content
stringlengths 7
2.61M
|
---|
//! Parallel iterator types for [ranges][std::range],
//! the type for values created by `a..b` expressions
//!
//! You will rarely need to interact with this module directly unless you have
//! need to name one of the iterator types.
//!
//! ```
//! use rayon::prelude::*;
//!
//! let r = (0..100u64).into_par_iter()
//! .sum();
//!
//! // compare result with sequential calculation
//! assert_eq!((0..100).sum::<u64>(), r);
//! ```
//!
//! [std::range]: https://doc.rust-lang.org/core/ops/struct.Range.html
use std::prelude::v1::*;
use crate::iter::plumbing::*;
use crate::iter::*;
use std::char;
use std::ops::Range;
use std::usize;
/// Parallel iterator over a range, implemented for all integer types.
///
/// **Note:** The `zip` operation requires `IndexedParallelIterator`
/// which is not implemented for `u64`, `i64`, `u128`, or `i128`.
///
/// ```
/// use rayon::prelude::*;
///
/// let p = (0..25usize).into_par_iter()
/// .zip(0..25usize)
/// .filter(|&(x, y)| x % 5 == 0 || y % 5 == 0)
/// .map(|(x, y)| x * y)
/// .sum::<usize>();
///
/// let s = (0..25usize).zip(0..25)
/// .filter(|&(x, y)| x % 5 == 0 || y % 5 == 0)
/// .map(|(x, y)| x * y)
/// .sum();
///
/// assert_eq!(p, s);
/// ```
#[derive(Debug, Clone)]
pub struct Iter<T> {
range: Range<T>,
}
impl<T> IntoParallelIterator for Range<T>
where
Iter<T>: ParallelIterator,
{
type Item = <Iter<T> as ParallelIterator>::Item;
type Iter = Iter<T>;
fn into_par_iter(self) -> Self::Iter {
Iter { range: self }
}
}
struct IterProducer<T> {
range: Range<T>,
}
impl<T> IntoIterator for IterProducer<T>
where
Range<T>: Iterator,
{
type Item = <Range<T> as Iterator>::Item;
type IntoIter = Range<T>;
fn into_iter(self) -> Self::IntoIter {
self.range
}
}
macro_rules! indexed_range_impl {
( $t:ty ) => {
impl ParallelIterator for Iter<$t> {
type Item = $t;
fn drive_unindexed<C>(self, consumer: C) -> C::Result
where
C: UnindexedConsumer<Self::Item>,
{
bridge(self, consumer)
}
fn opt_len(&self) -> Option<usize> {
Some(self.len())
}
}
impl IndexedParallelIterator for Iter<$t> {
fn drive<C>(self, consumer: C) -> C::Result
where
C: Consumer<Self::Item>,
{
bridge(self, consumer)
}
fn len(&self) -> usize {
self.range.len()
}
fn with_producer<CB>(self, callback: CB) -> CB::Output
where
CB: ProducerCallback<Self::Item>,
{
callback.callback(IterProducer { range: self.range })
}
}
impl Producer for IterProducer<$t> {
type Item = <Range<$t> as Iterator>::Item;
type IntoIter = Range<$t>;
fn into_iter(self) -> Self::IntoIter {
self.range
}
fn split_at(self, index: usize) -> (Self, Self) {
assert!(index <= self.range.len());
// For signed $t, the length and requested index could be greater than $t::MAX, and
// then `index as $t` could wrap to negative, so wrapping_add is necessary.
let mid = self.range.start.wrapping_add(index as $t);
let left = self.range.start..mid;
let right = mid..self.range.end;
(IterProducer { range: left }, IterProducer { range: right })
}
}
};
}
trait UnindexedRangeLen<L> {
fn len(&self) -> L;
}
macro_rules! unindexed_range_impl {
( $t:ty, $len_t:ty ) => {
impl UnindexedRangeLen<$len_t> for Range<$t> {
fn len(&self) -> $len_t {
let &Range { start, end } = self;
if end > start {
end.wrapping_sub(start) as $len_t
} else {
0
}
}
}
impl ParallelIterator for Iter<$t> {
type Item = $t;
fn drive_unindexed<C>(self, consumer: C) -> C::Result
where
C: UnindexedConsumer<Self::Item>,
{
#[inline]
fn offset(start: $t) -> impl Fn(usize) -> $t {
move |i| start.wrapping_add(i as $t)
}
if let Some(len) = self.opt_len() {
// Drive this in indexed mode for better `collect`.
(0..len)
.into_par_iter()
.map(offset(self.range.start))
.drive(consumer)
} else {
bridge_unindexed(IterProducer { range: self.range }, consumer)
}
}
fn opt_len(&self) -> Option<usize> {
let len = self.range.len();
if len <= usize::MAX as $len_t {
Some(len as usize)
} else {
None
}
}
}
impl UnindexedProducer for IterProducer<$t> {
type Item = $t;
fn split(mut self) -> (Self, Option<Self>) {
let index = self.range.len() / 2;
if index > 0 {
let mid = self.range.start.wrapping_add(index as $t);
let right = mid..self.range.end;
self.range.end = mid;
(self, Some(IterProducer { range: right }))
} else {
(self, None)
}
}
fn fold_with<F>(self, folder: F) -> F
where
F: Folder<Self::Item>,
{
folder.consume_iter(self)
}
}
};
}
// all Range<T> with ExactSizeIterator
indexed_range_impl! {u8}
indexed_range_impl! {u16}
indexed_range_impl! {u32}
indexed_range_impl! {usize}
indexed_range_impl! {i8}
indexed_range_impl! {i16}
indexed_range_impl! {i32}
indexed_range_impl! {isize}
// other Range<T> with just Iterator
unindexed_range_impl! {u64, u64}
unindexed_range_impl! {i64, u64}
unindexed_range_impl! {u128, u128}
unindexed_range_impl! {i128, u128}
// char is special because of the surrogate range hole
macro_rules! convert_char {
( $self:ident . $method:ident ( $( $arg:expr ),* ) ) => {{
let start = $self.range.start as u32;
let end = $self.range.end as u32;
if start < 0xD800 && 0xE000 < end {
// chain the before and after surrogate range fragments
(start..0xD800)
.into_par_iter()
.chain(0xE000..end)
.map(|codepoint| unsafe { char::from_u32_unchecked(codepoint) })
.$method($( $arg ),*)
} else {
// no surrogate range to worry about
(start..end)
.into_par_iter()
.map(|codepoint| unsafe { char::from_u32_unchecked(codepoint) })
.$method($( $arg ),*)
}
}};
}
impl ParallelIterator for Iter<char> {
type Item = char;
fn drive_unindexed<C>(self, consumer: C) -> C::Result
where
C: UnindexedConsumer<Self::Item>,
{
convert_char!(self.drive(consumer))
}
fn opt_len(&self) -> Option<usize> {
Some(self.len())
}
}
impl IndexedParallelIterator for Iter<char> {
// Split at the surrogate range first if we're allowed to
fn drive<C>(self, consumer: C) -> C::Result
where
C: Consumer<Self::Item>,
{
convert_char!(self.drive(consumer))
}
fn len(&self) -> usize {
// Taken from <char as Step>::steps_between
let start = self.range.start as u32;
let end = self.range.end as u32;
if start < end {
let mut count = end - start;
if start < 0xD800 && 0xE000 <= end {
count -= 0x800
}
count as usize
} else {
0
}
}
fn with_producer<CB>(self, callback: CB) -> CB::Output
where
CB: ProducerCallback<Self::Item>,
{
convert_char!(self.with_producer(callback))
}
}
#[test]
fn check_range_split_at_overflow() {
// Note, this split index overflows i8!
let producer = IterProducer { range: -100i8..100 };
let (left, right) = producer.split_at(150);
let r1: i32 = left.range.map(i32::from).sum();
let r2: i32 = right.range.map(i32::from).sum();
assert_eq!(r1 + r2, -100);
}
#[test]
fn test_i128_len_doesnt_overflow() {
use std::{i128, u128};
// Using parse because some versions of rust don't allow long literals
let octillion: i128 = "1000000000000000000000000000".parse().unwrap();
let producer = IterProducer {
range: 0..octillion,
};
assert_eq!(octillion as u128, producer.range.len());
assert_eq!(octillion as u128, (0..octillion).len());
assert_eq!(2 * octillion as u128, (-octillion..octillion).len());
assert_eq!(u128::MAX, (i128::MIN..i128::MAX).len());
}
#[test]
fn test_u64_opt_len() {
use std::{u64, usize};
assert_eq!(Some(100), (0..100u64).into_par_iter().opt_len());
assert_eq!(
Some(usize::MAX),
(0..usize::MAX as u64).into_par_iter().opt_len()
);
if (usize::MAX as u64) < u64::MAX {
assert_eq!(
None,
(0..(usize::MAX as u64).wrapping_add(1))
.into_par_iter()
.opt_len()
);
assert_eq!(None, (0..u64::MAX).into_par_iter().opt_len());
}
}
#[test]
fn test_u128_opt_len() {
use std::{u128, usize};
assert_eq!(Some(100), (0..100u128).into_par_iter().opt_len());
assert_eq!(
Some(usize::MAX),
(0..usize::MAX as u128).into_par_iter().opt_len()
);
assert_eq!(None, (0..1 + usize::MAX as u128).into_par_iter().opt_len());
assert_eq!(None, (0..u128::MAX).into_par_iter().opt_len());
}
// `usize as i64` can overflow, so make sure to wrap it appropriately
// when using the `opt_len` "indexed" mode.
#[test]
#[cfg(target_pointer_width = "64")]
fn test_usize_i64_overflow() {
use crate::ThreadPoolBuilder;
use std::i64;
let iter = (-2..i64::MAX).into_par_iter();
assert_eq!(iter.opt_len(), Some(i64::MAX as usize + 2));
// always run with multiple threads to split into, or this will take forever...
let pool = ThreadPoolBuilder::new().num_threads(8).build().unwrap();
pool.install(|| assert_eq!(iter.find_last(|_| true), Some(i64::MAX - 1)));
}
|
<reponame>wise-team/wise-hub
import * as BluebirdPromise from "bluebird";
import * as fs from "fs";
import { Vault } from "../lib/vault/Vault";
import { Log } from "./Log";
export class AppRole {
public static async login(vault: Vault, requiredPolicies: string[]) {
try {
Log.log().debug("Performing Vault login. Vault status=" + JSON.stringify(await vault.getStatus()));
const roleName = process.env.VAULT_APPROLE_NAME;
if (!roleName) throw new Error("/lib/AppRole: Env VAULT_APPROLE_NAME is missing");
const idFile = process.env.VAULT_APPROLE_ID_FILE;
if (!idFile) throw new Error("/lib/AppRole: Env VAULT_APPROLE_ID_FILE is missing");
const secretFile = process.env.VAULT_APPROLE_SECRET_FILE;
if (!secretFile) throw new Error("/lib/AppRole: Env VAULT_APPROLE_SECRET_FILE is missing");
if (!fs.existsSync(idFile)) throw new Error("/lib/AppRole: file " + idFile + " does not exist");
if (!fs.existsSync(secretFile)) throw new Error("/lib/AppRole: file " + secretFile + " does not exist");
const id = fs.readFileSync(idFile, "UTF-8");
const secret = fs.readFileSync(secretFile, "UTF-8");
await vault.appRoleLogin(roleName, requiredPolicies, id, secret);
} catch (error) {
Log.log().error("Error during AppRole login: " + error + ". Waiting 20s before next login attempt.", {
response: (error as any).response,
});
await BluebirdPromise.delay(20 * 1000);
// try again
await AppRole.login(vault, requiredPolicies);
}
}
}
|
The presence of water in small quantities in gaseous hydrocarbons is harmful to industrial processes and the monitoring of moisture content is necessary to assure proper results. The aluminum oxide hygrometer is very good for measuring very low levels of moisture in gases and some liquids if the sample is not harmful toward aluminum or aluminum oxide. The P.sub.2 O.sub.5 hygrometer is somewhat less sensitive but very useful for many more harmful gas samples encountered in chemical plants. However, some samples are disruptive of the P.sub.2 O.sub.5 hygrometer. HCl in concentration above 1% gives a background reading because the HCl is partially electrolyzed. For such samples that contain very low ranges of moisture, the signal from the P.sub.2 O.sub.5 hygrometer is low and subject to considerable uncertainty. The levels of moisture which are of concern generally are in the range of 2 to 50 parts per million (ppm).
U.S. Pat. No. 3,257,609 discloses the use of an adsorption column to selectively separate and accumulate moisture from gaseous hydrocarbon samples followed by desorption and analysis with a hygrometer. U.S. Pat. No. 3,257,609 specifically teaches the use of polyethylene and propropylene glycols on Chromosorb (an agglomerated diatomaceous earth) to adsorb moisture from a process sample. Desorption is accomplished by passing an electrical current through the column to raise the temperature.
U.S. Pat. Nos. 3,263,493 and 3,335,367 disclose the use of gas chromatography columns to separate moisture from gaseous hydrocarbon samples prior to the analysis of the moisture laden fraction with a hygrometer. The hygrometer is conditioned with dry carrier gas when the moisture laden fraction of the sample is not exiting the column.
The use of chromatography columns to accumulate a volume of sample requires knowledge of the flow through the accumulator during the load interval. Thus, sample flow rate and load time must be controlled.
|
<filename>app/src/main/java/project/java/tbusdriver/Service/NotificationIDService.java
package project.java.tbusdriver.Service;
import android.os.AsyncTask;
import android.util.Log;
import com.google.firebase.iid.FirebaseInstanceId;
import com.google.firebase.iid.FirebaseInstanceIdService;
import org.json.JSONObject;
import java.util.HashMap;
import java.util.Map;
import project.java.tbusdriver.Const;
import static project.java.tbusdriver.usefulFunctions.POST;
public class NotificationIDService extends FirebaseInstanceIdService {
private static final String TAG = "MyFirebaseIIDService";
/**
* Called if InstanceID token is updated. This may occur if the security of
* the previous token had been compromised. Note that this is called when the InstanceID token
* is initially generated so this is where you would retrieve the token.
*/
// [START refresh_token]
@Override
public void onTokenRefresh() {
// Get updated InstanceID token.
String refreshedToken = FirebaseInstanceId.getInstance().getToken();
Log.d(TAG, "Refreshed token: " + refreshedToken);
// If you want to send messages to this application instance or
// manage this apps subscriptions on the server side, send the
// Instance ID token to your app server.
sendRegistrationToServer(refreshedToken);
}
// [END refresh_token]
/**
* Persist token to third-party servers.
* <p>
* Modify this method to associate the user's FCM InstanceID token with any server-side account
* maintained by your application.
*
* @param token The new token.
*/
private void sendRegistrationToServer(String token) {
new NotificationIDService.SendNotficationToken().execute(token);
}
class SendNotficationToken extends AsyncTask<String, String, String> {
@Override
protected String doInBackground(String... params) {
//user[0]=Phone user[1]=User Name
String toReturn = "";
try {
Log.d(TAG, "Refreshed token: " + params[0]);
} catch (Exception e) {
Log.d(TAG, "error: ");
}
try {
Map<String, Object> parameters = new HashMap<String, Object>();
try {
parameters.put("token", params[0]);
} catch (Exception e) {
int x = 5;
}
parameters.put("device", "android");
toReturn = POST(Const.NOTIFICATION_TOKEN_URI.toString(), parameters);
String httpResult = new JSONObject(toReturn).getString("user");
if (!httpResult.equalsIgnoreCase("")) {
//listDsManager.updateAvailableRides(toReturn);
publishProgress("");
toReturn = "";
} else {
publishProgress("something get wrong " + toReturn);
}
} catch (Exception e) {
publishProgress(e.getMessage());
}
return toReturn;
}
@Override
protected void onPostExecute(String result) {
if (result.equals("")) {
//every thing is okay
//mListener.onFragmentInteraction("");
}
}
@Override
protected void onPreExecute() {
}
@Override
protected void onProgressUpdate(String... values) {
//user[0]=Phone user[1]=User Name
//check if have any error
if (values[0].length() > 1) {
//showAlert(,values[0]);
} else {
//mCallBack.OnLoginFragmentInteractionListener(1);
}
}
}
}
|
The AFL has admitted the decision not to review Jeff Garlett's controversial disallowed goal in Friday night's Essendon-Carlton thriller at the MCG was an error.The Bombers came from 31 points down to snatch a memorable five-point win against the Blues But the first-quarter incident was a major talking point in the immediate aftermath of the game, on the back of some contentious decisions involving the review system this season.AFL spokesman Patrick Keane toldfootball operations boss Mark Evans had spoken with the goal umpire involved and, after doing so, had determined the his decision was a mistake."The goal umpire was convinced in his own mind that it was a behind," Keane said."But from our point of view there was enough doubt there to call for a review."While the goal umpire may have been certain in his view, the footage clearly showed the ball coming off Garlett's boot."The goal umpire completely believed it was a point, whether the mark was dropped or over the line or whatever, so he was certain in his decision."As the vision shows in the end, it was an error."The fact the umpires did not call play back to check whether the decision was correct, was due to Essendon immediately bringing the ball back in to play.Under AFL rules, a review cannot be called for once play has resumed."If any other umpire is aware it is an error, they can stop the game, if play hasn't restarted," Keane said.The umpires upstairs can also communicate with the umpires on the field to tell them to stop the play so the replays can be looked at.But in this case, Essendon defender Dustin Fletcher immediately re-introduced the ball back in to play from the kick-out - with replays only being made available 20 or 30 seconds after the incident.Garlett did not protest the decision, suggesting he was not sure himself.Carlton coach Mick Malthouse said after the game if the review is available to the umpires, then it should be used."That decision, I don't know who calls for that decision. It's either a mark or a goal, the way I see it. It can't be a point so I guess when you've got that (review) availability you should use it," Malthouse said.
|
A group of law graduates calling themselves the Concerned LLB Graduates are going to court to seek an injunction to halt the upcoming entrance exams for potential students of the Ghana School of Law.
This comes after the General Legal Council declared that it would hold the exams for the prospective students despite a petition by the group to scrap it. The group petitioned the General Legal Council to facilitate automatic admissions into the Law School by scraping this year’s entrance exams slated for July 14, 2017, saying that it will amount to an illegality if the Council held such exams after the Supreme Court judgment on the matter.
He described as disappointing the Council’s decision not to honour their petition but said the group was resolute in ensuring that the “illegality” is not perpetuated. Godfred Tessu also urged calm among prospecting Ghana School of Law students.
The Supreme Court on June 22, 2017 declared as unconstitutional the entrance exams and interview session before admitting new students into the Ghana Law School.
According to the court, in a case brought before it by Professor Kwaku Asare, a United States-based Ghanaian lawyer, in 2015, the requirements were in violation of the Legislative Instrument 1296 which gives direction for the mode of admission.
The Justices in delivering their judgment, also indicated that their order should not take retrospective effect, but should be implemented in six months, when admissions for the 2018 academic year begins.
|
The conservation of heritage buildings is of major importance for preserving the scientific, ethnographic and artistic values of past cultures. Conservation and restoration works in these types of buildings are often focused on aesthetic aspects or on solving specific problems. In earthquake-prone areas, the character of the intervention is not the same and detailed structural analysis studies using up-to-date experimental and numerical techniques are of extreme importance. Two case studies will be presented aiming at showing the seismic assessment of earthen structures. The first one deals with the first round of on-site investigations and numerical analysis applied to the archaeological complex of Huaca de la Luna, an emblematic and massive adobe construction located in Trujillo, a northern city of Peru (built from 100 AD to 650 AD). The second one is related to the structural modeling and the seismic assessment of the Andahuaylillas church, a 17th Century church located in Cusco, Andes of Peru. The research in this case is based on in-situ tests and subsequent numerical modeling for evaluating the overall response of the church.
|
Facial palsy after glomus tumour embolization Abstract A case is presented of a patient undergoing pre-operative embolization of a glomus tumour who developed a facial palsy one hour after embolization. At the time of surgery it was found to be due to the embolization material (polyvinyl alcohol foam) blocking the stylomastoid artery. The blood supply of glomus tumours and the variations in the blood supply of the facial nerve are discussed.
|
WOLF BLITZER, CNN HOST: That's it for this LATE EDITION. And remember, "Iraq: A Week at War" coming up. Let's go to Fredricka Whitfield for a quick check of what's in the news right now first.
FREDRICKA WHITFIELD, CNN ANCHOR: Thank you, Wolf. Hello, I'm Fredricka Whitfield at the CNN Center in Atlanta.
Now in the news, kidnapped and now killed, an al Qaeda-linked group says it has executed four Russian diplomats. The men were abducted three weeks ago on a Baghdad street. In a Web site statement, insurgents said they beheaded three of the men and shot one to death. That claim was accompanied by a graphic video.
Two U.S. soldiers in Iraq face a possible court-martial. They're charged in the shooting death of an unarmed Iraqi civilian near Ramadi in February. Both are also charged with obstructing justice for allegedly trying to make it appear the victim was an insurgent planning an attack.
The "New York Times" says there could be sharp reductions in U.S. troop levels in Iraq by the end of the year. It says the first cuts could come in September. About 7,000 troops would rotate out of the country without being replaced, and more would follow if the insurgency tapers off. One-hundred twenty-seven thousands American troops are currently serving in Iraq.
More headlines in 30 minutes. Now to "Iraq: A Week at War" with John Roberts.
JOHN ROBERTS, CNN CORRESPONDENT: I'm John Roberts. This is "Iraq: A Week at War." Let's take a look at what our correspondents reported day by day.
Monday the bodies of two missing two U.S. soldiers were found. Tuesday, Japan announces its troops will return home from Iraq. Wednesday, insurgents killed one of Saddam Hussein's defense attorneys. Thursday U.S. senators debate and reject a withdrawal date for U.S. troops. Friday, Miami terror suspects in court and new fears of homegrown groups imitating al Qaeda and the threat this week of a North Korean missile launch. This is "Iraq: A Week at War."
In Dallas correspondent Ed Lavandera, in Chicago CNN's military analyst, retired U.S. Army Brigadier General David Grange and here in Washington, senior Pentagon correspondent Jamie McIntyre. This was a week where the vulnerability of U.S. forces was brought into sharp focus. Two young soldiers kidnapped as they manned a checkpoint south of Baghdad. Tuesday, word that their bodies had been recovered.
MAJ. GEN. WILLIAM CALDWELL, SPOKESMAN, MULTINATIONAL FORCE, IRAQ: The bodies of those two soldiers did show signs of severe trauma, that the nature of this anti-Iraqi force element we're facing is one of a brutal nature.
JAMIE MCINTYRE, CNN SR. PENTAGON CORRESPONDENT: The bodies were found at 7:30 at night, so that means that this was all done during the day. At a time when there were spy planes were overhead and an intense search going on.
What we were told it was it was also in a very isolated area near a power plant where there was a lot of debris on the ground, places where people could hide and where they could hide bombs. And we were told there were as many as 20 bombs.
And what they did was they brought ordnance deposal people in to work through the night to clear all those bombs without anybody being hurt and recover the bodies by dawn the next day.
ROBERTS: Genral Grange, they had gone out with a group of humvees, but according to the military on the bridge at Yusufiyah, at that checkpoint there was only one humvee and these three soldiers. Were they stretched too thin? Were they spread too thin?
MCINTYRE: Well, they were vulnerable at that time, obviously, with one vehicle. I've experienced that in my career where a vehicle was attacked. We had three soldiers actually taken prison in Macedonia in a single humvee.
So why they were split up, in this case I don't know. Usually they work at least in pairs. There may have been a deception by the enemy that caused them to break contact with the main force. I don't know.
ROBERTS: Question still to be answered by the military. Two more troops killed in Iraq and two more families here at home coping with terrible grief. On Tuesday Ed Lavandera talked with the families.
(BEGIN VIDEO CLIP) ED LAVANDERA, CNN CORRESPONDENT (voice-over): The details of army Private First Class Kristian Menchaca and Thomas Tucker's last moments alive are so horrifying, Menchacha's family could not restrain their anger for the killers.
MARIO VASQUEZ, UNCLE OF PFC MENCHACA: Make them pay for what they did. Don't think it's just two more soldiers. Don't negotiate anything.
ROBERTS: Ed Lavendera, that's the thing you would expect to hear from a parent but not the sort of thing that you'll always from the parent of a service man or woman who is killed in Iraq. Obviously, the emotions worn very much on their sleeves.
LAVENDERA: Well, they knew from the onset as soon as they got the word Kristian Menchaca was one of the ones missing, I think the family just had bad vibes all weekend long. There was no point where I think this family thought there was going to be a good outcome to this story.
ROBERTS: General Grange, has does something like this affect morale in the military?
BRIG. GEN. DAVID GRANGE, U.S. ARMY (RET): I tell you, emotions are running high. Revenge runs through the veins of the soldiers that are in this unit, the 101st Airborne Division unit. Though we hold ourselves to a very high standards and will not break the rule of land warfare in regards to this situation, my feeling is that they will get those guys that did it. They'll be taken out.
ROBERTS: Certainly that's something that Kristian Menchaca's family would like to see. Ed Lavendera what struck you the most about the time you spent down there in Houston with Menchaca's family?
LAVENDERA: I was really struck by how this family -- first of all, this young man had spent less than a year, essentially, in the army, and they had last seen him at the end of April, early May when he had come back for a brief vacation. I was struck and touched by the way this family talked about how this young man had changed in the last year of his life. His uncle said to me that they had seen him join the army as a boy, and when they saw him a month and a half ago, he had came back as a man acting much differently. It was fascinating to hear them talk about that evolution of this young man.
ROBERTS: Jamie McIntyre, anytime anyone goes to war, there's always the chance that they are not going to come back. We even faced that when we went in with the invasion in the imbeds. But something about the way these two soldiers died really strikes a very raw nerve.
LAVENDERA: Of course, they died at the hands of terrorists. They were brutally murdered, and of course the point of terrorism is to terrorize people. They're trying to show that they still have the ability to inflict these kind of casualties, and it's part of the brutal warfare the U.S. is up against. ROBERTS: General Grange you were on a hostage rescue team for a while. Tell me some personal stories about when a serviceman or woman is taken hostage, what's the response like?
LAVENDERA: The response is immediate. The key time is the first 24 to 48 hours to do some type of response to try to seal the area, to begin searching right away, gathering intelligence, first hand intelligence. And drills are in place right now in Iraq, they've been in place for when one of these types of situations happens, it really does surprise me of the report of where they found the bodies, the time that the enemy had to booby trap the bodies.
I mean, it sounds like Vietnam. It sounds like Somalia. It's one of those types of brutal undertaking, and I'm truly surprised they weren't found in that area, but I can assure you that immediate response was put in place.
ROBERTS: I tell you, it touches a nerve in anyone who is following this story, and certainly hits the families really, really hard. Fighting back tears, the family of Privatre Thomas Tucker tries to put their grief, their loss, into words.
TAVYA TUCKER, SISTER OF PFC TOM TUCKER: He was into everything. I mean, he played tons of music and instruments, and he was into motorcycles. He was a grease monkey, and I mean in my eyes, my brother knew how to do everything.
WES TUCKER, FATHER OF PFC TOM TUCKER: He was always wants to have fun. He didn't like down things, things that was going to make somebody sad. He did not like it.
MEG TUCKER, MOTHER OF PFC TOM TUCKER: When he called home, he always kept it sugar and nice for me, because he knew I'd be scared to death. But he told his dad everything. Every time he called I knew it was him, because he'd say I love you mama.
TOM TUCKER, DIED IN IRAQ (on phone): I love you, mama. I love you too, dad.
M. TUCKER: I was supposed to just believe he was on this long vacation.
TOM TUCKER: I'm going for vacation, and I'll be back before you know it.
M. TUCKER: When I was feeling, you know, like I wanted to hold him or hug him or something, I would just go push the button and listen to him.
TOM TUCKER: I'm going to be OK. Everything's going to be okay. I'm serving my country. Be proud of me. I love you guys. I'll talk to you later. Bye-bye.
(END VIDEOTAPE) ROBERTS: General Grange, as Jamie McIntyre was saying not only did these troops lose their lives in Iraq, which is a tragedy anytime it happens, but they were taken hostage and they were so brutally murdered. When a troop is taken hostage, is the response by the military almost more dramatic than if they had been killed?
GRANGE: Absolutely. I would say anytime you have a soldier missing in action, MIA or known PW, it's probably the most hard- hitting report that you receive. The enemy knows this, and the enemy like Jamie said earlier, psychologically, that's the prize, is to get a hostage.
In fact, I'm surprised that they were brutally murdered as quickly as they were and not held for a longer period of time, which tells me that probably coalition Iraqi forces were hot on their tail to some extent. They were getting scared about getting caught. The hardest part in this thing is for the military, is the commanders, the immediate sergeants and young officers in charge and then maybe even higher up the chain of command to report, to talk to the parents about what happened. Tough duty. Very tough duty.
ROBERTS: I can't imagine having that duty. Army Privates First Class Menchaca and Tucker were not the only U.S. deaths in the Yusafiyah checkpoint attack. A third soldier was killed at the site. He was Specialist David J. Babineau of Springfield, Massachusetts.
RONDI BABINEAU, WIFE OF SPC BABINEAU: He was a great person. He was a great dad. He was a very, very good father. So the kids are really going to miss out.
SAMANTHA BANINEAU, DAUGHTER OF SPC BABINEAU: He was nice, and I missed him. I loved him very much.
ROBERTS: Jamie McIntyre, did Specialist Babineaux's death kind of get lost in all of this.
MCINTYRE: As David Grange said, when there are people captured and there is a hostage is taken, that's where the focus is. But yeah, he did get lost a little bit. We're going to see I think his burial service at Arlington National Cemetery, and again, one of the three soldiers who were involved in this incident.
ROBERTS: Ed Lavandera, how would you sort of sum up this whole week? You were sort of close with the family.
LAVANDERA: We met them the day before they had gotten word that the bodies had been found, and it was really tough to see -- I've done so many interviews in the last couple of years with families who have lost loved ones. At some point a lot of people hold out hope that something good might happen, but this poor family knew from the onset that the hope and expectation of finding their loved one alive was minimal, as the brother said, basically I'm at the mercy of terrorists and I don't have a lot of faith in that. So they've been rocked hard this week.
ROBERTS: Boy, I tell you, it's just impossible not to be touched by this story. Ed Lavandera, thanks. Jamie and General Grange stay with us. Coming up, more violent days in Iraq and the impact on soldiers and civilians.
SPC TOBY BRACE, VERMONT NATIONAL GUARD: Everybody is so much bigger. Everybody has grown so much on me. It's been a difficult time.
ROBERTS: That Specialist Toby Brace talking about his two children who he hadn't seen in more than a year. He's one of 170 members of the Vermont National Guard that secured the battle-torn city of Ramadi. Not everyone made it back. Six of Brace's colleagues died in battle.
This is "Iraq: A Week at War". Joining me in Baghdad, correspondent Arwa Damon. In Ramadi, Iraq, senior international correspondent Nic Robertson, retired U.S. Army Brigadier General David Grange is in Chicago. And Jamie McIntyre joins me here in Washington.
This was a week of new violence in Iraq against both U.S. forces and Iraqis and a new push in Ramadi, capital of the Anbar Province west of Baghdad.
Nic talked to an Iraqi captain about how people there are wondering whether or not to flee. They are suspicious of both government forces and the insurgents. Here's that report from Tuesday.
UNIDENTIFIED MALE: People are confused, who to believe, the got government or the terrorists? Because they lose the trust for both, the terrorists and the government. They lose the trust. That's the main issue.
NIC ROBERTSON, CNN SR. INTERNATIONAL CORRESPONDENT: This is one of the checkpoints back into the city of Ramadi. Although the number of families leaving the city has dropped off significantly, Iraqi army officers here at least say so far they're not seeing any of those families coming back just yet.
ROBERTS: Nic Robertson, you spent the entire week in Ramadi. You've talked with people there. Do you have a sense that they believe that life is ever going to return to normal in Iraq, particularly in their part of Iraq. ROBERTSON: They certainly want it to. I think in Ramadi people really are wondering what is going to happen next. The violence cycles up, it cycles down. In the area we've been in, the troops have pushed in and set up a new checkpoint. Now the streets are very quiet. Most of the residents in this area staying indoors. Insurgent activity in this particular area has gone down. What's happened, it shifted over into the next military sector, the attacks are noticeably up, insurgent attacks noticeably up there.
So in one part of the city the population gets to breathe easy for a little while and in the other part of the city the attacks erupt. They're in greater danger again. So as far as Ramadi is concerned, the steps that has been taken with the security this week is a step in the right direction. But the population here really knows that the situation remains confusing, it remains dangerous, but they know what's happening, that the Iraqi army is coming in is really the only way that they are going to get their security back, John.
ROBERTS: But if they don't know whether or not to trust the Iraqi army, Nic, how do they live their lives day to day?
ROBERTSON: Very, very cautiously. They're in some areas of Ramadi and that's why these new outposts have been put in. They are under - they are awed by the insurgents. There's nothing they can do against the insurgents. The only way that they can -- that the situation will change is with the new Iraqi army checkpoints and the people building trust in the Iraqi army. That's up to the Iraqi army to behave in a manner and respond to insurgent attacks in a way that is not detrimental to the local population, that the local population are not caught in the crossfire, that they are not killed by the Iraqi army in mistaken shootings.
So it's how they react in the coming weeks that's going to determine whether or not the local population can put trust in them. This is a very slow situation to develop. It's a very slow evolution, but these steps are all necessary. That trust has broken down so fundamentally, John.
ROBERTS: Issues of trust with the Iraqi military and perhaps the U.S. military as well. Troops charged with killing, kidnapping and conspiracy. The military accuses seven marines and a sailor in the shooting death of an Iraqi civilian. Wednesday a Marine Corps officer deliver this is statement.
COL. STEWART NAVARRE, USMC: The Marine Corps takes allegations of wrongdoing by its members very seriously and is committed to thoroughly investigating such allegations. The Marine Corps also prides itself on holding its members accountable for their actions.
ROBERTS: Jamie McIntyre, a surprise that there were eight charges of premeditated murder here? MCINTYRE: Well, it's a surprising indent, but the military makes a point that a complaint came about -- from the complaint from local Iraqis that happened at the end of the April. They investigated it. In just over a month, they came back with charges. They put the seven marines and one navy corpsman involved pretrial confinement. They took it very seriously, they investigated it right away. And what they're saying is that this shows the U.S. has completely different standard the conduct than the brutal enemy it's fighting.
ROBERTS: General Grange, is it a surprise something like this alleged to have happened in an occupation that's lasted some three years now?
GRANGE: Well, if you think about the hundreds of thousands of soldiers and marines that have been in the country during this operation since April of 2003, you think about all the incidents that have happened here and there, good and bad. A couple that are brought to trial is really a low number.
Now that doesn't make an excuse for the actions that happened, if, in fact, they did, but the military is very good, I believe, from my experience, in following through on an incident to see if there is, in fact, guilt. It will be a very thorough process.
A bullet-ridden body, one of Saddam Hussein's lead attorneys is killed after being abducted by his home by men in police uniforms on Thursday. Kamizal Ubeidi (ph) becomes the third member of Saddam Hussein's defense team to be killed. Arwa Damon, how many more members of his defense team are left, and can his trial go forward?
ARWA DAMON, CNN CORRESPONDENT: Not too many, John. As you just mention, he was the third.
And when we spoke to the members of his defense team, and now a number of them actually reside outside of the country, he had chosen to stay in Iraq which he said that he loved so much.
But when we spoke to one of them, Dr. Najiv Nareimi (ph), who resides in Qatar, he is the former Qatar minister of justice, he was speechless when I called him on the phone. The fist words out of his mouth were, why are they doing this to us? We're so close to the end. Why are they doing this? What is the point?
And I actually asked him what the defense was going to do next, and he very openly just said I don't know. I honestly just don't know. I think at that point overwhelmed by -- overwhelmed with grief and with what he and his fellow defense lawyers were going through. But he did say that he believed that this was meant to be a message for the entire defense team, flat out saying do not come to Iraq, do not come to court on July 10th and do not present your closing arguments.
ROBERTS: Troop withdrawals were also in the news this week. Defense secretary Don Rumsfeld turned aside the latest questions about reducing the numbers of U.S. military personnel in Iraq Thursday in the Pentagon briefing room.
DONALD RUMSFELD, SECRETARY OF DEFENSE: As the Iraqi forces continue to take over bases and provinces and areas of responsibility and move into the lead, we expect that General Casey will come back and make a recommendation after he's had those discussions, which he has not yet had.
ROBERTS: Jamie McIntyre, do you think we are going to see any significant withdrawal of American troops in the near term? Next few months, before the end of the year?
MCINTYRE: I think before the end of the year. Won't be a withdrawal per se, and they won't tell troops you were supposed to stay here another month but you get to go home now. We'll know it's happening as soon as we see some of the units that were identified last year as rotating into Iraq this year, when they don't go, that's how the reductions are going to be accomplished.
ROBERTS: Right. Jamie McIntyre here in Washington, General Grange in Chicago and Nic Robertson in Ramadi. Thanks.
Arwa, we're going to get back with you in a couple of minutes, so stay with us.
When we come back, we're going to turn our attention to the home front where this week the face of terror was not that of a stranger but that a neighbor. But first a look at some of those who fell in this week at war.
ROBERTS: This week the FBI raided a warehouse in Miami and arrested seven men, accusing them of engaging in homegrown terrorism, part of a phenomenon that we have been referring to as al Qaeda 2.0. On Friday attorney general Alberto Gonzales described how the face of terror has changed.
ALBERTON GONZALES, ATTORNEY GENERAL: The convergence of globalization and technology has created a new brand of terrorism. Today terrorist threats may come from smaller, more loosely defined cells who are not affiliated with al Qaeda but who are inspired by a violent jihaddist message. And left unchecked, these homegrown terrorists may prove to be as dangerous as groups like al Qaeda.
ROBERTS: Joining us here in Washington, homeland security correspondent Jeanne Meserve and in our New York bureau, former assistant director of the FBI's New York office, Pat D'Amuro. He's chairman and CIA of Giuliani Security and Safety. Jeanne Meserve, you were the first correspondent to get a hold of the indictment. You spent a lot of time reading through it. It looks like this group of people, if what's alleged to have happened is true, were pretty committed to trying to carry out an act of terror in this country.
JEANNE MESERVE, CNN HOMELAND SECURY CORRESPONDENT: But it doesn't look like they got very far. They talked about this with this person they thought was a member of al Qaeda. They gave him a shopping list of things they wanted, that included things like machine guns, money and bullet proof vests. And they got cameras and they went out and did surveillance. There's no indication they got their hands on explosives that they would have needed to carry out the plot.
How credible do you think the threat was, or if not how credible, how urgent do you think the threat was?
PAT D'AMURO, CNN SECURITY ANALYST: Well, I think the FBI and the Department of Justice made it very clear they dent have any explosive material, they did not have any weapons. There was no imminent threat. But this is clearly a situation where individuals conspired and talked about committing acts of terrorism against the citizens of the United States. That itself, proving material support, is a crime. The conspiracy to conduct these attacks is a crime. They are clear that they've pledged their allegiance to bin Laden, to al Qaeda and wanted to conduct these attacks.
ROBERTS: What does it say about the new face of al Qaeda? This group wasn't an al Qaeda group but it wanted to behave in the fashion of al Qaeda. Is it kind of like a big game of whack a mole, that you get them in one area and they pop up somewhere else?
D'AMURO: Well, this has been on the scope of FBI for some years now, these homegrown terrorists, the different types of organizations here that are affiliating themselves or identifying with bin Laden's cause, with the cause of Sunni extremism. So I think we're going to see more and more of these type cases in the future.
ROBERTS: Jeanne Meserve, some people have remarked that perhaps this group was a bunch of novices, as I had, al Qaeda wannabes that perhaps without this undercover agent who was pretending to be al Qaeda they would have been nowhere. But as we have seen before, with the case of Timothy McVeigh, novice homegrown terrorists can be extremely dangerous.
MESERVE: And what law enforcement officials were saying is that this investigation started after the leader of this group made a threat. He said he was going to stage an attack, and it's at that point that they put an informant in there and gathered more information. So if what they're saying is correct, they were initiating this.
ROBERTS: Pat D'Amuro, this sounds very similar to the case of the Lackawanna Six in which they had been accused of providing material support to al Qaeda. But there's a difference, though, isn't there, between the group that was arrested in Buffalo and this group?
D'AMURO: There is a difference. The group in Buffalo actually traveled to Afghanistan and participated in terrorism training. This particular group, from what we know now, did not travel overseas to affiliate itself with any of the al Qaeda camps.
ROBERTS: But it sounds like this is the sort of thing that we can expect to see, as you said, Pat, pop up again and again as this new face of al Qaeda makes it's presence known.
Pat D'Amuro in New York and Jeanne Meserve in Washington. Thanks.
When we come back, we'll turn from questions about fighting terror at home to a look at a week of increasing danger signs abroad.
But first, another moment in this week at war. On Monday near Saginaw, Michigan Company B, 125th Infantry of the Michigan National Guard came home to cheers, hugs and children. But it was a bittersweet homecoming. This unit served a tough year in the Sunni Triangle and six did not make it home alive. Sergeant Joshua Youmans was one of the fallen. But his wife Katie, his widow now, was there to honor his memory.
KATIE YOUMANS, HUSBAND DIED IN IRAQ: My husband never got to finish his deployment, so it falls on the fallen soldier's families to be here, show our support for these guys because our guys lived with them for so many months and they're part of their family, and their part of ours.
WHITFIELD: Hello, I'm Fredricka Whitfield at the CNN Center in Atlanta. Now in the news, in Iraq a group linked to al Qaeda says it has executed four Russian diplomats. That claim was made on a Web site used by insurgents. The Russian diplomats were kidnapped about three weeks ago after their vehicle was attacked on a Baghdad street. A fifth Russian diplomat was killed in that attack. I'm Fredricka Whitfield in Atlanta. Now back to "Iraq: A Week at War."
CONDOLEEZZA RICE, SECRETARY OF STATE: Well, it would be a very serious matter and indeed a provocative act should North Korea decide to launch that missile.
ROBERTS: Monday secretary of state Condoleezza Rice signaling Bush administration opposition to the threatened test of a North Korean missile that could reach parts of the United States. And it was a week of disagreement about just what North Korea was planning and why and what the U.S. could do about it.
Helping us on this, national security correspondent David Ensor and Pentagon correspondent Barbara Starr. Barbara, let's go to you first, Barbara. What could the United States do about this after a missile launch? I talked to one person in the NSC who said beyond a pretty strongly worded statement expressing our displeasure, not much.
BARBARA STARR, CNN SR. PENTAGON CORRESPONDENT: Well, you know, John, the first thing the U.S. military is going to try to figure out within seconds of a launch is whether it's an attack. Now, to be clear, nobody really thinks North Korea is about to attack, so they will look at the trajectory of the missile and try and determine what's going on.
If for some reason it does appear to be on an attack path towards the United States, the Pentagon has a limited missile defense capability. It has 11 interceptor missiles spaced out in Alaska and in California. They can always try and shoos it down. But at this point, nobody thinks it's an attack.
ROBERTS: David Ensor, does anybody believe this represents a real threat?
DAVID ENSOR, CNN NATIONAL SECURITY CORRESPONDENT: Well, it's not a good thing when a company you don't trust at all is launching missiles that could eventually reach the United States and might one day be equipped to carry a nuclear weapon. But U.S. intelligence says it doesn't think North Korea has that capability now by any means. It's something they watch, they worry about, but they're not getting hot under the collar.
ROBERTS: There have been calls from the Democratic side, people who used to work in the Department of Defense who said, you should have a cruise missile to take it out before it has a chance to get off the launch pad. That's not something that the administration would consider, is it?
ENSOR: I thought it was interesting to see Democrats saying that, and Vice President Cheney saying that would be going too far. We think we're on a better track with diplomacy. Sort of a contrast.
ROBERTS: Let's move across the map over to Afghanistan where it was a week of hard fighting and new U.S. casualties. Plus, a reminder that al Qaeda tries to be a moving target, changing, updating. Call it al Qaeda 2.0. Wednesday we saw a new video message from second of in command of al Qaeda, Ayman al Zawahiri, urging his supporters and university students to fight on. Barbara Starr, you just recently spent a lot of time of Afghanistan. The Taliban is resurgent there. Does Zawahiri perhaps have a sense that things could be reaching critical mass? All it needs is a kick from him?
STARR: I don't know if -- That might be what he'd like. Certainly the U.S and NATO has enough firepower to deal with any resurgence of the Taliban. But my sources are telling me this video is viewed again by them as an appeal by al Qaeda to try and reassert its influence in Afghanistan. Whether they are able to really do that, I think, remains very problematic.
ROBERTS: Of course, part of the way that the United States tries to intercept terrorism is to track them around the world, and one of the ways they do that is that they track the funding of terrorism operations. We learned something new about that. That the Treasury Department has been tapping into an international banking database. David Ensor, some controversy about this, but it seems to be quite different than the NSA eavesdropping scandal.
ENSOR: This is quite closely pinpointed. They have to have a name or account number to go in. I use the Swift system to send money to relatives overseas or receive it. So there are a lot of Americans that do, but it would have to be the name or account number. So it's not a big data mining operation according to U.S. officials.
ROBERTS: And Barbara Starr, when it comes to actually fighting terrorism, doesn't the Pentagon believe drying up their source of financing is one of the keys to get them out of business?
STARR: Absolutely, John. The expression you hear around here is the long war, the long war against terrorism is what you hear, and officials believe it's not going to be won with that firepower. It will be won across a broad range of activities. Financing is just one of them.
ROBERTS: Barbara Starr at the Pentagon and David Ensor here in the studio. Thanks.
We're going to turn back to Iraq and look at what's been accomplished this week. But first, another moment in this week of war. A bit of good news for the children in the town of Yusufiyah. The U.S army reported on Monday that coalition troops along with their Iraqi counterparts finished a month-long project and restored one of the city's playground. In appreciation, local kids presented the troops with gifts.
GOV. MARK SANFORD, SOUTH CAROLINA: Whether one agrees or disagrees with what's going on in Iraq, what absolutely stands out is how these South Carolinians when asked to do a job have done it remarkably is frankly the harshest of conditions.
ROBERTS: Big props from governors visiting the war zone. That was South Carolina's Mark Sanford praising his National Guard troops stationed around Tikrit. Sanford and his counterparts from Alaska and North Dakota were in Iraq this week saying thanks to the fighting men and women from their states who put their lives on the line every day.
Now for a check on this week's progress in Iraq. I'm joined here in Washington by Stuart Bowen. He's the special inspector general for Iraq reconstruction. And with us from Baghdad again, CNN's Arwa Damon. Let's start with you, Stuart.
You just recently got back from Iraq and you have been on the phone all week with your people over there. Give us an assessment of how you think things are going? And this is great because you have got to give us a realistic assessment because you're the inspector general.
STUART BOWEN, IRAQI RECONSTRUCTION INSPECTOR GENERAL: That's what we've done in every one of our nine reports. The last one which came out at the end of April, as it points out, is a mixed story. There are successes, significant progress in certain sectors and some challenges. They're driven primarily by two overlays, the security issues and corruption issue.
ROBERTS: What was the most significant thing that got done this week?
BOWEN: This week my staff was up visiting one of the provincial reconstruction teams. This is part of Secretary Rice's and Ambassador Khalilzad's initiative to build capacity at the local level in Iraq to ensure Iraqis can manage the next phase of the reconstruction problem. It's going to be a long process before the infrastructure is back.
ROBERTS: But they're kind of getting their act together?
ROBERTS: You said there is some progress on oil as well?
BOWEN: There has been progress. Over the last three weeks, we've seen oil production move from 2.1 million barrels per day to 2.4 million. The prewar standard was 2.5. That's the goal. So clearly the work in the oil sector is beginning to pay off.
ROBERTS: Arwa Damon, In Baghdad, you talk with rank and file Iraqis on a regular basis. Did they get a sense that things are progressing on the ground in terms of the reconstruction?
DAMON: That's a tough one, John. When you put that question to Iraqis here, actuallyt they kind of look at you and laugh, and not to detract from any of the reconstruction projects that have happened thus far. I just think right now they're happening on a smaller scale. For an average Iraqis living especially in an area like the capital, Baghdad or some of the more violent areas of the country, what they are seeing around them is all the destruction and the devastation that the isolated reconstruction projects, or renovation projects, be it schools for bigger projects, when they are actually happening, they're not really brought to anyone's attention or if they are they're not taking away from the daily hardships and the daily death and destruction they're seeing all the time.
ROBERTS: That's what we're trying to do is trying to bring it to people's attention albeit mostly in the United States. You said progress and oil, but electricity and water remain a problem?
BOWEN: They do. Water is difficult to measure because of inaccurate prewar numbers. Electricity, demand is enormous, and it's driven mostly by the subsidies that currently and still exist in Iraq. When those subsidies are gradually brought down and more electrical projects are brought on line, you will see more hours of electricity provided per day to the average Iraqi.
ROBERTS: We had a story here on CNN of you visiting a prison that was being built near Baghdad. And you seem to think things were going well. And then this past week we hear that the Pentagon has canceled the contract with the contractor saying they're cutting their losses here. The two things don't seem to add up.
BOWEN: Well, it's a good point. The fact is the work going on in Nasiriyah, which I visited three weeks ago in south central Iraq, is up to modern standards. But I raised when I visited there two significant issues, one why was it a year overdue? And two, why had the costs greatly outstripped the original budget. There was a third issue I was concerned about and that is it was supposed to be for 4,400 prisoners and was reduced down to 800. As a result of those issues, I think it was canceled.
ROBERTS: Are the contractors on the up and up for the most part, or is there still a lot of corruption there?
BOWEN: When I talk about corruption, I'm talking about within the Iraqi government. Corruption is not a pervasive component or issue within the current U.S. reconstruction program.
ROBERTS: Although it was at the beginning.
BOWEN: We have 80 cases ongoing, and 70 percent of them have to do with problems that arose during CPA's period.
ROBERTS: Arwa Damon, what are the Iraqi people looking for right here and right now?
DAMON: A lot, John, but mainly number one security. The comfort -- the ability that most people that don't live in a place like Iraq have to walk out of their home, and knowing that barring an accident happening, they can get to the bank and withdraw money safely. If their child is ill they can go to the grocery store and buy them milk if that's what they need or go to the pharmacist to get the medication. They want electricity. The summer here is scorchingly hot, it's suffocating.
Sweat pours down a person's face just to walk 10 meters outside. To live in conditions like that without power, without the ability to air-condition your home, it's incredibly difficult. And of course, there's even talking about the fuel issue.
The irony of the fact that there are fuel queues here to cause Iraqis to get into line at 4:00 in the morning, sometimes they're not done until 2:00 p.m., 4:00 p.m., 12 hours waiting in a line in a country like Iraq that says so oil-rich. The irony of that and the frustration of that is not lost on anyone here.
ROBERTS: And Stuart Bowen, very quickly. Until there is security all over Iraq, is reconstruction going to continue to be problematic?
BOWEN: Yes, it will. ROBERTS: Thank you. Stuart Bowen, the special inspector general for Iraq reconstruction and Arwa Damon in Baghdad.
Coming up next we are going to turn to Capitol Hill in a week where the war of words escalated and politicians were forced to take a stand. This is "Iraq: A Week at War."
ROBERTS: This is "Iraq: A Week at War." On Capitol Hill it was a week of sharp exchanges over the war in Iraq, as President Bush fielded questions on Iraq at the European Summit in Vienna, Austria. Here to talk about the war of words on both sides of the Atlantic, Dana Bash on Capitol Hill and Suzanne Malveaux who is at the White House.
Let's listen to part of the debate on Capitol Hill over a pullout plan. At the capitol on Thursday Democratic Senator Kerry and Republican Senator Jon Kyl made their cases.
SEN. JOHN KERRY, (R) MA: Let me say it plainly. Redeploying United States troops is necessary for success in Iraq. And it is necessary to be able to fight a more effective war on terror.
SEN. JON KYL, (R) AZ: They are now mutilating and killing American soldiers and Iraqi citizens. What do the terrorists have in mind if we pull out?
ROBERTS: Dana Bash let's start with you. Could it be said there were winners and losers in this debate?
DANA BASH, CNN WHITE HOUSE CORRESPONDENT: I hate to fall back to saying something that probably we all should say a little more often on, which is we'll see what happens in November. But I can tell you that the Democrats probably by the end of the week just after those votes were taken, it was probably the first time they felt that they got a leg up on this issue, because for the most part even though ironically they were the ones pushed for this debates, it's the Democrats had the two proposals. Because they really did focus on whether or not there should be a timeline or a date certain for them to come home. They were for the most part on the defensive this week on this issue.
ROBERTS: They have a number of different areas on when troops should come out. So say stay the course and some say begin at the end of the year and some say get them all out by July 1st of next year.
But they do say that what they're united of is you can't have a policy of stay the course which they say is President Bush's policy. Suzanne, the times that I have accompanied the president on overseas trips particularly to Europe, the reaction from protestors there has been somewhat visceral and world leaders don't seem to be in any kind of agreement with him, in fact in opposition to him. Has anything changed?
SUZANNE MALVEAUX, CNN WHITE HOUSE CORRESPONDENT: There was this one moment that was extraordinary. We were in Vienna, Austria in this 16th century castle in the ballroom where Beethoven actually unveiled his Eighth Symphony. Amazing moment of really discord if you will. President Bush starts off saying to the E.U. president Wolfgang Schuessel, well, I call him Wolfgang and he calls me George W., like many other press conferences, we thought that would be the tone.
But then not one European journalists but two asked him simply about the incredibly low opinion Europeans have of him. Saying, look, it's you, President Bush, they believe is the greater threat than Iran. President Bush very impassioned, emotional, saying that's absurd, that's absolutely absurd and then went on to make his case.
So clearly in that moment you got a sense here that a lot of the Europeans still have a low opinion of the president. But clearly the E.U. leadership wants to move forward.
ROBERTS: Interesting difference of opinion there. Dana Bash, you mentioned Democrats on the defensive. Let's take a listen to what Vice President Cheney said in an exclusive interview with John King about the issue of troop withdrawal.
RICHARD CHENEY, VICE PRESIDENT: The worst possible thing we could do is what the Democrats are suggesting, and no matter how you carve it, you can call it anything you want, but basically it's packing it in and going home, persuading and convincing and validating the theory that the Americans don't have the stomach for this fight.
ROBERTS: So the unspoken words there, cut and run. And it was interesting to me that during some of those floor speeches, Democrats actually used those words. They said this is not cut and run. You talk about them being on the defensive. I don't know anybody who has ever won a debate point by starting off on the defensive and starting off with a negative trying to sell their plan by saying it's not this and further down the road saying this is what it is.
BASH: That's right. Well, the bottom line is they've been to this rodeo before, the Democrats, John. They know what the Republicans' talking points are because they used them in the last election. So they knew that even by broaching the subject in a full- fledged debate that that's going to be exactly what the Republicans use against them, cut and run, and it's exactly what they did.
But you're absolutely right. It's one thing I noticed it at the beginning of the week, that they were more emphatic, even, more emphatic those that didn't want a specific date certain for troops than come home than saying that than actually saying in many ways what they're for when it came for the policy in Iraq.
ROBERTS: So Suzanne Malveaux, we have this split on Capitol Hill between the Democrats and the Democrats and the Democrats and the Republicans over what to do. President Bush reaching out on European allies to try to get some support for his plan going forward. Is it your opinion that he may get that, or do you think that they're still going to be resistant to his plan as they have been for these last three years?
MALVEAUX: Well, John, there certainly wasn't any commitment when it came to money. You heard the president made quite ado about reaching out, some $13 billion pledged by allies. Three billion that they've come through with. He said that he was going to go ahead and push them but senior administration officials say there wasn't really any movement in that direction. It's really sitting down one on one with leaders.
I think what did happen, however, is that he got what he came for when it came to North Korea and Iran. And that really was a united front, if you will, a statement from all of the leaders saying, look, we believe in this. We're going to help you out on this one, and quite frankly we pleased you're coming to our side willing to talk to the Iranians and move forward diplomatically with North Korea.
ROBERTS: Issues that perhaps are far less political than the issue of Iraq. Suzanne Malveaux at the White House and Dana Bash at Capitol Hill. Thanks.
In just a moment we're going to take a look at next week and I'll have comments on the week just passed. This is "Iraq: A Week at War."
ROBERTS: It was a difficult week for military families or anyone for that matter with children of age to go into battle. The deaths of Privates Thomas Tucker and Kristian Menchaca are a stark reminder that the most horrible things imaginable can happen in war.
Any death in Iraq or Afghanistan is a terrible tragedy, but the way Tucker and Menchaca died with no doubt bound their families deeply and forever. We wish them strength in what must be extraordinarily hard times and our prayers are with them.
Here's a look at what we'll be keeping an eye on in the coming week. On Monday former President George H. W. Bush will host the U.S. Arab Economic Forum in Houston, Texas.
On Tuesday helicopters and ground equipment will be the subject when the army chief of staff and the commandant of the Marine Corps appear before the House Armed Services Committee. And on Thursday, Japanese Prime Minister Junichiro Koizumi will meet with President Bush. Certain to be on the agenda, the war in Iraq and that North Korean ballistic missile.
The two of them will also visit Graceland together. Koizumi a big Elvis fan. Thanks for joining us for this edition of "Iraq: A Week at War." I'm John Roberts. Up next, a check on what's making news right now, then stay tuned for "Welcome to the Future."
|
// isRunning checks the status of given service
func (vm *windows) isRunning(serviceName string) (bool, error) {
out, err := vm.Run("sc.exe query "+serviceName, false)
if err != nil {
return false, err
}
return strings.Contains(out, "RUNNING"), nil
}
|
Morphometric variations of Asian Common Palm Civet (Paradoxurus hermaphroditus, Pallas 1777) from Bali Island, Indonesia as the basis of morphometrics diversity data Winaya A, Maftuchah, Nicolas CM, Prasetyo D. 2020. Morphometric variations of Asian Common Palm Civet (Paradoxurus Hermaphroditus, Pallas 1777) from Bali Island, Indonesia as the basis of morphometrics diversity data. Biodiversitas 21: 1027-1034. Asian Common Palm Civet (Paradoxurus hermaphroditus, Pallas 1777) is one of the small carnivores that also lives in Bali island, Indonesia. Civets can process coffee beans by fermenting them in the digestive tract, so the coffee beans have a unique aroma. This coffee product, commonly known as Kopi Luwak, is the most expensive type of coffee in the world. The purposes of this study were to obtain the morphometric variations, genetic diversity, and genetic relationship of Bali civets. In this study, we involved 73 civets from four different areas (Bangli, Tabanan, Gianyar, and Denpasar) of Bali Islands, Indonesia. The quantitative character was the body size of animals, and the qualitative character was their hair color. The body size among populations was not significantly different (P>0.05). The complete canonical structure analysis showed that tail length (1.04) and body length (0.76) in canonical 1 and body height (0.96) and head width (0.94) in canonical 2 could be used as a group differentiator. The genetic distance among Bali civets was categorized as close except Bangli civets having far distance than others. Asian Common Palm Civet (Paradoxurus hermaphroditus, Pallas 1777) is generally renowned as Luwak by most Indonesians. This animal is famous due to its coffee production, which is expanded industrially by coffee companies. This is commonly called Kopi Luwak, which is the most expensive coffee in Indonesia even in the world. The fermentation processes taking place in the digestive tract of civet presumably produce a unique aroma and a good taste of the coffee and that uniqueness is preferred by local and foreign coffee consumers. As a consequence, the civets are exploited massively by hunting or nurturing these animals for producing Luwak coffee. Therefore, it is crucial to study civets extensively to protect or conserve them. However, the study of Indonesia civet is still limited; therefore, it is crucial to determine the appropriate strategies to protect the animals and avoid extinction. Even though civets are considered as a pest rather than conserved animals, but civets crucially act as a buffer of ecosystem regarding their contribution to seeds dispersers (Jothish 2011). The International Union for Conservation of Nature (IUCN) includes the Asian palm civet animals on the least concern list, which means the species have the least attention since the population was considered numerous; therefore, they are far from extinction (). In Indonesia, a civet does not belong to a protected species. However, its trade (domestic and international) is regulated through a quota set annually by the Indonesian Institute of Sciences. In the last five years, quotas of 250-300 individuals were allocated to the provinces of North Sumatra, Lampung, West Java, Central Java, and West Lesser Sunda Islands (Wirdateti unpublished data in ). Civet is a nocturnal animal, and people pay less attention to this mammal until recently (). Research on civets in Indonesia is still insufficiently conducted, especially on the morphometry characters and their habitats. The study on civets that have been reported in Indonesia mostly around organs of civet that is: (i) Gastrointestinal organs, the anatomy of histology of the tongue (Kosim 2015); and intestinal morphology (Rizkiantino 2015); (ii) Civet reproduction, including female and male reproductive organs (Apriliani 2012;Putra 2012); (iii) Civet habitats, such as breeding and activity management (Nur 2013) and welfare management as a studying animal (Laela 2013). Based on those previous studies, it could be said that research leading to the determination of the genetic status of Bali civet was underrepresented. The aim of the study was to determine the morphometric variation, genetic diversity, and genetic relationship among Bali civets. The information of this study is expected to be a useful reference for germplasm conservation and the genetic materials as well. Furthermore, it can be applied as a source of genetic diversity status on Bali civets. Study area The areas of study covered four parts of Bali island (Bali Province, Indonesia), including Denpasar City, Bangli, Gianyar, and Tabanan Districts. This province is situated at the coordinates of 083'40" to 0850'48" S and 11425'53" to 11542'40" E, which makes this area is tropical like other regions in Indonesia. The total area of Bali Province reaches 5,636.66 km 2 or 0.29% of the total area of the Indonesian Archipelago. The land contour of Bali Island consists of flat land 122.65 ha (0% to 2%), undulating land 118.34 ha (2% to 15%), steep land 190.49 ha (15% to 40%), and very steep land 132.19 ha (> 40%). The Bali region, in general, has a tropical sea climate that is influenced by seasonal winds. There are dry and rainy seasons interspersed with transition seasons. The highest average temperature in the Bali region is in Buleleng District, reaching 28.7C with an average humidity of 75%. The lowest average air temperature occurs in Tabanan District that reaches 20.6C with the highest average humidity level of 86%. Materials This study involved 73 Bali civets nurtured and captured from the forest by farmers. The primary data were recorded on the spot of the sampling location ( Figure 1). The main tools of this study were measuring tape and ruler, calipers, digital camera, hygrometer, thermometer, and GPS devices. The observed variables consisted of two variables, namely qualitative and quantitative. The quantitative variable was morphometric characters of civet. The variables were determined by the approaching of Cuscus (Phalangeridae fam.) animal (Widayati 2003). We used a cuscus animal as a model for approaching the morphometric measurement because the researcher found no standard for civet morphometric measurement up to now. In contrast, the qualitative variable of civet was hair color, which can be visually analyzed. Data analysis Relative frequency and descriptive analysis The morphometric measurement of civet was analyzed using descriptive analysis. It was conducted to hopefully obtain the variation of morphometric characters of civet. The analysis of data applied mean values, standard deviation, and the coefficient of variations of each variant in the civet by (Steel and Torrie 1995). Nested analysis The nested analysis was applied to determine the differences among Bali civets. The morphometric characters based on the sampling area of Bali civet was applied. The mathematical model of nested design as follows: Yijk = + i + (i)j + ∑ij Where: Yijk : observed of factor A at level-i, factor B at level-j, : factor C at level-k, and factor D at level-l. i : mean value; (i)j : effect of group-i; ∑ij : effect of subgroup-j in group-i sub of the subgroup (error) Discriminant and canonical correlation analysis Discriminant analysis was implemented to determine the genetic distance (Zhao and Maclean 2000) and the discriminant function using the Mahalanobis distance by the minimum quadratic square distance in which the measurement based on (Nei 1987) formula as follows: Where: D (i, j): Mahalanobis value as a measure of the genetic square distance between the i of civet group and the j of civet group C −1 : the inverse of the covariance matrix of mixed variance between variables The calculation of Mahalanobis distance was performed using SPSS software version 21 with Proc Discriminant analysis. The canonical analysis was used to know the canonical description of the civet group, similarity, and mixture values within and among civets (). This analysis was also used to determine some variables of the morphometry measurements that have a close relationship with the population of civet (subspecies or species differentiator). Bali civet and climatic conditions Civet or Luwak animals also dwell on Bali island as the environmental conditions of Bali are not entirely different from other regions on the mainland of Asia continents. Additionally, in some locations of Bali Island is very suitable for coffee plants, so civets reside there because they can easily find a source of food from these coffee plantations. At the same time, coffee farmers benefit from their existence through civet coffee or Kopi Luwak production (Bale 2019). Furthermore, Bali's faunas are categorized as tropical rainforests animals, like bird species, reptiles, and mammals. However, in the last few decades, the rainforest ecosystem has undergone an imbalance condition due to illegal logging and climate change. So, a significant number of trees and endemic animals have slowly declined even worse some of them are extinct. Civets belonging to rainforest animals also have an essential role in plant regeneration by seed dispersal (;). As Su and Sale stated that civet is one of forest rehabilitation agents, especially on dispersing seeds of plants in the forest or plantation because civets only eat ripe fruits. Civets are a carnivorous nocturnal animal consuming the major ripe fruits like banana and papaya, coffee, and palm. Sometimes this species also eats small vertebrates, reptiles, and insects (). Therefore, they are also named frugivorous animals (;). The digestive system of civet is quite simple. It only processes the peel and flesh of the fruit while the seeds remain with the feces, including coffee beans. The hard grains are removed from the fermented digestion of civet. That is the reason why civets only eat the best and most excellent coffee. Regarding the plants' regeneration in the forest, its process occurs when the feces of civets are scattered in different places where they ever defecate. It is clear how impactful civets are for the forest ecology (Nakashima and Sukor 2010). Qualitative characters of Bali civet The qualitative character observed in this study was civets' hair color. Through hair color inquiry, it could be found the color variation of Bali civet. The investigation found four types of hair color from Bali civets, like Grayish-Brown, Brownish-Yellow, Black, and White, from 73 animal samples ( Figure 2). According to (Wright and Walters 1981), all of the alleles encoding hair color variations are located on the autosomal chromosome and sex chromosome of X. While the black color encoded by B gene is located at the B~b locus, and mutations in this gene will express brown and light brown. The phenotypic character of hair color in the animal is an expression of many or several pairs of the gene. The black and brown color variations in Bali civets are presumably determined by the B gene appearing in a recessive homozygote (bb) gene and it is epistasis of the A gene expressed by recessive homozygote (aa). It blocks the expression of other genes in heterozygous conditions. The grayish-brown color of the Bali civet is assumed also regulated by the B gene which expression is the mutation of the B gene. Whereas, the brownish-yellow color of the Bali civets is presumably regulated by the C gene at locus C where it is expressed in the cc recessive homozygote, which is epistasis to other genes expressed in the heterozygous conditions. Castle stated that C locus consists of CC, Cc, and cc. The C allele in the homozygous dominant and heterozygous conditions controlled the expression of the color. In a recessive condition, the cc allele will affect albinism. The turn on or off of the C gene will cause the black and yellow pigments of the hair. The white color is managed by the C gene in locus C resulting in the basic color to not take place. According to (Suwed and Napitupulu 2011), the C gene prevents color expression in a different form. The genes in C locus typically control the expression of full color, but if any recessive gene in locus C, it will affect the color not to develop or albinism. The most frequent hair color in Bali civets was grayish-brown (38.05%), while white color was the lowest (4.03%) ( Table 1). This study corresponded to (Wilson and Reeder 2005) that Asian common palm civets generally have brownish-gray hair color, and some at both sides of the body have a line of black spots. The hair color of the animal is one crucial factor in the traits of species or breeds. Also, hair color could be a marker for the particular species of animal. Asian Common Palm Civet (Paradoxurus Hermaphroditus) also has variations in hair color at various places with different climatic conditions, especially in the Asian continent (Pocock 1939). Phenotypic ally, common Palm Civet, has dark spots coalesce into stripes on the sides. It has three longitudinal stripes on its back. The muzzle, ears, lower legs, and distal half of the tail are black (Dev Choudhury 2015). The typical color of the hair of the Asian Common Palm Civet is brownish-gray to grayish-black with grayishwhite lines along the body, and Sharma found the albino event of civet in Rajasthan, India. Morphometric characters of Bali civet Because genetic differences often produce morphological variations so that morphological differences can be used as an indicator of possible underlying genetic differences (). Morphometric is simply a quantitative way to shape comparisons among animals, and shape analysis plays an essential role in many kinds of biological studies. The variation in biological processes produces differences in shape between individuals or their parts, such as disease or injury, ontogenetic development, adaptation to local geographic factors, or longterm evolutionary diversification. Hence, shape analysis is one approach to understanding the diverse causes of variation and morphological transformation (). Body size is a typical quantitative or complex trait that shows a continuous variation (). Previous studies have reported that many discrete genes are involved in individual development, genetic diseases, or body size regulation. It has been reported that some genes involved in promoting growth or mutations in genes could cause tall stature (e.g., gigantism) and overgrowth (). Body size is a significant factor influencing animal morphology, physiology, ecology, evolution, and extinction probability (;). The categorized morphometry variables can support the quantitative trait data that can combine with molecular data for genetic variation in animals or livestock (;;). The Bali civet from Bangli district has the lowest variation on morphometry measurement compared to the other populations (7.66% to 33.75%). In contrast, the highest variation was found in the Tabanan district (16.02% to 74.74%) ( Table 2). The variation of morphometry measurements could be due to the different places and environmental conditions, like the availability of food. According to Ilham, the variation of body weight in an animal is commonly caused by different environmental conditions, including kinds and amount of food consumption. Concerning Bali civets, the variation on body length, chest circumference, and chest width represents the Bali civet weight diversity. The common palm civet (Paradoxurus hermaphroditus) is a small carnivore (2 to 5 kg on weight) that is widely spread in South and Southeast Asia (Wozencraft 2005;Jennings andVeron 2009), and() for current taxonomic status. While the average adult civet weight was around 3 kg (;Pai 2008). It corresponded to this study that Bali civets have bodyweight around 3.30 kg and 3.78 kg on two to three years old and more than three years old, respectively. While the rate of total body length of Bali civets at one year old or above was ranging from 50.46 to 54.66 cm. This result confirmed () study that Asian palm civet has total body length ranging from 42 to 71 cm. Pai's study also indicated that the total body length of Asian palm civet was around 53 cm. The genetic variation of Bali civet According to morphometric measurements in Bali civet, we found some genetic variations in Bali civets based on population similarity, canonical, and genetic distance analysis. The similarity analysis displayed that the highest degree of similarity was found in Gianyar District (88.90%), followed by Bangli District (85.20%), Tabanan District (75.00%), and the Denpasar City, which is the lowest one, (58.80%) ( Table 3). Bali civet population has a high value on similarity. It can be assumed that the mixture of genes coming from the outside population was low. This is consistent, too () that the phenotypic similarity can obtain a genetic identity. However, there are some constraints regarding the use of the phenotypic character for genetic identities due to the different alleles or genes in the different locus. In some instances, it is suspected that differences in power expression or degrees of the genes expression level depend on the individual or species. The canonical analysis can determine the morphometric measurements having the most significant discriminator for Bali civets. In canonical 1, the findings were tail length (1.04) and body length (0.76), and in canonical 2, it was found body height (0.96) and head width (0.94) (Table 4). Thus, the measurement of tail length, body length, body weight, and head width can be used as a predictor to differ Bali civet population-based on morphometric characters. On the other hand, it shows that the variable of body weight, front and hind leg length, and chest circumference cannot be used as a differentiator variable of Bali civet population. The analysis of total canonical structure showed that those variables have negative values on canonical 1 and 2. The lower value obtained from the complete analysis of canonical structures cannot be used as a distinguished variable for a population in general. The scattering of Bali civets in each population according to the morphometry measurements based on the canonical discriminant quadrant is shown in Figure 3. The Bali civets from Bangli have separated the group from the other quadrants. They were located at quadrant II and IV and only had a slight intersection part with Bali civets from other populations. It means that Bali civets from Bangli region have a particular difference of morphometry measurement than the other regions. The instance is the front leg size. This was also illustrated that Bangli has a bit different genetic than other regions. Canonical Discriminant Analysis (CDA) can be used to measure the relationship between categorical variables, namely groups of variables belonging to individuals or populations, and a set of independent variables (Zhao and Maclean 2000). Table 5 showed that Bali civets from Bangli area have a further genetic distance than other regions with values ranging from 34.28 to 41.93. This may be caused by the Bangli region located in the mountainous area, far away from other populations. This may impede the free movement of those civets into other populations. While, the closest genetic distance was between Tabanan and Denpasar population with value 7.26. This is presumably caused by the closest location among those two places allowing civets to move back and forth between the two locations. Based on local farmers' information, Denpasar civets came from Tabanan through trading activities. The genetic distance and phylogenetic relationship of Bali civet Based on the matrix of genetic distance, we constructed the phylogenetic tree, as showed at Figure 4. This illustrates Bali civets from four different locations are grouped into three clusters. The first cluster is from Tabanan and Gianyar populations, the second one comes from Tabanan, Denpasar and Gianyar populations, and the last one is Bangli civets. It is clearly displayed that Tabanan civets have the closest genetic relation to Denpasar ones. Those two locations are also closer to Gianyar, while Bangli civet population was separated from them. The dendrogram generated from the genetic distance matrix, so it can also elaborate on the genetic distance among the populations. Hence, the implementation of morphometric characters in this investigation can determine the genetic distance and phylogenetic relationship among Bali civets. In conclusion, the presence of morphometric diversity on Bali civets from four different regions of Bali island can be adjusted through the variations of quality characters such as hair color consisting of four colors (i.e., grayishbrown; black; brownish-yellow; and white). Also, it can be found through the variation of quantitative characters obtained from the variation of morphological measurements obtained from the value of morphometric similarity, canonical discriminant analysis, the genetic distance matrix, and the phylogenetic relationship. However, the strong variables differentiator of morphometric measurements that can control the Bali civet genetic variations were body length, body height, head width, and tail length. This means that if these variables are changed, then the morphometric character of the animal will change too. Hence, the strength of the finding in this study is a molecular approach is needed to support the scientific argument.
|
<filename>sdktools/restools/rltools/common/update.h
#ifndef _UPDATE_H_
#define _UPDATE_H_
////int PrepareUpdate(CHAR *szResourceFile,CHAR *szMasterTokenFile);
int Update(CHAR *szMasterTokenFile, CHAR *szLanguageTokenFile);
////int Switch(TCHAR *szValue, CHAR *szTokenFile);
#endif // _UPDATE_H_
|
. BACKGROUND A resurgence of group A beta hemolytic Streptococcus infections such as fasciitis, cellulitis and Streptococcal Toxic Syndrome has been observed recently. AIM To study the clinical features of patients with group A beta hemolytic Streptococcus infections in a regional hospital. PATIENTS AND METHODS Retrospective review of medical records of patients notified as having a group A beta hemolytic Streptococcus tissue infection, between 1994 and 1999. RESULTS Twenty four patients were notified in the period as having a group A beta hemolytic Streptococcus infection and 18 (13 male, mean age 39 tears old) had tissue involvement. Eleven patients had a fasciitis (61%), six had a cellulitis (33%) and 14 patients (77%), a Streptococcal Toxic Shock Syndrome. Eight patients died during hospital stay. The infection portal of entry was identify in 13 patients (the skin in 10 and intramuscular injections in three). Decreased patients had a longer lapse of disease before admission than patients discharged alive (5(range 3h-7 days) and 2.1 (range 6h-5 days) respectively). In seven patients a quick serological test, designed for pharyngeal infections was performed and it was positive in five. Blood cultures were positive in seven patients and in 11, the germ was isolated from the lesions. CONCLUSIONS As the early diagnosis of group A beta hemolytic Streptococcus tissue infections has a prognostic value, the population should be instructed to recognize early signs and symptoms of these infections.
|
This invention relates to a composite textile fabric, and more particularly, to a composite textile fabric made of polyester yarns which act to move liquid moisture away from the skin and through a garment made with the composite fabric.
Most polyester textile fabrics are likely to result in the substantial enclosure of liquid moisture between the wearer's skin and undergarments, or between the undergarments of the wearer and the outerwear. When moisture saturation takes place, the excess moisture wets the body of the garment wearer, and the wearer begins to feel rather uncomfortable.
Although it is possible to use a composite textile fabric with a first layer made of either a polyester or nylon material and a second layer having a substantial portion of a moisture-absorbent material such as cotton, as by way of example illustrated in U.S. Pat. No. 5,312,667 owned by Malden Mills Industries, such a composite textile fabric can be improved. Because the second layer includes a substantial portion of a moisture-absorbent material such as cotton, even though the "micro-climate" between the wearer's skin and the inner fabric layer is more comfortably dry and the likelihood of a back-up of liquid moisture from the outer fabric layer to the inner fabric layer is reduced, moisture evaporation from the outside layer is less than desired. The moisture absorbent material becomes saturated, but since there is little driving force to spread the moisture, evaporation is limited and the excess moisture backs up into the inner layer and wets the wearer.
Accordingly, it would be desirable to provide a textile fabric which overcomes the above disadvantages and which facilitates water transport across the outside layer to promote evaporation and keep the wearer dry.
|
/**
* Logging settings <tt>Activity</tt>.
*
* @author Pawel Domas
*/
public class LoggingSettings
extends OSGiActivity
{
/**
* The logger
*/
private static final Logger logger
= Logger.getLogger(LoggingSettings.class);
// Preference keys
static private final String P_KEY_LOG_ENABLE
= JitsiApplication.getResString(R.string.pref_key_logging_enable);
static private final String P_KEY_LOG_SIP
= JitsiApplication.getResString(R.string.pref_key_logging_sip);
static private final String P_KEY_LOG_XMPP
= JitsiApplication.getResString(R.string.pref_key_logging_xmpp);
static private final String P_KEY_LOG_RTP
= JitsiApplication.getResString(R.string.pref_key_logging_rtp);
static private final String P_KEY_LOG_ICE4J
= JitsiApplication.getResString(R.string.pref_key_logging_ice4j);
static private final String P_KEY_LOG_FILE_COUNT
= JitsiApplication.getResString(
R.string.pref_key_logging_file_count);
static private final String P_KEY_LOG_LIMIT
= JitsiApplication.getResString(R.string.pref_key_logging_limit);
/**
* {@inheritDoc}
*/
@Override
protected void onCreate(Bundle savedInstanceState)
{
super.onCreate(savedInstanceState);
if(savedInstanceState == null)
{
getFragmentManager()
.beginTransaction()
.replace(android.R.id.content, new SettingsFragment())
.commit();
}
}
public static class SettingsFragment
extends OSGiPreferenceFragment
implements SharedPreferences.OnSharedPreferenceChangeListener
{
/**
* The summary mapper
*/
private SummaryMapper summaryMapper = new SummaryMapper();
@Override
public void onCreate(Bundle savedInstanceState)
{
super.onCreate(savedInstanceState);
addPreferencesFromResource(R.xml.logging_preferences);
summaryMapper.includePreference(
findPreference(P_KEY_LOG_FILE_COUNT), "");
summaryMapper.includePreference(
findPreference(P_KEY_LOG_LIMIT), "");
}
/**
* {@inheritDoc}
*/
@Override
public void onStart()
{
super.onStart();
PacketLoggingService packetLogging
= LoggingUtilsActivator.getPacketLoggingService();
PacketLoggingConfiguration cfg = packetLogging.getConfiguration();
PreferenceScreen screen = getPreferenceScreen();
cfg.setGlobalLoggingEnabled(false);
PreferenceUtil.setCheckboxVal(
screen, P_KEY_LOG_ENABLE,
cfg.isGlobalLoggingEnabled());
PreferenceUtil.setCheckboxVal(
screen, P_KEY_LOG_SIP,
cfg.isSipLoggingEnabled());
PreferenceUtil.setCheckboxVal(
screen, P_KEY_LOG_XMPP,
cfg.isJabberLoggingEnabled());
PreferenceUtil.setCheckboxVal(
screen, P_KEY_LOG_RTP,
cfg.isRTPLoggingEnabled());
PreferenceUtil.setCheckboxVal(
screen, P_KEY_LOG_ICE4J,
cfg.isIce4JLoggingEnabled());
PreferenceUtil.setEditTextVal(
screen, P_KEY_LOG_FILE_COUNT,
""+cfg.getLogfileCount());
PreferenceUtil.setEditTextVal(
screen, P_KEY_LOG_LIMIT,
"" + (cfg.getLimit()/1000) );
SharedPreferences shPrefs = getPreferenceManager()
.getSharedPreferences();
shPrefs.registerOnSharedPreferenceChangeListener(this);
shPrefs.registerOnSharedPreferenceChangeListener(summaryMapper);
summaryMapper.updatePreferences();
}
/**
* {@inheritDoc}
*/
@Override
public void onStop()
{
SharedPreferences shPrefs = getPreferenceManager()
.getSharedPreferences();
shPrefs.unregisterOnSharedPreferenceChangeListener(this);
shPrefs.unregisterOnSharedPreferenceChangeListener(summaryMapper);
super.onStop();
}
/**
* {@inheritDoc}
*/
public void onSharedPreferenceChanged( SharedPreferences shPreferences,
String key )
{
PacketLoggingService packetLogging
= LoggingUtilsActivator.getPacketLoggingService();
PacketLoggingConfiguration cfg = packetLogging.getConfiguration();
if(key.equals(P_KEY_LOG_ENABLE))
{
cfg.setGlobalLoggingEnabled(
shPreferences.getBoolean(P_KEY_LOG_ENABLE, true));
}
else if(key.equals(P_KEY_LOG_SIP))
{
cfg.setSipLoggingEnabled(
shPreferences.getBoolean(P_KEY_LOG_SIP, true));
}
else if(key.equals(P_KEY_LOG_XMPP))
{
cfg.setJabberLoggingEnabled(
shPreferences.getBoolean(P_KEY_LOG_XMPP, true));
}
else if(key.equals(P_KEY_LOG_RTP))
{
cfg.setSipLoggingEnabled(
shPreferences.getBoolean(P_KEY_LOG_RTP, true));
}
else if(key.equals(P_KEY_LOG_ICE4J))
{
cfg.setSipLoggingEnabled(
shPreferences.getBoolean(P_KEY_LOG_ICE4J, true));
}
else
{
// String preferences
try
{
if(key.equals(P_KEY_LOG_FILE_COUNT))
{
cfg.setLogfileCount(
Integer.parseInt(
shPreferences.getString(
P_KEY_LOG_FILE_COUNT,
""+cfg.getLogfileCount())));
}
else if(key.equals(P_KEY_LOG_LIMIT))
{
cfg.setLimit(
1000*Long.parseLong(
shPreferences.getString(
P_KEY_LOG_LIMIT,
""+(cfg.getLimit()/1000))));
}
}
catch (NumberFormatException e)
{
logger.error(e);
}
}
}
}
}
|
/**
* Parses the HBase columns mapping to identify the column families, qualifiers
* and also caches the byte arrays corresponding to them. One of the Hive table
* columns maps to the HBase row key, by default the first column.
*
* @param columnMapping - the column mapping specification to be parsed
* @param colFamilies - the list of HBase column family names
* @param colFamiliesBytes - the corresponding byte array
* @param colQualifiers - the list of HBase column qualifier names
* @param colQualifiersBytes - the corresponding byte array
* @return the row key index in the column names list
* @throws SerDeException
*/
public static int parseColumnMapping(
String columnMapping,
List<String> colFamilies,
List<byte []> colFamiliesBytes,
List<String> colQualifiers,
List<byte []> colQualifiersBytes) throws SerDeException {
int rowKeyIndex = -1;
if (colFamilies == null || colQualifiers == null) {
throw new SerDeException("Error: caller must pass in lists for the column families " +
"and qualifiers.");
}
colFamilies.clear();
colQualifiers.clear();
if (columnMapping == null) {
throw new SerDeException("Error: hbase.columns.mapping missing for this HBase table.");
}
if (columnMapping.equals("") || columnMapping.equals(HBASE_KEY_COL)) {
throw new SerDeException("Error: hbase.columns.mapping specifies only the HBase table"
+ " row key. A valid Hive-HBase table must specify at least one additional column.");
}
String [] mapping = columnMapping.split(",");
for (int i = 0; i < mapping.length; i++) {
String elem = mapping[i];
int idxFirst = elem.indexOf(":");
int idxLast = elem.lastIndexOf(":");
if (idxFirst < 0 || !(idxFirst == idxLast)) {
throw new SerDeException("Error: the HBase columns mapping contains a badly formed " +
"column family, column qualifier specification.");
}
if (elem.equals(HBASE_KEY_COL)) {
rowKeyIndex = i;
colFamilies.add(elem);
colQualifiers.add(null);
} else {
String [] parts = elem.split(":");
assert(parts.length > 0 && parts.length <= 2);
colFamilies.add(parts[0]);
if (parts.length == 2) {
colQualifiers.add(parts[1]);
} else {
colQualifiers.add(null);
}
}
}
if (rowKeyIndex == -1) {
colFamilies.add(0, HBASE_KEY_COL);
colQualifiers.add(0, null);
rowKeyIndex = 0;
}
if (colFamilies.size() != colQualifiers.size()) {
throw new SerDeException("Error in parsing the hbase columns mapping.");
}
if (colFamiliesBytes != null) {
colFamiliesBytes.clear();
for (String fam : colFamilies) {
colFamiliesBytes.add(Bytes.toBytes(fam));
}
}
if (colQualifiersBytes != null) {
colQualifiersBytes.clear();
for (String qual : colQualifiers) {
if (qual == null) {
colQualifiersBytes.add(null);
} else {
colQualifiersBytes.add(Bytes.toBytes(qual));
}
}
}
if (colFamiliesBytes != null && colQualifiersBytes != null) {
if (colFamiliesBytes.size() != colQualifiersBytes.size()) {
throw new SerDeException("Error in caching the bytes for the hbase column families " +
"and qualifiers.");
}
}
return rowKeyIndex;
}
|
<gh_stars>0
# Use GCS Fuse or gs://
from typing import List, Dict, Union
from pathlib import Path
from glob import glob
import numpy as np
from dask.distributed import Client
import nvtabular as nvt
class DatasetNotCreated(Exception):
pass
class NvtDataset:
def __init__(self,
data_path: str,
engine: str,
columns: List[str],
cols_dtype: Dict[Union[np.dtype, str]],
dataset_name: str,
frac_size: float,
shuffle: str = None,
CATEGORICAL_COLUMNS: str = None,
CONTINUOUS_COLUMNS: str = None,
LABEL_COLUMNS: str = None):
self.data_path = data_path
self.engine = engine
self.columns = columns
self.cols_dtype = cols_dtype
self.frac_size = frac_size
self.shuffle = shuffle
def create_nvt_dataset(self,
client: Client,
separator: str = None):
file_list = glob(str(Path(self.data_path) /
f'*.{self.extension}'))
self.dataset = nvt.Dataset(
file_list,
engine=self.extension,
names=self.columns,
part_mem_fraction=self.frac_size,
sep=separator,
dtypes=self.cols_dtypes,
client=client,
)
def convert_to_parquet(self,
regen_nvt_dataset = False,
output_path: str = None,
client: Client = None,
preserve_files: bool = True):
try:
if output_path:
self.dataset.to_parquet(
self.data_path,
preserve_files=preserve_files,
shuffle=self.shuffle
)
else:
self.dataset.to_parquet(
output_path=output_path,
preserve_files=preserve_files,
shuffle=self.shuffle
)
except:
raise DatasetNotCreated('Dataset not created')
if regen_nvt_dataset:
self.extension = 'parquet'
if output_path:
self.data_path = output_path
self.create_nvt_dataset(client)
|
Facebook Catching MySpace in the U.S.
According to new data from Hitwise, MySpace rang up a stunning 73 percent of U.S. visitor market share for social networks in June, CNET News reports. However, that’s down by 6 percent compared with the same period last year. Meanwhile, Facebook captured about 17 percent of the U.S. market, which marks a big gain of 40 percent from the same period one year ago.
MySpace users still spend more time on the site than Facebook users on average—31 minutes versus 21 minutes—but again, the numbers in that category are getting closer as well. Both portals have robust mobile social networking options, from WAP portals and standalone applications, to specific carrier tie-ins with certain handsets.
|
import * as React from 'react';
import styled from 'styled-components';
import { Slot } from 'react-plugin';
import { FixtureId } from 'react-cosmos-shared2/renderer';
import {
XCircleIcon,
RefreshCwIcon,
MaximizeIcon,
HomeIcon
} from '../../shared/icons';
import { Button } from '../../shared/components';
type Props = {
selectedFixtureId: null | FixtureId;
fullScreen: boolean;
rendererConnected: boolean;
validFixtureSelected: boolean;
selectFixture: (fixtureId: FixtureId, fullScreen: boolean) => void;
unselectFixture: () => void;
};
// TODO: Improve UX of refresh button, which can seem like it's not doing anything
export function RendererHeader({
selectedFixtureId,
fullScreen,
rendererConnected,
validFixtureSelected,
selectFixture,
unselectFixture
}: Props) {
if (fullScreen) {
return null;
}
if (!rendererConnected) {
return (
<Container>
<Left>
<Message>Waiting for renderer...</Message>
</Left>
</Container>
);
}
if (!selectedFixtureId) {
return (
<Container>
<Left>
<Message>No fixture selected</Message>
</Left>
<Right>
<Slot name="rendererActions" />
<Button disabled icon={<MaximizeIcon />} label="fullscreen" />
</Right>
</Container>
);
}
if (!validFixtureSelected) {
return (
<Container>
<Left>
<Message>Fixture not found</Message>
<Button
icon={<HomeIcon />}
label="home"
onClick={() => unselectFixture()}
/>
</Left>
<Right>
<Slot name="rendererActions" />
<Button disabled icon={<MaximizeIcon />} label="fullscreen" />
</Right>
</Container>
);
}
return (
<Container>
<Left>
<Button
icon={<XCircleIcon />}
label="close"
onClick={() => unselectFixture()}
/>
<Button
icon={<RefreshCwIcon />}
label="refresh"
onClick={() => selectFixture(selectedFixtureId, false)}
/>
<Slot name="fixtureActions" />
</Left>
<Right>
<Slot name="rendererActions" />
<Button
icon={<MaximizeIcon />}
label="fullscreen"
onClick={() => selectFixture(selectedFixtureId, true)}
/>
</Right>
</Container>
);
}
const Container = styled.div`
flex-shrink: 0;
display: flex;
flex-direction: row;
align-items: center;
justify-content: space-between;
height: 40px;
padding: 0 12px;
border-bottom: 1px solid var(--grey5);
background: var(--grey6);
color: var(--grey3);
white-space: nowrap;
overflow-x: auto;
`;
const Left = styled.div`
display: flex;
flex-direction: row;
align-items: center;
`;
const Right = styled.div`
display: flex;
flex-direction: row;
align-items: center;
`;
const Message = styled.span`
margin: 0 4px;
strong {
font-weight: 600;
}
`;
|
<reponame>thelonelyDreamer/java-framework<filename>fastjson/fastjson-ssm/src/main/java/com/felixwc/ssm/fastjson/service/impl/UserServiceImpl.java<gh_stars>0
package com.felixwc.ssm.fastjson.service.impl;
import com.felixwc.ssm.fastjson.service.UserService;
import org.springframework.stereotype.Service;
/**
* in order to learn java!
* created at 2022/2/23 17:34
*
* @author wangchao
*/
@Service
public class UserServiceImpl implements UserService {
}
|
Neutrino masses and the extra Z^{\prime 0} We now know firmly that neutrinos have tiny masses, but in the minimal Standard Model there is no natural sources for such tiny masses. On the other hand, the extra heavy Z^{\prime 0} requires the extra Higgs field, the particle generating the mass. Here I propose that the previous 2+2 Higgs scenario could be a natural framework for mass generations for both the neutrinos and the extra Z^{\prime)}. These particles are classified as the"dark matter". Hopefully all the couplings to the"visible"matter are through the neutrinos and the extra Z^{\prime 0}, explaining naturally why the dark matter is so dark to see. Introduction Neutrinos have masses, the tiny masses. It may be difficult to explain, since neutrinos in the minimal Standard Model are massless. In fact, this may be a signature that there is a heavy extra Z 0. This extra Z 0 then requires the new Higgs doublet. This Higgs doublet also generates the tiny neutrino masses. So, the natural clue appears in the message that neutrinos have tiny masses. The Higgs and extra Z 0, so weak and so heavy, would come much later in the clue (message). They all may belong to the so-called "dark matter", 25% of the present-day Universe (compared to 5% of ordinary matter). Tiny neutrino masses and the new Higgs doublet In a world of (quantized) Dirac particles interacting with the generalized standard-model interactions, there are left-handed neutrinos belong to SU L doublets while the righthanded neutrinos are singlets. The term specified by with = ( 0, − ) the new Higgs doublet could generate the tiny mass for the neutrino. In the real world, neutrino masses are tiny with the heaviest in the order of 0.1 eV. The electron, the lightest Dirac particle except neutrinos, is 0.511 M eV or 5.1110 5 eV. That is why the standard-model Higgs, which "explains" the masses of all other Dirac particles, is likely not responsible for the tiny masses of the neutrinos. In a previous paper in 1987, we studied the extra Z 0 extension paying specific attention to the Higgs sector -since in the Minimal Standard model the standard Higgs doublet has been used up by (W ±, Z 0 ). We worked out by adding one Higgs singlet (in the so-called 2+1 Higgs scenario) or adding a Higgs doublet (the 2+2 Higgs scenario). It is the latter that we could add the neutrino mass term in naturally. (See Ref. for details. Note that the complex conjugate of the second Higgs doublet there is the above.) The new Higgs potential follows the standard Higgs potential, except that the parameters are chosen such that the masses of the new Higgs are much bigger. The coupling between the two Higgs doublets should not be too big to upset the nice fitting of the data to the Standard Model. All these go with the smallness of the neutrino masses. Note that spontaneous symmetry breaking happens such that the three components of the standard Higgs get absorbed as the longitudinal components of W ± and Z 0. In this junction, we should say something about the cancelation of the flavor-changing scalar neutral quark currents. Suppose that we work with two generations of quarks, and it is trivial to generalize to the physical case of three. I would write noting that we use the rotated down quarks and we also use the complex conjugate of the standard Higgs doublet. This is a way to ensure that the GIM mechanism is complete. Without anything to do the opposite, I think that it is reasonable to continue to assume the GIM mechanism. A World of "Quantized" Dirac Particles Coming to think about it, we can rephrasing the Standard Model as a world of quantized Dirac particles with interactions. Dirac, in his relativistic construction of Dirac equations, was enormously successful in describing the electron. Quarks, carrying other intrinsic degrees (color), are described by Dirac equations and interact with the electron via gauge fields. We also know muons and tau-ons, the other charged leptons. So, how about neutrinos? Our first guess is also that neutrinos are Dirac particles of some sort (against Majorana or other Weyl fields). For some reasons, Dirac particles are implemented with some properties -that they know the other Dirac particles in our space-time. (We are trying to avoid some bias in saying that it is a Dirac particle. Some magic occurs here.) So far, this has been true that it is a world of Dirac particles with interactions. If we simplify the world to that, maybe a lot of questions could be answered. How little we have progressed in terms of the relativistic particles, if the view regarding the world of quantized Dirac particles prevails! What is also surprising is the role of "renormalizability". We could construct quite a few such extensions of the minimal Standard Model -the present extra Z 0 and the recent proposed family gauge theory ; there are more. Apparently, we should not give up though the road seems to have been blocked. A Simple Connection to the Unknowns It turns out that a world of Dirac particles as described by quantum field theory (the mathematical language) is the physical world. The interactions are mediated by gauge fields modulated slightly by Higgs fields. There may be some new gauge fields, such as the extra Z 0 or the family gauge symmetry or others, but the first clue is the neutrino masses -and the next clue will be weaker and subtler, and even weaker. There are a bunch of dark matter out there -25% of the present Universe compared to only 5% ordinary matter. When we get more knowledge on the dark matter, we may have pretty good handles of this Universe. Introduction Neutrinos have masses, the tiny masses. It may be difficult to explain, since neutrinos in the minimal Standard Model are massless. In fact, this may be a signature that there is a heavy extra Z 0. This extra Z 0 then requires the new Higgs doublet. This Higgs doublet also generates the tiny neutrino masses. To think of it more, we may invoke the so-called "minimum Higgs hypothesis" (to account for the fact that we are yet to see the Higgs particle after searching for it over the last forty years). So, the extra Z 0 and the required new Higgs doublet would be everything which we should consider, if there is nothing else. This brings us back to the 2 + 2 extra Z 0 model. To be honest, it might be too much to assume that "there is nothing else"how about the missing the right-handed sector or the family "gauge" symmetry (to explain way the occurrence of the three generations)? In this brief report, our minds are so oversimplified that the extra Z 0 plus one new Higgs doublet is the story. There might be some difficulties as regarding that, in the present Universe, there is 25% dark while only 5% visible ordinary matter -the picture of the extra Z 0 plus the new Higgs doublet may sound too simple and too little to account for the dark matter world. But we should analyze its consequences since the situation calls for. So, the natural clue appears in the message that neutrinos have tiny masses. The Higgs and extra Z 0, so weak and so heavy, would come much later in the clue (message). They all may belong to the so-called "dark matter", 25% of the present-day Universe (compared to 5% of ordinary matter). Tiny neutrino masses and the new Higgs doublet In a world of point-like Dirac particles interacting with the generalized standard-model interactions, there are left-handed neutrinos belong to SU L doublets while the righthanded neutrinos are singlets. The term specified by with = ( 0, − ) the new Higgs doublet could generate the tiny mass for the neutrino. Let call it the "remote" Higgs doublet. In the real world, neutrino masses are tiny with the heaviest in the order of 0.1 eV. The electron, the lightest Dirac particle except neutrinos, is 0.511 M eV or 5.1110 5 eV. That is why the standard-model Higgs, which "explains" the masses of all other Dirac particles, is likely not responsible for the tiny masses of the neutrinos. In a previous paper in 1987, we studied the extra Z 0 extension paying specific attention to the Higgs sector -since in the minimal Standard Model the standard Higgs doublet has been used up by (W ±, Z 0 ). We worked out by adding one Higgs singlet (in the so-called 2+1 Higgs scenario) or adding a Higgs doublet (the 2+2 Higgs scenario). It is the latter that we could add the neutrino mass term in naturally, according to "the minimum Higgs hypothesis". (See Ref. for details. Note that the complex conjugate of the second Higgs doublet there is the above.) The new Higgs potential follows the standard Higgs potential, except that the parameters are chosen such that the masses of the new Higgs are much bigger. The coupling between the two Higgs doublets should not be too big to upset the nice fitting of the data to the Standard Model. All these go with the smallness of the neutrino masses. Note that spontaneous symmetry breaking happens such that the three components of the standard Higgs get absorbed as the longitudinal components of W ± and Z 0. To be specific, let the vacuum expectation values be v and v, as determined by the Higgs potentials. The couplings of the standard Higgs to quarks and charged leptons are of order O(). The couplings of neutrinos to the "remote" Higgs are of order O( ), which would be (v/v ) 2 O() in view of the "minimum Higgs hypothesis". In other words, the details about the mass generation, through the couplings of Higgs to the various particles, should be the next important question in the Standard Model. The "minimum Higgs hypothesis" offers us an avenue to simplify our thinking in this direction. First, we think that the reason for the tiny masses of neutrinos is an important clue -it does not come from the standard Higgs since otherwise the range of what would be given by the standard Higgs is of order 10 15, too wide the range. Second, for the quark sector, the standard Higgs should be adequate according to the minimum requirement -see the next paragraph for more. Thirdly, neutrinos should not couple to the standard Higgs, but yes to the remote Higgs. Strangely enough, all these come from the "minimum Higgs hypothesis". We could also say something about the cancelation of the flavor-changing scalar neutral quark currents. Suppose that we work with two generations of quarks, and it is trivial to generalize to the physical case of three. We would write noting that we use the rotated down quarks and we also use the complex conjugate of the standard Higgs doublet. This is a way to ensure that the GIM mechanism is complete. Without anything to do the opposite, I think that it is reasonable to continue to assume the GIM mechanism. The question is that why we have only one Higgs doublet doing the job (the GIM mechanism). The "minimum Higgs hypothesis" may be the answer. A World of "Point-like" Dirac Particles Coming to think about it, we can rephrasing the Standard Model as a world of point-like Dirac particles with interactions. Dirac, in his relativistic construction of Dirac equations, was enormously successful in describing the electron. Quarks, carrying other intrinsic degrees (color), are described by Dirac equations and interact with the electron via gauge fields. We also know muons and tau-ons, the other charged leptons. So, how about neutrinos? Our first guess is also that neutrinos are point-like Dirac particles of some sort (against Majorana or other Weyl fields). For some reasons, point-like Dirac particles are implemented with some properties -that they know the other point-like Dirac particles in our space-time. So far, this has been true that it is a world of point-like Dirac particles, or quantized Dirac fields, with interactions, mediated by gauge fields and modulated slightly by Higgs fields. This phenomenon, which we call "Dirac similarity principle" in my other paper, reflects a lot about our four-dimensional space-time. In our physical four-dimensional spacetime, our efforts to define "point-like" may stop here. Particle physics serves to describe the "point-like" Dirac particles in this space-time. What is also surprising is the role of "renormalizability". We could construct quite a few such extensions of the minimal Standard Model -the present extra Z 0, the left-right model, and the family gauge theory ; there are more. Apparently, we should not give up though the road seems to have been blocked. A Simple Connection to the Unknowns It turns out that a world of point-like Dirac particles as described by quantum field theory (the mathematical language) is the "smallest" physical world. The interactions are mediated by gauge fields modulated slightly by Higgs fields. There may be some new gauge fields, such as the extra Z 0 extension, the left-right model, or the family gauge symmetry, or others, but the first clue is the neutrino masses -and the next clue will be weaker and subtler, and even weaker. Here, besides the extra Z 0, we name the left-right model and the family gauge symmetry for the reason that the left-right symmetry is some symmetry missing (but for no reasons) while the duplication of the generations should be for some reasons. There are a bunch of dark matter out there -25% of the present Universe compared to only 5% ordinary matter. We have the Standard Model for the 5% ordinary matter and we should expect to have the theory to cover the 25% dark matter. When we get more knowledge on the dark matter, we may have pretty good handles of this Universe.
|
From Fingal's Harp to Flora's Song: Scotland, Music and Romanticism 1770s, Johnson had remarked on feudal survivals in the West ern Isles of Scotland as an intellectual curiosity. In the 1990s, the conflict between Keith Schellenberg, the former Laird of the Hebridean island of Eigg and those islanders who were until recently in a strictly feudal relationship with him, disap probation was expressed in terms of waste. The newspapers reported the islanders' characterization of the laird as a "playboy" who, in the words of The Times, "invited guests armed with tennis balls to reconstruct campaign battles in which Hanoverians triumphed over the Jacobites and... drove his 1927 Rolls-Royce Phantom around the island like Toad of Toad Hall." Schellenberg sued the papers for libel, but lost, his costs being estimated at a somewhat wasteful mil lion pounds. In return, Schellenberg called the islanders "rotten, dangerous and totally barmy revolutionaries." Even before this case was resolved in June, 1999, the islanders had ended feudalism by buying the property after raising money, ironically through the postmodern device of an internet appeal.
|
# 101 Things to Do with Cheese
### Melissa Barlow and Jennifer Adams
101 Things to Do with Cheese
Digital Edition v1.0
Text © 2010 Melissa Barlow and Jennifer Adams
All rights reserved. No part of this book may be reproduced by any means whatsoever without written permission from the publisher, except brief portions quoted for purpose of review.
Gibbs Smith, Publisher
PO Box 667
Layton, UT 84041
Orders: 1.800.835.4993
www.gibbs-smith.com
Library of Congress Catalog-in-Publishing Data
ISBN-13: 978-1-4236-0649-9
ISBN-10: 1-4236-0649-3
1. Cookery (Cheese) I. Barlow, Melissa. II. Adams, Jennifer. III. Title. IV. Title: One hundred one things to do with cheese.
TX759.B36 2010
641.6'73—dc22
2010008660
_For my sweet little Izzie—thanks for all the smiles. I love you! —MB_
_For Charlene Maynard, my Aunt Char, one of a kind. —JA_
# 101 Things to Do with Cheese
**Table of Contents**
Helpful Hints
Breakfasts
Appetizers
Soups
Salads
Breads & Sides
Pizza & Pastas
Main Dishes
Desserts
About the Authors
Metric Conversion Chart
# Helpful Hints
1. Many of the cheeses used in these recipes are interchangeable. If you don't like a cheese or can't find one, just use a different kind.
2. To easily cut or grate soft cheese like mozzarella, leave it in the refrigerator until just before you need it.
3. To easily cut or grate hard cheese like Parmesan, let it come to room temperature first.
4. Throw leftover cheese rinds into meatless soups for a big punch of flavor. Just make sure to pull the rind out before serving.
5. It takes refrigerated cream cheese about 1 hour before it comes to room temperature.
6. If you don't have time to let cream cheese come to room temperature, just soften in the microwave for about 25 to 30 seconds.
7. Store grated cheese in 2-cup increments in the freezer for easy use.
8. Do not freeze blocks of cheese—it changes the texture.
9. To melt cheese, bring to room temperature first. Then melt over a low heat and stir to help prevent separating.
10. Spray box graters with a touch of nonstick spray before grating to prevent cheese from sticking.
11. To prevent mold, wrap cheese in a clean cloth and refrigerate. Try dampening the cloth with a bit of salt water as well.
12. Baked cheesecakes freeze well. Just make sure to cool completely and then wrap multiple times with heavy-duty foil or with plastic wrap.
# Breakfasts
## Stuffed French Toast
8 slices bread
---
1 container (8 ounces) cheesecake-flavored cream cheese spread
1 container fresh raspberries or 4 tablespoons raspberry jam*
2 eggs
1/2 cup milk
cinnamon, to taste
raspberry or strawberry syrup, warmed
Lay bread slices on a flat surface. Spread 4 pieces with about 1 tablespoon cream cheese spread. Press raspberries into cream cheese or spread 1 tablespoon jam over top. Cover with remaining bread slices and press together.
In a pie pan, whisk together the eggs, milk, and cinnamon. Dip each side of the stuffed French toast in the egg mixture and then cook in a large skillet until golden brown on both sides. When done, serve on individual plates with syrup drizzled over top. Makes 4 servings.
*Blueberries or sliced strawberries may be substituted, as well as other jams.
## Grandpa's Eggs ala Goldenrod
12 eggs
---
4 tablespoons margarine or butter
4 tablespoons flour
1/2 teaspoon dry mustard
1/2 teaspoon salt
1/4 teaspoon white pepper
2 cups milk
2 cups grated cheddar cheese (or your favorite cheese), plus more for garnish
6 English muffins, split
Hard boil the eggs and keep warm. Place margarine in a medium saucepan and melt over medium-low heat. Blend in flour, dry mustard, salt, and pepper. Stir until well blended.
Add the milk, a little at a time, stirring constantly until mixture is smooth, bubbly, and thickened. Add cheese and stir until melted.
Toast the English muffins and then top each muffin half with 1 chopped hard-boiled egg, cheese sauce, and extra cheese. Makes 6 servings.
## Pumpkin Cream Cheese Muffins
1 package (8 ounces) cream cheese, room temperature
---
1 cup powdered sugar
2-1/4 cups flour
2 cups sugar
1/2 teaspoon salt
2 teaspoons baking powder
1/4 teaspoon baking soda
1 tablespoon pumpkin pie spice
2 eggs
1 can (15 ounces) pumpkin
3/4 cup oil
1/2 teaspoon vanilla
In a bowl, beat together the cream cheese and powdered sugar until smooth; set aside. In a second bowl, mix together the flour, sugar, salt, baking powder, baking soda, and pie spice. In a third bowl, whisk together the eggs, pumpkin, oil, and vanilla. Stir into dry ingredients until smooth.
Fill muffin tins about one-third full of batter and then drop a teaspoon of cream cheese filling in the center. Top off with a little more batter so muffin cup is two-thirds full. Bake at 350 degrees 20 to 25 minutes, or until a toothpick inserted in the center comes out clean. Makes about 24 muffins.
**Variation:** Add a streusel topping! Just combine 1/2 cup sugar, 1/4 cup flour, 4 tablespoons cold butter, and 1-1/2 teaspoons cinnamon. Mix with a fork until crumbly. Sprinkle over muffins before baking.
## Egg White Omelets
8 egg whites
---
2 to 3 tablespoons milk
1/4 cup cottage cheese
salt and pepper, to taste
1/2 cup toppings, such as cooked bacon or sausage, or diced ham, peppers, onions, mushrooms, grated cheese, etc.
Mix together the egg whites, milk, and cottage cheese. Season with salt and pepper. Pour half of the egg mixture into a heated saucepan sprayed generously with nonstick spray and let cook, swirling the pan occasionally to move uncooked egg to outer edge. Just before the egg is almost cooked and starting to brown slightly underneath, top half of it with desired toppings and then fold the remaining half of cooked egg over top. Let cook a couple minutes longer and then serve. Makes 2 omelets.
## Quiche
1/2 large onion, roughly chopped
---
4 to 5 mushrooms, thinly sliced
1 tablespoon olive oil
1/2 teaspoon minced garlic
1 (9-inch) premade piecrust
1-1/2 cups grated Swiss cheese
4 eggs
1-1/2 cups half-and-half
salt and pepper, to taste
Preheat oven to 425 degrees.
Saute the onion and mushrooms in oil until caramelized, about 3 to 5 minutes. Stir in garlic and then put mixture in the bottom of the piecrust. Cover with the cheese.
Beat eggs and half-and-half together with salt and pepper. Pour egg mixture over the cheese.
Bake 15 minutes, reduce the oven temperature to 300 degrees, and then bake 30 to 35 minutes longer, or until center is set. Let stand a few minutes before serving. Makes 6 to 8 servings.
**Variation:** Add cooked diced ham or bacon.
## Fruit and Creamy Dip
1 package (8 ounces) cream cheese, room temperature
---
1 container (6 ounces) lemon yogurt
1 jar (7 ounces) marshmallow crème
1/4 cup pineapple juice
1 cup whipped topping
strawberries, apples, pineapple, grapes, bananas, etc.
In a bowl, blend together the cream cheese, yogurt, marshmallow crème, and pineapple juice. Gently fold in the whipped topping.
Chill 1 to 2 hours and then serve with fruit. Makes 8 to 10 servings.
## Cheese Blintzes
2 eggs
---
2 tablespoons oil
1 cup milk
3/4 cup flour
1/2 teaspoon salt
1 tablespoon sugar
4 ounces cream cheese, softened
1 cup ricotta cheese
1/4 cup sugar
1 teaspoon vanilla
sour cream, berries, jam, powdered sugar, etc.
Beat together the eggs, oil, and milk. Add flour, salt, and sugar; beat until smooth. Chill batter for 30 minutes.
Spray a crepe pan or an 8-inch skillet with nonstick spray. Pour just under 1/3 cup batter onto pan and swirl to completely coat pan. Flip once crepe has lightly browned and cook until second side is done. Repeat until all batter is used.
Preheat oven to 350 degrees.
Beat together the cream cheese, ricotta cheese, sugar, and vanilla until smooth. Fill each crepe evenly with filling. Fold in the ends and then roll like a burrito. Place filled crepes in a 9 x 13-inch pan prepared with nonstick spray.
Bake 15 to 20 minutes, or until warmed through. Garnish individual servings with sour cream, berries, jam, powdered sugar, or whatever is desired. Makes 4 to 6 servings.
## Bacon, Egg, and Cheese Biscuits
1 tube (16 ounces) refrigerated large buttermilk biscuits
---
6 eggs
butter or margarine, optional
6 slices American cheese
6 slices cooked bacon
Bake biscuits according to package directions.
While biscuits bake, fry the eggs. When biscuits are done, cut in half and butter, if desired. Place a cheese slice on the bottom half of biscuit, top with a warm egg, add a piece of bacon, and top with other half of biscuit. Serve warm. Makes 6 sandwiches.
## Mini Pancake Stacks
2 cups pancake mix
---
1 cup milk
2 eggs
1 container (8 ounces) cheesecake-flavored cream cheese spread
boysenberry syrup, warm
In a bowl, combine pancake mix, milk, and eggs.
Heat a large skillet and spray with nonstick spray. Cook 3-inch round pancakes using all the batter; keep warm.
Place a warm pancake in the center of each plate and top with a thick layer of cream cheese spread. Repeat two more times so you have 3 pancakes stacked on each plate and cream cheese spread on top of each. Pour warm syrup over top and serve. Makes 4 to 6 servings.
**Variation:** Use any syrup your family likes—they all taste delicious!
## Breakfast Casserole
1 package (32 ounces) shredded hash browns, cooked according to package directions
---
1/2 pound sausage, browned and drained
1/2 pound bacon, cooked and crumbled
10 to 12 eggs
salt and pepper, to taste
1-1/2 to 2 cups grated cheddar cheese
Preheat oven to 350 degrees.
Place prepared hash browns in the bottom of a 9 x 13-inch pan prepared with nonstick spray. Spread the sausage and bacon over top.
Scramble the eggs in a skillet until almost cooked through. Season with salt and pepper and then stir in 1/2 cup cheese. Pour eggs over meats and spread remaining cheese over top to cover. Bake 30 minutes. Serve with ketchup, if desired. Makes 8 to 10 servings.
**Variations:** You can use 1 pound of any favorite breakfast meat such as sausage, bacon, or ham, or any combination of breakfast meats to equal 1 pound.
# Appetizers
## Terry's Totally Yummy Cheeseball
2 packages (8 ounces each) cream cheese, room temperature
---
4 tablespoons butter or margarine, room temperature
2 cups finely grated cheddar cheese
2 tablespoons milk
2 tablespoons finely chopped green onions
2 tablespoons chopped pimientos
2 teaspoons Worcestershire sauce
1 dash hot pepper sauce
1 cup chopped walnuts or pecans
Mix together the cream cheese and butter. Stir in all the remaining ingredients except the nuts and mix well. Cover and chill 4 to 24 hours.
Shape into a ball and roll in nuts. Serve with your favorite crackers. Makes 12 to 15 servings.
## Jalapeño Poppers
1 package (8 ounces) cream cheese, room temperature
---
1 cup grated pepper jack cheese
16 jalapeño peppers, seeded and halved
1/2 cup or more milk
1/2 cup or more flour
1/2 cup or more breadcrumbs
oil, for frying
In a medium bowl, mix together the cheeses. Spoon this mixture into the halved jalapeños.
Put the milk and flour and breadcrumbs into separate bowls. Dip the stuffed jalapeños first into the milk then into the flour, making sure they are well coated with each. Set on paper towels to let dry for about 10 minutes.
Dip stuffed jalapeños a second time in milk and then roll in the breadcrumbs; let dry. Dip a third time in milk and then roll in breadcrumbs again until completely coated with breadcrumbs.
In a medium skillet, heat the oil until it is hot but not smoking. Deep-fry the coated jalapeños 2 to 3 minutes each, or until golden brown. Remove and let drain on paper towels. Serve hot. Makes 16 servings.
## Mozzarella Sticks
2 eggs
---
1-1/2 cups Italian seasoned breadcrumbs
1/2 teaspoon garlic powder
8 sticks mozzarella string cheese, cut in half
oil, for deep-frying
In a small bowl, beat the eggs and set aside. In a separate bowl, mix the breadcrumbs and garlic powder.
In a heavy saucepan, heat oil until it is hot but not smoking. Dip each mozzarella stick in the egg and then in the breadcrumbs. Let dry and then repeat so the cheese sticks are double coated.
Heat oil in a deep-fryer until hot. Fry coated cheese in batches until golden brown, about 30 to 45 seconds. Remove from heat and drain on paper towels. Serve hot with warm marinara sauce for dipping, if desired. Makes 8 servings.
## Cheesy Fondue
2 cups shredded Gruyere cheese
---
2 cups shredded Swiss cheese
3 tablespoons flour
1/2 teaspoon dry mustard
3/4 cup sparkling apple cider
1/2 teaspoon Worcestershire sauce
Mix all ingredients in a fondue pot. Heat until cheese is melted and fondue is warmed through. Add more cider if fondue is too thick, or add a little more flour if fondue is too thin. Serve with raw vegetables or chunks of bread for dipping. Makes 8 servings.
## Blue Cheese and Bacon Dip
6 to 7 slices bacon
---
2 cloves garlic, minced
1 package (8 ounces) cream cheese, softened
1/4 cup half-and-half
1 cup blue cheese crumbles
2 tablespoons chopped fresh chives
Cook bacon in a large skillet over medium-high heat until crisp. Drain on paper towels. When cool enough to handle, crumble bacon. Drain excess fat from skillet and add garlic. Cook garlic about 3 minutes.
Preheat oven to 350 degrees. In a medium-size bowl, beat cream cheese until smooth. Add half-and-half and mix until combined. Stir in crumbled bacon, garlic, blue cheese, and chives. Transfer to a small ovenproof serving dish and cover with foil.
Bake until thoroughly heated, about 30 minutes. Serve with crackers, French bread, or apple slices. Makes 6 to 8 servings.
## Baked Brie
1 package frozen puff pastry sheets, room temperature
---
1 egg
1 tablespoon water
1 wheel (15 ounces) Brie
egg wash (egg mixed with a small amount of water or milk)
Preheat oven to 350 degrees.
Whisk together egg and water in a small bowl. Open and flatten pastry sheets. Place wheel of Brie in the center and wrap pastry sheets to cover it. Cut off excess pastry dough and form loose ends of dough together to make a seam. Seal seam with egg wash.
Place wrapped Brie seam side down on a baking sheet. Brush top and sides with egg wash and bake 20 minutes, or until pastry is golden brown. Let stand 1 hour before serving. Serve with red grapes or a little raspberry jam on the side. Makes 8 servings.
## Mini Cheddar Biscuits
2 cups biscuit baking mix
---
1 cup shredded cheddar cheese
1/2 teaspoon garlic powder
2/3 cup milk
2 tablespoons butter or margarine, melted
1 teaspoon garlic salt
Preheat oven to 400 degrees. Spray a baking sheet with nonstick cooking spray and set aside.
In a large bowl, combine baking mix, cheese, and garlic powder. Stir in milk. Roll out dough on a floured surface. Cut biscuits with 1-inch round cookie cutters into desired shapes. Place on prepared baking sheet.
Bake 10 minutes. Remove and brush biscuits with melted butter. Sprinkle with garlic salt. Bake 5 minutes more, or until lightly browned. Makes 12 biscuits.
## Mini Quiches
1 box refrigerated piecrust
---
1 cup cubed ham
1/4 cup chopped green onions
3 eggs
salt and pepper, to taste
1 cup half-and-half
1 cup grated cheddar cheese
Cut piecrust in 24 small circles to fit into the bottoms of mini muffin cups.
Cook bacon until crispy. Drain on paper towels. Drain all but 2 tablespoons bacon grease from pan. When bacon is cool enough to handle, crumble into pieces and return to frying pan. Add mushrooms and onions, and saute over medium heat for just a few minutes. Spoon a little into each muffin cup.
In a bowl, beat eggs, salt, and pepper; add half-and-half and mix well. Fill each mini muffin cup with the mixture until almost full. Sprinkle cheese over top. Bake at 375 degrees 20 to 30 minutes, or until done. Makes 8 servings.
## Caprese Bites
1 basket cherry tomatoes
---
1 container (12 ounces) mini fresh mozzarella balls
fresh basil leaves
extra virgin olive oil
balsamic vinegar
salt and pepper, to taste
On toothpicks or appetizer toothpicks, spear 1 tomato, 1 mini mozzarella ball, and 1 basil leaf. Repeat until all the tomatoes and/or cheese are used. Set on serving tray. Drizzle with oil and vinegar, and sprinkle with salt and pepper. Makes 16 servings.
## Spicy Queso
1 onion, diced
---
2 tablespoons oil
1 can (10 ounces) diced Rotel tomatoes
1 can (4 ounces) diced green chiles
1 clove garlic, minced
1 pound processed American cheese, cubed
Saute onion in oil until transparent. Stir in the tomatoes and chiles, and simmer 15 to 20 minutes. Add the garlic and saute a few minutes more. Stir in cheese until melted. Serve with chips. Makes 16 to 20 servings.
## Spence's Cheesy Chip Dip
1 can (15 ounces) refried beans
---
1 can (15 ounces) black beans, rinsed and drained
1 can (10 ounces) diced Rotel tomatoes, drained
1 can (4 ounces) green chiles
1 can (3.8 ounces) sliced or diced olives
1 cup grated Monterey Jack cheese
1 cup grated cheddar cheese
shredded lettuce, optional
sour cream, optional
diced avocado, optional
Spread the refried beans in the bottom of a deep glass dish. Sprinkle black beans over top. Layer tomatoes, green chiles, and olives over top. Then layer with the cheeses.
Place container in the microwave and heat about 3 to 5 minutes until cheese has melted. Once cheese is melted and the dip is completely warmed through, it is ready to serve. Garnish with lettuce, sour cream, and avocado, if desired. Serve with tortilla chips for dipping. Makes 8 servings.
## Stuffed Mushrooms
1 pound spicy Italian sausage
---
1/3 cup Italian breadcrumbs
1/4 cup grated Parmesan cheese, plus more
1/4 cup grated mozzarella cheese
1 teaspoon minced garlic
30 mushrooms, stems removed
2 teaspoons olive oil
Preheat the oven to 350 degrees.
In a frying pan, cook the sausage until crumbly and brown. Place cooked sausage in a bowl and then stir in the breadcrumbs and cheeses until well combined.
Saute the garlic and mushrooms in olive oil for just a few minutes so they are slightly cooked. Place mushrooms on a baking sheet and fill with the sausage stuffing. Sprinkle extra Parmesan cheese over top and then bake 15 minutes. Makes 10 servings.
## Spinach and Artichoke Dip
1 jar (14 ounces) artichoke hearts, drained and chopped
---
1/2 package (10 ounces) frozen chopped spinach, thawed and drained
1/2 cup sour cream
1/4 cup mayonnaise
4 ounces cream cheese
1/2 cup grated Romano cheese
1/2 teaspoon minced garlic
salt and pepper, to taste
Preheat the oven to 375 degrees. Lightly coat a baking dish with nonstick cooking spray.
In a bowl, mix together all ingredients and then pour into prepared baking dish. Bake 20 to 25 minutes, or until heated through and lightly browned on top. Makes 12 to 14 servings.
## Creamy Fruit Dip
1 package (8 ounces) cream cheese, softened
---
3 tablespoons sugar
1 cup sour cream or mascarpone cheese
1 teaspoon vanilla or almond extract
Combine all ingredients and beat until smooth and creamy. Serve with fresh fruit for dipping. Makes 12 servings.
## Lisa's Goat Cheese and Olive Tapenade
1 jar (3 ounces) green olives with pimientos
---
1/2 can (6 ounces) black olives
1 to 2 cloves garlic
1/4 cup red wine vinegar
squeeze lemon juice
black pepper, to taste
2 teaspoons olive oil
8 ounces goat cheese
To make tapenade, put everything but the goat cheese into a food processor and chop. Serve with goat cheese and sliced bread or crostini slices. Makes 6 to 8 servings.
# Soups
## Wisconsin Cheese Soup
2 cups sliced carrots
---
2 cups chopped broccoli
2 cups chicken broth
1/2 cup chopped onion
1/4 cup plus 2 tablespoons butter
1/4 cup plus 2 tablespoons flour
1/4 teaspoon ground black pepper
3 cups milk
1 pound Velveeta cheese, cubed
1/8 to 1/4 teaspoon cayenne pepper
1/2 teaspoon dry mustard
In a small saucepan over medium-high heat, combine carrots, broccoli, and chicken broth. Bring to a boil. Cover, reduce heat, and simmer 5 minutes. Remove from heat and set aside.
In a large saucepan, cook onion in butter over medium heat until onion is translucent. Stir in flour and pepper. Add milk and stir continuously over medium heat until soup is thickened. Stir in cheese, cayenne pepper, and mustard, and heat through. Makes 4 to 6 servings.
## White Cheddar Broccoli Soup
2 to 3 teaspoons olive oil
---
1/3 cup chopped onion
1 teaspoon minced garlic
5 cups broccoli florets
4 cups chicken broth
3/4 cup water
2 cups half-and-half
2-1/2 cups grated white cheddar cheese
1/2 cup flour
1/4 teaspoon ground black pepper
salt, to taste
In a frying pan, heat the oil and saute onion and garlic until tender. Add broccoli and saute a few minutes more, making sure the broccoli is still crisp.
In a large pot over medium-high heat, combine the broth, water, half-and-half, cheese, flour, and pepper. Whisk together to break up any lumps. Bring to a boil and reduce heat to low. Stir in the broccoli mixture and simmer 15 minutes, or until broccoli is tender. Add salt to taste. Makes 4 to 6 servings.
## Cheesy Chicken Corn Chowder
1/4 cup plus 2 tablespoons butter
---
1/2 cup diced onion
1/4 cup plus 2 tablespoons flour
4 1/2 cups milk
2 cups shredded rotisserie chicken
1 can (15 ounces) Niblets corn, drained
1 can (4 ounces) diced green chiles
1-1/2 cups Monterey Jack cheese
salt and pepper, to taste
In a large soup pot, melt butter over medium heat. Saute onion in butter until soft. Stir in flour and cook 2 minutes. Gradually stir in milk. Return to heat and cook, stirring constantly, until thickened. Stir in chicken, corn, chiles, and cheese. Season with salt and pepper. Cook until cheese is melted; ladle into soup bowls and serve. Makes 6 servings.
## French Onion Soup
3/4 cup butter
---
2 tablespoons olive oil
5 to 6 cups thinly sliced onions
1 clove garlic, minced
6 cans (10.5 ounces each) beef broth
1 tablespoon Worcestershire sauce
1 teaspoon thyme, optional
6 slices French bread, toasted
2 to 3 cups shredded Gruyere cheese
Melt the butter with olive oil in large soup pan over medium heat. Add onions and stir occasionally until browned and nicely caramelized, about 30 minutes. Add garlic and cook a few minutes more. Add the broth, Worcestershire sauce, and thyme, if using, and simmer 20 minutes more.
Heat the oven to broil. Ladle the soup into oven-safe bowls and float the toasted bread on top. Layer 1/2 cup cheese over each slice of bread. Place bowls on a baking sheet and broil until the cheese bubbles and is slightly brown. Makes 6 servings.
## Swiss Cheese and Sausage Soup
1 pound sausage
---
1 onion, diced
6 red potatoes, unpeeled and cubed
1 cup diced leek
4 to 5 cans (14 ounces each) chicken broth
1 pound Swiss cheese, grated
1 can (12 ounces) evaporated milk
salt and pepper, to taste
In a frying pan, brown the sausage and then stir in the onion; saute a few minutes until tender. Scoop mixture into a bowl lined with paper towels and set aside.
Place the potatoes and leek into a soup pot. Pour in enough broth to cover the vegetables by 1 inch. Bring to a boil and simmer over medium heat 15 minutes. Add the sausage and onion mixture, and cook 10 to 15 minutes more, or until potatoes are tender. Reduce heat to low and stir in cheese and evaporated milk. Cook until just heated through and cheese is melted. Makes 6 servings.
## Creamy Cauliflower Soup
1 can (15 ounces) chicken broth (or 2-1/2 cups water)
---
2 cups chopped cauliflower
2 cups peeled and cubed potatoes
3/4 cup finely chopped celery
1/2 cup chopped onion
1/4 cup plus 2 tablespoons butter
1/4 cup plus 2 tablespoons flour
4 1/2 cups whole milk
salt and pepper, to taste
1 cup grated cheddar cheese
In a large saucepan, combine the chicken broth or water and vegetables. Cover and bring to a boil. Boil 10 to 12 minutes, or until vegetables are tender; set aside.
In a large soup pot, melt butter over medium heat. Stir in flour and cook 2 minutes. Remove from heat and gradually stir in milk. Return to heat and cook, stirring constantly, until thickened. Stir in vegetables with cooking liquid; season with salt and pepper. Stir in cheese until melted and remove from heat. Makes 6 servings.
## Spinach and Blue Cheese Soup
3/4 cup chopped onion
---
2 tablespoons olive oil
1/2 cup flour
6 cups chicken broth
2 cups milk
4 ounces blue cheese, crumbled
1 package (10 ounces) frozen chopped spinach, thawed
1/2 cup heavy cream
salt, to taste
1/2 teaspoon nutmeg
1/2 teaspoon cayenne pepper
6 strips bacon, cooked and crumbled
In a large pot over medium heat, saute onion in olive oil about 3 minutes. Add flour and stir well until mixed. Add broth, raise heat to high, and bring to a boil.
Add milk, reduce heat to medium, and simmer 5 minutes. Add the cheese and stir until blended; then add the spinach and cook 3 minutes more. Add the cream, bring just to a boil, turn off heat, and stir well. Add salt, nutmeg, and cayenne pepper. Ladle into individual bowls and sprinkle with bacon. Makes 4 to 6 servings.
## Baked Potato Soup
1/4 cup plus 2 tablespoons butter
---
1/2 cup diced onion
1/4 cup finely diced carrot
1/4 cup plus 2 tablespoons flour
1 quart half-and-half
2 large potatoes, baked
4 strips bacon, cooked and crumbled, divided
1-1/2 cups grated cheddar cheese, plus more for garnish
Melt butter in a soup pot and add onion and carrot; cook until tender. Stir in flour. Cook 2 minutes more. Add half-and-half; cook, stirring constantly, until thickened. Scoop out centers of baked potatoes and add to soup. Roughly chop skins and add. Stir in half the cooked bacon and 1 cup cheese. Ladle into soup bowls. Garnish with remaining bacon and cheese. Makes 4 servings.
## Tomato Cream Cheese Soup
1 medium onion, chopped
---
2 tablespoons butter or margarine
1 to 2 cloves garlic, minced
2 cans (14.5 ounces each) crushed tomatoes
2 cans (14 ounces each) Progresso tomato soup
1/2 tablespoon fresh chopped basil or 2 teaspoons dried basil
1/2 teaspoon paprika
1 package (8 ounces) mascarpone or cream cheese, cubed
In a saucepan, saute onion in butter until tender. Add garlic and cook a few minutes more. Add remaining ingredients except cheese and heat through. Stir in cheese until melted. Serve immediately. Makes 6 to 8 servings.
## Chicken, Broccoli, and Wild Rice Soup
1 cup wild rice
---
6 cups chicken broth
1 package (10 ounces) frozen chopped broccoli, thawed
1 to 1-1/2 cups thinly sliced carrots
1/4 cup diced onion
1 can (10.5 ounces) cream of chicken soup, condensed
1 package (8 ounces) cream cheese, cut into chunks
1-1/2 to 2 cups rotisserie chicken, cut into bite-size pieces
water, if needed
In a large soup pan, combine rice and broth, and bring to a boil. Reduce heat, cover, and simmer 10 to 15 minutes, stirring occasionally. Stir in the broccoli, carrots, and onion. Cover and simmer 10 minutes, or until vegetables are tender. Stir in the soup, cream cheese, and chicken. Cook and stir until cheese is melted. Thin with water if soup is too thick. Makes 6 to 8 servings.
## Three-Cheese Potato Soup
6 potatoes, peeled and cubed
---
1 cup finely chopped carrots
1 cup finely chopped celery
3 cups chicken broth or vegetable broth
salt, to taste
2 cups milk
3 tablespoons butter or margarine, melted
4 tablespoons flour
2 teaspoons Montreal Steak Seasoning
1 teaspoon black pepper
1 cup each grated cheddar, Monterey Jack, and Gouda cheeses
In a large pot over medium heat, combine the potatoes, carrots, celery, broth, and salt. Bring to a boil and then reduce heat; cover and simmer until potatoes are tender, about 15 to 20 minutes. Stir in milk.
In a small bowl, combine butter, flour, steak seasoning, and pepper. Stir into soup over medium heat. Cook, stirring until thick and bubbly. Remove from heat and stir in cheeses until melted. Makes 4 to 6 servings.
## Nacho Cheese Soup
1 pound ground beef
---
1 red or green bell pepper, chopped
1 small yellow onion, chopped
1 jar (15 ounces) Queso dip
1 can (10.5 ounces) nacho cheese soup, condensed
4 cups milk
1 can (11 ounces) Niblets corn
Cook ground beef, bell pepper, and onion together in a soup pot. Drain fat. Stir in remaining ingredients and heat through. Serve with tortilla chips. Makes 4 to 6 servings.
# Salads
## Strawberry and Blue Cheese Salad
1 head romaine lettuce, torn into bite-size pieces
---
1 container (1 pound) strawberries, washed and sliced
3/4 to 1 cup blue cheese crumbles
1/2 to 3/4 cup sliced honey-roasted almonds
1 bottle poppy seed dressing
In a large bowl, layer the lettuce, strawberries, cheese, and almonds. Just before serving, toss with the desired amount of dressing. Makes 8 to 10 servings.
## Orzo Salad with Feta
1 cup uncooked orzo pasta
---
1/2 cup sliced green olives
1 cup crumbled feta cheese
1/4 cup chopped fresh parsley
6 to 8 cherry tomatoes, halved or quartered
1 yellow bell pepper, seeded and cut into cubes*
1 cup Greek vinaigrette (or other favorite vinaigrette)
Cook the orzo according to package directions; rinse and drain. When cool, combine the orzo in a bowl with the olives, cheese, parsley, tomatoes, and bell pepper. Toss with the dressing and serve. Makes 4 to 6 servings.
*Substitute 1/2 cup chopped roasted red pepper, or more if desired.
## Pear, Gorgonzola, and Candied Pecan Salad
1 head romaine or leafy green lettuce, torn into bite-size pieces
---
2 pears, washed and cut into bite-size pieces*
3/4 to 1 cup crumbled Gorgonzola cheese
1 cup candied pecans
3/4 cup dried cranberries or cherries
3/4 cup real bacon crumbles
red wine vinaigrette
In a large bowl, layer all salad ingredients.
Just before serving, toss with the dressing. Makes 8 servings.
*Toss with a little lemon juice to prevent browning.
## Cottage Cheese Salad
1 container (16 ounces) cottage cheese
---
garlic powder, to taste
salt and pepper, to taste
1/2 teaspoon dill, optional
4 iceberg lettuce leaves, left whole
8 to 10 cherry tomatoes, halved or quartered depending on size
1 cucumber, sliced or chopped
1/2 cup chopped celery
In a bowl, combine the cottage cheese and seasonings; chill. Scoop 1/2 cup cottage cheese mixture into each lettuce leaf. Top each with tomatoes, cucumber, and celery, and then serve. Makes 4 servings.
**Variation:** Sprinkle cooked and crumbled bacon over top.
## BBQ Chicken and Smoked Gouda Salad
1/2 to 1 pound grilled chicken breast, cut into cubes
---
1/2 cup BBQ sauce, plus more
1 head leafy green or romaine lettuce, torn into pieces
4 to 8 ounces smoked Gouda cheese, cut into small cubes
1 to 2 avocados, diced*
1/2 red onion, thinly sliced
1/2 cup real bacon bits
ranch dressing
Toss the chicken in BBQ sauce. Layer the lettuce, chicken, cheese, avocado, onion, and bacon on individual serving plates. Serve with ranch dressing and more BBQ sauce on the side. Makes 8 to 10 servings.
*Toss with a little lemon juice to prevent browning.
**Variation:** Add diced tomato or red bell pepper.
## Simple Goat Cheese Salad
1 bag (6 ounces) baby spinach
---
2 cups halved seedless red grapes
1 container (6 ounces) goat cheese, crumbled
1 cup coarsely chopped candied pecans*
raspberry vinaigrette dressing
Layer all salad ingredients except dressing in a large bowl. Toss with dressing just before serving, or allow individuals to dress their own salads. Makes 8 to 10 servings.
*Walnuts and cashews may be substituted.
## Southwest Layered Salad
1 head romaine lettuce, torn into bite-size pieces
---
2 cups grated pepper jack cheese
1 can (15 ounces) black beans, rinsed and drained
1 cup frozen corn, thawed
1 large red bell pepper, diced
1 cup crushed Fritos corn chips
ranch dressing
salsa
In a large bowl, layer the lettuce, cheese, beans, corn, bell pepper, and chips. Combine 2 parts ranch dressing with 1 part salsa (or more if desired). Serve dressing on the side or toss just before serving. Makes 8 to 10 servings.
**Variation:** For a heartier salad, add a layer of grilled chicken cooked with a little taco seasoning or with lime juice, salt, and pepper.
## Cheesy Broccoli and Bacon Salad
### Dressing
1 cup mayonnaise
---
2 tablespoons red wine vinegar
1/2 cup sugar
### Salad
6 cups broccoli florets
---
1-1/2 cups red grape halves
1/2 red onion, chopped or thinly sliced
1 pound bacon, cooked and crumbled
2-1/2 cups grated sharp cheddar cheese
3/4 to 1 cup cashew pieces
In a bowl, combine all the dressing ingredients together and set aside.
In a large bowl, combine all the salad ingredients. Pour dressing over top and stir. Refrigerate 1 hour before serving for flavors to blend. Makes 8 to 10 servings.
## Greek Salad
1 cucumber, halved and then sliced
---
1 container (6 ounces) crumbled feta cheese
1/2 cup kalamata olives, pitted
1 cup chopped Roma tomatoes
1/2 red onion, thinly sliced
1/2 cup balsamic vinaigrette or Greek salad dressing
6 cups torn romaine lettuce
Toss all ingredients together except the lettuce in a large bowl and let chill 1 to 2 hours before serving. Remove from refrigerator, toss in lettuce, and serve. Add more dressing to coat, if necessary. Makes 6 to 8 servings.
## Caprese Salad
3 to 4 large tomatoes, cut into slices
---
2 pounds fresh mozzarella, cut into slices
1/4 cup freshly chopped basil
balsamic vinaigrette
salt and pepper, to taste
On a platter, alternate the tomato and mozzarella slices. Sprinkle with basil and then drizzle desired amount of balsamic vinaigrette over top. Season with salt and pepper. Makes 6 to 8 servings.
## Tortellini Pasta Salad
### Dressing
3/4 cup sugar
---
3/4 cup mayonnaise
1 tablespoon cider vinegar
### Salad
3 cups broccoli florets
---
3/4 cup diced roasted red peppers
1 pound chicken, cooked and cubed
1 package (13 ounces) cheese tortellini, cooked and cooled
1 pound bacon, cooked and crumbled
1/2 cup sunflower seeds
1 cup crumbled feta cheese
In a small bowl, combine the sugar, mayonnaise, and vinegar until smooth; set aside.
In a large bowl, combine salad ingredients and then pour dressing over top. Chill 1 to 2 hours before serving. Makes 6 servings.
**Variation:** Make extra dressing for an extra creamy salad.
## Feta Pasta Salad
12 ounces penne or rotini pasta, cooked and cooled
---
1 green bell pepper, diced
1 red bell pepper, diced
1 container grape tomatoes*
1 cup firmly packed fresh baby spinach
1 container (6 ounces) crumbled feta cheese
1 to 1-1/2 cups Caesar salad dressing
Gently combine all ingredients until nicely coated with dressing. Refrigerate until ready to serve; add more dressing to moisten, if necessary. Makes 8 servings.
*Substitute 1/2 to 1 cup chopped sun-dried tomatoes.
## Ham, Swiss, and Artichoke Pasta Salad
1 jar (14.5 ounces) marinated artichoke hearts, quartered
---
2 cups cubed ham
4 to 6 ounces Swiss cheese, cubed
3/4 cup minced fresh parsley
10 to 12 ounces rotini pasta, cooked and cooled
1-1/2 tablespoons Dijon mustard
1/3 cup olive oil
salt and pepper, to taste
Drain the artichoke hearts and reserve about 1/2 cup of the marinade.
In a large bowl, toss together the artichoke hearts, ham, cheese, parsley, and pasta.
Combine reserved marinade, mustard, and olive oil. Toss with salad ingredients and then season with salt and pepper. Chill until ready to serve. Makes 6 to 8 servings.
## Three-Cheese Baked Potato Salad
3 to 3-1/2 pounds red or new potatoes, cooked and cubed
---
4 green onions (green part only), thinly sliced
1 cup mayonnaise
1 cup sour cream
1 tablespoon mustard
1/4 cup milk
1 pound bacon, cooked and crumbled
4 ounces sharp cheddar cheese, cubed
4 ounces Monterey Jack cheese, cubed
4 ounces Swiss or Gruyere cheese, cubed
salt and pepper, to taste
In a large bowl, combine the potatoes and green onions; set aside.
In a small bowl, combine the mayonnaise, sour cream, mustard, and milk. Spoon over potato mixture and gently stir until completely covered. Stir in bacon and cheeses, and season with salt and pepper. Chill until ready to serve. Garnish with more green onions and bacon, if desired. Makes 8 to 10 servings.
## Gorgonzola Potato Salad
2-1/2 to 3 pounds red potatoes, cut into bite-size pieces
---
1/3 cup olive oil
3 tablespoons red wine vinegar
1 tablespoon Dijon mustard
1 bunch chives or 3 to 4 green onions, chopped
1 container (5 ounces) crumbled Gorgonzola cheese
1/2 pound bacon, cooked and crumbled
salt and pepper, to taste
Boil potato pieces in salted water until tender, about 12 to 15 minutes; drain and cool completely.
In a large bowl, whisk the oil, vinegar, and mustard together until smooth. Add the cooled potatoes, chives, cheese, and bacon. Toss gently to coat. Season with salt and pepper. Makes 6 servings.
# Breads & Sides
## Cheesy Garlic Bread
1/4 cup butter or margarine, softened
---
3 to 4 cloves garlic, finely minced
1/2 teaspoon Italian seasoning
6 tablespoons grated fresh Parmesan cheese, divided
1 loaf French bread, sliced in half lengthwise
6 to 8 slices provolone cheese*
Preheat oven to broil.
In a bowl, combine the butter, garlic, seasoning, and 3 tablespoons Parmesan cheese. Evenly spread mixture on cut sides of bread and then place bread on an ungreased baking sheet covered with foil. Sprinkle with remaining Parmesan cheese and then place provolone slices evenly over top. Broil 2 to 3 minutes, or until golden brown. Serve warm. Makes 6 to 8 servings.
*Havarti cheese also works well here.
## Gooey Onion-Olive Bread
1/4 cup butter or margarine, softened
---
4 to 5 cloves garlic, finely minced
1 loaf French bread, sliced in half lengthwise
1/2 to 3/4 cup chopped onion
1 teaspoon extra virgin olive oil
1/2 cup diced black or green olives
5 tablespoons grated Parmesan cheese
2 to 3 cups grated mozzarella or provolone cheese
Preheat oven to broil.
In a bowl, combine the butter and garlic. Evenly spread mixture on cut sides of bread and then place bread on an ungreased baking sheet covered with foil; set aside.
In a frying pan, saute the onion in oil until lightly browned. Stir in olives and then spread evenly over bread. Sprinkle cheeses over top. Broil 2 to 3 minutes, or until golden brown. Serve warm. Makes 6 to 8 servings.
## Cheddar Garlic Biscuits
2 cups biscuit mix
---
1-1/2 cups grated sharp cheddar cheese
2/3 cup milk
3 to 4 tablespoons butter or margarine, melted
1/4 teaspoon garlic powder
Preheat oven to 450 degrees.
In a bowl, combine the biscuit mix and cheese. Stir in milk until moist. Drop by large spoonfuls onto a lightly sprayed baking sheet or a baking stone. Bake 9 to 12 minutes, or until golden brown. Combine the butter and garlic powder, and brush over hot biscuits. Serve warm. Makes 6 to 9 large biscuits.
## Italian Biscuit Bites
1 tube (16 ounces) jumbo refrigerator buttermilk biscuits
---
1/2 cup grated Parmesan cheese
1 teaspoon garlic powder
1/2 teaspoon basil or oregano
5 to 6 tablespoons butter, melted
marinara sauce, for dipping
Preheat oven to 400 degrees.
Cut each biscuit into fourths; set aside. Combine cheese and seasonings, and set aside. Dip each biscuit in butter and then roll in cheese mixture. Bake on a lightly greased baking sheet 10 to 12 minutes, or until golden brown. Serve warm with marinara sauce on the side. Makes 6 to 8 servings.
## Dill and Cheddar Scones
2-1/4 cups flour
---
1-1/2 teaspoons baking powder
1-1/2 teaspoons garlic salt
1/2 cup cold butter or margarine, cubed
3/4 cup milk
2 cups grated sharp cheddar cheese
2 teaspoons dill
melted butter, optional
Preheat oven to 400 degrees.
In a bowl, combine the flour, baking powder, and garlic salt. Cut in butter until mixture is crumbly.
In another bowl, combine the milk, cheese, and dill. Stir into flour mixture until doughy but still a little crumbly.
Press dough into 6 baseball-size balls and then flatten into triangles that are about 1 inch thick on a greased baking sheet. Bake 18 to 23 minutes or until golden brown. Brush with melted butter before serving, if desired. Makes 6 to 8 servings.
## Parmesan Garlic Breadsticks
1 cup freshly grated Parmesan cheese
---
1-1/2 teaspoons garlic salt
12 Rhodes freezer rolls, thawed but still cold
1/2 cup butter or margarine, melted
Combine cheese and garlic salt in a medium bowl; set aside. Roll out each thawed ball of dough into 2-inch-wide strips about 6 inches long. Dip in melted butter and then roll in cheese mixture to coat.
Place in the bottom of a 9 x 13-inch pan. Let rise until about double in size and then cover with any remaining cheese, butter, and more garlic salt, if desired.
Preheat oven to 350 degrees. Bake breadsticks 18 to 20 minutes, or until lightly browned. Makes 12 servings.
## Spicy Cornbread
1 box (8.5 ounces) cornbread mix
---
2 ounces canned diced jalapeños
1 cup grated pepper jack cheese
Make the cornbread batter according to package directions. Stir in the jalapeños and cheese. Pour batter into a greased 8-inch square baking pan. Bake according to package directions, or until a toothpick inserted in the center comes out clean. Cut into squares and serve. Makes 6 to 9 servings.
## Asiago Mashed Potatoes
2-1/2 pounds russet potatoes, peeled and boiled
---
1 tablespoon butter
1/4 cup milk
garlic salt and pepper, to taste
1 teaspoon Italian seasoning
2 to 3 tablespoons sour cream
3/4 cup grated Asiago cheese
Using a potato masher, mash the warm potatoes with the butter and milk. Season with garlic salt, pepper, and Italian seasoning. When creamy, stir in the sour cream and cheese until thoroughly mixed in. Serve warm. Makes 4 to 6 servings.
## Easy Cheesy Spinach Risotto
1 to 2 tablespoons extra virgin olive oil
---
2 cloves garlic, minced
1/2 small yellow onion, finely chopped
2 cans (14 ounces each) chicken broth
2 cups uncooked orzo
3/4 cup grated Romano or Parmesan cheese
3/4 cup grated Colby Jack cheese
2 cups packed chopped spinach
salt and pepper, to taste
Heat olive oil in a large saucepan over medium heat. Saute the garlic and onion in oil until tender. Stir broth into the pan and bring to a boil. Add orzo and reduce heat to low. Cover with lid, stirring occasionally, 10 to 15 minutes, or until orzo has absorbed all the liquid. Add more liquid if mixture seems a little dry. Stir in cheese and spinach, and season with salt and pepper. Serve warm. Makes 6 to 8 servings.
## Baked Cauliflower
1 head cauliflower, cut into florets
---
2 to 3 tablespoons butter, cut into pieces
1/4 cup mayonnaise
1-1/2 tablespoons mustard
3/4 cup grated Parmesan cheese
1 teaspoon minced garlic
1/4 cup grated white cheddar or sharp cheddar cheese
Preheat oven to 375 degrees.
Steam cauliflower 10 to 15 minutes, or until slightly tender; drain.
Combine the remaining ingredients except the cheddar cheese and then gently stir in cauliflower. Pour into a 9-inch square pan and sprinkle cheddar over top. Bake about 25 minutes, or until cheese is lightly browned. Makes 4 to 6 servings.
## Layered Potato Casserole
1/2 cup butter, melted
---
3 to 4 russet potatoes, peeled and thinly sliced
garlic salt
freshly grated Parmesan cheese
2 to 3 yams or sweet potatoes, peeled and thinly sliced
Preheat oven to 425 degrees.
Lightly coat the bottom of a 9 x 13-inch pan with a little melted butter. Cover the bottom of the pan with a layer of russet potatoes. Sprinkle with a little garlic salt and a layer of cheese. Layer some yams or sweet potatoes over top and sprinkle with garlic salt and another layer of cheese. Repeat layers until potatoes are gone and pan is full. Drizzle remaining butter over top. Bake 35 to 40 minutes, or until potatoes are tender. Makes 10 to 12 servings.
## Creamy and Cheesy Pan Potatoes
1 container (16 ounces) sour cream
---
1/4 cup butter, melted
1 teaspoon onion powder
2 cans (10.5 ounces each) cream of chicken soup, condensed
3 cups grated cheddar cheese, divided
1 bag (30 ounces) frozen shredded hash browns, thawed
Preheat oven to 350 degrees. Spray a 9 x 13-inch glass pan with nonstick spray and set aside.
In a large bowl, combine the sour cream, butter, onion powder, and soup. Stir in 2 cups cheese and the hash browns. Pour mixture into prepared pan and spread evenly. Top with remaining cheese and bake, uncovered, 45 to 50 minutes, or until bubbly around the edges. Makes 10 to 12 servings.
## Three-Cheese Mashed Potatoes
2-1/2 pounds Yukon gold potatoes, peeled and boiled
---
1 tablespoon butter
1/4 cup milk
garlic salt and pepper, to taste
2 to 3 tablespoons sour cream
1/2 cup grated cheddar cheese
1/4 cup grated Asiago cheese
1/4 cup crumbled Gorgonzola cheese
Using a potato masher, mash the warm potatoes with the butter and milk. Season with garlic salt and pepper. When creamy, stir in the sour cream and cheeses until thoroughly mixed in. Serve warm. Makes 4 to 6 servings.
# Pizza & Pastas
## Chicken Pesto Pizza
1 boneless, skinless chicken breast, cubed and then cooked
---
2 to 3 tablespoons pesto
1/4 to 1/3 cup ranch dressing, divided
1 Boboli pizza crust
1-1/2 to 2 cups grated fontina cheese
grated Parmesan cheese
Italian seasoning
Preheat oven to 450 degrees.
Toss together the chicken, pesto, and 1 tablespoon ranch dressing until chicken is coated. Spread remaining ranch dressing evenly onto the Boboli crust; top with the chicken mixture. Sprinkle the fontina and some Parmesan cheese over top. Sprinkle the Italian seasoning over the cheeses. Bake 8 to 10 minutes, or until cheese is melted. Makes 4 servings.
## BBQ Chicken Pizza
1 boneless, skinless chicken breast, cubed and then cooked
---
1/2 cup BBQ sauce, plus more if desired
1 Boboli pizza crust
1/3 to 1/2 cup chopped red onion
1-1/4 cups grated mozzarella cheese
3/4 cup grated cheddar, smoked Gouda, or Gouda cheese
Preheat oven to 450 degrees.
Toss chicken and BBQ sauce together until chicken is coated. Spread a little extra BBQ sauce over the Boboli crust, if desired, and then spread coated chicken evenly over top. Sprinkle with onion and then the cheeses. Bake 8 to 10 minutes, or until cheese is melted. Makes 4 servings.
## Goat Cheese and Sun-Dried Tomato Pizza
1/2 cup marinara sauce
---
1 Boboli pizza crust
1-1/2 cups grated mozzarella cheese
4 ounces goat cheese, crumbled
sun-dried tomatoes
1/2 cup caramelized onions
Preheat oven to 450 degrees.
Spread the marinara sauce over the Boboli crust. Sprinkle mozzarella over top. Top with the goat cheese, tomatoes, and onions. Bake 8 to 10 minutes, or until cheese is melted. Makes 4 servings.
## Chicken Caesar Salad Pizza
1 refrigerator pizza crust
---
3 chicken breasts, cooked
1/2 cup grated Parmesan cheese, divided
1/2 to 3/4 cup Caesar salad dressing
1 teaspoon lemon pepper
1/2 clove garlic, minced
1 package (8 ounces) cream cheese, softened
4 cups thinly sliced romaine lettuce
1 can (4 ounces) sliced black olives, drained
Fit pizza crust on a baking sheet and bake according to package directions.
Slice the chicken into strips; set aside.
In a small bowl, combine 1/4 cup Parmesan cheese, salad dressing, lemon pepper, and garlic.
In a separate bowl, mix together cream cheese and half of dressing mixture. Toss together remaining dressing mixture, lettuce, and olives.
Spread cream cheese mixture over baked crust. Sprinkle lettuce mixture over top. Arrange the sliced chicken pieces over lettuce and then sprinkle with remaining Parmesan cheese. Makes 10 to 12 servings.
## Mexican Pizza
1 can (15 ounces) refried beans
---
1/2 to 3/4 cup chunky salsa
1 Boboli pizza crust
1/2 pound hamburger, browned and drained
2 to 3 tablespoons taco seasoning, or to taste
1 to 2 tablespoons water
1/2 can (14.5 ounces) diced tomatoes, drained
1/2 can (4 ounces) diced green chiles
1-1/2 cups grated Mexican-blend cheese
shredded lettuce, salsa, and sour cream
Preheat oven to 450 degrees.
In a saucepan, warm the beans and salsa together. When mixture has a good consistency, spread half of the bean mixture over the pizza crust and reserve the rest for another use.
In a frying pan, season the hamburger with the taco seasoning and a tablespoon or 2 of water (or according to instructions). Sprinkle meat over beans on crust. Sprinkle tomatoes over meat along with the green chiles. Top with the cheese.
Bake 8 to 10 minutes, or until cheese is melted. Top individual slices with lettuce, salsa, and sour cream. Makes 4 servings.
**Note:** To use all of the ingredients, make 2 pizzas by doubling the meat and using 2 crusts instead of 1.
## Artichoke Pizza
1 refrigerator pizza crust
---
2 to 3 tablespoons pesto
8 ounces provolone cheese, grated
1/2 cup grated Parmesan cheese
4 Roma tomatoes, sliced
1 can (14.5 ounces) artichoke hearts, drained and chopped
1/4 cup fresh basil leaves, torn
freshly ground pepper, to taste
Fit pizza crust on a baking sheet and bake according to directions. Brush baked crust with pesto and then layer the cheeses, tomatoes, and artichoke hearts over top. Sprinkle with basil and pepper. Bake 10 minutes, or until cheese is melted and bubbly. Makes 10 to 12 servings.
## Good Ol' Mac & Cheese
10 to 12 ounces elbow macaroni
---
2 tablespoons butter
2 tablespoons flour
1 cup half-and-half or milk
1 jar (5 ounces) Old English cheese
1 cup grated cheddar cheese
salt and pepper, to taste
Cook pasta according to package directions and drain; set aside.
Melt the butter in a saucepan over medium heat. Stir in the flour. Pour in the milk, stirring constantly as it thickens. When starting to thicken, gradually stir in Old English cheese until completely melted. Gradually add more half-and-half or milk if sauce is too thick. Stir in cheddar cheese and cooked noodles. Season to taste with salt and pepper. Makes 4 to 6 servings.
## Cordon Bleu Bake
3/4 to 1 pound cooked chicken, cubed
---
1 cup diced ham
8 to 10 ounces penne pasta, cooked and drained
2 cups heavy cream
1/4 cup grated Parmesan cheese
8 ounces Swiss cheese, grated
oregano, thyme, and garlic salt, to taste
Preheat oven to 425 degrees.
Put the cooked chicken and ham in a large bowl with the cooked pasta; set aside.
In a saucepan, lightly boil the cream, stirring constantly, for 10 minutes, or until it slightly starts to thicken. Add the Parmesan cheese and half of the Swiss cheese. Stir until cheese is completely melted.
Pour cream sauce over the meats and pasta, and add seasonings. Stir together and pour into a 2-quart casserole. Sprinkle remaining Swiss cheese over top. Bake 10 to 15 minutes, or until cheese is lightly browned or bubbling on top. Makes 6 servings.
## Chicken Fettucine
12 to 16 ounces fettucine or angel hair pasta
---
3 tablespoons butter, melted
1/2 to 1 envelope Italian dressing mix (add gradually to taste)
1 cup chicken broth
1 tablespoon flour
1 package (8 ounces) cream cheese, cut into cubes
1/3 cup grated fresh Parmesan cheese
1 to 1-1/2 pounds boneless, skinless chicken breast, cooked and cubed
1 cup peas*
Cook pasta according to package directions; drain and set aside.
In a saucepan, combine butter, dressing mix, broth, and flour. Stir in cream cheese until melted. Add Parmesan cheese and stir until combined. Add chicken and peas, and simmer a few minutes, stirring occasionally. Serve over warm pasta. Makes 4 to 6 servings.
*Or substitute 1 to 2 cups steamed broccoli if desired.
## Pesto Shrimp Pasta
1 package (8 ounces) spaghetti, broken in half
---
1 cup cream or half-and-half
4 to 5 tablespoons pesto
1/4 cup grated Parmesan cheese, plus more for garnish
1 onion, thinly sliced
1 tablespoon extra virgin olive oil
1 to 2 cups steamed broccoli
3/4 cup grated fontina cheese
20 to 30 shrimp, cooked with tail shells removed
Cook pasta according to package directions; drain and set aside.
In a saucepan, heat half-and-half for 10 minutes, stirring frequently. Once it is bubbling around the edges, stir in pesto and Parmesan cheese.
In a large skillet, saute the onion in oil until tender. Add the broccoli, cooked spaghetti, pesto sauce, fontina cheese, and shrimp. Stir until heated through and serve. Makes 4 to 6 servings.
**Variation:** Try substituting asparagus for the broccoli and chicken for the shrimp.
## Swiss Stroganoff
1 bag (12 ounces) uncooked egg noodles
---
1 pound ground beef
1 tablespoon minced onion
1 can (10.5 ounces) cream of mushroom soup, condensed
1/2 cup water
1 cup sour cream
paprika, to taste
1 cup peas
1-1/4 cups grated Swiss cheese
salt and pepper, to taste
Cook noodles according to package directions; drain.
In the meantime, brown the beef with the onion in a frying pan. Drain if necessary. Stir in the soup and water. Once combined, add the sour cream, paprika, peas, cheese, salt, and pepper. Stir until completely heated through and cheese is melted. Serve over hot cooked wide egg noodles. Makes 4 to 6 servings.
## Gooey Lasagna
1/2 red bell pepper, chopped
---
1 jar (1 pound, 10 ounces) spaghetti sauce
1/2 to 1 pound ground Italian sausage, browned and drained
1 package (8 ounces) cream cheese, softened
1 cup cottage cheese
1 to 2 teaspoons Italian seasoning
3/4 cup grated Parmesan cheese, divided
1 box uncooked lasagna noodles
2 cups grated mozzarella cheese, divided
Preheat oven to 375 degrees.
Stir bell pepper and spaghetti sauce into cooked sausage. Spread a large spoonful of sauce in the bottom of a 9 x 13-inch pan and set aside.
In a bowl, combine the cream cheese, cottage cheese, Italian seasoning, and 1/4 cup Parmesan cheese.
Place 3 to 4 lasagna noodles over sauce in bottom of pan. Top with half of the cheese mixture, one-third of the sauce, and 1/3 cup mozzarella cheese. Place 3 to 4 noodles on top and repeat layers. Cover with another 3 to 4 noodles and remaining sauce. Top with remaining cheeses.
Cover and bake 45 to 50 minutes; then uncover and bake 5 to 10 minutes more. Let stand 5 to 10 minutes before serving. Makes 8 to 10 servings.
## Smokey Pasta Bake
1 package (25 ounces) meat or cheese tortellini or ravioli
---
1 jar (1 pound, 10 ounces) chunky-style spaghetti sauce
2 cups firmly packed spinach, chopped
1/4 teaspoon red pepper
1/4 to 1/2 cup cream or half-and-half
6 to 8 ounces smoked Gouda, thinly sliced
Preheat oven to 400 degrees.
Make pasta according to package directions and drain; set aside.
In a saucepan, heat the spaghetti sauce until it gently bubbles around the edges. Stir in the spinach, red pepper, and cream, and then heat through. Toss together the cooked pasta and sauce, and then pour into a 9 x 13-inch pan. Cover with cheese. Bake 15 minutes, or until it's bubbly around the edges. Makes 4 to 6 servings.
# Main Dishes
## Chicken, Cheese, and Rice Casserole
2 cups wild rice
---
1 medium onion, finely chopped
1/4 cup finely diced celery
1/2 cup butter
1 clove garlic, minced
1 rotisserie chicken, cut into pieces
2 cans (10.5 ounces each) cream of chicken soup, condensed
1 can milk
2 to 3 cups grated cheese, any kind
Preheat oven to 350 degrees.
Cook rice according to package directions. In a skillet over medium heat, cook onion and celery in butter until translucent. Add garlic and cook a few minutes more. Remove from heat and stir into cooked rice. Spread into a 9 x 13-inch pan.
Cover rice with a layer of chicken pieces. In a bowl, mix together soup and milk. Stir in cheese. Pour over chicken and rice, and bake 30 minutes until heated through. Makes 8 servings.
## Chicken Divan
3 to 4 boneless, skinless chicken breasts, cut into pieces
---
3 cups broccoli florets
1 can (10.5 ounces) cream of chicken soup, condensed
1/2 cup mayonnaise
1 teaspoon curry powder
1 teaspoon lemon juice
1-1/2 to 2 cups grated sharp cheddar cheese
Preheat oven to 350 degrees.
Put chicken and broccoli into an 8-inch square pan that has been lightly sprayed with nonstick cooking spray.
In a bowl, mix together the soup, mayonnaise, curry powder, and lemon juice. Pour over chicken and broccoli.
Bake 30 minutes; then remove and sprinkle cheese over top. Bake 15 minutes more, or until chicken is done and cheese is bubbling. Makes 4 servings.
## Swiss Chicken
4 to 6 boneless, skinless chicken breasts
---
1 container (12 ounces) marinara sauce
1 package (8 ounces) Swiss cheese slices
Preheat oven to 350 degrees.
Lay chicken in a 9 x 13-inch glass dish that has been sprayed with nonstick cooking spray. Cover with marinara sauce. Lay slices of Swiss cheese on top. Bake 40 minutes, or until chicken is done. Makes 4 to 6 servings.
## Rosemary Chicken
4 boneless, skinless chicken breasts
---
1 package Italian dressing mix
4 tablespoons butter, melted and divided
1 small onion, chopped
1 clove garlic, minced
1-1/2 cups half-and-half
1/2 cup chicken broth
1 package (8 ounces) cream cheese
1/2 teaspoon dried thyme
2 sprigs fresh rosemary
salt and pepper, to taste
Place chicken in a 3-1/2 to 5-quart slow cooker. Sprinkle with Italian dressing mix and 2 tablespoons melted butter. Cook on low heat 4 to 6 hours.
Put remaining 2 tablespoons melted butter in a saucepan and add onion and garlic. Saute until soft, then add half-and-half, chicken broth, and cream cheese. Stir until smooth. Add cream cheese mixture to slow cooker; sprinkle with thyme and fresh rosemary. Cook 1 hour more. Serve with mashed potatoes or noodles. Makes 4 servings.
## Steak with Gorgonzola Butter
1/4 cup butter, softened
---
1/4 cup Gorgonzola cheese
4 tenderloin steaks
Gorgonzola crumbles, to garnish, optional
In a small bowl, beat together butter and cheese until creamy. Grill steaks on a hot grill until they reach desired doneness. Top each with a dollop of cheese butter and sprinkle with extra Gorgonzola crumbles, if desired. Makes 4 servings.
## Saucy Garlic and Blue Cheese Burgers
1 pound ground beef
---
1/2 envelope dry onion soup mix
2 cloves garlic, crushed
1/4 cup steak sauce, plus more
1/2 cup blue cheese crumbles, plus more
4 hamburger buns
In a bowl, combine the ground beef, soup mix, garlic, steak sauce, and blue cheese. Form into 4 patties and then cook on a grill pan or on the barbecue until they reach desired doneness.
Put cooked patties on buns and top with more steak sauce and a sprinkle of blue cheese. Add other condiments as desired. Makes 4 servings.
## Jalapeño Turkey Burgers
1 pound ground turkey
---
1 egg
dash Worcestershire sauce
1/2 onion, finely chopped
1 to 2 jalapeño peppers, seeded and finely chopped
1/4 cup seasoned breadcrumbs
salt and pepper, to taste
4 slices pepper jack cheese
4 hamburger buns
In a bowl, combine the ground turkey, egg, Worcestershire sauce, onion, jalapenõ, and breadcrumbs. Season with salt and pepper. Form 4 hamburger patties and then cook on a grill pan or on the barbecue until they reach desired doneness.
When burgers are done, top each with a slice of pepper jack cheese; let cheese melt. Serve on hamburger buns with other condiments as desired. Makes 4 servings.
## Provolone Meatball Subs
20 frozen meatballs
---
1 jar (16 ounces) marinara sauce
4 hoagie buns
1 can (3.8 ounces) sliced olives
8 slices provolone cheese
Cook meatballs according to package directions. Place in marinara sauce in a saucepan and heat through. Once warm, place 5 meatballs on the bottom half of each hoagie bun. Sprinkle olives over top and then cover with 2 provolone slices each. Place open subs on a foil-covered baking sheet and broil until cheese is bubbling and edges of buns are slightly toasted. Makes 4 servings.
**Note:** Try cutting the meatballs in half so they don't slide around when you take a bite!
## Philly Cheese Steak
1 small onion, sliced
---
1 cup sliced mushrooms
1/2 green bell pepper, sliced
1/2 red bell pepper, sliced
1 container (8 ounces) good quality deli beef lunch meat, cut into strips
4 hoagie rolls
Cheez Whiz or provolone slices
Saute onion in oil until translucent. Add mushrooms and bell peppers, and continue to cook until desired doneness. Add meat to vegetable mixture and stir until cooked through.
Scoop mixture onto split hoagie rolls. Spread desired amount of Cheez Whiz over top half of bun and close. Meat should melt cheese, or cover meat with slices of provolone and let melt. Makes 4 servings.
## Fried Cheese Steaks
4 slices cheddar, Swiss, or provolone, cut 3/4 inch thick
---
1/2 cup flour
1 egg, beaten
2/3 cup breadcrumbs
oil, for frying
Dredge cheese slices in flour, dip in egg, and then coat with breadcrumbs. Fry in hot oil in a skillet until breadcrumbs are golden brown. Drain on paper towels and serve hot. Makes 4 servings.
## Cheese Enchiladas
12 corn tortillas
---
oil, for frying
1 package (12 ounces) Monterey Jack cheese, grated
2 bunches green onions, sliced
1 bottle (24 ounces) enchilada sauce
Preheat oven to 350 degrees.
Heat oil in a frying pan until hot but not smoking. Using tongs, quickly dip tortillas into oil, one at a time. Drain on paper towels.
Fill each tortilla with a handful of shredded cheese and a sprinkling of green onion. Roll up and place in a glass 9 x 13-inch pan that has been sprayed with nonstick cooking spray. When all enchiladas are rolled and placed in pan, cover with enchilada sauce.
Bake 20 to 30 minutes, or until enchiladas are hot and cheese is bubbly. Serve with Spanish rice or black beans. Makes 6 servings.
## Enchilada Casserole
1 pound ground turkey
---
1/2 cup chopped onion
3 cans (8 ounces each) tomato sauce
1-1/2 teaspoons chili powder
1-1/2 packages (8 ounces) cream cheese, softened
10 medium flour tortillas
2-1/2 cups grated Mexican-blend cheese
sour cream, sliced avocado, olives, shredded lettuce
Preheat oven to 350 degrees.
Brown turkey in a skillet; drain fat if necessary. Add the onion, tomato sauce, and chili powder to skillet.
Spread cream cheese over tortillas, roll up, and place in a 9 x 13-inch pan that has been prepared with nonstick cooking spray. Pour beef mixture over top. Sprinkle with cheese. Cover and bake 30 minutes or until casserole is warmed through and cheese is bubbly. Garnish with sour cream, avocados, olives, and shredded lettuce. Makes 8 to 10 servings.
# Desserts
## Strawberry Cream Cheese Sheet Cake
1 white cake mix
---
1 package (8 ounces) cream cheese, softened
1/2 cup sugar
1 container (8 ounces) frozen whipped topping, thawed
1 container fresh strawberries, sliced
Make cake batter according to package directions. Spray nonstick cooking spray on a sheet pan with sides. Pour batter into pan and bake until done; let cool.
In a bowl, beat together the cream cheese and sugar. Gently fold in the whipped topping and then spread mixture over cooled cake. Place strawberry slices on top and then serve. Makes 16 servings.
## Spice Cake with Creamy Frosting
1 spice cake mix
---
1 package (8 ounces) cream cheese, softened
2 tablespoons butter, melted
2 tablespoons brown sugar
1 teaspoon vanilla
1 tablespoon honey
1/3 cup chopped nuts
Make cake batter according to package directions. Bake the cake in two 8-inch round pans; remove from oven and let cool.
In a bowl, beat together the cream cheese, butter, brown sugar, and vanilla. When the frosting starts to get thick, add the honey and beat until light and fluffy. Spread frosting over the top of one cake round and set the second round on top. Then frost the entire cake. Garnish with nuts. Makes 10 servings.
## Sour Cream Cheesecake
2 cups graham cracker crumbs
---
2 cups sugar, divided
1/2 cup butter, melted
3 packages (8 ounces each) cream cheese, softened
3 eggs
1 cup sour cream
1 teaspoon vanilla
1 tablespoon lemon juice
Preheat oven to 350 degrees.
In a medium bowl, mix together the graham cracker crumbs and 1/2 cup sugar. Mix in butter. Press into the bottom of a springform pan.
In a large bowl, cream together cream cheese and remaining sugar. Beat in eggs, one at a time. Add remaining ingredients and mix until smooth. Pour mixture over crust and bake 30 to 40 minutes, until the edges are dry but the center is still jiggly. Remove from oven and refrigerate for 4 hours or overnight. Makes 12 servings.
## Frozen Peppermint Cheesecake
2 cups Oreo cookie crumbs
---
1/4 cup sugar
1/4 cup butter, melted
1 package (8 ounces) cream cheese, softened
1 can (14 ounces) sweetened condensed milk
1 to 2 teaspoons peppermint extract
red food coloring
2 cups whipping cream, whipped
6 crushed peppermint candies
In a medium bowl, mix together cookie crumbs and sugar. Mix in butter. Spray a 9-inch springform pan with nonstick cooking spray. Press crumb mixture firmly on bottom and partway up sides of prepared pan.
In a large bowl, beat cream cheese until fluffy. Gradually add sweetened condensed milk and beat until smooth. Stir in peppermint extract and food coloring; mix well. Fold in whipped cream and crushed candies. Pour filling into prepared pan. Cover and freeze 6 hours or until firm. Makes 12 servings.
## Lemon Cheesecake Bars
2 cups flour
---
1/2 cup powdered sugar
1 cup butter, softened
1 package (8 ounces) cream cheese, softened
2 eggs
2/3 cup evaporated milk
1/2 cup sugar
1 tablespoon flour
1 tablespoon lemon juice
1 cup sour cream
Preheat oven to 350 degrees.
Combine flour and powdered sugar in a medium bowl. Cut in butter with a pastry blender or two knives until crumbly. Press mixture onto the bottom and 1 inch up the sides of a 13 x 9-inch baking pan. Bake 25 minutes and remove from oven.
Put remaining ingredients except sour cream in a blender; cover and blend until smooth. Pour over partially baked crust. Bake an additional 15 minutes or until set. Cool in pan on wire rack. Spread sour cream over top and refrigerate. Cut into bars before serving. Makes 12 to 15 bars.
## Cottage Cheese Raspberry Pie
1 container (12 ounces) frozen whipped topping, thawed
---
1 large box raspberry gelatin
1 container (12 ounces) small curd cottage cheese
1 package (8 ounces) frozen raspberries, thawed
1 graham cracker pie crust
Mix together first 3 ingredients in a large bowl. Fold in raspberries. Pour into prepared crust and refrigerate 4 hours before serving. Makes 8 servings.
## Pound Cake with Mascarpone Cream
2 cups mascarpone cheese
---
4 tablespoons sugar
1 teaspoon vanilla
1 prepared pound cake, sliced
2 cups sliced fresh peaches
In a medium bowl, beat together the mascarpone, sugar, and vanilla with an electric mixer until smooth and fluffy. Refrigerate at least 1 hour before serving.
To serve, top each slice of pound cake with fresh peaches and then top with a dollop of mascarpone cream. Makes 8 servings.
## Easy Tiramisu
3 egg yolks
---
1/4 cup sugar
2 teaspoons vanilla extract
1 cup mascarpone cheese
24 ladyfingers
1/2 cups brewed coffee
1 tablespoon unsweetened cocoa powder
In a medium bowl, beat yolks with sugar and vanilla until smooth and light yellow. Fold mascarpone into the yolk mixture; set aside.
Arrange 12 ladyfingers in the bottom of an 8 x 8-inch pan. Spoon half of the cofee over the ladyfingers, and then spread half the mascarpone mixture over the coffee-soaked cookies. Repeat with remaining cookies and mascarpone. Cover and chill 1 hour. Sprinkle with cocoa powder just before serving. Makes 9 servings.
## Cream Cheese Brownies
1 package brownie mix
---
1 package (8 ounces) cream cheese, softened
1 egg
1/3 cup sugar
1/2 teaspoon vanilla
1/2 cup semisweet chocolate chips
Prepare the brownie mix according to package directions. Spray a 9 x 13-inch pan with nonstick cooking spray. Spread half of brownie batter evenly into the prepared pan; set aside.
In a large bowl, beat together the cream cheese, egg, sugar, and vanilla with an electric mixer until smooth. Dollop the cream cheese mixture on top of the brownie batter in pan. Top with remaining brownie batter and swirl together using a knife or skewer. Sprinkle chocolate chips over top.
Bake according to package directions. Brownies will be done when a toothpick inserted into the center comes out clean. Cool in the pan, then cut into bars and serve. Makes 12 servings.
## Cheddar Apple Cobbler
1 can (21 ounces) apple pie filling
---
1 cup flour
1/2 cup rolled oats
1/4 cup sugar
1-1/2 teaspoons baking powder
1/2 teaspoon salt
1-1/2 cups grated sharp cheddar cheese
1/3 cup butter or margarine, melted
1/4 cup milk, plus more if needed
Preheat oven to 350 degrees.
Pour pie filling into an 8 x 8-inch glass pan; set aside.
In a medium bowl, combine the flour, oats, sugar, baking powder, salt, and cheese. Stir in the melted butter and milk. If mixture is too dry, add a little more milk.
Spoon mixture over pie filling and spread evenly over top. Bake 30 minutes or until golden brown. Makes 6 to 8 servings.
## Ricotta Cookies
1 cup butter, softened
---
2 cups sugar
1 container (15 ounces) ricotta cheese
3 teaspoons vanilla
1 teaspoon salt
1 teaspoon baking soda
4 cups flour
### Glaze
milk, as needed
---
1 cup powdered sugar
decorating sprinkles
Preheat oven to 350 degrees.
In a large bowl, cream together butter and sugar. Stir in ricotta and vanilla. Sift together salt, baking soda, and flour in a separate bowl. Add dry ingredients to wet ingredients and mix until a big ball forms. Dough will be sticky.
Drop dough by teaspoonfuls onto an ungreased cookie sheet. Bake 10 minutes or until bottom of cookies are browned. Remove from oven to a wire rack to cool.
For the glaze, add milk 1 tablespoon at a time to powdered sugar until it is a nice consistency for spreading. Frost cookies and sprinkle with decorating sprinkles. Makes about 2 dozen cookies.
# About the Authors
Melissa Barlow is the author of five cookbooks, including _101 Things To Do With a Salad_ and _101 Things To Do With Gelatin._ She is a freelance writer and editor, and lives with her husband, Todd, and their growing little family in Bountiful, Utah. Her favorite cheese is Gorgonzola.
Jennifer Adams is the author of eight books, including _Baby Showers, Wedding Showers, 101 Things To Do With Gelatin,_ and _Remarkably Jane: Notable Quotations on Jane Austen._ She works as a writer and editor, and lives in Salt Lake City. Her favorite cheese is Gorgonzola.
# Metric Conversion Chart
Volume Measurements | Weight Measurements | Temperature Conversion
---|---|---
U.S. | Metric | U.S. | Metric | U.S. | Metric
1 teaspoon | 5 ml | 1/2 ounce | 15 g | 250 | 120
1 tablespoon | 15 ml | 1 ounce | 30 g | 300 | 150
1/4 cup | 60 ml | 3 ounces | 90 g | 325 | 160
1/3 cup | 75 ml | 4 ounces | 115 g | 350 | 180
1/2 cup | 125 ml | 8 ounces | 225 g | 375 | 190
2/3 cup | 150 ml | 12 ounces | 350 g | 400 | 200
3/4 cup | 175 ml | 1 pound | 450 g | 425 | 220
1 cup | 250 ml | 2-1/4 pounds | 1 kg | 450 | 230
|
Facebook announced the new policy in an internal post to staff.
Following Google’s footsteps, Facebook is also planning to do away with its policy of requiring employees to settle sexual harassment claims made against colleagues in private arbitration alone, The Wall Street Journal reported.
Facebook announced the new policy in an internal post to staff, the report on Friday said.
Earlier, Google on Thursday announced that it was making arbitration optional for individual sexual harassment and sexual assault claims.
Google outlined the new sexual harassment policy after over 20,000 employees staged a global walkout last week in protest against sexual harassment at the company and its improper handling of sexual misbehaviour allegations against top executives.
Facebook following the same policy now marks a significant departure from its earlier stance in which it defended the compulsory arbitration policy as “appropriate”.
The social networking giant has also updated its inter-office dating policy to require any executive at a director level or above to disclose any romantic relationship with another colleague, even if they are not overseeing that employee’s work.
Several other companies — including Microsoft, Uber, and Lyft — have dropped forced arbitration clauses from sexual harassment claims, The Verge reported.
|
Antimicrobial potentials of Catharanthus roseus by disc diffusion assay. The present research work investigates the in vitro antimicrobial activity of different solvent extracted samples from the aerial parts (stem, leaf, fruit and flower) of C. roseus against different microbial species using disc diffusion assay at two different concentrations of 1 and 2 mg disc-1. Hexane extracted samples inhibited the growth of all tested microbial strains except S. typhi. Similarly, ethyl acetate extracted samples was effective to control the activity of all the tested microbial strains. E. coli and S. typhi showed resistance to chloroform extracted samples and the remaining eight microbial strains were susceptible to the same extract. Butanol extracted samples did not inhibit the growth of K. pneumonia and S. typhi at low concentration, however, at higher concentration the same extract reduced the growth of different microbes. Methanol extracted samples effectively controlled the growth of all tested microbes at both concentrations except for S. typhi. Water extracted samples did not inhibit the growth at low concentration except E. coli, K. pneumonia and S. aureus and were ineffective against P. aeroginosa at both concentration. C. albicans, showed resistance against chloroform and water extracted samples at low concentration and susceptible to other solvent extracted samples at both concentration. All fractions were effective against plant pathogens i.e. E. carotovora and A. tumefaciens.
|
BEIJING (Reuters) - China will give private capital the same entry standards to the banking industry as other capital, state media said on Sunday, as the government makes its hardest push in a decade to court private investors by welcoming them into a handful of sectors.
Private companies would be allowed to buy into banks through private stock placements, new share subscriptions, equity transfers, mergers and acquisitions, the official China Daily said, citing the China Banking Regulatory Commission.
Private investment would also be permitted in trust, financial leasing and auto-financing companies, the report said.
“The banking regulatory branches at different levels cannot set up separate restrictions or additional conditions for private capital to enter the banking sector. They are obliged to improve transparency of the banking market access constantly,” the newspaper cited the regulator as saying.
In order to encourage lending to the private sector, China should let private capital play a bigger role in financial institutions, and encourage private lending companies to become commercial banks, Wu Xiaoling, a former deputy central bank governor, told the China Daily.
“The government has encouraged small lending companies to turn into rural banks,” she said. “But with a minimum shareholding requirement of the main initiator, private investors lack enthusiasm for such things.”
On Friday, the powerful watchdog of China’s state-owned firms said China would allow private investment in state companies when they restructure or sell shares, but gave few details on how that would happen.
However, analysts are skeptical China will follow through on its pledges to cut the role of the state, given that its stranglehold over swathes of the world’s second-largest economy has been unchallenged for years.
Analysts have said deep vested interests often backed by influential politicians are the biggest obstacle dogging privatization efforts.
That said, government ministries may follow the State-owned Asset Supervision and Administration Commission’s lead and voice public support for privatization in coming weeks in response to Premier Wen Jiabao’s instructions to detail plans on how to cut the state’s role in the economy.
|
<filename>subprojects/sts/sts/src/main/java/hu/bme/mit/theta/sts/dsl/StsDefScope.java
/*
* Copyright 2017 Budapest University of Technology and Economics
*
* Licensed under the Apache License, Version 2.0 (the "License");
* you may not use this file except in compliance with the License.
* You may obtain a copy of the License at
*
* http://www.apache.org/licenses/LICENSE-2.0
*
* Unless required by applicable law or agreed to in writing, software
* distributed under the License is distributed on an "AS IS" BASIS,
* WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
* See the License for the specific language governing permissions and
* limitations under the License.
*/
package hu.bme.mit.theta.sts.dsl;
import static com.google.common.base.Preconditions.checkNotNull;
import static hu.bme.mit.theta.core.type.booltype.BoolExprs.True;
import static hu.bme.mit.theta.sts.dsl.StsDslHelper.createBoolExpr;
import static hu.bme.mit.theta.sts.dsl.StsDslHelper.createConstDecl;
import static hu.bme.mit.theta.sts.dsl.StsDslHelper.createVarDecl;
import java.util.Optional;
import hu.bme.mit.theta.common.dsl.Scope;
import hu.bme.mit.theta.common.dsl.Symbol;
import hu.bme.mit.theta.common.dsl.SymbolTable;
import hu.bme.mit.theta.core.decl.ConstDecl;
import hu.bme.mit.theta.core.decl.VarDecl;
import hu.bme.mit.theta.core.dsl.DeclSymbol;
import hu.bme.mit.theta.core.model.NestedSubstitution;
import hu.bme.mit.theta.core.model.Substitution;
import hu.bme.mit.theta.core.type.Expr;
import hu.bme.mit.theta.core.type.booltype.BoolType;
import hu.bme.mit.theta.sts.STS;
import hu.bme.mit.theta.sts.dsl.gen.StsDslParser.ConstDeclContext;
import hu.bme.mit.theta.sts.dsl.gen.StsDslParser.DefStsContext;
import hu.bme.mit.theta.sts.dsl.gen.StsDslParser.InitConstrContext;
import hu.bme.mit.theta.sts.dsl.gen.StsDslParser.InvarConstrContext;
import hu.bme.mit.theta.sts.dsl.gen.StsDslParser.TransConstrContext;
import hu.bme.mit.theta.sts.dsl.gen.StsDslParser.VarDeclContext;
final class StsDefScope implements Scope {
private final DefStsContext defStsContext;
private final Scope enclosingScope;
private final Substitution assignment;
private final SymbolTable symbolTable;
private final STS.Builder stsBuilder;
private final STS sts;
private StsDefScope(final Scope enclosingScope, final Substitution assignment, final DefStsContext defTcfaContext) {
checkNotNull(assignment);
this.enclosingScope = checkNotNull(enclosingScope);
this.defStsContext = checkNotNull(defTcfaContext);
symbolTable = new SymbolTable();
declareConsts();
declareVars();
// TODO Handle recursive constant definitions
final Substitution constAssignment = StsDslHelper.createConstDefs(this, assignment, defTcfaContext.constDecls);
this.assignment = NestedSubstitution.create(assignment, constAssignment);
stsBuilder = STS.builder();
createInvarConstrs();
createInitConstrs();
createTransConstrs();
// TODO Separate system and property
stsBuilder.setProp(True());
sts = stsBuilder.build();
}
public static StsDefScope create(final Scope enclosingScope, final Substitution assignment,
final DefStsContext defTcfaContext) {
return new StsDefScope(enclosingScope, assignment, defTcfaContext);
}
////
public STS getSts() {
return sts;
}
////
@Override
public Optional<Scope> enclosingScope() {
return Optional.of(enclosingScope);
}
@Override
public Optional<? extends Symbol> resolve(final String name) {
final Optional<Symbol> optSymbol = symbolTable.get(name);
if (optSymbol.isPresent()) {
return optSymbol;
} else {
return enclosingScope.resolve(name);
}
}
////
private void createInvarConstrs() {
defStsContext.invarConstrs.forEach(this::createInvarConstr);
}
private void createInvarConstr(final InvarConstrContext invarConstrCtx) {
final Expr<BoolType> cond = createBoolExpr(this, assignment, invarConstrCtx.cond);
stsBuilder.addInvar(cond);
}
private void createInitConstrs() {
defStsContext.initConstrs.forEach(this::createInitConstr);
}
private void createInitConstr(final InitConstrContext initConstrCtx) {
final Expr<BoolType> cond = createBoolExpr(this, assignment, initConstrCtx.cond);
stsBuilder.addInit(cond);
}
private void createTransConstrs() {
defStsContext.transConstrs.forEach(this::createTransConstr);
}
private void createTransConstr(final TransConstrContext transConstrCtx) {
final Expr<BoolType> cond = createBoolExpr(this, assignment, transConstrCtx.cond);
stsBuilder.addTrans(cond);
}
////
private void declareConsts() {
defStsContext.constDecls.forEach(this::declareConst);
}
private void declareConst(final ConstDeclContext constDeclContext) {
final ConstDecl<?> constDecl = createConstDecl(constDeclContext);
final Symbol symbol = DeclSymbol.of(constDecl);
symbolTable.add(symbol);
}
private void declareVars() {
defStsContext.varDecls.forEach(this::declareVar);
}
private void declareVar(final VarDeclContext varDeclContext) {
final VarDecl<?> varDecl = createVarDecl(varDeclContext);
final Symbol symbol = DeclSymbol.of(varDecl);
symbolTable.add(symbol);
}
}
|
. PURPOSE To observe and analyze the abnormal effect of ethanol sclerotherapy for arteriovenous malformations on hemodynamics. METHODS Twelve cases of arteriovenous malformations who received absolute ethanol sclerotherapy were chosen. The heart rate, blood pressure, SPO₂ and ETCO₂ at different times were recorded and analyzed. RESULTS Obvious change of HR and BP were observed before and after injection of absolute ethanol into arteriovenous malformation. HR changed from preoperational (82.8 ± 11.5) bpm to the highest (98.8 ± 13.5) bpm, While BP changed from preoperational (98.6 ± 6.5) mmHg/(53.1 ± 3.3) mmHg to the lowest (73.7 ± 6.3) mmHg/(39.3 ± 4.8) mmHg. No change of SPO₂ and PETCO₂ was observed. CONCLUSIONS Absolute ethanol sclerotherapy for arteriovenous malformation can result in obvious S-shaped change of HR and BP. The actual cause is unknown, but we should pay more attention to the abnormal changes and manage accordingly.
|
<reponame>loonwerks/case-ta6-experimental-platform-OpenUxAS
#! /usr/bin/env python3
import os
from subprocess import call
hostOpenUxAS_Dir = '{0}/..'.format(os.getcwd())
print("\n##### START removing source files #####\n")
cmd = ('docker run --rm -d ' +
'--name uxas_build -w="/UxASDev/OpenUxAS" ' +
'--mount type=bind,source={0}/..,target="/UxASDev" '.format(hostOpenUxAS_Dir) +
'--mount source=UxAS_Build_Vol,target="/tmp_build" ' +
'uxas/uxas-build:x86_64 ' +
'rm -rf /tmp_build/3rd /tmp_build/resources /tmp_build/src /tmp_build/tests /tmp_build/UxAS-afrl_internal'
)
call(cmd,shell=True)
|
1. Field of the Invention
The present invention relates to the removal of pipe plugs from pipes. A pipe plug is a protective device a portion of which is inserted into an opening in a pipe. A pipe cap is a protective device which is placed over the outer surface of a pipe to seal a pipe opening.
2. Description of the Art Practices
U.S. Pat. No. 4,796,347 issued to Aguillen Jr. et al., on Jan. 10, 1989 discloses a plastic-pipe puller tool for installing subterranean utility pipes has a shaft portion, one tapered end on the shaft portion for snugly fitting within the inner wall of the plastic pipe to be installed and a second coupling end which may have a coupler which is rotatably supported from the shaft portion, to permit rapid and easy joining of the plastic pipe to the pipe-pulling means, whether a bore-pipe or a pneumatic hose.
U.S. Pat. No. 4,633,957 issued to Prost Jan. 6, 1987 discloses a soil plugging and ejecting apparatus for being inserted into soil to form and remove a soil plug and for ejecting the plug. The apparatus includes an elongate tubular body having a cutting edge on its lower end for piercing the soil to form a plug. A step attached to the body receives downward pressure to force the apparatus into the soil and a grip attached to the upper end of the body provides a means for holding and guiding the apparatus, and for pulling it out of the soil after the plug is formed. A valve mounted on the apparatus is in fluid-flow communication with a source of pressurized fluid and the body, and is operable to selectively admit pressurized fluid into the body to eject a plug from the lower end of the body. The valve can be actuated by a handle or a button.
U.S. Pat. No. 4,249,293 issued to Schulberg Feb. 10, 1981 contains a disclosure of a pulling tool of generally elongated shape operable by hydraulic pressure to pull force-fitted elements from an anchorage, such as cups from the arms of universal joints. At the forward end there is a gripping sleeve to be located around the element, a retaining sleeve to be located about the gripping sleeve and a reaction sleeve around the retaining sleeve. Interaction of the walls of the gripping sleeve and retaining sleeve cause transverse contraction of the gripping sleeve about the element as the hydraulic pressure pulls the gripping sleeve rearwardly. An ejector pin urges the element longitudinally from the tool after the arms constituting the gripping sleeve open, which occurs due to differing radial forces applied on the gripping sleeve as it moves rearwardly. The leading edge of the reaction sleeve reacts against the anchorage from which the element is pulled.
Schosek in U.S. Pat. No. 3,966,169, which issued Jun. 29, 1976, recites a rod and pipe pusher, puller device for operative attachment to a conventional type of tractor or truck mounted backhoe machine without removal of the backhoe bucket. The attachment of operation of the device is accomplished by the removal of a single pin from the drive linkage to the bucket from a hydraulic operated piston of the conventional mechanism of the backhoe machine. Means are provided to securely anchor the bucket to an upper central portion of the device and to connect said drive linkage to a power arm of the device to accomplish the rod and pipe pushing, pulling operation.
U.S. Pat. No. 6,086,048 Owen issued Jul. 11, 2000 discloses a board puller for removing boards on a structure generally having a board cue which contacts the back side of boards to be removed, a fulcrum with a pivot that interacts with the frame structure and a handle for providing leverage. The board cue is pivotally attached towards one end of the fulcrum. The handle is rigidly attached to the other end of the fulcrum, but made so that the angle can be adjusted, in the preferred embodiment. In the center of the fulcrum is a pivot typically consisting of a curved or semi-circular member extending perpendicular for the fulcrum. Gauges are provided which are attached to the board cue. The gauges positions and holds the board cue on the boards being removed. This provides a means to remove the board in such a manner that splintering and board breakage is minimized. The board puller can be used with or without the gauges. In operation, the board cue is positioned behind the boards to be pulled or removed. The pivot on the fulcrum is positioned on the stud, joist or other frame structure on which the boards are nailed or screwed. The handle is then either pulled or pushed to remove the boards from the structure. The handle angle can be adjusted to provide the best angle for applying leverage.
U.S. Pat. No. 5,778,740 issued to Tye on Jul. 14, 1998 recites a bottle cap remover is activated by inserting a bottle into an orifice. A detector adjacent the orifice detects the presence of the bottle and causes a linear actuator to drive a gripping device away from the top of the bottle where the cap is located. As the gripping device is moving away from the bottle cap, cam members direct hooked members of the gripping device around the bottle cap so that it is pulled off of and away from the bottle as the linear actuator drives the gripping device away from the bottle top. Once the bottle cap is removed, the linear actuator recycles to ready the bottle cap remover for the next bottle cap.
Davis et al., in U.S. Pat. No. 5,465,430 Nov. 14, 1995 contains a disclosure of a cap glide puller comprising an elongated handle. A head is longitudinally offset at one end of the handle. A hook diagonally extends downwardly from the offset end of the handle towards the head. The head and the hook are capable of engaging a cap glide on a free end of a chair leg. When the handle is manually lifted up, the cap glide will be removed from the free end of the chair leg.
Strausbaugh, et al. in U.S. Pat. No. 5,003,682 that issued Apr. 2, 1991 discloses a tool assembly for removing caps or plugs from sewer lines to be connected by contractors or plumbers. The tool includes three distinct pieces which may, in conjunction, be slid over a cap or plug to be removed. A screw element is then turned to pull the cap or plug from a sewer line without damage to the cap or line itself. The tool is designed for rapid attachment and use to reduce time consumed and danger to contractors and plumbers working on a sewer connection.
To the extent that the foregoing patents are relevant to the present invention they are herein incorporated by reference. Ratios and ranges may be combined.
|
<reponame>Andreas237/AndroidPolicyAutomation
// Decompiled by Jad v1.5.8g. Copyright 2001 <NAME>.
// Jad home page: http://www.kpdus.com/jad.html
// Decompiler options: packimports(3) annotate safe
package com.google.android.gms.location;
import com.google.android.gms.common.api.internal.TaskUtil;
import com.google.android.gms.internal.location.zzad;
import com.google.android.gms.internal.location.zzak;
import com.google.android.gms.tasks.TaskCompletionSource;
// Referenced classes of package com.google.android.gms.location:
// FusedLocationProviderClient
private static final class FusedLocationProviderClient$zza extends zzak
{
public final void zza(zzad zzad1)
{
TaskUtil.setResultOrApiException(zzad1.getStatus(), zzac);
// 0 0:aload_1
// 1 1:invokevirtual #27 <Method com.google.android.gms.common.api.Status zzad.getStatus()>
// 2 4:aload_0
// 3 5:getfield #17 <Field TaskCompletionSource zzac>
// 4 8:invokestatic #33 <Method void TaskUtil.setResultOrApiException(com.google.android.gms.common.api.Status, TaskCompletionSource)>
// 5 11:return
}
private final TaskCompletionSource zzac;
public FusedLocationProviderClient$zza(TaskCompletionSource taskcompletionsource)
{
// 0 0:aload_0
// 1 1:invokespecial #15 <Method void zzak()>
zzac = taskcompletionsource;
// 2 4:aload_0
// 3 5:aload_1
// 4 6:putfield #17 <Field TaskCompletionSource zzac>
// 5 9:return
}
}
|
<filename>main.go
package zeroshift
import "fmt"
// NaiveShift is a naive implementation with O(n^2)
func NaiveShift(arr []int) []int {
work := make([]int, len(arr))
copy(work, arr)
for i := 0; i < len(work); i++ {
fmt.Println(work)
if work[i] == 0 {
for j := i; j < len(work); j++ {
if work[j] != 0 {
work[i], work[j] = work[j], work[i]
}
}
}
}
return work
}
// FastShift is a faster implementation only needing O(n)
func FastShift(arr []int) []int {
work := make([]int, len(arr))
copy(work, arr)
sp := 0
ep := len(work) - 1
for sp != ep {
if work[ep] == 0 {
ep--
}
if work[sp] != 0 {
sp++
}
if work[sp] == 0 && work[ep] != 0 {
work[sp], work[ep] = work[ep], work[sp]
}
}
return work
}
|
The macroeconomic impacts of the COVID-19 pandemic: A SIR-DSGE model approach This paper proposes a susceptible-infected-removed dynamic stochastic general equilibrium (SIR-DSGE) model to assess the macroeconomic impact of the recent COVID-19 outbreak. The parameters of the SIR setting are calibrated to COVID-19 data from China. Using the model, we illustrate how the pandemic could result in consumption and output loss. We show that a combination of quarantine policy and random testing of the uninfected is effective in reducing the number of infected individuals and outperforms the alternative scenarios in which only one of the policies is implemented. Moreover, the economic impacts of both policies are evaluated. Compared with the decentralized equilibrium, we find that the Ramsey social planner allows output to decrease more substantially during the pandemic, in exchange for a faster economic recovery. Introduction The recent outbreak of coronavirus (COVID-19) disease had already infected more than 150 million people and caused approximately 3 million deaths worldwide as of the end of May 2021. Although most of the major economic data covering the relevant period have not been released, it is expected that the pandemic has substantially disrupted economic activity. To address this, quarantine measures and fiscal and monetary policies have been implemented in many countries. However, the economic framework for studying transmission mechanisms and the effectiveness of these policies is still under-researched. In this paper, we develop a susceptibleinfected-removed dynamic stochastic general equilibrium (SIR-DSGE) model that combines the SIR model (Kermack & McKendrick, 1927) from mathematical biology that depicts the transmission of infectious disease with a canonical new Keynesian DSGE model to characterize the event. In particular, we use the model to characterize the macroeconomic effects and transmission mechanisms of the COVID-19 disease outbreak. Furthermore, we use the model to analyze the economic cost and benefits of containment policy and random testing. We also consider a Ramsey social planner problem to solve for the optimal monetary policy in response to the outbreak. To bridge the SIR and DSGE models, we assume that the severity of the disease, which is measured by the number of infected individuals, affects the economy through both the demand and supply sides. For the demand side, as in Faria-e Castro, we assume that households' marginal utility of consumption decreases with the severity of the disease. We make this assumption because, for example, the risk of being infected when staying in crowded areas would reduce households' desire to consume. On the other hand, the economic impact of the pandemic could be on the supply side since firms might not be able to assess the supply of intermediate goods due to the immigration restrictions imposed by many countries. We characterize this effect as a reduction of the total factor productivity (TFP) level. We show that both of these effects would result in reductions in consumption and output. Moreover, households that consume less would have less incentive to work and, therefore, supply less labor. Although consumption converges back to the steady-state level once the pandemic is over, we find that considerably more time is required for output to recover due to the prior declines in labor and capital investment. We show that both containment policies and random testing are effective means to curb the infected number. The former works through reducing the number of susceptible, while the latter works through discovering asymptomatic individuals. In particular, randomly testing 10% of the uninfected could reduce the peaked value of the infected share by two-third. Furthermore, it is more effective in curbing the infected share if one implements both policies simultaneously. Our result suggests that economic impacts of the two policies differs: containment policy prevents output loss more effectively in the short run, while can lead to slower output recovery if persistently implemented. A random testing policy, in contrast, has minimal short-term impact on output, but can accelerate output recovery. By comparing the centralized and decentralized equilibria, we find that although the centralized output decreases more substantially during the pandemic, the decentralized output is recovered at a slower rate than the centralized output. Due to the presence of the price stickiness, the decrease in the TFP level leads to a higher wage rate in the short run. The households would, therefore, increase their labor supply in the short run and decrease it in the long run. With this decision, the decentralized output slowly recovers in the long run after the pandemic. However, the social planner allows both the labor supply and investment to decrease in the short run. To this end, the centralized output and employment recover at a much faster rate. The remainder of the paper proceeds as follows. Section 2 discusses the related literature. Section 3 discusses the background of the standard SIR model. We also explain how this model can be linked to the standard DSGE model. Then, Section 4 presents the calibration procedure and the results of the numerical exercises. Finally, Section 5 concludes the paper. Related literature Since the COVID-19 outbreak began, macroeconomists have begun to develop frameworks for policy analysis. Berger, Herkenhoff, and Mongey examine the effects of conditional quarantine policy and testing using a susceptible-exposed-infectious-recovered (SEIR) model. Since there are asymptomatic individuals, one cannot single out and quarantine only the infected individuals. Hence, a pure quarantine policy that applies to everyone, which would entails a massive economic cost, seems to be the only possible measure to curb the spread of the disease. Remarkably, they show that combining a looser quarantine policy with the random testing of asymptomatic individuals is as effective as a simple quarantine policy in terms of the numbers of deaths and symptomatic infections. Using a SEIR model, Piguillem and Shi also conclude that a combination of quarantine policy and testing of the asymptomatic individuals is better than imposing a simple, indiscriminate quarantine. The authors find that 87% and 12% of the asymptomatic individuals should be tested if the social welfare function is linear and logarithmic, respectively, where the latter results in a double consumption-equivalent gain compared to the pure quarantine policy. We perform a related numerical analysis and reach a similar conclusion. Faria-e Castro constructs a DSGE model with two households (borrowers and savers) and two sectors (non-service and service). Using the model, the author compares different types of fiscal policies. The author characterizes the pandemic as a 60% decrease in the marginal utility of consumption in the service sector and emphasizes unemployment insurance as the most effective policy in the presence of the shock. In line with Faria-e Castro we also find that it is important to preserve labor supply in the long run. In contrast to our model, the multi-sector and multi-household model of Faria-e Castro should be better at modeling the distributional impacts of the pandemic. On the other hand, endogenous labor, monetary policy, and more important, the epidemiology component in our model are not considered in Faria-e Castro but are necessary for our findings. In addition, the author also does not consider the Ramsey planner solution. Alternatively, Guerrieri, Lorenzoni, Straub, and Werning characterize the COVID-19 outbreak as a negative supply shock. In a general equilibrium model, a decrease in firm productivity would reduce household income, which would in turn decrease the household goods demand. Guerrieri et al. show that such a reduction in aggregate goods demand would not induce a significant effect in a one-sector model, regardless of the existence of a household liquidity constraint. They construct a multi-sector model with firm exit and job destruction and show that a negative supply shock in one sector (the contact-intensive sector) could result in recession by triggering the Keynesian multiplier effect. To this end, they suggest that monetary policy and shutting down the contact-intensive sector can mitigate the impact of the shock. In this paper, we follow Faria-e Castro to consider the pandemic's effect on the demand side. Inspired by Guerrieri et al., we also consider the pandemic's effect as a negative supply shock. Our work is closest to Eichenbaum, Rebelo, and Trabandt, who also merge the SIR model with a general equilibrium model. They modify the SIR model such that the infection rate endogenously depends on individuals' consumption and working decisions. During the pandemic, household reductions in consumption and labor supply would, on the one hand, mitigate the spread of the disease and, on the other hand, exacerbate the economic slowdown. Using the model, the authors show that the optimal containment rate should move in parallel with the number of infected. Under this policy, the peak percentage of the infected population could be reduced from 5.3% to 3.2%. We differ from Eichenbaum et al. in the following respects. First, while Eichenbaum et al. solve for the optimal containment policy, we consider a Ramsey problem for computing the optimal monetary policy. Moreover, apart from Eichenbaum et al., who focus only on containment policy, we also examine the effectiveness of a combination of random testing and containment policy, as in Berger et al. and Piguillem and Shi. Second, our model differs from Eichenbaum et al. by including more components, such as capital, nominal rigidity, and monetary policy. Third, we consider a stochastic environment, while the model of Eichenbaum et al. is deterministic. Finally, the containment policy is modeled as a consumption tax rate in Eichenbaum et al.. We do not follow their approach since we believe that the containment policy would not increase government revenue per unit of household consumption. Instead, we characterize the containment policy as a reduction in the number of susceptible. An introduction of to the SIR model The susceptible-infected-removed (SIR) model originated in the early 20th century and is a popular toy model in epidemiology for depicting the transmission of infectious disease (Anderson, 1991;Kermack & McKendrick, 1927). As its name suggests, the model consists of three components, namely, the number of susceptibles S t, the number of infected people t, and the number of recovered people R t at time t. All three variables are time varying. In particular, we refer to a person as susceptible (at time t) if he/she is uninfected and could catch the disease during the period. A person is infected if he/she is confirmed to have the disease at time t and has not yet recovered or died. A person is recovered if he/she caught the disease before time t, has recovered and is immune to the disease from period t onward. As explained below, since we can only obtain the COVID-19 data in Hubei province after the lockdown policy is implemented, it is not possible to estimate the underlying model in the SIR model in which no quarantine policy is assumed. In this regard, unlike the SIR model, we assume that with the lockdown policy, there are 1 − a 0 ∈ share of the population is protected by the lockdown policy or is cautious enough that it is unlikely to be infected. As a result, the total population in the states of S t, t, and R t only share a 0 of the total population. The value of a 0 depends on the strength of the lockdown policy. 12 Furthermore, we focus only on the transmission of the disease in a location or a closed economy. The standard SIR model assumes that no deaths or births occur and that no people enter or exit the location. Hence, the population N is constant over time. For any time t, we have: which implies that, excluding the non-susceptible, the individuals in the location must be in one of the three states. It is worth noting that the model assumes that there is no latent period for infected people. 3 In other words, all infected people show symptoms of the disease and, thus, can be observed. One usually normalizes the population number to 1, and we have the following equation: where S t ≡S t /(a 0 N t ), I t ≡ t /(a 0 N t ), and R t ≡R t /(a 0 N t ). As discussed in Section 4.3, with the estimate a 0, we will counterfactually change the value of a 0 to examine the disease transmission process with different degrees of containment policy. The discrete-time version of the SIR model is a system of nonlinear difference equations as follows: 1 Note that a 0 cannot be 0 if there are individuals who have already in the states of t or R t. Precisely, in the extreme case where all the susceptible are perfectly protected by the lockdown policy, we have S t = 0 and a 0 = t +R t N according to Eq.. 2 It is worth noting that Maier and Brockmann also propose a SIR-X model that incorporates a containment policy such that not all of the population will eventually become infected. In their model, they introduce an additional state X t that denotes the individuals who are protected by the containment policy. Then, Eqs. and below are modified into: respectively. 0 and 1 are the rate of transmission from susceptible and infected to the protected state, respectively. That is, In contrast to this model, we do not model the transitional dynamics between the susceptible and protected state. Instead, we assume that a fixed proportion of the population is protected by the containment policy throughout all the periods. We believe that this is a more appropriate assumption in our case since the containment policy is already implemented in China on the first day of our dataset. with the initial values S 0, I 0, and R 0 being given. In Eqs. and, the parameter a 1 > 0 denotes the transmission rate of the disease. Hence, the term a 1 S t I t is the share of individuals, who were originally susceptibles and are infected at time t. This setting assumes that the share of newly infected persons is proportional to the share of susceptibles S t and infected people I t during the period. In other words, increases in both susceptibles and infected individuals would increase the share of newly infected people. To see this, one can assume that each of the infected individuals randomly meets b 1 > 0 susceptibles in a period. At each meeting, the disease is transferred to the susceptibles with probability b 2 > 0. Hence, the share of newly infected people in period t is b 1 b 2 S t I t. Thus, we obtain the above term by setting a 1 = b 1 b 2. In Eqs. and, the parameter a 2 > 0 refers to the recovery rate or the recovery probability of the infected. Hence, a 2 I t is the share of newly recovered people in period t. In sum, in Eq., the susceptibles in the next period S t+1 equals the current number of susceptibles S t, less the share of newly infected individuals a 1 S t I t. In Eq., the change in the share of infected increases by the share of newly infected individuals a 1 S t I t and decreases by the share of recovered individuals a 2 I t. Finally, Eq. states that the share of recovered individuals increases by the share of newly recovered individuals a 2 I t. Usually, the initial period t = 0 would be set as the first day before the disease is discovered. In this case, one can set S 0 = 1 −, I 0 =, and R 0 = 0, for some small number > 0, to denote the fact that almost all individuals are initially susceptibles. As shown, the shares of susceptibles and recovered continue to decrease and increase over time. Therefore, as time t→ ∞, one can expect that the variables converge to {S ∞, I ∞, R ∞ } = {0, 0, 1}. In other words, all the individuals will eventually be infected and recover. 4 Over the period, the disease disappears in the location because the population becomes "herd immune". Indeed, it is unrealistic to assume that everyone eventually catches the disease. This result arises because the model assumes that the susceptibles would contact the infected at the same rate regardless of the risk involved and that there is no policy to quarantine the infected individuals. 5 Linkage between the SIR and DSGE models To link the above SIR model with the DSGE model, we assume that the disease can affect the economy through both the demand and supply sides. Assume that in the economy, there are infinitely many identical households. The representative household has the following expected lifetime utility: where is a discount factor. C is a risk-aversion parameter. C t and L t are consumption and labor supply at time t, respectively. L and are the scale of labor disutility and the inverse of Frisch elasticity, respectively. The key difference between our model and the literature lies in the introduction of the term H C,t, which is a health-related variable that affects consumption. For the demand side, we assume that the household's health condition affects its desire to consume. An increase in H C,t indicates an increase in the desire to consume. To this end, assume that H C,t is determined by the following equation: where H C is the steady-state value of H C,t. a 0 I t is the share of infected individuals at time t. C > 0 denotes the percentage decrease in H C, t for a 1 unit increase in the number of infected. The setting in Eq. is to capture the fact that the fear of being infected or unemployed in the future would reduce the household's desire to consume. To align ours with the standard DSGE model, we set H C = 1, so that household utility Eq. coincides with that of the standard model in steady state. For the supply side, we assume that the TFP level A t is time-varying and satisfy the equation: for some parameter A > 0 and steady-state value A. It is believed that the pandemic should affect relatively more on the demand side rather than the supply side. It is because with the same capital and labor inputs, the firms should be able to produce the same amount of output regardless of the disease. However, if one considers the fact that some intermediate inputs are imported from other countries, whose supply might be affected by the foreign containment policy or immigration restriction, the pandemic could have an impact on the good supply side. In our closed economy model, this can be translated to a reduction in TFP level as specified in Eq.. 4 Note that if one assumes that individuals can die from the disease, Eq. becomes: where I > 0 is the death rate. The terminal values would still be the same in this setting. 5 Please refer to Atkeson for a more detailed introduction to the SIR model. We adopt the standard model settings for the rest of the new Keynesian DSGE model. The model details should be familiar to the economic community and are therefore only presented in Appendix A. Calibration In this section, we discuss the procedure for calibrating the parameter values. Assume that one period in the model represents a day. Since the standard model usually assumes yearly or quarterly model frequencies, our parameter values are correspondingly converted from those in the literature. First, as in the literature, we set the capital share of production to 1/3 (e.g., Basu and Bundick ) and the degree of risk aversion C to 2 (e.g., Heutel ). Since the economic components of our models are similar to most of the related literature, we choose the values of the remaining parameters based on Li and Liu who estimate a standard new Keynesian model using Chinese data. In particular, we set the inverse Frisch elasticity to 0.2004. Li and Liu estimate that the quarterly discount factor equals 0.99. This value translates to a 1% (1/(1 + 1 %) ≈0.99) quarterly discount rate, which implies a 0.011 % ((1 + 1 %) (1/90) − 1) daily discount rate, and thus, the daily discount factor is 0.999889(1/(1 + 0.011 %)). The scale parameter of labor disutility L is calibrated such that the steady-state value of labor supply L equals 1/3. We find that L equals 0.4631. On the firm side, as in Li and Liu, the degree of substitution between intermediate goods is set to 10. Li and Liu estimate that the quarterly capital depreciation rate equals 3.5%. This implies that daily depreciation rate K equals 0.0382% ((1 + 3.5 %) (1/90) − 1). For the price stickiness parameter, the quarterly rate estimated by Li and Liu is too large (0.9454) to convert to a daily frequency. Kim also points out that increasing the frequency of a DSGE model would lead to an upward bias on the Calvo parameter. Hence, we follow Christiano, Trabandt, and Walentin and assume that the quarterly rate equals 0.75 which implies that 25% of the firms can adjust their prices every quarter. Hence, is equal to 0.9975 (1 − ((1 + 0.25) (1/90) − 1)). Finally, the TFP level A is normalized to 1. For the Taylor rule Eq., we calibrate the parameters to match the process in Li and Liu in quarterly frequency. The detailed calibration procedure is presented in Appendix B. We estimate that the degree of interest rate smoothing i is 0.9417. The elasticity parameters and Y are set to 1.724 and 3.944, respectively. For the parameters {a 0, a 1, a 2, I 0 } in the SIR model, we choose them to match COVID-19 data from China. While coronavirus is still growing in many countries around the world, the number has already peaked in China, and so we believe that the estimated parameters will be stable even after more data are released in the future. The data are obtained from an online repository held by the Johns Hopkins University Center for Systems Science and Engineering (JHU CSSE). 6 The raw dataset contains the cases of confirmed infections, deaths, and recovered individuals in the provinces every day starting on 22 January 2020. We obtained the data on 12 April 2020, so three series of 82 days are obtained. Recall that the variable I t denotes the number of those who are infected but have not yet recovered or died. Hence, we measure the number of infected by using the number of confirmed cases less the number of recovered and dead. It is worth noting that there are limitations to using the SIR model to fit the data. First, the SIR model assumes that all infected individuals can be discovered. However, many of the infected do not show any symptoms, especially in the first few days of infection. Furthermore, some of the recovered individuals lose their immunity and are reinfected again. Such a possibility is also not considered by the SIR model. To this end, we will consider extensions of the SIR model in Section 4.5 below. In sum, we choose a 0, a 1, a 2, I 0, and N to minimize the sum of squares of the difference between the infected data and the series generated by the system Eqs. -. The total population N is set to 1, 435, 000, 000, which is approximately the population size in China in 2019. We find that {a 1, a 2 } = {0.3047, 0.1049}, I 0 = 0.011487, and a 0 = 1.318e − 4. The small value of a 0 indicates that the lockdown policy implemented is very effective in containing the disease. We estimate that the number of susceptible is only a 0 N = 189, 117. As of 12 April, 2020, the total number of infected was 83,134, which is approximately 44% of the estimated susceptible. From the estimates, the basic reproduction number R 0 ≡ a 1 /a 2 = 2.9, which is within the range discussed in the literature (e.g., Wang et al. ). Wang et al. only focus on Wuhan, and estimate that R 0 could be as high as 3.1 in the first phase (1 December 2019 to 23 January 2020) and reach 0.9 or 0.5 in the last phrase (from 15 February 2020 onward). Fig. 1 compares the series of data and fitted values of the number of infected during the full period. There are two subperiods that the model does not fit very well, namely, the sudden upward jump in the data on day 23 (13 Feb) and the two tails. The former is because Chinese officials changed the definition of a confirmed case that day. The latter is not fitted well partly because the data series does not reach zero at the end date. According to the National Bureau of Statistics of China, the reductions of the Chinese GDP and consumption are 6.80% and 5.13% in 2020Q1, respectively, compared to the values in the same quarter last year. 7 Furthermore, the registered unemployment in the urban area in the 2020Q2 is 10.05 million persons, which is 6.20% lower than that of the previous year. 8 We use these three targets to calibrate C, A, and I, where I is the scale of the investment adjustment cost. 9 In particular, we find the values of C, A, and I such that on day 90 after the pandemic outbreak, output, consumption, and labor supply have decreased by 6.80%, 5.13%, and 6.20%, respectively, from their steady-state values. We find that { C, A, I } = {1.9700, 0.5834, 0.0350}. The calibration procedure is 7 We do not use the quarter-on-quarter percentage change because the Chinese GDP is usually lower in the first quarter even after deseasonalization. Here we want to measure the GDP reduction from its steady-state level, so we use the year-on-year percentage change. 8 Note that we use the unemployment data in 2020Q2 instead of 2020Q1 because the number of unemployed in 2020Q1 is even less than that in the previous year. This could be explained by models with, for example, search friction, firing cost, and firms' cost of exiting the market. Since our model does not have these components, the equilibrium labor would respond instantly to the pandemic shock. To this end, we choose a quarter after to allow the pandemic effect on employment to be clearly revealed. 9 Note that the parameter I is also in Li and Liu and is estimated to be 0.022. We do not adopt this value for two reasons. First, the estimated value of I varies largely (from 0.022 to 8.280) in Li and Liu in the models with different specifications of the Taylor rules. As mentioned above, the parameter values of the Taylor rule are largely affected by the model frequency assumed. Since we assume a model with different frequencies as Li and Liu, this value of I is not used here. Second, in our model, such a value of I is too small such that the investment would increase throughout the pandemic, which is not consistent with the data. explained in Appendix B. The model is solved using Dynare software using the first-order perturbation method. 10 Table 1 reports the choice of the parameters for the numerical exercise below. Macroeconomic effects of infection shock In this section, we explain the transmission mechanism for an increase in infected individuals in the economy. Fig. 3 reports the dynamic responses of the endogenous variables to the disease outbreak. 11 The primary effect of the shock is an increase in the share of infected I t, which a day later, gradually begins to be reflected by an increase in the share of recovered individuals. A larger share of infected individuals also implies fewer susceptibles. One direct consequence of the increase in the infected share is the decline in output. As mentioned, we calibrate the parameters such that the accumulated reduction in output is as much as 6.8% on the first 90 days. Note that output is driven down through both the supply and demand sides. On the one hand, the output demand declines due to the reduction in marginal utility to consume. On the other hand, the output supply declines due to the reduction in the TFP level. In particular, for the demand side, the increase in the share of infected would decrease the marginal utility of consumption. Thus, as shown, the consumption path moves in the opposite direction as the path of the share of infected. Household consumption converges rapidly back to the steady state once the number of infected falls back to zero. The reduction in consumption would reduce the output demand. For the supply side, the TFP level is decreased during the pandemic, which would directly lead to the decline in output through reducing the output supply. Note that the effects from the supply and demand sides on labor supply are opposite. For the supply side, as explained in Gal and Gal and Rabanal, the negative TFP shock is associated with more labor supply. It is because, first, the shock would reduce the supply of output, which should increase the product price. However, the nominal rigidity restricts the price readjustment for some of the firms. Hence, there would be an excess demand for intermediate goods. In this regard, the firms would increase their demand for labor to scale up their production. This would result in positive responses in labor and wage rate in the short run. For the demand side, households who demand less consumption are less reliant on labor income and so have less incentive to work. With a higher wage rate in the short run, the forward-looking households would choose to reduce their labor supply in the long run. These two opposite forces explain why the labor supply increases in the first 28 days and decreases in the long run. Similar arguments can be applied in explaining the responses of investment and capital. In the short run, households that spend less on consumption would shift their spending to investment. As a result, investment I K,t, capital K t, and the capital price q t increase. Moreover, in the short run, the wage rate w t and the rate of capital return r K,t increase, due to the increase in the demand for labor and capital induced by the reduction in TFP level. In the long run, the decline in labor supply decreases the marginal product of capital and, therefore, the rate of capital return r K,t, which would substantially discourage households' investment in capital. As a result, investment I K,t decreases. Moreover, firms reduce their production scale by cutting production Y t and hiring less labor, which drives down the wage rate w t. With a lower TFP level, the profits earned by the firms and, thereby, the household income decrease. The lower demand for capital by households also contributes to the reduction in capital stock K t in the long run. Finally, according to the Taylor rule Eq., the negative output growth also results in a fall in the nominal interest rate. As shown, output and labor are slowly recovering after day 100. However, capital continues to decrease after day 100, owing to the very low depreciation rate specified in the daily frequency. Interestingly, many variables continue to deviate from their steady-state values even after the share of infected has already dropped to zero. In other words, in line with existing DSGE models estimated at a quarterly frequency, several quarters must pass for the economy to absorb the temporary decrease in consumption. The effect of containment policy Note that in the above, we calibrate the model using the data obtained when the lockdown policy is already implemented. What are the economic consequences if the government implements stricter or looser lockdown policies during the time? In China, the lockdown policy effectively forces people to stay at home. People cannot interact with each other and hence the possibility of being infected is completely ruled out. In the language of the SIR framework, this implies that the shares of the population being susceptible, infected, and recovered decrease. In other words, we have the value of a 0 in Eq. decreases. In this sense, we characterize a looser (stricter) lockdown policy by an increase (decrease) in the value of a 0. In particular, when a different containment policy is implemented in day t 0, the time-varying a 0,t should satisfy: where 0 is the share of the population in the three states under the new containment policy. a 0 = 1.318e − 4 is the original share calibrated above. The new policy is stricter (looser) than the original one if 0 < (>)a 0. When the new policy is implemented at time t = t 0, the share of susceptible would jump up or down. In particular, we have: where S new t0 and S old t0 are the shares of susceptible with and without the policy change, respectively. 12 Although implementing the containment policy could reduce the share of susceptible, it comes with an economic cost. In our model, we assume that households' disutility from working increases once a stricter lockdown policy is implemented. Specifically, the households' utility Eq. is replaced by: where the additional term H L,s is referred to as the health-related variable of labor supply. Assume that H L,s satisfies the following equation: where L > 0 is a sensitivity parameter that measures the response of H L,t to the change of a 0,t. The equation states that H L,t is negatively associated with the value of a 0,t. Note that when a 0,t = a 0, H L = 1 and household utility Eq. reduces to the original function Eq.. Once a stricter (looser) policy is implemented, we have a 0,t < (>)a 0, and so H L > (<)1. Using this rule, we examine how the macroeconomic variables respond to different containment policies. Although the choices of 0 and L are subjective, their values do not affect the qualitative findings reached in this section. Recall that a 0,t denotes the share of the population that is not protected by the containment policy in period t. Hence, L measures the percentage change in the labor disutility parameter H L,t when there is one percent more population protected by the containment policy. Below, we set L = 100. We also consider different values of L in the online Appendix. We also consider two other containment policies where 0 = 2a 0 and 0.5a 0. Fig. 4 displays the time paths of the endogenous variables under the standard containment policy (solid lines), and the containment S t + t +R t = 0 N when t = t 0, a 0,t changes from a 0 to 0, but the values of t and R t remain constant. Hence, compare with the model without the policy change, we have: where S new t and S old t are the variables with and without the policy change, respectively. Dividing both sides of the above equation by a 0 N yields Eq.. policy with 0 = 1.5a 0 (dashed lines) and 0 = 0.5a 0 (dotted lines). The new policies are implemented on day t 0 = 30. Note that the new policies would directly lead to a jump of the susceptible, which would transform into different time paths of the infected and recovered shares. The stricter containment policy could effectively flatten the curve representing the share of infected. Even if the new policy is implemented around the peak of the curve, the share of infected drops significantly faster than in the benchmark. In contrast, with a looser policy, the infected share would further increase from its original peak. As can be told from the terminal state of the recovered share, more (less) people have eventually been infected under a looser (stricter) policy. Concerning the economic impacts of the policy, it is shown that a stricter containment policy is effective in preventing substantial consumption and output declines. In contrast, the looser containment policy exacerbates the decreases in output and consumption. In particular, on day 100, output decreases from 17% to over 25% under the new policy when 0 = 1.5a 0. This result is intuitive because we link the SIR and DSGE blocks by the infected share I t according to Eqs. and. A higher (lower) infected share under the new policy would negatively affect output and consumption to a greater (lesser) extent. 13 13 The result that consumption decreases to a lesser extent under a stricter lockdown might not be realistic in reality. It is because we assume that the containment policy has no impact on the marginal utility of consumption, and one can easily modify this assumption by including the value of a 0,t in the variable H C,t specified in Eq.. This is not assumed here to single out the labor disutility effect. With a greater decrease in consumption, households would switch their spending to investment. Hence, a looser containment policy is associated with more increases in investment and capital in the short run. In addition, by Eq., the labor disutility also increases under a stricter containment policy. The setting explains why the labor supply would decrease at a faster rate in the short run (from day 30 to 50) right after the new policy is implemented. In contrast, labor supply increases in this period under the looser policy. However, from day 50 to day 200, since the stricter policy is effective in curbing the disease outspread, labor supply reduces to a lesser extent. Moreover, one major impact of the policy is on the wage rate w t, which increases substantially immediately after the stricter policy is implemented. This is because the policy induces a higher disutility of labor supply, which would reduce the labor supply in the market. Finally, the smaller output decline in the short run under the stricter policy also induces a minor drop in the nominal interest rate. In addition to the impulse response functions, in the online Appendix, we also examine the effects of the containment policy on the deterministic steady state. Ramsey problem To understand the optimal monetary policy and the movement of macroeconomic variables in the first-best scenario, we consider a Ramsey problem in this section. The Ramsey planner problem assumes that there is a benevolent government in the economy that is subject to the first-order conditions of the decentralized equilibrium and can choose all the endogenous variables to maximize the expected lifetime utility of the representative household. The detailed formation of the problem and the FOCs are reported in the online Appendix. Fig. 5 compares the dynamic responses of the endogenous variables in the centralized (dotted lines) and decentralized (solid lines) equilibria. First of all, the shapes of the consumption responses under the two equilibria are similar. Both the decentralized and centralized consumption decrease by 30% from its steady state when the infected share reached the peak. However, the output responses are very different: compared to the decentralized output, the centralized output decreases more in the short run but recovers more rapidly to the steady state. In the short run, the centralized investment I K,t and wage rate w t decrease, in contrast to the increases in the decentralized equilibrium. As explained above, the short-run increases of the labor and wage rate in the decentralized equilibrium are due to the presence of price stickiness. Although the households that are less desirable to consumption want to reduce their labor supply, the higher wage rate in the short run would postpone the households' labor supply reduction to the long run, which would result in a slower recovery of the output. In contrast, the social planner is flexible enough to sacrifice the short-run investment and labor and allow them to return to the steady-state values earlier. The higher centralized labor supply and greater capital accumulation in the long run speed up the process of economic recovery. As a result, although the centralized output experiences a decline in the short run, it rapidly converges back to the steady state. In particular, the centralized output already returns to its steady-state level on day 100, while the decentralized output remains 15% below its steady-state level on the same day. In addition, we find that the nominal interest rates in the two equilibria move in different directions. The difference in interest rate responses in the two equilibria is due to the presence of the Taylor rule. Note that the nominal interest rate in the decentralized equilibrium is determined by the Taylor rule. In the decentralized equilibrium, output decreases, and the Taylor rule Eq. indicates a large fall in the nominal interest rate. In contrast, the social planner is not constrained by the Taylor rule. It allows the interest rate to increase to let the firms increase their product prices and decrease their output so as to mitigate the impacts of the negative TFP shock. Note that when the firms can scale down their production, the demand for capital and labor decreases. This explains why there are declines in the centralized labor and capital in the short run. In sum, the social planner chooses to allow output to decrease substantially during the pandemic, in exchange for a faster process of economic recovery. Although the output would decrease to a greater extent in the decentralized equilibrium, in the online Appendix, we show that one can use a fiscal policy to reduce this output reduction. Alternative SIR models The SIR model considered in the previous section might have deficiencies in modeling the spread of COVID-19 in two respects. First, it assumes that recovered individuals are immune to the disease. However, as mentioned by Berger et al., there is thus far no evidence that immunity necessarily develops among the recovered. How would the economic impact of the pandemic be different if the recovered could be re-infected? Second, the SIR model assumes that all the infected individuals present symptoms and can be discovered, which is not the case for COVID-19. We follow Berger et al. and Piguillem and Shi and consider the asymptomatic individuals in our model and examine the effectiveness of random testing of uninfected individuals in conjunction with containment policy. SIR model with partial immunity We modify the SIR model Eqs. to as follows: The major difference between the two systems of equations lies in the term a 3 R t in Eqs. and that denote the number of individuals who have recovered but lose their immunity at time t. There has been news showing that up to 3 -10% of recovered patients in Wuhan (a city in Hubei province) test positive again. 14 As pointed out by Amesh Adalja, an infectious disease expert at the Johns Hopkins Center for Health Security, the coronavirus could eventually turn endemic, akin to epidemic typhus, and circulate seasonally and never disappear, which would be in contrast to the predictions of the standard SIR model. 15 Fig. 2 displays the flowcharts between the standard SIR model Eqs. -) (panel a) and the modified SIR model Eqs. - (panel b). As shown, in the standard SIR model, the susceptibles keep transitioning to become the infected who then continue the transition to recovered. In the modified SIR model, the introduction of a community that loses immunity (the red arrow) allows inflow and outflow in each of the three states. Fig. 6 plots the dynamic responses of the endogenous variables with a 3 = 0 (solid lines), a 3 = 0.03 (dashed lines), and a 3 = 0.1 (dotted lines). As shown, the primary difference among the three lines is on the SIR variables: an increase in the rate of immunity loss a 3 would reduce the number of recovered people over time. This would in turn lead to fewer susceptibles and more infected individuals. More important, the number of infected would not fall back to zero over time. From the above system, one can show that the number of infected would converge to a terminal value (a 2 − a 1 )/. It is expected that a high and persistent number of infected would increase the damage to the economy. In particular, output, consumption, and labor face a greater reduction during the disease outbreak. Moreover, in the standard SIR model under which output, labor, and investment recover on approximately day 100, all of them continue decreasing in the cases where a 3 > 0. This numerical exercise reveals that the possibility of reinfection, even at a rate as low as 3%, could entail considerable costs for the economy in terms of consumption, output, and labor. It is worth noting that in this model, output would keep decreasing over time until a vaccine is developed. SEIR model The susceptible-exposed-infected-removed (SEIR) model is an extension of the SIR model that incorporates the exposed population. An individual is exposed if he/she is infected but does not yet show any symptoms. Denote by E t the number of exposed individuals in period t; the SEIR model is characterized by the following equations: Furthermore, the accounting Eq. is replaced by the following: As shown above, the main difference between the SEIR and SIR models lies in the additional Eq. which characterizes the evolution of the exposed population. In period t, a a 1 S t E t share of the population that is originally susceptible becomes exposed. Furthermore, a a 4 E t share of the population that is originally asymptomatic becomes infectious. For simplicity, the values of a 1 and a 2 are set to be the same as above. As mentioned by Berger et al., the latent phase of COVID-19 lasts for approximately 7 days, so we set the value of a 4 to 1/7. The flow dynamics among different groups are shown in panel c of Fig. 2 above. Indeed, simply extending the SIR model to the SEIR model would have no impact on the results discussed above. This is because, in contrast to the exposed population E t, it is the infected population I t that is observable in both models. If both models are fitted to the data, the dynamics of I t would be the same in the two models, and hence, the economic impact, induced through Eq., would also be the same. In this regard, instead of comparing the predictions of the SIR and SEIR models, we make use of the SEIR model to examine the effectiveness through virus testing. It is worth noting that exposed individuals can be discovered through virus testing. For simplicity, we rule out the possibility of false positives and false negatives, and assume that the test results are 100% accurate. Suppose that policymaker randomly tests a share of the susceptibles and exposed population every period. From the testing, a E t share of the total population tests positive in period t. In other words, represents the testing intensity set by the policymaker. As shown in Eqs. and, the group of individuals who test positive would transition from the exposed to the infected population. Our focus in this section is on examining the effect of random testing by varying the value of. In both of our main references, Berger et al. and Piguillem and Shi, the economic impacts of the testing policy are discussed. The testing cost is not taken into account by Berger et al., so we follow Piguillem and Shi to model it as a term subtracted from the production function: where (.) is a testing cost function that depends on the share of individuals tested. As mentioned, is the parameter of testing intensity. Both susceptibles and exposed individuals were tested. If the susceptible is tested, a negative result is shown and he/she remains susceptible. If the exposed is tested, a positive result is shown and he/she becomes infected. In Eq., Y t is interpreted as the economy's output less the testing cost. 16 In particular, we assume that where c 0 is the testing cost per person. Fig. 7 reveals the dynamic responses of the share of infected and output of the SEIR-DSGE model when the test intensity equals 0 (solid lines), 0.05 (dashed line), and 0.1 (dotted lines). The responses of other endogenous variables can be found in Fig. 8 in the Appendix. As shown, randomly testing the asymptomatic individuals is very effective in reducing the share of infected. In particular, testing 10% of asymptomatic individuals can reduce the peak value of the infected population to approximately 30% of its original value. Although in the long run after day 100, the infected paths with > 0 are slightly above their untested counterpart, the benefits of testing in terms of curbing the share of infected are evident. Economically, a daily test of 10% of the population can result in substantial output reductions and high costs. Random testing and containment policy How effective would random testing be compared to containment policy? We first assume that the containment rule Eq. with 0 = 0.5a 0 is implemented. Then, complementing the containment rule Eq., we assume that the policymaker simultaneously provides random testing to 5% of the asymptomatic individuals every period. Assume that both of the policies are implemented on day 30. Panel b of Fig. 7 displays the dynamic responses of the share of infected and output under the no-policy (solid lines), pure containment policy (dashed lines), containment and random testing (dotted lines), and pure testing (dashed-dotted lines) scenarios. As above, the responses of other variables are reported in Fig. 9 in the Appendix. Concerning the policy impact of the number of infected, we find that (i) all three policies are effective in speeding up the converging rate of the infected to zero. (ii) Random testing increases the share of infected in the short run since many more asymptomatic individuals are discovered in the first few days of testing. (iii) Among the three policies, the combination of containment and random testing is the most effective in terms of curbing the share of 16 Another approach to model the testing cost is to assume it is a part of the government expenditure. In particular, we can introduce a lump-sum tax to the household's budget constraint Eq., and assume that the tax is spent as the testing cost. In this case, the GDP accounting Eq. would become: We find that, with this setting, the output increases with the testing cost and consumption is not clearly crowded out by the cost. This result is clearly not realistic and so we follow the approach by Piguillem and Shi Concerning the economic impact, we find that, in the short run, output decreases to a lesser extent under a stricter containment policy, owing to its lower infected share. However, the economy with a containment policy implemented sees its output decrease over time, whereas the economy without it is already recovering. In contrast, although random testing does not prevent output reductions in the short run, the resulting output is consistently higher than that of the no-policy benchmark in the long run. In sum, in line with Berger et al. and Piguillem and Shi, we show that random testing is an effective policy to complement containment policy in curbing the infected number. Compared with the containment policy, the disadvantage of the random testing is that it leads to a short-term increase in the infected share right after its implementation, and so in the short run, output would still be greatly reduced with this policy. The advantage of it is that it reduces the extent of the output reduction in the long run. Conclusion This paper proposes a SIR-DSGE that incorporates the classical SIR model into a canonical new Keynesian DSGE model. We use COVID-19 data from China to calibrate the pandemic component of the model. Using the model, first, we examine how the increase in the share of infected individuals could result in an economic slowdown. Second, we study the effectiveness of various policies in curbing the disease and mitigating economic loss. Y.T. Chan Assume that the disease would negatively affect the economy by simultaneously reducing the household marginal utility of consumption and the TFP level. We show that an increase in the share of infected could result in a substantial decline in output, consumption, and labor during the pandemic. Moreover, in the long run, right after the pandemic ends, output, labor, and investment continue decreasing, and the economy starts recovering only on day 100 after the pandemic began. We find that a stricter containment policy, that reduces the share of susceptible, is effective in "flattening the curve" from its peak in a shorter time. The advantage of this policy is that during the outbreak, the output and consumption loss could be reduced. Apart from the containment policy, we find that if there is an incubation period of the disease, randomly testing susceptibles and asymptomatic individuals could effectively decrease the number of infected. In particular, randomly testing 10% of the uninfected individuals each period could reduce the peaked value of the infected share to one-third of its original value, even without any containment policy. Indeed, a combination of containment and testing outperforms the single-policy options, in terms of reducing the share of infected. Moreover, while the standard SIR model assumes that recovered individuals are immune to the disease, we also show that the possibility of losing immunity could result in a substantial loss of output and consumption in the long run. In the centralized equilibrium, we show that the centralized output decreases more substantially, but converges back to the steadystate level at a much faster rate. In the decentralized equilibrium, the households increase their labor supply in the short run and decrease it in the long run, which is not socially optimal as indicated by the social planner problem. Instead, the social planner allows the labor supply, wage rate, and capital investment to decrease in the short run and focuses more on speeding up the output recovery in the long run. The model presented in this paper is undoubtedly a toy model with many simplified settings. Future work should merge pandemic and economic models in a more realistic setting, such as an open economy (Gali & Monacelli, 2005), global supply chain (Wei & Xie, 2020), and search-and-matching (Mortensen & Pissarides, 1994) elements to more completely capture the impact of the outbreak. The numerical exercises presented here are brief and elementary. A more detailed analysis concerning monetary and fiscal policies should be performed in similar frameworks. Declaration of Competing Interest The authors declare that they have no known competing financial interests or personal relationships that could have appeared to influence the work reported in this paper. Fig. 9. Dynamic responses of the endogenous variables to the changes in the SIR variables. The solid, dashed, dotted, and dashed-dotted lines represent the scenario with no policy change, a pure stricter containment, a stricter containment policy with random testing, and a pure random testing policy, respectively. The responses are in percent. (, respectively. t = P t /P t− 1 is the gross inflation rate. t is a Lagrange multiplier. r K,t ≡ R K,t /P t is the real rate of capital return. q t is the real capital price. As shown in Eq., t is the marginal utility to consume. Moreover, Eq. is the labor supply curve of the economy. The health-related variables H C,t in Eq. and H L,t in Eq. are determined by Eq. and, respectively. A.2. Firms It is assumed that the final good market is perfectly competitive. In addition, the capital and labor markets are also perfectly competitive. The final good is composed by a continuum of intermediate good, indexed by i ∈, according to a constant elasticity of substitution (CES) function as: where > 1 is the degree of substitutability of any two intermediate goods. Let P t (i) be the price level of intermediate good i at time t. From Eq., one can derive the demand function for the intermediate good i as: which also implies that the final good price and the price of intermediate goods are related by the formula: P t = ( ∫ 1 The production function of intermediate good firm i is Cobb-Douglas as: where K t (i) and L t (i) are the capital and labor employed by firm i, respectively. A is the total factor productivity (TFP) level of the economy, which is shared by all the intermediate good firms and is assumed to be constant. We allow A to be time-varying in Appendix ??. The firms' maximization problem gives the following FOCs for K t and L t : (1 − ) where mc t is a real marginal cost. A.2.1. Calvo pricing The nominal rigidity is imposed in the manner of Calvo. Assume that every period, a ∈ portion of firms are not allowed to adjust their prices level. Put differently, there is only 1 − of firms can re-adjust their prices. With this restriction, firm i chooses a product price P * t (i) to maximize the expected lifetime profit as: subject to the demand function where ℳ t,s ≡ s s / t is a stochastic discount factor. The FOC of P * t satisfies: To express the above expression recursively, we write s=t s ℳ t,s mc t+s P t+s Y t+s and X 2,t ≡ E t ∑ ∞ s=t s ℳ t,s P − 1 t+s Y t+s. One can express X 1,t and X 2,t recursively as: A.3. Monetary policy Following Li and Liu, the central bank determines the nominal interest rate i t according to the Taylor rule: where is the steady-state values of the gross inflation rate. and Y denote the elasticity of nominal interest rate to the inflation rate and output, respectively. i is a parameter that determines the interest rate persistence. For simplicity, the public sector is abstracted from the model. A.4. Equilibrium In the decentralized equilibrium, recall that the aggregate price level P t = ( ∫ 1. In period t, since 1 − of firms choose a new price P * t (i) and the remaining firms have price level P t− 1, we have P t = Let K t ≡ ∫ 1 0 K t (i)di and L t ≡ ∫ 1 0 L t (i)di be the aggregate capital and labor supply, respectively. Integrating both sides of the Y.T. Chan production function with respect to i gives ∫ 1 0 Y t (i)di = ∫ 1 0 (P t (i)/P t ) − Y t di = D p,t Y t with D p,t ≡ ∫ 1 0 (P t (i)/P t ) − di be the price dispersion which would evolve according to the equation: Similarly, the aggregate labor and capital demand function can be obtained by integrating both sides of Eqs. and with respect to i: ( Similarly, the aggregate production function is: The final good market is closed by the GDP accounting equation: Similar to Section B.1, the variables with superscripts Q and D are in quarterly and daily frequency, respectively. From these equations, the steady-state values of the variables are simply: Y Q = 90Y D, C Q = 90C D, and L Q = 90L D. We search for { C, A, I } to match the following three conditions: Targets Eqs. and state that the real quarterly GDP and labor supply decrease from their steady-state values by 6.8% and 6.2%, respectively. Then, we explain how do we derive target Eq.. From the data obtained from the National Bureau of Statistics of China, the 6.8% reduction in output is contributed by three factors, namely, consumption, capital formation, and net export. The shares of them are -4.32%, -1.41%, and -1.07%, respectively. Since we do not model net export, the contribution by consumption is converted to − 4.32%/ (− 4.32 % − 1.41 %) =5.13 %. Log-linearizing the GDP accounting Eq. yields: where cost t ≡ (I K,t /I K,t− 1 )I 2 K,t is the investment adjustment cost. Hence, we search for the parameters so that the value of the first term (in quarterly frequency) on ther.h.s. decreases by 5.13%. This yields Eq.. Note that parameters { C, A, I } and those in Taylor rule { D i, D, D Y } are interrelated. Hence, these six parameters are searched such that simultaneously we have the targets Eqs.,, and are matched and the discrepancy mentioned in Section B.1 is minimized.
|
Electoral Commission of Ghana
Former members
In February 2004, three members of the commission retired. They were Elizabeth Solomon, Mrs. Theresa Cole and Professor Ernest Dumor. Another member, Dr. M . K .Puni, died in June 2005. Dixon Afreh is a former member of the Commission who left when he was appointed as a Justice of the Appeal Court in October 1994. Three of the members were appointed by President Kufuor in consultation with the Council of State of Ghana in February 2004 and sworn in on 5 March 2004. They are Mrs. Paulina Adobea Dadzawa, an administrator, Nana Amba Eyiiba I, Efutuhemaa and Krontihemaa of the Oguaa Traditional Area and Eunice Akweley Roberts, an Educationist and Human Resource Practitioner. They were all women. Ebenezer Aggrey Fynn, a Management Consultant was also appointed to the Commission by the President to bring it to its full complement of seven members.
In June 2018, the chairperson, Charlotte Osei, and her two deputies, Amadu Sulley and Georgina Opoku Amankwah were removed from office by President Akufo-Addo on the recommendation of a committee set up by the chief justice.
Elections
The Electoral Commission of Ghana established a biometric system of registration for the electoral register prior to the 2012 presidential and parliamentary elections to prevent double registration and to eliminate ghost names in the old register.
Preceding Institutions
The lives of Electoral Commissions prior to the Fourth Republic of Ghana were interrupted due to military coups. At the time of the UNIGOV referendum in 1976, Justice Isaac K. Abban was appointed by the Supreme Military Council under Ignatius Kutu Acheampong. In 1979, Justice Joe Kingsley Nyinah was the Electoral Commissioner during the general election. For the Ghanaian presidential election and parliamentary election in 1992, the Electoral Commissioner was Justice Josiah Ofori Boateng.
|
Problematising Development and Poverty in the ICT policy of Malawi This paper presents a critical analysis of the representation of problems and assumptions for the solutions in the national ICT policy of Malawi. The study employed Carol Bacchis Whats the Problem Presented (WPR) to scrutinise national ICT policy and related documents. The results showed that the national ICT policy main objective was to support addressing threat of worse socio-economic status of country and poverty alleviation. The policy solutions were framed around ICT infrastructure, human capital, industries development and governance. The assumptions were that investing in these areas could support the integration of ICTs in the priority sectors of the economy (mining, tourism and agriculture) and achieve social-economic development. The policy solutions focused more on the supply of technology while downplaying cultural, political and contextual issues. The study signals the importance of articulating real needs of policy beneficiaries during policy formulation.
|
<filename>common.h<gh_stars>0
/*
* common.h
*
*/
#ifndef INCLUDE_COMMON_H_
#define INCLUDE_COMMON_H_
using namespace std;
#include <iostream>
#include <ctime>
#define cout \
cout << std::time(nullptr) << ": " << __FILE__ << ":" << __func__ << ":" << __LINE__ << ": "
#endif /* INCLUDE_COMMON_H_ */
|
Robin Williams has put Villa Sorriso, his 653-acre estate in Napa Valley, on the market with a price tag of $35 million, according to celebrity real estate blog The Real Estalker.
The 20,000-square-foot home has five bedrooms, six full bathrooms, and six half-bathrooms.
The home's amenities included a library, theater, elevator, a wine cellar and an art gallery.
The vast property, which has both vineyards and olive trees, is crisscrossed with roads and trails, according to the listing.
The foyer seems opulent, but still has the vibe of a Napa Valley estate.
The library is all wood paneled.
The kitchen has a huge range, and an island for extra cooking space.
The living room has access to a terrace.
The home boasts a 12-seat, state-of-the-art movie theater.
After a movie, play a round of pool in the game room.
With 653 acres, you have room for things such as tennis courts.
The 65-foot long infinity-edge swimming pool is perfect for parties.
There's a hot tub if it gets too cold at night.
The view of the pool really is breathtaking.
There's a small lake on the property.
Olives and Cabernet Sauvignon grapes can be grown on the property.
There are dirt roads to navigate the vineyard.
The property is a luscious green color.
The property is 80 minutes from of the Golden Gate Bridge.
Apparently, cattle roam the property.
You get great views of the Mayacama Mountains.
Want a bit more excitement?
|
We already know that women of colour are seriously under-served by the beauty industry.
Mothercare encourages mums to be proud of their post-baby body with new campaign
Major brands fail to provide shades for a range of skintones. ‘Nude’ lipsticks only work on white skin. Women of colour have to go to specialist brands, which often cost more, just to get products that match.
And there’s another way women of colour are being screwed over by the beauty industry, according to a new report.
According to a report published in the American Journal of Obstetrics and Gynaecology, women of colour are coming into contact with more toxic chemicals than white women.
This is because, on average, women of colour tend to use cosmetic products that aim to comply with European beauty standards – meaning bleaching creams, hair relaxers, and other extreme methods to alter their appearance.
Researchers noted that black, Asian, and Latina women in the US spend more money on beauty products than the national average.
They believe that this is down to racist standards of beauty, which put pressure on women of colour to use more products to meet certain ‘ideals’.
Advertisement
Advertisement
As a result of using more beauty products, women of colour are being exposed to more toxic chemicals.
That’s an issue, because the authors suggest that even exposure to a small amount of these toxins can lead to health problems.
‘Pressure to meet Western standards of beauty means black, Latina and Asian American women are using more beauty products and thus are exposed to higher levels of chemicals known to be harmful to health,’ said researcher Ami Zota.
‘Beauty product use is a critical but underappreciated source of reproductive harm and environmental injustice.’
But it’s not just that women of colour are using more products. It’s also that many of the products they use are dangerous.
Beauty products aimed to lighten skin tend to contain ingredients such as topical steroids or mercury, both of which can cause serious damage. Hair straightening chemicals, meanwhile, often contain estrogen, which can trigger early reproductive development in young girls, and issues relating to the reproductive system.
The research also notes that marketing efforts have encouraged black women to use douching products through ideas of cleanliness and odour reduction. Douching isn’t necessary, and can seriously damage the vagina – so this is a concern.
The research comes after a previous study noted that while 40% of products marketed to the general public pose a ‘minimal threat’ to women because of their ingredients, that number drops to 25% when it comes to products marketed specifically for black women.
That suggests that women of colour not only have a limited range of products to choose from, but that they have an even more limited range of products on offer that are actually safe.
Advertisement
Advertisement
While in the US, cosmetics are mostly unregulated by the FDA, all cosmetic products supplied in the UK must comply with the European Cosmetics Regulation, which requires safety assessments, the listing of ingredients, and availability of further information about what chemicals in products actually do.
But considering how easy it is to order US beauty products from Amazon and other international websites, it’s worth being concerned.
The researchers hope that their report will encourage health professionals to counsel their patients about the risks of hidden chemicals in beauty products, and to increase the level of testing products have to go through before they’re on our shelves.
MORE: Metallic painted photoshoot celebrates the beauty of plus-size bodies
MORE: No, blackface isn’t a tribute or a joke – it’s always offensive
MORE: Makeup lovers are putting highlighter on their ears
Advertisement Advertisement
|
High temperatures in the Tri-Cities area Friday may have contributed to the buckling of a portion of Interstate-295 North in Hopewell.
The buckling Friday occurred near mile marker 11 in the center lane. Repair crews were already on the scene around 3 p.m. Friday working to repair the damage.
Dawn Eischen, Virginia Department of Transportation spokeswoman, said that high temperatures have caused roadways in the area to buckle before including State Route 288 in Chesterfield and other portions of Interstate-295.
The reason for the buckling is the extreme temperature shifts of the mid-Atlantic region. "Because we have extreme cold in the winter and then extreme heat in the summer it causes the buckling," Eischen said. Unlike a pothole, the extreme heat causes the concrete of the road to expand. When the concrete expands into another segment of concrete it buckles upward instead of collapsing like a pothole.
|
def connect(self, src_name, tgt_name, src_indices=None):
if isinstance(src_indices, string_types):
if isinstance(tgt_name, string_types):
tgt_name = [tgt_name]
tgt_name.append(src_indices)
raise TypeError("src_indices must be an index array, did you mean"
" connect('%s', %s)?" % (src_name, tgt_name))
if isinstance(src_indices, Iterable):
src_indices = np.atleast_1d(src_indices)
if isinstance(src_indices, np.ndarray):
if not np.issubdtype(src_indices.dtype, np.integer):
raise TypeError("src_indices must contain integers, but src_indices for "
"connection from '%s' to '%s' is %s." %
(src_name, tgt_name, src_indices.dtype.type))
if not isinstance(tgt_name, string_types) and isinstance(tgt_name, Iterable):
for name in tgt_name:
self.connect(src_name, name, src_indices)
return
for manual_connections in [self._manual_connections, self._static_manual_connections]:
if tgt_name in manual_connections:
srcname = manual_connections[tgt_name][0]
raise RuntimeError(
"Input '%s' is already connected to '%s'." % (tgt_name, srcname))
if src_name.rsplit('.', 1)[0] == tgt_name.rsplit('.', 1)[0]:
raise RuntimeError("Output and input are in the same System for " +
"connection from '%s' to '%s'." % (src_name, tgt_name))
if self._static_mode:
manual_connections = self._static_manual_connections
else:
manual_connections = self._manual_connections
manual_connections[tgt_name] = (src_name, src_indices)
|
<filename>ARCCSSive/CMIP5/DB.py
#!/usr/bin/env python
"""
Copyright 2015 ARC Centre of Excellence for Climate Systems Science
author: <NAME> <<EMAIL>>
Licensed under the Apache License, Version 2.0 (the "License");
you may not use this file except in compliance with the License.
You may obtain a copy of the License at
http://www.apache.org/licenses/LICENSE-2.0
Unless required by applicable law or agreed to in writing, software
distributed under the License is distributed on an "AS IS" BASIS,
WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
See the License for the specific language governing permissions and
limitations under the License.
"""
from __future__ import print_function
import os
from sqlalchemy import create_engine, func, select, and_
from sqlalchemy.orm import sessionmaker
from ARCCSSive.CMIP5.Model import Base, Instance
SQASession = sessionmaker()
class Session(object):
"""Holds a connection to the catalog
Create using :func:`ARCCSSive.CMIP5.connect()`
"""
def query(self, *args, **kwargs):
"""Query the CMIP5 catalog
Allows you to filter the full list of CMIP5 outputs using `SQLAlchemy commands <http://docs.sqlalchemy.org/en/rel_1_0/orm/tutorial.html#querying>`_
:return: A SQLalchemy query object
"""
return self.session.query(*args, **kwargs)
def files(self, **kwargs):
""" Query the list of files
Returns a list of files that match the arguments
:argument **kwargs: Match any attribute in :class:`Model.Instance`, e.g. `model = 'ACCESS1-3'`
:return: An iterable returning :py:class:`Model.File`
matching the search query
"""
raise NotImplementedError
def models(self):
""" Get the list of all models in the dataset
:return: A list of strings
"""
return [x[0] for x in self.query(Instance.model).distinct().all()]
def experiments(self):
""" Get the list of all experiments in the dataset
:return: A list of strings
"""
return [x[0] for x in self.query(Instance.experiment).distinct().all()]
def variables(self):
""" Get the list of all variables in the dataset
:return: A list of strings
"""
return [x[0] for x in self.query(Instance.variable).distinct().all()]
def mips(self):
""" Get the list of all MIP tables in the dataset
:return: A list of strings
"""
return [x[0] for x in self.query(Instance.mip).distinct().all()]
def outputs(self, **kwargs):
""" Get the most recent instances matching a query
Arguments are optional, using them will select only matching outputs
:argument variable: CMIP variable name
:argument experiment: CMIP experiment
:argument mip: MIP table
:argument model: Model used to generate the dataset
:argument ensemble: Ensemble member
:return: An iterable sequence of :class:`ARCCSSive.CMIP5.Model.Instance`
"""
return self.query(Instance).filter_by(**kwargs)
# Default CMIP5 database
default_db = 'sqlite:////g/data1/ua6/unofficial-ESG-replica/tmp/tree/cmip5_raijin_latest.db'
def connect(path = None):
"""Connect to the CMIP5 catalog
:return: A new :py:class:`Session`
Example::
>>> from ARCCSSive import CMIP5
>>> cmip5 = CMIP5.DB.connect() # doctest: +SKIP
>>> outputs = cmip5.query() # doctest: +SKIP
"""
if path is None:
# Get the path from the environment
path = os.environ.get('CMIP5_DB', default_db)
engine = create_engine(path)
Base.metadata.create_all(engine)
SQASession.configure(bind=engine, autoflush=False)
connection = Session()
connection.session = SQASession()
return connection
|
The present invention relates to a solid image-pickup device, and more particularly to a solid image-pickup device using a storage cell in which an electrical image corresponding to an original image is beforehand produced and stored in the storage cell, and then the original image is reproduced on the basis of the electrical image.
A charge coupled device (CCD) has been conventionally and widely utilized in a solid image-pickup device for forming an image on the basis of an image light incident thereto. The CCD is a device having a semiconductor array for transferring an electric charge signal generated by an incident light image in synchronism with a transfer signal.
In the CCD thus constructed, a transferring efficiency for the electric charge signal is remarkably variable in accordance with a surface level density, configuration and various operational conditions of the CCD. Therefore, a severe supervision for operational conditions is required in order to accurately converting an incident optical information into an electric signal. Further, the CCD is not capable of holding a sufficient amount of surface electrical charges, and thus it would be almost impossible for the CCD to have a storage function for conducting a work on external elements Still further, the CCD requires an intricate charge-transfer circuit for transferring the electrical charges therealong, which imposes restrictions on miniaturization of the whole construction of the CCD, so that it would be almost impossible to provide a CCD having large area and high density. In view of the above disadvantages of the conventional solid image-pickup device having a CCD, a solid image pick-up device capable of overcoming the disadvantages as described above has been demanded.
|
Effects of Streptomycin Administration on Increases in Skeletal Muscle Fiber Permeability and Size Following Eccentric Muscle Contractions The purpose of this study was to investigate the preventive effect of streptomycin (Str) administration on changes in membrane permeability and the histomorphological characteristics of damaged muscle fibers following eccentric contraction (ECC ). Eighteen 7weekold male Fischer 344 rats were randomly assigned to three groups: control (Cont), ECC, and ECC with Str (ECC+Str). The tibialis anterior (TA) muscles in both ECC groups were stimulated electrically and exhibited ECC. Evans blue dye (EBD), a marker of muscle fiber damage associated with increased membrane permeability, was injected 24 hr before TA muscle sampling. The number of EBDpositive fibers, muscle fiber crosssectional area (CSA), and roundness were determined via histomorphological analysis. The ECC intervention resulted in an increased fraction of EBDpositive fibers, a larger CSA, and decreased roundness. The fraction of EBDpositive fibers was 79% lower in the ECC+Str group than in the ECC group. However, there was no difference in the CSA and roundness of the EBDpositive fibers between the two ECC groups. These results suggest that Str administration can reduce the number of myofibers that increase membrane permeability following ECC, but does not ameliorate the extent of fiber swelling in extant EBDpositive fibers. Anat Rec, 301:10961102, 2018. © 2018 Wiley Periodicals, Inc. decreased muscle force production (;;Yeung et al.,, 2005Willems and Stauber, 2005). Additionally, muscle fibers with increased intracellular calcium concentration and membrane permeability appear swollen and opaque. Several pathways for calcium entry to myofibers following ECC have been reported, but the main pathways are membrane tears and stretch-activated channels (SAcs). Evans blue dye (EBD, molar mass 960.8) is a useful tool in studying the existence of membrane tears implicated in tissue damage. EBD is water soluble and membrane impermeable, has a high binding affinity for serum albumin, and can be used to identify damaged muscle fibers (;;). Reportedly, stretch-induced muscle damage and dystrophin-deficient muscles show a large number of EBD-positive fibers, suggesting increased membrane permeability (;;). In addition, since calcium binds avidly to albumin (), EBDpositive fibers also indicate higher intracellular calcium concentrations following ECC. Increased intracellular calcium can contribute to progressive muscle damage by stimulating calcium-activated neutral protease, such as m-and l-calpain and phospholipases, which cause membrane damage and increased membrane permeability (McNeil and Khakee, 1992;). In fact, the existence of membrane tears after 1 hr of downhill running indicates uptake of albumin by muscle fibers, which is evidence of membrane permeability to large-molecular-weight markers (McNeil and Khakee, 1992). Conversely, increased resting intracellular calcium can also be caused by ionic entry through SACs. SACs are ion channels that react to mechanical stimuli, e.g., when stretched they allow Ca 21, Na 1, and K 1 to pass through the membrane, and they occur in myofibers and cardiac ventricular myocytes (Guharay and Sachs, 1984;). Increased intracellular calcium ion entering through SACs after ECC might be responsible for initiating the protease activity that causes damage to the membrane (Yeung and Allen, 2004). In fact, increases in resting intracellular calcium were observed in mice at 48 hr after downhill running () and in single fibers after 10 stretched contractions. These events, which are related to the muscle damage that follows ECC, are reportedly reduced by SACs blockers such as streptomycin (Str), gadolinium (Gd 31 ), and GsMTx4 (;Belus and White, 2003;Yeung et al.,, 2005Willems and Stauber, 2005). Str, which was the first aminoglycoside antibiotic, has been used clinically to treat tuberculosis, and is incidentally one of the most potent SACs blockers. In an in vivo study, it was used to reduce ECCinduced muscle damage (number of EBD-positive fibers) and damage-related force deficit (;Willems and Stauber, 2005;). SAC blockers may thus have therapeutic potential for reducing contraction-induced muscle damage (Yeung and Allen, 2004). However, all that is currently known is that Str administration reduces the number and fraction of damaged muscle fibers, such as EBD-positive fibers. Whether it affects the histomorphological characteristics of extant EBD-positive fibers, such as swelling and roundness, remains to be determined. The aim of this study was to investigate the effects of Str administration on both the fraction of EBD-positive fibers and the histomorphological characteristics of extant EBD-positive fibers following ECC. MATERIALS AND METHODS Animals Eighteen male Fischer 344 rats (CLEA, Tokyo, Japan) were housed in a temperature-controlled room at 238C 6 28C, humidity at 55% 6 5%, under a 12-hr light-dark cycle, and provided with CE-2 rodent chow (CE-2, CLEA) and water ad libitum. All procedures were performed in accordance with the guidelines presented in the Guiding Principles for the Care and use of Animals in the Field of Physiological Sciences, published by the Physiological Society of Japan. This study was approved by the Animal Committee of the National Institute of Fitness and Sports and the Animal Study Committee of Niigata University of Health and Welfare. Experimental Protocol Eighteen 7-week-old male Fischer 344 rats were randomly assigned to one of three groups of six rats each: control (Cont), eccentric contraction (ECC), or eccentric contraction with Str administration (ECC 1 Str). Str was prepared and diluted immediately before use. Administration began six days before the ECC intervention. The rats in the ECC 1 Str group received Str in their drinking water, which was administered with a feeding bottle (4 g/L) (;); the other two groups were given pure drinking water. The daily amount of water drunk was measured using a precision balance. The mean Str intake in the ECC 1 Str group was 644 6 26 mg/kg/day. To perform the ECC, the tibialis anterior (TA) muscles of the rats in both ECC groups were stimulated electrically under 2% isoflurane inhalation anesthesia. The rat was placed in the supine position on the supporting platform of a custom-made apparatus that was designed to stabilize the lower leg and allow full ankle rotation. The left foot was attached to a footplate connected to a servomotor (Tower Pro SG-90, Umemoto, Tokyo, Japan), and the ankle joint was set at 90-degree angle. Paired silver surface electrodes were attached to the shaved anterior surface of the leg to stimulate the left TA muscle. Percutaneous direct muscle stimulation was applied using an electrostimulator (SEN-7203, Nihon Kohden, Tokyo, Japan) and isolator (SS-201J, Nihon Kohden, Tokyo, Japan). The muscle was stimulated with an intensity of 30 V, at a frequency of 100 Hz and a pulse width of 500 ls, to induce submaximal tetanic contraction for 2 sec. The footplate was moved in synchrony with the electrical stimulator; movement was initiated 500 msec after the onset of electrical stimulation using a time-delay device (Raspberry Pi 2 Model B, Raspberry Pi Foundation, Cambridge, UK). The angular velocity of the ankle joint was set at 200 degree/sec. The ECC session comprised 80 contractions at 6-sec intervals. Muscle Sampling In order to identify the muscle fibers responsible for increasing membrane permeability, rats were injected intraperitoneally with a solution of 1% EBD (E2129, Sigma, St. Louis, MO) at a volume of 1% of body mass (BM) (1 mg EBD/0.1 mL phosphate-buffered saline (PBS) /10 g BM) 24 hr before TA muscle sampling (Lovering and De Deyne, 2004). The rats in all three groups were anesthetized with sodium pentobarbital (50 mg/kg body weight) two days after the ECC intervention, and their TA muscles were collected and weighed. Samples for histological analyses were mounted on pieces of cork with OCT compound, and frozen in isopentane cooled by liquid nitrogen. They were stored at 2808C until use. Staining and Histomorphometry Frozen serial 10-lm transverse and longitudinal sections were cut from the middle portion of the TA muscle at 2208C using a cryostat (CM3050, Leica, Wetzlar, Germany) and mounted on silanized slides for glyoxalbis(2-hydroxyanil) (GBHA) staining, immunohistological staining, and EBD signal detection analysis. GBHA have been reported as a free calcium indicator in a previous study (Del Bigio, 2000). Transverse sections from all groups were stained with 5% GBHA in 75% ethanol containing 3.4% NaOH for 10 min at room temperature and were rinsed with 95% and then 75% ethanol for 5 min each. Finally, the sections were dehydrated and coverslipped with mounting medium. This procedure served to visualize calcium localization as a red calcium-GBHA complex () under a light/fluorescent microscope (BX60, Olympus, Tokyo, Japan). For TA muscle tissue immunohistochemistry, sections were fixed in ice-cold 4% paraformaldehyde for 15 min as described previously (;). Sections were blocked with 10% normal goat serum (NGS) and 1% Triton X-100 in PBS at room temperature for 1 hr, followed by two washes of 5 min each in PBS, and subsequent incubation for 16-20 hr at 48C with a primary antibody against dystrophin (1:500 dilution; Abcam, Tokyo, Japan), laminin (1:200 dilution; Abcam), and desmin (1:200 dilution; Abcam, Tokyo, Japan) in 5% NGS in PBS containing 0.3% Triton X-100. The sections were washed several times with PBS, incubated with Alexa Fluor 405, 488, or 568 conjugated secondary antibody (1:500 dilution; Abcam), diluted with PBS containing 5% NGS and 0.1% Triton X-100 for 1 hr at room temperature, and finally mounted with Vectashield mounting medium. Immunofluorescence and EBD signals of the transverse and longitudinal sections were detected using a light/fluorescence microscope (BX60, Olympus) with the Olympus filter set (U-MWIB2, U-MWIG3) and a CCD camera (DP73, Olympus). Digital images at a 3200 magnification were used to determine the number of EBDpositive fibers, muscle fiber cross-sectional area (CSA), and roundness (R) of each TA muscle, following previous studies but with slight modification ). The total number of EBDpositive and -negative fibers in six 1,055 3 1,404 mm fields at the center of the cross-section of the TA muscle was counted manually to determine the fraction of EBDpositive fibers. The CSA of at least 100 fibers from each muscle was measured using Image-pro Premier software (Media Cybernetics, Rockville, MD). The roundness was calculated as R 5 P/(4 3 p 3 CSA), where P is the perimeter of the muscle fibers. Statistical Analysis All data are expressed as mean 6 standard deviation. One-way analysis of variance followed by a post hoc Tukey-Kramer test was used to assess the significance of differences among the groups. Differences in the number of EBD-positive fibers were analyzed by student ttest. P-values less than 0.05 were considered significant. RESULTS There were no significant differences between the groups in terms of the body and TA muscle weights of the rats before the experiment (Table 1). EBD-positive fibers were observed in the ECC and the ECC 1 Str groups, but were not detected in the Cont group ( Fig. 1A-C). There were significantly fewer (79%; P < 0.05) EBD-positive fibers in the TA muscles of the ECC 1 Str group than in those of the ECC group (Table 1). Immunohistochemistry revealed laminin-positive and dystrophin-negative results for the EBD-positive fibers (Fig. 1D-G), but dystrophin-negative and desminnegative results for the EBD-positive fibers (Fig. 1H-K). Additionally, EBD-positive areas were observed only in some portions of the longitudinal muscle fiber sections ( Fig. 2A,B). We observed a positive reaction for GBHA staining, in accordance with the location of the EBDpositive muscle fibers (Fig. 3). The CSA of the EBDnegative fibers was not significantly different between the groups, but the CSA of the EBD-positive fibers in the ECC and ECC 1 Str groups was 2.2-2.4 times (P < 0.01) that of the EBD-negative fibers in the same group (Table 1). The roundness of the EBD-negative fibers was 1.31, 1.35, and 1.38 in the Cont, ECC, and ECC 1 Str groups, respectively, which was not significantly different between groups (Table 1). However, that of the EBD-positive fibers in the ECC and ECC 1 Str groups (1.09 and 1.17, respectively) was significantly lower (P < 0.01) than the roundness of the EBD-negative fibers in the same group. Notably, however, there were no significant differences in the CSA or roundness of the EBD-positive fibers between the ECC and ECC 1 Str groups. DISCUSSION These findings show that ECC intervention increased the number of EBD-positive muscle fibers, which was associated with increased muscle fiber CSA and decreased roundness. Str administration reduced the number of EBD-positive muscle fibers induced by ECC, but did not affect the fiber size or roundness of extant EBD-positive fibers. Str administration prior to ECC intervention reduced the number of damaged muscle fibers induced by ECC by 79%. Str has been reported to block SACs, inhibit cation-permeable SACs in skeletal muscle fibers, and reduce ECC-induced muscle injury and damage-related force deficit (;;Belus and White, 2003;;Willems and Stauber, 2005;). The protective effect of Str on skeletal muscle damage has been reported to be dose-dependent. Additionally, other possible effects of Str on muscle include a tendency toward a lower maximal isometric force and force-time integrals evoked by electrical stimulation, as shown in Str-treated rats (Willems and Stauber, 2005;); however, these results were not statistically significant. Desmin, titin, and dystrophin have been shown to be disrupted after ECC, but this effect was substantially reduced by Str administration (). Moreover, Str reduced the in vivo ECCinduced intracellular calcium ion increase in rat skeletal muscle by 69% (). This may be because elevations in intracellular calcium ions, which occur following stretch-induced injury, are a consequence of calcium ion influx through SACs (Yeung and Allen, 2004). In the present study, therefore, such calcium entry might be responsible for 80% of the number of EBD-positive fibers induced by ECC, since SAC blockers prevent calcium entry and reduce muscle damage following ECC (Yeung and Allen, 2004). However, Str administration did not prevent morphological changes in the extant EBD-positive fibers following ECC. This suggests that calcium also enters the myofibers via other pathways, such as membrane tears. EBD forms a complex with serum albumin due to a high binding affinity, and albumin binds avidly to calcium (). EBD-positive fibers presumably therefore also indicate higher intracellular calcium concentrations following ECC. In fact, the EBD-positive fibers in our study were also positive for GBHA, which suggests higher calcium concentrations in these fibers. Reportedly, intracellular calcium ions may undergo prolonged elevations, increasing 2-to 3-fold above resting levels for up to 48 hr following a bout of ECC (). This excessive increase in intracellular calcium ions induces muscle injury and promotes the production of calcium-dependent proteases, such as calpain and phospholipases, which cause membrane damage and increased membrane permeability (McNeil and Khakee, 1992;;). In addition, some studies have found that the EBD-positive fibers formed following ECC were accompanied by discontinuous dystrophin immunostaining (;). Our immunohistochemistry results also revealed dystrophin-negative areas around the EBD-positive fibers. Dystrophin protein, which plays a structural role in linking the sarcolemma to the underlying cytoskeleton, appears to protect the sarcolemma against stress imposed during muscle contraction or stretching. In fact, absence of dystrophin reduces muscle stiffness, increases sarcolemmal deformability, and compromises the mechanical stability of costameres and their connections with nearby myofibrils (). Additionally, Aquaporin-4 (AQP4) expression disappears in dystrophin-deficient muscles (). AQP4 is present in the plasma membranes of (Del Bigio, 2000). Arrows indicate EBD-positive fibers and GBHA-positive fibers, respectively. Scale bar 5 100 lm. specific fast-type myofibers, a selective water channel mediating water transport across cell membranes in skeletal muscles, and binds to a1-syntrophin, which is a component of the dystrophin-associated protein complex in skeletal muscles ;Ishido and Nakamura, 2016). Reportedly, aquaporin-4 (AQP4) and transient receptor potential vanilloid 4, a nonselective cation channel activated by mechanical and osmotic stress, synergistically modulate cell volume (;;). Thus, it is possible that increased intracellular calcium and/or dystrophin-disrupted myofibers following ECC lead to increased cell volume in the form of, for example, swollen fibers. Fast-twitch fibers with myosin heavy chain (MHC) IIx and IIb appear to be more susceptible to ECC-induced damage than those containing MHC I (Lieber and Friden, 1988;;;). Furthermore, in both the present study and a previous study that used identical ECC conditions (angular velocity of 200 degree/sec; ), EBD-positive fibers were observed throughout crosssections of fast-type dominant TA muscle, but only some portions of the longitudinal sections were EBD-positive. In a previous study, some pattern irregularities in the otherwise well-preserved regular transverse myofibrillar bands were observed following eccentric contractions (). In longitudinal muscle sections, sarcomere disturbances were observed in extensor digitorum longus (EDL) muscle, regions with loss of titin immunoreactivity were found next to normal regions (Friden and Lieber, 1998), and disruption of desmin was observed (). Additionally, damaged regions have been observed adjacent to normal regions (). Combined, this evidence suggests that post-ECC changes in muscle fiber morphology related to membrane permeability might not occur in the whole muscle fiber, but only in longitudinal portions of it. In the present study, Str administration had no effect on the extent of fiber swelling following ECC. Nonetheless, our histomorphometric analysis highlights the impact of Str administration in terms of reducing the number of damaged muscle fibers induced by highintensity exercise that includes lengthening muscle contractions. The relationships between SACs expression, dystrophin, and AQP4 following ECC are of great interest for future work, which may further our understanding of the underlying mechanisms of exercise-induced muscle fiber damage, including membrane permeability and swelling kinetics. To our knowledge, this is the first histomorphological study that quantitatively assesses the effects of Str administration on post-ECC changes in muscle fiber morphology related to membrane permeability. We have demonstrated that ECC intervention increases the fraction of EBD-positive muscle fibers, which exhibit increased CSA (2.2-to 2.4-fold), decreased roundness (15%-19%), positive GBHA staining, and absent and/or discontinuous dystrophin and desmin immunostaining. Str administration reduced the number of EBD-positive muscle fibers induced by ECC, but had no effect on fiber size and roundness in extant EBDpositive fibers. These findings suggest that Str, a SACs blocker, can mediate eccentric contraction-induced fiber damage in the rat TA muscle by reducing the number of muscle fibers that increase membrane permeability, but does not ameliorate the extent of swelling in extant EBD-positive fibers following ECC.
|
Russia and Eurasia AZERBAIJAN KAZAKHSTAN RUSSIA UKRAINE 1998 2008 2018 1998 2008 2018 1998 2008 2018 1998 2008 2018 P op ul at io n in m ill io ns. In Russia, President Vladimir Putin has taken further steps to insulate the country from external pressure, including the establishment of a sovereign internet. Protests increased in the context of economic stagnation and a decline in Putins approval rating; the challenge was primarily to Putins authority, rather than his hold on power.. Ukrainian politics continued to surprise, with the election by a huge margin of a political novice, the actor Volodymyr Zelensky, as president in April 2019. His election underscored the continuing hunger in Ukrainian society for a change from the oligarchic system of politics, although effecting such change is a formidable task.. While the conflict in Donbas remained in stalemate, Russia and Ukraine clashed in the Sea of Azov as Russia opened a bridge over the Kerch Strait and sought to turn Azov, where Ukraine had opened a naval base, into a Russian lake. Russia seeks to use the conflict to destabilise Ukraine and frustrate Ukrainian efforts to achieve political and economic consolidation, or westernisation.. In Kazakhstan, Nursultan Nazarbayev brought his 30-year presidency to an end, handing the post to the speaker of the Senate. The transition occurred peacefully, although Nazarbayev retains extensive powers and the full test of any transition may not come until he dies. 232 | Russia and Eurasia
|
. The authors report 8 cases of complete atrio-ventricular block (AVB) which came on during bacterial endocarditis. The aortic valve was more frequently affected (6/8). The conduction disorder is necessarily unstable. The prognostic significance of AVB is always very grave--all the patients have died. The valve lesions are often severe. A histological study of the conducting pathways has been carried out. The classically described aneurysm of the membranous septum was not responsable for any cases of AVB in this series. The most frequent cause of the AVB (5/8) was an infiltration of the prenodal area and the A-V nod itself, starting from the posterior aortic cusp and, in one case, from the tricuspid valve. The bundle of His is affected either by extension of the A-V node lesion or by the focus on the right cusp. Strings of inflammatory cells may follow the sheath of the bundle branches. Haematogenous micro-abscesses are sometimes found in the conducting tissues.
|
Steve Jobs announces iPhone 4's new design features.
The Apple iPhone 4, announced today by Steve Jobs at Apple's Worldwide Developers Conference, will be 24 percent thinner than its predecessor at 9.3mm thick, contain a front-facing camera, and offer greatly improved battery performance (up to 40 percent more talk time, according to Jobs).
Jobs described the phone as, "beyond a doubt, the most precise thing and one of the most beautiful things we've ever made" before highlighting a number of its new features.
The iPhone 4 will be priced at $199 for a 16GB model and $299 for a 32GB model, and it will go on sale June 24.
Jobs also announced a new operating system for both iPhones and the iPad: Called iOS4, it will have 100 new features and 1500 application programming interfaces or APIs.
The new phone will have 32 gigabytes of storage, a gyroscope (which will allow for more precise motion detection), and HD video recording capability.
The phone also will have a improved screen resolution: 326 pixels per inch with heightened contrast. Jobs told the crowd that 300 pixels per inch is the limit of the ability of the human retina to view images.
It also will have three antennae built into the structure of the phone's body that will provide the iPhone 4 with the ability to work with Bluetooth; WI-Fi and GPS; and UMTS and GSM.
In my opinion, the display difference in the example Jobs shows is striking. While I've been dissatisfied by the the fuzziness on the iPhone 3GS's text--something I liken to the difference between standard definition TV vs. HDTV--the text on the iPhone 4G looks sharp and crisp, with no pixelation. Additionally, the colors are more vibrant, and edges are smoother and sharper.
There are new volume buttons, a mute button, plus a second microphone on the top for noise cancellation. Just like the iPad, it now incorporates a micro-SIM tray.
The IPhone 4 comes with two cameras: One on the front for video conferencing, and one on the rear for photos and video. The rear-facing camera has been upgraded to 5 megapixels--up from 3 megapixels on the iPhone 3GS--and it can record 720p high-definition video.
Also included is an iPhone version of iMovie, which will let you edit video clips on the phone, splice them together, add titles to your videos, and so forth. (The app will set you back $4.99 from the App Store, Jobs told the packed audience at San Francisco's Moscone Center).
The iPhone 4 screen will have In-plane switching. Known as IPS, this is a high-end LCD technology that has better color and a better viewing angle than lower-end LCD screens. Apple currently uses an IPS screen in its iPad.
Jobs also said that the new phone's 800:1 contrast ratio was four times better than the current iPhone 3GS, with better color and a wide viewing angle that Jobs claimed was better than you can get with OLED display technology.
Jobs also announced FaceTime, a video chat app that makes use of the iPhone 4's new front-facing camera. FaceTime works over Wi-FI, and works between any two iPhone 4s. Jobs did note that FaceTime will not yet work if you're connected to a cellular data network--apparently there are a few kinks left to work out.
If your iPhone contract expires anytime in 2010, you are immediately eligible for a new iPhone 4 if you top up your iPhone contract by 2 years. The price of the iPhone 3GS drops to $99 for 16GB. Although the phone goes on sale on June 24, preorders will start on June 14.
As an e-reading platform, iBook has been greatly enhanced with the addition of a separate PDF library, and the ability to sync between iPad and iPhone.
These additions, coupled with the high-resolution display, make the iPhone more viable as an e-reader (its relatively small screen notwithstanding). And, overall, it makes Apple a bigger threat to in the e-reader space, period.
With an LCD screen that, theoretically (and from what we saw in the demo at the keynote today) can better approximate the text on a printed page, an E-Ink screen's usefulness may become redundant. This could be bad news for the Amazon Kindle e-book reader and others like it.
E-ink may continue to hold an advantage in its easy-on-the-eyes, paper-like background, but that will be one of its only advantages.
|
Colon cancer treatment in Sweden during the COVID19 pandemic: A nationwide registerbased study Abstract Aim The COVID19 pandemic has reduced the capacity to diagnose and treat cancer worldwide due to the prioritization of COVID19 treatment. The aim of this study was to investigate treatment and outcomes of colon cancer in Sweden before and during the COVID19 pandemic. Methods In an observational study, using the Swedish Colorectal Cancer Registry, we included (i) all Swedish patients diagnosed with colon cancer, and (ii) all patients undergoing surgery for colon cancer, in 20162020. Incidence of colon cancer, treatments and outcomes in 2020 were compared with 2019. Results The number of colon cancer cases in Sweden in AprilMay 2020 was 27% lower than the previous year, whereas no difference was observed on an annual level (4,589 vs. 4,763 patients ). Among patients with colon cancer undergoing surgery in 2020, the proportion of resections was 93 vs. 94% in 2019, with no increase in acute resections. Time from diagnosis to elective surgery decreased (29days vs. 33days in 2020 vs. 2019). In 2020, more patients underwent a twostage procedure with a diverting stoma as first surgery (6.1%) vs. (4.4%) in 2019 (p = 0.0020) and more patients were treated with preoperative chemotherapy (5.1%) vs. (3,5%) 2019 (p = 0.0016). The proportion of patients that underwent laparoscopic surgery increased from 54% to 58% (p = 0.0017) There were no differences in length of stay, surgical complications, reoperation, ICUstay or 30day mortality between the years. Conclusion Based on nationwide annual data, we did not observe adverse effects of the COVID19 pandemic on colon cancer treatment and short time outcomes in Sweden. There is a scarcity in data regarding factual outcomes for colorectal cancer patients during the pandemic, with the majority of publications being recommendations, audits, surveys and case reports. A few population-based studies have been published, reporting disruptions in the management of colorectal cancer in England, Korea, and Spain. Also in Sweden, the pandemic put the healthcare system under severe strain, with tens of thousands of operations being postponed. The Swedish Cancer Register has reported a 12% reduction of cancer cases March-August 2020 compared to 2019 but there are, to date, no reports on how colon cancer treatment was affected by the pandemic. The aim of this study was to assess colon cancer incidence, treatment and outcomes for year 2020 compared to the preceeding 4 years, with focus on differences between 2019 and 2020. Study design In this observational population-based cohort study we report incidence, stage, treatment, and short-term outcomes for colon cancer in Sweden 2016-2020. We used the RECORD checklist for the report. Setting Sweden is a high-income country with a population of 10 millions in 2020. Healthcare is mainly tax-funded with universal access to care. The first wave of the COVID-19 pandemic peaked in April-May 2020, and the second in October-December the same year. Screening for colorectal cancer with stool test, applied in some regions, was paused from May to August, and surgery for premalignant and benign conditions postponed. Temporary guidelines for colorectal cancer surgery were established 3 April 2020 with recommendations in three different scenarios of escalating COVID-19. Data sources and participants The Swedish Colorectal Cancer Registry (SCRCR) was used as data source. This register has extensive information on patient characteristics, pre-and postoperative tumour staging, tumour location, surgical and oncological treatment and recurrences for colon cancer nationwide since 2007 All statistical tests were two-sided, and p < 0.05 was considered statistically significant. Incidence and stage at diagnosis The number of diagnosed cases of colon cancer in April and May was 27% lower in 2020 than in 2019, but increased over the following months ( Figure 1). In 2020, 4589 patients were diagnosed with colon cancer, corresponding to an incidence proportion of 0.044% (0.044%-0.047% in 2016-2019; Table 1). The patients' age, sex, and tumour locations were similar between the years. The incidence of cT4 tumours increased from Treatment and short-term outcomes The number of interventions for colon cancer (including all procedures, e.g., polypectomy and nonresection surgery) was at its lowest point in May 2020 but the annual number was similar to previous years ( Figure 2). The number of operations was 3,964 for year 2020 and 4,016 for year 2019 with similar proportions of resection surgery over calendar years (93% in 2020 vs. 94% 2019; Table 2). We DISCUSS ION Our study shows that despite a reduction in performed surgery during the first wave of COVID-19 in Sweden in April-May 2020 this reduction was compensated for in June to December, and thus colon cancer treatment over the entire year was largely similar to 2019. We observed a change in treatment with more preoperative diverting ostomies and more preoperative oncological treatment, and an increase in the proportion of laparoscopic surgery. in March-April 2020 but were back to preshutdown levels over the following months. In Sweden there were 27% fewer colon cancer patients diagnosed during April-May 2020 compared to the year before, but this rapidly caught up during the rest of the year. We did not observe any significant changes in surgical treatment of colon cancer in Sweden in year 2020, apart from an increase in the proportion of patients receiving a diverting stoma prior to resection surgery (6.1% compared to 4.4% the year before). More ostomies instead of anastomoses compared to the prepandemic period has also been reported from CovidSurg Collaborative, probably due to a wish to reduce complications. In Sweden in 2020, proportionally more patients were diagnosed with locally advanced tumours, which also could explain the increase in use of preoperative diverting stoma. The proportion of patients who were treated with laparoscopic surgery increased from 54% to 58%, contrary to England and Korea, who reported a decline in procedures performed with the minimally invasive technique during the COVID-19 pandemic. In the international survey from covidsurg Collaborative, the proportion of laparoscopic surgeries were comparable to the Swedish numbers (57.2%). The increase in laparascopic surgery may be due to a general trend and not connected to COVID-19, although without the pandemic the increase might have been even greater. Concerns have been raised that diagnostic delay due to the COVID-19 pandemic may decrease resectability in colorectal cancer, but we found no evidence of this occurring in Sweden. In the present study, more patients were diagnosed in stage cT4 in 2020 compared with 2019, but this trend was also seen during the preceding years and can be explained by a smaller proportion of unstaged patients. It is possible that the relative increase in proportion of cT4 tumours was due to a reduction of cases with less advanced tumours, and therefore, fewer symptoms. If the increase in cT4 tumours is, in fact, a sign of stage migration due to diagnostic delay will become evident during the following years. Our study showed no difference in complication rate, ICU care, or 30-day mortality. This is in line with reports from Spain, where surgery was delayed but complications and mortality remained unchanged. An international cohort study representing 40 countries, showed a higher 30-day mortality rate during the COVID-19 pandemic, but fewer anastomotic leakages. The mortality in case of anastomotic leakage was higher during the pandemic compared to the prepandemic period. During the first wave of the COVID-19 pandemic, Sweden experienced a 9% reduction in overall cancer cases and a general reduction in patients seeking care for other conditions than COVID-19. The Swedish National Board of Health and Welfare published guidelines with the aim to guide physicians in prioritizing. All patients were to have an assessment of their condition. After the assessment, care could be delayed, but not for conditions that were assumed to have a large impact on life span or quality of life, that is, cancer care was prioritized. This may explain why the quality of colon cancer treatment seems to have been maintained. An Australian review including data from 20 countries reported a 30% reduction in health care seeking during the pandemic. For colon cancer patients in Sweden, the disruptions seem to have been mild. There was mainly a delay in diagnosis and treatment during the first wave of the pan- Days of hospital stay c median (IQR) 6 6 6 5 5 0.17 ostomies, which may have future implications for quality of life in these patients. CO N FLI C T O F I NTE R E S T S All authors have nothing to declare. All authors. E TH I C S S TATEM ENT The study was approved by the Regional Ethics committee in Stockholm (Dnr 2020-04169). Since this was a strictly registerbased study, individual informed consent was not required. DATA AVA I L A B I L I T Y S TAT E M E N T KE and HE had full access to data.
|
New Jersey Gov. Chris Christie (R) falsely claimed Donald Trump put to bed his skepticism of President Barack Obama’s birthplace years ago, despite clear and overwhelming evidence that the Republican presidential nominee had regularly stoked the conspiracy theory known as birtherism since 2011.
“It’s just not true that [Trump] kept it up for five years,” Christie, who endorsed the New York businessman early on in the campaign, said in an interview on CNN’s “State of the Union” that aired Sunday. “It’s not like he was talking about it on a regular basis until then.”
Trump has a long history of promoting birtherism, as CNN’s Jake Tapper noted in the interview. Even after Obama released his long-form birth certificate in 2011, Trump continued to question whether the president was born in the U.S. in television interviews and online via his Twitter account. The businessman did so as recently as January of this year, sowing doubt about Obama’s roots when asked about being a birther. In 2014, Trump even invited hackers to see if Obama was lying about his birthplace.
The real estate mogul on Friday was forced to admit ― without apologizing ― that Obama was born in the U.S. after he once again refused to say so in an interview with The Washington Post earlier this week.
“President Obama was born in the United States, period,” Trump said, without offering an explanation as to why it took him five long years to admit the truth.
|
package cmd
import (
"fmt"
"os"
"path/filepath"
"github.com/inconshreveable/log15"
homedir "github.com/mitchellh/go-homedir"
"github.com/spf13/cobra"
"github.com/spf13/viper"
"github.com/vulsio/gost/util"
)
var cfgFile string
// RootCmd represents the base command when called without any subcommands
var RootCmd = &cobra.Command{
Use: "gost",
Short: "Security Tracker",
Long: `Security Tracker`,
SilenceErrors: true,
SilenceUsage: true,
}
func init() {
cobra.OnInitialize(initConfig)
RootCmd.PersistentFlags().StringVar(&cfgFile, "config", "", "config file (default is $HOME/.gost.yaml)")
RootCmd.PersistentFlags().Bool("log-to-file", false, "output log to file")
_ = viper.BindPFlag("log-to-file", RootCmd.PersistentFlags().Lookup("log-to-file"))
RootCmd.PersistentFlags().String("log-dir", util.GetDefaultLogDir(), "/path/to/log")
_ = viper.BindPFlag("log-dir", RootCmd.PersistentFlags().Lookup("log-dir"))
RootCmd.PersistentFlags().Bool("log-json", false, "output log as JSON")
_ = viper.BindPFlag("log-json", RootCmd.PersistentFlags().Lookup("log-json"))
RootCmd.PersistentFlags().Bool("debug", false, "debug mode")
_ = viper.BindPFlag("debug", RootCmd.PersistentFlags().Lookup("debug"))
RootCmd.PersistentFlags().Bool("debug-sql", false, "SQL debug mode")
_ = viper.BindPFlag("debug-sql", RootCmd.PersistentFlags().Lookup("debug-sql"))
pwd := os.Getenv("PWD")
RootCmd.PersistentFlags().String("dbpath", filepath.Join(pwd, "gost.sqlite3"), "/path/to/sqlite3 or SQL connection string")
_ = viper.BindPFlag("dbpath", RootCmd.PersistentFlags().Lookup("dbpath"))
RootCmd.PersistentFlags().String("dbtype", "sqlite3", "Database type to store data in (sqlite3, mysql, postgres or redis supported)")
_ = viper.BindPFlag("dbtype", RootCmd.PersistentFlags().Lookup("dbtype"))
RootCmd.PersistentFlags().String("http-proxy", "", "http://proxy-url:port (default: empty)")
_ = viper.BindPFlag("http-proxy", RootCmd.PersistentFlags().Lookup("http-proxy"))
}
// initConfig reads in config file and ENV variables if set.
func initConfig() {
if cfgFile != "" {
viper.SetConfigFile(cfgFile)
} else {
// Find home directory.
home, err := homedir.Dir()
if err != nil {
log15.Error("Failed to find home directory.", "err", err)
os.Exit(1)
}
// Search config in home directory with name ".gost" (without extension).
viper.AddConfigPath(home)
viper.SetConfigName(".gost")
}
viper.AutomaticEnv() // read in environment variables that match
// If a config file is found, read it in.
if err := viper.ReadInConfig(); err == nil {
fmt.Println("Using config file:", viper.ConfigFileUsed())
}
}
|
#include "testing/testing.hpp"
#include "partners_api/freenow_api.hpp"
#include "geometry/latlon.hpp"
#include "platform/platform.hpp"
#include <string>
namespace
{
using Runner = Platform::ThreadRunner;
std::string const kTokenResponse = R"(
{
"access_token": "<KEY>",
"token_type": "bearer",
"expires_in": 600,
"scope": "service-types"
})";
std::string const kServiceTypesResponse = R"(
{
"serviceTypes": [
{
"id": "TAXI",
"type": "TAXI",
"displayName": "Taxi",
"eta": {
"value": 0,
"displayValue": "0 Minutes"
},
"fare": {
"type": "FIXED",
"value": 5000,
"currencyCode": "GBP",
"displayValue": "5000GBP"
},
"availablePaymentMethodTypes": [
"BUSINESS_ACCOUNT",
"CREDIT_CARD",
"PAYPAL",
"CASH"
],
"seats": {
"max": 4,
"values": [],
"displayValue": "4"
},
"availableBookingOptions": [
{
"name": "COMMENT",
"displayName": "COMMENT",
"type": "TEXT"
},
{
"name": "MERCEDES",
"displayName": "MERCEDES",
"type": "BOOLEAN"
},
{
"name": "FAVORITE_DRIVER",
"displayName": "FAVORITE_DRIVER",
"type": "BOOLEAN"
},
{
"name": "FIVE_STARS",
"displayName": "FIVE_STARS",
"type": "BOOLEAN"
},
{
"name": "SMALL_ANIMAL",
"displayName": "SMALL_ANIMAL",
"type": "BOOLEAN"
}
]
}
]
})";
UNIT_TEST(Freenow_GetAccessToken)
{
ms::LatLon const from(55.796918, 37.537859);
ms::LatLon const to(55.758213, 37.616093);
std::string result;
taxi::freenow::RawApi::GetAccessToken(result);
TEST(!result.empty(), ());
auto const token = taxi::freenow::MakeTokenFromJson(result);
TEST(!token.m_token.empty(), ());
}
UNIT_TEST(Freenow_MakeTokenFromJson)
{
auto const token = taxi::freenow::MakeTokenFromJson(kTokenResponse);
TEST(!token.m_token.empty(), ());
TEST_NOT_EQUAL(token.m_expiredTime.time_since_epoch().count(), 0, ());
}
UNIT_TEST(Freenow_MakeProductsFromJson)
{
auto const products = taxi::freenow::MakeProductsFromJson(kServiceTypesResponse);
TEST_EQUAL(products.size(), 1, ());
TEST_EQUAL(products.back().m_name, "Taxi", ());
TEST_EQUAL(products.back().m_time, "0", ());
TEST_EQUAL(products.back().m_price, "5000GBP", ());
TEST_EQUAL(products.back().m_currency, "GBP", ());
}
UNIT_CLASS_TEST(Runner, Freenow_GetAvailableProducts)
{
taxi::freenow::Api api("http://localhost:34568/partners");
ms::LatLon const from(55.796918, 37.537859);
ms::LatLon const to(55.758213, 37.616093);
std::vector<taxi::Product> resultProducts;
api.GetAvailableProducts(from, to,
[&resultProducts](std::vector<taxi::Product> const & products) {
resultProducts = products;
testing::Notify();
},
[](taxi::ErrorCode const code) {
TEST(false, (code));
});
testing::Wait();
TEST(!resultProducts.empty(), ());
taxi::ErrorCode errorCode = taxi::ErrorCode::RemoteError;
ms::LatLon const farPos(56.838197, 35.908507);
api.GetAvailableProducts(from, farPos,
[](std::vector<taxi::Product> const & products) {
TEST(false, ());
},
[&errorCode](taxi::ErrorCode const code) {
errorCode = code;
testing::Notify();
});
testing::Wait();
TEST_EQUAL(errorCode, taxi::ErrorCode::NoProducts, ());
}
} // namespace
|
<reponame>tony-yang/gcp-cloud-native-stack<filename>catalog/server_test.go
package main
import (
"context"
"testing"
pb "github.com/tony-yang/gcp-cloud-native-stack/catalog/genproto"
"github.com/golang/protobuf/proto"
"github.com/google/go-cmp/cmp"
log "github.com/sirupsen/logrus"
"go.opencensus.io/plugin/ocgrpc"
"google.golang.org/grpc"
"google.golang.org/grpc/codes"
"google.golang.org/grpc/status"
)
func TestServer(t *testing.T) {
ctx := context.Background()
addr := run("0")
log.Printf("Test Server listen at address: %s", addr)
conn, err := grpc.Dial(addr,
grpc.WithInsecure(),
grpc.WithStatsHandler(&ocgrpc.ClientHandler{}))
if err != nil {
t.Error(err)
}
defer conn.Close()
client := pb.NewProductCatalogServiceClient(conn)
t.Run("Get all products from local file", func(t *testing.T) {
res, err := client.ListProducts(ctx, &pb.Empty{})
if err != nil {
t.Error(err)
}
if diff := cmp.Diff(res.Products, parseCatalog(), cmp.Comparer(proto.Equal)); diff != "" {
t.Error(diff)
}
})
t.Run("Get one product", func(t *testing.T) {
got, err := client.GetProduct(ctx, &pb.GetProductRequest{Id: "OLJCESPC7Z"})
if err != nil {
t.Error(err)
}
if want := parseCatalog()[0]; !proto.Equal(got, want) {
t.Errorf("got %v, want %v", got, want)
}
})
t.Run("Get non-exist product should returns not found", func(t *testing.T) {
_, err := client.GetProduct(ctx, &pb.GetProductRequest{Id: "N/A"})
if got, want := status.Code(err), codes.NotFound; got != want {
t.Errorf("got %s, want %s", got, want)
}
})
t.Run("Search product", func(t *testing.T) {
res, err := client.SearchProducts(ctx, &pb.SearchProductsRequest{Query: "typewriter"})
if err != nil {
t.Error(err)
}
if diff := cmp.Diff(res.Results, []*pb.Product{parseCatalog()[0]}, cmp.Comparer(proto.Equal)); diff != "" {
t.Error(diff)
}
})
}
|
Assessing the Role of Influential Mentors in the Research Development of Primary Care Fellows Purpose. To assess the association between mentorship and both subsequent research productivity and career development among primary care research fellows. Method. In 1998, using a self-administered questionnaire, the authors surveyed 215 fellows who graduated from 25 National Research Service Award (NRSA) primary care research programs between 19881997 to assess quantitative aspects and qualitative domains of their mentorship experience during fellowship training. Results. A total of 139 fellows (65%) responded to mentorship questions a median of four years after their fellowship. Thirty-seven fellows (26.6%) did not have an influential mentor, 42 (30.2%) reported influential but not sustained mentorship, and 60 (43.2%) had influential and sustained mentorship. Individuals with influential mentorship spent more time conducting research (p =.007), published more papers (p =.003), were more likely to be the principal investigator on a grant (p =.008), and more often provided research mentorship to others (72.5% versus 66.7% of those with unsustained mentorship, and 36.4% of those with no influential mentor, p =.008). After controlling for other predictors, influential and sustained mentorship remained an important determinant of career development in research. On qualitative analysis, fellows identified three important domains of mentorship: the relationship between mentor and fellow (such as guidance and support), professional attributes of the mentor (such as reputation), and personal attributes of the mentor (such as availability and caring). Conclusions. Influential and sustained mentorship enhances the research activity of primary care fellows. Research training programs should develop and support their mentors to ensure that they assume this critical role.
|
/// @ref core
/// @file glm/detail/type_mat2x2.hpp
#pragma once
#include "../fwd.hpp"
#include "type_vec2.hpp"
#include "type_mat.hpp"
#include <limits>
#include <cstddef>
namespace glm
{
template<typename T, precision P>
struct mat<2, 2, T, P>
{
typedef vec<2, T, P> col_type;
typedef vec<2, T, P> row_type;
typedef mat<2, 2, T, P> type;
typedef mat<2, 2, T, P> transpose_type;
typedef T value_type;
private:
col_type value[2];
public:
// -- Accesses --
typedef length_t length_type;
GLM_FUNC_DECL static GLM_CONSTEXPR length_type length() { return 2; }
GLM_FUNC_DECL col_type & operator[](length_type i);
GLM_FUNC_DECL col_type const & operator[](length_type i) const;
// -- Constructors --
GLM_FUNC_DECL mat() GLM_DEFAULT;
GLM_FUNC_DECL mat(mat<2, 2, T, P> const & m) GLM_DEFAULT;
template<precision Q>
GLM_FUNC_DECL mat(mat<2, 2, T, Q> const & m);
GLM_FUNC_DECL explicit mat(T scalar);
GLM_FUNC_DECL mat(
T const & x1, T const & y1,
T const & x2, T const & y2);
GLM_FUNC_DECL mat(
col_type const & v1,
col_type const & v2);
// -- Conversions --
template<typename U, typename V, typename M, typename N>
GLM_FUNC_DECL mat(
U const & x1, V const & y1,
M const & x2, N const & y2);
template<typename U, typename V>
GLM_FUNC_DECL mat(
vec<2, U, P> const & v1,
vec<2, V, P> const & v2);
// -- Matrix conversions --
template<typename U, precision Q>
GLM_FUNC_DECL GLM_EXPLICIT mat(mat<2, 2, U, Q> const & m);
GLM_FUNC_DECL GLM_EXPLICIT mat(mat<3, 3, T, P> const & x);
GLM_FUNC_DECL GLM_EXPLICIT mat(mat<4, 4, T, P> const & x);
GLM_FUNC_DECL GLM_EXPLICIT mat(mat<2, 3, T, P> const & x);
GLM_FUNC_DECL GLM_EXPLICIT mat(mat<3, 2, T, P> const & x);
GLM_FUNC_DECL GLM_EXPLICIT mat(mat<2, 4, T, P> const & x);
GLM_FUNC_DECL GLM_EXPLICIT mat(mat<4, 2, T, P> const & x);
GLM_FUNC_DECL GLM_EXPLICIT mat(mat<3, 4, T, P> const & x);
GLM_FUNC_DECL GLM_EXPLICIT mat(mat<4, 3, T, P> const & x);
// -- Unary arithmetic operators --
GLM_FUNC_DECL mat<2, 2, T, P> & operator=(mat<2, 2, T, P> const & v) GLM_DEFAULT;
template<typename U>
GLM_FUNC_DECL mat<2, 2, T, P> & operator=(mat<2, 2, U, P> const & m);
template<typename U>
GLM_FUNC_DECL mat<2, 2, T, P> & operator+=(U s);
template<typename U>
GLM_FUNC_DECL mat<2, 2, T, P> & operator+=(mat<2, 2, U, P> const & m);
template<typename U>
GLM_FUNC_DECL mat<2, 2, T, P> & operator-=(U s);
template<typename U>
GLM_FUNC_DECL mat<2, 2, T, P> & operator-=(mat<2, 2, U, P> const & m);
template<typename U>
GLM_FUNC_DECL mat<2, 2, T, P> & operator*=(U s);
template<typename U>
GLM_FUNC_DECL mat<2, 2, T, P> & operator*=(mat<2, 2, U, P> const & m);
template<typename U>
GLM_FUNC_DECL mat<2, 2, T, P> & operator/=(U s);
template<typename U>
GLM_FUNC_DECL mat<2, 2, T, P> & operator/=(mat<2, 2, U, P> const & m);
// -- Increment and decrement operators --
GLM_FUNC_DECL mat<2, 2, T, P> & operator++ ();
GLM_FUNC_DECL mat<2, 2, T, P> & operator-- ();
GLM_FUNC_DECL mat<2, 2, T, P> operator++(int);
GLM_FUNC_DECL mat<2, 2, T, P> operator--(int);
};
// -- Unary operators --
template<typename T, precision P>
GLM_FUNC_DECL mat<2, 2, T, P> operator+(mat<2, 2, T, P> const & m);
template<typename T, precision P>
GLM_FUNC_DECL mat<2, 2, T, P> operator-(mat<2, 2, T, P> const & m);
// -- Binary operators --
template<typename T, precision P>
GLM_FUNC_DECL mat<2, 2, T, P> operator+(mat<2, 2, T, P> const & m, T scalar);
template<typename T, precision P>
GLM_FUNC_DECL mat<2, 2, T, P> operator+(T scalar, mat<2, 2, T, P> const & m);
template<typename T, precision P>
GLM_FUNC_DECL mat<2, 2, T, P> operator+(mat<2, 2, T, P> const & m1, mat<2, 2, T, P> const & m2);
template<typename T, precision P>
GLM_FUNC_DECL mat<2, 2, T, P> operator-(mat<2, 2, T, P> const & m, T scalar);
template<typename T, precision P>
GLM_FUNC_DECL mat<2, 2, T, P> operator-(T scalar, mat<2, 2, T, P> const & m);
template<typename T, precision P>
GLM_FUNC_DECL mat<2, 2, T, P> operator-(mat<2, 2, T, P> const & m1, mat<2, 2, T, P> const & m2);
template<typename T, precision P>
GLM_FUNC_DECL mat<2, 2, T, P> operator*(mat<2, 2, T, P> const & m, T scalar);
template<typename T, precision P>
GLM_FUNC_DECL mat<2, 2, T, P> operator*(T scalar, mat<2, 2, T, P> const & m);
template<typename T, precision P>
GLM_FUNC_DECL typename mat<2, 2, T, P>::col_type operator*(mat<2, 2, T, P> const & m, typename mat<2, 2, T, P>::row_type const & v);
template<typename T, precision P>
GLM_FUNC_DECL typename mat<2, 2, T, P>::row_type operator*(typename mat<2, 2, T, P>::col_type const & v, mat<2, 2, T, P> const & m);
template<typename T, precision P>
GLM_FUNC_DECL mat<2, 2, T, P> operator*(mat<2, 2, T, P> const & m1, mat<2, 2, T, P> const & m2);
template<typename T, precision P>
GLM_FUNC_DECL mat<3, 2, T, P> operator*(mat<2, 2, T, P> const & m1, mat<3, 2, T, P> const & m2);
template<typename T, precision P>
GLM_FUNC_DECL mat<4, 2, T, P> operator*(mat<2, 2, T, P> const & m1, mat<4, 2, T, P> const & m2);
template<typename T, precision P>
GLM_FUNC_DECL mat<2, 2, T, P> operator/(mat<2, 2, T, P> const & m, T scalar);
template<typename T, precision P>
GLM_FUNC_DECL mat<2, 2, T, P> operator/(T scalar, mat<2, 2, T, P> const & m);
template<typename T, precision P>
GLM_FUNC_DECL typename mat<2, 2, T, P>::col_type operator/(mat<2, 2, T, P> const & m, typename mat<2, 2, T, P>::row_type const & v);
template<typename T, precision P>
GLM_FUNC_DECL typename mat<2, 2, T, P>::row_type operator/(typename mat<2, 2, T, P>::col_type const & v, mat<2, 2, T, P> const & m);
template<typename T, precision P>
GLM_FUNC_DECL mat<2, 2, T, P> operator/(mat<2, 2, T, P> const & m1, mat<2, 2, T, P> const & m2);
// -- Boolean operators --
template<typename T, precision P>
GLM_FUNC_DECL bool operator==(mat<2, 2, T, P> const & m1, mat<2, 2, T, P> const & m2);
template<typename T, precision P>
GLM_FUNC_DECL bool operator!=(mat<2, 2, T, P> const & m1, mat<2, 2, T, P> const & m2);
} //namespace glm
#ifndef GLM_EXTERNAL_TEMPLATE
#include "type_mat2x2.inl"
#endif
|
1. Technical Field
The present invention is directed to teleconferences. More specifically, the present invention is directed to an apparatus, system and method of providing feedback to an e-meeting presenter.
2. Description of Related Art
Due to recent trends toward telecommuting, mobile offices, and the globalization of businesses, more and more employees are being geographically separated from each other. As a result, more and more teleconferences are occurring at the work place.
A teleconference, as is well known, involves non-face-to-face interactions among participants. Particularly, a teleconference is a conference in which participants communicate with each other by means of telecommunication devices such as telephones or computer systems. Collaboration software, such as IBM Lotus Web conferencing, enables the participants to view and share applications, annotate documents, chat with other participants, or conduct an interactive white board session using their computer systems.
Face-to-face communications provide a variety of visual cues that ordinarily help in ascertaining whether a conversation is being understood or even being heard. For example, non-verbal behaviors such as visual attention and head nods during a conversation are indicative of understanding. Certain postures, facial expressions and eye gazes may provide social cues as to a person's emotional state, etc. Non-face-to-face communications are devoid of such cues.
As with any conversation or in any meeting, sometimes a participant might be stimulated by what is being communicated and sometimes the participant might be totally disinterested. Since in teleconferences in which Web conferencing equipment is used voice and images may be transmitted digitally, it would be advantageous to provide to a presenter feedback regarding participants' interest in a teleconference presentation.
|
<reponame>Andreas237/AndroidPolicyAutomation<gh_stars>1-10
// Decompiled by Jad v1.5.8g. Copyright 2001 <NAME>.
// Jad home page: http://www.kpdus.com/jad.html
// Decompiler options: packimports(3) annotate safe
package com.google.android.gms.internal.ads;
import android.os.Bundle;
import com.google.ads.mediation.admob.AdMobAdapter;
public final class zn
{
public static boolean a(Bundle bundle)
{
bundle = bundle.getBundle(((Class) (com/google/ads/mediation/admob/AdMobAdapter)).getName());
// 0 0:aload_0
// 1 1:ldc1 #10 <Class AdMobAdapter>
// 2 3:invokevirtual #16 <Method String Class.getName()>
// 3 6:invokevirtual #22 <Method Bundle Bundle.getBundle(String)>
// 4 9:astore_0
return bundle != null && bundle.getBoolean("render_test_ad_label", false);
// 5 10:aload_0
// 6 11:ifnull 26
// 7 14:aload_0
// 8 15:ldc1 #24 <String "render_test_ad_label">
// 9 17:iconst_0
// 10 18:invokevirtual #28 <Method boolean Bundle.getBoolean(String, boolean)>
// 11 21:ifeq 26
// 12 24:iconst_1
// 13 25:ireturn
// 14 26:iconst_0
// 15 27:ireturn
}
}
|
//==============================================================================
//
// Copyright (c) 2014-
// Authors:
// * <NAME> <<EMAIL>> (TU Dresden)
//
//------------------------------------------------------------------------------
//
// This file is part of PRISM.
//
// PRISM is free software; you can redistribute it and/or modify
// it under the terms of the GNU General Public License as published by
// the Free Software Foundation; either version 2 of the License, or
// (at your option) any later version.
//
// PRISM is distributed in the hope that it will be useful,
// but WITHOUT ANY WARRANTY; without even the implied warranty of
// MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
// GNU General Public License for more details.
//
// You should have received a copy of the GNU General Public License
// along with PRISM; if not, write to the Free Software Foundation,
// Inc., 59 Temple Place, Suite 330, Boston, MA 02111-1307 USA
//
//==============================================================================
package explicit;
import prism.PrismException;
/**
* Interface for a model transformation.
*/
public interface ModelTransformation<OriginalModel extends Model, TransformedModel extends Model> {
/** Get the original model. */
public OriginalModel getOriginalModel();
/** Get the transformed model. */
public TransformedModel getTransformedModel() throws PrismException;
/**
* Take a {@code StateValues} object for the transformed model and
* project the values to the original model.
* @param svTransformedModel a {@code StateValues} object for the transformed model
* @return a corresponding {@code StateValues} object for the original model.
**/
public StateValues projectToOriginalModel(StateValues svTransformedModel) throws PrismException;
}
|
<gh_stars>10-100
package firestream.chat.chat;
import androidx.annotation.Nullable;
import java.util.ArrayList;
import java.util.Arrays;
import java.util.Date;
import java.util.List;
import java.util.Map;
import firestream.chat.R;
import firestream.chat.events.ListData;
import firestream.chat.firebase.rx.MultiRelay;
import firestream.chat.firebase.service.Keys;
import firestream.chat.firebase.service.Path;
import firestream.chat.firebase.service.Paths;
import firestream.chat.interfaces.IChat;
import firestream.chat.message.Body;
import firestream.chat.message.Message;
import firestream.chat.message.Sendable;
import firestream.chat.message.TextMessage;
import firestream.chat.message.TypingState;
import firestream.chat.namespace.Fire;
import firestream.chat.namespace.FireStreamUser;
import firestream.chat.types.DeliveryReceiptType;
import firestream.chat.types.InvitationType;
import firestream.chat.types.RoleType;
import firestream.chat.types.TypingStateType;
import firestream.chat.util.Typing;
import io.reactivex.Completable;
import io.reactivex.Observable;
import io.reactivex.Single;
import io.reactivex.functions.Consumer;
import io.reactivex.subjects.BehaviorSubject;
import sdk.guru.common.Event;
public class Chat extends AbstractChat implements IChat {
protected String id;
protected Date joined;
protected Meta meta = new Meta();
protected List<User> users = new ArrayList<>();
protected MultiRelay<Event<User>> userEvents = MultiRelay.create();
protected BehaviorSubject<String> nameChangedEvents = BehaviorSubject.create();
protected BehaviorSubject<String> imageURLChangedEvents = BehaviorSubject.create();
protected BehaviorSubject<Map<String, Object>> customDataChangedEvents = BehaviorSubject.create();
public Chat(String id) {
this.id = id;
}
public Chat(String id, Date joined, Meta meta) {
this(id, joined);
this.meta = meta;
}
public Chat(String id, Date joined) {
this(id);
this.joined = joined;
}
@Override
public String getId() {
return id;
}
@Override
public void connect() throws Exception {
debug("Connect to chat: " + id);
// If delivery receipts are enabled, send the delivery receipt
if (Fire.stream().getConfig().deliveryReceiptsEnabled) {
getSendableEvents()
.getMessages()
.pastAndNewEvents()
.filter(deliveryReceiptFilter())
.flatMapCompletable(messageEvent -> markReceived(messageEvent.get()))
.subscribe(this);
}
dm.add(listChangeOn(Paths.chatUsersPath(id)).subscribe(listEvent -> {
Event<User> userEvent = listEvent.to(User.from(listEvent));
User user = userEvent.get();
// If we start by removing the user. If it type a remove event
// we leave it at that. Otherwise we add that user back in
users.remove(user);
if (!userEvent.isRemoved()) {
users.add(user);
}
userEvents.accept(userEvent);
}));
// Handle name and image change
dm.add(Fire.stream().getFirebaseService().chat
.metaOn(getId())
.subscribe(newMeta -> {
if (newMeta != null) {
if (newMeta.getName() != null && !newMeta.getName().equals(meta.getName())) {
meta.setName(newMeta.name);
nameChangedEvents.onNext(meta.getName());
}
if (newMeta.getImageURL() != null && !newMeta.getImageURL().equals(meta.getImageURL())) {
meta.setImageURL(newMeta.imageURL);
imageURLChangedEvents.onNext(meta.getImageURL());
}
if (newMeta.getData() != null) {
meta.setData(newMeta.getData());
customDataChangedEvents.onNext(meta.getData());
}
if (newMeta.getCreated() != null) {
meta.setCreated(newMeta.getCreated());
}
}
}, this));
super.connect();
}
@Override
public Completable leave() {
return Completable.defer(() -> {
if (getMyRoleType().equals(RoleType.owner()) && getUsers().size() > 1) {
if (getUsers().size() > 1) {
return Completable.error(Fire.internal().getError(R.string.error_group_must_be_empty_to_close));
} else {
return delete().doOnComplete(this::disconnect);
}
}
return removeUser(User.currentUser()).doOnComplete(this::disconnect);
});
}
protected Completable delete() {
return Fire.stream().getFirebaseService().chat.delete(getId());
}
@Override
public String getName() {
return meta.getName();
}
@Override
public Completable setName(String name) {
if (!hasPermission(RoleType.admin())) {
return Completable.error(this::adminPermissionRequired);
} else if(this.meta.getName().equals(name)) {
return Completable.complete();
} else {
return Fire.stream().getFirebaseService().chat.setMetaField(getId(), Keys.Name, name).doOnComplete(() -> {
meta.setName(name);
});
}
}
@Override
public String getImageURL() {
return meta.getImageURL();
}
@Override
public Completable setImageURL(final String url) {
if (!hasPermission(RoleType.admin())) {
return Completable.error(this::adminPermissionRequired);
} else if (this.meta.getImageURL().equals(url)) {
return Completable.complete();
} else {
return Fire.stream().getFirebaseService().chat.setMetaField(getId(), Keys.ImageURL, url).doOnComplete(() -> {
meta.setImageURL(url);
});
}
}
@Override
public Map<String, Object> getCustomData() {
return meta.getData();
}
@Override
public Completable setCustomData(final Map<String, Object> data) {
if (!hasPermission(RoleType.admin())) {
return Completable.error(this::adminPermissionRequired);
} else {
return Fire.stream().getFirebaseService().chat.setMetaField(getId(), Paths.Data, data).doOnComplete(() -> {
meta.setData(data);
});
}
}
@Override
public List<User> getUsers() {
return users;
}
@Override
public List<FireStreamUser> getFireStreamUsers() {
List<FireStreamUser> fireStreamUsers = new ArrayList<>();
for (User u : users) {
fireStreamUsers.add(FireStreamUser.fromUser(u));
}
return fireStreamUsers;
}
@Override
public Completable addUser(Boolean sendInvite, User user) {
return addUsers(sendInvite, user);
}
@Override
public Completable addUsers(Boolean sendInvite, User... users) {
return addUsers(sendInvite, Arrays.asList(users));
}
@Override
public Completable addUsers(Boolean sendInvite, List<? extends User> users) {
return addUsers(Paths.chatUsersPath(id), User.roleTypeDataProvider(), users).concatWith(sendInvite ? inviteUsers(users) : Completable.complete()).doOnComplete(() -> {
this.users.addAll(users);
});
}
@Override
public Completable updateUser(User user) {
return updateUser(Paths.chatUsersPath(id), User.roleTypeDataProvider(), user);
}
@Override
public Completable updateUsers(List<? extends User> users) {
return updateUsers(Paths.chatUsersPath(id), User.roleTypeDataProvider(), users);
}
@Override
public Completable updateUsers(User... users) {
return updateUsers(Paths.chatUsersPath(id), User.roleTypeDataProvider(), users);
}
@Override
public Completable removeUser(User user) {
return removeUser(Paths.chatUsersPath(id), user);
}
@Override
public Completable removeUsers(User... user) {
return removeUsers(Paths.chatUsersPath(id), user);
}
@Override
public Completable removeUsers(List<? extends User> users) {
return removeUsers(Paths.chatUsersPath(id), users);
}
@Override
public Completable inviteUsers(List<? extends User> users) {
return Completable.defer(() -> {
List<Completable> completables = new ArrayList<>();
for (User user : users) {
if (!user.isMe()) {
completables.add(Fire.stream().sendInvitation(user.id, InvitationType.chat(), id));
}
}
return Completable.merge(completables);
});
}
@Override
public List<User> getUsersForRoleType(RoleType roleType) {
List<User> result = new ArrayList<>();
for (User user: users) {
if (user.roleType.equals(roleType)) {
result.add(user);
}
}
return result;
}
@Override
public Completable setRole(User user, RoleType roleType) {
if (roleType.equals(RoleType.owner()) && !hasPermission(RoleType.owner())) {
return Completable.error(this::ownerPermissionRequired);
} else if(!hasPermission(RoleType.admin())) {
return Completable.error(this::adminPermissionRequired);
}
user.roleType = roleType;
return updateUser(user);
}
@Override
public RoleType getRoleType(User theUser) {
for (User user: users) {
if (user.equals(theUser)) {
return user.roleType;
}
}
return null;
}
@Override
public List<RoleType> getAvailableRoles(User user) {
// We can't set our own role and only admins and higher can set a role
if (!user.isMe() && hasPermission(RoleType.admin())) {
// The owner can set users to any role apart from owner
if (hasPermission(RoleType.owner())) {
return RoleType.allExcluding(RoleType.owner());
}
// Admins can set the role type of non-admin users. They can't create or
// destroy admins, only the owner can do that
if (!user.roleType.equals(RoleType.admin())) {
return RoleType.allExcluding(RoleType.owner(), RoleType.admin());
}
}
return new ArrayList<>();
}
@Override
public Observable<String> getNameChangeEvents() {
return nameChangedEvents.hide();
}
@Override
public Observable<String> getImageURLChangeEvents() {
return imageURLChangedEvents.hide();
}
@Override
public Observable<Map<String, Object>> getCustomDataChangedEvents() {
return customDataChangedEvents.hide();
}
@Override
public MultiRelay<Event<User>> getUserEvents() {
return userEvents;
}
@Override
public Completable sendMessageWithBody(Body body) {
return sendMessageWithBody(body, null);
}
@Override
public Completable sendMessageWithBody(Body body, @Nullable Consumer<String> newId) {
return send(new Message(body), newId);
}
@Override
public Completable sendMessageWithText(String text) {
return sendMessageWithText(text, null);
}
@Override
public Completable sendMessageWithText(String text, @Nullable Consumer<String> newId) {
return send(new TextMessage(text), newId);
}
@Override
public Completable startTyping() {
return Completable.defer(() -> {
final Typing typing = typingMap.get(id);
if (!typing.isTyping) {
typing.isTyping = true;
return send(new TypingState(TypingStateType.typing()), s -> {
typing.sendableId = s;
});
}
return Completable.complete();
});
}
@Override
public Completable stopTyping() {
return Completable.defer(() -> {
final Typing typing = typingMap.get(id);
if (typing.isTyping) {
return deleteSendable(typing.sendableId).doOnComplete(() -> {
typing.isTyping = false;
typing.sendableId = null;
});
}
return Completable.complete();
});
}
@Override
public Completable sendDeliveryReceipt(String fromUserId, DeliveryReceiptType type, String messageId) {
return sendDeliveryReceipt(fromUserId, type, messageId, null);
}
@Override
public Completable sendDeliveryReceipt(String fromUserId, DeliveryReceiptType type, String messageId, @Nullable Consumer<String> newId) {
return Fire.stream().sendDeliveryReceipt(fromUserId, type, messageId, newId);
}
@Override
public Completable send(Sendable sendable, @Nullable Consumer<String> newId) {
if (!hasPermission(RoleType.member())) {
return Completable.error(this::memberPermissionRequired);
}
return this.send(Paths.chatMessagesPath(id), sendable, newId);
}
@Override
public Completable send(Sendable sendable) {
return send(sendable, null);
}
@Override
public Completable markReceived(Sendable sendable) {
return markReceived(sendable.getFrom(), sendable.getId());
}
@Override
public Completable markReceived(String fromUserId, String sendableId) {
return sendDeliveryReceipt(fromUserId, DeliveryReceiptType.received(), sendableId);
}
@Override
public Completable markRead(Sendable sendable) {
return markRead(sendable.getFrom(), sendable.getId());
}
@Override
public Completable markRead(String fromUserId, String sendableId) {
return sendDeliveryReceipt(fromUserId, DeliveryReceiptType.read(), sendableId);
}
public RoleType getMyRoleType() {
return getRoleType(Fire.stream().currentUser());
}
@Override
public boolean equals(Object chat) {
if (chat instanceof Chat) {
return id.equals(((Chat) chat).id);
}
return false;
}
protected void setMeta(Meta meta) {
this.meta = meta;
}
public Path path() {
return Paths.chatPath(id);
}
public Path metaPath() {
return Paths.chatMetaPath(id);
}
@Override
protected Path messagesPath() {
return Paths.chatMessagesPath(id);
}
protected Exception ownerPermissionRequired() {
return new Exception(Fire.internal().context().getString(R.string.error_owner_permission_required));
}
protected Exception adminPermissionRequired() {
return new Exception(Fire.internal().context().getString(R.string.error_admin_permission_required));
}
protected Exception memberPermissionRequired() {
return new Exception(Fire.internal().context().getString(R.string.error_member_permission_required));
}
public static Single<Chat> create(final String name, final String imageURL, final Map<String, Object> data, final List<? extends User> users) {
return Fire.stream().getFirebaseService().chat.add(Meta.from(name, imageURL, data).addTimestamp().wrap().toData()).flatMap(chatId -> {
Chat chat = new Chat(chatId, null, new Meta(name, imageURL, data));
List<User> usersToAdd = new ArrayList<>(users);
// Make sure the current user type the owner
usersToAdd.remove(User.currentUser());
usersToAdd.add(User.currentUser(RoleType.owner()));
return chat.addUsers(true, usersToAdd)
.toSingle(() -> chat);
});
}
public boolean hasPermission(RoleType required) {
RoleType myRoleType = getMyRoleType();
if (myRoleType == null) {
return false;
}
return getMyRoleType().ge(required);
}
public Completable deleteSendable(Sendable sendable) {
return deleteSendable(sendable.getId());
}
public Completable deleteSendable(String sendableId) {
return deleteSendable(messagesPath().child(sendableId));
}
public static Chat from(Event<ListData> listEvent) {
ListData change = listEvent.get();
if (change.get(Keys.Date) instanceof Date) {
return new Chat(change.getId(), (Date) change.get(Keys.Date));
}
return new Chat(change.getId());
}
public Completable mute() {
return Fire.internal().mute(getId());
}
public Completable mute(@Nullable Date until) {
return Fire.internal().mute(getId(), until);
}
public Completable unmute() {
return Fire.internal().unmute(getId());
}
public Date mutedUntil() {
return Fire.internal().mutedUntil(getId());
}
public boolean muted() {
return Fire.internal().muted(getId());
}
}
|
<reponame>rdkcteam/wpa_supplicant-2.9-cypress
/*
* Broadcom Corporation OUI and vendor specific assignments
* Copyright (c) 2015, Broadcom Corporation.
*
* This software may be distributed under the terms of the BSD license.
* See README for more details.
*/
#ifndef BRCM_VENDOR_H
#define BRCM_VENDOR_H
/*
* This file is a registry of identifier assignments from the Broadcom
* OUI 00:10:18 for purposes other than MAC address assignment. New identifiers
* can be assigned through normal review process for changes to the upstream
* hostap.git repository.
*/
#define OUI_BRCM 0x001018
/**
* enum brcm_nl80211_vendor_subcmds - BRCM nl80211 vendor command identifiers
*
* @BRCM_VENDOR_SUBCMD_UNSPEC: Reserved value 0
*
* @BRCM_VENDOR_SUBCMD_PRIV_STR: String command/event
*/
enum brcm_nl80211_vendor_subcmds {
BRCM_VENDOR_SUBCMD_UNSPEC,
BRCM_VENDOR_SUBCMD_PRIV_STR,
BRCM_VENDOR_SUBCMD_BCM_STR,
BRCM_VENDOR_SUBCMD_SET_PSK,
BRCM_VENDOR_SUBCMD_SET_PMK
};
/**
* enum brcm_nl80211_vendor_events - BRCM nl80211 asynchoronous event identifiers
*
* @BRCM_VENDOR_EVENT_UNSPEC: Reserved value 0
*
* @BRCM_VENDOR_EVENT_PRIV_STR: String command/event
*/
enum brcm_nl80211_vendor_events {
BRCM_VENDOR_EVENT_UNSPEC,
BRCM_VENDOR_EVENT_PRIV_STR,
BRCM_VENDOR_EVENT_SAE_KEY = 34,
};
#ifdef CONFIG_BRCM_SAE
enum wifi_sae_key_attr {
BRCM_SAE_KEY_ATTR_PEER_MAC,
BRCM_SAE_KEY_ATTR_PMK,
BRCM_SAE_KEY_ATTR_PMKID
};
#endif /* CONFIG_BRCM_SAE */
#endif /* BRCM_VENDOR_H */
|
<reponame>1980744819/ACM-code
#include <stdio.h>
#include <stdlib.h>
int num[361];
int machine[19][362];
int used[19], order[19][19];
int last[19];
int time[19][19];
int max[19];
int main(int argc, char **argv)
{
int i, j, k, l;
int m, n, count;
int ans = 0;
scanf("%d%d", &m, &n);
for(i = 0; i < m * n; i++){
scanf("%d", &num[i]);
num[i]--;
}
for(i = 0; i < n; i++){
for(j = 0; j < m; j++){
scanf("%d", &order[i][j]);
order[i][j]--;
}
}
for(i = 0; i < n; i++){
for(j = 0; j < m; j++){
scanf("%d", &time[i][j]);
}
}
for(i = 0; i < m * n; i++){
k = order[num[i]][used[num[i]]];
count = 0;
for(j = last[num[i]]; count < time[num[i]][used[num[i]]]; j++){
if(machine[k][j] == 0){
count++;
}else{
count = 0;
}
}
for(l = 1; l <= count; l++){
machine[k][j - l] = 1;
}
last[num[i]] = j;
used[num[i]]++;
if(max[k] < j){
max[k] = j;
}
}
for(i = 0; i < m; i++){
if(ans < max[i]){
ans = max[i];
}
}
printf("%d\n", ans);
return 0;
}
|
Addictive Behavior Among Young People in Ukraine: A Pilot Study The AUDIT-like tests system was created for complex assessment and evaluation of the addictive status of adolescents in a Ukrainian population. The AUDIT-like tests system has been created from the Alcohol Use Disorders Identification Test (AUDIT) developed by the World Health Organization. The AUDIT-like tests were minimally modified from the original AUDIT. Attention was brought to similarities between stages of different addictions (TV, computer games, the Internet, etc.) and alcohol addiction. Seventeen AUDIT-like tests were created to detect the different types of chemical and non-chemical addictions.
|
import requests
from bs4 import BeautifulSoup
rootUrl = "http://cspro.sogang.ac.kr/~cse20121611/"
visitedPage = [];
notGoSymbol = [" ", "#", "?"]
fileNum = 1
def ReadPage(pageUrl) :
global fileNum
req = requests.get(pageUrl)
soup = BeautifulSoup(req.content, "html.parser")
results = soup.find_all('a')
if req.ok == True:
if pageUrl not in visitedPage:
fileName = "Output_"+ ('%04d' %fileNum) +'.txt'
fileStream = open(fileName,"w")
fileStream.write(soup.text)
fileStream.close()
fileNum += 1
visitedPage.append(pageUrl)
for ii in results:
hyperUrl = str(ii.get('href'))
if len(hyperUrl) == 0 or hyperUrl[0] in notGoSymbol:
continue
else:
if hyperUrl[0:7] == "http://":
nextUrl = hyperUrl
else :
nextUrl = rootUrl+hyperUrl
if nextUrl in visitedPage:
continue
else:
ReadPage(nextUrl)
ReadPage(rootUrl+"index.html")
urlFile = open("URL.txt","w")
for page in visitedPage:
urlFile.write(page+"\n")
urlFile.close();
|
WIDTH=20
HEIGHT=20
TITLE='Scoring Test'
def bigscore1(s):
score(9999999999)
s.destroy()
def bigscore2(s):
score(-9999999999)
s.destroy()
shape(CIRCLE, RED, (1,1)).bouncy().clicked(bigscore1)
shape(CIRCLE, BLUE, (9,9)).bouncy().clicked(bigscore2)
|
<filename>drive-cloud-modules/drive-cloud-basics/drive-cloud-basics-service/src/main/java/com/drive/basics/service/impl/OperatorAreaServiceImpl.java
package com.drive.basics.service.impl;
import com.drive.basics.mapper.OperatorAreaMapper;
import com.drive.basics.pojo.entity.OperatorAreaEntity;
import com.drive.basics.service.OperatorAreaService;
import com.drive.common.core.base.BaseService;
import org.springframework.stereotype.Service;
/**
* 运营商代理区域 服务实现类
*
* @author xiaoguo
*/
@Service
public class OperatorAreaServiceImpl extends BaseService<OperatorAreaMapper, OperatorAreaEntity> implements OperatorAreaService {
}
|
<reponame>tyronestarve/aws-lambda-deployment-plugin-spinnaker
// Copyright Amazon.com, Inc. or its affiliates. All Rights Reserved.
// SPDX-License-Identifier: Apache-2.0
import React from 'react';
import {
FormikFormField,
HelpField,
IFormikStageConfigInjectedProps,
MapEditorInput,
TextInput,
} from '@spinnaker/core';
export function ExecutionRoleForm( props: IFormikStageConfigInjectedProps ) {
return(
<div>
<FormikFormField
name="envVariables"
label="Env Variables"
input={props => <MapEditorInput {...props} allowEmptyValues={true} addButtonLabel="Add" />}
/>
<FormikFormField
name="KMSKeyArn"
label="Key ARN"
help={<HelpField id="aws.function.kmsKeyArn" />}
input={props => <TextInput {...props} />}
/>
</div>
);
}
|
Metronidazole in the treatment of chronic radiation proctitis: clinical trial. AIM To evaluate the effectiveness of metronidazole in combination with corticosteroids in enema and mesalazine (5-aminosalicylic acid) in comparison with the same protocol without metronidazole in the treatment of chronic radiation proctitis. METHODS Sixty patients with rectal bleeding and diarrhea were randomly divided into two groups. Patients in the first group were treated with metronidazole (3x400 mg orally per day), mesalazine (3x1 g orally per day), and betamethasone enema (once a day during 4 weeks). Patients in the second group were treated with mesalazine and betamethasone enema, but without metronidazole. The efficacy of metronidazole was assessed on the basis of rectal bleeding, diarrhea, and rectosigmoidoscopy findings in all patients. RESULTS The incidence of rectal bleeding and mucosal ulcers was significantly lower in the metronidazole group, 4 weeks (p=0.009), 3 months (p=0.031), and 12 months (p=0.029) after therapy. There was also a significant decrease in diarrhea and edema in the metronidazole group, 4 weeks (p=0.044), 3 months (p=0.045), and 12 months (p=0.034) after treatment. CONCLUSION Metronidazole in combination with mesalazine and betamethasone enemas successfully treats rectal bleeding and diarrhea in chronic radiation proctitis.
|
GUGA: A tool for participatory cities Participatory cities are those that allow the participation of citizens in the construction and improvement of their common daily life. In this work we present a tool for that participation, allowing the citizens to register the occurrences as well as take knowledge about the global geographic status of their city in on a variety of contexts (security, transit, etc.). However, a tool like that, fed by the people, certainly will deal with a large amount of information, distributed geographically. To accomplish that, a precise criterion for visualizing the resultant density distribution of occurrences must be used. In this paper, we also propose an automatic method for that visualization based on Voronoi Diagrams. The Voronoi polygons divide the region according to the concentration of occurrences. In this scheme, the area of each Voronoi polygon defines the density of the occurrences of the specific categories which are shown in the city map in color and transparency intensities for visualization. This can easily reveal the space distribution of important issues, in a variety of contexts such as criminality, commercial and industrial activities, drugs traffic, illumination concerns, and others.
|
def process_trajectory(trajectory_seq: pd.DataFrame, row) -> List[dict]:
trajectory_seq['value'] = [
26,
np.nan,
row.time.year,
row.time.month,
row.time.day,
np.nan,
row.time.hour,
row.time.minute,
np.nan,
row.lat,
row.lon,
row.direction,
row.speed,
0,
0,
1,
row.z if row.z >= 0 else 0,
(row.temperature + 273.15),
31,
]
return trajectory_seq.to_dict(orient='records')
|
Nitrogen fertilizer on yield of fodder maize, chemical composition, its preference and digestibility by Sokoto Gudali heifers Nig. J. Anim. Prod. 2017, 44: 340 348 Nigerian Society for Animal Production Nigerian Journal of Animal Production The lack of high yielding quality fodder for ruminant production is still a major problem to livestock sector in Nigeria. Fodder yield is primarily determined by nitrogen levels in the soil which is often limiting in tropical soils. This study evaluated four levels of nitrogen fertilizer application (0, 100, 150 and 200kg N/ha) on fodder yield of maize, chemical composition, its acceptability and digestibility by Sokoto Gudali heifers. Treatments were replicated three times on plots measuring 4m x 10m in a completely randomized design. Forage was harvested at 42 days after planting (DAP) and fodder yield (tons/ha) per plot was determined. Samples of forage from each plot were taken for chemical analysis. Eight heifers were used to evaluate acceptability and twelve heifers for digestibility of the fodder using standard procedures. The biomass yield increased significantly (P<0.05) with increasing levels of nitrogen fertilizer with the highest yield (9.06 tons/ha) recorded at 200kg N/ha. also increased significantly (P<0.05) with increased levels of nitrogen across the treatment. The highest CP (23.25%) and NDF (75.15%) were recorded at 200kg N/ha and the lowest CP (17.51%) and NDF (71.40%) at 0kg N/ha. Preference of heifers for maize fodder reduced with application of fertilizer while digestibility of the maize fodder increased up to 100kg N/ha and thereafter reduced. The CP and NDF
|
A 6-year-old Gold Star kid, adorably sporting a child-sized Marine Corps dress uniform and his father's cover, was honored today at the White House by President Donald Trump.
Christian Jacobs, who has been photographed over the years with his mom Brittany Jacobs visiting his father's grave in Arlington National Cemetery's Section 60, met Trump during the president's Memorial Day visit to the cemetery last month.
Christian's dad, Marine Sgt Christopher Jacobs was killed at Marine Corps Air Ground Combat Center Twentynine Palms, California on October 24, 2011 during a training exercise. Christian was only eight months old.
"He looked me square in the eyes and gave me a firm handshake," the president said today regarding their May meeting. "That 6-year-old stood strong and tall and proud in front of the commander in chief just as his dad would have wanted him to be. It's extraordinary."
This year wasn't the first time Christian had visited the cemetery on Memorial Day.
Heart wrenching photos of Christian and his mother visiting his father's grave at Arlington have been snapped by Defense Department photographers for at least the last three years.
It was unclear whether or not the pair had spent time with former President Barrack Obama during his Arlington Memorial Day visits.
"Christian, your father is an American hero," Trump said at the White House today.
|
def _check_m2m_recursion(self, field_name):
field = self._fields.get(field_name)
if not (field and field.type == 'many2many' and
field.comodel_name == self._name and field.store):
raise ValueError('invalid field_name: %r' % (field_name,))
cr = self._cr
query = 'SELECT "%s", "%s" FROM "%s" WHERE "%s" IN %%s AND "%s" IS NOT NULL' % \
(field.column1, field.column2, field.relation, field.column1, field.column2)
succs = defaultdict(set)
preds = defaultdict(set)
todo, done = set(self.ids), set()
while todo:
cr.execute(query, [tuple(todo)])
done.update(todo)
todo.clear()
for id1, id2 in cr.fetchall():
for x, y in itertools.product([id1] + list(preds[id1]),
[id2] + list(succs[id2])):
if x == y:
return False
succs[x].add(y)
preds[y].add(x)
if id2 not in done:
todo.add(id2)
return True
|
<filename>comx/sun/tools/sjavac/comp/SmartWriter.java
/*
* Copyright (c) 2012, 2013, Oracle and/or its affiliates. All rights reserved.
* DO NOT ALTER OR REMOVE COPYRIGHT NOTICES OR THIS FILE HEADER.
*
* This code is free software; you can redistribute it and/or modify it
* under the terms of the GNU General Public License version 2 only, as
* published by the Free Software Foundation. Oracle designates this
* particular file as subject to the "Classpath" exception as provided
* by Oracle in the LICENSE file that accompanied this code.
*
* This code is distributed in the hope that it will be useful, but WITHOUT
* ANY WARRANTY; without even the implied warranty of MERCHANTABILITY or
* FITNESS FOR A PARTICULAR PURPOSE. See the GNU General Public License
* version 2 for more details (a copy is included in the LICENSE file that
* accompanied this code).
*
* You should have received a copy of the GNU General Public License version
* 2 along with this work; if not, write to the Free Software Foundation,
* Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
*
* Please contact Oracle, 500 Oracle Parkway, Redwood Shores, CA 94065 USA
* or visit www.oracle.com if you need additional information or have any
* questions.
*/
package comx.sun.tools.sjavac.comp;
import java.io.*;
import javax.tools.JavaFileObject;
/**
* The SmartWriter will cache the written data and when the writer is closed,
* then it will compare the cached data with the old_content string.
* If different, then it will write all the new content to the file.
* If not, the file is not touched.
*
* <p><b>This is NOT part of any supported API.
* If you write code that depends on this, you do so at your own
* risk. This code and its internal interfaces are subject to change
* or deletion without notice.</b></p>
*/
public class SmartWriter extends Writer {
String name;
JavaFileObject file;
String oldContent;
StringWriter newContent = new StringWriter();
PrintWriter stdout;
boolean closed;
public SmartWriter(JavaFileObject f, String s, String n, PrintWriter pw) {
name = n;
file = f;
oldContent = s;
newContent = new StringWriter();
stdout = pw;
closed = false;
}
public void write(char[] chars, int i, int i1)
{
newContent.write(chars, i, i1);
}
public void close() throws IOException {
if (closed) return;
closed = true;
String s = newContent.toString();
if (!oldContent.equals(s)) {
int p = file.getName().lastIndexOf(File.separatorChar);
try (Writer writer = file.openWriter()) {
writer.write(s);
}
stdout.println("Writing "+file.getName().substring(p+1));
}
}
public void flush() throws IOException {
}
}
|
n, target = map(int, raw_input().split())
a = [None] + map(int, raw_input().split())
visited = [False] * (n + 1)
q = [1]
while q:
curCell = q.pop()
if curCell >= n:
continue
nextCell = curCell + a[curCell]
if not visited[nextCell]:
visited[nextCell] = True
q.append(nextCell)
print 'YES' if visited[target] else 'NO'
|
A decision on 525 new homes in Angmering has been delayed as a planning application was pulled from a committee agenda this week.
Developers Rydon and Gleeson want planning permission for land north of Water Lane with one access using the existing route to the motor racing circuit and the second from Dapper’s Lane.
The scheme includes 30 per cent affordable housing, employment land, play areas and informal open space.
The outline application was due to be discussed by Arun District Council’s development control committee on Wednesday January 23, with officers recommending approval, subject to conditions.
However the plans were pulled from the committee’s agenda and will be debated at a later date.
The development is separate from another scheme for 175 home south of Water Lane, which was supported by the committee back in November.
|
PTK-7 Expression in Gastric Cancer: A Prognostic Determinant Background: Protein tyrosine kinase-7, a regulatory protein in the Wnt signaling pathway, was highly overexpressed in various cancer types and assumed to be related to prognosis. Aims: The purpose of this study is to assess whether protein tyrosine kinase-7 expression status in curatively resected gastric carcinoma would independently identify patients with a high risk of recurrence and death. Study Design: Retrospective cohort study. Methods: We included patients who were at least 18 years of age and diagnosed with gastric cancer. The exclusion criterion was a metastatic disease at the time of diagnosis or operation. Data on clinicopathological prognostic determinants and clinical courses, including the date of disease relapse and survival status, were collected with the use of medical records. Surgically removed tumor tissue specimens were examined by two independent pathologists at the pathology department of our institution. Protein tyrosine kinase-7 expression status was assessed with immunohistochemical processing and stratified on a scale ranging from 0 to +3 according to the extent of stained tumor cells. It was then further categorized into two groups, one being + (positive), including +1, +2, and +3 scores, another was-(negative), including-and +/− scores. Results: A total of 114 patients were analyzed. Protein tyrosine kinase-7 expression was present in 66.7% of the surgical tumor specimens. There was no statistically significant difference in almost all relevant parameters between the protein tyrosine kinase-7 positive and negative groups. The estimated median survival in the protein tyrosine kinase-7 positive group was significantly better than the protein tyrosine kinase-7 negative group (60 vs 22 months, p<0.001). Disease-free survival was found to be 55 months in the protein tyrosine kinase-7 positive group, whereas it was 21 months in the negative group (p=0.015). In the multivariate analysis, along with negative protein tyrosine kinase-7 expression, poor performance status, and advanced stage were significantly associated with the risk of death (p<0.001 for each). Conclusion: Compared to patients with negative PTK-7 expression, patients with positive PTK-7 expression have better disease-free survival and overall survival rates. Efforts should be made to enhance this finding and translate it into clinical practice. Gastric cancer is one of the leading causes of mortality worldwide. Unfortunately, despite today's advanced technologies in medical and surgical treatments, survival rates are still very low for this type of cancer. Adjuvant chemo-and radiotherapy decrease relapse and mortality rates, but this benefit is coupled with side effects and resistance to treatment in early-stage gastric cancer. The outcome of gastric cancer is influenced by many factors, including disease extent, histologic type, the status of the resection margins, lymphovascular invasion, perineural invasion, tumor grade, and patient age. In addition to these well-established prognostic features, the development of prognostic biomarkers that match the molecular makeup of the tumor may lead to the development of more effective and safer therapeutic options by targeting the relevant mechanism responsible for tumor progression. Protein tyrosine kinase-7 (PTK-7) is a protein that was first discovered in colon carcinoma cell lines. For this reason, it is also known as colon carcinoma kinase-4. PTK-7 functions as a transmembrane cell surface glycoprotein that regulates the signal stimulation of downstream pathways. The major cellular pathway that PTK-7 involved in is the Wnt, both the non-canonical (also known as the wnt/planar cell polarity signaling) and the canonical (B-catenin dependent), signaling pathway, which regulates a variety of developmental processes, including adhesion, cell migration, cell polarity, proliferation, and actin cytoskeleton reorganization, along with apoptosis. The Wnt cascade also plays an important role in stem cell maintenance and differentiation. Several tumor types, including breast cancer, non-small cell lung cancer, and sarcoma, exhibit constitutive activation of Wnt signaling through the autocrine secretion of ligands by a tumor cell. Recent evidence has shown that PTK-7 expression levels are increased in some tumor types and may be a potential target in cancer management. It has been argued that PTK-7 overexpression is associated with poor prognosis in most cancers. Some studies suggested an association with adverse clinicopathological features like aggressive histological subtype, lymph node metastasis, advanced tumor stage, lymphovascular invasion, and high grade. The poor outcome seen with PTK-7 overexpression provides an argument to discuss the potential benefits of adjuvant treatment after curative tumor resections. However, trials relevant to this topic in gastric cancer are limited and contradictory to the previous studies on other types of cancers. In the present study, we aimed to investigate the impact of PTK-7 expression on gastric cancer outcomes to determine its potential role as a therapeutic target. Study Design This study was conducted in compliance with the ethical principles according to the Declaration of Helsinki, and it was approved by the local Institutional Review Board (July 29, 2016; protocol number: 2016/514/88/19). This retrospective follow-up study involved 114 patients who were at least 18 years of age, with curatively resected gastric carcinoma, diagnosed from 2006 through 2013 in the Department of Medical Oncology of our institution. Data on clinicopathological features, including age, gender, resection type, tumor location, histopathology, pT stage, tumor size, histological grade, resection margin, lymph node involvement, lymphovascular invasion, and perineural invasion were collected retrospectively. Clinical course, regarding the date of disease relapse and survival status, were also noted. Receipt of adjuvant treatment was determined based on the resection margin and dissection type along with the pathological stage. All patients with R1 resection or scheduled for adjuvant treatment with less than a D2 dissection received radiotherapy in addition to chemotherapy. The seventh edition of the American Joint Committee on Cancer tumor, node, metastasis (TNM) classification was used for staging patients based on the information obtained from the pathological and radiological evaluation. The patients were eligible if they had histopathologically confirmed, curatively operated gastric cancer. The presence of metastatic or unresectable disease around the time of diagnosis or operation was the main exclusion criteria. Post-operative surveillance after curative surgery was conducted through imaging procedures and serum tumor markers. Follow-up evaluations were done every three months in the initial two years after surgery, then every six months between the years three and five, and repeated at yearly intervals thereafter. PTK-7 evaluation Surgically removed tumor tissue specimens were received and examined by two independent pathologists at the pathology department of our institution. PTK-7 expression status was assessed according to the manufacturer's instructions of the kit. During immunohistochemical processing, three-micron slices were prepared from paraffin blocks and deparaffinized at 60 °C in an autoclave. Slides were labeled for the assay, and placed into the device (Leica Bond Max, serial no: M21284, Made in Melbourne Australia). Then, slides were placed into 5% hydrogen peroxide to block endogenous peroxide. Slides were incubated in monoclonal antibody CCK4 (ABCAM, LOT: GR170083-1, 1/500; England) and the Universal DAB kit, for 30 minutes. A postprimary antibody, polymer solution, and DAB mixtures (Leica Lot 11776) were applied for 10 minutes, respectively. Contrast staining was done with Mayer hematoxylin, and slides were closed with covering material. We stratified PTK-7 expression, in line with the descriptive method in a previously performed study by Lin et al., on a scale ranging from -to +++ according to the extent of stained tumor cells. Expression in >50% of tumor cells corresponds to +++ score, while 0% expression corresponds to a negative result. A ++ score was defined as expression between 20%-50%, + score as expression between 10%-20% and +/− score as expression in <10% of tumor cells (Figures 1 and 2). Estimated scores were then categorized into 2 groups, one being + (positive); including +, ++, and +++ scores, another was-(negative); including-and +/− scores. Statistical analysis The characteristics of patients were evaluated with descriptive analysis. A Chi-squared test and Fisher's exact test were used to compare the clinicopathological features between PTK-7 positive and negative subgroups. Overall survival (OS) was defined as the time from curative operation to death from any cause or to the last follow-up evaluation. Disease-free survival (DFS) was defined as the time between the curative operation and the earliest date of disease recurrence, death, or last follow-up. Patients who were lost to follow-up were censored at the last date they were known to be alive. Survival curves were estimated by the Kaplan-Meier method and compared across groups with the use of the log-rank test. We used a Cox proportional hazards model for the analysis of covariates as prognostic factors. A univariate analysis was performed initially. The following parameters were studied: PTK-7 expression, Eastern Cooperative Oncology Group (ECOG) performance status, TNM stage, T stage, gender, age, grade, tumor size, histopathology, resection type, resection margin, perineural invasion, vascular invasion, and lymph node status. The independent impact of PTK-7 overexpression on the OS was evaluated using a multivariate Cox regression model adjusted for statistically significant prognostic factors. All variables were entered into the model and then removed by backward stepwise selection. The primary outcome was mortality. We calculated the effect size as 0.67 using a prediction of a 30% difference in mortality between the PTK-7 positive and negative groups according to a pilot test conducted before the study. group was estimated to be required to provide a power of 80% at a significance level of =0.05. All statistical analyses were carried out using SPSS 17.0 version (IBM Corp., Armonk, NY, USA). A p-value below 0.05 was considered to indicate statistical significance. RESULTS A total of 114 patients were included in this study. The baseline characteristics of the patients are detailed in Table 1. The median age was 62 years (range, 28-87 years). There were 45 females and 69 males. The primary tumor site was the antrum in 56.1% of patients. In all, 107 patients (93.9%) had adenocarcinoma, five patients (4.4%) had poorly cohesive carcinoma, signet ring cell subtype, and two patients (1.8%) had mucinous carcinoma. The resection margin status was R0 in 101 patients (88.6%) and R1 in 13 patients (11.4%). Fifty-three patients (46%) underwent D1 dissection and 61 patients (54%) underwent D2 dissection. All patients with R1 resection, or those scheduled for adjuvant treatment with less than a D2 dissection, received radiotherapy in addition to chemotherapy. Approximately 55% of patients were diagnosed with stage III cancer, whereas those with stage II and stage I accounted for 36.8% and 8.8% of the total, respectively. PTK-7 expression was present in 66.7% of the surgical tumor specimens. The association of PTK-7 expression with clinicopathological variables is summarized in Table 2. There was no statistically significant difference in almost all relevant parameters between the PTK-7 positive and negative groups. Only the resection type differed; compared with PTK-7 positive tumors, a significantly higher proportion of PTK-7 negative tumors underwent total gastrectomy (p=0.017). In the PTK-7 positive and the PTK-7 negative groups, median follow-up times were 28 and 17 months, respectively. During follow-up, 43 patients (37.7%) had recurrent disease. The estimated median survival in the PTK-7 positive group was significantly better than the PTK-7 negative group (60 vs 22 months, p<0.001). Likewise, DFS was found to be 55 months in the PTK-7 positive group, whereas it was 21 months in the PTK-7 negative group (p=0.015). DFS and OS analyses are presented in Figures 3 and 4 Table 3. DISCUSSION Understanding the biologic processes that promote and sustain cancer is critical. Thus, the discovery of new targets will lead to the development of individualized management of patients. We sought to determine the potential impact of PTK-7 expression levels, on gastric cancer outcomes. Our data demonstrated significantly longer DFS and OS durations with PTK-7 positive tumor specimens of patients who underwent resection with curative intent of their gastric cancer. PTK-7, a component of a complex signaling network of the wnt pathway that is considered to be dysregulated in various types of cancer, was found to be highly overexpressed in tumor specimens compared with normal tissue samples in most published data (16,. However, little consistency was found across the studies regarding the role of PTK-7 in oncologic outcomes, with some suggesting a poor prognosis, whereas others, proposing a better outcome for expression positive tumors. The presence of PTK-7 expression portends a worse prognosis in many series. Jin et al. reported that the overexpression of PTK-7 was associated with poor DFS and OS in intrahepatic cholangiocarcinoma, and the expression was highly restricted to tumor samples rather than normal bile duct tissue. In another study examining PTK-7 expression in both primary breast tumors and their lymph node metastases, expression positivity in lymph node metastasis was significantly associated with shorter DFS. Moreover, PTK-7 expression was correlated with the triplenegative phenotype, further supporting its adverse impact on breast cancer behavior. In a more recent study, Dong et al. observed that PTK-7 expression was positively correlated with lymph node metastasis, TNM stage, and grade in oral tongue squamous cell carcinoma. Patients with high expression had a poor OS compared with negative and weak expression defined on a 0 to +3 scale. In a retrospective study involving 180 patients with prostate cancer, the authors revealed that elevated PTK-7 expression was significantly associated with lymph node metastases, seminal vesicle invasion, prostate cancer stage, the higher preoperative prostate-specific antigen, the higher Gleason score, angiolymphatic invasion, and biochemical recurrence. Lhoumeau et al. confirmed the adverse prognostic effect of PTK-7 overexpression, finding out a significant association with reduced metastasisfree survival in non-metastatic patients with colorectal cancer. However, expression was not found to be associated with any specific clinical or pathological features, including age, tumor size, lymph node involvement, stage, lymphovascular invasion, colloid mucous component, and differentiation grade. In a very recent study, investigating the prognostic role of the PTK-7 in 85 patients diagnosed with cervical carcinoma, overexpression of PTK-7 was associated with malignant clinicopathological features, suggesting shorter progression-free survival. Contrary to previous studies, however, in our study, the median OS for the PTK-7 positive tumors was 60 months compared with 22 months for PTK-7 negative cases. A recent trial, including 209 surgically resected colorectal cancer patients, has come to the same conclusion. The PTK-7 expression rate was found to be 68.3%, which closely resembled our findings of 66.7%. The authors reported that negative PTK-7 expression was associated with poor differentiation, lymph node metastasis, and advanced TNM stage. PTK-7 expression was correlated with longer survival time. As such, in a multivariate analysis, PTK-7 expression, along with vascular invasion, was found to be an independent variable of OS. We failed to demonstrate the correlation of PTK-7 expression with established clinicopathological determinants of prognosis. Our small patient population could be a possible explanation for this outcome. Lin et al. performed a retrospective study in 201 patients diagnosed with stage I-IV gastric cancer. PTK-7 expression was noted in 56.7% of patients and was stronger in cancer tissue than in matched non-cancerous mucosa. PTK-7 was found to be correlated with well-differentiated tumors and was associated with improved DFS and OS. Stage, grade, lymphovascular invasion, hepatic metastasis, and radical resection were the other independent parameters of OS. They did not include performance status in the Cox regression analysis. In our study, we identified the ECOG PS as having prognostic relevance for OS time in addition to PTK-7 expression and stage. In the subgroup analysis of their trial, in stage IV patients, positive PTK-7 expression did not show favorable OS and DFS. We focused only on patients with non-metastatic tumors at diagnosis to avoid a heterogeneous population, which is a source of potential confounding bias. In this regard, we excluded tumors that were diagnosed as stage IV at the time of operation. The prognostic significance of PTK-7 expression in many cancers has not been settled. One proposed explanation for this is the role There are some limitations to this study. First, the study was retrospective and, therefore, subject to possible selection bias. Second, we could not address whether PTK-7 expression in tumor tissue was higher than in normal mucosa as it was shown in most previous studies. Last is the sample size was relatively modest. In conclusion, the observation that PTK-7 status is independently associated with survival in gastric cancer patients supports the importance of it as a determinant of gastric tumor behavior. Current published data are promising, but the results still have not been translated into clinical practice. It would be useful to include the expression of PTK-7 in models predicting gastric cancer survival and to use the current clinicopathological system as a general guide in conjunction with the molecular stratification when treatment decisions are made.
|
Toronto, like most major cities, is not at a loss for pop-up installations made with Instagram in mind – though not all experiences are created equal. Starting March 28, 30 clear, frameless and heated glass domes – like life-sized terrariums – are available to rent, with space for 4 - 6 diners inside each dome located at The Bentway.
Once in the dome, guests will be served a three-course, locally sourced meal designed by Chef Rene Rodriguez, Top Chef Canada Season 4 winner. Fun fact: He won Iron Chef against Bobby Flay in 2016 and Iron Chef Canada Challenger in 2018.
Guests will get to select from three choices off a blind menu: meat, fish or vegan. Steve Georgiev, event organizer of Dinner With a View tells me the blind menu is to create an element of surprise and to be able to cater to the approximately 12,000 guests expected to dine for the events 30 day stint.
The attraction of one-time only type of experiences in our social media day and age is obvious. Not only do you get the benefit of being a part of something that few others are, you also get to shout it from the rooftops and have the photos to show. When everyone and their mom is a tastemaker these days, this is a becoming element, making you seem in the know, connected and on trend.
But more than just a photo-op, pop-up installations such as Dinner with a View, or last fall’s Happy Place, allow you to experience unique, unlikely settings acting as a backdrop to connect with friends or family in a day and age where no one seems to have any time to meet up IRL, when you can just connect and catch up via Facetime, text or through sliding into one another’s DMs.
The nature of pop-ups only being available for a limited time — and in some cases — while reservations last, is that it puts pressure on people to actually commit and keep plans.
You are less likely to bail on plans when you’ve paid money in advance and are in an intimate setting, unlike booking an easy to cancel reservation at a restaurant that will likely still be there tomorrow.
Deciding where to go with a group of friends can be such a production – like choosing what to watch on Netflix. When one-off opportunities like this arise, it’s almost like you’re guaranteed a stress-free eve. The caliber of this event makes it as if you’re going to a dinner party, but no one has to worry about organizing, the meal, décor and design, all you have to do is show up and everything is set to roll out smoothly. And you can show up empty handed without having to pay any bills, since you pay for your ticket in advance.
Georgiev tells me why he decided to go a pop-up route. “Just like a travelling show, people can only attend it for a limited time, which makes it an experience they don’t want to miss. A pop-up makes an event more desirable versus if we were to do this on an ongoing basis. It’s cool to be able to pick up and move locations and transport this event across Canada and beyond. It can be different every year, the possibilities are truly endless here,” says Georgiev.
The idea came about when Georgiev noticed an opportunity in the market. “Yes you can go to an amazing restaurant and have great food, but going to a restaurant is not a new experience itself. You can also go to a food festival but those, in general, are not high end. We wanted to be able to provide a luxurious experience that was above and beyond food,” says Georgiev.
So what else does said experience entail? Let’s back up a second to the terrarium theme, which caught my attention because of how strange, yet original, it is. “The food we offer is inspired by different world cuisines, and our domes bring to life a truly unique and lively, earthy environment. Our food comes from the earth, and the terrariums are inspired by greenhouses and plants, so this really goes perfectly. We also thought this would be an elegant and chic way to present the domes,” says Georgiev.
There’s also moments curated to be photographed, like an outlook point when you enter the main area that allows you to capture all 30 domes.
Dinner with a View runs from March 28 to May 2 at The Bentway. Reservations must be made in advance at dinnerwithaview.ca and start at $149 to rent the dome, and an additional $99 per person for the meal.
|
<filename>PlayerDetailDialog.cpp
#include "PlayerDetailDialog.h"
#include "ui_PlayerDetailDialog.h"
#include "Player.h"
PlayerDetailDialog::PlayerDetailDialog(const Player *player, QWidget *parent) :
QDialog(parent),
ui(new Ui::PlayerDetailDialog)
{
ui->setupUi(this);
init(player);
}
PlayerDetailDialog::~PlayerDetailDialog()
{
delete ui;
}
void PlayerDetailDialog::init(const Player *player)
{
if( player == NULL ) { return; }
ui->labelName->setText(player->name());
uint appearances = player->matchCount();
uint goals = 0;
uint assists = 0;
QList<QDate> dates = player->matchDates();
QDate date;
while( dates.count() > 0 ) {
date = dates.takeFirst();
goals += player->data(date, PlayDataItem::itemGoal).toUInt();
assists += player->data(date, PlayDataItem::itemAssist).toUInt();
}
ui->labelAppearancesVal->setText(QString::number(appearances));
ui->labelGoalsVal->setText(QString::number(goals));
ui->labelAssistsVal->setText(QString::number(assists));
double goalAverage = goals;
double assistAverage = assists;
if( goalAverage != 0 && appearances != 0 ) {
goalAverage /= appearances;
}
if( assistAverage != 0 && appearances != 0 ) {
assistAverage /= appearances;
}
ui->labelGoalAverageVal->setText(QString::number(goalAverage, 'f', 2));
ui->labelAssistAverageVal->setText(QString::number(assistAverage, 'f', 2));
}
|
/**
* Simple data structure that holds information about checkins processing during submission.
*/
public class CheckinsStorageResult {
private final int numberOfFilteredCheckins;
private final int numberOfSavedCheckins;
/**
* Creates an instance.
*
* @param numberOfFilteredCheckins Total number of checkins which were filtered.
* @param numberOfSavedCheckins Total number of checkins stored in the db.
*/
public CheckinsStorageResult(int numberOfFilteredCheckins, int numberOfSavedCheckins) {
this.numberOfFilteredCheckins = numberOfFilteredCheckins;
this.numberOfSavedCheckins = numberOfSavedCheckins;
}
public int getNumberOfFilteredCheckins() {
return numberOfFilteredCheckins;
}
public int getNumberOfSavedCheckins() {
return numberOfSavedCheckins;
}
/**
* Creates a new updated CheckinsStorageResult that contains the summed values of both this & other.
*
* @param other CheckinsStorageResult with numberOfFilteredCheckins & numberOfSavedCheckins to be added.
* @return updated CheckinsStorageResult.
*/
public CheckinsStorageResult update(CheckinsStorageResult other) {
return new CheckinsStorageResult(this.getNumberOfFilteredCheckins()
+ other.getNumberOfFilteredCheckins(), this.getNumberOfSavedCheckins()
+ other.getNumberOfSavedCheckins());
}
}
|
<gh_stars>1-10
#include "vec3.h"
#include <cmath>
using namespace math;
Vec3::Vec3()
:
x(0), y(0), z(0)
{}
Vec3::Vec3(float x, float y, float z)
:
x(x), y(y), z(z)
{}
float Vec3::mag() const {
return std::sqrt(x * x + y * y + z * z);
}
Vec3 Vec3::operator + (const Vec3& other) const {
return Vec3(x + other.x, y + other.y, z + other.z);
}
Vec3& Vec3::operator += (const Vec3& other) {
x += other.x;
y += other.y;
z += other.z;
return *this;
}
Vec3 Vec3::operator * (float k) const {
return Vec3(x * k, y * k, z * k);
}
Vec3& Vec3::operator *= (float k) {
x *= k;
y *= k;
z *= k;
return *this;
}
Vec3 Vec3::normalized() const {
float m = mag();
return Vec3(x / m, y / m, z / m);
}
void Vec3::normalize() {
float m = mag();
x = x / m;
y = y / m;
z = z / m;
}
std::ostream& math::operator << (std::ostream& o, const Vec3& vec) {
o << "(" << vec.x << "," << vec.y << "," << vec.z << ")";
return o;
}
Vec3 Vec3::operator - (const Vec3& other) const {
return Vec3(x - other.x, y - other.y, z - other.z);
}
Vec3 Vec3::cross(const Vec3& a, const Vec3& b) {
return Vec3(a.y * b.z - a.z * b.y, a.z * b.x - a.x * b.z, a.x * b.y - a.y * b.x);
}
float Vec3::dot(const Vec3& a, const Vec3& b) {
return (a.x * b.x) + (a.y * b.y) + (a.z * b.z);
}
|
Republican presidential candidate, Sen. Ted Cruz, R-Texas speaks to the media about events in Brussels, Tuesday, March 22, 2016, near the Capitol in Washington. Cruz said he would use the "full force and fury" of the U.S. military to defeat the Islamic State group.
In the wake of Tuesday’s attacks in Brussels, Republican presidential candidate Ted Cruz called for increased surveillance of American Muslims. “We need to empower law enforcement to patrol and secure Muslim neighborhoods before they become radicalized,” the U.S. senator from Texas said.
The Chicago Police Department declined to comment on whether it has the resources to heed Cruz’s call, or whether the proposal would be effective in preventing attacks from happening in Chicago. The department did seek to reassure the public in the wake of the Brussels explosions that there is no reason to believe a similar attack is planned for Chicago. “However we prepare and have deployments in place to safeguard critical infrastructure,” said CPD spokesman Anthony Gugliemi.
|
package gov.va.escreening.repository;
import gov.va.escreening.entity.Survey;
import java.util.List;
import javax.persistence.TypedQuery;
import org.slf4j.Logger;
import org.slf4j.LoggerFactory;
import org.springframework.stereotype.Repository;
@Repository
public class SurveyRepositoryImpl extends AbstractHibernateRepository<Survey>
implements SurveyRepository {
private static final Logger logger = LoggerFactory.getLogger(SurveyRepositoryImpl.class);
public SurveyRepositoryImpl() {
super();
setClazz(Survey.class);
}
@Override
public List<Survey> getRequiredSurveys() {
logger.trace("in getRequiredSurveys()");
String sql = "SELECT s FROM Survey s JOIN s.surveySection ss WHERE ss.surveySectionId = :surveySectionId AND s.isPublished = true ORDER BY s.displayOrderForSection";
TypedQuery<Survey> query = entityManager.createQuery(sql, Survey.class);
query.setParameter("surveySectionId", 1);
List<Survey> requiredSurveys = query.getResultList();
return requiredSurveys;
}
@Override
public List<Survey> findForVeteranAssessmentId(int veteranAssessmentId) {
logger.trace("in findForVeteranAssessmentId()");
//TODO: This might have to be ordered by s.displayOrderForSection
String sql = "SELECT s FROM Survey s JOIN s.surveySection ss WHERE s.surveyId IN (SELECT s2.surveyId FROM VeteranAssessment va JOIN va.veteranAssessmentSurveyList vas JOIN vas.survey s2 WHERE va.veteranAssessmentId = :veteranAssessmentId) ORDER BY ss.displayOrder";
TypedQuery<Survey> query = entityManager.createQuery(sql, Survey.class);
query.setParameter("veteranAssessmentId", veteranAssessmentId);
List<Survey> resultList = query.getResultList();
return resultList;
}
@Override
public List<Survey> getSurveyList() {
String sql = "SELECT s FROM Survey s JOIN s.surveySection ss ORDER BY s.name";
TypedQuery<Survey> query = entityManager.createQuery(sql, Survey.class);
return query.getResultList();
}
@Override
public List<Survey> getMhaSurveyList()
{
String sql = "From Survey s where s.hasMha='1'";
TypedQuery<Survey> query = entityManager.createQuery(sql, Survey.class);
return query.getResultList();
}
@Override
public List<Survey> findByTemplateId(Integer templateId) {
String sql = "SELECT s From Survey s JOIN s.templates t where t.templateId = :templateId";
TypedQuery<Survey> query = entityManager.createQuery(sql, Survey.class);
query.setParameter("templateId", templateId);
return query.getResultList();
}
@Override
public List<Survey> getSurveyListByIds(List<Integer> surveyIdList) {
String sql = "From Survey s where s.id in (:ids)";
TypedQuery<Survey> query = entityManager.createQuery(sql, Survey.class);
query.setParameter("ids", surveyIdList);
return query.getResultList();
}
}
|
Endometriosis how should we classify? In recent years, interest in the diagnosis and treatment of endometriosis has increased significantly. This is partly due to the activities of clinicians, researchers and medical societies, in addition to the increasing public awareness of this disease. Endometriosis not only causes chronic pain, but is also associated with subfertility and possibly multiple diseases. This enigmatic disease is still unclear in its etiology, pathogenesis, and progression. The number of publications has remarkably increased studying many aspects but the progress in fully understanding this disease has remained rather slow. One of the major obstacles is that no standard classification has yet been developed at a global scale. Classification and reporting systems are important not only for appropriate diagnosis and treatment of the disease, but also for a unified system to investigate the disease. Over the past decades several classifications, staging, and reporting systems have been developed in the field of endometriosis but remained controversial. The World Endometriosis Society (WES) has published an international consensus proposing that if classification has a benefit for women suffering from the disease with the informed counseling of health care providers, then it can form a bridge between diagnosing a woman with endometriosis and enabling her the most successful treatment possible based on her symptoms and physical disease present. This paper also pointed out that the classification systems solely rely on surgical findings with inadequate predictive value for outcomes, important to women. The description of the disease does not correlate well with symptoms and infertility. A more recent publication summarized and evaluated all 22 classifications published in the literature. This paper provides a historical overview of these different systems. All relevant publications have been considered, such as rASRM and some more recent classifications as well as recording systems for phenotypic information. This review undertaken by the international working group of AAGL, ESGE, ESHRE, and WES led to the conclusion that there is no international agreement on how to describe or classify endometriosis. Several comments have been recently stimulated to further discuss the right approach to the use of classification systems. Further important developments will be required to allow for individualized care by identifying molecular markers as it is the case for routine profiling of breast cancer. This will allow a better characterization of the disease as well as for the prediction of treatments and prognosis. In order to achieve this goal a uniform classification system is one of the basic requirements for future patient care and research in this field. Disclosure statement
|
According to the Church Times, the Primates’ first responses to the Archbishop of Canterbury’s invitation to meet next January “vary from the enthusiastic to the heavily caveated.” So far, no one has said “no.”
Church Times:
Despite the Archbishop’s unexpected decision to invite a representative of the Anglican Church in North America (ACNA), the Episcopal Church confirmed that the Rt Revd Michael Curry, who is due to succeed Dr Katharine Jefferts Schori as Presiding Bishop, would attend.
The Primate of the Anglican Church of Canada, the Most Revd Archbishop Fred Hiltz, welcomed the meeting as “a good thing”. Speaking on Tuesday, he described the decision to invite ACNA — it is understood that the representative will be present for one day, before the formal meeting gets under way — as “an opportunity for some conversation, in the ultimate hope that we might be able to find a way forward towards reconciliation”.
US bishops also welcomed the Archbishop’s initiative, despite reservations. “I hope that all will be in attendance, and participate fully,” the Bishop of Vermont, the Rt Revd Thomas C. Ely, said. “It is not clear to me the reasoning behind inviting other guests who are not Primates of the Anglican Communion to this meeting, especially since this is the first meeting of the Primates in quite some time.
“Clearly the Archbishop, with his wider perspective on things, thinks this is a good idea, and so I trust his judgement.”
|
<filename>app.py
#!/usr/bin/python
from flask import *
from make_html import make_html
from storedata import *
from random import choice
app = Flask(__name__)
@app.route("/", methods = ['GET','POST'])
def index():
if request.method == 'GET':
return render_template('index.html')
if request.method == 'POST':
count = request.form['count']
query = request.form['query']
#if int(count) == 1:
# username = request.form['name']
# if username == "" or username == "Album search (Leave blank for random album.)":
# data = readJson()
# username = choice(data)
# storeVar(username)
# else:
# pass
#else:
# if os.path.exists('userdata.p'):
# username = loadVar()
# else:
# username = request.form['name']
#print username
#if int(count) == 7:
# removePickle()
return make_html(query, int(count))
if __name__ == "__main__":
app.run(debug = True)
|
The Russian Ministry of Telecom and Mass Communications has announced a plan to replace proprietary software with open source and locally produced software. The plan is one of the measures aimed at promoting sustainable economic development and social stability announced earlier this year.
The plan consists of three parts, each containing key activities and stages for their implementation. The first section states a preference for Russian products when procuring software for government needs. Public agencies will specifically look for local solutions providing business applications, antivirus software, information security software and internet servers now deployed in business environments. The current draft decree will be submitted for consideration to the Government of the Russian Federation next month.
Open source development
The second part of the plan calls for support for the joint development of software for which no Russian solution is available, i.e. client and mobile operating systems, server operating systems, database management systems, cloud and virtualisation software, and office productivity software. The Russian Linux distribution Alt Linux and the Windows-compatible operating system ReactOS have already been selected.
The Ministry, local IT companies and inter-branch organisations are working on a draft decree to set up an autonomous non-commercial agency that will be responsible for the joint development of software for which the Russian Federation is currently highly dependent on foreign countries. The agency will provide a development roadmap for the next ten years.
To accomplish their goals, the Russian Federation aims to cooperate and share development costs with the other BRICS countries. According to the Ministry, Brazil, India, China and South-Africa have already expressed their support for this "demonopolisation" initiative. The relevant ministers of the five countries will meet and discuss their plans on July 9-10 in Ufa, the capital city of the Russian Republic of Bashkortostan.
Industry-specific software
The third part of the Russian plan calls for financial support for local, Russian developers creating industry-specific software for the production sector, fuel and energy industry, construction, health care, and the financial and transport sectors. These 'smart investments' will be financed by Rosinfokominvest, the state fund for telecommunications and IT projects. The corresponding decree was submitted to the Federal Government earlier this month.
Federal government agencies
In December 2010, Russia's then Prime Minister Vladimir Putin instructed the federal government agencies to switch to open source software by 2015. His 'plan for the transition of federal executive bodies and agencies to free software' included the creation of a federal support centre and an open source software repository.
|
def IsDeadlineExceededError(error):
return type(error).__name__ == 'DeadlineExceededError'
|
The video will start in 8 Cancel
Get the biggest Weekday Swansea City FC stories by email Subscribe Thank you for subscribing We have more newsletters Show me See our privacy notice Could not subscribe, try again later Invalid Email
Video courtesy of Jonathan Rees @JonnyReesx
He's done it again.
Lee Trundle scored a double hat trick for a Swansea City All Stars team on Sunday, including this ridiculously cheeky penalty that foxed everyone.
Now 40, Trundle has been plying his trade for Welsh Division Two side Llanelli Town, where he has been banging in the goals this season.
And he continued his goalscoring exploits for the All Stars against a Briton Ferry Llansawel over 35s team at the Old Road ground.
The game was being played to raise money for Carolyn Gammon, a local woman who is suffering from breast cancer.
And Trundle made sure he put on a sensational show with six goals to secure an emphatic 11-4 victory for the All Stars.
It is not the first time Trundle has scored a hatful of goals this season. He scored a seven-minute hat-trick for Llanelli in October and seven goals across two games in the same weekend a fortnight earlier.
That after an incredible stoppage time hat trick on his Llanelli debut. He might be the wrong side of 40, but Trundle doesn't look like slowing down anytime soon.
|
// CreateServer creates a `Server` instance
func CreateServer(ctx context.Context, factory msgstream.Factory, opts ...Option) *Server {
rand.Seed(time.Now().UnixNano())
s := &Server{
ctx: ctx,
quitCh: make(chan struct{}),
msFactory: factory,
flushCh: make(chan UniqueID, 1024),
dataNodeCreator: defaultDataNodeCreatorFunc,
rootCoordClientCreator: defaultRootCoordCreatorFunc,
helper: defaultServerHelper(),
metricsCacheManager: metricsinfo.NewMetricsCacheManager(),
}
for _, opt := range opts {
opt(s)
}
return s
}
|
Metabolite Profiling in the Pursuit of Biomarkers for IVF Outcome: The Case for Metabolomics Studies Background. This paper presents the literature on biomarkers of in vitro fertilisation (IVF) outcome, demonstrating the progression of these studies towards metabolite profiling, specifically metabolomics. The need for more, and improved, metabolomics studies in the field of assisted conception is discussed. Methods. Searches were performed on ISI Web of Knowledge SM for literature associated with biomarkers of oocyte and embryo quality, and biomarkers of IVF outcome in embryo culture medium, follicular fluid (FF), and blood plasma in female mammals. Results. Metabolomics in the field of female reproduction is still in its infancy. Metabolomics investigations of embryo culture medium for embryo selection have been the most common, but only within the last five years. Only in 2012 has the first metabolomics investigation of FF for biomarkers of oocyte quality been reported. The only metabolomics studies of human blood plasma in this context have been aimed at identifying women with polycystic ovary syndrome (PCOS). Conclusions. Metabolomics is becoming more established in the field of assisted conception, but the studies performed so far have been preliminary and not all potential applications have yet been explored. With further improved metabolomics studies, the possibility of identifying a method for predicting IVF outcome may become a reality. Introduction Infertility is an extremely prevalent problem, affecting one in every seven couples, and as result in vitro fertilisation (IVF) has become increasingly popular since it was pioneered in 1978. In 2010, 45 264 women were treated by IVF in the UK, whereas in 1992, 14 057 women were treated. As understanding of fertility and embryology has developed, the procedures and techniques in assisted conception have been ever improving, and as a result, the number of live births resulting from IVF or ICSI has increased since the early 90s. e UK live birth rate per IVF cycle in 1991 was 14.0% and this increased to 24.1% by 2009. In 2009 the live birth rate per ART treatment in Canada was higher, at 27.4% and higher still in the USA at 31% but lower in Australia and New Zealand at 17.2%. While improved, these success rates are still unsatisfactorily low. e development of controlled ovarian stimulation in the 1980s enabled the production of multiple mature oocytes and hence multiple embryo transfer, improving the chances of pregnancy in an IVF cycle. Today, gonadotrophins are routinely administered to women undergoing IVF in an attempt to improve the chances of conception. e drawback to multiple embryo transfer, however, is that the patient has a greater chance of developing a multiple pregnancy, which carries an increased risk of maternal and infant morbidity. Infants from multiple pregnancies are more likely to suffer late midtrimester miscarriage or have a low birth weight and/or be born prematurely and as a result may require intensive neonatal care facilities and are at greater risk of being born with long term disabilities such as cerebral palsy, deafness, and visual impairment requiring long term support services. e most common maternal complications associated with multiple pregnancies include high blood pressure, preeclampsia, increased likelihood of caesarean section, venous thromboembolism, postpartum haemorrhage, and gestational diabetes. Consequently, multiple births are far more costly to the National Health Service (NHS) than singleton births. A study from 2009 estimated the total cost of preterm births from birth to adult 2 International Journal of Reproductive Medicine life, in the public sector in England and Wales, to be £2.946 billion. is study also reported that 92% of this cost per preterm survivor was due to hospital inpatient services. From 2004, the Human Fertilisation and Embryology Authority (HFEA) policy was to transfer no more than two embryos to women under the age of 40, and no more than three into woman aged 40 or over. Although this resulted in a decrease in rates of triplet births, the occurrence of twins remained high and in 2008, when nearly 24% of all IVF births resulted in multiple pregnancies, the HFEA introduced a policy to bring down the UK IVF multiple birth rate to 10% over a period of several years. To achieve this goal, the HFEA has promoted the transfer of just one embryo for women who have a high chance of becoming pregnant. is is known as "elective single embryo transfer" (eSET). is policy has been adopted in other countries as well. e latest �gures from the HFEA showed that in 2010 the majority of embryo transfers in the UK were double (64.8%) and that just 14.9% were eSET, though this is an improvement from 2008 when only 4.8% of embryo transfers performed were eSET. Just 4.4% were triple embryo transfers to women over 40 (the remaining percentage of transfers were single, but because only one embryo was available, these were not elective). In Canada, in 2009, 13% of embryo transfers were eSET and the majority were double (58%) or triple (22%). In the USA in the same year, rates of eSET were 7.4% for women below 35 years, 2.8% for women between 35 and 40 years, and 0.5% among women older than 40 years. e latest �gures from Europe, in 2008, reported 22.4% of embryo transfers were single, 53.2% were double, and 24.4% were triple or more. However, the highest proportion of eSET is being performed in Australia and New Zealand; in 2009, 69.7% of embryo transfers were single, re�ecting not only the lower multiple birth rate, but also the lower (live) birth rate relative to the other countries. e multiple pregnancy rate in 2010 in the UK was 21.8%. In Canada, the USA, and Australia and New Zealand in 2009, the multiple pregnancy rates were 27.4%, 47.3%, and 8.2%, respectively. In 2008, the multiple pregnancy rate in Europe was 21.7%. us, while multiple embryo transfers remain high, so too is the risk of multiple pregnancies. ere are many factors that dictate the selection of embryo/s for transfer; in the UK this includes limited NHS funding in most areas. It is important to have more con�dence in performing an eSET to ensure that the patient's chances of success are not compromised. While IVF is hampered by poor success rates and the increasing pressure to reduce multiple embryo transfers, a major objective in reproductive medicine currently is to �nd a method for identifying the best embryos for transfer. is will allow for eSET without a compromise in success rates. Furthermore, considering the emotional, health, and �nancial commitments involved in fertility treatment, �nding a reliable method for embryo selection is clearly desirable. erefore a great body of research has been undertaken with aims of identifying biomarkers of oocyte and embryo quality, the majority of which have been targeted analyses; where one class of biological compound is measured and examined for its predictive ability. Such studies are still being performed, but as of yet no de�nitive biomarker to predict IVF outcome has been identi�ed. erefore, studies are required where many classes of compounds can be investigated for predictive ability simultaneously, not only to increase the chance of identifying a marker but also because if single markers cannot be found, it may be that only combinations of biomolecules provide a diagnostic. Furthermore, in reality, a group of biomarkers would be of more clinical value than one alone, since a simultaneous change of several species together adds con�dence and validity to the diagnosis and is less likely to be incidental, as might be the case for a rise or fall in levels of a single metabolite. With these points in mind biomarker research in the �eld of assisted conception is moving in the direction of global metabolite pro�ling, or metabolomics. Metabolomics (akin to metabonomics ) is the nontargeted identi�cation and quanti�cation of all the metabolites in the metabolome, where metabolites are the low molecular weight end products and starting materials of essential cellular reactions, and the metabolome is the complete collection of all the metabolites in an organism. �io�uids, such as blood plasma, perfuse, and are in dynamic equilibrium with cells, therefore by measuring which metabolites are present in the bio�uid and the levels of these metabolites (i.e., the metabolic pro�le of the bio�uid) it may be possible to obtain information about the metabolism within those cells. e presences of metabolites in a bio�uid are oen indicated by identifying the functional groups that exist within the molecular structure of the metabolites, for example, carboxylic acids, ketones, aldehydes, alkenes, or alkynes. Ultimately it may be possible to discriminate between bio�uids from different groups of individuals, for example, diseased versus controls, based on their metabolic pro�les. If it was possible to discriminate between such groups, it may also become possible to classify other, unknown, samples based on their metabolic pro�les, and hence identify biomarkers for certain diseases. Metabolomics can be applied to assisted conception by obtaining and examining the metabolic pro�les of bio�uids associated with oocytes (follicular �uid (FF)) and embryos (culture medium or blastocoele �uid) for biomarkers of oocyte/embryo quality. One of the most common analytical platforms for metabolomics is nuclear magnetic resonance (NMR) spectroscopy, which measures the presence of certain nuclei (most commonly, 1 H) in a sample, producing a spectrum, where the positions of the signals on the -axis (chemical shi in ppm) re�ect the chemical environments of the corresponding nuclei (and hence enable identi�cation of the metabolites), and the intensities of the signals indicate the number of nuclei in the given chemical environment (so the area under the signal gives a measure of the concentration of the metabolite). e second most commonly used platform is mass spectrometry (MS), which offers a much greater sensitivity than NMR (picomolar-femtomolar level versus micromolar level in NMR ). However, NMR has several advantages over MS, including minimal sample preparation, rapid analysis time, and better reproducibility and it is nondestructive to the sample. MS requires that different classes of compound are analysed separately, and therefore is oen coupled to a prechromatography step, which slows down International Journal of Reproductive Medicine 3 analysis time and introduces reproducibility issues. �io�uid samples are analysed using these platforms (and others, e.g., infrared (IR) spectroscopy ) to produce data matrices containing measures of the levels of all the metabolites (columns) in each sample (rows), which are then interrogated using multivariate statistical analyses to identify trends in different groups of samples and the metabolites responsible for those trends. In this way, a biomarker or groups of biomarkers may be identi�ed, and the class memberships of new samples predicted using these models. A number of reviews have appeared over the last seven years highlighting the potential application of metabolomics in female reproduction. ese include reviews speci�c to metabolomics of FF, embryo culture medium, oocytes and their related cells, and the introduction of metabolomics techniques to gynaecologists. e use of NMR spectroscopy alone in understanding the female reproductive tract, including studies of cervical mucus, uterine matter, the pelvis, ovarian tissue, and FF has also been reviewed. e use of 31 P-NMR in studying female reproduction has also been demonstrated. e aim of this paper is to review the progress so far in pursuit of biomarkers for IVF outcome and to highlight the recent progression of this research from targeted metabolite analysis to metabolomics. Materials and Methods Literature searches for publications written in the English language were performed using ISI Web of Knowledge. Key words used for the searches were "embryo quality, " "oocyte quality, " "embryo, " "oocyte, " "follicular �uid, " "blood plasma, " and "female fertility, " which were each paired with the following terms: "biomarker" (and in the case of "biomarker" paired with "embryo, " "oocyte, " "follicular �uid, " or "blood plasma", an additional "IVF outcome" term was included in the search terms), "metabolomics, " and "metabonomics". Animal as well as human studies were included, but papers focused on male subfertility/infertility were excluded, as they were studies on any species other than mammals (e.g., there were many studies on amphibian oocytes which were excluded). Studies on tissue or �uid postembryo transfer were not considered for this paper. Studies involving magnetic resonance imaging (MRI) and NMR microimaging were not considered. No restriction was set for the publication date. Results and Discussion 3.1. Selecting the Best Embryo. Currently, embryos are selected for implantation based on assessments of their morphology and cleavage rates. However, while morphological assessments are quick and inexpensive, they are subjective and limited by a lack of standards and fail to identify genetic or epigenetic defects. A further limitation of this "snapshot" assessment of embryos, which is that the dynamic nature of embryo development can affect its morphology score, has recently been overcome by the development of time-lapse monitoring of embryo development. Meseguer et al. developed a hierarchical model for predicting embryo implantation potential based on various morphokinetic parameters measured by automatic image analyses of incubated human embryos. Most recently, the same group showed that the model was also able to predict embryos most likely to develop to the blastocyst stage. While morphokinetics is becoming the new "gold standard" for determining embryo developmental potential, the methods are still in their infancy and limitations such as the in�uences of different culture media on the morphokinetic behaviour of embryos are still unknown. Clinical markers for embryo quality may overcome some of the limitations of morphological assessments, such as subjectivity, and could be complementary to morphological or morphokinetic assessments. A large body of research has examined embryo metabolism as a predictor for embryo viability. ese studies have analysed the uptake and secretion of various metabolites by the embryo into the surrounding culture medium. Early studies of animal embryos identi�ed an elevated glucose uptake in good quality embryos compared to poorer quality ones. is observation has since been con�rmed in human embryos. Houghton et al. measured the turnover of amino acids by human embryos during culture, and observed that at all stages of embryo development examined, a low amino acid turnover was associated with better development. is �nding was reinforced in a later study by the same group, along with the observation that decreased culture medium levels of glycine and leucine and increased levels of asparagine correlated with clinical pregnancy and live birth. Differences in amino acid turnover between genetically normal and abnormal embryos have also been observed during different stages of culture. Embryo oxygen consumption has also been investigated as a method for assessing embryo quality, particularly in bovines; early studies showed a link between embryo oxygen consumption and embryo morphology. In 2005, Lopes and colleagues developed the Nanorespirometer, which offered a noninvasive and rapid method for measuring embryo respiration rates. Using this method, however, Lopes et al. were unable to �nd a signi�cant difference in respiration rates between bovine embryos which did and did not result in a pregnancy, though respiration rates increased with morphological quality in vivo. Most recently, it has been suggested that monitoring patterns of oxygen consumption in human embryos in culture for up to 72 hours may be informative of embryo viability. In recent years, studies of embryo metabolism have moved away from targeted metabolite analysis and towards metabolomics. e �rst metabolomics study of embryo culture medium to assess oocyte potential was carried out using near infrared (NIR) and Raman spectroscopy by Seli et al. in 2007. A multilinear regression algorithm was used to �nd the spectral regions that differed between embryos that implanted and led to a pregnancy and those which failed to implant, and viability scores calculated for each embryo. Higher values of viability scores were associated with live birth. e validity of Seli and colleagues' scoring system was tested in a blinded trial, in which Raman spectra of spent culture media from human embryos cultured at a different IVF centre and under some different conditions to those used by Seli et al. were analysed. Again viability scores were signi�cantly higher in embryos which implanted compared to those that did not. Subsequently, larger scale studies have been conducted using similar analyses on NIR spectra from embryos undergoing transfer on various days of culture and have consistently shown higher viability scores for those that implanted and led to a pregnancy with foetal heart activity. is algorithm generated using fresh embryos has also been shown to be predictive of viability of frozen-thawed embryos. One study found the viability score to be more effective, either alone or in combination with morphologic assessment, than morphology alone in predicting embryo quality in women undergoing single embryo transfer on day 5 of culture. More recently however, a single-centre randomized controlled trial showed no difference in pregnancy rate for single embryo transfers with embryo selection based on NIR analysis and morphological assessments compared to using morphology alone. Marhuenda-Egea et al. have used high performance liquid chromatography (HPLC)-MS-and 1 H-NMR-based metabolomics to identify differences in culture media from embryos with and without pregnancy. e group used so independent modelling of class analogy (SIMCA) to classify samples as "pregnancy" or "nonpregnancy embryos" based on amino acid concentrations determined from the HPLC-MS analysis. e authors postulated that all embryo culture medium amino acids played a crucial role in the embryo metabolism. For the NMR data, interval partial least squares (iPLS) analysis was used to identify the lipid region (0.5-1.2 ppm) as giving the best correlation with embryo pregnancy rate. Recently a HPLC-MS-based metabolomic approach to examining blastocoele �uid (a �uid withdrawn from a blastocyst cavity prior to cryostorage) for markers of embryo quality has been described. Although the studies described above have indicated that metabolic differences between embryos may be indicative of their potential to result in a pregnancy, the application of culture medium analysis has remained limited in the clinical setting. In the cases of targeted metabolite studies, the technologies used tend to require costly equipment and technical expertise and do not produce results rapidly enough for embryos to be assessed in time for transfer. Metabolomics also requires expensive equipment, such as spectrometers and chromatography systems, and specialist skills to perform the compositional and statistical analyses. However, because the analysis is global, metabolomics has the potential to identify several biomarkers simultaneously, making it more time and cost effective than performing several separate targeted analyses. Furthermore, the analysis of whole bio�uids or tissue is more rapid because preseparation steps to isolate single metabolites are not required and the compositional analysis itself is usually high throughput. Aer initial capital outlay, individual tests are inexpensive, unlike assays. Ultimately, the goal of metabolomics is to generate a model, such as a scoring system, for example, in which new observations can be entered and their class memberships predicted. erefore, eventually specialised knowledge may not be required, only the means of obtaining the compositional data. Furthermore, if a single or small number of biomarkers are identi�ed, it may be possible to develop more simple, rapid, and affordable "pin prick" tests or assays that could be performed in an embryology laboratory. While metabolomics studies of embryo culture media are still relatively new and are still in the validation process, one reason why they have not yet taken off may be because they have been somewhat limited in terms of the range of culture media and days of embryo transfer investigated. In practice, IVF clinics use many types of culture media, use different volumes of media, and have variable policies/preferences regarding the optimum day for embryo transfer, and so it is uncertain whether the biomarkers and viability scores found thus far are generally applicable. Selecting the Best Oocyte. An alternative approach to predicting the likelihood of pregnancy following IVF is to assess oocyte quality and to determine the best oocyte for fertilisation. Oocyte selection has the additional advantages of limiting embryo overproduction (which has ethical and storage implications) and improving the outcome of oocyte cryostorage programs. Some methods for determining oocyte quality already exist, primarily involving studies of oocyte morphology; speci�cally of the cumulus-oocyte complex (CoC), cytoplasm, polar body, and/or meiotic spindle, as well as the follicle itself. ese methods, however, tend to be more efficient for identifying oocytes of poor quality rather than good, and so while it is easy to rule certain oocytes out, it is more difficult to determine which is the best "good oocyte". Furthermore, the results of morphology studies have been very con�icting due to the large sub�ectivity and inaccuracy of these methods. For similar reasons it has not been possible to investigate and/or compare treatment regimens for developing oocytes with optimum quality. An alternative line of research has produced studies aimed at �nding cellular predictors of oocyte quality. Cellular predictors of good oocyte quality include a high content of oocyte mitochondrial DNA ; adequate redistribution, differentiation, and transcription of mitochondria ; varying levels of adenosine triphosphate (ATP) in the cytoplasm produced by the oocyte ; and low glucose-6-phosphate dehydrogenase (G6PDH) activity in oocytes. e problem with all of these methods, with the exception of the brilliant cresyl blue staining method used in, however, is that they are invasive and so do not allow preservation of the quality of the oocyte. Noninvasive targeted metabolite analysis of oocytes has been carried out, involving the measurement of energy substrate levels in culture media. Preis et al. used ultramicro�uorimetry to quantify glucose and lactate consumption and release into culture media from mouse oocytes. ey found the oocytes that consumed larger amounts of glucose and produced more lactate had the highest potential for fertilisation. A large body of research on oocyte metabolism has been reported by a group at e University of Leeds. Key studies include an investigation of carbohydrate and oxygen consumption throughout murine oocyte development (via analysis of spent follicular culture media), which revealed higher rates of pyruvate and oxygen consumption during the primary follicle stage than the preovulatory and primordial stages. A similar earlier study found signi�cantly higher rates of glucose consumption and lactate and pyruvate production in in vitro grown murine CoCs than for in vivo ovulated controls. e same group also showed that murine FF, oviductal, and uterine �uid compositions differ from those of murine maturation, fertilization, and embryo culture media, and suggested that this information could be used to create more physiologically accurate oocyte/embryo culture media. Similarly, the carbohydrate and amino acid pro�le of bovine FF was measured to assess the physiological accuracy of bovine maturation medium. It was thought that the nonphysiological nature of the culture media might be in part responsible for the poor developmental competence of bovine oocytes matured in vitro. In another study, oocytes from patients suffering with polycystic ovary syndrome (PCOS) exhibited greater rates of glucose and pyruvate consumption compared to controls. Higher pyruvate turnover was also associated with abnormal oocyte karyotypes. Most recently this group have shown in bovines that oocyte amino acid turnover is predictive of oocyte blastocyst developmental competence using targeted pro�ling of in vitro maturation medium from oocytes prior to fertilisation. Other studies have investigated the respiration rate of oocytes as a marker for oocyte viability; Scott et al. found that human oocytes with respiration rates between 0.48 and 0.55 nL O 2 /h were viable, whereas those with lower rates did not mature or became atretic in vitro. More recently, �ejera et al. con�rmed that oocytes with higher rates of oxygen consumption were those that successfully fertilised and generated implanting embryos. However the same group also showed that oxygen consumption rates varied depending on the gonadotropin stimulation regime used, so care must be taken when comparing oocytes for oxygen consumption and quality. While all of these investigations have been informative, they have not led to suitable methods for developing oocytes with good potential or oocyte selection in clinical practice. A noninvasive, reproducible, and high-throughput method for predicting oocyte quality remains to be discovered. If it was possible to do so, one could also investigate ovarian stimulation regimens to �nd one with the most potential for developing quality oocytes. Studies have promoted the use of lower-dose ovarian stimulation protocols to reduce the risk of aneuploidy in developing oocytes. Other advantages of using milder stimulation are that it is less costly, quicker, and simpler and may be seen as a more natural, "patient-friendly" alternative. is has been recently reviewed ; however both reviews concluded that so far there is insufficient evidence to support the use of mild stimulation protocols over standard protocols at this time. Furthermore, a recent study found mild stimulation reduced pregnancy chances without demonstrating cost advantages. A new "freeze all" policy for embryo transfer is also gaining interest, whereby all embryos from a stimulated cycle are vitri�ed and then the embryo(s) transferred subsequently in a natural cycle. is approach is considered safer than transfer during a stimulated cycle since it may reduce the risk of ovarian hyperstimulation syndrome and the endometrium may be more receptive to embryo implantation compared to when there are a large number of follicles. A large trial ("�lective Vitri�cation of All embryos (�VA)") by Genea in Australia is currently being performed to investigate this. It has also been reported previously that vitrifying and transferring embryos in natural cycles give signi�cantly higher pregnancy rates than for stimulated samples. ���� ��ta�o�i� �ro��in� o� �o��i���ar ���i�� FF provides the microenvironment for the oocyte in the follicle and is therefore a window into the metabolites available to the oocyte during its development and at the time of ovulation, and also the metabolites excreted by the oocyte and the follicular cells. erefore it is not unreasonable to postulate that the composition of FF could be indicative of the quality of the oocyte. Furthermore, FF would be an ideal medium in which to test oocyte quality since it is obtained along with the oocyte during follicular aspiration as part of the standard IVF procedure and is usually discarded. However, it must be noted that human oocytes exhibit high levels of aneuploidy, which would not be detected by FF analysis. ere have been investigations on the predictive value of speci�c characteristics of FF and follicles, such as FF volume, follicle diameter, number of follicles, but thus far, investigations of FF biomarkers of oocyte quality have mainly been targeted molecular analyses, where a selective class of molecules is pro�led. e majority of these studies have been aimed at measuring FF levels of steroid hormones, predominantly progesterone, and oestradiol. Results have been con�icting, with some studies reporting high levels of progesterone or oestradiol to be indicative of good oocyte quality, some reporting high levels of either hormone to be indicative of poorer quality, while other studies have found no correlation between FF progesterone or oestradiol levels and oocyte quality [98,. Similarly, prolactin levels have been found to be positively correlated, negatively correlated, and uncorrelated. Higher levels of FF luteinising hormone (LH) and androstenedione and lower levels of testosterone have been associated with pregnancy; however these �ndings have been contradicted. Other FF hormones such as growth hormone, inhibin B, leptin, angiotensin II, cyclic adenosine monophosphate (cAMP), and anti-Mullerian hormone (AMH) have been found to correlate with oocyte potential, whereas follicle stimulating hormone (FSH) has been found to have no correlation. Cytokines have also been measured in FF and correlated to oocyte quality, but most of the cytokines studied were not found to have predictive value [110,. Other FF peptides and proteins have been investigated as markers of oocyte potential. FF levels of apolipoproteins have been found to vary in young and old IVF patients and so could be implicated in age-related infertility. In terms of targeted analyses of low molecular weight entities, FF levels of metabolites involved in the homocysteine pathway (vitamins B9, B12, and homocysteine), myo-inositol, D-aspartic acid, alanine, and glycine have been found to have predictive value with regard to IVF outcome. at is to say, the FF levels of these metabolites have been found to correlate with various measures of IVF outcome (oocyte/embryo quality and pregnancy rates) and so measuring their levels in FF may have predictive value on IVF outcome. e redox state of FF has also been investigated, revealing a signi�cantly elevated oxidised state in FF from oocytes that degenerated compared to those that were normal. Higher levels of reactive oxygen species (ROS) and lower levels of antioxidants have been found in the FF of women who failed to become pregnant following intracytoplasmic sperm injection (ICSI) compared to those who did. Lower FF levels of nitrates and nitrites, produced from granulosa-synthesised nitric oxide (NO), have been correlated with oocyte maturation, fertilisation, embryo development, and implantation in humans. Furthermore, a correlation between FF NO concentrations and perifollicular blood �ow (PBF) has been found, and a higher PBF is known to be associated with a higher oocyte quality. However, other studies have found no relationship between FF NO and oocyte potential or ovarian response to gonadotrophin stimulation. Targeted studies attempting to identify FF biomarkers of oocyte quality speci�cally in women with PCOS have also been performed, where leptin and homocysteine have been found to have predictive value and AMH does not. e potential of metabolomics to identify FF markers of oocyte quality speci�cally in PCOS IVF patients has also been hypothesised. Metabolite pro�ling studies have been conducted on FF to investigate the effects of diet on oocyte quality. Warzych et al. measured FF levels of fatty acids, using gas chromatography (GC), in pigs fed either a control diet or a diet with elevated fatty acid levels. ey found that diet had a signi�cant in�uence on the fatty acid content of FF and suggested that the alterations in certain fatty acids had a positive impact on oocyte quality. Contradicting this, Sinclair et al. found FF fatty acid composition had no predictive value with regard to oocyte quality in cows. e studies mentioned above have provided a wealth of information, but still no single molecule has been identi�ed in FF as a clinically usable biomarker for oocyte quality or pregnancy outcome. erefore, research into FF biomarkers is also progressing towards metabolomics. Incidentally, an LC-MS-MS proteomics study of human FF has recently been conducted, identifying 246 proteins. us, future studies may also be aimed at identifying protein markers of oocyte quality. Bender et al. have recently used GC-MS-based metabolomics to compare the FF of lactating cows and heifers and found signi�cant differences in 24 fatty acids and 9 water-soluble metabolites. e authors discussed the negative effects of a high FF saturated fatty acid content on oocyte maturation and early embryo development, and since the cows had higher levels of these, it was concluded that the FF composition of cows may place their oocytes at a developmental disadvantage, which may contribute to their lower fertility compared to heifers. GC-MS and multivariate statistical methods have also been used to positively correlate FF contamination levels of endocrine-disrupting chemicals (through industrial exposure) with poor fertilisation and oocyte developmental potential, and to predict these FF levels from corresponding blood serum samples. In 2012, Wallace et al. published the �rst metabolomics study of human FF to assess oocyte viability. Samples collected from patients undergoing stimulated IVF were analysed using 1 H-NMR spectroscopy, and projections to latent structures by means of partial least squaresdiscriminant analysis (PLS-DA) were used to discriminate the metabolic pro�les based on oocyte embryonic development potential and pregnancy test outcome. Lower FF levels of lactate and choline/phosphocholine and higher levels of glucose and high-density lipoproteins (HDL) were associated with oocytes which failed to cleave as an embryo compared to oocytes producing two-cell embryos (though this PLS-DA model was not validated using an external prediction set). In terms of pregnancy test outcome, patients who tested positive were associated with a lower FF level of glucose and higher levels of proline, lactate, leucine, and isoleucine. is study successfully demonstrated the potential of 1 H-NMR-based metabolomics for the analysis of FF from IVF patients and indicated that FF may be predictive of treatment outcome. However the use of patients undergoing twin embryo transfers with a FF sample corresponding to one of the oocytes meant that FF samples could not be linked to singleton pregnancy with con�dence, which highlights the preliminary nature of this research and the need for more studies of this kind. Perhaps the biggest drawback to investigating FF as a predictive medium for IVF outcome is the policy of twin embryo transfers, where, unless a multiple pregnancy arises, it cannot be known which embryo prevailed in the singleton pregnancy and so the FF cannot be linked to the outcome. erefore FF samples need to be obtained from women undergoing eSET, which increases sampling time and reduces cohort sizes dramatically. Furthermore, sampling may be further limited by controlling for women who do not have reproductive diseases which may present unique metabolic pro�les that could interfere with any discrimination between pro�les from good and bad quality oocytes. Similarly, alterations in metabolism due to drugs may also interfere with the analysis, and thus, women should ideally all be on the same IVF drug regime. It has recently been suggested that the composition of FF is altered by ovarian stimulation, therefore it is important to look for biomarkers of oocyte quality in natural FF �rst in order to understand the natural processes involved in infertility. Natural cycle IVF patients, with no drug regime and single embryo transfers, would be ideal subjects to make preliminary models from. However natural cycle treatments are rare, and therefore it would take a long time to acquire a statistically relevant number of samples. A further potential limitation of FF is that it oen becomes contaminated with �ushing medium contained in the dead space of the needle and tubing during the follicular aspiration procedure in IVF or with aspirate of the previous cycle if �ushing is not performed. Flushing medium contains many metabolites naturally found in the FF, including glucose and lactate, and so the levels of metabolites in a �ush contaminated sample will not be representative of the true composition of the FF. Similarly contamination of aspirate with that from the previous follicle will affect �ndings. Recently, we have published a pilot 1 H-NMR-based metabolomic study of FF and blood plasma from modi�ednatural cycle (the patients were only administered human chorionic gonadotrophin (hCG)) IVF patients undergoing treatment for male factor or unexplained infertility, to investigate differences in the composition of both �uids during the menstrual cycle. Due to the nature of these inclusion criteria, it was only possible to collect samples for ten patients, and therefore the representation of treatment outcomes (2 clinical pregnancies, 8 no pregnancy) was too poor to investigate biomarkers for these outcomes. However, by collecting samples from patients twice, at different phases of their menstrual cycles, it was possible to investigate the FF and plasma for changes with menstrual phase. e use of natural cycle patients allowed the FF and plasma metabolic pro�les to be studied without the effects of gonadotropins and reproductive diseases. erefore, this study demonstrates the power of using samples from natural cycle IVF patients with strict inclusion criteria to ensure confounding factors do not bias or mask any trends of interest and the ease with which contamination by �ush media can be accommodated by a spectral subtraction approach. Plasma Composition and Fertility. Since FF is part derived from blood plasma and can exchange metabolites with blood via the blood-follicle barrier, the composition of the plasma may have an in�uence on the quality of the oocyte. Leroy et al. measured several metabolites (glucose, 3hydroxybutyrate (3HB), lactate, urea, total protein, triglycerides, nonesteri�ed fatty acids (NEFA), total cholesterol, and ions) in both the serum and FF of cows with large and small follicles. Signi�cant correlations between serum and FF were observed for chloride, glucose, 3HB, urea, and total protein at all follicle sizes, and for triglycerides, NEFA, and total cholesterol for large follicles. e authors concluded that metabolic changes in serum will be re�ected in the FF and, therefore, could affect oocyte and granulosa cell quality. Blood plasma can be collected relatively noninvasively, compared to FF, and so would be a preferable medium for a test to predict IVF treatment outcome. Furthermore, tests on two different media would provide more con�dence than one alone. e majority of studies into the effects of blood constituents on oocyte viability and fertility have been in cows. Insulin-like growth factor-1 (IGF-1) has been shown to have a bene�cial effect on bovine embryo development in vitro. Velazquez et al. measured blood levels of IGF-1 and several other blood components (insulin, urea, NEFA, 3HB, and cholesterol) in embryo donor and recipient cows, as part of a multiple ovulation and embryo transfer program. Correlations were found between IGF-1, insulin, and cholesterol levels and embryo viability in donor cows, but all three had very weak predictive power. No correlations were found between the hormone or metabolite levels and pregnancy rate in recipient cows. Other hormones, such as 17-oestradiol, and progesterone have been shown to have predictive value of embryo quality in the cow, and embryo quality was enhanced in goats treated with exogenous insulin. Kurykin et al. correlated oocyte morphological quality in repeat breeder and early lactation cows to the levels of several blood constituents (plasma total protein, glucose, total cholesterol, high-density lipoprotein cholesterol, urea, albumin levels, and the activities of aspartate aminotransferase and lactate dehydrogenase). e repeat breeder cows produced a greater number of abnormal oocytes than the early lactation cows, and the abnormal oocytes had higher plasma levels of urea and lower levels of albumin in comparison with the normal oocytes of the repeat breeders and the early lactation cows. In support of this, Ferreira et al. found that cows fed a urea diet had decreased oocyte competence compared to controls. It has been shown that high levels of NEFA in cow plasma, caused by a negative energy balance postpartum, may have a negative impact on fertility through increased levels of NEFA in the FF. In vitro, NEFA has been found to reduce the developmental potential of bovine oocytes and to hamper granulosa cell proliferation and steroid production in bovines and humans. Fouladi-Nashta et al. showed that cows fed a diet with rumen inert fat gave a higher oocyte cleavage rate than those fed on diets with soya bean or linseed as the main fatty acid source. However the dietary fatty acid source did not have an effect on development to the blastocyst stage. A previous study by the same group found that increased dietary fatty acids improved oocyte quality, whereas other studies found no differences in oocyte quality in cows fed diets with different fatty acid sources. is led Fouladi-Nashta and colleagues to conclude that the level of dietary fat is more important to oocyte quality than the type of fat. Furthermore, this group found that fatty acid composition of the follicular granulosa cells was unaffected by the different dietary fatty acids sources, leading them to hypothesise that the ovary (in the cow at least) moderates the uptake of individual plasma fatty acids so as to keep the fatty acid pro�le to the oocyte constant. In humans, serum AMH has been found to correlate with oocyte and embryo quality in IVF patients. Lee et al. showed that in breast cancer patients undergoing oocyte cryopreservation, the likelihood of obtaining more than four mature oocytes was higher for AMH levels >1.2 ng mL −1. In another study, ICSI patients with AMH levels <1.66 or >4.52 ng mL −1 gave oocytes of poorer quality, but AMH was not predictive of fertilisation rate or embryo quality. Elgindy et al. found AMH levels to have the best prognostic value for clinical pregnancy during the midluteal and early follicular phases of ICSI patients. Furthermore, AMH has recently been shown to be predictive of the number of transferable embryos in cows and goats. FSH has also been investigated as a potential predictor of IVF outcome, with some success, although other studies found AMH to be a superior predictor. Plasma levels of apolipoproteins have been found to vary in young and old IVF patients and so could be implicated in age-related infertility. Apolipoprotein B levels were higher in younger patients than old, though this difference was not statistically signi�cant, apolipoprotein E levels were greater in older patients for low density lipoprotein (LDL) and very low density lipoprotein (VLDL) complexes and apolipoprotein A1 did not differ with age. Protein and peptide levels in serum and FF may also be indicative of follicle maturity and hence oocyte quality. Higher serum levels of soluble triggering receptor expressed on myeloid cells-1 (sTREM-1), which is a marker of infection and in�ammation, have been associated with poorer quality embryos. In terms of lower molecular weight metabolites, high plasma levels of vitamin B12 have been associated with better embryo quality. So far, there has not been a global metabolomic study of blood plasma with view to identifying biomarkers of oocyte quality or IVF outcome. While the targeted analyses mentioned above have revealed some potential predictive markers, a metabolomics investigation would allow simultaneous measurement of a greater number of metabolites, many of which have not previously been investigated in IVF patients. Metabolomics has however been used to compare plasma from PCOS sufferers and controls. Sun et al. were the �rst to do this. �sing NMR spectroscopy and supervised multivariate statistical analysis, the authors identi�ed sig-ni�cant decreases in plasma amino acids, citrate, choline, and glycerophosphocholine/phosphocholine, and increases in the levels of dimethylamine (DMA), lactate, and Nacetyl glycoproteins in PCOS patients compared to controls. Sun et al. interpreted these trends as re�ecting the perturbations in amino acid metabolism, impairment of the tricarboxylic acid (TCA) cycle (citrate), increased activity of the gut micro�ora (citrate, choline and glycerophosphocholine/phosphocholine) (which has been linked to diabetes, obesity, and cardiovascular disease), increased glycolytic activity (lactate and glucose (insigni�cant)), and in�ammation (glycoprotein). Furthermore, greater metabolic deviations were observed in subgroups of patients with obesity, metabolic syndrome, and hyperandrogenism. Similarly, Atiomo and Daykin performed NMR-based metabolomics on PCOS and healthy control women shortly aer Sun et al., �nding signi�cant decreases in citrulline, lipids, arginine, lysine, ornithine, proline, glutamate, acetone, citrate, and histidine in PCOS compared with controls. ese studies have demonstrated the potential of NMR-based metabolomics for the study of PCOS, not only for identifying potential biomarkers but also for uncovering associated changes in metabolic pathways, leading to a better understanding of the causes and pathogenesis of PCOS, and offering the potential to �nd better treatments. No metabolomics studies of blood plasma or any other reproductive �uid or tissue have been performed for other reproductive diseases such as pelvic in�ammatory disease (PID) or endometriosis. e diagnosis of PID is very difficult because the disease presents itself in a variety of ways and is still ill de�ned. Oen women presenting with tubal factor infertility have had a past episode of PID, which went undiagnosed due to mild symptoms. PID is currently diagnosed according to a de�nition proposed by Hager et al., using a mixture of clinical symptoms (such as abdominal pain, vaginal discharge, menstrual irregularities, and urinary symptoms, to name a few), microbial and histological tests, and con�rmation with laparoscopy. However, in a critical review of PID diagnosis, Simms et al. concluded that there is insufficient evidence to support existing diagnostic guidelines, and a new evidence base or new diagnostic techniques are required. Furthermore, microbial diagnosis and laparoscopy are both invasive, and laparoscopy is expensive and operator subjective. erefore a single noninvasive test, such as a blood sample test, to con�dently diagnose PID early on would be highly desirable. Endometriosis is also difficult to diagnose because the symptoms are very similar to those of other chronic pain disorders, such as irritable bowel syndrome, and can go undiagnosed for long periods of time. In most cases, surgery is required for a de�nitive diagnosis, which is invasive and leads to long delays before diagnosis. Furthermore, endometriosis can present itself in a number of stages, but the severity of the disease is poorly correlated to the severity of the symptoms. erefore a noninvasive blood test to predict endometriosis and the severity of the disease would be ideal. PID and endometriosis have very similar symptoms and are oen confused, so a diagnostic test that is able to distinguish between these diseases would also be of great clinical value. Metabolomics has the potential to identify such biomarkers in women with these diseases, but as of yet only targeted biomarker investigations have been performed and no biomarkers are in current clinical use. e potential of blood plasma as a medium for predicting oocyte quality is less great than for FF or culture medium because it is not in direct contact with the oocyte. Furthermore, blood plasma is subject to more variation due to other factors that in�uence the metabolism (such as diet, level of activity, and disease) than FF or culture medium, which are compartmentalised or isolated from the body, respectively. However, plasma composition may be informative of a general status of a patient, and thus patients with extreme deviations from "normality", for example, may be associated with a poorer chance of becoming pregnant. erefore tests on plasma may be of some use in predicting IVF outcome, but are unlikely to be the only test required. Performing a blood test in conjunction with a test on FF, for example, may validate and support a prediction from the FF. Furthermore, correlations between FF and plasma may be of diagnostic value. ese are potential applications for metabolomics, which are yet to be addressed. International Journal of Reproductive Medicine 9 Concluding Remarks Research into biomarkers of IVF outcome is essential if we are to increase the numbers of eSET performed and hence reduce the multiple pregnancy rate without compromising the overall success rate in assisted conception. A large amount of knowledge has been gained over the years from targeted studies of embryo culture medium, oocytes, FF, and plasma, but still no biomarker is in routine clinical use. e move from these studies to metabolomics in recent years has offered a much greater potential for unravelling the mechanisms of infertility and for identify groups of diagnostic markers or models from which new samples can be predicted. However, this research is still in its infancy and the limitations discussed in this paper must be overcome before the desired goals can be achieved. In the pursuit of embryo markers in embryo culture medium, tests that are generally applicable and can cope with different types of medium and procedures used in different clinics are required. ough the majority of metabolomics studies in the �eld of assisted conception have been focused on embryo selection through the analysis of embryo culture medium, it has so far not proved clinically useful. In oocyte research, methods that are nondestructive to the oocyte are required and FF metabolomics studies should allow the necessary time to collect a good number of representative samples from patients undergoing eSET. Flush contamination should also be accounted for. It must also be considered that metabolism is a dynamic process and therefore sample collection over a time period may prove bene�cial in establishing biomarkers through metabolomics analysis. Indeed dynamic modelling studies have been developed in the metabolomics community. However, the primarily goal with metabolomics is usually biomarker identi�cation, not discovering the mechanism of metabolism. Ultimately, if a biomarker can distinguish between two (or more) groups of samples then it is a legitimate biomarker. With such improvements and extensions over the coming years, the possibility of identifying biomarkers of IVF outcome using metabolomics could become a reality, which is a very exciting prospect. Con�ict of �nterests e authors do not have any con�icts of interests to declare. Authors' Contribution C. McRae performed the literature searches and wrote the �rst dra of the paper. V. Sharma commented on the penultimate dra. J. Fisher edited the paper. All authors approved the �nal version.
|
package net.cogzmc.core.chat.channels.yaml;
import com.google.common.collect.ImmutableList;
import lombok.Getter;
import lombok.NonNull;
import net.cogzmc.core.Core;
import net.cogzmc.core.chat.CoreChat;
import net.cogzmc.core.chat.channels.*;
import net.cogzmc.core.player.CPlayer;
import net.cogzmc.core.player.CPlayerConnectionListener;
import net.cogzmc.core.player.CPlayerJoinException;
import java.net.InetAddress;
import java.util.ArrayList;
import java.util.HashMap;
import java.util.List;
import java.util.Map;
public final class ConfigurationChannelManager implements IChannelManager, CPlayerConnectionListener {
private final ConfigurationChannelSource configurationChannelSource;
private final List<ChannelManagerReloadObserver> channelManagerReloadObservers = new ArrayList<>();
private Map<String, Channel> channels;
@Getter private Channel defaultChannel;
private Map<Channel, List<CPlayer>> listenerMap;
private Map<CPlayer, Channel> activeChannels;
private List<MessageArgumentDelegate> messageArgumentDelegates;
private List<MessageProcessor> messageProcessors;
private List<ChatterObserver> chatterObservers;
public ConfigurationChannelManager() throws ChannelException {
this.configurationChannelSource = new ConfigurationChannelSource(this);
reload();
}
@Override
public ImmutableList<Channel> getChannels() {
return ImmutableList.copyOf(channels.values());
}
@Override
public Channel getChannelByName(String name) {
return this.channels.get(name);
}
@Override
public void makePlayerParticipant(@NonNull CPlayer player, @NonNull Channel channel) throws ChannelException {
if (!channel.canBecomeParticipant(player)) throw new ChannelException("You cannot become a participant of this channel!");
if (isParticipating(player, channel)) throw new ChannelException("You are already a participant of this channel!");
if (!isListening(player, channel)) makePlayerListener(player, channel);
Channel oldChannel = getChannelPlayerParticipatingIn(player);
if (!oldChannel.canRemoveParticipant(player)) throw new ChannelException("You cannot leave this channel!");
if (!channel.equals(defaultChannel)) activeChannels.put(player, channel);
else activeChannels.remove(player);
}
@Override
public void makePlayerListener(@NonNull CPlayer player, @NonNull Channel channel) throws ChannelException {
if (isListening(player, channel)) throw new ChannelException("You are already a listener of this channel!");
if (channel.equals(defaultChannel)) throw new ChannelException("You are always in this channel by default!");
this.listenerMap.get(channel).add(player);
}
@Override
public void removePlayerAsListener(@NonNull CPlayer player, @NonNull Channel channel) throws ChannelException {
if (!isListening(player, channel)) throw new ChannelException("You are not listening to this channel!");
if (channel.equals(defaultChannel)) throw new ChannelException("You cannot leave the default channel!");
if (isParticipating(player, channel)) makePlayerParticipant(player, defaultChannel);
this.listenerMap.get(channel).remove(player);
}
@Override
public Channel getChannelPlayerParticipatingIn(@NonNull CPlayer player) {
return this.activeChannels.containsKey(player) ? this.activeChannels.get(player) : defaultChannel;
}
@Override
public ImmutableList<CPlayer> getParticipants(@NonNull Channel channel) {
List<CPlayer> players = new ArrayList<>();
for (Map.Entry<CPlayer, Channel> cPlayerChannelEntry : this.activeChannels.entrySet()) {
if (cPlayerChannelEntry.getValue().equals(channel)) players.add(cPlayerChannelEntry.getKey());
}
return ImmutableList.copyOf(players);
}
@Override
public ImmutableList<CPlayer> getListeners(@NonNull Channel channel) {
if (channel.equals(defaultChannel)) return ImmutableList.copyOf(Core.getOnlinePlayers());
return ImmutableList.copyOf(this.listenerMap.get(channel));
}
@Override
public void reload() throws ChannelException {
this.listenerMap = new HashMap<>(); //Setup the listener map
this.channels = new HashMap<>(); //Channel map
for (Channel channel : this.configurationChannelSource.getNewChannels()) { //Load the channels from config
registerChannel(channel); //by registering each one ^
if (channel.isMarkedAsDefault()) this.defaultChannel = channel; //And setting the default up
}
if (defaultChannel == null) throw new IllegalStateException("There is no default channel!"); //And moaning if we can't get a default channel
this.activeChannels = new HashMap<>(); //Create an activeChannels map
this.messageArgumentDelegates = new ArrayList<>(); //and the delegates/
this.messageProcessors = new ArrayList<>();//processors map
this.chatterObservers = new ArrayList<>();
for (ChannelManagerReloadObserver channelManagerReloadObserver : this.channelManagerReloadObservers) {
channelManagerReloadObserver.onChannelManagerReload(this); //Let our observers know
}
}
@Override
public void save() {
//TODO nothing
}
@Override
public void registerChannel(@NonNull Channel channel) {
if (this.channels.containsValue(channel)) throw new IllegalStateException("You cannot register the same channel twice!");
this.channels.put(channel.getName(), channel);
this.listenerMap.put(channel, new ArrayList<CPlayer>());
}
@Override
public boolean isParticipating(@NonNull CPlayer player, @NonNull Channel channel) {
/*
* If we don't have them in the active channels map, they must be in the default channel, and as such they're only a participant if the channel being test is default
* Otherwise, they're in a specific channel, which we need to do an equals comparison on.
*/
return !this.activeChannels.containsKey(player) ? channel.equals(defaultChannel) : this.activeChannels.get(player).equals(channel);
}
@Override
public boolean isListening(CPlayer player, Channel channel) {
return channel.equals(defaultChannel) || this.listenerMap.get(channel).contains(player);
}
@Override
public ImmutableList<MessageProcessor> getMessageProcessors() {
return ImmutableList.copyOf(messageProcessors);
}
@Override
public ImmutableList<MessageArgumentDelegate> getMessageArgumentDelegates() {
return ImmutableList.copyOf(messageArgumentDelegates);
}
@Override
public void registerMessageProcessor(MessageProcessor messageProcessor) {
if (!this.messageProcessors.contains(messageProcessor)) this.messageProcessors.remove(messageProcessor);
}
@Override
public void registerMessageArgumentDelegate(MessageArgumentDelegate messageArgumentDelegate) {
if (!this.messageArgumentDelegates.contains(messageArgumentDelegate)) this.messageArgumentDelegates.add(messageArgumentDelegate);
}
@Override
public void unregisterMessageProcessor(MessageProcessor messageProcessor) {
if (this.messageProcessors.contains(messageProcessor)) this.messageProcessors.remove(messageProcessor);
}
@Override
public void unregisterMessageArgumentDelegate(MessageArgumentDelegate messageArgumentDelegate) {
if (this.messageArgumentDelegates.contains(messageArgumentDelegate)) this.messageArgumentDelegates.remove(messageArgumentDelegate);
}
@Override
public void registerChannelManagerReloadObserver(ChannelManagerReloadObserver observer) {
if (!this.channelManagerReloadObservers.contains(observer)) this.channelManagerReloadObservers.add(observer);
}
@Override
public void unregisterChannelManagerReloadObserver(ChannelManagerReloadObserver observer) {
if (this.channelManagerReloadObservers.contains(observer)) this.channelManagerReloadObservers.remove(observer);
}
@Override
public void registerChatterObserver(ChatterObserver listener) {
if (!this.chatterObservers.contains(listener)) this.chatterObservers.add(listener);
}
@Override
public void unregisterChatterListener(ChatterObserver listener) {
if (this.chatterObservers.contains(listener)) this.chatterObservers.remove(listener);
}
@Override
public ImmutableList<ChatterObserver> getChatterObservers() {
return ImmutableList.copyOf(chatterObservers);
}
@Override
public void onPlayerLogin(CPlayer player, InetAddress address) throws CPlayerJoinException {
for (Channel channel : channels.values()) {
/*
* this is messy, have a close look
* If the channel is auto participate, and the player can be a participant... *runs out of breath*
* and the player is not currently participating in any other channel (except the default)
* attempt to put them in the channel. Send them a message if they fail to join!
*/
if (channel.isAutoParticipate() && channel.canBecomeParticipant(player) &&
getChannelPlayerParticipatingIn(player).equals(defaultChannel)) {
try {
makePlayerParticipant(player, channel);
} catch (ChannelException ignored) {
}
}
/*
* Repeat the same type of action for channels you can "listen" automatically.
*/
if (channel.isAutoListen() && channel.canBecomeListener(player) && !channel.equals(defaultChannel) && !isListening(player, channel)) {
try {
makePlayerListener(player, channel);
} catch (ChannelException ignored) {
}
}
}
}
@Override
public void onPlayerDisconnect(CPlayer player) {
}
}
|
miRNA-30a functions as a tumor suppressor by downregulating cyclin E2 expression in castration-resistant prostate cancer. MicroRNAs (miRNAs) act as tumor promoters or tumor suppressors in different human malignancies. In the current study, using an Agilent miRNA microarray, miR30a was found to be a significantly downregulated miRNA in castrationresistant prostate cancer (CRPC) tissues, compared with androgendependent prostate cancer tissues. Aberrant expression of cyclin E2 (CCNE2) has been reported in a variety of types of cancer including prostate cancer, and correlates with clinical outcome. The purpose of the current study was to determine the functions of miR30a in CRPC cell lines and identify whether CCNE2 was regulated by miR30a. To analyze the associations between miR30a and CCNE2 expression levels, pathological specimens were collected, and reverse transcriptionquantitative polymerase chain reaction and immunohistochemical staining were conducted. The effect of miR30a overexpression on CRPC cell lines and the predicted target gene, CCNE2, were evaluated by MTT assay, flow cytometry, tumor formation, luciferase reporter assay and western blotting. miR30a overexpression resulted in a significant suppression of cell growth in vitro, and reduced tumorigenicity in vivo. miR30a repressed the expression of CCNE2 through binding to its 3'untranslated region. CCNE2 was observed to be overexpressed in patients with CRCP and had an approximately inverse correlation with the level of miR30a. The results suggest that miR30a may function as a novel tumor suppressor in CRPC. Its antioncogenic activity may occur by the reduced expression of a distinct cell cycle protein, CCNE2.
|
The incidence of primary thyroid lymphoma in thyroid malignancies. OBJECTIVES We investigated the incidence of primary thyroid lymphoma in thyroid malignancies. PATIENTS AND METHODS A total of 304 patients whose diagnoses were made as thyroid malignancies between January 1990 and December 2000 were retrospectively evaluated. Of these, primary thyroid lymphoma was documented in four female patients (1.3%; mean age 56.2 years; range 40 to 65 years). Findings from history, physical examination, blood biochemistry, thyroid hormone levels (T3, T4, TSH, thyroglobulin), thyroid scintigraphy, fine-needle aspiration biopsy, and cervical computed tomography (CT) were evaluated. Histopathologic results were evaluated according to the Revised European-American Lymphoma (REAL) classification. RESULTS The most common complaints on admission were a rapidly growing cervical mass, hoarseness, and dyspnea. In all the cases, thyroid hormone levels were normal, but thyroglobulin levels were 5 to 10 times as high as normal. Preoperative fine-needle aspiration was not helpful in two cases, whereas cervical CT was diagnostic. Pathologic diagnosis was diffuse large B cell lymphoma in all the cases. Postoperatively, three cases underwent chemotherapy and one case chemotherapy combined with radiotherapy. All the patients were operated on before 1997; one patient died, the remaining three patients have been under follow-up with no recurrences. CONCLUSION In our cases, treatment of localized thyroid lymphoma by surgery combined with chemotherapy or/and radiotherapy was effective.
|
<reponame>rghwer/testdocs
/*******************************************************************************
* Copyright (c) 2015-2018 Skymind, Inc.
*
* This program and the accompanying materials are made available under the
* terms of the Apache License, Version 2.0 which is available at
* https://www.apache.org/licenses/LICENSE-2.0.
*
* Unless required by applicable law or agreed to in writing, software
* distributed under the License is distributed on an "AS IS" BASIS, WITHOUT
* WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. See the
* License for the specific language governing permissions and limitations
* under the License.
*
* SPDX-License-Identifier: Apache-2.0
******************************************************************************/
package org.nd4j.linalg.learning;
import lombok.Data;
import org.nd4j.linalg.api.ndarray.INDArray;
import org.nd4j.linalg.learning.config.NoOp;
/**
* NoOp updater: gradient updater that makes no changes to the gradient
*
* @author <NAME>
*/
@Data
public class NoOpUpdater implements GradientUpdater<NoOp> {
private final NoOp config;
public NoOpUpdater(NoOp config) {
this.config = config;
}
@Override
public void setStateViewArray(INDArray viewArray, long[] shape, char order, boolean initialize) {
//No op
}
@Override
public void applyUpdater(INDArray gradient, int iteration, int epoch) {
//No op
}
}
|
/*
* Abyssalith is a Discord Bot for Volmit Software's Community
* Copyright (c) 2021 VolmitSoftware (Arcane Arts)
*
* This program is free software: you can redistribute it and/or modify
* it under the terms of the GNU General Public License as published by
* the Free Software Foundation, either version 3 of the License, or
* (at your option) any later version.
*
* This program is distributed in the hope that it will be useful,
* but WITHOUT ANY WARRANTY; without even the implied warranty of
* MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
* GNU General Public License for more details.
*
* You should have received a copy of the GNU General Public License
* along with this program. If not, see <https://www.gnu.org/licenses/>.
*/
package com.volmit.abyssalith.listeners;
import com.volmit.abyssalith.Abyss;
import com.volmit.abyssalith.handlers.RoleHandler;
import net.dv8tion.jda.api.events.interaction.SelectionMenuEvent;
import net.dv8tion.jda.api.hooks.ListenerAdapter;
import net.dv8tion.jda.api.interactions.components.selections.SelectOption;
import java.util.HashSet;
import java.util.List;
import java.util.Set;
public class SelectionMenuListener extends ListenerAdapter {
public void onSelectionMenu(SelectionMenuEvent e) {
Abyss.debug("Menu Selection Recorded");
if (e.getComponentId().equalsIgnoreCase("menu:rolepage")) {
Abyss.info("Subjugating selection Menu");
Set<String> roles = new HashSet<>(); // Null Set of Roles
List<SelectOption> sel = e.getSelectedOptions(); // Selected Options
List<SelectOption> other = e.getComponent().getOptions(); // All Options
for (SelectOption S : other) {
RoleHandler.removeRole(e.getMember(), S.getLabel());
}
for (SelectOption S : sel) {
RoleHandler.addRole(e.getMember(), S.getLabel());
roles.add(S.getLabel());
}
e.reply("Your new roles are:" + roles).setEphemeral(true).queue();
} else {
e.reply("Please contact an administrator, i cant see any roles!").setEphemeral(true).queue();
}
}
}
|
//====================================================================================================================//
// File: qcan_frame_list.hpp //
// Description: QCAN classes - CAN frame list //
// //
// Copyright (C) MicroControl GmbH & Co. KG //
// 53844 Troisdorf - Germany //
// www.microcontrol.net //
// //
//--------------------------------------------------------------------------------------------------------------------//
// Redistribution and use in source and binary forms, with or without modification, are permitted provided that the //
// following conditions are met: //
// 1. Redistributions of source code must retain the above copyright notice, this list of conditions, the following //
// disclaimer and the referenced file 'LICENSE'. //
// 2. Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the //
// following disclaimer in the documentation and/or other materials provided with the distribution. //
// 3. Neither the name of MicroControl nor the names of its contributors may be used to endorse or promote products //
// derived from this software without specific prior written permission. //
// //
// Licensed under the Apache License, Version 2.0 (the "License"); you may not use this file except in compliance //
// with the License. You may obtain a copy of the License at //
// //
// http://www.apache.org/licenses/LICENSE-2.0 //
// //
// Unless required by applicable law or agreed to in writing, software distributed under the License is distributed //
// on an "AS IS" BASIS, WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. See the License for //
// the specific language governing permissions and limitations under the License. //
// //
//====================================================================================================================//
#ifndef QCAN_FRAME_LIST_HPP_
#define QCAN_FRAME_LIST_HPP_
/*--------------------------------------------------------------------------------------------------------------------*\
** Include files **
** **
\*--------------------------------------------------------------------------------------------------------------------*/
#include "qcan_frame.hpp"
/*--------------------------------------------------------------------------------------------------------------------*\
** Definitions **
** **
\*--------------------------------------------------------------------------------------------------------------------*/
//----------------------------------------------------------------------------------------------------------------
/*!
** \class QCanFrameList
**
** <p>
*/
class QCanFrameList
{
public:
//---------------------------------------------------------------------------------------------------
/*!
** Constructs an empty classic standard CAN frame (frame format QCanFrame::eFORMAT_CAN_STD) with a
** DLC value of 0.
*/
QCanFrameList();
virtual ~QCanFrameList();
private:
};
#endif // QCAN_FRAME_LIST_HPP_
|
Isaiah Thomas is a small dude playing in a big man’s world, which gives him plenty of motivation. Yet he’s not one to shy away from added motivation, and the good folks at Sports Illustrated helped him with that one this week.
The Boston Celtics point guard landed at No. 45 on SI’s ranking of the top 100 players in the NBA right now.
Well, that No. 45 ranking eventually got back to Thomas, who apparently isn’t happy with SI’s list.
45? SI rankings are a JOKE!!
At this point, it’s likely safe to assume Thomas isn’t an SI subscriber. He landed at No. 88 last season, and he also lashed out at the magazine for that ranking.
If Thomas uses that as motivation and improves at the same level this season, it could be a special season for him and the Celtics.
|
<gh_stars>0
class Quiz1 {
public static void main(String[] args)
{
for (int i = 0;; i++)
System.out.println("HELLO VITAPian");
}
}
|
<reponame>Vertabelo/jOOQ<filename>jOOQ/src/main/java/org/jooq/impl/Pivot.java
/**
* Copyright (c) 2009-2014, Data Geekery GmbH (http://www.datageekery.com)
* All rights reserved.
*
* This work is dual-licensed
* - under the Apache Software License 2.0 (the "ASL")
* - under the jOOQ License and Maintenance Agreement (the "jOOQ License")
* =============================================================================
* You may choose which license applies to you:
*
* - If you're using this work with Open Source databases, you may choose
* either ASL or jOOQ License.
* - If you're using this work with at least one commercial database, you must
* choose jOOQ License
*
* For more information, please visit http://www.jooq.org/licenses
*
* Apache Software License 2.0:
* -----------------------------------------------------------------------------
* Licensed under the Apache License, Version 2.0 (the "License");
* you may not use this file except in compliance with the License.
* You may obtain a copy of the License at
*
* http://www.apache.org/licenses/LICENSE-2.0
*
* Unless required by applicable law or agreed to in writing, software
* distributed under the License is distributed on an "AS IS" BASIS,
* WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
* See the License for the specific language governing permissions and
* limitations under the License.
*
* jOOQ License and Maintenance Agreement:
* -----------------------------------------------------------------------------
* Data Geekery grants the Customer the non-exclusive, timely limited and
* non-transferable license to install and use the Software under the terms of
* the jOOQ License and Maintenance Agreement.
*
* This library is distributed with a LIMITED WARRANTY. See the jOOQ License
* and Maintenance Agreement for more details: http://www.jooq.org/licensing
*/
package org.jooq.impl;
import static org.jooq.conf.ParamType.INLINED;
import static org.jooq.impl.DSL.trueCondition;
import static org.jooq.impl.DSL.using;
import java.util.ArrayList;
import java.util.Collection;
import java.util.List;
import org.jooq.Condition;
import org.jooq.Configuration;
import org.jooq.Context;
import org.jooq.Field;
import org.jooq.PivotForStep;
import org.jooq.PivotInStep;
import org.jooq.QueryPart;
import org.jooq.Record;
import org.jooq.Select;
import org.jooq.Table;
import org.jooq.conf.ParamType;
/**
* A pivot table implementation
* <p>
* Future versions of jOOQ could simulate Oracle's <code>PIVOT</code> clause by
* rendering a subquery instead.
*
* @author <NAME>
*/
class Pivot<T>
extends AbstractTable<Record>
implements
PivotForStep,
PivotInStep<T> {
/**
* Generated UID
*/
private static final long serialVersionUID = -7918219502110473521L;
private final Table<?> table;
private final SelectFieldList aggregateFunctions;
private Field<T> on;
private SelectFieldList in;
Pivot(Table<?> table, Field<?>... aggregateFunctions) {
super("pivot");
this.table = table;
this.aggregateFunctions = new SelectFieldList(aggregateFunctions);
}
// ------------------------------------------------------------------------
// XXX: Table API
// ------------------------------------------------------------------------
@Override
public final Class<? extends Record> getRecordType() {
return RecordImpl.class;
}
@Override
public final void accept(Context<?> ctx) {
ctx.visit(pivot(ctx.configuration()));
}
private Table<?> pivot(Configuration configuration) {
switch (configuration.dialect()) {
/* [pro] xx
xx xxxxxx xxx xxxxxx xxxxxxx xxx xxx xxxxx xxxxxx
xxxx xxxxxxx
xxxx xxxxxxxxxx
xxxx xxxxxxxxxx x
xxxxxx xxx xxxxxxxxxxxxxxxxxxx
x
xx [/pro] */
// Some other dialects can simulate it. This implementation is
// EXPERIMENTAL and not officially supported
default: {
return new DefaultPivotTable();
}
}
}
/**
* A simulation of Oracle's <code>PIVOT</code> table
*/
private class DefaultPivotTable extends DialectPivotTable {
/**
* Generated UID
*/
private static final long serialVersionUID = -5930286639571867314L;
@Override
public final void accept(Context<?> ctx) {
ctx.declareTables(true)
.visit(select(ctx.configuration()))
.declareTables(false);
}
private Table<Record> select(Configuration configuration) {
List<Field<?>> groupingFields = new ArrayList<Field<?>>();
List<Field<?>> aliasedGroupingFields = new ArrayList<Field<?>>();
List<Field<?>> aggregatedFields = new ArrayList<Field<?>>();
Table<?> pivot = table.as("pivot_outer");
// Clearly, the API should be improved to make this more object-
// oriented...
// This loop finds all fields that are used in aggregate
// functions. They're excluded from the GROUP BY clause
for (Field<?> field : aggregateFunctions) {
if (field instanceof Function) {
for (QueryPart argument : ((Function<?>) field).getArguments()) {
if (argument instanceof Field) {
aggregatedFields.add((Field<?>) argument);
}
}
}
}
// This loop finds all fields qualify for GROUP BY clauses
for (Field<?> field : table.fields()) {
if (!aggregatedFields.contains(field)) {
if (!on.equals(field)) {
aliasedGroupingFields.add(pivot.field(field));
groupingFields.add(field);
}
}
}
// The product {aggregateFunctions} x {in}
List<Field<?>> aggregationSelects = new ArrayList<Field<?>>();
for (Field<?> inField : in) {
for (Field<?> aggregateFunction : aggregateFunctions) {
Condition join = trueCondition();
for (Field<?> field : groupingFields) {
join = join.and(condition(pivot, field));
}
@SuppressWarnings("unchecked")
Select<?> aggregateSelect = using(configuration)
.select(aggregateFunction)
.from(table)
.where(on.equal((Field<T>) inField))
.and(join);
aggregationSelects.add(aggregateSelect.asField(inField.getName() + "_" + aggregateFunction.getName()));
}
}
// This is the complete select
Table<Record> select =
using(configuration)
.select(aliasedGroupingFields)
.select(aggregationSelects)
.from(pivot)
.where(pivot.field(on).in(in.toArray(new Field[0])))
.groupBy(aliasedGroupingFields)
.asTable();
return select;
}
}
/* [pro] xx
xxx
x xxx xxxxxxxxxxxxxxx xxxxxxxxxxxxxxxxxx xxxxxxxxxxxxxx
xx
xxxxxxx xxxxx xxxxxxxxxxxxxxxx xxxxxxx xxxxxxxxxxxxxxxxx x
xxx
x xxxxxxxxx xxx
xx
xxxxxxx xxxxxx xxxxx xxxx xxxxxxxxxxxxxxxx x xxxxxxxxxxxxxxxxxxxxxx
xxxxxxxxx
xxxxxx xxxxx xxxx xxxxxxxxxxxxxxxxx xxxx x
xx xxxx xxxxxxxxx xxx xxx xxxxxxx xxxxxx xx xxxxx xxxxxx
xxxxxxxxx xxxxxxxxx x xxxxxxxxxxxxxxxx
xxxxxxx xxxxxxxxxxxxx x xxxxxxxxxxxxxxxxxxxx
xxxxxxx xxxxxxxxxxxxx x xxxxxxxxxxxxxxxxxxxx
xxxxxxxxxxxxxxxxxxxxxxx
xxxxxxxxxxxxx
xxxxxxxxxxxxxxxxxxxxxxxxxxxxx
xxxxxxxxxxxxxxxxxx
xxxxxxxxxxxxxxxxxxxxxxx xxx
xxxxxxxxxxxxxxxxxxx
xxxxxxxxxxxxxxxxxxxx
xxxxxxxxxxxxxxxxxxxx
xxxxxxxxxxxxxxxxxxxxxxxxxx
xxxxxxxxxxxxxxxxxx
xxxxxxxxxxxxxxxxxxxxx xx
xxxxxxxxxxxxxxxxxxxxxx
xxxxxxxxxxxxxxxxxx
xxxxxxxxxxxxxxxxxxxx xxx
xxxxxxxxxx
xxxxxxxxxxxxxxxxxxxxxxxxxxxxx
xxxxxxxxxxxxxxxxxxxxx
xxxxxxxxx
xxxxxxxxxxxxxxxxxx
xxxxxxxxxxxxxxxx
xxxxxxxxxx
x
x
xx [/pro] */
/**
* A base class for dialect-specific implementations of the pivot table
*/
private abstract class DialectPivotTable extends AbstractTable<Record> {
/**
* Generated UID
*/
private static final long serialVersionUID = 2662639259338694177L;
DialectPivotTable() {
super("pivot");
}
@Override
public final Class<? extends Record> getRecordType() {
return RecordImpl.class;
}
@Override
public final Table<Record> as(String as) {
return new TableAlias<Record>(this, as);
}
@Override
public final Table<Record> as(String as, String... fieldAliases) {
return new TableAlias<Record>(this, as, fieldAliases);
}
@Override
final Fields<Record> fields0() {
return Pivot.this.fields0();
}
}
/**
* Extracted method for type-safety
*/
private <Z> Condition condition(Table<?> pivot, Field<Z> field) {
return field.equal(pivot.field(field));
}
@Override
public final boolean declaresTables() {
return true;
}
@Override
public final Table<Record> as(String alias) {
return new TableAlias<Record>(this, alias, true);
}
@Override
public final Table<Record> as(String alias, String... fieldAliases) {
return new TableAlias<Record>(this, alias, fieldAliases, true);
}
@Override
final Fields<Record> fields0() {
return new Fields<Record>();
}
// ------------------------------------------------------------------------
// XXX: Pivot API
// ------------------------------------------------------------------------
/* [pro] xx
xxxxxxxxxxxxxxxxxxxxxxxxxxxxxx
xxxxxxxxx
xxxxxx xxxxx xxx xxxxxxxx xxxxxxxxxxx xxxxxx x
xx xxx xxxxxxxx xxxxx xx xxx xx xxxxxxx xxx xxxxxx xxxxxxxxxx
xxxxxxx x xxxxxxxxxx xxxxxx
xxxxxx xxxxxxxxxx xxxxx
x
xxxxxxxxx
xxxxxx xxxxx xxxxxxxxxxxxx xxxxxxxxxxxx xxxxxxx x
xxxxxx xxxxxxxxxxxxxxxxxxxxxxx xxxxxxxxxxxxxxx xxxxxxxxxxxxxx
x
xxxxxxxxx
xxxxxx xxxxx xxxxxxxxxxxxx xxxxxxxxxxxxxx xx x
xxxxxxx x xxx xxxxxxxxxxxxxxxxxxx
xxxxxx xxxxx
x
xxxxxxxxx
xxxxxx xxxxx xxxxxxxxxxxxx xxxxxxxxxxxxxxx xxxxxxx xxxxxxxxx xx x
xxxxxx xxxxxxxxxxxxxxxx xxxxxxxxxxx
x
xx [/pro] */
}
|
<filename>src/test/TensorTest.cpp<gh_stars>0
#include "Tensor.h"
#include "gtest/gtest.h"
TEST(Tensor, DefaultConstructor) {
const Tensor t;
EXPECT_EQ("", t.get_name());
EXPECT_EQ(0, t.get_rank());
}
TEST(Tensor, ConstructorFromRankName) {
const Tensor t (5, "5");
EXPECT_EQ("5", t.get_name());
EXPECT_EQ(5, t.get_rank());
}
TEST(Tensor, CopyConstructor) {
const Tensor t1;
const Tensor t2 (7, "TenSoRR");
const Tensor u1 (t1);
const Tensor u2 (t2);
EXPECT_EQ("", t1.get_name());
EXPECT_EQ("", u1.get_name());
EXPECT_EQ("TenSoRR", t2.get_name());
EXPECT_EQ("TenSoRR", u2.get_name());
EXPECT_EQ(0, t1.get_rank());
EXPECT_EQ(0, u1.get_rank());
EXPECT_EQ(7, t2.get_rank());
EXPECT_EQ(7, u2.get_rank());
}
TEST(Tensor, Antisymmetric) {
Tensor t1 (99, "Hey!##");
EXPECT_FALSE(t1.IsAntisymmetric());
EXPECT_FALSE(t1.IsSymmetric());
t1.SetAntisymmetric();
EXPECT_TRUE(t1.IsAntisymmetric());
EXPECT_FALSE(t1.IsSymmetric());
}
TEST(Tensor, Symmetric) {
Tensor t1 (99, "Hey!##");
EXPECT_FALSE(t1.IsAntisymmetric());
EXPECT_FALSE(t1.IsSymmetric());
t1.SetSymmetric();
EXPECT_FALSE(t1.IsAntisymmetric());
EXPECT_TRUE(t1.IsSymmetric());
}
TEST(Tensor, GetIndexMapping) {
const Tensor t1;
const Tensor t2 (11, "Whaaa");
const Indices i1;
const Indices i2 {'a', 'b', 'c', 'e', 'j', 'k', 'l', 'm', 'o', 'p', 'z'};
const auto im1 = t1.GetIndexMapping(i1);
const auto im2 = t2.GetIndexMapping(i2);
EXPECT_EQ(1, im1.size());
EXPECT_EQ(1, im1.size());
EXPECT_EQ(*(im1.front().first), i1);
EXPECT_EQ(*(im2.front().first), i2);
EXPECT_EQ(*(im1.front().second), t1);
EXPECT_EQ(*(im2.front().second), t2);
}
TEST(Tensor, equals) {
const Tensor t1;
const Tensor t2 (11, "Whaaa");
const Tensor t3 (11, "XyYYz");
const Tensor t4 (1, "XyYYz");
EXPECT_EQ(t1, t1);
EXPECT_NE(t1, t2);
EXPECT_NE(t1, t3);
EXPECT_NE(t1, t4);
EXPECT_NE(t2, t1);
EXPECT_EQ(t2, t2);
EXPECT_NE(t2, t3);
EXPECT_NE(t2, t4);
EXPECT_NE(t3, t1);
EXPECT_NE(t3, t2);
EXPECT_EQ(t3, t3);
EXPECT_NE(t3, t4);
EXPECT_NE(t4, t1);
EXPECT_NE(t4, t2);
EXPECT_NE(t4, t3);
EXPECT_EQ(t4, t4);
}
TEST(Tensor, lessThan) {
const Tensor t1;
const Tensor t2 (11, "Whaaa");
const Tensor t3 (11, "XyYYz");
const Tensor t4 (1, "XyYYz");
EXPECT_FALSE(t1 < t1);
EXPECT_TRUE(t1 < t2);
EXPECT_TRUE(t1 < t3);
EXPECT_TRUE(t1 < t4);
EXPECT_FALSE(t2 < t1);
EXPECT_FALSE(t2 < t2);
EXPECT_TRUE(t2 < t3);
EXPECT_TRUE(t2 < t4);
EXPECT_FALSE(t3 < t1);
EXPECT_FALSE(t3 < t2);
EXPECT_FALSE(t3 < t3);
EXPECT_FALSE(t3 < t4);
EXPECT_FALSE(t4 < t1);
EXPECT_FALSE(t4 < t2);
EXPECT_TRUE(t4 < t3);
EXPECT_FALSE(t4 < t4);
}
|
Rediff.com » News » Centre planning troop cut in Kashmir?
Centre planning troop cut in Kashmir?
The government is considering reducing the strength of security forces deployed in Jammu and Kashmir by 25 per cent as a confidence building measure.
Home Secretary Gopal K Pillai also said that India Is planning to unilaterally issue six-month multiple entry permits for people of Pakistan-occupied-Kashmir who want to visit Jammu and Kashmir through the Line of Control.
"As a confidence building measure in Jammu and Kashmir, the strength of the security forces would come down by 25 per cent. We would like to reduce it as soon as possible depending on the ground situation," he said while addressing a seminar at the Jamia Milia Islamia University.
Pillai pointed out that a few years ago, there were two divisions of the army in Nagaland, but now there was hardly any presence of security forces in the state.
There were 60 companies (6,000 personnel) of paramilitary forces in Nagaland and now just two companies were stationed there, he said.
"These are things which, if peace comes, if violence is not there, if people are comfortable, we can gradually reduce (the force strength) and make sure that all forces are only at the border and for preventing infiltration," he said.
Why don't we give a six-month multiple entry permit?
The home secretary said as part of confidence building measures, India and Pakistan may allow people from Jammu and Kashmir and PoK to visit either side with a permit valid for 15 days.
"We suggested that the people visit their relatives more often. So, we have suggested that if you give a 15-day permit, they have to go through the verification process. So why don't we give a six-month multiple entry permit? Once verification is done, one will be able to visit relatives whenever he or she wants. Now we are planning to unilaterally give six-month multiple entry permits for people of PoK," he said.
|
# import sys
# from io import BytesIO
# from os import read, fstat
# input = BytesIO(read(0, fstat(0).st_size)).readline
# import random
import sys
input = lambda: sys.stdin.readline().rstrip()
from collections import Counter
def solve_tc():
st = input()
s = Counter(list(st))
k = []
ans = []
while s:
k.append(s.popitem())
k.sort(key=lambda x: x[0])
if len(k) == 1:
ans = [k[0][0] for _ in range(k[0][1])]
return ans
for i in range(len(k)):
if k[i][1] == 1:
ans = [k.pop(i)[0]]
for j in k:
for _ in range(j[1]):
ans.append(j[0])
return ans
if k[0][1] <= 2:
for i in k:
for _ in range(i[1]):
ans.append(i[0])
return ans
if k[0][1] > len(st)//2 + 1:
if len(k) == 2:
ans = [k[0][0]]
for _ in range(k[1][1]):
ans.append(k[1][0])
for _ in range(k[0][1] - 1):
ans.append(k[0][0])
else:
ans = [k[0][0], k[1][0]]
for _ in range(k[0][1] - 1):
ans.append(k[0][0])
ans.append(k[2][0])
for _ in range(k[1][1] - 1):
ans.append(k[1][0])
for _ in range(k[2][1] - 1):
ans.append(k[2][0])
for i in range(3, len(k)):
for _ in range(k[i][1]):
ans.append(k[i][0])
else:
ans = [k[0][0], k[0][0]]
num_of_first = k[0][1] - 2
for i in range(1, len(k)):
for j in range(k[i][1]):
ans.append(k[i][0])
if num_of_first:
num_of_first -= 1
ans.append(k[0][0])
return ans
t = int(input())
while t > 0:
t -= 1
print("".join(solve_tc()))
|
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.