeui import KMenu, KAction, KActionMenu, KApplication #from PyKDE4.kdecore import ki18n, KAboutData, KCmdLineArgs from PyQt4.QtGui import QCursor from PyQt4.QtCore import SIGNAL, Qt from autokey.configmanager import * _logger = logging.getLogger("phrase-menu") class MenuBase: def __init__(self, service, folders=[], items=[], onDesktop=True, title=None): self.service = service self.__i = 1 self._onDesktop = onDesktop if title is not None: self.addTitle(title) if ConfigManager.SETTINGS[SORT_BY_USAGE_COUNT]: _logger.debug("Sorting phrase menu by usage count") folders.sort(key=lambda obj: obj.usageCount, reverse=True) items.sort(key=lambda obj: obj.usageCount, reverse=True) else: _logger.debug("Sorting phrase menu by item name/title") folders.sort(key=lambda obj: str(obj)) items.sort(key=lambda obj: str(obj)) if len(folders) == 1 and len(items) == 0 and onDesktop: # Only one folder - create menu with just its folders and items self.addTitle(folders[0].title) for folder in folders[0].folders: subMenuItem = SubMenu(self._getMnemonic(folder.title), self, service, folder.folders, folder.items, False) self.addAction(subMenuItem) if len(folders[0].folders) > 0: self.addSeparator() self._addItemsToSelf(folders[0].items, onDesktop) else: # Create folder section for folder in folders: subMenuItem = SubMenu(self._getMnemonic(folder.title), self, service, folder.folders, folder.items, False) self.addAction(subMenuItem) if len(folders) > 0: self.addSeparator() self._addItemsToSelf(items, onDesktop) def _addItem(self, description, item): action = ItemAction(self, self._getMnemonic(description), item, self.service.item_selected) self.addAction(action) def _addItemsToSelf(self, items, onDesktop): # Create item (script/phrase) section if ConfigManager.SETTINGS[SORT_BY_USAGE_COUNT]: items.sort(key=lambda obj: obj.usageCount, reverse=True) else: items.sort(key=lambda obj: str(obj)) for item in items: if onDesktop: self._addItem(item.get_description(self.service.lastStackState), item) else: self._addItem(item.description, item) def _getMnemonic(self, desc): #if 1 < 10 and '&' not in desc and self._onDesktop: # ret = "&%d - %s" % (self.__i, desc) # self.__i += 1 # return ret #else: # FIXME - menu does not get keyboard focus, so mnemonic is useless return desc class PopupMenu(KMenu, MenuBase): def __init__(self, service, folders=[], items=[], onDesktop=True, title=None): KMenu.__init__(self) MenuBase.__init__(self, service, folders, items, onDesktop, title) #if not ConfigManager.SETTINGS[MENU_TAKES_FOCUS]: self.setFocusPolicy(Qt.StrongFocus) # TODO - this doesn't always work - do something about this class SubMenu(KActionMenu, MenuBase): def __init__(self, title, parent, service, folders=[], items=[], onDesktop=True): KActionMenu.__init__(self, title, parent) MenuBase.__init__(self, service, folders, items, onDesktop) class ItemAction(KAction): def __init__(self, parent, description, item, target): KAction.__init__(self, description, parent) self.item = item self.connect(self, SIGNAL("triggered()"), self.on_triggered) self.connect(self, SIGNAL("actionSig"), target) def on_triggered(self): self.emit(SIGNAL("actionSig"), self.item) # ---- TODO Testing stuff - remove later class MockFolder: def __init__(self, title): self.title = title self.items = [] self.folders = [] def add_item(self, item): self.items.append(item) class MockPhrase: def __init__(self, description): self.description = description def get_description(self, buffer): return self.description class MockExpansionService: lastStackState = "" def __init__(self, app): self.app = app def item_selected(self, item): print item.description self.app.quit() if __name__ == "__main__": myFolder = MockFolder("Some phrases") myFolder.add_item(MockPhrase("phrase 1")) myFolder.add_item(MockPhrase("phrase 2")) myFolder.add_item(MockPhrase("phrase 3")) myPhrases = [] myPhrases.append(MockPhrase("phrase 1")) myPhrases.append(MockPhrase("phrase 2")) myPhrases.append(MockPhrase("phrase 3")) appName = "KApplication" catalog = "" programName = ki18n ("KApplication") version = "1.0" description = ki18n ("KApplication/KMainWindow/KAboutData example") license = KAboutData.License_GPL copyright = ki18n ("(c) 2007 Jim Bublitz") text = ki18n ("none") homePage = "www.riverbankcomputing.com" bugEmail = "jbublitz@nwinternet.com" aboutData = KAboutData (appName, catalog, programName, version, description, license, copyright, text, homePage, bugEmail) KCmdLineArgs.init (sys.argv, aboutData) app = KApplication() menu = PopupMenu(MockExpansionService(app), [myFolder], myPhrases) #menu.show() time.sleep(3) menu.exec_(QCursor.pos()) print "shown" #app.exec_() #print "done" sys.exit()
2024-04-23T01:27:13.970301
https://example.com/article/9562
Tom Judd's Eyebrow Hat When used correctly, the ever-expressive eyebrows can be a window into the soul …or at least into the opinion being formulated deep within. Those who are unfortunate sufferers of facial paralysis might never command the effective power of displaying worry through the furrowing of one’s brow or the curious inquiry hinted at by raising just one side. Fortunately, Tom Judd, a recent graduate of the masters in Animation program at the Royal College of Art, has come up with a solution for the unfortunate few with little control over their facial expressions. His Eyebrow Hat has harnessed the evocative power of one’s double fuzzies into a remote controlled device, capable of showing just what you might be feeling at any given time provided you haven’t run out of batteries. When Mr. Judd isn’t busy helping those who can’t animate their own feelings, he’s busy putting together some kick ass cartoon work. His three and a half minute long masterpiece, Bruce, tells the tale of a boy who through the use of open source genetic programming, creates his very own pint-sized action hero . Sounds like something we’d like to have. Check it out here and be on the lookout for this rising illustrative talent.
2024-05-27T01:27:13.970301
https://example.com/article/9219
"In one volume this book seems to encompass all the plants native and exotic grown in Florida. No small feat! . . . No other reference work that I know of covers the field as comprehensively as this."--Edward Golden, horticutural consultant and past president, Sarasota Orchid Society From Florida to California and on to Hawaii, gardeners who want a current, thorough, and user-friendly guide to the common indoor foliage and outdoor landscape plants for U.S. Department of Agriculture zones 8, 9, 10, and 11 will welcome this fully illustrated book. With precise line drawings for nearly 500 plant species, the work presents a description of cultivated ferns, cone-bearing plants, and flowering ornamental plants for warmer climates. It offers a description of the families, essential identifying features, and horticultural information for each plant, including origin, cold hardiness zones, propagation techniques, and soil, fertilizer, irrigation, and light requirements. The author also discusses identification features under clearly demarcated headings of growth habit, foliage, stem and bark, flower, and fruit. With a comprehensive glossary of terms commonly used in plant identification and a cross-referenced index of common and scientific names, readers will be able to find information with minimal effort. This book is intended for use by backyard gardeners and will be especially handy for newcomers to warm temperate and subtropical areas who seek a reliable resource for plant selection and care. In addition, it will be indispensable to garden clubs, volunteer Master Gardeners, nursery professionals, extension agents, and landscape architects. It also can serve as a plant identification text for students of environmental horticulture, forestry, and other plant science-related fields. Bijan Dehgan is professor of environmental horticulture at the University of Florida. He is internationally recognized for his taxonomic and horticultural research and major publications on the endangered sago palms (cycads) and the physic nuts (Jatropha). No Sample Chapter Available "The single version of a two-volume set originally developed for University of Florida environmental horticulture courses nearly 20 years ago. Its popularity stretches far beyond academia because of the number of species it addresses for USDA plant-hardiness Zones 8 to 11." -- Daytona Beach News-Journal --Daytona Beach News Journal "Comprehensive and user-friendly . . . uniquely organized to assist readers of various botanical backgrounds and interests to become familiar with plants of the region." -- Choice --Choice "Will be a great help to any gardener who is considering adding to or redoing his landscape." -- Gainesville Sun --Tampa Tribune "A manual of all the landscape plants adapted to growing in zones 8, 9, and 10, the three hardiness zones of Florida. . . . Now available to the public, it is highly recommended."-- Orlando Sentinel --Orlando Sentinel
2023-09-28T01:27:13.970301
https://example.com/article/5646
#!/usr/bin/env bash set -o errexit -o nounset -o pipefail -o xtrace edit_hosts() { lock_hosts sed --in-place=~ "$@" /etc/hosts } lock_hosts() { flock /var/lock/etc-hosts "$@" } action=$1 shift case "$action" in add) edit_hosts "$ a $*" ;; remove) edit_hosts "/\b${*//./\\.}\b/d" ;; restore) lock_hosts mv /etc/hosts~ /etc/hosts ;; *) echo "The action '$action' is not implemented." >&2 exit 1 ;; esac
2023-10-21T01:27:13.970301
https://example.com/article/5686
[Photosynthesis in three altitudinal populations of the Andean plant Espeletia schultzii (Compositae)]. Photosynthesis was compared in three altitudinal populations of Espeletia schultzii: 3,100, 3,550 and 4,200 masl. The measured parameters were Rubisco activity (EC 4.1.139), chlorophyll, soluble protein and soluble sugars contents, and specific leaf area (SLA). The 4,200 m population had a higher Rubisco activity (at 4 degrees C) followed by those at 3,550 m and 3,100 m. There were no significant differences between populations at 3,100 m and 3,550 m (ANOVA), but their activities were different from those of the 4,200 m population. Chlorophyll a content decreased slightly with elevation, while chlorophyll b was constant; therefore, the Ra/b ratio decreased with elevation, but not significantly. The leaf soluble sugars content increased along the altitudinal gradient. Leaf protein content did not differ. The SLA decreased with altitude. The increase in Rubisco activity might reflect higher enzyme activation and not higher enzyme protein. The increase in soluble sugars is probably associated to Rubisco activity. Three out of the five measured parameters revealed differences with altitude, suggesting a compromise between a higher metabolic activity and a smaller cellular volume.
2024-06-12T01:27:13.970301
https://example.com/article/1776
Antigen selectivity characteristic of polyclonal antibodies against omega-conotoxin GVIA and N-type voltage-dependent calcium channels. The antibodies against omega-conotoxin GVIA (omega-CTX GVIA; N-type voltage-dependent calcium channel [VDCC] blocker) and B1Nt (N-terminal segment [residues 1-13] of BI alpha1 subunits of VDCCs) were prepared, and the selectivity for each antigen omega-CTX GVIA and B1Nt was investigated. For the antigen selectivity of anti-omega-CTX GVIA antibody against omega-CTX GVIA, ELISA, and immunoprecipitation were used. The reactions for ELISA and immunoprecipitation were observed except when antibody IgG purified by Protein A-Sepharose CL-4B from nonimmunized serum (purified NI-Ab) was used. The specific reactions were inhibited by 10 nM omega-CTX GVIA, but not by omega-CTX SVIB (N-type VDCC blocker), omega-CTX MVIIC (N- and P-type VDCC blocker), or omega-Aga IVA (P-type VDCC blocker). For the antigen selectivity of the anti-B1Nt antibody, analyses by ELISA, immunoprecipitation, and Western blotting were conducted. The reactions were observed except when NI-Ab was used. The ELISA and immunoprecipitation reactions were inhibited by the antigen peptide B1Nt, and the IC50 values were about 1.2 x 10(-8) and 1.3 x 10(-8) M, respectively. The bands of 210 and 190 kD by Western blotting of crude membranes from chick brain were also inhibited by 1 microM B1Nt. These results suggest that the antibodies prepared against omega-CTX GVIA and B1Nt in this work have high selectivity for their antigen. Therefore we assume that the antibodies against omega-CTX GVIA and B1Nt are useful tools for the analyses of the function and distribution of N-type VDCCs. The anti omega-CTX GVIA antibody must also be useful for the radioimmunoassay of omega-CTX GVIA.
2023-11-03T01:27:13.970301
https://example.com/article/4963
Our channels E3 2015: Shenmue III Kickstarter Campaign Launched Yu Suzuki has launched a Kickstarter campaign for Shenmue III. Yes, you heard that right. Shenmue III. You can access the campaign here, and check out a trailer above. We’ll update the post when more details become available.
2024-03-08T01:27:13.970301
https://example.com/article/9175
July 13, 2016 Wednesday Nibbles - Summer Vacation Edition The weeklong summer vacation is over. It's actually been over since Sunday afternoon, but you know, needed a few days of recovery before sharing something on the blog. Our trip from Mt. Rushmore to Yellowstone to Grand Teton/Jackson to Salt Lake City was not a fishing trip, so if you read this blog purely for the fishing expertise (ha!), feel free to click off now. However here's a quick week in review, via captioned photos... Day 1 & 2: Rapid City, SD / Crazy Horse / Mount Rushmore Wheels down in Rapid City, and there was quite a storm on the horizon to greet us! The hotel had a small lake out front, this was the only fishing I'd do on the trip.Bass put up a good fight though. The bus. Home away from home for a week Didn't know what to expect from Crazy Horse. They've evidently been blasting and carving since the late 1940s. It's quite the sight, much, much bigger than Mt. Rushmore. Maybe I can get back in a few decades to check the progress. Down the road about 20 minutes from Crazy Horse, there's a spot on the highway where you can stop and see Washington's profile peer from the side of the mountain with no other presidents (or sign of the park) in sight. It's cool, but kind of eerie at the same time. I was pleasantly surprised by Mt. Rushmore. Figured you just went and stared at the side of a mountain. Instead, there's a whole complex with walking trails, museums, etc... Could have spent the whole day there if we had the time. Day 3: Repositioning to Cody, WY Day 3 was pretty much a waste, we were in the bus pretty much all day as we moved from Rapid City, SD to Cody, WY. Did catch this "wild" pic of the girls in the Wyoming visitor's center. We drove by Devil's Tower... Stopped for lunch in Sheridan, WY... Drove through the Bighorn mountains... Before ending up in Cody for the night - home of Buffalo Bill, and never-ending cowboy-kitsch Day 4 & 5: Yellowstone The first day was kind of rainy, but we did see a lot of wildlife. Bison, bear, coyote, elk, & deer And some really cool old park buses Elk can walk on the travertine But we stuck to the boardwalk to take selfies in front of it The following day's weather was much better.All of the thermal features were amazing As were the falls in the canyon The photo doesn't do this one justice! Wouldn't want to swim in that hot tub Gotta take a picture of Old Faithful, right? More pools Standing on top of the hill looking down at the river surrounded by geysers was breathtaking. Two days were not even close to being enough to sample Yellowstone's wonders Day 6: Grand Teton / Jackson, WY On Friday we headed South from Yellowstone down Rockefeller Parkway through Grand Teton National Park We stopped several times along the way - there were so many scenic views I mean come on, is this for real? The highlight was a lakeside picnic lunch I'm not a holy man, but the view out of this roadside church window was amazing Once we reached Jackson, we took a ski lift up to the top of the mountain overlooking town And then descended to take in the Cowboy meets Hippie vibe Watched a street performance (don't worry, the good guys won) And washed the day down right Day 7: Repositioning to Salt Lake City The last real day took us to Salt Lake City via Logan Canyon Lilly approved of the scenery I approved of lunch. If you're ever in Logan, UT, Angie's is amazing. Our trip ended with a tour of Temple Square With beautiful architecture But no Tabernacle Choir, (they were on the road). And after that, a night of sleep, then home to Florida the next morning. Our vacation went so quickly, but it was certainly a memorable one. I feel like I shared so many pictures above, but I took TONS more. So many neat things to see and experience. As for the bus tour aspect, I'm not certain I'd do a bus tour again, as I felt that while we saw a lot of incredible things, we really didn't get to spend enough time at any one particular place to really enjoy them. We kind of figured that was going to be the case heading in; it was sort of like when you go on a cruise ship and visit several ports of call, but spend a lot of time "at sea." It was more a quick sampling of some magical Western sights, many of which I know we'll head back to in the not too distant future. K.C. is already scoping out a return to Jackson & the Tetons, and I just saw so much beautiful water out the bus window that was screaming to be fished! 15 comments: Great trip. The wife and i were in Jackson Hole over the weekend. Checked out Jenny Lake and the Tetons then drove further south in Bedford visiting family. Introduced a family member to Tenkara and now he is buying a setup. He caught his first Snake River cutt on it. We were fishing a small creek named Willow. Fished the Salt also. I caught several more on Monday. Too bad the Mormon Tabernacle choir wasn't there for you. They often put on a mini-show at their Thursday evening practices. Great pics of the west.... you even caught the main flexure of the Shell Canyon monocline in your pic of the Bighorn Mtns. Didn't expect them to be there, so at least I didn't leave disappointed. The Bighorns were beautiful. I had to Google what you were talking about, so clearly the inclusion in my photo was purely accidental. :) Michael, thanks for sharing all of your photos and thoughts. What a great trip! You know what, I have lived out here my whole life other than my time in the service during Viet Nam era. Many of us take it for granted any more........... What a shame! Really nice to see and read the view from some folks who were here for the first time. The West is beautiful Mel. I've been to many of the states before, but for business, not pleasure or recreation, so no time to really take things in from a tourist perspective. I love the states in and around the Rocky Mountains, everything is just so BIG, on such a grand scale.
2024-05-27T01:27:13.970301
https://example.com/article/5106
[Ultrastructural changes in the body wall and gut of Clonorchis sinensis in rats after albendazole treatment]. The effect of albendazole on the body wall and gut of Clornorchis sinensis was studied with transmission and scanning electron microscopes after albendazole administration to rats infected with Chonorchis sinensis at a single dose of 150 mg/kg. The results showed that swelling and adhesion of the projections of the tegument and gut microvilli occurred 1h after medication. Necrosis and disruption of the projections and the gut microvilli were seen at the 24th h. By the 72nd h, detachment of the partial projections were seen. The dynamic process of the damages observed on the tegument was identical with that of the gut microvilli (Figs. 1-10).
2023-11-09T01:27:13.970301
https://example.com/article/2500
An absurd thing is happening in the halls of Congress. Major ISPs such as Comcast, AT&T, and Verizon are banging on the doors of legislators to stop the deployment of DNS over HTTPS (DoH), a technology that will give users one of the biggest upgrades to their Internet privacy and security since the proliferation of HTTPS. This is because DoH ensures that when you look up a website, your query to the DNS system is secure through encryption and can’t be tracked, spoofed, or blocked. But despite these benefits, ISPs have written dozens of congressional leaders about their concerns, and are handing out misleading materials invoking Google as the boogeyman. EFF, Consumer Reports, and National Consumers League wrote this letter in response. The reason the ISPs are fighting so hard is that DoH might undo their multi-million dollar political effort to take away user privacy. DoH isn’t a Google technology—it’s a standard, like HTTPS. They know that. But what is frustrating is barely two years ago, these very same lobbyists, and these very same corporations, were meeting with congressional offices and asking them to undo federal privacy rules that protect some of the same data that encrypted DNS allows users to hide. ISPs Want to Protect an Illegitimate Market of Privacy Invasive Practices to “Compete” with Google’s Privacy Invasive Practices, Congress Should Abolish Both Congress shouldn’t take its cues from these players on user privacy. The last time they did, Congress voted to take away users’ rights. As long as DNS traffic remains exposed, ISPs can exploit our data the same way that Facebook and Google do. That’s the subtext of this ISP effort. Comcast and its rivals are articulating a race to the bottom. ISPs will compete with Internet giants on who can invade user privacy more, then sell that to advertisers. The major ISPs have also pointed out that centralization of DNS may not be great for user privacy in the long run. That’s true, but that would not be an issue if everyone adopted DoH across the board. Meaning, the solution isn’t to just deny anyone a needed privacy upgrade. The solution is to create laws that abolish the corporate surveillance model that exists today for both Google and Comcast. But that’s not what the ISPs want Congress to do, because they’re ultimately on the same side as Google and other big Internet companies—they don’t want us to have effective privacy laws to handle these issues. Congress should ignore the bad advice it’s getting from both the major ISPs and Big Tech on consumer privacy, and instead listen to the consumer and privacy groups. EFF and consumer groups have been pleading with Congress to pass a real privacy law, which would give individuals a right to sue corporations that violate their privacy, mandate opt-in consent for use of personal information, and allowing the states to take privacy law further, should the need arise. But many in Congress are still just listening to big companies, even holding Congressional hearings that only invite industry and no privacy groups to “learn” what to do next. In fact the only reason we don’t have a strong federal privacy law because corporations like Comcast and Google want Congress to simply delete state laws like California’s CCPA and Illinois’s Biometric Protection Act while offering virtually nothing to users. DNS over HTTPS Technology Advances More than Just Privacy, It Advances Human Rights and Internet Freedom Missing from the debate is the impact DoH has on Internet freedom and human rights in authoritarian regimes where the government runs the broadband access network. State-run ISPs in Venezuela, China, and Iran have relied on insecure DNS traffic to censor content and target activists. Many of the tools governments like China and Iran rely on in order to censor content relies on exposed DNS traffic that DoH would eliminate. In other words, widespread adoption of encrypted DNS will shrink the censorship toolbox of authoritarian regimes across the world. In other words the old tools of censorship will be bypassed if DoH is systematically adopted globally. So while the debate about DoH is centered on data privacy and advertising models domestically, U.S. policymakers should recognize the big picture being that DoH can further American efforts to promote Internet freedom around the world. They should in fact be encouraging Google and the ISPs to offer encrypted DNS services and for them to quickly adopt it, rather than listen to ISP’s pleas to stop it outright. For ISPs to retain the power to censor the Internet, DNS needs to remain leaky and exploitable. That's where opposition to DoH is coming from. And the oposition to DoH today isn't much different from early opposition to the adoption of HTTP. EFF believes this is the wrong vision for the Internet. We've believed, since our founding, that user empowerment should be the center focus. Let's try to advance the human right of privacy on all fronts. Establishing encrypted DNS can greatly advance this mission - fighting against DoH is just working on behalf of the censors.
2023-12-21T01:27:13.970301
https://example.com/article/4894
# -*- coding: utf-8 -*- """ Created on Sun Feb 2 11:16:28 2020 @author: utkuk """ ''' UCI Machine Learning Library Bu kod içerisinde kullandığımız veri seti "UCI Machine Learning" kütüphanesin- den alınmıştır. Kütüphanedeki diğer veri setleri için aşağıdaki linke bakabi - lirsiniz. http://archive.ics.uci.edu/ml/datasets.php ''' # Gerekli paketler import numpy as np import pandas as pd import os from sklearn.neural_network import MLPClassifier from sklearn.metrics import classification_report, confusion_matrix from sklearn.model_selection import KFold from sklearn.utils.random import sample_without_replacement # Klasor degisikligi os.chdir('/UygulamaDersleri/07YapaySinirAglariDerinOgrenme') # Veriyi dosyadan okuma veri_egitim = pd.read_csv('ann-train.data', sep = ' ', header = None) veri_test = pd.read_csv('ann-test.data', sep = ' ', header = None) # İndirdiğimiz veri boşluklarla ayrılmış bir veri. Her satır sonunda fazladan # boşluk olduğu için onları atmamız gerekiyor. Alttaki satırlar bu işlemi # gerçekleştiriyor. veri_egitim.drop(veri_egitim.columns[[22,23]], axis = 1, inplace = True) veri_test.drop(veri_test.columns[[22,23]], axis = 1, inplace = True) X_egitim = veri_egitim.iloc[:, range(21)] X_test = veri_test.iloc[:, range(21)] y_egitim = veri_egitim.iloc[:, 21] y_test = veri_test.iloc[:, 21] # Siniflara ait ornek sayilari print('1. sınıfa ait olan örnek sayısı:', sum(y_egitim == 1)) print('2. sınıfa ait olan örnek sayısı:', sum(y_egitim == 2)) print('3. sınıfa ait olan örnek sayısı:', sum(y_egitim == 3)) # Verimizde örneklerin ait olduğu sınıflarda bir dengesizlik mevcut. # Yapay sinir ağı (ysa) oluşturma, eğitme ve sonuçlarını ekrana yazdırma. ysa = MLPClassifier(hidden_layer_sizes = (5,), activation = 'tanh', solver = 'sgd', max_iter = 5000, random_state = 3) ysa.fit(X_egitim, y_egitim) print(ysa.score(X_test, y_test)) print(confusion_matrix(y_test, ysa.predict(X_test))) print(classification_report(y_test, ysa.predict(X_test))) # Gizli katmandaki düğüm sayısını bulmak için çapraz geçerlilik sınaması yapma parametreler = range(2, 11) cgs = KFold(n_splits = 10, shuffle = True, random_state = 4) parametre_performans = [] for c in parametreler: cgs_performans = [] for egitim_indis, dogrulama_indis in cgs.split(X_egitim, y_egitim): cgs_ysa = MLPClassifier(hidden_layer_sizes = (c, ), activation = 'tanh', solver = 'sgd', max_iter = 500, learning_rate_init = 0.01, random_state = 5) cgs_ysa.fit(X_egitim.iloc[egitim_indis, :], y_egitim.iloc[egitim_indis]) dogruluk = cgs_ysa.score(X_egitim.iloc[dogrulama_indis,:], y_egitim.iloc[dogrulama_indis]) cgs_performans.append(dogruluk) cgs_performans = np.array(cgs_performans) parametre_performans.append(cgs_performans.mean()) # En iyi performansı gösteren düğüm/nöron sayısını bulma en_iyi_noron_sayisi = parametreler[np.argmax(parametre_performans)] # En iyi performansı gösteren düğüm/nöron sayısı ile yeni bir YSA modeli # yaratma, eğitme ve performansını ekrana yazdırma. en_iyi_ysa = MLPClassifier(hidden_layer_sizes = en_iyi_noron_sayisi, activation = 'tanh', solver = 'sgd', max_iter = 500, learning_rate_init = 0.01, random_state = 5) en_iyi_ysa.fit(X_test, y_test) dogruluk_test = en_iyi_ysa.score(X_test, y_test) print('10 katlı CGS tahmin doğruluğu:', dogruluk_test) print(confusion_matrix(y_test, en_iyi_ysa.predict(X_test))) print(classification_report(y_test, en_iyi_ysa.predict(X_test))) ''' Sınıflar arasındaki dengesizliği gidermek için örnek sayısı çok olan sınıf - sayısı az olan sınıftaki örnek sayısı kadar örnek seçmek. Elimizdeki veriye göre konuşacak olursak, 1. sınıfa ait 93 tane örneğimiz var. 2. ve 3. sınıf- tan 93'er tane rastgele örnek seçeceğiz. Yaratacağımız modeli toplamda 279 tane örnekle eğiteceğiz ve test verimizi bu modelle tahmin edeceğiz. ''' # Sınıfların elimizdeki eğitim verisinde hangi satırlarda olduğunu kaydetme indisler_1 = np.where(y_egitim == 1) indisler_2 = np.where(y_egitim == 2) indisler_3 = np.where(y_egitim == 3) # Yukarıda belirlediğimiz satır sayıları arasından istenen sayıda (1. sınıfta # bulunan örnek sayısı kadar sayıda) örnek seçme ornekler2 = sample_without_replacement(n_population = sum(y_egitim == 2), n_samples = sum(y_egitim == 1)) ornekler3 = sample_without_replacement(n_population = sum(y_egitim == 3), n_samples = sum(y_egitim == 1)) # Yarattığımız alt kümelerden dengelenmiş (279 tane örnek içeren) # veri seti yaratma y_egitim_dengelenmis = y_egitim[indisler_1[0]] y_egitim_dengelenmis = np.append(y_egitim_dengelenmis, y_egitim[indisler_2[0][ornekler2]]) y_egitim_dengelenmis = np.append(y_egitim_dengelenmis, y_egitim[indisler_3[0][ornekler3]]) dengelenmis_indisler = np.append(np.array(indisler_1), np.array(indisler_2[0][ornekler2])) dengelenmis_indisler = np.append(dengelenmis_indisler, np.array(indisler_3[0][ornekler3])) X_egitim_dengelenmis = X_egitim.iloc[dengelenmis_indisler,:] #Dengelenmiş set için model yaratma, eğitme ve performansını ekrana yazdırma dengelenmis_ysa = MLPClassifier(hidden_layer_sizes = en_iyi_noron_sayisi, activation = 'tanh', solver = 'sgd', learning_rate_init = 0.01, max_iter = 500, random_state = 5) dengelenmis_ysa.fit(X_egitim_dengelenmis, y_egitim_dengelenmis) dengelenmis_dogruluk = dengelenmis_ysa.score(X_test, y_test) print('Dengelenmiş veri seti ile eğitilmiş modelin doğruluğu:', dengelenmis_dogruluk) print(confusion_matrix(y_test, dengelenmis_ysa.predict(X_test))) print(classification_report(y_test, dengelenmis_ysa.predict(X_test)))
2024-02-05T01:27:13.970301
https://example.com/article/7743
Westphalia Waltz The Westphalia Waltz is an historic Texas waltz by Cotton Collins, a fiddler with the Lone Star Playboys, named after the town of Westphalia, Texas. The Westphalia Waltz melody is derived from a well known Polish tune that goes by several names, among them "Pytala Sie Pani" and "Wszystkie Rybki." The waltz was later popularized by Hank Thompson on a 1955 Capitol Records recording. References Category:American songs Category:Year of song missing Category:1940s songs
2023-08-21T01:27:13.970301
https://example.com/article/4704
HE4 and CA125 levels in the preoperative assessment of endometrial cancer patients: a prospective multicenter study (ENDOMET). To evaluate whether human epididymis protein 4 (HE4) and CA125 correlate with known high-risk prognostic factors for endometrial cancer. Prospective multicenter study. Three Danish tertiary gynecological oncology centers. A total of 352 patients with endometrial cancer and atypical endometrial hyperplasia consecutively referred between 1 September 2009 and 1 January 2012. Preoperative blood samples were obtained from all patients. Biomarker levels were correlated with pathological characteristics of hysterectomy specimens. FIGO stage, depth of myometrial invasion, cervical involvement, lymph node metastases, and histological type and grade of tumor. We found that both HE4 and CA125 were significantly positively correlated with histological grade (HE4: p = 0.002 and CA125: p = 0.027), lymph node metastases (HE4: p = 0.013 and CA125: p < 0.0001), myometrial invasion (p < 0.0001) and cervical involvement (p < 0.0001). Furthermore, a significant increase was found with increasing FIGO stage for both markers (p < 0.0001). In a combined index including age, the diagnostic value increases. Area under the receiver operating characteristics curves were higher for the index compared with the markers individually for all our endpoints. The calculated plots for the combined index may assist gynecologists in predicting the risk of deep myometrial invasion, cervical involvement and lymph node metastases. The analyses emphasize that the combined markers should be used in the prediction of prognostic factors. This study confirmed that the markers are significantly elevated in patients with prognostic high-risk factors and may, therefore, be used as an additional tool in combination with imaging and clinical information when planning the treatment of endometrial cancer patients.
2023-11-03T01:27:13.970301
https://example.com/article/5424
Radiation losses and dark mode at light guiding by a linear chain of nanoparticles. A new general formula is presented for a collective extinction cross section of a dielectric or a metallic nanoparticle ensemble in terms of incident electric field work on currents excited inside particles. The formula is obtained by identical transformation of the well-known expression for the summing power of electromagnetic field energy losses caused by particle ensemble scattering and absorption. The derived formula is applied to the problem of radiation losses at electromagnetic excitation transfer along a straight chain of particles. Our general formula predicts a zero collective extinction cross section for an infinite straight chain of nonabsorbing dielectric particles providing that the projection of the wave vector of an incident electromagnetic wave on the chain axis does not coincide with its counterpart of the Bloch wave vector of propagating excitation. In another case of a finite chain of particles, with only the first particle of the chain irradiated by an incident narrow electromagnetic wave beam, the derived formula shows that only the irradiated particle directly contributes to the collective extinction cross section despite how large the total number of particles can be, which makes a direct summing contribution of all other particles to wave scattering as if they were unviewed (dark mode). Using a recently developed quasi-separable T-scattering operator approach that leads to the equation system for self-consistent currents excited inside particles by an incident electromagnetic wave field and restricting ourselves to the electric dipole single scattering and neighbor coupling approximation, we revealed a few gigahertz transparency band in the terahertz frequency range (orange color) in the spectra of a straight chain of closely spaced gold nanospheres of a certain radius and a length of a few millimeters. A resonant mechanism of filtering the dark mode from radiation losses established in this work allowed us to reveal a few-fold-more narrow passband in the spectra of a longer gold particle chain with the full length of a few centimeters.
2024-02-05T01:27:13.970301
https://example.com/article/5373
CEA serum levels in non-neoplastic disease. Several non-neoplastic conditions, i.e., acute and chronic inflammations, benign tumors, renal or hepatic insufficiency, are associated with elevated plasma levels of Carcinoembryonic Antigen (CEA). Usually, CEA elevation in these pathologies is less than 10 ng/ml. CEA values in non-malignant disease can be affected by many factors, which can be classified into five main categories: a) tissular, b) physiological, c) metabolic, d) circulating and e) methodological factors. Synthesis, expression and release are the most important tissular factors. Among the metabolic ones liver, biliary and renal functions play a primary role in the determination of CEA concentrations. In addition, other factors such as the presence of circulating CEA-like substances, autoantibodies and immunocomplexes or the characteristics of the assay method can influence the diagnostic value of the CEA test. All these factors must be carefully considered when the marker is used in clinical practice.
2024-01-31T01:27:13.970301
https://example.com/article/1848
Liberal documentary filmaker Michael Moore is encouraging Americans to take to the streets to protest the inauguration of President-elect Donald Trump. “Disrupt the Inauguration. The Majority have spoken – by nearly 2.7 million votes &counting! Silence is not an option,” Moore tweeted Wednesday morning to his three million Twitter followers. Disrupt the Inauguration. The Majority have spoken – by nearly 2.7 million votes &counting! Silence is not an option https://t.co/HSmP3pREvy — Michael Moore (@MMFlint) December 7, 2016 Moore’s tweet linked to a webpage for DisruptJ20, a social justice campaign calling for “a bold mobilization against the inauguration of Donald Trump on January 20, 2017.” “We call on all people of good conscience to join in disrupting the ceremonies,” the website reads. “If Trump is to be inaugurated at all, let it happen behind closed doors, showing the true face of the security state Trump will preside over. It must be made clear to the whole world that the vast majority of people in the United States do not support his presidency or consent to his rule.” The organization is planning protests on inauguration day in D.C., but insists that “If you can’t make it to Washington, DC on January 20, take to the streets wherever you are.” There’s also a worldwide call to action: “If you are living outside the US, you can take action at US embassies, borders, or other symbols of neocolonial power. Our allegiance is not to “making America great again,” but to all of humanity and the planet. #DisruptJ20” Moore sent the aforementioned tweet hours after his appearance at a CNN town hall where he called the President-elect a “malignant narcissist” to audible groans from the crowd. “It is the responsibility of this minority of Democrats in Congress to block, obstruct, disrupt, and do whatever they can to prevent the onslaught that is going to happen with Donald Trump, that the American people do not support,” Moore said Tuesday. Moore, a Clinton supporter and a committed left-wing activist, predicted Trump’s victory. Days after Trump defeated Hillary Clinton, Moore showed up at Trump Tower in New York City seeking a one-on-one meeting with the President-elect. He was turned away by Secret Service. Follow Jerome Hudson on Twitter @jeromeehudson
2023-09-19T01:27:13.970301
https://example.com/article/7924
49 Hot Pictures Of Glukoza Which Are Really A Sexy Slice From Heaven The hottest images and pictures of Glukoza are truly epic. While we are talking about Glukoza beauty, skills, and professional life, we want to now take you on a ride through a Glukoza bikini photo gallery. This curated image gallery will showcase some of the sexiest Glukoza bikini pictures that will make you fall in love with Glukoza. So sit back and enjoy a thrill-ride of Glukoza big booty pictures. These Glukoza big butt pictures are sure to leave you mesmerized and awestruck. In this section, enjoy our galleria of Glukoza near-nude pictures as well. Born as Natalya Ilinichna Ionova on June 7, 1986 in Syzran, Kuybyshevskaya Oblast, Russian SFSR, Soviet Union, she is a Russian singer. Her mother and father are both computer programmers and her older sister is a pastry chef. She was interested in ballet and chess as a child. She also used to do some acting and featured in the movies Triumph and War Of The Princesses, and also some episodes of Yeralash. At present, she is interested in aviation, her two Dobermans, and her yellow Mini Cooper which she loves to drive. She names Madonna, Moby, Mummy Troll and Agatha Kristi as her favorite musical artists. Glukoza’s music career started in 2002 when the record producer Maxim Fadeev discovered her. They jointly recorded her first album “Glukoza Nostra” and released her first music video “Nenavizhu” (I Hate in English), which was completely computer animated. Her singles were not much popular until 2003, when Glukoza released “Nevesta” which was again supported by a computer animated video. “Nevesta” shot Glukoza to the top of the Russian music charts. Her musical success has brought to her numerous accolades such as the MTV-EMA award for “Best Russian Act,” the Muz-TV award for “Breakthrough of the Year,” and her animated character was named “Character of Year” by the Russian internet search engine “Rambler.” Since 2013, Glukoza has given more than 500 concerts in the Far East, Siberia, the Urals, the Volga Region, the Central Russia, Belarus, Ukraine, Central Asia, the Caucasus, London, USA and Kazakhstan. She kept performing at small private concerts all over Russia until January 2007, when she announced that she was going to take a pregnancy break. After the pregnancy break, she released another single called “Dengi” (Money in English). During the “New Wave” festival, she sang a duet with Maxim Fadeev “Sicily.” Her song “Schweine” was featured in a big way in the video game Grand Theft Auto IV on the game’s Eastern European radio station Vladivostok FM. Loading... In 2011, Glukoza competed on the Russian version of the television show Fort Boyard. She married Aleksandr Chistyakov on June 17, 2006. They have two daughters: Lidia Chistyakova (born on May 10, 2007) and Vera Chistyakova (born on September 8, 2011). They were both born in Spain and she presently lives in Moscow, Russia with her family. These sexy Glukoza bikini photos will make you wonder how someone so beautiful could exist. Yes, Glukoza is a very sexy woman and Glukoza’s bra and breast size prove that Glukoza can carry off any dress in style. So, we have also gathered a few Glukoza bikini and swimsuit featuring Glukoza’s face and body pictures as well. Apart from the mind-blowing images that will show you Glukoza Red carpet images, photos taken of Glukoza bikini images at the beach and those from Glukoza promotional and magazine shoots, we will also show you a few of Glukoza’s cutest pictures, hi-res wallpapers, high-quality background, and animated GIFs. The hottest images and pictures of Glukoza are truly epic. While we are talking about Glukoza beauty, skills, and professional life, we want to now take you on a ride through a Glukoza bikini photo gallery. This curated image gallery will showcase some of the sexiest Glukoza bikini pictures that will make you fall in love with Glukoza. So sit back and enjoy a thrill-ride of Glukoza big booty pictures. These Glukoza big butt pictures are sure to leave you mesmerized and awestruck. In this section, enjoy our galleria of Glukoza near-nude pictures as well.
2024-05-02T01:27:13.970301
https://example.com/article/2890
Libyan Ambassador to the United Nations The permanent representative of the Libyan state to the United Nations is the leader of the Libyan delegation to the United Nations, and in charge of the Libyan Mission to the United Nations. Libyan representatives to the UN hold the personal rank of ambassador. The Permanent Representative, currently Elmahdi S. Elmajerbi, is charged with representing the Libyan government in the United Nations and during almost all plenary meetings of the General Assembly, except in the rare situation in which a senior personnel of the Libyan government (such as the Libyan Foreign Secretary or the Libyan Head of State) is present. Elmahdi S. Elmajerbi, acts as Chargé d'affaires under the command of the Presidential Council of Libya, led by Fayez al-Sarraj. List of Ambassadors The following is a chronological list of those who have held the office: References Category:Lists of ambassadors of Libya
2024-06-25T01:27:13.970301
https://example.com/article/1716
All Jags podcast #48 The Jaguars had two significant positive changes last week. We look at the middle linebacker spot and the team’s move back to CBS 47 and FOX 30. Host Richard Miller gives a quick rundown of the 2017 regular season schedule and the two or three points you’ll hear during draft week. #AllJags
2023-10-26T01:27:13.970301
https://example.com/article/5867
Quality Accounts A Quality Account is a report about the quality of services offered by an NHS healthcare provider. The Quality Account documents available here are for non-NHS organisations that don't have an editable profile on the NHS website.
2024-04-25T01:27:13.970301
https://example.com/article/2771
1. Field of the Invention The present invention relates to a semiconductor apparatus, and in particular to a semiconductor apparatus including a protection circuit for protecting the semiconductor device against electrostatic discharge. 2. Description of the Related Art FIG. 19 is a circuit diagram for a general monolithic semiconductor integrated circuit 50 in which the potential of a substrate power supply is set to be equal to the potential of a ground power supply. The monolithic semiconductor integrated circuit 50 includes a protection circuit 60 for protecting the integrated circuit 50. Hereinafter, such a protection circuit for protecting the semiconductor device such as the integrated circuit 50 against electrostatic discharge will simply be referred to as the "protection circuit". The protection circuit 60, which is described in Terry V. Hulett, "On Chip Protection of High Density NMOS Devices" published in EOS/ESD Symposium, 1981, has been widely used as a typical protection device against electrostatic discharge used in a MOS device until the present time. The protection circuit 60 includes a resistance 13 between an input terminal 11 and an internal circuit 12. Point A between the resistance 13 and the internal circuit 12 is connected to the ground power supply through a MOS transistor 14. The resistance 13 is provided for restricting the amount of an electrostatic current. The MOS transistor 14 is an enhancement n-channel transistor for sending the electrostatic current to the ground power supply, and has a drain connected to point A and a source and a gate both connected to the ground power supply. When a high electrostatic voltage is applied to the input terminal 11, the high voltage is applied to the MOS transistor 14 through the resistance 13. When being supplied with a high voltage, the MOS transistor 14 acts as a bipolar transistor, and is conductive with a low resistance due to a punch-through phenomenon. As a result, the electrostatic current flows to the ground power supply through the resistance 13 and the MOS transistor 14, thereby preventing a high voltage from being stored at point A. Thus, breakdown of the internal circuit 12 by electrostatic discharge is prevented. FIG. 20 is a cross sectional view of the protection circuit 60 formed in a p-type semiconductor substrate 15. The p-type semiconductor substrate 15 is connected to the ground power supply through a p-type diffusion layer 16 and a wiring 17. The resistance 13 includes an n-type diffusion layer 18 formed in the p-type semiconductor substrate 15. The n-type diffusion layer 18 is connected to the input terminal 11 through a wiring 19 at one end thereof and to the wiring 20 at the other end thereof. Point A, which is connected to the wiring 20, is connected to the internal circuit 12 (not shown). The MOS transistor 14 includes n-type diffusion layers 21 and 22 formed in the p-type semiconductor substrate 15 and a gate electrode 23 provided above a region between the n-type diffusion layers 21 and 22. The n-type diffusion layer 21 is connected to the wiring 20, and the n-type diffusion layer 22 is connected to the ground power supply through the wiring 17. The gate electrode 23 is also connected to the ground power supply. The wirings 17, 19 and 20 are formed on the p-type semiconductor substrate 15 over the an insulating layer film 33. When a high electrostatic voltage is applied to the MOS transistor 14 from the input terminal 11 through the resistance 13, the MOS transistor 14 acts as an npn transistor 24 shown in FIG. 20. The n-type diffusion layers 21 and 22, which respectively act as a collector and an emitter of the npn transistor 24, are conductive to each other with a low resistance due to a punch-through phenomenon. Accordingly, the electrostatic current flows from the input terminal 11 to the ground power supply through the wiring 19, the n-type diffusion layer 18 (namely, the resistance 13), the wiring 20, the n-type diffusion layers 21 and 22, and the wiring 17. The n-type diffusion layers 21 and 22 are electrically connected with each other when the level of the applied electrostatic voltage exceeds the breakdown voltage of the MOS transistor 14. Usually, the breakdown voltage is lower than a breakdown voltage of a parasitic diode 25 formed by the pn junction of the p-type semiconductor substrate 15 and the n-type diffusion layer 18. Therefore, the electrostatic current in the MOS transistor 14 flows out to the ground power supply due to a punch-through phenomenon before the parasitic diode 25 breaks down. When an excessively high electrostatic voltage is applied, the voltage drop in the resistance 13 is increased. Accordingly, the level of the voltage applied to a connection area between the n-type diffusion layer 18 and the wiring 19 possible exceeds the breakdown voltage of the parasitic diode 25. In such a case, the electrostatic current flows in a reverse direction in the parasitic diode 25 to the p-type semiconductor substrate 15 and further to the ground power supply through a p-type diffusion layer 16. Since the power dissipation caused by the electrostatic current is mostly generated in the parasitic diode 25, namely, the junction interface of the n-type diffusion layer 18 and the semiconductor substrate 15 is broken. In "One Chip Protection of High Density MOS Devices", it is proposed to form the resistance 13 of polysilicon in order to prevent such a breakdown of the interface. In Japanese Laid-Open Patent Publication No. 2-5478, it is proposed to provide another diffusion layer having an identical conductivity with and having a lower density than those of the n-type diffusion layer 18 in a region below the connection area of the n-type diffusion layer 18 and the wiring 19, in order to raise the breakdown voltage of the parasitic diode 25. The resistance 13 for restricting the amount of the electrostatic current may be eliminated by increasing the current capacitance of the npn transistor 24 to a sufficient level. In the MOS transistor 14, which functions as the npn transistor 24 for utilizing the punch-through phenomenon, the gate electrode 23 does not have any important function. Accordingly, the MOS transistor 14 may be replaced by an npn transistor 26 shown in FIGS. 21 and 22. FIG. 21 is a plan view and FIG. 22 is a cross sectional view of the npn transistor 26. The npn transistor 26 includes n-type diffusion layers 21 and 22 formed in the semiconductor substrate 15 and an isolation layer 27 formed of SiO.sub.2 between the n-type diffusion layers 21 and 22. Such an npn transistor is described in the U.S. Pat. No. 4,692,781. Similar structures and concepts are described in Japanese Laid-Open Patent Publication Nos. 59-51558, 60-235451, 60-235452 and 2-3957. FIG. 23 is a circuit diagram for another conventional protection circuit 61 used in an integrated circuit 51 in which the potential of a substrate power supply is set to be different from the potential of the ground power supply, such as a DRAM (dynamic random access memory). FIG. 24 is a cross sectional view of the protection circuit 61. As is shown in FIG. 23, the protection circuit 61 includes a resistance 13 between an input terminal 11 and an internal circuit 12. Point A between the resistance 13 and the internal circuit 12 is connected to a ground power supply through a MOS transistor 14. The internal circuit 12 is supplied with a power supply voltage V.sub.CC and a substrate power supply voltage V.sub.BB as well as a ground power supply voltage GND. The power supply voltage V.sub.CC is higher than the ground power supply voltage GND; and the substrate power supply voltage V.sub.BB is lower than the ground power supply voltage GND. As is shown in FIG. 24, a p-type semiconductor substrate 15 is not supplied with the ground power supply voltage GND, but is supplied with the substrate power supply voltage V.sub.BB through a p-type diffusion layer 16. Parasitic diodes 25, 29, 30 and 31 are respectively formed between the p-type semiconductor substrate 15 and an n-type diffusion layer 18, between the p-type semiconductor substrate 15 and an n-type diffusion layer 21, between the p-type semiconductor substrate 15 and an n-type diffusion layer 22, and between the p-type semiconductor substrate 15 and an n-type diffusion layer 28. As an evaluation method of the resistance of such a semiconductor device against electrostatic discharge, the MIL standards (MIL-STD 883C 3015) are used as the most common international standards. According to the MIL standards, a capacitance of 100 pF is stored to have an appropriate voltage, and this voltage is applied to a terminal of the semiconductor device through a resistance of 1.5 k.OMEGA.. The voltage at which the semiconductor device is broken is measured. The evaluation is performed for the protection circuit 61 in the following manner. The ground power supply voltage GND and the power supply voltage V.sub.CC are used as the reference voltages. In the following explanation, a voltage higher than the ground power supply voltage GND will be referred to as the voltage in the "GND+ mode", a voltage lower than the ground power supply voltage GND as the voltage in the "GND- mode", a voltage higher than the power supply voltage V.sub.CC as the voltage in the "V.sub.CC + mode", and a voltage lower than the power supply voltage V.sub.CC as the voltage in the "V.sub.CC - mode".
2023-11-04T01:27:13.970301
https://example.com/article/2976
Q: Moving from 1.21 to 1.27 Infobox Broken http://wiki.armaina.com/index.php/Munin This is just one page but all of my pages that use the infobox on the right there do this on mediawiki 1.27 http://wiki.armaina.com/index.php/Template:Character This is the template being used for the infoboxes, this is not the wikipedia infobox, it does not use lua, it worked with 1.21 without any additional mods. (I do not want to install Lua, I shouldn't need it, so please don't suggest that) The function of the infobox is such that, if I don't fill in the value it doesn't display at all, and the images I use are supposed to revert to thumbnail size. All templates and CSS were copied from the original 1.21 build so all I can figure is that the Wiki code itself changed between versions I just don't know what part specifically changed or where to start looking. I'm just hoping someone maybe knows what's breaking this and what I can do to fix it. FIXED = Needed parser extension active to work. The parser is installed but is off by default as of mediawiki 1.24. Solution was to add this to localsettings.php. require_once "$IP/extensions/ParserFunctions/ParserFunctions.php"; $wgPFEnableStringFunctions = true; A: You are missing the ParserFunctions extension. Given that it couldn't have worked without that in 1.21 either, you probably made some mistake when copying the old configuration.
2024-07-15T01:27:13.970301
https://example.com/article/8314
716 S.E.2d 191 (2011) 289 Ga. 767 POLLMAN et al. v. SWAN et al. No. S10G1989. Supreme Court of Georgia. October 3, 2011. *192 Tony Center, Savannah, for appellant. Benjamin Mason Perkins, Patrick T. O'Connor, Oliver Manner LLP, Savannah, William A. Trotter, III, Trotter Jones LLP, Augusta, for appellee. BENHAM, Justice. In 2004, appellants Stephen and Linda Pollman purchased a Savannah townhome built by appellee Swan Construction in a condominium complex owned and developed by appellee Forest River. Appellee Louise Swan was a principal in both corporations. Appellee Neighborhood Realty listed the townhome for sale and marketed it through appellees Rebecca Holcombe and Marie Harbuck. Fourteen months after closing the real estate transaction, the Pollmans filed suit against all appellees for compensatory and punitive damages, asserting breach of contract, negligence, fraud and violations of the Georgia Racketeer Influenced and Corrupt Organizations Act (RICO). OCGA § 16-14-1 et seq.[1] In 2009, the trial court, inter alia, granted summary judgment to all defendants on the contract, negligence and RICO claims. The Court of Appeals affirmed the grants of summary judgment. *193 Pollman v. Swan, 305 Ga.App. 369 (1), (3) 699 S.E.2d 582 (2010). In affirming the grants of summary judgment, the Court of Appeals ruled that summary judgment on the RICO claim involving allegations of mail and wire fraud was appropriate because there was no proof of mail fraud in the absence of proof of reliance by the Pollmans. Pollman v. Swan, supra, 305 Ga.App. at 374(3). The Court of Appeals also affirmed the grant of summary judgment on the claims for breach of contract and negligence due to the purported failure of appellants to demonstrate evidence of damages, noting that there was "no evidence showing the cost of repairs or difference in market value at the time the injury or breach occurred...." Id. at 371(1), 699 S.E.2d 582. This Court granted the Pollmans's petition for a writ of certiorari to the Court of Appeals, expressing concern about the rationale employed to affirm the grant of summary judgment on the RICO claim alleging mail fraud as a predicate act and about the rationale concerning proof of damages used to affirm the grant of summary judgment on the breach of contract and negligence claims. 1. Both the trial court in granting summary judgment to appellees on the RICO claim based on mail and wire fraud and the Court of Appeals in affirming the grant of summary judgment relied on Markowitz v. Wieland, 243 Ga.App. 151(2)(b), 532 S.E.2d 705 (2000), and concluded that the Pollmans could not show mail and wire fraud because they could not prove their detrimental reliance on the misrepresentations purportedly made in furtherance of the scheme to defraud. See Pollman v. Swan, supra, 305 Ga.App. at 374, 699 S.E.2d 582. However, in Bridge v. Phoenix Bond & Indemnity Co., 553 U.S. 639, 128 S.Ct. 2131, 170 L.Ed.2d 1012 (2008), the United States Supreme Court construed the federal mail fraud statute in connection with the federal RICO Act (18 USC § 1961 et seq.) and held that the common-law requirement of justifiable reliance in fraud is not a requirement of the mail fraud statute. Appellees concede that the United States Supreme Court's decision in Phoenix Bond controls since "racketeering activity" is defined in the Georgia RICO Act as being, in pertinent part, "[a]ny conduct defined as `racketeering activity' under 18 USC Section 1961 (1) ... (B)...." OCGA § 16-14-3(9)(A)(xxix). Since the Court of Appeals erred in making reliance an element of mail fraud and in affirming the grant of summary judgment to appellees based on the failure of appellants to establish reliance, we reverse that portion of the judgment of the Court of Appeals affirming the grant of summary judgment to appellees on the RICO claim based on mail fraud and remand the case to the Court of Appeals for further proceedings consistent with this opinion.[2] 2. In granting summary judgment to appellees on the claims of breach of contract and negligence, the trial court ruled that appellants "failed to demonstrate they were damaged." The Court of Appeals affirmed, holding that appellants "point to no evidence showing the cost of repairs or difference in market value at the time the injury or breach occurred...." Pollman v. Swan, supra, 305 Ga.App. at 371, 699 S.E.2d 582. In granting the petition for a writ of certiorari, we asked the parties to address whether appellants were required to present evidence of a specific dollar amount of damages to avoid summary judgment in favor of appellees on the claims of breach of contract and negligence. We conclude that appellants were not required to present evidence of a specific dollar amount of damages to avoid summary judgment, but they were required to present evidence sufficient to serve as the basis for a factfinder to calculate the amount of damages due appellants should liability to appellants be established. Since appellants failed to do so, we affirm the Court of Appeals's holding in Division 1 of its opinion. As the Court of Appeals noted, [a]s a general rule, damages for defective construction, whether those damages are the result of a breach of contract or negligence of the contractor, are determined by *194 measuring the cost of repairing or restoring the damage, unless the cost of repair is disproportionate to the property's probable loss of value. [Cits.] Where demanded by the facts of a case, courts also have determined damages in such cases by measuring the diminution in value of the property after the injury occurred. [Cits.] Id. at 370-371, 699 S.E.2d 582, quoting John Thurmond & Assoc. v. Kennedy, 284 Ga. 469(1), 668 S.E.2d 666 (2008). Appellants listed the purported defects in the townhome's construction, but did not present any evidence of the cost of repairing the defects. Appellees presented evidence that appellants had purchased the townhome in 2004 for $160,900 only new and sold it in 2008 for $170,900, while appellant Stephen Pollman testified that the townhome was sold in 2008 for $102,000. However, the critical moment under a diminution-of-value analysis is at the time of injury which, in this case, is 2004, and there is no evidence in the record of the 2004 value of the home as a result of the purported defects. Once appellees pointed out the absence of evidence to support appellants's case, "the burden then shift[ed] to [appellants], who `must point to specific evidence giving rise to a triable issue.'" Pfeiffer v. Ga. Dept. of Transp., 275 Ga. 827(2), 573 S.E.2d 389 (2002), quoting Lau's Corp. v. Haskins, 261 Ga. 491, 405 S.E.2d 474 (1991). There being no evidence in the record that would provide the basis for a factfinder to calculate damages upon a finding of liability (see John Thurmond & Assoc. v. Kennedy, supra, 284 Ga. at 471, 668 S.E.2d 666), the Court of Appeals did not err when it held that summary judgment was authorized due to the failure of appellants to present evidence of damages. Judgment affirmed in part and reversed in part, and case remanded with direction. All the Justices concur. NOTES [1] The Pollmans also sued the attorney who had closed the sale in 2004, and settled with him in 2008. As part of the settlement, the attorney bought the townhome from the Pollmans. [2] We decline the invitation of appellees to engage in an analysis of the trial court's ruling under the "right for any reason" rule.
2023-09-21T01:27:13.970301
https://example.com/article/4077
Remy Bétous, Ph.D., research fellow in the lab of David Cortez, Ph.D., was recently named the Postdoc of the Year. Susan Wente presented the award during last week’s Postdoctoral Research and Shared Resources Symposium.View Reporter Article Bétous is a French citizen who joined the Cortez Lab as a post-doctoral fellow in 2009. Since then he has been studying the function of the SMARCAL1 enzyme. SMARCAL1 is a DNA repair protein that acts at damaged replication forks. Remy discovered that SMARCAL1 catalyzes fork regression and Holliday junction migration. These enzymatic activities are essential for maintaining genome integrity and the faithful completion of DNA replication. Mutations in SMARCAL1 that inactivate its fork regression activity cause the rare human disease Schimke Immunoosseous Dysplasia. Remy is supported by a DOD post-doctoral fellowship and his research has been published in two papers:
2024-01-17T01:27:13.970301
https://example.com/article/9532
A case of hepatocellular adenomatosis with a follow-up of 11 years. Hepatocellular adenomatosis is characterized by the presence of numerous (arbitrarily > 10) adenomas within an otherwise normal liver without a history of glycogen storage disease or steroid hormone therapy. Although the disease is rare, its importance lies in its tendency to produce symptoms such as abdominal pain and its potential for abdominal hemorrhages. However, the prognosis of hepatocellular adenomatosis remains uncertain. Here we describe the case of a 40-yr-old female with hepatocellular adenomatosis without evidence of serious complications, who was observed over a period of 11 yr.
2024-03-22T01:27:13.970301
https://example.com/article/4052
Quantitative research on the primary process: method and findings. Freud always defined the primary process metapsychologically, but he described the ways it shows up in dreams, parapraxes, jokes, and symptoms with enough observational detail to make it possible to create an objective, reliable scoring system to measure its manifestations in Rorschach responses, dreams, TAT stories, free associations, and other verbal texts. That system can identify signs of the thinker's efforts, adaptive or maladaptive, to control or defend against the emergence of primary process. A prerequisite and a consequence of the research that used this system was clarification and elaboration of the psychoanalytic theory of thinking. Results of empirical tests of several propositions derived from psychoanalytic theory are summarized. Predictions concerning the method's most useful index, of adaptive vs. maladaptive regression, have been repeatedly verified: People who score high on this index (who are able to produce well-controlled "primary products" in their Rorschach responses), as compared to those who score at the maladaptive pole (producing primary-process-filled responses with poor reality testing, anxiety, and pathological defensive efforts), are better able to tolerate sensory deprivation, are more able to enter special states of consciousness comfortably (drug-induced, hypnotic, etc.), and have higher achievements in artistic creativity, while schizophrenics tend to score at the extreme of maladaptive regression. Capacity for adaptive regression also predicts success in psychotherapy, and rises with the degree of improvement after both psychotherapy and drug treatment. Some predictive failures have been theoretically interesting: Kris's hypothesis about creativity and the controlled use of primary process holds for males but usually not for females. This body of work is presented as a refutation of charges, brought by such critics as Crews, that psychoanalysis cannot become a science.
2023-12-16T01:27:13.970301
https://example.com/article/3423
Background {#Sec1} ========== Sepsis and septic shock are common problems in intensive care units (ICUs). The corresponding mortality for sepsis and septic shock is 24.3--60.0% even in developed countries \[[@CR1]--[@CR5]\]. This mortality rate has decreased 1.3% annually since 2012 due to early diagnosis and appropriate empiric antibiotic therapy \[[@CR6], [@CR7]\]. However, the treatment of sepsis and septic shock remains expensive. The total hospital cost for patients with severe sepsis in the USA increased from \$15.4 billion in 2003 to \$24.3 billion in 2007 \[[@CR8]\]. Monitoring of the severity of sepsis or septic shock is a considerable challenge. Most decisions about patients with sepsis and septic shock are based on clinical and laboratory findings that have limited accuracy. Biomarkers such as cytokines have been suggested to be predictors of severity and mortality in patients with sepsis and septic shock in several studies \[[@CR7], [@CR9], [@CR10]\]. Acute Physiology and Chronic Health Evaluation (APACHE) II and Sequential Organ Failure Assessment (SOFA) scores have been used widely as predictors of severity in sepsis and septic shock \[[@CR11]\]. The cytokine interleukin (IL)-6 is essential in cell development, initiation of innate immunity and cell functions in adaptive immunity \[[@CR12]\]. In 2016, Klag T et al. studied 20 severe bacterial sepsis patients and showed that a rapid decline in IL-6 concentration after 24--48 h to or below baseline value was evidence of successful empiric antibiotic therapy, and was a survival predictor \[[@CR13]\]. Juan et al. in Argentina showed that the IL-6 level decreased after 72 h from admission in 48 sepsis or septic shock patients, and was a survival predictor. They showed that the IL-6 at admission was 161 ± 24 pg/ml in survivors and 121 ± 17 pg/ml at 72 h after admission (*p* = 0.04) \[[@CR14]\]. How changes in plasma levels of cytokines may be used to predict survival in patients with sepsis and septic shock for a Vietnamese population is not known. We determined to find out if reductions in the plasma concentrations of the cytokines tumor necrosis factor (TNF)-α, IL-6, and IL-10, and the rate of change of IL-6 at 24 h after ICU admission were survival predictors for patients with sepsis and septic shock at an ICU in Ho Chi Minh City, Vietnam. Methods {#Sec2} ======= We included patients admitted to the ICU at Cho Ray Hospital (Ho Chi Minh City, Vietnam) prospectively from October 2014 to October 2016. The ICU has 36 beds amongst a total of 2600 hospital beds. It cares for surgical, medical and post-operative patients. Patients who had undergone surgical procedures for severe head injury or who had open-heart surgery were excluded. There are 12 physicians and 36 nurses working in a shift system in the ICU. Patients were eligible for inclusion if they fulfilled the criteria for the diagnosis of sepsis and septic shock defined by the American College of Chest Physicians/Society of Critical Care Medicine Consensus Conference in 2001 \[[@CR15]\]. The doctors in charge explained to patients' relatives the research. If they agreed to be enrolled, they signed consent. Clinical data were collected using pre-designed forms. Patients were followed up for the duration of their ICU stay and their duration of hospital stay, and their survival rate was ascertained. Blood samples were collected at the time of ICU admission (T~0~) and at 24 h after ICU admission (T~24~). The 3 ml venous blood sample was taken and then centrifuged to separate the serum, which was stored at − 20 °C for further use. The concentrations of TNF-α, IL-6 and IL-10 were measured using an enzyme-linked immunosorbent assay. The Human IL-6 ELISA (Enzyme-Linked Immunosorbent Assay) kit was an in vitro enzyme-linked immunosorbent assay for the quantitative measurement of human IL-6 in plasma. The IL-6 enzyme-linked immunosorbent assay kit was purchased from Biochip Randox (County Antrim, United Kingdom). The blood cell analyzer was purchased from Randox company. The IL-6 rate of change at 24 h after ICU admission was measured using the following equation: IL-6 rate of change at 24 h from ICU admission = (IL-6 level at T~0~ − IL-6 level at T~24~)/IL-6 level at T~0~ × 100%. The therapy for sepsis and septic shock was according to the SSC 2012 guidelines. Empiric antibiotic therapy was used according to local Hospital Antibiotic Guidelines. Renal replacement therapy was indicated in sepsis or septic shock with acute kidney injury, but no cytokine blood purification was used. The Student's *t*-test and Mann--Whitney test were used to determine the significance of difference between survival and non-survival groups. The univariate logistic regression and multivariate regression analyses were done to identify which variables were associated with survival. We also divided the IL-6 reduction into quartiles. We adjusted for the variables with the *p*-value over 0.1 for multivariate logistic regression such as BUN, Creatinine, aPTT, pH, HCO~3~^−^, gender and age. Results {#Sec3} ======= One hundred and twenty-three patients were enrolled. Table [1](#Tab1){ref-type="table"} shows the characteristics of those patients who survived and those who died. Patients diagnosed with sepsis and septic shock admitted to the ICU who subsequently died had high APACHE II and SOFA scores. APACHE II score, SOFA score and the number of dysfunctional organs were significantly different between non-survival and survival groups (*p* \< 0.05). The duration of ICU stay for survivors was longer (median 18, the interquartile range (IQR) 13--31 days) than that of non-survivors (7, IQR 3--16). Also, 98/123 (79.7%) of cases had mechanical ventilation, and the median number of days of mechanical ventilation was 5 (IQR 3--12) days. The overall survival rate was 39.0%.Table 1Characteristics of patients upon ICU admission and the mortality rate (*n* = 123)VariableSurvival\ (*n* = 48)Non-survival\ (*n* = 75)*p*Age (years), (median, IQR)62 (46--75)54 (43--73)0.18\*\*Pre-ICU stay (days),(mean ± SD)3.8 ± 5.72.9 ± 4.90.11\*\*Duration of hospitalization (days)\ (mean ± SD)21.5 ± 13.812.7 ± 15.4\< 0.01\*Duration of ICU stay (day) (median, IQR)18 (13--31)7 (3--16)0.03\*\*APACHE II score (mean ± SD)18.0 ± 5.826.6 ± 7.9\< 0.01\*SOFA score (mean ± SD)9.1 ± 2.911.6 ± 3.6\< 0.01\*Mechanical Ventilation (n, %)32/48 (66.7)66/75 (88.0)\< 0.01\*Days of ventilation (median, IQR)5 (3--12)4(1--15)0.15\*\*Sites of infectionPrevalenceMortalityGastrointestinal tract56.1%66.7%Respiratory tract21.1%61.5%Urinary tract7.3%44.4%Others15.4%47.2%(\*) Student's *t*-test, (\*\*) Mann--Whitney test, IQR: interquartile range, SD: standard deviation Table [2](#Tab2){ref-type="table"} shows the laboratory parameters at ICU admission and IL-6 rate of change at 24 h after ICU admission. Levels of blood--urea--nitrogen (BUN) and activated partial thromboplastin time (aPTT) were higher for non-survivors (*p* = 0.02). Levels of arterial pH and bicarbonate among non-survivors were significantly lower than those of survivors (*p* = 0.04 and 0.01 respectively). The rate of change in IL-6 level at T~24~ was significantly different between survival and non-survival groups (p = 0.04).Table 2Laboratory parameters upon ICU admission and IL-6 rate of change after 24 h ICU admission (*n* = 123)Laboratory parametersSurvival (*n* = 48)\ Mean ± SDNon- survival (*n* = 75)\ Mean ± SDp (Student's *t*-test)Hemoglobin (g/dL)11.3 ± 2.311.0 ± 2.60.50White blood cells (K/mm^3^)20.6 ± 14.218.1 ± 13.20.34Platelets (K/mm^3^)164 ± 126193 ± 1340.24Blood glucose (mg/dL)129.3 ± 80.8138.6 ± 77.80.55Blood--urea--nitrogen (mg/dL)35.7 ± 21.645.9 ± 25.10.02Creatinine (mg/dL)1.97 ± 1.52.47 ± 1.60.08Bilirubin (mg/dL)2.40 ± 2.43.34 ± 4.60.17Prothrombin time (s)16.9 ± 5.418.6 ± 10.00.27aPTT (s)35.9 ± 9.442.9 ± 20.80.02pH7.33 ± 0.17.28 ± 0.100.04PaCO~2~ (mmHg)35.6 ± 7.833.5 ± 9.30.21PaO~2~ (mmHg)120.4 ± 79.3129.9 ± 99.60.58HCO^−^~3~ (mmol/L)19.0 ± 4.416.4 ± 5.80.01C-reactive protein (mg/L)123.3 ± 45.7122.4 ± 60.80.93Procalcitonin (ng/dL)42.5 ± 109.854.4 ± 91.40.16Lactate (mmol/L)4.2 ± 2.65.3 ± 4.30.59IL-6 rate of change0.8 ± 4.5−0.7 ± 0.30.04aPTT, activated partial thromboplastin time; PaCO~2~, arterial pressure of carbon dioxide; PaO~2~, arterial pressure of oxygen; HCO^−^~3~, bicarbonateIL-6 rate of change = (IL-6 (T~0~) -- IL-6 T~24~)/ IL-6 T~0~ Figure [1](#Fig1){ref-type="fig"} shows that the concentration of IL-6 was similar at T~0~ in both groups (*p* = 0.34), but was significantly reduced at T~24~ in the survival group compared to the non-survival group (*p* = 0.002).Fig. 1The IL-6 change after 24 h of ICU admission Table [3](#Tab3){ref-type="table"} shows cytokine concentrations at T~0~ and T~24~ in survivors and non-survivors. There were significant differences in the levels of IL-6 (*p* \< 0.01) and IL-10 (p \< 0.01), and in the IL-6 rate of change at 24 h after ICU admission (*p* = 0.03).Table 3Association of IL-6 reduction rate and survival for sepsis and septic shock (*n* = 123)UnivariateMultivariateOR(95%CI)OR(95%CI)IL-6 reduction rate (quartile) Q1: 100% to 86%5.08(1.60--16.1)5.67(1.27--25.3) Q2: 85% to -- 50%1.45(0.52--4.11)1.86(0.44--7.94) Q3: 0.49% to 0%0.64(0.22--1.83)0.54(0.14--2.02) Q4: increasedrefrefAdjusted for age, sex, BUN, Cre, aPTT, pH, HCO~3~^−^ref: Reference*OR* Odds Ratio, *CI* Confidence IntervalIL-6 reduction rate = (IL-6 (T~0~) -- IL-6 T~24~)/ IL-6 T~0~T~0~: At ICU admission time*T*~*24*~: 24 h after ICU admission Table [4](#Tab4){ref-type="table"} shows the association of IL-6 reduction rate and survival for sepsis and septic shock with logistic regression analysis. The quartiles for IL-6 reduction rate were 100% to 86%, 85% to 50%, 49% to 0%, and increased from 0%. We found a significant association between IL-6 reduction and survival at ≥86% reduction, with an Odds Ratio (OR) 5.67, 95% Confidence Interval (CI); 1.27--25.3, compared with the increase in the IL-6 rate of change. According to logistic regression, the rate of change of TNF-α and of IL-10 were not a predictor of survival.Table 4Association of IL-6 reduction rate and survival for sepsis and septic shock in logistic regression analysis (*n* = 123)UnivariateMultivariateOR(95%CI)OR(95%CI)IL-6 reduction rate (quartile) Q1: 100% to 86%5.08(1.60--16.1)5.67(1.27--25.3) Q2: 85% to 50%1.45(0.52--4.11)1.86(0.44--7.94) Q3: 49% to 0%0.64(0.22--1.83)0.54(0.14--2.02) Q4: IncreasedrefrefAdjusted for age, sex, BUN, Cre, aPTT, pH, HCO~3~^−^ref: Reference*OR* Odds Ratio, *CI* Confidence IntervalIL-6 reduction rate = (IL-6 (T~0~) -- IL-6 T~24~)/ IL-6 T~0~T~0~: At admission time*T*~*24:*~ 24 h after ICU admission Discussion {#Sec4} ========== We aimed to investigate if reductions in the plasma concentrations of TNF-α, interleukin (IL)-6 and IL-10, and of the IL-6 rate of change at 24 h after ICU admission were survival predictors for Vietnamese patients with sepsis and septic shock. The results showed that IL-6 reduction at the level of ≥86% at 24 h from ICU admission could be a survival predictor for our patients with sepsis and septic shock. Our study showed that patients who had decreased IL-6 level after 24 h of ICU admission at ≥86% were 5.68 times more likely to survive compared to non-survivors. IL-6 plays a key part in the systemic inflammatory response. Increased IL-6 levels in plasma have been identified in severe forms of sepsis, and correlate with an increased prevalence of mortality \[[@CR4]\]. Levels of IL-6 and CRP were shown to be unreliable predictors for 102 critically ill patients admitted to the ICU of a tertiary hospital in Serbia \[[@CR16]\]. In healthy adults without an ongoing inflammatory process, the IL-6 concentration ranged from 0.2 to 7.8 pg/mL, whereas the IL-6 concentration in adults with sepsis could be \> 1600 pg/mL \[[@CR17]\]. The IL-6 level is also proven as a predictor of acute kidney injury \[[@CR18]\]. Reduction in IL-6 level denoted the patients' response to treatment. This finding also implies that the initial empiric antibiotic therapy was appropriate and should continue until formal culture results. Besides that, any treatment that can reduce IL-6 concentration would be supportive for these patients. Mohammad and co-workers found that, compared with the IL-6 level upon ICU admission, the IL-6 concentration at ICU discharge predicted all-cause mortality \[[@CR19]\]. A meta-analysis in 2010 by Jaffer and colleagues, using data from human studies and experimental animal models, suggested that pro- and anti-inflammatory cytokines are released following a variety of initiating stimuli (e.g., endotoxin release, complement activation, ischemia--reperfusion injury). "Cytokine adsorption therapy" provides a potential solution to improving outcomes following systemic inflammatory response syndrome \[[@CR20]\]. A study by Marissa and co-workers in 2010 showed that, 24 h after ICU admission, cytokine concentrations in low- and high-concentration subgroups were significantly different in the survival and non-survival groups \[[@CR21]\]. The high cytokine concentrations 24 h after ICU admission were predictors of mortality for sepsis patients \[[@CR21]\]. IL-6 clearance by extracorporeal membrane oxygenation and continuous renal replacement therapy has been shown to lower the mortality \[[@CR22]\]. Sepsis and septic shock are the most common causes of death in the ICU \[[@CR23], [@CR24]\]. In recent years, the age of patients suffering from sepsis admitted to the ICU has been increasing \[[@CR5]\]. The mean age of our study cohort was 58.2 ± 18.8 years, the duration of ICU stay was 6 (IQR 3--12) days, and 39.0% of patients survived. Compared with the previous studies at Cho Ray Hospital undertaken in 2013 and 2014, the mean age of our study cohort was higher and more patients died \[[@CR25], [@CR26]\]. These observations could have been because our patients had more severe disease, were resuscitated later, and or discharged earlier from the ICU compared with the studies carried out in 2013 and 2014. Also, Cho Ray Hospital has a post-resuscitation area where recovering ICU patients can be cared for. The prevalence of mortality was higher than that observed in other studies because our patients underwent treatment in other departments before ICU admission. Also, the APACHE II and SOFA scores upon ICU admission were high indicating severe illness. Several cytokines could be indicators for severity and mortality for patients with sepsis and septic shock. In 2016, Stalder and colleagues evaluated 129 sepsis patients. They recorded an in-hospital mortality of 26%, and showed that plasma levels of growth arrest-specific gene 6 within 24 h of ICU admission could predict mortality for sepsis patients \[[@CR27]\]. In our analysis, IL-10 concentration at T~24~ was also significantly different. However, the IL-10 rate of change was not calculated as IL-10 is a pre - inflammatory biomarker, and is used to diagnose sepsis rather than survival prognosis in sepsis patients \[[@CR28]\]. Also, IL-10 is not tested as a point of care test, and is not widely used clinically. Whether pro-inflammatory biomarkers such as C-reactive protein (CRP) or procalcitonin could be predictors for mortality remains controversial \[[@CR29]\]. Biron and co-workers showed that a single procalcitonin concentration is not a good predictor for sepsis and septic shock, but that serial procalcitonin concentrations with high clearance of procalcitonin were reliable predictors \[[@CR29]\]. However, a meta-analysis involving 4467 patients showed that procalcitonin-guided therapy did not lower the mortality \[[@CR30]\]. We observed a significant increase in mean plasma levels of CRP (122.7 mg/L) and procalcitonin (49.8 ng/mL), but a significant difference between the survival group and non-survival group was not observed (*p* = 0.931 and 0.159, respectively). Levels of CRP and procalcitonin were thus poor predictors for survival. Other studies undertaken at Cho Ray hospital have elicited similar results \[[@CR25], [@CR26]\]. Measurement of the concentrations of CRP and procalcitonin thus aids the diagnosis of infection, but has low accuracy for predicting survival. In this research, our sepsis and septic shock patients were treated according to Surviving Sepsis Campaign 2012 guidelines. The empiric antibiotic therapy was based on our hospital antibiotic guideline. The research was finished before the Surviving Sepsis Campaign guidelines 2016 were published \[[@CR31]\]. Limitations {#Sec5} ----------- Our study had two main limitations. First, the time to sepsis onset could not be identified accurately. In this study, we did not find how long our patients may have been affected by sepsis before their admission. Further research may be needed with more frequent monitoring of vital signs to detect early sepsis based on the new guidelines SSC 2016. Second, this research was performed at Cho Ray hospital, a tertiary teaching hospital where modern medical equipment and techniques are available. The generalizability of this finding for all Vietnamese hospitals may be limited. However, there were several hospitals which have similar levels of equipment and facilities in Vietnam, who could apply this research. Conclusions {#Sec6} =========== Our findings indicate that a reduction in IL-6 level of ≥86% at 24 h from ICU admission was a survival predictor for sepsis and septic shock patients comparing with patients who had an increasing IL-6 rate of change. This finding also supports continuing the initial empiric antibiotic therapy in sepsis and septic shock patients. Hence, in terms of clinical applications, measurement of the IL-6 level should be done upon admission, and at 24 h after ICU admission in sepsis and septic shock patients. APACHE : Acute Physiology and Chronic Health Evaluation AUC : Area under the curve BUN : Blood-urea-nitrogen CRP : C-reactive protein ICU : Intensive care unit IL : Interleukin IQR : Interquartile range SOFA : Sequential Organ Failure Assessment SSC : Surviving Sepsis Campaign TNF : Tumor necrosis factor We thank all staff at the Critical Care Unit, Emergency Department, Cho Ray Hospital for their outstanding support. We also thank Professor Anthony FT Brown (University of Queensland, Australia), Dr. Gerard O'Reilly (Monash University, Australia) for their edition, revision the manuscript and technical support for this research. Funding {#FPar1} ======= No funding was received to conduct this research. The first author (PTNT) funded for this research. Availability of data and materials {#FPar2} ================================== The datasets are available from corresponding author upon reasonable request. PTNT and TTT conceived and designed the study, reviewed the policy, drafted and finalized the manuscript, and revised the manuscript. NTS and KW also conceived the study, conducted statistical analysis, revised and edited the manuscript. All authors have read and approved the manuscript. Ethics approval and consent to participate {#FPar3} ========================================== The research protocol was approved by the Ethics and Scientific Committee of Cho Ray Hospital (N120/CRH, dated 26/09/2014). Patients or their relatives signed to the written informed consent to participate the study. They did not pay for any extra tests costs including the cost for cytokine testing. Consent for publication {#FPar4} ======================= Not applicable. Competing interests {#FPar5} =================== The authors declare that they have no conflicts of interest. All authors have read and approved the manuscript. Publisher's Note {#FPar6} ================ Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
2023-11-02T01:27:13.970301
https://example.com/article/1936
Orbital Decay Description: Orbital Decay is an strategy action online Flash game where you take full control over a huge space vessel, the drone carrier 'Radiant Star'. Defend your ship against enemy fighters. Play Orbital Decay and other flash games at CafeCafeGames.com - We have the best free online games for you.
2024-06-15T01:27:13.970301
https://example.com/article/8593
Q: How can bash recognize regex groups? I am trying to use regex to match a filename out of a path. #!/bin/bash regex=[^/]+?(?=.zip) path="/home/quid/Downloads/file.zip" if [[ $path =~ $regex ]] then echo "Found a match" echo $BASH_REMATCH fi I should get Found a match file Instead bash gives me this error another.sh: line 2: syntax error near unexpected token `(' another.sh: line 2: `reg=[^/]+?(?=.zip)' If I put the regex in a quotes, it no longer is recognized as regex. I have zsh 5.8 and bash 5.0.16 and it doesn't work on both shells. How can I get bash to recognize the regex or not give me an error for using regex groups? A: #!/bin/bash regex='([^/.]+)([.]zip)?$' path="/home/quid/Downloads/file.zip" if [[ $path =~ $regex ]] then echo "Found a match" echo "${BASH_REMATCH[1]}" fi Using Charles' regex and ${BASH_REMATCH[1]} gives me just the file name without the extension.
2024-04-19T01:27:13.970301
https://example.com/article/3004
Q: Is there any overhead in the use of anonymous methods? I would like to know if there is any overhead incurred through the use of anonymous methods when creating a Background worker. for example: public void SomeMethod() { BackgroundWorker worker = new BackgroundWorker(); worker.DoWork += (sender, e) => { //large amount of code } worker.RunWorkerAsync(); } Would the example above be any better or worse than defining the //large amount of code in a separate method? Is there any overhead incurred in defining the background worker method in-line, particularly if SomeMethod() is called often? A: There is a small difference in how named methods and anonumous methods are handled when you create a delegate from them. Delegates for anonymous methods are cached, so there is a small overhead for checking if the delegate already exists in the cache. On the other hand, if you run the method more than once, it will reuse the cached delegate instead of creating a new one. Delegates for named methods are not cached, so it will be created each time. Other than that there is no difference. The anonumous method will be created at compile time and exists in the code just like a regular method, only with a name that only the compiler knows about.
2023-10-31T01:27:13.970301
https://example.com/article/8587
Denis Suarez and Unai Emery have history - and our new loan signing wants to create more memories now they’ve been reunited. Suarez was at Barcelona in 2014 when Emery took him to Sevilla as part of the deal that saw Ivan Rakitic move in the opposite direction. It worked out well - Suarez became a trusted member of Emery’s side and they won the Europa League together in 2015. Nearly four years later the duo are back in tandem after Suarez completed a loan move to the Emirates. And the 25-year-old knows what to expect. Play video Watch Arsenal video online 02:25 Hidden talents, Messi and Iniesta | Introducing Denis Suarez “I have a very good relationship with Unai Emery,” he told Arsenal Player. “I think he’s a very demanding coach and one of the best coaches in the world right now - I’ve been saying that for a while. “Sevilla was my first year playing football at the elite level - my first year in the top division. I improved a lot as a player thanks to him. He really helped me. I think he was a big part of the reason I was able to go back to Barcelona after leaving on loan. “The main thing is that he dedicates a great deal of time to his work. He spends many hours and days watching videos of other teams and his own side. “His training sessions are really demanding and he ensures that the team is completely prepared. But as I say, the biggest thing is the time he dedicates to his work. As we’d say in Spanish, he’s ‘un enfermo del fútbol’ - football mad.”
2024-05-06T01:27:13.970301
https://example.com/article/8260
The acromioclavicular joint: normal variation and the diagnosis of dislocation. Acromioclavicular separation is a common traumatic injury. Diagnosis rests on clinical and radiographic findings. However, normal variation in the alignment of the acromioclavicular joint may make the roentgen diagnosis more difficult. We stress the variations of normal alignment at the acromioclavicular joint and offer suggestions for avoiding pitfalls in this clinical situation.
2023-08-12T01:27:13.970301
https://example.com/article/8453
Contents History Sometime after attacking the Pro-bending Arena, a fleet of Equalist airships staged an attack on Republic City. During the attack, one of the police force's telephone operators informed Chief Saikhan that the police airship in "area seven" had been taken out by an Equalist airship and crashed into the harbor. Later, two Equalist airships approached Air Temple Island and deployed a number of Equalists including the Lieutenant. After the first group of Equalists was defeated, another group began approaching the island, prompting Team Avatar to escape on Naga, while Tenzin, his family, and Lin Beifong fled on Oogi. As Tenzin and his family fled the island, two Equalist airships pursued them. In a desperate attempt to protect the last surviving airbenders, Lin jumped off Oogi and used her police cables to attach and reel herself onto one of the airships. Using her metalbending, Lin successfully destroyed one of the airships before being captured by the Equalists on the other. The second airship, now with Lin on board as a prisoner, ceased its pursuit of Oogi and returned to Air Temple Island.[2] Several airships patrolled the skies of Republic City during the occupation of the metropolis by the Equalists. When it came time for Amon's victory speech, he traveled to the Pro-bending Arena in one of the ships.[3] Design The Equalist airships are considerably rounder than the airships used by the Metalbending Police Force. Their design encompasses rotors that are positioned vertically as well as horizontally. They are red and black in color and have Equalist propaganda symbols lining the exterior. The airships appear to be more aero-dynamically capable than the Fire Nation airships and Republic City Police airships, and this may be due to the rounded shape of the frame. The zeppelin also has an entry hatch on the underside of the gondola that is capable of lowering platforms onto which Equalists can climb to be lifted into the gondola.[1] This entry hatch is also capable of shooting a harpooned-cable which Equalists can use to zip-line from the airship to locations on the ground.[2] The interior of the gondolas are made entirely out of metal and have Equalist symbols inscribed on the metal beams. There is also a large wheel located at the gondola's front windows that is used for steering the aircraft. As evidenced by the police force's telephone operators, the Equalist airships are capable of destroying police airships.
2024-01-16T01:27:13.970301
https://example.com/article/2521
#ifndef __SUBCMD_PAGER_H #define __SUBCMD_PAGER_H extern void pager_init(const char *pager_env); extern void setup_pager(void); extern int pager_in_use(void); #endif /* __SUBCMD_PAGER_H */
2024-07-09T01:27:13.970301
https://example.com/article/3097
I need to create a popup window in android. My requirement is in page1 I will keep a hyperlink and when I click on that it should open a popup window. I have gone through many tutorials and tried them but none of them worked for me. Please help me on how to create a popup window in android. Hi thanks for the sample code..it is working fine I need to place textview and buttons to that popup window. Can we create those buttons and textviews in xml layout and can we use it for that popup window? – hemanth kumarSep 27 '11 at 9:47 yup why not...........any widget of android you can use in popup window – Samir MangroliyaSep 27 '11 at 9:50 ok thank you..I have created a layout main1.xml and now how to add that to pop up window? I mean in general we give like setContentView(R.layout.main1);...similarly how to add the xml file to popup window? – hemanth kumarSep 27 '11 at 9:52
2023-08-15T01:27:13.970301
https://example.com/article/9640
Q: how can i find the minutes difference in this timeformat? 05-Dec-19 08.30.00.000000000 05-Dec-19 08.31.00.000000000 i want do find the minutes difference between these two time formats in mysql(phpmyadmin 5.7.x)? A: You appear to be storing datetimes as strings. So you would first need to convert these strings to dates (for this, you can use STR_TO_DATE()); then you can use timestampdiff() to compute the difference in minutes: timestampdiff( minute, str_to_date(mycol1, '%d-%b-%y %H.%i.%s.%f'), str_to_date(mycol2, '%d-%b-%y %H.%i.%s.%f') ) Demo on DB Fiddle: select str_to_date('05-Dec-19 08.30.00.000000000', '%d-%b-%y %H.%i.%s.%f') date1, str_to_date('05-Dec-19 08.31.00.000000000', '%d-%b-%y %H.%i.%s.%f') date2, timestampdiff( minute, str_to_date('05-Dec-19 08.30.00.000000000', '%d-%b-%y %H.%i.%s.%f'), str_to_date('05-Dec-19 08.31.00.000000000', '%d-%b-%y %H.%i.%s.%f') )minutes_diff date1 | date2 | minutes_diff :------------------------- | :------------------------- | -----------: 2019-12-05 08:30:00.000000 | 2019-12-05 08:31:00.000000 | 1
2023-12-27T01:27:13.970301
https://example.com/article/4134
UPDATE: It looks like Halo 5 will require an Xbox Live Gold subscription to play in co-op, a mode that is now online only without split-screen. "I misspoke during the interview when stating that online co-op campaign would be supported with an Xbox Live Silver account," clarified 343 executive producer Josh Holmes in a statement on Halo Waypoint. "Co-op campaign will require Xbox Live Gold to play. I want to extend my sincere apologies to our fans, and to Game Informer, for this error and any confusion it has caused." "That said, it is important to us that fans have the opportunity to play the full co-op campaign experience and we are doing this by providing a 14-day Xbox Live Gold trial with Halo 5: Guardians," he added. But hey, on the plus side, free maps are still a thing. ORIGINAL STORY: Game Informer has published its Halo 5: Guardians-themed issue, and there's good news and bad news about the Xbox One shooter. Let's start with the bad news: Halo 5 doesn't support split-screen co-op. Bah. Halo 5, then, will mark the first time a main Halo game hasn't supported split-screen co-op since the series began with Halo: Combat Evolved in 2001. Split-screen has been a staple - and popular - feature of the Halo campaign for years. Now, no more. As revealed yesterday, Halo 5's campaign supports co-op for up to four players - but we now know co-op is online only. In the campaign Master Chief is accompanied by Blue Team in both single-player and four-player co-op. In Halo 5 Blue Team appear in cutscenes and accept commands from Master Chief in single-player. In co-op, each player plays as a specific member, each with a different loadout. At some point in the story Master Chief and Blue Team are declared AWOL by the UNSC. This is where the campaign flips to focus on Spartan Jameson Locke (from the Halo: Nightfall TV series). Locke tracks the Chief down with the help of a team of his own: Fireteam Osiris. That's the bad news. Now for the good news: players won't need an Xbox Live Gold account for online co-op. On to competitive multiplayer, and there's more good news. Developer 343 Industries told Game Informer Halo 5 launches with over 20 maps. More than 15 downloadable maps will be released by June 2016 - all free. 343 said it didn't want to divide the player base by selling maps, which is good news for everyone. Also of note in the Game Informer article: 343 boss Bonnie Ross goes into the catastrophic launch of Halo: The Master Chief Collection, which came out with broken matchmaking. Ross said packaging all four Halo games together and adding a universal user interface that let you switch seamlessly from game to game "created huge challenges". "In hindsight, it would probably have been better to ship the four games separately," Ross said. "And I think that fans would've loved that. We wanted to do more. We wanted it to be this gift to the fans." Ross added that 343 should have done a beta for The Master Chief Collection, and vowed to do a beta for all future Halo games in a bid to avoid making the same mistake again. "Going forward, you will never see a Halo game coming out without a beta," she said "It was obviously painful for our fans and for us. But it won't happen again. There are things we put in place to make sure that we know everything, how it stands up outside and in the world."
2024-03-25T01:27:13.970301
https://example.com/article/9004
Q: "and not re.search" multiple conditions I'm working on part a python script and I've come across a situation that I have not been able to figure out. In this part, I've opened a file and initially targeting lines that start with >. However, I want to skip over those lines that have the following regex patterns: uce.+$ ENSOFAS.+$ _[AB]_[0-9]+$ _[AB]_[0-9]+_rc$ if my code looks like the following, targeting just one of these, it works: with open(company_fn, "r") as company_fh: for line in company_fh: if line.startswith('>') and not re.search('uce.+$', line.strip()): print line But I need it to consider all the other possiblities too. I've tried ...not re.search(('uce.+$ | ENSOFAS.+$'), line.strip()):, not re.search(('uce.+$' | 'ENSOFAS.+$'), line.strip()):, and other variants on this with no success. How can I get re.search to consider all four possible regex expressions? A: This is wrong: not re.search(('uce.+$ | ENSOFAS.+$'), line.strip()) Don't add "spaces for clarity" when oring regexes together, because they are taken into account. That works: not re.search('uce.+$|ENSOFAS.+$',line.strip())
2023-10-05T01:27:13.970301
https://example.com/article/7519
Spice Up The Everyday With El Yucateco Hot Sauce #SauceOn #shop This shop has been compensated by Collective Bias, Inc. and its advertiser. All opinions are mine alone. #CollectiveBias I’m throwing this out into the universe. I want to be a lover of spicy foods, but my tender taste buds are already planning a mutiny at the thought of too much heat. Lately, I have been experimenting with my favorite recipes and taking them up a notch by adding a few drops of El Yucateco Habanero Hot Sauce. It gives a little kick to spice up the evening dinner routine. I have friends that eat hot sauce on everything from steamed vegetables, potatoes, and pizza. I figured why not try it on Chinese food. It was great to split an order of beef and broccoli with Baby for dinner and add the habanero hot sauce to only my portion. I could add just the right amount of spice to keep my taste buds spiced up and happy. So I kept thinking. What else can do we enjoy, but could use a kick of flavor to and spice up the everyday? Last week I added some El Yucateco hot sauce to my husband’s homemade Italian meat sauce as it slowly simmered on the stove. I didn’t tell anyone, just added a little splash. My husband commented at dinner how good his latest batch of sauce was. I just smiled and agreed right along with him. The bold habanero hot sauce didn’t just add heat, it added another layer of depth to the sauce flavors. Shopping at my local Publix last week, I was excited to find some of the different flavors El Yucateco hot sauce on sale! Cha-ching goes the extra coin in my pocket. I love finding a deal on pantry staples so I can buy extra for stocking. There’s a theory that the more spicy food you eat, the more your body becomes immune to the actual level of heat. I guess that’s why some people also have a much higher tolerance for heat. I feel a certain level of heat adds to the overall deliciousness of a dish when the spice fits into the flavor profile. I am a big fan of the sweet and heat combination so I can’t wait to try the green sauce to my Sweet Heat Pineapple Mango Salsa. Tonight we are headed to a family get-together. I don’t like to show up at a party empty handed, but Baby had Karate testing this AM and I am super short on time. I am whipping my easiest appetizer ever – layered taco dip! I simply mix an 8 ounces of softened cream cheese, 16 ounces of sour cream, a packet of taco seasoning and to take it over the top a few drops of El Yucateco hot sauce. I spread the cream cheese mixture in a large baking dish and top with shredded lettuce, diced tomatoes and shredded cheese. This tasty dip can not get any simpler to make. If I was making it for my own house I would also top it with sliced black olives, but I know not everyone loves them as much as we do. They will definitely devour this dip though, if my own husband doesn’t get to it first. What’s your favorite food to get your #SauceOn and spice up by adding a little hot sauce? Meet KP Hi! I'm KP! Welcome to the heart of our home - the kitchen. When you visit, you'll always find good food, lively conversation and tons of laughter. I'd love for you to join my family in our culinary and family adventures around Atlanta (and beyond). Learn more about KP... Archives Archives Meet KP Hi! I'm Karen and I want to welcome you into my kitchen - the heart of our home. When you visit, you'll always find good food, lively conversation and tons of laughter. I'd love for you to join my family in our culinary and family adventures around Atlanta (and beyond).Learn more about KP...
2024-01-18T01:27:13.970301
https://example.com/article/3233
Be confident that your details are completely secure as payment is collected by your preferred provider. We now have shared SSL security on our checkout page for extra safety. Alternatively you may choose payment by post. Stunning glitter tissue paper that twinkles with thousands of tiny iridescent sparkles especially under halogen or artificial lighting. Beautiful for wedding invitations, cards and favours. Available in 12 lovely colours. Cellophane Gift Wrap Cellophane florist and gift wrapping film in 10 metre and 2.5 metre lengths to enhance your floral bouquets, gift displays, gift boxes and baskets. Stunning when used with our coloured tissue paper. Great for dressing bottles of wine for Christmas, Champagne for weddings or presentations and tied lovingly with our ribbons and bows. Curling Ribbon & Bows Florist and gift wrap curling ribbon in either satin or metallic finish. Very economical as there are 250 metres on the metallic rolls and 500 metres on the satin rolls. Try using several colours together for added individuality. New in stock, pull bows, and stop 'n lock bows for gift wrapping, wedding tables, church pews etc. etc. If you like our website why not set up your own using our service provider whom we highly recommend? Wonderful customer service, exceptionally reasonable rates, easy to navigate even for a beginner, and a really friendly forum of other users for all the advice you will ever need! Just click on the link below to take a look 'The Wrapping Ranch', for making that special occasion even more memorable!
2024-05-26T01:27:13.970301
https://example.com/article/3563
Q: Proof multinomial coefficient is always no less than 1 by induction The goal is to show $$\binom{n}{k}:=\frac{n!}{k_1!k_2!...k_d!}\geq1$$ where $k=(k_1,k_2,..,k_d)$ multiindex of dimension $d$ with $|k|=n$. It is easy to show the case for $d = 1,2$. $d = 1 $ is trivial. For $d = 2$, let's use the common symbols $$\frac{n!}{k!(n-k)!} = \frac{n(n-1)\dots(n-k+1)}{k!}\geq 1$$ since $(n-k)!$ cancel out and $n\geq k$. The last step would be assume the statement valid for the case $d=p$. Then for the case $d=p+1$, is it safe to claim that for each $k=(k_1,k_2,..,k_{p+1})$, there exist a $\tilde{k}=(\tilde{k}_1,..,\tilde{k}_p)$ such that $$\tilde{k}_i = k_i\, , i=1,..,p-1$$ and $$\tilde{k}_p = k_p+k_{p+1}.$$ Then from(actually the binomial case) $$\frac{\tilde{k}_p}{k_p!k_{p+1}!}\geq1$$ the proof is complete. Are there any flaws hidden in the proof? Thanks. A: You proof seems OK. But I would write it as $$ \binom n{k_1,\ldots,k_d} =\binom {k_1+k_2\cdots+k_d}{k_1}\binom{k_2+\cdots+k_d}{k_2}\ldots\binom{k_{d-1}+k_d}{k_{d-1}}, $$ a product of binomial coefficients all${}\geq1$, so the result is integer and${}\geq1$. The identity I wrote follows by induction from $$ \binom {k_1+k_2\cdots+k_d}{k_1,\ldots,k_d} =\binom {k_1+k_2\cdots+k_d}{k_1,k_2,\cdots,k_{d-2},(k_{d-1}+k_d)}\binom{k_{d-1}+k_d}{k_{d-1}}. $$ The multinomial coefficient after the "=" in this last equation is what your proof applies induction to, renaming the lower indices to $\tilde k_1,\ldots,\tilde k_{d-1}$ (only the final one has changed from the $k_i$). The advantage of the formulation I gave is mainly that it shows you have found out a bit more about multinomial coeffcients than just their positivity (their combinatorial interpretation shows that they are integer).
2023-12-16T01:27:13.970301
https://example.com/article/3359
Vascularity change and tumor response to neoadjuvant chemotherapy for advanced breast cancer. For advanced breast cancer with severe local disease (ABC) (stage III/IV), neoadjuvant chemotherapy improves local control and surgical outcome. However, about approximately 20 to 30% of advanced cancers show either no or poor response to chemotherapy. To prevent unnecessary treatment, a capability of predicting clinical response to neoadjuvant chemotherapy of ABC is highly desirable. Vascularity index (VI) of breast cancers was derived from the quantification results in 30 ABC patients by using power Doppler sonography. Power Doppler sonography evaluation was performed every one to two weeks during chemotherapy. The overall response rate for 30 advanced patients tested was 70%, when 50% or more reduction in tumor size was the objective clinical response. Chemotherapy response was unrelated to the original tumor size (p = 0.563) or chemotherapy agents used (p = 0.657). The median VI for all 30 patients was 4.99%. The response rates for hypervascular tumors vs. hypovascular tumors, based on initial median value, were 86.7% and 53.3%, respectively (p = 0.109). The average VIs in responders and nonresponders were 7.67 +/- 4.77% and 4.01 +/- 3.82% (p = 0.052). There was a tendency for responders who have a relatively high initial vascularity. The VI change in responder group shows a pattern of initial increasing in vascularity followed by decreasing in vascularity. All patients (17/17) with a VI increment of >5% during chemotherapy had good chemotherapy response, whereas in patients with a VI increment of <5%, the response rate was 30.8% (4/13) (p < 0.001). For patients with a peak VI of >10% during chemotherapy, the response rate was 94.1% (16/17). However, in patients with a peak VI of <10%, the response rate was 38.5% (5/13) (p = 0.001). This prediction was made mostly within one month (25.47 +/- 12.96 d for VI increments >5% and 25.44 +/- 12.41 d for VI increased to >10%). In the meantime, the differences in size reduction shown in B-mode sonography were insignificant between responders and nonresponders (patient group with VI increment >5%, p = 0.308; patient group with peak VI >10%, p = 0.396). In conclusion, we propose that VI as determined by using power Doppler sonography is a good and inexpensive clinical tool for monitoring vascularity changes during neoadjuvant chemotherapy in ABC patients. Two parameters--VI increment >5% and peak VI >10%--are potential early predictors for good responses to neoadjuvant chemotherapy within one month in patients with ABC.
2024-01-13T01:27:13.970301
https://example.com/article/5312