text
stringlengths 2
1.05M
| repo_name
stringlengths 5
101
| path
stringlengths 4
991
| language
stringclasses 3
values | license
stringclasses 5
values | size
int64 2
1.05M
|
---|---|---|---|---|---|
A Long Island man ran a prostitution ring out of his elderly parents' sprawling suburban home, enticing women with drugs and locking them in a basement where he forced them to use a bucket instead of a bathroom, prosecutors said Thursday.
Raymond Rodio III, 47, used social media to recruit and advertise the women, got them hooked on heroin or crack cocaine, and forced them to have sex with men in the basement of the home, in Sound Beach, or at nearby motels, Suffolk County District Attorney Tim Sini said.
"This is a dangerous and depraved individual," Sini said after Rodio's arraignment. "He kept women locked up in the basement of his parents' house. He used the basement of his parents' home as a dungeon."
Rodio operated the ring for about four years and victimized more than 20 women, Sini said.
Rodio's parents, who are in their 70s, may have known "something untoward" was going on, but not necessarily that their son was running a prostitution ring, Sini said. They are not charged with a crime.
Rodio pleaded not guilty Thursday to sex trafficking, promoting prostitution and other charges. He remains jailed because he hasn't posted $1 million cash bail or $2 million bond.
His next court appearance is scheduled for May 21. If convicted of the top charge, he faces up to 25 years in prison.
A message seeking comment was left with his lawyer.
Police uncovered the alleged prostitution ring after a routine traffic stop last August. Officers recognized that a passenger in the car appeared to be a victim of human trafficking, Sini said.
"As chilling and cruel as this case is, sex trafficking would not be possible or lucrative if not for the people who pay for the opportunity to sexually degrade the women being kept in these conditions," said National Sexual Violence Resource Center spokeswoman Kristen Houser.
From the outside, Rodio's parents' home appears typical of Sound Beach — a quiet, waterfront community about 60 miles (100 kilometers) east of midtown Manhattan on Long Island's north shore. Recent photos show a half-dozen American flags in the home's spacious, meticulously manicured yard. There are birdhouses, wagon wheels and a driveway basketball hoop.
Inside, through a door and down the stairs from an unfinished garage, was a vile, windowless hellscape where Rodio held women for long stretches without access to a shower, a bathroom or the outside world, Sini said.
Rodio's makeshift brothel featured a bed with a leopard-print comforter, but also walls lined with family portraits and Jesus on a prayer card, Sini said. There were shelves full of lotions, a bottle of chocolate syrup and "all sorts of items that one could suspect were used in sex acts," Sini said.
"It's disgusting," he said.
In recruiting women, Sini said, Rodio targeted women who appeared to have drug dependence or who were somehow otherwise vulnerable. He would initially supply them with drugs for free so they would be dependent on him, the prosecutor said. Then, after setting them up with clients, he'd give them heroin or crack to impair their judgment, Sini said.
Rodio would use the money the clients paid to buy the women more drugs and underwrite his own crack habit, Sini said. If they resisted seeing a client or didn't fork over enough of the fees, he'd scream at them, Sini said. The flow of drugs made the women indebted to Rodio, Sini said, and the only way they could repay it was by performing sex acts.
"This is a common tactic used by traffickers. They essentially force their victims to become addicted to drugs, then use that addiction — that illness — to keep victims under their control," Sini said.
__
Follow Michael Sisak at twitter.com/mikesisak
__
Send news tips, documents and recordings to AP securely and confidentially: https://www.ap.org/tips/
| null |
minipile
|
NaturalLanguage
|
mit
| null |
Clinical communication: Innovative education for graduate nurses in paediatrics.
The Royal Children's Hospital (RCH) is a specialist paediatric centre in Melbourne, Australia. RCH provides a full range of clinical services including tertiary care and health promotion and prevention for children and adolescents. RCH has 250 beds and treats approximately 32,000 in-patients a year. A total of 280,000 children are seen by this centre annually. The graduate nurse programme (GNP) at RCH has been established for over 20 years, as a twelve-month internship following a three-year bachelor degree in nursing. The aim of our GNP is to support each newly qualified registered nurse through their experience of transition from student to registered nurse. After initial orientation, the programme requires attendance at ten development days. The graduate nurses are supported by preceptors in the clinical environment whose role is to enable the application of new knowledge and skills. The Programme philosophy is that through a combination of reflective practice and individual goal setting, the graduate will fulfil the scope of their practice as set out in their Hospital job description.
| null |
minipile
|
NaturalLanguage
|
mit
| null |
Billionaire plans few changes for 3,000 acres on Kauai
Plans for the nearly 3,000 acres of Kauai agricultural land recently purchased by Tennessee billionaire Brad Kelley, one of the largest private landowners in the United States, call for keeping it predominately the way it is, the president of Kelley’s real estate holding and development company told PBN.
Bill Murphree, president of Kentucky-based Cumberland and Western Resources LLC, speaking to the media for the first time since Kelley’s purchase of the land from Lihue-based landowner Grove Farm Co. closed, says that there is no plan to develop the acreage in Puhi just past Kipu Ranch into any hotel or tourism-based businesses.
“We don’t have any big changes,” he said. “In time, there will be some job opportunities. We are very sensitive about the land and take our responsibility of being stewards of the land very seriously.”
Murphree, who also noted that the lessees of its newly-purchased land will be very happy and pleased in having it as a neighbor, said that this is the company’s first land purchase in the state.
“We have been interested in Hawaii, in general, for a long time,” he said. “We visited Kauai many years ago [and] we just loved it and saw that it was a beautiful place, [and although] all of Hawaii is beautiful, Kauai is unique and different for the other islands. There wasn’t any big strategy that led us there.”
Murphree declined to give specifics into what ag-related ventures are on tap, only to say that it has some things that will be interesting, including maybe developing a ranch house.
“We want to go out and meet with the lessees [and] we want to try to understand the details of those leases and meet the people involved,” he said. “We will have to look at each one individually and see what it means and involves. If we did anything that involved these leases, it would involve time.”
PBN first reported that Kelley purchased the agricultural lands on Kauai. The price was close to $10 million, according to public records.
Kelley’s massive landholdings, mostly pasture lands, amount to about 1,600 square miles, more than the entire land area of Rhode Island and not that much less than the state of Delaware.
The 57-year-old Kentucky native, who has a net worth of $2 billion and is ranked at No. 273 on the Forbes 400 list, gained such wealth by starting discount cigarette brands Bull Durham and USA Gold, eventually selling the business for $1 billion in 2001.
| null |
minipile
|
NaturalLanguage
|
mit
| null |
Multiple microabscesses in the central nervous system: a clinicopathologic study.
We reviewed 2,107 consecutive autopsies with neuropathologic examination at the Medical Center Hospital of Vermont, and identified 92 cases with significant pathologic evidence for infection involving the central nervous system (CNS). Of these, 35 took the form of multiple microabscesses. There were 19 men and 16 women, mean age 56. All patients were chronically ill, usually with an associated impaired immunity. The lung was the most frequent site of primary infection, and sepsis was often present. The most commonly identified causative organisms were Staphylococcus aureus and Candida albicans. Patients with CNS microabscesses developed a progressive encephalopathy associated with waxing and waning signs and symptoms. Laboratory and neuroradiologic studies were not helpful in elucidating the problem. We conclude that multiple microabscesses are a frequent, usually unrecognized, manifestation of CNS infection, and should be considered in the differential diagnosis of encephalopathy in hospitalized patients with chronic disease, immunosuppression and sepsis.
| null |
minipile
|
NaturalLanguage
|
mit
| null |
Slipper says he's been vindicated by Ashby case ruling
UPDATE: EMBATTLED Sunshine Coast MP Peter Slipper says a judge's decision to throw out a sexual harassment case against him, vindicates his position that it was always a political attack against him.
" I am pleased at Justice Rares' decision to dismiss the proceedings brought against me by Mr Ashby,'' Mr Slipper said in a statement released a short time ago.
"I have always maintained that Mr Ashby's application was about manipulating the justice system to inflict damage on my reputation and political career and to advance the interests of the Liberal National Party.
"In his judgement, Justice Rares said he had "reached the firm conclusion that Mr Ashby's predominant purpose for bringing these proceedings was to pursue a political attack" against me.
"I feel vindicated by today's judgement.
"The past eight months have been extremely traumatic for my wife, family and me.
"I thank my wife, family, staff and friends for their support during this extraordinarily difficult time.''
He claimed Mr Slipper hired him because he was gay and then attempted to victimise him when he turned down his advances.
Mr Slipper maintained the allegations were false and that the lawsuit was a character assault designed to "hurt my political career, hurt me financially, destabilise the government and destroy my marriage".
Justice Rares today upheld that argument, hitting out at the former advisor and his lawyers for making the claim for political and personal purposes.
As soon as the judgment had been read, Mr Ashby dashed out of court and into a meeting room with his legal team.
Mr Ashby told reporters outside the court it had been a "harrowing time" for him and his supporters.
"Since that date (April) no evidence at all has been heard on my substantive complaint against the former Speaker that he sexually harassed me.
"There has been a determined campaign to try and prevent the substantive allegations being heard and judged in open court and to put me to the maximum cost in pursuing justice."
Mr Ashby said his legal team would study the judgment in detail.
"But at this stage we intend to appeal this regrettable decision," he said.
Lawyers for Ashby 'shocked and disappointed' by decision
THE law firm which represented James Ashby says it plans to appeal the judgement.
"Whilst of course we respect the court's decision, we are shocked and disappointed by it,'' Michael Harmer, of Harmers Workplace Lawyers said.
"We will argue strongly on appeal that the conclusions in his Honour'sjudgment made about our conduct of the case are simply not justified by the evidence.
"Neither myself, nor this firm, are part of any conspiracy.
"Harmers Workplace Lawyers has over many years assisted thousands of individual,corporate and union clients to access justice.
"We have assisted James Ashby in that same way, as an individual who could not otherwise afford to run very expensive litigation in our courts.
"This is the sole reason we took on James Ashby's case. Politics played absolutely no role in the decision to take on James as a client,'' Mr Harmer said.
"As I swore in my affidavit, and as recognised by his Honour in his decision, my political views are not consistent with the conservative side of politics.
"We are a law firm, consciousof our professional obligations, and take no role in politics.
"As a firm, we will be examining all avenues to have this decision, and its comments, overturned through due judicial process."
Federal government welcomes decision
In welcoming the decision, a spokesperson for Attorney General Nicola Roxon said the Coalition would have "some serious questions to answer" over statements they made about Mr Ashby's claims.
"This shows how dangerously wrong and misleading Senator (George) Brandis can be in prejudging court matters," the spokesperson said.
Mr Slipper represented himself when the matter was heard in October.
Mr Ashby reached a $50,000 settlement with the Commonwealth, which he was suing for failing to provide a safe working environment.
KEY POINTS OF WHAT THE JUDGE SAID:
"Mr Slipper applied to have these proceedings dismissed as an abuse of the process of the Court.
Mr Slipper contended that Mr Ashby's predominant purpose in bringing the proceedings against him, in combination with Karen Doane (another member of Mr Slipper's staff), the Hon Malcolm Brough (who was seeking to contest Mr Slipper's seat for the LNP at the next federal election), Steve Lewis (a journalist, employed by one of News Limited's subsidiaries as the national political correspondent for the Daily Telegraph), Anthony McClellan (a media consultant engaged by Mr Ashby) and Mr Ashby's lawyers, Michael Harmer and his firm, Harmers was, in effect, to inflict damage on Mr Slipper's reputation and political career in order to assist the LNP and Mr Brough and, so, to advance Mr Ashby's and Ms Doane's prospects of advancement or preferment by the LNP.
The present application has been bitterly fought.
The legal principles at the heart of Mr Slipper's central allegation that the proceeding is an abuse of process are not in doubt. The Courts have an unlimited power over their own processes to prevent those processes being used for the purpose of injustice.
The originating application filed on 20 April 2012 was in an irregular and unusual form. It sought damages for breach of contract and should have claimed the relief that Mr Ashby sought while being accompanied by a statement of claim
The originating application made a number of serious allegations concerning Mr Slipper's conduct including that:
Mr Slipper had sexually harassed Mr Ashby in the course of his employment (the sexual harassment allegations);
in 2003 Mr Slipper had a relationship of a sexual nature with a younger male member of his staff and an encounter between them had been recorded on a video, a viewer of which had concluded that the relationship was consensual (the 2003 allegations); and
Mr Ashby had been forced on three occasions to watch Mr Slipper sign multiple Cabcharge vouchers during his employment and hand them to the driver of a vehicle in which they both travelled and that Mr Ashby intended to report these matters to the Australian Federal Police (the Cabcharge allegations).
On the same day as the originating application was filed, Vanda Carson, a journalist from the Daily Telegraph, a newspaper published by News Limited or one of its subsidiaries, sought and obtained access to the "statement of claim" under r 2.32 of the Federal Court Rules. Later on 20 April 2012, Mr Lewis, sent a text message to Mr Slipper saying he would like to contact him for his comment on the allegations in "court documents".
Mr Lewis and Mr Ashby knew that Mr Slipper was then overseas. The next day many of the allegations about Mr Slipper's conduct that were made in the originating application received significant publicity in the media.
ON THE TEXT MESSAGES
What is singular about all of the text message exchanges that Mr Ashby had with his friends and others in the period prior to the commencement of these proceedings is the lack of any complaint by him of feeling sexually harassed. And his friends' texts had no words of comfort for Mr Ashby as a victim of some traumatic experience of that kind.
The exchanges between Martin, Mr Nagle, Ms Hubbard and Mr Ashby on 3 and 4 February 2012 do not read like those concerning a man claiming to feel sexually harassed or emotionally distressed by such conduct.
Rather they read as if the participants were discussing the political ramifications of Mr Ashby revealing material that was sexually and politically embarrassing and that would compromise Mr Slipper and his position as Speaker if it appeared in the public domain.
At least initially, Mr Ashby was contemplating that Mr McArdle, an LNP politician, would use the text messages against Mr Slipper's political interests - hence his text that this did not "empower me once the information is passed on ... Will I be rewarded or condemned?".
Read in its context with all his texts, I am satisfied that if Mr Ashby were the victim of sexual harassment he would not have speculated with his friend in this way about whether he would be rewarded by revealing it.
As Dr Phillips observed, on several occasions Mr Ashby joined in text conversations with Mr Slipper that were "somewhat provocative and sexualised".
He observed, and I find, that Mr Ashby on occasion "added to the frission of the interchange". Thus, in context, the mere fact that Mr Slipper commenced his text discussion on 26 February 2012 of Mr Ashby's work for LNP candidates with a sexualised reference, is not necessarily demonstrative of sexual harassment or victimisation.
In all the circumstances I am not persuaded that it was on this occasion. Had Mr Ashby been upset by Mr Slipper's reference to another person saying he was a "twink" there is no doubt he would have remonstrated then and there with Mr Slipper as he forcefully did for some time in the later text exchanges on 26 February 2012 on Mr Ashby's political activities.
Mal BroughGreg Miller
ON THE MEDIA AND MAL BROUGH
I am also satisfied that Mr Ashby and (former media adviser Karen) Doane by about 29 March 2012 were in a combination with Mr Brough to cause Mr Slipper as much political and public damage as they could inflict on him.
They believed and hoped that Mr Lewis would publish unfavourable stories about Mr Slipper concerning whatever they could help Mr Lewis find in relation to Mr Slipper's use of his travel entitlements in the areas of Mr Lewis' curiosity.
That is why each of Mr Ashby, Ms Doane and Mr Brough were anxious to provide Mr Lewis with the diary entries he sought. It is not clear whether Mr Brough had passed on to Mr Lewis Mr Ashby's foreshadowed complaint of sexual harassment in late March 2012.
They also believed that Mr Lewis, and the media generally, would report on any legal proceeding against Mr Slipper in which Mr Ashby alleged sexual harassment.
At this time, Mr Ashby and Ms Doane saw Mr Brough as their means of obtaining favour from the LNP in seeking new employment.
It was obvious that once what Mr Ashby was then planning became public, he and Ms Doane could no longer work as members of Mr Slipper's personal staff.
The relationship of trust and confidence (if it still subsisted) between Mr Slipper and the two staff members would have been destroyed by their acts of calculated disloyalty.
The timing of Mr Ashby's and Ms Doane's actions immediately after 24 March 2012 is also significant.
They believed that new job opportunities would open up to them after the LNP won government in Queensland on the weekend of 24-25 March 2012.
If Mr Ashby could discredit Mr Slipper politically by helping Mr Brough and using Mr Lewis, he perceived that would gain favour for him and Ms Doane in the eyes of the LNP.
Mr Russell QC may have disabused Mr Ashby of that perception on 6 April 2012. However, both Mr Ashby and Ms Doane acted on that basis before 6 April 2012 and she, at least, continued to do so later.
Former Speaker Peter Slipper.Warren Lynam
THE CABCHARGE ALLEGATIONS
In my opinion, Mr Ashby included the Cabcharge allegations in the originating application for the predominant purpose of injuring Mr Slipper and assisting a political attack on him to benefit Mr Brough and the LNP.
This is emphasised by his decision to include the assertion that he intended to report the matter to the Australian Federal Police.
Mr Russell QC had told him, in Mr Brough's presence, two weeks before the originating application was filed that he was free to do so if he was concerned about Mr Slipper's conduct.
Mr Ashby did not do so. Instead, he waited to announce his "intention" to do so in the originating application knowing that this would be reported in the media.
His statement that he "intended" to make the report was itself made two months after the alleged conduct last occurred and over one month after Mr Ashby had requested that he be allowed to travel at his own expense with Mr Slipper on an overseas trip.
There is no evidence to suggest that Mr Ashby ever asked Mr Slipper for or received any explanation of what he pleaded as being "questionable conduct".
Mr Ashby's delay, and most particularly his request to accompany Mr Slipper overseas, point to his predominant purpose as being to seek publicity for the allegations so as to damage Mr Slipper and assist the latter's political opponents.
They were allegations that were calculated to raise the spectre that Mr Slipper had engaged in criminal conduct, without actually asserting that he had done so.
THE JUDGE'S CONCLUSION
Having read all of the text messages on Mr Ashby's mobile phone, as Mr Ashby's senior counsel invited me to do, as well as the other evidence, I have reached the firm conclusion that Mr Ashby's predominant purpose for bringing these proceedings was to pursue a political attack against Mr Slipper and not to vindicate any legal claim he may have for which the right to bring proceedings exists.
Mr Ashby began planning that attack at least by the beginning of February 2012. As Mr Ashby and Ms Doane agreed in their texts of 30 March 2012 what they were doing "will tip the govt to Mal's [Brough] and the LNP's advantage": [66].
It may be a coincidence that Mr Ashby suggested to Mr Slipper the idea of becoming Speaker just as Mr Brough began to move towards challenging Mr Slipper for LNP pre-selection for his seat and Mr Ashby ended up in an alliance in late March 2012 with Mr Brough to bring down Mr Slipper after he became Speaker.
It is not necessary to make any finding about this or about whether Mr Slipper did sexually harass Mr Ashby in any of the ways alleged. It is also not necessary to consider whether these proceedings are "vexatious proceedings" within the meaning of r 6.02 or if that expression has a different meaning in r 26.01(1)(b) under which the Court can give summary judgment if "the proceeding is frivolous or vexatious".
For the reasons above, I am satisfied that these proceedings are an abuse of the process of the Court.
The originating application was used by Mr Ashby for the predominant purpose of causing significant public, reputational and political damage to Mr Slipper.
It contained the scandalous and irrelevant 2003 allegations and assertion that Mr Ashby intended to report to the police Cabcharge allegations.
To allow these proceedings to remain in the Court would bring the administration of justice into disrepute among right-thinking people and would be manifestly unfair to Mr Slipper.
COURT COSTS AWARDED AGAINST JAMES ASHBY
Mr Ashby should be ordered to pay Mr Slipper's costs of the proceedings. Mr Slipper is entitled to an order for his costs of the proceedings subject to those being set off against the order for costs I made against him on 17 August 2012. If any special order for costs is sought in consequence of the orders I will make today either party may apply within 7 days.
| null |
minipile
|
NaturalLanguage
|
mit
| null |
Saving Food without a fridge - an interesting post by http://www.treehugger.com
Fridges are a recent invention; for thousands of years, people lived without them, but had many low-tech ways of making food last. Today most fridges are filled with stuff that would last just as long and probably would taste a lot better if it was never lost in the back of the fridge. They are expensive air conditioned parking lots for what Shay Salomon called "compost and condiments."
Some are looking at alternatives to such an expensive and wasteful model. Kris De Decker of No Tech Magazine "refuses to assume that every problem has a high-tech solution," and shows the work of Korean designer Jihyun Ryou, who says "we hand over the responsibility of taking care of food to the technology, the refrigerator. We don’t observe the food any more and we don’t understand how to treat it."
She has developed a series of modern designs that rely on traditional techniques, learned from her grandmother and other elderly people in the community, the " traditional oral knowledge which has been accumulated from experience and transmitted by mouth to mouth."
Here is an interesting and complicated example. Many fruits give off ethylene gas as they ripen; a lot of people put their tomatoes in paper or plastic bags to make them ripen faster. That's why putting fruit is a fridge is so silly, the ethylene builds up inside the sealed box and the fruit goes rotten faster. But some vegetables react differently to ethylene; with potatoes and onions, it suppresses the sprouting process. Put a banana in a plastic bag with a potato and the banana will be rotten in no time, but the potato won't sprout. Jihyun Ryou's response:
Apples emit a lot of ethylene gas. It has the effect of speeding up the ripening process of fruits and vegetables kept together with apples. When combined with potatoes, apples prevent them from sprouting.
Keeping roots in a vertical position allows the organism to save energy and remain fresh for a longer time. This shelf gives a place for them to stand easily, using sand. At the same time, sand helps to keep the proper humidity.
Kris de Decker elaborates:
Keeping vegetables in slightly damp sand has been a storage method for many centuries. While low temperatures are favourable for vegetables like carrots, high humidity is equally important. Keeping them in wet sand can be a good compromise.... Just don't forget to water them from time to time.
An egg has millions of holes in its shell. It absorbs the odour and substance around itself very easily. This creates a bad taste if it’s kept in the fridge with other food ingredients. This shelf provides a place for eggs outside of the fridge. Also the freshness of eggs can be tested in the water. The fresher they are, the further they sink.
Everyone in North America stores their eggs in the fridge, but few people in Europe do, they can last for days on a shelf or in a pantry. In European supermarkets, the eggs are not refrigerated. Integrating the water into the egg storage shelf is really clever; according to about.com, if an egg:
Sinks to the bottom and stays there, it is about three to six days old.
Sinks, but floats at an angle, it's more than a week old.
Sinks, but then stands on end, it's about two weeks old.
Floats, it's too old and should be discarded
.
Eggs act this way in water because of the air sac present in all eggs. As the egg ages, the air sac gets larger because the egg shell is a semi-permeable membrane. The air sac, when large enough, makes the egg float. Eggs are generally good for about three weeks after you buy them.
The more food you can keep out of the fridge, the smaller it needs to be and the less energy it will consume. The designs described above show a refreshing way to do that, although it should be remembered that these are artworks, not consumer products. Using similar methods when storing food in a basement or a specially designed root cellar - the traditional way - will give better results.
Smaller fridges use less energy, of course, take up less space and make good cities. Furthermore, these techniques are not relics from the past, they are templates for the future. In the hands of a talented designer, they can look beautiful, too.
I spent a summer working in rural Romania, and few people had refrigeration, even in restaurants. Food was just purchased or picked for immediate use, or preserved. Everyone seemed happy and the food was good.
Sounds great Jen - we have just become so conditioned to how things should be.
The elderly couple (both in their 90s), from whom we bought our house in the North of England, kept large amounts of fruit and veg in their very cold cellar - apples and pears from their garden were wrapped in paper and stored in tradition wooden (orange) boxes or in pull-out racks, whilst plums and figs were bottled in syrup.
My own parents, who live in the tropics, only recently started storing veggies in the fridge (probably my fault!) and never put fruit in the fridge, preferring to keep them either in drawers in brown paper to ripen or piled on platters with woven covers to protect from birds and insects.
Not quite right... a root cellaring basic (just google it if you don't believe me) is to keep your apples and potatoes separate as they do the opposite of what this article states. Carrots will do better in the fridge then in moist sand. The trick is you must have both. If you just add moisture at room temperature all you'll end up with is mold. Eggs that have already been in a fridge can't be stored on a shelf. You can only do this with eggs that haven't been refrigerated so you need a source straight from the chicken's you know what. And finally more efficient fridges use less energy not necessarily smaller ones. Just my thoughts....
Thanks Kootenay - as I say, I was sharing on the basis that it was a very interesting (thought-provoking) post. I live in a hurricane and quake zone with tropical temperatures, so having non-grid reliant options are always worth looking into. Thanks for the additional information : )
| null |
minipile
|
NaturalLanguage
|
mit
| null |
Q:
What's the maximum vector length we can have from a linear transformation?
Assume I have this linear transformation:
$\ Ax = y $. What's the maximum magnitude(or length) of y we can obtain from this transformation? I feel somehow that the answer is related to eigenvalues. However, I'm not sure how to prove this. In other words, how to prove that the maximum length of $y$ would be the maximum eigenvalue of $A$ multiplied by its eigenvector.
What about if $A$ is non square matrix? Is that related to singular values? if so, how can I prove that?
A:
What you're looking for is the norm of the linear transformation. This is defined by
$$
\|A\| = \sup \{ \| Ax \| \mid \| x\| =1\}.
$$
Of course this doesn't really answer your question. In case $A$ is a normal matrix, we can say a bit more. In this case we have that the norm of $A$ is equal to the spectral radius $r(A)$ as you suspected. The spectral radius is defined by
$$
r(A) = \sup \{ \lvert \lambda \rvert \mid \lambda \text{ is an eigenvalue of } A\}.
$$
For a case where the spectral radius doesn't coincide with the norm, observe the following matrix
$$
A = \left( \begin{matrix} 0 & 1 \\ 0 & 0 \end{matrix} \right).
$$
Note that it's only eigenvalue is $0$ but it's norm is equal to 1.
But we can still relate the singular values of $A$ to the norm of $A$. Note that a property of the norm is that
$$
\|A^\dagger A \| = \|A \|^2.
$$
So $\|A\|$ will always be equal to the square root of the largest eigenvalue of $A^\dagger A$ or in other words $\|A\|$ is equal to the largest singular value of $A$.
| null |
minipile
|
NaturalLanguage
|
mit
| null |
In this project, we propose to study the relationship between the water solubility of a drug and the specificity of that drug for receptors that may mediate immobility and/or amnesia during general anesthesia. We have collected extensive preliminary data that suggest drug modulation of at least two anesthetic-sensitive receptors is predicted by a molar water solubility cut-off value. We propose to confirm this solubility- specificity relationship using in vitro electrophysiological studies in frog oocytes (Specific Aim 1) and then to test whether these same relationships exist in vivo using pharmacologic studies in rats (Specific Aim 2). In Specific Aim 1, we will express anesthetic-sensitive receptors (e.g., GABAA, NMDA, etc.) in frog oocytes and measure the inhibition or potentiation of currents produced by homologous hydrocarbon chains. Homologous hydrocarbons contain the same functional group, but differ by 1-2 carbons at the &-end of the hydrocarbon chain (e.g., 1-propanol vs. 1-hexanol). Utilizing a diverse range of hydrocarbons having vastly different vapor pressures and molecular sizes and charges, the effect of hydrocarbon water solubility as a single critical physical determinant of an in vitro cut-off effect on anesthetic-sensitive receptors can be demonstrated. This critical molar water solubility cut-off value will define in vitro specificity of a compound for one of two receptors. For example, in the case of NMDA and GABAA receptor modulation, the critical molar water solubility will predict whether a drug modulates GABAA receptors only or whether a drug is able to modulate both NMDA and GABAA receptors. In Specific Aim 2, we aim to test whether the anesthetic solubility-specificity cut-off described in the previous in vitro studies translate into specificity for GABAA versus NMDA receptor modulation in a whole-animal model. To this end, we will study the relative NMDA antagonism of 2 homologous inhaled anesthetic hydrocarbons (alkanes) and 2 homologous injectable anesthetic hydrocarbons (propofol and its halogenated analogue) using pharmacologic methods we have piloted in studies measuring the contribution of NMDA by isoflurane at minimum alveolar concentration (MAC) in rats. Since each homologous pair of anesthetics will have a water solubility value on either side of the specificity cut-off value, we hypothesize that NMDA antagonism at MAC will exist only for the more soluble of the pair, whereas the less soluble compound should never exhibit evidence of NMDA receptor antagonism at any delivered concentration. PUBLIC HEALTH RELEVANCE: Anesthetics modulate multiple cell receptors, and these receptors can in turn mediate both desirable and undesirable effects. Validation of this novel solubility- specificity cut-off phenomenon for cell receptors provides a mechanism for the development of safer anesthetics simply by altering the water solubility of existing agents. Decreasing water solubility of some drugs could increase receptor specificity and thus could potentially reduce undesirable drug side-effects. Increasing water solubility of other drugs might add desirable receptor modulation, with the potential to imbue a non- anesthetic with the immobilizing effects of a general anesthetic. The role of water solubility as a determinant of drug-receptor modulation would also add additional support to theories of anesthetic action at aqueous interfacial sites around cell receptor proteins.
| null |
minipile
|
NaturalLanguage
|
mit
| null |
To view this site, you need to have JavaScript enabled in your browser, and either the Flash Plugin or an HTML5-Video enabled browser. Download the latest Flash player and try again.
Is the Market Rally Justified?
2:00 AM ET Thu, 23 Aug 2012
John Velis, head of capital markets research for EMEA at Russell Investments, told CNBC, the Fed won't necessarily announce more quantitative easing as the data has improved since the minutes were written.
| null |
minipile
|
NaturalLanguage
|
mit
| null |
Much of this interest has been spurred by the Obama administration announcing that it has requested China’s help in fighting ISIS in Iraq. Even among the Chinese analysts supportive of Beijing playing a direct role in the war on ISIS, many have suggested that China should do it at least in part to earn goodwill from the United States.
This is preposterous. Not only does ISIS pose a greater threat to China and Chinese interests, but Beijing has had a large role in ISIS’s rise as well.
As I’ve noted before, ISIS did not directly threaten the United States before America began conducting airstrikes against it last month. The same cannot be said of ISIS’s stance toward China. For instance, in a speech he made back in July, ISIS leader Abu Bakr Al-Baghdadi noted to his followers that “Muslim rights are forcibly seized in China, India, Palestine” and elsewhere around the world. A five-year expansion map released at the same time showed ISIS’s aspirations to swallow up Xinjiang province.
Then, after returning from a trip to the region later that same month, Wu Sike — then China’s Middle East envoy — revealed that at least 100 Chinese citizens were training with ISIS in the Middle East. He said most were members of Uyghur separatist groups who have stepped up their own terrorist attacks against the Chinese state over the past year. “After being immersed in extremist ideas, when they return to their home country they will pose a severe challenge and security risk to those countries,” Wu said at the time.
The past week has seemed to offer confirmation of this, as the Iraqi Ministry of Defense announced the capture of a Chinese national fighting with ISIS. This is a serious threat to China given that, largely unlike the United States, China actually experiences frequent terrorist attacks from its disenfranchised Muslim population.
Besides the security threat ISIS poses to China, the group also threatens Beijing’s energy security. It’s no secret that while the U.S. fought the Iraq War, it was China and Iran who won it. Since the 2003 U.S. invasion, Chinese energy companies have invested some $10 billion in Iraq’s nascent oil industry. In recent years, China has been the destination for around half of Iraq’s oil exports. This is not insignificant from China’s perspective either. China’s oil imports from Iraq have doubled since 2011 and grew by 50 percent in 2013 alone, the largest growth of any country last year. This made Iraq China’s fifth largest oil supplier after Russia, with Iraqi oil accounting for roughly 10 percent of China’s imports (the U.S. imports far less of its oil and only 4 percent of its imports came from Iraq last year). Moreover, China is the largest importer of Middle Eastern crude, with over 50 percent of its imports coming from the region last year.
Although China clearly has more at stake in countering ISIS, some may charge that the U.S. and its allies should bear the full burden since they helped fuel ISIS’s rise by invading Iraq in 2003. These same observers might also rightly point out that China opposed this invasion.
You won’t find an argument with me about this. I’ve already written that the U.S. did more than any other outside power to fuel ISIS’s rise. This point seems indisputable to me.
That being said, China is also directly culpable for ISIS’s rise. Although America’s 2003 invasion directly contributed to the creation of al-Qaeda in Iraq (AQI) — the predecessor of ISIS — the group was largely a spent force after the U.S. surge and the Anbar Awakening. Even after it refashioned itself as the Islamic State of Iraq, the group remained a marginal force at best.
It was the Syrian civil war that fueled ISIS’s revival. The sectarian nature of the Assad regime and its brutal crackdown, which played into ISIS’s own strategy, was what helped the group revive itself. That war, as well as the Nouri al-Maliki government’s sectarian nature, gave ISIS the chance to rise from the ashes of history.
Of course, it was China who joined Russia and Iran in propping up the Assad regime over America’s strident objections. That policy has now backfired, as China itself has implicitly admitted. Had China, Russia, and Iran listened to the U.S. and not continued to back Assad, it’s unlikely his regime could’ve stayed in power. And without the outside threat presented by the Alawites and Shia, Syrian and Iraqi Sunnis would’ve never gotten behind ISIS.
| null |
minipile
|
NaturalLanguage
|
mit
| null |
600 tourists stranded in Haast
Six hundred tourists, some with medical issues, are stranded in Haast, blocked by a huge slip.
Westland District Council has activated a Level 3 Emergency Operations Centre in response to yesterday's severe weather caused by ex-Tropical Cyclone Fehi throughout the district and for many parts of New Zealand.
Heavy rain for the West Coast and central parts of the North Island eased this morning, as had severe gales for much of the country.
One of the tourists had a minor medical condition and was helicoptered out, a Westland District Council spokesperson said this morning.
"Another stranded motorist was a doctor, and they assisted them. The person had a minor medical condition, that could have got worse, so we got them out of there."
A helicopter crew is assessing roads in Franz Josef and Fox Glacier and bringing in ground crew to assess how to safely get stranded tourists out today. WDC said this was being conducted by police.
"Getting the stranded people out of the area is the first priority; the vehicles will be recovered at a later point in time," a WDC spokesperson said.
"Challenges with this include slips, fallen trees and, of greatest concern, live power lines down which need to be isolated before the road can be cleared.
"We are aware of a few medical issues and these are being handled as a matter of urgency under the supervision of New Zealand Police."
There is a 100m-long slip, 9 metres high, at Douglas Bluff south of Haast.
WDC estimates at least 600 tourists to be in Haast.
"We are undertaking a welfare assessment of their needs. The road and slip is being managed by New Zealand Transport Agency and their contractors."
Power was restored to most of Hokitika yesterday evening although there were still about 900 consumers without power, mostly in South Westland, Hokitika, and areas in the north towards Inangahua, a Transpower spokesperson said.
Specialist crews are travelling by helicopter to conduct an assessment and begin making repairs to the transmission assets.
Some 115 tourists spent an uncomfortable night in their cars after becoming stranded between Fox Glacier and Franz Josef. They include about 20 young people aboard a Kiwi Experience bus.
Damage from ex-Tropical Cyclone Fehi blocked off parts of State Highway 6 yesterday, including between Ross and Makarora, which covers Franz Josef and Fox Glaciers.
Buller Civil Defence said this morning the high tide in the early hours had not resulted in another major storm surge and people who had to leave their homes had found places to stay for the night.
"All those who had to leave their homes are safe in motels or with friends and family."
Fire and Emergency said it had a relatively quiet night overnight with few weather-related call outs.
In response to the state of emergency Spark has opened up its WiFi network to everyone across the South Island.
"Anyone who needs to (whether you're a customer or not) is welcome to use free Spark WiFi to stay in touch with friends and family."
| null |
minipile
|
NaturalLanguage
|
mit
| null |
Correlation between antigen-specific IL-2 response test and provocation test for egg allergy in atopic dermatitis.
The antigen-specific interleukin-2 response (AIR) test using lymphocytes is effective in searching for the antigen which causes allergic diseases and understanding their disease activity. The correlation between the raw egg oral provocation test and egg white antigen-specific interleukin-2 (IL-2) response test was investigated in 123 children with infantile atopic dermatitis and 13 children with bronchial asthma. Among the 83 who showed positive reactions to provocation, 75 also reacted positively to the AIR test (sensitivity, 90.4%), while among the 53 children who showed negative responses to antigen provocation, 45 produced negative responses to the AIR test (specificity, 84.9%). The specificity of egg white IgE RAST score and skin-prick test are 88.7 and 81.3% which are comparable to that of the AIR test. However, their sensitivity was low (38.6 and 66.7%). In the patterns of symptom developed in the provocation AIR displayed late and delayed type allergic responses in addition to the immediate type which RAST reflected. The RAST-negative group composed of 98 patients included 51 (52.0%) who exhibited positive reactions to the provocation test. Among these 44 responded positively to the AIR test (86.3%). The AIR test is effective for screening egg white antigen as part of the tests for antigens responsible for allergic diseases and as a test to ascertain the relevant antigens, and that the conditions that could not be diagnosed by RAST can be detected by the AIR test.
| null |
minipile
|
NaturalLanguage
|
mit
| null |
[Correspondence] Iran, sanctions, and collaborations
March 20, 2016
The Lancet 387, 10023 (2016)
Author: Reza Afshari, Raj S Bhopal
In their letter, Rezaee-Zavareh and colleagues1 (Jan 2, p 28) ascertained that international collaboration in medical research was comparatively scarce in Iran, possibly because of sanctions, and argued that lifting sanctions might improve the quality and quantity of Iranian scientific research. Although this argument might be true, their figure1 shows that, in 2005–14, the rate of growth of international collaboration in Iran was similar to that in Israel and Egypt, lower than that in Saudi Arabia, and greater than that in Turkey, which was not under sanctions—suggesting that sanctions in Iran did not affect such collaboration.
| null |
minipile
|
NaturalLanguage
|
mit
| null |
The present invention generally relates a sanding block. More specifically, the invention relates to a multi-surface sanding block with a self-locking mechanism for sandpaper.
Existing sanding blocks typically use only one sanding surface. Further, adhesive or some other locking system is required to hold the sandpaper to the sanding bock, making manufacturing more expensive and requiring more setup time for use.
As can be seen, there is a need for a multi-surface sanding block that is less expensive to manufacture and use.
| null |
minipile
|
NaturalLanguage
|
mit
| null |
Fueled by fear and rancor, civility has gone AWOL, which in turn has sparked a crusade toward direct democracy that elevates the wants of today over the needs of tomorrow.
In the epicenter of this movement is Florida, America’s melting pot, which may soon be turning to pot in a way that could realign politics for generations to come.
Legal in 11 states, decriminalized in 20, and potentially headed to ballot in a dozen more, fresh surveys show that making recreational marijuana legal – with strict restraints and regulations in play -- is already favored by two out of three Floridians. While this sea change would have seemed wholly unimaginable a few years ago, this tidal wave is not only growing – but rolling in.
A new initiative to legalize cannabis, cheered on by America’s super lawyer John Morgan and a diverse coalition of politicians, is headed for the 2020 Florida ballot that has proven kind to voter-driven ballot measures.
Just last year, Floridians took matters into their own hands by passing 11 separate amendments to the state’s Constitution on everything from property rights to felons’ rights. Cumulatively, the initiatives scored an average of 67 percent of the vote, 7 points above the minimum required for passage – led by a measure toughening lobbying rules for former elected officials. (a shocker, right?).
Now things are about to get interesting.
Gov. Ron DeSantis, whose surging popularity continues to disarm doubters and empower believers, leads via a simple philosophical yardstick: Get it right, and get it done.
He says protect our land and water now. Don’t wait another day to address racial injustice. Take on rising seas by taking our heads out of the sand. No one should need approval to buy lower-cost, life-saving prescription drugs from Canada, or anywhere.
The governor, who prefers action over words, now faces a dilemma. How does he deal with an issue he’s spoken against, but one the public hugely favors, at a moment when presidential politics is moving to full roar here? Could this be an opportunity to grow the party, and broaden his popularity, by heeding where Floridians want to go?
It feels so Shakespearian. “To act or not to act … that is the question.”
For starters, three years ago, 71 percent of Floridians voted for physician-prescribed marijuana. (which is now legal in 33 states, and the District of Columbia).
Secondly, the governor is on the short side of not one but four popular ballot issues Floridians will be talking about (and probably voting on) in 2020. Beyond legalizing marijuana, raising the minimum wage, banning assault weapons, and allowing for open primaries might all pass if the election were held today.
Now here’s the kicker.
The governor recently tightened laws to make it more difficult to amend Florida’s Constitution. He argued, not without merit, that direct democracy sometimes threatens good democracy when impulse and emotion triumph over consequence and common sense. Cue Brexit here.
All of which begs this question: If legalization is not only inevitable but imminent, should the governor fight to stop it, go neutral, or swiftly move to control it?
The marijuana legalization initiative most likely to succeed (two have been filed) was predicated on lessons learned from states where it’s already legal. Sale of recreational marijuana is limited to those over 21; no use is permitted in public areas; ads directed at minors are prohibited; and all tax revenue (hundreds of millions a year, or more) will be available to fund vital Florida priorities.
The last point is suddenly more relevant, as the state’s top economist warned that state revenue could be $867 million less than previous projections over the next two years.
One thing is abundantly clear. The decision on recreational marijuana will not be the governor’s (or the Legislature’s) to make if they are unable to forge -- and pass – enabling legislation in the 60-day session beginning in January. Short of that, Florida voters will step in and probably make the call on next fall’s ballot. Their verdict could impact a lot of careers (including President Donald Trump’s) in a bellwether state in the ultimate bellwether election.
We live in fast and changing times, when movements meld in the blink of an eye, and opinions swing at the speed of a Tweet. In Florida, long-held beliefs have shifted just as quickly, on everything from offshore drilling and on-shore gaming to same-sex marriage.
Ready or not, cannabis reform is set to occupy center stage, and the audience pining to see the show will be standing-room only.
And just when you thought 2020 couldn’t get any more interesting.
Adam Goodman is a national Republican media consultant based in St. Petersburg and the first Edward R. Murrow Fellow at Tufts University’s Fletcher School of Law and Diplomacy.
| null |
minipile
|
NaturalLanguage
|
mit
| null |
Q:
Неявная привязка модели к роуту (Route Model Binding) в Laravel если на фронтенде слаги а в админке - id
Здравствуйте. В проекте на Laravel планирую использовать неявную привязку модели к роуту (Route Model Binding) , но возникает проблема, что на самом сайте для пользователей нужно использовать слагы, а в админки сайта - id.
Если я в моделях определю метод getRouteKeyName() для установки ключа 'slug' тогда уже в админпанели не смогу использовать метод find() который будет принимать id:
public function getRouteKeyName()
{
return 'slug';
}
Есть ли какое то оптимальное решение такой проблемы?
A:
Никаких проблем не будет. find() (Find a model by its primary key) всегда ищет объект по первичному ключу. А getRouteKeyName() (Get the route key for the model) используется роутингом для поиска объекта. То есть, они никак не связаны.
Или вы хотите, чтобы работали урлы и с slug и с id? Думаю, самым простым будет сделать разные маршруты. Вам в любом случае надо будет контролировать права доступа.
| null |
minipile
|
NaturalLanguage
|
mit
| null |
Q:
What prevents a CD-R from being rewritten?
I know it's kind of a dead / dying technology, but I was wondering what stops a CD-R from being rewritten like a CD-RW.
Is it some sort of firmware on the disc, essentially in place to make people buy more CDs?
Or is there a more technical reason, ie. CDs store their data magnetically (correct?) but CD-Rs have less magnetism, so once it has been written to, that's it? (Sorry if that's completely wrong; I have no idea how CDs work.)
A:
Data on a regular CD is stored by making pits (holes), or not-holes (lands), on the CD medium. The pits disturb the reflection of light. Transition from a 0 to a 1 or vice versa is determined by the start or end of a pit (this is called NRZI encoding). There is further complication as these bits are the "channel code", not the content bits; the latter are recovered by decoding the former. And then some of the "content" bits are really Error Correction Code bits. But ultimately, the bits are encoded via holes or not-holes in a reflective layer of metal, usually aluminum.
A CD-R works somewhat the same. It has a reflective surface, but this surface is covered by a dye. You can use a relative high intensity LASER to heat up the dye layer and turn it opaque. Afterwards the CD-R can be read in the same was as a normal CD. Light is either reflected or not.
CD-RW's work in the same way, but use a paint which can be turned opaque or not depending on the heat of the LASER.
Unlike the dye in CD-RW's, the Dye in a CD-R can not be reverted to its previous state. This is what prevents rewriting to an already written CD-R.
Note: Rewriting with the same image or a image with only the right bit changed would seem to be technically possible, but there are limits as to what could be done. The best you could do would be to burn a "pit" in the middle of a long "land". Since lands have a maximum length of ten bit-times, and both pits and lands have a minimum length of three, this would only be possible where an existing land was nine or ten bits long, and the only possibility would be a pit three or four bits long. Doing this would add two bit flips, and this in turn would necessitate changing ECC bits at other places in the same block. The chances that every such change could be done by adding a pit in the middle of a land are very, very small, even if there was software or drive firmware that would allow the attempt.
A:
A CD-R disc cannot be used again, but it might be possible to delete existing data.
The disc comes out of the box reflective, but then your drive burns the solid thin chemical dye layer below the plastic and "roughens" it so it becomes slightly transparent. This makes the light disperse when a laser hits it, thus it counts as a zero essentially since the laser gets little light back. There is no way to fix this burned area and make it reflective again. The only way to wipe the data, is to turn 01011010 into 00000000.
Asus makes software called E-Hammer that may work with non-Asus drives:
E-Hammer allows you to permanently delete the data on writable disc (CD-R and DVD-R) formats. Once the data is deleted, it cannot be recovered or restored, and the optical drive will not be able to read the disc. This ensures data security, eliminates the hassle of scratching your old discs, and conforms with our commitment to environmental protection.
If there were software that would just make the laser burn 0's across the disk and ignore the formatting and toc etc., the data is gone. DD in Linux can probably do it.
| null |
minipile
|
NaturalLanguage
|
mit
| null |
A classic game of chess.
In the original German, zugzwang means any situation where you face external circumstances that force you to act. But the word has been adapted into a chess term, where it does mean a situation where you can’t act without being damaged by the result.
50 Life Quotes From Famous Authors That Prove Everyone Has Bad Days
These best life quotes from famous authors prove everyone has bad days, and that no matter how stressful it can seem - you'll get through it in one piece. If you need to feel inspired, these famous literary quotes will help.
| null |
minipile
|
NaturalLanguage
|
mit
| null |
Monday marked the final day of the NFL Scouting Combine as almost 70 defensive backs went through speed and agility drills, as well as on-field workouts. He may be fighting to stay in the first two rounds now. Chubb, on the other hand, did a lot more drills than Michel. After measuring just under 6-0, he timed as fast as 4.37 seconds then looked solid during positional drills. [Full Article...]
Because research shows that having one overdose is a good predictor of having another, the data presents an opportunity for targeting prevention efforts-like giving overdose reversal drug naloxone to family members and guiding the overdose victim to treatment-say CDC researchers in an accompanying commentary . [Full Article...]
But it's great; it gives the younger ones something to look up to: "Hey, you can do this, too'". They will play No. 8 SC or 19th-ranked Georgia on Sunday. The SEC's best 3-point shooters struggled outside the arc, and the Bulldogs couldn't overcome South Carolina's dominance in the paint with Teaira McCowan limited by foul trouble most of the first half. [Full Article...]
As well as setting people up for a lifetime of ill health, treating obesity is costing the NHS around £6bn per year. United Kingdom public health and social care minister Steve Brine said: "There can be no doubt that obesity is now one of our greatest challenges - one that is fuelling an epidemic of preventable illnesses like type 2 diabetes and cancer". [Full Article...]
During the tiff, the son allegedly bit Qureshi. Since then he has been watching movies and porn, particularly during night, much to his father's anger. The teenager was rushed to a private hospital nearby. Pahadishareef inspector P Laxmikanth Reddy said, "Qayyum was not happy with his son's addiction to mobile phone". [Full Article...]
The stand-in captain said that the Indians, without many star names who have been rested, don't have the upper hand as the shortest format of the game is unpredictable. If you missed the live match, the JioTV provides an ability to watch repeat telecast and special highlight packages. Dinesh Chandimal: It looks like a good pitch. [Full Article...]
The study consisted of saliva and urine tests from 67 e-cigarette-only San Francisco-area users, 16 users of both cigarettes and e-cigarettes, and 20 age-matched controls who had not used e-cigarettes or nicotine, the American Academy of Pediatrics said. [Full Article...]
Josh Hazlewood trapped overnight batsman Quinton de Kock (83) leg before to formalise the last rites that were swiftly administered by Mitchell Starc in a manic over on the fourth evening. That caused the umpires to tell Steve Smith that play could continue if he used slow bowlers. Warner appeared to give both de Villiers and Aiden Markram a spray, presumably critiquing their running betw... [Full Article...]
| null |
minipile
|
NaturalLanguage
|
mit
| null |
Author: quetwo
Date: Fri Jul 20 04:27:22 2012
New Revision: 1363651
URL: http://svn.apache.org/viewvc?rev=1363651&view=rev
Log:
Apache Flex Download Releases Page
Modified:
incubator/flex/site/trunk/content/flex/download.mdtext
Modified: incubator/flex/site/trunk/content/flex/download.mdtext
URL: http://svn.apache.org/viewvc/incubator/flex/site/trunk/content/flex/download.mdtext?rev=1363651&r1=1363650&r2=1363651&view=diff
==============================================================================
--- incubator/flex/site/trunk/content/flex/download.mdtext (original)
+++ incubator/flex/site/trunk/content/flex/download.mdtext Fri Jul 20 04:27:22 2012
@@ -25,7 +25,7 @@ The Apache Flex SDK has some compile-tim
**Please review the release notes before installing or compiling the SDK.**
#Download Apache Flex 4.8.0 (source)
-The Apache Flex team is pleased to offer this 'parity' release, available as of 7/19/2012.
This is the first available Flex SDK under the Apache Licensing model, and is designed to
be compatible with the Adobe Flex SDK versioned 4.6.0.
+The Apache Flex team is pleased to offer this 'parity' release, available as of 7/19/2012.
This is the first available Flex SDK under the Apache Licensing model, and is designed to
be compatible with the Adobe Flex SDK version 4.6.0.
- Release Notes : [RELEASE_NOTES][2]
- Mac OS X Source : [apache-flex-sdk-4.8.0-incubating-src.tar.gz][3] [[PGP](http://www.apache.org/dist/incubator/flex/4.8.0-incubating/apache-flex-sdk-4.8.0-incubating-src.tar.gz.asc)]
[[MD5](http://www.apache.org/dist/incubator/flex/4.8.0-incubating/apache-flex-sdk-4.8.0-incubating-src.tar.gz.md5)]
@@ -33,7 +33,7 @@ The Apache Flex team is pleased to offer
- Documentation : [apache-flex-sdk-4.8.0-incubating-asdocs.zip][5]
#Download Apache Flex 4.8.0 (binaries)
-Binaries are provided as a convenience for those who do not wish to compile the SDK themselves.
The 4.8.0 binaries were published on 7/19/2012 and are compatible with the Adobe Flex SDK
versioned 4.6.0
+Binaries are provided as a convenience for those who do not wish to compile the SDK themselves.
The 4.8.0 binaries were published on 7/19/2012 and are compatible with the Adobe Flex SDK
version 4.6.0
- Release Notes : [RELEASE_NOTES][6]
- Mac OS X Binaries : [apache-flex-sdk-4.8.0-incubating-bin.tar.gz][7] [[PGP](http://www.apache.org/dist/incubator/flex/4.8.0-incubating/binaries/apache-flex-sdk-4.8.0-incubating-bin.tar.gz.asc)]
[[MD5](http://www.apache.org/dist/incubator/flex/4.8.0-incubating/binaries/apache-flex-sdk-4.8.0-incubating-bin.tar.gz.md5)]
@@ -62,7 +62,7 @@ All of the above dependencies can automa
If you are planning on compiling the source code, you will need the following components.
More details are available in the README file in the downloaded package. Some of these components
have licenses that differ from the Apache License.
- - Java SDK (1.5 or 1.6)
+ - Java SDK 1.5 or 1.6 (compatibility with 1.7 will be in a future release)
- ANT 1.7.0 or greater
- Adobe AIR Integration Kit
- Adobe Flash Player Content Debugger / Adobe Flash Player
| null |
minipile
|
NaturalLanguage
|
mit
| null |
Capitol police are working with state and local agencies to plan for the possibility that large crowds will again descend on the Capitol as the Legislature considers Gov. Scott Walker's budget bill.
Jodi Jensen, executive assistant to Administration Secretary Michael Huebsch, said in an email that "law enforcement agencies are aware of the possibility that the Capitol police will request assistance" if large groups of protesters show up in Madison.
"Staffing level changes at the Capitol will be made based on an ongoing evaluation of security needs," Jensen said.
A City of Madison panel on Friday gave protesters permission to build a tent city outside the Capitol, from which they would stage protests as the Assembly and Senate take up the budget.
In February, huge crowds showed up at the Capitol to protest Walker's separate budget-repair bill, including provisions that would have curtailed collective bargaining for most public sector employees. The bill to pay law enforcement officials from all over the state cost taxpayers at least $7.8 million.
At the time, Huebsch instituted the Emergency Police Services system. That system authorizes the state Division of Emergency Management to contact local law enforcement agencies to provide assistance. More than 200 law enforcement agencies provided officers for security at the Capitol.
Jensen said the EPS system could be implemented again if needed. EPS officials have been alerted to that possibility, said Lori Getter, a spokeswoman for the Division of Emergency Management.
On Friday, Madison's Street Use Commission approved a permit filed by We Are Wisconsin to occupy Mifflin St. and Carroll St. on the Capitol Square, along with performance space at the top of State St.
We Are Wisconsin, along with union groups, wants to set up a "Walkerville" tent city beginning Saturday and continuing for as many as 17 days.
The committee approved the group's application under the condition that the group successfully applies for a separate campground permit and that most of the tents get taken down during the day.
Republican lawmakers are skeptical of turnout.
"I think a lot of the enthusiasm has waned," Sen. Glenn Grothman (R-West Bend) said. "But there will always be a lot of people in Dane County who think the rest of the state is the cow and they are the farmer."
Miles Kristan, a member of the Autonomous Solidarity Organization, said participants will pick up where they left off during the earlier protests.
"We slept on the cold marble floor in the middle of winter. We can manage to sleep outside in tents now," Kristan said.
| null |
minipile
|
NaturalLanguage
|
mit
| null |
derivative of g(c) wrt c?
-60*c**2
Let b(g) = -g**3 - 3*g**2 + 3*g. Suppose 4 = -2*w + w. Let a be b(w). What is the second derivative of -2*q**3 - 3*q**3 + 3*q**3 + a*q - 3*q wrt q?
-12*q
Suppose 9*m = 11*m - 12. What is the second derivative of -14*k + m*k**3 + 21*k - 10*k wrt k?
36*k
Find the first derivative of -3*q**2 - 18 + 17 - 6*q**2 wrt q.
-18*q
Let v(c) be the second derivative of 3*c**6/10 - 3*c**2 + 6*c. What is the derivative of v(w) wrt w?
36*w**3
Let k = -4 + 9. Suppose j = k*j. What is the second derivative of j*s + 4*s**2 - 6*s**2 + s wrt s?
-4
Let z(c) = -211*c**3 + 8*c - 122. Let b(s) = 70*s**3 - 3*s + 41. Let w(g) = -8*b(g) - 3*z(g). Find the first derivative of w(m) wrt m.
219*m**2
What is the second derivative of -l**2 + 2*l + 0*l + 0*l**2 wrt l?
-2
Let n(c) be the third derivative of 0*c**5 + 0*c**3 + 1/12*c**4 + 1/60*c**6 + 0 + 0*c - c**2. What is the second derivative of n(q) wrt q?
12*q
Let f(x) be the second derivative of 9*x**5/4 + 39*x**2/2 + 37*x. Differentiate f(y) with respect to y.
135*y**2
Let v(r) = 12*r**3 - 16*r - 5. Let i(n) = 6*n**3 - 8*n - 3. Let m(w) = 5*i(w) - 3*v(w). Find the second derivative of m(l) wrt l.
-36*l
Let a(h) = 38*h**3 + 17*h**2 + 17*h + 79. Let v(i) = 13*i**3 + 6*i**2 + 6*i + 26. Let w(p) = 6*a(p) - 17*v(p). What is the derivative of w(c) wrt c?
21*c**2
Suppose 2*x - 9 = 1. Let o = x - 5. Find the second derivative of 2*q**3 + q**3 + 3*q + o*q**3 wrt q.
18*q
Let u(g) = -g**3 - g + 1. Let o(r) = 6*r**2 - 3 + 6*r**3 - 3*r**2 + r + 2*r. Let j(n) = -2*o(n) - 6*u(n). What is the third derivative of j(d) wrt d?
-36
Suppose 6*c - 4*c - 4 = 0. What is the third derivative of -7*o**4 + o**2 - 4*o**2 - c*o**2 wrt o?
-168*o
Let s be 2/6*3*2. Suppose -s = -j + 3. Differentiate -2*o**4 - 6 + j + 3 wrt o.
-8*o**3
Let b(o) be the first derivative of 26*o**5/5 - 11*o**3/3 - 7. What is the third derivative of b(w) wrt w?
624*w
Let u(h) = -42*h**4 + 6*h**3 - 6*h**2 - h - 68. Let f(w) = 126*w**4 - 17*w**3 + 17*w**2 + 3*w + 203. Let b(p) = 6*f(p) + 17*u(p). Differentiate b(x) wrt x.
168*x**3 + 1
Let x(h) be the third derivative of -3*h**7/35 + h**3 + 23*h**2. Find the first derivative of x(f) wrt f.
-72*f**3
Let m = -14 - -19. Find the third derivative of -2*w**6 + 0*w - w + m*w**2 + w wrt w.
-240*w**3
Let b(n) be the second derivative of -n**8/8 + n**4/2 - 5*n. What is the third derivative of b(c) wrt c?
-840*c**3
Let x(l) be the first derivative of -1/2*l**2 + 3*l + 3. What is the derivative of x(q) wrt q?
-1
Let x be ((-21)/6)/(2/(-12)). Suppose -11 = -5*z - w, 0 = 3*z - 0*z - 3*w - x. What is the second derivative of v**5 - v - z*v**5 + 2*v wrt v?
-40*v**3
Let h(m) be the third derivative of -m**7/14 + 7*m**5/60 + 15*m**2. Find the third derivative of h(f) wrt f.
-360*f
Let g(q) = 3 - 2 - q - 2. Let l be g(-3). What is the derivative of 1 + l*j + 2*j - 2*j wrt j?
2
Find the first derivative of 5 + 0 - 2*q - 1 + 0*q wrt q.
-2
Find the third derivative of 10*u - 44*u + u**2 + 10 - 10 + 10*u**3 wrt u.
60
Let q(f) = f**4 - f**3. Let p(v) = v**4 + v**3 + 8*v**4 + 10*v**2 - 3*v**3. Let s(a) = -p(a) + 2*q(a). What is the third derivative of s(i) wrt i?
-168*i
Let r(p) be the third derivative of 11*p**8/112 - 7*p**5/12 + 6*p**2. What is the third derivative of r(g) wrt g?
1980*g**2
Suppose 7 = 4*t + 3. Let n(a) = 3*a + a**2 - 3*a - t + 0*a**2. Let f(o) = -o**2 + 4. Let s(q) = -f(q) - 2*n(q). What is the derivative of s(k) wrt k?
-2*k
Let g(k) = k**3 + 2*k**2 + 2*k + 1. Let x(j) = -9*j**3 - 21*j**2 - 21*j - 9. Let m = 2 - 0. Let a(t) = m*x(t) + 21*g(t). Differentiate a(r) with respect to r.
9*r**2
Suppose 0 = 2*h, -26 - 6 = -4*u - h. Let j(p) = -p**3 + 9*p**2 - 7*p - 3. Let m be j(u). Find the second derivative of -3*l - 3*l + 2*l**m + 5*l wrt l.
40*l**3
Find the second derivative of 20*w**3 + 32*w - 47*w + 2 - 5*w**3 wrt w.
90*w
Let o(d) be the second derivative of 25*d**4/12 - d**3/3 - 27*d**2/2 - 3*d + 3. What is the first derivative of o(s) wrt s?
50*s - 2
Let l(c) be the first derivative of 3*c**5 - 18*c**2 - 14. What is the second derivative of l(r) wrt r?
180*r**2
Suppose -v = 3*v - 8. Suppose -2*u = -3*u + 4*w + 22, 5*u + w = 5. What is the second derivative of 2*z + u*z - v*z - z**4 wrt z?
-12*z**2
Let o(p) be the second derivative of 1/6*p**4 + 2*p - 1/3*p**3 + 0 + 0*p**2. What is the second derivative of o(i) wrt i?
4
What is the first derivative of -1 - 3*h**4 - 25*h + 25*h wrt h?
-12*h**3
Let k(x) be the first derivative of -4*x**3/3 - x - 8. Differentiate k(m) with respect to m.
-8*m
Let z(s) = -14*s**5 + 27*s**2. Let b(c) = 7*c**5 - 14*c**2. Let m(y) = -5*b(y) - 3*z(y). What is the third derivative of m(g) wrt g?
420*g**2
Let y(k) = 13*k**4 + 29*k**2 + 4*k + 4. Let w(s) = -12*s**4 - 29*s**2 - 5*s - 5. Let g(q) = 4*w(q) + 5*y(q). Find the third derivative of g(z) wrt z.
408*z
Let a = 9 - 4. What is the third derivative of 5*r**2 + a*r + 5*r**6 + 0*r - 5*r wrt r?
600*r**3
Let k(y) = 28*y**4 + 7*y**3 - 14*y. Let w(j) = -9*j**4 - 2*j**3 + 5*j. Let m(b) = 2*k(b) + 7*w(b). What is the second derivative of m(h) wrt h?
-84*h**2
Let j be 1*(16/4 + 3). Let t = -3 + 5. What is the third derivative of -5*p**2 - 3*p**3 + j*p**2 - p**t wrt p?
-18
Let g(v) be the first derivative of v**6/30 - v**5/60 + 4*v**2 + 3. Let h(b) be the second derivative of g(b). Find the third derivative of h(d) wrt d.
24
Suppose 3 = j - 0*j. Suppose -5*z + 5 = -3*y, -j*z = -2*y - 5 + 3. What is the second derivative of -h + 3*h - 6*h**3 + z*h**3 wrt h?
-12*h
Let d(y) be the first derivative of 2*y**5/5 - 2*y**3/3 - 3. What is the third derivative of d(r) wrt r?
48*r
Let t(n) = -n - 1. Let f(j) = -12*j - 15. Let o(s) = -f(s) - 2*t(s). What is the first derivative of o(i) wrt i?
14
Let z(v) be the first derivative of v**4/3 + 3*v**2/2 - 6*v + 9. Let q(d) be the first derivative of z(d). Differentiate q(c) wrt c.
8*c
Let z = 23 - 21. What is the third derivative of 1 + 4 - 5 - 4*f**3 + 6*f**z wrt f?
-24
Let s(a) be the third derivative of -2*a**2 - 1/6*a**5 + 0*a**6 + 0 + 0*a + 1/112*a**8 + 0*a**7 + 0*a**4 + 0*a**3. Find the third derivative of s(m) wrt m.
180*m**2
Let s be (-3)/(-3) + (-1)/1. Suppose r + 3*z + 2*z = 10, s = 4*r + z - 2. What is the third derivative of r*k**2 - 2*k**2 + 2*k**5 + 0*k**2 wrt k?
120*k**2
What is the second derivative of 5*w + w**4 + 5*w - 12*w - 2*w**4 wrt w?
-12*w**2
Let g(r) be the second derivative of 0 + 1/4*r**4 + 0*r**2 + 0*r**3 - 2*r - 3/20*r**5. Find the third derivative of g(z) wrt z.
-18
Let g(u) be the third derivative of 2*u**9/21 - u**5/30 + 7*u**4/12 - 51*u**2. What is the third derivative of g(i) wrt i?
5760*i**3
Let n(w) be the first derivative of -w**6/60 - w**3/2 + 2*w**2 + 3. Let a(g) be the second derivative of n(g). Differentiate a(d) wrt d.
-6*d**2
Let d(q) be the first derivative of q**6/60 + q**4/24 - q**3/3 - 2. Let j(s) be the third derivative of d(s). What is the derivative of j(u) wrt u?
12*u
Let v(n) be the third derivative of -n**5/40 - n**4/6 - 2*n**3/3 + 3*n**2. Let r(c) be the first derivative of v(c). What is the first derivative of r(h) wrt h?
-3
Let q be (-50)/(-6) - 2/6. Let z = 12 - q. What is the second derivative of -2*w**z + 5*w + w**5 + 2*w**4 - 3*w wrt w?
20*w**3
Let c(m) be the second derivative of -13*m**6/30 + 3*m**2 - 3*m. Differentiate c(i) wrt i.
-52*i**3
Find the second derivative of a**3 - 4*a + 12*a + 15*a - 3*a**3 wrt a.
-12*a
Find the first derivative of -2 + m**2 + 3 - m**2 - m**2 wrt m.
-2*m
Let t(g) be the first derivative of g**8/1680 + g**5/30 - g**3/3 - 1. Let u(o) be the third derivative of t(o). Find the second derivative of u(h) wrt h.
12*h**2
Let h(t) = -t**2 + 1. Let z(g) = -16*g**3 - 4*g**2 - 17*g + 4. Let n(j) = 4*h(j) - z(j). Find the second derivative of n(v) wrt v.
96*v
Let t = 2 + 0. Find the third derivative of 4*j**6 + 10*j**t - j**6 - 4*j**2 wrt j.
360*j**3
Let o(r) be the second derivative of r**7/6 - r**3/2 - 8*r. Find the second derivative of o(z) wrt z.
140*z**3
Let i = -22 - -24. Let s(a) be the second derivative of -a + 0 - a**i - 1/3*a**3. Differentiate s(f) with respect to f.
-2
Let q(u) be the third derivative of 0*u**4 - 1/70*u**7 + u**3 + 0 + 0*u**6 - 2*u**2 + 0*u**5 + 0*u. What is the first derivative of q(z) wrt z
| null |
minipile
|
NaturalLanguage
|
mit
| null |
Spider-Man slowly made his way between the empty aisles of snack foods and cereal, keeping as low to the ground as he could. The wide variety of high-quality products at reasonable prices was little comfort against the midnight darkness and lack of smiling employees willing to do their best to solve any shopping problem. Spider-Man had seen the Green Goblin fly into this supermarket, and was determined to stop him once and for all. Or was it the Hobgoblin? Spider-Man could never keep those two straight.
Spider-Man got to the end of the aisle and turned down the next as a crackle sounded from the store’s P.A. system, followed by the jarring shriek of the Green Goblin, or possibly the Hobgoblin. “Peter Parker picked a peck of pickled peppers.”
The voice surprised Spider-Man. How had whichever Goblin that was known his real name? Or maybe he was supposed to know his real name. Spider-Man wasn’t sure which continuity he was in. Maybe Peter Parker was well-known enough as a photographer in this reality that the Goblin would choose that name at random to taunt Spider-Man with? The voice came through the speakers again. “A peck of pickled peppers Peter Parker picked.”
Of course, Spider-Man had known for some time now that his mortal foe was really Norman Osborne, the millionaire businessman who had partially filled in the role of father figure for Spider-Man after the death of his uncle Ben. Or was he Harry Osborne, Spider-Man’s roommate and closest confidante? Spider-Man wasn’t entirely certain of where in the timeline he sat either. “If Peter Parker picked a peck of pickled peppers…”
Was this one of the comic continuities, or the movie? Maybe it was the cartoon? Which cartoon? What if Spider-Man was in a novelization of non-canon action that was supposed to have happened between two of the movies which some random kid online had decided to make a flash video out of? Was he being uploaded to Newgrounds right at that very moment? Spider-Man wished Stan Lee would show up to explain everything like he had in Mall Rats. Or was that Chasing Amy?
Wait, his Spider Sense flashed, telling him that something would be happening to– the shelf of canned vegetables before Spider-Man burst forward revealing the green (or possibly orange: Spider-Man had a hard time telling in the darkness) mask of his foe as he stood menacingly on his hoverboard and cried “Then where are the pickled peppers that Peter Parker picked!?”
Spider-Man jumped backwards with the prescience his Spider Sense allowed him, landing on top of the next shelf over as jars of food flew everywhere. In the darkness, one jar flashed at him and he instinctively jumped from his perch, flicked his wrist, and shot a string of web to catch the jar as he flipped through the air. Before he landed, he managed to fling the jar straight at his enemy’s head.
The shattering of glass and plastic masked the sound of the Goblin’s shriek of pain as he fell from his ride and lost consciousness. Spider-Man stood among the toppled foodstuffs, waiting in the darkness for all movement to settle before restraining the prone super-villain before him. Spider-Man wasn’t sure whether or not this man had caused him to kill Gwen Stacy, or if that had happened yet, or even if it was supposed to happen at all. But he did know that there was a madman before him that needed to be brought to justice, however much it pained Spider-Man.
As Spider-Man began to wrap one Osborne or another in webbing, cracked glass that was held together only by a sticker label began to outweigh the sticky webbing that was holding it to the shelving unit behind him. The glass fell with a crunch, label-side up, and revealed the last words that the Goblin had seen before he lost consciousness: “Pickled Peppers.”
| null |
minipile
|
NaturalLanguage
|
mit
| null |
Head and neck squamous cell carcinoma (HNSCC) is a debilitating disease with few molecularly-based therapeutics. Recent genomic studies of HNSCC have identified numerous genomic alterations, but the alterations are dominated by tumor suppressor genes and untargetable oncogenes. Nevertheless, we hypothesize that novel molecular therapeutic targets are present in HNSCC and that these targets exist in parts of the data that have not been effectively analyzed. We propose to combine existing genomic data with computational approaches and in vivo pathway analysis to identify novel candidate targets in HNSCC. These candidate targets will be functionally tested in a high-throughput in vivo screening system in HNSCC lines with known genotype. Validated targets will be tested for genotype co-dependencies, and any known drug targets will be tested in preclinical xenograft models. Targets that are not currently druggable will have their pathways computationally and experimentally analyzed for additional targets that will be functionally tested. All experiments wil be performed in vivo in genomically characterized models. We aim to generate an extensive list of functionally validated novel targets for HNSCC that will be candidates for drug development pipelines.
| null |
minipile
|
NaturalLanguage
|
mit
| null |
They cheered him, but only after booing him.
They stood, but not all of them, and not immediately, and not for long.
He surely heard them, but never acknowledged them.
LeBron James passed Michael Jordan to move into fourth place on the NBA’s all-time scoring list Wednesday night, leaping over the legend in a monumental accomplishment that felt like an enormous dud.
Epitomizing this embarrassment of a season, the history-rich Lakers couldn’t even enjoy making history.
It wasn’t the franchise’s fault. The Lakers did everything they could to make it a special moment. The NBA wouldn’t let them stop the game immediately, so at the first stoppage of play after James’ layup against the Denver Nuggets with 5 minutes 38 seconds to play in the second quarter gave him 32,294 points — two more than Jordan — an attempted celebration ensued.
The scoreboard displayed a video. Lawrence Tanter boomed an announcement. The timeout gave everyone time to soak it in.
But nobody soaked. Everyone just sort of stared. James sat on the bench with a towel over his eyes, seemingly in tears, three seats between him and anyone else, starkly alone. The fans stood and cheered, but it was mostly politely, and somewhat uncertainly, as if they were applauding an impromptu speech given by a distant uncle at an acquaintance’s wedding.
Lakers’ LeBron James, left, is congratulated by Rajon Rondo after his basket against the Denver Nuggets passing Michael Jordan on the all-time scoring list on Wednesday at Staples Center. (Wally Skalij / Los Angeles Times)
James was never given the game ball. The fans were never given any indication that James even knew they were there. Once play resumed, any thoughts of the milestone disappeared while a sullen truth was once again revealed.
Even six months into his first season as a Laker, James isn’t yet a Laker. The fans don’t consider him family. His team doesn’t consider him their leader. His lack of physical and emotional investment in the basketball portion of his great Los Angeles adventure is paying the sad dividends of a man who, on the court, appears very much distant and alone.
This truth was obvious Wednesday not only in the weird environment, but on that colorful scoreboard, where nearly all of his highlights were accomplished in the uniforms of the Cleveland Cavaliers and Miami Heat.
Sign up for our daily sports newsletter »
His records are not Lakers records. His greatness is not yet Lakers greatness. He may have scored more points than Jordan, but he is going to fail to lead his first Lakers team even into the playoffs, and that’s all that matters to this town.
He has been a big hit in Hollywood, but the Lakers aren’t Hollywood, they are Olympic and Figueroa. Their fan base is not this town’s glitz, they are its heart, and that heart has rarely been more hurting than it has been at the end of a season that began with such optimism and is ending with such gloom.
This night, which concluded with the Lakers losing for the 14th time in 19 games in a 115-99 defeat to the Nuggets, began with fans booing James as he missed four first-quarter free throws. He missed them without a make, equaling the worst free-throwing shooting in one quarter in his career.
The only surprise about the booing was that it was not a surprise. James was individually booed for the first time Monday in a Lakers loss to the Clippers. He surely will be booed again. While his stat line remains strong, his failure to play defense, make free throws and display any sort of leadership has drawn the public’s ire.
It was several years before most fans dared boo Shaquille O’Neal or Kobe Bryant, but they will not cut James the same slack. From his initial decision to forgo an introductory news conference last summer to his Culver City prank pizza tweet to his pregame announcements of movie releases in the middle of playoff pushes, he has never really reached out to the fans, and now they are holding him accountable for the Lakers’ failure.
On probably the most unusual milestone night in Lakers history, so much felt different, so much was lost.
This passing of Jordan should have been another brick in the foundation of a local debate that James is the greatest player ever. Instead, because James scored less than 5% of his points as a Laker, it’s a debate that works better in Cleveland. In fact, considering James’ lack of impact here, it would have made more sense if James had passed Jordan while still in Cleveland.
James is also now, quite reasonably, three more seasons from becoming the league’s all-time leading scorer. But even with this monumental history looming, Lakers fans are focused on a different, more uncomfortable milestone.
At his current rate, James will easily pass Bryant next season for third place on the all-time list — with 32,311 points, he’s 1,332 points behind, and he has averaged 2,042 points in the previous three seasons.
On the night he passes Bryant, if the Lakers are still struggling, can you imagine how conflicted fans will be? If it happens in Staples Center, Bryant would show up and who do you think would get the most cheers? At this rate, James should probably plan on doing it on the road. Interestingly, the NBA allowed the game to be stopped when Bryant passed Jordan in 2014 in Minneapolis.
Maybe the saddest part of Wednesday is that this really meant a lot to James, and he wasn’t able to share it with anybody.
Before the game, he tweeted, “Can’t even front. This is going to be UNREAL!! Wow man.”
Then, before entering the game, he wrote Jordan’s name on his shoes.
After scoring the Jordan-jumping points, James’ feelings were on display when he sat on the bench hiding his eyes in that towel.
“It was very emotional, very emotional, lot of things going on inside me at that point in time,” James said. “At the same time, I didn’t want to show what was going on behind that towel.”
You could hear that same emotion afterward when he talked about modeling his career after Jordan.
“For a kid from Akron, Ohio, that needed inspiration and needed some type of positive influence, MJ was the guy for me,” James said. “I watched him from afar, I wanted to be like MJ. … I wanted people to look at me at some point like MJ. It’s crazy, to be honest, it’s beyond crazy.”
On a night when James’ career point total surpassed Jordan’s, it felt as if Lakers history was made by a visiting player without a team, and that is indeed beyond crazy.
[email protected]
Get more of Bill Plaschke’s work and follow him on Twitter @BillPlaschke
| null |
minipile
|
NaturalLanguage
|
mit
| null |
Find girl for sex tonight in Sexland
Joymii Tiffany Fox Passionately Fucks On Seat
"Go get changed then we will have a meeting" Andrei said and I walked out of the store to change my shirt. Samantha and Debra fell in love and I loved them both.
Carmen went to her locker and grabbed a few things. "Now then, Brian said he was taking the lamps they recovered from Alex back to put them with the others," she said.
Malloy was calling in for help because he was under attack. She said ok, sheepishly, and I said but there will be plenty of time for that later. I wanted more pictures. Our bodies aren't pressed together and I am staring at a white shirt with a little bit of sweat containing two C cup breasts with hard nipples.
My heart skipped a beat at that moment. "Hi mister, you gonna let me make you cum for me. Clara groaned slightly, but it didn't seem to be from pleasure.
"Carmen, come over here quickly" Andrei called and Carmen walked over and I stood next to Andrei. Robert, I really like Suzanne.
It's been a terrible couple years for you and the other Leftards. Have you considered suicide?
Togar
7 months ago
And over diagnosed.
JoJojas
7 months ago
I know what you mean
Gazuru
7 months ago
True. Probably meant the Temple which was an official organisation controlled by Herod.
Voodookree
7 months ago
I know people who order steel by the hundred of thousands of tons every year. The company he works for bought Tons of surplus over Obama's last two years (It was dirt cheap cause Obama was a good negotiator with china, watch me catch hell for that one comment) and stored it and are now using those stores to kill their competition. The reason they bought so much? "Because republicans will maintain power for the next election cycle whether they win or lose the presidency. They are are great businessmen nationally but as soon as they go into the world they screw everything up. Their problem is two fold. They think anyone who doesn't speak english is inferior and they think themselves indispensable to everyone else." Conundrum for conservatives: This guy talked bad about you but is making bank on your predictable behaviour. Is he a liberal elite or job maker? taking bets now!
Tonris
6 months ago
The true attack is on sex education / womens healthcare and birth control, christianity has always been of the view point the more women at home breeding more cultists / christians the better which is why the catholic church for example is against even using condoms
Male
6 months ago
you are in your 90's?
Akinole
6 months ago
Turkey is not a war zone, there is no immediate danger to flee from.
Kijinn
6 months ago
Falsifiability is not the only element of a good explanation. A good explanation is hard to vary, in that all of the pieces have to work together. A hard-to-vary explanation is even more falsifiable, per se, because one only has to disprove a single element of it.
Gular
6 months ago
So what you are saying is American Law ? ?? ??
Moogujas
6 months ago
it sounds more like teenage drama and maybe even fictional. if its true you need help. if you created the profile just to do a "soap-opera-like" story then cool.
Vugor
6 months ago
There is no such thing as a "gay" wedding cake. Wedding cakes are wedding cakes. The baker made wedding cakes.
Goltilkis
5 months ago
No. Rather, going down the road where you select which scientifically verifiable human should be granted human rights and which should not is both dangerous and despicable. Starting to rank scientifically verifiable humans as "more human" or "less human" has been shown to lead to tragedy and terror. Historically, it hasn't been a slippery slope, but a cliff.
Gabei
5 months ago
LOL. I can see her clawing away from death's grave at the thought that Trump would be the guy to appoint her replacement.
Tojagis
5 months ago
Wayameen lmao... just kidding. I got my Amy's mixed up. I just remembered Clueless Amy is Heckerling and Uncharted Amy is Henning. But lmao Amy Henning is an awesome writer for video games.
Tushicage
5 months ago
Insurance, you see. Our friend Creflo can deflect the demon away from us. But only for a certain length of time, of course.
Voodoogis
5 months ago
Evangelicals and "White" Catholics (as they are designated in the report) are not the sum of all Christians...
Mekazahn
4 months ago
It may be that Mr nice guy is not so nice in doors. He could be very controlling and she may be reserved as he is the boss.
| null |
minipile
|
NaturalLanguage
|
mit
| null |
The effect of Qat chewing on blood pressure and heart rate in healthy volunteers.
The leaves of the Qat plant (Catha edulis Forsk., Celastraceae) which contain amphetamine like compounds are widely chewed in Yemen and East Africa for their pleasurable stimulant properties. There are also a number of unwanted side-effects and this paper studies the effect on heart rate and blood pressure in 80 healthy volunteers. During a 3-h period of chewing fresh Qat leaves there was a significant and progressive rise in systolic and diastolic blood pressure and heart rate, and levels had not returned to baseline 1 h after chewing had ceased. Further studies are needed on possible cardiovascular morbidity associated with regular Qat chewing.
| null |
minipile
|
NaturalLanguage
|
mit
| null |
Q:
How to print last character of a file
In Unix, using a simple command like sed, is there a way to print the last character of a file?
A:
tail is the right tool, not sed.
tail -c 1 filename
A:
tail -c 2 file should do it. Should be -c 1 in theory but practice proved me wrong.
Edit:
If your file has a an end of line character that you want to ignore, it's 2. 1 otherwise.
A:
Try this cat filename | tail -c -1
| null |
minipile
|
NaturalLanguage
|
mit
| null |
"I’ve been a customer for over 10 years. You guys and gals are great. And your services
have helped me build my business. I recommend Segway Communications to businesses,
large and small."
- James Wentworth
Real Estate Investor
"I run my entire business through Segway Communications, and you’re the smallest
bill that I pay."
- Christine Alpert
"Our medical practice had grown, and my younger associates wanted an automated voice
attendant. With your system, we have gone from an antiquated, single function system
to a high powered, user friendly device. Your service is superb and will not only
improve our operations, but reduce our costs.” “PS: You need to get a medical marketing
person, probably an untapped market. Many thanks."
- Howard Mintz
M.D.
" I have had your service for several months and it’s the BEST of both worlds. It
allows us to keep our home and cell numbers private. And the $10 we pay each month
compared to the $50 we would pay the phone company for a business line is also a
huge bonus. Anyway I just wanted to say that we love the service and keep up the
good work."
- David Harris
San Antonio Texas
Choose Your Number
Repetitive numbers are easy to remember and sound business-like.
Click the Vanity Number Checkbox and find your perfect new Business Number.
Vanity numbers are only $5.00/mo additional.
Select Country:
Select State/Province:
Search By Area Code:
OR
Search By City:
Numbers ARE available in this city, but a Customer Service Representative will need
to assist you. Please call us at 877.734.9292 or +1.310.478.4949. Thank you.
Or, you can try
Choose Your Number
Vanity Numbers ARE available For Toll Free, but a Customer Service Representative will need to assist you.
Please call us at 877.734.9292 or +1.310.478.4949.
Numbers ARE available in this city, but a Customer Service Representative will need
to assist you. Please call us at 877.734.9292 or +1.310.478.4949. Thank you.
Choose Your Number
Repetitive numbers are easy to remember and sound business-like.
Click the Vanity Number Checkbox and find your perfect new Business Number.
Vanity numbers are only $5.00/mo additional.
Select Country:
Select State/Province:
Search By Area Code:
OR
Search By City:
Numbers ARE available in this city, but a Customer Service Representative will need
to assist you. Please call us at 877.734.9292 or +1.310.478.4949. Thank you.
Or, you can try
Choose Your Number
Numbers ARE available in this city, but a Customer Service Representative will need
to assist you. Please call us at 877.734.9292 or +1.310.478.4949. Thank you.
| null |
minipile
|
NaturalLanguage
|
mit
| null |
To Rob a Thief
To Rob a Thief (Spanish: Ladrón que Roba a Ladrón) is a 2007 Spanish-language film in which two thieves reunite to rob a television mogul. The sequel Ladrones was released in 2015.
Plot
Two thieves plan to rob a businessman who has defrauded many poor families. When none of their affiliates want to go undercover as day laborers to pull off the heist, the two men turn to the real thing for help. Emilio, a Colombian con man, arrives in LA with two weeks to complete his plan to rob a former colleague, Claudio Silvestrini who now poses as Moctezuma Valdéz, who's made a fortune using infomercials to peddle snake oil to Latin immigrants. Emilio's friend Alejandro, who sells pirated DVDs, has assembled a team of amateurs, who, as Alejandro says, will go unnoticed because they're immigrants. The team must gain entry to Silvestrini's well-guarded mansion, steal two keys to access a vault, and then get the money off the property. A father and his tomboy daughter, a nervous Cuban actor, a techie, and a muscle man make up the team, plus Alejandro has been courting Silvestrini's nanny. Will they be enough?
Cast
Fernando Colunga as Alejandro Toledo
Miguel Varoni as Emilio Lopez
Saúl Lisazo as Moctesuma 'Mocte' Valdez
Ivonne Montero as Rafaela
Oscar Torre as Miguelito
Ruben Garfias as Rafa
Gabriel Soto as Aníbal Cano
Julie Gonzalo as Gloria / Dora
JoJo Henrickson as Julio Miranda
Sonya Smith as Veronica Valdez
Lidia Pires as Blanca
Richard Azurdia as Primitivo
Art Bonilla as Coyote
Reception
Ladrón que Roba a Ladrón has received generally favorable reviews. It currently holds a 64% fresh rating on Rotten Tomatoes based on 28 counted reviews. It also holds a 61/100 metascore based on 11 reviews and an 8.2/10 user score on Metacritic.
Release
Ladrón que Roba a Ladrón had a limited release on August 31, 2007 in the United States.
Notes
External links
Category:Spanish films
Category:Films about immigration
Category:Lions Gate Entertainment films
| null |
minipile
|
NaturalLanguage
|
mit
| null |
California’s “Grandfather of Marijuana” Released on Bail
Just weeks before recreational pot use became legal in California, the “Last of the Yippies” Dana Beal was being arrested for trying to transport 22 pounds of marijuana out of Northern California. Beal, known as the “Grandfather of Marijuana,” has been an avid proponent of medical-marijuana. He is no stranger to marijuana related arrests. Beal was previously arrested and convicted of transporting more than 100 pounds of marijuana in Nebraska and Wisconsin. In the current case, Beal was the passenger of a vehicle driven by James Statzer. Statzer was reportedly going 15 to 20 miles under the speed limit and swerving when a Trinity County Sheriff conducted a traffic stop. At that time, a K9 unit detected narcotics. Statzer and Beal pleaded not guilty to charges of suspicion of misdemeanor possession of cannabis for sale and felony attempt to transport marijuana across state lines.
Beal was released after posting a $4,500 promissory note through the help of a licensed bail bondsman. The judge agreed to reduce the initial bail set at $75,000 after attorneys for Beal argued that he was not a flight risk and suffers from serious health issues. The 70-year-old had previously suffered a near-fatal heart attack when serving a prison sentence in Nebraska.
Beal has been in the news recently as he advocates a new drug that could be used for addiction treatment. Ibogaine, which is derived from an African plant, is believed to be useful in treating heroin and opioid addiction. Beal has worked to establish clinics in Tibet and Afghanistan. The US Food and Drug Administration has not commented on the effectiveness of Ibogaine for addiction treatment.
| null |
minipile
|
NaturalLanguage
|
mit
| null |
[Mechanism of donor T cell migration and homing in the pathophysiology of acute graft-versus-host disease - review].
Migration of donor T cells to the host second lymphoid organs and homing of activated donor T cells into the target tissues play crucial role in the pathophysiology of acute graft-versus-host disease (aGVHD). More deep understanding of the mechanisms for donor T cell migration and homing reveals an important significance in preventing the initiation of aGVHD. In this review, the migration of donor T cells to host second lymphoid organs, homing of donor activated T cells into the target organs, homing of regulating T cells into target organs, the mechanisms of T cell migration and homing in process of aGVHD and its study prospects were summarised.
| null |
minipile
|
NaturalLanguage
|
mit
| null |
About Me
I want people to rise up, speak up, and woman up. "Liberty and justice for all"- that's my dream for America in my lifetime.
(Also- I don't capitalize when I blog- not out of contempt for the practice, just my little act of personal liberation.)
I want to shine a spotlight on just a few of the innumerable examples of worldwide violence, senseless discrimination, and systematic abuse of women. I believe increased awareness can lead to action and change.
i encourage you to follow the link in that article to the full report from 2007 on the link between the civil war in iraq and violence against women. it reiterates the truth of what we see played out in war-torn countries all over the world: "Because of women's role in cultural and biological reproduction, they are often perceived as symbols of group identity. As such, they are specifically targeted in times of communal violence. In 2003, OWFI began reporting cases of 'Islamic groups taking revenge on each other by raping women.' "
| null |
minipile
|
NaturalLanguage
|
mit
| null |
[Identification of chemical constituents of Yuanhu Zhitong prescription by HPLC-QTOF/MS].
This study was designed to clarify the chemical constituents in Yuanhu Zhitong prescription (YHZT), a rapid high performance liquid chromatography/electrospray ionization quadruple time-of-flight mass spectrometry (HPLC-QTOF/MS) method was established. Based on the high resolution MS spectra data, fragment ion information, reference standards data and literature reports, 51 peaks including 28 alkaloid compounds and 23 coumarin compounds were identified. The chemical constituents in YHZT were rapidly, accurately, systematically analyzed. The results lay a foundation for the quality control of effective compounds of YHZT.
| null |
minipile
|
NaturalLanguage
|
mit
| null |
The View from the Boardwalk
Menu
Monthly Archives: September 2014
I have been thinking about work, particularly as it is changing for the current generation of young people, but also about the nature of work in general, its essence, its value, its cost. Construction of the deck off the Program Room at Stony Brook prompted my thoughts, its elegance, precision and beauty, combined with the utility of the space, the splendid work of two women and one man (plus the occasional help of a few volunteers).
My exposure to work took place early on in my youth. Either it was an obligation imposed upon me as a member of the family, a punishment for bad behavior, or a gift from my father for being interested in what he was doing, for wanting to know how I could help, for desiring to be just like him. I was allowed to work side by side with him, whether laying an oak floor upstairs in our house or constructing a porch with all my uncles at my grandmother’s cottage. Work was a privilege, an honor, a rite of passage for me. Even if a punishment or a chore, I quickly learned to convert it to my own by taking my time, developing a rhythm, seeking a kind of pride or perfection in the result.
Without going into too much detail, it seems clear to me that most people today don’t share my romantic ideal. More and more as a society we are moving away from jobs that require building something with our hands. We don’t manufacture things; we outsource them. We bring in people from other countries to tend our lawns, farm our fields, paint our houses, build our roads and skyscrapers, or service our hotels and fast-food restaurants. Hard work is menial, dirty, exhausting. We prefer sitting at a desk, in front of a computer screen, negotiating deals on the golf course or in the boardroom, at social gatherings or over the phone.
Work has become cerebral rather than physical, airy and insubstantial rather than something we can hold in our hands. It’s stored in the cloud rather than in a warehouse or an attic or a garage. It taxes our emotions rather than our muscles, makes us anxious at night rather than prepare us for a well-deserved sleep. It doesn’t satisfy so much as it frustrates. It doesn’t last so much as it breaks down for someone else to repair, or simply to be thrown away and replaced, which is more likely and less costly for the time and effort it takes.
We are disconnected from our work, not defined by it. We compete rather than cooperate. We maneuver and deal rather than build relationships or meaning. We steal ideas and take license rather than create and fulfill. We feel no attachment, no responsibility, no loyalty, no pride. We are not so much uplifted by our work’s execution and results as we are relieved to be done with them so that we can move on. Time is money. We can be replaced. Someone else is always looking to take what we have gained.
Then, in stark contrast to such negativity, appear these two women and one man who have an entirely different set of priorities. I found it exhilarating to talk to them and to see them create something so subtle and yet enduring. For Mary and Nina the goal is to build “something that lasts,” something “with purchase.” Nina gives voice to the aesthetic and hypnotic nature of the job when she says, “…it is a kind of meditation. The work transcends language and thought. Everything else disappears.” She describes the joy of seeing something real and enduring arise out of nothing. “It’s a feeling like you have some agency, Nina says, “like you know how to do stuff.” Both say it’s work that has meaning and makes them feel proud.
Nina cites the flexibility of schedule that the job allows: Mary to raise her daughter and pursue her cooking; Nina to publish a book (Hammerhead: the Making of a Carpenter) and to keep a blog (Carpentrix). Both like the physicality of the work, the sheer joy of sweating, of physical exhaustion, of knowing something with one’s whole body. As women, they revel in knowing when and how to use their muscles. “It’s more about finesse than brute strength… knowing where to apply pressure, how to find balance,” they say.
Roland, the owner of Ariano Development and principal overseeing the project, “likes to build things,” whether software packages for businesses (yes, that’s one of his skills), or additions for families and organizations looking to expand their living space. Negotiating “the duality between business and mission” is of great interest to him. He emphasizes the excitement that comes from “putting together a team that can produce a clear and satisfying result.” He looks for people with skill, of course, but more importantly, perhaps, people who “intrinsically get it.”
By this he means they must understand the ethic involved: the need for safety, for channeling emotions, for being willing to work hard, for extending simple courtesies to clients and respecting their space. Work for him is a source of outward rigor that facilitates an inner sifting and sorting, a “percolation” of ideas that establishes direction and pace.
“Do what you love,” my father taught me. Seeing this deck go up has reinforced my belief that he was right all along. These three craftsmen have given me hope that the next generation of workers will not easily settle. Whether for a job or a life, they will demand purpose and meaning.
| null |
minipile
|
NaturalLanguage
|
mit
| null |
Effect of manganese treatment on the levels of neurotransmitters, hormones, and neuropeptides: modulation by stress.
Six weeks of daily intraperitoneal injection with manganese chloride (15 mg/kg body wt) reduced the normal weight gain of male Fischer-344 rats. This treatment depressed plasma testosterone and corticosterone levels, but prolactin levels were unaffected. The only significant changes in the levels of a variety of neuropeptides assayed in several regions were increases in the levels of hypothalamic substance P and pituitary neurotensin. Striatal serotonin, dopamine, and their metabolites were unchanged in manganese-exposed rats relative to saline-injected controls. However, the stress of injection combined with the effect of manganese appeared to significantly increase concentrations of striatal monoamines relative to uninjected controls.
| null |
minipile
|
NaturalLanguage
|
mit
| null |
The first operational training base for the F-35A this week hit a new milestone: 1,000 flights.
Maj. Joshua Arki, 61st Fighter Squadron instructor pilot, on Tuesday flew the 1,000th sortie at Luke Air Force Base, Arizona. It is now the fastest wing to reach 1,000 sorties in the F-35, according to the Air Force.
The flight occurred about one month before the first official class of student pilots is set to get started at the training center on base.
The milestone was the second in a week at the base. Brig. Gen. Scott Pleus, commander of the 56th Fighter Wing, flew the first student sortie at the base on March 19.
“With initial operational capability scheduled to occur late next year, it’s important that we get our training program and process dialed in and as efficient and refined as our F-16 training program is so we can help meet the Air Force’s scheduled goal,” Pleus said in an Air Force news release.
Luke is the base tasked with training the Air Force’s operational pilots, and is set to receive 144 of the jets by 2024. Instructor pilots have been training at Eglin Air Force Base, Florida. The first operational F-35 squadron will be at Hill Air Force Base, Utah.
Luke currently has 20 F-35s on base, including two for the Royal Australian Air Force.
| null |
minipile
|
NaturalLanguage
|
mit
| null |
You are here
Darfur Factsheet
A former British colony, Sudan became an independent nation on January 1, 1956. The newly formed parliamentary government was relatively weak and by 1989, a colonel in the Sudanese military named Omar al-Bashir led a bloodless coup that toppled the former government. Moving quickly, Bashir consolidated his power by suspending all political parties and installing himself as the head of the newly formed transitional government: the Revolutionary Command Council for National Salvation. This post gave him the same powers as a head of state.
Shortly after taking power, the new government began attacking social institutions that might have offered support for Bashir’s political opponents; independent newspapers were closed or taken over by the State and the military was purged of any officers who might rise up against the Revolutionary Command Council. In October 1993, Bashir assumed the title of President and eventually took control of the entire body of executive and legislative powers formerly held by the Revolutionary Command Council. The Council was dismantled and a single political party – the National Congress Party (NCP) – became the de facto membership organization for all members of government.
Civil War
The First Sudanese Civil War (1955 – 1972) was fought over the south’s right to govern itself. The conflict lasted seventeen years until a ceasefire was accomplished through the Addis Ababa Agreement. The Second Sudanese Civil War (1983 – 2005), also between the north and south, began before al-Bashir assumed power. The primary dispute continued to be the south’s right to govern itself, with hostilities igniting at President Nimeiry's introduction of an Islamic legal code. While the peace treaty ensured the south a certain degree of autonomy, Nimeiry’s intent to enforce the new legal code in the south brought a return to civil war.
The result was the formation of the Sudan People’s Liberation Army (SPLA) and the beginning of a twenty-year-long civil war between the northern government and the southern region. During the conflict, between one and two million people died and nearly four million were either internally or externally displaced. The conflict gained notoriety because of the displaced children -- known as Sudanese Lost Boys and Girls – who fled the country during the fighting. Often on their own, they traversed hundreds of miles to the relative safety of Ethiopia, Uganda, and Kenya. By 2001, approximately 4,000 had settled in the United States.
Darfuri Genocide
After decades of economic marginalization and neglect, the western Sudanese region of Darfur slowly grew restless of being ignored by their government. By 2003, a number of rebel groups were formed and began attacking Sudanese military installations in protest of Darfuri treatment.
Unlike the civil war where Khartoum fought the south, Bashir took an entirely different strategy with Darfur, responding rapidly with a series of counterattacks. With their attention still vested in the conflict with the south, Bashir’s government recruited tribal militias, known as Janjaweed, with the promise of receiving land in return for fighting. Rather than simply attempting to put down the rebels, however, the Janjaweed coordinated their attacks with the Sudanese military in a campaign to eradicate Darfur of its civilian population.
Through these actions, a clear pattern of genocide began to immerge. The brutality in the region was orchestrated to target three distinct tribal identities – the Fur, Masalit, and Zaghawa – which Khartoum collectively, and derogatorily, refer to as “Zourga.”
Since 2003, as many as 400,000 people have been killed and as many as four million have been displaced. The majority of refugees fled the region to neighboring Chad where large numbers of refugee camps continue to operate today.
ICC Arrest Warrant
The International Criminal Court issued two arrest warrants for President Omar Al Bashir related to his involvement in the Darfur genocide. He is currently wanted on ten counts which include:
Five counts of crimes against humanity
Two counts of war crimes
Three counts of genocide
Further Information
The Carole Weinstein Holocaust Research Library maintains a bibliograpy on Darfur.
| null |
minipile
|
NaturalLanguage
|
mit
| null |
DNA recombination induced by aflatoxin B1 activated by cytochrome P450 1A enzymes.
Mutations in tumor suppressor genes are intricately associated with the etiology of neoplasia. Often, such mutations are followed by the loss of the second, functional alleles of tumor suppressor genes, a phenomenon known as loss of heterozygosity. Loss of heterozygosity may occur by different molecular mechanisms, including mitotic recombination, and it is conceivable that these molecular events are influenced by endogenous as well as exogenous factors. To test whether mitotic recombination is induced by certain carcinogens, we genetically engineered a Saccharomyces cerevisiae tester strain so that it metabolizes two important classes of carcinogens, polycyclic aromatic hydrocarbons and heterocyclic arylamines. This was accomplished by expressing human cDNA's coding for the cytochrome P450 (CYP) enzymes CYP1A1 or CYP1A2 in combination with NADPH-CYP oxidoreductase in a strain heterozygous for two mutations in the trp5 gene. Microsomes isolated from the transformed yeast strains activated various xenobiotics to powerful mutagens that were detected in the Ames test. Of these, the mycotoxin aflatoxin B1, when activated intracellularly in the strains containing either human CYP enzyme, significantly induced mitotic recombination. These results are discussed in light of possible mechanisms that are involved in aflatoxin B1-mediated hepatocarcinogenesis. Similarly, benzo[a]pyrene-trans-7,8-dihydrodiol and 3-amino-1-methyl-5H-pyrido[4,3-b]indole were activated to recombinagenic products, whereas benzo[a]pyrene and 2-amino-3,8-dimethylimidazo[4,5-f]quinoxaline were negative in this assay. Our results argue that the constructed yeast strains may be a valuable tool for the investigation of drug-induced mitotic recombination.
| null |
minipile
|
NaturalLanguage
|
mit
| null |
Q:
Entire Function Problem in Complex Analysis
I am currently working on some review problems in complex analysis and came upon the following conundrum of a problem.
"If $f(z)$ is an entire function, and satisfies $|f(z^2)|\le|f(z)|^2$, prove that f(z) is a polynomial."
My intuition tells me to show that f(z) has a pole at infinity by showing that infinity is not an essential or removable singularity. However, I am getting stuck after this.
Thanks for the help,
A:
Let
$$
M=\sup_{|z|=2}|f(z)|
$$
Then, with the condition given, it can be proven inductively that
$$
\sup_{|z|=2^{2^n}}|f(z)|\le M^{2^n}
$$
which implies
$$
|f(z)|\le|z|^{2\log_2(M)}
$$
We can use Cauchy's Theorem to give
$$
f^{(n)}(z)=n!\int_{\gamma_R}\frac{f(w)\,\mathrm{d}w}{(w-z)^{n+1}}
$$
where $\gamma_R$ is the circle of radius $R$. If we choose $n\gt2\log_2(M)$, then if we let $R\to\infty$,
$$
\begin{align}
|f^{(n)}(z)|
&\le\int_{\gamma_R}\frac{|w|^{2\log_2(M)}\,\mathrm{d}w}{(z-w)^{n+1}}\\
&\sim2\pi R^{2\log_2(M)-n}\\[12pt]
&\to0
\end{align}
$$
Since the $n^\text{th}$ derivative is identically $0$, $f$ must be a polynomial.
| null |
minipile
|
NaturalLanguage
|
mit
| null |
Ergonomics may be defined as an engineering and physiological study of relationships between man and machines. An ergonomic device may be a device that is tailored to reflect human structure and function to, for example, enhance a person's ability to operate the device or an adjacent apparatus.
An ergonomic device may enhance a worker's performance or ability to operate a machine by relieving fatigue. For example, fatigue or repetitive motion disorders of the hand, wrist, and arm may be caused by repetitive or tedious hand, wrist, and arm functions. In the computerized environment, keyboard operators may spend their entire workdays at terminals with their forearms extended to their keyboards. Postal workers may spend long periods of time with their forearms extended to operate coding machines for coding and sorting mail. Assembly-line personnel may also work with their forearms extended over articles of manufacture to manipulate tiny parts with their fingers.
Ergonomic arm support devices have been designed for supporting the forearm of keyboard operators. Each of these devices typically consist of two arms with one arm secured to a desk and the second arm having a cushion at its distal end for supporting the forearm. These arms are frequently jointed at their connection, and also may be jointed at the forearm cushion and at the connection to the keyboard table for a total of three joints.
These jointed arm support devices have a number of problems. For example, the inclusion of two arms and three joints for a single device requires that the arm be secured to the keyboard table and positioned at a relatively great distance from the keyboard in order to provide sufficient space for mounting the jointed arm. Accordingly, a pair of such arm support devices may require a larger desk, and therefore may disadvantageously occupy a greater amount of work space. If the arm supports are in fact mounted closer to the terminal, the range of motion of each of the arm supports is limited, and the arm supports may dig into a worker's torso or interfere with his or her chair.
A similar problem concerns the impracticality of mounting the conventional jointed arm support on a chair. If this type of arm support is mounted on a chair, the long reach of its jointed two arms may interfere with access to the seat of the chair. Furthermore, the jointed arm support simply may not be reasonably operable on a chair because a chair, by its very nature, is drawn adjacent to the keyboard to a position in which the torso of the occupant of the chair or the keyboard may interfere with a range of motion of the second arm.
Another problem with the conventional jointed arm support is that it easily breaks when leaned upon. It is typical behavior for a worker to lean on the cushioned or distal end of the second arm of the conventional arm support which is intended for supporting only the weight of a forearm. The leverage or force exerted by the weight of such a lean or end loading is magnified by the overall length of the two arms of the jointed arm support.
Still another problem with the jointed arm support is that it is difficult to maneuver. For example, when one arm is aligned directly over the other arm, and the intended direction of movement of the forearm is in line with the two arms, the arms initially resist a pivoting relative to each other until the forearm exerts a force out of alignment with the two arms. Accordingly, such a conventional jointed arm support may not meet the definition of an ergonomic device that typically tracks or follows a natural movement of the human body without resistance.
Yet another problem is that the conventional two-arm jointed arm support may not decrease substantially the risk of carpal syndrome. This syndrome may be caused at least in part by the tendency of a keyboard operator to rest his or her wrists on the keyboard, or on a portion of the table immediately in front of the keyboard, while his or her hands are elevated relative to the wrists for operation of the keyboard. With the long reach of the two-arm jointed arm support, and the attendant amount of leverage, the arm cushion on the distal end of the second arm may sink to the table surface even under the relatively light weight of an arm. Even providing for height adjustment, such instability or deflection of the second arm may not provide a sufficient lift for the wrists to be held at the proper elevation relative to the hands to minimize the risk of carpal syndrome.
Yet another problem is that the ergonomic arm support devices as known are generally not readily and easily attachable to a standard desk chair. The need exists for a universal-type mounting bracket which permits the convenient attachment of an ergonomic arm support device to a standard desk chair.
| null |
minipile
|
NaturalLanguage
|
mit
| null |
Persistence of the notochordal canal: MR and plain film appearance.
We report a case of an unusually prominent persistent notochordal canal involving the T12-L5 vertebrae. This rare anatomic variation was discovered as an incidental finding in a patient with lymphoma undergoing MR imaging for evaluation of back pain. MR images showed a vertically oriented canal contiguous with the intervertebral disks traversing the anterior aspect of each affected vertebral body. Plain films showed a sclerotic rimmed central channel that flared at each vertebral endplate to merge with the disk spaces.
| null |
minipile
|
NaturalLanguage
|
mit
| null |
Sunlight-Driven Forging of Amide/Ester Bonds from Three Independent Components: An Approach to Carbamates.
A photoredox catalytic route to carbamates enabled by visible irradiation (or simply sunlight) has been developed. This process leads to a novel approach to the construction of heterocyclic rings wherein the amide or ester motifs of carbamates were assembled from three isolated components. Large-scale experiments were realized by employing continuous flow techniques, and reuse of photocatalyst demonstrated the green and sustainable aspects of this method.
| null |
minipile
|
NaturalLanguage
|
mit
| null |
Sutureless small bowel anastomoses: experimental study in pigs.
To evaluate a new technique for experimental anastomosis with fibrin glue, and to compare the results with those of stapled and one-layer sutured anastomosis. Open laboratory study. Teaching hospital, Sweden. Ten Swedish domestic pigs. Each pig had three anastomoses made in the small bowel, one by each technique. The pigs were killed on the 4th postoperative day. Blood flow, collagen concentration, anastomotic index, breaking strength, thickness of bowel wall, and histological appearance. Two pigs died postoperatively, leaving 8 for analysis. The blood flow at each anastomotic site studied by the microsphere technique was similar irrespective of the type of anastomosis (p = 0.3), as was anastomotic collagen concentration (p = 0.09). The anastomotic index, however, was significantly higher in the stapled than in the glued or sutured ones (p = 0.03). The glued anastomosis was the weakest, being only one fifth the strength of the stapled and one third the strength of the sutured anastomosis. There was no sign of rejection of the glue (of human origin) on histological examination. Glued and stapled anastomoses showed signs of mild inflammation, which did not reach the intensity of that around the sutured anastomoses. It is possible to make a sutureless anastomosis that does not leak with a modified stapler using fibrin glue instead of staples, but the anastomosis has considerably lower breaking strength than either stapled or sutured anastomoses.
| null |
minipile
|
NaturalLanguage
|
mit
| null |
Meta
Zoom Whitening in Medellin
Zoom Whitening Medellin – Best in office Dental Whitening in the world.
Offer you the better results in comparation with other whitening teeth whitening. This Whitening is designed to remove stains on the tooth enamel which is caused by food, drinks and tobacco in just one office visit.
What is ZOOM Whitening?
It is an office whitening procedure designed to patietns who want to see the best results in the shortest time possible. Zoom give a positive change on stains and improve the color of the teeth.
How does ZOOM Whitening works?
The ZOOM Whitening works with a LED light which accelerate the procedure.
First, we do a dental cleaning and then we isolated the lips and gums to protect it from the gel that we put in your teeth and then we actívate it with the LED lamp. This procedure Will take 15 minutes before to be removed and then you can rest for 5 minutes to have the second cycle. This procedure is faster, and more effective that other whitening.
Why do you choose Zoom Whitening?
Take the first step to feeling good and looking great by contacting us today. You owe it to yourself!
FAQ About Zoom Whitening in Medellín
¿How long does ZOOM Whitening take?
It’s just one appointment. It takes about 2 hours and includes: Cleaning and 2 cycles of whitening, each one is 15 minutes
¿How long do the results last?
The effects of ZOOM whitening should last for between 12 and 24 months.
We advise you to avoid anything too cold or citrics for 2-3 days since the teeth are sensitive and they are more likely to get stained. We advise as well to avoid any type of dark food such as coffee, Coke, tea, dark chocolate, red win, grapes and other artificially colored foods.
Rinsing regularly with a mouthwash with whitening effect can reduce the risks of staining, even after having consumed foods and drinks that may cause staining.
Teeth & gum may be a bit sensitive for a couple of days. This vary widely among patients. Remember to use the special tooth paste, using this kind of toothpaste for sensitive teeth may be helpsul as well.
Some dental offices in Colombia may advertise the use of Zoom whitening systems and do not have Zoom Advanced Power lamps or use the Zoom whitening gel or kit
How much the ZOOM Whitening Cost?
The package cost 650.000 Cop. If the payment is done in cash it’s 600.000 Cop.
| null |
minipile
|
NaturalLanguage
|
mit
| null |
What is a Smart Meter?
A smart meter is an electronic device used for reading gas and electricity consumption in real-time, thereby allowing customers to improve their energy efficiency and to reduce costs. Both energy suppliers and end users have live access to usage figures through smart meters, which will be introduced across Ireland between 2019 and 2024.
You might be one of the many Irish energy customers who regularly receives estimated bills, which are based on the average consumption for a house the same size as yours.
ESB Networks attempts to send an engineer to read your house meter four times a year, but this often isn’t achieved (due to nobody being home at the time of the call-out, for example), making a estimate necessary.
Smart meters remove the need for estimated bills and help guarantee that you're billed accurately.
2. You won’t have to submit meter readings any more.
Smart meters have a two-way communication system, which means that both you and your supplier have constant access to your consumption levels.
3. Moving house will be less hassle.
Suppliers will essentially hold the ‘master’ keys to your smart meter and will have the ability to switch your electricity supply on and off. This will be helpful to you if you’re moving house or going away for a decent stretch, again ensuring that you don't pay for electricity that you're not intentionally using.
Smart meters allow you to see trends in your consumption and spending in real time. This up-to-date information is available to view online or through a mobile app and allows you to see exactly when it's cheapest to run certain appliances, and for how long.
‘Time of use’ tariffs' will also be introduced with smart meters to encourage you to move your usage to times with lower unit rates. This will help you to make savings and help suppliers to better balance their energy generation.
If this wasn't helpful enough, suppliers will even regularly send on ‘Energy Usage Statements’, advising you on ways to save on your energy bill, based on an analysis of your unique consumption pattern. How nice of them!
5. Improved energy efficiency is not only good for your pocket; it’s good for the environment too!
The less energy you use, the happier Mother Nature will be!
How much will I save?
ESB Networks and Gas Networks Ireland installed 10,000 smart meters between 2009-2010 as part of a trial to help them discover the best technology to use, and to spot any issues with the system.
The trial period showed that meters update consumption figures every 30 minutes and that average savings of 2.5% (or €50) can be made on annual energy bills. Some households that took part in the trial reduced their bills by as much as 8.8%, or €175.
When will I get mine?
The roll-out of smart meters in Ireland will begin in 2019 and is likely to be completed by 2024.
It’s a huge project that’s been running since 2007 and is likely to cost €1bn by the time it’s done and dusted.
What can I do in the meantime?
There are some things you can do in the meantime to improve your energy efficiency and make some great savings.
Firstly, you could get an Owl electricity appliance monitor. This will cost you about €50 and, by showing you which items in your house are costing you the most, it will likely pay for itself in a matter of months.
You could also get a NightSaver Meter. This will allow you to make some nice savings if you move a portion of your energy usage to night time, when rates are lower.
Finally, you could call us on 1800 930 255 to see if you could be getting a better deal. If it turns out that you are overpaying, we’ll help you switch too!
bonkers.ie is a trading style of Bonkers Money Ltd. registered office Nutley Building, Nutley Lane, Dublin 4. Registered in Ireland, company number 477742.
Our logo and the word bonkers® are registered trademarks of Bonkers Money Limited and may not be used or reproduced without prior written permission.
| null |
minipile
|
NaturalLanguage
|
mit
| null |
Sitting is the New Smoking
When I joined my current team last summer - a Total Rewards group with a thriving employee wellness department - one of the first things I noticed (and heard people talking about) was the fast growing notion that sitting forprolonged periods of timecould be just as bad for someone's healthas being a heavy smoker. Being someone that lost a parent to lung cancer, I've been pretty anti-smoking in all its forms for as long as I can remember; but here I am, an HR professional who finds themselves sitting through huge chunks of their day either checking email, working on a report/presentation/something involving my computer, or sitting at a conference table for a meeting. And with this came a more clear understanding of why the people in my department were so often found standing up, wandering around the back of the room, and the like at organization wide meetings over the last several years - they got it, they tried to help others get it, and now I'm working somewhere that the idea of being more up and about and active is a growing part of the culture. So, I've started to embrace that culture with little things by parking in the back lot which forces me to take the stairs up to my office and when possible walking to someone's desk to respond to quick and easy questions as opposed to firing off another email - but I'm left wondering what are some other things I can do?
One area I can control and enact immediate change upon is how my team of managers meets - we have a group session every other week where we discuss what's been taking place in their areas the past two weeks, what's boiling at the moment, what victories they and their teams have had, and what they see coming on the horizon. The agenda is generally loose and is as much as anything an opportunity for my managers to build relationships, understand how their functions are impacting others, and to have an opportunity to simply debrief. We could have these meetings in my office or a conference room or we could take the steps down to the courtyard and have a walking meeting (an initiative I was able to start yesterday thanks to what looked like lingering rain clouds holding off).
Another area I have some modicum of control over is how my staff does their work, we went through a recent office remodel and we tried to make sure that employees had adequate space and resources (we were moving to smaller workstations), but we also wanted to make sure they had the right kinds of resources (appropriate lighting, wrist friendly mice, good chairs, foot supports, etc.). Now as I think about what we might be able to do looking forward, I get excited about the prospects of innovations like StandDesk- an affordable, user friendly, and aesthetically pleasing sit/stand work desk that's closing out a super successful Kickstarter campaign - needless to say, I'm trying to figure out how I can secure one in the future. But don't take my word (and excitement) for it, check out the video below (and then try and tell me you don't want one too):
| null |
minipile
|
NaturalLanguage
|
mit
| null |
INTRODUCTION
============
Vietnam War Veterans experience significantly increased mortality and morbidity as a result of chronic diseases as compared to the Australian population ([@b2-ijes_03_01_36],[@b7-ijes_03_01_36]). Regular exercise is known to improve health, fitness ([@b12-ijes_03_01_36]) and psychological health ([@b15-ijes_03_01_36]) in Vietnam Veterans, therefore this cohort should undertake regular exercise to reduce the likelihood and occurrence of mortality/morbidity attributed to chronic diseases and psychological conditions ([@b16-ijes_03_01_36]). Perceived barriers to exercise compliance include poor health, lack of physician support, lack of time, inadequate instruction and lack of social support ([@b1-ijes_03_01_36],[@b19-ijes_03_01_36]), with long-term exercise adherence reported at 46--50% for the older population ([@b18-ijes_03_01_36]) and specifically War Veterans ([@b12-ijes_03_01_36],[@b14-ijes_03_01_36]). Further, a person's subjective experience of their first exercise session may indicate their likelihood of long-term exercise compliance ([@b8-ijes_03_01_36]), and therefore should be considered by those designing exercise interventions particularly for elderly participants. Due to their largely sedentary lifestyles, Vietnam Veterans may also be at risk of noncompliance due to fatigue associated with commencing an exercise program, therefore innovative exercise interventions that are reported as more time efficient and less fatiguing than the traditional exercise modalities may provide a viable alternative. One such exercise modality is vibration training. While more time efficient and less fatiguing than other modalities ([@b4-ijes_03_01_36]) vibration training results in similar functional improvements in the elderly compared to exercise without vibration ([@b17-ijes_03_01_36]). Further, vibration training improves strength ([@b9-ijes_03_01_36]), cardiovascular fitness ([@b5-ijes_03_01_36]), mobility ([@b11-ijes_03_01_36]) and glycemic control ([@b3-ijes_03_01_36]), is effective for relieving pain ([@b10-ijes_03_01_36]) and results in sustained exercise participation ([@b4-ijes_03_01_36]) in the elderly.
The aim of the current pilot study was to determine the effect of an acute bout of exercise on the subjective exercise experience of Vietnam Veterans, and to determine which exercise intervention results in the most positive acute outcome. Specifically, this study included the use of a combination of traditional exercise modes (stretching, aerobic exercise and resistance training) and innovative exercise (vibration trainers). It was hypothesised that following an acute exercise bout, programs incorporating vibration training would result in the least fatigue and that all acute exercise bouts would elicit improved positive well being and decreased psychological distress. This research has practical significance to those training the elderly, previously sedentary population. Specifically, the long-term implementation of the intervention eliciting the most positive acute subjective experience should increase exercise adherence, resulting in improved health, fitness and quality of life of the elderly population.
METHOD
======
Participants
------------
Vietnam Veterans (n = 32, age = 62 ± 4 yr, BMI = 33 ± 5 kg·m^2^) volunteered, obtained medical clearance from their Medical Practitioner and gave written informed consent to participate in the study. The participants presented with a high prevalence of chronic diseases/conditions with the most prevalent being psychological conditions such as posttraumatic stress disorder and depression (63%), followed by high blood pressure (56%), high cholesterol and knee pain (45%), back pain (40%), cardiovascular disease (25%), and diabetes and neurological conditions (13%). Prior to participation in this study, all participants had been previously sedentary for at least 24 months. All procedures were approved by the University Human Ethics Subcommittee prior to the commencement of the project, with procedures carried out in accordance with the declaration of Helsinki.
Protocol
--------
Prior to participating in the acute exercise bout, participants were measured for height and mass to determine their BMI; and had their resting heart rate and blood pressure assessed as a precautionary measure, with all participants cleared to participate in the exercise session.
Participants were allocated to one of three exercise groups, 1) lower-body vibration exercises plus upper-body resistance (WBVT) 20--30 min; 2) lower-body vibration plus upper-body resistance plus aerobic exercise (WBVT+CV) 40--60 min or 3) full-body resistance plus aerobic exercise (R+CV) 40--60 min ([Table 1](#t1-ijes_03_01_36){ref-type="table"}). Any participant who presented with a potential contraindication to vibration training exercise such as metal pins/plates (n=5) or pacemakers (n=1) were assigned to group 3, with the rest of the participants randomly allocated to one of the three groups. Group 1 contained 10 participants while groups 2 and 3 each contained 11 participants. There were no significant differences in age, BMI, resting heart rate or resting blood pressure between groups.
Aerobic exercise consisted of a combination of treadmill walking, ergometer cycling and/or ergometer rowing at a moderate intensity (unable to maintain a conversation due to associated breathlessness) for 10 minutes at the start and 10 minutes at the end of the session. Lower-body vibration exercises ([Table 1](#t1-ijes_03_01_36){ref-type="table"}) were performed on a vibrating platform with handles (HyperVibeTM, Noosaville, Australia) at a vibration frequency of 15Hz for 30s, for two sets. The upper-body resistance exercises ([Table 1](#t1-ijes_03_01_36){ref-type="table"}) consisted of two sets of 10 repetitions. The resistance exercises were performed on hydraulic exercise machines (Fitness technology, Skye, Australia) with the level of resistance set individually for each participant to achieve muscle fatigue (but not failure) by the end of each set. This single bout, acute investigation represents a portion of a larger 12-week training intervention study.
Immediately before and 5 min after the single exercise bout, participants were asked to sit down and complete the Subjective Exercise Experience Scale, a valid and reliable instrument (SEES) ([@b13-ijes_03_01_36]) used previously to describe acute exercise affect ([@b6-ijes_03_01_36],[@b8-ijes_03_01_36]). The SEES is a 12-item instrument with four items each representing positive well being (great, positive, strong, terrific), psychological distress (awful, crummy, discouraged, miserable) and fatigue (drained, exhausted, fatigued, tired) with each item rated along a Likert scale from 1 (not at all) to 7 (very much so). Scores for positive well being, psychological distress and fatigue are reported as the sum of the scores for the four items that represent each category, with a maximum attainable score of 28 for each category.
Statistical Analysis
--------------------
Data was analysed using the Statistical Package for the Social Sciences (SPSS inc, V16.0) and reported as means ± SD. A 3×2, conditions (WBVT, WBVT+CV, R+CV) × time (pre-exercise, postexercise), repeated measures ANOVA with *post hoc* Tukey HSD was used to identify significant differences in the four SEES items. Alpha significance was set at P ≤ 0.05.
RESULTS
=======
The mean ±SD scores for positive well being, psychological distress and fatigue before and after the exercise bout for each of the exercise interventions are shown in [table 2](#t2-ijes_03_01_36){ref-type="table"}.
DISCUSSION
==========
The purpose of the current study was to compare the effect of an acute bout of different exercise interventions on the subjective experience of Vietnam Veterans. All exercise bouts improved positive well being. While not significant, the WBVT and the R+CV bouts decreased fatigue and psychological distress while the WBVT+CV increased these factors.
Twenty-three participants (72%) reported improved positive well being following an acute bout of exercise, resulting in a significant increase in positive well being for the combined participants. Further, all individual exercise interventions showed non-significant improvements in positive well being, with the R+CV group demonstrating the biggest change. The improved positive well being after exercise is in agreement with research on both young and middle-aged female adults ([@b6-ijes_03_01_36], [@b8-ijes_03_01_36]) with participants reporting improved positive well being after low, moderate and high intensity walking. However neither study showed a significant effect of exercise intensity on fatigue or psychological distress. In the current study, fifteen participants (47%) reported less psychological distress following exercise while five participants reported increased psychological distress. As a combined group, a significant decrease in psychological distress after exercise was reported. While not significant, the WBVT and R+CV groups demonstrated a decline in psychological distress, while the WBVT+CV group reported sightly increased psychological distress following exercise. Fifteen participants (47%) increased fatigue, six participants reported no change and 11 participants decreased fatigue following exercise. Despite no significant differences between groups, WBVT and R+CV groups reported slight decreases in fatigue while WBVT+CV increased fatigue. Specifically, while WBVT+CV reported the lowest pre-exercise fatigue levels, this group reported the highest post-exercise fatigue.
The current study indicates that an acute bout of exercise, regardless of the intervention, resulted in increased positive well being for previously sedentary Vietnam Veterans, with the WBVT and R+CV groups both reporting improvements across all areas of the SEES. While increasing positive well being, WBVT+CV resulted in slightly increased psychological distress and the greatest increase in fatigue, therefore this intervention may be the least effective in eliciting an overall positive subjective experience of acute exercise in Vietnam Veterans. A reason for these results may be that the participants found WBVT+CV too complicated, with the program containing a combination of four types of activities (stretching, vibration, resistance and aerobic exercise) while the other interventions utilised only three activities. Commencing an exercise regime with a program that elicits immediate positive responses may increase exercise adherence ([@b8-ijes_03_01_36]). Given the risk of noncompliance in the current cohort with previous reports of 48% long-term exercise adherence for Vietnam Veterans ([@b12-ijes_03_01_36]), exercise professionals may best serve their clients by commencing with a simple exercise program to provide the greatest likelihood of positive experience after the first session.
It has already been established that vibration training improves a variety of health ([@b3-ijes_03_01_36]), fitness ([@b5-ijes_03_01_36], [@b9-ijes_03_01_36], [@b11-ijes_03_01_36], [@b17-ijes_03_01_36]) and quality of life ([@b10-ijes_03_01_36]) measures in the largely sedentary, elderly population. These known benefits, along with the current finding that acute vibration training elicits positive subjective experiences in the elderly, indicate that vibration training may provide a useful alternative to traditional exercise, however further investigation is warranted to determine whether vibration training alone elicits positive responses to exercise.
The positive experience associated with acute exercise is an important finding for the Vietnam Veteran population. The increased incidence of chronic disease ([@b2-ijes_03_01_36]), the low exercise adherence ([@b12-ijes_03_01_36]) and the health, fitness and quality of life benefits of regular exercise ([@b12-ijes_03_01_36], [@b15-ijes_03_01_36]) in Vietnam Veterans is well documented. Prescribing exercise that elicits an acute positive experience is likely to result in increased exercise adherence, which may decrease the incidence and severity of chronic disease and increase overall quality of life in Vietnam Veterans.
Overall this pilot study has demonstrated that an acute bout of exercise for previously sedentary elderly War Veterans presenting with a combination of chronic conditions elicits improved positive well being and reduced psychological distress, and therefore warrants further research with a larger cohort to determine which exercise intervention results in the most beneficial subjective experience. The identification of specific exercise interventions that elicit acute positive exercise experiences has important implications for long-term exercise adherence in at-risk populations.
The author thanks The Australian Association for Exercise and Sports Science for providing financial assistance with this project via the Tom Penrose Award; and HyperVibe (Noosaville, Australia) for the in-kind loan of the vibration trainers used in this study. The author thanks Rose Newman and Susanna Tope for their assistance with exercise supervision.
######
Exercises included in the three acute exercise intervention groups.
WBVT session WBVT+CV session R+CV session
------------------------------ ------------------------------ -------------------------------
Full-body dynamic stretches Full-body dynamic stretches Full-body dynamic stretches
Lower-body vibration Aerobic exercise Aerobic exercise
Static stand Lower-body vibration Lower-body resistance
Dynamic squat Static stand Dumbbell squat/leg extension
Dynamic lunge Dynamic squat
Dynamic calf raise Dynamic lunge Dumbbell lunge/leg curl
Upper-body resistance Dynamic calf raise Dumbbell calf raise
Chest press-seated row Upper-body resistance Upper-body resistance
Bicep curl-tricep extension Chest press-seated row Chest press-seated row
Full-body static stretches Bicep curl-tricep extension Bicep curl-tricep extension
Aerobic exercise Aerobic exercise
Full-body static stretches Full-body static stretches
######
Mean ±SD scores reported by Vietnam Veterans for positive well being, psychological distress and fatigue before and after an acute bout of either WBVT, WBVT+CV or R+CV exercise.
SEES category & time WVBT (n=10) WBVT+CV (n=11) R+CV (n=11) Combined (n=32)
------------------------ ------------- ---------------- ------------- --------------------------------------------------------
Positive well being
Pre 17.2 ±4.6 17.5 ±3.6 15.7 ±3.2 16.7 ±3.8
Post 18.9 ±3.9 18.9 ±4.0 19.3 ±3.9 19.0 ±3.8[†](#tfn1-ijes_03_01_36){ref-type="table-fn"}
Psychological distress
Pre 9.2 ±4.2 5.0 ±1.9 9.7 ±4.9 7.9 ±4.3
Post 6.4 ±3.5 5.2 ±2.5 7.4 ±4.0 6.3 ±3.4[†](#tfn1-ijes_03_01_36){ref-type="table-fn"}
Fatigue
Pre 12.2 ±5.5 8.8 ±3.8 12.9 ±4.9 11.3 ±4.9
Post 11.2 ±4.5 13.3 ±5.4 12.0 ±5.1 12.2 ±4.9
Significantly different to pre, p\<0.01.
[^1]: Denotes graduate student author
| null |
minipile
|
NaturalLanguage
|
mit
| null |
Q:
how to send image (bitmap) to server in android with multipart-form data json
I have code to upload image to server and it works ,
HttpEntity resEntity;
HttpClient httpClient = new DefaultHttpClient();
HttpPost post = new HttpPost(Constants.url_create_product);
MultipartEntity reqEntity = new MultipartEntity(HttpMultipartMode.BROWSER_COMPATIBLE);
File file= new File(path);
FileBody bin = new FileBody(file);
reqEntity.addPart("phone", new StringBody(mPhoneNumber));
reqEntity.addPart("prod_title", new StringBody(namapro));
reqEntity.addPart("prod_price", new StringBody(hargapro));
reqEntity.addPart("prod_desc", new StringBody(despro));
reqEntity.addPart("prod_order", new StringBody(orderpro));
reqEntity.addPart("prod_image", bin);
post.setEntity(reqEntity);
HttpResponse response = httpClient.execute(post);
resEntity = response.getEntity();
String response_str = EntityUtils.toString(resEntity);
Gson gson = new Gson();
gson.toJson(response_str);
if (resEntity != null) {
Log.i("RESPONSE",response_str);
runOnUiThread(new Runnable(){
public void run() {
try {
Toast.makeText(getApplicationContext(),"Upload Complete. Check the server uploads directory.", Toast.LENGTH_LONG).show();
} catch (Exception e) {
e.printStackTrace();
}
}
});
}
But i have menu image editor . that editor is crop image and thats code return bitmap value like this
Bundle extras = data.getExtras();
if (extras != null) {
photo = extras.getParcelable("data");
mImageView.setImageBitmap(photo);
}
File f = new File(mImageCaptureUri.getPath());
if (f.exists()) f.delete();
break;
I wanna ask , how solution to send image to server with parameter bitmap. As you know my code to send image now use parameter path (string).
A:
ByteArrayOutputStream baos = new ByteArrayOutputStream();
photo.compress(Bitmap.CompressFormat.JPEG, 100, baos);
byte[] imageBytes = baos.toByteArray();
String encodedImage = Base64.encodeToString(imageBytes, Base64.DEFAULT);
Then send this encodedImage as a String and in your server you will need to decode it in order to get the image itself.
A:
*use three library
1.httpclient-4.3.6
2.httpcore-4.3.3
3.httpmime-4.3.6
byte[] data = null;
try {
String url = "http://andapp.freetings.in/testbyme.php?";
HttpClient httpclient = new DefaultHttpClient();
HttpPost httppost = new HttpPost(url);
MultipartEntity entity = new MultipartEntity();
if(imageBitmap!=null){
ByteArrayOutputStream bos = new ByteArrayOutputStream();
imageBitmap.compress(CompressFormat.JPEG, 100, bos);
data = bos.toByteArray();
entity.addPart("uplod_img", new ByteArrayBody(data,"image/jpeg", "test2.jpg"));
}
// entity.addPart("category", new StringBody(categoryname,"text/plain",Charset.forName("UTF-8")));
entity.addPart("category", new StringBody(catid,"text/plain",Charset.forName("UTF-8")));
entity.addPart("your_contact_no", new StringBody(phone,"text/plain",Charset.forName("UTF-8")));
entity.addPart("your_emailid", new StringBody(email,"text/plain",Charset.forName("UTF-8")));
entity.addPart("your_name", new StringBody(name,"text/plain",Charset.forName("UTF-8")));
httppost.setEntity(entity);
HttpResponse resp = httpclient.execute(httppost);
HttpEntity resEntity = resp.getEntity();
String string=EntityUtils.toString(resEntity);
// Log.e("sdjkfkhk", string);
return resEntity;
} catch (ClientProtocolException e) {
e.printStackTrace();
} catch (IOException e) {
e.printStackTrace();
}
| null |
minipile
|
NaturalLanguage
|
mit
| null |
Separation by heparin-affinity chromatography of catalytically active and inactive forms of trypsin which retain the (Na-K)ATPase stimulating property.
The possibility that different structural determinants on trypsin, other than catalytic sites, are involved in the cell membrane (Na-K)ATPase stimulating property was investigated by submitting bovine trypsin to two purification procedures: gel filtration on Sephadex G-50 and heparin-Sepharose chromatography. The latter procedure was also chosen in consideration of the known affinity for heparin displayed by serine proteinases. Trypsin peaks eluted from both columns were analysed by measuring esterolytic and proteolytic activities, the beef heart (Na-K)ATPase stimulating property and amino acid content. Fluorescence emission spectra and both non-denaturing and SDS-gel electrophoresis were also performed to test structural modifications on trypsin peaks. Four peaks eluted from Sephadex G-50 with variable estero-proteolytic and (Na-K)ATPase stimulating activities; the latter was also present in two peaks which displayed the lowest estero-proteolytic activities. All peaks proved to be trypsin in amino acid composition. Two peaks eluted from the heparin-Sepharose column with distinct biological activities: a first minor peak, eluted with the void volume, was catalytically inactive but it retained the (Na-K)ATPase stimulating activity. The second, major peak eluted mostly with 0.5 mol/l NaCl, displayed only esteroproteolytic activities, but no (Na-K)ATPase-stimulating activity. It overlapped control trypsin in both electrophoretic patterns, fluorescence emission spectrum and amino acid composition. The first peak showed differences with the parent compound, as revealed by the amino acid composition and tryptophan fluorescence emission spectrum. Marked differences were also observed in the electrophoretic pattern which only showed bands of low molecular mass mostly confined to the anode. NH2-terminus analysis confirmed that the first peak contained trypsin fragments originated from the parent compound after passage through the heparin column. It is hypothesized that trypsin binding to heparin causes structural alteration of the proteinase and primes the catalytic cleavage of fragments which lose heparin affinity and elute in the void volume. The results also confirm that the proteolytic mechanism is not involved in trypsin-mediated (Na-K)ATPase stimulation and indicate that heparin-Sepharose chromatography is a useful tool to separate catalytically active and inactive forms of trypsin.
| null |
minipile
|
NaturalLanguage
|
mit
| null |
Sang Tong Huts
Beautiful bamboo and wooden huts
What we say:
Sang Tong boasts a large range of beautiful bamboo and wood huts and houses located a short trip outside Mae Hong Son. Muk, the Shan woman who runs the place, is friendly and a very capable cook. If you order in advance, she'll prepare dinner with whatever ingredients are in season at the local market, three to four local specialty dishes for 160 baht. Anyone so inclined can join in the preparation or just watch. The star room is the massive 'Pentagon' bungalow that goes for 1,600 baht a night, and has a bathroom larger than most bungalows. Some of the other, more expensive rooms also have a selection of mod-cons. Each hut has a different design scheme, and a different price. Balconies are large, and look out over a teak forest and nearby farmlands. There is a newly built swimming pool which acts as the ultimate reward after a day in the heat.
Read Sang Tong Huts reviews
Rated 4 out of 5
Based on 2 ratings and 2 reviews
Rustic charm
Were here in hot/dry season (April '05), and boy howdy hot it was indeed. Wish the pool had been done for our visit. Stunning view from TreeTop Hut, and very nicely furnished, but was overrun with ants, perhaps due to the weather? The place was somewhat of a ghost town during our stay, without any other lodgers, but we were very well looked after by Muk and her husband--multi-course dinners were absolutely amazing, and breakfasts hearty and healthy. Common areas could have used some attention, lots of clutter and dust, but was still very charming overall. Loved the friendly, attentive dogs. Must be amazing here in wet season.
Cleanliness
Facilities
Location
Romance
Rooms
Service
Value
Vibe
Sang Tong Huts reviewed by CunningMcFar (Total published reviews: 44) on 22nd July, 2009
Rated 4 out of 5. after a stay here in 4/2005
Quite nice bungalows with unique design
We were pleasantly surprised with the Sang Tong Huts bungalows and splashed out for one of the more expensive ones. Each bungalow that we saw was different and the nicer ones were amongst the best we have seen in northern Thailand in this price range. The beds and linens were perfect, and the toilets were nicely tiled with attention to an almost European design. The toilets even had halogen lighting and not a fluorescent light fixture was to be found anywhere! Furnishings in the rooms were definitely a notch above anything else we saw in various bungalows in northern Thailand. And the food was excellent! Highly recommended if you want to spend a bit more for one of their upper-end bungalows.
Sang Tong Huts reviewed by bipedal (Total published reviews: 3) on 19th June, 2005
Rated 4 out of 5. after a stay here in 4/2005
| null |
minipile
|
NaturalLanguage
|
mit
| null |
Highly sensitive and specific time-resolved fluoroimmunoassay (TR-FIA) of cyproterone acetate and free cyproterone.
We have developed a non-isotopic TR-FIA for Cyproterone acetate and Cyproterone in plasma. Synthesis of the biotinylated tracers, biotinylated Cyproterone acetate, and Cyproterone, as well as the preparation of anti-Cyproterone acetate and anti-Cyproterone antisera are reported. The specificity of anti-Cyproterone acetate antiserum resulting from the coupling of link bridge (link bridge between steroid and BSA), on the 3-position on the steroid skeleton, allowed to carry out the Cyproterone acetate assay directly on extracted plasma (without chromatography). On the other hand Cyproterone assays require a purification step, including extraction plus chromatography, because the plasma Cyproterone acetate concentrations in Cyproterone acetate-treated women are 200 times higher than for Cyproterone. Theses plasma TR-FIA of Cyproterone acetate and Cyproterone presented the advantage of needing only small doses of radioactivity for recovery controls, and better practicability related to the only existing RIA described to date.
| null |
minipile
|
NaturalLanguage
|
mit
| null |
Q:
Particle system doesn’t align hair object to assigned vertex group
Hair is giving me grey hair! I’ve been trying this and failed on several models in the past, so here’s the latest headache I’m encountering…
The selected vertex group for the top eyelashes is above the eye’s opening (seen here in orange)...
and the vertex group is assigned in the hair particle system…
…and I’ve subdivided the area before creating the vertex group, I also applied rotation, scale and location to both the eyelash (on the second layer) and the mesh with the eyelids.
And yet here we are, looking at the Frankenstein monster’s eyelids :)
I’m not sure what I’m missing, and I always get stuck at this point with particle hair systems. Every answer or help I’ve found online retraces all the steps I took for better results.
A:
Your particle system is correctly setup, and your particles are being correctly emitted from your chosen vertex group.
There is only one eyelash particle being emitted though, I am guessing you will need more than one.
What your are seeing are Particle Children which are instanced from the parent one around a predefined radius. This radius is far bigger than the area you would want eyelashes to emit from.
Either reduce the radius, or disable children completely and increase the number of actual particles instead.
Turning off Rotation and emitting from Vertex instead might also help achieve a more tame look.
| null |
minipile
|
NaturalLanguage
|
mit
| null |
Modeling substrate inhibition of microbial growth.
This article presents a general equation for substrate inhibition of microbial growth using a statistical thermodynamic approach. Existing empirical models adapted from enzyme kinetics, for example, the Haldane-Andrews equation, often criticized for not being physically based for microbial growth, are shown to derive from the general equation in this article, and their empirical parameters are shown to be well defined physically. Three sets of experimental data from the literature are used to test the modeling abilities of the general equation to represent experimental data. The results are compared with those obtained by fitting the same data set to a widely used empirical model existing in the literature. The general equation is found to represent all three experimental data sets better than the alternative model tested. In addition, a graphical method existing in enzyme kinetics is successfully adapted and further developed to determine the number of inhibition sites of a basic functional unit of a bacterial cell.
| null |
minipile
|
NaturalLanguage
|
mit
| null |
Rally and Demand Prosecution for STARVATION!
We must all start to stand as “One Voice” in the WORLD. Leaders way before our time warned us that society will be judged on our treatment of animals and that we must not be scared to be the voice for those who cannot speak. Please find a way to start to work together as a stronger alliance for an urgent calling to stop torture and abuse of animals and to prosecute those who do it to the fullest extent of the law.
Regarding case number 14-1408. We ask that you, as the prosecutor, understand the depth in which the public sees this matter. This may be a dog, considered a possession, and a misdemeanor A in Texas. However, in several states this would be considered a felony and prosecuted as such. It takes at least a month for a large dog to lose half their body weight and reach this depth of starvation. The pain of starving and the hours of mental anguish seem unfathomable. This dog was locked in a wood confinement with two padlocks (which shows INTENT to keep the dog locked in without food or water). When she was found, there was neither, not even bedding provided. The temperatures were in the 20’s and lower during that time. The disrespect for life was clearer by the strewn beer bottles in her prison she slept on. If one were to realize that in a month’s time the accused had at least 672 hours to understand the scope of this abuse and continue without remorse. The second dog, while sick and emaciated, was not locked away from any opportunity to seek food elsewhere, so his survival rate as we see was higher.
Rally passed away due to abuse, neglect and starvation. It is up to the state to prosecute on her behalf for animal cruelty. The interesting dilemma with this type of case is that you cannot hear her story, even if she had survived as Jacob did, neither have a voice to help you understand the severity of the torture they endured. It is important for all of us to follow these cases all over and to be the supporters that a child would have in a court case.
The public would be satisfied with the same sentence Adriane c Mason received for a like offense.A Portsmouth, VA man convicted of animal cruelty after a dog starved to death will serve six months in jail, a Circuit Court judge ruled this week. Adriane C. Mason, 35, was indicted by a grand jury on the misdemeanor charge last April 2014.
Most law abiding tax payers do not have the capability to be so cold and calculating. Most offenders of this nature that go without consequences will not only do this type of behavior again but can become more aggressive with the new found power of not fearing the law. Studies show that most habitual animal abusers move to kids, domestic abuse or worse. Stopping it at the root early seems like an effective way to stop the growing trend of criminal activity. As you know many states are watching these types of precedent setting cases. Considering the bail for this accused is currently 3,000 dollars; many hope that he will be held accountable for the full 5,000 dollar fine x2 for each dog - available in misdemeanor A charges. To fully have justice served, it seems appropriate, that in this case this individual should be found guilty, they should serve an appropriate jail sentence to clearly state the prosecutors in Texas will not take this type of abuse lightly.
With respect, we ask that you prosecute appropriately on behalf of the state of Taxes, Ector County and its voters.
Update #51 years ago
Rally got her day in court. Her website is www.rallyagainstanimalabuse.com and her facebook page is https://www.facebook.com/pages/Rally-Agains-Animal-Abuse/473805386062391. Please join the fight. http://www.gofundme.com/food4thehungry
Update #41 years ago
The owner of the Starved Boxers in Texas plead guilty.
Join their page: https://www.facebook.com/pages/Rally-Agains-Animal-Abuse/473805386062391
Website: http://www.rallyagainstanimalabuse.com/
Louisiana on Aug 26th Braveheart who starved and locked in a storage shed to die will have his day in court. Our hero is alive and wellthis will be the 6th time in court try to prosecute for a Felony. NO MORE Delays! Please go to his page and LIKE it so there are voices behind him!
| null |
minipile
|
NaturalLanguage
|
mit
| null |
System Keeps Rebooting When Trying To Get Into Safe Mode
Contents
It's always a good fallback, albeit a headache, to get your pc back in tip top shape... Windows system maintenance: Stability:How to scan and repair your PC's registry related errors Speed:How to increase PC speed and performance Drivers:How to scan your PC for the outdated drivers You are It caused only a blank screen? Can you help me with this issue? Source
How To Get Out Of Safe Mode Windows 10
How can I boot normally into windows again to uncheck the option? enter bootsect/nt60 SYS/force or bootsect/nt60 ALL/force and hit enter. If at this point the computer keeps restarting, you should look into replacing the power supply, then the motherboard in that order.
It tries to start, and then goes to the screen that you would get if you pressed f8, giving you the choices to boot from safe mode, or start normally, etc. Moving to a flash-based storage array could solve a lot of problems and help prevent ... Once you restart, you'll realize that you are in Safe Mode because it not only places that text in the four corners of the screen, but it even opens up the How Do I Get My Computer Out Of Safe Mode Quite simple actually, just start your window normally, once window is loaded, start any program like words.
Amazon Subscribe l l FOLLOW US TWITTER GOOGLE+ FACEBOOK GET UPDATES BY EMAIL Enter your email below to get exclusive access to our best articles and tips before everybody else. How To Exit Safe Mode On Android Stuck in a crashing boot loop of BSOD My computer turns on has the boot up screem which you can go to safe mode last known good config and normal and Take note that some users are misled into believing that the system is in Safe Mode primarily due to the incorrect setting of the video. Also before I was cleaver and changed the password and was using my computer it was telling me that that I wasn't the main administrator any more, I think it was
The computer keeps restarting in all modes (even in safe mode), so what could be the cause? How To Exit Safe Mode Samsung TechSpot is a registered trademark. IF it doesn't get to this point (blue screens before the chkdsk runs), then the next step will be to check your actual physical condition of the hard drive. I have a Windows-based computer stuck in an infinite reboot loop.
Keywest2014Mar 2, 2014, 1:51 PM Snow Fox said: Alternatively you can start with just a system repair, see if that works... this contact form Thanks Jul 14, 2009 #7 snowchick7669 TS Maniac Posts: 660 If you are comfortable taking the side/back off your machine when you machine is powered off, then you can look Puppylinux helps me get online when i'm in the shit and i got it for free. Then you put the CD in the laptop and it will automatically boot off that (if configured in BIOS, most machines will come standard with this configured correctly). How To Get Out Of Safe Mode Windows 8
Any suggestions? Once I got to the boot menu, the task of repairing my safe mode boot-looping system was a piece of cake. During the booting up process into Safe Mode, indications of what is causing the problem are usually shown via the display of system generated messages. have a peek here Reply Soon Thnx.
but how can you be able to return it into normal mode if the computer does not boot in safe mode? Turn Off Safe Mode Windows 7 But the first set of instructions is on creating the bootable disk. You are the best!
Because we don't have the install disks that would have come with the computer.
Thanks. The end result is a machine that can never boot completely. I dont know what to do? From Safe Mode To Normal Mode Windows 10 Tried loading QEMU in a lame attempt at getting msconfig.exe to run under linux and that was an exercise in total frustration.
It won't let me press F10 during startup. It is a tutorial on using memtest, which you don't need to worry about. But if a computer is having a hardware problem, this may not work. http://johnnysweb.net/safe-mode/only-work-in-safe-mode.html System restore does not work, it returns a bluescreen after system restore.
I've tried all if those. There are several ways to do this. Jul 15, 2009 #13 Matttt TS Rookie Topic Starter Posts: 20 Ok my dad tried to use a recovery disk in it aswell and now i know that it doesn't run If you have a dual-boot or multiple-boot computer, select the installation that you must access from the]Recovery Console.4.
You may also... Download this free guide Download: Essential tools for Windows admins The reboot problem is just one of many Windows-based bugs out there. Or you can also use a utility like the Offline NT Password & Registry Editor, which you can boot -- and use -- directly on the target system without actually booting if i try to reinstall windows,it will shut down automatically.
This tip worked like a charm. If you can't, join our forums and we'll troubleshoot. I was planning on editing the boot.ini file (or whatever is needed to get the original settings back), but I can't find the appropriate files. Now, I understand.
all of those instruction seems to work fine. March 22, 2008 peter Being picky I know, but just in case anyone cuts and pastes from PeopleGeek note the typo in msconfig: In Windows XP Click on "Start" Click "Run" Do you see any lights on the keyboard (with caplocks or any other lights)? The computer will run a thorough scan when the system boots next time.
February 3, 2011 Tim I'm using a windows xp laptop stuck on the safe mode loop after using msconfig. Im pretty computer illiterate but any help would be greatly appreciated. Maybe from all the rebooting and disk checking?
| null |
minipile
|
NaturalLanguage
|
mit
| null |
Studies on human brain-thymus cross-reactive antigens.
Antigens shared by human brain and thymocytes and by human and mouse tissues were studied with rabbit anti-human thymocyte antiserum (RAHT). It was found that cytotoxicity of RAHT serum against mouse thymus cells was not absorbed by mouse liver or bone marrow cells. Human brain and thymus cells completely absorbed the anti-thymocyte activity from this antiserum. It was suggested that human brain had antigenic determinants identical or very similar to those found on human thymocytes. Activity of RAHT antiserum against mouse thymus cells was completely removed by an absorption of mouse brain and thymocytes. These results demonstrated that there were shared antigenic determinants between human and mouse tissues.
| null |
minipile
|
NaturalLanguage
|
mit
| null |
Q:
Why is code inside of classes executed automatically when I run a ruby script?
When I write the following program,
class Classname
puts "hi"
end
save it as a .rb file, and execute the file in terminal, the output "hi" is returned. I don't understand why. Don't I have to assign that puts statement to a method, create an object of the Classname class, and then call the method on said object to get that output? Or at least put the puts statement in the initialize method of the class, and then create an object? Why does this work the way it is?
A:
Ruby is a scripting language, which means that you can just write
puts 'hi'
in a file without defining any class or methods.
Similarly, when you are defining a class, you are actually executing code to define that class. As a result, code that you execute inside of it may have side effects, like puts 'hi'. This is useful because metaprogramming is often used in Ruby to help define classes.
| null |
minipile
|
NaturalLanguage
|
mit
| null |
1. Field of the Invention
This invention relates to an air-cooled internal combustion engine.
2. Description of the Related Art
Conventional internal combustion engines of the type to which the present invention is directed include the following problems:
(1) A cam shaft and a balancing shaft are arranged separately on the left and right sides of a crank-shaft, and a heavy starting motor is positioned above the crank-shaft at the balancing shaft side of the crankshaft. Consequently, the engine has a high center of gravity, a large overall engine height, and an objectionable vibration noise sound level.
(2) As for a cooling structure, in Japanese unexamined Utility Model Publication No. 63-20821 for example, an air cleaner is disposed on the same side as a fan cover and cooling air sent from a cooling fan into a cylinder head is exhausted and dispersed in different directions, so that it is difficult to collect exhausted air into one spot. Therefore, it becomes difficult and requires a complicated arrangement to provide an exhaust air disposal mechanism when mounting such an engine on an operation machine.
(3) In the Japanese unexamined Utility Model Publication No. 63-20821, an exhaust muffler is connected to an exhaust port through a simple exhaust pipe and counter-measures against noise are not taken.
(4) The fuel injection valve is also not covered by a cylinder head cover so that a problem results due to noise emitted from around the fuel injection nozzle.
(5) The fuel tank is also supported directly on the engine body. Therefore, vibration-proof members should be attached to all supporting parts and this makes the supporting mechanism complicated.
(6) Also, with respect to the position of the air cleaner or the position of the air cleaner relative to the fuel injection pump, the air cleaner is not utilized as a means for reducing noise.
| null |
minipile
|
NaturalLanguage
|
mit
| null |
Tuesday, March 28, 2006
Gold Engagement Ring
A gold engagement ring is essentially composed of two parts. A diamond and a setting which is usually of gold, either yellow or white but can, on rare occasions, be green or rose gold.
Probably the first criteria for buying the gold engagement ring is, ‘how much should I spend?’
This is an emotional purchase but you still one need a clear head to ensure that what you buy is:
a) within you budget andb) that the gold engagement ring is what it is advertised to be and carried\s a certificate of authenticity for the diamond and a guarantee for the setting. andc) you ensure you get value for money spent
Having got that established the next thing is, ‘what type of gold engagement ring will she love?
There are a variety of settings available including a solitary diamond or one larger diamond with smaller ones surrounding and setting of the center stone. If you are purchasing in secret for a presentation and proposal at the right time, perhaps some discreet inquiries to see what sort of ring she would like would be prudent. And not forgetting the ring size. If you are going together then it is simply a matter of applying a, b and c above and within those guidelines selecting the ring she likes the best.
Picking the right jeweller can make all the difference also. The better class and quality jeweller you can afford is best. At the least the jeweller should be prepared to spend some time with you assisting to pick the right ring and to provide information about the diamond an setting and also the requisite certificates upon purchase.
It is most unwise to buy a diamond sight unseen. Always ensure you see a diamond for yourself in natural light and get an independent appraisal if you can.
The setting should also be of a gold that is strong and durable. This means getting say a 14 or 18 carat ring and not a 24 or even 22 carat ring as it will be too soft and will not last as long. In a 14 and 18 carat ring the gold is alloyed with a strong metal such as copper or bronze to provide longer wear over time.
Following the above guidelines will help to ensure that a gold engagement ring is bought that is satisfactory to the future bride and will last for a lifetime.
| null |
minipile
|
NaturalLanguage
|
mit
| null |
Introduction
============
Japanese encephalitis (JE) is one of serious vector-borne viral encephalitis disease found worldwide, especially in Asian, the Western Pacific countries, and in northern Australia.[@b1-tcrm-11-435] Over 3 billion individuals live in JE epidemic and/or endemic countries. It is estimated that approximately 67,900 JE cases have occurred annually in 24 countries, with only 10,426 cases reported in 2011.[@b2-tcrm-11-435],[@b3-tcrm-11-435] The fatality rate in JE cases ranges from 20%--30%, with neurologic or psychiatric sequelae observed in 30%--50% of survivors.[@b3-tcrm-11-435]
JE is induced by infection with Japanese encephalitis virus (JEV), which belongs to the JEV serogroup in the genus *Flavivirus*, family *Flaviviridae*.[@b4-tcrm-11-435] JEV has a single-stranded, positive-sense RNA genome of \~11 kb in length. The JEV virion contains seven non-structural proteins (NS1, NS2A, NS2B, NS3, NS4A, NS4B, and NS5) and three structural proteins: nucleocapsid or core protein (C), non-glycosylated membrane protein (M), and glycosylated envelope protein (E).[@b5-tcrm-11-435] The main JEV transmission vector is the *Cx.* mosquito especially *Cx. tritaeniorhynchus*, and the main vertebrate amplifying hosts are pigs and wading birds.[@b6-tcrm-11-435]
Epidemiology of JE
==================
Epidemiological patterns
------------------------
Two epidemiological patterns of JE are recognized: epidemic and endemic ([Figure 1](#f1-tcrm-11-435){ref-type="fig"}).[@b6-tcrm-11-435],[@b7-tcrm-11-435] Epidemic patterns observed mainly in northern areas (Bangladesh, Bhutan, People's Republic of China, Taiwan, Japan, South Korea, North Korea, Nepal, northern Vietnam, northern India, northern Thailand, Pakistan, and Russia) demonstrate typical seasonal characteristics with occasional outbreaks. Endemic patterns found in southern areas (Australia, Burma, Brunei Darussalam, Cambodia, Indonesia, Laos, Malaysia, Papua New Guinea (PNG), Philippines, Singapore, southern Vietnam, southern Thailand, southern India, Sri Lanka, and Timor-Leste) occur sporadically throughout the year.
Geographic distribution of JE
=============================
The characteristics of JE epidemics among the 27 countries and regions have changed with adjustments in JE prevention and control measures. The characteristics of epidemic and endemic JE, the sort of vaccine, as well as the JEV genotypes in these areas are summarized below and in [Table 1](#t1-tcrm-11-435){ref-type="table"}.
Australia
---------
JE was first recognized in 1995 in an outbreak of three cases in the Torres Strait, Australia; two JEV isolates were obtained from the serum of two patients.[@b8-tcrm-11-435],[@b9-tcrm-11-435] Mosquito surveillance indicated that *Cx. annulirostris* was the major vector, which was carried by the wind from New Guinea.[@b9-tcrm-11-435]--[@b13-tcrm-11-435] Two additional JE cases were reported, including the first cases on mainland Australia. A serological survey in domestic pigs showed widespread JEV activity in north Queensland in 1998.[@b14-tcrm-11-435],[@b15-tcrm-11-435] Follow-up surveillance on pigs and mosquitoes indicated that the JE risk was not eliminated.[@b16-tcrm-11-435],[@b17-tcrm-11-435] The inactivated mouse brain-derived (MBD) JE vaccine was used exclusively on the residents of the Torres Strait Islands, as well as the people who lived or worked over 30 days on the Torres Strait islands during the rainy season.[@b2-tcrm-11-435]
Bangladesh
----------
First reported in 1977, a JE outbreak involving 22 cases with seven deaths was confirmed by serological testing. More than two-thirds of the patients were under 15 years old. However, serological surveillance revealed a low JE positive antibody rate after two years.[@b18-tcrm-11-435] In 2003--2005, a hospital-based surveillance of 492 patients at four sites revealed 20 JE cases (4%) with two deaths; all JE cases were from rural areas. The age distribution ranged from 1.5 months to 55 years, and 90% of the JE cases occurred during May--October, with nearly half in October.[@b19-tcrm-11-435] It is estimated that the JE incidence rate was 0.6--2.7 per 100,000 in Chittagong and Rajshahi.[@b20-tcrm-11-435]
Bhutan and Brunei Darussalam
----------------------------
Little is known about JE epidemiology in this region.
Myanmar (Burma)
---------------
A serological survey proved the existence of JE in Burma in 1968. A JE outbreak was first reported in 1974 in Shan State in which five cases and four deaths were reported; 42 cases and 32 deaths were reported in the following year. All cases occurred in July--October, and 83.3% of the patients were under 20 years old.[@b21-tcrm-11-435] The subsequent investigation showed that *Cx. tritaeniorhynchus* was likely to have been the main vector, and the JE antibody positive rates were 81.5% and 42% in domestic animal and human populations, respectively.[@b21-tcrm-11-435] Another serological survey confirmed the prevalence of JEV infections in northwest Burma in a location distant from the JE outbreak in 1978.[@b22-tcrm-11-435]
Cambodia
--------
JEV was first isolated from mosquitoes in 1965. Existing JE data were from several sentinel hospitals, with no national JE epidemiological data available. Among 50 pediatric clinical encephalitis cases diagnosed in the National Pediatric Hospital in Phnom Penh from July 1996 to September 1998, JE was confirmed in nine (18%) patients, all of whom were under 10 years of age.[@b23-tcrm-11-435] In another surveillance performed by Takeo Provincial Hospital from October 1999 to September 2000, 31% of the JE patients were under 15 years.[@b24-tcrm-11-435] Subsequently, two years of sentinel surveillance performed in six hospitals revealed that 95% of JE patients were under 12 years of age, and cases occurred throughout the year with no prominent seasonal peak. The estimated incidence of JE was 11.1 per 100,000 in children under 15 years of age.[@b25-tcrm-11-435] The extent of disability after JE resulted in 11% with severe sequelae.[@b26-tcrm-11-435] A study assessing JEV infection in pigs in eight provinces showed that pigs older than 6 months had high rates of JEV infection, suggesting that human JE disease also had the potential for high prevalence.[@b27-tcrm-11-435] After a cost and effectiveness analysis for the JE vaccine, the live attenuated SA 14-14-2 JE vaccine (LAV-SA 14-14-2) was used in the routine immunization strategy in Cambodia.[@b2-tcrm-11-435],[@b28-tcrm-11-435]
People's Repulic of China
-------------------------
JE was first reported in the 1940s, and became the main cause of viral encephalitis in the People's Republic of China. The JE case reporting system has been mandated by law since 1951.[@b29-tcrm-11-435],[@b30-tcrm-11-435] The morbidity due to JE was 10--15 per 100,000 in 1960--1979, which reached the highest level (20.92 per 100,000) in 1971. The seasonal distribution of JE in the People's Republic of China is from June to October, with a peak in July and August. Children under 15 years of age constitute the majority of JE cases.[@b29-tcrm-11-435] Use of the MBD JE vaccine (P3 strain) began in the late 1970s, and the LAV-SA 14-14-2 was introduced in 1989. The reported cases of JE decreased dramatically from 10,308 in 1996 to 2541 in 2010.[@b29-tcrm-11-435],[@b30-tcrm-11-435] However, adult JE cases and outbreaks have been reported.[@b31-tcrm-11-435] Since 2008, JE immunization has been included in the national immunization program using the LAV-SA 14-14-2 in 28 Chinese provinces, excluding Qinghai, Xinjiang, and Tibet.[@b32-tcrm-11-435] Tibet is a traditionally non-epidemic area in the People's Republic of China; however, JEV was isolated from *Cx. tritaeniorhynchus* in Linzhi, Tibet in 2009. In the same region, the JEV antibody was also tested in pig and human serum.[@b33-tcrm-11-435]--[@b35-tcrm-11-435] A laboratory for JE surveillance of hospital-reported encephalitis cases was later set up in that area. In history, JE cases were mainly clinically reported. A survey based on the laboratory testing of the hospital-reported JE cases in Guizhou in 2006 showed nearly 87.6% of the reported clinical JE cases were laboratory confirmed and the high number of JE cases was mainly reported in county hospitals.[@b36-tcrm-11-435] Acute meningitis and encephalitis syndrome (AMES) surveillance in four prefectures in the People's Republic of China during 2006--2008 indicated that the adjusted estimate of JE incidence was three to ten times higher than that reported previously.[@b37-tcrm-11-435] The JE lab-net were set up in 2011 and with the improved JE surveillance system in the People's Republic of China, more than 90% of reported JE cases have been diagnosed by laboratory testing.
Republic of China (Taiwan)
--------------------------
"Summer encephalitis" was first documented in 1931; however, JEV isolation and serological evidence for the disease was not obtained until 1938.[@b38-tcrm-11-435]--[@b40-tcrm-11-435] A JE vaccination campaign in infants and new school children was launched in 1968, and the complete JE immunization strategy was adjusted to include a total of four doses of MBD JE vaccine.[@b40-tcrm-11-435]--[@b42-tcrm-11-435] At the same time, a live attenuated JE vaccine (M strain) was also used to protect swine against stillbirths in Taiwan.[@b43-tcrm-11-435] The incidence rate of confirmed JE cases decreased significantly from 2.05 per 100,000 in 1967 to 0.03 per 100,000 in 1997.[@b40-tcrm-11-435] The number of annual confirmed JE cases decreased dramatically from 35 cases in 2000 to only 20 in 2007.[@b44-tcrm-11-435] The epidemic season appeared from May to October, with a sharp peak in July and August.[@b38-tcrm-11-435]--[@b40-tcrm-11-435],[@b44-tcrm-11-435] The age distribution shifted from mainly children to adults, with nearly 90% of laboratory-confirmed JE cases older than 20 years (range, 20--70 years).[@b40-tcrm-11-435],[@b44-tcrm-11-435] Currently, JE is a disease found predominantly in adults living in eastern, central, and southern Taiwan, ie, in regions with more livestock breeding and agricultural industry.[@b44-tcrm-11-435] Mosquito surveillance showed that *Cx. tritaeniorhynchus* and *Cx. annulus* were the most important JEV vectors to human and domestic animals. *Cx. fuscocephala* showed an overwhelming preference for the water buffalo, documented to be involved in JEV transmission in Taiwan.[@b45-tcrm-11-435]--[@b47-tcrm-11-435]
Guam
----
Although there is no evidence for any encephalitis in Guam, a JE outbreak in the Pacific islands occurred with a total of 46 clinical JE cases reported from October 1947 to April 1948.[@b48-tcrm-11-435],[@b49-tcrm-11-435] The mosquito survey showed that the *Cx. annulirostris marianae* was a suspected vector during this outbreak.[@b50-tcrm-11-435]
India
-----
JE was first recognized via a serological survey in the 1950s.[@b51-tcrm-11-435]--[@b53-tcrm-11-435] The first JE outbreak was reported in West Bengal in 1973, followed by reports in southern, eastern, and western states.[@b54-tcrm-11-435]--[@b58-tcrm-11-435] JE was first reported in Uttar Pradesh, the main JE epidemic area in the northern state of India in 1978.[@b59-tcrm-11-435] After that, a severe outbreak of JE occurred with 5,700 cases and 1,315 deaths in Uttar Pradesh state in 2005.[@b60-tcrm-11-435],[@b61-tcrm-11-435] The clinical features of the cases were severe, and the in-hospital mortality was 34% in one hospital.[@b62-tcrm-11-435] Hospital-based acute encephalitis syndrome (AES) surveillance in north and northeast India showed that \~25% of cases were positive for JE, which were prevalent mainly in children.[@b63-tcrm-11-435]--[@b65-tcrm-11-435] The estimated JE incidence rate was 15 per 100,000 in 5--9-year-olds in Tamil Nadu, a state in southern India.[@b66-tcrm-11-435] The JEV infection rate reached as high as 70.7% of the cases.[@b67-tcrm-11-435] Laboratory tests confirmed that the JE cases occurred throughout the year, with more cases in the rainy season.[@b68-tcrm-11-435],[@b69-tcrm-11-435] A routine program was implemented in this JE epidemic area starting from 2006 using the LAV-SA 14-14-2. The *Cx. vishnui* subgroup, and the *Cx. tritaeniorhynchus, Cx. seudovishnui* and *Anopheles subpictus*, were the main mosquito vectors and secondary vectors in India.[@b70-tcrm-11-435]--[@b72-tcrm-11-435] The minimum infection rate of JEV in mosquito remained as low as 0.8 annually from 1996 to 2004.[@b73-tcrm-11-435]
Indonesia
---------
The first serologically confirmed JE cases were reported in 1996.[@b74-tcrm-11-435] Subsequently, hospital-based surveillance in Bali from 2001--2003 showed a total of 86 laboratory confirmed (with 4 probable) JE cases in 239 pediatric patients. The estimated JE incidence rate was 8.2 per 100,000 in children under 10 years of age. The JE cases occurred throughout the year, but mainly in the rainy season.[@b75-tcrm-11-435] A sentinel surveillance involving 15 hospitals in six provinces from 2005--2006 further confirmed the presence of JE cases in all provinces throughout the year, with 95% of cases occurring in children under 10 years of age.[@b76-tcrm-11-435] A survey of JEV antibodies in pigs showed that the antibody positive rate in Bali was higher than that in East Java, indicating that exposure to JEV infection and JEV transmission in nature were more active in Bali than in East Java.[@b77-tcrm-11-435],[@b78-tcrm-11-435] JEV was first isolated from *Cx. tritaeniorhynchus* in 1972.[@b76-tcrm-11-435]
Japan
-----
After experiencing a serious summer encephalitis, Japan implemented the National Epidemiological Surveillance of Vaccine Preventable Diseases in 1965. The comprehensive surveillance included laboratory confirmation of reported JE cases, serological survey on JEV antibodies in the population, and a sentinel survey of JEV seroconversion rates in pig.[@b79-tcrm-11-435] The inactivated MBD JE vaccine using the Nakayama strain was distributed widely in 1967.[@b80-tcrm-11-435] Subsequently, the annual number of JE cases decreased from more than 1,000 to 90 in 1991, and less than ten cases after that. All cases were reported from July to November. The age distribution changed from children to adults, with 78% of cases over 40 years old; 51% had records showing the lack of JE vaccinations.[@b79-tcrm-11-435] Although the numbers of JE cases were low, unexpected outbreaks still occurred.[@b81-tcrm-11-435],[@b82-tcrm-11-435] Inactivated Vero cell-derived JE vaccine produced with the Beijing-1 strain was used after 2005.[@b83-tcrm-11-435] The JEV NS1 antibody-based testing method was used as a marker to test the JEV natural infection rate, as the NS1 protein was not expressed after inoculation with the inactive vaccine. A survey on natural infection of JEV in humans and horses indicated that JE remains prevalent in Japan.[@b80-tcrm-11-435],[@b84-tcrm-11-435]--[@b89-tcrm-11-435] *Cx. tritaeniorhynchus* is the main vector in Japan.[@b90-tcrm-11-435] Serological surveillance on JEV was performed in various animals including raccoons, raccoon dogs, wild boars, and horses. The results suggested that JEV was prevalent in wild animals and they may be potential sentinels to estimate JEV infection risk.[@b91-tcrm-11-435]--[@b94-tcrm-11-435]
Laos
----
The first reported cases of JE were described in 1990. A seroepidemiological study of JE in the Vientiane and Khammouane provinces showed that the JE antibody positive rate increased with age, reaching over 50% by 31--40 years of age.[@b95-tcrm-11-435] A separate serological investigation in Khammouane province further proved the JE epidemic, with 1.3% positivity to JEV.[@b96-tcrm-11-435] A large-scale serosurvey for flavivirus including the dengue virus (DENV) and JEV was conducted in Vientiane, the capital of Laos, which contains 5% of the national population. This study indicated that urbanization affected the risk of virus infection.[@b97-tcrm-11-435] A hospital investigation from 2001 to 2008 showed a 10.1% JE positive rate in AES and meningitis cases, with more than half of the JE cases under 15 years of age.[@b98-tcrm-11-435] The first JEV was isolated from human blood in 2009, which belonged to genotype 1.[@b99-tcrm-11-435]
Malaysia
--------
Although information is scarce regarding the national JE epidemic in Malaysia, three JE outbreaks were recorded in 1974, 1988, and 1999, with 154 reported JE cases (42 laboratory confirmed cases) and 56 deaths in the 1999 outbreak. Most of the patients were adult males who worked on pig farms.[@b100-tcrm-11-435],[@b101-tcrm-11-435] The MBD JE vaccine was introduced to children under 15 years of age in July 2001. According to a hospital-based surveillance study focused on cases in Sarawak, the estimated JE incidence rate decreased from 9.8 to 4.3 cases per 100,000 children under 12 years of age.[@b101-tcrm-11-435]--[@b103-tcrm-11-435] JEV isolation from mosquitoes indicated that the main vectors were *Cx. tritaeniorhynchus* and *Cx. gelidus*, which breed primarily in rice fields.[@b6-tcrm-11-435] However, infection experiments suggested that *Cx. sitiens* also had the capacity to transmit JEV in Peninsular Malaysia.[@b104-tcrm-11-435]
Nepal
-----
JE cases were first reported in 1978 in the Terai districts near India.[@b105-tcrm-11-435] JE was a seasonal disease epidemic from July to October and the incidence rate decreased with altitude, showing higher rates in the south and lower rates in the northern mountains; however, the JE is still epidemic in the mountainous altitude.[@b106-tcrm-11-435] Four western Terai districts had significantly higher JE incidence rates than the other areas in Nepal.[@b107-tcrm-11-435],[@b108-tcrm-11-435] The laboratory-based surveillance of JE spanned from mid-2004 to 2010 and covered 126 hospitals in the country. A total of 2,040 JE cases including 205 deaths were reported from 2005 to 2010 after mass immunization in 2006.[@b109-tcrm-11-435] The JE incidence rate decreased to 1.3 per 100,000 after the JE immunization campaign.[@b110-tcrm-11-435] A routine program was implemented in this JE epidemic area starting from 2006 using the LAV-SA 14-14-2, followed by mass vaccination campaigns conducted in 23 districts with high JE epidemic area.[@b110-tcrm-11-435] Pigs in Terai, the lower border district, were vaccinated with live attenuated virus in 2001. JEV Serological data in pig indicated a serious risk for farmers, residents, and travelers.[@b111-tcrm-11-435]--[@b114-tcrm-11-435]
North Korea
-----------
Little is known about JE epidemiology in North Korea.
Pakistan
--------
JE was confirmed by a seroepidemiological survey in the early 1980s in Pakistan.[@b115-tcrm-11-435] An acute encephalitis case was further confirmed during the JE epidemic in 1992 by molecular diagnosis using reverse transcription-polymerase chain reaction (RT-PCR) for JEV from cerebrospinal fluid (CSF).[@b116-tcrm-11-435] No national JE epidemiology information is available due to the lack of a surveillance program.[@b2-tcrm-11-435]
Papua New Guinea (PNG)
----------------------
A JE outbreak had been a concern in the island between Papua New Guinea and Australia. JEVs were isolated from mosquitoes, and clinical cases were reported in the west province. In 2004, serological testing confirmed JE in a 66-year-old male from Port Moresby.[@b15-tcrm-11-435],[@b117-tcrm-11-435],[@b118-tcrm-11-435]
Philippines
-----------
JE was first recorded in the early 1950s, and JEV was first isolated from mosquitoes in 1977.[@b119-tcrm-11-435] A serological study on clinical viral encephalitis cases revealed that 85.2% of JE cases were under 15 years old, and occurred mainly in February--September.[@b120-tcrm-11-435] In 2002--2005, a total of 614 CSF specimens were tested by IgM-capture enzyme-linked immunosorbent assay (ELISA), of which 11.7% were positive. Laboratory-confirmed JE cases were reported each year in individuals ranging from 2 to 77 years, however, 72.9% were under 17 years of age. JE cases occurred year-round, and mainly in the rainy season.[@b121-tcrm-11-435]
Russia
------
The JE epidemic area was limited to the eastern coastal area of Siberia. JEV isolates were obtained from blood in migratory birds[@b122-tcrm-11-435] and human brain;[@b123-tcrm-11-435] however, the genotype was not clear due to lack of viral sequences.
Saipan
------
An outbreak of JE occurred in Saipan in October 1990. Ten cases (three laboratory-confirmed and seven probable) were identified in a human population of approximately 40,000. A community serosurvey showed that the neutralizing antibody of JEV was positive in lifelong Saipan residents in 1991, but negative in 1984. An animal serosurvey showed positive JEV antibody in 96% swine, an important amplifying host of JEV when epidemics occur in ducks, dogs, and goats.[@b124-tcrm-11-435] No virus was isolated from mosquitoes. *Cx. tritaeniorhynchus*, an abundant and widely distributed species, is the first recorded in Saipan.[@b125-tcrm-11-435]
Singapore
---------
JE cases were first reported in 1952.[@b1-tcrm-11-435] Approximately 100 JE cases were reported in the 1970s and early 1980s, and a dozen were reported during 1985--1992.[@b126-tcrm-11-435],[@b127-tcrm-11-435] The incidence of JE decreased dramatically in Singapore after pig farming was completely eliminated in 1992, with six reported JE cases from 1991--2005.[@b128-tcrm-11-435] However, seroepidemiological data on wild pigs and other local animals indicate that JEV is still circulating in nature, and the risk of JEV infection persists.[@b126-tcrm-11-435],[@b127-tcrm-11-435] JEV isolates were obtained from mosquitoes and human blood.[@b129-tcrm-11-435]
South Korea
-----------
A human JE case was first confirmed in 1946,[@b130-tcrm-11-435] which was included in the national surveillance system in 1949.[@b131-tcrm-11-435] Before 1983, hundreds to thousands of JE cases were reported.[@b6-tcrm-11-435] The MBD JE vaccine was first administered to children in 1971, and the mass vaccination program started during a large outbreak in 1983.[@b131-tcrm-11-435] The JE incidence rate decreased to 0.013--0.055 per 100,000 (about ten cases reported annually), with affected individuals in the age range of 40--49 years. The largest epidemic appeared in August.[@b131-tcrm-11-435] Mosquito surveillance showed that the *Cx. tritaeniorhynchus* first appeared in June, were trapped in large numbers from mid-August to early September, then significantly decreased in early October.[@b132-tcrm-11-435],[@b133-tcrm-11-435] With the decline in JE cases, the serological surveillance on JEV in potential animals has been strengthened. The incidence of JEV was 51.3% in domestic cattle,[@b134-tcrm-11-435] 12.1% in goat,[@b135-tcrm-11-435] 49.7% in horses,[@b136-tcrm-11-435] and 86.7% in wild bird.[@b137-tcrm-11-435] At present, the most important public health problem is how to issue JE protection in adults who live in an urban or suburban environment with a strong immunization program in children.
Sri Lanka
---------
The presence of JE was recorded in 1968, and the first JE outbreak was reported in 1971.[@b138-tcrm-11-435] Subsequently, three major outbreaks were reported in 1985--1987,[@b6-tcrm-11-435] with hundreds of JE cases occurred during the fall. Comparing epidemic (1987) and non-epidemic (1988) years, the difference can be explained by the abundance of major mosquitoes (*Cx. tritaeniorhynchus* and *Cx. gelidus*) and virus infection rate.[@b139-tcrm-11-435] Immunization was launched in Sri Lanka in 1988 using two kinds of JE vaccines: the MBD JE vaccine and the live attenuated SA14-14-2 JE vaccine (LAJEV); however, the country's immunization program selected only the inactivated vaccine.[@b138-tcrm-11-435],[@b140-tcrm-11-435] JEV was first isolated in 1974.[@b139-tcrm-11-435]
Thailand
--------
Serological testing identified the JEV antibody in 1961. Records for all types of encephalitis were included in the routine disease surveillance system in Thailand. JE was epidemic with high incidence and significant seasonal characteristics that occurred from May to September, with a peak in June or July, in the northern and northeast region. Endemic and sporadic cases were reported in the central and southern area. A total of 1500--2500 encephalitis cases were reported annually from the 1970s--1980s, which decreased to 297--418 per year from 2002--2008.[@b141-tcrm-11-435]--[@b143-tcrm-11-435] A hospital-based survey found that 74% and 15% laboratory-confirmed JE cases were under 15 years of age in 1987 and 2003, respectively.[@b142-tcrm-11-435],[@b143-tcrm-11-435] The MBD JE vaccine was introduced into the Thai National Immunization Program (NIP) in 1990.[@b144-tcrm-11-435] *Cx. tritaeniorhynchus, Cx. gelidus* and *Cx. fuscocephala* were the main vectors of JE in Thailand.[@b142-tcrm-11-435]
Timor-Leste
-----------
Little is known about JE epidemiology in this country.
Vietnam
-------
Viral encephalitis (including JE) has been reported in the national surveillance system in Vietnam. The highest estimated JE incidence rate was 22 per 100,000 in the 1960s, which decreased to 1--8 per 100,000 individuals. The highest incidence rates were reported in the provinces near the Red River delta region in the north and the Mekong River delta region in the south. MBD JE vaccine was introduced in 12 high-risk districts in the northern region in 1- to 5-year-old children in 1997, and expanded to 65% of districts in Vietnam.[@b145-tcrm-11-435] JE displayed an obvious age distribution and seasonal pattern in the northern region. Over 65% of AES cases under 18 years old were laboratory-confirmed JE cases, mainly from May--July. On the other hand, sporadic JE cases were reported throughout the year.[@b146-tcrm-11-435],[@b147-tcrm-11-435] JEV was first isolated in 1951.[@b145-tcrm-11-435]
JEV genotype distribution
-------------------------
The prototype Nakayama JEV strain was isolated from a post-mortem human brain in Tokyo, Japan, in 1935.[@b148-tcrm-11-435] Subsequently, more JEV isolates were obtained from mosquitoes, pigs, humans, bats, midges, and wild birds worldwide. Phylogenetic analysis of JEV strains revealed that JEVs can be divided into four genotypes using the *prM* gene[@b149-tcrm-11-435],[@b150-tcrm-11-435] and five genotypes according to the E gene and full length genome.[@b151-tcrm-11-435],[@b152-tcrm-11-435] The most recent common ancestor (TMRCA) analysis according to the complete genomic sequences of JEV isolated from human, various mosquitoes, midges, pigs, and bats, indicates that the JEV genome appeared 1695 years ago. Genotype 1 JEV expanded in epidemic areas over the last 30 years, and an alternative genotype 3 became a domestic pathogen.[@b153-tcrm-11-435],[@b154-tcrm-11-435]
Three JEV genotypes (G1, 3, and 5) from mosquitoes, bats, midge, and humans were isolated in Mainland China,[@b31-tcrm-11-435],[@b34-tcrm-11-435],[@b155-tcrm-11-435]--[@b158-tcrm-11-435] and two JEV genotypes (G1 and 3) were isolated in Taiwan. The JEV isolates from mosquitoes, pigs, bird, and human belonged to G3 before 2008, after which G1 was the only isolate from mosquitoes.[@b159-tcrm-11-435]--[@b161-tcrm-11-435] Two JEV genotypes (G1 and 3) had been isolated in Japan. The JEV isolates from mosquitoes, pigs, and human belonged to G3 before 1992, co-circulated from 1993--1994, after which G1 dominated. JEV G1 was isolated from mosquitoes and horses, and G1 sequences were found in wild boar and a meningitis patient; however, G3 was also isolated or identified by RT-PCR in JE cases.[@b81-tcrm-11-435],[@b85-tcrm-11-435],[@b162-tcrm-11-435]--[@b174-tcrm-11-435] Three JEV genotypes (G1, 3 and 5) were isolated or sequenced in South Korea. G3 was dominant before 1993; G1 and G3 co-circulated in 1993--1994, after which G1 was the only genotype isolated from mosquitoes and pig.[@b130-tcrm-11-435],[@b175-tcrm-11-435]--[@b178-tcrm-11-435]
India, Nepal, Thailand, and Vietnam also had G1 and G3 genotypes, and G1 became the dominant genotype in this area.[@b179-tcrm-11-435] In India, phylogenetic analysis of the JEVs isolated from human CSF in 2009--2010 showed that G1 and G3 were co-circulating.[@b180-tcrm-11-435],[@b181-tcrm-11-435] However, the equine isolates also belonged to the G3, similar to the old strain.[@b182-tcrm-11-435],[@b183-tcrm-11-435] In Vietnam, the JEV isolated from mosquitoes, pigs, and human belonged to G3 before 2001, after which G1 was the only genotype isolated from mosquitoes.[@b184-tcrm-11-435]--[@b187-tcrm-11-435] JEV G1 was isolated from mosquitoes from 2000--2004 in Australia,[@b16-tcrm-11-435] where the G2 genotype was isolated from mosquito and patients,[@b9-tcrm-11-435],[@b10-tcrm-11-435] and also in PNG.[@b117-tcrm-11-435]
All parental strains currently used for JEV vaccines (SA14 and Beijing-1 from the People's Republic of China, and Nakayama from Japan) are derived from JEV G3. Although five genotypes of JEV are found in nature, only one JEV serotype occurs naturally. In theory, the vaccine that is currently in use could protect against the epidemic JEV. The study indicated that the vaccine currently used prevents the G1 and G3 JEV infections prevalent in the People's Republic of China.[@b188-tcrm-11-435] At present, the licensed JE vaccines used in different countries include inactivated MBD (Nakayama and Beijing-1), inactivated Vero cell-based (Beijing-1, P-3, SA 14-14-2, Kolar strain-JEV 821564XY), live attenuated vaccine (SA14-14-2) from Chengdu Institute of Biological Products, and the chimeric live attenuated SA14-14-2 vaccine. The live attenuated SA14-14-2 vaccine is the first Chinese vaccine to have its safety and quality endorsed by the World Health Organization (WHO) for use with children. The efficiency of the present JE vaccine in eliciting protective neutralizing antibodies against different JEV strains needs to be evaluated.
Summary and future prospects
============================
According to the current epidemic/endemic characteristics of JE, the disease surveillance and vaccination strategies in these countries and regions could be divided into four levels.
Group 1: Japan, South Korea, and Republic of China (Taiwan) have reported JE epidemics; however, these countries conducted complete surveillance and JE immunization programs, resulting in \<30 reported JE cases annually. The characteristics of the JE epidemics were analyzed and JE control measures have continued. The main public health problem, prevention and future control, will focus on adult JE cases following long-term mass JE immunization.
Group 2: Cambodia, People's Republic of China, India, Malaysia, Nepal, Sri Lanka, Thailand, and Vietnam, have reported JE epidemics, endemics and/or outbreaks. National or sentinel (hospital-based) surveillance programs were established, and JE vaccines were used in national or sub-national areas (in high-risk area). The JE cases reported worldwide are mainly from these countries, especially India and the People's Republic of China, which account for 95% of all cases. JE prevention and control are the main issues for global JE control. The following comprehensive measures should be adopted: 1) expansion of the surveillance system to include i) laboratory confirmation of JE and AES cases to understand the actual JE incidence, ii) virus isolation in mosquitoes and JE cases to grasp the molecular characteristics and mutation of the JEVs, iii) seroconversion rates in amplifying vectors (sentinel pigs or wild birds) nationwide, iv) assessment of the prevalence of JE antibodies in the general population. 2) Incorporation of the JE vaccine into routine immunization programs in children. Japan's success has demonstrated the JE vaccine as the most effective measure to reduce JE incidence. 3) Establishment of different pig breeding patterns by moving large-scale pig farms away from rice paddies. This measure will greatly reduce the chance of people becoming infected with JE; however, it is closely related to the economic level of the country. 4) Mosquito vector control, improvement in the living environment, and health education are important, especially during a JE outbreak.
Group 3: Bangladesh, Bhutan, Brunei Darussalam, Burma (Myanmar), Indonesia, Laos, North Korea, Pakistan, PNG, Philippines, and Timor-Leste have no known established sentinel JE surveillance systems, and no JE immunization programs. Future national surveillance programs should focus on JE cases to understand the disease burden, although these countries report fewer than 100 JE cases.
Group 4: Australia (risk area), Guam, Russia (Siberia), Singapore, and Saipan have reported fewer than three JE cases annually. Therefore, maintenance of the existing surveillance systems and developing immunization strategies as a one-time campaign in the target population are suggested.
Though JE is highly distributed, outbreaks still occur in epidemic areas. Other than the present conventional practices (mosquito control, health education propaganda, etc), emergency vaccination campaigns are currently the most effective measures against outbreaks.
Conclusion
==========
Although JE remains a prominent public health problem in Asia, the reported cases are decreasing due to JE immunization (especially in the People's Republic of China and India), agricultural pattern changes, urbanization, and improved living conditions. As JEV will likely remain in nature and the risk of JE will persist, it is important to implement strategies that strengthen JE surveillance systems in order to understand the disease burden and apply vaccination protocols in national childhood immunization programs.
This work is supported by grants from China Mega-Project for Infectious Disease (2012ZX10004215, 2013ZX10004-101), National Natural Science Foundation of China (81290342), The Ministry of Science and Technology, China (2011CB504702), and Development Grant of State Key Laboratory for Infectious Disease Prevention and Control (2014SKLID103). The funders had no role in study design, data collection and analysis, decision to publish, or preparation of the manuscript.
**Disclosure**
The authors report no conflicts of interest in this work.
{#f1-tcrm-11-435}
######
The information of JE and JEV in the epidemic and/or endemic countries or area
No Country and regions Existed of JE Surveillance JE age characteristics Epidemic season JE outbreak Estimated JE incidence Virus isolation year Vector JEV genotype Sort of vaccine Reference
---- ------------------------------------------------------- ---------------- ----------------------------------- ------------------------------------------ ------------------------------------------ ------------------------------------------------------------- ------------------------------------------ ---------------------- -------------------------------------------- -------------- ------------------------- ------------------------------------------------------------
1 Australia[\*](#tfn1-tcrm-11-435){ref-type="table-fn"} 1995 National Teenage and adult April 2 in 1995/2 in 1998 \<3 cases 1995 Mosq./H-S G1, 2 MBDV [@b8-tcrm-11-435]--[@b17-tcrm-11-435]
2 Bangladesh 1977 Hospital-based (4 sites/2 years) 2/3 patients \<15 years old May to Dec/pick in Oct 22 patients with 7 died in 1977 0.6--2.7/100,000 -- -- -- [@b18-tcrm-11-435]--[@b20-tcrm-11-435]
3 Bhutan -- -- -- -- -- -- -- -- -- --
4 Brunei Darussalam -- -- -- -- -- -- -- -- -- --
5 Burma (Myanmar) 1968 National 83.3% \<20 years old July to Oct 5 cases (4 deaths) in 1947 and 43 cases (32 deaths) in 1948 -- -- -- -- [@b21-tcrm-11-435],[@b22-tcrm-11-435]
6 Cambodia 1965 Hospital-based (6 sites/2 years) 92% \<12 years old Year-round; no prominent seasonal peak -- 11.1/100,000 in under 15 years old 1965 Mosq. -- LAV-SA 14-14-2 [@b23-tcrm-11-435]--[@b28-tcrm-11-435]
7 People's Republic of China 1940s National Mainly children; adults in some outbreak May to Oct/pick in July and Aug Mainly in 1960--1970 the morbidity higher than 10/100,000 0.1--0.9/100,000 1949 Mosq., midge, pig, bat and H-S, H-CSF, H-B G1, 3, 5 VCDV-P3, LAV-SA 14-14-2 [@b29-tcrm-11-435]--[@b37-tcrm-11-435]
8 Taiwan 1938 All area 20--70 years old May to Oct/pick in July and Aug Mainly in 1960--1970 the morbidity nearly 12.4/100,000 0.03/100,000 \<35 cases annually 1962 Mosq. G1, 3 MBDV [@b38-tcrm-11-435]--[@b47-tcrm-11-435]
9 Guam 1947 -- -- -- 46 reported JE cases -- -- -- -- [@b48-tcrm-11-435]--[@b50-tcrm-11-435]
10 India 1950s Hospital-based Mainly children July to Oct in north/year-round in south 5,700 cases and 1,315 deaths in 2005 15/100,000 in 5--9 years 1973 Mosq., horse, H-CSF G1, 3 LAV-SA 14-14-2 [@b51-tcrm-11-435]--[@b73-tcrm-11-435]
11 Indonesia 1974 Hospital-based (15 sites/2 years) 95% \<15 years old Year-round No 8.2/100,000 in under 10 years old 1972 Mosq. G1, 2, 4 [@b74-tcrm-11-435]--[@b78-tcrm-11-435]
12 Japan 1933 National \>40 years old July to Oct Mainly before 1960 \<10 cases 1935 Mosq., H-CSF G1, 3 VCDV-Beijing-1 [@b79-tcrm-11-435]--[@b94-tcrm-11-435]
13 Laos 1989 Hospital-based (1 site/8 years) More than 50% \<15 years old -- -- -- 2009 CSF G1 [@b95-tcrm-11-435]--[@b99-tcrm-11-435]
14 Malaysia 1952 National Mainly children Year-round 154 cases and 42 deaths in 1999 4.3/100,000 \<12 years old 1952 Mosq., H-B G2, 4 MBDV [@b6-tcrm-11-435],[@b100-tcrm-11-435]--[@b104-tcrm-11-435]
15 Nepal 1978 Hospital-based Mainly children July to Oct 2,040 cases and 205 deaths in 2005 1.3/100,000 1978 Mosq. G1, 3 LAV-SA 14-14-2 [@b105-tcrm-11-435]--[@b114-tcrm-11-435]
16 North Korea -- -- -- -- -- -- -- -- --
17 Pakistan Early of 1980s None -- -- -- -- -- -- -- [@b2-tcrm-11-435],[@b115-tcrm-11-435],[@b116-tcrm-11-435]
18 Papua New Guinea 1995 Sentinel -- -- -- -- 1997 Mosq. G2 [@b15-tcrm-11-435],[@b117-tcrm-11-435],[@b118-tcrm-11-435]
19 Philippines Early of 1950s Hospital-based (1 site/3 years) 72.9% \<17 years old Year-round No -- 1977 Mosq. G3 [@b119-tcrm-11-435]--[@b121-tcrm-11-435]
20 Russia[†](#tfn2-tcrm-11-435){ref-type="table-fn"} -- -- -- -- -- -- -- Bird/human -- [@b122-tcrm-11-435],[@b123-tcrm-11-435]
21 Saipan 1990 -- -- -- 10 cases (3 lab confirmed, 7 suspected) in 1990 -- No -- -- [@b124-tcrm-11-435],[@b125-tcrm-11-435]
22 Singapore 1952 National Mainly children -- -- \<5 cases 1952 Human G3 [@b1-tcrm-11-435],[@b126-tcrm-11-435]--[@b129-tcrm-11-435]
23 South Korea 1946 National 40--49 years old Aug Mainly before 1960 0.013--0.055/100,000 \<10 cases annually 1946 Mosq. G1, 3, 5 MBDV [@b6-tcrm-11-435],[@b130-tcrm-11-435]--[@b137-tcrm-11-435]
24 Sri Lanka 1968 National All age Nov to Dec 3 times \<100 cases 1974 Human G3 [@b6-tcrm-11-435],[@b138-tcrm-11-435]--[@b140-tcrm-11-435]
25 Thailand 1961 National \<15 years old May to July in north/Year-round in south In north About 300 cases annually reported 1964 Mosq., pig, H-CSF G1, 3 MBDV [@b141-tcrm-11-435]--[@b144-tcrm-11-435]
26 Timor-Leste -- -- -- -- -- -- -- -- --
27 Vietnam 1960 National \<15 years old May to July in north/Year-round in south In north 1--8/100,000 1951 Mosq. G1, 3 MBDV [@b145-tcrm-11-435]--[@b147-tcrm-11-435]
**Note:**
The JE epidemic in limited area focus on the Torres Strait Islands.
The JE epidemic in limited area focus on the Siberia.
**Abbreviations:** JE, Japanese encephalitis; JEV: Japanese encephalitis virus; mosq., mosquitoes; H-S, human serum; H-CSF, human cerebrospinal fluid; H-B, human brain tissue; lab, laboratory; MBDV, inactivated mouse brain-derived JE vaccine; VCDV-P3, inactivated Vero cell culture-derived P3 JE vaccine; VCDV-Beijing-1, inactivated Vero cell culture-derived Beijing-1 JE vaccine; LAV-SA 14-14-2, live attenuated SA 14-14-2 JE vaccine.
| null |
minipile
|
NaturalLanguage
|
mit
| null |
Rethinking the Doctrines of the Trinity and the Holy Spirit
I was sitting on the balcony of a high-rise hotel in Southern California. The Pacific Ocean sparkled under a smog-free sky. A rabbi we’ll call Sol was enjoying the view with me. I had originally met Sol a few years earlier through a phone call: “I represent a group of several dozen rabbis,” he said, “who have read all of your books. We would like to meet with you sometime.” I wasn’t expecting that! Since that first phone call, we had met a couple of times and a warm friendship had begun. I was in his neighborhood to speak at a local seminary, so he kindly came by to say hello.
Some theologians have concluded that the doctrine of the Trinity is irredeemably tarnished by its historical use by Christian heresy-hunters. The dynamic approach of Social Trinitarianism, however, transforms the doctrine into a powerful vision of benevolent community. Credit: Creative Commons/Andrea Prevital
“Sol, we’ve become good enough friends now that I can ask you something kind of personal, right?” I asked.
“Sure. Anything.”
“What do you think of Jesus? I’m not asking that as a test question or as a prelude to an evangelistic presentation,” I explained. “I’m just curious.”
“Of course, he was one of ours,” Sol said. “He was a Jew in the prophetic tradition. And many of my colleagues would agree with me when I say I think he spoke from God, and the leaders of the priestly tradition were wrong to reject him.”
There was a pause. We both surveyed the Pacific Ocean shimmering in the afternoon sun. Then Sol continued, “But look, after two thousand years of anti-Semitism, I hope you won’t expect us to get excited about the doctrine of the Trinity anytime soon.”
I hope you can feel the power of his words. Confessing the Trinity served as the litmus test of acceptability in much of European history, forcing Jews into the status of outsiders and outcasts, noncitizens in “Christian nations.” This exclusion and marginalization led to ghettoes and pogroms, and eventually to gas chambers, as James Caroll has discussed in his book Constantine’s Sword. Muslims similarly experienced Trinitarian and related doctrines as a threat, as have Hindus, Buddhists, and members of indigenous religions.
Can Trinitarian Doctrine Be Redeemed?
Many sensitive Christians have concluded that Trinitarian doctrines are irredeemable, that they must be quietly minimized if not outright abandoned. Trinitarian controversies have been so much a part of the problem that Trinitarian thought cannot be part of the solution.
I agree they have been part of the problem. But I believe that Trinitarian doctrine—held as a healing teaching, not as an imperial loyalty test—can, properly understood and practiced, contribute much to the solution.
I find wisdom in this passage in Anatheism by Richard Kearney:
The best way to tackle the violent tendency within religious conviction is to go all the way down to the source that religion does not master and that refuses to be rendered into dogmatic formulae or ideological manifestos.… It is in this hearkening to a source beyond and beneath oneself, a superfluity one does not possess or manipulate, that we may find new resources for nonviolent resistance and peace.
Few doctrines can surpass the doctrine of the Trinity in either the fervency or the ambiguity with which it is held. The Councils of Nicaea and Chalcedon are seemingly convened all over again whenever the doctrine of the Trinity is seriously discussed, and seemingly orthodox Christians expose themselves—often to their own surprise—as closet adoptionists or Arians, unconscious Nestorians or Apollinarians, or implicit monophysitists or monothelitists. (I expect that some doctrinal experts will find fault with something I say about the Trinity.) The doctrine of the Trinity has been so central to the Christian faith that to deny it, and sometimes even to affirm it in a new way, has been an excommunicable offense.
As a result, many good Christians—perhaps most—avoid thinking about the doctrine of the Trinity as studiously as they avoid denying it. The less they think about it, the less they’ll say about it, and the less trouble they’ll get in for misspeaking about it. So, without venturing too far into the conceptual minefields of homo-ousios and hypostases, of being and persons, of nature and will, they try to uphold a few basic mysteries—that God is one and in some sense three; that Christ is man and in some sense God; that the Spirit is the Spirit of the Father and the Son but in some sense not reducible to the Father and the Son.
Most Christians understand that the doctrine of the Trinity is historically important, but they seldom understand why. Some suspect that the doctrine is little more than a sinister tool of mind and speech control, used from the time of Constantine to centralize the power of heresy-hunters and to test Christian teachers on their submission to church authority. Others simply accept that Trinitarian doctrine is part of the gospel bargain: if you want to go to heaven, here’s what God requires you to assent to. (The corollary professional bargain might be expressed like this: “If you want to have a job in a Christian institution, here’s something you have to say you believe.”) Relatively few have grappled with the philosophical, biblical, and practical issues that energized Trinitarian controversies throughout Christian history. Fewer still have critically examined how the doctrine has been abused as a weapon against others through history, as my rabbi friend pointed out. And even fewer have imagined how the doctrine could become a bridge rather than a barrier in the future.
{{{subscriber}}} [trackrt]
How to Read the Rest of This Article
The text above was just an excerpt. The web versions of our print articles are now hosted by Duke University Press, Tikkun‘s publisher. Click here to read an HTML version of the article. Click here to read a PDF version of the article.
Brian McLaren is a writer, speaker, activist, and networker. He began his career as a college English teacher and then served as a pastor for twenty-four years. You can learn more about him at brianmclaren.net. This article is adapted from chapters fifteen and seventeen of his upcoming book, Why Did Jesus, Moses, the Buddha, and Mohammed Cross the Road? which will be released in September 2012 by Jericho Press.
2 thoughts on “Rethinking the Doctrines of the Trinity and the Holy Spirit”
Acts 6:8 – 8:1 are a condensed compendium of Genesis Chapters 1 through 11. Genesis 12 shows God’s concern for Jerusalem and undeniable warnings to interference in the affairs of Israel/Jerusalem.
Lip service to “acceptance of Jesus Christ in the prophetic tradition” begs prophetic requirement of infallibility… Prophets of the Old Testament were held to absolute accuracy on pain of death. Many were killed, these murders were in the vein of killing the messenger, not the message.
Overlooked in these casual discussions on the Trinity consistently leave out painstaking genealogies and prophetic details, minutia in some people’s minds, pointing to a specific place and time and man in history. The prophecy is fulfilled. Read and heed the written Old & New Testament account of Messiah Christ for your own individual edification.
Anyone showing up as a human being and making Messianic claims is a fraud. Anyone placing credence or worshiping such a person is in error, to put it politely… Many in Israeli leadership are well aware of the white hot power of Jesus Christ in history, and the often revealed action of the Holy Spirit in their own experience, particularly in 1948, 1967 and 1973 miraculous manifestations of divine power in support of Israel.
Jews weren’t gassed in Germany for their lack of trinitarianism! They were gassed because of rejection of Hitlerism. Hitler believed in Himself and expected others to worship him as God. And they weren’t the only ones to get gassed. And shot, etc. Ray Comfort reveals what Hitler did in his book, Hitler, God and the Bible. He did like Kim Jong Il did, and rewrote the Bible to put his name in strategic places and put his national Socialist Worker’s party in there too. He removed crosses and replaced them with the hooked cross. People went along because they had no ties to God to begin with. It was just some thing they did. Routine to go to church. Meant nothing to them.
Only those that refused to bow, were the ones rounded up. Sound familiar?
3 Ways to Support Our Work
1. Donate to Tikkun
2. Subscribe to Tikkun
Read articles that “bridge the gap between the spirit and the intellect”
3. Gift Tikkun to Others
Spread the love — share with others
How to Be an Activist
At a time when demonizing those who are not yet with us is commonplace and the political discourse is becoming more polarized, widening the political gap, insisting on seeing the humanity of others even when you despise their behavior, is a radical political act.
Become curious.
Ask not what is wrong with someone you don’t agree with, but rather what is driving them to support policies that are so hurtful to others.
| null |
minipile
|
NaturalLanguage
|
mit
| null |
Re: Gay Patriot live blogged
One of the topics discussed was the McCain-Feingold bill and its
impact on bloggers. This is an issue that bloggers
certainly will need to track. This FEC page
(scroll down to where it says "The Internet: Definitions of 'Public
Communications'...) provides a lot of helpful background. For
now, as a result of recent FEC regulations, bloggers generally don't need to worry about this law. I do
stress "for now."
There also was discussion of the new state law, HB 1843. The point made at the conference is that the law's impact on bloggers is unclear.
Two
sections of the law that should be of primary concern are
120C-100(13)--the definition of "Solicitation of Others" and section
120C-404--disclosure requirements for "solicitors." For
many bloggers (not all), this law clearly would not apply--it depends on the
nature of the blog and how the law is interpreted through the
regulatory process and by the courts.
Where's the libertarian perspective?
I was just watching the discussion on NC Spin
of video poker and whether it should be banned. This was the perfect
opportunity for makinig a solidly libertarian argument, namely that
not only should video poker not be banned but current regulations on
the awarding of cash prizes should be abolished. The only regulations
that should be in place would be those against fraud. With all due
respect to John Hood, after waiting with great expectation I didn't
hear it. This is an issue where the libertarian perspective can shine
through the standard left right debate, and we should be making freedom
arguments whenever the topic comes up.
| null |
minipile
|
NaturalLanguage
|
mit
| null |
5 Ways to use Rice Water for Beautiful Skin and Lovely Hair
5 Ways to use Rice Water for Beautiful Skin and Lovely Hair – Hello Readers! I come back with my new post about 5 Ways To Use Rice Water For Beautiful Skin and Lovely Hair. Rice is one of the most basic products found in every kitchen and we Indians are obsessed with eating rice at least once in a day. Rice is often considered as the staple food as it is the most important food grain consumed by a human which provides all the vitamins and proteins needed by the body. Other than eating rice, you can also use rice to beautify your skin and hair. There are many Asian countries where rice water is used for beautiful skin and lovely hair. A recent study has shown that rice contains qualities that help to beautify skin and also improve the elasticity of your hair. It is said that rice water contains inositol, a carbohydrate that helps to improve your skin as well as hair. So, I will share you through this article 5ways to use rice water for beautiful skin and lovely hair.
5 Ways to use Rice Water for Beautiful Skin and Lovely Hair
1. Rice Water for Smooth Hair
Due to inositol present in rice water, it helps to strengthen the roots of your hairand also prevent it to get damaged. You need to add some drops of essential oil like lavender essential oil, rose marry oil or tea tree oil in the rice water and then apply on your scalp. After shampooing your hair, use rice water on your scalp and massage for some time. Now rinse off with cold or hot water.
2. Rice Water helps to Minimize the Pores
Due to essential carbohydrates present in rice water, it helps to minimize the pores on your skinand also helps to shrink the large sized pores on the skin. Take rice water in a bowl and place it in the refrigerator to cool for 2-3 hours. Now add some amount of turmeric to the rice water and massage your face using Rice water. Wash off with cold water after some time.
3. Rice Water prevents Wrinkles over Skin
Rice water can also be used to prevent signs of ageing over skin and also help to prevent the appearance of fine lines and wrinklesover the face. You need to take some rice water and allow it to cool for some time. Now add some rose water to the rice water and apply on your face regularly. This will help to give you younger looking skin.
4. Rice Water helps to Give you Fresh and Glowing Skin
Regular application of rice water on your face can help to give you fresh and glowing looking skin. You need to take some rice water and add one spoon of fresh aloevera gel to it. Now mix both the ingredients together and massage your face with it. Allow it to dry for some time and wash off with lukewarm water.
5. Rice Water helps to get rid of Pimples and Acne Over Skin
You need to apply rice water daily on your face in order to get completely rid of the pimplesand acne over the skin. Make a paste of turmeric, rice water and few drops of lemon. Blend all the ingredients together and make a paste of it. Now apply this face mask and allow it to dry for some time. Wash off with cold water when dried.
There are innumerable ways you can use rice water for beauty and hair. In case, you don’t know how to make rice water, here is a small guide to it.
• When you are cooking rice, add some extra amount of water required in the vessel and allow the rice to cook properly.
• Once the rice is cooked, strain out the excess water from the vessel and collect it in a separate bowl.
• Allow it to ferment overnight because it gets richer when old. A number of antioxidants and minerals tends to increase in the rice water if preserved.
| null |
minipile
|
NaturalLanguage
|
mit
| null |
Milestones Canyudo
Social Tasking App For People
Canyudo is a free to use promotional and organizational tool allowing app users to create then advertise jobs, tasks, events, or items for sale to a network of other app users, adding media, data files, location tags, and with the option to make or take payment in cryptocurrency.
The app is designed to be used by businesses and the general public, combining a free advertising platform with a low cost and ultra secure payments system. Fees are charged only where a smart contract is executed, with each transaction processed resulting in a donation to a user nominated registered charity.
| null |
minipile
|
NaturalLanguage
|
mit
| null |
Derek Luke (soccer)
Derek Luke (born May 28, 1993) is an American professional soccer player who plays as a defender.
Career
Youth and college
Luke attended Bridgewater-Raritan High School and played four years of college soccer at Monmouth University between 2011 and 2015.
Professional
Luke was signed by new United Soccer League club FC Cincinnati on February 15, 2016.
Luke was released from FC Cincinnati on June 30, 2017.
Luke signed with Rio Grande Valley FC for the 2018 season.
References
External links
Category:1993 births
Category:Living people
Category:American soccer players
Category:Monmouth Hawks men's soccer players
Category:Central Jersey Spartans players
Category:FC Cincinnati (2016–18) players
Category:Rio Grande Valley FC Toros players
Category:Association football defenders
Category:Soccer players from New Jersey
Category:USL League Two players
Category:USL Championship players
Category:Bridgewater-Raritan High School alumni
Category:People from Bridgewater Township, New Jersey
Category:Sportspeople from Somerset County, New Jersey
| null |
minipile
|
NaturalLanguage
|
mit
| null |
Parkinson disease: handedness predicts asymmetry.
To determine the proportion of individuals in a clinic-based setting that present with asymmetric Parkinson disease (PD) and identify predictive factors associated with asymmetric symptoms. The authors examined right vs left difference scores on the Unified Parkinson Disease Rating Scale motor subscale in a consecutive clinical series of 1,277 individuals diagnosed with PD. Predictors of asymmetry included sex, symptomatic disease duration, age at onset, initial motor symptom laterality, handedness, and medical history variables (e.g., family history of PD). Nearly half the sample (46%) met criteria for asymmetric disease based on a right vs left difference score of > or =5 points, and 12% of the sample had a difference score of > or =10 (difference score: mean = 4, SD = 3.4). All three cardinal features of PD showed characteristics of asymmetric disease presentation. Multiple regression analyses showed that an increased discrepancy between right- and left-sided symptoms was significantly associated with a shorter disease duration, younger age at symptomatic onset, asymmetric initial symptom onset, hand dominance, and a positive self-reported family history of "other" neurodegenerative disorder. Hand dominance was related to the side of asymmetric disease such that left-handed individuals tended to have more severe disease on the left side of the body. Asymmetric presentation of Parkinson disease features was a common occurrence in the clinical cohort. Asymmetry was reliably predicted by several clinical characteristics, although the moderate level of explained variance (i.e., between 16 and 23%) highlighted the need for additional research examining predictive models of asymmetric disease. Recommendations for the classification and measurement of asymmetric disease are discussed.
| null |
minipile
|
NaturalLanguage
|
mit
| null |
Description for AGV Sport Modular Hi-Vis Carbon Helmet
• The shell shape is designed to minimize the risk of impact energies being channeled to the collar bone
• Integrated Ventilation System with a large front vent, a chin guard vent and a rear extractor hollowed in the shell which direct air to the rider's head without interference with the internal sun visor
• SportModular interior construction is engineered to allow an embracing, pressure-free fit and to reduce the noise inside the helmet
• Unique metal chin guard opening system is designed to prevent accidental openings
• Patented reversible crown pad features a double face use that allows the rider to select the preferred feel and climate: Warmer Side: with Shalimar fabric for a soft and gentle touch ; Cooler: with Ritmo fabric for a fluid and fresh fit
John Parham was bitten by the motorcycle bug early in his life.
In 1979 he and his wife, Jill, established J. Parham Enterprises, Inc. and J&P Cycles has been Keeping the World on 2 Wheels ever since.
During the early years, John still worked full-time and followed his "hobby" in the evening and weekends. Read More
| null |
minipile
|
NaturalLanguage
|
mit
| null |
909 N.E.2d 232 (2009)
The PEOPLE of the State of Illinois, Plaintiff-Appellee,
v.
Curtis T. ROBINSON, Defendant-Appellant.
No. 2-07-0088.
Appellate Court of Illinois, Second District.
April 30, 2009.
Rehearing Denied July 1, 2009.
*237 Thomas A. Lilien, Deputy Defender, Yasemin Eken (both Court-appointed), Office of the State Appellate Defender, Elgin, for Curtis T. Robinson.
John H. Vogt, Stephenson County State's Attorney, Freeport, Lawrence M. Bauer, Deputy Director, Cynthia N. Schneider, State's Attorneys Appellate Prosecutor, Elgin, for the People.
Justice BOWMAN delivered the opinion of the court:
Following a jury trial, defendant, Curtis T. Robinson, was convicted of unlawful possession with intent to deliver more than 100 grams but less than 400 grams of cocaine (720 ILCS 570/401(a)(2)(B) (West 2004)) and sentenced to 25 years' imprisonment. On appeal, defendant argues that: (1) the trial court erred in denying his motions to quash his arrest and suppress evidence; (2) the trial court improperly admitted hearsay testimony, irrelevant evidence about controlled drug buys, and other-crimes evidence; (3) the State made improper comments in its rebuttal closing argument; (4) during sentencing, the trial court improperly considered in aggravation factors inherent in the offense; and (5) he is entitled to monetary credit against his fines for time he served in jail before sentencing. We affirm as modified.
I. BACKGROUND
A. Motions to Suppress
Defendant was charged by complaint on April 19, 2004, three days after the incident. *238 A hearing on defendant's various motions to quash his arrest and suppress evidence took place on September 12, 2006. Officer Matthew Summers of the Freeport police department testified as follows. On April 16, 2004, around noon, he received an anonymous call on his cell phone. The informant said that defendant frequently made trips to Rockford to pick up cocaine to bring back to Freeport and that defendant was planning to do so that day. The caller said that defendant would be riding in a maroon Cadillac driven by a black female with a first name similar to Lashanda. The caller did not know the driver's last name but knew that she had a twin sister. The caller said that Summers could find defendant and the Cadillac on the 300 block of East Pleasant, where defendant lived. Summers then met with the caller in person, though he still did not know who she was. She repeated basically the same information that she had told him over the phone. Summers agreed that he did not mention the face-to-face meeting in his police report.
After the meeting, sometime before 1 p.m., Summers drove to the 300 block of East Pleasant. He saw defendant in front of an apartment building, and a maroon Cadillac was parked on the street. Summers ran the Cadillac's license plate, and it came back as a 1986 Chevrolet registered to Lathecia Walker. Summers arranged to have a "loose surveillance" of the vehicle, whereby officers were positioned to see if the car left Freeport "in a manner that was explained to us."
Summers received a second call from the informant saying that defendant was leaving the area in the Cadillac. Summers returned to Pleasant Street and saw the Cadillac pulling away. He followed it until it turned onto Route 20 and began driving east toward Rockford. Summers then called Sergeant Mark Marti and told him that he would need someone to help stop the Cadillac if it returned to Freeport.
At about 11:15 p.m., Summers saw the Cadillac returning to Freeport on Route 20. He began following it back to Freeport and contacted Marti. Marti stopped the vehicle on Route 20, near Hollywood Road, based on the improper registration. There were no streetlights or sidewalks in the area.
When Summers arrived at the scene, Marti and auxiliary officer Klinefelter were present. The owner and driver of the vehicle was identified as Lathecia Walker. Defendant was in the front passenger seat. Marti asked Walker to step to the rear of the Cadillac and advised her that she would be receiving a traffic citation for improper registration. Summers told her that she was free to leave but that the car would have to remain at the scene for further investigation. He also told Walker that she could wait in the back of the squad car while he conducted the investigation, and she agreed. Summers again informed Walker that she was not under arrest. He said that he would leave the back door of the squad car open so that it would not lock.
Summers then took defendant out of the Cadillac and searched him for officer safety. Summers next told him that he was free to leave but that the vehicle had to remain at the scene. He did not direct defendant where to go other than to just stand away from the vehicle. Summers told defendant that he was going to get a search warrant for the car because he had reason to believe that defendant was transporting drugs from Freeport to Rockford. Summers asked defendant if there were any drugs in the car, and defendant said no. Summers then told him that he thought there were enough drugs in the car to send his girlfriend to prison for a long time and that if defendant were honest *239 about what was in the car, he may be able to help his girlfriend out. Defendant then asked if he could call Summers the next day because he did not want to see Walker go to prison. Summers asked for and obtained consent to search defendant's person for drugs.
Summers then went over to Walker and asked if she would consent to have the officers search her car. Walker agreed, and Summers informed defendant. Defendant then began to yell at Walker not to allow the officers to search the car. Summers opened the driver's-side door, and at that point Marti advised him that he believed that Walker had revoked her consent to the vehicle search. Summers decided it was best to tow the vehicle and get a search warrant.
While waiting for the tow truck, Summers walked past defendant and defendant said, "`Can I ask you something?'" Summers told defendant again that he was free to leave and that he would talk to him only if he wanted to talk about "the case that was going on." Defendant asked if someone had "told on him," and Summers asked if he could be more specific. Defendant said that he just wanted to know if someone had told on him. Summers asked if defendant wanted to talk about the drugs that were going to be found in the car. Defendant declined.
At that point Walker's citation was completed, and either she or defendant made a phone call. While the officers were waiting for the tow truck, a vehicle came and picked up defendant and Walker. When asked if he knew whether defendant or Walker "had a cell phone before they actually took out their cell phones to call for a ride," Summers replied that he did not think that defendant had one on his person and did not know if the phone was "in the car or in a purse or where it was." Summers agreed that "someone called [defendant] on his cell phone and someone picked him up." Defendant never complained about not being able to leave during the stop.
Summers later obtained a search warrant for the car and, in the pouch behind the driver's seat he found two baggies of cocaine. Summers had told defendant he was free to leave at least twice during the stop.
Mark Marti provided the following testimony. Summers had told him that the Cadillac had an improper registration and that there was information that it would be carrying drugs. When Marti first stopped the car, Walker told him that she had the registration transferred. Marti checked the paperwork and asked defendant if he knew anything about the transfer. Defendant rifled through some papers, but Marti did not find any evidence that Walker had the paperwork transferred properly. He issued her a citation for improper registration. There was a videotape of the entire stop, but it lacked audio because the audio was a separate component that Marti had forgotten to bring with him.
The State requested that the trial court take judicial notice of the traffic ticket issued to Walker, the complaint for the search warrant, and the search warrant. Defendant objected to judicial notice of the complaint for the search warrant. The trial court took judicial notice of all three documents.
The trial court denied defendant's motions to quash his arrest and suppress evidence. It ruled that Walker was lawfully stopped for improper vehicle registration and that the subsequent encounter between the police and defendant was consensual, rather than a seizure.
B. Motions in Limine
Before trial, defendant filed several motions in limine requesting, among other *240 things, that the trial court bar: evidence regarding the information provided by the anonymous informant Summers' statement to defendant at the time of the traffic stop that he "had reason to believe that [defendant] was transporting drugs from Rockford to Freeport"; evidence that the police knew defendant from prior contacts; and testimony from defendant's parole officer that he had been looking for defendant after the incident but could not find him. The State did not object to the exclusion of information regarding the anonymous tip. However, the State pointed out that the police were not able to find defendant for over one year after the arrest warrant was issued and it argued that Summers' statement to defendant regarding drugs was relevant to show defendant's awareness of the potential charge against him and was proof of the reason for his flight as was the testimony from defendant's parole officer.
The trial court ruled that Summers would be allowed to testify that he told defendant he had reason to believe he was transporting drugs from Rockford to Freeport, reasoning that it had already ruled that the conversations between defendant and Summers were admissible, and because the evidence was relevant to the State's theory of flight. The trial court further ruled that the police could not testify that they were familiar with defendant from prior contacts; that the police could testify regarding what they did to try to locate defendant, though they could not opine that his flight indicated consciousness of guilt; and that defendant's parole agent could testify regarding efforts to contact defendant, though the agent had to refer to himself as a law enforcement officer rather than a parole officer and not mention defendant's parolee status.
C. Trial
At trial, Marti provided testimony consistent with that of the hearing on the motions to quash and suppress. He further testified that, when he stopped the Cadillac, defendant was leaned back in the front passenger seat, almost in a fully reclined position. Defendant was an arm's length or less away from the pouch on the back of the driver's seat.
Summers also testified consistently with his testimony from the hearing on the motions to quash and suppress regarding what occurred at the traffic stop. He further testified as follows. In 1998, he was assigned to the Freeport Police Emergency Response Team, which usually executed high risk and narcotics search warrants and arrest warrants for violent criminals. In April 2004, he was working in the capacity of a street crimes officer, following up on gang activity, weapons violations, and narcotics investigations. The majority of the work involved the sale of drugs within Freeport. Much of the information came from confidential informants or undercover officers. Summers described how the police used confidential informants in controlled drug buys. Usually the purchases would be one to two rocks of cocaine for $20 each, with one rock weighing one-tenth to two-tenths of one gram. The rocks were usually packaged in baggie corners. Mid-level dealers often required purchases of at least $100 to $150, and they sometimes supplied drugs to lower-level dealers.
Regarding the traffic stop on April 16, 2004, Summers additionally testified that Walker was 18 years old at the time. Defendant was reclined so far down in the passenger's seat that, when Summers was following the car, he could not tell it had a passenger. The pouch on the back of the driver's seat was only one or two feet away from where defendant was sitting. After talking to Walker about the registration, Summers said that she was free to leave but that her vehicle would have to stay. *241 Usually people have to wait until citations are issued to them before they have permission to leave, but in this case, because of Summers' belief that there were narcotics in the car, Walker was told that she was free to leave and that the police would get the ticket to her later. Walker chose to wait. When they were waiting for the tow truck to arrive, defendant asked if Summers would get his keys out of the car. When Summers was handing him the keys, defendant asked if he could talk to him and asked if somebody had told on him. After Walker was given her ticket she and defendant "chose to walk a short distance away and make a phone call to have someone come pick them up."
Summers identified papers given to Marti during the vehicle stop, including an insurance card a bill of sale, and a sales tax form for the Cadillac. They were in Walker's name. When Summers eventually searched the Cadillac pursuant to the warrant he found medical discharge papers in defendant's name from February 2004 and from the day of the stop. He also found, in the glove box, an identification card for defendant and a March 2004 oil change receipt in defendant's name for the Cadillac. He found a telephone bill in defendant's name in the trunk. The pouch behind the driver's seat contained Walker's pay stub for February 16 to 22, 2004, as well as two sandwich bags of a white, rock-like substance. The substance field-tested positive for cocaine. Based on Summers' experience, the quantity of cocaine indicated that it was not for personal use but rather that someone intended to separate it and sell it in individual packages.
Summers obtained a warrant for defendant's arrest the following day, on April 17, 2004. He conducted surveillance on 311 East Pleasant Street and defendant's mother's address, which was on one of defendant's bills, but could not find defendant. Summers received information that defendant was possibly in Rockford, Peoria, Atlanta, and Florida, and Summers tried to follow up with each of those locations.
Anthony Seldun testified that he was employed with law enforcement. In early 2004, defendant told Seldun that he lived at 404 Prospect Terrace in Freeport Seldun visited him there on March 19, 2004, as well as several prior occasions. There was never a time up to that date that Seldun was unable to contact defendant. However, after April 20, 2004, Seldun was not able to find or contact defendant at the Prospect Terrace address; he did not see or hear from defendant for over one year after that.
Brice Lambrecht of the Rockford police department testified that on September 23, 2005, at about 9:30 p.m., he received a dispatch about a car accident. Defendant was one of the drivers and appeared to be extremely intoxicated. Defendant told Lambrecht that his name was Patrick Clark and that he was born in December 1980. The dispatch center informed Lambrecht that someone with that name and birth date had surrendered his driver's license to the State of Georgia; the individual had similar physical characteristics to defendant. Over one hour later, Lambrecht obtained information from another source about defendant's real identity.
The parties stipulated that the sandwich bags found in the Cadillac were determined to each contain 60.2 grams of cocaine, for a total of 120.4 grams of cocaine.
The jury found defendant guilt of unlawful possession with intent to deliver cocaine. The trial court denied defendant's motion for a new trial and his subsequent motion to reconsider his sentence. Defendant timely appealed.
*242 II. ANALYSIS
A. Motions to Suppress
Defendant first argues that the statements he made at the time of the stop should have been suppressed. When reviewing a ruling on a motion to suppress, we defer to the trial court's factual findings and reverse those findings only if they are against the manifest weight of the evidence. People v. Harris, 228 Ill.2d 222, 230, 319 Ill.Dec. 823, 886 N.E.2d 947 (2008). Such deference is based on the recognition that the trial court is in a superior position to determine and weigh the witnesses' credibility, observe their demeanor, and resolve conflicts in their testimony. People v. Pitman, 211 Ill.2d 502, 512, 286 Ill.Dec. 36, 813 N.E.2d 93 (2004). However, we review de novo the ultimate ruling on the motion to suppress. Harris, 228 Ill.2d at 230, 319 Ill.Dec. 823, 886 N.E.2d 947. Moreover, in reviewing the trial court's ruling on a motion to suppress, we may consider the entire record, including trial testimony. People v. Alfaro, 386 Ill.App.3d 271, 290, 324 Ill.Dec. 858, 896 N.E.2d 1077 (2008).
The United States and Illinois Constitutions give citizens the right to be secure against unreasonable searches and seizures. U.S. Const., amends. IV, XIV; Ill. Const.1970, art. I, § 6. Encounters between the police and citizens are divided into three tiers: (1) arrests, which require probable cause; (2) brief investigative stops, also known as "Terry" stops, which require a reasonable, articulable suspicion of criminal activity; and (3) consensual encounters, which do not involve coercion or detention and therefore do not implicate the fourth amendment. People v. Luedemann, 222 Ill.2d 530, 544, 306 Ill.Dec. 94, 857 N.E.2d 187 (2006).[1]
Expanding on the second category, a person is seized for fourth amendment purposes "when, by means of physical force or a show of authority, the person's freedom of movement is restrained." People v. Cosby, 231 Ill.2d 262, 273, 325 Ill.Dec. 556, 898 N.E.2d 603 (2008). "[I]n order to determine whether a particular encounter constitutes a seizure, a court must consider all the circumstances surrounding the encounter to determine whether the police conduct would have communicated to a reasonable person that the person was not free to decline the officers' requests or otherwise terminate the encounter." Florida v. Bostick, 501 U.S. 429, 439, 111 S.Ct. 2382, 2389, 115 L.Ed.2d 389, 401-02 (1991). "Examples of circumstances that might indicate a seizure, even where the person did not attempt to leave, would be the threatening presence of several officers, the display of a weapon by an officer, some physical touching of the person of the citizen, or the use of language or tone of voice indicating that compliance with the officer's request might be compelled." United States v. Mendenhall, 446 U.S. 544, 554, 100 S.Ct. 1870, 1877, 64 L.Ed.2d 497, 509 (1980). Not all police questioning involves a seizure (People v. Richardson, 376 Ill.App.3d 612, 617-18, 315 Ill. Dec. 303, 876 N.E.2d 303 (2007)), even if the police ask more than one question (Richardson, 376 Ill.App.3d at 619, 315 Ill.Dec. 303, 876 N.E.2d 303). An encounter remains consensual if a reasonable person would feel free to decline the officer's requests and terminate the encounter. *243 People v. Ocampo, 377 Ill. App.3d 150, 156, 316 Ill.Dec. 286, 879 N.E.2d 353 (2007).
In this case, it is undisputed that the police had probable cause to stop the vehicle, based on its improper registration. A vehicle's passenger is seized for fourth amendment purposes when the vehicle is subjected to a traffic stop. Brendlin v. California, 551 U.S. 249, 256, 127 S.Ct. 2400, 2406, 168 L.Ed.2d 132, 138-39 (2007); Harris, 228 Ill.2d at 231, 319 Ill.Dec. 823, 886 N.E.2d 947. Defendant does not dispute the propriety of the initial pat-down search for officer safety, and we note that nothing was found on his person. While defendant was clearly "seized" up to this moment Summers then told defendant that he was free to leave but that the vehicle had to remain at the scene. Summers did not tell defendant where to go other than to just stand away from the vehicle.
In determining whether defendant was still seized after Summers told him he could leave, we apply the Mendenhall factors. See Cosby, 231 Ill.2d at 277-78, 325 Ill.Dec. 556, 898 N.E.2d 603; Ocampo, 377 Ill.App.3d at 157, 316 Ill.Dec. 286, 879 N.E.2d 353. Regarding the first Mendenhall factor, the threatening presence of several officers, defendant points out that there were three officers at the scene and argues that the videotape shows that, most of the time, one, if not all three, was standing right next to him. However, the videotape also indicates that defendant was alone at various times and that he did not remain standing in the same place the entire time. The second factor, the display of a weapon, did not occur in this case. See Cosby, 231 Ill.2d at 287, 325 Ill.Dec. 556, 898 N.E.2d 603 (the mere fact that police officers carry guns does not mean they have displayed their weapons under Mendenhall). For the third factor, physical touching, defendant notes that he was patted down twice during the stop. One of the pat-downs was when defendant exited the car, and he consented to the second pat-down for drugs.
For the fourth factor, the use of language or tone of voice indicating that compliance with the officer's request might be compelled, defendant argues that Summers threatened defendant that Walker could go to prison for a very long time unless defendant helped her. However, defendant did not directly respond to Summers' statement, indicating that he did not think he was required to immediately divulge information. Rather, he asked Summers if he could talk to him the next day. Additionally, after Summers told him that Walker had given her permission to search the car, defendant yelled at Walker not to allow the search, further demonstrating that he did not feel unable to decline the officers' requests. Cf. Cosby, 231 Ill.2d at 287, 325 Ill.Dec. 556, 898 N.E.2d 603 (the defendant's refusal of the officer's request to search the car showed that he did not feel the need to comply with that request). We further note that, after the search was terminated, defendant asked Summers if he could ask him something, at which point Summers again informed defendant that he was free to leave and that Summers would talk to him only about the "case that was going on." Defendant asked if someone had told on him, and Summers asked defendant if he wanted to talk about the drugs that were going to be found in the car. Defendant declined, once more showing that he did not feel compelled to answer Summers' questions. Finally, we note that defendant and Walker called for a ride and eventually left on their own accord before the tow truck arrived.
Defendant argues that the police took at least 30 minutes to issue Walker a traffic citation and that Summers' interrogation and two searches of him unlawfully prolonged *244 the encounter beyond the time reasonably required for issuing a ticket. See People v. Salinas, 383 Ill.App.3d 481, 496, 322 Ill.Dec. 593, 891 N.E.2d 884 (2008) (a lawful seizure may become unlawful if the police unreasonably prolong a traffic stop). However, Summers testified that, after Marti advised Walker that she would be receiving a ticket Summers told her that she was free to leave but that the car would have to remain at the scene. At trial, Summers clarified that while a person must usually wait for the ticket before he or she has permission to leave, here, due to his belief that there were drugs in the car, he told Walker that she was free to leave and that the police would get the ticket to her later. Summers also offered to let Walker sit in the back of the police car, and Walker chose this option. Thus, although it may have been half an hour before the police issued the ticket the police did not prolong the encounter. Moreover, Summers told defendant himself on two occasions, the first one being shortly after he exited the Cadillac, that he was free to leave.
We recognize that simply telling someone he or she is free to leave does not automatically make an encounter consensual, but it is still "certainly a relevant consideration." People v. Goeking, 335 Ill. App.3d 321, 324, 269 Ill.Dec. 357, 780 N.E.2d 829 (2002). Defendant argues that, as a practical matter, there was nowhere for him to go because he and Walker were stopped late at night on a busy highway with no sidewalks or buildings. Defendant argues that he was stuck at the scene until he could arrange for someone to pick him up and that there was no evidence that he or Walker could have used a cell phone at any given time after the initial stop. However, while Summers testified that he did not think that defendant had a cell phone on his person, he also testified that defendant asked him to get his keys out of the car, which Summers did. If defendant had a cell phone in the car, he could have just as easily asked Summers to get it. Summers also testified that after Walker was given her ticket, she and defendant "chose to walk a short distance away and make a phone call to have someone come pick them up," and someone called defendant on his cell phone and picked him up. Thus, the testimony indicates that defendant and Walker did have access to a cell phone. Furthermore, the question is not whether the defendant "practically and realistically" felt free to walk away but rather, whether the police conduct "curtailed the defendant's liberty through physical force or a show of authority." Luedemann, 222 Ill.2d at 555-56, 306 Ill.Dec. 94, 857 N.E.2d 187.
Here, even if defendant did not have immediate access to a ride to leave the scene, a reasonable person in the same circumstances still would have felt free to decline the officers' requests. In addition to being told he could leave more than once, defendant chose not to respond to some of the officers' statements/questions, and he further advised Walker to revoke her consent to search the car, demonstrating that defendant himself felt free to decline the officers' requests. Considering the Mendenhall factors as well as the other circumstances in the case, we conclude that defendant was not seized when he made the incriminating statements and that the trial court properly denied his motions to suppress.
Based on our conclusion that defendant's encounter with the police was consensual, rather than a seizure, when he made the incriminating statements, we do not address whether the informant's tip provided reasonable suspicion to stop defendant.
*245 B. Admissibility of Evidence
Defendant next argues that he was denied his due process right to a fair trial when the trial court allowed: Summers' testimony that he told defendant he had reason to believe defendant was transporting drugs from Rockford to Freeport; irrelevant testimony about controlled drug buys; and highly prejudicial evidence about defendant's criminal history and prior contacts with a law enforcement official. Evidentiary rulings are within the trial court's discretion and will not be reversed absent a clear abuse of discretion. People v. Wheeler, 226 Ill.2d 92, 132, 313 Ill.Dec. 1, 871 N.E.2d 728 (2007).
Regarding the first evidentiary issue, Summers testified at trial that during the traffic stop, he told defendant that he "had reason to believe that [defendant] was transporting drugs back from Rockford to Freeport." This statement also came up in response to questioning at two other times during the trial. Defendant had previously sought to bar such testimony through his motion in limine, but the trial court denied that portion of the motion, reasoning, among other things, that the testimony was relevant to the State's theory of flight.
Hearsay is an out-of-court statement offered to establish the truth of the matter asserted, and it is generally not admissible unless an exception applies. People v. Cox, 377 Ill.App.3d 690, 700, 316 Ill.Dec. 392, 879 N.E.2d 459 (2007). For example, "[i]nadmissible hearsay exists where a third party testifies to [the] statements made to him by another nontestifying party that identify the accused as the perpetrator of a crime." Cox, 377 Ill. App.3d at 700, 316 Ill.Dec. 392, 879 N.E.2d 459. Conversely, if testimony of an out-of-court statement is offered for the limited purpose of explaining why the police conducted their investigation in the manner that they did, rather than for the truth of the matter asserted, the testimony is not barred as hearsay. Cox, 377 Ill.App.3d at 701-02, 316 Ill.Dec. 392, 879 N.E.2d 459. Such testimony is allowed where it is necessary to fully explain the State's case to the trier of fact. People v. Peoples, 377 Ill.App.3d 978, 984, 316 Ill.Dec. 862, 880 N.E.2d 598 (2007). The testimony should be limited to showing how the officer conducted the investigation and should not put the substance of out-of-court conversations into evidence to show the truth of the matter asserted. People v. Feazell, 386 Ill.App.3d 55, 65, 325 Ill.Dec. 798, 898 N.E.2d 1077 (2007). Still, "[t]estimony describing the progress of [an] investigation is admissible even if it suggests that a nontestifying witness implicated the defendant." People v. Simms, 143 Ill.2d 154, 174, 157 Ill.Dec. 483, 572 N.E.2d 947 (1991). Alternatively, testimony regarding an out-of-court statement is admissible to show its effect on the listener's mind or explain the listener's subsequent actions. Feazell, 386 Ill.App.3d at 66, 325 Ill.Dec. 798, 898 N.E.2d 1077.
Defendant argues that Summers' testimony was not offered to show his investigative steps of talking to the informant and then deciding to stop defendant but rather the testimony "put the substance of the informant's conversation with him squarely before the jury." In this way, argues defendant, the testimony had the effect of proving the truth of the matter asserted, that defendant was transporting drugs from Rockford to Freeport.
We disagree. Summers' statement that he "had reason to believe that [defendant] was transporting drugs back from Rockford to Freeport," did not reveal the source of the belief, i.e. whether it came by way of an informant or other means, such as personal observation, so the testimony could not even be shown to directly link to *246 an out-of-court statement. Furthermore, the testimony was offered to explain why the police conducted their investigation in the manner that they did and was necessary to fully explain the State's case. Otherwise, there was no explanation as to why the police were following the Cadillac, why they did not stop it until it returned to Freeport, why they told defendant and Walker they were free to leave but the car would have to stay, why they asked to search the vehicle, and why they decided to get a search warrant and have the car towed. See Cox, 377 Ill.App.3d at 702, 316 Ill.Dec. 392, 879 N.E.2d 459 (part of the rationale for the police investigation exception is that an officer should be allowed to give some explanation of his presence and conduct); cf. People v. Bell, 343 Ill.App.3d 110, 113-14, 277 Ill.Dec. 748, 796 N.E.2d 1114 (2003) (officer's testimony that police had received complaints of narcotics sales with a description of the seller and the car was not inadmissible hearsay). Defendant argues that the testimony was unnecessary because the fact that the police later found drugs in the car would have allowed the jury to understand why the police seized the car. However, limiting the testimony to the fact that the police ultimately found drugs in the car would not have allowed Summers to explain in a logical, comprehensive manner why he investigated the case in the way that he did. Also, without Summers' testimony that he originally thought there were drugs in the car, that the police ultimately found drugs in the car could have been purely coincidental.
Moreover, the disputed statement was also offered to show its effect on defendant as evidence of consciousness of guilt. Specifically, after hearing the statement, defendant asked who had told on him, told Walker not to let the police search the car, could not be found for over one year, and gave the police a false name when he was arrested. Defendant argues that even if the testimony was relevant in this manner, it was more prejudicial than probative because it went to the very essence of the dispute of whether he possessed the drugs with the intent to deliver them. See People v. Warlick 302 Ill.App.3d 595, 600, 236 Ill.Dec. 369, 707 N.E.2d 214 (1998) (when out-of-court statements regarding the police investigation go to the essence of the dispute, they should not be admitted). This case is distinguishable from Warlick because, as stated, the disputed testimony was not even shown to be linked to an out-of-court statement. Furthermore, in Warlick the court determined that the statement had little or no relevance and was not necessary to explain the police investigation (Warlick 302 Ill.App.3d at 600, 236 Ill.Dec. 369, 707 N.E.2d 214), contrary to our analysis in this case. Finally, the Warlick analysis related to police investigative procedures and not the statements effect on the listener, as in this portion of our analysis. In sum, the trial court did not abuse its discretion by allowing Summers' testimony that he had reason to believe that defendant was transporting drugs from Rockford to Freeport.
Defendant further argues that the prosecution did not limit the use of the testimony to a nonhearsay purpose but rather ensured that the jury would use it as proof against him. Defendant notes that the prosecutor stated in closing argument, "Officer Summers arrived at the scene and told [defendant], `I have reason to believe that you are transporting drugs from Rockford to Freeport.' He told him that at the beginning. So [defendant] knew that was what Officer Summers and the police officers were there for." However, the prosecutor made this remark in the context of explaining what defendant was referring to when he asked if someone told on him. So used, Summers' statement *247 was relevant to show defendant's consciousness of guilt and was not hearsay.
Defendant also points out that in rebuttal closing argument the prosecutor stated:
"If you believe what he [Summers] said there is no question what happened here. There is no question. Now, what is the first thing he said when he stopped [defendant]. The first thing he says is we have reason to believe you are transporting drugs from Rockford to Freeport."
However, again, the prosecutor made this remark in the context of arguing that defendant's question about who told on him showed his knowledge of the drugs rather than, as defense counsel had argued in closing, his belief that Walker or someone else was falsely implicating him for transporting drugs. The prosecutor also tied his remark to the fact that defendant was missing for about 10 years after the stop, which was also proper to show defendant's consciousness of guilt. Accordingly, the State did not use Summers' statement as hearsay during closing argument.
Defendant next argues that the trial court abused its discretion in allowing Summers' testimony regarding controlled drug buys, which defendant argues was extensive and went beyond merely offering a foundation for his opinion that the amount of drugs found in the Cadillac showed an intent to deliver. On this issue, Summers testified as follows. He was with the street crimes unit for about 10 years. The unit mostly dealt with the sale of drugs within Freeport. In investigating cases, the police worked with confidential informants or undercover officers from outside Freeport. The informants were sometimes used to purchase drugs in controlled buys because the Freeport officers were known to a lot of the Freeport drug dealers. The police would search the informants, provide them with money to purchase drugs, conduct surveillance on them, and then search them again for anything they may have purchased. In some situations, such as if the informant was not willing to testify against the dealer, the police would obtain a search warrant to see if there were other drugs in the dealer's house. Summers had participated both in controlled drug buys and in the execution of search warrants. He then discussed the amount of drugs typically purchased in controlled buys.
Police officers with narcotics experience may be qualified as experts in the field. People v. Foules, 258 Ill.App.3d 645, 660, 196 Ill.Dec. 730, 630 N.E.2d 895 (1993). As defendant recognizes, these officers may testify regarding the differences between drug users and drug dealers in order to help the jury determine the element of intent to deliver. See People v. King, 218 Ill.App.3d 248, 253, 161 Ill.Dec. 90, 578 N.E.2d 217 (1991). However, profile testimony describing common practices, habits, or characteristics that are not in any way connected to the defendant or his circumstances should be excluded. People v. Brown, 232 Ill.App.3d 885, 898, 174 Ill.Dec. 316, 598 N.E.2d 948 (1992) (where officer's testimony was offered to show the street value of the drugs recovered from the defendant, it was error to allow him to offer general profile testimony of drug sellers).
Here, we agree with the State that Summers' testimony regarding controlled drug buys was relevant to establish a foundation for Summers' subsequent testimony regarding the quantity of drugs that users possess as compared to dealers. We disagree with defendant's characterization of it as overly "extensive." Also, unlike in Brown, it did not constitute general profile testimony and was relevant to Summers' *248 ultimate opinion that defendant possessed the drugs with intent to deliver. Defendant argues that the testimony was highly prejudicial because it created a false inference that he was involved in a controlled drug buy and that the search warrant eventually executed was the result of the buy. This argument lacks merit as the State relied on the quantity of the drugs to establish an intent to deliver, and the testimony regarding controlled buys was clearly presented as just a foundation for Summers' knowledge of the quantity of drugs a user typically possesses versus a seller. Accordingly, it was not an abuse of discretion for the trial court to allow the testimony into evidence.
Defendant next argues that it was error for the trial court to allow testimony from Summers that he had provided Rockford detectives with defendant's "criminal history" in an attempt to locate defendant. Defendant also argues that it was error to allow Seldun, his parole officer, to testify that he was in "law enforcement" and had previous contact with defendant. Defendant argues that the testimony conveyed to the jury that he had a prior criminal record, and it was highly prejudicial because it could have convinced the jury to convict him based on a propensity to commit crime rather than on the facts of the case.
Evidence of other crimes is not admissible if it is relevant only to show the defendant's propensity to commit crime. People v. Cortes, 181 Ill.2d 249, 282, 229 Ill.Dec. 918, 692 N.E.2d 1129 (1998). Evidence of other crimes may be admitted to show identity, absence of mistake, a defendant's state of mind, the circumstances of his arrest (People v. Pursley, 284 Ill. App.3d 597, 606, 220 Ill.Dec. 237, 672 N.E.2d 1249 (1996)), or a fact material to the prosecution (Cortes, 181 Ill.2d at 283, 229 Ill.Dec. 918, 692 N.E.2d 1129). Also, a defendant's flight may be offered as evidence of his guilt. People v. Newborn, 379 Ill.App.3d 240, 247, 318 Ill.Dec. 372, 883 N.E.2d 603 (2008). Still, the trial court must weigh the relevance of the evidence against its potentially prejudicial effect. Cortes, 181 Ill.2d at 284, 229 Ill.Dec. 918, 692 N.E.2d 1129.
We note that defendant did not object to Summers' statement about his criminal history, thereby forfeiting the issue for review. See People v. Enoch, 122 Ill.2d 176, 186, 119 Ill.Dec. 265, 522 N.E.2d 1124 (1988) (to preserve an issue for review, the defendant must object at trial and raise the issue in a written posttrial motion). However, defendant asks that we review the issue for plain error. The plain-error doctrine allows a reviewing court to consider an unpreserved error where either (1) a clear error occurs and the evidence is closely balanced, or (2) a clear error occurs that is so serious that it affected the fairness of the trial and challenged the integrity of the judicial process. People v. Piatkowski, 225 Ill.2d 551, 564-65, 312 Ill.Dec. 338, 870 N.E.2d 403 (2007).
In applying the plain-error test, the first step is to determine whether error occurred at all. See Piatkowski, 225 Ill.2d at 565, 312 Ill.Dec. 338, 870 N.E.2d 403. We agree that Summers' reference to defendant's criminal history was improper; it was not necessary or very relevant in describing Summers' search for defendant, so its potentially prejudicial impact outweighed any probative value. However, we also conclude that the error does not satisfy either prong of the plain-error test. First, the evidence was not closely balanced, in that: (1) the evidence showed that the cocaine was found in a car to which defendant had strong ties, in that he was riding in it when the drugs were found and documents with his name were found in various parts of the car, including *249 an oil change receipt for the same car; (2) the drugs were in close proximity to him at the time of the stop; (3) defendant made several inculpatory statements at the time of the stop, including asking if someone had told on him and telling Walker not to let the officers search the car; and (4) the police could not find defendant for about 1 ½ years after the incident, and, when he was found, he gave a false name, showing flight and consciousness of guilt. We also conclude that the error was not so serious as to affect the trial's fairness, because Summers' reference to defendant's criminal history was made in passing and in conjunction with the fact that he was wanted in the current case. Also, the jury was informed that defendant's eventual arrest came while he was being investigated in connection with a traffic accident, and he gave a false name to the police, which, while properly admissible, also could indicate other possible crimes. Thus, Summers' brief reference to defendant's criminal history does not constitute reversible error.
Seldun's testimony consisted of stating that he was employed by law enforcement and had visited defendant at a particular address in March 2004 as well as on other occasions. Seldun testified that, up until that time, he was always able to contact defendant, but after April 20, 2004, he was not able to find defendant. We conclude that the trial court did not abuse its discretion by allowing this testimony. Although Summers also testified regarding his efforts to find defendant, his testimony did not indicate that defendant's absence from the Freeport area was unusual. In contrast, Seldun provided more specific evidence that defendant was living in and able to be contacted in Freeport on a consistent basis before the traffic stop but not soon afterwards, which is much stronger evidence of flight. Notably, Seldun did not reveal that defendant was on parole, and someone employed by "law enforcement" could be in repeated contact with an individual for a number of reasons, such as if the individual was an informant, witness, or crime victim.
C. Rebuttal Closing Argument
Defendant further argues that he is entitled to a new trial due to the cumulative effect of improper and prejudicial remarks that the State made in its rebuttal closing argument. A prosecutor generally has wide latitude in closing arguments and may comment on the evidence and any reasonable inferences arising from the evidence, even if the inferences reflect negatively on the defendant. People v. Perry, 224 Ill.2d 312, 347, 309 Ill.Dec. 330, 864 N.E.2d 196 (2007). We consider statements in the context of the closing arguments as a whole instead of examining the contested phrases in a vacuum Perry, 224 Ill.2d at 347, 309 Ill.Dec. 330, 864 N.E.2d 196. If we determine that the jury could have reached the opposite verdict absent the improper remarks, or we cannot determine that the improper remarks did not contribute to the defendant's conviction, we will grant a new trial. Wheeler, 226 Ill.2d at 123, 313 Ill.Dec. 1, 871 N.E.2d 728.
We note that the First District recently stated that there is a conflict as to whether to review allegedly improper comments in closing arguments under an abuse-of-discretion or de novo standard of review. See People v. Johnson, 385 Ill.App.3d 585, 603, 325 Ill.Dec. 611, 898 N.E.2d 658 (2008). The Johnson court pointed out that a long line of supreme court cases stated that, because the trial court is in the best position to evaluate any prejudicial effect of remarks in closing argument, reviewing courts apply an abuse-of-discretion standard to such rulings. Johnson, 385 Ill.App.3d at 603, 325 Ill.Dec. 611, 898 *250 N.E.2d 658. The Johnson court then noted that in the 2007 Wheeler case, the supreme court stated that whether a prosecutor's statements in closing argument were so egregious as to warrant a new trial is a legal issue we review de novo. Johnson, 385 Ill.App.3d at 603, 325 Ill.Dec. 611, 898 N.E.2d 658, citing Wheeler, 226 Ill.2d at 121, 313 Ill.Dec. 1, 871 N.E.2d 728. Arguably, the supreme court may have intended that we review the propriety of rulings on individual remarks under an abuse-of-discretion standard while we review the cumulative effect of all of the improper remarks under a de novo standard. In any event like the Johnson court we leave the resolution of this issue to another day, as our conclusion would be the same applying either standard. See Johnson, 385 Ill.App.3d at 585, 325 Ill.Dec. 611, 898 N.E.2d 658.
Defendant recognizes that his counsel objected to only one of the remarks to which he now complains, thereby forfeiting the remainder for review. However, he asks that we review the remarks for plain error. As stated, the first step of the plain-error test is to determine whether any error occurred in the first place. See Piatkowski, 225 Ill.2d at 565, 312 Ill.Dec. 338, 870 N.E.2d 403.
Defendant first argues that the prosecutor derided defense counsel and his theory of the case by stating that the defense "hasn't even decided what their defense is yet"; defense counsel's explanation for defendant's question of whether someone told on him was "a story," "a ridiculous statement" and "so ridiculous nobody could believe that"; the examples the defense provided to explain the case were also "ridiculous"; the defense's highlighting the lack of DNA and fingerprint evidence was "tak[ing] you 12 people and send[ing] you off to some kind of fairy tale land and think about all these things that don't make any difference"; and defense counsel's argument about the lack of cash, scales, or other indications of intent to deliver in the car was "a typical example of trying to divert your attention from what the evidence is to what was proven."
We find no error in the above-mentioned remarks. While a prosecutor may not claim that defense counsel has deliberately lied to the jury or fabricated a defense, a prosecutor may challenge a defendant's credibility and the credibility of his defense theory (People v. Ligon, 365 Ill.App.3d 109, 124, 301 Ill.Dec. 753, 847 N.E.2d 763 (2006)), as well as the persuasiveness of the defense (People v. Love, 377 Ill.App.3d 306, 314, 316 Ill.Dec. 67, 878 N.E.2d 789 (2007)). This includes referring to the defense theory as "ridiculous." See Ligon, 365 Ill.App.3d at 124, 301 Ill. Dec. 753, 847 N.E.2d 763. Indeed, numerous cases have upheld the use of the term "ridiculous" in closing arguments as acceptable commentary on the defense theory or the defendant's testimony. See, e.g., People v. Zoph, 381 Ill.App.3d 435, 454, 319 Ill.Dec. 662, 886 N.E.2d 425 (2008) (no error to call defendant's theory of the case "`wacky'" or the defendant's testimony "`preposterous, silly and ridiculous'"); People v. Maldonado, 240 Ill.App.3d 470, 483-84, 181 Ill.Dec. 426, 608 N.E.2d 499 (1992) (no error for prosecutor to characterize defense theory as "`ridiculous'"); People v. Dent 230 Ill.App.3d 238, 245-46, 171 Ill.Dec. 890, 595 N.E.2d 18 (1992) (same); People v. Larry, 218 Ill.App.3d 658, 663-64, 161 Ill.Dec. 423, 578 N.E.2d 1069 (1991) (same). Similarly, referring to the defendant's argument about the lack of DNA and fingerprint evidence as akin to a "fairy tale" was also an acceptable comment on the persuasiveness of the defense theory. Notably, the State properly confined itself to commenting on the defense theory rather than on defense counsel personally. *251 See People v. Baugh, 358 Ill. App.3d 718, 743, 295 Ill.Dec. 453, 832 N.E.2d 903 (2005) (not improper to refer to the defense theory as a "`joke'"; the prosecutor did not personally attack defense counsel, question his integrity, or call him a liar).
Defendant further argues that the prosecutor improperly shifted the burden of proof when he stated, "He hasn't quite explained that year and a half absence. How much did he talk about that? Not much. He is from Freeport Where was he for a year and a half?" Defendant also argues that after defense counsel legitimately argued that the State had not presented scientific evidence connecting him to the possession of the drugs, the prosecutor improperly responded, "If there was something that excluded him, I am certain it would be in front of you but there isn't."
The State always has the burden of proving, beyond a reasonable doubt the elements of the crime, and it is improper for the State to suggest that it has no burden of proof or to attempt to shift the burden of proof to the defendant. People v. Nowicki, 385 Ill.App.3d 53, 90, 323 Ill.Dec. 870, 894 N.E.2d 896 (2008). However, if defense counsel's closing argument provokes a response, the defendant cannot complain that the State's reply in rebuttal argument denied him a fair trial. People v. Swart, 369 Ill.App.3d 614, 637, 308 Ill.Dec. 60, 860 N.E.2d 1142 (2006). Accordingly, after defense counsel discussed the lack of scientific evidence in his closing argument it was not improper for the State to argue that defendant could have produced such evidence. Cf. Nowicki, 385 Ill.App.3d at 91, 323 Ill.Dec. 870, 894 N.E.2d 896 (proper for prosecutor to point out that the defendant could have subpoenaed police officers, in response to the defense's highlighting that the State had not called officers as witnesses); Baugh, 358 Ill.App.3d at 741-42, 295 Ill. Dec. 453, 832 N.E.2d 903 (prosecutor's argument that the defendant could have produced telephone records was not improper where defense counsel had argued that the State could have produced such records but had chosen not to). Similarly, defense counsel argued in closing that even though defendant was involved in an alcohol-related incident 10 years later and gave a false name, he was not on trial for that incident and it did not prove that he possessed drugs 10 years before. Therefore, it was not improper for the State to respond to this argument by stating that the 10-year gap was relevant because defendant could not be found in his hometown of Freeport and defense counsel's argument did not include an explanation for where he was during that time.
Last, defendant argues that the State improperly referred to Walker's age, thereby appealing to the prejudices of the jury and attempting to distract it from the contested issues at trial. Defendant points out that the prosecutor stated, "This [defendant] was 29 years old. He had an 18 year old girl in there." Defense counsel objected on the basis that defendant's age was not in evidence, and the trial court sustained the objection. By objecting at trial and citing this statement in his motion for a new trial, defendant preserved the issue for review, unlike the other comments discussed here. See Enoch, 122 Ill.2d at 186, 119 Ill.Dec. 265, 522 N.E.2d 1124. Sustaining an objection is generally sufficient to cure any prejudice (Wheeler, 226 Ill.2d at 128, 313 Ill.Dec. 1, 871 N.E.2d 728), and that is the case here, whether considered under either an abuse-of-discretion or de novo standard of review. Defendant argues that the prosecutor then improperly stated, "An 18 year old girl, this guy is blaming some 18 year old girl for what he did." Walker's age was *252 brought out through Summers' testimony, and the defense theory was that the drugs in the car belonged to Walker, not defendant. Thus, to say that defendant was blaming 18-year-old Walker was not improper commentary.
As there was no error in the individual complained-of remarks, it follows that the cumulative effect of the remarks was not prejudicial. See People v. Simmons, 342 Ill.App.3d 185, 191, 276 Ill.Dec. 745, 794 N.E.2d 995 (2003).
D. Sentence
Defendant next argues that, during sentencing, the trial court improperly considered in aggravation factors inherent in the offense of which he was convicted. Specifically, defendant argues that the trial court should not have considered the widespread societal harm caused by his conduct and the compensation that he would have received for his conduct. A trial court may not use a factor implicit in the offense as an aggravating factor in sentencing. People v. Csaszar, 375 Ill. App.3d 929, 951, 314 Ill.Dec. 345, 874 N.E.2d 255 (2007). At the same time, however, a trial court may consider the nature and circumstances of the offense, including the nature and extent of each element of the crime that the defendant committed. People v. Saldivar, 113 Ill.2d 256, 268-69, 100 Ill.Dec. 776, 497 N.E.2d 1138 (1986). A trial court's sentencing decision is presumed to be legally correct, and we will not disturb it absent an abuse of discretion. Cox, 377 Ill.App.3d at 709, 316 Ill.Dec. 392, 879 N.E.2d 459. However, consideration of an improper factor can be an independent basis for reversal. People v. Burnette, 325 Ill.App.3d 792, 809, 259 Ill.Dec. 268, 758 N.E.2d 391 (2001). Defendant did not raise the inherent-factors issue in his postsentencing motion, but he asks that we review it for plain error.
At the sentencing hearing, the State argued, among other things, that the defendant had "125 grams [sic]" of cocaine, and, if it were sold in one-quarter-gram increments, that would mean 500 transactions and 500 "people in Freeport developing or aggravating a cocaine habit." The State argued that the cocaine trade caused very serious harm and that defendant's actions threatened very serious harm. Defense counsel argued that the "severity of the offense is already certainly contemplated by the legislature." The trial court then went through the sentencing factors in mitigation under section 5-5-3.1 of the Unified Code of Corrections (730 ILCS 5/5-5-3.1 (West 2004)). It stated that the factor that the conduct did not cause or threaten harm did not apply, because defendant was convicted of possession with intent to deliver a large amount of drugs, and, even given half of the figures the State presented, defendant would have made over 200 sales of cocaine. The trial court next went through the aggravating factors listed in section 5-5-3.2 of the Unified Code of Corrections (730 ILCS 5/5-5-3.2 (West 2004)). With regard to the factor of the conduct causing or threatening serious harm, the trial court stated that it had already addressed it when discussing possible mitigating factors. For the aggravating factor of receiving compensation for committing the offense, the trial court stated that "certainly by inference possession with intent to deliver would anticipate receiving compensation."
In announcing defendant's sentence, the trial court stated:
"In this case, the Court in reiterating that the minimum is nine years * * *, the maximum is forty years, given the defendant's substantial prior record and especially consider he had a Class 1 felony in 1999 for a similar offense * * *.
*253 The Court believes in this case that a sentence of twenty-five years to the Department of Corrections is appropriate. * * * I don't believe that a minimum sentence of ten or eleven years is appropriate. I also have to consider deterring other people from similar crimes. * * * Given the prior record that you have for a similar offense and the prior substantial criminal record that you have, the Court does believe that the twenty-five year sentence is appropriate under the circumstances."
While we agree with defendant that the potential danger to society from the amount of the drugs is inherent in the crime of possession with intent to deliver (see People v. Corn, 358 Ill.App.3d 825, 827-28, 295 Ill.Dec. 447, 832 N.E.2d 897 (2005)), in this case the trial court merely commented on the specific degree of harm threatened by defendant's actions, i.e., how many sales he might have generated, rather than focusing on the general harm to society. As our supreme court has stated:
"[T]he commission of any offense, regardless of whether the offense itself deals with harm, can have varying degrees of harm or threatened harm. The legislature clearly and unequivocally intended that this varying quantum of harm may constitute an aggravating factor. While the classification of a crime determines the sentencing range, the severity of the sentence depends upon the degree of harm caused to the victim and as such may be considered as an aggravating factor in determining the exact length of a particular sentence." (Emphasis in original.) Saldivar, 113 Ill.2d at 269, 100 Ill.Dec. 776, 497 N.E.2d 1138.
See also People v. Alcala, 248 Ill.App.3d 411, 425-26, 187 Ill.Dec. 906, 618 N.E.2d 497 (1993) (court can consider amount of drugs in excess of minimum for sentencing range and its potential impact on society); People v. McCain, 248 Ill.App.3d 844, 852, 187 Ill.Dec. 573, 617 N.E.2d 1294 (1993) ("not improper per se for a sentencing court to refer to the significant harm inflicted upon society by drug trafficking").
Receiving compensation is also inherent in drug-delivery offenses (People v. M.I.D., 324 Ill.App.3d 156, 159, 257 Ill.Dec. 351, 753 N.E.2d 546 (2001)), but the trial court recognized this in stating that "by inference possession with intent to deliver would anticipate receiving compensation." To the extent there was any error in referring to the factor, the error was harmless because the trial court merely commented on it in passing while going down the list of statutorily aggravating factors. Cf. People v. Burge, 254 Ill.App.3d 85, 91, 193 Ill.Dec. 310, 626 N.E.2d 343 (1993).
Significantly, the report of proceedings shows that, in ultimately sentencing defendant, the trial court primarily considered that he had a previous conviction of a similar offense, he had a long criminal record, and there was a need to deter others. Accordingly, we conclude that the trial court did not improperly rely on any factors inherent in the offense when sentencing him to 25 years' imprisonment.
E. Monetary Credit
Last, defendant argues that he is entitled to monetary credit against his fines for the time he was incarcerated before sentencing. We agree. Section 110-14 of the Code of Criminal Procedure of 1963 (725 ILCS 5/110-14 (West 2004)) provides for a $5-per-day credit for any person who is incarcerated on a bailable offense but does not pay bail. The credit applies from the time the defendant is in pretrial custody up to the time of sentencing. People v. Rivera, 378 Ill.App.3d 896, 899, 318 Ill.Dec. 46, 882 N.E.2d 1169 (2008). Any portion of a day spent in *254 custody is counted as a full day for the purposes of this credit. People v. Stahr, 255 Ill.App.3d 624, 627, 194 Ill.Dec. 278, 627 N.E.2d 394 (1994). The record reflects that defendant was in custody for 392 days before sentencing, entitling him to $1,960 in credit against his fines.
III. CONCLUSION
Pursuant to our authority under Supreme Court Rule 615(b) (134 Ill.2d R. 615(b)), we modify defendant's sentencing order to reflect a monetary credit of $1,960 against his fines. We affirm the judgment of the Stephenson County circuit court in all other respects.
Affirmed as modified.
SCHOSTOK, J., concurs.
Justice O'MALLEY, specially concurring:
I write separately to explain why I believe that People v. Luedemann, 222 Ill.2d 530, 306 Ill.Dec. 94, 857 N.E.2d 187 (2006), effectively created a fourth tier of police-citizen encounters known as community caretaking seizures. I say "effectively" because, though the court in Luedemann recognized that police may seize persons for community caretaking or public safety reasons, the court did not expressly alter the three-tier structure inherited from People v. Murray, 137 Ill.2d 382, 387-88, 148 Ill.Dec. 7, 560 N.E.2d 309 (1990). In fact, the court seemed positively against any such revision. First, the court said:
"`Community caretaking,' rather than describing a tier of police-citizen encounter, refers to a capacity in which the police act when they are performing some task unrelated to the investigation of crime." (Emphasis added.) Luedemann, 222 Ill.2d at 545, 306 Ill.Dec. 94, 857 N.E.2d 187.
And later, after setting forth the Murray tiers and recognizing as valid the concept of a community caretaking seizure, the court launched its analysis by stating: "Having properly set forth the three tiers of police-citizen encounters, we next consider the nature of the encounter when Officer Pate approached defendant's vehicle." (Emphasis added.) Luedemann, 222 Ill.2d at 550, 306 Ill.Dec. 94, 857 N.E.2d 187.
On the other hand, there are these remarks from the court: "Courts use the term `community caretaking' to uphold searches or seizures as reasonable under the fourth amendment when police are performing some function other than investigating the violation of a criminal statute." (Emphasis added.) Luedemann, 222 Ill.2d at 546, 306 Ill.Dec. 94, 857 N.E.2d 187. "It is clear, then, that the `community caretaking' doctrine is analytically distinct from consensual encounters and is invoked to validate a search or seizure as reasonable under the fourth amendment." (Emphasis added.) Luedemann, 222 Ill.2d at 548, 306 Ill.Dec. 94, 857 N.E.2d 187.
How a seizure occurring in a community caretaking context could not be a "police-citizen encounter" is beyond my ken. I can only speculate as to why the supreme court in Luedemann did not formally expand the Murray taxonomy to accommodate such encounters. Perhaps it was because the Murray tiers are each keyed to the quantum of justification needed for the encounter, and the court in Luedemann was not called on to articulate the criteria for a community caretaking seizure.[2]*255 Whatever the case, I believe that formal embedment of the community caretaking doctrine in the Murray tiers is necessary to ensure that the doctrine of comparatively recent vintage becomes ingrained in the consciousness of Illinois practitioners and courts. I say this because several published decisions since Luedemann have recited the three Murray tiers without acknowledging that they do not exhaust all police-citizen encounters under the fourth amendment, because not all coercive police action need be justified as involving "the detection, investigation, or acquisition of evidence relating to the violation of a criminal statute" (Cady v. Dombrowski 413 U.S. 433, 441, 93 S.Ct. 2523, 2528, 37 L.Ed.2d 706, 714-15 (1973)). See People v. Roa, 377 Ill.App.3d 190, 196, 316 Ill.Dec. 299, 879 N.E.2d 366 (2007), vacated on other grounds, 229 Ill.2d 687, 324 Ill.Dec. 714, 896 N.E.2d 790 (2008); In re Mario T., 376 Ill.App.3d 468, 471, 314 Ill.Dec. 954, 875 N.E.2d 1241 (2007). I also am one for whom an old habit dies hard. See People v. Flores, 371 Ill.App.3d 212, 219-20, 308 Ill.Dec. 686, 862 N.E.2d 619 (2007) (O'Malley, J.), and I commend the majority for recognizing the community caretaking doctrine here. The doctrine is not the odd man of search and seizure law; its credentials are as solid as those of Terry (see People v. Cordero, 358 Ill.App.3d 121, 127-28, 294 Ill.Dec. 418, 830 N.E.2d 830 (2005) (O'Malley, P.J., specially concurring)) and it must be integrated into our fourth amendment "boilerplate" alongside Terry.
NOTES
[1] In Luedemann, our supreme court clarified that consensual encounters do not include the "`community caretaking' doctrine," which is "invoked to validate a search or seizure as reasonable under the fourth amendment" and "is not relevant to determining whether police conduct amounted to a seizure in the first place." Luedemann, 222 Ill.2d at 548, 306 Ill.Dec. 94, 857 N.E.2d 187.
[2] As I have previously written, community caretaking searches or seizures are best evaluated under a balancing test. See People v. Cordero, 358 Ill.App.3d 121, 134-35, 294 Ill. Dec. 418, 830 N.E.2d 830 (2005) (O'Malley, P.J., specially concurring).
| null |
minipile
|
NaturalLanguage
|
mit
| null |
I am retransmitting this updated Wallace/Woods record because I
have had some significant new information and several List Members
have asked for additional information. Others have sent new
information, particularly on the Poage family ( from:
)
Baird Wallace
Greetings Wallace List Searchers,
This is an updated version of the Wallace /Woods Data Collected
by My Mother, Jaquetta Clements Wallace, in the 1930s in the
ÒClements Family Record.Ó
It has been updated by feedback information from the Wallace
Email List and by additional information from my brother, William
Lockhart Wallace II, who has been researching the family for many
years.
Rt. Rev. Edward Loftus, of Levinhead, England, had a son, Rt. Rev.
Adam Loftus, b. 1534, in Yorkshire, d. 1605; became Archbishop of
Armagh, then in 1567, Archbishop of Dublin. He was appointed Lord
Chancellor of Ireland in 1581 and in 1591 became the first Provost of
Trinity College. He married Jane Purdun, daughter of T. Purdun. They
had twenty children, one of whom was Dudley.
Dudley Loftus, of County Dublin. married Anne Bagnall, daughter of
Henry Bagnall, of Newry.
Elizabeth Worsop (daughter of Thomas and Elizabeth) b. Nov. 15,
1656, married John Woods, b. in Ireland about 1654, son of an English
trooper in Cromwell's Army, who settled in Co. Meath, Ireland, in
1649. They had at least five children.
These five, four brothers, Michael, William, Nathaniel and
Samuel Woods, and their sister, Elizabeth Woods Wallace, a widow of
Peter Wallace, Sr., and respective families came to America to
settle, in c. 1723.
They settled in Paxtunk Twp., now Paxtang , just South East
of Harrisburg., PA. in Lancaster Co. PA.
( In c.1734, Michael Woods and his family moved from Paxtunk,
PA. down the Shenandoah Valley to Virginia, with the older Wallace
boys and crossed over the Blue Ridge { from West to East }, to the
vicinity of present day Charlottesville. { It is presumed that they
left the Shenandoah Valley to go East because the valley was still
pretty wild then}. There is an historical marker on the road over the
gap { which today is known as Woods Gap }, stating that Michael Woods
and his party crossed the Gap ( c. 1733 ). They settled in Augusta
Co. VA, now Albamarle Co. He was accompanied by Andrew, Samuel, and
William Wallace.) { From my brother William, }
( Peter Wallace, Jr. and his mother moved to Virginia in c.1740.
{He may have married Martha Woods in Hagerstown Maryland. There is a
record of the marriage of a Peter Wallace there in 1743 }. he
moved to Botetourt Co. in 1769, and to Rockbridge Co. in 1778. )
{ From my brother William. - The source for some of this
information is from a set of Books published by Ruth Petrechek, a
descendent of this line.}
( Four of Peter Jr. and Martha Woods WallaceÕs six sons were
killed in the Revolution, though all served. Samuel died in 1786, and
John lived to a ripe old age. )
(Martha Poage who married Andrew Woods and Robert Poage who married
Jane Wallace were brother and sister.) {This relationship and their
parents data was supplied by on the Wallace List.}
k. Sarah Woods, b. 1724, d. 1792, married Joseph Lapsley.
2. William Woods, settled in Lancaster Co., then in Cumberland Co.,
before 1750.
3. Nathaniel Woods.
4. Samuel Woods, settled in Cumberland Co., Pa. before 1750.
5. Elizabeth Woods, b. 1682, d. 1747, married 1702, Peter Wallace,
Sr. died in Ireland, d. before 1723; he was a Scottish Highlander,
descendant of Sir William Wallace's family, probably a son of Lieut,
Samuel Wallace, Òamong the popular Scots of Ulster", of Six Mile
Water, Co. Antrim. ( From my brother WilliamÕs research).
Elizabeth Woods and Peter Wallace, Sr. had six children, as
follows:
a. William Wallace, b. 1706, d. 1766, lived at"Greenwood" near
Crozet, { Crozet is in Albemarle Co , West of Charlottesville on Rt.
240, a mile or two North of Brownsville which is on Rt. 250 according
to my map. ( Crozet today is on the C& O Railroad )}, He was one of
the founders of the Mountain Plains Presbyterian Church, King's
Attorney for Louisa Co. VA. in 1742., married about 1730 Hannah
Woods, daughter of Michael and Mary Campbell Woods.
They had children, as follows:
(1) John Wallace, b. 1736, d. 1814, moved to Washington Co.,
VA.in 1780, then to Kentucky in 1796
f. John Wallace, b. 1748, d. 1837 in IN., married 1st, Jane
Miller, d. c,1818 Jane Miller who was killed by lightning in TN..
They had the following children:
(1) James Wallace; b. 1799, VA.
(2) Robert Wallace;
(3) Rebecca Wallace, married ________ Campbell.
John married 2nd. Miss Norton, before leaving Tennessee for
Indiana. ( The book "Wallace" by George Seldon Wallace lists all his
children and grandchildren, their spouses, etc. Also Ruth Petrecek was
descended from this family, and has a great deal of data. )
Those interested in pursuing this further can contact my
brother directly at . Please cc to me at:
or the ÒWallace ListÓ so that I can keep my
file on these families up to date.
g. Elizabeth Wallace, married Col. John Gilmore.
h. Janet Wallace.
i. Susannah Wallace.
* * * * * * *
* *
I also have copied the information shown in the ÒEverton Family
FilesÓ, for reference. It was sent out on the Wallace List exchange
Aug. 18, 1997 and shows grandchildren of Peter, Jr. and Martha Woods
Wallace as shown below:
Everton Family Files. Sent out on the Wallace List by "Herb &
Janet"
( Editors Note: I have reordered the entries to make comparison to
the larger record easier.)
My Mother originally thought that this family was the lineage if our
family through the connection of Andrew Wallace, son of Samuel
Wallace, b. 1745, d. 1785 or 86, etc. but we now believe this is not
so.
As stated in my original Note to the Wallace List: we still do not
know who the parents of our Great grandfather, John Wallace, b. 1797
d. 1850-55, and his brother, William Wallace were. We believe they
were born in Washington Co., PA. and that they came from a Wallace
line in Virginia which may have married a Lockhart since that name
was used for John WallaceÕs sonÕs middle name. ( Rev. William Lockhart
Wallace).
Because of recent information from the ÒClan Baird Society,Ó we
believe the Lockhart name did not come from John WallaceÕs wifeÕs
Line. ( Eliza Baird, b. 1800, d. 1888, daughter of John and Rosanna
Hervey Baird). Any Help on this issue will be very much appreciated.
( We also have considerable information on our Baird Family Line
supplied from the Clan Baird genealogist which I am happy to share if
anyone is interested.)
| null |
minipile
|
NaturalLanguage
|
mit
| null |
The Commission on Presidential Debates has some advice for debate moderators this fall: leave the fact-checking to the candidates.
The Trump campaign is taking the same position. So are some former moderators, like Jim Lehrer, who has facilitated twelve presidential debates.
But many others -- including a wide array of journalists -- want the man moderating Monday night's debate, Lester Holt, to intervene if egregious lies are said on stage.
As a result, fact-checking, normally a pretty staid subject, is now the focus of a roiling debate in political and journalistic circles.
Hillary Clinton campaign aides are being outspoken about it: If moderators "close their ears to Donald Trump's lies, it will extend an unfair bias to Donald Trump. It will be the equivalent of giving him more time to speak," Clinton press secretary Brian Fallon said Sunday.
Related: Watch Brian Stelter's interview with Brian Fallon
But Janet Brown, executive director of the commission, which organizes the debates every four years, said on CNN's "Reliable Sources" that "I don't think it's a good idea to get the moderator into essentially serving as the Encyclopedia Britannica."
Once the fact-checking door is open, "I'm not sure, what is the big fact, and what is a little fact?" She added, "Does your source about the unemployment rate agree with my source?"
Trump campaign aides have staked out a similar position. Some of them say a pro-fact-checking stance is really an anti-Trump stance.
Trump campaign manager Kellyanne Conway responded to the Clinton camp's call for aggressive moderating by saying on ABC, "I really don't appreciate the campaigns thinking it is the job of the media to go and be these virtual fact-checkers."
This point of view stipulates that the candidates will challenge each other without the moderator stepping in. As Lehrer put it on CNN: "The moderator's job is to keep the flow going."
The counterargument goes like this: An actor or a robot could keep track of time. A journalist needs to represent the viewers and help make the truth known.
"We hate to leave absolute errors of fact on the table," former debate panelist Ann Compton said.
Related: 100 million? Ratings expectations for first Trump-Clinton debate are sky high
So is fact-checking a part of the job or not? On Monday, it will be up to Holt to decide.
The commission "asks independent, smart journalists to be the moderators and we let them decide how they're going to do this," Brown said.
Holt is well aware of the controversy. While he has not commented, one NBC staffer close to Holt said, "Lester is not going to be a potted plant." Another staffer seconded that sentiment.
The fact-checking debate revolves around this fact: Trump is unusually fact-challenged.
While both candidates have been criticized for shading the truth this year, top fact-checkers say Trump's lies are in a league of their own.
After reviewing every statement made by both Clinton and Trump for a week, Politico concluded that "Trump's mishandling of facts and propensity for exaggeration so greatly exceed Clinton's as to make the comparison almost ludicrous."
Trump even said last week that Holt is a Democrat, when in fact Holt is a registered Republican.
Related: How Lester Holt is getting ready for Monday's debate
The Clinton campaign wants the debate fact-checking to extend to post-debate TV broadcasts.
After Sunday's "Reliable Sources," Fallon tweeted, "in addition to need for moderator to do basic fact-checking," it is "equally important for post-debate assessments of Trump to not ignore his lies."
"Special measures are required this year," the campaign's communications director Jennifer Palmieri tweeted.
That tweet sums up a popular view about fact-checking, particularly among Democrats.
The other side is represented by people like Newt Gingrich, who tweeted, "How weak is Clinton that her campaign wants moderators to fact check Trump? Isn't that her job? Are they that afraid of Trump?"
Lehrer, the former moderator, took a more nuanced position, suggesting that thorough fact-checking will appropriately take place right after the debate, and will "go on and on and on right up to Election Day."
The moderators' job "is to facilitate the revelation of this man and Hillary Clinton as well. Who are these people? Who are they?"
Holt's NBC colleague Matt Lauer was widely criticized earlier this month for his handling of a "Commander-in-Chief Forum" with Hillary Clinton and Donald Trump. Lauer did not correct Trump on the Republican nominee's false claim that he had opposed the Iraq war.
Lauer's interviewing reignited an ongoing debate about fact-checking. Some commenters have pointed back to 2012, when former CNN anchor Candy Crowley fact-checked a statement by Republican nominee Mitt Romney about President Obama -- a controversial moment that seemed to benefit the president.
The moderators of the next presidential debate, CNN's Anderson Cooper and ABC's Martha Raddatz, have not weighed in on the subject.
But "Fox News Sunday" host Chris Wallace, who will moderate the third and final presidential debate, recently said he won't fact-check aggressively because "it's not my job to be a truth squad."
| null |
minipile
|
NaturalLanguage
|
mit
| null |
If the USA takes too long, it will be so easy for the UK to trade with others and benefit more. I think it goes to show that the USA which claimed to not make the same mistakes as the old empires, is doing the exact same mistakes but worse.
As you can guess I am very anti-american in terms of its government. I do not condemn its people for they're truly unknowing of the bullshit that America does worldwide due to more corrupt media than Hitler and Stalin combined.
It's pretty fucked. The US House of Representatives is heavy gerrymandered and non-representative of its constituents, and has been since 2010. The Republicans have drawn congressional district lines to ensure, regardless of actual voting, they will be able to maintain control of the HoR until at least 2022 and bock any forward progress on anything.
| null |
minipile
|
NaturalLanguage
|
mit
| null |
Q:
Closest vs Parents
Estava lendo a documentação do jQuery e acabei percebendo a semelhança entre os métodos closest e parents.
Ele cita as diferenças entre os métodos, afirmando que "são sutis, porém significantes".
Lendo as diferenças percebi esse detalhe no método closest ele vai procurando até encontrar o elemento que corresponda ao seletor enviado. Já no método parents, ele pega todos os elementos e adiciona em uma lista e depois faz a comparação.
Aparentemente o closest é melhor, olhando performance. Isso é verdade? Existe algum caso que seja melhor usar o parents?
A:
Tudo vai depender do uso.
A própria documentação do JQuery explica as diferenças através de uma tabela comparativa.
O método closest começa a busca no próprio elemento, enquanto o método parents começa no elemento pai
O método closest busca até encontrar um elemento que satisfaça o seletor ( podendo ser ele mesmo ), enquanto o método parents vai adicionar todos os pais do elemento numa lista e depois filtra a lista para retornar os elementos que satisfaçam o seletor
O método closest retornará um ou nenhum elemento, enquanto o método parents retornará nenhum ou uma lista de elementos, na ordem inversa ao explicitado no documento
Dessa forma, a escolha do método não está nem tão relacionada a performance em si, mas sim ao caso que se deseja usar.
| null |
minipile
|
NaturalLanguage
|
mit
| null |
Facebook
FB 2.48%
is experimenting with new advertising approaches for its Instant Articles platform after publishers encountered challenges generating ad revenue because of restrictions imposed by the social network.
Instant Articles, which Facebook rolled out to all iPhone users last month, allows media companies to publish content directly to Facebook feeds instead of posting links to draw users back to their own websites. Twenty publishers are currently enrolled in the program.
The product is still in its infancy, but publishers including The Washington Post, New York Times and LittleThings.com are finding it difficult to extract as much revenue per article from Instant Articles as they do from pages on their own websites, according to people familiar with the situation.
That’s because of the strict guidelines Facebook has laid down on the type and volume of ads publishers are allowed to sell. For example, the guidelines state that just one “large banner” ad sized 320 x 250 pixels may be included for every 500 words of content. On their own mobile properties, publishers such as The Washington Post would typically include three or perhaps four of those ads alongside a 500-word article.
Facebook is also restricting the type of ads publishers may place in Instant Articles. It will not allow so-called “rich media” ads, the animated or interactive ads that now commonly appear across publishers’ sites.
“You have to analyze many factors to determine the monetization potential. You have fewer impressions per pageview than we presently do, so you have to balance that, and you don’t have all the animation we can sell on our own site,” said Jed Hartman, chief revenue officer at the Washington Post.
Publishers also are not permitted to sell Facebook-only campaigns, but instead must package Instant Articles with other inventory across their websites or other properties. As a result, publishers can’t sell ads in Instant Articles at a premium.
Michael Reckhow, Facebook’s Instant Articles product manager, said the company received feedback from publishers and is now testing out changes to its Instant Articles ads policies, such as allowing more ads per article and ad formats that were barred previously.
“It’s early days with Instant Articles, but one of our principles from the beginning has been to work collaboratively with our publishing partners to understand their needs and shape the product,” Mr. Reckhow said. “We’re currently working closely with publishers to understand how their advertising in Instant Articles compares to the mobile web so we can deliver results, while maintaining a great reading experience for people. We’ve made numerous improvements to the advertising capabilities over the past few months and will continue to iterate based on publisher feedback to improve the product.”
Publishers are entitled to 100% of revenue generated from ads in Instant Articles, provided they sell and serve the ads themselves. If they’d rather have Facebook sell ads on their behalf, publishers get a 70% cut. The advertising format and volume restrictions apply regardless of who sells the ads.
Facebook has become a juggernaut in mobile advertising, with mobile accounting for 78% of the $4.3 billion in ad revenue it generated in the third quarter. The company has billed Instant Articles as a way to improve the news-reading experience on mobile devices, since Instant Articles load faster than a typical webpage. It’s looking for other ways to partner with news publishers, and on Wednesday launched an app called Notify which allows smartphone users to opt-in to receive push notifications from various media outlets and online services.
Despite the Facebook restrictions and the growing pains in generating ad revenue, many publishers are still confident Instant Articles will benefit them in the long-run because of its potentially huge scale. If Facebook pumps that content into users’ feeds at a higher rate than links to publishers’ sites, Instant Articles audiences could become so large that the limitations on ad sales won’t matter, the optimists say.
Sites that rely heavily on Facebook for a large percentage of their traffic have a strong incentive to participate in Instant Articles. If they don’t, and it becomes the primary mode of distribution on the social network, they could lose out.
“The hope is that Instant Articles gives publishers way more traffic to make up for the lower monetization potential,” said Joe Speiser, co-founder of LittleThings.com, which publishes “feel-good” stories and videos largely optimized for social sharing.
LittleThings.com sees around 80% of its traffic from Facebook and has recently begun publishing Instant Articles. “It all comes down to how Facebook prioritizes this in news feed. We’ve seen them prioritize video, and if they do anything similar with Instant Articles the numbers could go through the roof.”
Mr. Hartman of the Washington Post pointed out that Instant Articles are less susceptible to ad-blockers, which have been making life difficult for online publishers, and offer an improvedexperience for users.
“The assumption is if you’re giving someone a slicker, faster, more convenient way of engaging with content then you’ll have strong consumer demand and increased socialization, and that will lead to a bigger audience,” Mr. Hartman said.
For now, publishers are experimenting with different advertising options in the hope they can find a sustainable model. Some executives say they’re beginning to allow Facebook to sell some of their Instant Articles inventory, in part because Facebook has extremely powerful data with which it can target and track ads.
“It’s new, so we’re learning how it all works and optimizing,” Mr. Hartman said.
CONTENT FROM OUR SPONSOR
Schedule delays, budget overruns, and scope creep can put projects at risk, even when formal project management methodologies are in place. Mitigating such challenges may take an approach that focuses on using analytics to sense threats and steer course corrections as projects unfold. Using the project management office as a change platform, enabled by analytics and digital technologies, also can help better execute initiatives across a business.
Please note: The Wall Street Journal News Department was not involved in the creation of the content above.
| null |
minipile
|
NaturalLanguage
|
mit
| null |
The Maple Leafs, who won their third in a row, were outshot by the Wild 38-14, but Toronto took an early lead on Tyler Bozak's power-play goal 4:24 into the first period. Bozak connected on give-and-go passes from Cody Franson and Dave Bolland that caught the Wild defense out of position.
"Special teams can win and lose you games," Bozak said. "It's something we got really good at last year and we're happy we've been able to keep that trend going."
Minor-league call-up Trevor Smith scored his first with the Maple Leafs on a lead pass from rookie Morgan Rielly. Smith's shot trickled through Wild goalie Darcy Kuemper's five-hole to give Toronto a 2-0 lead at 13:51.
A power-play goal by Minnesota forward Jason Pominville at 17:27 cut the lead to 2-1, but in the second period, Raymond scored a power-play goal, using a nifty move to beat Kuemper at 12:23.
The goal came on Toronto's seventh shot and forced Kuemper out of the game in favor of Josh Harding.
"Their front [defense] was definitely pressuring up the half-wall and [Nazem Kadri] made a good pass," Raymond said. "You want to take pucks to the net, and our special teams have been key, and that was another big goal for us."
For 23-year-old Kuemper, it was his seventh start in the NHL. He was pressed into duty Tuesday because of Niklas Backstrom's injury and Harding's start Monday night against the Buffalo Sabres.
"[I told him] just to keep his head up," Wild coach Mike Yeo said of Kuemper. "I feel bad for the kid. First off, in fairness to him, that's a tough situation for a young goalie. I don't think he saw his first shot till the 12-minute mark and then it's a bang-bang play [and] it's in the net.
"We're not pinning this on him by any means. It was a tough situation for a young goalie and he'll get a chance to bounce back."
Toronto's James Reimer was tested often but came up big in the second period, stopping Wild rookie Mikael Granlund on a breakaway with the Maple Leafs holding a 2-1 lead.
"You come out and try to take away the angle and wait for him to make a move," Reimer said. "He kind of pulled it, and I thought he might try and [put it over my shoulder], but then he pulled to his backhand and tried to slip it in five-hole. It's a really good move; it's just my stick happened to be there and I was lucky enough to make a save."
In the third period, Toronto hung on while Minnesota provided more pressure, but Reimer shut down the Wild attack, stopping 36 shots overall. Raymond added his second goal into an empty-net at 19:02.
Reimer's win was his first since opening night of Toronto's season. He had 10 days off between starts serving as Jonathan Bernier's backup.
"We know both our goalies are great goaltenders," Bozak said. "James has been doing it here for a long time, giving us a chance to win every time he plays, and obviously [Bernier] this year has been doing the same thing. Whichever one of them is in net, we're pretty confident that they're going to do a great job."
Harding stopped all six shots he faced in relief for the Wild.
"I thought our execution was really, really good tonight," Yeo said. "I thought we were able to attack through the neutral zone with speed, I thought that our puck possession time was heavily in our favor, and obviously chances against, [Toronto's] a team that's going to get a few, and we limited them and we were able to generate a lot.
"So those are the things you have to do to win hockey games and we didn't get the result we deserved tonight. We've just got to bounce back."
Minnesota will continue its four-game road trip Thursday against the Tampa Bay Lightning. Toronto will face the Carolina Hurricanes at home Thursday.
| null |
minipile
|
NaturalLanguage
|
mit
| null |
Thanks to the classic form, the Patek Philippe Calatrava copy watches with rose gold hands are regarded as fashionable watches with brave and avant-garde design, which can bring all of you very pleasing time.
Offering you artistic style and aesthetic pleasure, the luxury replica watches are famous for the creative and glorious feeling, so women can fully enjoy great joy.
Unlike the complex watches, the Swiss replica Patek Philippe watches with self-winding Calibre 240 sales with low price are based on the simple but practical principle to succeed in concise style, which can easily cater to female elegance and charm. Because of the same color of rose gold cases and beige strap, the watches has constructed a perfect feeling.
As same as the whole structure of the above watches, the forever fake watches with silvery dials online are distinctive owing to the brilliant diamonds for the bezels and the shiny purple straps, better highlight the dignity and graceful of you.
| null |
minipile
|
NaturalLanguage
|
mit
| null |
Upcoming home visits for 2019 F @Trendon_2 LSU – Monday Houston – Tuesday Memphis – Wednesday Already hosted Alabama and Indiana pic.twitter.com/x0BZzDRMa2 — Adam Zagoria (@AdamZagoria) April 13, 2018
the 6-foot-8 forward from Mountain Brook (AL), had what his father called an “amazing” home visit Saturday with Indiana’sThat followed a visit last week with Alabama’sMiller told Trendon and his father Ernest that Indiana was “all in” and going “full tilt” for Watford, one of 21 players invited to the Next Generation Sunday program at the Final Four run by USA Basketball, the NCAA and the NBA.“He really displayed (via game film) to us the hardworking culture and daily accountability that’s going on at IU,”said. “More importantly, he explained how his system plays to the strengths of player like Trendon with tons of floor spacing- just flowing and playing with freedom, therefore allowing Trendon to utilize his full array of versatility within the framework of the offense. “He spoke about the solid guys who are returning, and his upcoming 2018 signees. He thinks he’s real close on, who we feel like will be game-changer (early) for Archie and the program. Obviously, he doesn’t have to sell us on all the other positive things about IU, because we’re aware of the passion of Hoosier Nation, etc. Nevertheless, we felt good about the in-home visit yesterday, and Archie’s ability to articulate the direction of the program and his team.” The 6-6 Langford said Saturday he plans to decide within the next couple of weeks between Indiana, Kansas and Vanderbilt. Meantime, Watford will have additional home visits with LSU, Houston and Memphis from Monday-Wednesday next week.
| null |
minipile
|
NaturalLanguage
|
mit
| null |
Search form
Trump's Carrier Ploy Was a Repudiation of Conservatism
So, this is the new conservatism's recipe for restored greatness: Political coercion shall supplant economic calculation in shaping decisions by companies in what is called, with diminishing accuracy, the private sector. This will be done partly as conservatism's challenge to liberalism's supremacy in the victimhood sweepstakes, telling aggrieved groups that they are helpless victims of vast, impersonal forces, against which they can be protected only by government interventions.
Responding to political threats larded with the money of other people, Carrier has somewhat modified its planned transfers of some manufacturing to Mexico. This represents the dawn of bipartisanship: The Republican Party now shares one of progressivism's defining aspirations -- government industrial policy, with the political class picking winners and losers within, and between, economic sectors. This always involves the essence of socialism -- capital allocation, whereby government overrides market signals about the efficient allocation of scarce resources. Therefore it inevitably subtracts from economic vitality and job creation.
Although the president-elect has yet to dip a toe into the swamp, he practices the calculus by which Washington reasons, the political asymmetry between dispersed costs and concentrated benefits. The damages from government interventions are cumulatively large but, individually, are largely invisible. The beneficiaries are few but identifiable and their gratitude is telegenic.
When, speaking at the Carrier plant, Mike Pence said, "The free market has been sorting it out and America's been losing," Trump chimed in, "Every time, every time." When Republican leaders denounce the free market as consistently harmful to Americans, they are repudiating almost everything conservatism has affirmed: Edmund Burke taught that respect for a free society's spontaneous order would immunize politics from ruinous overreaching -- from the hubris of believing that we have the information and power to order society by political willfulness. In an analogous argument, Friedrich Hayek warned against the "fatal conceit" of believing that wielders of political power can supplant the market's "efficient mechanism for digesting dispersed information." The Republican Party is saying goodbye to all that.
Indiana's involvement in the Carrier drama exemplifies the "entrepreneurial federalism" -- states competing to lure businesses. This is neither new nor necessarily reprehensible. There are, however, distinctions to be drawn between creating a favorable climate for business generally and giving direct subsidies to alter the behavior of businesses already operating in the state. And when ad hoc corporate welfare, including tariffs, becomes national policy, it becomes a new arena of regulation, and hence of rent seeking, which inevitably corrupts politics. And by sapping economic dynamism, it injures the working class.
The most widely discussed and properly praised book germane to today's politics is J.D. Vance's "Hillbilly Elegy" about the sufferings and pathologies of the white working class, largely of Scots-Irish descent, in Appalachia and the Rust Belt. This cohort, from which Vance comes, is, he says, one of America's most distinctive subcultures, particularly in its tenacious clinging to traditional mores, many of them destructive.
His book has often been misread as primarily about the toll taken by economic forces -- globalization, automation, etc. Actually, Vance casts a cool eye on the theory that "if they only had better access to jobs, other parts of their lives would improve as well." His primary concern is with "lack of agency" and "learned helplessness" -- the passive acceptance of victim status.
One theory of the 2016 election is that the white working class rebelled not just against economic disappointments but also against condescension, demanding not just material amelioration but, even more, recognition of its dignity. It is, however, difficult for people to believe in their own dignity when they believe that their choices are powerless to alter their lives' trajectories. Eventually, they will detect the condescension in the government's message that their fortunes are determined not by things done by them but by things done to them.
Such people are susceptible to charismatic presidential leadership, with its promise that executive power without limits can deliver them from unhappiness by delivering to them public goods. In contrast, there was dignity in the Joad family (of John Steinbeck's "The Grapes of Wrath"). When the Dust Bowl smothered Oklahoma, the Joads were not enervated, they moved west in search of work.
What formerly was called conservatism resisted the permeation of society by politics, and particularly by the sort of unconstrained executive power that has been wielded by the 44th president. The man who will be the 45th forthrightly and comprehensively repudiates the traditional conservative agenda and, in reversing it, embraces his predecessor's executive swagger.
Comments
The true Republicans no longer care what George Will says. He continues to help the Democrats by bashing the Republican President Elect. If he wants to help the Dems so much, why doesn't he just switch parties.
| null |
minipile
|
NaturalLanguage
|
mit
| null |
Q:
Filter a JSON out of a string for further processing using php
In my application I make a call to an API which returns a JSON, unfortunately, this JSON is surrounded by a string with HTML elements
Example return
{"code":[{"name":"code","text":null,"attributes":[],"children":[]}],"message":[{"name":"message","text":"An error occurred while processing this request.","attributes":[],"children":[]}],"innererror":[{"name":"innererror","text":null,"attributes":[],"children":{"message":[{"name":"message","text":"Entiteit: Validatiefout","attributes":[],"children":[]}],"type":[{"name":"type","text":"System.Exception","attributes":[],"children":[]}],"stacktrace":[{"name":"stacktrace","text":"at Exact.Services.REST.DataServiceUpdateProvider.ErrorException(FaultException`1 fe, IExactRestConnection connection)\r\n at Exact.Services.REST.DataServiceUpdateProvider._Closure$__6._Closure$__7._Lambda$__6()\r\n at Exact.Services.REST.DataServiceUpdateProvider.SaveChanges()\r\n at System.Data.Services.DataService`1.HandleNonBatchRequest(RequestDescription description)\r\n at System.Data.Services.DataService`1.HandleRequest()","attributes":[],"children":[]}],"internalexception":[{"name":"internalexception","text":null,"attributes":[],"children":{"message":[{"name":"message","text":"Property: Ongeldige referentie, Message: Artikelcode: 'EY05547'","attributes":[],"children":[]}],"type":[{"name":"type","text":"System.Exception","attributes":[],"children":[]}],"stacktrace":[{"name":"stacktrace","text":null,"attributes":[],"children":[]}]}}]}}]}<div class="debugmsgs"><div class="debugtitle"><span id="debugtitlename">Debugger</span> | <a id="debugtitlename2">Autofill</a> <div class="debugtitle-link"><a id="debugtitle-a" href="#" onclick="toggleDebug(); return false;">inklappen</a></div></div><div class="debugerrors"><div class="debugerror debugerror-php">Undefined index: content<br /><em>C:\laragon\www\b-</div><div class="debugerror debugerror-php">Undefined index: content<br /><em></em><br /></div></div></div>
as you can see in the json the following happens:
:[],"children":[]}]}}]}}]}<div class="debugmsgs">
Html is appended to the string, which causes me to be unable to JSON decode.
Therefore I need to remove the HTML, or extract the JSON.
What I would like to do is to place the JSON from the returned string into a variable for further processing.
So far if been trying to do this with a regex: {(?:[^{}]|())*} but i canot seem to get it right.
A:
It seems that your json is malformed because some kind of debug code is produced together with the output, the right way to solve this is to find out what caused the debug message below to come out
<div class="debugmsgs"><div class="debugtitle"><span id="debugtitlename">Debugger</span> | <a id="debugtitlename2">Autofill</a> <div class="debugtitle-link"><a id="debugtitle-a" href="#" onclick="toggleDebug(); return false;">inklappen</a></div></div><div class="debugerrors"><div class="debugerror debugerror-php">Undefined index: content<br /><em>C:\laragon\www\b-</div><div class="debugerror debugerror-php">Undefined index: content<br /><em></em><br /></div></div></div>
If you can't get rid of the output, other way you can use is PHP explode to remove the unwanted string, like this:
$string = explode("<div", $api_output); //break the string into array using the '<div' as breaking point
$result = json_decode($string[0]); //decoded version of the json output
| null |
minipile
|
NaturalLanguage
|
mit
| null |
Acute inhibition of casein kinase 1δ/ε rapidly delays peripheral clock gene rhythms.
Circadian rhythms are generated through a transcription-translation feedback loop involving clock genes and the casein kinases CSNK1D and CSNK1E. In this study, we investigated the effects of the casein kinase inhibitor PF-670462 (50 mg/kg) on rhythmic expression of clock genes in the liver, pancreas and suprachiasmatic nucleus (SCN) as well as plasma corticosterone, melatonin and running behaviour in rats and compared them to the responses to a 4 h extension of the light phase. PF-670462 acutely phase delayed the rhythmic transcription of Bmal1, Per1, Per2 and Nr1d1 in both liver and pancreas by 4.5 ± 1.3 and 4.5 ± 1.2 h, respectively, 1 day after administration. In the SCN, the rhythm of Nr1d1 and Dbp mRNA expression was delayed by 4.2 and 4 h, respectively. Despite these changes, the time of peak plasma melatonin secretion was not delayed, although the plasma corticosterone rhythm and onset of wheel-running activity were delayed by 2.1 and 1.1 h, respectively. These changes are in contrast to the effects of the 4 h light extension, which resulted in delays in peak expression of the clock genes of less than 1 h and no change in the melatonin or corticosterone rhythms. The ability of the casein kinase inhibitor to bring about large phase shifts in the rhythms of major metabolic target tissues may lead to new drugs being developed to rapidly phase adjust circadian rhythms to alleviate the metabolic impact of shift work.
| null |
minipile
|
NaturalLanguage
|
mit
| null |
PART I, Origins
PART II, THE SPIDER-MAN
PART III, Personal Life
Better than the old movies. That seems to be the overwhelming response to Marc Webb'sIt's okay to like the movie, I thought it was fine, too- but the current continued trend of dogging on old movies just because something new has arrived is started to get out of control. To say people are overstatingas the "better" Spider-Man iteration is an understatement. I wanted to wait for more movies before making the comparisons, but my hand has been forced, and so I bring backLast time, it was Nolan's two movies against Burton's. This time, since the consensus seems to beis better than the others, it will be Webb's ONE movie against Raimi's THREE. Let's put this outrageous claim to the test!As usual, one point is awarded for each round, with 12 total. However this time, overall we’ll be looking at 3 sections, each with sub-categories: Origins, The Superhero, and Personal Life. These are the most definitive aspects of Spider-Man to me. We’ll be strictly looking at comic accuracy, so “filmic’ material like cinematography, fight/action scenes, and even music (Elfman vs Horner?) won’t count. Unless we get a draw, in which case, these will be considered tie-breaking bonus categories. Maybe.Oh, It's on! and btw, SPOILERS!!!The genesis of Spider-man’s tale comes from an orphaned young Peter Parker left to the care of his eldrly aunt and uncle. There is a reason they are supposed to be old enough to be his grandparents, and that’s because Peter feels he has to take care of. Its a tender relationship that is supposed to evoke how one feels about their grandparents. It’s why he strives to be a perfect student in school. This doesn’t quite come across in, as Ben and May are aged down significantly, and seem very capable and self-dependent. Thankfully, this doesn’t really hurt the movie, but for accuracy,It’s all in the details. It’s pretty specific that Peter is bitten on the hand, and it’s been in every iteration of the origin, so I don’t know why they didn’t keep that. InParker stumbles upon some hard-working arachnids. (What were they doing anyway? It was like a spider sweat shop, lol) when he’s chomped on the neck. What does it matter, right? A bite’s a bite. Well it’s change for change’s sake and that’s a personal pet peeve of mine.One of the most believable and down-to-earth things about Spider-Man is that he was originally conceived to make a quick buck. Peter does the most realistic thing anyone would do once they got superpowers- he’d try to make some money! This conceit is a highlight of Raimi’s movies, as he brainstorms ideas and designs, and eventually makes his way into a wrestling ring, a crazy and natural fit for a concept like a “spider-man!” All of that? Omitted fromPeter becomes Spiderman almost instantly after getting his powers, and we don't see the steps that get him there.Now this varies quite a bit in both versions, but what they have in common is an abridged version that conveniently puts all the characters in the same place for necessity of moving the plot along. In fact, from the comics, Ben is killed at home when a burglar tries to rob the house. Aunt May feels guilty because she argued with Ben not long before the events. In the films, Peter gets to argue with Ben, but the biggest difference is in Raimi’s movie Ben bestows the knowledge of “with great power comes great responsibility” to Peter. Of course, Pete later comes to thisthe epiphany after he confronts Ben’s killer and the man dies.Since they decided to save that for the sequel ofPeter’s arc never completes in the film. Setting up for sequels is no excuse to not resolve narrative threads in the story you’re telling. It also doesn't help that Ben's death was clumsily handled.There was a hell of a hoopla about the outfit change, but honestly, I never understood the uproar. Style flourishes with the gloves and boots, and a different (more bad ass) Spider design don’t change what effectively looks like the same damn thing onscreen. What I did notice was how the suit was used. It is clear this is a more tangible Spider-Man, and Garfield himself spends a great deal of time in the actual suit- a complaint I always had with Maguire, who might have only been in there maybe 20% of the time. The drawback however, is that Andrew does look scrawny in the costume- more like one of us geeks cosplaying at comic con. It is noticeably obvious when they use CG to ‘fill him out’ during some of the action. Secondly, people applaud Garfield for being a Spider-Man that bleeds and bruises, but Maguire got his fair share of battle damage throughout all 3 movies too.Abilities are basically the same. Wall-crawling and web-slinging are used effectively in both movies, with some creative touches, including playing a bit with visual spider motifs. His increased strength is also notable. The “proportionate strength of a spider” might be taken more to heart inas I don’t think this version of Spider-Man seems strong enough to stop a speeding train, but the point still comes across. And I liked the discovery of powers in both films. Particularly spider-sense, though I think Raimi gets a little more visual mileage out of the effect. It’s a bit more inconsistent in Amazing; There’s a particular scene in the sewers when The Lizard gets the jump on Spiderman and I wondered why his sense didn’t alert him then- since he was being so “in tune” to his surroundings.But this all comes down to one specific difference. InParker develops the web shooters. Yes this is a big deal. Remember the details? It goes both ways. Shooting webs was never supposed to be one of his powers. This subtle touch goes a long way to continue to highlight Peter’s scientific know-how. Mechanical web shooters might have just been lip service, since running out of webbing never becomes a plot issue (maybe in the sequel?) But at least now it will make sense when it does happen. And it doesn’t look like some organic spunk on his wrists.With Batman, he faces a never-ending war on crime, while choosing never to become like the killers he battles. Superman bears the burden of being looked to to protect the entire planet. One could argue the “great power/responsibility” slogan applies even more to him than old Web-Head. But the entire plight of Spider-Man as a whole is two-fold: unlike those other superheroes, he is a hero who actively has to juggle his dual lives, while also being misunderstood and persecuted by the very public that he's trying to protect. Raimi nails this. It is the essence of Spider-Man and it doesn’t quite come across inPeter never really has to deal with the stress of a secret identity. Outside of one instance, it’s not really having a negative impact on his day-to-day.There is some vigilantism in the movie with Cpt. Stacy wanting to bring him in, but this subplot never really gets rolling because everything is more focused on The Lizard. And the absence of J. Jonah Jameson leave’s Spidey’s image in the city basically positive. There isn’t a sense of public menace with the people. Only the police captain. This is where it is clear to me Raimi simply has a better understanding of what makes Spider-Man work. From being late to important events (Mary Jane’s show, Thanksgiving, etc) to a conflict of interest at work, this is the heartbeat of the property; This is the character that acknowledges realistically, that being a superhero is a pain in the ass.This one probably won’t be fair, but let’s face it- people are declaring this single movie better than the whole of Raimi’s 3 films, so if that’s where we want to go, then we have to put Lizard up against all the badguys we’ve seen from the trilogy. A commonality with some of Spiderman’s rogues is their role of mentor before they turn into monsters/villains. This tends to make things personal for Peter as he battles them, and what’s more personal that fighting a man that is your only connection to your late father? While scenes with Peter and Dr. Connors are pretty great, the scenes with Spiderman vs Lizard are decidedly less so. Even people who like the movie confess the CGI-fest between these two at the end is probably the weakest aspect. Here, Lizard is something of a chatty terrorist, and they straight up rip-off the schizo-duality used in Spider-Man 1 with the Green Goblin.Comparatively, even to, He’s not as sympathetic as Sandman, and not as dangerous as Venom, and what is with all the little lizards running around?There needed to be more of a sense of Dr Connors coping with the freak he had become. Once he turns into the Lizard, he accepts it immediately, and begins plotting to use gas on the city (Didn’t we see this in Batman Begins?) to make others exactly like him for no reason. Even if it is from the comics, the motivation comes out of nowhere.But villains has been where Raimi has had trouble, too. I hated the look of Green Goblin, retconning Sandman to kill Uncle Ben is a fail, and Venom was miscast and underused. All he really has is Otto Octavius. Webb would take this category, but Dr. Octopus > The Lizard, soBecause of the fragility of her age, Peter Parker’s top priority is taking care of Aunt May. Often her troubles stemmed from falling behind on bills, and Pete would do whatever he could to pitch in. This isn’t really shown in, with the extent of May’s helplessness being that she had to walk home from work. Outside from that, she has NOTHING to do in this movie. Raimi’s films were always good about showing Peter giving up a hard-earned check to help with household debts. It should also be noted May had pretty strong opinions about Spider-Man, and this regularly gave Peter conflicted feelings when he came home. None of this is in ASM.A fundamental aspect of Peter’s personal life is how he’s treated at school. Which is to say he was taunted by his peers. This is one of the first aspects that comes across well in both movies. There is no shortage of bullying from star athlete Flash Thompson. Wherefinally gets an advantage is the establishment that Peter and Flash have known each other since they were kids. Also done well is Flash’s condolences when Ben dies and his Spidey enthusiasm by the end of the movie. This implies that he isn’t just a one-dimensional stereotype, but a person with more to him. I did miss Harry Osborne because it’s weird to see Peter without his best friend, but this is something they are saving for the sequel that is actually a good idea.One of the great things about Spider-Man compared to other heroes are the many women that have come through his life. But it basically comes down to two: Mary Jane and Gwen Stacy. Thusly, this argument boils down to Kirsten Dunst vs. Emma Stone. I think Raimi made two-times the mistake in his movies by setting up Mary Jane right off the bat, and casting Kirsten Dunst in the role. He’s stated he thinks she is beautiful enough to fit the role, but I think most would agree, by traditional standards, she was never hot enough to be MJ. Put on top of that, an actress who seemed to be increasingly disinterested as the films went on, and you have the recipe for a really bad relationship with the fans you make these movies for. And I won’t even get started on all the rescues!The great thing about Emma Stone is she could have just as easily played Mary Jane Watson (she’s known to most viewers for her red hair, though she is naturally blonde). Stone brought a warmth to Gwen Stacy, though, and the chemistry between her and Garfield isbiggest strength. Gwen is brainy, but assured, and actually useful in the 3rd act! She’s the cool every-girl that appeals to most of the target audience. On top of that, Raimi brought in a Gwen Stacy of his own in Bryce Dallas Howard (A choice I couldn’t stand- I don’t like her creepy eyes) and still failed to do anything significant with her.If I can give Sam credit anywhere, it’s that he offered a few more ladies to think about in Betty Brandt (Elizabeth Banks) and the mousey daughter of Parker’s landlord in Spider-Man 2. Even those two had more of a spark than Pete and MJ! The challenge in future movies will be Webb topping Gwen with his version of Mary Jane. But so far, yes, this relationship is better than the whole of the previous trilogy.The personalities of the two film Peter Parkers is probably the greatest difference between the two movies. First, just looking at the traditional core of the character, Peter Parker is marked with a slight inferiority complex, and a fear of women. He has an identity problem, and is racked with what psychologists would call 'Oedipal guilt.' Before his powers, he had considerably less than average strength, was uncoordinated and clumsy, had no athletic ability, poor eyesight, and a fear of heights- even getting a book from the top shelf gave him severe vertigo. Because of his overall awkwardness and status as an outcast, Peter was also characterized as bit of a day-dreamer, often wishing he was someone else or could be someplace else. This pretty much sounds like what Tobey Maguire played to a T.People are waxing poetic about Andrew Garfield being the better Peter Parker, but clearly Tobey was the more convincing geek. Garfield, skateboards, showcasing early athletic prowess. He’s more confrontational, arguing a lot with adults, and straight out confronts bullies. By normal standards he’s even a good-looking guy. He’s basically kind of a cool guy- not a Peter Parker I’m familiar with at all. But perhaps if people keep saying this version is more like the Ultimate Spider-Man Parker, they will convince themselves eventually. Arguments usually lay on Maguire’s “emo” turn in Spiderman 3 as the major proof that he sucks, but inGarfield runs around in his hoodie, and after Ben dies, instead of showing guilt or acknowledging that this all might be his fault, he shuts everyone out and wraps himself up in a vengeance quest (which, again, isn’t resolved).It’s a tricky case to argue, but this nuance is the difference in lamenting “Why me?” and whining “Poor me”. By definition,isemo than some dumb hairstyle in Spidey 3!Something everyone wanted to see that is a big characteristic of Peter Parker, are the sarcastic quips he makes as Spiderman. Once he dons the costume, Peter can use his crime fighting as an outlet to basically be a smart-ass, since he has to hold his tongue during his normal daily life. An ‘edgier’ Parker leads you to believe this transformation, so I’ll give Webb credit here. It’s always hard to imagine Maguire being tough (even when we see it, lol). Now, personally, Spider-Man’s long-awaited jokey side wasn’t even funny for me, and actually kind of made me cringe, but props for trying.But while people are clamoring for more jokes, many forget another huge aspect of Spider-Man: The Inner monologue. People underestimate how affective this is in understanding what Peter feels. Most versions of Spiderman I’ve seen and read, from the 90s cartoon and Spectacular Spiderman, to many comics, has had this. This introspective narration is unique to Spidey compared to most other superheroes, and I kind of missed it. This is a tough one. Tobey Maguire made one hell of a pathetic sad-sack. But Andrew Garfield actually brought the scientific genius to life.So there it is. After 12 rounds of deliberating the defining aspects of a Spider-Man story, Raimi walks away with 9/12 while Marc Webb leaves with 5/12. Draws notwithstanding,And I didn't even get into story issues like the Indian villain who disappears half-way through, or the much-touted "untold" backstory, that isn't even really touched upon in the film. It was kind of one-sided, but putting this article together helped to remind me, for all the camp Raimi injects in his movies, there is a clear love for the character; there is a heart thatsort of lacks. It’s a shame, because I was championing a more Batman Begins approach, and I also thought the trailer looked, well...amazing. But the biggest shame is that people have been so dismissive of the first trilogy. It gets a lot more “right” thandoes, but hey, all fans cared about was no more cheesiness, right?“Property of Peter Parker”
| null |
minipile
|
NaturalLanguage
|
mit
| null |
Following a quick reveal from Phil Fish of Polytron earlier this month that Fez 2 was happening, Polygon caught up with him recently, presumably while one of them was wearing polyester.
While we still don’t know for sure if Fez is making its way to PlayStation platforms any time soon, Phil does know one console that Fez 2 won’t be appearing: “not Xbox.” Clearly this confirmation stems from his past with Microsoft and the issues he had with how much a Fez patch would cost on the Xbox 360, as well as the Xbox One’s “anti-indie policies.”
As for other platforms we might see Fez 2 on, Phil said that “PS4 seems to be doing everything right,” but that “it’s too early to tell how everything is going to unfold but their heart definitely seems to be in the right place.” The PS4 allows indie developers to self publish, while the Xbox One doesn’t, and Sony spent a large segment of E3 discussing indies, while Microsoft mainly focused on AAA titles.
He continued:
Whether or not I would develop for it comes down to how the platform holder treats me. With Microsoft they’ve made it painfully clear they don’t want my ilk on their platform. I can’t even self-publish there. Whereas on PS4, I can. It’s that simple. Microsoft won’t let me develop for their console. But Sony will.
Then, summing up his thoughts on how Sony and Microsoft are handling indies, he added:
One is having a big love-in orgy and the other is doing yet another fucking Minecraft port.
Based on the painfully low amount of details available for Fez 2 right now, it’s safe to say that we won’t see it in the near future, but Fish did says “it is an entirely new game,” and that “Fez 2 is to Fez 1 what Zelda 2 was to Zelda 1, but more different.”
Would you want to see Fez and Fez 2 on PS3, PS Vita, and PS4? Let us know in the comments below.
Also, if you’ve yet to see Indie Game: The Movie, do yourself a favor and check it out. The movie does a great job following the lives of indie developers like Fish as they make, release, and deal with the aftermath of creating a video game.
| null |
minipile
|
NaturalLanguage
|
mit
| null |
Banned Ozone-Depleting Chemical Was Used Illegally in China
A hazardous, ozone-depleting compound is still being used in China, even though it is banned worldwide by the Montreal Protocol, a new study finds. Eastern China has emitted significant amounts of this substance — known as carbon tetrachloride (CCl4) — which is known to eat away at the ozone, a protective layer in Earth's atmosphere that shields the world from dangerous ultraviolet radiation. The new research is yet another piece of evidence pointing toward China as the source of the ozone-destroying emissions. This past summer, an investigation by The New York Times also found that factories in the country were releasing banned substances that destroyed the ozone layer. Read more...
| null |
minipile
|
NaturalLanguage
|
mit
| null |
Q:
What is the difference between a module and a chipset?
From this question comments I found out there is some drastical difference if we speak about a chipset or a module.
I could not find a definition, that clearly would distinguish these terms to me, as my English skills nor wikipedia search did not give enough information.
So, how would you explain these two that the difference comes clear?
A:
A module can (and usually does, within the context of the question as I understand it) contain a chipset. The chipset is literally a set of chips (the prototypical example of a 'chip' being a single IC) that work together to for all or part of a module, which is used as a component of a device. Any given module can have variants which use different chipsets, and any given chipset can be used in more than one module variant.
A:
A one-line answer is that a module is 'a minimal stand-alone packaging of a chipset and it's supporting components, on a PCB (Printed Circuit Board) designed to be integrated in a product'
As noted already, a module is typically a small PCB assembly (for example this one). These will contain an ASIC, an oscillator/crystal and usually an antenna. There will also be a handful of discrete components for decoupling etc. Most modules will provide a fairly low speed communication interface, serial, SPI or silimar (but could expose something like a PCIe interface if its relevant).
A chipset consists of one or more ASICs, typically an MCU and an RF section (maybe just the RF section is protocol specific), as well as a software stack.
The most important difference is that a module is likely to be pre-certified (FCC and EU type approval). If you use a module in the way specified by the manufacturer then you can generally avoid having to go through the radio compatibility testing. This approach may preclude you from using a PCB trace antenna, or require that you use a specified trace layout.
If you use a chipset, you need to connect together any relevant parts of the chipset (maybe an analogue and a digital device, maybe an external power amplifier). You need to provide the correct power supply regulation and decoupling, and consider all of the RF layout issues.
A challenge with using a chipset is that the necessary RF test equipment may cost several $100,000 (certainly if you are talking GSM). Without this, you'd need a 3rd party to check your implementation and help you pass the regulatory testing. Even unlicensed bands require that your transmissions remain in the unlicensed band.
A:
A module is a physical unit, which satisfies some function (e.g. a WiFi module), and is normally made of smaller parts. These parts have been incorporated into one monolithic item. A chipset is a collection of individual elements which have been integrated to provide a function (for example, allowing the exchange of information between a processor, peripherals and memory).
| null |
minipile
|
NaturalLanguage
|
mit
| null |
About Us
John Tuck School was named after the second teacher to ever teach in Redmond. In 1906, John Tuck taught 42 students in all grades in the Old Oregon Hotel. Mr. Tuck eventually became the grade school superintendent, retiring in 1940 at the age of 77. He passed away at the age of 81 in 1944.
John Tuck School (the name still on the front of the building) opened in 1948 as a junior high school for sixth through eighth graders. In 1949, a gymnasium was completed. From 1971 – 1989 only fifth and sixth graders attended John Tuck. In the 1989-90 school year John Tuck became an elementary school for first through sixth graders. Kindergarten was added in 1991. In 1995 sixth graders were moved to the middle school level, and John Tuck Elementary Schoolbecame a K-5 school. In 1993, a new library and computer lab were added to the building.
Visitors to John Tuck Elementary often comment on what a warm feeling they get when they enter the school. The wide hallways, the abundant natural light flooding into the building and the brick façade certainly contribute to that feeling, but what truly makes John Tuck a special place to be are the students and staff.
Recent Posts
Recent Comments
Archives
Categories
Meta
Notice of Non-Discrimination
Redmond School District is committed to equal opportunity and non-discrimination in all of its educational and employment activities.
The District does not discriminate on the basis of race, color, national origin, sex, sexual orientation, religion, disability or age in its programs and activities and provides equal access to the Boy Scouts and other designated youth groups.
The following individuals have been designated to handle inquiries regarding non-discrimination:
| null |
minipile
|
NaturalLanguage
|
mit
| null |
Somatic hypermutation introduces single base changes into rearranged and expressed, altering DNA sequence in order to increase the affinity of the immune response or the diversity of the immune repertoire. In the past few years, there has been extraordinary progress toward understanding the hypermutation mechanism. We now know that hypermutation is initiated by the DNA deaminase, Activation-Induced Deaminase (AID), which converts C to U in transcribed V regions. This lesion is then processed by ubiquitous repair factors which, paradoxically, promote mutagenic rather than faithful repair at the Ig loci. The long-term goal of our research is to define the mechanisms of V region mutagenesis. We propose three specific aims to reach that goal. (1) We will establish how DNA cleavage and ligation occur at diversifying Ig genes, and determine how the function of the MRE11 AP lyase activity in Ig gene diversification reflects its highly conserved role in DNA repair. (2) We will determine how spatiotemporal regulation of positioning of the Ig genes within the nucleus contributes to activation and targeting of diversification, and identify the mechanisms that direct Ig gene positioning. (3) We will ask how the activity of AID is specifically targeted to the Ig genes, while the vast majority of the genome is protected from AID attack. The proposed experiments will not only solve a fascinating puzzle in basic biology, they also have important implications for our understanding of human health and disease. This research will identify molecular targets which can be manipulated to enhance the efficiency of immunization, and provide new understanding about the factors and pathways that maintain genomic stability in normal cells and destabilize the genome in cancer.
| null |
minipile
|
NaturalLanguage
|
mit
| null |
DENVER (CBS4) – A teacher aide who was found passed out in a bathroom by students at a northwest Denver school allegedly had a syringe sticking out of her arm.
The paraprofessional, Cassandra Rein, 27, was found Thursday morning in the bathroom at Denver Center for International Studies at Ford Elementary School by four first grade girls who thought she was asleep.
Police documents state that upon closer inspection by a school employee, it was determined Rein was “passed out in the restroom with a syringe hanging out of her arm, and a piece of metal foil, with an empty clear bag containing a small amount of unknown white powder by her side.”
When asked about the syringe, Rein allegedly said she has a roommate who is diabetic and she doesn’t know why she had the needle in her arm.
Rein was taken in an ambulance from the school, which is located on the 14,500 block of Maxwell Place.
After arriving at the hospital she was arrested on charges of possessing a controlled substance.
The police papers state Rein’s bag and purse were left behind at the school and were searched. They allegedly contained “several bottles of various pills, several more syringes, and metal caps containing a burnt powder substance residue.”
While Denver Public Schools has only gone as far as to say that Rein is a teacher’s aide, her Facebook page states she’s a preschool teacher. She was placed on administrative leave.
Some parents of students at the school told CBS4 Thursday they were upset by the news, which many learned about from a letter sent home by the principal.
“She wouldn’t be herself, might not make the best judgment calls. And if a kid were to get hold of it, God knows what else would happen,” Shannon Neely said.
Rein appeared in court for an advisement hearing Friday morning and bonded out of custody on Friday night.
| null |
minipile
|
NaturalLanguage
|
mit
| null |
Q:
VSTS - Azure DevOps: AppSettings transformations during the release, or multiple artifacts
We are trying to automate the release process of a .NET Core application taking advantage of Azure DevOps pipelines. The idea is to deploy in three different environments with their isolated databases. Currently we have a single artifact generated by a build, and is deployed by a Release in the environments without any kind of transformation, so, in this point, which one could be the best approach:
Generate multiple artifacts with the transformation alread done in the build, and then perform the deployment of the different artifacts with it's right environment by the release.
Generate a single artifact, and perform the different transformations at any environment within it's own stage relase phase.
Another idea?
Thank you in advance
A:
I would suggest going with option 2, option 1 I have my concerns with... is it even a very good auditing practice since means you are creating x amount of artifacts? Whereas the idea of creating 1 artifact and changing environment based configurations assures that the code really is the same throughout all environments.
if you need, here is the docs url with some very well explained info on how to do the transformation with .json files
https://docs.microsoft.com/en-us/azure/devops/pipelines/tasks/transforms-variable-substitution?view=azure-devops
| null |
minipile
|
NaturalLanguage
|
mit
| null |
Jose Saves Alexer's Life
He used the Heimlich maneuver.
Jose Zelaya, 14, and Alexer Lozano, 13, moved to Sterling in 2001. They had a lot in common, even though they did not know each other. They came from Spanish-speaking countries, and they both had to learn English for the first time in their individual elementary schools.
Little did they know, four years later, Zelaya would come to Lozano's rescue and save his life.
ZELAYA, A NATIVE of Honduras, is an eighth-grader at Sterling Middle School. Lozano, a native of Peru, is in the seventh grade. They are in the same reading class. About a week ago, their teacher Terri Elwakade gave a few students pieces of hard candy as a reward for completing their reading requirement for the third marking period. Lozano's piece got stuck in his throat.
"The students had their assignments. Some were at the computers and some were at their desks working quietly," she said. "Suddenly Alexer stood up and rasped that he needed some water."
She said he looked "stricken."
"He began walking in circles and grabbing his throat."
She asked if he was all right and he shook his head.
Elwakade attempted the Heimlich, but she couldn't dislodge the candy. "He was so tall that it didn't work the first two times I tried," she said.
The teacher turned to Zelaya for help. Having learned the procedure in [teacher Paul Helstrom's] physical education class, he ran across the room to Lozano's aid. He used the Heimlich twice before the candy popped out.
Lozano recalled, "I couldn't breathe. I couldn't take the candy out. I couldn't swallow or cough it up."
He had a similar experience three years ago, but he eventually was able to swallow the candy, he said.
ZELAYA SAID he returned to his seat and Lozano went to the water fountain. "I didn't realize I had saved his life," Zelaya said. "Everybody could do this."
Elwakade described Zelaya as a hero. "Alexer wouldn't be breathing if it weren't for Jose's quick action," she said.
Lozano said he told his friend "Thank you," when he came back to the classroom.
Both boys were the talk of the school.
Principal Ellen Fein said Zelaya failed to tell his folks when he got home. "He's not a bragger. He's a gentle giant," Fein said.
Vicki Sultan, the eighth-grade guidance counselor, called his mother.
Zelaya said Friday that he does not feel any different, three days after his heroic deed. "I feel like everybody is talking to me now," he added.
Fein said the experience drives home the message of how important it is to learn life-saving techniques. "It also shows how important ... it is for students to pay attention."
| null |
minipile
|
NaturalLanguage
|
mit
| null |
Let us come together as one humane family, help educate to liberate and advocate for the humane rights of all people upon Mother Earth!”And you will know the truth, and that very truth will make you free."~John 8:32
Monday, July 13, 2009
Chinese police kill two Uighur men as ethnic unrest flares
Chinese police kill two Uighur men as ethnic unrest flares
(Gillian Wong/AP)
Armed police chase a man as a crowd watches in Urumqi
Image :1 of 4
Jane Macartney in Beijing
Chinese police today shot dead two Uighur men and wounded a third in the first official report of the use of firearms to quell unrest in the western, mainly Muslim region where a riot last week left 184 people dead.
Frightened residents of Urumqi ran into their homes and shops, slamming the doors, as police waved their guns and shouted. Reinforcements were rushed into the city, backed by armoured personnel carriers.
Officials said that officers opened fire after they were attacked as they tried to prevent three men from assaulting another with knives and rods.
"Police shot and killed two suspected lawbreakers and injured one suspected lawbreaker using legal means," said a statement released by the government of the capital of China's westernmost region of Xinjiang.
Related Links
State radio said that the two men who died were members of the ethnic Uighur minority. A third Uighur was wounded.
The official Xinhua news agency said that an initial investigation found the three people attacking a fourth person with clubs and knives at 2.55pm near the People's Hospital in the heart of the city, in an area where Uighurs make up the majority of residents. "Police on patrol fired warning shots before shooting at the three suspects."
The city had recovered some semblance of normality over the weekend as more businesses began to open and restaurants started to raise their shutters and serve diners. Traffic jams clogged the streets again and buses resumed almost normal services.
It was the first time that the government had revealed the use of firearms to try to end the violence that erupted on July 5 when angry Uighurs rampaged through the city attacking Han Chinese in a riot that left 184 people dead and 1,600 injured – including 74 described as being on the verge of death. Han Chinese accounted for 137 of the dead, with Uighurs making up 46 of the total. The last victim was a member of ethnic Hui Muslim minority.
Most of the injured in ordinary hospital wards had sustained knife wounds or head injuries after they were bludgeoned with bricks or staves. No access was possible to the intensive care units where those with more serious injuries such as burns and possibly bullet wounds were being treated.
However, one Uighur woman in the People's Hospital described to The Times last week how she was hit in the ankle and her six-year-old daughter was grazed on the head as they left work on July 5 only to find themselves surrounded by a mob of stone-throwing Uighurs. She described how police opened fire and she and her child were wounded in the crossfire.
The initial riot was followed by more unrest when vigilante mobs of angry Han Chinese carrying metal pipes, wooden staves and even knives took to the streets last Tuesday and Wednesday baying for the blood of Uighurs. It was not known how many people may have been killed or injured in ensuing confrontations.
Tens of thousands of paramilitary police have poured into the city to restore order and, in many cases, to keep the two ethnic groups apart to prevent further reprisals.
| null |
minipile
|
NaturalLanguage
|
mit
| null |
New York Times: Real Offers Apple An Alliance
Hereis a bit of news that should make you sit up and take notice: The New York Times is reporting that Real Networks, the company that currently competes with Apple and Microsoft in the digital media format arena, has extended an offer to Apple to team up against the Redmond software giant, Microsoft.
According to the newspaper, Real CEO Rob Glaser extended the invitation directly to Apple CEO Steve Jobs in an e-mail. The newspaper says it obtained the e-mail from what it called "a person close to Apple." The article also says that Mr. Glaser was surprised that the e-mail was leaked.
The crux of the offer is that Mr. Glaser wants Apple to license its FairPlay DRM technology to Real, allowing Real customers to play songs they download from Realis online music service on Appleis iPods. The Times says that Real would then make the iPod its primary music player.
Along with the carrot dangled a stick, however, with Mr. Glaser intimating that if he can not work a deal with Apple, his company would likely switch camps from AAC, which it currently uses, to Microsoftis WMA format. Such a move would further isolate Apple in its battle for market share for AAC.
From the article:
Apple executives would not comment on the message. But it seems likely Mr. Jobs will rebuff the offer. Mr. Glaser said he had not received a response from Mr. Jobs, and in his e-mail message Mr. Glaser said he was going to be in Silicon Valley this week and suggested that he meet with Apple executives today.
[...]
"Real understands how incredibly powerful the Microsoft music initiative will be," said Richard Doherty, a computer industry consultant and president of Envisioneering. "I donit think that Jobs understands this. He doesnit realize how big the juggernaut is about to get."
In his e-mail message to Mr. Jobs, Mr. Glazer said that he was reaching out to Mr. Jobs before making a move to switch camps. Mr. Glaser said he was surprised that the proposal had been leaked.
"Why is Steve afraid of opening up the iPod?" he asked in a telephone interview. "Steve is showing a high level of fear that I donit understand."
This is a particularly interesting article, so stop by the New York Times to get the full scoop.
| null |
minipile
|
NaturalLanguage
|
mit
| null |
I am a backpack guy. Whether I’m going away for a week or heading out for a quick overnighter, you can bet I’ve got my backpack slung across my back for the trip. However, that doesn’t mean I don’t appreciate a good laptop shoulder bag, especially for those daily commutes or day-long work meetings where a hulking backpack would just be overkill. Seeing as how my favorite backpack at the moment – and, incidentally, the best one I’ve ever owned – is SLAPPA’s custom build M.A.S.K. backpack, I didn’t hesitate when offered the opportunity to take the KIKEN shoulder bag (billed as the M.A.S.K. cousin) for a test drive.
Now, we’ve admittedly been big SLAPPA fans here at Bullz-Eye for several years, largely because they’ve always delivered high-quality bags that have clearly been thoroughly researched long before seeing the light of day. The KIKEN is no different on that front. SLAPPA spent nearly 20 months developing this shoulder bag, surveying customers and trade show attendees in an effort to, as they say, “develop the best laptop shoulder bag on the market.” Did they succeed? Well, we won’t pretend to have that answer since we haven’t sampled the KIKEN’s closest competitors, but after spending one weekend with the bag, we can say those 20 months of development were very well spent.
I recently left the wife and kids for a weekend and headed up to Traverse City, MI, for my annual trip with some college friends. Typically, this weekend is built for my M.A.S.K. backpack, but I couldn’t pass up the perfect opportunity to really put the KIKEN through the paces. I loaded it up with everything I’d normally throw into my backpack – laptop, iPod, all the necessary cords and chargers, GPS and mount, some snacks, an extra pair of shoes, some cold weather gear, and a few other odds and ends. With its huge center storage compartment and series of handy pockets, along with the TSA-friendly quick-scan 18” laptop section in the back, the KIKEN took everything I could throw at it. Plus, packing everything up was a breeze since you can open both main compartments wide like a book to get to everything you need. And like most other SLAPPA bags, it’s made with puncture-proof and water-resistant 1680D Ballistix nylon, and every zipper puller, clasp and “D” ring is molded alloy. We’ve come to expect nothing but top quality from SLAPPA gear, and they always deliver.
That’s not to say I dig everything about the KIKEN – I’d prefer clasps on the bag flap instead of a long Velcro strip, and I’d love to have a mesh pocket on one of the corners for a water bottle – but those two quibbles are more than offset by the ability to customize the look of the bag with one of the four interchangeable flaps, which allows you to change the look and functionality of the bag at any time. For my trip, I swapped out the Black Blast flap for the Jedi Mind Trix option, which comes with two large Velcro straps that I used tie down my jacket. Handy, indeed. Granted, you have to buy each of the flaps separately, but it’s a cool option to have nonetheless, particularly for a cavernous bag like this that still doesn’t feel too bulky when it’s strapped onto your shoulder. We can’t definitively say the KIKEN is the best laptop shoulder bag on the market, but we’d be surprised if it had much competition for that title.
| null |
minipile
|
NaturalLanguage
|
mit
| null |
The new Independent Group of former Labour and Conservative MPs says it wishes to fix the UK’s broken politics. However, argues Jack Bridgewater, the first step in fixing politics at the centre is to reform the electoral system.
The resignation of 11 MPs from the two main parties (eight from Labour and three from the Conservatives to date, with more rumoured) to form the Independent Group, a proto-political party, has garnered much attention. Splits in parliamentary political parties summon a nervousness in our political elite that is relatively specific to the UK. This is partly because we are not used to them and partly because of the myth that a previous Labour Party split led to landslide defeats for the party in 1983 and 1987. Splits are unfamiliar to us because our first-past-the-post electoral system makes it difficult for new parties to win seats in general elections. Suspicion of break-away parties is bolstered by a two-party system that discourages fluidity of ideology and legitimises binary decision-making. This enables the two main parties to clash in a partisan manner that is unrepresentative of a diverse country and makes complex issues such as leaving the European Union more difficult to resolve.
In 2011 the UK had a now largely forgotten referendum on whether to replace our voting system with the alternative vote (AV) system, notably not a proportional system, but one that could have increased the influence of minority party voters (if not the parties themselves). This was advocated by the Liberal Democrats and was held at their request as part of the coalition agreement. It was not backed by the Conservatives, while the Labour Party was divided on the issue, and the proposal was soundly rejected by 68% of voters, who opted to stay with the current system. Taking into account the current problems our parliament is having, is first-past-the-post still working?
Our two main parties have good reason to fear transition to proportional representation, but not necessarily for the reasons often cited. Break-away parties do not usually take voters exclusively from one party. Admittedly, when the Social Democratic Party (SDP) split from Labour in 1979 they did disproportionately take with them voters who identified with the latter. However, as Crewe and King point out in SDP: The Birth, Life and Death of the Social Democratic Party it is false to claim that the party helped Margaret Thatcher win landslide victories in two elections. The voters that abandoned the Labour Party were likely going to leave anyway, and without the SDP they may have switched their votes directly to the Conservatives. Were it not for the SDP it is possible that the Conservatives would have got an even larger share of the vote.
Additionally, there is little evidence to suggest that proportional representation substantially increases the number of parties overall. In the UK for example, there is already a multitude of parties within our system that represent a broad array of positions. However, these parties are not properly represented in the House of Commons (devolved assemblies and parliaments are more proportional). The list of injustices is long, but more recent examples would be the Liberal Democrats achieving 23% of the vote in 2010 but only 9% of seats, and UKIP in 2015 achieving 13% of the vote but 1 seat.
The reason the two main parties should be wary of a change in electoral system is that it would challenge their monopoly on political power in Westminster. It would enable people to vote for parties that more closely represent their own views, without the fear that this party will not be accordingly represented in Parliament. It takes us away from binary choices and towards a system that is based on power-sharing and compromise. Both the current Labour and Conservative leadership should embrace this. They would have to worry less about being broad churches, and less about reducing their ideology to an argument about their side being better than the other. They could instead focus more on pursuing the policies they think are the correct ones and on how to cooperate with, rather than blindly oppose, other parties that have similar goals to them.
This brings us back to the Independent Group. If they truly think that ‘politics is broken’ then, rather than occupying a centre ground which already has a party that could claim to be doing the same, they should argue for a radical overall of our electoral system. This should be put ahead of all other concerns for the new party. It is unlikely that they will achieve substantial numbers of seats in any general election, so if they really want to see political change they need to change the system in which they operate. Do not blame these individuals, Conservative or Labour, for the fact that they are forced into parties that do not necessarily represent them or many of their voters as well as they could.
This post represents the views of the author, and not those of Democratic Audit.
The work you in the UK are doing on PR is incredibly important for those of us in the United States. The issue is not nearly as far along here and we need PR even more than you do. Our huge districts and money in politics have made the problem much much worse here. I don’t think the USA will move towards PR until the UK and Canada have. Our common language and cultural ties will mean the Uk and Canada will present a real example to the USA.
“rather than occupying a centre ground which already has a party that could claim to be doing the same, they should argue for a radical overall[sic] of our electoral system.”
But we also have a party that is doing doing the same – arguing for an radical overhaul of our electoral system.
| null |
minipile
|
NaturalLanguage
|
mit
| null |
Various cushions and travel pillows have been proposed in the prior art to address the problems of supporting an individual's neck and head while resting in a seat during traveling.
For example U.S. Pat. No. 4,031,578 discloses a travel pillow comprised of three resilient sections: (1) a central section which serves as a spacer and supports the back of the user's head and (2) a matching pair of lateral head section's located on opposite sides of said spacer (1) to form a generally H-shaped configuration therewith; both of the head sections (2) being of greater thickness than spacer (1) and possessing a tapered appearance which begins with a flat and generally wide back-wall and a narrower, rounded front portion; said back-wall being disposed at an angle which slopes toward the central section so that the backward pressure of the user's head on said spacer (1) will cause the said back-walls to form an essentially parallel plane and draw the inner side-walls toward one another, for contact with the user's head.
US 2001018777 discloses a device Comprising a firm core with a first and a second lengthwise edge, a top surface and a bottom surface; a recess located on the top surface of the core; a layer of soft, viscoelastic foam located within the recess; a layer of soft, Dacron fiber located along a top surface of the layer of foam; and a soft; C shaped layer of viscoelastic foam wrapped around the core; whereby the C-shaped layer of foam covers the first lengthwise edge of the core; the bottom surface of the core, and the second lengthwise edge of the core.
U.S. Pat. No. 4,285,081 discloses a device with a generally concave shape with respect to a vertical axis of curvature corresponding approximately to the central vertebral axis of the neck. The concave shape is fashioned so that it has symmetrical left and right halves, opposing areas of which are designed to exert gentle pressure in the vicinity of the mastoid processes of the head. The surface also has a generally convex shape with respect to a horizontal axis, such axis intersecting the vertical axis of curvature, so that the generally convex shape conforms generally to at least the upper portion of the nape of the neck and the lower portion of the occipital bone of the head.
U.S. Pat. No. 4,345,347 discloses an inflatable head and neck support cushion in a modified “horseshoe” shape, designed to rest on the shoulders of a person relaxing or working in a semi-reclining position in any hospital bed, passenger seat or high-backed chair; such that the head and neck are received by the interior middle portion of the “horseshoe”, such middle portion permanently embodying the contour of the back of the head and neck of a person, the two tips of the “horseshoe” being long enough to extend over the shoulders of the person and widely enough disposed apart from one another so that there is unrestricted circulation of air to the sides of the neck and face of the person, the “horseshoe” tips containing at their extremities tiny weights, slightly heavier than the inflated middle portion of the “horseshoe”, in order to stabilize the entire cushion on the shoulders of a person.
U.S. Pat. No. 5,778,469 discloses a concave pillow member having a back portion, and a pair laterally opposing arcuate side portions being extended from said back portion, said back portion having an arcuate surface; wherein said back portion and said arcuate side portions define a concavity for accepting the neck of a person for supporting the cervical spine, a pivot pin connecting each of said arcuate side portions to said back portion in a manner permitting pivoting into a stationary position of each of said side portions relative to said back portion and the other of said side portions.
U.S. Pat. No. 6,786,554 discloses an apparatus to support the curve of the posterior aspect of the upper and lower portion of the neck and upper thoracic portion of the spine and behind the ears to provide support to these areas so that the head and neck will remain in a supported position while the individual is asleep. The device also provides a residing area for the skull supporting the weight of the head posteriorly.
Despite the achievements of the prior art devices, none of them provide a support which all in one is capable of conforming its shape including its left and right support members to the natural lordotic curvature of the neck and head of individuals of various sizes and forms thereby providing a full support of the neck and head all the way from the bottom of the neck to the occipital ridge and the mastoid bones behind the ears; is capable of comfortably holding the head and neck in a motionless position in a given natural resting position i.e. with the head in a straight forward position or in various sideward turned and tilted positions; does not occupy space between the fixed support surface (e.g. the back-rest of the chair) and the back head of the individual; is capable of providing an upright support of the occipital ridge of the head preventing the head from dropping too far backwards but without pushing the head too far forward; is capable of being easily adapted to support the neck and head of a seated human being whose head rise above the head-rest of a seat; is discrete in use and does not touch the cheeks or jaws and does not cover the ears of the human being; is simple to use with no prior installation or adaptation needed and; is small and easy to package and carry in a hand luggage.
It is an object of preferred embodiments of the present invention to provide a device which meets at least some of the above requirements.
| null |
minipile
|
NaturalLanguage
|
mit
| null |
Abstract
This disclosure describes an apparatus, such as a wireless communication device, that applies a direct evaluation technique to render triangles for the 3D graphical environment. The apparatus includes a rendering engine that defines a rectangular area of pixels, referred to as a bounding box, that bounds the area to be rendered. The rendering engine evaluates coordinates associated with the pixels of the rectangular area to selectively render those pixels that fall within the triangular area. The direct evaluation triangle rendering algorithm may require fewer complex operations than the more computationally intensive interpolation process employed by other systems. As a result, the apparatus may present a 3D graphical environment while preserving as much as possible the available power.
Description
CROSS REFERENCE TO RELATED APPLICATIONS
This application claims priority from U.S. Provisional Application Ser. No. 60/455,923, filed Mar. 18, 2003, and is a divisional of U.S. patent application Ser. No. 10/617,455, filed Jul. 10, 2003, entitled “TRIANGLE RENDERING USING DIRECT EVALUATION,” the entire content of which is incorporated herein by reference.
TECHNICAL FIELD
The invention relates to mobile computing devices and, in particular, to techniques for rendering graphics for display by the mobile computing devices.
One fundamental operation of a 3D graphics application is triangular rendering. In particular, a 3D graphical object is typically defined by a set of triangles in a 3D space. Each triangle is defined by three vertices within the 3D space and associated attributes of each vertex, including color attributes, texture coordinates, or both. Each triangle is graphically rendered using an interpolation process that fills the interior of the triangle based on the location and attribute information defined at the three vertices. More specifically, each starting and ending coordinate is computed for each line of pixels within the triangle using the interpolation process. The pixels along each line are sequentially filled to render the entire triangle.
One challenge for mobile computing devices, however, is the typical limitation of available power. Unlike a desktop computing environment, mobile computing devices typically have limited battery power. As a result, the computationally intensive interpolation process required for triangular rendering may place a significant strain on the available power of the mobile computing device.
SUMMARY
The disclosure is directed to techniques for rendering a triangular area of pixels for presentation on a display device. The techniques may be particularly useful in a mobile computing environment presenting limited power resources.
In one embodiment, a method comprises computing data that defines a rectangular area of pixels that bounds a triangular area of the pixels, and evaluating coordinates of the pixels of the rectangular area to determine which pixels fall within the triangle area. The method further comprises updating pixel data for the pixels that fall within the triangle area to render the triangular area.
In another embodiment, an apparatus comprises a rendering engine that defines a rectangular area of pixels that bounds a triangular area of the pixels. The rendering engine evaluates coordinates associated with the pixels of the rectangular area to selectively render the pixels that fall within the triangular area.
In another embodiment, a mobile communication device comprises a display, a processor, and a rendering engine. The processor generates video output data for presentation by the display as a graphical environment. The rendering engine applies a direct evaluation algorithm to render a triangle for the graphical environment, wherein the direct evaluation algorithm applies linear equations to render the triangle without interpolating between edges of the triangle.
The details of one or more embodiments of the invention are set forth in the accompanying drawings and the description below. Other features, objects, and advantages of the invention will be apparent from the description and drawings, and from the claims.
BRIEF DESCRIPTION OF DRAWINGS
FIG. 1 is a block diagram illustrating an example embodiment of a mobile computing device.
Processor 6 may take the form of an embedded microprocessor, specialized hardware, software, e.g., a control software module, or combinations thereof. Moreover, DSP 10, processor 6, rendering engine 12, as well as other components of mobile computing device 2, may be implemented in one or more application-specific integrated circuits (ASICs), as multiple discrete components, or combinations thereof.
As described herein, DSP 10 and a rendering engine 12 interact to apply a direct evaluation technique to render triangles for the 3D graphical environment. More specifically, DSP 10 issues commands to rendering engine 12 to direct the rendering engine to render triangles within a 3D space. In response, rendering engine 12 applies a direct evaluation triangle rendering algorithm that requires fewer division operations than the more computationally intensive interpolation process employed by conventional systems. As a result, mobile computing device 2 may present a 3D graphical environment while preserving as much as possible the power available to the mobile computing device.
To invoke rendering engine 12, DSP 10 issues a command that specifies the three vertices of the triangle to be rendered. For example, as illustrated in the example triangle depicted by FIG. 2, DSP 10 issues a command that defines triangle 20 with a first vertex (X0,Y0), a second vertex (X1,Y1), and a third vertex (X2,Y2), where each of the vertices represents a coordinate within a 2D slice of a 3D environment. Consequently, the vertices define a triangle having edges 24A, 24B and 24C.
In response to the command, rendering engine 12 computes a “bounding box” 22, which refers to a rectangular area defined to bound a minimum and a maximum of the x,y coordinates of the triangle. Bounding box 22, for example, is defined by an upper-left coordinate (Xmin,Ymin) and a lower-right coordinate (Xmax,Ymax). As illustrated in the example of FIG. 2, bounding box 22 may be defined to cover a minimum area within the 2D slice to encompass triangle 20. In other embodiments, minimum dimensions for bounding box 22 may be computed as function of a block size of video blocks stored by cache 15. In particular, DSP 10 and rendering engine 12 may process output video data of video memory 14 in a “tiled” fashion, i.e., in block fashion along rows and columns. Moreover, the block size may be set based on the capacity of cache 15. For example, the block size may equal the capacity of the cache. In this manner, the dimensions of bounding box 22 may be defined to be equal to or less than the dimensions of a video block in the event a triangle to be rendered lies completely within a single video block. For triangles spanning more than one video block, a bounding box may be used that has dimensions calculated to encompass the overlap between the bounding box of the triangle and the video block, as illustrated by bounding box 22A. This may advantageously reduce the number of memory accesses required for retrieving and rendering pixel data associated with the triangle, which translates into power savings.
After calculating the bounding box, e.g., bounding box 22 of FIG. 2, rendering engine 12 processes each pixel line encompassed by the bounding box and selectively enables those pixels that fall within triangle 20. Specifically, rendering engine 12 scans the pixels lines, e.g., in a leftward and downward fashion, and applies linear equations to determine whether each pixel falls within triangle 20. For those pixels within the edges 24A, 24B and 24C, rendering engine 12 updates the current attributes for the pixels, e. g., based on z-value, color information, texture information, or the like, associated with triangle 20.
FIG. 3 is a flowchart illustrating example operation of rendering engine 12 in application of a direct evaluation algorithm for rendering a triangle. Initially, rendering engine 12 receives a command from DSP 10 that specifies three vertices of a triangle to be rendered, i.e., a first vertex (X0,Y0), a second vertex (X1,Y1), and a third vertex (X2,Y2) (step 30 of FIG. 3).
In response to the command, rendering engine 12 computes data, e.g., an upper left coordinate and a height and width, that defines the bounding box that encompasses the triangle defined by the vertices (step 32).
In addition, rendering engine 12 computes a coefficient matrix M−1 for computing the linear coefficients of the linear equations that describe the attributes of each pixel within the triangle, and a coefficient matrix MC for computing the linear coefficients of the linear equations that describe the three edges of the triangle (step 34). Specifically, an attribute value ν for a pixel located inside the triangle can be represented as a linear function of the x,y location in the screen space as follows:
ν=Ax+By+C. (1)
Consequently, the linear coefficients, A, B, and C for eq. (1) can be obtained from the three equations associated with the three vertices:
ν0=Ax0+By0+C
ν1=Ax1+By2+C (2)
ν2=Ax2+By2+C
where νi(i=0, 1, 2), is the attribute value defined at vertex i, and (xi,yi)(i=0, 1, 2) are the screen coordinates of vertex i. Using matrix notations, the vertices can be represented as:
[vov1v2]=[x0y01x1y11x2y21]=[ABC].(3)
Thus, the coefficients for attribute interpolation can be expressed as:
[ABC]=M-1[vov1v2].where(4)M=[x0y01x1y11x2y21](5)
The coefficient matrix M−1 for computing the coefficients for attribute interpolation can be computed using Laplace expansion as follows
M-1=1det(M)MCT(6)
where
det(M)=|M|=x1y2+x2y0+x0y1−x2y1−x0y2−x1y0 (7)
MC, the companion matrix of M, can be calculated as:
Mc=[y1-y2x2-x1x1y2-x2y1y2-y0x0-x2x2y0-x0y2y0-y1x1-x0x0y1-x1y0].(8)
Upon calculating the coefficient matrices M−1 and MC, rendering engine 12 computes coefficients A, B, C, for all attributes associated with the pixels (step 36). In particular, the coefficient matrix M−1 can be used for computing the coefficients of different attributes, although the values at the vertices, (ν0,ν1,ν2), are different for different attributes.
Next, rendering engine 12 initializes all attribute values at a starting pixel of the bounding box, e.g., (Xmin,Ymin) of FIG. 2, (step 38). In addition, rendering engine 12 initializes current pixel index values (XC, YC) to a first pixel of a first scan line of the bounding box, i.e., XMIN and YMIN (step 39).
During the direct evaluation rasterization process, rendering engine 12 tests the current pixel (XC, YC) to determine whether the pixel falls within the triangle (step 39). Specifically, rendering engine 12 applies the previously calculated matrix MC based on a set of edge equations delineating the triangle to determine whether the location of the current pixel falls within the triangle. These equations are uniquely defined by the coordinates of the three vertices. In particular, for a given starting vertex (xi, yi), and ending point (xj, yj), on a 2D plane, for example, the edge equation is,
y-yix-xi=yj-yixj-xi(9)or,(yi-yj)x+(xj-xi)y+xiyj-xjy=0.(10)
For the three edges with starting vertex index, i=1, 2, 0, and ending vertex index, j=2, 0, 1, three edge equations in matrix format can be expressed as:
[e1e2e3]=MC[XCYC1]=[000].(11)
Thus, rendering engine 12 applies the matrix MC to the current pixel (XC, YC), and determines that the pixel is inside the triangle when all of e1, e2, e3 are less than zero.
If the pixel is not within the triangle (no branch of 39), rendering engine 12 proceeds to the next pixel along the scan line of the bounding box, i.e., increments XC (step 46) and, assuming the end of the scan line has not been reached (step 48), tests that pixel in accordance with equation (11) to determine whether the pixel is within the triangle (step 39).
If application of equation (11) indicates that the current pixel is within the triangle, rendering engine 12 determines whether the current pixel is visible (step 40). Specifically, rendering engine 12 determines the position of the current pixel along the z-axis to determine whether the pixels is visible, or whether pixels from other slices of the 3D graphic environment prevent the pixel from being visible to the user, i.e., are on top of the current pixel. In one embodiment, rendering engine 12 compares a z-value, zc, of the current pixel with the corresponding z-value, zb, of a z-buffer to determine if the pixel is visible, i.e., if zc<zb.
If the pixel is not visible (no branch of step 40), rendering engine 12 proceeds to the next pixel (step 46). If, however, the pixel is visible, rendering engine 12 computes attribute values, e.g., texture and color values, for the pixel based on equation (1) (step 42). Upon computing the attribute values, rendering engine 12 updates the value of the current pixel within video memory 14 based on the computed attributes (step 44).
After updating the value of the current pixel within video memory 14, rendering engine 12 proceeds to the next pixel (step 46). This process is repeated until the end of the current scan line is reached, i.e., XC>XMAX or the current pixel exits the triangle (step 48), causing rendering engine 12 to proceed to the beginning of the next scan line, i.e., set XC=XMIN and incrementing YC (step 50). Rendering engine 12 traverses each scan line of the bounding box testing each pixel in this manner, and terminates the rendering process when the last scan line has been completed, i.e., YC>YMAX (step 52).
FIG. 4 is a block diagram illustrating an example embodiment of rendering engine 12. In the illustrated embodiment, rendering engine 12 includes a vertex buffer 60 for buffering vertices for triangles to be rendered in accordance with the direct evaluation techniques. In particular, rendering engine 12 receives commands from DSP 10 that specify triangles in the form of three vertices. Each vertex is defined by at least an x and y coordinate, and may include one or more attribute values k, such as z-values, color values, texture values, and the like.
Various embodiments of the invention have been described. These and other embodiments are within the scope of the following claims.
Claims (14)
1. A method comprising:
computing data that defines a rectangular area of pixels that bounds a triangular area of the pixels;
selecting a line of pixels within the rectangular area of pixels;
sequentially evaluating coordinates associated with the pixels of the line of pixels to determine whether the pixels fall within the triangle area;
ceasing evaluation of the coordinates associated with the pixels of the line of pixels upon determining that at least one pixel of the line falls within the triangle area and a current pixel no longer falls within the triangle area; and
updating pixel data for the pixels that fall within the triangle area to render the triangular area.
2. The method of claim 1, wherein evaluating coordinates comprises evaluating the coordinates of the pixels in accordance with a set of linear equations for computing edges of the triangular area.
3. The method of claim 1, wherein evaluating the coordinates of the pixels comprises:
computing a coefficient matrix MC for computing linear coefficients for the set of linear equations; and
applying the coefficient matrix MC to each of the pixels within the rectangular area to determine whether each of the pixels falls within the triangular area.
4. The method of claim 3, wherein applying the coefficient matrix MC comprises applying the coefficient matrix MC to a current one of the pixels (XC, YC) within the rectangular area to determine whether:
vertices v0(x0,y0), v1(x1,y1), and v2(x2,y2) are vertices of the triangular area.
5. The method of claim I, wherein updating pixel data comprises computing pixel data for the pixels of the rectangular area that fall within the triangle area in accordance with a set of linear equations that describe one or more attributes associated with the triangular area.
6. The method of claim 5, wherein the attribute values comprise at least one of color values and texture values.
7. The method of claim 5, wherein updating pixel data comprises:
computing a coefficient matrix M−1 for computing linear coefficients of the set of linear equations; and
applying the linear coefficients to each of the pixels that falls within the triangular area to compute an attribute value for each of the pixels.
8. The method of claim 7, wherein applying the coefficient matrix M−1 comprises applying the coefficient matrix M−1 to compute the linear coefficients A, B, and C, for an attribute associated with vertices v0(x0,y0), v1(x1,y1), and v2(x2,y2) of the triangle as:
[ABC]=M-1[vov1v2],
where the coefficient matrix M−1 equals:
M=[x0y01x1y11x2y21],and
an attribute value for each pixel (XC, YC) is computed as
ν=AXC+BYC+C.
9. The method of claim 1, further comprising:
determining whether each of the pixels within the rectangular area is visible; and
selectively rendering each of the pixels based on the determination.
10. The method of claim 9, wherein determining whether each of the pixels is visible comprises comparing a z-value, zc, of the current pixel with a corresponding z-value, zb, of a z-buffer to determine if zc<zb.
11. The method of claim 1, wherein computing data comprises computing a first coordinate and a second coordinate that represent opposite corners of the rectangular area.
12. The method of claim 1, wherein
updating pixel data comprises processing the pixel data within a cache memory having a block size; and
computing data to define a rectangular area comprises computing the data to define the rectangular area as a function of the block size of the cache.
13. The method of claim 1, further comprising:
selecting a subsequent line of pixels within the rectangular area of pixels;
sequentially evaluating coordinates of pixels of the subsequent line of pixels to determine whether the pixels fall within the triangle area;
ceasing evaluation of the coordinates of the pixels of the subsequent line of pixels upon determining that at least one pixel of the subsequent line falls within the triangle area and a current pixel no longer falls within the triangle area; and
updating pixel data for the pixels that fall within the triangle area to render the triangular area.
14. A method comprising:
computing data that defines a rectangular area of pixels that bounds a triangular area of the pixels;
computing a coefficient matrix for computing a set of linear coefficients of a set of linear equations that describe edges of the triangular area;
applying the coefficient matrix to each of the pixels within the rectangular area to determine whether each of the pixels falls within the triangular area; and
updating pixel data for the pixels that fall within the triangle area to render the triangular area.
| null |
minipile
|
NaturalLanguage
|
mit
| null |
Stronger revenue and cash flow are behind the increasing optimism. In the Bank of America spring survey, 68 percent of owners said they expect revenue to increase in the next 12 months. They feel confident about their local economies but have their eye on national and international issues that could affect their businesses.
Wells Fargo’s second-quarter Small Business Index rose to 47 from the first quarter’s 45, its highest level since the second quarter of 2008, before the financial meltdown. That was still far below the high of 114 hit in December 2006, but much better than the minus 28 posted in the third quarter of 2010.
The Wells Fargo survey found owners are gradually getting more optimistic about the prospects for their companies’ financial situation a year from now. Sixty-seven percent forecast their businesses would be in good shape, up from 66 percent in the first quarter. Fifty-nine percent expect their cash flow to be good over the next year, up from 57 percent.
The Wells Fargo survey and Bank of America’s are in line with other recent reports that show owners’ confidence slowly improving.
Both surveys found owners willing to hire. In the Wells Fargo survey, 21 percent plan to hire in the next 12 months, little changed from 22 percent in the first quarter. A larger number of owners in the Bank of America survey, 52 percent, said they were willing to hire, a jump of 21 percentage points from a year earlier.
Despite that gain, Robb Hilson, head of small business banking at Bank of America, still notes owners’ caution.
“They’re probably not going to hire in explosive numbers like they did 10 years ago,” he said.
Loans are easier for small businesses to get, adding to owners’ confidence, although many don’t want to borrow. Only 14 percent of owners surveyed by Bank of America said they plan to apply for loans this year, down from 19 percent a year ago. Owners just don’t need loans right now: More than half said their businesses are well-funded, and 42 percent said they don’t want to take on anymore debt.
The Bank of America survey questioned 1,000 small business owners during March. The Wells Fargo survey questioned 600 owners from March 31 to April 4.
| null |
minipile
|
NaturalLanguage
|
mit
| null |
Huge Designer Wedding Gown Sale
Okay, so I know this is supposed to be the Friday Randomness post about me and my life, kooky stuff-random stuff, but this is more important. Tomorrow is the big designer gown sale dayat Alta Moda! Don't forget, you need to call to make an appointment. Go on...do it...I'll wait. 801-531-1215. Oh, and don't forget to tell them I sent you, so they'll love me. Thanks.
Here's the scoop in case you missed it last time I posted it:
Awesome once a year only, one day only sale at Alta Moda. Hilary, the co-owner of Alta Moda let me in on this juicy tidbit.
Alta Moda is known for high end designer gowns and they are having a sample sale! Get your dream gown from 50% to 80% OFF! Please be sure to make an appointment to see the dresses because if you don't, the fabulous folks at Alta Moda won't be able to give you the attention you deserve. It's sure to be a madhouse, so get your appointment soon for the best possible selection. (And, tell them I sent you!) :)
| null |
minipile
|
NaturalLanguage
|
mit
| null |
Atomic Layer Deposition (“ALD”), also known as Atomic Layer Epitaxy (“ALE”), is a method of depositing thin films onto a substrate that involves sequential and alternating self-saturating surface reactions. The ALD process is described in U.S. Pat. No. 4,058,430 of Suntola et al., which is incorporated herein by reference. ALD offers several benefits over other thin film deposition methods, such as Physical Vapor Deposition (“PVD”) (e.g., evaporation or sputtering) and Chemical Vapor Deposition (“CVD”), which are well known to those skilled in the art, as described in Atomic Layer Epitaxy (T. Suntola and M. Simpson, eds., Blackie and Son Ltd., Glasgow, 1990). ALD methods have been proposed for use in depositing thin films on semiconductor wafer substrates, to achieve desired step coverage and physical properties needed for next-generation integrated circuits.
Successful ALD growth requires the sequential introduction of two or more precursor vapors into a reaction space around the substrate surface. Typically, ALD is performed at elevated temperatures and reduced pressures. For example, the reaction space may be heated to between 150° C. and 600° C., and operated at a pressure of between 0.1 mbar and 50 mbar. Even at such high temperatures and low operating pressures, pulses of precursor vapors are not delta functions, meaning they have a substantial rise and decay time. Sequential pulses of precursor vapors will overlap if the second pulse is started before the first pulse is completely decayed, i.e., before excess first precursor vapor is substantially eliminated from the reaction space. If substantial amounts of the different precursor vapors are present in the reaction space at the same time, then non-ALD growth can occur, which can generate particles or non-uniform film thickness. To prevent this problem, the pulses of precursor vapor are separated by a purge interval during which the reaction space is purged of excess amounts of the first precursor vapor. During the purge interval, the reaction chamber is purged by flushing the reaction chamber with an inert gas, application of a vacuum, pumping, suction, or some combination thereof.
The ALD reaction space is typically bounded by a reaction chamber, which is fed by one or more precursor material delivery systems (also called “precursor sources”). The size of the reaction space is affected by the dimensions of the reaction chamber needed to accommodate the substrate. Some reaction chambers are large enough to fit multiple substrates for batch processing. However, the increased volume of the reaction space in a batch processing system may require increased precursor pulse durations and purge intervals.
To prevent overlap of the precursor pulses and to form thin films of relatively uniform thickness, an ALD process may require purge intervals that are ten times longer than the duration of precursor vapor pulses. For example, a thin film deposition process may include thousands of precursor vapor pulses of 50 ms duration alternating with purge intervals of 500 ms duration. Long purge intervals increase processing time, which can substantially reduce the overall efficiency of an ALD reactor. The present inventors have recognized that reducing the rise and decay times also reduces the overall time required for precursor pulse and purge without causing non-ALD growth, thereby improving the throughput of the ALD reactor.
A precursor material delivery system may typically include one or more diaphragm valves positioned in a flow path of the system, for preparing and dispensing one or more precursor vapors. The precursor vapors are pulsed into the reaction chamber by opening and closing the appropriate diaphragm valves in the precursor delivery system. Diaphragm valves can also be used for controlling the flow of inert gases and other materials into and out of the ALD reactor. Known diaphragm valves commonly have an actuator for opening and closing a flexible diaphragm against a valve seat. When the diaphragm is in the open position, the precursor vapor is allowed to pass through a valve passage and enter the reaction chamber. When closed, the diaphragm blocks the valve passage and prevents the precursor vapor from entering the reaction chamber. Because ALD processing can require many thousands of cycles of precursor pulse and purge for forming a film on a single workpiece, valves used in an ALD system should have very high durability and be able to perform millions of cycles without failure.
Hydraulic and pneumatic actuators typically include dynamic seals that can fail under the high temperatures and large number of cycles required for delivery of precursor gases and purge gases in an ALD system.
Solenoid type actuators are desirable because they typically have a faster response time than pneumatic and hydraulic actuators, and are capable of a large number of open-close cycles. However, solenoid actuators generate heat when electric current is applied and, like hydraulic and pneumatic valves, solenoid actuated valves can fail when exposed to the high temperatures required for maintaining some precursor materials in vapor form. Heat can degrade the insulation around the solenoid windings, resulting in electrical shorting between windings and failure of the solenoid coil. It can also melt a plastic bobbin around which the solenoid coil is wound. The present inventors have recognized that active cooling of the actuator to avoid heat-related failure tends to also draw heat from the diaphragm, valve seat, and walls of the valve passage, which can cause the precursor material to condense or solidify in the valve passage. Condensation and buildup of precursor material on the diaphragm and valve seat can cause the valve to leak or clog, leading to undesirable non-ALD growth and particles in the reaction chamber.
For successful ALD processing, precursor gases are typically delivered to the reaction chamber at temperatures in excess of 100° C. and often between 200° C. and 300° C., particularly the varieties of precursor materials used for forming thin films on semiconductor substrates. With a conventional diaphragm valve, a significant amount of heat is conducted from the flow path through the valve, where it dissipates to the surrounding environment. Heat dissipation through the valve can result in cooling of the flow path and the associated condensation problems discussed above. To avoid condensation, the flow path may be heated, as described, for instance, in U.S. Provisional Patent Application No. 60/410,067 filed Sep. 11, 2002, tilted “Precursor Material Delivery System for Atomic Layer Deposition,” which is owned by the assignee of the present invention and incorporated herein by reference. However, heating the flow path may fend to contribute to overheating of the actuators in conventional diaphragm valves. The present inventors have recognized a need for an improved diaphragm valve in which the valve passage, diaphragm, and valve seat can be kept hot enough to prevent the precursor vapor from condensing (typically in the range of 130° C. to 260° C. or hotter), without overheating the valve actuator.
U.S. Pat. No. 5,326,078 of Kimura, U.S. Pat. No. 6,116,267 of Suzuki et al., and U.S. Pat. No. 6,508,453 of Mamyo describe known diaphragm valves for controlling the flow of high temperature gases for semiconductor manufacturing.
The present inventors have recognized that a need remains for a valve in which the diaphragm is kept at a temperature sufficient to prevent condensation of ALD precursor materials while not exceeding the temperature limits of the actuator. The inventors have also recognized a need for a durable valve that transitions from an open position to a closed position more quickly than prior art valves.
| null |
minipile
|
NaturalLanguage
|
mit
| null |
Q:
VMWare ESXi stopped responding
I have a home server with a Q6600 Quad Core and 8GB of RAM running with VMWare ESXi 3.5 for about 8 months now. I have 2 datastores, with 1TB (SATA HDs) each, one with 150GB free and the other with 240GB free. I have 9 VMs running 24x7 on it. Everything was doing great, until yesterday.
Out of the blues, I stopped getting responses from the VMs in the ESXi. At first, I could connect using the Infrastructure Client but, when if I tried to get information from any VM, I would get a message that the VM could not be reached. Looking at the Host info, it would show me networking info, cpu, memory, but when I tried to reach the datastore, it would normally stop responding. I was only able to open the datastore located where ESXi is installed once, and all the VMs were there. Now, I can't connect to it anymore, and I really don't know what to do.
Update I've done several reboots on the host, and the problem repeats itself. I connect through the Infrastructure client but, after a few seconds, it becomes unresponsive. After a while, now I can't connect through the client anymore End Update
What is the best course of action to diagnose the problem? I can access the ESXi screen without a problem, but I don't know what to do. I was thinking of reinstalling it, maybe with version 4.0, but I'm not sure I should do that. Where (and how) can I access anything that could help me figure out what's wrong?
Tks
New Update I reset the setting back to default, and I was able to connect with the VI Client. I reattached one of my VMs, and started booting it up, but I had problems again; the VM tried to boot and ended up locking up, and the VI client became unresponsive, and I couldn't connect to it again. Following @pehrs advice, I went into unsupported mode, and checked the /var/log/message, and I found a bunch of Errors reading. Below is a sample:
Aug 31 02:59:36 vmkernel: 0:00:28:41.882 cpu0:2179)StorageMonitor: 196: vmhba33:0:0:0 status =2/0 0xb 0x0 0x0
Aug 31 02:59:37 vmkernel: 0:00:28:42:357 cpu0:5279)<3>ata4: transageld ATA stat/err 0x71/04 to SCSI SK/ASC/ASCQ 0xb/00/00
Aug 31 02:59:37 vmkernel: <4>ata4: status=0x71 { DriveReady DeviceFault SeekComplete Error 0:00:28:42.357 cpu0: 5279)}
last message repeated 1 times
I also got some DriveStatusError on some lines of the same file. Now, looking at the /var/log/vmware/hostd-0.log, I'm getting some errors after successfully opening the vmdk files of the first VM that I reattached :
[2010-08-31 02:44:15:199 'PropertyCollector' 213004 warning] GetPropertyProvider failed for haTask-ha-folder-vm-vim.Folder.registerVm-45
[2010-08-31 02:45:05:693 'PropertyCollector' 98311 warning] GetPropertyProvider failed for haTask-16-vim.VirtualMachine.powerOn-49
I get several other GetPropertyProvider errors after that, then some timeouts... It seems clear I have a HD problem. What can I do to save my VMs? Can I do a scancheck on the HDs? If yes, how?
Thanks!
End of Update
A:
I suspect that you're using consumer-grade drives for your storage? If so, these have onboard error recovery systems which will stall the volume while error recovery is being attempted. When this occurs, all storage serving can be delayed for a considerable period of time (10+ seconds).
In enterprise-grade drives, this 'feature' is disabled or never included, on the assumption that error recovery will be handled at the RAID-array level (RAID's implicitly assumed for enterprise deployments). For example, Western Digital refers to this feature (or removal of a feature!) as TLER - Time-Limited Error Recovery. In practical terms, it means a drive with TLER enabled won't stall out for an extended period of time to perform sector recovery/remapping/whatever.
So if you're running consumer drives, there's a fair chance you've hit an error on one of your disks, and it's repeatedly stalling out while it attempts to recover.
Solutions for this may be a bit tricky - I don't know if any third-party disk error scanners will support VMFS, and wouldn't risk pulling the disks and scanning them with ANYTHING, unless completely sure it won't trash the volume.
| null |
minipile
|
NaturalLanguage
|
mit
| null |
President Trump took communism and rogue regimes head on during his first speech to the United Nations General Assembly Tuesday.
He warned the likes of Venezuelan dictator Nicolas Maduro that if he proceeds with his socialist agenda that is crippling his country, he can expect the United States to respond.
He defined Iran as a "depleted rogue state whose chief exports are violence, bloodshed, and chaos” and "funds terrorists."
These condemnations were nothing compared to his warning for North Korea though. "Rocket Man" Kim Jong Un would be wise to cease his ballistic missile tests and stop threatening the U.S., Trump said, or expect consequences.
"The United States has great strength and patience, but if it is forced to defend itself or its allies, we will have no choice but to totally destroy North Korea."
He didn't mince words, yet media outlets like MSNBC were too busy worrying about how the rest of the world would perceive his speech. Washington Post reporter Daniel W. Drezner seemed to be less impressed with Trump's rhetoric and more concerned about other nations' sovereignty.
Don't kid yourself. Trump gave a crap #UNGA speech other countries will cite only to remind him that he shouldn't violate their sovereignty. — Daniel W. Drezner (@dandrezner) September 19, 2017
ABC's Terry Moran even wondered if Trump's North Korea threat could be considered a war crime.
While the media is still reeling from Trump's speech, human rights organizations are welcoming his words. Not since President Ronald Reagan has a leader so forcefully condemned communism and defended democracy, according to the Victims of Communism Memorial Foundation.
“President Trump’s speech at the United Nations today was one of the strongest refutations of collectivism ever uttered by an American President," VOC Executive Director Marion Smith said in a statement Tuesday. "The United States has not had a stronger anti-communist in the White House since the days of Ronald Reagan.
“In a time when the world is becoming less free and sympathy towards communism and socialism is on the rise both domestically in the United States and abroad, it is reassuring to hear the leader of the free world assert the failures of these murderous ideologies. As the President correctly articulated, from the Soviet Union to North Korea, from Cuba to Venezuela, collectivist policies ultimately lead to famine, poverty, and widespread human rights abuses. While the Cold War has been long over, the fight against communism persists. The Victims of Communism Memorial Foundation welcomes President Trump’s strong words and actions to fight communism and his commitment to put it where it belongs - on the ash heap of history.”
Families of American prisoners still detained in Iran are also applauding the president's speech. They hope he swiftly follows it with action.
"My family is rapidly running out of time," said Babak Namazi, who is related to Siamak and Baquer Namazi, a father and son who are being held in Evin prison. "I hope and pray that my father and brother won't suffer the same fate [as Otto Warmbier] at the hands of the Iranian government. I urge the president to spare no effort to bring my family home."
| null |
minipile
|
NaturalLanguage
|
mit
| null |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.