text
stringlengths
0
7.84M
meta
dict
View Single Post Re: The Necromancer's Pact VIII: The Rising Tide Adalmar He had not the words to convince them. Frustration. His hands balled into fists. So he says, softly : "I cannot abide what he's done. But do not take the life of a man lightly." Only after he utters those words does he realize that he erred. The very solution he proposed, handing him to the Rashemen, would result in his certain death, for he now remembers that they also oppose the Night fervently. And it would slow their critical mission down. What to do ? Taking a few steps away from the group, he leans on the stone wall, welcoming its coolness, and tilts his head back.
{ "pile_set_name": "Pile-CC" }
In vivo effects of different antispasmodic drugs on the rat bladder contractions induced by topically applied KCl. The model originally proposed by Postius and Szelenyi for in vivo screening of spasmolytic compounds on the rat urinary bladder, has been modified and tested to verify its predictivity. The topically applied KCl induced reproducible contractions of the bladder that were dose dependently inhibited by i.v. administration of calcium antagonists like nifedipine, nicardipine, and verapamil. The other spasmolytics tested (oxybutynin, terodiline, flavoxate, and papaverine), showed a non-dose-related inhibition of the contractions. The in vivo potency of the calcium antagonists was related to their in vitro activity on the agonist-induced contractions of rat bladder strips, whereas the activity of the other spasmolytics appeared higher than that predicted on the basis of their in vitro efficacy. Nicardipine showed a dose-dependent inhibition of KCl-induced contractions also after oral administration, whereas oxybutynin and papaverine behaved as after i.v. administration. The described model represents, therefore, a good, quantitative, and reproducible tool of screening at the bladder level only for antispasmodic drugs endowed with strong calcium antagonistic activity.
{ "pile_set_name": "PubMed Abstracts" }
" Maybe you're just not cut out for the insurance business." " I didn't call anybody a name." " I've got at least three witnesses." " Which." "She asked me to move a box, there were two, I didn't know." " Okay, sure." "I think it's fair to say we gave you a shot." "Give my regards to your mother." " Did you love her?" " That was a long time ago." "All right, Sam." " Oh my god." "You'll never believe who has been texting me all day." "I told him, I cannot talk to him while I'm at work, he's like, gets all insecure if I'm not texting him back." "He's such a girl." " With the Malibu look, we want the feeling of a fresh kissed cheek, and a smoldering lip." " Frank's bringing a friend tonight." " Heaver liner says you won't be carried away on any old breeze." "It frames the look for sophistication." " You're going to give him a chance." " Another friend?" " Guys like prince charming don't just show up." "They're not perfect from the get go." "I have to stop smoking." " We're quitting again?" "Sandy gold tones and sunset pink light up your eyes." " We can't stay roommates forever." "We have to be grownups with men, husbands." " As long as the numbers on the bottom of the color start with, with a..." " Don't you wanna meet somebody?" " I met somebody today." " You did?" "Where?" " On the train." " You talked to some guy on the train?" " For over an hour." " Sounds like a guy with time on his hands." " He has a job." " Did you give him your number?" " He's an architect, he's German." " Did he ask for your number?" " I'm gonna see him again." " On the train." " Yes." " Just give frank's friend a chance." " You've been smoking." " They're not mine." " How did they get here?" " How did you get fired?" " What did mills tell you?" " Can I hear it from you?" " We didn't get along so well." " What does that mean, a man, a woman?" " What did mills tell you?" " May I hear it from you?" " She was wasting my time." " Didn't you get paid by the hour?" " She misheard me." " What did you really say?" " I said, "which?"" "There were two boxes, I didn't know, which?" "Date tonight?" " It's worse that you lie to me." " It's not my fault, mills said I'm just not cut out for the insurance business." " What, did they teach him that in management school?" " Yes, I asked him." " Your favorite, general Tso's." " Where'd you get it?" " New price, my compliments." " Tea, please?" " Oh, you've eaten here before, I know you don't tip." " I was thinking I could stay here tonight," "I mean, we could watch TV, the two of us." " I'm going out." " The girls?" " A friend." " Why don't you just call him your date?" " Why don't you go eat your dinner." " I could wait up." " You know, there's a reason you don't live here." " What's that?" " Why don't you go eat your dinner." " No more jobs, mom." " So, I'm supposed to pay your rent for you?" "You think you have a right to that?" " Take them." " They're not even mine." "Lock the door on your way out." " Frank here's the best." " Oh, guitar concert." " And I play the bass, I'm the bassist for the band." " Yeah, he's the best bassist." "Dude." "The stadium is packed, everyone's going nuts." "They're going crazy." " And then they rush on stage and they go oh, that's the greatest guitarist, greatest guitarist ever." " Oh, okay, now we're breaking stuff." "Okay, just intermission." " Oh, ladies on stage." " The groupie comes in, the groupie's then like the main, like the fan, and you're so sweaty." " You're really beautiful, you know that?" " I have a really sensitive gag reflex." " Hi, Sam, my name is Harvey," "I got a call from your mother saying you might be looking for work." "Why don't you." "Your mother said you really loved old people, is that true, Sam?" " You have a lot of pictures." " Hm, that's nothing." "You see those?" "Those are full of pictures of me and my clients taken over the years." "Most of our clients are old bachelors, old spinsters, childless, loveless." "I wouldn't recognize half the people in these pictures because that's the only time they ever smiled." "Those are the ones that mean the most to me." "You really have to love old people to work in this field." " I don't think I'd be here today without old people." " You're not really cut out for this business." " That's funny, most people wait to fire me before they tell me that." " Most people are just looking to fill their staff as simply as possible." " You and my mom dated, huh?" " A long time ago she broke my heart." " Yeah?" " Yeah, I was surprised to hear from her." " It's really something else when they smile, huh?" " Yeah, it is." " Maybe I could give it a try." " This is Harold Washington library, state and Van Buren." "Transfer to red, blue, purple and brown line trains here at Washington library, state and Van Buren." "Doors closing." "Transfer to..." "This is an orange line train to midway." " Susan." "Welcome home." " Hi." " Do you know that frank and I have been together for a few years now, I mean on and off, but now we are back on again, and I'm pregnant." " With a baby?" " We were getting older, I mean this could be my last chance to do this, and I can't explain it, you just see things" "differently when it happens to you." " I guess I wouldn't know." " Obviously, I mean, I need to make some changes." " Changes?" " Well, we're gonna be moving in together and we're gonna need a second bedroom." " You're moving out of our apartment?" " Yeah, I know that this has been our apartment, but first it was mine, I mean I was here first." "I'm on the lease." " But you're the one who needs more space." " Well, I mean, there's no need to rush, we still have time." " When did you tell frank?" " We've known about a week." " That's just the other night." " The other night?" " I was going to the bathroom and he walked in and then when I came out, you know what, forget it." " Forget what?" " No, forget it." " No, forget what?" " It's just, you would expect husband material to go back into your room and wait." " You were naked again, weren't you." " Just going to the bathroom to pee." " We have talked about this." " Sorry." "Still." " You're a little liar." "I think you should pack up your shit sooner than later." " I don't have anywhere to go." " By tomorrow." " Hi, I'm Sam, I work for Goldenpal." "Goldenpal?" "Goldenpal." "I work for Goldenpal." "My name is Sam Gordon." "My name is Sam, and I work for Goldenpal." "My name is Sam, and I work for Goldenpal." " Hello." " Hello, Mrs. white." "My name is Sam, I work for Goldenpal," "I brought your grocery order." " Where's the usual guy?" " This should have been here two days ago." " Ah, you know how to do it." " Mr. hill, check food supply, make sure light bulbs work." "Right." " Who is it?" " Hello, Mr. hill, my name is Sam, I work for Goldenpal." "I brought your grocery order." " Who the hell are you?" " Sam from Goldenpal." " Where's the regular guy?" " I'm the new regular guy." " Yeah, how do I know?" "This food could be poisoned." " Why would anybody..." " tell them to send the old regular guy!" " Mr. hill." "Ow." "Jesus." "Fine." " Transfer to Metro trains and the south." "Doors closing." "Transfer to Metro and south shore trains." "This is an orange line train to midway." " You really let this place go to shit." " I wasn't expecting you." " You knew when my plane was landing." "The men in Paris are a lot neater, that's for sure." " You should have taken me with you." " Don't be jealous." " I don't really have a couch." " You burned it." " Thinking of all those Parisian men made me crazy." " Now where are you gonna sleep?" " Here, wait." " Don't you have a dresser?" " I burned that too." "You can just move things into the corner." " Where'd you put the trash can?" " Okay, actually, those are all collectibles." " Do you not want me here?" " No I do, but," "you ripped my bongo man number three." " Bongo man?" "Looks racist." " He's the most racist superhero ever created." "It was worth 20 bucks." " I just wanted my space for my things." " Okay." "Sorry, I, here, let's move some of my things over." "You smoke." " Nope." " I'm really against smoking." " I don't smoke." " Where'd you get these?" " This guy gave them to me on the train." "This homeless guy, he was doing this mime show, you know, for spare change, and he couldn't do the mime while he was holding his cigarettes so I held onto them, then he went to the next car," "and there was my stop, and I figure I'd probably run into him again on the train, so I've been carrying them around." " He didn't have any pockets?" " You don't want me here." " I didn't say that." " He rides the blue line all the time." " My name is Sam." " I can leave." " I don't want you to leave." " They're his." " What's your name?" " Susan." " Susan?" " Susan." " The homeless mime guy!" " You've seen him." " All the time." "I'll tell you what, I'll hold onto these, and when I see him again, I'll give them back." " Good idea." " Let's unpack you." " Who is this?" " That's my dad." " I like his mustache." " He left when I was little." " Did you know him?" " He was a great actor." " What was his name?" " You haven't heard of him, he was a Soviet." " That explains the mustache." " Soviet theater, you rehearse the same play for a year in all kinds of conditions." "You immersed yourself in the material until it was part of your soul." " Are you an actor?" " No." "He left me a book." "Elements of acting." "It's out of print." "Is this your family?" " No." "It came with the frame." " You're kidding, because I would believe it if that were you as a little girl." " She just came with the frame." " It looked like a real family, there's a definite resemblance." " Maybe they're a model family." " That's strange, these are all the same people except they're older." "Maybe they're marketing it as a more mature picture frame." "I hear they do that, older families, more mature frames." " That must be it." " I wonder what happened to the mother." " How should I know." "Is this your guitar?" " No." " Oh, too bad." "I always wanted to know a musician." " It's my friend Toto Sobieski's guitar." "Hold on, I think he's around here somewhere." "Oh, Susana, it is I, Toto Sobieski." "I have come to play a song for you." " Pretty good." " Pretty good." " Yeah, it was all right." " Rule number one of Soviet theater, you must perform in the adverse conditions." " What are you doing?" " Grab a tray, come on." "It's gotta be cold." "Sing for me, sing!" " I don't sing." " I'm standing in a tub of ice water for you, sing for me." " I don't." " Jesus, I'm cold." "I know this place isn't up to your standard." " Well, I am a princes." " You look like a Princess." " I am a Princess." " Princess from where?" " Hungary." "I'm a Hungarian Princess." " I've always wanted to host a Princess." " Obviously built your life on that dream." " I'm really glad you're here, you're a very beautiful woman." " Can you turn out your light?" " Sorry, I'm making this awkward." " I sleep naked." " It was the damn neighbor's cat came in here, peed on the floor." " That's funny, all the windows are shut." " Did anybody ever tell you, you've got a nice looking ass." " Mr. hill, it's Sam from Goldenpal." "I have your groceries." "I'll just leave it here." "Mr. hill?" "Mr. hill?" "Mr. hill?" "You really ought to keep your windows locked." "Mr. hill?" "Mr. hill, it's Sam." "Mr. hill?" "Mr. hill?" " You cut your hair." " You're thinking of the old, yeah, I cut my hair." "Do you maybe want some lunch?" "Let me help you with that." " It's sort of a reversal, isn't it." " How do you mean?" " You feeding me." "I guess it was your mother who did most of the feeding, wasn't it." " I'm not your..." " you always wanted a father, and now all I want is my son." "Go on, yell at me." " What for?" " Look what I did to your mother's house." "What would she say?" "She'd say, over my dead body." "I guess she had the idea that I would die first." "Go on, be mad at me." " Why don't you have..." " yell at me!" " Just one forkful." " Be mad at me!" " Dammit, this place is filthy." " Ah, that's not what you're angry about." " What am I angry about?" " About how I treated your mother." " Why am I mad about that?" " Well, you loved her, didn't you?" " Of course I did." " Tell me how mad you are about how I treated your mother." " I'm mad at you..." " for once, call me dad." " Dad, I'm mad at you for how your treated my mother!" "What's that smell?" " Stuffed cabbage." "It's an old family recipe from Hungary." " That's my shirt." " I know." "What do you think?" " Pretty good." "It's really good." " It's the royal recipe." "I learned it from my grandmother." " What's in it?" " I can't tell you, it's secret." " I definitely taste onions." " No, there's no onion." " And paprika?" " Paprika." " I taste paprika." " Paprika, of course, it's Hungarian." " Sorry." " No, it was a stupid thing to say." " I'm sorry." " You always make the dumbest observations." " It tastes good." " Einstein thinks there's paprika in my royal Hungarian stuffed cabbage." " I ran into the mime today." " Who?" " The mime on the train." " Oh, the mime." " I gave him back his cigarettes." "You're welcome." " Oh." " And I come home and you berate me." " It's just I saw him too." "And he was trying to do his mime but he couldn't because he had to hold his cigarettes, and nobody else would take them." " He should really quit smoking." " How was work?" " Sort of a rough day today." " I get so jealous." " You get jealous?" " All those ladies at the office dangling themselves on you." " All the ladies are elderly." " And you take such good care of them, feeding them, wheeling them around." " Want me to wheel you around?" " I'd like to be taken care of." " Well, it's awful that a Princess has to work." " These days, even a Princess needs a trade." " I forget what trade you're in." " Cosmetics." "I'm an international cosmetics consultant, why can't you keep that straight?" " I get confused." " I bet you've forgotten again already." " We should put on some music." "Where'd you put my cds?" " I assumed you had them on your computer." " I don't have a computer." " You don't have a computer?" " Where'd you put 'em?" " We needed space, I sold them." "It's 20 dollars, it makes up for the bongo man." " You sold all of my music for 20 dollars?" " They said they were gonna throw most of it out." "It's for bongo man." "Everybody has a computer." " How long are you planning to stay here?" " You want me to go?" " Your family is royalty." "They probably have a lot more things to destroy at their castle." " I don't have a castle." " Still." " I can't go back." " Why not?" " There is a man..." " a man, like a suitor?" " I'm royalty on my mother's side, she passed away, my father lost his claim." "He wants me to marry back into nobility." "But I don't love the man he wants me to marry, so I had to leave and I can't ever go back." " Your father won't let you come home?" " Not ever again." " So then you're not a Princess really any more." "I'm sorry." "I just like to listen to music." " Maybe Toto Sobieski could play for us." " Toto isn't here tonight." " I miss Toto." " Cowboy Griggs might show up though." " Who's cowboy Griggs?" " Hold on, I think I hear him riding up now." "My father's second rule, you have to be able to scream the words out loud." " He's very rich." " Who is?" " My father." "Someday, when he's gone, I'll be rich, and if you want, if you keep me around, we'll live in a castle." " A castle?" " Wherever you want." " That'd be nice." " Keep me around." " It's that darn cat..." " I know, the cat." "I'll say something to the neighbors." " That's what I wore the night I married my ex husband." " It's very pretty." " You should see it on." " Mr. hill?" "Mr. hill." "Mr. hill." "It's getting a lot better." " Over my dead body, she would have said." "She said, you know, she isn't worrying about us." "Say it." " Say what?" " She's dead." " She's dead." " Who's dead?" "Say it." " My mother, my mother is dead." " She was my wife." "Don't you think I miss her too?" " I'm sure." " What do you want?" "An apology?" "What should I apologize for?" " I don't want..." " what should I apologize for?" "Tell me and I'll apologize for it!" " Mr. hill." " Call me dad." " Dad." " Tell me what to apologize for." " You abandoned us." " I worked, I supported you." " You supported me?" "You never even knew me." " I'm sorry." "Forgive me." " Okay." " I always loved you." " I cleaned out your bathroom." "I should probably move on to your bedroom." " Don't bother about the bedroom, it's filthy." " But wouldn't it be nicer to sleep..." " I sleep here." "Don't go in there." "It's too filthy." " Come in." " Hi." " Another late night." "You having trouble with the round?" " No, I'm just getting to know some of the customers." " You know, we're only licensed to bring 'em groceries, household chores, we're not insured for anything else." " Yeah, I know, I guess I just really like old people." " Oh, I'm glad somebody's having fun." " You know, if you ever need any help with the desk stuff," "I mean, if you felt like you wanted to teach somebody." " You keep charming clients like Mr. hill and I'll have to make you a partner." "Go on home, get some sleep." " I know how you like a picnic." "I can cook for you over fire." " Just like old times." " Just like our first spring together." " Was it this cold?" " Colder, but the fire kept us warm." " And we had the whole park to ourselves because nobody else was crazy enough to be out here." " It wasn't crazy, it was romantic." " It rained on us." "I told you it would, but you insisted on staying out." " It didn't rain, you insisted it was going to rain, but it didn't." " We were soaked, when you brought me home," "I caught the flu." " It wasn't the flu, just a lot of whining." " It only sounded like whining because of the laryngitis." " Do you remember the look on your face when you realized you hadn't brought self lighting coals and we had no lighter fluid, and it was cold." " That's when I pointed out to you that hotdogs are precooked." " And I asked if you could possibly be serious." " Until you realized that cold hotdogs taste great." "Like bologna." " Until it made me puke." " No, that was another time, you loved the cold hotdog." " Our recollections differ." " That's when Honolulu Fred showed up." "And now I will scream the words out loud in an adverse condition." " Remember when it started to rain so you took me home?" " But first, I reminded you of my father's third important rule of performance." " What was that?" " You have to do the thing that scares you the most." " What scares you the most?" "It's raining." "I'm gonna get in the shower." "It's freezing cold." " I'm sorry." " What are you sorry about?" " For getting you wet." " You forgot one last thing about that day." " What was that?" " That was the first time we kissed." "Are you embarrassed of me?" " What?" "No." " You still haven't introduced my to your mother." " You want to meet my mother?" " Really?" " Really what?" " Ask her what we should bring." " Mrs. Rantoni?" "The front door was unlocked." " In here." " I'm just gonna drop your food in the kitchen." "Mr. Vaughn, I made you a sandwich." "Darn cat, huh?" " Darn cat what?" " Let's find you some fresh pants." "I should probably head out." " So, Susan, what do you do for a living?" " I sell makeup for Chichino." " Oh, you're a Chichino lady." " You have such a beautiful complexion." " I hate my skin." " If I may, I think you use too much bronzer." " I'm so pale otherwise." " Pale is beautiful." " Maybe you could come by and make me over sometime." "Oh, that must be the food, Sam." " I got it." " Here." " No, mom, I got it." " Okay." "So, how did you two meet?" " At the grocery store." "I couldn't reach the breakfast cereal that I wanted." " I can't believe he just brought you home, you're already living together." "How long have you been dating?" " A week." " A week?" " I feel like I know so much about him." "He told me all about you and his father." "I hope someday his father comes back to the United States so I can meet him." " His father?" " Soviet acting is so intense." " Soviet acting." " His father is an actor in Russia." " When I had Sam, it was a very bad time for me." "I was a junkie, sweetheart, I slept with a lot of men." "It would have been nice if one of them had known how to act." "Maybe they would have acted nicer." "I don't know who Sam's dad is." "Neither does he." " Okay, we have egg roll, broccoli." " Sam?" "Your mother said something to me while you getting food." " She really likes you, I can tell." " It was about your father." " Oh." " She said she doesn't know who he is." " I don't know why she would say that." " Do you know him?" " He left me the book." " Your mother said she was a junkie." "I make up stuff about myself sometimes to make people think stuff about me." "Maybe if you told me something you were making up about yourself, I could tell you something" "I was making up about myself." " You lied to me about something?" " No, not to you." " What did you lie about?" " All I'm saying is if you told me you were making stuff up about your father, maybe I could tell you something." " Just tell me what you lied about." " I didn't..." " I don't wanna live with a liar." "You can't stay here in my apartment if you're a liar." " I'm not a liar." " Rule number four from the book, always tell the truth." "You can't break that rule." " I'm not an actor." " You're not a Princess." " No, I'm not a Princess." " Those people in the photos, they're your family." " Yes." " What happened to your mother?" " She died." "My father killer her." " He killed her?" " They used to fight a lot." "My father would drink, she would hide his bottles the one place she knew he wouldn't go looking for them, under my bed." "Then he'd go out to the bar instead." "He'd come home still thirsty." "One night he came home and they started fighting again." "Money, work, then finally, "where's my bottles?" ""Where's my bottles?"" "Mom made swear not to tell him, so I lay in my bed." "I stayed there as the screaming got louder and louder." "And then it changed, it was a different scream." "It was a scream you had to make stop like when a baby cries." "So I went under my bed, I found a bottle," "I took it to the kitchen, and my father was standing there a knife in his hand, blood dripping." "Mom was crumpled in a heap." "He looked at the bottle, he looked at me." "His eyes were blank." "There was nothing in them." "They ruled it temporary insanity." " What happened to you?" " When my sisters were older they took care of me until he came back." "But when he came back, I couldn't be around any more." "I couldn't feel safe." " Is that the truth?" " Maybe sometimes it's better not to know your father all that well." " My father was a great actor." " Okay." " I don't believe you." "I don't believe anything you say any more." "I want you out by tomorrow." "Mr. hill?" "I really prefer not to do this." "Look, I know it's not standard operating procedure, but maybe give me a key?" "Mr. hill." " Oh, I got dizzy." " Let's get you into bed, can you stand up?" " Where are we going?" " I want to show you something, your bedroom." " No, no, it's filthy." " Your bedroom is clean, Mr. hill." "It just needed a little dusting." " No, my chair." " You need to lie down." " Stop." " The bed is made and everything." "It'll be nice and comfy." " No no, just let me go." "Freda." " It doesn't sound like the hill family's gonna sue." " I get it, I fucked up." " I told you, we are a food delivery service." "We do chores." "We're not licensed to provide medical assistance." "Why didn't you call an ambulance?" " You're firing me, it's not a big deal, you're not the first." "It's just the first job I actually cared about." " I'm not firing you." "You made a mistake, learn from it." " You have to fire me." "I fucked up, I get fired." " I am not firing you." " I killed a man, you have to fire me!" " You want to get fired?" "Fire yourself." "Quit if you like." " Fine." "I quit!" " What are you doing here?" " Who's that?" " He's my guest." " Is Harvey my dad?" " I'll be going." " I'll call..." " sure, sure." " Did you talk to Harvey?" " Did you get fired?" " I quit." " What happened?" " I killed a client." " What?" " I gave him a stroke." " Oh, you can't give somebody a stroke." " He didn't have to die." " You didn't get fired?" " No, I quit." " What did Harvey say?" " It's pretty obvious I'm not cut out for the job." " Harvey didn't say that." " He said, "you want to get fired, fire yourself."" " That's how he talks." " You've been smoking again." " Mel must have left 'em." " Mel smokes slims?" " I guess he does." " If you're smoking, say you smoke." " I'm not smoking." " Because if you tell me you don't smoke and I know you're smoking, how can I believe anything you tell me?" " Because I tell you it's true." " Whereas if I know you're smoking, and you tell me you smoke, I won't be happy, but I'll know you're honest." " They're not mine." " Whereas if you tell me you're not smoking and I can smell it on your clothes and on your hair," "I know you're lying." " I'm not smoking." " Is Harvey my father?" " How is this supposed to make me feel?" "Did I not work every day of your childhood to clothe you and to feed you?" "Did I not still squirrel away money so at Christmas time" "I could buy you presents?" " Is he?" " Don't you think I wanted you to have a father?" " It's him, right?" "Is it Harvey?" " Where did you get that?" " In a book in your closet, elements of acting." " In college, before I dropped out." " Is it him?" " That's me." "That's my dad." "You never met him." "A father is somebody who sticks around." "Nobody ever stuck around," "I couldn't get anybody to stick around." "Not even him." " Harvey didn't stick around for us?" " Harvey was a counselor after you were born, before I got clean." "He couldn't help me, us." "I wasn't ready." "And I wouldn't let him help you either." " Are any of those guys, any of those bosses you sent me to, any of them?" " None of them." "Why won't you believe me?" "You know, sometimes people lie." "But sometimes you should believe them." " I think," "I think I fucked up." "Susan?" "Rockford." "Hi." " You're back." " I love my job, I don't wanna quit." " Okay." " Can I borrow a Van for the weekend?" " Yeah?" " I'm looking for Susan." " Who says there's a Susan here?" " That is not how we answer the damn door." "Can I help you?" " Is Susan here?" " And who might you be?" " I'm from Chicago, my name is Sam." "I'm a friend of Susan's." " A friend?" " Get out, Vera." "Susan's got a dude, get in here." "Susan, you didn't talk about Sam." "Susie, wash your hands, wash your hands." "I'm her sister, Lily, and this our older sister Vera here." " Hiya." " That's Jason, my husband." " Sorry about the door." " This little one here is grace, my daughter, and my older daughter, Tara, is probably running around out back somewhere." " I believe you." " You're here to rescue me?" " Rescue you from what?" " Somebody at the door?" " You're in trouble, dad's coming." "Hey, pops, Susan has someone she wants you to meet." "This is Sam." " He can stay for dinner." " They're just so cute." " Yeah, they're cute." " You just wanna eat 'em up." "You know, just something so cute you just wanna eat it all up?" "Like chop it into a salad." "Their little fingers, little ears, just eat 'em up." " Yeah, I got ya." " You take my little girl and I'll chop you up into little pieces." "Wait, that come out wrong." "I don't mean 'cause you're cute." " No, right." " I meant the part about taking my little girl." " I understand what you were telling me." " Ooh, it's a beauty." " Oh, she's done it again." " Mmm, look at that." " Mmm." " Dad, you wanna say grace?" " God, we thank you for the blessing of this food, and this family." "Couldn't bring my Lorna back to me, but you brung Susie back and it's like Lorna's here in spirit." " Amen." " And lord, thank you so much for this nice young man." "Maybe he'll make an honest woman of my little girl one day." " Dad!" " I'm just saying, you're a good guy, welcome." " Thanks." " Now, son, the way I carve these things, what I like to do is start with the leg." " Ooh, look how juicy." " These two have such a nice aura about them." " Don't they?" "You could stay here, Jason could help you get a job." " Maybe some sort of a starter job." " He can't just leave his practice behind, he's got patients." " You're a doctor?" " He's a therapist." " I'm an occupational therapist." "I help people in the place they occupy." " Well, there's plenty of crazy people here." " Yeah, I dunno, maybe I could." " What about all your patients?" " We don't wanna lose our Susie again." " Seems like we're always losing our Susie." "Remember that time in the field?" " Oh god, mom almost had a nervous breakdown." "She was sick." " Dad, tell the story." " It was back when I was still driving the truck before the sciatica made me useless." "I was coming through Iowa, and on the Cb" "Susie's mother told me that Susie's lost in the corn." "Yeah." "Never so scared in my life, I put the pedal down on the floor, and grinding the hell out of the gears." "I got here in two hours." "Pulled up right on my lawn." "I was hugging her crying mother." "I didn't notice how high the corn was, if we went in there, we'd never even be able to find each other." "A couple of moments later, like a vision, she was walking out of the cornrows in her little summer dress." "Even then she looked just like her mother." " It must tear you up with guilt." " Well, we found her." "All's well that ends well." " No I mean, the mother, Lorna." " Guilty about what?" " After she, after you, well, I mean, it wasn't on purpose, it was an accident, sort of." " What was an accident." " When he killed her." " Susan?" " He's right, we all know." " Dad, don't say that." " Come on, kids." " What did you tell him?" " I couldn't give her what she needed." " Dad, don't say that." " I didn't love her hard enough." " Dad, it was the cancer." " Dad, please don't get sad again." "Mom's here with us tonight, you said so yourself." " Cancer?" " What did she tell you?" " You told me he killed her." " I know it, he's right." " Dad, you did not kill mom." " Did you say that?" " Of course not." " Why would you say such a thing?" " It's not true." " I'm sorry, I, I must have misheard." " Jeez, dad." " No no no no please, it's okay, it's okay." " I came here to rescue you from a psychotic man who you ran away from, but it was just another story." " What do you care, you don't know these people." " I feel humiliated." "They hate me." " You lied to me too." " When I was in third grade, I was convinced my math teacher Mr. Barney was my dad." "He had a little limp, so I started limping too." "When I was in fourth grade, I was sure is was my gym teacher, so I lost the limp for a strut." "I remember believing it was the mailman." "Local beat cops, guys at stores, any grown up man" "I met more than once." "Then one day, my mom was working some late shift on a third job, and I was going through her closet," "I found the book, the photo slipped out, and I just..." "I get it, it was just easier, but I believed it." "It's stupid, I see that." " It's even worse, you lied to yourself." " At least I have a reason." " I had a reason." " A reason for calling your own father a murderer?" " You said it yourself." "You only followed me because you believed me." " So I came." "Why am I here?" " You shouldn't be." " Is somebody gonna apologize to dad?" " You didn't do anything, you know that." " Hey, I just wanna say, I think I got confused." "I have a lot of patients." "Sometimes I get stories mixed up in my head." "I realize now that something one of my patients said, not Susan." " You ruined dinner." " Hey, he comes in peace." " Look, it's not a family meal unless there's a dust up or two." "It's not a big deal." "Don't worry about it." " There you go." "Daddy, will you play guitar for us?" " Okay." " Jeez, then I'll build a fire." " You can sing." " It's her voice, I swear." " It's like she's back." " She's the prettiest of all of 'em." "She looks so much like her mom I could cry." "I'm not ready to lose her again." "I'm not ready to let you take her away from me." "Don't take her away." " It's morning, it's morning!" " Tara, cut that out." "Sorry about that." " Making breakfast?" " No one else will make it." " What's in your hair?" " Why are you still here?" " Your father, last night, he was in the hallway, he..." " Look at you." "Dad, look." " Where did you get this?" " I kept it in my drawer." "You don't like it?" " What is it?" " It was mom's." "Doesn't she look beautiful?" " I need some coffee." " So how did you two meet?" " We were at a baseball game..." " we were on the train." " Well, which is it?" " Her hand brushed mine." "When I felt that touch, that was all I needed." "I followed her home, I would have followed her to the gates of hell." " Aw, that's sweet." " Bit creepy." " I just thought of something." "Do you remember, we took a road trip, it was my idea." "It was an unusually warm April." "I said I can get us a car." "Let's go to the dells, let's go camping." "You said it might rain, but I insisted." "Do you remember?" " The forecasts, they all said rain." " I was stubborn, I get a tent of storage," "I borrow a car for work." " You threw out the cigarette lighter so I wouldn't smoke." " I'm not gonna think about that now," "I hate myself for that." "I had to control everything." " You wanted me to be the best." " We sit in that tent for three straight days, it never stopped raining, we never stopped playing cards." " Gin rummy and I beat you every hand." " God, I got so angry." " You like to win." " I wanna go back." "I wanna put you in the car." "I wanna save you from the mud, and the wet." "I wanna roll up the tent." " Leave the tent, it's all muddy." " Stop at a diner on the 94, get some hot split pea soup." " I hate split pea soup." " You like split pea soup." " No I don't." " I wanna make you warm." "I wanna take you home." " Please."
{ "pile_set_name": "OpenSubtitles" }
Currency: Smithwick's Brewery Tour, County Kilkenny Over 300 years ago in 1710, John Smithwick began brewing his first Ales - although the Smithwick’s story started long before then. He chose the site of an ancient monastery - St.Francis Abbey, to position his brewery. John was inspired by a tradition of brewing on this site, the foundations of which were laid four centuries earlier. Back in the 13th Century The Franciscans established an Abbey, with its own well, on the banks of the River Nore in Kilkenny. Whilst brewing and barley cultivation are recorded in Irish Annals from the mists of time, the strong brewing tradition that exists in Kilkenny started with these monks who would have brewed their own light ale for their visitors, using water from St. Francis' Well. To this day the Abbey stands proudly at the heart of the brewery and continues to inspire the brewers. Smithwick's is a brand with years of heritage. Starting in 1641 with John Smithwick in Kilkenny, who was left orphaned in the Irish rebellion, his is a tale of courage, determination, loyalty and triumph over adversity. He dragged himself up by the bootstraps and started a successful family of his own which began brewing Smithwick's ale in 1710 with the brewery mainly serving the local community. It gave the Smithwick family a sense of what's important in life. The experience handed down through the generations has seen Smithwick's thrive against the odds and has created a brewing dynasty that has flourished for over 300 years. To celebrate the 300 year anniversary, the St. Francis Abbey Brewery now offers exclusive brewery tours. These unique tours will take visitors through the working brewery in Kilkenny and include a visit to the remarkable 12th Century St Francis Abbey which is on the brewery site. Tours operate from Tuesday to Saturday (closed Sunday and Monday) The tour takes approximately 1 and a half hours and includes a complimentary tasting in the brewery’s Cellar Bar. St Francis Abbey is primarily a production facility which unfortunately cannot cater for wheelchair users or persons with impaired mobility due to the structure and layout of our 300 year old site. Over 18s only. For your safety please wear appropriate footwear (No high heels or open toe footwear). Share Attraction: Location Add to Custom Tour Create your very own Ireland tour with our Tailor Made Tours section. Once you've created an account and logged in, you can add your favourite attractions, accommodation and activities. And, when you're happy with your choices, just send them on to one of our Ireland experts and we'll design a custom itinerary and quote tailored just for you.
{ "pile_set_name": "Pile-CC" }
Change Log ========== 0.2.1 (2016-04-15) ------------------ * Packaging fix 0.2 (2016-04-15) ---------------- * Added docs and tests * Published on PyPI 0.1 (2016-04-11) ---------------- Initial release
{ "pile_set_name": "Github" }
Analog Devices, Inc. - Analog Devices, Inc. (NASDAQ: ADI) defines innovation and excellence in signal processing. ADI's analog, mixed-signal, and digital signal processing (DSP) integrated circuits (IC) play a fundamental role in converting, conditioning, and processing real-world phenomena such as light, sound, temperature, motion, and pressure into electrical signals to be used in a wide array of electronic equipment. ADI is synonymous with high performance among electronics manufacturers and we collaborate with our customers to define the very best in the quality of the user experience. That means the clearest image, crispest sound, and optimum interface, size and performance in thousands of entertainment, medical, communications, industrial and other applications. Analog Devices, Inc. has completed its acquisition of Hittite Microwave Corporation. Hittite will be part of ADI’s RF and Microwave Group (RFMG). Analog Devices and Digi-Key present New Product Express - a fast, easy way to get ADI's newest products. These products are in full production, having passed ADI's quality and reliability testing, and are available from Digi-Key to order today! ProductTraining Video ProductListing NewProducts FeaturedProducts Tools& Support OtherDocuments AlliancePrograms ReferenceDesigns Systems& Solutions Digi-Key’s library of more than 2000 exclusive PTM Online… On Demand® product training modules is a collection of training tools created with you – the busy design engineer – in mind. They are provided with the cooperation of participating supplier partners. From this one source, you can learn about the latest products and technologies, download datasheets, check inventory, contact our technical staff, and place an order for same-day shipment. These modules are available in audio and non-audio formats and listed by supplier in easy-to-find alphabetical order. Simply locate the module that interests you and click on your format of choice. We hope you find these tools useful, and with new modules added continuously, we invite you to stop back often to see what’s new. AD9136 Digital-to-Analog Converter - The AD9136 from Analog Devices is a dual, 16-bit, high dynamic range digital-to-analog converter (DAC) that provides a maximum sample rate of 2800 MSPS, permitting a multicarrier generation over a very wide bandwidth. The DAC outputs are optimized to interface seamlessly with the ADRF6720 and ADRF670x analog quadrature modulators (AQMs) from Analog Devices. An optional 3- or 4-wire serial port interface (SPI) provides for programming/ readback of many internal parameters. More... ADP1050 Advanced Digital Controller - The ADP1050 is an advanced digital controller with a PMBus™ interface targeting high density, high efficiency dc-to-dc power conversion. This controller implements voltage mode control with high speed, input voltage feedforward operation for enhanced transient and noise performance. The ADP1050 has four programmable pulse-width modulation (PWM) outputs capable of controlling most high efficiency power supply topologies, with the added control of synchronous rectification (SR). More... 3rd Quarter Select Products - The Select Products offered by ADI and Digi-Key are the newest products targeted for the widest variety of applications. Supported by evaluation boards, development kits, design tools and technical information, the Select Products are highlighted to help you identify the best parts to get your design to market fast. More... Get application support from our engineers with product selection and recommendations, design-in support, and troubleshooting. Our expert specialists are ready to support you with everything to make your design challenges easier. Connect with us today via email or phone in a choice of languages. EngineerZONE™ CommunityEngineerZone is an online support community for engineers who are using Analog Devices products to ask questions, share knowledge and search for answers to their design questions. Collaborate with Analog Devices engineers and other designers in this open forum at ez.analog.com. ADI Cross Reference ToolThis cross-reference search will assist you in finding Analog Devices products that are equivalent to other Analog Devices products or products of other manufacturers. Chemical Analysis and Environmental Monitoring - ADI offers a broad range of low-power, high-performance IC solutions for portable and benchtop chemical analyzers. Our portfolio of leading-edge ADCs, amplifiers, DACs, and processors can help you optimize the performance of your quantitative and qualitative instruments. Data Converters - As the world's leading provider of data converters, Analog Devices, Inc. offers the industry’s largest portfolio of precision and high-speed A/D and D/A converters. Providing cutting-edge technology, ADI’s converters are designed to deliver performance without compromise, enabling leading-edge next-generation end-systems. Supported by the design tools and the technical documentation needed to accelerate time-to-market, converters from ADI meet the application challenges whether they are high-speed or precision centric. Amplifiers - Selecting an op amp is no trivial task: with so many different types of amplifiers, categories, architectures, and parameters to choose from, the process can be difficult. Each customer and application requires slightly different performance. It doesn’t matter whether you’re designing a coffee maker or the next generation medical imaging system, Analog Devices has the right amplifier to meet your needs. iCoupler - Analog Devices digital isolators with iCoupler® technology enable designers to implement isolation in designs without the cost, size, power, performance, and reliability constraints found with optocouplers. iCoupler digital isolators also meet the wide range of creepage/clearance requirements and are the industry’s only digital isolators with certified 8 mm creepage. With more than a billion channels shipped into the field, these magnetically isolated products meet the same rigid safety standards as optocouplers. Test and Instrumentation - Whether you are designing for rack-mounted or hand-held equipment, ADI has the applications expertise and broad product portfolio to enable your test and instrumentation designs.
{ "pile_set_name": "Pile-CC" }
// // EncryptionKit.swift // ProtonMail - Created on 12/18/18. // // // Copyright (c) 2019 Proton Technologies AG // // This file is part of ProtonMail. // // ProtonMail is free software: you can redistribute it and/or modify // it under the terms of the GNU General Public License as published by // the Free Software Foundation, either version 3 of the License, or // (at your option) any later version. // // ProtonMail is distributed in the hope that it will be useful, // but WITHOUT ANY WARRANTY; without even the implied warranty of // MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the // GNU General Public License for more details. // // You should have received a copy of the GNU General Public License // along with ProtonMail. If not, see <https://www.gnu.org/licenses/>. import Foundation /// initally for push notification key struct EncryptionKit: Codable, Equatable { var passphrase, privateKey, publicKey: String }
{ "pile_set_name": "Github" }
US/UK news has been responding to Coronavirus since 2020 - massanishi https://public.tableau.com/profile/masatoshi.nishimura#!/vizhome/CoronavirusMentionedinNewsPublishers/ResponsestoCoronavirusby5MajorPublishers?publish=yes ====== massanishi I analyzed 46,601 news over the past 3 months from the major US and UK publishers (New York Times, CNN, Forbes, BBC, Guardian). It measures how often the word "coronavirus" is mentioned. The second graph shows how different countries are covered, mapped with the outbreak incidents. It demonstrates how our attention has shifted more to the virus and jumped among different countries based on the outbreak occurrences. I've used my project for the data source. If you like to visualize your reading, come check it out ([https://kaffae.com](https://kaffae.com))
{ "pile_set_name": "HackerNews" }
### Arguments #### `argument_name` * Is required: yes * Is array: no * Default: `NULL`
{ "pile_set_name": "Github" }
Gamma Knife Radiosurgery in the Treatment of Brain Tumors. Stereotactic radiosurgery with the Gamma Knife produces highly localized radiobiologic effects. Typical doses range from 12 to 25 Gy at the target periphery, with higher doses within the target. Treatment generally is well tolerated. Indications for treatment include vascular malformations and primary and metastatic tumors, both benign and malignant, involving the brain. Shrinkage of treated tumors tends to be slow, and stabilization of previously expanding tumor masses occurs in the vast majority of cases. Prospective trials are now being performed to determine the proper place of this technique in managing tumors involving the brainstem and other areas of the brain.
{ "pile_set_name": "PubMed Abstracts" }
Background ========== Education level is one indicator of socioeconomic position which, in several countries including South Korea, is provided though death certificate data. Its validity determines the usefulness of death certificate data for exploring the association between socioeconomic position and mortality \[[@B1]\]. Although education is likely to be more accurately reported than measures such as income, some evidence from Western studies suggests inconsistencies can occur between education reported in health surveys and that subsequently recorded on death certificates \[[@B2]-[@B4]\]. In a study by Lerchen and colleagues, a considerable gap was found between education reported in health interview data and education reported in subsequent follow-up interviews from surviving spouses after death \[[@B5]\]. Contradictory results have also been shown in other studies, with some demonstrating a tendency for education to be reported at a higher level on death certificates than at baseline health survey, \[[@B2],[@B3]\] while other studies showed this was not true \[[@B1]\]. In addition, the reliability of reported education between interview survey and death certificate data may vary with decedent\'s gender, age, and educational level \[[@B3]\]. Education can be reported less accurately for female decedents since they are less likely than males to have surviving spouses and are more likely to die at an older age \[[@B3]\]. The overstatement of education was more common among those decedents who, according to health survey data, had a lower education level \[[@B3]\]. However, in a later study, Rosamond and colleagues reported that death certificate education level had substantial validity and that misclassification was similar in both genders \[[@B1]\]. Reports have shown that overstatement bias was more pronounced in older than younger decedents \[[@B2]\]. Apart from these studies, little has been published on the validity and reliability of education between health survey data and death certificate data. Education is known as a socioeconomic position indicator that is less likely to change over time than occupation and income \[[@B4]\]. As a result, misclassification of education may not vary with the length of time between acquisition of health survey and death certificate data. However, no studies have proven this. In addition, little is known about the misclassification of education by cause of death. Recently, several studies have been conducted to examine educational inequalities in mortality with use of census and death certificate data in South Korea \[[@B6]-[@B8]\]. For example, in prior studies we presented age-, gender-, and cause-specific mortality inequalities by education \[[@B6]\] and examined trends in mortality inequalities by education \[[@B7]\]. However, the possibility of numerator-denominator bias \[[@B9]\] could not be excluded in these studies since unlinked data were used \[[@B6],[@B7]\]. If education levels of the census were more inflated than those of death certificate data, exaggerated educational mortality differentials could be made. Son claimed that the reliability of education level between survey and death certificate data can be poor \[[@B10]\]. A prior Korean study examined the reliability of reported education level between survey and death certificate data \[[@B11]\]. However, due to the small number of deaths, a more detailed analysis by covariates such as cause of death and duration between health survey and death was not possible and the validity (sensitivity and specificity) of each educational category was not examined. Information on gender, age, and cause-specific level of validity is useful to assess any bias in the gender, age, and cause-specific magnitude of socioeconomic mortality inequalities measured with census and death certificated data. Therefore, the purpose of this study was to compare education level recorded on death certificates with that reported before death in a nationally representative cohort of participants in the National Health and Nutrition Examination Survey (NHANES) of South Korea. Specifically, we examined the difference in the magnitude of validity and reliability for educational attainment according to gender, age group, duration between health survey and death, educational category, and cause of death. Methods ======= The Institutional Review Board of the Asan Medical Center, Seoul, approved this study. The health survey data used in this study were the 1998 and 2001 NHANES conducted by the Korea Institute for Health and Social Affairs. Information was collected from a stratified multistage probability sample of South Korean households representing the civilian, non-institutionalized population \[[@B12]\]. Participation rates for the 1998 and 2001 NHANES were 89.8% and 77.3%, respectively. At a baseline visit, information on education level was obtained from an adult household member. For each family member, the highest education completed was reported. This data contained unique 13-digit personal identification numbers that were individually linked to mortality data from the Korean National Statistical Office. By law, all Korean deaths must be reported to the Korea National Statistical Office. We identified deaths that occurred in the years 1999--2005 for those in the 1998 NHANES and 2002--2005 for those in the 2001 NHANES. Duration of mortality follow-up was 7.1 years. Similar to that in NHANES, levels of education reported on death certificates were determined by the highest level of education completed. The information on education was based on reports from the decedent\'s kin. Covariates considered in our analyses were gender, age, duration between survey and death, and cause of death. Duration between health survey and death was grouped into categories of 3.4 years or less and 3.5--7.1 years to allocate samples equally into groups. Causes of death were coded according to the 10^th^revision of the *International Classification of Disease*(ICD-10) and grouped as cancer (C00--C97), cardiovascular disease (I00--I99), external causes (V01--Y98), and other. For our analysis, we first compared education level between NHANES data and death certificate data and calculated the proportion of concordant and discordant pairs. Then we determined sensitivity and specificity of education in death certificate using the standard method, \[[@B13]\] with education reported in NHANES considered the gold standard. Sensitivity and specificity by cause of death were not presented due to the small size of each education group. We also estimated the agreement rates of education level between NHANES data and death certificate data. Overstatement and understatement rates were calculated. Overstatement refers to the inflated education level recorded in death certificates compared with that in NHANES, while understatement means the reverse. Confidence intervals (CI) for sensitivity, specificity, agreement rates, overstatement rates and understatement rates were calculated by asymptotic method. For these analyses, education data from death certificates and NHANES were categorized into five levels (college or higher, high school, middle school, elementary school and no education) and three levels (college or higher, high and middle school, elementary school or less). This was consistent with categorizations used in prior two studies \[[@B6],[@B7]\]. Finally, after adjusting for all covariates, we estimated odds ratios with 95% CI for agreement in educational attainment when five and three educational groups were used. All statistical analyses were performed with SAS statistical software. Results ======= Unique personal identification numbers of 12,801 subjects aged 20+ (6,900 for the 1998 NHANES and 5,901 for the 2001 NHANES) were linked to mortality information. A total of 513 deaths were identified: 376 deaths for the 1998 NHANES and 137 deaths for the 2001 NHANES. Of these, 511 (99.6%) had education levels available from both the death certificate and NHANES. One decedent had no education information in the NHANES and another decedent\'s education was not recorded in the death certificate. Of the 511 participants included in our analyses, 57.9% (n = 296) were men and 61.1% (n = 312) were aged 65+. The mean age of subjects was 66.4 years (SD 14.4). Decedent age varied with education from 52.7 years (SD 16.3) for those with college education or higher to 75.8 years (SD 9.2) for those with no education. A marked gender difference in education was also found with 24.7% (n = 73) of men and 67.9% (n = 146) having no education recorded in the NHANES. While the proportion of those having college or higher education only reached 2.3% (n = 5) for women, the proportion for men was 8.8% (n = 26). Table [1](#T1){ref-type="table"} shows the cross-classification of education level by death certificate and the adult household member\'s report at baseline visit in the NHANES of South Korea. For 511 deaths, 150 (29.4%) discordant pairs were found. Inconsistencies were most common when education was reported as middle school in NHANES. Of 54 participants whose education was reported as middle school in NHANES, only 25 (46.3%) were recorded as having middle school education in death certificate data. ###### Comparison of education level between Korea National Health and Nutrition Examination Survey (NHANES) data and death certificate data among 513 decedents Education recorded on death certificate Education reported in the 1998 and 2001 NHANES ----------------------------------------- ------------------------------------------------ ------------ ------------ ------------- ------------- ----------- ----- College or higher 26 (83.9) 3 (4.9) 1 (1.9) 0 (0.0) 0 (0.0) 0 (0.0) 30 High school 3 (9.7) 42 (68.9) 13 (24.1) 3 (2.0) 3 (1.4) 0 (0.0) 64 Middle school 1 (3.2) 8 (13.1) 25 (46.3) 18 (12.2) 2 (0.9) 0 (0.0) 54 Elementary school 1 (3.2) 7 (11.5) 12 (22.2) 98 (66.7) 44 (20.1) 0 (0.0) 162 No education 0 (0.0) 0 (0.0) 3 (5.6) 28 (19.1) 170 (77.6) 1 (100.0) 202 Unknown 0 (0.0) 1 (1.6) 0 (0.0) 0 (0.0) 0 (0.0) 0 (0.0) 1 Total 31 (100.0) 61 (100.0) 54 (100.0) 147 (100.0) 219 (100.0) 1 (100.0) 513 Note: The denominator for the calculation is the number of deaths classified by level of education noted on the NHANES survey, so that the column percentages add to 100%. Table [2](#T2){ref-type="table"} presents the sensitivity and specificity of education in death certificate when education level derived from the health survey was considered as the gold standard. The sensitivity and specificity of the death certificate in classifying a decedent as having college or higher education were 0.84 (95% CI: 0.71--0.97) and 0.99 (95% CI: 0.98--1.00), respectively. However, for middle school education, the sensitivity was poor. While the level of sensitivity for high and middle school was greater in men than women, this pattern could not be generalized to other educational groups. A very low sensitivity (0.20) for middle school in women was based on the small sample number (n = 5). With the exception of high school, the sensitivity of education for ages 65+ was similar to that for ages 20--64. In addition, the magnitude of sensitivity and specificity did not vary with the length of time between acquisition of health survey and death certificate data. ###### Sensitivity, specificity and their 95% confidence intervals (CI)\* of education level recorded in death certificates using education reported in National Health and Nutrition Examination Survey (NHANES) of South Korea as the gold standard (N = 511) Education N Sensitivity (95% CI) N Specificity (95% CI) N Sensitivity (95% CI) N Specificity (95% CI) --------------------------- ------------------------------------------------------------- ---------------------------------------------------------- ----- ---------------------- ----- ---------------------- ----- ---------------------- All subjects College or higher 31 0.84 (0.71--0.97) 480 0.99 (0.98--1.00) High and middle school 114 0.77 (0.69--0.85) 397 0.92 (0.90--0.95) High school 60 0.70 (0.58--0.82) 451 0.95 (0.93--0.97) Middle school 54 0.46 (0.33--0.60) 457 0.94 (0.91--0.96) Elementary school or less 366 0.93 (0.90--0.96) 145 0.84 (0.78--0.90) Elementary school 147 0.67 (0.59--0.74) 364 0.82 (0.79--0.86) No education 219 0.78 (0.72--0.83) 292 0.89 (0.86--0.93) Men Women College or higher 26 0.81 (0.66--0.96) 270 0.99 (0.97--1.00) 5 1.00 (1.00--1.00) 210 1.00 (1.00--1.00) High and middle school 100 0.80 (0.72--0.88) 196 0.90 (0.86--0.94) 14 0.57 (0.31--0.83) 201 0.95 (0.92--0.98) High school 51 0.71 (0.58--0.83) 245 0.93 (0.89--0.96) 9 0.67 (0.36--0.97) 206 0.98 (0.96--1.00) Middle school 49 0.49 (0.35--0.63) 247 0.91 (0.88--0.95) 5 0.20 (0.00--0.55) 210 0.97 (0.94--0.99) Elementary school or less 170 0.91 (0.86--0.95) 126 0.87 (0.81--0.92) 196 0.95 (0.92--0.98) 19 0.68 (0.48--0.89) Elementary school 97 0.69 (0.60--0.78) 199 0.80 (0.75--0.86) 50 0.62 (0.49--0.75) 165 0.85 (0.79--0.90) No education 73 0.64 (0.53--0.75) 223 0.92 (0.88--0.96) 146 0.84 (0.78--0.90) 69 0.81 (0.72--0.90) Ages 20--64 Ages 65 College or higher 23 0.83 (0.67--0.98) 176 0.99 (0.97--1.00) 8 0.88 (0.65--1.00) 304 0.99 (0.98--1.00) High and middle school 82 0.77 (0.68--0.86) 117 0.85 (0.78--0.91) 32 0.78 (0.64--0.92) 280 0.96 (0.93--0.98) High school 44 0.80 (0.68--0.91) 155 0.90 (0.86--0.95) 16 0.44 (0.19--0.68) 296 0.98 (0.96--0.99) Middle school 38 0.45 (0.29--0.61) 161 0.91 (0.87--0.96) 16 0.50 (0.26--0.75) 296 0.95 (0.92--0.97) Elementary school or less 94 0.84 (0.77--0.91) 105 0.83 (0.76--0.90) 272 0.96 (0.94--0.98) 40 0.88 (0.77--0.98) Elementary school 67 0.69 (0.58--0.80) 132 0.80 (0.73--0.86) 80 0.65 (0.55--0.75) 232 0.84 (0.79--0.89) No education 27 0.52 (0.33--0.71) 172 0.94 (0.91--0.98) 192 0.81 (0.76--0.87) 120 0.83 (0.76--0.89) Duration between health survey and death, 3.4 years or less Duration between health survey and death, 3.5--7.1 years College or higher 6 1.00 (1.00--1.00) 249 1.00 (0.99--1.00) 25 0.80 (0.64--0.96) 231 0.99 (0.97--1.00) High and middle school 60 0.80 (0.70--0.90) 195 0.92 (0.89--0.96) 54 0.74 (0.62--0.86) 202 0.93 (0.89--0.96) High school 33 0.67 (0.51--0.83) 222 0.95 (0.92--0.98) 27 0.74 (0.58--0.91) 229 0.95 (0.92--0.98) Middle school 27 0.44 (0.26--0.63) 228 0.92 (0.89--0.96) 27 0.48 (0.29--0.67) 229 0.95 (0.92--0.98) Elementary school or less 189 0.92 (0.88--0.96) 66 0.83 (0.74--0.92) 177 0.94 (0.90--0.97) 79 0.85 (0.77--0.93) Elementary school 73 0.66 (0.55--0.77) 182 0.81 (0.75--0.86) 74 0.68 (0.57--0.78) 182 0.84 (0.79--0.89) No education 116 0.77 (0.69--0.84) 139 0.91 (0.86--0.95) 103 0.79 (0.71--0.87) 153 0.88 (0.83--0.93) \*Confidence intervals for sensitivity and specificity were calculated by asymptotic method. Table [3](#T3){ref-type="table"} shows the overall agreement rate, overstatement rate and understatement rates with 95% CI. When education level was categorized into five groups (college or higher, high school, middle school, elementary school, and no education), the overall agreement rate was 70.7% (95% CI: 66.8%--74.6%). The magnitude of agreement rate for education did not vary with gender, age, and duration between health survey and death. This was generally true for cause specific analyses. The overstatement rate tended to be greater than the understatement rate. The education level of 87 (17.0%) subjects was reported as greater in death certificate than NHANES data while 63 (12.3%) subjects were recorded with lower education in death certificate data than in NHANES data. This was true for both gender, age and causes of death except for external causes. Meanwhile, the understatement rate for external causes tended to be greater than the rates for other three broad causes. When educational level was grouped into five categories, understatement rate for external causes was 20% while understatement rates for other broad causes were about 10%. Based on logistic analysis when the educational level was grouped into three categories, odds ratio of understatement for external causes (reference group = other broad causes) was 2.85 (1.15--7.05). ###### Agreement rate (%), overstatement\* rate (%), understatement\* rate (%), and their 95% confidence intervals (CI)\* for education level by gender, age, and cause of death: Reliability between Korea National Health and Nutrition Survey (NHANES) data and death certificate data No. of subjects Agreement rate (95% CI) Overstatement rate (95% CI) Understatement rate (95% CI) -------------------------------------------------------------------------------------------------------------- ----------------- ------------------------- ----------------------------- ------------------------------ **Five educational groups (college or higher, high school, middle school, elementary school, no education)** All subjects 511 70.7 (66.8--74.6) 17.0 (13.7--20.3) 12.3 (9.5--15.1) Gender  Men 296 65.9 (60.5--71.3) 19.3 (14.8--23.8) 14.9 (10.8--19.0)  Women 215 77.2 (71.6--82.8) 14.0 (9.4--18.6) 8.8 (5.0--12.6) Age groups  20--64 199 65.8 (59.2--72.4) 17.6 (12.3--22.9) 16.6 (11.4--21.8)  65+ 312 73.7 (68.8--78.6) 16.7 (12.6--20.8) 9.6 (6.3--12.9) Duration between health survey and death  3.4 years or less 255 69.4 (63.8--75.1) 19.2 (14.4--24.1) 11.4 (7.5--15.3)  3.5--7.1 years 256 71.9 (66.4--77.4) 14.8 (10.5--19.2) 13.3 (9.1--17.4) Cause of death  Cancer 124 71.0 (63.0--79.0) 17.7 (11.0--24.4) 11.3 (5.7--16.9)  Cardiovascular disease 132 69.7 (61.9--77.5) 18.2 (11.6--24.8) 12.1 (6.5--17.7)  External causes 60 65.0 (52.9--77.1) 15.0 (6.0--24.0) 20.0 (9.9--30.1)  Other causes 195 72.8 (66.6--79.0) 16.4 (11.2--21.6) 10.8 (6.4--15.2) **Three educational groups (college or higher, high and middle school, elementary school or less)** All subjects 511 88.9 (86.2--91.6) 5.9 (3.9--7.9) 5.3 (3.4--7.2) Gender  Men 296 86.2 (82.3--90.1) 6.8 (3.9--9.7) 7.1 (4.2--10.0)  Women 215 92.6 (89.1--96.1) 4.7 (1.9--7.5) 2.8 (0.6--5.0) Age groups  20--64 199 80.9 (75.4--86.4) 8.5 (4.6--12.4) 10.6 (6.3--14.9)  65+ 312 93.9 (91.2--96.6) 4.2 (2.0--6.4) 1.9 (0.4--3.4) Duration between health survey and death  3.4 years or less 255 89.4 (85.6--93.2) 6.3 (3.3--9.2) 4.3 (1.8--6.8)  3.5--7.1 years 256 88.3 (84.3--92.2) 5.5 (2.7--8.3) 6.3 (3.3--9.2) Cause of death  Cancer 124 84.7 (78.4--91.0) 11.3 (5.7--16.9) 4.0 (0.6--7.4)  Cardiovascular disease 132 87.1 (81.4--92.8) 6.8 (2.5--11.1) 6.1 (2.0--10.2)  External causes 60 86.7 (78.1--95.3) 1.7 (0.0--5.0) 11.7 (3.6--19.8)  Other causes 195 93.3 (89.8--96.8) 3.1 (0.7--5.5) 3.6 (1.0--6.2) \*Overstatement refers to the inflated educational level recorded in death certificate compared with that in NHANES, while understatement means the reverse. Confidence intervals for agreement rate, overstatement rate, and understatement rate were calculated by asymptotic method. As presented in Table [3](#T3){ref-type="table"}, the magnitude of reliability increased as the number of educational groups decreased. When the education level was categorized into three groups (college or higher, high and middle school, elementary school or less), the overall agreement rates was 88.9% (95% CI: 86.2%--91.6%). For this categorization of education, overstatement and understatement rates diminished and there was no marked evidence of education inflation in death certificate data compared with health survey. Table [4](#T4){ref-type="table"} presents odds ratio (95% CI) of agreement when five and three educational groups were used to assess agreement. When five educational groups were used, the middle and elementary school education groups showed a significantly smaller likelihood of agreement after adjusting for gender, age (10-year age), duration between health survey and death, and cause of death. However, this was not true when assessing agreement with three educational groups. No significant difference in odds ratio was found for gender, age, duration between health survey and deaths, and cause of death, likely in part due to small sample size. ###### Odds ratio and 95% confidence interval (CI) of agreement in education level (N = 511) OR (95% CI) of agreement for five educational groups OR (95% CI) of agreement for three educational groups ------------------------------------------- ------------------------------------------------------ ------------------------------------------------------- Gender  Men 1.00 (reference) 1.00 (reference)  Women 1.47 (0.93--2.31) 1.27 (0.65--2.50) Age groups  10-year age (continuous) 1.10 (0.92--1.31) 1.20 (0.95--1.52) Duration between health survey and deaths  3.4 years or less 1.00 (reference) 1.00 (reference)  3.5--7.1 years 1.09 (0.74--1.63) 0.92 (0.52--1.65) Education in health survey  College or higher 1.00 (reference) 1.00 (reference)  High school 0.46 (0.15--1.41) 0.58 (0.20--1.73)  Middle school 0.17 (0.06--0.51) 0.58 (0.20--1.73)  Elementary school 0.33 (0.12--0.95) 1.59 (0.51--5.00)  No education 0.47 (0.15--1.45) 1.59 (0.51--5.00) Cause of death  Cancer 1.00 (reference) 1.00 (reference)  Circulatory disease 0.81 (0.46--1.42) 1.00 (0.48--2.11)  External causes 0.89 (0.44--1.78) 1.74 (0.68--4.47)  Other causes 0.91 (0.54--1.55) 2.00 (0.92--4.35) Note: all variables were entered into logistic models simultaneously. Discussion ========== Results of this study showed that the proportion of deaths without recorded education was very low, only one of 513 (0.2%) in death certificate, far less than prior US studies in which information on education for about 15%--27% of all deaths occurred was not available in the death certificate \[[@B1],[@B2]\]. According to death certificate data covering all South Koreans, the rate of failure to report the decedent\'s educational attainment was 0.3% for men and 0.4% for women aged 35--64 \[[@B6]\]. This may be due to the Korean death certification system where any vague or missing item on the death certificate is further clarified by the Korea National Statistical Office via telephone \[[@B6]\]. This low percentage of missing education information in South Korean death certificate data could provide a great potential to monitor socioeconomic inequalities in mortality. Direct comparison of the validity and reliability level found in this study with prior reports in other countries may be problematic because of differences in age distribution and educational categories used. Factors associated with participation to health survey may also affect the overall validity and reliability. Nevertheless, we may conclude that this study showed a similar or higher level of validity and reliability in education information than in Western studies. For example, the agreement rate for three educational groups (less than high school graduate, high school graduate, and greater than high school education) in a prior study was 84% \[[@B1]\]. Results of this study showed an agreement rate of 88.9% for the same categories. A prior study presented a sensitivity of 0.85 for college or higher education, \[[@B2]\] which is similar to what was found in this study (0.84). It should be noted that in prior studies, a substantial number of subjects with missing education information (15%--27%) were found but were eliminated from analyses that reported the agreement rate and sensitivity \[[@B1],[@B2]\]. Despite the relatively high level for overall validity and reliability, low sensitivity and agreement rates were found in this study for participants with middle school education. After adjusting for covariates, middle and elementary school education groups were less concordantly recorded in death certificate data. One possible explanation for this may be related to historical changes in the education system in South Korea. During Japanese colonial occupation (1910--1945) and the Korean War (1950--1953), South Korea could not establish a nationwide educational curriculum \[[@B14]\]. An education system divided by elementary school (6 years), middle school (3 years), and high school (3 years) began in 1954 when the Ministry of Education of Korea first introduced an official nationwide curriculum. Various types of educational attainment, which are difficult to group into the categories used in this study, would be inevitable among decedents whose childhood and adolescent education was achieved before the modern South Korean educational system was established. Difficulties in determining one\'s educational level have also remained in vital statistic records. For example, middle and high school levels were grouped as one category in early 1990s death certificate data \[[@B7]\]. However, when middle school and elementary school education were collapsed into high school and no education respectively, statistically significant differences in agreement of education did not appear. It was hypothesized that male decedents\' education would be more accurately reported by surviving female spouses than female decedents\' due to the gender gap in life expectancy \[[@B3]\]. However, this study showed that the agreement rate of education for women was generally greater than that for men. Statistically significant gender differences in odds of agreement were found for both educational categories (five and three groups) when only the gender variable was entered into logistic model (data not shown). In South Korea a woman\'s death is more frequently reported by her children, who may know more about her education than other informants. The widow\'s cognitive or communication problems may lower the agreement rate of male decedents\' education. However, the comparison of accuracy level between widow\'s reporting (for male decedents\' education) and children\'s reporting (for female decedents\' education) needs to be further explored. If a woman\'s informants were uncertain as to which education levels she achieved, it might be difficult to accurately deduce and report the actual education level. However, in this study reports of women\'s education in the NHANES were concentrated around the \"no education\" level (67.9%). The simplicity of a woman\'s education might help informants for death certification to report education information accurately. Based on logistic model, significantly greater odds ratios of agreement for women compared with men became insignificant after adjusting for education (data not shown). Although the magnitude of overall agreement rate for education did not vary with causes of death, understatement rate for external causes tended to be greater than the rates for other broad causes. Higher understatement rate for external causes was mainly due to stigmatized causes of death rather than other external causes such as transport accident. Understatement rate for suicide (n = 17) was 35.3% (n = 6) while the rate for transport accident (n = 24) was 8.3% (n = 2). Logistic analysis presented a greater odds ratio of understatement for suicide (data not shown). This suggests that a considerable understatement for education may occur in stigmatized causes of death. Overstatement and understatement of education by descendants may vary with regions with different cultural background. Results of this study showed a tendency for inflation of education when grouped into five categories but did not reveal any evidence of inflation when education was collapsed into three categories. These findings agree with prior US studies where inflation was found in six educational groups \[[@B3]\] but did not appear in collapsed educational groups \[[@B1]\]. Thus, when using unlinked data a more collapsed categorization of education would produce a more valid result on estimating mortality inequality. However, as the sensitivity of college or higher education was generally greater than that of no education and the pattern did not vary with covariates, it can be suggested that educational mortality differentials between no education and college or higher education in the previous study \[[@B6]\] were underestimated. Indeed, several longitudinal mortality follow-up studies presented a substantial difference in mortality by education in South Korea \[[@B15],[@B16]\]. Given that the level of agreement did not significantly vary with cause of death, cause-specific analysis may not result in biased results. However, a more collapsed categorization in education would be recommended especially when a more definitive conclusion regarding educational mortality inequality is required. Conclusion ========== The low percentage of missing education information in South Korean death certificate data could provide a great potential to monitor socioeconomic inequalities in mortality. Despite the relatively high level for overall validity and reliability, a more collapsed categorization of education would produce a more valid result on estimating mortality inequality when using unlinked data. List of abbreviations ===================== CI, confidence intervals; NHANES, National Health and Nutrition Examination Survey of South Korea; SD, standard deviation. Competing interests =================== The author(s) declare that they have no competing interests. Authors\' contributions ======================= YHK conceived and designed the study with advice from HRK and JWL. YHK analyzed and interpreted the data and drafted the paper. HRK and JWL interpreted the data and critically revised the draft of the paper. All authors read and approved the final manuscript. Pre-publication history ======================= The pre-publication history for this paper can be accessed here: <http://www.biomedcentral.com/1471-2458/7/294/prepub>
{ "pile_set_name": "PubMed Central" }
Q: How could the person in Luke 9:49 cast out demons without Jesus' mandate? Luke 9:49 (ESV): John answered, “Master, we saw someone casting out demons in your name, and we tried to stop him, because he does not follow with us.” The 12 (and later the 70) only started healing people and casting out demons AFTER Jesus "gave them power and authority over all devils, and to cure diseases." The Holy Spirit had not been sent yet, so with what authority was this person acting? I am not questioning the good will of the anonymous healer. Was he an imposter Jesus would have stated so. What I'm really wondering is that people didn't need a direct command (or mandate) from Jesus to act in His name? A: DEV--Don's Edited Version The answer to your question comes from Jesus, and also from the words of John in the verse you quoted. John's words: John assumed that because the unnamed exorcist was not in the inner circle of the Twelve that his exorcism could not therefore be on the "up and up." Jesus' words: In essence, Jesus told John (and all the other disciples who were present during the "Who is the greatest?" incident), "Hey [he didn't say 'Hey'], if that person you speak of exorcised demons in my name successfully, then he must be one of us, even though he is not a member of this particular group of twelve disciples." I think many Christians (and I count myself among that number) assume that the only disciples who performed miracles in Jesus' name were those whom Jesus sent out (or commissioned, as in Mark 6:7, Luke 9:2 and 10:1) to precede him and pave the way for him by preaching the kingdom and by performing miracles such as exorcisms and perhaps other works of healing. This assumption may not be warranted, particularly in light of Jesus' words; namely, "'Do not hinder him [i.e., the man who cast out demons], for he who is not against you is for you'" (Luke 9:50) In other words, Jesus could very well have commissioned this man on a one-to-one basis. Perhaps for whatever reason this man could not "follow along with"--as John put it--the Twelve or some other recognizable group of Jesus-followers (e.g., "the 70" in Luke 10:1), so Jesus permitted him to heal people in Jesus' name. I think it unwise to assume, for example, that this man was a nonbeliever (similar to Simon Magus in Acts 8:9 ff.) and a "Lone Ranger" who was performing miracles without Jesus' sanction. Jesus could very well have sanctioned him to perform these miracles. Moreover, as I've suggested above, Jesus seems to have assumed that since the man performed miracles "in Jesus' name," that he was indeed "one of us"--meaning the Twelve and all his other disciples, even if John did not recognize him as such. In conclusion, there is no reason of which I am aware why this "lone wolf exorcist" was any more in need of the sending authority of the Holy Spirit than were the Twelve. After all, the Holy Spirit did not commission the Twelve (and others); Jesus did. On the authority of Jesus, the Twelve and this unnamed disciple were given the ability to heal. The power to do so undoubtedly came from the Holy Spirit, but the disciples were not even aware at this point that there was such a person called the "Holy Spirit." That awareness came later (e.g., in John 15). Additional Thought/Addendum Jesus had a way of surprising--shocking even--his closest followers and disciples. Example par excellence: Jesus' conversation with the Samaritan woman at the well of Sychar, in John 4:4-45. This woman had a number of strikes against her, at least from the disciples' perspective: She was a she. In other words, she was a second- or third-class citizen, as were most women in those days (with a few exceptions, to be sure). She was a member of a despised people group, the Samaritans, whom the Jews considered to be a bunch of religious half-breeds--which was partly true, since after the divided kingdom and the subsequent exile of Israeli Jews, Samaria was "seeded" with the importation of foreign colonists who brought their own syncretistic views of religion to Palestine. Consider Wayne Brindle's comments: "The development of Samaritanism and its alienation from Judaism was a process that began with the division of the kingdom of Israel, and continued through successive incidents which promoted antagonism, including the importation of foreign colonists into Samaria by Assyria, the rejection of the new Samaritan community by the Jews, the building of a rival temple on Mt. Gerizim, the political and religious opportunism of the Samaritans, and the destruction of both the Samaritan temple and their capital of Shechem by John Hyrcanus during the second century B:C. The Samaritan religion at the time of Jesus had become Mosaic and quasi-Sadducean, but strongly anti-Jewish. Jesus recognized their heathen origins and the falsity of their religious claims." She was a woman of questionable morals. (Today, a bigot would probably label her a slut!) She was alone with Jesus and conversed with him in a give-and-take discussion, which could have lasted an hour or more. Pious Jewish men simply did not talk with women in public, let alone have a religious confabulation. Unthinkable! She gave Jesus a drink of water from her own bucket, which to the Jews of Jesus' day would be unthinkable (just think of the ritual uncleanness of it all!). Nevertheless, Jesus, John tells us, "had to pass through Samaria" (4:4). Why? Because a Samaritan woman had a divine appointment with her soon-to-be Savior and Lord! Jesus could have bypassed Samaria as he travelled from northern Israel to southern Israel, as did his fellow Jews, but he was never one to depart from the path his Father had chosen for him. Furthermore, his Father and he shared a love for outcasts, outsiders, the foreigner, the stranger, and the alien. Why else would the Law of Moses contain so many instructions regarding the humane treatment of non-Hebrews with whom the Israelis interacted. My point is this: John--and perhaps the other disciples--did not realize at the time he registered his opinion about the "interloper" who was casting out demons in Jesus' name that Jesus' compassionate heart had room for outsiders and interlopers, such as the Samaritan woman at the well, and also the Syro-Phoenician woman whose daughter was plagued by a demon: "Then Jesus went thence, and departed into the coasts of Tyre and Sidon. And, behold , a woman of Canaan came out of the same coasts, and cried unto him, saying , 'Have mercy on me, O Lord, thou Son of David; my daughter is grievously vexed with a devil.' But he answered her not a word. And his disciples came and besought him, saying , 'Send her away; for she crieth after us.' But he answered and said, 'I am not sent but unto the lost sheep of the house of Israel.' Then came she and worshipped him, saying, 'Lord, help me.' But he answered and said, 'It is not meet to take the children's bread, and to cast it to dogs.' And she said, 'Truth, Lord: yet the dogs eat of the crumbs which fall from their masters' table.' Then Jesus answered and said unto her, 'O woman, great is thy faith: be it unto thee even as thou wilt.' And her daughter was made whole from that very hour'" (Matthew 15:21-28 KJV). In conclusion, the people to whom Jesus reached out may not have fit the mold of "disciple material" which was in John's (and others') mind, but then Jesus was not big on molds. Jesus was more interested in people's hearts, and he was an equal opportunity Savior, Healer, and Lord, and not just to "the lost sheep of the house of Israel."
{ "pile_set_name": "StackExchange" }
Serum miRNAs Signature Plays an Important Role in Keloid Disease. The molecular mechanism underlying the pathogenesis of keloid is largely unknown. MicroRNA (miRNA) is a class of small regulatory RNA that has emerged as a group of posttranscriptional gene repressors, participating in diverse pathophysiological processes of skin diseases. We investigated the expression profiles of miRNAs in the sera of patients to decipher the complicated factors involved in the development of keloid disease. MiRNA expression profiling in the sera from 9 keloid patients and 7 normal controls were characterized using a miRNA microarray containing established human mature and precursor miRNA sequences. Quantitative real-time PCR was performed to confirm the expression of miRNAs. The putative targets of differentially expressed miRNAs were functionally annotated by bioinformatics. MiRNA microarray analysis identified 37 differentially expressed miRNAs (17 upregulated and 20 downregulated) in keloid patients, compared to the healthy controls. Functional annotations revealed that the targets of those differentially expressed miRNAs were enriched in signaling pathways essential for scar formation and wound healing. The expression profiling of miRNAs is altered in the keloid, providing a clue for the molecular mechanisms underlying its initiation and progression. MiRNAs may partly contribute to the etiology of keloids by affecting the critical signaling pathways relevant to keloid pathogenesis.
{ "pile_set_name": "PubMed Abstracts" }
<!DOCTYPE html> <html> <head> <meta charset="UTF-8" /> <title>QUnit Test Suite - Canvas Addon</title> <link rel="stylesheet" href="../../qunit/qunit.css" type="text/css" media="screen"> <script type="text/javascript" src="../../qunit/qunit.js"></script> <script type="text/javascript" src="qunit-canvas.js"></script> <script type="text/javascript" src="canvas-test.js"></script> </head> <body> <h1 id="qunit-header">QUnit Test Suite - Canvas Addon</h1> <h2 id="qunit-banner"></h2> <div id="qunit-testrunner-toolbar"></div> <h2 id="qunit-userAgent"></h2> <ol id="qunit-tests"></ol> <canvas id="qunit-canvas" width="5" height="5"></canvas> </body> </html>
{ "pile_set_name": "Github" }
--- abstract: 'We present here a microscopic analysis of the cooperative light scattering on an atomic system consisting of $\Lambda$-type configured atoms with the spin-degenerate ground state. The results are compared with a similar system consisting of standard “two-level” atoms of the Dicke model. We discuss advantages of the considered system in context of its possible implications for light storage in a macroscopic ensemble of dense and ultracold atoms.' address: | ${}^1$Department of Theoretical Physics, St-Petersburg State Polytechnic University, 195251, St.-Petersburg, Russia\ ${}^2$Department of Physics, St-Petersburg State University, 198504, St-Petersburg, Russia author: - 'A.S. Sheremet${}^1$, A.D. Manukhova${}^2$, N.V. Larionov${}^1$, D.V. Kupriyanov${}^1$' title: | Cooperative light scattering on an atomic system with\ degenerate structure of the ground state --- Introduction ============ A significant range of studies of ultracold atomic systems have focused on their complex quantum behavior in various interaction processes. Among these, special attention has been payed to the quantum interface between light and matter, and quantum memory in particular [@PSH; @Simon; @SpecialIssueJPhysB]. Most of the schemes for light storage in atomic ensembles are based on idea of the $\Lambda$-type conversion of a signal pulse into the long-lived spin coherence of the atomic ground state. The electromagnetically induced transparency (EIT) protocol in a warm atomic ensemble was successfully demonstrated in Ref. [@NGPSLW], and also in Ref. [@CDLK], where a single photon entangled state was stored in two ensembles of cold atoms with an efficiency of 17%. Recent experiments on conversion of a spin polariton mode into a cavity mode with efficiency close to 90% [@STTV] and on the narrow-bandwidth biphoton preparation in a double $\Lambda$-system under EIT conditions [@DKBYH] show promising potential for developing a quantum interface between light and atomic systems. However, further improvement of atomic memory efficiencies is a challenging and not straightforward experimental task. In the case of warm atomic vapors, any increase of the sample optical depth meets a serious barrier for the EIT effect because of the rather complicated and mainly negative rule of atomic motion and Doppler broadening, which manifest in destructive interference among the different hyperfine transitions of alkali-metal atoms [@MSLOFSBKLG]. In the case of ultracold and dilute atomic gas, which can be prepared in a magneto-optical trap (MOT), for some experimental designs optical depths around hundreds are feasible [@FGCK], but there are a certain challenges in accumulating so many atoms and making such a system controllable. One possible solution requires special arrangements for effective light storage in MOT in a diffusion regime; see Ref. [@GSOH]. Recent progress in experimental studies of light localization phenomenon in the dense and strongly disordered atomic systems [@Kaiser; @BHSK] encourages us to think that the storage protocols for light could be organized more effectively if atoms interacted with the field cooperatively in the dense configuration. If an atomic cloud contains more than one atom in the volume scaled by the radiation wavelength, the essential optical thickness can be attained for a smaller number of atoms than it is typically needed in dilute configuration. In the present paper we address the problem of light scattering by such an atomic system, which has intrinsically cooperative behavior. Although the problem of cooperative or dependent light scattering and super-radiance phenomenon have been well established in atomic physics and quantum optics for decades (see Refs. [@BEMST; @Akkermns]), microscopic analysis for the atoms with degenerate ground states is still quite poorly performed in the literature [@Grubellier]. The microscopic calculations reported so far have been done mostly for “two-level” atoms and were basically motivated by the problem of mesoscopic description of the light transport through disordered media and by an Anderson-type localization, where transition from weak to strong disorder plays a crucial role; see Refs. [@RMO; @GeroAkkermns; @SKKH]. In this paper we develop a microscopic theory of the cooperative light scattering from an atomic system consisted of $\Lambda$-type configured atoms with the spin-degenerate ground state. The results are compared with a similar system of “two-level” atoms of the Dicke model. We discuss advantages of the considered system in the context of its possible implications for the problem of light storage in a macroscopic ensemble of dense and ultracold atoms. Theoretical framework ===================== Transition amplitude and the scattering cross section ----------------------------------------------------- The quantum-posed description of the photon scattering problem is based on the formalism of $T$ matrix, which is defined by $$\hat{T}(E)=\hat{V}+\hat{V}\frac{1}{E-\hat{H}}\hat{V},% \label{2.1}%$$ where $\hat{H}$ is the total Hamiltonian consisting of the nonperturbed part $\hat{H}_0$ and an interaction term $\hat{V}$ such that $\hat{H}=\hat{H}_0+\hat{V}$. The energy argument $E$ is an arbitrary complex parameter in Eq.(\[2.1\]). Then the scattering process, evolving from initial state $|i\rangle$ to the final state $|f\rangle$, is expressed by the following relation between the differential cross section and the transition amplitude, given by the relevant $T$-matrix element considered as a function of the initial energy $E_i$: $$d\sigma_{i\to f}=\frac{{\cal V}^2}{\hbar^2 c^4}\frac{\omega'^2}{(2\pi)^2}% \left|T_{g'\mathbf{e}'\mathbf{k}',g\,\mathbf{e\,k}}(E_i+i0)\right|^2d\Omega% \label{2.2}%$$ Here the initial state $|i\rangle$ is specified by the incoming photon’s wave vector $\mathbf{k}$, frequency $\omega\equiv\omega_k=c\,k$, and polarization vector $\mathbf{e}$, and the atomic system populates a particular ground state $|g\rangle$. The final state $|f\rangle$ is specified by a similar set of the quantum numbers, which are additionally upscribed by the prime sign, and the solid angle $\Omega$ is directed along the wavevector of the outgoing photon $\mathbf{k}'$. The presence of quantization volume ${\cal V}$ in this expression is caused by the second quantized structure of the interaction operators; see below. The scattering process conserves the energy of input and output channels, such that $E_i=E_f$. Our description of interaction process of the electromagnetic field with an atomic system is performed in the dipole approximation. This states that the original Hamiltonian, introduced in the Coulomb gauge and valid for any neutral charge system, has been unitarily transformed to the dipole-type interaction with the assumption that atomic size is much smaller than a typical wavelength of the field modes actually contributing to the interaction dynamics. Such a long-wavelength dipole approximation see Ref. [@ChTnDRGr] for derivation details leads to the following interaction Hamiltonian for an atomic ensemble consisting of $N$ dipole-type scatterers interacting with the quantized electromagnetic field: $$\begin{aligned} \hat{V}&=&-\sum_{a=1}^{N}% \hat{\mathbf{d}}^{(a)}\hat{\mathbf{E}}(\mathbf{r}_a)+\hat{H}_{\mathrm{self}},% \nonumber\\% \hat{H}_{\mathrm{self}}&=&\sum_{a=1}^{N}\frac{2\pi}{{\cal V}}\sum_{s}\left(\mathbf{e}_s\hat{\mathbf{d}}^{(a)}\right)^2% \label{2.3}%\end{aligned}$$ The first and most important term is normally interpreted as interaction of an $a$th atomic dipole $\mathbf{d}^{(a)}$ with electric field $\hat{\mathbf{E}}(\mathbf{r})$ at the point of dipole location. However, strictly defined in the dipole gauge, the latter quantity performs the microscopic displacement field, which can be expressed by a standard expansion in the basis of plane waves $s\equiv{\mathbf{k},\alpha}$ (where $\alpha=1,2$ numerates two orthogonal transverse polarization vectors $\mathbf{e}_s\equiv\mathbf{e}_{\mathbf{k}\alpha}$ for each $\mathbf{k}$) $$\begin{aligned} \lefteqn{\hat{\mathbf{E}}(\mathbf{r})\equiv \hat{\mathbf{E}}^{(+)}(\mathbf{r})% +\hat{\mathbf{E}}^{(-)}(\mathbf{r})}% \nonumber\\% &&=\sum_{s}\left(\frac{2\pi\hbar\omega_s}{{\cal V}}\right)^{1/2}% \left[i\mathbf{e}_s a_s\mathrm{e}^{i\mathbf{k}_s\mathbf{r}}% -i\mathbf{e}_s a_s^{\dagger}\mathrm{e}^{-i\mathbf{k}_s\mathbf{r}}\right]% \nonumber\\% &&=\hat{\mathbf{E}}_{\bot}(\mathbf{r})+\sum_{b=1}^{N}\frac{4\pi}{{\cal V}}% \sum_{s}\mathbf{e}_s(\mathbf{e}_s\hat{\mathbf{d}}^{(b)})% \mathrm{e}^{i\mathbf{k}_s(\mathbf{r}-\mathbf{r}_b)}% \label{2.4}%\end{aligned}$$Here $a_s$ and $a_s^{\dagger}$ are the annihilation and creation operators for the $s$th field’s mode and the quantization scheme includes the periodic boundary conditions in the quantization volume ${\cal V}$. The bottom line in Eq.(\[2.4\]) indicates the important difference between the actual transverse electric field denoted as $\hat{\mathbf{E}}_{\bot}(\mathbf{r})$ and the displacement field. The difference cannot be ignored at the distances comparable with either atomic size or the radiation wavelength, which is the subject of the present report. For such a dense configuration the definitions (\[2.3\]) and (\[2.4\]) should be clearly understood. Let us make a few remarks. The second term in Eq.(\[2.3\]) reveals a nonconverging self-energy (self-action) of the dipoles. This term is often omitted in practical calculations since it does not principally affect the dipoles’ dynamics, particularly when the difference between transverse electric and displacement fields is small. It can be also formally incorporated into the internal Hamiltonian associated with the atomic dipoles. However, as was pointed out in Ref. [@SKKH] via tracing the Heisenberg dynamics of atomic variables, the self-action term is mostly compensated by the self-contact dipole interaction. The latter manifests itself in the dipoles’ dynamics when $\mathbf{r}=\mathbf{r}_a=\mathbf{r}_b$ for interaction of a specific $a$-th dipole in Hamiltonian (\[2.3\]) with the longitudinal field created by the same dipole in the second term in Eq. (\[2.4\]). Both these nonconverging self-action and self-contact interaction terms can be safely renormalized in evaluation of a single-particle contribution into the self-energy part of the perturbation theory expansion for the resolvent operator; see below. Resolvent operator and $N$-particle Green’s function {#II.B} ---------------------------------------------------- The transition amplitude (\[2.1\]) can be simplified if we substitute in it the interaction operator (\[2.3\]) by keeping only the terms with annihilation of the incoming photon in the input state and creating the outgoing photon in the output state. Such a simplification is in accordance with the standard approach of the rotating wave approximation, which is surely fulfilled for a near-resonance scattering process. As a consequence of this approximation the transition amplitude is now determined by the complete resolvent operator projected onto the vacuum state for the field subsystem and onto the singly excited state for the atomic subsystem $$\tilde{\hat{R}}(E)=\hat{P}\,\hat{R}(E)\,\hat{P}\equiv \hat{P}\frac{1}{E-\hat{H}}\hat{P}.% \label{2.5}%$$ Here we defined the following projector $$\begin{aligned} \lefteqn{\hspace{-0.8cm}\hat{P}=\sum_{a=1}^{N}\;\sum_{\{m_j\},j\neq a}\;\sum_{n}% |m_1,\ldots,m_{a-1},n,m_{a+1},\ldots m_N\rangle}% \nonumber\\% &&\hspace{-0.5cm}\langle m_1,\ldots,m_{a-1},n,m_{a+1},\ldots,m_N|\times|0\rangle\langle 0|_{\mathrm{Field}}% \label{2.6}%\end{aligned}$$ which selects in the atomic Hilbert subspace the entire set of the states where any $j$th of $N-1$ atoms populates a Zeeman sublevel $|m_j\rangle$ in its ground state and one specific $a$th atom (with $a$ running from $1$ to $N$ and $j\neq a$) populates a Zeeman sublevel $|n\rangle$ of its excited state. The field subspace is projected onto its vacuum state and the operator $\tilde{\hat{R}}(E)$ can be further considered as a matrix operator acting only in atomic subspace. The elements of the $T$ matrix can be directly expressed by the resolvent operator as follows: $$\begin{aligned} \lefteqn{T_{g'\mathbf{e}'\mathbf{k}',g\,\mathbf{e\,k}}(E)=\frac{2\pi\hbar\sqrt{\omega'\omega}}{{\cal V}}% \sum_{b,a=1}^{N}\;\sum_{n',n}}% \nonumber\\% &&\hspace{1 cm}(\mathbf{d}\mathbf{e}')_{n'm'_b}^{*}(\mathbf{d}\mathbf{e})_{nm_a}% \mathrm{e}^{-i\mathbf{k}'\mathbf{r}_b+i\mathbf{k}\mathbf{r}_a}% \nonumber\\% &&\langle\ldots m'_{b-1},n',m'_{b+1}\ldots |\tilde{\hat{R}}(E)% |\ldots m_{a-1},n,m_{a+1}\ldots \rangle% \nonumber\\% &&\label{2.7}%\end{aligned}$$ This performs a generalization of the well-known Kramers-Heisenberg formula [@BerstLifshPitvsk] for the scattering of a photon by a many-particle system consisting of atomic dipoles. The selected specific matrix element runs all the possibilities when the incoming photon is absorbed by any $a$th atom and the outgoing photon is emitted by any $b$th atom of the ensemble, including the possible coincidence $a=b$. The initial atomic state is given by $|g\rangle\equiv|m_1,\ldots,m_N\rangle$ and the final atomic state is given by $|g'\rangle\equiv|m'_1,\ldots,m'_N\rangle$. The projected resolvent operator contributing to Eq. (\[2.7\]) is defined in the the Hilbert subspace of a finite size with dimension $d_eN\,d_g^{N-1}$, where $d_e$ is the degeneracy of the atomic excited state and $d_g$ is the degeneracy of its ground state. The matrix elements of operator $\tilde{\hat{R}}(E)$ can be linked with the $N$-particle causal Green’s function of atomic subsystem via the following Laplace-type integral transformation: $$\begin{aligned} \lefteqn{\langle\ldots m'_{b-1},n',m'_{b+1}\ldots |\tilde{\hat{R}}(E)% |\ldots m_{a-1},n,m_{a+1}\ldots \rangle}% \nonumber\\% &&\times\delta\left(\mathbf{r}'_1-\mathbf{r}_1\right)\ldots\delta\left(\mathbf{r}'_b-\mathbf{r}_b\right)\ldots% \delta\left(\mathbf{r}'_a-\mathbf{r}_a\right)\ldots\delta\left(\mathbf{r}'_N-\mathbf{r}_N\right)% \nonumber\\% &&=-\frac{i}{\hbar}\int_0^{\infty}dt\,\,\exp\left[+\frac{i}{\hbar}E\,t\right]\,% \nonumber\\% &&G^{(N)}\left(1',t;\ldots ;b',t;\ldots ;N',t|1,0;\ldots ;a,t;\ldots;N,0\right)% \label{2.8}%\end{aligned}$$ where on the right side we denoted $j=m_j,\mathbf{r}_j$ (for $j\neq a$) and $j'=m'_j,\mathbf{r}'_j$ (for $j'\neq b$), and for specific atoms $a=n,\mathbf{r}_a$ and $b'=n',\mathbf{r}'_b$. Here $\mathbf{r}_j=\mathbf{r}'_j$, for any $j=1\div N$, is the spatial location of $j$th atom, which is assumed to be conserved in the scattering process. This circumstance is expressed by the sequence of $/delta$ functions in Eq. (\[2.8\]). The causal Green’s function is given by the vacuum expectation value of the following chronologically ($T$)-ordered product of atomic second quantized $\Psi$ operators introduced in the Heisenberg representation $$\begin{aligned} \lefteqn{\hspace{-0.5cm}G^{(N)}\left(1',t'_1;\ldots ;b',t'_b;\ldots ;N',t'_N|1,t_1;\ldots ;a,t_a;\ldots;N,t_N\right)}% \nonumber\\% &&=\langle T \Psi_{m'_1}(\mathbf{r}'_1,t'_1)\ldots\Psi_{n'}(\mathbf{r}'_b,t'_b)\ldots% \Psi_{m'_N}(\mathbf{r}'_N,t'_N)% \nonumber\\% &&\Psi_{m_N}^{\dagger}(\mathbf{r}_N,t_N)\ldots% \Psi_{n}^{\dagger}(\mathbf{r}_a,t_a)\ldots\Psi_{m_1}^{\dagger}(\mathbf{r}_1,t_1)\rangle,% \nonumber\\% \label{2.9}%\end{aligned}$$ where $\Psi_{\ldots}(\ldots)$ and $\Psi_{\ldots}^{\dagger}(\ldots)$ are respectively the annihilation and creation operators for an atom in a particular state and coordinate. All the creation operators in this product contribute to transform (\[2.8\]) while being considered at initial time “$0$” and all the annihilation operators are considered at a later time $t>0$. That allows us to ignore effects of either bosonic or fermionic quantum statistics associated with atomic subsystem as far as we neglect any possible overlap in atomic locations and consider the atomic dipoles as classical objects randomly distributed in space. We ordered operators in Eq. (\[2.9\]) in such a way that in the fermionic case (under the anticommutation rule) and without interaction it generates the product of independent individual single-particle Green’s functions associated with each atom and with positive overall sign. The perturbation theory expansion of the $N$-particle Green’s function (\[2.9\]) can be visualized by the series of the diagrams in accordance with the standard rules of the vacuum diagram technique; see Ref. [@BerstLifshPitvsk]. After rearrangement the diagram expansion can be transformed to the following generalized Dyson equation: $$\scalebox{1.0}{\includegraphics*{eq2.10.eps}}% \label{2.10}$$ where the long straight lines with arrows correspond with individual causal single-particle Green’s functions of each atom in the ensemble such that the first term on the right side performs the graph image of nondisturbed $N$-particle propagator (\[2.9\]). The dashed block edged by short lines with arrows is the complete collective $N$-particle Green’s function dressed by the interaction. In each diagram block of equation (\[2.10\]) we indicated by $a,b,c$ (running from $1$ to $N$) the presence of one specific input as well as an output line associated with the single excited state equally shared by all the atoms of the ensemble. The sum of tight diagrams, which cannot be reduced to the product of lower order contributions linked by nondisturbed atomic propagators, builds a block of so-called self-energy part $\Sigma$. The diagram equation (\[2.10\]) in its analytical form performs an integral equation for $G^{(N)}(\ldots)$. With its transformation to the energy representation (\[2.8\]) the integral equation can be recomposed to the set of algebraic equations for the matrix of the projected resolvent operator $\tilde{\hat{R}}(E)$, which can be further numerically solved. The crucial requirement for this is the knowledge of the self-energy part (quasi-energy operator acting in the atomic subspace), which as we show below can be approximated by the lower orders in expansion of the perturbation theory. The self-energy part -------------------- In the lower order of perturbation theory the self-energy part consists of two contributions having single-particle and double-particle structures. Each specific line in the graph equation (\[2.10\]) associated with excitation of an $a$th atom generates the following irreducible self-energy diagram: $$\begin{aligned} \lefteqn{\scalebox{1.0}{\includegraphics*{eq2.11.eps}}} \nonumber\\% &&\Rightarrow\sum_{m}\int\frac{d\omega}{2\pi} d^{\mu}_{n'm}d^{\nu}_{mn}% iD^{(E)}_{\mu\nu}(\mathbf{0},\omega)% \nonumber\\% &&\times\frac{1}{E-\hbar\omega-E_m+i0}% \equiv\Sigma^{(a)}_{n'n}(E),% \label{2.11}\end{aligned}$$ which is analytically decoded with applying transformation (\[2.8\]) in the energy representation. Here the internal wavy line expresses the causal-type vacuum Green’s function of the chronologically ordered polarization components of the field operators $$iD^{(E)}_{\mu\nu}(\mathbf{R},\tau)=\left\langle T\hat{E}_{\mu}(\mathbf{r}',t')% \hat{E}_{\nu}(\mathbf{r},t)\right\rangle,% \label{2.12}%$$ which depends only on difference of its arguments $\mathbf{R}=\mathbf{r}'-\mathbf{r}$ and $\tau=t'-t$ and has the following Fourier image: $$\begin{aligned} \lefteqn{D^{(E)}_{\mu\nu}(\mathbf{R},\omega)=\int_{-\infty}^{\infty} d\tau\,\mathrm{e}^{i\omega\tau}% D^{(E)}_{\mu\nu}(\mathbf{R},\tau)}% \nonumber\\% &=&-\hbar\frac{|\omega|^3}{c^3}\left\{i\frac{2}{3}h^{(1)}_0\left(\frac{|\omega|}{c}R\right)\delta_{\mu\nu}\right.% \nonumber\\% &&\left.+\left[\frac{X_{\mu}X_{\nu}}{R^2}-\frac{1}{3}\delta_{\mu\nu}\right]% ih^{(1)}_2\left(\frac{|\omega|}{c}R\right)\right\};% \label{2.13}%\end{aligned}$$ see Ref. [@BerstLifshPitvsk]. Here $h^{(1)}_L(\ldots)$ with $L=0,2$ are the spherical Hankel functions of the first kind. As follows from Eq. (\[2.11\]) the Green’s function (\[2.13\]) contributes in that expression in a self-interacting form with spatial argument $\mathbf{R}\to\mathbf{0}$. As a consequence the expression (\[2.11\]) becomes non-converging in the limit $R\to 0$ and the integration over $\omega$ is nonconverging. Part of nonconverging terms should be associated with the longitudinal self-contact interaction. These terms are compensated by the dipolar self-action; see Eq. (\[2.3\]) and the related remark given above. The residual nonconvergency has radiative nature and demonstrates general incorrectness of the Lamb-shift calculation in assumptions of the long-wavelength dipole approximation. Finally we follow the standard renormalization rule, $$\begin{aligned} \Sigma^{(a)}_{n'n}(E)&=&\Sigma^{(a)}(E)\delta_{n'n},% \nonumber\\% \Sigma^{(a)}(E)&\approx&\Sigma^{(a)}(\hbar\omega_0)=\hbar\Delta_{\mathrm{L}}-i\hbar\frac{\gamma}{2},% \label{2.14}%\end{aligned}$$ where $\Delta_{\mathrm{L}}\to\infty$ is incorporated into the physical energy of the atomic state. To introduce the single-atom natural decay rate $\gamma$ we applied the Wigner-Weiskopf pole approximation and substituted the energy $E=\hbar\omega_k+E_g$ by its near resonance mean estimate $E\approx E_n$ with assumption that the atomic ground state is the zero-energy level such that $E_g=\sum_{j=1}^{N}E_{m_j}=E_m=0$. Then energy of the excited state is given by $E_n=\hbar\omega_0$, where $\omega_0$ is the transition frequency. In the lower order of perturbation theory, the double-particle contribution to the self-energy part consists of two complementary diagrams: $$\begin{aligned} \lefteqn{\scalebox{1.0}{\includegraphics*{eq2.15.eps}}} \nonumber\\% &&\hspace{-0.5cm}\Rightarrow\int\frac{d\omega}{2\pi} d^{\mu}_{n'm}d^{\nu}_{m'n}% iD^{(E)}_{\mu\nu}(\mathbf{R}_{ab},\omega)% \nonumber\\% &&\hspace{-0.5cm}\times\frac{1}{E-\hbar\omega-E_m-E_{m'}+i0}% \equiv\Sigma^{(ab+)}_{m'n';nm}(E) \label{2.15}\end{aligned}$$ and $$\begin{aligned} \lefteqn{\scalebox{1.0}{\includegraphics*{eq2.16.eps}}} \nonumber\\% &&\hspace{-0.5cm}\Rightarrow\int\frac{d\omega}{2\pi} d^{\mu}_{n'm}d^{\nu}_{m'n}% iD^{(E)}_{\mu\nu}(\mathbf{R}_{ab},\omega)% \nonumber\\% &&\frac{1}{E+\hbar\omega-E_n-E_{n'}+i0}% \equiv\Sigma^{(ab-)}_{m'n';nm}(E), \label{2.16}\end{aligned}$$ which are responsible for the excitation transfer from atom $a$ to atom $b$ separated by a distance $R_{ab}$. The vector components of the dipole matrix elements $d^{\nu}_{m'n}$ and $d^{\mu}_{n'm}$ are related with atoms $a$ and $b$ respectively. In the pole approximation $E\approx E_n=\hbar\omega_0$ the $\delta$ function features dominate in the spectral integrals (\[2.15\]) and (\[2.16\]) and the sum of both the terms gives $$\begin{aligned} \Sigma^{(ab)}_{m'n';nm}(E)&\approx&\Sigma^{(ab+)}_{m'n';nm}(\hbar\omega_0)+% \Sigma^{(ab-)}_{m'n';nm}(\hbar\omega_0)% \nonumber\\% &=&\frac{1}{\hbar}\,d^{\mu}_{n'm}d^{\nu}_{m'n}\,D^{(E)}_{\mu\nu}(\mathbf{R}_{ab},\omega_0).% \label{2.17}%\end{aligned}$$ The derived expression has clear physical meaning. For nearly located atoms the real component of the double-particle contribution to the self-energy part reproduces the static interaction between two atomic dipoles. Its imaginary component is responsible for formation of cooperative dynamics of the excitation decay in the entire radiation process. For long distances, when the atomic dipoles are separated by the radiation zone, this term describes radiation interference between any pair of two distant atoms, which weakly reduces with the interatomic separation. For short distances or in a dense sample the cooperative effects become extremely important and the scattering process becomes strongly dependent on a particular atomic configuration. It is a challenging problem to further improve the self-energy part by taking into consideration the higher orders of the perturbation theory expansion. Here we only substantiate the validity and sufficiency of the lower order approximation for the considered configuration. The main physical reason for this is weakness of interaction. This justifies ignoring of any deviation from free dynamics of atomic variables on a short time scale associated with the light retardation on distances of a few wavelengths. That yields main cooperation in the radiative dynamics among neighboring dipoles which can effectively interact via static longitudinal electric field. The diagram (\[2.16\]), in contrast with (\[2.15\]), is mostly important for evaluation of the static interaction such that in this graph the field propagator preferably links the points with coincident times on atomic lines. As a consequence, the presence of such diagram fragments as a part of any irreducible diagrams in higher orders would make the overall contribution small and negligible just because the static dipole-dipole interaction only weakly affects the dipoles’ dynamics during the short retardation time, which can be roughly estimated by the wave period $2\pi/\omega_0$. For the same reason we can ignore any vertex-type corrections to the diagram (\[2.14\]). Another part of the self-energy diagrams in higher orders can be associated with correction of the static interaction for itself. If the atomic system were as dense as the atoms were separated by a distance comparable with atomic size (much shorter than the radiation wavelength) then the description of the static interaction in the simplest dipole model would be inconsistent and insufficient. This correction is evidently ignorable for atomic ensemble with a density of a few atoms in a volume scaled by the cubic radiation wavelength. In this case the higher order static corrections are negligible as far as the dipole-dipole interaction is essentially less than the internal transition energy. As we can finally see, for the considered atomic systems, the self-energy part is correctly reproducible by the introduced lower order contributions. Results and discussion ====================== Cooperative scattering from the system of two atoms --------------------------------------------------- Let us apply the developed theory to the calculation of the total cross section for the process of light scattering from the system consisting of two atoms. We consider two complementary examples where the scattering atoms have different but similar Zeeman state structure. In the first example we consider V-type atoms, which have $F_0=0$ total angular momentum in the ground state and $F=1$ total angular momentum in the excited state. Such atoms are the standard objects for discussion of the Dicke problem see Ref. [@BEMST], and each atom performs a “two-level” energy system sensitive to the vector properties of light. In an alternative example we consider the $\Lambda$-type atoms, which can be also understood as overturned “two-level” system, which have $F_0=1$ total angular momentum in the ground state and $F=0$ total angular momentum in the excited state. For the latter example in the scattering scenario we assume the initial population by atoms of a particular Zeeman sublevel of the ground state, which has highest projection of the angular momentum. Both the excitation schemes and transition diagrams in the laboratory reference frame are displayed in Fig. \[fig1\]. ![(Color online) The excitation diagram of “two-level” V-type atom (left) and overturned “two-level” $\Lambda$-type atom (right). In both the configurations the light scattering is considered for the left-handed $\sigma_{-}$ polarization mode. The $\Lambda$-atom populates the Zeeman sublevel with the highest angular momentum projection.[]{data-label="fig1"}](figure1.eps) In Figs. \[fig2\]-\[fig4\] we reproduce the spectral dependencies of the total cross section for a photon scattering from the system consisted of two atoms separated by different distances $R$ and for different spatial orientations. The variation of interatomic separation from $R=10\lambdabar$ (independent scatterers) to $R=0.5\lambdabar$ (strongly dependent scatterers) transforms the scattering process from its independent to cooperative dynamics. In the plotted graphs the frequency spectra, reproduced as function of the frequency detuning $\Delta=\omega-\omega_0$ of the probe frequency $\omega$ from the nondisturbed atomic resonance $\omega_0$, are scaled by the natural radiation decay rate of a single atom $\gamma$, which is significantly different for $\Lambda$- and V-type energy configurations, such that $\gamma(\Lambda)=3\gamma(V)$. As a consequence the near-field effects responsible for the resonance structure of the resolvent operator and the cross section manifest more perceptibly for the V-type atoms, which are traditionally considered in many discussions of the Dicke system in literature. In the symmetric collinear excitation geometry, when the internal reference frame coincides with the laboratory frame see Fig. \[fig2\] the left-handed $\sigma_{-}$ excitation channel shown in Fig. \[fig1\] is only allowed for either V- or $\Lambda$-type transition schemes. In such a symmetric configuration the interatomic interaction via the longitudinal as well as via the radiative transverse fields splits the excitation transition in two resonance lines. For the case of the V-type excitation the observed resonances demonstrate either superradiant or subradiant nature. This is an evident indicator of the well-known Dicke effect of either cooperative or anticooperative contribution of the atomic dipoles into the entire radiation and scattering processes; see Refs. [@ChTnDRGr; @BEMST]. For the system of two $\Lambda$-type atoms separated by the same distances the atomic line also splits in two resonances, but they are less resolved and have relatively comparable line widths. The spectral widths indicate a slight cooperative modification, which is much weaker effect than in the case of V-type atoms. The physical reason of that is the contribution of the Raman scattering channels, which are insensitive to the effects of dependent scattering. ![(Color online) Spectral dependencies of the total cross section for a photon scattering from the system of two “two-level” V-type atoms (upper panel) and $\Lambda$-type atoms (lower panel) in the collinear excitation geometry; see inset. In the case of V-type atoms, in accordance with predictions of the Dicke model [@ChTnDRGr; @BEMST], the observed resonances demonstrate either super- or subradiant behavior when interatomic separation $R$ becomes shorter. In the case of $\Lambda$-type atoms the resonances are less resolved and both have a line width comparable with atomic natural decay rate.[]{data-label="fig2"}](figure2.eps) If both the atoms are located in the wavefront plane of the driving field, as shown in Fig. \[fig3\], the spectral dependence of the cross section is also described by two resonance features. With referring to the excitation scheme defined in the laboratory frame see Fig. \[fig1\] in the specific planar geometry the double-particle self-energy part (\[2.17\]) can couple only the states $|1,\pm 1\rangle$ related to either upper (V-type) or lower ($\Lambda$-type) atomic levels. As a consequence the resolvent operator $\tilde{\hat{R}}(E)$ has a block structure and only its 4 $\times$ 4 block, built in subspace $|0,0\rangle_1|1,\pm 1\rangle_2,\, |1,\pm 1\rangle_1|0,0\rangle_2$, can actually contribute to the scattering process. We subscribed the states by the atomic number $a,b=1,2$. The eigenstates of this matrix have different parities $g$ (even) and $u$ (odd) reflecting their symmetry or antisymmetry to transposition of the atomic state; see Ref. [@LaLfIII].[^1]. The observed resonances can be associated with two even-parity states symmetrically sharing the single excitation in the system of two atoms. Such selection rule is a consequence of the evident configuration symmetry of the system, shown in inset of Fig. \[fig3\], to its rotation on any angle around the $z$ axis such that the allowed transition amplitude should be insensitive to the atoms’ positions. In contrast to the collinear geometry case in the planar geometry both the resonances have identical shapes and line widths. It is also interesting that for this specific excitation geometry both the atomic systems of either V- or $\Lambda$-type demonstrate similar spectral behavior. ![(Color online) Same as in Fig. \[fig2\] but for planar excitation geometry. In both the excitation schemes for either V- or $\Lambda$-type atoms there is a symmetric resonance structure; see the text.[]{data-label="fig3"}](figure3.eps) In general for random orientation of the diatomic system shown in Fig. \[fig4\] there are four resonances. These resonances can be naturally specified in the internal reference frame, where the quantization axis is directed along the internuclear axis, via following the standard definitions of diatomic molecule terms; see Ref. [@LaLfIII]. There are two $\Sigma_g$ and $\Sigma_u$ terms of different parity and two doubly degenerate $\Pi_g$ and $\Pi_u$ terms, which also have different parities. Here the defined terms are associated with the symmetry of the self-energy part and specified by the transition type in the internal frame such that the transition dipole moment can have either $0$ projection ($\Sigma$ term) or $\pm 1$ projection ($\Pi$ term). For random orientation all these resonances can be excited and in case of the V-type atoms the odd-parity resonances have subradiant nature and the even-parity ones are superradiant. In contrast in the case of the $\Lambda$-type atoms the observed resonances are less resolved and have comparable widths; two of them have rather small amplitudes (see the lower panel of Fig. \[fig4\]). The previous configurations with the collinear and planar excitation geometries respectively correspond to the excitations of the $\Pi_g$ and $\Pi_u$, and $\Sigma_g$ and $\Pi_g$, resonance pairs. Summarizing the results, we can point out that all the plotted dependencies demonstrate significant difference in the cooperative scattering dynamics resulting from the similar quantum systems shown in Fig. \[fig1\]. ![(Color online) Same as in Fig. \[fig2\] but for random excitation geometry. For V-type atoms there are two superradiant and two subradiant resonances. For $\Lambda$-type atoms the four resonances are less resolved and have line widths comparable with a single-atom natural decay rate.[]{data-label="fig4"}](figure4.eps) Cooperative scattering from a collection of $\Lambda$-type atoms randomly distributed in space ---------------------------------------------------------------------------------------------- Evaluation of the resolvent operator for the situation of a many-particle system is a challenging task and its solution depends on the type of transition driven in the atomic system. For V-type atoms the problem can be solved even for a macroscopic atomic ensemble since the number of equations rises linearly with the number of atoms; see the relevant estimate given in Sec. \[II.B\]. In Ref. [@SKKH] the transformation of light scattering on macroscopic atomic ensemble consisting of V-type atoms were analyzed as functions of the sample density. Particularly, the authors demonstrated how the smooth spectral dependence of the cross section, observed in the limit of dilute and weakly disordered distribution of atomic scatterers, would transform to the random speckle resonance structure in the case of strongly disordered and dense distribution containing more than one atom in the cubic wavelength. The presence of narrow sub-radiant Dicke-type resonance modes revealed a microcavity structure built up in an environment of randomly distributed atomic scatterers that can be posed as a certain analog of Anderson-type localization of light. Our analysis in the previous section indicates that in the example of the $\Lambda$-type atoms the subradiant modes are not manifestable and such a system would be not suitable for observation of the localization effects. For coherent mechanisms of the quantum memory, which we keep in mind as a most interesting implication, the existence of the localization regime would be useful but not a crucially important feature of the light propagation process. However, the spectral profile of the scattering cross section and its dependence on the atomic density and sensitivity to the level of disorder are very important, for example, for further consideration of an EIT-based memory scheme. Below we consider an example of the atomic system consisted of five $\Lambda$-type atoms, which is described by the $405\times 405$ square matrix of the resolvent operator $\tilde{R}(E)$. With evident provisoes but at least qualitatively the system can be considered as having many particles and can show a tendency toward macroscopic behavior. We show how the scattering process is modified when the configuration is made more dense and how this corresponds with the description of the problem in terms of the macroscopic Maxwell theory. In macroscopic description the atomic system can be approximated by a homogeneous dielectric sphere of a small radius, which scatters light in accordance with the Rayleigh mechanism; see Ref. [@BornWolf]. We fix the parameters of the dielectric sphere by the same density of atoms as we have in the compared microscopic random distribution. The calculation of the dielectric susceptibility were made similarly to that done earlier in Ref. [@SKKH] and we will publish the calculation details elsewhere. The key point of our numerical analysis is to verify the presence of the Zeeman structure, which manifests itself via the Raman scattering channels in the observed total scattering cross section. In Fig. \[fig5\] we show how the scattering cross section is modified with varying atomic density $n_0$, scaled by the light bar wavelength $\lambdabar$, from $n_0\lambdabar^3=0.1$ (dilute configuration) to $n_0\lambdabar^3=1$ (dense configuration). There are two reference dependencies shown in these plots and indicated by dashed and solid black curves. The dashed curve is the spectral profile of single-atom cross section $\sigma_0=\sigma_0(\Delta)$ multiplied by the number of atomic scatterers $N=5$. The solid black curve is evaluated via the self-consistent macroscopic Maxwell description and reproduces the scattering cross section for the Rayleigh particle performed by a small dielectric sphere. Other dependencies subsequently show the results of microscopic calculations of the scattering cross section: (green \[dashed light gray\]) for a particular random configuration (visualized in insets) and (red \[dash-dotted dark gray\]) the microscopic spectral profiles averaged over many random configurations. The upper panel of Fig. \[fig5\] relates to the low-density (i.e., dilute configuration or weak disorder) regime, which is insensitive to any specific location of atomic scatterers in space. Indeed the exact result evaluated with the microscopic model is perfectly reproducible by the simplest approximation of the cross section by the sum of partial contributions of all five atoms considered as independent scatterers. This confirms the traditional vision of light propagation through a multiparticle atomic ensemble as through the system of independent scatterers, which are in background of many practical scenarios of interaction of atomic systems with external fields. The Raman channel manifests in the scattering process, a direct consequence of the Zeeman degeneracy of the atomic ground state. In contrast, the central and bottom panels of Fig. \[fig5\] show how the scattering process is modified in the situation of high density and strong disorder when the near-field effects are manifestable. The system evidently demonstrates cooperative behavior and the scattering mechanism becomes extremely sensitive to any specific distribution of the scatterers in space. The spectral profile is described by several resonances, and locations, amplitudes, and widths are unique for each specific configuration. However, there is a certain tendency to compromise the microscopically calculated scattering profile with the rough macroscopic prediction. The latter keeps only the Rayleigh channel as observable in the self-consistent macroscopic model of the scattering process. It is interesting that for any configurations, created randomly in the spatial distribution of the atomic scatterers, one of the observed resonances is preferably located near the vicinity of the zero detuning $\Delta\sim 0$. As a consequence, after the configuration averaging, the system demonstrates scattering characteristics qualitatively similar to those reproduced by the macroscopic model. Application to atomic memory problem ------------------------------------ The considered system of $\Lambda$-type atoms has certain potential for light-assisted coherent redistribution of atoms in the ground state initiated by simultaneous action of strong control and weak signal modes, that is, for realization of atomic memory protocol. Let us discuss the applicability and advantage of such a dense configuration of atoms for realization of light storage in atomic memories. At present most of the experiments and the supporting theoretical discussions operate with dilute configurations of atoms either confined with MOT at low temperature or existing in a warm vapor phase; see Refs. [@PSH; @Simon; @SpecialIssueJPhysB]. For such systems the standard conditions for realization of either EIT- or Raman-based storage schemes require an optical depth of around hundreds such that the macroscopic ensemble would typically consist of billions of atoms. The optimization of the memory protocol for the parameters of optical depth, pulse shape, etc., has been the subject of many discussions in literature, see Ref. [@NGPSLW] and references therein. There would be an evident advantage in developing the memory unit with fewer atoms but with the same optical depth of the sample. This immediately readdresses the basic problem of cooperative light scattering by a dense system of the $\Lambda$-type configured atoms. The presented microscopic analysis of the scattering process in such systems shows that in the strong disorder regime the spectral profile of the cross section is generally described by rather complicated and randomized resonance structure contributed by both the longitudinal and transverse self-energy interaction parts of the resolvent operator. This spectrum is unique for each particular configuration of the atomic scatterers and has only slight signature of original nondisturbed atomic spectrum. This circumstance is a direct consequence of the complicated cooperative dynamics, which reflects a microcavity nature of light interaction with a strongly disordered atomic ensemble. To determine possible implications of our results to the problem of atomic memories, we should extend the presented calculations toward the ensembles consisting of a macroscopic number of atoms. Such an extension seems not so straightforward since the number of contributing equations rises exponentially with the number of atoms and certain simplifying approximations are evidently needed. In this sense our calculations of the scattering cross section performed for a small collection of atoms can be considered a precursor to calculation of the transmittance coefficient, which would be a key characteristic in the macroscopic description of the problem. Our calculations indicate preferable contribution of the Rayleigh mechanism in the overall cooperative scattering process for a density and disorder level near the Ioffe-Regel bound $n_0\lambdabar^3\sim 1$. It is important that in this case one of the absorption resonances is located in the spectral domain near the zero detuning for any atomic configurations and provides the desirable conditions for further observation of the EIT phenomenon. The presence of the control mode, tuned at this predictable resonance point and applied in any “empty” arm of the $\Lambda$ scheme see Fig. \[fig1\], would make the atomic sample transparent for a signal pulse. Due to controllable spectral dispersion the signal pulse could be delayed and effectively converted into the long-lived spin coherence. Realization of this scheme requires essentially fewer atoms than for dilute ensembles prepared in warm vapors and in MOT experiments. Roughly for a fixed optical depth $b_0\sim n_0\lambdabar^2L$, where $L$ is the sample length, and for $n_0\lambdabar^3\ll 1$, the required number of atoms, allowing for diffraction losses, should be more than $b_0^2/n_0\lambdabar^3$. This number can be minimized if we approach the dense configuration $n_0\lambdabar^3\sim 1$ and make the near field effects manifestable. We are currently working on a self-consistent modification of the presented calculation scheme to make it applicable for a multiatomic ensemble and then to describe the problem in a macroscopic limit. This can be done if we take into consideration the near-field effects only for the neighboring atoms separated by a distance of wavelength. For the intermediate densities with $n_0\lambdabar^3\sim 1$ we can soften our original estimate, given in Sec. \[II.B\], for the number of equations to be solved, and can expect that the actual number would be scaled as $d_eN\,d_g^{n-1}$. Here $n-1\sim n_0\lambdabar^3$ performs the varying parameter denoting the number of the neighboring atoms, which have near field interfering with a selected specific atom. Our preliminary analysis shows that such a calculation algorithm should demonstrate a rapidly converging series with increasing $n$ and would allow us to include the control mode in the entire calculation procedure. Such a modification of the performed calculation scheme would be practically important and generally interesting for better understanding the microscopic nature of a $\Lambda$-type optical interaction in macroscopic atomic systems existing in a strong disorder regime. Summary ======= In this paper we have studied the problem of light scattering on a collection of atoms with degenerate structure of the ground state, which cooperatively interact with the scattered light. We have discussed the difference for the scattering process between such system of atoms and well-known object of the Dicke problem, performing an ensemble of two-level V-type atoms. The investigation is specifically focused toward understanding principle aspects of the scattering processes that can occur and how they vary as the atomic density is varied from low values to levels where the mean separation between atoms is on the order of the radiation wavelength. For both the $\Lambda$- and V-type systems the spectral profile of the scattering cross section strongly depends on the particular atomic spatial configuration. However, in the case of the degenerate ground state, the presence of Raman scattering channels washes out visible signature of the super- and subradiant excitation modes in the resolvent spectrum, which are normally resolved in the system consisted of two-level atoms. We have discussed advantages of the considered system in the context of its possible implications for the problem of light storage in a macroscopic ensemble of dense and ultracold atoms and we point out that the quantum memory protocol can be effectively organized with essentially fewer atoms than in the dilute configuration regime. ACKNOWLEDGMENTS {#acknowledgments .unnumbered} =============== We thank Elisabeth Giacobino, Igor Sokolov, Ivan Sokolov, and Julien Laurat for fruitful discussions. The work was supported by RFBR 10-02-00103, by the CNRS-RFBR collaboration (CNRS 6054 and RFBR 12-02-91056) and by Federal Program “Scientific and Scientific-Pedagogical Personnel of Innovative Russia on 2009-2013” (Contract No. 14.740.11.1173 ). [10]{} K. Hammerer, A. S[ø]{}rensen, and E. Polzik, Rev. Mod. Phys. **82**, 1041 (2010). C. Simon et al, Eur. Phys. J. D **58**, 1 (2010). J. Phys B: At. Mol. Opt. Phys **45** \#12 (2012), special issue on quantum memory. I. Novikova, A.V. Gorshkov, D.F. Phillips, A.S. S[ø]{}rensen, M.D. Lukin, and R.L. Walsworth, Phys. Rev. Lett. **98** 243602 (2007); I. Novikova, N.B. Phillips, A.V. Gorshkov, Phys. Rev. A **78** 021802(R) (2008). K.S. Choi, H. Deng, J. Laurat, and H.J. Kimble, Nature (London) **452** 67 (2008). J. Simon, H. Tanji, J.K. Thompson, V. Vuletić, Phys. Rev. Lett. **98** 183601 (2007). S. Du, P. Kolchin, C. Belthangady, G. Y. Yin, and S. E. Harris, Phys. Rev. Lett. **100** 183603 (2008) M. Scherman, O.S. Mishina, P. Lombardi, J. Laurat, E. Giacobino, Optics Express **20**, 4346 (2012); O.S. Mishina, M. Scherman, P. Lombardi, J. Ortalo, D. Felinto, A.S. Sheremet, A. Bramati, D.V. Kupriyanov, J. Laurat, and E. Giacobino, Phys. Rev. A **83** 053809 (2011). L.S. Froufe-P[é]{}rez, W. Guerin, R. Carminati, R. Kaiser Phys. Rev. Lett. **102** 173903 (2009); W. Guerin, N. Mercadier, F. Michaud, D. Brivio, L.S. Froufe-P[é]{}rez, R. Carminati, V. Eremeev, A. Goetschy, S.I. Skipetrov, R. Kaiser, J. of Opt. **12** 024002 (2010). L.V. Gerasimov, I.M. Sokolov, R.G. Olave, M.D. Havey, J. Opt. Soc. Am. B **28** 1459 (2011); L.V. Gerasimov, I.M. Sokolov, R.G. Olave, M.D. Havey, J. Phys. B: At. Mol. Opt. Phys. **45** 124012 (2012). R. Kaiser, J. Mod. Opt. **56** 2082 (2009). S. Balik, M.D. Havey, I.M. Sokolov, D.V. Kupriyanov, Phys. Rev. A **79** 033418 (2009); I.M. Sokolov, D.V. Kupriyanov, R.G. Olave, M.D. Havey J. Mod. Opt. **57** 1833 (2010). M.G. Benedict, A.M. Ermolaev, V.A. Malyshev, I.V. Sokolov, and E.D. Trifonov, *Super-radiance: Multiatomic coherent emission* (Institute of Physics Publishing, Techno House, Redcliffe Way, Bristol BS1 6NX UK, 1996). E. Akkermans and G. Montambaux, *Mesoscopic Physics of Electrons and Photons* (Cambridge University Press, Cambridge, 2007). A. Grubellier, Phys. Rev. A **15**, 2430 (1977). M. Rusek, J. Mostowski, and A. Orlowski, Phys. Rev. A **61** 022704 (2000 ); F.A. Pinheiro, M. Rusek, A. Orlowski, B.A. van Tiggelen, Phys. Rev. E **69** 026605 (2004). A. Gero, E. Akkermans, Phys. Rev. A **75** 053413 (2007); E. Akkermans, A. Gero, R. Kaiser, Phys. Rev. Lett. **101** 103602 (2008). I.M. Sokolov, M.D. Kupriyanova, D.V. Kupriyanov, M.D. Havey Phys. Rev. A **79** 053405 (2009). C. Cohen-Tannoudji, J. Dupont-Roc, G. Grynberg *Atom-Photon Interactions. Basic Processes and Applications* (John Wiley, New York, 1992). V.B. Beresteskii, E.M. Lifshits, L.P. Pitaevskii, *Course of Theoretical Physics: Quantum Electrodynamics* (Oxford: Pergamon Press, Oxford, 1981). L.D. Landau E.M. Lifshits *Course of Theoretical Physics: Quantum Mechanics* (Pergamon Press, Oxford, 1981). M. Born, E. Wolf, *Principles of Optics* (Pergamon Press, Oxford 1964). [^1]: By “parity” we mean symmetry of the self-energy part to the transposition of atoms. This is similar to the parity definition for homonuclear diatomic molecules in chemistry; see Ref. [@LaLfIII]
{ "pile_set_name": "ArXiv" }
Q: Integrals of $\int^\infty _2 \frac{x}{x^3 -2\sin x}dx$ How do I calculate the convergence of $\int^\infty_2\frac{x}{x^3 -2\sin x}dx$ ? I know in generally, integration of (n-dimentional polynomial)/(n+2-dimentional polynomial) will be converge. A: $$\left|\int^2_\infty \frac{x}{x^3 -2\sin x}dx\right| \leq \int_2^\infty \left|\frac{x}{x^3 -2\sin x}\right|dx \leq \int_2^\infty \frac{x}{|x^3 -2\sin x|}dx=\int_2^\infty \frac{x}{x^3 -2x}dx=\dfrac{1}{2\sqrt{2}}\ln\dfrac12(2+\sqrt{2})^2$$ Note: $$|x^3 -2\sin x|\geq|x^3| -2|\sin x|\geq|x^3| -2|x|=x^3-2x$$
{ "pile_set_name": "StackExchange" }
MOSCOW (Reuters) - A defect has been discovered on part of a Russian space rocket that is due to launch next month carrying satellites into orbit for U.S. startup OneWeb, two Russian news agencies reported on Wednesday. The Russian Soyuz is scheduled to blast off from Guiana Space Centre carrying the first satellites into space for Virginia-based startup OneWeb, which plans to create a worldwide internet service using a network of satellites. Russia’s RIA news agency cited three sources as saying that a “breach” had been discovered in the rocket’s Fregat upper stage. A source quoted by TASS news agency said a tiny perforation had been found in one of the upper stage’s pipes and that the damage had possibly been caused during transportation. Both reports said the problem could mean the launch is delayed. Asked about the reports, Russian space agency Roscosmos told Reuters preparations for the flight were continuing as planned. “During pre-start operations, various problems can be uncovered which are resolved before a space rocket’s takeoff,” a spokesman for Roscosmos said. OneWeb did not immediately respond to a request for comment. The startup plans to create a network of 900 satellites, most of which it wants to send into orbit via 21 Soyuz launch vehicles. Russia’s space program has been beset by problems in recent years, including failed cargo delivery missions into space and the aborted launch in October of a manned Soyuz mission to the International Space Station. Earlier this month scientists said they had discovered a defect in the engines of Russia’s new flagship heavy lift space rocket.
{ "pile_set_name": "OpenWebText2" }
= -1 + 1 + 8*u - 11*u. Calculate the remainder when 16 is divided by g(-3). 7 Let k(q) = -4*q - 2 + 5*q**2 + 4 - q**3 + 3. Let t be k(4). Suppose 5*l - 38 = -t*y - 3, -y + 1 = -2*l. Calculate the remainder when 8 is divided by y. 3 Let z(a) = 9*a + 5. Let p = 421 - 407. Calculate the remainder when z(4) is divided by p. 13 Suppose 3*p = -8 + 59. Suppose -2*s - 2*g - 2*g + 40 = 0, -g = s - p. What is the remainder when 27 is divided by s? 13 Let o(x) = -x**2 + 9*x + 11. Calculate the remainder when o(9) is divided by 7. 4 Suppose -9 = 3*q - 0, j = -q + 12. Calculate the remainder when 19 is divided by j. 4 Let a(m) = m**2 + m + 21. What is the remainder when 41 is divided by a(0)? 20 Let u(d) = -d**3 + 4*d**2 + d + 1. What is the remainder when u(3) is divided by 5? 3 Suppose -3 = -z + 2. Suppose 5*y - 4*s + 20 - 70 = 0, -3*y - 5*s = -67. What is the remainder when y is divided by z? 4 Let o = -5 - -4. What is the remainder when (60/(-16))/(o/4) is divided by 8? 7 Let z be 12*(20/16 + -2). Let b = 21 + z. What is the remainder when 3/(-9) - 134/(-6) is divided by b? 10 Let o(b) = 2*b**2 + 9*b + 2. Calculate the remainder when 79 is divided by o(-6). 19 Let m = 6 - -31. Suppose -19 = -3*a + 20. Calculate the remainder when m is divided by a. 11 Suppose -3*t - 2*t = -5*f - 10, 0 = 2*f + 3*t + 14. Let o = f + 7. What is the remainder when (2/(-3))/(o/(-9)) is divided by 2? 0 Suppose -1 - 7 = 2*o, -12 = k + o. Let x be (k + -1)/(-1) - 1. Suppose u - x = 3*u, -4*h + 28 = -4*u. Calculate the remainder when 5 is divided by h. 2 Suppose h - 4*d = 32, h = 3*d - 4*d + 22. Calculate the remainder when h is divided by (2 - 1)*13*(-1 - -2). 11 Suppose -k - 2*k + 39 = 0. Let u(n) = -n**3 - 9*n**2 + 7. Let p be u(-9). Suppose p = 4*w - 13. What is the remainder when k is divided by w? 3 What is the remainder when 82 is divided by (-33)/(-2) - 4/(-8)? 14 Suppose -2*s + 4*j + 31 = -s, -5*s + 89 = 2*j. What is the remainder when 206 is divided by s? 16 Let n = 42 + -26. Let f = 27 - n. Calculate the remainder when 31 is divided by f. 9 Let z = -52 + 158. Let q = -68 + z. What is the remainder when q is divided by 20? 18 Let f(r) = -6*r - 3*r + 10 + 8*r. Calculate the remainder when 19 is divided by f(0). 9 Suppose -12 = -4*p + 8. What is the remainder when 7 is divided by p? 2 Let d = 4 + -2. Suppose -3*z + 195 = 5*s, -4*z + 104 + 156 = -d*s. What is the remainder when z is divided by 22? 21 Suppose -340 = -3*t - t. Calculate the remainder when t is divided by 22. 19 Suppose 160 = 2*p + 3*p. Suppose 4*o + p = 136. Suppose 0*a - a = -o. What is the remainder when a is divided by 9? 8 Let y(j) be the second derivative of j**5/20 - 7*j**4/12 - j**3/3 + j**2/2 - j. What is the remainder when y(8) is divided by 17? 15 Suppose 3*k = -4 + 22. Calculate the remainder when 22 is divided by k. 4 Let h(d) = -d**2 + 24*d - 19. What is the remainder when 5 is divided by h(23)? 1 Let z = 17 - 5. Let x be 6/27 + 2/(-9). Let d(r) = -r**3 - r + 23. What is the remainder when d(x) is divided by z? 11 Let p(l) = l**2 + 11*l + 13. Suppose j - 5 = -16. What is the remainder when 50 is divided by p(j)? 11 Let p(f) = 2*f**2 + 2. Let k be p(3). Suppose 0 = -4*s + s + 9. Suppose -k = -2*w - s*w. Calculate the remainder when w is divided by 2. 0 Suppose -3*w + 429 - 156 = 0. What is the remainder when w/2 - (-2)/(-4) is divided by 23? 22 Let h = -3 - -24. Suppose 0 = -4*p - c + 39, -2*p + 5*p - 23 = -2*c. What is the remainder when h is divided by p? 10 Calculate the remainder when 3/(1*(-2)/(-22)) is divided by 7. 5 Suppose -4*o = -9*o. Suppose o = -j + 4*y + 24, 3*j + y - 18 = 15. What is the remainder when (-3)/(-3)*(25 - 2) is divided by j? 11 Suppose 5*a = 1057 - 282. Suppose 0 = 7*m - 12*m + a. Calculate the remainder when m is divided by 16. 15 Let m = 2 + 19. What is the remainder when m is divided by 4? 1 Let n = 2 + 0. Suppose -n*a + 34 = -6. Let k = -3 + a. What is the remainder when k is divided by 9? 8 Suppose 0 = g - 3, 2*c - g + 11 = 6*c. Suppose -i + 39 = c*i. Calculate the remainder when 49 is divided by i. 10 Suppose -3*a = -0*a - 51. Suppose 0*b + c - 7 = -b, -2*c + a = 3*b. What is the remainder when 9 is divided by b? 0 Let b(n) = -2*n - 4. Let c be b(-3). Suppose -c = -s - 0. Let z = -8 + 9. What is the remainder when s is divided by z? 0 Let n(s) = -s + 8. Let o be n(5). Suppose -135 = x - 6*x. Suppose -3*p + o*r = -x, 4*p - 3*r = 1 + 37. What is the remainder when p is divided by 4? 3 Let l = 60 - 31. What is the remainder when l is divided by 16? 13 Suppose 2*c + a - 30 = 0, 15 = 5*c - 4*a - 34. What is the remainder when c is divided by 4? 1 Let w(h) = -h - 3. Let k be w(-3). Let y = 10 - k. What is the remainder when y is divided by 4? 2 Suppose 17 = o + 1. What is the remainder when 47 is divided by o? 15 Suppose 19 + 41 = 4*i. Calculate the remainder when 88 is divided by i. 13 Let m = 29 - 42. Let k = 22 + m. Calculate the remainder when 16 is divided by k. 7 Suppose n = 2*n. Suppose -3*t = -n*t - 3. Calculate the remainder when t is divided by 1. 0 Suppose 0 = -4*w + 4 + 44. Let g(k) = 5*k - 3. Calculate the remainder when w is divided by g(2). 5 Suppose -3*k - v - 44 = 0, -k + 5*v + 2 = 2*v. Let f = k - -39. Calculate the remainder when f is divided by 14. 12 Let v(f) = -f**3 + 15*f**2 + 21*f - 18. Calculate the remainder when v(16) is divided by 21. 20 Suppose 12 = 4*c, 2 = 5*g - c + 5. Suppose -2*j + 92 = 4*u, g*u + 1 = u. Calculate the remainder when j is divided by 23. 21 Suppose 3*s = 3*y + 78, 4*s + y - 121 = -32. Suppose 0 = 4*f + 12 - 44. Calculate the remainder when s is divided by f. 7 Let b(d) = -d**2 + 7*d - 1. Let a be b(6). Suppose k - 64 = -a*t + 10, 3*k = -t + 26. Calculate the remainder when t is divided by -2 + (0 + -3 - -13). 6 What is the remainder when (4/(-6))/(4/(-12)) is divided by 2? 0 Let i = 3 - 0. Let o(q) = -q + 12. Suppose -5*f + 40 = a, 5*a + 16 + 0 = 2*f. What is the remainder when o(f) is divided by i? 1 Suppose -5*u + 220 = 5*z, 0*z = 2*u + 5*z - 76. What is the remainder when u is divided by 17? 14 Let a(q) = 2*q**2 + 5*q + 5. Let s be a(-4). Suppose s - 2 = 5*x - 5*r, 5*x = -2*r + 36. Suppose -40 = -x*t + t. What is the remainder when 23 is divided by t? 7 Let c(z) = 4*z - 3. What is the remainder when 1572/16 - 3/(-36)*-3 is divided by c(7)? 23 Suppose 7 = v - 0*v. What is the remainder when v is divided by 3? 1 Suppose 5*k - 2*w - 108 = -4*w, 4 = w. What is the remainder when 77 is divided by k? 17 Suppose -5*u + 7 = -5*i + i, 0 = 2*i + u - 7. Let c be 6/(-5)*(-10)/3. Suppose 2*v - t - 1 = c, t - 7 = -4*v. Calculate the remainder when i is divided by v. 0 Let g = 11 - -20. Suppose -5*v + 5 = -4*v. Suppose -55 = -10*p + v*p. Calculate the remainder when g is divided by p. 9 Suppose -3*j = -5*j + 6. Calculate the remainder when 3 is divided by j. 0 Let s = 8 + -4. Let i(k) be the third derivative of k**5/20 - 2*k**2. What is the remainder when s is divided by i(-1)? 1 Suppose -2*x - 26 = -5*y, 5*y = -0*y - 5*x + 5. Suppose p = -4*g - 3, 0 = -y*p + 2*g - g + 39. What is the remainder when 17 is divided by p? 8 Let z(m) = -m**2 + 5*m - 2. What is the remainder when (-10)/6*36/(-10) is divided by z(4)? 0 Let m = 29 - 9. Calculate the remainder when 98 is divided by m. 18 Let p be (2/4)/(4/(-48)). Let t(g) = -g + 4. Calculate the remainder when 19 is divided by t(p). 9 Suppose 2*f - 17 = 37. Calculate the remainder when 105 is divided by f. 24 What is the remainder when ((-1)/(6/(-9)))/((-9)/(-564)) is divided by 19? 18 Let j(l) = -2*l**2 + 8*l + 15. Let n be (-24)/9*(-6)/4. Calculate the remainder when n/6 + 40/3 is divided by j(5). 4 Let r = -34 - -116. Calculate the remainder when r is divided by 29. 24 Suppose 38*w = 28*w + 430. Calculate the remainder when w is divided by 12. 7 What is the remainder when 11/(44/192) + 0 is divided by 17? 14 Let u = -10 + 31. Calculate the remainder when u is divided by 3. 0 Let p(o) = -o**3 + 9*o**2 - 8*o + 4. Let j be p(8). Let u = j - 1. Suppose u*h - 35 = -2*h. What is the remainder when 13 is divided by h? 6 Calculate the remainder when 23 is divided by 9/(-5)*(-40)/6. 11 Suppose -7 - 8 = -5*u. What is the remainder when 10 is divided by u? 1 Let h = -36 - -24. Let j = 0 - h.
{ "pile_set_name": "DM Mathematics" }
A distributed storage system may include a plurality of storage devices (e.g., storage arrays) to provide data storage to a plurality of nodes. The plurality of storage devices and the plurality of nodes may be situated in the same physical location, or in one or more physically remote locations. The plurality of nodes may be coupled to the storage devices by a high-speed interconnect, such as a switch fabric.
{ "pile_set_name": "USPTO Backgrounds" }
Sub: Submission of resolution passed by 11th Federal Council of NFPE at Mathura (UP) from 25.11.2019 to 27.11.2019 Sir, The following resolutions passed on maintaining Separate Identity of each Cadre i.e. PA/CO/RO & PA/SBCO is sent herewith for necessary action. RESLUTION The 11th Federal Council held at Mathura (UP)from 25.11.2019 to 27.11.2019 resolves unanimously that Separate Identity of each Cadre i.e PA/CO&RO and PA/SBCO should be maintained as it is. This Federal Council further resolves that the orders issued for amendment of Recruitment Rules vide Directorate No. F No. 04-05/2015-SPB-I dated 18.09.2019 should be withdrawn and status quo should be maintained. MOBILE PHONE SECURITY SHOULD BE A NATIONAL PRIORITY: SHRI RAVI SHANKAR PRASAD 5G Spectrum will be given for trial to all operators; We need to make UPI payment interface a global beacon; Launches Central Equipment Identity Register for tracing Stolen/Lost Mobiles in Delhi The Union Minister for Communications, Law & Justice and Electronics & Information Technology, Shri Ravi Shankar Prasad has said that the Mobile Security should be our National Priority because the mobile handset became an important tool for all online activities. He was addressing the gathering, here today, after launching a Web Portal called ‘Central Equipment Identity Register (CEIR)’ for the customers of Delhi to facilitate blocking and tracing of Stolen/Lost Mobile Phones in Delhi. The Lt. Governor of NCT of Delhi, Shri Anil Baijal, the Secretary, Telecom and the Chairman, Digital Communications Commission, Shri Anshu Prakash, the Commissioner of Delhi Police, Shri Amulya Patnaik, the Member (Technology), Digital Communications Commission, Shri S.K. Gupta were also present on the occasion. Shri Ravi Shankar Prasad said that Government has decided to give 5G Spectrum for trial to all operators in the country. This may take few years to launch it fully all over the country, he added. UPI Payments interface has become primary means for all online money transactions in the country and we need to make it a Global beacon for making Indian rupee much stronger. The Minister for Communications said that this is the age of communication and communication is power, and this is the age of technology and the technology is power. He further said that while we exploit use and make optimum involvement of technology for development the equally smart criminals induce technology for their own end. Therefore, we need a technology that safeguards our interests, he added. Shri Ravi Shankar Prasad said that Aadhar is a digital identity to confirm our physical identity and the digital India is for digital inclusion. Digital India is empowering ordinary Indian to the power of technology which is leading to digital inclusion, he said. Industry should be more innovative and Indian players should imbibe new innovations in IT, he added. The Lt. Governor of NCT of Delhi, Shri Anil Baijal while addressing said that in the NCR Delhi itself the mobile theft cases are increasing to the tune of 40,000 cases per year and there should be a mechanism to address this problem. He requested the Minister for Communication to consider the integration of Zonal Integrated Police Network (ZIPNET) with the CEIR for better functioning. The Secretary, Telecom and the Chairman, Digital Communications Commission, Shri Anshu Prakash said that the Tele-density in the country has increased to 242 mobiles for 100 populations and the mobile handset became a means to fulfil all day-to-day requirements. Therefore, securing mobile with a system is the need of the hour. International Mobile Equipment Identity (IMEI) is supposed to be a unique identity of a mobile phone device. A phone with one/two slots of SIM Card is programmed with one/two IMEI number as the case may be. IMEI number being programmable, some miscreants do reprogram the IMEI number, which results in cloning of IMEI causing multiple devices with same IMEI number. As on date, there are many cases of clones/duplicated IMEI handsets in the network. If such IMEI is blocked, a large number of mobile phones will get blocked being handsets with same IMEI causing inconvenience to many genuine customers. Thus, there is a need to eliminate duplicate/fake IMEI mobile phones from the network. Accordingly, this project called Central Equipment Identity Register (CEIR) system has been undertaken by the DoT for addressing security, theft and other concerns including reprogramming of mobile handsets. The launch of Project in Delhi will facilitate as follows: Request for blocking of stolen or lost mobile phone by customers. Blocking of such mobile phones across mobile networks. Allowing services to other existing customers have mobile phones with same IMEI number. CSCs are the access points for delivery of essential public utility services, social welfare schemes, healthcare, financial, education and agriculture services, apart from host of B2C services to citizens in rural and remote areas of the country. It is a pan-India network catering to regional, geographic, linguistic and cultural diversity of the country, thus enabling the Government’s mandate of a socially, financially and digitally inclusive society. Government to Citizen One of the key mandates of CSC scheme is to deliver Government to Citizen (G2C) services. Various G2C services of Central Government Ministries and departments, apart from State-specific services have been integrated on the Digital Seva portal for delivery to citizens in rural and remote areas of the country through the network of CSCs. Bharat BillPay : Bharat BillPay is a Reserve Bank of India (RBI) conceptualised system driven by National Payments Corporation of India (NPCI). It is a one-stop bill payment platform for all bills – electricity, mobile, broadband and landline, DTH, Gas, Water, etc - across India with certainty, reliability and safety of transactions. Two primary participants of Bharat BillPay are:  Bharat Bill Payment Central Unit (BBPCU) – which implements operational, technical and business standards for the entire system and its participants. The National Payments Corporation of India (NPCI) functions as the BBPCU.   Bharat Bill Payment Operating Units (BBPOUs) - BBPOUs are authorized operational units, working as per the standards set by BBPS. BBPOUs will on-board billers, aggregators and payment gateways; and set up agent network and customer touch points to handle bill payments through different delivery channels.   With CSC SPV becoming a BBPOU, CSCs can provide Bharat BillPay service and further enable the villagers to pay their Electricity, Water, Gas, DTH and Broadband & Landline Post Paid bills. FASTag through CSCs FASTag is an Electronic Toll Collection system in India operated by NHAI. FASTag is a simple to use, reloadable tag which enables automatic deduction of toll charges and lets you pass through the toll plaza without stopping for cash transaction. The tag employs Radio-frequency Identification (RFID) technology and is affixed on the vehicle's windscreen after the tag account is active. It is currently operational at more than 425 toll plazas across national and state highways. CSC SPV has partnered with NHAI to dispense FASTags through the network of CSCs. VLEs will dispense FASTags at the toll plazas after procuring them through the Digital Seva Portal; register customer details on portal and affix the tag on the car. Passport Ministry of External Affairs partnered with CSC SPV in 2014 to launch Passport Seva services through CSCs across the rural hinterland. Services available through CSCs include filling and uploading of Passport Application Form, payment of fee and scheduling of appointment for visit to Passport Kendra. During 2016-17, around 2.19 lakh Passport applications were submitted through the CSC network across the country. PAN Card Applications for new PAN Card are processed through CSCs in collaboration with UTI Infrastructure Technology And Services Limited (UTIITSL) and National Securities Depository Limited (NSDL). PAN Card service through NSDL was introduced for CSCs in February 2016. During 2016-17, 28.94 lakh Applications for PAN Card have been submitted through CSCs. Swacch Bharat Abhiyan Swacch Bharat Abhiyan is the biggest ever cleanliness drive launched by the Government in 2014 to clean the streets, roads and infrastructure of the country. In 2016, Ministry of Urban Development partnered with CSC to facilitate online applications through CSCs for construction of individual household toilets across the country under the campaign. During 2016-17, 5.26 lakh applications for individual household toilets were submitted through CSC network under Swacch Bharat Abhiyan. Pradhan Mantri Awas Yojana Pradhan Mantri Awas Yojana (PMAY) is an ambitious housing scheme of the Government for creating affordable housing units for urban poor. Although, entire urban area of the country will be covered under the scheme, the initial focus is on 500 select cities. In November 2016, a MoU was signed between Ministry of Housing and Urban Poverty Alleviation (MHUPA) and CSC SPV for receiving PMAY applications through CSCs. The service is being provided by 60,000 CSCs located in urban areas across States/ UTs. During 2016-17, 27.97 lakh Applications were submitted through CSC network under Pradhan Mantri Awas Yojana (PMAY) scheme. FSSAI Food Safety and Standards Authority of India (FSSAI) partnered with CSC SPV in July 2016 to provide Food Business Operator (FBO) registration service through CSCs. This initiative is aimed at registering a large number of unregistered FBOs in the country with the FSSAI through the vast network of CSCs. Under the service, Registration Certificate is auto generated after filing of online application through CSC. During 2016-17, 95,603 applications for FBO Registration have been submitted through CSCs. Soil Health Card Soil Health Cards are issued by the Government to farmers with crop-wise recommendations of nutrients and fertilizers required for individual farms to help them improve productivity through judicious use of inputs. Launched as a scheme in 2015, the Government plans to issue these cards to 14 crore farmers. Ministry of Agriculture & Farmers Welfare signed a MoU with CSC SPV in December 2016, to engage CSCs in the Soil Health Card scheme. During 2016-17, 1.24 lakh farmer registrations have taken place through CSCs across 23 States. e-District Districts are the de facto front-end of government. The e-District project has been conceptualized to improve the experience of G2C interactions for citizens at the districts through seamless delivery of various services like certificates, licences, Ration Card, disbursement of social welfare pensions, online filing of RTI, land registration, land records, Government taxes, utility bill payments, etc. Election Commission Services The Election Commission of India, in its endeavour to improve enrolment and correct data errors in the electoral rolls for hassle free elections, has partnered with CSC SPV for delivery of various electoral registration forms and EPIC printing through CSCs. So far, the Electoral Registration Management System (ERMS) of Tripura, Punjab, Chhattisgarh, Jharkhand, Bihar, Tamil Nadu, Gujarat, Haryana, and Maharashtra have been integrated with Digital Seva Portal. During 2016-17, CSCs have 34,780 Electoral Registration Forms in these nine States, where as 56.18 lakh EPIC have been printed and delivered through the CSC network in these nine States
{ "pile_set_name": "Pile-CC" }
name: rdev_get_ringparam ID: 721 format: field:unsigned short common_type; offset:0; size:2; signed:0; field:unsigned char common_flags; offset:2; size:1; signed:0; field:unsigned char common_preempt_count; offset:3; size:1; signed:0; field:int common_pid; offset:4; size:4; signed:1; field:char wiphy_name[32]; offset:8; size:32; signed:0; print fmt: "%s", REC->wiphy_name
{ "pile_set_name": "Github" }
Difficulties with emotion regulation mediate the relationship between borderline personality disorder symptom severity and interpersonal problems. Problems with interpersonal functioning and difficulties with emotion regulation are core characteristics of borderline personality disorder (BPD). Little is known, however, about the interrelationship between these areas of dysfunction in accounting for BPD symptom severity. The present study examines a model of the relationship between difficulties with emotion regulation and interpersonal dysfunction in a community sample of adults (n = 124) with the full range of BPD symptoms. Results showed that difficulties with emotion regulation fully mediated the relationship between BPD symptom severity and interpersonal dysfunction. An alternative model indicated that interpersonal problems partially mediated the relationship between difficulties with emotion regulation and BPD symptom severity. These findings support existing theories of BPD, which propose that difficulties with emotion regulation may account for the types of interpersonal problems experienced by individuals with BPD and suggest further examination of the possibility that interpersonal dysfunction may worsen these individuals' difficulties with emotion regulation.
{ "pile_set_name": "PubMed Abstracts" }
4/5) assuming d is positive. d**(288/115) Simplify (c**6*(c/(c**(3/4)*c*c*c))/c*(c**5/c)/(c**(2/13)/c))**(-5) assuming c is positive. c**(-1845/52) Simplify (o/o**(-3/2))**15/((o**(3/2)*o)/((o/o**6)/o)) assuming o is positive. o**29 Simplify ((s**(3/8)*s/(s**(1/7)/s))**(2/27))**(-26/5) assuming s is positive. s**(-325/378) Simplify x**(-9)/(x**(-22/3)/x)*x**12/(x*x*x**(2/7)) assuming x is positive. x**(190/21) Simplify ((d**(25/2))**(1/6))**(5/3) assuming d is positive. d**(125/36) Simplify (((i/(i*i*i/(i/(i/(i*((i*i**(-2))/i*i*i)/i*i))*i))*i)/i)/i)**(2/63)*(i*i*(i*i**(2/9))/i)/i**(11/4) assuming i is positive. i**(-47/84) Simplify ((x**(6/11)*x)/(x/x**(7/5)))/(x**5/x**(7/2)) assuming x is positive. x**(49/110) Simplify (s**(-33)/(s*s**(-1/48)))/(s**(1/2)/s*s/(s**(-11)*s)) assuming s is positive. s**(-2135/48) Simplify f*f**(-1/48)*f**15*(f*f**(-17))/((f*f*f**(4/3)*f)/f) assuming f is positive. f**(-161/48) Simplify (t/t**(-5))**(-32)/(t/((t**13*t)/t)*t/t**(3/4)) assuming t is positive. t**(-721/4) Simplify ((d*d**(-1/4))**36*(d**6/d)/(d/(d*d/d**5*d)))**(1/24) assuming d is positive. d**(29/24) Simplify (b**(-2/21)*b**(-1/3))/(b**(-1/3)/b**(1/16)) assuming b is positive. b**(-11/336) Simplify ((t*t**(-4))/t)**(4/11)/(t/t**14*t/t**9) assuming t is positive. t**(215/11) Simplify (h**3*h**(2/15)*h/(h/(h/(h/(h**(-4/5)/h))))*h**(2/9))**(-2/5) assuming h is positive. h**(-28/45) Simplify (p**6/p*p/p**(-4)*((((p/((p/(p**(2/7)*p))/p*p))/p)/p)/p)/(p*p**(-2/15)*p))**(-1/12) assuming p is positive. p**(-337/630) Simplify (y**(-17/5)/(y/(y/y**(3/10))*y))**(-33) assuming y is positive. y**(1551/10) Simplify (m**(-11)*m**(-2/21))/(m**(2/3))**(4/21) assuming m is positive. m**(-101/9) Simplify q**(-2)/(q/(q**(1/8)/q))*(q/(q*q**(-16)/q*q))/(q**(-3/10)/q) assuming q is positive. q**(537/40) Simplify d**(3/7)/d**(-1/11)*(d**(-1/3)/d)**40 assuming d is positive. d**(-12200/231) Simplify (g**(2/21)*g)/g**3*g**11*g**(-12/7) assuming g is positive. g**(155/21) Simplify (w**4*w)**(2/37)/(w**(3/7)/w**30) assuming w is positive. w**(7729/259) Simplify ((k/k**(1/5))/k*k)**(36/5)*k**(8/7)/k*k*(k**(-3)/k)/k assuming k is positive. k**(333/175) Simplify ((z**(1/3)*z*z/((z/z**6)/z))/(z**(-4)*z*z*z/z**(2/7)))**(-50) assuming z is positive. z**(-10100/21) Simplify (((j**(-2/7)/j)/j)**(1/55))**(2/29) assuming j is positive. j**(-32/11165) Simplify (r**(-1/7)/r)**(5/2)/(r/(r**19*r)*r**19) assuming r is positive. r**(-20/7) Simplify ((((m**(-1/12)*m)/m)/(m/m**(-8)*m))/((m*m/((m**(-5)/m*m)/m)*m)/(m/(m**(2/5)*m))))**(-2/17) assuming m is positive. m**(1169/510) Simplify (n**(-2/7))**(-1/19)/(n/n**(-2/27)*n)**(3/37) assuming n is positive. n**(-6782/44289) Simplify ((k*(k*k**14)/k)**(-9))**(-2) assuming k is positive. k**270 Simplify (q**(-4/3)/q)**(8/5)*(q**0*q)/q*(q/(q/(q*q**(-15)/q)))/q assuming q is positive. q**(-296/15) Simplify (a**(-10)/a*a**(1/2))/(a/(a/a**(-1)*a))**(1/30) assuming a is positive. a**(-313/30) Simplify (b*b**(-2/21)*b)/b*b**12*(b*b**17)/(b**15*b) assuming b is positive. b**(313/21) Simplify (((h/(h**(-1)/h))**31)**(-2/3))**(-5/6) assuming h is positive. h**(155/3) Simplify (((w/w**(-10))/(w*w**8*w))**(-22/7))**30 assuming w is positive. w**(-660/7) Simplify (i**(7/6))**11*i**27/(i/(i/(i/i**23))) assuming i is positive. i**(371/6) Simplify ((q/(q/(q*q**(8/3))))/q*q/(q*q**17))/(((q**(11/3)*q)/q)/q**(4/5)) assuming q is positive. q**(-86/5) Simplify (((l/(l*l**3)*l)**20)**(-2/7))**(-21) assuming l is positive. l**(-240) Simplify (f**33*f*f**(32/3)*f)/((f**(-1)/f)/(f*(f/(f/(f*f*f**34)))/f)) assuming f is positive. f**(251/3) Simplify (u/(u*u*u**(-36))*u*(((u*u*u**(4/5)/u)/u)/u)/u)/((u**22*u)/(u/u**(-1/3))) assuming u is positive. u**(197/15) Simplify (y**(-6)*y)**(1/42)*y**(-19/3)*y/(y*y*y**(-12)) assuming y is positive. y**(191/42) Simplify n**27/(n**27*n)*(n*n/(n*n/(n*n/(n/(n/n**(1/5)*n*n*n)))))/(n**(-1/6)*n) assuming n is positive. n**(89/30) Simplify (h/(h**10/h))**(-7/11)*h**19/(h**(-23)/h) assuming h is positive. h**(529/11) Simplify (l**(-10)*l*l*l*(l**(-20)*l)/l)/(l/((l/(l*l/l**8))/l))**(5/14) assuming l is positive. l**(-353/14) Simplify ((t*t*t/(t*t/t**(-2/33)*t*t*t))/(t/(t**(-2)/t)))/(t**(2/5)/(t*t/(t*t/t**(-6/11))*t)) assuming t is positive. t**(-991/165) Simplify (s/s**(-11/4))/(s*s**(-1)*s*s)*(s**(-1/6))**(-23) assuming s is positive. s**(67/12) Simplify j**(-13)/(j*j**(-23))*j/(j*j*j*j/(j*j/j**(2/7)*j)*j)*j*j**(-1/10) assuming j is positive. j**(603/70) Simplify a**10/(a*a*a**(3/10)*a)*a/a**(-2/7)*a*a/a**(-15)*a assuming a is positive. a**(1819/70) Simplify (((t**(-1)/t)**(-40))**(1/7))**(-2/111) assuming t is positive. t**(-160/777) Simplify ((o/(o*(o/(o*o*o**(-1/6)*o))/o)*o)/((o/(o/o**(2/5)))/o)*o**(4/3)*o*o*(o*o/o**(1/9))/o*o)**(-19) assuming o is positive. o**(-16511/90) Simplify (d**(-7)*d)**(-48)*(d**(-2/5))**(-47) assuming d is positive. d**(1534/5) Simplify (p*p**3/p)**(-45)/(p**(-2)*p**(-9)) assuming p is positive. p**(-124) Simplify ((s*s**7)/s*(s*s**(-1/30)*s)/s)/(s/(s*s**(-9)))**(-46) assuming s is positive. s**(12659/30) Simplify d**(3/4)/(d**15*d)*d**(-1/5)*d**(-7) assuming d is positive. d**(-449/20) Simplify (z**27/(z/z**(-9/2)*z))/(z**(-1/13)/(z*(z/(z/((z/(z*z*z*z**(-6/5)))/z)))/z)) assuming z is positive. z**(2441/130) Simplify (d*d/(d*d*d**(2/11)))**(10/17)*(d*d*d**(-3))/(d/d**9) assuming d is positive. d**(1289/187) Simplify ((z*z*z/(z/(z**(5/6)/z)))/(z/(z*z**(-1/13)))*(z**0)**11)**12 assuming z is positive. z**(274/13) Simplify (((h*(h**(1/10)*h)/h)/h*h*h)/h**(2/33))/((h/((h/(h*h/(h/((h/((h**8/h*h)/h))/h*h))))/h))/h*h/(h*(h**(-3/10)*h)/h)) assuming h is positive. h**(1112/165) Simplify (r**(2/3)*r)**(-18)*r**(-9/5)*r*r**9 assuming r is positive. r**(-109/5) Simplify p**(-4/3)*p**(-12/13)*p**(4/7)/p**29 assuming p is positive. p**(-8377/273) Simplify (q**(2/3))**(14/9)/(q**(1/5)/q)**42 assuming q is positive. q**(4676/135) Simplify (b*b/(b/(b*b**(5/3)*b)))/(b/b**(-1/18)*b)*(((b*b*b*b/b**8*b*b)/b)/b)**(-2/127) assuming b is positive. b**(6113/2286) Simplify (k**(-24))**(-16)/(((k**(-7)/k)/k*k*k)/(k*k**(-1/23))) assuming k is positive. k**(9015/23) Simplify (w**(-3/4)*w)**(-1/2)*(w**1*w)**(-27/4) assuming w is positive. w**(-109/8) Simplify (b/(((b*b*b*b*b**(-6)*b)/b)/b))/b**(-1/2)*b*(b**(-6/7)*b)/b*b*b**(3/2) assuming b is positive. b**(50/7) Simplify (d**(-2))**(2/5)*(d/d**(-2))**(-2/63) assuming d is positive. d**(-94/105) Simplify ((m*m**(-1/3)*m*m)**(1/4)/((((m**(-1/4)/m)/m)/m*m)/m)**(-9))**(-3/13) assuming m is positive. m**(343/52) Simplify (a/(a*a/a**3*a))**(-5/7)/(a**(-6)*a*a/(a/(a*a**(5/2)))) assuming a is positive. a**(11/14) Simplify ((z*z**(-3/28)*z)/z**(-2/33))/(z**23/(z*(((z/z**23)/z)/z)/z)) assuming z is positive. z**(-41623/924) Simplify (n*n*n/n**(-4))**(3/13)/((n*n*n**(-18)/n*n)/(n/n**(-1/9))) assuming n is positive. n**(2191/117) Simplify (l/(l*l**(11/2)))/l*l*l**0*(l**16/l)**(-21/8) assuming l is positive. l**(-359/8) Simplify (x**(-3)/x*x)**(-2)/(x/x**(-1/3)*x*x**(-3/8)) assuming x is positive. x**(97/24) Simplify (g*g**(-3)*g**(1/3)*(g**(-2/11)/g)/(g/(g**(1/13)*g)))**(2/9) assuming g is positive. g**(-2378/3861) Simplify (x**(4/3)/x*x*x)/x*x*x**(-12)/x*x**(4/5)*x**(-3/11) assuming x is positive. x**(-1673/165) Simplify (n*(n**11*n)/n)/(n/((n**(-1/5)/n)/n))*((n/((n/(n/(n*(n**(1/3)*n)/n))*n)/n*n))/n)**14 assuming n is positive. n**(-358/15) Simplify ((d/d**(4/11)*d)/(d*d**(-8)*d))/(d**0/d**(1/2)) assuming d is positive. d**(179/22) Simplify ((f/((f/(f*f**0*f*f*f))/f)*f)**47/(f/f**(1/3))**34)**(-2/31) assuming f is positive. f**(-1556/93) Simplify ((l/l**(-1))/l*l)/l**(-2/31)*(l/l**(15/4))/l*l*l/(l/l**(-9)) assuming l is positive. l**(-1201/124) Simplify (b/(b*b**(-4/13))*b)**(3/8)/(b**(1/56)*b*b*b/(b**(-4/17)*b)) assuming b is positive. b**(-2727/1547) Simplify (m**8*m/(m/(m*m*m**8)))/(m**1/m**(-2/11)) assuming m is positive. m**(185/11) Simplify ((m**(-13)/m**(-1/3))**(-5/2))**42 assuming m is positive. m**1330 Simplify t**(-16)/t*t**(-2/31)*t**(1/7)*t*t**(-12)*t assuming t is positive. t**(-5842/217) Simplify f/f**31*f/(((f/(f/(f*f**21)))/f)/f)*(f**(-3/7))**(16/5) assuming f is positive. f**(-1763/35) Simplify (m**(3/13)/(m*m*m*m**(-11/5)/m*m))/((m/m**4)/m**23) assuming m is positive. m**(1653/65) Si
{ "pile_set_name": "DM Mathematics" }
February 26 in LGBTQ History 1990: Refusing to consider the cases of Ben-Shalom v. Stone and Woodward v. U.S., the U.S. Supreme Court effectively upholds the right of the American military to discharge gays and lesbians of the armed forces.
{ "pile_set_name": "Pile-CC" }
ESPN wrote:West Ham want revenge against Aston Villa, says Darren FletcherDarren Fletcher insists West Brom are on a revenge mission ahead of a return to Aston Villa for the first time since their controversial FA Cup clash....
{ "pile_set_name": "Pile-CC" }
Los Angeles officials declared victory last week after the City Council approved an agreement with the Department of Water and Power workers’ union for a financial audit of two secretive trusts that have been sucking in tens of millions of dollars in ratepayer money. But those officials jumped the gun. This is not a triumph for the public’s right to know. It leaves the fight for transparency ongoing. The battle erupted more than a year ago when it was revealed that nobody could say — or would say — what became of $40 million that went toward the two entities, ostensibly devoted to employee training and safety, jointly run by DWP management and the International Brotherhood of Electrical Workers Local 18. Converging in this one issue was almost everything L.A. residents hate about the DWP: The mystery of it all. The suspicion that ratepayer cash was being wasted on a union slush fund. The thought of how all that money could instead be used to improve utility service and upgrade infrastructure. The obstinate union. Ineffectual city officials. Mayor Eric Garcetti, City Attorney Mike Feuer and City Controller Ron Galperin actually deserve credit for saying enough is enough and fighting union chief Brian D’Arcy in court while exerting political pressure, confident the public and justice were on their side. But when D’Arcy decided to compromise, the city settled for less than it should have. If this was the best deal it could negotiate, well, that doesn’t mean Angelenos should be satisfied. The deal calls for the Joint Training and Safety Institutes to open their books and undergo an audit led by Galperin. If all of the money turns out to have been spent properly, the city will make its nearly $4 million annual payment to the trusts, a payment Galperin has been withholding. But this is not the “unfettered” access the public was promised. Unfettered would mean an audit going back more than five years. Unfettered would mean city officials could copy and show the records to the press and public. The agreement allows for none of that. Instead, ratepayers, who were being told by the union, “Trust us,” now are being told by city officials, “Trust us.” This isn’t the only way the deal falls short, but it’s the most maddening. The mantra throughout this outrageous affair has been that ratepayers have the right to see how their money is spent. If city officials won’t guarantee that, then the public and the press must continue to fight for it. ABOUT THIS SERIES The Los Angeles News Group has undertaken a yearlong project to critique, demystify and help to fix the DWP. We have called on DWP customers to lend their voices to the project. Tell city officials, union leaders and judges what you want. Letters to the editor and other comments are welcome by email at opinion@langnews.com. If you missed earlier installments, go to dailynews.com/opinion.
{ "pile_set_name": "OpenWebText2" }
LORDSBURG, New Mexico — Lawmakers came to the border looking for answers for why a young girl died while in Border Patrol custody. But it isn’t the first time answers have been demanded of Customs and Border Protection in the death of an immigrant. Or the first time much went unanswered. The death of Jakelin Caal Maquin, who became violently ill with vomiting, fever and seizures on a Border Patrol bus before she was airlifted to a hospital after a 90-mile bus ride, follows the death of Claudia Patricia Gomez Gonzalez, 19, of Guatemala, who was shot by a Border Patrol agent. The shooting is still being investigated. Other cases of shootings, abuse, neglect and mistreatment have been documented in various reports over the years or were the subject of media coverage. Each time there are demands for more oversight, accountability and transparency from the agency. Groups that keep tabs say Border Patrol remains mired in outdated policing methods, while attempts at reform that began in the Obama administration have slowed and regressed. In El Paso Monday night, Rep.-elect Veronica Escobar thanked Washington Post reporters for revealing Jakelin’s death. Without their reporting, “Jakelin’s story may never have been made known to members of Congress or to the American people,” she said. When he testified before the Senate Judiciary Committee on Dec. 11, four days after Jakelin died, Customs Border Commissioner Kevin McAleenan did not mention the girl’s death, even though he’s required to do so within 24 hours under a law enacted this year. Rep. Joaquín Castro, D-Texas, called for McAleenan’s resignation on Tuesday for violating that law. He also asked when McAleenan’s boss, Homeland Security Secretary Kirstjen Nielsen learned of the girl’s death. With the pressure and criticism escalating, CBP on Wednesday issued an order to the agency to inform Congress and the media within 24 hours of a death of someone in its custody. Demanding accountability “We have seen Border Patrol and (Immigration and Customs Enforcement) and CBP grow significantly over the last 15 years. What we have not seen has been growth in accountability and transparency,” Escobar said. There have been attempts to reform the agency. Reps. Beto O’Rourke, D-Texas and Steve Pearce, R-N.M., reintroduced last June a bill titled the “Border Enforcement Accountability, Oversight and Community Engagement Act.” But it hasn’t advanced. Speaking to reporters after Jakelin’s death, O’Rourke pointed out there have been years of complaints about mistreatment by CBP officers and agents and reports of migrants’ deaths under questionable circumstances while under Border Patrol custody. Those complaints go “into a black hole,” O’Rourke said, according to an El Paso Times transcript of his comments. “As sensational as this story (of Jakelin’s death) is right now, this is something that has been happening for years, decades and many of us have been trying to address and correct it,” O’Rouke said. “I hope that, perhaps, now that everyone is looking at this, we get the progress and change that we need.” For years, groups have called for Border Patrol to use body cameras. This year, the American Civil Liberties Union released a report and 30,000 pages of federal records — obtained through an open government request — documenting complaints of abuse and mistreatment, including rape and assault of unaccompanied children by agents. In 2014, the Los Angeles Times obtained and made public details of a report by the Police Executive Research Forum regarding the Border Patrol's use of force. The agency had tried to keep the report secret, refusing even to give a full copy to House and Senate committees. “We need an entirely new sophisticated law enforcement approach to the border,” said Josiah Heyman, director of the Center for InterAmerican and Border Studies at The University of Texas at El Paso (UTEP). Shift in migrations is 'no surprise' McAleenan has said that the numbers of migrants arriving on the border near Lordsburg, in a remote stretch of the southwest desert, is a “brand new phenomenon.” In just three days, 496 people turned themselves in at Antelope Wells port of entry, McAleenan said. When he testified before the Senate Judiciary Committee on Dec. 11, McAleenan told the senators that CBP's facilities were built to handle “mostly male, single adults in custody, not families or children.” “I want to make sure that we have the capability to care for children in our custody with the right medical and mental health professionals and that we have the partnership with Health and Human Services to expeditiously transfer children to a more appropriate custody situation," he said. But the shift in migrations shouldn’t be a surprise, said Heyman. The Obama administration started seeing the changes when the arrivals of unaccompanied children and families spiked in 2014, and UTEP analysts told agency officials this was happening. "Border Patrol is the most traditionalistic organization imaginable, entirely focused on arresting adult Mexican men,” said Heyman. The immediate humanitarian crisis As parts of the border have been fortified with fencing and other barriers over the years, migrants and smugglers have sought other entry points, moving to more treacherous parts of the nearly 2,000-mile United States-Mexico boundary. Enrique Morones, the executive director of the humanitarian group Border Angels, said the group of about 30 to 35 volunteers who distribute the water every third Saturday has grown to about 500. The group now holds a hike every fourth Saturday to set out water. Migrants, part of a caravan travelling to the U.S., make a human chain to pull people from the river between Guatemala to Mexico in Ciudad Hidalgo and continuing to walk in Mexico, October 29, 2018. LEAH MILLIS / Reuters Jakeline's death has led to questions about the medical assistance Border Patrol has on hand for migrants and their training levels. Since 1998, Border Patrol has had search and rescue tactical teams, known as BORSTAR, created as injuries to agents and migrants deaths increased. Some of its team members have tactical medical training. A Border Patrol rescue often will be detailed by the agency in public news releases. The Border Patrol said that in the 2018 fiscal year, which ran from Oct. 1, 2017 to Sept. 30, 2018, it rescued 4,307 migrants in danger, some in life-threatening situations. There are 274 BORSTAR agents deployed throughout the southwest, the agency said. The agents relied on Hidalgo County Emergency Medical Services to airlift the girl to an El Paso, Texas hospital. There are no medical personnel permanently assigned to Antelope Wells or Bounds Forward Operating Base and no EMT personnel were on duty when Jakelin and her father were taken into custody. CBP said 1,300 Border Patrol agents have been trained as EMTs (Emergency Medical Technicians). Jakelin's death drew a rebuke from the American Academy of Pediatrics , who said Jakelin's death was preventable. Someone trained in pediatrics could have taken her vitals and looked for signs of dehydration and the potential for septic shock and provided treatment or medical intervention sooner. Drs. Scott Allen and Pamela McPherson mention our letter in today's @washingtonpost: "As physicians, we have a duty to speak out against policies & practices that threaten the health & safety of children & their families." Detention is one such policy. https://t.co/XjDN5rNmn7 — Amer Acad Pediatrics (@AmerAcadPeds) December 19, 2018 “Until we have pediatric-trained personnel who have access to these facilities and these children, we’re just waiting until the next death happens,” said Dr. Colleen Kraft, the Academy's president. The American Academy of Pediatrics wrote a letter to McAleenan and the Trump administration calling for an investigation. Migrants receive food at a camp containing hundreds of migrants who arrived at the U.S. border from Central America in a caravan with the intention of applying for asylum in the U.S., in Tijuana, Mexico December 12, 2018. LEAH MILLIS / Reuters “Many of our organizations have sought to provide expert advice to the federal government, including your agency, about how to best care for and treat immigrant children and pregnant women in your custody. That offer still stands," the letter said. Legislation that would require CBP to hire child welfare professionals at ports of entry and border stations would help children as well as border agents, advocates said. “It helps CBP as much as it helps the kids," said Jennifer Podkul, senior director for policy and advocacy at Kids In Need of Defense. "You're allowing CBP officers to do the law enforcement they were trained to do and ensuring that kids are being treated appropriately and their immediate medical needs are addressed while they are in the short term holding.” A flexible medical response Speaking of Jakelin's death, Texas Republican Rep. Will Hurd said recently the Inspector General is reviewing the case to see what happened and if there was negligence, "but also reviewing whether CBP has the resources they need in order to handle a situation like this — I think this example leads us to believe that they don't have those resources.” Rep. Raul Ruiz, an emergency care physician with experience in humanitarian disaster response, said he was troubled by the lack of medical equipment and knowledge at the Antelope Wells port of entry and the Forward Operating Base — even for taking vital signs and doing a routine physical exam — as well as the overcrowded conditions in the Lordsburg Border Patrol station. In Lordsburg, "they were on the concrete floor with those paper thin aluminum-foil type blankets, so packed that you couldn’t even see any floor space," Ruiz said. "And these were women with young children, a lot under 5, toddler ages. When I looked around some looked sick, [or] had a cold. It looked like they hadn't bathed in days." Ruiz said he has cared for people in very difficult and improvised conditions as a disaster response physician, including in post-earthquake Haiti, "and I haven't seen anything like this." He said CBP needs to "find flexibility within their staffing on the border" and immediately send personnel with medical training to areas where they encounter large groups of families. CBP facilities need to be equipped with medical equipment for exams and emergency resuscitation. Ruiz said his office had been told the CBP commissioner is making sure the facilities have appropriate medical bags. Rep. Cicilline: You do not know how many people have died in DHS custody? DHS Sec. Nielsen: "I don't have an exact figure" ... Cicilline: "I'm talking about people who have died in your custody. You don't have the number?" Nielsen: "I will get back to you with the number." pic.twitter.com/SxEmRe4CM2 — NBC News (@NBCNews) December 20, 2018 One suggestion, said Ruiz, is to tap medically trained personnel from Health and Human Services, FEMA and and the Disaster Medical Assistance Team; people in those agencies are trained to be quickly mobilized to disaster areas. They could be called on to set up a tent clinic or hospital in areas where migrants have shown up in large numbers, he said. "Resources exist if they can mobilize and spread them out and be flexible when they have a massive change in migration patterns," Ruiz said. Communications equipment needs to be upgraded in remote areas; Ruiz said the agents in Antelope Wells did not have the infrastructure to connect them with the local 911 system. While they can communicate with one another by radio, they have to use cell phones to call 911. "During long periods of the ride on that road from Antelope Wells to Lordsburg, there was no cell phone coverage," Ruiz said. According to CBP, the agency is looking at increasing the number of medical personnel at its facilities and has already increased resources to the El Paso sector, which includes El Paso and Hudspeth counties and all of New Mexico. "CBP agents do a good job making sure guns, drugs and criminals don’t come over and don’t cross our borders. It's necessary they do that," said Ruiz. "However, we are experiencing a humanitarian crisis, people are crossing the border seeking asylum. Once they are in custody of CBP, they are under the responsibility of CBP for their health and welfare." FOLLOW NBC LATINO ON FACEBOOK, TWITTER AND INSTAGRAM.
{ "pile_set_name": "OpenWebText2" }
Q: Proving Plancherel's theorem using Cauchy integral formula Plancherel's theorem says that $f(x) = \frac{1}{2\pi} \int^\infty_{-\infty} F(k) e^{ikx} dk$ where $F(k) = \int^\infty_{-\infty} f(x)e^{-ikx}dx$. I'm wondering if we can prove this using Cauchy's integral formula somehow like this. $f(x) = \frac{1}{2\pi} \int^\infty_{-\infty} \int^\infty_{-\infty} f(x')e^{-ikx'} dx' e^{ikx} dk$ $= \frac{1}{2\pi} \int^\infty_{-\infty} \int^\infty_{-\infty} e^{ik(x-x')} dk f(x') dx'$ $= \lim_{k_0\rightarrow\infty} \frac{1}{2\pi} \int^\infty_{-\infty} \frac{1}{i(x-x')} (e^{ik_0(x-x')}-e^{-ik_0(x-x')}) f(x') dx'$ $= \lim_{k_0\rightarrow\infty} -f(x)+f(x)$ $=0$ where I used Cauchy's integral formula in the next to last equality. I did contour integral over a upper half-circle and assumed f(x) goes to 0 at large x. However I got 0 instead of $f(x)$ at the last equality. I believe there are some problems in my understanding of complex analysis, so please let me know them! A: Observe that $$\begin{align} \frac{1}{2\pi} \int\limits^\infty_{-\infty} \int\limits^\infty_{-\infty} \textstyle f\left(x'\right)\,\exp\left({-\text{i}kx'}\right)\, \text{d}x'\, \exp({\text{i}kx})\, \text{d}k &=\lim_{k_0\rightarrow\infty}\, \frac{1}{2\pi}\, \int\limits^{+\infty}_{-\infty} \textstyle\frac{\exp\big({+\text{i}k_0\left(x-x'\right)}\big)-\exp\big({-\text{i}k_0\left(x-x'\right)}\big)}{\text{i}(x-x')} \,f\left(x'\right)\, \text{d}x' \\ &=\lim_{k_0\rightarrow\infty}\,\frac{1}{2\pi\text{i}}\,\int\limits^{+\infty}_{-\infty}\textstyle \,\frac{\exp\big({\text{i}k_0\left(x'-x\right)}\big)}{x'-x} \,\big(f\left(x'\right)+f\left(2x-x'\right)\big) \,\text{d}x'\,. \end{align}$$ Furthermore, your contour goes about the pole at $x$ half a turn. Hence, we have that $$\lim_{k_0\rightarrow\infty}\,\frac{1}{2\pi\text{i}}\,\int\limits^{+\infty}_{-\infty} \,\frac{\exp\big({\text{i}k_0\left(x'-x\right)}\big)\big)}{x'-x}\, \big(f\left(x'\right)+f\left(2x-x'\right)\big)\, \text{d}x'=\frac{1}{2}\big(f(x)+f(x)\big)=f(x)\,.$$
{ "pile_set_name": "StackExchange" }
The Interrobang, Symbol of WTF Culture - JamesLowell http://www.theatlantic.com/science/archive/2010/07/the-interrobang-symbol-of-wtf-culture/60546/ ====== wglb Most judiciously used in discussing <http://cuiltheory.wikidot.com/what-is- cuil-theory>
{ "pile_set_name": "HackerNews" }
High school football is a big deal in Texas, and many new schools are splashing millions on new stadiums. But could that money be better spent elsewhere? On the northern edge of the sprawling Dallas-Fort Worth metroplex, the bright lights of a beloved Texas Friday night tradition burn as bright as they’ve always done. In the town of Celina, high school football games remain an intimate experience, almost as if plucked from the pages of Friday Night Lights, Buzz Bissinger’s book that spawned famous film and TV adaptations. Mediocrity on turf: the NFL is stumbling, but will it recover? Read more “When you enter the current Bobcat field, you’re right there on the field,” says Rudy Weems. Like many born and raised in Celina, Weems relates the Celina high school football heritage:a jointly held record of eight state championships – incredible for a town of its small size. The 50-year-old father of three played for the Celina Bobcats in the early 1980s. In adulthood, he volunteered as a coach. His two sons, aged 28 and 19, followed him into the program. Here, football knits the community together. But Weems is also aware of Celina’s ballooning population. Currently figured to be around 11,000, it’s expected to reach 100,000 within 10 years, according to one projection. That’s up from just 6,000 in 2010. “The growth is coming to Celina, we know that,” says Weems. “However, it’s still a small-town feel. People are moving from the south – Frisco, Plano, McKinney, Allen. We’re still moving that way, but once you enter the town, you still get the feel of a small town. We know it’s growing, and along with it comes a lot of politics and a lot of changes.” In the middle of the change from small town to booming Dallas suburb is football. Celina could end up with more than one high school and therefore more than one football team, a division of the local talent pool that would vex some. But a more immediate question is over the future need for a new stadium to house the existing team and its swelling fanbase. The current 3,800-capacity Bobcat Stadium, regularly packed, might soon be unable to cope with demand. These are interesting times for high school football stadiums in Texas. Nearby McKinney recently approved the construction of a new $70m, 12,000-seat stadium to be shared by the city’s three high schools. That followed hard on the heels of a $60m, 18,000-capacity venue for neighboring Allen – which has one high school – completed in 2012. Local media have called the sprouting of expensive stadiums among rival school districts in affluent suburbs an arms race. The adjacent Frisco, meanwhile, entered a partnership with the Dallas Cowboys for its schools to play in the NFL team’s new indoor practice facility built in the city. The Frisco independent school district is chipping in $30m so area kids can run out at The Ford Center at The Star, capacity 12,000. Critics argue the money could be better spent elsewhere in the education system. The defenders say the cash isn’t taken away from pots protected for schooling. “Yes, there is this concept that ‘we want the best for our students,’” says Lee Ancona, a University of North Texas lecturer in health promotion and recreation, who spent more than 30 years coaching high school football in Texas. “People pay more taxes and are willing to support these stadiums and facilities that from the outside looking in look terribly grandiose or overdone to some degree. But I haven’t heard any apologies. People aren’t apologizing for having good facilities for their students, and obviously especially for athletes.” In the 2015-16 school year, school districts budgeted 2.75% of their funds for extracurricular activities, according to the Texas education agency. “Academics always have a much, much greater share of the budget than do sports,” a spokesperson told the Guardian. Perched on the precipice is Celina. It lies somewhere at the intersection between small rural town and DFW’s fast approaching conurbation, explains Bill Elliott, the Bobcats head coach and the Celina school district’s athletic director. A new stadium is a definite part of their future but just what shape it takes is another matter. Elliott doesn’t grudge Allen and McKinney their new stadiums: he sees them as a boon for their communities – and revenue generators. Kids from smaller towns like his look forward to the opportunity to play in them. Elliott says the impact of these pricey arenas leads to scaled-down improvements further down the food chain. “I’ve seen it both ways. When I came here we had a grass field, a rock parking lot. Now we’ve got a nice paved one and we’ve got a turf field. We were one of the first small schools in the area to get a turf field. And now you see in the smaller schools we play, they’ve all got turf fields now. It’s just more cost-effective. It flows down. I think it’s the same thing with stadiums. As these communities, these outlying communities, grow, that same thing is going to flow down to them.” Across the state, new stadiums are sprouting. And it’s not confined to the affluent suburbs of major cities like Dallas and Houston. Take the recently opened new stadium in Whitney, a rural town between Fort Worth and Waco. The local school district produced a new 3,000-seat, $6.4m venue. Wildcat Stadium serves Whitney High, classed as a 3A school in the classification system governing Texas high school sports. (McKinney, Allen and Frisco operate at the 6A level; Celina at 4A. The system – ranging from 1A up to 6A – is based on school enrollment numbers, with 3A schools bearing between 229 and 479 students.) Among other amenities, the new site features a video board and a media room replete with a 100-inch projection screen and 55-inch monitors. Since 1996, some 60 bonds have been issued by ISDs in Texas school districts, with at least the partial purpose of building a new stadium or renovating existing athletic facilities. The funding of public education in Texas is controversial, with local property tax revenues a major contributor of the money. A so-called Robin Hood law stipulates that property-wealthy districts share their property tax wealth with districts considered property poor. However, in most cases new stadiums are funded by bonds approved at the ballot box by voters living within the relevant school district. And as tax money used to repay these bonds is exempt from wealth equalization, school districts are free to use this local money for the construction of new facilities at the discretion of local voters. Robin Hood does not apply. That can have interesting consequences. In 2012, Carthage, a small town in east Texas, added a 1,200 sq ft, $750,000 video scoreboard to its then four-year-old stadium. The purchase was hailed as a way of keeping locally raised money within the district from which it was drawn. Some point to Dallas-Fort Worth suburb of Southlake as the progenitor of the surge in high school mega-stadiums with eye-watering price tags. In 2001, the city spent $15.3m on Dragon Stadium. Bob McSpadden, an expert on the more than 1,200 high school stadiums in Texas, says the famous Ratliff Stadium in Odessa, of Friday Night Lights fame, was causing a stir in the 1980s. “That stadium was outrageous at $5.6m in 1982,” he explains. Not all bond packages that include stadiums pass muster for local voters. McSpadden, who grew up in Odessa, points to a new mega-stadium currently under construction in his current home of Katy, a suburb of Houston, as evidence. “A lot of these stadiums do not pass the vote. The one here in Katy failed once. Ratliff Stadium back in the 80s failed three times before it was passed. But it wasn’t over the money; it was over the location.” The 12,000-seat Katy stadium finally passed at the end of 2014, a year after being rejected at the ballot box. Like many of these bonds, it was part of a greater $748m package that also included allotments for the construction of new schools. The stadium portion: $58m, a figure that later rose to $62.5m. Other high school stadiums with big price tags get less attention. Channelview, another Houston suburb, got a new 8,000-seat venue costing $27m in 2012. Clear Creek, also in the Houston area, saw a $42m, 10,000 arena approved in 2013. Sometimes there are standalone outlays for flashy accessories that draw some scrutiny. The board of Waxahachie school district recently approved the purchase of a $500,000 digital scoreboard for its Lumpkins Stadium. Nevertheless, there was a word of caution from the school superintendent, who identified the scoreboard as a luxury item, reminding members the “district is not a rich district.” Some argue the stadiums provide lucrative revenues streams – scoreboards, for example, could be attractive to advertisers. Particularly in the south, the popularity of high school football is immense. Texas might be considered the epicenter. “It’s kind of a mirror image of college in a way,” says Mark Conrad, an expert in sports business at Fordham University. “Where the colleges have gone to 30 years ago, you’re beginning to see power conferences or power schools in high school.” Others can’t afford to focus too much on athletics. The troubled Dallas school district and its string of inner-city schools is one. There, says the school district’s athletic director Gil Garza, they are preoccupied with improving education attainment levels. “We have nine stadiums, one that I would say is a mini-monster like the others,” he explains. “Kincaide Stadium, which seats about 12,000. It’s nice, but it’s not anywhere near what you see in Allen, Frisco or McKinney or even some of the other districts. Having said that, there’s eight more that are not. The overlying thought in our process is to try to make them as nice and modern as we can. Because kids look at those facilities. They see what other communities have and say: ‘Well, why can’t we have that?’” The answer, says Garza, comes down to his school district’s sheer size, large portfolio of facilities and its focus on academics. “Because sometimes we come to school and our kids are behind,” he adds. “A lot of people in our communities would rather see that than see $25m, $40m stadiums.” Back in Celina, head coach Elliott contemplates the creeping growth around town with a wary eye. Bobcat Stadium, which dates to the 1930s, got a remodel in 2004 when capacity was doubled to 3,800 and the turf field was put in. But the prospect of the growth putting the intimate Friday night experience of yore on borrowed time lingers. “One of my big goals is to maintain the culture and tradition that Celina has,” says Elliott. “Because Celina is one of the last few places around the metroplex that really is a true Friday Night Lights-type feeling. The whole town shuts down. The stadium is packed out and people are standing around the edges several people deep. It’s a special place to play football and I’d hate to lose that some day. Whenever we do build a new stadium that’s something I want to build into it – that same feeling we have here at Bobcat field.”
{ "pile_set_name": "OpenWebText2" }
176 page of collection of Katsuhiro Otomo works will be released in February Katsuhiro Otomo, creator of Akira, and director of Steam Boy and the live-action Mushisi has a rich history of design work, promoting his own projects as well as other commercial and artistic endeavors. A new POSTERS : OTOMO KATSUHIRO × GRAPHIC DESIGN art book collection this material will be released by Pie International on February 28th.
{ "pile_set_name": "Pile-CC" }
news MLB News Mets option Rice, activate Germen from DL By Anthony DiComoMLB.com NEW YORK -- Scott Rice, the former 31-year-old rookie reliever who was one of the feel-good stories of the 2013 Mets, is no longer a big leaguer. The Mets optioned Rice to Triple-A Las Vegas late Tuesday night, activating right-hander Gonzalez Germen from the disabled list. Even with Rice gone, the Mets still have two lefties in their bullpen in Josh Edgin and Dana Eveland. NEW YORK -- Scott Rice, the former 31-year-old rookie reliever who was one of the feel-good stories of the 2013 Mets, is no longer a big leaguer. The Mets optioned Rice to Triple-A Las Vegas late Tuesday night, activating right-hander Gonzalez Germen from the disabled list. Even with Rice gone, the Mets still have two lefties in their bullpen in Josh Edgin and Dana Eveland. Rice, now 32, has struggled since the outset of this season, posting a 5.93 ERA in 32 appearances -- the vast majority of them less than an inning in length. Left-handed batters were reaching base against him at a .392 clip, largely because of the eight walks they drew off him in 52 plate appearances. Rice had allowed at least one run in three of his last eight appearances, increasing his ERA from 5.06 to 5.93. Germen, 26, went on the disabled list May 6 with a virus, which ultimately resulted in an abscess and an infection. He posted a 3.57 ERA in 13 outings prior to that, proving far more effective against right-handed batters (.584 OPS) than lefties (.960), and is coming off six consecutive scoreless outings in a Minor League rehab assignment. Germen adds another jolt of youth to a bullpen that the Mets have completely revamped over the past month, calling up youngsters Edgin and Vic Black from the Minors while converting Jenrry Mejia back to relief. The team also recently added Eveland, a 30-year-old veteran who has allowed one run in three innings.
{ "pile_set_name": "Pile-CC" }
The Arduino Uno Rev3 is a microcontroller board based on the ATmega328 (datasheet). It has 14 digital input/output pins (of which 6 can be used as PWM outputs), 6 analog inputs, a 16 MHz crystal oscillator, a USB connection, a power jack, an ICSP header, and a reset button. It contains everything needed to support the microcontroller; simply connect it to a computer with a USB cable or power it with a AC-to-DC adapter or battery to get started. The Uno differs from all preceding boards in that it does not use the FTDI USB-to-serial driver chip. Instead, it features the Atmega8U2 programmed as a USB-to-serial converter."Uno" means one in Italian and is named to mark the upcoming release of Arduino 1.0. The Uno and version 1.0 will be the reference versions of Arduno, moving forward. The Uno is the latest in a series of USB Arduino boards, and the reference model for the Arduino platform. Specifications : - Microcontroller ATmega328 - Operating voltage 5V - nput voltage (recommended) 7-12V - Input voltage (limits) 6-20V - Digital I/O pins 14 (of which 6 provide PWM output) - Analog input pins 6 - DC current per I/O Pin 40 mA - DC current for 3.3V Pin 50 mA - Flash memory 32 KB of which 0.5 KB used by bootloader - SRAM 2 KB - EEPROM 1 KB - Clock speed 16 MHz Documents Please visit our wiki page for more info about this product. It will be appreciated if you can help us improve the documents, add more demo code or tutorials. For technical support, please post your questions to our forum.
{ "pile_set_name": "Pile-CC" }
For weeks now, it wasn't uncommon to come into the office to see a small group of colleagues around the map table, poring over ideas for our 2017 submarine cable map. Markus Krisetya was always among the huddle—often flanked by Lead Cartographer and Designer Larry Lairson and Vice President of Research Tim Stronge—with a magnifying glass in hand, double checking that submarine cables were labeled, features were legible, and every little detail was just right. As we release our 2017 map, Markus was kind enough to sit down with me and talk about the process of mapping the submarine cables that connect the world—and turning it into art.
{ "pile_set_name": "Pile-CC" }
Since joining council last fall, Joe Magliocca has often said he wants to find savings and “trim the fat” at City Hall. He has also billed taxpayers $350 for espresso-making equipment and expensed several meals at upscale restaurants, including one lunch that was more expensive than his new office Nespresso machine. At Kensington’s Osteria de Medici, Magliocca laid down his corporate MasterCard in January for a $398 chef’s special off-the-menu lunch shared by five people, including himself. The table was never shown prices for the antipasti, angel hair pasta, veal parmigiana and more. It’s by far the priciest meal that any of Calgary’s 14 city councillors expensed in the first half of 2014, according to expense disclosures. The Herald’s questions around this bill have the first-term councillor saying he’ll think twice next time, and has startled some colleagues. “Was I there, on the $398 bill? Phew. Thank God for that,” said Coun. Andre Chabot, when told he had not been in attendance. Chabot has his own $100 meal he regrets expensing and may pay back. Fellow first-termer Coun. Sean Chu led all councillors by expensing 62 hospitality outings in the year’s first half, many of them coffee meetings for as little as $3. His most expensive meal was a $157 dinner at Golden Inn restaurant, with Magliocca and Maurizio Terrigno, an owner of Osteria de Medici. Chu recalls the trio discussed Terrigno’s plans to redevelop the Kensington eatery site into a taller mixed-use project — something that goes to council for approval in coming months. Chu, who also prides himself on being fiscally conservative, said residents likely won’t mind a $50-per-person restaurant expense. “Any place you go to, $157 for three people isn’t that expensive, really,” he said. The April bill included a $28 bottle of red Australian wine and a filet mignon. Chu expensed another meal with Terrigno and Magliocca this year for $68, at the same Chinatown eatery. Chabot twice treated his two council aides to lunch this year — in January for $101, and in spring for $151. He may reimburse the public for the first one, once he gets clarity on campaign finance laws for this term. “I’m surprised I put that through my ward account because that was more or less a thank-you for the work they did on the campaign and for having stuck with me in this term,” Chabot said. His top bill was a $181 dinner at Villa Firenze with colleagues Ward Sutherland and Magliocca. “There was one thing on the menu that Joe really liked, and he gave Ward Sutherland a little piece of it so Ward ordered one himself,” Chabot said. “It was portobello mushroom with something, and I don’t think it was cheap. We were talking work, believe it or not.” At the Magliocca meal that cost almost $400 last January, Airdrie Mayor Peter Brown was one of the guests. “I can tell you the food was awesome. But I can tell you we don’t talk about the price,” recalled Brown, who sat at the table with Magliocca, an executive from suburban builder Shane Homes, another guest whose name the city councillor said he can’t recall and, for part of the afternoon, the restaurant owner’s son. But when Brown learned later about the price, he offered $100 to cover his share.
{ "pile_set_name": "OpenWebText2" }
Is the city of Columbus, Ohio playing dirty tricks on Donald Trump? Less than 24 hours ago, Columbus Mayor Andrew Ginther campaigned with Hillary Clinton during a visit to the city. He even got a shout out from the candidate herself, with Clinton telling the crowd she was happy to be in his capital city, according to her speech posted on YouTube (17:35). Ginther posted this photo on his Facebook page, clearly pleased to be aiding Clinton: “Are you ready to build a future that includes everyone in America?” Ginther said, warming up the crowd, according to the Post-Gazette. “We are so honored to have such a great outpouring of support for Secretary Clinton in the most important city in the most important state in America. I need a partner in the White House that can deliver.” Today, Ginther seemingly delivered for Clinton. The city of Columbus restricted the capacity of Donald Trump’s crowd, leaving a lot of people unable to get inside. “Hey, maybe they’re a Hillary person,” Trump speculated about city leaders — quite accurately — according to Politico. “Could that be possible? Probably. I don’t think there are too many of them.” The Columbus Convention Center only allowed 1,000 people inside, despite the cavernous space. “So have 1,000 people in there. They won’t allow any more,” Trump said. “The fire marshal said he’s not allowed to allow any more even though the building holds many thousands of people. So I just wanted to tell you that. That’s politics at its lowest. You ought to check it out, but it’s really politics at its lowest.” The fire marshal blamed construction for blocking exits as the reason for the restricted crowd size. But the mayor? He was probably out campaigning for Hillary again.
{ "pile_set_name": "OpenWebText2" }
Communication blackout is forcing young entrepreneurs out of Kashmir - amrrs https://www.thehindu.com/news/national/in-a-land-without-internet-how-the-communication-blackout-is-forcing-young-entrepreneurs-out-of-kashmir-valley/article30219792.ece ====== amrrs For some context on Internet Shutdown: [https://news.ycombinator.com/item?id=20701204](https://news.ycombinator.com/item?id=20701204)
{ "pile_set_name": "HackerNews" }
Assessment and 2-year follow-up of some factors associated with severity of respiratory infections in early childhood. To assess the effect of some factors on the severity of acute respiratory infection (ARI) in children. In a case control study, children with pneumonia were matched with controls who had upper respiratory infection. They were compared in respect of nutrition, household crowding and smoke pollution, and the presence of current viral respiratory infection. Both cohorts were followed up for 18-24 months to determine if there was a difference in subsequent respiratory sequelae. Primary health care-based cohorts of peri-urban township children. Forty-eight children < 3 years of age with pneumonia (index cases) were matched by age and presentation time with controls who suffered only from upper respiratory infection. All came from underprivileged communities. Index cases were selected as they presented and the study was conducted between February 1988 and June 1991. Any difference between index cases and controls in respect of the four factors listed under 'Design'. Follow-up home visits determined whether subsequent sequelae of the two grades of ARI were different. The presence of current viral infection at entry to the study was evident in 21 of those with pneumonia and 12 controls (difference between groups = 19.15%, 95% confidence intervals 0.25 - 38.05, P = 0.052). Overcrowding in the home was comparable. Index homes were occupied by a mean of 3.57 (SD 1.54) children and 5.26 (SD 4.84) adults, control homes by 3.51 (SD 1.80) children and 4.36 (SD 2.02) adults. Occupancy of the room in which the child slept was also not significantly different: index group mean 4.23 (SD 1.55) and controls 4.02 (SD 1.38) (mean difference 0.21, 95% Cl 0.378 - 0.798, P = 0.485). Correlation of bedroom crowding with young age (< 1 year) or weight-for-age centiles was not significant in either cohort (r < 0.3 in all). The prevalence of viral infection was not increased by degree of crowding in either group (P = 0.636). Domestic smoke pollution was similar: cigarette smoking occurred in 75% of index homes and 69% of control homes. Wood or coal fires were used in 19% of index and 14% of control homes. The nutritional status of both groups proved to be similar. Fifteen per cent of index children and 12% of controls had weight-for-age centiles < or = 10th centile (difference = 3.26%, 95% Cl -10.72 - 17.24, P = 0.649). Two-year home follow-up visits were completed in 75% of the index and 69% of the control group. The balance were followed up for 18 months. There was no difference between index and control children in the recurrence of respiratory symptoms (P = 0.664) or need to visit a health facility (P = 0.302). Factors shown elsewhere to contribute to the acquisition or severity of ARI could not be demonstrated as important in this study. The children with pneumonia and their matched controls with upper respiratory infections came from equally overcrowded and smoke-filled homes, had comparable nutritional status which was not markedly poor, and had an equal incidence of current viral infection. Subsequent ill-health was not found to be greater in the pneumonia group.
{ "pile_set_name": "PubMed Abstracts" }
Appellant did not attempt to demonstrate good cause to excuse his delay. We therefore conclude that the district court did not err in denying his petition as procedurally time barred, and we ORDER the judgment of the district court AFFIRMED. 2 J. Hardesty Douglas tott% , it a) Cherry 2 We have reviewed all documents that appellant has submitted in proper person to the clerk of this court in this matter, and we conclude that no relief based upon those submissions is warranted. To the extent that appellant has attempted to present claims or facts in those submissions which were not previously presented in the proceedings below, we have declined to consider them in the first instance. The district court did not abuse its discretion in denying appellant's request for the appointment of post-conviction counsel. See NRS 34.750. SUPREME COURT OF NEVADA 2 (0) I94Th cc: Hon. David B. Barker, District Judge Phillip Smith Attorney General/Carson City Clark County District Attorney Eighth District Court Clerk SUPREME COURT OF NEVADA 3 (0) 1947A e
{ "pile_set_name": "FreeLaw" }
Awapuni Awapuni is the name of three distinct places in New Zealand: Awapuni, Gisborne is a suburb of Gisborne city Awapuni, Manawatu-Wanganui is a suburb of Palmerston North city Awapuni, Wellington is a suburb of Lower Hutt city
{ "pile_set_name": "Wikipedia (en)" }
/* * jccoefct.c * * Copyright (C) 1994-1997, Thomas G. Lane. * This file is part of the Independent JPEG Group's software. * For conditions of distribution and use, see the accompanying README file. * * This file contains the coefficient buffer controller for compression. * This controller is the top level of the JPEG compressor proper. * The coefficient buffer lies between forward-DCT and entropy encoding steps. */ #define JPEG_INTERNALS #include "jinclude.h" #include "jpeglib.h" /* We use a full-image coefficient buffer when doing Huffman optimization, * and also for writing multiple-scan JPEG files. In all cases, the DCT * step is run during the first pass, and subsequent passes need only read * the buffered coefficients. */ #ifdef ENTROPY_OPT_SUPPORTED #define FULL_COEF_BUFFER_SUPPORTED #else #ifdef C_MULTISCAN_FILES_SUPPORTED #define FULL_COEF_BUFFER_SUPPORTED #endif #endif /* Private buffer controller object */ typedef struct { struct jpeg_c_coef_controller pub; /* public fields */ JDIMENSION iMCU_row_num; /* iMCU row # within image */ JDIMENSION mcu_ctr; /* counts MCUs processed in current row */ int MCU_vert_offset; /* counts MCU rows within iMCU row */ int MCU_rows_per_iMCU_row; /* number of such rows needed */ /* For single-pass compression, it's sufficient to buffer just one MCU * (although this may prove a bit slow in practice). We allocate a * workspace of C_MAX_BLOCKS_IN_MCU coefficient blocks, and reuse it for each * MCU constructed and sent. (On 80x86, the workspace is FAR even though * it's not really very big; this is to keep the module interfaces unchanged * when a large coefficient buffer is necessary.) * In multi-pass modes, this array points to the current MCU's blocks * within the virtual arrays. */ JBLOCKROW MCU_buffer[C_MAX_BLOCKS_IN_MCU]; /* In multi-pass modes, we need a virtual block array for each component. */ jvirt_barray_ptr whole_image[MAX_COMPONENTS]; } my_coef_controller; typedef my_coef_controller * my_coef_ptr; /* Forward declarations */ METHODDEF(boolean) compress_data JPP((j_compress_ptr cinfo, JSAMPIMAGE input_buf)); #ifdef FULL_COEF_BUFFER_SUPPORTED METHODDEF(boolean) compress_first_pass JPP((j_compress_ptr cinfo, JSAMPIMAGE input_buf)); METHODDEF(boolean) compress_output JPP((j_compress_ptr cinfo, JSAMPIMAGE input_buf)); #endif LOCAL(void) start_iMCU_row (j_compress_ptr cinfo) /* Reset within-iMCU-row counters for a new row */ { my_coef_ptr coef = (my_coef_ptr) cinfo->coef; /* In an interleaved scan, an MCU row is the same as an iMCU row. * In a noninterleaved scan, an iMCU row has v_samp_factor MCU rows. * But at the bottom of the image, process only what's left. */ if (cinfo->comps_in_scan > 1) { coef->MCU_rows_per_iMCU_row = 1; } else { if (coef->iMCU_row_num < (cinfo->total_iMCU_rows-1)) coef->MCU_rows_per_iMCU_row = cinfo->cur_comp_info[0]->v_samp_factor; else coef->MCU_rows_per_iMCU_row = cinfo->cur_comp_info[0]->last_row_height; } coef->mcu_ctr = 0; coef->MCU_vert_offset = 0; } /* * Initialize for a processing pass. */ METHODDEF(void) start_pass_coef (j_compress_ptr cinfo, J_BUF_MODE pass_mode) { my_coef_ptr coef = (my_coef_ptr) cinfo->coef; coef->iMCU_row_num = 0; start_iMCU_row(cinfo); switch (pass_mode) { case JBUF_PASS_THRU: if (coef->whole_image[0] != NULL) ERREXIT(cinfo, JERR_BAD_BUFFER_MODE); coef->pub.compress_data = compress_data; break; #ifdef FULL_COEF_BUFFER_SUPPORTED case JBUF_SAVE_AND_PASS: if (coef->whole_image[0] == NULL) ERREXIT(cinfo, JERR_BAD_BUFFER_MODE); coef->pub.compress_data = compress_first_pass; break; case JBUF_CRANK_DEST: if (coef->whole_image[0] == NULL) ERREXIT(cinfo, JERR_BAD_BUFFER_MODE); coef->pub.compress_data = compress_output; break; #endif default: ERREXIT(cinfo, JERR_BAD_BUFFER_MODE); break; } } /* * Process some data in the single-pass case. * We process the equivalent of one fully interleaved MCU row ("iMCU" row) * per call, ie, v_samp_factor block rows for each component in the image. * Returns TRUE if the iMCU row is completed, FALSE if suspended. * * NB: input_buf contains a plane for each component in image, * which we index according to the component's SOF position. */ METHODDEF(boolean) compress_data (j_compress_ptr cinfo, JSAMPIMAGE input_buf) { my_coef_ptr coef = (my_coef_ptr) cinfo->coef; JDIMENSION MCU_col_num; /* index of current MCU within row */ JDIMENSION last_MCU_col = cinfo->MCUs_per_row - 1; JDIMENSION last_iMCU_row = cinfo->total_iMCU_rows - 1; int blkn, bi, ci, yindex, yoffset, blockcnt; JDIMENSION ypos, xpos; jpeg_component_info *compptr; /* Loop to write as much as one whole iMCU row */ for (yoffset = coef->MCU_vert_offset; yoffset < coef->MCU_rows_per_iMCU_row; yoffset++) { for (MCU_col_num = coef->mcu_ctr; MCU_col_num <= last_MCU_col; MCU_col_num++) { /* Determine where data comes from in input_buf and do the DCT thing. * Each call on forward_DCT processes a horizontal row of DCT blocks * as wide as an MCU; we rely on having allocated the MCU_buffer[] blocks * sequentially. Dummy blocks at the right or bottom edge are filled in * specially. The data in them does not matter for image reconstruction, * so we fill them with values that will encode to the smallest amount of * data, viz: all zeroes in the AC entries, DC entries equal to previous * block's DC value. (Thanks to Thomas Kinsman for this idea.) */ blkn = 0; for (ci = 0; ci < cinfo->comps_in_scan; ci++) { compptr = cinfo->cur_comp_info[ci]; blockcnt = (MCU_col_num < last_MCU_col) ? compptr->MCU_width : compptr->last_col_width; xpos = MCU_col_num * compptr->MCU_sample_width; ypos = yoffset * DCTSIZE; /* ypos == (yoffset+yindex) * DCTSIZE */ for (yindex = 0; yindex < compptr->MCU_height; yindex++) { if (coef->iMCU_row_num < last_iMCU_row || yoffset+yindex < compptr->last_row_height) { (*cinfo->fdct->forward_DCT) (cinfo, compptr, input_buf[compptr->component_index], coef->MCU_buffer[blkn], ypos, xpos, (JDIMENSION) blockcnt); if (blockcnt < compptr->MCU_width) { /* Create some dummy blocks at the right edge of the image. */ jzero_far((void FAR *) coef->MCU_buffer[blkn + blockcnt], (compptr->MCU_width - blockcnt) * SIZEOF(JBLOCK)); for (bi = blockcnt; bi < compptr->MCU_width; bi++) { coef->MCU_buffer[blkn+bi][0][0] = coef->MCU_buffer[blkn+bi-1][0][0]; } } } else { /* Create a row of dummy blocks at the bottom of the image. */ jzero_far((void FAR *) coef->MCU_buffer[blkn], compptr->MCU_width * SIZEOF(JBLOCK)); for (bi = 0; bi < compptr->MCU_width; bi++) { coef->MCU_buffer[blkn+bi][0][0] = coef->MCU_buffer[blkn-1][0][0]; } } blkn += compptr->MCU_width; ypos += DCTSIZE; } } /* Try to write the MCU. In event of a suspension failure, we will * re-DCT the MCU on restart (a bit inefficient, could be fixed...) */ if (! (*cinfo->entropy->encode_mcu) (cinfo, coef->MCU_buffer)) { /* Suspension forced; update state counters and exit */ coef->MCU_vert_offset = yoffset; coef->mcu_ctr = MCU_col_num; return FALSE; } } /* Completed an MCU row, but perhaps not an iMCU row */ coef->mcu_ctr = 0; } /* Completed the iMCU row, advance counters for next one */ coef->iMCU_row_num++; start_iMCU_row(cinfo); return TRUE; } #ifdef FULL_COEF_BUFFER_SUPPORTED /* * Process some data in the first pass of a multi-pass case. * We process the equivalent of one fully interleaved MCU row ("iMCU" row) * per call, ie, v_samp_factor block rows for each component in the image. * This amount of data is read from the source buffer, DCT'd and quantized, * and saved into the virtual arrays. We also generate suitable dummy blocks * as needed at the right and lower edges. (The dummy blocks are constructed * in the virtual arrays, which have been padded appropriately.) This makes * it possible for subsequent passes not to worry about real vs. dummy blocks. * * We must also emit the data to the entropy encoder. This is conveniently * done by calling compress_output() after we've loaded the current strip * of the virtual arrays. * * NB: input_buf contains a plane for each component in image. All * components are DCT'd and loaded into the virtual arrays in this pass. * However, it may be that only a subset of the components are emitted to * the entropy encoder during this first pass; be careful about looking * at the scan-dependent variables (MCU dimensions, etc). */ METHODDEF(boolean) compress_first_pass (j_compress_ptr cinfo, JSAMPIMAGE input_buf) { my_coef_ptr coef = (my_coef_ptr) cinfo->coef; JDIMENSION last_iMCU_row = cinfo->total_iMCU_rows - 1; JDIMENSION blocks_across, MCUs_across, MCUindex; int bi, ci, h_samp_factor, block_row, block_rows, ndummy; JCOEF lastDC; jpeg_component_info *compptr; JBLOCKARRAY buffer; JBLOCKROW thisblockrow, lastblockrow; for (ci = 0, compptr = cinfo->comp_info; ci < cinfo->num_components; ci++, compptr++) { /* Align the virtual buffer for this component. */ buffer = (*cinfo->mem->access_virt_barray) ((j_common_ptr) cinfo, coef->whole_image[ci], coef->iMCU_row_num * compptr->v_samp_factor, (JDIMENSION) compptr->v_samp_factor, TRUE); /* Count non-dummy DCT block rows in this iMCU row. */ if (coef->iMCU_row_num < last_iMCU_row) block_rows = compptr->v_samp_factor; else { /* NB: can't use last_row_height here, since may not be set! */ block_rows = (int) (compptr->height_in_blocks % compptr->v_samp_factor); if (block_rows == 0) block_rows = compptr->v_samp_factor; } blocks_across = compptr->width_in_blocks; h_samp_factor = compptr->h_samp_factor; /* Count number of dummy blocks to be added at the right margin. */ ndummy = (int) (blocks_across % h_samp_factor); if (ndummy > 0) ndummy = h_samp_factor - ndummy; /* Perform DCT for all non-dummy blocks in this iMCU row. Each call * on forward_DCT processes a complete horizontal row of DCT blocks. */ for (block_row = 0; block_row < block_rows; block_row++) { thisblockrow = buffer[block_row]; (*cinfo->fdct->forward_DCT) (cinfo, compptr, input_buf[ci], thisblockrow, (JDIMENSION) (block_row * DCTSIZE), (JDIMENSION) 0, blocks_across); if (ndummy > 0) { /* Create dummy blocks at the right edge of the image. */ thisblockrow += blocks_across; /* => first dummy block */ jzero_far((void FAR *) thisblockrow, ndummy * SIZEOF(JBLOCK)); lastDC = thisblockrow[-1][0]; for (bi = 0; bi < ndummy; bi++) { thisblockrow[bi][0] = lastDC; } } } /* If at end of image, create dummy block rows as needed. * The tricky part here is that within each MCU, we want the DC values * of the dummy blocks to match the last real block's DC value. * This squeezes a few more bytes out of the resulting file... */ if (coef->iMCU_row_num == last_iMCU_row) { blocks_across += ndummy; /* include lower right corner */ MCUs_across = blocks_across / h_samp_factor; for (block_row = block_rows; block_row < compptr->v_samp_factor; block_row++) { thisblockrow = buffer[block_row]; lastblockrow = buffer[block_row-1]; jzero_far((void FAR *) thisblockrow, (size_t) (blocks_across * SIZEOF(JBLOCK))); for (MCUindex = 0; MCUindex < MCUs_across; MCUindex++) { lastDC = lastblockrow[h_samp_factor-1][0]; for (bi = 0; bi < h_samp_factor; bi++) { thisblockrow[bi][0] = lastDC; } thisblockrow += h_samp_factor; /* advance to next MCU in row */ lastblockrow += h_samp_factor; } } } } /* NB: compress_output will increment iMCU_row_num if successful. * A suspension return will result in redoing all the work above next time. */ /* Emit data to the entropy encoder, sharing code with subsequent passes */ return compress_output(cinfo, input_buf); } /* * Process some data in subsequent passes of a multi-pass case. * We process the equivalent of one fully interleaved MCU row ("iMCU" row) * per call, ie, v_samp_factor block rows for each component in the scan. * The data is obtained from the virtual arrays and fed to the entropy coder. * Returns TRUE if the iMCU row is completed, FALSE if suspended. * * NB: input_buf is ignored; it is likely to be a NULL pointer. */ METHODDEF(boolean) compress_output (j_compress_ptr cinfo, JSAMPIMAGE input_buf) { my_coef_ptr coef = (my_coef_ptr) cinfo->coef; JDIMENSION MCU_col_num; /* index of current MCU within row */ int blkn, ci, xindex, yindex, yoffset; JDIMENSION start_col; JBLOCKARRAY buffer[MAX_COMPS_IN_SCAN]; JBLOCKROW buffer_ptr; jpeg_component_info *compptr; /* Align the virtual buffers for the components used in this scan. * NB: during first pass, this is safe only because the buffers will * already be aligned properly, so jmemmgr.c won't need to do any I/O. */ for (ci = 0; ci < cinfo->comps_in_scan; ci++) { compptr = cinfo->cur_comp_info[ci]; buffer[ci] = (*cinfo->mem->access_virt_barray) ((j_common_ptr) cinfo, coef->whole_image[compptr->component_index], coef->iMCU_row_num * compptr->v_samp_factor, (JDIMENSION) compptr->v_samp_factor, FALSE); } /* Loop to process one whole iMCU row */ for (yoffset = coef->MCU_vert_offset; yoffset < coef->MCU_rows_per_iMCU_row; yoffset++) { for (MCU_col_num = coef->mcu_ctr; MCU_col_num < cinfo->MCUs_per_row; MCU_col_num++) { /* Construct list of pointers to DCT blocks belonging to this MCU */ blkn = 0; /* index of current DCT block within MCU */ for (ci = 0; ci < cinfo->comps_in_scan; ci++) { compptr = cinfo->cur_comp_info[ci]; start_col = MCU_col_num * compptr->MCU_width; for (yindex = 0; yindex < compptr->MCU_height; yindex++) { buffer_ptr = buffer[ci][yindex+yoffset] + start_col; for (xindex = 0; xindex < compptr->MCU_width; xindex++) { coef->MCU_buffer[blkn++] = buffer_ptr++; } } } /* Try to write the MCU. */ if (! (*cinfo->entropy->encode_mcu) (cinfo, coef->MCU_buffer)) { /* Suspension forced; update state counters and exit */ coef->MCU_vert_offset = yoffset; coef->mcu_ctr = MCU_col_num; return FALSE; } } /* Completed an MCU row, but perhaps not an iMCU row */ coef->mcu_ctr = 0; } /* Completed the iMCU row, advance counters for next one */ coef->iMCU_row_num++; start_iMCU_row(cinfo); return TRUE; } #endif /* FULL_COEF_BUFFER_SUPPORTED */ /* * Initialize coefficient buffer controller. */ GLOBAL(void) jinit_c_coef_controller (j_compress_ptr cinfo, boolean need_full_buffer) { my_coef_ptr coef; coef = (my_coef_ptr) (*cinfo->mem->alloc_small) ((j_common_ptr) cinfo, JPOOL_IMAGE, SIZEOF(my_coef_controller)); cinfo->coef = (struct jpeg_c_coef_controller *) coef; coef->pub.start_pass = start_pass_coef; /* Create the coefficient buffer. */ if (need_full_buffer) { #ifdef FULL_COEF_BUFFER_SUPPORTED /* Allocate a full-image virtual array for each component, */ /* padded to a multiple of samp_factor DCT blocks in each direction. */ int ci; jpeg_component_info *compptr; for (ci = 0, compptr = cinfo->comp_info; ci < cinfo->num_components; ci++, compptr++) { coef->whole_image[ci] = (*cinfo->mem->request_virt_barray) ((j_common_ptr) cinfo, JPOOL_IMAGE, FALSE, (JDIMENSION) jround_up((long) compptr->width_in_blocks, (long) compptr->h_samp_factor), (JDIMENSION) jround_up((long) compptr->height_in_blocks, (long) compptr->v_samp_factor), (JDIMENSION) compptr->v_samp_factor); } #else ERREXIT(cinfo, JERR_BAD_BUFFER_MODE); #endif } else { /* We only need a single-MCU buffer. */ JBLOCKROW buffer; int i; buffer = (JBLOCKROW) (*cinfo->mem->alloc_large) ((j_common_ptr) cinfo, JPOOL_IMAGE, C_MAX_BLOCKS_IN_MCU * SIZEOF(JBLOCK)); for (i = 0; i < C_MAX_BLOCKS_IN_MCU; i++) { coef->MCU_buffer[i] = buffer + i; } coef->whole_image[0] = NULL; /* flag for no virtual arrays */ } }
{ "pile_set_name": "Github" }
Russian Criminal Tattoo: Police Files: Volume I Steven Heller The Graphic Design Idea Book: Inspiration from 50 Masters Format Label Wave of Mutilation: The Best of Pixies it has taken six years and the reissue of the regular albums to finally release the 'best of pixies' on vinyl following the original cd sequencing the double vinyl set each side is under 20 minutes long for the best quality cut is packaged in a gatefold sleeve and the initial pressing of 750 copies is available on burnt orange coloured vinyl during their six years together the pixies released five albums to fan peer and critical acclaim this best of runs almost chronologically and expands on the previous comp 'death to the pixies' with a couple bsides the live favourite 'into the white' and a cover of neil young's 'winterlong'
{ "pile_set_name": "Pile-CC" }
Q: Linear regression. Lowering response maintaining equal independent variable. I have put some data together and modelled the behaviour of the response ($y$) as function of three independent variables $x_1$, $x_2$ and $x_3$. A simple multi-linear regression. The model looks like: $y = k + a*x_1 + b*x_2 + c*x_3 + e$ Up to this point everything is OK. But now I want to lower the response by a $15%$. Like reducing some commissions or costs. The only idea I came across is to multiply the responses by $0.85$ and readjust the whole model. Recalculate $a$, $b$ and $c$ with the new values. I have been trying to find another way of doing this without touching the data samples. Just changing and adjusting the coefficients $a$, $b$ and $c$. Does anybody know how this should be done? An idea you come across with would be okay. A: The regression coefficients are given by: $\hat{\beta} = (X'X)^{-1}X'Y$ Thus, if you scale $Y$ values by $0.85$ then this is effectively equivalent to the following: $Y_{\text{new}} = 0.85e' Y $ where, $e$ is a vector of ones. Thus, the new estimate is given by $\hat{\beta}_{\text{new}} = (X'X)^{-1}X' (0.85 e'Y)$ Thus, you get the following relationshiop: $\hat{\beta}_{\text{new}} = 0.85 \hat{\beta}$
{ "pile_set_name": "StackExchange" }
Which Resistance song is the best? Uprising Resistance Undisclosed Desires + Collateral Damage United States of Eurasia Guiding Light Unnatural Selection MK Ultra I Belong to You + Mon Coeur S’ouvre a Ta Voix Exogenesis Symphony part 1: Overture Exogenesis Symphony part 2: Cross-Pollination Exogenesis Symphony part 3: Redemption Vote
{ "pile_set_name": "OpenWebText2" }
CDC grand rounds: childhood obesity in the United States. In the United States, childhood obesity affects approximately 12.5 million children and teens (17% of that population). Changes in obesity prevalence from the 1960s show a rapid increase in the 1980s and 1990s, when obesity prevalence among children and teens tripled, from nearly 5% to approximately 15% (Figure 1). During the past 10 years, the rapid increase in obesity has slowed and might have leveled. However, among the heaviest boys, a significant increase in obesity has been observed, with the heaviest getting even heavier. Moreover, substantial racial/ethnic disparities exist, with Hispanic boys and non-Hispanic black girls disproportionately affected by obesity (Figure 2). Also, older children and teens are more likely to be obese compared with preschoolers.
{ "pile_set_name": "PubMed Abstracts" }
In 1973, the Supreme Court held that police officers did not need a warrant to look inside a pack of cigarettes that they found in the coat pocket of a man who had been arrested. Those kinds of warrantless searches were allowed, the Court reasoned back then, to protect police officers and to prevent the destruction of evidence. Forty years later, California and the federal government urged the Supreme Court to adopt the same rule for cellphones. Once someone is arrested, they contended, police should be able to go through the entire contents of his phone without a warrant because cellphones are just like any other item that you can carry in your hand or pocket. But today the Supreme Court emphatically rejected that argument. Therefore, unless it’s an emergency, police need to get a warrant before they can search your cellphone. Let’s talk about the decision in Riley v. California in Plain English. As I explained in my earlier posts (here and here) on this issue, the Court was actually reviewing two cases involving cellphone privacy: those of David Riley, a California man whose smartphone police officers searched and Brima Wurie, a Massachusetts man who was carrying an older “flip phone” when he was arrested. The Court essentially treated the two cases as one, in a sweeping ruling which repeatedly invoked the Founding Fathers’ intense hatred of the British practice of virtually limitless searches for evidence of any crime. In his opinion for the Court, Chief Justice John Roberts began by noting that cellphones are “now such a pervasive and insistent part of daily life that the proverbial visitor from Mars might conclude they were an important feature of human anatomy.” Moreover, he added, cellphones like Riley’s and Wurie’s “are based on technology nearly inconceivable just a few decades ago” when the Court had upheld the search of the arrestee’s pack of cigarettes. Those observations would make the Court’s job seem easy. The Court first looked at whether a search without a warrant was necessary – as in its 1973 case – to protect the police officers making the arrest. The Court thought it was fine for police to examine the phone itself to make sure it cannot be used as a weapon. But it decisively rejected the idea that the digital contents of a cellphone can either endanger police or help the arrestee (who, presumably, has already been handcuffed and had the phone taken away from him). And it was unmoved by the argument that police need to look at the cellphone to make sure that, for example, the arrestee’s buddies aren’t headed to the crime scene to ambush them: there was no real evidence that this has actually been a problem, the Court explained, but even if it were a possibility in a particular case, then police could rely on the “emergency” exception to the general rule that a warrant is always required. The Court was equally dubious that police needed to be able to search cellphones to prevent evidence contained on the cellphone from being destroyed. Once he has been arrested and the phone has been taken from him, the Court reasoned, the arrestee can’t destroy evidence on the phone. Although the data on the phone could be deleted remotely, it continued, it appears that such incidents have been few and far between; in any event, police have other tools – such as turning off the phone or removing the battery – to prevent them. The Court then turned to the second part of its analysis: the extent to which searching the cellphone of someone who has been arrested will intrude on his privacy. And it is here that we really get a sense that the Justices – who as recently as 2012 relied on eighteenth-century laws prohibiting trespassing to rule in a case involving the use of GPS device to track the car of a suspected drug dealer – have become keenly sensitive to issues of digital privacy, not only for arrestees but possibly also for the rest of us. To demonstrate how cellphones differ from other items that you might be carrying in your pocket, the Court chronicled, in some detail, the many functions of cellphones – as “cameras, video players, rolodexes, calendars, tape recorders, libraries, diaries, albums, televisions, maps, or newspapers” – and emphasized their “immense storage capacity.” Having all of this information stored in one place, the Court explained, collectively provides much more information about our lives than, say, a calendar or camera would, standing alone. In fact, the Court posited, because of the different kinds of data that can be stored on a cellphone, searching a cellphone could provide police with even more information about your life than they could get from searching your home. The Court acknowledged that its decision today would make it a little harder for police officers to do their jobs: “Privacy,” it conceded, “comes at a cost.” But it took pains to make the scope of its ruling clear. It was not saying, it emphasized, that police can never search a cellphone that they take from someone who is arrested. Instead, all the decision means is that police generally have to get a warrant to do so – a process that, thanks to advances in technology, is easier than ever before because the police often can just make a phone call or send an email. And, the Court added, when time is really of the essence, such as in the case of an abduction or a possible bomb threat, that could justify searching an arrestee’s cellphone without a warrant. With today’s decision, the Court displayed a unanimity that was somewhat uncharacteristic for such a momentous case on an issue like privacy: only Justice Samuel Alito wrote separately, although he agreed with the result in the case and much of the Court’s reasoning. On the other hand, such a result may not be that surprising at all. Although we tend to think of them as living a somewhat cloistered life, the Justices and their families and friends use cellphones and computers and tablets just like the rest of us, and they probably share many of our concerns about keeping our private information private. (Indeed, as public figures they may be even more worried about these issues than the average person.) And given how sensitive they were to issues of digital privacy today, it will be interesting to see how they might react to similar issues – including, but not limited to, the National Security Agency’s domestic surveillance program – in the future. Stay tuned. Recommended Citation: Amy Howe, Get a warrant! Today’s cellphone privacy decision in Plain English, SCOTUSblog (Jun. 25, 2014, 5:25 PM), https://www.scotusblog.com/2014/06/get-a-warrant-todays-cellphone-privacy-decision-in-plain-english/
{ "pile_set_name": "OpenWebText2" }
Introduction {#Sec1} ============ Coronary heart disease is one of the leading causes of mortality in the world today (MacKay & Mensah, [@CR27]; Murray & Lopez, [@CR31]), and although new cardiac treatments have helped fight coronary heart disease in recent years, an estimated 1/3 of coronary heart disease risk factors remain elusive (Gudnason, [@CR22]). The addition of psychological factors to standard biomedical risk factors may enhance the prediction of patients at risk. Initial research on the Type A behavior pattern suggested that psychological factors were related to increased risk of heart attacks, but further investigations on Type A behavior were inconclusive (Rozanski et al., [@CR44]). Subsequently, researchers turned their focus towards isolated factors such as hostility, depression, anxiety, social isolation, and chronic stress (Matthews, [@CR29]; Rozanski et al., [@CR44], [@CR43]; Strike & Steptoe, [@CR51]) to document a relationship between psychological factors and poor cardiac prognosis (Rozanski et al., [@CR43]). Clustering of psychological factors within individuals enhances the risk of adverse health outcomes (Rozanski et al., [@CR43]; Strike & Steptoe, [@CR51]), and this clustering may partly be attributed to a specific vulnerability in the realm of personality (Dimsdale, [@CR16]). The distressed (Type D) personality construct was originally developed to identify cardiac patients who are vulnerable to emotional and interpersonal difficulties (Denollet, [@CR6]; Denollet et al., [@CR15]). Type D individuals tend to experience negative emotions (elevated score on negative affectivity) while not discussing them with others due to fear of rejection (elevated score on social inhibition) (Denollet et al., [@CR15]). Type D personality has been associated with poor quality of life and increased morbidity and mortality in cardiac patients (Denollet et al., 1996, [@CR11]; Kupper & Denollet, [@CR26]; Pedersen & Denollet, [@CR34]). The prevalence of Type D ranges from 28 to 32% across different cardiovascular conditions, including ischemic heart disease, chronic heart failure, and peripheral artery disease. The mortality risk incurred by Type D is 3-fold, with this risk being independent of disease severity, such as left ventricular dysfunction, and mood states such as anxiety and depression, and despite appropriate medical treatment (Pedersen & Denollet, [@CR34]). The mechanisms relating Type D personality with adverse prognosis in cardiac patients are generally not thought to derive from worse disease severity (de Jonge et al., [@CR5]; Nicholson et al., [@CR32]). Rather, negative health-related behaviors, such as smoking and poor treatment adherence (Kirkcaldy et al., [@CR25]; Pedersen et al., [@CR35]; Schiffer et al., [@CR47]), and dynamic physiological processes such as elevated cortisol levels (Molloy et al., [@CR30]; Whitehead et al., [@CR54]) and pro-inflammatory cytokines (Denollet et al., [@CR12]) have been suggested as possible contributing factors. Importantly, recent findings have casted doubt on the utility of using extent of coronary atherosclerosis as a surrogate means for inferring associations between psychological risk factors and adverse cardiovascular outcomes in cross-sectional data (Rozanski et al., [@CR45]). In the present study, we included assessment of extent of coronary artery disease to rule out the possibility of reverse causation, whereby disease severity can contribute to greater psychological distress and, in turn, may confound the assessment of Type D personality traits. In clinical and epidemiological research, Type D can be assessed with the standardized 14-item Type D Scale (DS14) that measures negative affectivity and social inhibition (7 items for each domain) (Denollet, [@CR7]). The DS14 scale has been validated in Belgian (Denollet, [@CR7]), Chinese (Yu et al., [@CR57]), Danish (Pedersen & Denollet, [@CR33]; Spindler et al., [@CR50]), Dutch (Denollet, [@CR7]), German (Grande et al., [@CR20]), Italian (Gremigni & Sommaruga, [@CR21]) and Ukrainian (Pedersen et al., [@CR37]) cardiac patients and healthy controls. However, only a few studies have examined how the Type D construct fits within the five-factor model of personality, and no study to date has tested how the social inhibition factor relates to emotional control. Hence, the objectives of the current study were (a) to evaluate the psychometric properties of the DS14 in Icelandic cardiac patients with a specific focus on the construct validity of Type D, (b) to examine whether assessment of Type D personality is confounded by worse disease severity in these patients and (c) to explore the association between Type D and health-related risk markers. Method {#Sec2} ====== Participants {#Sec3} ------------ This study included two cardiac patient samples. The first sample (cardiac sample I) consisted of 1,291 patients hospitalized for coronary angiography and/or percutaneous coronary intervention at Landspitali-university hospital in Reykjavik (May 2007--June 2008), the only hospital in Iceland where such operations are performed. These patients were approached when hospitalized to the coronary care unit, upon arrival to the emergency ward or by mail if they were on the waiting list for a coronary catheterization. Patients were eligible for participation only if they (a) underwent a coronary angiography or percutaneous coronary intervention during their current hospitalization; and (b) spoke and read Icelandic fluently. Forty-four patients were excluded because they either did not complete the DS14 (*n* = 34) or did not undergo coronary angiography (*n* = 10). The remaining 1,247 patients (875 men and 372 women) had a mean age of 64.8 years (SD 10.8), with women being significantly older than men (*M* = 63.3 (SD 11.0) vs. *M* = 68.2 (SD 9.5), *t*~(1,245)~ = 7.57, *P* \< 0.001). This patient sample was included in the study to (a) estimate the factor structure of the DS14 scale, and (b) examine whether the assessment of Type D personality is confounded by the severity of underlying coronary artery disease. The second sample (cardiac sample II) consisted of 161 patients from the coronary care unit, and from the heart failure clinic of the Landspitali-university hospital (February--March 2006 and November 2006--April 2007). This sample was included in the study to examine more extensively the validity of the Type D personality construct in Iceland, and how it is related to health-related risk markers. To this end, these patients completed additional measurements that were not administered in the larger cardiac sample I. Four patients were excluded from analysis due to incomplete questionnaire data. The final sample included 157 participants (118 males and 39 females) with an average age of 61.7 years (SD 11.3), and again women tended to be older than men (*M* = 60.2 (SD 11.1) vs. *M* = 66.4 (SD 11.0), *t*~(150)~ = 3.03, *P* \< 0.01). Baseline characteristics for the two participant samples are presented in Table [1](#Tab1){ref-type="table"}. Patients in cardiac sample I were older on average compared to patients in cardiac sample II (*t*~(1,397)~ = 3.24; *P* ≤ 0.001), but gender distribution was similar in the two samples ($\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$$ \chi_{(1,n\,=\,1,404)}^{2} $$\end{document}$ = 1.68, *P* = 0.20). The majority of patients in cardiac sample I had coronary artery disease (55%) or had experienced one or more heart attacks (23%), while patients with a history of one or more heart attacks (41%) and heart failure (24%) were more prominent in cardiac sample II.Table 1Baseline characteristicsCardiac sample I (*n* = 1,247)Cardiac sample II (*n* = 157)*Age (years)*Mean (SD)64.8 (10.8)61.7 (11.3)*Gender*Males70% (875)75% (118)*Heart disease*Heart failure2% (22)24% (38)Pacemaker and cardiac arrhythmia7% (89)11% (17)≥1 heart attacks23% (290)41% (64)Coronary artery disease55% (678)10% (16)Hypertension7% (92)11% (17)No disease6% (73)0 (0%)Unknown0.2% (3)3% (5)Data are presented as percentages (*n*) unless otherwise specified The study protocol was approved by the medical ethics committee of the National Bioethics Committee in Iceland. The study was conducted to conform to the ethical tenets developed by the World Medical Association, as espoused in the Declaration of Helsinki. All patients provided written informed consent. The DS14 scale {#Sec4} -------------- The DS14 is a 14-item questionnaire comprised of two seven-item subscales (Denollet, [@CR7]), measuring the tendency to (a) experience negative emotions (negative affectivity) and (b) inhibit self-expression in social interactions (social inhibition). The answering format is on a five-point Likert scale, ranging from 0 (*false*) to 4 (*true*), with total scores ranging from 0 to 28 for each subscale. Items include "I am often irritated" (negative affectivity) and "I am a closed kind of person" (social inhibition). The original Dutch DS14 was translated into Icelandic by four researchers. They received aid from two fluent Dutch speakers who independently translated the DS14 items from Dutch to Icelandic; a translation group examined the two independent translations, and one final version was constructed. Subsequently, the final Icelandic version was back-translated and compared to the original Dutch version to ensure accuracy. Participants were defined as having a Type D personality if they scored ≥10 on both negative affectivity and social inhibition. This cut-off value has been used in previous research (Denollet, [@CR7]; Emons et al., [@CR17]), and is derived from the median split on negative affectivity and social inhibition scores of participants in those studies. A recent study using item-response theory has shown the cut-off ≥10 on both subscales to be the best to distinguish between Type D and non-Type D individuals, as all items had the highest measurement accuracy around that cut-off (Emons et al., [@CR17]). Construct validity {#Sec5} ------------------ To evaluate the construct validity of the Icelandic DS14 scale, the NEO-five-factor inventory (NEO-FFI) (Costa & McCrae, [@CR3]), emotional control questionnaire (ECQ) (Roger & Najarian, [@CR41]; Roger & Nesshoever, [@CR42]), hospital anxiety depression scale (HADS) (Zigmond & Snaith, [@CR58]) and perceived stress scale (PSS) (Cohen et al., [@CR1]) were administered in Cardiac sample II. The NEO-FFI is a 60-item self-report scale which assesses five broad personality traits from the five-factor model of personality, that is neuroticism (e.g. anxiety, impulsiveness, vulnerability), extraversion (e.g. sociability, activity, positive emotions), openness (e.g. fantasy, feelings, artistic), agreeableness (e.g. trust, straightforwardness, altruism) and conscientiousness (e.g. achievement striving, dutifulness, self-discipline) (Costa & McCrae, [@CR3]). The scale contains 12 statements for each trait, and respondents answer on a five-point Likert scale (ranging from *strongly disagree* (0) to *strongly agree* (4)) how each statement refers to them. The psychometric properties of the Icelandic version of the NEO-FFI are acceptable and the test--retest reliability and internal consistency deemed sufficient (Jónsson, [@CR24]), with Cronbach's alpha ranging from 0.71 to 0.88 for the five traits (Svansdóttir, [@CR53]). The emotional control questionnaire or ECQ measures how easily people express and control their emotions (Roger & Najarian, [@CR41]; Roger & Nesshoever, [@CR42]). The scale includes 56 items which are divided into four factors (emotional inhibition, aggression control, benign control and rehearsal), but in this study a shorter 20-item version measuring rehearsal and emotional inhibition only was used (Roger et al., [@CR40]). Rehearsal refers to the tendency of individuals to ruminate over emotionally distressing events while emotional inhibition assesses to what extent people express their emotions. The response format for each item ranges from *strongly disagree* (1) to *strongly agree* (4). The Icelandic version of this scale has adequate psychometric properties with Cronbach's alpha reliability coefficients of α = 0.83 for rehearsal and α = 0.74 for emotional inhibition (Ingibergsdóttir, [@CR23]). The HADS is a 14-item questionnaire that measures symptoms of depression and anxiety in physically ill people (Zigmond & Snaith, [@CR58]). The questionnaire contains seven statements for each mood status. Participants rate on a four-point scale (0--3) how well each statement refers to them. Total scores range from 0 to 21 for each domain. The Icelandic version of the HADS identifies symptoms of depression and anxiety sufficiently well (Schaaber et al., [@CR46]), with reliability estimates ranging from α = 0.78--0.86 for anxiety and α = 0.65--0.85 for depression (Smari et al., [@CR49]). The PSS or perceived stress scale is a 14-item measure of self-appraised stress (Cohen et al., [@CR1]). Items include for instance "In the last month, how often have you felt that you were unable to control the important things in your life?" The response format is on a five-point Likert scale ranging from *never* (0) to *very often* (4), and total scores range from 0 to 56. The scale has good psychometric properties (Cohen et al., [@CR1]; Cohen & Williamson, [@CR2]) and correlates with social anxiety and depression symptoms (Cohen et al., [@CR1]). The Icelandic version of PSS has comparable psychometric properties to the original language version (Davíðsdóttir & Bachman, [@CR4]) with Cronbach's alpha = 0.89 in a university student sample (Svansdóttir, [@CR53]). Disease severity {#Sec6} ---------------- Disease severity, defined by how many coronary arteries were affected by coronary artery disease (i.e. normal arteries, 1, 2, or 3 arteries affected, and main stem narrowing) was derived from results of the coronary angiography in cardiac sample I. Angiography results were inconclusive for one person, which was excluded from this analysis. Information on disease classification, categorized as hypertension, coronary artery disease, previous heart attacks, pacemaker/arrhythmias and heart failure, was obtained from medical staff and/or retrieved from medical records. Information concerning disease classification was missing for three patients in cardiac sample I (0.2%) and five patients in cardiac sample II (3.2%). Health-related risk markers {#Sec7} --------------------------- Participants in cardiac sample II provided information by self-report regarding certain health-related risk markers. These included (a) smoking status (*never, ex*-*smoker, current smoker*); (b) amount of smoking per day (*0*--*10 cigarettes, 10*--*20 cigarettes, 20*--*30 cigarettes, and* \>*30 cigarettes a day*); (c) duration of smoking (*0*--*5* *years, 5*--*10* *years, 10*--*20* *years,* \>*20* *years*); (d) previous mental problems, i.e. "Have you experienced any significant mental problems in the past?" (*yes, no*); and (e) psychopharmacological medication use, i.e. "Have you used one or more of the following medications for more than two weeks in the past 12 months: sleeping pills, anxiety-reducing medications, antidepressants and sedatives?" (*no, sleeping pills, anxiety-reducing medication, antidepressants, sedatives*). Of note, due to a low incidence rate for each medication category, answers were recoded post-hoc to a binary variable containing the following distinction: *no, I have not used any of these medications; yes, I have used one or more of these medications*. Statistical analysis {#Sec8} -------------------- Principal axis factor analysis with direct oblimin rotation (delta = 0) was used to explore the factor structure of the DS14, using the scree plot and criterion of eigenvalues \> 1 to determine the number of factors to extract. A confirmatory factor analysis of the scale was performed to confirm the two-factor structure of the scale, using structural equation modeling (SEM) and the maximum likelihood method in AMOS 17 (Analysis of Moment Structures, Chicago, IL, USA). In the construction of the model, the theoretical foundation of the scale was taken into account. As the negative affectivity and social inhibition subscales each cover three different facets of negative affectivity and social inhibition, respectively, error covariance was added to items representing each facet, i.e. for items measuring the negative affectivity facets dysphoria (items 4, 7 and 13), worry (items 2 and 12) and irritability (items 5 and 9), and for items measuring the social inhibition facets discomfort in social interactions (6, 8 and 14), reticence (10 and 11) and social poise (items 1 and 3). Goodness of fit indexes used in the analysis included the Chi-square, the Comparative fit index (CIF) and the Root mean square error of approximation (RMSEA). For Chi-square, a value ≥ 0.05 indicates good fit (agreement with the null hypotheses that residuals are minimal and the data fit the model well). The Chi-square is influenced by sample size, which can lead to inflated Chi-square values and thus statistical significance, indicating bad fit (Schumacker & Lomax, [@CR48]). For the CFI, values close to 1 indicate a very good fit and values above 0.90 or close to 0.95 good fit. The RMSEA index should be ≤0.05 to indicate good fit, but levels ≤0.08 are considered to indicate adequate fit. Internal consistency of the scale was assessed with Mean inter-item correlation and Cronbach's alpha. Validity of the DS14 was estimated by exploring the Pearson's correlation between the negative affectivity and social inhibition subscales and similar constructs, i.e. neuroticism and extraversion, emotional inhibition and rehearsal, anxiety and depression and perceived stress. A factor analysis of scale scores on the DS14 scale, NEO-FFI, ECQ, HADS and PSS was executed to verify that (a) negative affectivity, neuroticism and rehearsal, and (b) social inhibition, introversion and emotional inhibition measure related constructs, and to test how anxiety, depression and stress would relate to the negative affectivity and social inhibition factors. Differences in disease classification by Type D personality were assessed with Kendall's Tau-*c* calculations, but patients with arrhythmias and pacemakers were excluded from the analysis due to the different nature of their disease. The Kendall's Tau-*c* was also employed to estimate differences in disease severity by Type D personality in cardiac sample I, in both the entire sample and among patients who had established coronary artery disease. Finally, Type D and non-Type D patients in cardiac sample II were compared on smoking behavior, prevalence of previous mental problems, and medication use with Chi-square tests for nominal variables and Tau-*c* for ordinal variables. Association strength was estimated with Cohen's D calculations for quantitative variables and odds ratios for categorical variables. The SPSS 17 statistical software for Windows was used for all main analysis (Statistical Package for Social Sciences, Chicago, IL, USA). Results {#Sec9} ======= Factor structure of the DS14 {#Sec10} ---------------------------- A principal axis factor analysis (direct oblimin rotation, delta = 0) in a combined sample of cardiac patients (*n* = 1,404) indicated a two-factor solution, which explained 46% of variance in the patient sample. These two factors clearly reflected the negative affectivity and social inhibition subscales, with satisfactory factor loadings (ranging from 0.47 to 0.75) and good internal consistency (negative affectivity: Cronbach's alpha = 0.85 and Mean inter-item correlation = 0.45; social inhibition: Cronbach's alpha = 0.84, Mean inter-item correlation = 0.43) (Table [2](#Tab2){ref-type="table"}).Table 2Factor analysis and reliability of the DS14 scale in a combined cardiac sample (*n* = 1,404)FactorsIII*Negative affectivity items*2. I often make a fuss about unimportant things**0.61**0.104. I often feel unhappy**0.74**0.075. I am often irritated**0.73**0.047. I take a gloomy view of things**0.63**−0.149. I am often in a bad mood**0.58**−0.1312. I often worry about something**0.60**0.0213. I am often down in the dumps**0.73**−0.12Cronbach's alpha**0.85**Mean inter-item correlation**0.45***Social inhibition items*1. I make contact easily when I meet people0.14**0.72**3. I often talk to strangers0.16**0.61**6. I often feel inhibited in social interactions0.29−**0.50**8. I find it hard to start a conversation0.10−**0.75**10. I am a closed kind of person0.12−**0.66**11. I would rather keep other people at a distance0.16−**0.47**14. When socializing I don't find the right things to talk about0.15−**0.69**Cronbach's alpha**0.84**Mean inter-item correlation**0.43**The highest loadings on the corresponding factor, Cronbach's alpha and mean inter-item correlations are presented in bold A confirmatory factor analysis of the two-factor structure of the Icelandic DS14 in the same sample indicated a good to adequate model fit for the unconstrained model (χ^2^ = 435.63, *P* ≤ 0.001; CFI = 0.953 and RMSEA = 0.063, 90% CI 0.058--0.069). Standardized regressional weights of items to factor ranged from 0.52 to 0.79 for negative affectivity and 0.44--0.80 for social inhibition (Fig. [1](#Fig1){ref-type="fig"}).Fig. 1Standardized regression weights for the 2-factor model of the DS14, representing negative affectivity (*NA*) and social inhibition (SI) Construct validity {#Sec11} ------------------ The convergent and construct validity of the Icelandic DS14 scale was evaluated by examining correlations of negative affectivity and social inhibition with similar construct measurements in cardiac sample II. The negative affectivity subscale had a high positive correlation with neuroticism (*r* = 0.80) and rehearsal (*r* = 0.58), while social inhibition was negatively correlated with extraversion (*r* = −0.65) and positively with emotional inhibition (*r* = 0.50), which further supports the divergent validity of the Type D factors and their individual attributes. Negative affectivity had a high correlation with anxiety, depression and stress scores, indicating that it clearly measures increased negative affect. An axis factor analysis (direct oblimin rotation, delta = 0) of scale scores confirmed that the negative affectivity and social inhibition subscales were differentially related to the five-factor model of personality; negative affectivity (loading = 0.79), neuroticism (0.78) and rehearsal (0.64) loaded on a single negative affectivity/neuroticism factor. Social inhibition (−0.95), extraversion (0.57) and emotional inhibition (−0.44) loaded together on a separate inhibition factor. Neither DS14 subscale was related to agreeableness, conscientiousness or openness of the five-factor model of personality. Anxiety (−0.50), depression (−0.73) and stress (−0.60) loaded together on a single factor termed "psychological well-being", but anxiety also had a considerable loading on the negative affectivity/neuroticism factor (0.49) (Table [3](#Tab3){ref-type="table"}).Table 3Correlations and results of a factor analysis of scale scores for the DS14, NEO-FFI, ECQ and HADS subscales and PSS scaleCorrelationNegative affectivitySocial inhibitionPattern matrixCardiac sample II (*n* = 157)IIIIIIIVVNegative affectivity--0.47\***0.79**−0.14−0.09−0.070.04Social inhibition----0.11**−0.95**0.11−0.050.05Neuroticism0.80\*0.47\***0.78**−0.12−0.06−0.14−0.13Extraversion−0.48\*−0.65\*−0.09**0.57**0.12−0.020.17Agreeableness−0.33\*−0.21\*−0.28−0.030.07−0.350.17Conscientiousness−0.20\*−0.25\*−0.010.060.050.12**0.72**Openness−0.02−0.07−0.020.060.01**−0.45**−0.09Rehearsal0.58\*0.35\***0.64**−0.050.010.23−0.02Emotional inhibition0.25\*0.50\*−0.08**−0.44**−0.190.25−0.10Anxiety0.67\*0.26\*0.490.01**−0.50**−0.250.20Depression0.55\*0.35\*0.04−0.15**−0.73**−0.11−0.09Perceived stress0.38\*0.18\*0.040.05**−0.60**0.23−0.09The highest loadings on the corresponding factor are presented in bold*NEO*-*FFI* NEO-five-factor inventory, *ECQ* Emotional control questionnaire, *HADS* Hospital anxiety and depression scale, *PSS* Perceived stress scale\* *P* \< 0.001 Prevalence of Type D personality {#Sec12} -------------------------------- Average scores on negative affectivity and social inhibition were equivalent in the two patient samples (negative affectivity: *M* = 8.6 (SD 5.6) vs. *M* = 8.8 (SD 5.9), *t*~(1,402)~ = 0.46, *P* = 0.65; social inhibition: *M* = 9.3 (SD 5.8) vs. *M* = 9.3 (SD 6.1), *t*~(1,402)~ = 0.11, *P* = 0.91; for cardiac sample I and II, respectively). Using the cut-off ≥ 10 for both subscales (Denollet, [@CR7]; Emons et al., [@CR17]), 26% of patients in cardiac sample I and 29% of patients in cardiac sample II, were classified as Type D individuals. Confounding effect of disease severity {#Sec13} -------------------------------------- Assessment of Type D personality was not confounded by severity of underlying coronary artery disease in cardiac sample I, as estimated by number of arteries affected by coronary artery disease from the coronary angiography results (Tau-*c* = 0.010, *n* = 1,237, *P* = 0.72; Fig. [2](#Fig2){ref-type="fig"}). About 1/3 of both non-Type D and Type D patients had normal arteries or atheroma with no significant occlusions, and with those individuals excluded from the analysis, Type D personality was still not associated with worse disease severity (Tau-*c* = −0.001, *n* = 838, *P* = 0.98).Fig. 2Coronary artery disease severity, stratified by Type D personality Assessment of Type D personality was also not related to disease classification in cardiac sample I (Tau-*c* = −0.02, *n* = 1,155, *P* = 0.45) nor cardiac sample II (Tau-*c* = −0.15, *n* = 135, *P* = 0.068). In both cases, disease classification was categorized as: no disease, hypertension, coronary artery disease, ≥1 heart attacks and heart failure. Association with health-related risk markers {#Sec14} -------------------------------------------- As a final step, we explored the relationship of Type D personality with psychopharmacological medication use, previous mental problems and smoking in cardiac sample II. Type D patients reported more psychopharmacological medication use (Fig. [3](#Fig3){ref-type="fig"}). When asked about use of sleeping pills, anxiety-reducing medication, antidepressants and sedatives, half of the cardiac patients with a Type D personality (51%) reported having used one or more of these medications compared to 29% of their non-Type D counterparts ($\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$$ \chi_{(1,n\,=\,154)}^{2} $$\end{document}$ = 6.79, *P* = 0.009; OR 2.59, 95% CI 1.25--5.34, *P* = 0.010). Prevalence of previous mental problems did however not differ between Type D (19%) and non-Type D (14%) patients ($\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$$ \chi_{(1,n = 149)}^{2} $$\end{document}$ = 0.584, *P* = 0.45). Type D patients were significantly more likely to smoke as compared with non-Type D patients (Fig. [3](#Fig3){ref-type="fig"}); i.e., 22% versus 6% ($\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$$ \chi_{(1,n = 156)}^{2} $$\end{document}$ = 8.35, *P* = 0.004; OR 4.25, 95% CI 1.50--12.00, *P* = 0.006). In patients with a history of smoking, no differences were found between Type Ds and non-Type Ds regarding how many cigarettes they smoked per day (Tau-*c* = 0.11, *n* = 115, *P* = 0.26). However, a trend towards a longer history of smoking was noted in Type Ds (Tau-*c* = 0.15, *n* = 120; *P* = 0.056), but 76% of Type D smokers (former or current) reported having smoked for 20 years or more compared to 59% of non-Type D smokers.Fig. 3Prevalence of psychopharmacological medication use and smoking, stratified by Type D personality Discussion {#Sec15} ========== The objectives of the current study were to evaluate the psychometric properties and construct validity of the Icelandic DS14 scale, to test whether Type D assessment is confounded by disease severity in Icelandic angiography patients, and to explore the relationship between Type D and health-related risk markers. The findings supported the two-factor structure of the Icelandic DS14, and its validity and reliability in this sample of Icelandic heart patients. Principal axis factor analysis revealed internally consistent negative affectivity and social inhibition factors, and a confirmatory factor analysis confirmed the two-factor structure of the original scale (Denollet, [@CR7]) in a large sample of Icelandic cardiac patients. The current results supported the convergent and divergent validity of the Type D construct in the Icelandic setting. An exploratory factor analysis of scale scores showed that negative affectivity, neuroticism and rehearsal loaded on the same factor, while social inhibition, extraversion, and emotional inhibition loaded together on another factor, supporting the construct validity of the two factors of the DS14 (Denollet, [@CR7]; Fruyt & Denollet, [@CR18]) whilst also strengthening its cross-cultural validity. Furthermore, negative affectivity correlated strongly with anxiety, depression and moderately with perceived stress, confirming the presence of increased negative mood states within the negative affectivity trait. In addition, social inhibition was clearly associated with emotional inhibition as measured by the emotional control scale. In a recent study, Grande et al. ([@CR19]) advocated more testing of the construct validity of the social inhibition dimension, especially since it is the combination of social inhibition with negative affectivity that seems to make Type D personality a stronger predictor of adverse cardiac events compared with other single-dimensional negative affect factors, such as depression. In the context of Type D personality, the inhibition of emotions in social interaction is believed to play a key part in the association with adverse cardiac prognosis, by modulating the effect negative emotions have on cardiac prognosis (Denollet et al., [@CR10]). Others have also linked social inhibition with social avoidance (Yu et al., [@CR57]), lack of social boldness (Grande et al., [@CR19]) and suppressed anger (Denollet et al., [@CR9]). The prevalence of Type D personality of twenty-six and twenty-nine percent in the cardiac samples was comparable to that found in European and Chinese samples (Denollet, [@CR7]; Grande et al., [@CR20]; Gremigni & Sommaruga, [@CR21]; Pedersen & Denollet, [@CR33]; Pedersen et al., [@CR37]; Spindler et al., [@CR50]; Yu et al., [@CR57]). Assessment of Type D personality was not confounded by disease severity, as estimated by the number of coronary arteries affected with coronary artery disease and/or presence of significant narrowing at the main stem. This finding is in accordance with previous results in coronary artery disease and congestive heart failure patients, where no association has been found between Type D personality and indicators of disease severity, such as multivessel disease (Martens et al., [@CR28]), left ventricular ejection fraction (Denollet & Brutsaert, [@CR8]; de Jonge et al. [@CR5]) and biomedical markers (i.e. brain natriuretic peptide) (Pelle et al., [@CR39]). Similarly, Type D personality was not related to disease classification in either of the cardiac samples. The majority of former findings have generally also revealed that Type D personality is stable across time, and does not seem to be affected by changes in mood status or severity of cardiac disease (Martens et al., [@CR28]). The lack of association between Type D personality and extent of coronary artery disease does not necessarily diminish the status of Type D personality as a predictor for adverse cardiac prognosis. Conversely, these findings may merely indicate that the mechanisms relating Type D personality with adverse prognosis do not stem from worse disease severity, but through other pathways. Furthermore, if disease severity were in fact the pathway through which Type D personality affects cardiac prognosis, then the association between Type D and prognosis should diminish in strength or disappear altogether when multivariate adjustments for disease severity markers are conducted. This has however not been the case in previous studies, as is evident in the recent review by Denollet et al. ([@CR13]). Mediating mechanisms linking Type D with adverse cardiac prognosis reside more likely in behavioral and physiological processes. Potential behavioral factors include unhealthy lifestyle behaviors (Williams et al., [@CR56]), more smoking (Pedersen et al., [@CR35]), poor treatment adherence (Rozanski et al., [@CR43]; Williams et al., [@CR55]) and inadequate consultation behavior (Schiffer et al., [@CR47]), while physiological and biological processes may include elevated cortisol (Molloy et al., [@CR30]; Whitehead et al., [@CR54]), pro-inflammatory cytokines (Denollet et al., [@CR12]) and cardiovascular stress reactivity (Denollet et al., [@CR13]) to name a few. Type D patients may thus be less likely to follow their doctors recommendations regarding medications or changing unhealthy lifestyle behaviors, and perhaps less efficient in presenting their symptoms to their doctor, due to their high social inhibition. Such factors could possibly explain why these patients develop or experience a more adverse prognosis compared to their non-Type D counterparts. A recent study by Rozanski et al. ([@CR45]) has also reported that psychological risk factors (depression, hostility, social support, perceived stress, job strain, and optimism) were not associated with the extent of coronary atherosclerosis. This further supports the lack of association between Type D and extent of coronary artery disease in the current study, as the Type D construct generally summarizes such psychological risk factors in the general negative emotional distress it encompasses (Suls & Bunde, [@CR52]). Finally, even as some researchers have disputed that the relation of psychological factors with cardiovascular prognosis is confounded by worse somatic health, findings from a recent study have indicated that the Type D personality construct is less confounded by somatic health compared with depression (de Jonge et al. [@CR5]). Type D personality had strong ties to health-related risk markers in cardiac patients. Although no association was found between Type D personality and prevalence of reported previous mental problems in the current study, psychopharmacological medication use was higher among Type D patients compared to their non-Type D counterparts, and a high correlation emerged between negative affectivity and anxiety and depression. Previously, researchers have also found that post-myocardial infarction patients with a Type D personality were significantly more likely to use benzodiazepines as compared to non-Type D patients (Denollet et al., [@CR14]). The lack of association with former mental problems seems contradictory with the high correlation noted between negative affectivity and anxiety and depression. The assessment of previous mental problems may not adequately portray the number of previously diagnosed mental problems, due to the simplistic one question format assessment. We also found a relationship between Type D personality and smoking among cardiac patients. Incidence of current smoking was higher in the Type D patient group, and there were some indications that Type D smokers had a longer history of smoking compared to non-Type D smokers. Previously, it has been reported that cardiac patients with a Type D personality may be more likely to smoke (Pedersen et al., [@CR36]), and that Type D individuals are less likely to engage in healthy lifestyle behaviors (Williams et al., [@CR56]). These findings suggest that cardiac patients with Type D personality may struggle more with the lifestyle changes recommended by doctors to decrease likelihood of further cardiac events. In addition, previous results have indicated that heart failure patients with Type D personality are more likely to show inadequate consultation behavior compared to non-Type D patients (Pelle et al., [@CR38]; Schiffer et al., [@CR47]), which implies that self-management and medical adherence in these patients may be impaired as well. Nevertheless, research results have indicated that the adverse effect of Type D on cardiac prognosis (Pedersen et al., [@CR36]) and poor health status (Pedersen et al., [@CR35]) remains significant despite statistical adjustment for smoking and other mechanisms that may mediate the relationship between Type D and health outcomes. More research needs to be conducted to clarify which mediating mechanisms are behind Type D's association with adverse prognosis in cardiac patients, and to determine whether health-behavior and/or poor medical adherence play a significant role. Certain limitations restrict the interpretation of the present findings. First of all, the participant samples were not randomly selected. Yet, cardiac sample I included consecutive patients nationwide in Iceland, which diminished greatly the risk of selection bias in that sample. Another limitation is the self-report of psychopharmacological medication use, previous mental health problems and smoking, and the unavailability of these measures from cardiac sample I. Overall, the results of the present study indicated that the Icelandic DS14 is a psychometrically sound assessment tool that can be readily applied in epidemiological and clinical research. The Type D personality construct was prevalent in Icelandic cardiac patients, not confounded by disease severity, and related to certain health-related risk markers in this clinical population. The present research was supported by Rannís, The Icelandic Centre for Research (Reykjavík, Iceland) by a grant to Dr. Hrobjartur D. Karlsson, the Landspitali-University Hospital Research found, Iceland, with a grant to the project, and by the Netherlands Organisation for Scientific Research (The Hague, The Netherlands) with a VICI grant (453-04-004) to Dr. Johan Denollet and a VENI grant (451-05-001) to Dr. Susanne S. Pedersen. Conflict of interest {#d28e1901} ==================== There is no conflict of interest related to this study. Open Access {#d28e1906} =========== This article is distributed under the terms of the Creative Commons Attribution Noncommercial License which permits any noncommercial use, distribution, and reproduction in any medium, provided the original author(s) and source are credited.
{ "pile_set_name": "PubMed Central" }
Painters working on large elevated areas customarily utilize long-handled tools which obtain their paint from trays or buckets placed on the floor or on a scaffold, or receive them through hoses. These are suitable and accepted techniques for painting large areas. Similarly, at or near ground or floor levels, these techniques are widely used. On smaller jobs, and especially at higher elevations where access to a floor level supply is not convenient, the painter takes the bucket up the ladder with him and places it on a platform of some kind. This, of course limits the range of the painter's efforts and when he needs to work on a more distant area, he must dismount the ladder, move it and the bucket, and start again. These procedures are useful for larger, mostly rather plain, painting. However, they make it needlessly difficult for paint jobs of more artistic nature. Examples of such more complicated jobs are treatment of areas in which patterns of various colors, texture, or composition are needed, such as walls to be textured to appear as a cloudy sky, or which are to have an image such as a face or other physical objects. For these jobs, which generally are smaller in size but which require greater skill and artistry, it is known for painters to hang a pail of paint from a tool belt, with the pail dangling freely from the belt. The painter dips the applicator into the pail. The term “applicator” is used herein to denote a handled tool for applying paint, of which brushes and rollers are the most commonly encountered examples. It is used to denote both kinds. While this bucket is available to the painter on the ladder, it calls for considerable care in its use because the applicator and pail are independently supported. When he climbs the ladder, he must attend to both the bucket and the applicator, holding the applicator with one hand, holding on to the ladder with the other, and caring for the dangling pail. This is not only clumsy and potentially dangerous, but distracting to an artist. This invention frees a hand which otherwise would be holding the applicator. In the most ordinary usage, care must be exerted to control drip from both the applicator and from the bucket, especially from and around the groove in the rim of the bucket. Otherwise the bucket and its surroundings can become messy, and control over the color is reduced. The absence of bucket stability in the sense of a close coupling of the painter's body and the bucket is a considerable disadvantage. Further, known buckets do not provide specific means for wiping the applicator while it is being removed from the bucket with paint to be applied to a surface. This can result in excessive paint on the applicator, and dripping of paint from the applicator. Another disadvantage of the known art is the need either to use a large number of buckets, or to clean up a single bucket when a different color is to be applied. For large walls this is no problem. However, for small jobs, and especially for multi-color jobs, this is a serious disadvantage. It is an object of this invention to provide a paint holder (frequently called a “bucket”), with an integral stabilizer which abuts the painter's body over a substantial area to establish the location of the bucket relative to the painter. It is another object of this invention to provide a drain from the rim groove of the bucket which will drain paint from the groove back into the bucket. It is yet another object of this invention to provide a shaped liner with an outer wall complementary to the rim groove and preferably also with some of the inner wall of the bucket. This liner is removable, so it can protect the bucket from undesired paint, and also so as to be removable and replaceable to present paints of different colors. It is yet another object of this invention to provide a liner with multiple cavities so as to carry a plurality of colors in one liner. It is still another object of this invention to provide in this holder an applicator mount arranged so the painter can easily store and access the applicator. When stored, it is in a position to drain into the bucket. When the painter climbs the ladder, or otherwise does not need the applicator, it is held in a proper place, with its handle held by the mount, and with the applicator portion below a covering lid through which the handle passes.
{ "pile_set_name": "USPTO Backgrounds" }
Windows Launch Center v.1.2 Windows Launch Center is a software for Win32 platforms, Win2k WinXP and Vista.It can category shortcuts by your definition.1. Popular shortcuts 2. Folder shortcuts3. Program shortcuts include many categories4. Define shortcut name or icons Start Menu X v.6.5Start Menu X is a professional replacement of the system menu. Power users will get an efficient tool instead of the clumsy system menu. Start Menu X is a fusion of newest technologies and a 7-year research effort. Install a solution for true pro's! Task Force Quit 2 v.2.0.10Many Windows apps crash when you least expect it. But what if you could close them immediately? Introducing Task Force Quit Pro 2! This is a free utility that ends frozen tasks on Windows PC without using Task Manger. Windows How To: Routers and Modems v.1.0Windows Lesson - What is Router & What is Modem explained in Plain English. This lesson will not only explain broadband modems and routers, but show you how to hook them up and also how to fix a common Internet connection problem by resetting your ...
{ "pile_set_name": "Pile-CC" }
Per Mike he has you listed to go on 10/15 - 10/19. I would like to book these tickets today because i can get them for $180 dollars. Please come by my desk and give me your travel arrangements. -ina -----Original Message----- From: Grigsby, Mike Sent: Tuesday, September 18, 2001 12:09 PM To: Allen, Phillip K.; Bass, Eric; Bike, Anne; Ermis, Frank; Gay, Randall L.; Heu, Mog; Holst, Keith; Huang, Jason; Kuykendall, Tori; Lenhart, Matthew; Lisk, Daniel; Reitmeyer, Jay; Sanchez, Monique; Scott, Susan M.; Smith, Matt; South, Steven P.; Sullivan, Patti; Tholt, Jane M.; Tycholiz, Barry; Wolfe, Jason Cc: Rangel, Ina Subject: FW: Portland Groups I think Ina had the old dates for NOV. -----Original Message----- From: Grigsby, Mike Sent: Tuesday, September 18, 2001 12:02 PM To: Allen, Phillip K.; Bass, Eric; Bike, Anne; Ermis, Frank; Gay, Randall L.; Heu, Mog; Holst, Keith; Huang, Jason; Kuykendall, Tori; Lenhart, Matthew; Lisk, Daniel; Reitmeyer, Jay; Sanchez, Monique; Scott, Susan M.; Smith, Matt; South, Steven P.; Sullivan, Patti; Tholt, Jane M.; Tycholiz, Barry; Wolfe, Jason Subject: FW: Portland Groups This is what I am thinking for the Portland trips. I have left Janie, Randy, and Tori off of the list for various reasons. -----Original Message----- From: Rangel, Ina Sent: Tuesday, September 18, 2001 10:54 AM To: Grigsby, Mike Subject: Portland Groups 9/17 to 9/21 Keith Holst Matt Smith Jason Huang 10/15 -10/19 Jay Reitmeyer Matt Lenhart Jason Wolfe 11/12 - 11/16 Mike Grigsby Frank Ermis Susan Scott Monique Sanchez 12/10 - 12/14 Cancel this trip -Ina Rangel
{ "pile_set_name": "Enron Emails" }
WASHINGTON — President Donald Trump may not need Congress to go to war with Iran. That's the case his lieutenants have been quietly building as tensions between the two nations have escalated. The key elements involve drawing links between al Qaeda and Iran and casting Iran as a terrorist threat to the U.S. — which is exactly what administration officials have been doing in recent weeks. That could give Trump the justification he needs to fight Iran without congressional approval under the still-in-effect 2001 use-of-force resolution. That prospect is unsettling to most Democrats, and even some Republicans, in part because Iran didn't attack the U.S. on 9/11, in part because there is a reluctance to engage U.S. forces in another theater of war, and in part because many lawmakers believe Congress has given too much of its war-making authority to the president over the years. With Congress unlikely to grant him new authority to strike Iran under the current circumstances, and amid a campaign of "maximum pressure" against the regime in Tehran that has raised tensions, Trump administration officials have sent strong signals that they will be ready to make an end run around lawmakers, using the 2001 authorization for the use of military force — or "AUMF" in Washington-speak — if necessary. That law gave the president the power to use force against "nations, organizations, or persons he determines planned, authorized, committed, or aided the terrorist attacks that occurred on September 11, 2001, or harbored such organizations or persons, in order to prevent any future acts of international terrorism against the United States by such nations, organizations or persons." Earlier this month, the U.S. deployed an aircraft carrier strike group to the region. Three U.S. officials told NBC that a surge in American forces in the region was a response in part to intelligence-gathering suggesting that the Iranian regime had given proxies a green light to attack U.S. personnel and assets in the region. And in recent weeks, the Trump administration has accused Iran of assisting al Qaeda, designated an arm of the Iranian military as a foreign terrorist organization and accused Iran of being linked to a terrorist threat against the U.S. embassy in Baghdad, Iraq. National Security Council officials declined to speak on the record with NBC about whether such incidents would satisfy the legal threshold necessary for the president to determine he had the authority to use force against Iran. But former government lawyers familiar with the 2001 law and its applications say it's obvious from those moves what the Trump administration is trying to do. "The whole thing is building up to the notion that they don't have to go to Congress for approval," Yale University law professor Harold Koh, who served as the State Department's top lawyer under Secretary Hillary Clinton, said in a telephone interview with NBC News. Yet Koh said an attempt to shoehorn Iran into the 2001 AUMF is absurd and shouldn't pass legal muster. "The theory of war powers has to be that Congress doesn't just sign off once," he said. "The suggestion now that Iran attacked us on 9/11 is ridiculous." The original law essentially creates a two-part test for the president to make a determination that force is warranted: A country, group or person has aided al Qaeda and force is necessary to prevent a terrorist attack against the U.S. from that entity. Under questioning from Sen. Rand Paul, R-Ky., a critic of the executive branch's expansive view of its war powers under both Presidents Barack Obama and Trump, Secretary of State Mike Pompeo said last month that he would "leave it to the lawyers" to sort out whether Trump had the authority to go to war with Iran absent a new authorization from Congress. But he also forwarded an argument that he has been making since the early days of the administration that is tantamount to a case that the first part of the test has been met. Download the NBC News app for breaking news and politics "The factual question with respect to Iran's connections to al Qaeda is very real. They have hosted al Qaeda, they have permitted al Qaeda to transit their country,” he said at a Foreign Relations Committee hearing. “There is no doubt there is a connection between the Islamic Republic of Iran and al Qaeda. Period, full stop.” There has been intense debate in recent years about the extent to which the remnants of al Qaeda have found assistance in Iran, with Iran hawks taking the position that the ties are deep and significant and others contending that attempts to link the Shia regime to terrorism carried out by Sunni groups are wrong or disingenuous. But the deployment of more forces to the region to counter the threat of attacks on American personnel and assets, as well as the partial evacuation of the U.S. embassy in Baghdad, could be seen as satisfying the second part of the use-of-force test. That is, the idea that force is appropriate to prevent a terrorist threat from a country that has given assistance to al Qaeda. House Speaker Nancy Pelosi, D-Calif., said last week that she appreciates that Trump has generally been reluctant to go to war and cast his advisers as the drivers of the current escalation of tensions. She said the president doesn't currently have the power to go to war with Iran. “The responsibility in the Congress is for Congress to declare war,” she said. “So I hope the president’s advisors recognize that they have no authorization to go forward in any way. They cannot call the authorization, AUMF, the authorization for the use of military force, that was passed in 2001, as any authorization to go forward in the Middle East now,” Trump himself has left the door open. Asked about the possibility this week, he said, "I hope not." But there's little question that his administration is getting ready — and getting ready to go it alone.
{ "pile_set_name": "OpenWebText2" }
Lawyers Accused of Leaks in Tiger Woods and Elin Nordegren's Divorce Elin's Lawyers Accused of Leaks in Tiger Divorce 5/14/2010 5:15 AM PDT BY TMZ STAFF Things have already gotten nasty in the Tiger Woods divorce. TMZ has learned Tiger's lawyers have accused Elin Nordegren's legal team of leaking like a sieve to the media. Elin's lawyer,Walter H. White, Jr., who practices in London, sent an email to his staff on April 19, 2010 -- an email obtained by TMZ. White warns his people, "Recently we have been accused by the other side of leaking information to the press. While we do not believe that anyone in the firm has been responsible for the leaks, we are aware that this is the second time that we have been so accused ... " White urges his staff to "avoid conversations relating to firm activities in public ..." After we called White on Wednesday and told him we had information he was repping Elin, he sent a staff email saying, "TMZ the web news service has discovered that we in London represent Elin Nordegren ... " The email notes that Elin's sister, Josefin, works at the firm and then boasts, "To some extent it is a surprise and a tribute to the office and the firm that it has taken them so long to figure this out." As we reported yesterday, White was already repping Elin in January -- a month and a half after Tiger's car crash. HERE'S THE RUNDOWN Meredith Viera Defends the Killer of Cecil the Lion Jennifer Beals in a Hot-Dog-in-Car Controversy A 'Bachelorette' Star Gets Bashed in the Head with a Brick Zayn Malik is Goin' Solo Thanks to Simon Cowell
{ "pile_set_name": "Pile-CC" }
Expression of CD95 ligand in melanocytic lesions as a diagnostic marker. CD95 ligand (CD95L) potently induces apoptosis by activating CD95 on target cells. It has recently been reported that melanoma cells in vivo express a significant amount of CD95L, thereby being immediately able to kill CD95-bearing immunocompetent cells specific for cancer antigens, which infiltrate the lesions. In this study, we employed immunohistochemistry using an antibody directed against CD95L to investigate at which stage the melanoma CD95L expression is turned on. Skin biopsies of 49 lesions from 46 patients were assessed. These included benign and dysplastic naevi, melanoma in situ, stage I melanomas (Clark's level 2 or 3), advance-phase melanomas (Clark's level 4 or 5) and lymph node metastases. CD95L was expressed in all of the advance-phase melanomas as well as lymph node metastases of cutaneous origin, whereas neither melanoma in situ, benign naevi nor dysplastic naevi reacted positively with the antibody. To investigate a link between positivity and tumour size, the data were analysed on the basis of Breslow thickness, and indicated that expression was observed only when tumours were thicker than 0.75 mm. We next compared expression of CD95L and HMB-45. CD95L was positive only in melanomas in a more advanced phase than stage I, whereas HMB-45 was not only expressed in melanoma cells but also in benign pigmented naevi. This indicated the advantage of CD95L staining to diagnose melanoma. The present study indicates the significant correlation between tumorigenicity and expression of CD95L, and thereby raises the possibility that CD95L may be a useful diagnostic marker for malignant melanomas.
{ "pile_set_name": "PubMed Abstracts" }
Share this: In the final “The Vampire Diaries” episode of 2010, Michael Trevino gave us a powerful performance as Tyler endured the agony of transforming into a werewolf. When he stopped by our offices on Thursday morning, we had to ask him what he thought of the scene when all was said and done. “I was impressed,” he tells us — and rightfully so. “Coming to L.A. I saw a rough, rough cut of it with Kevin [Williamson] and Julie [Plec]… and then I saw another draft of it when I did the voiceover ADR work for the episode, and it was getting better and better.” It wasn’t until he watched the final cut at home that he got the full impact. “I have a nice little surround system so the sound’s really good. That’s what got me. The CGI, the visual effects were great, and I liked certain cuts that they used within mine and Candice’s performance, but it wasn’t until I was home. It was crazy to hear all the sound they’d put in in post-production — bones cracking and everything.” The idea of watching Tyler experience that kind of excruciating pain every month makes us uneasy — but not as uneasy as it makes Trevino. He confirms that within the often ambiguous “Vampire Diaries” time line there will be one more full moon before Season 2 wraps up, but he hopes it won’t be quite as brutal. “I’m thinking as long as I don’t piss off Kevin and Julie, then maybe they won’t write that,” he laughs. This week, we’ll see Tyler and Caroline’s (Candice Accola) relationship deepen even further after their emotional night together in the Lockwood cellar. “From a standpoint of her being there for me and having my back, as a friend, I love [her] for doing that,” Trevino says. That “as a friend” might deepen when one of the other werewolves fills him in on some missing information. “Through a certain somebody who comes into town he finds out that a werewolf bite can kill a vampire, so then there’s a whole other wave of emotion that comes over him when he hears this news.” As much as we’re on board for a possible Tyler/Caroline romance, we can’t help but feel a little sad for Matt (Zach Roerig). Tyler’s already hooked up with his mom and his sister… and now he’s moving in on the ex? Poor guy. Things will escalate between the two best friends (or former best friends). “In this episode, you’ll see, there’s more emotion coming out of Tyler and there’s more emotion coming out of Matt as well. That’s where there’s going to be this awesome awkwardness,” he says.
{ "pile_set_name": "Pile-CC" }
A simple unified approach for estimating natural direct and indirect effects. An important problem within both epidemiology and many social sciences is to break down the effect of a given treatment into different causal pathways and to quantify the importance of each pathway. Formal mediation analysis based on counterfactuals is a key tool when addressing this problem. During the last decade, the theoretical framework for mediation analysis has been greatly extended to enable the use of arbitrary statistical models for outcome and mediator. However, the researcher attempting to use these techniques in practice will often find implementation a daunting task, as it tends to require special statistical programming. In this paper, the authors introduce a simple procedure based on marginal structural models that directly parameterize the natural direct and indirect effects of interest. It tends to produce more parsimonious results than current techniques, greatly simplifies testing for the presence of a direct or an indirect effect, and has the advantage that it can be conducted in standard software. However, its simplicity comes at the price of relying on correct specification of models for the distribution of mediator (and exposure) and accepting some loss of precision compared with more complex methods. Web Appendixes 1 and 2, which are posted on the Journal's Web site (http://aje.oupjournals.org/), contain implementation examples in SAS software (SAS Institute, Inc., Cary, North Carolina) and R language (R Foundation for Statistical Computing, Vienna, Austria).
{ "pile_set_name": "PubMed Abstracts" }
/* * Copyright (c) 2016, 2018, Oracle and/or its affiliates. All rights reserved. * DO NOT ALTER OR REMOVE COPYRIGHT NOTICES OR THIS FILE HEADER. * * This code is free software; you can redistribute it and/or modify it * under the terms of the GNU General Public License version 2 only, as * published by the Free Software Foundation. * * This code is distributed in the hope that it will be useful, but WITHOUT * ANY WARRANTY; without even the implied warranty of MERCHANTABILITY or * FITNESS FOR A PARTICULAR PURPOSE. See the GNU General Public License * version 2 for more details (a copy is included in the LICENSE file that * accompanied this code). * * You should have received a copy of the GNU General Public License version * 2 along with this work; if not, write to the Free Software Foundation, * Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA. * * Please contact Oracle, 500 Oracle Parkway, Redwood Shores, CA 94065 USA * or visit www.oracle.com if you need additional information or have any * questions. * */ #ifndef SHARE_VM_JFR_RECORDER_CHECKPOINT_TYPES_JFRTHREADSTATE_HPP #define SHARE_VM_JFR_RECORDER_CHECKPOINT_TYPES_JFRTHREADSTATE_HPP #include "memory/allocation.hpp" class JfrCheckpointWriter; class JfrThreadState : public AllStatic { public: static void serialize(JfrCheckpointWriter& writer); }; #endif // SHARE_VM_JFR_RECORDER_CHECKPOINT_TYPES_JFRTHREADSTATE_HPP
{ "pile_set_name": "Github" }
Q: Can I have Gmail overwrite a known email with my contact info when a name is not supplied? I have to admit I was a little confused when I asked this question, as I thought that it was my Gmail where names and email addresses were connected. But of course, it's not the local Gmail client that attaches a name to an email for display when receiving, it's whether or not the sender has a name attached to their email, as explained in the answer. Okay... but, can I set Gmail up in a way so that it will replace a known email address with the name I have for them in my contacts in situations when someone sends me an email with no name set? Or, even better, over rides their name with the one I have set in any case (since I think of them by the name I have set, not what they have set)? This is standard practise when it comes to phone numbers - when someone calls my Android phone, I see the name that I have set in my contact list. Hopefully this could be done with emails as well. A: Currently still no, and probably never. The name that is displayed when you receive an email is the name embedded into that emails from:header. BUT there are two workarounds that I can think of, hopefully one will help you! Use Filters One workaround solution is to filter the email address and apply a label to it. This can help if their name is causing any confusion (eg. I have 4 people called Mike) The Pros of using this is that it will sync across all your computers and devices. Use a Script There is a script called DisplayName gmail that takes the contacts name (the one you have set in your contacts list) and displays that instead of their from: name. You will need to install tampermonkey (Chrome) or greasemonkey (Firefox) and then you can install the script DisplayName gmail (tested and working with chrome). The cons of using a script is that its not going to work across multiple computers - you would need to install the script on each computer you use. And this also work on your phone.
{ "pile_set_name": "StackExchange" }
After spending 10 years in the commercial print and graphic design industry working for big box retailers, James Owens made a decision to start working for himself. In late 2014, he founded Owens Print & Creative Solutions, a company that specializes in the quick turnaround of commercial printing, graphic design, web design and other marketing services for businesses of all sizes. James is also part of JumpStart’s Core City: Cleveland Impact program, an intensive business assistance program designed to support the development and growth of businesses located within some of Cleveland’s most underserved neighborhoods. Technology Highlight Story excerpt provided by The Associated Press. Written by Julie Carr Smyth. A state commission in Ohio plans to take up Republican Gov. John Kasich’s request to invest [...read more] About us TechOhio features the vibrant community of Ohio entrepreneurs and innovators helping grow the state’s technology economy. It shares the breakthrough technologies, cutting-edge research and innovative companies from across the state, with a particular focus on Ohio Third Frontier. The Ohio Third Frontier is a technology-based economic development initiative, and a part of the larger Ohio Development Services Agency.
{ "pile_set_name": "Pile-CC" }
[An antitumor effect of oncolytic adenovirus capable of selectively replicating in CEA-expressing cancer cells and its enhancement by 5-FU]. In recent years, many have focused on the use of oncolytic virus capable of lysing cancer cells by a cancer-selective replication for a new treatment modality of cancer. In the present study, we used oncolytic adenovirus, AdCEAp/Rep, genetically modified to selectively replicate in CEA-expressing cancer cells, and investigated whether AdCEAp/Rep could induce selective cytotoxicity to CEA expressing cancer cells, and where the AdCEAp/Rep induced cytotoxic effect could be enhanced by 5 FU in using human gastric cancer cell lines, MKN45 (CEA-positive) and MKN74 (CEA-negative). The results showed that AdCEAp/Rep showed cytotoxicity against MKN45 in a dose-dependent manner, while it did not against MKN74. Furthermore, 5-FU remarkably enhanced AdCEAp/Rep-induced cytotoxicity against MKN45 by being added 3 days after adenovirus infection. These findings strongly suggest that AdCEAp/Rep may be applicable as a new therapeutic agent for clinical cancers expressing CEA in combination with chemotherapeutic agents such as 5-FU.
{ "pile_set_name": "PubMed Abstracts" }
Mexican venture firm ALL VP has a $73 million first close on its latest fund Buoyed by international attention from U.S. and Chinese investors and technology companies, new financing keeps flowing into the coffers of Latin American venture capital firms. One day after the Brazilian-based pan-Latin American announced the close of its $150 million latest fund comes word from our sources that ALL VP, the Mexico City-based, early stage technology investor, has held a first close of $73 million for its latest investment vehicle. The firm launched its first $6 million investment vehicle in 2012, according to CrunchBase, just as Mexico’s former President Enrique Peña Nieto was coming to power with a pro-business platform. One which emphasized technology development as part of its strategy for encouraging economic growth. ALL VP founding partner Fernando Lelo de Larrea said he could not speak about ongoing fundraising plans. And while the broader economy has stumbled somewhat since Nieto took office, high technology businesses in Mexico are surging. In the first half of 2018, 82 Mexican startup companies raised $154 million in funding, according to data from the Latin American Venture Capital Association. It makes the nation the second most active market by number of deals — with a number of those deals occurring in later stage transactions. In this, Mexico is something of a mirror for technology businesses across Latin America. While Brazilian startup companies have captured 73% of venture investment into Latin America — raising nearly $1.4 billion in financing — Peru, Chile, Colombia and Argentina are all showing significant growth. Indeed, some $188 million was invested into 23 startups in Colombia in the first half of the year. Overall, the region pulled in $780 million in financing in the first six months of 2018, besting the total amount of capital raised in all of 2016. It’s against this backdrop of surging startup growth that funds like ALL VP are raising new cash. Indeed, at $73 million the first close for the firm’s latest fund more than doubles the size of ALL VP’s capital under management. ALL VP management team But limited partners can also point to a burgeoning track record of success for the Mexican firm. ALL VP was one of the early investors in Cornershop — a delivery company acquired by Walmart for $225 million earlier this year. Cornershop had previously raised just $31.5 million and the bulk of that was a $21 million round from the Silicon Valley-based venture capital firm, Accel. International acquirers are making serious moves in the Latin American market, with Walmart only one example of the types of companies that are shopping for technology startups in the region. The starting gun for Latin American startups stellar year was actually the DiDi acquisition of the ride-hailing company 99 for $1 billion back in January. That, in turn, is drawing the attention of early stage investors. In fact, it’s venture capital firms from the U.S. and international investors like Naspers (from South Africa) and Chinese technology giants that are fueling the sky-high valuations of some of the region’s most successful startups. In a market so frothy, it’s no wonder that investment firms are bulking up and raising increasingly large funds. The risk is that the market could overheat and that, with a lot of capital going to a few marquee names, should those companies fail to deliver, the rising tide of capital that’s come in to the region could just as easily come back out.
{ "pile_set_name": "Pile-CC" }
Wien Gegnern der Rundfunkgebühr lassen ARD und ZDF durchaus die Wucht des Gesetzes spüren. Wer die sogenannte Haushaltsgebühr von 17,50 Euro monatlich nicht zahlen will, muss mit bisweilen harten Konsequenzen rechnen. So wurde der Berliner Landesvorsitzenden der rechtspopulistischen AfD, Beatrix von Storch, das Konto gepfändet. „Nun ist es passiert. Die GEZ hat zugeschlagen und mein Konto gepfändet. Am 1. April, wie ich gerade erfahre...“, teilte die geborene Herzogin von Oldenburg per Kurznachrichtendienst Twitter mit. Von Storch war seit der Umstellung der Geräte- auf die Haushaltsgebühr eine Totalverweigerin, wie ein Parteisprecher in Berlin mitteilte. Demnach hätte die Beitragszentrale von ARD, ZDF und Deutschlandradio einen Betrag von rund 240 Euro bei der Rechtspolitikerin gepfändet. Wenn Rundfunkgebühren nicht bezahlt werden Mehrstufiges Mahnverfahren Rundfunkbeiträge - zur Zeit 17,50 Euro pro Wohnung im Monat - müssen nach den gesetzlichen Regelungen alle drei Monate bezahlt werden. Wird der Beitrag nicht zum fälligen Zeitpunkt entrichtet, beginnt nach Angaben des Beitragsservice von ARD, ZDF und Deutschlandradio ein mehrstufiges schriftliches Mahnverfahren. Zahlungserinnerung Es startet mit einer Zahlungserinnerung. Sollte weiter keine Zahlung erfolgen, gibt es weitere Schreiben wie Beitragsbescheide und ein Mahnschreiben. Vollstreckungsersuchen Die letzte Stufe dieses Mahnverfahrens ist das Vollstreckungsersuchen, das die zuständige Landesrundfunkanstalt bei der örtlichen Vollstreckungsbehörde stelle. Die Zuständigkeiten in den Bundesländern sind bei Vollstreckungen je nach Landesgesetz unterschiedlich geregelt. Es können zum Beispiel die Finanzämter, die Kommunen oder auch Gerichtsvollzieher tätig werden. Von Kontenpfändungen bis zur Erzwingungshaft Mögliche Maßnahmen reichen zum Beispiel von Kontenpfändungen bis zur Erzwingungshaft. So gab die Berliner AfD-Landesvorsitzende Beatrix von Storch bei Twitter bekannt, dass ihr das Konto gepfändet wurde, weil sie keinen Rundfunkbeitrag gezahlt hat. Eine Frau aus dem thüringischen Geisa saß zwei Monate in Erzwingungshaft, weil sie seit 2013 keinen Beitrag für die öffentlich-rechtlichen Sender gezahlt und sich auch geweigert hatte, dem Gerichtsvollzieher eine Vermögensauskunft zu geben. Bundesweite Statistiken über die Art und Zahl von Vollstreckungsverfahren bei Rundfunkbeiträgen gibt es nicht. Quelle: dpa Eine „GEZ-Verweigerin“ aus Thüringen ging aus Protest gegen die Zwangsgebühren für ARD und ZDF sogar für 61 Tage in Erzwingungshaft. Die frühere Kindererzieherin saß von Anfang Februar bis zum Montag dieser Woche im Frauengefängnis von Chemnitz. „Mit meiner Unterschrift würde ich die Rechtmäßigkeit der Zwangsgebühren bestätigen. Das will ich nicht, denn ich kann nicht verantworten, dass ich diesen Rundfunk mitfinanziere“, sagte sie der „Welt“. In der Justizvollzugsanstalt war sie allerdings vom Rundfunkbeitrag befreit. Nun zog der MDR seinen Antrag auf Erlassung eines Haftbefehls gegen die Thüringerin überraschend zurück. Seit Montag ist die Frau wieder auf freiem Fuß. Die 46-Jährige hatte sich seit 2013 geweigert, für ARD, ZDF und Deutschlandradio zu zahlen. Nach Angaben des Amtsgerichts Bad Salzungen belaufe sich der Zahlungsrückstand auf rund 191 Euro. „Der Anspruch ist erst in 30 Jahren verjährt“, sagte ein Gerichtssprecher. Der radikale Schritt der Thüringerin wurde nach Angaben der „GEZ-Verweigerin“ durch die Lektüre der Doktorarbeit der früheren NDR-Mitarbeiterin Anna Terschüren mit dem Titel „Reform der Rundfunkfinanzierung in Deutschland“ ausgelöst. Terschüren warnt unterdessen auf Twitter: „Ich rate in keiner Weise zur Zwangsverweigerung der Rundfunkgebühren oder anderen Handlungen/Unterlassungen.“ Die Rundfunkgebühr, die alle Bürger und Unternehmen verpflichtend monatlich zahlen, unabhängig davon, ob sie die Angebote von ARD und ZDF im Fernsehen, Radio oder Internet nutzen, bescherte den öffentlich-rechtlichen Anstalten zuletzt Rekordeinnahmen von 8,3 Milliarden Euro. Die Höhe der Rundfunkgebühren wird von der Unabhängigen Kommission zur Ermittlung des Finanzbedarfs der Rundfunkanstalten (KEF) vorgeschlagen und von den Parlamenten der 16 Bundesländer verabschiedet. Um die Abgabe populärer zu machen, wurde die bei vielen Bürgern verhasste GEZ in „ARD ZDF Deutschlandradio Beitragsservice“ umbenannt. Doch die Namensänderung hat wenig gefruchtet.
{ "pile_set_name": "OpenWebText2" }
Article content By Jordan Press OTTAWA — The government’s omnibus crime bill was being pushed through its final test in the Senate for no good reason, Liberal senators charged Thursday. We apologize, but this video has failed to load. tap here to see other videos from our team. Try refreshing your browser, or Omnibus crime bill rushed through Senate, Liberal senators say Back to video Their words, however, were unable to change the trajectory of the bill’s path to becoming law, as the Conservatives used their majority in the Senate to give final approval — by a vote of 48 to 37 — to the bill before it returns to the House of Commons. Once in the Commons, MPs would have to approve the six changes Conservative senators made to the bill that more clearly define terrorism activities and how victims of terrorism can sue groups or states that support terrorism. Bill C-10, the Safe Streets and Communities Act, passed its final vote in the Senate at about midnight Friday. [np-related] The Conservatives used their majority to limit debate on the bill to six hours, much to the chagrin of the opposition Liberals. Only one Conservative voted against limiting debate: Sen. Pierre Nolin. Mr. Nolin was also expected to vote against final passage of the bill.
{ "pile_set_name": "OpenWebText2" }
Fourteen US and Canadian cancer institutes will use International Business Machines Corp.’s Watson computer system to choose therapies based on a tumor’s genetic fingerprints, the company said on Tuesday, the latest step toward bringing personalized cancer treatments to more patients. Oncology is the first specialty where matching therapy to DNA has improved outcomes for some patients, inspiring the “precision medicine initiative” President Barack Obama announced in January. But it can take weeks to identify drugs targeting cancer-causing mutations. Watson can do it in minutes and has in its database the findings of scientific papers and clinical trials on particular cancers and potential therapies. Faced with such a data deluge, “the solution is going to be Watson or something like it,” said oncologist Norman Sharpless of the University of North Carolina Lineberger Cancer Center. “Humans alone can’t do it.” IBM is positioning Watson for exactly this task: an area of medicine where humans can see the vast potential, but can’t begin to wrangle the data needed to achieve it. “Genomics is the secret to unlocking personalized medicine,” said Steve Gold, a Vice President of the IBM Watson Group, at a press conference on Tuesday. Yet it is unclear how many patients will be helped by such a “big data” approach. For one thing, in many common cancers old-line chemotherapy and radiation will remain the standard of care, and genomic analysis may not make a difference. The scientists directly involved with Watson aren’t making any promises, but they’re hopeful they can slowly begin to make a difference in the world of cancer treatment, which today leaves a great number of patients without many good options. “Traditional cancer treatments are moderately effective, associated with moderate toxicity, and many patients still succumb to the disease,” said Lukas Wartman, assistant director of Cancer Genomics at Washington University and a leukemia survivor, at Tuesday’s press conference. “There’s been a lot of pessimism among those [fighting] cancer, and Watson offers an opportunity to fight back against that pessimism.” Cloud-based Watson will be used at the centers – including Cleveland Clinic, Fred & Pamela Buffett Cancer Center in Omaha and Yale Cancer Center – by late 2015, said Steve Harvey, vice president of IBM Watson Health. The centers pay a subscription fee, which IBM did not disclose. Oncologists will upload the DNA fingerprint of a patient’s tumor, which indicates which genes are mutated and possibly driving the malignancy. Watson, recognized broadly for beating two champions of the game show Jeopardy! in 2011, will sift through thousands of mutations and try to identify which is driving the tumor, and therefore what a drug must target. Distinguishing driver mutations from others is a huge challenge. IBM spent more than a year developing a scoring system so Watson can do that, since targeting non-driver mutations would not help. “Watson will look for actionable targets,” Harvey said, matching them to approved and experimental cancer drugs and even non-cancer drugs (if Watson decides the latter interfere with a biological pathway driving a malignancy). But Watson has trouble identifying actionable targets in cancers with many mutations. Although genetic profiling is standard in melanoma and some lung cancers, where drugs such as Zelboraf from the Genentech unit of Roche Holding AG target the driver mutation, in most common tumors traditional chemotherapy and radiation remain the standard of care. “When institutions do genetic sequencing, only about half the cases come back with something actionable,” Harvey said, often because it is impossible to identify the driver mutation or no targeted therapy exists. The other collaborating centers are Ann & Robert H. Lurie Children’s Hospital of Chicago; BC Cancer Agency in British Columbia; City of Hope, in Duarte, California; Duke Cancer Institute in North Carolina; McDonnell Genome Institute at Washington University in St. Louis; New York Genome Center, Sanford Health in South Dakota; University of Kansas Cancer Center; University of Southern California Norris Comprehensive Cancer Center, and University of Washington Medical Center. A new bipartisan committee’s working group will gather on Capitol Hill throughout the coming months to find ways to improve electronic health records, according to Senate health committee chairman Lamar Alexander (R-Tenn.) and ranking member Patty Murray (D-Wash.). The group will work to find five or six ways to “make the failed promise of electronic health records something that physicians and providers look forward to instead of something they endure,” Murray said in an announcement. All members of the Senate health committee are invited to be a part of the working group. Staff meetings begin this week, with participation from health IT professionals, industry experts and government agencies. The working group’s goals include the following: Help providers improve quality of care and patient safety. Facilitate interoperability between EHR vendors. Empower patients to engage in their own care through access to their health data. Protect privacy and security of health information. The working group isn’t the only way Alexander and Murray are pushing for change when it comes to EHRs. Should drug makers be required to disclose their costs to justify rising prices? This is what a growing number of state legislatures are considering. Over the past several weeks, lawmakers in a handful of states stretching from California to Massachusetts have introduced bills in a bid to force the pharmaceutical industry to conduct an economic striptease. “We need to have some transparency,” says Tony DeLuca, a Democrat who chairs the Pennsylvania House Insurance Committee and who introduced one such bill earlier this week. “Some of the sticker prices are outrageous. I’m hoping it achieves lower health care costs.” The bills are not wholly identical. Some would require drug makers to report profits and various operational costs for any medicine that has a price tag of more than $10,000 a year, while others seek this information for all medicines, regardless of price. A bill was also introduced in North Carolina. The effort comes as a national debate intensifies over prices for prescription medicines. Over the past year, payers – both public and private – have remonstrated over the cost of new specialty drugs for hard-to-treat ailments and for older generic drugs that were supposed to offer low-cost alternatives. A new poll by the Kaiser Family Foundation found that 76% of Americans overall – and across party lines – say their top health care priority is ensuring that high-cost drugs for chronic conditions, such as HIV, hepatitis, mental illness and cancer, are affordable. The issue is placing drug makers on the defensive, even as they argue pricey new medicines – notably, those for combating hepatitis C and certain rare diseases – represent good value for illnesses that would, otherwise, cost more to treat in the long run. These bills represent a new front, though, in trying to blunt escalating price tags. And the legislation is winning enthusiastic backing from business groups, consumers advocates and health insurers, which some legislators say have helped craft language. “This is about starting a conversation,” says Charles Bacchi, chief executive at the California Association Plans, which worked with a California legislator on one bill. “We need real answers about why these drugs are priced so high. Yes, there are limits to what a state can do, but it’s a debate we need to have.” To what extent these bills may succeed is uncertain, at best. Drug makers, not surprisingly, are pushing back and recently helped defeat legislation in Oregon. Earlier this week, the pharmaceutical industry trade group testified against the bill in California, where a vote was postponed until next week in light of opposition, according to a legislative aide. As far as drug makers are concerned, the bills are not only onerous, but make demands they maintain cannot be met. For instance, an industry trade group argues that providing development costs for some drugs may be impossible when research was simultaneously conducted on other medicines that failed. The bottom line, says the California Healthcare Institute, is that the bill would “stifle innovation.” “The price charged for an individual drug is not a reflection of development costs,” says Ken Kaitin, director of the Tufts Center for the Study of Drug Development, which receives pharmaceutical industry backing. “Pricing strategies are based on therapeutic value, market size, usage, patent life, competition and other factors.” Even if one or more bills were to become law, there is no certain path toward lowering prices. But the effort may resonate around the country, especially with the 2016 presidential campaign under way. “This may be a model that other governments may want to build upon,” says Jamie Love of Knowledge Ecology International, a non-profit group that tracks access to medicines issues. “While it is too soon to know if this prescription transparency legislation will continue to expand this year,” says Richard Cauchi, the program director for health insurance, financing and pharmaceuticals at the National Conference of State Legislatures, “state legislators often do look at what their colleagues in other states are doing.” Most hospitals don’t have good ways of measuring the complex costs associated with an individual patient’s stay in the hospital. The VA is one surprising exception. The success of health reform in the US depends on finding ways to control the growth of costs. Hospital care is expensive. And when patients have to be readmitted unexpectedly after discharge, it can really crank up spending. As we strive to keep health care costs in line, reducing hospital readmissions is drawing a lot of attention. Reducing preventable readmissions could reduce health care spending and improve quality of care at the same time. But very little research on readmission costs has been done. An exception is a study that found that one in five elderly Medicare patients is readmitted to the hospital within 30 days of being discharged, at an estimated cost of $17.4 billion in 2004. Most hospitals don’t have good ways of measuring the complex costs associated with an individual patient’s stay in the hospital. But there is, however, a hospital system that does a very good of job of tracking these costs: the Veterans Health Administration. Veterans Affairs could provide a blueprint The Veterans Health Administration (the VA) operates 119 acute care hospitals across the US, and has created an unparalleled comprehensive patient-cost accounting system, its Decision Support System (DSS). The DSS works from the bottom up by summing the individual resources and costs each individual patients winds up needing during their hospital stay. Unlike most other hospital accounting systems, the VADSS also can separate costs that are fixed regardless of the volume of services provided, such as administrative overhead, from costs that vary with service volume, such as lab tests or imaging. All of this means that the VA can track patients’ costs with greater precision than most hospitals, and can more easily see the cost of readmissions. There are other reasons why VA is a good setting for studying readmission costs. VA hospitals have a simpler set of incentives around readmitting patients. Under Medicare, hospitals face a trade-off between receiving payments for readmitting Medicare patients and avoiding payment penalties for not readmitting patients under the new ACA regulations. But in the VA system, budgets are set annually, so there is no financial incentive to readmit patients. It will not increase the amount of money VA hospitals get. And physicians who work in VA hospitals are salaried VA employees. They do not gain financially when they readmit patients, so they have no incentive to provide unnecessary care. How much money does preventing readmission save? In a recent study, Theodore Stefos and I used 2011 Decision Support System data to examine the component of cost that varies with a readmission, to provide hospital managers with a more realistic estimate of how much they could save by reducing readmissions. We found that managers could expect to save $2,140 for the average 30-day readmission prevented. For heart attack, heart failure, and pneumonia patients, expected readmission cost estimates were higher: $3,432, $2,488 and $2,278 respectively. We also found that patients’ risk of illness was the main driver of expected readmission cost. This is an important finding for managers. Even though this is a factor they cannot control, they can expect that patients with a greater risk of illness might be at greater risk after controlling for other factors such as age. Men also were much more likely to be readmitted than women, as were lower income and unmarried vets. Understanding this information can help hospital managers better predict which patients are at risk for readmission, and to take steps to address this proactively. While the VA has some processes of care that differ from other health care systems, its experience has important lessons for private sector hospitals, especially for those that treat a high share of chronically ill or low-income patients. Why it is important to know what readmissions cost Today hospitals are under increasing pressure to curb readmissions. For instance in 2013 Centers for Medicare & Medicaid Services (CMS) started to financially penalize hospitals for 30-day readmissions that exceed national averages for heart attack, heart failure and pneumonia. As of October 2014, chronic obstructive pulmonary disorder and elective knee and hip replacements are also being targeted and the penalty has increased up to 3% of the total Medicare reimbursement to the hospital. Hospital managers would like to know what actual cost savings are when a readmission is avoided, so they can understand how readmissions affect their overall budgets. IBM is taking its Watson artificial-intelligence technology into health care in a big way with industry partners, a pair of acquisitions and an ambitious agenda. The initial three industry partners are Apple, Johnson & Johnson and Medtronic. On Monday afternoon, after the close of stock trading, IBM also announced it would buy two start-ups: Explorys, a spin-off from the Cleveland Clinic whose data on 50 million patients is used to spot patterns in diseases, treatments and outcomes; and Phytel, a Dallas maker of software to manage patient care and reduce readmission rates to hospitals. The IBM plan, put simply, is that its Watson technology will be a cloud-based service that taps vast stores of health data and delivers tailored insights to hospitals, physicians, insurers, researchers and potentially even individual patients. “We’re going to enable personalized health care on a huge scale,” said John E. Kelly, a senior vice president who oversees IBM’s research labs and new initiatives. To date, IBM has done some individual projects using Watson technology with leading medical centers, including Memorial Sloan Kettering Cancer Center in New York, the University of Texas MD Anderson Cancer Center in Houston and the Cleveland Clinic. But the creation of the Watson Health unit, Mr. Kelly said, is an effort to apply the technology to the mainstream of health care. The Watson Health announcement is also the latest in flurry of initiatives IBM has announced this year that include new corporate partnerships as well as moves in cloud computing, data analytics and Watson. They are evidence that IBM is intent on investing for future growth, and showing it is doing so, in a year when its financial performance is likely to lag. IBM has reported disappointing earnings recently, and Virginia M. Rometty, IBM’s chief executive, has told industry analysts and investors that 2015 would be a transition year in which new growth businesses like Watson did not yet overcome the profit erosion in some of its traditional hardware and software products. IBM’s broad vision of combining and analyzing health data from varied sources to improve care has been around for decades. But the company and its partners say that technology, economics and policy changes are coming together to improve the odds of making the IBM venture a workable reality. They point to improvements in artificial intelligence, low-cost cloud computing and health policy that will reward keeping patients healthy instead of the fee-for-service model in which more treatments and procedures mean more revenue. “Forces in health care are aligning as never before,” said Sandra E. Peterson, a group worldwide chairman at Johnson & Johnson in charge of information technology and new wellness programs. “It could be a unique moment and something like this could have real legs.” A focus of the Johnson & Johnson partnership with IBM will be improving patient care before and after knee and hip replacements. The company will apply Watson technology to data sources ranging from patient records to digital fitness devices and smartphone applications, which can monitor movement and vital signs. “It will allow us to do much more integrated, personalized care,” Ms. Peterson said. Medtronic, a large medical equipment maker, wants to use data intelligently to treat diabetes patients beyond providing them with its glucose monitors and insulin pumps. Medtronic devices are already digital and produce a lot of data, but the company plans to use the Watson software to spot patients trending toward trouble and automatically adjust insulin doses and send alerts to care providers and the patients themselves. “The goal is dynamic, personalized care plans so you can delay or stop the progression of diabetes,” said Hooman Hakami, executive vice president in charge of Medtronic’s diabetes group. Apple is increasingly a major supplier of health sensors, from iPhone apps to the Apple Watch. Its recently introduced HealthKit and ResearchKit software make it easier for applications and researchers to harvest health information from millions of owners of Apple products, with their permission. That data can now be plugged into Watson. “We want to be the analytics brains behind HealthKit and ResearchKit,” Mr. Kelly said. The IBM initiative raises questions on how data is handled and about privacy. Mr. Kelly said the data scrutinized by Watson will typically be anonymized and often be read by Watson but not removed from hospital or health company data centers. “There will be no big, centralized database in the sky,” Mr. Kelly said. Even critics of health information technology say the IBM effort holds promise. “If that future when all this stuff works is going to become real, then having some of the key players come together is the only way it’s going to happen,” said Dr. Robert M. Wachter, a professor at the University of California, San Francisco medical school and author of “The Digital Doctor: Hope, Hype and Harm at the Dawn of Medicine’s Computer Age.” “This could be a pretty important step along the way.” Last year, the fallout from a string of breaches at major retailers like Target and Home Depot had consumers on edge. But 2015 is shaping up to be the year consumers should be taking a closer look at who is guarding their health information. Data about more than 120 million people has been compromised in more than 1,100 separate breaches at organizations handling protected health data since 2009, according to Department of Health and Human Services data reviewed by The Washington Post. “That’s a third of the U.S. population — this really should be a wake-up call,” said Deborah Peel, the executive director of Patient Privacy Rights. The data may double-count some individuals if they had their information compromised in more than incident, but it still reflects a staggering number of times Americans have been affected by breaches at organizations trusted with sensitive health information. And the data does not yet reflect the hack of Premera, which announced this week that hackers may have accessed information, including medical data, on up to 11 million people. Most breaches of data from health organizations are small and don’t involve hackers breaking into a company’s computer system. Some involve a stolen laptop or the inappropriate disposal of paper records, for example — and not all necessarily involve medical information. But hacking-related incidents disclosed this year have dramatically driven up the number of people exposed by breaches in this sector. When Anthem, the nation’s second-largest health insurer, announced in February that hackers broke into a database containing the personal information of nearly 80 million records related to consumers, that one incident more than doubled the number of people affected by breaches in the health industry since the agency started publicly reporting on the issue in 2009. “We are certainly seeing a rise in the number of individuals affected by hacking/IT incidents,” Rachel Seeger, a spokesperson for HHS’s Office for Civil Rights, said in a statement. “These incidents have the potential to affect very large numbers of health care consumers, as evidenced by the recent Anthem and Premera breaches.” And some cybersecurity experts warn this may only be the beginning. “We’re probably going to see a lot more of these happening in the coming few months,” said Dave Kennedy, the chief executive of TrustedSEC. Health organizations are targets because they maintain troves of data with significant resale value in black markets, Kennedy said, and their security practices are often less sophisticated than other industries. Now that some major players in the market have come forward as victims of cyberattacks other organizations are likely to take a close look at their own networks — potentially uncovering other compromises, he said. “The information that companies like Anthem and Premera had is more valuable than just payment card information held by retailers or financial institutions,” said Scott Vernick, who heads up the data security and privacy practice at law firm Fox Rothschild. Credit card information has a relatively short shelf life, with new cards issued on a regular basis, he explained. But a health organizations often have complete profiles of people including Social Security numbers and medical health information that is much more difficult if not impossible to change. Some of the data can be used to pursue traditional financial crimes — like setting up fraudulent lines of credit, Kennedy said. But it can also be used for medical insurance fraud, like purchasing medical equipment for resale or obtaining pricey medical care for another person. This type of scheme is often not caught as quickly as financial fraud, experts said, and could have a lasting affect if it results in a person’s medical history containing false information. “In theory you could end up in an emergency situation, and if your records are contaminated by someone else’s information that could cause serious problems — like medical professionals believing you have a different blood type,” said Peel. If a hacker is able to obtain information about a person’s medical condition, as it appears may have happened in the Premera breach but not the Anthem breach, there are additional risks. Information about mental health or HIV treatments could be made public, and there’s no way to truly make the information private again. “There’s almost no way to remedy this; there’s no recourse,” said Peel. Health care providers already have to comply with government rules on protecting patient privacy, including HIPAA, which are enforced by HHS. “Health care organizations need to make data security central to how they manage their information systems and to be vigilant in assessing and addressing the risks to data on a regular basis,” said Seeger, the HHS official. “In addition, organizations need to ensure they are able to identify and respond appropriately to security incidents when they do happen to mitigate harm to affected individuals and prevent future similar incidents from occurring.” State-level officials are also increasingly involved in enforcement in this area, said Vernick, and consumers may have additional legal avenues depending on state laws. But privacy and cybersecurity advocates say the industry and the government still aren’t doing enough to protect consumers. “HIPAA required security be addressed, but it wasn’t spelled it out exactly how, so there was no culture of using ironclad security,” said Peel. “We have systems that are engineered as though this data is not sensitive and valuable.” Health organizations sometimes rely on legacy systems, and some have not invested in cybersecurity at a rate that matches the urgency of the threats they face, Kennedy said. “The medical industry is years and years behind other industries when it comes to security.” Even before the Anthem breach, major health insurers had become aware of the rising risk of cyberattacks. Aetna and United Health Group both cited the risks of hackers and breaches in their respective 2013 financialreports. And the industry is already taking steps to coordinate how it responds to such incidents through groups designed to share information about digital threats — like the National Health Information Sharing and Analysis Center, or NHISAC. The organization is one of several efforts related to critical infrastructure that works with the Department of Homeland Security to share data about current threats, such as what sort of tactics are used and forensic information about attackers. Members are able to share details about security incidents in “machine time” using an automated system, according to NHISAC executive director Deborah Kobza, and the group sends out daily threat updates. When a major cyberattack is disclosed, NHISAC erupts into a flurry of activity — trying to find out as much as possible so its members have information that can make it easier to see if they’ve been the victims of a similar attack. And 2015 has already kept NHISAC busy: “We just caught our breath from the Anthem hack, and here we go again,” said Kobza about responding to the Premera breach. The Centers for Medicare & Medicaid Services has paid out nearly $30 billion in meaningful use incentives for hospitals and physicians to adopt EHRs. But some members of Congress, the body that approved those funds, are about as frustrated with EHRs as doctors and nurses. “The evidence suggests these goals haven’t been reached,” said Senator Lamar Alexander, R-Tennessee, in a long EHR hearing followed by Erin McCann, Healthcare IT News managing editor. Robert Wergin, MD, president of the American Academy of Family Physicians, said that family physicians are having a difficult time with the Stage 2 meaningful use requirements. The “time, expense and effort it takes makes it not worth while,” said Wergin. Indeed, some 55 percent of physicians surveyed plan on skipping Stage 2 all together. “The issue of interoperability between electronic health records represents one of the most complex challenges facing the healthcare community,” said Wergin. The government “must step up efforts to require interoperability.” A central problem, as McCann wrote, is that “Vendors have no incentive to share data and create more interoperable systems. There’s the question of data ownership here. There’s the question of competition. And there’s the question of standards, or lack thereof.” “The vendors are siloed,” as Wergin said. “And you’re held somewhat hostage by the vendor you have.”
{ "pile_set_name": "Pile-CC" }
Fourth Court of Appeals San Antonio, Texas MEMORANDUM OPINION No. 04-18-00814-CR IN RE Matthew Paul SURBER Original Mandamus Proceeding 1 PER CURIAM Sitting: Karen Angelini, Justice Patricia O. Alvarez, Justice Luz Elena D. Chapa, Justice Delivered and Filed: November 7, 2018 PETITION FOR WRIT OF MANDAMUS DENIED Relator filed a petition for writ of mandamus complaining the trial court has refused to rule on his motion for nunc pro tunc requesting jail-time credit. To establish a right to mandamus relief in a criminal case, the relator must show the trial court violated a ministerial duty and there is no adequate remedy at law. In re State ex rel. Weeks, 391 S.W.3d 117, 122 (Tex. Crim. App. 2013) (orig. proceeding). A trial court has a ministerial duty to rule on a properly-filed and timely-presented motion. See In re State ex rel. Young v. Sixth Judicial Dist. Court of Appeals, 236 S.W.3d 207, 210 (Tex. Crim. App. 2007) (orig. proceeding). However, a relator has the burden of providing this court with a record sufficient to establish his right to mandamus relief. See TEX. R. APP. P. 52.7(a)(1) (requiring relator to file “a 1 This proceeding arises out of Cause No. 13-0772-CR-A #4, styled The State of Texas v. Matthew Paul Surber, pending in the 2nd 25th Judicial District Court, Guadalupe County, Texas, the Honorable W.C. Kirkendall presiding. 04-18-00814-CR certified or sworn copy of every document that is material to the relator’s claim for relief and that was filed in any underlying proceeding”). In a case such as this one, a relator has the burden to provide the court of appeals with a record showing the trial court was made aware of the motion at issue and that such motion has not been ruled on by the trial court for an unreasonable period of time. See In re Gallardo, 269 S.W.3d 643, 645 (Tex. App.—San Antonio 2008, orig. proceeding). Attached to relator’s petition is a copy of a May 4, 2018 file-stamped copy of relator’s Motion for Nunc Pro Tunc. However, the mandamus record does not contain copies of any letters sent to the trial court or the appropriate court coordinator asking the trial court to rule on his pending motion. Relator must show the matter was brought to the attention of the trial court. In re Hearn, 137 S.W.3d 681, 685 (Tex. App.—San Antonio 2004, orig. proceeding); see also In re Bonds, 57 S.W.3d 456, 457 (Tex. App.—San Antonio 2001, orig. proceeding) (conditionally granting petition for writ of mandamus where record reflected relator filed motion and called motion to court’s attention by letter). “Merely filing the matter with the district clerk is not sufficient to impute knowledge of the pending pleading to the trial court.” Hearn, 137 S.W.3d at 685. Because relator has not demonstrated the trial court is aware of his pending motion, we must deny his petition. PER CURIAM Do not publish -2-
{ "pile_set_name": "FreeLaw" }
February’s Quick Look I didn’t read as many books this month, and the books I read were a bit disappointing. I did stumble over a lot of great articles, magnificent poetry, and if you need an audio alternative, I’ve got you covered. A glimpse of my February mental space: Books You Play The Girl by Carina Chocano – This took a while longer to read than I had planned. You can read the full review here. It helped me learn to look at pop-culture more critically, and that we forget so much, so fast. This book was at its best for me when the author was teaching me history. 2/5 Frost & Fire by Roger Zelazny – You can read my thoughts on Zelazny‘s Nine Princes in Amber and then see why I considered his writing might need a second look – a chance at redemption. My favorite part of this short story collection was his introduction and the craft bits scattered between the stories. You can read my disappointment here. 2/5 Sabriel by Garth Nix – I put this one down at pg. 233, which is past the halfway point. I have lots of complaints about this one, but mainly I just didn’t care about the story. 2/5
{ "pile_set_name": "Pile-CC" }
Increased indoor thoron concentrations and implication to inhalation dosimetry. Increased concentrations of thoron (220Rn) and its progenies were recently measured in traditional residential dwellings and gave rise to concern about thoron dose assessment. A compartment model for the attached and unattached thoron progenies in the human body by inhalation was adapted, applied to individual measurements and examined in regard to model parameters. It was found that the lung dose is the dominant contribution to the thoron effective dose in spite of the transfer of 212Pb to other tissue. The organ equivalent dose and effective dose coefficients may change by about a factor of 2 within the 0.0-0.2 range of the unattached fraction. A decrease of the dissolution half-life of the inhaled particles in the lungs by a factor of 10 results in a decrease of the effective dose by <50%. Individual measurements of total concentration and unattached fraction result in a mean dose conversion factor of 1.3 Sv per Jhm(-3) and a mean annual dose to the residents of 11 mSv for permanent stay.
{ "pile_set_name": "PubMed Abstracts" }
Q: iOs: How to change color of "more" back button when having more than 5 tabs I have an application with 6 tabs, so the system automatically generates the first 4 tabs and a fifth tab called "Altro" ("More" in italian) that contains the previous fifth and sixth tab content. This is ok. The problem is that i don't know how to change the color of the back button when going through the "altro" tab. Any advice? Some screenshot for a better explanation of the problem: A: UIImage *buttonImage = [UIImage imageNamed:@"back_btn.png"]; UIButton *button = [UIButton buttonWithType:UIButtonTypeCustom]; [button setImage:buttonImage forState:UIControlStateNormal]; button.frame = CGRectMake(0, 0, buttonImage.size.width/2, buttonImage.size.height/2); [button addTarget:self action:@selector(backPressed) forControlEvents:UIControlEventTouchUpInside]; UIBarButtonItem *customBarItem = [[UIBarButtonItem alloc] initWithCustomView:button]; self.navigationItem.leftBarButtonItem = customBarItem; Try this.......once
{ "pile_set_name": "StackExchange" }
1. Introduction =============== Airway stenosis is a potentially life-threatening condition, which may be caused by tumor invasion or benign diseases, such as, endotracheal intubation injury, endobronchial tuberculosis, and thoracic trauma. Most of these patients may be too sick to undergo definitive open surgery or may not be willing to undergo surgery under general anesthesia.^\[[@R1]\]^ Conservative treatment simply assists in alleviation of airway symptom, but show no curative effect on airway stenosis. Since first adoption of metal stents to treat bronchial obstruction, the airway stent has become an effective method for airway stenosis^\[[@R2]--[@R5]\]^ and has been widely used in clinical practice. Complications of airway stent include stent restenosis caused by tumor or granulation tissue, stent fracture, and stent migration.^\[[@R6]\]^ Stent removal may become necessary if these complications result in airway obstruction or injury. Endoscopic removal of airway stent has been reported in small series.^\[[@R7],[@R8]\]^ However, few studies have described the techniques and complications of fluoroscopic removal of airway stent. The safety and efficacy of fluoroscopic stent removal and the optimal safe duration of stent implantation have not been determined. We report clinical results in fluoroscopic removal of airway stents for airway stenosis over a 6-year period. 2. Materials and methods ======================== 2.1. Patients ------------- This study was approved by the Ethics Committee and Medical Records Management Section of our university. The written informed consents were obtained from all patients or their parents if the patients are less than 18 years old. We conducted a retrospective analysis of 67 patients who underwent fluoroscopic stent removal due to patient\'s refusal of surgery and general anesthesia from March 2011 to April 2017. All the patients were enrolled after chest computed tomography (CT) examination. The inclusion criteria included all patients with benign airway stenosis, and dyspnea had been significantly alleviated and needed planned removal. Following doctor\'s advice, they admitted to hospital for stents removal to avoid long-term complications, with no obvious symptom or sign (planned removal). Patients show complications after stenting such as intolerance of stenting, stent migration, excessive tissue hyperplasia, inadequate expansion and deformation, and strut fracture. New airway stents are needed to replace the original stents, such as bare stents placed under emergency situation will be removed and the covered airway stents will be replaced when the patient\'s condition is stable. The exclusion criteria included patients with advanced malignant tumors with a survival time of less than 3 months and no obvious stent complications; patients with severe visceral dysfunction who unable to withstand the stent removal procedure; patients refused to remove the stent (Fig.1). ![Schematic diagram of this study.](medi-99-e18627-g001){#F1} 2.2. Technical details of fluoroscopic removal ---------------------------------------------- All patients underwent chest CT scans with/without bronchoscopy before stent removal (Fig. [2](#F2){ref-type="fig"}). Under conscious situation, balloon dilatation of airway stent was performed immediately after stenting due to insufficient expansion (n = 11) and before stent implantation or removal due to severe airway stenosis (n = 24). All self-expandable metal airway stents were designed and manufactured by Micro-Tech Co Ltd (Nanjing, China). Airway metal stent was woven with a temperature-memory nickel--titanium alloy wire, which was visible on fluoroscopy. In an emergency, we placed 6 bare stents to immediately relieve severe dyspnea and avoid asphyxia. Seventy covered stents were used in nonemergency situations. All airway stents were removed transorally under fluoroscopy and local anesthesia via lidocaine. Bronchoscopy was not performed during the removal, which might use after the operation if removal failed. The patient took the supine position and the head was faced toward the operator to prevent asphyxiation. A 5F vertebral artery catheter (Cook Corporation, Bloomington, IN) was advanced along a 0.035 inch stiff hydrophilic guide wire (Cook Corporation), then 2% lidocaine was injected through vertebral artery catheter for topical anesthesia. A 10-14F long sheath was inserted via the stiff hydrophilic guide wire, and an extractive hook was then inserted. The tip of hook was placed next to the airway stent to withdraw the airway stent (Fig. [3](#F3){ref-type="fig"}). The sputum aspiration tube was advanced for maintaining airway patency and sputum drainage. ![Chest CT scans for airway. A severe stenosis was induced by tracheotomy and tracheal T tube implantation (A), which was dilated after stenting (B) and stent removal (C). CT = computed tomography.](medi-99-e18627-g002){#F2} ![Fluoroscopic treatments for airway stenosis with airway stents. Pre-dilation of severe stenosis caused by tracheotomy with a balloon (A), and then a straight airway stent was implanted (B). A long sheath was inserted via the stiff hydrophilic guide wire, and an extractive hook was then inserted, with the tip of hook was placed next to the airway stent (C). Airway stent was withdrawn successfully by extractive hook (D).](medi-99-e18627-g003){#F3} 2.3. Complications of stent removal and follow up ------------------------------------------------- All complications were scored and analyzed. Patients were followed up once a month within 3 months after stent placement, and every 2 months thereafter. If symptoms flared as needed, patients were asked to admit to hospital at any time. All patients underwent chest CT scans after stent placement, and bronchoscopy was used for some patients if necessary. Telephone follow up was used for patients did not admit to hospital. 2.4. Statistical analysis ------------------------- Data were expressed as mean ± standard error and analyzed using Student *t* test and analysis of variance. Qualitative data were expressed as the percentage, and analyzed by Fisher exact test. Patency rate was compared using the Log-rank (Mantel-Cox) Test (GraphPad Software, Inc San Diego, USA). Statistical significance was considered when *P* \< .05. 3. Results ========== 3.1. The patients' characteristics ---------------------------------- The 67 patients, 39 male and 28 female, ranged in age from 12 to 85 years, with a mean age of 51.1 ± 2.2 years. Seventy-six airway stents were implanted in 67 consecutive patients over a 6-year period, of which, 9 patients underwent second stent implantation after removal. The mean procedure time for stent implantation and removal were 26.8 ± 1.9 minutes and 23.3 ± 2.0 minutes, respectively. The mean fluoroscopic time for stent implantation and removal were 18.6 ± 1.1 minutes and 17.3 ± 1.2 minutes, respectively. Types of individual airway stents were shown in Table [1](#T1){ref-type="table"}. Causes of airway stenosis included tracheotomy in 16 cases, trachea cannula in 16 cases, tumor invasion in 15 cases, external pressure airway stenosis in 4 cases, inflammatory stenosis in 6 cases (4 tuberculosis and 2 pulmonary infection), airway stent restenosis in 5 cases, airway repair and reconstruction in 3 cases (2 trachea trauma and 1 airway hemangioma), and relapsing polychondritis in 2 cases. ###### The patients' characteristics. ![](medi-99-e18627-g004) Sixteen Y-shaped airway stents were placed in the trachea and bilateral main bronchi. A total of 55 tubular stents were placed in the middle and upper trachea (n = 47), the middle trachea (n = 4), and the middle and lower trachea (n = 4). Two L-shaped airway stents were placed in the trachea and left main bronchus. Their stents were placed in trachea-right main bronchus, right main bronchus and left main bronchus. Before stent placement, 66 patients had dyspnea in varying degrees, including 16 patients with cough and expectoration, and 2 patients with hemoptysis. Dyspnea classification was 3.6 ± 0.7 before stent placement according to the American Thoracic Association Dyspnea Classification Standard, which decreased significantly to 0.6 ± 1.4 after stent placement and dyspnea symptoms were significantly alleviated. 3.2. Indications for stent removal ---------------------------------- The indications for stent removal were shown in Table [2](#T2){ref-type="table"}, which included planned removal (n = 40), excessive granulation tissue (n = 15), intolerance of stenting (n = 6), inadequate expansion and deformation (n = 5), stent migration (n = 5), replacement of bare stent (n = 4), and strut fracture (n = 1). Six bare stents were emergency implanted for severe airway stenosis, of which, 3 stents were removed and replaced by covered stents, with a mean duration of 8.7 ± 3.2 days, and 1 stent was replaced by tracheal T tube. The remained 2 patients refused to replace the bare stents with covered stents, and the bare stents were removed due to severe stenosis after more than 3 months. Stent migration, intolerance of stenting, and inadequate expansion and deformation were the main indications for early stent removal. Excessive granulation tissue was the most common indication for later stent removal, with a mean duration of 89.9 ± 15.0 days. One case underwent stent removal due to strut fracture 105 days after stenting. ###### Indications for airway stent removal. ![](medi-99-e18627-g005) 3.3. Complications of stent removal ----------------------------------- As shown in Table [3](#T3){ref-type="table"}, 74 of 76 airway stents were successfully removed from 67 consecutive patients, 5 stents showed strut fracture, only 2 stent showed retained struts after removal, for a technical success rate of 97.4% (74/76). Before stent removal, 29 patients had dyspnea in varying degrees, including 6 patients with cough and expectoration. Dyspnea classification was 1.4 ± 1.7 before stent removal, which decreased significantly to 0.8 ± 0.9 after stent removal and dyspnea symptoms were significantly alleviated. ###### Complications of stent removal. ![](medi-99-e18627-g006) Two patients died of complications (1 hemorrhage and 1 respiratory failure), resulting in a clinical success rate of 94.7% (72/76) and 30-day mortality of 2.6%. The 3 retained stent pieces were successfully removed by endoscope; the remaining 71 stents were removed in 1 piece. There were 17 complications of stent removal: death from massive bleeding (n = 1), restenosis requires stenting (n = 9), strut fracture and retained stent pieces (n = 5), and dyspnea requires mechanical ventilation (n = 2). The most common complications were restenosis caused by excessive granulation tissue and strut fracture, after a mean duration of 93.3 ± 14.5 days (Fig. [4](#F4){ref-type="fig"} and Table [4](#T4){ref-type="table"}). A 52-year male patient developed airway stenosis and esophageal airway fistula after resection of esophageal carcinoma, a Y type airway stent was implanted but had to remove immediately due to intolerance of stent. This patient died of spontaneous massive hemoptysis might cause by esophageal airway fistula 3 days after stent removal. In most of patients, mild hemoptysis was found, without need for medication. During stent removal, 4 patients showed dyspnea with decreased pulse oxygen, and 2 cases needed mechanical ventilation. The symptoms were relieved in 1 patient and then endotracheal tube was removed within 4 hours. A 43-year female patient with relapsing polychondritis showed bad respiratory condition before stent placement, the opening of the left upper lobe bronchus is partially blocked by the left branch of the second Y type stent. She died of respiratory failure 2 days after stent implant. ![The flexible bronchoscopy examination before and after stenting. (A) A severe stenosis was shown, which was too narrow to pass through bronchoscope. (B) Airway stent was patency without obvious complication 15 d after stenting. (C) Excessive granulation tissue shown 106 d after stenting, stent removal performed thereafter.](medi-99-e18627-g007){#F4} ###### Second stenting after removal of airway stent. ![](medi-99-e18627-g008) 3.4. Second stenting after removal and follow up ------------------------------------------------ As shown in Table [4](#T4){ref-type="table"}, 20 airway stents, 15 straight airway stents, and 5 Y type airway stents, were implanted again after removal for replacement of bare stents (n = 4), or due to restenosis (n = 9), migration (n = 3), inadequate expansion (n = 3), and intolerance (n = 2). Chest CT and bronchoscopy were performed during post-removal admission to prevent long-term compilation. During follow up, 1 patient died of respiratory failure 1 month after removal, and 2 patients died of tumor progression 42 days and 6 months after removal. Two patients underwent tracheotomy and tracheal T tube implantation 1 to 2 years after stent removal. Survival rate follow up. The survival rates were 83.8%, 82.1%, and 82.1% for 0.5, 3, and 6 years (Fig. [5](#F5){ref-type="fig"}). ![Survival rate follow up. The survival rates were 83.8%, 82.1%, and 82.1% for 0.5, 3, and 6 yr.](medi-99-e18627-g009){#F5} 4. Discussion ============= The airway stent has become an effective method for the treatment of airway stenosis,^\[[@R2]--[@R5]\]^ and has been widely used in clinical practice. However, long term implantation of airway stents may cause several complications, such as, strut fracture, stent migration, and excessive granulation hyperplasia. Stent removal is necessary to avoid these complications.^\[[@R9]\]^ At present, endoscopic removal of airway stent has been reported in small series,^\[[@R7],[@R8]\]^ which often performed under general anesthesia^\[[@R10]--[@R14]\]^ or local anesthesia in a few reports.^\[[@R15],[@R16]\]^ Fluoroscopic removal of airway stent is rarely reported for airway stenosis. In this study, 74 of 76 airway stents were successfully removed, with a technical success rate of 97.4%. Compared with stent removal with rigid alligator forceps, in which 73% of stents were removed piecemeal.^\[[@R10]\]^ In our study, only 2 stent showed retained struts after removal and 3 retained stent pieces were successfully removed by endoscope, the remaining 71 stents were removed in 1 piece. Our data indicate that fluoroscopic removal of airway stents is effective and feasible for airway stenosis. The details provided in previous reports varied widely and almost with no detailed discussions in complications. Our study is the few study to report techniques and complications of fluoroscopic removal of airway stents. Although the process of fluoroscopic removal is quite short in our study (less than 30 minutes), there are also risks during removal. These serious complications include bleeding, tissue laceration, airway obstruction, and even death.^\[[@R10],[@R17],[@R18]\]^ In our study, there were 2 deaths, 1 patient of airway stenosis and esophageal airway fistula died of massive hemoptysis 3 days after stent removal; the other patient of relapsing polychondritis died of respiratory failure 2 days after stent implant. The 2 patients might die of etiology rather than stenting procedure. In addition, the total incidence of complications was 23.0% (17/74), similar as that previously reported by using of bronchoscope.^\[[@R10],[@R11],[@R16],[@R17]\]^ Excessive granulation tissue may cause difficulty or failure of removal.^\[[@R15]\]^ As indwelling time increase, the incidence of granulation tissue hyperplasia and stent fracture increase.^\[[@R19]--[@R21]\]^ The endothelialization appear 2 months after stenting,^\[[@R18]\]^ stents are difficult to be removed after 10 months.^\[[@R10]\]^ So, 6 months^\[[@R22]\]^ or earlier^\[[@R23]\]^ is regarded as the optimal indwelling time for removal. However, the most suitable indwelling time for airway stenosis is still inconclusive. In our study, stents are recommended for removal within 3 months to avoid excessive granulation tissue. Silicon stents are more suitable for patients with benign disorders caused airway obstruction, especially young and little patients. Patients received stent placement of metallic stents rather than silicon stent to relieve dyspnea caused by severe airway stenosis due to their refusal of surgery and general anesthesia. In this study, covered stents were used for these patients to avoid excessive tissue growth into stent, and for the convenience of removing the stent. Radiologic placement and removal of metallic stents are suitable for old patients with an age more than 70; patient with severe co-morbidities; or patient\'s refusal of surgery and general anesthesia. Securing the airway is a major step and first step and priority in any interventional bronchology procedure. The placement or removal of the stent under general anesthesia appears to be safer than under local anesthesia in patients with airway stenosis. However, according to our clinical experience, patients with severe airway stenosis are at high risk for endotracheal intubation and anesthesia. In our center, emergency endotracheal intubation can be performed under fluoroscopy guidance and local anesthesia for patients with acute dyspnea or asphyxia. Besides, vocal cords are the narrowest part in airway and a stent can injure or even completely block the airway at vocal cords during stent removal procedure. According to our experience, the tip of hook was placed next to the airway stent and captured the stent firmly throughout the whole procedure of removal to avoid the drop of stent and life threatening complication of airway block. The stent should be pulling out slowly and carefully to minimize the injury to vocal cords and tracheal. There are several limitations of the study. The pathological changes and optimal removal duration of stent after placement need confirm in further animal study. In addition, surgical placement and removal of the metallic stents under general anesthesia with rigid bronchoscope remain gold standard and airway stents removal often requires a variety of technologies,^\[[@R24]\]^ we removed stent solely under radiology guidance. 5. Conclusions ============== Fluoroscopic removal of airway stent is technically feasible and effective. Stents are recommended for removal within 3 months for treating airway stenosis to avoid complications such as excessive granulation tissue formation in stent. Author contributions ==================== **Conceptualization:** Yonghua Bi, Gang Wu, Xinwei Han, Jianzhuang Ren. **Data curation:** Yonghua Bi, Zepeng Yu. **Formal analysis:** Yonghua Bi, Gang Wu, Zepeng Yu. **Investigation:** Yonghua Bi, Gang Wu, Zepeng Yu. **Methodology:** Gang Wu. **Project administration:** Gang Wu, Xinwei Han, Jianzhuang Ren. **Software:** Zepeng Yu. **Supervision:** Gang Wu, Xinwei Han, Jianzhuang Ren. **Validation:** Xinwei Han. **Writing -- original draft:** Yonghua Bi, Gang Wu, Zepeng Yu. **Writing -- review and editing:** Xinwei Han, Jianzhuang Ren. Abbreviation: CT = computed tomography. How to cite this article: Bi Y, Wu G, Yu Z, Han X, Ren J. Fluoroscopic removal of self-expandable metallic airway stent in patients with airway stenosis. *Medicine*. 2020;99:1(e18627). XH and JR contributed equally to this work and share co-corresponding authors. The authors have no conflicts of interest to disclose.
{ "pile_set_name": "PubMed Central" }
The following relates generally to wireless communication, and more specifically to the wireless transmission and receipt of telematics data and metadata. In some systems, telematics data (e.g., sensor readings and other data) may be transmitted from an intelligent terminal to a central service for processing. For example, a terminal associated with a vehicle experiencing a collision may transmit location and airbag deployment data over a wireless communication system to a public safety answering point (PSAP) in connection with a request for emergency services. In some systems, the data may be transmitted to a third-party service center, which may then convey some or all of the data to a PSAP. Terminals associated with vehicles offering automatic crash response and emergency calling functionality generally use the voice channel of a cellular network to establish a voice call between a vehicle occupant and a PSAP operator. Telematics data may then be transmitted from the terminal to a central service (e.g., a PSAP server or a third-party service center) by modulating the voice channel using in-band signaling, Baudot tones, or other modem techniques. Metadata associated with the telematics data, such as an acknowledgement that the telematics data was satisfactorily (e.g., successfully) received or a request for a retransmission of the telematics data, may also be communicated from the central service to the terminal by modulating the voice channel in the reverse direction. The transmission of telematics data and metadata over a voice channel in this way can be problematic in that voice communication may be blocked or experience interference during the transmission of telematics data and metadata. Moreover, the transmission of modulated digital data through voice channels may provide limited data throughput or be unreliable due to voice processing functions in the network (e.g., improperly tuned echo-cancellers and use of compression on network trunks). These limitations may be further exacerbated in systems such as Long Term Evolution (LTE) and High Speed Packet Access (HSPA) when a voice channel is provided through packet rather than circuit means. Thus, more efficient and reliable methods of transmitting telematics data and metadata between a terminal and a central service are needed.
{ "pile_set_name": "USPTO Backgrounds" }
Day 5 - 5 Days to Success with Bucket.io - 5 Advanced Features In this short video, we cover advanced features that give you the “bells and whistles” you need to create more complex quizzes and surveys. These are the features used by some of the world’s most popular quizzes, diagnostics, and assessments.
{ "pile_set_name": "Pile-CC" }
Thank you, whoever you are, for the awesome Minnesota Vikings glasses! I couldn't wait for football season, so I had to pour myself a beer. I can't wait for football to start! Thanks, and SKOL!
{ "pile_set_name": "OpenWebText2" }
Complications of orthodontic treatment. Certain complications and limitations have been associated with orthodontic treatment. The current literature obviously has not addressed all complications, but the following review highlights interesting findings and studies that may improve understanding and management of root resorption, ankylosis, implants, periodontal damage, instability, and relapse.
{ "pile_set_name": "PubMed Abstracts" }
Nashville may be known worldwide for exporting country music, but Music City is also home to a percolating indie scene. “If you care to see what (that part of Nashville is) about, buying a ticket to God Save the Queen City won’t hurt,” says Mike Harris. He’s a Mooresville native who plays guitar in Apache Relay, one of the bands headlining the fourth annual Charlotte indie music festival. Saturday’s bill at Chop Shop is heavy on Nashville artists, including Apache Relay, Natural Child, Jeff the Brotherhood, Jonny Fritz, Clear Plastic Masks, the Promised Land Sound and several locals. “It’s such a smattering of what’s going on in Nashville,” Harris continues. “All those bands are totally different, and everybody knows everybody for the most part. It’ll be the same hang that happens on a Wednesday in Nashville, but in Charlotte.” For Harris, it’ll be a bit of a homecoming, although he never spent much time in high school in Charlotte. “Before GPS I was scared I was going to get lost and someone was going to have to come find me in Charlotte,” he says with a laugh, on the way to Indianapolis with the band last week. Although he’d been going to rural bluegrass festivals with his parents since childhood, his show-going in the city was limited to his youth pastor taking him to see Switchfoot at Tremont once. Harris’ dad played bluegrass mandolin and his mom sang, but his own interest in rock led him to explore the guitar. “My dad played around the house. I was getting into rock ’n’ roll and heard my dad play ‘Stairway to Heaven,’ ” says Harris. “I thought, ‘My dad can play some of my favorite songs. He could teach me.’ ” A high school teacher told him about Belmont University in Nashville, and his sights were set. That’s where he met the other members of Apache Relay. Eventually the guys chose the band over school and carved out a niche on the Americana circuit with frontman Michael Ford Jr. as an anchor and hirsute Harris’ larger-than-life persona lighting up the stage. North Carolina served as a second home, where they could hop among college towns or hit venues like Evening Muse. “We toured North Carolina so much, we always had an open door there,” Harris reminisces. “I especially love bringing people to Cookout for a Cheerwine and to Lake Norman. I take a lot of pride in that. Take them for barbecue in Concord or Kannapolis, or to the Diamond in Charlotte.” Apache Relay was on the rise with its first official album, “American Nomad” (an earlier album was released under Michael Ford Jr. and the Apache Relay). It closed out Bonnaroo in 2011 (“I think only Widespread Panic was playing when we went on,” Harris recalls) and opened for Mumford & Sons in 2012. But just as folk-rock was exploding, Apache Relay took a left turn at harmony-rich ’60s pop, removing itself from the Mumfords’ tag. The self-titled record released in April was recorded with producer Kevin Augunas at Fairfax Recordings – the old Sound City Room – in Los Angeles, and pays homage to both California country rock of the ’70s and Phil Spector’s lush production. Harris says the departure is on purpose. “The (most fun) part about being in a band to me is about trying to create something you can’t really compare to a lot of stuff.”
{ "pile_set_name": "Pile-CC" }
Retention and chemistry of aluminium in groundwater discharge areas. The concentration of different fractions of Al were measured in seven micro (3-4 m(2)) discharge areas using extraction methods on the upper layer of the soil. The areas were situated in two catchments subjected to different levels of acidic deposition. The Al fractions were determined by separate extractions with 1m KCl, 0.5 m CuCl(2) and 0.2 m (NH(4))(2)C(2)O(4). The fractions associated with the different extraction reagents are preferentially exchangeable, organically bound and amorphous hydroxide, although a complete separation cannot be made. The total amount of Al was determined after dry ashing. The results show that the levels of total Al in the peat were high when compared to ombrotrophic peatlands. The quantity and characteristics of the organic material and the acidity of the soils in the discharge zone could be decisive in determining which fractions of Al occur. The high levels of total Al in the soil indicate that the discharge zone could be an important trap for the element.
{ "pile_set_name": "PubMed Abstracts" }
Q: Does my "hollow list" structure exist already? I came up with an implementation in c for arrays which can be extremely large yet only use an amount of memory proportional to how much data you have written to it. What I want to know is if there is a name for this kind of list or structure. Here is my code in C for the structure and example use: #include <stdlib.h> #include <stdbool.h> #include <stdio.h> typedef struct hollow_list hollow_list; struct hollow_list{ unsigned int size; void *value; bool *written; hollow_list *children; }; //Creates a hollow list and allocates all of the needed memory hollow_list hollow_list_create(unsigned int size){ hollow_list output; output = (hollow_list) {.size = size, .value = (void *) 0, .written = calloc(size, sizeof(bool)), .children = calloc(size, sizeof(hollow_list))}; return output; } //Frees all memory of associated with a hollow list and its children void hollow_list_free(hollow_list *l, bool free_values){ int i; for(i = 0; i < l->size; i++){ hollow_list_free(l->children + i, free_values); } if(free_values){ free(l->value); } free(l); } //Reads from the hollow list and returns a pointer to the item's data void *hollow_list_read(hollow_list *l, unsigned int index){ if(index == 0){ return l->value; } unsigned int bit_checker; bit_checker = 1<<(l->size - 1); int i; for(i = 0; i < l->size; i++){ if(bit_checker & index){ if(l->written[i] == true){ return hollow_list_read(l->children + i, bit_checker ^ index); } else { return (void *) 0; } } bit_checker >>= 1; } } //Writes to the hollow list, allocating memory only as it needs void hollow_list_write(hollow_list *l, unsigned int index, void *value){ if(index == 0){ l->value = value; } else { unsigned int bit_checker; bit_checker = 1<<(l->size - 1); int i; for(i = 0; i < l->size; i++){ if(bit_checker & index){ if(!l->written[i]){ l->children[i] = hollow_list_create(l->size - i - 1); l->written[i] = true; } hollow_list_write(l->children + i, bit_checker ^ index, value); break; } bit_checker >>= 1; } } } int main(){ int a = 221; int b = 222; int c = 9; int d = 89; hollow_list h; h = hollow_list_create(30); hollow_list_write(&h, 221999999, &a); hollow_list_write(&h, 9999, &b); hollow_list_write(&h, 22999999, &c); hollow_list_write(&h, 1, &d); printf("%d\n", *((int *) hollow_list_read(&h, 221999999))); printf("%d\n", *((int *) hollow_list_read(&h, 9999))); printf("%d\n", *((int *) hollow_list_read(&h, 22999999))); printf("%d\n", *((int *) hollow_list_read(&h, 1))); printf("\n"); printf("\n"); printf("\n"); printf("%d\n", a); printf("%d\n", b); printf("%d\n", c); printf("%d\n", d); c = 56; printf("%d\n", *((int *) hollow_list_read(&h, 22999999))); } These lists seem to be really useful alternatives to linked lists, and fast too: the worst case scenario for a read or write to a list is O(log n) for a list of n elements. I'd be surprised if this kind of structure didn't already exist, but I would simply like to know what it is called so I could refer to it by it's proper name haha. A: This is a sparse array data structure, but I haven't seen this exact data structure before. It looks like your code builds a balanced binary tree, but with a particularly clever representation in memory. One difference between other balanced binary trees is that the running time of your approach is $O(\lg m)$ where $m$ is the largest index written, whereas other balanced binary tree data structures (e.g., red-black trees) have a $O(\lg n)$ running time where $n$ is the number of indices written to. Since $m \ge n$, in principle your approach might be slower if $n$ is small (few elements have been written) but the indices are large. However in practice I don't expect this to make much difference, ordinarily.
{ "pile_set_name": "StackExchange" }
Statistical Information By Susan Wright The 2008 survey saw a total of 3,058 responses collected. Of those, 2,412 respondents resided in the United States (83.4%). Of the remaining 480 respondents, a total of over 42 other countries were represented. Where appropriate, the data is compared to the 1998 Violence & Discrimination Survey Against Sexual Minorities which collected over 1,000 responses to similar questions over the course of a year. The 1998 survey did not cover business or event-related experiences of harassment, nor did it ask about Internet experiences. The 2008 survey also included more questions about sexual activity and identity. Table 1. Gender 2008 1998 Women 51% 46% Men 45% 51% Transgender 5% 1% Intersexes 1% 2% Table 2. Sexual Orientation 2008 1998 Heterosexual 41% 40% Bisexual 35% 36% Gay/lesbian 22% 22% Other 7% 4% A total of 1,146 (37.5%) respondents indicated that they had either been discriminated against, had experienced some form of harassment or violence, or had some form of harassment or discrimination aimed at their BDSM-leather-fetish-related business. Of the respondents who reported some form of persecution, 476 (41.5%) identified as male 615 (53.7%) identified as female 9 (.8%) identified as intersexed 78 (6.8%) identified as transgendered (Sexual orientation, like gender, was a question which required some answer, but allowed respondents to choose as many as they felt might apply, so the percentage totals more than 100%.) Of the 1,146 respondents who indicated that they had either been discriminated against or had experienced some form of harassment or violence, 380 (33.2%) identified as heterosexual, 440 (38.4%) identified as bisexual 292 (25.5%) identified as gay or lesbian. 97 (8.5%) indicated that they identified in some other way from heterosexual, bisexual or gay/lesbian. (Sexual orientation, like gender, was a question which required some answer, but allowed respondents to choose as many as they felt might apply, so the percentage totals more than 100%.) The sexual orientation of respondents who were discriminated against or had experienced some form of harassment or violence is compared in Table 6.1 to the total percentage of respondents who identified their orientation. It is interesting to note that Gay/lesbian, Bisexual and Other respondents have slightly higher rates of persecution than their average percentage of total respondents, while Heterosexuals are less likely to be discriminated against. Table 3. Sexual Orientation and Discrimination Total Percent 2008 Respondents Percent Persecuted Gay/lesbian 22% 25.5% Bisexual 35% 38.4% Heterosexual 41% 33.2%… The 2008 Survey of Violence & Discrimination Against Sexual Minorities found significant discrimination and persecution against BDSM practitioners due to the social stigma attached to their sexual behavior. With over three thousand respondents, 37.5 percent indicated that they had either been discriminated against or experienced some form of harassment or violence. This survey addresses the gap in current knowledge by reporting data on the prevalence of violence and discrimination against BDSM and polyamory practitioners. The persecution of these individuals is conceptualized as a manifestation of sexual stigma, that is, society's negative regard for any non-heterosexual behavior, identity, relationship, or community. by Female Trouble March 1994 Within the womenâs community, over half (56%) of the 539 lesbian and bisexual women surveyed experienced discrimination, harassment, or physical assault from other women because of their participation in consensual s/m. This survey only dealt with the discrimination or violence occurring within the lesbian community against S/M women. Harassment is the most common form of attack against s/m practitioners in the lesbian community. 44% of the S/M women reported some form of violence against them, with one-third of the reported incidents of harassment had occurred in the last year (1993). 30% of the S/M women in the survey experienced discrimination in the lesbian community because of their s/m orientation. This discrimination included being refused membership or being ejected from social, recreational, political, education, spiritual groups within the lesbian community. Incidents of physical assault in the lesbian community because of S/M orientation were reported by 25% of the women. This includes being slapped, punched or kicked by other women because of their s/m orientation. Of the 367 s/m women who were victims and/or witnesses of violence at some point in their lives, only 22% felt safe enough to report the incidents to police or event organizers, group leaders, bar staff, etc. Only 25% stated that their complaints had been handled satisfactorily. This reputation within the lesbian community for not supporting victims of violence, harassment and discrimination prevents s/m women from fully participating in the community. In the forward of the Female Trouble analysis, Jad Keres writes: "The S/M women who have taken part in this survey have something important to tell us. Listening to them does not require an understanding of their sexual expression nor approval of their lifestyle. It does require a willingness to still the persistent noise of hard-held opinions and unyielding dogma. As a community, will we finally allow the voices of all women to be heard and heard consistently or will we continue to blatantly censor and dismiss the lives of women we do not understand or approve of? As a community, will we finally acknowledge and stop the political violence that has preyed upon S/M women or will we continue to ignore the real bloody consequences of the 'Sex Wars'?" Female Trouble, PO Box 30145, Philadelphia PA 19103 PURPOSE: Gather demographic data on the SM-Leather-Fetish communities. Gain an understanding of the affect of social stigma on SM and fetish practitioners. SURVEY INSTRUMENT - Paper and electronic distribution (see below) PERIOD - April 1998 to February 1999 RESULTS: Useful demographic data on the SM-Leather-Fetish communities Sense of the magnitude of the problems arising from the stigma against SM Clear justification for a more professional survey GENDER ORIENTATION Men 51% Heterosexual 40% Women 46% Homosexual 22% Transgender 1% Bisexual 36% Intersexual 2% No Response 4% EMPLOYMENT AGE INCOME Student 8% 18-22 3% Under $ 10K 7% Part time 5% 23-29 15% $10-24K 17% Full time 62% 30-44 49% $25-49K 37% Self employed 22% 45-64 31% Over $50K 39% Unemployed 1% Over 65 2% Retired 2% COMMUNITY ISSUES: 1. Have you ever experienced violence or harassment because of your alternative sexual practices? 36% YES If yes, what happened? (multiple responses allowed) Verbal harassment 87% Physical assault 25% Stalked 19% Property vandalized 19% Blackmail 17% Sexual harassment 13% Rape 10% Other 7% 2. Have you ever experienced discrimination due to your alternative sexual practices? 30% YES If yes, what happened? (multiple responses allowed) Persecution 40% Loss of job or contract 25% Loss of promotion 17% Loss of custody of child 3% Refused membership 11% Unjustified arrest 5% Other 36% 3. Did you press charges? 96% NO 4. Do you freely tell others of your interest in alternative sexual expression? 72% NO If you're not out, why not? Fear of disapproval 67% Fear of repercussions 57% Fear of persecution 34% Fear of loss of child custody 13% Other 16% RESULTS Only 28% of those surveyed were "out", while the vast majority don't tell other people about their sexual preferences. Some reported that "it's no one else's business," but many cited fear of job loss or child custody, or harming family relations. One respondent reported, "A formerly trusted confidant outed me to my family. As I am the primary care giver for my mother (Alzheimer's) my siblings feared that I would expose our mother to "dangerous characters". They considered making other arrangements for Mom's care and made me promise not to 'practice" my sexual preferences in our home." Unfortunately, staying in the closet doesn't protect people - only one-third of those who suffered violence or discrimination reported that they are "out". The other two-thirds were minding their own… Kink Aware Professionals: We're Making a Difference About Kink Aware Professionals Kink Aware Professionals is a service offered by NCSF dedicated to providing the community with referrals to psychotherapeutic, medical, legal and other professionals who are knowledgeable about and sensitive to diverse expressions of sexuality. Program Goals: Resource for those people who enjoy the adventurous side of sex to find Health care providers as well as other trades that are sensitive to their needs. Too remove the common response that its their sexuality that’s the problem.
{ "pile_set_name": "Pile-CC" }
Q: Derive asymptotic behavior of inverse of the normal cdf with respect to 2^n I have a normal distribution $\mu = 0$ and $\sigma = 0.58n$ where $n > 0 $ and I am trying to derive the asymptotic behavior of the following equation: $$\Phi\left(\frac{x}{0.58n}\right)\;=\;2^{1-n}$$ Follows: $$ \DeclareMathOperator\inverfc{inverfc} x = -0.58 \sqrt{2}n \inverfc{({2^{2 - n}})} $$ So I want to find $O( n\inverfc{({2^{2 - n}})}) $. More specifically I want to confirm my suspicion that it is in $O(n \log{n})$. However since Inverf is a special function I can't wrap my mind around to analyse it. I gave complete context since another derivation might be more helpful here. A: When $z\to+\infty$, $\Phi(-z)\sim1/(z\mathrm e^{z^2/2}\sqrt{2\pi})$. Since $2^{1-n}\to0$, this is the regime of interest. The solution of $\Phi(-z_n)=b\mathrm e^{-cn}$ with $b=2$ and $c=\log2$ solves $b\sqrt{2\pi}z_n\mathrm e^{z_n^2/2}\sim\mathrm e^{cn}$, that is, $$ z_n^2+2\log z_n=2cn-\log(2\pi)-2\log b+o(1), $$ in particular $z_n\sim\sqrt{2cn}$. The question asks about $x_n=-anz_n$ with $a=0.58$ hence $x_n\sim -an\sqrt{2cn}$, in particular $x_n=\Theta(n\sqrt{n})$ hence $x_n=\Omega(n\sqrt{n})$ and $x_n=O(n\sqrt{n})$. If need be, the equivalent in the first paragraph yields more precise estimates, for example, one has $z_n=\sqrt{2cn}-\log n/\sqrt{8cn}+o(\log n/\sqrt{n})$ hence, introducing $\alpha=a\sqrt{2c}$ and $\beta=a/\sqrt{8c}$, $$ x_n=-\alpha n\sqrt{n}+\beta\sqrt{n}\log n+o(\sqrt{n}\log n). $$
{ "pile_set_name": "StackExchange" }
All relevant data are within the paper and its Supporting Information files. Introduction {#sec001} ============ During meiosis, the accurate segregation of chromosomes relies on the formation of crossovers (COs) and sister chromatid cohesion \[[@pbio.1002412.ref001]\]. COs are produced by homologous recombination (HR)-mediated repair of programmed DNA double strand breaks (DSBs). In *Caenorhabditis elegans*, the holocentric chromosome pairs usually undergo a single off-center CO, resulting in a cruciform and asymmetric bivalent \[[@pbio.1002412.ref002],[@pbio.1002412.ref003]\]. This is important to define the organization of kinetochore proteins, motor proteins, protein kinases, and the domains of cohesion release, which is necessary for the accurate segregation of homologs during anaphase I \[[@pbio.1002412.ref004]\]. During prophase I, several mechanisms guarantee the formation of COs as well as the repair of the additional recombination intermediates as non-crossovers (NCOs). First, to ensure CO formation, programmed DSBs are induced in excess compared to the actual number of COs, e.g., \[[@pbio.1002412.ref005]--[@pbio.1002412.ref007]\]. Second, a subset of the early recombination intermediates are stabilized and protected by pro-CO factors \[[@pbio.1002412.ref008]--[@pbio.1002412.ref010]\]. CO maturation is supported by the MutSγ complex (MSH-4/5), sumo/ubiquitin ligases ZHP-3/RNF212, and HEI10 and the cyclin-related protein COSA-1/CNTD1 \[[@pbio.1002412.ref011]--[@pbio.1002412.ref016]\]. In addition to efficient CO designation, it is essential that the resolution of joint molecules (JM) at CO-designated sites is biased toward the CO outcome. JMs result from second-strand capture and DNA synthesis after strand invasion \[[@pbio.1002412.ref017]\]. Depending on where the cut is made by structure-specific endonucleases (resolvases), CO or NCO products can be generated \[[@pbio.1002412.ref018]--[@pbio.1002412.ref021]\]. In *C*. *elegans*, at least two parallel pathways of a redundant resolvase system have been defined (MUS-81/SLX-1 and XPF-1/HIM-6) \[[@pbio.1002412.ref022]--[@pbio.1002412.ref024]\]. It is unclear how the bias in resolution toward either a CO or NCO is achieved. In yeast, the bulk of DSBs not destined to become COs are processed by synthesis-dependent strand annealing (SDSA) at an early stage \[[@pbio.1002412.ref025]\]. In *C*. *elegans*, a similar activity is attributed to RTEL-1 by D-loop displacement after strand invasion \[[@pbio.1002412.ref026],[@pbio.1002412.ref027]\]. NCOs can also be generated by the activity of the RTR complex, composed of a RecQ helicase (Bloom syndrome protein \[BLM\]), topoisomerase IIIα (TOP3), and the RecQ-mediated genome instability 1 and 2 (RMI1,2) scaffolding proteins \[[@pbio.1002412.ref028]--[@pbio.1002412.ref030]\]. This complex provides a major NCO activity during mitosis. Importantly, patients with mutated BLM helicase display genomic instability and a cancer predisposition, and they exhibit a cellular phenotype of elevated COs between sister chromatids, which potentially drives cancer by loss of heterozygosity \[[@pbio.1002412.ref031],[@pbio.1002412.ref032]\]. In vitro studies have shown that the RTR complex dismantles double Holliday junctions (dHJs). A branch migration step mediated by the RecQ helicase brings the two dHJs in close proximity to allow the topoisomerase to unhook the two DNA strands by decatenation, stimulated by the scaffolding proteins RMI1/2 \[[@pbio.1002412.ref033]\]. RMI1 was discovered as a protein associated with BLM containing protein complexes \[[@pbio.1002412.ref034]\]. It colocalizes with recombination foci containing BLM helicase \[[@pbio.1002412.ref035]\]. RMI1 depletion leads to destabilization of BLM and topoisomerase foci. Moreover, its depletion phenocopies the BLM mutant phenotype \[[@pbio.1002412.ref035]\]. Furthermore, RMI1 directly interacts with both BLM helicase and TOP3, shown with pulldown experiments using recombinant protein \[[@pbio.1002412.ref036]\]. Human RMI1 protein contains two oligonucleotide/oligosaccharide-binding (OB) fold domains, in which the N-terminal OB fold binds both the helicase and the topoisomerase \[[@pbio.1002412.ref037]\]. Structural and biochemical studies established that RMI1 cooperates with the topoisomerase in the strand passage reaction during decatenation. The topoisomerase-generated nick allows strand passage of the other strand, in which RMI1 plays a role in the regulation of opening and closure of the "gate" \[[@pbio.1002412.ref038],[@pbio.1002412.ref039]\]. An "anti-CO" role has been described for BLM orthologs in yeast, plants, mice, and *Drosophila* in meiosis \[[@pbio.1002412.ref025],[@pbio.1002412.ref040]--[@pbio.1002412.ref045]\]. A recent study showed that, in *C*. *elegans*, *him-6* is required to eliminate persistent MutSγ-independent recombination intermediates when an excess is induced by irradiation \[[@pbio.1002412.ref046]\]. Similar "anti-CO" functions have been attributed to other members of the complex: Rmi1 and/or Top3 in yeast and *Arabidopsis* \[[@pbio.1002412.ref047]--[@pbio.1002412.ref052]\]. In yeast, Top3 and Rmi1 cooperate with Sgs1 to prevent aberrant joint molecule (JM) accumulation, but they also act later, without Sgs1, to allow chromosome separation \[[@pbio.1002412.ref051],[@pbio.1002412.ref052]\]. Despite the widely conserved anti-CO function of the RTR complex, several studies suggest that it could also contribute a pro-CO activity; however, a direct involvement has not been demonstrated. In *C*. *elegans*, *him-6* (the BLM ortholog) is required to ensure that CO-designated recombination intermediates mature into interhomolog COs \[[@pbio.1002412.ref046],[@pbio.1002412.ref053],[@pbio.1002412.ref054]\]. In yeast, Sgs1 has been found colocalizing with the pro-CO factor Zip3 \[[@pbio.1002412.ref040]\]. Nevertheless, in *sgs1* mutants, the recombination rate is increased rather than decreased, as one would expect if it favored CO formation. More recently, the Sgs1/BLM helicase has been proposed to have an early role in promoting COs, acting to disassemble unprotected strand invasion intermediates to channel them back into CO pathways \[[@pbio.1002412.ref041],[@pbio.1002412.ref044],[@pbio.1002412.ref045],[@pbio.1002412.ref055],[@pbio.1002412.ref056]\]. Furthermore, in a situation in which JM resolution is blocked (*mms4 slx4 yen1*), Sgs1 can promote CO formation. Here, *sgs1* might generate JMs with a certain configuration that could be recognized by the major yeast CO pathway Exo1-MutLγ \[[@pbio.1002412.ref055]\]. In this study, we present the role of *C*. *elegans* RMH-1. We show that RMH-1 and HIM-6 localize at numerous recombination intermediates that will become either a CO or NCO. Consistent with its localization, RMH-1 plays genetically separable and antagonistic roles during meiosis. On one hand, *rmh-1* ensures CO formation at two levels: by promoting CO designation and by protecting CO-designated sites and promoting their maturation into chiasmata. Remarkably, RMH-1 and HIM-6 localize as closely juxtaposed doublets, suggesting that they may flank the two junctions of a dHJ CO intermediate. In addition, *rmh-1* prevents illegitimate connections between homologs redundantly with *smc-5*, an activity known from yeast meiosis to prevent multi-JMs \[[@pbio.1002412.ref057]--[@pbio.1002412.ref059]\]. Moreover, RMH-1 anti-CO activity is required to inhibit CO formation at chromosome centers, which would facilitate correct segregation of chromosomes. Results {#sec002} ======= Identification of *rmh-1* Mutants {#sec003} --------------------------------- The *C*. *elegans* genome encodes two RMI1 homologs: M01E11.3 and T07C12.12, named RMI1 homolog-1 (RMH-1) and -2 (RMH-2), respectively. These proteins contain three domains characteristic of RMI1 orthologs: an N-terminal domain of unknown function (DUF)1767 and two OB-fold domains ([Fig 1A](#pbio.1002412.g001){ref-type="fig"} and [S1A Fig](#pbio.1002412.s001){ref-type="supplementary-material"}). Point mutations in the recessive alleles *rmh-1(jf54*) and *rmh-1(tn309)* were isolated based on defects in meiotic chromosome segregation and embryonic lethality \[[@pbio.1002412.ref060]--[@pbio.1002412.ref062]\]. The mutations lead to protein truncations after the DUF1767 or OB1 domains, respectively ([Fig 1A′](#pbio.1002412.g001){ref-type="fig"} and [S1B--S1D Fig](#pbio.1002412.s001){ref-type="supplementary-material"}). In *rmh-1(jf92)* and *rmh-2(jf94)*, the ORFs were disrupted right after the start codon (see the [Experimental Procedures](#sec015){ref-type="sec"} section). ![RMH-1 (but not RMH-2) contributes to reliable chiasma formation and chromosome segregation in meiosis.\ (A) Schematics of RMH-1 and RMH-2. (A′) Location of the three *rmh-1* mutations. In the *jf92* allele, the coding sequence was disrupted after the START codon by the insertion of the *unc-119* gene by the CRISPR technology. In the *jf54* allele, the G-to-A transition affects the first nucleotide of intron 1 and therefore, destroys the splice donor site of the preceding exon 1. qRT-PCR revealed the presence of different splicing variants (see [S1 Fig](#pbio.1002412.s001){ref-type="supplementary-material"}). In the *tn309* allele, the G-to-A transition introduces a premature STOP codon at position aa 640, leading to the deletion of the OB2 domain (for more details, see the [Experimental Procedures](#sec015){ref-type="sec"} section). (B--E) Oocyte nuclei at the diakinesis stage of meiotic prophase. Each image shows the complete set of DAPI-stained chromosomes from a single nucleus. The wild-type (WT) and *rmh-2(jf94)* nuclei contain six bivalents (homolog pairs connected by chiasmata), whereas the *rmh-1* mutant nuclei contain a mixture of bivalents and univalents. (F) Quantification of the average number of DAPI-positive structures in diakinesis oocytes in the -1 position. WT *n* = 25, *rmh-1(jf92) n* = 21, *rmh-1(jf54) n* = 36, *rmh-1(tn309) n* = 30, and *rmh-2(jf94) n* = 18. (G--I) Quantification of embryonic hatch rates (G). Frequencies of male offspring (H) and larval arrest (I) among the progeny of WT and *rmh-1* and *rmh-2* mutant worms (*n* = 35--45 hermaphrodites per genotype). Data for F--I are represented as mean +/- SD; ns stands for not significant, differences are highlighted with stars (\* *p* \< 0.05, \*\* *p* \< 0.01, \*\*\* *p* \< 0.001. and \*\*\*\* *p* \< 0.0001). Scale bars, 2 μm.](pbio.1002412.g001){#pbio.1002412.g001} RMH-1 (But Not RMH-2) Is Required for Robust Chiasma Formation and Chromosome Segregation in Meiosis {#sec004} ---------------------------------------------------------------------------------------------------- To establish the respective requirements of *rmh-1* and *rmh-2*, we examined the mutants for embryonic lethality, larval arrest, and a high incidence of males (Him) phenotype among the progeny. An increased incidence of males in the progeny indicates X chromosome nondisjunction during meiosis, as *C*. *elegans* hermaphrodites have the genotype X/X and males X/O. The combination of increased embryonic lethality with a Him phenotype further suggests the occurrence of aneuploid eggs arising from meiotic missegregation of autosomes \[[@pbio.1002412.ref063]\]. Increased larval arrest is indicative of somatic defects. Analysis of *rmh-1* mutants revealed the cohort of phenotypes characteristic of a defect in meiotic recombination, as described above ([Fig 1G and 1H](#pbio.1002412.g001){ref-type="fig"}). Second, DAPI staining of oocytes at diakinesis, the last stage of meiotic prophase, revealed that a fraction of chromosome pairs was not connected by chiasmata in *rmh-1* mutants. Whereas in the wild type, six bivalents (chromosome pairs connected by chiasmata) can be seen in diakinesis oocytes, *rmh-1* mutant alleles showed an increase of DAPI-stained bodies, reflecting a mixture of bivalents and univalents (achiasmate chromosomes) ([Fig 1B--1E](#pbio.1002412.g001){ref-type="fig"}). In the -1 oocyte (the most mature oocyte, next to the spermatheca, the oocyte prior to fertilization), we observed on average 8.9 ± 1.0 DAPI bodies in *rmh-1(jf92)* and 9.3 ± 1.4 in *rmh-1(jf54)* ([Fig 1F](#pbio.1002412.g001){ref-type="fig"}). As the *jf54* allele behaved identically to the *jf92* insertion allele with regards to the hatch rate and Him and diakinesis phenotypes, and as we were unable to detect GFP::RMH-1 containing the *jf54* mutation ([S2B Fig](#pbio.1002412.s002){ref-type="supplementary-material"}), we infer that *rmh-1(jf54)* behaves like a null allele. Interestingly, fewer univalents were observed in *rmh-1(tn309)* (7.4 ± 1.1 DAPI bodies), suggesting that RMH-1 function is differently affected by this allele ([Fig 1F](#pbio.1002412.g001){ref-type="fig"}). To confirm the presence of univalents in *rmh-1* mutants (and not fragments due to absence of DNA repair), we measured the average volumes of DAPI bodies in diakinesis ([S3A and S3B Fig](#pbio.1002412.s003){ref-type="supplementary-material"} and [S1 Text](#pbio.1002412.s012){ref-type="supplementary-material"}) and confirmed both the presence of univalents and the absence of DNA fragments. In contrast to the *rmh-1* mutants, the *rmh-2(jf94)* single mutant did not exhibit any meiotic phenotypes. However, all *rmh* mutants showed increased levels of larval arrest (around 12% for *rmh-1* mutants and 7% for *rmh-2*) ([Fig 1I](#pbio.1002412.g001){ref-type="fig"}). Furthermore, the double mutant *rmh-1(jf54); rmh-2(jf94)* was inviable, suggesting a redundant function of the two genes in somatic tissue. To better understand which meiotic processes are impaired in *rmh-1(jf54)*, we analyzed chromosome pairing, synapsis, and induction and repair of DSBs. No defects in pairing and synapsis were observed ([S4 Fig](#pbio.1002412.s004){ref-type="supplementary-material"}). To study the induction and processing of DSBs, we assessed the appearance and disappearance of foci of the strand exchange protein RAD-51 ([Fig 2](#pbio.1002412.g002){ref-type="fig"}) \[[@pbio.1002412.ref064],[@pbio.1002412.ref065]\]. RAD-51 foci appeared with normal timing in the *rmh-1(jf54)* mutant, but accumulated at higher levels than in wild type and persisted at elevated levels through late pachytene. However, RAD-51 foci disappeared in diplotene, suggesting that repair of DSBs was delayed but did eventually occur. We also found that *rmh-1*-specific chromosomal defects depended on the induction of meiotic DSBs. In summary, meiotic recombination is aberrant in *rmh-1* mutants. ![DNA double strand break repair is delayed in *rmh-1* mutant.\ (B--C) Immunostaining for DNA strand exchange protein RAD-51, with insets for mid pachytene (MP) and late pachytene (LP) nuclei. (B) Almost no RAD-51 foci are detected in LP nuclei in wild-type (WT). (C) Abundant RAD-51 foci are still detected in LP nuclei in the *rmh-1(jf54)* mutant, but disappear in diplotene. (B′,C′) Quantification of the numbers of RAD-51 foci per nucleus. For quantification, gonads were divided into six equal zones (A). In both WT and *rmh-1(jf54)*, zones 1 and 2 correspond to the mitotic zone; zone 3 to transition zone and early pachytene; zones 4 to 5 to pachytene. Analysis of *n* = 124--231 nuclei per zone for each genotype. Distribution of RAD-51 foci is significantly different between WT and mutant for the zones 3 to 6 (Mann Whitney test, \*\*\*\* *p* \< 0.0001). Scale bar = 20 μm for gonads and 5 μm for insets.](pbio.1002412.g002){#pbio.1002412.g002} Dynamic Localization of RMH-1 in Distinct Foci during Pachytene Progression {#sec005} --------------------------------------------------------------------------- To assess RMH-1 localization in the gonad, we expressed GFP::RMH-1 using its endogenous regulatory elements as a functional fusion protein. Indeed, GFP::RMH-1 is capable of rescuing embryonic lethality and the Him phenotype when expressed in the null allele *jf92* ([S5A and S5B Fig](#pbio.1002412.s005){ref-type="supplementary-material"}). GFP::RMH-1 was found in foci throughout pachytene ([Fig 3A--3C](#pbio.1002412.g003){ref-type="fig"}). In early pachytene, RMH-1 was first detected as a nucleoplasmic haze, and faint foci progressively appeared on chromosomes. During mid pachytene, RMH-1 foci increased in number and intensity. Mid pachytene nuclei contained, on average, 15.2 foci ± 3.6, ranging from ten to 25, and, in late pachytene, the number of RMH-1 foci drastically reduced to 5.9 ± 1.7 ([Fig 3D](#pbio.1002412.g003){ref-type="fig"}). In late pachytene, the number of foci ranged from one to nine foci; however, the majority of nuclei contained six or seven foci ([Fig 3E](#pbio.1002412.g003){ref-type="fig"}). (This distribution is broader than the distribution of COSA-1 foci, visible as six signals in late pachytene. However, the mutant phenotype of *cosa-1* already suggests that it acts before the protein can be observed in the six prominent foci. In addition, we believe RMH-1 marks a stage of recombination, through which all mature CO intermediates have to pass). ![Dynamic localization of RMH-1 to distinct foci in pachytene.\ (A) In early pachytene (EP), GFP::RMH-1 is diffuse and few foci are detected on DNA. In mid pachytene (MP), high numbers of foci (up to 25 per nucleus) are observed (yellow square and B and B′). In late pachytene (LP), GFP::RMH-1 concentrates into bright foci, on average six per nucleus (red square and C and C′). (D) Quantification of the average number of RMH-1 foci per nucleus in EP, MP, and LP (*n* = 123 nuclei for EP, *n* = 205 for MP, and *n* = 180 for LP). Data are represented as mean +/- SEM. (E) Histogram showing the percentage of late pachytene nuclei containing a certain number of RMH-1 foci per nucleus (one to nine) (*n* = 180 nuclei). (F) Staining for RAD-51 and GFP::RMH-1. RMH-1 localization starts after and persists longer than the RAD-51 positive zone. (F′) GFP::RMH-1 and RAD-51 mark different recombination intermediates, as they do not colocalize. (G--I) Staining for MSH-5 and GFP::RMH-1. (H--H′′) RMH-1 and MSH-5 partially colocalize in MP (yellow square). (I--I′′) Both proteins become enriched at brighter foci as pachytene progresses (red square). (J) Staining for COSA-1::GFP and mCherry::RMH-1. (K) Staining for ZHP-3 and GFP::RMH-1. In LP, RMH-1 colocalizes at CO sites with MSH-5 (G′), COSA-1 (J′--J′′′) and ZHP-3 (K′--K′′′). Scale bar = 20 μm for gonads, 5 μm for pachytene nuclei insets, and 2.5 μm for single nucleus.](pbio.1002412.g003){#pbio.1002412.g003} Importantly, RMH-1 foci seem to increase in signal intensity (about 1.8-fold) between mid and late pachytene. This suggested that the protein might accumulate over time. RMH-1 localization in foci in pachytene is reminiscent of localization of markers of ongoing recombination events such as RAD-51 and CO-promoting factors MSH-5, ZHP-3, or COSA-1 \[[@pbio.1002412.ref012],[@pbio.1002412.ref064]--[@pbio.1002412.ref066]\]. Moreover, RMH-1 localization depends on meiotic DSBs, since foci were absent in a *spo-11* mutant ([S2A Fig](#pbio.1002412.s002){ref-type="supplementary-material"}). Co-immunostaining experiments indicated that RAD-51 foci appear and disappear earlier than RMH-1 ([S6 Fig](#pbio.1002412.s006){ref-type="supplementary-material"}). RAD-51 foci appear in transition zone, peak in mid pachytene, and disappear in late pachytene. GFP::RMH-1 foci appear in early pachytene, peak in mid pachytene, and disappear in diplotene. Moreover, when RAD-51 and RMH-1 are present in the same nucleus, they do not colocalize (only 4.0 +/- 4.0% RMH-1 foci coincide with RAD-51) ([Fig 3F and 3F′](#pbio.1002412.g003){ref-type="fig"}). This suggests that RAD-51 and RMH-1 mark different recombination intermediates and that RMH-1 may act after RAD-51 removal. In contrast with the lack of colocalization with RAD-51 foci, the six bright RMH-1 foci in late pachytene nuclei do coincide with the localization of pro-CO factors MSH-5, ZHP-3, and COSA-1 at the CO sites (90.1 +/- 10.7% RMH-1 foci colocalize with COSA-1 and MSH-5) ([Fig 3G, 3J and 3K](#pbio.1002412.g003){ref-type="fig"}) \[[@pbio.1002412.ref012],[@pbio.1002412.ref016],[@pbio.1002412.ref066]\]. Interestingly, RMH-1 foci disappear before COSA-1 foci, which persist until diplotene ([S6 Fig](#pbio.1002412.s006){ref-type="supplementary-material"}). RMH-1 foci also partially colocalize with the earlier MSH-5 foci present during mid pachytene; the brighter foci of each protein tend to colocalize, while the fainter ones do not ([Fig 3G--3I](#pbio.1002412.g003){ref-type="fig"}). Furthermore, we found that late-pachytene RMH-1 foci are severely reduced (to one focus on average) in *msh-5*, *zhp-3*, and *cosa-1* mutants, which fail to form CO-designated recombination intermediates. RMH-1 foci in mid pachytene are also less abundant and smaller in these mutants ([Fig 4A--4D](#pbio.1002412.g004){ref-type="fig"}, [S7D and S7E Fig](#pbio.1002412.s007){ref-type="supplementary-material"}), suggesting that *msh-5*, *zhp-3*, and *cosa-1* also contribute to stable localization of RMH-1 during earlier stages. The dynamic localization of RMH-1 through pachytene suggests that it may function at both CO and NCO repair events. ![RMH-1 in the context of CO formation.\ (A--C) RMH-1 localization in a *cosa-1* mutant. In mid pachytene (MP), RMH-1 foci are less abundant and smaller than in wild-type (WT, blue square, B and B′) and are barely detectable in late pachytene (LP) (green square, C and C′). (D) Quantification of average RMH-1 foci per nucleus in MP in the WT (*n* = 205) and *cosa-1* (*n* = 214), *zhp-3* (*n* = 179), and *msh-5* (*n* = 137) mutants. In three CO-defective mutants, foci numbers were significantly reduced (*p* \< 0.0001). Data are represented as mean +/- SEM. (E) In WT, most LP nuclei exhibit six COSA-1::GFP foci. (E′) In *rmh-1(jf54)*, nuclei with fewer than five COSA-1 foci (white circles) are observed. (F) Stacked bar graph showing the percentage of late pachytene nuclei containing a defined number of COSA-1 foci either in WT (*n* = 428) or in *rmh-1(jf54)* (*n* = 291) and *rmh-1(tn309)* (*n* = 329) mutants. Distribution of COSA-1 foci is significantly different between WT and both mutants (Mann Whitney test, \*\*\*\* *p* \< 0.0001). (G) Images of individual bivalents (in WT) or univalents (in mutants) from diakinesis-stage oocytes, stained for markers that concentrate on the short arms (SYP-1) and long arms (LAB-1) of the cross-shaped bivalents in WT, reflecting differentiation of chromosome axis composition that occurs in response to nascent CO events. In *spo-11(me44)*, SYP-1 and LAB-1 domains overlap on univalents. In contrast, some univalents in *rmh-1* mutants exhibit spatially differentiated SYP-1 and LAB-1 domains, suggesting that CO sites were designated but did not mature into chiasmata. The example of *rmh-1(tn309)* shows that the mutual exclusion of LAB-1 and SYP-1 can be interrupted. (J) Quantification of DAPI positive structures in the -3, -2, and -1 oocytes (*n* = 31 for WT, *n* = 86 for *rmh-1(tn309)*, and *n* = 91 for *rmh-1(jf54)*), as shown in the scheme, in which the position is defined relative to the spermatheca (H). Homologs progressively dissociate in *rmh-1*. Data are represented as mean +/- SEM with ns for not significant, \* *p* \< 0.05, \*\* *p* \< 0.01, and \*\*\*\* *p* \<0.0001. (I) *rmh-1(jf54)* diakinesis nucleus, showing a pair of univalents (yellow and blue squares). (K) Quantification of DAPI positive structures in the -1 oocyte. Reduced DAPI bodies in the double *rmh-1(jf54); xpf-1* (*p* \< 0.05), *rmh-1(jf54) mus-81* (*p* \< 0.001), or *rmh-1(jf54) slx-1* (*p* \< 0.01) but not *rmh-1(jf54); him-18* (*n* = 15--36 nuclei per genotype). Data are represented as mean +/- SEM with ns for not significant, \* *p* \< 0.05, \*\* *p* \< 0.01, and \*\*\*\* *p* \< 0.0001. (N) DNA bridges in *rmh-1(jf54); him-18*, *rmh-1(jf54); xpf-1*, *rmh-1(jf54) mus-81; and rmh-1(jf54) slx-1*. (M) Quantification of diakinesis nuclei (-2 and -1) containing at least one DNA bridge between two univalents (*n* = 30--45 nuclei per genotype). Blue stars represent differences to *rmh-1(jf54)*. Data are represented with \*\*\*\* for *p* \< 0.001, \* for *p* \< 0.05, and ns for not significant (Chi^2^ test). Scale bars = 20 μm for gonads, 5 μm for nuclei, and 2 μm for bivalents or univalents.](pbio.1002412.g004){#pbio.1002412.g004} The mid pachytene number of RMH-1 foci, at least twice the number of eventual COs, is consistent with RMH-1 localizing both at CO sites and at sites that will ultimately become NCOs. This is consistent with our analysis of GFP::RMH-1 localization following induction of excessive DNA breaks by ionizing radiation (IR, 50Gy). We found that at 4 h post IR treatment, the number of RMH-1 foci in mid pachytene nuclei had risen significantly, suggesting that RMH-1 was loaded on many of the excess recombination intermediates produced by IR. To understand what would happen to those excess recombination intermediates positive for RMH-1, we analyzed gonads 8 h post IR treatment (after this time, the nuclei with the increased number of RMH-1 foci should have reached late pachytene). However, at this stage, the numbers were reduced to wild type numbers of foci in late pachytene nuclei ([S7A--S7C Fig](#pbio.1002412.s007){ref-type="supplementary-material"}). Thus, we conclude that RMH-1 marks recombination intermediates that can be increased transiently by irradiation but will be repaired as NCOs, as the final number of marked CO sites is not affected. Crossover Promoting Function(s) of RMH-1 {#sec006} ---------------------------------------- The robust accumulation of RMH-1 at CO sites, the dependence of its localization on pro-CO factors, and the presence of univalents in the *rmh-1* mutants together suggest that RMH-1 likely functions in promoting the CO outcome of initiated recombination events. Several lines of evidence provide further support for pro-CO role(s) for RMH-1. First, we tested whether *rmh-1* is required for normal localization of pro-CO factors by assessing the localization of GFP::COSA-1 in *rmh-1* mutants. This analysis revealed that only 75% of nuclei in *tn309* and 57% of nuclei in *jf54* had six COSA-1 foci (compared to 88% in wild-type) ([Fig 4E and 4F](#pbio.1002412.g004){ref-type="fig"}), indicating a deficit of CO-designated sites in *rmh-1* mutants. Furthermore, we observed several indications of a delay in pachytene progression in both *rmh-1* mutants. First, we assessed localization of ZHP-3, which normally localizes along the full length of the synaptonemal complex (SC) during mid pachytene, then retracts during late pachytene to a short stretch and, finally, to a single focus at the CO site in diplotene \[[@pbio.1002412.ref066]\]; we found that ZHP-3 retraction was delayed in *rmh-1(jf54)* ([S8A--S8D Fig](#pbio.1002412.s008){ref-type="supplementary-material"}). Second, we evaluated a readout of a checkpoint-like feedback mechanism that operates during *C*. *elegans* meiosis to coordinate meiotic progression with generation of CO-eligible recombination intermediates. A single chromosome pair that lacks a CO-eligible recombination intermediate can be detected and elicit a prophase progression delay, visible by the persistence of markers such as phospho-SUN-1 S8 on the nuclear envelope \[[@pbio.1002412.ref067]\]. SUN-1 S8Pi staining was prolonged in *rmh-1* mutants, indicating a delay in prophase progression ([S8E--S8H Fig](#pbio.1002412.s008){ref-type="supplementary-material"}), which is in line with delayed and/or impaired formation of CO-specific recombination intermediates. These data in combination with the observed reduction in COSA-1-marked CO-designated sites together indicate a role for RMH-1 in ensuring efficient CO designation. Although the number of CO-designated sites is reduced in *rmh-1* mutants, CO designation still occurs to a large extent, as 57% to 75% of nuclei contain six COSA-1 foci. Moreover, the reduction in number of COSA-1-marked CO sites is not sufficient to account for the number of univalents observed. To calculate the expected number of DAPI bodies in diakinesis nuclei based on our quantification of COSA-1 foci in *rmh-1* mutants, we assumed that pachytene nuclei containing six COSA-1 foci would lead to diakinesis nuclei with six bivalents, pachytene nuclei containing five COSA-1 foci would lead to diakinesis nuclei with seven DAPI bodies (five bivalents and two univalents), and so on. This approach yields an expectation of 6.7 DAPI bodies at diakinesis for *rmh-1(jf54)* and 6.6 for *rmh-1(tn309)*, values that are significantly lower than those observed in the -1 oocytes of these mutants ([Fig 1B and 1F](#pbio.1002412.g001){ref-type="fig"}). Thus, the number of univalents present at the end of meiotic prophase is higher than would be expected if all COSA-1-marked sites had successfully matured into COs. To understand this excess of univalents, we investigated the organization of chromosomes in diakinesis. In wild type, the presence of a CO precursor triggers domain restructuring of the ensuing bivalent such that the axial proteins HTP-1/2 and LAB-1 become concentrated along the long arm of the bivalent, and the synapsis protein SYP-1 and the Aurora B kinase (AIR-2) are found on the short arm \[[@pbio.1002412.ref068]--[@pbio.1002412.ref070]\]. In *spo-11* or *msh-5* mutants, short and long arm markers overlapped on the univalents. In *rmh-1* mutants, however, we observed long and short arm markers localized to reciprocal domains on univalents ([Fig 4G](#pbio.1002412.g004){ref-type="fig"}), suggesting that a CO site had been designated but failed to mature to actually link the homologs. Furthermore, quantification of DAPI bodies during progression through the diakinesis stage (-3, -2, and -1 oocyte) showed that they increased significantly ([Fig 4H--4J](#pbio.1002412.g004){ref-type="fig"}). We observed that in the -3 oocyte, the number of DAPI bodies in *rmh-1* mutants (6.9 ± 0.7 DAPI bodies for *jf54* and 6.8 ± 0.9 for *tn309*) was significantly increased compared to wild type. Interestingly, the observed number of DAPI bodies in -3 oocytes of the mutants corresponds to the calculated number of DAPI bodies based on COSA-1 foci analysis. However, in both mutants, the number of DAPI bodies strongly increased during oocyte maturation. In *rmh-1(jf54)*, we observed 9.3 ± 1.4 DAPI bodies in the -1 oocytes, while the effect was milder but still significant in *rmh-1(tn309)* (7.4 ± 1.1 in -1 oocytes). We conclude that, in *rmh-1* mutants, connections between homologs may sometimes be lost after CO designation. Genetic Interactions with Mutations Affecting Structure-Specific Endonucleases {#sec007} ------------------------------------------------------------------------------ Dissociation of bivalents that appeared to have undergone CO designation suggested that RMH-1 might function to enforce CO bias in the resolution of recombination intermediates at CO sites. This hypothesis prompted us to examine double mutants carrying *rmh-1(jf54)* in combination with mutations in *xpf-1*, *mus-81*, or *slx-1*, which encode structure-specific endonucleases proposed to function in two separate and partially redundant meiotic resolution pathways \[[@pbio.1002412.ref022]--[@pbio.1002412.ref024]\], and *him-18* (*Slx4 ortholog)*, which encodes a nuclease scaffolding protein \[[@pbio.1002412.ref071]\]. Dissociation of bivalents in *rmh-1(jf54)* was reduced by loss of *xpf-1*, *mus-81*, or *slx-*1 ([Fig 4K](#pbio.1002412.g004){ref-type="fig"}), consistent with persistence of recombination intermediates; however, it is unclear whether such putative persistent intermediates are located at CO-designated sites and/or at other sites on the chromosomes. Furthermore, we observed an elevated incidence of unresolved bivalents linked by DNA bridges ([Fig 4M and 4N](#pbio.1002412.g004){ref-type="fig"}) in these double mutants compared to the *xpf-1*, *mus-81*, or *slx-1* single mutants. Together with previous work showing that such linkages observed in nuclease-defective mutants are *spo-11*-dependent \[[@pbio.1002412.ref022]\], these results suggest that loss of RMH-1 function may result in the accumulation of excess and/or aberrant recombination intermediates that require these structure-specific endonucleases for their resolution. We also observed the occurrence of DNA bridges in the double *rmh-1(jf54); him-18* mutant, but, those linkages appeared with the same frequency as in the *him-18* single mutant. Furthermore, loss of *him-18* in *rmh-1(jf54)* did not appreciably suppress the dissociation of homologs ([Fig 4K](#pbio.1002412.g004){ref-type="fig"}), in contrast to the outcomes with the single-nuclease mutants. We can reconcile these seemingly paradoxical observations by postulating (1) that unscaffolded nucleases may be able to act on recombination intermediates produced in *rmh-1* mutants to remove excess connections between homologs, and (2) that the presence of multiple unresolved intermediates connecting homologs (in *rmh-1; xpf-1*, *rmh-1 mus-81*, or *rmh-1 slx-1* mutants) might obscure detection of discrete bridges. Interdependent and Separable Functions of RMH-1 and HIM-6 (BLM Helicase) {#sec008} ------------------------------------------------------------------------ As RMI1 was first identified as a component of a complex containing the RecQ helicase BLM and the topoisomerase TOP3, we used the yeast-two-hybrid assay to confirm interactions between RMH-1 and HIM-6 (the *C*. *elegans* BLM ortholog) and between RMH-1 and TOP-3 ([S9A Fig](#pbio.1002412.s009){ref-type="supplementary-material"}). Furthermore, as several phenotypes of the *rmh-1* mutants resemble phenotypes seen in *him-6* mutants ([S9B and S9C Fig](#pbio.1002412.s009){ref-type="supplementary-material"}) \[[@pbio.1002412.ref046],[@pbio.1002412.ref053]\], we investigated the cytological and functional inter-relationships between RMH-1 and HIM-6. To examine colocalization of RMH-1 and HIM-6, we used the CRISPR method to tag the *him-6* locus with a C-terminal human influenza hemagglutinin (HA) epitope. The tag did not compromise HIM-6 function, since neither an increase in embryonic inviability nor a Him phenotype was observed ([S5 Fig](#pbio.1002412.s005){ref-type="supplementary-material"}). HIM-6 is found in few foci in early pachytene. The number of foci increases in mid pachytene and decreases again in late pachytene, reminiscent of the RMH-1 pattern. In mid pachytene, RMH-1 and HIM-6 substantially colocalized, and, in late pachytene, RMH-1 strictly colocalized with HIM-6; however, additional HIM-6 foci were also present (96.6 +/- 4.1% RMH-1 foci colocalize with HIM-6 in mid pachytene and 96.3 +/- 6.7% in late pachytene; [Fig 5A--5C](#pbio.1002412.g005){ref-type="fig"}). ![Separable and interdependent functions of RMH-1 and HIM-6 (BLM).\ (A-C) Comparison of RMH-1::GFP and HIM-6(BLM)::HA localization in wild-type germ cells. (B--B′′) In mid pachytene (MP) nuclei, a high number of GFP::RMH-1 and HIM-6::HA foci are present, and most colocalize. (C--C′′) In late pachytene (LP), HIM-6 and RMH-1 colocalize in bright foci, but additional HIM-6 signals are present at other sites. (D) In *rmh-1(tn309)*, HIM-6 foci are very small and faint (two gonads) or completely undetectable (three gonads). Inset: residual HIM-6 foci do not colocalize (white arrows) with ZHP-3. (E) In *rmh-1(jf54)*, HIM-6 is still present in foci. Insets for MP (1) and LP (2); in (2), HIM-6 foci can be found in proximity of ZHP-3 at some putative CO-designated sites; however, most do not colocalize. (F) Stacked bar graph showing the percentage of nuclei containing a defined number of COSA-1 foci either in WT (*n* = 428), *rmh-1(jf54)* (*n* = 291), *rmh-1(tn309)* (*n* = 329), *him-6(ok412)* (*n* = 204), or *rmh-1(jf54)*; *him-6* (*n* = 177). The data presented for WT, *rmh-1(jf54)*, and *rmh-1(tn309)* are the same as in [Fig 4F](#pbio.1002412.g004){ref-type="fig"}. Difference in COSA-1 foci distribution was assessed by a Mann Whitney test: ns stands for not significant and \*\*\*\* *p* \< 0.0001. (G) Quantification of the number of DAPI positive structures in the -1 oocyte for WT; single mutants (*rmh-1(tn309)- him-6(ok412)- rmh-1(jf54)) and* the double *rmh-1(tn309)*; *him-6* and *rmh-1(jf54)*; *him-6* (*n* = 15--36 nuclei per genotype). Data are represented as mean +/- SEM with ns (not significant) and \*\*\*\* *p* \< 0.001. (H) In *him-6(ok412)*, RMH-1 is not detectable in MP (I,I′), but bright RMH-1 foci are present in LP (J,J′), albeit quantification (K) indicates that their numbers are reduced relative to WT (*p* \< 0.001). Data are represented as mean +/- SD. Scale bar 20 μm for gonads, 5 μm for pachytene nuclei insets, and 2.5 μm for single nuclei.](pbio.1002412.g005){#pbio.1002412.g005} To investigate the interdependence of localization, we assayed localization of HIM-6::HA in *rmh-1* mutants. In *tn309*, HIM-6 was completely absent in most of the gonads we imaged. In the rest, HIM-6 was barely detectable, and when foci were seen, they were not at CO sites in late pachytene ([Fig 5D](#pbio.1002412.g005){ref-type="fig"}). In *jf54*, HIM-6 foci were present in all gonads but seemed smaller and fainter in mid and late pachytene, suggesting that RMH-1 is required to stabilize and enrich HIM-6 in foci ([Fig 5E](#pbio.1002412.g005){ref-type="fig"}). Although HIM-6 is sometimes found in proximity to CO site markers, these do not exhibit robust colocalization in the absence of *rmh-1* ([Fig 5E](#pbio.1002412.g005){ref-type="fig"}). Assessment of the localization of GFP::RMH-1 in the *him-6(ok412)* mutant revealed that *him-6* is required for RMH-1 localization in mid pachytene but not in late pachytene ([Fig 5H--5J](#pbio.1002412.g005){ref-type="fig"}). This finding is consistent with the idea that RMH-1 may be present in genetically distinguishable complexes in mid and late pachytene stages. However, *him-6* is required for normal numbers of RMH-1 foci even in late pachytene ([Fig 5K](#pbio.1002412.g005){ref-type="fig"}). An important difference between *rmh-1* and *him-6* mutants is their impact on CO designation. A previous study showed that in the null allele of *him-6*, the abundance of COSA-1 foci was unaffected \[[@pbio.1002412.ref046]\]; thus, the *him-6* null mutant appears to be proficient for CO designation. On the other hand, both *rmh-1* alleles impair CO designation, as evidenced by an elevated frequency of nuclei containing fewer than six COSA-1 foci ([Fig 5F](#pbio.1002412.g005){ref-type="fig"}). Furthermore, the fact that CO designation is unaffected in a *him-6* null mutant but is impaired in an *rmh-1; him-6* double mutant implies that RMH-1 can assist in promoting CO designation in the absence of HIM-6. A deficit of bivalent connections is a shared feature of *rmh-1* and *him-6* mutants. The phenotype is evident but less pronounced in *him-6* or *rmh-1(tn309)* (*p* \< 0.05), while it is more prominent in *rmh-1(jf54)* (*p* \< 0.01). The number of DAPI bodies in *rmh-1(tn309); him-6(ok412)* and the respective single mutants was not different. Interestingly, however, we found that the deficit of connections between homologs in *rmh-1(jf54); him-6(ok412)* oocytes was reduced compared to the *rmh-1(jf54)* single mutant ([Fig 5G](#pbio.1002412.g005){ref-type="fig"}), despite the fact that COSA-1 foci were reduced in this double mutant. One possible explanation for this observation would be that the dissociation of bivalents observed in *rmh-1(jf54)* might be mediated by HIM-6. An alternative explanation is that the simultaneous loss of HIM-6 and RMH-1 may lead to persistence of unresolved recombination intermediates that maintain connections between the homologs. RMH-1 and HIM-6/ BLM Pachytene Foci Are Doublets/Elongated Structures {#sec009} --------------------------------------------------------------------- We investigated the foci structure of RMH-1 and HIM-6 foci using structured illumination microscopy (SIM). Both in mid pachytene and late pachytene, RMH-1 and HIM-6 signals were resolved into more complex structures ([Fig 6](#pbio.1002412.g006){ref-type="fig"}). In mid pachytene, we observed foci that clearly exhibit a doublet structure and foci that show an elongated shape ([Fig 6A and 6B](#pbio.1002412.g006){ref-type="fig"}). In late pachytene, RMH-1 and HIM-6 appear even more clearly as doublets ([Fig 6C--6E](#pbio.1002412.g006){ref-type="fig"}). In both pachytene stages, we hypothesize that RMH-1 and HIM-6 foci mark similar recombination intermediates. The doublet structure is likely easier to observe in late foci as RMH-1 protein accumulates during pachytene progression, leading to larger foci in late pachytene. We measured the average distance between the foci peak in the three-dimensional stacks as an average of 227 +/- 46 nm. Interestingly, in *Drosophila*, the size of a recombination nodule has been estimated to around 100 nm \[[@pbio.1002412.ref072]\]. It has also been shown that 1 kb of B-form DNA is 340 nm in length. We conclude that the structure we describe here is on an appropriate scale for flanking dHJs. We also observed that the late pachytene HIM-6 doublet structures flank a COSA-1 focus in the wild type ([Fig 6F](#pbio.1002412.g006){ref-type="fig"}). Interestingly, in the *rmh-1(jf54*) mutant, HIM-6 appears as single foci and not as elongated or doublet structures in late pachytene ([Fig 6G](#pbio.1002412.g006){ref-type="fig"}). This suggests that *rmh-1* is required to concentrate HIM-6 at CO sites and also to organize a complex structure surrounding late recombination intermediates. ![Foci of RMH-1 and BLM are resolved as doublets or elongated structures during the pachytene stage.\ (A--G) Single pachytene nuclei imaged by SIM. (A--B) In the WT, HIM-6 and RMH-1 colocalize in MP. Foci appear elongated or as a doublet (see insets). (C--E) In LP, RMH-1 and HIM-6 are concentrated at CO sites contained in a structure resolvable into a doublet (see insets). (F) Colocalization of HIM-6 and COSA-1 at CO sites in WT. (G) In *rmh-1(jf54)*, HIM-6 does not colocalize with COSA-1 at CO sites (white arrow) but can be found in close proximity (white arrows). Scale bar 2μm.](pbio.1002412.g006){#pbio.1002412.g006} SMC-5 and RMH-1 Act Synergistically to Eliminate Illegitimate Interhomolog Connections {#sec010} -------------------------------------------------------------------------------------- The mid pachytene localization of RMH-1 (and HIM-6) to numerous foci in excess of the eventual number of COs, together with the well-known role for the RTR complex in discouraging COs in other systems (see [Introduction](#sec001){ref-type="sec"}), led us to investigate the possibility that RMH-1 also functions at NCO sites during *C*. *elegans* meiosis. We focused on the possibility that RMH-1 might function in parallel with the SMC-5/6 complex, based on several considerations. First, several studies in budding yeast showed that in the absence of *Smc5* or *Smc6* during meiosis, COs form but joint molecules accumulate, leading to chromosome segregation defects \[[@pbio.1002412.ref057]--[@pbio.1002412.ref059]\]. Moreover, it was shown that Smc6 was required for the resolution of the joint molecules accumulating in absence of Sgs1, suggesting collaboration of pathways mediated through those two proteins \[[@pbio.1002412.ref059]\]. Second, a prior study showed that the *C*. *elegans* SMC-5/6 complex is important for meiotic DSB repair under conditions in which interhomolog CO formation is abrogated and/or in mutant situations when intersister repair is the only option \[[@pbio.1002412.ref073]\]. Moreover, the data of Bickel et al. are fully consistent with the SMC-5/6 complex participating in interhomolog NCO repair as well. Several lines of evidence support the hypothesis that RMH-1 functions in parallel with the SMC-5/6 complex to antagonize accumulation of aberrant interhomolog connections. First, we observed a significant increase in RMH-1 foci in mid pachytene nuclei in the *smc-5* mutant; 29.1% of nuclei contained more than 25 foci, never seen in wild type ([Fig 7A and 7B](#pbio.1002412.g007){ref-type="fig"}). However, late pachytene nuclei in the *smc-5* mutant had an average of six foci per nucleus, as in wild type ([Fig 7C](#pbio.1002412.g007){ref-type="fig"}), suggesting that an excess of RMH-1-associated recombination intermediates accumulate in the *smc-5* mutant, but they are ultimately taken care of in agreement with the wild type viability of the single mutant ([Fig 7D](#pbio.1002412.g007){ref-type="fig"}). Second, the *rmh-1(jf54); smc-5(ok2421)* double mutant showed both a synthetic decrease in embryonic hatch rates and increase in larval arrest ([Fig 7D and 7E](#pbio.1002412.g007){ref-type="fig"}), indicating a strong genetic interaction between *rmh-1* and *smc-5* in the soma but also likely during meiosis (a similar genetic interaction is reported between *him-6* and *smc-5* in \[[@pbio.1002412.ref074]\]). Third, quantification of the number of DAPI bodies in diakinesis oocytes in the *rmh-1; smc-5* double mutant revealed an average of 5.9 ± 0.3 DAPI bodies in the -1 oocyte ([Fig 7F](#pbio.1002412.g007){ref-type="fig"}), consistent with the presence of connections between the homologs. However, cytological examination of chromosome organization revealed that these interhomolog connections were aberrant. Consistent with the low viability of this double mutant, bivalent organization was dramatically defective: both long arms (indicated by LAB-1 staining) were always found together, precluding the wild-type cross-shaped appearance of the bivalent ([Fig 7G--7J](#pbio.1002412.g007){ref-type="fig"}). Such abnormal bivalents were already observed at a low frequency in each of the single mutants, but are now present in each diakinesis nucleus in the double mutant ([Fig 7K](#pbio.1002412.g007){ref-type="fig"}). This result strongly suggests that *rmh-1* and *smc-5* cooperate to eliminate and/or prevent accumulation of connections between homologs at NCO sites. Finally, we found that simultaneous loss of both RMH-1 and SMC-5 results in a high frequency of interhomolog connections even in the absence of the conserved meiotic CO factor ZHP-3. Whereas COs and chiasmata are eliminated in the *zhp-3* single mutant \[[@pbio.1002412.ref016]\], a small but significant reduction in DAPI bodies in -1 oocytes was observed in the *zhp-3; smc-5* mutant ([Fig 7L, 7M and 7O](#pbio.1002412.g007){ref-type="fig"}). This ability to create aberrant homolog connections in a *zhp-3* mutant is consistent with the finding that a mutation affecting the budding yeast Smc5/6 complex has the ability to create connections between homologous chromosomes in a mutant lacking Zip3 (the ZHP-3 ortholog) \[[@pbio.1002412.ref059]\]. Moreover, ectopic ZHP-3-independent connections occurred at very high frequency in a *zhp-3; rmh-1; smc-5* triple mutant, in which we observed an average of 7.3 DAPI bodies at diakinesis ([Fig 7N and 7O](#pbio.1002412.g007){ref-type="fig"}). Together, our data indicate that *smc-5* and *rmh-1* act in parallel to antagonize MutS gamma-independent inter-homolog connections, supporting the conclusion that RMH-1 also functions at NCO sites. ![RMH-1 and SMC-5 cooperate to prevent accumulation of aberrant interhomolog connections.\ (A) In *smc-5(ok2421)*, RMH-1 foci increase in mid pachytene nuclei (MP) (green square), while in late pachytene (LP) (yellow square), a zone with fewer foci is still present, as in WT. (B) Quantification of RMH-1 foci in MP nuclei in WT (*n* = 205) and *smc-5(ok2421)* (*n* = 203). In the mutant, we frequently observe nuclei with more than 25 foci, never seen in the WT. Distribution of mid pachytene GFP::RMH-1 foci is significantly different between WT and *smc-5* mutant (Mann Whitney test, \*\*\*\* *p* \< 0.0001). (C) Quantification of RMH-1 foci in LP nuclei; data are represented as mean +/- SD with ns (not significant). Quantification of hatch rate (D), larval arrest (E), and DAPI bodies in diakinesis oocytes (F) for WT, *rmh-1(jf54)*, *smc-5(ok2421)*, and *rmh-1(jf54); smc-5* (*n* = 35--45 hermaphrodites per genotype). Data are represented as mean +/- SD with ns (not significant) and \* *p* \< 0.05, \*\* *p* \< 0.01, \*\*\* *p* \< 0.001, \*\*\*\* *p* \< 0.0001. (G--J) Images of individual diakinesis bivalents stained for long arm and short arm markers. Both *rmh-1(jf54)* and *smc-5* single mutants exhibit abnormally structured bivalents at low frequency (H,I). In *rmh-1; smc-5*, all diakinesis nuclei contain bivalents with abnormal structures; typical of these abnormalities is a side-by-side organization of the long arms of the bivalents (J′), presumably reflecting the presence of persistent interhomolog associations at NCO sites. (K) Quantification of the frequencies of diakinesis nuclei (-2 and -1) containing at least one abnormal bivalent (*n* = 13--25 nuclei per genotype). Data are represented as percentage with ns (not significant) and \*\* *p* \< 0.01, \*\*\* *p* \< 0.001, and \*\*\*\* *p* \< 0.0001 (Chi^2^ test) (L--N) Images of chromosomes in diakinesis nuclei from *zhp-3; smc-5* and *rmh-1(jf54) zhp-3; smc-5* worms. Despite the absence of the canonical meiotic CO machinery component ZHP-3, fewer than 12 DAPI structures are observed in some *zhp-3; smc-5*--1 oocytes, indicating the presence of ectopic connections (L,M). Such ectopic connections occur at high frequency in the *rmh-1(jf54) zhp-3; smc-5* triple mutant (N--N′). The quantification is presented in (O) with *n* = 13--36 oocytes per genotype. Data are represented as mean +/- SD with ns (not significant), \* *p* \< 0.05 and \*\*\*\* *p* \< 0.0001.](pbio.1002412.g007){#pbio.1002412.g007} RMH-1 Discourages COs in the Center of Chromosomes {#sec011} -------------------------------------------------- To assess the role of RMH-1 at NCO sites in more detail, we analyzed the localization of COs along the chromosomes. We used deep sequencing to compare CO frequency and CO distribution between the wild type and *rmh-1* mutants (*jf54* and *tn309*). We took advantage of the *C*. *elegans* Hawaiian (Hw) strain, which contains a high frequency of SNPs compared to the Bristol strain (wild type). Thus, we generated strains containing *rmh-1* mutants in combination with a subset of introgressed "Hawaii chromosomes": chromosomes II and V for *rmh-1(jf54)* and chromosomes X, IV, and V for *rmh-1(tn309)*. (Introgression of all Hawaii chromosomes into the *rmh-1* mutants led to sterility). We sequenced all the parental strains (Bristol, Hw, and the "Hw introgressed *rmh-1* mutants") and used them as references. Recombinants between the Bristol strain and Hw were generated as described in [Fig 8A](#pbio.1002412.g008){ref-type="fig"}. We singled F2 animals and allowed them to self-fertilize for three to four generations and deep-sequenced DNA isolated from their progeny. Paired-end reads were mapped as described in the Experimental Procedures section. Bioinformatic analysis identified 166,928 homozygous unique SNPs in the Hw genome. To assess the chromosome composition in each recombinant, we used the homozygous unique SNPs of the Hw strain. We used SNPs located at least 400 bp apart to avoid having two or more SNPs per paired read. In the absence of recombination, two genotypes are expected in the offspring: fully homozygous (i.e., both homologous chromosomes come from the same parental strain) and fully heterozygous (each homolog comes from one parental strain). If recombination occurred, blocks of homozygosity and blocks of heterozygosity were detected. We identified the recombination break-points by analyzing the changes in heterozygosity along the chromosome (for more details, see the [Experimental Procedures](#sec015){ref-type="sec"} section). ![RMH-1 promotes the bias for CO formation on chromosome arms.\ (A) Schematics of crosses to obtain the progeny of singled F2 individuals subjected to Next Generation Sequencing (NGS) for SNP analysis. White insert indicates the WT (Bristol) background, and black insert indicates the Hawaiian background. (B) Quantification of the overall recombination frequencies for assayed chromosomes; stacked bar graph indicates the fraction of meiotic products with zero, one, or two COs. For WT (*n* = 36 chromatids), for *rmh-1(jf54)* (*n* = 40 chromatids), and for *rmh-1(tn309)* (*n* = 45 chromatids). The frequency of COs was not found to be different between WT and both mutants (Chi^2^ test). (C) Scheme of the different chromosomes used during the recombination assay. The chromosome domains (left arm in blue, center in yellow, and right arm in purple) are correlated with the physical map of each chromosome. (D) Locations of the recombination events (assayed for chromosomes X, IV, and V) in WT (*n* = 17 COs: three events on X, four on II, four on IV, and six on V), for *rmh-1(jf54)* (*n* = 20 COs: 11 events on II and 9 on V), and *rmh-1(tn309)* (*n* = 21 COs: nine events on X, nine on IV, and three on V); also see the [Experimental Procedures](#sec015){ref-type="sec"} section. The relative distribution of COs in the center versus arm domains differed from the WT for *tn309* (*p* = 0.046, Chi^2^ test) and for *jf54*, (p = 0.062, Chi^2^ test).](pbio.1002412.g008){#pbio.1002412.g008} We did not detect a significant difference between the mutants and wild-type control in the total frequencies of crossovers ([Fig 8B](#pbio.1002412.g008){ref-type="fig"}). This observation contrasts with the reduction in COSA-1 foci observed in both mutants, and could potentially reflect sample size or the fact that viable progeny were used in the recombination assay; alternatively, it may reflect crossovers occurring at sites not marked by COSA-1 foci in the mutants. However, we found that the positions of the COs were shifted significantly toward the center of chromosomes in both mutants, in contrast to the preference observed in the wild type, in which the majority of COs occurred in the gene-sparse "arm" regions of the chromosomes ([Fig 8C and 8D](#pbio.1002412.g008){ref-type="fig"}). We conclude that *rmh-1* is required to discourage COs in the center of chromosomes. A shift of COs toward chromosome centers in the *rmh-1(jf54)* mutant was confirmed by using a PCR-based assay to genotype four SNPs along chromosome IV ([S10 Fig](#pbio.1002412.s010){ref-type="supplementary-material"}). A parallel study analyzed the recombination rate and CO position in the *him-6* mutant. Here, the entire brood was used (dead and living progeny) to determine recombination; similarly, a shift toward the chromosome centers was observed \[[@pbio.1002412.ref074]\]. Discussion {#sec012} ========== Genetically Separable Roles for RMH-1 at CO and NCO Sites {#sec013} --------------------------------------------------------- Although protein complexes involving RMI1 and/or BLM helicase were initially recognized based on anti-CO activities, recent work in several systems has led to a growing realization that BLM and RMI1 play multiple roles during meiotic recombination, functioning both in antagonizing and promoting COs (for review, see \[[@pbio.1002412.ref075]\] and [Introduction](#sec001){ref-type="sec"}). One current view for *Saccharomyces cerevisiae* is that the primary role of the RTR complex is as a "recombination intermediate chaperone" \[[@pbio.1002412.ref041],[@pbio.1002412.ref044],[@pbio.1002412.ref045],[@pbio.1002412.ref055],[@pbio.1002412.ref056]\]. Under this model, RTR plays an indirect role in promoting COs during yeast meiosis, either by generating recombination intermediates recognized and processed by the Exo1-MutLγ pathway or by disassembling aberrant recombination intermediates, thereby helping to channel early recombination intermediates into either a MutSγ-dependent CO pathway or into the SDSA pathway for generating NCOs. Yeast Sgs1 has also been implicated in promoting resolution of CO intermediates under circumstances in which JM resolution is impaired \[[@pbio.1002412.ref055]\]. A more prominent pro-CO role has been uncovered for HIM-6/BLM during *C*. *elegans* meiosis, in which loss of BLM function results in reduced COs \[[@pbio.1002412.ref053],[@pbio.1002412.ref054]\]. It was proposed that HIM-6 functions to enforce a CO-biased outcome of resolution of CO intermediates; however, it was not clear whether this proposed pro-CO role for HIM-6 was direct or indirect \[[@pbio.1002412.ref022],[@pbio.1002412.ref046]\]. Our combined genetic and cytological analysis provides a strong case that RMH-1 functions directly at both CO and NCO sites. For a summary, see [Fig 9](#pbio.1002412.g009){ref-type="fig"}. ![RMH-1 contributes to successful bivalent formation at several levels during prophase I.\ Top: scheme of *C*. *elegans* gonad showing prophase I divided in zones: transition zone (leptotene/zygotene), pachytene (early, mid, and late), diplotene, and diakinesis. Bottom: summary of localization and functions of RMH-1. Bold: key words referring to localization or function; italics: used when mechanistic insight is proposed. First row: localization of RMH-1: numerous foci in mid pachytene, six bright foci in late pachytene: RMH-1 is absent in diakinesis. Second row: genetic requirements and characteristics of RMH-1 localization. Third row: anti CO function: RMH-1 prevents accumulation of joint molecules and discourages CO formation in chromosome centers. Last row: pro CO functions: role of RMH-1 in CO designation, in assurance of chiasma formation and, finally, its potential function in supporting the geometry of recombination intermediates. We propose timing for the different functions based on our data and previous publications. However, the *C*. *elegans* gonad is a continuous production line of meiocytes, and we do not intend to imply sharper transitions between meiotic stages than exist.](pbio.1002412.g009){#pbio.1002412.g009} First, RMH-1 and HIM-6 colocalize at CO designated sites (Figs [3G--3K](#pbio.1002412.g003){ref-type="fig"}, [5A--5C](#pbio.1002412.g005){ref-type="fig"} and [6F](#pbio.1002412.g006){ref-type="fig"}), and this late pachytene localization is dependent on conserved pro-CO factors ([Fig 4A--4D](#pbio.1002412.g004){ref-type="fig"}). Conversely, pro-CO factors can concentrate at presumptive CO sites in the absence of HIM-6 or RMH-1 (albeit less reliably in *rmh-1* mutants) consistent with RMH-1 and HIM-6 being recruited to CO designated sites to perform a late function in CO formation (Figs [4E, 4F](#pbio.1002412.g004){ref-type="fig"} and [5F](#pbio.1002412.g005){ref-type="fig"}). Moreover, SIM imaging of CO sites in late pachytene nuclei revealed that RMH-1 and HIM-6 colocalize in an elongated structure or closely juxtaposed doublets, potentially reflecting two separate populations of RTR complexes flanking the two junctions of a dHJ CO intermediate ([Fig 6](#pbio.1002412.g006){ref-type="fig"}). The "doublet" organization leads us to suggest that RMH-1 and HIM-6 localized at CO sites may support the CO outcome of recombination intermediate resolution either by promoting an optimal geometry for endonucleases (resolvases) to position DNA cleavage, or by protecting the structure from unscheduled action of endonucleases. Our analysis with the truncation allele *tn309* raises the possibility that HIM-6 itself may contribute to inappropriate resolution when RMH-1 is absent. Interestingly, RMH-1 and HIM-6 differ regarding the requirements for their recruitment at CO sites. Whereas RMH-1 is successfully recruited to most presumptive CO sites in *him-6* mutants ([Fig 5H--5K](#pbio.1002412.g005){ref-type="fig"}), HIM-6 does not stably concentrate at the sites of pro-CO factors in *rmh-1* mutants ([Fig 6G](#pbio.1002412.g006){ref-type="fig"}), raising the possibility that RMH-1 (or TOP-3 associated with RMH-1) may interact more directly with pro-CO factors at such sites. The absence of HIM-6 at CO sites in *rmh-1* mutants suggests that RMH-1 might provide a structural support to ensure the final processing of a mature recombination intermediate by limiting branch migration or the collapse of a putative dHJ and, thereby, influencing the outcome of resolution. We provide multiple lines of evidence that RMH-1 also localizes to NCO sites and that its function(s) in NCO repair events are distinct from its pro-CO role(s). First, localization of RMH-1 during early and mid pachytene has different genetic requirements than its late pachytene localization at CO-associated foci: Early/mid pachytene RMH-1 foci can still form (albeit at reduced levels) in mutants defective for pro-CO factors, but are strictly dependent on HIM-6, suggesting that the intermediates present at early and late foci differ in structure (Figs [4A--4D](#pbio.1002412.g004){ref-type="fig"} and [5H--5K](#pbio.1002412.g005){ref-type="fig"}). Furthermore, we show that such foci can occur at elevated levels when numbers of DSB are increased or when alternative pathways for DSB repair are abrogated ([Fig 7A](#pbio.1002412.g007){ref-type="fig"} and [S7A--S7C Fig](#pbio.1002412.s007){ref-type="supplementary-material"}). In mid pachytene, HIM-6 and RMH-1 proteins colocalize, but only a fraction colocalize with MSH-5 ([Fig 3G--3I](#pbio.1002412.g003){ref-type="fig"}). We hypothesize that foci positive for all three proteins correspond to CO-eligible recombination sites, while those positive for only HIM-6 and RMH-1 may be processed as NCOs (perhaps by a decatenation reaction). The occurrence of chromosome bridges in *rmh-1; resolvase* double mutants could indicate either the accumulation of recombination intermediates due to defective dissolution or a more direct collaboration between RMH-1 and resolvases to produce COs and/or NCOs ([Fig 4K--4M](#pbio.1002412.g004){ref-type="fig"}). Together, our data suggest direct but distinct roles for RMH-1 in both CO and NCO repair during *C*. *elegans* meiosis. Functions of RMH-1 at CO and NCO Sites Collaborate to Prepare Chromosomes for Segregation During the Meiotic Divisions {#sec014} ---------------------------------------------------------------------------------------------------------------------- Another important concept emphasized by our work analyzing the functions of RMH-1 during *C*. *elegans* meiosis is that a successful outcome of meiosis requires proper execution of the prescribed recombination events at both CO and NCO repair sites. Whereas COs serve as the basis of chiasmata that connect homologous chromosomes to enable them to orient toward opposite poles of the meiosis I spindle, efficient homolog segregation also depends on elimination of other recombination-based interactions between homologs that might impede their timely separation. Beyond ensuring CO formation, RMH-1 has (at least) two roles in preparing homologous chromosome for segregation at meiosis I. First, RMH-1 functions in parallel with SMC-5 in eliminating excess associations between homologs ([Fig 7](#pbio.1002412.g007){ref-type="fig"}). Importantly, we also demonstrate another major role for RMH-1 in ensuring that COs usually form in positions that favor reliable homolog segregation. In the absence of localized centromeres (due to the holocentric nature of *C*. *elegans* chromosomes), the position of the CO dictates multiple features of bivalent organization that are crucial for correct alignment and behavior of chromosomes \[[@pbio.1002412.ref069]\]. This defines distinct long arm and short arm domains where cohesion will be retained or released at the meiosis I division and delineates how kinetochore components, motor proteins, and cell-division protein kinases associate with the chromosomes. We found that, whereas COs usually occur at off-center positions during wild-type meiosis, COs occurred more frequently near the centers of the chromosomes in *rmh-1* mutants ([Fig 8](#pbio.1002412.g008){ref-type="fig"} and [S10 Fig](#pbio.1002412.s010){ref-type="supplementary-material"}). We speculate that an altered distribution of COs in an *rmh-1* mutant may reflect impaired execution at both CO and NCO repair sites. On the one hand, an impaired ability to impose CO-biased resolution at CO-designated sites results in intermediates at some of those sites being resolved as NCOs. On the other hand, impairment of a mechanism that would normally help dissociate intermediates to promote repair via SDSA may result in accumulation of DNA structures that require structure-specific endonucleases for their resolution, resulting in CO repair products at some sites that should have been NCOs. We have not observed a significant frequency of double COs in the mutants, suggesting that the misplaced COs are still subjected to interference. Interestingly, the SLX-1 resolvase is also required to suppress CO formation in the chromosome center \[[@pbio.1002412.ref024]\]. It is appealing to speculate that RMH-1 might cooperate with SLX-1 in a locally defined region to promote NCO resolution. We note that while CO positioning may be especially important in organisms like *C*. *elegans* that use COs to trigger differentiation of the bivalent, CO position is also very important during *Drosophila*, yeast, and human meiosis. in *Drosophila*, centromere proximal recombination events have been correlated to metaphase II nondisjunction \[[@pbio.1002412.ref076]\]. In yeast, centromere proximal COs have been shown to trigger premature separation of sister chromatids (PSSC). Interestingly, *sgs1* mutants exhibit reduced spore viability, potentially due to an excess of COs near the centromere leading to PSSC \[[@pbio.1002412.ref077]\]. In human meiosis, COs located very near to either telomeres or centromeres are associated with elevated risk of aneuploidies, e.g., \[[@pbio.1002412.ref078]--[@pbio.1002412.ref082]\]. Experimental Procedures {#sec015} ======================= Cultivation of worms followed standard protocols \[[@pbio.1002412.ref083]\]. All experiments were performed at 20°C. N2 Bristol was used as wild type. Experiments using GFP::RMH-1 always included the wild-type *rmh-1* gene, if not indicated otherwise. Strains are listed in [S1 Text](#pbio.1002412.s012){ref-type="supplementary-material"}. Raw data for the figures can be found in [S1 Table](#pbio.1002412.s011){ref-type="supplementary-material"}. Cytological Preparations and Immunofluorescence Analysis {#sec016} -------------------------------------------------------- Dissection and immunostaining was performed as described in \[[@pbio.1002412.ref067]\] with modifications when using SYP-1, LAB-1, and S10 phospho-histone 3: dissection and fixation was performed in 1x EBT instead of PBS 1X \[[@pbio.1002412.ref066]\]. Adults 24 h post L4 were dissected. Images are projections of stacks encompassing whole nuclei. For details on antibodies and microscopy, refer to [S1 Text](#pbio.1002412.s012){ref-type="supplementary-material"}. See also [S1 Text](#pbio.1002412.s012){ref-type="supplementary-material"} for *rmh-1* allele isolation and characterization, protein tagging (RMH-1, HIM-6::HA), generation of the *rmh-2* knockout, irradiation conditions, yeast two hybrid assays, photoconversion experiments, and recombination assays. Supporting Information {#sec017} ====================== ###### Identification of *rmh-1* (RMI homolog 1) mutants. \(A\) Alignment of the N- and C-terminal parts of RMI1 homologs: human (Hs), *C*. *elegans* (Ce), *Arabidopsis thaliana* (At), *Saccharomyces pombe* (Sp), and *Saccharomyces cerevisae* (Sc), with the DUF1767 domain (green frame) as described in \[[@pbio.1002412.ref047]\] and the OB domains (orange frame) as described in \[[@pbio.1002412.ref035]\]. (B) The mutation in *rmh-1(jf54)* affects the splice donor site of the first exon. Schematics of PCR primers used to analyze the structures of transcripts produced by the *rmh-1* locus. The spliced version corresponds to the wild type. In the unspliced version, intron 1 is present. Two different guanidines (three base pairs apart), present in exon 1, were used as cryptic splicing donor sites to substitute the original G mutated site in *rmh-1(jf54)*. Those versions led to deletions of intron 1 and a small portion of exon 1 (conserved amino acid in the DUF domain), as illustrated in (A). (C) Quantification of transcript abundance (four replicates). The percentage of transcripts represents the fraction of the total population of transcripts in one genotype (wild type or *jf54*). Data are represented as mean +/- SD (\*\*\* *p* \< 0.001 and \*\*\*\* *p* \< 0.0001). (D) Schematics of the protein products predicted for the different mutant alleles of *rmh-1*: *jf92*, *tn309*, and *jf54*. (TIF) ###### Click here for additional data file. ###### Requirements for GFP::RMH-1 localization. (A and A′) DSBs are required for RMH-1 localization throughout pachytene. In *spo-11(me44)*, which lacks meiotic DSBs, GFP:: RMH-1 is absent from DNA, although a few late pachytene nuclei contain one focus of protein (see inset). (B and C) Gonad from an *rmh-1(jf92)* worm expressing a *gfp*::*rmh-1* transgene containing the *rmh-1(jf54)* point mutation (B and B′) or the *gfp*::*rmh-1(tn309)* point mutation (C and C′). In both cases, GFP::RMH-1 is not detected in foci in the gonad. The fact that the transgene *gfp*::*rmh-1(tn309)* recapitulates the phenotype of the *tn309* allele (in a deletion background) proves expression of the transgene. Scale bars 20 μm for full gonad and 5 μm for insets. (TIF) ###### Click here for additional data file. ###### *rmh-1* mutants exhibit a mixture of bivalents and univalents in diakinesis. \(A\) Quantification of the average volume of a bivalent (assessed in the wild type) and a univalent (assessed in the *msh-5 (me23)* mutant in the -1 oocyte (*n* = 13 nuclei for both genotypes). Data are presented as mean +/- SD with *p* \< 0.0001. (B) Classification of the DAPI structures found in *rmh-1(jf54)* and *rmh-1(tn309)*. Classes (fragment \< univalent \< bivalent \< chromatin masses) were defined by the volume of the structure (*n* = 13 nuclei for wild type, *msh-5(me23)*, and *rmh-1(tn309)*, and *n* = 12 nuclei for *rmh-1(jf54)*). (TIF) ###### Click here for additional data file. ###### *rmh-1* is not required for pairing or synapsis. \(A\) Staining for HIM-8 (X chromosome pairing center binding protein) and (B) FISH with the 5S ribosomal locus (chromosome V) to follow pairing in *rmh-1(jf54)*. (D) Quantification of nuclei with a paired signal of HIM-8 in six equal zones in the gonad, as shown in (C) (*n* = 52--96 nuclei per zone for each genotype). Distribution of paired HIM-8 signals is not different between the wild type and mutant (Chi^2^ test). (E and G) Staining for SYP-1 protein (transverse filament of the SC) on wild type (E) or *rmh-1(jf54)* gonads (G). (F and H) Staining for HTP-3 (axial element of the SC) on wild type or *rmh-1(jf54)* gonads (H). Scale bars 5 μm. (TIF) ###### Click here for additional data file. ###### GFP::RMH-1 and HA::HIM-6 are functional transgenes. \(A\) Quantification of embryonic hatch rates and (B) the frequency of male offspring among the progeny of wild type, *rmh-1(jf92); gfp*::*rmh-1* (*n* = 35 hermaphrodites), *him-6*::*HA* (*n* = 45), and *gfp*::*rmh-1*; *him-6*::*HA* (*n* = 42). Data are represented as mean +/- SD (\* for *p* \< 0.05, \*\*\*\* for *p* \< 0.0001, and ns stands for not significant). (TIF) ###### Click here for additional data file. ###### Time course of recombination markers in prophase I. \(A\) Scheme of a *C*. *elegans* gonad showing the different meiotic stages: transition zone, pachytene (early, mid, and late), diplotene, and diakinesis. (B) Quantification of the average number of RAD-51, GFP::RMH-1, or GFP::COSA-1 foci per nucleus in the different meiotic zones of the gonad (*n* = 3 gonads). Data are represented as mean +/- SEM. (TIF) ###### Click here for additional data file. ###### Mid and late pachytene RMH-1 foci are differently regulated. \(A\) Mid pachytene (MP) nuclei (white square) contain more RMH-1 foci than the wild type, 4 h after 50 Gy irradiation. (B) Stacked bar graph showing the percentage of MP nuclei containing a defined number of RMH-1 foci: unirradiated wild type (*n* = 205) or after irradiation (*n* = 228). Distribution of GFP::RMH-1 differed between irradiated and unirradiated (Mann-Whitney test, *p* \< 0.0001). (C) Quantification of the average number of RMH-1 foci per nucleus in late pachytene in unirradiated wild type (*n* = 180) and 8 h post irradiation (*n* = 86). No difference is observed. Data are represented as mean +/- SD. (D and E) RMH-1 localization in *zhp-3(jf61)* or *msh-5(me23)* mutants. In both cases, RMH-1 foci are reduced and fainter in MP (insets) and absent in late pachytene (LP). Scale bars 20 μm for gonad and 5 μm for insets. (TIF) ###### Click here for additional data file. ###### Prophase progression is delayed in *rmh-1*. (A-D) Staining for SYP-1 and ZHP-3 on wild type (A) and *rmh-1(jf54)* (B). In late pachytene in wild type, ZHP-3 marks the putative CO sites (A′ and A′′), while in *rmh-1(jf54)*, ZHP-3 is still present on the chromatin following the SC staining as stretches (D--D′′). The asymmetric retraction of SYP-1 is also delayed (C--C′′). (E--G) The SUN-1 S8 Pi positive region is extended in *rmh-1*. (H) Quantification of the length of the gonad zone positive for SUN-1 S8 Pi, expressed in percentage of length positive for the marker with regard to the length of zone from meiotic entry to diplotene (*n* = 3 gonads per genotype). Data are represented as mean +/- SD with (\*\*\* for *p* \< 0.001 and \*\*\*\* for *p* \< 0.0001). Scale bars 20 μm for gonad and 5 μm for insets. (TIF) ###### Click here for additional data file. ###### Interplay between RMH-1 and HIM-6. \(A\) Yeast two-hybrid assays for protein interactions between RMH-1, HIM-6, and TOP-3. Full-length RMH-1 interacts with TOP-3 (row 1) and with HIM-6 (row 2), respectively. A truncation protein of RMH-1 containing only the N-terminal part with the DUF and OB1 domains (reminiscent of *tn309*) interacts with TOP-3 (row 5). Auto-activation of both bait and prey vectors were tested in lanes 6 to 10. Interactions were scored by growth on SC-Leu-Trp-His plates (left panel) and growth on SC-Leu-Trp plates (right panel). Quantification of the percentage of hatch rate (B) and males in offspring (C) for wild type (*n* = 45 hermaphrodites), single mutants (*rmh-1(tn309)* (*n* = 45)---*him-6(ok412)* (*n* = 35)---*rmh-1(jf54)* (*n* = 45)), and the double mutants *rmh-1(tn309); him-6* (*n* = 43) and *rmh-1(jf54); him-6* (*n* = 45). Data are represented as mean +/- SD with ns (not significant) and \* *p* \< 0.05, \*\* *p* \< 0.01, \*\*\* *p* \< 0.001, \*\*\*\* *p* \< 0.0001. (TIF) ###### Click here for additional data file. ###### COs are shifted toward the chromosome center in *rmh-1*. \(A\) Schematics of crosses to obtain the F2 individuals used for PCR-based SNP analysis. White insert indicates the wild type (Bristol) background, and black insert indicates the Hawaiian background. (B) Scheme of chromosome IV and location of the SNPs used during the recombination assay. SNP A is localized on the left arm, B is at the junction between left arm and the center, C is at the junction between the center and right arm, and D is on the right arm. (C) Recombination frequencies on chromosome IV left arm between SNP A and B for wild type (*n* = 94 individuals) and *rmh-1(jf54)* (*n* = 96 individuals). (D) Recombination frequencies on chromosome IV center between SNP B and C for wild type (*n* = 94 individuals) and *rmh-1(jf54)* (*n* = 96 individuals). COs were shifted to the centers of the chromosome in the mutant. (E) Recombination frequencies on chromosome IV right arm between SNPs C and D for wild type (*n* = 94 individuals) and *rmh-1(jf54)* (*n* = 96 individuals). (C--E) The column "theoretical" corresponds to the expected recombination frequency based on the published genetic distance (<http://www.wormbase.org>). Data are represented as percentage with ns for not significant, \* for *p* \< 0.05, and \*\* for *p* \< 0.01 (Chi^2^ test on raw data). (F) Graph illustrating the percentage of CO events along chromosome IV for wild type and *rmh-1(jf54)*. In the wild type, COs are concentrated to chromosome arms, whereas in the mutant, they are more concentrated at the center. (TIF) ###### Click here for additional data file. ###### Raw data. (XLSX) ###### Click here for additional data file. ###### Supporting information materials and methods. Detailed descriptions are provided for the strains used and generated in this study, antibodies and imaging methods, FISH procedure, identification of the *rmh-1* alleles, generation of *rmh-1*, *rmh-2* alleles and him6::HA strain by CRISPR method, the tagging of RMH-1, RT-PCR procedure, measurements of DAPI bodies in diakinesis, the Y2H assay, the recombination assays by PCR-based SNP mapping, and deep sequencing. (DOCX) ###### Click here for additional data file. The authors thank M. Velkova and J. Windisch for technical assistance and members of the Jantsch and Loidl laboratories for helpful discussions. We are indebted to A. Gartner and Y. Hong for sharing unpublished data and helpful discussion and P. Pasierbek for advice with imaging. We also thank K. Kelly and E. Tanner for contributions to mapping of the *tn309* allele, a generous gift of D. Greenstein and T. Furuta. Solexa deep sequencing was performed at the Vienna Biocenter Core Facility NGS Unit (<http://www.vbcf.ac.at>). Some strains were provided by the Caenorhabditis Genetics Center, which is funded by National Institutes of Health Office of Research Infrastructure Programs (P40 OD010440). We are grateful for reagents from the Bhalla, Colaiacovo, Dammermann, Gartner, Kraft, and Zetka labs. BLM : Bloom syndrome protein CO : crossover dHJ : double Holliday junction DSB : double strand break DUF : domain of unknown function HA : human influenza hemagglutinin Him : high incidence of males HR : homologous recombination Hw : Hawaiian IR : ionizing radiation JM : joint molecules NCO : non-crossover NGS : Next Generation Sequencing OB : oligonucleotide/oligosaccharide-binding PSSC : premature separation of sister chromatids RMH-1 : RMI1 homolog-1 RTR : RecQ helicase--topoisomeraseIII--Rmi1 SC : synaptonemal complex SDSA : synthesis-dependent strand annealing SIM : structured illumination microscopy RMH-2 : RMI1 homolog 2 [^1]: The authors have declared that no competing interests exist. [^2]: Conceived and designed the experiments: MJ, AW, AvH, MG, AMV, VJ. Performed the experiments: MJ, PH, AW, SM, MM, MRDS, LT, AT, CH. Analyzed the data: MJ, AW, AMV, PH, MG, AvH, VJ, LP. Wrote the paper: MJ, AMV, VJ.
{ "pile_set_name": "PubMed Central" }
Is a girl Doesn't use looks to get special privileges and free shit 198 shares
{ "pile_set_name": "OpenWebText2" }
Q: MariaDB Galera Cluster, Force Sync I have three servers in a multi-master Galera cluster. I've imported some old databases recently, and noticed that the tables were being created across all three, but the data wasn't being replicated. It turns out I wasn't paying attention, and these old databases were all using MyISAM tables. So I know that in the future, I'll need to convert these to InnoDB before bringing them in to make them work. However, I'm not having any luck finding an official way to sync up the existing data. Running ALTER TABLE to convert the existing tables to InnoDB doesn't sync up the existing data. My thought was to dump the table (now that it's been converted) with mysqldump, then bring it back in with mysql -u user -p db < db.sql. I don't see any reason why that wouldn't work, but I'm wondering if there's a better way. A: I was not able to find an official way to handle this, so I went with the idea of dumping the tables individually and reimporting them. Not wanting to do it by hand, I whipped a PHP script to do it for me. I'm posting it here in case anyone else finds this useful. /* * InnoDB Convert * Converts existing non-InnoDB tables to InnoDB, then re-imports the * data so that it's replicated across the cluster. */ // Configuration $_config['db'] = array( 'type' => 'mysql', 'host' => 'localhost', 'username' => 'user', 'password' => 'password' ); // Establish database connection try { $pdo = new PDO( $_config['db']['type'] . ':host=' . $_config['db']['host'], $_config['db']['username'], $_config['db']['password'] ); } catch ( PDOException $e ) { echo 'Connection failed: ' . $e->getMessage(); } // Get list of databases $db_query = <<<SQL SHOW DATABASES SQL; $db_result = $pdo->prepare( $db_query ); $db_result->execute(); while ( $db_row = $db_result->fetch( PDO::FETCH_ASSOC )) { // Look through databases, but ignores the ones that come with a // MySQL install and shouldn't be part of the cluster if ( !in_array( $db_row['Database'], array( 'information_schema', 'mysql', 'performance_schema', 'testdb' ))) { $pdo->exec( "USE {$db_row['Database']}" ); $table_query = <<<SQL SHOW TABLES SQL; $table_result = $pdo->prepare( $table_query ); $table_result->execute(); while ( $table_row = $table_result->fetch( PDO::FETCH_ASSOC )) { // Loop through all tables $table = $table_row["Tables_in_{$db_row['Database']}"]; $engine_query = <<<SQL SHOW TABLE STATUS WHERE Name = :table SQL; $engine_result = $pdo->prepare( $engine_query ); $engine_result->execute( array( ':table' => $table )); $engine_row = $engine_result->fetch( PDO::FETCH_ASSOC ); if ( $engine_row['Engine'] != 'InnoDB' ) { // Engine is not equal to InnoDB, let's convert it echo "Converting '$table' on '{$db_row['Database']}' from '{$engine_row['Engine']}' to InnoDB:\n"; echo "Modifying engine..."; $change_query = <<<SQL ALTER TABLE $table ENGINE=InnoDB SQL; $change_result = $pdo->prepare( $change_query ); $change_result->execute(); echo "done!\n"; echo " Exporting table..."; exec( "mysqldump -h {$_config['db']['host']} -u {$_config['db']['username']} -p{$_config['db']['password']} {$db_row['Database']} $table > /tmp/dump-file.sql" ); echo "done!\n"; echo " Re-importing table..."; exec( "mysql -h {$_config['db']['host']} -u {$_config['db']['username']} -p{$_config['db']['password']} {$db_row['Database']} < /tmp/dump-file.sql" ); echo "done!\n"; unlink( '/tmp/dump-file.sql' ); echo "done!\n"; } } } } I successfully used it to convert hundreds of tables across a couple dozen databases in about two minutes.
{ "pile_set_name": "StackExchange" }
Don’t ask us why he did it, but Ye successfully managed to tow the 7 Audis along, which weighed a hefty 12.6 tonnes, along using only his nut sack. Footage of the event, shot in in Zibo City, China has gone viral after being revealed recently, and it’s not hard to see why. While most blokes would shudder at the thought of attaching anything to their balls, Ye managed to tow the cars along for a total of 8 metres. He’s seen attaching a rope to his testicles in the clip, and he claims that he’s a new world record holder. However, we can’t imagine many other people have ever pulled 7 Audis along using nothing but their bollocks, so it may be the first incident ever recorded… Either way, it’s an impressive feat, even if it does make for uncomfortable viewing – just don’t expect loaded to get involved in any car-pulling bollocks any time soon…
{ "pile_set_name": "Pile-CC" }
Atuação cinematográfica de Neymar no último jogo está fazendo com que crianças busquem por aulas de teatro em todo Brasil. As crianças, que querem chegar no nível de interpretação do craque, já estão colocando a ideia em prática. Enzo, de 10 anos, fez uma cena no shopping de sua cidade quando sua mãe se negou a comprar uma chuteira. ‘Me joguei no chão e fiz drama até aparecer um monte de gente em volta de mim’, disse o garoto. O diretor Wolf Maia se empolgou com a iniciativa das crianças e aconselhou os fãs do craque a começarem pela Malhação.
{ "pile_set_name": "OpenWebText2" }
Endovascular treatment of intracranial infectious aneurysms. Intracranial infectious aneurysm (IIA) accounts for less than 5% of all intracranial aneurysms. The aim of this study was to evaluate the role of endovascular treatment for IIA. During a 14-year period, 15 patients (age range, 2-68 years; mean, 42.8 years) with 17 aneurysms were diagnosed with IIA and treated via an endovascular route at our institution. The IIA diagnosis was based on clinical and laboratory findings of infection, echocardiography results, and digital subtraction angiography that were collected retrospectively. All patients were clinically and radiologically followed. The modified Rankin scale was used to evaluate clinical outcome. Among 15 patients, 12 presented with ruptured aneurysms (7 intraparenchymal hematoma, 4 subarachnoid hemorrhage, 1 subdural hematoma), 2 with cerebral infarcts, and 1 with pansinusitis and epidural abscess. All but one aneurysm were distally located in intracranial circulation, 14 were in anterior, and the remaining 3 were in posterior circulation. The final diagnosis was based on aneurysm morphology, location, and clinical laboratory findings. Endovascular treatment was scheduled initially for all IIAs; 13 of 17 IIAs underwent endovascular parent vessel occlusion, 3 underwent spontaneous parent vessel occlusion while waiting for intervention, and the remaining patient was treated by intrasaccular coil occlusion. There were no instances of perioperative neurological complications. Late clinical and radiological outcomes included absence of endovascular treatment related to mortality and aneurysm recurrence. Endovascular treatment may be performed safely at the time of diagnosis for at least symptomatic IIAs under the protective effect of antibiotic treatment.
{ "pile_set_name": "PubMed Abstracts" }
Pages Review Policy 4 stars is great read recommended issues with the story will be stated in the review 3 stars is a good read recommended and any issues with the story will be stated in the review 2 Stars is an OK read not recommended both good and bad points will be stated in the review 1 Star not a good read not recommended reasons will be stated in the review Welcome to SYTYCW! We are a group of women from all different corners of life that have varying opinions of the fics and books we are currently enjoying.You’ll find reviews of our favorite books and interviews with fic authors aswell as recs if you’re looking for something to read. So pull up a comfy chairand chat with us, we would love to know what you’re reading too! SYTYCW on Facebook Followers April 5, 2010 Alright my dear friends today we must put on our company manners. We have a special treat for you. I was chatting with our Lady Tater and I discovered that she has a rather delicious secret..Lady Tater shares a weekly tea with Rob and during these little chat sessions she has found out some very juicy tidbits about him. When I heard this I bullied her into letting us listen in. Both of the chatty darlings graciously said "HELLS YES" Really can you blame them? Now comes the bit where I ask you to read at your own risk none of these sentiments expressed blah blah blah blah.. now lets join Lady Tater and Rob LT: So, we're sitting down this morning with Rob Pattinson, or a reasonable facsimilie thereof, asking the questions YOU want answered and finding out what Rob would like you, his fans, to know about him. Rob? You can see how their conversations go Lady Tater gives our Rob some treats and he provides her with the answers to our most pressing questions. Here is some of the information she found out just for us .. Q: A lot of people are wondering why your Tweet from Peter's account was so short? A: I spoke to our darling young man after 'the Tweet heard round the World". Allegedly, his original Tweet was censored by his 'dad' although he blushed profusely when I queried as to the original content of the sacred Tweet. After a promise of Stoli and cranberry and a look at the girls, he confided that the original message stated "Hi, this is Rob. I like to motorboat fabulous tits That is all..." Such a giving boy.... Q: Rob long time fan and perv of your lisciousness I wanna know WHY have your interviews with the media all of sudden changed? why are you now so calm cool and collected coherent and well spoken I miss the verbal shits I miss the slip of the tongue (oh gawd I love it when Rob slips his tongue!) So who the fuck put the gag order on you? A: Rob was actually quite surprised that you so enjoyed his verbal diarhea! Apparently, not long after Twilight was released, he was taken outside of an interview room after uttering the descriptive term"fucking cunt-licker". His agent and a representative of Summit pulled his pants down, bent him over a dumpster and spanked him with a copy of Breaking Dawn until he could chant "I will never go off script again. I will never go off script again" without falling into the refuse. They were apparently a little disheartened to find out he actually enjoyed said spanking and had to resort to having a large, hairy security guard take over said punishment until his hard on diminished and someone lost an eye. Ever since, he's been so scarred by the incident, he will never go off the intended script again without "social lubrication" as he explained it. And there you have it my gentile readers our first visit to Lady Taters tea room... If you have any questions you would like Lady Tater to ask Rob feel free to send them to me and I will hand them over to her shipness and she will get us an answer!
{ "pile_set_name": "Pile-CC" }
A short critique of the Khan Academy - edtechdev http://www.tonybates.ca/2012/03/14/a-short-critique-of-the-khan-academy/ ====== edtechdev There do not appear to be any instructional designers or learning scientists or faculty developers working with Khan Academy, Udacity, or Coursera. The closest is a 'course operations specialist' for Coursera: "As part of this multi-faceted role, you will train our teaching staff to produce video lectures". It's all just lecture videos. As a contrast, here are a few free, self-paced non-lecture-based courses from the Open Learning Initiative (the downside is they take millions of dollars and years to make their courses) <https://oli.web.cmu.edu/openlearning/forstudents/freecourses>
{ "pile_set_name": "HackerNews" }
Hiya, used them back in August as they were offering me the most money. Placed order on the 5th August, posted phones 7th August, they confirmed they received them on the10th August and cheque was received a couple of days later. All hasle free. Dont know if anyone else has got any experience but I had no problems whatsoever. Hope this helps I used them last week. sent my 5800 away via special del on the friday they confirmed receipt and the price on the monday and I had the cheque in my hands on the weds. can't fault the service. There's a thread over on money saving expert which is pretty much filled with good reviews. I used them last week. sent my 5800 away via special del on the friday they confirmed receipt and the price on the monday and I had the cheque in my hands on the weds. can't fault the service. There's a thread over on money saving expert which is pretty much filled with good reviews. How much did you get as I am selling mine. I'm sure last time I checked it was £85, now it's £84. I feel that I best get a ruddy move on. I used them last week. sent my 5800 away via special del on the friday they confirmed receipt and the price on the monday and I had the cheque in my hands on the weds. can't fault the service. There's a thread over on money saving expert which is pretty much filled with good reviews. what condition was your phone in ants, daughters aint brill, and doesnt have a pen either what condition was your phone in ants, daughters aint brill, and doesnt have a pen either it was ok, there was one tiny scratch on the screen and a couple of scuffs etc on the back but nothing major. you can pick up the pens on fleabay for pennies if you want to be 100% but I wouldn't worry to much as it does say you don't have to send any accesories. Out of interest, how does everyone post their phones, special delivery or freepost? and if the latter, do you take it in to the post office to get proof of delivery? value is £85 so think I'd need to use special delivery.
{ "pile_set_name": "Pile-CC" }
Palicki, 29, will play Lady Jaye, the female lead in the film. Lady Jaye is the team's covert operations specialist and a love interest for warrant officer Flint, who will be played by Detroit 1-8-7's D.J. Cotrona in the sequel.
{ "pile_set_name": "Pile-CC" }
Critical incident. An ethical dilemma. The purpose of this critical incident analysis is to demonstrate how knowledge of legal, moral and ethical issues has affected my nursing practice. This is a personal journey--an exploration of my own values and beliefs. The piece demonstrates how reviewing the literature has changed my stance on the issues discussed. Consequently, the piece is written in the first person, but references are used to substantiate my findings.
{ "pile_set_name": "PubMed Abstracts" }
972 P.2d 566 (1999) CITY OF TACOMA, a municipal corporation, Appellant, v. FRANCISCAN FOUNDATION, aka St. Joseph Hospital And Healthcare Center, a Washington nonprofit corporation, Respondent. No. 23107-7-II. Court of Appeals of Washington, Division 2. March 5, 1999. *567 Jean P Homan, Assistant City Attorney, Tacoma, for Appellant. Linda Gayle White Atkins, Davis Wright Tremaine, Bellevue, for Respondent. HOUGHTON, J. The City of Tacoma (City) appeals a trial court order granting summary judgment in favor of St. Joseph Medical Center (St. Joesph). The trial court ruled that the City's anti-discrimination ordinance conflicts with state law and thus is unenforceable against religious nonprofit organizations. We agree and affirm. FACTS The facts are undisputed. St. Joseph is a hospital owned and operated by the Franciscan Health System-West, which is in turn owned and operated by Catholic Health Initiatives. All three entities are religious nonprofit organizations. In fall 1997, two St. Joseph's employees filed separate charges with the Tacoma Human Rights Department alleging religious, disability, race, and national origin discrimination under chapter 1.29 of the Tacoma Municipal Code (TMC).[1] St. Joseph challenged the City's jurisdiction to enforce its ordinance against it because St. Joseph is exempt from the state anti-discrimination law. On December 5, 1997, the City filed a declaratory judgment action in superior court. Both parties moved for summary judgment. The trial court granted St. Joseph's motion and entered a judgment ruling that: (1) the Tacoma Human Rights Department does not have authority under TMC 1.29 to investigate claims of discrimination, make findings, and/or enforce civil penalties against St. Joseph because St. Joseph is expressly exempted from coverage of the state anti-discrimination law; (2) the City's definition of "employer" conflicts with the state definition of "employer" as to religious nonprofit organizations; (3) RCW 49.60.330 prohibits municipalities from enforcing anti-discrimination ordinances in a manner inconsistent with RCW 49.60; and (4) it is inconsistent with RCW 49.60 for the City to enforce its anti-discrimination ordinance against exempt religious organizations such as St. Joseph. The City appeals. ANALYSIS Standard of Review and Burden of Proof The parties agree that review of this case is de novo,[2] but disagree as to St. Joseph's *568 burden of proof in challenging the City's ordinance. The City argues that St. Joseph bears the heavy burden of proving the ordinance unconstitutional beyond a reasonable doubt. See Rabon v. City of Seattle, 135 Wash.2d 278, 287, 957 P.2d 621 (1998) (ordinance is presumed constitutional; heavy burden rests on challenger to establish unconstitutionality); City of Seattle v. Shin, 50 Wash. App. 218, 220, 748 P.2d 643 (party challenging constitutionality of ordinance must establish unconstitutionality beyond a reasonable doubt), review denied, 110 Wash.2d 1025 (1988). St. Joseph counters it merely must show that the City's attempt to enforce its ordinance against St. Joseph exceeds its statutory grant of enforcement authority. The Anti-discrimination Laws Washington's Law Against Discrimination, RCW 49.60, permits injured persons to bring a civil action for employment discrimination. RCW 49.60.010, .030(2). Its definition of "employer" "includes any person acting in the interest of an employer ... who employs eight or more persons, and does not include any religious or sectarian organization not organized for private profit."[3] RCW 49.60.040(3). The law permits first-class cities to enact their own anti-discrimination ordinances and provide administrative remedies, as long as such ordinances and remedies are consistent with state law. RCW 49.60.330. The Tacoma City Municipal Code contains an anti-discrimination ordinance that defines "employer" as "any person ... acting in the interests of an employer ... or who has any persons in his, her or its employ." TMC 1.29.030(E). Thus, it includes religious nonprofit organizations.[4] The City's Enforcement Powers The parties' disagreement regarding St. Joseph's burden of proof stems from their disagreement as to the source of the City's power to provide and enforce civil remedies for discrimination. St. Joseph argues that cities have no inherent authority under their police powers to enforce civil and equitable remedies.[5] Thus, the City's only power to provide such remedies arises from RCW 49.60.330.[6] St. Joseph, therefore, limits the inquiry to whether the City can provide anti-discrimination remedies that exceed the scope of authority granted it under RCW 49.60.330. Thus, St. Joseph asserts, the answer is "no" and only statutory construction is required to find in St. Joseph's favor. The City contends that its constitutional grant of police powers includes civil and equitable enforcement measures.[7] The City claims that RCW 49.60.330 is permissive, not restrictive, and it can, therefore, provide *569 remedies greater than those permitted by the statute unless a constitutional conflict is shown. In either case, the question is whether the City's ordinance conflicts with the state law. Because it clearly does, it must yield under both standards.[8] Conflict Analysis Under their constitutionally granted police powers, cities may enact ordinances prohibiting the same acts state law prohibits as long as the city ordinance does not conflict with the general laws of the state. City of Bellingham v. Schampera, 57 Wash.2d 106, 109, 356 P.2d 292 (1960). A local ordinance does not conflict with state law merely because one prohibits a wider scope of activity than the other. City of Seattle v. Eze, 111 Wash.2d 22, 33, 759 P.2d 366, 78 A.L.R.4th 1115 (1988) (citing Town of Republic v. Brown, 97 Wash.2d 915, 919, 652 P.2d 955 (1982)). In determining whether an ordinance conflicts with general laws, the test is: "whether the ordinance permits or licenses that which the statute forbids and prohibits, and vice versa." Schampera, 57 Wash.2d at 111, 356 P.2d 292 (quoting Village of Struthers v. Sokol, 108 Ohio St. 263, 140 N.E. 519 (1923)). The City attempts to justify its ordinance under the foregoing rule by asserting that the state anti-discrimination law does not grant religious nonprofit groups a "license to discriminate." Rather, both the state and local schemes are intended to prohibit discrimination. Therefore the local ordinance does not conflict; it merely goes further in its prohibitions. See Brown v. City of Yakima, 116 Wash.2d 556, 562, 807 P.2d 353 (1991) ("Where both the ordinance and the statute are prohibitory, and the difference between them is that the ordinance goes further in its prohibition, they are not deemed inconsistent...."); State v. Rabon, 45 Wash.App. 832, 838, 727 P.2d 995 (1986) (question is whether statute authorizes conduct banned by ordinance). The City's literal interpretation of the rule ignores that the state law expressly exempts religious nonprofit groups.[9] The cases relied upon by the City merely show that local regulations may prohibit conduct that similar state laws fail to address.[10]See, e.g., Shin, 50 Wash.App. at 226-27, 748 P.2d 643 (city may impose duty on parents to report child abuse though state statute omits parents from list of persons required to report); Rabon, 45 Wash.App. at 838, 727 P.2d 995 (state law banning chako sticks under certain circumstances does not preclude city from banning them entirely); Seattle Newspaper-Web Pressmen's Union Local No. 26 v. City of Seattle, 24 Wash.App. 462, 468-69, 604 P.2d 170 (1979) (ordinance may extend prohibition on unfair labor practices to practices not covered under state statute). Although the state anti-discrimination law does not "authorize" religious groups to discriminate, it does "authorize" their exemption from the law's reach. The statutory *570 language indicates an affirmative policy choice rather than an omission. Because the City's ordinance contravenes this policy choice, it must give way. See Seattle Newspaper-Web, 24 Wash.App. at 469, 604 P.2d 170 (ordinance may be more restrictive than state statute only if statute does not forbid the more restrictive enactment) (emphasis added) (citing Lenci v. City of Seattle, 63 Wash.2d 664, 670-71, 388 P.2d 926 (1964)). Affirmed. BRIDGEWATER, C.J., and HUNT, J., concur. NOTES [1] Both complainants also filed charges under Title VII with the EEOC. [2] See Reid v. Pierce County, 136 Wash.2d 195, 201, 961 P.2d 333 (1998) (in reviewing a summary judgment order, reviewing court engages in same inquiry as the trial court); City of Seattle v. Williams, 128 Wash.2d 341, 347, 908 P.2d 359 (1995) (questions of law are reviewed de novo) (citing State v. McCormack, 117 Wash.2d 141, 143, 812 P.2d 483 (1991), cert. denied, 502 U.S. 1111, 112 S.Ct. 1215, 117 L.Ed.2d 453 (1992)). [3] Persons aggrieved by the discrimination of religious nonprofit groups can seek redress under Title VII. See 42 U.S.C. § 2000e-1(a). [4] Although not at issue in this case, the City ordinance also purports to cover employers with fewer than eight employees, which are also exempt from the state law. [5] In support of this proposition, St. Joseph cites State v. Brennan, 76 Wash.App. 347, 884 P.2d 1343 (1994). The Brennan court held that the Legislature could not delegate equitable powers to the district courts because the state constitution vests exclusive equitable jurisdiction in the superior courts. Brennan, 76 Wash.App. at 349, 356, 884 P.2d 1343. [6] RCW 49.60.330 provides: Any [first-class city] ... may enact resolutions or ordinances consistent with this chapter to provide administrative and/or judicial remedies for any form of discrimination proscribed by this chapter .... The superior courts shall have jurisdiction to hear all matters relating to violation and enforcement of such resolutions or ordinances, including ... the award of such remedies and civil penalties as are consistent with this chapter .... Any local resolution or ordinance not inconsistent with this chapter may provide, after a finding of reasonable cause to believe that discrimination has occurred, for the filing of an action in, or the removal of the matter to, the superior court. (emphasis added). [7] Article XI, section 11 of the Washington Constitution grants first-class cities the power to "make and enforce within [their] limits all such local police, sanitary and other regulations as are not in conflict with general laws." This delegation of power is "as ample within its limits as that possessed by the legislature itself." Williams, 128 Wash.2d at 359, 908 P.2d 359. [8] Little authority elucidates the issue of the derivation and extent of a city's civil enforcement powers. Cities, pursuant to their police powers, possessed authority to prohibit discrimination before the enactment of RCW 49.60.330, but the extent of their power to create and enforce remedies apart from criminal sanctions was unclear. See AGO 1981, No. 14, at 3-4. In 1981, the Legislature enacted RCW 49.60.330 to "authorize[] what ha[d] been "existing in law." AGO 1981, No. 14, at 7 (quoting Senator Talmadge); see Laws of 1981, ch. 259, § 5. The amendment's legislative history confirms that the amendment was intended to be permissive, not preemptive, see AGO 1981, No. 14, at 6-7, but otherwise sheds little light on the question of what cities' preexisting enforcement powers were. [9] The religious exemption has been part of the anti-discrimination statute since it was enacted. It has never been amended, although the section in which it is contained has been amended many times, and the Legislature twice has considered narrowing or deleting the exemption. Farnam v. CRISTA Ministries, 116 Wash.2d 659, 673 n. 4, 807 P.2d 830 (1991) (citations omitted). [10] None of the cases the City cites in support of its contention that no conflict exists where the local prohibitory scheme merely goes further than the state scheme analyzes a state law containing an express exemption. See Rabon v. City of Seattle, 135 Wash.2d at 288, 957 P.2d 621; Brown, 116 Wash.2d at 558, 807 P.2d 353; Eze, 111 Wash.2d at 33, 759 P.2d 366; State ex rel. Schillberg v. Everett Dist. Justice Court, 92 Wash.2d 106, 108, 594 P.2d 448 (1979); Shin, 50 Wash.App. at 221 n. 3, 748 P.2d 643; State v. Rabon, 45 Wash.App. at 833 n. 1, 727 P.2d 995.
{ "pile_set_name": "FreeLaw" }
Q: number of distinct object types in a list I am using C#, Silverlight, Visual Studio for Windows Phone 7. I currently have a List that contains the generic UIElement, and I can put things like TextBlock or Grid or StackPanel into the List. For example: List<UIElement> UIList= new List<UIelement>(); UIList.Add(someUIObject as UIElement); My question is, is there an efficient way to count the number of object types in my list? For example, if there are 8 TextBlocks and 4 Grids, I would like to know that there are 2 object types in the List. Or if there is 1 TextBlock, 1 Grid, and 1 StackPanel, I would like to know that there are 3 types of objects. I'm looking for something that is better than O(n^2) performance. My current solution compares each element type to the rest of the element types in the List, something similar to BubbleSort. A: To get the number of different types in the collection, I would use LINQ to first select the type of each object, then took only distinct types and counted those: int numberOfTypes = UIList.Select(x => x.GetType()).Distinct().Count(); All of this will be O(n), because Distinct() uses a hash table. A: try out var loader = loaders.OfType<Elementtype>().Count(); A: var types = UIList.GroupBy(ui => ui.GetType()) .Select(g => new { Type = g.Key, Count = g.Count() }) .ToList();
{ "pile_set_name": "StackExchange" }
Q: What is this argument of AGGREGATE function doing in my formula? I need to understand this part ($B$1:$B$15<>"") in the following formula used to represent a column of data with blank cells removed: =IFERROR(INDEX($B$1:$B$15,AGGREGATE(15,6,(ROW($B$1:$B$15)-ROW($B$1)+1)/($B$1:$B$15<>""),ROWS(C$1:C1))),"") This formula was given on another site for the question Remove Blanks from a Column with Formula, but I could not find more info about it. I especially want to know what this part does: ($B$1:$B$15<>""). I can guess it is a range not "", but I cannot figure it out its usage in that formula. Can someone help me on this matter? Thank you. A: The part you queried is doing as you say: $B$1:$B$15<>"" That returns an array of TRUE/FALSE values, FALSE if each cell is blank and TRUE if it's not. In the formula an array of the relative row numbers is divided by that array - when you divide by TRUE that acts as a 1 so you just get the row number, when you divide by FALSE that acts like zero so you get a #DIV/0! error. AGGREGATE function is set to ignore errors so it finds the kth smallest row where B1:B15 is not blank ......then INDEX returns the actual value for that cell. In cell one - C1 ideally - k = 1 so you get the first non-blank value then ROWS function increments as you copy down so you get each subsequent non-blank value
{ "pile_set_name": "StackExchange" }
Q: Getting "application not configured for implicit grants" error trying to setup website I had a developer setup StackExchange auth for a site last year and that still works fine. I have cloned that site and am in the process of changing out all of the relevant names and keys to the new site, hoping that it would Just Work. But alas, I am getting this error: I haven't changed very much from the flow that i said was working for the other site, just trying to swap out the keys and such. Here is the JS code: SE.init({ clientId: <?php echo STACKAPPS_CLIENT_ID; ?>, key: '<?php echo STACKAPPS_KEY; ?>', channelUrl: '<?php echo STACKAPPS_CHANNEL; ?>', complete: function (data) { //console.log(data); } }); // Attach click handler to login button $('#soLo').click(function() { // Make the authentication call, note that being in an onclick handler // is important; most browsers will hide windows opened without a // 'click blessing' SE.authenticate({ success: function(data) { $.get('sign-in.php?seat='+data.accessToken,function() { location.reload(); }); //$('#soLo').hide(); }, error: function(data) { //alert('An error occurred:\n' + data.errorName + '\n' + data.errorMessage); }, networkUsers: false }); }); And the PHP that button press redirects to: if ($_REQUEST['seat']) { //check if seUser is real; $ch = curl_init(); curl_setopt($ch, CURLOPT_URL, "https://api.stackexchange.com/2.1/me?key=".STACKAPPS_KEY."&site=stackoverflow&order=desc&sort=reputation&access_token=".$_REQUEST['seat']."&filter=default"); curl_setopt($ch,CURLOPT_ENCODING , "gzip"); curl_setopt($ch, CURLOPT_RETURNTRANSFER, 1); $output = json_decode(curl_exec($ch)); curl_close($ch); if ($output->items[0]->account_id) { $_SESSION['seUser'] = $output->items[0]->account_id; $_SESSION['displayName'] = $output->items[0]->display_name; $_SESSION['seReputation'] = $output->items[0]->reputation; $params = array( 'className' => 'users', 'query' => array( 'so_id'=> (string) $_SESSION['seUser'] ), 'limit' => '1', ); $request = json_decode($parse->query($params)); $user = $request->results[0]->username; $_SESSION['login'] = 'stack'; if ($user) { $_SESSION['curUser'] = $user; $_SESSION['logout'] = true; } else { $_SESSION['saveSo'] = true; } } session_write_close(); die(); } Does anything look out of place here? I looked at the auth documentation and it looks like I am following the implicit path. A: Yes, it can be annoying that the API docs, the javascript SDK, and the settings pages use the terms: "Explicit" "Implicit" "Server side" "Client side" a little interchangeably. (The first 2 are roughly synonymous with the last two.) From the javascript SDK docs: Your application must have the client side OAuth flow enabled, and must not have the desktop application redirect uri disabled. Both of these settings are available on an applications edit page. Go to your apps list (visible only to you). Click on your app. Check your settings. See the picture, below: Enable Client Side OAuth Flow ==> checked Disable Desktop Application OAuth Redirect Uri ==> not checked OAuth Domain ==> stackexchange.com Application Name ==> (not blank and no error message) Description ==> (not blank and no error message) Application Website ==> https://stackapps.com/ (Not critical for this kind of auth.) Optional: If you want write access, Stack Apps Post must be set to a valid post that you own. EG, https://stackapps.com/questions/5017/ works for the user that owns that post. The post must legitimately have either the app or the script tag. Then:
{ "pile_set_name": "StackExchange" }
Everyday Pollutants Floatables: Floatables are pieces of litter in the water. They may be contaminated with toxic chemicals and bacteria. Floatables are also an eyesore in our waterways. Commonly observed floatables include cigarettes, plastic containers, wrappers and cans. Floatables such as these are generally the result of careless handling practices or littering. Sediment: Sediment can be harmful to aquatic life (plants, fish and other animals that live in lakes and streams). Sediments can carry chemicals that are toxic and that cause the oxygen in water to be used up. Sediment covers the bottoms of streams, harming the habitat needed by aquatic insects and plants. Sediment generally is the result of soil erosion from lawns, hillsides, gardening/landscaping activities. Large amounts of sediment can reduce the capacity of streams to carry storm runoff, thus necessitating expending tax dollars for maintenance of the system. Oil and Grease: Petroleum products (gasoline, oil and grease) may be toxic to aquatic life, even in small amounts. Oil and grease in storm drains can generally be traced to automotive leaks and spills or improper disposal of used oil an automotive products into storm drains. Pesticides, Herbicides, and Fertilizers: Excess amounts of pesticides, herbicides, and fertilizers applied to yards, lawns and greenways are washed into streams during rainfall events. These chemicals can cause increased algae growth and toxicity to organisms. Metals: Metals such as lead, zinc, mercury, copper, and cadmium in water can be toxic to humans, aquatic life and other animals that drink the water. Metals come from vehicle exhaust, weathered paint, metal plating, tires, and motor oil. Toxic Substances: Gasoline, household products, and paint thinner are examples of toxic substances. These substances can deplete oxygen in waterways and cause toxic effects in living organisms. Potential pollutants that may be present in residential areas, business and construction sites are listed below.
{ "pile_set_name": "Pile-CC" }
Sometimes, if I haven't done laundry in awhile, using my hamper to transport clothes to the laundry room isn't ideal since it'll contain a few loads. Redditor RedSquaree shows us how to move those clothes without dropping them everywhere. Just lay a pair of pants—preferably one that's going that particular load—and roll up the other clothes, as shown above. You can then carry it with one arm, without dropping socks and other items of clothes along the trail Hansel and Gretel style. You could use a towel or sheet too, but if your towels are in their own separate load—which they should be—this trick works pretty well. Check out the full step-by-step to the right, or hit the link below to read more, and while you're at it, check out our favorite tips for speeding up laundry too.
{ "pile_set_name": "Pile-CC" }
/* Copyright 2015 The TensorFlow Authors. All Rights Reserved. Licensed under the Apache License, Version 2.0 (the "License"); you may not use this file except in compliance with the License. You may obtain a copy of the License at http://www.apache.org/licenses/LICENSE-2.0 Unless required by applicable law or agreed to in writing, software distributed under the License is distributed on an "AS IS" BASIS, WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. See the License for the specific language governing permissions and limitations under the License. ==============================================================================*/ #define EIGEN_USE_THREADS #include "tensorflow/core/kernels/concat_lib_cpu.h" #include <vector> #include "tensorflow/core/framework/register_types.h" #include "tensorflow/core/kernels/concat_lib.h" namespace tensorflow { namespace { template <typename T> struct MemCpyCopier { inline void Copy(T* dst, const T* src, int input_index, size_t n) { if (DataTypeCanUseMemcpy(DataTypeToEnum<T>::v())) { memcpy(dst, src, n * sizeof(T)); } else { for (size_t k = 0; k < n; ++k) { *dst++ = *src++; } } } }; template <> struct MemCpyCopier<ResourceHandle> { inline void Copy(ResourceHandle* dst, const ResourceHandle* src, int input_index, size_t n) { for (size_t k = 0; k < n; ++k) { *dst++ = *src++; } } }; } // namespace template <typename T> void ConcatCPU(DeviceBase* d, const std::vector< std::unique_ptr<typename TTypes<T, 2>::ConstMatrix>>& inputs, typename TTypes<T, 2>::Matrix* output) { if (std::is_same<T, string>::value) { // use a large cost here to force strings to be handled by separate threads ConcatCPUImpl<T>(d, inputs, 100000, MemCpyCopier<T>(), output); } else { ConcatCPUImpl<T>(d, inputs, sizeof(T) /* cost_per_unit */, MemCpyCopier<T>(), output); } } #define REGISTER(T) \ template void ConcatCPU<T>( \ DeviceBase*, \ const std::vector<std::unique_ptr<typename TTypes<T, 2>::ConstMatrix>>&, \ typename TTypes<T, 2>::Matrix* output); TF_CALL_ALL_TYPES(REGISTER) REGISTER(quint8) REGISTER(qint8) REGISTER(quint16) REGISTER(qint16) REGISTER(qint32) REGISTER(bfloat16) TF_CALL_variant(REGISTER) #if defined(IS_MOBILE_PLATFORM) && !defined(SUPPORT_SELECTIVE_REGISTRATION) && \ !defined(__ANDROID_TYPES_FULL__) // Primarily used for SavedModel support on mobile. Registering it here only // if __ANDROID_TYPES_FULL__ is not defined (which already registers string) // to avoid duplicate registration. REGISTER(string); #endif // defined(IS_MOBILE_PLATFORM) && // !defined(SUPPORT_SELECTIVE_REGISTRATION) && // !defined(__ANDROID_TYPES_FULL__) #ifdef TENSORFLOW_USE_SYCL template <typename T> void ConcatSYCL(const Eigen::SyclDevice& d, const std::vector< std::unique_ptr<typename TTypes<T, 2>::ConstMatrix>>& inputs, typename TTypes<T, 2>::Matrix* output) { ConcatSYCLImpl<T>(d, inputs, sizeof(T) /* cost_per_unit */, MemCpyCopier<T>(), output); } #define REGISTER_SYCL(T) \ template void ConcatSYCL<T>( \ const Eigen::SyclDevice&, \ const std::vector<std::unique_ptr<typename TTypes<T, 2>::ConstMatrix>>&, \ typename TTypes<T, 2>::Matrix* output); TF_CALL_GPU_NUMBER_TYPES_NO_HALF(REGISTER_SYCL) #undef REGISTER_SYCL #endif // TENSORFLOW_USE_SYCL } // namespace tensorflow
{ "pile_set_name": "Github" }
Not as a feature to use but to play onDoes that add an interesting facet to the play game or an annoying one? And how would it be balanced without being completely annoying or negligible I had an idea for a bedroll item that would put the user to sleep for a certain amount of turns chosen by the player but would HP when the sleep status wears as It has the potential to be interesting but if say, one of your units only has 1 HP and the next chapter starts and they still only have 1HP, that's kind of annoying. The bedroll seems like it would make that unit into a liability since they are then useless until they wake up, especially when staves already exist, unless you have some idea for how to make it not annoying. Well the bedroll is "unbreakable", so that helps in the decision if you're almost out of healing items and the unit will be safe for a turnI could refill it a small amount maybe? Like 20% instead of 100% ? The whole idea was to make it more realistic for chapters that literally happen after each other like FE8's chapter 7&8 for instance (7 is outside the castle, 8 is inside the castle) If you already know about the mechanic and the previous chapter doesn't have a time limit (or a soft one, such as a rout mission where the last enemy charges towards player units), then players would assumedly get all units back to full HP (and get extra EXP from it, too). The only people that probably wouldn't would be those too lazy or LTC players not wanting to sacrifice the turns (unless extra turns was more efficient in the long run).
{ "pile_set_name": "Pile-CC" }
Enterprise Java Beans have been one of the corner stones of the Java EE specification. As a Java EE 5 certified application server, Apache Geronimo supports EJB's extensively with the help of OpenEJB EJB Container. Although it is possible to use standard Java objects to contain your business logic and business data, using EJBs addresses many of the issues of using simple Java objects, such as scalability, lifecycle management and state management. In this article, you will see how an initial database application is extended and used for both local and remotely referred application clients for an Enterprise Java Beans back end. The application uses the built-in Apache Derby as its database. Use this article to learn how to simplify your enterprise application development process. The Banking application has two types of application clients namely "Banking Remote Application" and "Banking Web Application". Each of these clients demonstrate how to refer Enterprise Java Beans in remote and local interfaces respectively. Both these clients are referring a common business layer which has been implemented with the help of Session and Entity Beans. Stateless Session Beans are acting as the business service interface between business entities and application clients. All the business entities of the application layer are implemented with Entity Beans. After reading this article you should be able get the best out of EJB features of Geronimo, such as defining Enterprise Java Beans, managing relations between them and refer EJB's via differents kind of clients. This article is organized in to following sections: Overview of EJB Features EJB implementation may vary from one vendor to another. Below is a list with the main features supported by Apache Geronimo.
{ "pile_set_name": "Pile-CC" }
#!/usr/bin/env bash ##################################################################### # genallfont.sh for Marlin # # This script generates font data for language headers # # Copyright 2015-2018 Yunhui Fu <yhfudev@gmail.com> # License: GPL/BSD ##################################################################### my_getpath() { local PARAM_DN="$1" shift #readlink -f local DN="${PARAM_DN}" local FN= if [ ! -d "${DN}" ]; then FN=$(basename "${DN}") DN=$(dirname "${DN}") fi cd "${DN}" > /dev/null 2>&1 DN=$(pwd) cd - > /dev/null 2>&1 echo -n "${DN}" [[ -z "$FN" ]] || echo -n "/${FN}" } #DN_EXEC=`echo "$0" | ${EXEC_AWK} -F/ '{b=$1; for (i=2; i < NF; i ++) {b=b "/" $(i)}; print b}'` DN_EXEC=$(dirname $(my_getpath "$0") ) EXEC_WXGGEN="${DN_EXEC}/uxggenpages.sh" # # Locate the bdf2u8g command # EXEC_BDF2U8G=`which bdf2u8g` [ -x "${EXEC_BDF2U8G}" ] || EXEC_BDF2U8G="${DN_EXEC}/bdf2u8g" [ -x "${EXEC_BDF2U8G}" ] || EXEC_BDF2U8G="${PWD}/bdf2u8g" [ -x "${EXEC_BDF2U8G}" ] || { EOL=$'\n' ; echo "ERR: Can't find bdf2u8g!${EOL}See uxggenpages.md for bdf2u8g build instructions." >&2 ; exit 1; } # # Get language arguments # LANG_ARG="$@" # # Use 6x12 combined font data for Western languages # FN_FONT="${DN_EXEC}/marlin-6x12-3.bdf" # # Change to working directory 'Marlin' # OLDWD=`pwd` [[ $(basename "$OLDWD") != 'Marlin' && -d "Marlin" ]] && cd Marlin [[ -f "Configuration.h" ]] || { echo -n "cd to the 'Marlin' folder to run " ; basename $0 ; exit 1; } # # Compile the 'genpages' command in-place # (cd ${DN_EXEC}; gcc -o genpages genpages.c getline.c) # # By default loop through all languages # LANGS_DEFAULT="an bg ca cz da de el el_gr en es eu fi fr gl hr it jp_kana ko_KR nl pl pt pt_br ru sk tr uk vi zh_CN zh_TW test" # # Generate data for language list MARLIN_LANGS or all if not provided # for LANG in ${LANG_ARG:=$LANGS_DEFAULT} ; do echo "Generating Marlin language data for '${LANG}'" >&2 case "$LANG" in zh_* ) FONTFILE="wenquanyi_12pt" ;; ko_* ) FONTFILE="${DN_EXEC}/NanumGothic.bdf" ;; * ) FONTFILE="${DN_EXEC}/marlin-6x12-3.bdf" ;; esac DN_WORK=`mktemp -d` cp Configuration.h ${DN_WORK}/ cp src/lcd/language/language_${LANG}.h ${DN_WORK}/ cd "${DN_WORK}" ${EXEC_WXGGEN} "${FONTFILE}" sed -i fontutf8-data.h -e 's|fonts//|fonts/|g' -e 's|fonts//|fonts/|g' -e 's|[/0-9a-zA-Z_\-]*buildroot/share/fonts|buildroot/share/fonts|' 2>/dev/null cd - >/dev/null mv ${DN_WORK}/fontutf8-data.h src/lcd/dogm/fontdata/langdata_${LANG}.h rm -rf ${DN_WORK} done # # Generate default ASCII font (char range 0-255): # Marlin/src/lcd/dogm/fontdata/fontdata_ISO10646_1.h # #if [ "${MARLIN_LANGS}" == "${LANGS_DEFAULT}" ]; then if [ 1 = 1 ]; then DN_WORK=`mktemp -d` cd ${DN_WORK} ${EXEC_BDF2U8G} -b 1 -e 127 ${FN_FONT} ISO10646_1_5x7 tmp1.h >/dev/null ${EXEC_BDF2U8G} -b 1 -e 255 ${FN_FONT} ISO10646_1_5x7 tmp2.h >/dev/null TMP1=$(cat tmp1.h) TMP2=$(cat tmp2.h) cd - >/dev/null rm -rf ${DN_WORK} cat <<EOF >src/lcd/dogm/fontdata/fontdata_ISO10646_1.h /** * Marlin 3D Printer Firmware * Copyright (c) 2019 MarlinFirmware [https://github.com/MarlinFirmware/Marlin] * * This program is free software: you can redistribute it and/or modify * it under the terms of the GNU General Public License as published by * the Free Software Foundation, either version 3 of the License, or * (at your option) any later version. * * This program is distributed in the hope that it will be useful, * but WITHOUT ANY WARRANTY; without even the implied warranty of * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the * GNU General Public License for more details. * * You should have received a copy of the GNU General Public License * along with this program. If not, see <http://www.gnu.org/licenses/>. * */ #include <U8glib.h> #if defined(__AVR__) && ENABLED(NOT_EXTENDED_ISO10646_1_5X7) // reduced font (only symbols 1 - 127) - saves about 1278 bytes of FLASH $TMP1 #else // extended (original) font (symbols 1 - 255) $TMP2 #endif EOF fi (cd ${DN_EXEC}; rm genpages) cd "$OLDWD"
{ "pile_set_name": "Github" }
Q: How to go to implementation by vsvim + r# I want to use r# and vsvim to go to implementation in visual studio. Like command "gd", but maybe "gi". Can i do it? A: Yes, you can. Assuming that you already have a vsvimrc customization file, you just need to add: map gi :vsc Edit.GoToImplementation<CR> FYI my full vsvimrc is here, with many other tricks, such as: map gk :vsc Edit.PreviousMethod<CR> map gj :vsc Edit.NextMethod<CR> map gr :vsc Edit.FindAllReferences<CR> map <Leader>k :vsc Window.PinTab<CR> noremap + :vsc Edit.CommentSelection <return> noremap - :vsc Edit.UncommentSelection <return>
{ "pile_set_name": "StackExchange" }
Q: Is there a quick way to report database metadata in SQL Server 2005? Are there any system stored procs to report the stats and metadata of a database itself in SQL Server 2005? What I need is a quick way to output a list of tables, the size of each table, the number of rows in each table and so on. Stored procs for individual tables and metadata would also be useful. Advice appreciated. A: Yes, the data dictionary tables will let you do this. The main tables in the data dictionary are sys.objects, sys.columns, sys.indexes, sys.foreign_keys and sys.sql_modules. For an example of a variety of queries that use the system data dictionary to reverse-engineer a database to an SQL script, take a look at this stackoverflow posting. Getting space usage is a bit more convoluted to do from the data dictionarybut sp_spaceused will do it for a single table. You can wrap this with sp_msforeachtable to iterate over a set of tables and get the report for all of the tables.
{ "pile_set_name": "StackExchange" }