text stringlengths 12 4.76M | timestamp stringlengths 26 26 | url stringlengths 32 32 |
|---|---|---|
[Varavara Rao is a revolutionary communist, poet and supporter of the Naxalite rebellion. He has given lectures on the Maoist movement in India, and expressed unwavering solidarity with the revolutionaries struggling for the the liberation of the country and the defeat of imperialism. The following interview was conducted by the Mumbai Mirror, on some of the challenges facing the Maoist movement as well as their development over the course of their 50 year struggle. As always, the present interview has been published here for the purposes of education and discussion.]
Mumbai Mirror: Half a century on, have the dreams with which the Naxalite movement began been fulfilled?
Varavara Rao: Not fulfilled, but there’s been a great advance after the initial setback. Naxalbari was the name of a village, but it came to represent everybody’s village. The word became part of our language. The authority proclaimed by the tribals of Naxalbari and Khari Bari spread like wildfire. They asserted their right to their land. That proclamation has become a part of alternative political thought.
The movement started as a rejection of Parliamentary politics, and proposed people-centered politics instead. Today, this movement has formed base areas in the forest regions in the eastern and central parts of the country. Having seized land from landlords and protected it from their goons and the police, they have formed co-operatives. In Bastar, this alternative politics is being practiced in the form of Janatana Sarkars, a united front of Adivasis, Dalits and small farmers, for the past 13 years. It is a one-of-a-kind government functioning without any World Bank aid. It has been able to halt the expansion of multinationals and big business houses in the forests. There is no other instance in the history of the world of such a protracted armed class struggle.
MM: But the movement has remained confined to the forests.
VR: That’s because the interests of capital today lie in the forest belt where labour is cheap. The Bastar forest alone has 28 kinds of minerals. As capital enters and concentrates in these areas, it has to be met by resistance which then sets off repression. So the struggle has shifted there.
MM: Do the people there have a choice? What about the indiscriminate shooting of alleged informers, the coercion?
VR: If they were coercing and shooting people indiscriminately, they wouldn’t have been able to sustain the movement for so long. The Maoists move among the Adivasis. It’s taken them so much time to convince Adivasis to give up some of their practices. If there was coercion, why would it have taken so long?
When the movement started, the saying was that Dalits and Adivasis are like the dust below your feet. Naxalites changed that saying to: “The dust below your feet now smites you in the eye.” Could that have come from coercion?
MM: What about the allegations of women being used as sex slaves?
VR: All police propaganda. In Bastar, more than 50 per cent Maoists are women. There are over a lakh women in the Dandakaranya Mahila Sangh. They are part of the militia, of the cultural wings. Would they be there in such large numbers if they were treated as slaves? In Andhra, very early on, one of the biggest gains was an end to the practice of the landlord having the first right over a girl as soon as she attained puberty and on her wedding night.
MM: But at what cost has this come? There are non-violent people’s movements too, like the Narmada Bachao Andolan.
VR: But what have they achieved? The dam got built and was recently dedicated by the PM to the ‘nation’. Fifty years of the Naxalite movement has not killed as many people as the bourgeois parties have. The police action under Nehru in Telengana and Hyderabad against the Communists and razakars; Indira Gandhi’s Operation Blue Star and its aftermath; the 1984 Sikh massacre under Rajiv Gandhi and then the riots after the Babri Masjid demolition under Narasimha Rao; Gujarat 2002 under Narendra Modi; and the Kashmir valley all these years… Then there are man-made disasters such as the Bhopal Gas Disaster, floods, and the structural violence of the system.
MM: The first generation of Naxalites comprised idealistic youth who gave up everything to join the movement. Is that still happening?
VR: Yes, many youngsters who fought for a separate Telengana joined the Maoists. The most famous was Vivek, considered a child prodigy, who left his law course and went into the forests. He was killed in an encounter in 2015 when he was just 19. In fact, this is the State’s biggest fear. The police chiefs of four states recently decided to work jointly to tackle new recruitment into the movement.
MM: Your “boycott election” principle has completely failed. Elections continue to be seen as the biggest proof of our democracy.
VR: Consciousness matters, not numbers. Recently, the polling percentage in Kashmir was just 6%, and the icon Irom Sharmila got just 72 votes. Yet, in Chhattisgarh, more people are voting and the BJP keeps winning. But even those who vote do not expect elections to solve their basic problems. But we must admit that the people are not yet disillusioned with Parliamentary democracy.
But despite getting Adivasi votes and pumping money into tribal areas, and despite the protections given to Adivasis by the Constitution, the State is not allowing them real democracy, ie control over their jal, jangal and zameen.
MM: Failures?
VR: An early failure was to see Dalits only as agricultural labourers, ignoring their caste even while fighting untouchability on the ground. A serious lapse is our failure to work among Muslims. Muslims were among the founders of the Communist Party. But today when the need is so great, they are nowhere in the movement. That’s because of the segregated spaces we live in and the stranglehold of religious leaders who project Islam as the only solution against both capitalism and Communism. I sometimes wonder whether one day we will be able to make a breakthrough in Muslim ghettos the way we did in Adivasi areas. | 2024-06-01T01:27:13.970301 | https://example.com/article/5376 |
<?php
namespace Oro\Bundle\ProductBundle\Entity;
use Doctrine\ORM\Mapping as ORM;
use Oro\Bundle\EntityConfigBundle\Metadata\Annotation\Config;
/**
* @ORM\Entity
* @ORM\Table(
* name="oro_product_image_type",
* indexes={
* @ORM\Index(name="idx_oro_product_image_type_type", columns={"type"})
* }
* )
* @Config
*/
class ProductImageType
{
const TYPE_LISTING = 'listing';
const TYPE_MAIN = 'main';
const TYPE_ADDITIONAL = 'additional';
/**
* @var integer
* @ORM\Id
* @ORM\Column(type="integer")
* @ORM\GeneratedValue(strategy="AUTO")
*/
protected $id;
/**
* @var ProductImage
* @ORM\ManyToOne(targetEntity="Oro\Bundle\ProductBundle\Entity\ProductImage", inversedBy="types")
* @ORM\JoinColumn(name="product_image_id", referencedColumnName="id", nullable=false, onDelete="CASCADE")
*/
protected $productImage;
/**
* @var string
* @ORM\Column(name="type", type="string", length=255)
*/
protected $type;
/**
* @param string $type
*/
public function __construct($type)
{
$this->type = $type;
}
/**
* @return int
*/
public function getId()
{
return $this->id;
}
/**
* @return string
*/
public function getType()
{
return $this->type;
}
/**
* @param $type
* @return $this
*/
public function setType($type)
{
$this->type = $type;
return $this;
}
/**
* @param ProductImage $productImage
* @return $this
*/
public function setProductImage(ProductImage $productImage)
{
$this->productImage = $productImage;
return $this;
}
/**
* @return ProductImage
*/
public function getProductImage()
{
return $this->productImage;
}
/**
* @return string
*/
public function __toString()
{
return (string)$this->type;
}
}
| 2023-11-23T01:27:13.970301 | https://example.com/article/5697 |
BEIRUT (Reuters) - Air strikes on a building in northern Syria used by an insurgent group formerly known as the Nusra Front killed at least 30 people and wounded dozens more on Tuesday, the Syrian Observatory for Human Rights said.
The Britain-based Observatory said it was unclear whether the strikes near Sarmada in the countryside of the northwestern province of Idlib had been carried out by aircraft belonging to Russia or to the U.S.-led coalition.
Tuesday is the fifth day of a ceasefire in Syria but its sponsors, Russia and Turkey, say this excludes Islamic State and the Syrian Islamist militia Jabhat Fateh al-Sham, formerly called the Nusra Front.
Abu Anas al-Shami, a Jabhat Fateh al-Sham spokesman, said the attack was carried out by the international coalition. More than 20 people were killed, he said.
“The headquarters targeted by the international coalition a short time ago are a main headquarters for that area and contains a number branch offices, leading to the killing of the brothers,” he said in a statement.
The Observatory reported that some of the casualties were detainees being held in the building, but the Jabhat Fateh al-Sham spokesman denied that it was used as a prison.
Jabhat Fateh al-Sham changed its name in July and announced it was severing ties with al Qaeda.
The Observatory said eight Jabhat Fateh al-Sham fighters and leaders have been killed in air strikes around rebel-held Idlib in January. | 2024-02-21T01:27:13.970301 | https://example.com/article/5550 |
About the ProductionIt's a cold, cloudy Thanksgiving Day in a modest Pennsylvania suburb, the kind of town
where kids ride their bikes and play in the streets every day. Inside a warm and welcoming
home, the hardworking Dovers and Birches, the closest of friends and neighbors, share the
traditional holiday meal together, relaxed, laughing, entirely at ease. All is right with the world.
And then it's not.
In the blink of an eye, the two youngest girls, just six and seven years old, are nowhere to
be found. It is perhaps the worst thing that any parent, any family, can imagine, and for the
Dovers and Birches it begins a traumatic nightmare from which they cannot seem to escape.
Director Denis Villeneuve states, "'Prisoners' deals with one of the most difficult
subjects in life -- missing children. The mere thought of it makes us uncomfortable, we are
instantly overcome with fear. Having to think, 'What would I do if this happened to me?' is
truly unthinkable. You ask yourself how far you would go to find your child before time runs
out and it's too late. Or what you would do to the person you knew in your heart was
responsible, if given the chance. And what if you didn't take that chance, and it would've made
a difference? Fear drives these thoughts and influences the answers. Even from the safety of a
seat in a movie theater, the complex moral conflicts that can arise from our reaction to that
singular emotion are fascinating. For me, as a filmmaker, to examine it and to look at our
humanity through these richly drawn characters was so compelling that I was willing to face my
own fears."
In the film, the police are called in and the girls' safe return becomes a race against the
clock; everyone knows that the longer it takes to find them, the less likely it is they'll be found
safe. When a suspect is apprehended by the police rather quickly, but released due to a lack of
evidence, one father cannot bear their perceived blunder, or their calm and meaningless assurances. Feeling he has no choice, he will do whatever it takes to find the girls, no matter the
consequences.
Hugh Jackman, who plays Keller Dover, father of missing Anna Dover, says, "It is a
classic ticking clock type of suspense thriller that keeps you on the edge of your seat, and really
beautifully written, with great twists and turns. But it's also truly heartbreaking in its
consideration of what happens to the human spirit, the psyche, the soul, under that kind of
strain."
The story dives into the depths of the situation as it affects both families, as well as the
community in which they live, and the policeman fighting time to solve the case before it's too
late.
Jake Gyllenhaal, who portrays the lead detective on the case, appreciated the way the
script examined the matter from both inside and outside of the families involved. "It posed some
really hard questions about how far you would go for the people that you love, while also taking
a close-up look at the various interpersonal relationships in a small town when something like
this happens, including the perspective of a cop, who is seen by some as part of the solution, and
by others as part of the problem."
Producer Kira Davis, recalling her first reading of the script, notes, "Even though, as a
parent, it was so painful to even imagine going through something like this, I was taken by the
intensity of the material, how much of a page-turner it was, and that I couldn't guess what was
going to happen next. I liked that the story was told from the point of view of various characters,
and that you see each of them having a very different emotional journey."
"Prisoners" was written by Aaron Guzikowski, who says his initial inspiration was
something much less foreboding than it eventually became. "What first came to me was just a
feeling, the one you get when you misplace something as trivial as your car keys or cellphone,"
he remembers. "That slight panic you feel when you reach for something where you knew it
was, and it's not there anymore."
But that was before Guzikowski had children. "Once I had kids, and tried to imagine that
same sensation -- but instead it's my child -- it became something completely different. What
does that do to a person's mind? How does it change him, what does it drive him to do that he
would never normally do?"
Helping to guide Guzikowski through the scripting process was producer Adam
Kolbrenner. "Aaron never wavered in his commitment to the story and these incredible
characters, from start to finish," he says. "What was most important to him was how they each
deal with this tragedy in their own way, and that it all start with something so innocent: the
decision by the parents to let their little girls go outside. It's such a common occurrence, a
choice that moms and dads make every single day."
Producer Broderick Johnson offers, "Aaron's screenplay gripped you from the beginning.
You met these lovely characters who suddenly had this unthinkable situation to deal with, and as
it went along, the tension mounted and it became this dark, heart-pounding thriller that was both
frightening and thought-provoking at the same time."
Acknowledging that the project poses hard questions with even harder answers, Johnson
notes that the key for Alcon and the other producers was finding a director who could not only
embrace such a difficult subject, but also bring it to the screen in such a way that the raw,
underlying emotions were exposed for the audience to experience along with the characters on
screen. "If you look at Denis' work, one of the common threads you'll find is the absolute
humanity, the grounded nature of the emotional conflicts. We knew the story would be in the
best of hands with him."
Villeneuve states, "Right away, I was impressed with the way Aaron depicted what a
parent will be ready to do to protect his or her child in such extraordinary circumstances, but also
the way this violation of a family spread inside them and among them, destroying a part of their
intimacy, and what each of them had to do to survive that. I was deeply moved."
"Denis came in and said, 'I understand who these characters are, I understand what their
journey is. I know how to relate to them and how I want to express that cinematically,'"
Kolbrenner says. "And that's exactly what he did. In a film that goes to the darkest places, the
characters were in the hands of a filmmaker who brought passion and creativity to them every
day."
"From the start, I felt I could approach the story in different ways," Villeneuve relates.
"It is dark, it is a tough subject, but it's also very profound, and I knew it would be interesting for
audiences if the characters could feel alive to them, if they could truly connect with them."
Guzikowski's story and Villeneuve's approach to it attracted a top-flight roster of actors,
including Jackman and Gyllenhaal, along with Viola Davis, Maria Bello, Terrence Howard, Melissa Leo and Paul Dano. And behind the camera, helping Villeneuve to capture the story was
legendary cinematographer Roger Deakins.
"Beginning with Denis and Roger, and then our phenomenal cast, it really has been an
embarrassment of riches on this movie, from top to bottom," Davis acknowledges. | 2024-05-07T01:27:13.970301 | https://example.com/article/6042 |
Sunday, September 21, 2008
In January this year one of my nephews turned up saying he had no-where to stay and could be stay with me till he found something it would be for around 3 months so i said ok that's cool It is now September and he is still hereI don't mind having him here but the one thing i hate is that he is so damn lazy.I will wash up have all the plates and cups in the cupboard and if i use anything after that i would wash it to make the place still look tidy, but not him......what he does is makes loads of mess and leaves it there. I ask him to wash up and its a big deal with some of the things he washes still dirty. At the moment i have no clean plates or cups in the cupboard as he is supposed to wash up and i wont wash up when he has too. Another problem he will use the towels and not wash any of them, as it is i now have my towels and he has his towels as he wont wash them if there are still some he can useMy one pet hate is that he loves to drink milk which is fine, but as the glasses he uses might not get washed for a few days i ask him to rinse the glass then soak the glass in water so the milk dosent go hard in the bottom.Are all males this damn lazy or was it his upbringing?.
About Me
I live in Sydney Australia.
I like to write poems,and you will see some on here so I dont loose them.
Love to play an MPORG called World of Warcraft. Consider myself a little ecentric as i see things that others never do..................
My World of Warcraft characters
Tinyhaed (Arcane Mage)
Boras (Healadin)
Tinsh (Elemental/Resto)
Squg (BM Hunter) | 2024-05-16T01:27:13.970301 | https://example.com/article/1950 |
As they head to campus parties or out on dates, thousands of college students are switching from the traditional “buddy system” to mobile apps that help them reach trusted friends and emergency contacts if they feel threatened.
The tools may help ease concerns among college students who have heard the alarming statistics about sexual assault – in one major survey, nearly 30 percent of undergraduate women said they had experienced an attempted or actual assault either before or during college.
Beyond the safety factor, though, the new apps are raising awareness about how to help prevent dating abuse and sexual violence.
Circle of 6 is a free app that uses icons to discreetly alert six contacts to a variety of scenarios: A simple tap on a car icon sends a “come and get me” text message to your circle and shows where you are with GPS. Another icon asks them to call to interrupt an uncomfortable date or other situation. Another connects to well-respected national hotlines or a local emergency number.
Jessica Kan, for one, has been eagerly anticipating the Android app, which was released Thursday, since hearing about Circle of 6 on Twitter a few months ago.
The recent graduate of University of California, Berkeley, still lives in Berkeley and plans to use the “really cool” app when she’s coming home late at night or is in a “shady situation” on a date. “Sometimes, I don’t want to be rude … and say I just want to leave now, so it makes it easy and discreet,” she says.
On campus, Ms. Kan adds, the service that provides bus rides or walks home late at night often gets backlogged, so Circle of 6 will provide a faster way for people to get help.
Circle of 6 app has been downloaded more than 30,000 times since it launched six months ago for iPhone. About 6 in 10 college students use smart phones, and even those with regular cellphones can still be included in someone’s circle and receive the Circle of 6 text alerts.
“We thought it was important to put the power in the users’ hands to make these choices during the day – ‘Who are the friends that I trust?’ – instead of having to fumble around with your phone … in the middle of the night,” says Nancy Schwartzman, a co-creator of Circle of 6 and executive director of The Line Campaign Inc., a nonprofit devoted to preventing sexual violence.
But Circle of 6 seeks to be more than emergency tool. One icon connects to resources on healthy relationships and sends a non-emergency text to friends to let them know you are unsure about a relationship.
“Many times, particularly young women are worried about whether their relationship is healthy or ‘normal.’ They take these relationship quizzes, but they do it in isolation,” says Deb Levine, Circle of 6 co-creator and executive director of ISIS, a nonprofit that promotes sexual health and positive relationships.
Often friends have noticed troubling signs in a relationship but haven’t known what to do. This feature of the app “allows friends to initiate a conversation,” Ms. Levine says.
Circle of 6 and OnWatch, another app aimed at connecting college students with peers and emergency services, won the White House’s Apps Against Abuse Technology Challenge in 2011. Forbes reports that there are dozens of women’s personal-safety apps for iPhones. But OnWatch spokeswoman Medora Heilbron says OnWatch and Circle of 6 represent a “completely new concept, so you have to educate people that [the apps] are there to support them in their safety and they can plan to be safe.”
In Washington, D.C., a new app called U ASK (University Assault. Services. Knowledge.) gives easy access to resources at college campuses and the wider community in the event of a sexual assault or threat. If the pilot goes well, similar apps may be developed for other cities or statewide university systems, says Jared Watkins, development coordinator for Men Can Stop Rape, a nonprofit in Washington.
Apps such as Circle of 6 can get men involved in helping to prevent sexual violence, Mr. Watkins says. When women include male friends and relatives their circle, he says, it nudges them “to educate themselves about sexual assault, and it might lead to them being more active bystanders in everyday situations, including [standing up to] sexism and rape jokes.”
One outcome the developers didn’t anticipate – high school and middle school educators using the apps to launch conversations about dating violence. It affects between 9 percent and 34 percent of adolescents, but 8 out of 10 school counselors report that their schools have few if any resources to address the issue, according to the magazine Pediatrics.
Since the launch of Circle of 6, more than 4,000 people have pledged on Facebook to help stop dating violence and sexual assault. Developers plan to release a related tool kit for educators later this month. | 2023-10-17T01:27:13.970301 | https://example.com/article/5166 |
Lord Barker of Battle, a Tory, wanted to discuss Russian sanctions with the security minister but was rebuffed
The security minister has turned down a meeting with a Tory peer who has financial links to Moscow amid fears about Russian influence and lobbying in parliament, The Times can reveal.
Ben Wallace said in a letter to the Commons foreign affairs committee that he had been contacted by two Conservative peers “requesting government assistance for Russian associates” since he took up his post in 2016.
He said he did not take up the offer to meet and discuss sanctions with Lord Barker of Battle. Lord Barker, 52, is chairman of En+, the Russian energy giant majority-owned by the oligarch Oleg Deripaska, a close ally of President Putin. En+ and Mr Deripaska have been subject to sanctions since the Salisbury nerve agent attack in March. | 2024-07-11T01:27:13.970301 | https://example.com/article/6011 |
Q:
How to recursively copy in place a FormGroup?
We're trying to build a generic table component, where items can be added to a table or edited individually. The table has an addForm FormGroup for editing items before they are added to the form. When the item is added to the from the addForm is copied to a FormArray with lodash's cloneDeep().
The problem we're running into now is editing a row. Each row in the table has a form that's bound to an editForm that exists on the overall component. The idea is to copy the values out of the FormArray and into the editForm and then make the form visible to the user. Unfortunately we're running into problems with some of our more complicated forms, where we're trying to nest these table components inside each other. I've tried a few different approaches but they each have their own gotcha...
Using _.cloneDeep()
If I copy from the FormArray to the editForm with _.cloneDeep() like we use to copy into the FormArray it seems the formControlName bindings get messed up. I'm guessing this is because replacing that FormGroup in place messes up the some internal angular references to the FormGroup? I wind up getting this error:
this.editForm = _.cloneDeep(this.formArray.controls[index]) as FormGroup;
Error: There is no FormControl instance attached to form control element with name: 'myControlName'
Using patchValue()
My other attempt at this was to use the built-in patchValue(), but it looks like patchValue() doesn't handle FormArrays very well.
this.editForm.patchValue((this.formArray.controls[index] as FormGroup).getRawValue());
> this.formArray.controls[0].controls['treatingPhysicians'].controls[0].controls
- Object
- address: FormGroup
- id: FormControl
- physicianFullName: FormControl
- __proto__: Object
> this.editForm.controls['treatingPhysicians'].controls[0].controls
- []
Writing a custom copy function
We also have our own custom form copying function laying around, unfortunately it also seems to choke up on FormArrays, since it's difficult to tell if the properties on an object in an array should be a control or another nested FormGroup.
this.editForm = this.buildOutValues((this.formArray.controls[index] as FormGroup).getRawValue(), this.editForm);
> this.formArray.controls[0].controls['treatingPhysicians'].controls[0].controls
- Object
- address: FormGroup
- id: FormControl
- physicianFullName: FormControl
- __proto__: Object
> this.editForm.controls['treatingPhysicians'].controls[0].controls
- Object
- address: FormControl
- id: FormControl
- physicianFullName: FormControl
- __proto__: Object
So is there a good way to copy forms and keep all the angular references in tact? Or is there a way we can modify our custom form copying method and still be able to distinguish properties that should be groups and which should be controls?
A:
I was able to resolve this issue by writing a custom form copy function that copies based on the FormGroup rather than the value of the form. Using isinstance was sufficient to figure out how each control in the FormGroup should be copied.
| 2023-09-02T01:27:13.970301 | https://example.com/article/6613 |
Based on the true story of Shoji “Crybaby” Segawa, a talented player of shogi, a Japanese variant of chess. After rising quickly in a shore-kai, an organization that supervises professional shogi status, Shoji fails to fulfill the ironclad requirement of reaching the 4th rank by age 26. With the encouragement of his friends, he sets out to achieve the impossible: to be the first amateur to become a shogi professional. (FFM)
WARNING: May contain traces of spoilers! People allergic to the discussion of any plot’s elements before seeing a movie are strongly advised to take the necessary precautions for their safety and should avoid reading further.
This is a great feel-good movie based on the autobiographical book about the incredible career of Shoji Segawa, a Shōgi player. Shōgi (将棋 / “The game of generals”) is a Japanese strategy board game very similar to chess (as you have a king, surrounded by his gold generals, his silver generals, rook and bishop, knights, lances and finally pawns pieces). We often see this type of “sport competition” story (where sport is often replaced by any possible type of occupation) in manga or anime (the best similar example is Hikaru no Go manga by Yumi Hotta & Takeshi Obata, which is about Go, but there are plenty of manga about shōgi like March Comes in Like a Lion) but it is rare to see this type of story in a live-action movie.
The movie has a strong cast of stars, so it is not surprising that the acting is quite good (although I’ve notice poor performances in the case of some minor characters). The photography is good enough (it’s not always optimum, but I guess it’s due to the attempt to give the picture a look of the 70s or 80s). The storytelling is, however, excellent considering that it is not easy to make such a subject interesting and to keep the attention of the audience while showing two guys sweating over a board game! The upbeat music and some comedic devices are very helpful for that.
Shoji Segawa (nicknamed Shottan) is a shy, introverted boy who has been interested in playing shōgi since elementary school. Encouraged by his school teacher and his father (Jun Kunimura), he improves his skill playing against his neighbour Yuya. They both go to a shōgi dojo where they are tutored by the local master (Issey Ogata). He is known for sometime crying after a game (hence the other nickname of “crybaby”). Learning that you can become a paid professional player of shōgi, Shottan (Ryuhei Matsuda) decide to apply to the shore-kai (the Japan shōgi Association’s apprentice school) but he doesn’t give his all and fails to reach the 4-dan level by age 26. A good part of the movie is dedicated to showing him agonizing over his chance of success (despite being a little overconfident) and over his failures. He finds himself in his late 20s, with no high school diploma, no job and becomes depressed. He eventually finds a salaryman job, but keeps playing shōgi for pleasure. He becomes quite skilled as an amateur player and, eventually in his 30s, gets some fame as the amateur who keep beating professionals (a miracle record of 17 wins and 5 losses!). He then starts fighting for the JSA to give him a second chance at becoming professional…
Strangely, nowhere in the movie they talk about the rules or strategy of the shōgi game. I guess, if the movie is solely aimed at a domestic Japanese audience, they assume that everyone know them. Anyway, the knowledge of the game is totally irrelevant to the story. The movie is more about fighting for your dream, learning the discipline (not being too distracted) and to play for the right reasons (not to win but just for the pleasure of it). It is interesting to note that the director, Toshiaki Toyoda, attempted himself to become a professional player when he was younger.
All in all, The Miracle of Crybaby Shottan is an upbeat biopic that provide a very good entertainment. Well worth watching.
The Miracle of Crybaby Shottan (泣き虫しょったんの奇跡 / Nakimushi Shottan no Kiseki): Japan, 2018, 127 mins; Dir./Scr.: Toshiaki Toyoda (based on the autobiographical novel of Shoji Segawa); Phot.: Norimichi Kasamatsu, Kôji Naoi; Ed.: Masaki Murakami; Prod.: Ryo Otaki, Kyôichi Mori; Cast: Ryûhei Matsuda (Shoji), Yôjirô Noda (Yuya), Shota Sometani, Kento Nagayama, Satoshi Tsumabuki, Kiyohiko Shibukawa, Ryusuke Komakine, Hirofumi Arai, Takako Matsu, Issey Ogata, Kaoru Kobayashi, Jun Miho, Jun Kunimura.
Screened at the Cineplex Quartier Latin 13 (Thu. 8/30 at 21:30) as part of the “Focus on World Cinema” program of the 42nd Montreal World Film Festival. There was a little more than half-a-dozen people in the theatre.
[ AsianWiki / IMDb / Official / Youtube ]
[ Traduire ] | 2023-10-30T01:27:13.970301 | https://example.com/article/1968 |
For the period from 15 to 21 April, the import volume of agricultural products regulated by the Rosselkhoznadzor, has made more than 51 thousand tons, of which almost a third fell on meat and meat products (30.7 percent). A little less milk and dairy products (29.8 percent). Imports of fish and seafood amounted to 19.2%. Also, a large share of imports accounted for feeds and feed additives (15,1%).
"Miratorg", the largest beef producer in Russia, reports that in connection with growth of number of cattle, increase the area of cultivated farmland: arable lands and pastures in the Bryansk, Orel, Kaluga, Tula and Smolensk regions - 8% in 2019 to 481 thousand hectares.
APH "Miratorg", the largest vertically integrated agro holding in Russia, announces that at the construction site of the slaughterhouse in para Chernitsyno in Kursk region currently employ more than 1,000 people.
"Miratorg Zapad", the industry leader in the production of frozen products and ready meals, said that due to the growing consumer demand for high-quality semi-finished products has started to produce new lines of food products from chicken meat – doughnuts and grumpydev.
New directions of state support provided by the government of the Moscow region in the field of agriculture, in particular, in 2019, farmers will receive 100 million rubles for the maintenance of breeding stock of cattle, RIAMA announced Thursday Minister of agriculture and food of the Moscow region Andrey Razin.
Prairie fires, spreading to the settlements, has caused the agriculture of Zabaikalsky Krai damage to 591 million rubles, the press service of the regional government. The region has established 14 commissions, which examined the fire victims of the economy.
APH "Miratorg", the flagship of the agro-industrial sector of Russia, reports that in the current year on the territory of Kursk region in connection with the increase of livestock at livestock sites space allotted to agricultural holding under cereals and legumes, will amount to 71.5 thousand hectares, which is 16% more than in 2018.
Muscovites and guests of the capital will be able to buy delicacies and organic products at the fair, which will take place on 14 – 16 may 2019 at VDNH, pavilion 75 (hall B). Opening hours: from 10:00 to 18:00 (16 may to 16:00). Entrance to the fair is free.
Prime Minister Dmitry Medvedev instructed the Ministry of agriculture, Ministry of economic development and SME Corporation to develop mechanisms for the legalization of the work of private households (LPH). The corresponding assignment among the others the following the meeting with representatives of small and medium business in Perm on 2 April.
From 17 to 20 April 2019 in the city of Svetlogorsk (Kaliningrad region) is held the IX international Veterinary Congress is one of the most important events in the field of veterinary in Russia and in the world. The Congress was attended by representatives of the Ministry of agriculture of Russia, Rosselkhoznadzor, employees of leading domestic and foreign scientific Centers and organizations. All-Russian state Centre quality and standardization of medicines for animals and feed (fgbi "VGNKI") presented to Congress the Director of the institution, Leonid Kish and experts of structural divisions of the Center.
"Miratorg", the largest beef producer in Russia, reports that in the framework of the development of an interregional project of beef cattle is planning its own resources to increase breeding stock specialized breed, Aberdeen-Angus in the Kaliningrad region 25% to 44 thousand heads in 2019.
APH "Miratorg", the largest investor in the agro-industrial complex of Russia, reports that returns in agriculture more than 47 thousand hectares of abandoned lands in the framework of an interregional project of cattle in the Bryansk, Smolensk, Kaluga, Tula, Kaliningrad regions in 2019.
It turns out that people can also pay with your life in the fight against a dangerous virus. Achs are usually considered exclusively in the context of food and economic damage. Forget that from pigs contained in China, get most of the world's resources heparin - medicines that prevent blood clotting in blood vessels.
"Miratorg Zapad", the leading Russian manufacturer of frozen meat products and ready meals, reports that from January to March 2019 has shipped 13.4 thousand tons of finished products, increasing production volume by 13% compared to the same period of 2018.
APH "Miratorg", the leader in production of main kinds of meat in Russia, reports on the recruitment of staff to replace more than 250 vacant positions at the enterprises of the holding in Belgorod region.
The first experimental calves were born at the breeding plant in the Annunciation district of the Amur region. Cows were inseminated using sexed semen seed, which is separated by X and Y chromosomes. Thus, the experts in advance "ordered" the sex of the cubs. | 2023-11-04T01:27:13.970301 | https://example.com/article/5031 |
Effects of electroconvulsive therapy and propofol on spatial memory and glutamatergic system in hippocampus of depressed rats.
This animal study tested the spatial learning memory of "depressed" rats undergoing electroconvulsive therapy (ECT) or ECT combined with propofol and aimed to reveal the glutamatergic mechanisms in the hippocampus. Sixty Sprague-Dawley rats were randomly divided into 5 groups (n = 12 rats per group): control group, depression group, propofol group, ECT group, and propofol + ECT group. Rats were stressed repeatedly for 21 days to establish depression model. After the model was set up, rats of the propofol group were administrated with propofol (100 mg/kg). Rats of ECT group were administered ECT once on alternate days for 2 weeks. ECT + propofol group rats were given ECT after anesthesia with propofol (100 mg/kg). Spatial memory was assessed by Morris water maze. Glutamate content in hippocampus was measured by chromatometry. N-methyl d-aspartate (NMDA)-NR2B expression was detected by immunohistochemistry. After treatment, the behavior level of rats in ECT group and ECT + propofol group was higher than that in depression group, and there was no significance between ECT group and ECT + propofol group. The evasive latency of rats detected by Morris water maze got shorter and shorter from the first day to fourth day. The evasive latency in ECT group was longer than that in ECT + propofol group and depression group, and the evasive latency in ECT + propofol group was shorter than that in depression group. Glutamate contents in hippocampus of rats in depression group and propofol group were higher than those in other groups, and glutamate content in ECT group was lower than that in other groups. The content in ECT + propofol group was lower than that in depression group, but higher than that in ECT group. N-methyl d-aspartate-NR2B expression in hippocampus of rats in depression group was lower than that in control group, but the expressions in ECT group and ECT + propofol group were higher than that in control group, and the expression in ECT + propofol group was lower than that in ECT group. The glutamate content in hippocampus of depressed rats heightens, and the NMDA-NR2B expression down-regulated, which may cause "depression" symptoms and learning memory impairment. After ECT, the glutamate contents decreased, and NMDA-NR2B expression up-regulated, the depression symptoms improved, and the spatial memory worsened simultaneously. However, propofol inhibited the excessive decrease of glutamate and excessive up-regulation of NMDA-NR2B caused by ECT, and both the depression symptoms and the spatial memory of depressed rats improved. | 2024-01-05T01:27:13.970301 | https://example.com/article/8616 |
Q:
Condition works for XSLT 1.0 stylesheet, but not for XSLT 2.0 stylesheet
Consider this condition that exists in a template that is called recursively:
<xsl:if test="$i <= $count">
I'm using an XSLT 2.0 processor (Saxon-B 9.1.0.6). The condition seems to work only when running an XSLT 1.0 stylesheet. When the stylesheet version is set to 2.0 (as it should be), it stops working.
Any ideas why?
Here's the whole thing:
<xsl:template name="for.loop">
<xsl:param name="i" />
<xsl:param name="count" />
<xsl:if test="$i <= $count">
...
</xsl:if>
<!-- Repeat the loop by recursion -->
<xsl:if test="$i <= $count">
<xsl:call-template name="for.loop">
<xsl:with-param name="i">
<xsl:value-of select="$i + 1" />
</xsl:with-param>
<xsl:with-param name="count">
<xsl:value-of select="$count" />
</xsl:with-param>
</xsl:call-template>
</xsl:if>
</xsl:template>
Thanks.
A:
Here is my suspicion: Depending on what data types $i and $count are, the "less than" test may fail in 2.0 (which supports more data types than 1.0), where in 1.0 an implicit conversion exists that does the right thing.
Try to convert the data to the right type before you compare it, e.g. using number().
| 2024-05-04T01:27:13.970301 | https://example.com/article/6265 |
Many different aquatic plants from algae, which drifts suspended in the water, to plants floating on the water surface or rooted in the pond bottom can grow in ponds. Rooted plants grow either entirely under the water, have floating leaves, or grow with stems above the water surface. Some have both underwater and floating leaves. Both algae and rooted plants will grow in all ponds. Keeping a balance is sometimes difficult. Any plant can become a nuisance with the right conditions.
Single-celled algae, usually not visible, form the base of the food chain and make much of the oxygen needed for other life in the pond. Filamentous algae, sometimes called moss or grass, is more visible and most easily becomes a nuisance. Sudden growth of either type of algae is called a “bloom”.
Rooted aquatic plants are important to the overall health of ponds and lakes. They stabilize the shoreline and pond bottom, tie up plant nutrients thus reducing algae blooms, help the water to clear faster after a rain, produce oxygen and provide food and habitat for the many forms of life that live in and around a pond. Plants also provide nursery habitat for many fish and moderate levels are important for good growth, condition, and abundance of sport fish. Research shows that lakes without rooted plants may not have balanced, desirable fish populations.
Rooted plants are necessary for a healthy pond, but too many can upset a fishing pond’s balance and become a nuisance. Everyone has different tolerances to pond plant life. Most biologists agree that once the plants cover over 40% of the surface area of a pond, they are over-abundant. There are four plant control options: preventative, mechanical, biological and chemical.
+ Plant Control | Preventative
Managing the watershed and deepening the shoreline are preventative and are easiest and most effective to use before the pond is built. Conservation practices like silt retention structures, wetlands, buffer strips and grass waterways in the pond’s watershed keep soil and plant nutrients from reaching the water.
Deepening shorelines create smaller areas where sunlight can reach the pond bottom, reducing the area that rooted plants will grow. Any number of livestock in a pond’s watershed can overload a pond with plant nutrients over time; steps should be taken to divert or contain animal waste products.
+ Plant Control | Mechanical
When preventative measures are not practical, mechanical methods like hand removal, bottom blanketing, shading, and water draw-down can be effective for short-term control. Removal can be done any time of the year. Remove plants by hand, with a rake or by dragging a light wire lattice or steel frame. Many aquatic plants can root from fragments, so be careful to remove all plant stems that float up. Once plants are removed from high-use areas, blanket the pond bottom with sand or gravel to slow plant re-growth. Small areas can be blanketed for 30 days with thick black plastic (punctured to allow gasses to escape) or commercial weed barrier products held with a frame or weighted at the corners.
Pond dye products that reduce light penetration can shade the whole pond. Apply these products early in the growing season; they often need to be re-applied later in the season. Winter drawdown methods expose these dewatered areas to freezing and drying for several weeks through the winter to kill underwater plant roots. Not all kinds of plants can be controlled by this method; it is most effective at controlling species like Elodea, milfoil, coontail and lilies. Pondweed (i.e. Potamogeton) naiad, hydrilla and seed-producing species are not effectively controlled by drawdown. Leave at least eight feet of water depth in the pond to avoid killing fish over a long, snowy winter.
+ Plant Control | Biological (grass carp)
Biological control with grass carp (white amur) can provide effective, long-term control for underwater plants, but will not control algae or shoreline plants like cattails. Stocking too many grass carp can increase the growth of algae and nearly eliminate all aquatic vegetation. Carp are difficult to remove and can live beyond 20 years.
The automatic stocking of grass carp is not recommended for aquatic plant control in new ponds. Use a conservative stocking of 1 to 2 fish per acre for heavy plant growth. These fish should be 10 inches or longer to avoid being eaten by largemouth bass. Be patient, vegetation control may not be noticed for 2-3 growing seasons after stocking. Additional stocking may be needed if no control is seen, or if plant growth returns to nuisance levels.
Vegetation Management and Grass Carp
The Iowa DNR does not stock Grass Carp into public waters and does not recommend them for stocking private ponds. Stocking grass carp often results in increased algal growth and near elimination of all aquatic vegetation. Once stocked, grass carp are hard to remove and can live beyond 20 years.
Although the DNR does not encourage stocking grass carp, they can legally be stocked into private ponds in Iowa. If grass carp are stocked into a private pond, the DNR recommends a conservative stocking of no more than 1-2 ten-inch fish per acre. Pond owners who opt to go this route should be patient as vegetation control may not be seen for 2-3 growing seasons.
Restocking should not occur until rooted aquatics become a problem. Often, additional fish are stocked because vegetation control is not apparent immediately. When the happens, the pond ends up with too many grass carp resulting in too little vegetation, poor water quality, and ultimately sport fishing suffers.
+ Plant Control | Chemical
Chemical control with herbicides is another method for seasonal control of aquatic plants. Follow these five steps with any herbicide application:
Use a pond plant identification guide to help you correctly identify the plants you want to control. If this basic guide does not meet your needs, the Texas AgriLife Extension Service has an interactive website that is useful for identifying aquatic vegetation.
Measure the area to be treated (surface area and depth).
Read the herbicide label to decide the best time and how much to apply.
Identify possible restrictions on uses of the water, e.g., irrigation or watering animals.
Apply according to label directions.
There are several drawbacks to using herbicides to control plants. Control can be ineffective if treatment is applied at the wrong time of year (read the product label for best application times). When there is a large area of vegetation to kill, the decay of all these plants can use much of the oxygen in the water and cause a fish kill. Divide large areas of vegetation into smaller areas to prevent a fish kill. Treat the smaller areas several weeks apart, especially in summer months when plants decay faster and the water holds less oxygen due to warmer water. Control can be temporary and expensive and repeated applications may become necessary. Some herbicides require that selected pond uses stop for a period of time after application. Find an excellent overview of which herbicides will work for different plant types in the Iowa State University Fisheries Extension Service publication Aquatic Plant Management or at the Aquatic Ecosystem Restoration Foundation website. You can also call your local fishery management biologist for help.
Depending upon the level of plant growth, the types of plants present and the intended use of your pond, it may be helpful to use several control methods to get the desired results. For example, hand removal or herbicide control with bottom blanketing in high-use areas with a light stocking of grass carp may work better than any one of these methods alone.
Aquatic Plant Types
Many types of plants grow in a pond.
Rooted plants that stick above the water's surface (emergent), like cattails, are the easiest to see. There are also rooted plants that are completely under the water (submergent), as well as free-floating plants like duckweed.
Algae are the smallest, these can be in cottony filaments that float freely or attach to the bottom as well as single-celled algae that make the water look green and cannot be seen with the naked eye.
Aquatic plants usually become established in a pond without special effort, but some plants are less likely to become a nuisance for anglers or other pond uses. Introducing a variety of these plants can help you meet your pond management goals more quickly. A new pond is like a newly tilled field or garden, something will grow there with nutrients, light and seed. Shoreline species that grow above the water surface suggested for ponds include: arrowhead, pickerel weed, spike rush, sweet flag and water iris. Floating-leaved lilies can be a nice addition to ponds without extensive shallow areas. (Don’t confuse the preferred lily with lotus, which spreads aggressively and would not be a good choice for a pond.) Wild celery and water stargrass can add to the diversity of plants that grow completely under the water. Largeleaf and longleaf pondweed have both underwater and floating leaves. Avoid introducing milfoil (could be the invasive Eurasian milfoil), naiad (invasive brittle naiad), curly-leaf pondweed (invasive), cabomba (invasive submersed plant common in water gardens) and coontail (will colonize on its own).
Purchase aquatic plants from a local nursery or one in a climate zone similar to your pond’s location. A pond plant identification guide can help you identify the plants growing in your pond so you can properly manage them.
Introducing plants in new ponds is a little easier than in existing ponds that already have established plants. Remove the aquatic plants from an existing pond that are growing in the area where you will introduce new plants (see mechanical or chemical removal below). Protect your plantings behind a small, protective fence/cage until they become established to prevent them from being eaten by grass carp or common carp, muskrats, turtles, waterfowl or deer.
Plant 5-20 plants per area to increase plant establishment success . Shoreline plants do best when planted at the water’s edge or in very shallow water. These can be moved using small plugs from patches found growing within the pond. Floating-leaved and underwater species can be planted in water from 6 inches to 2-3 feet deep. There is no need to plant deeper than you can easily reach.
Our MissionTo conserve and enhance ournatural resources in cooperationwith individuals and organizationsto improve the quality of life in Iowa and ensure a legacy forfuture generations. | 2023-09-18T01:27:13.970301 | https://example.com/article/8136 |
Product Info:This fantastic product instantly eliminates frizz and wiry, unmanageable hair by instantly controlling, smoothing and shining! Get soft, glossy hair in seconds with this light, non-greasy serum. It can be used as required to touch up your hair style. A little goes a long way! Our hair serum is ideal for use on just-straightened hair, making it glossy and sleek, while also activating and refining just-curled hair. Extremely economical, you only need a tiny amount to transform and protect your hair. AT Crystal Hair Serum also repels moisture and prevents frizziness in humidity. AT Crystal Hair Serum can be applied to soaking wet hair before styling, or sparingly on newly styled hair as well. Directions for Use: Use a small amount on damp hair before styling for ultimate shine and softness. apply to dry hair before and after straightening to seal split ends and reduce fluffiness.
With flash quick heating and swivel cord, this iron provides great style without
making a mess or taking too much time.
Featuring ergonomic design for easier hold,
the flat iron also has versatile heat settings to provide you with total control for all your hairstyling needs.
Moist ceramic heat with solid ceramic plates and coils will maintain even temperature.
Used by professionals in Hair Salons too as the results are sleek, straight , shiny hair.
If you’re looking for a hair straightener that is versatile, affordable and will help you achieve the styles that you desire with healthy, shiny and beautiful hair, take a good look at Ceramic mini travel Hair straightening iron. It just may be the right product for you.
You may not know what brand to choose, but what you do know is that you want beautiful, healthy hair. Who doesn’t? Ceramic hair straighteners are great because just as their name implies, they use ceramic material for their plates. The ceramic plates allow the hair to glide through the iron smoothly, without snags or damage. This hair straightener will achieve your hairstyle faster without compromising your hair’s moisture as it locks it in using infrared technology for beautiful, shiny hair. And if you have colored hair, it adds more shine and make it look more vibrant than ever.
Tourmaline Plates
Tourmaline plates are made out of gemstones that generate negative ions and far infrared (FIR) rays. The far infrared rays help to lock in moisture in your hair and also remove static which causes your hair to frizz.Due to the concentration of these negative ions hair-straightening time is cut in half and your hair is left feeling much softer and shinier.
Follow us on Facebook
CUSTOMER SERVICE
10.00AM - 7.00PM
Enjoy safe shopping, we will try our best to make your shopping experience a happy one! =)
Supermodel's Secrets is a beauty e-store focused on offering beauty products that works, without burning a hole in your pocket (uh, unless you buy everything in our store at once).Your beauty is our priority, and the quality of our products weigh importantly in our product selection. We bring in only stuff that works - as every product that's offered in our store has gone though painstaking research and/or personal usage and/or testing by our founder, Michelle C or her family members /friends (Feel free to ask her - She'll be happy to answer your queries). Supermodel's Secrets is all about models' real beauty secrets and hence it's name. Read our founder's message to know more. | 2023-09-15T01:27:13.970301 | https://example.com/article/6899 |
SKINNY SECRET - TRADITIONAL INDICATIONS
On an average obese person have greater energy expenditure than their thin counterparts due to the energy required to maintain an increased body mass. When compared to
daily energy turnover, the amount of energy retained during growth and during the development of obesity is rather small, amounting to a difference of only a few
percent between intake and expenditure. Because a positive energy balance can, in principle, be attributed to excessive intake or to reduced expenditure, there has
been considerable interest in the possible significance of even small differences in metabolic efficiency for the development or the prevention of obesity.
Mechanism of action
We have developed a 100% natural, holistic, eco-friendly and system friendly formula SKINNY SECRET to enhance the metabolism and suppressing the appetite.
The herbal supplement is safer and effective for controlling obesity through metabolic regulation. The mechanism of action includes appetite suppression, visceral fat mobilization and burning for energy, control of further fat deposits, controlled calorie absorption from gut especially carbohydrates. This combination of above action is what we consider the answer to obesity.
Alpha-glycosidase and Alpha-amylase enzymes found on the epithelium of small intestines as membrane bound. They catalyze the cleavage of glucose from disaccharides. These two enzymes are partially blocked by two herbal alkaloids. Hence a good amount of carbohydrates are not absorbed, this contributes to combat obesity by reduced calorie absorption.
Congestive Heart Failure - as a therapeutic intervention in congestive heart failure Forskolin has been shown to activate the enzyme adenylate cyclase, which increases production of cyclic adenosine monophosphate (cAMP) in heart muscle cells (cardiac muscle). Epinephrine has a similar effect on increasing cAMP. Increased levels of cAMP in turn, increases the ability of the heart muscle to produce ATP, which is the energy required for heart muscle contraction and optimal force of muscle contraction with each beat (increased stroke volume). Forskolin also relaxes the artery wall, decreasing blood pressure and thus, pre-load stress on the heart muscle. All of these effects appear to be mediated via increased cAMP synthesis, which acts as a secondary messenger on various cellular processes that manifest the stated outcomes.
Platelet Function Forskolin antagonizes the action of platelet-activating factor (PAF) by interfering with the binding of PAF to receptor sites on cells. In turn, this reduces platelet stickiness as well as smooth muscle contraction of blood vessels and bronchiole air passageways. Once again, these effects are mediated through increased synthesis of cAMP.
Recent evidence suggests that supplementation with Coleus Forskohliimay help to reduce body fat in overweight adults. As with other substances that increase cAMP (caffeine, adrenaline, ephedrine, epinephrine), Forskolin enhances the breakdown and release of fat from fat cells. The synthesis of cAMP in fat cells initiates a chain events that results in hydrolysis of stored triglycerides by hormone sensitive lipase enzyme, with the subsequent release of free fatty acids and glycerol from fat cells.8,9,10 Unlike ephedrine and other central nervous system stimulants, Forskolin does not stimulate the nervous system.
Gymnemic acid in the formulation has also been found useful against obesity, according to recent reports. This is attributed to the ability of gymnemic acids to delay the glucose absorption in the blood. The atomic arrangement of gymnemic acid molecules is similar to that of glucose molecules. These molecules fill the receptor locations on the taste buds thereby preventing its activation by sugar molecules present in the food, thereby curbing the sugar craving. Similarly, Gymnemic acid molecules fill the receptor location in the absorptive external layers of the intestine thereby preventing the sugar molecules absorption by the intestine, which results in low blood sugar level.
Reduced Calorie Absorption
Visceral Lipase enzyme is targeted and hence fat from viscera is mobilized for burning to release energy. Citric acid cycle enzymes are affected negatively for
gluco-neogenesis. Further fat formation from Acetyl coenzyme A is checked. In the same time energy is sufficient in the body as the fat is burning continually. Natural
anti-oxidants, minerals and micro nutrients are supplemented for stomach and liver protection.
The herbs in the supplement contain Pregnane Glycosides which are believed to block the activity of Citrate Lyase. By blocking this enzyme further formation of fat in
the body is reduced. Again the herb blocks another enzyme called Malonyl Coenzyme A. By blocking this enzyme, fat formation is further blocked and the body is forced
to burn its fat reserves. This accelerates the rate of fat loss by the body.
The Pregnane Glycosides in the herb also inhibit the appetite centre of the hypothalamus. Such a combination of natural ingredients could bring very good therapeutic
results in reducing both body weight and size. Transabdominal and mid arm circumference can be measured to monitored this effect within 30 days usage of SKINNY SECRET.
A 45-year-old woman complains that she has gradually put on 12 pounds over the past year. In the last month, she's faced a stressful work deadline and added
another 4 pounds to her frame.
This individual's goal is to lose the 16 pounds she has gained. Since her weight has been gradually increasing, she knows that she is consuming more calories than
she is burning, especially with her sedentary job. She decides that a weight loss of 1 pound per week (equal to a deficit of about 3,500 calories, or cutting 500
calories per day) would be acceptable and would allow her to reach her goal in about four months.
She decides to make some changes that will allow her to cut back an average of 250 calories per day.
Skipping a large glass of sweetened iced tea will save about 200 calories.
Substituting mineral water for the cola she regularly drinks during meetings can save another 150 calories.
Foregoing her morning muffin snack (or eating only half a muffin) can also save 250 calories or more.
To reach her goal of a 500-calorie-per-day savings, she adds some exercise.
Getting up early for a 20-minute walk before work and adding a 10-minute walk during her lunch break add up to a half hour of walking per day, which can burn
about 200 calories.
On weekends, she plans to walk for 60 minutes one day and spend one hour gardening the next day for even greater calorie burning. If walking for 60 minutes is too much,
two 30-minute walks one day would burn the same number of calories.
Twice per week she plans to stop at the gym on the way home from work, even if only for a half hour of stationary cycling or swimming(each burning up to
250 calories).
By making just some of the dietary cutbacks mentioned and starting some moderate exercise, this individual can easily "save" the 3,500 calories per week needed for a 1-pound weight loss, leading to a healthy rate of weight loss without extreme denial or deprivation. Furthermore, her changes in diet and lifestyle are small and gradual, modifications that she can maintain over time.
6 tips for successful weight loss
The desire to lose weight must come from the individual. If you're truly ambivalent about making changes in your lifestyle or are doing this to please someone else,
you're likely to fail. When making changes, decide what's right for your lifestyle. Your best friend's diet and exercise plan may be completely wrong for your habits and
interests. The key is to find a system that works for you.
Don't blame yourself if you aren't perfect. If you once fail at your attempt to curtail your overeating, it doesn't mean you are a failure at weight control and that
you should just give up. Accept that you made a poor choice, but don't let that poor choice influence the rest of your plan. The same holds true with exercise. Skipping
a few workouts doesn't mean you can't get back on track. Weight control does not involve making perfect choices all the time, rather it's about attempting to make good
choices more often than poor ones.
Avoid surroundings where you know you're tempted to make poor food choices. Everyone has a time when we're most likely to overeat, whether it's the morning coffee
break or after-work gathering with friends. Try to plan other activities or distractions for those times, or plan in advance how you're going to handle
them and stick to it.
Surround yourself with people who support your efforts. Even our good friends can knowingly or unknowingly sabotage weight-loss attempts. Spend time with
those people who will not pressure you to make poor food choices.
Stock your pantry and refrigerator with healthy foods. Get rid of the high-calorie, low-nutrition snacks like chips and candy. But don't forget to have plenty
of healthier options available as well, such as popcorn (hold the butter, try Parmesan cheese sprinkles), low-fat cheese and yogurt, fruit, instant cocoa without
added sugar, sugar-free popsicles or puddings, or whatever appeals to you when you're hungry for a snack.
Set small goals and focus on these rather than the "big picture." Decide where you want to be in a week or in a month, rather than focusing on the total
amount of weight you'd like to lose.
SKINNY SECRET - TESTIMONIALS
First of all, I have to thank Skinny Secret MOST of all for helping me to walk without a cane. My knee joint was very damaged and I was in severe pain. All of this was
due to the fact that I was so overweight. I couldn't walk freely at all without someone's help. My doctor told me that losing weight was the only way to help my knee
because my current weight was putting too much pressure on the joint. I try to only use natural medicines for any ailment that I have. I have tried almost every natural
formula on the internet but I have continuously been disappointmed. I was discussing my frustration with one of my friends and she told me about your product Skinny
Secret. I was skeptical of course because at this point I had already wasted so much money and time on other products thatclaimed to work but did not. I took a chance
only because my friend had lost so much weight on it and really believed in it. I am veryhappy that I took that chance. The results were unbelievable! I am proud to say
that I have now lost a total of 90 lbs in only 5 months. The weight loss was gradual at first but still I was encouraged by it so I continued. I feel better than I have
in a very long time thanks to you and your product. I feel lighter, more confident, energetic and I am now walking without a cane and need no assitance at all. Now I keep
your product in my house at all times and take a very low dose for maintenance. I eat whatever I want and I don't gain weight! A million thanks to Skinny secret and
your team on the site for being so supportive through this whole process.
Marianne Bachmeier
New York
This product blew my mind! I have to tell you that it's the best weight loss remedy I have ever used. In contrast to other weight loss products, I don't feel hyper
from it at all. I used "Skinny Secret" for only a month and already lost 15 lbs. I am so happy with it that I had to write to you and express my gratitude.
On June 23rd of 2010 I was in an accident and fractured both my legs. I bedridden for almost 7 months. It was a very difficult thing for me because I am normally a
very active person. I spent most of the time in bed, as I couldn't use my legs. All I could do was watch TV , read and talk on the phone. I did a tremendous amount
of snacking with no activity. The result was me gainig a great deal of weight. I am 20 years old and I am 5'7. I ballonned up to almost 215 lbs! esulting put up my
weight. I was miserable and felt there was nothing I could do about it.
When my legs were finally healed enough for me to get out of bed and start getting active again, My Indian buddy suggested that I try some Yoga and some herbal
supplements to lose the weight. The Yoga was just too difficult for me because my legs were not back to normal yet. I tried using over the counter weight loss drugs
but the only result was me feeling jittery and a constant racing heart. I knew this could not be good for my health. I found Skinny Secret while surfing the internet
for natural weight loss solutions. The testimonials on the website encouraged me to try Skinny Secret and I asked my Indian buddy to check it out. He was familiar
with the Chavarcode family name and told me how well known you were in India for your Aryuvedic medicine. That was all I needed to feel confident in placing my first
order.
In the first month alone, I lost 15 lbs and I am still losing weight. I have no side effects at all . It has really been a pleasant surprise.
I am writing a testimonial only because I really believe in your product and feel very comfortable recommending it. On the internet you see countless "remedies"
for weight lost but this is a real deal. Skinny Secret is the safest and most effective product that I know for losing weight.I strongly recommend it.
Michael Bayer
Nashville, Tennessee
During my pregnancy, I gained a lot of weight . I ate whatever I wanted and didn't think twice about it. When I finally delivered my son by C-section, it was the happiest
time in my life. But underneath it all, I just didn't feel good about myself because I couldn't take the weight off. I wasn't able to exercise because the C-section and I
never wanted to go anywhere public with my husband because I couldn't fit into any of my clothes. It was a very hard time for me and I had lost a lot of confidence in
myself. Finally, I resorted to taking weight loss pills from the pharmacy and also tried to control my diet. The pills were horrible. I was aggitated all the time and
feeling very over stimulated. It even interfered with my interaction with the baby. I just could not use them anymore.
I found Skinny Secret ion the internet just by chance. It was all natural and every testimoniall that I read said that it had no bad side effects. So I decided to give it
a try although I wasn't very hopeful.
In the first week on skinny Secret I lost 5 pounds right off the bat. It helpedto decrease my appetite with absolutely no aggitation at all. I was back to my old self
again and losing weight at the same time.
Now, I've been on Skinny Secret for almost 3 months and I just placed a new order. I have already lost a total of almost 50 pounds and I feel wonderful. I love Skinny
Secret because I can eat whatever I want and still loss weight. The bonus is that is 100% natural. My weight loss has been fast and stable and I am excited to continue
untill I reach my goal weight. I highly recommend Skinny secret for effective and safe weight loss for anyone and especially new Moms that feel like I felt.
Janet Foster
Philadelphia, PA
This is the first testimonial that I have ever written in my life! I want to thank you for this incredible weight loss supplement. I have lost over 40 pounds over only
a five month period of time. I am totally amazed! I have also lost over 5 inches in my waist and 2 inches from my chest. I cannot express to you how great I feel! I just
ordered more and for the first time, I was happy to spend money on a product
I have battled with my weight for over 8 years. It was a constant source of shame for me. I was never really happy with myself because of it. I heard about Skinny
Secret from a friend who had lost a lot of weight on it. I had already tried many weight loss medications and even many herbal remedies. Some worked a bit but with
too many side effects. Other didn't work at all. In the end , even when I did take some weight off, I would put it right back on. I lost all motivation and was just
drained from trying everything with no success. I got to a point that I just accepted the fact that I was going to be overweight for the rest of my life. In the last
few years, I spent thousands of dollars buying exercise equipment for my house. All of that money was wasted because I just couldn't take the weight off. Of course it
is always good to exercise for Cardiovascular health etc but it was doing nothing for my weight.
In the past five months using skinny secret, I have accomplished more of my goal than I have in all of these years.I am more than happy to recommend Skinny Secret to
anyone who knows the pain of being overweightlose weight. Thank you to Gurus Garden for creating Skinny Secret. This is the answer that I've been searching for and has
changed my whole life.
Sharon Gordon,
South Amboy, New Jersey
Coming out of college as a single mom with a large school loan debt, really took a toll on my personal life. I was totally overwhelmed and became severely depressed.
I began over eating because of it and by my 24th birthday, I weighed just over 204 lbs. My pants size grew to a size 18-22. I thought I would never get back my shape again.
It was a vicious cycle, the depression led to eating, the eating to weight gain and the weight gain to more depression.
A friend told me that she had lost 21lbs in only three months on Skinny Secret. I hadn't seen her in some time and couldn'y believe the difference when I did.
I went home and ordered it right away.
The results for me have been life changing! I feel more energetic in my life . When I started noticing my weight dropping , I began to gain more confidence I
still needed to overcome my binge eating habit but Skinny Secret helped me to do that. In total, I have lost 65 lbs. in only 6 months. I feel so good in so many ways.
Priscilla Marquez
Miami, Florida
My wife and I are just finishing up with our 2rd bottle of the Skinny Secret that we purchased from your site. I just wanted to tell you how pleased we are with this product.
There are no side effects, unlike others we have tried and it effectively curbs your appetite. We started losing weight naturally and with no effort. We both feel more
energetic and confident about our appearance.
I have lost 33lbs so far and my wife has lost 38lbs. We are placing an order for another 6 bottles today and my sister in law and her husband are placing thir first
order also. They are very excited to start because they see what it has done for us. We love your product and we recommend it to others all the time now. Thank you
so much.
John Plant
Columbus, Ohio
My name is Brooke and I am a journalist. I can't keep myself on a consistent daily schedule because of my crazy lifestyle. I put on a lot of weight over the last 2 years.
My work clothes became very tight and my weight was starting to interfere with my job.
I was in search of a natural herbal supplement to help me take the weight off . I was looking for something affordable that would get me back to my original size.
That's when I found the Skinny Secret. I've been taking it for the last 4 months and I can't get over how much weight I've lost without any side effect. I have lost 32
pounds in four months. I like that it is has been gradual because I know it's healthier that way. I've gone down a few dress sizes and I feel fabulous! I am very thankful
to Skinny Secret because it has been easy and effective.
Brooke Eichmann
Dallas, Texas
I started taking Skinny Secret a little over two weeks ago and I have already lost 8 pounds ! I haven't felt hungry and have had no side effects at all. It's been absolutely
amazing! Thanks Skinny Secret!!
Robert Farewell
Little Rock, Arkansas
I am the mother of 5 children and I am 43years old. I weighed 180lbs when I started taking Skinny Secret 2 months ago. My goal was to get down to 145 lbs. I can't believe
I'm saying this butI have lost 20 lbs in 2 months!!! I feel so much more confident and I have more energy now to handle my children. I can finally fit into
my "Thin Clothes" again! I am so thankful to Skinny Secret and Gurus garden for all the help. I love you guys!
Mary Gabriel,
Havre, Montana
I would like to say thank you to Skinny Secret. I have been trying to lose weight for over 2 years without any success. I had a lot of extra fat around my midsection and
stomach area and workouts were not doing anything for it. When I started taking the Skinny Secret in the beginning of January, my weight was 219 lbs. After 30 days, my
weight went down to 198. Now it is February 24th and I'm at 184 lbs. This is very good progress for me being that I'm also diabetic. I have been diabetic for 18 years
and have always needed large amounts of insulin to stabalize me, but ever since I've been on Skinny Secret I have only needed half of the amount of Insulin than I have
needed before. I'm not getting the same ups and downs in blood sugar throughout the day. This is alll so amazing to me because I only took Skinny Secret to lose weight.
I had no idea that it was also possible to improve my diabeted. Also, the fact that there are no side effects. Is unbelievable because I am hypersensitive to Meds. I am
still taking my prescription medication but I take those alongside of Skinny Secret. I really feel better than I have in many years. I have already recommended Skinny
Secret to my friends and co-workers because there are no ifs, ands or buts about it, this stuff is incredible!
Jacquelyn Smith
Beverly Hills, California
I ordered Skinny Secret after reading about it on your site. I've been taking it for a little over 3 weeks now and I've already lost 12 pounds. Within the first week of
taking it ,I felt a lift in my energy level and my mood was better. I've noticed a huge difference in my metabolism as well. I've suffered from severe digestion problems
my entire life, but ever since I started taking Skinny Secret, my system is handling food so much better. I haven't changed my diet other than including Skinny Secret in
my daily routine. This has been the most beneficial dietary supplement I have ever taken. I am really so grateful to Skinny Secret. It has helped me tremendously.
Rebecca Kennedy
Boston, Massachusetts
My target goal was to lose 15 pounds in one month. With the help of Skinny Secret I achieved my goal within five weeks with no problem at all. I was very cautious about
trying any type of weight loss aid. While reading on your site I saw others saying that Skinny Secret was safe but I was very skeptical. In the end I decided to give it
a try anyway. I have had no side effects of any kind and I feel more energetic. Skinny Secret worked very well for me. Im glad that I took a chance because this time it
paid off. I would definitly recommend this product.
Tim Carrie
Augusta, Maine
SKINNY SECRET - HEALING CRISIS
It is well tolerated and no side effects noted. Bulky
stools reported when more carbohydrates are taken, as disaccharides cleavage to its mono form is partially blocked.
Initial few days mild blotting is rarely reported that disappears in short while.
On an average obese person have greater energy expenditure than their thin counterparts due to the energy required to maintain an increased body mass. When compared to
daily energy turnover, the amount of energy retained during growth and during the development of obesity is rather small, amounting to a difference of only a few
percent between intake and expenditure. Because a positive energy balance can, in principle, be attributed to excessive intake or to reduced expenditure, there has
been considerable interest in the possible significance of even small differences in metabolic efficiency for the development or the prevention of obesity.
Mechanism of action
We have developed a 100% natural, holistic, eco-friendly and system friendly formula SKINNY SECRET to enhance the metabolism and suppressing the appetite.
The herbal supplement is safer and effective for controlling obesity through metabolic regulation. The mechanism of action includes appetite suppression, visceral fat mobilization and burning for energy, control of further fat deposits, controlled calorie absorption from gut especially carbohydrates. This combination of above action is what we consider the answer to obesity.
Alpha-glycosidase and Alpha-amylase enzymes found on the epithelium of small intestines as membrane bound. They catalyze the cleavage of glucose from disaccharides. These two enzymes are partially blocked by two herbal alkaloids. Hence a good amount of carbohydrates are not absorbed, this contributes to combat obesity by reduced calorie absorption.
Congestive Heart Failure - as a therapeutic intervention in congestive heart failure Forskolin has been shown to activate the enzyme adenylate cyclase, which increases production of cyclic adenosine monophosphate (cAMP) in heart muscle cells (cardiac muscle). Epinephrine has a similar effect on increasing cAMP. Increased levels of cAMP in turn, increases the ability of the heart muscle to produce ATP, which is the energy required for heart muscle contraction and optimal force of muscle contraction with each beat (increased stroke volume). Forskolin also relaxes the artery wall, decreasing blood pressure and thus, pre-load stress on the heart muscle. All of these effects appear to be mediated via increased cAMP synthesis, which acts as a secondary messenger on various cellular processes that manifest the stated outcomes.
Platelet Function Forskolin antagonizes the action of platelet-activating factor (PAF) by interfering with the binding of PAF to receptor sites on cells. In turn, this reduces platelet stickiness as well as smooth muscle contraction of blood vessels and bronchiole air passageways. Once again, these effects are mediated through increased synthesis of cAMP.
Recent evidence suggests that supplementation with Coleus Forskohliimay help to reduce body fat in overweight adults. As with other substances that increase cAMP (caffeine, adrenaline, ephedrine, epinephrine), Forskolin enhances the breakdown and release of fat from fat cells. The synthesis of cAMP in fat cells initiates a chain events that results in hydrolysis of stored triglycerides by hormone sensitive lipase enzyme, with the subsequent release of free fatty acids and glycerol from fat cells.8,9,10 Unlike ephedrine and other central nervous system stimulants, Forskolin does not stimulate the nervous system.
Gymnemic acid in the formulation has also been found useful against obesity, according to recent reports. This is attributed to the ability of gymnemic acids to delay the glucose absorption in the blood. The atomic arrangement of gymnemic acid molecules is similar to that of glucose molecules. These molecules fill the receptor locations on the taste buds thereby preventing its activation by sugar molecules present in the food, thereby curbing the sugar craving. Similarly, Gymnemic acid molecules fill the receptor location in the absorptive external layers of the intestine thereby preventing the sugar molecules absorption by the intestine, which results in low blood sugar level.
Reduced Calorie Absorption
Visceral Lipase enzyme is targeted and hence fat from viscera is mobilized for burning to release energy. Citric acid cycle enzymes are affected negatively for
gluco-neogenesis. Further fat formation from Acetyl coenzyme A is checked. In the same time energy is sufficient in the body as the fat is burning continually. Natural
anti-oxidants, minerals and micro nutrients are supplemented for stomach and liver protection.
The herbs in the supplement contain Pregnane Glycosides which are believed to block the activity of Citrate Lyase. By blocking this enzyme further formation of fat in
the body is reduced. Again the herb blocks another enzyme called Malonyl Coenzyme A. By blocking this enzyme, fat formation is further blocked and the body is forced
to burn its fat reserves. This accelerates the rate of fat loss by the body.
The Pregnane Glycosides in the herb also inhibit the appetite centre of the hypothalamus. Such a combination of natural ingredients could bring very good therapeutic
results in reducing both body weight and size. Transabdominal and mid arm circumference can be measured to monitored this effect within 30 days usage of SKINNY SECRET.
A 45-year-old woman complains that she has gradually put on 12 pounds over the past year. In the last month, she's faced a stressful work deadline and added
another 4 pounds to her frame.
This individual's goal is to lose the 16 pounds she has gained. Since her weight has been gradually increasing, she knows that she is consuming more calories than
she is burning, especially with her sedentary job. She decides that a weight loss of 1 pound per week (equal to a deficit of about 3,500 calories, or cutting 500
calories per day) would be acceptable and would allow her to reach her goal in about four months.
She decides to make some changes that will allow her to cut back an average of 250 calories per day.
Skipping a large glass of sweetened iced tea will save about 200 calories.
Substituting mineral water for the cola she regularly drinks during meetings can save another 150 calories.
Foregoing her morning muffin snack (or eating only half a muffin) can also save 250 calories or more.
To reach her goal of a 500-calorie-per-day savings, she adds some exercise.
Getting up early for a 20-minute walk before work and adding a 10-minute walk during her lunch break add up to a half hour of walking per day, which can burn
about 200 calories.
On weekends, she plans to walk for 60 minutes one day and spend one hour gardening the next day for even greater calorie burning. If walking for 60 minutes is too much,
two 30-minute walks one day would burn the same number of calories.
Twice per week she plans to stop at the gym on the way home from work, even if only for a half hour of stationary cycling or swimming(each burning up to
250 calories).
By making just some of the dietary cutbacks mentioned and starting some moderate exercise, this individual can easily "save" the 3,500 calories per week needed for a 1-pound weight loss, leading to a healthy rate of weight loss without extreme denial or deprivation. Furthermore, her changes in diet and lifestyle are small and gradual, modifications that she can maintain over time.
6 tips for successful weight loss
The desire to lose weight must come from the individual. If you're truly ambivalent about making changes in your lifestyle or are doing this to please someone else,
you're likely to fail. When making changes, decide what's right for your lifestyle. Your best friend's diet and exercise plan may be completely wrong for your habits and
interests. The key is to find a system that works for you.
Don't blame yourself if you aren't perfect. If you once fail at your attempt to curtail your overeating, it doesn't mean you are a failure at weight control and that
you should just give up. Accept that you made a poor choice, but don't let that poor choice influence the rest of your plan. The same holds true with exercise. Skipping
a few workouts doesn't mean you can't get back on track. Weight control does not involve making perfect choices all the time, rather it's about attempting to make good
choices more often than poor ones.
Avoid surroundings where you know you're tempted to make poor food choices. Everyone has a time when we're most likely to overeat, whether it's the morning coffee
break or after-work gathering with friends. Try to plan other activities or distractions for those times, or plan in advance how you're going to handle
them and stick to it.
Surround yourself with people who support your efforts. Even our good friends can knowingly or unknowingly sabotage weight-loss attempts. Spend time with
those people who will not pressure you to make poor food choices.
Stock your pantry and refrigerator with healthy foods. Get rid of the high-calorie, low-nutrition snacks like chips and candy. But don't forget to have plenty
of healthier options available as well, such as popcorn (hold the butter, try Parmesan cheese sprinkles), low-fat cheese and yogurt, fruit, instant cocoa without
added sugar, sugar-free popsicles or puddings, or whatever appeals to you when you're hungry for a snack.
Set small goals and focus on these rather than the "big picture." Decide where you want to be in a week or in a month, rather than focusing on the total
amount of weight you'd like to lose.
First of all, I have to thank Skinny Secret MOST of all for helping me to walk without a cane. My knee joint was very damaged and I was in severe pain. All of this was
due to the fact that I was so overweight. I couldn't walk freely at all without someone's help. My doctor told me that losing weight was the only way to help my knee
because my current weight was putting too much pressure on the joint. I try to only use natural medicines for any ailment that I have. I have tried almost every natural
formula on the internet but I have continuously been disappointmed. I was discussing my frustration with one of my friends and she told me about your product Skinny
Secret. I was skeptical of course because at this point I had already wasted so much money and time on other products thatclaimed to work but did not. I took a chance
only because my friend had lost so much weight on it and really believed in it. I am veryhappy that I took that chance. The results were unbelievable! I am proud to say
that I have now lost a total of 90 lbs in only 5 months. The weight loss was gradual at first but still I was encouraged by it so I continued. I feel better than I have
in a very long time thanks to you and your product. I feel lighter, more confident, energetic and I am now walking without a cane and need no assitance at all. Now I keep
your product in my house at all times and take a very low dose for maintenance. I eat whatever I want and I don't gain weight! A million thanks to Skinny secret and
your team on the site for being so supportive through this whole process.
Marianne Bachmeier
New York
This product blew my mind! I have to tell you that it's the best weight loss remedy I have ever used. In contrast to other weight loss products, I don't feel hyper
from it at all. I used "Skinny Secret" for only a month and already lost 15 lbs. I am so happy with it that I had to write to you and express my gratitude.
On June 23rd of 2010 I was in an accident and fractured both my legs. I bedridden for almost 7 months. It was a very difficult thing for me because I am normally a
very active person. I spent most of the time in bed, as I couldn't use my legs. All I could do was watch TV , read and talk on the phone. I did a tremendous amount
of snacking with no activity. The result was me gainig a great deal of weight. I am 20 years old and I am 5'7. I ballonned up to almost 215 lbs! esulting put up my
weight. I was miserable and felt there was nothing I could do about it.
When my legs were finally healed enough for me to get out of bed and start getting active again, My Indian buddy suggested that I try some Yoga and some herbal
supplements to lose the weight. The Yoga was just too difficult for me because my legs were not back to normal yet. I tried using over the counter weight loss drugs
but the only result was me feeling jittery and a constant racing heart. I knew this could not be good for my health. I found Skinny Secret while surfing the internet
for natural weight loss solutions. The testimonials on the website encouraged me to try Skinny Secret and I asked my Indian buddy to check it out. He was familiar
with the Chavarcode family name and told me how well known you were in India for your Aryuvedic medicine. That was all I needed to feel confident in placing my first
order.
In the first month alone, I lost 15 lbs and I am still losing weight. I have no side effects at all . It has really been a pleasant surprise.
I am writing a testimonial only because I really believe in your product and feel very comfortable recommending it. On the internet you see countless "remedies"
for weight lost but this is a real deal. Skinny Secret is the safest and most effective product that I know for losing weight.I strongly recommend it.
Michael Bayer
Nashville, Tennessee
During my pregnancy, I gained a lot of weight . I ate whatever I wanted and didn't think twice about it. When I finally delivered my son by C-section, it was the happiest
time in my life. But underneath it all, I just didn't feel good about myself because I couldn't take the weight off. I wasn't able to exercise because the C-section and I
never wanted to go anywhere public with my husband because I couldn't fit into any of my clothes. It was a very hard time for me and I had lost a lot of confidence in
myself. Finally, I resorted to taking weight loss pills from the pharmacy and also tried to control my diet. The pills were horrible. I was aggitated all the time and
feeling very over stimulated. It even interfered with my interaction with the baby. I just could not use them anymore.
I found Skinny Secret ion the internet just by chance. It was all natural and every testimoniall that I read said that it had no bad side effects. So I decided to give it
a try although I wasn't very hopeful.
In the first week on skinny Secret I lost 5 pounds right off the bat. It helpedto decrease my appetite with absolutely no aggitation at all. I was back to my old self
again and losing weight at the same time.
Now, I've been on Skinny Secret for almost 3 months and I just placed a new order. I have already lost a total of almost 50 pounds and I feel wonderful. I love Skinny
Secret because I can eat whatever I want and still loss weight. The bonus is that is 100% natural. My weight loss has been fast and stable and I am excited to continue
untill I reach my goal weight. I highly recommend Skinny secret for effective and safe weight loss for anyone and especially new Moms that feel like I felt.
Janet Foster
Philadelphia, PA
This is the first testimonial that I have ever written in my life! I want to thank you for this incredible weight loss supplement. I have lost over 40 pounds over only
a five month period of time. I am totally amazed! I have also lost over 5 inches in my waist and 2 inches from my chest. I cannot express to you how great I feel! I just
ordered more and for the first time, I was happy to spend money on a product
I have battled with my weight for over 8 years. It was a constant source of shame for me. I was never really happy with myself because of it. I heard about Skinny
Secret from a friend who had lost a lot of weight on it. I had already tried many weight loss medications and even many herbal remedies. Some worked a bit but with
too many side effects. Other didn't work at all. In the end , even when I did take some weight off, I would put it right back on. I lost all motivation and was just
drained from trying everything with no success. I got to a point that I just accepted the fact that I was going to be overweight for the rest of my life. In the last
few years, I spent thousands of dollars buying exercise equipment for my house. All of that money was wasted because I just couldn't take the weight off. Of course it
is always good to exercise for Cardiovascular health etc but it was doing nothing for my weight.
In the past five months using skinny secret, I have accomplished more of my goal than I have in all of these years.I am more than happy to recommend Skinny Secret to
anyone who knows the pain of being overweightlose weight. Thank you to Gurus Garden for creating Skinny Secret. This is the answer that I've been searching for and has
changed my whole life.
Sharon Gordon,
South Amboy, New Jersey
Coming out of college as a single mom with a large school loan debt, really took a toll on my personal life. I was totally overwhelmed and became severely depressed.
I began over eating because of it and by my 24th birthday, I weighed just over 204 lbs. My pants size grew to a size 18-22. I thought I would never get back my shape again.
It was a vicious cycle, the depression led to eating, the eating to weight gain and the weight gain to more depression.
A friend told me that she had lost 21lbs in only three months on Skinny Secret. I hadn't seen her in some time and couldn'y believe the difference when I did.
I went home and ordered it right away.
The results for me have been life changing! I feel more energetic in my life . When I started noticing my weight dropping , I began to gain more confidence I
still needed to overcome my binge eating habit but Skinny Secret helped me to do that. In total, I have lost 65 lbs. in only 6 months. I feel so good in so many ways.
Priscilla Marquez
Miami, Florida
My wife and I are just finishing up with our 2rd bottle of the Skinny Secret that we purchased from your site. I just wanted to tell you how pleased we are with this product.
There are no side effects, unlike others we have tried and it effectively curbs your appetite. We started losing weight naturally and with no effort. We both feel more
energetic and confident about our appearance.
I have lost 33lbs so far and my wife has lost 38lbs. We are placing an order for another 6 bottles today and my sister in law and her husband are placing thir first
order also. They are very excited to start because they see what it has done for us. We love your product and we recommend it to others all the time now. Thank you
so much.
John Plant
Columbus, Ohio
My name is Brooke and I am a journalist. I can't keep myself on a consistent daily schedule because of my crazy lifestyle. I put on a lot of weight over the last 2 years.
My work clothes became very tight and my weight was starting to interfere with my job.
I was in search of a natural herbal supplement to help me take the weight off . I was looking for something affordable that would get me back to my original size.
That's when I found the Skinny Secret. I've been taking it for the last 4 months and I can't get over how much weight I've lost without any side effect. I have lost 32
pounds in four months. I like that it is has been gradual because I know it's healthier that way. I've gone down a few dress sizes and I feel fabulous! I am very thankful
to Skinny Secret because it has been easy and effective.
Brooke Eichmann
Dallas, Texas
I started taking Skinny Secret a little over two weeks ago and I have already lost 8 pounds ! I haven't felt hungry and have had no side effects at all. It's been absolutely
amazing! Thanks Skinny Secret!!
Robert Farewell
Little Rock, Arkansas
I am the mother of 5 children and I am 43years old. I weighed 180lbs when I started taking Skinny Secret 2 months ago. My goal was to get down to 145 lbs. I can't believe
I'm saying this butI have lost 20 lbs in 2 months!!! I feel so much more confident and I have more energy now to handle my children. I can finally fit into
my "Thin Clothes" again! I am so thankful to Skinny Secret and Gurus garden for all the help. I love you guys!
Mary Gabriel,
Havre, Montana
I would like to say thank you to Skinny Secret. I have been trying to lose weight for over 2 years without any success. I had a lot of extra fat around my midsection and
stomach area and workouts were not doing anything for it. When I started taking the Skinny Secret in the beginning of January, my weight was 219 lbs. After 30 days, my
weight went down to 198. Now it is February 24th and I'm at 184 lbs. This is very good progress for me being that I'm also diabetic. I have been diabetic for 18 years
and have always needed large amounts of insulin to stabalize me, but ever since I've been on Skinny Secret I have only needed half of the amount of Insulin than I have
needed before. I'm not getting the same ups and downs in blood sugar throughout the day. This is alll so amazing to me because I only took Skinny Secret to lose weight.
I had no idea that it was also possible to improve my diabeted. Also, the fact that there are no side effects. Is unbelievable because I am hypersensitive to Meds. I am
still taking my prescription medication but I take those alongside of Skinny Secret. I really feel better than I have in many years. I have already recommended Skinny
Secret to my friends and co-workers because there are no ifs, ands or buts about it, this stuff is incredible!
Jacquelyn Smith
Beverly Hills, California
I ordered Skinny Secret after reading about it on your site. I've been taking it for a little over 3 weeks now and I've already lost 12 pounds. Within the first week of
taking it ,I felt a lift in my energy level and my mood was better. I've noticed a huge difference in my metabolism as well. I've suffered from severe digestion problems
my entire life, but ever since I started taking Skinny Secret, my system is handling food so much better. I haven't changed my diet other than including Skinny Secret in
my daily routine. This has been the most beneficial dietary supplement I have ever taken. I am really so grateful to Skinny Secret. It has helped me tremendously.
Rebecca Kennedy
Boston, Massachusetts
My target goal was to lose 15 pounds in one month. With the help of Skinny Secret I achieved my goal within five weeks with no problem at all. I was very cautious about
trying any type of weight loss aid. While reading on your site I saw others saying that Skinny Secret was safe but I was very skeptical. In the end I decided to give it
a try anyway. I have had no side effects of any kind and I feel more energetic. Skinny Secret worked very well for me. Im glad that I took a chance because this time it
paid off. I would definitly recommend this product.
It is well tolerated and no side effects noted. Bulky
stools reported when more carbohydrates are taken, as disaccharides cleavage to its mono form is partially blocked.
Initial few days mild blotting is rarely reported that disappears in short while.
WARNING :-
This traditional herbal food
supplement is derived and time tested by Chavarcode Ayurvedic physicians.
Results may vary among users. These statements have not been evaluated by the
FDA. Products featured here are not intended to diagnose, cure, prevent or
treat any diseases and should not substitute treatment by a registered medical
practitioner. We do not claim that the products or dietary supplements
mentioned can protect you from developing serious diseases and recommend that
you never delay or forego regular screening, or forfeit the opportunity for
early medical treatment that may be critical to survival. You are advised never
to self-treat for a serious disease without benefit of a medical diagnosis or
treatment. Please consult your physician before beginning any course of
treatment.
Navigation
Testimonials
I've been trying to get a civil service job but it requires me to pass a very difficult physical exam. The exam includes a great deal of cardio including a running. With my knee being in such bad shape there was just no way I could pass it. Read more | 2023-12-24T01:27:13.970301 | https://example.com/article/8985 |
An intraarticular fibroma of the tendon sheath in the knee joint.
Fibromas that usually occur in the tendon sheaths of the wrist and hand are extremely rare in intra-articular locations. Only five such cases in the knee joint have been reported so far. This is a case report of an intra-articular fibroma of the tendon sheath of the knee joint arising adjacent to posterior cruciate ligament (PCL). Magnetic resonance imaging (MRI) revealed a well-defined intra-articular lesion in the region of the intercondylar notch of the femur behind the PCL. The mass was excised by arthrotomy. Histopathological study confirmed the diagnosis. | 2023-11-19T01:27:13.970301 | https://example.com/article/6343 |
Kendra Wilkinson Puts Away the Stripper Pole for Baby’s Sake
For instance, one might have to set aside one’s stripper pole until the little blessing-to-be arrives.
The former Girls Next Door girl, who’s expecting her first child with husband Hank Baskett in December, tells E! Online, “The stripper pole’s coming down now because of the baby. Not forever, but for a while. It will be hung up in the closet.”
One thing Wilkinson isn’t cutting back on: calories. The mom-to-be admits that she’s willing to pack on the pounds if it means a healthy newborn.
“I’m concentrating more on what’s healthy for the baby more than my weight gain,” Wilkinson continues. “I know my weight gain will go away very fast, so if I gain weight and that’s what it takes to make my baby healthy, that’s what has to happen.”
And, hey; no better way to work off the baby weight than busting out some moves on the stripper pole. And so the circle of life continues… | 2024-05-17T01:27:13.970301 | https://example.com/article/7171 |
Introducing the Q-Drive: A concept that offers the possibility of interstellar flight
If Breakthrough Starshot is tackling the question of velocities at a substantial percentage of lightspeed, what do we do about the payload question? A chip-sized spacecraft is challenging in terms of instrumentation and communications, not to mention power. Enter Jeff Greason’s Q-Drive, with an entirely different take on high velocity missions within the Solar System and beyond it. Drawing its energies from the medium to deploy an inert propellant, the Q-Drive ups the payload enormously. But can it be engineered? Alex Tolley has been doing a deep dive on the concept and talking to Dr. Greason about the possibilities, out of which today’s essay has emerged. A Centauri Dreams regular, Alex has a history of innovative propulsion work, and with Brian McConnell is co-author of A Design for a Reusable Water-Based Spacecraft Known as the Spacecoach (Springer, 2016),
by Alex Tolley
Technical University of Munich for Project Icarus. Credit: Adrian Mann.
The interstellar probe coasted at 4% c after her fusion drive first stage was spent. It massed 50,000 kg, mostly propellant water ice stored as a conical shield ahead of the probe that did double duty as a particle shield. The probe extended a spine, several hundred kilometers in length behind the shield. Then the plasma magnet sails at each end started to cycle, using just the power from a small nuclear generator. The magsails captured and extracted power from the ISM streaming by. This powered the ionization and ejection of the propellant. Ejected at the streaming velocity of the ISM, the probe steadily increased in velocity, eventually reaching 20% c after exhausting 48,000 kg of propellant. The probe, targeted at Proxima Centauri, would reach its destination in less than 20 years. It wouldn’t be the first to reach that system, the Breakthrough microsails had done that decades earlier, but this probe was the first with the scientific payload to make a real survey of the system and collect data from its habitable world.
(sound of a needle skidding across a vinyl record). Wait, what? How can a ship accelerate to 20% c without expending massive amounts of power from an onboard power plant, or an intense external power beam from the solar system?
In a previous article, I explained the plasma magnet drive, a magsail technology that did not require a large physical sail structure, but rather a compact electromechanical engine whose magnetic sail size was dependent on the power and the surrounding medium’s plasma density.
Like other magsail and electric sail designs, the plasma magnet could only run before the solar wind, making only outward bound trips and a velocity limited by the wind speed. This inherently limited the missions that a magsail could perform compared to a photon sail. Where it excelled was the thrust was not dependent on the distance from the sun that severely limits solar sail thrust, and therefore this made the plasma magnet sail particularly suited to missions to the outer planets and beyond.
Jeff Greason has since considered how the plasma magnet could be decelerated to allow the spacecraft to orbit a target in the outer system. Following the classic formulations of Fritz Zwicky, Greason considered whether the spacecraft could use onboard mass but external energy to achieve this goal. This external energy was to be extracted from the external medium, not solar or beamed energy, allowing it to operate anywhere where there was a medium moving relative to the vehicle.
The approach to achieve this was to use the momentum and energy of a plasma stream flowing past the ship and using that energy to transfer momentum to an onboard propellant to drive the ship. That plasma stream would be the solar wind inside the solar system (or another star system), and an ionized interstellar medium once beyond the heliosphere.
Counterintuitively, such a propulsion system can work in principle. By ejecting the reaction mass, the ship’s kinetic energy energy is maintained by a smaller mass, and therefore increases its velocity. There is no change in the ship’s kinetic energy, just an adjustment of the ship’s mass and velocity to keep the energy constant.
Box 1 shows that net momentum (and force) can be attained when the energy of the drag medium and propellant thrust are equal. However this simple momentum exchange would not be feasible as a drive as the ejection mass would have to be greater than the intercepted medium resulting in very high mass ratios. In contrast, the Q-Drive, achieves a net thrust with a propellant mass flow far less than the medium passing by the craft, resulting in a low mass ratio yet high performance in terms of velocity increase.
Figure 1 shows the principle of the Q-Drive using a simple terrestrial vehicle analogy. Wind blowing through a turbine generates energy that is then used to eject onboard propellant. If the energy extracted from the wind is used to eject the propellant, in principle the onboard propellant mass flow can be lower than the mass of air passing through the turbine. The propellant’s exhaust velocity is matched to that of the wind, and under these conditions, the thrust can be greater than the drag, allowing the vehicle to move forward into the wind.
Box 2 below shows the basic equations for the Q-Drive.
Let me draw your attention to equations 1 & 2, the drag and thrust forces. The drag force is dependent on the velocity of the wind or the ship moving through the wind which affects the mass flow of the medium. However, it is the change in velocity of the medium as it passes through the energy harvesting mechanism rather than the wind velocity itself that completes this equation. Compare that to the thrust from the propellant where the mass flow is dependent on the square of the exhaust velocity. When the velocity of the ship and the exhaust are equal, the ratio of the mass flows is dependent on the ratio of the change in velocity (delta V) of the medium and the exhaust velocity. The lower the delta V of the medium as the energy is extracted from it, the lower the mass flow of the propellant. As long as the delta V of the medium is greater than zero, as the delta V approaches zero, the mass of the stream of medium is greater than the mass flow of the propellant. Conversely, as the delta V approaches the velocity of the medium, i.e. slowing it to a dead stop relative to the ship, the closer the medium and exhaust mass flows become.
Equations 3 and 7 are for the power delivered by the medium and the propellant thrust. As the power needed for generating the thrust cannot be higher than than delivered by the medium, at 100% conversion the power of each must be equal. As can be seen, the power generated by the energy harvesting is the drag force multiplied by the speed of the medium. However, the power to generate the thrust is ½ the force of the thrust multiplied by the exhaust velocity, which is the same as the velocity of the medium. Therefore the thrust is twice that of the drag force and therefore a net thrust equal to the drag force is achieved [equation 9]. [Because the sail area must be very large to capture the thin solar wind and the even more rarified ISM, the drag force on the ship itself can be discounted.]
Because the power delivered from the external medium increases as the ship increases in velocity, so does the delivered power, which in turn is used to increase the exhaust velocity to match. This is very different from our normal expectations of powering vehicles. Because of this, the Q-Drive can continue to accelerate a ship for as long as it can continue to exhaust propellant.
Figure 2 shows the final velocity versus the ship’s mass ratio performance of the Q-Drive compared to a rocket with a fixed exhaust velocity, and the rocket equation using a variable exhaust but with the thrust reduced by 50% to match the Q-drive net thrust equaling 50% of the propellant thrust. With a mass ratio below 10, a rocket with an exhaust equal to the absolute wind velocity would marginally outperform the Q-drive, although it would need its own power source to run, such as a solar array or nuclear reactor. Beyond that, the Q-drive rapidly outperforms the rocket. This is primarily because as the vehicle accelerates, the increased power harvested from the wind is used to commensurately increase the exhaust velocity. If a rocket could do this, for example like the VASIMR drive, the performance curve is the same. However, the Q-drive does not need a huge power supply to work, and therefore offers a potential for very high velocity without needing a matching power supply.
Equation A16 [1] and Box 3 equation 1 show that the Q-Drive has a velocity multiplier that is the square root of the mass ratio. This is highly favorable compared to the rocket equation. The equations 2 and 3 in Box 3 show that the required propellant and hence mass ratio is reduced the less the medium velocity is reduced to extract power. However, reducing the delta V of the medium also reduced the acceleration of the craft. This implies that the design of the ship will be dependent on mission requirements rather than some fixed optimization.
Box 4 provides some illustrative values for the size of the mag sails in the solar system for the Q-Drive and the expected performance for a 1 tonne craft. While the magnetic sail radii are large, they are achievable and allow for relatively high acceleration. As explained in [4], the plasma magnet sails increase in size as the medium density decreases, maintaining the forces on the sail. Once in interstellar space, the ISM is yet more rarefied and the sails have to commensurately expand.
How might the plasma medium’s energy be harvested?
The wind turbine shown in figure 1 is replaced by an arrangement of the plasma magnet sails. To harvest the energy of the medium, it is useful to conceptualize the plasma magnet sail as a parachute that slows the wind to run a generator. At the end of this power stroke, the parachute is collapsed and rewound to the starting point to start the next power cycle. This is illustrated in figure 3. A ship would have 2 plasma magnet sails that cycle their magnetic fields at each end of a long spine that is aligned with the wind direction to mimic this mechanism. The harvested energy is then used to eject propellant so that the propellant exhaust velocity is optimally the same as the medium wind speed. By balancing the captured power with that needed to eject propellant, the ship needs no dedicated onboard power beyond that for maintenance of other systems, for example, powering the magnetic sails.
Within the solar system, the Q-Drive could therefore push a ship towards the sun into the solar wind, as well as away from the sun with the solar wind at its back. Ejecting propellant ahead of the ship on an outward bound journey would allow the ship to decelerate. Ejecting the propellant ahead of the ship as it faced the solar wind would allow the ship to fall towards the sun. In both cases, the maximum velocity is about the 400 km/s of the peak density velocity of the solar wind.
Can the drive achieve velocities greater than the solar wind?
With pure drag sails, whether photon or magnetic, the maximum velocity is the same as the medium pushing on the sail. For a magnetic sail, this is the bulk velocity of the solar wind, about 400 km/s at the sun’s equator, and 700 km/s at the sun’s poles.
Unlike drag sails, the Q-Drive can achieve velocities greater than the medium, e.g. the solar wind. As long as the wind is flowing into the bow of the ship, the ship can accelerate indefinitely until the propellant is exhausted. The limitation is that this can only happen while the ship is facing into the wind (or the wind vector has a forward facing component). In the solar system, this requires that there is sufficient distance to allow the ship to accelerate until its velocity is higher than the solar wind before it flies past the sun. Once past perihelion, the ship is now running into the solar wind from behind, and can therefore keep accelerating.
What performance might be achievable?
To indicate the possible performance of the Q-drive in the solar system, 2 missions are explored, both requiring powered flight into the solar wind.
Two Solar System Missions
1. Mercury Rendezvous
To reach Mercury quickly requires the probe to reduce its orbital speed around the sun to drop down to Mercury’s orbit and then reduce velocity further to allow orbital insertion. The Q-Drive ship points its bow towards the sun, and ejects propellant off-axis. This quickly pushed the probe into a fast trajectory towards the sun. Further propellant ejection is required to prevent the probe from a fast return trajectory and to remain in Mercury’s sun orbital path. From there a mix of propellant ejection and simple drag alone can be used to place the probe in orbit around Mercury. Flight time is of the order of 55 days. Figure 4 illustrates the maneuver.
2. Sundiver with Triton Flyby
The recent Centauri Dreams post on a proposed flyby mission to Triton indicated a flight time of 12 years using gravity assists from Earth, Venus, and Jupiter.. The Q-Drive could reduce most of that flight time using a sundiver approach. Figure 5 shows the possible flight path. The Q-Drive powers towards the sun against the solar wind. It must have a high enough acceleration to ensure that at perihelion it is now traveling faster than the solar wind. This allows it to now continue on a hyperbolic trajectory continually accelerating until its propellant is exhausted.
This sundiver maneuver allows the Q-Drive craft to fly downwind faster than the wind.
For a ship outward bound beyond the heliosphere, the ISM medium is experienced as a wind coming from the bow, While extremely tenuous, there is enough medium to extract the energy for continued acceleration as long as the ship has ejectable mass.
Up to this point, I have been careful to state this works IN PRINCIPLE. In practice there are some very severe engineering challenges. The first is to be able to extract energy from the drag of the plasma winds with sufficient efficiency to generate the needed power for propellant ejection. The second is to be able to eject propellant with a velocity that matches the speed of the vehicle, IOW, the exhaust velocity must match the vehicle’s velocity, unlike the constant exhaust velocity of a rocket. If the engines to eject propellant can only eject mass at a constant velocity, the delta V of the drive would look more like a conventional rocket, with a natural logarithm function of the mass flow. The ship would still be able to extract energy from the medium, but the mass ratio would have to be very much higher. The chart in Figure 2 shows the difference between a fixed velocity exhaust and the Q-Drive with variable velocity.
The engineering issues to turn the Q-Drive into hardware are formidable. To extract the energy of the plasma medium whether solar wind or ISM, with high efficiency, is non-trivial. Greason’s idea is to have 2 plasma magnet drag sails at each end of the probe’s spine that cycle in power to extract the energy. The model is rather like a parachute that is open to create drag to push on the parachute to run a generator, then collapse the parachute to release the trapped medium and restart it at the bow (see figure 3). Whether this is sufficient to create the needed energy extraction efficiency will need to be worked out. If the efficiencies are like those of a vertical axis wind turbine that works like drag engines, the efficiencies will be far too low. The efficiency would need to be higher than that of horizontal axis wind turbines to reduce the mass penalties for the propellant. It can be readily seen that if the efficiencies combine to be lower than 50%, then the Q-Drive effectively drops back into the regime illustrated in Box 1, that is that the mass of propellant must become larger than the medium and ejected more slowly. This hugely raises the mass ratio of the craft and in turn reduces its performance.
The second issue is how to eject the propellant to match the velocity of the medium streaming over the probe. Current electric engines have exhaust velocities in the 10s of km/s. Theoretical electric engines might manage the solar wind velocity. Efficiencies of ion drives are in the 50% range at present. To reach a fraction of light speed for the interstellar mission is orders of difficulty harder. Greason suggests something like a magnetic field particle accelerator that operates the length of the ship’s spine. Existing particle accelerators have low efficiencies, so this may present another very significant engineering challenge. If the exhaust velocity cannot be matched to the speed of the ship through the medium, the performance looks much more like a rocket, with velocity increases that depend on the natural logarithm of the mass ratio, rather than the square root. For the interstellar mission, increasing the velocity from 4% to 20% light speed would require a mass ratio of not just 25, but rather closer to 150.
Figure 6 shows my attempt to illustrate a conceptual Q-Drive powered spacecraft for interstellar flight. The propellant is at the front to act as a particle shield in the ISM. There is a science platform and communication module behind this propellant shield. Behind stretches a many kilometers long spine that has a plasma magnet at either end to harvest the energy in the ISM and to accelerate the propellant. Waste heat is handled by the radiator along this spine.
In summary, the Q-Drive offers an interesting path to high velocity missions both intra-system and interstellar, with much larger payloads than the Breakthrough Starshot missions, but with anticipated engineering challenges comparable with other exotic drives such as antimatter engines. The elegance of the Q-Drive is the capability of drawing the propulsion energy from the medium, so that the propellant can be common inert material such as water or hydrogen.
The conversion of the medium’s momentum to net thrust is more efficient than a rocket with constant exhaust velocity using onboard power allowing far higher velocities with equivalent mass ratios. The two example missions show the substantial improvements in mission time for both and inner system rendezvous and an outer system flyby. The Q-Drive also offers the intriguing possibility of interstellar missions with reasonable scientific and communication payloads that are not heroic feats of miniaturization.
References
1. Greason J. “A Reaction Drive Powered by External Dynamic Pressure” (2019) JBIS v72 pp146–152.
2. Greason J. ibid. equation A4 p151.
3. Greason J. “A Reaction Drive Powered by External Dynamic Pressure” (2019) TVIW video https://youtu.be/86z42y7DEAk
4. Tolley A. “The Plasma Magnet Drive: A Simple, Cheap Drive for the Solar System and Beyond“ (2017) https://www.centauri-dreams.org/2017/12/29/the-plasma-magnet-drive-a-simple-cheap-drive-for-the-solar-system-and-beyond/
5. Zwicky F. The Fundamentals of Power (1946). Manuscript for the International Congress of Applied Mechanics in Paris, September 22-29, 1946. | 2024-03-31T01:27:13.970301 | https://example.com/article/9578 |
Q:
Is there a UX site with active threaded forum discussions?
I'm looking for UX discussion forums and haven't found many active ones. Maybe I'm googling wrong?
This site has a chat/discussion area which is nice, but is not really the traditional threaded topic style discussion forum.
So does such an active UX forum site exist?
A:
Not to my knowledge, but perhaps a much better UX question is, "WHY are there no/few traditional UX discussion forums?"
In the evolving web, traditional, threaded discussion forums are becoming a thing of the past. Why? Traditional forums are usually built around legacy principles. They tend to lack or aren't built around these features/ideas which today's web demands:
Article tagging instead of categorization/filing
User contribution, feedback, and interactivity
Some form of social networking/profiling (they can become "cliquey")
Scalability and user or 'intelligent' customization
Performance
I always used to add forums to the sites I built... but that was years ago. I see this less and less now.
Anyway, on Stack Exchange sites I find what I am interested in, good at, etc, much quicker than I do on any traditional forum. So I know I haven't directed you to a good, active, UX forum, but at least now you can know why.
| 2024-05-24T01:27:13.970301 | https://example.com/article/8627 |
[Unit]
Description=V2Ray Service
Documentation=https://www.v2ray.com/ https://www.v2fly.org/
After=network.target nss-lookup.target
[Service]
# If the version of systemd is 240 or above, then uncommenting Type=exec and commenting out Type=simple
#Type=exec
Type=simple
# This service runs as root. You may consider to run it as another user for security concerns.
# By uncommenting User=nobody and commenting out User=root, the service will run as user nobody.
# More discussion at https://github.com/v2ray/v2ray-core/issues/1011
User=root
#User=nobody
NoNewPrivileges=true
ExecStart=/usr/bin/v2ray/v2ray -config /etc/v2ray/config.json
Restart=on-failure
[Install]
WantedBy=multi-user.target
| 2024-07-06T01:27:13.970301 | https://example.com/article/3860 |
Carnitine-acylcarnitine translocase deficiency. Clinical course of three Saudi children with a severe phenotype.
Carnitine-acylcarnitine translocase (CACT) deficiency (McKusick 212138) is a rare life threatening disorder characterized by hypoketotic hypoglycemia, hyperammonemia, encephalopathy, cardiomyopathy hepatopathy, and myopathy. Here, we present a detailed clinical course of 3 Saudi siblings with a severe phenotype. The third patient was described in more detail. Early medical intervention in the form of 25% dextrose intravenous infusion and carnitine supplement followed by a gradual introduction of a high carbohydrate low fat special formula resulted in a good clinical and biochemical response to the treatment in our patient. However, early nephrocalcinosis, severe hypotonia, and subsequently intravascular cerebral accident could not be prevented. He died at 18 months of age as a result of metabolic decompensation. This suggests that CACT deficiency is still a lethal disorder even with an early and aggressive medical intervention. | 2023-10-08T01:27:13.970301 | https://example.com/article/2533 |
Popular pizza shop opens in Leominster
Pizza is recession-proof, according to Lynda Ferrara, owner of Espresso Pizza in Fitchburg. And considering she just opened a second location in Leominster after 48 years in business, it's probably worth taking her word for it.
In tough economic times, a pizza can feed a family, she said, and in times of abundance, a parent will order a pizza to feed the kids and babysitter while they go out for dinner. Either way, the Espresso pies with the trademark sweet sauce are flying out the door by the stack, which is exactly how it's been since the beginning.
When her ex-husband, Mike, purchased the eatery in 1965, he couldn't have known that it would be his wife who would carry on the business. The Fitchburg pizza place was once part of a six-location chain started by the original owner, who also sold his Lowell and Nashua locations in the mid-60s.
A soft opening of the Leominster restaurant in mid-December found hungry patrons charging the front door at 272 Central St. In fact, said Ms. Ferrara, people were stopping in all throughout the construction process, their patience wearing thin as they awaited opening day. A grand opening was held Jan. 2.
Though the two locations are separated by a mere 5.8 miles, anyone familiar with the Twin Cities knows that residents can tend toward the provincial, unwilling to cross city lines if at all humanly possible. This has elevated Espresso to legendary status, and has had Leominster patrons begging, for the better part of five decades, for a more convenient location.
Ms. Ferrara maintains that her ex-husband spent months, which grew into years, perfecting his recipes and his menu, which now includes rice balls, otherwise known as arrancini, which have become something of a signature dish. The recipe, she said, belonged to her former Italian mother-in-law, and she has been pleased to note that Leominster's ample Italian population has taken fondly to the dish.
Though Mr. Ferrara is no longer involved in the business, his legacy includes two daughters, Lisa Caron and Lauren Ferrara. Lauren will start stepping into her mother's shoes as she learns the ropes at the Leominster location. General Manager Juan Reinoso oversees operations at both stores with a focus on the Fitchburg location.
There is no shortage of things to learn, with every menu item from sausage to sauce requiring a homemade touch.
"We grate our own cheese. We make our own dough. We make every single thing ourselves," Ms. Ferrara said.
There has only been one rocky financial time during Espresso's history, a point at which the recession-proof almighty pizza put a strain on the budget. It was 2004, when the price of flour leapt from around $13 a bag to more than $40. With hundreds of pounds of dough being made each week, the restaurant had no choice but to raise prices to survive. But thankfully, the price only stayed elevated for a year or so, and the family took pride in the fact that even in the toughest of times, they maintained their culinary standards.
"That's really the secret to the whole thing," said Ms. Ferrara. "We use high-quality ingredients. And when our prices went up, our customers still came."
While opening additional locations might be, for some business owners, a pathway to increased profits, Ms. Ferrara's motivation to branch out was a bit more personal.
"I wanted to have two restaurants, so that someday, when I am gone, there will be one for each of my daughters," she said.
But don't think that means she is going anywhere anytime soon. She plans to be the head cheese for several more decades.
"I am the board," she said, indicating that she is not only the company's president, but also the vice president, secretary, treasurer and CEO. "I like it that way."
CDL A DELIVERY DRIVERS Home Every Night! Needed for our Worcester Depot! Drive local - No more spending valuable nights away from your family! As a Direct Store Delivery Representative YOU have the opportunity to make a difference with our customers! Provide excellent customer service; interact in a positive manner with our customers; deliver our products to local stores. Be home every night! Work for a Company that has been around for over 80 years! Minimum of 3 months driving experience with CDL A/B; GED or HS diploma required; Must be able to drive a standard transmission. EEO/Veteran/Disability Growing Strong Since1933! | 2023-09-27T01:27:13.970301 | https://example.com/article/4617 |
Introduction {#S1}
============
Colorectal cancer (CRC) is the third most common and newly diagnosed cancer and third most common cause of cancer death in both men and women in the United States ([@B1]), accounting for 8% of all new cancer cases per year. An estimated 26, 270 men and 24,040 women died of colorectal carcinoma in 2014 as reported by American Cancer Society ([@B1]). The primary treatment modality used is surgical therapy with curative intent, followed by a pathological assessment of the resected tissue which directs subsequent treatments ([@B2]).
Colorectal lesions usually exist as a continuum, from benign to malignant forms ([@B3]). Most benign lesions slowly start as polyps, i.e., abnormal growths from the inner lining of the intestine that protrude into the intestinal canal. Some of these polyps exhibit abnormal cellular growth and progress into a stage called intraepithelial neoplasia (dysplasia). Intraepithelial neoplasia is a form of pre-cancerous lesion which is highly likely to progress into full-fledged cancer or carcinoma ([@B4]).
Initial diagnostic tests include a colonoscopy and biopsy of the abnormal area inside the colon. Histopathological examination of this biopsy confirms whether the lesion is benign, pre-cancerous, or cancerous ([@B5]). A gradual, yet distinct continuum of malignancy is found in CRC as a lesion progresses from normal to benign, benign to precancerous, and precancerous to a cancerous lesion. Benign lesions are identified by the increased number of normal cells in an abnormal site, but are incapable of invading nearby tissues or spreading to distant tissues (metastasis). Precancerous lesions or intraepithelial neoplasia are abnormal cells that develop inside and stay within the innermost lining (epithelial) of the colon without growing deeper. Some precancerous lesions grow deeper into the colon (or prostate), crossing the epithelial layer and becoming cancerous. These lesions are graded from well differentiated to moderately and poorly differentiated cancers, depending on their degree of visual similarity or dissimilarity to normal tissue. Cancer development is associated with a disruption in the normal size and shape of cells, number of cells, and the amount of intercellular stroma (ST), which also varies within and between different cancer samples ([@B6]).
Pathologists provide diagnoses from biopsy sections ([@B4]) by labeling the lesions as benign or cancerous and grading them based on differentiation. Unfortunately, the histological assessment of pathology sections is highly subjective and prone to inter/intra observer variation ([@B2], [@B7]--[@B9]), motivating the need for automated or computer-aided diagnosis of pathological slides. Recently, more emphasis has been placed on using digital technologies to produce high-resolution whole slide images (WSI) ([@B10]). Texture feature extraction from digital pathology images has been a major focus in the development of computer-aided diagnosis systems ([@B10]--[@B12]). An early study conducted by Esgiar et al. used correlation and entropy texture features computed from gray-level co-occurrence matrices (GLCM) to differentiate between normal and cancerous tissue ([@B13]). They further improved the sensitivity and specificity of classification by incorporating fractal dimensions into the feature analysis ([@B14]). Kalkan et al. achieved an accuracy of 75.15% between the four classes of normal, cancerous, adenomatous, and inflammatory colon tissue using 32-bin color channel histograms, GLCM, and structural features ([@B15]). Jiao et al. proposed a method for automatic colon cancer detection using GLCM for texture features and support vector machines to achieve a classification accuracy of 96.67% between cancerous and noncancerous images ([@B16]). Wavelet features have proven useful in a wide variety of applications, including image compression and preprocessing, and many studies have used texture features based on wavelets for classification ([@B17]--[@B19]). For example, Hilado et al. used the 2D wavelet transform (2D-WT) to classify whole slide colon cancer images into normal, cancerous, and adenomatous polyp tissue types with 91.11% accuracy ([@B20]). However, multiscale texture analysis of pathology tissue (PT) for CRC is still rarely done. For this reason, we broaden our analysis to find scale texture differences between the PT using 3D wavelet transform (3D-WT) filter.
To our knowledge, this is the first work to investigate the link between scale textures in multispectral images and their association with stages of CRC malignancy. Multiscale texture features derived from multispectral images encode thousands of invisible patterns that are complementary to traditional texture based on GLCM, local binary patterns, Laplacian of Gaussian filter, deep learning ([@B10]--[@B12], [@B21]), or shape measurements ([@B22]). In this context, multiscale texture features measure the heterogeneity in the images of the PT and could be one of the radiomic techniques. Notably, extraction of quantitative imaging features that measure heterogeneity within cancer may be used to guide clinical decisions ([@B23]).
Our radiomic analysis approach based on the extraction and analysis of texture features, thus provides an additional means of characterizing the continuum from benign to malignant CRC. This work may lead to a better understanding of the continuum of PT, such as ST, benign hyperplasia (BH), intraepithelial neoplasia (IN) or precursor cancerous lesion, and carcinoma (CA). To conclude, we sought to describe the relationship between multiscale texture features and PT grades.
Materials and Methods {#S2}
=====================
The flowchart explains the proposed work used to evaluate the performance of multiscale textures for continuum CRC (Figure [1](#F1){ref-type="fig"}). Our analysis pipeline consists of (1) sample preparation and data acquisition derived from an optical microscopy system with charge coupled camera and liquid crystal tuneable bandpass filter that offers multispectral images, (2) quantification of texture-based 3D-WT that represents the quantified features from each of 3D-WT bands of segmented pathology regions, and (3) univariate ANOVA analysis to show significant features in differences between texture of PT. Multivariate analysis based on random forest (RF) classifier model was used to classify between PT. The pipeline is shown in Figure [1](#F1){ref-type="fig"}, the steps are as follows.
![The proposed pipeline for identifying colorectal cancer (CRC) histopathology \[i.e., stroma, benign hyperplasia (BH), intraepithelial neoplasia, and carcinoma\] using multiscale texture features derived from multi-spectral images. Preprocessing steps consists of biopsy sample preparation, data acquisition from optical microscopy system, then segmentation of sections using the active contour model. Multiscale texture was derived from segmented pathology tissue using 3D-wavelet transform. Texture was quantized by three quantifier functions (i.e., variance, entropy, and energy). Univariate and multivariate analysis was performed using ANOVA significance test and random forest classifier model to distinguish between malignancy grades.](fonc-08-00096-g001){#F1}
Sample Preparation and Data Acquisition {#S2-1}
---------------------------------------
We analyzed 3D multispectral digital WSI from 39 patients with colorectal lesions. Whole tissue samples were obtained from intestinal glands with a thickness value of 5 µm and hematoxylin and eosin staining. WSI of biopsy samples obtained using optical microscopy system (Leica TCS NT with Krypton/Argon laser A *Z* series) revealed spatial heterogeneity for each PT type ([@B23]). Multispectral digital WSI were obtained from a charge coupled device camera integrated with a liquid crystal tunable filter (LCTF) in an optical microscope system ([@B24]). LCTF provides multispectral images of the tissue samples by varying the wavelength of operation ([@B25]). In our microscopy system, the LCTF has a bandwidth accuracy of 5 nm, with a controllable wavelength through the visible spectrum range of 500--650 nm. Multispectral images were produced through repeated image capture in various wavelength sub-bands. The LCTF provides 16 multispectral bands across a wavelength range of 500−650 nm with 9.375 nm intervals between successive bands. Thus, each sample consists of a volume of 16 image slices sampled across the wavelength range, providing a rich characterization of abnormal cell type associated with lesions (Figure [2](#F2){ref-type="fig"}). Note that a colorectal pathologist views images at a magnification of (×40) for labeling PT based on semi-automatic segmentation ([@B22]).
![Example of histopathological multispectral images (×40 objective magnification; scale bars = 20 µm) of colorectal cancer samples (ST, stroma; BH, benign hyperplasia; IN, intraepithelial neoplasia; CA, carcinoma). Sixteen multispectral bands were acquired in the wavelength range of 500--650 nm, with 9.375 nm steps between successive bands ([@B23]).](fonc-08-00096-g002){#F2}
Patients and Dataset {#S2-2}
--------------------
The biopsy samples used in this work were collected in 2009 by the service ANAPAT of the CHU Hospital Brabois with the collaboration of the LCOMS laboratory (<http://lcoms.univ-lorraine.fr>), France. After excluding samples with incomplete data, a set of 39 patients with colorectal lesions were gathered for a preliminary study without any discrimination based on subject race, gender, and age. Each sample corresponds to one patient, the number of the samples per PT type counts are ST = 9, BH = 10, IN = 9, Ca = 11, where again each data sample consists of 16 multispectral images. The images (i.e., volume images) were normalized by dividing voxel intensity by the SD of the whole volume data to minimize the effects of noise in images (i.e., noise normalization decreases noise) and other external factors (i.e., reduce the variability between images). All the images were reconstructed to a 512 × 512 matrix, where the volume size of 512 × 512 × 16 was taken into consideration in texture feature extraction from 3D-WT of segmented PT.
Semi-Automatic Segmentation {#S2-3}
---------------------------
Deformable model-based segmentation is performed by evolving a curve within the image. Active contour is initialized by considering a rectangular contour on the extreme within image. Then for each object detected one contour is automatically drawn surrounding this object. Note that the curve evolution is driven by a combination of external forces, which are computed from the image data, and internal forces which are related to the curve itself. Deformable models using the active contour/snake method have previously been used to detect abnormal tissue types from similar multispectral digital WSI ([@B22]), detecting the object contour in an iterative fashion. The computation time was reduced by automatically limiting the number of iterations using empirical calculations. Images were uniformly down-sampled by a factor of 8 in each spatial dimension prior to active contour detection of PT, after which the detected contours were upsampled to the original resolution for analysis. Down-sampling was an important step in decreasing the computation time of active contour detection and had a minimal effect on the final segmentation result. The PT types from WSI were then assessed by a board certified colorectal surgeon (i.e., Figure [3](#F3){ref-type="fig"}). Figure [3](#F3){ref-type="fig"} shows the result of PTs segmented using several steps. The process of PT detection from multispectral images is complicated by digital slide image areas which contain similar ranges of gray-level intensities and irregular shapes. For this reason, our software displays all automatically detected regions of interest and allows a pathologist to select those regions that should be used for the texture analysis. Active contour segmentation accuracy was assessed by comparing against manual segmentation of PT that was done by two pathologists in a blind fashion, and are considered as ground truth. Two similarity measures were used to evaluate segmentation agreement, the Jaccard-similarity-coefficient (JSC) ([@B26]), and the dice-similarity-coefficient (*DSC*) ([@B27]). The false positive (*FPR*) and false negative rates (*FNR*) were also considered. The *JSC* measures the degree of agreement between manual ground truth and automatic segmentations and is expressed as $$JSC(A,B) = \frac{\left| {A \cap B} \right|}{\left| {A \cup B} \right|}$$ where *A* and *B* are the areas of ground truth and segmented PT, respectively. Note that the *JSC* ranges from 1 for complete overlap and perfect agreement to 0 for no overlap, and thus describes the overall level of similarity between segmentations. *DSC* was also employed and can be expressed according to $$DSC(A,B) = \frac{2\left| {A \cap B} \right|}{\left| A \right| + \left| B \right|}$$ where \|*A*\| and \|*B*\| represent the number of the pixels in A and B, respectively.
{#F3}
Additionally, *FPR* and *FNR* are used to quantify over and under segmentation, these are calculated according to $$FPR(A,B) = \frac{\left| {B\backslash A} \right|}{\left| \overline{A} \right|}$$ $$FNR(A,B) = \frac{\left| {A\backslash B} \right|}{\left| A \right|}$$ where "\\" is the set difference operator. We then applied the 3D-WT to generate the multiscale texture from each of the segmented PT.
Wavelet Transform-Based Feature {#S2-4}
-------------------------------
Each of the segmented area was then texturized by the 3D-WT. This technique generally represents an arbitrary function described as a superposition of wavelets, which are generated from a mother wavelet by dilations and translations ([@B28]). These translations provide a spatial/frequency representation of the signal. Wavelet coefficients then can be considered to represent the projections of the original signal onto multi-resolution subspaces. In the context of wavelet space decomposition, the 3D-WT can be computed by a tensor product according to the expression $$\begin{array}{l}
{V^{3} = \left( {L^{x} \oplus H^{x}} \right) \otimes \left( {L^{y} \oplus H^{y}} \right) \otimes \left( {L^{z} \oplus H^{z}} \right)} \\
{\mspace{22mu} = L^{x}L^{y}L^{z} \oplus L^{x}H^{y}L^{z} \oplus H^{x}L^{y}L^{z} \oplus H^{x}H^{y}L^{z}} \\
{\qquad \oplus L^{x}L^{y}H^{z} \oplus L^{x}H^{y}H^{z} \oplus H^{x}L^{y}H^{z} \oplus H^{x}H^{y}H^{z}} \\
\end{array}$$ where ⊕ and ⊕ denote a space direct sum and convolution, respectively; *H* and *L* denote high- and low-pass filters; *x, y*, and *z* are 3D coordinates.
This technique decomposes a 3D-WT space into eight octants, which are called octant sub-bands, and each octant occupies a sub-volume of the 3D wavelet space ([@B29]). The multilevel 3D-WT leads to a recursive dyadic 3D sub-band partition based on the low-pass sub-bands, *L^x^L^y^L^z^*. Each of the eight octants can be specified by its directional filters by using *V*^3^ with orientation notations according to the sub-band partition of the 3D-WT (Figure [4](#F4){ref-type="fig"}). The 3D-WT decomposition is a separable operation, and can thus be computed by applying the 1D dimension wavelet decomposition independently along the *x* and *y* image axes to generate the 2D-WT decomposition, and finally along the *z* axis (Figure [4](#F4){ref-type="fig"}). In the context of filter banks, 3D wavelet decomposition considers a low-pass filter (*g*) and a high-pass filter (*h*), where the filter coefficients are determined by wavelet basis functions (i.e., Figure [4](#F4){ref-type="fig"}B). A variety of wavelet types could be used with similar results, in this study we report results using the Daubechies wavelet (db~2~) at one level. The db~2~ wavelet is among the most commonly used and achieves a good spatial-frequency localization trade-off using narrow high-pass and wide low-pass filters ([@B30]). A comparison of different wavelet types is out of the scope of this work, and this is left as a future research direction. As our work concerns the multiscale texture analysis of bio-images, the ideal wavelet is tuned to the spatial frequencies characterizing the image textures of interest ([@B28], [@B31]). Asymmetry is an important property of Daubechies wavelets, where the degree of asymmetry increases with the order of the wavelet ([@B32]). In previous work, the 3D-WT "2D + 1D" coefficients were used in filtering noise from breast cone-beam computed tomography volumetric data, with two filtering operators using variable coefficients ([@B29]). Here, this technique is adapted for 3D-WT texture extraction. Mostly, the fine texture derived from the details (i.e., high-pass filter), while the coarse texture is derived from the approximation (i.e., low-pass filter). Visually, distinct texture scales can be observed from sub-bands (i.e., oct-bands) throughout the 3D-WT applied on CA sample and visualized in 2D and/or 3D images (i.e., Figures [1](#F1){ref-type="fig"} and [4](#F4){ref-type="fig"}D). Moreover, all the functions related to the 3D-WT are available in the *Wavelet Toolbox* as built-in functions in Matlab.
{#F4}
Texture Quantification {#S2-5}
----------------------
The output textures result of the 3D-WT is a set of eight 3D matrices *V* \[*m, n, k*\] corresponding to the octant sub-bands (in this study named as multiscale texture), where *m, n*, and *k* are the coordinates along *x, y*, and *z* axis, respectively. These textures are then quantified by three functions, namely, the *Variance, Entropy*, and *Energy*.
The *Variance* function measures how far each texture value in the set from the texture average $(\overline{V})$, also it can assess the changes of the WSI heterogeneity. It can be written as follows: $$Variance = \sum\limits_{m,n,k = 1}^{N}\left| {V\left\lbrack {m,n,k} \right\rbrack - \overline{V}} \right|^{2}$$ where $\overline{V} = \sum\limits_{m,n,k = 1}^{N}V\left\lbrack {m,n,k} \right\rbrack$ and *N* is represented the size for a certain band.
The *Entropy* function measures the disorder or complexity of the texture. It reaches a maximum for completely random textures and a minimum for regular textures. Let *Y* be the octant (i.e., sub-band/subvolume) value of a pixel (*x*,*y*) in the segmented region Ω (i.e., ROI). We then discretize the distribution of each sub-band into 256 equal-sized intervals, and denote as Ω*~k~* the subset of pixels within the *k*-th interval. The entropy then can be computed according to $$\mathit{Entropy} = - \sum\limits_{k}\frac{\left| \Omega_{k} \right|}{\left| \Omega \right|}\text{log}\frac{\left| \Omega_{k} \right|}{\left| \Omega \right|}$$
Finally, the *Energy* function measures the distribution of energy along the frequency axis over scale and orientation. Energy feature of each sub-band can calculate according to $$\mathit{Energy} = \sum\limits_{k}\left( \frac{\left| \Omega_{k} \right|}{\left| \Omega \right|} \right)^{2}$$
The functions *Variance, Entropy*, and *Energy* can be collectively used to characterize the structure of information in the textures volumetric WSI data.
Statistical Analysis and Classification {#S2-6}
---------------------------------------
Each volume sample is represented by eight 3D matrices which correspond to the octant sub-bands. For each sample, we extracted a feature vector of 24 features derived from the eight sub-bands quantified by three functions namely *Variance, Entropy*, and *Energy*. Then, *Z*-score normalization was employed on each of the feature vectors, which converted the features to zero mean and unit variance as follows: $$r_{n} = \frac{r - mean}{\sigma}$$ where *r* is the original value, *r~n~* is the new value, and the mean and σ are the average and SD of the original data, respectively.
Thereafter, we performed univariate analysis based on ANOVA significant test for comparing between PT and multiscale texture types (i.e., LLL, HLL, LHL, HHL, LLH, HLH, LHH, and HHH). This is a significance test for analyzing experimental data in which one or more response variables are measured under various conditions identified by one or more classification variables ([@B33]). We used this test to assess the significance of scale texture features for comparing between PT. To account for these multiple comparisons (e.g., 3 quantifier functions and 8 scale of texture, for a total of 24 tests), *p*-values were corrected following Holm--Bonferroni correction ([@B34]) and the statistical significance of features was assessed at *p*-value \<0.01.
For multivariate analysis, we considered the RF classifier models to predict the abnormalities tissue types in the WSI. Although various classifiers could be used for this task, we chose the RF as it works well and can be used to inspect the features most dominant in classification ([@B35]). A fivefold cross-validation strategy was used to measure the area under the curve (AUC), classifier accuracy, sensitivity, and specificity, where training images are divided into five equal-sized subsets, and in each fold, one subset is put aside for testing and the remaining four subsets are used to train a single RF model, using 100 decision trees. The overall performance of the model was then measured as the average AUC (or classifier accuracy, sensitivity, and specificity) obtained over all fivefolds.
Note that true positive (*TP*) and true negative (*TN*), is the number of positive and negative samples correctly classified. For example, TP of ST is all the ST samples that are classified as ST, TN of ST is all non ST samples that are not classified as ST. False positive (*FP*) and false negative (*FN*) is the numbers of positive and negative samples incorrectly classified ([@B36]). For example, FP of ST is all non ST samples that are classified as ST, FN of ST is all ST samples that are not classified as ST. Similar computation was considered for TP, TN, FP and FN of BH, IN, and CA samples.
Then, TP + FN is the total numbers of test samples of the considered class.
*Accuracy* represents the correctly classified samples and can be expressed by $$\mathit{Accuracy} = \frac{\text{TP} + \text{TN}}{\text{TP} + \text{FP} + \text{TN} + \text{FN}}$$
*Sensitivity* is a measure of the capability of a classifier to recognize the positive class patterns. It can be expressed according to $$\mathit{Sensitivity} = \frac{\text{TP}}{\text{TP} + \text{FN}}$$
*Specificity* is a measure of the capability of a classifier to recognize the negative class patterns. It can be expressed by the following equation: $$\mathit{Specificity} = \frac{\text{TN}}{\text{TN} + \text{FP}}$$
All the functions related the statistical analysis is available in the Statistics and Machine Learning Toolbox as built-in functions in Matlab. The source code for the segmentation, wavelet analysis, and statistical analysis is available upon request.
Results {#S3}
=======
The proposed texture features extraction using 3D-WT was applied on 39 patients with colorectal lesions. Univariate analysis using ANOVA significance test was used to identify texture features that were significantly different between PT types.
Segmentation {#S3-1}
------------
Active contour segmentation model showed that malignancy types were correctly detected and located with a high performance of similarity metrics. *JSC* shows a similarity range of 75−82% with the best performance achieved with Ca PT. Meanwhile, *DSC* shows a similarity range of 86−89% with the best performance achieved with Ca PT type. These metrics confirmed the feasibility of active contour segmentation method to determine the PT types and specifically the carcinoma lesions (Table [1](#T1){ref-type="table"}).
######
Average of similarity metrics between ground truth and segmented pathology lesions.
Metrics Stroma Benign hyperplasia Intraepithelial neoplasia Carcinoma
-------------------------------- -------- -------------------- --------------------------- -----------
Jaccard-similarity-coefficient 80 76 75 82
Dice-similarity-coefficient 87 86 86 89
False positive rates 05 07 05 04
False negative rates 15 18 20 14
Univariate Analysis {#S3-2}
-------------------
Figure [5](#F5){ref-type="fig"} shows the significance of each of the texture features which identify the four pathology lesions (i.e., ST, BH, IN, and CA) from CRC patient biopsies. We found that 12 features were statistically significant (*p* \< 0.01) and could identify the four lesions types. These features are derived from multi-scale textures of variance (i.e., five features: LHL, HHL, LLH, LHH, and HHH), entropy (i.e., five features: HLL, LHL, HHL, LLH and HHH), and energy (i.e., two features: HLL and LLH). Notably, features derived from textures of LLL and HLH bands were not significant after multiple corrections. However, in multivariate analysis, the combined features derived from these bands produced a high classifier accuracy. Table [2](#T2){ref-type="table"} shows the average and SD values of each feature across eight 3D-WT band and pathology lesions types.
{#F5}
######
Average ± SD for each of features across 3D-WT bands and four pathology tissue (PT) types.
Feature 3D-Wavelet transform band PT types *p*
---------- --------------------------- ---------------- ---------------- ---------------- ---------------------------------------- -------
Variance LLL 5.463 ± 0.587 6.165 ± 1.411 5.610 ± 1.304 5.948 ± 0.285 0.419
HLL 3.579 ± 0.339 3.613 ± 1.773 2.826 ± 0.432 3.237 ± 0.597 0.299
LHL 1.225 ± 0.360 0.650 ± 0.309 0.790 ± 0.542 2.779 ± 0.599 \<0.01[\*](#tfn1){ref-type="table-fn"}
HHL 2.369 ± 0.457 1.364 ± 0.448 1.649 ± 0.641 3.122 ± 1.094 \<0.01[\*](#tfn1){ref-type="table-fn"}
LLH 1.776 ± 0.330 1.641 ± 0.653 1.577 ± 0.599 3.557 ± 0.440 \<0.01[\*](#tfn1){ref-type="table-fn"}
HLH 1.475 ± 0.197 1.264 ± 0.334 1.371 ± 0.424 2.472 ± 1.593 0.014
LHH 0.813 ± 0.287 0.628 ± 0.320 0.764 ± 0.538 2.745 ± 0.438 \<0.01[\*](#tfn1){ref-type="table-fn"}
HHH 3.235 ± 0.294 2.401 ± 0.472 2.804 ± 0.614 4.096 ± 1.253 \<0.01[\*](#tfn1){ref-type="table-fn"}
Entropy LLL 49.892 ± 0.424 50.007 ± 1.620 51.002 ± 0.758 50.691 ± 0.163 0.037
HLL 41.445 ± 0.252 41.966 ± 1.201 42.201 ± 0.256 40.533 ± 0.842 \<0.01[\*](#tfn1){ref-type="table-fn"}
LHL 9.339 ± 0.591 7.673 ± 0.849 8.892 ± 0.523 9.822 ± 0.214 \<0.01[\*](#tfn1){ref-type="table-fn"}
HHL 15.434 ± 0.559 14.602 ± 0.590 15.763 ± 1.078 14.054 ± 0.710 \<0.01[\*](#tfn1){ref-type="table-fn"}
LLH 5.565 ± 0.485 5.549 ± 0.600 5.920 ± 0.796 7.502 ± 0.242 \<0.01[\*](#tfn1){ref-type="table-fn"}
HLH 14.618 ± 0.336 14.767 ± 1.677 15.119 ± 0.457 14.135 ± 0.714 0.169
LHH 7.656 ± 0.526 7.165 ± 0.462 7.708 ± 0.978 9.215 ± 0.346 \<0.01[\*](#tfn1){ref-type="table-fn"}
HHH 15.896 ± 0.616 15.552 ± 0.345 16.203 ± 1.081 14.841 ± 1.189 0.010
Energy LLL 15.029 ± 0.288 16.125 ± 1.787 15.861 ± 0.479 15.822 ± 0.230 0.096
HLL 8.337 ± 0.372 10.224 ± 1.124 8.504 ± 0.447 9.314 ± 0.489 \<0.01[\*](#tfn1){ref-type="table-fn"}
LHL 0.056 ± 0.033 0.073 ± 0.065 0.061 ± 0.064 0.781 ± 1.840 0.260
HHL 0.441 ± 0.228 0.741 ± 1.577 0.375 ± 0.180 0.870 ± 1.152 0.662
LLH 1.392 ± 0.147 1.844 ± 0.622 1.760 ± 0.389 3.535 ± 0.680 \<0.01[\*](#tfn1){ref-type="table-fn"}
HLH 0.251 ± 0.029 0.871 ± 1.927 0.331 ± 0.133 0.523 ± 0.473 0.549
LHH 0.048 ± 0.074 0.040 ± 0.093 0.831 ± 1.890 0.256 ± 0.741 0.291
HHH 0.000 ± 0.000 0.159 ± 0.502 0.186 ± 0.559 0.702 ± 1.742 0.422
*\*p-value is statistically significant following Holm--Bonferroni correction*.
Multivariate Analysis {#S3-3}
---------------------
Figure [6](#F6){ref-type="fig"}A shows the average (±SD) classifier metrics obtained for each of the eight oct-bands (i.e., texture scale) using three features (variance, entropy, and energy) as input to the classifier model. We found that the combined features derived from all oct-bands achieved the best accuracy, sensitivity and specificity of 93.33 (±3.52), 88.33 (±4.12), and 96.89 (±3.88)%, respectively. We noticed that the texture features derived from LLL, HLL, and LHL provided an average (±SD) range classifier accuracy, sensitivity, and specificity of 83.44--86.16 (±3.4--4.6)%, 66.11--87.78 (±3.0--13.66)%, and 87.28--91.44 (±0.8--4.4)%, respectively. In comparison, weaker performance was achieved when using HHL, LLH, HLH, LHH, and HHH. This demonstrates that the weak discrimination achieved based on univariate analysis (i.e., LLL in ANOVA test) leads to a good classifier metrics when combining features within the RF model. Figures [6](#F6){ref-type="fig"}B,C shows the area under the ROC curves for each PT type (i.e., ST, BH, IN, and CA) across all the eight oct-bands. We found that the features derived from eight oct-bands of carcinoma tissue achieved an AUC range value of 91.14--100%. In contrast, only five (LLL, HLL, LHL, HHL, and HHH), three (LLL, HLL, and LHL), and two features (LLL and HLL), respectively derived from BH, IN, and CA that are achieved over 90%. We observed that the best AUC values of 96.04, 96.37, 99.79, and 100% were derived from the combined band features in ST, BH, IN, and CA, respectively. Comparing the bands, texture features derived from HLL band achieved the higher AUC value of ST (94.42%), BH (94.33%), and IN (98.67%). However, texture derived from LLH of CA has achieved the best AUC value of 100% (Figure [6](#F6){ref-type="fig"}C).
{#F6}
Figure [7](#F7){ref-type="fig"}A shows the performance metrics obtained for each of the three quantifier functions (variance, entropy, and energy) derived from eight oct-bands (texture scale) that are combined (LLL, HLL, LHL, HHL, LLH, HLH, LHH, and HHH) and are used as the input to the classifier model. We found that the combined entropy features of eight oct-bands provide a better classifier metrics with an average (±SD) accuracy, sensitivity and specificity of 92.22 (±4.3), 86.11 (±2.7), 96.11 (±2.6)%, respectively, compared to variance (i.e., accuracy of 84.12%, sensitivity of 75.00%, and specificity of 91.33%) and energy features (i.e., accuracy of 83.01%, sensitivity of 84.44%, and specificity of 92.94%). Figures [7](#F7){ref-type="fig"}B,C shows the area under the ROC curves for all the PT types. We found that ST, BH, IN, and CA achieved, respectively, an average AUC value range of 90.48--91.18, 81.82--94.21, 86.21--97.71, and 97.93--100%. We observed that the CA type has the highest AUC value based on variance and entropy features. We noticed that the entropy is the common feature that achieved the highest AUC value of ST, BH, IN, and CA (i.e., Figure [7](#F7){ref-type="fig"}C).
{#F7}
Table [3](#T3){ref-type="table"} reports the classifier metrics in terms of accuracy, sensitivity, and specificity, derived from the texture features of GLCM ([@B37]) and db~2~ of 2D-WT ([@B38]) and 3D-WT. We see that 3D-WT obtain the highest classifier accuracy of 93.33% compared to 89.74 and 84.62% derived from GLCM and 2D-WT features. This confirms that the texture features derived from the 3D-WT provide more patterns to discriminate between PT types.
######
Comparative analysis of the proposed model.
Methods Classifier metrics (%)
----------------------------------- ------------------------ ------- -------
Gray-level co-occurrence matrices 89.74 77.78 96.67
2D-Wavelet transform (WT) 84.62 66.67 96.67
Proposed model (3D-WT) 93.33 88.33 96.89
Discussion {#S4}
==========
There has been an upsurge in studies related to using image texture features or "radiomics" for computer-assisted diagnosis of digital WSI in the recent years ([@B10], [@B12], [@B21], [@B23], [@B39], [@B40]). In addition to providing diagnostic information, such analysis may also reveal insights into the underlying biology of cancer, making further investigation into radiomic assessment of CRC a priority. Computer-aided accurate diagnosis has an additional benefit in reducing human effort and cost spent in overtreatment and prevents patient morbidity and mortality associated with under diagnosis and under treatment. However, radiomic features most helpful in predicting pathological lesions and malignancy are still unknown.
Previous publications have demonstrated that combined radiomic features can offer good performance for multi-label colon cancer prediction, with a precision of 73.7% ([@B41]). However, colon cancer diagnosis and prognosis depends on the ability to discriminate between the distinct malignancy states which can exist ([@B42]), oftentimes within an individual tumor section. Several papers have addressed the issue of discriminating between types of pathology for accurate diagnosis of colon cancer. Most have focused on their radiomic heterogeneity and found a correlation between heterogeneity and malignancy ([@B43], [@B44]). Despite this, minimal interrogation of whether radiomic measurements can discriminate between intermediate states of malignancy has limited translation toward clinical practice.
In this study, we utilized 3D-WT texture features to investigate whether radiomic analysis could derive values which can discriminate malignancy within a tissue section. The active contour segmentation technique was used to semi-automatically define areas within each tissue section and report heterogeneity of malignancy (i.e., ST, BH, IN, and CA, Figure [3](#F3){ref-type="fig"}) before comparing the findings to that from a registered pathologist. We found concordance between our semi-automated methodology and the pathologist report (i.e., Table [1](#T1){ref-type="table"}) suggesting that this methodology can successfully define regional heterogeneity in tissue sections. Twelve derived features were found to be differentially enriched in the various malignancy gradings. Areas enriched for carcinoma tissue were most easily defined by our methodology, where they were highly enriched in LHL, HHL, LLH, LHH, and HHH texture features compared to areas of ST, BH, and IN. Similarly, we found that various features derived from entropy and energy features were enriched in benign hypoplasia (energy-HLL) and intraepithelial neoplasia (entropy-HLL/HHL). Combining texture scales achieved the greatest AUC value (i.e., Figure [6](#F6){ref-type="fig"}) and confidence of CA region identification. This result is consistent with previous studies which considered similar multispectral images using the GLCM and 2D-WT ([@B22], [@B23]). Despite achieving close performance metrics ([@B23]), we suggest that the ability for 3D-WT texture features to integrate information from multi-spectral layers to derive radiomic features may increase confidence compared to 2D-WT as feature values are not dependent on single images.
Notably, our model included an option for the pathologist to select regions of interest for further processing, and we suggest that using the implemented active contour model on FPGA technologies as proposed by Chaddad et al. ([@B45]) will accelerate the speed of the processing when dealing with thousands of images. In addition, the high accuracy of discrimination achieved using the methodology presented in this manuscript highlights the feasibility of automated assessment of CRC malignancy using digital WSI. In this context, 3D-WT resolves the similarity of patterns observed in the previous studies ([@B12]) by comparing the two popular techniques (i.e., 2D-WT and 3D GLCM).
This study offers a simple approach based on texture feature analysis to evaluate the continuum of CRC from benign to malignant by using four PT types which represent the transformation from benign to malignant cancer. Our study should be validated on a bigger dataset to ensure general applicability. Future directives include multiple combinations of texture features in predicting the continuum of CRC. There is also a necessity to increase the realm of diagnosis to include well differentiated, moderately differentiated, and poorly differentiated cancer. Identifying small changes in texture features that could predict the progress or stability of lesions would be a major breakthrough in early diagnosis and management of these lesions. This should trigger further research of image-based quantitative texture features based on 3D-WT in CRC. Given that the reality of CRC is highly heterogeneous between patients, texture feature analysis is a more comprehensive approach to provide a clear categorization of colorectal lesions than the established methods.
Conclusion {#S5}
==========
In this paper, a new approach based on 3D-WT texture features for PT classification of CRC is proposed. This study demonstrates that texture feature extraction based on 3D-WT can be a promising technique for mapping colorectal digital slide images. Image processing techniques can be further applied to make the computer-aided diagnosis more robust, which will drive the development of automated systems able to make preliminary diagnosis of tissues to help triage urgent cases. We propose that the methodology described in this manuscript offers added value to diagnostic pipelines at limited additional cost to health care systems and may improve delivery of patient care.
Author Contributions {#S6}
====================
AC performed the experiments, analyzed data, designed the experiments. PD and TN reviewed and wrote the final version, and all of the authors gave the final approval of the manuscript.
Conflict of Interest Statement {#S7}
==============================
The authors declare that the research was conducted in the absence of any commercial or financial relationships that could be construed as a potential conflict of interest.
The author would like to acknowledge the LCOMS laboratory at the University of Lorraine for providing the multispectral data.
[^1]: Edited by: Fabio Grizzi, Humanitas Research Hospital, Italy
[^2]: Reviewed by: Sanja Štifter, University of Rijeka, Croatia; Arjola Qehajaj, University Medical Center Mother Teresa (QSUT), Albania
[^3]: Specialty section: This article was submitted to Molecular and Cellular Oncology, a section of the journal Frontiers in Oncology
| 2023-11-04T01:27:13.970301 | https://example.com/article/9036 |
// Copyright 2020 the u-root Authors. All rights reserved
// Use of this source code is governed by a BSD-style
// license that can be found in the LICENSE file.
// Package vfile verifies files against a hash or signature.
//
// vfile aims to be TOCTTOU-safe by reading files into memory before verifying.
package vfile
import (
"bytes"
"crypto/sha256"
"crypto/sha512"
"errors"
"fmt"
"hash"
"io"
"io/ioutil"
"os"
"golang.org/x/crypto/openpgp"
)
// ErrUnsigned is returned for a file that failed signature verification.
type ErrUnsigned struct {
// Path is the file that failed signature verification.
Path string
// Err is a nested error, if there was one.
Err error
}
func (e ErrUnsigned) Error() string {
if e.Err != nil {
return fmt.Sprintf("file %q is unsigned: %v", e.Path, e.Err)
}
return fmt.Sprintf("file %q is unsigned", e.Path)
}
func (e ErrUnsigned) Unwrap() error {
return e.Err
}
// ErrNoKeyRing is returned when a nil keyring was given.
var ErrNoKeyRing = errors.New("no keyring given")
// ErrWrongSigner represents a file signed by some key, but not the ones in the given key ring.
type ErrWrongSigner struct {
// KeyRing is the expected key ring.
KeyRing openpgp.KeyRing
}
func (e ErrWrongSigner) Error() string {
return fmt.Sprintf("signed by a key not present in keyring %s", e.KeyRing)
}
// GetKeyRing returns an OpenPGP KeyRing loaded from the specified path.
//
// keyPath must be an already trusted path, e.g. keys are included in the initramfs.
func GetKeyRing(keyPath string) (openpgp.KeyRing, error) {
key, err := os.Open(keyPath)
if err != nil {
return nil, fmt.Errorf("could not open pub key: %v", err)
}
defer key.Close()
ring, err := openpgp.ReadKeyRing(key)
if err != nil {
return nil, fmt.Errorf("could not read pub key: %v", err)
}
return ring, nil
}
// OpenSignedSigFile calls OpenSignedFile expecting the signature to be in path.sig.
//
// E.g. if path is /foo/bar, the signature is expected to be in /foo/bar.sig.
func OpenSignedSigFile(keyring openpgp.KeyRing, path string) (*File, error) {
return OpenSignedFile(keyring, path, fmt.Sprintf("%s.sig", path))
}
// File encapsulates a bytes.Reader with the file contents and its name.
type File struct {
*bytes.Reader
FileName string
}
// Name returns the file name.
func (f *File) Name() string {
return f.FileName
}
// OpenSignedFile opens a file that is expected to be signed.
//
// WARNING! Unlike many Go functions, this may return both the file and an
// error.
//
// It expects path.sig to be available.
//
// If the signature does not exist or does not match the keyring, both the file
// and a signature error will be returned.
func OpenSignedFile(keyring openpgp.KeyRing, path, pathSig string) (*File, error) {
content, err := ioutil.ReadFile(path)
if err != nil {
return nil, err
}
f := &File{
Reader: bytes.NewReader(content),
FileName: path,
}
signaturef, err := os.Open(pathSig)
if err != nil {
return f, ErrUnsigned{Path: path, Err: err}
}
defer signaturef.Close()
if keyring == nil {
return f, ErrUnsigned{Path: path, Err: ErrNoKeyRing}
} else if signer, err := openpgp.CheckDetachedSignature(keyring, bytes.NewReader(content), signaturef); err != nil {
return f, ErrUnsigned{Path: path, Err: err}
} else if signer == nil {
return f, ErrUnsigned{Path: path, Err: ErrWrongSigner{keyring}}
}
return f, nil
}
// ErrInvalidHash is returned when hash verification failed.
type ErrInvalidHash struct {
// Path is the path to the file that was supposed to be verified.
Path string
// Err is some underlying error.
Err error
}
func (e ErrInvalidHash) Error() string {
return fmt.Sprintf("invalid hash for file %q: %v", e.Path, e.Err)
}
func (e ErrInvalidHash) Unwrap() error {
return e.Err
}
// ErrHashMismatch is returned when the file's hash does not match the expected hash.
type ErrHashMismatch struct {
Want []byte
Got []byte
}
func (e ErrHashMismatch) Error() string {
return fmt.Sprintf("got hash %#x, expected %#x", e.Got, e.Want)
}
// ErrNoExpectedHash is given when the caller did not specify a hash.
var ErrNoExpectedHash = errors.New("OpenHashedFile: no expected hash given")
// OpenHashedFile256 opens path and verifies whether its contents match the
// given sha256 hash.
//
// WARNING! Unlike many Go functions, this may return both the file and an
// error in case the expected hash does not match the contents.
//
// If the contents match, the contents are returned with no error.
func OpenHashedFile256(path string, wantSHA256Hash []byte) (*File, error) {
return openHashedFile(path, wantSHA256Hash, sha256.New())
}
// OpenHashedFile512 opens path and verifies whether its contents match the
// given sha512 hash.
//
// WARNING! Unlike many Go functions, this may return both the file and an
// error in case the expected hash does not match the contents.
//
// If the contents match, the contents are returned with no error.
func OpenHashedFile512(path string, wantSHA512Hash []byte) (*File, error) {
return openHashedFile(path, wantSHA512Hash, sha512.New())
}
func openHashedFile(path string, wantHash []byte, h hash.Hash) (*File, error) {
content, err := ioutil.ReadFile(path)
if err != nil {
return nil, err
}
f := &File{
Reader: bytes.NewReader(content),
FileName: path,
}
if len(wantHash) == 0 {
return f, ErrInvalidHash{
Path: path,
Err: ErrNoExpectedHash,
}
}
// Hash the file.
if _, err := io.Copy(h, bytes.NewReader(content)); err != nil {
return f, ErrInvalidHash{
Path: path,
Err: err,
}
}
got := h.Sum(nil)
if !bytes.Equal(wantHash, got) {
return f, ErrInvalidHash{
Path: path,
Err: ErrHashMismatch{
Got: got,
Want: wantHash,
},
}
}
return f, nil
}
| 2024-01-15T01:27:13.970301 | https://example.com/article/6250 |
package system
import (
"github.com/shirou/gopsutil/cpu"
"github.com/qiniu/logkit/metric"
. "github.com/qiniu/logkit/utils/models"
)
const (
TypeMetricCpu = "cpu"
MetricCpuUsages = "CPU(Cpu)"
// TypeMetricCpu 信息中的字段
// CPU 总量
CpuTimeUser = "cpu_time_user"
CpuTimeSystem = "cpu_time_system"
CpuTimeIdle = "cpu_time_idle"
CpuTimeNice = "cpu_time_nice"
CpuTimeIowait = "cpu_time_iowait"
CpuTimeIrq = "cpu_time_irq"
CpuTimeSoftirq = "cpu_time_softirq"
CpuTimeSteal = "cpu_time_steal"
CpuTimeGuest = "cpu_time_guest"
CpuTimeGuestNice = "cpu_time_guest_nice"
CpuTimeCPU = "cpu_time_cpu"
// CPU 用量
CpuUsageUser = "cpu_usage_user"
CpuUsageSystem = "cpu_usage_system"
CpuUsageIdle = "cpu_usage_idle"
CpuUsageNice = "cpu_usage_nice"
CpuUsageIowait = "cpu_usage_iowait"
CpuUsageIrq = "cpu_usage_irq"
CpuUsageSoftirq = "cpu_usage_softirq"
CpuUsageSteal = "cpu_usage_steal"
CpuUsageGuest = "cpu_usage_guest"
CpuUsageGuestNice = "cpu_usage_guest_nice"
CpuUsageCPU = "cpu_usage_cpu"
// Config 中的字段
CpuConfigPerCpu = "per_cpu"
CpuConfigTotalCpu = "total_cpu"
CpuConfigCollectCpuTime = "collect_cpu_time"
)
// KeyCpuUsages TypeMetricCpu 中的字段名称
var KeyCpuUsages = KeyValueSlice{
// CPU 总量
{CpuTimeUser, "用户进程用时", ""},
{CpuTimeSystem, "系统内核用时", ""},
{CpuTimeIdle, "空闲CPU用时", ""},
{CpuTimeNice, "优先级调度用时", ""},
{CpuTimeIowait, "iowait用时", ""},
{CpuTimeIrq, "中断用时", ""},
{CpuTimeSoftirq, "软中断用时", ""},
{CpuTimeSteal, "Steal用时", ""},
{CpuTimeGuest, "Guest用时", ""},
{CpuTimeGuestNice, "GuestNice用时", ""},
{CpuTimeCPU, "CPU序号名称", ""},
// CPU 用量
{CpuUsageUser, "用户用量百分比(0~100)", ""},
{CpuUsageSystem, "系统用量百分比(0~100)", ""},
{CpuUsageIdle, "空闲百分比(0~100)", ""},
{CpuUsageNice, "优先级调度程序用量百分比(0~100)", ""},
{CpuUsageIowait, "IOwait时间占比(0~100)", ""},
{CpuUsageIrq, "中断时间占比(0~100)", ""},
{CpuUsageSoftirq, "软中断时间占比(0~100)", ""},
{CpuUsageSteal, "虚拟CPU的竞争等待时间占比(0~100)", ""},
{CpuUsageGuest, "虚拟进程的CPU用时占比(0~100)", ""},
{CpuUsageGuestNice, "虚拟进程CPU调度用时占比(0~100)", ""},
{CpuUsageCPU, "CPU序号名称", ""},
}
// ConfigCpuUsages TypeMetricCpu 配置项的描述
var ConfigCpuUsages = KeyValueSlice{
{CpuConfigPerCpu, "是否收集每个 cpu 的统计数据(" + CpuConfigPerCpu + ")", ""},
{CpuConfigTotalCpu, "是否收集整个系统的 cpu 统计信息(" + CpuConfigTotalCpu + ")", ""},
{CpuConfigCollectCpuTime, "是否收集 cpu 时间统计信息(" + CpuConfigCollectCpuTime + ")", ""},
}
type CPUStats struct {
ps PS
lastStats map[string]cpu.TimesStat
PerCPU bool `json:"per_cpu"`
TotalCPU bool `json:"total_cpu"`
CollectCPUTime bool `json:"collect_cpu_time"`
}
func (*CPUStats) Name() string {
return TypeMetricCpu
}
func (*CPUStats) Usages() string {
return MetricCpuUsages
}
func (*CPUStats) Tags() []string {
return []string{CpuTimeCPU, CpuUsageCPU}
}
func (*CPUStats) Config() map[string]interface{} {
cpuConfig := make([]Option, 0)
for _, val := range ConfigCpuUsages {
opt := Option{
KeyName: val.Key,
Element: Radio,
ChooseOnly: true,
ChooseOptions: []interface{}{"true", "false"},
Default: "true",
DefaultNoUse: false,
Description: val.Value,
Type: metric.ConfigTypeBool,
}
cpuConfig = append(cpuConfig, opt)
}
config := map[string]interface{}{
metric.OptionString: cpuConfig,
metric.AttributesString: KeyCpuUsages,
}
return config
}
func init() {
metric.Add(TypeMetricCpu, func() metric.Collector {
return &CPUStats{
PerCPU: true,
TotalCPU: true,
CollectCPUTime: true,
ps: newSystemPS(),
}
})
}
| 2023-11-03T01:27:13.970301 | https://example.com/article/9440 |
AlexandrosP589
...well described by fellow reviewers. I would like to add that the surrounding area "offers" tables, benches for picnic under the plan trees, designated bbq area. So despite the historical, religious...
more »
See on a trip to the center of the island, this Chapel is well maintained. Next to it, there is a playground for children and free toilets. In front, you will find a fountain with fresh water that is drinkable. This Chapel in stone with four conches. The Interior frescoes are visible. Worth a visit if you go near foundoukli and Eleoussa
For Business Owners
Every day, we help thousands of travelers plan great vacations. Here are some tips on how to use your Listing Page to attract more travelers to your business - Agios Nikolaos Fountoukli.
Review Your Listing
Review information on this page and make sure it is accurate. If you have photos, descriptions, contact information,
social media handles, etc. you would like to add, please send us an email.
Promote Your Listing
Promote your permanent link - https://www.inspirock.com/greece/eleousa/agios-nikolaos-fountoukli-a2306442755 - on your website, your blog, and social media.
When a traveler builds a plan from this page, the itinerary automatically includes Agios Nikolaos Fountoukli.
This is a great way for travelers looking for a great vacation in your city or country to also experience
Agios Nikolaos Fountoukli.
Promoting your link also lets your audience know that you are featured on a rapidly growing travel site.
In addition, the more this page is used, the more we will promote Agios Nikolaos Fountoukli to other Inspirock users.
Setup Your Trip Planning Widget
For best results, use the customized Trip Planning Widget for Agios Nikolaos Fountoukli on your website.
It has all the advantages mentioned above, plus users to your site can conveniently access it directly on your site.
Visitors to your site will appreciate you offering them help with planning their vacation.
Setting this up takes just a few minutes - Click here for instructions. | 2023-09-21T01:27:13.970301 | https://example.com/article/5918 |
Renal cysts and diabetes syndrome
Renal cysts and diabetes syndrome (RCAD), also known as MODY 5, is a form of maturity onset diabetes of the young.
HNF1β-related MODY is one of the less common forms of MODY, with some distinctive clinical features, including atrophy of the pancreas and several forms of renal disease. HNF1β, also known as transcription factor 2 (TCF2), is involved in early stages of embryonic development of several organs, including the pancreas, where it contributes to differentiation of pancreatic endocrine Ngn3+ cell progenitors from non-endocrine embryonic duct cells. The gene is on chromosome 17q.
The degree of insulin deficiency is variable. Diabetes can develop from infancy through middle adult life, and some family members who carry the gene remain free of diabetes into later adult life. Most of those who develop diabetes show atrophy of the entire pancreas, with mild or subclincal deficiency of exocrine as well as endocrine function.
The non-pancreatic manifestations are even more variable. Kidney and genitourinary malformation and diseases may occur, but inconsistently even within a family, and the specific conditions include a range of apparently unrelated anomalies and processes. The most common genitourinary condition is cystic kidney disease, but there are many varieties even of this. Renal effects begin with structural alterations (small kidneys, renal cysts, anomalies of the renal pelvis and calices), but a significant number develop slowly progressive chronic kidney failure associated with chronic cystic disease of the kidneys. In some cases, renal cysts may be detected in utero. Kidney disease may develop before or after hyperglycemia, and a significant number of people with MODY5 are discovered in renal clinics.
With or without kidney disease, some people with forms of HNF1β have had various minor or major anomalies of the reproductive system. Male defects have included epididymal cysts, agenesis of the vas deferens, or infertility due to abnormal spermatozoa. Affected women have been found to have vaginal agenesis, hypoplastic, or bicornuate uterus.
Liver enzyme elevations are common, but clinically significant liver disease is not. Hyperuricaemia and early onset gout have occurred.
References
External links
Category:Diabetes
Category:Transcription factor deficiencies | 2023-08-26T01:27:13.970301 | https://example.com/article/3206 |
A:Due to the number of strings on a harp (up to 47), tuning will require a bit of time, an electronic tuner and a harp-tuning key. Due to the melodic sound of the individual strings, the act of tuning, itself, can be an enjoyable endeavo
Q:How Does a Harp Work?
A:Harps have a row of tuning pegs on the top and a box-like resonator on the bottom. Strings are stretched between the tuning pegs and the resonator, and adjusted until the harp is in tune. Most harps have a diatonic tuning, using 7 notes in each octave to get a complete major scale. Some harps are chromatically tuned with two rows of strings side by side. The row with the diatonic strings is like the white keys on the piano. The second, chromatic row is like the black keys. When the player plucks a string, the vibration is passed on to the resonator, which amplifies and projects it. The harpist can choose to pluck the strings with the pad of his finger to make a warm, mellow tone, or to use the tip to make a sharper sound.
Q:What kind of music can be played on this instrument?
A:The Reverie Harp is not really designed for playing music. You can pick out a few simple pentatonic melodies if you explore around on it to find the right notes (Amazing Grace, Go Tell it on the Mountain, Row Your Boat, Three Blind Mice, Mary Had a Little Lamb, etc). But this is not the main purpose of the harp.
Think of this as more of a therapy tool for non-musicians than a musical instrument for musicians. We designed it specifically so that a person does not need to engage the mind to enjoy pleasant sounds. So the word "play" does not mean "perform" on this harp. You "play with" this harp. You can close your eyes and play with it – we call it "noodling around" on the strings. A child can play with it, a person with limitations can enjoy playing with it.
Q:Does HARP work the same with Fannie Mae as with Freddie Mac?
A:Yes, for the most part, the HARP mortgage program is the same with Fannie Mae as with Freddie Mac. There are some small differences, but they affect just a tiny, tiny portion of the general population. For everyone else, the guidelines work the same.
Q:How often does the Reverie Harp need to be tuned?
A:The harp is quite stable after the first 3-4 tunings, but you should expect to tune it at least once per week if you need it to be in tune with other instruments. If you only play the harp by itself, however, you may not to tune it that frequently because all the strings tend to settle quite evenly across the harp.
Q:How do you tune the Reverie Harp?
A:We recommend having a chromatic electronic tuner to aid in achieving accurate tuning. The harp comes with a tuning chart that slides under the strings, and a tuning key (wrench) for the pins. Our DVD includes instructions for tuning, using an electronic tuner.
Q:What happens if a string breaks?
A:The strings are not prone to breaking unless you over-tune to a higher pitch. This can occur inadvertently if you are plucking one string and adjusting the pin for another string. You might over-tighten one string because you don't see movement in the pitch of the one you are plucking. So you want to be careful to keep track of which string you are tuning and what note it should be tuned to.
We use common guitar strings (ball-end steel) on the Reverie Harp. If you break a string, you can purchase replacements from Musicmakers, or you can take the scrap of broken string to a local music store that sells guitar strings and buy a similar string. The store won't have a complete set of strings for the Reverie Harp, but they should offer individual guitar strings.
Many people purchase a spare set of strings from Musicmakers just to avoid the hassle of having to search for replacements.
Q: How to take care your Harp?
Harps are tougher than harpists sometimes think. Our harps can withstand a fair bit of abuse in the course of normal transportation and performance. However, following a few simple, common sense rules about harp care will keep your harp looking and sounding lovely for many years.
1. CleaningYour harp is finished with a durable "in the wood" polymerized tung oil finish on the frame, nitrocellulose lacquer on the soundboard, and a topcoat of hard carnuba wax polish. This finish looks lovely, is easy to maintain, and helps to protect your harp from a number of environmental stresses. All your harp will need under normal conditions is dusting with a dry soft cloth.
2. Extremes of temperatureLike all fine wooden instruments, harps will shift if the temperature of their environment drops or increases suddenly, and this shifting can make your harp go out of tune faster, and even cause structural damage in extreme conditions. Protecting your harp from rapid changes of temperature is relatively easy however. When you take your harp out of your home, use a quality case, or even, in a pinch, an old sleeping bag or quilt to insulate it from the elements. Under the insulation, your harp will still become colder or warmer but slowing that temperature change down gives your harp time to adjust to its new conditions. You can again reduce the stress of temperature change on your harp when you arrive at your destination by leaving it in its case until your harp's case reaches room temperature rather than unpacking it immediately.
However, simple extremes of temperature can be hard on a harp regardless of how well it is packed. So never leave your harp in front of a direct source of heat, like a woodstove, a heat register, a sunny window leave your harp in your car on a hot day with the windows up
store your harp in the trunk of your car in the winter (assuming there is any way you can fit it in the cab of the car with your passengers) subject your harp to climate conditions to which you would hesitate to subject a puppy.
3. Humidity and drynessEven though it looks solid, wood reacts to varying conditions of humidity just like a sponge. In a wet environment, wood will absorb water and swell, and in a dry environment wood can shrink or even crack. Finishing a piece of wooden furniture or a musical instrument helps to protect it from rapid changes of humidity, but even the most perfectly finished harp is not immune to humidity's effects. Most luthiers dry their woods carefully before using them to minimise the potentially detrimental effects of a dry environment upon a finished instrument, but there are things you can do to help protect your harp as well.
I advise my clients to purchase a hygrometer at a hardware store (they start at about $10) to keep in the room that is home to your harp. When the humidity drops below 40% it is time to consider humidifying the room. Coincidentally this is the point of humidity at which you yourself will begin to find your environment uncomfortably dry, so you will reap the benefits of humidifying along with your harp. If your room is small, an ornamental fountain may provide enough moisture to keep the humidity above the 40% mark. In a larger room, you might want to consider a humidifier (though don't have the humidifier directly next to your harp!!) If humidifying the room isn't possible, consider keeping your harp in its case with an instrument humidifier (Dampit is a popular brand, generally about $15 at a guitar store) inside your harp's soundbox. | 2024-04-12T01:27:13.970301 | https://example.com/article/9225 |
Israeli Ethiopian female adolescents' perspectives on alliances with social workers: Agency, power and performing identity.
This qualitative study explored the perspectives of at-risk Israeli female adolescents of Ethiopian origin (N = 15) regarding barriers to forming alliances with social workers. The study's rationale was based on the idea that an alliance enables clients to bring forth challenges and difficulties that are directly related to their well-being and, as such, is fundamental to the helping process. Four themes were identified as barriers to the forming of alliances with social workers: social workers' lack of availability; clients' perceived loss of independence in the process of receiving help; clients' sense of being forced to perform a different self ("passing"); and clients' difficulties in "opening up." Our discussion contextualizes these findings within a critical discourse that sees intervention in a sociopolitical context. Implications for practice are offered. (PsycINFO Database Record (c) 2019 APA, all rights reserved). | 2024-03-03T01:27:13.970301 | https://example.com/article/1432 |
This is the apology I was never allowed to give...
I wish I could have given this in person. Yet you know where to contact me, if you so choose to hear it for yourself.
The past few months I've done a lot of hard thinking about what happened last year. I want you to know that everything that I'm about to say is coming from the bottom of my heart. I know that it will be very difficult for you to accept my apology, and it may be difficult to believe, but I want you to think about the friendship we once had. I want you to feel the peacefulness I feel when I think of you. I want you to know the pain I feel is true, and not just a plea. This apology is for you, not for me.
My Dearest girl, soon you may visit this page. And No matter what was said or done. It is done. We cannot change the past. Yet, I wish it had been said by me...
"I am sorry for hurting you twice, the way I did."
"I'm sorry that I had not tried harder to control my anger."
"I'm sorry I ever accused you of things you did not do."
"I'm sorry I often didn't hug you, when you really needed a hug."
"I'm sorry that I ended up, making you frown around me, instead of smiling."
"I'm sorry I ever bothered you when you needed time alone."
"I am sorry for you having to walk on egg-shells around me.(I now know what that means!)"
"I'm sorry I never learned about the money, using the rent money three times, for my own selfish desires."
"I'm sorry that I ever kept anything from behind your back, without telling you."
"I'm sorry that I didn't listen to you when you tried to share with me."
"I'm sorry I forgot to cuddle."
"I'm sorry I ever told a lie. Or kept any truths from you. I can't remember all of them, but I'd like to tell you the one's I can."
"I'm sorry, for not saying "I'm sorry" sooner."
"I'm sorry for having such a wicked soul."
"I'm sorry that my love for you wasn't making us both whole"
"I'm sorry that I had stopped loving you. For even if I had thought I didn't, I must have, or I'd have shown it more."
"I'm sorry for you having to bear the burden of me. I never wanted to be a burden to anyone, and yet I was."
Stuff is just stuff
But what I had with you was gold,
Better than riches untold.
And the greed of me holding on
Forced you to need to leave.
There is no one else I would have rather
been with, but now it seems that that is my only choice.
You meant more to me, than anyone has ever meant.
And now, you must go.
And You must be free.
Free from the wicked man I am or used to be.
I do not know if I have changed.
All I know is I have learned many things,
more valuable to me than diamond rings.
Stay true to your heart, and let it lead the way,
You will know where to go, no matter what other's say.
This also includes the words I write,
This is all I have to try and make things right.
I cannot come to see you until you so allow
It is sad once good friends, almost strangers now.
Read this if you will, or don't read it at all
It matters not to me, for I hear your name when my heart does call.
And I am coming to peace, with things that aren't so peaceful
The grace of your memory, is all I carry now
And I will take it wherever I go,
and cherish it, even if I have to let YOU go.
This is not the end of the world as we know it,
Life goes on, forgiven or not
I must live, and find my own story's plot.
I wish that story had been much different.
But I cannot turn the pages back.
And now, your care and trust, is all I lack.
Continue on, my sweet, sweet, DRAGONFLY
And I hope your heart flies ever so high!
You are free, free from me.
Peace, be unto ye.
"You are so beautiful to me", even if we are apart,
your beautiful face rests in my heart.
Sorry-O-Meter
5.00 out of 5 hearts
Add your vote! How much forgiveness does this story rate? 1 is lowest, 5 is highest. | 2024-03-08T01:27:13.970301 | https://example.com/article/6190 |
<template name="loading">
<view class="loading text-center">
<block wx:if="{{loading}}">
<image src="/images/group/loading-black.svg"></image>
<view class="">正在加载</view>
</block>
<block wx:else>
<view class="no-data">没有更多数据了</view>
</block>
</view>
</template> | 2023-08-23T01:27:13.970301 | https://example.com/article/1725 |
Q:
Is there a multi-tab terminal replacement for Cygwin's terminal?
Is there a multi-tab terminal replacement for Cygwin's terminal?
A:
You can use Console to achieve this. Simply configure the Shell under the Settings page to point to Cygwin.bat.
A:
The standard answer to this question is GNU Screen.
Wikipedia has some alternatives, such as tmux.
A:
If it is not a problem for you to start sshd and use cygwin via "ssh localhost", try MTPuTTY. It worked great for me.
Features:
full access to PuTTY configurability (and I do not know any better terminal emulator for windows)
configurable keybindings in MTPuTTY (everything I needed)
| 2023-08-15T01:27:13.970301 | https://example.com/article/3004 |
All-weather jackets ordinarily have an outer shell and an inner liner to insulate the jacket and keep out water and wind. Jackets are also generally tailored to fit a standing human. Thus, a typical jacket includes a torso portion and sleeves that are designed to fit smoothly on a wearer when he or she is standing, but which may bunch up at undesirable locations when the posture of the wearer is other than upright.
When the wearer plays golf, for example, the wearer experiences a number of shortcomings with traditional jackets. A proper golf stance requires the wearer to bend forward at the waist and abdominal sections of the body. As the distance across the front of the wearer from the shoulders to the waist decreases, the liner and shell of a common jacket bunch up at the front of the jacket, producing a full belly shape. This fullness interferes with a golf swing as fabric of the jacket protrudes into the arcuate path through which the arms of the wearer must travel.
U.S. Pat. No. 5,218,720 discloses a jacket with a yieldable material sewn into a back panel of an otherwise unyielding liner to contact the back of a wearer. Horizontal straps with snaps are sewn to the back panel and front panels of the liner. The liner may be adjusted by attaching snaps to receptacles on the same strap. As a result, the insert is pressed against the back of the wearer, without producing bunching of the shell of the jacket. This teaching however, does not diminish any bunching of the shell itself produced when the wearer bends. The front of the jacket would still bunch up and interfere with a golf swing when the wearer leans forward. Also, as the snaps are located inside the jacket, the wearer must first remove the jacket to make an adjustment, then try on the jacket again for fit, and iterate these steps until a comfortable adjustment is achieved.
Other patents teach different adjustable jacket liners. For instance U.S. Pat. No. 2,391,352 teaches a coat with a band disposed between a shell and a liner. Ends of the band protrude into the inside of the jacket and attach to each other to pull the liner about the wearer.
Also, traditional sleeves are made from a single fabric panel sewn to itself along a single, straight seam. The panel is generally cut to taper towards the wrist. Often, fabric gussets with convex sides are sewn to the sleeves at the back of the elbow to provide additional room. Pleats leading to the elbow have also been employed to increase elbow room to enable a wearer to bend his or her arm. Lack of material at the elbow can causes the sleeve cuff to be pulled back from the wearer's wrist during certain arm motions.
As a solution to this problem, U.S. Pat. No. 5,138,717 teaches a piston and cylinder cuff that includes a wristlet mounted inside a false cuff by conical gussets. Thus the wristlet, engaged against a wearer's wrist, can telescope within the false cuff to prevent the wristlet from riding up on the arm of the wearer during an arm swinging motion.
The prior art sleeves designed to allow increased motion of the wearer's arm are either excessively baggy, and bunch up during certain motions, or require a large number of pieces of fabric and stitching. A small number of fairly simple seams is desirable to minimize production complexity and cost. | 2023-08-08T01:27:13.970301 | https://example.com/article/7342 |
Posts by bran.a.l.john
... When I run htseq-count in galaxy I keep getting errors. The line in the history will look as follows:
**##: htseq-count on data # and data #**
error
An error occured with this dataset:
Fatal error: Unknown error occured
100000 GFF lines processed.
200000 GFF lines processed.
300000 GFF lines proces ... | 2024-04-12T01:27:13.970301 | https://example.com/article/2629 |
kind: EncryptionConfig
apiVersion: v1
resources:
- resources:
- secrets
providers:
- aescbc:
keys:
- name: key1
secret: {{ encryption_key.stdout }}
- identity: {}
| 2023-10-30T01:27:13.970301 | https://example.com/article/4767 |
Q:
How can I retrieve sort property and direction from a Spring Data Pageable?
I am building an API that will call another API and return results. The API I am calling has a paging and sorting mechanism that requires adding the following query params to the URL:
?pageNumber=1&pageSize=20&sortField=id&sortDirection=asc
Now, I would like my API to use a Spring Pageable object as a parameter in the controller method, so, according to Spring Docs the URL passed to my new API will be:
?page=1&size=20&sort=id,asc
Therefore, in order to map the received pageable object to the required query params that I need to pass to the uinderlying API I need to retrieve the paging and sorting information from the Pageable object.
As for the pageSize and pageNumber it is pretty straight forward:
pageable.getPageNumber()
pageable.getPageSize()
But how can I retrieve sortField and sortDirection?
pageable.getSort() returns the Sort object, from which I could not find a way to retrieve what i need - the sortField value (string with property name) and sortDirection value (asc or desc)
Thanks
A:
Pageable::getSort will give you a Sort, and that is an Iterable of Sort.Orders. You need to iterate over each of these. They contain the properties you're looking for.
Sort sort = Sort.by(Sort.Direction.ASC, "abc");
for (Sort.Order order : sort)
{
System.out.println("Property: " + order.getProperty());
System.out.println("Direction: " + order.getDirection());
}
Prints
Property: abc
Direction: ASC
| 2023-12-22T01:27:13.970301 | https://example.com/article/4055 |
Introduction
============
Accidents, whether natural or un-natural, are the leading cause of death in the world ([@b1-ijph-39-095]). In the United States, it is estimated that everyman would need emergency services twice in his lifetime due to accidents ([@b2-ijph-39-095]). In this regard, the major share of accidents has been dedicated to road collisions, which kill 1.2 million people and injure 50 million people annually ([@b3-ijph-39-095]). Road collisions are the second cause of death among the youth (5--29 yr old people) and the third cause of death among 30--44 yr old people ([@b3-ijph-39-095]). According to the investigations carried out in Iran, a large share of referrals of injured people (48%--75%) to hospitals had been due to collisions ([@b4-ijph-39-095]--[@b5-ijph-39-095]). Based on WHO statistics, Iran ranks first worldwide in terms of having highest number of road accidents ([@b6-ijph-39-095]). All over the world, motorcycle accidents are one of the major causes of road death and injuries ([@b4-ijph-39-095], [@b7-ijph-39-095]--[@b8-ijph-39-095]).
Thus, this vehicle is called the most dangerous motor vehicle, as the risk of injury and death per mile with motorcycles are 3 and 16 times more than with cars ([@b9-ijph-39-095]--[@b10-ijph-39-095]). In Taiwan and Nigeria, 46 and 65% of accidents were due to motorcycle crashes ([@b11-ijph-39-095]). The results of a study shows that motorcycle riders are 10 times more exposed to injury in comparison with those who use four-wheel vehicles ([@b12-ijph-39-095]). Among those who are injured in a motorcycle crash, injury to head and leg is much more prevalent ([@b7-ijph-39-095], [@b13-ijph-39-095]--[@b15-ijph-39-095]) and the reasons are the small size of the vehicle and the pressure of the whole kinetic energy and the crash-resulted pressure solely on the riders ([@b16-ijph-39-095]--[@b17-ijph-39-095]). According to the report of WHO, motorcycle riders are amongst the most vulnerable people in road accidents ([@b18-ijph-39-095]).
Another issue, which intensifies the attention to motorcycle crashes, is the involvement of children, teenagers and active economic population is these kinds of accidents ([@b14-ijph-39-095], [@b17-ijph-39-095]) which significantly increases the life lost ratio and the costs of these kinds of accidents in comparison with other type of accidents. In Iran, It is estimated that motorcycle accidents impose 2 billion dollars to the country ([@b19-ijph-39-095]). According to a study carried out in Khorramabad; west of Iran, about 82% of injured motorcycle riders needed in-patient services and their total health cost was 981,572,746 dollars. According to a similar study performed in Australia, motorcycle crashes had imposed 1.25 billion dollars to the country ([@b20-ijph-39-095]). In Iran, as in many other Asian countries, motorcycles are used much frequently in the transportation system ([@b21-ijph-39-095]). The number of motorcycles has increased significantly in Iran due to different reasons ([@b22-ijph-39-095]). Statistically, the rate motorcycle production in 1986--1996 has increased from 50,599 to 8,334,552, respectively ([@b23-ijph-39-095]). This number indicates the significant increase of using this vehicle as it is mainly produced inside the country. According to the statistics derived from the first six months of 2004 and comparing it with the same statistics of 2008, motorcycle riders' death toll quadrupled. Based on the ownership of one hundred thousand motorcycles, the statistics for this 5 yr period had an increase of 60% and the rate of death toll indicated an increase of 381% for the aforementioned one hundred thousand populations ([@b22-ijph-39-095]). Also in Mazandaran, North of Iran, traffic collisions quadrupled from 2001 to 2002 ([@b10-ijph-39-095]). Having a just recognition of the traffic collision status quo is needed to control the increasing rate of accident-resulted mortalities.
This study aimed to determine the pattern of Motorcycle Fatal Accidents in Mashhad-Iran.
Materials and Methods
=====================
This descriptive study was carried out in Mashhad, North-Eastern of Iran, in 2006. The study population was motorcycle accidents in which the traffic officer had prepared reports on it. In this study, motorcycle refers to a single-track, two-wheeled motor vehicle usually with a third wheel for a small module attached to it ([@b24-ijph-39-095]). In this study, the involved motorcycle riders have been divided into two categories of blameful and blameless riders and the criteria for this categorization was based on the report of the traffic officer. This study included 350 cases. The data compilation tool was a standard questionnaire, which has been regulated by the Iranian Traffic Police Office, so its validity and reliability has been confirmed. In addition, someone was trained by a traffic officer in order to compile required data from the files. The compiled data were entered SPSS 11.5 software and then were analyzed using X^2^ test. The significance level was considered 0.05 in all statistical tests.
Results
=======
Research results indicate that in the time span of the study, 350 cases of motorcycle crashes occurred in Mashhad. The motorcycle rider was recognized as a blameful rider in 119 cases and blameless in 231 cases. Most of these accident happened at 8 p.m. to 12 p.m. ([Table 1](#t1-ijph-39-095){ref-type="table"}).
In 229 accidents in which the motorcycle has been the cause of crash, 99.1% led to injuries and 0.9% was fatal. The respective statistics for accidents in which the motor rider was not guilty was 117 cases (98.3%) for injury-leading accidents and 2 cases (1.7%) for fatal accidents. In addition, two people were killed in 84% of accidents and three people were injured in 11% of the accidents.
Seventy cases of blameful riders (92.1%) and twenty-one cases of (84%) blameless riders did not have safety helmets. Generally, 84.2% of the motorcycle riders did not have safety helmets. In addition, 14 cases in which the rider was blameful (87.5%) led to injuries and in other cases, no one was hurt or it led to death. However, in cases with a blameless motorcycle rider, 126 cases (94%) led to injuries and two people (1.5%) died.
About two third of blameful motorcycle riders were less than 25 yr old. The variance between blameful and blameless motorcycle riders was significant by a special age ([Table 2](#t2-ijph-39-095){ref-type="table"}).
The major cause of the accidents was due to neglecting the Yield Right of Way ([Table 3](#t3-ijph-39-095){ref-type="table"}).
The educational background of 50% (157 people) of the study population was not known. Amongst those with certain educational background, 58% (90 people) had secondary school degree, 23% (36 people) had diploma degree, 13% (20 people) had elementary degree, 5% (14 people) had associate's degree and others were either illiterate or had other degrees. There was not any significant divergence between blameful and blameless groups regarding educational background (sig= 0.492).
More than 70% of the accidents, whether the rider was blameful or not, happened due to negligence of traffic regulations. ([Table 4](#t4-ijph-39-095){ref-type="table"})
Discussion
==========
Our findings indicate that in the aforementioned period, 350 motorcycle accidents had happened in Mashhad. In 119 cases, the motorcycle rider had been blameful and in 231 cases, they were blameless. Most of the accidents had happened from 8 to 12 p.m. which is similar to the result of other studies performed in Thailand, Mashhad, Sari and Mazandaran province ([@b9-ijph-39-095]--[@b10-ijph-39-095], [@b14-ijph-39-095], [@b25-ijph-39-095]). Considering the time of accidents, it seems that darkness has an important contribution to these accidents. Paying attention to road safety and specially roads without enough lighting and regulating rules to limit the traffic of motorcycles without having technical standard license would be effective in decreasing the rate of accidents ([@b10-ijph-39-095]). Besides, checking the motorcycles to ensure about having good lights to warn other drivers can be effective, too.
In addition, the fact that there was more than one wounded person in 84% of the accidents indicates that there is more than one person on each motorcycle. Other studies suggest imposing heavy fines for violating the rule of single track ([@b22-ijph-39-095]).
The fact that less than 15% of the motorcycle riders had used safety helmet indicates that using this helmet has not still been accepted among the motorcycle riders of Mashhad. Not using safety helmet and safety cover are issues, which have been highlighted so many times in national and international studies ([@b5-ijph-39-095], [@b14-ijph-39-095], [@b19-ijph-39-095], [@b22-ijph-39-095], [@b26-ijph-39-095], [@b27-ijph-39-095]). The results of other studies indicate that among the wounded people of motorcycle accidents, the most vulnerable organ that would be wounded (40% to 95%) are head, face and neck ([@b4-ijph-39-095], [@b9-ijph-39-095]--[@b11-ijph-39-095], [@b16-ijph-39-095],[@b17-ijph-39-095], [@b27-ijph-39-095], [@b28-ijph-39-095]).
Using helmets would decrease injuries to head and face by 50% and would decrease severe brain injuries dramatically ([@b16-ijph-39-095], [@b21-ijph-39-095], [@b29-ijph-39-095]--[@b33-ijph-39-095]). It is believed that imposing heavy fines for those who do not wear safety helmets would increase the use of this tool ([@b34-ijph-39-095]). The decreased death rate of motorcycle riders in Tehran confirms the case as there had been regulated stringent rules if not using helmets ([@b22-ijph-39-095]). In a study carried out in Singapore, it revealed that there was not outstanding rate of death and severe injuries as 100% of the motorcycle riders had used helmets ([@b7-ijph-39-095]).
About two third of blameful motorcycle riders were less than 35yr, which is confirmed by the same, results from other national and international studies ([@b7-ijph-39-095], [@b10-ijph-39-095], [@b14-ijph-39-095], [@b17-ijph-39-095], [@b22-ijph-39-095], [@b26-ijph-39-095], [@b35-ijph-39-095]--[@b38-ijph-39-095]). This fact indicates that those who are involved in motorcycle accidents are notably youth and their death or disability would have negative impacts on the production growth of the society and increase the life lost ratio. The interesting point in this research was the relationship found between age of motorcycle riders and their being blameful, in other way, the lower the age of motorcycle riders, the more the possibility of their being blameful in occurrence of the accident. This trend is adverse in blameless motorcycle riders. This variance was considerable statistically which means that the youth cause more crashes and collisions rather than the other adults. The most notable cause of accidents has been violation of the yield right of way, not paying attention to the front, deviation to left and sudden change in moving. The same pattern exists for the blameful riders. According to the studies performed by 2 experts of Planning and Management Organization on 100 motorcycles, 52% of these vehicles had passed forbidden places, 32% passed through pavements, 32% carried unauthorized cargo, or person and 24% passed red lights per a day ([@b22-ijph-39-095]). These factors had led to a sharp increase in traffic violations and fatal accidents. Most of the study population of the research involved in an accident, whether blameful or blameless, had secondary school degrees. In other studies performed in Mashhad and Khorramabad, west of Iran, 65.2% of the study population had degree of elementary school degrees and just 1.5% of them had university degrees ([@b14-ijph-39-095]). In the study performed in Lorestan, west of Iran, 31.5% of the study population was illiterate, 23.4% had elementary school degrees, 15.2% had secondary school degrees and 23.8% had high school degrees ([@b39-ijph-39-095]). The significant increase in illiterate and those with elementary school degree in contrast to other with higher educational background indicates the effective impact of literacy and higher trainings in decreasing the number of accidents ([@b14-ijph-39-095]). Therefore, there is a significant relationship between the level of literacy and reducing accidents.
There were some limitations in performing this research. Inability of the researcher to check the information was one this cases as the information had been registered by the officer and the validity of this information was influenced by the officer's attitude, time limitations etc. which the researcher could not check.
In conclusion, with regard to the number and variations of motorcycle accidents, irresponsible motorcycle riding can be considered as a social pathology.
Ethical Consideration
=====================
All Ethical issues (such as informed consent, conflict of interest, plagiarism, misconduct, co-authorship, double submission, etc) have been considered carefully.
The authors would like to thank Forensic Medicine of Iran for their financial support, Traffic Department of Khorasan Razavi Province for cooperation in data gathering phase, and Vice Chancellor for Research of Mashhad University of Medical Sciences for their support.
######
Frequency distribution and percent of motorcycle accidents
**Hour** **Blameful** **Blameless** **Total**
---------------- -------------- --------------- ----------- ------ ----- ------
**0--8** 14 11.8 21 9.1 35 10
**8--12** 9 7.6 34 14.7 43 12.4
**12--16** 28 23.5 45 19.5 73 21
**16--20** 15 12.6 44 19 59 17
**20--24** 51 42.9 86 37.2 137 39.1
**Total** 119 100 231 100 350 100
**Sig= 0.134**
######
Distribution of the age of motorcycle riders involved in an accident
**Age (yr)** **Blameful** **Blameless** **Total**
-------------- -------------- --------------- ----------- ------ ----- ------
**\< 25** 53 63.1 43 25 96 37.5
**25--35** 17 20.2 60 34.9 77 30.1
**35\<** 14 16.7 69 40.1 83 32.4
**Total** 84 100 172 100 256 100
**Sig= 0**
######
Distribution of the number of final cause of the accidents
**Cause of the accident** **Blameful** **Blameless** **Total**
--------------------------------------------- -------------- --------------- ----------- ------ ----- ------
Ignoring the longitudinal distance 3 2.5 1 0.4 4 1.2
Ignoring the lateral distance 1 0.8 5 2.2 6 1.7
Ignoring the yield right of way 46 39 144 63.4 190 55.1
Lack of attention to the front 23 19.5 8 3.5 31 9.0
Inability to control the vehicle 7 5.9 1 0.4 8 2.3
Violating the speed limit 0 0 1 0.4 1 0.3
Violating the authorized speed 0 0 1 0.4 1 0.3
Deviation to left as a result of overtaking 2 1.7 3 1.3 5 1.4
Deviation to left 11 9.3 13 5.7 24 7.0
Turn incorrectly 1 0.8 3 1.3 4 1.2
Passing through forbidden places 6 5.1 1 0.4 7 2.0
Moving in the opposite direction 8 6.8 4 1.8 12 3.5
Reverse movement 0 0 8 3.5 8 2.3
Sudden change in moving 1 0.8 22 9.7 23 6.7
Passing the red light 7 5.9 1 0.4 8 2.3
Bypass in forbidden places 0 0 3 1.3 3 0.9
Other reasons 2 1.7 8 3.5 10 2.9
Total 118 100 227 100 345 100
sig= 0.00
######
distribution of effective human causes in the accidents
**Human cause of the accident** **Blameful** **Blameless** **Total**
----------------------------------------------------------------- -------------- --------------- ----------- ------ -------- --------
Exhaustion and drowsiness 0 0 3 1.4 3 0.9288
Alcohol consumption 1 0.9 1 0.5 2 0.6192
Negligence of regulation 85 73.9 147 70.7 232 71.827
Expediency and undue haste to neglecting the Yield Right of Way 14 12.2 21 10.1 35 10.836
0 0 2 1 2 0.6192
Deliberate violation 0 0 1 0.5 1 0.3096
Other factors 9 7.8 23 11.1 32 9.9071
Negligence of regulation and unreasonable haste 6 5.2 10 4.8 16 4.9536
Total 115 100 208 100 323 100
sig= 0.69
| 2024-07-24T01:27:13.970301 | https://example.com/article/3829 |
Harfordia (plant)
Harfordia, also called rabbit's purse, is a genus of plants in the family Polygonaceae, with a single species Harfordia macroptera.
Distribution
The plant is endemic to the state of Baja California, in northwestern México.
A subspecies of the one species is Harfordia macroptera subsp. fruticosa, which is endemic to Cedros Island.
External links
U.C. Photo Gallery — Harfordia macroptera
Category:Monotypic Polygonaceae genera
Category:Polygonaceae
Category:Flora of Baja California
Category:Endemic flora of Mexico | 2023-12-20T01:27:13.970301 | https://example.com/article/3839 |
The method and system are generally related to the verification of analog and mixed signal integrated circuits and more specifically to a system and method to translate verification subroutine commands.
Electronic design automation (EDA) is software for designing electronic blocks. There are several broad types of electronic signals, components and blocks: digital, analog and a mixture of digital and analog termed mixed signal. The electronic design generally comprises at least one of the following levels of circuit information: a system level, an architectural level, a dataflow level, an electrical level, a device level and a technology level and the like.
Digital signals have discrete input and output values “0” and “1”, occurring at discrete time values, typically tied to a clock signal. Digital components which input and output the digital signals typically have static pin outs and interaction protocols. Digital blocks comprised of the digital components have well established and well documented physical layouts and electrical interactions. Simulators for digital blocks are discrete time event driven simulators.
Analog signals generally have continuous input and output values that may vary over time. Analog components typically have customizable layouts in order to modify inputs, outputs, triggers, biases, etc. Therefore, due to customization, analog blocks comprised of the analog components may not have as well established or well documented physical layouts or electrical interactions as digital circuits. Simulators for analog blocks generally necessitate continuous time domain simulators.
Mixed signal blocks are a combination of digital signal blocks and analog signal blocks within a component being simulated. The most common options available for simulation are to simulate the component as a grouping of analog blocks, or to separately analyze the analog components/blocks and the digital components/blocks and translate the inputs and outputs at the boundaries of the digital and analog domains for inter-domain communication.
Within EDA there are two broad categories of circuit review that are related: simulation and verification. Simulation is a numerical solution set that predicts the behavior of a circuit. Verification is the systematic pursuit of describing the behavior of a circuit under relevant conditions (functional verification) and over manufacturing process variation (parametric verification). Therefore, verification generally necessitates a much more extensive review of the circuit, its operating conditions, and manufacturing operation variations than a simulation. It is possible to run a large number of simulations without verifying to any significant degree the functionality of a circuit. Verification is the mathematical modeling of circuit behavior and evaluation of circuit performance over a range of conditions. Ultimately, the measure of success of verification is to report how well the circuit design complies with the circuit specification. Analog and mixed signal verification methodology is struggling to keep pace with the complexity, cost, and computational demands of ever-growing analog and mixed signal circuits.
The number and complexity of verification test cases grows with the complexity of analog and mixed signal designs. Additionally, simulation speed decreases and memory utilization increases as the size of the circuit grows. Thus, the computational processing-power to verify a circuit may dramatically increase with circuit complexity. To make this issue more painful, verification normally occurs at the end of the design cycle where schedule delays are perceived to be most severe. Thus, verification is an activity that generally necessitates a significant amount of simulation processing-power for a small part of the overall design cycle, and therefore an efficient use of verification resources is generally necessitated to meet time to market demands.
Today's complex verification solutions specifically focus engineering on the verification activity to ensure that the operation of the circuit is fully and efficiently verified under pertinent conditions. This focused analog and mixed signal verification is much more manual and experience driven than digital verification. This sporadic interactive analog verification leaves companies at risk. The present disclosure may allow verification tasks to be defined at a higher level of abstraction. The present disclosure may allow efficient capture of complex relationships between stimulus or stimulus assertions and output measurements or output assertions. The present disclosure may allow the test of transistor level circuits, circuits implemented with behavioral models, or circuits that contain a combination of behavioral models and transistor level implementations. Standard branch contribution statements cannot be used in conditional, looping, nomenclature or analysis based statements, unless the conditional expression is a constant expression. For purposes of differentiation, we are calling these standard branch contribution statements as direct branch contribution statements. In this disclosure an indirect branch contribution statement (IBCS) is more powerful than a direct branch contribution statement (DBCS). Specifically, indirect branch contribution statements can be used in conditional and looping constructs that are dynamic with respect to the user's design, design configuration, simulation/analysis configuration, verification state, and verification history. There is a long felt need for independent branch contribution statements to be used in conditional, looping, nomenclature or analysis based statements or to return different arguments resulting from ongoing analysis.
Robust verification of analog and mixed signal circuits generally necessitates a significant investment in test benches, performance analysis routines, and macro-models that may be used to accelerate the simulations. The complexity of this collateral grows with the complexity of the analog and mixed signal integrated circuits to be verified. As a design team adds design resources it also needs to add verification resources, adding to the cost of the design. The efficient use of those resources becomes paramount due to the inevitable time constraints that are imposed at the end of the design cycle, when companies are trying to get a product to market.
The current technology trajectory, within the electronics manufacturing industry, is to move more and more toward single chip designs, called Systems on a Chip (SoC), or multi-chip modules (MCM) where multiple chips are included in one package. Most systems on a chip and multi-chip modules generally necessitate some level of mixed signal verification. As mixed signal designs continue to increase in size and complexity, this places additional burdens on verification to insure first pass design success and reduce the time-to-market. Although the complexity of analog and mixed signal ASIC design has followed Moore's law, innovations in design verification generally have not.
Valuable design time and computational resources as well as expensive simulator resources may be specifically focused by the disclosed method for translating verification subroutine commands. The method makes the capture of complex stimulus as well as capture of output assertions and measurements more efficient. The resulting intelligent test benches identify areas that fail verification and, by greatly reducing the need for manual interpretation of results, provide much more immediate feedback to the design team and design management. Improving the test efficiency (i.e., not wasting simulation time and reducing time for output analysis) allows more efficient use of resources.
This disclosure is related to translating verification subroutine commands during verification of an electronic design for analog and mixed signal (A/MS) application specific integrated circuits (ASICs). Analog and mixed signal integrated circuits exist in many modern electronic devices, and these circuits needs to be verified through simulation prior to fabrication. | 2024-07-23T01:27:13.970301 | https://example.com/article/8990 |
1. Discovery and Distribution of the Cycle Inhibiting Factors (Cifs) That Triggers an Original Cytopathic Effect in Host Cells
==============================================================================================================================
The effect of Cif was first observed in 1997 by De Rycke *et al.* in HeLa cells transiently infected with enteropathogenic *Escherichia coli* (EPEC) strains isolated from weaning rabbits or human infants with diarrhea \[[@B1-toxins-03-00356]\]. This so-called cytopathic effect (CPE) was first characterized by the progressive formation of actin stress fibers together with focal adhesions, and a dramatic cell enlargement ([Figure 1](#toxins-03-00356-f001){ref-type="fig"}). It was further shown that these large cells were irreversibly impaired for cell proliferation, with a complete lack of mitotic figures \[[@B2-toxins-03-00356]\] ([Figure 1](#toxins-03-00356-f001){ref-type="fig"}). This effect is dependent on the locus of enterocyte effacement (LEE), the cluster of genes responsible for the attaching and effacing lesion, the hallmark of EPEC and enterohemorraghic *E. coli* (EHEC) infection \[[@B3-toxins-03-00356],[@B4-toxins-03-00356]\]. The protein responsible for the CPE identified by Marches *et al.* was called Cif (cycle inhibiting factor). The gene coding for Cif is located outside the LEE, on a lambdoid prophage \[[@B5-toxins-03-00356]\].
{#toxins-03-00356-f001}
Two epidemiological studies showed that 60 to 70% of EPEC and EHEC strains are *cif*-positive \[6,7\]. However, in one of these studies, it was shown that two thirds of these *cif*-positive *E. coli* strains do not induce a typical CPE due to frameshift mutations or insertion of an IS element in the *cif* gene. Strikingly, *cif* is always found as a pseudogene in EHEC strains; this could be due to the small size of the strain collection, or could suggest an evolutionary counter-selection of functional Cif in Shiga-like producing EHEC strains \[[@B6-toxins-03-00356]\]. Nonetheless, plasmid-mediated expression of wild type Cif in EHEC confers the CPE phenotype \[[@B5-toxins-03-00356]\].
The *E. coli* Cif protein is 282 amino-acids long, showing no similarity with any protein except several homologues in the human pathogens *Yersinia pseudotuberculosis* (56% of identity) and beta-proteobacterium *Burkholderia pseudomallei* (26%). Cif homologues are also found in the entomopathogens *Photorhabdus luminescens* (23%) and *Photorhabdus asymbiotica* (26%). The Cif proteins are thus named Cif*~Ec~*, Cif*~Yp~*, Cif*~Bp~*, Cif*~Pl~* and Cif*~Pa~* respectively. In all these bacteria the *cif* genes are located in prophage or prophage-like region (*Escherichia* and *Photorhabdus* species), bordered by two vestigial transposase genes (*Burkholderia*) and in a locus frequently rearranged nearby the *yrs* region homologous to a recombination target of bacteriophages (*Yersinia*) \[[@B8-toxins-03-00356]\]. Thus Cif-encoding regions are found in DNA domains prone to rearrangement, suggesting that the *cif* genes were acquired by horizontal gene transfer. Consistent with this hypothesis, the Cif-producing EPEC strain E22 was shown to produce *cif*-carrying infectious phage particles supporting that the *cif* gene was disseminated by horizontal gene transfer among EPEC and enterohemorrhagic (EHEC) strains, as shown for other non LEE-encoded effectors \[[@B6-toxins-03-00356],[@B9-toxins-03-00356],[@B10-toxins-03-00356]\].
Analysis of the Cif xenologues showed that they are all functional as they reproduced the typical Cif*~Ec~*-associated CPE when transfected into HeLa cells, or lipofected following purification \[[@B8-toxins-03-00356]\]. Importantly, Cif*~Pl~* was shown to be expressed *in vivo* in an insect model, the natural host of *Photorhabdus*, and reproduced the CPE in the non-mammalian insect Sf9 cell line *in vitro* \[[@B11-toxins-03-00356]\]. Similarly, Cif*~Bp~* is also active *in vitro*when strains of *E. coli* (EPEC) or *Burkholderia thailandensis*are transformed with a plasmid coding for Cif*~Bp~*and used to infect mammalian cell lines \[[@B8-toxins-03-00356],[@B12-toxins-03-00356]\]. Such conservation of an effector function among very distant pathogens belonging to β-protobacteria and γ-protobacteria that infect invertebrate and mammal hosts is unique and remarkable. It also supports the role of Cifs as virulence factors and could reveal an original strategy of pathogenesis. However, *Photorhabdus* spp. are symbiotic of the nematode vector *Heterorhabditis* (that releases the bacteria into the insect) suggesting that Cif might also act as a fitness or symbiotic factor in the nematode host.
2. Cif Proteins are Type III Effectors That Traffic to the Nucleus of the Host Cells
====================================================================================
Initial experiments showed that the CPE triggered by *cif*-positive EPEC strains was dependent on the type III secretion system (T3SS) encoded by the LEE as mutants of the secretion and translocation apparatus (EscN and EspA, EspB, EspD, respectively) were unable to induce the CPE \[[@B1-toxins-03-00356],[@B2-toxins-03-00356],[@B5-toxins-03-00356],[@B13-toxins-03-00356]\]. This T3SS injects an arsenal of effector proteins into the host cell that hijack cellular functions for the pathogen's benefit \[[@B3-toxins-03-00356],[@B4-toxins-03-00356],[@B14-toxins-03-00356]\]. Using a reporter system based on a translational fusion of the effector protein with β-lactamase that allows detection of translocation in living host cells, Charpentier and Oswald showed that an exchangeable *N*-terminal translocation signal comprising the first 16 amino acids of Cif*~Ec~* is necessary and sufficient to mediate its translocation by the EPEC T3SS \[[@B15-toxins-03-00356]\]. Using a lipid-based cell delivery system bypassing T3SS requirement, purified Cif*~Ec~* induced a CPE similar to that observed upon EPEC infection. This result indicated that Cif*~Ec~* is necessary and sufficient and does not require other bacterial molecules to induce the CPE \[[@B16-toxins-03-00356]\]. Once injected into the host cell cytoplasm by the T3SS, Cif*~Ec~* is rapidly sorted to the peri-nuclear area and the nucleus, as observed by confocal imaging and cell fractionation \[[@B17-toxins-03-00356]\]. As Cif*~Ec~* lacks classical nuclear localization sequences, the mechanism of nuclear targeting of Cif remains to be elucidated.
While Cif*~Bp~* has been shown to be injected by the T3SS of *Escherichia* and *Burkholderia* species and successfully reproduces the CPE \[[@B8-toxins-03-00356],[@B12-toxins-03-00356]\], we and other have been unable to translocate Cif*~Yp~* and Cif*~Pl~* by the *E. coli* T3SS into the host cells. However, we have indirect evidence that they are *bona fide* type 3 effectors as both *Yersinia* and *Photorabdhus* strains possess T3SS. Moreover, none of the Cifs could induce the CPE without electroporation, transfection or lipofection suggesting that Cif activity depends on its injection into the host cell \[[@B8-toxins-03-00356],[@B11-toxins-03-00356],[@B16-toxins-03-00356]\].
3. Crystal Structure Studies of Cif Homologs Reveals a Family of Proteins Sharing a Conserved Active Site
=========================================================================================================
Despite a low level of sequence similarity between Cif homologs, the crystal structure determination of Cif*~Ec~*, Cif*~Pl~*and Cif*~Bp~* showed that these proteins are structurally well-conserved ([Figure 2](#toxins-03-00356-f002){ref-type="fig"}) \[[@B18-toxins-03-00356],[@B19-toxins-03-00356],[@B20-toxins-03-00356]\]. The overall structure of these Cif can be divided in two lobes with head and tail domains where the *N*-terminal part corresponds to the tail and contains the potential substrate binding site (see below) whereas the *C*-terminal part forms the head domain hosting the enzymatic site. The enzymatic site consists in a catalytic triad composed of residues Cys, His and Gln strictly conserved in all Cifs homologs ([Figure 2](#toxins-03-00356-f002){ref-type="fig"}).
{#toxins-03-00356-f002}
The conserved catalytic triad is located in a negative charged cleft with a putative occluding loop near the active site that might control the substrate accessibility to the catalytic site \[[@B19-toxins-03-00356]\]. The structural organization of this triad reveals that Cifs are divergent members of the superfamily of enzymes that comprises papain-like cysteine proteases, acetyl transferases, deamidases and transglutaminases. In particular, Cif shares homology with the avirulence effector AvrPphB from *Pseudomonas syringae* that belongs to the same superfamily and with the cysteine protease YopT from *Yersinia* spp. \[[@B19-toxins-03-00356]\]. Mutation of one of the residues of the catalytic triad abolishes Cif*~Pl~*, Cif*~Bp~*, Cif*~Ec~* and Cif*~Yp~* activity, corroborating the implication of an enzymatic-dependent activity \[[@B8-toxins-03-00356],[@B16-toxins-03-00356],[@B19-toxins-03-00356],[@B20-toxins-03-00356]\]. Further analysis of the tail domain showed that deletion of the *N*-terminal protruding α4 and α5 helix of Cif*~Bp~* ([Figure 2](#toxins-03-00356-f002){ref-type="fig"}) and of the corresponding α4 domain of Cif*~Ec~* suppressed the toxin activity suggesting that this domain could mediate substrate recognition \[[@B17-toxins-03-00356],[@B20-toxins-03-00356]\].
Based on the structure and function conservation, Cif homologs constitute a family of cyclomodulins that likely target a molecule/pathway conserved in a wide range of eukaryotic cells from invertebrates to mammals \[[@B8-toxins-03-00356],[@B21-toxins-03-00356]\].
4. Cifs Are Cyclomodulins That Trigger Host Cell Cycle Arrest
=============================================================
Upon injection into host cells by the T3SS (or by transfection or lipofection of purified proteins) Cif proteins induce an irreversible cell cycle arrest with complete inhibition of mitotis entry ([Figure 1](#toxins-03-00356-f001){ref-type="fig"}: absence of mitotic figures in cells injected with Cif). This property makes Cifs as members of the cyclomodulin family defined as bacterial molecules that hijack host cell cycle functions \[[@B22-toxins-03-00356],[@B23-toxins-03-00356]\].
The cell cycle arrest induced by Cif*~Ec~* is associated to the inhibitory phosphorylation of the cyclin dependent kinase (CDK) 1-CyclinB complex whose activation is necessary for the cell cycle G~2~/M transition \[[@B1-toxins-03-00356],[@B2-toxins-03-00356],[@B5-toxins-03-00356]\]. Other cyclomodulins, such as CDT or Colibactin, also block the G~2~/M transition through inhibition of CDK1 activity. However, in contrast to CDT and Colibactin, which have been shown to be *bona fide* genotoxins, Cif*~Ec~* does not induce DNA damage nor activate the DNA damage response pathway (ATM/ATR, CHK1/2, CDC25 sequestration) that leads to the inhibitory phosphorylation of CDK1 \[[@B16-toxins-03-00356]\]. Therefore, Cif*~Ec~* induces the cell cycle arrest by activating a pathway independent from the canonical activation of the G~2~/M checkpoint. Further studies, using synchronized cells, have shown that Cif*~Ec~* also blocks S-phase entry. Depending on the stage of the cell cycle during infection with *cif*-positive EPEC, cells arrest either at the G~1~/S or G~2~/M transition. The analysis of host cell proteins regulating both S- and M- phases entries demonstrated a Cif-dependent accumulation of p21^Waf1/Cip1^ and p27^kip2^ (hereafter called p21 and p27) \[[@B24-toxins-03-00356]\]. These proteins belong to the Cip/Kip family of CDK inhibitors (CKI). p21 is an inhibitor of the CDK1/CyclinB complex. This complex is the eukaryotic universal inducer of mitosis entry and p21 accumulation is known to inhibit G~2~/M transition. Both p21 and p27 inhibit CDK2-CyclinE and A complexes whose activation are also required for G1/S and S-phase progression. p21 also binds to PCNA, and the latter is required for S-phase progression \[[@B25-toxins-03-00356]\]. Therefore, Cif-dependent accumulation of CKI is consistent with the observed G~1~/S and G~2~/M cell cycle arrests ([Figure 3](#toxins-03-00356-f003){ref-type="fig"}). The inhibitory phosphorylation of CDK1 observed upon Cif*~Ec~* injection could be explained by the disruption of the CDK1 positive feed-back loop leading to CDK1 dephosphorylation via CDC25. Further investigation revealed that CKI accumulation does not depend on transcriptional activation but relies on their stabilization in infected cells \[[@B24-toxins-03-00356]\]. Since p21 and p27 are degraded by the ubiquitin-proteasome system, these results strongly suggested that Cif*~Ec~* controls this proteolytic pathway. However, suppression of p21 and/or p27 accumulation did not alleviate Cif-induced inhibition of G~1~/S or G~2~/M transitions implying an alternative mechanism for blockage of the cell cycle \[[@B24-toxins-03-00356]\]. Whether this arrest is associated to stress fibers induction was excluded since disruption of stress fiber formation in HeLa cells by C3 exoenzyme-mediated inhibition of RhoA, did not alleviate cell cycle inhibition \[[@B2-toxins-03-00356]\]. Morevover, only HeLa and RK13 cells exhibit stress fibers following *cif* ^+^ EPEC infection suggesting that these two phenotypes are not related \[[@B16-toxins-03-00356]\]. Nonetheless, these results indicated that accumulation of CKI participates in a multi-step process leading to the Cif-induced arrest of cell proliferation.
This cell cycle inhibition and CKI accumulation was observed with all Cif homologues \[[@B8-toxins-03-00356]\] and in various cell lines derived from colonic epithelium (differentiated or not differentiated Caco-2 cells, DLD1, HCT116 wild-type, p21^−/−^ or p53^−/−^) showing the independency of cell-cycle arrest from the p53 transcriptional program \[[@B16-toxins-03-00356],[@B24-toxins-03-00356]\]. The Cif-induced cystostatic effect is also observed in non-transformed IEC-6 cells derived from rat intestinal crypt epithelium. However, the outcome of this arrest is cell type dependent as it persists for more than 3 days in HeLa cells without evident cell death, whereas it culminates in apoptosis 48 h after infection of IEC-6 cells \[[@B26-toxins-03-00356]\]. Whether this Cif-induced cell death is a consequence of the cytostatic effect or relies on an independent pathway is still unclear, but it is tempting to propose that the functionality of p53 pathway, intact in non-transformed cells, might be decisive for the fate of Cif-arrested cells.
5. Cif Effector Proteins Target NEDD8 to Inhibit Specific Ubiquitin-Dependent Degradation Pathways
==================================================================================================
Three independent teams recently deciphered the molecular mode of action of Cif*~Ec~* and Cif*~Bp~* \[[@B12-toxins-03-00356],[@B17-toxins-03-00356],[@B27-toxins-03-00356]\]. Despite few differences mainly related to the species origin of Cif and diverse approaches, these complementary studies showed a common mechanism of action between the two xenologs.
{#toxins-03-00356-f003}
5.1. Cif~Ec~ Interacts with Host Protein NEDD8
----------------------------------------------
As mentioned earlier, Cif-dependent accumulation of p21 and p27 results from the inhibition of their degradation by the ubiquitin-proteasome system \[[@B28-toxins-03-00356]\]. Ubiquitylation is a well-known and highly controlled post-translational protein modification that involves three successive steps. First, ubiquitin is processed by the ubiquitin activating enzyme (E1) and then transferred to the ubiquitin conjugating enzyme (E2). The last step requires the ubiquitin ligase (E3) that determines the substrate to be ubiquitylated and promotes a direct transfer of ubiquitin from E2 to the substrate (RING-type E3s) or an indirect transfer via formation of an ubiquitin thioester-bound E3 prior ubiquitin transfer to the substrate (HECT-type E3s). Repetitions of this cycle lead to the attachment of a polyubiquitin chain to the target protein, resulting in modulation of its function or localization, or its sorting for degradation, depending on the length and the type of linkage within the polyubiquitin chain \[[@B29-toxins-03-00356],[@B30-toxins-03-00356],[@B31-toxins-03-00356]\]. Yeast two-hybrid screens and pull-down assays showed that Cif*~Ec~* interacts with the ubiquitin-like protein NEDD8 \[[@B17-toxins-03-00356],[@B27-toxins-03-00356]\]. The main known role of NEDD8 is the conjugation of the cullin subunit of the complex cullin-RING E3 ubiquitin ligase (CRL) and activation of its ligase activity \[[@B32-toxins-03-00356],[@B33-toxins-03-00356],[@B34-toxins-03-00356]\]. CRL are composed of the scaffold protein cullin (at least five different cullins CUL1/2/3/4A/4B are known), the RING protein that associates with E2, and different substrate recognition modules that bind the target protein ([Figure 4](#toxins-03-00356-f004){ref-type="fig"}) \[[@B35-toxins-03-00356],[@B36-toxins-03-00356]\]. Inactivation of Cif*~Ec~* by mutation of the catalytic cysteine increased its binding to NEDD8 \[[@B17-toxins-03-00356]\]. In contrast, deletion of the α4 domain of Cif*~Ec~*, which results in loss of activity, abolished the interaction with NEDD8 implying the role of this domain to mediate Cif effect. Cif*~Ec~* was unable to pull-down ubiquitin showing the specificity of interaction with NEDD8. Moreover, NEDD8 co-compartmentalizes with Cif*~Ec~* in the nuclei of infected cells supporting the functional binding of these 2 proteins \[[@B17-toxins-03-00356]\]. Co-immunoprecipitation experiments showed that Cif*~Ec~* interacts only with the neddylated forms of cullins (CUL1 to 4B) associated with the RING protein \[[@B17-toxins-03-00356]\] and with the recognition module Skp1 and Skp2 proteins \[[@B27-toxins-03-00356]\]. It thus appeared that Cif*~Ec~* interacts with the whole CRL complex through binding to NEDD8 ([Figure 4](#toxins-03-00356-f004){ref-type="fig"}).
![Model of Cif*~Ec~* inhibition of CRL activation cycle. Neddylated active CRL (left) ubiquitylates the substrate (sub) and substrate recognition module (SRM) leading to their degradation and generating inactive CRL (top). Deneddylation of CRL by the COP9 signalosome allows binding of CAND1 (right). SRM fixation induces CAND1 release and subsequent neddylation of cullin to generate an active CRL \[[@B35-toxins-03-00356],[@B36-toxins-03-00356]\]. Cif binding to and deamidation of NEDD8 impairs the action of COP9, blocking the activation cycle and locking the CRL in an inactive neddylated state.](toxins-03-00356-g004){#toxins-03-00356-f004}
5.2. Cif Inhibits CRL Activity
------------------------------
Since Cif proteins induce the stabilization of p21 and p27, which are substrates of CRL associated to CUL1, *in vitro* studies were conducted to investigate the inhibitory effect of Cif on CRL. Jubelin *et al.* showed that addition of Cif*~Ec~* to reconstituted CRL inhibited its ubiquitin ligase activity \[[@B17-toxins-03-00356]\]. Moreover, *in cellulo* ubiquitylation of various CRL substrates such as p27 or RhoA was severely impaired by Cif*~Ec~* and Cif*~Bp~*, respectively \[[@B12-toxins-03-00356],[@B27-toxins-03-00356]\]. Stabilization of various CUL1 to 4B-associated CRL substrates including β-catenin, RhoA, IκBα, Cdt1, CyclinD1 reveals that Cif*~Ec~* can interfere with all neddylated cullins \[[@B17-toxins-03-00356],[@B27-toxins-03-00356]\].
How Cif*~Ec~* inhibits CRL activity is not fully elucidated. However, Cui *et al.* showed that the CRL inhibition is associated to Cif*~Ec~*-dependent NEDD8 deamidation of Gln40, converting glutamine residue in glutamic acid (Glu). Replacement of NEDD8 with deaminated NEDD8 (NEDD8Q40E) abolished the *in vitro* stimulatory effect on Nrf2 ubiquitylation by a CUL3/ROC1/Keap1 complex. Similarly, ectopic expression of NEDD8Q40E in HeLa cells resulted in the stabilization of CRL substrate and recapitulated the effects of Cif \[[@B12-toxins-03-00356]\]. On the other hand, Cif*~Ec~* was shown to promote cullin neddylation of CUL1 to 4B \[[@B17-toxins-03-00356]\] that correlates with the inhibition of deneddylation of cullin by the CSN complex (COP9 signalosome) \[[@B27-toxins-03-00356]\]. This phenotype is similar to the effect observed using CSN5 null cells that also accumulate CRL substrates such as p27 \[[@B37-toxins-03-00356]\]. Together, these results suggest that modification of NEDD8 by Cif inhibits cullin deneddylation by the CSN resulting in a decrease of CRL activation. Indeed, to be fully active, CRLs undergo an activation cycle in which cullins oscillate between neddylated and non-neddylated states \[[@B35-toxins-03-00356],[@B36-toxins-03-00356]\]. Based on these results, we propose a model in which Cif*~Ec~* interferes with this cycle and thus locks CRLs in a neddylated but inactive state ([Figure 4](#toxins-03-00356-f004){ref-type="fig"}).
A notable difference between Cif*~Bp~* and Cif*~Ec~* is the capacity of Cif*~Bp~* to deamidate not only NEDD8, but also the Gln40 of ubiquitin. Cif*~Bp~* generates an E2-ubiquitinQ40E thioester complex that impairs ubiquitin chain synthesis and the ubiquitylation pathway *in vitro* and *in vivo* \[[@B12-toxins-03-00356]\]. This supplementary affinity to ubiquitin extends the inhibitory activity of Cif*~Bp~* to all ubiquitylation process independently of the E3 ligase. The relevance of this difference is still unclear and requires further studies on the range of action of other Cif homologs and bacterial deamidases toward ubiquitin and ubiquitin-like molecules. In this line, it is noteworthy that the *Mycobacterium* deamidase of Pup (Dop), required for the full virulence of *M. tuberculosis*, targets the prokaryotic ubiquitin-like molecule Pup to convert the terminal glutamine residue into glutamate \[[@B38-toxins-03-00356],[@B39-toxins-03-00356]\]. Also, while acting through a different pathway to stimulate RhoA activity, it is remarkable that the cyclomodulin CNF-1 directly deamidates RhoA to induces actin stress fibers \[[@B40-toxins-03-00356],[@B41-toxins-03-00356]\].
6. Concluding remarks and perspectives
======================================
The role of NEDD8 on CRL activation offers to the bacteria injecting Cif into the host cells an "Achilles heel" to hijack various cellular signaling functions. Indeed, CRLs represent the largest subfamily of E3s and therefore play regulatory roles in numerous and diverse cellular functions. The diversity of substrate recognition modules associated to the different cullin subunits gives to the CRL the capacity to ubiquitylate and thus to control the stability of hundreds of proteins \[[@B35-toxins-03-00356],[@B36-toxins-03-00356]\]. Cif capacity to induce stress fibers in certain eukaryotic cells could be related to Cif-stabilization of RhoA \[[@B12-toxins-03-00356],[@B17-toxins-03-00356]\], which is targeted by CUL3-associated CRL \[[@B42-toxins-03-00356]\]. Prevention of inappropriate replication depends on the degradation of the licensing factor Cdt1 during S-phase \[[@B43-toxins-03-00356]\]. As CUL4-associated CRL targets Cdt1 for ubiquitylation-dependent degradation \[[@B44-toxins-03-00356],[@B45-toxins-03-00356]\], inhibition of CRL by Cif provides a satisfactory explanation for occurrence of re-replication observed 3 days following infection as Cdt1 is stabilized in infected HeLa cells \[[@B2-toxins-03-00356],[@B16-toxins-03-00356],[@B17-toxins-03-00356]\]. Moreover, Cif was shown to prevent the degradation of IκB, a central inhibitor of NF-κB pro-inflammatory response \[[@B12-toxins-03-00356],[@B17-toxins-03-00356]\]. Down-regulation of the NF-κB pathway has been proposed to mediate the inflammatory tolerance of commensal bacteria in the mammalian intestinal epithelia \[[@B46-toxins-03-00356],[@B47-toxins-03-00356]\]. In addition, stabilization of β-catenin by Cif might participate in dendritic cells tolerogenicity as it was recently shown that the WNT signaling pathway regulates immunosuppressive responses \[[@B48-toxins-03-00356]\].
In conclusion, Cif might represent a fitness factor that facilitates bacterial evasion from the host immune response, via inhibition of inflammatory pathways in dendritic cells of the gut-associated lymphoid tissue. Cif-inhibition of the host cell cycle might slow down multiplication of intestinal progenitors to delay epithelial cells renewal, thus favoring gut colonization ([Figure 5](#toxins-03-00356-f005){ref-type="fig"}). We could also speculate about the role of Cif as a stabilizer of other type III co-injected effectors, to modulate their effect on host cells and boost the virulence of *cif*-expressing strains. Further studies of the impact of Cif in the pathogen-host interactions will undoubtedly contribute to our knowledge of bacterial pathogenic strategies. It also appears that the continuous "arm race" that characterizes host-pathogen relationship has lead the bacteria to develop sophisticated "weapons" (virulence factors) capable of controlling host's functions for their own benefit. Therefore, much can be learned from eukaryotic functions using bacterial toxins such as Cif. While most pharmacological inhibitors or bacterial/viral proteins inhibit CRL by decreasing cullin neddylation \[[@B49-toxins-03-00356],[@B50-toxins-03-00356],[@B51-toxins-03-00356],[@B52-toxins-03-00356]\], Cif is the first example of a bacterial effector that inhibits CRL functions by stabilizing cullin neddylation. Thus Cif represents a unique tool to study the regulation of the ubiquitin proteasome system. Lately, it was reported that inhibitors of NEDD8 represent a promising approach for cancer treatment \[[@B52-toxins-03-00356]\] opening a potential development of innovative therapeutics using Cif-producing bacteria.
{#toxins-03-00356-f005}
| 2024-05-08T01:27:13.970301 | https://example.com/article/7086 |
Q:
string as key in map, custom the compare function
I am using string as key value in map and trying to custom the comparison function. When I custom the comparison function by comparing the length the the strings, the map fail to tell the different strings with same size. The code is as followed:
class Solution {
public:
int findLUSlength(vector<string>& strs) {
if(strs.size() < 2) return -1;
auto cmpByStringLength = [](const string &s1, const string &s2)->bool
{
return s1.size() < s2.size();
};
map<string, int, decltype(cmpByStringLength)> mpstringcount(cmpByStringLength);
for(int i = 0; i < strs.size(); i++)
mpstringcount[strs[i]]++;
for(auto itmp = mpstringcount.begin(); itmp != mpstringcount.end(); itmp++)
{
cout << "itmp->first: " << itmp->first << endl;
}
return -1;
}
};
If my input strs is ["aba","cdc","eae","abcd"], the code will just output: "abcd" and "aba".
A:
the map fail to tell the different strings with same size.
Note that the comparator provided to std::map is not only used for ordering, but also equality check.
Everywhere the standard library uses the Compare concept, uniqueness
is determined by using the equivalence relation. In imprecise terms,
two objects a and b are considered equivalent (not unique) if neither
compares less than the other: !comp(a, b) && !comp(b, a).
And std::map stores elements with unique key. Your compare functor compare strings based on their length, then for these strings with the same length only one of them will be stored. From the perspective of a map<string, int, decltype(cmpByStringLength)>, "aba", "cdc", "eae" are just the same strings.
| 2024-03-28T01:27:13.970301 | https://example.com/article/5494 |
In this new series we are going to start breaking down our favorite players using media, our own knowledge of the game of football and what to look for in a prospect. This fourth edition of our Downtown Rams Scouting Report we bring you in this writer’s opinion, the safest wide receiver in the draft. Chris Godwin shows you exactly what a safe number one receiver prospect should look like. We will now take an in-depth look at his game both from the positive and negative side.
Chris Godwin
6-foot-1
209 pounds
31 5/8 inch arms
9 1/8 inch hands
4.42 forty yard dash
19 reps on 225 lb bench press
36 inch vertical jump
126 inch broad jump
Overview:
Chris Godwin is one of the best wide receiver prospects in this year’s NFL draft. He started every game of his college career, all 39 of them and was one of the biggest threats in the Big 10. Godwin finished his college career with 154 receptions, 2,421 yards receiving and 18 touchdowns for the Penn State Nittany Lions. Godwin, fresh off his best career performance in the Rose Bowl decided to declare for the NFL draft. What Godwin brings to the table for NFL teams is the fact he can step in right away and play day one. Godwin has all the tools to be a a number one receiver in the NFL. He may not be the big 6-foot-4 Mike Williams or 6-foot-3 Corey Davis of the draft but he checked all the boxes after his combine performance for me, as well as many other draft fans in showing he can be a starting NFL receiver.
Strengths:
Big play ability and ball location
In this clip we see a one on one match up Godwin has completely taken over by the time the two get to the end zone. Godwin uses his size advantage to gain leverage and make the big play for a touchdown. QB Trace McSorley lofted it up in what would have been a 50-50 ball situation if Godwin hadn’t turned it into a 90-10 ball by the time the two players were in the end zone. This right off the bat shows Godwin’s ability to win the end zone fade but on top of that it shows his ability to high point the football. Godwin is going to be used a ton in this situation at the next level and he is going to win the majority of the time.
Hand-eye coordination and keen concentration
Godwin is one on one with defensive back Iman Marshall. Marshall actually makes a good play due to McSorley under-throwing the pass but Godwin sticks with it. Just watch how Godwin naturally follows the ball bobbling off his hands with his eyes. While he is doing that he has to do a 180 degree spin which makes it incredibly difficult to concentrate on the ball. Godwin makes the play and shifts the momentum of the entire Rose Bowl game on this play alone. Big time catch by a big time player.
Field awareness and hand strength
This is one of those miraculous plays that just commonly show up for Godwin on tape. This is the same game, Godwin and the Nittany Lions need a first down so he makes sure he makes his cut on the route past the sticks. In doing this, Godwin has established forward progress for the first down conversion as long as he catches it. McSorley throws an errant pass away from the receiver that Godwin stabs at with one hand and has the strength to bring it into his body and secure the catch. The huge catch allows them to extend the drive and score right before halftime. It also saved what would have been a guaranteed interception into the arms of Adoree’ Jackson.
Able to make the contested catch and fight for every yard
Godwin in this clip just looks like a freak of a man. He goes up and snatches the ball out of the air while pretty much being wrapped up and tackled. Instead he slips out of safety Leon McQuay III’s clutches and continues to try to push forward and gain an extra five yards. This is a player that plays a lot like Pierre Garcon now of the San Francisco 49ers, every yard truly matters to him and that is something that is useful in the NFL. Maybe the yards don’t mean much to a team here but you can be sure Godwin’s ability to fight for every yard will come useful someday.
Break-away speed to stretch the field
Now, many have flagged Godwin for his lack of straight line speed but he should have silenced the crowd after running a 4.42 at the combine. Godwin is fast, he may not look as fast as say John Ross, but this is still a fast player. In this play you see his ability to break through and blow by the defense. Another box that can be checked off for Godwin as he is seen blowing by as many as three different defensive backs and taking it all the way to the house for six.
Ability to run quality routes and sell them as well
This right here you don’t see everyday in college. Godwin completely schools his man by using a double move 10 yards downfield. So why does the defender bite so easily? Because Godwin sells the route to perfection. From the moment the ball is snapped he sprints down field versus a safety playing far off him. Godwin uses the sprint out of the gate to sell the route as a streak pattern down the sideline. Well, it is that route but what the defender isn’t ready for is Godwin to turn his body slow down 10 yards down field give a little head fake and then accelerate right back up field. The defender bites because every inch of this play is done perfectly by Godwin. Double moves work in the NFL and the fact Godwin has been doing it perfectly in college shows he’s ready for some real big boy coverage at the next level.
Shows will and heart to block for teammates and he’s able to hold his outside edge.
One thing that can’t be stressed enough about Godwin is how unselfish he is. This is a fourth and one play that is anchored by Godwin. Stud RB Saquan Barkley runs right after making a fantastic cut to the avoid the traffic inside. He gets to the outside and Godwin is there holding his block and securing the first down and much more. Godwin uses great technique staying square to his target and blocking him completely out of the play. If Godwin is unable to first off, establish position, secondly have the sense of urgency off the line of scrimmage and lastly show the ability to drive back the defender and stay strong while engaged . . . then this play turns into a turnover on downs. Huge play here by Godwin and this is just something to add to his value chart heading into the draft.
Blocking awareness and clutch factor
I am not going to lie I could watch this clip all day. It’s quite simply one of the best plays in his arsenal. Godwin makes a big time block on 2nd and 8 late in the game down three. The block springs Barkley to find enough of a crease to . . . do his thing (he is so going in the first round next year). What’s funny about Godwin is I see a ton of Garcon in him but he looks like Steelers legend receiver Hines Ward on this play. Godwin shows off serious tenacity and situational awareness in practically spearing and blocking his assignment completely out of this play. The Rams in my personal opinion lacked this and have been lacking it. I think Godwin checks off many boxes and provides a ton of value for McVay’s team to think about. This is one of those clips McVay and company will love seeing.
Weaknesses:
Lacks consistent explosiveness
Maybe it’s just me but I do feel like Godwin can sell himself short at times. He is a phenomenal football player and I only believe he is going to keep growing until he is a pro bowl caliber WR. However, there are times where he seems as though he isn’t playing to the speed he should be playing. It’s not a motivational thing because he still comes back in the play and will show that he has a serious love and passion for the game. I just feel as though maybe he is too inconsistent with his explosiveness and maybe he does have explosiveness, but struggles at consistently showing it.
Doesn’t use his hands enough at the line when going against press/man coverage
Godwin is one of the best receivers in this class but he does lack something that likely pushes him out of being a first rounder. Godwin doesn’t really use his hands much against a press/man defender. He is going to need to at the next level because he can’t just rely on his speed when he is going against cornerbacks like Patrick Peterson who will be much faster. Godwin is a good athlete but that doesn’t mean immediate success. Now, he is very well technically sound, but he needs to be more physical at the line of scrimmage or he could have a tougher time than other rookies at the next level.
Final Conclusion:
This is my number one target at No.37 overall for the Rams. Chris Godwin has so many strengths as we just covered and his film is full of him having to step up and put his team on his back. I think ultimately this guy resembles another perfect fit like we previously mentioned with Kittle, for the Rams new offense. Godwin, will start on the outside if drafted next to former-Bills wide receiver Robert Woods. Right off the bat you are getting two good route runners and run blockers which is going to be key in Sean McVay’s offense. Just imagine Godwin, Woods and Austin on the field as weapons for Jared Goff. That would be a solid group and there is no way the Rams with the amount of capital they put into the offense this off-season would finish last in the league in offense again.
Now, moving away from the Rams for a second, Chris Godwin reminds me of two players in particular. I have said he reminds me a lot of now San Francisco 49er Pierre Garcon and after further film review I believe and said earlier that he is very similar to Pittsburgh Steeler great Hines Ward. Godwin and Garcon as far as pass catching, route running and run-after-the-catch ability are very similar. So why do I think of Ward when I watch Godwin? He has that same tenacity that Ward played with in the steel city. Go watch Hines Ward highlights if you need your memory refreshed, he laid the wood as a receiver. Those big time impact blocks can be seen out of Godwin as well but the great thing about Godwin and Ward is, anyone can “block” but both show their disciplined ability to be impact blocking receivers. If Godwin ends up anyhere near the level of player Ward and Garcon ended up being, consider this a great value pick in the second round.
For every Isaac Bruce there is a Brian Quick, we all know that now unfortunately. I can say with confidence that I do not see Godwin being a Brian Quick. Godwin is not a finished product by any means but he can contribute right away and most importantly give the Rams another starting receiver that should make Goff much more comfortable throwing to moving forward.
What are your thoughts Rams fans? Do you like Godwin? Let us know and stay tuned for the next edition of our Downtown Rams Scouting Report series.
0 0 vote Article Rating | 2024-04-16T01:27:13.970301 | https://example.com/article/1467 |
Tag: fit expert
We must, we must, we must ad”dress” your bust!
An appropriate and well-fitting bra is really important for building the “foundation” of your shape under a dress. Make sure your bra straps are adjusted so that your bust is supported correctly (you know how the straps can stretch out!). When you put on one of our dresses, your bust should sit above the waistband. This will make the dresses look and fit better and should eliminate your breasts being cut in half by the waistband. Yes ladies, lean forward, adjust your breasts up and over the band and then complete the pulling up of the zipper. Much like when you put on a bra.
“When you go dress shopping please wear a great fitting bra! A sports bra or no bra just doesn’t cut it to get the best fit”
Under Where?
What you wear on the lower half of your body is totally your preference. Our Cherry Velvet dresses have extra room across the tummy to give you enough room that it’s not necessary to wear anything special on the bottom. It’s totally up to you! We are a big fan of being able to look great AND breathe!
Online shopping
All our bra fitting tips are just as important for when you’re measuring yourself to find your best dress fit online as well. Put on a well-fitting bra before you take your measurements to find your size. We made a short video with some easy to follow instructions to help you take simple and accurate measurements. Check it out!
Once you have your measurements you can check out our comprehensive Sizing Chart to find your size. Or you can call or email with your measurements and we will always be happy to help you find your best fit.
When you wear your Cherry Velvet Dress…
Please make sure you’ve chosen a bra that fits well with good support. We know you want to look your best and feel totally gorgeous when you’re wearing one of our beautiful dresses.
XOX Cherry Velvet
Share this:
Rebel, Rebel…
Maybe you’ve seen a popular video being circulating on Facebook called “Rebel Wilson has a problem with Plus Size Fashion”. She goes on to say that “Some brands just put out the same dress in a whole wide range of sizes and it’s not going to look as good”. Well, Rebel, we’d love to send you a dress to prove to you that it is totally possible and even desirable to have the same dress in all sizes. Us bigger girls want the same clothes the smaller girls can wear, right?
Rebel Wilson photo credit: Getty Images
What we think Rebel was trying to say was that most brands don’t get the fit right in an extended size range. And we totally agree with her on that issue. That’s a problem with fit and grading (making the other sizes) not with design. She’s right when she says that there are a whole bunch of monkey arms out there and legs that are too long; not to mention sizing all over the place, weird armholes and gaping buttons over the bust. The fit of plus size is a tricky thing, not easily mastered. But that doesn’t mean it’s not possible! I think our customers would agree we know how to fit a plus size body very well.
Confidence AND Curves!
Rebel goes on to say that there is no youthful, confident plus size fashion out there. We beg to differ! Plus Size fashion has been plagued by poor quality, poor fit and dowdy styling for too long. It doesn’t have to be that way! The more designers who “get it” the better off we all are. Confidence comes from wearing clothing that fits just right!
Try it on and see for yourself…
We’re going to send Rebel one of our great-fitting dresses in a youthful, confident print. How about a dress with skulls, donuts, lipstick or planets (yes, all coming to Cherry Velvet this Fall) that shows off a woman’s curves in a truly flattering way.
We think she’d look amazing in one of our dresses! What do ya’ll think?? | 2024-05-16T01:27:13.970301 | https://example.com/article/6758 |
Q:
Why cant I connect to port 5080
On a media server I used the command below to open connections FROM IP 127.174.147.127
sudo ufw allow from 127.174.147.127 to any port 5080
The UFW status on the media server is:
To Action From
-- ------ ----
5080 ALLOW 127.174.147.127
But connections cannot be made. do you have any idea what could be stopping this from working.?
The iptables are below:
root@mydomain:~$ sudo iptables -nL
Chain INPUT (policy DROP)
target prot opt source destination
f2b-sshd tcp -- 0.0.0.0/0 0.0.0.0/0 multiport dports 748
ufw-before-logging-input all -- 0.0.0.0/0 0.0.0.0/0
ufw-before-input all -- 0.0.0.0/0 0.0.0.0/0
ufw-after-input all -- 0.0.0.0/0 0.0.0.0/0
ufw-after-logging-input all -- 0.0.0.0/0 0.0.0.0/0
ufw-reject-input all -- 0.0.0.0/0 0.0.0.0/0
ufw-track-input all -- 0.0.0.0/0 0.0.0.0/0
Chain FORWARD (policy DROP)
target prot opt source destination
ufw-before-logging-forward all -- 0.0.0.0/0 0.0.0.0/0
ufw-before-forward all -- 0.0.0.0/0 0.0.0.0/0
ufw-after-forward all -- 0.0.0.0/0 0.0.0.0/0
ufw-after-logging-forward all -- 0.0.0.0/0 0.0.0.0/0
ufw-reject-forward all -- 0.0.0.0/0 0.0.0.0/0
ufw-track-forward all -- 0.0.0.0/0 0.0.0.0/0
Chain OUTPUT (policy ACCEPT)
target prot opt source destination
ufw-before-logging-output all -- 0.0.0.0/0 0.0.0.0/0
ufw-before-output all -- 0.0.0.0/0 0.0.0.0/0
ufw-after-output all -- 0.0.0.0/0 0.0.0.0/0
ufw-after-logging-output all -- 0.0.0.0/0 0.0.0.0/0
ufw-reject-output all -- 0.0.0.0/0 0.0.0.0/0
ufw-track-output all -- 0.0.0.0/0 0.0.0.0/0
Chain f2b-sshd (1 references)
target prot opt source destination
RETURN all -- 0.0.0.0/0 0.0.0.0/0
Chain ufw-after-forward (1 references)
target prot opt source destination
Chain ufw-after-input (1 references)
target prot opt source destination
ufw-skip-to-policy-input udp -- 0.0.0.0/0 0.0.0.0/0 udp dpt:137
ufw-skip-to-policy-input udp -- 0.0.0.0/0 0.0.0.0/0 udp dpt:138
ufw-skip-to-policy-input tcp -- 0.0.0.0/0 0.0.0.0/0 tcp dpt:139
ufw-skip-to-policy-input tcp -- 0.0.0.0/0 0.0.0.0/0 tcp dpt:445
ufw-skip-to-policy-input udp -- 0.0.0.0/0 0.0.0.0/0 udp dpt:67
ufw-skip-to-policy-input udp -- 0.0.0.0/0 0.0.0.0/0 udp dpt:68
ufw-skip-to-policy-input all -- 0.0.0.0/0 0.0.0.0/0 ADDRTYPE match dst-type BROADCAST
Chain ufw-after-logging-forward (1 references)
target prot opt source destination
LOG all -- 0.0.0.0/0 0.0.0.0/0 limit: avg 3/min burst 10 LOG flags 0 level 4 prefix "[UFW BLOCK] "
Chain ufw-after-logging-input (1 references)
target prot opt source destination
LOG all -- 0.0.0.0/0 0.0.0.0/0 limit: avg 3/min burst 10 LOG flags 0 level 4 prefix "[UFW BLOCK] "
Chain ufw-after-logging-output (1 references)
target prot opt source destination
Chain ufw-after-output (1 references)
target prot opt source destination
Chain ufw-before-forward (1 references)
target prot opt source destination
ACCEPT all -- 0.0.0.0/0 0.0.0.0/0 ctstate RELATED,ESTABLISHED
ACCEPT icmp -- 0.0.0.0/0 0.0.0.0/0 icmptype 3
ACCEPT icmp -- 0.0.0.0/0 0.0.0.0/0 icmptype 4
ACCEPT icmp -- 0.0.0.0/0 0.0.0.0/0 icmptype 11
ACCEPT icmp -- 0.0.0.0/0 0.0.0.0/0 icmptype 12
ACCEPT icmp -- 0.0.0.0/0 0.0.0.0/0 icmptype 8
ufw-user-forward all -- 0.0.0.0/0 0.0.0.0/0
Chain ufw-before-input (1 references)
target prot opt source destination
ACCEPT all -- 0.0.0.0/0 0.0.0.0/0
ACCEPT all -- 0.0.0.0/0 0.0.0.0/0 ctstate RELATED,ESTABLISHED
ufw-logging-deny all -- 0.0.0.0/0 0.0.0.0/0 ctstate INVALID
DROP all -- 0.0.0.0/0 0.0.0.0/0 ctstate INVALID
ACCEPT icmp -- 0.0.0.0/0 0.0.0.0/0 icmptype 3
ACCEPT icmp -- 0.0.0.0/0 0.0.0.0/0 icmptype 4
ACCEPT icmp -- 0.0.0.0/0 0.0.0.0/0 icmptype 11
ACCEPT icmp -- 0.0.0.0/0 0.0.0.0/0 icmptype 12
ACCEPT icmp -- 0.0.0.0/0 0.0.0.0/0 icmptype 8
ACCEPT udp -- 0.0.0.0/0 0.0.0.0/0 udp spt:67 dpt:68
ufw-not-local all -- 0.0.0.0/0 0.0.0.0/0
ACCEPT udp -- 0.0.0.0/0 224.0.0.251 udp dpt:5353
ACCEPT udp -- 0.0.0.0/0 239.255.255.250 udp dpt:1900
ufw-user-input all -- 0.0.0.0/0 0.0.0.0/0
Chain ufw-before-logging-forward (1 references)
target prot opt source destination
Chain ufw-before-logging-input (1 references)
target prot opt source destination
Chain ufw-before-logging-output (1 references)
target prot opt source destination
Chain ufw-before-output (1 references)
target prot opt source destination
ACCEPT all -- 0.0.0.0/0 0.0.0.0/0
ACCEPT all -- 0.0.0.0/0 0.0.0.0/0 ctstate RELATED,ESTABLISHED
ufw-user-output all -- 0.0.0.0/0 0.0.0.0/0
Chain ufw-logging-allow (0 references)
target prot opt source destination
LOG all -- 0.0.0.0/0 0.0.0.0/0 limit: avg 3/min burst 10 LOG flags 0 level 4 prefix "[UFW ALLOW] "
Chain ufw-logging-deny (2 references)
target prot opt source destination
RETURN all -- 0.0.0.0/0 0.0.0.0/0 ctstate INVALID limit: avg 3/min burst 10
LOG all -- 0.0.0.0/0 0.0.0.0/0 limit: avg 3/min burst 10 LOG flags 0 level 4 prefix "[UFW BLOCK] "
Chain ufw-not-local (1 references)
target prot opt source destination
RETURN all -- 0.0.0.0/0 0.0.0.0/0 ADDRTYPE match dst-type LOCAL
RETURN all -- 0.0.0.0/0 0.0.0.0/0 ADDRTYPE match dst-type MULTICAST
RETURN all -- 0.0.0.0/0 0.0.0.0/0 ADDRTYPE match dst-type BROADCAST
ufw-logging-deny all -- 0.0.0.0/0 0.0.0.0/0 limit: avg 3/min burst 10
DROP all -- 0.0.0.0/0 0.0.0.0/0
Chain ufw-reject-forward (1 references)
target prot opt source destination
Chain ufw-reject-input (1 references)
target prot opt source destination
Chain ufw-reject-output (1 references)
target prot opt source destination
Chain ufw-skip-to-policy-forward (0 references)
target prot opt source destination
DROP all -- 0.0.0.0/0 0.0.0.0/0
Chain ufw-skip-to-policy-input (7 references)
target prot opt source destination
DROP all -- 0.0.0.0/0 0.0.0.0/0
Chain ufw-skip-to-policy-output (0 references)
target prot opt source destination
ACCEPT all -- 0.0.0.0/0 0.0.0.0/0
Chain ufw-track-forward (1 references)
target prot opt source destination
Chain ufw-track-input (1 references)
target prot opt source destination
Chain ufw-track-output (1 references)
target prot opt source destination
ACCEPT tcp -- 0.0.0.0/0 0.0.0.0/0 ctstate NEW
ACCEPT udp -- 0.0.0.0/0 0.0.0.0/0 ctstate NEW
Chain ufw-user-forward (1 references)
target prot opt source destination
Chain ufw-user-input (1 references)
target prot opt source destination
ACCEPT tcp -- 127.174.147.127 0.0.0.0/0 tcp dpt:5080
ACCEPT udp -- 127.174.147.127 0.0.0.0/0 udp dpt:5080
Chain ufw-user-limit (0 references)
target prot opt source destination
LOG all -- 0.0.0.0/0 0.0.0.0/0 limit: avg 3/min burst 5 LOG flags 0 level 4 prefix "[UFW LIMIT BLOCK] "
REJECT all -- 0.0.0.0/0 0.0.0.0/0 reject-with icmp-port-unreachable
Chain ufw-user-limit-accept (0 references)
target prot opt source destination
ACCEPT all -- 0.0.0.0/0 0.0.0.0/0
Chain ufw-user-logging-forward (0 references)
target prot opt source destination
Chain ufw-user-logging-input (0 references)
target prot opt source destination
Chain ufw-user-logging-output (0 references)
target prot opt source destination
Chain ufw-user-output (1 references)
target prot opt source destination
Any help very much appreciated, thanks
A:
Using nmap the results are as follows for the local address and external IP:
root@mydomain:~$ nmap 127.0.0.1
PORT STATE SERVICE
1935/tcp open rtmp
5080/tcp open onscreen
9999/tcp open abyss
root@mydomain:~$ nmap 127.174.147.127
PORT STATE SERVICE
1935/tcp open rtmp
5080/tcp open onscreen
9999/tcp open abyss
| 2023-09-21T01:27:13.970301 | https://example.com/article/7079 |
Category Archives: Custard Pies
I don’t think I’d ever eaten a lemon meringue pie before making this one, so I can’t really contrast it directly to one that I didn’t just make up. But this pie was super light and fluffy. It was … Continue reading →
I’m a sucker for seasonal/rarer fruits. On my last trip to the Dekalb Farmers Market I came home laden with a large box of ataulfo mangos (the small yellow ones, not the green/pink mangos), a couple pounds of fresh apricots, … Continue reading →
I found strawberries at an irresistible price the other day. So clearly I was going to make a strawberry pie. But, lacking rhubarb, I looked for some other variant of strawberry pie. I picked up ginger, thinking perhaps that would fit in … Continue reading →
I’d never made a banana cream pie before. But banana cream pie sounded boring and I had some obscenely ripe plantains I was planning on frying up and eating with tamarind yogurt. And so I did– but in pie form. … Continue reading →
Once upon a time, I hated avocados. I found their texture disturbingly reminiscent of sticks of butter* and their taste overall lacking. I moved to California where avocados were ubiquitous, and built a fortress of hatred as protection against the … Continue reading →
Oranges are problematic, stubborn fruits. With an apple you take a bite, or grope it a little, and know immediately whether it is good. A bad orange is more like a person: it does not betray its weakness so easily. … Continue reading →
The first week’s pie was not an unequivocal success, but it was certainly quirky. I got a hankering to make pie out of carrots. After all- carrot cake is awesome– by my rule of “pie>cake”, carrot pie must be more … Continue reading → | 2023-12-10T01:27:13.970301 | https://example.com/article/7932 |
An antenna refers to a part formed using a conductor that transmits electric waves to another location or receives electric waves from the location to perform radio communication and may be applied to a variety of products, for example, a wireless telegraph, a wireless phone, a radio, a television, and the like. An antenna module includes a substrate and one or more antennas installed on the substrate. In general, the antenna is manufactured in a specific form suitable for the purpose and shape of a product.
Korean Patent Registration No. 10-0794788 discloses a multiple input multiple output (MIMO) antenna as an example of an antenna module. The antenna module relates to the MIMO antenna and is designed to operate in a multi-frequency band and to have a miniaturized size.
The recent demand for a high quality multimedia service using wireless mobile communication technology has accelerated the need for next-generation wireless transmission technology for transmitting a larger amount of data faster with a lower error probability. Accordingly, the MIMO antenna is proposed. The MIMO antenna performs a MIMO operation by arranging a plurality of antenna devices in a specific structure. The MIMO antenna is configured to form the entire radiation pattern in a sharp shape and to transmit electromagnetic waves to a further location by merging the radiation power and the radiation pattern of a plurality of antenna devices.
Accordingly, it is possible to enhance a data transmission rate within a specific range and to increase a system range with respect to a specific data transmission rate. The MIMO antenna is next generation mobile communication technology widely available for a mobile communication terminal, a repeater, and the like, and has been gaining interest as next generation technology beyond a transmission amount limit of mobile communication close to a critical situation due to a data communication expansion, etc.
Meanwhile, various types of wireless communication services, for example, a global positioning system (GPS), wireless fidelity (WiFi), a wireless local area network (WLAN), wireless Broadband Internet (WiBro), Bluetooth, etc., available at a wireless terminal, have been currently developed. A reconfigurable antenna module is required to use each wireless communication service using a single wireless terminal.
In the case of a general MIMO antenna, one or more pairs of antennas in a complex and symmetrical shape need to be symmetrically disposed into consideration of optimization of a radiation pattern and prevention of interference, for example, isolation between each other. Accordingly, different two or more molds are used to manufacture the one or more pairs of antennas. | 2023-11-06T01:27:13.970301 | https://example.com/article/1603 |
Bender v. Consolidated Mink Ranch
Appeal from the Circuit Court of Lake County; the Hon. Robert
K. McQueen, Judge, presiding.
JUSTICE REINHARD DELIVERED THE OPINION OF THE COURT:
Consolidated Mink Ranch, Inc. (Mink Ranch), appeals from an order of the circuit court of Lake County which, on the motion of Nancy Bender, dismissed its petition for release of judgment. This petition was in the nature of a writ of audita querela pursuant to section 12-183(g) of the Code of Civil Procedure (Ill. Rev. Stat. 1983, ch. 110, par. 12-183(g)).
On appeal Mink Ranch contends that the trial court erroneously found that the petition failed to state a cause of action. Bender defends the judgment on its merits and further asserts that this appeal should be dismissed as moot.
The background to the original dispute between the parties is set out in this court's prior opinion in Bender v. Consolidated Mink Ranch, Inc. (1982), 110 Ill. App.3d 207, 441 N.E.2d 1315. In that case Nancy Bender as plaintiff, filed a two-count complaint alleging conversion and breach of contract, and secured a judgment in the amount of $17,600 against Mink Ranch, defendant therein. Mink Ranch appealed and this court affirmed the judgment in an opinion filed November 1, 1982.
On June 9, 1983, Mink Ranch filed a two-count "Petition for Release of Judgment Pursuant to Sec. 12-183(g) Code of Civil Procedure" (Ill. Rev. Stat. 1983, ch. 110, par. 12-183(g)). In that petition, Mink Ranch alleged 11 occasions on which acts of vandalism involving the cutting of fences and the release of minks from their cages had taken place on its premises from May 2, 1982, to February 18, 1983. The petition further stated that in the early morning hours of February 18, 1983, William Bender, Nancy Bender's spouse, was arrested in the vicinity of its ranch and charged with criminal damage to property and theft under $300, which criminal charges were still pending as of the filing of the petition. Mink Ranch alleged that William Bender had caused the damage to its premises while acting in his spouse's behalf and as her agent. These acts were allegedly done for the purpose of forcing Mink Ranch to abandon its appeal rights and to force an immediate payment of the judgment. The timing of certain of the acts was alleged to be related to the completion of the various steps in the appellate process of the original case. Mink Ranch therefore requested a partial release of Bender's judgment of $9,000, representing the amount of damages to the ranch premises and the cost of security measures instituted as a result of the vandalism, plus punitive damages of $25,000.
Mink Ranch accompanied its petition with the affidavit of Willard J. Nieland, its president, to the effect that he had observed William Bender in the process of damaging ranch property on February 18 and that Mr. Bender "had personally involved himself at all stages of his wife's case against defendant by appearing at depositions, giving testimony in Court in her behalf on critical issues in the case, etc." Bender moved to dismiss the petition contending that the petition failed to state a cause of action, that the petition's allegation that Mr. Bender's conduct was done to force payment of the judgment was purely speculative, that the petition failed to state the elements of an agency relationship between Bender and her, and that an agency relationship could not be predicated solely upon the Benders' marital relationship. The motion to dismiss was granted by the court below without specifying on which basis the petition was dismissed.
"The writ of audita querela is abolished and all relief heretofore obtainable and grounds for such relief heretofore available, whether by the writ of audita querela or otherwise, shall be available in every case by petition hereunder, regardless of the nature of the order or judgment from which relief is sought or of the proceeding in which it was entered."
The relief provided by this statute was formerly available under section 72 of the Civil Practice Act (Ill. Rev. Stat. 1979, ch. 110, par. 72(1)). The writ of audita querela, now replaced by motion, "enabled a judgment debtor to avoid execution by pleading satisfaction or discharge of the judgment, or a good defense to the claim which was not asserted owing to the fraud of the judgment creditor." (Ill. Ann. Stat., ch. 110, par. 72, Historical & Practice Notes, at 289 (Smith-Hurd 1968).) At common law, the writ of audita querela was in some cases available to a judgment debtor seeking to set aside a judgment on the basis of fraud or other misconduct on the part of the judgment creditor, prior to its rendition, and was also available to seek relief from the consequences of a judgment because of matters arising subsequent to its rendition, such as discharge, payment, or other satisfaction. Russell v. Klein (1974), 58 Ill.2d 220, 223-24, 317 N.E.2d 556; see also American National Bank & Trust Co. v. Pennsylvania R.R. Co. (1968), 40 Ill.2d 186, 238 N.E.2d 385; Louis E. Bower, Inc. v. Silverstein (1938), 298 Ill. App. 145, 18 N.E.2d 385; Barnett v. Gitlitz (1937), 290 Ill. App. 212, 8 N.E.2d 517.
Mink Ranch contends that even after a final judgment has been affirmed on appeal, it "must stand as a complaint subject to the defenses, set-offs, credits, and equities that a defendant may assert against any complaint once the parties' relationship has been completed and terminated, as only then may the real final judgment be made on all of the merits between the parties." In essence, it argues that section 12-183(g) may be utilized to prevent execution on a judgment where any other matter of dispute between the parties, even when unrelated to the merits of the original judgment, is asserted by the judgment debtor.
The import of the above authorities regarding the nature of audita querela is that such relief would prevent execution of a judgment where a matter of defense to the original action was not raised by the judgment debtor on account of the creditor's fraud or other misconduct. With regard to matters arising after judgment, the writ was available on account of such matters as discharge, payment, release or other matter entitling the judgment debtor to issuance of a satisfaction of judgment. There is no authority for defendant's position here which would treat a judgment as a matter akin to a complaint against which the judgment debtor may assert, virtually by way of counterclaim, new causes of action not reduced to judgment and not involving the same controversy presented by the original suit. No court in any jurisdiction appears to have extended audita querela relief to encompass such a claim. (See 7 Am.Jur.2d Audita Querela sec. 3 (1980).) The basis of Mink Ranch's petition pursuant to section 12-183(g) involves alleged conduct subsequent to the original judgment and does not allege relief is justified because of discharge, payment, or other such satisfaction. We conclude that section 12-183(g) is not available under the basis alleged in the petition here. The allegations of the petition, if actionable at all, may form the basis of a separate lawsuit only. For the foregoing reasons, this petition failed to state a basis for relief pursuant to section 12-183(g) and was properly dismissed.
Bender also has argued in her brief that this appeal should be dismissed as moot because the original judgment was satisfied by the bonding company which had secured the judgment pending the original appeal which was subsequently affirmed by this court. Although this contention might have merit, there is nothing of record to factually support this argument, nor has Bender sought to supplement the record or bring this fact before us by the express acknowledgement of both of the parties.
Our website includes the main text of the court's opinion but does not include the
docket number, case citation or footnotes. Upon purchase, docket numbers and/or
citations allow you to research a case further or to use a case in a legal proceeding.
Footnotes (if any) include details of the court's decision.
Buy This Entire Record For
$7.95
Official citation and/or docket number and footnotes (if any) for this case available with purchase. | 2024-03-06T01:27:13.970301 | https://example.com/article/5589 |
1 Import / Export options
The Import / Export options can be found in Relevant Music / Videos Settings.
Video Library:
Export Video Library
Exports the Library database to either one, or multiple XML files. When you initiate an export, XBMC will ask if you want to export to separate or a single file.
If you choose to export to separate files you will also be asked if you want to export thumbnails and fanart as well.
The resulting XML nfo file and associated image files will then be exported to the location of the corresponding video files.
Import Video Library
Imports an XML file into the Library database. If the entry does not exist it is appended.
If it exists:
It removes all current info for that entry from the database.
Inserts the info for that entry from the XML file.
Note: If you wish to import a movie, TV show, music video or episode into the library, use the corresponding format in the exported xml file and enclose it with the <videodb></videodb> tags. Examples can be seen below, as nfo files.
Imports a XML file into the Library database. If the entry does not exist it is skipped.
If it exists:
It removes all current info for that entry from the database.
Inserts the info for that entry from the XML file.
2 Video nfo Files
Nfo files can be used to provide data for a video file in XBMC or influence the search behavior of scrapers. In particular they are helpful if the information fetched from a web site does not match the video file, or data for that particular file does not exist.
By default at the time of scanning, if the media folder contains a correctly named *.nfo file, then XBMC will load the *.nfo file and attempt to either, in the case of it containing XML data get the metadata directly from the nfo file or will parse it for a direct URL to the scraper info page. This allows XBMC to skip it's normal lookup and/or search procedures, useful if a file's information is not available on any of the scraper sites, or if the filematching criteria fails for the particular file.
2.1 Video nfo Files containing XML data
1. The *.nfo file is an XML file containing the data for inclusion in the library.
2.1.1 Movies
Movie.nfo will override all and any nfo files in the same folder as the media files.
If there is only one nfo file in a folder, The scraper will use it for all media files in that folder. If there are multiple media files in a folder, the *.nfo must be named exactly the same as the video file it is representing (ie. moviename.avi and moviename.nfo). In the case of multi-part (stacked) video stacking, name the file either moviename.nfo or moviename-CD1.nfo where the first filename is moviename-CD1.avi.
2.1.2 TV Shows
The filename of the NFO should be "tvshow.nfo" (Exact, NOT the name of the actual TV show) and it should be in the root folder of the TV show.
The nfo xml file may contain a valid <episodeguideurl> to allow online updates. If not, only episodes with nfo files will be added.
2.1.3 TV Episodes
The *.nfo must be named exactly as the episode filename (i.e. episodename.avi and episodename.nfo) and in the same folder, allowing multiple episode and *.nfo files within the same folder.
For multi-part episodes, simply add multiple <episodedetails> XML blocks in succession.
2.1.4 Music Videos
The filename of the NFO should be the same as the music video file, only replacing the original extension with .nfo.
i.e. Bestartistintheworld - Bestsongintheworld.avi should have the corresponding nfo filename Bestartistintheworld - Bestsongintheworld.nfo.
2.2 Video nfo files containing an URL
2. The *.nfo file contains a URL of the information page to scrape.
The file can include other information (i.e. scene info), XBMC will scan through it and use a relevant URL if a match is found.
The scraper tries to match url's to all scrapers of the content type a dir is set to. E.g. if you set the content type to movies all movie scrapers check nfo files for a matching url. This means that nfo's override the scraper setting. I.e. a directory is set to use the imdb scraper but you have a german movie in it. Simply create a nfo for that movie with the ofdb link in it and you are sorted!
2.2.1 Movies
Movie.nfo will override all and any nfo files in the same folder as the media files.
Moviename.nfo where Moviename is the name of the movie file that points to a movie on IMDb.com.
If you use the "Use Foldername for Lookups" scraper setting XBMC will use the first nfo file it finds in the folder and apply it to any valid video file it finds in the same folder.
http://www.imdb.com/title/tt0333766
2.2.2 TV Shows
Filename should be tvshow.nfo (Exact, NOT the name of the TV show) in the root folder of the TV Show that points to a show on TheTVDB.com.
http://thetvdb.com/index.php?tab=series&id=73545
2.2.3 TV Episodes
Episodename.nfo where Episodename is the name of the episode file.Not currently supported!
2.2.4 Music Videos
Mvideo.nfo where Mvideo is the name of the music video file that points to a music video on MTV.com
http://www.mtv.com/overdrive/?artist=983&vid=222165
2.3 Video nfo files containing a mix of XML and URL
You can also create nfo files that contain both XML data and an URL.
This is useful for instance, if you want the entry in your database to have another name than the one officially provided by the scraper.
By default the xml entry is added to the scraped entry in the database and may result in some duplicates. If you want to completely override the scraped result you need to set a clear attribute for the relevant xml tag in the nfo file.
My Movies (www.mymovies.name) is an online database for profiling DVD-Video movies. My Movies saves an XML file and a poster cover image which with this patch will get scanned by XBMC in the same way as XBMC's own XML formatted NFO files are scanned/scraped.
XBMC have the ability to the import movie library information from "My Movies" via the mymovies.xml files that it generates, and these mymovies.xml are prioritized over NFO files.
4 Music nfo files
4.1 Music nfo Files containing XML data
4.1.1 Artists
This information is missing, please help by contributing the relevant information. | 2024-02-06T01:27:13.970301 | https://example.com/article/9001 |
Hundreds excluded from ‘antisocial’ forum
By Matthew Tempest, The Guardian, 15 October 2004
A near stampede marred the opening ceremony of the 2004 European
Social Forum in London last night, as up to a thousand rain-soaked
activists were barred entry to the Southwark Cathedral reception. Up
to two thousand delegates queued in the London dusk and repeated
cloudbursts for the event which was due to kick off the three-day
conference of European global justice activists, only to find around
half turned away. A potentially dangerous bottleneck was created as
organisers only admitted one guest at a time, after a bag search, from
a scrum of several hundred outside.
At first oblivious to the crushed crowd still waiting outside, the
speakers, including Ken Livingstone, Gerry Adams and Che Guevara's
daughter, Aleida, began half-an-hour late. Repeated attempts to ram
the door, chants and slow handclaps echoing from the cathedral
graveyard then reduced the opening ceremony to a state of semi-siege
as wet and disgruntled delegates, numbering at least as many as were
in the building, protested against the poor organisation of the ESF
outside.
There was no apparent threat of the direct action tactics of the May
Day protests, but a mood of dejection and chaos forced organisers
inside to apologise that the cathedral was the largest venue we
could book.
One usher confided that it was bigger than when Nelson Mandela came
here.
On stage, Ken Livingstone welcomed guests from across Europe to what
he called the largest conference in the history of Britain in over
2,000 years. The three-day gathering will see 500 events held in
the capital.
He told the radical congregation of around 1,000 that there was
still a queue thousands long in London yesterday evening to
register for accreditation, and that today's attendance for the
first full day of the conference of grassroots socialists,
environmentalists and anti-globalisation campaigners would be
20,000 to 30,000.
To cheers, he joked that the last few days the media has woken up
to the ESF—because my press officers have been rung incessantly
to ask ‘how much is it costing’?
Let me tell you—it costs less than the G8 [which the UK will
be hosting at Gleneagles next year] or the arms fair in London 18
months ago ... and if the media pay for entry, it will help defray the
costs!
Reflecting his view from his exclusive Guardian Unlimited interview
yesterday, that Europe's young were far from politically
apathetic, Mr Livingstone boasted that the 5,000 delegates camping
down in the Dome last night made it the biggest youth hostel in
Europe,
With a panel of Frances O' Grady, the TUC deputy general
secretary; Dr Aleida Guevara, the daughter of the late revolutionary
Che; and globalisation academic Susan George; Mr Livingstone suggested
that the war on Saddam Hussein was precipitated by the Iraqi
dictator's decision to switch the sales of oil from dollars to
euros.
Mr Livingstone said : Within my lifetime there will be a challenge
against the dollar. China will emerge and say ‘why trade in
dollars?’
Within a generation it will be the most dangerous time in world
history,
Turning to the operation of world markets, he added: All the people
in the world have an interest in overthrowing the existing financial
regime of the IMF and the World Bank,
Before introducing Dr Guevara, the mayor revealed that in the last
year of his current term, 2008, the Greater London authority would
commemorate the 50th anniversary of the Cuban revolution.
Dr Guevara told the audience through a translator: Socialism is
still a possibility. Solidary is of paramount importance,
She quoted Mother Teresa to an audience of peace activists hailing
from Russia, Poland, France, the UK, Spain, Germany, Australia and the
US.
Today's opening seminars, workshops, plenary sessions, concerts
and films will test rumours that 36 hours of heavy downpours in the
capital have left several of the venues and marquees at Alexandra
Palace partially flooded.
Chaotic Olympiad of the Fringe and Commune begins European Social
Forum
By John Vidal, The Guardian, 15 October 2004
Chaos reigned as an estimated 10,000 people converged in London for
the third European social forum with delays, frustration and problems
at three venues.
Despite a welcome from Ken Livingstone, the mayor of London, who
praised the forum's diversity, many visitors were bemused by a
lack of organisation, which reflected badly on a capital bidding for
the Olympic Games.
The chaos began early when 6,000 of the mainly young people attending
the three-day forum (ESF) had to queue for many hours in the rain to
register and collect passes at the Conway Hall in central London.
Because only 900 are allowed in at a time, the police were called to
clear the premises. Fights ensued, and a man was arrested.
Things got out of control. We were invaded by the Socialist Workers
party, said Mary Fee, spokeswoman for the Solidarity village, an
autonomous space at the hall hoping to set up an alternative
currency for participants.
As organisers announced that the Israeli whistleblower Mordechai
Vanunu would address a meeting tomorrow, Mr Livingstone denied that
the forum was being taken over by British leftist groups.
The ESF is far too big and diverse to be swamped by any one
viewpoint, he said. The global justice movement will be
reflected in the different debates and speakers.
The gathering gets into gear today and is expected to attract 1,000
groups, 350 of them British. The first two forums, in Florence and
Paris, each attracted 50,000 participants. The Guardian is the
forum's media partner.
However, criticisms of logis-tics dominated the discussions which
started last night at Southwark cathedral with the formal opening by
Mr Livingstone, Che Guevara's daughter, Aleida, Gerry Adams, and
others.
Frustrations seethed over as more than 1,500 people were kept waiting
in the rain and then refused entry to hear the opening speeches.
And earlier hundreds who made their way to Alexandra Palace in north
London, the venue for many of the 2,000 events, found only security
guards and workmen.
There is not one sign anywhere. The shuttle buses are not
working. It seems there is no organisation, said Juan Blanco, a
Spanish doctor. No one knows what is going on. Compared to Paris
this stinks.
But as some battled with transport, others were de-lighted by the vast
choice. I have never seen such a programme, said Roberto, who
arrived from Spain yesterday.
This is like the Olympics of politics and culture, a cross between
the Edinburgh Festival and the Paris Commune. There is too much for
three days, but this is a good sign for social justice in Europe. The
movement is vibrant.
Back at Southwark, Mr Livingstone said: We expect 20–30,000
delegates. In the last few days the media has woken up to the ESF. I
know that because my press officers have been inundated with calls
asking ‘How much will it cost?’
I tell you this, it will cost less than the G8 or last year's
arms fair in London, he said to loud cheers.
And he offered a warning, claiming that Saddam Hussein's decision
to sell Iraqi oil in euros rather than dollars precipitated the
US decision to topple him.
Within my life time there will be a challenge against the
dollar. China will emerge and say ‘Why should we trade in
dollars?’ It will be the most dangerous time in world
history.
He told the crowds—as he introduced Ms Guevera—that in
2008 London would celebrate the 50th anniversary of the Cuban
revolution.
Ms Guevera received a standing ovation and said: Socialism is still
a possibility and solidarity is of paramount importance. The road is
long but as Mother Teresa said: ‘Life is life—defend
it’!
Earlier Mr Adams said: We must have fair trade over free trade and
we must have a UN that is reformed, modernised, and strengthened. | 2023-10-07T01:27:13.970301 | https://example.com/article/3279 |
Alcoholism Treated with Acupuncture
An old proverb says “First, the man takes a drink; then the drink takes a drink; then the drink takes the man.” I was that man and with the help of acupuncture, I am taking back my life.
I have “enjoyed” what I believe to be reasonable success after 21 sessions within a four week period in December with a weekly follow-up of one session per week ever since. My alcoholic compulsion is markedly reduced with the side benefit of elevated vigour and more energy from day to day.
Plus, I have had relief from the usual pain I experience from arthritis caused by degenerative cartilage in both knees – pretty severe condition, too, as I have entertained having replacement surgery before this recent development of relief from pain by acupuncture treatments.
Hence, I have become somewhat of a new disciple of acupuncture with zeal to learn more – especially with regard to the success had by some in tempering alcoholic compulsion. I believe it is particularly effective to the recovering alcoholic who is relapse prone who has made conscientious and earnest effort in trying to recover but continues to succumb to whatever forces cause him/her to pick up that first drink again.
Of course, I have no inner personal assurance to myself that I will not be weak again, but I believe if I continue to do the usual and simple things suggested by AA, I feel I can expect a less trying recovery with my newly affected condition that I attribute to the acupuncture treatments.
I literally do not have the compulsion or craving. An occasional thought of drinking passes by with no pangs or lingering thoughts. It just passes by as if by providence – I prefer to think this, too, is responsible for my relief. Maybe my final surrender to the disease was, in fact, the real need met. Going for such a radical (by Western standards) course of action – acupuncture – I may have become treatable. Nevertheless, I cannot deny the most compelling awareness of all of this being the result of the treatments regardless of how non-conforming it may be by the usual standard of Western culture/medicine practice.
I’m not just “some old convert” who’s newly sober – I’m an old drunk who’s found a new tool to help me stay sober one day at a time! With temperate judgment of the use of acupuncture as an ancillary to AA’s twelve-step program, it really seems to help guard against PAWS – it almost seems to remove them. PAWS means “Post Acute Withdrawal Syndrome.” which includes:
inability to think clearly
emotional over reactions
memory problems
sleep disturbances
physical coordination problems
problems in managing stress
I recently read about a doctor who said that the only necessary proof of acupuncture’s worth was the very fact that IT WORKED. Period. Not that one should expect scientific rationale or “western” methodology. No. It just works. Not in every case, but neither do western solutions (cures) always answer their call. So? If it works, use it – enjoy – heal. Accept. I did, and I continue to do so… One day at a time. | 2023-10-29T01:27:13.970301 | https://example.com/article/6109 |
---
abstract: 'We calculate a new equation of state for baryons at sub-nuclear densities meant for the use in core-collapse simulations of massive stars. The abundance of various nuclei is obtained together with the thermodynamic quantities. The formulation is the NSE description and the liquid drop approximation of nuclei. The model free energy to minimize is calculated by relativistic mean field theory for nucleons and the mass formula for nuclei with the atomic number up to $\sim 1000$. We have also taken into account the pasta phase, thanks to which the transition to uniform nuclear matter in our EOS occurs in the conventional manner: nuclei are not dissociated to nucleons but survive right up to the transition to uniform nuclear matter. We find that the free energy and other thermodynamical quantities are not very different from those given in the H. Shen’s EOS, one of the standard EOS’s that adopt the single nucleus approximation. The average mass is systematically different, on the other hand, which may have an important ramification to the rates of electron captures and coherent neutrino scatterings on nuclei in supernova cores. It is also interesting that the root mean square of the mass number is not very different from the average mass number, since the former is important for the evaluation of coherent scattering rates on nuclei but has been unavailable so far. The EOS table is currently under construction, which will include the weak interaction rates.'
author:
- 'Shun Furusawa, Shoichi Yamada, Kohsuke Sumiyoshi and Hideyuki Suzuki'
title: 'A new baryonic equation of state at sub-nuclear densities for core-collapse simulations'
---
Introduction
============
Equations of state (EOS’s) of hot and dense matter play an important role in the dynamics of core collapse supernovae both at sub- and supra-nuclear densities (see e.g. @Janka2007). Not only thermodynamical quantities such as pressure, internal energy, entropy, sound velocity but also information on matter composition is provided by EOS. At sub-nuclear densities, the latter affects the rates of electron captures and coherent neutrino scatterings on nuclei, both of which in turn determine the electron fraction of collapsing cores, one of the most critical ingredients for the core dynamics. This is exactly the issue we would like to address in this paper.
The EOS employed for the core collapse simulation must cover a wide range of density ($10^5 \lesssim \rho_B \lesssim 10^{15} \rm{g/cm^3}$) and temperature ($10^9 \lesssim T \lesssim 10^{12}$K), including both neutron-rich and proton-rich matter. One of the difficulties in constructing the EOS originates from the fact that depending on the density, temperature and proton fraction, the matter consists of either dilute free nucleons or a mixture of an ensemble of nuclei and free nucleons or strongly interacting dense nucleons. Another complication is the existence of the so-called nuclear pasta phase, in which nuclear shapes change from droplet to rod to slab to anti-rod and bubble(anti-droplet) as the density increases toward the nuclear saturation density, at which uniform nuclear matter is realized [@Ravenhall1983; @Hashimoto1984; @Nakazato2009]. At high temperatures ($T \gtrsim 5\times 10^9$K), chemical equilibrium is achieved for all strong and electromagnetic reactions, which is referred to as nuclear statistical equilibrium, or NSE, and the nuclear composition in the matter is determined as a function of density, temperature and proton fraction.[@Blinnikov2009] At lower temperatures, the matter composition is an outcome of preceding nuclear burnings and cannot be obtained by statistical mechanics. In this paper we are concerned with the high temperature regime, in which the nuclear composition is a part of EOS.
At present, there are only two EOS’s in wide use for the core-collapse simulation. The Lattimer-Swesty’s EOS [@Lattimer1991] is based on Skyrme-type nuclear interactions and the so-called compressible liquid drop model for nuclei surrounded by dripped nucleons. The EOS by H. Shen, Toki, Oyamatsu and Sumiyoshi [@Shen1998] employs a relativistic mean field theory (RMF) to describe nuclear matter and the Thomas-Fermi approximation for finite nuclei with dripped nucleons. It should be emphasized here that both EOS’s adopt the so-called single nucleus approximation (SNA), in which only a single representative nucleus is included. In other words, the distribution of nuclei is ignored. @Burrows1984 demonstrated that SNA is not a bad approximation for thermodynamical quantities such as pressure. It will not be the case, however, for the weak interaction rates, since the electron capture rates are sensitive to nuclear shell structures and the greatest contributor is not the most abundant nuclei that the single representative nuclei in SNA are supposed to approximate [@Langanke2003]. It is also noted that the coherent scattering of neutrinos on nuclei has a cross section proportional to $A^{2}$ with $A$ being the nuclear mass number. In SNA we have no information on the average of mass number squared $\overline{A^2 }$ and replace it by $A_{rep}^2$ with $A_{rep}$ being the mass number of the representative nucleus. This is certainly an approximation that needs justification.
Recently @Hempel2010 published a new EOS at sub-nuclear densities meant for the use in supernova simulations. Assuming NSE, they calculated the abundances of nuclei as a function of density, temperature and proton fraction, minimizing the model free energy. They employed RMF for the nucleon contribution and adopted masses of nuclei from two mass tables in public domain. One of them is the experimental atomic mass table 2003 [@Audi2003] and the other is a tabulated theoretical prediction for nuclei with no available experimental data, which is based on RMF [@Geng2005] with the TMA parameter set [@Toki1995]. The translational and Coulomb energies of nuclei are designed so that the free energy could match the one given by RMF for uniform nuclear matter at the saturation density. It should be noted that the solution of the Saha equation for the mass data, which are obtained in laboratory [@Audi2003] or calculated for isolated nuclei [@Geng2005], is not appropriate at high densities ($\rho_B \gtrsim 10^{12}$g/cm$^3$), since nuclei are not isolated and affected by surrounding other nuclei, nucleons and electrons, resulting in the modification of masses of nuclei.
Our formulation is quite similar to the one employed by @Hempel2010. The major difference, however, is that we calculate very heavy nuclei ($Z \gtrsim 100$ with $Z$ being the atomic number) with a mass formula whereas @Hempel2010 ignored these nuclei owing to the limitation of the mass tables. It is stressed, however, that these massive nuclei do appear in the H. Shen’s EOS [@Shen1998] and, as shown later, they are indeed abundant at high densities ($\rho_B \gtrsim 10^{13} {\rm g / cm^3}$) in our EOS also. Another important improvement in this paper is the treatment of the nuclear pasta phase, which was entirely ignored in the previous paper [@Hempel2010]. It turns out that this is important to reproduce the conventional manner of transition to uniform nuclear matter, that is, nuclei do not melt down to nucleons but survive up to the nuclear saturation density.
The aim of our project is in a sense to merge all the previous EOS’s to provide all the information needed for core collapse simulations: thermodynamical quantities such as pressure, internal energy, entropy, sound velocity and some other important derivatives as well as information on the abundance of nuclei required for the calculation of the weak interaction rates; the description of uniform nuclear matter is based on RMF in H. Shen’s EOS; the approximate treatment of the pasta phase is similar to the one employed in Lattimer-Swesty’s EOS; we solve a Saha-like equation to obtain the abundance of nuclei. In this paper, we describe the formulation in detail and show some features of our EOS, which are particularly different from those of the previous EOS’s. More systematic and thorough presentation of the EOS will be given in the sequel after we have constructed the EOS table that includes somehow the electron capture rates.
This article is organized as follows. In section 2 we explain in detail the model free energy to be minimized. Then the results of minimization are shown in section 3, with an emphasis being put on the comparison with the previous EOS’s. The paper is wrapped up with a summary and some discussions in section 4.
Model Free Energy
=================
The strategy to obtain the multi-component EOS is to construct a model free energy and minimize it with respect to the parameters involved in the expression of the free energy. The matter in the supernova core at sub-nuclear densities consists of nucleons, nuclei together with electrons and photons. The latter two are not treated in this paper although the inclusion of them as ideal Fermi and Bose gases respectively are quite simple and now a routine. Neutrinos are not always in thermal or chemical equilibrium with the matter and cannot be included in the EOS. Their non-equilibrium distributions should be computed by the transport equations.
The free energy is thus a sum of the contributions from the individual nucleus and those from the nucleons that are not contained in the nuclei. We employ the RMF free energy for the nucleons outside the nuclei. In constructing the model free energy for the nuclei, the following points are appropriately taken into account:
1. Not only the nuclei that are known to exist in laboratory but exotic ones such as very neutron-rich and/or very heavy nuclei should be also included somehow even if experimental data are unavailable. They are indeed obtained in supernova simulations with EOS’s that employ SNA. \[req1\]
2. At low densities, experimental mass data should be used whenever available. This is important to guarantee that the most stable iron group nuclei are populated with correct abundances at low temperatures. \[req2\]
3. At higher densities, strong and electromagnetic interactions among free nucleons, nuclei and electrons cannot be ignored and should be properly reflected in the surface and Coulomb energies of nuclei. \[req3\]
4. The bulk energy of nuclei should approach the one for uniform nuclear matter as the density increases to the nuclear saturation density. This should be taken into consideration to obtain a continuous transition to uniform nuclear matter. \[req4\]
5. Near the nuclear saturation density, the nuclear pasta phase should be treated somehow. This is also a necessary ingredient to realize a seamless transition to uniform nuclear matter, in which nuclei are not dissociated to nucleons but continue to exist right up to the transition. \[req5\]
The model free energy for nuclei described in detail in the following subsections is based on the mass formula. As mentioned above in point \[req2\], at low densities, experimental mass data are utilized, whenever available, to obtain the bulk energy of nuclei and RMF is employed otherwise. At high densities, however, even for the nuclei, for which experimental data exist, the bulk energy is modified so that points \[req3\] and \[req4\] are satisfied. As for point \[req5\], only the bubble phase is explicitly considered, following the phenomenological prescription adopted in [@Lattimer1991]. Although it is easy to change it, we suppose in this paper that H. Shen’s EOS is used for uniform nuclear matter at supra-nuclear densities. The continuous transition from the EOS at sub-nuclear densities to the one at supra-nuclear densities is guaranteed by the following prescriptions: the free energy of the nucleons outside nuclei is based on the same RMF model as for uniform nuclear matter; the bulk energy of nuclei is modified to approach that of uniform nuclear matter as the density increases; the surface, Coulomb and translational energies of nuclei go to zero as the transition density is approached.
The details of these prescriptions will be given in the following subsections. We briefly explain the RMF model we employ for the nucleons in section \[secnucleon\]. Then we proceed to the description of the model free energy for nuclei in section \[secnuclei\], in which the Coulomb and surface energies are treated in subsections \[subsecc\] and \[subsecs\], respectively, the bulk energy is presented in subsection \[subsecb\] and the translational energy is given in subsection \[subsect\]. The method to minimize the model free energy is explained in section \[secmin\] and the evaluation of thermodynamical quantities from the free energy is mentioned in section \[secth\].
Free Energy for Nucleons outside Nuclei \[secnucleon\]
------------------------------------------------------
The free energy of the nucleons that are not contained in nuclei is base on RMF in this paper [@Shen1998]. The choice is not essential, however, and one can replace it by any other theory or model indeed. The important thing to ensure the continuous transition to uniform nuclear matter is to use the same theory or model for the nucleons outside nuclei at sub-nuclear densities and uniform nuclear matter at supra-nuclear densities. The details of the RMF model employed in this paper can be found in the original paper [@Shen1998]. In the following, we summarize only the essential ingredients.
In RMF nuclear interactions are described by the exchange of mesons. The employed Lagrangian is the following: $$\begin{aligned}
{\cal L}_{RMF} & = & \bar{\psi}\left[i\gamma_{\mu}\partial^{\mu} -M
-g_{\sigma}\sigma-g_{\omega}\gamma_{\mu}\omega^{\mu}
-g_{\rho}\gamma_{\mu}\tau_a\rho^{a\mu}
\right]\psi \\ \nonumber
&& +\frac{1}{2}\partial_{\mu}\sigma\partial^{\mu}\sigma
-\frac{1}{2}m^2_{\sigma}\sigma^2-\frac{1}{3}g_{2}\sigma^{3}
-\frac{1}{4}g_{3}\sigma^{4} \\ \nonumber
&& -\frac{1}{4}W_{\mu\nu}W^{\mu\nu}
+\frac{1}{2}m^2_{\omega}\omega_{\mu}\omega^{\mu}
+\frac{1}{4}c_{3}\left(\omega_{\mu}\omega^{\mu}\right)^2 \\ \nonumber
&& -\frac{1}{4}R^a_{\mu\nu}R^{a\mu\nu}
+\frac{1}{2}m^2_{\rho}\rho^a_{\mu}\rho^{a\mu}. \end{aligned}$$ In the above expression, the notation is the same as in @Shen1998: $\psi$, $\sigma$, $\omega$ and $\rho$ denote nucleons (proton and neutron), scalar-isoscalar meson, vector-isoscalar meson and vector-isovector meson, respectively, and $W_{\mu\nu} =\partial^{\mu}\omega^{\nu}- \partial^{\nu}\omega^{\mu} $ and $R^{a}_{\mu\nu}= \partial^{\mu}\rho^{a\nu}- \partial^{\nu}\rho^{a\mu} +g_{\rho}\epsilon^{abc}\rho^{b\mu}\rho^{c\nu} $. The nucleon-meson interactions are given by the Yukawa couplings and the isoscalar mesons ($\sigma$ and $\omega$) interact with themselves, which are expressed as the cubic and quartic terms. In the mean field theory, the mesons are assumed to be classical and replaced by their ensemble averages whereas the Dirac equation for nucleons is quantized and the free energy is evaluated based on the energy spectrum of nucleons obtained this way. $M$ is the mass of nucleons and assumed to be $938$MeV. We use the TM1 parameter set as in @Shen1998, in which the masses of mesons, $m_{\sigma}$, $m_{\omega}$, $m_{\rho}$, and the coupling constants, $g_{\sigma}$, $g_{\omega}$, $g_{\rho}$, $g_2$, $g_3$, $c_3$, are determined so that not only the saturation of uniform nuclear matter but also the properties of finite nuclei could be best reproduced [@Sugahara1994].
It is interesting to study how the resulting EOS is affected by the choice of RMF parameter or, more generally, by the choice of EOS for uniform nuclear matter. If the preceding paper [@Hempel2010], in which several RMF parametrizations were compared, is any guide, differences in the RMF parametrization will be reflected in thermodynamic quantities near the saturation density. Since RMF is employed also for the bulk energy of nuclei in our EOS as explained later in subsection \[subsecb\], differences in symmetry energy originated from different parametrizations may be reflected in the neutron-richness of nuclei, for which we have no available experimental mass data and the empirical mass formula is employed. The abundance of nuclei with experimental mass data, on the other hand, will not be changed very much. It should be also noted that RMF in general tends to overestimate the neutron matter energy at sub-nuclear densities [@Sumiyoshi1995; @Akmal1998; @Steiner2005; @Gandolfi2010; @Hebeler2010]. It is stressed that one of the features of our EOS is that it is easy to adopt different EOS’s at supra-nuclear densities as long as they are available. The above issues will be discussed more in detail in the forthcoming paper. In this paper, the free energy density of uniform nuclear matter, $f^{RMF}(n_B,T,Y_p)$ with $n_B$, $T$ and $Y_p$ being the baryon number density, temperature and proton fraction, respectively, is used mainly at sub-nuclear densities. In so doing, one important thing to be taken into account is the fact that the free nucleons cannot exist in the volume occupied by nuclei. The volume, $V'$, that can accommodate the nucleons is hence given by $$V' =V-\sum_{i} N_i V_i^N,$$ where index $i$ specifies a nucleus, $V$ is the total volume, $N_i$ is the particle number of nucleus $i$ and $V_i^N$ is the volume of nucleus $i$, which is expressed by the mass number, $A_{i}$, and number density, $n_i$, of the same nucleus as well as the nuclear saturation density, $n_{si}$, as follows: $$V_i^N= \frac{A_i}{n_{si}},$$ where we assume that the nuclei are homogeneous, having the nuclear saturation density, $n_{si}$. The reason why $n_{si}$ has the subscript $i$ will be made clear later (see section \[secnuclei\]). Then the densities of free protons and neutrons in the volume $V'$, which are denoted by $n'_p$ and $n'_n$, respectively, are given by $$n'_{p/n}=\frac{N_{p/n}}{{V'}}= \ \frac{n_{p/n}}{\eta},$$ where $N_{p/n}$ and $n_{p/n}$ are the particle numbers and the number densities in the total volume $V$ of nucleons and $\eta$ is expressed as $\eta=V'/V=1-\sum_{i} A_i n_i/n_{si}$. The free energy density for the nucleons in $V'$ should be evaluated at $Y_p= n'_p/(n'_p+n'_n)$ and $n_B=(n'_p+n'_n)$ and is given for the entire volume as $$f_{p,n} = \eta \, f'_{p,n}$$ with $f'_{p,n} = f^{RMF} (n'_p,n'_n,T)$.
Free Energy for Nuclei \[secnuclei\]
------------------------------------
This is the most crucial part of our model free energy and is described in detail in the following. The free energy of nuclei consists of two parts, one of which concerns a translational energy whereas the other part is roughly a nuclear mass. The modeling of the latter is based on a semi-empirical mass formula and takes into account the Coulomb, surface and bulk energies. We explain each contribution to the mass formula one by one and then move on to the treatment of the translational energy.
Before proceeding, however, we state here the definition of the nuclear saturation density, $n_{si}(Z_i/A_i,T)$, more precisely, since it will appear frequently in the following. It is in principle the baryon number density at which the free energy per baryon, $F^{RMF}(T,n_B, Y_p)$ with $Y_p=Z_i/A_i$, by RMF takes its minimum value or, put another way, the uniform nuclear matter [*with the same proton fraction as the nucleus*]{} has the lowest energy in RMF. Note that the proton fraction of each nuclei is different from the one for the whole system and that our nuclear saturation density is actually different from nucleus to nucleus and hence has the subscript that indicates which nucleus is referred to. There are two exceptions to this definition, though. The first one is the case, in which the saturation density given above is smaller than the number density of the whole system, $n_B$. This happens if $n_B$ reaches the saturation density of some nucleus, $n_{si}(Z_i/A_i,T)$, before the whole system becomes uniform. This is indeed possible because the saturation density tends to be smaller for more neutron-rich nuclei. In such a case the nucleus will be overcompressed and we replace the original saturation density with the number density of the whole system, $n_B$. The second case occurs at high temperatures, for which the free energy, $F^{RMF}(T,n_B, Z_i / A_i )$, has no minimum because the entropy contribution, the $TS$ term with $S$ being entropy, overwhelms the internal energy. In that case the nuclear saturation density, $n_{si}$, is set to be the density where the matter becomes uniform in the H. Shen’s EOS.
### Coulomb energy\[subsecc\]
To calculate the Coulomb energy density in the free energy for nuclei we introduce a Wigner-Seitz cell (W-S cell) for each species of nuclei and impose charge neutrality in it. It is assumed that a nucleus is centered in the W-S cell, the volume of which is denoted as $V_i$ and that the cell contains also nucleons as a vapor outside the nucleus as well as electrons, which are assumed to be uniform in the entire cell. The charge neutrality in the cell can be expressed as $$V_i n_e =Z_i +(V_i-V_i^N)n'_p,$$ which can be solved for $V_i$ and gives $$V_i = \frac{Z_i - n'_p V_i^N}{n_e-n'_p},$$ where $V_i^N$ is the nuclear volume in the cell and $n_e$ denotes the number density of electrons. The vapor volume and nuclear volume fraction for each nucleus are given by $ V_i^B = V_i-V_i^N $ and $u_i = V_i^N / V_i$, respectively.
As the density approaches the nuclear saturation density, the nuclear pasta phase is encountered, in which various shapes of nuclei exist. As mentioned already, this phase has to be somehow treated in order to obtain the smooth transition to uniform nuclear matter. It is much beyond the scope of our project to treat all known pastas accurately, however. We hence resort to a rather crude approximation, in which the bubble phase is explicitly considered. It is known that bubble nuclei, in which the vapor nucleons are surrounded by the nucleus, appear at the end of the pasta phase. We assume there that a spherical vapor is located at the center of W-S cell surrounded by a shell-shaped nucleus. In this paper we assume further that each nucleus enters the nuclear pasta phase individually when the volume fraction, $u_i$, reaches $0.3$ and that the bubble shape is realized when it exceeds $0.7$ [@watanabe2005]. The intermediate states ($ 0.3<u_i<0.7 $) are simply interpolated from the normal and bubble states. This criterion is admittedly rather arbitrary. We have tried another choice, $0.4<u_i<0.6$, and confirmed that the results are hardly affected, though. We hence believe that our EOS is not very sensitive to the criterion. The evaluation of the Coulomb energy in the W-S cell is straightforward and given by the following expression: $$E_i^C= \int_{\rm cell} \frac{q(r) \, dq(r)}{r},$$ where the cell is assumed to be spherically symmetric and $q(r)$ is the sum of electron and proton charges up to the radius $r$. Assuming further that the protons are uniformly distributed in the nucleus and the vapor separately, we obtain the Coulomb energies for the normal and bubble phases from the above integration as follows: $$\begin{aligned}
E_i^C=\left\{ \begin{array}{ll}
\displaystyle{\frac{3}{5}\left(\frac{3}{4 \pi}\right)^{-1/3} \frac{e^2}{n_{si}^2} \left(\frac{Z_i - n'_p V_i^N}{A_i}\right)^2 {V_i^N}^{5/3} D(u_i)} & (u_i\leq 0.3), \\
\displaystyle{\frac{3}{5}\left(\frac{3}{4 \pi}\right)^{-1/3} \frac{e^2}{n_{si}^2} \left(\frac{Z_i - n'_p V_i^N}{A_i}\right)^2 {V_i^B}^{5/3} D(1-u_i)} & (u_i\geq 0.7),
\end{array} \right.
\label{eqclen}\end{aligned}$$ with $D(u_i)=1-\frac{3}{2}u_i^{1/3}+\frac{1}{2}u_i$, where $e$ is the elementary charge. Note that the two energies coincide with each other at $u_i=0.5$, since the nuclear volume, $V_i^N$, is equal to the vapor volume, $V_i^B$, there although the value is not used and the interpolation is done from the values at $u_i=0.3$ and $u_i=0.7$ to take crudely into account the existence of other pastas. We employ cubic polynomials of $u_i$ for interpolation. The four coefficients of the polynomial are determined by the condition that the Coulomb energy is continuous and smooth as a function of $u_i$ at $u_i=0.3$ and $u_i=0.7$.
### surface energy \[subsecs\]
In the semi-empirical mass formula we employ in this paper, the surface energy of nuclei is given by the product of the nuclear surface area and the surface tension, which is approximated by the following analytic expression: $$\sigma_i=\sigma_0 - \frac {A_i^{2/3} } {4 \pi r_{N_i}^2} [S_s(1- 2(Z_i/A_i)^2 ],$$ where $r_{N_i} = ( 3/4 \pi V_i^N )^{1/3} $ is the radius of nucleus $i$ and $ \sigma_0$ denotes the surface tension for symmetric nuclei. The second term on the right hand side is added to accommodate highly neutron-rich nuclei, for which no experimental data are available but a proper consideration of the surface symmetry energy is almost mandatory. The values of the constants, $\sigma_0=1.15 \rm{MeV/fm^3}$ and $S_s =45.8 \rm{MeV}$, are adopted from the paper by @Lattimer1991. Note that this expression gives negative values if nuclei become extremely neutron-rich. We hence assume in this paper that only those neutron-rich nuclei with a surface tension higher than a prescribed lower limit, $\sigma=0.272 \rm{MeV/fm^3}$, can exist. This value is obtained from the mass data of the most neutron-rich nuclei with $(Z, A) = (1, 7)$ [@Audi2003] and the subtraction of the bulk and Coulomb energies given by our mass formula.
Noting that the nuclear surface should be replaced by the bubble surface in the bubble phase, we obtain the following expression for the surface energy: $$\begin{aligned}
E_i^S=\left\{ \begin{array}{ll}
4 \pi {r^2_{Ni}} \, \sigma_i \left(1-\displaystyle{\frac{n'_p+n'_n}{n_{si}}} \right)^2 =
4\pi \left( \displaystyle{\frac{3}{4 \pi}} V_i^N \right)^{2/3} \, \sigma_i \left(1-\displaystyle{\frac{n'_p+n'_n}{n_{si}}} \right)^2 & (u_i\leq 0.3), \\
4 \pi {r^2_{Bi}} \, \sigma_i \left(1-\displaystyle{\frac{n'_p+n'_n}{n_{si}}} \right)^2=4\pi \left(\displaystyle{\frac{3}{4 \pi}} V_i^B \right)^{2/3} \, \sigma_i
\left(1-\displaystyle{\frac{n'_p+n'_n}{n_{si}}} \right)^2 & (u_i\geq 0.7),
\end{array} \right.\end{aligned}$$ where $r_{Bi} =( 3/4 \pi V_i^B )^{1/3} $ is the radius of bubble $i$. The last factor, $ \left(1-(n'_p+n'_n)/n_{si} \right)^2 $, in these expressions are introduced to take into account the effect that the surface energy should be reduced as the density contrast decreases between the nucleus and the nucleon vapor. The specific functional form is inspired by the surface energy employed in the Thomas-Fermi approximation in the H. Shen’s EOS, $ \left| \nabla(n_n + n_p) \right| ^2 $ (Eq. (35) of @Shen1998 ). As shown later, this prescription is necessary to ensure the continuous transition to uniform nuclear matter, since the transition occurs not only by coalescence of nuclei but also by the increase in the density of nucleon vapor. For the other pastas ($0.3<u_i<0.7$), we employ the same cubic interpolation as for the Coulomb energy (section \[subsecc\]).
### bulk energy \[subsecb\]
The bulk energy of nuclei should be different at high densities, $\rho_B \gtrsim 10^{12}$g/cm$^3$, from the one at lower densities, since nuclei cannot be regarded as an isolated object and effects of other nuclei, nucleons and electrons cannot be ignored [@Vautherin1994]. In this paper, we will take this into account phenomenologically as follows.
As the density increases, the nuclear bulk energy, $E_i^{B}$, should approach the one for uniform nuclear matter with the same proton fraction. We obtain the latter from RMF as $$E_i^{B}(T)= A_i F^{RMF}(n_{si},T,Z_i/A_i),
\label{eq:blkh}$$ where $F^{RMF}(n_B,T,Y_p) $ is the free energy per baryon by RMF. Note that the proton fraction in this expression is not the one for the whole system but the one for each nucleus; the density is taken to be the saturation density defined earlier (section \[secnuclei\]) for each nucleus. This implies that nuclei have their own densities that are different from each other. Since the saturation density tends to be lower for neutron-rich nuclei, the density of the whole system becomes equal to the one for some neutron-rich nucleus one after another as it increases. In such a case the density of the nucleus that becomes uniform in its W-S cell is set to be the system density as mentioned earlier. These prescriptions ensure the continuous transition to uniform nuclear matter.
At low densities, on the other hand, experimental mass data are used whenever available [@Audi2003]. This is indeed important to reproduce the well-known results of the ordinary NSE. As will be shown later, the nuclear shell and even-odd effects manifest themselves in the abundance of nuclei and should be taken into account whenever possible. These experimental mass data are accommodated in our mass formula by adjusting the bulk energy, which is expressed as $$E_i^{B}=M_i^{\rm{data}}-[E_i^{C}]_{vacuum}-[E_i^{S}]_{vacuum},
\label{eq:blkl}$$ where subtracted from the experimental mass, $M_i^{\rm{data}}$, are the Coulomb and surface energies $[E_i^{C,S}]_{vacuum}$ of the nucleus isolated in vacuum, that is, the energies calculated from our mass formula for $n_e=n'_p=n'_n=0$. This ensures that the experimental mass is reproduced exactly in the low density limit. At finite densities, on the other hand, the mass is given by $$\begin{aligned}
M_i & = & E_i^{B} + E_i^{S} + E_i^{C} \nonumber \\
& = & M_i^{\rm{data}}+E_i^{S}(n'_n,n'_p,n_e) + E_i^{C}(n'_p,n_e) -[E_i^{C}]_{vacuum}-[E_i^{S}]_{vacuum}.\end{aligned}$$ Note that the bulk energy in our mass formula actually includes other energies such as the bulk symmetry, shell and pair energies.
For nuclei with no available experimental data, we employ the bulk energy obtained from RMF even at low densities as explained above. Since these nuclei, which are either very heavy $Z_i \gtrsim 100$ or highly neutron-rich $Z_i/A_i \lesssim 0.35 $, are abundant normally at high densities ($\rho_B \gtrsim 10^{12} \rm{g/cm^3}$) alone, the above prescription is justified. The only exception is the combination of very low temperatures ($T \lesssim 1$MeV) and low proton fractions ($Y_p \lesssim 0.3$). Such cases are not encountered in the simulations of core-collapse supernovae, however, and will not be a problem practically, either. These low- and high-density values (Eqs. (\[eq:blkl\]) and (\[eq:blkh\])) are linearly interpolated between $\rho_B = 10^{12} \rm{g/cm^3}$ and the nuclear saturation density, $\rho_B \sim 10^{14.2} \rm{g/cm^3}$. The linear interpolation makes the free energy not smooth and the pressure discontinuous at the boundaries of the interpolation region. In practice, however, the variation of the bulk energy is quite minor compared with those of Coulomb and translational energies and the discontinuities of the pressure are negligible. Moreover, nuclei that have experimental mass data and hence need the interpolation are not abundant near the high density end, the fact which makes the discontinuities even less important there. We hence believe that the above prescription is sufficient.
### translational energy \[subsect\]
The translational energy of nucleus $i$ in our model free energy is based on that for the ideal Boltzmann gas and given by $$\label{eq:tra}
E_i^{t}=k_B T \left\{ \log \left(\frac{n_i}{g_i(T) n_{Qi}}\right)- 1 \right\} \left(1-\frac{n_B}{n_s}\right),$$ where $k_B$ is the Boltzmann constant and $n_{Qi} = \left(M_i k_B T/2\pi \hbar ^2 \right)^{3/2}$. Since nuclei have internal degrees of freedom, the contribution from excited states of nuclei to the free energy cannot be ignored at high temperatures. In the above formula, the effect is encapsulated in $g_{i}(T) $, which is approximated by @Fai1982 as $$\label{eq:ex}
g_{i}(T)=g_{i}^0 +\frac{c_1}{A_i^{5/3}}\int_0^\infty dE e^{-E/T}\exp\left(\sqrt{2 a(A_i) E}\right),$$ where $g_{i}^0$ denotes the contribution of the ground-state (the spin degrees of freedom and normally much smaller than $g_{i}(T)$) and is set to be $g_{i}^0=1$ for even nuclei and $g_{i}^0=3$ for odd ones in this paper for simplicity. Other coefficients in the contribution from the excited states are given as $a(A_i)=(A_i/8)(1-c_2 A_i^{-1/3})$MeV$^{-1}$, $c_1=0.2$MeV$^{-1}$ and $c_2=0.8$. In order to estimate the sensitivity of results to $g_{i}(T)$, we multiplied the original $g_{i}(T)$ rather arbitrarily by a factor of 0.5 or 2 at $Y_p=0.3$ and $T = 5$MeV and compared the results. We found small differences at $\rho \sim 10^{13}$g/cm$^3$. For example, the free energy is decreased or increased by 4% at most; the entropy changes -1% and +3% whereas the mass fraction of all nuclei varies -10% and +8% from the original values.
The last factor on the right hand side of Eq. (\[eq:tra\]) takes account of the excluded-volume effect: each nucleus can move in the space that is not occupied by other nuclei and free nucleons. The factor reduces the translational energy at high densities and is important to ensure the continuous transition to uniform nuclear matter as mentioned earlier. In reality, however, the nuclear translational energy is supposed to be suppressed by the formation of Coulomb lattice when the so-called plasma factor, which is defined as $\Gamma \equiv (\bar{Z} e)^2/(\bar{r} k_B T) $ with the average proton number $\bar{Z}$ and distance between nuclei $\bar{r}$, reaches a critical value $\sim 171 $ [@Slattery1980] and the introduced factor may be regarded as a very crude phenomenological approximation to this situation. The present form of the factor, $(1-n_B/n_s)=(V-V_{baryon})/V$, actually gives a linear suppression in terms of the occupied volume $V_{baryon}$. Here we always employ the nuclear saturation density for symmetric nuclei $n_s=\left[ n_{si}(Z_i/A_i,T) \right] _{Z_i/A_i=0.5}$ for numerical convenience, which will be justified, provided the approximation itself is very crude. Note also that the translational energy is a minor contribution except at low densities, where the factor is almost unity.
Minimization of Free Energy \[secmin\]
--------------------------------------
The abundances of nuclei as a function of $\rho_B$, $T$ and $Y_p$ are obtained by minimizing the model free energy derived so far with respect to the number densities of nuclei and nucleons under the constraints, $$\begin{aligned}
n_p+n_n+\sum_i{A_i n_i} & = & n_B=\rho_B/m_B, \nonumber \\
n_p+\sum_i{Z_i n_i} & = & n_e=Y_p n_B,
\label{eq:cons}\end{aligned}$$ just as in the ordinary NSE calculations. Note that $n_{p/n}$ is the number density of proton/neutron in the total volume $V$ of the system as defined in \[secnucleon\]. By introducing Lagrange multipliers, $\alpha$ and $\beta$, for these constraints, the minimization condition is given by $$\frac{\partial}{\partial {n_j}} \{f - \alpha(n_p+n_n+\sum_i{A_i n_i} - n_B ) - \beta(n_p+\sum_i{Z_i n_i}-n_e) \} =0,$$ where$f$ is the free energy density, $$\ f=\eta f_{p,n}^{RMF}(n'_p,n'_n)+\sum_i{n_i \{E_i^{t} + E_{i}^{B}(T,n_{s}, Z_i / A_i )+E_i^{S}(n'_n,n'_p)+
E_i^{C}(n'_p) \}},$$ and the index $j$ runs over all nuclear species and nucleons. Taking $j= p, \, n$, we find as usual that the Lagrange multipliers, $\alpha$ and $\beta$, are related to the chemical potentials of proton ($\mu_p = \partial f/ \partial n_p$) and neutron ($\mu_n = \partial f/ \partial n_n$) as $$\begin{aligned}
\alpha & = & \mu_n, \\
\beta & = & \mu_p -\mu_n.\end{aligned}$$ The differentiation with respect to the number densities of nuclei, on the other hand, gives the usual relations between the chemical potentials of nuclei $\mu _i$ and those of proton and neutron: $$\label{eq:mun}
\mu_i=Z_i \mu_p+(A_i-Z_i)\mu_n.$$
Differentiating the free energy for nuclei with respective to the number densities of nuclei, $n_i$, and employing Eq. (\[eq:mun\]), we can express $n_i$ as follows: $$n_i = g_i \, n_{Qi} \exp \left( \frac{Z_i \mu_p+(A_i -Z_i) \mu_n - M_i}{k_B T (1-n_B/n_s)} \right).
\label{eq:nio}$$ Note that the only difference from the counter part in the ordinary NSE calculations, $$n_i = g_i\, n_{Qi} \exp \left( \frac{Z_i \mu_p+(A_i -Z_i) \mu_n - M_i}{k_B T} \right),
\label{eq:nin}$$ seems to be the factor $(1-n_B/n_s)$ in the denominator in the exponential.
This is not true, however, and the calculations for our model are much more involved than for the ordinary NSE. In the latter case, all we have to do is to solve the two conservation equations, Eq. (\[eq:cons\]), for $\mu_p$ and $\mu_n$, since the number densities of all nuclei as well as nucleons are expressed by them alone (e.g. Eq. (\[eq:nin\])). In our case, on the other hand, the masses of nuclei, $M_i$, depend on the number densities of nucleons in the vapor, $n'_p$ and $n'_n$, which are in turn related with $\mu_p$ and $\mu_n$ as follows: $$\mu_{p/n} =\frac{\partial f}{ \partial n_{p/n}}= \mu'^{RMF}_{p/n}(n'_p,n'_n) + \sum_i n_i {\frac{\partial M_i(n'_p,n'_n)}{ \partial n_{p/n}}},
\label{eq:chem}$$ where $\mu'^{RMF}_{p/n}$ are the chemical potentials of nucleons in the vapor of volume $V'$, which are obtained from RMF (see section \[secnucleon\]), and the second term that is originated from the dependence of the mass of nuclei on the nucleon densities in the vapor and hence is summed over all nuclear species is the source of the complication in the solution. As a result, we have to solve not only the two conservation equations, Eq. (\[eq:cons\]), but also the relations between $\mu_{p/n}$ and $n'_{p/n}$, Eq. (\[eq:chem\]), for the four variables, $\mu_p$, $\mu_n$, $n'_p$ and $n'_n$, which then give the number density of nuclei, $n_i$, by Eq. (\[eq:nio\]).
Thermodynamical Quantities \[secth\]
------------------------------------
After minimization, we obtain the free energy density together with the abundance of various nuclei and free nucleons as a function of $\rho_B$, $T$ and $Y_p$. As mentioned repeatedly, the Coulomb-, surface- and translational-energy contributions to the free energy of nuclei are going to zero as the density increases and only the nuclear bulk-energy and free-nucleon contributions remain just prior to the transition to uniform nuclear matter. Since both of them are entirely based on RMF at this point, the free energy density obtained by the sum of them coincides with the one for uniform nuclear matter obtained by RMF. At low densities, on the other hand, the excluded-volume effect is negligible and the masses of nuclei agree with those of the experimental data. In addition, the RMF free energy for the vapor nucleons reduces to the one for the ideal Boltzmann gas of nucleons, since the interactions between nucleons become negligible. As a result, the free energy density obtained with the present formulation reproduces the well known free energy of the ideal gas composed of nucleons and nuclei, the masses of which are given by the experimental data.
Once the free energy is obtained, other physical quantities are derived by its partial differentiations. The baryonic pressure, for example, is obtained by the differentiation with respect to the baryonic density as follows: $$\begin{aligned}
p_B &=&n_B \left[\partial{f}/\partial {n_B}\right]_{T,Ye}-f \\
\label{eq:pr}
&=& p_{p,n}^{RMF}+ \sum_i ( p_i^{th} + p_i^{ex} + p_i^{bulk} + p_i^{surf} + p_i^{Coul} ),\end{aligned}$$ where $ p_{p,n}^{RMF}$ is the contribution from the nucleons in the vapor; $p_i^{bulk}$, $p_i^{surf}$ and $ p_i^{Coul} $ originate from the bulk, surface and Coulomb energies of nuclei in the free energy, respectively; both $p_i^{th} =n_i k_B T (1-n_B/n_s)$ and $p_i^{ex}=n_i k_B T(n_B/n_s) \left(\log (n_i/ n_{Qi}) -1 \right)$ come from the translational energy of nuclei in the free energy, with the former being the ordinary pressure of nuclei as a Boltzmann gas and the latter arising from the excluded-volume effect approximated by the factor $(1-n_B/n_s)$. They are minor at high densities. Note also that $p_i^{bulk}$ and $p_i^{surf}$ are normally negligible. The Coulomb-energy contribution, $ p_i^{Coul} $, is negative owing to the attractive electrostatic interactions among uniformly-distributed electrons and protons inside nuclei and is particularly important for $\rho_B \gtrsim 10^{11}$g/cm$^3$ and $Y_p \gtrsim 0.3$. If nucleus $i$ is in the ordinary droplet phase, it is given as $$\begin{aligned}
p_i^{Coul} &=& n_i n_B \frac{3}{5}\left(\frac{3}{4 \pi}\right)^{-1/3} \frac{e^2}{n_{si}^2}
\left(\frac{Z_i - n'_p V_i^N}{A_i}\right)^2 {V_i^N}^{5/3} \nonumber \\
&& \times \frac{1}{2} (- u_i^{1/3}+u_i) \frac{( \eta n_e -n'_p)(1-u_i)}{(n_e-n'_p) \eta n_B},\end{aligned}$$ whereas in the bubble phase it is expressed as $$\begin{aligned}
p_i^{Coul} &=& n_i n_B \frac{3}{5}\left(\frac{3}{4 \pi}\right)^{-1/3} \frac{e^2}{n_{si}^2}
\left(\frac{Z_i - n'_p V_i^N}{A_i}\right)^2 \nonumber \\
&& \times \{ {V_i^B}^{5/3} \frac{1}{2} (- u_i^{1/3}+u_i) \frac{( \eta n_e -n'_p)(1-u_i)}{(n_e-n'_p) \eta n_B} \nonumber \\
&&+ \frac{5}{3} {V_i^B}^{2/3} D(1-u) \frac{\partial V_i^B}{ \partial n_B} \}.\end{aligned}$$
The entropy per baryon is calculated from the following expression: $$\begin{aligned}
s& =& -\frac{\left[\partial{f}/\partial {T}\right]_{\rho_B,Ye}}{n_B} \\
&=&\eta s^{RMF}_{p,n} + \sum_i \frac{n_i k_B}{n_B} \Biggl[ \left\{ \frac{5}{2}- \log \left(\frac{n_i}{g_i(T) n_{Qi}} \right) \right\} (1-n_B/n_s) \nonumber \\
\label{eq:ent}
& & + (1-n_B/n_s) \, T \, g_i'/g_i - \partial{M_i}/\partial {T} \Biggl] ,\end{aligned}$$ where $g'_i(T)= \left[\partial{g_i(T)}/\partial {T} \right]_{\rho_B,Ye}$. The first term in Eq. (\[eq:ent\]) is the entropy of uniform nuclear matter and the second one is the entropy of nuclei as a Boltzmann gas with the excluded-volume effect, which is negligible at low densities. The third term accounts for the thermal excitations of nuclei with $(1-n_B/n_s) T g_i'/g_i $ being non-negligible at high temperatures as shown later. The last term is originated from the fact that the bulk energy of nuclei is temperature-dependent in our formulation and given as follows: $$\label{eq:ent2}
\frac{\partial{M_i}}{\partial {T}} = \frac{\partial{E_i^{B}}}{\partial {T}} = - A_i s_i^{RMF} (T,n_{si}, Z_i / A_i ).$$ The contribution of this term is normally negligible except near the nuclear saturation density.
The free energy thus obtained is continuous at any density but not smooth at the saturation density. In fact, the pressure, or the density-derivative of the free energy, is not continuous at the saturation density. This is most easily understood from Eq. (\[eq:pr\]). The contribution from the excluded volume effect in the translational energy, $p_i^{ex}$, in the equation does not vanish at the saturation density. The continuity of pressure would have been obtained if we had employed a suppression factor (the last term on the right hand side of Eq. (\[eq:tra\])) with a higher power. We do not think this is necessary, however, since the discontinuity is practically negligible compared with the dominant electron pressure in core-collapse simulations. The derivatives of free energy with respect to $T$ and $Y_p$ are continuous at any density as observed in Eq. (\[eq:ent\]) for entropy.
Results
=======
We show the main features of our EOS for selected combinations of densities ($\rho_B > 10^6$g/cm$^{3}$), temperatures ($T=1, 5, 10$MeV) and proton fractions ($Y_p = 0.1, 0.3, 0.5$), emphasizing in particular the differences from the H. Shen’s [@Shen1998] and Hempel’s [@Hempel2010] EOS’s. The matter compositions are given first. It is also demonstrated that the transition to uniform nuclear matter in our EOS occurs in the conventional way, that is, either by coalescence of nuclei or by the increase in the density of nucleon vapors. Then we turn to the thermodynamical quantities such as free energy, pressure and entropy.
Compositions \[secrecmp\]
-------------------------
The mass fractions of nuclei are shown in the $(N, Z)$ plane with $N$ being the neutron number for $\rho_B = 10^{11}$g/cm$^3$, $T=1$MeV and $Y_p=0.3$ in Fig. \[dis11\]. It is clear that nuclei are abundant in the vicinities of the neutron magic numbers ($N = 28 $, 50 and 80). In fact, the abundance peak arises around $(N, Z)\sim(50,30)$ in our EOS in this case. For the same density, temperature and $Y_p$, on the other hand, the H. Shen’s EOS predicts that the representative nucleus has $(N, Z)=(57.2, 33.2)$. The difference originates mainly from the fact that the H. Shen’s EOS does not include the shell effect in their Thomas-Fermi approximation. At higher densities, heavier nuclei become abundant, which is evident in Fig. \[dis13\] that shows the mass fractions of nuclei for $\rho_B = 10^{13.5}$g/cm$^3$, $T=1$MeV and $Y_p=0.3$. It should be noted that nuclei with $Z \gtrsim 100$ are quite abundant and, in fact, are dominant in this case. Hence the neglect of these nuclei in @Hempel2010 cannot be justified at these high densities. It should be also mentioned that the nuclear distribution is much smoother in this case than that for the lower density. This is because the shell effect is reduced in our EOS at high densities, where the nuclear bulk energy is interpolated from the one derived experimentally and the one obtained theoretically for uniform nuclear matter, with the latter being dominant at this high density. The H. Shen’s EOS predicts that the most abundant nucleus is the one with $(N, Z)=(203.8, 89.4)$, which is still different from the prediction of our EOS, $(N, Z)=(243,110)$. These differences may have an important ramification for the electron capture in the collapsing core [@Hix2003]. In order to expedite comparison with the existing EOS’s with SNA, we show in Fig. \[cmp1\] the mass fractions of light ($Z_i\leq 5$) and heavy ($Z_i\geq 6$) nuclei together with free nucleons in the vapor for $T=1$MeV. Irrespective of the values of $Y_p$ selected here ($Y_p=0.5, 0.3, 0.1$), the free nucleons dominate other constituents up to $\rho_B \sim 10^{7}$g/cm$^3$ at this temperature. At larger densities ($10^7$g/cm$^3 \lesssim \rho_B \lesssim 10^{10}$g/cm$^3$), some of free nucleons are taken into symmetric light nuclei such as deuterons and alpha particles. For densities larger than $\rho_B \sim 10^{10}$g/cm$^3$, light nuclei disappear and heavy nuclei are populated dominantly. Near the nuclear saturation density, the matter is mostly made of nuclei in the bubble or uniform states. In the case of $Y_p=0.5$, the free protons coexist with symmetric light nuclei and neutron-rich heavy nuclei at $\rho_B \sim 10^{10}$g/cm$^3$ and only symmetric heavy nuclei survive at larger densities. For $Y_p=0.3, 0.1$, on the other hand, most of free protons are contained in nuclei and free neutrons coexist with heavy nuclei. In the case of $Y_p=0.1$, in particular, there is a density regime near the nuclear saturation density, where very neutron-rich light nuclei such as the one with $(Z, A) = (1, 10)$ exist in the pasta or uniform states as we mention later again. Fig. \[cmp5\] shows the matter compositions at a bit higher temperature, $T=5$MeV. It is evident for all the three values of $Y_p$ that free nucleons are dominant up to higher densities, $\rho_B \sim 10^{12}$g/cm$^3$. It is mentioned incidentally that the mass fractions of light nuclei in our EOS are larger in general than those of alpha particles in the H. Shen’s EOS. This is partly because the H. Shen’s EOS has only alpha particles as light nuclei whereas ours takes into account other nuclei such as deuterons. The difference somewhat affects the thermodynamical properties. For example, the entropy per baryon in our EOS is larger than that in the H. Shen’s EOS at $\rho_B \sim 10^{12}$g/cm$^3$ and $T \gtrsim 5$MeV owing to larger degrees of freedom in the light nuclei in the former as shown in \[secreth\].
The average mass number, $\bar{A}$, of heavy ($Z_i\geq 6$) nuclei is displayed in Fig. \[ma1\]. For comparison, not only our own results but those of Hempel’s and the mass number of the representative nuclei, $A_{rep}$, for the H. Shen’s EOS are also shown. It is found that for $T=1$MeV (the left column of the figure), the former two give the average mass numbers that are systematically smaller than the H. Shen’s EOS at $\rho_B \lesssim 10^{12}$g/cm$^3$, around which the supernova core becomes optically thick and neutrinos are trapped and equilibrated thermally and chemically with the matter. It is also clear that the average mass number grows step-wise for our and Hempel’s EOS’s whereas it is monotonic for the H. Shen’s EOS. This is simply due to the shell effect: nuclei are abundant in the vicinity of the neutron magic numbers ($N=28, 50, 80$). At higher densities, $\rho_B \gtrsim 10^{12}$g/cm$^3$, the effect is suppressed in our EOS, as mentioned already, because the nuclear bulk energy is interpolated from the experimentally derived value and the one obtained theoretically by RMF, which does not include the shell effect. Note also that at these densities there appear very heavy and/or neutron-rich nuclei, for which no experimental mass data are available and we employ RMF for the estimation of their bulk energies (see section \[subsecb\]). Heavy nuclei continue to grow up until the nuclear saturation density in our EOS, whereas the growth stops at some density and nuclei disappear before the saturation density in the Hempel’s EOS (see the insets of the figure), which is at odds with the conventional idea. This point will be mentioned shortly again.
The discernible difference between our results and the Hempel’s at $\rho_B \sim 10^{12}$g/cm$^3$ for $Y_p=0.1, 0.3$ is attributed to the difference in the masses of neutron-rich nuclei, which we calculate by RMF whereas @Hempel2010 obtained from the mass table by @Geng2005. The dip in the mass number at $\rho_B \sim 10^{13} \rm{g/cm^3}$ for $Y_p=0.1$ in our EOS is artificial, being produced by the neglect of the shell effect in our mass formula. As nuclei become very neutron-rich, there happens a rather rapid shift of abundant nuclei from those with experimental data to those without, resulting in the observed change of the mass number. The mass number does not increase until higher densities are reached. As shown in the right column of Fig. \[ma1\] for $T=5$MeV, for example, the mass number starts to increase at $\sim 10^{13}$g/cm$^3$. This is because the increase of entropy by the translational degrees of freedom of free nucleons is effective to minimize the free energy at this high temperature, whereas the decrease of internal energy by the binding energy of nuclei is more advantageous at lower temperatures. Another interesting feature at this temperature is the decrease of the mass number near the nuclear saturation density for $Y_p=0.3, 0.5$ even in our EOS. There are two reasons for this: one is the formation of bubble nuclei and the reduction of surface energy as a result; the other reason is that the less heavy nuclei become, the greater entropy they have thanks to their larger translational degrees of freedom and they lower the free energy. It should be noted that unlike in the Hempel’s EOS, nuclei are not dissociated completely in our EOS.
The rate of coherent scatterings of neutrinos on nuclei is proportional not to the mass number of nuclei but to its square as long as the wave length of neutrino is much larger than the nuclear size [@Burrows2003]. As mentioned already, in SNA the rate is evaluated by the mass number squared for the representative nucleus, the validity of which needs confirmation. In the top panels of Fig. \[aadis\] we compare the average mass number squared, $\overline{A^2 }$, with the square of the average mass number, $\bar{A}^2$, and the mass number squared of the representative nuclei in the H. Shen’s EOS. In the middle and bottom panels, the standard deviations, $\sigma_A=\sqrt{\overline{A^2}-\bar{A}^2}$, and the dispersion normalized by the average mass number squared, $\sigma_A^2/\overline{A^2 }$, are also shown. It is intriguing to find that the average mass number squared is almost indistinguishable from the square of the average mass number. The reason for this small dispersion is that heavy nuclei are rather concentrated in the vicinities of the neutron magic numbers. In this sense, SNA is not so bad an approximation in evaluating the rate of coherent scatterings of neutrinos on nuclei. It should be noted, however, that the mass numbers of the representative nuclei in the H. Shen’s EOS are systematically larger than the average mass numbers obtained in our EOS. Incidentally, at very high densities ($\rho_B \gtrsim 10^{14}$g/cm$^3$), most of nuclei are in the pasta phase. We demonstrate here that the transition to uniform nuclear matter occurs in one of the following two ways depending on the proton fraction of the entire system, $Y_p$. The first case corresponds to relatively large proton fractions, $Y_p \gtrsim 0.3$. At $\rho_B \gtrsim 10^{13}$g/cm$^3$, most of the nuclei in abundance have a similar proton fraction $Z_i/A_i$, which is close to $Y_p$ as shown in Fig. \[dis13\]. As the density rises up to the nuclear saturation density, their W-S cells get smaller and these abundant nuclei enter the pasta phase almost simultaneously. In the bubble phase, the volumes occupied by the nuclei in their W-S cells become larger and finally the nuclei coalesce with each other. The sequence is schematically illustrated for the nucleus with $(Z, A)=(6,20)$ in Fig. \[pc1\]. Note that the density in the vapor, or the bubble, remains lower than that in the nuclei up to the saturation density in this case.
The second case occurs for more neutron-rich systems, $Y_p \lesssim 0.3$. The proton fractions, $Z_i/A_i$, of nuclei having large mass fractions are not necessarily close to $Y_p$ of the entire system and take various values at $\rho_B \gtrsim 10^{13}$g/cm$^3$. This is due to the fact that more symmetric nuclei have greater binding energies. Hence the nuclei are less neutron-rich than the vapor in general. As a result of this diversity of the proton fractions of the nuclei in abundance, these nuclei reach the pasta phase at different densities. Put another way, nuclei of different shapes coexist with substantial mass fractions at a particular density above $\rho_B \sim 10^{13}$g/cm$^3$. For example, at $Y_p=0.1$, $\rho_B = 10^{13.9}$g/cm$^3$ and $T=1$MeV, a very heavy nucleus with $(Z, A) = (48, 228)$ still remains in the normal phase whereas a very neutron-rich light nucleus with $(Z, A) = (1, 10)$ as well as a neutron-rich, slightly heavy nucleus with $(Z, A)=(6,49)$ are already in the bubble phase. This light nucleus becomes uniform in the W-S cell already at $\rho_B = 10^{14.1}$g/cm$^3$ whereas the others are still non-uniform. This actually corresponds to the formation of a big nucleus with no bubbles inside, which coexists with other bubble nuclei. As the density increases further beyond the nuclear saturation density up to the point, where the entire system becomes uniform, the density of this big nucleus also increases, which we referred to as overcompression in section \[secnuclei\]. The reason for the occurrence of such overcompression is that the binding energies of nuclei that are less neutron-rich than the whole system are greater in general and the non-uniform matter is energetically favored still at the nuclear saturation density for the whole system. As shown in Fig. \[pc2\], the transition to uniform nuclear matter for the very neutron-rich light nuclei occurs by coalescence with each other just as in the first case mentioned above. On the other hand, the transition for the nuclei with $(Z, A) = (6, 49)$ proceeds not by coalescence but by the increase in the density of the vapor. Although it is not shown in the figure, it is interesting that the very heavy nucleus with $(Z, A) = (48, 228)$ does not reach the bubble phase and is in the intermediate pasta phase just prior to the transition to uniform nuclear matter.
Thermodynamical Quantities \[secreth\]
--------------------------------------
Once the minimization is completed, the baryonic contribution to the free energy, to which our discussions are limited in this paper, is obtained as a function of $\rho_B, T, Y_p$. All the thermodynamical quantities are then derived from it through thermodynamical relations. It turns out that most of them are not very different from the ones in the Shen’s and Hempel’s EOS’s: for the temperatures, $T=1, 5, 10$MeV considered in this paper, the three EOS’s are essentially identical at low densities, $\rho_B \lesssim 10^{8}$g/cm$^3$, since the matter is simply composed of free nucleons as an ideal Boltzmann gas in all the EOS’s. At higher densities, $10^{8} \lesssim \rho_B \lesssim 10^{13}$g/cm$^3$, a small difference appears, since some of the free nucleons are taken into nuclei, the treatment of which is different among the EOS’s. At still greater densities, $\rho_B \gtrsim 10^{13}$g/cm$^3$, the difference is more apparent. In the following we will look at the behavior more in detail.
Fig. \[fr\] shows the free energies per baryon as a function of density for the three combinations of temperature and proton fraction: ($T=1$MeV, $Y_p=0.5$), ($T=5$MeV, $Y_p=0.3$), ($T=10$MeV, $Y_p=0.1$). In all the cases, the free energies are close to one another among the three EOS’s. Note that our EOS coincides with the H. Shen’s EOS at the highest density as it should do. This is also true of the Hempel’s EOS although how uniform nuclear matter is reached is different between the two EOS’s as described in the previous section. Looking more closely, we find for $T=1$MeV and $Y_p=0.5$ that the Hempel’s free energy is larger than those of our and H. Shen’s EOS’s at $\rho_B \sim 10^{14} \rm{g/cm^3}$ and the hump is followed by a steep decline. The difference originates from the fact that the Hempel’s EOS includes only nuclei with $Z \lesssim 100$ and that unlike our treatment only the Coulomb energy is manipulated by using the W-S cell to account for the existence of other nuclei. Their prescription lead to the total dissociation of heavy nuclei to free nucleons before reaching the nuclear saturation density. The difference between our EOS and the H. Shen’s EOS, on the other hand, comes from the fact that the latter includes only single representative heavy nuclei. In the case of $T=5$MeV and $Y_p=0.3$, our and Hempel’s free energies are smaller than that of H. Shen’s EOS at $10^{12} \lesssim \rho_B \lesssim 10^{13}$g/cm$^3$. Under this condition light nuclei (deuterons in particular) are abundant as shown in Fig. \[cmp5\]. The H. Shen’s EOS takes into account alpha particles alone as light nuclei. The greater degrees of freedom in the light nuclei in our EOS, especially the substantial population of deuteron, make the difference observed. The deviation of Hempel’s free energy from ours at $\rho_B \gtrsim 10^{13}$g/cm$^3$ occurs for the same reason as in the case of $T=1$MeV and $Y_p=0.5$. For $T=10$MeV and $Y_p=0.1$ our free energy is smaller than those of the other two EOS’s at $\rho_B \gtrsim 10^{13}$g/cm$^3$. The reason is that the existence of pasta phase is taken into account in our EOS. In fact, under this condition our EOS predicts the co-existence of various neutron-rich nuclei in the pasta phase or in the uniform phase that corresponds to a big nucleus with no bubbles inside, and free neutrons (see section\[secrecmp\] and Fig. \[pc2\]). This is in sharp contrast to the matter composed of normal nuclei and free neutrons considered in the other two EOS’s.
The pressure is shown as a function of density for three combinations of temperature and proton fraction in Fig. \[pr\]. The three EOS’s agree with one another at low densities, $\rho_B \lesssim 10^{12}$g/cm$^3$. The difference appears, however, in the density regime where the pressure becomes negative for the H. Shen’s and Hempel’s EOS’s. The baryonic pressure can be negative when the Coulomb-energy contribution, which is negative owing to the attractive nature of the Coulomb interactions, dominates over the other positive contributions. Note that the positive leptonic pressure is much larger than the baryonic one normally and the total pressure never becomes negative. For $T=5$MeV and $Y_p = 0.3$, our EOS gives positive pressures at $\rho_B \sim 10^{14}$g/cm$^3$, where the other EOS’s predict negative values. This is due to the existence of the pasta phase, which our EOS takes into account but the others do not. In fact, the absolute values of the Coulomb-energy contribution are reduced when the change of the charge distribution in the W-S cell is considered in the pasta phase. As a result the pressure in our EOS remains positive. It is also noted that the contribution from the excluded-volume effect, $\sum_i {p_i^{ex}}$, gives a non-negligible positive contribution to the pressure. At the lower temperature, $T=1$MeV, even our EOS gives negative baryonic pressures and the main difference from the other EOS’s lies in the lowest value, $\rho_B \sim 10^{12}$g/cm$^3$, of the densities that give negative pressures. It is found that our EOS predicts a slightly higher density than the others. This is because our EOS gives larger mass fractions of free neutrons, which give a positive contribution to the pressure. The difference from the H. Shen’s EOS is a consequence of the shell effect, which is naturally included in the experimental mass data but ignored in the Thomas-Fermi approximation adopted in the H. Shen’s EOS. The difference from the Hempel’s result, on the other hand, comes from the difference in the theoretical estimate of the masses of neutron-rich nuclei with no experimental data. In the case of $T=10$MeV and $Y_p = 0.5$, our and Hempel’s pressures are larger than that of H. Shen’s EOS at $\rho_B \gtrsim 10^{13.5}$g/cm$^3$. This is because the H. Shen’s EOS neglects the contribution from the translational motions of nuclei, which is not negligible at this high temperature. It is also noted that at high densities, $\rho_B \sim 10^{13}$g/cm$^3$, the contribution from the excluded-volume effect is not negligible, either, the treatment of which is different between our and Hempel’s EOS’s (see section \[subsect\]).
The entropy per baryon is displayed as a function of density for three combinations of temperature and proton fraction in Fig \[en\]. For high temperatures, $T=5, 10$MeV, our results are larger than those of H. Shen’s EOS at $\rho_B \sim 10^{12}$g/cm$^3$ owing to larger population of light nuclei such as deuteron as well as the inclusion of the entropy from excited states of nuclei, $g_i(T)$ in Eq. (\[eq:ex\]). The difference at $\rho_B \sim 10^{13}$g/cm$^3$ is originated from the existence of heavier nuclei in our EOS than in the others. Thanks to the larger degrees of freedom, the entropy is actually larger in our EOS. At lower temperatures, $T=1$MeV, the entropy per baryon in our EOS is almost equal to those in the other EOS’s.
Summary and Discussions
=======================
We have calculated the baryonic equation of state at sub-nuclear densities, which is meant for the use in core-collapse simulations and provides the abundance of various nuclei up to the atomic number of $\sim 1000$. The formulation is based on the mass formula and the model free energy is constructed so that it could reproduce the ordinary NSE results at low densities and make a continuous transition to the EOS for supra-nuclear densities, for which we have adopted the H. Shen’s EOS in this paper. The experimental mass data have been used, whenever available, to obtain the bulk energy of nuclei. For very heavy and/or very neutron-rich nuclei with no experimental mass data available, we have utilized for the evaluation of the bulk energy the theory used in the EOS for supra-nuclear densities, that is, RMF in this paper. At high densities, where the nuclear structure is affected by the presence of other nuclei, nucleons and electrons, we have approximated the bulk energy of nuclei by interpolation of the value obtained experimentally and the one derived theoretically. Assuming the charge neutrality in the W-S cell, we have calculated the Coulomb energy of nuclei. Close to the nuclear saturation density, the existence of the pasta phase has been taken into account in calculating the surface and Coulomb energies. The free energy of the nucleon vapor outside nuclei is calculated by RMF. These prescriptions not only ensure the continuous transition to the EOS for supra-nuclear densities when the matter becomes uniform but also has remedied the peculiar behavior of the EOS by @Hempel2010, in which all nuclei are dissociated completely to nucleons before reaching the nuclear saturation density. In our EOS, the transition to uniform nuclear matter proceeds either via the coalescence of nuclei or the rise of the density in the nucleon vapor, depending on the proton fraction.
For some representative combinations of density, temperature and proton fraction, we have made a comparison of the abundance of nuclei as well as thermodynamical quantities obtained in this paper with those provided by the H. Shen’s and Hempel’s EOS’s. It is found that the thermodynamical quantities such as the free energy, pressure and entropy per baryon, agree well among these EOS’s. The matter compositions show noticeable differences, however. The average mass numbers, for example, are systematically smaller at $\rho_B \lesssim 10^{12} $g/cm$^3$ in our EOS than the mass numbers of the representative nuclei in the H. Shen’s EOS. The difference is ascribed to the neglect of the shell effect in the latter EOS. We have also demonstrated that very heavy nuclei with $Z \gtrsim 100$, which were completely ignored in the Hempel’s EOS, are indeed abundant at $\rho_B \gtrsim 10^{13}$g/cm$^3$ and lead to the difference in the entropy per baryon between the two EOS’s. It is interesting that the mass fractions of light nuclei such as deuteron cannot be ignored at high temperatures and, in fact, are larger than that of alpha particles in the H. Shen’s EOS. The average of mass number squared is important for the evaluation of the coherent scattering rate and has been frequently approximated by the mass number squared of the representative nuclei in supernova simulations that employ an EOS with SNA. We have shown that the root mean square of mass number is very close to the average mass number owing to the shell effect and SNA is justified in this sense. It should be noted again, however, that the average masses in our EOS are systematically different from the masses of the representative nuclei in the H. Shen’s EOS and the coherent scattering rate will be reduced in core collapse simulations with our EOS.
Although we have not made a direct comparison, it is interesting to make some comments on other EOS’s. As mentioned in Introduction, the Lattimer & Swesty’s EOS [@Lattimer1991], which is based on the compressible liquid drop model with SNA and a free energy per baryon with the Skyrme-type parametrization, is another EOS that is commonly employed in core collapse simulations. Very recently, @Shen2011 published a new EOS for use in astrophysical simulations, which employs different theories, the Virial expansion at low densities and SNA with the Hartree approximation at high densities. It is noted first that since these two EOS’s behave quite similarly to the H. Shen’s EOS, the results obtained for the latter in this paper will be mostly applicable to the former two. For example, thermodynamic quantities are not very different although the entropy in our EOS tends to be a bit higher than those in others because of the inclusion of various light nuclei in our EOS. On the other hand, the step-wise growth of average mass number at low densities is common only to our and G. Shen’s EOS, since the latter also employs experimental mass data. At high densities, the Lattimer & Swesty’s and G. Shen’s EOS’s employ SNA just as the H. Shen’s EOS. Not including bubble nuclei, the H. Shen’s and G. Shen’s EOS’s predict very big droplet nuclei where the Lattimer & Swesty’s and our EOS give bubble nuclei. It is interesting, however, to mention incidentally that @Shen2011 also found a shell-like hollow nuclei, which others did not.
There is an ample room for improvement in our EOS. The interpolation of the bulk energy and the treatment of the pasta phase are entirely phenomenological and need justification or sophistication somehow. Our results show that the shell effect is important for the abundance of nuclei. In the present prescription, however, the effect is suppressed maybe too strongly at high densities. We are planning to adopt an empirical formula for this effect from the literature. With these caveats in mind we are currently constructing an EOS table, which will be available for supernova simulations and put in public domain. In so doing, electron capture rates, which are consistent with the abundance given by the EOS, should be also included. In our formulation, it is quite simple to change the EOS for supra-nuclear densities. In fact, all we need is the free energy density of uniform nuclear matter predicted by the particular EOS. The combination with another EOS is under progress at present. Different RMF parametrizations will be also discussed in our forthcoming paper.
The authors gratefully acknowledge the contribution of A. Ohnishi and C. Ishizuka to the core idea. We would like to thank M. Takano for useful information on the mass formula. S.F. is grateful to K. Nakazato and N. Yasutake for their useful comments. This work was partially supported by Grant-in-Aid for Scientific Research of the Ministry of Education, Culture, Sports, Science and Technology (19104006, 21540281, 22540296) and Scientific Research on innovative Areas (20105004, 20105005)
Akmal, A., Pandharipande, V. R. & Ravenhall, D. G. 1998 Phys. Rev. C 58,1804 Audi, G., Wapstra, A.H. & Thibault, C. 2003, Nucl. Phys.. A 729, 337 Bethe, H. A. 1990, Rev. Mod. Phys., 62, 801 Blinnikov, S. I., Panov, I. V., Rudzsky, M. A. and Sumiyoshi, K. arXiv: 0904.3849 \[astro-ph\]. Burrows, A. and Lattimer,J. M. 1984 Astrophys. J. 285, 294 Fai,G. & Randrup, J. 1982, Nucl. Phys. A 381, 557 Gandolfi, s., Illarionov, A. Yu., Fantoni, S., Miller, J. C., Pederiva, F. & Schmidt, K. E. 2010 Mon. Not. R. Astron. Soc. 404, 35, 39 Geng,L.,Toki, H. & Meng, J. Prog. 2005 Theor. Phys. 113, 785 Janka, H.-T., Langanke, K., Marek, A., Martinez-Pinedo, G., & Muller, B. 2007, Phys. Rep.,442, 38 Hashimoto, M., Seki, H. and Yamada, M. 1984 Prog. Theor. Phys. 71, 320 Hebeler, K. & Schwenk, A. 2010 Phys. Rev. C 82, 014314 Hempel, M. & Schaffner-Bielich, J. 2010 Nucl. Phys. A 837, 210 Hix, W. R., Messer, O. E. B., Mezzacappa, A., Liebend?rfer, M., Sampaio, J., Langanke, K., Dean, D. J., & Mart?nez-Pinedo, G. 2003, Phys. Rev. Lett., 91, 201102 Langanke, K. & Martinez-Pinedo, G. 2003, Rev. Mod. Phys., 75, 819 Nakazato, K., Oyamatsu, K. & Yamada, S., Phys.Rev.Lett.,103, 132501 Lattimer, J. M. & Swesty, F. D. 1991, Nucl. Phys., A535, 331 Ravenhall,D. G., Pethick,C. J. & Wilson, J. R. 1983 Phys. Rev. Lett. 50, 2066 Shen, H., Toki, H., Oyamatsu, K. & Sumiyoshi, K. 1998a, Nucl. Phys., A637, 435 Shen, H., Toki, H., Oyamatsu, K. & Sumiyoshi, K. 1998b, Prog. Theor. Phys., 100, 1013 Shen G., Horowitz C. J. & Teige S., 2011, Phys. Rev. C, 83, 035802 Slattery, W.L., Doolen, G.D. & DeWitt, H.E. 1980, Phys. Rev., A21, 2087 Steiner, A. W., Prakash, M. & Lattimer, J. M. 2005 Phys. Rev., 411, 325 Sugahara,Y. and Toki, H. 1994 Nucl. Phys. A579, 557 Sumiyoshi, K., Toki, H. & Oyamatsu, K. 1995 Nucl. Phys. A595, 327 Toki, H., Hirata, D., Sugahara, Y., Sumiyoshi, K. & Tanihara, I. 1995 Nucl. Phys. A588, 357 Thompson, T. A., Burrows, A. & Pinto, P. A. 2003, Astrophys. J. 592, 434 Vautherin D. [*supernova*]{} Bludman S A, Mochkovith, R. and Zinn-Justin, J. (eds) 354, 91 Watanabe, G., Maruyama, T., Sato, K., Yasuoka, K. & Ebisuzaki, T. 2005Phys. Rev. Lett. 94, 031101
[c]{}
[c]{}
[c]{}\
\
\
[c]{}\
\
\
[ll]{}\
\
\
[ll]{}\
\
\
[ll]{}\
\
\
[ll]{}\
\
\
[c]{}\
\
\
[c]{}\
\
\
[c]{}\
\
\
| 2024-01-10T01:27:13.970301 | https://example.com/article/5955 |
Removing Background of Images
1) read each polygon and load its corresponding image from the Perl-generated text file of polygon coordinates.
2) cycle through each set of polygon coordinates to find the largest and smallest pair of (x,y). Use these values to specify a bounding-box for each soda can.
3) Using the bounding box from (2), crop out the image within this bounding box (should be a single soda can).
4) Translate all polygon coordinates by subtracting the smaller bounding box coordinate from each (so they are with respect to (0,0) rather than the smaller bounding-box coordinate. This is because a new image was created with the bounding box region.)
5) For each pixel in the subimage, check if it is within the bounding polygon. If not, then set that pixel value to 1.0, which is white. To determine if a pixel is within the polygon, the polygon is translated to a new coordinate system where the pixel in question is at the origin. The edges of the polygon are then checked to see if they intersect the x-axis. If the number of intersections is odd, then the pixel is inside the polygon. If the number of intersections is even, then the pixel is not inside the polygon. More details on this algorithm can be found at the aforementioned website. | 2024-02-02T01:27:13.970301 | https://example.com/article/1263 |
Oral lipoma: report of three cases.
Oral lipomas are benign lesions that are seen infrequently in the dental practice. This article details the clinical and histopathologic findings of three cases of intraoral lipomas. All of the lesions exhibited a yellow color. Two of the tumors were located on the buccal mucosa, while the other mass arose on the mandibular buccal/labial vestibule, was considerably larger in size, produced extraoral swelling, and necessitated a preoperative MRI due to close approximation to the mental nerve. None of the patients elicited any history of attendant symptomatology. Excisional biopsies in each case revealed well-circumscribed masses surrounded by a thin fibrous capsule and composed of sheets of mature adipocytes arranged in a "chicken wire" configuration. The tumor adipocytes were similar to normal adult fat cells and contained a small, uniformly eccentric nucleus with a single, clear cytoplasmic vacuole. Surgical excision is the modality of treatment and malignant transformation or recurrence is rare. | 2023-10-06T01:27:13.970301 | https://example.com/article/4178 |
Synthesis and biological activity of new arenediyne-linked isoxazolidines.
Arenediyne-isoxazolidine conjugates have been synthesized as a new scaffold for the development of bioactive mimics. Some of the synthesized compounds are endowed with antiproliferative activity against three human cancer cell lines. Their thermal reactivity suggests that the biological activity probably could not be linked to the Bergman cyclization. | 2023-12-28T01:27:13.970301 | https://example.com/article/7514 |
// SPDX-License-Identifier: MIT OR Apache-2.0
//
// Copyright (c) 2018-2020 Andre Richter <andre.o.richter@gmail.com>
//! BSP Memory Management.
//--------------------------------------------------------------------------------------------------
// Public Definitions
//--------------------------------------------------------------------------------------------------
/// The early boot core's stack address.
pub const BOOT_CORE_STACK_START: usize = 0x80_000;
| 2023-12-06T01:27:13.970301 | https://example.com/article/4908 |
16 Feb 2014, 14:21
Redesigning an ALPS board by Paranoid.
v0.1
Spoiler:
v0.2
v1.0
Spoiler:
Spoiler:
Since discovering mechanical keyboards a few of my first boards were ALPS. The first encounter with ALPS was pretty interesting. I typed on a few black ALPS boards, some typed better than others. I also tried White ALPS from a Nan-Tan, Cream ALPS from a AT102 and unexpectedly found a board with Blue ALPS. I must say, they really do type nicely.Now, the form factor of the Dell boards was another thing. In my opinion, it's not the best looking older board. So I toyed with the idea of making a case for it. After seeing a lot of DIY projects I decided to try it myself.In the summer, about a year ago, I figured why not cut a frame out myself. Well, that's what I did but the result wasn't all that satisfying.So when reaching this result I found a fab-lab nearby where I'd have access to a laser cutter for free. Finding time besides work to do this was not so easy and it's on a first come first serve basis, but eventually I got there.I measured the cut-outs of the Dell and made my 2D drawings based on that. For everything to fit in the case a few modifications were necessary, like cutting the steel plate because it's too big and standing up edges which needed to disappear.Since this was my prototype in MDF I painted the plate white since that's a pretty clean match. For switches I used Matias Tactile switches which I ordered from 7bit. The caps are a mix of caps from a Tulip (DS caps), Dell AT102W and AT102 (presumably dye-subs).As you might notice I use BE AZERTY. Finding good boards in this layout is not so easy but I managed to get it on all of my boards so far.I was possitively surprised with the result. Unfortunately the measurements were not perfect and needed some fine-tuning. The way the case would be held together and how the pcb/plate would be fixated still needed to be properly defined.A while had passed since v0.1 but many weeks later I decided to just go for it and try to finish the design during one weekend. So, that's what I did.Cutting the plates was a success and it fitted nearly perfect straight away. After this there some manual work was still required like countersinking the holes and aligning the pcb onto the bottom plate.I also wanted a detachable cable since I didn't want to hack and slash the original cable so I put in a mini-usb breakout board.To finish it off I made a custom cable which matches the custom keycap I made a while back and I also put in some 3mm red LEDs. You might have noticed that I laser etched the ALPS logo togheter with a switch on there as wellAs far as the typing goes I wasn't quite convinced at first with the Matias switches, but this was when the board was completely flat on the table. Placing the feet under there has made a world of difference and it types way smoother. There is still quite some unavoidable wobble though.Overall I'm happy with the result. Maybe some things could have gone easier and really small details could have been better but this was enough to start making the awesome final version of this.Making the final version: I wanted to go all out on this one!First thing I had to do was finding another Dell and de-soldering everything. Second step is cutting the plate with precision and finishing it with some filing and sanding. I wanted the plate to look nice and be protected at the same time so I spray painted it with decent black paint.To top it of I used a carbon vinyl on the top. Cutting out the holes took some time but it was worth it, it looks stunning! It might be a little over the top for some people but you can't really see it that much when it's put together. It's a nice little detail when you're looking closely at the board.I had already cut the case but this time in PMMA (plexi). The top and bottom layers are in black and the middle layers are transparent. The top features some cut-outs for the LEDs.For switches I used Blue ALPS combined with Matias Clicky ALPS to complete the board. The keycaps come from a hard to find Toshiba T5200 and a black DellAT102W for the modifiers. About four black keys are not correct but it's the best I can do for now.Since this is the all out version I put in a Teensy so I can program the board with TMK software. And it wouldn't be complete if I didn't include a matching custom cable.I'm still waiting on my black screws for the case but these will do for now.What could've gone better? Well, the logo cut-outs were pretty difficult because the laser couldn't get that detailed so I had to test this a few times. I found out the hard way that the transparent plexi is much more fragile than the black one so a few adjustments should be made here. And like a said, maybe the cut-outs could be a tiny bit improved to make it even everywhere. But I noticed this isn't even perfect in expensive custom cases.So that's it. I hoped you enjoyed this redesign! | 2024-06-29T01:27:13.970301 | https://example.com/article/9811 |
[Are angle-fixed implants with elastic properties advantageous for the internal fixation of proximal humerus fractures?].
There is a recent interest for the use of angle-fixed plates in the management of proximal humerus fractures. Rigid implants might be associated with an increased risk of cutting-out. In order to analyse the potential beneficial effects of the implant elasticity on fracture fixation, the biomechanical properties of a rigid and an elastic angle-fixed plating system were assessed in an experimental study. An unstable fracture of the surgical neck was created in 8 pairs of human humeri. Specimens were subjected to axial loading and torque. Stiffness, subsidence and load to failure were assessed. The implant with elastic properties was characterized by a lower torsional stiffness and a higher subsidence during axial loading and torque. This implant failed at lower loads than the rigid implant did. Elastic implant properties of angle-fixed plates have shown not to be advantageous for the management of fractures of the proximal humerus. | 2023-10-17T01:27:13.970301 | https://example.com/article/6167 |
(defn f [x]
(for [_ (maybe 3)]
(inc x)))
(defn g [x]
(for [y (f x)]
(do
(assert (instance? Integer y))
y)))
(defn h [x]
(for [_ (maybe 3)]
(symbol x)))
(defn i [x]
(for [y (h x)]
i))
(defn j [x]
(for [y (g x)
_ (i y)]
x))
(main [_]
(print-err (j 8)))
| 2024-02-10T01:27:13.970301 | https://example.com/article/1669 |
<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN"
"http://www.w3.org/TR/REC-html40/loose.dtd">
<html>
<head>
<title>Description of ParadigmSpectralmeans</title>
<meta name="keywords" content="ParadigmSpectralmeans">
<meta name="description" content="">
<meta http-equiv="Content-Type" content="text/html; charset=iso-8859-1">
<meta name="generator" content="m2html v1.5 © 2003-2005 Guillaume Flandin">
<meta name="robots" content="index, follow">
<link type="text/css" rel="stylesheet" href="../../m2html.css">
</head>
<body>
<a name="_top"></a>
<div><a href="../../index.html">Home</a> > <a href="#">code</a> > <a href="index.html">paradigms</a> > ParadigmSpectralmeans.m</div>
<!--<table width="100%"><tr><td align="left"><a href="../../index.html"><img alt="<" border="0" src="../../left.png"> Master index</a></td>
<td align="right"><a href="index.html">Index for code/paradigms <img alt=">" border="0" src="../../right.png"></a></td></tr></table>-->
<h1>ParadigmSpectralmeans
</h1>
<h2><a name="_name"></a>PURPOSE <a href="#_top"><img alt="^" border="0" src="../../up.png"></a></h2>
<div class="box"><strong></strong></div>
<h2><a name="_synopsis"></a>SYNOPSIS <a href="#_top"><img alt="^" border="0" src="../../up.png"></a></h2>
<div class="box"><strong>This is a script file. </strong></div>
<h2><a name="_description"></a>DESCRIPTION <a href="#_top"><img alt="^" border="0" src="../../up.png"></a></h2>
<div class="fragment"><pre class="comment"></pre></div>
<!-- crossreference -->
<h2><a name="_cross"></a>CROSS-REFERENCE INFORMATION <a href="#_top"><img alt="^" border="0" src="../../up.png"></a></h2>
This function calls:
<ul style="list-style-image:url(../../matlabicon.gif)">
<li><a href="ParadigmDataflowSimplified.html" class="code" title="">ParadigmDataflowSimplified</a> </li>
<li><a href="ParadigmSpectralmeans.html" class="code" title="">ParadigmSpectralmeans</a> </li>
</ul>
This function is called by:
<ul style="list-style-image:url(../../matlabicon.gif)">
<li><a href="ParadigmSpectralmeans.html" class="code" title="">ParadigmSpectralmeans</a> </li>
</ul>
<!-- crossreference -->
<h2><a name="_subfunctions"></a>SUBFUNCTIONS <a href="#_top"><img alt="^" border="0" src="../../up.png"></a></h2>
<ul style="list-style-image:url(../../matlabicon.gif)">
<li><a href="#_sub1" class="code">function defaults = preprocessing_defaults(self)</a></li>
<li><a href="#_sub2" class="code">function model = feature_adapt(self,varargin)</a></li>
<li><a href="#_sub3" class="code">function features = feature_extract(self,signal,featuremodel)</a></li>
<li><a href="#_sub4" class="code">function visualize_model(self,varargin)</a></li>
<li><a href="#_sub5" class="code">function layout = dialog_layout_defaults(self)</a></li>
</ul>
<h2><a name="_source"></a>SOURCE CODE <a href="#_top"><img alt="^" border="0" src="../../up.png"></a></h2>
<div class="fragment"><pre>0001 classdef <a href="ParadigmSpectralmeans.html" class="code" title="">ParadigmSpectralmeans</a> < <a href="ParadigmDataflowSimplified.html" class="code" title="">ParadigmDataflowSimplified</a>
0002 <span class="comment">% Conventional paradigm for stationary oscillatory processes, using per-channel frequency band averages.</span>
0003 <span class="comment">%</span>
0004 <span class="comment">% This method is essentially the Fourier domain equivalent of para_windowmeans. Since spectral</span>
0005 <span class="comment">% power is not a linear measure of the signal, a spatial filter can significantly improve the</span>
0006 <span class="comment">% performance of this method over simple channel-space band power. Some of the applicable spatial</span>
0007 <span class="comment">% filters are the surface Laplacian and the ICA.</span>
0008 <span class="comment">%</span>
0009 <span class="comment">%</span>
0010 <span class="comment">% Name:</span>
0011 <span class="comment">% Spectral Means</span>
0012 <span class="comment">%</span>
0013 <span class="comment">% Christian Kothe, Swartz Center for Computational Neuroscience, UCSD</span>
0014 <span class="comment">% 2011-05-26</span>
0015
0016 methods
0017
0018 <a name="_sub0" href="#_subfunctions" class="code">function defaults = preprocessing_defaults(self)</a>
0019 defaults = {<span class="string">'FIRFilter'</span>,{[0.5 2],<span class="string">'highpass'</span>}, <span class="string">'EpochExtraction'</span>,[0.5 3.5], <span class="string">'SpectralTransform'</span>,{<span class="string">'multitaper'</span>,true,false}, <span class="string">'Resampling'</span>,100};
0020 <span class="keyword">end</span>
0021
0022 <a name="_sub1" href="#_subfunctions" class="code">function model = feature_adapt(self,varargin)</a>
0023 arg_define(varargin, <span class="keyword">...</span>
0024 arg_norep(<span class="string">'signal'</span>), <span class="keyword">...</span>
0025 arg({<span class="string">'wnds'</span>,<span class="string">'FreqWindows'</span>},[0.5 3; 4 7; 8 12; 13 30; 31 42],[0 0.5 200 1000],<span class="string">'Frequency bands to take as features. Matrix containing one row for the start and end of each frequency band over which the signal mean (per every channel) is taken as a feature. Values in Hz.'</span>,<span class="string">'cat'</span>,<span class="string">'Feature Extraction'</span>), <span class="keyword">...</span>
0026 arg({<span class="string">'logtransform'</span>,<span class="string">'LogTransform'</span>},false,[],<span class="string">'Log-transform output. Log-transformed spectra are more likely to be separable by a linear classifier.'</span>));
0027 model.wnds = wnds;
0028 model.chanlocs = signal.chanlocs;
0029 model.logtransform = logtransform;
0030 <span class="keyword">end</span>
0031
0032 <a name="_sub2" href="#_subfunctions" class="code">function features = feature_extract(self,signal,featuremodel)</a>
0033 [dummy, idx] = utl_nearest(signal.freqs, featuremodel.wnds); <span class="comment">%#ok<ASGLU></span>
0034 features = reshape(utl_picktimes(signal.data,idx),[],size(signal.data,3))';
0035 <span class="keyword">if</span> featuremodel.logtransform
0036 features = log(features); <span class="keyword">end</span>
0037 <span class="keyword">end</span>
0038
0039 <a name="_sub3" href="#_subfunctions" class="code">function visualize_model(self,varargin) </a><span class="comment">%#ok<*INUSD></span>
0040 args = arg_define([0 3],varargin, <span class="keyword">...</span>
0041 arg_norep({<span class="string">'parent'</span>,<span class="string">'Parent'</span>},[],[],<span class="string">'Parent figure.'</span>), <span class="keyword">...</span>
0042 arg_norep({<span class="string">'fmodel'</span>,<span class="string">'FeatureModel'</span>},[],[],<span class="string">'Feature model. This is the part of the model that describes the feature extraction.'</span>), <span class="keyword">...</span>
0043 arg_norep({<span class="string">'pmodel'</span>,<span class="string">'PredictiveModel'</span>},[],[],<span class="string">'Predictive model. This is the part of the model that describes the predictive mapping.'</span>), <span class="keyword">...</span>
0044 arg({<span class="string">'paper'</span>,<span class="string">'PaperFigure'</span>},false,[],<span class="string">'Use paper-style font sizes. Whether to generate a plot with font sizes etc. adjusted for paper.'</span>));
0045 arg_toworkspace(args);
0046 parent = args.parent;
0047
0048 <span class="comment">% no parent: create new figure</span>
0049 <span class="keyword">if</span> isempty(parent)
0050 parent = figure(<span class="string">'Name'</span>,<span class="string">'Per-window weights'</span>); <span class="keyword">end</span>
0051
0052 <span class="comment">% number of pairs, and index of pattern per subplot</span>
0053 np = size(fmodel.wnds,1);
0054 horz = ceil(sqrt(np));
0055 vert = ceil(np/horz);
0056
0057 <span class="comment">% get the weights</span>
0058 <span class="keyword">if</span> isfield(pmodel.model,<span class="string">'w'</span>)
0059 weights = pmodel.model.w;
0060 <span class="keyword">elseif</span> isfield(pmodel.model,<span class="string">'W'</span>)
0061 weights = pmodel.model.W;
0062 <span class="keyword">elseif</span> isfield(pmodel.model,<span class="string">'weights'</span>)
0063 weights = pmodel.model.weights;
0064 <span class="keyword">else</span>
0065 error(<span class="string">'Cannot find model weights.'</span>);
0066 <span class="keyword">end</span>
0067
0068 <span class="comment">% check if weights contains a bias value</span>
0069 <span class="keyword">if</span> numel(weights)==length(fmodel.chanlocs)*np+1
0070 weights = weights(1:end-1);
0071 <span class="keyword">elseif</span> numel(weights)~=length(fmodel.chanlocs)*np
0072 error(<span class="string">'The model is probably not linear'</span>);
0073 <span class="keyword">end</span>
0074
0075 <span class="comment">% turn into matrix, and optionally convert to forward projections</span>
0076 weights = reshape(weights,length(fmodel.chanlocs),np);
0077
0078 <span class="comment">% for each window...</span>
0079 <span class="keyword">for</span> p=1:np
0080 subplot(horz,vert,p,<span class="string">'Parent'</span>,parent);
0081 topoplot(weights(:,p),fmodel.chanlocs,<span class="string">'maplimits'</span>,[-max(abs(weights(:))) max(abs(weights(:)))]);
0082 t=title([<span class="string">'Window'</span> num2str(p) <span class="string">' ('</span> num2str(fmodel.wnds(p,1)) <span class="string">'s to '</span> num2str(fmodel.wnds(p,2)) <span class="string">'s)'</span>]);
0083 <span class="keyword">if</span> args.paper
0084 set(t,<span class="string">'FontUnits'</span>,<span class="string">'normalized'</span>);
0085 set(t,<span class="string">'FontSize'</span>,0.1);
0086 set(gca,<span class="string">'FontUnits'</span>,<span class="string">'normalized'</span>);
0087 set(gca,<span class="string">'FontSize'</span>,0.1);
0088 <span class="keyword">end</span>
0089 <span class="keyword">end</span>
0090 <span class="keyword">end</span>
0091
0092 <a name="_sub4" href="#_subfunctions" class="code">function layout = dialog_layout_defaults(self)</a>
0093 layout = {<span class="string">'SignalProcessing.Resampling.SamplingRate'</span>, <span class="string">'SignalProcessing.FIRFilter.Frequencies'</span>, <span class="keyword">...</span>
0094 <span class="string">'SignalProcessing.EpochExtraction'</span>, <span class="string">'SignalProcessing.SpectralTransform.Representation.TimeBandwidth'</span>, <span class="keyword">...</span>
0095 <span class="string">'SignalProcessing.SpectralTransform.Normalized'</span>, <span class="string">'SignalProcessing.SpectralTransform.LogTransform'</span>, <span class="string">''</span>, <span class="keyword">...</span>
0096 <span class="string">'Prediction.FeatureExtraction.FreqWindows'</span>, <span class="string">''</span>, <span class="string">'Prediction.MachineLearning.Learner'</span>};
0097 <span class="keyword">end</span>
0098
0099 <span class="keyword">end</span>
0100 <span class="keyword">end</span></pre></div>
<hr><address>Generated on Wed 19-Aug-2015 18:06:23 by <strong><a href="http://www.artefact.tk/software/matlab/m2html/" title="Matlab Documentation in HTML">m2html</a></strong> © 2005</address>
</body>
</html> | 2023-09-06T01:27:13.970301 | https://example.com/article/2336 |
#!/usr/bin/env python
# -*- coding: utf-8 -*-
import json
from alipay.aop.api.response.AlipayResponse import AlipayResponse
class AlipayDataDpcAlisisOlapprocessorResponse(AlipayResponse):
def __init__(self):
super(AlipayDataDpcAlisisOlapprocessorResponse, self).__init__()
self._data = None
@property
def data(self):
return self._data
@data.setter
def data(self, value):
self._data = value
def parse_response_content(self, response_content):
response = super(AlipayDataDpcAlisisOlapprocessorResponse, self).parse_response_content(response_content)
if 'data' in response:
self.data = response['data']
| 2023-10-11T01:27:13.970301 | https://example.com/article/9766 |
Mark Hughes' GP report: only Greenpeace rivals Vettel
Sebastian Vettel and Red Bull provided a masterclass for the opposition in the Belgian GP. MARK HUGHES reckons only the Greenpeace protestors rivalled the champions for efficiency
The main interest in this race was watching the Greenpeace anti-Shell banner unfold before the start. The race itself unfolded within a few corners of the first lap, as Sebastian Vettel screamed his Red Bull past Lewis Hamilton's Mercedes and proceeded to open up an ever-greater distance to his pursuers for the rest of the afternoon.
Having climbed onto the roof of the main grandstand with a giant banner protesting Shell's planned oil drilling in the Arctic, the activists abseiled to unveil the words: 'Arctic Oil? Shell No!' Shell is the Belgian Grand Prix's title sponsor. | 2024-07-25T01:27:13.970301 | https://example.com/article/5407 |
Measurement of fluorescence decay of crude oil: a potential technique to identify oil slicks.
The single photon counting technique has been used to measure the decay time for several Kuwaiti crude and refined oils. Fluorescent characteristics of two different bunker oils from widely separate geographic areas have been studied. Laser induced fluorescent data for the crude oil samples are compared with the decay time results to evaluate the potential of these techniques for the identification of oil sticks in the marine environment. Response of the oil film thickness to various excitation wavelengths from a CW Ar ion laser and a pulsed xenon lamp has been investigated. | 2023-09-01T01:27:13.970301 | https://example.com/article/9777 |
Shyrack
Shyrack are terrible creatures that roam the caves and tombs of the Sith world of Korriban. This avian predator vaguely resembles a bat, with large lathy wings and sharp teeth. Shyrack are blind and get around their caves with a combination of scent and echolocation. Individually, Shyrack are clumsy and slow moving, and individually, they are considered relatively easy vermin to eradicate. However, Shyrack Swarms sometimes gather and hunt, which are exceedingly dangerous.
Contents
Shyrack are most commonly found on Korriban but have been found on planets throughout The Outer Rim. A single Shyrack is a threat for a low-level heroes, but the encounter can be made more challenging by turning it into a Shyrack Swarm. Shyrack are consummate hunters, undeterred by the darkness of their cavern homes. | 2024-06-20T01:27:13.970301 | https://example.com/article/2383 |
Sizeable numbers of containers enter the country each day, whether through ports, airports, or border crossings. The risk exists that these containers will be used to smuggle hazardous materials into the country, such as nuclear, chemical, or biological weapons or materials. In addition, there are many instances where particular facilities or buildings need to be secured against the threat of attack from weapons being surreptitiously brought onto the premises, either through cargo that is delivered or in vehicles themselves. Because the level of threat to a location may change, having a portable system that can be placed temporarily or semi-permanently in a location is extremely useful. Individually inspecting containers by hand or through passive techniques in these circumstances is cumbersome, inefficient, expensive, and in many cases ineffective.
In addition to safety applications, there are other needs for inspecting containers, such as with mining operations or storage of waste (including nuclear waste). It is desirable to quickly and efficiently determine whether containers full of rock, dirt, ore, or waste contain materials of interest, such as minerals, metals, or elements. High-energy sources can penetrate the container and remotely examine its contents to determine whether it contains materials of interest.
With respect to safety inspections, passive techniques to locate nuclear materials, such as using Geiger counters and neutron emission detectors, can easily be fooled and render false positives from materials as innocuous as cat litter, which can carry trace amounts of radioactivity in the clay that comprises the litter. More troubling, they can easily be fooled into rendering a false negative by effective shielding of the nuclear material. Either false result is detrimental because it wastes the time and resources of the inspectors or entirely misses the threat being sought.
To overcome these problems, others have proposed using high-energy electrons or x-rays from LINACs and Bremsstrahlung sources to examine the containers. These high-energy sources can easily penetrate the walls of the containers, enabling inspectors to examine the contents of the containers in situ without having to manually inspect them. In addition, such sources can readily distinguish false threats from real threats, thereby reducing the number of false positive indications. More importantly, it is difficult to shield threatening materials from these high-energy sources due to their penetrating power. These sources can also detect the presence of shielding materials, which raises red flags and invites further inspection.
While these high-energy sources have many desirable traits, they are not without their own problems. First, many of these sources create x-ray or electron beams with large energy spreads, which are undesirable for a number of reasons. Typically only a narrow band of energy is needed for detection, so most of the energy in these sources is wasted. This wasted energy creates problems, such as increasing the signal noise, which makes it more difficult to detect the materials of interest, and creating a greater radiation safety hazard to inspectors and those near the system. Second, these systems can be large and difficult to move due to the necessity of using a LINAC, which only has a modest accelerating field and is therefore large and heavy. Third, these systems can be unstable and difficult to synchronize to other components, such as lasers, that may be used to create x-rays. Fourth, most LINACs are not tunable, so the system has a fixed energy and cannot be easily adjusted. | 2024-05-29T01:27:13.970301 | https://example.com/article/3851 |
Pets and People: The Health Connection
Sigmund Freud, the founder of psychoanalysis, loved dogs, yet he never mentioned them in his research. Only recently have scientists begun to analyze the way we humans relate to other species.
Perhaps that's because we need to make sense of the close connections so many people have with their pets, from pythons to parrots, and from German shepherds to Vietnamese pot-bellied pigs.
Here are some of the most common questions people ask about their pets:
Is a dog's mouth cleaner than a human's?
Although many pet owners believe this, the answer is no. So why don't we get sick from Fido's kisses? Generally, it's because animals and humans carry different types of bacteria in their mouths. Dog and cat bacteria don't tend to affect humans. So a kiss from your cat can be safer than a kiss from your grandma.
But your cat's kiss won't be quite as safe as your dog's. There is a good chance that Spot's mouth is more sanitary, because a cat often cleans itself with its tongue.
Can you catch a cold from your pet?
Your runny-nosed cat licks you on the face and the next day you have the sniffles. Did you catch them from your pet? Not likely. You can catch some diseases, called " zoonoses," from your pet, but most pet viruses and upper respiratory infections aren't transmittable to humans. We carry different germs from those that inhabit our pets. For example, feline AIDS is a disease that attacks the immune system of cats in much the same way that human AIDS attacks the human immune system. But cats can't transmit feline AIDS to humans.
Though zoonoses are rare, you should be aware of one called toxoplasmosis. Cats can transmit this to people. The disease itself isn't dangerous for most healthy people; it consists of mild flu-like symptoms. But pregnant women who contract this disease may give birth to a baby with congenital defects. The expert advice: Pregnant women can have contact with cats, but they should let someone else clean out the litter box, where the greatest hazard lurks. Toxoplasmosis is also a danger to immunocompromised individuals, particularly those with AIDs. They may develop toxoplasmosis infections that destroy vision, and cerebral toxoplasmosis, which causes neurological disease.
Are pets good therapists?
Many studies have explored the relationship between pets and humans. One study found that pets can reduce the loneliness of residents in long-term care facilities, according to the Delta Society, a nonprofit group that organizes animal-assisted therapy for people with mental and physical disabilities, Pets cal also help lower blood pressure. People with borderline hypertension lowered their blood pressure on days when they took their dogs to work with them. Older adults who own dogs have fewer doctor visits than those who don't own dogs. Pet owners have lower triglycerides and cholesterol levels. Pet owners have better psychological well-being.
Can I have too many pets?
We usually hear about people with multiple pets from newspaper accounts: "Woman, 75, Found Dead With 50 Cats"; or "Health Department Raids Home of Hermit With 40 Dogs." The subjects of these stories have an unhealthy obsession with their pets. One study found that people who own too many pets suffer from a "rescue mentality," which seems to develop from a traumatic experience these individuals once suffered.
If someone owns multiple pets, however, it does not necessarily mean he or she has an unhealthy attachment to animals. Geraldine Rockefeller Dodge, for instance, had a kennel full of dogs, but she was wealthy and could provide them with good care. Some people, on the other hand, can't even cope with one cat.
Why are we more allergic to cats than dogs?
Proteins that animals release trigger allergic reactions in humans. These proteins may come from dried skin flecks, or from dander. Both cats and dogs produce these, but cats have an additional allergenic element, known as Fel d1. This is a protein found in cat saliva and skin flakes. When a cat licks itself, proteins in their saliva dry on their fur, then flake off into the air. Allergy-prone people may be particularly susceptible to these airborne proteins. | 2024-02-11T01:27:13.970301 | https://example.com/article/7002 |
"Woman on phone:" "Dad." "I've gone to the city." "Please don't come for me." "There's a curfew here." "Just... just keep them safe." "I'm sorry." "I love you." "(classical score playing)" "(on radio) You are listening to NPR." "I'm host, David Newborn, and this is Global Position." "Now for today's top headlines." "Months after the initial worldwide outbreak, national and local governments are beginning to suppress the necroambulis virus epidemic." "The Department of Agriculture has found no solution for infected, dying crops." "Agriculture Officials are encouraging farmers to burn their crops in a desperate attempt to destroy what may be preventing growth." "(siren wailing)" "Man over PA:" "Please return to your homes." "Curfew is at 8:00." "David:" "While citizens of inner cities and metropolitan areas remain hardest hit, through quick response and quarantine, weekly infections reports have dropped 30%." "David:" "Cleanup and martial law are still in effect." "Medical officials, along with the CDC, have been tight-lipped about a cure or vaccine." "As for the infected, scientists are now suggesting that an elevated sense of smell is the telltale sign of what's being referred to as "the turn."" "(siren wailing)" "(muffled voices speaking indistinctly)" "(distant screaming)" "(siren wailing)" "Man:" "Check this one for infection." "Look at that skin." "Man #2 on radio:" "Yeah, we caught another, 10-4." " Curfew-breaker." "See if infected, over." " Man:" "Get her here." "(indistinct PA announcement)" "Woman on PA:" "Doctors with stage three patients are reminded quarantine pickup is at 1700 hours." "Sir?" "You shouldn't be in here." "This is the shelter for the infected." "It's dangerous." "But my daughter is here." " (sighs) What's her name?" " Maggie." "Marguerite." "Marguerite Vogel." "Marguerite Vogel..." "Mr. Vogel?" "Your daughter's bite wound was very severe." "Now, we may know a lot about this, except that we can't stop this yet." "She's probably going to show more signs of aggression." "She's gonna lose her appetite, and then she's gonna get it back again." "Look at me." "When that happens, take her to quarantine." "I wouldn't normally release someone with her type infection." "I'm doing this as a favor for Vern." "Quarantine is eight weeks in." "Say your goodbyes and get her straight to Blaire." "I'll send all the necessary paperwork to Vern." "He'll follow up and answer any questions you have." "Good luck, Mr. Vogel." "Dad?" "Dad!" "(sighs)" " (sobbing) I'm sorry." " I've been searching everywhere for you." "I'm sorry." "(sobs)" "(thunder rumbles)" "What did he say?" "The doctor?" "Vern helped us get you out." "Stop picking at it!" " Where are you going?" " Inside." "(door slams)" " Mag." " I'll be fine." "(dog barking)" "(emergency tone playing on TV)" "Hello?" "(dog barking)" " (paper rustling) - (barking continues)" "(indistinct dialog over TV)" "(emergency tone playing)" "(barking continues)" "Hello?" "(dog barking)" " (growling) - (dog barking)" " (dog barking) - (metal clattering)" "(panting)" "(mutters)" "(panting)" "(softly) Maggie?" "Maggie?" "Get in the truck!" " What's wrong?" " Just do it right now." "Come on." "Go." "(classical score playing)" " (thunder rumbles) - (indistinct chatter)" "(kids laughing)" "(truck approaching)" "Girl:" "Mom!" "Daddy's home!" "Slow down, honey!" "Oh!" " Did you pack your bag?" " Mm-hm." " Is Pretty Pony going?" " Mm... (laughs) You're not taking Pretty Pony?" " Got everything you need?" " Yeah." " (laughs)" " Daddy!" " Molly:" "We missed you." " (thunder rumbles)" " It's so good to see you." " Hey." "Hey, Moll." "What happened to your arm?" "Maggie:" "Oh, uh..." "I just got hurt." "Molly:" "I scratched mine, but Mommy fixed it." " Who fixed yours?" " Uh, the doctors." "Molly:" "Is that where you were?" "Maggie:" "Yeah. it took a while for them to fix it." "(door closes)" "(laughs softly) I missed you." "Dad said you were sick... but you're dying, huh?" "Bobby..." "A few kids at my school got infected." "I knew one of them." "Steven." "I didn't like him much, but..." "I don't think he deserved to die." "Does it hurt?" "No." "Not anymore." "(thunder rumbles)" "Why do we have to stay with Aunt Linda?" "(sighs) Because I'm contagious." "Mom's afraid we'll get it." "Just because she loves you." "Hey." "Go on, and be nice to Molly." "Bobby?" " I missed you, kiddo." " Missed you, too." "(sighs)" " Ready?" " (engine starts)" "Radio host:" "They tell us that patients have days left before what they're considering the final stage." "And stay tuned at the top of the hour." "We'll be in conversation..." "Why don't you get settled and help me with the dishes?" "(faucet running)" "(sniffles)" "(somber music playing)" "(bed squeaks)" "(knock on door)" "(door opens)" "Caroline is fixing us something to eat." "I'm not hungry." "Allie called a few times." "Two weeks?" "You spent two weeks out there looking for me?" "Yeah." "I made a promise to your mother... that I would protect you." "Yeah, but..." "what about you guys?" " What if I hurt you?" " Don't worry." "Caroline and I, we know the precautions." "Maggie:" "You shouldn't have brought me back." "You have to eat something." "For me." "I'll try." "Maggie?" "Where are your bandages?" "(sighs)" "Maggie:" "I'm so glad I came down." "I know, I know." "I..." "I just can't look at it." "I can't see it, knowing what's going to happen to her." "I just can't do it, Wade." "I'm... (whispers) I'm Sorry." "I just don't understand." "I..." "I keep asking Him and asking Him, but..." "He's not giving me any answers." "Wade?" "(somber music playing)" "(thunder rumbles)" "(line ringing)" " You've reached Fred and..." " Ken." " Fred:" "And we're out on the farm." " (Ken laughing)" "(Fred laughing) Leave us a message and we'll get back to you." "(laughs) Oh, that was awful." "Ken:" "That was pretty funny, though." "(answering machine beeps)" "(classical score playing)" "(wind blowing)" "Female reporter on radio:" "What do you think about the schools opening up?" "Man:" "No, you need to stop pretending bad things ain't happening out there." "Reporter:" "Bad things?" "(sputtering)" "(sputtering)" "(generator thrumming)" "Reporter on radio:" "Well now, as the government sanction people are ID 'ed in the system and sent home with families." "They even have forced appointments with their local doctors, who report back to the hospitals in the cities." "And if they violate their allotted time, the authorities come to get them." " (muffled thrumming)" " Man:" "And how long does it take to turn?" "How long is that allotted time?" "They say six to eight weeks for any one person to turn." "But, well, we know it's different depending on who you are." "And what if someone turned early?" "I mean, how many people they gonna hurt..." "(growling)" " Woman:" "Maggie!" " (echoing screams)" " Maggie's voice:" "No." "No. (screams) - (growling)" "Manon radio:" "You don't do that and then leave." "You don't send half of them home to their families and hope they come back to be killed." "You just kill them." "That's all." "Mag!" "Are you okay?" "(swing creaking)" "Your finger!" " (whimpering)" " Come on, I've got you." " Here, sweetie." "Sit down." " (panting)" " Caroline?" " Let's see what I have." " (gasps softly) - (Maggie gasps)" "I'll call our doctor." "(sobbing)" "Caroline:" "Yes, it's Mrs. Vogel." "Caroline Vogel." "Yes, I'm..." "I'm calling about my stepdaughter." "(sobbing)" "Caroline:" "It's urgent." " (sobbing) - (Caroline speaks indistinctly)" " (sobbing)" " Caroline:" "It's an emergency." " (gasping) - (garbage disposal whirring)" "(thunder rumbles)" "(whirring continues)" "(shuts off)" "(sobbing)" " (sobbing) - (thunder rumbles)" "(zombie wheezing)" " (twig snaps) - (gasps)" "Get behind me." "Nathan." "(sobbing) No, don't!" "Please, Dad." "No." "Please!" " Go home." "Just go home." " (sobbing)" " (zombies growling)" " Wade:" "Please, say something." " Nathan, please." " (zombie wheezing)" "(wheezing breaths)" "(echoing screams)" "(car approaches)" "(car door opens)" "Wade:" "I asked him to say something." "Maggie used to babysit for her." "It had to be done." "Ain't nobody fighting that." "Bonnie was wrong for what she done." "Was she?" "She kept them in the house and didn't notify anybody." "She should have brought them into quarantine." "We had damn near the whole station out there." "Now we can't even find Bonnie." "Look, Wade." "When the time comes..." " Now, Ray..." " I know." "I know what you're thinking, but... it's for the best." "You think about what those two could have done today if you hadn't have been out there." "Man:" "Quarantine rules apply to everybody, Wade." " I mean, wake up!" "Look at the..." " Holt!" "Go call the trucks down from Owensboro." "Tell them we've got two bodies to clean up." "Holt." "(Holt mutters) Unbelievable." "Now, Ray, you and I, we go back a long ways." "You've always done us right, especially after Sarah's passing." "But I swear to God, if you, him, or anyone else come out here for her..." "She's my daughter, Ray." "(sighs) Trucks will be down here in the morning, pick up the remains." "Wade..." "Think about what you had to do today, what you might have to do in the future." "(generator running, muffled)" "(footsteps approach)" "How is she?" "She asleep?" "Caroline:" "Her finger is gone." "She made sure of that." "I got it all bandaged up, but she's still refusing to go to the doctor." "Wade:" "I figured that." "What did Ray say?" "He said that Bonnie kept them locked up for a while." "Too long." "I killed them both." "No." "You, uh..." "They'd already moved on." "(thunder rumbling)" " There was something in their eyes." " Wade." "You can't do this to yourself." "Bonnie should have taken them in." "And what about Mag?" "What happens when she gets close?" "Don't think about that right now." "Just... just..." "Let's enjoy the time we have with her." "(crying, sniffling)" "(thunder rumbling)" "(wind blowing)" " Caroline:" "What is it?" " Wade:" "Shh." "Caroline:" "Wade?" "Wade:" "Stay here." "(crickets chirping)" "Bonnie?" "It's late." "Bonnie:" "How's Mag?" "About as good as she can be." "Doctors gave us all these special rules and papers for children with her condition." ""Lock subject in room at night." ""Avoid touching subject without gloves."" "Never once said her name." "Julia." "She's just four." "She was scared." "She slept with us most nights as it was, so we'd..." "We'd take turns with her through nights." "She got worse." "One night Nathan went in, didn't wake me for my turn." "Next morning, door was locked." "Locked himself in with her." "I pounded and pounded on that damn door, cried till I couldn't no more." "Still, never answered." "But he knew." "He knew what he was doing." "Take me to where they're at." "(somber music playing)" " (Bonnie inhales sharply) - (gun cocks)" "(shuddering)" "(Bonnie sobbing)" "(music continues)" "(siren wails)" "(no discernible dialog)" "(engine running)" "(somber music playing)" "(flies buzzing)" "(flies buzzing loudly)" "(grunting, yipping)" "(thunder rumbling)" "Maggie:" "Dad!" "There's someone on the phone." " Hello?" " Man:" "Mr. Vogel?" " Yes?" " Yes." "Hello, sir." "This is Mr. Garmen from the quarantine unit of St. Mary's Hospital." "We're calling to inform you that we've scheduled a follow up appointment with Dr. Vern Kaplan to track your daughter's progress in advance of quarantine." "Tomorrow we're gonna go and see Vern about your finger." "No arguments." "You hear me?" "(thunder rumbling)" "(children chattering)" "James, Carrie, get over here." "Right now!" "Come here, sit by Mama." " (knock on door)" " Wade." " Vern." " Maggie." " (muffled) Take a deep breath for me." " (inhales)" " (heart beating)" " Vern:" "Let it out." "Lungs are clear." "Scans show that the asthma has receded already, and your heartbeat is abnormally strong." "That's a good sign." "Now..." "let's have a look at your arm." "Looks like the origin site is spreading." "Maggie, what happened here?" " Wade:" "She broke it." " Maggie:" "I cut it off." "Vern:" "Why would you do such a thing?" "What good's a finger if your arm's falling off?" "Vern:" "Maggie, your arm is not going to fall off." "Now, there's a lot we don't know about this thing, but this decay, it'll stop." "Your arm is yours to keep." "You got me?" "I'm gonna take a sample, okay?" "Allie's been asking about you." "Said she tried to call a few times." "I know she'd love to hear from you, so... give her a call, okay?" "Doctor's orders." "All right, all done." "Vern:" "All we gotta do now is put a dressing on it." "I'll have Judy come in and take care of that." "(classical score playing)" "(door opens, closes)" "(Maggie sobbing)" "There you are." "She's strong, but from what I've seen, it's progressing fast in her." "Pretty soon, she ain't gonna want any food." "She's gonna want something more." "Skin will start smelling like meat." "When it finally happens, you're gonna have a few choices." "One, take her to quarantine." "I'm not gonna do that." "Vern:" "I wasn't suggesting it." "My report will say she's progressing slow, so it'll buy you some time." "Option two:" "We give her the cocktail they'd give her in quarantine." "At least this way she'd be with you when she takes it, and not a bunch of strangers or other infected people." "But you know how she doesn't feel anything right now?" "She will feel this." "Reports say that it's painful." "Extremely." "All the way up till the end." "What's option three?" "Make it quick." " (music playing) - ♪ I bounce my baby on my knee ♪" "♪ And see her laughing back at me ♪" "♪ Makes living sweet as it can be ♪" "♪ My little Maggie ♪" "♪ To see her try to dance and sing ♪" "♪ Oh, man, she's into everything ♪" "♪ Must find a rocking horse to bring my little Maggie be ♪" "♪ Now do you ever ♪" "(Caroline sighs)" "Caroline, the food is delicious." "Caroline:" "Oh..." "Ah, the stove is shot." "I..." "Some of it's really..." " (sighs) - (Maggie laughing)" "You think this is funny?" "Hm?" " (both laughing)" " Well, no dessert for either of you." "Is that a threat or a stay of execution?" "(both laughing)" "(tools clanging, clicking)" "Maggie:" "Why do you even still have this piece of crap?" "Well, because I trust this piece of crap." "(Maggie chuckles)" "Wade:" "You know, Caroline had four cars now," " and they all broke down." " Maggie:" "Yeah, I know." "I had to pick her up the last time." " What did you pick her up in?" " (laughs)" "You see?" "What are you reading there?" "Uh, it's called "Morning Light of the Past."" "It was in one of Mom's boxes." "It's like really, really weird." "(chuckles)" "Your mother was a bookworm." "Until today, I still don't know what she saw in me... because she had everything." "She was smart, beautiful," " and she had those long legs." " Okay." "Okay, Dad." "Thank you." " That's enough." " What?" "I mean, I'm just saying." "I mean, the whole time we dated, she always pushed books on me." "She always wanted me to read more." "And I just didn't have the time with the farm and all." " You read to me all the time." " Only because she made me." "I remember just before you were born... and I bought a whole bunch of books." "And your mother had a hell of a green thumb." "And there was this one book that I read to you over and over." "It was called "A Daisy's Journey."" "That's actually how you got your name." " There's a Marguerite in it?" " And your mother loved those flowers." "She just loved them." "And she was so strong." "I mean, every time she needed to fight back, she did." "You have a lot of your mother in you." "You know that?" "You know, maybe it was the, um, truck." "What?" "Why Mom loved you." "(both laugh)" " Well, that's for sure." " (Maggie laughs)" " My truck." " (Maggie laughs)" "(Maggie crying, echoing) No!" "No!" " (screeching) - (Maggie screaming) No!" "No!" "(growling)" "(panting)" "(whimpering)" "(panting loudly)" "(sobbing)" "(grunting)" "(thunder rumbling)" "(knock on door)" "Caroline:" "Maggie?" "Allie's here." "Hey." "Oh my God." "There she is!" " Shut up." " (Allie laughs)" " Oh..." " Hi!" "Allie:" "Where have you been?" "Oh." "Well, I haven't been feeling too well." " Yeah?" " (laughs) Yeah." "Well, how are you feeling right now?" " Uh, right now?" " Yeah." "Um... why?" "Okay." "All right." "Trent and Candace and a few other people are going out to the reservoir tonight." "I know it's not like a super fun trip to KC or whatever, but school starts soon and I doubt our parents are gonna let us out much further than that." " Trent's going?" " Yeah." "Did you hear?" "Yeah." "How's he doing?" "I don't know." "I mean, he seems all right, but don't take my word for it." "You should come see for yourself." "(laughs) Right." "Come on." "Everybody misses you." "They wanna see you." "I miss you, and I'm not going without you." "Okay?" "Hey, uh, hold on real quick." " What?" " Here." "I found it on the couch the other day and threw it on this old thing." "I figured you might wanna wear it." " Thank you." " Oh, it's nothing." "(laughs) Go, get out of here before Allie explodes." "Yeah, I know, right?" "We are late." "Allie:" "And you have a nice young man waiting for you." "Is it gonna be like this all night?" " Um, yes." " Oh God!" " Yes, it actually is." " Maggie:" "Take me now." "(classical score playing)" "(indistinct chatter)" "(laughter)" "Girl:" "Oh, here we go!" " Girl #2:" "Hey!" "How are you?" " Maggie:" "Hey." " Hey!" " Girl #2:" "Hi." "Long time no see!" "(indistinct chatter, laughter)" "Boy:" "I don't get why they're opening up the school so soon." " Gotta get back to normal." " Normal?" "What's normal about all of this?" "Now, we have teachers missing." "Still have a bunch of infected people." "No offense." "Not you guys." "But like the Andersons." "You know?" " How many more are like that?" " What happened?" "She had them locked up in a room." "Didn't tell anybody." "And they got out, and Mag's dad found her." "Holy shit, Mag." "What'd your dad do?" "Look, does it matter?" "They're dead." "Point is, she screwed up." "I mean, how many other people have people locked away?" "You know?" "What should Bonnie have done?" "What would you do?" "What should my dad do to me?" "Quarantine?" "Do you know what it's like there?" "My uncle works at the hospital in KC." "He said that they tell people everything's nice." "That they'll..." "They'll hold your hand until the end, but they don't." "They throw you in a big room with everyone else." "They don't separate the phases." "Everyone's all bunched up together, people eating people, and they don't care." "So what would you do?" "(thunder rumbling)" "You know what I would do to me?" "I'd put a gun right here." "(softly) Bang." "Mason's a dick." "(chuckles)" "He's just afraid." "Yeah, but he's still a dick." "(laughs)" "You know he stayed over the night before I got bit?" "Played video games and got into all of Dad's beer." "And when he found out, he put me to work in the field the next morning." "She looked really bad, Mag." "I don't know why I went over to her, but I did." "Felt bad, I guess." "I told her to stay there, but when I turned around to call for Dad... she bit me." "I could see it in her eyes." "She regretted it." "Probably didn't even know she did it." "Then Dad showed up." "He shot her in the chest and in the head." "Maggie:" "I'm sorry." " It's not your fault." " (laughs)" "No." "No." "I mean... about us." "I figured I'd done something wrong." "No." "I was just... scared, I guess." "Yeah." "Me, too." "I missed you." "I missed you, too." "(Maggie chuckles) I missed that." "So did I." "(thunder rumbling)" "(Maggie sighs) Well..." "Thanks." "Yeah." "I'm gonna see you again this weekend, right?" "Yeah." "I promise." "Okay." "Well, I'm going to hold you to it." "Yeah, when don't you?" "Hey, wait." "Wait." "I love you, okay?" "(sobbing)" "Maggie:" "I love you, too." " I'm gonna let you go." " Okay." "Maggie:" "Dad?" "Caroline:" "Hey." "There's no need to shout." "He's downstairs." " Here." "Let me see." " Not too close." "I'll be fine." "(sniffing) Do you smell that?" "(sniffs) No." "(Maggie sniffing)" "Are you sure?" "It smells like food." "It's probably your father cooking up something you shouldn't have." "I'll get the drops." "Caroline:" "Wade?" "(thunder rumbles)" "Maggie:" "Caroline?" "You find the drops?" "No!" "No." "Hold on a sec." "(water sloshing)" "(sighs)" "Oh, hey, did you find them?" "Thanks." "So, what was Dad cooking?" " Caroline?" " Oh, uh..." "Nothing." "Hm..." "Nothing." "(somber music playing)" "(thunder rumbling)" "(phone rings)" "Caroline:" "Maggie?" "Phone!" "Maggie:" "Hello?" "Trent?" "What?" "Man:" "Trent." "Please." "Just open the door." "Please." "(crying, sniffling)" "What are you doing in here?" "Just let me talk to him." "(sniffles)" "Trent?" "Maggie." "I can't open the door." "I smelled him, Mag." "I can't go to quarantine." "(police radio chatter)" "Man on radio:" "We're ready for the extraction and will confirm with you" " that we are en route." " Easy, gentlemen." "Easy." "Man #2 on radio:" "Go ahead with the extraction." "Your uncle said he would take care of you!" " He said it wouldn't be like the others." " I won't go!" "Look, I know that you're scared." "(sobbing) I am, too." "But you are so strong." "I've always seen that in you." "Just... just let me in!" "This is the police." "We are entering the home!" "(gasps)" "Let's go." "(panting)" "Get away from the door, Maggie." "Maggie?" "Please?" "You need to open the door!" "Come on, son." "It's time." "Father:" "Trent?" "Just open the door." "Step back, son." "Dad?" "Please?" "Dad, please!" " Dad!" "Dad!" "Dad!" " Listen." " It's gonna be okay!" "Trent!" " Maggie!" " It's gonna be okay!" " (Maggie sobbing)" "Go home, Maggie." "Just go home." "(insects buzzing)" " (gasps) - (fox yipping)" "(gulps)" " (gasps) - (fox yipping)" "(fox yipping)" " (fox yipping) - (thunder rumbles)" "(raspy breathing)" "(fox whimpering)" "(fox yipping)" "(raspy breathing)" "Dais?" "Maggie!" "(muffled noises)" "(Caroline, muffled) Wade?" "Oh!" " Maggie!" " (shouting)" "(echoing) Wade!" "Wade!" "We have to take her in!" " No!" "No!" "No!" " We have to take her in now!" "(muffled) No!" "(muffled, garbled voices)" "(Wade, muffled) Look at me." "Look at me." "Good, Daisy baby." "That's good." "Now tell me." "What happened?" " Hey, come on." " Don't!" "I'm not moving!" "I'm not moving." "He was afraid of me." "I didn't know it." "I didn't know it." "I swear, I didn't know it." "I didn't know it." "Wade:" "What was?" "What was afraid of you?" "The fox." "The fox." "(panting)" "I heard..." "I heard it and then I..." "And then I caught it in the trap, and it smelled... (sobbing) I couldn't stop." "I couldn't stop." "I couldn't stop." "Daddy, I just wanted to help it!" "Daddy, I just wanted to help it!" "I'm sorry!" "(Maggie sobbing)" "(whispers) Don't." "Maggie:" "I'm sorry." "(Maggie sobbing)" "It's okay." "(sobbing continues)" "It's okay." "(fox whimpering)" "(fox whimpering)" "(gunshot)" "(raspy breathing)" "Wade, please, just call them." "It's time now." "She has to go in." "What if it was Molly?" "Or Bobby?" "After everything that we've been through, you still think it's about that?" "I've loved her like she was my own, but she's not her anymore." " Wade, please." " Don't." "(door closes)" "(chuckles) I'm chewing so loud." "She was afraid of me, wasn't she?" "When did she leave?" "Wade:" "Yesterday." "(clears throat) I don't feel well." "(thunder rumbles)" "(wood creaking)" "(footsteps recede)" "(sighs)" "Ray:" "You got enough firewood there?" "Wade:" "Well, if you'd get the power turned back on again," "I wouldn't have to do this everyday." "(Ray laughs) Well, you know that's not my department." "So, why are you here?" "Need to talk to you about Mag." "The time's come, Wade." "Can we see her?" " Holt:" "This is bullshit." " Ray:" "Holt." "No." "She's well beyond the time." "She needs to be in quarantine." "We've got an entire town to protect!" "I'm going to the house, Wade." "You know she needs to be in quarantine." "Wade..." "Get out of my way." "Ray:" "Now, come on, boys." "We don't need this." "Wade, just... let us take a look at her." "All right?" "You're not gonna take her in." "(grunting)" " (groaning)" " Wade!" " (groaning)" " Ray:" "Wade!" " Stop!" " (gun cocks)" " (grunting, groaning)" " Maggie:" "Stop it!" "(wheezing) Leave us alone." "Ray:" "Maggie?" "Maggie, you tell me you're doing okay, and we'll leave." "All right?" " Ray, look at her." " (wheezes)" "I'm all right." "Good." "That's all I needed to know." "Get your ass in the car." "Get in the goddamn car." " Wade:" "Now, Ray..." " Ray:" "Shut up and listen." "I'll be back." "Between now and then, you need to figure out what you're gonna do." "I'm sorry about what happened." "I am... but you and her ain't the only ones in this town." "(thunder rumbles)" "(car doors open, close)" " (Maggie wheezing)" " Wade:" "Are you okay?" " Maggie:" "Are you?" " Wade:" "Yeah." " Maggie:" "What happened?" " Wade:" "Sit down." "Maggie:" "They wanna take me away, don't they?" "Wade:" "Don't worry." "You're not going anywhere." "(wheezing breaths)" "Wade:" "There's something I want to show you." "(classical score playing)" "Maggie:" "It's Mama's garden." "But how?" "Wade:" "It was your idea." "Before you ran off, you said that I should plant some daisies in Mom's garden." "That they would grow." "After you left," "I planted some." "And when we came back, this was here." "It's the most beautiful thing ever." " Thank you." " You're welcome." "Maggie:" "You have to promise me that you'll do it." "(sobs) Please." "Promise me that you'll make it stop." "I just can't..." "I can't do it anymore." "You know?" "Please, Dad." "Please?" "You have to do it." "Please." " (sobbing) Please." " Okay, baby." "This is what they give the quarantined." "You want my personal opinion?" "Use that instead." "Hey, munchkins." "I just wanted to call to say that I love you guys." "Bobby, Molly." "I just wanted to say..." "Is that you, Allie?" "Tell him thank you for bringing me home." "I just..." "It was horrible." " I'm so lucky to have you." " (disconnection tone beeping)" " Dais?" " (weakly) No." "No." "Maggie, what happened?" " (gasping)" " Maggie!" " (beeping continues) - (Maggie screams)" "Maggie!" "Snap out of it!" "Maggie!" "Snap out of it!" " (both shouting)" " Come on!" "Come on, don't do this!" "Not yet." "Maggie?" "Snap out of it." "Come on." "Daddy?" "(wheezing) Daddy?" " That's my girl." " (Maggie wheezing)" " That's my baby." " Daddy." "(beeping continues)" "(raspy breathing)" "(somber music playing)" "(thunder rumbles)" "(music continues)" "(Maggie wheezing)" "(raspy breathing)" "(wheezing)" "(sniffing)" "(sniffing continues)" "(kisses)" "(soft rasping breaths)" "(door opens)" "(door shuts)" "(sighs)" "(wheezing)" "(wind blowing)" "(classical score playing)" "(music continues)" "(classical score playing)" "(somber music playing)" | 2023-09-21T01:27:13.970301 | https://example.com/article/2558 |
My little pembroke Corgi battling dog allergies. Sometimes she gets the worst allergy attacks. I feel so much for her. Her eyes and nose run, she sneezes and bites her little paws and hips. Sometimes she gets itchy right under her chin. … | 2024-05-28T01:27:13.970301 | https://example.com/article/2873 |
This invention relates generally to the field of sensors. More particularly, in certain embodiments, this invention relates to industrial sensors such as optical, magnetic, capacitive, inductive, etc.
There are many applications for sensors such as photoelectric sensors. These devices are used in many industrial applications to detect, for example, the presence or absence of a part on an assembly line. Such devices might, for example, incorporate a photoelectric transmitter and receiver which detects the presence or absence of varying amounts of light transmitted from the transmitter and received by the receiver as an indication of the presence or absence or type of the part on the assembly line. In other examples, an inductive sensor might incorporate an excitation oscillator (transmitter) and a receiver which detects the presence or absence or change in frequency of varying amounts of magnetic field originated by the transmitter.
In the industrial environment, there are many applications for such devices. Each application, in general, must be individually engineered and adjusted so that it functions properly within the parameters of the installation. For example, for a given transmitter output level, a small amount of receiver gain is needed in order to detect an object which is only a short distance away from the sensor. However, much larger receiver gain is required to detect the same object farther away from the sensor. Additional adjustments may be required to account for differences in size and background of the object and throughout the life of the sensor to compensate for the effects of the operating environment.
In conventional sensor systems, these gains are often adjusted by manual adjustment of a potentiometer. Unfortunately, in harsh industrial environments, these potentiometers can become dirty or noisy. Moreover, the potentiometers are frequently damaged by over or under adjustment and are prone to drift with time, component aging, vibration, etc. Furthermore, the fact that access to the sensors is required for routine adjustment can lead to a compromise in sensor location from the perspective of performance or safety. In some applications, significant system down time can be required to safely perform routine sensor adjustment and maintenance. Computer controlled sensors can be utilized to ameliorate some of these issues. However, the cost and size of computer controlled sensors has lead to poor acceptance in the marketplace.
The current state of the art in intelligent sensor architecture can be summarized in two approaches: 1) microcontroller based sensor units made to interface to discrete elements directly, creating high component count, fault susceptible, noise sensitive units; and 2) microcontroller based units made to interface to industry standard stand-alone ASICs, providing, inflexible component intensive solution with minimum xe2x80x98system visibilityxe2x80x99.
Currently, the sensor market is dominated by large and expensive to manufacture sensor devices which are application specific (i.e. no onboard microcontroller control). Over the last few years there has been a slow introduction of microcontroller controlled sensors which offer few additional features over the older type sensors but at significant price/size premiums. With the exception of the microcontroller these sensors are architecturally equivalent to their predecessors. Both types of the sensor families provide support for a variety of features, but they do so by providing a host of sensor models individually tailored to the application with a minimum number of user programmable configuration options and with a price structure based on the overall volume associated with each model. Since the cost of these units is also volume dependent market penetration of non essential features tends to be limited. Furthermore, custom feature sets that might be desirable by some users require significant engineering to produce limiting the economic attractiveness of small volume users.
The present invention overcomes many of these problems by providing a low cost flexible sensor architecture as will be described hereinafter.
The present invention relates generally to electronic sensor devices. Objects, advantages and features of the invention will become apparent to those skilled in the art upon consideration of the following detailed description of the invention.
In one exemplary embodiment of the present invention a sensor circuit operates under control of a controller circuit. The sensor circuit includes a front end circuit which receives an input signal from a sensor and amplifies the input signal to produce an amplified signal therefrom. A demodulator receives the amplified signal and converts the amplified signal to a digital signal. An interface circuit is coupled to the controller and relays operational parameters and commands from the controller to the demodulator and the front end circuit. An output circuit produces an output signal in response to commands from the controller.
A method of controlling a sensor operation to detect an event in accordance with an embodiment of the invention, includes in a controller, driving a sensor transmitter and acquiring sensor state information from an interface circuit at timed intervals; conducting an analysis of the sensor state information in the controller to determine if the event has occurred; and if the event is deemed by the controller to have occurred, taking a programmed action.
A method of controlling the operation of a sensor circuit in accordance with another exemplary embodiment of the invention includes providing an optical transmitter coupled to an output of the sensor circuit; providing an optical receiver coupled to an input of the sensor circuit; transmitting status information to a remote controller via the optical transmitter; and receiving optical information from the remote controller via the optical receiver.
A method of adjusting a sensor parameter in accordance with another embodiment of the invention includes detecting a first actuation of a switch for a period of time, said first actuation of the switch enabling an adjustment mode; detecting subsequent actuations of the switch occurring within a time window; and adjusting a sensor parameter in accordance with a switch actuation occurring within said time window.
A method of communication with a sensor using an optical remote controller in accordance with another exemplary embodiment of the invention includes receiving a sequence of light pulses from the optical remote controller representing a password; comparing the password with a stored reference password; and if the password equals the stored reference password, receiving a sequence of light pulses from the optical remote controller representing a first data word.
A method of manufacturing a sensor device according to an embodiment of the invention includes interfacing a controller circuit to a transceiver circuit, the transceiver circuit including a front end circuit; connecting a sensor to the front end circuit; and transmitting programming information to the sensor device through the sensor to establish operational characteristics of the sensor device.
The intelligent sensor platform as described in this summary and hereinafter is described in exemplary embodiments primarily using optical LED transmitter and receiver. However, the present platform is extremely flexible and can be used with other types of sensors such as audible, inductive, capacitive, ultrasonic, microwave, RF or other sensor types without departing from the invention. | 2023-12-04T01:27:13.970301 | https://example.com/article/5587 |
---
abstract: 'Fano varieties are subvarieties of the Grassmannian whose points parametrize linear subspaces contained in a given projective variety. These expository notes give an account of results on Fano varieties of complete intersections, with a view toward an application in machine learning. The prerequisites have been kept to a minimum in order to make these results accessible to a broad audience.'
address: 'Humboldt-Universität zu Berlin, Institut für Mathematik, 10099 Berlin, Germany'
author:
- Paul Larsen
bibliography:
- 'bibliography.bib'
title: Notes on Fano varieties of complete intersections
---
| 2024-05-04T01:27:13.970301 | https://example.com/article/7208 |
This stuff is wicked! Although it'll make you cough a lot, we all know ya gotta "cough to get off"
Great bake, no sleep review by Jordan on 10/13/2017
Rating
Tastes great. Max chill. Heavy munchies. Haven't giggled like a school girl in a long time but this sure made me giggle. However, it is definitely not a good sleeper like Blackberry Kush or Gorilla Glue. Kept waking up, tossing and turning, no kush coma, and it took a long time to wear off.
Not bad.. review by Andrew on 10/10/2017
Rating
Well when I got it, I got a Q and it was all small buds, and didn't look like in the picture, so was shocked as every order from treemo has been on point..
Unexpected review by Steven on 10/7/2017
Rating
Ordered this and got something completely different then what was in the picture. my bud has no crystals or purple you can clearly see it in the pic, I tried it and it definitely isn’t worth 14 a gram I got mk ultra and is 10x better and it’s 13 a gram
Incredible *****++ review by Spence on 10/6/2017
Rating
If you don’t like the price, don’t buy it!!
Best strain I’ve smoked to date!
Great sleep aid!!
These reviews are about the cannabis not the price, ok Derek and Jared
Getting Greedy Treemo? review by Jared on 10/6/2017
Rating
I have not sampled this strain so I cannot comment on the quality of the plant. But I can comment on the price. OUTRAGEOUS!
I have left a similar review for the grand master death strain. I paid their high price expecting well above average smoke. I was very disappointed to say the least. the quality of all their weed is average to good across the board, which is fine but none of your weed is worth more than 10/gr with volume discounts. There is weed out there that is worth the premium price but either Treemo keeps it for themselves or they are not stocking the good stuff.
Treemo I love your service but please try to keep costs down while keeping quality high.
Fried review by Kevin on 10/5/2017
Rating
I ordered this from a previous batch to try it and I haven't been this high in a long time. Will be re-ordering.
Muerte review by Pazmanian on 10/4/2017
Rating
While I may not agree with the price, this bud is the real deal, tastes great and hits hard!
Didn't like it review by Sherry on 10/2/2017
Rating
Received this as a replacement for another item. I didn't enjoy it. I found it made me paranoid and anxious.
Not good enough review by Derek on 10/2/2017
Rating
For $350 for an ounce I should damn near lose feeling in my body .. make me feel like I'm back in high school getting ripped off.. This cost to grow the same amount of money as other buds and this plants has a very comparable yield .. don't buy this let them know you need help not to be broke and sick the price is outrageous and honestly never paid close to that much for any weed ever in my life and before everyone gave them names trust me I smoked better then this for the $220 range .. I've been smoking weed everyday for 22 years and this is gross ..nit to mention treemo has not responded to my last 3 messages and I've waited a month... | 2024-03-25T01:27:13.970301 | https://example.com/article/7440 |
[Anti-allergic properties of pipethiaden--a new preventive agent for migraine].
Pipethiadene, a prophylactic of vasomotoric headaches of the series of 4,9-dihydrothieno(2,3-c)-2-benzothiepine derivatives, shows a peripheralpharmacological profile of an antiallergic agent. The experiments in rats showed a high antianaphylactic effect of pipethiadene in the passive cutaneous anaphylaxis (PCA) test. Pipethiadene also exerted intensive antianaphylactoid action in rats on the liberator of histamine, compound 48/80, on dextran, and in the use of a combination of ovalbumin with indomethacin. In comparative pharmacological experiments with pizotifen and cyproheptadine an attempt was made to estimate the relative role of histamine and 5-hydroxytryptamine 5-HT) mediators in the employed experimental procedures in rats. | 2024-06-05T01:27:13.970301 | https://example.com/article/5213 |
Marxism
The two founders of Marxism were Karl Marx and Friedrich Engels. Karl Marx wrote “The Communist Manifesto” which lays out the foundations of Marxism. He also wrote ‘Das Kapital’. These volumes critically analysed capitalism. Engels edited in part ‘Das Kapital’ and he also wrote ‘The Origin of the Family, Private Property, and the State’, a book which links capitalism to the family.
Historical materialism is the idea that development is in correlation to the emergence of the maintenance of social classes. Historical materialism sees history as progressive but rejects the idea that it is the actions of individuals. Marxists see that the key dynamism is economic development. Historical materialism is a theory of historical development through economic or material forces rather than political or social ones.
In the ‘Economic and Philosophical Manuscripts’ of 1844 Marx identified four types of alienation in labour under capitalism:
There is the alienation of the worker from the work he produces, from the product of his labour. The product’s design and the manner in which it is produced are determined not by its actual producers, nor even by those who consume the products, but rather by the capitalist class, which appropriates labour – including that of designers and engineers – and seeks to shape consumers’ taste in order to maximize profit. The capitalist gains control of the worker – including intellectual and creative workers – and the beneficial effects of his work by setting up a system that converts the worker’s efforts not only into a useful, concrete thing capable of benefiting consumers, but also into an illusory, concept – something called “work” – which is compensated in the form of wages at a rate as low as possible to maintain a maximum rate of return on the industrialist’s investment capital. Furthermore, within this illusory framework, the exchange value that could be generated by the sale of products and returned to workers in the form of profits is absconded with by the managerial and capitalist classes.
This is coupled with the alienation of the worker from working, from the act of producing itself. This kind of alienation refers to the patterning of work in the capitalist means of production into an endless sequence of discrete, repetitive, trivial, and meaningless motions, offering little, if any, intrinsic satisfaction. The worker’s labour is commodified into exchange value itself in the form of wages. A worker is thus estranged from the unmediated relation to his activity via such wages.
Capitalism removes the right of the worker to exercise control over the value or effects of his labour, robbing him of the ability to either consume the product he makes directly or receive the full value of the product when it is sold: this is the first alienation of worker from product.
There is the alienation of the worker from himself as a producer, from his or her “species being” or “essence as a species”. To Marx, this human essence is not separate from activity or work, nor static, but includes the innate potential to develop as a human organism. A man’s value consists in his ability to conceive of the ends of his action as purposeful ideas distinct from any given step of realizing them: man is able to objectify his intentional efforts in an idea of himself (the subject) and an idea of the thing which he produces (the object).
There is the alienation of the worker from other workers or producers. Capitalism reduces labour to a commercial commodity to be traded on the market, rather than a social relationship between people involved in a common effort for survival or betterment. The competitive labour market is set up in Industrial Capitalist economies to extract as much value as possible in the form of capital from those who work to those who own enterprises and other assets that control the means of production. This causes the relations of production to be based on conflict… i.e. it pits worker against worker, alienating members of the same class from their mutual Interest, an effect Marx called false consciousness.
Marx believed that capitalism can only thrive on the exploitation of the working class.
Marx believed that there was a real contradiction between human nature and the way that we must work in a capitalist society.
According to Marx, capitalism largely shapes the educational system. Without the education system, the economy would become a massive failure as without education we are without jobs and employment which is what keeps society moving. Education helps to maintain the bourgeoisie and the proletariat so that there can workers producing goods and services and others benefiting from it. Schools transmit an ideology which states that capitalism is just and reasonable. The ruling class project their view of the world which becomes the consensus view (hegemony).
Secondly, schools prepare pupils for their roles in the workforce. Most are trained to accept their future exploitation and provided with adult qualifications to match their future work roles. Bowles and Gintis introduced their correspondence theory that there is a close correspondence between the educational system and the workforce. This is essential for social reproduction. Marx also believed in the myth of meritocracy in that people are led to believe that we achieve according to merit in society. However, it could be related to class and affluence.
Marxists do not believe that society is based on a value consensus and operates to benefit all. The family is seen as one of a number of institutions which serves to maintain the position of the ruling class. The family is shaped by the requirements of capitalism to serve, support and maintain it. As the family is unit of consumption the economy largely relies on the funding of the family, they buy things which largely benefit a capitalist society. This also links to economic determinism which is another reason as to why the family is essential, without the family there would be no economy. The family also reproduce a labour force another thing that benefits the economy and the family have authority when raising children and conforming them to their ways of society.
Marx predicted that the working class would get poorer (pauperisation); that the rich would get richer and that society would move to two different diametrically opposed areas (polarisation); Marx believed that the middle class would be sucked into one of these areas but would not remain a separate entity and that a class struggle between the rich and the poor would lead to revolution in which the poor would remove the rich. | 2024-05-09T01:27:13.970301 | https://example.com/article/2358 |
FUTURE
In 20 years AUCA has become one of the best universities in Central Asia. The next 20 years will focus on building an institution that not only grows with Central Asia, but also grows and innovates for the world. Bolstered by strong university leadership, AUCA’s talented and motivated students, faculty, and staff will ensure that AUCA develops new methods and ideas for delivering a liberal arts education.
In 2015 AUCA will take a major step towards its future when it opens a new campus in Bishkek. The new academic building will be the first in Central Asia to use renewable geothermal energy for heat and cooling, and will be an open case study for sustainable energy use in the region. | 2023-08-15T01:27:13.970301 | https://example.com/article/4847 |
China Mobile Limited (CHL), the largest wireless carrier in the world by subscriber base, intends to sell 100 million mobile phones in 2013 with almost 80% of it in smartphones. This indicates a remarkable improvement of 25% over 2012 expected sales of 70-80 million units. A potential deal with the world’s second largest smartphone manufacturer Apple Inc. (AAPL) can be attributable for the raised guidance.
China Mobile covers more than half of the Chinese mobile market with a subscriber base of 698.51 million at the end of third quarter 2012. Nevertheless, the company’s 3G customers comprise only 11% (75.6 million) of its huge subscriber base.
Two of its closest rivals – China UnicomLimited (CHU) and ChinaTelecom Corp. (CHA) – with subscriber base of 229.49 million and 152.62 million, respectively, lags far behind but have far better 3G customer concentration than China Mobile. This provides China Mobile a significant opportunity to tap this under penetrated 3G market.
China Mobile’s biggest flaw is that it offers mobile service based on Time Division-Synchronous Code Division Multiple Access (TD-SCDMA) technology, which is not very well supported by the handset makers including Apple Inc.’s iPhone, resulting in lower upload/download speed. However, the competitors like China Unicom and China Telecom offer their services through globally acknowledged Wide Band Code Division Multiple Access (:WCDMA) technology.
With nearly a billion cell phone users, China Mobile offers a huge smartphone market, which is still being dominated by Google Inc.’s (GOOG) Android operating system (:OS) and Apple’s iOS comes at a distant second place.
The company has been in talks with Apple for quite some time in order to develop a TD-SCDMA iPhone, although nothing has been finalized yet. We believe China Mobile has to strike a deal with Apple sooner rather than later to have any realistic chance of achieving its 2013 smartphone sales target.
China Mobile currently has a Zacks #2 Rank, implying a short-term Buy rating.
Zacks Equity Research provides the best of quantitative and qualitative analysis to help investors know what stocks to buy and which to sell for the long-term.
Continuous coverage is provided for a universe of 1,150 publicly traded stocks. Our analysts are organized by industry which gives them keen insights to developments that affect company profits and stock performance. Recommendations and target prices are six-month time horizons.
Zacks.com is a property of Zacks Investment Research, Inc., which was formed in 1978 by Leon Zacks. As a PhD from MIT Len knew he could find patterns in stock market data that would lead to superior investment results. Amongst his many accomplishments was the formation of his proprietary stock picking system; the Zacks Rank, which continues to outperform the market by nearly a 3 to 1 margin. The best way to unlock the profitable stock recommendations and market insights of Zacks Investment Research is through our free daily email newsletter; Profit from the Pros. In short, it's your steady flow of Profitable ideas GUARANTEED to be worth your time! Register for your free subscription to Profit from the Pros at http://at.zacks.com/?id=5518.
Disclaimer: Past performance does not guarantee future results. Investors should always research companies and securities before making any investments. Nothing herein should be construed as an offer or solicitation to buy or sell any security. | 2023-11-27T01:27:13.970301 | https://example.com/article/9416 |
/**
*
*/
/**
* @author Joschka
*
*/
package org.matsim.contrib.parking.parkingsearch.sim; | 2023-09-24T01:27:13.970301 | https://example.com/article/1123 |
Poor Rena! XD She's so cute when she gets flustered, and it was great seeing it in action. The characters were kept in character too, and we didn't have to see Rena in her yandere mode to get the humor out there ("USO DA!" STILL can make me flinch... :x). | 2023-10-25T01:27:13.970301 | https://example.com/article/1087 |
We stay ‘overweight’ on Lupin, driven by stable performance with consistently improving cash generation and robust pipeline (average of 25-30 launches over next three years) for the US to maintain past performance. Vertical integration of the Japanese business and higher utilisation in Indore will drive the margins higher.
We raise our price target to R747 on increased FY14e EPS. On FY14e estimates, Lupin currently trades at a PE of 17.6x and EV/Ebitda of 11x. Highlighting a strong two-year sales/EPS CAGR of 18.6%/21.3% and better-than-peer returns, we expect further re-rating to 10% premium versus peers.
Revenue pick-up in the US (41% y-o-y) and Japan (48% y-o-y) surprised, driven by new launches and TRx rise, as highlighted in our US monthly reports. OPM spike was another strong surprise, with Ebit of 18% and 29% versus our and consensus estimates, while tax rates of 38% surprised negatively. Lupin continues to be one of Barclays’ top picks in global healthcare.
We believe revenue growth for the US to be better than forecast. Lupin is poised for a solid year ahead. As highlighted in our Q3 preview, Suprax TRx did pick up materially, with progress on generic Tricor and OCs.
Strong growth in Cefdinir and Cefprozil (more than 50% growth in Q3) surprised. Momentum in OCs continues and we anticipate 4-5 additional launches in 2013. Our view of Lupin as one of the best global generic plays was reaffirmed by its aspirational goal of $3 billion by 2015. This implies a run rate of 22-24% CAGR, which is achievable.
We also foresee growth to pick up in domestic market. Affected by the industry-wide muted growth levels (at 4% y-o-y) in Q3FY13, Lupin reported a weak performance at the domestic level (at 10% y-o-y).
Management OPM goal translates to a 300-400 bps improvement in ROIC. Notwithstanding a spike in OPM in Q3, the management indicated it would aim for an OPM improvement by at least 100 bps per year for the next 2-3 years. This translates to ROIC improving by ~100-200 bps from the current levels. | 2023-09-20T01:27:13.970301 | https://example.com/article/3319 |
//
// Data+HexDescription.swift
// CryptoLoadExternalCertificate
//
// Created by Ignacio Nieto Carvajal on 6/10/16.
// Copyright © 2016 Ignacio Nieto Carvajal. All rights reserved.
//
import Foundation
extension Data {
var hexDescription: String {
return self.map { String(format: "%02hhx", $0) }.joined()
}
}
| 2023-12-23T01:27:13.970301 | https://example.com/article/9093 |
1. Field of the Invention
The present invention relates to an image forming apparatus based on, for example, an electrophotographic scheme, and a density adjusting method for the apparatus.
2. Description of the Related Art
For color image forming apparatuses that print color images on the basis of an electrophotographic scheme, a process of adjusting the image forming apparatus (this process is hereinafter referred to as an image adjusting process) needs to be executed in a sequence different from an image forming process of actually forming images, in order to stabilize the quality of formed (printed) images. Control for the image adjusting process includes an ATR (Automatic Toner Refresh) patch detection process of making the color perception of formed images constant and ATVC (Automatic Transfer Voltage Control) that allows a toner image formed on a photosensitive member to be appropriately transferred to a paper or a transfer member.
The ATR patch detection process is control which makes the color perception of formed images constant and which maintains the fixed concentration ratio of toner to a carrier (developing material) in a developer. This control periodically supplies a developer with toner the amount of which is equal to that of toner consumed for image formation. Toner supply is controlled by forming a patch image on a photosensitive member or a transfer member so that a photo sensor placed opposite the patch image formed detects reflected light from the patch image to determine the concentration ratio of the developing material to the toner.
Image forming apparatuses such as printers and copiers transfer a toner image formed on a photosensitive drum that is a photosensitive member or on an image carrier to a print sheet (transferred member) such as a sheet of paper or an intermediate transfer member. On this occasion, a transfer member such as a transfer roller is abutted against the photosensitive drum to form a transfer nip (transfer site). A transfer bias is then applied to the transfer member with the print sheet passed through the transfer nip. This allows the toner image on the photosensitive drum to be transferred to the print sheet. The transfer roller, serving as the transfer member, normally has its resistance value appropriately adjusted by dispersing conductive particles in an elastic member such as rubber or sponge. However, the resistance value of such a transfer roller varies significantly as a result of a manufacturing variation, an environmental variation, or the lifetime. This makes it difficult to offer high transferability through stable application of the transfer bias.
Ideally, the amount of electric charge applied to the back surface of the print sheet is appropriately controlled in order to offer constant high transferability. To achieve this, for example, the transfer roller may be controllably subjected to a fixed current. However, the passage width (the width of print sheets perpendicular to a conveying direction) of print sheets for the image forming apparatus is not fixed. The width of a part of the transfer roller which directly contacts the surface of the image carrier thus varies depending on the width of print sheets used. This causes the load impedance of the transfer roller with respect to the surface of the image carrier to vary between a part of the transfer roller which contacts the print sheet and a part which does not contact the print sheet. Particularly in an area in which no print sheet is present (the drum or the intermediate transfer member directly contacts the transfer roller), the load impedance is so small as to allow a large current to flow in a concentrated manner. This may result in low transferability in an area in which the print sheet is present.
To eliminate such a disadvantage of the simple constant current control, an ATVC scheme has been proposed. This scheme passes a given current through the transfer roller with no print sheet at the transfer nip and records a generated voltage required for the transfer; the given current is determined by assuming a current passed through the transfer roller during a transfer operation. During actual transfer, a corrected voltage is applied which is equal to the generated voltage, the generated voltage multiplied by a coefficient, or the generated voltage to which a constant is added. However, the ATVC scheme requires a constant current circuit, which increases costs. Moreover, the ATVC scheme employs a hardware configuration with a capacitor as means for storing an output voltage during a constant current operation. Thus, the output voltage during transfer may be affected by a variation in capacitor voltage caused by leakage, the tolerance of gain resistance, or a variation in temperature characteristics. Further, the ATVC scheme is implemented using hardware. As a result, constants, for example, a constant current value and coefficients required to correct the generated voltage to the appropriate transfer voltage are determined in a stage of a circuit design of the image forming apparatus. Thus, the ATVC scheme is disadvantageously limited to the simple bias control.
To eliminate this disadvantage, a software-based ATVC scheme has been proposed which uses means for digitally increasing or reducing the voltage applied to the transfer roller, means for detecting a current flowing from the transfer roller into the image carrier, and means for determining whether or not the current flowing from the transfer roller into the image carrier has reached a desired value (target current). This scheme enables the current flowing from the transfer roller into the image carrier to converge to a given value to achieve control equivalent to that of the constant current circuit in the hardware-based ATVC scheme. The software-based ATVC scheme applies a transfer bias step by step and detects a current flowing from the transfer roller into the image carrier. When the current flowing from the transfer roller into the image carrier reaches the target current value, this control is ended. The transfer bias is then stored in a RAM or the like so as to be applied during the following transfer. However, this ATVC scheme requires the output voltage to be repeatedly varied step by step until the current flowing from the transfer roller into the image carrier reaches the given value. This disadvantageously increases control time. If the circumferential resistance of the transfer roller varies markedly as a result of a manufacturing error, the current at each output voltage is desirably determined by averaging the current values obtained during at least one rotation of the transfer roller. If the current detecting circuit operates under a state of heavy noise, the current at each output voltage is desirably more frequently sampled for averaging. However, such an averaging process further increases the control time.
The above ATR patch detection process and ATVC process are adjustive control required to allow the apparatus to output stable images. However, during the execution of the ATVC, the current flowing from the transfer roller into the image carrier needs to be monitored with the transfer voltage varied until the current converges to the given target value. Thus, an attempt to control ATR patch detection during the ATVC may cause a patch image for the ATR patch detection control to be affected by a variation in transfer voltage based on the ATVC. This may lead to incorrect density corrections. Thus, these control operations needs to be sequentially executed.
In short, the conventional system must sequentially execute the ATR patch detection process and ATVC process at different timings; both the ATR patch detection process and ATVC process are adjustive control required to stabilize images. Thus, the duration of the adjustments equals the simple sum of the control times of the ATR patch detection and the ATVC process. This may disadvantageously degrade productivity for users.
Japanese Patent Laid-Open Nos. 2001-166553 and 2002-014505 disclose the simultaneous execution of image density correction and auto registration correction. However, these documents do not teach the image density correction executed in parallel with the ATVC. | 2023-12-06T01:27:13.970301 | https://example.com/article/9465 |
Taking the nip out of cosmetic surgery
Threading technology creates youthful, refreshed appearance
Threading technology creates youthful, refreshed appearance
There's a new wind blowing in the field of plastic surgery and it's breathing more natural life into face-lift procedures.
Increasingly, patients demand procedures that are less invasive, leave fewer and less noticeable scars and produce a more natural appearance, says Dr. Donald Kress, a plastic surgeon in Frederick, Md.
Enter barbed sutures, a recent U.S. Food and Drug Administration approved technology that uses the design of porcupine quills to help both women and men get a more youthful, refreshed appearance.
"You do about 60 percent of a face-lift with no cuts in about an hour in the office," says Kress, summarizing the procedure.
Advertisement
Barbed sutures are about the thickness of fishing line with small barbs that extend in one direction, much like a porcupine quill. To implant the threads, surgeons insert them using a hollow needle and pass the strings under the skin and between the fat tissues and facial muscles. Once in place, the doctor pulls the threads up creating the desired lift effect.
"When all of the threads are in, you can watch everything go up," Kress says. "The patient is very much a part of the procedure both for the marking, and adjusting the threads in the end." The patient is awake for the entire procedure, which can be done in a doctor's office.
Much like a quill that embeds barbs into tissue as it is pulled out of the skin, barbed sutures technology uses Mother Nature's defense mechanism to engineer a new way to move skin and close wounds.
Internal lift
Contour Threads inventor Dr. Gregory Ruff is the chairman of Quill Medical Inc., a company that uses the porcupine concept to develop multiple surgical devices with uses in general surgery and orthopedic fields as well as in plastic surgery. Quill Medical has patented barbed sutures under the name Contour Threads.
"Greg Ruff is an academic," says Kress, who knows Ruff well. "He is very interested in improving wound closure. He started out with noncosmetic (motives)."
Contour Threads represent a shift in approach to moving skin. Rather than stretching skin externally, the threads are an internal way to move tissue around. One application for the technology is to implant threads under the skin to close wounds instead of using stitches on the surface.
"Every time you put a stitch on the surface, you risk breakage and also leaving a scar," Kress explains. Quill technology offers the possibility of minimizing such scarring.
Kress said he believes Contour Threads or related barbed thread technologies eventually could be used to lift breasts or the butt for more shapely appearances, he says.
Take it easy, doc
"Plastic surgery patients want shorter, minimally invasive procedures that produce results and have limited downtime," said Dr. Leroy Young in a written statement. Young is chairman of the American Society of Plastic Surgeons Committee on Emerging Trends. According to Young, technologies that incorporate barbed sutures meet demands of plastic surgery patients.
For now, Contour Threads can be used to lift sagging skin through the cheeks, forehead, brows and neck.
The "thread lift" is considered to be more akin to "mini" or regionalized face-lifts than a traditional face-lift. The results are expected to last three to five years "which is about half the time of a traditional face-lift," Kress says. The procedure also costs less than a traditional lift. Depending on how many threads are used, a thread lift can cost $3,000 to $4,000, Kress says.
Men see appeal
The ideal thread lift patient is between 35 and 45 years old or has already had a traditional face-lift and would like a "touch up," Kress says. It is important that the patient have an average weight. Someone who is too thin wouldn't have enough fat to properly place the threads, he explains. For a more overweight patient "the tissues just won't move," he says.
Men are taking to thread lifts in greater numbers than traditional face-lifts, Kress says. About 30 percent of his threading patients are male - compared to 10 percent of his traditional face-lift patients - and he expects that amount to grow.
"Most men are not interested in a full face-lift," he says. "There are good reasons for that too. Men wear their hair short and it's much harder to hide scars."
New in America but not world
Some surgeons are skeptical about the technique and the amount of time the threads will hold skin in a position that counters gravity. Since the threads have only been used in the United States for about a year, it's not known how long the results will last.
Canadian surgeons have been using the threads for several years and reports indicate the majority of women and men who received the thread lift are pleased with the results for at least three to four years. The American Society of Plastic Surgeons continues to monitor the technology and has discussed it at annual meetings.
Contour Threads is the only FDA-approved barbed suture thread on the market. Versions of the thread have been produced by companies in Russia and Singapore, all of which Kress has used. However, he feels the approved thread is the best option for patients.
There are possible complications reported with the surgery. Swelling, bruising and headache have been reported as well as infection and thread rejection. It is also possible that the thread can break and work its way out of the skin. Swelling and some bruising can be expected for a few days after the procedure, Kress says. Surgical Specialties Corporation reports that less than 1 percent of the people who are implanted with the threads have complications. | 2024-04-17T01:27:13.970301 | https://example.com/article/6802 |
Q:
Why parallel_iterations in dynamic_rnn doesn't work?
I'm wondering how to use the dynamic_rnn function and make it parallel. I set gpu_options.allow_growth = True and use tf.nn.dynamic_rnn(rnn_cell, inputs=X, dtype=tf.float32, time_major=False, parallel_iterations=50) to do so. But both the GPU memory consumption and run time don't change when I changeing the value of parallel_iterations.
It is a very simple rnn, so I think there may not be data dependency.
basic_cell = BasicRNNCell(num_units=n_neurons)
outputs, states = tf.nn.dynamic_rnn(basic_cell, X, dtype=tf.float32, parallel_iterations=50)
logits = fully_connected(states, n_outputs, activation_fn=None)
cross_entropy = tf.nn.sparse_softmax_cross_entropy_with_logits(labels=y, logits=logits)
loss = tf.reduce_mean(cross_entropy)
optimizer = tf.train.AdamOptimizer(learning_rate)
train_op = optimizer.minimize(loss)
correct = tf.nn.in_top_k(logits, y, 1)
accuracy = tf.reduce_mean(tf.cast(correct, tf.float32))
Thanks in advance! I appreciate any suggestion.
A:
Your observations don't mean that parallel_iterations don't work.
Whenever you have an RNN, you have a data dependency since the output of n'th step is fed into (n+1)'th step. In your example with BasicRNNCell, every computation is effectively dependent on previous computation. So, there are basically no opportunities to run multiple steps in parallel. With more complex cells you might have some computation in each step that is independent of previous steps (e.g. doing some attention over constant memory). In such cases there are opportunities for parallel execution of different steps.
Even if you model would allow for parallel execution, you might not be able to see it being reflected in memory usage. Memory usage depends on many factors including when TF returns memory to GPU; if you are computing gradients, you might need to keep most activations in memory whether you run iterations in parallel or not; the iterations that are run in parallel might not produce a lot of tensors; etc.
Similarly for CPU, if running stuff in parallel always helped performance, we would run a thousand threads in every process. parallel_iterations is simply a knob that is useful to have in some cases.
| 2024-05-03T01:27:13.970301 | https://example.com/article/5385 |
830 S.W.2d 113 (1992)
Eric Norman MARKS, Appellant,
v.
The STATE Of Texas, Appellee.
No. 1204-91.
Court of Criminal Appeals of Texas, En Banc.
April 22, 1992.
Frumencio Reyes, Jr., Houston, for appellant.
John B. Holmes, Jr., Dist. Atty., Carol M. Cameron, Mark Font, Asst. Dist. Attys., Houston, and Robert Huttash, State's Atty., Austin, for the State.
Before the Court en banc.
OPINION ON APPELLANT'S PETITION FOR DISCRETIONARY REVIEW
McCORMICK, Presiding Judge.
Appellant was convicted by a jury of the felony offense of possession of a controlled substance. Article 4476-15, Section 4.04, V.A.C.S.[1] After finding two enhancement repealed and the Legislature has adopted a nonallegations *114 to be true, the jury assessed punishment at thirty years' confinement in the Texas Department of Criminal Justice, Institutional Division. The Court of Appeals affirmed appellant's conviction in a published opinion. Marks v. State, 815 S.W.2d 817 (Tex.App.-Eastland, 1991). We granted appellant's petition for discretionary review to determine whether the Court of Appeals correctly held that Article 37.07, Section 4, V.A.C.C.P., enacted in 1989 pursuant to the amendment of Article IV, Section 11(a), of the Texas Constitution, and the jury instruction that it authorizes, are constitutional in light of this Court's holding in Rose v. State, 752 S.W.2d 529 (Tex. Cr.App.1987), and Article I, Sections 13 and 19 in the Texas Constitution. We shall affirm.
In our decision in Oakley v. State, delivered this day, we determined that Article 37.07, V.A.C.C.P., was properly re-enacted by the Legislature pursuant to the authority granted it in Article IV, Section 11(a), of the Texas Constitution, as amended in 1989. Oakley v. State, 830 S.W.2d 107 (Tex.Cr.App.1992). Furthermore, we determined that the amendment in Article IV, Section 11(a), does not violate the due course of law provisions in Article I, Sections 13 and 19. Appellant's case commenced on January 22, 1990, after the effective date of the constitutional amendment and its attendant legislation. Therefore, the Court of Appeals properly found that the trial court did not err in appellant's case by giving the jury instructions regarding the parole law and good conduct time.
Accordingly, the judgment of the Court of Appeals is affirmed.
BAIRD, J., concurs and files an opinion.
CLINTON and MALONEY, JJ., dissent for reasons stated in the dissent in Oakley v. State, 830 S.W.2d 107 (Tex.Cr.App., delivered this day).
BAIRD, Judge, concurring.
For the reasons stated this date in Oakley v. State, 830 S.W.2d 107, 112 (Tex.Cr. App.1992) (Baird, J., concurring), I concur.
NOTES
[1] The Texas Controlled Substance Act has been repealed and the Legislature has adopted a nonsubstantive recodification of the Act in the new Health and Safety Code. This Act took effect September 1, 1989. Article 4476-15, Section 4.04 was replaced with Section 481.112, Texas Health and Safety Code.
| 2023-09-27T01:27:13.970301 | https://example.com/article/4642 |
Transmembrane cholesterol migration in planar lipid membranes measured with Vibrio cholerae cytolysin as molecular tool.
The rate of transbilayer movement (flip-flop) of cholesterol was estimated using planar bilayers with defined initial asymmetry, formed by the opposing monolayers technique. Vibrio cholerae cytolysin (VCC) was utilized as a molecular tool for measuring the cholesterol concentration in the cis leaflet of asymmetric bilayers. To quantify cholesterol flip-flop in planar lipid bilayers, a mathematical model was developed. It considers both the lateral diffusion rate of cholesterol within each monolayer and the flip-flop rate. The difference in initial and steady-state cholesterol contents in bilayer leaflets was used as a start point. Assuming the lateral diffusion coefficient to be of 1 x 10(-8) cm(2) s(-1), the characteristic time of cholesterol flip-flop at 25 +/- 2 degrees C was estimated as <10 s. | 2023-10-09T01:27:13.970301 | https://example.com/article/2547 |
Q:
What should go in my ~/.vimrc file? (tab-related question)
I would like tabs in my source code to remain tabs (8 spaces wide), NOT to be converted to spaces, but displayed as 2 spaces.
I recall vim being able to accomplish this.
Could anyone help me a little?
A:
You want:
tabstop=2
shiftwidth=2
noexpandtab
That will put 0x9 tab chars in the file and treat them as 2 spaces when displaying.
| 2024-04-03T01:27:13.970301 | https://example.com/article/7031 |
The assessment of changes in multiple cystic encephalomalacia with diagnostic ultrasound.
Multiple cystic encephalomalacia causes irregular cavities in both hemispheres which often enlarge causing shift of midline structures and increase in head size. Diagnostic ultrasound is the ideal method assessing the size of cysts, the need for cyst shunts and the response to treatment. | 2023-12-28T01:27:13.970301 | https://example.com/article/4203 |
Q:
How can I read a very long BLOB column in Oracle?
I want to connect a Node Express API with an Oracle 11g Database which has a table with a BLOB column. I want to read it using a SQL query, but the problem is that the BLOB column can have a very long text, more than 100k characters. How can i do this?
I tried using: select utl_raw.cast_to_varchar2(dbms_lob.substr(COLUMN_NAME)) from TABLE_NAME.
But it returns 'raw variable length too long'.
I can make multiple queries in a loop and then join them if it was necessary, but I haven't found how bring just a part of the blob.
A:
Use the node-oracledb module to access Oracle Database (which you are probably already doing, but don't mention).
By default, node-oracledb will return LOBs as Lob instances that you can stream from. Alternatively you can fetch the data directly as a String or Buffer, which is useful for 'small' LOBs. For 100K, I would just get the data as a Buffer, which you can do by setting:
oracledb.fetchAsBuffer = [ oracledb.BLOB ];
Review the Working with CLOB, NCLOB and BLOB Data documentation, and examples like blobhttp.js and the other lob*.js files in the examples directory.
You may also want to look at https://jsao.io/2018/03/creating-a-rest-api-with-node-js-and-oracle-database/ which shows Express and node-oracledb.
| 2024-01-17T01:27:13.970301 | https://example.com/article/3582 |
Genomics basics: DNA structure, gene expression, cloning, genetic mapping, and molecular tests.
Genomics is the study of the structure and function of the human genome including genes and their surrounding DNA sequences. The over 3 billion base pairs of the human genome have now been sequenced and approximately 25,000 genes acknowledged. However, only 1% of the entire genome has been assigned to protein coding and decades more work is anticipated to define the functional relevance of noncoding DNA as well as the basis and consequences of sequence variations among individuals. For medical scientists, the focus remains on discovering both disease-causing and disease-susceptibility genes. For pharmaceutical companies, the opportunity to develop molecularly targeted therapy is not going unnoticed. For the practicing physician, the prospect of genomic medicine that incorporates molecular diagnosis and pathogenesis-targeted therapy requires basic understanding of terminology and concepts in molecular biology and the corresponding laboratory tests. | 2024-02-10T01:27:13.970301 | https://example.com/article/5532 |
(2008)
Myles SINCLAIR, Plaintiff,
v.
CITY OF ECORSE, a Michigan Municipal Corporation; Dave Jacobs, Superintendent of City of Ecorse Department of Public Works; and Larry B. Salisbury, Individually and as Mayor of the City of Ecorse, Defendants.
No. 2:07-cv-12119.
United States District Court, E.D. Michigan, Southern Division.
June 19, 2008.
ORDER GRANTING DEFENDANTS' MOTION FOR SUMMARY JUDGMENT AND DENYING PLAINTIFF'S MOTION FOR PARTIAL SUMMARY JUDGMENT
JOHN FEIKENS, District Judge.
Plaintiff Miles Sinclair brings this action for the violation of his constitutional rights against Defendants City of Ecorse; Dave Jacobs, Superintendent of the City of Ecorse Department of Public Works; and Larry Salisbury, the Mayor of the City of Ecorse. Plaintiff has moved this Court to grant partial summary judgment in his favor on liability for his due process claim, and Defendants have moved for summary judgment in their favor. For the reasons detailed below, I GRANT Defendants' motion for summary judgment and DENY Plaintiffs motion for partial summary judgment.[1]
Facts
In 2003, Plaintiff purchased a piece of property located at 4315 Sixth Street, in the City of Ecorse, Michigan (the "Property"), at a tax sale held by Wayne County. Plaintiff secured the deed to this property in November 2003. The Property, however, did not conform to the City of Ecorse's (the "City") zoning requirements. Plaintiff claims he was not aware of this at the time of purchasing the Property because he did not check the relevant City records or inspect the Property before finalizing the transaction.
On February 24, 2004, as required by Ecorse Zoning Ordinance Section 18.005(f), Plaintiff applied for a type of permit called a Certificate of Occupancy so that he could lawfully occupy the Property. The Defendants rejected this application because the Property did not conform with minimum floor area and setback requirements. However, Plaintiff claims that this prior nonconforming use was grandfathered in and that he had obtained a right to its continued existence. Indeed, Article 11.002(a) of the City's Zoning Ordinance allows the continued use of a structure that lawfully existed at the effective date of the Ordinance so long as the use of that structure remains otherwise legal. Further, it is undisputed that the Property here was constructed previous to the enactment of the City's Zoning Ordinance on January 19, 1983. This means that the Property's prior nonconforming use was grandfathered in for a certain period of time. Defendants nevertheless rejected Plaintiff's permit application. They explained that the Property had been vacant for six months pervious to the Plaintiff purchasing it, and that this period of vacancy had eliminated the prior nonconforming use under Article 11.002 § (e)(5) of the City's Zoning Ordinance. Article 11.002 § (e)(5) reads:
(5) When a nonconforming use of a structure, or structure and premises in combination is discontinued or ceases to exist for a period of six (6) consecutive months or for a period of eighteen (18) months during any three (3) year period, the structure, or structure and premises in combination shall not thereafter be used except in conformance with the regulations of the district in which it is located. Structures occupied by seasonal uses are exempt from this provision.
After the denial of his permit application, Plaintiff obtained a hearing before the Ecorse Zoning Board of Appeals (the "Zoning Board") in order to request a variance. Plaintiff argued to the Zoning Board that he was unaware that the Property was vacant because squatters were living on the premises. The City countered that the Property had in fact been vacant and observed that the water had been turned off for two and one-half years. The Zoning Board ruled to deny the variance.
Under MCL 125.585, Plaintiff appealed the Zoning Board of Appeals' decision to the Wayne County Circuit Court. Circuit Court Judge Michael Callahan reviewed the record and on June 1, 2005, affirmed the Zoning Board of Appeals' decision. On September 16, 2005, the State of Michigan Court of Appeals dismissed Plaintiff's appeal to that court due to a lack of jurisdiction.
Plaintiff filed his Complaint in federal court on May 16, 2007. Plaintiff charges that the Defendants (1) have violated his due process rights by not providing him with a hearing on ending the Property's prior nonconforming use and (2) have violated his right to equal protection by failing to provide permits in a uniform manner under similar circumstances.[2]
Analysis
A) Standard for Summary Judgment
Summary judgment is appropriate "if the pleadings, depositions, answers to interrogatories, and admissions on file, together with the affidavits, if any, show that there is no genuine issue as to any material fact and that the moving party is entitled to judgment as a matter of law." Fed.R.Civ.P. 56(c). A fact is material if it might affect the outcome of the suit under the governing law, Anderson v. Liberty Lobby Inc., 477 U.S. 242, 248, 106 S.Ct. 2505, 91 L.Ed.2d 202 (1986). A genuine issue remains as to a material fact if a jury could reasonably find for the nonmoving party, meaning that the nonmoving party must have put forth more than a scintilla of evidence to support its position. See Id. at 252, 106 S.Ct. 2505. In considering a motion for summary judgment, the court must view the evidence and the inferences that can be drawn from it in the light most favorable to the non-moving party. See Matsushita Elec. Indus. Co. v. Zenith Radio Corp., 475 U.S. 574, 587, 106 S.Ct. 1348, 89 L.Ed.2d 538 (1986).
B) Plaintiff Brings this Complaint Under 42 USC § 1983
Through the Federal Civil Rights Act, 42 U.S.C. § 1983, Congress has provided a judicial remedy for violations of federal constitutional rights by state action. Section 1983 provides in pertinent part:
Every Person who, under color of any statute, ordinance, regulation, custom, or usage, of any State or Territory or the District of Columbia, subjects, or causes to be subjected, any citizen of the United States or other person within the jurisdiction thereof to the deprivation of any rights, privileges, or immunities secured by the Constitution and laws, shall be liable to the party injured in an action at law, suit in equity, or other proper proceeding for redress.
Plaintiff brings his claims for the violation of his right to procedural due process and equal protection under Section 1983. To prevail on a Section 1983 claim, a plaintiff must establish (1) that a person acting under color of state law (2) deprived the plaintiff of a right secured by the Constitution or laws of the United States. Motor v. City of Ecorse, 2001 WL 1760755, *5 (E.D.Mich.2007). Defendants do not contest that they were acting under color of state law. Therefore, all that remains for this Court to determine under Section 1983 is whether Defendants deprived Plaintiff of a "right secured by the Constitution or laws of the United States."
C) Plaintiffs Procedural Due Process Claim
Plaintiff claims that Defendants, by not providing a hearing prior to eliminating the Property's prior nonconforming use, violated his Fourteenth Amendment right to procedural due process. Sixth Circuit courts undertake a two-step analysis when considering claims for the violation of due process rights. First, a court determines whether the plaintiff has a property interest entitled to due process protection; second, if the plaintiff has such a protected property interest, the court determines what process is due. Mitchell v. Fankhauser, 375 F.3d 477, 480 (6th Cir.2004).
Property interests are not created by the Constitution, but rather by independent sources like state law. Thomas v. Cohen, 304 F.3d 563, 576 (6th Cir.2002). Under Michigan law, property owners have a vested right in prior nonconforming uses that have not otherwise been legally invalidated. See Heath Township v. Sall, 442 Mich. 434, 439, 502 N.W.2d 627 (1993). The central question here is whether or not the right to the nonconforming use was legally invalidated prior to Plaintiff purchasing the property. If he acquired that vested right with the Property, the Constitution requires that he be given a hearing before that right is taken away. However, the Zoning Ordinance terminated the property right in the nonconforming use when Wayne County gained title to the Property. Because this termination occurred before Plaintiff purchased the Property, he never gained any protectable property interest in that nonconforming use. And since Plaintiff never gained a property right in the nonconforming use, Defendants did not violate his right to procedural due process by failing to give him a hearing on its continuance.
The Eastern District of Michigan has already heard cases regarding the City of Ecorse's application of its Ordinance to eliminate prior nonconforming uses. One such case is Holly v. City of Ecorse, 2006 WL 2727006 (E.D.Mich.2006), In Holly, plaintiff had purchased a piece of property in Ecorse at some point prior to 1982. Id. at *1. In 1982, Ecorse enacted an ordinance that established the property as a prior nonconforming use. Id. In 1998, plaintiff sold the property to Michael Fox, however, Fox was unable to make proper payments under the contract and he forfeited the property back to plaintiff on March 27, 2004. Id. At this point, the property had been vacant for an extended period of time. Id. When plaintiff attempted to continue the nonconforming use, Ecorse informed him he could not do so because the vacancy had been longer than six months, and as a result, the nonconforming use had expired under the City's Zoning Ordinance. Id. The plaintiff sued the City, claiming, inter alia, that the Ordinance was defective because it did not require a hearing and that the City had violated his due process rights by not giving him a hearing. Id. at *2. On the first issue, the court ruled that the Ordinance was valid. The court reasoned that Michigan law allows zoning ordinances to terminate nonconforming uses when that use is abandoned and that an ordinance is not defective simply because it does not detail all the procedural requirements that must be followed in its enforcement. Id. at *3. On the second issue, however, the court held that the City had violated plaintiff's right to procedural due process by failing to give him a pre- or post-deprivation on the termination of his prior nonconforming use. Id. at *4. The court reached this conclusion because a prior nonconforming use is a protected property interest under the Constitution and because the City could not deprive a person of such an interest without some type of hearing. Id.
The present case is distinguishable from cases like Holly that deal with the City of Ecorse's Zoning Ordinance. This is because, here, Plaintiff purchased the Property at a Wayne County tax sale. Under Wayne County law and the authority of Michigan Public Act 123, MCL 211.78, a property is foreclosed before being sold at a tax sale. Foreclosure eliminates all rights the previous owner had in the property, and title passes to the county treasurer. Wayne County Treasurer Public Act 123 Timeline, available at http://www. waynecounty.com/treasurer/PA123 Timeline.asp# (last visited June 18, 2008). The record indicates that this procedure was followed with respect to the Property at issue in this case; Plaintiff submitted to this Court a copy of a quit claim deed which transferred interest in the Property from the county treasurer to the Plaintiff. Clearly, Plaintiff obtained title to the Property from Wayne County.
Additionally, the record indicates that the Property had been vacant for well over six months before Wayne County took possession of the Property. The minutes of the City of Ecorse Zoning Board of Appeals hearing on this matter indicates that the water for the Property had at that point been turned off for about two and one-half years. The hearing was held in October 2004, so the water had been turned off since early 2002, and Plaintiff did not purchase the Property until November of 2003. As mentioned above, Article 11.002 § (e)(5) the City's Zoning Ordinance allows the termination of a prior nonconforming use after six months of continuous vacancy. I rule that the vacancy fulfilled this statutory period before the Plaintiff purchased the Property.
Therefore, when Wayne County foreclosed and took title to the Property, the property interest in the prior nonconforming use automatically ended because the six-month period had elapsed. Holly tells us that due process demands that the City grant a person a hearing before depriving them of such an interest, 2006 WL 2727006 at *3-4, but this reasoning does not apply to the rights of a county. Section One of the Fourteenth Amendment states that "[a]ll persons born or naturalized in the United States, and subject to the jurisdiction thereof, are citizens of the United States and of the State wherein they reside. No State shall ... deprive any person of life, liberty, or property, without due process of law." Thus, only a "person" is entitled to due process protection under Section One of the Fourteenth Amendment, and Wayne County, being neither an individual nor a corporation, is not a juridical person and is, therefore, not protected. See U.S. Dept. of Agriculture v. Hunter, 171 F.2d 793, 795 (5th Cir.1949). Once Wayne County gained title to the Property, the City of Ecorse under its Zoning Ordinance was not constitutionally required to give the County a hearing and the property interested ended automatically.
Since the property interest in the nonconforming use ended when Wayne County took title to the Property, Plaintiff could not acquire this property interest along with the title.[3] Thus, Plaintiff had no property right in the nonconforming use, and due process does not require that the City grant him a hearing regarding a property right he never had.
D) Equal Protection
"All equal protection cases pose the same basic question: Is the government's classification justified by a sufficient purpose?" ERWIN CHEMERISNSKY, CONSTITUTIONAL LAW PRINCIPLES AND POLICIES 643 (2nd ed.2002). In his Complaint, Plaintiff alleges that "the policy of the Defendants ... is not imposed in a general uniform manner to others in similar circumstances as here, but selective and favorable treatment is granted a select few at the whim and favor of Defendant Mayor." (Compl.¶ 25). Plaintiff does not allege that a suspect class is at issue in this case and does not question whether there is a rational basis for the Zoning Ordinance itself. Thus, Plaintiff must be advancing a claim as a class of one. To succeed on such a class-of-one claim, Plaintiff must show that he has been intentionally treated differently from others who are similarly situated and that there is no rational basis for the difference in treatment. Rifkin Scrap Iron and Metal Co. v. Ogemaw County, 2008 WL 2157067, *9 (E.D.Mich.2008).
In this case, Plaintiff has provided very little evidence showing that he was intentionally treated differently than other similarly situated individuals or that there was no rational basis for the denial of his permit application. The correspondence from the Defendants that Plaintiff has submitted detail the procedures the City follows, but reveal no bias or errors in the City's decision-making process. Instead, the evidence in this case, as a whole, indicates that there was a perfectly rational reason for denying the permits and variance: the Property did not conform to the City's Zoning Ordinance and Plaintiff had no property interest in the nonconforming use, so local law prohibited Plaintiffs intended use of the Property. Thus, no reasonable fact finder could decide that Plaintiff had been intentionally treated differently and that there was no rational reason for that difference. For this reason, Defendants are entitled to summary judgment on Plaintiff's equal protection claim.
Conclusion
Plaintiff's procedural due process claim fails because he had no property interest in the prior nonconforming use; Plaintiff's equal protection claim fails because he has not submitted sufficient evidence showing that he was treated differently from other similarly situated individuals, and because there was a rational basis for the decision denying him the permit. Thus, I GRANT Defendants' motion for summary judgment and DENY Plaintiff's motion for partial summary judgment.
IT IS SO ORDERED.
NOTES
[1] Due to this holding, it is unnecessary to address Defendants' claims of collateral estoppel and qualified immunity.
[2] Originally, Plaintiff also charged that Defendants had taken his property without just compensation, but he dropped this count in his brief in support of the motion for partial summary judgment.
[3] Plaintiff also indicates that he is entitled to the hearing because he was not given notice that the property did not conform to zoning requirements. Even assuming that had Plaintiff not received notice he would be entitled to a hearing, Plaintiffs argument fails because he received constructive notice. The Zoning Board hearing minutes reveal that the Plaintiff failed to do his due diligence and check the setbacks on the Property. "Since the recording of the various designated instruments or writings is constructive notice to those subsequently dealing with or attempting to acquire interests in the property involved, it is incumbent upon such persons to examine carefully the public records in order to determine the nature of the legal title of the property and the rights or interests of other persons in the premises." Shubh Hotels Detroit, L.L.C. v. Wells Operating Partnership, L.P., 2008 WL 2262189, *5 (Mich.App.2008) (quoting 21 Mich. Civ Jur, § 20). If Plaintiff had done his due diligence, he would have learned it was nonconforming and had been vacant for more than six months.
| 2023-11-14T01:27:13.970301 | https://example.com/article/5682 |
IRC from Linux
XChat is a popular IRC client with a graphical
user interface. You can download the source code or precompiled
binaries for a variety of platforms.
XChat can be downloaded from http://xchat.org, either as source code or in
the form of precompiled binaries or packages. If you have a
packaging system such as
apt or Gentoo's
emerge, then you may be able to get away with
apt-get xchat or emerge xchat.
1 Nicknames, Usernames, and Real Names
When
you
first run XChat, you will be presented
with a Server List dialog box. The first task is to go down to the
bottom and select Edit Mode. From there, you can
see all your server settings. Next examine the top area
marked Global User Info. The top three boxes are
for your
nickname. Most of the
time, you will connect with your first listed nickname; however, if
that name is already in use by another user, it will try again with
the second and then with the third. You shouldn't
make these the same, but they can be close variants, for example:
Bob, Bob_, Bobby
Foo, FooBar, Foo_Bar
CoolDude, Cool_Dude, Kewld00d
Your username is used internally by the server
to form your host
mask, although some servers will try to use an Ident call [Hack #80] to look up your username
instead. Your chosen username will be used if the Ident call fails.
You can use your nickname, an alternate nickname, or just about
anything you want here—although it may be truncated and must
not contain any special characters. Your real
name can
also be anything you want, but it can be longer and can include
spaces. As an example, your IRC nickname might be
"Han" with username
"solo" and real name
"Harrison Ford." Be as creative as
you like.
2 Server Configuration
The next step is to configure
your servers. XChat comes with a lot of servers
listed, and it may already have the one you want; if not, you can
click Add above the list of servers to create a
new one. This will create a New Network. To
rename this network to something more informative, slowly click it
twice (don't double-click, as that will make
XChat connect
to the server). Once you've done this, you should
look at the list of Servers on the far right.
This is a list of servers; each server is of the form
server/port. Your network will be set with
newserver/6667 and, unless
you've explicitly set one up on your local network,
chances are there is no server called
"newserver." So instead, click on
this, and replace it with the address and port of the server you
want. If you leave off the /port portion, the
default port number of 6667 will be used. Most IRC servers will let
you connect to this port, and many will even have alternative ports
as well. Here are some example servers:
irc.freenode.net
irc.worldirc.org/6660
Finally, if you know what channels
you want to connect to, place them in the Join
Channels box. Use commas to specify more than one channel,
for example:
#wikipedia,#java,#gimp,#jibble
You are now ready to connect to an IRC server. Click the
Connect button and wait until you are connected.
If you'd like to connect to another server as well,
return to the list with Ctrl-S,
or use the menu: XChatServer List. Select the new server
from the list, but this time use Connect in a New
Tab to create a separate tab for this new server. If you
forget to do this, you will disconnect from your current server and
connect to the new one in the existing tab.
3 Advanced Options and Autoconnects
If you
use IRC only occasionally, you probably won't mind
picking your favorite
network from the
list every time you start XChat. But if you connect to several IRC
servers regularly, you'll probably want to connect
to all of them automatically. To do this, select the network from
your server list and check Auto Connect at
Startup. If you do this, you may also want to check the
No Server List at Startup option.
4 Setting Up Autologin
If
you're on a standard IRC network, you can usually
set yourself up to automatically log in by specifying a
Connect command in the server details screen.
For example:
msg nickserv identify password
Notice that this command does not begin with a /
character. If you'd like to use more than one
command here, you need to set up a user command (as described later)
with multiple entries and type its name here instead.
5 Selecting a Stable Server
Most IRC networks are made up of more
than one server; many will list these at the
network's web site. In most cases, you will connect
to a round-robin server, which will automatically pick a
server and direct you there. Generally, you won't
need to change this, but you may sometimes want to connect to a
specific server. If you find a particular server that behaves more
stably that any of the others, you can set the server of your choice
at the top of the server list for your network. You can then click
the Add button to add another one in case your
preferred one is down. For example:
6 Different Nicknames on Different Networks
If
you want to
use a different nickname on a certain network, select the network in
the server list and uncheck Use Global User
Info. You can then fill in a nickname, username, and real
name for this server.
7 Setting Up the User Interface
The XChat interface can be
customized in a number of ways. The first few are simple visibility
options. Right-click a blank area in the IRC window, and you can
select on and off options for the menu bar, topic bar, mode buttons,
and user list buttons. Select whatever combination makes you happy.
The next set is available from the menu bar or the right-click menu,
SettingsPreferences. There are far too many preferences to
detail here, so you may like to play around with them and see what
you can achieve. Here are some items worth noting:
7.1 Interface/Text Box
Besides setting the colors
and fonts for chatting, the checkboxes also affect the way you see
your chat. Try turning on Nick
Coloring or Timestamp, for example, or perhaps you prefer to turn off
the Indented Nicknames feature?
Input Box
The Nick Completion Suffix is used for two
things. First, if you type a partial nickname at the start of the
line and press the Tab key, XChat will attempt to complete the
nickname and add this suffix to it. Second, if you check
Automatic Nick Completion, whenever you type a
partial nickname followed by this suffix, XChat will replace it with
the full nickname.
User List
The Lag Meter and Throttle don't take up much room
and are informative; it is a good idea to set this to
Both. Here you can also change the user list
sort order or set a double-click command.
Tabs
Tabs are used to store
channel
and server windows. This lets you adjust the layout of your screen
and how you use tabs.
Colors
These settings let you change the
colors of your text box and
user list.
7.2 Chatting/General
Here you can set the default messages for when you quit IRC,
leave a channel, or go away. You can add words
that will trigger the highlight/beep feature. Also, if you
don't like the way XChat announces your away
messages, you can uncheck that here.
7.3 Logging
If you wish to
log conversations (for
reference or for generating IRC statistics), you can check
Enable Logging of Conversations here. You
shouldn't change the other options unless you know
what you're doing, especially if you want to use a
third-party program to generate statistics.
7.4 Network/Setup
Most users won't need to
make any changes to the settings here, but there are some useful
options for file transfers. This lets you change where XChat places
incoming files or adjust the speed at which the files are
transferred. If you are behind a firewall, you can also restrict the
DCC ports used when you send files.
8 Hacking XChat
Here are some neat hacks you can do with XChat:
8.1 Tab in a window
If you want to remove a tab and give it its
own window, press Ctrl-I. Press
them again to place it back as a tab. You can also right-click on the
tab and select Detach Tab. If
you'd like to change the default behavior of
windows and tabs, see the
Preferences dialog box under the Tabs section.
8.2 Per-channel options
Right-click on a
tab, and choose the Channel Name
submenu. You can turn off join/part messages for the busy channels,
set the channel to beep on activity for the important but quiet
channels, or allow color pasting in the channel.
8.3 All-server commands
If you'd like to set up a
command to go to all your servers or
all your channels, type /allservcommand or /allchancommand. For example:
/allserv away down south in Dixie
This will set your status to Away (and your
away message to "down south in
Dixie") for all of the servers you are connected to.
8.4 Use colors
Many people
recommend that you don't use colors.
They're more often abused than used effectively.
Many consider them to be garish and ugly. Furthermore,
they're not IRC standards, they're
not supported by all clients, and you can't even
tell whether another person's IRC client has a white
background or a black one. However, if you find you simply must use
color codes:
%C##
Typing this as part of a message will cause it to be interpreted as a
color code. The ## must be replaced with a two-digit number (see
SettingsPreferences Colors for the list).
%B
This will make a message bold.
%U
This will underline your message.
%0
This will set your output back to normal, using the default color.
Alternatively, you can right-click the channel tab and select
Insert mIRC Color Code.
8.5 Display output with /exec
Under Unix and
Linux systems, you can
display output from any
command that you run. For example:
/exec uptime
This will execute the uptime command and show your
system's uptime and load averages. This, however, is
displayed in the window and not sent to the IRC server. If you want
to brag about your system's uptime, though, you can
do this:
/exec -o uptime
The output will now be sent to the IRC channel
you're currently active in.
You can also call commands that do not immediately exit. For instance:
/exec -o tail -f /var/log/httpd/access_log
This will print the accesses to your web server as they occur, if you
really need to. You can even send input to the command with
/execwrite, stop it with
/execstop, resume with
/execcont, and kill it with
/execkill.
Be careful what programs you call. /exec-oyes or
/exec-ocat/dev/urandom, especially in a DCC chat, will
probably crash XChat, and they are generally considered silly things
to try. Having heard that, you'll probably want to
try it just to see what happens.
8.6 Setting up auto-replace strings
An auto-replace is a string of text that gets
automatically replaced with another. For example, XChat will
automatically replace "teh" with
"the" as you type it. To review or
change this behavior or add new auto-replace options, go to
SettingsListsAuto-replace. To add a new option,
click the New button and then edit the
New and EDIT ME regions.
For example:
billy => Over and Under General War Commander Sergeant Billy Goat-Legs
Now, whenever you type in billy followed by a
space or Enter, you'll see his full title appear.
8.7 Setting up user commands
Setting up a user command in XChat is simple. First,
go to SettingsListsUser Commands. Click
Add New, and choose a name. Then you can type in
your command. You can click the Help button for
a list of substitution strings. Here's an example:
whine => me whines, complains, and makes a nuisance of himself.
Now, go to your least-favorite channel and type
/whine. You'll be making
yourself feel unwelcome in no time.
You can also give your commands arguments:
greet => me greets %2 in the manner of the Courts of Chaos.
You can now stab your friends in the
back—erm—greet your friends with a
flourish, with a simple command, like /greet
Corwin or /greet JackBauer.
If you want the rest of your string to be used as an argument instead
of just one word per argument, you use the &
character:
hero => say &2 is my hero!
Now, with a simple /hero Linus Torvalds, you can
cast your vote in support of free software!
Commands can be multiple action as well. They will be performed in
the order listed, for example:
The arguments to each message ($1,
$2, etc.) are listed below the message as you
select them.
$t refers to the tabbed line,
if you have Indented
Nicknames on. %C,
%B, and %O are color codes, as
described earlier.
One often-requested format change is to display an
@ in front of operators and a
+ in front of voiced
users. To do this,
modify the
Channel Message format string like so:
%C2<%O$3$1%C2>%O$t$2%O
$3 will display an @,
+, or nothing, as appropriate.
8.9 Add user list buttons and menu commands
Assuming you have the user list
buttons turned on (right-click empty space, then select
User List Buttons), you can add buttons to this
list or to the user list pop up (which appears when you right-click a
username in the chat window or the user list). The syntax for such a
command is the same as for a user command, except the
name of the command is used for the label of the
button or the menu item, and there are more substitutions available.
Use existing entries as guidelines if you want to.
Add CTCP replies
Care to set up some useful information for
CTCP? Want to mess up people
who PING and VERSION you? Using
SettingsListsCTCP replies, you can set it up to
do anything when someone sends you a CTCP message. In general, use
the same guidelines as the other lists (and see
Help for useful substitutions). Note, however,
that the proper way to send a reply is: | 2024-05-07T01:27:13.970301 | https://example.com/article/1104 |
Q:
sqlite3 inserting primary key data from one table into another
I have three tables: books, chapters, concepts.
I want the book_id columns to be the same in the books and chapters tables.
I inserted data into books table and then I inserted data into chapters table, but the book_id column in chapters table is empty.
How do I make these tables relational?
books table
book_id integer,
title text,
PRIMARY KEY (book_id)
chapters table
chapter_id integer,
chapter text,
book_id integer,
PRIMARY KEY (chapter_id),
FOREIGN KEY (book_id) REFERENCES books (book_id))'''
concepts table
concepts_id integer,
concept text,
definition text,
chapter_id integer,
PRIMARY KEY (concepts_id),
FOREIGN KEY (chapter_id) REFERENCES chapters (chapter_id)
INSERT
cur.execute("INSERT INTO books (title) VALUES ('Intro to Econ.')")
cur.execute("INSERT INTO chapters (chapter) VALUES (1)")
A:
There may be a bit of a misunderstanding with the concept of a foreign key here.
A foreign key is a reference to another row of a table. While a Primary Key will auto index, a Foreign Key does not. A foreign key is something you have to insert yourself; after all, you are defining the relation.
To achieve what you want, you will need get the inserted book id from the first query, and manually insert the retrieved value. This can be achieved using SQLite's last_insert_rowid() function. You would then fetch the result from the cursor. Here's an example of how you would accomplish this in Python:
#First, we add the SELECT last_insert_rowid() into the query; this is an SQLite function so it goes in the query not in the Python code.
cur.execute("INSERT INTO books (title) VALUES ('Intro to Econ.'); SELECT last_insert_rowid();")
#Get the first column of the first row; in our case, only one column is actually returned anyway.
book_id = cur.fetchone()[0]
#As you can see, we are now inserting the book_id ourselves. Foreign Keys do not auto index, so we need to relate the tables ourselves.
cur.execute("INSERT INTO chapters (chapter, book_id) VALUES (1, " + str(book_id) + ")")
| 2024-07-18T01:27:13.970301 | https://example.com/article/3290 |
SVN-fs-dump-format-version: 2
UUID: bf695de5-cd61-4024-8cb3-a12d299c7c62
Revision-number: 0
Prop-content-length: 56
Content-length: 56
K 8
svn:date
V 27
2013-11-24T02:29:36.942478Z
PROPS-END
Revision-number: 1
Prop-content-length: 126
Content-length: 126
K 10
svn:author
V 7
jrandom
K 8
svn:date
V 27
2013-11-24T02:34:17.982927Z
K 7
svn:log
V 24
Denormalized tree import
PROPS-END
Node-path: A
Node-kind: dir
Node-action: add
Prop-content-length: 10
Content-length: 10
PROPS-END
Node-path: A/É
Node-kind: dir
Node-action: add
Prop-content-length: 47
Content-length: 47
K 13
svn:mergeinfo
V 12
/Q/ålpha:69
PROPS-END
Node-path: A/É/ålpha
Node-kind: file
Node-action: add
Prop-content-length: 10
Text-content-length: 0
Text-content-md5: d41d8cd98f00b204e9800998ecf8427e
Text-content-sha1: da39a3ee5e6b4b0d3255bfef95601890afd80709
Content-length: 10
PROPS-END
Node-path: A/îöta
Node-kind: file
Node-action: add
Prop-content-length: 10
Text-content-length: 0
Text-content-md5: d41d8cd98f00b204e9800998ecf8427e
Text-content-sha1: da39a3ee5e6b4b0d3255bfef95601890afd80709
Content-length: 10
PROPS-END
Revision-number: 2
Prop-content-length: 128
Content-length: 128
K 10
svn:author
V 7
jrandom
K 8
svn:date
V 27
2013-11-24T02:34:39.316466Z
K 7
svn:log
V 26
Modified denormalized file
PROPS-END
Node-path: A/îöta
Node-kind: file
Node-action: change
Text-content-length: 9
Text-content-md5: d2508118d0d39e198d1129d87d692d59
Text-content-sha1: e2fb5f2139d086ded2cb600d5a91a196e76bf020
Content-length: 9
modified
Revision-number: 3
Prop-content-length: 126
Content-length: 126
K 10
svn:author
V 7
jrandom
K 8
svn:date
V 27
2013-11-24T02:35:09.976189Z
K 7
svn:log
V 24
Modified normalized file
PROPS-END
Node-path: A/É/ålpha
Node-kind: file
Node-action: change
Text-content-length: 9
Text-content-md5: d2508118d0d39e198d1129d87d692d59
Text-content-sha1: e2fb5f2139d086ded2cb600d5a91a196e76bf020
Content-length: 9
modified
Revision-number: 4
Prop-content-length: 124
Content-length: 124
K 10
svn:author
V 7
jrandom
K 8
svn:date
V 27
2013-11-24T02:36:11.674695Z
K 7
svn:log
V 22
Created name collision
PROPS-END
Node-path: A/É/ålpha
Node-kind: file
Node-action: add
Prop-content-length: 10
Text-content-length: 0
Text-content-md5: d41d8cd98f00b204e9800998ecf8427e
Text-content-sha1: da39a3ee5e6b4b0d3255bfef95601890afd80709
Content-length: 10
PROPS-END
Revision-number: 5
Prop-content-length: 125
Content-length: 125
K 10
svn:author
V 7
jrandom
K 8
svn:date
V 27
2013-11-24T02:36:52.182891Z
K 7
svn:log
V 23
Modified colliding file
PROPS-END
Node-path: A/É/ålpha
Node-kind: file
Node-action: change
Text-content-length: 9
Text-content-md5: d2508118d0d39e198d1129d87d692d59
Text-content-sha1: e2fb5f2139d086ded2cb600d5a91a196e76bf020
Content-length: 9
modified
Revision-number: 6
Prop-content-length: 127
Content-length: 127
K 10
svn:author
V 7
jrandom
K 8
svn:date
V 27
2013-11-24T18:04:43.128158Z
K 7
svn:log
V 25
Update mergeinfo on A/É
PROPS-END
Node-path: A/É
Node-kind: dir
Node-action: change
Prop-content-length: 61
Content-length: 61
K 13
svn:mergeinfo
V 26
/Q/ålpha:71
/Q/ålpha:69
PROPS-END
Revision-number: 7
Prop-content-length: 130
Content-length: 130
K 10
svn:author
V 7
jrandom
K 8
svn:date
V 27
2013-11-24T18:04:51.128158Z
K 7
svn:log
V 25
Update mergeinfo on A/É
PROPS-END
Node-path: A/É
Node-kind: dir
Node-action: change
Prop-content-length: 64
Content-length: 64
K 13
svn:mergeinfo
V 29
/Q/ålpha:71
/Q/ålpha:69,71
PROPS-END
| 2023-10-22T01:27:13.970301 | https://example.com/article/8555 |
User ID: enronuslw
PW: bnaweb22
-----Original Message-----
From: "BNA Highlights" <bhighlig@bna.com>@ENRON
Sent: Monday, November 19, 2001 11:41 PM
To: BNA Highlights
Subject: Nov. 20 -- U.S. Law Week's Case Alert
______________________________
THE U.S. LAW WEEK'S CASE ALERT
Highlights & Table of Contents
November 20, 2001
______________________________
ISSN 1522-4317
Registered Web subscribers can access the full text of these
articles by using the URL link supplied.
Information about becoming a subscriber or signing up for a
FREE Web trial is available at http://web.bna.com or call
BNA Customer Relations at 1-800-372-1033, Mon. - Fri. 8:30
am - 7:00 pm (ET).
__________
HIGHLIGHTS
__________
NINTH CIRCUIT USES EIGHTH AMENDMENT PROPORTIONALITY TEST TO
VOID NONCAPITAL SENTENCE IMPOSED UNDER CALIFORNIA'S THREE
STRIKES LAW
Prison terms, imposed under California's "Three Strikes"
law, that will ensure at least 50 years of incarceration for
a nonviolent recidivist convicted of petty theft violate the
Eighth Amendment, the Ninth Circuit declares. The court
finds the sentence grossly disproportionate to the gravity
of the defendant's property crimes and to comparable
sentences in other jurisdictions.
The Three Strikes law imposes a minimum 25-year sentence
without parole for any third felony offense by a defendant
with at least two prior convictions for "serious" or
"violent" felonies. The court cites several problems with
the statute, including that the triggering felony need not
be serious or violent, the prior strikes need not be violent
offenses, and there is no time period after which prior
convictions will no longer be counted as strikes. . . . Page
1294
http://pubs.bna.com/ip/BNA/law2.nsf/id/a0a4y2a9x1_
FRAUD ON COURT, AS OPPOSED TO FRAUD ON PTO, MAY NOT SERVE AS
GROUND FOR HOLDING PATENT UNENFORCEABLE, FEDERAL CIRCUIT
SAYS
Litigation misconduct by a patentee may be the basis for
dismissing a particular patent infringement suit but not for
finding the patent unenforceable, the Federal Circuit holds.
"Litigation misconduct, while serving as a basis to dismiss
the wrongful litigant, does not infect, or even affect, the
original grant of the property right," the court reasons.
The court distinguishes fraud on the court from inequitable
conduct before the Patent and Trademark Office in obtaining
the patent, which taints the patent itself and renders it
unenforceable by any party. The court disavows broad dicta
in a 1990 decision indicating that patents may be held
"unenforceable due to unclean hands." . . . Page 1298
http://pubs.bna.com/ip/BNA/law2.nsf/id/a0a4x9z9j0_
PUNITIVE DAMAGES MEGA-AWARD IN EXXON VALDEZ CASE REVERSED BY
NINTH CIRCUIT AS UNCONSTITUTIONALLY EXCESSIVE
The $5 billion punitive damages award to commercial
fishermen injured by the "Exxon Valdez" oil spill is
unconstitutionally excessive, the Ninth Circuit rules. The
award is disproportionate to the $287 million compensatory
damages incurred by the plaintiffs, to potential criminal
and civil penalties, and to the $125 million restitution and
penalty settlement with federal and state authorities, the
court finds.
The unprecedented 1995 award was entered before the U.S.
Supreme Court spelled out the due process constraints on the
magnitude of punitive damages in "BMW v. Gore". Applying the
"Gore" standards, the Ninth Circuit concludes that the
district court did not properly take into account the purely
economic nature of the harm incurred by the plaintiffs, the
unintentional character of the accident, or the mitigating
actions undertaken by Exxon. . . . Page 1301
http://pubs.bna.com/ip/BNA/law2.nsf/id/a0a4x8q1y4_
_____________
IN THIS ISSUE
_____________
A complete topical index of Case Alert.
ATTORNEYS: A lawyer sued for negligently supervising a
lawyer-employee who bilked clients is not protected by state
statutes shielding lawyers from liability to those not in
privity of contract with them, the Arkansas Supreme Court
holds. . . . Page 1291
http://pubs.bna.com/ip/BNA/law2.nsf/id/a0a4y2t4m1_
BANKING: A National Credit Union Administration rule
allowing family members of a group member to join multiple
common bond credit unions without counting against the
statutory 3,000-member limit for such credit unions is
consistent with the recent changes to the Federal Credit
Union Act, the D.C. Circuit holds. . . . Page 1292
http://pubs.bna.com/ip/BNA/law2.nsf/id/a0a4y0y8g7_
BANKRUPTCY: A bankruptcy debtor whose interest in his
ex-spouse's individual retirement account arose through a
marriage dissolution decree, not from his own employment,
cannot make use of Minnesota's exemption for IRA funds, the
Eighth Circuit Bankruptcy Appellate Panel decides. . . .
Page 1292
http://pubs.bna.com/ip/BNA/law2.nsf/id/a0a4x7f2y9_
CRIMINAL LAW: A Virginia statute that bars the burning of a
cross with the intent of intimidating any person or group
selectively prohibits speech on the basis of content and is
overbroad in violation of the First Amendment, the Virginia
Supreme Court declares. . . . Page 1293
http://pubs.bna.com/ip/BNA/law2.nsf/id/a0a4y2a9u8_
CRIMINAL LAW: The imposition of two consecutive
25-years-to-life sentences under California's "Three
Strikes" law upon a nonviolent recidivist convicted of petty
theft violates the Eighth Amendment's protection against
disproportionate sentences, the Ninth Circuit determines. .
. . Page 1294
http://pubs.bna.com/ip/BNA/law2.nsf/id/a0a4y2a9x1_
ENVIRONMENT: CERCLA generally does not preempt a local
ordinance authorizing a California city to investigate and
remediate hazardous waste contamination of its soil and
ground water, the Ninth Circuit finds. . . . Page 1295
http://pubs.bna.com/ip/BNA/law2.nsf/id/a0a4x3w7b1_
FAMILY LAW: A parent's use of deception to establish "home
state" jurisdiction in a child custody dispute is
"reprehensible conduct" for which the court may decline
jurisdiction under the Uniform Child Custody Jurisdiction
Act, the Maryland Court of Special Appeals holds in a case
of first impression. . . . Page 1296
http://pubs.bna.com/ip/BNA/law2.nsf/id/a0a4x8n7r5_
MASS MEDIA: Arizona restrictions on the sale of material
"harmful to minors" from vending machines withstand First
Amendment strict scrutiny, the Arizona Court of Appeals
rules. . . . Page 1297
http://pubs.bna.com/ip/BNA/law2.nsf/id/a0a4x6v0b7_
PATENTS: A federal court exceeded its authority in ruling a
patent unenforceable due to the patentee's litigation
misconduct, the Federal Circuit concludes. . . . Page 1298
http://pubs.bna.com/ip/BNA/law2.nsf/id/a0a4x9z9j0_
PUBLIC CONTRACTS: An executive order restricting project
labor agreements on federal or federally assisted
construction projects is not supported by constitutional or
statutory authority and is preempted by the National Labor
Relations Act, a federal court in the District of Columbia
holds, permanently enjoining enforcement of the order. . . .
Page 1299
http://pubs.bna.com/ip/BNA/law2.nsf/id/a0a4x8p2g3_
TAXATION: The Federal Circuit upholds 1993 federal estate
tax legislation that retroactively increased the estate tax
rate on taxable estates over $3 million from 50 to 55
percent. . . . Page 1300
http://pubs.bna.com/ip/BNA/law2.nsf/id/a0a4x6e2c3_
TORTS: The Ninth Circuit reverses the $5 billion punitive
damages award levied in the "Exxon Valdez" oil spill tort
suit as excessive in violation of due process. . . . Page
1301
http://pubs.bna.com/ip/BNA/law2.nsf/id/a0a4x8q1y4_
TRADE REGULATION: A Vermont statute that requires labeling
of mercury-containing consumer products does not likely
violate the commerce clause or the First Amendment as
applied to light bulbs, the Second Circuit decides. . . .
Page 1302
http://pubs.bna.com/ip/BNA/law2.nsf/id/a0a4y1f5j9_
CASES IN BRIEF : . . . Page 1303
______________
TABLE OF CASES
______________
American Bankers Association v. National Credit Union
Administration (D.C. Cir.) . . . Page 1292
http://pubs.bna.com/ip/BNA/law2.nsf/id/a0a4y0y8g7_
Anderson v. Seaver (In re Anderson) (B.A.P. 8th Cir.) . . .
Page 1292
http://pubs.bna.com/ip/BNA/law2.nsf/id/a0a4x7f2y9_
Andrade v. Attorney General of California (9th Cir.) . . .
Page 1294
http://pubs.bna.com/ip/BNA/law2.nsf/id/a0a4y2a9x1_
Aptix Corp. v. Quickturn Design Systems Inc. (Fed. Cir.) . .
. Page 1298
http://pubs.bna.com/ip/BNA/law2.nsf/id/a0a4x9z9j0_
Baker v. Hazelwood (In re Exxon Valdez) (9th Cir.) . . .
Page 1301
http://pubs.bna.com/ip/BNA/law2.nsf/id/a0a4x8q1y4_
BankAmerica Corp. Securities Litigation, In re (8th Cir.) .
. . Page 1303
http://pubs.bna.com/ip/BNA/law2.nsf/id/a0a4x7k4j8_
Black v. Commonwealth (Va.) . . . Page 1293
http://pubs.bna.com/ip/BNA/law2.nsf/id/a0a4y2a9u8_
Building and Construction Trades Department, AFL-CIO v.
Allbaugh (D.D.C.) . . . Page 1299
http://pubs.bna.com/ip/BNA/law2.nsf/id/a0a4x8p2g3_
Chavez v. Whirlpool Corp. (Cal. Ct. App.) . . . Page 1303
http://pubs.bna.com/ip/BNA/law2.nsf/id/a0a4x7y6p8_
Doe v. Department of Public Safety (2d Cir.) . . . Page 1303
http://pubs.bna.com/ip/BNA/law2.nsf/id/a0a4y1k0y4_
Ferrell v. Harvard Industries Inc. (E.D. Pa.) . . . Page
1304
http://pubs.bna.com/ip/BNA/law2.nsf/id/a0a4y2e9z1_
Fireman's Fund Insurance Co. v. Lodi, Calif. (9th Cir.) . .
. Page 1295
http://pubs.bna.com/ip/BNA/law2.nsf/id/a0a4x3w7b1_
Gruber v. Gruber (Md. Ct. Spec. App.) . . . Page 1296
http://pubs.bna.com/ip/BNA/law2.nsf/id/a0a4x8n7r5_
Madden v. Aldrich (Ark.) . . . Page 1291
http://pubs.bna.com/ip/BNA/law2.nsf/id/a0a4y2t4m1_
Mattice v. Memorial Hospital of South Bend (N.D. Ind.) . . .
Page 1304
http://pubs.bna.com/ip/BNA/law2.nsf/id/a0a4x7y4d9_
National Electrical Manufacturers Association v. Sorrell (2d
Cir.) . . . Page 1302
http://pubs.bna.com/ip/BNA/law2.nsf/id/a0a4y1f5j9_
NationsBank of Texas NA v. United States (Fed. Cir.) . . .
Page 1300
http://pubs.bna.com/ip/BNA/law2.nsf/id/a0a4x6e2c3_
Schiff v. Prados (Calif. Ct. App.) . . . Page 1304
http://pubs.bna.com/ip/BNA/law2.nsf/id/a0a4y2e9z4_
Special Devices Inc. v. OEA Inc. (Fed. Cir.) . . . Page 1304
http://pubs.bna.com/ip/BNA/law2.nsf/id/a0a4x7k3n2_
State v. Evenson (Ariz. Ct. App.) . . . Page 1297
http://pubs.bna.com/ip/BNA/law2.nsf/id/a0a4x6v0b7_
United States v. DeLuca (10th Cir.) . . . Page 1304
http://pubs.bna.com/ip/BNA/law2.nsf/id/a0a4x8r0n1_
United States v. Scott (1st Cir.) . . . Page 1304
http://pubs.bna.com/ip/BNA/law2.nsf/id/a0a4x8r0m8_
United States v. Taylor (D. Minn.) . . . Page 1304
http://pubs.bna.com/ip/BNA/law2.nsf/id/a0a4y1m3j4_
Wright v. Hanna Steel Corp. (11th Cir.) . . . Page 1304
http://pubs.bna.com/ip/BNA/law2.nsf/id/a0a4x7k4k1_
___________________________________________________________
The U.S. Law Week (ISSN 1522-4317) BNA's Highlights are
published weekly by The Bureau of National Affairs, Inc.,
1231 25th St., N.W., Washington, DC 20037. For Customer
Service including subscriptions and address changes, call
1-800-372-1033. For retransmission of the Highlights,
more information or to order full text of summarized
stories, call BNA PLUS at 1-800-452-7773 (202-452-4323 in
DC), FAX # 202-822-8092, Internet:bnaplus@bna.com.
Copyright (c) 2001 by The Bureau of National Affairs,
Inc. Washington, D.C. 20037. Use of this service is
subject to the terms and conditions of the license
agreement with BNA. Unauthorized access or distribution
is prohibited. | 2024-01-10T01:27:13.970301 | https://example.com/article/9879 |
Red Bull teambaas Christian Horner is voorzichtig met zijn uitspraken over de performance van zijn team in 2019. De Brit verwacht namelijk dat volgend jaar een tussenjaar zal worden voor de Oostenrijkse renstal.
De teambaas denkt namelijk dat Red Bull in 2020 pas echt klaar is voor de strijd. Eerder dit jaar werd bekend dat de samenwerking met Renault na dit seizoen zal worden beëindigd en dat er vanaf volgend jaar zal worden gereden met Honda-motoren.
“Als we kijken naar de concurrentie, dan denk ik wel dat Honda nog de nodige stappen moet gaan zetten. 2019 zal daarom een tussenjaar worden. Ik verwacht dat we in 2020 echt klaar zijn”, zei Horner tegen La Gazzetta dello Sport.
Ook sprak de teambaas over de overwinningen van dit jaar. “We willen eigenlijk meer. We hadden in Bahrein kunnen winnen en in China en Monaco een dubbel podium kunnen behalen. Dit is helaas niet gelukt en we hebben te veel kansen voorbij laten gaan. Wij zijn echter wel het enige team dat het Ferrari en Mercedes moeilijk kan maken.” | 2024-04-19T01:27:13.970301 | https://example.com/article/6855 |
Q:
How to start autocomplete listener on page load Google Maps
Code below is Google Maps autocomplete search which only works on place_changed action.
Which event should I use to replace it and make it run on page load - based on value in name="search"?
<input type="text" name="search" value="Sport Caffe - Pool & Sports Bar, Bulevar Makedonski Prosvetiteli, Ohrid, North Macedonia" id="search_al" placeholder="Search" class="form-control" autocomplete="off">
<input type="hidden" name="place_id" value="" id="place_id_al">
<input type="hidden" name="icon" value="" id="icon_al">
<script>
var autocomplete_al = new google.maps.places.Autocomplete(input_al);
autocomplete_al.setFields(['place_id', 'address_components']);
autocomplete_al.addListener('place_changed', function() {
// on page load shows alert 1 and adds values based on `search` name
alert(1);
var place = autocomplete_al.getPlace();
document.getElementById('place_id_al').value = place.place_id;
document.getElementById('icon_al').value = place.icon;
});
</script>
A:
Autocomplete is not the appropriate service to use if you already know the place. This is why place_changed is the single event used here; a user selects a place from a list of Autocomplete predictions based on what the user types into the input field. Like in these examples.
Therefore I recommend you use a Place Search service such as Find Place from Query. You can make the query right away using the callback parameter to initialize the Places service. See Google's code example below:
<script>
var map;
var service;
var infowindow;
function initMap() {
var sydney = new google.maps.LatLng(-33.867, 151.195);
infowindow = new google.maps.InfoWindow();
map = new google.maps.Map(
document.getElementById('map'), {center: sydney, zoom: 15});
var request = {
query: 'Museum of Contemporary Art Australia',
fields: ['name', 'geometry'],
};
service = new google.maps.places.PlacesService(map);
service.findPlaceFromQuery(request, function(results, status) {
if (status === google.maps.places.PlacesServiceStatus.OK) {
for (var i = 0; i < results.length; i++) {
createMarker(results[i]);
}
map.setCenter(results[0].geometry.location);
}
});
}
function createMarker(place) {
var marker = new google.maps.Marker({
map: map,
position: place.geometry.location
});
google.maps.event.addListener(marker, 'click', function() {
infowindow.setContent(place.name);
infowindow.open(map, this);
});
}
</script>
<script src="https://maps.googleapis.com/maps/api/js?key=&libraries=places&callback=initMap" async defer></script>
Hope this helps!
| 2024-03-21T01:27:13.970301 | https://example.com/article/4278 |
<!DOCTYPE html>
<html>
<head>
<title>Media Capture from Canvas Browser Test</title>
</head>
<body>
<div> Capture and playback from canvas elements.</div>
</body>
<script type="text/javascript" src="webrtc_test_utilities.js"></script>
<script>
'use strict';
const NUMBER_OF_EVENTS_TO_RECORD = 15;
const ON_DATA_AVAILABLE_THRESHOLD = 10;
function checkForRedraw(canvas, drawCounter, drawFunction) {
if (++drawCounter <= NUMBER_OF_EVENTS_TO_RECORD)
requestAnimationFrame(function(){drawFunction(canvas, drawCounter)})
}
function draw2d(canvas, drawCounter) {
var ctx = canvas.getContext('2d');
ctx.fillStyle = 'green';
ctx.fillRect(0, 0, canvas.width, canvas.height);
checkForRedraw(canvas, drawCounter, draw2d);
};
function drawWebGL(canvas, drawCounter) {
var gl = canvas.getContext('webgl');
gl.clearColor(0, 1, 0, 1);
gl.clear(gl.COLOR_BUFFER_BIT);
checkForRedraw(canvas, drawCounter, drawWebGL);
};
function drawOffscreenCanvas(canvas, drawCounter) {
var ctx = canvas.getContext('2d');
ctx.fillStyle = 'green';
ctx.fillRect(0, 0, canvas.width, canvas.height);
checkForRedraw(canvas, drawCounter, drawOffscreenCanvas);
};
function drawBitmapRenderer(canvas, drawCounter) {
var gl = canvas.getContext('bitmaprenderer');
var offscreen = new OffscreenCanvas(canvas.width, canvas.height);
var ctx = offscreen.getContext('2d');
ctx.fillStyle = 'green';
ctx.fillRect(0, 0, canvas.width, canvas.height);
gl.transferFromImageBitmap(offscreen.transferToImageBitmap());
checkForRedraw(canvas, drawCounter, drawBitmapRenderer);
};
function testCanvasCapture(drawFunction) {
var canvas = document.createElement('canvas');
canvas.width = canvas.height = 64;
var stream = canvas.captureStream();
assertTrue(stream, 'Error creating MediaStream');
assertEquals(1, stream.getVideoTracks().length);
assertEquals(0, stream.getAudioTracks().length);
var recorded_events = 0;
const recorder = new MediaRecorder(stream);
assertTrue(recorder, 'Error creating recorder out of the MediaStream');
recorder.ondataavailable = function(event) {
if (event.data.size > ON_DATA_AVAILABLE_THRESHOLD) {
if (++recorded_events == NUMBER_OF_EVENTS_TO_RECORD)
reportTestSuccess();
}
};
recorder.start(0);
if (drawFunction.toString() == drawOffscreenCanvas.toString()) {
var offscreen = canvas.transferControlToOffscreen();
drawFunction(offscreen, 0);
} else {
drawFunction(canvas, 0);
}
}
</script>
</body>
</html>
| 2024-02-04T01:27:13.970301 | https://example.com/article/2053 |
Style
We fell honored to have with us – The Honourable Chief Guest His Excellency Mr Biren Nanda, the Indian Ambassador To Indonesia, – Sir you hardly need any introduction, you have made all of us proud by your distinguished work | 2024-05-04T01:27:13.970301 | https://example.com/article/2692 |
Arsène Wenger has hailed the potential of 16-year-old Chris Willock after the winger caught the eye in a pre-season friendly against Boreham Wood on Saturday.
The teenager was a surprise inclusion in the Arsenal XI which beat the Conference South side 2-0 at Meadow Park, but he delivered an impressive performance during his 45 minute run-out.
Cesc Fábregas, Jack Wilshere and Serge Gnabry were all given opportunities to press their first-team claims in pre-season friendlies at the age of 16, and Wenger believes Willock could be the next youngster to make his mark at Arsenal.
“He’s a very young boy and I wanted him to have a run-out with the big boys to see how much he has to do,” said the Arsenal manager. “But technically and tactically he integrated very well. Of course it’s natural that he lacks a bit of power at that age but when he gets that he will be a very interesting player.”
Willock is one of three footballing brothers. His younger brother Joe also plays for Arsenal, while his older brother Matthew plays for Manchester United. “[The game] was a good opportunity to give everyone 45 minutes,” Wenger told the Arsenal website. “We lacked a bit of incisiveness in our runs and passes which is normal because we are not ready and it was very hot.
“It is more to see who can integrate into the first team from the youth team – who is the closest to the first team. For the first-team players who are used to playing in the Premier League, it was to see how fit they are and how much more work they need.”
Wenger was also delighted to see Abou Diaby get 45 minutes under his belt as he aims to prove his fitness before the new season. “You wish that he just gets through the game, which happened here – I’m very pleased with that,” he said.
“If you get a fit Diaby back, it will be a major asset for our team. At the moment we go step-by-step and he came through this game so that’s very good news for us.” | 2024-07-17T01:27:13.970301 | https://example.com/article/7127 |
/*
* JBoss, Home of Professional Open Source.
* Copyright 2013, Red Hat, Inc., and individual contributors
* as indicated by the @author tags. See the copyright.txt file in the
* distribution for a full listing of individual contributors.
*
* This is free software; you can redistribute it and/or modify it
* under the terms of the GNU Lesser General Public License as
* published by the Free Software Foundation; either version 2.1 of
* the License, or (at your option) any later version.
*
* This software is distributed in the hope that it will be useful,
* but WITHOUT ANY WARRANTY; without even the implied warranty of
* MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU
* Lesser General Public License for more details.
*
* You should have received a copy of the GNU Lesser General Public
* License along with this software; if not, write to the Free
* Software Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA
* 02110-1301 USA, or see the FSF site: http://www.fsf.org.
*/
package org.jboss.as.test.integration.batch.common;
import java.io.ByteArrayInputStream;
import java.io.ByteArrayOutputStream;
import java.io.IOException;
import java.io.ObjectInputStream;
import java.io.ObjectOutputStream;
import java.io.Serializable;
import java.io.StringReader;
import java.io.StringWriter;
import java.nio.charset.StandardCharsets;
import java.util.ArrayList;
import java.util.Arrays;
import java.util.Collection;
import java.util.Date;
import javax.batch.runtime.BatchStatus;
import javax.batch.runtime.Metric;
import javax.batch.runtime.Metric.MetricType;
import javax.batch.runtime.StepExecution;
import javax.json.Json;
import javax.json.stream.JsonGenerator;
import javax.json.stream.JsonParser;
import javax.json.stream.JsonParser.Event;
/**
* @author <a href="mailto:jperkins@redhat.com">James R. Perkins</a>
*/
public class StepExecutionMarshaller {
static final String ID = "id";
static final String NAME = "name";
static final String STATUS = "status";
static final String START_TIME = "startTime";
static final String END_TIME = "endTime";
static final String EXIT_STATUS = "exitStatus";
static final String PERSISTENT_USER_DATA = "persistentUserData";
static final String METRICS = "METRICS";
private static final String METRIC = "metric";
private static final String METRIC_TYPE = "type";
private static final String METRIC_VALUE = "value";
public static String marshall(final StepExecution stepExecution) throws IOException {
final StringWriter writer = new StringWriter();
final JsonGenerator generator = Json.createGenerator(writer);
generator.writeStartObject()
.write(ID, stepExecution.getStepExecutionId())
.write(NAME, stepExecution.getStepName())
.write(STATUS, stepExecution.getBatchStatus().toString())
.write(START_TIME, stepExecution.getStartTime().getTime())
.write(END_TIME, stepExecution.getEndTime().getTime())
.write(EXIT_STATUS, stepExecution.getExitStatus())
.write(PERSISTENT_USER_DATA, serialize(stepExecution.getPersistentUserData()));
generator.writeStartObject(METRICS);
for (Metric metric : stepExecution.getMetrics()) {
generator.writeStartObject(METRIC);
generator.write(METRIC_TYPE, metric.getType().toString());
generator.write(METRIC_VALUE, metric.getValue());
generator.writeEnd();
}
generator.writeEnd();
// End main object
generator.writeEnd();
generator.close();
return writer.toString();
}
public static StepExecution unmarshall(final String json) throws IOException, ClassNotFoundException {
final JsonParser parser = Json.createParser(new StringReader(json));
final StepExecutionBuilder builder = StepExecutionBuilder.create();
String key = null;
while (parser.hasNext()) {
final Event event = parser.next();
switch (event) {
case KEY_NAME:
key = parser.getString();
break;
case VALUE_FALSE:
case VALUE_NULL:
case VALUE_NUMBER:
case VALUE_STRING:
case VALUE_TRUE:
final String value = parser.getString();
if (key == null) {
throw new IllegalStateException(String.format("No key for value '%s'. Parsing position: %s%n\t%s", value, parser.getLocation(), json));
}
switch (key) {
case ID:
if (value != null) {
builder.setId(Long.parseLong(value));
}
break;
case NAME:
builder.setName(value);
break;
case STATUS:
if (value != null) {
builder.setStatus(BatchStatus.valueOf(value));
}
break;
case EXIT_STATUS:
builder.setExitStatus(value);
break;
case END_TIME:
if (value != null) {
builder.setEndTime(Long.parseLong(value));
}
break;
case START_TIME:
if (value != null) {
builder.setStartTime(Long.parseLong(value));
}
break;
case PERSISTENT_USER_DATA:
builder.setPersistentUserData(deserialize(value));
case METRICS:
String k = null;
String metricType = null;
String metricValue = null;
while (parser.hasNext()) {
final Event e = parser.next();
switch (e) {
case KEY_NAME:
k = parser.getString();
break;
case VALUE_FALSE:
case VALUE_NULL:
case VALUE_NUMBER:
case VALUE_STRING:
case VALUE_TRUE:
if (k == null) {
throw new IllegalStateException(String.format("No key for value '%s'. Parsing position: %s%n\t%s", value, parser.getLocation(), json));
}
switch (k) {
case METRIC_TYPE:
metricType = parser.getString();
break;
case METRIC_VALUE:
metricValue = parser.getString();
break;
}
if (metricType != null && metricValue != null) {
final MetricType type = MetricType.valueOf(metricType);
final long v = Long.parseLong(parser.getString());
final Metric m = new Metric() {
@Override
public MetricType getType() {
return type;
}
@Override
public long getValue() {
return v;
}
};
builder.addMetric(m);
}
break;
}
}
break;
}
break;
}
}
parser.close();
return builder.build();
}
private static String serialize(final Serializable serializable) throws IOException {
final ByteArrayOutputStream baos = new ByteArrayOutputStream();
final ObjectOutputStream out = new ObjectOutputStream(baos);
out.writeObject(serializable);
out.flush();
return baos.toString();
}
private static Serializable deserialize(final String data) throws IOException, ClassNotFoundException {
if (data == null) {
return null;
}
final ByteArrayInputStream bais = new ByteArrayInputStream(data.getBytes(StandardCharsets.UTF_8));
final ObjectInputStream in = new ObjectInputStream(bais);
return (Serializable) in.readObject();
}
static class StepExecutionBuilder {
private long id;
private String name;
private BatchStatus status;
private long startTime;
private long endTime;
private String exitStatus;
private Serializable persistentUserData;
private final Collection<Metric> metrics;
private StepExecutionBuilder() {
id = -1L;
name = null;
status = null;
startTime = 0L;
endTime = 0L;
exitStatus = null;
persistentUserData = null;
metrics = new ArrayList<Metric>();
}
public static StepExecutionBuilder create() {
return new StepExecutionBuilder();
}
public StepExecutionBuilder setId(final long id) {
this.id = id;
return this;
}
public StepExecutionBuilder setName(final String name) {
this.name = name;
return this;
}
public StepExecutionBuilder setStatus(final BatchStatus status) {
this.status = status;
return this;
}
public StepExecutionBuilder setStartTime(final long startTime) {
this.startTime = startTime;
return this;
}
public StepExecutionBuilder setEndTime(final long endTime) {
this.endTime = endTime;
return this;
}
public StepExecutionBuilder setExitStatus(final String exitStatus) {
this.exitStatus = exitStatus;
return this;
}
public StepExecutionBuilder setPersistentUserData(final Serializable persistentUserData) {
this.persistentUserData = persistentUserData;
return this;
}
public StepExecutionBuilder addMetric(final Metric metric) {
metrics.add(metric);
return this;
}
public StepExecution build() {
final long id = this.id;
final String name = this.name;
final BatchStatus status = this.status;
final long startTime = this.startTime;
final long endTime = this.endTime;
final String exitStatus = this.exitStatus;
final Serializable persistentUserData = this.persistentUserData;
final Metric[] metrics = this.metrics.toArray(new Metric[this.metrics.size()]);
return new StepExecution() {
@Override
public long getStepExecutionId() {
return id;
}
@Override
public String getStepName() {
return name;
}
@Override
public BatchStatus getBatchStatus() {
return status;
}
@Override
public Date getStartTime() {
return new Date(startTime);
}
@Override
public Date getEndTime() {
return new Date(endTime);
}
@Override
public String getExitStatus() {
return exitStatus;
}
@Override
public Serializable getPersistentUserData() {
return persistentUserData;
}
@Override
public Metric[] getMetrics() {
return Arrays.copyOf(metrics, metrics.length);
}
};
}
}
}
| 2023-08-13T01:27:13.970301 | https://example.com/article/4251 |
2. Let u be f(19). Let g = -1 + -5. Let s be u/3*g/(-20). Which is the closest to s? (a) 3/4 (b) 0.1 (c) -1/3
b
Let t = 157 - 157. Suppose -7 = -3*w - 1. Which is the nearest to t? (a) w (b) -4 (c) -0.3
c
Let r = -0.078 + 5.178. Let v = r - 0.1. Let h = -5 - -1. What is the nearest to 0 in v, h, -2?
-2
Let g = -190 - -189.4. Which is the closest to 1? (a) -0.5 (b) g (c) -2/5
c
Let p(k) = k**2 - k + 1. Let i be p(0). Suppose 15*c = 24 + 6. What is the nearest to -1 in c, 2/19, i?
2/19
Suppose 2*r + 5*i + 5 = 0, -3 - 12 = 5*i. Let z = -6407/15 + 427. Which is the closest to z? (a) r (b) -0.2 (c) -4
b
Let t = 92.2 - 87.2. Which is the nearest to 1/3? (a) -2 (b) -2/5 (c) t (d) 0
d
Let n = -1/283 + 1137/1415. Let u = -3 + 0. Let m = 79/4 + -20. Which is the closest to 0? (a) n (b) m (c) u
b
Let b = 1.02 - 0.02. Let t = b - 1.2. Suppose -3*y = 2*c - 3, 4*c - 20 = 5*y - c. What is the closest to -1/8 in t, 1, y?
t
Suppose -r - 3*v + 8*v = 0, 3*v = 3. Let z = -0.83 - -1.13. Let o = -1 - -2. Which is the closest to z? (a) r (b) o (c) -2/23
c
Let f = 8.71 + -8.91. What is the closest to -3/2 in -2/23, -3/7, 5, f?
-3/7
Let g be (49/(-14) + 3)*6/2. Which is the closest to 5? (a) 1 (b) g (c) 1/7 (d) 0.3
a
Let q = 2.9 - 2.5. Let l = q + -2.4. What is the nearest to l in 1/3, -0.5, -3/2?
-3/2
Let o = -1008 + 1009. Which is the closest to o? (a) -0.1 (b) 1/7 (c) -0.4 (d) 2/5
d
Let u = 14.5 + -14.6. Suppose -3*q + 6 + 9 = 0. Let f be (1/9)/1*4. What is the closest to u in f, q, 3?
f
Let x = -655 + 646. Which is the closest to x? (a) -2/13 (b) -3/2 (c) 9
b
Let g = -2.14 + 1.9. Let l = g - 0.06. Let z = -7 + 6. Which is the closest to z? (a) l (b) 2/13 (c) 1/6
a
Let r = 9/83 - -49/1079. Which is the nearest to 1/102? (a) r (b) -5 (c) -2/5
a
Let z = -0.45 - -0.05. Let n = -0.49 - -2.49. What is the closest to n in z, -8, 1?
1
Let i be (5/(-2))/((-1)/2). Let p be -8 + -45*(-1)/6. Which is the closest to p? (a) -0.04 (b) 3 (c) i
a
Let w = 1/6 + -1/2. Let g be (-16)/(-32)*((-38)/(-6) - 3). Let v = -0.3 + 2.3. What is the closest to 0 in w, v, g?
w
Let r = -4.3 + 4.6. Suppose s + 22 + 7 = -5*k, 5*s = k + 11. Let a be (2/9)/((-2)/k). What is the nearest to a in 1, -1/2, r?
1
Let l = -129.1 - -128.6. Let u = -1 - -1.5. What is the nearest to -1 in l, 0, u?
l
Let j = 14/3 + -5. Which is the closest to j? (a) -0.14 (b) -3 (c) -4
a
Let l be (0 - -4)/(1 + -2). Which is the closest to 0.2? (a) l (b) -1 (c) -2/15
c
Let i = -163 - -2120/13. Which is the nearest to 0.3? (a) 4 (b) i (c) 0.3
c
Let h = 1 - 0. Let j = -8.8 + 0.8. Let t = h + j. What is the closest to 2/5 in t, -5, 0.2?
0.2
Let c = 616 - 613. What is the closest to -2 in 0.2, c, -0.4?
-0.4
Let r = -4.89 - 0.11. Let u = -0.86 - -0.46. What is the nearest to 0.2 in u, 0.4, r?
0.4
Let i = -243 - -243.1. Which is the closest to i? (a) 2 (b) -2/5 (c) -5
b
Let p be (-6)/10 + -6 + 357/70. What is the nearest to 4/9 in 2, p, 2/7?
2/7
Let x = -2748/5 + 550. What is the closest to x in 5, -2, 2/7, -0.1?
2/7
Let t = 3.8 + -0.8. Let q(s) = -s**2 + 13*s + 23. Let r be q(14). Let p(w) = -3*w + 23. Let u be p(r). Which is the closest to 1? (a) u (b) t (c) 0.2
c
Let z = -0.35 - -0.55. What is the nearest to 21 in -2/3, z, -1?
z
Let o = 16.1 + -16.3. What is the nearest to 7 in o, 2, -2?
2
Suppose 80*w - 83*w + 3*z - 12 = 0, 5*z - 13 = -2*w. Which is the nearest to 1? (a) w (b) 2/7 (c) 5/11
c
Suppose -6*l = 729 - 723. Which is the nearest to l? (a) -0.3 (b) -14 (c) 0.5
a
Let a = -3155 - -3154. Let l = 277.91 + -274. Let z = l - -0.09. What is the closest to 1 in z, -1/6, a?
-1/6
Let f = 210 + -2308/11. Let r(u) = 2*u + 5. Let m be r(15). Let g = 36 - m. Which is the closest to 1? (a) g (b) f (c) 2/13
a
Let q = 5 - 4.96. Let l = 0.16 + q. Let x be (-6)/(-33) + 7/(77/(-24)). What is the nearest to 1/5 in -4/3, l, x?
l
Let q be 68/(-140) + 2/7. Let k = -1.12 + 1.02. Let i = 0.013 - -1.987. Which is the closest to k? (a) i (b) -2/11 (c) q
b
Let t = 4.13 + -0.13. Let u be (16/20)/(4 - 0). What is the nearest to 0.2 in t, -1/3, u?
u
Let w = -1.3 - -5.8. Let f = w - -0.5. Let l = -4.5 + f. Which is the closest to -1/2? (a) l (b) 0 (c) 2/17
b
Let v = 0.2 - -0.3. Let g = -0.03 - -0.23. Which is the nearest to g? (a) -1 (b) 1 (c) v
c
Let h = 6 + -5.99. Let v = 0.51 - h. Which is the closest to 0.1? (a) 6 (b) v (c) -5
b
Let d = 3.6 + -3.5. Let s(r) = -r - 7. Let m be s(-7). Suppose -4*x = -m*x - 8. Which is the nearest to d? (a) x (b) -5 (c) -0.3
c
Let j = -151 + 154. Let i = 8 + -7.7. Which is the closest to 1/3? (a) 5 (b) j (c) i
c
Suppose -54 = -20*v - 174. Let g = v - -25/4. What is the closest to -6 in -2, g, -1/5?
-2
Let h = 271 - 273. Let f = 5.1 - 5. Which is the nearest to h? (a) f (b) -3/5 (c) 0.05
b
Let d = 452 - 453. Which is the nearest to -9/2? (a) -1/9 (b) d (c) -0.5
b
Let u = 166 - 165. What is the closest to u in 3/16, 0.5, 0.2, 1?
1
Let s = -236 + 240. Which is the nearest to 5? (a) s (b) -2 (c) -0.2
a
Let l = -0.051 - 0.049. Let w = 3.3 - 11.3. What is the nearest to l in 0.3, -0.1, w?
-0.1
Let u = 1/8 - 3/8. Let s be -1 + 0 + 24/21. What is the nearest to -0.5 in -0.1, s, u?
u
Let m = 1.78 - -0.22. Which is the closest to -1? (a) 1/3 (b) -14 (c) 1/4 (d) m
c
Let j(f) = f**3 + f**2 + 2*f + 2. Suppose -2*w = 2*n + 10, -2*n + 8*w = 3*w - 11. Let g be j(n). Let h be 2/3*g/12. What is the closest to 2/3 in -0.5, 1, h?
1
Let v = 0 + 1.1. Let t = -0.7 + v. What is the closest to -2 in 0, t, -2?
-2
Let v = 0.709 - 1.709. What is the nearest to v in -0.1, -1/20, 2/21?
-0.1
Let t = -506.9 + 507. Let n be (8/20)/(28/(-20)). What is the nearest to t in 0, n, -1/4?
0
Let j = -31/16 + 11/16. What is the nearest to 2/25 in -2, j, -4?
j
Let y = -1920 - -1925. Which is the closest to 1? (a) y (b) 7 (c) 1 (d) -0.2
c
Let m = 76 - 75.9. Which is the nearest to 6? (a) m (b) -0.8 (c) 4
c
Let l = 0.3 + -5.3. Let u = 26.4 - 26.4. Which is the closest to -2? (a) 0.2 (b) u (c) l
b
Suppose m = 5, -2*y + m = -y + 1. Suppose -b - 29 = q, 5*q + y*b = 9*b - 115. Let d be q*3/24 - -3. What is the nearest to 0.2 in -0.05, d, -5/2?
-0.05
Suppose -l + 84 = m, -4*m = m - 5*l - 380. Let p be ((-228)/m + 3)*-4. Let f = 1 + -2. What is the closest to f in 0, p, 0.5?
p
Let n = 499 - 4489/9. What is the nearest to n in 4, 1/8, -1/7, -1/3?
1/8
Let w = 4.8 - -11.9. Let c = w + -17. Let b be 1*((-16)/5 + 3). What is the nearest to c in b, -2, -0.5?
b
Let j = 1/10 + -3/10. Let s = 46 - 12. Let m = 34 - s. What is the closest to m in -2, j, 3?
j
Let y = 2 - 3. Let v = y - -1.5. Let t = 710 - 710.2. Which is the closest to t? (a) v (b) -1 (c) -4
a
Let j = 315.4 + -315. Which is the nearest to -2/3? (a) j (b) -0.08 (c) -4/3 (d) -5
b
Let j = 0.03 + 0. Let i = 0.03 - j. Let z = 220.6 + -221. Which is the nearest to i? (a) -1/2 (b) -2 (c) z
c
Let f = -155 - -153. Let k = -2 + -10. Let w be 2/(-4)*(-16)/k. Which is the nearest to f? (a) 0.1 (b) w (c) 3
b
Let w = -10049/105 - -479/5. Let h = -25 - -33. Suppose -4*t + 4*i = -h, 4*t - 2*i = 3*i + 9. Which is the closest to t? (a) w (b) -2 (c) 0.5
c
Let u = 0.232 - 0.032. Let x = -30 - -31. Let g be 4/18*(-6)/(-8). Which is the nearest to x? (a) u (b) 3/5 (c) g
b
Let x = -1.848 + 1.8. Let s = 0.648 + x. What is the nearest to s in 1, 3, 1/3?
1/3
Let l = -3.87 + -0.13. Let p = -1523 - -1522. Which is the nearest to p? (a) -1/30 (b) 1/3 (c) l
a
Let f = 5 + -5. Let d be (-60)/35 + 182/49 + -4. Which is the nearest to -1/9? (a) d (b) -1 (c) f
c
Let h = 1.22 + -0.82. What is the closest to 0.9 in 1, -0.5, -0.3, h?
1
Let o = -209.1 - -208.1. Let a be (-3)/8 - (0 - 0). What is the closest to 0.1 in a, o, 0?
0
Suppose -2*z - 5*m + m + 12 = 0, -3*z - m = -8. Let p = 5 + -1. Let j = -1.68 + -2.32. Which is the nearest to -0.1? (a) p (b) z (c) j
b
Let s = -5.12 - -5.42. Which is the nearest to -0.4? (a) s (b) 0.4 (c) 5
a
Let t = 0.32 + 2.68. Let f = 983/5 - 197. What is the nearest to -2/9 in f, t, -0.5?
f
Let u = -331 - -338. Which is the closest to 1/2? (a) -0.4 (b) -2/7 (c) u (d) -0.3
b
Let q = -61 + 83. Let r be 11/q*(-2)/10. What is the closest to 1 in 0.1, -15, r?
0.1
Let p be (-126)/(-24) | 2024-04-02T01:27:13.970301 | https://example.com/article/7554 |
Comparative morphology of the hyo-laryngeal complex in anthropoids: two steps in the evolution of the descent of the larynx.
The descent of the larynx is a key phenomenon not only in postnatal development, but also in the evolution of human speech. The positional change of the larynx is affected by the descent of the hyoid bone in relation to the mandible and cranial base, and that of the laryngeal framework in relation to the hyoid bone. The phylogeny of the spatial configuration of the hyo-laryngeal complex is one of the most important sources of information for elucidating the evolution of laryngeal descent. In the present study, the anatomy of the complex was examined in various species of anthropoids to compare the configuration, the shape of the basihyal and thyroid cartilage, and the length of the lateral thyrohyoid ligaments. Non-human hominoids share most features with humans, while cercopithecoids and ceboids have anatomical features that sharply contrast to humans, except for the form of the thyroid cartilage in ceboids. The laryngeal framework in hominoids is well separated from and assured of mobility independent of the hyoid. In cercopithecoids and ceboids, it is, by contrast, locked into and tied tightly with the hyoid so that the hyo-laryngeal complex acts as a functional unit. This spatial configuration is considered to be significantly related to the mechanism that prevents aspiration, including epiglottic movement and vestibular closure. Non-human hominoids are inferred to share the mechanism with human adults, not with cercopithecoids and ceboids, although their larynx is located as high as the latter. Consequently, it is hypothesized that the descent of the larynx evolved in two steps. The first step would have been descent of the thyroid in relation to the hyoid for the evolution of the mechanism preventing aspiration, which occurred in the common ancestor of hominoids. The second step, descent of the hyoid within the neck, occurred during hominid evolution for human speech. | 2024-01-06T01:27:13.970301 | https://example.com/article/3123 |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.