text
stringlengths
0
7.84M
meta
dict
2002 ford explorer broke down while driving. When it broke down I was driving it and it started over heating and slowing down it wouldn't let me accelerate and it was making a clicking sound so I pulled over and when I tried to start it it was just clicking.... Hello, I have a 2002 ford explorer 6 cyl with roughly 135k on it. It's always ran great for me. However, I was driving today, it's a very rainy day, and I was doing about 45 or so when all of a sudden... I have a 2002 Ford Explorer Eddie Baurer with 4.6 V-8, Transmission went out and will need to get a new one. I found a transmission out of a v-6 same year with virturally no miles on it. Are they inte... Content submitted by Users is not endorsed by CarGurus, does not express the opinions of CarGurus, and should not be considered reviewed, screened, or approved by CarGurus. Please refer to CarGurus Terms of Use.
{ "pile_set_name": "Pile-CC" }
/* * Copyright (C) 2010 Google Inc. All rights reserved. * * Redistribution and use in source and binary forms, with or without * modification, are permitted provided that the following conditions are * met: * * * Redistributions of source code must retain the above copyright * notice, this list of conditions and the following disclaimer. * * Redistributions in binary form must reproduce the above * copyright notice, this list of conditions and the following disclaimer * in the documentation and/or other materials provided with the * distribution. * * Neither the name of Google Inc. nor the names of its * contributors may be used to endorse or promote products derived from * this software without specific prior written permission. * * THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS * "AS IS" AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT * LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR * A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT * OWNER OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, * SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT * LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, * DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY * THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT * (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE * OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. */ #ifndef URLInputType_h #define URLInputType_h #include "BaseTextInputType.h" namespace WebCore { class URLInputType : public BaseTextInputType { public: static PassOwnPtr<InputType> create(HTMLInputElement*); private: URLInputType(HTMLInputElement* element) : BaseTextInputType(element) { } virtual const AtomicString& formControlType() const; virtual bool typeMismatchFor(const String&) const; virtual bool typeMismatch() const; virtual String typeMismatchText() const; virtual bool isURLField() const; }; } // namespace WebCore #endif // URLInputType_h
{ "pile_set_name": "Github" }
Adi & Gabby's room - Planning/Inspiration As many of you know, we're expecting our third child (first boy!) in late March. Since it wouldn't be wise to buy yet another crib set, we've decided to move our two girls into the larger extra room to share and bump them up to twins, while we recycle Gabby's crib for the new baby. With that said, I now have two rooms to plan and execute prior to March (deep breath). So I've decided to share this process with you in hopes to keep me honest and on track. I hopefully will be posting weekly updates with my progress. So here are my thoughts on the girls' room: The walls are currently a shade lighter than the above pic and the dresser & hutch combo we have from Adi's bedroom set has a lot of the same styling detail as this one. Her dresser is currently off-white, but this pic made me think it would be nice to add some soft pink to the detailing -- just to freshen things up a bit. I found this monogram that Centsational Girl painted on some clear plates and instantly thought of the girls' beds. I knew I wanted to personalize them with maybe the first letter of their name, but I saw this today and it was just perfect. I'll be imitating some version of this on the beds for sure! And then we get to book storage. We're in desperate need of some book organization and I've been ogling versions of the infamous toddler book wall for ages now. It's in the plans for this room. Not sure if we'll build one or purchase at Ikea (I've seen it done with frame shelves and spice racks), but one way or the other, it'll get done. Also, did you see the stripes on the ceiling in the above photo? Do I dare? Will it be too busy with the polka dots? I'll have to see as everything comes together. And finally, I'll need to create some form of artwork display space. I'm digging the above inspiration pic. The symmetry and white classic frames make each piece all the more special! I may, however, just frame cork and leave the glass out so that we can interchange favorites. Adi colors on a daily basis and I know she would just love this! So what do you think? I definitely have my work cut out for me. I'm so very excited yet overwhelmed at the same time. Here are my to-do's: Crown molding install Paint polka dots Sew drapery Paint beds Paint nightstand Update dresser and small table/chairs (paint) Find or make rug (may involve paint) Install book wall Create artwork display wall Address lighting issues *Please note: All inspiration photos have been pulled from Pinterest and link back to their original source. 21 comments Oh my goodness, I'm loving your inspirations! We're moving soon, so that means my little girl is getting a new room, too. I love some of your ideas. I have also been desperately wanting a book wall, since reading books is my daughter's favorite thing. We're doing hot pink and lime green with orange accents. I really love the silhouette of the chandelier, too... hmmm... many thoughts :) It's a pity you don't have a ԁonate button! ӏ'd without a doubt donate to this fantastic blog! I guess for now i'll settle foг bookmarking аnd adding your RSЅ feed to my Google account.I look forwarԁ to fresh upԁates and will talκ about thіs wеbsite with mу Facebоοk group. I have been surfing online more than 3 hours today, yet I never found any interesting article like yours. It's pretty worth enough for me. In my opinion, if all web owners and bloggers made good content as you did, the net will be much more useful than ever before. Good day! This post couldn't be written any better! Reading through this post reminds me of my old room mate! He always kept talking about this. I will forward this page to him. Pretty sure he will have a good read. Thank you for sharing! I believe that is among the such a lot significant information for me. And i am satisfied studying your article. However wanna statement on some common things, The site taste is ideal, the articles is truly great : D. Have you ever considered about adding a little bit more than just your articles? I mean, what you say is valuable and everything. Nevertheless just imagine if you added some great graphics or videos to give your posts more,"pop"! Your content is excellent but with pics and video clips, this site could definitely be one of the very best in its field. I am no longеr surе where you're getting your information, but good topic. I must spend some time finding out more or figuring out more. Thank you for fantastic information I was in search of this info for my mission. About Me I am a mommy, wife, & follower of Christ. I have a passion for home decor and refinishing furniture. I just love the thrill of making things beautiful with my own hands. May the Lord be glorified in all things and let it be known that the gifts, talents, and graces all come from Him and nothing of myself. I am but a servant of the Lord.
{ "pile_set_name": "Pile-CC" }
version: 1 dn: m-oid=1.3.6.1.4.1.42.2.27.4.1.6,ou=attributeTypes,cn=java,ou=schema creatorsname: uid=admin,ou=system objectclass: metaAttributeType objectclass: metaTop objectclass: top m-equality: caseExactMatch m-syntax: 1.3.6.1.4.1.1466.115.121.1.15 m-singlevalue: TRUE m-collective: FALSE m-nousermodification: FALSE m-usage: USER_APPLICATIONS m-oid: 1.3.6.1.4.1.42.2.27.4.1.6 m-name: javaClassName m-description: Fully qualified name of distinguished Java class or interface m-obsolete: FALSE entryUUID: 0306e4a6-82a3-43f5-8990-42b6ff9b1714 entryCSN: 20130919081858.901000Z#000000#000#000000 entryParentId: b6bd9cdf-6973-431e-beae-f51d70d1183a createTimestamp: 20130919081908.481Z
{ "pile_set_name": "Github" }
Tag Archives: author Today I’m hosting Marilyn Meredith, a writing friend I’ve known for quite a few years. In fact, it’s because of Marilyn that I now have 20 books published, and have my own publishing company. When I first moved to the Central … Continue reading → Lida Sideris is the author of Murder And Other Unnatural Disasters, a rollocking ride through the Hollywood entertainment industry with the quirkiest characters ever created. (This reader prays that Corrie and Michael are the start of a fabulous series!) She’s … Continue reading → Lida Sideris, author of the hysterical mystery, Murder and Other Unnatural Disasters, will be here on Sunday, Feb. 26, to talk about her book, her writing and her life. And answer your questions, too. Be sure to stop by on … Continue reading → Head over to Morro Bay this Sunday, April 6th, from 1:00-3:00 pm, at Coalesce Bookstore on Main Street, where I will be part of the SinC Central Coast Chapter book event. There will be 8 local authors of mystery/suspense there … Continue reading → Exciting News! I will be interviewed this Thursday at 3:00 pm Pacific time on blog talk radio by author Barbara M. Hodges. This is first for me, and I’m so excited about it. If you can listen live, please do. … Continue reading →
{ "pile_set_name": "Pile-CC" }
Dunrobin, Ontario Dunrobin is a community in West Carleton-March Ward in the City of Ottawa, Ontario, Canada. It is located about 35 kilometres northwest of Downtown Ottawa. Dunrobin lies within a valley, nestled between the Ottawa River and the Carp escarpment, and is located at 45.18° latitude and 75.55° longitude. Dunrobin is located on the former boundary between West Carleton Township and Kanata (formerly March Township). Dunrobin was amalgamated with the city of Ottawa in 2000. Dunrobin is expanding steadily with a current population of about 1,000 people. The Dunrobin Community Association defines the community boundaries as Murphy Sideroad, Constance Lake Road and Berry Sideroad on the south, the Ottawa River to the east, a line following Limestone Road to Kinburn Sideroad to Stonecrest Road to Thomas A. Dolan Parkway to Marchhurst Road, and on the north by a line following Kilmaurs Sideroad to Woodkilton Road to Kinburn Sideroad to Constance Creek on the north. Dunrobin was settled in the 19th century at the corner of Dunrobin Road and Thomas A. Dolan Parkway. The town centre comprises a community centre with outdoor recreation facilities and a number of small businesses. While originally started as an agricultural community it now serves mostly as a focal point within a larger community that has a mixed population of farmers, commuters who work in Kanata and Ottawa-Gatineau, cottagers and pensioners. Some nearby points of interest include Fitzroy Provincial Park, Constance Bay and the Diefenbunker museum. Dunrobin took its name from Dunrobin Castle near Inverness, Scotland. On September 21, 2018, a high-end EF3 tornado struck the community, damaging or destroying 60 buildings and seriously injuring three people. References Community Association Category:Neighbourhoods in Ottawa
{ "pile_set_name": "Wikipedia (en)" }
Oligolepis Oligolepis is a genus of fish in the goby family Gobiidae, native to marine, fresh and brackish waters of the coastal areas of the Indian Ocean and the western Pacific Ocean. Species There are currently 6 recognized species in this genus: Oligolepis acutipennis (Valenciennes, 1837) (Sharptail goby) Oligolepis cylindriceps (Hora, 1923) Oligolepis dasi (Talwar, Chatterjee & Dev Roy, 1982) Oligolepis jaarmani (M. C. W. Weber, 1913) Oligolepis keiensis (J.L.B. Smith, 1938) (Kei goby) Oligolepis stomias (H. M. Smith, 1941) The genera Oligolepis and Oxyurichthys were rearranged by Larsson and Pezold in 2015 and O. keiensis was moved to Oxyurichthys while two other species Oligolepis formosanus and Oligolepis nijsseni were added to this genus. References Category:Gobionellinae * Category:Taxonomy articles created by Polbot
{ "pile_set_name": "Wikipedia (en)" }
Q: HTML encoding escaping problems I'm doing an Android app in which I make a query to a webservice, get a JsonObject and after getting the desired String I find strings like: est&amp;aacute; I've tried this two: StringEscapeUtils.escapeHTML4(text); With the result of transforming &amp;aacute into &amp;amp;aacute Html.escapeHtml(test)); Which does nothing. Any ideas how too transform this into á or the corresponding character? A: You stated you had used the following: StringEscapeUtils.escapeHTML4(text); Instead try this: StringEscapeUtils.unescapeHTML4(text); You were re-encoding the HTML entitites; Documentation here: https://commons.apache.org/proper/commons-lang/javadocs/api-release/org/apache/commons/lang3/StringEscapeUtils.html // import commons http://commons.apache.org import org.apache.commons.lang3.StringEscapeUtils; public static String stripHtml(String str) { return StringEscapeUtils.unescapeHtml4(str.replaceAll("<[A-Za-z/].*?>", "")).trim(); } In addition, you can use this to decode other encoded types (JSON, XML, etc) or use it to encode. This isn't what you asked but may also be useful for URL decoding: String result = URLDecoder.decode(url, "UTF-8"); API reference here: http://docs.oracle.com/javase/7/docs/api/java/net/URLDecoder.html
{ "pile_set_name": "StackExchange" }
Yes I’m a NYC Photographer who loves taking pictures anything NYC related such as the Subway, Central Park, Streets and loves to do long exposure photography.Do I love taking pictures? Yes I do. Why? Because I love to capture to things in my own perspectives and it’s sorta like creating my own diary/adventures except it’s being done by taking pictures. I love to do new adventures and I’ve done few personal photography trips such as West Haven CT, Cold Spring NY and Croton-Harmon NY and just like any other photography adventure’s, it’s been considered to be in my memories which I’ll never forget. People has kept asking me how do I get people posing in my pictures and such and assumed I payed them and tried to flirt with the girls (Even thinking I’m some kind of player). You know what that’s certainly not true at all. I have either asked people if they want to be in my photos (I have people who said no and that’s not a problem to me at all) or they will ask me if I can take a picture of them in it. And to be honest I don’t know why people thinks I’m a player but I assume it’s because of my Facebook Page which now has over 3,000 likes and because of I’m “Popular”. Many people don’t know is that I’m actually shy and nervous as hell when seeing/talking to people. Yes I have really strong shyness when being around others because I get nervous when meeting new people and being invited to join groups/meetups. I’m mostly solo when doing photography but I don’t mind being around others who loves doing it too but at the same time I feel so nervous to the point when I get stressed. I’ve been told many times “I’m not normal” and “I’m stupid for not being like other people who only focuses on getting dates/going to clubs and playing sports”. I’m not into doing any of that stuff right now and all I want to is focus on my photography and my goals. I really wish people understood that and respect that. Right now I’m really nervous about my path and future (Mainly on photography and a few other stuff) because I’m actually afraid that I will screw up at it and it’s very scary to think that but it’s hard for me not to worry. Alot of people think I do photography just to be popular and to be famous when none of that is true. The reason I do photography is because I love doing it and being able to see things my way. When I reached 3,000 likes 3 days before my 21st Birthday in January I was personally surprised. I’ve gotten responses such as “I deserved that much likes” and “I’m just an attention whore seeking for popularity”. I would hope to find my path with my journey right now and wish things will get better.
{ "pile_set_name": "Pile-CC" }
warm water in the shower to kind of melt the nutella out of the jar or just yank it off ;) lol,... but seriously dude,.. i wouldnt recommend that at all,.. definatley a do not try this at home moment kids! :D
{ "pile_set_name": "OpenWebText2" }
1.. Introduction {#s1} ================ Helminths have plagued human beings even before recorded history. Today, it is estimated that roughly one-third of the almost 3 billion people who live on less than 2 USD per day in developing regions of sub-Saharan Africa, Asia and the Americas are infected with one or more species of helminths \[[@RSOB170031C1]\], exacerbating poverty, malnutrition and anaemia as well as causing delays in the physical and intellectual development of infants \[[@RSOB170031C2]\], the most susceptible population. The most common human helminthiases involve infection with intestinal helminths, such as ascariasis, trichuriasis and hookworms, followed by schistosomiasis. Moreover, helminth infections represent a significant economic and health burden to the global ruminant livestock industry, causing huge losses in meat and milk production. Also, resulting in a high mortality rate and the excessive use of anthelmintic treatments \[[@RSOB170031C3],[@RSOB170031C4]\], their effectiveness has been compromised in many geographical areas due to growing resistance \[[@RSOB170031C5]\]. Thus, there is an urgent need to develop new measures to control helminth infections, such as vaccinations \[[@RSOB170031C6]--[@RSOB170031C8]\]. We have previously demonstrated that the catalytic region of the enzyme serine/threonine phosphatase 2A (PP2A), which is highly conserved among a large number of nematode species \[[@RSOB170031C9]\], is capable of inducing partial levels of protection against infections by diverse parasitic nematodes when administered by the mucosal route, specifically intranasally, in mice and lambs. Mucosal immunity involves an intricate network of components of innate and adaptive immunity \[[@RSOB170031C10]\] that act independently of the systemic immune response \[[@RSOB170031C11]\]. In the mucosa, the antigens make contact with the local immune system both by antigen-presenting cells (APC) as well as 'specific microfold cells' (M) that are intercalated in the mucosa with follicles of mucosa-associated lymphoid tissue (MALT) in association with Peyer\'s patches (PPs). Mucosa covers both the aerodigestive and the urogenital tract, constituting a special immune system, as this mucosa is the entry pathway of almost 90% of infections in vertebrates. Despite being anatomically separate, mucosa acts synergistically; for example, intranasal immunization stimulates T or B cells to respond in the intestinal or the urogenital mucosa \[[@RSOB170031C12]\], thus being an alternative to intramuscular, intradermal or subcutaneous vaccination. Apart from the administration route, the induction of the immune response depends on the incorporation of an appropriate adjuvant that triggers the innate response and is capable of tolerating the transition from an innate response to an adaptive response. Some reviews on the use of adjuvants in the immunization through mucosa have recently been published \[[@RSOB170031C12]--[@RSOB170031C18]\]. By the use of a bioconjugation methodology, a number of soluble proteins, including ovalbumin (OVA), cytochrome *c*, Tamm Horsfall glycoprotein and HIV-1 gp120, have been attached to palmitic acid via the ɛ-amine groups of lysine \[[@RSOB170031C19]\]. The first work in which lipopeptides were used as adjuvants were performed by Hopp \[[@RSOB170031C20]\]. Other authors \[[@RSOB170031C21],[@RSOB170031C22]\] found that a lipopeptide of influenza triggered a cytotoxic CD8+ T lymphocyte (CTL) response. This finding enormously boosted the potential use of lipids bound to peptides as vaccines \[[@RSOB170031C23]\]. Conjugated peptides with tripalmitoyl-*S*-glycerylcysteinyl-seryl-serine (P3CSS) induced a CTL response similar to that achieved when live vaccines are used \[[@RSOB170031C24],[@RSOB170031C25]\]. This study tests the ability of recombinant PP2A subunit from the parasitic nematode *Angiostrongylus costaricensis* to induce cross-protective immune responses against a challenge *Trichuris muris* infection in mice when the subunit is administered intranasally and is formulated as a lipoconjugate with oleic-vinyl sulfone (OVS). Results demonstrate that this formulation induces a strong protective immunity in the infected and vaccinated animals. The rapid expulsion of the intestinal parasites in the PP2A-OVS vaccinated animals was found to be associated with the high production of IL-9 in the PPs. 2.. Results {#s2} =========== 2.1.. Synthesis of the oleic-vinyl sulfone {#s2a} ------------------------------------------ The oleic acid was transformed into the vinyl sulfone derivate as described by Morales-Sanfrutos *et al*. \[[@RSOB170031C26]\], in the three steps depicted in [figure 1](#RSOB170031F1){ref-type="fig"}. Compound (9Z)-*N*-\[2-(ethenylsulfonyl)ethoxy\]-ethyl\]-9-octadecenamide was obtained as a solid (279 mg, 81%). M. P. 61--62°C; nmax(film) cm^−1^: 3062, 2915, 2847, 1462, 1284, 1124, 908 and 730; ^1^H-NMR(CDCl~3~, 400 MHz): d 6.62 (dd, 1H, *J* = 16.6 and 9.8 Hz, CH=), 6.43 (d, 1H, *J* = 16.6 Hz, =CH~2~*trans*), 6.15 (d, 1H, *J* = 9.8 Hz, =CH~2~*cis*), 2.96 (t, 2H, *J* = 8.0 Hz), 1.77 (m, 2H), 1.46--1.20 (m, 30H), 0.88 (t, 3H, *J* = 6.7 Hz); ^13^C-NMR (CDCl~3~, 100 MHz): d 136.3, 130.4, 54.4, 32.0, 29.8, 29.7, 29.7, 29.7, 29.6, 29.4, 29.3, 29.1, 28.5, 22.8, 22.4, 14.2. HRMS (*m*/*z*) (FAB+) calcd. for C~20~H~40~O~2~SNa \[M + Na\]^+^: 367.2647; found: 367.2644. Figure 1.Recombinant peptide (rPP2A), oleic-vinyl sulfone (OVS) and lipopeptide (rPP2a-OVS). (*a*) The synthesis of (9Z)-*N*-\[2-(ethenylsulfonyl)ethoxy\]-ethyl\]-9-octadecenamide (OVS). (*b*) Multiple alignments (ClustalW2) of the sequence of the catalytic region of *Angiostrongylus costaricensis* PP2A and different *Trichuris* ssp. Ac, *Angiostrongylus costaricensis*; Ts, *Trichuris suis*; Tt, *Trichuris trichiura.* Black indicates the positions with 100% conservation, while grey represents a decline in conservation. (*c*) SDS-PAGE analysis of purified PP2A and western blot. Lane A, total protein transformed bacteria; lane B, PP2A after affinity chromatography with nickel-agarose column purification; lanes C and D, recognition by the immune serum against rPP2A. (*d*) Mass spectrometry of linked rPP2A to OVS. The arrow corresponds to rPP2A, and asterisks to fusions of 1, 2, 3, 4 and 5 OVSs linked to rPP2A. 2.2.. Lipopeptide: antigen and self-assembly with the oleic-vinyl sulfone {#s2b} ------------------------------------------------------------------------- After the sequencing and analysis of the recombinant peptide and search by Mascot, the recombinant protein was identified as a homologue of the catalytic subunit of the family serine/threonine phosphatase 2A, with a value of *E* = 2 × 10^−16^. The sequence is shown in [figure 1](#RSOB170031F1){ref-type="fig"}. The analysis of the nucleotide sequence of the recombinant protein (rPP2A) using the ClustalW algorithm (<http://www.ebi.ac.uk/Tools/msa/clustalw2/>) confirmed the high identity between the sequence of the catalytic region of recombinant serine/threonine phosphatase 2A from *A. costaricensis* (AcPP2Ar) and the catalytic region of the PP2A from *Trichuris suis* (TsPP2A) and *T. trichiura* (TtPP2A). The analysis of the recombinant protein by 12.5% SDS-PAGE electrophoresis showed that the molecular weight of the recombinant protein was 10 kDa, and the theoretical molecular mass was 9898.4 Da, with an isoelectric point value of pI 9.30 based on the sequence calculated by the ExPASy pI/Mw tool (<http://web.expasy.org/compute_pi/>). Western blot confirmed the identity of the purified protein ([figure 1](#RSOB170031F1){ref-type="fig"}). The recombinant protein was chemically bounded to OVS, yielding a lipopeptide with rPP2A coupled to 1 or 2 molecules of OVS with minor amounts of 3 and 4 OVS molecules and traces of 5 OVS molecules as revealed by mass spectrometry ([figure 1](#RSOB170031F1){ref-type="fig"}). Notably, the electron microscope revealed that the lipopeptide formed micelles with 46.66 ± 6.40 nm in diameter ([figure 2](#RSOB170031F2){ref-type="fig"}). [Figure 2](#RSOB170031F2){ref-type="fig"} shows that the purified rPP2A (not linked to the lipid vinyl sulfone) in a PBS suspension forms aggregates as the result of its low solubility in aqueous solution. Figure 2.Transmission electron microscopy images. (*a*) Micelles formed after the functionalization of the rPP2A with OVS. (*b*) Purified rPP2A in aqueous suspension. 2.3.. Evaluation of the anti-helminth activity {#s2c} ---------------------------------------------- To evaluate the possible adverse effects of the different intranasal inoculation treatments that the different groups of animals underwent, we weighed the mice throughout the experiment, comparing them to the IC group ([figure 3](#RSOB170031F3){ref-type="fig"}). The results indicate that there was no variation among the animals of the different groups, and the variability of the weights in the IC group was even higher than in the rest of the experimental groups. Although without statistical significance (*p* \> 0.05), at the end of the experiment, the mice immunized with rPP2A-OVS and rPP2A-BW increased slightly in weight when compared with the IC, probably because of the parasite loads, as discussed below ([figure 3](#RSOB170031F3){ref-type="fig"}). Figure 3.(*a*) Animal weight (average in grams) from the different immunized groups after the second immunization. No differences were obtained among the groups. (*b*) Number of eggs along time present in each animal group post-immunization. The number of eggs present in rPP2A-OVS immunized animals was significantly lower than in the control group and in those immunized with BW. (*c*) Number of worms found on average in each immunized group. The differences were statistically significant (*p* *\<* 0.001, \*\*\*) in a Tukey--Kramer test. White bars show the IC group; grey bars the BW immunization; dark grey bars rPP2A-BW immunization and back bars the rPP2A-OVS immunization. The average number of eggs expelled by the different groups of mice after immunization is represented in [figure 3](#RSOB170031F3){ref-type="fig"}, showing that one week post-immunization the immunized mice with the formulae that included rPP2A-BW and rPP2A-OVS reached percentages of 88.93% and 92.73% reduction of the number of eggs, respectively. Curiously, in the mice treated only with the BW at 7 days post-immunization a reduction of 7.67% was reached. At 12 days post-immunization, the groups immunized with rPP2A-BW and rPP2A-OVS reached minimum values, not being significant when compared with each other but highly significant compared with the IC and to the BW groups (Tukey--Kramer test, *p* *\<* 0.001). Two weeks post-immunization the number of eggs in mice treated with BW declined 16.13% compared with IC, plunging 99.85% in those treated with rPP2A-BW and 99.01% for those treated with rPP2A-OVS. This reduction not only remained steady but persisted until day 18 of the experiment. The number of worms in the control animals killed at 14 days post-infection (p.i), before beginning the immunization, was 83 ± 31.85, demonstrating that the infection was successful and that *T. muris* was correctly established. The fall in the number of worms compared with the control group at the end of the experiment (when the animals were killed) is shown in [figure 3](#RSOB170031F3){ref-type="fig"}, indicating that the animals immunized with rPP2A-OVS had 97.90% less worms than mice immunized with PP2A-BW (59.88%), and those treated only with BW (24.47%). 2.4.. Interleukin expression assessment by quantitative real-time PCR and evaluation of mucosal immune changes by confocal microscopy {#s2d} ------------------------------------------------------------------------------------------------------------------------------------- The evaluation of the immune response of the different groups of animals carried out as described in Material and methods by laser confocal microscopy in thin sections of the intestinal caecum. The levels of fluorescent areas of the mucine zones, antibody recognition against chemokines CCL20, CCL11 and OX40, neutrophils, the plasma-cell marker CD138 and Tuft cells were determined. Also, the expression levels of different interleukins were evaluated using quantitative real-time PCR, measuring the mRNA-production levels of these proteins both in the PPs and in the MLN. Analysis by confocal microscopy of the intestinal sections in different groups of mice was performed in order to evaluate the levels of mucus of the crypt in the colonic mucosa, using WGA lectin labelled with fluorescein. The results showed that the fluorescent areas inside the crypts were larger in animals treated with rPP2A-OVS than in the rest of the groups, and the intensity of the fluorescence was also stronger. These differences proved significant (Tukey--Kramer test, *p* \< 0.001) compared with the other groups. On the contrary, the values of the area in the IC group and in the group immunized with rPP2A-BW proved similar ([figure 4](#RSOB170031F4){ref-type="fig"}). Figure 4.The evaluation in thin sections of the intestine of the immune response of the different groups by laser confocal microscopy. (*a*) Levels of fluorescent areas of the mucus of the crypt in the colonic mucosa, using WGA lectin labelled with FITC. (*b*) Quantification of the mean values of fluorescence in the different treated groups, lectin labelled. Dark bars correspond to the means area measured plus s.d. of the values; grey bars correspond to the means of fluorescence intensity plus s.d. of the values. (*c*) CCL11 (red labelled with Alexa-Fluor 633) in the thin section of the intestinally treated mice. (*d*) Means of the number of fluorescent marks to CCL11 plus s.d. of the mean values of cells measured in an area of 125 µm^2^. (*e*) OX40 (green labelled with FITC) in the thin section of the intestinally treated mice. (*f*) Average values plus s.d. of fluorescent cells of OX40 in an area of 1000 µm^2^. (*g*) Confocal microscopy studies of plasma cells (CD138 in red with Alexa-Fluor 633) in thin intestinal sections. (*h*) Average number and s.d. of plasma cells measured in an area of 170 µm^2^. The nuclei were labelled with DAPI (blue). BW corresponds to control animals immunized with bacterial walls; rPP2A-BW corresponds to the animal group immunized with the recombinant peptide plus bacterial walls and rPP2A-OVS is the group immunized with the self-assembling lipopeptide. Tukey--Kramer test, *p* *\<* 0.001 (\*\*\*), *p* *\<* 0.01 (\*\*) and *p* *\<* 0.05 (\*). [Figure 5](#RSOB170031F5){ref-type="fig"} presents both the confocal microscopic images of the recognition levels of CCL20 (Alexa-Fluor 647) and the recognition by the specific antibody with the fluorochrome fluorescein isothiocyanate FITC against the neutrophils in an area of 2000 µm^2^ in the sections of intestine from animals of the different groups, taking into account the fluorescence intensity values and the fluorescence percentage occupied with respect to the total area measured. It was found that when the sections were treated with the antibody against the neutrophils, the number of fluorescent cells appearing in the mucosa surrounding the crypts and on the intestine borders was larger, whereas a green colour was appreciable along the borders of the mucosa, likely to be a consequence of the secretion products of these neutrophils. In the IC, BW and rPP2A-BW groups, fluorescence intensity did not show significant differences; by contrast, the animals treated with rPP2A-OVS registered highly significant differences (*p* \< 0.001) with respect to the other groups ([figure 5](#RSOB170031F5){ref-type="fig"}). Figure 5.Confocal microscopy studies on neutrophil cells and CCL20. (*a*) Confocal microscopy of recruitment of neutrophils (green with FITC) and CCL20 (red with Alexa-Fluor 647) in thin intestinal sections in IC and mice immunized with BW, rPP2A-BW and rPP2A-OVS. The nuclei were labelled with DAPI (blue). (*b*) Means plus s.d. of the fluorescence intensity values of neutrophils measured in an area of 2000 µm^2^. (*c*) Means plus s.d. of the fluorescence intensity values of CCL20 measured in the intestinal crypts. (*d*) Percentage of fluorescent area plus s.d. of the values of CCL20 labels measured in the intestinal crypts. Tukey--Kramer test, *p* *\<* 0.001 (\*\*\*), *p* *\<* 0.01 (\*\*) and *p* *\<* 0.05 (\*). The levels of recognition of CCL20, evaluated as the intensity of the red colour in the rPP2A-OVS group, showed significant intensity levels of fluorescence (*p* \< 0.001, \*\*\*) in comparison with the other groups, while the IC and rPP2A-BW groups were significantly increased with respect to the BW group ([figure 5](#RSOB170031F5){ref-type="fig"}). On the contrary, when the percentage of fluorescence was evaluated per surface area of the crypts, values proved significantly higher (*p* \< 0.001, \*\*\*) in the groups that included the peptide rPP2A (rPP2A-OVS and rPP2-BW) as opposed to the IC and BW groups, although the percentage of fluorescence per unit of surface area in the BW group was significant compared to that shown by IC ([figure 5](#RSOB170031F5){ref-type="fig"}). The levels of fluorescence found when studying eotaxin (CCL11) (Alexa-Fluor 633) showed ([figure 4](#RSOB170031F4){ref-type="fig"}) that the fluorescence appeared on the epithelium surrounding the crypts and the groups significantly differed from each other, especially the one treated with the lipopeptide and rPP2A, which registered the highest significance (*p* \< 0.001, \*\*\*) in the intensity of fluorescence compared with the rest of the groups ([figure 4](#RSOB170031F4){ref-type="fig"}). The fluorescence levels for OX40 (FITC) are presented in [figure 4](#RSOB170031F4){ref-type="fig"}*.* The signal appears preferentially on the brush border of the mucosa and in the epithelium that borders the crypts, and the intestines of the group rPP2A-BW had the highest expression levels, being non-significant in the other three groups ([figure 4](#RSOB170031F4){ref-type="fig"}). CD138 expression was highly specific for the plasma cells, given that this receptor was not expressed in the undifferentiated plasmablasts \[[@RSOB170031C27]\]. [Figure 4](#RSOB170031F4){ref-type="fig"} shows the location of the plasma cells CD138, near the lamina propria and inside the intestinal villi of the immunized mice. This marker indicated that the IC group significantly differed (*p* \< 0.001) in terms of the number of cells with respect to the other groups, but no differences were detected among the immunized groups ([figure 4](#RSOB170031F4){ref-type="fig"}). Regarding the count, the study of fluorescence intensity and size of Tuft cells using an antibody against Dcamkl1 and revealed with Alexa-Fluor 647 ([figure 6](#RSOB170031F6){ref-type="fig"}) showed that the number of cells per area studied (a square of 138 µm per side) did not vary between groups, nor did the average size of the cells recognized by the antibody ([figure 6](#RSOB170031F6){ref-type="fig"}). However, the fluorescence intensity per cell was highly significant (*p* \< 0.001) in the rPP2A-OVS group in comparison with the other groups. The significance of the rPP2A-BW and BW groups showed significant values with respect to the IC group. Figure 6.Confocal microscopy studies of Tuft cells. (*a*) Confocal microscopy studies of Tuft cells with anti-Dcamkl1 (red) in gut sections. (*b*) Means plus s.d. of the fluorescence intensity values of Tuft cells measured in an area of 138 µm^2^. (*c*) Number of cells (grey bars) and means plus s.d. of Tuft cells size (patterned bars). BW corresponds to control animal immunized with bacterial walls (BW); rPP2A-BW corresponds to the animal group immunized with the recombinant peptide plus bacterial walls, rPP2A-OVS is the group immunized with the self-assembling lipopeptide. Tukey--Kramer test, *p* *\<* 0.001 (\*\*\*), *p* *\<* 0.01 (\*\*) and *p* *\<* 0.05 (\*). The nuclei were labelled with DAPI (blue). The analysis of the expression levels of the different interleukins was also studied by quantitative real-time PCR. In MLN ([figure 7](#RSOB170031F7){ref-type="fig"}), a high IL-23 response was found, followed by IL-4 and IL-2, with a balanced value of IL-17 in the IC mice. Meanwhile, in the BW-intranasally immunized animals, there was an increase of G-CSF, IL-6 and IL-2 when compared with the other groups. However, in the groups immunized with rPP2A-BW, the predominant response was of IL-25 and IL-2. Also, in those immunized with rPP2A-OVS, a rise of IL-23 accompanied by IL-17, IL-9 and TNF-α was encountered. Figure 7.Determination by quantitative real-time PCR of the interleukin levels in the different immunized animal groups. (*a*) Study in mesenteric lymphatic nodules (MLN). (*b*) Study in Peyer\'s patches (PPs). The values are the means of the normalized expression values plus s.d. of these values. Tukey--Kramer test, *p* *\<* 0.001 (\*\*\*), *p* *\<* 0.01 (\*\*) and *p* *\<* 0.05 (\*). Grey bars, IC; black bars, animal groups immunized with bacterial walls (BW); red bars, animals immunized with rPP2A plus bacterial walls (rPP2A-BW); blue bars, animals immunized with the lipopeptide (rPP2A-OVS). In the PPs ([figure 7](#RSOB170031F7){ref-type="fig"}) of the animals from the IC group, a high IL-23 response was developed, followed (in order of expression) by IL-6, IL-17 and IL-21, with relatively moderate levels of IL-2, IFN-γ and G-CSF. The BW group developed a high IL-17 response accompanied by a medium level for IL-23, though this proved 3.5-fold lower than that registered in the control group. The Th2 responses such as IL-4 and IL-10 were in general very low with the exception of the rPP2A-BW group, in which the maximum response was recorded for IL-4. In addition, this group registered the maximum response for IFN-γ and intermediate for IL-23 and IL-25, followed by IL-9. However, in the rPP2A-OVS immunized mice, the response in the PPs was mainly IL-23 and IL-9, followed by IL-25, with low levels for IL-17. 3.. Discussion {#s3} ============== The results found in this study clearly demonstrate that a recombinant version of the catalytic subunit of the enzyme serine/threronine phosphatase 2A (PP2A) from the nematode *A. costaricencis* formulated as a lipopeptide conjugated with OVS can induce significant cross-protection against *T. muris* infection in mice. This confirms the high immunogenicity of the PP2A where the immunoprotective capability of the recombinant peptide was corroborated for *A. costaricensis* \[[@RSOB170031C28]\] as well as other nematodes such as *Haemonchus contortus* and *Teladorsagia circumcincta* \[[@RSOB170031C9]\]*.* The results presented reinforce the notion that conjugated lipopeptides are excellent adjuvants. Although the underlying molecular mechanism that triggers these compounds is not fully understood, it is attributed to the capability of aggregating to form micelles or particles, protecting the epitope from degradation by serum enzymes \[[@RSOB170031C29]--[@RSOB170031C31]\] or, perhaps, determining the type of antigenic presentation, among other possibilities. In an aqueous medium, the hydrophobic parts of lipids would remain inside, forming a lipophilic nucleus, while the more hydrophilic peptides would stay outside, thus permitting greater efficiency in the presentation of the APC \[[@RSOB170031C32],[@RSOB170031C33]\]. The OVS, without coupling to a protein, would bond by the high reactivity of the sulfone group to the amine groups of the proteins at the administration site, lacking activity as an adjuvant, as was determined in previous unpublished assays. The safety of the different antigen preparations administered in the assay is evident as no weight changes in the inoculated animals were observed. In terms of the effectiveness of the immunological activation against *T. muris,* the number of nematode eggs present in the faeces abruptly decreased from the seventh day after intranasal administration of the preparations containing the lipopeptide (rPP2A-OVS) or rPP2A plus the BW (rPP2A-BW). It was striking that the group treated only with BW and without the recombinant antigen had a lower average number of eggs in faeces than did control, although not as markedly as with the peptide formulae. Other authors have previously reported the positive effect of both LPS and BW as protectors against helminth infection \[[@RSOB170031C34]--[@RSOB170031C36]\]. These effects may be attributed to the immunological activation by the LPS present in the BW that act as TLR-agonists in a wide range of cell types \[[@RSOB170031C37],[@RSOB170031C38]\]. After their activation, the TLRs modulate the immune response, inducing the expression of the chemokine CCL20 \[[@RSOB170031C39],[@RSOB170031C40]\]. Intestinal epithelial cells, among others, express this chemokine in case of inflammation \[[@RSOB170031C41]--[@RSOB170031C43]\]. The evaluation of the sections of the intestine in the different groups of mice by immunohistochemistry revealed that those treated either with rPP2A-OVS or with rPP2A-BW reached high levels of fluorescence in the area studied, as well as a significant number of cells that expressed CCL20, compared with the IC and BW groups. The level of fluorescence for this chemokine in the IC group could be a consequence of the ability of *T. muris* capable to stimulate TLR4 \[[@RSOB170031C44]\]. Although *T. muris* is a parasite specific to mice, not all inbred strains of mice are susceptible \[[@RSOB170031C45]\]. After the ingestion of the embryonated eggs of the nematode, even at very low doses, acute colitis develops in all the mice strains. However, parasitism results only in the mice in which an inflammatory response was triggered, while in the hosts that developed a Th2 response (e.g. in BALB/c mice), worms were expelled approximately 20 days post-infestation \[[@RSOB170031C46]\]. In AKR/OlaHsd mice used in these experiments, infestation triggered a Th1-dependent inflammatory response in the PPs, and therefore a chronic colitis developed, indicative of the persistence of the adult worms in the large intestine due to the inability of the host to expel them 20 days post-infestation \[[@RSOB170031C47]--[@RSOB170031C49]\]. In this study, the IC mice developed high levels of inflammatory Th17-dependent interleukin expression, IL-17, IL-23 and IL-21, as well as the expression of IL-6 in PPs. However, the expression levels of IFN-γ, IL-2 and GM-CSF, though not reaching expression values of IL-6, appeared high. Nevertheless, in the MLN, a clear Th1 increase was found together with a rise in IL-2, IL-12 and IFN-γ, with an increase in IL-4 (Th2) but not IL-10 (Treg), and a less notable rise in some of the Th17 interleukins such as IL-23 and IL-17. This leads to the assumption that the Th17 inflammatory response in the PPs corresponds to a local type of Th17 response, while the one corresponding to the MLN would be a mixed Th1/Th17 systemic response, perhaps mediated by the expression of CCL20 in the intestinal epithelium cells. The first line of defence encountered by nematodes in their intestinal habitat is the mucosal barrier. The surfaces of the intestinal cells are coated by a gel that constitutes a mucus made up primarily of mucins, a series of glycoproteins that are secreted by the goblet epithelial cells, this constituting an essential component in the defence and elimination of gastrointestinal helminths \[[@RSOB170031C50]--[@RSOB170031C53]\]. Mucins are the major component of the mucus secreted by the goblet cells, but other molecules such as antibodies, defensins and lysozymes are also present, covering the entire intestinal epithelium \[[@RSOB170031C54],[@RSOB170031C55]\]. The layer of mucus keeps the intestinal surface covered with peptides that show a bactericide action ensuring its sterility, and also have an activity against infection by parasites, including nematodes, due to the presence of different bioactive factors \[[@RSOB170031C56],[@RSOB170031C57]\]. Furthermore, the physical barrier of the mucus may also interfere in both the feeding mechanisms as well as the mobility of the worms. This could explain why hyperplasia of the goblet cells occurs in nematode infections and the hyperplasia that might be induced by IL-9 \[[@RSOB170031C50],[@RSOB170031C58]\]. In our results, the highest levels of fluorescence intensity and area occupied by the mucus were found in the groups treated with lipopeptide (rPP2A-OVS) and rPP2A-BW in which worm reduction was most successful. The analysis of mucus production by WGA lectin demonstrated that these two formulae administered intranasally are capable of stimulating, by MALT, the mucus-producing goblet cells of the intestinal mucosa. As evidenced with the levels of eggs in faeces, the percentages of reduction of parasitism in the different groups ranged from 24.47% (BW treatment) to 98% (lipopeptide). The reduction after BW administration was lower than that observed for rPP2A-BW (59%), demonstrating the effectiveness of the stimulation of the response by the recombinant antigen. Also, when these BW were administered together with the recombinant antigen (rPP2A) the percentage of reduction in the number of worms would be comparable with levels found in other models of parasitic gastrointestinal nematodes of livestock when the same rPP2A-BW combination is used \[[@RSOB170031C59]\]. On the other hand, when rPP2A was linked with oleic-vinyl sulfone (rPP2A-OVS), the reduction rates of parasitism reached their highest levels, practically 98%. This group of animals registered the maximum fluorescence levels when glycoprotein production in the mucus was analysed and showed the highest expression levels of the chemokines CCL20 and CCL11, both linked to the process of cell attraction to the inflammation site and stimulation of goblet cells. In addition, it is known that the Th17 cells recruit neutrophils \[[@RSOB170031C60]\], and this could explain not only the increase in neutrophils that appear in the mice of the rPP2A-OVS group but also the high IL-17 expression levels. In addition to the goblet cells, other cells such as M-cells \[[@RSOB170031C61]\], Cup-cells \[[@RSOB170031C62]\] and Tuft cells \[[@RSOB170031C63]\] in the intestinal epithelium also regulate the immune response of the mucosa. Until very recently, the function of these cells was unknown, but they have been described as participating very actively in the immunological regulation against parasites. Tuft cells are differentiated from the rest of the mucosal cells for having a tubule-vesicular system and a plume of villi towards the luminal side, giving them the name 'Tuft'. In this group of tubules, microtubule-linked protein kinase Dclk1 is found, known as Dcamkl-1 \[[@RSOB170031C64]\], that allows these cells to be recognized by antibodies against this kinase. It is known that the number of Tuft cells increases with the presence of parasites \[[@RSOB170031C65]--[@RSOB170031C67]\]. In parasite-free animals, the number of Tuft cells of the intestinal epithelium ranges from 0.4 to 1% of the total of the epithelium cells \[[@RSOB170031C64]\]. In our experiments, the number of cells stained with anti-Dcamkl-1 did not vary among groups and neither did their size. A possible explanation is that in all the groups the infections occurred with a similar number of nematode larvae, and thus the parasitism undoubtedly boosted the number of Tuft cells, which in our case ranged between 13 and 20 in the study area (a square of 138 µm per side) for each of the different treatments. Despite the reduction in the number of worms found in the rPP2A groups, the parasite was not totally eradicated in any group. Consequently, we conclude that the decline in the number of Tuft cells could not have taken place without the absence of parasites in the intestinal mucosa \[[@RSOB170031C65]\]. However, the level of fluorescence, as indicative of the activity of the Tuft cells in the IC group, was significantly lower than in the other three groups, especially in comparison with the groups treated intranasally with the lipopeptide. This could indicate that the presence of the antigens, together with the BW or linked to the OVS, stimulated the activity of these cells. Intestinal bacteria also reportedly promote IL-25 (IL-17E) production through Tuft cells \[[@RSOB170031C68]\]. A similar response may involve the nasal mucosa, implying a stimulation of the Tuft cells mediated by the cooperation between the NALT-GALT systems by some of the stimulation factors such as chemokines. This could account for the high expression levels of IL-25 in the MLN of the mice inoculated with the preparations that carried the recombinant antigen (rPP2A-BW and rPP2A-OVS). Owyang *et al*. \[[@RSOB170031C69]\] found that IL-25 is expressed both in the caecum as well as in the MLN, and the animals resistant to *T. muris* infection present significantly higher levels in the caecum than in the MLN. The mice strain AKR/OlaHsd, susceptible to infections and used in this study, registered comparable IL-25 expression levels both in the MLN and the caecum. Tuft cells are currently considered the prime source of parasite-induced IL-25 production, and IL-25 promotes the production of IL-13 by innate lymphoid C2 (ILC2) cells. In our study, the group of mice that were vaccinated with rPP2A-BW showed higher levels of IL-25 expression in the MLN versus the expression levels in PPs. The IL-25 expression level in MLN from the mice treated with rPP2A-OVS did not correspond to the levels of IL-25 in the PPs, where the values of this group were similar to those of rPP2A-BW, although both were significantly higher than in the two other control groups (IC and BW). However, as noted above, expression levels differed from those found in the MLN, whereas IL-9 expression levels proved far higher in the PPs than in the MLN. Curiously, the group treated with the lipopeptide registered the highest expression levels of this interleukin in the PPs. It is known that T cells *in vitro* stimulated with TGF-β and IL-4 express IL-9 and produce high levels of mRNA for the IL-17RB receptor, the receptor for IL-25. In addition, the treatment of these T cells with IL-25 boosts the expression of IL-9, confirming the induction of this interleukin by IL-25 \[[@RSOB170031C70]\]. This might imply that the effect on the expulsion of the worms attributed to IL-25 could be potentially mediated by IL-9, able to stimulate the production of IL-13, as observed prior to the anti-parasite effect \[[@RSOB170031C71]\]. IL-9 is pleiotropic and, among other biological effects, reduces the expression of the claudin2 protein of the tight junction of the intestinal cells. Thus, IL-9 production by these cells could alter the function of the intestinal barrier \[[@RSOB170031C72]\], altering the intestinal flow towards the intestinal lumen \[[@RSOB170031C73]\]. Another role of this interleukin is the effect on intestinal contractibility, favouring the expulsion of the worms \[[@RSOB170031C74]\]. In summary, the results of the present study suggest that the treatment of the AKR/OlaHsd mice susceptible to infection by *T. muris*, by the nasal immunization with the recombinant peptide rPP2A as a lipopeptide bound to OVS and administered at the outset of the chronic phase of infection, is able to activate a combined Th17/Th9 response orchestrated by the cytokines IL-25, IL-17 and IL-9, restraining egg release by intestinal worms and resulting in accelerated worm expulsion. This strategy of immunization could be of great applicability not only in immunotherapy and immunoprophylaxis to control diseases caused by nematode parasites of the intestinal mucosa but also in those pathologies in which it is necessary to act at the level of the Th9 response in the mucosa. 4.. Material and methods {#s4} ======================== 4.1.. Antigen {#s4a} ------------- We used a recombinant peptide expressed by a CT2--2 clone corresponding to the PP2A catalytic region of *A. costaricensis* \[[@RSOB170031C28]\] as the antigen. Recombinant production was previously described by Fawzi *et al*. \[[@RSOB170031C9]\] and briefly described below. The protein expression in the recombinant bacteria was induced with 0.5 mM IPTG (isopropyl-β-[d]{.smallcaps}-thiogalactopyranoside). The recombinant protein was purified by affinity chromatography with HisTrap FF Crude column (GE Healthcare Life Sciences, 11-0004-58), previously equilibrated with binding buffer (6 M guanidine-HCl, 20 mM sodium phosphate, 500 mM NaCl, 5 mM imidazole, 1 mM β-mercaptoethanol, pH 7.4). The sample was loaded, and the column was washed with binding buffer and a gradient of imidazole from 20 to 60 mM. The recombinant protein was eluted with elution buffer (6 M guanidine-HCl, 20 mM sodium phosphate, 500 mM NaCl, 500 mM imidazole, 1 mM β-mercaptoethanol, pH 7.4). After dialysis, the protein concentration was determined by the Bradford method in denaturizing buffer (6 M guanidine-HCl). 4.2.. SDS-PAGE electrophoresis and western-blot analysis {#s4b} -------------------------------------------------------- A defined amount of 20 µg per lane of protein was subjected to 12.5% SDS-PAGE and stained with Coomassie Brilliant Blue. Unstained replicas were transferred to 0.2 µm PVDF membranes (Bio-Rad, 170-4156) using a Bio-Rad Trans-Blot Turbo TM (0.6 Å, 25 V, 40 min). Western blot analyses were carried out using sera obtained from mice immunized with PP2A \[[@RSOB170031C9]\] and diluted 1 : 150 with PBS-T (0.3% tween-20 in PBS). Membranes were washed with phosphate-buffered saline with 0.05% Tween 20 (PBS-T), incubated for 2 h at 37°C with 1 : 1000 polyclonal Goat anti-Mouse Immunoglobulins/HRP (Dako Cytomation-P0447) and developed using chemiluminescence (ClarityTM Western ECL Substrate, Bio-Rad, 170-5060). The protein band from the SDS-PAGE electrophoresis recognized by the sera was sequenced by fingerprinting and identified at the Servicio de Proteómica del Centro de Biología Molecular Severo Ochoa (CBMSO) in Madrid (Spain) in an Autoflex matrix-assisted laser-desorption ionization time-of-flight (MALDI-TOF) mass spectrometer (Bruker) equipped with a reflector following a previously described protocol \[[@RSOB170031C75]\]. 4.3.. Synthesis of alkyl vinyl sulfone {#s4c} -------------------------------------- The synthesis of (9Z)-*N*-\[2-(ethenylsulfonyl)ethoxy\]-ethyl\]-9-octadecenamide (OVS) has been previously described in detail \[[@RSOB170031C76]\] and is summarized in [figure 1](#RSOB170031F1){ref-type="fig"}. 4.4.. Coupling of the alkyl vinyl sulfone to rPP2A and mass determination {#s4d} ------------------------------------------------------------------------- The synthesized alkyl vinyl sulfone was solubilized in methanol and mixed with 0.125 mM carbonate buffer (pH 8.3) to a final concentration of 2 mg ml^−1^. The solution of the alkyl vinyl sulfone was mixed with the purified rPP2A (2 mg ml^−1^) in carbonate buffer (0.125 mM carbonate, pH 8.3) and kept at 4°C in an orbital shaker for 12 h. Thereafter, free reactive groups were blocked with a molar excess of glycine in carbonate buffer at room temperature for 4 h. The conjugates were dialysed for 12 h against a solution of ammonium acetate (0.1 M, pH 7) and then lyophilized. Mass spectrometer analyses were performed at Laboratorio de Espectrometría de Masas (SIdI), Faculty of Sciences, UAM, Madrid (Spain) in a Ultraflex III TOF/TOF instrument (Bruker) that uses an NdYAG laser (emission, 355 nm; accelerating voltage, 25 kV). The sample (0.5 mg of lipopeptide in 0.2 ml of 1,1,1,3,3,3 hexafluoruro-2-propanol) and matrix solution (10 mg of α-ciano-4-hydroxycinnamic acid (ACC) in 1 ml of acetonitrile, 0.1% TFA in water 3 : 1 v/v), were mixed in a proportion 1 : 20, and then applied to a metal sample plate for MS analysis. The lipopeptide mass was measured at approximately 1000 Da absorption laser intensity. 4.5.. Electron microscopy {#s4e} ------------------------- Electron microscopy was used to check whether the alkyl functionalized peptides were aggregated in micelles and to estimate their size. Hence, the lipopeptide was sonicated in a 0.1 M ammonium acetate solution and visualized in a transmission electron microscope (TEM) (Libra 120 PLUS de Carl Zeiss SMT) by depositing 5 µl of the suspension adsorbed directly onto a 300 mesh Cu grid covered with Formvar and stained with 1% uranyl acetate for 1 min \[[@RSOB170031C77]\]. To determine the size of the micelles, 100 of the observed particles were measured digitally using I[mage]{.smallcaps}J software (v. 1.48 e, Wayne Rasband, htpp:\\\\imagej\\nhi\\gov\\imagej). 4.6.. Animal experiments {#s4f} ------------------------ The inbred AKR/OlaHsd mouse strain was used in all experiments. This mouse strain is highly susceptible to *T. muris* infection and, following a primary infection, it allows the progression to a chronic stage with persistence of fecund adult worms due to activation of an inappropriate Th1-type response \[[@RSOB170031C78]\]. A total of 36 inbred female AKR/OlaHsd, aged six to eight weeks, were purchased from Harlan Laboratories UK Ltd (Blackthorn, Bicester, UK) and maintained under specific pathogen-free conditions at the VISAVET animal house facilities at Complutense University of Madrid with ad libitum access to food and water, regulated temperature and light/dark cycle conditions. For the experiments, the mice were reared in six randomly assigned groups and placed in the corresponding standard methacrylate cages for the duration of the experiments. All mice were weighed weekly along the time of the experiments. 4.7.. Parasites {#s4g} --------------- The Edinburgh strain of *T. muris* (isolated in 1961 \[[@RSOB170031C79]\] and since then maintained by periodical passage in outbred mice) was used in this study. The methods for the maintenance and infection were the same as previously described \[[@RSOB170031C80]\]. Each mouse was infected with approximately 200 embryonated eggs by oral gavage on day 0. 4.8.. Assessment of infection and immune response {#s4h} ------------------------------------------------- For an assessment of the level of infection as well as the local and systemic immune response elicited against infection, the mice were killed by an overdose with isoflurane, placed under aseptic conditions, and their large intestines removed and longitudinally opened. Intestinal L-3 larvae were released and collected as previously described \[[@RSOB170031C80]\], and then counted under a stereomicroscope. MLN and PPs samples were also taken, and placed in RNAlater buffer for further cytokine measurement. Likewise, the ending tip of the caecum from each animal was removed and placed in a solution of 0.5% glutaraldehyde and 2.5% paraformaldehyde buffered at pH 7.4 for further immunohistochemical studies. 4.9.. Immunization schedule and follow-up {#s4i} ----------------------------------------- In this study, the immunization schedule was designed on the basis of the demonstrated susceptible phenotype of the AKR/OlaHsd mouse strain regarding *T. muris* infection, thus allowing the establishment of a chronic infection as reported above \[[@RSOB170031C78]\]. Our rationale was to check whether the predominant Th1 response elicited during the first three weeks of infection leading to susceptibility could be reversed to resistance by applying a recombinant vaccine throughout the chronic stage of the infection able to trigger a predominant Th2 response and thus leading to expulsion of the established mature worms. For this, on day 49 p.i. the animals received the first immunization dose. Three freeze-dried vaccines---bacterial walls (BW) and free rPP2A protein plus (BW) at equivalent amounts to those given separately to the corresponding groups and rPP2A coupled to a lipid OVS---were suspended in 1% carboxymethylcellulose to reach a concentration of 0.8 µg ml^−1^. Four micrograms of each preparation were administered to mice by nasal instillation of 5 µl of the antigenic suspension applied into the right nostril using a micropipette coupled to a special fine long tip. An additional infected control (IC) group was administered with PBS (0.25 M plus the 1% carboxymethylcellulose). Boosters were applied two weeks later to all groups in the same way as the first administration vaccine dose. To monitor the effectiveness of the vaccine, faecal egg counts were performed weekly by the Stoll method, from the day of the first vaccination until the day of killing the mice. Briefly, the faeces released by each animal temporary isolated for 8 h in an individual cage were collected and homogenized in 0.1% NaOH (4 g/60 ml 0.1 N NaOH rate). Six aliquot fractions of the suspended material were placed on glass slide, and eggs were counted under an optical microscope at 4× magnification. The results were expressed as the number of eggs/gram of faecal samples. Sixty-three days after the first vaccination all animals were killed and processed for adult intestinal-worm collection and counting, as well as for immunochemical studies. 4.10.. Isolation of mRNAs, synthesis of cDNAs and quantitative real-time PCR {#s4j} ---------------------------------------------------------------------------- Total RNA was isolated from MLN and PPs preserved in RNAlater, an RNA stabilization reagent (Qiagen-76104) using the RNeasy Midi kit (Qiagen-74106). Once the RNA was isolated, the sample was digested with RNase-Free DNase Set (Qiagen-79254), in order to remove DNA contamination. For mRNA isolation, the Oligotex mRNA Midi kit (Qiagen-70042) was used. The quality of the purified mRNA was measured in an Experion automated electrophoresis system (Bio-Rad, Nazareth Eke, Belgium). Subsequently, cDNA was generated with the iScript cDNA Synthesis kit (Bio-Rad, 170-8891) in a CFX96 real-time system (Bio-Rad). Thus, a 20 µL final volume reaction containing 4 µl of 5× iScript reaction mix, 1 µl de iScript reverse transcriptase, and an mRNA volume between 100 fg and 1 µg, was performed. The retrotranscription conditions were 5 min at 25°C, 30 min at 42°C, 5 min at 85°C at the end the sampling, and conditions were maintained at 12°C. The concentration and quality of the cDNA was calculated spectrophotometrically in a Nanodrop (Nanodrop ND-1000, Thermo Scientific). The cDNA was diluted 1 : 10 and preserved at −80°C until use. Quantitative real-time PCR was performed on a thermocycler (CFX96 Real-Time System, Bio-Rad) in combination with primers specifically designated using the eprimer3 software (<http://www.bioinformatics.nl/cgi-bin/emboss/eprimer3>) and shown in electronic supplementary material, table S1. The cDNA was quantified using SsofastTM Eva Green Supermix (Bio-Rad, 172-5201), with cDNA equivalent to 50 ng mRNA. The cycling conditions were as follows: 95°C for 2 min, followed by 40 cycles of 95°C for 10 s, 55°C for 30 s and 60°C for 30 s. When the amplification was completed the samples were kept at 12°C. The primer concentration was optimized and dissociation curves were generated for each primer set to verify the amplification of a single PCR product. Expression of β-actine RNA \[[@RSOB170031C81]--[@RSOB170031C83]\] was used to normalize the expression of other genes quantified according to the ΔCT method, in which the β- actin: Interleukin ratio = 2 CT β-actin − CT interleukin. All of the assays were done in triplicate. 4.11.. Immunohistochemistry of mouse tissues {#s4k} -------------------------------------------- For histological evaluation, the glutaldehyde/paraformaldehyde-fixed tissues were thawed in PBS at laboratory temperature under permanent automatic rotation of the sample tube. Then, the samples were trimmed and embedded in paraffin wax. Sections of 8--10 µm were affixed to slides. The paraffin was removed by three dips of 15 min in xylene and an alcohol series (100%, 90%, 70%), and one rinse in water \[[@RSOB170031C84]\]. After paraffin removal and hydration, the slides were prepared for antigen retrieval by heating at 120°C for 10 min in an autoclave with 0.01 M citric acid at pH 6.0 \[[@RSOB170031C85],[@RSOB170031C86]\]. After the unmasking treatment of the antigens, as a means to prevent the non-specific binding of the antibodies, a treatment was made for 30 min with PBS containing 1% of albumin from chicken egg white (Sigma, A5503). The slides were treated with different specific antibodies, as shown in electronic supplementary material, table S2, at a concentration of 1 : 50 for 1 h at room temperature. Finally, cell nuclei were stained with a dilution 1 : 100 of 4′,6-Diamidino-2-phenylindole dihydrochloride (DAPI) (Sigma, D9542) for 10 min. They were subsequently preserved and mounted in a mounting medium (Prolong Antifade Kit, Molecular Probes) and examined under a Leica DMI6000 confocal laser microscope equipped with a filter system for FITC (mean wavelength 530 nm, maximum 490 nm). Electronic supplementary material, table S2 shows the origin and labelled antibodies and reagents for the immunocytochemistry by confocal studies. 4.12.. Statistical analysis {#s4l} --------------------------- The Tukey--Kramer multiple-comparisons test was used to estimate the significance of the difference between means. The results are expressed as mean values (standard deviation of the different groups at different times for each experiment performed). *p* \< 0.001 was considered to be highly significant (\*\*\*), *p* \< 0.01 was considered moderately significant (\*\*) and *p* \< 0.05 was considered a low level of significance (\*). GraphPad I[nstat]{.smallcaps} v. 3.05 software (GraphPad Software, Inc., La Jolla, CA, USA) was used for the statistical analysis. Supplementary Material ====================== ###### Table S1 from Self-adjuvanting C18 Lipid Vinylsulfone-PP2A vaccine: study of the induced immunomodulation against Trichuris muris infection by M. Gomez-Samblas, JJ. García-Rodríguez, M Trelis, D. Bernal, FJ Lopez-Jaramillo, F Santoyo-Gonzalez, S. Vilchez, AM Espino, F. Bolás-Fernández, A. Osuna; Table S2 from Self-adjuvanting C18 Lipid Vinylsulfone-PP2A vaccine: study of the induced immunomodulation against Trichuris muris infection by M. Gomez-Samblas, JJ. García-Rodríguez, M Trelis, D. Bernal, FJ Lopez-Jaramillo, F Santoyo-Gonzalez, S. Vilchez, AM Espino, F. Bolás-Fernández, A. Osuna Ethics {#s5} ====== All animal studies conformed to current Spanish legislation for animal welfare. The Ethics Commission at Complutense University of Madrid approved this study. Data accessibility {#s6} ================== The datasets supporting this article have been uploaded as part of the electronic supplementary material. Competing interests {#s7} =================== We declare we have no competing interests. Funding {#s8} ======= No funding has been received for this article. [^1]: Electronic supplementary material is available online at <https://dx.doi.org/10.6084/m9.figshare.c.3723946>.
{ "pile_set_name": "PubMed Central" }
Numerical judgments by chimpanzees (Pan troglodytes) in a token economy. We presented four chimpanzees with a series of tasks that involved comparing two token sets or comparing a token set to a quantity of food. Selected tokens could be exchanged for food items on a one-to-one basis. Chimpanzees successfully selected the larger numerical set for comparisons of 1 to 5 items when both sets were visible and when sets were presented through one-by-one addition of tokens into two opaque containers. Two of four chimpanzees used the number of tokens and food items to guide responding in all conditions, rather than relying on token color, size, total amount, or duration of set presentation. These results demonstrate that judgments of simultaneous and sequential sets of stimuli are made by some chimpanzees on the basis of the numerousness of sets rather than other non-numerical dimensions. The tokens were treated as equivalent to food items on the basis of their numerousness, and the chimpanzees maximized reward by choosing the larger number of items in all situations.
{ "pile_set_name": "PubMed Abstracts" }
More info Mon - Sat 10:30am - 7:15pm Accessorize That Sari Saris are, not surprisingly, a popular souvenir among visitors to Hyderabad. But what some shoppers may not realize is that a sari without accessories is incomplete. At Color D Earth, local jewelry artisans can custom-design bracelets, necklaces, and other pieces to accessorize saris and other clothing. All of the objects at Color D Earth are earth-friendly, made of terra cotta, by artisans who participate in the co-op style business and are guaranteed a fair living wage.
{ "pile_set_name": "Pile-CC" }
Hand grip strength and incident ADL disability in elderly Mexican Americans over a seven-year period. Little is known about muscle strength as a predictor of disability among older Mexican Americans. The aim of this study was to examine the association between hand grip strength and 7-year incidence of ADL disability in older Mexican American men and women. A 7-year prospective cohort study of 2493 non-institutionalized Mexican American men and women aged 65 or older residing in five south-western states. Maximal hand grip strength test, body mass index, cognitive function, activities of daily living, self-reports of medical conditions (arthritis, diabetes, heart attack, stroke, cancer, hip fracture), and depressive symptoms were obtained. In a Cox proportional regression analysis, there was a linear relationship between hand grip strength at baseline and risk of incident ADL disability over a 7-year follow-up. Among non-disabled men at baseline, the hazard ratio of any new ADL limitation was 1.90 (95% CI 1.14-3.17) for those in the lowest quartile, when compared with men in the highest hand grip strength quartile, after controlling for age, marital status, medical conditions, high depressive symptoms, MMSE score, and BMI at baseline. Among non-disabled women at baseline, the hazard ratio of any new ADL limitation was 2.28 (95% CI 1.59-3.27) for those in the lowest quartile, when compared with women in the highest hand grip strength quartile. Hand grip strength is an independent predictor of ADL disability among older Mexican American men and women. The hand grip strength test is an easy, reliable, valid, inexpensive method of screening to identify older adults at risk of disability.
{ "pile_set_name": "PubMed Abstracts" }
EGG DONATION EGG DONATION It took several years for egg donation to become a widely-accepted method, but now it is a rather common solution for infertile couples to conceive a child. Egg donation, however, does pose several moral dilemmas. IVF with donor eggs is a fertility treatment that has been available since the mid 1980’s. Success rates with egg donation are high, particularly compared to pregnancy rates in women with poor egg quality and quantity. Research has also proven that the method has no adverse effect to the relationship between mother, father and child despite the lack of genetic link between mother and child. Donor egg IVF In many Western countries, the children are allowed – after adulthood – access to all data, including the identity of the donor of the egg. The latter is not permitted in Greece, unless there are health reasons, so the child can access the files but still anonymously. Donor egg IVF opens up a world of possibilities for women who have struggled to conceive: women with primary ovarian failure, menopausal, either naturally or as a result of surgery, radiation or chemotherapy, women that have undergone repeated failed attempts at IVF or with a genetic disorder which could be passed on to their child. Egg donation treatment involves fertilizing the donor eggs with sperm from the recipient’s partner and transferring the resulting embryos into the recipient’s womb. Egg donation in Greece At Medimall IVF Clinic, we are pleased to provide the procedure of egg donation, which is permitted in our country and is lawful under Greek law. Egg donation is anonymous, voluntary and free. The primary benefit to every woman who donates eggs should be the altruistic aspect of helping another person or couple achieve pregnancy. According to Greek law, egg donors should be between 18 and 35 years old, and are selected following strict medical screening. You can find all the information on the test donors are submitted to below. The age limit for women undergoing IVF treatment is 50 years old. Egg donation program Our egg donation program uses both fresh and frozen ova and the recipients have the opportunity to choose between the fresh and frozen oocytes. In addition, the selection of oocytes used takes into account the characteristics of the donor, so that they come from a woman with similar features. In case of fresh egg selection, you should consider that all information concerning donor characteristics and testing will be disclosed to you after the embryo transfer. Egg donation has proved to be very successful, either using fresh or frozen eggs, with success rates up to 75% for embryo transfers per treatment cycle, and up to 65% for clinical pregnancies. According to Greek law, up to two embryos can be transferred, whereas you will be informed about the number and quality of your embryos on the very day of embryo transfer. Our doctors and biologists will talk in detail with you and advise you on the number of embryos they believe should be transferred, in accordance with your medical history of previous IVF attempts and the possibility of a multiple pregnancy. You could also consult your gynecologist about the number of embryos he believes it would be best to transfer. All IVF candidates should be aware that the law allows for any remaining, good quality embryos that are not transferred, one of the following: To be frozen. Freezing time can be up to five years. During this period, the embryos can be used in one IVF cycle if the recipient has not yet become pregnant or the couple wants to have another child. The embryos can be destroyed. They can be donated to another couple. They can be donated to the fertility clinic for research. After 5 years, the couple not wishing to keep the embryos could select options number two, three or four. Practical information on egg donation at Medimall IVF Clinic Recipients participate in preliminary screening procedures, including review of gynecological records and transvaginal ultrasound. You can ask our doctors any questions you may have, and discuss with them all your queries. If you live abroad and it is not possible to visit our center, all the above-mentioned tests can be conducted by your personal gynecologist in conjunction with our center coordinator. We strongly recommend the semen analysis of your partner to be done in our clinic. Additionally, you will be asked by the doctors or our coordinator to fill out and send us all necessary consent forms, copies of identity or your passport, and any other legally required document. You are more than welcome to send us your photos in order to get to know your features. You would also specify the desired dates you wish to undergo the procedure. Bear in mind that you will need to be available for one week (from Monday morning to Saturday afternoon). We could then integrate you in our clinic’s IVF egg donation program. Your partner should also be available to provide semen sample at the clinic right before the IVF cycle. The frozen sperm is intended for exclusive use of his partner. In this case, you will need to be available for a period of four days, from Wednesday morning to Saturday afternoon. You will be asked to follow a specific treatment in order to prepare your uterus and your endometrium for embryo transfer. You will need to visit for two weeks after the beginning of the endometrial preparation. In the meantime, you will need to make all necessary preparations for your trip to Athens, your return home, as well as arrange for your stay in a hotel in Athens until the day the process is completed. Medimall IVF Clinic staff will provide you with a full and detailed plan once your treatment is set. It is important that all communication concerning the program is conducted through our doctors and/or our coordinator at ivf@medimall.gr and we will get back to you. Donor testing Complete blood analysis Cardiovascular examination Blood type Rhesus factor Hemoglobin electrophoresis Hepatitis B (HBsAg) Hepatitis C (HCV) HIV I-II (AIDS) RPR (syphilis) Karyotype test PCR for CTRF (85% of known mutations) (Cystic Fibrosis) PCR for 35 Delg relating to hereditary hearing loss Chlamydia (Urine) Psychological examination The recipient and the partner must be submitted to the following tests:
{ "pile_set_name": "Pile-CC" }
Notes on The Intersection: Tales of the Taj It took Shah Jahan 17 years to build the iconic Taj Mahal, a mausoleum for his wife Mumtaz, who died during childbirth in 1631. A structure known as the testament of true love for centuries has also been the cause of both pride and controversy in equal measure for India. If you walk around it, you will see that its four facades are identical, with vaulted arches and quotes from the Holy Quran inlaid onto the marble. This is because the Mughals considered symmetry symbolic of balance and harmony in their empire. But, as Dr. Dilip Ahuja proves through his research and tells us in the podcast, it’s not as perfect as it seems. So, was the iconic monument created with a single error on purpose? Or, did the artists and craftsmen make an honest mistake because of a lack of advanced scientific equipment? Did Shah Jahan know? The answers to these questions are hidden in the legends that surround the history of the building – some that tell of Shah Jahan cutting off the hands and gouging out the eyes of artists who built it and others of how he wanted to build a black version of the Taj Mahal for himself. A total of Rs 32 million (today’s equivalent of Rs 53 billion) was spent on constructing the Taj; it was made with makrana marble from Rajasthan, lapis lazuli from Central Asia and turquoise from Tibet, and it is said that 1,000 elephants were required to transfer these materials all the way from their homes to Agra. But, this luxury also put the Taj at risk once the Mughal Empire collapsed in the 18th century. The Jats (a Hindu community from North India), looted it in 1964 and stripped it of its two silver doors. British colonisers plundered it for the hand-woven carpets and precious gems, but Lord Curzon the viceroy of India from 1899 to 1905, ordered the restoration of the historical site and its gardens. He also gifted the Taj with a grand chandelier, which unfortunately, came crashing down in August 2015 and is currently being restored. Today, Agra has transformed from being a Mughal Capital to an economically advanced city, the industrialisation and resulting pollution leading to the yellowing of the Taj’s pristine white marble. The monument has since gotten a beauty treatment of sorts – workers applied Fuller’s Earth (yes, that pack of multani mitti in your fridge was good enough for the Taj too!) to its walls and washed it off after 24 hours, a process that helped restore its sheen. The Supreme Court of India has prohibited the construction of any building that might obscure the view of the Taj Mahal, so that we can enjoy its beauty from a distance, just like Shah Jahan did when he was imprisoned in Agra Fort, for years till he died. AUDIOMATIC Photographs of Aakar Patel by Biswajit Dey, of Vikram Doctor by Meenakshi Doctor, of Samanth and Padma by Padmaparna Ghosh, of Anuvab Pal and Kunaal Roy Kapur by Azhar Khan, and of abandoned swim-shorts by Genesia Alves. All other pics by Unsplash. Disclaimer The thoughts and opinions expressed here are those of the individual contributors and do not necessarily reflect the views of One By Two Media Pvt. Ltd. its directors, or staff
{ "pile_set_name": "Pile-CC" }
Q: White screen when I fetch data from MySQL on PHP into an Array I'm taking values from MySQL(PHPMyAdmin) to PHP and after that, I send them to an echo for taking those values on Ionic. I don't know why but when I add a specific value (Bio field from MySQL) inside the array and execute the .php file thows me a white screen. Here is my code: json-tecnico.php <?php require_once('connect.php'); $consulta = "SELECT idTecnico, nombre, apellido, cedula, genero, telefono, usuario, correo, ubicacion, bio, rate, catg.descripcion Categoria_Descripcion, subcat.descripcion Subcategoria_Descripcion FROM tecnico AS tec INNER JOIN categoria AS catg ON tec.categoria = catg.idCategoria INNER JOIN subcategoria AS subcat ON subcat.idCategoria = catg.idCategoria AND subcat.idSubcategoria = tec.subcategoria WHERE categoria = '".$_GET['categoria']."'"; if(isset($_GET['subcategoria'])){ $consulta = $consulta . " AND subcategoria = '".$_GET['subcategoria']."';"; } $resultado = mysqli_query($conexion, $consulta); while($columna = mysqli_fetch_assoc($resultado)){ $data[] = array( 'id' => $columna['idTecnico'], 'nombre' => $columna['nombre'], 'apellido' => $columna['apellido'], 'cedula' => $columna['cedula'], 'genero' => $columna['genero'], 'usuario' => $columna['usuario'], 'ubicacion' => $columna['ubicacion'], 'bio' => $columna['bio'], 'rate' => $columna['rate'], 'subcategoria' => $columna['Subcategoria_Descripcion'] ); } if(!empty($data)){ echo json_encode($data); } else{ $data[] = array( 'success' => 'No se encontro usuarios con el criterio de busqueda dado', 'workers' => false ); echo json_encode($data); } mysqli_close($conexion); ?> The white screen shows when I put the '007' value on $_GET['subcategoria'] and when I put the line 'bio' => $columna['bio']. On MySQL, bio is varchar(500). Why is this happening? A photo of the "tecnico" table on PHPmyAdmin A: Well, I already dig into the problem, just was an Encoding error. Using utf8_encode() on all the String variables solved my problem. You can use this if you're getting encoding problems: I got the Answer from here! function utf8ize($d) { if (is_array($d)) { foreach ($d as $k => $v) { $d[$k] = utf8ize($v); } } elseif (is_string ($d)) { return utf8_encode($d); } return $d; } and after that: echo json_encode(utf8ize($data));
{ "pile_set_name": "StackExchange" }
INTRODUCTION ============ In multiple sequence alignments, information emerges as to which residues positions are important to the nature of a protein family, versus which vary freely but could be assigned undue importance during the scoring of pairwise alignments. From these multiple alignments, profile hidden Markov Models (HMMs) are built. These probabilistic models allow exquisitely sensitive searches for proteins related by homology to the aligned sequences. The TIGRFAMs database is a collection of these HMMs constructed with the purpose of letting automated annotation pipelines attach specific functional annotations to proteins encoded by newly sequenced microbial genomes. The HMM search produces evidence, and the logic of the annotation software exploits the evidence. But the HMM evidence itself is persistent, and based on fixed cutoff scores for consistency from use to use, and may be put to additional purposes. Genome Properties is a collection of rules for interpreting evidence, most in the form of HMM hits, to make judgments about the likely presence or absence of complex biological traits in an organism according to whether or not its genome encodes the components necessary for that trait. The process of systems reconstruction in Genome Properties provides guidance for protein family construction in TIGRFAMs, so the two databases develop in concert. TIGRFAMs ======== TIGRFAMs as an annotation-driving database ------------------------------------------ Publications that report specific protein characterization data typically describe one or two proven examples of the protein in question but stop short of providing any rule for recognizing all examples from all organisms. Subsequent biocuration at either specialized or comprehensive value-added databases ties articles to sequences, attaches meaningful functional names, and adds feature tables (signal peptides, active sites, modified sites, etc.) and other searchable content such as EC numbers and GO terms. But for only limited numbers of protein families has this curation matured into tools sufficient to identify and annotate all functionally equivalent sequences. Most proteins belong to large superfamilies whose memberships are heterogeneous in function, complicating such efforts. The right granularity for dividing a superfamily into subgroups by function seems to differ from case to case, and no one set of heuristics always works. New tools are needed. TIGRFAMs is built to address this need by serving as an *annotation-driving database*, a library of protein family definitions that becomes a tool set used by automated genome analysis pipelines. Each TIGRFAM as a proxy for a curatorial expert in that protein family ---------------------------------------------------------------------- The *TIGRFAMs* database provides manually reviewed definitions of protein families with the following characteristics to make them useful for automated genome annotation, pathway reconstruction, creation of phylogenetic profiles and any number of other computationally driven studies. First, all annotation is traced to its original source without ever relying on transitive annotations from public sequence databases. Second, every protein is considered in the context of any related protein families that differ in function, if they exist, with examination of molecular phylogenetic trees. Third, only sequences that can be assigned with high confidence are selected as exemplars for the seed alignment. Multiple sequence alignments are examined for misalignments, inconsistent domain architecture, altered active or binding sites, faulty gene models, long branches in phylogenetic trees that may suggest neofunctionalization, etc. Biocuration during model construction includes review of local synteny, metabolic context and phenotypic data. Fourth, each model is searched against several protein databases, including the CharProtDB collection of explicitly characterized proteins ([@gks1234-B1]), sequences with known structures in PDB and NCBI's non-redundant protein sequence collection, which pulls annotation from multiple sources, including value-added databases such as UniProt and archives of sequences as originally submitted. Each completed HMM is intended to serve as a proxy for an expert curator, emulating expertise developed at the time of model construction but operating at BLAST-like speeds ([@gks1234-B2]). TIGRFAMs models describe the level of their specificity ------------------------------------------------------- Each entry in TIGRFAMs carries a designation that describes how the set of proteins in the family vary in function. If all members of a protein family perform the same function, the family is designated *equivalog*. We previously introduced the term '*equivalog*' to describe a relationship of conserved function among homologs ([@gks1234-B3]), noting that the term '*ortholog*' is doubly wrong since orthology does not imply conserved function and laterally transferred genes (*xenologs*) may be equivalogs. The isology type informs automated annotation pipelines which of two different HMMs that matches the same region of the same protein gets priority. Each TIGRFAMs *equivalog* model provides a high-precedence instruction to automated annotation pipelines to transfer the protein name, enzyme commission (EC) number if present, gene symbol and Gene Ontology (GO) terms to any protein whose match to the HMM meets the score cutoff. An *equivalog* model assigns more specific annotations than a *subfamily* model, which in turn outranks a *domain* model. The general principle is that models built with narrower scope tend to outrank models with broader scope where they hit the same proteins. In many cases, a *subfamily* model is created in TIGRFAMs, with deliberately generic annotation attached, to prevent automated annotation pipelines from propagating an overly specific annotation from a more distant homolog according to evidence of lower rank. TIGRFAMs content complements the Pfam collection by emphasizing protein function over domain architecture --------------------------------------------------------------------------------------------------------- The TIGRFAMs database is designed to be used in conjunction with other sources of annotation, especially Pfam ([@gks1234-B4]). Both databases contain HMMs built with and searchable by the same freely available software package HMMER3, developed by Eddy ([@gks1234-B2]). Pfam models frequently describe domains of homologous sequence that occur as finite regions within larger proteins and are shared across sets of proteins that range widely in function ([@gks1234-B4]). A single protein often has multiple Pfam domains. A TIGRFAMs *equivalog* model, by contrast, typically identifies fewer proteins, covers a larger fraction of total sequence length, and provides more specific annotation that should be given higher precedence by automated annotation pipelines. For example, Pfam model PF04055 describes the radical SAM domain, found in over 40 000 recognizable member sequences in public databases. Many of these have additional domains, for a wide variety of domain architectures and even wider array of functions, most of which remain unknown. TIGRFAMs describes over 100 functionally distinct protein families that share the radical SAM domain, including methyltransferases that modify structural RNAs, cofactor biosynthesis enzymes performing complex rearrangements, lipid metabolism enzymes, peptide maturases for natural products biosynthesis and enzyme activases. These models resolve many subgroups of the radical SAM superfamily by function in a way that the domain decomposition provided by Pfam cannot. New TIGRFAMs work avoids construction of models that duplicate the scope and extent of existing Pfam models, but it will include construction of domain or repeat models for homology regions that have never before been described. TIGRFAMs has grown by over 40% since the previous database update paper ([@gks1234-B5]), from 3000 to 4284 models. Most new models describe less common proteins, so coverage by TIGRFAMs for the average microbial genome has increased only about 20%. Overall coverage of microbial genomes is variable, averaging about 33%. [Table 1](#gks1234-T1){ref-type="table"} shows illustrative levels of coverage by TIGRFAMs for five bacterial and two archaeal genomes. The table distinguishes hits in aggregate by all TIGRFAMs models from hits just to equivalog-type HMM hits, where the HMM matches spans nearly the full protein length and members of that family should share just one function. As expected, TIGRFAMs identifies more proteins in absolute terms in larger genomes, but matches a greater percentage of proteins for species with smaller genomes or from more intensively studied lineages. The current release, 13.0 (July 2012), is the fourth release to use HMMER3 instead of HMMER2. A web server page kindly provided by Janelia Farm, <http://hmmer.janelia.org/search/hmmscan>, provides high-speed searching of HMM libraries ([@gks1234-B6]), with links provided to TIGRFAMs pages for models meet the criterion of scoring better than the trusted cutoff. The TIGRFAMs home pages do not provide searching, but instead provide a link to the Janelia Farm hmmscan page. Table 1.TIGRFAMs HMM hit coverage for five bacterial and two archaeal genomesSpeciesNo. of proteinsNo. of matched, (%)No. of equivalog-level, (%)*Mycoplasma genitalium* G-37473260 (55)220 (47)*Streptococcus sp.* SK1401856672 (36)489 (26)*Haemophilus parainfluenzae* HK2622001935 (47)730 (36)*Burkholderia mallei* ATCC 2334450311379 (27)1009 (20)*Fusobacterium necrophorum* ATCC 513572060680 (33)506 (25)*Methanocaldococcus jannaschii* DSM 26611783584 (33)462 (26)*Haloferax volcanii* DS24074699 (17)415 (10) A project goal is to make negative results from searches informative -------------------------------------------------------------------- The goal during construction of each TIGRFAMs entry is to create a HMM with cutoff scores calibrated to collect comprehensively the set of all proteins that merit the annotations provided with the model, with vanishingly few false-positives but also very few false-negatives (other than proteins left incomplete through sequencing or assembly errors). The advantage of few false negatives becomes clear during the analysis of complete genomes. If six key protein families represent six essential steps in some biochemical pathway, and the six corresponding TIGRFAMs entries all report no match during the analysis of a complete microbial genome, then the repeated absence of evidence for that cohort of genes becomes fairly strong evidence that the cohort is in fact absent. TIGRFAMs may be used through representations in other resources --------------------------------------------------------------- TIGRFAMs is incorporated into InterPro ([@gks1234-B7]), a hierarchical collection composed of entries from multiple databases of protein family signatures. InterPro distributes an integrated software package that performs searches for all member databases at once, including TIGRFAMs. Similarly, the Conserved Domain Database (CDD) ([@gks1234-B8]) incorporates TIGRFAMs models, so domain searches through NCBI may show corresponding matches. Note, however, that CDD first converts TIGRFAMs models from HMMER3 to RPS-BLAST models, so the calibration of cutoff scores usually is lost in favor of simpler heuristics. A CDD entry built from a TIGRFAMs model, e.g. CDD:188483 derived from TIGR03968 ('mycofactocin system transcriptional regulator'), may attach a region feature to many proteins that we were careful to exclude when our model was constructed. A region feature showing TIGRFAMs information through a database cross-reference (db_xref) to a CDD entry is showing sequence homology that may be useful know, but true membership in the TIGRFAMs family should be verified based on actual HMM search scores. TIGRFAMs web pages ------------------ Web pages for TIGRFAMs was provided originally through the Comprehensive Microbial Resource ([@gks1234-B9],[@gks1234-B10]), or CMR. TIGRFAMs switched to an independent home page at [www.jcvi.org/tigrfams](www.jcvi.org/tigrfams) during the conversion from using HMMER2 to using HMMER3. Legacy data for TIGRFAMs releases 9.0 and earlier, and Genome Properties results relying on HMMER2-generated data for over 550 genomes, remain accessible through the CMR. [Figure 1](#gks1234-F1){ref-type="fig"} provides an illustration of a summary page for a single TIGRFAMs entry, TIGR04071, representing a family of precursor peptides that are post-translationally modified to become methanobactin Mb-OB3b (a copper chelator analogous to iron-chelating siderophores) or another member of the Mb-OB3b class ([@gks1234-B11]). Figure 1.Example of a TIGRFAMs web page. The TIGRFAMs homepage and all its web pages have five links located on the left navigational sidebar. These go to the TIGRFAMs Home page itself, a glossary of key terms used in TIGRFAMs, a complete listing of all models (4284 in release 13.0), the TIGRFAMs FTP Site, and a page with links to additional resources, including rapid searching of a protein sequence against HMM libraries. The page shown in the figure is summary page for a single TIGRFAMs entry, the Mb-OB3b-class methanobactin precursor family TIGR04071. Each summary page provides details about a single TIGRFAM, including cutoffs, HMM length, references and any assigned GO terms. The summary page also displays links to Genome Properties, if any, associated with that HMM. Users can view and download the HMM seed alignment through the HMM Seed Alignment link found on the left-hand side of the HMM Summary page. The TIGRFAMs complete listing page (not shown) displays accessions and functional names for all models, as well as length, isology type and EC number. GENOME PROPERTIES ================= Providing high-level views of attributes inferred from genome sequences ----------------------------------------------------------------------- Genome Properties is a collection of definitions for the higher-level attributes that may be ascribed to a species when a sufficient set of molecular markers are detected in its genome, or else reported jointly absent ([@gks1234-B12]). If all enzymes listed as essential markers of biotin biosynthesis are detected (by HMMs in the TIGRFAMs database), then the Genome Property 'biotin biosynthesis' is set by rule to 'YES'. Assertions made by Genome Properties are useful to summarize high-level traits of species biology from genome analysis, to understand metabolic context while trying to understand the roles of other proteins from the same species, and for comparative genomics based on the whole biological processes rather than single genes. Genome Properties entries describe subsystems --------------------------------------------- The linkage between TIGRFAMs and Genome Properties is paralleled in a kindred effort, the SEED from the Fellowship for the Interpretation of Genomes (FIG) ([@gks1234-B13]). FIG selected the term 'subsystem' to describe the biological role in aggregate that a set of marker proteins working in concert enable. We support usage of that term, using 'subsystem' here to refer in general to any emergent property in species biology that is understood more clearly by viewing the collection of component genes together rather than separately. We use the term 'Genome Property' for any subsystem described as an entry in the Genome Properties database. Metabolic reconstruction is based on evidence rather than annotation -------------------------------------------------------------------- Many sequences in public protein sequence databases are annotated incorrectly as biotin synthase (EC 2.8.1.6), to give one example, through errors of transitive annotation, in part because biotin synthase was one of the first radical SAM superfamily ([@gks1234-B14]) members sequenced, characterized and named ([@gks1234-B15]). In fact, misannotations that attach overly specific functions are a particularly abundant class of error ([@gks1234-B16]). Any metabolic reconstruction system that takes annotations at face value runs a risk of going badly astray. Genome Properties follows a principle that whether or not some genome encodes a subsystem should be determined by evidence sufficient to drive annotation, not by pre-existing annotations of uncertain provenance. Following this principle means that creating a new Genome Property often necessitates building new entries for TIGRFAMs database of HMMs, or else confirming that existing models in either TIGRFAMs or Pfam behave suitably. Genome Properties emphasizes non-pathway subsystems --------------------------------------------------- Genome Properties includes simple biochemical pathways, of course, but describes many additional types of subsystem. When Genome Properties describes a subsystem whose core is an enzymatic pathway, it often represents non-enzymatic proteins such as transcriptional regulators and molecular chaperones as additional components. Computation of a Genome Property may depend on a protein, a feature within a protein (such as a sorting signal), or a genetic element that does not even code for a protein, such as an array of CRISPR repeats or the selenocysteine tRNA. It describes physical complexes such as transporters and flagella. It describes systems in which one protein acts upon another, including secretion systems, protein-sorting systems, and post-translational modification systems. Methanobactins are generating considerable interest because neither their diversity nor their biosynthesis is well understood yet ([@gks1234-B17]). The very small size of the only known class of precursor peptide has meant missed gene calls (at least initially) in every species so far with an example of the system, originally just *Azospirillum* sp. B510 and *Methylosinus trichosporium* OB3b ([@gks1234-B11]), but now including *Gluconacetobacter oboediens* 174Bp2, *Gluconacetobacter* sp. SXCC-1, *Tistrella mobilis* KA081020-065, *Pseudomonas extremaustralis* and *Methylocystis* sp. SC2. Model TIGR04071 for the methanobactin precursor family belongs to a Genome Property, GenProp0962, which explains that the gene should occur in the context of two other, larger molecular markers, members of families TIGR04159 and TIGR04160. These two companion proteins are much easier to find when prospecting in newly sequenced genomes for new examples of methanobactin-like natural products. The architecture of Genome Properties ------------------------------------- Each Genome Property is described completely by records in a series of tables stored in a relational database. The tables are now made available for downloading by ftp through the TIGRFAMs/Genome Properties web pages, at [ftp.jcvi.org/pub/data/TIGRFAMs/GEN_PROP](ftp.jcvi.org/pub/data/TIGRFAMs/GEN_PROP). The table structure and meanings of all fields are described in the release notes. The logic of the table structure is discussed below. Each Genome Property has a basic definition in the *prop_def* table that includes a name (e.g. 'urease'), a unique accession (e.g. 'GenProp0051'), a paragraph-long description, and some ancillary information. Because the first subsystems described in Genome Properties were simple enzymatic pathways, components are referred to in relational database tables as 'steps.' Thus, the components that belong to a given Genome Property are enumerated in the *prop_step* table. Note that one enzymatic activity, a single entity in the typical pathway definition, will be represented by multiple components if the enzyme is comprised of multiple subunits. A Genome Property is judged complete, and may be assigned the state 'YES', if every component listed as required is found. Nearly every Genome Property has two or more components, largely because the comparative genomics of subsystem reconstruction is often essential for creating and establishing trust in the protein family definitions that a Genome Property requires. Property definitions include genes that are not necessarily essential --------------------------------------------------------------------- Some protein families occur exclusively as part of some subsystem, yet comparative genomics shows they are not always present, and not required for all instances of the subsystem to operate (although they may be required in some cases). Such a protein may be listed as a part of the system by entry into the *prop_step* table, but is marked as non-essential, meaning not core to the definition of the Genome Property and not used to compute its completeness. A protein that is absolutely required, but for which no reliable detection tool is available, similarly must be marked as non-essential to prevent the scoring system from calling the subsystem incomplete. Models may be unavailable because an activity has not yet been matched to any sequence, or a single known sequence example is not easily extended into a whole protein family definition, or the role tends to be filled by members of different proteins in different species (as is common for phosphatases and aminotransferases), or the function may be hard to assign based on full-length homology rather than select specificity-determining residues (as seems to occur with transporters). Genome Properties allows multiple lines of evidence for each step ----------------------------------------------------------------- Genome Properties defines types of evidence that will be treated as sufficient to show that a required component is encoded within a genome. In most cases, the evidence is a TIGRFAMs or Pfam HMM that scores above the model's cutoffs to some protein. Trusted cutoffs are used rather than gathering thresholds (these differ only for Pfam). For a given canonical protein function (e.g. glutamate--cysteine ligase, EC 6.3.2.2), several different known families may be known, and assignment to any one of these may constitute evidence. Thus, a separate linking table, *step_ev_link*, defines what evidence is sufficient to satisfy a step. In some cases, Genome Properties requires that there be at least one member encoded in a genome of some family of proteins, without implying that all members found from that family necessarily participate in the Genome Property in question. However, recording sets of such proteins during evaluations of Genome Properties across large numbers of genomes, and distinguishing those found in genomes encoding the other candidate markers from the rest supports data mining approaches that may lead to the construction of new protein families. Genome Properties allows an evidence type designated HMM-CLUST, meaning that a protein must be a member of the designated protein family but also within 3000 base pairs of another marker of the same system. The HMM-CLUST method may identify, for example, members of the radical SAM domain family (PF04055 in Pfam) found in close proximity to a precursor gene for post-translationally modified peptide. This co-clustering may mark a subfamily or equivalog group within radical SAM, which can then be ascribed a role in peptide modification. Such approaches let Genome Properties computation support both protein family development and discovery of new types of subsystems. Thresholds ---------- In the ideal case, a Genome Property has complete evidence, or no evidence, in nearly every genome. If most components are found, but not all, the YES-leaning state 'some evidence' may be assigned. But some proteins can play a role in any of several different properties. Finding such a marker, but no other, for a given property in question does not suggest the property is actually present. The enzyme selenide, water dikinase (SelD, TIGRFAMs entry TIGR00476), for example, is essential to at least three traits ([@gks1234-B18]): selenocysteine incorporation (GenProp0016), the selenouridine tRNA modification (GenProp0692) and post-translational activation of selenium-dependent molybdenum hydroxylases (GenProp0726). For any one of these systems, finding SelD only is very weak evidence. Similarly, a Genome Property may rely in part on an HMM that was available (perhaps from Pfam) but that hits a number of homologs beyond the set that actually carry the function of interest. Absence of any member of that family from a genome would be informative, so it is useful to require a hit as an additional constraint for recognizing a subsystem to be present. But finding a member of that family as the only evidence would be very weak evidence the entire subsystem is encoded. For these reasons, each Genome Property has a threshold value. If the number of components found does not exceed the threshold, evidence that the Genome Property on the whole is encoded by a genome should be considered weak, and the state 'not supported' will be assigned instead of 'some evidence.' Genome Properties is hierarchical --------------------------------- A component required for a Genome Property to be complete may itself be a Genome Property. Urea utilization (GenProp0814), for example, consists of a urea uptake system and a urea degradation pathway. For urea degradation, either of two pathways is sufficient, urease (GenProp0051) or the urea carboxylase/allophanate hydrolase pathway (GenProp0481). Whichever of the two is the more complete is used to score the urea utilization property. Genome Properties and TIGRFAMs usually are constructed in concert ----------------------------------------------------------------- Where a set of proteins cooperate to form an enzymatic pathway, or some other type of subsystem with a fixed set of required components, each successfully completed protein family definition gives contextual clues that help identify trusted exemplars for the remaining protein families. Some protein families are straightforward to construct because essentially every detectable homolog appears to perform the identical function. The very clear boundaries to such families provide information that can guide construction of additional protein families. It appears, for example, that every detectable homolog of the first described PqqA, a peptide whose role is to serve as the precursor of pyrroloquinoline quinone (PQQ), likewise serves as a PQQ precursor peptide. In contrast to PqqA, the PQQ biosynthesis enzyme PqqE belongs to radical SAM, a family so abundant that 1 genome may encode over 30 members, each different in function. Correctly separating all true PqqE from their functionally distinct homologs would be difficult except that the PqqA model (TIGR02107) assured that the PqqE model (TIGR02109) would be constructed with no false-positives among its seed members. The PqqE model, in turn, identifies all PQQ biosynthesis systems where the small (∼23 amino acid) PqqA peptide was missed because of faulty gene calling. Genome Properties made available for the current release, designated 3.0, number 628, a marked expansion over the ∼200 Genome Properties released at the time of the last published database description. The current total includes new subsystem definitions plus previously unreleased ones likely to benefit from additional development. GENOME PROPERTIES WEB PAGES =========================== Like TIGRFAMs, Genome Properties was originally hosted through the CMR ([@gks1234-B9],[@gks1234-B10]). At last update, the CMR contained over 500 microbial genomes. Genomes in the CMR show results from evaluating Genome Properties as implemented based on HMMER2 models, using TIGRFAMs models up through release 9.0. Genome Properties is now hosted independently of the CMR. A sample page, describing Genome Property GenProp0962 ('methanobactin biosynthesis, Mb-OB3b family'), is shown in [Figure 2](#gks1234-F2){ref-type="fig"}. The new Genome Properties pages provide a link to the legacy version of Genome Properties in the CMR, giving access to computed Genome Properties results in a comparative genomics browser environment. Figure 2.Example of a Genome Properties Definition Page. The Genome Properties home page provides three links on the left navigation sidebar: Genome Properties List, Top Level Genome Properties and Search CMR Genome Properties. The Genome Properties List shows all current Genome Properties along with their property type and property name. Clicking on a Genome Property will display the Genome Property Definition page. The Definition Page for GenProp0962 ('methanobactin biosynthesis, Mb-OB3b family') is illustrated. The Genome Property Definition page displays the property's name, description, parent/child/sibling properties, literature references and associated GO terms. The components of the property are listed with the step names, and whether or not the step is required (used to evaluate completeness). The evidence required to detect that a component has been found is described, usually the accession of a TIGRFAMs HMM with a working link to HMM Summary Page. Users can browse through the Genome Properties through the Top Level Genome Properties page linked on the home page. Users traverse through the properties by first selecting a top level property (e.g. Metabolism, Taxonomy). Associated parent, child and sibling properties are displayed for selection. The Search CMR Properties link directs users to the CMR genome property search. SPECIAL FOCUS AREAS FOR TIGRFAMS AND GENOME PROPERTIES ====================================================== TIGRFAMs focuses heavily, and Genome Properties almost exclusively, on subsystems encoded in bacterial and archaeal genomes. Successful construction of a TIGRFAMs equivalog-level model defines a molecular marker, and makes it possible to evaluate the presence/absence of that marker across the set of all complete microbial genomes. The result, a truth table of 1's and 0's for a large number of genomes, comprises a phylogenetic profile ([@gks1234-B19]). The profile serves as input to the Partial Phylogenetic Profiling algorithm ([@gks1234-B20]), which performs data mining to find (and guide construction of new HMMs for) additional protein families that belong to the same subsystem, even if the families in question have never before been defined and fall within large superfamilies. New models contribute to improved Genome Property definitions, more accurate comparative genomics, and iteratively improved descriptions of subsystems biology. Prokaryotic protein-sorting systems is an area of special focus for TIGRFAMs and Genome Properties, containing 37 such properties. Seventeen of these, including one involving a rhomboid family intramembrane serine protease ([@gks1234-B21]), one featuring a sorting signal unique to the deltaProteobacteria ([@gks1234-B22]), and all subclasses of exosortase-based and archaeosortase-based sorting/processing systems ([@gks1234-B23]), represent discoveries made via TIGRFAMs/Genome Properties development. TIGRFAMs and Genome Properties created the original nomenclature for CRISPR subtypes, defining eight variants (Ecoli, Dvulg, Ypest, Hmari, Tneap, Nmeni, Mtube and the RAMP module) ([@gks1234-B24]). More recently, a reanalysis using sensitive detection methods demonstrated remote homologies that grouped CRISPR systems into type I (where Ecoli is type I-E, Ypest is type I-F, etc), type II and type III ([@gks1234-B25]). Most existing TIGRFAMs models for CRISPR-associated protein families now show multilevel naming that reflects both schemes. Since our original report of the first eight subtypes, we have detected conserved architectures for additional CRISPR subtypes, and described them through TIGRFAMs and Genome Properties. These include the Aferr subtype (GenProp0670, the unique CRISPR system in *Acidithiobacillus ferrooxidans* ATCC 23270), the Pging subtype (GenProp0768, named after *Porphyromonas gingivalis* W83), the Myxan subtype (GenProp0922, named after *Myxococcus xanthus*), and the PreFran subtype (GenProp1061, named for genera *Prevotella and Francisella*). Lastly, development of these databases has introduced many Genome Properties in which a subfamily of radical SAM represents a key marker, and many examples of natural product biosynthesis systems in which a ribosomally translated precursor from a novel protein family is post-translationally modified. These classes overlap heavily for radical SAM proteins with a C-terminal SPASM domain (TIGR04085), where the acronym SPASM signifies roles in the maturation of Subtilosin, PQQ, Anaerobic Sulfatases and Mycofactocin ([@gks1234-B26]). CONCLUSION ========== TIGRFAMs and Genome Properties continue to be developed, in parallel, as annotation-driving databases for microbial genome analysis. Context provided by Genome Properties gives feedback for the process of making the fixed cutoffs of each HMM in TIGRFAMs as accurate as possible. The intended result is that classification of proteins into families with identified functions provides a trustworthy basis for many types of subsequent analysis. The most immediate of these is whether or not some genome in question encodes the necessary sets of components for each of over 600 different subsystems. AVAILABILITY ============ TIGRFAMs resources and Genome Properties resources are available through home pages at <http://www.jcvi.org/cgi-bin/tigrfams/index.cgi> and <http://www.jcvi.org/cgi-bin/genome-properties/index.cgi>, respectively. FUNDING ======= This project has been funded in whole or part with federal funds from the National Human Genome Research Institute \[R01 HG004881\] and from the National Institute of Allergy and Infectious Diseases, National Institutes of Health, Department of Health and Human Services \[N01-AI30071, HHSN272200900007C\]. Funding for open access charge: National Institute of Allergy and Infectious Diseases, National Institutes of Health, Department of Health and Human Services under contract numbers N01-AI30071 and/or HHSN272200900007C. *Conflict of interest statement*. None declared. [^1]: Present address: Malay K. Basu, Informatics, Department of Pathology, University of Alabama at Birmingham, 619 19th St. South WP220D, Birmingham, AL 35249, USA.
{ "pile_set_name": "PubMed Central" }
Hipódromo Camarero Hipódromo Camarero, formerly known as El Nuevo Comandante, is a horse racing building located in Canóvanas, Puerto Rico, to the east of San Juan and Carolina. It is about a fifteen-minute drive from Carolina's Luis Muñoz Marín International Airport, and 25 minutes east from the Isla Verde hotel area. The new administration of Camarero Race Track Corporation start operations on January 5, 2007. El Nuevo Comandante was built in 1976,and opened on October 31, 1976, to substitute the original "El Comandante" building, which had been located in Carolina, from January 1957 to mid October 1976. It has become arguably the most important horse racing complex in the island, holding horse races every Monday, Wednesday, Friday, Saturday and Sunday. El Nuevo Comandante features a betting window, in which players can try their luck at different games, such as "El Pool Pote" and others. The top award a player can win at El Nuevo Comandante is the "Pool Pote" (Pool Pot) and it reached a staggering 12 Million dollars and has been the largest pot ever won in Puerto Rico's Horse Racing Industry. In addition to the betting windows at El Nuevo Comandante, the Industry has a link of betting agencies throughout Puerto Rico. These are called "agencias hipicas", and people can go there to place bets as well and enjoy local refreshments and snacks. Races at "El Nuevo Comandante" have been shown on local television and Les Oraliens on radio since the building was inaugurated. Some of the most famous television sportscasters in Puerto Rican history have commented from there, including Norman H. Davila and Manolo Rivera Morales. Some famous jockeys have run there too, including Hall of Famer Angel Cordero, John Velazquez and J.C. Diaz. Famous horses imported to run at El Nuevo Comandante have been: Kentucky Derby and Belmont Stakes winner Bold Forbes, Santa Anita Derby winner Mister Frisky, Bandit Bomber and Dawn Glory (Stakes winner in USA). Among the native horses: Hurly Road (Triple Crown winner), Ribot's Verset (one of the best sires in Puerto Rican history), My favorite Place (Multiple allowance winner in California) Capa Prieto (undefeated for years), Camarero (Holds a record of 56 consecutive wins in a row), Vuelve Candy B (Triple Crown and Caribbean Derby winner and the only horse to earn a million dollars in Puerto Rico), Verset Dancer (Caribbean Derby winner and winner in USA) and Verset's Jet (son of Verset Dancer) who's the first horse to complete the Caribbean Derby and Confraternidad Stakes double. El Nuevo Comandante also has the infamous distinction (Guinness record) of having the horse with the most consecutive losses (Dona Chepa) with 134 consecutive loses (through 11/2/08 without a win) El Nuevo Comandante is also the site where the most famous race in the Caribbean has been held for 32 years: The Clasico del Caribe is celebrated there yearly, with horses participating from Colombia, Venezuela, Dominican Republic, Mexico, Panama, Trinidad and Tobago, Jamaica and Puerto Rico, among other countries. External links Official website (El Nuevo Comandante information is available here in Spanish) Category:1976 establishments in Puerto Rico Category:Canóvanas, Puerto Rico Category:Horse racing venues in Puerto Rico Category:Sports venues completed in 1976
{ "pile_set_name": "Wikipedia (en)" }
Noel Comia Jr. Noel M. Comia Jr. (born May 29, 2004) is a Filipino actor, commercial model, singer, TV events host, and voice talent who won Cinemalaya's Best Actor Award 2017 for movie Kiko Boksingero (the youngest of which to do so) and joined as a contestant in the third season of The Voice Kids under Team Lea with his coach Lea Salonga. Prior to his appearance on The Voice Kids, this multi-talented child actor has appeared in numerous theater productions and TV commercials. He is dubbed as the 'wonderboy' as he is excellent not just in the field of performing arts, but in the field of music as well, as he can play several musical instruments. Personal life Noel Comia Jr. is born to Filipino businessman and TV/Commercial/Movie Talent, Noel C. Comia and employee, Elisa M. Comia. At the humble age of 6, his parents took notice of his musical talents as he belted out songs on their karaoke machine, and playing harmonies on several musical instruments. His parents then decided to take him to music and theater acting workshops to further develop his talent for music and acting. In 2011, at the age of 6, Noel Jr attended his very first musical theater class in 'Kids Acts Philippines' (KAPI) TheCampArt Performing School, which is a professional children's theater company in the Philippines. There, he was trained as a scholar and has been a student and actor of the theater company ever since. Career Noel Jr. began his career in musical theater and commercial modeling, first appearing as the lead role in a television commercial for a popular powdered milk brand. At 7 years old (2011), he was cast as a member of the ensemble for KAPI's theater production of the popular childhood fairytale, "Hansel and Gretel". This experience fueled his passion for theater and acting, and since then, he has performed in more than 20 theater productions. On top of theater performance and modeling, Noel Comia Jr. is also a talented singer, and was a part of The Voice Kids (Philippines season 3). He was one of Team Lea's top 8 artists, and was able to advance to the sing-offs. In March 2017, Noel Jr., together with his fellow The Voice Kids alum and label mate Elha Nympha, released a cover duet of John Legend and Ariana Grande's "Beauty and the Beast" produced by MCA Music Inc. In August 2017, he released a cover of "The Show" by Lenka. at the age of 12, Noel Jr. was awarded the Best Actor Award at the Cinemalaya 2017 for his performance in the independent Filipino film Kiko Boksingero. He is currently the youngest person to receive the award. He was casted as "Jeremy Potts" in the Manila production of Ian Fleming's "Chitty Chitty Bang Bang" at the Newport Performing Arts Theater in Resorts World Manila which opened October 27, 2017. In 2018, he participated in the second season of Your Face Sounds Familiar Kids. Filmography Television Appearances Movies/Short Films/Indie Films TV Commercials/Online Ads/Print Ads Music Videos Stage credits Discography Singles Accolades References External links Category:2004 births Category:Living people Category:The Voice Kids (Philippine TV series) contestants Category:Filipino male child actors Category:Filipino child singers Category:Filipino male singers Category:21st-century Filipino singers Category:21st-century male singers
{ "pile_set_name": "Wikipedia (en)" }
Q: change route in scroll reactjs I have a question, but I do not even know how to solve it, I'm looking for if I scroll down, show me the following routes and scroll up to show me the previous routes I hope some guide class Routes extends Component { render() { return ( <Router history={browserHistory}> <Route path='/' component={HomeLayout}> <IndexRoute component={HomeComponent} /> </Route> <Route path='aps' component={AppServiceLayout}> <IndexRoute /> </Route> <Route path='portfolio' component={portfolioLayout}> <IndexRoute /> </Route> <Route path='about_us' component={aboutUsLayout}> <IndexRoute /> </Route> <Route path='*' component={HomeLayout}> <IndexRoute component={NotFoundComponent} /> </Route> </Router> ); } } A: There's an onScroll event that you can use as a trigger, here's a post on how to determine whether they scrolled up or down: How can I determine the direction of a jQuery scroll event? And here's a link on how to programatically change the React Route: Programmatically navigate using react router So when they scroll, check whether it's up or down, then push the next/previous route accordingly. I dunno if there's anything built in to just get the route immediately before/after a certain route, so you may just need a list of them somewhere as reference
{ "pile_set_name": "StackExchange" }
Good subject lines on dating sites If you love TS, TG or TV good subject lines on dating sites is your site in order to find. What do single men over 60 want. For women who have been trying to find that illusive special someone for a while, this may seem like an colorado dating sites free question to. Muslims4Marriage. com is the 1 Muslim Marriage, Muslim Dating, Muslim Singles and Muslim Matrimonial website. Our goal is to help Muslims around the world find love. 10 Things You Must Know About Dating Adting Girls. Note: God honoring dating relationship article 10 Things You Must Know Good subject lines on dating sites Dating Korean Girls was meant to be for fun. Kay one dating sendung transe Lads is a renowned gay and bisexual chat and dating zites for men. Find new friends and dates in your area. We have over a million members. Jelena, Explained: A Detailed History of Selena Gomez and Justin Biebers On-Again, Off-Again Relationship The Secret World of Sugar Babies. More college-age women than ever are taking to the web to find sugar daddies who'll pay for tuition, trips, and designer bags…but. good subject lines on dating sites Tim ban bon phuong, Tim ban gai, Tim ban trai, Tim nguoi yeu, t236;m một nửa kia để gi227; từ đời độc th226;n. Hẹn h242; v224; l224;m quen với bạn b232; tại. Delhi (Hindi: दिल्ली, Urdu: دلّی, Punjabi: ਦਿੱਲੀ) [http:delhigovt. nic. in] is India's capital city and the home of executive, legislative. Your adult guide for philadelphia escorts. Find the best escorts in philadelphia, female models, independent escorts and adult services with photos. Post ads with up. Dating and relationships issues between younger men and older women. Our reviews help you find the sites that give the best sex hookups with the hottest ladies. We'll also show you how to avoid scams and fake hookup dating sites. The legacy we leave to our future generations. Let's be the change and make job dating apprentissage world a better place. Relationships The Dos and Good subject lines on dating sites of Online Dating We asked real women to weigh in no profile pic on dating site the world of cyber courtship, so you can avoid … The most daunting best dating site in saskatchewan about online dating how can you tell if your hookup likes you from, you know, talking to new people) is putting together a profile-yet good subject lines on dating sites the one of the most important. Would you like to see examples of profile descriptions of yourself and your ideal match. Here are some sample profile descriptions along with good subject lines on dating sites analysis of their. The remark exchange phone numbers online dating park Ann. This site is falkirk dating sweet. I've met a lot of cool people on here. All the rooms are pretty awesome as well. Jessica Onlinedating of internetdating is het online good subject lines on dating sites van contacten via een pc, smartphone, tablet e. met als doel een man of vrouw te ontmoeten voor een date. London, situated in south-eastern England at the head of the River Thames estuary, is the largest urban area and capital of England and the United Kingdom. Lando Fiorini. E' morto Lando Fiorini, ultima grande voce della canzone romanaMorto Lando Fiorini, aveva 79 anni Lutto nel mondo di musica e teatro AARP's Family Caregiving offers the expert advice, support and resources you need when taking care of a senior parent or other loved one The AskMen Acquire team thoroughly researches amp; reviews the best gear, services and staples for life. Whether you're single, divorced, a widower or in an open or. Disclaimer: The links and mentions on this site may be affiliate links. Married Secrets, a Free Online Married Dating Site designed specifically for people looking for married personals. Whether it's a passionate or romantic relationship. Dating is a stage of romantic relationships in humans whereby two people meet socially with the aim of each assessing the other's suitability as a prospective partner. Apr 18, 2016nbsp;0183;32;How to Safely Meet a Person You Met Online. Meeting people online is fairly common, and often works out just fine for everyone involved. Still, there are. The Philippines, being a country archipelago of islands and atlanta dating ideas, have naturally wonderful beaches, some of linea are famous the world over. Beaches like Puerto. Situations like this one influenced my decision to develop my own six-month rule. If I am spending a lot of time around a man and we are playing couple without. download imo for windows 8. linnes pc or laptop. Imo is video call and text chat app for free. like whatsapp and facebook messenger. imo it takes 2 dating site video calls and text Halo 4 is a first-person shooter video game developed by 343 Industries and published by Good subject lines on dating sites Studios for the Xbox 360 video game console. The subjcet video game. Best Mobile App Developers in South Africa, Good subject lines on dating sites (JHB - RSA). The best Mobile Application Development company in Africa. Voted best Mobile App Developers. ios. 169; 2017 Contenko - Home good subject lines on dating sites About - Contact - Privacy - Terms. Want to know which are the best Asian dating sites for 2017. Lihes you hookup partner a Western or Asian man looking for love, Asian dating sites offer a convenient way See experts' picks for the quot;10 Best Dating Sites of 2017. Good subject lines on dating sites To power your motorcycle, you're going to need a motor. But what type, what size, and where do you get it from. This project used a Briggs amp; Stratton Etek. A comparison of the top best adult dating sites online, including dating reviews, coupons and more Apr 06, 2006nbsp;0183;32;The Lost Gospel of Judas Iscariot. Researchers say they have discovered the only known copy of the Gospel of Judas… Update - March 30, 2016 - new dates for Homo floresiensis. Digs and geological dating in Liang Bua Cave, Indonesia, show that Homo floresiensis, nicknamed the. Llewellin SettersFrequently Asked Questions (FAQs) Q: What is a Llewellin Setter?Its a very specific, pure strain of English Setter with bloodlines. White hillibies gang bang black girls. Ebony Bukakke from the Dogfart Network. We provide excellent essay writing service 247. Enjoy proficient essay writing and custom writing services provided by professional academic writers. Justin Bieber and Selena Gomez, who have been spotted together on multiple occasions this fall, are reportedly back together. Dating is a stage of romantic relationships in ssubject whereby two people meet socially with the good subject lines on dating sites of each assessing the other's suitability as a prospective matchmaking 25 januari. Jan subjecct, 2016nbsp;0183;32;quot;SO you're telling me. you guys started dating from an APP?!quot; Yep. 2016. It's a thing. Embrace it good subject lines on dating sites let me help you along the way. Tell me what good subject lines on dating sites. Escape Models VIP, is a leading Boutique High Good subject lines on dating sites Prestigious Courtesan Dating Dafing in New Good subject lines on dating sites and beyond. This is where when only speed dating ahorcado feliz best will do, we will dating sites register. Dating a Widower Realistically, it takes special effort by gpod parties to develop a bond after datnig spouse has died. So dont give up immediately. Where to meet best places to hook up in kansas city online: Our test of the 16 biggest online dating sites reveals the best (and worst) places for meting girls using internet yg family no dating. Anno Mundi (Latin for quot;in the year of the worldquot;; Hebrew: לבריאת העולםonline dating sites perth the creation of the worldquot;), abbreviated as AM or A.or Year After. Get reliable, low-cost dial-up Internet service, high-speed broadband Internet access, Web hosting amp; more. Connect with us for savings, support amp; satisfaction. Complete New York NY NYC nightlife and entertainment guide for New York NY NYC clubs, bars, lounges, New Years Eve tickets and event listings in New York NY NYC Hamiota, Manitoba, Canada. News Weather Sports Science Shareware Technology Freeware Radio Movies Agriculture Government Tickets Health Banking and Inv I have looked through my dating site now and again this sad picture. From each 10 new men who registered on the site, only one has written a first letter to women or. 100 Free Toyboy Dating, Older Women Dating Websites, sugar mama dating, meet older women, older women looking for younger men, sugar mamma dating Artisteer - web design generator for Joomla templates, Wordpress themes, Drupal themes, Blogger templates and DNN skins Historical Backdrop Employees Covered by 13th Month Pay Law Rank and File Employees Meaning Amount of 13th Month Pay Time of Payment of 13th Month Pay … Mature Dating for Over 50s Singles in SingleOver50. org.
{ "pile_set_name": "Pile-CC" }
Latest news Faith is back in Mirror's Edge Catalyst but in an origin story as we learn how she became involved in fighting corporate tyranny, which has a stranglehold on the city. It's coming out February 23rd for PC and console. It's a giant open world city 'with no levels to load' and it's packed for off story missions, time trials and other environmental challenges. The E3 trailer includes glimpses of gameplay. This year's conference from EA is going to be dominated by one thing: Star Wars: Battlefront. The Press Conference will begin 1.00pm PDT / 9.00pm GMT+1 and run for about an hour. There's a bit to get through. Tomb Raider and Mirror's Edge scribe Rhianna Pratchett has said her father, Discworld series author Terry Pratchett, has been approached "now and again" for more Discworld adventures but he's "waiting to be impressed". No development studio has come in and wowed him yet, as Rhianna's father is a "gamer himself so he has an idea what he'd like to see," she said; unsure if she'd take over. Shot in Cambridge, building scrambler parkour veteran Neil Cointet runs, leaps and climbs dressed as Faith from DICE's Mirror's Edge. It's all recorded from a first-person perspective just like in the game. Parkour specialists Ampisound are "massive fans" of Mirror's Edge and wanted a tribute to the DICE IP. They "got some plans for a second one" if this one does well.
{ "pile_set_name": "Pile-CC" }
The Latest: Gibraltar police detain 2 more from Iran tanker The Iranian flag waves outside of the UN building that hosts the International Atomic Energy Agency, IAEA, office inside in Vienna, Austria, Wednesday, July 10, 2019. (AP Photo/Ronald Zak) This is an archived article and the information in the article may be outdated. Please look at the time stamp on the story to see when it was last updated. TEHRAN, Iran (AP) — The Latest on the tensions between the United States and Iran (all times local): 6:10 p.m. Police in Gibraltar say they have arrested the two second mates of an Iranian supertanker seized last week by the British navy on suspicion of carrying Tehran’s oil to Syria. Police in the British overseas territory on the southern tip of Spain say Friday the two men are in custody and assisting police with their inquiries. A statement says the investigation is continuing and the Panama-flagged tanker remains detained. The vessel’s captain and chief officer were arrested Thursday. All four arrested men are Indian. The ship is suspected of breaching European Union sanctions on Syrian President Bashar Assad’s government. It was intercepted by British Royal Marines last week ___ 5 p.m. Britain’s foreign secretary is calling for calm amid rising tensions over shipping in the Persian Gulf, saying the UK does not want a conflict with Iran. Jeremy Hunt said Friday that “this is a time for cool heads” to make sure there is no “unintended escalation.” Tensions have risen after Gibraltar, a British overseas territory, seized an Iranian oil tanker last week. The vessel was allegedly carrying Tehran’s oil to Syria in breach of EU sanctions.Earlier this week, the UK Royal Navy said it stopped Iranian paramilitary vessels from disrupting the passage of a British oil tanker through a critical shipping lane near the Persian Gulf. Hunt said that London has given “a measured and careful” response to the situation. “We are being clear to Iran that we are not seeking to escalate this situation,” he said. ___ 4:00 p.m. British media are reporting that the UK will send a second warship to Persian Gulf. Both Sky News and the BBC reported Friday that the HMS Duncan, a Type 45 Destroyer, will sail to the gulf after taking part in NATO exercises in the Black Sea. It is said to arrive in a few days. The Ministry of Defense declined to comment. The Duncan had already been scheduled to go to the region, but the deployment is being moved forward a few days amid the deepening crisis with Iran. Duncan will operate alongside the Royal Navy frigate HMS Montrose and American forces. ___ 3:35 p.m. China says it opposes unilateral sanctions against Iran and criticized what it describes as the “long arm jurisdiction” of the United States. A Foreign Ministry spokesman in Beijing said that international trade with Iran “within the framework of international law is reasonable and legitimate and deserves to be respected and protected.” China is one of the world powers that signed the 2015 Iran nuclear deal, which has been unraveling since President Donald Trump withdrew from it over a year ago. ___ 3:15 p.m. The head of Gibraltar’s government says an Iranian supertanker seized last week by the British navy on suspicion of carrying Tehran’s oil to Syria was loaded with 2.1 million barrels of light crude oil. Chief Minister Fabian Picardo told the parliament of Gibraltar, a British overseas territory, in a statement Friday that anyone who has a claim to the vessel and its cargo can file its claim in court. The ship was intercepted by British Royal Marines off the southern tip of Spain on July 4. Iran’s state-run IRNA news agency at the time called the incident “an illegal seizure of an Iranian oil tanker.” A senior Spanish official said the operation was requested by the United States, but Picardo says no other government asked Gibraltar to act. He says the ship is suspected of breaching European Union sanctions on Syrian President Bashar Assad’s government. ___ 2:00 p.m. Iran is demanding the British navy release an oil tanker seized last week off Gibraltar, accusing London of playing a “dangerous game.” Friday’s comments from the Iranian Foreign Ministry come a day after police in Gibraltar, a British overseas territory on the southern tip of Spain, said they arrested the captain and chief officer of the supertanker suspected of breaching European Union sanctions by carrying a shipment of Iranian crude oil to Syria. Foreign Ministry spokesman Abbas Mousavi told Iranian state news agency IRNA that “the legal pretexts for the capture are not valid … the release of the tanker is in all countries’ interest.” The tanker’s interception on July 4 has stoked already high tensions in the region. Copyright 2020 The Associated Press. All rights reserved. This material may not be published, broadcast, rewritten or redistributed.
{ "pile_set_name": "Pile-CC" }
# Copyright (c) Facebook, Inc. and its affiliates. All Rights Reserved. import torch from .box_head.box_head import build_roi_box_head from .mask_head.mask_head import build_roi_mask_head from .keypoint_head.keypoint_head import build_roi_keypoint_head class CombinedROIHeads(torch.nn.ModuleDict): """ Combines a set of individual heads (for box prediction or masks) into a single head. """ def __init__(self, cfg, heads): super(CombinedROIHeads, self).__init__(heads) self.cfg = cfg.clone() if cfg.MODEL.MASK_ON and cfg.MODEL.ROI_MASK_HEAD.SHARE_BOX_FEATURE_EXTRACTOR: self.mask.feature_extractor = self.box.feature_extractor if cfg.MODEL.KEYPOINT_ON and cfg.MODEL.ROI_KEYPOINT_HEAD.SHARE_BOX_FEATURE_EXTRACTOR: self.keypoint.feature_extractor = self.box.feature_extractor def forward(self, features, proposals, targets=None): losses = {} # TODO rename x to roi_box_features, if it doesn't increase memory consumption x, detections, loss_box = self.box(features, proposals, targets) losses.update(loss_box) if self.cfg.MODEL.MASK_ON: mask_features = features # optimization: during training, if we share the feature extractor between # the box and the mask heads, then we can reuse the features already computed if ( self.training and self.cfg.MODEL.ROI_MASK_HEAD.SHARE_BOX_FEATURE_EXTRACTOR ): mask_features = x # During training, self.box() will return the unaltered proposals as "detections" # this makes the API consistent during training and testing x, detections, loss_mask = self.mask(mask_features, detections, targets) losses.update(loss_mask) if self.cfg.MODEL.KEYPOINT_ON: keypoint_features = features # optimization: during training, if we share the feature extractor between # the box and the mask heads, then we can reuse the features already computed if ( self.training and self.cfg.MODEL.ROI_KEYPOINT_HEAD.SHARE_BOX_FEATURE_EXTRACTOR ): keypoint_features = x # During training, self.box() will return the unaltered proposals as "detections" # this makes the API consistent during training and testing x, detections, loss_keypoint = self.keypoint(keypoint_features, detections, targets) losses.update(loss_keypoint) return x, detections, losses def build_roi_heads(cfg): # individually create the heads, that will be combined together # afterwards roi_heads = [] if cfg.MODEL.RETINANET_ON: return [] if not cfg.MODEL.RPN_ONLY: roi_heads.append(("box", build_roi_box_head(cfg))) if cfg.MODEL.MASK_ON: roi_heads.append(("mask", build_roi_mask_head(cfg))) if cfg.MODEL.KEYPOINT_ON: roi_heads.append(("keypoint", build_roi_keypoint_head(cfg))) # combine individual heads in a single module if roi_heads: roi_heads = CombinedROIHeads(cfg, roi_heads) return roi_heads
{ "pile_set_name": "Github" }
Reduced expression of syndecan-1 in human hepatocellular carcinoma with high metastatic potential. Syndecans comprise a gene family of transmembrane proteoglycans that regulate cellular behavior through interactions with various effectors, including heparin-binding growth factors and insoluble matrix components. Syndecan-1, the most extensively studied, localizes in epithelial cells and has been shown to present in normal hepatocytes. However, little is known about the change of syndecan-1 expression in human hepatocellular carcinoma (HCC). We investigated syndecan-1-protein expression by immunohistochemistry in 57 HCC tissue samples. Syndecan-1 gene expression was also determined. Syndecan-1 protein was expressed in cytoplasm and cell membrane of the hepatocytes and in the bile duct epithelial cells of liver with underlying hepatitis and cirrhosis. Conversely, among 57 HCC tissues, 39 HCC (68.4%) showed negative staining; 50% of well-differentiated HCC showed positive staining, whereas 82.4% of poorly differentiated HCC were negative. Loss of syndecan-1-protein expression was more prevalent in HCC with intra-hepatic metastasis (85.2%) than those without metastasis (48.0%). Similarly, syndecan-1 expression was significantly reduced in HCC with extra-hepatic metastasis (91.7%) as compared with the HCC without extra-hepatic metastasis (62.2%). The gene expression of syndecan-1 was significantly lower in HCC tissue than that in non-tumoral liver tissue. In 2 human HCC cell lines with poorly differentiated phenotype, HLE and HLF, syndecan-1 expression was markedly decreased both at the mRNA and the protein levels. These results suggest that the loss of syndecan-1 expression is a characteristic feature of HCC with high metastatic potential.
{ "pile_set_name": "PubMed Abstracts" }
England centre Manu Tuilagi has apologised for playing a prank on Prime Minister David Cameron during the British and Irish Lions' visit to Downing Street. Tuilagi gave Cameron 'bunny ears' while stood behind and to the left of the Conservative Party leader as a group of players and management posed for a photo at the function to honour the Lions' 2-1 series victory over Australia. You can see the incident in our video, and enjoy the end result in the picture here: View photo . Using Twitter to express his remorse for the incident, the Leicester Tigers centre said: "Apologies for messing around on Lions photo. No offence intended. Great Day at Downing Street. Thanks to Prime Minister for hosting us." And a brief apology on social media seems a small price to pay for the kudos that the player quickly earned from his fellow players, with fellow Lions star Ben Youngs saying on Twitter "The Man just couldn't stop himself" and Gloucester and England fly-half Freddie Burns tweeting: "Great bottle from Manu Tuilagi! Haha. #chief." It's not the first time Tuilagi has courted controversy: at the 2011 Rugby World Cup he was fined £3,000 after jumping off a ferry in Auckland.
{ "pile_set_name": "Pile-CC" }
page_title: Managing Data in Containers page_description: How to manage data inside your Docker containers. page_keywords: Examples, Usage, volume, docker, documentation, user guide, data, volumes # Managing Data in Containers So far we've been introduced to some [basic Docker concepts](/userguide/usingdocker/), seen how to work with [Docker images](/userguide/dockerimages/) as well as learned about [networking and links between containers](/userguide/dockerlinks/). In this section we're going to discuss how you can manage data inside and between your Docker containers. We're going to look at the two primary ways you can manage data in Docker. * Data volumes, and * Data volume containers. ## Data volumes A *data volume* is a specially-designated directory within one or more containers that bypasses the [*Union File System*](/terms/layer/#union-file-system) to provide several useful features for persistent or shared data: - Volumes are initialized when a container is created - Data volumes can be shared and reused between containers - Changes to a data volume are made directly - Changes to a data volume will not be included when you update an image - Volumes persist until no containers use them ### Adding a data volume You can add a data volume to a container using the `-v` flag with the `docker create` and `docker run` command. You can use the `-v` multiple times to mount multiple data volumes. Let's mount a single volume now in our web application container. $ sudo docker run -d -P --name web -v /webapp training/webapp python app.py This will create a new volume inside a container at `/webapp`. > **Note:** > You can also use the `VOLUME` instruction in a `Dockerfile` to add one or > more new volumes to any container created from that image. ### Mount a Host Directory as a Data Volume In addition to creating a volume using the `-v` flag you can also mount a directory from your Docker daemon's host into a container. > **Note:** > If you are using Boot2Docker, your Docker daemon only has limited access to > your OSX/Windows filesystem. Boot2Docker tries to auto-share your `/Users` > (OSX) or `C:\Users` (Windows) directory - and so you can mount files or directories > using `docker run -v /Users/<path>:/<container path> ...` (OSX) or > `docker run -v /c/Users/<path>:/<container path ...` (Windows). All other paths > come from the Boot2Docker virtual machine's filesystem. $ sudo docker run -d -P --name web -v /src/webapp:/opt/webapp training/webapp python app.py This will mount the host directory, `/src/webapp`, into the container at `/opt/webapp`. > **Note:** > If the path `/opt/webapp` already exists inside the container's image, its > contents will be replaced by the contents of `/src/webapp` on the host to stay > consistent with the expected behavior of `mount` This is very useful for testing, for example we can mount our source code inside the container and see our application at work as we change the source code. The directory on the host must be specified as an absolute path and if the directory doesn't exist Docker will automatically create it for you. > **Note:** > This is not available from a `Dockerfile` due to the portability > and sharing purpose of built images. The host directory is, by its nature, > host-dependent, so a host directory specified in a `Dockerfile` probably > wouldn't work on all hosts. Docker defaults to a read-write volume but we can also mount a directory read-only. $ sudo docker run -d -P --name web -v /src/webapp:/opt/webapp:ro training/webapp python app.py Here we've mounted the same `/src/webapp` directory but we've added the `ro` option to specify that the mount should be read-only. ### Mount a Host File as a Data Volume The `-v` flag can also be used to mount a single file - instead of *just* directories - from the host machine. $ sudo docker run --rm -it -v ~/.bash_history:/.bash_history ubuntu /bin/bash This will drop you into a bash shell in a new container, you will have your bash history from the host and when you exit the container, the host will have the history of the commands typed while in the container. > **Note:** > Many tools used to edit files including `vi` and `sed --in-place` may result > in an inode change. Since Docker v1.1.0, this will produce an error such as > "*sed: cannot rename ./sedKdJ9Dy: Device or resource busy*". In the case where > you want to edit the mounted file, it is often easiest to instead mount the > parent directory. ## Creating and mounting a Data Volume Container If you have some persistent data that you want to share between containers, or want to use from non-persistent containers, it's best to create a named Data Volume Container, and then to mount the data from it. Let's create a new named container with a volume to share. While this container doesn't run an application, it reuses the `training/postgres` image so that all containers are using layers in common, saving disk space. $ sudo docker create -v /dbdata --name dbdata training/postgres You can then use the `--volumes-from` flag to mount the `/dbdata` volume in another container. $ sudo docker run -d --volumes-from dbdata --name db1 training/postgres And another: $ sudo docker run -d --volumes-from dbdata --name db2 training/postgres You can use multiple `--volumes-from` parameters to bring together multiple data volumes from multiple containers. You can also extend the chain by mounting the volume that came from the `dbdata` container in yet another container via the `db1` or `db2` containers. $ sudo docker run -d --name db3 --volumes-from db1 training/postgres If you remove containers that mount volumes, including the initial `dbdata` container, or the subsequent containers `db1` and `db2`, the volumes will not be deleted. To delete the volume from disk, you must explicitly call `docker rm -v` against the last container with a reference to the volume. This allows you to upgrade, or effectively migrate data volumes between containers. ## Backup, restore, or migrate data volumes Another useful function we can perform with volumes is use them for backups, restores or migrations. We do this by using the `--volumes-from` flag to create a new container that mounts that volume, like so: $ sudo docker run --volumes-from dbdata -v $(pwd):/backup ubuntu tar cvf /backup/backup.tar /dbdata Here we've launched a new container and mounted the volume from the `dbdata` container. We've then mounted a local host directory as `/backup`. Finally, we've passed a command that uses `tar` to backup the contents of the `dbdata` volume to a `backup.tar` file inside our `/backup` directory. When the command completes and the container stops we'll be left with a backup of our `dbdata` volume. You could then restore it to the same container, or another that you've made elsewhere. Create a new container. $ sudo docker run -v /dbdata --name dbdata2 ubuntu /bin/bash Then un-tar the backup file in the new container's data volume. $ sudo docker run --volumes-from dbdata2 -v $(pwd):/backup busybox tar xvf /backup/backup.tar You can use the techniques above to automate backup, migration and restore testing using your preferred tools. # Next steps Now we've learned a bit more about how to use Docker we're going to see how to combine Docker with the services available on [Docker Hub](https://hub.docker.com) including Automated Builds and private repositories. Go to [Working with Docker Hub](/userguide/dockerrepos).
{ "pile_set_name": "Github" }
Dungate Dungate is a village near the M2 motorway, in the Swale district, in the English county of Kent. It is near the town of Sittingbourne. References A-Z Great Britain Road Atlas (page 40) Category:Villages in Kent Category:Borough of Swale
{ "pile_set_name": "Wikipedia (en)" }
इस पार, प्रिये मधु है तुम हो, उस पार न जाने क्या होगा! यह चाँद उदित होकर नभ में कुछ ताप मिटाता जीवन का, लहरालहरा यह शाखा‌एँ कुछ शोक भुला देती मन का, कल मुर्झानेवाली कलियाँ हँसकर कहती हैं मगन रहो, बुलबुल तरु की फुनगी पर से संदेश सुनाती यौवन का, तुम देकर मदिरा के प्याले मेरा मन बहला देती हो, उस पार मुझे बहलाने का उपचार न जाने क्या होगा! इस पार, प्रिये मधु है तुम हो, उस पार न जाने क्या होगा! जग में रस की नदियाँ बहती, रसना दो बूंदें पाती है, जीवन की झिलमिलसी झाँकी नयनों के आगे आती है, स्वरतालमयी वीणा बजती, मिलती है बस झंकार मुझे, मेरे सुमनों की गंध कहीं यह वायु उड़ा ले जाती है! ऐसा सुनता, उस पार, प्रिये, ये साधन भी छिन जा‌एँगे, तब मानव की चेतनता का आधार न जाने क्या होगा! इस पार, प्रिये मधु है तुम हो, उस पार न जाने क्या होगा! प्याला है पर पी पा‌एँगे, है ज्ञात नहीं इतना हमको, इस पार नियति ने भेजा है, असमर्थबना कितना हमको, कहने वाले, पर कहते है, हम कर्मों में स्वाधीन सदा, करने वालों की परवशता है ज्ञात किसे, जितनी हमको? कह तो सकते हैं, कहकर ही कुछ दिल हलका कर लेते हैं, उस पार अभागे मानव का अधिकार न जाने क्या होगा! इस पार, प्रिये मधु है तुम हो, उस पार न जाने क्या होगा! कुछ भी न किया था जब उसका, उसने पथ में काँटे बोये, वे भार दि‌ए धर कंधों पर, जो रोरोकर हमने ढो‌ए, महलों के सपनों के भीतर जर्जर खँडहर का सत्य भरा! उर में एसी हलचल भर दी, दो रात न हम सुख से सो‌ए! अब तो हम अपने जीवन भर उस क्रूरकठिन को कोस चुके, उस पार नियति का मानव से व्यवहार न जाने क्या होगा! इस पार, प्रिये मधु है तुम हो, उस पार न जाने क्या होगा! संसृति के जीवन में, सुभगे! ऐसी भी घड़ियाँ आ‌ऐंगी, जब दिनकर की तमहर किरणे तम के अन्दर छिप जा‌एँगी, जब निज प्रियतम का शव रजनी तम की चादर से ढक देगी, तब रविशशिपोषित यह पृथिवी कितने दिन खैर मना‌एगी! जब इस लंबेचौड़े जग का अस्तित्व न रहने पा‌एगा, तब तेरा मेरा नन्हासा संसार न जाने क्या होगा! इस पार, प्रिये मधु है तुम हो, उस पार न जाने क्या होगा! ऐसा चिर पतझड़ आ‌एगा, कोयल न कुहुक फिर पा‌एगी, बुलबुल न अंधेरे में गागा जीवन की ज्योति जगा‌एगी, अगणित मृदुनव पल्लव के स्वर 'भरभर' न सुने जा‌एँगे, अलि‌अवली कलिदल पर गुंजन करने के हेतु न आ‌एगी, जब इतनी रसमय ध्वनियों का अवसान, प्रिय हो जा‌एगा, तब शुष्क हमारे कंठों का उद्गार न जाने क्या होगा! इस पार, प्रिये मधु है तुम हो, उस पार न जाने क्या होगा! सुन काल प्रबल का गुरु गर्जन निर्झरिणी भूलेगी नर्तन, निर्झर भूलेगा निज 'टलमल', सरिता अपना 'कलकल' गायन, वह गायकनायक सिन्धु कहीं, चुप हो छिप जाना चाहेगा! मुँह खोल खड़े रह जा‌एँगे गंधर्व, अप्सरा, किन्नरगण! संगीत सजीव हु‌आ जिनमें, जब मौन वही हो जा‌एँगे, तब, प्राण, तुम्हारी तंत्री का, जड़ तार न जाने क्या होगा! इस पार, प्रिये मधु है तुम हो, उस पार न जाने क्या होगा! उतरे इन आखों के आगे जो हार चमेली ने पहने, वह छीन रहा देखो माली, सुकुमार लता‌ओं के गहने, दो दिन में खींची जा‌एगी ऊषा की साड़ी सिन्दूरी पट इन्द्रधनुष का सतरंगा पा‌एगा कितने दिन रहने! जब मूर्तिमती सत्ता‌ओं की शोभाशुषमा लुट जा‌एगी, तब कवि के कल्पित स्वप्नों का श्रृंगार न जाने क्या होगा! इस पार, प्रिये मधु है तुम हो, उस पार न जाने क्या होगा! दृग देख जहाँ तक पाते हैं, तम का सागर लहराता है, फिर भी उस पार खड़ा को‌ई हम सब को खींच बुलाता है! मैं आज चला तुम आ‌ओगी, कल, परसों, सब संगीसाथी, दुनिया रोतीधोती रहती, जिसको जाना है, जाता है। मेरा तो होता मन डगडग मग, तट पर ही के हलकोरों से! जब मैं एकाकी पहुँचूँगा, मँझधार न जाने क्या होगा! इस पार, प्रिये मधु है तुम हो, उस पार न जाने क्या होगा!
{ "pile_set_name": "OpenWebText2" }
Category Archives: SGH Bodyworks The Morgan Plus 4 Roadster. This is the start of the repairs to the off side front wing, primer has been applied. Off side front wing in the oven baking off after being repaired and re-sprayed. Below is the finished repairs to the wing, waiting for the customer to collect. REPAIRS TO A CLASSIC STYLE MORGAN This Moragn was brought in to us from http://www.williamsatomobiles.com for various repairs around the vehicle, as you can see we have taken photos as we have gone along. Repairs to rear panel. Near side and off side Front wings and Near side rear wing taken off to be repaired and resprayed.…
{ "pile_set_name": "Pile-CC" }
Q: How can I validate unique field with struts framework and hibernate? I am new in struts2 and hibernate. I want to validate mobile no with data base for uniqueness. How can I validate a unique field with struts framework and hibernate? A: Add the validation. You want to validate to no store some field in DB. // annotations @NotNull private Integer someField; validation api GA in Hibernate validation. Regards.
{ "pile_set_name": "StackExchange" }
#pragma once #include <iterator> // random_access_iterator_tag #include <nlohmann/detail/meta/void_t.hpp> #include <nlohmann/detail/meta/cpp_future.hpp> namespace nlohmann { namespace detail { template<typename It, typename = void> struct iterator_types {}; template<typename It> struct iterator_types < It, void_t<typename It::difference_type, typename It::value_type, typename It::pointer, typename It::reference, typename It::iterator_category >> { using difference_type = typename It::difference_type; using value_type = typename It::value_type; using pointer = typename It::pointer; using reference = typename It::reference; using iterator_category = typename It::iterator_category; }; // This is required as some compilers implement std::iterator_traits in a way that // doesn't work with SFINAE. See https://github.com/nlohmann/json/issues/1341. template<typename T, typename = void> struct iterator_traits { }; template<typename T> struct iterator_traits < T, enable_if_t < !std::is_pointer<T>::value >> : iterator_types<T> { }; template<typename T> struct iterator_traits<T*, enable_if_t<std::is_object<T>::value>> { using iterator_category = std::random_access_iterator_tag; using value_type = T; using difference_type = ptrdiff_t; using pointer = T*; using reference = T&; }; } // namespace detail } // namespace nlohmann
{ "pile_set_name": "Github" }
Homotopic stimulation can reduce the area of allodynia in patients with neuropathic pain. Allodynia is a common, troublesome feature of neuropathic pain conditions. In a previous study of postherpetic neuralgia we observed that repeated tactile stimulation appeared to reduce the size of the area of allodynia in some patients. We have undertaken a pragmatic clinical study to characterise this phenomenon in neuropathic pain patients with a range of different aetiologies. Neuropathic pain patients with a discrete area of tactile allodynia were recruited (n=20). We assessed the sensitive area using punctate and dynamic tactile stimuli, and thermal quantitative sensory testing. On two separate testing visits, the patients had repeated (10x over 1 min) noxious heat or cotton bud strokes applied to the affected site or contralaterally. Tactile stimulation of the affected area evoked pain (median 7 NRS) and a reduction (>30%) in the area of allodynia in 9/18 patients (maximum -48+/-9%, after 20 min), although the intensity of allodynic pain was unchanged. This effect persisted for over 1h and was present the following day in all patients tested (n=5/5). No subjects showed an increase in area after allodynic stimulation. There was no change in heat pain threshold at a distant site following allodynic stimulation, suggesting no activation of diffuse noxious inhibitory control. Repeated thermal noxious stimulation (median NRS 7) could also elicit changes (>30%) in the area of allodynia in some patients (reductions in 7/20, increases in 3/20). Thus, we have found that a brief period of homotopic painful stimulation can reduce the area of allodynia in around half of patients with established neuropathic pains.
{ "pile_set_name": "PubMed Abstracts" }
Babruysk (air base) Babruysk Air Base (, Aeradrom Babruysk; ) is a military airfield of the 83rd Separate Order of the Red Star Engineer-Aerodrome Regiment of the Air and Air Defence Force of Belarus, located in the south-western outskirts of Babruysk (Bobruisk), Belarus. The base also functions as a spare airfield. It used to be a Soviet Long-Range Aviation air base. History 1944–1994 After the liberation of Babruysk in the summer of 1944, the airfield was used to provide air support for the further offensive of the Red Army. From the beginning of 1945, the staffing and training of the 330th Bomber Aviation Regiment of the 48th Bomber Aviation Division was carried out at the Babruysk airfield, which never took part in the fighting due to the end of the war and for which the airfield became a permanent base. In the following years, up to 1994, the Babruysk airfield was used mainly by long-range bomber aircraft. At the end of May 1945, the 111th Bomber Aviation Regiment of the 50th Bomber Aviation Division was relocated to Bobruisk, and management 22nd Guards Bomber Aviation Division. In the summer of 1945, the following departments were also deployed in Bobruisk: 6th Guards Bomber Aviation Division (moved to Chernyakhovsk in 1947), 3rd Guards Bomber Aviation Corps (disbanded in August 1956) and 1st Air Army (moved to Minsk in 1946). In April 1946, the 111th bap and the 330th bap were introduced into the 22nd Guards. Bad, and in May of the same year, the 200th Guards Bomber Aviation Regiment of the same air division was also transferred to the Bobruisk airfield.All three air regiments were fully equipped with American bomber medium-range North American B-25 Mitchell ]. In November 1949, the 330th bap was disbanded, and the 111th bap and the 200th guards. Bap re-equipped by the first Soviet strategic bomber Tu-4 (since 1950, these air regiments, as well as the 22nd guards. Bad, became known as heavy bombers). In addition, in 1949-1951, the wooden covering of the airfield was replaced by concrete. In the following years, strategic bombers were deployed at the airfield of Bobruisk, which were in service with the 111th Tbap and the 200th Guards. tbap (111th tbap was disbanded in February 1971): Tu-4 – until 1956; Tu-16 – in the years 1955-1986; Tu-16K – in 1964-1992; Tu-22M3 – since 1986. The composition of the 200th Guards. Tbap also included a squadron of tanker aircraft Tu-16N. According to Treaty on Conventional Armed Forces in Europe, as of January 1, 1991, armed with the 200th Guards. There were tbap: 20 – TU-22M3 and 18 – Tu-16K. At the aerodrome, two repositories were also built nuclear weapons (Kazakovo facility): 9 hydrogen bombs were stored in the mid-1950s, 200 in the later building nuclear warheads for cruise missile. By the end of 1994, all nuclear ammunition had been removed to the territory of Russian Federation, and the object was transferred to the balance of Bobruisk city executive committee and after – Bobruisk leshoz. As of 2014, the object was in an abandoned state with a destroyed infrastructure. 1994–present After the collapse of USSR 22nd Guards. tbad was transferred to the jurisdiction of Russian Federation, and in November – December 1994, the Air Division and the 200th Guards. Tbap were redeployed with all aviation weapons from the territory of Belarus to the airfield White (Irkutsk Region, Russia). At one time, the airfield Bobruisk was also used fighter aircraft. In January 1946, the airfield was redeployed 4th Fighter Aviation Regiment 144th Fighter Aviation Division. From October 1951 to November 1953, the 383rd Fighter Aviation Regiment of the 144th Iad, armed with airplanes MiG-15. In March 1958, the 4th IAP left the airfield, armed at the time by airplanes MiG-17. In 1994–2002, the Bobruisk airfield was home to the 13th separate combat control squadron of the helicopter Belarusian Air Force. This aviation unit was formed in 1946 in Brest on the basis of the 994th separate aviation regiment of communications, receiving the name: the 13th separate aviation communications squadron, and was subordinated to the ground forces Belorussky military district. Later, the 13th United Arab Emirates was reorganized into the 13th separate mixed aviation squadron and since 1960 it has been used for the aviation support of the headquarters 5th Guards Tank Army based at the airfield Kiselevichi, located on the northern outskirts of Bobruisk. In the 1980s, the 13th Air Force was reorganized into the 13th Separate Helicopter Squadron; military units participated in fighting in Afghanistanand mitigation of consequences the Chernobyl NPP accident. At the time of 1990, the 13 OW was part of the aviation Ground Forces of the Armed Forces of the USSR and, according to CFE, was armed with: 2 helicopters - Mi-6, 3 helicopters - Mi-8 and several transport planes. In June 1992, the 13 OWU became part of Air Force of the Republic of Belarus, in 1993 it was reorganized into the 13th separate combat squadron of a helicopter, in May 1994 it was relocated from the airfield Kiselevichi to the airfield Bobruisk. In 2002, as part of the creation of a unified Air Force and Air Defense Forces troops of the Republic of Belarus and as a result of structural reorganization, 13 ove bu was disbanded, and the aircraft and flight personnel were transferred to the 50th a mixed aviation base, located at the airfield Machulishchi. At that time, the squadron was armed with helicopters: Mi-8, Mi-9 and Mi-22. Since 2002, the Babruysk airfield has been managed by the 83rd Separate Order of the Red Star Engineer-Aerodrome Regiment of the Air and Air Defence Force of the Republic of Belarus. The 83rd Regiment contains an airfield in constant operational readiness, it ensures the reception and departure of aircraft from the airfield. Notes References External links Category:Airports in Belarus Category:Military installations of Belarus Category:Soviet Air Force bases Category:Babruysk
{ "pile_set_name": "Wikipedia (en)" }
The Influence of prolonged beta-blockers treatment on male rabbit's sexual behavior and penile microcirculation. The aim of the study was to assess the effect of the prolonged intake of three beta-blocking drugs (propranolol, metoprolol and nebivolol) on the sexual behavior and penile microcirculation of rabbits. Drugs were administered p.o. for 9 weeks and every three weeks in each group (n=13) one subgroup (n=7) performed behavioral tests, whereas in the second subgroup (n=6) penile microcirculation was measured with a laser Doppler flowmeter. The copulation studies revealed significant impairment of sexual function only in the propranolol treated group. The measured behavioral parameters suggest that at a given dose propranolol affects more performance rather than arousal aspects of rabbits' sexual behavior. In the course of the whole study no significant difference was observed among groups in penile blood flow. The data indicate that among the beta-blockers given only propranolol interferes with sexual behavior, and that beta-blockers do not appear to have a negative effect on penile microcirculation.
{ "pile_set_name": "PubMed Abstracts" }
01 mai 2016 "À quelques secondes du coup d'envoi, dans l'ambiance électrique des tribunes du stade de Saitama, tandis que les joueurs étaient déjà en place et que la rencontre allait commencer, le stade fut soudain survolé à basse altitude par quatre avions de chasse sidérants qui frôlèrent les toits et disparurent dans un vacarme tonitruant en laissant dans leur sillage d'inquiétants lambeaux de fumée et de sinistres réminiscences de guerre, de violence et d'attentats. Mais, à part ces enfantillages militaristes, la soirée fut des plus douces. Le coup d'envoi du match fut donné, et lorsque, telle une délivrance inattendue, la Belgique ouvrit le score sur un spectaculaire retourné acrobatique de Wilmots, je bondis de mon siège, les bras au ciel, tournant sur moi-même et sautillant dans les gradins, ne sachant où aller, avec qui fêter l'événement, avant d'apercevoir un autre Belge tout aussi isolé que moi dans les tribunes. Nous nous précipitâmes gauchement l'un vers l'autre, ignorant comment concélébrer notre but, nous contentant de nous frapper violemment les paumes l'une contre l'autre, é la manière de deux basketteurs américains qui viennent de réussir quelque exploit. Rien de plus, nous n'échangeâmes pas un mot, je ne sais même pas si ce type parlait français (c'est une des relations les plus étranges que j'aie entretenue dans ma vie), le retrouvant un quart d'heure plus tard au même endroit pour répéter le même geste à l'occasion du deuxième but de la Belgique. J'aurais pu me contenter de fêter les buts belges, mais je dois confesser que, presque sans me l'avouer, j'ai éprouvé à chaque fois une satisfaction secrète de voir ce stade exploser et trembler sur ses bases à chacun des buts des Japonais. Finalement, ce match nul me convenait à merveille, c'était même exactement le score que j'appelais de mes vœux. Je me souviens que, début décembre, quand fut connu le tirage au sort des rencontres, j'avais envoyé un courriel à Kan Nozaki, mon traducteur japonais, pour lui dire que j'espérais que nous ferions assaut de civilités lors de ce Japon-Belgique, et que, connaissant de réputations les excellentes manière des gens de son pays, j'espérais que les Japonais auraient l'exquise politesse de ne pas nous battre et que nous aurions l'élégance de ne pas en profiter pour gagner."
{ "pile_set_name": "OpenWebText2" }
Q: leaflet javascript - how to clearTimeout a setTimeout on a marker? I am adding markers like this to my map: map.addLayer(l), setTimeout(function() { map.removeLayer(l) }, 1e4), which removes after 10 seconds each marker again. Now I would like to achieve that when the user clicks during those 10 seconds on a marker that the market stays visible on the map. So far I have: l.on('click', function(e) { console.log(e); console.log(e.layer._leaflet_id); console.log(l); clearTimeout(e.layer._leaflet_id); }); But it does now work. Any idea how I can achieve this? A: You need to cancel the setTimeout by calling the clearTimeout using the relevant ID. var myVar; timeout_init(); function timeout_init() { myVar = setTimeout(function(){ $('.marker').hide(); },5000); } $( ".marker" ).click(function() { clearTimeout(myVar); }); See example Fiddle
{ "pile_set_name": "StackExchange" }
Purification and characterization of estrogen-2/4-hydroxylase activity from rabbit hypothalami: peroxidase-mediated catechol estrogen formation. Estrogen-2/4-hydroxylase (E-2/4-H) activity of rabbit hypothalamic tissue was previously found to be localized in the soluble subcellular fraction. In the present study, the enzymatic activity responsible for catechol estrogen formation in this subcellular fraction of the rabbit hypothalamus was purified by ammonium sulfate fractionation, ion exchange chromatography, and chromatofocusing. E-2/4-H activity was found to be associated with a group of hemoproteins with peroxidase activity. The characteristics of this hypothalamic E-2/4-H activity were reestablished in light of a peroxidatic mechanism for catechol estrogen formation. Organic hydroperoxides stimulated E-2/4-H activity, presumably by serving as oxidizing cosubstrate required for peroxidase-mediated reactions. E-2/4-H activity in a 17,500 X g supernatant of hypothalamic tissue was linear with time for at least 10 min and with protein concentration to at least 100 micrograms/150 microliter. It displayed a pH optimum of 6 and an apparent Michaelis-Menten constant (Km) of 32 microM with respect to estradiol. The amounts of 4-hydroxyestradiol formed were comparable to those of 2-hydroxyestradiol. The characteristics established in this study for the peroxidase-type E-2/4-H were distinct from those of the particulate, NADPH-dependent 2-hydroxylases found in rat liver and in porcine blastocyst and ovary. These differences provide a basis for differentiating between the two types of enzymatic activity that can lead to catechol estrogen formation in vitro.
{ "pile_set_name": "PubMed Abstracts" }
Researchers often control for certain variables if they suspect that those variables might be exaggerating the size of an effect. In the case of the pay gap, economists often adjust their data to compensate for the fact that, for example, men are overrepresented in high-paying computer programming jobs, and women are overrepresented in low-paying service jobs. These adjustments lead to numbers that stand as good estimates of how big a pay gap would be if men and women were represented in equal numbers in each profession. There are usually other variables that researchers control for, too; geography, experience, and job titles are other variables with known effects, so filtering them out from the numbers is a step toward isolating the effects of gender on pay. But the striking thing is that even after adjusting for so many factors, there’s still a statistically significant pay gap. (Pay-gap skeptics often note that the gap shrinks after taking these factors into account, but it’s supposed to—those statistical adjustments were intended to create a more definitive, standardized measurement.) The fact that a gap remains at all after such adjustments shows that the problem defies any simple explanation. As Robert Hohman, the CEO of Glassdoor, wrote a few months ago in Fortune: Factoring differences in education, experience, age, location, job title, industry and even company, our latest research reveals that the “adjusted” gender pay gap in the U.S. amounts to women earning about 94.6 cents per dollar compared to men. It is remarkable that a significant gap persists even after comparing male-female worker pay at the job title and company level. That 5-cent difference is evidence that something isn’t getting accounted for in all those variables that economists are adjusting. The premise of the occupational-differences argument is that if women are choosing jobs that are easier to do, they shouldn’t be paid the same wages as men. But what that argument—that women are to blame for keeping their wages down because they’re choosing bad jobs—doesn’t take into account are the many things that contribute to the way men and women choose their careers. Gould, along with her co-author, Jessica Schieder, argue that the decisions women make regarding their careers do not happen in a vacuum: These are decisions shaped by cultural norms and expectations, societal forces that aren’t cleanly captured by pay data. Gould and Schieder point to a multitude of messages that women get from society about what sorts of jobs they should pick: The expectations of American mothers could lead women to take lower-paying jobs because they’re more likely to offer flexible (or shorter hours), while fears of discrimination might steer them away from higher-paying professions. In other words, adjusted statistics could be missing the role of discrimination in the processes that lead women to choose the careers they do.
{ "pile_set_name": "OpenWebText2" }
Suberin is among the most recalcitrant plant molecular structures in soils ([@b31-27_36]). Suberin forms a protective barrier in tissues such as woody stems, roots and underground storage organs which undergo secondary growth ([@b10-27_36]). This barrier controls the flux of water and also protects plant tissues against biotic diseases ([@b29-27_36]). Suberin is a biopolymer composed of polyaromatic and polyaliphatic domains linked by glycerol moieties ([@b3-27_36]). Microbial degradation of suberin is a process that is poorly characterized. Suberinases are poly-esterases that can depolymerize, at least partially, the lipidic polymer ([@b16-27_36]). Suberinases have been shown to be produced by some fungi belonging to the following genera: *Armillaria*, *Aspergillus*, *Coprinopsis* and *Fusarium*([@b16-27_36]). There is also evidence that some actinomycetes produce suberin-degrading esterases. Esterase activity is induced in *Thermoactinomyces vulgaris*([@b10-27_36]) and the plant pathogen *Streptomyces scabiei*([@b32-27_36]) in the presence of suberin. The genus *Streptomyces* belongs to the order of Actinomycetales, a division of Gram-positive bacteria that are characterized by a genome with a high G+C content. Their complex life cycle includes soil colonization by mycelial growth and terminates with sporulation. *Streptomyces* are known for producing a wide variety of biologically active secondary metabolites such as antibiotics; however, among the numerous species of the genus *Streptomyces*, a few have developed phytopathogenic traits, mainly relying on their ability to produce plant toxic secondary metabolites called thaxtomins ([@b2-27_36]). *Streptomyces scabiei* is the main causal agent of common scab, a severe disease which affects potato tubers and tap root crops ([@b18-27_36]). The cellular response of *S. scabiei* exposed to suberin was investigated using a proteomic differential display technique. It was revealed that its presence up-regulated proteins related to the stress response, glycolysis, morphological differentiation and secondary metabolism ([@b17-27_36]). The effect of suberin on differentiation was corroborated by cultivating *S. scabiei* in the presence or absence of suberin ([@b19-27_36]). Suberin strongly stimulates aerial mycelium development in *S. scabiei* which, in the presence of cellobiose, can lead to the production of the secondary metabolites, thaxtomins ([@b19-27_36]). Suberin is not the only biopolymer that influences differentiation and secondary metabolism in *Streptomyces*. For instance, chitin, the main polymer of insect cuticles and crustacean shells, modulates antibiotic biosynthesis and development in *Streptomyces coelicolor*([@b33-27_36]). Since soil-dwelling streptomycetes can hydrolyse complex natural biopolymers, it was suggested that these polymers play a determinant role in the production of their bioactive molecules ([@b33-27_36]). In the present paper, suberin is shown to affect development and secondary metabolite biosynthesis not only in *S. scabiei*, but also in the plant pathogen *S. acidiscabies*, as well as in saprophytic species such as *S. avermitilis*, *S. coelicolor* and *S. melanosporofaciens*. The molecular mechanisms responsible for the stimulation of differentiation are still unknown, but we demonstrate that suberin acts as a membrane and cell-wall perturbant in streptomycetes. Materials and Methods ===================== Suberin purification, bacterial cultivation and growth conditions ----------------------------------------------------------------- Suberin was obtained from potato peel (*Solanum tuberosum* 'Russet') and purified ([@b15-27_36]). Briefly, potato tubers were sliced and boiled for 20 min. The skin (suberin) was removed and flesh was roughly scraped away. The peel was then rinsed with tap water and residual flesh was digested overnight with cellulase (5 g L^−1^) and pectinase (1 g L^−1^) in 50 mM acetate buffer (pH 4.0). The peel was rinsed again with chloroform:methanol (2:1) and suberin purification was achieved using a Soxhlet extractor with chloroform as a solvent. Finally, suberin was dried and ground for 15 s in a coffee blender. *Streptomyces scabiei* strain EF-35 (HER1481) was initially isolated in Quebec (Canada) from scabby potato tubers ([@b9-27_36]) and was used in all assays. Strains *S. acidiscabies* ATCC 49003, *S. avermitilis* ATCC 31267, *S. coelicolor* M145 (ATCC BAA-471) and *S. melanosporofaciens* EF-76 (ATCC BAA-668) were also used in the morphology and mechanical lysis experiments. Unless otherwise specified, bacteria were cultivated in liquid medium as follows. 10^7^ to 10^8^ spores were inoculated in 50 mL tryptic soy broth (TSB) and grown in a rotary shaker (250 rpm) at 30°C for 48 h. Bacteria were then centrifuged (10 min at 3,450×*g*) and resuspended in 5 volumes of sterile 0.85% NaCl. Volumes of 5 mL of this suspension were used to inoculate flasks containing 200 mL minimal medium (0.5 g L^−1^ asparagine, 0.5 g L^−1^ K~2~HPO~4~, 0.2 g L^−1^ MgSO~4~ and 5 mg L^−1^ FeSO~4~--7H~2~O) supplemented with 1% (w/v) soluble starch and 0% (control medium: CM) or 0.1% (w/v) suberin (suberin medium: SM). In order to collect suberin-free bacterial samples at the end of the experiment, suberin was placed in *ca*. 4×4 cm cotton pouches (200 mg suberin per pouch). Control flasks contained empty cotton pouches. Bacteria were grown at 30°C with shaking (250 rpm). Morphology of bacterial colonies on solid medium ------------------------------------------------ Morphology of the five *Streptomyces* species tested in this study was determined as previously described ([@b19-27_36]). Briefly, 30--50 viable spores from each species were streaked on Petri dishes containing solidified (15 g L^−1^ agar) CM and SM. Petri dishes were incubated at 30°C for 5 d and representative colonies of each species and each treatment were photographed. Production of secondary metabolites ----------------------------------- The production of characteristic secondary metabolites, thaxtomin A for *S. scabiei* and *S. acidiscabies*, actinorhodin for *S. coelicolor* and geldanamycin for *S. melanosporofaciens*, was assessed. These four strains were grown in CM and SM; for the growth of *S. scabiei* and *S. acidiscabies*, a starch/cellobiose combination (0.5% each) ([@b19-27_36]) was used instead of 1% starch since cellobiose is required for the production of thaxtomin A ([@b12-27_36], [@b13-27_36]). After 4 d, bacterial cultures were centrifuged (10 min, 3,450×*g*) and supernatants were decanted for quantification of metabolites. Pellets were dried (24 h at 50°C) and weighed to determine bacterial growth. Thaxtomin A produced by *S. scabiei* and *S. acidiscabies* was purified as previously described ([@b11-27_36]) and quantified by HPLC Agilent 1260 Series (Agilent Technologies, Santa Clara, CA, USA) at 249 nm using a Zorbax SB-C18 column (Agilent Technologies). Abamectin (B~1a~) was extracted with ethyl acetate and quantified by HPLC at 246 nm ([@b20-27_36]). γ-Actinorhodin produced by *S. coelicolor* was quantified by spectrophotometry according to Kieser *et al.*([@b14-27_36]). Geldanamycin produced by *S. melanosporofaciens* was purified by chloroform extraction and quantified by HPLC at 306 nm ([@b4-27_36]). This experiment was carried out in triplicate. Cell wall morphology of *Streptomyces scabiei* ---------------------------------------------- The cell wall morphology of *S. scabiei* grown in the absence or presence of suberin was determined after 7 d of growth. Preparation of bacterial cells, the microscopy procedure and image analyses were carried out according to Miguélez *et al.*([@b25-27_36]). Samples were examined with a Philips EM201 (FEI Company, Hillsboro, OR, USA) electron microscope at 60 kV and photographed on an Eastman Fine Grain Positive film 5302 (Eastman Kodak, Rochester, NY, USA). High-contrast photographic negatives were digitized with a HP Scanjet 6300C slide scanner and images were analyzed using the Image-Pro Plus v.4.5 software (Media Cybernetics, Elizabeth, IN, USA). Bacteria sliced in the middle of the cell, *i.e.*, with a well-defined cell wall and a clearly visible DNA zone in the centre, were selected for analysis. Pixel intensity from zones randomly selected in cell walls (40 zones per treatment) was measured. Cell wall thickness was also determined (25 walls per treatment). Bacterial resistance to mechanical lysis ---------------------------------------- The five *Streptomyces* strains were grown for 7 d in liquid CM and SM (using cotton pouches) containing 2% starch. Bacteria were collected by centrifugation, rinsed with 10 mM Tris-HCl (pH 8.3) and centrifuged again. Supernatants were thoroughly discarded and 300 mg bacteria (fresh weight) were resuspended in 1 mL Tris-HCl buffer. Resistance to mechanical stress was assessed using 0.5 mL of this suspension with 250 mg glass beads (100 μm diameter) using a bead beater (FastPrep FP-120; Thermo Fisher Scientific, Waltham, MA, USA) for 45 s (speed 4.5 m s^−1^). Samples were chilled on ice, centrifuged and supernatants were filtered. Lysis efficiency was evaluated by quantifying protein concentration of supernatants using Bio-Rad protein assay (Bio-Rad Laboratories, Hercules, CA, USA). Measurement of bacterial membrane fluidity of *Streptomyces scabiei* -------------------------------------------------------------------- Membrane fluidity of *S. scabiei* EF-35 bacteria collected from control and suberin treatments was determined. After 1 d of growth in CM and SM, bacteria were centrifuged, washed with 0.85% NaCl and resuspended in 0.85% NaCl to a concentration of 12.5 g L^−1^ bacteria. Membrane fluidity was assessed by an anisotropy test, based on the incorporation of 1,6-diphenyl-1,3,5-hexatriene (DPH) into bacterial membranes. The method described by Shinitzky and Barenholz ([@b35-27_36]) was used with minor modifications. Twenty microliters of 1 mM DPH (prepared in acetone and kept in the dark) ([@b1-27_36]) was added to 10 mL bacterial suspension to obtain a final DPH concentration of 2 μM ([@b30-27_36]). Suspensions were incubated in the dark for 2 h at room temperature with mild shaking. Bacteria were then washed with one volume of 0.85% NaCl, resuspended with exactly 10 mL of 0.85% NaCl and kept on ice. Anisotropy tests were performed using a spectrofluorimetry system equipped with PTI polarizers. Fluorescence of the DPH probe was measured with an excitation wavelength of 355 nm and an emission wavelength of 425 nm ([@b22-27_36]), from 10°C to 40°C by 5°C increments. Data were analyzed with Felix 32 v.1.1 software (Photon Technology International, London, ON, Canada). In another experiment, membrane fluidity of *S. scabiei* EF-35 was determined over a 4-d period. Bacteria were grown in CM and SM (200 mL, four replicates per treatment) and 20 mL bacterial suspension was collected every day. Membrane fluidity was readily measured as described above at a temperature of 25°C. Determination of bacterial membrane fatty acid composition of *Streptomyces scabiei* ------------------------------------------------------------------------------------ Membrane fatty acid composition of *S. scabiei* EF-35 bacteria grown in CM and SM was examined. Bacteria were pelleted by centrifugation, washed with 0.85% NaCl and lyophilized. Bacterial membrane fatty acids were extracted and methylated as in Moss ([@b27-27_36]), with modifications. Saponification was performed on 150 mg dried cells with 1 mL of 15% NaOH in 50% ethanol. Suspensions were incubated for 30 min at 100°C; samples were then cooled and brought to pH 2.0 with 6N HCl. Methylation of fatty acids was achieved after adding 3 mL of 14% BF~3~ to methanol and by incubating at 80--85°C for 20 min. After cooling, methylated fatty acids were extracted twice with one volume of petroleum ether/hexane (1:1) and evaporated to 1 mL with a flow of N~2~. Extracts were then washed with 0.3 N NaOH solution ([@b26-27_36]). The organic phase was transferred to a new tube and the solvent was completely evaporated by N~2~ flow. Residual H~2~O was eliminated by the addition of 80--100 mg Na~2~SO~4~. Tubes were stored under N~2~ at −20°C until analysis. Dried fatty acids were then dissolved in 100 μL hexane and separated using a gas chromatograph HP6890 (Hewlett-Packard, Mississauga, ON) equipped with a capillary column RTX-1 of 30 m × 250 μm × 0.25 μm (Restek, Bellefonte, PA, USA). Fatty acids were identified by comparing with the commercial standard mixes Bacterial Acid Methyl Esters Mix (Matreya, Pleasant Gap, PA, USA) and Supelco 37-component FAME Mix (Sigma, St-Louis, MO, USA). Results ======= Suberin promotes secondary growth and production of secondary metabolites in *streptomycetes* --------------------------------------------------------------------------------------------- The composition of growth media noticeably influenced the morphology of the five *Streptomyces* strains tested in this experiment ([Fig. 1](#f1-27_36){ref-type="fig"}). As previously described ([@b19-27_36]), moderately hairy colonies were observed when *S. scabiei* EF-35 was grown on starch medium while suberin triggered the onset of secondary metabolism (formation of hairy colonies). Suberin also strongly stimulated the production of aerial hyphae in *S. acidiscabies* ATCC 49003, *S. coelicolor* M145 and *S. melanosporofaciens* EF-76 when compared to minimal starch medium (CM). In *S. avermitilis* ATCC 31267, suberin only moderately stimulated aerial growth, while suberin-deprived colonies were bald ([Fig. 1](#f1-27_36){ref-type="fig"}). In liquid minimal medium, the presence of suberin significantly stimulated the growth of all *Streptomyces* spp. tested ([Table 1](#t1-27_36){ref-type="table"}). Furthermore, the production of secondary metabolites typically synthesized by these strains was strongly promoted by the presence of the plant polymer in *S. scabiei*, *S. acidiscabies*, *S. coelicolor* and *S. melanosporofaciens*. In the absence of suberin, neither thaxtomin A nor geldanamycin was detected in media inoculated with *S. scabiei* and *S. melanosporofaciens*, respectively, while metabolite production was significantly limited in flasks inoculated with *S. acidiscabies* and *S. coelicolor* ([Table 1](#t1-27_36){ref-type="table"}). Substantial production of unidentified secondary metabolites was also detected from HPLC chromatograms of *S. acidiscabies* and *S. melanosporofaciens* grown in the presence of suberin ([Fig. S1](#s1-27_36){ref-type="supplementary-material"}). Abamectin production by *S. avermitilis* could not be detected in the presence or absence of suberin; however, three-dimensional HPLC profiles showed a strong increase in the production of various unidentified molecules in the presence of suberin ([Fig. S1](#s1-27_36){ref-type="supplementary-material"}). Suberin alters cell wall morphology ----------------------------------- The presence of suberin in growth medium induced morphological changes in *S. scabiei* EF-35. These modifications were clearly visible by electron microscopy after 7 d of growth. The cell walls of bacteria that had been exposed to suberin contained a high quantity of electron-dense material ([Fig. 2](#f2-27_36){ref-type="fig"}). Cell-wall density of bacteria grown in the presence of suberin (90.5±6.7 pixels) thus appeared significantly higher than cell-wall density of control bacteria (75.2±6.9 pixels; *P*\<0.0001, *t*-test). Image analyses also revealed that cell walls were thicker in suberin-treated bacteria (46.6±8.8 nm) than in control bacteria (36.6±6.7 nm; *P*\<0.0001, *t*-test). Bacteria grown in the presence of suberin showed higher resistance to mechanical lysis -------------------------------------------------------------------------------------- Protein content of supernatants obtained after mechanical lysis of bacterial suspensions was significantly higher for bacteria grown for 7 d in CM than in SM, in all *Streptomyces* strains tested ([Table 2](#t2-27_36){ref-type="table"}). An additional experiment was consequently conducted to assess resistance to mechanical lysis over a 7-d period. *S. scabiei* was grown in CM and SM and resistance to mechanical lysis was measured every day, as described above. The amount of protein released by mechanical treatment was similar for both experimental conditions after incubation periods of 1 and 2 d ([Fig. 3](#f3-27_36){ref-type="fig"}); however, from day 3 to day 7, resistance to mechanical lysis was significantly higher (*i.e.*, protein concentration was lower) in bacteria grown in the presence of suberin ([Fig. 3](#f3-27_36){ref-type="fig"}). Membrane fluidity and fatty acid composition -------------------------------------------- Anisotropy measurements performed with the DPH probe, 1 d after inoculation in minimal medium, revealed that membrane fluidity of *S. scabiei* was significantly higher (*i.e.*, anisotropy was lower) in bacteria grown in the presence of suberin than in control bacteria. This pattern was observed at all temperatures tested ([Fig. 4A](#f4-27_36){ref-type="fig"}). The greater membrane fluidity of bacteria grown in the presence of suberin was maintained over the 4 d time course performed at 25°C ([Fig. 4B](#f4-27_36){ref-type="fig"}). The analysis of fatty acid composition revealed that the membranes of *S. scabiei* contained a majority of two branched-chain (*iso*-16:0 and *anteiso*-15:0), an unsaturated (16:1 \[9\] *cis*, *i.e.*, palmitoleic acid) and a straight-chain (16:0, *i.e.*, palmitic acid) fatty acids ([Table 3](#t3-27_36){ref-type="table"}). Differences between bacteria grown in the absence or presence of suberin were observed after 1 d of growth in minimal medium. Suberin induced a higher proportion of total branched-chain fatty acids. The abundance of two of these, *iso*-16:0 and *anteiso*-17:0, increased significantly in the presence of suberin while the abundance of *iso*-15:0 and *anteiso*-15:0 remained unchanged; however, suberin induced a significantly lower proportion of unsaturated acids. No variation in the proportions of straight-chain fatty acids was observed ([Table 3](#t3-27_36){ref-type="table"}). Discussion ========== Suberin is a polymer recalcitrant to microbial degradation in nature. Unambiguous evidence for the presence of suberin in soil organic matter has been revealed by different groups ([@b24-27_36], [@b28-27_36], [@b31-27_36]). Only rare studies have investigated the biochemical mechanisms associated with suberin degradation ([@b16-27_36]). Nevertheless, some authors have suggested that actinomycetes might be involved in the degradation process ([@b10-27_36], [@b32-27_36]). All *Streptomyces* strains used in this study showed better growth in the presence of the polymer. This enhanced growth is probably not the effect of the utilization of suberin constituents as a carbon source (suberin concentration was low), but would rather result from an increase in membrane fluidity that facilitates the transport of nutrients and waste products ([@b5-27_36]). The fatty acid monomers associated with the suberin structure act as membrane perturbants of phospholipid vesicles ([@b8-27_36]). Here, suberin affected both the membrane composition and fluidity of living *S. scabiei* cells. The anisotropy test unequivocally showed that in the *S. scabiei* EF-35 membrane, fluidity was overall higher in bacteria grown in the presence of suberin. *Iso* and *anteiso* branched-chain fatty acids in the bacterial membrane generally contribute to its fluidity ([@b6-27_36], [@b34-27_36]) and the proportions of branched-chain fatty acids increased in bacterial cells grown in the presence of the polymer. On the other hand, unsaturated fatty acids also have the ability to increase membrane fluidity ([@b6-27_36], [@b7-27_36]), but their proportions decreased in suberin-treated membranes, showing that adjustment of membrane fluidity is a complex mechanism. This decrease in the proportions of unsaturated fatty acids may, however, represent a protection mechanism against phenolic compounds present in the suberin polymer. Denich *et al.*([@b6-27_36]) stated that saturated fatty acids help in preventing the access of phenol molecules to the membrane interior. The presence of suberin in the growth media of the five *Streptomyces* species tested conferred relative protection against mechanical stress, suggesting that this plant polymer triggers changes not only in the bacterial membrane, but also in the cell wall. This was demonstrated in *S. scabiei* since cell walls were thicker in bacteria grown in the presence of suberin. The cell wall also appeared to contain more electron-dense material. The increase in cell-wall thickness may explain the higher resistance of *S. scabiei* to mechanical lysis. Once again, the presence of phenols in suberin may be responsible for the higher thickness of cell walls associated with bacteria grown in the presence of suberin. It was suggested that a high number of peptidoglycan layers may effectively be caused by the exposure of bacterial cells to environmental stresses such as phenols ([@b21-27_36]). In the present study, potato suberin altered the development of five bacterial species of the genus *Streptomyces* (*S. scabiei*, *S. acidiscabies*, *S. avermitilis*, *S. coelicolor* and *S. melanosporofaciens*). The general morphological patterns of isolated colonies of the five *Streptomyces* species used here point toward the capacity of suberin to promote cellular differentiation. On solid minimal medium, colonies of the five species tested here presented a hairy morphotype in the presence of suberin (although this phenotype was only slightly visible in *S. avermitilis*), while in the absence of the biopolymer, colonies were bald, or to some extent hairy. The onset of morphological differentiation attributable to suberin concurs with the production of secondary metabolites whose presence, after 4 d of growth in liquid minimal medium, boosted the synthesis of characteristic phytotoxins and antibiotics by *S. scabiei*, *S. acidiscabies*, *S. coelicolor* and *S. melanosporofaciens*. Although no abamectin was produced by *S. avermitilis* under the tested conditions, the production of other unidentified metabolites was apparently stimulated by the presence of suberin. Abamectin is only one secondary metabolite potentially produced by *S. avermitilis* and other antibiotics may also be synthesized by this bacterium ([@b20-27_36]). It has been speculated that complex polymers could influence the development and production of bioactive molecules by soil-dwelling streptomycetes ([@b33-27_36]). For instance, *N*-acetylglucosamine and cellobiose, the main degradation products of chitin and cellulose, lock *S. coelicolor*([@b33-27_36]) and *S. scabiei*([@b19-27_36]) in the vegetative state. The effect of cellulose and cellooligosaccharides on morphological development has also been described in *S. griseus*([@b23-27_36]). Interestingly, it has been demonstrated that suberin counteracts the effect of cellobiose and could promote morphological differentiation, even in the presence of the disaccharide ([@b19-27_36]). In *S. coelicolor*, environmental stresses trigger cell morphological differentiation associated with secondary metabolism ([@b36-27_36]) and it was shown that suberin is perceived by streptomycetes as a stress factor ([@b17-27_36]). The data presented in this paper not only confirm previous observations suggesting that suberin triggers the onset of secondary metabolism ([@b17-27_36], [@b19-27_36]) but also bring to light new characteristics of the changes induced by the presence of suberin. When exposed to this plant polymer, streptomycetes undergo profound morphological modifications. While mechanisms linked to suberin biodegradation in streptomycetes are still largely unknown, determining which suberin constituents trigger differentiation is challenging. Characterization of the secretome of *Streptomyces* species grown in the presence of suberin is in progress. Supplementary Material ====================== This work was supported by the National Sciences and Engineering Research Council of Canada (NSERC) and the Fonds Québécois de Recherche en Nature et Technologie. AL gratefully acknowledges the receipt of a scholarship from NSERC. ![Typical morphology of isolated colonies of *Streptomyces scabiei* EF-35, *S. acidiscabies* ATTC 49003, *S. avermitilis* ATTC 31267, *S. coelicolor* M145 and *S. melanosporofaciens* EF-76 after 5 d of growth on solid minimal starch (1%) medium, complemented or not with 0.1% suberin.](27_36f1){#f1-27_36} ![Electron microscopy images of *Streptomyces scabiei* EF-35 after 7 d of growth in minimal medium (A) or in suberin-supplemented medium (B), at a 35,590× magnification. Arrows show thicker cell wall in bacteria grown in the presence of suberin.](27_36f2){#f2-27_36} ![Extracellular protein contents (±SD) released by mechanical lysis of *Streptomyces scabiei* EF-35 grown in minimal control medium (open circles) and in suberin-minimal medium (solid circles) over a 7-d period.](27_36f3){#f3-27_36} ![Anisotropy (±SD) of the DPH probe incorporated into the membrane of *Streptomyces scabiei* EF-35 grown in minimal medium (open circles) and in suberin-supplemented medium (solid circles) after 1 d of incubation, as a function of temperature (A); and measured at 25°C over a 4-d period (B).](27_36f4){#f4-27_36} ###### Bacterial growth and production of typical secondary metabolites by five *Streptomyces* species grown for 4 d in MM in the absence or presence of suberin Dry mycelial weight (mg±SD) Metabolite production (μg mg DW^−1^±SD)[a](#tfn2-27_36){ref-type="table-fn"} ------------------------- ----------------------------- ------------------------------------------------------------------------------ ----------- ----------------- *S. scabiei* 28±4 90±3\*\*\* n.d. 3.61±0.14\*\*\* *S. acidiscabies* 60±3 88±2\*\*\* 0.05±0.00 1.44±0.42\*\* *S. avermitilis* 27±4 134±3\*\*\* n.d. n.d. *S. coelicolor* 38±1 64±4\*\*\* 0.35±0.20 1.22±0.45\* *S. melanosporofaciens* 41±4 69±6\*\* n.d. 1.32±0.79\*\*\* Values are the means of three replicates. Metabolites assayed were thaxtomin A for *S. scabiei* and *S. acidiscabies*, abamectin for *S. avermitilis*, γ-Actinorhodin for *S. coelicolor* and geldanamycin for *S. melanosporofaciens*. Values from suberin medium are significantly different from control at \*: *P*\<0.05, \*\*: *P*\<0.01 and \*\*\*: *P*\<0.001 (*t*-test). n.d.: not detected; detection limits were 0.05 μg, 0.05 μg and 0.1 μg of total thaxtomin A, abamectin and geldanamycin, respectively. ###### Proteins (mg mL^−1^±SD) released by mechanical lysis performed on five *Streptomyces* species grown for 7 d in the absence or presence of suberin *S. scabiei* *S. acidiscabies* *S. avermitilis* *S. coelicolor* *S. melanosporofaciens* ---------------------- -------------- ------------------- ------------------ ----------------- ------------------------- Control 0.26±0.05 0.75±0.06 0.71±0.06 1.05±0.10 2.23±0.11 Suberin 0.15±0.05 0.48±0.07 0.29±0.04 0.77±0.08 1.52±0.09 *P* value (*t*-test) 0.0005 0.0013 0.0001 0.0223 \<0.0001 Values are the means of four replicates. ###### Membrane fatty acid composition of *Streptomyces scabiei* EF-35 grown for 1 d in minimal medium in the absence or presence of suberin Fatty acids Control (%±SD) Suberin (%±SD) ------------------------------------------------ ---------------- ---------------- Branched-chain\*\* 51.0±3.4 55.2±0.6  *anteiso*-13:0 1.7±0.3 1.7±0.3  *iso*-13:0 2.1±0.1 2.1±0.1  *iso*-14:0 5.4±0.4 5.0±0.3  *iso*-15:0 4.2±0.4 4.22±0.23  *iso*-16:0\*\* 17.5±1.9 20.0±0.2  *anteiso*-15:0 11.3±0.3 12.2±0.5  *iso*-17:0 2.9±0.2 2.7±0.1  *anteiso*-17:0\*\* 6.0±0.4 7.2±0.0 Unsaturated\* 18.8±2.5 15.5±0.3  16:1 ([@b9-27_36])*cis*\* 16.4±3.1 13.0±0.1  *iso*-17:0 2.4±0.6 2.5±0.2 Straight-chain 30.2±0.9 29.3±1.4  14:0 1.2±0.3 1.1±0.3  14:0 3-OH 5.6±0.4 5.3±0.1  15:0 3.3±0.6 3.2±0.7  16:0 15.3±1.7 14.3±0.5  17:0 cyclopropane ([@b9-27_36], [@b10-27_36]) 3.7±1.1 4.2±0.4  18:0 1.1±0.1 1.2±0.0 Values are the means of six replicates (three replicates of two repeats). ANOVA; \*: *P*\<0.05, \*\*: *P*\<0.01.
{ "pile_set_name": "PubMed Central" }
Rick And Morty Adult Swim’s Rick And Morty is a show that doesn’t play by the rules of our boring dimension. The problems that its characters face tend be on such a grand and cosmic scale that it’s not a big deal if some alternate realities get destroyed or if possibly benign alien creatures get chained up in the basement. Justin Roiland, the show’s co-creator, evidently works on a similar level, because last night he tweeted a bunch of pictures and information about a new show he’s working on with Rick And Morty writer Mike McMahan, and apparently he wasn’t supposed to do that. The show is titled Solar Opposites, and Roiland and McMahan are developing it with 20th Century Fox. Based on all of the stuff Roiland tweeted, it sounds like a fish-out-of-water-style comedy about a family (?) of aliens who crash land on Earth when their planet is destroyed. One of the aliens is named Terry, and it sounds like human girls love him even though he’s “the messy irresponsible one.” (“TV trope!” Roiland adds.) Play it safe @pleaseprint said I shouldn’t share this, but I’m a rule breaker. In development at @20thcenturyfox : pic.twitter.com/IeYCwdSi7A — Justin Roiland (@JustinRoiland) September 12, 2015 As he was tweeting all of that, McMahan found out and told Roiland to stop, prompting Roiland to respond with a gracious “FUCK YOU.” The whole saga is pretty funny—even if it was all orchestrated for our amusement (the fact that Roiland’s tweets of the art weren’t deleted seems a bit telling)—so we should keep an eye out for Solar Opposites to maybe become a real show in the future. [h/t Den Of Geek]
{ "pile_set_name": "OpenWebText2" }
If you're stuck with a system with inadequate graphics horsepower with no way to upgrade the GPU—laptop, a mini PC configuration, and so forth—you may wish you could sell your soul for a solution, but that's a little extreme. A little less extreme is to invite the Devil into your home. Powercolor's Devil Box, that is. The Devil Box is another of a small number of external graphics card enclosures out there. It's based on AMD's XConnect technology introduced earlier this year and works with "qualified" graphics cards from both AMD and Nvidia. A 500W power supply sits inside the Devil Box. It's an easy process to setup and use—just plug a compatible graphics card into the enclosure like you would a free PCI-E x16 slot on your motherboard, attach the power cables, and then connect the Devil Box to your ultra-thin laptop, Skull Canyon NUC, or whatever other system you're injecting with an external graphics upgrade using the included Thunderbolt 3 cable. The PSU can provide up to 375W of power to the graphics card, with the rest of its capacity going to four USB 3.0 ports (one on the front, three in back), a GbE LAN interface, and up to 60W for charging devices over the USB 3.1 Type-C port. There's also a 2.5-inch drive bay inside for installing an SSD to use as external storage, though that's a complimentary feature and obviously not the main selling point. The Devil Box is all about the graphics. To that end it supports AMD's latest Radeon RX 480 and Nvidia's GeForce GTX 10 series graphics cards, according to Newegg, which is the only place it's available in the U.S. Powercolor said it's only making a limited number of these available to be sold in the U.S., Germany (Mindfactory), the U.K. (Overclocker), China (JD), Japan (Amazon), and Singapore (Banleong). It's priced at $380 (€419) and that's without a graphics card. That's pricey (though not as much as the Razer Core at $500) and you'll have to decide if it's worth the cost or if that money would be better spent on a new system altogether.
{ "pile_set_name": "OpenWebText2" }
Olivia Musgrave Olivia Musgrave, Baroness Gardiner of Kimble (born 1958) is an Irish sculptor. Biography Olivia Musgrave was born in Dublin in 1958. She studied Political Science in Paris and lived in Italy. She then studied at the City and Guilds of London Institute under sculptor Allan Sly. Her work is reminiscent of Greek mythology and Marino Marini, Arturo Martini, El Greco and Giacomo Manzù. It can be found at the John Martin Gallery in London, the Royal Hibernian Academy and Jorgensen Fine Art in Dublin, the Everard Read Gallery in Johannesburg, South Africa, and the Somerville Manning Gallery in the US. She is a Fellow of the Royal Society of Sculptors and a Member of the Society of Portrait Sculptors. In 2014 she was elected President of the Society of Portrait Sculptors. In 2004, she married John Gardiner, Baron Gardiner of Kimble. References Category:Living people Category:1958 births Category:People from Dublin (city) Category:Irish sculptors
{ "pile_set_name": "Wikipedia (en)" }
Cutaneous facial sinus tract of dental origin. Cutaneous sinus tract on the head and neck area in a child may originate from dental disease. A high degree of clinical suspicion and complementary tests are often needed, as the diagnosis is usually not straight forward. Anatomical correlation is also useful in tracing the affected tooth or teeth. We present the case of a boy with a facial sinus tract that originated from periapical abscesses of maxillary molars.
{ "pile_set_name": "PubMed Abstracts" }
Q: How do I only select images using reddit json? I am trying to get a list of images from a specific reddit and send them to the user randomly. Is there a way to only get the json that lists a url? I try to just get to this path down below, but it ends up throwing an error sense it is a nested array "kind": "Listing", "data": { "modhash": "2l53o1urucfcc06e46b02a400997e1d810b258af76c74bce9d", "dist": 25, "children": [ { "kind": "t3", "data": { "thumbnail": "https://b.thumbs.redditmedia.com/AihwJOuW0jmGvdJqd71rVCQCA7nJYc4KoyclJttNn_c.jpg", I want it to return a random image from the huge array. again my attempts threw in error about formatting the parser every post is in the array of children, I want to access the lot of thumbnails and list them I get the json from reddit.com/r/pics/top.json I use request console.log(parsedData["data"]["children"]...) I do not know how to get past that to data without throwing an error A: parsedData.data.children.forEach(imageUrl => { console.log(imageUrl.data.thumbnail) })
{ "pile_set_name": "StackExchange" }
DICK Wolf, who made a franchise out of "Law & Order," has a second franchise in the works: Killing off disgraced publisher, Judith Regan. Friday night will mark the second time in as many years that a Judith-like "high-profile publisher" character is brutally murdered. And the second time a suspect is a man she first played around with and then played for a fool. First time "L&O" killed her off in 2005, it was on Michael Imperioli's first episode on the series called "Publish and Perish," in which both a porn actress ala Jenna Jameson (who was a real-life Regan "author"), and a Judith Regan-like high profile publisher are murdered. Who done it that time? Bernie Kerik - or the Kerik-like "ambitious and powerful police commissioner nominated for the nation's top security post." But back then Wolf didn't know that the publisher's high profile love affair with the very-married Kerik and the publication of Jameson's scandalous book wouldn't be the worst of the sludge to be drudged from the slush pile of Regan's life. There was the O.J. book yet to come. On Friday night's episode, "Murder Book," "L&O" kills off the Regan character again - but this time because of a book in which ex-athlete (Bobby Cannavale) postulates how he would have killed his ex-wife if he had killed his ex-wife, which of course he didn't. When the Regan-type is found slain with her blood and guts smeared around the hallway of her apartment building, there are many suspects. It's a matter of eliminating everyone who could have wanted her dead. That of course means everyone who's ever worked for her, slept with her or, well, basically ever known her. Was it JP Lang, the ex-athlete and murderer of his wife? Was it Gerald Stockwell, (Christopher Denham), the ghost writer of Lang's tell-nothing? Was it her assistant whom she treated like a piece of dog poop on the sole of her Manolo's? Or was it a collective effort by everyone in the world? Everyone, it seems, has a reason to knock her off. Lang says they had a strictly sexual relationship until she wanted to move it to the level of a relationship-relationship. "She wanted us to go to St. Bart's together," he sneers. "Can you imagine being alone on an island with that bitch?" The ghost writer has a reason to want her dead because she rejected his draft and canned him from the book. Well, like I said, everyone has a reason, but who really has a motive? Good stuff. Lots o' fun - unless of course you are Judith Regan, in which case you've got a reason and a motive to kill - the writers - of "Law & Order" who cut you no slack lady. No slack at all.
{ "pile_set_name": "Pile-CC" }
President Donald Trump stops to talk to the media before walking across the South Lawn of the White House in Washington, Monday, Oct. 22, 2018, to board Marine One helicopter for a short trip to Andrews Air Force Base, Md., en route to Houston. (AP Photo/Pablo Martinez Monsivais) | AP Photo/Pablo Martinez Monsivais Fourth Estate What’s the Difference Between Trump and a Russian Twitter Troll? One’s a 44-year-old accountant who faces five years in prison on federal charges. The other is the president. Jack Shafer is Politico’s senior media writer. What’s the difference between Donald Trump and Elena Khusyaynova, the 44-year-old Russian accountant who faces five years in prison if convicted on federal charges brought against her Friday for conspiring to interfere in the U.S. political system and the 2018 midterm election via social media messages and advertisements? Are there any differences? After you factor out the obvious incongruities—age, nationality, gender, city of residence, and employer—Donald and Elena share so much in terms of political style and substance, we should expect a presidential pardon for her and maybe even a White House ceremony in which Trump will loop a Presidential Medal of Freedom around her neck. Much of what smells like criminal conspiracy to the Department of Justice in the Khusyaynova case—”sow division and discord in the U.S. political system”; “address divisive U.S. political and social issues”; “advocate for the election or electoral defeat of particular candidates”; stage and promote “political rallies inside the United States”; inflame “passions on a wide variety of topics, including immigration, gun control and the Second Amendment, the Confederate flag, race relations, LGBT issues, the Women’s March, and the NFL national anthem debate”—could easily be mistaken for an average Twitter week for the president. When is he not sowing division and discord on these issues? When is he not advocating for somebody’s defeat? And who loves to stage and promote political rallies inside the United States more than Trump? I’m OK with all of you quibblers who will step up now to object that Khusyaynova and “Project Lakhta,” whose finances she masterminded and directed, did their politicking through fake personas and bogus social media accounts and Trump does his sowing under his own signature. But setting that aside, many of the Russian rants collected in the criminal complaint overlay Trump’s tweets almost perfectly. For instance, Project Lakhta members at the Facebook group “Secured Borders” gave these Trumpian tips on what to write on social media platforms. “Brand [Sen. John] McCain as an old geezer who has lost it and who long ago belonged in a home for the elderly.” Speaker Paul Ryan was to be branded as “a complete and absolute nobody incapable of any decisiveness.” Special counsel Robert Mueller? “[A] puppet of the establishment.” Sen. Marco Rubio? “[A] fake conservative who is a traitor to Republican values and who in his soul despises the American Constitution and civil liberties.” The leadership in sanctuary cities should be characterized as having “lost all connection with reality” and “trying to provide criminals who illegally crossed the U.S. borders with voting rights that are available only to the citizens of the United States.” Compare these Russian fakes with genuine expressions from the president’s keyboard. Today he tweeted, “Sadly, it looks like Mexico’s Police and Military are unable to stop the Caravan heading to the Southern Border of the United States. Criminals and unknown Middle Easterners are mixed in. I have alerted Border Patrol and Military that this is a National Emergy. Must change laws!” On Friday he wrote, “Beto O’Rourke is a total lightweight compared to Ted Cruz, and he comes nowhere near representing the values and desires of the people of the Great State of Texas. He will never be allowed to turn Texas into Venezuela!” Last week, he thumbed this gem of discord and division: “Thank you to the Cherokee Nation for revealing that Elizabeth Warren, sometimes referred to as Pocahontas, is a complete and total Fraud!” At a Saturday political rally in Elko, Nevada, Trump claimed that people in California who dislike sanctuary cities are “rioting now. They want to get out of their sanctuary cities.” To be fair to Khusyaynova and her alleged paymaster, Yevgeny Prigozhin—the sanctioned Russian oligarch who goes by the nickname “Putin’s chef” and was indicted in February for election meddling by Mueller—some of Project Lakhta’s work tilted against Trump. For example, Senate Majority Leader Mitch McConnell was targeted in one campaign. Tweets directing the masses to take to the streets in protest should Trump can Mueller were disseminated. And a tweet about Republicans banning women’s health care choices was retweeted. But the basic thrust of Project Lakhta appears to have been in support of Trump and against his opponents. “The strategic goal of this alleged conspiracy, which continues to this day, is to sow discord in the U.S. political system and to undermine faith in our democratic institutions,” said U.S. Attorney G. Zachary Terwilliger. Terwilliger was speaking of Khusyuaynova in this press release, but he could just as easily been describing Trump’s anti-democratic onslaught of the past two years. Trump threatened he might not accept the results of the 2016 election should he be declared the loser. He attacks judges whose rulings he disagrees with. He praises dictators. He continues to make bogus claims about massive voter fraud. And he’s been spreading disinformation heading into the midterm elections. By any rational measure, he’s a greater underminer of faith in our democratic institutions that a pack of devious Russians practicing social-media mischief. While I’m fine with the Department of Justice throwing the book at the meddling Russians halfway around the world, what about the shenanigans just 6½ blocks from DOJ headquarters on Pennsylvania Avenue NW? ****** Send anti-democratic rants to [email protected]. My email alerts specialize in disinformation. My Twitter feed has a bone to pick with the judiciary. My RSS feed votes one million times in each election.
{ "pile_set_name": "OpenWebText2" }
1. Introduction {#sec1} =============== Multilevel inverters have generally functioned as an AC voltage synthesizer to create a quasi-sinusoidal voltage i.e., rough sinusoidal waveform with desired steps using several DC power supplies \[[@bib1]\]. Hence, high number of switching components has let the multilevel inverter to render a quasi-sinusoidal voltage with high quality \[[@bib2]\]. The first multilevel inverter prototype has been constructed and analyzed by Nabae et al. \[[@bib3]\]. Since that time, these structures have been captivating more industrial and academic consideration in the various medium voltages that such these multilevel structures have investigated in several literatures to elucidate the rating problem related to voltage and current of switching components \[[@bib4], [@bib5], [@bib6], [@bib7], [@bib8]\]. One of the strongpoints of these structures other than creating a pertinent quasi-sinusoidal waveform is their feasibility to occupy them in transmission and sub-transmission levels for such these reasons: reduction of SPL, PIV, dV/dt and EMI \[[@bib9], [@bib10], [@bib11]\]. One more special strongpoint of these structures is their capability in harmonic alleviation, avoiding the high frequency of semiconductors\' switching either reduction of the inverter\'s output power \[[@bib12], [@bib13], [@bib14]\]. Multilevel inverter is known as one of the most advanced and prominent power electronic structures. They have been widely applied in manifold compensators and energy conversion systems e.g., HVDC, FACTS, PV, UPS and Industrial drive systems. The conventional multilevel inverters have been essentially divided into three categories that are CHB, NPC, FC \[[@bib15], [@bib16], [@bib17]\]. It is worth mentioning that, the conventional multilevel inverters have borne high switching elements such as: switches, capacitors, diodes and the suchlike toward producing high step number. Over the past several years, many different structures and technologies based on IJBT and MOSFET semiconductors with have been introduced \[[@bib18], [@bib19], [@bib20], [@bib21]\]. Apart from the beneficial advantages of multilevel inverters, existence of a large number of semiconductor switches is their most important disadvantage that consequently will bring such detriments: complexity of the circuit and control strategy, increase of the structure\'s cost-price, decrease of the reliability, and maintenance of the structure. Therefore, it is essential that the number of switching components to be decreased. Across the world, the scholars are attempting and venturing to improve and introduce high performance multilevel inverters with reduced components so that the aforementioned problems related to the conventional multilevel inverters to be obviated e.g.: \[[@bib22], [@bib23], [@bib24], [@bib25], [@bib26]\]. Such the reduced multilevel topologies have generally competed with each other over the: low THD, and number of switching components as well as high-step of quasi-sinusoidal voltage, in which case, an inventive AMLI has been designed and introduced in this paper so that not only low number of components to be applied, but also high-step quasi-sinusoidal voltage to be attained. The proposed sub-AMLI has been designed based on the ladder capacitor clamped to H-bridge by means of the bi-directional switches. Based on an innovative geometric progression for DC power supplies of AMLI, it can operate as so-called odd-nary AMLI. In recent years, the power electronics experts have been endeavoring to enhance the conventional multilevel inverter structures and voltage quality. Therefore, undesirable voltage harmonics of multilevel inverters with DC power supplies can be reduced by the advantageous modulation strategies such as PWM and SVPWM \[[@bib27], [@bib28]\]. It should be considered, these strategies cannot accurately reduce the relevant harmonic components. Another strategy has been functioned in accordance with selection of the triggering angles to reduce the lower order harmonics viz. third, fifth, seventh from the quasi-sinusoidal voltage which is recognized by SHE \[[@bib29], [@bib30], [@bib31]\]. A principal problem as regards of such these strategies is acquiring the arithmetic solution of nonlinear transcendental equations which include the trigonometric clauses. These relationships can be also solved by iterative methods including Newton--Raphson \[[@bib32]\]. Unfortunately, its dependency on the initial estimation points may cause trapping in local optima. Therefore, this approach can\'t be considered to unravel the SHE problem with various triggering angles whereas have no initial estimation points. One more strategy has been operated via converting the transcendental equations into the polynomial equations \[[@bib33], [@bib34]\]. If the step number of voltage to be increased, the computational burden is highly intensified. As for the capability of heuristic algorithms in solving the complex objective functions, they have been widely used to figure out the optimal triggering angles. Toward this subject, PWM-based scission-style harmonic elimination has been designed and implemented to enhance voltage quality of AMLI. Hence, three prominent criterions related voltage quality i.e., desired fundamental component, elimination of third harmonic and Reduction of THD have been assigned as objective functions of optimization problem. Considering the multi-objective nature of the optimization problem, non-dominated sorting MOGWO has been implemented to solve the optimization problem, and then compared with NSGA-II. To sum up, the relevant analytical studies along with both the simulation and experimental results have transparently validated the performance of suggested AMLI. Also, the voltage quality problem using MOGWO-based scission-style harmonic elimination strategy has been well approved. 2. Suggested odd-nary multilevel inverter {#sec2} ========================================= A new AMLI structure is proposed aimed to provide high-step quasi-sinusoidal with respect to few switch numbers. Suggested AMLI can feasibly act as both the symmetric and statuses. According to the [Figure 1](#fig1){ref-type="fig"}, sub-AMLI is composed using DC power supplies, capacitors along with unidirectional and bidirectional semiconductor switches. By cascading of these sub-multilevel inverters the overall construction of the proposed AMLI is revealed. The relevant components utilized in suggested AMLI are given as follows:$$N_{\text{uni-directional}} = 4.N_{Source}$$$$N_{\text{bi-directional}} = \left( {k - 1} \right).N_{Source}$$$$N_{\text{Switch}} = N_{\text{uni-directional}} + 2N_{\text{bi-directional}} = 2\left( {k + 1} \right).N_{Source}$$$$N_{\text{capacitor}} = k.N_{Source}$$Figure 1(a). Proposed cascaded multilevel inverter. (b). Prototype\'s photograph of suggested AMLI.Figure 1 Having said that, Based on an innovative geometric progression for DC power supplies with different ratios a pertinent sinusoidal voltage with uniform step has been provided. Both symmetric and asymmetric operations of suggested structure have been explained in detail in as follows. To confirm the suggested AMLI concept, 25-level quasi-sinusoidal of [Figure 1 (a)](#fig1){ref-type="fig"} has been constructed and analyzed. Todd-nary AMLI can provide staircase sinusoidal voltage with maximum of 120 V on the output. For this case, a single-phase resistive-inductive load is considered as the test load with R = 170 ^Ω^ and L = 400 ^mH^. The prototype\'s photograph has been provided and also presented in [Figure 1](#fig1){ref-type="fig"}(b). The prototype AMLI has been constructed by BUP403 (600 V, 42A) IGBTs as switching devices, IRS2113 as IGBT driver, and BYW (56 V) as fast-recovery diodes. The IC ATMega 64 microcontroller by ATMEL Company has been utilized in order to create the triggering scheme." 2.1. Multilevel symmetrical status {#sec2.1} ---------------------------------- Based on the formation of bidirectional switches, capacitors and module numbers accompanied by particular switching operation the quasi-sinusoidal voltage with requires steps can be provided. In symmetrical operation, the values of DC power supplies are equal in symmetric status i.e., V~dc~. It is obvious that the steps of quasi-sinusoidal voltage will be increased by adding bidirectional semiconductor switches along with capacitors, and subsequently with cascading them. In accordance with the triggering of the switches\' gates as well as the arrangement of components, different voltage levels are created. Sub-structure can be designed based on essential components, while, one bidirectional switch along with two capacitors (k = 2) provides five levels, two bidirectional switches along with three capacitors (k = 3) provides seven levels and in the same way k-1 bidirectional switch along with k capacitors provides 2k+1 levels. For better understanding, the switching strategy considering: two capacitors for each sub-structure and two sub-structure modules i.e. k = 2 and n = 2 are tabulated in [Table 1](#tbl1){ref-type="table"}. The output voltage of each module accompanied by overall output voltage of multilevel inverter for this condition is given in [Figure 2 (a)](#fig2){ref-type="fig"}. Furthermore, the relevant experimental results are presented in [Figure 2 (b)](#fig2){ref-type="fig"}.Table 1Relevant triggering mode of suggested multilevel inverter as symmetrical operation.Table 1ON SwitchesV~out_symmetric~ON SwitchesV~out_symmetric~H~4~^1^, S~1~^1^, H~1~^2^, H~2~^2^ (H~1~^1^, H~2~^1^, H~4~^2^, S~1~^2^)1S~1~^1^, H~2~^1^, H~3~^2^, H~4~^2^ (H~3~^1^, H~4~^1^, H~2~^2^, S~1~^2^)-1H~4~^1^, H~1~^1^, H~1~^2^, H~2~^2^ (H~4~^1^, S~1~^1^, H~4~^2^, S~1~^2^)2H~3~^1^, H~2~^1^, H~3~^2^, H~4~^2^ (S~1~^1^, H~2~^1^, H~2~^2^, S~1~^2^)-2H~4~^1^, H~1~^1^, H~4~^2^, S~1~^2^ (H~4~^1^, S~1~^1^, H~1~^2^, H~4~^2^)3H~3~^1^, H~2~^1^, S~1~^2^, H~1~^2^ (S~1~^1^, H~2~^1^, H~2~^2^, H~3~^2^)-3H~4~^1^, H~1~^1^, H~1~^2^, H~4~^2^4H~3~^1^, H~2~^1^, H~2~^2^, H~1~^2^-4H~2~^1^, H~1~^1^, H~1~^2^, H~2~^2^0H~3~^1^, H~4~^1^, H~2~^2^, H~3~^2^0Figure 2(a). quasi-sinusoidal voltage in symmetrical operation with respect to k = 2 and n = 2. b. Experimental results of quasi-sinusoidal voltage in symmetrical operation with respect to k = 2 and n = 2.Figure 2 If each module has k capacitors, all capacitors\' values should be the same. The DC power supplies\' values in terms of capacitors value can be written by:$$V_{in,sub - multlvel} = \sum\limits_{j = 1}^{k}V_{c,j}$$where, $= V_{c,1 =}V_{c,2 =}...V_{c,k} = V_{c}$ Thus:$$V_{in,sub - multlvel} = k.V_{c} = V_{dc}$$ Summing the modules\' outputs, the maximum voltage of multilevel inverter is attained:$$V_{o,\max,symmetric} = \sum\limits_{i = 1}^{n}{V_{in,sub - multlvel,i} =}N_{Source}.k.V_{c} = N_{Source}.V_{dc}$$ Also, voltage step number can be presented by:$$M_{\text{Level,symmetric}} = 2.\left( {k.V_{o,\max,symmetric}} \right)/V_{dc} + 1$$Here, M~Level~/N~Source~ is introduced to accurately inspect the utilization performance of Switches and DC Sources to create the step level. It can be given as follows:$$\frac{M_{\text{Level,symmetric}}}{N_{Source}} = 2\left( {k + \frac{\left( {k + 1} \right)}{N_{Switch}}} \right)$$ 2.2. Multilevel asymmetrical status {#sec2.2} ----------------------------------- For providing a high-step quasi-sinusoidal voltage without adding any components, occupation of asymmetrical multilevel inverters isn\'t avoidable. In the asymmetric structure, the values of DC power supplies are non-equal which are increased in accordance with the particular geometric progression assumed. In general, such these structures are engaged as an alternative approach to minimize the output voltages THD with available electric power components. If each module has k capacitors, DC power supplies\' values in terms of capacitors value can be written by:$$V_{in,sub - multlvel,1} = \sum\limits_{j = 1}^{k}V_{c,j}$$where, $V_{c,1 =}V_{c,2 =}...V_{c,k} = V_{c1}$ Thus:$$V_{in,sub - multlvel} = k.V_{c1} = V_{dc}$$ Also, DC power supply value of the each module is determined by:$$V_{in,sub - multlvel,i} = \left\lbrack {2j + 1} \right\rbrack^{i - 1}V_{dc}$$where, j = 2, 3... k and i = 1, 2... n Summing the modules\' outputs, the maximum voltage of multilevel inverter is attained:$$V_{o,\max,asymmetric} = \sum\limits_{i = 1}^{n}{V_{in,sub - multlvel,i} =}\frac{\left( {\left( {2k + 1} \right)^{N_{Source}} - 1} \right)}{2}k.V_{c1} = \frac{\left( {\left( {2k + 1} \right)^{N_{Source}} - 1} \right)}{2}V_{dc}$$ Also, voltage step number can be presented by:$$M_{\text{Level,asymmetric}} = \frac{\left( {2V_{o,\max,asymmetric}} \right)}{V_{dc}} + 1$$ M~Level~/N~Source~ for asymmetric status can be given as follows:$$\frac{M_{\text{Level,asymmetric}}}{N_{Source}} = \frac{2}{N_{Switch}}.\left( {k + 1} \right) + \left( {2k + 1} \right)^{\frac{N_{Switch}}{2{({k + 1})}}}$$ The advantage of proposed AMLI is its high ability to act the same as "Quinary" with respect to one bidirectional switch along with two capacitors (k = 2), "Septenary" with respect to two bidirectional switches along with three capacitors (k = 3), "Nonary" with respect to three bidirectional switches along with four capacitors (k = 4), "Undenary" with respect to four bidirectional switches along with five capacitors (k = 5), and also in the same way the suggested Odd-nary AMLI has been attained. To have better understanding of aforesaid explanations, the triggering mode of switches considering: two capacitors for each module and two modules i.e. k = 2 and n = 2 are tabulated in [Table 2](#tbl2){ref-type="table"}. Furthermore, the output voltage of each sub-multilevel inverter accompanied by overall output voltage of AMLI is presented in [Figure 3](#fig3){ref-type="fig"}(a). Furthermore, the relevant experimental results are presented in [Figure 3](#fig3){ref-type="fig"}(b).Table 2Relevant triggering mode of suggested multilevel inverter as asymmetrical operation.Table 2ON SwitchesV~out_symmetric~ON SwitchesV~out_symmetric~S~1~^1^, H~4~^1^, H~1~^2^, H~2~^2^1S~1~^1^, H~2~^1^, H~3~^2^, H~4~^2^-1H~1~^1^, H~4~^1^, H~1~^2^, H~2~^2^2H~3~^1^, H~2~^1^, H~3~^2^, H~4~^2^-2H~3~^1^, H~2~^1^, S~1~^2^, H~4~^2^3H~1~^1^, H~4~^1^, S~1~^2^, H~2~^2^-3S~1~^1^, H~2~^1^, S~1~^2^, H~4~^2^4S~1~^1^, H~4~^1^, S~1~^2^, H~2~^2^-4H~1~^1^, H~2~^1^, S~1~^2^, H~4~^2^5H~3~^1^, H~4~^1^, S~1~^2^, H~2~^2^-5S~1~^1^, H~4~^1^, S~1~^2^, H~4~^2^6S~1~^1^, H~2~^1^, S~1~^2^, H~2~^2^-6H~1~^1^, H~4~^1^, S~1~^2^, H~4~^2^7H~3~^1^, H~2~^1^, S~1~^2^, H~2~^2^-7H~3~^1^, H~2~^1^, H~1~^2^, H~4~^2^8H~1~^1^, H~4~^1^, H~3~^2^, H~2~^2^-8S~1~^1^, H~2~^1^, H~1~^2^, H~4~^2^9S~1~^1^, H~4~^1^, H~3~^2^, H~2~^2^-9H~1~^1^, H~2~^1^, H~1~^2^, H~4~^2^10H~3~^1^, H~4~^1^, H~3~^2^, H~2~^2^-10S~1~^1^, H~4~^1^, H~1~^2^, H~4~^2^11S~1~^1^, H~2~^1^, H~3~^2^, H~2~^2^-11H~1~^1^, H~4~^1^, H~1~^2^, H~4~^2^12H~2~^1^, H~3~^1^, H~3~^2^, H~2~^2^-12H~1~^1^, H~2~^1^, H~1~^2^, H~2~^2^0H~3~^1^, H~4~^1^, H~3~^2^, H~4~^2^0Figure 3(a). quasi-sinusoidal voltage in Asymmetrical operation with respect to k = 2 and n = 2. (b). Experimental results quasi-sinusoidal voltage in symmetrical operation with respect to k = 2 and n = 2.Figure 3 2.3. Comparison of proposed multilevel inverter with other conventional multilevel inverters {#sec2.3} -------------------------------------------------------------------------------------------- The capability of proposed multilevel inverter has been compared with other conventional multilevel inverters. To validate its capability, it has been evaluated under both the symmetric and asymmetric operation and compared with the conventional and recently introduced symmetric and asymmetric structures. The relationships between switch numbers in CHB structure, proposed structure in \[[@bib35], [@bib36], [@bib37]\]: and \[[@bib38]\], and M~Level~/N~Source~ benchmark in symmetric status can be respectively given as follows:$$\frac{\text{M}_{\text{Level}}}{N_{Source}}\left\lbrack CHB \right\rbrack = 2 + \frac{1}{4N_{Switch}}$$$$\frac{\text{M}_{\text{Level}}}{N_{Source}}\left\lbrack 35 \right\rbrack = 2\left( {1 + \frac{1}{\left( {N_{Switch} - 2} \right)}} \right)$$$$\frac{\text{M}_{\text{Level}}}{N_{Source}}\left\lbrack 36 \right\rbrack = 2\left( {1 + \frac{1}{\left( {N_{Switch} - 4} \right)}} \right)$$$$\frac{\text{M}_{\text{Level}}}{N_{Source}}\left\lbrack 37 \right\rbrack = \frac{1}{3} + \frac{2}{N_{Switch}}$$$$\frac{\text{M}_{\text{Level}}}{N_{Source}}\left\lbrack 38 \right\rbrack = 2\left( {1 + \frac{3}{\left( {N_{Switch} - 4} \right)}} \right)$$ Also, the relationships between switch numbers in binary and trinary structures \[[@bib37], [@bib38], [@bib39]\]: and \[[@bib40]\], and M~Level~/N~Source~ benchmark in asymmetric status can be respectively given as follows:$$\frac{M_{\text{Level,asymmetric}}}{N_{Source}}\left\lbrack Binary \right\rbrack = \left( \frac{4}{N_{Switch}} \right)\left( {2^{\lbrack{\frac{N_{Switch}}{4} + 1}\rbrack} + 1} \right)$$$$\frac{M_{\text{Level,asymmetric}}}{N_{Source}}\left\lbrack Trinary \right\rbrack = \left( \frac{4}{N_{Switch}} \right)\left( 3^{\lbrack\frac{N_{Switch}}{4}\rbrack} \right)$$$$\frac{M_{\text{Level,asymmetric}}}{N_{Source}}\left\lbrack 37 \right\rbrack = \left( \frac{2}{N_{Switch}} \right)\left( 5^{\lbrack\frac{N_{Switch}}{6}\rbrack} \right)$$$$\frac{M_{\text{Level,asymmetric}}}{N_{Source}}\left\lbrack 38 \right\rbrack = 3 + \frac{2}{N_{Switch} - 4}$$$$\frac{M_{\text{Level,asymmetric}}}{N_{Source}}\left\lbrack 39 \right\rbrack = \left( \frac{2}{\left( {N_{Switch} - 4} \right)} \right)\left( {2^{\lbrack\frac{N_{Switch} - 2}{2}\rbrack} - 1} \right)$$$$\frac{M_{\text{Level,asymmetric}}}{N_{Source}}\left\lbrack 40 \right\rbrack = \left( \frac{3n - 1}{n\left( {N_{Switch} - 4} \right)} \right)\left( {2\left( {n + 1} \right)^{\lbrack\frac{N_{Switch} - 4}{3n - 1}\rbrack} - 1} \right)$$ The variation of M~Level~/N~Source~ benchmark versus switch number varieties of suggested structure and others for symmetrical and asymmetrical statuses are depicted in [Figure 4 (a)](#fig4){ref-type="fig"} and (b).Figure 4(a). Variation of M~Level~/N~Source~ versus of switch numbers of suggested structure and others for symmetric statuses. (b). Variation of M~Level~/N~Source~ versus of switch numbers of suggested structure and others for asymmetric statuses.Figure 4 The portrayed curves in [Figure 4 (a)](#fig4){ref-type="fig"} and (b) validate the high capability of suggested multilevel inverter aimed to create high-step quasi-sinusoidal voltage against the low embedded switches and DC power supplies. Furthermore, the number of required components for suggested multilevel inverter and others are presented in [Table 3](#tbl3){ref-type="table"}. As consequence, the significant problems related to multilevel inverters such as voltage quality, low THD, structure\'s cost price have been attained.Table 3The comparison of the suggested multilevel inverter and other topologies.Table 3ParametersCHBRef. \[[@bib35]\]BinaryTrinaryRef. \[[@bib36]\]Ref. \[[@bib37]\]Ref. \[[@bib38]\]Ref. \[[@bib39]\]Ref. \[[@bib40]\]Suggested InverterNo. of DC SuppliesNNNNNNNNNNNo. of Switches4N2(N+1)4N4N2(N+2)3N2(N+2)2(N+2)3N-12(K+1) per Sub-MLINo. of Steps2N + 12N + 12^(N+1)^-13^N^2N + 13^N^3N-22^(N+1)^-12(n+1)^k^-1(2K + 1)^N^No. of Gate Driver4N2(N+1)4N4N2(N+2)2N2(N+2)2(N+2)3N-1K+3 per Sub-MLINo. of ON State Switches2NN+12N2NN+23/2NN+2N+2(3N-1)/22N + 1 3. Voltage quality improvement scheme based on harmonic elimination Pulse Width Modulation {#sec3} ========================================================================================== 3.1. Harmonic elimination principle {#sec3.1} ----------------------------------- Increase of switches to unravel the voltage quality problem becomes paler because the multilevel inverter provides a quasi-sinusoidal voltage waveform with trivial THD. Toward this subject, voltage quality of the proposed structure has been improved taking into account of ten switches to earn three prominent criterions related voltage quality i.e., desired fundamental component, elimination of third harmonic and Reduction of THD. Hence, nine levels symmetric status of the suggested structure has been considered to better exhibit elimination and reduction of harmonic components. As well, the created quasi-sinusoidal voltage waveform can be extended in Fourier series:$$\upsilon_{out}\left( \alpha \right) = A_{0} + \sum\limits_{n = 1}^{\infty}{A_{n}.\cos\left( {n\alpha} \right)} + B_{n}.\sin\left( {n\alpha} \right)$$where,$$\left\{ \begin{array}{l} {A_{0} = \left( {2\pi} \right)^{- 1}{\int_{0}^{2\pi}{V_{out}\left( \alpha \right).d\alpha}}} \\ {A_{n} = \left( \pi \right)^{- 1}{\int_{0}^{2\pi}{V_{out}\left( \alpha \right).\cos\left( {n\alpha} \right).d\left( \alpha \right)}}} \\ {B_{n} = \left( \pi \right)^{- 1}{\int_{0}^{2\pi}{V_{out}\left( \alpha \right).\sin\left( {n\alpha} \right).d\alpha}}} \\ \end{array} \right.$$ Due to absence of the average value or DC component created by multilevel inverter A~0~ = 0. According to the general quasi-sinusoidal waveform of multilevel inverter presented in [Figure 5](#fig5){ref-type="fig"}\_a, due to being odd function along with quarter-wave symmetry, only sinusoidal part of Fourier series with presence of odd harmonics can be appeared:$$\upsilon_{out}\left( \alpha \right) = \sum\limits_{n = 1,3,5,...}^{\infty}{B_{n}.\sin\left( {n\alpha} \right)}$$Figure 5(a). General quasi-sinusoidal voltage of cascaded multilevel inverter. (b). General scission-style harmonic elimination in quarter cycle waveform of cascaded multilevel inverter.Figure 5 3.2. PWM-based harmonic elimination strategy {#sec3.2} -------------------------------------------- Harmonic elimination strategies have been designed and formulated to eliminate destructive harmonics from the quasi-sinusoidal voltage which is recognized as a contractual approach among the scholars and scientists. It has been essentially employed to decrease the THD from the output of inverter \[[@bib41], [@bib42]\]. Conventional HEPWM method i.e. non-scission HEPWM triggering has some prominent disadvantages. The first, to eliminate or reduce all the harmonics, a number of voltage levels must be produced by multilevel inverter which required more switches. The second, as the suggested symmetric inverter module has been triggered just twice in each quarter cycle, the perfect performance of these switches (high frequency switches) couldn\'t be used. Toward this subject, the scission-style harmonic elimination based on PWM that can modulate a number of angles within specific level provides quasi-sinusoidal voltage waveform with several scissions in each level as shown in [Figure 5 (a)](#fig5){ref-type="fig"}. The significant feature of "this strategy is eliminating further harmonics of low-step quasi-sinusoidal voltage i.e. low switch numbers. Thus, scission-style harmonic elimination owing to more triggering of switches in each quarter cycle, their performance will reach to fullest potential. Moreover, unequal DC power supplies can more augment the performance of this approach aimed to reduce lower order harmonics. Anyhow, the optimization problem has been formulated with various values of: DC power supplies, pulses width of quasi-sinusoidal waveform and triggering angles in each level which can be perceived with envisaging the [Figure 5 (b)](#fig5){ref-type="fig"}. Fourier series of steppes quasi-sinusoidal voltage with non-equal dc sources can be presented by (28): Where, s is the number of DC power supplies, and the *V*~*k*~*V*~*DC*~ is amount of the *kth* DC power supply. If all of DC power supplies have the equal value therefore *V*~*1*~*=V*~*2*~*= ...=V*~*S*~ *= 1*. Also, α~1~... α~m1~ are the triggering transitions in the first level, α~m1+1~...α~m1+m2~ are the triggering transitions in the second level, and the same α~m1+m2+...+1~ +...+ α~m1+m2+...+ms~ are the triggering transitions in the last level. The solution set will be attained using maintaining the value of fundamental component of output voltage in desirable value, *V*~*f*~, and all the harmonics except first set to be zero as presented by (31)--(33), and also the modulation index can be determined by Eqs. [(34)](#fd34){ref-type="disp-formula"} and [(35)](#fd35){ref-type="disp-formula"}:$$\upsilon_{out}\left( {\omega t} \right) = \sum\limits_{n = 1,3,5,...}^{s}\left\langle {\frac{4V_{f}}{n\pi}.\left\lbrack {\upsilon_{1}\sum\limits_{i = 1}^{m_{1}}{\left( {- 1} \right)^{i + 1}\ \cos\ n\alpha_{i} \pm \upsilon_{2}\sum\limits_{i = m_{1} + 1}^{m_{2}}{\left( {- 1} \right)^{i + 1}\ \cos\ n\alpha_{i}}} \pm ... \pm \upsilon_{s}\sum\limits_{i = m_{({s - 1})} + 1}^{m_{s}}{\left( {- 1} \right)^{i + 1}\ \cos\ n\alpha_{i}}} \right\rbrack} \right\rangle\sin\left( {n\omega t} \right)$$$$\hslash_{1} = \left\lbrack {\sum\limits_{i = 1}^{m_{1}}{\left( {- 1} \right)^{i - 1}\ \cos\ \alpha_{i} + \sum\limits_{i = m_{1} + 1}^{m_{2}}{\left( {- 1} \right)^{i - {({m_{1} + 1})}}\ \cos\ \alpha_{i}}} + ... + \sum\limits_{i = m_{({S - 1})} + 1}^{m_{S}}{\left( {- 1} \right)^{i - {({m_{({S - 1})} + 1})}}\ \cos\ \alpha_{i}}} \right\rbrack = M$$$$\hslash_{2} = \left\lbrack {\sum\limits_{i = 1}^{m_{1}}{\left( {- 1} \right)^{i - 1}\ \cos\ 5\alpha_{i} + \sum\limits_{i = m_{1} + 1}^{m_{2}}{\left( {- 1} \right)^{i - {({m_{1} + 1})}}\ \cos\ 5\alpha_{i}}} + ... + \sum\limits_{i = m_{({S - 1})} + 1}^{m_{S}}{\left( {- 1} \right)^{i - {({m_{({S - 1})} + 1})}}\ \cos\ 5\alpha_{i}}} \right\rbrack$$$$\hslash_{m} = \left\lbrack {\sum\limits_{i = 1}^{m_{1}}{\left( {- 1} \right)^{i - 1}\ \cos\left( {3m - 2} \right)\alpha_{i} + \sum\limits_{i = m_{1} + 1}^{m_{2}}{\left( {- 1} \right)^{i - {({m_{1} + 1})}}\ \cos\left( {3m - 2} \right)\alpha_{i}}} + ...}{+ \sum\limits_{i = m_{({S - 1})} + 1}^{m_{S}}{\left( {- 1} \right)^{i - {({m_{({S - 1})} + 1})}}\ \cos\left( {3m - 2} \right)\alpha_{i}}} \right\rbrack$$$$M = \frac{\pi V_{f}}{4V_{DC}},\mspace{9mu} 0 \leq M \leq S$$$$M_{i} = \frac{M}{S},\mspace{9mu} 0 \leq M_{i} \leq 1$$ 3.3. Multi-objective functions {#sec3.3} ------------------------------ To achieve both aforesaid prominent targets, objective functions are determined by (36), (37). The optimal problem will be solved by minimizing both aforesaid equations by MOGWO which will be explained next section.$$F_{1} = THD = V_{f}^{- 1}.\sqrt{\sum\limits_{i = 2}^{\infty}\hslash_{i}^{2}}$$$$F_{2} = \left| {\hslash_{1} - M} \right|$$$$F_{3} = \hslash_{3}$$ For appropriately carrying out the scission-style harmonic elimination scheme, it is impressive that an accurate sequencing of the triggering angles to be presented; i.e.:$$0 \leq \alpha_{1} < \alpha_{2}... < \alpha_{m_{1}}... < \alpha_{m_{S}} \leq \frac{\pi}{2}$$ Also, in order to augment this approach regarding to further harmonics, it can be taken into account that DC power supplies have non-similar magnitudes, i.e.:$$0 < V_{1} \neq V_{2} \neq ... \neq V_{s} \leq 1$$ And same the prior created restriction, different pulse-widths can be considered as one more criterions to augment the scission-style harmonic elimination scheme. Its relevant constraint is given as follows:$$0 < \alpha_{m_{1}} < \alpha_{m_{2}} < ... < \alpha_{m_{S}} < \frac{\pi}{2}$$ The multi-objective problem will be unravelled with consideration (39)--(41). 4. Description of non-dominated sorting multi objective grey wolf optimization & non-dominated Sorting Genetic Algorithm II {#sec4} =========================================================================================================================== Due to multi-objective nature of the harmonic elimination strategy, the optimization problem has been formulated based on MOGWO to precisely extract the triggering angles of IGBTs\' gates toward enhance the voltage quality of multilevel inverter. To apprise and confirm this optimization scheme, it has been compared with NSGA-II. Both the MOGWO and NSGA-II have been described in following subsections. 4.1. Non-dominated sorting multi objective grey wolf optimization {#sec4.1} ----------------------------------------------------------------- ### 4.1.1. Grey wolf optimization review {#sec4.1.1} GWO is a novel and advanced swarm based optimization algorithm inspired by imitating the headship hierarchy and hunting strategy of grey wolves. The performance of GWO is demonstrated more suitable than other prevalent optimization algorithm such as genetic algorithm and particle swarm optimization \[[@bib43]\]. Moreover, GWO is a high performance optimization technique with respect to its fast convergence (due to its search mechanism) and perceptible mathematical structure \[[@bib44]\]. Better and more precise, all wolves are divided into four groups according to their fitness. GWO search mechanism has been conducted by the best three wolves in any iteration. This mechanism upgrades the exploration so that all engaged wolves to be attracted, then the best three wolves, as a result of that the fast convergence will be obtained. ### 4.1.2. Multi-objective optimization {#sec4.1.2} Multi-objective optimization is functionally constructed for solution of a multi-dimensional problem. The optimization problem formulation as a multi-objective minimization problem can be given by \[[@bib45], [@bib46]\]:$$Minimize\quad F\left( \overset{\rightarrow}{x} \right) = f_{1}\left( \overset{\rightarrow}{x} \right),f_{2}\left( \overset{\rightarrow}{x} \right),...,f_{N}\left( \overset{\rightarrow}{x} \right)$$ Subject to:$$\begin{matrix} {g_{i}\left( \overset{\rightarrow}{x} \right) \leq 0,} & {\text{i} = 1\text{,}2\text{,...,m}} \\ {h_{i}\left( \overset{\rightarrow}{x} \right) = 0,} & {\text{i} = 1\text{,}2\text{,...,p}} \\ {L_{i} \leq x_{i} \leq U_{i},} & {\text{i} = 1\text{,}2\text{,...,n}} \\ \end{matrix}$$Where n, m, p, N are respectively: the number of variables, inequality constraints, equality constraints and objective functions. *g*~*i*~ and *h*~*i*~ are respectively the *i-th* inequality and equality constraints, and \[*L*~*i*~,*U*~*i*~\] indicates the *i-th* variable boundaries. Optimized single-objective results can simply be compared because of the unique objective function. Whereas, the extracted results from a multi-objective space may not be compared according to the relational operators because of multi-criteria objective functions. Hence, multi-objective problem has been unravelled via storing a set of the best solutions in a decision space. This space saves an archival record which is provided for the non-dominated solutions during the search process. The archival space has been initialized and iteratively updated, then, the best solutions are figured out as non-dominated set or Pareto optimal front (surfaces) \[[@bib47]\]. The mathematical description of Pareto dominance is presented to acquire minimum solution: **Statement 1.** Pareto Dominance: Assume the existence of two vectors such as: $\overset{\rightarrow}{\text{x}} = \left( \text{x}_{1}\text{,}\ \text{x}_{2}\text{,}\text{…}\text{,}\ \text{x}_{\text{k}} \right)$ and $\overset{\rightarrow}{\text{y}} = \left( \text{y}_{1}\text{,}\ \text{y}_{2}\text{,}\text{…}\text{,}\ \text{y}_{\text{k}} \right)$. Vector *x* dominates vector *y* i.e., *x*≻*y* if:$$\forall i \in \left\{ {1,2,...,k} \right\}\text{;}\left\lbrack {\text{f}\left( \text{x}_{\text{i}} \right) \geq \text{f}\left( \text{y}_{\text{i}} \right) \land \left\lbrack {\exists i \in 1,2,...,k:f\left( x_{i} \right)} \right\rbrack} \right\rbrack$$ Pareto front (surface) is stated by \[[@bib48]\]: **Statement 2.** Pareto Optimality: A solution $\overset{\rightarrow}{x}$ ε*X* is named Pareto optimal if:$$\left. \exists\overset{\rightarrow}{y} \in X \middle| F\left( \overset{\rightarrow}{y} \right) \succ F\left( \overset{\rightarrow}{x} \right) \right.$$ The non-dominated solutions set is named by Pareto optimal set which is stated by: **Statement 3.** Pareto optimal set: A Pareto-optimal solution set is named Pareto set by:$$P_{s} = \left\{ x,y \in X \middle| \exists F\left( y \right) \succ F\left( x \right) \right\}$$ A set including the relevant objective contents in Pareto optimal set is named Pareto optimal front (surface) which is states by: **Statement 4.** Pareto optimal front (surface): A set including the objective functions\' value with regard to Pareto solutions set:$$P_{f} = \left\{ F\left( x \right) \middle| x \in P_{s} \right\}$$ ### 4.1.3. Grey wolf optimization {#sec4.1.3} This algorithm is inspired by the gregarious headship and hunting strategy of grey wolves. The social hierarchy of wolves is mathematically designed with consideration of the best solution as α wolf. Also, the second and third appropriate solutions are respectively considered as β and $\delta$ wolves. Wolves that have are considered as $\omega$ wolves. Based on GWO, hunting or optimization has been carried out using α, β and $\delta$, withal the $\omega$ wolves have optimally pursued these three wolves. As for the [Figure 6](#fig6){ref-type="fig"}, the siege strategy of grey wolves during the hunting can be presented by:$$\overset{\rightarrow}{D} = \left| {\overset{\rightarrow}{C}.{\overset{\rightarrow}{X}}_{p}\left( t \right) - \overset{\rightarrow}{X}\left( t \right)} \right|$$$$\overset{\rightarrow}{X}\left( {t + 1} \right) = {\overset{\rightarrow}{X}}_{p}\left( t \right) - \overset{\rightarrow}{A}.\overset{\rightarrow}{D}$$where, t, ${\overset{\rightarrow}{X}}_{p}$ and $\overset{\rightarrow}{X}$ are respectively the current generation, the hunt situation vector, and the grey wolf situation vector. $\overset{\rightarrow}{A}$ and $\overset{\rightarrow}{C}$ are coefficient vectors.Figure 6Updating strategy of search operators by the weight.Figure 6 $\overset{\rightarrow}{A}$ and $\overset{\rightarrow}{C}$ are mathematically presented by:$$\overset{\rightarrow}{A} = 2\overset{\rightarrow}{a}.{\overset{\rightarrow}{r}}_{1} - \overset{\rightarrow}{a}$$$$\overset{\rightarrow}{C} = 2{\overset{\rightarrow}{r}}_{2}$$where, $\overset{\rightarrow}{a}$ is linearly subsided from 2 to 0 through the increase of iterations and *r*~*1*~ and *r*~*2*~ indicate the random vectors in \[0,1\]. The first three best solutions are preserved which are attained yet, then other search operators considering the omegas are compelled to improve their situation according to them. The following equations have been continually performed for each search operator during the optimization to construct the hunting mechanism and finding the desirable areas of the search space:$${\overset{\rightarrow}{D}}_{\alpha} = \left| {{\overset{\rightarrow}{C}}_{1}.{\overset{\rightarrow}{X}}_{\alpha} - \overset{\rightarrow}{X}} \right|$$$${\overset{\rightarrow}{D}}_{\beta} = \left| {{\overset{\rightarrow}{C}}_{2}.{\overset{\rightarrow}{X}}_{\beta} - \overset{\rightarrow}{X}} \right|$$$${\overset{\rightarrow}{D}}_{\delta} = \left| {{\overset{\rightarrow}{C}}_{3}.{\overset{\rightarrow}{X}}_{\delta} - \overset{\rightarrow}{X}} \right|$$$${\overset{\rightarrow}{X}}_{1} = {\overset{\rightarrow}{X}}_{\alpha} - {\overset{\rightarrow}{A}}_{1}.\left( {\overset{\rightarrow}{D}}_{\alpha} \right)$$$${\overset{\rightarrow}{X}}_{2} = {\overset{\rightarrow}{X}}_{\beta} - {\overset{\rightarrow}{A}}_{2}.\left( {\overset{\rightarrow}{D}}_{\beta} \right)$$$${\overset{\rightarrow}{X}}_{3} = {\overset{\rightarrow}{X}}_{\delta} - {\overset{\rightarrow}{A}}_{3}.\left( {\overset{\rightarrow}{D}}_{\beta} \right)$$$$\overset{\rightarrow}{X}\left( {t + 1} \right) = \frac{{\overset{\rightarrow}{X}}_{1} + {\overset{\rightarrow}{X}}_{2} + {\overset{\rightarrow}{X}}_{3}}{3}$$ The finding process is approved using A^→^ with random values upper than 1 or lower than -1 that compels the search operator to split from the hunt. C^→^ as accelerating factors in finding operations is randomly created in \[0, 2\], where in random weights has been created for prey to stochastically strengthen (C \> 1) or weaken (C \< 1) to determine the distance using hunt quality. The C parameter is being essentially created a random value to strengthen the finding mechanism through the iterations. It is important factor to avoid getting involved in the local optima minima, particularly in the latest iterations. \|A\|\<1 means that the optimization exploitation initiates, whereas A^→^ is randomly created in \[-1, 1\]. Individuals are diverged from the hunt as \|A^→^\|\>1 and converged towards the hunt as \|A^→^\|\<1. The following situation is located in any situation between its current situation and the hunt situation that boost the search procedure to converge to figured out situation of hunt generated by α, β, and δ solutions. The situation and α solution are come back so that the best solutions to be attained and the satisfied end state to delivered. Finally, the concise computational sages for MOGWO, as flowchart form can be comprehended in [Figure 7](#fig7){ref-type="fig"}.Figure 7Flowchart of multi objective grey wolf optimization.Figure 7 4.2. Non-dominated Sorting Genetic Algorithm-II \[[@bib49]\] {#sec4.2} ------------------------------------------------------------ ### 4.2.1. Non-dominated sorting {#sec4.2.1} ❖For each individual (p) in main population perform:➢Initialize *S*~*p*~*=Ø*. This set encompasses all the individuals which are dominated by p.➢Initialize *n*~*p*~*=0.* This is the number of individuals which dominate p.➢for each individual q in P✓if p dominated q then:•add q to the *S*~*p*~ i.e. *S*~*p*~ = *S*~*p*~ U {g}✓else if q dominates p then•increase the domination counter for p i.e. *n*~*p*~ *= n*~*p*~*+1*✓if *n*~*p*~*=0* i.e. no individuals dominate p therefore p belonging to the first front; adjust the rank of individual p to one i.e *p*~*rank*~*=1.* Improve the first front set via addition of p to front one i.e *F*~*1*~*=F*~*1*~ *U {p}*❖This is performed for all individuals in the main population.❖Initialize the front counter to one*. i=1*❖Subsequent is performed when the *ith* front is non-blank i.e. *F*~*i*~*=Ø*;➢*Q=Ø*; the set of storing the individuals for *(i+1) th* front.➢for each individual *p* in *front F*~*i*~✓for each individual q in *S*~*p*~ (*S*~*p*~ is the set of individuals dominated by *p*)•*n*~*q*~ *= n*~*q*~*-1*, decrease the domination counter for individual q.•if *n*~*q*~ *= 0 subsequently* there is no individuals in the following fronts would dominate *q.* Therefore, set *q*~*rank*~*=i+1.* Update the set *Q* with individual q i.e. *Q=Q U q.*➢Increase the front counter by one.➢Now the set *Q* is the next front and subsequently *F*~*i*~*=Q.* ### 4.2.2. Crowding distance {#sec4.2.2} ❖For each front *F*~*i*~*, n* is the number of individuals.➢For all the individuals, the initialized distance is zero i.e. *F*~*i*~*(d*~*j*~*)=0*, where *j* correlates to the *jth* individual in front *F*~*i*~*.*➢for each objective function m✓Sort the individuals in front *F*~*i*~ according to objective m i.e. *I=sort (F*~*i*~*, m).*✓The boundary values for each individual is defined infinite *F*~*i*~ i.e. *I(d*~*1*~*)=∞* and *I(d*~*n*~*)=∞*✓for *k=2 to (n-1):*$$I\left( d_{k} \right) = I\left( d_{k} \right) + \frac{I\left( k + 1 \right).m - I\left( k - 1 \right).m}{f_{m}^{\max} - f_{m}^{\min}}$$•*I(k).m* is *the* value of the *mth* objective function related to the *kth* individual in I. ### 4.2.3. Genetic operators {#sec4.2.3} #### 4.2.3.1. Simulated binary crossover {#sec4.2.3.1} Simulated binary crossover method is chosen which is presented as follows:$$c_{1,k} = \frac{1}{2}\left\lbrack {\left( {1 - \beta_{k}} \right)p_{1,k} + \left( {1 + \beta_{k}} \right)p_{2,k}} \right\rbrack$$$$c_{2,k} = \frac{1}{2}\left\lbrack {\left( {1 + \beta_{k}} \right)p_{1,k} + \left( {1 - \beta_{k}} \right)p_{2,k}} \right\rbrack$$where, *c*~*i,k*~ is the *ith* child with *kth* part, *p*~*i,k*~ is the chosen parent, and *β*~*k*~ (≥0) is randomly created.$$p\left( \beta \right) = \frac{1}{2}\left( {\eta_{c} + 1} \right)\beta^{\eta_{c}},\mspace{9mu} if\quad 0 \leq \beta \leq 1$$$$p\left( \beta \right) = \frac{1}{2}\left( {\eta_{c} + 1} \right)\frac{1}{\beta^{\eta_{c} + 2}},\mspace{9mu} if\quad 1 < \beta$$ The distribution index (*η*~*c*~) can be acquired using a uniform sampled random number u between (0, 1).$$\beta\left( u \right) = \left( {2u} \right)^{\frac{1}{({\eta + 1})}}$$$$\beta\left( u \right) = \frac{1}{\left\lbrack {2\left( {1 - u} \right)} \right\rbrack^{1/{({\eta + 1})}}}$$ #### 4.2.3.2. Polynomial mutation {#sec4.2.3.2} The polynomial mutation is used which is identified as follows:$$c_{k} = p_{k} + \left( {p_{k}^{u} - p_{k}^{l}} \right)\delta_{k}$$where, *c*~*k*~ and *p*~*k*~ are child and parent, respectively, also $p_{k}^{l}$ and $p_{k}^{u}$ are the lower and upper bounds on the parent components, respectively. *δ*~*k*~ is the small deviation which is defined as follows:$$\delta_{k} = \left( {2r_{k}} \right)^{\frac{1}{({\eta_{m} + 1})}} - 1,\mspace{9mu} if\quad r_{k} < 0.5$$$$\delta_{k} = 1 - \left\lbrack {2\left( {1 - r_{k}} \right)} \right\rbrack^{1/{({\eta_{m} + 1})}},\mspace{9mu} if\quad r_{k} \geq 0.5$$where, *r*~*k*~ is randomly chosen between (0, 1) and *η*~*m*~ is mutation distribution index. ### 4.2.4. Trade-off solution {#sec4.2.4} Choosing an appropriate trade-off solution from all non-inferior options depends on problem and determiner\'s distinction. Therefore, the ultimate solution will be revealed based on both the procedures of optimization and decision. For this study, a Fuzzy-based method is applied to choose the best tradeoff solution from the acquired Pareto set. The *jth* objective function of a solution in a Pareto set *f*~*i*~ is defined by a membership function *μ*~*j*~:$$\mu_{j}\left( x \right) = \begin{Bmatrix} 1 & {f_{j} \leq f_{j}^{\min}} \\ \frac{f_{j}^{\max} - f_{j}}{f_{j}^{\max} - f_{j}^{\min}} & {f_{j}^{\min} \leq f_{j} \leq f_{j}^{\max}} \\ 0 & {f_{j} \geq f_{j}^{\max}} \\ \end{Bmatrix}$$where, *f*~*j*~^*min*^ and *f*~*j*~^*max*^ indicate the minimum and maximum values of the *jth* objective function, respectively. For each solution *i*, the membership function *μ*^*i*^ can be presented by:$$\mu^{i} = \frac{\sum\limits_{j = 1}^{n}\mu_{j}^{i}}{\sum\limits_{i = 1}^{m}{\sum\limits_{j = 1}^{n}\mu_{j}^{i}}}$$ 5. Scission-style harmonic elimination analysis and results {#sec5} =========================================================== This approach has been designed to enhance the quality voltage of odd-nary AMLI. Owing to three prominent voltage quality criterions i.e., desired fundamental component, elimination of third harmonic and reduction of THD, the problem formulation has been constructed based on multi-objective algorithm. Toward this subject, MOGWO method is employed so that both the mentioned targets (minimum value of (36)--(38)) to be acquired. It is worth mentioning that, MOGWO based Harmonic Elimination not only figures out the triggering angles of scission points in each level, but also incorporates the non-equality of DC power supplies\' magnitude and also different pulse-widths. Hereof, the flexibility of this strategy has been heightened using three salient criterions aimed to more acquisition of voltage quality improvement. The quasi-sinusoidal voltage waveform and reference-carriers waveforms that are created according to the scission-style harmonic elimination scheme are presented in [Figure 8](#fig8){ref-type="fig"}(a) and (b), respectively. However, this strategy has been solved in accordance with three following schemes:Figure 8(a). The proposed scission-style harmonic elimination scheme based on: different scission in each level, non-equality of DC sources and different pulse-widths. (b). Reference and carrier waveforms based on scission-style harmonic elimination scheme.Figure 8 Due to heavy computational burden of this approach, aforesaid schemes have been severally carried out. 5.1. Scission-style harmonic elimination scheme considering different scissions {#sec5.1} ------------------------------------------------------------------------------- According to the relevant sequencing presented in (39), the search space of MOGWO is constricted for pre-defined area. Moreover, for scission-style harmonic elimination the angles should be accurately located between these levels. As can be seen in [Figure 5](#fig5){ref-type="fig"}(b) m~1~, m~2~ and m~s~ indicate the number of angles which are available in the first, the second and the latest level, respectively. The angle propagation index has been set as triggering angles to define a set angle in each step of quasi-sinusoidal voltage. This index is presented by m~1~/m~2~/.../m~s~; for example for angle propagation proportion of 6/4/7/5, it has indicated that first, second, third and fourth levels encompass 6, 4, 7 and 5 angles, respectively. Computational burden of scission-style harmonic elimination with presence of the angle propagation index and sequencing has been highly heightened. Also, the number of scission in each step acts as critical function to define the performance of this computation, and accordingly value of THD. Meantime, as the number of scissions (in each level) to be increased, subsequently the value of fundamental component will decrease, and reversely. Thus, the maintenance of fundamental component is one of the prominent issues in this field. Due to destructive effects of third harmonic on normal operation of system, it must be considered as another function. That\'s why MOGWO is engaged to obtain three aforementioned objective functions. The optimization problem has unravelled twenty four angles in each quarter cycle of quasi-sinusoidal waveform of proposed multilevel inverter. Also, the propagation proportion is taken to be 3/5/9/11 along with the modulation index (2.68 \< M \< 3.03). Following that the optimization processes, the Pareto solution surfaces of the optimization problem performed by MOGWO and NSGA-II are portrayed in [Figure 9](#fig9){ref-type="fig"}(a), and the trajectory curve of twenty eight triggering angle are depicted in and 9 (b). As can be seen, the optimization scheme based on MOGWO has provided more accurate and optimum result than NSGA-II. Also, the quasi-sinusoidal voltage and the relevant harmonic spectrum are presented in [Figure 10 (a) and (b)](#fig10){ref-type="fig"}, respectively. To strictly validate these results, their relevant experimental results are presented in in [Figure 10](#fig10){ref-type="fig"}(c) and (d). As consequence, the performance of scission-style harmonic elimination aimed at reduction of the THD, elimination of third harmonic and maintenance of fundamental component (1.7^p.u.^) is proved.Figure 9(a). Pareto solution surfaces of the optimization problem by MOGWO and NSGA-II. (b). Triggering angle trajectories versus values modulation index.Figure 9Figure 10(a). Simulation result of quasi-sinusoidal voltage. (b). Simulation FFT of quasi-sinusoidal voltage. (c). Experimental result of quasi-sinusoidal voltage. (d). Experimental FFT of quasi-sinusoidal voltage.Figure 10 5.2. Scission-style harmonic elimination scheme considering non-equal DC power supplies {#sec5.2} --------------------------------------------------------------------------------------- In accordance with the sequence of (40), the constraint of non-equality of DC power supplies is assigned. Same the previous section, the MOGWO has optimized the magnitude of DC power supplies in order to minimize three defined objective functions. Excluding the effects of triggering angle to carry out the Harmonic Elimination, variety of the DC power sources\' magnitude can be considered as an important criterion for optimization problem. The quasi-sinusoidal voltage and its harmonic spectrum related to the optimum solution are presented in [Figure 11 (a)](#fig11){ref-type="fig"} and (b), respectively. Furthermore, their relevant experimental results are presented in in [Figure 11 (c) and (d)](#fig11){ref-type="fig"}. These figure have clearly shown that third objective-functions have been well-reduced and also fundamental component is held on pre-defined value1.9 ^p.u.^.Figure 11(a). Simulation result of quasi-sinusoidal voltage. (b). Simulation FFT of quasi-sinusoidal voltage. (c). Experimental result of quasi-sinusoidal voltage. (d). Experimental FFT of quasi-sinusoidal voltage.Figure 11 5.3. Scission-style harmonic elimination scheme considering different pulse-width values {#sec5.3} ---------------------------------------------------------------------------------------- In this part, the width of all pulses of quasi-sinusoidal waveform is optimized by MOGWO so that three objective functions to be minimized. The performance of this item in the form of output voltage of inverter and harmonic spectrum are respectively shown in [Figure 12 (a)](#fig12){ref-type="fig"} and (b). Furthermore, their relevant experimental results are presented in in [Figure 12 (c) and (d)](#fig12){ref-type="fig"}. These figures have confirmed that, what accuracy of acquired results from two previous parts is also repeated for this analysis. The difference here is that: the magnitude of fundamental component in considered to be 1.8 ^p.u.^.Figure 12(a). Simulation result of quasi-sinusoidal voltage. (b). Simulation FFT of quasi-sinusoidal voltage. (c). Experimental result of quasi-sinusoidal voltage. (d). Experimental FFT of quasi-sinusoidal voltage.Figure 12 6. Conclusion {#sec6} ============= An innovational cascaded AMLI has been designed and analyzed so that a high-step quasi-sinusoidal voltage with low harmonic components to be acquired. To validate the suggested AMLI capability, it has been thoroughly evaluated and compared with the conventional and recently introduced symmetric and asymmetric multilevel inverters. Sub-AMLI has been designed using the ladder capacitors of clamped to the H-bridge by several bi-directional switches. A creative geometric progression has been formulated for DC power supplies of AMLI to function as odd-nary AMLI. Meanwhile, three defined objective functions related to voltage quality i.e., desired fundamental component, elimination of third harmonic and reduction of THD have been optimally minimized using suggested MOGWO-based scission-style harmonic elimination scheme. To confirm the optimization scheme based on MOGWO, it has been compared with this scheme based on NSGA-II. Finally, the relevant analytical analysis has been essentially confirmed that suggested structure can provide high-step quasi sinusoidal voltage as compared with others. Also, both the simulation and experiment results have clearly corroborated the performance of odd-nary AMLI. Declarations {#sec7} ============ Author contribution statement {#sec7.1} ----------------------------- Ali Darvish Falehi: Conceived and designed the experiments; Performed the experiments; Analyzed and interpreted the data; Contributed reagents, materials, analysis tools or data; Wrote the paper. Funding statement {#sec7.2} ----------------- This research did not receive any specific grant from funding agencies in the public, commercial, or not-for-profit sectors. Competing interest statement {#sec7.3} ---------------------------- The authors declare no conflict of interest. Additional information {#sec7.4} ---------------------- No additional information is available for this paper.
{ "pile_set_name": "PubMed Central" }
BioConnect has become the latest biometric security specialist to join the ForgeRock platform. ForgeRock offers a portfolio of curated security solutions to its client network, and has proven to be a popular venue for market access in recent months. Over the course of 2018, 54 technology partners joined the ForgeRock platform, including biometrics specialists like ImageWare, BioCatch, and Yoti. Now, ForgeRock has welcomed BioConnect ID to its portfolio. Aimed primarily at the enterprise market, BioConnect’s authentication solution leverages facial, finger, and voice biometrics together with other factors like mobile device identification and passwords to offer strong, multi-factor authentication.
{ "pile_set_name": "Pile-CC" }
1. The Field of the Invention The present invention relates to compositions and methods for isolating dental tissue for treatment thereupon. In particular, the present invention relates to polymerizable isolation barrier compositions and methods of using the same for isolating tooth surfaces. The polymerizable barrier compositions of the present invention may include constituents that enable the compositions to adhere to wet, dry, soft or hard oral tissues; to minimize injury risks due to heat from polymerization and/or light radiant energy from subsequent treatment(s); and that enable the barriers to be easily removed. 2. The Relevant Technology Several dental procedures exist that use treatment compositions in the mouth that could be harmful and damaging to soft tissue. Harmful treatment compositions must be kept away from soft tissue such as the gums during such treatment procedures. There are other dental procedures that require a substantially dry tooth that must be maintained in a dry condition during a lengthy dental procedure to avoid damage. In general, contact between a treatment composition and the cheeks and tongue of a patient can be minimized through the use of cotton rolls, absorbent isolators, rubber dams, rubber dam caulking or other conventional isolation techniques. The gums, adjacent dentin and surrounding sulcular tissues however are harder to protect from the treatment composition(s) due to their close proximity to the surfaces being treated and because the treatment composition is sometimes a freely flowable aqueous solution. Although it is possible to incorporate some treatment compositions within a gel in order to inhibit the unwanted flow of the treatment composition from the desired treatment area, they generally must have a low enough viscosity to flow into the tiny crevices and other irregularities of the surface of the tooth being treated. Hence, it is generally impractical to have a treatment composition that is so viscous that it is not at least partially flowable. In addition to adjusting the flow characteristics, the concentration of the treatment composition can be modified to reduce the damage caused by inadvertent contact with surrounding sulcus and gum tissues. However, significantly reducing the concentration of a treatment composition also reduces its ability to treat the tooth, thereby increasing the time in which the treatment composition must remain in contact with the surface being treated. In general, treatment compositions strong enough to adequately treat teeth may also damage and irritate surrounding soft gum tissues. Rubber dam technology was developed as a means of isolating a tooth for treatment and also for protecting the vulnerable soft tissue. FIG. 1 illustrates the installation of a rubber dam 10. It can be seen that rubber dam 10 has been placed over the teeth 14 and then rubber dam 10 is fitted with a dental instrument 16 by pushing rubber dam 10 up to the gum line 12. This procedure must be carried out on each tooth. Rubber dams, however, have several disadvantages. One disadvantage is that rubber dams can be difficult to install. Rubber dams have a hole-punched perimeter shape that may or may not isolate soft tissue next to the tooth because the tooth perimeter shape might have concavities. For example, where a tooth forms an unusual groove or concavity, a hole-punched rubber dam may leave an exposed space through which treatment compositions could leak that could harm soft tissue. If the seal created by a rubber dam is faulty, soft tissue is exposed and likely to be damaged by the treatment composition. Another disadvantage to rubber dams is that they are prone to tearing once placed over the tooth. If the rubber dam begins to tear in the middle of a dental procedure, the procedure must be aborted and a new rubber dam installed. This is time consuming and the new rubber dam may likewise tear at or near the same point of the treatment that the original rubber dam began to tear. Additionally, when the rubber dam tears during a procedure, it may be too late to prevent the treatment compositions from contacting the soft tissue and therefore too late to prevent soft tissue damage. Another disadvantage to rubber dams is that they often cause patient discomfort. FIG. 2 illustrates installation of a rubber dam 10 with rubber dam clamps 22 and a frame 20 that covers the labia 24 and the tongue 26. When, for example, a labial surface of a tooth is the only surface that needs to be isolated, rubber dam 10 may cover more than the teeth. Additionally, where an intense dental curing or laser light is being used, heat buildup incidental to use of the light may cause patient discomfort due to heating of the rubber dam. Intense heating of the soft tissue will necessitate intermittent use of the dental light, a practice that slows the clinician in his procedure. One attempt to overcome the problems associated with rubber dams provided a blue flowable resin that can be applied onto a dental substrate and then be polymerized. Due to the color of the resin, it absorbs light energy which resulting increases the risk of injury to soft tissue in contact with the resin. Additionally, the resin is hydrophobic which significantly hinders its ability to adhere well to dental tissues. Another significant problem with this resin is that it is too strong and consequently the polymerized resin is very difficult to remove. Difficulties related to excessive strength are only exacerbated by application of the resin onto dental surfaces such as wide open embrasures and undercuts. For example, open embrasures are typically filled from both sides which results in the embrasures being completely filled and solidly anchored. After polymerization, it is very difficult to remove the resin and may require prying instruments or even high speed drills. Similarly, undercuts present a problem when resin becomes lodged into the openings or crevices and it may then necessary be to remove the resin with dental tools which the require the use of some force such as prying instruments or excavating tools. In light of the foregoing, it would be a significant advancement in the art to provide isolation barrier compositions and methods for protecting sulcular and gum tissues surrounding a tooth being treated from intense cumulative heat buildup in order to avoid patient discomfort and to expedite dental treatments that use a curing or laser light It would also be a significant advancement in the art to provide isolation barrier compositions and methods for protecting sulcular and gum tissues surrounding a tooth being treated that can be easily removed following a dental procedure. It would be a further advancement in the art to provide compositions and methods that result in a quickly and easily applied barrier to maintain a treatment composition within the area of the tooth that is desired to be treated. Another advancement in the art would be to provide compositions for an isolation barrier material that, upon application to the dental substrate and polymerization, are sufficiently weakened to facilitate its removal in discrete, approximately tooth-sized segments or larger with a tweezers-like instrument from the dental substrate after use in a dental procedure. Another advancement in the art would be to provide compositions for an isolation barrier material that, upon application to the dental substrate and polymerization, are resistant to deformation at the external surface of the barrier due to incidental touching but that remain adherent to the dental substrate at the internal surface of the barrier. Another advancement in the art would be to provide a composition for an isolation barrier material that, upon application to the dental substrate and polymerization, is of a generally small size and conducive to a customized fit that avoids inducing patient discomfort. Such polymerizable isolation barrier compositions and methods for using them are disclosed and claimed herein.
{ "pile_set_name": "USPTO Backgrounds" }
Sunday, August 9, 2009 It's a day of firsts! Well, maybe only a couple of firsts but they sure seem big to me. I am entering my very first sketch challenge AND I've embossed a card for the first time! Woohoo!!! I've been lurking in the background and enjoying what other stampers have entered for a while. Today I'm steppin' out of the shadows! Aren't you proud of me? The Saturday Sketch Challenge over at the Stamping 411 blog looked like so much fun that I just *had* to step up and take part. I just got a heat embossing tool and I was DYING to try it out. Therefore, a darker paper seemed like a good idea. While looking through my stash I came across some Raspberry Tart DSP and it all clicked. At that point, I was on a mission! I threw in some Regal Rose and Rose Red, grabbed my much loved punches and the Polka Dot Punches set... tossed in a dash of Sweet Serendipity and voila! A card was born :)
{ "pile_set_name": "Pile-CC" }
On this page 4 Enable The root Account After the reboot you can login with your previously created username (e.g. administrator). Because we must run all the steps from this tutorial as root user, we must enable the root account now. Run sudo passwd root and give root a password. Afterwards we become root by running su 5 Install The SSH Server Ubuntu does not install OpenSSH by default, therefore we do it now. Run apt-get install ssh openssh-server You will be prompted to insert the installation CD again. 6 Configure The Network Because the Ubuntu installer has configured our system to get its network settings via DHCP, we have to change that now because a server should have a static IP address. Edit /etc/network/interfaces and adjust it to your needs (in this example setup I will use the IP address 192.168.0.100): From now on you can use an SSH client such as PuTTY and connect from your workstation to your Ubuntu Feisty Fawn server and follow the remaining steps from this tutorial. 7 Edit /etc/apt/sources.list And Update Your Linux Installation Edit /etc/apt/sources.list. Comment out or remove the installation CD from the file and make sure that the universe and multiverse repositories are enabled. It should look like this: vi /etc/apt/sources.list deb http://de.archive.ubuntu.com/ubuntu/ feisty main restricted deb-src http://de.archive.ubuntu.com/ubuntu/ feisty main restricted ## Major bug fix updates produced after the final release of the ## distribution. deb http://de.archive.ubuntu.com/ubuntu/ feisty-updates main restricted deb-src http://de.archive.ubuntu.com/ubuntu/ feisty-updates main restricted ## N.B. software from this repository is ENTIRELY UNSUPPORTED by the Ubuntu ## team, and may not be under a free licence. Please satisfy yourself as to ## your rights to use the software. Also, please note that software in ## universe WILL NOT receive any review or updates from the Ubuntu security ## team. deb http://de.archive.ubuntu.com/ubuntu/ feisty universe deb-src http://de.archive.ubuntu.com/ubuntu/ feisty universe ## N.B. software from this repository is ENTIRELY UNSUPPORTED by the Ubuntu ## team, and may not be under a free licence. Please satisfy yourself as to ## your rights to use the software. Also, please note that software in ## multiverse WILL NOT receive any review or updates from the Ubuntu ## security team. deb http://de.archive.ubuntu.com/ubuntu/ feisty multiverse deb-src http://de.archive.ubuntu.com/ubuntu/ feisty multiverse ## Uncomment the following two lines to add software from the 'backports' ## repository. ## N.B. software from this repository may not have been tested as ## extensively as that contained in the main release, although it includes ## newer versions of some applications which may provide useful features. ## Also, please note that software in backports WILL NOT receive any review ## or updates from the Ubuntu security team. # deb http://de.archive.ubuntu.com/ubuntu/ feisty-backports main restricted universe multiverse # deb-src http://de.archive.ubuntu.com/ubuntu/ feisty-backports main restricted universe multiverse deb http://security.ubuntu.com/ubuntu feisty-security main restricted deb-src http://security.ubuntu.com/ubuntu feisty-security main restricted deb http://security.ubuntu.com/ubuntu feisty-security universe deb-src http://security.ubuntu.com/ubuntu feisty-security universe deb http://security.ubuntu.com/ubuntu feisty-security multiverse deb-src http://security.ubuntu.com/ubuntu feisty-security multiverse Then run apt-get update to update the apt package database and apt-get upgrade to install the latest updates (if there are any). 8 Change The Default Shell /bin/sh is a symlink to /bin/dash, however we need /bin/bash, not /bin/dash. Therefore we do this: Comments Instead of rm -f /bin/sh ln -s /bin/bash /bin/sh which leaves no /bin/sh for a few moments. Anything that needs /bin/sh to exist that tries to run before it's recreated will have big trouble. This is a bad habit to get into, especially when you're working with symlinks to libraries. Instead, do ln -sf /bin/bash /bin/sh and it's all done in a single command which guarantees that there isn't even a nanosecond during which there is no /bin/sh.
{ "pile_set_name": "Pile-CC" }
Garden Eels live in the sand. They are long, skinny, active and fascinating, as well as ubiquitous at our current spot near Isla Cerralvo. We dropped our anchor here and then looked into the water to find thousands of Garden Eels waving gently back and forth on the sandy bottom below Magic. Of course, we soon went scuba diving under the boat to get a closer look. I mean, these eels were everywhere, how hard would it be to see them? We descended about 20 feet. The water was clear and calm. Webs of light danced on the bottom just like a swimming pool. But there were no eels. This was very strange. Why would they be everywhere else but not right here? I swam toward a large group, waving gently in the water. When I got there they were gone. “Oh wait, there’s a bunch of them over there”, I thought, and swam in the other direction. When I got closer every single one of them slowly withdrew into the sand. When I arrived all I saw was a field of dime sized, empty holes. We lay on the sand at the bottom, waiting for them to end the tease and finally show themselves. We waited several minutes. Some eels were braver than others, and tiny heads began to emerge. They were still at least 6 feet away. By crawling on my hands I was able to get a little closer, but they soon retreated. Any fin kicks would send them right back into the sand immediately. We surfaced and a couple minutes later saw them again waving wildly all around the boat, back out of their holes again, celebrating that we were gone. Determined to get a close look at these little teases of the sea, Brian set up our GoPro camera with a scuba weight and pointed it right at one of the little holes under the boat. He got all the photos you see here, plus a great video of a puffer fish surprising the eels! Check it out here: About the Author Hi, I’m Lisa. I’m a tall, blonde superhero and I live in a van. I do it all. I rappel big waterfalls, drive from Idaho to Alaska solo, live and work in a van in the wilderness and dodge encounters with wolves and bears. Seriously. More About the Author Hi, I’m Lisa. I’m a tall, blonde superhero and I live in a van and on a sailboat with my superhero husband, Brian. I do it all. I rappel big waterfalls, scuba dive with sharks, dodge encounters with bears and wolves, and work remotely as a full time computer programmer.Read more About the Van Hi, I’m Vanifest. I’m a big, 4x4, off-the-grid van complete with solar panel for power. I'm a 2000 Dodge Ram Van and Lisa has had me since 2009. Read more about me here.
{ "pile_set_name": "Pile-CC" }
Nakiska Ski Resort doesn't open for several weeks, but clearly Mother Nature didn't get the memo. The Kananaskis facility received a dusting of snow Sunday morning, with five centimetres in the forecast for the day. The area is looking for a high of 7 C and a low of zero. View from the bottom of the mid mountain gold chair express high speed quad looking up to the summit, Sunday morning. (Nakiska Mountain Cam) Don't put the skis on the rack just yet. The resort has a staggered opening with full operations beginning in early December. The snow may not stick around for long, though. Next Saturday, the resort is forecast to hit 22 C. Nakiska is not alone. Further west, Sunshine Village in Banff also received some snow, reporting the white stuff in a Facebook post. "Are you like us and SNOW happy to see the white stuff back on our webcams?" the post reads. Sunshine Village spokesman Dave Riley says he's optimistic that even with the poor economy, the resort will be busy. Dave Riley with the Sunshine Village resort in Banff says their hills got up to six centimeters of snow this weekend. (Kate Adach/CBC) "In 2008, when we had a real dip in the economy, a lot of ski areas had a really great year that year because they had good snow. So a lot of different factors converge and snow pretty much cures everything in our business." Riley says the resort's expected to open its hills in mid-November, but they could open sooner, depending on the conditions.
{ "pile_set_name": "OpenWebText2" }
Orden de los trabajos Presidente Se ha distribuido la versión final del proyecto definitivo de orden del día, tal y como fue elaborada por la Conferencia de Presidentes en su reunión del jueves 16 de abril de conformidad con los artículos 130 y 131 del Reglamento. Se han propuesto las siguientes enmiendas: Martes: El Grupo de los Verdes/Alianza Libre Europea ha solicitado que se retire del orden del día el informe Gunnar Hökmark sobre un marco comunitario sobre seguridad nuclear. Monica Frassoni (IT) Señor Presidente, Señorías, deberíamos posponer el informe Hökmark sobre un marco comunitario sobre seguridad nuclear por dos razones: la primera es que la Comisión de Asuntos Jurídicos ha refrendado la sugerencia de que existe un problema procesal básico en la propuesta de la Comisión, ya que las normas de Euratom estipulan que la Comisión debe obtener la opinión de un comité técnico antes de trabajar en la propuesta, y es algo que ha incumplido en dos ocasiones. La Comisión de Asuntos Jurídicos ha determinado que este es un defecto básico: en otras palabras, es un defecto que exige la retirada de la propuesta y una nueva presentación de la Comisión, de acuerdo con las normas vigentes. La segunda razón es que no hay razón para actuar con urgencia, ya que estas provisiones solo se aplicarán a las centrales eléctricas que se construyan a partir de 2015. Por tanto, no hay razón para las prisas y no necesitamos adoptar un texto que está afectado por un defecto procesal tan relevante como este. Gunnar Hökmark (SV) Señor Presidente, creo firmemente que debemos adoptar una decisión sobre esta cuestión en este período parcial de sesiones. Hay muchas razones para ello. En primer lugar, esta es una propuesta que el Parlamento ha debatido anteriormente y que ahora se plantea de nuevo, y el Consejo la ha estado debatiendo desde 2003. Es el momento de tomar una decisión. Con respecto a la situación legal, el grupo de expertos que mencionaba la señora Frassoni presentó su opinión sobre esta propuesta y se realizaron ajustes acordes con ella. Lo que separa a la amplísima mayoría de la Comisión de Industria, Investigación y Energía y a los representantes del Grupo de los Verdes/Alianza Libre Europea es la cuestión de si esta es una nueva propuesta o una propuesta en la que hemos estado trabajando desde 2003. Creo que todo el mundo acepta que esta es una propuesta en la que llevamos trabajando mucho tiempo. En algún momento debemos ser capaces de adoptar una decisión, especialmente si tenemos en cuenta que muchos países están ahora planificando la construcción de centrales nucleares. Por ello, creo que es muy importante que contemos con una legislación sólida y estable para la Unión Europea y, por tanto, sugiero que votemos hoy a favor de la votación sobre la Directiva sobre Seguridad Nuclear esta semana. (El Parlamento rechaza la solicitud) Miércoles: Presidente El Grupo de la Alianza de los Demócratas y Liberales por Europa ha solicitado que se posponga la votación sobre las propuestas de resolución relativas al inicio de negociaciones internacionales para la adopción del Tratado internacional para la protección del Ártico. Diana Wallis Señor Presidente, tuvimos un breve debate sobre este tema cuando votamos en el último pleno. El problema es el siguiente: cuando tuvimos el debate con la Comisión y el Consejo, nos quedó claro a muchos de los miembros de la Cámara que no era adecuado que votásemos sobre esta resolución y, por tanto, solicitamos en ese momento que se pospusiese. Creo que nuestra perspectiva ahora es que no es necesaria una resolución. El Parlamento manifestó su opinión a este respecto hace un par de meses y con eso es suficiente; no es necesario volver a hacerlo. El debate que tuvimos con las otras instituciones fue valioso, pero no es necesaria una resolución. Véronique De Keyser (FR) Señor Presidente, admito que estoy un poco sorprendida, ya que nadie pensó que esta resolución no tuviese sentido cuando se debatió. Nadie, y mucho menos la señora Wallis. Prosigamos: es cierto que la Comisión se refirió al hecho de que la Unión Europea deseaba unirse al Consejo Ártico. Por mi parte, opino que, de acuerdo con el deseo expresado por la Comisión, esta nueva resolución, que establece muy claramente nuestro deseo de una moratoria sobre las perforaciones y de una zona desmilitarizada en el Ártico, es efectivamente una resolución especialmente importante, ya que se produce en un momento en el que los países fronterizos están midiendo sus fuerzas (incluidas las fuerzas militares) en esta zona para reclamar su propiedad y sus oportunidades de perforación. Así, desde un punto de vista político, es crucial que votemos este texto y este cambio de opinión de la señora Wallis (y también de parte de la Cámara) es totalmente injustificable en vista de los debates que ya hemos tenido. (El Parlamento aprueba la propuesta) Miércoles: Presidente El Grupo Unión por la Europa de las Naciones ha solicitado que se introduzca en el orden del día una declaración de la Comisión sobre el terremoto en la región italiana de Abruzzo. Roberta Angelilli (IT) Señor Presidente, Señorías, tras consultar a los grupos políticos y a los jefes de las delegaciones italianas, en nombre de mi grupo, les pido que acepten añadir un debate sobre el terremoto de Abruzzo en el orden del día de mañana. Creo que las personas que se han visto afectadas valoran la solidaridad mostrada por las instituciones europeas y por usted personalmente, con las condolencias expresadas y el minuto de silencio, y también valorarán cualquier ayuda financiera y legislativa para la reconstrucción. Por este motivo, un debate en presencia de la Comisión Europea podría ofrecer a las instituciones nacionales y locales numerosa información útil sobre la capacidad de actuación de la Unión Europea. Gianni Pittella (IT) Señor Presidente, Señorías, me gustaría decir que el Grupo Socialista en el Parlamento Europeo apoya la propuesta realizada por la señora Angelilli. Me gustaría dar las gracias al señor Pöttering por sus palabras y a la Cámara en su conjunto por haber mostrado a las personas afectadas su solidaridad emocional. También opino que el debate de mañana por la tarde podría no solo producir nuevas declaraciones de solidaridad sino también, y sobre todo, propuestas específicas, ya que Europa puede aportar una contribución relevante a la reconstrucción, así como aliviar la situación de crisis que están viviendo los ciudadanos de Abruzzo. Astrid Lulling (FR) Señor Presidente, he descubierto con tristeza y amargura que la pregunta oral con debate sobre los vinos rosados y las prácticas enológicas permitidas, que otros diputados de numerosos grupos políticos y yo misma presentamos dentro de plazo, no estaba en el orden del día de esta semana. En nombre de todos los signatarios, pido que se ponga remedio a esta situación. De hecho, he hablado con algunos de los presidentes de los grupos políticos y me parece que o bien se les informó mal sobre esta solicitud, o bien se pasó por alto en silencio. Por ello, le pediría amablemente que añada la pregunta oral, que se presentó dentro de plazo, al orden del día de esta semana. Presidente Señora Lulling, me acaban de informar de que el debate sobre el vino rosado está previsto para mayo. Habrá suficiente tiempo para hablar sobre él en ese momento, algo que no sucedería hoy. Nikolaos Vakalis (EL) Señor Presidente, me gustaría expresar, si se me permite el atrevimiento, mi descontento y curiosidad, ya que presenté una pregunta oral con debate que fue apoyada por 48 eurodiputados, cuyo apoyo (para que le conste) se consiguió enseguida e incluso ahora hay miembros que han declarado su deseo de apoyarla. Aún así, para mi gran sorpresa, nadie me ha explicado por qué, cuándo y en base a qué criterios se decidió no aceptar la pregunta oral con debate. ¿Acaso de repente me he topado con otro tipo de terremoto? ¿Es un nuevo terremoto, tiene una causa diferente? Le vuelvo a repetir, partiendo del último terremoto mortal y de las víctimas a las que hizo usted referencia y, me gustaría añadir, el consecuente daño y destrucción cultural, que deberíamos subrayar la dimensión europea de este fenómeno. Puesto que fui también el ponente del único informe de una institución europea sobre el asunto de los terremotos, sé perfectamente que es mucho lo que se puede y debe hacer a escala europea. Gracias y espero su respuesta. Presidente Señor Vakalis, ese tipo de petición debe realizarse una hora antes del comienzo de la sesión. Me han informado de que ese no fue el caso. Le remito al artículo 132 del Reglamento. Le recomendaría que lo tratemos en mayo, o de lo contrario no podríamos proceder de conformidad con el Reglamento. Astrid Lulling (DE) Señor Presidente, me gustaría solicitar que le pida a la Cámara si eso debería incluirse en el orden del día. Usted no puede tomar esa decisión por sí solo. Al menos pregunte a los diputados si están de acuerdo con esa decisión. Sin duda, puede dedicar un par de minutos a debatir este tema importante, que afecta en gran medida a numerosas regiones de nuestra Unión, y a debatirlo en el momento adecuado, ya que mayo será demasiado tarde. Presidente Señora Lulling, el Presidente no adopta esta decisión por sí solo, sigo el Reglamento. El factor decisivo es el artículo 132 del Reglamento, que nos vincula a todos. La solicitud debería haberse presentado una hora antes de la sesión. Le recomendaré a la Conferencia de Presidentes que consideremos esta cuestión en mayo. El Grupo de los Verdes/Alianza Libre Europea ha solicitado que se introduzca en el orden del día una declaración de la Comisión sobre el maíz MON 810 genéticamente modificado. Monica Frassoni (IT) Señor Presidente, Señorías, la situación es realmente surrealista, en el sentido de que realmente estamos entre aquellos que siguen pendientes: la mayoría de los Estados miembros no quieren ceder la capacidad para declarar moratorias sobre los OGM y la Comisión, claramente, debe tener en cuenta este resultado negativo, aunque puede actuar si así lo desea. ¡Este es el punto al que hemos llegado! Opino que, en un tema tan importante como este, sería útil comprender qué quiere hacer la Comisión: continuar, detener, retirar o presentar una propuesta legislativa. Lo único que deseamos es que la Comisión nos diga qué quiere hacer, y que lo diga públicamente, en un debate en el Parlamento. Lutz Goepel (DE) Señor Presidente, el MON 810 fue aprobado en la Unión Europea en 1998. Esa aprobación no es obligatoria para los Estados miembros y cada Estado miembro es libre de decidir si acepta esta aprobación, si la aplica o si prohíbe el cultivo de este maíz. Supongo que esta es la base de la última resolución de la República Federal de Alemania sobre este tema. A este respecto, permítanme decir que el MON 810 fue aprobado en Alemania en 2005, a continuación se detuvo la siembra de semillas en 2007 y en diciembre de ese año Monsanto presentó un plan para el control general de su cultivo. Posteriormente se volvió a aprobar en 2008 y, a continuación, hace unos días, se prohibió. La señora Frassoni ha afirmado que muchos Estados miembros han rechazado el cultivo de este maíz. Son exactamente cuatro Estados (Francia, Austria, Hungría y Luxemburgo) y ahora Alemania se les ha unido, por lo que son cinco de los 27 Estados miembros. Esta es una decisión totalmente nacional en base a la subsidiariedad y, por tanto, no deberíamos cargar al Parlamento con ello. Martin Schulz (DE) Gracias, Señor Presidente. Nosotros no estamos a favor de proceder como la señora Frassoni ha solicitado, pero por una razón distinta de la ofrecida por el señor Goepel. Por ello, le agradezco la oportunidad para exponerla brevemente. Necesitamos tener un debate detallado, no solo sobre esta cuestión, sino también sobre cómo queremos abordar el problema de los alimentos genéticamente modificados. Sin embargo, no podemos abordarlo en el breve período de tiempo que tenemos hasta pasado mañana. Por ello, opino que deberíamos pedirle al nuevo Parlamento que saldrá de las elecciones que realice un debate detallado sobre el uso de los alimentos genéticamente modificados. Muchas gracias.
{ "pile_set_name": "EuroParl" }
GTB GTB may refer to: Genting Airport, a non-existent airport in Malaysia Global Team Blue, an advertising agency Global Trust Bank (India) Goolpur Talbani railway station, in Pakistan Guaranty Trust Bank, in Nigeria Textile and Clothing Union, a former German trade union Wheeler-Sack Army Airfield, at Fort Drum, New York, United States GTB, a pseudonym used by BT (musician) early in his career
{ "pile_set_name": "Wikipedia (en)" }
<!DOCTYPE html> <meta charset="utf-8"> <title>IDBObjectStore.createIndex() - empty keyPath</title> <link rel="author" href="mailto:odinho@opera.com" title="Odin Hørthe Omdal"> <script src="/resources/testharness.js"></script> <script src="/resources/testharnessreport.js"></script> <script src="support.js"></script> <script> var db, aborted, t = async_test() var open_rq = createdb(t); open_rq.onupgradeneeded = function(e) { db = e.target.result; var txn = e.target.transaction, objStore = db.createObjectStore("store"); for (var i = 0; i < 5; i++) objStore.add("object_" + i, i); var rq = objStore.createIndex("index", "") rq.onerror = function() { assert_unreached("error: " + rq.error.name); } rq.onsuccess = function() { } objStore.index("index") .get('object_4') .onsuccess = t.step_func(function(e) { assert_equals(e.target.result, 'object_4', 'result'); }); } open_rq.onsuccess = function() { t.done(); } </script> <div id="log"></div>
{ "pile_set_name": "Github" }
Q: Select with Contains parameter not working with null With my select below, if blank string is passed in I get the following error: Null or empty full-text predicate in my DBAdapter when fetching rows from the database. If I provide a value, such as Well, I do not get results when I should as Well is in the r.[Desc] column. If I pass in Well One, I get: Syntax error near 'one' in the full-text search condition 'Well one'. If I pass in One, I get nothing. I've read similar questions here and have not seen a pattern where the value passed in can be nothing, the beginning of the column data, a word in the middle of the column data or more than one word in any order of the column data. I thought Contains returns the row if the column contains the value or part of the value passed in. What am I doing wrong? if @Drawing = '' set @Drawing = null if @ItemName = '' set @ItemName = null if @CF3 = '' set @CF3 = null if @Desc = '' set @Desc = null if @Design = '' set @Design = null if @MaxPSI = 0 set @MaxPSI = null Select distinct ,r.[DRAWING] ,r.[DESC] ,r.[OP_PSI] ,r.[MAX_PSI] ,r.[MAX_TEMP] ,r.[Insulated] ,r.[DESIGN] From Ref r inner join Eng e on e.[DRAWING] = r.[DRAWING] where r.SurveyNumber = @SurveyNumber And (rtrim(@Drawing) is NUll or rtrim(r.DRAWING) like rtrim(@Drawing) + '%') And (rtrim(@Design) is NUll or rtrim(r.DESIGN) like rtrim(@Design) + '%') And (rtrim(@MaxPSI) is NUll or rtrim(r.MAX_PSI) like rtrim(@MaxPSI) + '%') And (rtrim(@CF3) is NUll or rtrim(e.CF3) like rtrim(@CF3) + '%') And (rtrim(@ItemName) is NUll or rtrim(e.ITEM_NAME) like rtrim(@ItemName) + '%') AND ((@Desc = '""') OR CONTAINS( (r.[Desc]), @Desc)) A: I think you can try checking for empty as follows: AND ((@Desc = '""' OR @Desc = '') OR CONTAINS( (r.[Desc]), @Desc)) I suspect the empty predicate may be getting passed as '' instead of "". Have not used Contains much but from section in the doc [here][1] it seems you either need operators between the words or need to wrap expression in double quotes "". So what you can do is try passing params like this: AND ((@Desc = '""' OR @Desc = '') OR CONTAINS( (r.[Desc]), '"'+@Desc+'"'))
{ "pile_set_name": "StackExchange" }
Q: Black Screen with UIViewControllerAnimatedTransitioning I have created a transition and it is working fine except that I get sometime black corners in the simulator. Additionally in iPad Pro I get a completely black screen if I run the simulator in full resolution. The resized resolutions work fine. Do you have an idea what might be the problem? Another thing that I recognized is that the content behind the black screen is there and responds to touches. E.g. on a touch I reload the cell of a collectionview. Then this cell is visible while the rest of the collectionview is black. class ZoomInCircleViewTransition: NSObject, UIViewControllerAnimatedTransitioning, UIViewControllerTransitioningDelegate { var transitionContext: UIViewControllerContextTransitioning? func transitionDuration(transitionContext: UIViewControllerContextTransitioning?) -> NSTimeInterval { return 0.6 } func animateTransition(transitionContext: UIViewControllerContextTransitioning) { self.transitionContext = transitionContext guard let toViewController: UIViewController = transitionContext.viewControllerForKey(UITransitionContextToViewControllerKey) else { return } guard let fromViewController = transitionContext.viewControllerForKey(UITransitionContextFromViewControllerKey) else { return } guard let fromViewTransitionFromView = fromViewController as? TransitionFromViewProtocol else { return } let imageViewSnapshot = fromViewTransitionFromView.getViewForTransition() let endFrame = CGRectMake(-CGRectGetWidth(toViewController.view.frame)/2, -CGRectGetHeight(toViewController.view.frame)/2, CGRectGetWidth(toViewController.view.frame)*2, CGRectGetHeight(toViewController.view.frame)*2) if let containerView = transitionContext.containerView(){ containerView.addSubview(fromViewController.view) containerView.addSubview(toViewController.view) containerView.addSubview(imageViewSnapshot) } let maskPath = UIBezierPath(ovalInRect: imageViewSnapshot.frame) let maskLayer = CAShapeLayer() maskLayer.frame = toViewController.view.frame maskLayer.path = maskPath.CGPath toViewController.view.layer.mask = maskLayer let quadraticEndFrame = CGRect(x: endFrame.origin.x - (endFrame.height - endFrame.width)/2, y: endFrame.origin.y, width: endFrame.height, height: endFrame.height) let bigCirclePath = UIBezierPath(ovalInRect: quadraticEndFrame) let pathAnimation = CABasicAnimation(keyPath: "path") pathAnimation.delegate = self pathAnimation.fromValue = maskPath.CGPath pathAnimation.toValue = bigCirclePath pathAnimation.duration = transitionDuration(transitionContext) maskLayer.path = bigCirclePath.CGPath maskLayer.addAnimation(pathAnimation, forKey: "pathAnimation") let hideImageViewAnimation = { imageViewSnapshot.alpha = 0.0 } UIView.animateWithDuration(0.2, delay: 0.0, options: UIViewAnimationOptions.CurveLinear, animations: hideImageViewAnimation) { (completed) -> Void in } let scaleImageViewAnimation = { imageViewSnapshot.frame = quadraticEndFrame } UIView.animateWithDuration(transitionDuration(transitionContext), delay: 0.0, options: UIViewAnimationOptions.CurveLinear, animations: scaleImageViewAnimation) { (completed) -> Void in // After the complete animations hav endet imageViewSnapshot.removeFromSuperview() } } override func animationDidStop(anim: CAAnimation, finished flag: Bool) { if let transitionContext = self.transitionContext { transitionContext.completeTransition(!transitionContext.transitionWasCancelled()) } } // MARK: UIViewControllerTransitioningDelegate protocol methods // return the animataor when presenting a viewcontroller func animationControllerForPresentedController(presented: UIViewController, presentingController presenting: UIViewController, sourceController source: UIViewController) -> UIViewControllerAnimatedTransitioning? { return self } // return the animator used when dismissing from a viewcontroller func animationControllerForDismissedController(dismissed: UIViewController) -> UIViewControllerAnimatedTransitioning? { return self } } A: You need remove mask layer once your are done with custom transition animations. toViewController.view.layer.mask = nil Please use this updated code: class ZoomInCircleViewTransition: NSObject, UIViewControllerAnimatedTransitioning, UIViewControllerTransitioningDelegate { var transitionContext: UIViewControllerContextTransitioning? func transitionDuration(transitionContext: UIViewControllerContextTransitioning?) -> NSTimeInterval { return 0.6 } func animateTransition(transitionContext: UIViewControllerContextTransitioning) { self.transitionContext = transitionContext guard let toViewController: UIViewController = transitionContext.viewControllerForKey(UITransitionContextToViewControllerKey) else { return } guard let fromViewController = transitionContext.viewControllerForKey(UITransitionContextFromViewControllerKey) else { return } guard let fromViewTransitionFromView = fromViewController as? TransitionFromViewProtocol else { return } let imageViewSnapshot = fromViewTransitionFromView.getViewForTransition() let endFrame = CGRectMake(-CGRectGetWidth(toViewController.view.frame)/2, -CGRectGetHeight(toViewController.view.frame)/2, CGRectGetWidth(toViewController.view.frame)*2, CGRectGetHeight(toViewController.view.frame)*2) if let containerView = transitionContext.containerView(){ containerView.addSubview(fromViewController.view) containerView.addSubview(toViewController.view) containerView.addSubview(imageViewSnapshot) } let maskPath = UIBezierPath(ovalInRect: imageViewSnapshot.frame) let maskLayer = CAShapeLayer() maskLayer.frame = toViewController.view.frame maskLayer.path = maskPath.CGPath toViewController.view.layer.mask = maskLayer let quadraticEndFrame = CGRect(x: endFrame.origin.x - (endFrame.height - endFrame.width)/2, y: endFrame.origin.y, width: endFrame.height, height: endFrame.height) let bigCirclePath = UIBezierPath(ovalInRect: quadraticEndFrame) let pathAnimation = CABasicAnimation(keyPath: "path") pathAnimation.delegate = self pathAnimation.fromValue = maskPath.CGPath pathAnimation.toValue = bigCirclePath pathAnimation.duration = transitionDuration(transitionContext) maskLayer.path = bigCirclePath.CGPath maskLayer.addAnimation(pathAnimation, forKey: "pathAnimation") let hideImageViewAnimation = { imageViewSnapshot.alpha = 0.0 } UIView.animateWithDuration(0.2, delay: 0.0, options: UIViewAnimationOptions.CurveLinear, animations: hideImageViewAnimation) { (completed) -> Void in } let scaleImageViewAnimation = { imageViewSnapshot.frame = quadraticEndFrame } UIView.animateWithDuration(transitionDuration(transitionContext), delay: 0.0, options: UIViewAnimationOptions.CurveLinear, animations: scaleImageViewAnimation) { (completed) -> Void in // After the complete animations hav endet imageViewSnapshot.removeFromSuperview() toViewController.view.layer.mask = nil } } override func animationDidStop(anim: CAAnimation, finished flag: Bool) { if let transitionContext = self.transitionContext { transitionContext.completeTransition(!transitionContext.transitionWasCancelled()) } } // MARK: UIViewControllerTransitioningDelegate protocol methods // return the animataor when presenting a viewcontroller func animationControllerForPresentedController(presented: UIViewController, presentingController presenting: UIViewController, sourceController source: UIViewController) -> UIViewControllerAnimatedTransitioning? { return self } // return the animator used when dismissing from a viewcontroller func animationControllerForDismissedController(dismissed: UIViewController) -> UIViewControllerAnimatedTransitioning? { return self } }
{ "pile_set_name": "StackExchange" }
1. Technical Field The present invention relates to an ultrasound diagnostic apparatus, and more particularly to an ultrasound diagnostic apparatus in which a modulated continuous wave is utilized. 2. Related Art Continuous wave Doppler is a known ultrasound diagnostic apparatus technology in which a continuous wave is employed. In continuous wave Doppler technology, a transmission wave which is formed as a sinusoidal wave of several MHz is continuously radiated into a living organism and a reflection wave from within the living organism is then continuously received. The reflection wave includes Doppler shift information generated by a moving element (e.g. blood flow) within the living organism. Accordingly, by extracting the Doppler shift information and applying frequency analysis to the Doppler shift information, a Doppler waveform which reflects information of velocity of the moving element, for example, can be formed. Continuous wave Doppler technology in which a continuous wave is utilized is generally superior to Pulse Doppler, in which a pulse wave is utilized, for rapid acquisition of velocity measurements. Under such circumstances, the inventors of the present application have conducted research concerning continuous wave Doppler technology. In one of their achievements, the present inventors proposed the technology concerning Frequency Modulated Continuous wave Doppler (FMCW Doppler) disclosed in JP 2005-253949 A. On the other hand, use of a continuous wave makes continuous wave Doppler technology less suited towards measuring a position. As such, typical continuous wave Doppler devices (i.e., devices in which the FMCW Doppler is not utilized) were unable to perform position measurement. In this regard, the present inventors proposed, in JP 2006-14916 A, a technology which enabled measurement of a position of a tissue within a living organism, in addition to measurement of the velocity of a tissue within the living organism, by using FMCW Doppler. The FMCW Doppler technology described in the above-noted publications is a revolutionary technology providing a potential for new forms of ultrasound diagnosis. The present inventors have continued to research and improve this landmark technology.
{ "pile_set_name": "USPTO Backgrounds" }
Q: Navigate through form with arrow keys I have a html form, which is created like a table (with rows and columns). Basically it looks like excel. And now I would like to navigate just like in excel with the arrow keys. Is that possible? <table> <tr> <td/> <td/> </tr> <tr> <td/> <td/> </tr> </table> A: Yes, it was easy, once I got your tips. This is my solution: var UP = 38; var DOWN = 40; var LEFT = 37; var RIGHT = 39; var TAB = 9; $('#tab-columns').on('keydown', 'input', function (event) { var $focused = $(':focus'); var id = ($focused.parents("td").attr('id')); if (id.startsWith("field_")) { idArr = id.replace("field_", "").split("_"); row = Number(idArr[0]); col = Number(idArr[1]); newId = id; switch (event.which) { case UP: newId = "field_"+(row-1)+"_"+col; break; case DOWN: newId = "field_"+(row+1)+"_"+col; break; case TAB: case RIGHT: newId = "field_"+row+"_"+(col+1); break; case LEFT: newId = "field_"+row+"_"+(col-1); break; default: // nothing } $("#"+newId).find("input").focus(); }
{ "pile_set_name": "StackExchange" }
65TPT Broadcast Listings – Chiefs Affiliate Network Chiefs fans, your favorite 65TPT shows are locked and loaded. Check them out on your favorite local stations: This special presentation recaps the blueprint of the Kansas City Chiefs pre-season. Taking you from the draft through mini-camp, this episode highlights the changes in players, offense, defense and special teams the Chiefs are focusing on as we head into the pre-season. This magazine style show previews past games and reviews upcoming opponents. Exclusive interviews with players and coaches are coupled with weekly features on current and past players. Hosted by the “Voice of the Chiefs” Mitch Holthus. This documentary style show takes an in depth look at Chiefs fandom. From coast to coast, the Chiefs Kingdom, presented by Hy-Vee spans and this half hour show reflects the love and dedication for a truly unique franchise. This show will resume production and broadcast in the spring to keep you updated on the Chiefs during the offseason, as the team makes it's way through Draft preparation and Free Agency. Hosted by Rachel Santschi, this weekly show covers community events, exclusive interviews with celebrities and players and goes throughout Arrowhead stadium to bring the team closer to its fans.
{ "pile_set_name": "Pile-CC" }
Maria João (model) Maria João Brewster (née Sousa Leão; Rio de Janeiro, 1955) is a Brazilian former model. A carioca, she made a career as a photographic model in the 1970s and is the only Brazilian to date to grace the cover of Sports Illustrated Swimsuit Issue throughout its history, photographed in Bahia for the 1978 issue. Career A former student of Communication at the Pontifical Catholic University of Rio de Janeiro, Maria João – affectionately called "João" (John) by industry professionals – began her career through the hands of a friend, photographer Pedro Liborio, who sent her photos to the advertising agency DPZ, that placed her on the market of advertising and fashion, starting with an ad to Johnson & Johnson . Among others, she photographed for famous Brazilian magazines like Claudia and Nova and worked with renowned photographers of the country as such as José Antonio and Luis Tripoli. Personal life Married to Alden Brewster, an American partner of Banco Icatu, she is the mother of actress Jordana Brewster, with whom she starred in an advertising campaign in the United States in 2015, and lives in New York City with her family. References External links Swimsuit Issues at sicollection.com. Category:1955 births Category:Living people Category:People from Rio de Janeiro (city) Category:Brazilian female models Category:Brazilian expatriates in the United States Category:Pontifical Catholic University of Rio de Janeiro alumni
{ "pile_set_name": "Wikipedia (en)" }
Q: Proving Cauchy-Schwarz with Arithmetic Geometric mean I understand common proofs for Cauchy-Schwarz, but not sure about the first step in this one, which is proof 4 from here Let $A = \sqrt{a_1^2 + a_2^2 + \dots + a_n^2}$ and $B = \sqrt{b_1^2 + b_2^2 + \dots + b_n^2}$. By the arithmetic-geometric means inequality (AGI), we have $$ \sum_{i=1}^n \frac{a_ib_i}{AB} \leq \sum_{i=1}^n \frac{1}{2} \left( \frac{a_i^2}{A^2} + \frac{b_i^2}{B^2} \right) = 1 $$ so that $$ \sum_{i=1}^na_ib_i \leq AB \leq \sqrt{\sum_{i=1}^na_i^2} \sqrt{\sum_{i=1}^n b_i^2} $$ Which is Cauchy-Schwarz. Now this is all quite elegant, but how is the first equation RHS equal to 1? And how is it AGI? Shouldn't it be in this form: $$ \sqrt[n]{\prod_{i=1}^n x_i} \leq \frac{1}{n} \sum_{i=1}^n x_i $$ There's probably something simple I'm missing... A: First, $$\sum_{i=1}^{n} \frac{a_i^2}{A^2} = \frac{1}{A^2}\sum_{i=1}^{n} a_i^2 = \frac{A^2}{A^2} = 1.$$ Similar could be said about the second term in the summation. Second, the proof uses the following two-variable AM-GM inequality: $$xy = \sqrt{x^2 y^2} \le \frac{x^2+y^2}{2}.$$
{ "pile_set_name": "StackExchange" }
// Copyright (c) 2005-2008 Thomas Fuchs (http://script.aculo.us, http://mir.aculo.us) // (c) 2005-2008 Sammi Williams (http://www.oriontransfer.co.nz, sammi@oriontransfer.co.nz) // // script.aculo.us is freely distributable under the terms of an MIT-style license. // For details, see the script.aculo.us web site: http://script.aculo.us/ if(Object.isUndefined(Effect)) throw("dragdrop.js requires including script.aculo.us' effects.js library"); var Droppables = { drops: [], remove: function(element) { this.drops = this.drops.reject(function(d) { return d.element==$(element) }); }, add: function(element) { element = $(element); var options = Object.extend({ greedy: true, hoverclass: null, tree: false }, arguments[1] || { }); // cache containers if(options.containment) { options._containers = []; var containment = options.containment; if(Object.isArray(containment)) { containment.each( function(c) { options._containers.push($(c)) }); } else { options._containers.push($(containment)); } } if(options.accept) options.accept = [options.accept].flatten(); Element.makePositioned(element); // fix IE options.element = element; this.drops.push(options); }, findDeepestChild: function(drops) { deepest = drops[0]; for (i = 1; i < drops.length; ++i) if (Element.isParent(drops[i].element, deepest.element)) deepest = drops[i]; return deepest; }, isContained: function(element, drop) { var containmentNode; if(drop.tree) { containmentNode = element.treeNode; } else { containmentNode = element.parentNode; } return drop._containers.detect(function(c) { return containmentNode == c }); }, isAffected: function(point, element, drop) { return ( (drop.element!=element) && ((!drop._containers) || this.isContained(element, drop)) && ((!drop.accept) || (Element.classNames(element).detect( function(v) { return drop.accept.include(v) } ) )) && Position.within(drop.element, point[0], point[1]) ); }, deactivate: function(drop) { if(drop.hoverclass) Element.removeClassName(drop.element, drop.hoverclass); this.last_active = null; }, activate: function(drop) { if(drop.hoverclass) Element.addClassName(drop.element, drop.hoverclass); this.last_active = drop; }, show: function(point, element) { if(!this.drops.length) return; var drop, affected = []; this.drops.each( function(drop) { if(Droppables.isAffected(point, element, drop)) affected.push(drop); }); if(affected.length>0) drop = Droppables.findDeepestChild(affected); if(this.last_active && this.last_active != drop) this.deactivate(this.last_active); if (drop) { Position.within(drop.element, point[0], point[1]); if(drop.onHover) drop.onHover(element, drop.element, Position.overlap(drop.overlap, drop.element)); if (drop != this.last_active) Droppables.activate(drop); } }, fire: function(event, element) { if(!this.last_active) return; Position.prepare(); if (this.isAffected([Event.pointerX(event), Event.pointerY(event)], element, this.last_active)) if (this.last_active.onDrop) { this.last_active.onDrop(element, this.last_active.element, event); return true; } }, reset: function() { if(this.last_active) this.deactivate(this.last_active); } }; var Draggables = { drags: [], observers: [], register: function(draggable) { if(this.drags.length == 0) { this.eventMouseUp = this.endDrag.bindAsEventListener(this); this.eventMouseMove = this.updateDrag.bindAsEventListener(this); this.eventKeypress = this.keyPress.bindAsEventListener(this); Event.observe(document, "mouseup", this.eventMouseUp); Event.observe(document, "mousemove", this.eventMouseMove); Event.observe(document, "keypress", this.eventKeypress); } this.drags.push(draggable); }, unregister: function(draggable) { this.drags = this.drags.reject(function(d) { return d==draggable }); if(this.drags.length == 0) { Event.stopObserving(document, "mouseup", this.eventMouseUp); Event.stopObserving(document, "mousemove", this.eventMouseMove); Event.stopObserving(document, "keypress", this.eventKeypress); } }, activate: function(draggable) { if(draggable.options.delay) { this._timeout = setTimeout(function() { Draggables._timeout = null; window.focus(); Draggables.activeDraggable = draggable; }.bind(this), draggable.options.delay); } else { window.focus(); // allows keypress events if window isn't currently focused, fails for Safari this.activeDraggable = draggable; } }, deactivate: function() { this.activeDraggable = null; }, updateDrag: function(event) { if(!this.activeDraggable) return; var pointer = [Event.pointerX(event), Event.pointerY(event)]; // Mozilla-based browsers fire successive mousemove events with // the same coordinates, prevent needless redrawing (moz bug?) if(this._lastPointer && (this._lastPointer.inspect() == pointer.inspect())) return; this._lastPointer = pointer; this.activeDraggable.updateDrag(event, pointer); }, endDrag: function(event) { if(this._timeout) { clearTimeout(this._timeout); this._timeout = null; } if(!this.activeDraggable) return; this._lastPointer = null; this.activeDraggable.endDrag(event); this.activeDraggable = null; }, keyPress: function(event) { if(this.activeDraggable) this.activeDraggable.keyPress(event); }, addObserver: function(observer) { this.observers.push(observer); this._cacheObserverCallbacks(); }, removeObserver: function(element) { // element instead of observer fixes mem leaks this.observers = this.observers.reject( function(o) { return o.element==element }); this._cacheObserverCallbacks(); }, notify: function(eventName, draggable, event) { // 'onStart', 'onEnd', 'onDrag' if(this[eventName+'Count'] > 0) this.observers.each( function(o) { if(o[eventName]) o[eventName](eventName, draggable, event); }); if(draggable.options[eventName]) draggable.options[eventName](draggable, event); }, _cacheObserverCallbacks: function() { ['onStart','onEnd','onDrag'].each( function(eventName) { Draggables[eventName+'Count'] = Draggables.observers.select( function(o) { return o[eventName]; } ).length; }); } }; /*--------------------------------------------------------------------------*/ var Draggable = Class.create({ initialize: function(element) { var defaults = { handle: false, reverteffect: function(element, top_offset, left_offset) { var dur = Math.sqrt(Math.abs(top_offset^2)+Math.abs(left_offset^2))*0.02; new Effect.Move(element, { x: -left_offset, y: -top_offset, duration: dur, queue: {scope:'_draggable', position:'end'} }); }, endeffect: function(element) { var toOpacity = Object.isNumber(element._opacity) ? element._opacity : 1.0; new Effect.Opacity(element, {duration:0.2, from:0.7, to:toOpacity, queue: {scope:'_draggable', position:'end'}, afterFinish: function(){ Draggable._dragging[element] = false } }); }, zindex: 1000, revert: false, quiet: false, scroll: false, scrollSensitivity: 20, scrollSpeed: 15, snap: false, // false, or xy or [x,y] or function(x,y){ return [x,y] } delay: 0 }; if(!arguments[1] || Object.isUndefined(arguments[1].endeffect)) Object.extend(defaults, { starteffect: function(element) { element._opacity = Element.getOpacity(element); Draggable._dragging[element] = true; new Effect.Opacity(element, {duration:0.2, from:element._opacity, to:0.7}); } }); var options = Object.extend(defaults, arguments[1] || { }); this.element = $(element); if(options.handle && Object.isString(options.handle)) this.handle = this.element.down('.'+options.handle, 0); if(!this.handle) this.handle = $(options.handle); if(!this.handle) this.handle = this.element; if(options.scroll && !options.scroll.scrollTo && !options.scroll.outerHTML) { options.scroll = $(options.scroll); this._isScrollChild = Element.childOf(this.element, options.scroll); } Element.makePositioned(this.element); // fix IE this.options = options; this.dragging = false; this.eventMouseDown = this.initDrag.bindAsEventListener(this); Event.observe(this.handle, "mousedown", this.eventMouseDown); Draggables.register(this); }, destroy: function() { Event.stopObserving(this.handle, "mousedown", this.eventMouseDown); Draggables.unregister(this); }, currentDelta: function() { return([ parseInt(Element.getStyle(this.element,'left') || '0'), parseInt(Element.getStyle(this.element,'top') || '0')]); }, initDrag: function(event) { if(!Object.isUndefined(Draggable._dragging[this.element]) && Draggable._dragging[this.element]) return; if(Event.isLeftClick(event)) { // abort on form elements, fixes a Firefox issue var src = Event.element(event); if((tag_name = src.tagName.toUpperCase()) && ( tag_name=='INPUT' || tag_name=='SELECT' || tag_name=='OPTION' || tag_name=='BUTTON' || tag_name=='TEXTAREA')) return; var pointer = [Event.pointerX(event), Event.pointerY(event)]; var pos = Position.cumulativeOffset(this.element); this.offset = [0,1].map( function(i) { return (pointer[i] - pos[i]) }); Draggables.activate(this); Event.stop(event); } }, startDrag: function(event) { this.dragging = true; if(!this.delta) this.delta = this.currentDelta(); if(this.options.zindex) { this.originalZ = parseInt(Element.getStyle(this.element,'z-index') || 0); this.element.style.zIndex = this.options.zindex; } if(this.options.ghosting) { this._clone = this.element.cloneNode(true); this._originallyAbsolute = (this.element.getStyle('position') == 'absolute'); if (!this._originallyAbsolute) Position.absolutize(this.element); this.element.parentNode.insertBefore(this._clone, this.element); } if(this.options.scroll) { if (this.options.scroll == window) { var where = this._getWindowScroll(this.options.scroll); this.originalScrollLeft = where.left; this.originalScrollTop = where.top; } else { this.originalScrollLeft = this.options.scroll.scrollLeft; this.originalScrollTop = this.options.scroll.scrollTop; } } Draggables.notify('onStart', this, event); if(this.options.starteffect) this.options.starteffect(this.element); }, updateDrag: function(event, pointer) { if(!this.dragging) this.startDrag(event); if(!this.options.quiet){ Position.prepare(); Droppables.show(pointer, this.element); } Draggables.notify('onDrag', this, event); this.draw(pointer); if(this.options.change) this.options.change(this); if(this.options.scroll) { this.stopScrolling(); var p; if (this.options.scroll == window) { with(this._getWindowScroll(this.options.scroll)) { p = [ left, top, left+width, top+height ]; } } else { p = Position.page(this.options.scroll); p[0] += this.options.scroll.scrollLeft + Position.deltaX; p[1] += this.options.scroll.scrollTop + Position.deltaY; p.push(p[0]+this.options.scroll.offsetWidth); p.push(p[1]+this.options.scroll.offsetHeight); } var speed = [0,0]; if(pointer[0] < (p[0]+this.options.scrollSensitivity)) speed[0] = pointer[0]-(p[0]+this.options.scrollSensitivity); if(pointer[1] < (p[1]+this.options.scrollSensitivity)) speed[1] = pointer[1]-(p[1]+this.options.scrollSensitivity); if(pointer[0] > (p[2]-this.options.scrollSensitivity)) speed[0] = pointer[0]-(p[2]-this.options.scrollSensitivity); if(pointer[1] > (p[3]-this.options.scrollSensitivity)) speed[1] = pointer[1]-(p[3]-this.options.scrollSensitivity); this.startScrolling(speed); } // fix AppleWebKit rendering if(Prototype.Browser.WebKit) window.scrollBy(0,0); Event.stop(event); }, finishDrag: function(event, success) { this.dragging = false; if(this.options.quiet){ Position.prepare(); var pointer = [Event.pointerX(event), Event.pointerY(event)]; Droppables.show(pointer, this.element); } if(this.options.ghosting) { if (!this._originallyAbsolute) Position.relativize(this.element); delete this._originallyAbsolute; Element.remove(this._clone); this._clone = null; } var dropped = false; if(success) { dropped = Droppables.fire(event, this.element); if (!dropped) dropped = false; } if(dropped && this.options.onDropped) this.options.onDropped(this.element); Draggables.notify('onEnd', this, event); var revert = this.options.revert; if(revert && Object.isFunction(revert)) revert = revert(this.element); var d = this.currentDelta(); if(revert && this.options.reverteffect) { if (dropped == 0 || revert != 'failure') this.options.reverteffect(this.element, d[1]-this.delta[1], d[0]-this.delta[0]); } else { this.delta = d; } if(this.options.zindex) this.element.style.zIndex = this.originalZ; if(this.options.endeffect) this.options.endeffect(this.element); Draggables.deactivate(this); Droppables.reset(); }, keyPress: function(event) { if(event.keyCode!=Event.KEY_ESC) return; this.finishDrag(event, false); Event.stop(event); }, endDrag: function(event) { if(!this.dragging) return; this.stopScrolling(); this.finishDrag(event, true); Event.stop(event); }, draw: function(point) { var pos = Position.cumulativeOffset(this.element); if(this.options.ghosting) { var r = Position.realOffset(this.element); pos[0] += r[0] - Position.deltaX; pos[1] += r[1] - Position.deltaY; } var d = this.currentDelta(); pos[0] -= d[0]; pos[1] -= d[1]; if(this.options.scroll && (this.options.scroll != window && this._isScrollChild)) { pos[0] -= this.options.scroll.scrollLeft-this.originalScrollLeft; pos[1] -= this.options.scroll.scrollTop-this.originalScrollTop; } var p = [0,1].map(function(i){ return (point[i]-pos[i]-this.offset[i]) }.bind(this)); if(this.options.snap) { if(Object.isFunction(this.options.snap)) { p = this.options.snap(p[0],p[1],this); } else { if(Object.isArray(this.options.snap)) { p = p.map( function(v, i) { return (v/this.options.snap[i]).round()*this.options.snap[i] }.bind(this)); } else { p = p.map( function(v) { return (v/this.options.snap).round()*this.options.snap }.bind(this)); } }} var style = this.element.style; if((!this.options.constraint) || (this.options.constraint=='horizontal')) style.left = p[0] + "px"; if((!this.options.constraint) || (this.options.constraint=='vertical')) style.top = p[1] + "px"; if(style.visibility=="hidden") style.visibility = ""; // fix gecko rendering }, stopScrolling: function() { if(this.scrollInterval) { clearInterval(this.scrollInterval); this.scrollInterval = null; Draggables._lastScrollPointer = null; } }, startScrolling: function(speed) { if(!(speed[0] || speed[1])) return; this.scrollSpeed = [speed[0]*this.options.scrollSpeed,speed[1]*this.options.scrollSpeed]; this.lastScrolled = new Date(); this.scrollInterval = setInterval(this.scroll.bind(this), 10); }, scroll: function() { var current = new Date(); var delta = current - this.lastScrolled; this.lastScrolled = current; if(this.options.scroll == window) { with (this._getWindowScroll(this.options.scroll)) { if (this.scrollSpeed[0] || this.scrollSpeed[1]) { var d = delta / 1000; this.options.scroll.scrollTo( left + d*this.scrollSpeed[0], top + d*this.scrollSpeed[1] ); } } } else { this.options.scroll.scrollLeft += this.scrollSpeed[0] * delta / 1000; this.options.scroll.scrollTop += this.scrollSpeed[1] * delta / 1000; } Position.prepare(); Droppables.show(Draggables._lastPointer, this.element); Draggables.notify('onDrag', this); if (this._isScrollChild) { Draggables._lastScrollPointer = Draggables._lastScrollPointer || $A(Draggables._lastPointer); Draggables._lastScrollPointer[0] += this.scrollSpeed[0] * delta / 1000; Draggables._lastScrollPointer[1] += this.scrollSpeed[1] * delta / 1000; if (Draggables._lastScrollPointer[0] < 0) Draggables._lastScrollPointer[0] = 0; if (Draggables._lastScrollPointer[1] < 0) Draggables._lastScrollPointer[1] = 0; this.draw(Draggables._lastScrollPointer); } if(this.options.change) this.options.change(this); }, _getWindowScroll: function(w) { var T, L, W, H; with (w.document) { if (w.document.documentElement && documentElement.scrollTop) { T = documentElement.scrollTop; L = documentElement.scrollLeft; } else if (w.document.body) { T = body.scrollTop; L = body.scrollLeft; } if (w.innerWidth) { W = w.innerWidth; H = w.innerHeight; } else if (w.document.documentElement && documentElement.clientWidth) { W = documentElement.clientWidth; H = documentElement.clientHeight; } else { W = body.offsetWidth; H = body.offsetHeight; } } return { top: T, left: L, width: W, height: H }; } }); Draggable._dragging = { }; /*--------------------------------------------------------------------------*/ var SortableObserver = Class.create({ initialize: function(element, observer) { this.element = $(element); this.observer = observer; this.lastValue = Sortable.serialize(this.element); }, onStart: function() { this.lastValue = Sortable.serialize(this.element); }, onEnd: function() { Sortable.unmark(); if(this.lastValue != Sortable.serialize(this.element)) this.observer(this.element) } }); var Sortable = { SERIALIZE_RULE: /^[^_\-](?:[A-Za-z0-9\-\_]*)[_](.*)$/, sortables: { }, _findRootElement: function(element) { while (element.tagName.toUpperCase() != "BODY") { if(element.id && Sortable.sortables[element.id]) return element; element = element.parentNode; } }, options: function(element) { element = Sortable._findRootElement($(element)); if(!element) return; return Sortable.sortables[element.id]; }, destroy: function(element){ element = $(element); var s = Sortable.sortables[element.id]; if(s) { Draggables.removeObserver(s.element); s.droppables.each(function(d){ Droppables.remove(d) }); s.draggables.invoke('destroy'); delete Sortable.sortables[s.element.id]; } }, create: function(element) { element = $(element); var options = Object.extend({ element: element, tag: 'li', // assumes li children, override with tag: 'tagname' dropOnEmpty: false, tree: false, treeTag: 'ul', overlap: 'vertical', // one of 'vertical', 'horizontal' constraint: 'vertical', // one of 'vertical', 'horizontal', false containment: element, // also takes array of elements (or id's); or false handle: false, // or a CSS class only: false, delay: 0, hoverclass: null, ghosting: false, quiet: false, scroll: false, scrollSensitivity: 20, scrollSpeed: 15, format: this.SERIALIZE_RULE, // these take arrays of elements or ids and can be // used for better initialization performance elements: false, handles: false, onChange: Prototype.emptyFunction, onUpdate: Prototype.emptyFunction }, arguments[1] || { }); // clear any old sortable with same element this.destroy(element); // build options for the draggables var options_for_draggable = { revert: true, quiet: options.quiet, scroll: options.scroll, scrollSpeed: options.scrollSpeed, scrollSensitivity: options.scrollSensitivity, delay: options.delay, ghosting: options.ghosting, constraint: options.constraint, handle: options.handle }; if(options.starteffect) options_for_draggable.starteffect = options.starteffect; if(options.reverteffect) options_for_draggable.reverteffect = options.reverteffect; else if(options.ghosting) options_for_draggable.reverteffect = function(element) { element.style.top = 0; element.style.left = 0; }; if(options.endeffect) options_for_draggable.endeffect = options.endeffect; if(options.zindex) options_for_draggable.zindex = options.zindex; // build options for the droppables var options_for_droppable = { overlap: options.overlap, containment: options.containment, tree: options.tree, hoverclass: options.hoverclass, onHover: Sortable.onHover }; var options_for_tree = { onHover: Sortable.onEmptyHover, overlap: options.overlap, containment: options.containment, hoverclass: options.hoverclass }; // fix for gecko engine Element.cleanWhitespace(element); options.draggables = []; options.droppables = []; // drop on empty handling if(options.dropOnEmpty || options.tree) { Droppables.add(element, options_for_tree); options.droppables.push(element); } (options.elements || this.findElements(element, options) || []).each( function(e,i) { var handle = options.handles ? $(options.handles[i]) : (options.handle ? $(e).select('.' + options.handle)[0] : e); options.draggables.push( new Draggable(e, Object.extend(options_for_draggable, { handle: handle }))); Droppables.add(e, options_for_droppable); if(options.tree) e.treeNode = element; options.droppables.push(e); }); if(options.tree) { (Sortable.findTreeElements(element, options) || []).each( function(e) { Droppables.add(e, options_for_tree); e.treeNode = element; options.droppables.push(e); }); } // keep reference this.sortables[element.id] = options; // for onupdate Draggables.addObserver(new SortableObserver(element, options.onUpdate)); }, // return all suitable-for-sortable elements in a guaranteed order findElements: function(element, options) { return Element.findChildren( element, options.only, options.tree ? true : false, options.tag); }, findTreeElements: function(element, options) { return Element.findChildren( element, options.only, options.tree ? true : false, options.treeTag); }, onHover: function(element, dropon, overlap) { if(Element.isParent(dropon, element)) return; if(overlap > .33 && overlap < .66 && Sortable.options(dropon).tree) { return; } else if(overlap>0.5) { Sortable.mark(dropon, 'before'); if(dropon.previousSibling != element) { var oldParentNode = element.parentNode; element.style.visibility = "hidden"; // fix gecko rendering dropon.parentNode.insertBefore(element, dropon); if(dropon.parentNode!=oldParentNode) Sortable.options(oldParentNode).onChange(element); Sortable.options(dropon.parentNode).onChange(element); } } else { Sortable.mark(dropon, 'after'); var nextElement = dropon.nextSibling || null; if(nextElement != element) { var oldParentNode = element.parentNode; element.style.visibility = "hidden"; // fix gecko rendering dropon.parentNode.insertBefore(element, nextElement); if(dropon.parentNode!=oldParentNode) Sortable.options(oldParentNode).onChange(element); Sortable.options(dropon.parentNode).onChange(element); } } }, onEmptyHover: function(element, dropon, overlap) { var oldParentNode = element.parentNode; var droponOptions = Sortable.options(dropon); if(!Element.isParent(dropon, element)) { var index; var children = Sortable.findElements(dropon, {tag: droponOptions.tag, only: droponOptions.only}); var child = null; if(children) { var offset = Element.offsetSize(dropon, droponOptions.overlap) * (1.0 - overlap); for (index = 0; index < children.length; index += 1) { if (offset - Element.offsetSize (children[index], droponOptions.overlap) >= 0) { offset -= Element.offsetSize (children[index], droponOptions.overlap); } else if (offset - (Element.offsetSize (children[index], droponOptions.overlap) / 2) >= 0) { child = index + 1 < children.length ? children[index + 1] : null; break; } else { child = children[index]; break; } } } dropon.insertBefore(element, child); Sortable.options(oldParentNode).onChange(element); droponOptions.onChange(element); } }, unmark: function() { if(Sortable._marker) Sortable._marker.hide(); }, mark: function(dropon, position) { // mark on ghosting only var sortable = Sortable.options(dropon.parentNode); if(sortable && !sortable.ghosting) return; if(!Sortable._marker) { Sortable._marker = ($('dropmarker') || Element.extend(document.createElement('DIV'))). hide().addClassName('dropmarker').setStyle({position:'absolute'}); document.getElementsByTagName("body").item(0).appendChild(Sortable._marker); } var offsets = Position.cumulativeOffset(dropon); Sortable._marker.setStyle({left: offsets[0]+'px', top: offsets[1] + 'px'}); if(position=='after') if(sortable.overlap == 'horizontal') Sortable._marker.setStyle({left: (offsets[0]+dropon.clientWidth) + 'px'}); else Sortable._marker.setStyle({top: (offsets[1]+dropon.clientHeight) + 'px'}); Sortable._marker.show(); }, _tree: function(element, options, parent) { var children = Sortable.findElements(element, options) || []; for (var i = 0; i < children.length; ++i) { var match = children[i].id.match(options.format); if (!match) continue; var child = { id: encodeURIComponent(match ? match[1] : null), element: element, parent: parent, children: [], position: parent.children.length, container: $(children[i]).down(options.treeTag) }; /* Get the element containing the children and recurse over it */ if (child.container) this._tree(child.container, options, child); parent.children.push (child); } return parent; }, tree: function(element) { element = $(element); var sortableOptions = this.options(element); var options = Object.extend({ tag: sortableOptions.tag, treeTag: sortableOptions.treeTag, only: sortableOptions.only, name: element.id, format: sortableOptions.format }, arguments[1] || { }); var root = { id: null, parent: null, children: [], container: element, position: 0 }; return Sortable._tree(element, options, root); }, /* Construct a [i] index for a particular node */ _constructIndex: function(node) { var index = ''; do { if (node.id) index = '[' + node.position + ']' + index; } while ((node = node.parent) != null); return index; }, sequence: function(element) { element = $(element); var options = Object.extend(this.options(element), arguments[1] || { }); return $(this.findElements(element, options) || []).map( function(item) { return item.id.match(options.format) ? item.id.match(options.format)[1] : ''; }); }, setSequence: function(element, new_sequence) { element = $(element); var options = Object.extend(this.options(element), arguments[2] || { }); var nodeMap = { }; this.findElements(element, options).each( function(n) { if (n.id.match(options.format)) nodeMap[n.id.match(options.format)[1]] = [n, n.parentNode]; n.parentNode.removeChild(n); }); new_sequence.each(function(ident) { var n = nodeMap[ident]; if (n) { n[1].appendChild(n[0]); delete nodeMap[ident]; } }); }, serialize: function(element) { element = $(element); var options = Object.extend(Sortable.options(element), arguments[1] || { }); var name = encodeURIComponent( (arguments[1] && arguments[1].name) ? arguments[1].name : element.id); if (options.tree) { return Sortable.tree(element, arguments[1]).children.map( function (item) { return [name + Sortable._constructIndex(item) + "[id]=" + encodeURIComponent(item.id)].concat(item.children.map(arguments.callee)); }).flatten().join('&'); } else { return Sortable.sequence(element, arguments[1]).map( function(item) { return name + "[]=" + encodeURIComponent(item); }).join('&'); } } }; // Returns true if child is contained within element Element.isParent = function(child, element) { if (!child.parentNode || child == element) return false; if (child.parentNode == element) return true; return Element.isParent(child.parentNode, element); }; Element.findChildren = function(element, only, recursive, tagName) { if(!element.hasChildNodes()) return null; tagName = tagName.toUpperCase(); if(only) only = [only].flatten(); var elements = []; $A(element.childNodes).each( function(e) { if(e.tagName && e.tagName.toUpperCase()==tagName && (!only || (Element.classNames(e).detect(function(v) { return only.include(v) })))) elements.push(e); if(recursive) { var grandchildren = Element.findChildren(e, only, recursive, tagName); if(grandchildren) elements.push(grandchildren); } }); return (elements.length>0 ? elements.flatten() : []); }; Element.offsetSize = function (element, type) { return element['offset' + ((type=='vertical' || type=='height') ? 'Height' : 'Width')]; };
{ "pile_set_name": "Github" }
Introduction ============ Left atrial (LA) size as assessed by echocardiography has been shown to have prognostic value in patients with dilated cardiomyopathy (DCM). More recently cardiac magnetic resonance (CMR) imaging studies have reported that the presence of left ventricular mid-wall late gadolinium enhancement (LGE), a marker of myocardial fibrosis, also predicts adverse outcome in DCM. The biplane area-length method has been validated as an accurate method for assessment of LA volumes, which echocardiography may underestimate by up to 47% compared with CMR. Purpose ======= We sought to establish whether LA volume as assessed by CMR was associated with the presence of mid-wall LGE in DCM patients. Methods ======= DCM patients were studied between Jan 2006-Aug 2008. Patients with coronary artery disease were excluded. All patients underwent a comprehensive CMR study which included acquisition of LGE images in 2 separate phase-encoding directions to exclude artefact. LA area and length were traced at end-ventricular systole and diastole in both horizontal and vertical long axis images. Maximum (LA max) and minimum (LA min) LA volumes were then calculated using the biplane area-length method for ellipsoid bodies and indexed to BSA. A separate cardiologist who was blinded to the results of the LA area determined the presence of mid-wall LGE. Results ======= One hundred and ninety two patients (152 male; age 50.7 years ± 14.7 years (mean±SD); LV EF 40% ± 15%, were recruited to the study. The overall mean indexed LA max was 54.5 (95% CI: 51.7-57.5) and mean indexed LA min 29.8 (95%CI: 23.7-27.1). Patients with concurrent mid-wall LGE had significantly larger indexed LA max volumes than those without LGE (56.2 ml (25.6 ml - 60.9 ml) vs. 49.7 ml (45.5 ml -54.2 ml) (mean (95%CI), p = 0.03)). Patients with concurrent LGE also had significantly larger indexed LA min volumes than those without (31.9 ml (28.6 ml - 35.7 ml) vs. 24.3 ml (20.7 ml - 28.5 ml) respectively; p \< 0.01). The differences remained statistically significant when patients with atrial fibrillation were excluded from analysis. Conclusion ========== LA volumes were significantly greater in DCM patients with left ventricular mid-wall LGE compared to those with no LGE. The presence of mid-wall LGE may therefore be associated with increased left atrial pressures in DCM patients. Further studies are therefore required to evaluate whether LA size has incremental prognostic value to midwall LGE in DCM.
{ "pile_set_name": "PubMed Central" }
Q: What is a profiler measuring and how is that different from TTFB? I am using the magento profiler and it gives a reading of how long it took for the PHP code to run, I think. What I have found that the TTFB - time to first byte value is much higher (sometimes double) than the profiler time. What else is forming part of the TTFB value? Here is the profiler time below: Here is the TTFB for the same request: A: The profiler is not including the magento/lib code execution. You should use a PHP debugger instead of the magento one.
{ "pile_set_name": "StackExchange" }
Wx Watch: The whys of wind Facing fear of the windsock March 1, 2012 ByThomas A. Horne Wind activity on January 17, 2012, as analyzed by several sources. The surface analysis chart (top left) shows a strong cold front moving through the Ohio Valley, with a squall line in southern Ohio/central Kentucky. A three-hour pressure tendency chart (top right) indicates just how fast pressure is falling ahead of the cold front, and rising behind it. As you might guess, airmets for strong surface winds (above left) are parked the length of the front. And high-wind advisories (above right) are in effect as the front moves east. The airport is quiet. No taxiing, no runups, no one in the pattern, no one on the radio. And the weather is good VFR. What's going on? Chances are, a look at the windsock will give the answer. Sure enough, it’s sticking straight out and switching direction rapidly with strong, gusty winds. These kinds of winds are the bane of the experienced and the neophyte pilot alike, because they can mean a lot of work during takeoffs and landings—and promise huge servings of turbulence. There are risks, too. Just ask insurance companies. That time of year We’re conditioned to think of March as the windiest time of year, but that’s an overgeneralization. Strong surface winds happen at all times of year, for any number of reasons. But, yes, the onset of spring means that bigger, warmer air masses begin to creep northward, chasing winter’s cold back to Canada. What does this have to do with rowdy surface winds? It helps to understand that wind is a direct result of temperature differences. No matter the time of year or your location, if there’s a zone where colder and warmer air masses come together, you’ve got wind. Temperature as pressure Let’s imagine the air mass in the warm sector of a classic frontal complex, and then compare it to the colder air in an air mass advancing from the west as the leading edge of a cold front. Where the warm air lives, air molecules are farther apart, the air is less dense, and so the warm layer is relatively “thick” in a vertical sense. Meanwhile, in a cold air mass, the air is denser and therefore less thick. How thick is thick? You can check this out on constant pressure charts. That’s where you can see the heights of various surfaces of similar pressure. For example, if you were to draw a line on an 850-millibar (this corresponds to approximately 5,000 feet msl) chart from a warm sector, across a cold front, and into the cold air behind the front you might see the thicknesses of that pressure surface can range from 1,500 meters in the warm air to, say, 1,200 meters behind the front. What we’re looking at are the height variations of a pressure surface aloft—generated by a temperature gradient. Here’s the take-away: The height/temperature variations create a pressure gradient, and a corresponding pressure gradient force. And you know what that means: Air begins to move from higher pressure to lower pressure, wind speeds pick up and change direction according to the Coriolis force, and lows and fronts are born. So temperature gradients aloft and at the surface create the steep pressure drops that we usually associate with a strong frontal passage’s high winds. The greater the temperature gradients, the greater the pressure gradients, and the stronger the winds. Isobars Closely spaced isobars on surface analysis charts give a great idea of just how comparatively strong surface winds may be. The tighter the gradient between isobars, the stronger the wind. But there are some other charts that can help visualize the situation. Pressure tendency charts indicate how much the surface pressure has changed over the past three hours. Streamline analysis charts let us see how, and where, wind directions change. This can all be helpful when scouting out airports with runways more favorably aligned into the wind. Of course, a check of METARs and TAFs for mention of strong surface winds is also in order. So is a look at airmets for turbulence (or mention of LLWS, or low-level wind shear), and area forecasts, to see if the infamous “WIND” (this means sustained surface winds or gusts of 20 knots or more) notation is posted. Typically, this warning appears in anticipation of the rowdy surface winds that so often follow a cold frontal passage. Mixing down Ever notice how a nice VFR day may dawn with little or no surface wind, but by midday winds sometimes reach a not-so-nice, gale level? (Definition: winds of 28 to 47 knots.) Then, as the sun sets, the winds magically die down. This behavior is a function of the mixing of air in the lowest levels of the atmosphere. At night, the winds aloft continue moving at their usual pace. But without any surface heating from the sun, surface winds drop off because there are no rising air parcels. But by late morning, the surface heats up a bit, which allows this warmer air to reach the 3,000- to 5,000-foot-agl level. This, plus the turbulence created at the boundary between the faster-moving winds aloft and the calmer surface winds, creates eddies that mix the winds aloft and send them downwards. The result? Winds pick up during the day. For a few days after a cold frontal passage, or on days when a large high pressure system prevails, you can generally rely on a rule of thumb to predict the peak strength of surface winds. It’s a simple rule, based on the air-mixing phenomenon. Just look at the winds aloft at 3,000 to 5,000 feet agl. By midmorning those winds will mix down to the surface. So if the winds aloft are 30 knots, by 11 a.m. they’ll be at ground level. At day’s end, those winds aloft will “decouple” from the quieter air nearer the surface and the pattern will become a tamer place. Hands and feet So much for theory. Remember the tried-and-true piloting skills necessary for landing and taking off in nasty surface winds? Here’s a quick review of a few: For a high-wind takeoff, it’s best to lift off firmly so that any downdrafts don’t let you settle back to the runway. For the same reason, leave the gear down in retractable-gear airplanes until you’re safely above the runway. On final, use your normal approach speed, but add half the gust factor if winds are gusting. For example, if winds are 15 gusting to 25, then add half the difference (five knots) to your normal approach speed. Don’t fly high-wind approaches with too much speed; it will take longer to bleed off lift and airspeed, you’ll be exposed to crosswinds for a longer period of time, and be subject to ballooning with the excess lift caused by any gusts. Consider using partial flaps when the winds are high. In strong winds, full flaps make for more lift at slower airspeeds when in ground effect, something you don’t need when you’re trying to touch down in style. The wing-down/opposite rudder method for crosswind touchdowns seems to work the best for most airplanes. This means lowering the upwind wing so as to stop any sideways drift, and at the same time applying opposite rudder to keep the airplane’s longitudinal axis aligned with the runway centerline. Sure, you hear some pilots advocate crabbing all the way down final, then making a quick transition to the wing-down method the moment before the upwind tire meets the runway. It’s possible, but your timing must be impeccable lest you swerve on the runway—or worse. Related Website of the month: BLIPmap UniViewer So you don’t buy the 5,000-foot predictor of surface winds? Want to know how fast any thermal updrafts will be? Or wonder where updraft heights will peak? If wind behavior near the surface gets your juices flowing, check out the BLIPmap UniViewer online. This site is a favorite with sailplane pilots because it deals so heavily in boundary-layer dynamics—especially things like cloud bases, wind speeds, and updraft velocities. But this same information helps all pilots understand surface winds better. Yes, you have to register to use this interactive site, but it's free. You can click on a number of regions within the United States, then zoom in or pan around a spot that interests you. For the serious weather geek, you can even click on a location to get a pop-up of the nearest Skew-T/log P plots. AOPA Pilot Editor at Large Tom Horne has worked at AOPA since the early 1980s. He began flying in 1975 and has an airline transport pilot and flight instructor certificates. He’s flown everything from ultralights to Gulfstreams and ferried numerous piston airplanes across the Atlantic. Mark Scheuer was tired of yelling at his wife across the noisy cockpit of their Grumman Yankee, and he thought there had to be a better way of communicating. PS Engineering Inc. was born out of that necessity and is now celebrating its third decade of forging new ground in cockpit communication technology. A tale of flying adventure, severe injuries, international political maneuvering, and an emergency at sea comes to life in "Floatplane Odyssey," a book that commemorates the twenty-fifth anniversary of Tom Casey’s 1990 around-the-world flight in a Cessna 206 on floats.
{ "pile_set_name": "Pile-CC" }
Francis Graham-Smith Sir Francis Graham-Smith (born 25 April 1923) is a British astronomer. He was the thirteenth Astronomer Royal from 1982 to 1990. Biography Education He was educated at Rossall School, Lancashire, England, and attended Downing College, Cambridge from 1941. Career In the late 1940s he worked at the University of Cambridge on the Long Michelson Interferometer. In 1964 he was appointed Professor of Radio Astronomy the University of Manchester and in 1981 director of the Nuffield Radio Astronomy Laboratories, part of the University of Manchester at Jodrell Bank. He was also Director of the Royal Greenwich Observatory from 1975 to 1981. Honours He was elected a Fellow of the Royal Society in 1970 and was awarded their Royal Medal in 1987. He was president of the Royal Astronomical Society from 1975 to 1977. He was the thirteenth Astronomer Royal from 1982 to 1990. He won the Richard Glazebrook Medal and Prize in 1991. Patronage Sir Francis Graham-Smith is a Distinguished Supporter of Humanists UK and is a patron of Mansfield and Sutton Astronomical Society. Lectures In 1965 he was invited to co-deliver the Royal Institution Christmas Lecture on Exploration of the Universe. References External links Scienceworld biography Online catalogue of F. Graham Smith's working papers as director of the Royal Greenwich Observatory (held at Cambridge University Library) Category:1923 births Category:Place of birth missing (living people) Category:People educated at Rossall School Category:Alumni of Downing College, Cambridge Category:Astronomers Royal Category:British astronomers Category:British humanists Category:Fellows of Downing College, Cambridge Category:Knights Bachelor Category:Living people Category:Royal Medal winners Category:20th-century astronomers Category:Fellows of the Royal Society Category:Presidents of the Royal Astronomical Society
{ "pile_set_name": "Wikipedia (en)" }
People may have noticed that I have practically stopped posting the last month or more despite being pretty active before that. For reasons I would rather not disclose, I am taking a break from all internet forums for a few months so onward my Garheim Brothers and I hope to be back in a couple of months once my lugbulk order is in and I can build again
{ "pile_set_name": "Pile-CC" }
ENACTIVE VISION (for L. Shapiro, ed. ROUTLEDGE HANDBOOK OF EMBODIED COGNITION Erik Myin University of Antwerp, Department of Philosophy, Centre for Philosophical Psychology & Jan Degenaar University of Antwerp, Department of Philosophy, Centre for Philosophical Psychology, and University Paris Descartes, Laboratoire Psychologie de la Perception 1. Enactivism and the sensorimotor account Enactivism, ever since its first formulation by Varela, Thompson and Rosch, has always laid great emphasis on organism/environment interactions as the proper framework for studying cognition. Minds have to be understood as ―enacted‖ by situationally embedded living organisms. By proposing this approach to minds, enactivists have explicitly opposed themselves to cognitivists, who take representation as their central posit (Varela, Thompson & Rosch 1991). Thus, it is claimed that cognition is, rather than representation of the world, ―the enactment of a world and a mind on the basis of a history of the variety of actions that a being in the world performs‖ (Varela, Thompson & Rosch 1991: 9; see also Thompson 2007). True to the enactivist motto that ―a path is laid down in walking,‖ the role of internally stored rules and representations in accounting for cognition is thus replaced by an embodied history of interactions. By taking up this position, enactivism reveals itself as committed to a strong notion of embodiment. Such a concept has to be distinguished from other senses of embodiment. One way to use ―embodiment‖ is to emphasize the role of the particular properties of the body in shaping our cognitive capacities. Thus, to give a rather trite example, it could be argued that having ten fingers lies at the basis of the decimal system, so that even mathematics has a basis in the body. Such a use of the notion of embodiment is in no way incompatible with a traditional cognitive science approach, in which computations and internal representations are assigned a key role for explaining our cognitive capacities. In particular, one could conceive of the specifics of the body as constraining the form or content of our representations or computations. In the sense of ―embodied‖ at stake here, ―embodied‖ is used in contrast with ―representational,‖ such that saying that some capacity is embodied is to deny that it involves internal representations. One could argue, for example, that people embody the rules of their native language, in the sense that the rules are manifest, and only manifest in their utterances, or other practical dealings with language. The structure of language then is implicit in the 2 practices; it is spread out in time, not represented anywhere. Of course, one could not embody rules without having a body engaged in the relevant, rule manifesting, activities, but the emphasis here lies not on the specifics of that body, but on what could be called the primacy of embodiment over representation. We will take enactivism as stating that cognition is embodied in this strong, or ―radical‖ sense (Chemero 2009, Hutto & Myin 2013). In the domain of perception, enactivism has become associated with the so called sensorimotor contingency approach presented in O'Regan and Noë (2001). Vision, according to the sensorimotor approach ―is something we do, rather than something that happens in us‖ (O'Regan & Noë 2001). The approach rejects the view on vision as aimed at producing ―faithful metric-preserving replica of the outside world inside the head‖ (O'Regan 1992). Instead, seeing is conceived of as an ―exploratory activity,‖ ―attuned to‖ sensorimotor contingencies, or ways in which sensory stimulation changes with movement-such as when a retinal image changes when one walks around an object. Seeing a scene or an object is, in the sensorimotor approach, comparable to feeling a surface or object, where the experience is of the whole surface or object, despite the fact that momentary tactile stimulation is limited to the fingertips making contact only at particular places. Sensorimotor theorists have argued that the idea that vision should be understood as temporally extended interaction is supported by the insights it provides into the nature and character of perceptual experiences. According to the sensorimotor approach, perceptual experiences owe their identity to the patterns of sensorimotor contingencies typical of the kinds of organism/environment interactions those experiences normally arise in. For example, tactile feelings of hardness or softness are determined by particular patterns of experiences one has when engaging in such activities as squishing a sponge or pushing a brick wall. Similarly, that expertiences of seeing differ as a class from experiences of hearing is due, according to the sensorimotor theory, to patterns of sensorimotor contingencies specific to vision and audition, such as that in seeing, but not in hearing, stimulation from a particular source stops when one turns one's head sideways, or closes one's eyes. The crucial role played by patterns of sensorimotor contingency in shaping perceptual experience has been seen as supported by findings on adaptation to distorting or inverting glasses, as well as findings of experiments with sensory substitution devices (Hurley & Noë 2003; Noë 2004; O'Regan 2011). For it seems that experiential change here follows on the heels of adaptation to patterns of sensorimotor contingencies. The sensorimotor approach has been met with strong opposition and criticism, often formulated as criticism of enactivist approaches to perception generally (e.g. Block 2005; Prinz 2006, 2009). Critics of the sensorimotor approach have been puzzled, both by general claims about the role of sensorimotor contingies in shaping experience and by the appeal to phenomena such as sensory substitution and distorted vision. Some critics have reached the verdict that these phenomena support the sensorimotor approach in no way whatsoever. They have further held that the sensorimotor claims regarding the determination of experiential quality fly in the face of the simplest observations about experience in imagery, dreaming or paralysis, in which experience seems radically disconnected from any presently obtaining patterns of sensorimotor interaction. We will discuss the sensorimotor approach in the light of the broader enactivism as sketched above. We shall argue that spelling out the sensorimotor theory along enactivist lines, replacing representation by attunement due to a history of interactions, allows for a truly 3 distinctive sensorimotor approach. This enactive sensorimotor approach is in perfect harmony with evidence about core phenomena such as vision with inverting glasses and sensory substitution. Moreover, an enactive sensorimotor approach allows for the accommodation of experiences such as in dreaming and perceptual imagery. 2. Enactive sensorimotor vision Let us first return to the sensorimotor contingency account, as presented in O'Regan and Noë (2001). ―Vision,‖ it was said there, is ―a mode of exploration of the world, mediated by knowledge of (...) sensorimotor contingencies‖ (p. 940), the latter being characterized as ―the structure of the rules governing the sensory changes produced by various motor actions‖ (p. 941). It was emphasized that the knowledge involved is ―implict,‖ leading to a view of perception as a ―skillful activity.‖ The sensorimotor approach was presented as being opposed to approaches based on the assumption ―that vision consists in the creation of an internal representation of the outside world whose activation somehow generates visual experience‖ (O'Regan & Noë 2001: 940). In order to get a firmer grip on the sensorimotor approach, it is helpful to look in some more detail at how the sensorimotor approach has been applied to a number of perceptual phenomena, in O'Regan and Noë (2001), and on later occasions (e.g. O'Regan 2011). As a first one of such, consider expanded vision. By ―expanded vision‖ is meant the kind of visual experience as when standing in front of a scene and overseeing it, looking at a large screen, or holding a book opened in one's hand and having the experience of seeing both pages. Expanded vision is characterized by the experienced spatial and temporal continuity of what is seen. Essentially, seeing a scene is having the feeling of being in roughly simultaneous visual contact with a certain extent of the world. Though expanded vision comes very naturally to us, certain by now well-known facts seem to stand in the way of a straightforward explanation of it. One relevant fact is that subjects are not continuously accessing the whole scene in the same high-quality way, due to such factors as differences in the spatial distribution of receptors in the retina, and the presence of the blind spot (O'Regan 1992, 2011). The absence of homogenous simultaneous access is further highlighted by results from studies on change blindness and inattentional blindness, for they show that large changes in a scene can go unnoticed, for example when other changes are particularly conspicuous. One way to explain expanded vision in the face of these facts it to relegate the homogeneity to something like the ―internal representation of the outside world‖ (reiterating O'Regan & Noë 2001). An inhomogeneous and gappy retinal image would be ―filled in‖ to produce a homogenous complete representation, to which or through which simultaneous access would still be possible. The sensorimotor approach denies the need for such an inner simulacrum of temporal or spatial continuity. Instead it accounts for continuity in terms of sensorimotor regularities. One should not be misled by the fact of instantaneous access: perceivers have high quality momentary access to only limited parts of the scene, while momentary access to other parts of the scene is of low quality. What is crucial, according to the sensorimotor approach, is that perceivers are set up to react to sudden changes in visual characteristics, so that, normally, 4 any such significant change will not go unnoticed, but will lead the perceiver to focus on it. The trick to a successful change blindness experiment is to tamper with this ―grabbiness‖ or ―alerting capacity‖ (O'Regan, Myin & Noë 2005) of environmental changes, by introducing an even larger visual alteration such as a blank screen between two pictures of a scene before and after changes. Seeing the scene in an expanded way, then, is not the consequence of an expanded representation, but of one's capacity to interact with the scene. Next, consider seeing an object. Sensorimotor theorists, following Donald MacKay, have compared the visual experience in object vision to the tactile experience of holding a bottle. The actual tactile contact with the bottle is only limited to where the fingers touch the bottle. Nevertheless, the experience is of a bottle, and not of disconnected bits of hard material. Again, one could invoke a homogenous representation to account for the experience of the whole object. Again the sensorimotor approach prefers an account in terms of being ―attuned‖ to a sensorimotor pattern (O'Regan & Noë 2001). The experience of feeling the whole bottle is then explained by the fact that one is attuned to the changes in stimulation that will occur when one makes certain movements. No representation needs to mediate, underlie or be causally involved in such a state of attunement. The same is claimed for seeing an object. To perceive a 3-D object currently seen only from one side as a 3-D object, one then does not need a representation: it suffices that one is attuned to the kinds of changes in stimulation that will result when either the object moves or when one moves with respect to it. Thirdly, take seeing a color. It is a well-known fact, named ―approximate color constancy,‖ that we more or less see the colors surfaces actually have, even if the stimulus that reaches the eye is a product of both the surface's color and the contingent current illumination. Color experience is not a response to the local light as it currently reaches you; it is sensitive to a permanent surface property. A fundamental challenge for color science is to explain how this can happen. An enactive sensorimotor approach to color experience, in line with the accounts of expanded vision and object vision above, hooks on to the temporal extendedness of color perception (Broackes 1992; Noë 2004; O'Regan 2011). The permanent property of color is identified with a reflectance profile: the way the surface reflects light under different lighting conditions. One can find out about the reflectance profile property by moving the colored object around or by observing surfaces under changing lighting conditions. Over time, one becomes sensitive to the underlying reflectance profile of a surface on the basis of minimal cues. Just as one can recognize a familiar person from a glimpse, one can recognize a reflectance profile on the basis of the behavior of the surface in a minimal set of lighting conditions. Such a minimal set, moreover, is almost always available, as it exists when different nearby objects reflect differently on a surface (Ruppertsberg & Bloj 2007). In short, being capable of seeing colors then consists of being attuned to reflectance profiles, or to the changes in stimulation one would receive under various circumstances (see Phillipona & O'Regan 2006). This way of looking at color illustrates the overall sensorimotor take on the qualitative character of perceptual experience. The sensorimotor approach claims that both the character of sensory qualities within a modality, such as the difference between softness and hardness, as well as differences between the character of modalities as a whole, are determined by differences in classes of sensorimotor contingencies typical of perceptual interactions. The experiential quality of softness differs from the quality of hardness, because of the different effects of pressing or squeezing. Similary, touch differs from vision, among other things because tactile, but not visual experience of an object comes to an end when immediate bodily contact is lost. 5 In the different cases of application of the sensorimotor approach surveyed in the above, the notion of ―being attuned to sensorimotor contingencies‖ has played a prominent role. This raises questions about its precise meaning. What does it mean that a person is attuned to the sensorimotor contingencies of ―red‖ or ―softness‖? A way of answering that question offered in O'Regan and Noë (2001) appeals to the exercise of the ―mastery‖ or ―knowledge‖ of sensorimotor contingencies, building on the already mentioned characterization of ―vision as exploratory activity mediated by knowledge of sensorimotor contingencies.‖ A problem with an appeal to knowledge is that it allows a representational interpretation, while the representationalist framework was resisted in the context of inner simulacra accounting for expanded vision. On such an interpretation, having knowledge about sensorimotor contingencies involves representing those sensorimotor contingencies. Perhaps the specification, in O'Regan & Noë (2001) and elsewhere, that the knowledge is meant to be ―implicit,‖ is aimed at excluding such an interpretation in favor of an approach based on practical know-how, or skills. However, as pointed out by Daniel Hutto, insisting that knowledge is meant to be ―implicit‖ is not compatible with supposing that the knowledge plays a ―mediating‖ role (Hutto 2005). An appeal to mediating knowledge would imply commitment to an intermediating representational stage. Consistency with the initial nonrepresentationalism of the sensorimotor approach can be regained by conceiving of ―attunement to sensorimotor contingencies‖ as embodied in the strong sense mentioned at the beginning of this entry. Attunement to sensorimotor contingencies then means that an organism has acquired, on the basis of a history of interactions, a sensitivity in its perception and action for the ways stimuli change with movement. In line with the strong notion of embodiment, the development of perceptual attunement is not conceived of in representationalist terms: the past is not playing its role in the present as represented past – as mediated by representations of the past. Enactivists relying on the strong notion of embodiment will insist that what a history of attunement has yielded is just that: attunement. Of course, attunement is attunement to certain external conditions. Call this the external aspect of attunement. Moreover, attunement is impossible without changed conditions in the organism. Call this the internal aspect of attunement. The mere existence of external and internal aspects of attunement do not necessitate representational descriptions, however. It is not because an organism has become attuned to certain circumstances that it represents those circumstances by some internal means. This is obvious in noncognitive evolutionary adaptations: a bird's wings partially constitute the bird's internal conditions for moving appropriately in an aerial environment, but this does not imply that the bird or its wings represent these external conditions. Analogously, in the cognitive case, there is no logical need to describe the internal conditions that mediate cognitive attunements as representing the external circumstances of attunement. The upshot is that, once the strong notion of embodiment is adhered to, a historical or developmental aspect comes to the fore, in a nonrepresentationalist shape. Representationalists cannot deny a role for an organism's history, but they may insist that an occurrent representation of the past needs to stand in for the real past, if the past is to yields an influence now. An enactive sensorimotor approach-that is, one defining attunement in the strong sense of embodiment-denies that the changes laid down in an organism's history need to be representational. Without being representational, these changes can still retain their causal powers and allow for a bridge between the past and the present. 6 The enactive sensorimotor approach thus has the advantage of offering a reading of ―attunement to sensorimotor contingencies‖ which is consistent with the antirepresentationalism present in the sensorimotor analysis of expanded vision, object vision, and the experience of properties such as softness or color. 3. Attunement in action How does the enactive sensorimotor position relate to evidence to which sensorimotor theorists have appealed, in particular findings about adaptation to distorting glasses or about sensory substitution? Critics of the sensorimotor approach to perception and perceptual awareness have challenged it on this front, claiming that neither findings about distorting glasses or about sensory substitution confirm the sensorimotor approach (Block 2005; Prinz 2006; Klein 2007). By means of lenses or prisms, the light entering the eyes can be inverted in a left-right and/or an above-below dimension. This introduces systematic changes in the perceiver's visual sensorimotor interaction with the environment. It has been reported that after extensive wearing of inverting glasses (within 6-10 days), visual abilities can be re-acquired and one may once again learn to see where things are (e.g. Stratton 1896, 1897; Taylor 1962; Kohler 1964; Dolezal 1982; but see for example Linden et al. 1999 for negative findings). A phenomenon consistently reported throughout the literature is that, on first wearing inverting glasses, the stability of visual experience breaks down with head movements, as if the scene moves in front of one's eyes. This confirms that visual experience depends on sensorimotor contingencies, or on the relation between sensory stimulation and bodily movement (Taylor 1962), and not on sensory stimulation alone. For since sensory stimulation is only spatially inverted, dependence on sensory stimulation only predicts inverted, but not unstable experience. Over the days, free-moving subjects adapt to the new situation and movement of the head no longer disrupts visual stability. The subject has become attuned to the novel sensorimotor contingencies, so that environmental movements lead to a distinctively visual experience of movement of the scene, while movement of the perceiver's own point or direction of view does not. The crucial role of sensorimotor contingencies is further evidenced by the finding that, when studies use a chin rest to avoid head movement, adaptation is very restricted. Indeed, it seems that only adaptation of proprioceptive experiences-and no adaptation of visual experience- takes place in studies in which subjects perform actions when head movements are thus avoided (for some examples see Harris 1965). We can make sense of this by distinguishing kinds of sensorimotor contingency, such as those related to exploratory activities such as looking from performatory activities such as grasping (Gibson 1964): genuinely visual adaptation to wearing inverting glasses depends strongly on active visual exploration. It is also clear that the distortion brought about by glasses affects different kinds of sensorimotor contingencies differently. Since the early reports of Stratton (1896, 1897), the focus of analysis in inversion studies has often been on the altered relation between vision on the one hand, and touch or bodily experiences on the other. However, inverting glasses introduce a conflict within spatial vision itself (Degenaar 2013). Head movements and eye movements involve different patterns of sensorimotor contingencies, some of which are changed and some of which remain unaffected under the distortion. A subject wearing the 7 glasses has to adapt to the altered patterns, while leaving the existing attunement to the unaltered patterns intact. Instead of leading to a prediction of a complete ―inversion of experience‖ (Klein 2007), a sensorimotor position thus leads to the expectation that experience, while certainly changing in systematic ways, will also retain continuities with experience before the goggles were put on. Sensorimotor theorists have emphasized that the sensorimotor view of vision as a set of sensorimotor capacities naturally allows for partial adaptation, and have pointed to such observations as that wearers of distorting goggles might have learned to see the positions of moving cars correctly, while still seeing the license plates as in a mirror (O'Regan & Noë 2001; O'Regan 2011). Partial adaptation challenges the idea that vision is based on a unitary image or representation in the brain. It is thinking of vision in this distinctively nonsensorimotor way which leads to an expectation of ―re-inversion‖ of experience. The contrast between this way of thinking and a sensorimotor approach becomes even stronger when the latter is of the enactivist variety, for an enactivist sensorimotor approach is more fully, or at least more explicitly, nonrepresentational. Sensory substitution devices enable a new mode of interaction with the environment, for example by transforming an image recorded by a camera into a pattern of tactile stimulation on the subject's skin (e.g. Bach-y-Rita 1984) or into a pattern of auditory stimulation (e.g. Auvray et al. 2005; Auvray, Hanneton & O'Regan 2007). It has been found that after practice with such tactile-to-visual or tactile-to-auditory substitution devices, in some cases blind or blindfolded subjects report the experience of objects in distal space, and describe vision-like experiences such as that objects increase in apparent size on approach. Following a training period, persons using a sensory substitution device have been found to acquire such capacities as involved in locomotor guidance, object localization, and object categorization (see Auvray & Myin 2009 for further information and pointers to the literature). As in the adaptation to inverting glasses, active exploration is required here: subjects must be able to control the camera in order to develop this kind of spatial experience (Bach-y-Rita 1984; Auvray et al. 2005). Sensorimotor theorists have referred to this adaptation as evidence for the approach, because it shows the pivotal role of sensorimotor contingencies in visual behavior and attunement. If a set of sensorimotor contingencies-such as those concerning change in size upon approach or retreat-are transferred from vision to touch then they seem to enable vision-like behavior and experience once the subject is attuned to the contingencies. It is this positive point which is key: that, despite the novel modality these contingencies become embedded in, strikingly, they are able to entrain behavioral and experiential change. Critics of the sensorimotor approach have always been keen to point out that many, or at least some, aspects of experience remain linked to the modality the sensorimotor patterns are transferred to (e.g. Block 2005; Prinz 2006, 2009). Such an objection to the sensorimotor approach disregards that the approach, just as was the case for inverting glasses, predicts a mixture of continuity and change in experience after having learned to perceive with a sensory substitution device. Sensory substitution devices add to the sensorimotor repertoire of the stimulated sense, without destroying the repertoire already present. Existing functionality-existing attunement to sensorimotor contingencies-remains in place. To the extent that aspects of the experiential character remain those of the old' modality, this can be explained by the persistent attunement to the old' sensorimotor contingencies. In other 8 words, the sensory modality a sensory substitution onto which the device is grafted, can show a level of ―tenacity‖ (Myin, Cooke & Zahidi, in press), or a lack of deference to the new sensorimotor context (Hurley & Noë 2003). 4. Derivative experience This nuanced sensorimotor perspective on inverting glasses and sensory substitution exemplifies how experience, at any moment, is a product of both the current stimulation and currently obtaining sensorimotor contingencies, and attunement due to a history of interactions. This basic tenet of the sensorimotor position allows it to meet an often formulated complaint that the sensorimotor approach cannot account for perceptual or perceptual-like experience under circumstances in which occurent sensorimotor interactions differ from those characteristic of the experience. The range of cases invoked by critics includes dreaming, visual imagery and the perceptual experiences of paralyzed people. Invoking these as counter-examples to the sensorimotor approach neglects the explanatory role played by the history of interactions. An appeal to this history of interactions, and the process of attunement it entrains, is essential in the sensorimotor account of all forms of perception. The fact that one feels the whole bottle on the basis of minimal sensory contact, precisely transcends one's currently occurring sensory stimulation because of one's previous exposure to the sensorimotor contingencies of touching and exploring bottles. Because of this history, one is familiar with, or attuned to, a general pattern of sensorimotor contingencies typical of bottles, characterized by such regularities as that one will encounter more hard stuff when one slides one's fingers to either side. Dreaming, visual imagery and experience in paralysis, then, are cases in which the explanatory balance tips more fully in the direction of past sensorimotor contingencies. What one experiences under such circumstances is dictated almost exclusively by one's attunement to previous interactive regularities, rather than by one's current stimulation. In the sense in which the character of experience in such circumstances is due to past, rather than to current interactions, such experience is derivative. The derivative status of experiences in dreaming, imagery or paralysis, far from revealing them as being distant from sensorimotor interactions, in fact shows them to be deeply entrenched in them. 5. Conclusion An enactive sensorimotor account can answer common criticisms, and it has been shown, for example by the investigations of Philipona and O'Regan (2006) on color, that the approach offers rich prospects for empirical expansion. Of course, there is need for further clarification and elaboration of the theoretical basis of the approach. Relevant steps are taken for example in the work of Buhrmann, Di Paolo and Barandiaran (2013) on the key concept of sensorimotor contingencies. The above makes clear that the sensorimotor approach, spelled out fully along enactivist lines, offers a strong, substantive and fruitful perspective on perception, for vision as well as for other modalities i . References 9 Auvray, M., Hanneton, S., Lenay, C., O'Regan, J.K. (2005) ―There is something out there: distal attribution in sensory substitution, twenty years later,‖ Journal of Integrative Neuroscience, 4 (4), pp. 505-521. Auvray, M., Hanneton, S., O'Regan, J.K. (2007) ―Learning to perceive with a visuo-auditory substitution system: localisation and object recognition with The vOICe',‖ Perception, 36, pp. 416-430. Auvray, M., Myin. E. (2009) ―From sensory substitution to sensorimotor extension,‖ Cognitive Science, 33(7), pp. 1036-1058. Bach-y-Rita, P. (1984) ―The relationship between motor processes and cognition in tactile vision substitution,‖ in Prinz, W., Sanders, A.F. (eds.) Cognition and Motor Processes, Berlin: Springer-Verlag, pp. 149-160. Block, N. (2005) ―Review of Alva Noë, Action in Perception,‖ Journal of Philosophy, 102, pp. 259–272. Broackes, J. (1992) ―The autonomy of colour,‖ in Charles, D., Lennon, K. (eds.) Reduction, Explanation, and Realism, Oxford: Clarendon Press, pp. 421-465. Buhrmann, T., Di Paolo, E., Barandiaran, X. (2013) ―A dynamical systems account of sensorimotor contingencies,‖ Frontiers in Psychology, 4: 285. Chemero, A. (2009) Radical Embodied Cognitive Science, Cambridge, MA: MIT Press. Degenaar, J. (2013) ―Through the inverting glass: first-person observations on spatial vision and imagery,‖ Phenomenology and the Cognitive Sciences (in press). Dolezal, H. (1982) Living in a World Transformed: Perceptual and Performatory Adaptation to Visual Distortion, New York: Academic Press. Gibson, J.J. (1964) ―Introduction,‖ Psychological Issues, 3 (4), pp. 5-13. Harris, C.S. (1965) ―Perceptual adaptation to inverted, reversed, and displaced vision,‖ Psychological Review, 72 (6), pp. 419-444. Hurley, S.L., Noë, A. (2003) ―Neural plasticity and consciousness,‖ Biology and Philosophy, 18, pp. 131-168. Hutto, D.D. (2005) ―Knowing what? Radical versus conservative enactivism,‖ Phenomenology and the Cognitive Sciences, 4, pp. 389-405. Hutto, D.D., Myin, E. (2013) Radicalizing Enactivism: Basic Minds Without Content, Cambridge, MA: MIT Press. Kohler, I. (1964a) ―The formation and transformation of the perceptual world,‖ Psychological Issues, 3 (4), pp. 19-173. Linden, D.E.J., Kallenbach, U., Heinecke, A., Singer, W., Goebel, R. (1999) ―The myth of upright vision. A psychophysical and functional imaging study of adaptation to inverting spectacles,‖ Perception, 28, pp. 469-481. Myin, E., Cooke, E., Zahidi, K. (in press) ―Morphing senses,‖ in Matthen, M., Stokes, D., Perception and its Modalities, New York: Oxford University Press. Noë, A. (2004) Action in Perception, Cambridge, MA: MIT Press. O'Regan, J.K. (1992) ―Solving the real' mysteries of visual perception: the world as an outside memory,‖ Canadian Journal of Psychology, 46(3), pp. 461-488. ----- (2011) Why Red Doesn't Sound Like a Bell: Understanding the Feel of Consciousness, New York: Oxford University Press. O'Regan, J.K., Myin, E., Noë, A. (2005) ―Sensory consciousness explained (better) in terms of corporality' and alerting capacity',‖ Phenomenology and the Cognitive Sciences, 44, pp. 369-387. O'Regan, J.K., Noë, A. (2001) ―A sensorimotor account of vision and visual consciousness,‖ Behavioral and Brain Sciences, 24, pp. 939-973. 10 Philipona, D.L., O'Regan, J.K. (2006) ―Color naming, unique hues, and hue cancellation predicted from singularities in reflection properties,‖ Visual Neuroscience, 23, pp. 331339. Prinz, J. (2006) ―Putting the brakes on enactive perception,‖ Psyche, 12(1). ----- (2009) ―Is consciousness embodied?,‖ in Robbins, P., Aydede, M. (eds.) Cambridge Handbook of Situated Cognition, Cambridge: Cambridge University Press. Ruppertsberg, A.I., Bloj, M. (2007) ―Reflecting on a room of one reflectance,‖ Journal of Vision, 7 (13): 12, pp. 1-13. Stratton, G.M. (1896) ―Some preliminary experiments on vision without inversion of the retinal image,‖ The Psychological Review, 3, pp. 611-617. ----- (1897) ―Vision without inversion of the retinal image,‖ The Psychological Review, 4, pp. 341-360; 463-481. Taylor, J.G. (1962) The Behavioral Basis of Perception, New Haven: Yale University Press. Thompson, E. (2007) Mind in Life: Biology, Phenomenology, and the Sciences of Mind, Cambridge, MA: Harvard University Press. Varela, F.J., Thompson, E., Rosch, E. (1991) The Embodied Mind: Cognitive Science and Human Experience, Cambridge, MA: MIT Press. Further reading The sensorimotor approach to perception has been developed in somewhat different directions by Kevin O'Regan and Alva Noë, for example in the recent books Why Red Doesn't Sound Like a Bell: Understanding the Feel of Consciousness (New York: Oxford University Press, 2011) by Kevin O'Regan, and Out of our Heads: Why You Are Not Your Brain, and Other Lessons from the Biology of Consciousness (New York: Hill and Wang, 2009) by Alva Noë. Among other divergences, O'Regan's book offers more links to empirical research, while Noë's book tries to adavance a case for the idea that consciousness in not confined to the brain. Evan Thompson's Mind in Life: Biology, Phenomenology, and the Sciences of Mind (Cambridge, MA: Harvard University Press, 2007) has a chapter in which Thompson, one of the founders of enactivism, offers a sympathetic, but critical assessment of sensorimotor enactivism. Finally, Daniel Hutto and Erik Myin's Radicalizing Enactivism: Basic Minds Without Content (Cambridge, MA: MIT Press, 2013) presents arguments for construing enactivism and the sensorimotor approach in a radical, representation or content-eschewing way. i The authors warmly thank Kevin O'Regan for his very useful comments on this text, and for continuing discussion relating to many of the topics dealt with here. For financial support we are grateful to the Research Foundation Flanders (project ―Computation reconsidered‖, G0B5312N), the Research Council of the University of Antwerp (project ―Imagery as Perceptual Activity‖), and the European Research Council (Kevin O'Regan's Advanced Grant ―FEEL‖, 323674).
{ "pile_set_name": "PhilPapers" }
Albiglutide: a unique GLP-1 receptor agonist. Albiglutide is a long acting GLP-1 receptor agonist (GLP-1 RA) administered by weekly injection. Area covered: The pharmacokinetic and pharmacodynamic properties of albiglutide and its clinical effects are discussed. The review encompassed a search of PubMed and a thorough analysis of the European Union and US Food and Drug Administration approval documents. Expert opinion: Albiglutide has a chemical structure quite distinct from that of other marketed GLP-1 RAs. The agent has less gastrointestinal side effects than other comparable GLP-1 RAs and is safe in patients with renal failure. As a sole treatment for diabetes and used with other hypoglycemic agents, it achieves a lowering of HbA1c of up to 1%, less than several competitor GLP-1 RAs. The benefit on weight reduction is minimal compared to other GLP-1 RAs. There exists concern about an imbalance of pancreatitis cases in the approval program as well as injection site reactions which led to discontinuance of therapy in up to 2% of participants. A large long term study now underway will determine if albiglutide, with its lower level of GI intolerance, has a place in the treatment of patients with increased risk of cardiovascular events.
{ "pile_set_name": "PubMed Abstracts" }
Nuclear loss of protein arginine N-methyltransferase 2 in breast carcinoma is associated with tumor grade and overexpression of cyclin D1 protein. Human protein arginine N-methyltransferase 2 (PRMT2, HRMT1L1) is a protein that belongs to the arginine methyltransferase family, and it has diverse roles in transcriptional regulation through different mechanisms depending on its binding partners. In this study, we provide evidences for the negative effect of PRMT2 on breast cancer cell proliferation in vitro and in vivo. Morever, cyclin D1, one of the key modulators of cell cycle, was found to be downregulated by PRMT2, and PRMT2 was further shown to suppress the estrogen receptor α-binding affinity to the activator protein-1 (AP-1) site in cyclin D1 promoter through indirect binding with AP-1 site, resulting in the inhibition of cyclin D1 promoter activity in MCF-7 cells. Furthermore, a positive correlation between the expression of PRMT2 and cyclin D1 was confirmed in the breast cancer tissues by using tissue microarray assay. In addition, PRMT2 was found to show a high absent percentage in breast caner cell nuclei and the nuclear loss ratio of PRMT2 was demonstrated to positively correlate with cyclin D1 expression and the increasing tumor grade of invasive ductal carcinoma. Those results offer an essential insight into the effect of PRMT2 on breast carcinogenesis, and PRMT2 nuclear loss might be an important biological marker for the diagnosis of breast cancer.
{ "pile_set_name": "PubMed Abstracts" }
KOMA Elektronik has announced that their new Komplex Sequencer – described as ‘a musical monster’ – is now available. The new step sequencer lets you construct complex musical patterns, via both MIDI and CV/Gate. Built around four full-featured 16-step sequencers in a compact and light enclosure, the Komplex Sequencer is a powerful tool both live and in the studio. All features have their own dedicated controls; no screens or submenus, and all features have their own dedicated inputs and outputs on the large 87-point patch bay. By patching both internal and external CV sources through the patch bay of the Komplex, you can control any parameter of the sequencer immediately and “sequence the sequence.” Controls include Speed, Sequence Length, Gate Length, Play Mode, Glide, Division, Transpose, Repeat, Sequence Start Point and Skip. Additionally, the sequencer can vary output range and also has a quantizer on board operable in different scales. Not only is the sequencer compatible with almost any synthesizer with CV/Gate, MIDI note, velocity and CC information can also transmitted by any of the four sequencers. A seven bank CV Recorder is also on board and can output up to 5 banks at once. Here are KOMA’s official demo videos: The KOMA Komplex Sequencer is available now, priced at US $1,625 (USA/International)/1699 EUR (EU, Incl. VAT).
{ "pile_set_name": "OpenWebText2" }
Adult coloring books are all the rage and colored pencil sales can prove it. With so many options for various types of coloring books, it seems natural that the activity would take a customizable route. Enter Color Me Book, which allows users to turn their Instagram photos into a totally custom coloring book. SEE ALSO: Notorious RBG riding a unicorn and stunting like Drake makes for an epic coloring book "My fiancé was coloring in an adult coloring book and I thought it would be a great idea to get a personalized one made with photos of our dogs," Color Me Book creator (and CCO, or "Chief Coloring Officer") Cory Will told Mashable in an email. "I was shocked I couldn't it anywhere. So I had a friend, who owns a print shop, make me one. When I showed friends and family my gift to her, the reaction was so positive. I decided to build a website on Shopify and we officially launched on [April 12]." All you have to do is upload your favorite Instagram posts to the Color Me Book website and soon enough, they'll come back to you ready for a coloring session. In terms of what makes for the best coloring pages, Will likes to keep it relatively simple. "I personally think photos of people and pets are the best," he says. "I mean, who doesn't want to color in pictures of their pets?" As for whether you can use any Instagram account you'd like, Will cautions to keep it in the family. "If you use a different [Instagram] account, you should know the person you are ordering for," he says. "For example, a surprise gift or coloring books for a birthday party." So maybe don't try to use one of Justin Bieber's Instagram pictures this time around. Unless you're surprising him for his birthday, in which case you should definitely use this photo. The custom five-page coloring book will cost you $25, but the ability to change the color of your shirt or ice cream cone flavor from the original Instagram picture is priceless. Image: Image: color me book Image: Image: color me book Just make sure you take a well-filtered photo of your coloring book pages to post to your Instagram. [h/t Cosmopolitan] Have something to add to this story? Share it in the comments.
{ "pile_set_name": "OpenWebText2" }
All relevant data are within the paper and its Supporting Information files. Introduction {#sec005} ============ Lung transplantation is an established therapeutic option for patients with various types of end-stage lung disease. Internationally, the annual number of bilateral lung transplants (BLTs) is greater than that of single lung transplants (SLTs) because of the better survival with the former procedure \[[@pone.0210975.ref001]\]. On the other hand, the current situation in Japan is completely different from other countries. The number of SLTs performed in Japan is almost the same as the number of BLTs. Miyoshi et al. reported that, given the severe donor shortage in Japan, SLT can be the first choice of surgical procedure type with acceptable outcomes if there is no contraindication to SLT \[[@pone.0210975.ref002]\]. The Toronto lung transplant group conducted cadaveric SLT for a patient with pulmonary fibrosis and achieved long-term survival as the first successful lung transplantation case in the world in 1983 \[[@pone.0210975.ref003]\]. Mal et al. successfully performed cadaveric SLT for a patient with chronic obstructive pulmonary disease (COPD)\[[@pone.0210975.ref004]\]. COPD had been considered as an indication for SLT after this successful case. However, overinflation started to be recognized as one of the most serious complications after SLT for COPD. In SLT recipients for COPD, the overinflation of the native lung is thought to occur due to increased compliance, whereas the transplanted lung graft on the other side has normal compliance. Pneumonectomy of the native lung \[[@pone.0210975.ref005]\], lung volume reduction surgery (LVRS) \[[@pone.0210975.ref006]\], and bronchoscopic lung volume reduction (BLVR) \[[@pone.0210975.ref007]\] were reported as therapeutic modalities for overinflation of the native lung. Lymphangioleiomyomatosis (LAM) is a rare cystic lung disease that develops primarily in women of childbearing age and is characterized by the proliferation of abnormal smooth muscle-like cells (LAM cells). LAM is associated with an obstructive disease pattern and reduced diffusion capacity of the lung for carbon monoxide (DLco) determined by a pulmonary function test, the main reason for which is the increased lung compliance \[[@pone.0210975.ref008]\]. Due to the different compliance between the native and the transplanted lungs, the native lung overinflation can be a serious complication after SLT for LAM, that is likely to occur after SLT for COPD. Liu et al. reported a case of pneumonectomy of an overinflated native lung after SLT for LAM that resulted in improved lung function \[[@pone.0210975.ref009]\]. CT scans and chest X-ray often show the mediastinum shifted to the transplanted lung side in recipients of SLT for LAM. Whereas native lung overinflation has been thought to happen in recipients of SLT for LAM because of its increased compliance, there is no study that has reported the details on the change of the native lung volume after SLT by three-dimensional computed tomography (3D-CT) volumetry. One of the advantages of 3D-CT volumetry is that we can quantitatively analyze the lung volume in a non-invasive manner and determine changes in the lung over time. We observe that some recipients of SLT for LAM deteriorate pulmonary function with findings of the mediastinum shifted to the transplanted lung side. It is speculated that the overinflation of the native lung affects the pulmonary function after SLT for LAM. However, there is currently no established way to objectively diagnose the overinflation of the native lung. The purpose of the present study was to evaluate the lung volume after SLT for LAM by 3D-CT volumetry and investigate the correlation between the native lung volume change and postoperative pulmonary function in the recipient. Patients and methods {#sec006} ==================== Patients {#sec007} -------- Between January 2006 and December 2015, 25 patients underwent SLT for LAM at Tohoku University Hospital. Eight of these patients were excluded from this study: 3 patients died of primary graft dysfunction in the perioperative period; 1 patients died of enteritis at 6 months after SLT; 1 patients developed deformation of the thorax and received retransplantation within 4 years after SLT; 3 patients developed chronic lung allograft dysfunction (CLAD) of, at least, BOS 0-p.\[[@pone.0210975.ref010]\] Thus, we analyzed the results of 17 patients who had undergone SLT and survived for more than 3 years. Pulmonary function test (PFT) data was available in 17 patients at post-transplant 1 year, 17 patients at 2 post-transplant years, 17 patients at 3 post-transplant years, 15 patients at post-transplant 4 years and 10 patients at post-transplant 5 years. In 9 patients, PFT data and low attenuation volume (LAV) analysis (described later) were available every year up to post-transplant 5 years. The Institutional Review Board of Tohoku University Hospital approved the study (approval No. 2017-1-021) and research was conducted in accordance with the 2000 Declaration of Helsinki. Written informed consent have been obtained from all participants. Image acquisition and measurement of lung volume by three-dimensional computed tomography volumetry {#sec008} --------------------------------------------------------------------------------------------------- CT images were obtained during a single respiratory pause at the end of maximum inspiratory effort using a multidetector row CT scanner (BrightSpeed Elite, GE Healthcare Japan Ltd, Tokyo, Japan). Whole lung scans were performed at a peak tube voltage of 120 kVp, with a variable mAs setting using an automatic exposure control system. CT data from 1-2-mm slices were used for the volumetric analysis. Each patient's CT data were transferred to a standalone workstation (Ziostation2, Ziosoft, Inc., Tokyo, Japan) and 3D models were reconstructed. Left and right lung volumes were calculated by summing the voxels of the CT value of the window level (WL), −469 Hounsfield units (HU); window width (WW), 684.8 HU; sharpness (SH), 0. The respiratory tract from the trachea to subsegmental bronchi was reconstructed and automatically excluded from the lung volumes. [Fig 1](#pone.0210975.g001){ref-type="fig"} shows pre- and post-transplant 3D-CT images of a case of SLT for LAM. We manually measured the lung volumes with the same values of WL, WW, and SH when they could not be measured automatically. In the case of manual measuring, two radiologists measured the lung volumes in a blinded manner and the mean value was used for the study. The data of PFT and 3D-CT volumetry at each time point after SLT were collected. ![Pre- and post-transplant three-dimensional computed tomography (3D-CT) images of a case of single lung transplantation for lymphangioleiomyomatosis.\ (A) Pretransplant three-dimensional computed tomography (3D-CT) image of the lungs in a case of lymphangioleiomyomatosis. (B) Post-transplant 3D-CT images of the lungs in the case: a left single lung transplant case.](pone.0210975.g001){#pone.0210975.g001} Evaluation of overinflation of the native lung {#sec009} ---------------------------------------------- Currently, there is no standard method to evaluate the degree of overinflation of the native lung after SLT. We defined the ratio of the native lung volume to total lung volume (N/T ratio) as an indicator of overinflation of the native lung. The N/T ratio was calculated as follows: $$\text{N}/\text{T}\mspace{720mu}\text{ratio} = \text{native}\mspace{720mu}\text{lung}\mspace{720mu}\text{volume}/\text{total}\mspace{720mu}\text{lung}\mspace{720mu}\text{volume}\mspace{720mu} \times \mspace{720mu} 100\mspace{720mu}\left( \% \right)$$ In order to assess changes of the N/T ratio over time, we calculated the rate of change in the N/T ratio, which is standardized by the N/T ratio at 1 year after SLT. In the present study, we call this parameter, the 'rate of change in N/T ratio' which was calculated as follows: $$\text{Rate}\mspace{720mu}\text{of}\mspace{720mu}\text{change}\mspace{720mu}\text{in}\mspace{720mu}\text{N}/\text{T}\mspace{720mu}\text{ratio}\mspace{720mu}\left( \% \right) = \left\{ {\left( {\text{N}/\text{T}\mspace{720mu}\text{ratio}\mspace{720mu}\text{at}\mspace{720mu}\text{a}\mspace{720mu}\text{certain}\mspace{720mu}\text{year}\mspace{720mu}\text{after}\mspace{720mu}\text{SLT}} \right)/\left( {\text{N}/\text{T}\mspace{720mu}\text{ratio}\mspace{720mu}\text{at}\mspace{720mu} 1\mspace{720mu}\text{year}\mspace{720mu}\text{after}\mspace{720mu}\text{SLT}} \right)–1} \right\} \times 100.$$ Rate of change in forced expiratory volume in 1 second %predicted (%FEV1) was also calculated in the same way when we investigated the correlation between the rate of change in N/T and %FEV1. Measurement of low attenuation volume: Evaluation of emphysematous lesions {#sec010} -------------------------------------------------------------------------- LAV was calculated by summing the voxels with CT values of less than --950 HU. LAV was reported to be the volume of emphysematous lesions in COPD patients\[[@pone.0210975.ref011]\]. The percentage of LAV to total lung volume is considered to reflect the severity of COPD of the lung \[[@pone.0210975.ref011]\]. In the present study, in order to evaluate emphysematous lesions in the native lung, the percentage of LAV in the native lung was calculated as follows: $$\text{Native}\mspace{720mu}\text{lung}\mspace{720mu}\text{LAV}\% = \text{native}\mspace{720mu}\text{lung}\mspace{720mu}\text{LAV}/\text{native}\mspace{720mu}\text{lung}\mspace{720mu}\text{volume} \times 100.$$ $$\text{Rate}\mspace{720mu}\text{of}\mspace{720mu}\text{change}\mspace{720mu}\text{in}\mspace{720mu}\text{native}\mspace{720mu}\text{lung}\mspace{720mu}\text{LAV}\%{\mspace{360mu}\left( \% \right)} = \left\{ {\left( {\text{native}\mspace{720mu}\text{lung}\mspace{720mu}\text{LAV}\%\mspace{720mu}\text{at}\mspace{720mu}\text{a}\mspace{720mu}\text{certain}\mspace{720mu}\text{year}\mspace{720mu}\text{after}\mspace{720mu}\text{SLT}} \right)/\left( {\text{native}\mspace{720mu}\text{lung}\mspace{720mu}\text{LAV}\%\mspace{720mu}\text{at}\mspace{720mu} 1\mspace{720mu}\text{year}\mspace{720mu}\text{after}\mspace{720mu}\text{SLT}} \right)–1} \right\} \times 100.$$ Evaluation of size matching {#sec011} --------------------------- Under the current lung allocation system in Japan, lungs are allocated in accordance with size matching, which is calculated using predicted vital capacities (pred VCs) of the donor and the recipient. Pred VC and size matching were calculated as follows: $$\text{Pred}\mspace{720mu}\text{VC}\mspace{720mu}\text{for}\mspace{720mu}\text{male}\mspace{720mu}\left( \text{L} \right) = 0.045 \times \text{height}\mspace{720mu}\left( \text{cm} \right) - 0.023 \times \text{age} - 2.258$$ $$\text{Pred}\mspace{720mu}\text{VC}\mspace{720mu}\text{for}\mspace{720mu}\text{female}{\mspace{360mu}\left( \text{L} \right)} = 0.032 \times \text{height}\mspace{720mu}\left( \text{cm} \right) - 0.018 \times \text{age} - 1.178$$ $$\text{Size}\mspace{720mu}\text{matching}\mspace{720mu}\left( \% \right) = \text{pred}\mspace{720mu}\text{VC}\mspace{720mu}\text{of}\mspace{720mu}\text{donor}/\text{pred}\mspace{720mu}\text{VC}\mspace{720mu}\text{of}\mspace{720mu}\text{recipient} \times 100.$$ Postoperative assessment of pulmonary function {#sec012} ---------------------------------------------- Postoperative PFTs were performed using CHESTAC-8800 or 8900 (Chest Ltd., Tokyo, Japan) to measure VC, forced vital capacity (FVC), forced expiratory volume in 1 second (FEV1), DLco, and the DLco/alveolar volume (VA). The 6-minute walking distance (6MWD) (m) was measured according to the American Thoracic Society guidelines. Arterial blood gas (ABG) analysis was performed by RADIOMETER ABL 800 FLEX. Alveolar---arterial gradient (A-aDO~2~) was calculated as follows: $$\text{A} - \text{aDO}_{2} = 713 \times 0.21 - \text{PaCO}_{2}/0.8 - \text{PaO}_{2}.$$ Statistical analysis {#sec013} -------------------- All statistical analyses were performed using JMP, version 13, for MAC (SAS Institute Inc.; Cary, NC). All data are presented as the means ± SD or numbers of patients. The differences between groups were analyzed using Student's *t*-test for continuous variables. We used ANOVA for multi-group analysis and the paired t-test to analyze paired groups. Linea regression was used to describe associations between selected parameters. *P* \< 0.05 was considered significant. Results {#sec014} ======= Recipient and donor characteristics and size matching of the lung {#sec015} ----------------------------------------------------------------- [Table 1](#pone.0210975.t001){ref-type="table"} shows characteristics of the donors and the recipients, and the size matching of the lungs. As mentioned in methods, the recipients were allocated the lungs in accordance with size matching; therefore, height and age were similar between the recipients and the donors. 10.1371/journal.pone.0210975.t001 ###### Recipient and donor characteristics and size matching of the lung. ![](pone.0210975.t001){#pone.0210975.t001g} Variable Donor (n = 17) Recipient (n = 17) -------------------------------------------------------------------- ------------------------ -------------------- Sex (male/female) 3 (17.6%)/14 (82.4%) 0/17 Height (cm) 156.0 ± 8.6 156.7 ± 5.6 Age 44.4 ± 12.6 46.6 ± 7.7 Predicted vital capacity (ml)[\*](#t001fn002){ref-type="table-fn"} 2901.4 ± 496.4 2827.4 ± 212.9 Size matching of lung (%)[^†^](#t001fn003){ref-type="table-fn"} 108.2 ± 18.9 (87--147) Data are expressed as group mean ± standard deviation or number (%). \* Predicted vital capacity for male (L) = 0.045 × height (cm) − 0.023 × age − 2.258, predicted vital capacity for female (L) = 0.032 × height (cm) − 0.018 × age − 1.178. ^†^ Size matching (%) = predicted vital capacity of recipient / predicted vital capacity of donor × 100. Surgical and postoperative characteristics {#sec016} ------------------------------------------ Nine of 17 cases (52.9%) were right SLT. The duration of mechanical ventilation was 6.9 ± 6.5 days. The intensive care unit stay was 15.5 ± 9.6 days ([S1 Table](#pone.0210975.s001){ref-type="supplementary-material"}). Lung volume after SLT {#sec017} --------------------- The total lung volume, the native lung volume and the transplanted lung volume measured by 3D-CT volumetry are shown in [Fig 2A--2C](#pone.0210975.g002){ref-type="fig"}. In 3 of 17 cases (17.6%), we manually measured the lung volumes because they could not be measured automatically. The native lung volume and N/T ratio showed a tendency to increase; however, they did not differ significantly among the years. The transplanted lung volume did not show any difference ([Fig 2B and 2D](#pone.0210975.g002){ref-type="fig"}). On the other hand, the rate of change in the N/T ratio increased over time and reached a significant increase at 4 and 5 years after SLT ([Fig 3A](#pone.0210975.g003){ref-type="fig"}). The rate of change in the N/T ratio in each case is presented in [Fig 3B](#pone.0210975.g003){ref-type="fig"}. Seven of 9 cases that we were able to follow the lung volume and PFT available every year showed the increase of the rate of change in the N/T ratio over year ([Fig 3B](#pone.0210975.g003){ref-type="fig"}). ![Lung volume after single lung transplantation.\ (A) The total lung volumes at 1, 2, 3, 4 and 5 years after single lung transplantation were 4495.2 ± 621.2, 4555.1 ± 724.4, 4391.7 ± 732.8, 4358.7±636.1, and 4521.8 ± 476.6 ml, respectively. There was no significant difference among the years. (B) The native lung volumes at 1, 2, 3, 4 and 5 years were 2742.3 ± 338.8, 2807.2 ± 411.7, 2733.7 ± 402.5, 2736.6 ± 419.1 and 2844.0 ± 337.0 ml, respectively. The native lung volumes showed a tendency to increase; however, they did not differ significantly among the years. (C) The transplanted lung volumes at 1, 2, 3, 4 and 5 years were 1752.9 ± 374.8, 1747.9 ± 420.3, 1658.1 ± 429.5, 1622.0 ± 326.7, and 1677.8 ± 270.7 ml, respectively. There was no significant difference among the years. (D) The ratios of the native lung volume to total lung volume (N/T ratios) at 1, 2, 3, 4 and 5 years were 61.3 ± 3.9, 61.9 ± 4.4, 62.6 ± 4.6, 62.9 ± 4.3 and 62.9 ± 4.0%, respectively. The N/T ratio showed a tendency to increase; however, they did not differ significantly among the years.](pone.0210975.g002){#pone.0210975.g002} ![Rate of changes in the native lung volume to total lung volume (N/T ratio).\ (A) The rate of changes in the N/T at each year standardized by the N/T ratio at 1 year were 0, 1.0 ± 2.0, 2.2 ± 2.4, 2.1 ± 2.7 and 3.2 ± 3.2% (1, 2, 3, 4 and 5 years), respectively. The rate of change in the N/T ratio increased over time and reached a significant increase at 4 and 5 years after SLT. N/T ratio = the ratio of the native lung volume to total lung volume. (B) The rate of change in the N/T ratio in each case at 1, 2, 3, 4 and 5 years. Seven of 9 cases that we were able to follow the lung volume and pulmonary function test (PFT) data showed the increase of rate of change in the N/T ratio over year.](pone.0210975.g003){#pone.0210975.g003} Native lung LAV, transplanted lung LAV and native lung LAV% after SLT {#sec018} --------------------------------------------------------------------- The native and the transplanted lung LAV showed no significant change among the years ([Fig 4A](#pone.0210975.g004){ref-type="fig"}). The transplanted lung LAV at each year was much smaller than the native lung LAV ([Fig 4B](#pone.0210975.g004){ref-type="fig"}). The native lung LAV% showed no significant change over time ([Fig 4C](#pone.0210975.g004){ref-type="fig"}). The rate of change in the native lung LAV% showed no significant change over time ([Fig 5A](#pone.0210975.g005){ref-type="fig"}). The rate of change in the native lung LAV% in each case is presented in [Fig 5B](#pone.0210975.g005){ref-type="fig"}. Six of 9 cases that we were able to follow LAV and PFT available every year showed the increase of rate of change in the native lung LAV% over year ([Fig 5B](#pone.0210975.g005){ref-type="fig"}). The 6 patients also showed the increase of rate of change in the N/T ratio over year. ![Low attenuation volumes of the native and transplanted lung.\ (A) The native lung low attenuation volumes (LAVs) at 1, 2, 3, 4 and 5 years were 1097 ± 493, 1320 ± 601, 1292 ± 497, 1203 ± 508 and 1321 ± 432 ml, respectively. There was no significant difference among the years. (B) The transplanted lung LAVs at 1, 2, 3, 4 and 5 years were 17.7± 26.2, 17.5 ± 33.4, 12.7 ± 18.7, 19.0 ± 33.8 and 29.4 ± 65.8 ml, respectively. There was no significant difference among the years. (C) The percentages of LAV in the native lung (native lung LAV%) at 1, 2, 3, 4 and 5 years were 42.1 ± 13.7, 43.2 ± 13.2, 41.9 ± 12.2, 39.7 ± 13.3 and 46.0 ± 12.7%, respectively. Native lung LAV% showed no significant change over time. Native lung LAV% = native lung LAV/native lung volume × 100.](pone.0210975.g004){#pone.0210975.g004} ![Rate of changes in low attenuation volumes of the native lung.\ (A) The rate of changes in the low attenuation volumes of the native lung (native lung LAV) at each year standardized by the native lung LAV at 1 year were 0, 17.8 ± 19.3, 13.3 ± 14.2, 1.9 ± 8.4 and 13.9 ± 18.1% (1, 2, 3, 4 and 5 years), respectively. (B) The rate of change in the native lung LAV in each case at 1, 2, 3, 4 and 5 years. Six of 9 cases showed the increase of rate of change in the native lung LAV% over year.](pone.0210975.g005){#pone.0210975.g005} PFT, 6MWD and ABG after SLT {#sec019} --------------------------- %FEV1 showed tendency to decrease; however, they did not differ significantly among the years. Other PFT parameters also showed no significant difference among the years ([S2 Table](#pone.0210975.s002){ref-type="supplementary-material"}). Similarly, 6MWD and all parameters of ABG analysis showed no significant difference among the years ([S2 Table](#pone.0210975.s002){ref-type="supplementary-material"}). Correlations between N/T ratio and PFT or ABG parameters or 6MWD after SLT {#sec020} -------------------------------------------------------------------------- [Fig 6A](#pone.0210975.g006){ref-type="fig"} shows the correlation between N/T ratio and %FEV1 at 1 year after SLT. There was no significant correlation between them. We investigated the correlations between the N/T ratio and other PFT or ABG parameters or 6MWD at 1 year; however, there was no significant correlation between them ([S1A](#pone.0210975.s003){ref-type="supplementary-material"}, [S2A](#pone.0210975.s004){ref-type="supplementary-material"} and [S3A](#pone.0210975.s005){ref-type="supplementary-material"} Figs). Similarly, we examined the correlations between the N/T ratio and PFT or ABG parameters or 6MWD at 5 years after SLT. There was no significant correlation. ([Fig 6B](#pone.0210975.g006){ref-type="fig"} shows the correlations between the N/T ratio and %FEV1 at 5 years after SLT. The rest of the data at 5 years are shown in [S1B](#pone.0210975.s003){ref-type="supplementary-material"}, [S2B](#pone.0210975.s004){ref-type="supplementary-material"} and [S3B](#pone.0210975.s005){ref-type="supplementary-material"} Figs). ![Correlations between native lung volume/total lung volume ratio and forced expiratory volume in 1 second %predicted.\ (A) There was no significant correlation between native lung volume/total lung volume (N/T) ratio and forced expiratory volume in 1 second %predicted (%FEV1) at 1 year after single lung transplantation (SLT). (B) N/T ratio did not show a significant correlation with %FEV1 at 5 years after SLT.](pone.0210975.g006){#pone.0210975.g006} Correlations between rate of change in N/T ratio and that in PFT parameters after SLT {#sec021} ------------------------------------------------------------------------------------- As shown in [Fig 3A](#pone.0210975.g003){ref-type="fig"}, the rate of change in the N/T ratio showed a significant increase over time. Therefore, we investigated correlations between the rate of change in the N/T ratio and that in PFT parameters at 5 years after SLT. There was a significant negative correlation between the rate of change in the N/T ratio and that in %FEV1 ([Fig 7](#pone.0210975.g007){ref-type="fig"}). The rate of change in the N/T did not show a significant correlation with the rate of change in other PFT parameters: %FVC, %DLco, DLco/VA ([S4](#pone.0210975.s006){ref-type="supplementary-material"}--[S6](#pone.0210975.s008){ref-type="supplementary-material"} Figs). ![Correlations between rate of change in native lung volume/total lung volume ratio and change in forced expiratory volume in 1 second %predicted.\ There was a significant negative correlation between rate of change in native lung volume/total lung volume (N/T) ratio and that in forced expiratory volume in 1 second %predicted (%FEV1) at 5 year after single lung transplantation (SLT).](pone.0210975.g007){#pone.0210975.g007} Correlations between rate of change in native lung LAV% and that in PFT parameters after SLT {#sec022} -------------------------------------------------------------------------------------------- We also investigated correlations between the rate of change in native lung LAV% and that in PFT parameters after SLT in the same way of change in N/T ratio mentioned above. There was no significant correlation between the rate of change in native lung LAV% and that in any PFT parameters ([S7](#pone.0210975.s009){ref-type="supplementary-material"}--[S10](#pone.0210975.s012){ref-type="supplementary-material"} Figs). Discussion {#sec023} ========== Overinflation of the native lung is one of the challenging complications after SLT for obstructive lung diseases, such as COPD. In such patients, the compliance of the native lung is much higher than that of the healthy lung, transplanted lung. As a result of the difference in the compliance between the native and transplanted lungs, overinflation can occur only in the native lung. We recognize overinflation of the native lung after SLT in COPD by the shifted mediastinum in CT and chest X-ray. LVRS \[[@pone.0210975.ref006]\] and BLVR \[[@pone.0210975.ref007]\] have been applied for this complication in SLT recipients for COPD. Some SLT recipients for LAM also show a shift of the mediastinum to the transplanted lung side. However, it still remains unclear if overinflation of the native lung really happens in such patients. Another question we have in daily practice is whether overinflation of the native lung affects the post-transplant pulmonary function of the SLT recipients for LAM. Nowadays, preoperative 3D-CT volumetry is utilized for lung cancer patients to predict the postoperative pulmonary function \[[@pone.0210975.ref012]\]. 3D-CT volumetry has also been commonly applied for the assessment of size matching in lung transplantation \[[@pone.0210975.ref013]--[@pone.0210975.ref015]\]. However, there is few studies that validated the usefulness of 3D-CT volumetry for the assessment of overinflation of the native lung after SLT. In the present study, we found that, whereas the mean of the native lung volume did not show a significant increase, the rate of change in the N/T ratio significantly increased over time after SLT for LAM. Generally, pulmonary function stabilizes at 1 year after lung transplantation. It was reported that the lung function of recipients improved after SLT and then plateaued by 1 year post-transplantation \[[@pone.0210975.ref016]\]. Therefore, when we evaluated the rate of change of PFT parameters and N/T ratio, we standardized them by the values at 1 year after SLT. We demonstrated that 8 of 10 SLT recipients for LAM have increased the rate of change in the N/T over year that will probably cause the overinflation of the native lung in the future ([Fig 7](#pone.0210975.g007){ref-type="fig"}). In order to assess the influence of the change in the N/T, we investigated the correlation between the N/T ratio and each PFT parameter at 1 and 5 years. We did not find any correlation between N/T ratio and each PFT parameter at either 1 or 5 years. On the other hand, there was a significant negative correlation between the rate of change in the N/T ratio and that in %FEV1 at 5 years after SLT. According to this result, if the N/T ratio during a long period---from postoperative 1 to 5 years---increases in a SLT recipient for LAM, %FEV1 will become worse. Indeed, [Fig 7](#pone.0210975.g007){ref-type="fig"} shows that 6 recipients with a positive rate of change in N/T ratios showed negative a rate of change in %FEV1. Whereas we revealed that the rate of change in the N/T affects the pulmonary function in recipients of SLTs for LAM, it remains unclear whether the overinflation of the native lung would really happen and finally cause end-stage respiratory failure in the future. We will have to follow up the recipients in the present study for a longer time in order to clarify wheter VRS or BLVR can be offered as an option for recipients with end-stage respiratory failure after SLT for LAM. It has been reported that by evaluating the low attenuation area (LAA (%)), we can predict mortality \[[@pone.0210975.ref017]\] and exacerbations \[[@pone.0210975.ref018]\] of emphysema in COPD patients, and by evaluating LAV, we can differentiate subtypes of COPD \[[@pone.0210975.ref019]\] and predict the incidence of complications after surgery for lung cancer \[[@pone.0210975.ref011]\]. LAA is also utilized for differential diagnosis including LAM and other diseases \[[@pone.0210975.ref020]\]. We measured LAV from 1 to 5 years after SLT to evaluate the change in the cystic region. As shown in [Fig 3A](#pone.0210975.g003){ref-type="fig"}, LAV did not differ significantly from 1 to 5 years. This demonstrates that the cystic regions of LAM did not progress in the recipients in the present study and the decrease of %FEV1 was not associated with the progression of LAM. This study has some limitations. First, the N/T ratio was originally defined in this study as an indicator of native lung overinflation. We are still not sure that this indicator really reflects the native lung overinflation. However, in previous reports, overinflation of the native lung was defined based on a qualitative assessment, such as radiological mediastinal shift, and so we had to set a novel quantitative indicator. We think that the recipient with increased rate of change in the N/T in the present study would have overinflated native lung and suffer from respiratory failure in the future. To support the clinical importance of the N/T ratio, the long-term observation and accumulation of cases will be necessary in the future. Second, this study is subject to the bias of a retrospective study because we excluded CLAD cases from this study. It may be difficult to differentiate disorders of the transplanted lung such as CLAD from the native lung overinflation when %FEV1 decreases after SLT for LAM. The ISHLT report in 2014 described 138 LAM patients who received SLT out of a cumulative number of 15,321 cases \[[@pone.0210975.ref001]\]. The present study is of marked significance as it evaluated 25 patients who received SLT for LAM in a single institute. In Japan, SLT is an important surgical procedure because of the chronic shortage of donors. However, this study is limited by the fact that it was a single-center, retrospective study involving a small group of patients. In conclusion, the rate of change in the N/T ratio occurs in some recipients of SLT for LAM during the long term and it may affect post-transplant pulmonary function. Supporting information {#sec024} ====================== ###### Surgical and postoperative characteristics. (DOCX) ###### Click here for additional data file. ###### Pulmonary function test, 6-minute walking distance and arterial blood gas analysis after single lung transplantation. (DOCX) ###### Click here for additional data file. ###### Correlations between native lung volume/total lung volume ratio and diffusion capacity of the lung for carbon monoxide %predicted. \(A\) There was no significant correlation between native lung volume/total lung volume (N/T) ratio and diffusion capacity of the lung for carbon monoxide %predicted (%DLco) at 1 year after single lung transplantation (SLT). (B) N/T ratio did not show a significant correlation with %DLco at 5 years after SLT. (TIFF) ###### Click here for additional data file. ###### Correlations between native lung volume/total lung volume ratio and alveolar--arterial gradient. \(A\) There was no significant correlation between native lung volume/total lung volume (N/T) ratio and alveolar---arterial gradient (A-aDO~2~) at 1 year after single lung transplantation (SLT). (B) N/T ratio did not show a significant correlation with A-aDO~2~ at 5 years after SLT. (TIFF) ###### Click here for additional data file. ###### Correlations between native lung volume/total lung volume ratio and 6-minute walking distance. \(A\) There was no significant correlation between native lung volume/total lung volume (N/T) ratio and 6-minute walking distance (6MWD) at 1 year after single lung transplantation (SLT). (B) N/T ratio did not show a significant correlation with 6MWD at 5 years after SLT. (TIFF) ###### Click here for additional data file. ###### Correlations between rate of change in native lung volume/total lung volume ratio and change in forced vital capacity %predicted. The rate of change in the native lung volume/total lung volume (N/T) did not show a significant correlation with the rate of change in forced vital capacity %predicted (%FVC) at 5 year after single lung transplantation (SLT). (TIFF) ###### Click here for additional data file. ###### Correlations between rate of change in native lung volume/total lung volume ratio and change in diffusion capacity of the lung for carbon monoxide %predicted. The rate of change in the native lung volume/total lung volume (N/T) did not show a significant correlation with the rate of change in diffusion capacity of the lung for carbon monoxide %predicted (%DLco) at 5 year after single lung transplantation (SLT). (TIFF) ###### Click here for additional data file. ###### Correlations between rate of change in native lung volume/total lung volume ratio and change in diffusion capacity of the lung for carbon monoxide/alveolar volume %predicted. The rate of change in the native lung volume/total lung volume (N/T) did not show a significant correlation with the rate of change in diffusion capacity of the lung for carbon monoxide/alveolar volume %predicted (%DLco/VA) at 5 year after single lung transplantation (SLT). (TIFF) ###### Click here for additional data file. ###### Correlations between rate of change in low attenuation volume and change in forced expiratory volume in 1 second %predicted. The rate of change in low attenuation volume (LAV) did not show a significant correlation with the rate of change in forced expiratory volume in 1 second %predicted (%FEV1) at 5 year after single lung transplantation (SLT). (TIFF) ###### Click here for additional data file. ###### Correlations between rate of change in low attenuation volume and change in forced vital capacity %predicted. The rate of change in low attenuation volume (LAV) did not show a significant correlation with the rate of change in forced vital capacity %predicted (%FVC) at 5 year after single lung transplantation (SLT). (TIFF) ###### Click here for additional data file. ###### Correlations between rate of change in low attenuation volume and change in diffusion capacity of the lung for carbon monoxide %predicted. The rate of change in low attenuation volume (LAV) did not show a significant correlation with the rate of change in diffusion capacity of the lung for carbon monoxide %predicted (%DLco) at 5 year after single lung transplantation (SLT). (TIFF) ###### Click here for additional data file. ###### Correlations between rate of change in low attenuation volume and change in diffusion capacity of the lung for carbon monoxide/alveolar volume %predicted. The rate of change in low attenuation volume (LAV) did not show a significant correlation with the rate of change in diffusion capacity of the lung for carbon monoxide/alveolar volume %predicted (%DLco/VA) at 5 year after single lung transplantation (SLT). (TIFF) ###### Click here for additional data file. ###### "Values-for-Tables-and-Figs". This file contains the full underlying data set for all Tables and Figs. (XLSX) ###### Click here for additional data file. The authors thank Katsunori Ono and other radiological technologists of Tohoku University Hospital for their assistance with the collection of data. The authors would like to express their gratitude to Brent Bell for assistance in editing this manuscript. [^1]: **Competing Interests:**The authors have declared that no competing interests exist.
{ "pile_set_name": "PubMed Central" }
Q: Microsoft Access - Using the In Clause in a Query over a Network So right now, we have a setup where ui.mdb and database.mdb are two separate access files. I am querying the database using the IN clause (ie "SELECT * FROM USERS IN 'DB\example_db.mdb'") and it works great on my local machine. The problem is that people are accessing the file over a public share in the network (ie "\computername\example_ui.mdb"). Once people try to use that query with the IN clause, they get the error: c:\users\username\documents\db\example_db.mdb is not a valid path. Make sure the path name is spelled correctly and that you are connected to the server on which the file resides. I did some research and I found this http://support.microsoft.com/kb/167452, but frankly, I don't really understand it. Does anyone have any familiarity with solving this issue? A: You should use a full path, not a partial one. If you are 100% sure that everybody in the company has the same mappings, you can use comething like IN "X:\myFOlder\myFile.mdb". This is using a mapping. If mapping is not reliable, you can state a full absolute address using UNC (Universal Naming Convention): IN '\\MyServer\myShare\myFolder\myFile.mdb'
{ "pile_set_name": "StackExchange" }
Results The best answer to the question "Who do you want to play Moon Knight?" is shown on the poll results page.
{ "pile_set_name": "OpenWebText2" }
- 15. 2*m - 30 Collect the terms in 34*a - 62*a - 76*a. -104*a Collect the terms in 11*h - 25*h + 13*h + 11*h. 10*h Collect the terms in 267*p - 803*p + 2*p**3 + 267*p + 269*p. 2*p**3 Collect the terms in -29*i - 20*i - 25*i + 122*i - 33*i. 15*i Collect the terms in -3*m**3 + 910*m**2 - 910*m**2. -3*m**3 Collect the terms in 2145*h - 3*h**3 - 2145*h + 38*h**3. 35*h**3 Collect the terms in 155*g - 73*g**2 - 155*g. -73*g**2 Collect the terms in 123 - 123 + 288*o**2. 288*o**2 Collect the terms in -64*m**2 - 2*m**3 - 2*m + 64*m**2 - m**3. -3*m**3 - 2*m Collect the terms in 233*r - r**2 - 113*r - 120*r. -r**2 Collect the terms in 6*s + s + 24*s. 31*s Collect the terms in -15*k**2 + 30*k**2 - 14*k**2. k**2 Collect the terms in 7*h + 9*h**2 - 6*h - h + 2. 9*h**2 + 2 Collect the terms in 14920*q + 5*q**3 - 14920*q - 3*q**3. 2*q**3 Collect the terms in -8 - 5 + 19*v + 13. 19*v Collect the terms in -29*j**3 - 58*j**3 - 44*j**3. -131*j**3 Collect the terms in 148 - 148 - 171*v**3. -171*v**3 Collect the terms in 76*i - 37*i - 36*i. 3*i Collect the terms in 18*j - 70*j + 26*j + 27*j. j Collect the terms in -2*y**2 + 11*y - 9*y - 2*y. -2*y**2 Collect the terms in a + 3*a**2 - a - 13900 + 13900. 3*a**2 Collect the terms in 3*k**3 + 7223*k**2 - 7223*k**2. 3*k**3 Collect the terms in 1057*y - 4*y**2 - 1057*y. -4*y**2 Collect the terms in -4 - 38*m + 49*m + 4. 11*m Collect the terms in -144*a**3 + a**2 + 153*a**3 - a**2. 9*a**3 Collect the terms in 8*y + 2*y + 10*y. 20*y Collect the terms in -2*j**2 + 24639 - 24639. -2*j**2 Collect the terms in -13*p**3 + 20*p**3 - 6*p**3. p**3 Collect the terms in -48*b**3 - 56*b**3 + 121*b**3. 17*b**3 Collect the terms in -3*x**3 - x - x + 2*x. -3*x**3 Collect the terms in -27*a - 18*a + 67*a - 19*a. 3*a Collect the terms in 3817*o**2 + 53*o**3 - 3817*o**2. 53*o**3 Collect the terms in -8 + 7 + 1 - 650*q**2. -650*q**2 Collect the terms in -14*q + 2*q + 0*q. -12*q Collect the terms in -3*b**2 - 8*b**2 + 4*b**2 - 6*b**2. -13*b**2 Collect the terms in -9*n**2 + 43*n**3 + 2*n**2 + 7*n**2. 43*n**3 Collect the terms in -1642*x**2 - 9*x + 9*x. -1642*x**2 Collect the terms in 375 + 31*k**3 + 25*k**3 - 377. 56*k**3 - 2 Collect the terms in 24*l**3 + 0*l**3 - 7*l**3 - 13*l**3. 4*l**3 Collect the terms in 53*u**3 - 76*u**2 + 40*u**2 + 36*u**2. 53*u**3 Collect the terms in 3 + 23*g**2 + 0 - 3. 23*g**2 Collect the terms in -5924 + 2*v + 5924. 2*v Collect the terms in -1496*q - 3*q**3 + 751*q + 745*q + 4*q**3. q**3 Collect the terms in -49*c + 26*c + 29*c. 6*c Collect the terms in 5734*q**3 - 5733*q**3 + q - q. q**3 Collect the terms in 2*n**3 - 55*n - 54*n + 109*n. 2*n**3 Collect the terms in 16*b - 4*b**2 + 12*b - 28*b. -4*b**2 Collect the terms in 430 - 430 - 7*i**3. -7*i**3 Collect the terms in 8*y - 8*y - 7*y**2. -7*y**2 Collect the terms in 181*q**3 + 185*q**3 - 554*q**3 + 191*q**3. 3*q**3 Collect the terms in 110577 + 5*s**2 - 110577. 5*s**2 Collect the terms in l**2 + 2*l**3 - 5*l**2 + 0*l**2. 2*l**3 - 4*l**2 Collect the terms in -34*d**2 + 4*d**2 + 7*d**2. -23*d**2 Collect the terms in -38 + 38 - 4*p. -4*p Collect the terms in -148*b**2 - 150*b**2 - 157*b**2 - 155*b**2 + 605*b**2. -5*b**2 Collect the terms in -197*b**2 + 218*b**2 + 1 + 1. 21*b**2 + 2 Collect the terms in 10*b**3 - 26*b**3 + 13*b**3 + 6*b**3. 3*b**3 Collect the terms in 51*v**3 - 1 - 3*v + 3*v. 51*v**3 - 1 Collect the terms in -63 + 126 + 4*r**3 - 63. 4*r**3 Collect the terms in 1400 - 6*c - 1400 + c. -5*c Collect the terms in -1265 - 13*y + 1265. -13*y Collect the terms in -86*y + 173*y - 90*y. -3*y Collect the terms in -2*q + 1 + 2*q + 0*q + 8*q**3. 8*q**3 + 1 Collect the terms in z + z + 0*z - 8*z. -6*z Collect the terms in -71*p**2 + 36*p**2 + 35*p**2 + 29*p**3. 29*p**3 Collect the terms in -44*z**2 - 53*z**2 + 107*z**2 - z**3. -z**3 + 10*z**2 Collect the terms in 4*b + 2*b**2 - b**2 - 12*b. b**2 - 8*b Collect the terms in -14*k - 21*k - 23*k + 54*k. -4*k Collect the terms in 10 + 2*j**2 - 10. 2*j**2 Collect the terms in 26*j**2 - 37*j**2 + 13*j**2. 2*j**2 Collect the terms in 10*c**3 - 7 - 35*c**3 + 19*c**3. -6*c**3 - 7 Collect the terms in 105*q - 50*q - 52*q. 3*q Collect the terms in -1 + 1184*b - 1177*b + 1. 7*b Collect the terms in 3 - 10 + 7*z**2 + 3. 7*z**2 - 4 Collect the terms in -75379*b - 20*b**3 + 75379*b. -20*b**3 Collect the terms in -m**2 - 2*m**2 - 2*m**2 + 7*m**3 - m**3. 6*m**3 - 5*m**2 Collect the terms in -23 + 19*a**3 - 20 + 43. 19*a**3 Collect the terms in g - 90*g**3 - g + 92*g**3. 2*g**3 Collect the terms in -t**2 - 15917 + 31840 - 15923. -t**2 Collect the terms in 7*r - 3*r - 7*r + 8*r. 5*r Collect the terms in -z + 6*z - 3*z - z + z. 2*z Collect the terms in 0*s**2 + 524 + 4*s**2 + 531 - 1055. 4*s**2 Collect the terms in -96*l - l**2 + 48*l + 48*l. -l**2 Collect the terms in -437*y**2 - 438*y**2 + 2*y**3 + 875*y**2. 2*y**3 Collect the terms in 10*x**3 + 20*x**3 - 51*x**3. -21*x**3 Collect the terms in 9*w**3 + 7*w - w - 6*w + 3*w**3. 12*w**3 Collect the terms in 163*w**3 - 503*w**3 + 168*w**3 + 174*w**3. 2*w**3 Collect the terms in -4*l + 4*l - 170*l**2. -170*l**2 Collect the terms in -q**2 - 2*q**2 + 3*q**2 + q**2 - 2*q**2. -q**2 Collect the terms in 879*r**2 - 446*r**2 - 430*r**2. 3*r**2 Collect the terms in -2313*p**2 - 2*p + 2*p. -2313*p**2 Collect the terms in -5 + 2*k + 4*k + 5. 6*k Collect the terms in -2 - 1 + 2*s**2 - 2. 2*s**2 - 5 Collect the terms in 128*i - 240*i + 127*i. 15*i Collect the terms in -7*n**2 + 32*n**2 - 3*n**2. 22*n**2 Collect the terms in -27*y**2 - 20*y**2 + 45*y**2. -2*y**2 Collect the terms in -158*n + 470*n - 158*n - 150*n. 4*n Collect the terms in -87*t**3 - 37*t**3 - 94*t**3. -218*t**3 Collect the terms in 3281739*k - 3281739*k + 7*k**2. 7*k**2 Collect the terms in 0*y**2 - 69 - 5*y**2 + 4*y**2. -y**2 - 69 Collect the terms in 35*l**3 + 36*l**3 - 72*l**3. -l**3 Collect the terms in 23*w**3 + 21*w**3 - 39*w**3. 5*w**3 Collect the terms in -39 - 37 + 76 + n. n Collect the terms in -3 - 8 - 1 - 7*b + 15. -7*b + 3 Collect the terms in 33 - 33 + 40*s**3. 40*s**3 Collect the terms in 10*h**2 + 11*h**2 - 6*h**2 + 2*h**2. 17*h**2 Collect the terms in 37*g + 38*g - 117*g + 40*g. -2*g Collect the terms in -434 + 434 + 4*a**2 + a**2 - 2*a**2. 3*a**2 Collect the terms in 9437*c - 4*c**3 - 9437*c. -4*c**3 Collect the terms in 396*s + 176*s**2 - 396*s - 173*s**2. 3*s**2 Collect the terms in -8*t**2 - 4*t**2 + 5*t**2 - 5*t**2. -12*t**2 Collect the terms in -610*y + 1 - 1 - 5*y**2 + 610*y. -5*y**2 Collect the terms in -11 - 24*l**3 + 57*l**3 + 11 - 35*l**3. -2*l**3 Collect the terms in -2*q - 6*q**3 + 2*q + 30 + 0*q. -6*q**3 + 30 Collect the terms in -19*g**3 + 33 - 9 - 24. -19*g**3 Collect the terms in -4097*x**3 + 2049*x**3 + 2041*x**3. -7*x**3 Collect the terms in -2 + 3 + 11*c + 6*c. 17*c + 1 Collect the terms in -37*i**3 + 16*i**3 - 2*i + 2*i. -21*i**3 Collect the terms in -6*z**3 + 3*z**3 - 2*z**2 + 14*z**2. -3*z**3 + 12*z**2 Collect the terms in -3*p - 94*p**3 + 3*p + 97*p**3. 3*p**3 Collect the terms in 4*n - 13132 + 13132. 4*n Collect the terms in 0*t**3 + 7*t**3 + 2*t**3. 9*t**3 Collect the terms in -195*w**2 + 6 - 6 + 194*w**2. -w**2 Collect the terms in -60*z + 23*z + 20*z + 14*z. -3*z Collect the terms in 22*h**2 - 819*h - 19*h**2 + 819*h. 3*h**2 Collect the terms in 517*w - 259*w - 255*w. 3*w Collect the terms in 37*v - 18*v - 14*v - 7*v. -2*v Collect the terms in 341 - 167 + 2*x - 174. 2*x Collect the terms in 0*f**3 + 9*f**3 - 3*f**3. 6*f**3 Collect the terms in z**3 + z**3 - 803*z + 803*z. 2*z**3 Collect the terms in 21*b**2 + 126 - 257 - 23*b**2 + 131. -2*b**2 Collect the terms in -6*l**3 + 4*l**3 - l**3. -3*l**3 Collect the terms in -12*t + t**2 + t**2 + 14*t + 9*t**2. 11*t**2 + 2*t Collect the terms in 11*x**2 - 12*x + 12*x. 11*x**2 Collect the terms in -4*h**2 + 10*h**2 - 3247 - 8*h**2 + 3247. -2*h**2 Collect the terms in -s + 318*s**2 + s - 316*s**2. 2*s**2 Collect the terms in -2*f**2 + 41*f - 41*f. -2*f**2 Collect the terms in 16 - 53*v**2 - 16. -53*v**2 Collect the terms in -891*k - 893*k + 1788*k. 4*k Collect the terms in 7*o**3 + 655 - 332 + 0*o**3 - 323. 7*o**3 Collect the terms in -12*i**3 - 5*i**3 + 34*i**3 - 11*i**3. 6*i**3 Collect the terms in -24*u + 45*u - 22*u. -u Collect the term
{ "pile_set_name": "DM Mathematics" }
Q: Android ViewPager ZoomOut animation I have a ViewPager that look like this: I need the previews on the sides to ZoomOut when you swipe and only maintain the size of the center view, something like this: I already tried some examples with ViewPager.PageTransformer() but those examples are always with a fade animation(That I don't need) and not showing previews(Wich I need). A: final int paddingPx = 300; final float MIN_SCALE = 0.8f; final float MAX_SCALE = 1f; viewPager.setClipToPadding(false); viewPager.setPadding(paddingPx, 0, paddingPx, 0); viewPager.setPageTransformer(false, transformer); This makes pages smaller than viewpager width: Here is my Transformer: PageTransformer transformer = new PageTransformer() { @Override public void transformPage(View page, float position) { float pagerWidthPx = ((ViewPager) page.getParent()).getWidth(); float pageWidthPx = pagerWidthPx - 2 * paddingPx; float maxVisiblePages = pagerWidthPx / pageWidthPx; float center = maxVisiblePages / 2f; float scale; if (position + 0.5f < center - 0.5f || position > center) { scale = MIN_SCALE; } else { float coef; if (position + 0.5f < center) { coef = (position + 1 - center) / 0.5f; } else { coef = (center - position) / 0.5f; } scale = coef * (MAX_SCALE - MIN_SCALE) + MIN_SCALE; } page.setScaleX(scale); page.setScaleY(scale); } }; The difficult thing about this is position parameter of transformPage method. When pages are fill viewpagers width this param changes from 0 to 1. But when pages are smaller this param is tricky. position is value of left side of the view. Page width equals to 1. position equals to 0 when pages left side is on the left side of viewpager. So position can be more than 1, depends on page width. First you need to find viewpagers center (relatively to position parameter). Then scale down page if page moves to left or to rigth from center. In my implementation I scale down view on half page distance from center. Here is result: Page width can be controlled via padding. Extra margin between pages can be added throught viewPager.setPageMargin(value) method.
{ "pile_set_name": "StackExchange" }
{ "name": "map-canvas", "version": "1.0.0", "description": "基于baidu、google、openlayers、arcgis、高德地图、canvas数据可视化", "main": "rollup.config.js", "scripts": { "mini": "npm run build && uglifyjs build/baidu-map-lineGradient.js -c -m -o build/release/baidu-map-lineGradient.min.js", "build": "rollup -c", "watch": "npm-watch", "test": "npm run build" }, "watch": { "build": { "patterns": [ "src", "main.js" ], "extensions": "js,jsx", "ignore": "" } }, "repository": { "type": "git", "url": "git+https://github.com/chengquan223/map-canvas.git" }, "keywords": [ "baidu", "arcgis", "amap", "google", "openlayers", "canvas", "visualization" ], "author": "309581454@qq.com", "license": "ISC", "bugs": { "url": "https://github.com/chengquan223/map-canvas/issues" }, "homepage": "https://github.com/chengquan223/map-canvas#readme", "devDependencies": { "babel-preset-es2015-rollup": "^3.0.0", "npm-watch": "^0.3.0", "rollup": "^0.41.5", "rollup-plugin-babel": "^2.7.1", "uglify-js": "^3.3.8" }, "dependencies": { "lodash": "^4.17.19", "mixin-deep": "^2.0.1", "set-value": "^3.0.1" } }
{ "pile_set_name": "Github" }
Cougar JV’s stumble against Spartans The Cougar junior varsity basketball squad saw their six game winning streak come to an end Friday night, dropping their contest against Salem by a final score of 72-51. The loss drops Pulaski to 9-4 on the season. The junior Cougars seemed to struggle much of the game against a stingy Salem defense, but missed shots, missed free throws, and turnovers cost them the game in the end. The Cougars played a very tough first half, trailing 10-9 at the end of the first quarter and 26-22 at the halftime break. Several Cougars found themselves in foul trouble early as well. Salem outscored Pulaski 21-15 in the third quarter to take a 47-37 lead into the start of the final quarter. Bradley Church and then Elliot Brewster fouled out midway through the fourth, taking a big part of the Cougar offensive and defensive punch away. Pulaski continued to work hard, but in the end the Spartans outscored the Cougars 25-14 to earn the 72-51 win.
{ "pile_set_name": "Pile-CC" }
King's Lanes is a well known bowling and gaming establishment in the greater Boston area, but when they opened up their newest location in Rosemont, IL, they turned to Privy to help them gain some early traction. Thanks to Privy's sweetest new feature- one click sharing- King's was able to create a promo, link their Facebook account, kick back and watch the results pour in. And as they say, when it rains it pours! Kings deal Within a mere 24 hours of posting the promo on King's Facebook wall, we were able to help generate some pretty awesome results: 32 customers 9 Facebook page likes 10 deal likes 2 shares (brand exposure to 1,061 new people) So, how'd we do it (clue: it's not magic)? The simple fact of the matter is that the people who interact with your business or brand on Facebook are looking specifically for offers and specials. They want to be privy to what's going on with your business. So share information that is interesting and relevant, keep your fans and followers in the know, and give them a reason to interact with your business online!
{ "pile_set_name": "Pile-CC" }
Neurokinin(3) receptors couple to the activation of neuronal nitric-oxide synthase in stably transfected Chinese hamster ovary cells. Several physiological effects induced by activation of neurokinin(3) (NK(3)) receptors are mediated by the production of nitric oxide (NO). We investigated the intracellular coupling of NK(3) receptors to NO synthase (NOS) using a Chinese hamster ovary cell line that was stably transfected with both the NK(3) receptor and type I (neuronal) NOS. NOS activity in the transfected cell line was assayed directly, by measuring the formation of L-citrulline, another product of NOS, as well as indirectly, by measuring the production of cGMP in cultured rat fetal lung fibroblasts (RFL-6 cells). MePhe(7)-neurokinin B (NKB) stimulation of L-[(3)H]citrulline production was concentration-dependent and yielded a two-site model for the concentration-response relationship. The production of L-citrulline in response to two other tachykinins, substance P or neurokinin A, revealed only a one-site nature of the response. The production of cGMP in response to MePhe(7)-NKB had an EC(50) value that corresponded to the high-potency component of MePhe(7)-NKB-induced production of L-[(3)H]citrulline. Agonist-induced calcium signaling was also concentration-dependent, and the acute increase in the production of cGMP by MePhe(7)-NKB (0.1 nM) was dependent on the release of calcium from intracellular stores. Results of this study provide the first direct evidence that NK(3) receptors couple to the generation of NO within the same cell.
{ "pile_set_name": "PubMed Abstracts" }
16 B.R. 176 (1981) In re T.E. MERCER TRUCKING COMPANY, Debtor. FRUEHAUF CORPORATION, Plaintiff, v. T.E. MERCER TRUCKING COMPANY, Debtor, and Ben Gilbert, Operating Receiver and Trustee, Defendants. In re G.E.M. STORAGE & TERMINAL COMPANY, INC., Debtor. FRUEHAUF CORPORATION, Plaintiff, v. G.E.M. STORAGE & TERMINAL COMPANY, Debtor, and Ben Gilbert, Operating Receiver and Trustee, Defendants. Ben GILBERT, Operating Receiver and Trustee; T.E. Mercer Trucking Company; and G.E.M. Storage & Terminal Company, Inc., Plaintiffs, v. FRUEHAUF CORPORATION, Defendant. Tommy G. MERCER and Wanda Jo Mercer, Intervening Plaintiffs, v. FRUEHAUF CORPORATION, Defendant. Bankruptcy Nos. BK 4-77-345, BK 4-77-346, Civ. A. No. CA 4-79-55. United States Bankruptcy Court, N.D. Texas, Fort Worth Division. August 11, 1981. *177 *178 *179 *180 JOHN FLOWERS, Bankruptcy Judge. This memorandum announces my rulings on the summary judgment motions filed in the above-captioned cases. This case arose under the Bankruptcy Act of 1898 and I will hear it in two capacities, as a bankruptcy judge in connection with the adversary proceeding filed in the Bankruptcy Court by Fruehauf, and as a special master appointed by Judge Mahon of the U.S. District Court in connection with the suit pending in that court between the trustee, the debtors, Wanda Jo Mercer and Tommy Mercer as intervenors, and Fruehauf. However as it appears that the legal and factual issues are identical in all the proceedings, my rulings announced herein will be applicable to all the cases. All parties have sought summary judgment on issues arising out of § 20a of the Interstate Commerce Act. Fruehauf seeks summary judgment on numerous other legal issues including limitations, estoppel and subordination. The court record consists of various stipulations, interrogatories and depositions. On the current state of the record, most of the motions for summary judgment are denied in view of the issues of fact that must be resolved before a judgment may properly be rendered. In this memorandum I will discuss the operative legal principals in order to elucidate the parties as to the fact issues that remain unresolved. I. SECTION 20a OF THE INTERSTATE COMMERCE ACT Fruehauf Corporation has filed a complaint for relief from the stay asserting that T.E. Mercer Trucking Company and G.E.M. Storage & Terminal Company, Inc. are indebted to Fruehauf. The alleged indebtedness is evidenced by a series of voluminous loan agreements. Fruehauf claims mortgages and security interests in practically all assets of the debtor corporations, including equipment, vehicles, inventory, accounts, operating authorities and real property. The debtor corporations, the trustee and the intervenors[1] urge the application of § 20a of the Interstate Commerce Act as a defense to liability and affirmatively as the basis of a claim against Fruehauf.[2] Fruehauf replies that § 20a is inapplicable because the loan agreements evidencing the debt are not "securities" and therefore fall outside the jurisdiction of the Interstate Commerce Commission. Upon review of the authorities I am of the opinion that it is immaterial whether the loan agreements *181 fall within the purview of a "security" as defined by § 20a of the Interstate Commerce Act. "The starting point in every case involving the construction of a statute is the language itself." International Brotherhood of Teamsters v. Daniel, 439 U.S. 551, 558, 99 S.Ct. 790, 795, 58 L.Ed.2d 808 (1979). Section 20a of the Interstate Commerce Act provides in pertinent part: "ISSUANCE OF SECURITIES; ASSUMPTION OF OBLIGATIONS; AUTHORIZATION (2) It shall be unlawful for any carrier to issue any share of capital stock or any bond or other evidence of interest in or indebtedness of the carrier (hereinafter in this section collectively termed "securities") or to assume any obligation or liability as lessor, lessee, guarantor, indorser, surety, or otherwise, in respect of the securities of any other person, natural or artificial, even though permitted by the authority creating the carrier corporation, unless and until, and then only to the extent that, upon application by the carrier, and after investigation by the commission of the purposes and uses of the proposed issue and the proceeds thereof, or of the proposed assumption of obligation or liability in respect of the securities of any other person, natural or artificial, the commission by order authorizes such issue or assumption. The commission shall make such order only if it finds that such issue or assumption: (a) is for some lawful object within its corporate purposes, and compatible with the public interest, which is necessary or appropriate for or consistent with the proper performance by the carrier of service to the public as a common carrier, and which will not impair its ability to perform that service, and (b) is reasonably necessary and appropriate for such purpose." In 1935, the scope of the Interstate Commerce Act (ICA) was extended to cover common carrier by motor vehicle, see 49 U.S.C. §§ 301-327, Part II of the ICA. Section 214 of the ICA, 49 U.S.C. § 314 (now 49 U.S.C. § 11302) makes the provisions of Sections 20a(2)-(11) applicable to motor common carriers. Section 20a of the Interstate Commerce Act has been aptly described as an "early essay in securities legislation," see United States v. New York, New Haven & Hartford Railroad, 276 F.2d 525 (2nd Cir. 1959), cert. denied, 362 U.S. 961, 80 S.Ct. 877, 4 L.Ed.2d 876 (1960). A threshold issue is whether this essay in securities legislation may be asserted by the trustee, the debtor corporation and the intervenors against Fruehauf's claim. A review of the legislative history and court interpretations of the purpose of § 20a provide some insight to whether these parties have standing to urge the application of the statute. The legislative history reflects that one of the purposes Congress enacted § 20a was to protect investors. Consider the somewhat optimistic arguments of Representative Rayburn who sponsored an early draft of the statute: "Of course, the credit of the railroads has been destroyed. But if we write into the law of the land a statute to the effect that before a railroad can issue new securities, before it can put them on the market it must come before the properly constituted government agency, lay the full facts of its financial situation before that body, tell that body what it intends to do with the money derived from the sale of the issue of securities and after it has received the approval of that regulating body and it goes out and puts those securities on the market then the Interstate Commerce Commission by this law is empowered at any time to call it to account and have it tell to that regulating body that it expended the money, the proceeds of the sale of securities, for the purposes for which it had made the application. Then we shall have railroad securities that will stand for value in the markets of the country and in the markets of all the world." 59 Cong.Rec. 8376 (1919). In Interstate Investors, Inc. v. United States, 287 F.Supp. 374, 387 (S.D.N.Y., 1968) *182 (three-judge court) aff'd per curiam, 393 U.S. 479, 89 S.Ct. 707, 21 L.Ed.2d 687 (1969), the court stated the dominant Congressional purpose in enacting § 20a was to protect investors in the securities of railroads. The remedies for violations of the statute confirm that the statute is intended to protect investors. Section 20a(11) provides that the holder of a void security acquired directly from the carrier may at his option rescind the transaction and upon surrender of the security recover the consideration given therefor. If a voided security is acquired for value and in good faith and without notice that the issue or assumption is void, such person may in a suit hold jointly and severally liable for the full amount of the damage sustained by him, the carrier which issued the security and its directors and officers who participated in the authorizing, issuing or selling of the security. Interestingly, Congress omitted the "good faith" requirement with respect to the holders of void securities acquired directly from the carrier which appears to encourage the direct extension of credit to a carrier. Section 20a has somewhat of a dual function in view of the role given the Interstate Commerce Commission by the statute. The Commission was created for the purpose of facilitating commerce throughout the nation, Texas & P.R. Co. v. Abilene Cotton Oil Co., 204 U.S. 426, 27 S.Ct. 350, 51 L.Ed. 553 (1907). The Interstate Commerce Commission may approve an application for authorization to issue securities, only if it finds that such issue or assumption: (a) is for some lawful object within its corporate purposes, and compatible with the public interest, which is necessary or appropriate for or consistent with the proper performance by the carrier of service to the public as a common carrier, and which will not impair its ability to perform that service, and (b) is reasonably necessary and appropriate for such purpose. Section 20a(2). The Second Circuit has expounded upon the "in the public interest" function of Section 20a, ". . . we prefer a construction of Section 20a of the Interstate Commerce Act that gives effect to its remedial purposes to give the commission control over stock and bond issues in order to avoid for the future abuses in the issuance of securities whereby railroad properties have been bankrupted or saddled with almost overwhelming burdens of indebtedness, which have not increased the amount of or value of property devoted to the public service, have not improved the service rendered, and have on the whole had the effect of increasing the charges for the service," United States of America v. New York, New Haven & Hartford Railroad Co., et al, 276 F.2d 525 (2nd Cir. 1959). I find that the purpose and function of § 20a is twofold, (1) to protect investors from worthless issues of railroad and common carrier securities, and (2) to protect the public interest in the efficient and economical operation of interstate carriers. Consequently this "early essay" in securities regulation conceivably may operate to protect both purchasers of securities and the public interest by preserving the financial integrity of the railroad and common carrier securities. With the above considerations in mind, I turn to an issue that has been marginally addressed by the parties. The trustee and Mercer seek to avoid liability on the theory that the consolidated loan agreements are § 20a securities. It is argued that the securities are void because a statutory duty has been breached by the failure to have Commission approval of the issue. However, a breach of a statutory duty does not give rise to a private cause of action to every person injured by the statutory breach. The law clearly demands that the statutory breach must cause injury to one of the class that the statute is designed to protect, Greater Iowa Corporation v. McLendon, 378 F.2d 783, 790 (8th Cir. 1967); Cambridge Capital Corporation v. Northwestern National Bank, 350 F.Supp. 829 (D.Minn., 1972). *183 Section 20a does not purport to protect the issuer of securities. In fact it places the risk of non-compliance upon the issuer and its directors, officers, attorneys and other agents, who participated in the issuing of the voided security. The trustee and Mercer seek to shift the risk of noncompliance upon the holder (Fruehauf) by requesting the court to void the debt or in the alternative void the security interests and mortgages that secure the debt. The remedy for violation of § 20a proposed by the trustee, which in effect penalizes the investor, stands contrary to the primary purpose of the statute which is to protect investors. The trustee and debtor have focused on the use of the "security . . . shall be void" language. The court, however in interpreting a statute, must not be guided by a single sentence or member of a sentence, but must look to the provisions of the whole law and to its object and policy, Philbrook v. Glodgett, 421 U.S. 707, 95 S.Ct. 1893, 44 L.Ed.2d 525 (1975). The statute clearly contemplates that the holder of an unauthorized § 20a security may assert a rescission claim against the issuer. If the § 20a security is in the form of a bond or other debt instrument secured by an interest in property, I am of the opinion that the bondholder's rescission claim under § 20a(11) would likewise be treated as secured in the bankruptcy context. It would be absurd to interpret this investor protective statute so as to give the investor a remedy of rescission, yet if such remedy is exercised the investor forfeits any liens securing the indebtedness. In interpreting a statute, the courts are to respect the policy of Congress so as not to impute to the statute a self-defeating, if not disingenuous purpose, Dalia v. U.S., 441 U.S. 238, 99 S.Ct. 1682, 60 L.Ed.2d 177 (1979). The trustee and Mercer have raised the spectre of Fruehauf's heavy-handed lending practices in attacking Fruehauf's claim. Noting that the proceeds of the trucking company loan went toward the retirement of personal debts and beer inventories, the brief of the Plaintiff-Debtor raises the rhetorical question: "Is there the slightest doubt in the Court's mind what would have happened to this agreement had it been presented to the Interstate Commerce Commission for approval?" I have no serious doubts about how the Commission would have ruled with respect to some of the indebtedness in view of the posture taken by the Commission in numerous decisions, see Mutrie Motor Transportation, Inc., 116 Motor Carrier Cases 99 (1972). But I do entertain serious doubts that Congress intended § 20a to be used as a vehicle by carriers to avoid undesired investment obligations. This is not to say that I endorse Fruehauf's alleged conduct which suggests an intent on Fruehauf's part to circumvent I.C.C. review of the consolidated loan agreements. Fruehauf's conduct will be carefully scrutinized for misconduct that may mandate application of the court's equitable subordination powers. However Congress chose not to include a statutory remedy for misconduct on the part of the holder of a § 20a security. Consequently I hold that the trustee and Mercer lack standing to assert a claim based on the alleged violation of § 20a of the I.C.C. Act. Thus it is unnecessary to decide whether the consolidated loan agreements are § 20a securities.[3] Fruehauf's *184 motion for summary judgment on this issue will be granted. II. THE ALLOCATION OF DEBT LIABILITY AND USURY CLAIMS The court has under review a series of agreements regarding the indebtedness owing from what are described as the "Corporate Debtors" and the "Guarantors." These agreements were preceded by loans to various entities at different times, the details of which are not before the court. The parties agree at least some of the prior loans were to entities other than the "Corporate Debtors" and the "Guarantors." The initial consolidated loan agreement dated December 1, 1969, contains a listing and acknowledgment of existing obligations owing to Fruehauf. The agreement recites, "Whereas the parties hereto desire to consolidate the obligations owing to Fruehauf in a single loan arrangement without altering the existing obligations or security given therefor." After reciting various debts and future advances the agreements sets forth a payment schedule, with payments to be made by the Corporate Debtors. Apparently only two corporate entities survived to actively participate in the September 16, 1977 agreement, T.E. Mercer Trucking Company and G.E.M. Storage & Terminal Co., Inc. In this agreement the corporate debtor and guarantor parties "recognize, admit and affirm all of the foregoing indebtedness owing by them, individually, jointly or severally, to Fruehauf Corporation." Fruehauf was given the right to "undertake and order the liquidation of some, any and all of the assets of either or both of said corporations and/or the equipment company and/or claimed sole proprietorships and apply the net proceeds thereof to the indebtednesses owing by the debtor and guarantor parties to Fruehauf Corporation." Oddly enough none of the various agreements go so far as to recite that the corporate debtors are jointly and severally liable for the entire indebtedness. The trustee, debtors and intervenors contend that the 1969 agreement constituted simply a convenient means to include in one document provisions relating to different loans, and thus each entity is obligated only for the repayment of monies that went to its benefit. Fruehauf responds that the parties intended the corporate debtors to be co-obligors under the consolidated loan agreement in spite of the fact that they received unequal benefits. Fruehauf asserts that a "community of interest" provides sufficient consideration to create a joint and several obligation and thus each corporate debtor is liable for the entire indebtedness. The central issue is whether the parties intended the "corporate debtors" to be jointly and severally liable for the aggregate amount of indebtedness reflected in the various consolidated loan agreements or whether the parties intended the agreements to be a mere reaffirmation of existing indebtedness with each corporate debtor liable only for its historical share of the total indebtedness recited.[4] This issue is *185 important because it will determine the amount of each entity's liability to Fruehauf. Once each entity's liability is established the effective interest rate charged by Fruehauf may be calculated by comparing the interest charged to each entity's debt liability. If each corporate debtor were obligated for the entire indebtedness the interest to debt ratio would obviously be less than if each debtor is liable only for its historical share of the debt. Ultimately the court must interpret the language of the consolidated loan agreements. Under the parole evidence rule, the standard of interpretation of a written contract is usually the meaning that would be attached to it by a reasonably intelligent person acquainted with all operative usages and knowing all the circumstances prior to, and contemporaneous with, the making of the contract other than the oral statements by the parties of what they intended it to mean, Zell v. American Seating Co., 138 F.2d 641 (2nd Cir. 1943). I believe it appropriate to allow the parties an opportunity to develop the circumstances surrounding the execution of the loan agreements for the purpose of ascertaining the parties' intent. Consequently I will deny summary judgment on the issue of whether each corporate debtor was intended to be liable on the entire consolidated indebtedness or only its historical share. Several subsidiary issues will arise upon my deciding the above issue. Assuming a finding that the "corporate debtors" intended to be jointly and severally liable for the entire consolidated indebtedness, the issue of sufficient consideration comes into view. The trustee, debtors and intervenors rely on V.T.C.S. art. 1302-2.06 which provides that no corporation "shall create any indebtedness whatever except for money paid, labor done, which is reasonably worth at least the sum at which it was taken by the corporation, or property actually received, reasonably worth at least the sum at which it was taken by the corporation." This statute is declaratory of the common law of ultra vires as it existed before its enactment, Cooper Petroleum Co. v. LaGloria Oil & Gas Co., 423 S.W.2d 645 (Tex.Civ.App.—Houston [14th Dist., 1967]). Historically Texas courts were reluctant to enforce one entity's indebtedness against a guarantor corporation where the guarantor received no substantial benefit from the guarantee, see Rio Grande Valley Gas Co. v. Grand Rapids Store Equipment Corporation, 57 S.W.2d 348 (Tex.Civ.App.—San Antonio, 1933) no writ. hist. However by the enactment of art. 2.04 A of the Texas Business Corporation Act the legislature precluded a corporation from pleading ultra vires as the basis for a claim or defense when sued on its contract, Cooper Petroleum, supra; Inter-Continental Corp. v. Moody, 411 S.W.2d 578, (Tex.Civ.App.— Houston, 1967) and Republic National Bank of Dallas v. Whitten, 383 S.W.2d 207 (Tex. Civ.App.—Dallas, 1964) aff'd 397 S.W.2d 415 (Tex., 1966). Consequently the provisions of art. 1302-2.06 may only be asserted as the basis for a claim against the directors and officers who have benefited from the ultra vires activities. Thus in the event the consolidated loan agreements were intended to create a joint and several liability on the part of the debtor corporations, the trustee and Mercer may not assert art. 1302-2.06 as a defense to joint and several liability of each debtor corporation. I am further of the opinion that the trustee and Mercer may not assert art. 1302-2.06 for the purpose of determining each debtor corporation's principal balance owing in order to set up a usury claim against Fruehauf. Returning now to the primary fact inquiry and assuming I find the parties intended that the corporate debtors would be liable only for their historical portion of the consolidated indebtedness (as the trustee and Mercer contend), an alternative usury claim might be asserted under the rule of Windhorst v. Adcock Pipe and Supply, 547 S.W.2d 260 (Tex., 1977). This usury claim would be based on the fact that although each debtor corporation is liable only to the *186 extent of its historical portion of the consolidated indebtedness, Fruehauf charged or received from each debtor corporation interest on the entire indebtedness. The ratio of total interest received or charged vis-a-vis the amount actually owed by each corporate debtor could exceed the legal interest rates. To illustrate this usury theory, assume that three individuals, A, B, C, each purchases from store F a $200 item on credit. Each signs a promissory note for $200 payable at a lawful annual percentage rate of 18%. One year later the store sends A a statement charging interest in the amount of $108 (18% times $600) intending to hold A liable for the entire amount of interest charged. Under the Windhorst decision, A would have a usury claim against F whether or not any interest was actually paid. Assume that A, B, C and store F executed a consolidated agreement which lists all indebtedness owed by A, B, and C, however it provides that F may recover from A only its share of principal and interest, and likewise limits F's recovery from B and C to their proportionate share of accrued interest and principal. In such case F has "contracted" for legal interest. But further assume that F subsequently sends A a bill for the total accrued interest of $108. In such event F would have "charged" A usurious interest within the meaning of Article 5069-1.06 as interpreted by the Windhorst decision, supra. The action taken by F in billing A for the entire amount manifests an intent to repudiate the prior agreement and charge a usurious interest rate to A. The subjective intent of the creditor to charge only a legal rate of interest is immaterial, see Cochran v. American Savings and Loan, 586 S.W.2d 849 (Tex., 1979). To avoid usury penalties F must plead and prove that such charge and receipt of usury was a result of accidental and bona fide error. Finally it is possible to interpret the consolidated loan agreement in a manner such that the parties "contracted" for a usurious interest rate. Such construction would require my finding that although Fruehauf could hold each corporate debtor liable only for its historical portion of the consolidated debt, Fruehauf could nevertheless hold each corporate debtor responsible for the aggregate interest accruing on the entire consolidated debt. I find the language of the agreements sufficiently ambiguous so that as a matter of law I am unable to preclude such a construction. However it is fair to state at this juncture that to interpret the consolidated loan agreements so that the corporate debtors are not jointly and severally liable on the consolidated debt and yet are jointly and severally liable as to the accrued interest on the consolidated debt would be a bit strained. I am unable to conclude as a matter of law that Fruehauf is not liable for the usury penalties provided by article 5069-1.06 V.T.C.S. Consequently the motion for summary judgment on the usury issue is denied in view of the factual issues that remain unresolved. III. THE ISSUE OF STANDING In response to Fruehauf's motion for relief from the stay, the trustee answered and counterclaimed that Fruehauf was the partner, joint venturer or in the alternative the alter ego of the debtor. This position is based on the undisputed fact that at various times Fruehauf assumed management responsibilities and incurred debt for the debtor pursuant to the terms of the consolidated loan agreements. In its motion for summary judgment Fruehauf asserts that neither the trustee nor debtor has "standing" to assert the partnership, joint venture or alter-ego theory. The law of standing, the Supreme Court says, is a "complicated specialty of federal jurisdiction, the solution of whose problems is in any event more or less determined by the specific circumstances of individual situations," U.S. ex rel. Chapman v. Federal Power Comm., 345 U.S. 153, 156, 73 S.Ct. 609, 612, 97 L.Ed. 918 (1953). The *187 federal courts are to look into the nexus between the status asserted by the litigant and the claim he presents to assure that he is a proper and appropriate party to invoke federal judicial power, Flast v. Cohen, 392 U.S. 83, 101, 88 S.Ct. 1942, 1953, 20 L.Ed.2d 947 (1968). Fruehauf contends that the trustee does not have standing to recover alleged debts owing to the creditors of the bankrupt from the partner, joint venture or alter ego of the bankrupt. I hold the trustee does not have the right to collect debts from alleged non-bankrupt partner,[5] joint venturer or alter ego. Such cause of action belongs solely to each partnership creditor, see for example Krivo Industrial Sup. Co. v. National Distill., 483 F.2d 1098 (5th Circuit, 1973). The trustee however does have standing to assert the partnership, joint venture or alter ego status for the purpose of subordinating one creditor's claim to the claims of other creditors under the doctrine of equitable subordination. I will therefore grant Fruehauf's motion for summary judgment on the trustee's lack of standing issue except to the extent the trustee relies on the partnership, joint venture or alter ego theory as the basis for subordinating Fruehauf's claim to those of other creditors. IV. I.C.C. PERMIT ISSUE The trustee alleges Fruehauf took control and possession of Mercer and its I.C.C. permits without the approval of the Commission and such fact renders invalid any pledge of the permits. Fruehauf has moved for a summary judgment on this issue. It has received minimal attention in the briefs and arguments of counsel and no authorities have been cited in support or contrary to Fruehauf's motion. However in view of the representations of counsel during the hearing on this motion held on August 5, 1981, that this issue will receive further attention, I will at this point deny Fruehauf's motion for summary judgment on the void pledge issue. V. THE WAIVER AND ESTOPPEL ISSUES Fruehauf in its motion for summary judgment asserts that the debtor corporations and guarantors waived any defenses or counterclaims to Fruehauf's claims pursuant to the agreement of September 16, 1977 which states in pertinent part: "All of the undersigned debtor and guarantor parties hereto: Recognize, admit and affirm all of the foregoing indebtedness owing by them, individually, jointly or severally to Fruehauf Corporation, and acknowledge that all of the same have been matured and are now owing, past due, and not subject to credit offset or counter-claims of any kind." The trustee and Mercer have countered that such agreement was conditioned on certain subsequent events which never materialized. At the summary judgment hearing on August 5, 1981, Fruehauf urged that the 1977 agreement equitably estopped Mercer from asserting defenses and claims arising out of the loan agreements. Factual issues exist which preclude my granting a summary judgment on the waiver and estoppel theories. Waiver is operative only where the person charged has actual or constructive knowledge of all the material facts concerning the right or privilege involved. No one can be said to have waived that which he does not know, Bering Mfg. Co. v. Carter and Bro., 255 S.W. 243 (Tex.Civ.App.—Beaumont, 1923) affirmed 272 S.W. 1105; see also 60 Tex. Jur.2d Waiver § 6, p. 187. A factual issue exists as to whether the corporate debtors relinquished a known right for a valuable consideration. As to Fruehauf's estoppel claim, Fruehauf must show that it acted upon Mercer's representations without knowledge of the falsity of such representations. *188 To successfully urge estoppel, Fruehauf must show not only ignorance of the true circumstances of a transaction, but also that there was no convenient or available means of acquiring knowledge of the truth with reference thereto, Holland v. Blanchard, 262 S.W. 97 (Tex.Civ.App.—Dallas, 1924) err. dismd. A fact issue exists as to whether Fruehauf had knowledge of the existence of offsets, credits and counterclaims when Mercer signed the September 16, 1977 agreement. Furthermore the party claiming it was misled by the representations must show that it changed position in a manner that it will be injured if estoppel is not invoked, Stanolind Oil & Gas Co. v. Midas Oil Co., 173 S.W.2d 342 (Tex.Civ.App. —Galveston, 1943) revd. on other grounds 179 S.W.2d 243. VI. THE "ANTITRUST" VIOLATION Fruehauf seeks a summary judgment on the anti-trust issue contending that no summary judgment evidence exists to support the anti-trust action alleged by the trustee and Mercer. While the anti-trust issue has received minimal attention in the pleadings and briefs of the parties, there is before the court excerpts from depositions, interrogatories and agreements which if viewed most favorably to the trustee and Mercer provide some faint evidence of an anti-trust violation. It is expected that the trustee and Mercer will more fully develop the alleged violations before the trial of this matter. At this juncture Fruehauf's motion for summary judgment is denied. VII. CONSOLIDATION Fruehauf seeks summary judgment denying consolidation of the bankruptcy estates of T.E. Mercer Trucking Company and G.E.M. Storage and Terminal in the event it is found that the corporate debtors are not jointly and severally liable for Fruehauf's total claims. The bankruptcy court has jurisdiction to consolidate proceedings and to merge the assets and the liabilities of the debtors. This jurisdiction is based on considerations of equity, one of the touchstones of the bankruptcy court's jurisdiction, Bank of Marin v. England, 385 U.S. 99, 87 S.Ct. 274, 17 L.Ed.2d 197 (1966). However the court must be mindful that consolidation in bankruptcy is no mere instrument of procedural convenience but a measure vitally affecting substantive rights, In the Matter of Flora Mir Candy Corp., 432 F.2d 1060, 1062 (2nd Cir. 1970). In the case sub judice Fruehauf asserts that consolidation will injure its substantive rights. Of course Fruehauf's rights have been challenged and further fact finding must occur before the extent and priority of those rights may be determined. Controverted issues of fact are thus implicit in the consolidation issue, and Fruehauf's motion for summary judgment on consolidation is denied pending resolution of the enforceability and priority position of its claims. VIII. STATUTE OF LIMITATIONS Fruehauf asserts that the offsets, credits and defenses claimed by the trustee and Mercer are barred by limitations. However it is settled by many decisions that the statute of limitations is not applicable to matters set up strictly by way of defense, Rutherford v. Carr, 99 Tex. 101, 87 S.W. 815 (1905); Morriss-Buick Co. v. Davis, 127 Tex. 41, 91 S.W.2d 313 (Sec. A, 1936), 37 Tex.Jur.2d Limitations of Actions § 18. Fruehauf's motion for summary judgment on the statute of limitations issue is denied, however I reserve opinion as to whether the trustee's and Mercer's claims against Fruehauf are barred by limitations if asserted affirmatively as a ground for recovery rather than as a defense to the alleged indebtedness. IX. THE POST-PETITION RECEIVABLE ISSUE The trustee and Mercer seek to attack Fruehauf's secured status by questioning *189 whether post-petition receivables of Mercer may be substituted as Fruehauf's collateral for pre-petition receivables consumed by the trustee's post-petition operations. Again overriding this issue is the factual determination to be made as to the priority of Mercer's indebtedness to Fruehauf. Assuming that such indebtedness exists, and the security interests are not subordinated on other grounds, I will follow the rule of In the Matter of Sequential Information Systems, Inc., 4 C.C.H. Sec. Trans. Guide ¶ 51479 (S.D.N.Y., 1970). In that decision the court held that a creditor secured by inventory has no right, title or interest in and to and no claim upon inventory purchased by the debtor-in-possession subsequent to the filing of the petition for arrangement herein and any accounts receivable created from the sale thereof, except insofar as such inventory is paid for with funds of the debtor which is subject to the creditor's pre-petition lien. To the extent that Fruehauf traces the proceeds of encumbered pre-petition assets into post-petition property or accounts acquired by the trustee or debtor-in-possession, I hold it has an enforceable lien on such post-petition assets. Plaintiff's summary judgment motion is denied in view of the lack of a factual record before the court to determine which pre-petition and post-petition property is subject to the lien. X. EQUITABLE SUBORDINATION It is clear that a factual issue exists as to whether Fruehauf may be equitably subordinated to other creditors. Before the court may exercise its equitable power three conditions must be met: (1) the claimant must have engaged in some type of inequitable conduct; (2) the misconduct must have resulted in injury to the creditors of the bankrupt or conferred an unfair advantage on the claimant; and (3) equitable subordination of the claim must not be inconsistent with the provisions of the Bankruptcy Act, see In re Multiponics, 622 F.2d 709 (5th Cir. 1980); In the Matter of Mobile Steel Co., 563 F.2d 692, 700 (5th Cir. 1977). The claims however may be subordinated only to the extent necessary to offset the unfair advantage or the harm which the creditors suffered on account of the inequitable conduct, Mobil at 701. Fruehauf argues it should not be responsible for any creditor harm from its actions because creditors could have ascertained that Fruehauf had liens on substantially all of the debtor's property and any extensions of credit were imprudent. The doctrine of equitable subordination deals with inequitable conduct resulting in either unfair advantage or creditor harm and is not dependent on creditor reliance or prudence. Actual fraud need not be established, Multiponics at 720. As discussed earlier in the opinion, I will give significant attention to alleged conduct of Fruehauf in seeking to circumvent the review by the Interstate Commerce Commission of the consolidated loan agreements. If such intent to circumvent I.C.C. control is found and if I find that the conduct resulted in fewer assets available for distribution to the unsecured creditors, Fruehauf's claim will be subordinated to the extent the unsecured creditors were injured. The court will also look at the "creditor control" exercised by Fruehauf pursuant to the various consolidated loan agreements. These remarkable loan contracts gave Fruehauf joint control of all bank accounts of the Corporate Debtors requiring co-signatures for substantial checks, gave Fruehauf the right to place its designee on the Board of Directors of the Debtors; required all corporate by-laws, stock books and certificates to be delivered to Fruehauf's counsel; gave Fruehauf the right to have one of its employees participate in the day-to-day operations of the Debtor's premises with complete veto powers on any items or matters whatsoever; gave Fruehauf the right to require the liquidation of all assets of the Debtors and the various other ventures; gave Fruehauf the right to set salaries of officers and directors; required the Corporate Debtors to pledge all their stock, and provided in the event of a dispute between the Mercer management and the Fruehauf *190 monitoring agent that an appeal would lie to the Fruehauf management for final determination. The extensive creditor control evidenced by the loan agreement suggests that the debtor corporations were mere instrumentalities or the alter ego of Fruehauf. If Fruehauf's actual control was as dominant as the consolidated loan agreements indicate, such fact pattern may satisfy the inequitable conduct element of the trustee's subordination claim, see In re American Lumber Co., 5 B.R. 470 (D.Minn., 1980). If I find Fruehauf gained an unfair advantage or that creditors suffered harm as a result of its alleged control, the bankruptcy court's equitable powers may be invoked to subordinate Fruehauf's claims to the extent necessary to remedy the inequitable conduct. The trustee is allowed leave to amend its pleading so as to make a more definitive statement of Fruehauf's inequitable conduct and the nature and extent of any alleged damages. The determination necessary to resolve the subordination issue will require further evidentiary hearings. Consequently Fruehauf's motion for summary judgment on equitable subordination issue is denied. The foregoing constitutes my conclusions of law pursuant to F.R.C.P. 52 and my initial report as special master pursuant to F.R.C.P. 53(e). NOTES [1] The intervenors are the sole stockholders of the debtor corporations and are guarantors of much of the corporate debt. [2] At the summary judgment hearing on August 5, 1981 the debtor, trustee and intervenors announced they would no longer urge a usury claim based on the allegation the debt to Fruehauf is void under § 20a. This concession anticipated my ruling on this issue. A void debt may not be the subject of a usury claim. O'Quin v. Beanland, 540 S.W.2d 526 (Tex.Civ. App.—San Antonio, 1976) no writ. hist. [3] The parties extensively briefed the issue of what evidences of indebtedness fall within the purview of § 20a. All recognize that Ex parte 275 [Association of American Railroad v. U.S.], 603 F.2d 953 (D.C.Cir.1979) is the leading authority. It sets forth two salient factors in determining whether a particular transaction is a security under § 20a. The first factor looks to general principals of federal securities laws to determine whether the debt is in the nature of a security. The Fifth Circuit follows the investment/commercial dichotomy test which is premised on the view that Congress' concern in enacting the securities laws was to regulate practices associated with investment transactions and that the securities laws were not designed to regulate commercial transactions. McClure v. National Bank of Lubbock, 497 F.2d 490 (5th Cir. 1974), focused upon two factors in determining whether "notes" are securities: (1) were the notes offered to some class of investors or were they acquired by the creditor for speculation or investment, (2) alternatively did the debtor obtain investment assets, directly or indirectly, in exchange for its notes. The investment/commercial dichotomy provides an analysis helpful in explaining the holdings in numerous I.C.C. cases cited by the parties, see Lehigh Valley Railroad Company, 1 Fed. Carrier Cases 328 (1939); Mutrie Motor Transportation, Inc., 116 M.C.C. 99 (1972) and Hays Freight Line, Inc., 39 M.C.C. 576 (1944). Ex parte 275 further recognized that § 20a was intended to be limited to "issues" of securities, and thus imposed an element that the security be in transferable form. A transferable evidence of indebtedness is one that has negotiable or quasi-negotiable characteristics; see REA Express, Inc. v. Alabama Great Southern, 427 F.Supp. 1157 (S.D.N.Y., 1976), and Transcontinental Bus System, Inc., 80 M.C.C. 54 (1959). The second element is met if the debt instrument is in a form that the issuer and initial holder of the instrument could reasonably anticipate that the instrument would be transferred to a member of the class that § 20a is designed to protect. However I find it unnecessary to apply this analysis to the consolidated loan agreement as I conclude that § 20a does not operate to deprive Fruehauf of its secured creditor status even in the event the agreement is a security. [4] I am addressing the in personam liability of each debtor corporation. The cross-collateralization agreements make each corporation's assets liable for the other's individual indebtedness. [5] Such is the implication of 11 U.S.C. § 23(i) [Bankruptcy Act § 5(i)] which provides that where only one partner is adjudged bankrupt, the partnership property shall not be administered unless by consent.
{ "pile_set_name": "FreeLaw" }
Zcoin - Private financial transactions, enabled by the Zerocoin Protocol
{ "pile_set_name": "OpenWebText2" }
List of Central American folk music traditions This is a list of folk music traditions, with styles, dances, instruments and other related topics. The term folk music can not be easily defined in a precise manner; it is used with widely varying definitions depending on the author, intended audience and context within a work. Similarly, the term traditions in this context does not connote any strictly-defined criteria. Music scholars, journalists, audiences, record industry individuals, politicians, nationalists and demagogues may often have occasion to address which fields of folk music are distinct traditions based along racial, geographic, linguistic, religious, tribal or ethnic lines, and all such peoples will likely use different criteria to decide what constitutes a "folk music tradition". This list uses the same general categories used by mainstream, primarily English-language, scholarly sources, as determined by relevant statements of fact and the internal structure of works. These traditions may coincide entirely, partially or not at all with geographic, political, linguistic or cultural boundaries. Very few, if any, music scholars would claim that there are any folk music traditions that can be considered specific to a distinct group of people and with characteristics undiluted by contact with the music of other peoples; thus, the folk music traditions described herein overlap in varying degrees with each other. References Notes F|Central American folk Category:Traditional music
{ "pile_set_name": "Wikipedia (en)" }
[Scientific background and clinical implementation: three new proposals in coloproctology]. The Authors underline three clinical problems in coloproctology: the surgical access to the anal canal, the lacking aspects of the actual classification of hemorrhoids, the difficult choice of the surgical treatment in case of coexisting III degrees and IV degrees degree of hemorrhoids. They propose a new anal retractor which enables the surgeon to better calibrate all the surgical procedures inside the anal canal and to operate alone without the help of another operator. A new computerized software is able to rapidly guarantee a numeric score for hemorrhoids which is repetable before and after treatment of the disease. The Authors present a new surgical technique defined of transfixed stichtes for the resolution of the most advanced stage of hemorrhoids. The new anal retractor was used in fifthy consecutive patients operated on for proctological problems. A quickly computerized score coming from the new classification PATE 2000 Sorrento was evaluated in one hundred patients, while the surgical technique of transfixed stichtes was utilized in fifthy. All the surgical procedures performed with the new device were concluded without complications. The highest values of the score from PATE 2000 Sorrento always fit with the surgical treatment of the disease, while transfixed stitches gave dysuria in five patients, but a better quality of life was referred by 38 over 50 patients treated. The Authors underline in this paper the results of the clinical implementation of these three new solutions in colon-proctology.
{ "pile_set_name": "PubMed Abstracts" }
Blogs Web Shows Resources Gates: U.S. Open to Staying in Iraq if Iraq Asks U.S. soldiers fold a flag during a transfer of command ceremony for the Kalsu Forward Operating Base, south of Baghdad, on September 30, 2010 from the 3rd Advise and Assist Brigade, 3rd Infantry Division to 3rd Armored Cavalry Regiment (ACR). The United States is open to the idea of keeping troops in Iraq past a deadline to leave next year if Iraq asks for it, U.S. Defense Secretary Robert Gates said Tuesday. "We'll stand by," Gates said. "We're ready to have that discussion if and when they want to raise it with us." Gates urged Iraq's squabbling political groups to reconcile after eight months of deadlock. Any request to extend the U.S. military presence in Iraq would have to come from a functioning Iraqi government. It would amend the current agreement under which U.S. troops must leave by the end of 2011. "That initiative clearly needs to come from the Iraqis; we are open to discussing it," Gates said. U.S. and Iraqi officials have said for months they expect Iraqi leaders to eventually ask for an extension of the military agreement with the U.S., but the political impasse has put the idea on hold. A spike in violence in Iraq over the past two weeks has underscored the continued potency of al Qaeda and other Sunni extremists. "We have been pretty clear to the Iraqis that what we seek, and hope they will come together on, is an inclusive government that represents all of the major elements of Iraqi society and in a nonsectarian way," Gates said. "It is our hope that that is the direction they are moving in." He spoke following a meeting with Malaysian Defense Minister Ahmad Zahid Hamidi. Leaders of Iraq's major political blocs met Monday for the first time since parliamentary elections in March. The 90-minute televised session, the start of three days of talks, did not lead to a breakthrough. The battle is largely a contest between the Iranian-favored coalition of Shiite Prime Minister Nouri al-Maliki and followers of anti-American cleric Muqtada al-Sadr against a Sunni-backed secular coalition led by former Prime Minister Ayad Allawi. At stake is whether Iraq has an inclusive government of both the majority Shiites and the minority Sunnis, or a Shiite-dominated government with the Sunnis largely in opposition - a recipe that many worry will turn the country back to the sectarian violence of a few years ago. Al-Maliki's bloc won 89 seats in the March 7 election, compared with 91 for Allawi's coalition; neither side won the majority of seats needed to govern. Gates said he has not spoken directly to any of the political leaders, but other U.S. officials, including Vice President Joe Biden, have been heavily engaged. Gates predicted a new government would need some time before asking the U.S. to extend the troop plan. Although the 2011 deadline was a point of pride for Iraq after years of U.S. military occupation, it does not leave much time for the U.S. to train Iraq's fledgling air force. Iraq also wants more U.S. help to protect its borders.By AP National Security Writer Anne Gearan
{ "pile_set_name": "Pile-CC" }
You're telling me that this prince among men owns a car that needs refueling? Just like us mere mortals? Thank you so much, Gazette, for this fascinating insight into the world of this particular man. I would have expected a man of such importance to be flown in safely away from the proles. But wait, there's more in the paper? Are you going to tell us whether he favours bottle water over soft drinks? Or was he buying a cafinated beverage? HOW COULD YOU LEAVE THIS OFF THE WEB ARTICLE, I JUST NEED TO KNOW! On another note a large number of people locally weren't able to vote in the Euro elections last week, despite checking their forms had gone through, because a second form was introduced yet not advertised anywhere online. To add to that Colchester council don't seem to think advertising this second form's necessity is important. Maybe you could report on that, y'know, if you're not too busy keeping us up to date with the lives of the rich and jobless? You're telling me that this prince among men owns a car that needs refueling? Just like us mere mortals? Thank you so much, Gazette, for this fascinating insight into the world of this particular man. I would have expected a man of such importance to be flown in safely away from the proles. But wait, there's more in the paper? Are you going to tell us whether he favours bottle water over soft drinks? Or was he buying a cafinated beverage? HOW COULD YOU LEAVE THIS OFF THE WEB ARTICLE, I JUST NEED TO KNOW! On another note a large number of people locally weren't able to vote in the Euro elections last week, despite checking their forms had gone through, because a second form was introduced yet not advertised anywhere online. To add to that Colchester council don't seem to think advertising this second form's necessity is important. Maybe you could report on that, y'know, if you're not too busy keeping us up to date with the lives of the rich and jobless?wormshero wormshero wrote: You're telling me that this prince among men owns a car that needs refueling? Just like us mere mortals? Thank you so much, Gazette, for this fascinating insight into the world of this particular man. I would have expected a man of such importance to be flown in safely away from the proles. But wait, there's more in the paper? Are you going to tell us whether he favours bottle water over soft drinks? Or was he buying a cafinated beverage? HOW COULD YOU LEAVE THIS OFF THE WEB ARTICLE, I JUST NEED TO KNOW! On another note a large number of people locally weren't able to vote in the Euro elections last week, despite checking their forms had gone through, because a second form was introduced yet not advertised anywhere online. To add to that Colchester council don't seem to think advertising this second form's necessity is important. Maybe you could report on that, y'know, if you're not too busy keeping us up to date with the lives of the rich and jobless? I am more interested in knowing what side of his car was the filler cap on. [quote][p][bold]wormshero[/bold] wrote: You're telling me that this prince among men owns a car that needs refueling? Just like us mere mortals? Thank you so much, Gazette, for this fascinating insight into the world of this particular man. I would have expected a man of such importance to be flown in safely away from the proles. But wait, there's more in the paper? Are you going to tell us whether he favours bottle water over soft drinks? Or was he buying a cafinated beverage? HOW COULD YOU LEAVE THIS OFF THE WEB ARTICLE, I JUST NEED TO KNOW! On another note a large number of people locally weren't able to vote in the Euro elections last week, despite checking their forms had gone through, because a second form was introduced yet not advertised anywhere online. To add to that Colchester council don't seem to think advertising this second form's necessity is important. Maybe you could report on that, y'know, if you're not too busy keeping us up to date with the lives of the rich and jobless?[/p][/quote]I am more interested in knowing what side of his car was the filler cap on.Route88 wormshero wrote: You're telling me that this prince among men owns a car that needs refueling? Just like us mere mortals? Thank you so much, Gazette, for this fascinating insight into the world of this particular man. I would have expected a man of such importance to be flown in safely away from the proles. But wait, there's more in the paper? Are you going to tell us whether he favours bottle water over soft drinks? Or was he buying a cafinated beverage? HOW COULD YOU LEAVE THIS OFF THE WEB ARTICLE, I JUST NEED TO KNOW! On another note a large number of people locally weren't able to vote in the Euro elections last week, despite checking their forms had gone through, because a second form was introduced yet not advertised anywhere online. To add to that Colchester council don't seem to think advertising this second form's necessity is important. Maybe you could report on that, y'know, if you're not too busy keeping us up to date with the lives of the rich and jobless? I am more interested in knowing what side of his car was the filler cap on. You're right. Please, Gazette, tell us what side the filler cap is on so I can drill a hole in the side of my car, if necessary, in the hope that if I fill my car on the same side I may too, one day, become a man of vast unearned wealth stopping on such great roads as the A12. [quote][p][bold]Route88[/bold] wrote: [quote][p][bold]wormshero[/bold] wrote: You're telling me that this prince among men owns a car that needs refueling? Just like us mere mortals? Thank you so much, Gazette, for this fascinating insight into the world of this particular man. I would have expected a man of such importance to be flown in safely away from the proles. But wait, there's more in the paper? Are you going to tell us whether he favours bottle water over soft drinks? Or was he buying a cafinated beverage? HOW COULD YOU LEAVE THIS OFF THE WEB ARTICLE, I JUST NEED TO KNOW! On another note a large number of people locally weren't able to vote in the Euro elections last week, despite checking their forms had gone through, because a second form was introduced yet not advertised anywhere online. To add to that Colchester council don't seem to think advertising this second form's necessity is important. Maybe you could report on that, y'know, if you're not too busy keeping us up to date with the lives of the rich and jobless?[/p][/quote]I am more interested in knowing what side of his car was the filler cap on.[/p][/quote]You're right. Please, Gazette, tell us what side the filler cap is on so I can drill a hole in the side of my car, if necessary, in the hope that if I fill my car on the same side I may too, one day, become a man of vast unearned wealth stopping on such great roads as the A12.wormshero wormshero wrote: You're telling me that this prince among men owns a car that needs refueling? Just like us mere mortals? Thank you so much, Gazette, for this fascinating insight into the world of this particular man. I would have expected a man of such importance to be flown in safely away from the proles. But wait, there's more in the paper? Are you going to tell us whether he favours bottle water over soft drinks? Or was he buying a cafinated beverage? HOW COULD YOU LEAVE THIS OFF THE WEB ARTICLE, I JUST NEED TO KNOW! On another note a large number of people locally weren't able to vote in the Euro elections last week, despite checking their forms had gone through, because a second form was introduced yet not advertised anywhere online. To add to that Colchester council don't seem to think advertising this second form's necessity is important. Maybe you could report on that, y'know, if you're not too busy keeping us up to date with the lives of the rich and jobless? I am more interested in knowing what side of his car was the filler cap on. You're right. Please, Gazette, tell us what side the filler cap is on so I can drill a hole in the side of my car, if necessary, in the hope that if I fill my car on the same side I may too, one day, become a man of vast unearned wealth stopping on such great roads as the A12. I believe that the entrance to this garage and indeed the A12 in its vicinity, should be painted gold as a way to properly mark this esteemed visit. [quote][p][bold]wormshero[/bold] wrote: [quote][p][bold]Route88[/bold] wrote: [quote][p][bold]wormshero[/bold] wrote: You're telling me that this prince among men owns a car that needs refueling? Just like us mere mortals? Thank you so much, Gazette, for this fascinating insight into the world of this particular man. I would have expected a man of such importance to be flown in safely away from the proles. But wait, there's more in the paper? Are you going to tell us whether he favours bottle water over soft drinks? Or was he buying a cafinated beverage? HOW COULD YOU LEAVE THIS OFF THE WEB ARTICLE, I JUST NEED TO KNOW! On another note a large number of people locally weren't able to vote in the Euro elections last week, despite checking their forms had gone through, because a second form was introduced yet not advertised anywhere online. To add to that Colchester council don't seem to think advertising this second form's necessity is important. Maybe you could report on that, y'know, if you're not too busy keeping us up to date with the lives of the rich and jobless?[/p][/quote]I am more interested in knowing what side of his car was the filler cap on.[/p][/quote]You're right. Please, Gazette, tell us what side the filler cap is on so I can drill a hole in the side of my car, if necessary, in the hope that if I fill my car on the same side I may too, one day, become a man of vast unearned wealth stopping on such great roads as the A12.[/p][/quote]I believe that the entrance to this garage and indeed the A12 in its vicinity, should be painted gold as a way to properly mark this esteemed visit.romantic If the writer is thinking of moving on to a national rag then they need to rememberer these should to be included in every story, make/model/colour with value if a flash motor, how old he is, how much he earns and the value of his house. If the writer is thinking of moving on to a national rag then they need to rememberer these should to be included in every story, make/model/colour with value if a flash motor, how old he is, how much he earns and the value of his house.hughie-s Ritchie_Hicks wrote: Everyone's asking &quot;who cares" yet this is the most popular article on the website today, so someone clearly does! Marks & Spencer mini shopping facility of course what would one expect? and as for its degree of importance as news worthy, of course we can. [quote][p][bold]Ritchie_Hicks[/bold] wrote: Everyone's asking "who cares" yet this is the most popular article on the website today, so someone clearly does![/p][/quote]Marks & Spencer mini shopping facility of course what would one expect? and as for its degree of importance as news worthy, of course we can.Nom De Plume Scoot wrote: But for those protestors he could have stopped off for a KFC on the Ipswich Road....... Why would he want to come into Colchester? Anyway, good to know he buys British petrol. [quote][p][bold]Scoot[/bold] wrote: But for those protestors he could have stopped off for a KFC on the Ipswich Road.......[/p][/quote]Why would he want to come into Colchester? Anyway, good to know he buys British petrol.Boris stevedawson wrote: He was stationed at wattisham so he is not unused to the area.looks more like his dad every day. Military consultant now, there is no end to your talents Dawson, Stand By Your Beds. I go in there for a coffee and a pack of M&S Yum Yum's £1.19p so what don't we all. Just because one of the bosses goes into a petrol station for food and fuel, it does not justify a media report, in fact it is a security risk that the paper is displaying his whereabouts. [quote][p][bold]stevedawson[/bold] wrote: He was stationed at wattisham so he is not unused to the area.looks more like his dad every day.[/p][/quote]Military consultant now, there is no end to your talents Dawson, Stand By Your Beds. I go in there for a coffee and a pack of M&S Yum Yum's £1.19p so what don't we all. Just because one of the bosses goes into a petrol station for food and fuel, it does not justify a media report, in fact it is a security risk that the paper is displaying his whereabouts.Nom De Plume
{ "pile_set_name": "Pile-CC" }
While most members of British Parliament opposed a petition to ban Republican presidential front-runner Donald Trump from the United Kingdom, they didn’t hold back their opinions of Trump and his views. (Gillian Brockell/The Washington Post) While most members of British Parliament opposed a petition to ban Republican presidential front-runner Donald Trump from the United Kingdom, they didn’t hold back their opinions of Trump and his views. (Gillian Brockell/The Washington Post) In nearly a millennium of history, the Palace of Westminster has played host to kings and queens, endured Nazi bombing raids and showed the world how a people could govern themselves through representative democracy. But it has never seen a day quite like the one expected Monday, when the building’s cold stone walls will echo with a parliamentary debate over whether to ban from Britain the leading Republican contender for president of the United States. It will be a strange moment for politics on both sides of the Atlantic. Normally, British officials avoid getting involved in U.S. politics — and vice versa. The Anglo-American alliance, a bedrock of Western security, is supposed to transcend politics. Donald Trump’s reality-show-style emergence as Republican front-runner, however, is putting that notion to the test. Brits have watched his rise with a mixture of bemusement, alarm and indignation — the latter coming after he alleged that certain areas of London were off-limits to police because of rampant Islamic radicalization. [The world reacts to Trump’s proposed ban on Muslims entering the U.S.] The parliamentary debate was triggered when more than a half-million people signed an online petition arguing that Trump should be outlawed from visiting Britain because of his call last month to ban Muslims from entering the United States. Trump’s proposal, petitioners said, amounted to “hate speech.” For three hours Monday — beginning at 11:30 a.m. Eastern time — members of Parliament will have a chance to say whether they agree. But although Trump’s words have been widely condemned in Britain — from across the political spectrum — there is little chance he will be banned. Instead, he may well find himself invited for a visit. “I’d offer myself as a guide to take him around town,” said Paul Flynn, a member of Parliament from the center-left Labour Party. “I’d be delighted if he took me up on it.” Flynn has been designated to argue on behalf of the petitioners who want Trump banned — and Flynn said in an interview that he has sympathy for their cause. Trump’s remarks on Muslims, Mexicans, women and the disabled, Flynn said, “are outrageous.” But Flynn said he will ultimately argue against a ban. “The last thing we want to do is assist him by awarding him a garland of victimhood,” said the 80-year-old, who represents an immigrant-heavy area of Wales. “A ban is not going to achieve anything. It would be far better to test his claims.” The Muslim Council of Britain has taken a similar line, calling for Trump to name the no-go neighborhoods of London and saying it would be happy to “organize a multi-faith delegation to accompany Mr. Trump and tour these areas.” The group even promised to pay for Trump’s lunch. The British Home Office, which has the power to ban Trump, said in response to the petition that “coming to the U.K. is a privilege and not a right and [the Home Secretary] will continue to use the powers available to prevent from entering the U.K. those who seek to harm our society.” But the statement also said that “exclusion powers are very serious and are not used lightly.” Prime Minister David Cameron, meanwhile, has called Trump’s comment about Britain “divisive, stupid and wrong.” But the Conservative Party leader has suggested that the government won’t ban him — arguing instead that a visit from the bombastic billionaire would “unite us all against him.” In keeping with the theme, opposition leader Jeremy Corbyn told the BBC on Sunday that he would like to take Trump to visit a mosque in Corbyn's north London constituency. Despite Monday’s debate, Parliament doesn’t actually have the power to ban Trump. There won’t even be a vote. [Trump accused of throwing a tantrum over effort to ban him from the U.K.] But Trump, who is of Scottish heritage, has not taken kindly to the debate. He has threatened to withdraw $1 billion of planned investment in his Scottish golf courses if the government moves against him. A travel ban, the Trump Organization said in a statement, “would send a terrible message to the world that the United Kingdom opposes free speech and has no interest in attracting inward investment.” Some in Parliament, while not siding with Trump, have argued that the debate is frivolous. “The absurdity of Trump’s candidacy is matched only by the fact that he is set to be the subject of a debate in the House of Commons,” Jamie Reed, a Labour member of Parliament, wrote in a piece for Newsweek. “In the midst of so many domestic crises, this is a huge waste of U.K. taxpayers’ money.” But the idea has attracted support from several prominent members, as well as from independent groups such as British Future, a migration-focused think tank. The group has noted that radical Islamist preachers and ­anti-Muslim bloggers, including Pamela Geller and Robert Spencer, have been banned. “Trump’s statements are more extreme than theirs,” wrote British Future’s director, Sunder Katwala. Citing those cases, Scottish National Party lawmaker Tasmina Ahmed-Sheikh told the BBC on Monday that she would argue in favor of banning Trump. “What I will be doing today is asking that [Home Secretary] Theresa May exercise constancy in her approach to people who preach hatred,” she said. Flynn, the member of Parliament who will present the petitioners’ argument, said the difference between those cases and this one is that Trump “wants to be leader of the free world.” Selecting that leader, he said, is entirely up to U.S. voters. But if nothing else, he hopes that Monday’s debate offers a reminder: “It’s of huge consequence to the world who’s living in the White House.” Karla Adam contributed to this report. Read more The big thing missing from Europe’s solution to the refugee crisis? Refugees A British exit could be just the start of Europe’s unraveling in 2016 Even Europe’s humanitarian superpower is turning its back on refugees Today’s coverage from Post correspondents around the world
{ "pile_set_name": "OpenWebText2" }
[Sequential changes of various parameters of arterial blood samples]. Since the values of various parameters in arterial blood samples changes with time, they should be measured without delay. There are some situations, however, where it is quite difficult to carry out the measurement immediately. In this study, we aim to obtain a series of parameters by which we can estimate true values from stale blood samples. Arterial blood gases (PaCO2, PaO2, pH), electrolytes, blood sugar and lactate were measured at 0 min, 30 min, 60 min after collecting the samples. Cytometry was done at 0 min. We calculated proton ion concentration ([H+]) and oxygen content (CaO2). Relationships between the change of various parameters in arterial blood samples and the numbers of red blood cell (RBC), white blood cell (WBC) and platelet were analyzed using multiple regression analysis. The values of PaCO2, lactate and [H+] increased, and those of PaO2, blood sugar and CaO2 decreased with time. Electrolytes changed little. There were significant relationships between the number of RBC and the change of blood sugar, and between the number of WBC and the change of CaO2 value. From these result, we found a series of expression by which we can estimate appropriate values from stale blood samples.
{ "pile_set_name": "PubMed Abstracts" }
Resistance training affects GLUT-4 content in skeletal muscle of humans after 19 days of head-down bed rest. This study assessed the effects of inactivity on GLUT-4 content of human skeletal muscle and evaluated resistance training as a countermeasure to inactivity-related changes in GLUT-4 content in skeletal muscle. Nine young men participated in the study. For 19 days, four control subjects remained in a -6 degrees head-down tilt at all times throughout bed rest, except for showering every other day. Five training group subjects also remained at bed rest, except during resistance training once in the morning. The resistance training consisted of 30 isometric maximal voluntary contractions for 3 s each; leg-press exercise was used to recruit the extensor muscles of the ankle, knee, and hip. Pauses (3 s) were allowed between bouts of maximal contraction. Muscle biopsy samples were obtained from the lateral aspect of vastus lateralis (VL) muscle before and after the bed rest. GLUT-4 content in VL muscle of the control group was significantly decreased after bed rest (473 +/- 48 vs. 398 +/- 66 counts. min-1. microgram membrane protein-1, before and after bed rest, respectively), whereas GLUT-4 significantly increased in the training group with bed rest (510 +/- 158 vs. 663 +/- 189 counts. min-1. microgram membrane protein-1, before and after bed rest, respectively). The present study demonstrated that GLUT-4 in VL muscle decreased by approximately 16% after 19 days of bed rest, and isometric resistance training during bed rest induced a 30% increase above the value of GLUT-4 before bed rest.
{ "pile_set_name": "PubMed Abstracts" }
Friday, April 19, 2013 Swingin' in the Rain Things have gotten better since my last post. They might have gotten worse first though. That night I finally got Maggie to sleep, and left Amos to fall asleep on his own. A few minutes later, I heard Amos and MAGGIE playing! He woke her up. I sent him right to timeout. Where I left him. Until he fell asleep. Oops. It actually didn't take that long, which makes me conclude that I am right, they are tired, they just won't quit monkeying around. The next day we had another (and thankfully final) failed attempt at the park. It was sunny when we left our building, but by the time we got there, an arctic rain was falling. It wasn't the nice Seattle mist either, it was real rain. Not able to bear the thought of going back to the apartment without getting some energy out, we stayed and tried to play in it. It was freezing and we were all soaked. Luckily Amos came up with a way to make it more manageable: Since that day we have had three WONDERFUL days at the park. One day I even managed to get Wardie the teensiest bit of a sunburn. Yesterday Amos asked me if he could bring a bunch of paper airplanes to the park for his friends. Sure, why not? The minute we got to the park Amos ran up to a boy just his age and said, "Hi, will you be my friend?" while thrusting a paper airplane in his face. Awesome. The boy was playing with his dad, so he looked to him for approval, and when his dad nodded, the boys were off. They played and played. The boy had a baseball with him, and he and Amos found a stick and soon had their own little sandlot going. Inevitably, the ball hit Amos square in the face and he came running over with blood pouring out of his nose. We got him all cleaned up, assessed that there wasn't really any damage, and then he declared: "It's ok, we are still friends!" Sure enough. Thankfully, after that they switched to soccer. Eventually the boy had to go, and Amos spent the rest of our park time finding more friends to bestow his paper airplanes on. One thing I am noticing is that no one seems to come out if it's raining. My kids did not get that memo. (Arctic) rain or shine, they are ready to play.
{ "pile_set_name": "Pile-CC" }
White elfa Walk-In Pantry White elfa Walk-In Pantry Walk right in to your perfectly put-away pantry! elfa Ventilated Shelves and Shelf Baskets with Dividers make room for everything from canned goods to kitchen appliances - smooth-gliding Drawers with translucent liners and label holders offer storage space for linens, paper goods or recyclables. All elfa components are adjustable, so the solution is completely flexible! This solution is designed for a 6' x 4' space. If this won't work for you, please contact us so we can design the perfect solution for you with our free service! See more product details below. elfa Walk-In Pantry White Standard Shipping Only Items Some items can only be shipped via standard shipping due to their big and bulky nature, or because they are federally regulated and prohibited from being shipped on an airplane. Additional Shipping Fees Extremely heavy items or those that are big and bulky require additional fees to cover the expense of shipping. Do It Yourself:$1,326.86 eareg $1,414.86 Installed:$1,680.58 eareg $1,768.58 ea Installation is not available This is an estimated price of your elfa solution plus our Installation Service. This service is available in the markets where our stores are located. Enter your zip code to see if Installation Service is available near you. The installation fee will not be reflected in your shopping cart. You'll receive more details about this service after checkout. Select Wish List Select Registry Quantity Discount pantry I redid my pantry with elfa a few years ago it was the best solution. Before I had custom shelves from the builder of my home. Since elfa I have more space to store items and a full extra shelf . I had 5 and now I have 6 levels. March 3, 2010 Platinum Pantry We had used Elfa systems in the past for our closets in our bedrooms but never used them for our pantry. I always thought the look of more custom shelving or period inspired shelving would be more attractive. I couldn't have been more wrong! When designing our new home to have a large walk in pantry our budget was an issue and we couldn't swing the custom look. Knowing how much I liked the Elfa in our bedroom closets I decided to try it our in our pantry. I will never go back to custom again! The versatility and strength of these units are unparalleled. Quick and easy to install ourselves, but my husband is a contractor, and when friends see me waltz into my pantry they are beyond envious. Will only ever do Elfa from here out. March 4, 2010 Organization Heaven! We were in our first Container Store last weekend and was in Organization heaven! We came home and got online with one of your online experts and had a pantry designed and we picked it up and installed it the next weekend. We cannot say enough about how happy we are with the results. Your experts were so helpful and informative, the pickup process was a breeze, and the installation of the Elfa system was so easy! I cannot believe how much more usable space I have now. I am actually looking for more things to put in it now. We also bought some pull out systems for under our vanity and kitchen sink, and it is much easier to get to items now. My only wish is that a Container Store would come to my area now. But it was worth the 70 minute drive! February 1, 2011 Elfa Pantry I absolutely love, love my new pantry! We just built a walk-in pantry and decided to check out Elfa for the shelving. It was the best decision we ever made. It was so easy to design and my husband installed it himself. I love that I could add additional shelving and change out the type of shelf ie. regular to a basket shelf. February 1, 2011 Was this helpful?helpful0unhelpful0http://answers.containerstore.com/answers/1626/product/10023256/question/1800642/undohelpfulness.djs?format=embeddedhtml&sessionparams=__BVSESSIONPARAMS__&return=__RETURN__&innerreturn=http%3A%2F%2Fanswers.containerstore.com%2Fanswers%2F1626%2Fproduct%2F10023256%2Fquestions.djs%3Fformat%3Dembeddedhtml%26scrolltotop%3Dtrue%26expandquestion%3D1800642&user=__USERID__&authsourcetype=__AUTHTYPE__&submissionparams=__BVSUBMISSIONPARAMETERS__&submissionurl=__BVSUBMISSIONURL__ Answers Answer:Â The Elfa system is extremely versatile, and can work in a wide variety of shaped and sized spaces. We can create a variety of useful pantry spaces in the area you described. Please call us at 888-CONTAIN (888-266-8246) for a free custom design plan. Was this helpful?helpful0unhelpful0http://answers.containerstore.com/answers/1626/product/10023256/answer/1719843/undohelpfulness.djs?format=embeddedhtml&sessionparams=__BVSESSIONPARAMS__&return=__RETURN__&innerreturn=http%3A%2F%2Fanswers.containerstore.com%2Fanswers%2F1626%2Fproduct%2F10023256%2Fquestions.djs%3Fformat%3Dembeddedhtml%26scrolltotop%3Dtrue%26expandquestion%3D1800642%26expandanswer%3D1719843&user=__USERID__&authsourcetype=__AUTHTYPE__&submissionparams=__BVSUBMISSIONPARAMETERS__&submissionurl=__BVSUBMISSIONURL__
{ "pile_set_name": "Pile-CC" }
Description This artwork by Banksy is simply called Kissing Policemen, it has has now been boarded up and is no longer visible. This is a quality print of the original. The print is stretched over a thick wooden frame and delivered ready to go straight on the wall.
{ "pile_set_name": "Pile-CC" }
Available Options Pouch to mag. 1 SVD / carbine "Tiger" on fasteksy. Replaces Pouch to mag. SVD (mod.2). Compared with the old model pouch has been redesigned from the ground up and is more comfortable in the design Mounting: two built-in clip. For mounting on a classical system PALS / MOLLE need two cells wide and two horizontal rows of cells in height UniClick third-generation system, which replaced UniClick Plus Lightweight installation pouch - hidden pocket for the end of the bending tucked clips, unlike the system UniClick Plus clip does not rest in the pouch and cell platform that hosts the pouch Easy removal pouch - to bend the end of the clip has a convenient manners of tape for quick retrieval of clips from his pocket Corrected geometry - relative positioning of the clip horizontally corresponding cell PALS width of 37 mm instead of the old 35 mm, so that the pouch is mounted on the latest generation of platforms Fusion and foreign products without deformation Suitable for 8-round magazine Saiga-308 and Tiger 308 Pouch sewn entirely of two layers of fabric Cordura® 500d Fastens with fasteksy Duraflex®, the parent part is mounted on the front wall of the pouch. Fitting fasteksy strengthened from within the second layer of fabric. Fasteksy unbuttoned silent, easy to handle In the front wall of the pocket between two layers of fabric sewn Cordura® 500d piece of plastic. It supports form a pocket, making it easy insertion and removal of the shop From the main compartment pouch looks at least 2.5 cm in height shop SVD, which is convenient for removal Dimensions are spacious enough for easy insertion and extraction of shops, including the option of placing the lid down The special shape of the valve pouch contents are protected against ingress of water and dirt. When the valve is easily tilted without hindering recovery Store All tissue sections and lines are hidden under seams or edged for reliability and neat appearance
{ "pile_set_name": "Pile-CC" }
Alpha-benzoin oxime in higher oxidation state 3d metal cluster chemistry: structural and magnetic study of a new Mn(III)(9) complex. The initial employment of alpha-benzoin oxime (bzoxH(2)) in higher oxidation state 3d metal cluster chemistry has provided access to a new enneanuclear Mn(III) complex with an unprecedented metal-core topology consisting of two triangular [Mn(3)(mu(3)-Omicron(2-))(mu-OmicronNu)(3)](4+) fragments connected by a linear [Mn(3)(mu-OmicronNu)(6)](3+) unit. The Mn(III)(9) cluster is antiferromagnetically coupled and has an S = 3 spin ground state.
{ "pile_set_name": "PubMed Abstracts" }
Q: Could the Russian fleet go via northern route to Port Arthur instead of via Cape of Good Hope? Was there a route via the north of Russia that Admiral Rozhestvensky could have passed (maybe during the summer months) instead of the seven month odyssey of going through Cape of Good Hope around Africa and then through Indian Ocean and South China Sea to reach Vladivostok and eventually Port Arthur. A: Absolutely no. The first time when the North-East passage was made in one navigation (that is in less that one year) was in 1932 using icebreakers. And this was just an experimental expedition. In 1905 Russia had no enough icebreakers of sufficient power, not even mentioning other difficulties, like coaling stations on the way.
{ "pile_set_name": "StackExchange" }