text
stringlengths
8
5.74M
label
stringclasses
3 values
educational_prob
sequencelengths
3
3
Tōbu Sano Line The is railway line in Japan, operated by the private railway operator Tobu Railway, connecting Tatebayashi Station in Tatebayashi city, Gunma Prefecture, in a north-north-easterly direction to Kuzū Station in Sano, Tochigi Prefecture. In February 2005, the old city of Sano, the town of Tanuma and the town of Kuzu were merged into the city of Sano, so this line runs within the two cities of Tatebayashi, Gunma and Sano, Tochigi. Stations History The Aso Horse Tramway opened the first section of the line between Kuzu and Koena-kashi to haul limestone and timber to the Watarase river port in 1889/90. Individual section opening dates are provided below. Steam locomotion was introduced in 1894, and in 1912 the company merged with Tobu. The line was extended to Tatebayashi in 1914, and electrified in 1927. On June 23, 1889, Aso-Basha-Tetsudo (Aso Horsecar, 安蘇馬車鉄道) opened the section of the line between Kuzu (葛生) and the former Yoshimizu(吉水). On August 10 1889 the section of the line between the former Yoshimizu and the former Sano Town (旧佐野町) was opened. On January 25, 1890 the section of the line between the former Sano Town and Koena-kashi(越名河岸) was opened. On April 13, 1893 Aso-Basha-Tetsudo changed the company name to Sano Railway (佐野鉄道). On March 20, 1894 the railway line between Kuzu, the former Sano Town and Koena-kashi was opened. On June 17, 1903 Sano Railway Line was connected to Ryomo Line (両毛線). On March 30, 1912 Tōbu Railway merged Sano Railway. On August 2, 1914 the section of the line between Tatebayashi and Sano Town (the present Sano-shi) was opened. On August 19 1914 the former Sano Town Station was abandoned. On October 16 1914 the line between Tatebayashi and Kuzū was operated directly. On February 1, 1915 the name of the former Yoshimizu station was changed to Horigome station (堀米駅). On July 1 1915 Yoshimizu station was opened. On July 5 1915 the passenger operation between Sano Town and Koena-kashi was abandoned. On February 16, 1917 abolished between the town of Sano and Koena-kashi On December 16, 1927 electrification was begun on the section between Tatebayashi and Kuzū. Watarase Station (渡瀬駅) was opened. On April 1, 1943 the name of Sano Town Station was changed to Sanoshi Station (佐野市駅). On May 1, 1972 Kita-Tatebayashi baggage office (北館林荷扱所) was opened between Watarase and Tajima. On March 18, 2006 Wanman driver-only operation was started on the local train service. See also List of railway lines in Japan References This article incorporates material from the corresponding article in the Japanese Wikipedia. External links Tobu Railway Sano Line information page Sano Line Category:Rail transport in Gunma Prefecture Category:Rail transport in Tochigi Prefecture Category:Railway lines opened in 1889 Category:1067 mm gauge railways in Japan
Mid
[ 0.621134020618556, 30.125, 18.375 ]
Optimizing Survival Predictions of Hypopharynx Cancer: Development of a Clinical Prediction Model. To develop and validate a clinical prediction model (CPM) for survival in hypopharynx cancer, thereby aiming to improve individualized estimations of survival. Retrospective cohort study of hypopharynx cancer patients. We randomly split the cohort into a derivation and validation dataset. The model was fitted on the derivation dataset and validated on the validation dataset. We used a Cox's proportional hazard model and least absolute shrinkage and selection operator (LASSO) selection. Performance (discrimination and calibration) of the CPM was tested. The final model consisted of gender, subsite, TNM classification, Adult Comorbidity Evaluation-27 score (ACE27), body mass index (BMI), hemoglobin, albumin, and leukocyte count. Of these, TNM classification, ACE27, BMI, hemoglobin, and albumin had independent significant associations with survival. The C Statistic was 0.62 after validation. The model could significantly identify clinical risk groups. ACE27, BMI, hemoglobin, and albumin are independent predictors of overall survival. The identification of high-risk patients can be used in the counseling process and tailoring of treatment strategy or follow-up. 4 Laryngoscope, 2019.
High
[ 0.6822916666666661, 32.75, 15.25 ]
Q: form value 00:00:00 into time value I was wondering, if I record a time through a javascript function and say I leave it on for 2 mins 20 seconds: 00.02.20 now when I insert this into my database, where the field type is set as time, it doesn't record properly. I think it comes from how I request the data: $length = mysql_escape_string($_REQUEST['timeDrive']); is there a way of converting this into a time that is going to output the exact value: 00.02.20 thanks for the help! A: If you don't need to perform any mathematical functions on those fields (eg: sum, average, etc), and it's purely for display, then you can just store it as plain text in a CHAR(8) field. Otherwise, you'll need to normalise it to some sort of unit. I'd suggest maybe as an integer of the total number of seconds (if that is accurate enough for you). To convert to seconds: $val = "00.02.20"; $parts = explode(".", $val); // ['00', '02', '20'] $totalSeconds = parts[0] * 3600 + parts[1] * 60 + parts[2]; // 140 And to convert it back: $seconds = 140; // this would be read from the database, or something printf("%02d.%02d.%02d", $seconds / 3600, ($seconds / 60) % 60, $seconds % 60 );
Mid
[ 0.618181818181818, 34, 21 ]
Murphy Announces $4.2 Million Federal Investment in Orlando Sanford International Airport to Support Growth Combined with a 2017 grant, Murphy has announced nearly $10 million in federal investments at SFB U.S. Congresswoman Stephanie Murphy today announced Orlando Sanford International Airport (SFB) has received a $4.2 million federal investment to improve operations, expand capacity, and enhance the passenger experience. The grant, disbursed by the Federal Aviation Administration, will fund the construction of 28,226 square yards of apron needed to provide aircraft parking for users of the airport. This investment will help fund the first part of a multi-phase project to eventually construct 37,000 square yards of apron at the airport. In September 2017, Murphy also announced a $5.6 million federal investment for SFB to widen a main taxiway at the airport, which is one component of a major expansion project that is expected to be completed in 2020 and will include the addition of four new gates. Altogether, Murphy has announced $9.8 million in federal investments in SFB over the last year alone. “It’s my pleasure to announce this federal investment in Orlando Sanford International Airport as it continues to grow and expand operations,” Murphy said. “This grant will create good-paying jobs in the short term and sustain economic development in the long term for the Sanford area. I’m proud to support SFB, and I’ll keep doing all I can to help meet our region’s growing transportation infrastructure needs.” SFB is one of the fastest-growing airports in the country. The number of passengers annually using the airport has nearly doubled in recent years—from just under 1.58 million in 2011 to a projected 3 million this year—and is expected to increase further in the coming years. “These projects represent critical infrastructural improvements to sustain our continued growth. Congressman Murphy’s support and understanding of our needs going forward is gratefully acknowledged by the Orlando Sanford International Airport,” said SFB President Diane Crews. SFB is also a major economic driver for central Florida. The airport employs over 23,000 people with a regional economic impact of more than $3 billion.
High
[ 0.7187500000000001, 34.5, 13.5 ]
ALMA and Rosetta detect Freon-40 in space (2 October 2017 - ESO) Observations made with the Atacama Large Millimeter/submillimeter Array (ALMA) and ESA’s Rosetta mission, have revealed the presence of the organohalogen Freon-40 in gas around both an infant star and a comet. Organohalogens are formed by organic processes on Earth, but this is the first ever detection of them in interstellar space. This discovery suggests that organohalogens may not be as good markers of life as had been hoped, but that they may be significant components of the material from which planets form. This result, which appears in the journal Nature Astronomy, underscores the challenge of finding molecules that could indicate the presence of life beyond Earth. Using data captured by ALMA in Chile and from the ROSINA instrument on ESA’s Rosetta mission, a team of astronomers has found faint traces of the chemical compound Freon-40 (CH3Cl), also known as methyl chloride and chloromethane, around both the infant star system IRAS 16293-2422, about 400 light-years away, and the famous comet 67P/Churyumov-Gerasimenko (67P/C-G) in our own Solar System. The new ALMA observation is the first detection ever of a stable organohalogen in interstellar space. Organohalogens consist of halogens, such as chlorine and fluorine, bonded with carbon and sometimes other elements. On Earth, these compounds are created by some biological processes — in organisms ranging from humans to fungi — as well as by industrial processes such as the production of dyes and medical drugs. This new discovery of one of these compounds, Freon-40, in places that must predate the origin of life, can be seen as a disappointment, as earlier research had suggested that these molecules could indicate the presence of life. “Finding the organohalogen Freon-40 near these young, Sun-like stars was surprising,” said Edith Fayolle, a researcher with the Harvard-Smithsonian Center for Astrophysics in Cambridge, Massachusetts in the USA, and lead author of the new paper. “We simply didn't predict its formation and were surprised to find it in such significant concentrations. It’s clear now that these molecules form readily in stellar nurseries, providing insights into the chemical evolution of planetary systems, including our own.” Exoplanet research has gone beyond the point of finding planets — more than 3000 exoplanets are now known — to looking for chemical markers that might indicate the potential presence of life. A vital step is determining which molecules could indicate life, but establishing reliable markers remains a tricky process. “ALMA’s discovery of organohalogens in the interstellar medium also tells us something about the starting conditions for organic chemistry on planets. Such chemistry is an important step toward the origins of life,” adds Karin Öberg, a co-author on the study. “Based on our discovery, organohalogens are likely to be a constituent of the so-called ‘primordial soup’, both on the young Earth and on nascent rocky exoplanets.” This suggests that astronomers may have had things around the wrong way; rather than indicating the presence of existing life, organohalogens may be an important element in the little-understood chemistry involved in the origin of life. Co-author Jes Jørgensen from the Niels Bohr Institute at University of Copenhagen adds: "This result shows the power of ALMA to detect molecules of astrobiological interest toward young stars on scales where planets may be forming. Using ALMA we have previously found precursors to sugars and amino acids around different stars. The additional discovery of Freon-40 around Comet 67P/C-G strengthens the links between the pre-biological chemistry of distant protostars and our own Solar System." The astronomers also compared the relative amounts of Freon-40 that contain different isotopes of chlorine in the infant star system and the comet — and found similar abundances. This supports the idea that a young planetary system can inherit the chemical composition of its parent star-forming cloud and opens up the possibility that organohalogens could arrive on planets in young systems during planet formation or via comet impacts. “Our results shows that we still have more to learn about the formation of organohalogens,” concludes Fayolle. “Additional searches for organohalogens around other protostars and comets need to be undertaken to help find the answer.” This research was presented in a paper “Protostellar and Cometary Detections of Organohalogens” by E. Fayolle et al., to appear in Nature Astronomy on 2 October 2017. The Atacama Large Millimeter/submillimeter Array (ALMA), an international astronomy facility, is a partnership of ESO, the U.S. National Science Foundation (NSF) and the National Institutes of Natural Sciences (NINS) of Japan in cooperation with the Republic of Chile. ALMA is funded by ESO on behalf of its Member States, by NSF in cooperation with the National Research Council of Canada (NRC) and the National Science Council of Taiwan (NSC) and by NINS in cooperation with the Academia Sinica (AS) in Taiwan and the Korea Astronomy and Space Science Institute (KASI). ALMA construction and operations are led by ESO on behalf of its Member States; by the National Radio Astronomy Observatory (NRAO), managed by Associated Universities, Inc. (AUI), on behalf of North America; and by the National Astronomical Observatory of Japan (NAOJ) on behalf of East Asia. The Joint ALMA Observatory (JAO) provides the unified leadership and management of the construction, commissioning and operation of ALMA. ESO is the foremost intergovernmental astronomy organisation in Europe and the world’s most productive ground-based astronomical observatory by far. It is supported by 16 countries: Austria, Belgium, Brazil, the Czech Republic, Denmark, France, Finland, Germany, Italy, the Netherlands, Poland, Portugal, Spain, Sweden, Switzerland and the United Kingdom, along with the host state of Chile. ESO carries out an ambitious programme focused on the design, construction and operation of powerful ground-based observing facilities enabling astronomers to make important scientific discoveries. ESO also plays a leading role in promoting and organising cooperation in astronomical research. ESO operates three unique world-class observing sites in Chile: La Silla, Paranal and Chajnantor. At Paranal, ESO operates the Very Large Telescope and its world-leading Very Large Telescope Interferometer as well as two survey telescopes, VISTA working in the infrared and the visible-light VLT Survey Telescope. ESO is also a major partner in two facilities on Chajnantor, APEX and ALMA, the largest astronomical project in existence. And on Cerro Armazones, close to Paranal, ESO is building the 39-metre Extremely Large Telescope, the ELT, which will become “the world’s biggest eye on the sky”.
High
[ 0.662968099861303, 29.875, 15.1875 ]
China tries to reassure foreign companies over industry plan By GILLIAN WONGMarch 11, 2017 In thisOct. 21, 2016 photo, Chinese students work on the Ares, a humanoid bipedal robot designed by them with fundings from a Shanghai investment company, displayed during the World Robot Conference in Beijing. China's industry minister has defended a manufacturing development plan and rejected complaints foreign makers of electric cars and other goods might be pressured to hand over technology or forced out of promising markets. Miao Wei, minister of industry and information technology, tried Saturday, March 11, 2017 to reassure foreign companies that the "Made in China 2025" plan treats all companies equally. (AP Photo/Ng Han Guan) BEIJING (AP) — China’s industry minister on Saturday defended a manufacturing development plan and rejected complaints foreign makers of electric cars and other goods might be pressured to hand over technology or forced out of promising markets. “The strategy and its related policies are applicable to all businesses in China, be them domestic or foreign,” Miao told a briefing. Miao was responding to a report by the European Union Chamber of Commerce earlier this week that said China is violating its free-trade pledges by inducing foreign firms to give up encryption and other technology to potential Chinese competitors. Technology is a growing flashpoint in trade tensions with Washington and Europe, which worry their competitive edge is eroding as Beijing buys or develops skills in semiconductors, renewable energy and other fields. China has faced mounting complaints the government improperly shields its fledgling developers of robotics, software and other technology from competition. The plan calls for China to be able to supply its own high-tech components by 2020 and materials by 2025 in 10 industries from information technology and aerospace to pharmaceuticals. A broad outline was issued in 2015 and officials have been gradually releasing details. Miao said targets for domestic brands’ share of the market in some sectors should be seen as forecasts rather than mandatory. “When we were drawing up the plan, we did not deliberately pursue these targets,” Miao said. The European chamber noted that China’s strategy says two of the top 10 global brands in electric cars should be Chinese by 2025. It said that rules out joint ventures created by foreign companies with Chinese partners. The chamber called the strategy “a large-scale import substitution plan aimed at nationalizing key industries, or at least severely curtailing the position of foreign business in them.” In an apparent response to such criticism, Premier Li Keqiang promised in a speech at the opening of China’s annual legislative sessions a week ago that foreign companies would receive “equal treatment” under the manufacturing plan.
Mid
[ 0.5846153846153841, 28.5, 20.25 ]
San Francisco Supe Proposes Government Ganja Shop San Francisco Supervisor Ross Mirkarimi wants the city to get into the drug dealing business by opening up a city-run medical marijuana dispensary. Though the law's as likely to pass as Cheech Marin is to sponsor a major public art exhibition--or something like that--it has at least been good for a chuckle: "The mayor will have to hash this out with public health officials," a spokesman for Mayor Gavin Newsom told the SF Chronicle. "It's the mayor's job to weed out bad legislation, and to be blunt, that sounds pretty bad."
Low
[ 0.44768856447688504, 23, 28.375 ]
1. Introduction {#sec1} =============== The microbiomes, including bacteria, fungi, and viruses, live within and upon all organisms and have become a growing area of research. With the advances of new technologies it is now possible to entangle complex microbial communities found across animal kingdoms. Recent advances in molecular biology have provided new possibilities to investigate complex microbial communities and it has become clear that the vast majority of bacteria living in/on other animals cannot be cultured. It is now commonly accepted that at least 80% of the total bacterial species in the human gut cannot yet be cultured \[[@B1], [@B2]\]. High-throughput DNA sequencing approaches provide an attractive and cost-effective approach to investigate the composition and functions of the host microbiome. The culture-independent analysis of the host microbiome can be obtained by either metagenomic approaches or amplicon sequencing using specific marker genes. Amplicon sequencing provides a targeted version of metagenomics with a specific genetic region shared by the community members of interest. The amplified fragments derive from universal primers and are usually assumed to produce sequence read abundance that reflects the genetic diversity in the studied sample and hence sequence read abundance should reflect the genetic diversity in the studied sample. The amplified fragment typically contains phylogenetic or functional information, such as the 16S ribosomal RNA gene. 16S rRNA gene sequences are well studied and provide excellent tools for microbial community analysis \[[@B3]\], but other functional marker genes can also be used \[[@B4]\]. Subsequent taxonomy profiling of the entire microbial communities is conducted by comparisons to reference sequences or by*de novo*clustering of specific regions of sequences. Functional profiling of metagenomics is more challenging since major parts of the metagenomic data remain insufficiently characterized and frequently samples are contaminated by host DNA or traces from the diet. Compared to both culture-dependent and more traditional molecular approaches such as sequencing of clone libraries and DGGE, amplicon sequencing approaches allow a more in depth analysis of the complete microbiome and are less restricted to the number of samples to be investigated. For further technical details see, for example, Caporaso et al. \[[@B3]\]. 2. The Microbiome of Animals {#sec2} ============================ The Human Microbiome Project (HMP) \[[@B1]\] was initiated in 2007 and with this it has become clear that the human microbiome is highly diverse and complex. The number of microorganisms sharing the human body is thought to outnumber human cell numbers by a factor of ten and the combined microbiome usually contains 100x more genes than its host. The microbiome also plays a major role in human health \[[@B5]\] and both composition and alterations in the microbiome have been found associated with diabetes, inflammatory bowel disease, obesity, asthma, rheumatoid arthritis, and susceptibility to infections \[[@B10]--[@B11]\]. In recent years the microbiome of a number of vertebrate nonhuman species has been sequenced including livestock \[[@B12], [@B13]\] and wildlife species such as the Tasmanian devil \[[@B14]\], red panda \[[@B15]\], giant panda \[[@B16]\], black howler monkey \[[@B17]\], and koala \[[@B18]\]. Insects are the most diverse and abundant groups of animals on earth \[[@B19]\] and have colonized many different habitats. It is therefore not surprising that insect species are also inhabited by large and diverse microbial communities playing a pivotal role for insect biology. Many insect species are inhabited by a large and diverse assembly of microorganisms, where especially the microbial communities in the intestinal tract have received much attention \[[@B20]--[@B21]\]. Some insect species show a much more diverse microbiome compared to other insect species. For example, the microbiomes of some synanthropic flies, such as the green bottle fly, show high diversity compared to other species such as fruit flies or mosquitoes \[[@B25]--[@B23]\]. The high species richness could reflect the lifestyle of synanthropic flies, for example, breeding and living by animal manure, bedding, and/or decaying organic matter rich in microorganisms. The microbiome of other groups of invertebrates has also been established although for a limited number of species. Studies have compared the microbiome of different species of marine invertebrates with or without photosynthetic symbionts including five families of marine invertebrates \[[@B26]\]. Marine species of commercial interest such as oysters have also been addressed \[[@B27]\]. The microbes of soil invertebrates have received some attention. The gut microbes of soil animals play an indispensable role in the digestion of food and are of ecological importance in the global carbon cycle. Recently, research reported that like that of terrestrial insects some soil invertebrates such as collembolans, earthworms, and nematodes contain a rich microbiome and putative symbionts \[[@B29]--[@B30]\]. Further, results have shown how differences in diet among earthworm ecological groups lead to the establishment of different bacterial communities \[[@B29]\]. Moreover, perturbation of the soil ecosystem could impact earthworm gut wall-associated bacterial community composition and hence earthworm ecology and functioning. Even though the microbial community in invertebrates like that of collembolans and earthworms is not fully addressed, there is convincing evidence that intestinal communities can contribute to the degradation of recalcitrant biological materials such as chitin and lignocellulose \[[@B29], [@B28], [@B31]\]. 3. Factors Affecting the Animal Microbiome and the Biological Significance {#sec3} ========================================================================== To begin with all microorganisms were seen as pathogens causing infectious diseases to the host. The host immune system of eukaryotes was built to eliminate these intruders, but at the same time tolerating its own molecules. However, we now know that the association between eukaryotic hosts and the microorganisms is far more complex. With the advances in molecular biology, such as next generation sequencing, it is now possible more specifically to address the association between a host and its microbiome. In animals the association between the host and its microbiome can take many forms and includes symbiotic and pathogenic associations \[[@B20]\]. Symbiotic microbiomes can be beneficial to the hosts in many ways, including dietary supplementation, host immune system, and social interactions \[[@B22], [@B32]\]. In many insects, the gut symbionts are essential for survival and development and suggest the presence of a core microbiome \[[@B33]\]. The symbionts need not to be completely dependent on the host and animal-microbial interactions can be flexible and facultative and the host can carry different symbionts at different times \[[@B20]\]. The association between the host and the microbiome is also affected by a large number of abiotic and biotic factors and can involve the immune system, nutrition, reproduction, communication, and many other systems of the host \[[@B2], [@B34]--[@B36]\]. The number of studies addressing the role of the microbiome on animal health is limited and almost entirely restricted to human studies. However, a large number of studies have addressed the role of single bacterial symbionts on animal fitness, where especially insect species have received much attention \[[@B39]--[@B38]\]. There is now a growing interest in understanding what factors can affect the microbiome of animals in order to understand how fitness is affected and to explain differences between ecosystems, species, and/or populations. The composition of the bacterial communities of animals including invertebrates and vertebrates seems to be shaped by multiple factors, such as the host genotype \[[@B21], [@B25], [@B40], [@B41]\], diet \[[@B17], [@B34], [@B39], [@B42]\], life stage \[[@B43]\], laboratory rearing \[[@B34], [@B43], [@B44]\], and the ecological and physiological conditions of, for example, the gut of the insect \[[@B21]\]. Further, recent studies have proposed that the microbiome impacts the nutritional supplementation, tolerance to environmental perturbations, and maintenance and/or development of the immune system \[[@B20]\]. Some invertebrates lack the complexity and diversity of associations with microorganisms. Such insect model systems allow investigations that aim to understand the contribution of specific bacteria and the entire microbiome towards host physiological processes. For example,*Drosophila melanogaster* provide a promising model system to address some of these issues and for this species it is possible to rear axenic flies. Next generation sequencing approaches can provide an in-depth analysis of the functional roles of specific groups of bacteria and the entire microbiome on the fitness of the host. Results on*D. melanogaster* have shown how the microbiota affects developmental rate and changes metabolic rates and carbohydrate allocation under laboratory conditions \[[@B32]\]. Similarly functional analysis of the microbiome of ants also suggests large capacity to degrade cellulose \[[@B45]\] and that metabolic functions of microbes in herbivorous species play a role in fixing, recycling, or upgrading nitrogen \[[@B46]\]. Hypothesis has also been proposed to describe that gut microbiomes might facilitate insect herbivory and that variation in the ability to consume chemically defended plants can be partly explained by variation in the gut microbiome \[[@B47]\]. Recent studies have highlighted the importance of the microbiome not only in shaping the immune system but also in the context of host pathogen transmission processes (for reviews see \[[@B20], [@B48]\]). An example hereof is that the success of malaria infections is not only influenced by the mosquito innate immune responses and genetics but also affected by the composition of the gut microbiota and is in fact one of the major components affecting the outcome of mosquito infections \[[@B24]\]. Studies have also suggested that abiotic factors can affect the microbiome of disease vectors and thus vector competence of the host \[[@B23], [@B35]\]. Similarly the epidemics of human pathogens transmitted by insect vectors correlate with environmental factors \[[@B49], [@B50]\] suggesting that the vector competence of insect vectors is affected both indirectly and directly by environmental factors \[[@B35], [@B51], [@B52]\]. The recent interest in the importance of the microbiome on tolerance to environmental perturbations \[[@B37], [@B38]\] has revealed the presence of single bacterial species and mainly endosymbionts with large impact on, for example, temperature tolerance (for review see \[[@B38]\]). Temperature can affect the host directly or indirectly through either abundance of the symbiont or efficiency of transmission to the offspring \[[@B53]--[@B55]\]. At present it is unclear to what degree single strains of bacteria play a dominant role in tolerance to environmental factors or if interactions between bacteria of the microbiome are dominant. The recent advances in molecular biology and implementation of statistical analysis allow more specific hypothesis to be tested on effects of the microbiome on tolerance to, for example, environmental stress. 4. Conservation and Implications for Conservation {#sec4} ================================================= Changes in the microbial community have been shown to affect fitness of humans and other species as described above. However, the implications of changes in the microbiome for animal conservation have only been addressed in a limited number of studies even though the implications are many. Several studies using next generation sequencing approaches have addressed the comparison of the microbiome of laboratory populations or individuals kept in captivity with that of wild animals \[[@B14], [@B15], [@B18], [@B34], [@B44]\] or of single species in habitats influenced by different degrees of human behavior \[[@B17]\]. Results show that species across taxa living under laboratory conditions or affected by habitat fragmentation show less diverse microbiomes compared to wild species. Thus species are jeopardized not only directly by degraded habitats with reduced resource availability but also indirectly through diminished microbiomes. It is thus essential that future studies address the microbiome and how habitat fragmentation impacts the microbiome in different species and how species with less diverse microbiomes perform under these conditions. It is essential that we address the importance of the microbiome of other species rather than humans and the impact it has on their health status. For larger species such as primates this can be difficult and often only correlative evidence exists or can be achieved through a functional annotation of the microbiome \[[@B14], [@B17]\]. For example, in a study by Amato and coworkers \[[@B17]\] it was shown that beneficial fermenters, acetogens, and methanogen bacteria were more abundant in black howler monkeys inhabiting evergreen rainforest compared to individuals from fragmented habitats. The latter group also contained higher numbers of sulfate-reducing bacteria producing undesirable end products such as H~2~S. This strongly suggests that habitat fragmentation will affect not only the microbiome of the host but also host fitness. Similarly, keeping animals under captivity and maintaining breeding populations are likely to affect animal microbiomes. This is often undertaken in order to protect or increase abundance of rare species aiming at releasing species into the wild again. However, if the microbiomes of the individuals being released are affected, this is likely also to affect fitness compared to that of wild individuals and will subsequently reduce the probability of successful reintroduction into the wild. This is supported by studies on humans and mice where results have shown that obesity causes shifts in gut microbiome composition \[[@B10], [@B56]\]. Similar nutritional conditions could be expected for individuals kept in captivity. Molecular approaches allow researchers to establish entire microbiomes of animals and thus also test if, for example, it is possible to acclimate animals before being released into the wild. Optimizing environmental conditions of species in captivity could potentially ensure successful management and reintroduction. It has been suggested that engineering microbiomes can be used to improve plant and animal health \[[@B57]\]. How this can be incorporated into conservation is unclear. It is standard to employ basic principles of genetics into breeding strategies for endangered species in zoos or captivity, but the microbiomes evolutionary potential has been ignored also in conservation biology. Inbreeding has been suggested to affect the demography and persistence of natural populations and play an important role in conservation biology \[[@B58]\]. Recent work shows that inbreeding depression in bird and mammal populations significantly affects birth weight, survival, reproduction, and resistance to disease, predation, and environmental stress \[[@B59]\]. Inbreeding depression is expected to change the proportions of homozygotes and thus also heterozygotes. Consequently recessive deleterious mutations are likely to be expressed. As fitness of animal populations is expected to be affected by genotype of the host and the microbiome and interaction between the two it is also likely that the microbiome will be affected by inbreeding depression either directly or through interaction with the genotype of the host, not only because the genepool is diminished but also because of a compromised immune system. Microbiome analysis of wild populations has shown that the microbiome is dependent on the surrounding habitats as discussed above. This information might be used as a sensitive screening tool to establish populations affected by habitat fragmentation \[[@B17]\] and possibly also the effect of inbreeding. The strong signal from the diet \[[@B17], [@B34], [@B39], [@B42]\] suggests that the microbiome can also be used as a screening tool of diet preferences and to protect critical food resources or habitats for endangered species. However, it is essential that we fully understand the temporal and spatial changes in the microbiome if we are to use it as a screening tool. The microbiome can provide protection of the host from pathogens either through stimulation of the immune system or through competitive exclusion. However, when animals are compromised or exposed to unfavorable environmental conditions the symbionts themselves can act as opportunistic pathogens \[[@B2], [@B27]\] or not provide the same degree of protection. There are examples of how environmental conditions can affect the microbiome of invertebrates. For example, studies have shown how changes in temperature have caused shifts from mutualistic to pathogen dominated communities in corals \[[@B60]\]. In oysters temperatures over 20°C can cause summer mortalities, but temperatures as low as 14°C will promote development of brown ring disease in clams \[[@B61], [@B62]\]. This is important in conservation biology given the fact that species and populations are or will be exposed to changes in climate under the future climate scenarios. Host species will thus be exposed to not only the direct effects of changes in, for example, temperature but also indirect effects due to change in abundance or species composition of the microbiome. These changes can again lead to direct fitness effects on the host or indirect effects through changes or modification of the immune response. The microbiome could potentially also allow organisms to respond on a short timescale and cope with, for example, changes in climate. In particular, for species with a long generation time populations might not be able to adapt to fast changes in climate. However, bacteria with a short generation time can adapt on a shorter timescale compared to the host and may provide fitness advantages that allow the host to cope with changes in climate. Future studies should more specifically test if and how the microbiome affects animals ability to respond to a changing environment. Such plastic responses can have important implications for persistence of species or populations at risk in a fluctuating environment. Differences in microbiomes may affect invasions. For example, the interactions between native and nonnative of closely related species may be affected by the transmission of bacteria. This also appears to be associated with another emerging type of invasion, the transmission of infectious diseases of wild animals to humans \[[@B63]\]. Such transmission may be associated with factors including changes in human and nonhuman microbiomes. These interactions also have important implications for the conservation and management of different species within the environment. Some studies have addressed the microbiome of invasive species and also compared populations originating from the species native region with that of invasive regions \[[@B64], [@B65]\]. For the invasive snail,*Achatina fulica*results showed a highly diverse microbiome and functional analysis revealed a variety of microbial genes encoding enzymes, which is in agreement with the wide-ranging diet of this species \[[@B65]\]. Interestingly in another study comparing the microbiome of the soybean aphid,*Aphis glycines* from populations of native and invasive regions showed no differences \[[@B64]\]. Future studies should address the importance of the microbiome of invasive species to investigate if single strains of bacteria, the entire microbiome, or their interactions are major determinants for a species ability to establish in a new environment and if invasive microorganisms carried by introduced species affect native species \[[@B66]\]. 5. Conclusions {#sec5} ============== Recent advances in molecular biology have given new possibilities to establish complex microbial communities and it has become clear that the vast majority of bacteria living in/on other animals cannot be cultured. One of the most common methods to describe complex microbiomes is the sequencing of the bacterial marker 16S ribosomal RNA (16S rRNA) genes through amplicon sequencing. Studies have shown that the microbiome plays a major role in human health, and in recent years the microbiomes of an increasing number of nonhuman species have been investigated. However, the number of studies addressing the role of the microbiome on animal health still remains limited. Some studies have discussed the role of the microbiome on nutritional supplementation, tolerance to environmental perturbations, and maintenance and development of the immune system. Thus the implications of changes in the microbiome for animal conservation are many although a limited number of studies have addressed this. We suggest that a number of factors relevant in conservation biology could affect the microbiome of animals including inbreeding, habitat fragmentation, change in climate, and effect of keeping animals in captivity. Changes in these factors are thus also likely to affect the fitness of the host both directly and indirectly. With the development of next generation sequencing and functional analysis of microbiomes it has become possible more specifically to test direct hypothesis on the importance of the microbiome in conservation biology. This work was supported by the Danish Council for Independent Research (Grant no. 11-116256) (Simon Bahrndorff) and the Aalborg Zoo Conservation Foundation (AZCF). Competing Interests =================== The authors declare that there is no conflict of interests regarding the publication of this paper. [^1]: Academic Editor: Philippine Vergeer
High
[ 0.672941176470588, 35.75, 17.375 ]
LUBBOCK, TEXAS - NOVEMBER 05: Members of the Texas Tech Red Raiders including guards Jahmi'us Ramsey #3 and Terrence Shannon #1, along with head coach Chris Beard, celebrate with fans after the college basketball game against the Eastern Illinois Panthers at United Supermarkets Arena on November 05, 2019 in Lubbock, Texas. (Photo by John E. Moore III/Getty Images) True freshmen Jahmi’us Ramsey and Terrance Shannon Jr. combined for 30 points as the Texas Tech basketball team opened the 2019-20 season in impressive fashion on Tuesday night. On a night when the Texas Tech basketball team unfurled two banners from the rafters to commemorate what last season’s squad was able to accomplish, a cast of new faces got the 2019-20 season off to a rousing start before a sell-out crowd at the United Supermarkets Arena on Tuesday. With the newly displayed 2019 Final Four and Big 12 Championship banners hanging above them as reminders of what this program is capable of accomplishing, eight Red Raiders made their Double-T debut in an 85-60 win over Eastern Illinois. True freshman Jahmi’us Ramsey had a game-high 19 points while fellow frosh Terrence Shannon Jr. added eleven in impressive college debuts for both. Meanwhile, another new face, grad transfer T.J. Holyfield, was a force inside with 15 points, six rebounds, and two blocks as the third newcomer in head coach Chris Beard’s starting lineup. “They were dialed in,” Beard said of his team. “To have the emotion there at the start of the game, big crowd, first Division I game for a lot of guys. Then you put on top of that the two banners and the videos and all this, that’s hard to do. But I thought our guys, there was a calmness to us early that was really impressive.” Feeding off the energy of the home faithful, the Red Raiders jumped out to a 7-0 lead thanks to two Holyfield buckets in the paint and three free throws from Shannon. Though Eastern Illinois would eventually cut the lead to 24-20 with just under nine minutes to play in the half, the game was never really in doubt. This Texas Tech team was simply on a different level physically than the Panthers, who have a roster comprised of only juniors and seniors but who looked as overmatched as a trailer park in the path of an F-5 tornado. Coming at Eastern Illinois in waves, all eleven Red Raiders in uniform played at least seven minutes with each getting some run in the first half. Returnees Kyler Edwards and Davide Moretti started but were relatively quiet. In all, 46 of the Red Raiders points came from the six freshmen that were in uniform on Tuesday. The only freshman not suited up was 6-foot-7 forward Tyreek Smith who will be out for several weeks after surgery on his foot. Playing the role of a floor-general, the sophomore Edwards scored six points, grabbed seven boards, handed out three assists, and blocked two shots. Meanwhile, Moretti added 13 points while hitting 3-4 shots from 3-point range with most of his damage coming after halftime. With ten newcomers on the roster this year, eight of whom were not with the program at the end of last season, Tuesday was an opportunity for this rebuilt roster to work through some early-season kinks while also introducing itself to the West Texas faithful. You could say that they made quite the first impression, especially Ramsey, Shannon, and Holyfield, who were the three best players on the floor. Playing in his first game since March of 2018 after missing all of last season at Stephen F. Austin with a shoulder injury, the Albuquerque, New Mexico native Holyfield made 7-8 shots from the field and knocked down his only 3-point attempt. Playing with poise and an all-around offensive game that took many fans by surprise, he showed by he was one of the nation’s top graduate transfers this summer. To bring him to Lubbock, Beard had to fight off Big 12 rival Kanas and it’s easy to see why the two conference powers were enamored of him. Ramsey, the highest-rated high school player to ever play for the Red Raiders, flashed the athleticism that made him a 5-star prospect as he got to the rim at will. But he also showed that he can shoot the ball well enough to keep defenders honest as he hit 3-4 shots from behind the arc. Not to be overlooked was Shannon. Himself a top-100 high school recruit, the Chicago native showed to be a legitimate 6-foot-7 and he already has the frame of a player who looks like he’s been in a college strength program for multiple years. His ability to draw fouls was noticeable as he hit 7-8 free throw attempts. The overall team performance was by no means perfect. Eastern Illinois got too many open looks on their way to shooting 40.4% from the field. Tech also turned the ball over 13 times, which is far more than Beard would like to see. Still, it would be hard to ask for more from a team featuring only three players that played one second of college basketball a season ago. It was the type of performance the 15,000-plus on hand expected to see and it provided every indication that this will be another wild ride for Texas Tech basketball fans.
High
[ 0.6561797752808981, 36.5, 19.125 ]
Vigorous flip-floppery doesn’t necessarily make Bloomberg a hypocrite. Hypocrites hold one view while practicing the opposite, which isn’t what Bloomberg does. He merely does whatever he wants to do and closes his eyes to contradictions. Take, for example, his oscillating stand on mayoral term limits in New York. In 2008 while completing his second term, Bloomberg strong-armed the City Council into changing the term-limits law to allow him a third term. He even pressured groups that had benefited from his philanthropy to back the third-term proposal. “I just think that three terms makes more sense than two,” Bloomberg said to his critics after winning. Then, in 2010, in the middle of his third term, Bloomberg made a successful call for a return to the two-term limit. As the New York Times reported, Mike offered no explanation for his flip-flop, probably because outside of his personal desire to serve three terms and deny any future candidate the same opportunity, he had none. When a New York Observer reporter pressed him on the topic at a news conference, an agitated Bloomberg said, “Why don’t we just get serious questions here?” On the way out, Bloomberg deployed what would ultimately become a favorite insult of President Donald Trump's when he whispered to the reporter, “You're a disgrace.” Although he governs like a surveillance-state extremist, Bloomberg has long demanded exceptions to preserve his own privacy. When mayor, he kept secret the destinations of the frequent nonofficial trips he took out of New York. In 2012, Mayor Bloomberg had his wrists slapped by the city campaign finance board for contravening the spirit of campaign finance rules when he gave a personal donation in excess of $1 million, which he failed to report promptly as a campaign expenditure, to the New York State Independence Party. This pattern continues in other regulatory venues: His fellow Democratic presidential candidates have filed their mandatory financial reports with the Federal Election Commission, but Bloomberg hasn’t, as POLITICO’s Maggie Severns reports. He applied for and was granted an extension on mandatory financial disclosure by the FEC until March 20, which falls after Super Tuesday, when he hopes to win big in California and Texas. Bloomberg played a similar game of peekaboo with his money when he was mayor, allowing journalists to view, but not possess, redacted versions of his tax returns. Doing it his way on the campaign trail, Bloomberg has opted out of trying to qualify for the debates, dismissing the match-ups as “good theater” that don't “address the issues.” He’s also skipping the first four presidential contests—Iowa, New Hampshire, Nevada and South Carolina. Rejecting a meat-space campaign, he’s avoiding big rallies as well as town-hall events where voters can grill him. Instead, he’s conducting an air war on big-state voters, bombing them with an unprecedented $248 million in TV advertising. To assuage any hard feelings among Democrats about his candidacy, Bloomberg promises to spend up to $1 billion of his fortune on electing the party’s nominee no matter who it is. When you’re that loaded, you have every incentive to annoy people because you know you can always win them back with a fan of green. This isn’t to argue that Bloomberg is so mercurial that every position he holds is written in sand. Many of them, such as gun control and public health nannyism, are written in stone. But like Donald Trump, Bloomberg behaves like reversing course is his greatest pleasure. In December 2018, when his candidacy was still imaginary, he told Radio Iowa that should he run for president, he would either place his company in a blind trust or sell it. “But I think at my age, if selling it is possible, I would do that,” Bloomberg said. “At some point, you’re going to die anyway, so you want to do it before then.” When Bloomberg finally announced his candidacy last November, he neither sold his company nor put it in a blind trust. He kept it. Why? Because Mike Bloomberg always does what he wants to do. ****** Bloomberg was still defending the now-discredited "stop-and-frisk" policies he promulgated as New York mayor as recently as January 2019. Now he'’s apologizing. Stop, frisk, and send me email: [email protected]. My email alerts have used their riches to buy influence with my Twitter feed. My RSS feed was last seen on Rikers Island.
Mid
[ 0.5665914221218961, 31.375, 24 ]
t**2 + m**2*t + 2*m + 58006 wrt m. -747720*m**2*t**2 - 7680*t**3 Differentiate -177*i**3*y - 237734532*i**3 - 8*i**2*y + 2*i**2 - i*y - 1962*y wrt y. -177*i**3 - 8*i**2 - i - 1962 What is the third derivative of 428095*c**3*o**2 + c**3*o + 9*c**3 + 2*c**2*o**2 + 5*c**2*o - 12*c*o**2 + 2780*c*o + 2*c wrt c? 2568570*o**2 + 6*o + 54 Find the third derivative of -23321738*c**5 - c**3 - c**2 + 698*c + 596 wrt c. -1399304280*c**2 - 6 What is the second derivative of -14499385*p**2 - 33874556*p wrt p? -28998770 What is the derivative of -8672073*o + 8450144? -8672073 What is the third derivative of 43012*o*y**4 + 124*o*y**2 + 22*o + 3303*y**4 - 4*y**2 - 2188*y wrt y? 1032288*o*y + 79272*y Find the third derivative of 108000725*m**6*o**3 + 5727*m**2*o**2 - 250*m**2*o + m*o - o**3 - 1 wrt m. 12960087000*m**3*o**3 What is the third derivative of 811832*n**3 - 119*n**2 + 4435*n? 4870992 Find the third derivative of 348516820*s**4 + 3671*s**2 + 210*s + 3. 8364403680*s What is the third derivative of -152123342*n**5 + 24137364*n**2 + 3? -9127400520*n**2 What is the third derivative of 7184538*l**3*p**3 + 4*l**2*p**3 - l**2*p**2 + 82*l*p**3 + 348*l*p - 2*p wrt l? 43107228*p**3 Find the second derivative of 144974*h**2*q - 442*h**2*s**3 + 2*h*q*s**3 + 886032*h - 23*q*s**3 wrt h. 289948*q - 884*s**3 Find the third derivative of -k*p**3*q + 54*k*p**2*q**2 + 59*k*p**2 - 12*k*q**2 + 2*k*q + 256558*p**4 + 6*p**3*q**2 - 9*p**2*q**2 wrt p. -6*k*q + 6157392*p + 36*q**2 Differentiate 23780*d**2 + 3565*d + 104277679. 47560*d + 3565 What is the third derivative of -2*h**2*l*x**3 + 2*h**2*l + 2127338*h**2*x**3 - 839*h*l*x**2 + 23*h*l + 2*l*x**2 + 9*x**2 wrt x? -12*h**2*l + 12764028*h**2 What is the derivative of -1411975*w**4 - w**2 - 2*w + 58087628 wrt w? -5647900*w**3 - 2*w - 2 What is the third derivative of -7364272*o**6 + 10*o**2 + 58882? -883712640*o**3 Find the second derivative of -19306327*c**4 - 9*c**2 - 288789198*c. -231675924*c**2 - 18 What is the first derivative of 690868*l*z**2 + 82*l*z - 3609*z**2 + 10680*z wrt l? 690868*z**2 + 82*z Differentiate -16064720*g**4 + 13725078 with respect to g. -64258880*g**3 What is the second derivative of 42641224*i*z**2 + 5*i*z + 500879*i + z**3 - 11*z wrt z? 85282448*i + 6*z Find the second derivative of 375329*l*w**2 - 123*l*w + 10575*l - 750*w**2 wrt w. 750658*l - 1500 Find the second derivative of -54551730*a**2 - 320083084*a. -109103460 Find the second derivative of 148*k**3*n - 15605*k**2*n**2 - 2*k*n**2 + 3*k*n + 3322*k + 2*n**2 + 29 wrt k. 888*k*n - 31210*n**2 What is the third derivative of 2*c**3*k**4 - 885239*c**3*k + 4*c**2*k**2 + c*k**4 + 11804016*k**3 wrt k? 48*c**3*k + 24*c*k + 70824096 Find the third derivative of -1388*q**4 - 28*q**3 + 8203152*q**2 wrt q. -33312*q - 168 Find the second derivative of -d**4 + 290600*d**2 + 16936214*d. -12*d**2 + 581200 Find the second derivative of -33254831*a**3 - 6*a**2 + 490020071*a. -199528986*a - 12 Find the first derivative of 131*a*c*y - a*c - 3*a*y - 173*a - 2*c*y - 2502*c + 1075*y - 2 wrt c. 131*a*y - a - 2*y - 2502 Find the second derivative of 31137558*j**2 - 2022*j - 773 wrt j. 62275116 Find the third derivative of -2*d**3*l**3 - 2*d**3 + 169*d**2*l**3 - 12*d**2 + 7277*d*l**3 - 2*d*l**2 - 8*d*l - 490*d wrt l. -12*d**3 + 1014*d**2 + 43662*d What is the second derivative of a**3*f**2 - 662020*a**3*f + 141*a**2*f**2 + 2*a*f**2 + 8*a*f + 497*f**2 wrt f? 2*a**3 + 282*a**2 + 4*a + 994 What is the second derivative of -9*w**5 - 911476*w**3 - 35294537*w wrt w? -180*w**3 - 5468856*w Differentiate -j**2 + 144852033*j - 195154452. -2*j + 144852033 Find the second derivative of 3208437*v**4 + 1899775*v. 38501244*v**2 What is the derivative of -18*j*m*y - 2*j*m + 2*j*y - 85575408*j - 8777*m*y**3 wrt y? -18*j*m + 2*j - 26331*m*y**2 What is the third derivative of -1660137*h**2*m**3 - 5*h**2*m**2 - h**2*m + 4537*h*m + 14*h wrt m? -9960822*h**2 What is the third derivative of 62946*d**2*x**3 - 1360124*d**2*x**2 + d*x - 189*x**3 - 3*x**2 wrt x? 377676*d**2 - 1134 What is the second derivative of k**5 - 520*k**4 + 427*k**3 - 202900281*k wrt k? 20*k**3 - 6240*k**2 + 2562*k What is the first derivative of 119084222*o**4 + 388179228 wrt o? 476336888*o**3 What is the third derivative of -82*s**5 + 5019*s**4 - 150*s**3 + 256*s**2 + 92623*s - 3 wrt s? -4920*s**2 + 120456*s - 900 What is the second derivative of -80937*b**5 + 4499718*b? -1618740*b**3 Find the third derivative of 1138*y**4 + 120315*y**3 - 809326376*y**2. 27312*y + 721890 Find the third derivative of -38306244*c**3 - 3834832*c**2 wrt c. -229837464 Differentiate 12412*h**2 + 14*h + 45452937 wrt h. 24824*h + 14 Differentiate -r**2*w - 18053*r**2 + 9304*r*w + 6*r + 32*w - 25 wrt w. -r**2 + 9304*r + 32 Find the third derivative of -61862*v**6 - 178*v**3 + 32612*v**2 - 505 wrt v. -7423440*v**3 - 1068 What is the second derivative of -2*b**5 + 59*b**4 - 121476*b**3 - 267024571*b? -40*b**3 + 708*b**2 - 728856*b What is the derivative of -42671445*u + 272382645 wrt u? -42671445 What is the third derivative of -426804886*p**2*z**3 + 28377*p**2*z**2 + 32*p**2 - 2*p*z**2 - 4*p*z + 4 wrt z? -2560829316*p**2 What is the third derivative of 473412368*u**4*y**3 - 23*u**2*y**3 + 3*u**2*y**2 - 48*u**2*y - 8*u*y**2 - 882*y**2 wrt u? 11361896832*u*y**3 What is the first derivative of 224624877*t**3 - 307277035 wrt t? 673874631*t**2 Differentiate -42549902*i - 2918650 wrt i. -42549902 Find the first derivative of -5*j**2 - 5576550*j + 49343090 wrt j. -10*j - 5576550 What is the derivative of 5*j**4 + 302653*j**2 + 9637666 wrt j? 20*j**3 + 605306*j Differentiate -34124194*s**4 - 10662023 with respect to s. -136496776*s**3 What is the second derivative of -72967010*p**3 + 5230521*p wrt p? -437802060*p Find the second derivative of -360700769*x**3 - 322019122*x. -2164204614*x What is the derivative of -6968864*v**4 + 8*v - 183144551 wrt v? -27875456*v**3 + 8 Find the third derivative of 24*j**6 - 6*j**4 - 1389*j**3 + 66*j**2 - 30288*j wrt j. 2880*j**3 - 144*j - 8334 Find the first derivative of -54*c*l**3 + 251040*c*l*y**3 + 5*l**3*y**3 + 2777*l**3*y**2 - 4*l**2*y**3 + 2*l**2 - 2*y**2 wrt c. -54*l**3 + 251040*l*y**3 What is the second derivative of -18960*h**3 - 853*h**2 + 5905938*h? -113760*h - 1706 What is the third derivative of -19513953*d**4 - d**2 - 146*d - 2483 wrt d? -468334872*d What is the first derivative of 59001103*l - 182812288 wrt l? 59001103 Differentiate 270870217*s**2 - 130692019 wrt s. 541740434*s What is the second derivative of -3355364*y**3 + 21*y**2 + 103904204*y wrt y? -20132184*y + 42 What is the second derivative of 203*g**4*n**3 - 14235*g**3*n**2 + 8*g*n**3 - 62703*g*n**2 wrt g? 2436*g**2*n**3 - 85410*g*n**2 Differentiate -2293053*d*t*v + 7*d*v + 2472067*t + 6*v with respect to d. -2293053*t*v + 7*v What is the third derivative of 9741292*l**5 + 377960*l**2 + 22 wrt l? 584477520*l**2 What is the third derivative of 13646*i*n*x**4 - 22*i*n - 118*i*x**5 - 7*n*x**2 + 2*n*x - n - 2*x**2 - 113 wrt x? 327504*i*n*x - 7080*i*x**2 What is the third derivative of -3723*b*s**2*t**3 - b*s**2*t**2 - 4699*b*s*t**4 + 22*b*s*t**2 - 2*b*s - b*t**2 - 5*b*t + 849*s**2*t**2 + 6*s*t**2 wrt t? -22338*b*s**2 - 112776*b*s*t Find the first derivative of 4*f**3*w**2 - 3103*f**3 - 2532*f*w**2 - 429*f wrt w. 8*f**3*w - 5064*f*w Find the third derivative of -10*d*i**3*s**2 - 2397796*d*i**3*s - d*i**2*s + 6991926*d*s**2 + 2*s**2 wrt i. -60*d*s**2 - 14386776*d*s Find the third derivative of -5714*j*t**4 + 9*j*t**2 - j*t - 539*t**5 - 5*t**2 + 830*t wrt t. -137136*j*t - 32340*t**2 Find the third derivative of -402060460*y**4 + 327*y**2 + 694966. -9649451040*y What is the third derivative of -586281388*a**5 - 426404288*a**2 wrt a? -35176883280*a**2 Differentiate -50*w**4 + 69832*w - 21607648 wrt w. -200*w**3 + 69832 What is the first derivative of -1143170*c**2*j - 17190433*c**2 wrt j? -1143170*c**2 What is the third derivative of 126740408*c**3 - 236418343*c**2? 760442448 What is the derivative of 133217651*s + 142440579 wrt s? 133217651 What is the third derivative of 39958190*f**3 + 3*f**2 + 3*f + 1142421? 239749140 What is the second derivative of -20312209*w**2 - 6258*w + 469 wrt w? -40624418 What is the second derivative of 8967*i**2*k*z**
Low
[ 0.52757793764988, 27.5, 24.625 ]
[Rapid, automatic methods for identifying enterobacteria]. The biochemical testing of Enterobacteriaceae can be rapidly and automatically performed with commercial identification systems. There are three groups of identification systems: the kits, the microtiter plates and laboratory apparatus. The ratios of agreement between these new systems and the conventional tests are equivalent. The two first categories of systems are inexpensive unlike apparatus which must be utilized only in important laboratories.
High
[ 0.668257756563245, 35, 17.375 ]
= 49 - 42 for q. 1 Let s = -13753 - -13756. Solve -w - 16 = s*q, 260*w = 261*w + 4 for q. -4 Let b be (204/18)/((-2)/33). Let l = b + 190. Solve 2*k - 17 = 5*h, 4*k - l*h - 4 = h for k. -4 Suppose s = 7 + 15. Suppose s*q - 16*q = 90. Suppose -3*j + 3*a + 0 + q = 0, -2*a - 2 = 0. Solve -5*r + 7 + 21 = x, 29 = 3*x + j*r for x. 3 Suppose -3*t + 19 - 30 = -2*n, -2*t + 14 = 4*n. Solve -20 = n*k - 2*w, 3*w = 3*k + 7 + 8 for k. -5 Let j = -104 + 108. Solve 8 = 4*x + 4*p, 0 = 7*x - 8*x + j*p - 18 for x. -2 Suppose 9 = -2*t + 5*f, 4*t = f - 510 + 519. Solve -18 = 4*a + 5*b, -t*a + 29 = b + 37 for a. -2 Let a = -35 - -35. Suppose a = 23*t - 24*t + 5. Solve 4*r - b = -0*r, 0 = 4*r - t*b for r. 0 Suppose -15*u = -129*u + 1596. Solve -2*l - 2*z - 18 = 0, 2*l + z = -27 + u for l. -4 Suppose -k - 9 = 1 - 12. Solve -250*l + 254*l - 8 = 4*u, k*l = 4*u - 2 for u. 3 Let d = -7058 - -7065. Solve -11*x = -s - d*x - 20, s - 3*x + 16 = 0 for s. -4 Let s(g) = g**3 - 5*g**2 - 3*g + 34. Let u be s(4). Suppose 38 - u = 16*m. Solve 0*x - 20 = -m*z - 5*x, 8 = 3*z + 2*x for z. 0 Suppose 4*c + 66 = -2*c. Let l be (-6)/(-33) - 42/c. Suppose -1 = -l*s + 27. Solve -3*m + s = -5*p - 2, -2*p - 6 = -2*m for p. 0 Suppose 0 = 5*h + 5*a - 75, -5*a + 23 = h - 6*a. Solve -31 = 5*p - 2*y, 0 = -10*p + 8*p + 3*y - h for p. -5 Let d be (-21 - -1)*123/(-492). Solve -10*x + d = -15*x - 4*b, 3*b = 15 for x. -5 Let b = 4510 + -4507. Suppose 0 = -3*t + 10 - 1. Suppose -3*a + 16 = 4*u - 50, -39 = -t*u + b*a. Solve -3*w + x = 2*w, -u = 5*w - 4*x for w. 1 Suppose 3 = q - 99*c + 104*c, 0 = q + 4*c - 3. Solve 0 = 4*v - 8, -4*x + q*v = 11 + 15 for x. -5 Suppose 0 = -3*z + 6. Solve z*f + 4 = 0, -4*l = 23*f - 28*f + 6 for l. -4 Suppose 4*l - 8 = 0, -5*m - 15*l + 12*l + 6531 = 0. Let b be 8/76 - m/(-57). Solve -5*q + 4*o = 2*o + b, -4*q + 5*o - 15 = 0 for q. -5 Let l = 159 - 64. Let g = -93 + l. Suppose t + 44 = 5*t. Solve g*v - t = -b, -4*v - 5*b = -v - 20 for v. 5 Let z = -10553 + 10555. Solve -5*w - 7 + 7 = -5*n, 0 = -z*w for n. 0 Suppose 28 + 11 = 3*p. Suppose p*g - 5 = 12*g. Suppose -25 = -2*q + m, -2*q + g*m + 30 = 9. Solve u + 21 = 4*v, -u - 4*u - q = 3*v for u. -5 Let m = -6165 + 6170. Solve 5*c = -3*p - m + 17, -4*p + 3*c = 13 for p. -1 Suppose -12*p + 20 = -52. Let t be -4 - p*(3 - 0). Let s be t/55 + (-67)/(-5). Solve 0 = 5*k + 3*n + s, 4*k - 2*n + 11 = -17 for k. -5 Suppose 4*s - 11 - 25 = 0. Suppose 42 = s*i + 150. Let l = 17 + i. Solve v = -4*x - l, 4*v + 20 = -5*x - 0*x for x. 0 Suppose 9*b = -0*b + 36. Suppose -5*w - p + 2 = 0, -w - w + b*p = 8. Let y(r) = -r**2 + 2*r + 24. Let n be y(w). Solve 3*k + n = 3*m, -m + 4*k = -3*m - 2 for m. 5 Let s(v) = 2*v**2 - 27*v + 19. Let x be s(0). Solve 4*o - 9*o + x = a, 3*a - 15 = -o for a. 4 Let a(p) = p**3 + p**2 + 67*p + 139. Let n be a(-2). Solve -b + n = -c, 5*c = 2 - 12 for b. -1 Let v be (-59452)/(-9968) + (-2)/(-56). Let n be (-10)/(-14) + 4/14. Solve -5 = -4*k + o, -o - n + v = k for k. 2 Let d(x) = x - 4. Let o be d(0). Suppose -56*a - 143 = 137. Let q be -3 - (a - (-3 - o)). Solve f + q*b = 5*f + 20, -4*b + 20 = -2*f for f. -2 Suppose 64*h - 200 - 610 = -98*h. Solve 4*k + h = 4*x + 13, 0 = 5*k - x + 6 for k. -2 Let l(s) = -s**2 + 4*s + 78. Let c be l(11). Let d be (-1)/(15/20 - c). Solve -d = -3*x - f - 1, -2*x + 2*f + 10 = 0 for x. 2 Let d be 4 + -6*75/(-6). Let q = 41 + d. Let b be 6/(-27) - q/(-54). Solve -1 - 15 = -5*j - 3*t, -5*j + 14 = b*t for j. 2 Suppose 3*h = 4*h - 3. Suppose -5*m = -2*t - 18, -t + h*m - 11 = -0*t. Solve -i + t = 3*x, -2*i - 5*x + x = -2 for i. 1 Let n be 6 + 2 + 4 + 177. Let t = n - 184. Solve t*h + 37 = 4*j, h + 20 = 5*j - 0*h for j. 3 Let f be (-64)/20*3290/(-752). Solve o + 15*x - f*x = -5, -1 = -o + x for o. -2 Suppose 366 = -12*k + 15*k. Let g = k - 85. Let o = g - 21. Solve 0 = h - 0*h - 3*z + 13, -4*z = -o for h. -1 Let f be -4 + (-35 - (5 - 4)). Let u be 3/((-5)/(f/12)). Suppose u*v + 99 = 109. Solve -r - 2*a = -2, -v*r - a - 4*a + 15 = 0 for r. 4 Let x(j) = -470*j**2 + 4 + 473*j**2 - j - 11*j. Let n be x(4). Suppose v = -n*v + 10. Solve 0*a = -5*b + a + 18, -v*b = 3*a - 14 for b. 4 Suppose -2*s = -10*s - 792. Let n be ((-12)/33)/(18/s). Solve n*g - 4*g + 1 = 3*j, 3*j - 9 = 0 for g. -4 Let i(z) be the third derivative of 1/24*z**4 + 0 + 0*z**3 + 1/12*z**5 - 14*z**2 + 0*z. Let d be i(-1). Solve -6*k + k + 15 = -5*y, d*y + 9 = 3*k for y. 0 Let z(p) = 10 + 15 - 6*p - 16. Let j be z(-1). Solve -5*x + 5*q - j = 0, -2*x = 2*x - q + 15 for x. -4 Let s(t) = 45*t**2 + 8*t + 8. Let f be s(-1). Suppose 9*m - 24*m = -f. Solve -3*r + 9 = -5*l, 0*r + 3*l = 3*r - m for r. -2 Suppose -20 = 3*b + 5*n, -5*b - 5*n - 42 = -n. Let u be (4/16)/(2/104). Let m = u + b. Solve 0 = 4*t - i + 7, m*t + 2*i = t - 16 for t. -3 Suppose -24*r - 420 = -4*t - 22*r, -538 = -5*t - 4*r. Suppose 5*h = t - 76. Solve o + 2 = b + h, 5*b - 2*o + 14 = 0 for b. -2 Suppose 88 = 51*v - 16 - 49. Solve 2*b + 3*l = -6 + v, -3*b - 11 = -2*l for b. -3 Suppose 118 = -k + 3*k - 4*x, 145 = 2*k + 5*x. Suppose 21*a - k = 8*a. Solve -p + 3*w - 7*w + 21 = 0, p - a*w + 24 = 0 for p. 1 Let d = -273 - -228. Let b be 6/d - 1694/(-330). Solve b*y - 8 - 6 = -x, -y - 2 = 5*x for y. 3 Suppose r - 23*j - 6 = -25*j, 0 = -r - 4*j + 10. Solve -r*w + 5 = -g, 4*g + 4 = w + 5 for w. 3 Let y = -53 + 104. Let a = 53 - y. Suppose -a - 6 = -2*h. Solve -h*t + 2*j + 19 = t, -4 = 2*j for t. 3 Let z be 1 + -2 - 0 - (-10 + -4). Suppose z*w - 14 = 25. Solve 16 = -r + 3*c, 2*c - 28 = 2*r - w*c for r. -4 Let z(x) = 18*x - 808. Let d be z(45). Solve 3*o + 14 = -d*o - 2*s, 9 = 3*s for o. -4 Let v = 23 - 12. Let j(t) be the first derivative of t**3/3 + 8*t**2 + 10*t - 7. Let f be j(-16). Solve -5*g + v + f = -m, -4*g = -4*m - 20 for m. -1 Suppose 567*p = 1119*p - 558*p + 24. Solve -6*j - 4*z = -9*j + 27, 0 = j - p*z - 25 for j. 1 Suppose 14*j = 2*j + 192. Let k be (-8 + 5 - -1) + 6. Solve -4*b + 0 + 2 = -2*g, k*g = 2*b - j for g. -5 Let o be 9 + (324/90)/((-8)/(-10))*-2. Solve -2*k + 4 = 2*z - 0, 5*k - 4*z - 28 = o for k. 4 Let h be 2*(-5)/(-30)*6. Suppose -2*d - h = 0, r + 1 = 18*d - 22*d. Solve -5*m = -r*n - 13, -2*m = 6*n - 2*n - 26 for n. 4 Suppose u = -3*n + 15 + 23, 2*n - 28 = 2*u. Suppose n*c - 14 = 12. Let o be 6/(2 - 1/c). Solve -o*d + 12 = -0*y - 2*y, 0 = 3*d + 3*y - 27 for d. 5 Let a(j) = -72*j + 3172. Let z be a(44). Solve 19*x - 16 = 22*x + l, 0 = -l - z for x. -4 Let z be (-3)/2*2*-1. Let x(t) = 26*t - 130. Let f be x(5). Let g be 17/(-34)*(0 + f). Solve -3*s - 3*l + 1 - 7 = 0, g = z*s + 5*l + 14 for s. 2 Suppose 5*x + 12 = 47. Suppose 0 = z - 4*j + 18 - 39, -16 = -4*z - j. Solve -i - 3 = -5*v, z*i - x = v + 2*v for v. 1 Suppose 64*v - 199 = -7. Solve -2*p + 27 = -v*z + p, 2*z = -2*p - 2 for z. -5 Let f(j) = j**2 + 48*j - 6. Let b be f(-48). Let n(z) = -5*z - 27. Let g be n(b). Solve -3*q + 3*m - 3 = 0, 2*q + 2*m = 3*m + g for q. 4 Let h be (0 - 3/3)/(2/(-4)). Suppose 6 = h*v - 2. Let q be (-6)/(-21) - (-132)/28. Solve -4 = -u + z, q + 2 = -5*u - v*z for u. 1 Let p(r) = -124*r - 1484. Let b be p(-12). Solve c + 16 = b*w - 3*c, -4*w = 2*c + 14 for w. -1 Let t(v) = -5*v**2 - 129*v - 813. Let l be t(-12). Solve 5*p + 95*c - 11 = 98*c, -3*p + 3*c + l = 0 for p. -2 Let n be ((-28)/(-8) + -6)*60. Let p = 152 + n. Solve 3*b + 9 = -p*q - 4, 4*q + 2*b + 6 = 0 for q. 1 Suppose -4*k = 12*k - 480. Suppose 29*j - 53*j = -k*j. Solve o - a + 3 = j, 7*o - 2*o = -2*a - 15 for o. -3 Let a be (-3 + (-8)/(-3))*84/(-4). Let j(k) = 12*k - 81. Let m be j(a). Let d be (-58)/(-7) + (-4)/14. Solve -h = -m*r + 14, -d = -4*r + 5*h + 7 for r. 5 Let j = -325 + 343. Suppose j = -7*v + 32. Solve 0 = 4*k - x - 7, v*x = -k - 3*k - 2 for k. 1 Let k(p) = -64*p + 2565. Let j be k(40). Solve -j*r - 4*u = -12 - 6, 2*r = 2*u for r. 2 Suppose -36*f + 49*f = 26. Solve 5*h = -o - 28, 16 = -27*o + 25*o - f*h for o. -3 Let a(f) = -5*f + 22 - f**2 - 4*f + 5*f - 3*f. Let h be a(-9). Let c = 9 + -6. Solve -h*s - 20 = c*t, -4*s + 2*t + 3*t - 20 = 0 for s. -5 Suppose q - 4*m - 47 = -2*q, 2*q = 3*m + 30. Let k be (q/14)/((-1)/(-2)). Suppose k*w + 20 = 26. Solve -3 = -2*j - 11, -2*j = -w*z + 6 for z. -1 Let g be -2 + 5/(-1)*(-48)/120. Solve g = -2*a - 4*k + 7*k - 12, 5*a + 4*k = -7 for a. -3 Let r(h) = -h - 4. Let n be r(-
Low
[ 0.5208913649025071, 23.375, 21.5 ]
Role of cytochromes P450 in the metabolism of methyl tert-butyl ether in human livers. Methyl tert-butyl ether (MTBE) is widely used as a gasoline oxygenate for more complete combustion in order to reduce the air pollution caused by motor vehicle exhaust. The possible adverse effects of MTBE on human health is a major public concern. However, information on the metabolism of MTBE in human tissues is lacking. The present study demonstrates that human liver is active in metabolizing MTBE to tert-butyl alcohol (TBA), a major circulating metabolite and a marker for exposure to MTBE. The activity is localized in the microsomal fraction (125 +/- 11 pmol TBA/ min per mg protein, n = 8) but not in the cytosol. This activity level in human liver microsomes is approximately one-half of the value in rat and mouse liver microsomes. Formation of TBA in human liver microsomes is NADPH-dependent, and is significantly inhibited by carbon monoxide (CO), an inhibitor of cytochrome P450 (CYP) enzymes, suggesting that CYP enzymes play a critical role in the metabolism of MTBE in human livers. Both CYP2A6 and 2E1 are known to be constitutively expressed in human livers. To examine their involvement in MTBE metabolism, human CYP2A6 and 2E1 cDNAs were individually co-expressed with human cytochrome P450 reductase by a baculovirus expression system and the expressed enzymes were used for MTBE metabolism. The turnover number for CYP2A6 and 2E1 was 6.1 and 0.7 nmol TBA/min per nmol P450, respectively. The heterologously expressed human CYP2A6 was also more active than 2E1 in the metabolism of two other gasoline ethers, ethyl tert-butyl ether (ETBE) and tert-amyl methyl ether (TAME). Although the contributions of other human CYP forms to MTBE metabolism remain to be determined, these results strongly suggest that CYP enzymes play an important role in the metabolism of MTBE in human livers.
High
[ 0.6901408450704221, 30.625, 13.75 ]
Risk assessment, formation, and mitigation of dietary acrylamide: current status and future prospects. Acrylamide (AA) was firstly detected in food in 2002, and since then, studies on AA analysis, occurrence, formation, toxicity, risk assessment and mitigation have been extensively carried out, which have greatly advanced understanding of this particular biohazard at both academic and industrial levels. There is considerable variation in the levels of AA in different foods and different brands of the same food; therefore, so far, a general upper limit for AA in food is not available. In addition, the link of dietary AA to human cancer is still under debate, although AA has been known as a potential cause of various toxic effects including carcinogenic effects in experimental animals. Furthermore, the oxidized metabolite of AA, glycidamide (GA), is more toxic than AA. Both AA and GA can form adducts with protein, DNA, and hemoglobin, and some of those adducts can serve as biomarkers for AA exposure; their potential roles in the linking of AA to human cancer, reproductive defects or other diseases, however, are unclear. This review addresses the state-of-the-art understanding of AA, focusing on risk assessment, mechanism of formation and strategies of mitigation in foods. The potential application of omics to AA risk assessment is also discussed.
High
[ 0.6762589928057551, 35.25, 16.875 ]
# Translation of Odoo Server. # This file contains the translation of the following modules: # * google_spreadsheet # # Translators: # Martin Trigaux, 2019 # Marius Stedjan <[email protected]>, 2019 # msgid "" msgstr "" "Project-Id-Version: Odoo Server saas~12.4\n" "Report-Msgid-Bugs-To: \n" "POT-Creation-Date: 2019-08-12 11:32+0000\n" "PO-Revision-Date: 2019-08-26 09:10+0000\n" "Last-Translator: Marius Stedjan <[email protected]>, 2019\n" "Language-Team: Norwegian Bokmål (https://www.transifex.com/odoo/teams/41243/nb/)\n" "MIME-Version: 1.0\n" "Content-Type: text/plain; charset=UTF-8\n" "Content-Transfer-Encoding: \n" "Language: nb\n" "Plural-Forms: nplurals=2; plural=(n != 1);\n" #. module: google_spreadsheet #. openerp-web #: code:addons/google_spreadsheet/static/src/xml/addtospreadsheet.xml:3 #, python-format msgid "Add to Google Spreadsheet" msgstr "Legg til i Google regneark" #. module: google_spreadsheet #: model:ir.model,name:google_spreadsheet.model_res_config_settings msgid "Config Settings" msgstr "Konfigurasjonsinnstillinger" #. module: google_spreadsheet #: model:ir.model,name:google_spreadsheet.model_google_drive_config msgid "Google Drive templates config" msgstr "Maloppsett for Google Drive" #. module: google_spreadsheet #: model_terms:ir.actions.act_window,help:google_spreadsheet.action_ir_attachment_google_spreadsheet_tree #: model:ir.actions.act_window,name:google_spreadsheet.action_ir_attachment_google_spreadsheet_tree #: model:ir.ui.menu,name:google_spreadsheet.menu_reporting_dashboard_google_spreadsheets #: model_terms:ir.ui.view,arch_db:google_spreadsheet.view_ir_attachment_google_spreadsheet_form #: model_terms:ir.ui.view,arch_db:google_spreadsheet.view_ir_attachment_google_spreadsheet_tree msgid "Google Spreadsheets" msgstr "Google regneark" #. module: google_spreadsheet #: model_terms:ir.ui.view,arch_db:google_spreadsheet.view_ir_attachment_google_spreadsheet_form #: model_terms:ir.ui.view,arch_db:google_spreadsheet.view_ir_attachment_google_spreadsheet_tree msgid "Name" msgstr "Navn" #. module: google_spreadsheet #: model_terms:ir.ui.view,arch_db:google_spreadsheet.res_config_settings_view_form msgid "" "Please use the settings of Google Drive\n" " on the left or above." msgstr "" "Vennligst bruk innstillingene for Google Drive\n" " til venstre eller ovenfor." #. module: google_spreadsheet #: model:ir.model.fields,help:google_spreadsheet.field_res_config_settings__google_drive_uri_copy msgid "The URL to generate the authorization code from Google" msgstr "URL for å generere autorisasjonskode fra Google" #. module: google_spreadsheet #: model:ir.model.fields,field_description:google_spreadsheet.field_res_config_settings__google_drive_uri_copy msgid "URI Copy" msgstr ""
Mid
[ 0.5702306079664571, 34, 25.625 ]
It took Ed Charles a long time to get his chance, but he persisted, and made the most of it. Born into segregation and poverty in Daytona Beach, Florida, in 1933, he was inspired by seeing Jackie Robinson in spring training with the Montreal Royals in 1946, a moment dramatized (with some artistic license) in the 2013 movie 42. Signed by the Boston Braves in 1952, Charles didn’t make the major leagues until a decade later with the Kansas City A’s. He played eight years in the bigs, the last three of them with the Mets, earning the nickname “The Glider” for his fluid, economical defense and providing a steadying veteran presence for an upstart team that won the World Series. Before Roger Angell and Vin Scully, Charles was also hailed as “The Poet Laureate of Baseball,” having begun crafting verse while toiling in the minors. When he passed away on Thursday at the age of 84, his New York Times obituary called him “the heart and soul of the Miracle Mets of 1969.” That’s a life well lived. One of nine children in a broken home, Charles could not afford a ticket to see the Dodgers and Royals (their top minor-league affiliate) play at Daytona’s City Island Park, but he watched through a chain-link fence in left field as baseball’s color line begin to crumble. Via Chris Lamb’s Blackout: The Untold Story of Jackie Robinson’s First Spring Training: We watched him play that day and finally believed what we had read in the papers, that one of us was out there on the ball field. When [spring training] was over, we kids followed Jackie as he walked with his teammates down to the train station, and when the train pulled out, we ran down the tracks listening for the sounds as far as we could. And when we finally couldn’t hear it any longer, we ran some more and finally stopped and put our ears to the tracks so we could feel the vibrations of that train carrying Jackie Robinson. We wanted to be a part of him as long as we could. In the movie, the young Charles is depicted receiving an autographed ball from Robinson at the train station, but as Bruce Markusen wrote for The Hardball Times in 2013, that particular moment never happened. Nevertheless, Charles, who dropped out of school after eighth grade and finally returned after going to live with his older sister in St. Petersburg, became the captain of the Gibbs High School baseball team and signed a professional contract in 1952. Though they weren’t as innovative or aggressive as the Dodgers, the Braves (along with the Giants) were well ahead of the curve in integrating the majors. Rickey signed such a surplus of black talent that he dealt outfielder Sam Jethroe to Boston in 1949, and the following year, “Jet” won NL Rookie of the Year, the third of six black NL players to win the award in its first seven years. While the Braves (who moved to Milwaukee in 1953) found room to bring Jethroe, George Crowe (1952 debut), Bill Bruton (1953), Jim Pendleton (1953), Hank Aaron (1954), and Wes Covington (1956) to the majors within a decade of Robinson’s arrival, Charles languished in the minors, first in Quebec but soon enough back in the segregated South, enduring the abuses and indignities that typified that era. A 1954-55 stint in the military interrupted his climb, and having converted from shortstop to second base, he lost out on a big-league job in 1956, when the Braves traded for future Hall of Famer Red Schoendienst. The team succeeded without Charles, winning back-to-back pennants in 1957-58, including a World Series in the former of those two years. Charles, by this time a third baseman, was now blocked by another future Hall of Famer, slugger Eddie Mathews. In 1961, Charles took up writing poetry and, in December of that year, finally caught the break he needed when the Braves traded him to the Kansas City A’s in a five-player deal. The 29-year-old Charles won the third-base job the following spring and hit a robust .288/.356/.454 with 17 homers, 20 steals, and above-average defense at the hot corner. He made the Topps All-Rookie team. And check this out: Certainly, Charles didn’t face the pressure that Robinson or other integration pioneers — including Negro Leagues veterans Easter, Irvin, and Jethroe from that table — did upon reaching the majors, but he rose to his own long-awaited occasion nonetheless. Never mind that the A’s didn’t post anything close to a .500 record or finish above seventh place in a 10-team league during his five full seasons in Kansas City. He proved without a doubt that he could play at the highest level, hitting a combined .268/.337/.406 (105 wRC+) while averaging 11 homers, 12 steals, and 2.8 WAR per year during that run. After a slow start to his 1967 season, the 34-year-old Charles was traded to the Mets on May 10 so that the A’s could make way for 23-year-old Sal Bando at third base. Charles scuffled that year, but he rebounded to hit .276/.328/.434 with 15 homers in just 117 games in 1968, good for a 130 wRC+ in “The Year of the Pitcher.” Both that mark and his 3.6 WAR ranked second on the Mets, who improved from 61-101 in 1967 to set a franchise record with 73 wins (against 89 losses) in 1968. Rookie pitcher Jerry Koosman bestowed his nickname that year, after a particularly impressive diving stab. As Charles recounted in 2009, the 25-year-old southpaw walked off the mound over to his position. “He was sort of flabbergasted that I’d made the play. He said, ‘You sort of glide to the ball. That’s it. You’re The Glider from now on.'” Though Charles hit just .207/.286/.320 with three home runs in 61 games in 1969, two of those homers came off future Hall of Famers Gaylord Perry and Steve Carlton. While he lost his regular job to rookie Wayne Garrett, he settled into a platoon and served the team’s elder statesman, nearly a decade older than any member of their starting lineup. And while he only drove in 18 runs that season, five gave the team the lead. The Mets won 100 games that year, overcoming what was a 10-game deficit behind the Cubs on August 13, finally overtaking them on September 10 as part of a 24-7 season-ending run. Charles sat during the inaugural NLCS against the Braves but started four of the five World Series games against the powerful Orioles, all against southpaws Mike Cuellar and Dave McNally. He went 2 for 4 against McNally in Game Two, with a seventh-inning double and a two-out ninth-inning single, coming around to score the go-ahead run. The Mets, who had lost Game One, never looked back. Fittingly, Charles was on the mound behind Koosman when the team recorded the final out to clinch its miraculous championship, photographed beaming and jumping into the air upon reaching the mound. Charles never played in the majors again. The Mets released him after the 1969 season, and he became a promoter for Buddah Records, who had put out an album celebrating the team’s World Series win but specialized in bubblegum acts such as the 1910 Fruitgum Company. In 1972, he crossed paths with Robinson while both men filled out paperwork at New York’s Small Business Administration. Via Maruksen, the nervous Charles approached Robinson, thanking him for his pioneering efforts. Robinson smiled, saying, “You’re welcome. That means a lot to me.” After a stint as an entrepreneur, Charles became a Midwestern scout for the Mets, notably finding Neil Allen, their future closer, and coached their Rookie-level Kingsport (Tenn.) affiliate from 1983 to -85. After passing the Civil Service test in 1985, he worked 60-hour weeks at a Bronx intake house run by the New York City Department of Juvenile Justice, performing a kind of triage on troubled and disadvantaged youths. “I never tell them I played baseball,” he said in 2000. “But most of them find out and the question they ask most is, ‘Why are you here?’ I tell them, ‘I’m here because you’re here.’” In 1997, Charles participated in some of the many events surrounding the 50th anniversary of Robinson’s debut. At a Long Island symposium, he read a poem that he’d written after Robinson passed away in 1973. Yes, he made his mark for all to see As he struggled determinately for dignity. And the world is grateful for the legacy That he left for all humanity. Ed Charles left his own mark, a legacy for which we should be grateful.
Mid
[ 0.6553398058252421, 33.75, 17.75 ]
[Problems of randomized controlled study on surgical adjuvant chemotherapy for colorectal cancer in Japan]. There were many clinical trials to evaluate the significance of surgical adjuvant chemotherapy for colorectal cancer, but large-scale randomized controlled study was limited in Japan. From results of these trials, the effectiveness of adjuvant chemotherapy for colorectal cancer remained controversial. In this paper, I described the outline and summarized results of recent randomized controlled study carried out by Japan Cancer Chemotherapy Study Group for Colorectal Carcinoma and discussed various problems (case registration, ineligible cases, statistical method, follow up) of this study.
High
[ 0.701468189233278, 26.875, 11.4375 ]
Q: Ways to leverage single code base between Windows Service and Azure WebJob I'm working on a timed recurring process that in some cases will be deployed OnPrem and in other cases deployed in the cloud (Azure). I'm researching a Windows Service and an Azure WebJob. Given that I only need the recurring process to be the timed piece, I'm thinking about having the bulk of the logic in a library with just the entry points being different between the Windows Service for the local deployment or a WebJob when deploying to Azure. Each csproj (service and WebJob) would handle only the timed loop and configuration settings then call into the library for the bulk of the work. My question is: Is there another design combination available to me that would fulfill these requirements potentially in a better way? I've read about wrapping an existing windows service in a WebJob, but I don't think that would be necessary in this case given I'm starting from scratch. A: When it comes to keeping your common code up to date, and knowing which versions are used by which applications, bets solution is to create a class library project with respected design pattern and convert it into a nuget project. you know you can host your own private NuGet repository, create your own packages, and host them internally within your own network. Here is a very nice article for"How to create Nuget package out of your class library project". You can utilize it and share it across all your code. And finally you can just callit from your windows service/WebJob. Let me know if you need any help related to designing the solution. Hope it helps.
High
[ 0.6666666666666661, 30.875, 15.4375 ]
There are plenty of blockchain projects that rose in 2017 and more are coming out every day. Question is why should you pay any attention to any of the projects and especially to the Historia. This is why in this post we want to share a summary of why we believe Historia stands out in the landscape. Take a look at these 5 reasons why Historia might be the next best project to support. Each of these reasons can serve as a great starting point helping you understand the key values of Historia. 1- We’re Bringing a Powerful Revolutionary Product Historia disrupts, as cliche as it sounds, the history market. And if you think there is no history market than the way the history is recorded and kept. Opening the possibility to everyone become the historian, the keeper of records of our history. Historia is a blockchain-based database focused on preserving the original account of history. Our aim is to incentivize the contribution of accurate historical events that will be reviewed by a diverse, globally distributed pool of voters. Historia decentralizes the recording of history from the few to the many, providing a change log to history and a platform to combat censorship and bias. 2- Historia token can be bought using a currency of your choice Our mission at Historia is to revolutionize the way we record and keep history by ensuring that it is recorded as it happened without any adjustments by the third party. To help us achieve that is by giving the users greater options when trying to acquire Historia coin. That is why our coin will be listed on the exchange providing the most pairs with other currencies. 3- Historia Opens the possibility to take an active stance in the History Historically, history has been always written by the winners and a small group at that. Because of that, we have current history that is riddled with holes and inaccuracies. Which allows people to twist it the way they want it to meet their own needs. With Historia this becomes impossible. Thanks to blockchain technology people from all over the world will be able to actively record and preserve historical facts as they happen, the way they happened. For future generations. 4- Already in Beta version Historia network already has a running blockchain for mining purposes and a beta version for users to test out the system and find bugs. An updated version will be released in 2019. 5- History isn’t going anywhere Historia is a blockchain based technology for ensuring accurate historical facts are protected from perversion by employing a governance and voting system combined with an immutable file storage system. Playing off the idea of “wisdom of the masses” and combining a governance and voting layer with immutable file storage system will allow for the recording of current events or future history to be as accurately recorded as possible. 6- Our coin use are clear Our coin is built around the Historia community. Historia coin acts as an incentive for the editors, miners and masternode owners for helping the Historia stay active. In short, it is a monetary reward for the work the community members do. Please do not forget to visit, join, follow, and like us on: Historia Website Historia Twitter Historia Discord Historia Reddit Historia on Github Historia is a community project. The influence of any one superpower does not endure in Historia. The project is for the greater good of the global community with allegiance to no one except the everlasting truth of how it actually happened. If you would like to be a part Historia discussion, join us on Discord and let us know your thoughts. All spectrum of opinions and facts wanted, come all. Originally published at blog.historia.network on January 11, 2019.
High
[ 0.668257756563245, 35, 17.375 ]
Anarita Chorio is set in the heart of the Cypriot countryside in the traditional village of Anarita. The development comprises fifty-six modern 2-bedroom houses and twenty eight 1, 2, and 3-bedroom spacious apartments set around 3 large outdoor pools amidst beautifully landscaped grounds. Homes encompass functional designs with large open-plan living spaces, and generous verandas. Houses and ground floor apartments enjoy private gardens and many properties feature en-suite bathrooms. Traditional Cypriot arches and gently sloping terracotta roofs lend a Mediterranean feel to the development. The grounds incorporate large leisure areas, including 3 outdoor pools and an extensive green area. Anarita Chorio is close to the village centre and only a short drive to both Pafos and Limassol.
High
[ 0.6766304347826081, 31.125, 14.875 ]
710-CS6075X2 Most orders ship within 3-5 business days. Due to a high volume of back order from the manufacturer, some orders may be delayed by about 1 week. If an additional delay occurs, we will contact you as quickly as possible. Product Description This item is being discontinued. Once we are out of inventory, this item will no longer be availaible. Cutting material perfectly square is one thing, getting that to show up in the finished product after assembly is quite another. Over the centuries, woodworkers have devised countless methods for getting the box, drawer or cabinet perfectly square while it's nailed, screwed, glued or all of the above. In the end, nothing any more complicated then something square to clamp the material against is all that's needed. So in an interest to offer woodworkers a strong, solid, accurate solution, Woodpeckers decided to machine these solid aluminum clamping squares. Each square is carefully machined, not molded, stamped or bent, into a thick, wide, square. All edges are chamfered, all surfaced buffed, and the whole thing anodized to prevent staining interaction with glue. Of course there's always cheaper ways to make anything, but that's not what Woodpeckers is about. To make it even more useful, four counter bored holes are strategically located for fixturing. What that means is you can temporarily, or permanently, attach this clamping square to your bench top or other material to further aid in project assembly, especially when you're working by yourself. They'll not only work inside a box, under or over a shelf but also around the outside corner. These Precision Clamping Squares are guaranteed to be flat, square and true, or we'll gladly replace them. Give them a try, you'll be surprised just how much better and easier your projects come together. Warranty Information Manufacturer's Warranty and our own 100% satisfaction guarantee. We will replace or refund immediately if you are unhappy with any purchase from us for any reason at any time. We will do all we can to help you with any problem you have. Most manufacturers will only replace a defective tool and they have to decide what defective means.
High
[ 0.670050761421319, 33, 16.25 ]
Sign me up for news alerts One of the the biggest trampolining arenas in Kent is taking shape and on course to open this spring. Ashford entrepreneurs Lisa and Steve Wootton have invested around £1.5 million to bring Flip Out to life. Builders have been busy transforming the 28,000 sq ft former packaging factory on the Henwood Industrial Estate into a trampoline park. Meanwhile new general manager Jason King has been appointed and is now looking to fill up to 60 vacancies at the park, including reception and café staff, and safety crew. Steve and Lisa Wootton with new General Manager Jason King Mr King, from Ashford, said: "I’m thrilled to be part of a business which is sweeping the country. "We’ve already had people contact us about job vacancies, and details of a recruitment open day will soon be announced on our Facebook page. "I’m so excited by the Flip Out park itself. The design concept and what will be on offer is simply superb so as we build towards our opening I’d urge everyone to keep an eye out for more details of our launch. "Flip Out Ashford will be something quite spectacular!” The centre is under construction The trampoline park will feature dozens of connected trampolines, stunt boxes, wall runners, slam dunks, dodgeball, a Ninja warriors course and more. There will also be a programme of regular fitness classes - Flip Fit - which belnds trampolining, parkour and gymnastics. The centre has four private rooms for hire, a cafe and free parking. Mrs Wootton, said: "Trampolining is taking a growing share of the family entertainment sector across the UK. One of the biggest trampolining arenas in Kent is opening in Ashford next month "It’s not difficult to see why it’s so popular – it’s fun, healthy entertainment not just for kids but for the whole family. "It’s also perfect for couples, groups, and companies looking for a team-building experience with a difference. "Since we announced our intention to develop a Flip Out arena in Ashford we have been overwhelmed by the positive reaction to the news. "We’ve been inundated with requests on how to book and there’s a real sense of growing anticipation."
Mid
[ 0.626506024096385, 32.5, 19.375 ]
RICHMOND, Va. – After trying to conceive for 17 years, a Nigerian couple welcomed sextuplets into the world at VCU Medical Center earlier this month. Three girls and three boys were successfully delivered at the hospital for the first time ever on the morning on May 11. Ajibola Taiwo was 30 weeks and two days pregnant when she gave birth by cesarean section with the help of a 40-person team. The babies ranged in weight from 1 pound, 10 ounces to 2 pounds, 15 ounces. The couple learned they were pregnant with four babies in November. It wasn’t until they arrived in Richmond at VCU Medical Center that they learned they were expecting sextuplets. The father, Adeboye Taiwo, says the moment was a long time in the making, 17 years to be exact. “I was excited,” said Adeboye. “For the very first time we were expecting.” The pregnancy was extremely rare as there were only 24 quintuplets or other higher order births in 2015, according of the Centers for Disease Control and Prevention. That is out of nearly 4 million live births in the United States. “We’re going through this extraordinary journey together with the family,” said Ronald Ramus, M.D., director of the Division of Maternal-Fetal Medicine at VCU Medical Center. “It’s not every day that parents bring home sextuplets. Mrs. Taiwo was eating, sleeping and breathing for seven. A lot of the support and encouragement we gave her to make it as far as she did was important, and one of the biggest contributions we made as a team.” The hospital says the sextuplets are doing well and are thriving in the Children’s Hospital of Richmond at VCU neonatal intensive care unit. Ajibola Taiwo was discharged from the hospital May 18. “The medical team is excellent in medicine and hospitality,” said Adeboye. “We are far from home but the medical team is our family. That is what got us this far.” To read the full story about the Taiwo family click here.
Mid
[ 0.623430962343096, 37.25, 22.5 ]
As you read Kevin’s thought-provoking and inspiring answers to these Lead Positive Profile questions, reflect on your own signature moments, best mentors, and limiting beliefs. Let Kevin’s personal insights be an invitation for you to gain new insights into what shaped you as the leader you are today. Note: This is part one of Kevin Cashman’s Lead Positive profile. Click here to read part two in which Kevin discusses how a business partnership fueled his emotional development and how he learned to trust in his talents and abilities. 1. What were three signature moments in your life that have shaped and strengthened your leadership assets? You talk about signature presence; our term is "core purpose." It's this intersection of your unique talents, values, service and contributions. So these are some of the moments that honed my core purpose. The Red Thing Growing up, in our basement was something called the Red Thing. The Red Thing was this very high wooden bench that happened to be located directly across from where my mother would iron clothes. All of us kids wanted time on the Red Thing, but it wasn't about the Red Thing. What we wanted to do was spend time with our mother because she was an amazing coach, consultant, and facilitator. We always wanted her to give us an answer. Occasionally she would, but more often she taught us how to think, how to reflect, how to build awareness, and how to look at different sides of something. I wasn't even aware of what she was doing—I was only aware of the benefits of it. I didn't realize that she was teaching me a process, and I don't even think she intended to, but she had this incredible ability to use questions to make you look at all sides of something, to help you get really clear about what you're about and what you were going to do. I didn't connect this until recently. She was my first and maybe best coach, and she helped me grow, but little did I know she taught me how to use questions to impact transformation and to help grow self-awareness, grow purpose, grow meaning, grow different ways to look at yourselves and situations. It was only last month that I was in the middle of doing a keynote and somebody asked, "Who were some of your influences?" and I mentioned my mother and the Red Thing. I'd never told that story until last month. Balancing autonomy and intimacy Now, let me give you a darker one. The image is I'm in bed by myself. It's the middle of the night and my parents are fighting—not physically fighting but verbally fighting. I’ve been up many nights going, "I hope they get through this. I hope we survive. I hope we get through it." This experience instilled two really deep conversations within me that I think have been really important for the work that we do. One is the conversation about autonomy: “I'm going to create my own life and my own happiness, and I'm not going to be in a situation like that." The experience of my parents fighting gave me a deep sense of wanting to create something different. It also made me think about the upsides and downsides of autonomy. I felt the drive to protect myself and to be autonomous and to be above the pain of relationships, all of which I had to work through. But there are also all sorts of upsides to being an entrepreneur and a thought leader and an author. Autonomy and inner reflection have big upsides. The other thing that I had to work through, and probably on one level still am, is this deep sense that relationships equal pain, and the deeper the relationship, like marriage, the more pain. That was the experience that I saw. It's not the full experience, but it was my experience; this deep sense of not wanting that kind of intimacy because of the pain that it represented. I had to learn when autonomy serves and when intimacy serves and how to use those muscles not as coping mechanisms to avoid pain but as instruments. I had to learn how to appropriately create through autonomy and autonomous ideas but also how to stay connected in relationships. Earlier in my career it was more about my autonomy, my achievement. I was an entrepreneur. I built this consulting business and it was successful but that meant I then had to build community and a team and that's not why I got into it. I got into it to make a difference in people's lives and to be free and autonomous. Then suddenly I had this big group of people that I needed to motivate and inspire and develop. So I had to learn in my business how these two drives, autonomy and intimacy, how they work together because they can be in conflict. You need the autonomy to create and not be too worried about what people think, because if you're too worried you won't create. Then you have to lead and have that autonomous impulse yet stay connected and stay intimate in business and also in life. So that was a key deep thing that I feel like I've worked through— how to balance deep connection and deep autonomy and independence—but it's probably still influencing things. My work is about helping people understand the pain and pleasure in their life stories and how to extract values and talents and make a bigger difference. It's very difficult to help others do that unless you've done a good measure of your own work there. So I think on another level my work pushed me into figuring things out a bit on my own, which turned out to be a good thing later in life. Time with a great teacher This third one I wrote about in Leadership from the Inside Out in the Being Mastery chapter. I had the good fortune to learn lots of ways to meditate and I did lots of different forms before I finally settled on TM, transcendental meditation. That just clicked for me. I ended up studying with the founder of TM, Maharishi, for about a year. I was a senior in college and I went to Spain and spent four months with Maharishi and a group of people. I meditated for almost two months, twelve hours a day. Deep, deep meditation. I thought, ‘Oh my God, I'm getting so deeply relaxed here. I've never been in this space before.’ My pulse was 42 when I was awake so you can imagine how quiet it was in the depths of meditation. Everything slowed down to an unbelievable pace. I would spend the nights with Maharishi and he would answer any question you could think about: spirituality, life, anything, any topic. You'd hear people's questions and you'd hear this great teacher deal with them and it was pure magic. It was just pure magic. That was the most transformative time of my life, the depth of the experience with and the breadth of knowledge from an incredible teacher. I came back and life looked different. College looked different. Everything looked different. That was the grounding of a deep, genuine transformation, a fundamental shift that changed my life. Kevin Cashman is senior partner at Korn Ferry, specializing in CEO & Executive Development and Keynote Speaking. He is the founder of the Executive to Leader Institute and Chief Executive Institute, referred to as the “Mayo Clinic” of executive development by Fast Company, and now offered at six locations globally. He also founded LeaderSource, recognized as one of the top three leadership development programs globally. Follow Kevin on Twitter@kevin_cashman. Dr. Kathy Cramer has written seven best-selling books including Change The Way You See Everything, which started the ABT Global Movement. Her latest book, Lead Positive shows leaders how to increase their effectiveness through her revolutionary yet refreshing simple mindset management process, Asset-Based Thinking. Download her Speaker Kit here.
Mid
[ 0.64203233256351, 34.75, 19.375 ]
Assessment of the need for care 15 years after onset of a Dutch cohort of patients with schizophrenia, and an international comparison. Assessment of needs for care is crucial in the evaluation of ongoing changes from institutional care to various forms of day- and outpatient treatment. Do patients really do better in the community and are they adequately cared for? The 15-year follow-up of a Dutch incidence cohort of patients with schizophrenia and other functional non-affective psychoses showed that 47 (out of 63) patients had positive ratings of symptoms and disabilities. They were assessed by means of the Needs for Care Assessment Schedule, which articulates the problems and corresponding interventions resulting in a judgement of met or unmet need for treatment or assessment. There was a mean of 2.1 clinical problems and 2.1 social problems per patient. Few problems were considered to generate unmet needs: 14% of the clinical problems and only 7% of the social problems. Nevertheless, 32% of the patients had one or more unmet needs. These results were compared with data from six research centres in the United Kingdom (Camberwell, Oxford and South Glamorgan), Canada (Montreal), Italy (Verona) and Finland (Tampere). Despite differences in health care settings in the four countries, the ratio of met to unmet needs (about 4-5 to 1) among chronic, mostly schizophrenic patients is more or less the same with the exception of an apparently underserved hostel population in Oxford and the Finnish patient population probably due to high expectations with respect to independent community living.
Mid
[ 0.644859813084112, 34.5, 19 ]
Coup de la Glotte Intending to encapsulate and codify the technique and style of the singers of the first forty years of the nineteenth century, Manuel Garcia based much of his ‘Treatise on the Art of Singing’ on the practice of his sister and his illustrious father. Within the previous decade both had died unexpectedly and early; his father, Manuel Vicente del Popolo Garcia, at 57 in 1832, and Maria Malibran, his sister, at the unbelievably early age of 28, in 1836. Garcia’s treatise rested on the teachings and method of his father, the teacher of both his son and daughter and whose youngest child, who was later to become Pauline Viardot-Garcia, had already started to play for his lessons by the age of eleven. From this small family came one of the most celebrated of all Rossini tenors – Manuel Garcia the elder; his son, the most influential teacher of all; and two of the century’s most illustrious singers – Malibran and Viardot-Garcia. Garcia senior had trained in Spain and later had studied with Giovanni Anzani, a famous bel canto tenor of the previous generation. So the precepts of the previous century, dominated by the castrati, flowed from his studio. All of the children were taught composition as well as singing, and both daughters followed their father in becoming composers themselves. Manuel Garcia, the younger, seems to have used his compositional talents to write vocal exercises and their accompaniments in his treatise. Part I describes the practice and techniques to become a good singer of the period and Part II, the style and use of the technique in performance. His work was based largely on his father’s and sister’s careers and that of their colleagues and contemporaries during the age of Rossini – the period which has become known as the Age of Bel Canto. Garcia’s attention to detail included not only breathing and other technical essentials, but also a description of the absolute beginning of the sound, known in Italian as attacco and in German as Ansatz. As he wrote in French, the initiation of the sound came out as the coup de la glotte – ‘shock of the glottis’. Poor Garcia! He can never have imagined the trouble and confusion this innocent phrase was to cause him for the rest of his days. During the last two decades of his long life, the vogue among voice teachers turned away from the bel canto precepts on which he had been brought up, and veered towards the new, but mistaken, concept of breath pressure theory. This determined that the vocal cords were activated only by a direct air blast from the lungs. In contrast, the ‘bel cantoists’ held that the tone was started by breath already controlled by the so-called ‘vocal struggle’ – la lotta vocale: the expiratory muscles being opposed by the inspiratory, thus allowing the breath flow at the chords to be controlled from the softest and most gentle tone to the strongest and loudest. Thus, the vocal cords never had to withstand forced air from below and therefore were always capable of vibrating freely and without strain. Because of the breath pressure theories – which continue up to the present day, alas – means were sought to take the strain away from the cords which such a strong air blast placed on them. So the tone was aimed as far away from them as possible: ‘in the ‘masque’; forward; behind the upper teeth; in the sinuses behind the nose; behind the eyes; on to the hard palate; anywhere, provided it was away from the larynx. The fact that vocal tone is generated entirely by the vibrating cords and the resultant sound resonating in the pharynx, was either ignored or disbelieved. The speed of sound (323 mps) was not taken into consideration at all, and the impossibility of aiming sound travelling at such a speed within an instrument only a few inches long was not contemplated. From this time, Garcia’s phrase, coup de la glotte, began to acquire sinister overtones which distorted and quickly anathematized the original meaning. A major element in this was a misunderstanding of the nuances of the French language, as Garcia’s treatise reached English speaking audiences. Coup literally means ‘shock’, ‘blow’, ‘knock’ in English, and is combined with genitive nouns for varied, specialised meanings. For example: coup de bec – peck; coup de tête – head butt; coup de poing – punch; coup de pied – kick; coup de coude – blow with the elbow or nudge; coup d’épée’ – sword thrust; and also more figurative meanings such as: coup de sifflet – whistle blast; coup de téléphone – telephone call; and coup de foudre – thunderbolt. As is clear from these latter phrases, the underlying meaning of coup is ‘an instantaneous action’, not an act of force or violence. Looked at from this semantic point of view, therefore, the phrase coup de la glotte does not necessarily presuppose a forceful action, but rather a sudden, clean start at the glottis. Garcia, of course, raised and educated vocally as he was, could never have contemplated anything else. In the century and a half which separates us from Garcia’s treatise, there has been much confusion and muddle as various theories have flared up and vanished, but during much of this time one enduring warning light has shone out – that the coup de la glotte is dangerous. It has been equated with a violent, unprotected blast of air at the cords, commonly known as the hard attack. However, logic would imply that if the breath is always controlled at the cords, then a hard unprotected attack is impossible. This is certainly what Garcia believed and a close reading of his section on the ‘Articulation of the Glottis’ shows this to be so. Without a clean start, either piano or forte, no word beginning with a vowel can commence. All vowels must have a precise start, he states. He is scathing on the practice of beginning vocal exercises with a consonant – la, ma, na, pa, etc. and explains that such practices disguise faulty articulation of the glottis. He is equally painstaking and forthright on the physical separation of vowels and consonants in Italian – the one emanating from the throat and the other located wholly in the mouth. In retrospect, it is easy to see how Garcia’s phrase became misunderstood and misinterpreted as the world changed during his 101 years. A fatal mixture of new ideas and careless translation caused his phrase, straightforward to a Frenchman, to be disbelieved, rejected, and later in the twentieth century, even reviled. Many generations of singers have been taught to recoil from the infamous ‘hard attack’ in horror. Their teachers seem never to have gone to the source and checked on Garcia’s words and meaning; thus confusion on this subject has gone on for over a century. Teachers and singers in every generation have been aware of the eighteenth century concept of the clean attack of the sound as an essential element in good vocal technique; and yet most have accepted that the coup de la glotte is something to beware of. Few have gone to the trouble to find out that his use of the phrase was a genuine attempt to describe the result that everyone seeks: a precise and exact onset so that the voice speaks immediately, without tension, violence or fuss. The need for such a start is paramount. One should never forget Garcia’s other memorable phrase – ‘Once the vocal cords become vibratile, all control over them is lost’. If the start of the sound is wrong or unhealthy, so is everything that follows.
High
[ 0.6568627450980391, 33.5, 17.5 ]
[Results of a double-blind study on the effectiveness of ERU (extractum radicis Urticae) capsules in conservative treatment of benign prostatic hyperplasia]. In 50 patients with prostatic hyperplasia the effect on symptomatology and objective findings of ERU-capsules versus placebo was investigated in a double-blind study over a 9 week treatment period. Admitted to the study were patients in phases I and II who had been referred to the clinic in order to evaluate up the indication for operation. Concerning subjective complaints there was an improvement in dysuric symptoms in both patient groups. The evaluation of the objective parameters showed significant differencies. There was a statistically highly significant (p = 0.0005) decrease of the sex hormone binding globulin in the group of patients treated with ERU as well as a significant improvement of the micturition volume and maximum urinary flow. The improvement of the average flow in the ERU group was not significant. The increase of residual urine volume in both groups seems not to be significant according to the Covariance-analysis and is difficult to interpret. It is assumed, that, up to a certain grade, for a selected group of patients, mainly in the phase of beginning decompensation, length and dosage of therapy were possibly not sufficiently adjusted.
Mid
[ 0.652892561983471, 29.625, 15.75 ]
Effect of an ac Perturbation on the Electroosmotic Behavior of a Cation-Exchange Membrane. Influence of the Cation Nature. The effect of an ac sinusoidal perturbation of known amplitude and frequency superimposed on the usual dc applied electric voltage difference on the electroosmotic flow through a typical cation-exchange membrane has been studied using different monovalent electrolytes. As a general trend, the presence of the ac perturbation increases the value of the electroosmotic flow with respect to the value in the absence of ac perturbation. A dispersion of the electroosmotic permeability on the frequency of the applied ac signal has been found for the three studied electrolytes, observing that the electroosmotic permeability reaches maximum values for some characteristic values of the frequency. This behavior may be related to the different relaxation processes in heterogeneous mediums. Copyright 2001 Academic Press.
Mid
[ 0.6431924882629101, 34.25, 19 ]
import {NodeObj, Doc} from './types'; import {Diff} from './diff'; function routeToNode(doc: Doc, route: Array<number>) { let ref: Node = doc; route.forEach(i => { ref = ref.childNodes[i]; }); return ref; } function serializeTextNodeObj(nodeObj: NodeObj): string { return nodeObj.data as string; } function serializeCommentNodeObj(nodeObj: NodeObj): string { return `<!--${nodeObj.data}-->`; } function serializeElementNodeObj(nodeObj: NodeObj): string { if (typeof nodeObj.attributes === 'undefined') { nodeObj.attributes = {}; } if (typeof nodeObj.childNodes === 'undefined') { nodeObj.childNodes = []; } const tagName = nodeObj.nodeName.toLowerCase(); const attrs = Object.keys(nodeObj.attributes) .map(name => `${name}="${(nodeObj.attributes as any)[name]}"`); const head = [tagName].concat(attrs).join(' '); const children = nodeObj.childNodes.map(serializeNodeObj).join(''); return `<${head}>${children}</${tagName}>`; } function serializeNodeObj(nodeObj: NodeObj): string { if (nodeObj.nodeName === '#text') { return serializeTextNodeObj(nodeObj); } else if (nodeObj.nodeName === '#comment') { return serializeCommentNodeObj(nodeObj); } else if (nodeObj.nodeName[0] !== '#') { return serializeElementNodeObj(nodeObj); } else { return `serializeNodeObj(${JSON.stringify(nodeObj)})`; } } function mdHTML(html: string): string { return '```html\n' + html + '\n```'; } function renderMismatch(diff: Diff, actualDoc: Doc, expectedDoc: Doc): string { if (diff.action === 'addElement') { const snippet = mdHTML(serializeNodeObj(diff.element)); return `HTML has an unexpected element\n${snippet}`; } else if (diff.action === 'removeElement') { const snippet = mdHTML(serializeNodeObj(diff.element)); return `HTML is missing the expected element\n${snippet}`; } else if (diff.action === 'removeAttribute') { const node = routeToNode(actualDoc, diff.route) || '???'; const attr = `${diff.name}="${diff.value}"`; const snippet = mdHTML((node as HTMLElement).outerHTML || node.toString()); return `HTML is missing the attribute \`${attr}\` on the element\n${snippet}`; } else if (diff.action === 'replaceElement') { const eSnippet = mdHTML(serializeNodeObj(diff.oldValue)); const aSnippept = mdHTML(serializeNodeObj(diff.newValue)); return `HTML expected element\n${eSnippet}\nbut got element\n${aSnippept}`; } else if (diff.action === 'modifyAttribute') { const node = routeToNode(expectedDoc, diff.route) || '???'; const htmlSnippet = mdHTML((node as HTMLElement).outerHTML || node.toString()); const eSnippet = diff.oldValue; const aSnippet = diff.newValue; return `HTML mismatch on attribute \`${diff.name}\` in element\n${htmlSnippet}\n` + `Expected\n${eSnippet}\nbut got\n${aSnippet}`; } else if (diff.action === 'addTextElement') { return `HTML has an unexpected text\n${diff.value}`; } else if (diff.action === 'removeTextElement') { return `HTML is missing the expected text\n${diff.value}`; } else if (diff.action === 'modifyTextElement') { const eSnippet = diff.oldValue; const aSnippet = diff.newValue; return `HTML text mismatch. Expected\n${eSnippet}\nbut got\n${aSnippet}`; } else { return `renderMismatch(${JSON.stringify(diff)})`; } } export function reportMismatches(diffs: Array<Diff>, actualDoc: Doc, expectedDoc: Doc): void { const msg = diffs .map(d => renderMismatch(d, actualDoc, expectedDoc)) .join('\n\n'); throw new Error(msg); }
Low
[ 0.529545454545454, 29.125, 25.875 ]
Ginger (Zingiber officinale) as an Analgesic and Ergogenic Aid in Sport: A Systemic Review. Ginger is a popular spice used to treat a variety of maladies, including pain. Nonsteroidal anti-inflammatory drugs (NSAIDs) are frequently used by athletes to manage and prevent pain; unfortunately, NSAIDs contribute to substantial adverse effects, including gastrointestinal (GI) dysfunction, exercise-induced bronchoconstriction, hyponatremia, impairment of connective tissue remodeling, endurance competition withdrawal, and cardiovascular disease. Ginger, however, may act as a promoter of GI integrity and as a bronchodilator. Given these potentially positive effects of ginger, a systematic review of randomized trials was performed to assess the evidence for ginger as an analgesic and ergogenic aid for exercise training and sport. Among 7 studies examining ginger as an analgesic, the evidence indicates that roughly 2 g·d(-1) of ginger may modestly reduce muscle pain stemming from eccentric resistance exercise and prolonged running, particularly if taken for a minimum of 5 days. Among 9 studies examining ginger as an ergogenic aid, no discernable effects on body composition, metabolic rate, oxygen consumption, isometric force generation, or perceived exertion were observed. Limited data suggest that ginger may accelerate recovery of maximal strength after eccentric resistance exercise and reduce the inflammatory response to cardiorespiratory exercise. Major limitations to the research include the use of untrained individuals, insufficient reporting on adverse events, and no direct comparisons with NSAID ingestion. While ginger taken over 1-2 weeks may reduce pain from eccentric resistance exercise and prolonged running, more research is needed to evaluate its safety and efficacy as an analgesic for a wide range of athletic endeavors.
High
[ 0.679438058748403, 33.25, 15.6875 ]
In the United States Court of Appeals For the Seventh Circuit ____________ No. 03-1105 UNITED STATES OF AMERICA, Plaintiff-Appellee, v. GREGORY R. DANIELS and SUSAN V. DANIELS, Defendants-Appellants. ____________ Appeal from the United States District Court for the Eastern District of Wisconsin. No. 00 CR 186—Rudolph T. Randa, Chief Judge. ____________ ARGUED SEPTEMBER 10, 2004—DECIDED OCTOBER 27, 2004 ____________ Before FLAUM, Chief Judge, and POSNER and ROVNER Circuit Judges. FLAUM, Chief Judge. Defendant-appellant Gregory Daniels is a chiropractor who operated his own practice, Daniels Chiropractic. His wife, co-defendant-appellant Susan Daniels, served as the clinic’s manager. Together they were charged with two counts of income tax evasion in violation of 26 U.S.C. § 7201. Following a jury trial, defendants were convicted on both counts. They now appeal their convictions and sentences. For the reasons stated herein, we affirm. 2 No. 03-1105 I. Background On September 26, 2000, a federal grand jury returned a two-count indictment against Gregory and Susan Daniels. Count I charged that on or about April 15, 1994, defendants filed a fraudulent joint federal income tax return for the year 1993 in violation of 26 U.S.C. § 7201. Count II charged that on or about April 15, 1995, defendants filed a fraudu- lent joint federal income tax return for the year 1994 in violation of 26 U.S.C. § 7201. Defendants moved to dismiss both counts on the ground that the indictment failed to allege that the tax deficiency due for the years in question was substantial. Defendants also moved to dismiss Count I as barred by the six-year statute of limitations set forth in 26 U.S.C. § 6531(3). After briefing by both parties, on February 12, 2001, the magistrate judge recommended that the district court: (i) deny defendants’ motion to dismiss the indictment for fail- ure to allege an essential element of the offense; and (ii) dis- miss Count I because the indictment was returned more than six years after April 15, 1994, the date of the alleged offense. The next day, February 13, 2001, the government filed a superseding indictment, which changed the dates of the alleged fraudulent filings to October 15, 1994 in Count I, and August 15, 1995 in Count II. Other than these date changes, the superseding indictment was identical to the original. On March 8, 2001, the district court denied defendants’ motion to dismiss the original indictment. The district court adopted the report of the magistrate judge with respect to the substantiality requirement, stating: “The Court thinks, as did the Magistrate Judge, that Sansone v. United States, 380 U.S. 343 (1965) trumps the Seventh Circuit authority submitted by the defendant on the question of whether the indictment must relate a ‘substantial’ tax deficiency to sur- No. 03-1105 3 vive.” (R. at 30.) The district court also found the motion to dismiss Count I of the indictment on statute of limitations grounds moot in light of the superseding indictment. (Id.) Defendants then moved to dismiss Count I of the super- seding indictment, contending that it materially amended the initial charges, and therefore did not relate back to the filing date of the original indictment. On May 25, 2001, the district court adopted the magistrate’s recommendation de- nying the defendant’s motion to dismiss. The district court reasoned: [T]he Superseding Indictment does not materially amend the initial charges because there were no substantive changes to the allegations. The charges are exactly the same. Defendants are alleged in both indictments to have filed a fraudulent tax return for the tax year 1993. Only the date on which they allegedly did this is different. In other words, the Daniels, who were obligated to file a tax return in 1994 for 1993, are alleged to have fraudu- lently done so in October of 1994, instead of April of 1994. This cannot be said to be a material broadening or sub- stantial amendment of the charges in the original Indict- ment. The Superseding Indictment therefore relates back to the original indictment bringing the charges within the statute of limitations. (R. at 43.) The case proceeded to trial, and resulted in a mistrial. Following a second trial, defendants were convicted on both counts. Gregory Daniels was sentenced to 15 months im- prisonment on each of Counts I and II, both terms to run concurrently, and three years of supervised release, and ordered to pay $13,014.15 in restitution, along with a $200 special assessment. Susan Daniels also was sentenced to serve 15 months imprisonment on each of Counts I and II, both terms to run concurrently, upon the completion of her husband’s incarceration. She was also ordered to pay 4 No. 03-1105 $13,014.15 in restitution, for which she would be jointly and severally liable with her husband, and a $200 special assessment. Defendants now appeal their convictions and sentences. II. Discussion A. Substantiality We review defendants’ challenge to the sufficiency of the indictment de novo. United States v. Sandoval, 347 F.3d 627, 633 (7th Cir. 2003). The tax evasion statute provides: “Any person who willfully attempts in any manner to evade or defeat any tax imposed by this title or the payment thereof shall . . . be guilty of a felony. . . .” 26 U.S.C. § 7201. As the Supreme Court set forth in Sansone v. United States: “[T]he elements of § 7201 are will-fullness; the existence of a tax deficiency; and an affirmative act constituting evasion or attempted evasion of the tax.” 380 U.S. 343, 350 (1965) (internal citations omitted). Defendants argue that the district court erred in denying their motion to dismiss the indictment. They point out that the Supreme Court decision in Sansone preceded our decision in United States v. Davenport, 824 F.2d 1511 (7th Cir. 1987), and therefore insist that the district court was incorrect to suggest that Sansone “trumps” the law of this Circuit. While it is true that this Court was aware of Sansone when we de- cided Davenport, we disagree with defendants’ principal ar- gument that the existence of a “substantial” tax deficiency is an essential element of the crime of tax evasion under our case law. Defendants rely primarily on the language in Davenport, where we listed the elements of the offense of tax evasion as follows: (1) an affirmative act constituting an evasion or at- tempted evasion of the payment or collection of taxes; (2) the existence of a substantial tax deficiency; and (3) No. 03-1105 5 that the defendant acted willfully. Sansone v. United States, 380 U.S. 343, 351 (1965); United States v. Foster, 789 F.2d 457, 459 (7th Cir. 1986). Id. at 1516 (emphasis added). On at least one other occasion, we have used the word “substantial” in our recitation of the tax deficiency element. See United States v. King, 126 F.3d 987, 993 (7th Cir. 1997) (“Again, the elements of a § 7201 offense are the existence of a substantial tax deficiency, willfulness, and an affirmative act constituting an attempt to evade or defeat tax.”) (emphasis added) (citing Sansone, 380 U.S. at 351; United States v. Eaken, 995 F.2d 740, 742 (7th Cir. 1993)). On many other occasions, however, we have recited the elements of tax evasion without mentioning the substantial- ity of the tax deficiency. See, e.g., King, 126 F.3d at 989 (setting forth earlier in the opinion that “[i]n order to obtain a conviction under § 7201, the government must prove three elements: (1) the existence of a tax deficiency; (2) willfulness; and (3) an affirmative act constituting an attempt to evade or defeat tax.”) (citing Sansone, 380 U.S. at 351; Eaken, 995 F.2d at 742); United States v. Beall, 970 F.2d 343, 345 (7th Cir. 1992); United States v. Jungles, 903 F.2d 468, 473 (7th Cir. 1990); United States v. Fournier, 861 F.2d 148, 150-51 (7th Cir. 1988); United States v. Tishberg, 854 F.2d 1070, 1072 (7th Cir. 1988); United States v. Conley, 826 F.2d 551, 556 (7th Cir. 1987).1 Ignoring these other decisions, defendants latch on to the language in Davenport to argue that under Seventh Circuit law, substantiality is an essential element of the crime of tax evasion. Therefore, they argue, the indictment in this case was inadequate in failing to charge a substantial tax deficiency. 1 We also note that the Seventh Circuit pattern jury instructions do not mention the word “substantial” in stating the essential elements of a § 7201 violation. 6 No. 03-1105 Defendants read too much into Davenport. While the word “substantial” does appear in our opinion, the case did not address the issue that confronts us today: whether in a § 7201 prosecution the government must charge in the indict- ment, and prove beyond a reasonable doubt, the existence of a substantial tax deficiency. In Davenport, we addressed whether the government must disprove the defendant’s entitlement to every possible deduction in order to sustain a conviction for tax evasion. 824 F.2d at 1516-17. The defendant argued that there was reasonable doubt that he had a substantial tax liability for the year 1980 because “he could have been entitled to addi- tional deductions, if itemized, above the standard deduction.” Id. at 1516. The revenue agent calculated a tax deficiency of $3358.68, giving the defendant credit for any possible deductions that could have been itemized, and the defendant introduced no evidence of additional deductions to which he was entitled. Id. We held that the government need not prove “that there are no other conceivable deductions of any sort to which the defendant might be entitled in the absence of some indication that they may in fact exist,” and that in any event a deficiency of just over $3,000 was sufficient. Id. at 1516-17. The parties in that case did not raise the question whether substantiality was an element of the offense, and we did not hold that it was. Nor did we address whether substantiality is an element of tax evasion in King, considering only the defendant’s challenge to his conviction based on the third element of the offense, the commission of a willful act. 126 F.3d at 993. Moreover, the cases on which we relied to list the elements of tax evasion in Davenport and King do not themselves men- tion substantiality. See Sansone, 380 U.S. at 351 (“[T]he elements of § 7201 are will-fullness; the existence of a tax deficiency; and an affirmative act constituting evasion or attempted evasion of the tax.”) (internal citations omitted); Foster, 789 F.2d at 459 (“A violation of 26 U.S.C. § 7201 re- No. 03-1105 7 quires proof of the following elements: (1) the existence of a tax deficiency; (2) an affirmative act constituting an evasion or attempted evasion of the tax; and (3) willfulness.”) (citing Sansone, 380 U.S. at 351); Eaken, 995 F.2d at 742 (“The crime of willful tax evasion has three elements: willfulness, the existence of a tax deficiency, and an affirmative act consti- tuting an attempt to evade or defeat the payment of the tax.”).2 We take this opportunity to clarify the law in this Circuit: the government need not charge a substantial tax deficiency to indict or convict under 26 U.S.C. § 7201. To hold other- wise would contradict the clear language of the statute and lead to an absurd result. Requiring the government to charge and prove that a defendant’s tax deficiency is substantial in 2 Defendants also cite several decisions from other circuits which mention a substantial tax deficiency as an element of tax evasion. See, e.g., United States v. Romano, 938 F.2d 1569, 1571 (2d Cir. 1991); United States v. Parr, 509 F.2d 1381, 1385-86 & n.12 (5th Cir. 1975); United States v. Burkhart, 501 F.2d 993, 995 (6th Cir. 1974). Defendants’ reliance on the language of these decisions is questionable because those courts were not squarely faced with the question. Moreover, subsequent opinions of these courts have listed the elements of tax evasion without requiring a “substantial” tax deficiency. See, e.g., United States v. D’Agostino, 145 F.3d 69, 72 (2d Cir. 1998); United States v. Bishop, 264 F.3d 535, 545 (5th Cir. 2001); United States v. Cor-Bon Custom Bullet Co., 287 F.3d 576, 579 (6th Cir. 2002). The Fourth and Tenth Circuits have mentioned a substantial tax deficiency as an element of tax evasion more consistently, although these courts also have not been called upon to decide the issue directly. See, e.g., United States v. Wilson 118 F.3d 228, 236 (4th Cir. 1997) (citing United States v. Goodyear, 649 F.2d 226, 227-28 (4th Cir. 1981)); United States v. Mounkes, 204 F.3d 1024, 1028 (10th Cir. 2000) (citing United States v. Meek, 998 F.2d 776, 779 (10th Cir. 1993)). Defendants conceded at oral argument that no court has held that an insubstantial tax deficiency is not punishable under 26 U.S.C. § 7201. 8 No. 03-1105 order to prosecute her for tax evasion would prevent the prosecution and punishment of those who willfully cheat the government out of small or “insubstantial” amounts of money.3 A substantiality element would invite taxpayers to cheat on their taxes in small amounts without fear of pros- ecution. We cannot countenance such a result. Although evidence of a large or substantial tax deficiency may aid the government in proving willfulness, it is not itself an element of the offense. B. Timeliness of the Indictment Defendants argue that the original indictment was un- timely and therefore cannot toll the statute of limitations to allow the subsequent filing of the superseding indictment. They further argue that the district court erred in concluding that the superseding indictment did not materially amend the original indictment. The government responds that the first indictment was timely because the statute of limitations began running on or about October 15, 1994, the date the Daniels actually filed their fraudulent 1993 tax return, not on or about April 15, 1994, the date of the offense as stated in the orig- inal indictment. They also contend that the superseding indictment relates back to the filing date of the original in- dictment for tolling purposes because it alleges exactly the same charges. 3 Defendants do not propose an amount at which a tax deficiency becomes “substantial,” or how we could set a threshold. In any event, defendants did not contest substantiality at trial, and at sentencing they conceded a tax loss of over $69,000. Certainly, this amount is substantial under any rubric. Cf. Davenport, 824 F.2d at 1517 (“the little more than $3000 in taxes the defendant evaded paying will amply suffice”). No. 03-1105 9 We review the district court’s ruling regarding the statute of limitations de novo. United States v. Pearson, 340 F.3d 459, 464 (7th Cir. 2003). The crime of tax evasion prohibited by 26 U.S.C. § 7201 must be charged within six years “after the commission of the offense.” 26 U.S.C. § 6531. The Supreme Court has held that the offense of tax evasion is “committed at the time the return is filed.” United States v. Habig, 390 U.S. 222, 223 (1968) (holding that the statute of limitations did not begin to run on the date the defendants’ tax returns were initially due, but rather on the date they actually filed the returns after the defendants obtained an extension). As the Court recognized in Habig, it would make no sense to interpret the limitations period as “begin[ning] to run before appellees committed the acts upon which the crimes were based.” Id. at 224-25; see also Sansone, 380 U.S. at 354 (stating that the crime of tax evasion is “com- plete as soon as the false and fraudulent understatement of taxes . . . was filed”); United States v. Yeoman-Henderson, Inc., 193 F.2d 867, 869 (7th Cir. 1952) (the crime of tax evasion is “complete when the taxpayer willfully and know- ingly files a false return with intent to defeat or evade any part of the tax due to the United States”). The facts of this case are analogous to those in Habig. The offense with which the Daniels were charged was commit- ted when they filed their fraudulent tax return for the year 1993. Although the return was originally due April 15, 1994, the Daniels obtained two extensions, making the ultimate due date October 15, 1994. They actually mailed the form on October 10, 1994. Therefore, the offense stated in the in- dictment: “willfully and knowingly attempt[ing] to evade and defeat a large part of the income tax due and owing by the defendants to the United States of America for the cal- endar year 1993” was completed no earlier than October 10, 1994, when the defendants committed the affirmative act of “causing to be prepared and [ ] signing or causing to be signed, a false and fraudulent joint 1993 U.S. Individual 10 No. 03-1105 Income Tax Return, Form 1040.” Because the original in- dictment was filed on September 26, 2000, it was within six years of the completion of the offense charged in Count I. We hold, therefore, that the original indictment was timely when filed. Defendants argue that even if the original indictment was timely, the superseding indictment does not relate back to the original filing date because the new charges materially amend the original indictment. According to defendants, the original and superseding indictments allege different af- firmative acts constituting tax evasion. The original indict- ment alleges that defendants took affirmative action to violate the tax law on or about April 15, 1994; the supersed- ing indictment charges that defendants took such action on or about October 15, 1994. These two affirmative acts, defendants argue, require different sets of proof by the gov- ernment and call for different defenses. We disagree. We have held that “a superseding indictment that supplants a still-pending original indictment relates back to the original indictment’s filing date so long as it neither materially broadens nor substantially amends the charges initially brought against the defendant.” Pearson, 340 F.3d at 464 (quoting United States v. Ross, 77 F.3d 1525, 1537 (7th Cir. 1996)). In Pearson, we held that the second superseding indictment related back to the timely-filed original indictment where it modified the end date of the charged conspiracy from February 1996 to September 2000 and added three overt acts which occurred during that time. Id. at 465. We noted that the defendants were “on notice of the charges pending against them because the initial in- dictment informed appellants in no uncertain terms that they would have to account for essentially the same conduct with which they were ultimately charged in the superceding indictment,” and therefore held that the second superseding indictment did not violate the statute of limitations. Id. In Ross, a case involving mail and wire fraud, we held No. 03-1105 11 that superseding indictments related back to the original, timely-filed indictment where the counts at issue: had been modified in only two minor respects: (1) ref- erence to a specific Code of Federal Regulations pro- vision had been deleted and replaced with the general words “federal regulations” to obviate confusion from a change in the regulations’ numbering; and (2) the time period in which the conduct forming the basis of each count was alleged to have occurred was narrowed by one month. 77 F.3d at 1537-38. We held that neither of these superficial changes to the indictment constituted the kind of broaden- ing or amendment that would prevent relation back to an earlier pending indictment. Id. at 1538. As we explained in Ross, statutes of limitation are “mech- anisms to guard against possible . . . prejudice resulting from the passage of time between crime and arrest or charge.” Id. at 1537 (quoting United States v. Marion, 404 U.S. 307, 322 (1971)). They are “designed to protect individuals from having to defend themselves against charges when the basic facts may have become obscured by the passage of time and to minimize the danger of official punishment because of acts in the far-distant past.” Id. (quoting Toussie v. United States, 397 U.S. 112, 114-15 (1970)). As in Pearson and Ross, there is no question that the Daniels were on notice that they were being prosecuted for their fraudulent income tax filing for the year 1993. The Daniels were aware, or should have been aware, that they filed their Form 1040 for the year 1993 on or about October 15, 1994, even though the original indictment was dated April 15, 1994. The original and superseding indictments are iden- tical in all respects except for the date changes. Therefore, we cannot say that the superseding indictment materially broadened or substantially amended the charges against the Daniels. 12 No. 03-1105 III. Conclusion For the foregoing reasons, the convictions are AFFIRMED. A true Copy: Teste: ________________________________ Clerk of the United States Court of Appeals for the Seventh Circuit USCA-02-C-0072—10-27-04
Low
[ 0.529411764705882, 28.125, 25 ]
Advertising is off the kids' menu Advertising is off the kids' menu Laws concerning food marketing to children are changing – and that’s a good thing, says James Marsh The other day, I bought some cheese triangles for my youngest. You know the ones. I thought I knew the ones. Apparently not. My six year old told me they weren’t the right cheese triangles – she said they didn’t have the right drawing on the label on the front. No matter how hard I tried to get her to taste them before she decided she didn’t like them, she would not be convinced. Six year olds, they know their minds. Or do they? Later, as I was about to throw out the cheese triangles because no-one else in the family likes them, I had a sneaky thought… and ripped off the offending labels. Now, they were just plain cheese triangles. No branding. The next day, when she fancied a snack, I surreptitiously put the now incognito cheese triangles on her plate beside some cucumber and tomato. She ate it all without a murmur. Was there a slightly-smug-but-guilty-feeling dad in the house? You betcha… However, it got me thinking about food brands and their place in our children’s world. According to Dutch psychologists, children as young as two can recognise two-thirds of all popular brand logos, including those belonging to McDonald’s, M&Ms and Wall’s. The researchers said, “Our study clearly shows that exposure to television has consequences for the brand recognition of even the youngest children.” I should add, this research was carried out in 2005. But does it matter if children can recognise logos? Yes, if you follow a different study from 2014 written by academics from Michigan State University. This study claims children who can recognise soft drink and fast food chain logos are more likely to be overweight or obese. And childhood obesity is one of the most serious health challenges we face, says Public Health England. So, am I worried that my daughter can identify the logo of her preferred brand of cheese triangles? No, because in our house we are pretty hot on our children having a balanced diet with lots of fruit and veg. (Did I mention she also had cucumber and tomato that day? I did? Phew.) So, to me, it makes perfect sense that rules governing food advertising on TV are now being extended to all media (as DAD.info reported earlier this month). From July next year, advertising targeted at under-16s for food or drinks that are high in fat, salt or sugar will be banned across TV, cinema, print, online and social media. So although Tony the Tiger and his fellow characters can appear on packaging, they can't appear in adverts. Of course, this has led to a predictable backlash by those who see this as more interference from the “nanny state” – and blame it all on the parents, in any case. But, as we dads know, it’s not easy trying to balance what children want with what is good for them – especially with the growing pressure from TV and the internet. I think brands have a responsibility to ensure our children grow up to be healthy adults. And if brands won’t acknowledge that responsibility, Government has to make laws accordingly. Parents need help sometimes. If that means banning advertising for junk food aimed at our children, as far as I’m concerned, that’s gr-r-reat! As a charity, it takes a lot of effort to keep DAD.info up-to-date and relevant. If you feel that we've helped you in some small way please consider texting DAD10 followed by a donation amount of either £5 or £10 to 70070* *Your donation via text may be eligible for Gift Aid. You may be contacted on the mobile number you used to give you the opportunity to add Gift Aid to your donation. If you are sent a link to a page to submit your details, as with any mobile browsing, you may incur charges from your network provider when visiting that page. If you are asked to text those details, then a standard network message charge (based on your service provider rates) will be incurred.
Mid
[ 0.56575682382134, 28.5, 21.875 ]
Video-based noncooperative iris image segmentation. In this paper, we propose a video-based noncooperative iris image segmentation scheme that incorporates a quality filter to quickly eliminate images without an eye, employs a coarse-to-fine segmentation scheme to improve the overall efficiency, uses a direct least squares fitting of ellipses method to model the deformed pupil and limbic boundaries, and develops a window gradient-based method to remove noise in the iris region. A remote iris acquisition system is set up to collect noncooperative iris video images. An objective method is used to quantitatively evaluate the accuracy of the segmentation results. The experimental results demonstrate the effectiveness of this method. The proposed method would make noncooperative iris recognition or iris surveillance possible.
High
[ 0.7012987012987011, 30.375, 12.9375 ]
Photographer Callie Shell knows politics. Not only did she spend eight years as the official photographer of Al Gore while he served as Vice President, but she also followed John Kerry during his 2004 presidential campaign on assignment for TIME. It was during that time that she met Barack Obama, when he was still a Senator from Illinois who was several years from embarking on his rise to the White House. Read Article
Mid
[ 0.643015521064301, 36.25, 20.125 ]
Q: How to detect if the HDMI port on an Android device has HDCP enabled? Can't find anything definitive on Android Doc and Google. If there is API to detect this, what is it and what is the API to enable/disable HDCP on the HDMI output? If there is NO API to detect this, is there a device can be used to check the HDCP flag on HDMI port? On some android devices (most notably Samsung devices), the HDMI port always has HDCP enabled. But how about other manufactures devices? Is HDCP mandatory on Google certified device? If it's not mandatory, how do major content providers's Android apps (from Big cable company teleco) prevent video output to non-HDCP protected HDMI port? A: You can try to check the Display flags: http://developer.android.com/reference/android/view/Display.html#getFlags() FLAG_SECURE or FLAG_SUPPORTS_PROTECTED_BUFFERS (http://developer.android.com/reference/android/view/Display.html#FLAG_SECURE and http://developer.android.com/reference/android/view/Display.html#FLAG_SUPPORTS_PROTECTED_BUFFERS)
Mid
[ 0.6390168970814131, 26, 14.6875 ]
Detection thresholds for four different fatty stimuli are associated with increased dietary intake of processed high-caloric food. BMI-specific differences in food choice and energy intake have been suggested to modulate taste perception. However, associations between body composition and fat taste sensitivity are controversial. The objective of this study was to examine the association between body composition, dietary intake and detection thresholds of four fatty stimuli (oleic acid, paraffin oil, canola oil, and canola oil spiked with oleic acid) that could be perceived via gustatory and/or textural cues. In 30 participants, fat detection thresholds were determined in a repeated measurements design over twelve days. Weight status was examined by measuring the participants' BMI, waist circumference and waist-to-hip ratio. The habitual food intake was assessed via several questionnaires and twelve, non-consecutive 24-hour food diaries. In this study, a negative correlation was found between fat detection thresholds and the intake of food rich in vitamins and fibre. Moreover, a positive correlation was identified between the intake of high-fat food and fat detection thresholds. No differences in fat detection thresholds were observed due to variations in BMI or waist-to-hip ratio. These findings indicate that a regular intake of fatty foods might decrease an individuals' perceptual response to fats which might lead to excess fat intake on the long term.
Mid
[ 0.621621621621621, 34.5, 21 ]
{{#property}} <tr> <td>{{+partials.type_name link:link type:property/}}</td> <td><code id="{{id}}">{{api.namespace}}.{{name}}</code></td> <td> {{?availability}} <p class="availability"> {{+availability.partial content:availability item:property/}} </p> {{/availability}} {{?description}} {{{description}}} {{/description}} {{?properties}} <table class="innerTable"> <thead><th colspan="3">Properties</th></thead> {{#p:properties}} {{+partials.parameter_full parameter:p parentName:false/}} {{/properties}} </table> {{/properties}} {{?functions}} <table class="innerTable"> <thead><th colspan="3">Functions</th></thead> {{#f:functions}} {{+partials.function function:f parentName:false/}} {{/functions}} </table> {{/functions}} </td> </tr> {{/property}}
Mid
[ 0.5722070844686641, 26.25, 19.625 ]
*CZ Scorpion Evo 3 Foam Hard Field Case Details *CZ Scorpion Evo 3 Custom Foam Field Case Rugged field case for the EVO 3 A1. An extremely tough field case with 4 locking clamps, making it both water and dust tight. This lockable plastic field case, features cut out foam in-lays, that securely holds an EVO 3 A1 and up to 6 magazines along with a compartment for the battery pack. The user can customize the case to hold more equipment.
High
[ 0.7001569858712711, 27.875, 11.9375 ]
Treaty of Zadar The Treaty of Zadar, also known as the Treaty of Zara, was a peace treaty signed in Zadar, Dalmatia on February 18, 1358 by which the Venetian Republic lost influence over its Dalmatian holdings. The Treaty of Zadar ended hostilities between Louis I of Hungary/Croatia and the Republic of Venice, who were contesting control of a series of territories along the eastern Adriatic coastline in present-day Croatia. Background In 1301, the Árpád dynasty was dissolved and, following a brief interlude, was replaced by the Angevin dynasty as the rulers of Hungary and Croatia. The first Angevin king was Charles Robert, who ruled from 1312 to 1342. He was supported by the most powerful Croatian nobleman Pavao Šubić, Prince of Bribir and Ban (viceroy) of Croatia, ruler of the coastal cities of Split, Trogir, and Šibenik. Pavao became the Ban of Croatia, conferring on him many of the powers of a monarch including minting coinage, conferring charters on cities and levying annual taxes on them. Pavao's actions led to a revolt among the Croatian nobility, who successfully reached out to King Charles to help them remove Pavao. In exchange for his aide, however, the Croatian nobility was forced to declare their direct allegiance to the Hungarian monarchy, setting the stage for Hungarian attempts to expel the Venetian Republic from the Croatian coastline. While the other cities in the Dalmatian region were suffering from tug of war between the Venetians and the Hungarians and Croatians, Dubrovnik, which was held by Venice, was growing into an economic power house by exploiting its position between the west and the mineral-rich kingdoms of Serbia and Bosnia, as well as Dubrovnik's broader location between Europe and the Levant. In the 1350s King Louis I was able to assemble a force of 50,000 men by joining his forces with reinforcements sent by the Duke of Austria, the Counts of Gorizia, the Lord of Padua, Francesco I da Carrara, and the Patriarchate of Aquileia, a state within the Holy Roman Empire. In 1356, the coalition besieged the Venetians at Asolo, Conegliano, Ceneda and the stronghold of Treviso. At the same time, along the Dalmatian coast, the army had attacked the Croatian cities of Zadar, Trogir, Split and Dubrovnik, as well as other smaller towns that surrendered fairly quickly. Broken by a series of military reversals suffered in the territory under their control, the Venetians resigned themselves to the unfavorable conditions stipulated in the Treaty of Zadar, which was signed in the eponymous city on February 18, 1358. Consequences The treaty was signed in the Closter of Monastery of St. Francis and based on the terms of the agreement, the Dubrovnik region and Zadar came under the rule of the King of Hungary and Croatia. It marked the rise of the Republic of Ragusa as an independent and successful state. The same cannot be said for Zadar since it was later sold back to Venice by Ladislaus of Naples. As a result of the peace treaty, Venice had to give all its possessions in Dalmatia to the King, from the Kvarner to the Bay of Kotor, but could keep the Istrian coast and the Treviso region. It was also forced to cancel, in the title of its doge, any reference to Dalmatia. However, the treaty preserved Venice's naval predominance in the Adriatic Sea as the King Louis accepted not to build a fleet of his own. Louis and his army triumphantly entered Zadar in 1358 by granting extensive privileges to the nobility of Zadar and erecting the city capital of Dalmatia. See also List of treaties References External links Zadarski list Kako je i zašto Ladislav prodao Dalmaciju, June 7, 2008 Zadar Category:14th century in Croatia Category:Wars involving medieval Croatia Category:History of Zadar Zadar Category:Treaties of the Republic of Venice Zadar Category:Treaties of the Kingdom of Hungary (1000–1918) Category:History of Dalmatia Category:1358 in Europe Category:14th century in the Republic of Venice Category:14th-century military history of Croatia
Mid
[ 0.617414248021108, 29.25, 18.125 ]
More recently, Savery was the Head of Sustainability for the 2013 America’s Cup regatta in San Francisco. In that role, she developed and implemented a sustainability plan aimed at achieving a carbon neutral, zero waste and sustainable event. She worked with the sailing teams, sponsors, staff, vendors and construction crews to minimize potentially negative impacts in the city and on the waters of San Francisco Bay. “These were brand-new concepts for a majority of the people involved in the project,” she said. “How do you get people to slow down for a moment, understand these new concepts and integrate them into what they’re doing? “It’s a big challenge, especially because you’re under a time crunch, a budget crunch, and you’re trying to deliver a high-quality product — the sporting event itself.” The carbon neutral targets were achieved through a carbon management strategy that included measuring greenhouse gas emissions, reducing emissions as far as possible, and then compensating for unavoidable emissions through carbon credits. Reduction measures included using renewable energy and biofuels, using electric golf carts at the venue, and encouraging spectators to walk, bike or take public transit to the event. “The bike valet was a huge hit among spectators!” Savery said. Organizers also chose not to use single-use plastic drinking bottles. “It had never been done before for an event of this scale,” Savery says. “Plastic pollution in the marine environment is a major problem, and it’s creating gyres of plastic in our oceans. We educated spectators about plastic pollution and walked the talk by not using single-use plastic at the event venues.” She helped the organizers achieve a model event in terms of sustainability. It was certified as a Platinum Level Clean Regatta by the conservation group Sailors for the Sea, making it the first event to receive their highest rating. The fact that Savery made the connection between sustainability and sports her specialty is no real surprise. It’s why she came to F&ES in the first place. As an Olympian, she knew all too well how much waste occurs during sporting events, and that opportunities for improvements existed in many areas — including energy use, transportation and public engagement. “I tailored every class I could around these issues, focusing on major sporting events such as the Olympic Games and the FIFA World Cup,” she says. For her thesis project, she worked with F&ES Professor Stephen Kellert to explore the value of large-scale sporting events as a platform to educate spectators about sustainability decisions.
High
[ 0.7413554633471641, 33.5, 11.6875 ]
--- abstract: 'We apply a recently introduced hybridization flow functional renormalization group scheme for Anderson-like impurity models as an impurity solver in a dynamical mean-field theory (DMFT) approach to lattice Hubbard models. We present how this scheme is capable of reproducing metallic and insulating solutions of the lattice model. Our setup also offers a numerically rather inexpensive method to calculate two-particle correlation functions. For the paramagnetic Hubbard model on the Bethe lattice in infinite dimensions we calculate the local two-particle vertex for the metallic and the insulating phase. Then we go to a two-site cluster DMFT scheme for the two-dimensional Hubbard model that includes short-range antiferromagnetic fluctuations and obtain the local and non-local two-particle vertex functions. We discuss the rich frequency structures of these vertices and compare with the vertex in the single-site solution.' author: - 'Michael Kinza$^{1}$' - 'Carsten Honerkamp$^{1}$' bibliography: - 'literatur.bib' title: 'Two-particle correlations in a functional renormalization group scheme using a dynamical mean-field theory approach' --- Introduction ============ A prominent phenomenon in the field of strongly correlated systems is the Mott Hubbard metal-insulator transition (MIT), [@Mott68; @Geb97] where the lattice electrons undergo a quantum phase transition from a paramagnetic metal to a paramagnetic insulator driven by the local Coulomb repulsion. For small values of the interaction the kinetic energy of the electrons dominates over their interaction energy, leading to a metallic state. For a large local repulsion doubly occupied sites become energetically costly and hence, for one electron per lattice site, the system will minimize its energy by localizing the electrons. The system becomes an insulator. The simplest microscopic model describing the Mott MIT is the one-band Hubbard model.[@Hub63; @Gut63; @Kan63] In nature Mott MITs are found for example in transition metal oxides like chromium-doped V$_{2}$O$_{3}$, [@McWhan73] or in the undoped mother substances of cuprate high-temperature superconductors.[@Lee06] The qualitative features of the Mott transition regarding the ground state can be understood using the Gutzwiller approximation[@Gut65] and Brinkmann-Rice[@Bri70] theory. A controlled access in infinite dimensions and a quantitative theory of the spectral properties of models and materials near or in the Mott state are well described by the various forms of the dynamical mean-field theory (DMFT).[@Geo96; @Pru95; @Kot04] Here, a local problem for a subset of the full lattice, augmented by a dynamical Weiss field that represents the influence of the environment, is solved exactly by means of an impurity solver. Then the solution of this local problem is proliferated to the whole lattice, from which a new Weiss field is determined. Then the local problem is solved again. This procedure is iterated until the Weiss field and the local properties converge. The use of a local ’impurity’ problem in the DMFT framework is the key approximation for any finite dimension, which makes the whole scheme applicable (and exact in infinite dimensions). There have been forceful and physically insightful attempts to include nonlocal correlations in the DMFT setup, as for example cluster extensions [@Mai05; @Kot01; @Lic00] and diagrammatic expansions around the local DMFT solution like the dynamical vertex approximation,[@Tos07; @Hel08; @Roh11] the dual fermion method,[@Rub08; @Rub09] the one-particle irreducible functional approach, [@Roh13] or multi-scale methods.[@Sle09] In the dual fermion strategy, for instance, the DMFT solution of a local core is used in the bare action of a non-local ’dual fermion’ problem. Here one key issue is that the interaction of the dual fermions, which are obtained from the interaction vertex of the local problem, is intrinsically frequency dependent, and in order to be able to treat the dual fermion problem well, some insights about the frequency structure of these interactions will be helpful. A similar statement also holds for improvements of strategies like the functional renormalization group (fRG, [@Met12]) to stronger interactions, either by starting at weak coupling and including the frequency structure and the self-energy feedback,[@Ueb12; @Gie12] or by starting in the atomic limit by a flow in the hopping parameters, as recently shown to work for the single impurity problem [@Kin13], for bosonic problems,[@Ran11; @Ran11b] and for spin-systems.[@Reu13] In all these fRG approaches, the frequency dependence of the vertex constitutes a severe complication when it has to be combined with a wavevector or space dependence. For the latter part, rather well-working approximations have been found,[@Met12; @Hus09; @Xia12; @Wan13] but on the frequency part, not much is known beyond direct studies with rather large effort [@Ueb12] or boson-exchange parametrizations.[@Gie12] In this work, we follow two goals in this context. First we explore how a fRG hybridization flow method that was recently developed for the single impurity Anderson model performs as an impurity solver in DMFT cycles, i.e. in DMFT(fRG). Primarily, the fRG is still a relatively cheap impurity solver in terms of numerical effort, so studying its applicability in the DMFT framework may be useful. Furthermore, the fRG is a flexible and transparent method that nicely illustrates how nonlocal correlations emerge from local interactions, so using the fRG to build in correlations beyond the local core physics may be rewarding. If one wants to pursue this line, one should check how well the fRG works for small cores. We find that in DMFT(fRG) the hallmarks of the Mott transition can be reproduced, but also notice some technical complications that may require further improvements of the fRG scheme in order for the method to become truly competitive with other, established solvers. But as the results are qualitatively reasonable and the numerical effort is rather manageable, we can go to a second field of interest, the frequency structure of the local and nonlocal effective interaction vertices. Knowing the frequency dependence of these objects is of strong importance in the above-mentioned attempts to include nonlocal correlations beyond current DMFT schemes. We find that the effective vertices exhibit ’boson-like’ frequency features, but also other ’loop coupling’ features that are not easily captured by simple parametrizations of the frequency dependence in terms of frequency transfers or the total frequency. Here, our findings confirm results by the Vienna group[@Roh12] for the local vertex, obtained with DMFT using exact diagonalization (ED) as an impurity solver, and expand them to the non local situation. This paper is organized as follows: In Sec. \[sec:method\] we give a brief introduction to the single-site and the cluster DMFT framework and explain in which way the fRG hybridization flow scheme can be used as an impurity solver in the DMFT self-consistency cycle. In the next Sec. \[sec:results\] we present results for the spectral density, the vertex function and the spin susceptibility in the insulating and the metallic phase, obtained with single-site DMFT (Sec. \[sec:resultssinglesitedmft\]) and with two-site cluster DMFT (Sec. \[sec:resultstwositedmft\]). A discussion of the differences in the frequency structure between single-site and two-site cluster DMFT vertices and the conclusion are given in Sec. \[sec:conclusions\]. Method {#sec:method} ====== In this paper, we consider variants of the Hubbard model at half filling. The Hamiltonian is given by $$\label{eqhamiltonianhubbardmodel} \hat{H}=-t\sum_{\langle i,j \rangle,\sigma}c^{\dag}_{i,\sigma}c_{j,\sigma}+U\sum_{i}\left(\hat{n}_{i,\uparrow}-1/2\right)\left(\hat{n}_{i,\downarrow}-1/2\right),$$ where $c^{\dag}_{i,\sigma} (c_{i,\sigma})$ create (annihilate) electrons with spin $\sigma$ on site $i$ and $\hat{n}_{i,\sigma}=c^{\dag}_{i,\sigma}c_{i,\sigma}$. $t$ is the hopping amplitude between nearest neighbours $\langle i,j \rangle$ on lattices specified below and $U>0$ is the onsite Coulomb repulsion. If the model is defined on a bipartite lattice, the Hamiltonian (\[eqhamiltonianhubbardmodel\]) is particle hole symmetric. Single-site DMFT ---------------- In the first part of the paper we study the Hubbard model on a Bethe lattice with infinite connectivity $z\rightarrow\infty$. To make sure that this limit is physically meaningful we have to scale the hopping parameter $t$ like $\frac{t^{\ast}}{\sqrt{z}}$ with constant $t^{\ast}$.[@Met89] The local density of states (DOS) is then semi-elliptic [@Eco06] $$\label{eqlocaldos} \text{DOS}\left(\omega\right)=\frac{1}{2\pi t^2}\sqrt{4 t^2-\omega^2}\, \Theta\left(2t-|\omega|\right)$$ with bandwidth $W=4 t$. [^1] The self-energy becomes a purely local quantity i.e. $\Sigma_{ij}\left(i\omega\right)=\Sigma_{i}\left(i\omega\right)\delta_{ij}$ and because of translational invariance it is site-independent $\Sigma_{i}\left(i\omega\right)=\Sigma\left(i\omega\right)$. This locality of the self-energy is the essential part of the DMFT, which is therefore exact in infinite dimensions. The local lattice Green’s function is then given by $$\label{eqlocallatticegreensfunction} \mathcal{G}(i\omega)=\int\textrm{d}\epsilon\frac{\text{DOS}(\epsilon)}{i\omega-\Sigma(i\omega)-\epsilon}=\mathcal{G}_{0}(i\omega-\Sigma(i\omega))$$ with the free local lattice Green’s function $\mathcal{G}_0$. The local self-energy can be written as a functional of the local lattice Green’s function $\Sigma=\mathcal{S}\left[\mathcal{G}\right]$ in terms of skeleton diagrams.[@Geo92; @Jar92] This can be used to map the Hubbard model to a single impurity Anderson model (SIAM) $$\begin{aligned} \hat{H}_{\text{And}}&=&\hat{H}_{\text{dot}}+\hat{H}_{\text{bath}}+\hat{H}_{\text{hybridization}}\\ \hat{H}_{\text{dot}}&=&\sum_{\sigma}\epsilon_{d}d^{\dag}_{\sigma}d_{\sigma}+U\hat{n}_{d,\uparrow}\hat{n}_{d,\downarrow}\\ \hat{H}_{\text{bath}}&=&\sum_{\vec{k},\sigma}\epsilon_{\vec{k}}b^{\dag}_{\vec{k},\sigma}b_{\vec{k},\sigma}\\ \hat{H}_{\text{hybridization}}&=&-\sum_{\vec{k},\sigma}\left(V_{\vec{k}}d^{\dag}_{\sigma}b_{\vec{k},\sigma}+H.c.\right),\end{aligned}$$ that describes a dot level with onsite energy $\epsilon_d$ and local interaction $U$ that is coupled by a hybridization term $V_{\vec{k}}$ to uncorrelated bath levels with energy $\epsilon_{\vec{k}}$. $d^{(\dag)}_{\sigma}$ create and annihilate electrons on the dot level and $b^{(\dag)}_{\vec{k},\sigma}$ on the bath levels respectively. The local dot Green’s function is given by $$\mathcal{G}_{\text{dot}}(i\omega)=\frac{1}{i\omega-\epsilon_d-\Sigma_{\text{dot}}(i\omega)-\Delta(i\omega)}$$ with the hybridization function $$\Delta(i\omega)=\sum_{\vec{k}}\frac{|V_{\vec{k}}|^2}{i\omega-\epsilon_{\vec{k}}}.$$ The self-energy is by construction local on the dot level. It has the same functional dependence on the dot Green’s function as in the Hubbard model, $\Sigma_{\text{dot}}=\mathcal{S}\left[\mathcal{G}_{\text{dot}}\right]$. If we now choose the parameters $V_{\vec{k}}$ and $\epsilon_{\vec{k}}$ such that $$\label{eqhybridizationfunction} \Delta(i\omega)=i\omega-\epsilon_d-\Sigma_{\text{dot}}(i\omega)-\mathcal{G}(i\omega)^{-1}$$ holds, we arrive at $$\label{eqselfenergycondition} \Sigma_{\text{dot}}(i\omega)=\Sigma(i\omega).$$ With Eqs. \[eqlocallatticegreensfunction\], \[eqhybridizationfunction\] and \[eqselfenergycondition\] we can express $\Delta(i\omega)$ by the free hybridization function $\Delta_0(i\omega)=i\omega-\epsilon_d-\mathcal{G}_0(i\omega)^{-1}$ via $$\label{eqfreehybridizationfunction} \Delta(i\omega)=\Delta_{0}(i\omega-\Sigma(i\omega)).$$ The Eqs. \[eqlocallatticegreensfunction\], \[eqhybridizationfunction\] and \[eqselfenergycondition\] form a set of self-consistency equations for the local self-energy $\Sigma(i\omega)$. The SIAM can be solved by a large class of numerical methods (so-called ’impurity solvers’) like for instance the numerical renormalization group,[@Bul98; @Bul99] the quantum Monte Carlo,[@Jar92; @Roz92] or the exact diagonalization method.[@Caf94; @Lie12] In the following we use a functional renormalization group scheme, introduced in Ref. and described below, as impurity solver. In order to apply this scheme we have to map the bath of the Anderson model to a semi-infinite tight binding chain in which its first site is connected to the impurity site, $$\begin{aligned} \label{eqhamiltonandersonmodel} \nonumber \hat{H}_{\text{And}}&=&\epsilon_d\sum_{\sigma}d^{\dag}_{\sigma}d_{\sigma}+U\left(\hat{n}_{d,\uparrow}-1/2\right)\left(\hat{n}_{d,\downarrow}-1/2\right)\\ \nonumber &-&v\sum_{\sigma}\left(d^{\dag}_{\sigma}b_{1,\sigma}+H.c.\right)\\ \nonumber &-&\sum_{i=1}^{\infty}\sum_{\sigma}t_i\left( b^{\dag}_{i,\sigma}b_{i+1,\sigma}+H.c.\right) +\sum_{i=1}^{\infty}\sum_{\sigma}\epsilon_{i}b^{\dag}_{i,\sigma}b_{i,\sigma}.\end{aligned}$$ For a general bath this can be achieved by the Lanczos algorithm described for example in Ref. . For a semi-elliptic local DOS (\[eqlocaldos\]) we have to choose $\epsilon_i=0$ and $t_i=t$ for all $i$. Then the free hybridization function has the form $$\begin{aligned} \nonumber \Delta_{0}(i\omega)&=&v^2 g_{t}\left(i\omega\right)\\ \textrm{with}\ g_{t}\left(i\omega\right)&=&\frac{1}{2t^2}\left(i\omega-i\textrm{sgn}(\omega)\sqrt{4t^2-(i\omega)^2}\right).\end{aligned}$$ If we now additionally choose $\epsilon_d=0$ and $v=t$ the free local dot Green’s function $\mathcal{G}_0$ is given by $g_{t}$ and the local $\text{DOS}(\omega)=-\frac{1}{\pi}\text{Im}\mathcal{G}_0\left(i\omega\rightarrow\omega+i0^{+}\right)$ is semi-elliptic. Impurity solver: fRG hybridization flow --------------------------------------- In order to solve the impurity model (\[eqhamiltonandersonmodel\]) we apply a functional renormalization group (fRG) scheme,[@Wet93; @Sal01; @Met12] introduced in Ref. . In this reference a detailed description of the formalism is given and we just repeat the main aspects. The fRG scheme is designed to treat impurity models in the form of a semi-infinite tight binding chain, where the interaction term is located on the first site which is the situation in the model (\[eqhamiltonandersonmodel\]). Later we will see that this formalism can be extended to multi-impurity models in the form of a $N$-chain ladder as shown in Figure \[picttwochainladder\]. As in the Figures \[pictandersonmodel\] and \[pictandersonmodel2\] we denote the interacting site by $d$ and the remaining ’bath’ sites by $b_1,b_2,\text{etc}$. First, the system is divided into two parts. One (called ’core’) contains the interacting site and the first $L$ bath sites and one (called ’bath’) contains the remaining sites $b_i$ with $i>L$. We start with a situation where the core and the bath are completely decoupled. Therefore we multiply the hopping matrix element between them by a factor $\Lambda$ and set $\Lambda=0$ in the beginning. Then we solve the Hamiltonian of the isolated core exactly and calculate the one- and two-particle correlation functions. These serve as input to fRG flow equations with $\Lambda$ as flow-parameter, that are integrated from $\Lambda=0$ to $\Lambda=1$. This means that the flow leads from the decoupled core to the fully embedded core. In Ref. we showed how the Kondo physics of a single correlated site is obtained in a qualitatively correct way for the $L=1$-core, but not for the $L=0$-core. It turns out to be useful to implement the fRG flow in an effective theory on the bath site $b_{L+1}$, in which the interacting core and all bath sites with index $>L+1$ are integrated out. The effective action of this theory and the fRG flow equations can be found in Appendix \[sec:appendixfrg\]. We work with two different approximation levels, called approximation 1 and approximation 2. In the first level, only the self-energy flow is considered, and the interaction vertices remain fixed to their initial values, while in approximation 2, also the vertices are allowed to change from their starting values. As can be seen from this description, this fRG impurity solver explicitly involves the one-particle irreducible vertex function (i.e. the interaction vertex). Yet, in terms of the numerical effort, the fRG scheme is relatively inexpensive. For example a parallelized integration of the flow equations on eight cores using 200 Matsubara frequencies in approximation 2 takes about 8 hours. For other impurity solvers, the calculation of the vertex function represents a formidable growth of the numerical effort. Hence it appears worthwhile to explore the use of our fRG scheme as a numerically relatively inexpensive tool to study this quantity in more detail, especially in cluster DMFT calculations. Due to the truncation of the infinite set of flow equations our setup is not exact and we do not claim to obtain quantitative predictions. But as discussed below, the frequency structure of the vertex function comes out in good qualitative agreement with DMFT(ED) calculations,[@Roh12] and, in addition, we can go to nonlocal correlations as well. Single-site DMFT(fRG) --------------------- ### Insulating phase As just mentioned, in the functional renormalization group scheme that is used to solve the SIAM the system is separated into two parts. One part, called ’core’, contains the correlated impurity site and the first $L$ bath sites and the other part, called ’bath’, contains the remaining bath sites. In the simplest case, $L=0$, the core consists only of the impurity site. As shown in Ref. the fRG scheme with this choice of the core fails in describing the quasi-particle properties of the SIAM, i.e., the imaginary part of the Matsubara self-energy has a finite step at $i\omega=0$, which does not become reduced by decreasing temperature and therefore one cannot define a finite quasiparticle weight $$\label{eqquasiparticleweight} Z^{-1}=1-\left. \frac{d\text{Im}\Sigma\left(i\omega\right)}{d\omega}\right|_{\omega=0^{+}}.$$ Due to this the $L=0$-core is not suitable to describe the metallic phase of the Hubbard model. However one can still hope to arrive at a reasonable description of the insulating phase even with this simplest choice for the core. Below we see that this indeed works. The full hybridization function $\Delta(i\omega)$ is given by Eq. \[eqfreehybridizationfunction\]. It corresponds to a semi-infinite tight binding chain with a local term $\Sigma(i\omega)$ on each lattice site (cf. Fig.\[pictandersonmodel\]). ![(color online) Anderson model (core size L=0) with semi-infinite tight binding chain as bath.[]{data-label="pictandersonmodel"}](andersonmodel.pdf){width="50.00000%"} To get an estimate for which interactions $U$ this approach delivers a reasonable description of an insulating phase, we show in Fig. \[pictgapandzvsu\] the gap $\Delta$ as function of $U$ for $\beta = 30 / t$. The gap sizes $\Delta$ are obtained from the spectral density calculated in approximation 1 of the fRG flow equations. The gap vanishes at $U_c\approx 3.8 t$. ![(color online) The plot shows the gap size $\Delta$ in the insulating phase and the quasi-particle weight $Z$ in the metallic phase as function of the interaction strength $U$ at several temperatures, calculated in single-site DMFT(fRG). The gap sizes are estimated from the spectral density calculated in approximation 1 of the fRG flow equations. Compared to the literature [@Blu03] the quasi-particle weight $Z$ goes down too slowly, which is consistent with the behavior found in the Anderson Impurity case.[@Kin13][]{data-label="pictgapandzvsu"}](gapandzvsu.pdf){width="50.00000%"} ### Metallic phase {#metphase} In order to describe the metallic phase of the Hubbard model, the $L=1$-core, containing the correlated site and one bath site, is an appropriate starting point, as this core also successfully reproduced the Kondo central peak in the SIAM setup.[@Kin13] In the spectrum of the decoupled core one obtains two peaks near zero energy which lead to a continuous Matsubara self-energy at $i\omega=0$ resulting with Eq. \[eqquasiparticleweight\] in a finite quasiparticle weight $Z$. The full hybridization function is again given by $\Delta(i\omega)=\Delta_{0}(i\omega-\Sigma(i\omega))$, but opposite to the $L=0$-case a local self-energy term on the first bath site that is part of the $L=1$-core, is forbidden, because the exact diagonalization of the core requires a frequency-independent core Hamiltonian. To circumvent this we approximate $\Sigma(i\omega)$ for small frequencies as $\Sigma(i\omega)\approx\left(1-Z^{-1}\right)i\omega$, with the quasiparticle weight $Z$. The full hybridization function $\Delta(i\omega)$ is then given by $$\begin{aligned} \label{eqapproxhybridizationfunctionmetall} \nonumber \Delta(i\omega)&=&\Delta_{0}(i\omega-\Sigma(i\omega))\approx\Delta_{0}(i\omega/Z)\\ \nonumber &=& \frac{v^2}{2t^2}\left(\frac{i\omega}{Z}-i\textrm{sgn}(\omega)\sqrt{4t^2-\left(\frac{i\omega}{Z}\right)^2}\right)\\ \nonumber &=& \frac{(\sqrt{Z}v)^2}{2(Zt)^2}\left(i\omega-i\textrm{sgn}(\omega)\sqrt{4(Zt)^2-(i\omega)^2}\right)\\ &=& (\sqrt{Z}v)^2 g_{Zt}(i\omega).\end{aligned}$$ It corresponds to a semi-infinite tight binding chain with hopping $Zt$ and impurity-bath coupling $\sqrt{Z}v$ (cf. Fig.\[pictandersonmodel2\]). ![(color online) The Anderson model for the case $L=1$. It corresponds to a semi-infinite tight binding chain with hopping $Zt$ and impurity-bath coupling $\sqrt{Z}v$.[]{data-label="pictandersonmodel2"}](andersonmodel2.pdf){width="50.00000%"} In each selfconsistency cycle of the DMFT equations one calculates the quasi-particle weight $Z$ from the local self-energy which defines the new hopping parameters for the next cycle. For $\Lambda=0$, i.e. without solving the fRG flow equations, this scheme is equivalent to the two-site DMFT scheme introduced in Ref. . This two-site DMFT scheme [^2] yields a satisfactory description of the Mott transition and the Fermi liquid state in the single-band Hubbard model at $T=0$. The quasi-particle weight is predicted as $Z=1-U^2/U^2_c$ with $U_c = 1.5W$, which is very close to the result of the numerical renormalization group. [@Bul99] For values of $U$ larger than $U_c$ this scheme reduces to the Hubbard-I approximation.[@Hub63] Our extended scheme is implemented at finite temperatures. In Fig. \[pictgapandzvsu\] we show the quasi-particle weight $Z$ as a function of $U$ at $\beta=30 / t$ and $\beta=50 / t$ (calculated in approximation 1). These temperatures are still lower than the critical end point of the MIT phase diagram. The quasi-particle weight $Z$ vanishes discontinuous at certain values $U_c(T)$, which marks the breakdown of the metallic state. For larger values of $U$ the quasi-particle weight decreases in the DMFT cycle until a linearization of the self-energy is no more possible. Compared to the literature,[@Blu03] the obtained values $U_c(T)$ come out too small. Note that the approximation for the hybridization function (\[eqapproxhybridizationfunctionmetall\]) becomes very bad at large frequencies especially for small quasi-particle weights near the phase transition. The obtained $U_c$ is larger than the interaction strength, where the gap $\Delta$ vanishes (cf. Fig. \[pictgapandzvsu\]). Although one expects a hysteresis region at the phase transition and the two values are indeed different, a direct comparison is of course problematic due to the distinct approaches used to describe the insulating and the metallic phase. Two-site cluster DMFT(fRG) -------------------------- Although the DMFT is only exact in the limit of infinite dimensions, it turns out to be an extremely useful approximation scheme for systems with finite dimension. In these systems nonlocal correlation effects, like e.g. antiferromagnetic fluctuations or superconducting d-wave pairing, play an important role and several extensions of the simple DMFT framework exist that capture these effects. Important examples are perturbational expansions around the local DMFT solution [@Stan04; @Tos07; @Hel08; @Rub08; @Rub09] or numerical cluster DMFT schemes, where short ranged correlations within a finite cluster are included.[@Lic00; @Kot01; @Mai05] ![(color online) Tiling of the square lattice with two-site clusters. Each lattice site can be uniquely described by a cluster vector and the site within the cluster $\vec{R}_j$. Note, that other periodic arrangements of the two-site clusters, corresponding to a different choice of the superlattice, would be also possible. However, this would only lead to another equivalent description of our problem and with our choice the quantities in the reciprocal superlattice acquire the most compact form.[]{data-label="pictsquarelattice"}](squarelattice.pdf){width="40.00000%"} In the second part of the paper we extend our setup to a cluster DMFT scheme for the Hubbard model (\[eqhamiltonianhubbardmodel\]) on a 2-dimensional square lattice with tight binding dispersion $$\label{eqtightbindingdispersion} \epsilon_{\vec{k}}=-2t\left[\cos(k_x)+\cos(k_y)\right]$$ and bandwidth $W=8t$. As shown in Fig. \[pictsquarelattice\] we divide the lattice into plaquettes with $L=2$ sites. This breaks the translational invariance of the original lattice problem and introduces a superlattice $\Gamma$ of clusters, whose sites form a subset of the original lattice $\gamma$. Each lattice site of the original lattice $\vec{r}_{i}$ can then be uniquely described by a cluster-vector $\vec{r}_{m}$ and the site within the cluster $\vec{R}_{j}$ as $\vec{r}_{i}=\vec{r}_m+\vec{R}_j$. The Brillouin zone of the original lattice ($BZ_{\gamma}$) contains $L$ points of the reciprocal superlattice. For the two-site clusters these are $\vec{K}_{1}=\left(0,0\right)$ and $\vec{K}_{2}=\left(\pi,\pi\right)$. Any wavevector $\vec{k}\in BZ_{\gamma}$ can be uniquely written as $\vec{k}=\vec{K}+\vec{\tilde{k}}$, with $\vec{K}\in \{\vec{K}_{1},\vec{K}_{2}\}$ and $\vec{\tilde{k}}$ belonging to the Brillouin zone of the superlattice ($BZ_{\Gamma}$).[^3] The hopping amplitude between two sites of the same cluster $\vec{R}_a$ and $\vec{R}_b$ can be obtained from the dispersion relation by the Fourier transformation $$\begin{aligned} \nonumber t_{ab}&=&\frac{1}{N}\sum_{\vec{k}}\text{e}^{i\vec{k}(\vec{R}_a-\vec{R}_b)}\epsilon_{\vec{k}}\\ \nonumber &=& \frac{1}{N}\sum_{\vec{K},\vec{\tilde{k}}}\text{e}^{i(\vec{K}+\vec{\tilde{k}})(\vec{R}_a-\vec{R}_b)}\epsilon_{\vec{K}+\vec{\tilde{k}}}\\ &=& \frac{L}{N}\sum_{\vec{\tilde{k}}}\underbrace{\text{e}^{i\vec{\tilde{k}}(\vec{R}_a-\vec{R}_b)}\frac{1}{L}\sum_{\vec{K}}\text{e}^{i\vec{K}(\vec{R}_a-\vec{R}_b)}\epsilon_{\vec{K}+\vec{\tilde{k}}}}_{\hat{t}_{ab}(\vec{\tilde{k}})}.\end{aligned}$$ $\hat{t}(\vec{\tilde{k}})$ is the partial Fourier transformation of the band dispersion i.e. a matrix in the cluster space which depends on the wavevector $\vec{\tilde{k}}$ of the reciprocal superlattice. For the tight binding dispersion (\[eqtightbindingdispersion\]) it is given by $$\hat{t}(\vec{\tilde{k}})=\left[\begin{array}{cc} 0 & \text{e}^{-i\tilde{k}_y}\epsilon_{\vec{\tilde{k}}} \\ \text{e}^{i\tilde{k}_y}\epsilon_{\vec{\tilde{k}}} & 0 \end{array}\right].$$ If we assume that the self-energy is local on each cluster i.e. independent of $\vec{\tilde{k}}$ we obtain the local cluster Green’s function as $$\begin{aligned} \nonumber \hat{\mathcal{G}}(i\omega)&=&\frac{L}{N}\sum_{\vec{\tilde{k}}}\left[i\omega\textbf{1}-\hat{t}(\vec{\tilde{k}})-\hat{\Sigma}(i\omega)\right]^{-1}\\ &=&\hat{\mathcal{G}}_{0}\left(i\omega\textbf{1}-\hat{\Sigma}(i\omega)\right).\end{aligned}$$ This can be interpreted as the local Green’s function of a two-impurity Anderson model with hybridization function $$\begin{aligned} \nonumber \hat{\Delta}(i\omega)&=&i\omega\textbf{1}-\hat{t}-\hat{\Sigma}(i\omega)-\hat{\mathcal{G}}(i\omega)^{-1}\\ &=&\hat{\Delta}_{0}\left(i\omega\textbf{1}-\hat{\Sigma}(i\omega)\right).\end{aligned}$$ The free hybridization function $\hat{\Delta}_0$ is again given by $$\hat{\Delta}_0(i\omega)=i\omega\textbf{1}-\hat{t}-\hat{\mathcal{G}}_0(i\omega)^{-1}.$$ $\hat{t}$ is the cluster hopping matrix defined by $$\hat{t}=\left[\begin{array}{cc} 0 & -t \\ -t & 0 \end{array}\right].$$ Note that in the present work we do not allow for any symmetry-breaking, neither in the single-site DMFT, nor in the two-site cluster DMFT approach. This means that, e.g., the antiferromagnetic ground state of the square lattice Hubbard model will not be captured. In principle, the symmetry breaking could be included by considering spin- and sublattice-dependent self-energies. Here, in order to keep the first applications of the DMFT(fRG) scheme simple, we do not allow for this additional aspect and focus on the non-magnetic ’mother states’ of the true ground states. To apply our fRG scheme the two-impurity Anderson model must have the form of a two-chain ladder as shown in Fig.(\[picttwochainladder\]) with Hamiltonian $$\begin{aligned} \label{eqhamiltontwositeandersonmodel} \nonumber \hat{H}_{\text{2-site-And}}&=&U\sum_{j=1}^{2}\hat{n}_{d,j,\uparrow}\hat{n}_{d,j,\downarrow} -t^{\perp}_0 \sum_{\sigma}\left(d^{\dag}_{1,\sigma}d_{2,\sigma}+H.c.\right) -t_{0}\sum_{\sigma}\sum_{j=1}^{2}\left(d^{\dag}_{j,\sigma}b_{1,j,\sigma}+H.c.\right)\\ &&-\sum_{i=1}^{\infty}\sum_{j=1}^{2}\sum_{\sigma}\left(t_i b^{\dag}_{i,j,\sigma}b_{i+1,j,\sigma}+H.c.\right) -\sum_{i=1}^{\infty}\sum_{\sigma}t^{\perp}_{i}\left(b^{\dag}_{i,1,\sigma}b_{i,2,\sigma}+H.c.\right).\end{aligned}$$ ![Illustration of the two-chain ladder, corresponding to Hamiltonian (\[eqhamiltontwositeandersonmodel\])[]{data-label="picttwochainladder"}](twochainladder.pdf){width="50.00000%"} To determine the parameters of the two-chain ladder we fit the eigenvalues of the free hybridization function, $\Delta^{(1)}_{0}(i\omega)$ and $\Delta^{(2)}_{0}(i\omega)$, to a discretized hybridization function of the form $$\Delta^{N,(i)}_{0}(i\omega)=\sum_{i=1}^{N}\frac{|v_i|^2}{i\omega-\epsilon_i},$$ where the fit-parameters $v_i$ and $\epsilon_i$ are calculated by a conjugate gradient minimization [@Geo96] of the distance function $$d=\frac{1}{\omega_{\text{max}}}\sum_{\omega}|\Delta^{(i)}_{0}(i\omega)-\Delta^{N,(i)}_{0}(i\omega)|^2.$$ Note that the fit-parameters for the two eigenvalues are not independent because it is $\Delta^{(2)}_{0}(i\omega)=-\Delta^{(1)}_{0}(i\omega)^{\ast}$ due to particle hole symmetry. The finite bath can then be transformed to a tridiagonal form by the Lanczos algorithm, which determines the hopping parameters of the two-chain ladder. The extension of our fRG scheme to multi-impurity problems in the form of a $N$-chain ladder like in Eq. \[eqhamiltontwositeandersonmodel\] can be found in Appendix \[sec:appendixfrg\]. Results {#sec:results} ======= Single-site DMFT {#sec:resultssinglesitedmft} ---------------- First let us discuss the results for using the hybridization flow as DMFT solver for the case of single-site DMFT, embedded in a Bethe lattice. We show that the approach can reasonably describe both the insulating as well as the metallic phase, and give results for the effective interaction vertices in these phases. ### Insulating phase From our numerical data for the self-energy on the Matsubara frequency axis we obtain the spectral density $A(\omega)=-\frac{1}{\pi}\text{Im}\mathcal{G}(\omega+i0^{+})$ by an analytical continuation using a Pad$\acute{\text{e}}$-algorithm described in Ref. . The spectral density for several values of $U / t$ is shown in Fig. \[pictspectraldensityinsulatingphase\]. One obtains an opening of a Mott gap around $\omega=0$ with an average center-to-center separation of the two Hubbard bands of $\sim U$. The width of the Hubbard bands for these moderate $U$-values is only a little smaller than the band width of the noninteracting problem, $W=4t$. The rich multi-peak structure of the Hubbard bands (with a variable number of maxima) is probably an artifact of our approximation, most likely due to the discrete core used in the initial condition of the flow equation. ![(color online) spectral density for $U=4.8 t, 5 t, 5.2 t, 5.6 t$ at $\beta=30 / t$.[]{data-label="pictspectraldensityinsulatingphase"}](spectraldensityu4k8u5u5k2u5k6beta30.pdf){width="50.00000%"} Next let us discuss the frequency structure of the local, one-particle irreducible (1PI) interaction vertex (defined in Appendix \[sec:appendixa\], Eq. (\[eqrelationcongreensfunctionvertex\])) at the converged DMFT solution as it comes out of the fRG flow that embeds the core into the lattice. In Fig. \[vertexplot1\] we show the density part of this 1PI local vertex, $|\Gamma_{d}(i\omega_1,i\omega_2|i\omega_1-i\nu,i\omega_2+i\nu)-U/2|$, and the magnetic part, $|\Gamma_{m}(i\omega_1,i\omega_2|i\omega_1-i\nu,i\omega_2+i\nu)+U/2|$, for $U = 5 t$ and $\beta = 30 / t$ as functions of the incoming frequencies $\omega_1$ (x-axis) and $\omega_2$ (y-axis). The decomposition of the general vertex into the density and magnetic part is described in Appendix B, in Eqs. \[eqdensitypart\] and \[eqmagneticpart\]. The outgoing frequencies are parametrized by the bosonic Matsubara frequency $\nu$. We show the two cases $\nu=0$ and $\nu=40\frac{\pi}{\beta}$. To visualize the frequency structure better we subtracted the frequency independent term $U/2$ ($-U/2$) from the density (magnetic) part. For particle hole symmetry, these vertices are purely real. ![image](vertexdensityu5beta30.pdf){width="45.00000%"} ![image](vertexmagneticu5beta30.pdf){width="45.00000%"} ![image](vertexdensityu5beta30bosen20.pdf){width="45.00000%"} ![image](vertexmagneticu5beta30bosen20.pdf){width="45.00000%"} Note that the connected part of the dynamic charge and spin susceptibilities $\chi^{\text{charge/spin},c}(i\nu)$ is obtained from the connected two-particle Green’s function $\mathcal{G}^{c,(2)}_{d/m}(i\omega_1,i\omega_2|i\omega_1-i\nu,i\omega_2+i\nu)$ by summations with respect to $\omega_1$ and $\omega_2$ (cf. Eq. \[eqdynamicchargesusceptibilitydef\] and \[eqdynamicspinsusceptibilitydef\]). $\mathcal{G}^{c,(2)}_{d/m}$ and $\Gamma_{d/m}$ are related by Eq. \[eqrelationcongreensfunctionvertex\], from which follows that the frequency structure of $\Gamma_{d/m}$ determines the local charge and spin response of the system. The main features of the obtained frequency structure correspond to those that are already visible in the single-site Hubbard vertex (\[eqlocalvertexdensity\]) and (\[eqlocalvertexmagnetic\]) at half filling that describes the response of a free spin 1/2. This is of course expected, because the insulating phase in the single-site DMFT is given by a paramagnetic insulator with local uncoupled spin degrees of freedom. In all vertices of Fig. \[vertexplot1\] one recognizes a sharply peaked diagonal structure for $\omega_2 = \omega_1 - \nu$. In the single-site Hubbard vertex (\[eqlocalvertexdensity\]) and (\[eqlocalvertexmagnetic\]) this corresponds to the term proportional to $\delta_{\omega_2,\omega_{1'}}$. In the DMFT vertex for the embedded site, it remains very sharp and no broadening is observed. As discussed in Ref. it diverges in the Mott phase for $T \rightarrow 0$, which explains the strong enhancement of this structure at these low temperatures. The first $\delta$-term in the single-site Hubbard vertex (\[eqlocalvertexdensity\]) and (\[eqlocalvertexmagnetic\]), that is proportional to $\delta_{\omega_1,-\omega_2}$, would lead to an additional peak structure on the secondary diagonal in the $\omega_1,\omega_2$-plane. But for repulsive interactions $U > 0$ it is exponentially suppressed already for the isolated single site. Hence, also in the DMFT vertex no such structure is obtained. The last term in the single-site Hubbard vertex (\[eqlocalvertexdensity\]) and (\[eqlocalvertexmagnetic\]) proportional to $\delta_{\omega_1,\omega_{1'}}$ only gives a contribution for $\nu=0$. In the density part this contribution is not visible, because this term is again exponentially suppressed. In the magnetic part it is finite and occurs in the DMFT vertex as large difference in the offset between $\nu=0$ and $\nu\neq0$ (right column of Figure \[vertexplot1\]). This difference leads to a term $\propto\delta_{\nu,0}$ in the spin susceptibility, which will be discussed further below. Furthermore there is a ’+’-shaped cross structure in the DMFT vertex, that is centered at $(\omega_1=0,\omega_2=0)$ (for $\nu=0$). At nonzero $\nu=40\frac{\pi}{\beta}$ four of those structures can be found, centered at $(0,0)$, $(-\nu,0)$, $(-\nu,\nu)$ and $(0,\nu)$. In the local Hubbard vertex these correspond to the terms proportional to $U^3$ and $U^5$. Summarizing these observations we can state that the 1PI interaction vertex is by no means a structureless object. At least for this insulating regime it appears difficult to parametrize the vertex in a simple way. In particular, the cross structures indicate that a parametrization in terms of bosonic transfer frequencies does not capture the vertex in all aspects. In order to see that these vertices make physical sense, we now compute the local dynamical spin susceptibility from the 1PI vertex, by Eq. \[eqdynamicspinsusceptibilitydef\]. Due to our finite frequency patching (we included $200$ Matsubara frequencies at $\beta=30 / t$) our results become inaccurate especially for large frequencies because of the different speed of convergence of the connected and the disconnected part of the susceptibility. Nevertheless we obtain reasonable results by an analytical continuation of our data at least at low frequencies. In Fig.\[pictspinsusceptibilitymatsubarainsulatingphase\] we show the real part of the spin susceptibility on the Matsubara axis (the imaginary part vanishes due to particle hole symmetry). Beside a continuous frequency dependence at nonzero frequencies we obtain an additional term proportional to $\delta_{\nu,0}$, which is characteristic for a free spin degree of freedom. This feature is already visible in the spin susceptibility of the local Hubbard model (\[eqspinsusceptibilitylocalhubbardsite\]). It does not occur in the imaginary part of the spin susceptibility on the real frequency axis, shown in Fig. \[pictspinsusceptibilityinsulatingphase\], because this vanishes at $\omega=0$ due to $\text{Im}\chi^{\text{spin}}(\omega)=-\text{Im}\chi^{\text{spin}}(-\omega)$. In this quantity we obtain a broad spectrum of spin excitations with an onset of twice the single-particle gap in agreement with Ref. or the data shown in Fig. \[pictspectraldensityinsulatingphase\]. The two peak structure for $U = 6t$ could be an artifact of our approximation. Note that in this single-site DMFT approach nonlocal collective spin excitations that should appear below the particle hole continuum are not included. ![(color online) Real part of the Matsubara local spin susceptibility in the insulating regime of single-site DMFT(fRG) for $U = 4.8 t, 5 t, 5.2 t, 5.6 t, 6 t$ at $\beta=30 / t$.[]{data-label="pictspinsusceptibilitymatsubarainsulatingphase"}](spinsusceptibilitymatsubarau4k8u5u5k2u5k6u6beta30.pdf){width="50.00000%"} ![(color online) Imaginary part of the spin susceptibility on the real frequency axis in the insulating regime of single-site DMFT(fRG) for $U=5 t, 5.2 t, 6 t$ at $\beta=30 / t$.[]{data-label="pictspinsusceptibilityinsulatingphase"}](spinsusceptibilityu5u5k2u6beta30.pdf){width="50.00000%"} ### Metallic phase {#metallic-phase} Next let us explore the results of single-site DMFT(fRG) for the metallic regime of the Bethe lattice Hubbard model, using the scheme presented in Sec. \[metphase\]. In Figure \[pictspectraldensitymetallicphase\] we show the spectral density for $U = 1t, 2t, 3t$ at $\beta = 30 / t$. In all cases we get only stable Pad$\acute{\text{e}}$-results for frequencies $|\omega|<2t$. The spectral weight at $\omega=0$ is pinned to the noninteracting value $A(\omega=0)=\text{DOS}(\omega=0)=\frac{1}{\pi t}$, which is for $T=0$ expected from Luttinger’s theorem.[@Mue89; @Mue89b] Here we find it also for nonzero temperature values. The shoulders at the sides of the quasi-particle are located near the position of the low energy peaks at energies $\pm\frac{1}{4}\left(\sqrt{U^2+64 z(U) v^2}-\sqrt{U^2+16 z(U) v^2}\right)$ in the spectrum of the $L=1$-core and remain as artifacts in the DMFT spectra (cf. the discussion in Sec. V.B. in Ref. ). ![(color online) Single-particle spectral density for $U = 1t, 2t, 3t$ at $\beta = 30 / t$ in the single-site DMFT(fRG)-solution of the Bethe lattice.[]{data-label="pictspectraldensitymetallicphase"}](spectraldensityu1u2u3beta30.pdf){width="50.00000%"} In Fig. \[vertexplot2\] the density part $\Gamma_{d}(i\omega_1,i\omega_2|i\omega_1-i\nu,i\omega_2+i\nu)-U/2$ and the magnetic part $\Gamma_{m}(i\omega_1,i\omega_2|i\omega_1-i\nu,i\omega_2+i\nu)+U/2$ of the 1PI vertex function for $U = 2 t$ and $\beta = 30 / t$ are shown. Again, the vertices are purely real due to particle hole symmetry. ![image](vertexdensityu2beta30.pdf){width="45.00000%"} ![image](vertexmagneticu2beta30.pdf){width="45.00000%"} ![image](vertexdensityu2beta30bosen20.pdf){width="45.00000%"} ![image](vertexmagneticu2beta30bosen20.pdf){width="45.00000%"} The main features of the frequency structure described above for the insulating phase are also visible in the metallic phase, but there are also certain differences. It can be clearly seen that now the vertices are continuous in the whole frequency plane and no sharp $\delta$-like features or singularities, as in the insulating phase, occur. On the main diagonal at $\omega_2=\omega_1 - \nu$ one observes again a pronounced structure, which is much more broadened compared to the insulating phase. In addition there is a similar structure on the secondary diagonal at $\omega_1=-\omega_2$, which was absent in the insulating phase. As discussed in Ref. these features stem diagrammatically from particle hole and particle-particle scattering processes respectively. Both are already visible in the vertices of the $L=1$-core and become only more pronounced in the fRG flow. There is also a ’+’-shaped structure at the same position as in the insulating phase. As seen in the lower panel of Fig. \[vertexplot2\] this structure evolves into a band with width $|\nu|$ for $\nu=40\frac{\pi}{\beta}$. In perturbation theory these structures correspond to third-order diagrams [@Roh12] which involve mixing of particle-particle and particle-hole bubbles. No such structures occur in the vertices of the $L=1$-core. This means that they are generated entirely in the fRG flow that accomplishes the embedding into the lattice. We compared our vertex data with DMFT(ED)-vertices, calculated by the Vienna Group[@Roh12] for the same set of parameters. All described features are also visible in the frequency structure of the DMFT(ED)-vertices and even their relative size and sign are qualitatively reproduced in our scheme. Quantitatively there are differences. For example the vertical structure at $\omega_2=\omega_1-\nu$ is broadened and its absolute size comes out smaller in our scheme. Summarizing the description of the single-site vertices, we can state that both in insulating as well as in the metallic state, the interaction vertices exhibit a lot of structure. The bosonic (diagonal) features could be captured by simpler parametrizations using functions depending on certain transfer frequencies only,[@Kar08] but other features like the ’+’-structures would not be captured by that. In Ref. the decomposition of the 1PI vertex into two-particle irreducible (2PI) vertices and the fully irreducible vertex is discussed. We have reproduced this reasoning for some examples. In the 2PI vertices, certain bosonic features are removed, but other bosonic features due to the channel coupling remain, e.g. in the particle-particle 2PI vertices one still sees sharp features for specific frequency transfers that originate from particle-hole insertions. The fully irreducible vertex has a nontrivial frequency structure as well.[@Roh12; @Schae13] Two-site cluster DMFT {#sec:resultstwositedmft} --------------------- In Fig. \[pictspectraldensitytwositecluster\] we show the local spectral density $A(\omega)=-\frac{1}{\pi}\text{Im}\ \mathcal{G}_{ii}(\omega+i0^{+})$ for $U = 4 t$ and $U = 10 t$ at $\beta=30/t$. Unlike for the single-site DMFT(fRG) scheme, using the two-site cluster as core, we can describe metallic and insulating behavior with the same fRG-scheme, without having to parametrize the self-energy by a $Z$-factor. For $U = 10 t$ we find an insulating spectrum with two Hubbard bands at $\omega=\pm 5 t$ separated by a gap. In the metallic spectrum for $U = 4 t$ these Hubbard bands are still visible as weakly pronounced shoulders at $\omega = \pm 2 t$. The sharp peak at $\omega=0$ is due to the Van Hove singularity in the free density of states of the two-dimensional square lattice. Hence the single-particle spectra are qualitatively correct and show the expected energy scales. This gives us a robust starting point for studying the 1PI interaction vertex for the two-site core, now including its nonlocal part. ![image](spectraldensityu4u10beta30.pdf){width="50.00000%"} As for the single-site DMFT, we discuss the frequency structure of the 1PI vertex functions for the insulating and the metallic phase in terms of the density and magnetic parts. Note that in units of the bandwidth $W$, the onsite interaction $U$ is in both cases the same as in the data shown for the single-site DMFT. Therefore, the vertices can be directly compared to each other on the energy axis. [^4] Opposite to the single-site DMFT, the two-site cluster DMFT includes antiferromagnetic fluctuations between neighbored sites. These should be characterized by the energy scale $J$ that is for large $U$ given by $J\sim 4\frac{t^2}{U}$. By the Fourier transformation $U_{\vec{K}_{i},\vec{R}_{j}}=\frac{1}{\sqrt{2}}\exp(i\vec{K}_{i}\vec{R}_{j})$ we transform the vertices to cluster momentum space with the cluster momenta $\vec{K}_{1}=(0,0)$ and $\vec{K}_{2}=(\pi,\pi)$. $\vec{R}_{1}=(0,1)$ and $\vec{R_2}=(0,0)$ are shown in Fig. \[pictsquarelattice\]. Due to momentum conservation the only non-negative contributions are given by $$\begin{aligned} \nonumber \Gamma_{d/m}(\vec{K}_{1},i\omega_{1};\vec{K}_{1},i\omega_{2}|\vec{K}_{1},i\omega_{1'};\vec{K}_{1},i\omega_{2'})&\equiv&\Gamma^{1111}_{d/m}(i\omega_{1};i\omega_{2}|i\omega_{1'};i\omega_{2'}),\\ \nonumber \Gamma_{d/m}(\vec{K}_{1},i\omega_{1};\vec{K}_{2},i\omega_{2}|\vec{K}_{1},i\omega_{1'};\vec{K}_{2},i\omega_{2'})&\equiv&\Gamma^{1212}_{d/m}(i\omega_{1};i\omega_{2}|i\omega_{1'};i\omega_{2'}),\\ \nonumber \Gamma_{d/m}(\vec{K}_{1},i\omega_{1};\vec{K}_{2},i\omega_{2}|\vec{K}_{2},i\omega_{1'};\vec{K}_{1},i\omega_{2'})&\equiv&\Gamma^{1221}_{d/m}(i\omega_{1};i\omega_{2}|i\omega_{1'};i\omega_{2'}),\\ \nonumber \Gamma_{d/m}(\vec{K}_{1},i\omega_{1};\vec{K}_{1},i\omega_{2}|\vec{K}_{2},i\omega_{1'};\vec{K}_{2},i\omega_{2'})&\equiv&\Gamma^{1122}_{d/m}(i\omega_{1};i\omega_{2}|i\omega_{1'};i\omega_{2'})\end{aligned}$$ and the same quantities with $\vec{K}_{1}\leftrightarrow\vec{K}_{2}$ respectively. Due to particle hole symmetry one has $\Gamma^{2222}_{d/m}=\left(\Gamma^{1111}_{d/m}\right)^{\ast}$, $\Gamma^{2121}_{d/m}=\left(\Gamma^{1212}_{d/m}\right)^{\ast}$, $\Gamma^{2112}_{d/m}=\left(\Gamma^{1221}_{d/m}\right)^{\ast}$ and $\Gamma^{2211}_{d/m}=\left(\Gamma^{1122}_{d/m}\right)^{\ast}$. Hence we can restrict the discussion to the former vertices. If we plot $\Gamma^{\#_1\#_2\#_3\#_4}_{d/m}(i\omega_1;i\omega_2|i\omega_1-i\nu;i\omega_2+i\nu)$ in the $\omega_1-\omega_2$-plane we have the symmetry axes (A) at $\omega_2=\omega_1-\nu$ and (B) at $\omega_1=-\omega_2$. $M_{\text{A}}$ and $M_{\text{B}}$ are mirror operators at axis (A) and (B) respectively. In Table \[tabellespiegelung\] we show the transformation behavior of $\Gamma^{1111}_{d/m}$, $\Gamma^{1212}_{d/m}$, $\Gamma^{1221}_{d/m}$ and $\Gamma^{1122}_{d/m}$ under $M_{\text{A}}$ and $M_{\text{B}}$ which follows from time reversal symmetry and particle hole symmetry. $M_{\text{A}}$ $M_{\text{B}}$ ----------------------- ------------------------------------------- ------------------------------------------- $\Gamma^{1111}_{d/m}$ $\Gamma^{1111}_{d/m}$ $\left(\Gamma^{1111}_{d/m}\right)^{\ast}$ $\Gamma^{1212}_{d/m}$ $\left(\Gamma^{1212}_{d/m}\right)^{\ast}$ $\Gamma^{1212}_{d/m}$ $\Gamma^{1221}_{d/m}$ $\Gamma^{1221}_{d/m}$ $\Gamma^{1221}_{d/m}$ $\Gamma^{1122}_{d/m}$ $\left(\Gamma^{1122}_{d/m}\right)^{\ast}$ $\left(\Gamma^{1122}_{d/m}\right)^{\ast}$ : In the $\omega_1-\omega_2$-plane there are two symmetry axes: (A) at $\omega_2=\omega_1-\nu$ and (B) at $\omega_1=-\omega_2$ with the corresponding mirror operators $M_{\text{A}}$ and $M_{\text{B}}$ respectively. In the table we show the transformation behavior of $\Gamma^{\#_1\#_2\#_3\#_4}_{d/m}(i\omega_1;i\omega_2|i\omega_1-i\nu;i\omega_2+i\nu)$ under $M_{\text{A}}$ and $M_{\text{B}}$. \[tabellespiegelung\] For $\nu=0$ one can furthermore show that $\Gamma^{1221}_{d/m}\in\mathbb{R}$ and $\Gamma^{1122}_{d/m}\in\mathbb{R}$. In presenting the data, we will restrict the discussion to the case of zero transfer frequencies $\nu$, either for the charge or the magnetic channel. Based on the experience from the single-site vertex, this data contains the main features, which would get shifted or split, but not changed drastically in the case of finite frequency transfer. ### Insulating phase In Fig. \[vertexplot3\] we show the vertices $|\Gamma^{1111}_{d/m}(i\omega_1;i\omega_2|i\omega_1;i\omega_2)\mp U/4|$, $|\Gamma^{1212}_{d/m}(i\omega_1;i\omega_2|i\omega_1;i\omega_2)\mp U/4|$, $\Gamma^{1221}_{d/m}(i\omega_1;i\omega_2|i\omega_1;i\omega_2)\mp U/4$ and $\Gamma^{1122}_{d/m}(i\omega_1;i\omega_2|i\omega_1;i\omega_2)\mp U/4$ for $U = 10 t$ and $\beta = 30 / t$. Since $\Gamma^{1111}$ and $\Gamma^{1212}$ are complex-valued we plot their absolute values. In the density and magnetic part of $\Gamma^{1111}$ and $\Gamma^{1221}$, the only apparent feature is a ’+’-shaped structure, which reaches its maximum in the center at $(\omega_1=0,\omega_2=0)$. It is much more broadened compared to the single-site DMFT (Fig. \[vertexplot1\]) and its width increases with the interaction $U$. The density and magnetic part of $\Gamma^{1212}$ and $\Gamma^{1122}$ are dominated by a peaked diagonal frequency structure at $\omega_1=\omega_2$, which reaches its maximum at $(\omega_1=0,\omega_2=0)$. Except for the magnetic part of $\Gamma^{1122}$, an additional ’+’-shaped structure is only very weakly pronounced. Snapshots of the peaked structure at $\omega_1=\omega_2$ along or parallel to the main diagonal can be described by a Lorentzian with width $\approx J$. This should be compared to the local vertex of the single-site DMFT (cf. Fig. \[vertexplot1\]). Here the antiferromagnetic coupling $J$ is absent and also the peaked structure at $\omega_2=\omega_1$ is $\delta$-shaped, i.e. its width is equal to zero. This difference is mainly caused by the fact that in the two-site core, the localized spins couple antiferomagnetically and form a singlet. The embedding of this core in the gapped bath only leads to quantitative changes, but without allowing for longer-ranged spin correlations in this cluster DMFT framework, the singlet character does not change. Therefore, qualitatively, the important features in the frequency structure of the embedded vertex are already visible in the vertex of the isolated two-site Hubbard model, which serves as ’core’ in our cluster DMFT scheme. Hence, if one tries to describe a short-range correlated system, using a finite-site vertex of a core with qualitatively similar properties may be a good approximation or guide to look for viable parametrizations. Near phase transitions the picture may become more complicated [@Roh11]. ![image](vertexdensityu10u10beta30par1111.pdf){width="40.00000%"} ![image](vertexmagneticu10u10beta30par1111.pdf){width="40.00000%"} ![image](vertexdensityu10u10beta30par1212.pdf){width="40.00000%"} ![image](vertexmagneticu10u10beta30par1212.pdf){width="40.00000%"} ![image](vertexdensityu10u10beta30par1221.pdf){width="40.00000%"} ![image](vertexmagneticu10u10beta30par1221.pdf){width="40.00000%"} ![image](vertexdensityu10u10beta30par1122.pdf){width="40.00000%"} ![image](vertexmagneticu10u10beta30par1122.pdf){width="40.00000%"} In Fig. \[pictspinsusceptibility2sitecluster\] we show the local and next-neighbor spin susceptibilities on the Matsubara-axis. In contrast to the single-site DMFT (cf. Figure \[pictspinsusceptibilitymatsubarainsulatingphase\]) no term $\propto \delta_{\nu,0}$ occurs in the local spin susceptibility, which was characteristic for a free spin degree of freedom. Now, the spin moments are screened by an antiferromagnetic exchange interaction. The Pad$\acute{\text{e}}$-spectra show sharp spin excitations at certain values $\pm \Delta E^{\text{spin}}_{ij}$ and the Matsubara data are consistent with a functional dependence of the form $\chi^{\text{spin}}_{ij}(i\nu)\sim (-1)^{(i-j)} \frac{\Delta E^{\text{spin}}_{ij}}{\nu^2+(\Delta E^{\text{spin}}_{ij})^2}$. The spin excitation energy in the two-site Hubbard model is given by $\Delta E^{\text{spin}}_{\text{2-site},11}=\Delta E^{\text{spin}}_{\text{2-site},12}=\Delta E^{\text{spin}}_{\text{2-site}}=\left(\sqrt{U^2+16 t^2}-U\right)/2$. It is equal to the antiferromagnetic exchange energy $J_\text{2-site}$ in the corresponding two-site Heisenberg model. In Table \[tabellespinspincoupling\] we present the fitted values $\Delta E^{\text{spin}}_{11}$, $\Delta E^{\text{spin}}_{12}$ and $\Delta E^{\text{spin}}_{\text{2-site}}$ for the data in Fig. \[pictspinsusceptibility2sitecluster\]. Not unexpectedly, the trend shows that for increasing insulating character, i.e. larger $U$, the excitation energies come closer to the value of the isolated two-site cluster. $U / t$ $\Delta E^{\text{spin}}_{11} / t$ $\Delta E^{\text{spin}}_{12} / t$ $\Delta E^{\text{spin}}_{\text{2-site}}/t$ --------- ----------------------------------- ----------------------------------- -------------------------------------------- 10 0.351 0.357 0.385 12 0.310 0.316 0.325 14 0.274 0.280 0.280 : Spin excitation energies $\Delta E^{\text{spin}}_{11}$ and $\Delta E^{\text{spin}}_{12}$ obtained from the data in Figure (\[pictspinsusceptibility2sitecluster\]) in comparison with the two-site Hubbard model $\Delta E^{\text{spin}}_{\text{2-site}}=J_{\text{2-site}}=\left(\sqrt{U^2+16 t^2}-U\right)/2$. \[tabellespinspincoupling\] ![image](spinsusceptibility11beta30u10u12u14.pdf){width="45.00000%"} ![image](spinsusceptibility12beta30u10u12u14.pdf){width="45.00000%"} ### Metallic phase {#metallic-phase-1} In Fig. \[vertexplot4\] we show the vertices $|\Gamma^{1111}_{d/m}(i\omega_1;i\omega_2|i\omega_1;i\omega_2)\mp U/4|$, $|\Gamma^{1212}_{d/m}(i\omega_1;i\omega_2|i\omega_1;i\omega_2)\mp U/4|$, $\Gamma^{1221}_{d/m}(i\omega_1;i\omega_2|i\omega_1;i\omega_2)\mp U/4$ and $\Gamma^{1122}_{d/m}(i\omega_1;i\omega_2|i\omega_1;i\omega_2)\mp U/4$ for $U = 4 t$ and $\beta = 30 / t$, i.e. in the metallic phase. ![image](vertexdensityu4u4beta30par1111.pdf){width="40.00000%"} ![image](vertexmagneticu4u4beta30par1111.pdf){width="40.00000%"} ![image](vertexdensityu4u4beta30par1212.pdf){width="40.00000%"} ![image](vertexmagneticu4u4beta30par1212.pdf){width="40.00000%"} ![image](vertexdensityu4u4beta30par1221.pdf){width="40.00000%"} ![image](vertexmagneticu4u4beta30par1221.pdf){width="40.00000%"} ![image](vertexdensityu4u4beta30par1122.pdf){width="40.00000%"} ![image](vertexmagneticu4u4beta30par1122.pdf){width="40.00000%"} Compared to the insulating phase, the obtained frequency structures are now even richer. The density and magnetic parts of $\Gamma^{1111}$ and the density part of $\Gamma^{1221}$ are beyond a simple description and posses rather detailed structures along the $\omega_1=\omega_2$ and $\omega_1=-\omega_2$ lines, overlaid by an additional ’+’-shaped structure. Opposite to the insulating case, the vertices become minimal in their absolute values at this ’+’-shaped structure, especially at the point $(\omega_{1}=0,\omega_{2}=0)$, rather than reaching a maximum. This is best visible in the magnetic part of $\Gamma^{1221}$, which is determined solely by this structure. Except to this different behavior at the ’+’-shaped structure, the vertices $\Gamma^{1212}$ and $\Gamma^{1122}$ are similar to the corresponding vertices in the insulating phase. Conclusions {#sec:conclusions} =========== In this paper we showed that a recently introduced[@Kin13] fRG scheme for Anderson impurity problems can serve as an efficient and flexible impurity solver for the dynamical mean-field theory. Using this new impurity solver, we studied in the first part of the paper the half-filled Hubbard model on a Bethe lattice in infinite dimension. This showed that the hallmarks of metallic and insulating phases can be reproduced, although the transition region could not be resolved very clearly, at least with the current implementation. While we think that it is interesting and important to explore new impurity solvers, we certainly do not claim that the current version of this fRG impurity solver is superior to the established techniques with respect to single-particle properties. However, a quantity that has not been investigated thoroughly in the past but that is quite easily accessible in the fRG impurity solver is the local one-particle irreducible vertex function. It explicitly appears in the fRG solution of the impurity problem and is hence obtained at no additional cost. We obtained its density and magnetic part for the insulating and the metallic phase in good qualitative agreement with recent calculations using DMFT with exact diagonalization as impurity solver.[@Roh12] Understanding the frequency structure of this vertex function in DMFT is important for several reasons. On the one hand it is an important ingredient of perturbative DMFT extensions that include nonlocal degrees of freedom,[@Stan04; @Tos07; @Hel08; @Rub08; @Rub09; @Roh13; @Tar13] but also in the single-site DMFT two-particle correlation functions can be used to identify nonperturbative precursors of the Mott physics inside the metallic phase of the MIT.[@Schae13] Note that there are additional ways to separate the 1PI vertex into other parts, like the fully irreducible vertex and 2PI vertices, see Ref. . As shown in this reference, these other vertices show slightly reduced complexity in their frequency structures, but also remain a nontrivial function of the frequencies. In order to keep the discussion manageable, we have not taken this road and only present data for the 1PI vertex. In the second part of the paper we studied the Hubbard model on a square lattice in two dimensions within a two-site cluster DMFT approach. In this scheme, antiferromagnetic fluctuations between nearest neighbored sites are included. We obtained the density and magnetic part of the cluster vertex functions for the insulating and the metallic case. From the local and next-neighbor spin susceptibility we obtained the spin-spin coupling $J$ as function of $U$ in the insulating phase. Quite generally, our data support the findings of Ref. that the vertices show rich structure, including ’+’-structures that cannot be parametrized in terms of the ’bosonic’ transfer frequencies. While the physical meaning of these structures beyond a connection to higher-order diagrams is not obvious, they represent a formidable challenges for above-mentioned approaches that want to use the DMFT vertices as input in order to explore correlations on longer scales, in particular if wave vector dependencies are supposed to be added. Beyond this principal statement, we can use our data to make two valuable comparisons. First we can study [*a)*]{} the difference between the vertices in the metallic and the insulating phase. Second we can [*b)*]{} scrutinize what changes occur when nonlocal correlations are included. Regarding comparison [*a)*]{}, we find much milder frequency dependences in the metallic case. In particular, the sharp bosonic features of the single-site solution are smeared out, and the ’+’-structures are broadened as well. Furthermore, many (but not all) cross sections of the vertices in the metallic phase show a reduction at low frequencies compared to high frequencies which points to a screening effect. In the insulating state, the opposite is found. Here, the low frequency vertices are mostly enhanced. Finally, in the metallic phase of the single-site solution one can also find enhancement features at zero incoming frequency, pointing to the role of pairing fluctuations. These cannot be seen in the insulating state, and these features are also much weaker in the two-site solution, possibly due to the spin gap. Note that the possible soft collective fluctuations that are not captured by the present cluster schemes could lead to additional frequency structures. Their systematics should however correspond to what is known from random-phase approximation or related approaches. Comparison [*b)*]{} between single-site and two-site DMFT vertices shows on one hand that new features and energy scales can come in. Our data describe how the sharp delta-like diagonal features for fixed frequency transfer get broadened. These structures were indicative of a free moment in the insulating single-site solution and caused a peak in the spin susceptibility at zero Matsubara frequency. Now, the insulating two-site solution displays the exchange energy scale $J$, both in the vertex and the spin susceptibility. The embedding of the two-site core in the DMFT causes only slight additional broadenings. Beyond these expected changes, the frequency structures are definitely dispersive, as can be seen from the vertices for different wavevector combinations. From our work one can only see that nonlocal correlations have a definite effect on the vertices. However, we are far away from understanding how far one should go in the cluster size to obtain convergence, e.g., of the local vertex. Yet, at least for larger $U$, the behavior on a nearest neighbor bond captured in our results should contain the dominant strong coupling physics, unless phase transitions with diverging length scales or geometric frustration comes into play. To obtain the local dynamic charge- and spin susceptibilites from our vertex data is more challenging due to the finite frequency patching and the different speed of convergence of the connected and disconnected parts of the susceptibilities, but we still managed to estimate effective exchange coupling from the data. Yet, the analytical continuation by a Pad$\acute{\text{e}}$-algorithm does not deliver meaningful results for all sets of parameters. One might try to achieve better results by an appropriate parametrization of the vertex function in the lines of Ref. . Note, that frequency dependent vertex corrections are found to be essential for understanding experimentally observed dynamic susceptibilites in realistic material calculations, as for example in the case of iron-based superconductors.[@Par11; @Tos12; @Liu12] Therefore, there is a great need for developing new flexible solvers, that facilitate the heavy calculation of these quantities in realistic multi-orbital cases. We thank S. Andergassen, A. Liebsch, C. Taranto and A. Toschi for helpful discussions and for providing data for comparison. This work was supported by the DFG research units FOR 732 and FOR 912. Green’s and Vertex functions {#sec:appendixa} ============================ The n-particle Green’s functions are defined as the time ordered expectation values by [@Neg88] $$\begin{aligned} \nonumber &&\mathcal{G}^{(n)}(\alpha_1\tau_1,...,\alpha_n\tau_n|\alpha_{1'}\tau_{1'},...,\alpha_{n'}\tau_{n'})\\ \nonumber &=&(-1)^n\langle\langle T_{\tau}a_{\alpha_1}(\tau_1)...a_{\alpha_n}(\tau_n)a^{\dag}_{\alpha_{n'}}(\tau_{n'})...a^{\dag}_{\alpha_{1'}}(\tau_{1'})\rangle\rangle_{Z}\\ &=& \frac{(-1)^n}{Z}\textrm{Tr}\left[\exp\left(-\beta\hat{H}\right)T_{\tau}a_{\alpha_1}(\tau_1)...a_{\alpha_n}(\tau_n)a^{\dag}_{\alpha_{n'}}(\tau_{n'})...a^{\dag}_{\alpha_{1'}}(\tau_{1'})\right]\end{aligned}$$ with the time dependent Heisenberg operators $$a_{i}^{(\dag)}(\tau)=\exp\left(\tau\hat{H}\right)a_{i}^{(\dag)}\exp\left(-\tau\hat{H}\right).$$ The Fourier transform of the Green’s functions is given by $$\begin{aligned} \nonumber \mathcal{G}^{(n)}(\alpha_1\tau_1,...,\alpha_n\tau_n|\alpha_{1'}\tau_{1'},...,\alpha_{n'}\tau_{n'}) &=& \frac{1}{\beta^{2n}}\sum_{i\omega_{1},...,i\omega_{n}}\sum_{i\omega_{1'},...,i\omega_{n'}} \textrm{e}^{-\sum_{j}i\omega_{j}\tau_{j}}\textrm{e}^{\sum_{j}i\omega_{j'}\tau_{j'}}\\ &&\times\mathcal{G}^{(n)}(\alpha_1\omega_1,...,\alpha_n\omega_n|\alpha_{1'}\omega_{1'},...,\alpha_{n'}\omega_{n'}),\\ \nonumber \mathcal{G}^{(n)}(\alpha_1\omega_1,...,\alpha_n\omega_n|\alpha_{1'}\omega_{1'},...,\alpha_{n'}\omega_{n'})) &=& \int_{0}^{\beta}\textrm{d}\tau_{1}...\int_{0}^{\beta}\textrm{d}\tau_{n}\int_{0}^{\beta}\textrm{d}\tau_{1'}...\int_{0}^{\beta}\textrm{d}\tau_{n'} \textrm{e}^{\sum_{j}i\omega_{j}\tau_{j}}\textrm{e}^{-\sum_{j}i\omega_{j'}\tau_{j'}}\\ &&\times\mathcal{G}^{(n)}(\alpha_1\tau_1,...,\alpha_n\tau_n|\alpha_{1'}\tau_{1'},...,\alpha_{n'}\tau_{n'}).\end{aligned}$$ In the following, if not stated otherwise, the multi index $\alpha_i$ stands for either $(\alpha_i,\tau_i)$ or $(\alpha_i,\omega_i)$. By subtracting the disconnected parts of $\mathcal{G}^{(2)}$ one gets the connected two-particle Green’s function $$\begin{aligned} \mathcal{G}^{c,(2)}(\alpha_1,\alpha_2|\alpha_{1'},\alpha_{2'})&=&\mathcal{G}^{(2)}(\alpha_1,\alpha_2|\alpha_{1'},\alpha_{2'}) -\mathcal{G}^{(1)}(\alpha_1|\alpha_{1'})\mathcal{G}^{(1)}(\alpha_2|\alpha_{2'}) +\mathcal{G}^{(1)}(\alpha_1|\alpha_{2'})\mathcal{G}^{(1)}(\alpha_2|\alpha_{1'}).\end{aligned}$$ From $\mathcal{G}^{c,(2)}$ one obtains the 1PI-Vertex-function by amputing the full one-particle Green’s functions at the outer legs $$\begin{aligned} \label{eqrelationcongreensfunctionvertex} \Gamma(\alpha_1,\alpha_2|\alpha_{1'},\alpha_{2'}) =-\sum_{\beta_1,\beta_2\atop\beta_{1'}\beta_{2'}}\left[\mathcal{G}^{(1)}\right]^{-1}_{\alpha_1,\beta_1} \left[\mathcal{G}^{(1)}\right]^{-1}_{\alpha_2,\beta_2}\mathcal{G}^{c,(2)}(\beta_{1},\beta_{2}|\beta_{1'},\beta_{2'})\left[\mathcal{G}^{(1)}\right]^{-1}_{\beta_{1'},\alpha_{1'}} \left[\mathcal{G}^{(1)}\right]^{-1}_{\beta_{2'},\alpha_{2'}}.\end{aligned}$$ Dynamic susceptibilities ======================== If we assume spin rotation invariance, a general two-particle Green’s function can be parameterized in the following way: $$\label{eqzerlegunggreensfunktionspinchannel} \mathcal{G}^{(2)}\left(\alpha_1,\sigma_1;\alpha_2,\sigma_2|\alpha_{1'},\sigma_{1'};\alpha_{2'},\sigma_{2'}\right) =\mathcal{A}\left(\alpha_1,\alpha_2|\alpha_{1'},\alpha_{2'}\right)\delta_{\sigma_1,\sigma_{1'}}\delta_{\sigma_2,\sigma_{2'}} +\mathcal{B}\left(\alpha_1,\alpha_2|\alpha_{1'},\alpha_{2'}\right)\delta_{\sigma_1,\sigma_{2'}}\delta_{\sigma_2,\sigma_{1'}}$$ Because $\mathcal{G}^{(2)}(1,2|1',2')$ is antisymmetric under the permutations $1\leftrightarrow 2$ and $1'\leftrightarrow 2'$ the functions $\mathcal{A}$ and $\mathcal{B}$ obey the relation $$\mathcal{A}\left(\alpha_1,\alpha_2|\alpha_{1'},\alpha_{2'}\right)=-\mathcal{B}\left(\alpha_1,\alpha_2|\alpha_{2'},\alpha_{1'}\right)= -\mathcal{B}\left(\alpha_2,\alpha_1|\alpha_{1'},\alpha_{2'}\right).$$ Using the identity $$2\delta_{\sigma_1,\sigma_{2'}}\delta_{\sigma_2,\sigma_{1'}}=\delta_{\sigma_1,\sigma_{1'}}\delta_{\sigma_2,\sigma_{2'}} +\vec{\sigma}_{\sigma_1,\sigma_{1'}}\vec{\sigma}_{\sigma_2,\sigma_{2'}},$$ we write the two-particle Green’s function as $$\mathcal{G}^{(2)}\left(\alpha_1,\sigma_1;\alpha_2,\sigma_2|\alpha_{1'},\sigma_{1'};\alpha_{2'},\sigma_{2'}\right)= \mathcal{G}^{(2)}_{d}\left(\alpha_1,\alpha_2|\alpha_{1'},\alpha_{2'}\right)\delta_{\sigma_1,\sigma_{1'}}\delta_{\sigma_2,\sigma_{2'}} +\mathcal{G}^{(2)}_{m}\left(\alpha_1,\alpha_2|\alpha_{1'},\alpha_{2'}\right)\vec{\sigma}_{\sigma_1,\sigma_{1'}}\vec{\sigma}_{\sigma_2,\sigma_{2'}}$$ with the density part $\mathcal{G}^{(2)}_{d}$ and the magnetic part $\mathcal{G}^{(2)}_{m}$ given by $$\begin{aligned} \label{eqdensitypart} \mathcal{G}^{(2)}_{d}\left(\alpha_1,\alpha_2|\alpha_{1'},\alpha_{2'}\right)&=& \mathcal{A}\left(\alpha_1,\alpha_2|\alpha_{1'},\alpha_{2'}\right)+\frac{1}{2}\mathcal{B}\left(\alpha_1,\alpha_2|\alpha_{1'},\alpha_{2'}\right),\\ \label{eqmagneticpart} \mathcal{G}^{(2)}_{m}\left(\alpha_1,\alpha_2|\alpha_{1'},\alpha_{2'}\right)&=& \frac{1}{2}\mathcal{B}\left(\alpha_1,\alpha_2|\alpha_{1'},\alpha_{2'}\right).\end{aligned}$$ In an analogue way one can define a density and magnetic part of the connected Green’s function $\mathcal{G}^{c,(2)}_{d/m}$ and of the 1PI vertex function $\Gamma_{d/m}$. Dynamic charge susceptibility ----------------------------- The dynamic charge susceptibility is defined as $$\chi^{\text{charge}}_{ij}\left(i\nu\right)=\int_{0}^{\beta}\textrm{d}\tau \textrm{e}^{i\nu\tau}\left[\left\langle\left\langle T_{\tau}\left(\hat{\rho}_{i}(\tau)\hat{\rho}_{j}(0)\right)\right\rangle\right\rangle -\langle\langle\hat{\rho}_i\rangle\rangle \langle\langle\hat{\rho}_j\rangle\rangle\right]$$ with the density-operator $$\hat{\rho}_{i}=\sum_{\sigma}c_{i\sigma}^{\dag}c_{i\sigma}.$$ The expectation value is given by a two-particle Green’s function $$\begin{aligned} \label{eqdynamicchargesusceptibilitydef} \nonumber \chi^{\text{charge}}_{ij}\left(i\nu\right)&=&\int_{0}^{\beta}\textrm{d}\tau \textrm{e}^{i\nu\tau} \sum_{\sigma,\sigma'}\mathcal{G}^{(2)}\left(i,\sigma,\tau;j,\sigma',0^{-}|i,\sigma,\tau;j,\sigma'\right) -\beta\delta_{\nu,0}\langle\langle\hat{\rho}_i\rangle\rangle \langle\langle\hat{\rho}_j\rangle\rangle\\ \nonumber &=& \frac{1}{\beta^2}\sum_{i\omega_1,i\omega_2}\sum_{\sigma,\sigma'}\mathcal{G}^{(2)}\left(i,\sigma,i\omega_1;j,\sigma',i\omega_2| i,\sigma,i\omega_1-i\nu;j,\sigma'\right) -\beta\delta_{\nu,0}\langle\langle\hat{\rho}_i\rangle\rangle \langle\langle\hat{\rho}_j\rangle\rangle\\ \nonumber &=& \frac{4}{\beta^2}\sum_{i\omega_1,i\omega_2}\mathcal{G}^{(2)}_{d}\left(i,i\omega_1;j,i\omega_2|i,i\omega_1-i\nu;j\right) -\beta\delta_{\nu,0}\langle\langle\hat{\rho}_i\rangle\rangle \langle\langle\hat{\rho}_j\rangle\rangle\\ \nonumber &=& \frac{4}{\beta^2}\sum_{i\omega_1,i\omega_2}\mathcal{G}^{c,(2)}_{d}\left(i,i\omega_1;j,i\omega_2|i,i\omega_1-i\nu;j\right) -\frac{2}{\beta}\sum_{i\omega}\mathcal{G}\left(i\omega,i,j\right)\mathcal{G}\left(i\omega-i\nu,j,i\right)\\ &=& \chi^{\text{charge},c}_{ij}\left(i\nu\right)+\chi^{\text{charge},dc}_{ij}\left(i\nu\right).\end{aligned}$$ Here we used that the density part $\mathcal{G}^{(2)}_d$ is given by $$\mathcal{G}^{(2)}_{d}\left(i,i\omega_1;j,i\omega_2|i,i\omega_1-i\nu;j\right)= \frac{1}{2}\left(\mathcal{G}^{(2)}\left(i,\uparrow,i\omega_1;j,\uparrow,i\omega_2|i,\uparrow,i\omega_1-i\nu;j,\uparrow\right) +\mathcal{G}^{(2)}\left(i,\uparrow,i\omega_1;j,\downarrow,i\omega_2|i,\uparrow,i\omega_1-i\nu;j,\downarrow\right)\right)$$ and $$\langle\langle\hat{\rho}_i\rangle\rangle=\frac{2}{\beta}\sum_{i\omega}\textrm{e}^{i\omega0^{+}}\mathcal{G}\left(i\omega,i,i\right).$$ Dynamic spin susceptibility --------------------------- The dynamic spin susceptibility is defined as $$\chi^{\text{spin}}_{ij}\left(i\nu\right)=\int_{0}^{\beta}\textrm{d}\tau \textrm{e}^{i\nu\tau}\left\langle\left\langle T_{\tau}\left(\hat{S}_{i}^{+}(\tau)\hat{S}_{j}^{-}(0)\right)\right\rangle\right\rangle$$ with the spin operators $$\begin{aligned} \hat{S}_{i}^{+}(\tau)=c_{i\uparrow}^{\dag}(\tau)c_{i\downarrow}(\tau),\\ \hat{S}_{i}^{-}(\tau)=c_{i\downarrow}^{\dag}(\tau)c_{i\uparrow}(\tau).\end{aligned}$$ The expectation value is given by a two-particle Green’s function $$\begin{aligned} \label{eqdynamicspinsusceptibilitydef} \nonumber \chi^{\text{spin}}_{ij}\left(i\nu\right)&=&-\int_{0}^{\beta}\textrm{d}\tau \textrm{e}^{i\nu\tau} \mathcal{G}^{(2)}\left(j,\uparrow,0^{-};i,\downarrow,\tau|i,\uparrow,\tau;j,\downarrow\right)\\ \nonumber &=& -\frac{1}{\beta^2}\sum_{i\omega_{1},i\omega_{2}}\mathcal{G}^{(2)}\left(j,\uparrow,i\omega_{1};i,\downarrow,i\omega_{2}|i,\uparrow,i\omega_{2}-i\nu;j,\downarrow\right)\\ \nonumber &=& \frac{2}{\beta^2}\sum_{i\omega_{1},i\omega_{2}}\mathcal{G}^{(2)}_{m}\left(i,i\omega_{2};j,i\omega_{1}|i,i\omega_{2}-i\nu;j\right)\\ \nonumber &=& \frac{2}{\beta^2}\sum_{i\omega_{1},i\omega_{2}}\mathcal{G}^{c,(2)}_{m}\left(i,i\omega_{2};j,i\omega_{1}|i,i\omega_{2}-i\nu;j\right)-\frac{1}{\beta}\sum_{i\omega}\mathcal{G}\left(i\omega,i,j\right)\mathcal{G}\left(i\omega-i\nu,j,i\right)\\ &=& \chi_{ij}^{\text{spin},c}\left(i\nu\right)+\chi_{ij}^{\text{spin},dc}\left(i\nu\right).\end{aligned}$$ Local Hubbard model ------------------- The Hamiltonian of the one-site Hubbard model (for $\mu=-U/2$ i.e. particle-hole symmetry), which serves as ’core’ in our single-site DMFT(fRG) scheme for the insulating phase, is given by $$\hat{H}=-\frac{U}{2}\sum_{\sigma}n_{\sigma}+U n_{\uparrow} n_{\downarrow}.$$ From the one-particle Green’s function $$\begin{aligned} \nonumber \mathcal{G}(i\omega)&=&\frac{i\omega}{(i\omega)^2-\frac{U^2}{4}}\\ &=& \frac{1}{i\omega+U/2-\Sigma(i\omega)}\end{aligned}$$ follows the self-energy as $$\label{eqlocalhubbardmodelselfenergy} \Sigma(i\omega)=\frac{U}{2}+\frac{U^2}{4i\omega}.$$ The two-particle 1PI vertex function [@Haf09] is given by $$\begin{aligned} \label{eqvertexsinglehubbardsite} \Gamma\left(\uparrow,i\omega_1;\uparrow,i\omega_2|\uparrow,i\omega_1';\uparrow\right) &=&-\beta \frac{U^2}{4}\frac{\delta_{\omega_1,\omega_1'}-\delta_{\omega_2,\omega_1'}}{(i\omega_1)^2 (i\omega_2)^2}\left[(i\omega_1)^2-\frac{U^2}{4}\right]\left[(i\omega_2)^2-\frac{U^2}{4}\right],\\ \nonumber \Gamma\left(\uparrow,i\omega_1;\downarrow,i\omega_2|\uparrow,i\omega_1';\downarrow\right) &=& U + \left(\frac{U}{2}\right)^3\frac{\sum_{i=1,2,1',2'}(i\omega_i)^2}{\prod_{i=1,2,1',2'}(i\omega_i)} -6\left(\frac{U}{2}\right)^5\prod_{i=1,2,1',2'}\frac{1}{(i\omega_i)}\\ \nonumber &&-\beta \delta_{\omega_1,-\omega_2} \frac{U^2}{2} n_{F}\left(\frac{U}{2}\right)\frac{\left[(i\omega_1)^2-\frac{U^2}{4}\right]\left[(i\omega_{1'})^2-\frac{U^2}{4}\right]}{(i\omega_1)^2 (i\omega_{1'})^2}\\ \nonumber &&+\beta \delta_{\omega_2,\omega_1'} \frac{U^2}{2} n_{F}\left(-\frac{U}{2}\right)\frac{\left[(i\omega_1)^2-\frac{U^2}{4}\right]\left[(i\omega_{1'})^2-\frac{U^2}{4}\right]}{(i\omega_1)^2 (i\omega_{1'})^2}\\ &&-\beta \delta_{\omega_1,\omega_1'} \frac{U^2}{4} \left(n_{F}\left(\frac{U}{2}\right)-n_{F}\left(-\frac{U}{2}\right)\right) \frac{\left[(i\omega_1)^2-\frac{U^2}{4}\right]\left[(i\omega_2)^2-\frac{U^2}{4}\right]}{(i\omega_1)^2 (i\omega_2)^2}\end{aligned}$$ with $\omega_2'=\omega_1+\omega_2-\omega_1'$ and the Fermi function $$n_{F}(x)=\frac{1}{1+\exp\left(\beta x\right)}.$$ The density and magnetic part of $\Gamma$ follow with Eqs. (\[eqdensitypart\]) and (\[eqmagneticpart\]) as $$\begin{aligned} \nonumber \Gamma_{d}\left(i\omega_1,i\omega_2|i\omega_{1'}\right)&=&\frac{1}{2}\left[\Gamma\left(\uparrow,i\omega_1;\uparrow,i\omega_2|\uparrow,i\omega_1';\uparrow\right) +\Gamma\left(\uparrow,i\omega_1;\downarrow,i\omega_2|\uparrow,i\omega_1';\downarrow\right)\right]\\ \nonumber &=&\frac{U}{2} + \frac{1}{2}\left(\frac{U}{2}\right)^3\frac{\sum_{i=1,2,1',2'}(i\omega_i)^2}{\prod_{i=1,2,1',2'}(i\omega_i)} -3\left(\frac{U}{2}\right)^5\prod_{i=1,2,1',2'}\frac{1}{(i\omega_i)}\\ \nonumber &&-\beta\delta_{\omega_1,-\omega_2}\frac{U^2}{4}n_{F}\left(\frac{U}{2}\right) \frac{\left[(i\omega_1)^2-\frac{U^2}{4}\right]\left[(i\omega_{1'})^2-\frac{U^2}{4}\right]}{(i\omega_1)^2 (i\omega_{1'})^2}\\ \nonumber &&+\beta\delta_{\omega_2,\omega_{1'}}\frac{U^2}{4}\left[\frac{1}{2}+n_{F}\left(-\frac{U}{2}\right)\right] \frac{\left[(i\omega_1)^2-\frac{U^2}{4}\right]\left[(i\omega_{2})^2-\frac{U^2}{4}\right]}{(i\omega_1)^2 (i\omega_{2})^2}\\ \label{eqlocalvertexdensity} &&-\beta\delta_{\omega_1,\omega_{1'}}\frac{U^2}{4}n_{F}\left(\frac{U}{2}\right) \frac{\left[(i\omega_1)^2-\frac{U^2}{4}\right]\left[(i\omega_{2})^2-\frac{U^2}{4}\right]}{(i\omega_1)^2 (i\omega_{2})^2},\end{aligned}$$ $$\begin{aligned} \nonumber \Gamma_{m}\left(i\omega_1,i\omega_2|i\omega_{1'}\right) &=&\frac{1}{2}\left[\Gamma\left(\uparrow,i\omega_1;\uparrow,i\omega_2|\uparrow,i\omega_1';\uparrow\right) -\Gamma\left(\uparrow,i\omega_1;\downarrow,i\omega_2|\uparrow,i\omega_1';\downarrow\right)\right]\\ \nonumber &=&-\frac{U}{2} - \frac{1}{2}\left(\frac{U}{2}\right)^3\frac{\sum_{i=1,2,1',2'}(i\omega_i)^2}{\prod_{i=1,2,1',2'}(i\omega_i)} +3\left(\frac{U}{2}\right)^5\prod_{i=1,2,1',2'}\frac{1}{(i\omega_i)}\\ \nonumber &&+\beta\delta_{\omega_1,-\omega_2}\frac{U^2}{4}n_{F}\left(\frac{U}{2}\right) \frac{\left[(i\omega_1)^2-\frac{U^2}{4}\right]\left[(i\omega_{1'})^2-\frac{U^2}{4}\right]}{(i\omega_1)^2 (i\omega_{1'})^2}\\ \nonumber &&+\beta\delta_{\omega_2,\omega_{1'}}\frac{U^2}{4}\left[\frac{1}{2}-n_{F}\left(-\frac{U}{2}\right)\right] \frac{\left[(i\omega_1)^2-\frac{U^2}{4}\right]\left[(i\omega_{2})^2-\frac{U^2}{4}\right]}{(i\omega_1)^2 (i\omega_{2})^2}\\ \label{eqlocalvertexmagnetic} &&-\beta\delta_{\omega_1,\omega_{1'}}\frac{U^2}{4}n_{F}\left(-\frac{U}{2}\right) \frac{\left[(i\omega_1)^2-\frac{U^2}{4}\right]\left[(i\omega_{2})^2-\frac{U^2}{4}\right]}{(i\omega_1)^2 (i\omega_{2})^2}\end{aligned}$$ with $\omega_2'=\omega_1+\omega_2-\omega_1'$. With Eq. (\[eqdynamicchargesusceptibilitydef\]) one gets the dynamic charge susceptibility $$\begin{aligned} \chi^{\text{charge},c}\left(i\nu\right)&=&-U \frac{n_{F}\left(\frac{U}{2}\right)-n_{F}\left(-\frac{U}{2}\right)}{(i\nu)^2-U^2} +\beta\delta_{\nu,0}n_{F}\left(\frac{U}{2}\right)^2,\\ \chi^{\text{charge},dc}\left(i\nu\right)&=&U \frac{n_{F}\left(\frac{U}{2}\right)-n_{F}\left(-\frac{U}{2}\right)}{(i\nu)^2-U^2} +\beta\delta_{\nu,0} n_F\left(\frac{U}{2}\right)n_F\left(-\frac{U}{2}\right),\\ \chi^{\text{charge}}\left(i\nu\right)&=&\beta\delta_{\nu,0}n_{F}\left(\frac{U}{2}\right).\end{aligned}$$ With Eq. (\[eqdynamicspinsusceptibilitydef\]) one gets the dynamic spin susceptibility $$\begin{aligned} \label{eqspinsusceptibilityclocalhubbardsite} \chi^{\text{spin},c}\left(i\nu\right)&=&-\frac{U}{2}\frac{n_{F}\left(\frac{U}{2}\right)-n_{F}\left(-\frac{U}{2}\right)}{(i\nu)^2-U^2} +\beta\delta_{\nu,0}\frac{1}{2}n_{F}\left(-\frac{U}{2}\right)^{2},\\ \label{eqspinsusceptibilitydclocalhubbardsite} \chi^{\text{spin},dc}\left(i\nu\right)&=&\frac{U}{2}\frac{n_{F}\left(\frac{U}{2}\right)-n_{F}\left(-\frac{U}{2}\right)}{(i\nu)^2-U^2} +\beta\delta_{\nu,0}\frac{1}{2}n_{F}\left(\frac{U}{2}\right)n_{F}\left(-\frac{U}{2}\right),\\ \label{eqspinsusceptibilitylocalhubbardsite} \chi^{\text{spin}}\left(i\nu\right)&=&\beta\delta_{\nu,0}\frac{1}{2}n_{F}\left(-\frac{U}{2}\right).\end{aligned}$$ fRG flow equations {#sec:appendixfrg} ================== A detailed derivation of the fRG flow equations that are used to solve the impurity problem, given in the form of a semi-infinite tight binding chain, (\[eqhamiltonandersonmodel\]) can be found in Ref. . In the following we show that this formalism can be generalized to impurity problems in the form of a semi infinite $N$-chain ladder like, for example, Eq. \[eqhamiltontwositeandersonmodel\]. The derivation is completely analog to the case before and we just present the important steps. The Hamiltonian of a $N$-chain ladder with an interaction term on the first rung is given by $$\begin{aligned} \label{eqhamiltonnsiteandersonmodel} \nonumber \hat{H}_{\text{N-site-And}}&=&U\sum_{\sigma}\sum_{j=1}^{N}\hat{n}_{d,j,\uparrow}\hat{n}_{d,j,\downarrow} -t^{\perp}_0\sum_{j=1}^{N-1}\sum_{\sigma}\left(d^{\dag}_{j,\sigma}d_{j+1,\sigma}+H.c.\right) -t_{0}\sum_{\sigma}\sum_{j=1}^{N}\left(d^{\dag}_{j,\sigma}b_{1,j,\sigma}+H.c.\right)\\ &&-\sum_{i=1}^{\infty}\sum_{j=1}^{N}\sum_{\sigma}t_i\left(b^{\dag}_{i,j,\sigma}b_{i+1,j,\sigma}+H.c.\right) -\sum_{i=1}^{\infty}\sum_{j=1}^{N-1}\sum_{\sigma}t^{\perp}_{i}\left(b^{\dag}_{i,j,\sigma}b_{i,j+1,\sigma}+H.c.\right),\end{aligned}$$ where at we mulitiply the hopping between the core and the remaining bath rungs by a factor $\Lambda$, i.e. $t_L \rightarrow \Lambda t_L$. The fRG flow is implemented in an effective theory on the bath rung $b_{L+1}$ which follows from the original theory (\[eqhamiltonnsiteandersonmodel\]) by integrating out the core and all bath rungs with index $i>L+1$ in a functional integral representation. Up to the fourth order in the fields, the effective action is given by $$\begin{aligned} \nonumber S^{\text{eff}}\left(\bar{b}_{L+1},b_{L+1}\right)&=&-\frac{1}{\beta}\sum_{i\omega}\sum_{\sigma}\bar{b}_{L+1,\sigma}(i\omega)\hat{Q}^{\text{eff},\Lambda}_{\sigma}(i\omega)b_{L+1,\sigma}(i\omega)\\ &&-\frac{(\Lambda t_{L})^4}{4\beta^3}\sum_{i\omega_1,i\omega_2,\atop i\omega_{1'},i\omega_{2'}}\sum_{i_1,i_2,\atop i_{1'},i_{2'}}\sum_{\sigma_1,\sigma_2,\atop \sigma_{1'},\sigma_{2'}}\bar{b}_{L+1,i_1,\sigma_1}(i\omega_1)\bar{b}_{L+1,i_2,\sigma_2}(i\omega_2)\\ \nonumber &&\times\mathcal{G}^{c,(2)}_{core}\left(i\omega_1,b_{L},i_1,\sigma_1;i\omega_2,b_{L},i_2,\sigma_2|i\omega_{1'},b_{L},i_{1'},\sigma_{1'};i\omega_{2'},b_{L},i_{2'},\sigma_{2'}\right)\\ &&\times b_{L+1,i_{1'},\sigma_{1'}}(i\omega_{1'})b_{L+1,i_{2'},\sigma_{2'}}(i\omega_{2'}) \delta_{\omega_1+\omega_2,\omega_{1'}+\omega_{2'}}\delta_{\sigma_1+\sigma_2,\sigma_{1'}+\sigma_{2'}}\end{aligned}$$ with $$\hat{Q}^{\text{eff},\Lambda}_{\sigma}(i\omega)= i\omega\textbf{1}-\hat{t}^{\perp}_{L+1}-(\Lambda t_L)^2\hat{\mathcal{G}}^{c,(1)}_{\text{core},\sigma}(i\omega,b_L,b_L)-t^2_{L+1}\hat{g}_{b_{L+2},b_{L+3},...}(i\omega,b_{L+2},b_{L+2}).$$ Here we used the abbreviation $\bar{b}_{L+1,\sigma}=\left(\bar{b}_{L+1,1,\sigma},\bar{b}_{L+1,2,\sigma},...,\bar{b}_{L+1,N,\sigma}\right)$ for vectors in the $b_{L+1}$ rung subspace. Matrices in this space are denoted by a hat. $\mathcal{G}^{c,(n)}_{\text{core}}$ is the connected n-particle Green’s function of the isolated core and $g_{b_{L+2},b_{L+3},...}$ the one-particle Green’s function of the bath. $\hat{t}^{\perp}_{L+1}$ is the free hopping matrix on rung $L+1$. Note, that an additional frequency-dependent local term, as for example the local self-energy that arise in a DMFT cycle can be easily included in $\hat{Q}^{\text{eff},\Lambda}_{\sigma}$. The fRG flow equations form an infinite set of differential equations with respect to the parameter $\Lambda$ for the one-particle irreducible vertex functions.[@Wet93; @Sal01; @Met12] We truncate them by neglecting the flow of the three-particle vertex and all higher vertex functions. Then we are left with a coupled set of flow equations for the self-energy $\Sigma^{\Lambda}_{\text{eff}}$ and the two-particle vertex $\Gamma^{\Lambda}_{\text{eff}}$. The latter can be separated into two different spin channels like in Eq. \[eqzerlegunggreensfunktionspinchannel\] and we denote the direct part as $V^{\Lambda}_{\text{eff}}$. The flow equations are given by $$\begin{aligned} \nonumber \frac{d}{d\Lambda}\Sigma^{\Lambda}_{\text{eff}}\left(i\omega,i_1,i_{1'}\right)&=&-\frac{1}{\beta}\sum_{i\omega'}\sum_{i_2,i_{2'}} S^{\Lambda}_{\text{eff}}\left(i\omega',i_{2'},i_2\right) \big[2 V^{\Lambda}_{\text{eff}}\left(i_1,i\omega;i_2,i\omega'|i_{1'},i\omega;i_{2'},i\omega'\right)\\ &&-V^{\Lambda}_{\text{eff}}\left(i_1,i\omega;i_2,i\omega'|i_{2'},i\omega';i_{1'},i\omega\right)\big]\label{eqflussgleichungselbstenergie}\\ \nonumber \frac{d}{d\Lambda}V^{\Lambda}_{\text{eff}}\left(i_1,i\omega_1;i_2,i\omega_2|i_{1'},i\omega_{1'};i_{2'},i\omega_{2'}\right)&=&\Phi^{\Lambda}_{\text{pp}}\left(i_1,i\omega_1;i_2,i\omega_2|i_{1'},i\omega_{1'};i_{2'},i\omega_{2'}\right) +\Phi^{\Lambda}_{\text{dph}}\left(i_1,i\omega_1;i_2,i\omega_2|i_{1'},i\omega_{1'};i_{2'},i\omega_{2'}\right)\\ &&+\Phi^{\Lambda}_{\text{crph}}\left(i_1,i\omega_1;i_2,i\omega_2|i_{1'},i\omega_{1'};i_{2'},i\omega_{2'}\right)\label{eqflussgleichungzweiteilchenvertex}\end{aligned}$$ with $$\begin{aligned} \label{eqppchannel} \Phi^{\Lambda}_{\text{pp}}\left(i_1,i\omega_1;i_2,i\omega_2|i_{1'},i\omega_{1'};i_{2'},i\omega_{2'}\right) &=&\frac{1}{\beta}\sum_{i\omega_3,i\omega_4}\sum_{i_3,i_4\atop i_{3'},i_{4'}}L^{\Lambda}\left(i\omega_3,i\omega_4,i_{3'},i_3,i_{4'},i_4\right)\\ \nonumber &&\times V^{\Lambda}_{\text{eff}}\left(i_3,i\omega_3;i_4,i\omega_4|i_{1'},i\omega_{1'};i_{2'},i\omega_{2'}\right) V^{\Lambda}_{\text{eff}}\left(i_1,i\omega_1;i_2,i\omega_2|i_{3'},i\omega_3;i_{4'},i\omega_4\right)\\ \label{eqdphchannel} \Phi^{\Lambda}_{\text{dph}}\left(i_1,i\omega_1;i_2,i\omega_2|i_{1'},i\omega_{1'};i_{2'},i\omega_{2'}\right) &=&-\frac{1}{\beta}\sum_{i\omega_3,i\omega_4}\sum_{i_3,i_4\atop i_{3'},i_{4'}}L^{\Lambda}\left(i\omega_3,i\omega_4,i_{3'},i_3,i_{4'},i_4\right)\\ &&\times\big[2 V^{\Lambda}_{\text{eff}}\left(i_1,i\omega_1;i_3,i\omega_3|i_{1'},i\omega_{1'};i_{4'},i\omega_4\right) V^{\Lambda}_{\text{eff}}\left(i_2,i\omega_2;i_4,i\omega_4|i_{2'},i\omega_{2'};i_{3'},i\omega_3\right)\nonumber\\ &&- V^{\Lambda}_{\text{eff}}\left(i_1,i\omega_1;i_3,i\omega_3|i_{1'},i\omega_{1'};i_{4'},i\omega_4\right) V^{\Lambda}_{\text{eff}}\left(i_2,i\omega_2;i_4,i\omega_4|i_{3'},i\omega_3;i_{2'},i\omega_{2'}\right)\nonumber\\ &&- V^{\Lambda}_{\text{eff}}\left(i_1,i\omega_1;i_3,i\omega_3|i_{4'},i\omega_4;i_{1'},i\omega_{1'}\right) V^{\Lambda}_{\text{eff}}\left(i_2,i\omega_2;i_4,i\omega_4|i_{2'},i\omega_{2'};i_{3'},i\omega_3\right)\big]\nonumber\\ \label{eqcrphchannel} \Phi^{\Lambda}_{\text{crph}}\left(i_1,i\omega_1;i_2,i\omega_2|i_{1'},i\omega_{1'};i_{2'},i\omega_{2'}\right) &=&\frac{1}{\beta}\sum_{i\omega_3,i\omega_4}\sum_{i_3,i_4\atop i_{3'},i_{4'}}L^{\Lambda}\left(i\omega_3,i\omega_4,i_{3'},i_3,i_{4'},i_4\right)\\ \nonumber &&\times V^{\Lambda}_{\text{eff}}\left(i_2,i\omega_2;i_3,i\omega_3|i_{4'},i\omega_4;i_{1'},i\omega_{1'}\right) V^{\Lambda}_{\text{eff}}\left(i_1,i\omega_1;i_4,i\omega_4|i_{3'},i\omega_3;i_{2'},i\omega_{2'}\right)\end{aligned}$$ and the single scale propagator $$\hat{S}^{\Lambda}_{\text{eff}}(i\omega)=\hat{\mathcal{G}}^{\Lambda}_{\text{eff}}(i\omega)\frac{d}{d\Lambda}\left[\hat{Q}^{\text{eff},\Lambda}(i\omega)\right]\hat{\mathcal{G}}^{\Lambda}_{\text{eff}}(i\omega).$$ The function $L^{\Lambda}$ is defined as $$L^{\Lambda}\left(i\omega_1,i\omega_2,i_1,i_2,i_3,i_4\right)=\mathcal{G}^{\Lambda}_{\text{eff}}\left(i\omega_1,i_1,i_2\right)S^{\Lambda}_{\text{eff}}\left(i\omega_2,i_3,i_4\right) +S^{\Lambda}_{\text{eff}}\left(i\omega_1,i_1,i_2\right)\mathcal{G}^{\Lambda}_{\text{eff}}\left(i\omega_2,i_3,i_4\right)$$ with the Green’s function $$\left[\hat{\mathcal{G}}^{\Lambda}_{\text{eff}}(i\omega)\right]^{-1}=\hat{Q}^{\text{eff},\Lambda}(i\omega)-\hat{\Sigma}^{\Lambda}_{\text{eff}}(i\omega).$$ We use the following replacement in the flow equation for the vertex function (\[eqflussgleichungzweiteilchenvertex\]), which is motivated by the fulfillment of Ward identities in the fRG flow[@Kat04] $$\hat{S}^{\Lambda}_{\text{eff}}\rightarrow-\frac{d\hat{\mathcal{G}}^{\Lambda}_{\text{eff}}}{d\Lambda}=\hat{S}^{\Lambda}_{\text{eff}}-\hat{\mathcal{G}}^{\Lambda}_{\text{eff}}\frac{d\hat{\Sigma}^{\Lambda}_\text{eff}}{d\Lambda}.$$ The initial conditions for $\Lambda=0$ are $$\begin{aligned} \Sigma^{\Lambda=0}_{\text{eff}}\left(i\omega,i_1,i_{1'}\right)&=&0,\\ V^{\Lambda=0}_{\text{eff}}\left(i_1,i\omega_1;i_2,i\omega_2|i_{1'},i\omega_{1'};i_{2'},i\omega_{2'}\right)&=&t_{L}^4 \mathcal{G}^{c,(2)}_{\text{core}}\left(b_L,i_1,\uparrow,i\omega_1;b_L,i_2,\downarrow,i\omega_2|b_L,i_{1'},\uparrow,i\omega_{1'};b_L,i_{2'},\downarrow,i\omega_{2'}\right).\end{aligned}$$ In the most simple approximation the flow of $V^{\Lambda}_{\text{eff}}$ is neglected and only the flow equation for the self-energy (\[eqflussgleichungselbstenergie\]) is integrated (’approximation 1’). Integrating the full set of flow equations (\[eqflussgleichungselbstenergie\]) and (\[eqflussgleichungzweiteilchenvertex\]) is denoted as ’approximation 2’. Finally one needs relations that connects the vertices of the effective theory with those of the original theory $\Sigma$ and $\Gamma$. In the setup of the effective theory one can derive the local Green’s function on rung $b_{L+1}$ from the effective self-energy $\hat{\Sigma}_{\text{eff}}\equiv\hat{\Sigma}^{\Lambda=1}_{\text{eff}}$ $$\hat{\mathcal{G}}_{\sigma}(i\omega,b_{l+1},b_{L+1})=\left[\hat{Q}^{\text{eff},\Lambda=1}_{\sigma}(i\omega)-\hat{\Sigma}_{\text{eff}}(i\omega)\right]^{-1}.$$ The same Green’s function can be derived in the setup of the original theory and one can use its functional dependence on the dot self-energy $\hat{\Sigma}(i\omega)$ to derive a relation between $\hat{\Sigma}_{\text{eff}}$ and $\hat{\Sigma}$. For $L=0$ this relation is given by $$\hat{\Sigma}(i\omega)=i\omega\textbf{1}-\hat{t}^{\perp}_{0} -t_{0}^{2}\left[t_{0}^{2}\hat{\mathcal{G}}^{c,(1)}_{\text{core},\sigma}(i\omega,b_L,b_L)+\hat{\Sigma}_{\text{eff}}(i\omega)\right]^{-1}.$$ In a similar way one gets the local 1PI vertex function on the dot site from the vertex function of the effective theory $\Gamma^{\Lambda=1}_{\text{eff}}\equiv\Gamma_{\text{eff}}$. The connected two-particle Green’s function on rung $b_{L+1}$ is given by $$\begin{aligned} \nonumber \mathcal{G}^{c,(2)}\left(b_{L+1},\alpha_1;b_{L+1},\alpha_2|b_{L+1},\alpha_{1'};b_{L+1},\alpha_{2'}\right) &=&-\sum_{\beta_1,\beta_2 \atop \beta_{1'},\beta_{2'}}\hat{\mathcal{G}}(b_{L+1}\alpha_1;b_{L+1},\beta_1) \hat{\mathcal{G}}(b_{L+1}\alpha_2;b_{L+1},\beta_2)\Gamma_{\text{eff}}\left(\beta_1,\beta_2|\beta_{1'},\beta_{2'}\right)\\ &&\times\hat{\mathcal{G}}(b_{L+1}\beta_{1'};b_{L+1},\alpha_{1'})\hat{\mathcal{G}}(b_{L+1}\beta_{2'};b_{L+1},\alpha_{2'}).\end{aligned}$$ Here greek indices are super-indices that contain Matsubara frequency, spin and channel-index. By amputing the Green’s function that connect the dot rung with rung $b_{L+1}$ one gets the vertex function on the dot rung $$\begin{aligned} \nonumber \Gamma(d,\alpha_1;d,\alpha_2|d,\alpha_{1'};d,\alpha_{2'}) &=&-\sum_{\beta_1,\beta_2 \atop \beta_{1'},\beta_{2'}}\left[\hat{\mathcal{G}}(b_{L+1},\beta_1;d,\alpha_1)\right]^{-1} \left[\hat{\mathcal{G}}(b_{L+1},\beta_2;d,\alpha_2)\right]^{-1}\\ \nonumber &&\times\mathcal{G}^{c,(2)}\left(b_{L+1},\beta_1;b_{L+1},\beta_2|b_{L+1},\beta_{1'};b_{L+1},\beta_{2'}\right)\\ &&\times\left[\hat{\mathcal{G}}(d,\alpha_{1'};b_{L+1},\beta_{1'})\right]^{-1} \left[\hat{\mathcal{G}}(d,\alpha_{1'};b_{L+1},\beta_{1'})\right]^{-1}.\end{aligned}$$ [^1]: Here and in the following we denote $t^{\ast}$ by $t$. [^2]: Not to be confused with the two-site cluster DMFT scheme. [^3]: Here we follow the notation of Chapter 8 and 11 in Ref. . [^4]: To be more precise, one should compare the ration $\frac{U}{\sigma}$, where $\sigma$ is the standard deviation of the noninteracting density of states. Anyhow, one has $\sigma=t$ for the Bethe lattice and $\sigma=2t$ for the two-dimensional square lattice, so that both criteria are equivalent in our case.
Mid
[ 0.6325000000000001, 31.625, 18.375 ]
Chinese Calendar Baby Gender, All Explained How To Master! Chinese Calendar Baby Gender, the tests have confirm that you are welcoming a new member to your family soon. Now, start the guessing game of “Is it a boy or a girl?” This is a secret that all expectant mothers are dying to discover, but there will be no answer until the first ultrasound. In nations where gender determination is ban, parents have no choice but to let it be suspense until the due date. If you can’t wait to know your baby’s gender, there are baby gender prediction techniques. One of them, the Chinese calendar baby gender, is by far the most accurate method to predict baby’s sex. Chinese Calendar Baby Gender: Gender Prediction The Chinese gender calculation requires the month of conception and the mother’s age (both base on Chinese lunar calendar) at the time of conception. However, in the current days, most websites have simplified it for your convenience. You just need to enter English dates, and the program will automatically convert your age and conception date to Chinese lunar format before displaying the result. Chinese Calendar Baby Gender: Chinese Baby Gender Predictor If your date of birth and the lunar month of conception both are odd or even numbers, then you are having a girl. You will have a boy if one is odd and the other is even. Perhaps this may sound illogical, but its high level of accuracy was verified by parents from all over the world. Try this gender predictor and you will have one more reason to decide whether to buy a pink or blue cradle. More than the importance of foreknowing baby gender, it is the fun and thrill of baby sex prediction that makes the Chinese calendar gender a favorite pregnancy tool used by the parents-to-be world over. For centuries, the Chinese birth chart has been regarded a reliable tool for accurate baby gender prediction. This tool is a more simplified and easy-to-understand version of the authentic Chinese gender prediction. Chinese Calendar Baby Gender: Accuracy of Chinese Baby Sex Prediction The Chinese chart is an unscientific yet surprisingly accurate method. Studies and surveys prove that it is accurate 90% of the time. It is trusted by millions of people around the globe. Disclaimer: even though the Chinese gender prediction shows a high level of accuracy, it is not a scientific method to predict the baby’s sex. For instance, according to the Chinese birth chart, a 21-year-old (Chinese age) woman is mostly likely to give birth to a baby girl if she conceives during the 2nd, 3rd, 4th, 5th, 6th, 7th, 8th, 9th, 10th, 11th or 12th month. In other words, if a woman of age 21 wants to have a baby boy, she only has one single chance – she needs to conceive during the first month of Chinese calendar. Chinese Calendar Baby Gender: Chinese Gender Predictor 2016 & 2017 You are not pregnant but planning to. This gender prediction tool can be used if you are trying to conceive, especially if you are inclined toward a particular gender. Try different conception dates and see the result to find if it is a boy or a girl. Using the Chinese calendar baby gender will be easy for gender selection.
Mid
[ 0.6289592760180991, 34.75, 20.5 ]
Canada Post workers breathed a sigh of relief Monday after the Crown corporation announced it is suspending a nationwide conversion from door-to-door delivery to community mailboxes. During the lead up to the federal election on Oct. 19, the Liberals promised to halt the phasing out of the home delivery. In a news release issued late Monday, Canada Post spokeswoman Anick Losier said the corporation will work "collaboratively" with the government of Canada to determine the best path forward given the challenges in the postal system. Union praises 'step forward' Glenn Bennett, president for the Winnipeg chapter of the Canadian Union of Postal Workers (CUPW), said he was encouraged to hear the news. "It's obviously a positive step forward," said Bennett. "Canada Post is obviously reacting to a majority Liberal government and the Liberal government's stance was to stop the CMB conversion for now." Only four neighbourhoods in the Winnipeg area have been converted to community mailboxes thus far, including one that was recently completed in St. Vital. Bennett said he hopes the suspension is a sign of things to come. "People have come out and said that they want their home delivery still," he said. "It affects a lot of people, a lot of seniors and people with disabilities." Conversions planned for November and December and into the new year have been put on hold. There are currently roughly 460,000 addresses across the country involved in the changeover. North End councillor cheers suspension When news of Canada Post's decision to suspend the expansion of community mailboxes reached Ross Eadie, city councillor for Winnipeg's Mynarski Ward, he cheered out loud, he said. In the year since Canada Post installed community mailboxes in his ward, Eadie has heard from a range of disgruntled residents, he said. "There's issues of snow all around the mailboxes … in winter there's cars taking up parking spaces … complaints of blowing litter," he said. "I know a number of seniors, when the winter is on, they're not going to get their mail." In newer suburban communities, the mailboxes might work because the areas are designed with the larger boxes in mind, but Eadie said older neighbourhoods aren't set up to have anything but door-to-door mail delivery. "Personally I would like to just have [the installation of community mailboxes] totally reversed," he said.
Mid
[ 0.64, 32, 18 ]
The process for recovering from a situation in which compromising activity has been detected for access data associated with a user is cumbersome. First, the user must realize that the compromising activity has occurred. However, this is not a simple task as compromising activity is often not transparent. As a result, there is typically a delay from the time that the compromising activity occurred to the time that the user recognized that their access data may have been compromised. For example, conventional systems involve an entity that analyzes use of the user's access data to determine whether the access data may have been compromised. Upon the entity's analysis, the entity may call the user to confirm whether the access data was compromised. However, these calls typically require the user to verbally provide identification data among other authentication information, which is time-consuming and inefficient. Additionally, after the user authorizes disabling the use of compromised access data, there is a further delay until the user can receive new access data. For example, the user may have to wait to receive paper confirmation or perform an additional registration process online or over the phone in order to receive the new access data. This delay limits the user's ability to request access to a resource, which is inconvenient. It would be desirable to provide the user with the ability to utilize the new access data as soon as possible. Embodiments of the invention address this and other problems, individually and collectively.
Mid
[ 0.594713656387665, 33.75, 23 ]
Q: ASP.NET MVC 1 ViewModel per View? I've read article "How we do MVC". In rule #3, said that "we only have one ViewModel type per View". For example, when we scaffolding in mvc, it's automatically create 5 Views (Create, Delete, Details, Edit, and Index). By that statement, is it mean that we have to create 5 ViewModels for that views? If my assumption is wrong, what is the best practice to use ViewModels? A: It is a common practice to create separate view model for different views. However, from my understanding and practice, for details and edit view, sometime it is create, details and edit, the fields are almost the same. In such case, I will reuse the same view model. And there is a discussion over here, it might help you to understand it.
Mid
[ 0.5814432989690721, 35.25, 25.375 ]
Socialveo Spam I received the following e-mail from someone called Damir. I really hate receive e-mails from someone that I didnt authorized and I hate more is still trying to cause a false impression of another product/people. I am not sure but I suspect that Damir is the old Macagoraga, one of those phpfox developers that left peoples without response and support. The message is as following: PHPfox is ending! Make the switch to Socialveo today before you’re stuck on an old platform. Dear Friends, My name is Damir and I’d like to talk to you about the end of PHPfox and the rise of Socialveo. As some of you may know, I’ve been a key developer at PHPfox for the last five years, and my products have long been the most widely-used by the site’s visitors. Even today, my bootstraphpfox theme is one of most used themes around. However, since they made the choice to stop supporting version 3, and their new version is not backwards compatible, I’ve decided to make a change of my own. Along with a team of top developers, I’ve decided to launch Socialveo, a highly-innovative social network software that offers significant advantages over similar competing services. Not only does our software exhibit improvement on every level, we know that you’ll find significantly more value in this new venture. And don’t worry if you’re migrating from PHPfox to Socialveo, we have a migration script in place to help you make the move. As a bit of good faith on my part, and as a reward for my loyal followers and clients, I’m offering a special discount that can be obtained simply by visiting socialveo.com/deals. If you’re ready to take social network software to the next level, we encourage you to visit us immediately to receive your discount and to prepare yourself for the future of social software. Which is the demo link? You can find the demo by visiting socialveo.co. Please report any issues you find on the demo here: socialveo.com/go/issues. If you have a suggestion or an idea on how to improve our products or services, please start a new discussion in the community forum here: socialveo.com/go/suggestions. How a pre-order works We are working hard to prepare Socialveo to be released by 5 September for a special price of 399CHF, that is 34% less than normal price. The normal price will be 599CHF after 30 September 2016. If you make the Pre-Order Now (until 4 September 2016), you can obtain the license of Socialveo Website for 50% less than the normal price, 299CHF. Don't forget to check also the Socialveo Hosted version, is the best way to create your own online community. You can find more info about the above by visiting socialveo.com/deals or Pre-Order Now. Mobile App The Mobile App at the moment is not yet ready. We hoped to release the website along with the mobile app, but unfortunately this is not possible at the moment. We have tested many different solutions to achieve good performance and easy extensions and customizations, but many different problems that cropped up caused the delay. We believe the best way forward is to make a Mobile App for iOS and Android using the promised ReactNative framework made by Facebook. We will let you have more information about this in the next newsletter (coming soon). Third Party Developer Are you a developer or web designer? We have a Third-Party Add-ons section here: socialveo.com/go/addons/ where you can sell your custom Themes, Modules, Widgets, Translations and more. You will receive all instructions how to quickly setup Socialveo on your local computer, manually by following instructions or with super quick setup thanks to Vagrant (www.vagrantup.com). For more details about, please get in touch with us via [email protected]. @Zixia604 said: Mac over promised and under delivered on everything he did. I've gotten more complaints about this spam he's doing and about his former tactics. One client is having issues with "someone" from Switzerland going on his site and trolling the feed posting bad stuff about phpFox and this client didn't want his users even knowing he uses phpFox. It's getting bad.
Low
[ 0.446224256292906, 24.375, 30.25 ]
Abstract Ginseng is a traditional Chinese medicine and has the extensive pharmacological activity. Ginsenosides are the major constituent in ginseng and have the unique biological activity and medicinal value. Ginsenosides have the good effects on antitumor, anti-inflammatory, antioxidative and inhibition of the cell apoptosis. Studies have showed that the major ginsenosides could be converted into rare ginsenosides, which played a significant role in exerting pharmacological activity. However, the contents of some rare ginsenosides are very little. So it is very important to find the effective way to translate the main ginsenosides to rare ginsenosides. In order to provide the theoretical foundation for the transformation of ginsenoside in vitro, in this paper, many methods of the transformation of ginsenoside were summarized, mainly including physical methods, chemical methods, and biotransformation methods. 1. Introduction Ginseng (Panax ginseng Meyer) is a traditional Chinese medicine, which is used in ancient eastern countries. Ginseng is used as energy booster and can fortify the spleen to benefit the lungs, nourish fluids, calm the heart, tranquilize the mind, and so on [1–3]. Ginsenosides and polysaccharides are the main active substances in ginseng. Studies on the ginseng polysaccharides are few [4–6]. But there are a lot of reports about ginsenosides. Ginseng has so many pharmacological activities because of ginsenosides. According to the difference in the position and quantity of sugar moiety in the glycosides, ginsenosides are divided into three types: protopanaxadiol (PPD), protopanaxatriol (PPT), and oleanolic acid [7, 8]. At present, 60 ginsenosides approximately were isolated and identified from family Araliaceae. Ginsenosides showed many bioactive and pharmacological activities, such as anticancer, anti-inflammatory, antiaging, and antioxidant [9–12]. In addition, some researchers suggested that minor ginsenoside and aglycone are superior to the major ginsenoside at antitumor [13]. The antitumor activity is decreasing with the increasing sugar moiety in the glycosides [14]. But the contents of minor ginsenoside and aglycone are low or few in ginseng. Minor ginsenosides extracted from plants cannot satisfy the scientific researches and the clinical requirements. So it is very significant to prepare the minor ginsenoside through transforming the major ginsenoside. In recent years, the researches about the conversion of ginsenosides have obtained many significant results and studies on the transformation mechanism also made some progress [15, 16]. In this paper, we summarized many methods of the transformation of ginsenosides, mainly including physical methods, chemical methods, and biotransformation (Figure 1). The purpose of this study is to provide the theoretical basis for the new methods and approaches for the transformation and biosynthesis of ginsenosides. Figure 1: Methods applied on the transformation of ginsenosides. Three types of methods were concluded, which included the physical methods, chemical method, and biotransformation. Each type of method contained several kinds of common method that transformed a ginsenoside into another kind of ginsenoside by changing ginsenoside’s chemical structure. 2. Physical Methods 2.1. Steaming Transformation Heat-treatment of ginseng is a conventional way that is widely applied in ancient times. Ginseng could product some rare ginsenosides when heated at a higher temperature than conventional preparation. To study on the transformation induced by steaming, red ginseng samples were prepared by steaming of white ginseng at 98°C for 3 h or 1 h and drying at 60°C for 12 h. The results proved that some malonyl ginsenosides were generated in the heated white ginseng, while they were not detected in the steaming ginseng, and the contents of malonyl ginsenosides would be decreased during steaming. This change might be related to enzymes which convert malonyl ginsenosides to corresponding neutral ginsenosides [17]. Chemical constituents and biological activities of ginseng would be changed when ginseng was steamed at a temperature over 100°C. After steaming at 120°C, some ginsenosides were produced, such as ginsenoside Rg3, F4, and Rg5, which did not exist at raw ginseng. But the contents of ginsenoside Rf, Re, Rd, Rc, Rb1, and Rb2 were decreased after steaming and were fewer when steamed at 120°C [18]. Besides, when ginseng steamed at 120°C for 3 h, the contents of some ginsenosides in the methanol extract were showed as follows: 20(S)-Rg3 (0.700%), 20(R)-Rg3 (0.643%), Rg5 (0.492%), and other saponins (1.37%) [19]. In addition, an autoclave was used to steam the root of fresh ginseng, and HPLC was used to defected the change of ginseng’s constituents. On the one hand, temperature has a significant influence on the conversion of ginsenosides. For example, the contents of total ginsenosides were increased after ginseng roots were steamed at 98°C and decreased gradually at 120°C. On the other hand, time was also important. For instance, the contents of Rb1, Rb2, Rc, and Rd were increased sharply within first 0.5 h at 120°C and almost disappeared after 4 h. Moreover, acidic ginsenosides and neutral ginsenosides would be converted to rare ginsenosides during the root steaming. Acidic ginsenosides play an important role in the transformation of ginsenosides because they can release malonic acid and acetic acid, which affect the process of the transformation of saponins [20]. What is more, the combination of resin adsorption and heating may have a better application in conversion of ginsenosides. Total ginsenosides were obtained by 70% (v/v) ethanol and loaded to HP-20 open column. The ginsenosides enriched fractions were eluted by 65% methanol. The extraction from HP-20 was heated in autoclave at 130°C for 4 h, and the steam-treated extraction was separated by AB-8 and identified using HPLC-APLC-MS. The result showed that polar ginsenosides can convert to less polar ones, and PPD group could translate into 20(S)/(R)-Rg3 by selectively eliminating the C-20 sugar chain at high temperature and pressure. The transformed pathways of some ginsenosides by heat were as follows: Rb1, Rb2, Rc, Rd → Rg3 → Rk1, Rg5, Rs3; Re → Rg2 → Rg6 and F4; Rg1 → Rh1 [21]. 2.2. Sulphur-Fumigation Transformation Not only sunlight or heating is traditional method to process ginseng, but also sulphur-fumigation is also a convenient way to handle ginseng and other medicinal herbs. The slices of ginseng and sulphur powder were put into a desiccator at the lower and upper layer at 25°C for 12 h, respectively. The sulphur-fumigated ginseng was extracted by 75% ethanol at 85°C for 3 h. The experimental results suggested that some new compounds appeared in sulphur-fumigated ginseng comparing with reference compounds and nonfumigated ginseng by using UPLC-QTOF-MS/MS, such as ginsenosides Rh2 and Rg5 [22]. Some ginsenosides can be converted to ginsenoside derivatives or sulfate in sulphur-fumigation process through hydrolysis, dehydration, and decarboxylation [22–24]. Furthermore, sulphur-fumigation can influence the contents of original ginsenosides. For example, the contents of Rg1, Re, Rc, Rb2, and Rd were all decreased after sulphur-fumigation. The total contents of 10 ginsenosides in sulphur-fumigated white ginseng were decreased by up to 64% comparing with nonfumigated white ginseng [22]. Sulphur-fumigated white ginseng from different country could be discriminated by the chemical fingerprint of sulphur-fumigated ginseng. This also provides the useful way to identify other sulphur-fumigated medicinal herbs [23]. 2.3. Microwave Transformation The traditional processing methods of ginseng include conventional heating and sulphur-fumigation, but they have some drawbacks. The heating process is slow and the sulphur-fumigation would produce some hazardous substance. Recently, microwave heating has been applied on natural products and microwave heating is a simple, efficient, and time saving way to process products. The floatation solution of ginseng was put into the microwave irradiation system and the degradation of ginsenosides was continuously performed for 5 min under 165°C. The solutions after degradation were extracted by water-saturated n-butanol and evaporated to dryness. The results showed that ginsenosides Rh2 and Rg3 were the only degradation product of ginsenoside Rc and Rd, respectively. The yields of ginsenoside Rg3, Rh2 and aglycone are the highest under 165°C and 15 min. The highest transformation rate of total ginsenosides to ginsenoside Rg3 was 47.98% in neutral solution. And the conversion rate of major ginsenosides to aglycon was 78.11% in alkaline solution. Moreover, the yield of ginsenoside Rg3 obtained by microwave is 7.69 mg/g and 250 times as high as that obtained from red ginseng. The mechanism of saponins conversion may be related to hydrolyze glycosidic bond at C-20 and C-3 [25]. In addition, the degradation of ginsenosides may follow a first-order reaction in ethanol solution. And neutral ginsenosides are more stable than malonyl ginsenosides. The values of the rate constants of ginsenosides degradation were similar at the same temperature in both aqueous and 50% ethanol-water extracts between the microwave and conventional heating methods. So microwave could replace conventional heating methods to apply on the extraction of ginsenosides [26]. 3. Chemical Methods 3.1. Acid Hydrolysis As we all know, ginsenosides can be decomposed to corresponding prosapogenins under acidic condition. Major ginsenosides could produce different rare ginsenosides under different acidic conditions. Ginsenosides Rg1 and Re were treated with 0.1 N-HCL at 37°C for 120 min. N-BuOH extracts of the mixtures were applied to silica gel column chromatography to get the prosapogenin of Rg1 and Re. Rg1-prosapogenin I and Re-prosapogenin I were not detected because they were decomposed to other complicated mixtures [27]. What is more, the pH is a determinant factor in the transformation process of ginsenosides. Ginsenosides could not be transformed under the neutral condition and would produce by-products under strong acid. Different concentrations of formic acid (0.01%, 0.1%, 0.5%, 2%, and 5%) were applied to the conversion of some sapiens. The results showed that 0.01% of formic acid provided the highest yields. Ginsenosides Rh1, Rh2, and Rg3, with 0.01% formic acid at 120°C for 4 h, could transform into ginsenosides Rk3 and Rh4, Rk1 and Rg5, and Rk2 and Rh3, respectively. Besides, the total transformation efficiency was more than 20% through formic acid-treating. And the cytotoxic effect of ginsenosides on human cancer cells is inversely related to the sugar number and sugar linkages rank as C-3 > C-6 > C-20 [28]. 20(S)-Protopanaxatriol- (PPT-) type ginsenosides standards Re, Rg2, and Rf were dissolved by 50% (v/v) methanol/water and the liquor PH was adjusted to 2.0 with formic acid. The liquors of saponins were heated to reflux (60°C) for 120 mins. The result demonstrated that 20(S)-Re could produce eight compounds; they were 20(S)-Rf2, 20(S)-Rg2, 20(R)-Rg2, 20(S)-Rh1, 20(R)-Rh1, F1, Rg6, and Rg4. 20(S)-Rg2 produced five compounds; they were 20(S)-Rf2, 20(S)-Rh1, 20(R)-Rh1, Rg6, and Rg4. And 20(S)-Rf produced five compounds; they were 20(S)-Rh1, 20(R)-Rh1, 20(S)-Rf3, Rg8, and Rg9. The transformation mechanisms of 20(S)-protopanaxatriol- (PPT-) type ginsenosides include hydrolysis of saccharide substitution, Δ20(21) or Δ20(22) dehydration, and hydration addition reactions at C-24 and C-25. The chemical transformation pathways of 20(S)-PPT ginsenosides Re, Rg2, and Rf were showed in Figure 2 [29]. Beside formic acid, these acids can also be used in chemical transformation of ginsenosides, such as acetic acid, citric acid, lactic acid, tartaric acid, and HCL. Protopanaxadiol (PPD) ginsenosides could transform into Rg3 and Δ20-ginsenoside Rg3 under acid conditions. The yield of Rg3 was increased by increasing incubation temperature and time in acidic condition. The optimal time and temperature of transformation were 5 h and 60°C, respectively. What is more, ginsenosides Rb1, Rb2, and Rc were incubation at 60°C in acetic acid, citric acid, lactic acid, tartaric acid, and HCL and the levels of transformed ginsenosides were measured. Compared with lactic acid and citric acid, HCL could increase the yield of 20(R)-ginsenoside Rg3 and Δ20-ginsenoside Rg3 to 20(S)-ginsenoside Rg3. The transformation of ginsenosides by 0.1% acids was better than that of 1% acids. But the transformation of ginsenosides to Δ20-ginsenoside Rg3 by 0.1% acid was not greater than that by 1% acids. The results demonstrated that ginsenosides were easily transformed in acidic conditions. However, it is important to control the PH, time, and temperature for the conversion of ginsenosides in acid condition [30]. 3.2. Alkaline Hydrolysis Alkaline hydrolysis is a method to decompose saponins on the condition of high temperature, high pressure, and alkaline to obtain secondary saponins. But alkaline hydrolysis also has a strict requirement on the reaction temperature, pressure, and PH. Total saponins would be hydrolyzed in boiling water bath with 2 mol/L NaOH aqueous solution for 8 h and extracted by EtoAc. It is interesting to note that a new compound, 20(R)-ginsenoside Rh19, could be isolated and identified by NMR and MS spectra analyses [31]. For alkaline hydrolysis, temperature and PH are two important conditions. In general, at the same time, the higher the PH, the faster the hydrolysis. The hydrolysis rate of ginsenoside Ro was also related to temperature and PH. The hydrolysis rate changes more obviously on the condition of PH 13 and 60°C, mainly hydrolyzing the ester bond at C-28. The hydrolysate of ginsenoside Ro by alkali was zingibroside-R1 [32]. Moreover, the yield of protopanaxadiol was the highest by alkaline hydrolysis when the solvent is isoamyl alcohol, and hydrolysis time is at 24 h, normal pressure. But the yield of protopanaxadiol would be decreased when the heating time is more than 32 h in isoamyl alcohol. This showed that prolonged heating can lead to the degradation of saponins in high temperatures [33]. These chemical methods also have some disadvantages, including poorly selective, epimerization, hydration, hydroxylation, and environmental pollution [34]. 4. Biotransformation of Ginsenosides Biotransformation is a way which makes use of organisms or enzyme as catalyst to realize the process of chemical conversion and modify the structure of the external substrate. The advantages of biotransformation are strongly selective, mildly reaction conditions, less by-products, simple reprocessing, friendly environment, and so on. The biotransformation of ginsenosides is mainly using microorganism or enzyme to decorate the glucosyl of ginsenosides at C-3, C-6, and C-20 to translate rare saponins. The main methods of biotransformation are enzyme conversion and microbial transformation. 4.1. Enzymatic Hydrolysis The enzymatic way has been deemed to a promising method to generate rare ginsenosides, owing to its short reaction cycle, little pollution, high purity, and high specificity [34]. Different enzymes play a different role in hydrolyzing ginsenosides. Rapidase, Econase CE, Viscozyme, Ultraflo L, and Cytolase PC15 were used for secondary enzymatic hydrolysis after amylase treatment of ginseng extract. The hydrolysis reaction was stopped by boiling for 15 min. The results showed that Rapidase can not only significantly increase the total contents of ginsenosides, but also increase the contents of panaxadiols and panaxatriols, such as Rh1, Rg5, Rk1, Rg2, and Rg3. However, the effect of Ultraflo L is opposite to Rapidase. Rc was the most ample in the control, but the contents of Rc are decreased after being treated with various enzymes. Some researches indicated that the hydrolysis of carbohydrates enhances the extraction of ginsenosides and shorter sugars [35]. Some commercial enzymes, Cytolase PCL5, Sumizyme AC, Multifect Pectinase FE, and Crystalzyme PML-MX, were added to the ginseng extract, mainly including ginsenosides Rb1, Rc, Rb2, and Rd. After 60 h of treatment by enzyme, these major ginsenosides were transformed into Rg3, F2 and compound K. what is more, the effects of Cytolase PCL5 and Sumizyme AC are better than other enzymes at conversion of ginsenosides. And Cytolase PCL5 is superior to Sumizyme AC because the yield of compound K is increased as the temperature decreased. The optimal conditions were identified as 78 h of treatment at PH 4.3 at 55.4°C. This result could provide a practical basis for other methods to hydrolyze saponins [36]. As is well known, ginsenoside Rg3 has the good effect on anticardiovascular and antimetastasis. But ginsenoside Rg3 is not found in the white ginseng and the content of it is very low in red ginseng. The 20(S)-Rg3 isomer is more water-soluble and more bioavailable than the 20(R)-Rg3 isomer. There are few reports about the conversion of ginsenoside Rg3 by the enzymes. So it is important to explore the optimal condition for the transformation of ginsenoside Rg3 by commercial enzymes. Some commercial enzymes, Cellulase-12T, Protease NP, Viscozyme L, Celluclast 1.5L FG, Lactozym, Pectinex 5XL, Novozym 435, and Cytolase, were added to the white ginseng extract. The results indicated that the hydrolysis of Cellulase-12T was more effective than other enzymes, by hydrolyzing the β-glycosidic linkage at C-20 in protopanaxadiol-type ginsenosides. Besides, the content of 20(S)-ginsenoside Rg3 could improve 4 times after treated with Cellulase-12T for 72 h, comparing with commercial white ginseng extract [37]. It is known that aglycone protopanaxatriol is easy to be absorbed and has broader prospect than other saponins. Aglycone protopanaxatriol can be obtained by hydrolyzing the saponins. A recombinant β-glycosidase obtained from Dictyoglomus turgidum specifically hydrolyzed the xylose at the C-6 position and the glucose in protopanaxatriol- (PPT-) type ginsenosides. The specific activity of D. turgidumβ-glycosidase followed the order: Rf > Rg1 > Re > R1 > Rh1 > R2. But D. turgidumβ-glycosidase did not have effect on Rg2. So D. turgidumβ-glycosidase hydrolyzed the β-D-glucopyranose at the C-6 position and C-20 position and cannot hydrolyze α-L-rhamnopyranoside at the C-6 position of Rg2. The optimal reaction conditions for APPT production using D. turgidumβ-glycosidase were pH 6.0, 80°C. The transformed pathways of PPT-type ginsenosides using D. turgidumβ-glycosidase were as follows: R1 → R2 → Rh2 → APPT, Rg1 → Rh1 → APPT, Rf → Rh1 → APPT, Re → Rg2 [38]. 4.2. Intestinal Bacterial Hydrolysis Many researchers study the metabolism of ginsenosides in vivo by intestinal microflora and found that the real effective component of ginsenosides is aglycone, which laid the foundation to the development of new drugs. The study found that 20-O-β-D-glucopyranosyl-20(S)-protopanaxadiol (IBM I), the intestinal bacterial metabolite of Rb1, was really resistant to metastasis instead of Rb1. And the antimetastatic efficacy of IBM I was better than that of Rb1 and at least comparable to that of 5-FU. And the cure rate of IBM I was greater than amputation alone in a leg amputation [39]. Besides, nine metabolites (M1–M9) of ginsenoside Rb1 were detected in rat feces and eight metabolites (M1, M2, M4–M8, and M10) were detected in rat urine. The structures of ten metabolites were identified as ginsenoside Rd, gypenoside XVII, 20(S)-ginsenoside Rg3, 20(R)-ginsenoside Rg3, ginsenoside F2, compound K, 12-hydroxydammar-3-one-20(S)-O-β-D-glucopyranoside, and 25-hydroxyl-(E)-20(22)-ene-ginsenoside Rg3, respectively. It is significant to know that four metabolites (M7–M10) were first reported in vivo. And the highest concentration of deglycosylated metabolites in rat urine and feces appeared during 6–12 h and 24–36 h, respectively [40]. What is more, the same hydrolysates were found in human plasma and urine after human take oral extract but were not found in the extract. This result suggested that products must result from either the degradation or metabolism of ginsenosides in the human body. The major hydrolysates were ginsenoside Rh1, ginsenoside F1, and compound K. And compound K was the main metabolite of the protopanaxadiol ginsenosides [41]. The interesting thing is when ginsenoside Rb1 was given orally to germ-free rat, neither compound K nor any other metabolite was detected in the plasma, intestinal tract, or cumulative feces. In contrast, when ginsenoside Rbl was given orally to gnotobiote rats monoassociated with Eubacterium sp. A-44, compound K was found in the plasma, caecum, and cumulative feces. The result indicated that ginsenoside Rb1 was not easily absorbed into body. Nevertheless, compound K, the metabolic of ginsenoside Rb1, was easily absorbed into body. However, not all human intestinal could transform the ginsenoside Rb1. Eubacterium sp. A-44 is the only one intestinal strain from man that can convert ginsenoside Rbl into compound K via ginsenoside Rd. The transformation pathway of ginsenoside Rbl by intestinal bacterial was as followed: Rbl → Rd → F2 → C-K → 20(S)-protopanaxadiol [42]. Furthermore, saponins can also be converted into metabolites in anaerobic environment. The possible transform pathways of ginsenosides Rb1, Rb2, Rc, Re, and Rg1 were as follows: Rb1 → Rd → F2 → 20-O-β-D-glucopyranosyl-20(S)-protopanaxadiol, Rb2 → unknown-substance → 20-O-[α-L-arabinopyranosyl(1 → 6)-β-D-glucopyranosyl]-20(S)-protopanaxadiol → 20-O-β-D-glucopyranosyl-20(S)-protopanaxadiol, Rc → Rh1 → 20-O-[α-L-arabinofuranosyl(1 → 6)—β-D—glucopyranosyl]-20(S)-protopanaxadiol → 20-O-β-D-glucopyranosyl-20(S)-protopanaxadiol, Re → Rg1 → F1 → 20(S)-protopanaxatriol, Rg1 → F1 → 20(S)-protopanaxatriol [43]. In addition, some human intestinal bacteria could transform ginsenoside Rg3 and △20-ginsenoside Rg3 to ginsenoside Rh2 and △20-ginsenoside Rh2 and protopanaxadiol. For example, Bacteroides sp., Eubacterium sp., and Bifidobacterium sp. could convert ginsenoside Rg3 to protopanaxadiol via ginsenoside Rh2, but Fusobacterium sp. metabolized ginsenoside Rg3 to ginsenoside Rh2 alone [30, 44]. The possible transformation pathway of Rg3 by fusobacterium K-60 was as follows: ginsenoside Rg3 → ginsenoside Rh2 → protopanaxadiol, Rg3 → △20-ginsenoside Rh2 → △20-protopanaxadiol [44]. Another interesting thing is that 20-O-β-D-glucopyranosyl-20(S)-protopanaxadiol, a metabolite of ginsenosides, was accumulated into the liver soon after its intravenous administration to mice and its metabolite was fatty acid ester that accumulated in the liver longer than it. Fatty acid ester inhibited tumor growth more than 20-O-β-D-glucopyranosyl-20(S)-protopanaxadiol in vivo, which suggested that the real active substance of ginsenosides in the body may be fatty acid ester [30, 45]. 4.3. Endophytic Bacteria Transformation Endophyte is the fungus or bacterium that lives in the tissues and organs of healthy plants at a certain stage or all stage. 10 β-glucosidase-producing endophytic bacteria were isolated from ginseng roots. Among these endophytic bacteria, Burkholderia sp. GE 17-7 has a strong ability to convert the major ginsenoside Rb1 and Rd into minor ginsenoside Rg3 via hydrolyzing the outer glycosidic linkage at C-20 position. The pathway of ginsenoside Rb1 by the strain GE 17-7 was as follows: ginsenoside Rb1 → ginsenoside Rd → ginsenoside Rg3. The optimal conditions were pH 7.0, 30°C, 15 h and the maximum conversion rate of ginsenoside Rg3 was 98% [46]. Ginsenosides Rb1 and Rd were also transformed into gypenoside LXXV and compound K by strain CNU 120806, respectively, by hydrolyzing the terminal and inner glucopyranosyl moieties at the C-3 carbon. The transformation pathways of ginsenosides Rb1 and Rd were as follows: ginsenoside Rb1 → gypenoside XVII → gypenoside LXXV; ginsenoside Rd → F2 → compound K. The optimal conditions for transformation by strain CNU 120806 are 50°C and pH 5.0 [47]. Besides, Esteya vermicola CNU 120806 has the high specific activity in converting ginsenoside Rg3 to Rh2. However, ginsenoside Re was not converted by strain CNU 120806. The production rate of Rh2 reached 90.7%. The optimal condition was as follows: 50°C, pH 5.0, and substrate concentration of 3 mg·ml−1 [48]. An endophyte JG09 isolated from Platycodon grandiflorum also has the ability for converting the ginseng total saponins and ginsenoside monomers. For example, endophyte bacteria JG09 could transform ginsenosides Rb1, Rb2, Rc, and Rd into ginsenosides F2 and compound K and transformed ginsenoside Rg1 into ginsenoside Rh1. The probable pathways of Rb1, Rb2, Rc, and Rg1 by endophyte JG09 were as follows: Rb1 → Rd → F2 → C-K; Rb2 → C-O → C-Y → C-K; Rc → C-Mc1 → C-Mc → C-K; Rg1 → Rh1. (Table 1). And the maximum production rate of ginsenoside F2 and compound K reached 94.53% and 66.34% on the condition of PH 4.0, respectively [49]. 4.5. Soil Microbial Transformation Soil microbes are the microscopic organisms that are invisible to the naked eye or invisible to the soil. Strictly speaking, they include bacteria, archaea, fungi, viruses, protozoa, and microscopic algae. They can make chemical reactions in the soil and promote the decomposition of soil organic matter and the transformation of nutrients. Twenty-two microorganisms, producing β-glucosidase, were isolated from the ginseng filed. Among these microorganisms, GH9, GH21, and GH26 have the ability to transform ginsenoside Rb1 to less polar metabolite. Only GH21 was able to transform ginsenoside Rg1. GH21 was identified as a Cladosporium cladosporioides species by comparing rRNA gene sequences. The proposed conversion pathways of ginsenosides Rb1 and Rg1 by GH21 were as follows: Rb1 → Rd or gypenoside XVII → F2 → C-K, Rg1 → F1, respectively. Ginsenosides Rb1 and Rg1 bioconversion rates were 74.2% and 89.3%, respectively [55]. Aspergillus versicolor strain LFJ1403, producing β-glucosidase, is also isolated from ginseng filed. Strain LFJ1403 could transform ginsenoside Rb1 into ginsenoside Rd as the sole product by hydrolyzing the outer glucose moiety at C-20 position. The yield of conversion was up to 96% on the optimal biotransformation conditions, 37°C, PH5.0, and 48 h [56]. In addition, many microorganisms were obtained around the ginseng roots in fields. Among these microorganisms, a strain of fungus GF06 was identified as Aspergillus niger and showed a strong ability to transform Rg3(S, R) into PPD(S, R) via the following pathway: Rg3 → Rh2 → PPD, Rg3 → PPD. The conversion rate of Rg3(S, R) into PPD(S, R) reached 100%, and the optimal conditions were PH5.0 and 55°C [57]. What is more, Aspergillus niger also could transform ginsenoside Rf to 20(S)-protopanaxatriol by hydrolyzing the terminal glucose and then inner glucose at the C-6 position, suggesting the transformation pathway: Rf → Rh1(S) → PPT(S). The yield of conversion was up to 90.4% on the optimal conditions, PH 5.0, 55°C and substrate concentration 1.25 mmol/l [58]. Beside, Microbacterium esteraromaticum would convert ginsenoside Rb2 into compound Y and compound K. The possible conversion mechanism was as follows: Rb2 → compound Y → compound K [59]. Moreover, Fusarium sacchari, isolated from the soil-cultivated ginseng, could transform leaves of total saponins into compound K, compound Mx, and ginsenoside Mc, which have the strong pharmacological activity. And the levels of C-K, C-Mx, and G-Mc were the highest in the PDA medium, comparing with martin, wort media, and Zpek medium. The optimal transforming conditions for C-K, C-Mx, and G-Mc by Fusarium sacchari were as follows: 30°C, 6 days, and PH 5.5. The content of C-K converted by Fusarium sacchari was increased by 215 times those of the control [60] (Table 3). Table 3: Ginsenosides converted by soil microbacteria. 5. Conclusion In conclusion, the transformation of ginsenosides is achieved mainly by hydrolyzing the glycosidic bond at C-3, C-6, and C-20 position of the ginsenosides. Transformation of saponins by physical methods is not suitable for industrial production because of the high reaction conditions, the huge energy consumption, and the lower level of saponins. For instant, the content of PPD and PPT would be decreased at steaming. The secondary saponins prepared by chemical methods were easy to hydroxylate, hydrolyze, and isomerize. There are some problems in reaction progress, such as violent reaction, uncontrolled hydrolysis degree, difficult purification, and environmental pollution. Moreover, the transformation rate of secondary saponins was not high by chemical methods. Comparing the physical methods and chemical methods, biotransformation has quite a few advantages in the transformation of ginsenosides. For example, biotransformation is a fast, convenient, efficient, and environmental friendly way to obtain rare saponins. Because of these advantages, biotransformation is also the most commonly used method to convert ginsenoside. More significantly, China is the first to realize the industrial production of the Rh2 and other rare saponins by using enzymatic method [61]. In recent years, a large number of researches have been studied for the conversion of major ginsenosides and have achieved great results. However, these methods cannot meet the requirement of industrialization in producing rare ginsenosides. It needs more researchers to explore the way to produce the rare ginsenosides and be applied on large-scale production of saponins. Conflicts of Interest All contributing authors declare that there are no conflicts of interest. Acknowledgments This work was supported by Project of Shandong Province Key Research and Development Program (2017YYSP030).
High
[ 0.694677871148459, 31, 13.625 ]
Containers or packaging systems that provide indication of tampering are well known in the art. Typically, such provisions are in the form of perforation patterns formed in overlying layers in the container. Upon separation of the layers from one another in order to open the container, it is difficult if not essentially impossible to re-align the patterns in their original configuration prior to opening. However, in certain situations, perforation patterns can be sufficiently re-aligned such that without close inspection, a pattern may appear to have never undergone an initial separation or container opening. Accordingly, a need exists for an improved container tampering indicator, and particularly which more dramatically indicates a previous opening, opening attempt, and/or tampering. Although a variety of other tamper indicating provisions are known in the art, each suffers from one or more drawbacks. A common disadvantage to many known tamper indication systems is the cost of providing and/or incorporating such in a container or package. Often intricate and complex structures or configurations must be formed or incorporated in the container. These increase container cost and/or manufacturing complexity. Therefore, a need exists in the art for a tamper evident container which provides clear indication of tampering or previous attempts at opening, and yet which is relatively inexpensive to produce and incorporate in a container or package.
Mid
[ 0.623318385650224, 34.75, 21 ]
When will Justin Trudeau do something?!! Kinder Morgan pointed to the “uncertainty” created by the opposition of the B.C. government as the reason for the sudden announcement and said it will take until May 31 to consult with stakeholders to determine whether the project will continue construction through B.C. and whether shareholders can be protected. If the company cannot reach an agreement with the various stakeholders by the May 31 deadline, Kinder Morgan chairman and CEO Steve Kean says it is “difficult to conceive of any scenario in which we would proceed with the project.” “We can’t move the seasons in Canada. There are certain seasons during which you can do certain things. Mobilization for construction, the opening and closing of windows for clearing activities, materials to be ordered – we’re on top of all of that right now,” he said. “We don’t have the ability to just kick the can down the road. We have to make a decision and we made it. It’s difficult because of those other considerations but it is an easy decision to make for investors.” He said the end of next month was chosen as a deadline due to the construction timeframes required by the project, and expressed reluctance that the project could be delayed until next May. “We don’t have control over that or control over timing and we don’t purport to say – this is what you must do or by when,” said Kean. “We don’t have the power to convene governments into these discussions but we are expressing our openness to participating in that process.” Kean’s original statement goes on to note that while the project has support from the federal government and the provinces of Alberta and Saskatchewan, the province of British Columbia and its government has continued to be a barrier to the project’s progress. “The fact remains that a substantial portion of the project must be constructed through British Columbia, and since the change in government in June 2017, that government has been clear and public in its intention to use ‘every tool in the toolbox’ to stop the project,” he said. “The uncertainty created by B.C. has not been resolved but instead has escalated into an inter-governmental dispute.” What “non-essential activities” are and what they would cost wasn’t made clear in the statement. To date, Texas-based Kinder Morgan says they’ve spent about $1.1 billion on the project. The Trans Mountain project would twin an existing pipeline, tripling the flow of oil flowing to the B.C. coast from Alberta. To date, the company says it has spent about $1.1 billion on the project. In recent months, B.C. Premier John Horgan and Alberta Premier Rachel Notley have had public spats over the future of the pipeline, even throwing in trade threats at one point. The pair have regularly traded jabs in interviews and news conferences, with each declaring victories at various steps of the project. In a Sunday press conference, Notley said the pipeline “must be built” and threatened government action against B.C. if the Horgan government — whom she called “short-sighted” — continued to oppose the project. She called on Prime Minister Justin Trudeau to act in defence of the project, which the federal government has approved. “Albertans have been clear: Get this pipeline built. And Albertans are right,” she said Sunday. “Never count Alberta out. This pipeline will be built. Tens of thousands of jobs and billions of dollars to the economy. Better public schools. Better public hospitals. That’s what this pipeline means for us and for our country as a whole. We have won a series of important and decisive legal victories. The courts threw out B.C.’s last case without even hearing it. And I am confident we will continue to win. We are also calling on the federal government to act in the defence of Alberta and working people in Western Canada in the way they have in the past for other parts of this country. A federal approval of a project must be worth more than the paper it’s written on.” Notley called on Prime Minister Trudeau to take more “concrete action”‘ to get the pipeline built, adding that legislation is coming in the next few days to give her the power to turn down the taps on oil headed to B.C. Other retaliatory actions, such as a renewed ban on B.C. wine, are also being contemplated, she said. Later on Sunday, Prime Minister Justin Trudeau reiterated his support for the project. He’s spoken openly of the economic need for the project to be completed. “Canada is a country of the rule of law, and the federal government will act in the national interest,” he said on Twitter. “Access to world markets for Canadian resources is a core national interest. The Trans Mountain expansion will be built.” Trudeau was in Saskatchewan on Sunday, visiting with families and survivors of the Humboldt bus tragedy. Later Sunday, a calm and collected Horgan said at a press conference that he’d spoken twice this week with the prime minister and has also spoken with Kinder Morgan’s leadership and said he hoped to speak with Notley later on Sunday. “The interests of Texas boardrooms are not the interests of British Columbians,” he added, referring to the location of Kinder Morgan’s corporate offices. “The risk is too great,” he said more than once. “(Kinder Morgan’s) Ian Anderson told me that he believes the project Kinder Morgan has been undertaking has been unnecessarily harassed by British Columbia and I told him I disagreed,” Horgan said. He said the NDP had campaigned last year “to defend our water, our lands and most importantly our coast.” He said he’d told Trudeau he disagreed on the pipeline being in the national interest and criticized the National Energy Board’s review of the project, saying it was flawed and pointed to ongoing court action his government is engaged in. “It is our view that provincial jurisdiction should prevail in many areas affected by this process,” he said. “It’s obviously the responsibility of the federal government to assert jurisdiction where it thinks it has it, and it’s the responsibility for the province to push back where we believe our jurisdiction has been tampered.” He also pointed to his government’s commitment to its climate change policies, like a rising carbon tax. “It’s been said we are somehow compromising the climate action plan for the country and I profoundly disagree with that… I reject the notion that somehow our opposition to risk to our coast and our economy is somehow tied to the national climate plan.” “I have no intention of escalating controversy across the country, I have every expectation people will protect British Columbia’s right to defend our interest and defend our coast.” He dismissed any suggestion that his government’s position could lead to a constitutional crisis. “There was no constitutional crisis when energy east was cancelled,” he said, pointing to the pipeline which was to carry oil from Alberta to refineries and ports in Eastern Canada. It was cancelled in October. “This is not something that’s unique.” University of Alberta economist Andrew Leach said in a tweet that comparing Energy East and the Trans Mountain projects wasn’t reasonable. Energy East “was the least attractive option to get crude to market,” he said, while Trans Mountain matters “because it’s the best option and not building it significantly compromises (the) value of (Alberta) natural resources.” “The value of Energy East was largely derailed by a glut of global crude oil,” he added. “The premier has let his activist environment minister ignore the rule of law as this government picks winners and losers by willfully ignoring the constitution,” he said. “Investors ­ large and small ­ interested in our province need to know the provincial government will treat everyone fairly and equally.” “This is a project that has received federal approval and falls under federal jurisdiction, yet the NDP used it to pick a trade war with Alberta and start a confrontation with the federal government.” The RCMP say they have arrested about 200 people demonstrating around the Trans Mountain facilities since mid-March, and while most face charges for civil contempt, officers have also made arrests for mischief, obstruction and assault of a police officer. Opponents of the pipeline were excited by Kinder Morgan’s announcement. “The writing is on the wall, and even Kinder Morgan can read it,” Greenpeace’s Mike Hudema said. “Investors should note that the opposition to this project is strong, deep and gets bigger by the day. This announcement shows that this widespread opposition has reached critical mass. British Columbians’ desire to protect clean water, safeguard the environment and stand behind Indigenous communities cannot be ignored or swept under the rug. We encourage Kinder Morgan to shelve this project before the litany of lawsuits, crumbling economics, and growing resistance against the pipeline does it for them.” Stand.Earth, another environmental group opposed to the project, questioned how much more Kinder Morgan’s investors could stomach. “Clearly, investors have lost confidence in this project and are waking up to the reality that the Kinder Morgan pipeline will never be built” Stand.Earth’s Sven Biggs said in a statement. “We have known for a while now that the opposition to this pipeline from Indigenous leadership, protesters, and the province of B.C., is just too strong for it to ever to become a reality, and now even Kinder Morgan has had to admit that.” Last week, the prime minister made stops in B.C. where he was greeted by anti-pipeline protesters in Victoria and Vancouver. During the appearances, Trudeau said the federal government needs to build a strong economy and protect the environment at the same time, adding that he has faith in his government’s ocean protection and emergency preparedness plans. “I would not have approved this pipeline had I not been confident of that,” he said. Sunday, federal Minister of Natural Resources Jim Carr said the Trudeau government will do everything it can to see that the project is completed and that the Horgan government stood to harm “the entire Canadian economy.” Carr said Sunday’s news wasn’t expected, but his office was aware that delays and uncertainty posed by B.C’s threats were having an impact. “It is not in the interests of the B.C. government for investors to think B.C. is not a good place to invest,” he said. “There are consequences to those actions and we’re seeing those consequences.” “We will act in Canada’s national interest to see that this project is built. Our government’s approach to resource development will grow our economy and protect the environment. These are not competing interests, they are shared priorities,” he told reporters in Ottawa. “The Government of Canada believes that the Trans Mountain Expansion pipeline is in our national interest, which is why we approved the project and why we continue to stand by our decision.” “The Government of Canada calls on Premier Horgan and the B.C. government to end all threats of delay to the Trans Mountain Expansion. His government’s actions stand to harm the entire Canadian economy. At a time of great global trade uncertainty, the importance of Canada’s role in the global energy market is bigger than individual projects and provinces.” Asked by reporters what the federal government was thinking of doing next, Carr responded: “all options are on the table.” The Independent Contractors and Businesses Association said they were “floored by today’s news that Kinder Morgan is close to pulling the plug on this vital national project because of the interference of the B.C. Government” and called on the prime minster “to get the Trans Mountain Pipeline Expansion project built.” “By strangling Trans Mountain, the B.C. NDP Government would throw away $5.7 billion in provincial tax revenue, $1 billion in municipal tax revenue, and the opportunities that come with 15,000 construction jobs and 189,000 person-years of employment,” ICBA president Chris Gardiner said in a statement. “This decision will send a simple chilling message to businesses looking to start or expand major projects here – stay away from B.C. because you cannot rely on the government to honour its commitments or follow the law.” “The blame for this development rests squarely on the shoulders of Justin Trudeau. He has failed to take a single concrete step to ensure this project is completed. All he has done is give us empty words with no action.” Kinder Morgan’s Kean noted that it was not his company’s role to play referee between the various levels of government. “A company cannot resolve differences between governments. While we have succeeded in all legal challenges to date, a company cannot litigate its way to an in-service pipeline amidst jurisdictional differences between governments,” said Kean. Kean noted that while KML is a “very good midstream energy company with limited debt,” the uncertainty surrounding the project has prompted the company to “protect the value that KML has, rather than risking billions of dollars.” Kinder Morgan will host a press conference on Monday morning to speak on its announcement.
Low
[ 0.469728601252609, 28.125, 31.75 ]
(classical music) - Hi BrainStuff, Cristen here. Let's talk about purity because we are surrounded by toxic stuff in this modern world. Car emissions in our air, factory runoff in our water. Herbicides and pesticides in our foods, trolls in our comment sections. If our bodies are our temples, every pizza roll is a desecration. So how could we become pure again? That got weird. Juice cleanses supposedly rid our bodies of toxins and restore our digestive systems. Depending on the specific and sometimes copyrighted cleanse, you spend a couple days to a couple weeks consuming nothing but liquefied fruits, vegetables, and maybe some nut milk. Since lots of people are pretty bad about eating enough fruits and vegetables to begin with, this may mean during a juice cleanse you'd be getting more vitamins and minerals than usual. These are substances your body needs to turn food in to energy and to grow and maintain cells. Some even have antioxidant properties which means that they can help prevent cellular damage under particular circumstances. The benefits of these vitamins and minerals are real, but keep in mind that your body can only process a certain amount of them at once. After that, you'll just excrete the rest. Research does show that eating fruits and vegetables rich in these substances can decrease some risks of some diseases in the long run, but the key phrase, in the long run. The best way to reap these benefits is to consistently eat five or more servings every day. One juice binge isn't gonna do much. Consuming nothing but juice for a few days also means you'd get a lot less fiber, fat, and protein and way fewer calories than normal. Fats and proteins are just as essential for healthy cellular functions as vitamins and minerals. And fiber in the diet is actually part of our colons normal cleansing system. Plus, fiber can slow down your bodies uptake of sugar, meaning your blood sugar level stay more stable. Without it, and considering the high levels of fruit sugars and the limited calories involved in a juice diet, you'll feel extra hungry and may experience dizzying blood sugar spikes and crashes. A day or two of this shouldn't do any harm to the average person, but restricting calories and nutrients for much longer than that can trigger starvation mode. Your body doesn't know when it's gonna get more food, so it slows your metabolism down, and when this happens too often, the change can be permanent. So is it worth it? Psychologically, maybe. You'll probably lose a little weight, due to the decrease in calories, which might be what you're looking for. And people around the world have been using short fasts to practice mindfulness for hundreds, if not, thousands of years. But, physiologically, juice cleanses don't help clear toxins out of your body. The thing is that your liver and kidneys are natural detoxifiers. They filter bad stuff out of your body all the time, but they need the full compliment of nutrients provided by a healthy diet in order to do so. But hey, I wanna know, have you tried a juice cleanse? And if so, how did it work out? And if not, what do you eat when you wanna feel better? Pizza rolls not included. Let me know in the comments, and give us a like if you learned something and subscribe so you won't miss our next video.
Mid
[ 0.549425287356321, 29.875, 24.5 ]
<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN"> <html> <head> <link rel="stylesheet" href="style.css" type="text/css"> <meta content="text/html; charset=iso-8859-1" http-equiv="Content-Type"> <meta name="viewport" content="width=device-width, initial-scale=1"> <link rel="Start" href="index.html"> <link rel="Up" href="Set.html"> <link title="Index of types" rel=Appendix href="index_types.html"> <link title="Index of extensions" rel=Appendix href="index_extensions.html"> <link title="Index of exceptions" rel=Appendix href="index_exceptions.html"> <link title="Index of values" rel=Appendix href="index_values.html"> <link title="Index of modules" rel=Appendix href="index_modules.html"> <link title="Index of module types" rel=Appendix href="index_module_types.html"> <link title="Arg" rel="Chapter" href="Arg.html"> <link title="Array" rel="Chapter" href="Array.html"> <link title="ArrayLabels" rel="Chapter" href="ArrayLabels.html"> <link title="Bigarray" rel="Chapter" href="Bigarray.html"> <link title="Bool" rel="Chapter" href="Bool.html"> <link title="Buffer" rel="Chapter" href="Buffer.html"> <link title="Bytes" rel="Chapter" href="Bytes.html"> <link title="BytesLabels" rel="Chapter" href="BytesLabels.html"> <link title="Callback" rel="Chapter" href="Callback.html"> <link title="CamlinternalFormat" rel="Chapter" href="CamlinternalFormat.html"> <link title="CamlinternalFormatBasics" rel="Chapter" href="CamlinternalFormatBasics.html"> <link title="CamlinternalLazy" rel="Chapter" href="CamlinternalLazy.html"> <link title="CamlinternalMod" rel="Chapter" href="CamlinternalMod.html"> <link title="CamlinternalOO" rel="Chapter" href="CamlinternalOO.html"> <link title="Char" rel="Chapter" href="Char.html"> <link title="Complex" rel="Chapter" href="Complex.html"> <link title="Condition" rel="Chapter" href="Condition.html"> <link title="Digest" rel="Chapter" href="Digest.html"> <link title="Dynlink" rel="Chapter" href="Dynlink.html"> <link title="Ephemeron" rel="Chapter" href="Ephemeron.html"> <link title="Event" rel="Chapter" href="Event.html"> <link title="Filename" rel="Chapter" href="Filename.html"> <link title="Float" rel="Chapter" href="Float.html"> <link title="Format" rel="Chapter" href="Format.html"> <link title="Fun" rel="Chapter" href="Fun.html"> <link title="Gc" rel="Chapter" href="Gc.html"> <link title="Genlex" rel="Chapter" href="Genlex.html"> <link title="Hashtbl" rel="Chapter" href="Hashtbl.html"> <link title="Int" rel="Chapter" href="Int.html"> <link title="Int32" rel="Chapter" href="Int32.html"> <link title="Int64" rel="Chapter" href="Int64.html"> <link title="Lazy" rel="Chapter" href="Lazy.html"> <link title="Lexing" rel="Chapter" href="Lexing.html"> <link title="List" rel="Chapter" href="List.html"> <link title="ListLabels" rel="Chapter" href="ListLabels.html"> <link title="Map" rel="Chapter" href="Map.html"> <link title="Marshal" rel="Chapter" href="Marshal.html"> <link title="MoreLabels" rel="Chapter" href="MoreLabels.html"> <link title="Mutex" rel="Chapter" href="Mutex.html"> <link title="Nativeint" rel="Chapter" href="Nativeint.html"> <link title="Obj" rel="Chapter" href="Obj.html"> <link title="Ocaml_operators" rel="Chapter" href="Ocaml_operators.html"> <link title="Oo" rel="Chapter" href="Oo.html"> <link title="Option" rel="Chapter" href="Option.html"> <link title="Parsing" rel="Chapter" href="Parsing.html"> <link title="Printexc" rel="Chapter" href="Printexc.html"> <link title="Printf" rel="Chapter" href="Printf.html"> <link title="Queue" rel="Chapter" href="Queue.html"> <link title="Random" rel="Chapter" href="Random.html"> <link title="Result" rel="Chapter" href="Result.html"> <link title="Scanf" rel="Chapter" href="Scanf.html"> <link title="Seq" rel="Chapter" href="Seq.html"> <link title="Set" rel="Chapter" href="Set.html"> <link title="Spacetime" rel="Chapter" href="Spacetime.html"> <link title="Stack" rel="Chapter" href="Stack.html"> <link title="StdLabels" rel="Chapter" href="StdLabels.html"> <link title="Stdlib" rel="Chapter" href="Stdlib.html"> <link title="Str" rel="Chapter" href="Str.html"> <link title="Stream" rel="Chapter" href="Stream.html"> <link title="String" rel="Chapter" href="String.html"> <link title="StringLabels" rel="Chapter" href="StringLabels.html"> <link title="Sys" rel="Chapter" href="Sys.html"> <link title="Thread" rel="Chapter" href="Thread.html"> <link title="ThreadUnix" rel="Chapter" href="ThreadUnix.html"> <link title="Uchar" rel="Chapter" href="Uchar.html"> <link title="Unit" rel="Chapter" href="Unit.html"> <link title="Unix" rel="Chapter" href="Unix.html"> <link title="UnixLabels" rel="Chapter" href="UnixLabels.html"> <link title="Weak" rel="Chapter" href="Weak.html"><link title="Iterators" rel="Section" href="#1_Iterators"> <title>Set.Make</title> </head> <body> <div class="navbar">&nbsp;<a class="up" href="Set.html" title="Set">Up</a> &nbsp;</div> <h1>Functor <a href="type_Set.Make.html">Set.Make</a></h1> <pre><span id="MODULEMake"><span class="keyword">module</span> Make</span>: <div class="sig_block"><code class="code"><span class="keyword">functor</span>&nbsp;(</code><code class="code"><span class="constructor">Ord</span></code><code class="code">&nbsp;:&nbsp;</code><code class="type"><a href="Set.OrderedType.html">OrderedType</a></code><code class="code">)&nbsp;<span class="keywordsign">-&gt;</span>&nbsp;</code><code class="type"><a href="Set.S.html">S</a></code><code class="type"> with type elt = Ord.t</code></div></pre><div class="info module top"> <div class="info-desc"> <p>Functor building an implementation of the set structure given a totally ordered type.</p> </div> </div> <table border="0" cellpadding="3" width="100%"> <tr> <td align="left" valign="top" width="1%%"><b>Parameters: </b></td> <td> <table class="paramstable"> <tr> <td align="center" valign="top" width="15%"> <code>Ord</code></td> <td align="center" valign="top">:</td> <td><code class="type"><a href="Set.OrderedType.html">OrderedType</a></code> </table> </td> </tr> </table> <hr width="100%"> <pre><span id="TYPEelt"><span class="keyword">type</span> <code class="type"></code>elt</span> </pre> <div class="info "> <div class="info-desc"> <p>The type of the set elements.</p> </div> </div> <pre><span id="TYPEt"><span class="keyword">type</span> <code class="type"></code>t</span> </pre> <div class="info "> <div class="info-desc"> <p>The type of sets.</p> </div> </div> <pre><span id="VALempty"><span class="keyword">val</span> empty</span> : <code class="type"><a href="Set.S.html#TYPEt">t</a></code></pre><div class="info "> <div class="info-desc"> <p>The empty set.</p> </div> </div> <pre><span id="VALis_empty"><span class="keyword">val</span> is_empty</span> : <code class="type"><a href="Set.S.html#TYPEt">t</a> -> bool</code></pre><div class="info "> <div class="info-desc"> <p>Test whether a set is empty or not.</p> </div> </div> <pre><span id="VALmem"><span class="keyword">val</span> mem</span> : <code class="type"><a href="Set.S.html#TYPEelt">elt</a> -> <a href="Set.S.html#TYPEt">t</a> -> bool</code></pre><div class="info "> <div class="info-desc"> <p><code class="code">mem&nbsp;x&nbsp;s</code> tests whether <code class="code">x</code> belongs to the set <code class="code">s</code>.</p> </div> </div> <pre><span id="VALadd"><span class="keyword">val</span> add</span> : <code class="type"><a href="Set.S.html#TYPEelt">elt</a> -> <a href="Set.S.html#TYPEt">t</a> -> <a href="Set.S.html#TYPEt">t</a></code></pre><div class="info "> <div class="info-desc"> <p><code class="code">add&nbsp;x&nbsp;s</code> returns a set containing all elements of <code class="code">s</code>, plus <code class="code">x</code>. If <code class="code">x</code> was already in <code class="code">s</code>, <code class="code">s</code> is returned unchanged (the result of the function is then physically equal to <code class="code">s</code>).</p> </div> <ul class="info-attributes"> <li><b>Before 4.03 </b> Physical equality was not ensured.</li> </ul> </div> <pre><span id="VALsingleton"><span class="keyword">val</span> singleton</span> : <code class="type"><a href="Set.S.html#TYPEelt">elt</a> -> <a href="Set.S.html#TYPEt">t</a></code></pre><div class="info "> <div class="info-desc"> <p><code class="code">singleton&nbsp;x</code> returns the one-element set containing only <code class="code">x</code>.</p> </div> </div> <pre><span id="VALremove"><span class="keyword">val</span> remove</span> : <code class="type"><a href="Set.S.html#TYPEelt">elt</a> -> <a href="Set.S.html#TYPEt">t</a> -> <a href="Set.S.html#TYPEt">t</a></code></pre><div class="info "> <div class="info-desc"> <p><code class="code">remove&nbsp;x&nbsp;s</code> returns a set containing all elements of <code class="code">s</code>, except <code class="code">x</code>. If <code class="code">x</code> was not in <code class="code">s</code>, <code class="code">s</code> is returned unchanged (the result of the function is then physically equal to <code class="code">s</code>).</p> </div> <ul class="info-attributes"> <li><b>Before 4.03 </b> Physical equality was not ensured.</li> </ul> </div> <pre><span id="VALunion"><span class="keyword">val</span> union</span> : <code class="type"><a href="Set.S.html#TYPEt">t</a> -> <a href="Set.S.html#TYPEt">t</a> -> <a href="Set.S.html#TYPEt">t</a></code></pre><div class="info "> <div class="info-desc"> <p>Set union.</p> </div> </div> <pre><span id="VALinter"><span class="keyword">val</span> inter</span> : <code class="type"><a href="Set.S.html#TYPEt">t</a> -> <a href="Set.S.html#TYPEt">t</a> -> <a href="Set.S.html#TYPEt">t</a></code></pre><div class="info "> <div class="info-desc"> <p>Set intersection.</p> </div> </div> <pre><span id="VALdisjoint"><span class="keyword">val</span> disjoint</span> : <code class="type"><a href="Set.S.html#TYPEt">t</a> -> <a href="Set.S.html#TYPEt">t</a> -> bool</code></pre><div class="info "> <div class="info-desc"> <p>Test if two sets are disjoint.</p> </div> <ul class="info-attributes"> <li><b>Since</b> 4.08.0</li> </ul> </div> <pre><span id="VALdiff"><span class="keyword">val</span> diff</span> : <code class="type"><a href="Set.S.html#TYPEt">t</a> -> <a href="Set.S.html#TYPEt">t</a> -> <a href="Set.S.html#TYPEt">t</a></code></pre><div class="info "> <div class="info-desc"> <p>Set difference: <code class="code">diff&nbsp;s1&nbsp;s2</code> contains the elements of <code class="code">s1</code> that are not in <code class="code">s2</code>.</p> </div> </div> <pre><span id="VALcompare"><span class="keyword">val</span> compare</span> : <code class="type"><a href="Set.S.html#TYPEt">t</a> -> <a href="Set.S.html#TYPEt">t</a> -> int</code></pre><div class="info "> <div class="info-desc"> <p>Total ordering between sets. Can be used as the ordering function for doing sets of sets.</p> </div> </div> <pre><span id="VALequal"><span class="keyword">val</span> equal</span> : <code class="type"><a href="Set.S.html#TYPEt">t</a> -> <a href="Set.S.html#TYPEt">t</a> -> bool</code></pre><div class="info "> <div class="info-desc"> <p><code class="code">equal&nbsp;s1&nbsp;s2</code> tests whether the sets <code class="code">s1</code> and <code class="code">s2</code> are equal, that is, contain equal elements.</p> </div> </div> <pre><span id="VALsubset"><span class="keyword">val</span> subset</span> : <code class="type"><a href="Set.S.html#TYPEt">t</a> -> <a href="Set.S.html#TYPEt">t</a> -> bool</code></pre><div class="info "> <div class="info-desc"> <p><code class="code">subset&nbsp;s1&nbsp;s2</code> tests whether the set <code class="code">s1</code> is a subset of the set <code class="code">s2</code>.</p> </div> </div> <pre><span id="VALiter"><span class="keyword">val</span> iter</span> : <code class="type">(<a href="Set.S.html#TYPEelt">elt</a> -> unit) -> <a href="Set.S.html#TYPEt">t</a> -> unit</code></pre><div class="info "> <div class="info-desc"> <p><code class="code">iter&nbsp;f&nbsp;s</code> applies <code class="code">f</code> in turn to all elements of <code class="code">s</code>. The elements of <code class="code">s</code> are presented to <code class="code">f</code> in increasing order with respect to the ordering over the type of the elements.</p> </div> </div> <pre><span id="VALmap"><span class="keyword">val</span> map</span> : <code class="type">(<a href="Set.S.html#TYPEelt">elt</a> -> <a href="Set.S.html#TYPEelt">elt</a>) -> <a href="Set.S.html#TYPEt">t</a> -> <a href="Set.S.html#TYPEt">t</a></code></pre><div class="info "> <div class="info-desc"> <p><code class="code">map&nbsp;f&nbsp;s</code> is the set whose elements are <code class="code">f&nbsp;a0</code>,<code class="code">f&nbsp;a1</code>... <code class="code">f<br> &nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;aN</code>, where <code class="code">a0</code>,<code class="code">a1</code>...<code class="code">aN</code> are the elements of <code class="code">s</code>.</p> <p>The elements are passed to <code class="code">f</code> in increasing order with respect to the ordering over the type of the elements.</p> <p>If no element of <code class="code">s</code> is changed by <code class="code">f</code>, <code class="code">s</code> is returned unchanged. (If each output of <code class="code">f</code> is physically equal to its input, the returned set is physically equal to <code class="code">s</code>.)</p> </div> <ul class="info-attributes"> <li><b>Since</b> 4.04.0</li> </ul> </div> <pre><span id="VALfold"><span class="keyword">val</span> fold</span> : <code class="type">(<a href="Set.S.html#TYPEelt">elt</a> -> 'a -> 'a) -> <a href="Set.S.html#TYPEt">t</a> -> 'a -> 'a</code></pre><div class="info "> <div class="info-desc"> <p><code class="code">fold&nbsp;f&nbsp;s&nbsp;a</code> computes <code class="code">(f&nbsp;xN&nbsp;...&nbsp;(f&nbsp;x2&nbsp;(f&nbsp;x1&nbsp;a))...)</code>, where <code class="code">x1&nbsp;...&nbsp;xN</code> are the elements of <code class="code">s</code>, in increasing order.</p> </div> </div> <pre><span id="VALfor_all"><span class="keyword">val</span> for_all</span> : <code class="type">(<a href="Set.S.html#TYPEelt">elt</a> -> bool) -> <a href="Set.S.html#TYPEt">t</a> -> bool</code></pre><div class="info "> <div class="info-desc"> <p><code class="code">for_all&nbsp;p&nbsp;s</code> checks if all elements of the set satisfy the predicate <code class="code">p</code>.</p> </div> </div> <pre><span id="VALexists"><span class="keyword">val</span> exists</span> : <code class="type">(<a href="Set.S.html#TYPEelt">elt</a> -> bool) -> <a href="Set.S.html#TYPEt">t</a> -> bool</code></pre><div class="info "> <div class="info-desc"> <p><code class="code">exists&nbsp;p&nbsp;s</code> checks if at least one element of the set satisfies the predicate <code class="code">p</code>.</p> </div> </div> <pre><span id="VALfilter"><span class="keyword">val</span> filter</span> : <code class="type">(<a href="Set.S.html#TYPEelt">elt</a> -> bool) -> <a href="Set.S.html#TYPEt">t</a> -> <a href="Set.S.html#TYPEt">t</a></code></pre><div class="info "> <div class="info-desc"> <p><code class="code">filter&nbsp;p&nbsp;s</code> returns the set of all elements in <code class="code">s</code> that satisfy predicate <code class="code">p</code>. If <code class="code">p</code> satisfies every element in <code class="code">s</code>, <code class="code">s</code> is returned unchanged (the result of the function is then physically equal to <code class="code">s</code>).</p> </div> <ul class="info-attributes"> <li><b>Before 4.03 </b> Physical equality was not ensured.</li> </ul> </div> <pre><span id="VALfilter_map"><span class="keyword">val</span> filter_map</span> : <code class="type">(<a href="Set.S.html#TYPEelt">elt</a> -> <a href="Set.S.html#TYPEelt">elt</a> option) -> <a href="Set.S.html#TYPEt">t</a> -> <a href="Set.S.html#TYPEt">t</a></code></pre><div class="info "> <div class="info-desc"> <p><code class="code">filter_map&nbsp;f&nbsp;s</code> returns the set of all <code class="code">v</code> such that <code class="code">f&nbsp;x&nbsp;=&nbsp;<span class="constructor">Some</span>&nbsp;v</code> for some element <code class="code">x</code> of <code class="code">s</code>.</p> <p>For example,</p> <pre class="codepre"><code class="code">filter_map (<span class="keyword">fun</span> n <span class="keywordsign">-&gt;</span> <span class="keyword">if</span> n <span class="keyword">mod</span> 2 = 0 <span class="keyword">then</span> <span class="constructor">Some</span> (n / 2) <span class="keyword">else</span> <span class="constructor">None</span>) s</code></pre><p>is the set of halves of the even elements of <code class="code">s</code>.</p> <p>If no element of <code class="code">s</code> is changed or dropped by <code class="code">f</code> (if <code class="code">f&nbsp;x&nbsp;=&nbsp;<span class="constructor">Some</span>&nbsp;x</code> for each element <code class="code">x</code>), then <code class="code">s</code> is returned unchanged: the result of the function is then physically equal to <code class="code">s</code>.</p> </div> <ul class="info-attributes"> <li><b>Since</b> 4.11.0</li> </ul> </div> <pre><span id="VALpartition"><span class="keyword">val</span> partition</span> : <code class="type">(<a href="Set.S.html#TYPEelt">elt</a> -> bool) -> <a href="Set.S.html#TYPEt">t</a> -> <a href="Set.S.html#TYPEt">t</a> * <a href="Set.S.html#TYPEt">t</a></code></pre><div class="info "> <div class="info-desc"> <p><code class="code">partition&nbsp;p&nbsp;s</code> returns a pair of sets <code class="code">(s1,&nbsp;s2)</code>, where <code class="code">s1</code> is the set of all the elements of <code class="code">s</code> that satisfy the predicate <code class="code">p</code>, and <code class="code">s2</code> is the set of all the elements of <code class="code">s</code> that do not satisfy <code class="code">p</code>.</p> </div> </div> <pre><span id="VALcardinal"><span class="keyword">val</span> cardinal</span> : <code class="type"><a href="Set.S.html#TYPEt">t</a> -> int</code></pre><div class="info "> <div class="info-desc"> <p>Return the number of elements of a set.</p> </div> </div> <pre><span id="VALelements"><span class="keyword">val</span> elements</span> : <code class="type"><a href="Set.S.html#TYPEt">t</a> -> <a href="Set.S.html#TYPEelt">elt</a> list</code></pre><div class="info "> <div class="info-desc"> <p>Return the list of all elements of the given set. The returned list is sorted in increasing order with respect to the ordering <code class="code"><span class="constructor">Ord</span>.compare</code>, where <code class="code"><span class="constructor">Ord</span></code> is the argument given to <a href="Set.Make.html"><code class="code"><span class="constructor">Set</span>.<span class="constructor">Make</span></code></a>.</p> </div> </div> <pre><span id="VALmin_elt"><span class="keyword">val</span> min_elt</span> : <code class="type"><a href="Set.S.html#TYPEt">t</a> -> <a href="Set.S.html#TYPEelt">elt</a></code></pre><div class="info "> <div class="info-desc"> <p>Return the smallest element of the given set (with respect to the <code class="code"><span class="constructor">Ord</span>.compare</code> ordering), or raise <code class="code"><span class="constructor">Not_found</span></code> if the set is empty.</p> </div> </div> <pre><span id="VALmin_elt_opt"><span class="keyword">val</span> min_elt_opt</span> : <code class="type"><a href="Set.S.html#TYPEt">t</a> -> <a href="Set.S.html#TYPEelt">elt</a> option</code></pre><div class="info "> <div class="info-desc"> <p>Return the smallest element of the given set (with respect to the <code class="code"><span class="constructor">Ord</span>.compare</code> ordering), or <code class="code"><span class="constructor">None</span></code> if the set is empty.</p> </div> <ul class="info-attributes"> <li><b>Since</b> 4.05</li> </ul> </div> <pre><span id="VALmax_elt"><span class="keyword">val</span> max_elt</span> : <code class="type"><a href="Set.S.html#TYPEt">t</a> -> <a href="Set.S.html#TYPEelt">elt</a></code></pre><div class="info "> <div class="info-desc"> <p>Same as <a href="Set.S.html#VALmin_elt"><code class="code"><span class="constructor">Set</span>.<span class="constructor">S</span>.min_elt</code></a>, but returns the largest element of the given set.</p> </div> </div> <pre><span id="VALmax_elt_opt"><span class="keyword">val</span> max_elt_opt</span> : <code class="type"><a href="Set.S.html#TYPEt">t</a> -> <a href="Set.S.html#TYPEelt">elt</a> option</code></pre><div class="info "> <div class="info-desc"> <p>Same as <a href="Set.S.html#VALmin_elt_opt"><code class="code"><span class="constructor">Set</span>.<span class="constructor">S</span>.min_elt_opt</code></a>, but returns the largest element of the given set.</p> </div> <ul class="info-attributes"> <li><b>Since</b> 4.05</li> </ul> </div> <pre><span id="VALchoose"><span class="keyword">val</span> choose</span> : <code class="type"><a href="Set.S.html#TYPEt">t</a> -> <a href="Set.S.html#TYPEelt">elt</a></code></pre><div class="info "> <div class="info-desc"> <p>Return one element of the given set, or raise <code class="code"><span class="constructor">Not_found</span></code> if the set is empty. Which element is chosen is unspecified, but equal elements will be chosen for equal sets.</p> </div> </div> <pre><span id="VALchoose_opt"><span class="keyword">val</span> choose_opt</span> : <code class="type"><a href="Set.S.html#TYPEt">t</a> -> <a href="Set.S.html#TYPEelt">elt</a> option</code></pre><div class="info "> <div class="info-desc"> <p>Return one element of the given set, or <code class="code"><span class="constructor">None</span></code> if the set is empty. Which element is chosen is unspecified, but equal elements will be chosen for equal sets.</p> </div> <ul class="info-attributes"> <li><b>Since</b> 4.05</li> </ul> </div> <pre><span id="VALsplit"><span class="keyword">val</span> split</span> : <code class="type"><a href="Set.S.html#TYPEelt">elt</a> -> <a href="Set.S.html#TYPEt">t</a> -> <a href="Set.S.html#TYPEt">t</a> * bool * <a href="Set.S.html#TYPEt">t</a></code></pre><div class="info "> <div class="info-desc"> <p><code class="code">split&nbsp;x&nbsp;s</code> returns a triple <code class="code">(l,&nbsp;present,&nbsp;r)</code>, where <code class="code">l</code> is the set of elements of <code class="code">s</code> that are strictly less than <code class="code">x</code>; <code class="code">r</code> is the set of elements of <code class="code">s</code> that are strictly greater than <code class="code">x</code>; <code class="code">present</code> is <code class="code"><span class="keyword">false</span></code> if <code class="code">s</code> contains no element equal to <code class="code">x</code>, or <code class="code"><span class="keyword">true</span></code> if <code class="code">s</code> contains an element equal to <code class="code">x</code>.</p> </div> </div> <pre><span id="VALfind"><span class="keyword">val</span> find</span> : <code class="type"><a href="Set.S.html#TYPEelt">elt</a> -> <a href="Set.S.html#TYPEt">t</a> -> <a href="Set.S.html#TYPEelt">elt</a></code></pre><div class="info "> <div class="info-desc"> <p><code class="code">find&nbsp;x&nbsp;s</code> returns the element of <code class="code">s</code> equal to <code class="code">x</code> (according to <code class="code"><span class="constructor">Ord</span>.compare</code>), or raise <code class="code"><span class="constructor">Not_found</span></code> if no such element exists.</p> </div> <ul class="info-attributes"> <li><b>Since</b> 4.01.0</li> </ul> </div> <pre><span id="VALfind_opt"><span class="keyword">val</span> find_opt</span> : <code class="type"><a href="Set.S.html#TYPEelt">elt</a> -> <a href="Set.S.html#TYPEt">t</a> -> <a href="Set.S.html#TYPEelt">elt</a> option</code></pre><div class="info "> <div class="info-desc"> <p><code class="code">find_opt&nbsp;x&nbsp;s</code> returns the element of <code class="code">s</code> equal to <code class="code">x</code> (according to <code class="code"><span class="constructor">Ord</span>.compare</code>), or <code class="code"><span class="constructor">None</span></code> if no such element exists.</p> </div> <ul class="info-attributes"> <li><b>Since</b> 4.05</li> </ul> </div> <pre><span id="VALfind_first"><span class="keyword">val</span> find_first</span> : <code class="type">(<a href="Set.S.html#TYPEelt">elt</a> -> bool) -> <a href="Set.S.html#TYPEt">t</a> -> <a href="Set.S.html#TYPEelt">elt</a></code></pre><div class="info "> <div class="info-desc"> <p><code class="code">find_first&nbsp;f&nbsp;s</code>, where <code class="code">f</code> is a monotonically increasing function, returns the lowest element <code class="code">e</code> of <code class="code">s</code> such that <code class="code">f&nbsp;e</code>, or raises <code class="code"><span class="constructor">Not_found</span></code> if no such element exists.</p> <p>For example, <code class="code">find_first&nbsp;(<span class="keyword">fun</span>&nbsp;e&nbsp;<span class="keywordsign">-&gt;</span>&nbsp;<span class="constructor">Ord</span>.compare&nbsp;e&nbsp;x&nbsp;&gt;=&nbsp;0)&nbsp;s</code> will return the first element <code class="code">e</code> of <code class="code">s</code> where <code class="code"><span class="constructor">Ord</span>.compare&nbsp;e&nbsp;x&nbsp;&gt;=&nbsp;0</code> (intuitively: <code class="code">e&nbsp;&gt;=&nbsp;x</code>), or raise <code class="code"><span class="constructor">Not_found</span></code> if <code class="code">x</code> is greater than any element of <code class="code">s</code>.</p> </div> <ul class="info-attributes"> <li><b>Since</b> 4.05</li> </ul> </div> <pre><span id="VALfind_first_opt"><span class="keyword">val</span> find_first_opt</span> : <code class="type">(<a href="Set.S.html#TYPEelt">elt</a> -> bool) -> <a href="Set.S.html#TYPEt">t</a> -> <a href="Set.S.html#TYPEelt">elt</a> option</code></pre><div class="info "> <div class="info-desc"> <p><code class="code">find_first_opt&nbsp;f&nbsp;s</code>, where <code class="code">f</code> is a monotonically increasing function, returns an option containing the lowest element <code class="code">e</code> of <code class="code">s</code> such that <code class="code">f&nbsp;e</code>, or <code class="code"><span class="constructor">None</span></code> if no such element exists.</p> </div> <ul class="info-attributes"> <li><b>Since</b> 4.05</li> </ul> </div> <pre><span id="VALfind_last"><span class="keyword">val</span> find_last</span> : <code class="type">(<a href="Set.S.html#TYPEelt">elt</a> -> bool) -> <a href="Set.S.html#TYPEt">t</a> -> <a href="Set.S.html#TYPEelt">elt</a></code></pre><div class="info "> <div class="info-desc"> <p><code class="code">find_last&nbsp;f&nbsp;s</code>, where <code class="code">f</code> is a monotonically decreasing function, returns the highest element <code class="code">e</code> of <code class="code">s</code> such that <code class="code">f&nbsp;e</code>, or raises <code class="code"><span class="constructor">Not_found</span></code> if no such element exists.</p> </div> <ul class="info-attributes"> <li><b>Since</b> 4.05</li> </ul> </div> <pre><span id="VALfind_last_opt"><span class="keyword">val</span> find_last_opt</span> : <code class="type">(<a href="Set.S.html#TYPEelt">elt</a> -> bool) -> <a href="Set.S.html#TYPEt">t</a> -> <a href="Set.S.html#TYPEelt">elt</a> option</code></pre><div class="info "> <div class="info-desc"> <p><code class="code">find_last_opt&nbsp;f&nbsp;s</code>, where <code class="code">f</code> is a monotonically decreasing function, returns an option containing the highest element <code class="code">e</code> of <code class="code">s</code> such that <code class="code">f&nbsp;e</code>, or <code class="code"><span class="constructor">None</span></code> if no such element exists.</p> </div> <ul class="info-attributes"> <li><b>Since</b> 4.05</li> </ul> </div> <pre><span id="VALof_list"><span class="keyword">val</span> of_list</span> : <code class="type"><a href="Set.S.html#TYPEelt">elt</a> list -> <a href="Set.S.html#TYPEt">t</a></code></pre><div class="info "> <div class="info-desc"> <p><code class="code">of_list&nbsp;l</code> creates a set from a list of elements. This is usually more efficient than folding <code class="code">add</code> over the list, except perhaps for lists with many duplicated elements.</p> </div> <ul class="info-attributes"> <li><b>Since</b> 4.02.0</li> </ul> </div> <h2 id="1_Iterators">Iterators</h2> <pre><span id="VALto_seq_from"><span class="keyword">val</span> to_seq_from</span> : <code class="type"><a href="Set.S.html#TYPEelt">elt</a> -> <a href="Set.S.html#TYPEt">t</a> -> <a href="Set.S.html#TYPEelt">elt</a> <a href="Seq.html#TYPEt">Seq.t</a></code></pre><div class="info "> <div class="info-desc"> <p><code class="code">to_seq_from&nbsp;x&nbsp;s</code> iterates on a subset of the elements of <code class="code">s</code> in ascending order, from <code class="code">x</code> or above.</p> </div> <ul class="info-attributes"> <li><b>Since</b> 4.07</li> </ul> </div> <pre><span id="VALto_seq"><span class="keyword">val</span> to_seq</span> : <code class="type"><a href="Set.S.html#TYPEt">t</a> -> <a href="Set.S.html#TYPEelt">elt</a> <a href="Seq.html#TYPEt">Seq.t</a></code></pre><div class="info "> <div class="info-desc"> <p>Iterate on the whole set, in ascending order</p> </div> <ul class="info-attributes"> <li><b>Since</b> 4.07</li> </ul> </div> <pre><span id="VALadd_seq"><span class="keyword">val</span> add_seq</span> : <code class="type"><a href="Set.S.html#TYPEelt">elt</a> <a href="Seq.html#TYPEt">Seq.t</a> -> <a href="Set.S.html#TYPEt">t</a> -> <a href="Set.S.html#TYPEt">t</a></code></pre><div class="info "> <div class="info-desc"> <p>Add the given elements to the set, in order.</p> </div> <ul class="info-attributes"> <li><b>Since</b> 4.07</li> </ul> </div> <pre><span id="VALof_seq"><span class="keyword">val</span> of_seq</span> : <code class="type"><a href="Set.S.html#TYPEelt">elt</a> <a href="Seq.html#TYPEt">Seq.t</a> -> <a href="Set.S.html#TYPEt">t</a></code></pre><div class="info "> <div class="info-desc"> <p>Build a set from the given bindings</p> </div> <ul class="info-attributes"> <li><b>Since</b> 4.07</li> </ul> </div> </body></html>
Low
[ 0.528260869565217, 30.375, 27.125 ]
Branding design for The Sterling Mason, a new development by Taconic Investment Partners, with Douglas Elliman Development Marketing. Program included naming, logo design, brochure, website, signage, and showroom. Branding development and design for 211 Elizabeth, a residential building designed by Roman and Williams, in Nolita. Scope of work included logo, brochure, advertising, and signage design. Stribling Marketing Associates. Branding and marketing for One Hawthorne, a new residential tower in San Francisco. Scope of work included logo, brochure, direct mail, signage, advertising, showroom and web design. The Mark Company. Jackson Pacific, developer. Brand identity and marketing development for 211 East 51st Street, a residential conversion of a mid-century building in midtown Manhattan, including logo, brochure, windows, showroom graphics, advertising and web design. HJ Property Development.
High
[ 0.662337662337662, 31.875, 16.25 ]
rssNimbus Available for Beta Testing The first demo deployment of rssNimbus, a rssCloud server for Google App Engine, is on the air for limited beta testing at http://rssnimbus.appspot.com/. I would greatly appreciate any feedback on how it works for people attempting basic pings and notifications. Be forewarned that it still needs to be hooked into GAE’s cron processes so that hourly housekeeping can be performed (i.e., expiring subscriptions, pushing out delayed notifications, etc.) Also, please note that as of this iteration, no subscriptions are being expired. You can find a test version of rssNimbus at http://rssnimbus.appspot.com/ with additional instructions on its home page for using it. Please post any comments, issues, bugs, or feedback as comments to this post. Once the final kinks are out of it and the basic UI is turned on for admin functions, a user-installable version of rssNimbus will be made available as a .zip archive for anyone who wants to take a shot at installing and running their own GAE-based rssCloud server. Hopefully that archive will be available this weekend, depending on feedback and last minute issues.
Mid
[ 0.6466165413533831, 32.25, 17.625 ]
Tag Archives: cheating partners There’s never a point where one tires of wearing velvet. You can never have or own too much velvet clothing. The beautiful soft material is a type of woven tufted fabric in which the cut threads are evenly distributed, with … Continue reading → Chances are, if you’re wearing gladrags, you’re already spiced up! What are gladrags? Gladrags are defined as clothes for a special occasion; one’s best clothes. For the fashion lovers and the not so fashion lovers, a sure way to spruce … Continue reading → Hello to All, I am happy to announce that myself as a social media beauty/fashion/style influencer, and through my online global fashion/style/beauty magazine Strutting in Style! (https://www.struttinginstyle.com), I have teamed with retail giant Amazon and Amazon.com to introduce you to numerous … Continue reading → Wristwatches do more than tell time; they decorate your arm much like a fancy bracelet or a decorative arm chain. I have fun with costume watches, and being a lover of jewelry and all things sparkly, I enjoy wearing festive, beautiful … Continue reading → The color red is empowering. Lipstick is a cosmetic that accentuates your mouth, brings out your facial features and adds a touch of sensuality to your appearance. What do you get when you blend the two and paint up your … Continue reading →
Low
[ 0.47596153846153805, 24.75, 27.25 ]
// Copyright 2012 The Go Authors. All rights reserved. // Use of this source code is governed by a BSD-style // license that can be found in the LICENSE file. // The package f is a go/doc test for functions and factory methods. package f // ---------------------------------------------------------------------------- // Factory functions for non-exported types must not get lost. type private struct{} // Exported must always be visible. Was issue 2824. func Exported() private {}
Low
[ 0.404896421845574, 26.875, 39.5 ]
Q: Topology of Disjoint Sets Forms Cover I noticed the following when looking at the various topologies on finite sets (specifically 2, 3, and 4 elements). If $\mathcal{T}$ is a topology on a point set $X$, and $\mathcal{T}\backslash\{X\}$ is pairwise disjoint, then $\mathcal{T}\backslash\{X\}$ forms an open cover of $X$. I have no idea if this is true. I had tried to create several counterexamples but cannot find any. So is this true in just some cases, or all cases? A: If $\mathcal{T}\setminus \{X\}$ has at least two non-empty sets $U,V$ in it, such that $U \cup V \neq X$, then $U \cup V$ cannot be disjoint from $U$ or $V$, while all 3 are in $\mathcal{T}\setminus \{X\}$. And if $\mathcal{T}\setminus \{X\}$ has three pairwise disjoint non-empty sets $U,V,W$ then $U,V$ satisfy the previous case. So $\mathcal{T}\setminus \{X\}$ pairwise disjoint implies that $\mathcal{T}\setminus \{X\}$ has at most two non-empty sets, and if there are two, their union must equal $X$. So all such topologies are of the form $\{X,\emptyset\}$, $\{X,\emptyset ,A\}$ or $\{\emptyset, X, A, X\setminus A\}$. In the latter case your cover statement holds, but for the first two it does not. The Sierpinski topology $\{\emptyset ,\{0,1\}, \{0\}\}$ on $\{0,1\}$ is the smallest non-trivial counterexample. $\mathcal{T}\setminus \{X\}$ is then $\{\emptyset, \{0\}\}$ which is pairwise disjoint but not a cover. You probably encountered the last type a few times, and didn't consider the more trivial examples of pairwise disjoint sets. So it's true iff $\left|\mathcal{T}\setminus \{X\} \right| = 3$ (including $\emptyset$) and is (pairwise) disjoint.
Mid
[ 0.617710583153347, 35.75, 22.125 ]
// Code generated by go generate. DO NOT EDIT. package opt import ( "github.com/algolia/algoliasearch-client-go/v3/algolia/opt" ) // ExtractGetRankingInfo returns the first found GetRankingInfoOption from the // given variadic arguments or nil otherwise. func ExtractGetRankingInfo(opts ...interface{}) *opt.GetRankingInfoOption { for _, o := range opts { if v, ok := o.(*opt.GetRankingInfoOption); ok { return v } } return nil }
Low
[ 0.504347826086956, 29, 28.5 ]
This stylish Embroidered Blouse is a modern classic. Made from 100% cotton, this top is the perfect combination of style and comfort for warmer days. With delicate embroidery for a feminine touch. KEY FEATURES Style # 00140614 100% Cotton Voile Embroidered detail FABRIC : 100% Cotton Voile Shipping Free shipping on orders over $60 available for a limited time only. Promotion will be automatically applied to baskets over $60. No further discounts apply. There may be delays of delivery during busy periods (including sales). For information please see our deliveries page. $30.00 This stylish Embroidered Blouse is a modern classic. Made from 100% cotton, this top is the perfect combination of style and comfort for warmer days. With delicate embroidery for a feminine touch.
Mid
[ 0.587951807228915, 30.5, 21.375 ]
Q: Tagging strings in Java How can i tag an array of string in java ? I want to make an array of strings and tag them like : m funny s funny t boring k boring Then if the user can search for them by tagging like search : funny :: m,s A: // key is tag, value all the strings which have this tag. HashMap<String, HashSet<String>> tags = new HashMap<String, HashSet<String>>(); // words that with the tag: funny Set<String> words = tags.get("funny"); If one word can have multiple tags, then you might have another map: // key is string, value all the tags for the string HashMap<String, HashSet<String>> invertedTags = new HashMap<String, HashSet<String>>(); // tags of the word: "m" Set<String> tags = invertedTags.get("m"); A: I suggest using a Guava MultiMap of tags to strings. This way you can get all the Strings with a given tag with a single lookup. MultiMap<String, String> tagStringMap = new MultiMap<String, String>(); // load up the tag to strings. tagStringMap.put(tag1, string1); // single lookup gets everything. Collection<String> strings = tagStringMap.get(tag);
High
[ 0.6568914956011731, 28, 14.625 ]
There is a full list of the movies, OVA's, Specials etc. there in chronogical order. - User:Kill You/sig 17:30, April 13, 2011 (UTC) Personally, I simply first finished off watching the series both when watching Dragon Ball and Dragon Ball Z. After finishing Dragon Ball, I watched Dragon Ball Movies. (considering they were all alternate stories to the series, unlike DBZ, it's just fine.) After finishing DBZ, I started watching the movies yet again. Well, when you watch them you can guess what sagas between a movie is, actually. Even if not, it's still no big issue as you get to see a complete separated story/stories when watching the moveis. - User:Kill You/sig 17:39, April 13, 2011 (UTC) Helo There, I watched the series and the movies around the same time. So i know what the best time is to watch all the movies. Some of the movies don't realy link to the series but based on age and abilities of the Z figthers a made this list. Also some of the movies are based on happenings in the series. Here is my list: Dragonball All the Dragonball (not Z) movies are alternative story lines. Beter watch them after the Dragonball episodes. Dragonball Z Dead Zone - Around the start of DragonBall Z. World's Strongest - Along side the end of Saiyan Saga. After Goku gets back from King KaI. Tree of Might - Same as above. (but everyone is stronger then they should be at that time. Like they are on Namek, but Goku isn't an Super Saiyan yet) Lord Slug - Same as above. Cooler's Revenge - After Frieza Saga. Return of Cooler - Along side the Android Saga. Before the Cell Saga. Super Android 13 - Same as above. Broly: Legendary Super Saiyan - During the Cell Saga. Bojack Unbound - After the Cell Saga. Broly: The Second Coming - Along side the Majin Buu Saga. Bio-Broly - Same as above. After the World Martial Arts Tournament ended. Fusion Reborn - After Goku beats Kid Buu. Wrath of the Dragon: - Same as above. Special 01: Bardock Father Of Goku - The Story play's before Dragoball begins but it's recommended to watch it after the Frieza Saga. Special 02: The History Of Trunks - Best to watch this after the Android Saga. Special 03: The Plan to Eradicate the Super Saiyans - Best to watch this after the Cell saga. Special 04: Yo! Son Goku and His Friends Return!! - Best to watch this after Dragonball Z. Dragonball GT GT Movie: A Hero's Legacy - Best to watch this after Dragonball GT. I hope you enjoy my list. GVR. Most Movies don't follow any order thus it doesn't really matter but some do e.g The Bojack Movie takes place near exactly after the cell games. Broly: The Legendary Super Saiyan took place during the 10-day wait for the Cell Games, NOT after the Cell Games (otherwise Gohan would be able to go SSJ2) Plan To Eradicate The Saiyans OVA: same as above - How can Cooler's Revenge possibly come after the Frieza Saga when Goku doesn't even come back to earth until the end of the Trunks Saga???? Cooler's REvenge comes after the Trunks Saga and Before the Android Saga.--John.fletcher.52459 (talk) 10:14, September 22, 2014 (UTC) Here is what I would think on timeline placement of DBZ movies: Dead Zone - Before DBZ, however, it doesn't explain why everyone was surprised. World's Strongest - Along side the end of Saiyan Saga. After Goku gets back from King Kai without being delayed, meaning less to 0 deaths for the Z-Fighters. Tree of Might - Same as above. Lord Slug - Same as above. Cooler's Revenge - After Frieza Saga if the Spirit Bomb killed Frieza(due to no SSJ until the last fight). Broly: Legendary Super Saiyan - During the 10 day wait, but it doesn't fit due to the whole "stay in SSJ until the 10 day wait is over." Bojack Unbound - After the Cell Saga. Nothing seems to prevent it and can fit in with canon like Battle of Gods. Broly: The Second Coming - would say before WMAT. Bio-Broly - After WMAT, before Buu. Fusion Reborn - Due to SSJ3 being shown, I would say it was after either Gotenks or Gohan killed Buu. Since they know fusion, both Goku and Vegeta are dead, Gohan was using Ultimate instead of SSJ, and Videl seems to be with the Son family at the start, implying they are already starting to be together.
Low
[ 0.508733624454148, 29.125, 28.125 ]
Great Customer Service | Quality Products | Expert Installers There are several options available to you for enhancing your home with new windows that include clad, wood and vinyl. Bear Roofing & Exteriors has over 20 years of experience installing windows on homes just like yours. Our knowledgeable sales team will guide you through the entire process of installing your new windows. They will: Work with your insurance company when dealing with storm or other damage covered under your policy. Help you decide which type of materials are best suited for your needs. Help with color selection and other options that will maximize the curb appeal and value of your home. Reasons to Choose Clad Windows Energy efficient. Covered (clad) with vinyl or aluminum for protection. Durable. Added structural integrity. Low Maintenance. Reasons to Choose Wood Windows Superior insulating power than vinyl or metal. Less cracking, expansion and contracting during weather extremes. Classic styling. Reasons to Choose Vinyl Windows Low Maintenance. Durable Weather resistant. Energy efficient. Variety of styles available. Contact Bear Roofing & Exteriors to get started on your roofing or home exterior project. We are local contractors who care about our customers. (651) 407-1987 JavaScript must be enabled in order for you to use Google Maps.However, it seems JavaScript is either disabled or not supported by your browser. To view Google Maps, enable JavaScript by changing your browser options, and then try again. JavaScript must be enabled in order for you to use Google Maps.However, it seems JavaScript is either disabled or not supported by your browser. To view Google Maps, enable JavaScript by changing your browser options, and then try again.
Mid
[ 0.5484581497797351, 31.125, 25.625 ]
1-48 of 377 results Size 10 vintage 50/60s style swing dress. Dress appears to be hand made with gathered waist and metal zip on the side. In excellent condition except for a small stain at the front as seen in the photo. Dress is a synthetic fibre (not 100% sure what) and is unlined and slightly sheer. A 1950s pure cotton novelty swing or jive skirt in good condition. One patch on upper left hand front side & other upper right hand side on back. Nevertheless, the cotton is in excellent sturdy condition. THEY APPEAR TO BE MOSTLY HANDMADE AND ARE VERY HIGH IN QUALITY. THEY ARE A JACKIE O STYLE ROUND TOE WITH A SKIN COVERED HEEL THE SOLE ARE HAND MADE OF HEAVY LEATHER. THEY HAVE A TINY GOLD DETAIL AT THE TOP OF THE HEEL AND SOFT GOLD KID SKIN LEATHER INSOLES. Stunning formal dress with beaded wide neckline, ruched bodice and super wide skirt (more than a full circle) with taffeta underskirt. There are a few very small holes (about 10 in total) in the skirt but they do not detract from the glamour of the dress (see last pic). It fits a size 8 roughly. It has a voluminous circle skirt and 3/4 sleeves. There is no lining. I’m not sure what kind of fabric it is, but it has a velvet feel. Sweep of circle skirt: 187cm flat x2 = 374cm circumference approx. Small keyhole feature detail at centre front. high round neckline with small stand up colllar. handmade floor length evening dress. little bit of 'shine' to the material at the underarm area (hardly noticeable). The skirt is made up of a black chiffon type layered skirt that is slightly longer than the top chiffon layer of green & black check. has a full skirt to just below knee length. straight neckline. BUST - 90 cms. Fitted at waist with full circle 'dance' skirt in a weighty grosgrain material. fitted inky black velvet bodice with bead & 'pearl' feature. small cap sleeves. small shoulder pads. small hand-stitching repair has been made to underarm. Skirt has a kick pleat at the centre back hem. fitted through the bodice to a fitted small waist. straight fitted skirt to just on/below knee length. dolman style fitted bodice with long sleeves. dress is white with a soft mint green flower design all-over that at first glance appears to resemble broderie anglaise. Original Vintage 50s 60s Coconut Purse Handbag Back In the day these were usually sold in tourist shops Features Cute Kitsch Face on Front with a Button nose that enables you to close the lid Has Lining inside and String Rope Carry Handle Good Coconut Size Measures 16 cm across, Height 14 cm ( not including handles ) Okay Vintage Condition has age related wear and tear consistent with a Vintage Pre-Loved item over 50yrs old Great for any Pinup , Rockabilly outfit Check out my other listings as am clearing out Vintage stock , so grab a bargain, will combine postage Any questions please ask Please choose carefully as there is no returns or refunds Payment please to be made within 3 days Wool yarn with a silver Lurex fleck. Raglan sleeves. Fantastic hand knitted jumper. Around bottom of jumper. 123cms. Asset to any wardrobe. Dress it up or down. Great with pencil skirt, Capri pants, Jeans and so much more. Lovely hand-made 50's dress in classic black with small white spot all-over. v neckline with oversize shawl collar. full mid calf length skirt pleated from waist. would also look great with a full petticoat under the skirt. Fantastic one off handmade sleeveless fit & flare dress. Dress is in very good used condition. Asset to any wardrobe. Dress it up or down. Add your own belt. #Note - Belt in photos is for styling purposes only. Box pleats in straight skirt. Handmade so no size labels. so. There is loads of room to let this dress out down both sides. Length of shoulder seam. 14cms. Cap of sleeve to end of rolled up cuff. 24cms. The hem is self faced, not turned so the length is static. And they sewed all their own clothes, often identical. Good size pockets. I shall soak it again and try to remove the brown marks from the pockets. Beauty is Bliss Vintage This gorgeous, pre-loved vintage dress is handmade with sweet pleats from the waist down. It has two big, beautiful buttons and a little collar. It will fit a size 8. Measurements: Bust- 33" Waist- 26" Length- 79" If you have any questions or queries don’t hesitate to message! Have a fabulous day! BEAUTIFUL 1953 ANTIQUE EMBROIDERED CHRISTENING GOWN. The 1953's Christening gown is in very good condition. Christening Gown Hand Made in Australia circa 1953. Included is a new under petticoat in a soft cool fabric with a hand stitched antique lace edging.
Mid
[ 0.5440806045340051, 27, 22.625 ]
Barcelona Deny Neymar Return Reports Neymar Barcelona vice-president, Jordi Cardoner says no internal talks have taken place regarding the possibility of trying to re-sign Neymar. Reports in Spain this week have suggested Barca are keen to bring the Paris Saint-Germain forward back to Camp Nou, 14 months after selling him to the Ligue 1 champions for a world record €222 million (£195m/$255m). Arsenal are ready to join the chase for Barcelona attacker Malcom, according to Sport. Although he only joined the club in the summer, he has been rarely used at Camp Nou and could be shipped out in January. Inter and Tottenham are among the clubs whose eye has already been caught. Barca value him at €50 million (£44m/$57m), despite having bought him for €40m in the summer. Paris Saint-Germain are aware that Neymar could depart in the near future and have identified Atletico Madrid striker Antoine Griezmann as the man they want to replace the Brazilian, reports the Mirror. The Ligue 1 champions are determined to ensure that one superstar is replaced with another and will have the required funds available to make that happen from any sale of their current record buy.
Low
[ 0.525, 31.5, 28.5 ]
Q: Projection of point onto closest point on geodesic in hyperbolic geometry (hyperboloid model) Lets say we have a point $p\in\mathbb{H}^n$ in hyperbolic space (with curvature 1). And a geodesic, starting at the origin $(1,0,\ldots,0)$ in direction $\mathbf{v}$. What I'd like to do, is to find the point $v^*$ on the geodesic described by $\mathbf{v}$ that is closest to $p$. So the geodesic connecting $v^*$ and $p$ would then be the shortest of all geodesics that connect $p$ with a point $v'$ on the geodesic described by $\mathbf{v}$. The following picture illustrates the situation on the Poincaré disk: How can you compute $v^*$? I only know how to do this in Euclidean geometry. I'm not sure if it translates to hyperbolic geometry. In Euclidean geometry, the orthogonal projection of $\mathbf{x}$ onto a line through the origin described by $\mathbf{w}$ can be computed as follows: $$ proj_\mathbf{x}(\mathbf{w})= \frac{\langle \mathbf{x},\mathbf{w}\rangle}{\langle\mathbf{w},\mathbf{w}\rangle}\mathbf{w}= \langle \mathbf{x},\widehat{\mathbf{w}}\rangle\widehat{\mathbf{w}} $$ where $\widehat{\mathbf{w}}=\mathbf{w}/\|\mathbf{w}\|$. Now, the term $\langle \mathbf{x},\widehat{\mathbf{w}}\rangle$ is the distance that we need to travel in the direction of $\widehat{\mathbf{w}}$ to get to $proj_\mathbf{x}(\mathbf{w})$. Now, I've asked myself: If we use the hyperboloid model of hyperbolic geometry. Can we just use the Minkowski inner product $\langle \cdot,\cdot\rangle_*$ (induced by the metric tensor $g=diag((-1,1,...,1)))$ and compute the distance via $\langle p, \widehat{v}\rangle_*$? I think that's rather not correct, because distances are measured as follows in the hyperboloid model: $$ d(p,q)=\cosh^{-1}(-\langle p,q\rangle_*) $$ So my attempt to define the projection of $p$ onto the closest point on a geodesic desribed by $v$ (starting from the origin) is $$ proj_{v}(p)=\arg\min_{v^*} d(u,v^*) =\arg\min_{v^*}\cosh^{-1}(-\langle u,v^*\rangle_*) $$ where $v^*$ lie on the geodesic described by $v$ (starting from origin). However, I don't know how to describe the geodesic continuing in the direction of $v$ as an expression that I could plug into the optimization for $v^*$. Then I'd just differentiate to get to the solution. If I'm even correct up until here, can you help me to continue? I'm starting to get familiar with hyperbolic geometry. So even if you just point me to topics I'm happy. A: The hyperboloid is the set of all points $\vec x\in\mathbb R^{n,1}$ satisfying $$\vec x^2=\vec x\cdot\vec x=\frac1K$$ where $K=-1$ is the Gaussian curvature. Differentiating this, we find $$2\,\vec x\cdot\vec x'=0$$ that any tangent vector is orthogonal to the position vector. The geodesic through $\vec x_0$ in the direction $\vec v_0$ (we require $\vec x_0\cdot\vec v_0=0$) can be parametrized by $$\vec x=\vec x_0\cosh\theta+\frac{\vec v_0}{\lVert\vec v_0\rVert}\sinh\theta=\hat x_0\cosh\theta+\hat v_0\sinh\theta.$$ We can verify that this is always on the hyperboloid: $$\vec x^2=\hat x_0^2\cosh^2\theta+\hat v_0^2\sinh^2\theta+2\hat x_0\cdot\hat v_0\sinh\theta\cosh\theta$$ $$=-\cosh^2\theta+\sinh^2\theta=-1.$$ Its velocity is $$\vec v=\frac{d\vec x}{d\theta}=\hat x_0\sinh\theta+\hat v_0\cosh\theta$$ which has constant magnitude: $$\vec v^2=-\sinh^2\theta+\cosh^2\theta=+1.$$ We can also verify that it is actually a geodesic, because the curvature vector $d^2\vec x/d\theta^2=\vec x$ is always orthogonal to the surface. We want to find a point $\vec x$ on the curve closest to the given point $\vec p$. As ZenoRogue said, minimizing the distance $\text{arcosh}(-\vec x\cdot\vec p)$ is equivalent to minimizing $-\vec x\cdot\vec p$. (This is also equivalent to minimizing $-2-2\vec x\cdot\vec p=(\vec x-\vec p)\cdot(\vec x-\vec p)=\lVert\vec x-\vec p\rVert^2$ .) So $$0=\frac{d}{d\theta}(\vec x\cdot\vec p)=\frac{d\vec x}{d\theta}\cdot\vec p=\vec v\cdot\vec p$$ $$=\hat x_0\cdot\vec p\sinh\theta+\hat v_0\cdot\vec p\cosh\theta.$$ Rearranging, $$\tanh\theta=\frac{\hat v_0\cdot\vec p}{-\hat x_0\cdot\vec p}.$$ Using various trig identities such as $1-\tanh^2=\text{sech}^2=1/\cosh^2$, we find the desired point $$\vec x=\hat x_0\frac{1}{\sqrt{1-\left(\frac{\hat v_0\cdot\vec p}{-\hat x_0\cdot\vec p}\right)^2}}+\hat v_0\frac{\left(\frac{\hat v_0\cdot\vec p}{-\hat x_0\cdot\vec p}\right)}{\sqrt{1-\left(\frac{\hat v_0\cdot\vec p}{-\hat x_0\cdot\vec p}\right)^2}}$$ $$=\frac{\hat x_0(-\hat x_0\cdot\vec p)+\hat v_0(\hat v_0\cdot\vec p)}{\sqrt{(-\hat x_0\cdot\vec p)^2-(\hat v_0\cdot\vec p)^2}}.$$ The numerator is simply the projection of $\vec p$ onto the plane of $\hat x_0$ and $\hat v_0$, and the denominator is the magnitude of that. This can also be described with geometric algebra. The plane of the geodesic is represented by a bivector $$B=\hat x_0\wedge\hat v_0=\hat x_0\hat v_0$$ and all points in this plane satisfy $B\wedge\vec x=0$. This bivector's inverse is $B^{-1}=B$, because $$B^2=(\hat x_0\hat v_0)(\hat x_0\hat v_0)=\hat x_0(\hat v_0\hat x_0)\hat v_0=\hat x_0(-\hat x_0\hat v_0)\hat v_0=(-\hat x_0\hat x_0)(\hat v_0\hat v_0)=+1.$$ (Contrast this with Euclidean bivectors, which square to $-1$.) The projection of $\vec p$ onto the plane is $B^{-1}(B\cdot\vec p)$, so the desired point is $$\vec x=\frac{B^{-1}(B\cdot\vec p)}{\lVert B^{-1}(B\cdot\vec p)\rVert}.$$
Mid
[ 0.618181818181818, 34, 21 ]
# put Matches requests with HTTP method `PUT`. @@@ div { .group-scala } ## Signature @@signature [MethodDirectives.scala](/akka-http/src/main/scala/akka/http/scaladsl/server/directives/MethodDirectives.scala) { #put } @@@ ## Description This directive filters the incoming request by its HTTP method. Only requests with method `PUT` are passed on to the inner route. All others are rejected with a @apidoc[MethodRejection], which is translated into a `405 Method Not Allowed` response by the default @ref[RejectionHandler](../../rejections.md#the-rejectionhandler). ## Example Scala : @@snip [MethodDirectivesExamplesSpec.scala]($test$/scala/docs/http/scaladsl/server/directives/MethodDirectivesExamplesSpec.scala) { #put-method } Java : @@snip [MethodDirectivesExamplesTest.java]($test$/java/docs/http/javadsl/server/directives/MethodDirectivesExamplesTest.java) { #put }
Low
[ 0.5, 36.25, 36.25 ]
Story highlights Computer forensics expert testifies about text messages Trent Mays, 17, and Ma'lik Richmond,16, are charged with rape They are accused of sexually assaulting a girl at end-of-summer parties Testimony will run through 8 p.m. to meet the judge's deadline A computer forensics expert testified Thursday about text messages to and from one of two Steubenville, Ohio, football players accused of raping a drunken teenage girl. The testimony from Joann Gibb of the Ohio Bureau of Criminal Investigation came on the second day of a case that focuses heavily on texts, cell phone images and social media posts surrounding the alleged sexual abuse of the 16-year-old girl in August 2012. Two Steubenville high school football players -- Trent Mays, 17, and Ma'lik Richmond, 16 -- are accused of sexually assaulting the girl during a series of end-of-summer parties in August. The teens are charged with rape. Mays also charged with illegal use of a minor in nudity-oriented material. Defense attorneys say the two are innocent. According to prosecutors, Richmond and Mays each penetrated the victim's vagina with their fingers, an act that constitutes rape under Ohio law. JUST WATCHED Prosecutor: Teens bragged girl was dead Replay More Videos ... MUST WATCH Prosecutor: Teens bragged girl was dead 00:50 JUST WATCHED Roseanne: Fire lit in Steubenville Replay More Videos ... MUST WATCH Roseanne: Fire lit in Steubenville 01:32 JUST WATCHED Innocent being blamed in Steubenville? Replay More Videos ... MUST WATCH Innocent being blamed in Steubenville? 03:55 JUST WATCHED Traci Lords: I was raped in Steubenville Replay More Videos ... MUST WATCH Traci Lords: I was raped in Steubenville 02:10 Prosecutors contend the text messages between Mays and his friends and classmates on August 12 detail a night of heavy drinking and the sexual abuse of the girl. The defense questioned the validity of the messages, with Mays' attorney asking Gibb whether she could be absolutely sure the messages were from his client. "I can't put a person behind a cell phone," she said. Texting teens Some of the messages were between Mays and the alleged victim. In one message she asks what happened "last night." "And don't lie about anything. I need to know the truth. People keep asking. Idk (I don't know) what to say," the message said, according to Gibb. Mays responded that "nothing happened last night," telling her in the message she performed a sex act on him, Gibb testified. CNN is not identifying the girl in line with its policy of not identifying the alleged victims of sexual assault. CNN is also not identifying minors who testify at the trial but is identifying Mays and Richmond, whose names have been used by court officials and their attorneys and in multiple media accounts. Some of the messages from Mays, according to Gibb, say he had sex with the girl while in others he say the girl performed a sex act on him. One message asked Mays: " Did u do it?" He responded, according to Gibb: "No, lol. She could barely move." Another message to Mays from still another friend asked "how dead is she?" Mays responded, according to Gibb, "not at all, she's looking for her phone." Still another graphic message from Mays to a friend appeared to detail his anger over being accused of rape. "I'm pissed all I got was a hand job, though. I should have raped since everyone thinks I did," the message said, according to Gibb. The testimony Thursday showed just how much of the case rests on the prosecution's stance that the alleged victim was too drunk to consent to sex. 'Stumbling and slurring' One of the witnesses, a college freshman who described himself as a friend of Mays and Richmond's cousin, testified he saw the alleged victim "stumbling and slurring her words" at the first of a series of parties that night. The next day, he testified he texted Mays from a friend's phone asking about the alleged rape and told him he could go to jail for that. Mays responded, according to the witness, that the girl knew what she was doing. The witness said he responded: "No, she don't." Asked why he said that, the witness said "because I saw how drunk she was at the party." On cross-examination, the witness admitted to Richmond's attorney, Walter Madison, that he was angry by what he heard happened to the alleged victim because he considered her a friend. A police captain also testified Thursday about finding two photos of a nude girl on a cell phone belonging to Mays. Consent vs. non-consent The case will hinge not on consent but rather on whether Mays and Richmond knew that the girl was too impaired to know what was happening the night of the alleged attacks, prosecutor Marianne Hemmeter said in opening statements Wednesday. Six witnesses for the prosecution testified Wednesday, saying the alleged victim appeared to be drunk: stumbling, swaying and throwing up. One witness, a 17-year-old girl who went to a party with the alleged victim, said she and the girl shared a half a bottle of vodka, which they each poured into a flavored crushed ice drink. The alleged victim also had a beer and seemed to get drunk very quickly, the witness said. The party broke up about 12:30 a.m., and the girl left with Mays and Richmond, according to the witness, who said she pleaded with her not go. The witness said she didn't see the girl again until the next day, when she picked her up at another home. She described the girl as a "mess," wearing her stained shirt inside-out. On cross-examination, Richmond's attorney, Madison, asked the witness whether her view of what had happened that night had been framed by the tweets and social media posts she had seen about the victim and whether what she had seen in those messages made her angry. She said it had. Another witness, a 17-year-old friend of Richmond's, said on cross-examination that while the girl appeared drunk, he did not believe she was unaware of what she was doing. The boy also told Mays' attorney, Brian Duncan, that he hadn't seen the girl drinking and had not witnessed Mays involved in any sexual contact with the girl. The trial, which is likely to stretch into the weekend, is moving quickly to accommodate the schedule of visiting Judge Thomas Lipps, who is presiding over the trial without a jury. A verdict is expected by Sunday. The case has cast an unwelcome spotlight on Steubenville, a small, down-on-its-luck town along the banks of the Ohio River. Critics have accused community leaders of trying to paper over rampant misconduct by players of the highly regarded Steubenville High School football team and have suggested that other students took part in the assaults or failed to do enough stop them. The case has attracted the attention of bloggers and even the loosely organized hacking group Anonymous, which have questioned everything from the behavior of the football team to the integrity of the investigation.
Mid
[ 0.57356608478803, 28.75, 21.375 ]
1. Field of the Invention This invention concerns electrical wiring distributing floor structures; and more particularly an insert device for such floor structures. 2. Description of the Prior Art Structures used in combination with junction boxes to provide an electrical power outlet receptacle flush or level with the floor surface are known in the prior art. See, for example, U.S. Pat. Nos. 2,033,602 (ADAM); 2,996,566 (STAS); 3,027,416 (KISSEL); 3,064,850 (KELLY, JR.); 3,956,573 (MYERS et al.). Because of their bulky configuration, such structures are not readily installable in cellular and non-cellular flooring elements. Underfloor access housings are commonly used in the building industry in combination with cellular flooring units. One or more electrical receptacles are supported in fixed position within the housing and beneath the floor surface. See, for example, U.S. Pat. Nos. 3,701,837 (FORK); 3,932,696 (FORK et al.). Electrical connections to such receptacles are extremely difficult because of the limited interior space of the underfloor access housing, the narrow entrance to the access housing, and the position of the receptacle below the surface of the floor. At least one attempt has been made to facilitate electrical power connections in underfloor access housings. That is, an electrical insert housing device is known which supports an electrical power outlet receptacle in two alternative positions. In a first position the receptacle is hidden within the insert housing. In a second position the electrical receptacle is substantially flush or level with the floor surface. See U.S. Pat. No. 3,972,579 (KOHAUT). Movement of the electrical receptacle between the two alternative positions exposes the electrical wiring thereof to possible fraying of the insulation and shorting out of the system.
Low
[ 0.527233115468409, 30.25, 27.125 ]
Tehran, YJC. Former president has broken out with an enormity of complaints from his days in office. In a meeting with Iraq-Iraq war veterans on Monday, former president Mohammad Khatami pointed to accusations about his relations with foreign entities as attempts toward a color revolution, saying "I am much above many of those whom they say I have met. We must indulge to give these people time to meet and speak, but I did not give time for meeting. We didn’t talk either. They lie when they say such and such person has given out a prescription for Iran or has held talks with Khatami in order to come and implement them in Iran. They say I want to act someone’s prescription in Iran whom I neither have seen nor talked to. I have taken pains for this revolution. I am a clergyman. There is my record in the revolution. I want the Islamic Revolution to be an example where Muslim and non-Muslim could say ‘I can live here, work here, and thrive here.’ I want human rights, healthy relations with the world, development, and respectable, secure life in the country to be guaranteed.” "One of the mottos of Mr. Rouhani and what has been worked on is the open atmosphere for criticism and freedom,” Khatami maintained, "Of course criticism is different from destruction. If destructive currents are not controlled, it will be the same as the Reform term when things first looked as they do now, but then ended in assassination attempts.” Khatami further said that he considers the destructive actions as organized rather than spontaneous, adding "I do not defend Mr. Rouhani, but the rights, expediency, and security of the nation. These currents disturb the nation’s security. The performers are few in number but great in influence. […] We do not want them removed. We want their influence taken from them, their immunity taken from them so that they are forced to be sensible. They have tribunes and newspapers. They can go say what they want, provided that they do not poison the atmosphere, lie, or slander.” He asserted "The existence of such Talibanic, harsh currents does not show freedom of expression or freedom of thought, but signifies destruction and disrespect for the public opinion, the Leader’s decisions, and the vibe that has come to our society.
Mid
[ 0.549425287356321, 29.875, 24.5 ]
248 P.3d 752 (2011) Steven K. BLOOM, Appellant, v. FNU ARNOLD, et al., Appellees. No. 103,352. Court of Appeals of Kansas. January 21, 2011. *753 Steven Kent Bloom, appellant pro se. Libby K. Snider, special assistant attorney general, for appellees. Before STANDRIDGE, P.J., MARQUARDT and LEBEN, JJ. STANDRIDGE, J. Steven K. Bloom, a pro se appellant and inmate at Lansing Correctional Facility (LCF), appeals the district court's decision to dismiss his petition pursuant to K.S.A. 60-212(b)(6). For the reasons stated below, we reverse and remand with instructions for further proceedings. FACTS On or about November 4, 2005, Bloom's Unit Team Manager, Officer Medill, assigned Bloom to the job of dining room porter. On November 9, 2005, Officer Arnold issued a summary judgment citation to Bloom for failing to report to this job assignment. See K.A.R. XX-XX-XXXb(a). Bloom refused to consent to summary judgment. See K.A.R. XX-XX-XXXb(c)(3). This refusal prompted the citation to be construed as a disciplinary report, which necessarily initiated the formal disciplinary hearing process. See K.A.R. XX-XX-XXXb(c)(3)(B). *754 A disciplinary disposition hearing was scheduled for November 16, 2005. The day before the hearing, Bloom submitted a document to the disciplinary commission seeking dismissal of the disciplinary charges against him. Bloom argued dismissal was proper because his medical restrictions prohibited him from performing the job of dining room porter to which he was assigned. To that end, Bloom asserted that Officer Medill assigned Bloom to a job he was physically unable to perform in retaliation for being served with a federal lawsuit in which Bloom named Officer Medill as a defendant. Bloom also asserted that at the time he was assigned to report to work as a dining room porter, he was still subject to "UAC" (unassigned for cause) sanctions imposed against him from a prior disciplinary action that relieved prison authorities of any duty to assign Bloom to a paying job. The hearing took place as scheduled on November 16, 2005. Defendant Cooper presided over the hearing and ultimately concluded that Bloom was properly disciplined for failing to report to work as assigned because the UAC sanctions imposed against Bloom did not prevent the prison authorities themselves from assigning Bloom to a job. On December 14, 2005, Bloom submitted to a member of his unit team a Kansas Department of Corrections form he had completed entitled "Disciplinary Appeal to the Secretary of Corrections." The unit team member formally acknowledged by way of signature that he received the form and supporting documents on that date. In support of his challenge to the disciplinary action taken against him, Bloom reiterated his claim that Officer Medill assigned Bloom to a job he was physically unable to perform in retaliation for being served with a federal lawsuit in which Bloom named Officer Medill as a defendant. In his supporting documentation, Bloom submitted a return of process document filed in the federal lawsuit indicating that the United States Marshal served Officer Medill with a copy of the complaint by first class mail on October 24, 2005. Bloom appeared to base his claim of retaliation on the fact that he was assigned to the dining room porter job only 11 days after Officer Medill had been mailed a copy of the complaint and summons in his federal lawsuit. Although there is no direct evidence in the record, it appears the unit team member forwarded the appeal and corresponding paperwork to the Secretary of Corrections. Regardless, the record does reflect that the appeal packet was returned to the unit team pursuant to a memo dated February 8, 2006. This memo was from the Secretary of Corrections and indicated it was returning the appeal without disposition because the unit team failed to include all of the paperwork necessary to resolve the appeal. See K.A.R. XX-XX-XXX(b) (charging unit team with responsibility to formally initiate appeal upon request of inmate and to assure that all necessary forms are included before appeal is forwarded to Secretary). On February 27, 2006, Bloom resubmitted the form and documents necessary to support his request for the unit team to initiate a disciplinary appeal to the Secretary of Corrections on his behalf. A unit team member formally acknowledged receipt of the form and supporting documents on February 28, 2006. Upon review of the case on appeal, legal counsel for the Secretary of Corrections recommended that the decision of the hearing officer be affirmed. In support of this recommendation, legal counsel observed the evidence supported a finding that Bloom was properly disciplined for failing to report to work and there were no facts to support Bloom's allegations of retaliation by Officer Medill in assigning Bloom to the job of dining room porter. Notwithstanding the recommendation of legal counsel, the Secretary of Corrections ultimately decided on April 6, 2006, to revoke the finding of the disciplinary hearing officer and absolve Bloom from liability for failing to report to work on grounds that the Secretary had failed to respond to Bloom's appeal in a timely manner. Bloom received a copy of the Secretary's decision on April 18, 2006. On April 16, 2008, Bloom initiated the lawsuit at issue in this appeal by mailing to the Leavenworth County District Court a petition naming as defendants Officer Arnold, Officer Medill, Hearing Officer Cooper, and Warden David McKune (Defendants). In *755 the petition, Bloom alleged his rights under the First, Eighth, and Fourteenth Amendments to the United States Constitution were violated when (1) Officer Medill assigned him to a job he was physically unable to perform in retaliation for being served with a federal lawsuit in which he named Officer Medill as a defendant; (2) Officer Arnold filed a disciplinary report against him for failing to report to that job; (3) Hearing Officer Cooper concluded that Bloom was properly disciplined for failing to report to work as assigned; and (4) Warden McKune failed to properly supervise those prison employees who violated his rights to make sure they were complying with all administrative regulations and were not violating the rights of prisoners guaranteed by the United States Constitution. In response to the petition, Defendants filed two separate motions to dismiss. The first motion alleged Bloom failed to exhaust his administrative remedies as required before filing suit. The second motion alleged the district court lacked jurisdiction to review agency actions concerning the management or discipline of inmates. Based on its decision to construe Bloom's petition as a civil suit for abuse of process, the district court denied both motions to dismiss. In light of the district court's decision, Defendants filed a third motion to dismiss alleging failure to state a claim for abuse of process. This time, the district court granted the motion on grounds that Bloom asserted no facts to establish that Defendants utilized the prison disciplinary process for any reason other than those stated. In dismissing Bloom's petition for failing to state a claim for abuse of process, the court noted that "the process was employed in the manner it was intended for, and was carried out to an authorized conclusion. In fact the conclusion was favorable to the petitioner." ANALYSIS When the district court has granted a motion to dismiss for failure to state a claim, the appellate court must accept the facts alleged by the plaintiff as true, along with any inferences that can be reasonably drawn therefrom. The appellate court then decides whether those facts and inferences state a claim based on the plaintiff's theory or any other possible theory. Rector v. Tatham, 287 Kan. 230, 232, 196 P.3d 364 (2008); see also Bruner v. State, 277 Kan. 603, 605, 88 P.3d 214 (2004) (pro se pleadings are liberally construed). In this case, the district court construed the allegations in Bloom's petition as a claim for abuse of process; thus, we must determine whether the facts and inferences set forth in the petition are sufficient to state a claim for abuse of process. Because we believe the allegations in Bloom's petition can be construed as a civil rights claim for retaliation pursuant to 42 U.S.C. § 1983 (2006), we also must determine whether the facts and inferences set forth in the petition are sufficient to state a 42 U.S.C. § 1983 retaliation claim. Abuse of Process Under Kansas law, the essential elements of an action for abuse of process are "a knowingly illegal or improper use of the process done for the purpose of harassing or causing hardship, which resulted in damage" to the plaintiff. McShares, Inc. v. Barry, 266 Kan. 479, 494, 970 P.2d 1005, cert. denied 526 U.S. 1158, 119 S.Ct. 2048, 144 L.Ed.2d 215 (1999). The district court construed Bloom's petition to allege that Defendants improperly used the prison administrative disciplinary process for the purpose of retaliating against him for filing a lawsuit against Officer Medill. In dismissing Bloom's claim, the district court found Bloom failed to aver sufficient facts to support the allegation that Defendants' actions were a pretext for retaliation. Noting that the disciplinary action against Bloom ultimately was revoked, the district court also found that Bloom failed to aver sufficient facts to support a claim of damage. Although we affirm the district court's decision to dismiss Bloom's claim for abuse of process, we decline to do so for the reasons cited by the district court. This is because, assuming the truth of all of the facts alleged in Bloom's petition and the reasonable inferences that can be drawn therefrom, we believe Bloom sufficiently has alleged at this early stage of his lawsuit that Defendants *756 improperly used the prison administrative disciplinary process as a pretext for retaliation. Nevertheless, we find Bloom's cause of action for abuse of process is still insufficient to state a claim as a matter of law. This is because it is grounded in alleged misuse of the prison administrative disciplinary process, as opposed to misuse of the judicial process. Of those jurisdictions deciding the issue, the vast majority recognize an abuse of process claim only when the judicial process is involved, thereby deeming improper use of nonjudicial proceedings to be insufficient to support the claim. See Moore v. Western Forge Corp., 192 P.3d 427, 438-39 (Colo.App. 2007) (collecting cases); see also Prosser and Keeton, Law of Torts § 121 (5th ed.1984) (acknowledging general rule that abuse of process allegation states claim only when judicial process is involved). The majority view is supported by the Restatement (Second) of Torts § 682 (1977), which purposely defines the cause of action as one involving abuse of a legal process: "One who uses a legal process, whether criminal or civil, against another primarily to accomplish a purpose for which it is not designed, is subject to liability to the other for harm caused by the abuse of process." To that end, Kansas courts have defined legal process as "proceedings begun by a writ, warrant, summons, order or mandate; proceedings which invoke the aid of judicial process or decree." Robbins-Leavenworth Floor Covering, Inc. v. Leavenworth Nat'l Bank & Trust Co., 229 Kan. 511, 515, 625 P.2d 494 (1981); Palmer v. First Nat'l Bank of Kingman, 10 Kan.App.2d 84, 89, 692 P.2d 386 (1984); accord High Plains Oil, Ltd. v. High Plains Drilling Program-1981, Ltd., 263 Kan. 1, 12, 946 P.2d 1382 (1997); State v. Wagoner, 123 Kan. 586, 588, 256 P. 959 (1927). Our Supreme Court specifically held in Robbins-Leavenworth Floor Covering, Inc. that "the term `legal process' cannot include proceedings `carried on wholly outside of court ... without the aid of its process or decree.'" 229 Kan. at 516, 625 P.2d 494. Likely because the term "legal process" consistently has been defined in Kansas to include only those proceedings which invoke the aid of judicial process, no Kansas appellate court has ever been asked to determine whether improper use of administrative or other nonjudicial proceedings is sufficient to support a claim for abuse of process under Kansas law. We did find one case where the Kansas Supreme Court was asked to review the sufficiency of an abuse of process claim alleging misuse of an administrative process, but the court was not asked to determine whether an abuse of process is a viable claim when based on proceedings that do not involve the judicial process in any way. See Lindenman v. Umscheid, 255 Kan. 610, 621-24, 875 P.2d 964 (1994) (reversing district court's decision to grant summary judgment in favor of state agency on plaintiff's abuse of process claim, which alleged state agency misused emergency procedures authorized by Kansas Administrative Procedures Act to enter order suspending plaintiff's childcare license). Instead, our Supreme Court was asked to decide (1) whether the Kansas Judicial Review Act provides the exclusive remedy for an abuse of process claim against an administrative agency; (2) whether the statute of limitations governing an abuse of process claim had been tolled during the administrative review process; (3) whether an administrative agency enjoyed immunity against the abuse of process claim; and (4) whether there was a dispute of material fact with regard to ulterior motive, which is an essential element of the abuse of process claim. Because our Supreme Court was not presented with the issue, we do not believe the decision in Lindenman undercuts the prevailing law in Kansas limiting "legal process" to only those proceedings that invoke the aid of judicial process. Based on the long-standing definition of the term "legal process" in Kansas, and consistent with the majority of those jurisdictions deciding the issue, we conclude as a matter of first impression in Kansas that the term "process" in an abuse of process claim limits the claim of abuse to those proceedings that invoke the aid of judicial process. In *757 other words, an abuse of process claim based on improper use of an administrative or other nonjudicial proceeding is insufficient as a matter of law to support such a claim. Because Bloom's claim for abuse of process depends on proceedings before an administrative agency that did not invoke the aid of judicial process, his claim as construed by the district court fails as a matter of law in Kansas. Retaliation (42 U.S.C. § 1983) In his petition, Bloom alleges he was assigned to a job he was physically unable to perform and then disciplined for failing to report to that job in retaliation for filing a federal lawsuit against a prison official. We liberally construe these allegations to assert a civil rights claim for retaliation pursuant to 42 U.S.C. § 1983. Both state and federal courts are proper forums for such actions. Prager v. Kansas Dept. of Revenue, 271 Kan. 1, 12, 20 P.3d 39 (2001). Prison officials may not retaliate against or harass an inmate based on the inmate's exercise of his or her right of access to the courts. Green v. Johnson, 977 F.2d 1383, 1389 (10th Cir.1992). In order to sufficiently state a 42 U.S.C. § 1983 claim for retaliation upon which relief can be granted, a plaintiff must include facts in the petition alleging that (1) the plaintiff was engaged in a constitutionally protected activity; (2) the defendant's actions caused the plaintiff to suffer an injury sufficient to chill a person of ordinary firmness from continuing to engage in that activity; and (3) the defendant's adverse action was substantially based on the plaintiff's exercise of a constitutionally protected right. Mimics, Inc. v. Village of Angel Fire, 394 F.3d 836, 847 (10th Cir.2005). Based on our review of the pleadings, we believe Bloom included in his petition the necessary facts to sufficiently state a 42 U.S.C. § 1983 claim for retaliation at this early stage of the litigation. Regarding the first prong, Bloom alleges Defendants retaliated against him for filing a complaint in federal court, an activity that long has been held to be constitutionally protected. See Fogle v. Pierson, 435 F.3d 1252, 1263-64 (10th Cir.2006), cert. denied 549 U.S. 1059, 127 S.Ct. 675, 166 L.Ed.2d 526 (2006) ("`[P]rison officials may not retaliate against or harass an inmate because of the inmate's exercise of his constitutional rights.'"). As to the second prong, Bloom alleges the retaliatory job assignment and resulting disciplinary action caused him to sustain the following injuries: (a) he was deprived of crucial time he needed to work on the merits of his direct appeal as a result of the time he spent defending himself from the charges of discipline and appealing the decision imposing discipline; (b) he was deprived of disability work benefits to which he was entitled; (c) he was subjected to a fine as a result of the hearing officer's decision to impose discipline; and (d) he was required to pay court costs to file a cause of action seeking redress for the unlawful acts of retaliation taken against him. Assuming the truth of Bloom's allegations, as we are required to do at this stage of the lawsuit, we believe these injuries are sufficient to chill a person of ordinary firmness from continuing to exercise his or her constitutional right to access the courts. With regard to the third prong, Bloom alleges Officer Medill assigned him to a job that Medill knew Bloom was physically incapable of performing only 11 days after the United States Marshal served Medill with a complaint naming Medill as a defendant in Bloom's federal lawsuit. Assuming the facts alleged by Bloom regarding the window of time between the protected activity and the retaliatory action are true, we believe they are sufficient to support an inference that the adverse action taken by Defendants against Bloom was substantially based on Bloom's exercise of a constitutionally protected right. In sum, we agree with the district court that Bloom's petition fails as a matter of law to state a claim for abuse of process but reverse the decision of the district court to dismiss Bloom's petition and remand with instructions to reinstate the petition and construe the allegations therein as a civil rights claim for retaliation pursuant to 42 U.S.C. § 1983. In carrying out this mandate, the district court shall provide Defendants with sufficient time to answer, to assert affirmative *758 defenses, and to file any other responsive pleading to this newly asserted claim as construed herein. Reversed and remanded with directions.
Mid
[ 0.587223587223587, 29.875, 21 ]
Menu Cynthia Morrisette Client Services The smile is not rehearsed. It is because she genuinely cares. She loves greeting and meeting both familiar and unfamiliar faces. Cynthia started in the banking industry in 1996. “I thought that I would be there for a brief period, but twenty years later I was still following that career path”. When she joined Brown Financial Advisory in 2017, because of her background in finance and her concern for people, it was the perfect fit. Cynthia is typically the first voice that you hear when you call. She schedules client meetings, takes deposit and helps with fund requests. She also makes sure that the information used in client reviews is in order and ready for the meetings. Education: Faulkner State Community College She enjoys spending quality time with her husband and two kids, reading, listening to music, vacationing, being involved with her church, and following their kids around with band and softball.
Low
[ 0.513626834381551, 30.625, 29 ]
[The duration of an HIV infection course and its influencing factors]. To study the duration of the natural course of HIV infection and to identify its influencing factors. 938 outpatient case histories of adult HIV-positive patients registered at the dispensary and the data of 3403 AIDS patients registered in the computer base, including those on 2588 dead people, were retrospectively analyzed. Kaplan-Meier survival analysis and Cox regression model were used. Gender, age, and route of infection were regarded as potential factors influencing the natural course of HIV infection. In Russia before the mass use of antiretroviral therapy (ART), the median survival from infection to death in the HIV-infected was 11.8 years; that from infection to establishment of AIDS was 11.6 years; the life expectancy following its diagnosis was 1.9 months. Patient age was a main factor influencing the course of HIV infection: in persons who had been infected with HIV at an age of over 35 years, lower CD4 lymphocyte counts and clinical progression occurred more rapidly than in those infected at a younger age. Less than 50% of the patients needed ART 5 years after HIV infection. An HIV-infected patient without ART survives almost twice less. It is necessary to detect HIV infection as early as possible and to regularly follow up patients regardless of the duration of infection in order to timely initiate its treatment.
Mid
[ 0.631067961165048, 32.5, 19 ]
US funds lose $46bn as nervous nellies quit Investors in US stock mutual funds withdrew $US27.1 billion ($46 billion) more than they added last year, the worst outflow since 1988, the Investment Company Institute said. Stock funds ended the year with $US2.67 trillion of assets, a 22 per cent drop from 2001, said ICI, the fund industry group based in Washington. More than 96 per cent of the decline resulted from falling share prices. Investors fled stock funds as the market dropped for the third straight year, the longest losing streak since the Great Depression. The outflow represented 0.9 per cent of the average amount invested in stock funds during the year. Bond funds had their best year ever, the ICI said. They gained $US140.5 billion, exceeding the $US103 billion inflow in 1986, it said. The funds ended the year with total assets of $US1.12 trillion. The Lehman Brothers US Aggregate Bond Index, a measure of the performance of the entire US market, gained 10.3 per cent in 2002. The best-selling fund of the year was Pimco Advisors' Total Return Fund, managed by Bill Gross. The $US69.8 billion bond fund pulled in $US14.5 billion in net new investments, according to Financial Research Corp. Pimco, a unit of Allianz AG, was the third best-selling fund family overall adding $US27.4 billion, with more than 90 per cent going to its bond funds.");document.write(" advertisement "); } } // --> Two firms did have success selling stock funds, FRC said. Vanguard Group, the second-largest fund company, was also the second-best in total sales adding $US38.1 billion, including $US11.1 billion for stock funds. American Funds was the best-selling family overall, adding $US38.8 billion, with three-quarters going into stock funds. Putnam Investments, a unit of Marsh & McLennan, and Janus Capital Group had the worst-selling stock and bond funds among the 25 largest fund companies, according to Financial Research Group. Investors withdrew $US14.2 billion more than they added. Meanwhile Templeton Asset Management and two of its Asia portfolios are suing the Harvard University endowment, alleging that its investment managers have broken federal securities laws in their bid to force the funds to liquidate, the Boston Globe reports. In a suit filed in federal court in Maryland, Templeton said that Harvard Management, which runs the $US18 billion endowment, failed to disclose on a timely basis its position as the largest shareholder of the Templeton China World fund and the Templeton Dragon fund. Both are closed-end funds, which trade on the New York Stock Exchange.
Mid
[ 0.564159292035398, 31.875, 24.625 ]
Maggi noodles in soup following alleged contamination of samples in UP Thursday, 30 November, 2017, 08 : 00 AM [IST] Harcha Bhaskar, Mumbai Nestlé India Ltd, manufacturer of Maggi Noodles, has become embroiled in a fresh controversy with the latest report submitted by the district administration in Uttar Pradesh’s Shahjahanpur district claiming that the samples were contaminated with ash beyond the permissible limit. This is the second incident involving the company, following the controversy regarding lead content in the same product. According to the reports, the Maggi samples were collected in 2015. “While we have not received the orders passed by the adjudication officer, we have been informed that the samples were collected in 2015, and the issue pertained to ash content in noodles,” he added. “This appears to be a case of application of incorrect standards, and we will file an appeal urgently once we receive the order,” the spokesperson said. He added, “In 2015, Nestlé India and other companies had represented to the relevant authorities, via industry associations, to set standards specific to instant noodles to avoid confusion amongst enforcement officers and consumers.” “The standards have since been introduced, and the product complies with these standards. We regret the confusion it may cause to the consumers,” the spokesperson stated. In 2015, Maggi noodles were banned by the Food Safety and Standards Authority of India (FSSAI), the country’s apex food regulator, after some test reports found that they contained lead and monosodium glutamate (MSG) that was higher than permissible limits. Nestle India contested the ban in the Bombay High Court, who set aside the ban and ordered fresh tests. Later in a statement, the company stated that all the 90 samples, covering six variants, were found to be safe after the testing in the three prescribed laboratories. It added that hereafter, it would start the process of relaunching the product in the Indian market. Meanwhile, the company added that Nestlé India had always maintained that Maggi noodles were safe. It conducted over 3,500 tests on over 200 million packs in both nationally- as well as internationally-accredited laboratories, and all the reports were clear.
Low
[ 0.509216589861751, 27.625, 26.625 ]
--- abstract: 'The adhesion of microcapsules to an attractive contact potential is studied theoretically. The axisymmetric shape equations are solved numerically. Beyond a universal threshold strength of the potential, the contact radius increases like a square root of the strength. Scaling functions for the corresponding amplitudes are derived as a function of the elastic parameters.' author: - 'Peter Graf, Reimar Finken, and Udo Seifert' title: Adhesion of microcapsules --- [*Introduction. –*]{} Microcapsules are hollow closed elastic capsules experimentally prepared as layered polyelectrolyte sheets [@donath1998] or through polymerization of surfactants coated on oil droplets immersed in aqueous solution [@rehage2002]. Their elastic constants have been measured by atomic force microscopy [@fery2004; @lulevich2004; @mueller2005; @elsner2006], deformation in shear flow [@walter2000] or osmotically induced swelling [@gao2001; @vino2004]. For potential applications not only the knowledge of their elastic constants is crucial, but also, in particular, the understanding of their adhesive properties to other capsules or membranes, to substrates [@schwarz2000; @nolte2004] or channel walls [@cordeiro2004] in microfluidic devices. In a first systematic experimental study of adhesion to glass surfaces using reflection interference contrast microscopy, adhesion radii were measured as a function of capsule size and membrane thickness [@elsner2004]. A systematic theory of such deformed shapes, however, is lacking. The analysis of this experiment as well as previous theoretical approaches are adaptions of the standard textbook treatment which involves basically a scaling estimate of the deformation ignoring what are supposed to be factors of order unity [@LL7]. Such a simple approach predicts that for small deformations the adhesion radius scales as the square root of the strength of the potential. On the other hand, in the related problem of the adhesion of [*fluid*]{} vesicles dominated by curvature elasticity, a systematic solution based on solving numerically variational shape equations has shown that adhesion requires a threshold strength of the potential [@seifert1990]. A priori, there is no reason to believe that this threshold vanishes if a finite shear elasticity is invoked in contrast to the predictions based on the simple scaling picture. ![Spherical microcapsule with radius $R_0$ undergoes an adhesion transition to an axisymmetric shape with adhesion radius $R^*$.](fig1.eps) In this letter, we investigate systematically the adhesion of microcapsules in a contact potential by solving the corresponding shape equations. We will restrict our treatment to axi-symmetric shapes, see Fig. 1. We therefore exclude configurations where the adhesion area buckles inwards. Such configurations have been observed in recent simulations where, however, the range of the potential was comparable to the size of the capsules [@tamura2004; @komura2005]. As a main qualitative result, we indeed find that a finite universal threshold strength is required to induce adhesion beyond which the adhesion radius scales like a square root in the excess strength. The amplitude depends strongly on the elastic parameters. [*Model. –*]{} As an initial reference shape, we choose a sphere of radius $R_0$. Any deformation of this sphere costs an elastic energy F\_s= dA ( (u\^l\_l)\^2 + (u\^i\_k)\^2 ) where $\lambda$ and $\mu$ are the two-dimensional Lamé coefficients, $K=\lambda+\mu$ is the compression modulus, and $u^i_k$ are the elements of the strain tensor [@LL7; @boal2000]. This relation is valid as long as Hooke’s law holds. The total energy of the capsule then reads F= F\_s + dA (2H-C\_0)\^2 - W A\^\*. The second term is the bending energy of the membrane where $H$ is the local mean curvature and $\kappa$ the bending rigidity. Such a term is required to prevent sharp kinks in an adhesion geometry. We also introduce a spontaneous curvature $C_0=2/R_0$ so that the original undeformed spherical capsule has no elastic energy whatsoever. Generally a capsule can be adequately described by these thin shell equations as long as the shell thickness is much smaller than the radius. This assumption is generally fulfilled for capsules larger than a few microns. The third term is the standard adhesion energy in a contact potential of strength $W$ where $A^*\equiv \pi R^{*2}$ is the contact area. The shape equations for this model can be derived by first parameterizing an axisymmetric shape appropriately and then setting the first variation of $F$ to zero. This procedure can follow closely the corresponding one for fluid vesicles with the additional feature that for an elastic capsule tangential displacements have a physical significance whereas for fluid vesicles they correspond to irrelevant reparameterizations of the shape and can thus be ignored [@seifert1997]. The technical details will be published elsewhere. The solutions of these shape equations and hence the “phase diagram” of adhesion depend on three dimensionless parameters k,   m,   w where $k$ and $m$ are the scaled compression and shear modulus, respectively, whereas $w$ is the scaled adhesion energy. In this way, all energies are referred to the scale of the bending energy. While typically $k,m \gg1$, the scaled adhesion energy can easily be of order 1. Note that we have not implied any volume constraint since at least for the polyelectrolyte shells the membrane is supposed to be water permeable. Introducing such a volume constraint, however, would not pose any fundamental complication but would add one more dimension to the phase diagram. [*Adhesion radius. –*]{} By solving the shape equations numerically, we find universally that the (scaled) adhesion radius of weakly adhered shapes behaves as r\^\*R\^\*/R\_0a(k,m)(w-w\_c)\^[1/2]{} . \[contact\_radius\] The critical strength of adhesion $w_c=2$ is independent of the elastic parameters and indeed the same as found for fluid vesicles without a volume constraint [@seifert1990]. For a weaker contact potential, the potential energetic gain of an adhesion disc is smaller than the cost in curvature energy to be paid. This balance is not modified by the elastic energies. The dependence of the amplitude $a(k,m)$ on the elastic parameters is best discussed in several steps. For a capsule without shear elasticity, $m=0$, the amplitude $a(k,0)$ decreases monotonically with $k$ from the value a\_0a(0,0)0.58     [to]{}      a\_a(k,0)0.50. \[amplitudes\] For $k=0$, the presence of the non-zero spontaneous curvature energy stabilizes a finite size of the contact radius. For $k\to\infty$, the model corresponds to that of a fluid vesicle with area constraint. Both limit cases can therefore be checked independently using the shape equations of fluid vesicles without and with area constraint, respectively. Note that without shear elasticity, increasing the compression modulus from zero to infinity thus leads to a decrease in the adhesion radius of only about 15 percent for any given adhesion strength. ![Amplitude $a(k,m)$ of the adhesion radius (\[contact\_radius\]) as a function of the scaled compression modulus $k$ for various values of the scaled shear modulus $m$. Note that the abscissa is scaled logarithmically.](fig2.eps) A quantitatively more dramatic effect arises for a non-zero shear modulus. In Fig. 2, the amplitude $a(k,m)$ is shown as a function of $k$ for various values of $m$. For fixed $k$, the amplitude decreases with increasing $m$ reaching a finite non-zero limit for $m\to \infty$. Similarly for fixed $m$ the amplitude also decreases with increasing $k$ and reaches a non-zero value in the limit $k \to\infty$. The limit $k\to\infty$ can quite well be fitted by the power law a(k ,m)a\_(1+m/m\_c)\^[-1/4]{} \[a\_incompr\] with $a_\infty$ given above in eq. (\[amplitudes\]) and $m_c\simeq 1.54$. These data for general $k$ and $m$ almost collapse on a scaling plot if these elastic constants are replaced by the (scaled) two-dimensional Young modulus y and the Poisson ratio . Fig. 3 reveals that the amplitude $a(y,\sigma)$ is almost independent of the Poisson ratio as long as $y\gsim 6$, a condition fulfilled if ${\rm min}(k,m)\gsim 3$. For smaller values of $y$, the amplitude becomes the larger the smaller $\sigma$. Note that all curves have the same limit value $a(y \to 0,\sigma) \simeq 0.58$ except the curve for $\sigma=1$. The two cases $k\to \infty$ and $m=0$ both correspond to $\sigma=1$. In the first case the relation $y=4m$ holds and the amplitude can be calculated directly from eq. (\[a\_incompr\]). In the second case, $y$ is always zero and the amplitude varies from $a_0$ to $a_\infty$ for increasing $k$. ![Amplitude $a(y,\sigma)$ for different values of $\sigma$: $\sigma=-1$ ($*$), $\sigma=0$ ($\diamond$), $\sigma=0.6$ ($\times$), $\sigma=0.9$ ($\bigtriangleup$), $\sigma=0.99$ ($+$), $\sigma=1$ ($\bullet$). For $y\gsim 6$ the plots almost collapse on a master curve. For $y\lsim 6$ a stronger dependence on $\sigma$ arises. The continuous lines are fits to the data points according to eq. (\[amplitude\]).](fig3.eps) For future reference, we extract from our data the fit a(y,) + . \[amplitude\] with $\hat y = 1.85 (1-\sigma) + 5.58 (1-\sigma)^3$ and $b = 0.98 + 1.42(1-\sigma) + 2.71(1-\sigma)^3$. The first term is based on the incompressible case (\[a\_incompr\]) discussed above with the crossover value $y_c \simeq 6.14$. The deviations for small $y\leq 6$ are contained in the second term. This form provides a decent fit with a maximal deviation of 2 percent for all data shown in Fig. 3. [*Comparison to experimental data. –*]{} Our theory can now be used to reanalyse experimental data. Recently Elsner et al. [@elsner2004] investigated the adhesion of polyelectrolyte multilayer capsules (PMCs) on a glass surface. PMCs can be prepared with well-defined shell thickness, shell radius and surface energy. Therefore they are an ideal system to study the adhesive properties of microcapsules experimentally. The contact area and the form of the adhered capsules were reconstructed by reflection interference contrast microscopy. Given the two material properties Young modulus and Poisson ratio the contact potential can be derived by fitting data sets of the contact radius [*vs.*]{} the capsule’s wall thickness with fixed capsule’s radius or the contact radius [*vs.*]{} the capsule’s radius with fixed capsule’s wall thickness, respectively. For thin isotropic shells of thickness $h$ and three-dimensional Young modulus $Y_3$ the two-dimensional parameters are given by [@boal2000; @LL7] Y = Y\_3 h     [and]{}     = . Expressing eq. (\[contact\_radius\]) in these variables, we have for large $y \gg y_{c}$ R\^\* a\_(12(1-\^2)y\_c )\^[1/4]{} ( )\^[1/2]{} (W-W\_c)\^[1/2]{} \[contact\_radius\_unscaled\] with W\_c for the critical adhesion energy. The large $y$ limit is appropriate since $y = 12(1-\sigma^2) R_0^2/h^2 \simeq 10^6$ in these experiments. First, we compare our result to capsules with fixed shell thickness $h = 25.4$ nm and varying capsule’s radius $R_0$ and contact radius $R^*$. In Fig. 4, the experimental data from Ref. () are shown. Using typical experimental values for $R^{*}$ and $R_{0}$ we can estimate $w-w_{c}$ to be of the order $100$. Thus the critical strength of adhesion can entirely be neglected in eq. (\[contact\_radius\_unscaled\]). Fitting $R^*$ as a function of $R_0$ with $W_{c} = 0$ we extract for the combination of adhesion energy, Young modulus and Poisson ratio the estimate $W \simeq Y_3/(1-\sigma^2)^{1/2} \cdot (1.4 \pm 0.1) \cdot 10^{-12}$ m. Estimates of the adhesion energy become possible using experimental values of the elastic constants. The Young modulus of the shell material is $(294 \pm 30)$ MPa [@mueller2005; @elsner2006]. (The value given in Ref. () is severely overestimated and therefore not used.) The exact value of the Poisson ratio is unknown but it is usually between 1/3 and 1/2. We then get $0.39$ mJ/m$^{2}$ $\lsim W \lsim 0.52$ mJ/m$^{2}$, choosing these ranges of parameters. The adhesion energies obtained this way are of the same order as the estimates in Ref. (). In Fig. 4 the capsule’s radius varies between 7 and 18 $\mu$m. We can therefore estimate the critical adhesion energy $W_{c}$ to be in the range from $3$ $\mu \mathrm{J / m^{2}}$ to $24$ $\mu \mathrm{J / m^{2}}$. In Fig. 4 both the fit with $W_{c} = 0$ and the behaviour of $R^{*}$ vs. $R_{0}$ for finite $W_{c}$ are shown for comparison. Second, we compare our result with capsules with fixed radius $R_0 = 10$ $\mu$m and fit the contact radius $R^*$ as a function of the shell thickness $h$ (data not shown). From these data we obtain $W \simeq Y_3/(1-\sigma^2)^{1/2} \cdot (1.3 \pm 0.8) \cdot 10^{-12}$ m, in accordance with the previous estimate. ![Comparison of experimental data ($\Box$, from Ref. ()) to the fit of eq. (\[contact\_radius\_unscaled\]) with $W_{c} = 0$ (dashed line) and to the fit of eq. (\[contact\_radius\_unscaled\]) for finite $W_{c}= 9$ $\mu \mathrm{J/m^{2}}$ as extracted from experimental data using the parameters $Y_3=294$ MPa, $h=25.4$ nm, $\sigma=1/3$, and $R_0=10$ $\mu$m (full line). Note that the left part of this figure is scaled logarithmically to better show the influence of the critical adhesion energy $W_c$.](fig4.eps) [*Summary. –*]{} We have solved the shape equation numerically for elastic microcapsules with finite shear elasticity adhering to a contact potential. We have identified a threshold strength required for adhesion. For stronger potentials the adhesion radius increases like a square root with an amplitude depending on elastic constants which we here determined over the full range of possible parameters. [*Acknowledgement. –*]{} Financial support of the DFG within the priority program SPP 1164 “Nano- and microfluidics” is gratefully acknowledged. [10]{} Donath, E.; Sukhorukov, G. B.; Caruso, F.; Davis, S. A.; Möhwald, H. [ *Angew. Chem., Int. Ed.*]{} [**1998**]{}, [*37*]{}, 2202. Rehage, H.; Husmann, M.; Walter, A. [*Rheol. Acta*]{} [**2002**]{}, [*41*]{}, 292–306. Fery, A.; Dubreuil, F.; Möhwald, H. [*New J. Phys.*]{} [**2004**]{}, [*6*]{}, 18. Lulevich, V. V.; Adrienko, D.; Vinogradova, O. I. [*J. Chem. Phys.*]{} [ **2004**]{}, [*120*]{}, 3822. Mueller, R.; K[ö]{}hler, K.; Weinkamer, R.; Sukhorukov, G. B; Fery, A. [ *Macromolecules*]{} [**2005**]{}, [*38*]{}, 9766-9771. Elsner, N.; Dubreuil, F.; Weinkamer, R; Wasicek, M.; Fischer, F. D.; Fery, A. [*Progr. Colloid Polym. Sci.*]{} [**2006**]{}, [*132*]{}, 117–123. Walter, A.; Rehage, H.; Leonhard, H. [*Colloid Polym. Sci.*]{} [**2000**]{}, [ *278*]{}, 169–175. Gao, C.; Donath, E.; Moya, S.; Dudnik, V.; Möhwald, H. [*Eur. Phys. J. E*]{} [**2001**]{}, [*5*]{}, 21–27. Vinogradova, O. I.; Adrienko, D.; Lulevich, V. V.; Nordschild, S.; Sukhorukov, G. B. [*Macromolecules*]{} [**2004**]{}, [*37*]{}, 1113–1117. Schwarz, U. S.; Komura, S.; Safran, S. A. [*Europhys. Lett.*]{} [**2000**]{}, [*50*]{}, 762–768. Nolte, M.; Fery, A. [*Langmuir*]{} [**2004**]{}, [*20*]{}, 2995. Cordeiro, A. L.; Coelho, M.; Sukhorukov, G. B.; Dubreuil, F.; Möhwald, H. [*J. Colloid Interf. Sci.*]{} [**2004**]{}, [*280*]{}, 68–75. Elsner, N.; Dubreuil, F.; Fery, A. [*Phys. Rev. E*]{} [**2004**]{}, [*69*]{}, 031802. Landau, L. D.; Lifschitz, E. M. [*Theory of Elasticity;*]{} Pergamon Press: Oxford, 1970. Seifert, U.; Lipowsky, R. [*Phys. Rev. A*]{} [**1990**]{}, [*42*]{}, 4768. Tamura, K.; Komura, S.; Kato, T. [*J. Phys.: Condens. Matter*]{} [**2004**]{}, [*16*]{}, L421–L428. Komura, S.; Tamura, T.; Kato, T. [*Eur. Phys. J. E*]{} [**2005**]{}, [*18*]{}, 343–358. Boal, D. [*Mechanics of the cell;*]{} Cambridge University Press, 2002. Seifert, U. [*Adv. Phys.*]{} [**1997**]{}, [*46*]{}, 13–137.
Mid
[ 0.597457627118644, 35.25, 23.75 ]
After a weekend flight to Dublin, Ireland from Newark, New Jersey, blogger Jill Filipovic opened her suitcase to unpack her belongings when she found a handwritten note on a TSA form encouraging her to "Get [her] freak on girl." Filipovic, who is a blogger for Feministe.us (and has blogged for The Huffington Post in the past), Tweeted a photo of the note accompanied by this message: A Forbes staff member, who claims to know Filipovic, reached out to the TSA for comment regrading the sexually-indicative note that supposedly refers to a vibrator. In response, the TSA issued a statement saying, "TSA takes all allegations of inappropriate conduct seriously and is investigating this claim," Forbes reports. "I'm grossed out, but it's also hilarious," Filipovic told Forbes. "I've had that Missy Elliott song stuck in my head all day," she told Wired.com. It is still uncertain who scribbled the message on the agency's document, but the blogger told ABC News that she plans on filing a complaint with the TSA after she gets home. "I hope they do see the complaint, they'll look into it and remind their staff that going through people's personal belongings is a responsibility that should be treated with some modicum of professionalism," Filipovic added to ABC. UPDATE, 10/26: On Wednesday, the TSA wrote in a blog post on their site that an internal investigation found the responsible employee, who has since been "removed from screening operations" and is facing disciplinary action. The TSA's Blogger Bob also added: "The handwritten note was highly inappropriate and unprofessional, and TSA has zero tolerance for this type of behavior. Agency officials have also reached out to the passenger to personally apologize for this unfortunate incident."
Mid
[ 0.5498007968127491, 34.5, 28.25 ]
[Streptococcal immunoglobulin Fc receptors as inductors of anti-immunoglobulins]. The activity of IgG Fc-receptor was studied in 71 strains of serological group A streptococci isolated from streptococcal infection patients and carriers. The group of practically healthy subjects and those with diseases of non-streptococcal origin were found to have almost identical streptococcal strain distribution for IgG FcR+ and IgG FcR- (42.4 and 57.6 per cent, respectively). In the strains isolated from streptococcal infection patients, IgG FcR+ strains made up 63.1 per cent. In rabbit immunization, the capacity of IgG FcR-positive strains that were isolated from patients to induce anti-immunoglobulin synthesis was revealed. The induced synthesis of anti-immunoglobulins was noted also in rabbit immunization with purified streptococcal IgG Fc-receptors of M15 streptococcus and rabbit IgG eluated with streptococcal Fc receptors. Possible mechanisms of anti-immunoglobulin synthesis in experimental immunization are discussed.
High
[ 0.6590584878744651, 28.875, 14.9375 ]
/* * Copyright 2008-2020 Async-IO.org * * Licensed under the Apache License, Version 2.0 (the "License"); you may not * use this file except in compliance with the License. You may obtain a copy of * the License at * * http://www.apache.org/licenses/LICENSE-2.0 * * Unless required by applicable law or agreed to in writing, software * distributed under the License is distributed on an "AS IS" BASIS, WITHOUT * WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. See the * License for the specific language governing permissions and limitations under * the License. */ package org.atmosphere.cpr; import org.atmosphere.config.AtmosphereAnnotation; import org.atmosphere.config.service.AsyncSupportListenerService; import org.atmosphere.config.service.AsyncSupportService; import org.atmosphere.config.service.AtmosphereFrameworkListenerService; import org.atmosphere.config.service.AtmosphereHandlerService; import org.atmosphere.config.service.AtmosphereInterceptorService; import org.atmosphere.config.service.AtmosphereResourceFactoryService; import org.atmosphere.config.service.AtmosphereResourceListenerService; import org.atmosphere.config.service.AtmosphereService; import org.atmosphere.config.service.BroadcasterCacheInspectorService; import org.atmosphere.config.service.BroadcasterCacheListenerService; import org.atmosphere.config.service.BroadcasterCacheService; import org.atmosphere.config.service.BroadcasterFactoryService; import org.atmosphere.config.service.BroadcasterFilterService; import org.atmosphere.config.service.BroadcasterListenerService; import org.atmosphere.config.service.BroadcasterService; import org.atmosphere.config.service.EndpointMapperService; import org.atmosphere.config.service.ManagedService; import org.atmosphere.config.service.MeteorService; import org.atmosphere.config.service.UUIDProviderService; import org.atmosphere.config.service.WebSocketFactoryService; import org.atmosphere.config.service.WebSocketHandlerService; import org.atmosphere.config.service.WebSocketProcessorService; import org.atmosphere.config.service.WebSocketProtocolService; import org.atmosphere.util.IOUtils; import org.atmosphere.util.annotation.AnnotationDetector; import org.slf4j.Logger; import org.slf4j.LoggerFactory; import javax.servlet.ServletContext; import javax.servlet.annotation.HandlesTypes; import java.io.File; import java.io.FilenameFilter; import java.io.IOException; import java.lang.annotation.Annotation; import java.util.HashMap; import java.util.List; import java.util.Map; import java.util.Set; import java.util.concurrent.atomic.AtomicBoolean; import static org.atmosphere.util.IOUtils.loadClass; /** * An {@link AnnotationProcessor} that selects between a ServletContextInitializer based scanner, and * a bytecode based scanner based on <a href="https://github.com/rmuller/infomas-asl"></a>. * <p/> * * @author Jeanfrancois Arcand */ public class DefaultAnnotationProcessor implements AnnotationProcessor { private static final Logger logger = LoggerFactory.getLogger(DefaultAnnotationProcessor.class); /** * The attribute name under which the annotations are stored in the servlet context. */ public static final String ANNOTATION_ATTRIBUTE = "org.atmosphere.cpr.ANNOTATION_MAP"; // Annotation in java is broken. private static final Class[] coreAnnotations = { AtmosphereHandlerService.class, BroadcasterCacheService.class, BroadcasterFilterService.class, BroadcasterFactoryService.class, BroadcasterService.class, MeteorService.class, WebSocketFactoryService.class, WebSocketHandlerService.class, WebSocketProtocolService.class, AtmosphereInterceptorService.class, BroadcasterListenerService.class, AsyncSupportService.class, AsyncSupportListenerService.class, WebSocketProcessorService.class, BroadcasterCacheInspectorService.class, ManagedService.class, AtmosphereService.class, EndpointMapperService.class, BroadcasterCacheListenerService.class, AtmosphereAnnotation.class, AtmosphereResourceFactoryService.class, AtmosphereFrameworkListenerService.class, AtmosphereResourceListenerService.class, UUIDProviderService.class }; private AnnotationProcessor delegate; private final AnnotationHandler handler; private final AtomicBoolean coreAnnotationsFound = new AtomicBoolean(); private final AnnotationDetector.TypeReporter atmosphereReporter = new AnnotationDetector.TypeReporter() { @SuppressWarnings("unchecked") @Override public Class<? extends Annotation>[] annotations() { return new Class[]{ AtmosphereAnnotation.class }; } @Override public void reportTypeAnnotation(Class<? extends Annotation> annotation, String className) { try { coreAnnotationsFound.set(true); handler.handleProcessor(loadClass(getClass(), className)); } catch (Exception e) { logger.warn("Error scanning @AtmosphereAnnotation", e); } } }; public DefaultAnnotationProcessor() { this.handler = new AnnotationHandler(); } @Override public void configure(final AtmosphereConfig config) { ServletContext sc = config.framework().getServletContext(); Map<Class<? extends Annotation>, Set<Class<?>>> annotations= (Map<Class<? extends Annotation>, Set<Class<?>>>) sc.getAttribute(ANNOTATION_ATTRIBUTE); sc.removeAttribute(ANNOTATION_ATTRIBUTE); boolean useByteCodeProcessor = config.getInitParameter(ApplicationConfig.BYTECODE_PROCESSOR, false); boolean scanForAtmosphereAnnotation = false; if (useByteCodeProcessor || annotations == null || annotations.isEmpty()) { delegate = new BytecodeBasedAnnotationProcessor(handler); scanForAtmosphereAnnotation = true; } else { Map<Class<? extends Annotation>, Set<Class<?>>> clone = new HashMap<Class<? extends Annotation>, Set<Class<?>>>(); clone.putAll(annotations); delegate = new ServletContainerInitializerAnnotationProcessor(handler, clone, config.framework()); } logger.info("AnnotationProcessor {} being used", delegate.getClass()); if (scanForAtmosphereAnnotation) { scanForAnnotation(config.framework()); } delegate.configure(config.framework().getAtmosphereConfig()); } private void scanForAnnotation(AtmosphereFramework f) { List<String> packages = f.customAnnotationPackages(); AnnotationDetector detector = new AnnotationDetector(atmosphereReporter); try { if (!packages.isEmpty()) { for (String p : packages) { logger.trace("Package {} scanned for @AtmosphereAnnotation", p); detector.detect(p); } } // Now look for application defined annotation String path = IOUtils.realPath(f.getServletContext(), f.getHandlersPath()); if (path != null) { detector.detect(new File(path)); } String pathLibs = IOUtils.realPath(f.getServletContext(), f.getLibPath()); if (pathLibs != null) { File libFolder = new File(pathLibs); File[] jars = libFolder.listFiles((arg0, arg1) -> arg1.endsWith(".jar")); if (jars != null) { for (File file : jars) { detector.detect(file); } } } // JBoss|vfs with APR issue, or any strange containers may fail. This is a hack for them. // https://github.com/Atmosphere/atmosphere/issues/1292 if (!coreAnnotationsFound.get()) { fallbackToManualAnnotatedClasses(getClass(), f, handler); } } catch (IOException e) { logger.warn("Unable to scan annotation", e); } finally { detector.destroy(); } } private static void fallbackToManualAnnotatedClasses(Class<?> mainClass, AtmosphereFramework f, AnnotationHandler handler) { logger.warn("Unable to detect annotations. Application may fail to deploy."); f.annotationScanned(true); for (Class<?> a : coreAnnotations) { try { handler.handleProcessor(loadClass(mainClass, a.getName())); } catch (Exception e) { logger.trace("", e); } } } @Override public AnnotationProcessor scan(final File rootDir) throws IOException { delegate.scan(rootDir); return this; } @Override public AnnotationProcessor scan(final String packageName) throws IOException { delegate.scan(packageName); return this; } @Override public AnnotationProcessor scanAll() throws IOException { delegate.scanAll(); return this; } @Override public void destroy() { if (delegate != null) { delegate.destroy(); handler.destroy(); // Help GC with the annotations Map. delegate = null; } } private static final class ServletContainerInitializerAnnotationProcessor implements AnnotationProcessor { private final Map<Class<? extends Annotation>, Set<Class<?>>> annotations; private final AtmosphereFramework framework; private final AnnotationHandler handler; /** * This is not great, but we can't differentiate based on the file, so we just do one scan * of everything in the war. It would be nice to change to the API to make this a bit cleaner * but it looks like it is a public API. */ private boolean alreadyScanned; private ServletContainerInitializerAnnotationProcessor(AnnotationHandler handler, final Map<Class<? extends Annotation>, Set<Class<?>>> annotations, final AtmosphereFramework framework) { this.annotations = annotations; this.framework = framework; this.handler = handler; } @Override public void configure(final AtmosphereConfig config) { } @Override public AnnotationProcessor scan(final File rootDir) throws IOException { if (alreadyScanned) { return this; } alreadyScanned = true; Set<Class<?>> atmosphereAnnotatedClasses = annotations.get(AtmosphereAnnotation.class); boolean handleAtmosphereAnnotation = handleAtmosphereAnnotation(atmosphereAnnotatedClasses); for (Map.Entry<Class<? extends Annotation>, Set<Class<?>>> entry : annotations.entrySet()) { for (Class<?> clazz : entry.getValue()) { handler.handleAnnotation(framework, entry.getKey(), clazz); } } if (handleAtmosphereAnnotation) { scanForCustomAnnotation(atmosphereAnnotatedClasses); } return this; } private boolean handleAtmosphereAnnotation(Set<Class<?>> atmosphereAnnotatedClasses) { boolean scanForCustomizedAnnotation = false; if (atmosphereAnnotatedClasses != null) { for (Class<?> clazz : atmosphereAnnotatedClasses) { handler.handleProcessor(clazz); } } else { fallbackToManualAnnotatedClasses(getClass(),framework, handler); } // If larger, a custom annotation has been defined. if (atmosphereAnnotatedClasses != null && atmosphereAnnotatedClasses.size() >= AnnotationScanningServletContainerInitializer.class.getAnnotation(HandlesTypes.class).value().length) { scanForCustomizedAnnotation = true; } return scanForCustomizedAnnotation; } private void scanForCustomAnnotation(Set<Class<?>> atmosphereAnnotatedClasses) throws IOException { handler.flushCoreAnnotations(atmosphereAnnotatedClasses); BytecodeBasedAnnotationProcessor b = new BytecodeBasedAnnotationProcessor(handler); b.configure(framework.getAtmosphereConfig()); String path = framework.getServletContext().getRealPath(framework.getHandlersPath()); if (path != null) { b.scan(new File(path)).destroy(); } else { logger.warn("Unable to scan using File. Scanning classpath"); b.scanAll(); } } @Override public AnnotationProcessor scan(final String packageName) throws IOException { Set<Class<?>> atmosphereAnnotatedClasses = annotations.get(AtmosphereAnnotation.class); if (packageName.equals("all") || getClass().getClassLoader().getResource(packageName.replace(".", "/")) != null) { boolean handleAtmosphereAnnotation = handleAtmosphereAnnotation(atmosphereAnnotatedClasses); for (Map.Entry<Class<? extends Annotation>, Set<Class<?>>> entry : annotations.entrySet()) { for (Class<?> clazz : entry.getValue()) { if (packageName.equals("all") || clazz.getPackage().getName().startsWith(packageName)) { handler.handleAnnotation(framework, entry.getKey(), clazz); } } } if (handleAtmosphereAnnotation) { scanForCustomAnnotation(atmosphereAnnotatedClasses); } } return this; } @Override public AnnotationProcessor scanAll() throws IOException { return scan("all"); } @Override public void destroy() { annotations.clear(); } } private static final class BytecodeBasedAnnotationProcessor implements AnnotationProcessor { protected AnnotationDetector detector; protected final AnnotationHandler handler; public BytecodeBasedAnnotationProcessor(AnnotationHandler handler) { this.handler = handler; } @Override public void configure(final AtmosphereConfig config) { final AnnotationDetector.TypeReporter reporter = new AnnotationDetector.TypeReporter() { @SuppressWarnings("unchecked") @Override public Class<? extends Annotation>[] annotations() { return handler.handledClass(); } @Override public void reportTypeAnnotation(Class<? extends Annotation> annotation, String className) { try { final Class<?> discoveredClass = loadClass(getClass(), className); handler.handleAnnotation(config.framework(), annotation, discoveredClass); } catch (Exception e) { logger.warn("Could not load discovered class", e); } } }; detector = new AnnotationDetector(reporter); } @Override public AnnotationProcessor scan(File rootDir) throws IOException { detector.detect(rootDir); return this; } @Override public AnnotationProcessor scan(String packageName) throws IOException { logger.trace("Scanning @Service annotations in {}", packageName); detector.detect(packageName); return this; } @Override public AnnotationProcessor scanAll() throws IOException { detector.detect(); return this; } @Override public void destroy() { if (detector != null) detector.destroy(); } } }
Low
[ 0.531548757170172, 34.75, 30.625 ]
Abstract: There remains a lack of prospective and controlled research on the behavioral, toxicological, and physiological effects of electronic cigarettes (ECs) to help the public health community come to a clear and accurate consensus on their risk-benefit. Moreover, the studies that have been completed used various commercially available ECs, e-liquid flavors, and nicotine concentrations, many of which are unavailable today and for which we know very little about, making the generalizability and comparisons between past, present, and future studies very difficult. The recent development of the NIDA Standard Research E-cigarette (SREC), will provide researchers the ability to address this research gap with a product that has been fully characterized, delivers nicotine efficiently, and will remain unchanged and available for an extended period of time. The present funding opportunity (PAR-17-156) is meant to begin to evaluate, with a high degree of fidelity, ECs as a potential means of reducing smoking-related risks and to provide information on the use and effects of the NIDA SREC; it is also meant to do so quickly (two-year study). In order to successfully execute the proposed study, we plan to recruit and enroll recent smoking cessation treatment failures from a state quitline (QL), which predominately serves priority populations (e.g., low socioeconomic status, high levels of mental health conditions). QLs provide ready access to a large number of tobacco users, as well as infrastructure for delivering and testing study interventions quickly. With a two-year time window, QLs are potentially the best real-world platform to quickly and with sufficient statistical power, meaningfully examine smokers' ability and willingness to switch to the SREC, and its impact on their tobacco use behaviors, nicotine dependence, and health. The proposed study will randomly assign 372 smokers who were recent QL treatment failures to a) nicotine SREC; b) placebo SREC; or c) no-product, assessment-only control (AOC). All participants will receive three calls from QL coaches (SREC education calls for SREC participants and attention-placebo calls for AOC participants). SRECs will be provided at no cost for 8 weeks, and the final follow-up will occur 12-weeks post baseline. Our specific aims are to evaluate 1) provision of nicotine SREC vs. placebo SREC on product switching/substitution, craving/withdrawal, abuse liability, number of cigarettes smoked, and perceived nicotine dependence; 2) changes in biomarkers of tobacco constituent exposure and physiological effects; and 3) which EC device characteristics and effects (e.g., satisfaction, ?throat hit?, craving reduction) influence complete (vs. partial or no) switching.
High
[ 0.6613756613756611, 31.25, 16 ]
Preparing not to move: does no-response priming affect advance movement preparation processes in a response priming task? The response-priming paradigm is frequently employed to study motor control by means of behavioural as well as psychophysiological methods. In this paradigm, response performance is studied under various preparation conditions, but in all cases participants are generally primed for action. This setting neglects an essential ability of the motor system in everyday situations, i.e. the efficient execution of a movement with and without warning. In this context the present experiment assessed the behavioural effects of a modified response-priming paradigm, in which participants were asked to execute movements when primed for action, and when the prime predicted that no response would be required. Thirty volunteers participated the experiment, which tested whether the insertion of no-response trials would affect the validity effect, and assessed the differences between invalid trials and reactions performed subsequent to no-response primes. The data showed that the validity effect is not modulated by the added no-response condition, which suggests that movement preparation mechanisms can be studied with this particular task. In addition, responses in invalid trials were substantially different from responses executed after no-response primes. These results are interpreted in relation to psychophysiological evidence on advance movement preparation. It is proposed that the performance differences between response- and no-response priming conditions may be due to different preactivations of motor regions evoked by the prime stimuli, a hypothesis to be addressed with psychophysiological measures in the future.
High
[ 0.6557377049180321, 35, 18.375 ]
Follow the author of this article Follow the topics within this article More women than ever are drinking beer at home, choosing pints over wine or spirits as they relax in the evening, according to a study. Almost a third of women said they choose to drink beer at home, compared to just three per cent in 2009. When out at the pub or in a bar, they are more likely to drink beer if they are out with female friends rather than male. Perhaps unsurprisingly, the report found that far fewer women drink beer than men; with only one in six choosing the beverage at least once a week compared to more than half of men. The Gender Pint Gap report, compiled by Dea Latis, the female beer group, and based on a YouGov survey, revealed that the UK has one of the lowest percentages of female beer drinkers in the world, despite the much lauded craft beer boom. Outdated, “sexist” marketing, fear of developing a “beer belly” and negative perceptions about flavour were found to contribute to women spurning the drink. Women are less likely to order beer at a bar if they are socialising with men, study findsCredit: Caiaimage/Paul Bradbury A fifth of women said the high calorie content was one of the main reasons they avoided beer whilst almost a third said they feared “being judged by others”. The report suggests that generally, women's attitudes towards beer have not changed in nearly a decade. Lisa Harlow, a co-author, said: "Our research has shown many misconceptions which women still hold about beer, such as calorific content, self-image and pre-conceptions about taste. "It was disheartening in our supposedly enlightened times that so many of our female respondents cited 'being judged by others' as a reason for not drinking beer. Perhaps we need some high-profile celebrity advocates to show women that it is acceptable to drink beer?" The report suggested that clear, concise information about flavour profiles could be key to encouraging sampling and should be supplied by retailers. It said a “quality over quantity” message could overcome the fear of weight gain by offering beer in different sizes and formats. “Beer itself doesn’t have a gender and there is nothing remarkable about a woman drinking a beer,” it said. “But it is impossible to ignore the larger questions swirling around women, gender and beer “We know it’s about perceptions, glassware, volume of liquid, range of beer styles, better training – none of this is new. But who is addressing this and making this happen so that the female drinking consumer starts to get the same story?”
Mid
[ 0.559322033898305, 33, 26 ]
The Student Welfare Outreach Team (SWOT) is a high school outreach program that aims to improve the educational outcomes of students attending high schools that experience disadvantage and that are under-represented at Victorian universities. At SWOT, we aim to emphasise the wellbeing and welfare of students during their stressful VCE period by equipping students with the essential skills needed for success. SWOT began over 22 years ago, run initially by the University of Melbourne Medicine Student Society (UMMSS). Today, SWOT has grown immensely, providing academic and mentoring support to hundreds of students each year. Starting as only a one-week revision program, SWOT has now expanded its repertoire of sub-programmes to engage students from across Victoria, including those from regional communities. SWOT has traditionally been very popular with high school students and volunteers alike. In 2019, SWOT was run by a team of 100 dedicated volunteer staff from a diverse range of faculties and universities across Victoria. Being entirely student run and not-for-profit, SWOT has a clear aim of removing the limitations of educational disadvantage, with our volunteers deeply invested in the education and success of our students. If you share our vision and would like to become part of our community of volunteers, or are a student or school interested in exploring our VCE support programs, please visit the links above to learn more! Applications for volunteer SWOT tutors for 2020 have CLOSED. If you are a VCE student or school representative interested in one or more of our sub-programme(s), please contact us at [email protected]
High
[ 0.71505376344086, 33.25, 13.25 ]
With the news that Monster Munch will be returning to our stores in their original, much larger form, now seems like a good time to canvas opinion about which of the original flavours was the best loved. Â Personally I wasn’t a big fan of any of them, but I think I’d have to plump for Pickled Onion flavour if I had to choose…
Low
[ 0.35121951219512104, 18, 33.25 ]
Danish submarine inventor Peter Madsen was found guilty Wednesday of torturing and murdering Swedish reporter Kim Wall before dismembering her body during a private submarine trip. He was sentenced to life in prison. Copenhagen City Court Judge Anette Burkoe said she and two jurors unanimously decided Wall's death was a murder, finding Madsen also guilty of sexual assault and the defilement of a corpse. "It is the court's assessment that the defendant killed Kim Wall," Burkoe told the packed courtroom. During the 12 days of the trial that began March 8, the court heard testimony that Madsen lured 30-year-old Wall on to his hand-built submarine with the promise of an interview she had been trying to get for months. Wall, a freelance journalist who wrote for leading magazines and newspapers, was last seen Aug. 10 waving to her boyfriend and other friends ashore as the submarine sailed off into the Baltic. Her dismembered torso was found days later at sea off Copenhagen, and other body parts were found in plastic bags in October. "We are talking about a cynical and planned sexual assault and brutal murder of a random woman, who in connection with her journalistic work had accepted an offer to go sailing in the defendant's submarine," Burkoe told the court. Peter Madsen, the builder and captain of the private submarine UC3 Nautilus, was found guilty Wednesday of torturing and murdering Wall during a private submarine trip. He was given life in prison. (Bax Lindhardt/AFP/Getty Images) "I am satisfied that the court has listened to what I said," prosecutor Jakob Buch-Jepsen told reporters outside court. Madsen to be jailed through appeal process Immediately after the verdict, Madsen's lawyer, Betina Hald Engmark, told the court she would appeal. The court ordered Madsen kept behind bars during the appeals process. Throughout the trial Madsen denied murder, saying 30-year-old Wall died accidentally inside the submarine. He changed his story several times. Initially he told authorities that he had dropped her off on shore and did not know what had happened to her. He then claimed she had died accidentally when hit in the head by the submarine's hatch. Finally, after her decapitated head was found by police divers in a weighted-down bag along with her appendages and the skull showed no signs of fracture, he said she had been asphyxiated in a malfunction aboard the submarine. He also initially denied dismembering her, then confessed that he had done so and said he'd thrown her body parts into the Baltic Sea. Burkoe noted the discrepancies, saying Madsen "failed to give trustworthy explanations." She added that evidence also showed he "has shown interest for killing and maiming of people and has shown interest for impaling." Madsen listened quietly as the verdict was read, looking down at the desk in front of him. Prosecutor Buch-Jepsen claimed Wall's murder was sexually motivated and premeditated because Madsen brought along tools he normally didn't take when sailing, including a saw and sharpened screwdrivers. Madsen's defence lawyer had argued for his acquittal on the charge of murder, saying he should only be sentenced for the lesser charge of cutting Wall's body into pieces. The cause of death has never been established but the court found that Madsen "cut the body into pieces to hide what had happened." A life sentence in Denmark could mean a sentence as few as 16 years, depending on a parole decision.
Low
[ 0.527777777777777, 33.25, 29.75 ]
quote:Kept Lynch in the 5th, Torrey in the 13th, Graham in the 14th, Morris in the 15th. Been running from the police ever since. Wat? Please explain Keeper league. Even though I lost in the semis last year, I crown myself manager of the year. Acquired Lynch via trade in 2011. Acquired Graham via trade in 2012, same owner. Picked up Morris after our draft last year (Thank you FantasyGuru). Traded him to same owner, but traded back for him. Picked up Torrey during his breakout game in 2011.
Low
[ 0.5137614678899081, 28, 26.5 ]
// Copyright ©2014 The Gonum Authors. All rights reserved. // Use of this source code is governed by a BSD-style // license that can be found in the LICENSE file. package graph // Line is an edge in a multigraph. A Line returns an ID that must // distinguish Lines sharing Node end points. type Line interface { // From returns the from node of the edge. From() Node // To returns the to node of the edge. To() Node // ReversedLine returns a line that has the // end points of the receiver swapped. ReversedLine() Line // ID returns the unique ID for the Line. ID() int64 } // WeightedLine is a weighted multigraph edge. type WeightedLine interface { Line Weight() float64 } // Multigraph is a generalized multigraph. type Multigraph interface { // Node returns the node with the given ID if it exists // in the multigraph, and nil otherwise. Node(id int64) Node // Nodes returns all the nodes in the multigraph. // // Nodes must not return nil. Nodes() Nodes // From returns all nodes that can be reached directly // from the node with the given ID. // // From must not return nil. From(id int64) Nodes // HasEdgeBetween returns whether an edge exists between // nodes with IDs xid and yid without considering direction. HasEdgeBetween(xid, yid int64) bool // Lines returns the lines from u to v, with IDs uid and // vid, if any such lines exist and nil otherwise. The // node v must be directly reachable from u as defined by // the From method. // // Lines must not return nil. Lines(uid, vid int64) Lines } // WeightedMultigraph is a weighted multigraph. type WeightedMultigraph interface { Multigraph // WeightedLines returns the weighted lines from u to v // with IDs uid and vid if any such lines exist and nil // otherwise. The node v must be directly reachable // from u as defined by the From method. // // WeightedLines must not return nil. WeightedLines(uid, vid int64) WeightedLines } // UndirectedMultigraph is an undirected multigraph. type UndirectedMultigraph interface { Multigraph // LinesBetween returns the lines between nodes x and y // with IDs xid and yid. // // LinesBetween must not return nil. LinesBetween(xid, yid int64) Lines } // WeightedUndirectedMultigraph is a weighted undirected multigraph. type WeightedUndirectedMultigraph interface { WeightedMultigraph // WeightedLinesBetween returns the lines between nodes // x and y with IDs xid and yid. // // WeightedLinesBetween must not return nil. WeightedLinesBetween(xid, yid int64) WeightedLines } // DirectedMultigraph is a directed multigraph. type DirectedMultigraph interface { Multigraph // HasEdgeFromTo returns whether an edge exists // in the multigraph from u to v with IDs uid // and vid. HasEdgeFromTo(uid, vid int64) bool // To returns all nodes that can reach directly // to the node with the given ID. // // To must not return nil. To(id int64) Nodes } // WeightedDirectedMultigraph is a weighted directed multigraph. type WeightedDirectedMultigraph interface { WeightedMultigraph // HasEdgeFromTo returns whether an edge exists // in the multigraph from u to v with IDs uid // and vid. HasEdgeFromTo(uid, vid int64) bool // To returns all nodes that can reach directly // to the node with the given ID. // // To must not return nil. To(id int64) Nodes } // LineAdder is an interface for adding lines to a multigraph. type LineAdder interface { // NewLine returns a new Line from the source to the destination node. NewLine(from, to Node) Line // SetLine adds a Line from one node to another. // If the multigraph supports node addition the nodes // will be added if they do not exist, otherwise // SetLine will panic. // Whether l, l.From() and l.To() are stored // within the graph is implementation dependent. SetLine(l Line) } // WeightedLineAdder is an interface for adding lines to a multigraph. type WeightedLineAdder interface { // NewWeightedLine returns a new WeightedLine from // the source to the destination node. NewWeightedLine(from, to Node, weight float64) WeightedLine // SetWeightedLine adds a weighted line from one node // to another. If the multigraph supports node addition // the nodes will be added if they do not exist, // otherwise SetWeightedLine will panic. // Whether l, l.From() and l.To() are stored // within the graph is implementation dependent. SetWeightedLine(l WeightedLine) } // LineRemover is an interface for removing lines from a multigraph. type LineRemover interface { // RemoveLine removes the line with the given end // and line IDs, leaving the terminal nodes. If // the line does not exist it is a no-op. RemoveLine(fid, tid, id int64) } // MultigraphBuilder is a multigraph that can have nodes and lines added. type MultigraphBuilder interface { NodeAdder LineAdder } // WeightedMultigraphBuilder is a multigraph that can have nodes and weighted lines added. type WeightedMultigraphBuilder interface { NodeAdder WeightedLineAdder } // UndirectedMultgraphBuilder is an undirected multigraph builder. type UndirectedMultigraphBuilder interface { UndirectedMultigraph MultigraphBuilder } // UndirectedWeightedMultigraphBuilder is an undirected weighted multigraph builder. type UndirectedWeightedMultigraphBuilder interface { UndirectedMultigraph WeightedMultigraphBuilder } // DirectedMultigraphBuilder is a directed multigraph builder. type DirectedMultigraphBuilder interface { DirectedMultigraph MultigraphBuilder } // DirectedWeightedMultigraphBuilder is a directed weighted multigraph builder. type DirectedWeightedMultigraphBuilder interface { DirectedMultigraph WeightedMultigraphBuilder }
Low
[ 0.512, 32, 30.5 ]
La Ligne droite La Ligne droite () is a 2011 French drama film co-written and directed by Régis Wargnier which focuses on the sport of blind running. It stars Rachida Brakni, Cyril Descours, Clémentine Célarié, and Seydina Balde. The film was given a limited release on 9 March 2011. Cast Rachida Brakni as Leïla Cyril Descours as Yannick Clémentine Célarié as Marie-Claude Seydina Balde as Franck Thierry Godard as Jacques Grégory Gadebois as Vincent Trésor Makunda as Martial Aladji Ba as Aladji Romain Goupil as teacher Soundtrack The critically acclaimed soundtrack for La Ligne droite was composed and conducted by Patrick Doyle, much in the minimalist style of composer Philip Glass. Due to a limited budget, Doyle composed the score using only ten members of the London Symphony Orchestra performing the various string, harp, and piano parts, recording them at close distances from the microphones for a larger sound. The score was well received by critics. Christian Clemmensen, reviewer of Filmtracks.com, gave Doyle's music a glowing five-star review, stating, "This is the twentieth review of a Doyle score at Filmtracks since 1996, and after awarding the composer four stars on more than a dozen occasions, La Ligne Droite finally transcends to receive that fifth star. Given the high quality of those many four-star scores, you should need no further evidence that this hidden gem is worth your time and money." The soundtrack was released 8 March 2011 through Varèse Sarabande records and features twenty-two tracks of score at a running time of forty minutes. Reception Variety wrote the film a positive review, praising the screenplay, direction, and performances by the two leads. See also Cinema of France References External links Category:2011 films Category:2010s drama films Category:Films directed by Régis Wargnier Category:French drama films Category:French films Category:Films scored by Patrick Doyle Category:Gaumont Film Company films Category:Blind sports Category:Running films Category:Films about blind people
High
[ 0.6925287356321831, 30.125, 13.375 ]
Guyland ATTENTION: This item is an eBook. It can be read on iOS, Android, MAC and PC's with a supported eReader. It is not a physical book. eBooks are available via download immediately after you've checked out. Used Good(1 Copy): Good Connecting readers with great books since 1972. Used books may not include companion materials, some shelf wear, may contain highlighting/notes, and may not include cd-rom or access codes. Customer service is our top priority! HPB - Crystal MN, USA $10.64 FREE Used Very Good(1 Copy): Very Good 0060831359 fast shipping excellent service. A1Selections wi, USA $10.64 FREE Used Like New(1 Copy): Fine 0060831359 LIKE NEW/UNREAD! ! ! Text is Clean and Unmarked! ! ! --Be Sure to Compare Seller Feedback and Ratings before Purchasing--Has a small black line on the bottom/exterior edge of pages. Tracking is not available for orders shipped outside of the United States. If you would like to track your domestic order please be sure to select the Priority/Expedited Shipping option. spellbound PA, USA $11.57 FREE Used Good(3 Copies): Good 1 Reprint. Used-Good. Used books do not include online codes or other supplements unless noted. r. Textbook Brokers TN, USA $11.95 FREE Used Good(1 Copy): Good Connecting readers with great books since 1972. Used books may not include companion materials, some shelf wear, may contain highlighting/notes, may not include cdrom or access codes. Customer service is our top priority! Used Like New:LIKE NEW. Fast shipping and a 100% money-back guarantee from an award-winning, socially responsible business. This purchase funds literacy programs helping people everyday in the US and abroad. Super Book Deals $14.69 FREE Used Good(11 Copies): Good Books have varying amounts of wear and highlighting. Usually ships within 24 hours in quality packaging. Satisfaction guaranteed. This item may not include any CDs, Infotracs, Access cards or other supplementary material.
Mid
[ 0.603174603174603, 28.5, 18.75 ]
--- author: - 'J. Wang' - 'J. Y. Wei' - 'X. T. He' date: 'Received September 15, 2004; accepted January 24, 2005' title: 'Variability of Optical Complex in Narrow-Line Seyfert 1 Galaxy NGC4051' --- Introduction ============ Generally, the optical/UV spectra of Active Galactic Nuclei (AGNs) are prominently featured by broad and intense emission lines. The relative strength and radiative mechanism of broad emission lines can be interpreted well by the traditional photoionization models of many dense ($\sim 10^{9-10}\mathrm{cm}^{-3}$) clouds. Those clouds with approximate cosmic abundance are photoionized and heated by a covered central source (e.g. Davidson & Netzer 1979, Kwan & Krolik 1981, Kwan 1984, Stasinska 1984, Collin-Souffrin et al. 1988, Korista et al. 1997). Despite the many successes of the standard photoionization models, important problems still remain. Although collisional ionization is carefully introduced, the photoionization models are frustrated in the aspect that accounts for the strength of emission in both UV and optical bands (Netzer & Wills 1983, Wills et al. 1985, Joly 1987, Collin-Souffrin et al. 1986,1988, Dultzin-Hacyan 1987). If the total flux of is several times larger than Ly$\alpha$ (Wills et al. 1985), and if its energy is derived from photoionization, the models indicate that the X-ray flux must then be comparable to or greater than the Lyman continuum flux. This seems unlikely,however, given our present understanding. Early calculations of emission predicted that the flux ratio of total to H$\beta$ was no more than 8. However, the observed /H$\beta$ is more typical by 12 and approaches about 30 in a few sources with “super-strong” emission (Lawrence et al. 1988, Graham et al.1996, Lipari 1994, Moran et al. 1996, Xia et al. 1999, Zhou et al. 2002). In order to interpret the intense emission, a number of additional excitation mechanisms have been proposed. Sigut & Pradhan (1998) suggested that the Ly$\alpha$ fluorescent excitation of could double strength in both UV and optical bands effectively. Joly(1991 and references therein) put forward the idea that collisional excitation is the most likely process in AGN, however, did not include virtual calculations. The emission in AGN has consistently attracted a great deal of attention, both because of the problem described above and because of its importance in investigating the underlying physics that drives the Eigenvector 1 (E1). The E1 introduced by principal component analysis (PCA, Boroson & Green 1992, hereafter BG92) contains a strong anti-correlation between FWHM of H$\beta$ and the flux ratio of the optical complex to the broad component of H$\beta$. At the present time, it is believed that the E1 plays a vital role in research of AGN phenomena (e.g. Boroson 2002, Sulentic et al. 2000a,b , Marziani et al. 2001, Zamanov & Marziani 2002, Marziani et al. 2003a). Both observational and theoretical studies indicate that the E1 is most likely driven by some elementary parameters of AGN, such as the central black hole mass, the Eddington ratio, and even the orientation of accretion axis (Jarvis & McLure 2002). Investigation of the complex emission in AGN is, therefore, essential for further understanding E1 correlations and whole AGN phenomenon. Actually, so far the variability behavior of the complex in Seyfert galaxies has been poorly understood. In Mark110, Kollatschny et al. (2001) reported that the permitted optical complex remained constant within 10% error over 10 years, while the forbidden \[\]$\lambda$6375 line was variable. Similarly, in the Seyfert 1 galaxy NGC5548 no significant variations of the optical blends (less than 20%) were detected (Dietrich et al. 1993). On the contrary, the opposite result was reported in a long term optical variability watch program on Seyfert 1 galaxy NGC7603 over a period of nearly 20 years (Kollatschny et al. 2000). This object displayed remarkable variability in the blends, with amplitudes on same order as for the H$\alpha$ and lines. Giannuzzo & Stirpe(1996) found that, out of 12 Narrow-Line Seyfert 1 galaxies(NLS1s), at least 4 of them presented a significant variability of the complex with percentage variations larger than 30%. In addition, considerable variations of the complex (larger than 50%) were reported in the other two Seyfert 1 galaxies Akn120 and Fairall9 (Kollatschny et al. 1981, Kollatschny & Fricke 1985). It is likely that further individual investigation, as well as subsequently statistical analyses, whould be essential to comprehend the physics governing the emission in AGN. NGC4051, a well-known NLS1 natured by both narrow permitted emission lines ($\rm{FWHM} \approx 1100\ \rm{km\ s^{-1}}$) and a low ratio for \[\]/H$\beta$ (Osterbrock & Pogge 1985), was monitored for three years, from January 1996 to July 1998, as part of the AGN Watch campaign (Peterson et al. 2000). Peterson and his colleagues reported the strong variabilities of intensity in H$\beta$ and $\lambda$4686. Variations of the H$\beta$ line were found to lag behind the variations in continuum by $6\pm2-3$ days. The time delay associated with the Doppler width of H$\beta$ yields a viral mass estimation of $\sim \rm{1.1\times 10^{6}} M_\odot$ for the central black hole. They also found that the blends varied little, if at all, in the period spanning three years according to the RMS spectra. In this paper, we investigate the variability of the optical complex in NGC4051 by performing a new spectral analysis on the AGN Watch archival spectra. Besides investigation of this individual object, a comparison of the variability behavior of between diverse AGNs is performed to reveal the underlying physics governing emission. The paper is organized as follows. In §2, we describe the spectral measurements in detail. The analysis and immediate results are given in §3. In §4, we propose two possible explanations, and finally discuss the underlying implications. Spectra measurements ==================== The archival spectra in one-dimensional FITS format were downloaded from the AGN Watch Web Site: http://www-astronomy.mps.ohio-state.edu/\~agnwatch/. This archive contains a total of 123 spectra divided into two data sets (A and B). Generally, for the wavelength coverage, Set B spectra extend shortward further than do spectra of Set A. In our analysis, we discard the first spectrum observed at Julian Date 2,450,095.0 because of the unavailable FITS file. The spectra n00229b and n00600b are obviated in measurements because of their poor spectral quality (i.e. bad S/N for continuum, as well as for emission lines). Spectrum n00479a is excluded from spectral analysis, as well, because of its improper wavelength coverage only ranging between 4720Å and 5990Å. Detailed information on the archival spectra can be consulted in Table 1 and Section 2.2 in Peterson et al. (2000). In Table. 1, the file name of each of the remaining 120 spectra is given in Col. (1), and Col. (2) lists the corresponding Julian Date of observation. Pretreatments and measurements ------------------------------ The remaining 120 spectra are pretreated in the following two steps: 1) the Galactic extinction is corrected by $E(B-V)=0.013$ mag from NED, adopting an $R_V=3.1$ extinction curve; 2) each spectrum is transformed to rest frame, as well as K-corrected by the redshift derived by a Gaussian fitting for the narrow peak of the H$\beta$ line. As an illustration, the rest frame spectrum of NGC4051 taken on June 16, 1996 (JD = 2,450,250.7) is shown in Fig. 1. The spectrum covers the wavelength range from 3600Å to 7540Å, and the strongest emission lines and prominent complex are labeled. As shown in Fig. 1, there is a clear contribution from blends of line emission on both the red and blue sides of the H$\beta$-\[\] complex. The blends contaminate strong emission lines and alter the fluxes of H$\beta$ and \[\]$\lambda\lambda$4959, 5007. In order to determine contributions of the blends and to measure the other emission lines reliably, we subtract the multiplets from each observed spectrum by the experiential technique described by BG92. The subtraction depends on a template of the complex. In this paper, the adopted template is the same as that used in BG92, namely, the emission of IZW1, which is a well-known prototype of bright NLS1 with narrow permitted emission lines (Phillips 1978, Oke & Lauer 1979). The detailed procedure for making the template of the emission can be found in BG92, But, briefly, the template is a two-dimensional function of FWHM and intensity of the blends. The template can be broadened to the FWHM of the broad component of H$\beta$ by convolving with a Gaussian profile and scaled to match the strength. In NGC4051, the FWHM of the template is taken to be $\rm{1200\ km\ s^{-1}}$ which approximates the value of FWHM of H$\beta$ ($V_{\rm{FWHM}} = 1110 \pm 190\ \rm{km\ s^{-1}}$) derived by Peterson et al. (2000). For each spectrum, the scaling factor is estimated at rest wavelength 4570Å; then the convolved and scaled templates are subtracted from the observed spectra. A successful subtraction requires a smooth continuum at blueward of H$\beta$ and between 5100Å and 5500Å. The subtraction is sketched in Fig. 2 for the case observed at JD = 2,450,250.7. In the figure, the bottom curve is the best estimated multiplets; and the subtracted spectrum is shown in the middle; while the observed spectrum is plotted at the top. Note that the observed spectrum is offset upwards arbitrarily for visibility. The errorbar of strength, however, is very hard to obtained accurately because the subtraction is done by eye. Therefore, the uncertainties of intensities, which generally should be round about 30-50 percent, are superseded by the upper and lower limits. These limits are carefully obtained by iterative experimentations with a series of values for the flux of the template. Outside of the limits, the subtracted continuum is absolutely unacceptable. A new template was recently published by Véron-Cetty et al. (2004). We perform the subtraction described above for 7 typical spectra in the terms of this new template. The inferred intensities are compared to the intensities provided by BG92’s template. The two flux measurements are highly correlated and consistent with a nearly linear relation. This relation indicates that both templates can archieve the same result when we focus attention on the variability behavior of the optical complex. In addition to this relationship, the flux obtained by the template of Véron is systematically lower than the flux obtained by employing the BG92 template. For instance, in the spectrum observed at JD=2,450,250.7, the calibrated flux(see Sect. 3) is $5.25\times10^{-13}\ \rm{erg\ s^{-1}\ cm^{-2}}$ for the Véron’s template, but $7.54\times10^{-13}\ \rm{erg\ s^{-1}\ cm^{-2}}$ for the BG92 template. This discrepancy is quite rational because the two templates differ in their narrow permitted and forbidden lines. These lines are excluded from the Véron’s template and are of not negligible fluxes. Line profile modelling ---------------------- The multiplets contamination-removed spectra are characterized not only by the prominent H$\beta$ and \[\]$\lambda\lambda$4959,5007 lines, but also by their broad and strong $\lambda$4686 emission. The next step in processing the spectra is to remove the continuum from each spectrum. Generally, the continuum is carefully modelled by a power law based upon two selected wavelength regions 4400Å-4450Å and 5100Å-5500Å in most situations. Both regions are free of any strong emission lines. The IRAF-SPECFIT task, a multi-component profile modelling procedure described by Kriss (1994), was utilized to model the isolated emission lines. Véron-Cetty et al. (2001) claimed that it is better to model H$\beta$ emission line by a Lorentzian profile than by a Gaussian profile in NLS1 galaxies. The choice of profile to represent the observed emission line, however, may have no physical significance(e.g. Evans 1988, Xu et al. 2003), especially when we focus on an integrated line flux. The following Gaussian components and specific relationships are involved when modelling each of the spectra. For the first step, the profile of each of the forbidden \[\]$\lambda\lambda$4959,5007 lines is synthesized from a narrow core, as well as from a broad and blueshifted base (e.g. Heckman et al. 1981,Véron-Cetty et al. 2001, Zamanov et al. 2002, Christopoulou et al. 1997). The atomic physical relationships $F_{5007}/F_{4959} \doteq 3$(Storey & Zeippen 2001) and $\lambda_{4959}/\lambda_{5007} = 0.9904$ are employed to decrease the number of free parameters in the modelling of both narrow and broad components. 2)As a second step the H$\beta$ line profile is synthesized from both a narrow Gaussian component and a broader one. Although this representation can fit the H$\beta$ line core well and agree with a generally accepted unified model for AGN, it could not fit the far blue wing of H$\beta$ adequately. Therefore, an additional blueshifted Gaussian component with $\rm{FWHM \sim 6000\ km\ s^{-1}}$ should be acquired to fit the far blue wing of H$\beta$ (e.g. Sulentic et al. 2000c; Marziani et al. 2003b; Korista & Goad 2004). In summary, a set of the following three Gaussian components are adopted to model the H$\beta$ profile: a narrow core, a classical broad component with FWHM$\sim1200\ \rm{km\ s^{-1}}$, and a very broad and blueshifted base. The FWHM of narrow H$\beta$ is taken to be equal to that of the \[\] core, because both components are emitted from the same region, i.e. from the narrow line region(NLR). The $\lambda$4684 line profile is easily fitted by a set of two Gaussian profiles because of its substantial reflection in profile. As an illustration, the profile modelling of the spectrum observed at JD = 2,450,250.7 is shown schematically in Fig. 3. The observed profile is represented by a thin line, and the modelled profile by a solid line. Each Gaussian component is shown by either a long- or short-dashed line. The residuals between the observed and modelled profile are presented in the bottom panel underneath the spectrum. Results ======= The modelled flux of each component is calibrated by a constant total flux of \[\]$\lambda$5007, where $F([\ion{O}{iii}]\lambda5007) = (3.91 \pm 0.12) \times 10^{-13}\ \rm{ergs\ s^{-1} \ cm^{-2}}$ (Peterson et al. 2000). The small systematical flux difference between the two sets(set A and B) are corrected by Formulas 5 and 6 in Peterson et al. (2000). The final results of profile modelling, along with the continuum and total H$\beta$ fluxes adopted from Peterson et al. (2000), are given in Table 1. Column (1) lists the file name, and Column (2) the corresponding Julian Date of observation. The continuum and H$\beta$ fluxes, both measured by Peterson et al. (2000), are listed in Columns (4) and (5), respectively. Column (6) is the flux of the subtracted optical complex between rest wavelength 4434Å and 4684Å , along with the determined upper and lower limits. The modelled total flux of H$\beta$ is given in Column (7), and the total flux of $\lambda$4686 in column (8). All the errors given in Columns (7) and (8) are caused by profile modelling. The correlation between the modelled flux of H$\beta$ and the flux provided by Peterson et al. (2000) is illustrated in Fig. 4. The modelled H$\beta$ flux containing all three components is represented by solid square symbols (Correlation I, for short), and the modelled H$\beta$ flux in which the very broad component are excluded, by open triangles (Correlation II, for short). Statistical analysis yields a Spearman rank-order correlation coefficient $r_{s}=0.896$ ($P<10^{-4}$, where P is the probability that there is null relation between two variables) for Correlation I and $r_{s}=0.708$($P<10^{-4}$) for Correlation II. Because of the lower inferred correlation coefficient for Correlation II with respect to that for Correlation I, we clarify that the very broad component should not be ignored in accounting for the total flux of H$\beta$. Systematically, the modelled flux is slightly larger in this way than the flux provided by Peterson et al. (2000). This systematical enhancement can be explained easily by emission at the high velocity wing of the very broad base. In the study by Peterson et al. (2000), the H$\beta$ high velocity wing is truncated by integration ranging from 4820Å to 4910Å in the observed frame. Comparing the flux modelled independently in this paper to the one obtained in Peterson et al. (2000), we find a highly significant, nearly linear correlation between them. Light curves ------------ The derived light curves of H$\beta$, $\lambda$4686, and are displayed in the bottom three panels in Fig. 5. Moreover, the light curves of H$\beta$ and continuum both derived by Peterson et al. (2000) are shown in the top two panels. The two independent H$\beta$ light curves are quite similar. The second panel, from bottom to top, shows the light curve of the line. Here, it should be emphasized that the flux of is obtained from the contamination-removed spectrum. Because of the significant blending between and the complex, the emission is a complicating factor when measuring the strength of line. In Fig. 5, the error bars overlaid on the light curve include only those uncertainties caused by profile modelling and do not reflect the errors caused by the subtraction. The variations are shown in the bottom panel of Fig. 5. The length of each overlaid solid line corresponds to the range between upper and lower limits, which are determined by the iterative experiments of the subtraction. The pattern of the variations closely follows the continuum (and H$\beta$) light curve. Despite all our efforts, any significant lag of the complex with respect to the continuum could not be determined because of the large uncertainties of the flux. In the lower panel of Fig. 6, the flux of the complex is plotted as a function of continuum flux as an additional test of line variability. The diagram shows a positive correlation between intensity and continuum flux ($\rm{r_{s}=0.701,P<10^{-4}}$). The relationship of the H$\beta$ line with respect to continuum is displayed in the upper panel ($\rm{r_{s}=0.564,P<10^{-4}}$). Equivalent width and RFe ------------------------ The Baldwin Effect (BE) defined as an anti-correlation between the equivalent width (EW) of $\lambda$1549 and continuum luminosity at $\lambda$1450 was first reported by Baldwin(1977). Subsequent observational studies indicated that the BE can be detected in almost all measurable high ionization emission lines (Espey et al. 1993, Lanzetta et al. 1993, Zheng & Malkan 1993) except $\lambda$1240 (Hamann & Ferland 1999). Gilbert & Peterson (2003) recently found a convincing intrinsic BE in the broad H$\beta$ line of the active galaxy NGC5548 by analyzing spectra from International AGN Watch collaboration (see also in Goad, Korista & Knigge 2004). In Fig. 7, the EW of the complex is plotted against continuum flux. There is a moderate correlation between these data ($\rm{r_{s}=0.384},P<10^{-4}$), which confirms previous claims that no convincing BE has been detected in the optical blends (Yee & Oke 1981, Elston et al. 1994). The relationship is influenced slightly by a few points with excessive contributions. These points clearly deviate from the other points. Detailed inspection of the light curves indicates that these specific points are mainly deduced from spectra observed from JD = 2,450,193.6 to 2,450,465.0. Subsequently, the corresponding original spectra, subtraction, and profile modelling are carefully inspected. We find that the deduced excessive emission is perhaps caused by the lower S/N ratio at blueward of the spectra. The bad quality of the spectra makes measurement of the blends difficult and ultimately leads to an over-removal of the complex because of blending between and other faint emission lines, such as $\lambda$4471. The intrinsic variations of $\rm{R_{Fe}}$ as a function of continuum flux are plotted in Fig. 8. $\rm{R_{Fe}}$ is one of the most important quantities describing the E1 parameter space, and it is defined as the flux ratio of optical complex to H$\beta$. Although the flux of H$\beta$ includes the contributions of narrow, broad, and very broad components, it should be noted that the flux of the narrow component of H$\beta$ is, of course, expected to be constant. This plot shows a positive correlation between $\rm{R_{Fe}}$ and continuum flux logarithm. The correlation coefficient derived by Spearman analysis is $\rm{r_{s}=0.521 (P<10^{-4})}$. An unweighted linear fit to this relation gives $\rm{R_{Fe}}\propto (2.5\pm0.4)\log ([F_{\lambda}(5100\AA)/10^{-13} ergs\ s^{-1}\ cm^{-2}])$ and is overplotted in Fig. 8 as a solid line. By analyzing the reverberation mapping (e.g. Blandford & Mckee 1982, Peterson et al.1998b) results of spectrophotometrical monitoring of a well-defined sample of 17 Palomar Green quasars and 17 Seyfert galaxies, Kaspi et al. (2000) found that the relation between the Eddington ratio and the continuum luminosity at $\lambda$5100 can be expressed as $L/L_{\rm{E}} \propto [\lambda L_{\lambda}(5100\AA)/10^{44} \rm{ergs\ s^{-1}}]^{0.5}$. Consequently, by combining the above relationships, we find that $\rm{R_{Fe}}$ can be inferred to scale with the Eddington ratio as $\rm{R_{Fe}} \propto (5.0\pm0.8) \log(L/M)$. Our relationship does not agree with that found by Marziani et al. (2001, and references therein). To predict a grid of theoretical values in E1 parameter space, these authors obtained a global semi-theoretical relation between $\rm{R_{Fe}}$ and the Eddington ratio: $\rm{R_{Fe}}\propto 0.55\log(L/M)$. The discrepancy between the two relations is highly significant. Discussion: Comparison of variability of complex: NGC4051 and other AGNs ======================================================================== In this paper, we detect a positive correlation between $\rm{R_{Fe}}$ and the continuum flux in NGC4051. However, it should be emphasized that the real situation is hard to handle when taking other results about variations of emission into account. For instance, by calculating the flux ratio of to H$\beta$, we find that in NGC7603, $\rm{R_{Fe}}$ apparently decreases with increasing continuum (Kollatschny et al. 2000). This relation is displayed in Fig. 9. The point observed at JD=24,044,168 is omitted because it clearly deviates from the other points. The difference in variability behavior of $\rm{R_{Fe}}$ implies that the Seyfert galaxies NGC4051 and NGC7603 differ in those physical conditions that govern the variability behavior of emission. In order to statistically investigate the behavior of variations, we collected some results about variations from earlier publications. The comparison is summarized in Table 2. Column 1 lists the object name, and Column 2 the averaged FWHM of H$\beta$. Column 3 summarizes the relation between $\rm{R_{Fe}}$ and continuum flux. In fact, whether a positive or a negative correlation can be obtained is determined by the fact that the variations of the blends are stronger or weaker in comparison to the H$\beta$ line. In Mark359, Mark1044, and Akn564, the percentage variations in line fluxes of H$\beta$ and $\lambda$4550 were given by Giannuzzo & Stirpe (1996). The variability behavior of $\rm{R_{Fe}}$ could be easily obtained in terms of the ratio between the percentage variation of and that of H$\beta$. If the ratio is larger than unity, then $\rm{R_{Fe}}$ is expected to increase with continuum. Insteady, $\rm{R_{Fe}}$ decreases with continuum when the ratio is less than 1. In NLS1 galaxy Mark110, $\rm{R_{Fe}}$ is expected to decrease with continuum flux both because the H$\beta$ line varied by a factor of about 2 and because the lines remained constant over the 10 years. By comparing the variability behaviors of different objects, we find that all objects with positive correlations have narrow H$\beta$ profiles and can be classified as NLS1s. In contrast, the remaining two sources with negative correlations have relatively broad H$\beta$ profiles (i.e. $\rm{FWHM>1500\ km\ s^{-1}}$). The dichotomy in variability behavior of $\rm{R_{Fe}}$ suggests that the variability amplitude of the complex in Seyfert galaxies might be correlated with the width of the H$\beta$ line. Because the standard photoionization models cannot interpret the strong emission, we attempt to interpret the dichotomy in variability behavior of $\rm{R_{Fe}}$ in the framework of collisional models, in which the bulk excitation of the optical lines is due to collisional excitation in a high density optically thick cloud illuminated and heated mainly by X-rays photons (Wills, Netzer & Wills 1985, Kwan et al.1995, Sigut & Pradhan 2003, Verner et al. 1999, Collin-Souffrin et al. 1986, 1988). The emission region is typical of $N_{e}\sim10^{10-12}\rm{cm^{-3}}$, $N_{\rm{H}}>10^{24}\rm{cm^{-2}}$, and $T_{e}\sim8000$K. We discuss the observed variability in terms of the extensively used line responsivity $\partial j_{l}(t)/\partial F_{c}$, where $j_{l}$ is the emissivity of a given line and $F_{c}$ the incident ionizing continuum flux. The time dependent responsivity means that the gas requires some time to equilibrate to a new continuum level. We clarify that this delay, in minutes, is so short that it can be neglected on the basis of the following discussions. Relaxation to thermal balance takes place on the timescale $t_{\rm{cool}}\sim5\times10^{11}n^{-1}_{e}\ \rm{s}$ (Krolik 1999), where the fact that the cooling function is usually $\sim10^{-23}\ \rm{erg\ cm^{3}\ s^{-1}}$ when the temperature is around $10^{4}$K is used. This formula provides a cooling timescale of about 0.1-1000 seconds when typical values of density in BLR are taken (e.g. in NGC4051 $N_{e}\sim10^{10}\ \rm{cm^{-3}}$ (Hyung et al. 2000), $8.7<\log N_e<9.1$ (Komossa & Mathur 2001)). These calculations indicate that, relative to the timescales on which the intrinsic continuum changes (weeks to years), the cooling timescale can be entirely ignored. Now we focus attention on the line responsivity $\partial j_{l}/\partial F_{c}$, and consider the two possible explanations: 1. *Line responsivity as a function of electron density.* Recent numerical calculations have indicated that the responsivity of the line flux in higher density case is much larger than in the case with lower density (see Fig.6 in Sigut, Pradhan & Nahar (2004)). The flux is enhanced by about one order in the model with $\log n_{\rm{H}}=9.5$, but by nearly two orders in the model with $\log n_{\rm{H}}=11.5$, when the ionization parameter increases from $10^{-3}$ to $10^{-1.5}$. Since there is a significant correlation between $\rm{R_{Fe}}$ and electron density (Aoki & Yoshida 1999; Wills et al. 1999; Marziani et al. 2001 and references therein), adopting the generally accepted E1 correlation $\rm{R_{Fe}}\propto\rm{FWHM}^{-1}$ yields $\rm{FWHM(H\beta)\propto n^{-1}_e}$. For example, in IZW1 the line ratio \]$\lambda$1892/\]$\lambda$1909 $\approx$3.5 (Laor et al. 1997) is much larger than the typical value for quasars ($\approx$0.3, Laor et al. 1995). The ratio \]/\] is a useful density diagnostic in BLR (Ferland et al. 2000). In general, the responsivity of the lines in NLS1 is consequently expected to be larger than in Broad-Line Seyfert 1 galaxy(BLSy1). 2. *Line responsivity as a function of incident continuum shape.* It is clear that the reprocessed spectrum also depends on the shape of incident continuum. Continuum energies that should most affect strength are $h\nu>$800eV(Krolik & Kallman 1988). Recently, the positive correlations between ROSAT HR1 and Count Rates were identified for six out of eight NLS1s, but the anti-correlations were identified for seven out of 14 BLSy1s(Cheng et al. 2002). There were no detectable correlations in the other two NLS1s and 7 BLSy1s. This means that, in general, the fraction of ionizing photons at high energy level increases with incident continuum in NLS1. In contrast, a decreased fraction can usually be found in BLSy1. If so, the magnitude of changes in heat contributed by the high energy photons are stronger in NLS1 and weaker in BLSy1, so that, the observed variations of the optical blends necesserialy become strong in NLS1 and weak in BLSy1. In summary, the dichotomy in the variability behavior of $\rm{R_{Fe}}$ could be caused by one of two different physical conditions, i.e. either by electron density in a single cloud or by variability behavior of incident high energy photons. At present, however, evidence is not conclusive enough to determine which of them is more important. Although we discuss them separately, it is also possible for both mechanisms to act together in AGN. It might be worthwhile to extend variability campaigns to larger Seyfert samples with different broad line widths to investigate the validity of the trend mentioned above. It is also likely that complicated photoionization model calculations are necessary to distinguish between the proposed two interpretations. However, this model study is beyond the scope of this paper. Conclusions =========== We perform new analysis of the archival spectra of NGC4051 extracted from the AGN Watch project in order to investigate the variability of optical emission. The template of BG92 is used to remove and to measure the complex. The other emission lines are profiled by multi-component profile modelling. This analysis allows us to make the following conclusions: 1. In NGC4051, we find that the optical complex was variable during the three years period. The variations closely follow the continuum variations, and the intensity of evidently increases with the continuum flux. 2. A positive correlation between the EW of and the continuum flux is identified in NGC4051. This result agrees with the previous claims that no convincing BE of has been detected untill now. 3. By comparing the variations of H$\beta$ and , a positive correlation between $\rm{R}_{Fe}$ and continuum flux is obtained in NGC4051. The unweighted fit gives the relation $\rm{R_{Fe}}\propto(5.0\pm0.8)\log(L/M)$. This relation is significantly different from the relation $\rm{R_{Fe}}\propto0.55\log(L/M)$, predicted by the semi-theoretical formula (Marziani et al. 2000). 4. We find an inverse correlation between $\rm{R}_{Fe}$ and continuum in Seyfert galaxy NGC7603 (Kollatschny et al. 2000). The difference in the variability behavior of $\rm{R}_{Fe}$ implies that the Seyfert galaxies NGC4051 and NGC7603 differ in physical conditions governing the variability of the optical blends. Furthermore, in six selected Seyfert galaxies, the positive correlations are identified in 4 out of 5 NLS1s and for the negative correlations, in the remaining two objects whose H$\beta$ profiles are relatively broad. The different electron density of BLR clouds and variability behavior of high energy photons are put forward to interpret the dichotomy in variability behavior of $\rm{R_{Fe}}$. We are grateful to the anonymous referee for many useful suggestions. The authors acknowledge many valuable discussions with Dr. Xu, D. W., Hao, C. N., S. Komossa, and Mao, Y. F. This work has made use of the archival spectroscopic data of the AGN Watch campaign. We thank Prof. Bradley M. Peterson for providing a grant for using the spectra of NGC4051. Our thanks also go to Dr. Todd A. Boroson and Richard F. Green for providing the template. This work was financially supported by the Ministry of Science and Technology of China, under grant NKBRSF G19990754, and by the NSF of China, No. 10473013. Aoki, K. & Yoshida, M. 1999, ASP, Conf.Ser., 162, 385 Baldwin, J. A., 1977, ApJ, 214, 679 Blandford, R. D., & Mckee, C. F., 1982, ApJ, 255, 419 Boroson, T. A., 2002, ApJ, 565, 78 Boroson, T. A., & Green, R. F., 1992, ApJS, 80, 109 Christopoulou, P. E., Holloway, A. J., Steffen, W., et al. 1997, MNRAS, 284, 385 Collin-Souffrin, S., Joly, M., Pequignot, D., & Dumont, S., 1986, A&A, 166, 27 Collin-Souffrin, S., Hameury, J. -M., & Joly, M., 1988, A&A, 205, 19 Cheng, L. P., Wei, J. Y., & Zhao, Y. H., 2002, ChJAA, 2, 207 Davidson, K., & Netzer, H., 1979, RvMP, 51, 715 Dietrich, M., Kollatschny, W., Peterson, B. M., et al., 1993, ApJ, 408, 416 Dultzin-Hacyan, D., 1987, RMxAA, 14, 94 Elston, R., Thompson, K. L., & Hill, G. J., 1994, Nature, 367, 250 Espey, B. R., Lanzetta, K. M., & Turnshek, D. A., 1993 AAS, 18310606 Evans, I. N., 1988, ApJS, 67, 373 Ferland, G. J., 2000, in Astrophysical Plasmas: Codes, Models, and Observations, ed. J. Arthur, N. Brickhouse, & J. Franco(Rev. Mexicana Astron, Astrofis. Ser. Conf. 9)(México, D. F.,: Inst. Astron., Univ. Nac. Autónoma México), 153 Giannuzzo, E. M., & Stirpe, G. M., 1996, 314, 419 Gilbert, K. M., & Peterson, B. M., 2003, ApJ, 587, 123 Goad, M. R., Korista, K. T., & Knigge, C., 2004, MNRAS, 352, 277 Graham, M. J., Clowes, R. G., & Campusano, L. E., 1996, MNRAS, 279,1349 Hamann, F., & Ferland, G, ARA&A, 37, 487 Heckman, T. M., Miley, G. K., van Breugel, W. J. M., & Butcher, H. R., 1981, ApJ, 247, 403 Hyung, S., Kim, H., Lee, W. B., Lee, S., Ryu, D., & Lee, H., 2000, JKAS, 33, 81 Joly, M., 1987, A&A, 184, 33 Joly, M., 1991, A&A, 242, 49 Jarvis, M. J., & McLure, R. J., 2002, MNRAS, 336, L38 Kaspi, S., Smith, P. S., Netzer, H, Maoz, D., Jannuzi, B. T., & Giveon, U., 2000, ApJ, 533, 631 Kollatschny, W., Bischoff, K., & Dietrich, M., 2000, A&A, 361, 901 Kollatschny, W., Bischoff, K., Robinson, E. L., Welsh, W. F., & Hill, G. J., 2001, A&A, 379, 125 Kollatschny, W., & Fricke, K. J., 1985, A&A, 146, L11 Kollatschny, W., Schleicher, H., Fricke, K. J., & Yorke, H. W., 1981, A&A, 104, 198 Komossa, S., & Mathur, S., 2001, A&A, 374, 914 Korista, K., Baldwin, J., Ferland, G., & Verner, D., 1997, ApJS, 108, 401 Korista, K., & Goad, M., 2004, ApJ, 606, 749 Kriss, G., 1994, ASPC, 61, 437 Krolik, J. H., 1999, Active Galactic Nuclei. Princeton, NJ: Princeton Univ. Press Krolik, J. H., & Kallman, T. R., 1988, ApJ, 324, 714 Kwan, J., & Krolik, J. H., 1981, ApJ, 250, 478 Kwan, J., 1984, ApJ, 283, 70 Kwan, J., Cheng, F.-Z, Fang, L.-Z, Zheng, W. & Ge, J. 1995, ApJ, 440, 628 Lanzetta, K. M., Turnshek, D. A., & Sandoval, J., 1993, ApJS, 84, 109 Lawrence, A., Saunders, W., Rowan-Robinson, M., et al., 1988, MNRAS, 235, 261 Laor, A., Jannuzi, B. T., Green, R. F., & Boroson, T. A., ApJ, 1997, 489, 656 Laor, A., Bahcall, J. N., Jannuzi, B. T., Schneider, D. P., & Green, R. F., ApJS, 1995, 99, 1 Lipari, S., 1994, ApJ, 436, 102 Marziani,P., Sulentic, J. W., Zwitter, T., Dultzin-Hacyan, D., &, Calvani, M., 2001, ApJ, 558, 553 Marziani,P., Sulentic, J. W., Zamanov, R., & Calvani, M., 2003b, Mem.S.A.It. 74, 490 Marziani,P., Zamanov, R. K., Sulentic, J. W., & Calvani, M., 2003a, MNRAS, 345, 1133 Moran, E. C., Halpern, J. P., & Helfand, J., 1996, ApJS, 106, 341 Netzer, H., & Wills, B. J., 1983, ApJ, 275, 445 Oke, J. B., & Lauer, T. R., 1979, ApJ, 230, 360 Osterbrock, D. E., & Pogge, R. W., 1985, ApJ, 297, 166 Peterson, B. M., McHardy, I. M., Wilkes, B. J., et al., 2000, ApJ, 542, 161 Peterson, B. M., Wanders, I., Bertram, R., et al., 1998, ApJ, 501,82 Phillips, M. M., 1978, ApJ, 226, 736 Sigut, T. A. A., & Pradhan, A. K., 1998, ApJL, 499, 139 Sigut, T. A. A., & Pradhan, A. K., 2003, ApJS, 145, 15 Sigut, T. A. A., Pradhan, A. K. & Nahar, S. N., 2004, ApJ, 611, 81 Stasinska, G., 1984, A&AS, 55, 15 Storey, P. J., & Zeippen, C. J. 2000, MNRAS, 312, 813 Sulentic, J. W., Marziani, P., & Dultzin-Hacyan, D., 2000a, ARA&A, 38, 521 Sulentic, J. W., Marziani, P., Zwitter, T., Dultzin-Hacyan, D., & Calvani, M., 2000c, ApJ, 545, L15 Sulentic, J. W., Zwitter, T., Marziani, P., & Dultzin-Hacyan, D., 2000b, ApJ, 536, L5 Verner, E. M., Verner, D. A., Korista, K. T., Ferguson, J. W., Hamann, F., & Ferland, G. J., 1999, ApJS, 120, 101 Véron-Cetty, M. -P., Véron, P., & Goncalves, A. C., 2001, A&A, 372, 730 Véron-Cetty, M. -P., Joly, M., & Véron, P., 2004, A&A, 417, 515 Wills, B. J., Netzer, H., & Wills, D., 1985, ApJ, 288, 94 Wills, B. J., Laor, A., Brotherton, M. S., Wills, D., Wilkes, B. J., Ferland, G. J., & Shang, Z, 1999, ApJ, 515, L53 Xia, X. -Y., Mao, S., Wu, H., Zheng, Z., Boller, T., Deng, Z. -G., & Zou, Z. -L., 1999, A&A, 341, L13 Xu, D. W., Komossa, S., Wei, J. Y., Qian, Y., & Zheng, X. Z., ApJ, 2003, 590, 73 Yee, H. K. C., & Oke, J. B., 1981, ApJ, 248, 472 Zamanov, R., & Marziani, P., 2002, ApJ, 571, L77 Zamanov, R., Marziani, P., Sulentic J. W., Calvani, M., Dultzin-Hacyan, D., & Bachev, R., 2002, ApJ, 576, L9 Zheng, W., & Malkan, M. A., 1993, ApJ, 415, 517 Zhou, H. Y., Wang, T. G., Zhou, Y. Y., Li, C., & Dong, X. B., 2002, ApJ, 581, 96 ![image](fig1.eps){width="13cm"} ![image](fig2.eps){width="13cm"} ![image](fig3.eps){width="13cm"} ![— The correlation between two independent H$\beta$ measurements(see text for details). The horizontal axis is the value obtained by Peterson et al. (2000), and the vertical one the value provided by profile modelling. The total flux including all three components is denoted by solid squares ($r_{s}=0.896, P<10^{-4}$), while the flux, including a narrow peak and a classical broad component, is denoted by open triangles ($r_{s}=0.708, P<10^{-4}$).](fig4.eps){width="13cm"} ![image](fig5.eps){width="16cm"} ![— Lower panel: line intensity of the optical blends plotted against continuum at rest wavelength 5100Å ($r_{s}=0.701, P<10^{-4}$). In addition, intensity of H$\beta$ as function of continuum flux is shown in the upper panel ($r_{s}=0.564, P<10^{-4}$).](fig6.eps){width="13cm"} ![— A plot of equivalent width for the optical complex against the flux of continuum ($r_{s}=0.384, P<10^{-4}$).](fig7.eps){width="13cm"} ![— $\rm{R_{Fe}}$ plotted against the logarithm of continuum flux ($r_{s}=0.521, P<10^{-4}$). The best fitted relation $\rm{R_{Fe}}\propto(5.0\pm0.8)\log(L/M)$ is shown by the overlaid solid curve.](fig8.eps){width="13cm"} ![— A plot of $\rm{R_{Fe}(4570\AA)}$ against the continuum flux in NGC7603. The fluxes are measured by Kollatschny et al.(2000). $\rm{R_{Fe}}$ is calculated by flux ratio between and H$\beta$.](fig9.eps){width="13cm"} [cccccccc]{} \ File name & $\rm{Julian\ Date}^{a}$ & Set & $F_\lambda(5100\AA)^{\rm{b}}$ & $F\rm{(H\beta_{P})}^{\mathrm{c}}$ & $F(\ion{Fe}{ii})^{\rm{c}}$ & $F\rm{(H\beta)}^{\rm{d,e}}$ & $F\rm{(\ion{He}{ii}\lambda4686)}^{\mathrm{d,f}}$\ (1)&(2)&(3)&(4)&(5)&(6)&(7)&(8)\ \ File name & $\rm{Julian\ Date}^{\rm{a}}$ & Set & $F_\lambda(5100\AA)^{\rm{b}}$ & $F\rm{(H\beta_{P})}^{\mathrm{c}}$ & $F(\ion{Fe}{ii})^{\rm{c}}$ & $F\rm{(H\beta)}^{\rm{d,e}}$ & $F\rm{(\ion{He}{ii}\lambda4686)}^{\mathrm{d,f}}$\ (1)&(2)&(3)&(4)&(5)&(6)&(7)&(8)\ n00098b & 98.0 & B & $13.88\pm0.56$ & $4.54\pm0.18$ & $6.94^{+1.39}_{-1.39}$ & $6.34\pm0.23$ & $5.13\pm0.19$\ n00102b & 102.0& B & $14.42\pm0.58$ & $4.91\pm0.20$ & $8.96^{+2.39}_{-1.79}$ & $6.81\pm0.21$ & $4.74\pm0.15$\ n00105b & 105.1& B & $13.46\pm0.54$ & $4.54\pm0.18$ & $7.82^{+2.41}_{-1.20}$ & $6.18\pm0.25$ & $3.02\pm0.16$\ n00108b & 108.0& B & $13.75\pm0.55$ & $4.39\pm0.17$ & $8.09^{+2.02}_{-1.52}$ & $6.06\pm0.30$ & $4.20\pm0.21$\ n00112b & 112.0& B & $13.75\pm0.55$ & $4.42\pm0.18$ & $7.45^{+2.13}_{-1.60}$ & $5.91\pm0.23$ & $4.92\pm0.18$\ n00118a & 118.8& A & $14.01\pm0.28$ & $4.20\pm0.08$ & $4.44^{+1.33}_{-2.66}$ & $5.23\pm0.20$ & $4.01\pm0.32$\ n00122a & 122.8& A & $14.12\pm0.28$ & $4.67\pm0.09$ & $6.34^{+2.93}_{-1.45}$ & $5.64\pm0.20$ & $2.00\pm0.08$\ n00123b & 124.0& B & $13.74\pm0.55$ & $4.72\pm0.19$ & $8.01^{+3.00}_{-1.50}$ & $6.61\pm0.27$ & $4.00\pm0.19$\ n00127a & 127.8& A & $13.51\pm0.27$ & $4.66\pm0.09$ & $6.41^{+2.96}_{-1.97}$ & $5.97\pm0.14$ & $2.42\pm0.09$\ n00129b & 129.0& B & $14.37\pm0.57$ & $5.09\pm0.20$ & $8.70^{+2.32}_{-1.74}$ & $7.07\pm0.25$ & $4.93\pm0.18$\ n00132b & 132.0& B & $14.91\pm0.60$ & $4.42\pm0.18$ & $9.14^{+2.74}_{-2.74}$ & $5.47\pm0.12$ & $3.52\pm0.20$\ n00134b & 134.9& B & $13.39\pm0.54$ & $4.63\pm0.19$ & $8.50^{+2.04}_{-2.04}$ & $6.61\pm1.22$ & $7.90\pm0.83$\ n00136a & 136.8& A & $14.13\pm0.28$ & $4.53\pm0.09$ & $7.63^{+2.72}_{-1.09}$ & $5.57\pm0.24$ & $3.07\pm0.25$\ n00149a & 149.8& A & $14.70\pm0.29$ & $4.91\pm0.10$ & $8.44^{+3.17}_{-1.59}$ & $6.23\pm0.23$ & $3.38\pm0.14$\ n00164a & 164.8& A & $14.29\pm0.29$ & $4.71\pm0.09$ & $7.75^{+2.91}_{-2.45}$ & $5.94\pm0.24$ & $3.24\pm0.13$\ n00167b & 167.7& B & $14.66\pm0.59$ & $4.92\pm0.20$ & $7.82^{+3.48}_{-1.74}$ & $6.14\pm0.22$ & $3.18\pm0.09$\ n00168a & 168.8& A & $14.58\pm0.29$ & $4.75\pm0.09$ & $7.15^{+4.08}_{-1.53}$ & $5.91\pm0.21$ & $2.76\pm0.09$\ n00170b & 170.8& B & $14.17\pm0.57$ & $5.06\pm0.20$ & $8.30^{+3.32}_{-1.11}$ & $6.44\pm0.35$ & $4.04\pm0.21$\ n00183b & 183.6& B & $14.66\pm0.59$ & $4.84\pm0.19$ & $8.35^{+4.45}_{-1.67}$ & $6.47\pm0.37$ & $4.05\pm0.16$\ n00185b & 185.6& B & $14.51\pm0.58$ & $5.29\pm0.21$ & $8.05^{+3.79}_{-1.42}$ & $6.91\pm0.26$ & $3.62\pm0.13$\ n00185a & 185.7& A & $14.06\pm0.28$ & $5.12\pm0.10$ & $8.24^{+4.12}_{-1.55}$ & $6.37\pm0.27$ & $1.73\pm0.09$\ n00188b & 188.6& B & $14.61\pm0.58$ & $5.17\pm0.21$ & $9.28^{+2.78}_{-1.36}$ & $7.23\pm0.30$ & $5.33\pm0.14$\ n00191b & 191.6& B & $14.63\pm0.58$ & $5.35\pm0.21$ & $8.63^{+2.30}_{-1.73}$ & $6.94\pm0.28$ & $4.37\pm0.15$\ n00193b & 193.6& B & $15.02\pm0.60$ & $5.75\pm0.23$ & $8.62^{+2.30}_{-1.73}$ & $7.36\pm0.29$ & $6.35\pm0.16$\ n00198a & 198.7& A & $14.43\pm0.29$ & $5.63\pm0.11$ & $8.56^{+4.28}_{-2.14}$ & $7.65\pm0.15$ & $3.70\pm0.12$\ n00198b & 198.8& B & $13.54\pm0.54$ & $5.55\pm0.22$ & $9.01^{+2.70}_{-1.80}$ & $6.64\pm0.64$ & $6.44\pm0.40$\ n00199b & 199.6& B & $14.02\pm0.56$ & $5.54\pm0.22$ & $8.26^{+1.50}_{-1.13}$ & $6.45\pm0.80$ & $6.61\pm0.55$\ n00206a & 206.7& A & $14.08\pm0.28$ & $5.63\pm0.11$ & $7.67^{+3.07}_{-2.05}$ & $7.37\pm0.22$ & $3.95\pm0.10$\ n00211b & 211.6& B & $13.54\pm0.54$ & $5.48\pm0.22$ & $7.97^{+1.90}_{-1.14}$ & $7.18\pm0.33$ & $4.62\pm0.21$\ n00212a & 212.8& A & $13.15\pm0.26$ & $5.36\pm0.11$ & $7.48^{+2.80}_{-1.87}$ & $6.80\pm0.20$ & $2.84\pm0.11$\ n00213b & 213.6& B & $13.16\pm0.53$ & $5.28\pm0.21$ & $7.78^{+1.95}_{-1.46}$ & $6.91\pm0.48$ & $4.17\pm0.19$\ n00218b & 218.6& B & $12.95\pm0.52$ & $5.09\pm0.20$ & $9.27^{+3.22}_{-2.42}$ & $6.74\pm0.48$ & $4.20\pm0.26$\ n00220a & 220.8& A & $12.27\pm0.25$ & $4.59\pm0.09$ & $6.43^{+2.57}_{-2.14}$ & $5.98\pm0.21$ & $2.90\pm0.17$\ n00221b & 221.7& B & $13.34\pm0.53$ & $4.28\pm0.17$ & $6.96^{+2.78}_{-2.78}$ & $6.11\pm0.17$ & $3.53\pm0.14$\ n00225b & 225.6& B & $12.26\pm0.49$ & $4.37\pm0.17$ & $7.59^{+1.79}_{-1.79}$ & $5.81\pm0.33$ & $3.04\pm0.18$\ n00227a & 227.8& A & $13.14\pm0.26$ & $4.14\pm0.08$ & $5.73^{+3.53}_{-3.53}$ & $5.36\pm0.19$ & $3.54\pm0.11$\ n00233a & 233.7& A & $12.84\pm0.26$ & $4.51\pm0.09$ & $6.41^{+1.97}_{-1.97}$ & $5.81\pm0.22$ & $2.43\pm0.11$\ n00240b & 240.6& B & $13.18\pm0.53$ & $4.88\pm0.19$ & $8.85^{+2.62}_{-1.31}$ & $6.34\pm0.61$ & $3.73\pm0.25$\ n00241a & 241.7& A & $13.29\pm0.27$ & $4.78\pm0.10$ & $7.46^{+2.80}_{-1.87}$ & $6.50\pm0.20$ & $3.74\pm0.74$\ n00248a & 248.7& A & $13.93\pm0.28$ & $5.64\pm0.11$ & $7.64^{+3.06}_{-2.04}$ & $7.50\pm0.16$ & $3.95\pm0.09$\ n00250b & 250.7& B & $12.99\pm0.52$ & $5.68\pm0.23$ & $7.54^{+1.67}_{-2.51}$ & $7.52\pm1.12$ & $4.34\pm0.85$\ n00253b & 253.6& B & $11.67\pm0.47$ & $5.22\pm0.21$ & $7.31^{+1.72}_{-0.86}$ & $6.62\pm0.38$ & $3.29\pm0.20$\ n00253a & 253.7& A & $11.67\pm0.47$ & $5.22\pm0.21$ & $6.94^{+2.60}_{-1.30}$ & $6.50\pm0.26$ & $2.64\pm0.16$\ n00257b & 257.7& B & $12.09\pm0.48$ & $4.47\pm0.18$ & $6.45^{+2.58}_{-2.15}$ & $5.82\pm0.33$ & $2.81\pm0.16$\ n00259b & 259.6& B & $11.92\pm0.48$ & $4.57\pm0.18$ & $8.29^{+1.44}_{-1.44}$ & $6.38\pm0.34$ & $4.66\pm0.33$\ n00262a & 262.7& A & $12.41\pm0.25$ & $4.17\pm0.08$ & $6.29^{+2.90}_{-1.45}$ & $5.35\pm0.17$ & $2.49\pm0.10$\ n00281b & 281.6& B & $13.64\pm0.55$ & $5.25\pm0.21$ &$10.76^{+4.31}_{-1.62}$ & $7.53\pm0.31$ & $4.98\pm0.22$\ n00284b & 284.7& B & $14.68\pm0.59$ & $5.89\pm0.24$ & $9.17^{+3.24}_{-1.62}$ & $7.78\pm0.26$ & $5.52\pm0.16$\ n00288b & 288.6& B & $13.25\pm0.53$ & $5.45\pm0.22$ & $9.97^{+3.07}_{-2.30}$ & $7.52\pm0.26$ & $4.17\pm0.19$\ n00429b & 429.0& B & $12.98\pm0.52$ & $5.48\pm0.23$ & $8.17^{+2.72}_{-1.36}$ & $7.65\pm0.38$ & $4.50\pm0.20$\ n00435b & 435.0& B & $13.53\pm0.54$ & $5.46\pm0.22$ & $9.44^{+2.46}_{-2.46}$ & $7.78\pm0.42$ & $5.36\pm0.32$\ n00451b & 451.0& B & $12.84\pm0.51$ & $5.51\pm0.22$ &$10.83^{+1.97}_{-1.97}$ & $7.66\pm0.38$ & $4.60\pm0.18$\ n00458b & 458.0& B & $13.25\pm0.53$ & $5.38\pm0.22$ & $9.99^{+2.72}_{-1.36}$ & $7.07\pm0.41$ & $4.23\pm0.20$\ n00465b & 465.0& B & $12.30\pm0.49$ & $4.74\pm0.19$ & $9.62^{+3.66}_{-3.20}$ & $7.04\pm0.27$ & $4.20\pm0.46$\ n00480b & 480.0& B & $12.68\pm0.51$ & $5.10\pm0.20$ & $9.17^{+4.08}_{-2.04}$ & $5.90\pm0.87$ & $3.80\pm1.00$\ n00483b & 483.1& B & $11.95\pm0.48$ & $4.69\pm0.19$ & $6.88^{+2.95}_{-2.95}$ & $5.92\pm0.76$ & $2.44\pm0.17$\ n00485b & 485.9& B & $12.41\pm0.50$ & $4.70\pm0.19$ & $6.31^{+3.15}_{-3.15}$ & $5.68\pm0.28$ & $3.30\pm0.12$\ n00488b & 489.0& B & $14.03\pm0.56$ & $4.92\pm0.20$ & $7.04^{+1.56}_{-2.34}$ & $6.03\pm0.48$ & $3.88\pm0.35$\ n00493a & 493.1& A & $12.67\pm0.25$ & $4.99\pm0.10$ & $6.61^{+1.89}_{-1.42}$ & $6.68\pm0.22$ & $4.59\pm0.17$\ n00494b & 494.0& B & $13.53\pm0.54$ & $4.83\pm0.19$ &$10.03^{+4.01}_{-2.01}$ & $6.67\pm0.23$ & $4.48\pm0.13$\ n00506a & 506.8& A & $11.46\pm0.23$ & $4.69\pm0.09$ & $5.44^{+1.56}_{-1.17}$ & $6.55\pm0.27$ & $2.60\pm0.21$\ n00509b & 510.0& B & $12.30\pm0.49$ & $4.37\pm0.17$ & $5.55^{+1.85}_{-1.39}$ & $5.09\pm0.53$ & $2.30\pm0.12$\ n00519b & 519.8& B & $12.51\pm0.50$ & $4.74\pm0.19$ & $6.58^{+3.03}_{-1.56}$ & $6.10\pm0.24$ & $3.80\pm0.17$\ n00520a & 520.8& A & $12.50\pm0.25$ & $5.12\pm0.10$ & $5.33^{+1.60}_{-1.60}$ & $6.65\pm0.16$ & $3.32\pm0.09$\ n00521b & 521.8& B & $12.65\pm0.51$ & $4.68\pm0.19$ & $6.39^{+3.76}_{-1.24}$ & $6.25\pm0.47$ & $3.70\pm0.24$\ n00527a & 527.8& A & $10.92\pm0.22$ & $4.57\pm0.09$ & $4.82^{+1.93}_{-1.45}$ & $5.75\pm0.16$ & $2.90\pm0.11$\ n00547b & 547.6& B & $11.80\pm0.47$ & $4.52\pm0.18$ & $5.66^{+1.41}_{-1.06}$ & $5.49\pm0.48$ & $2.29\pm0.17$\ n00550b & 550.8& B & $11.74\pm0.47$ & $4.47\pm0.18$ & $5.93^{+1.98}_{-1.98}$ & $5.65\pm0.38$ & $2.34\pm0.15$\ n00551b & 551.8& B & $11.59\pm0.46$ & $4.42\pm0.18$ & $5.29^{+2.88}_{-1.92}$ & $5.53\pm0.27$ & $2.32\pm0.13$\ n00567b & 567.6& B & $10.88\pm0.44$ & $4.48\pm0.18$ & $6.08^{+3.47}_{-1.30}$ & $5.77\pm0.30$ & $3.25\pm0.16$\ n00569b & 569.6& B & $11.76\pm0.47$ & $4.31\pm0.17$ & $4.59^{+1.84}_{-1.84}$ & $5.30\pm0.31$ & $2.56\pm0.16$\ n00578b & 578.6& B & $12.02\pm0.48$ & $4.32\pm0.17$ & $5.16^{+1.82}_{-1.82}$ & $5.96\pm0.35$ & $2.70\pm0.27$\ n00580b & 580.7& B & $11.97\pm0.48$ & $4.91\pm0.20$ & $4.41^{+1.10}_{-1.65}$ & $6.20\pm0.48$ & $3.13\pm0.29$\ n00582b & 582.6& B & $12.10\pm0.48$ & $4.49\pm0.18$ & $5.07^{+1.69}_{-1.27}$ & $5.69\pm0.43$ & $2.80\pm0.21$\ n00597b & 597.7& B & $12.57\pm0.50$ & $4.24\pm0.17$ & $4.27^{+3.42}_{-2.57}$ & $4.76\pm0.09$ & $1.60\pm0.10$\ n00602b & 602.6& B & $11.62\pm0.47$ & $4.61\pm0.18$ & $4.35^{+2.61}_{-2.18}$ & $6.07\pm0.34$ & $2.79\pm0.21$\ n00604b & 604.6& B & $12.00\pm0.48$ & $4.50\pm0.18$ & $5.10^{+1.70}_{-1.70}$ & $5.22\pm0.14$ & $2.02\pm0.22$\ n00608b & 608.6& B & $11.96\pm0.48$ & $4.16\pm0.17$ & $3.98^{+1.59}_{-1.19}$ & $4.81\pm0.12$ & $2.04\pm0.22$\ n00610b & 610.6& B & $10.99\pm0.44$ & $4.24\pm0.17$ & $5.99^{+1.84}_{-1.38}$ & $5.10\pm0.11$ & $1.99\pm0.20$\ n00627b & 627.6& B & $11.26\pm0.45$ & $4.01\pm0.16$ & $5.66^{+3.40}_{-1.70}$ & $4.77\pm0.38$ & $1.97\pm0.27$\ n00630b & 630.7& B & $11.14\pm0.45$ & $3.88\pm0.16$ & $4.35^{+1.74}_{-2.61}$ & $5.08\pm0.31$ & $2.60\pm0.19$\ n00635b & 635.6& B & $11.87\pm0.47$ & $4.24\pm0.17$ & $5.43^{+3.62}_{-1.81}$ & $5.48\pm0.66$ & $2.77\pm0.33$\ n00641b & 641.6& B & $12.33\pm0.49$ & $4.71\pm0.19$ & $6.36^{+1.82}_{-2.73}$ & $6.22\pm0.32$ & $3.30\pm0.16$\ n00643b & 643.6& B & $10.75\pm0.43$ & $4.46\pm0.18$ & $4.95^{+2.83}_{-2.12}$ & $5.66\pm0.18$ & $2.66\pm0.13$\ n00775a & 775.0& A & $13.29\pm0.27$ & $5.04\pm0.10$ & $6.29^{+1.93}_{-2.41}$ & $6.82\pm0.19$ & $3.11\pm0.11$\ n00777b & 777.0& B & $12.69\pm0.51$ & $5.18\pm0.21$ & $6.53^{+1.87}_{-2.34}$ & $6.68\pm0.36$ & $3.11\pm0.14$\ n00782b & 782.0& B & $12.86\pm0.51$ & $5.41\pm0.22$ & $7.21^{+2.06}_{-1.55}$ & $6.78\pm0.25$ & $2.96\pm0.13$\ n00787b & 787.0& B & $13.49\pm0.54$ & $5.27\pm0.21$ & $7.39^{+3.17}_{-1.59}$ & $6.83\pm0.22$ & $3.83\pm0.12$\ n00810b & 810.1& B & $14.06\pm0.56$ & $3.95\pm0.16$ & $7.11^{+3.16}_{-1.19}$ & $5.12\pm0.34$ & $2.22\pm0.19$\ n00834b & 834.0& B & $12.00\pm0.48$ & $4.85\pm0.19$ & $8.14^{+4.79}_{-1.92}$ & $5.65\pm0.20$ & $1.62\pm0.32$\ n00838b & 838.1& B & $11.44\pm0.46$ & $4.59\pm0.18$ & $5.93^{+2.74}_{-3.20}$ & $5.78\pm0.27$ & $2.23\pm0.13$\ n00839a & 839.0& A & $11.89\pm0.24$ & $4.89\pm0.10$ & $5.60^{+1.29}_{-1.29}$ & $6.31\pm0.25$ & $2.85\pm0.15$\ n00840b & 840.1& B & $12.50\pm0.50$ & $4.91\pm0.20$ & $6.77^{+2.08}_{-1.56}$ & $5.85\pm0.27$ & $2.01\pm0.10$\ n00843b & 843.0& B & $12.45\pm0.50$ & $4.87\pm0.19$ & $5.74^{+1.91}_{-2.78}$ & $5.55\pm0.26$ & $1.62\pm0.14$\ n00847b & 847.0& B & $12.33\pm0.49$ & $4.82\pm0.19$ & $7.12^{+2.85}_{-1.90}$ & $6.10\pm0.34$ & $2.14\pm0.14$\ n00867b & 867.0& B & $12.25\pm0.49$ & $4.20\pm0.17$ & $6.53^{+2.18}_{-1.09}$ & $4.95\pm0.59$ & $1.31\pm0.13$\ n00869b & 869.0& B & $12.55\pm0.50$ & $3.85\pm0.15$ & $4.95^{+1.98}_{-1.98}$ & $4.79\pm0.27$ & $1.71\pm0.13$\ n00872b & 873.0& B & $12.15\pm0.49$ & $4.09\pm0.16$ & $4.74^{+2.11}_{-2.64}$ & $4.88\pm0.27$ & $1.93\pm0.10$\ n00876a & 876.0& A & $12.58\pm0.50$ & $4.31\pm0.17$ & $5.27^{+2.39}_{-2.39}$ & $5.78\pm0.20$ & $3.31\pm0.10$\ n00877b & 877.0& B & $12.44\pm0.50$ & $4.37\pm0.17$ & $6.11^{+2.22}_{-1.67}$ & $5.54\pm0.21$ & $2.13\pm0.11$\ n00886a & 885.8& A & $11.54\pm0.23$ & $4.18\pm0.08$ & $4.88^{+1.95}_{-1.95}$ & $5.43\pm0.20$ & $2.71\pm0.12$\ n00892b & 892.8& B & $12.14\pm0.49$ & $4.54\pm0.18$ & $5.83^{+1.94}_{-1.94}$ & $5.42\pm0.23$ & $1.85\pm0.11$\ n00906b & 906.9& B & $11.44\pm0.46$ & $4.53\pm0.18$ & $5.64^{+2.82}_{-1.88}$ & $5.73\pm0.27$ & $2.22\pm0.14$\ n00921b & 921.9& B & $11.61\pm0.46$ & $4.53\pm0.18$ & $6.35^{+2.93}_{-2.93}$ & $5.57\pm0.28$ & $1.91\pm0.12$\ n00927a & 926.8& A & $11.13\pm0.22$ & $4.43\pm0.09$ & $4.62^{+1.85}_{-1.85}$ & $5.81\pm0.17$ & $2.57\pm0.14$\ n00930b & 930.8& B & $11.43\pm0.46$ & $4.01\pm0.16$ & $4.89^{+2.67}_{-1.87}$ & $5.00\pm0.34$ & $1.74\pm0.15$\ n00935b & 935.9& B & $11.92\pm0.48$ & $4.51\pm0.18$ & $5.35^{+1.89}_{-1.89}$ & $5.68\pm0.40$ & $2.85\pm0.20$\ n00936b & 936.6& B & $11.23\pm0.45$ & $4.39\pm0.18$ & $5.30^{+1.77}_{-2.66}$ & $5.30\pm0.27$ & $1.84\pm0.11$\ n00949b & 949.6& B & $12.03\pm0.48$ & $5.04\pm0.20$ & $5.20^{+1.49}_{-2.24}$ & $6.06\pm0.19$ & $2.15\pm0.09$\ n00961b & 961.6& B & $11.32\pm0.45$ & $4.90\pm0.20$ & $6.29^{+1.94}_{-1.46}$ & $5.94\pm0.31$ & $2.32\pm0.11$\ n00966b & 966.7& B & $11.60\pm0.46$ & $4.39\pm0.18$ & $4.47^{+2.24}_{-2.69}$ & $5.23\pm0.24$ & $2.09\pm0.12$\ n00981a & 980.7& A & $11.72\pm0.21$ & $4.73\pm0.08$ & $5.88^{+2.94}_{-1.47}$ & $6.34\pm0.06$ & $2.79\pm0.04$\ n00983b & 983.7& B & $11.41\pm0.46$ & $4.46\pm0.18$ & $5.88^{+2.20}_{-1.83}$ & $5.37\pm0.32$ & $2.00\pm0.14$\ n00988b & 988.6& B & $11.56\pm0.46$ & $4.30\pm0.17$ & $5.26^{+2.39}_{-2.39}$ & $5.05\pm0.27$ & $1.72\pm0.10$\ n00991b & 991.7& B & $11.35\pm0.45$ & $4.15\pm0.17$ & $6.69^{+2.09}_{-1.25}$ & $5.07\pm0.24$ & $1.92\pm0.12$\ n00994b & 994.6& B & $11.37\pm0.46$ & $4.11\pm0.16$ & $6.48^{+2.99}_{-1.50}$ & $5.02\pm0.26$ & $1.49\pm0.13$\ n01009b & 1009.6& B & $10.98\pm0.44$ & $3.76\pm0.15$ & $4.50^{+1.80}_{-2.25}$ & $4.50\pm0.30$ & $1.55\pm0.13$\ n01012b & 1012.6& B & $12.18\pm0.49$ & $3.70\pm0.15$ & $5.71^{+2.59}_{-1.55}$ & $4.57\pm0.21$ & $1.79\pm0.12$\ n01019b & 1019.6& B & $12.75\pm0.51$ & $4.20\pm0.17$ & $5.89^{+3.63}_{-2.72}$ & $5.27\pm0.33$ & $2.80\pm0.15$\ n01022b & 1022.6& B & $12.09\pm0.48$ & $4.57\pm0.18$ & $7.26^{+3.63}_{-3.63}$ & $5.52\pm0.40$ & $1.58\pm0.16$\ The Julian Date is scaled to zero point at JD = 2,450,000. In units of $\rm{10^{-15}\ ergs\ s^{-1}\ cm^{-2}\ \AA^{-1}}$. The values are obtained by Peterson et al.(2000). In units of $\rm{10^{-13}\ ergs\ s^{-1}\ cm^{-2}}$. The fluxes are obtained from Peterson et al.(2000). In units of $\rm{10^{-13}\ ergs\ s^{-1}\ cm^{-2}}$. Each flux includes the contributions of all three components. Each flux contains the contributions of a broad base and a narrow peak. $$\begin{array}{ccccccc} \hline \noalign{\smallskip} \rm{Source\ name} && \rm{FWHM}^{\mathrm{a}} && \rm{R_{Fe}\ vs.\ F_{\lambda}}^{\mathrm{b}}&& \rm{Reference}\\ &&\rm{(km\ s^{-1})}&&&&\\ \hline \hline \noalign{\smallskip} \rm{NGC\,7603}\dotfill && \rm{6560} && \rm{Negative} && 1\\ \rm{Mark\,110}\dotfill && \rm{1515} && \rm{Negative} && 2\\ \rm{NGC\,4051}\dotfill && \rm{1100} && \rm{Positive} && ....\\ \rm{Mark\,359}\dotfill && \rm{900} && \rm{Positive} && 3,4 \\ \rm{Mark 1044}\dotfill && \rm{1010} && \rm{Positive} && 3,4\\ \rm{Akn\,564}\dotfill && \rm{865} && \rm{Positive} && 3,4\\ \hline \noalign{\smallskip} \end{array}$$ Each of the FWHM measured from the mean profile of the H$\beta$ line. The relation between $\rm{R_{Fe}}$ and continuum. Positive: the relation is positive; Negative: the relation is negative. 1: Kollatschny et al. (2000); 2: Kollatschny et al. (2001); 3: Giannuzzo & Stirpe (1996); 4: Véron-Cetty et al. (2001)
Mid
[ 0.600490196078431, 30.625, 20.375 ]
Survivors Of Clergy Sexual Abuse Make History September 17, 2011 This week survivors of clergy sexual abuse in the Roman Catholic Church made history. It was the first time that victim/survivors came together from throughout the world to demand that the Vatican be held to account for the rape and molestation of countless numbers of children. Victim/Survivors from the Survivors Network of Those Abused by Priests and attorneys with the Center for Constitutional Rights formally filed a complaint with the International Criminal Court requesting that the court investigate and prosecute senior Vatican officials for crimes against humanity. Those officials include Pope Benedict XVI, Cardinal Tarcisio Bertone, Cardinal William Levada, and Cardinal Angelo Sodano. The official court filing was accompanied by over 20,000 supporting documents which show that the four named Vatican officials have overseen the widespread and systematic sexual assault of children across the planet. Attorney Pamela Spees, with the Center for Constitutional Rights noted that “national jurisdictions can’t really get their arms around this…prosecuting individual instances of child molestation or sexual assault has not gotten at the larger systemic problem here”. That larger systemic problem is the sexual violence that has been, and continues to be, perpetrated against children in the Catholic Church. This violence has been committed against children in the United States, Ireland, Australia, Belgium, Canada, England, Germany, France, Austria, Italy, Switzerland, and Mexico. This list of nations will continue to grow as survivors come forward and share their stories. In countries where the Catholic Church has a presence there are likely to be found children who have suffered from these heinous crimes. The International Criminal Court is the most appropriate venue to investigate and prosecute these crimes precisely because this is a global problem. Attorney Spees correctly stated that “in these cases all roads really do lead to Rome”. There is perhaps no Vatican official who has seen more reports of clerical sex abuse than Joseph Ratzinger, now Pope Benedict XVI. Ratzinger was in charge of the Congregation for the Doctrine of the Faith (CDF) for over two decades. As head of the CDF Ratzinger had responsibility for overseeing the handling of all sexual abuse reports in the church. One of the reports to reach Ratzinger’s desk was the case of Lawrence Murphy, a priest in Milwaukee who assaulted over 200 deaf children at St. John’s School for the Deaf. The archbishop of Milwaukee at the time, Rembert Weakland, had written two letters to Ratzinger warning him of the danger Murphy posed. Weakland received no response from Ratzinger. He did receive a reply from Bertone who instructed Weakland to begin a secret canonical trial. Murphy wrote to Ratzinger asking for leniency and Ratzinger granted his request. The canonical trial was halted and when Murphy died he was allowed to be buried in his full priestly vestments. Tarcisio Bertone is the current Vatican Secretary of State who served as Secretary of the CDF under Joseph Ratzinger. Bertone has indicated that he does not feel it is appropriate for bishops to report priests who have raped children to law enforcement officials. He has stated that “In my opinion, the demand that a bishop be obligated to contact the police in order to denounce a priest who has admitted the offense of pedophilia is unfounded…if a priest cannot confide in his bishop for fear of being denounced then it would mean there is no more liberty of conscience”. Angelo Sodano formerly served as Vatican Secretary of State under John Paul II and Pope Benedict XVI. He famously said that reports of Ratzinger’s involvement in the case of Lawrence Murphy was merely “petty gossip”. Sodano was also one of Marcial Maciel’s most ardent supporters. Maciel, the founder of the religious order the Legionaries of Christ, was a notorious pedophile who even assaulted his own children. Sodano advised Ratzinger not to prosecute Maciel for his crimes of sexual violence against children. William Levada is the current prefect of the CDF. Levada, in a court deposition in 2006, admitted that he had failed to report cases of child sexual assault to law enforcement officials. In an interview with PBS Levada said that the sexual abuse of children in the Catholic Church “is a crisis if you will that I think caught most of us by surprise”. It was in fact hardly a surprise to Levada. In 1985 Levada met with Fr Tom Doyle, a Vatican canon lawyer, Rev. Michael Peterson, a psychiatrist, and Raymond Mouton, a criminal lawyer who defended pedophile priest Gilbert Gauthe. The three men presented Levada with an extensive 92 page report detailing the sexual abuse crisis in the church that was on the verge of exploding. Levada was one of the first U.S. bishops to be briefed on the magnitude of the abuse that was occurring. As head of the CDF Levada is now in charge of all sex abuse reports that reach the Vatican. Jeffrey Lena, the Vatican’s attorney in the United States has called the complaint filed at the International Criminal Court by victim/survivors a “ludicrous publicity stunt”. The court filing has generated considerable publicity, but it is disingenuous to refer to it as a stunt. The victim/survivors who filed this complaint at The Hague are sending a message to the Vatican and to the world. The message is loud and it is clear, those who have suffered from these terrible crimes will not allow another child, and another generation of children to experience the sexual violence that they themselves have endured. The time has come to hold the Vatican and its officials accountable for their actions. The filing this week of the criminal complaint at the International Criminal Court was historic indeed.
Mid
[ 0.641686182669789, 34.25, 19.125 ]
<?xml version="1.0" encoding="utf-8"?> <!-- Copyright (C) 2011 The Android Open Source Project Licensed under the Apache License, Version 2.0 (the "License"); you may not use this file except in compliance with the License. You may obtain a copy of the License at http://www.apache.org/licenses/LICENSE-2.0 Unless required by applicable law or agreed to in writing, software distributed under the License is distributed on an "AS IS" BASIS, WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. See the License for the specific language governing permissions and limitations under the License. --> <!-- BEGIN_INCLUDE(all) --> <TextView xmlns:android="http://schemas.android.com/apk/res/android" android:layout_width="match_parent" android:layout_height="wrap_content" android:textSize="14sp" android:textColor="#01511a" android:padding="5dp" /> <!-- END_INCLUDE(all) -->
Low
[ 0.461697722567287, 27.875, 32.5 ]
Who better to update the House of Commons on the progress of the Brexit negotiations following the informal EU summit in Salzburg than someone who wasn’t there? Not that ignorance has ever been a problem for Dominic Raab. The Brexit secretary is blessed with the supreme self-confidence of someone who isn’t aware of how little he actually knows so is always happy to listen to the sound of his own voice. In fact, there’s little in life he prefers. The negotiations were going totally to plan, Raab said. Apart from in one or two key areas that were proving trickier than expected. But all would be well provided we held our nerve and kept our less than 20-20 vision focus. The UK had put forward serious and credible proposals that had been roundly rejected by the EU and a majority of MPs and it was time for the EU to match our ambition and wishful thinking. And if the worst came to the worst, we’d crash out with a no deal because bankrupting the country was infinitely better than not bankrupting it. Keir Starmer has always responded to Raab with something approaching pity. The pity one lawyer might give to another whose job it is to defend the indefensible. Since the party conference break, the shadow Brexit secretary has added exasperation to his armoury. Was Raab aware there were only weeks left to agree a deal and that so far the government was no nearer to resolving the Northern Ireland backstop or what kind of future trading arrangements Britain would have with the EU? So could he please have some straight answers? He could. The straight answer was that there were no straight answers. Getting a deal by October had only ever been an aim. When he had said a deal would be reached by the October summit, he had never said which October he was talking about. So there. And he had never committed to signing up to a customs union as part of a Northern Ireland backstop. All he had promised was that Northern Ireland would remain in a temporary customs arrangement. Which was something entirely different. If Raab were ever to listen to a recording of himself he would die of embarrassment. On the plus side, Raab has a way to go before he is as deranged as some of the Tory Brexiters. Iain Duncan Smith demanded to know why the European Research Group’s paper on Northern Ireland that had been dismissed as unworkable by anyone who knew anything Northern Ireland wasn’t the government’s official position on Northern Ireland. John Redwood channelled his inner alien to insist that the Brexit dividend would pay for everything if it was invested overseas. Or on another planet. Steve Baker was just Steve Baker. The stupid person’s Ayn Rand. Which is saying something. All the serious incoming flak came from the Labour benches. Hilary Benn wondered how Raab could claim the backstop could be time limited when the whole deal was predicated on the fact it would have to remain in place until such time a permanent solution was reached. Oh, said a bewildered Raab. Couldn’t it somehow be both temporary and infinite? Like the universe. You just had to get used to the idea of a 10-dimensional space-time continuum. Or something. Raab also had no answer to whether he was ruling in or out applying common external tariffs. He sort of was and he sort of wasn’t. “It would give us the advantages of those things we want to take advantage of,” he explained. By now it was even beginning to dawn on Raab – no small thing for a man of his intellectual self-regard – that he was being made to sound like a simpleton and he responded by getting angry. A vein in his temple started throbbing and his answers became increasingly snappy and tetchy. Labour carried on applying the pressure. Just how little detail did Raab imagine he would have to give for the government not to commit to a blind Brexit? Raab didn’t rightly know, but felt sure it was best to keep things definitely vague. As so often we were back to a variation of Schrodinger’s Brexit, where everything could simultaneously mean something and nothing. If we are slowly edging towards a Brexit deal, it will be in spite of rather than because of the Brexit secretary’s best efforts. An achievement of sorts.
Low
[ 0.5204545454545451, 28.625, 26.375 ]
The familial occurrence of agoraphobia. Agoraphobia is believed to run in families, but this belief is not well supported by the literature. Data were gathered on the risk of agoraphobia in parents and siblings of 60 agoraphobic probands; 12 1/2% of the relatives were reported to have or have had agoraphobia. This risk is significantly greater than estimates of the population incidence, and requires explanation. The details of the pedigrees do not directly support simple genetic models while investigations into environmental factors in agoraphobia by other workers have been inconclusive. As a putative case has been established for the familial occurrence of agoraphobia, further work is required to shed light on whether genetic or cultural factors are paramount.
Mid
[ 0.608315098468271, 34.75, 22.375 ]
Every parent wants their child to be happy and healthy, and healthy children are one of the keys to our future. Dental health is one of the key aspects of keeping children healthy. And when it comes to dental health, the formative years in a child’s life can be critically important in supporting a high level of oral hygiene and establishing good oral care habits. This is why it is so important that the Child Dental Benefits Schedule (CDBS), which protects some 3 million Australian Children, has been extended for 2017. And here at United Smiles, we are happy to support you and your children, by offering services under the CDBS! There are some changes to the program, so we invite you to read the information below, then contact us to build a partnership for our children’s oral health!
High
[ 0.6618004866180041, 34, 17.375 ]
""" Copyright 2018 The Matrix Authors This file is part of the Matrix library. The Matrix library is free software: you can redistribute it and/or modify it under the terms of the GNU Lesser General Public License as published by the Free Software Foundation, either version 3 of the License, or (at your option) any later version. The Matrix library is distributed in the hope that it will be useful, but WITHOUT ANY WARRANTY; without even the implied warranty of MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU Lesser General Public License for more details. You should have received a copy of the GNU Lesser General Public License along with the Matrix library. If not, see <http://www.gnu.org/licenses/>. """ #!/usr/bin/env python # -*- coding: utf-8 -*- # File: predict.py import tensorflow as tf from ..utils import logger from ..tfutils.tower import TowerContext from .training import GraphBuilder __all__ = ['SimplePredictBuilder'] class SimplePredictBuilder(GraphBuilder): """ Single-tower predictor. """ def __init__(self, ns_name='', vs_name='', device=0): """ Args: ns_name (str): vs_name (str): device (int): """ self._ns_name = ns_name self._vs_name = vs_name device = '/gpu:{}'.format(device) if device >= 0 else '/cpu:0' self._device = device def build(self, input, tower_fn): """ Args: input (InputSource): must have been setup tower_fn ( [tf.Tensors] ->): callable that takes input tensors. Returns: The return value of tower_fn called under the proper context. """ assert input.setup_done() logger.info("Building predictor tower '{}' on device {} ...".format( self._ns_name, self._device)) with tf.device(self._device), \ TowerContext( self._ns_name, is_training=False, vs_name=self._vs_name): inputs = input.get_input_tensors() assert isinstance(inputs, (list, tuple)), inputs return tower_fn(*inputs)
Mid
[ 0.557446808510638, 32.75, 26 ]
‘Charity’ banners pop up in London for Nawaz’s treatment LONDON: Several charity posters and pamphlets with a picture of Pakistan Muslim League-Nawaz (PML-N) leader Nawaz Sharif have emerged in different parts of London, requesting donations for his treatment, ARY News reported on Wednesday.  The posters carrying a message for Nawaz’s treatment read that “Please donate your ‘Sadqa and ‘Zakat’ (charity) to save your’s Qaumi (National) hero.” The banners have appeared in the East London area. Read More: Ali Zaidi wants Francis Ford Coppola to make a movie on Sharif family It must be noted that former prime minister Nawaz Sharif is in London nowadays for his medical treatment. Earlier today, PML-President Shehbaz Sharif, while talking to media said that medical treatment of the former Prime Minister and PML-N supremo Nawaz Sharif will begin after his complete medical examination. “Nawaz has undergone some medical tests today [Wednesday] with others more to follow,” he said while briefing media over the ongoing treatment of the former premier outside the Guy’s Hospital, where Nawaz is receiving the treatment. Shehbaz prayed for the health of the three-time prime minister of the country and said that he was an asset of the country. Comments comments
Low
[ 0.535496957403651, 33, 28.625 ]
ROCKFORD -- The 2016-17 Rockford boys varsity swimming and diving team was recently honored as the top academic swim team in the state of Michigan in Division 1. The Ram swimmers earned this honor by having the highest composite grade-point average as a team. Team rankings are based upon the collective academic performance of the entire varsity team, not just its top few individuals. Because each team’s ranking is calculated using the average GPA of the entire team, every member of the team must perform well in the classroom. The top 10 teams, ranked by GPA, receive academic all-state team honors. In addition to being the #1 team in Division 1, Rockford had the second-highest GPA out of the 47 boys swim teams across all three divisions, just a few hundredths behind Okemos, the top academic team in Division 2. Rockford’s aquatic teams have a long history of academic excellence, having also racked up numerous all-state and All-American academic honors in water polo. The Rams will be looking to continue this legacy when this year’s large junior class returns to compete in both swimming and water polo next year.
High
[ 0.694550063371356, 34.25, 15.0625 ]
Doug Mataconis · · 3 comments Since the protests in Egypt started, al-Jazeera has been one of the few broadcast companies able to broadcast the truth of what’s been happening on the streets in Cairo and other Egyptian cities. Now, the government is trying to put that to an end: The Egyptian authorities are revoking the Al Jazeera Network’s licence to broadcast from the country, and will be shutting down its bureau office in Cairo, state television has said. “The information minister [Anas al-Fikki] ordered … suspension of operations of Al Jazeera, cancelling of its licences and withdrawing accreditation to all its staff as of today,” a statement on the official Mena news agency said on Sunday. In a statement, Al Jazeera said it strongly denounces and condemns the closure of its bureau in Cairo by the Egyptian government. The network received notification from the Egyptian authorities on Sunday morning. “Al Jazeera has received widespread global acclaim for their coverage on the ground across the length and breadth of Egypt,” the statement said. (…) “Al Jazeera sees this as an act designed to stifle and repress the freedom of reporting by the network and its journalists,” the statement said. “In this time of deep turmoil and unrest in Egyptian society it is imperative that voices from all sides be heard; the closing of our bureau by the Egyptian government is aimed at censoring and silencing the voices of the Egyptian people. “Al Jazeera assures its audiences in Egypt and across the world that it will continue its in-depth and comprehensive reporting on the events unfolding in Egypt.
Mid
[ 0.5975308641975301, 30.25, 20.375 ]
Q: How to use string replace in a jquery for loop? I am trying to strip out the domain from the url - but not sure exactly how. This is what I'm attempting but as you can see console.log doesnt show anything on the second try. function show_records(data) { let html = ""; $.each(data, function(k, v){ console.log(v.url) // returns full urls eg. https://google.com v.url = v.url.replace(/https?:\/\/[^\/]+/i, ""); console.log(v.url) // returns nothing html += `<input type="radio" name="${v.url}" /> ${ v.url }<br />` }) html+='</div></div>' $('.editviewm').append(html); } What am I doing wrong here? A: As @Niet the Dark Absol Suggested, you do not need to do more codes just to achieve the hostname. function show_records(data) { let html = ""; $.each(data, function(k, v){ var url = new URL(v.url); console.log(url.hostname); html += `<input type="radio" name="${url.hostname}" /> ${ url.hostname }<br />` }) html+='</div></div>' $('.editviewm').append(html); }
Mid
[ 0.6084243369734791, 24.375, 15.6875 ]
[Cite as Patton v. Solon City School Dist., 2017-Ohio-9415.] DAVID V. PATTON Case No. 2017-00570-PQ Requester Special Master Jeffery W. Clark v. REPORT AND RECOMMENDATION SOLON CITY SCHOOL DISTRICT Respondent {¶1} On November 8, 2016, requester David Patton made a public records request to the Solon Board of Education seeking “complete copies of: (i) All of the surveillance videos taken aboard Solon City School’s bus number 36’s morning and afternoon routes to and from Roxbury Elementary School from August 16, 2016 to October 21, 2016, inclusive.” (Complaint, Exhibit A.) On November 11, 2016, Treasurer Tim Pickins responded that all responsive videos had been properly disposed of in accordance with the Solon City School District’s (“Solon SD”) records retention schedules, except for video from October 21, 2016. (Id., Exhibit B.) Pickens advised that the remaining video was being withheld from Patton’s request as excepted under the Family Education Rights and Privacy Act (FERPA) and R.C. 3319.321. {¶2} On June 27, 2017, Patton filed a complaint under R.C. 2743.75 alleging denial of timely access to public records in violation of R.C. 149.43(B) by respondent Solon SD. The case proceeded to mediation, and on September 27, 2017, the court was notified that the case was not fully resolved. On October 11, 2017, Solon SD filed its answer and motion to dismiss (Response). On October 26, 2017, Solon SD filed an unredacted copy of the withheld video under seal, and a copy of the video redacted to disclose only Patton’s son. On November 3, 2017, Patton filed a reply to Solon SD’s response. On November 21, 2017, Solon SD filed a sur-reply. Case No. 2017-00570-PQ -2- REPORT AND RECOMMENDATION {¶3} The remedy of production of records is available under R.C. 2743.75 if the court of claims determines that a public office denied an aggrieved person access to requested public records in violation of R.C. 149.43(B). R.C. 149.43(B)(1) requires a public office to make copies of public records available to any person upon request, and within a reasonable period of time. “[O]ne of the salutary purposes of the Public Records Law is to ensure accountability of government to those being governed.” State ex rel. Strothers v. Wertheim, 80 Ohio St.3d 155, 158, 684 N.E.2d 1239 (1997). Therefore, R.C. 149.43 must be construed “liberally in favor of broad access, and any doubt is resolved in favor of disclosure of public records.” State ex rel. Cincinnati Enquirer v. Hamilton Cty., 75 Ohio St.3d 374, 376, 662 N.E.2d 334 (1996). {¶4} R.C. 2743.75(F)(1) states that public records claims filed thereunder are to be determined through “the ordinary application of statutory law and case law.” Case law regarding the alternative statutory remedy of a mandamus action1 provides that a relator must establish by “clear and convincing evidence” that they are entitled to relief. State ex rel. Miller v. Ohio State Hwy. Patrol, 136 Ohio St.3d 350, 2013-Ohio-3720, ¶ 14. Therefore, the merits of this claim shall be determined under the standard of clear and convincing evidence, i.e., “that measure or degree of proof which is more than a mere ‘preponderance of the evidence,’ but not to the extent of such certainty as is required ‘beyond a reasonable doubt’ in criminal cases, and which will produce in the mind of the trier of facts a firm belief or conviction as to the facts sought to be established.” Cross v. Ledford, 161 Ohio St. 469, 120 N.E.2d 118 (1954), paragraph three of the syllabus. See Hurt v. Liberty Twp., 5th Dist. Delaware No. 17CAI050031, 2017-Ohio-7820, ¶ 27-30. Motion to Dismiss {¶5} Solon SD moves to dismiss the complaint on the grounds that the withheld portions of the video have been properly redacted pursuant to R.C. 149.43(A)(1)(v), and 1 Formerly R.C. 149.43(C)(1), recodified in 2016 as R.C. 149.43(C)(1)(b), 2016 Sub. S.B. No. 321. Case No. 2017-00570-PQ -3- REPORT AND RECOMMENDATION specifically, that 1) federal privacy law prohibits the district from disclosing the requested video, 2) redacting the video to obscure only children’s faces, as requested, is not enough to comply with FERPA regulations, and 3) state law likewise bars the district from providing the video as requested. In construing a motion to dismiss pursuant to Civ.R. 12(B)(6), the court must presume that all factual allegations of the complaint are true and make all reasonable inferences in favor of the non-moving party. Mitchell v. Lawson Milk Co., 40 Ohio St.3d 190, 192, 532 N.E.2d 753 (1988). Then, before the court may dismiss the complaint, it must appear beyond doubt that plaintiff can prove no set of facts entitling him to recovery. O’Brien v. Univ. Community Tenants Union, Inc., 42 Ohio St.2d 242, 245, 327 N.E.2d 753 (1975). The unsupported conclusions of a complaint are, however, not admitted and are insufficient to withstand a motion to dismiss. Mitchell at 193. Suggestion of Mootness {¶6} In an action to enforce R.C. 149.43(B), a public office may produce the requested records prior to the court’s decision, and thereby render the claim for production of records moot. State ex rel. Striker v. Smith, 129 Ohio St.3d 168, 2011- Ohio-2878, 950 N.E.2d 952, ¶ 18-22. A court considering a claim of mootness must first determine what records were requested, and then whether all responsive records were provided. Solon SD allowed Patton to inspect the video at length on November 2, 2016 (Complaint, Exhibit C; Reply, Exhibit B at ¶ 9-10.), and later provided him a copy from which all content had been redacted other than Patton’s son. However, Patton’s public records request was for a copy of the video, rather than inspection, and he disputes that the copy he was provided was properly redacted. I therefore recommend that the claim for a copy of the video be DISMISSED as moot only as to the unredacted portions provided to Patton. The court should proceed to determine on the merits whether the remaining portions of the video were withheld in violation of R.C. 149.43(B). Case No. 2017-00570-PQ -4- REPORT AND RECOMMENDATION The Video is a “Public Record” {¶7} Solon SD makes school bus video recordings for security and other purposes, and retained this video when it became part of its disciplinary process. (Sur- reply at 4.) On review, the unredacted video shows multiple students involved in physical and verbal altercation(s), at various times and in several ways. Throughout the video, approximately half of the filmed area captures images other than students, primarily of the floor, seat backs, and windows. The floor and seat backs are static features, other than as traversed by students. Occasional cars and street features can be seen through the windows. The unredacted video contains audio that cuts out at twelve minutes and 18 seconds into playback.2 Respondent asserts that only a portion of the area filmed by the video is a “record” of the district because it “used this portion of the video in making disciplinary decisions for the students involved in the fight,” Id. Respondent does not identify what “this portion” consisted of. {¶8} R.C. 149.011(G) provides a three-part definition of “records,” as used in Revised Code Chapter 149: “Records” includes any document, device, or item, regardless of physical form or characteristic, including an electronic record as defined in section 1306.01 of the Revised Code, created or received by or coming under the jurisdiction of any public office of the state or its political subdivisions, which serves to document the organization, functions, policies, decisions, procedures, operations, or other activities of the office. The school bus video readily meets the first two elements of the definition, as an electronic document, created by Solon SD. Regarding the third element, “any record used by a court to render a decision is a record subject to R.C. 149.43.” (Citations omitted.) State ex rel. WBNS TV, Inc. v. Dues, 101 Ohio St.3d 406, 2004-Ohio-1497, 805 N.E.2d 1116, ¶ 27. The same is true of any record used by a school district to 2 Audio in the redacted video cuts out at ten minutes and 22 seconds into playback. The redacted video is shorter than 12 minutes overall. No specific explanation of this discrepancy is provided by respondent, but any release ordered by the court is based on the longer, unredacted video. Both videos submitted to the court appear to be extracts from a longer recording. Case No. 2017-00570-PQ -5- REPORT AND RECOMMENDATION render a decision. State ex rel. Bowman v. Jackson City Sch. Dist., 4th Dist. Jackson No. 10CA3, 2011-Ohio-2228, ¶ 16-17. Solon SD affirms that “the video in question here is undoubtedly an educational record for the students involved in the altercation because the District maintained it for disciplinary purposes” (Sur-reply at 2, 4; Response at 5.), but asserts broadly that “[t]he rest of the video – footage that depicts empty seats, windshields [sic], and so on – does not document the District’s decisions, policies, activities, etc., and is not a public record at all.” (Sur-reply at 4.) Solon SD argues that it may withhold “the rest of the video” as non-record material not subject to the Public Records Act. {¶9} The Public Records Act is construed liberally in favor of broad access, and any doubt is resolved in favor of disclosure. State ex rel. Cincinnati Enquirer v. Pike Cty. Coroner's Office, Slip Op. at 2017-Ohio-8988, ¶ 15. Further, the court has a duty to avoid construction of a statute that would circumvent the evident purpose of the enactment, or lead to unreasonable or absurd results. R.C. 1.47(C); R.C. 1.49(E); Toledo Blade Co. v. Seneca Cty. Bd. of Comm’rs., 120 Ohio St.3d 372, 2008-Ohio- 6253, 899 N.E.2d 961, ¶ 31; State ex rel. Cincinnati Post v. City of Cincinnati, 76 Ohio St.3d 540, 543, 668 N.E.2d 903 (1996). Whether or not the availability of an empty seat or the movement of other students ultimately figured in the district’s disciplinary decision, it is instructive to ask whether the district would have felt comfortable having a video editor black out the windows, seat backs, floor, empty seat(s), uninvolved students – all context other than free-floating images of the “involved” students on a redacted-black background, before it reviewed the video for disciplinary purposes. A construction of R.C. 149.011(G) and R.C. 149.43 that allows public offices to prune away every space, word, or image that it claims did not figure directly in a decision to which the record as a whole relates would unreasonably limit the legislative intent of full disclosure of public records. Case No. 2017-00570-PQ -6- REPORT AND RECOMMENDATION {¶10} Public offices may redact demonstrably personal information kept only for administrative convenience when releasing a larger record in which that information exists. State ex rel. Dispatch Printing Co. v. Johnson, 106 Ohio St.3d 160, 2005-Ohio- 4384, 833 N.E.2d 274, ¶ 25-29; State ex rel. McCleary v. Roberts, 88 Ohio St.3d 365, 369, 2000-Ohio-345, 725 N.E.2d 1144; State ex rel. Fant v. Enright, 66 Ohio St.3d 186, 610 N.E.2d 997 (1993). However, the court is aware of no case holding that a public office may redact the empty margins of a letter, borders of a table, white space between paragraphs, or pagination numbers simply by claiming that it “did not actually utilize” such incidental images, blanks, and figures in conducting its activities. See State ex rel. Mahajan v. State Med. Bd. of Ohio, 127 Ohio St. 3d 497, 2010-Ohio-5995, 940 N.E.2d 1280, ¶ 39 (“the redacted page numbers for the deposition quotations are not supported by any exemption from disclosure.”) Nor is the court aware of any case authority approving a public office cropping photographs or editing video recordings to obscure all incidental content (or absence of content) as “non-record.” While there is no reason that the holding in Dispatch may not be applied to record media other than paper, Solon SD does not provide clear and convincing evidence that Dispatch may be applied to obscure incidental images behind, around and between the several students involved in the altercation(s). {¶11} In State ex rel. Cincinnati Enquirer v. Ohio Dept. of Pub. Safety, 148 Ohio St.3d 433, 2016-Ohio-7987, 71 N.E.3d 258, a requester sought trooper cruiser videos. In addition to images visible through the windows of a pursuit and arrest, the videos captured long stretches of incidental images such as passing traffic, a concrete barrier, and an empty rear seat in one of the cruisers. Id. at ¶¶ 17-18, 21. The Court found the videos qualified as “records” of the Highway Patrol, including those not directly used for investigation or prosecution, and that any portion not subject to an exception must be released. Id. at ¶¶ 33-34, 47-50. See also State ex rel. Rhodes v. City of Chillicothe, 4th Dist. Ross No. 12CA3333, 2013-Ohio-1858, ¶ 34-36 (images considered but rejected in Case No. 2017-00570-PQ -7- REPORT AND RECOMMENDATION decision to issue citations were still “records” of the office.) Here, as in Enquirer, the bus videos are routinely made, the camera captures a field of view set by the agency, and there are multiple activities that the recording may potentially document, e.g., bus crashes, parent/driver altercations, law enforcement activity, etc., in addition to student discipline. (Sur-reply at p. 1-2.) I conclude that the entire school bus video kept by Solon SD qualifies as a “record.” “‘Public record’ means records kept by any public office, including * * * school district units.” R.C. 149.43(A)(1). As a record “kept by” Solon SD at the time of the request, I conclude that the video is a public record, subject to any applicable exceptions. Application of Claimed Exceptions {¶12} R.C. 149.43(A)(1) sets forth specific exceptions from the definition of “public record,” as well as a catch-all exception for, “[r]ecords the release of which is prohibited by state or federal law.” R.C. 149.43(A)(1)(v). The public office bears the burden of proof to establish the applicability of any exception: Exceptions to disclosure under the Public Records Act, R.C. 149.43, are strictly construed against the public-records custodian, and the custodian has the burden to establish the applicability of an exception. * * * A custodian does not meet this burden if it has not proven that the requested records fall squarely within the exception. State ex rel. Cincinnati Enquirer v. Jones-Kelley, 118 Ohio St.3d 81, 2008-Ohio-1770, 886 N.E.2d 206, ¶ 10; accord State ex rel. Thomas v. Ohio State Univ., 71 Ohio St.3d 245, 247, 643 N.E.2d 126 (1994). Where a public office claims an exception based on risks that are not evident within the records themselves, the office must provide more than conclusory statements in affidavits to support that claim. State ex rel. Besser v. Ohio State Univ., 89 Ohio St.3d 396, 400-404, 732 N.E.2d 373 (2000). Solon SD asserts that specified portions of the withheld records are subject to both the Family Education Rights and Privacy Act (FERPA), and R.C. 3319.321. Case No. 2017-00570-PQ -8- REPORT AND RECOMMENDATION Family Education Rights and Privacy Act (FERPA) FERPA provides that [n]o funds shall be made available under any applicable program to any educational agency or institution which has a policy or practice of permitting the release of education records (or personally identifiable information contained therein other than directory information, as defined in paragraph (5) of subsection (a) of this section) of students without the written consent of their parents to any individual, agency, or organization. 20 U.S.C. 1232g(b)(1). See generally State ex rel. ESPN, Inc. v. Ohio State Univ., 132 Ohio St.3d 212, 2012-Ohio-2690, 970 N.E.2d 939, ¶ 18-35. This language is considered a prohibition that constitutes an exception to public records release of covered information, under R.C. 149.43(A)(1)(v). Id. at ¶ 24. Student disciplinary records are “education records” subject to FERPA. Id. at ¶ 28-31. Solon SD states that the images of the children involved in an altercation on the bus have been used and maintained as disciplinary records. (Sur-reply at 2, 4.) However, Solon SD concedes that the incidental footage of students in the background is not an education record for those children.3 (Id. at 2; citing Exhibit A.) Thus, only the images of children involved in the altercation on the bus (except for Patton’s son) are subject to withholding pursuant to FERPA, and I conclude that these images may be redacted. {¶13} FERPA contemplates the display of certain protected records to the parents of children in the course of disciplinary proceedings. Such statutory display is not a waiver of the statutory exception by Solon SD, and in any case only the parents of the other children involved may give consent to further release, not the school district. The duty to withhold is on the school, but the right of confidentiality belongs to each student. Thus, the portions of the video protected under FERPA may not be disclosed 3 The entire video was determined to be a “record” in the preceding section. Application of FERPA exceptions requires the separate determination of what type of record may be withheld from within the larger video record, i.e., an education record. Case No. 2017-00570-PQ -9- REPORT AND RECOMMENDATION under the Public Records Act. State ex rel. Wallace v. State Med. Bd., 89 Ohio St.3d 431, 434-436, 732 N.E.2d 960 (2000). R.C. 3319.321 Similar to FERPA, Ohio’s R.C. 3319.321(B) provides: No person shall release, or permit access to, personally identifiable information other than directory information concerning any student attending a public school, for purposes other than those identified in division (C), (E), (G), or (H) of this section, without the written consent of the parent, guardian, or custodian of each such student who is less than eighteen years of age, or without the written consent of each such student who is eighteen years of age or older. This language prohibits release of student disciplinary records, Schuckert v. Bd. of Ed., 9th Dist. Summit No. 12162, 1985 Ohio App. LEXIS 9170, *5-6 (October 30, 1985). Unlike FERPA, however, the statute is not limited to “education records,” but broadly prohibits release of any personally identifiable information other than directory information concerning any student attending a public school. “Personally identifiable information” is not defined in the Ohio Revised Code for purposes of Chapter 3319, and the court must therefore refer to the related FERPA definition at 34 C.F.R. § 99.3: Personally Identifiable Information The term includes, but is not limited to - (a) The student’s name; (b) The name of the student’s parent or other family members; (c) The address of the student or student’s family; (d) A personal identifier, such as the student’s social security number, student number, or biometric record; (e) Other indirect identifiers, such as the student’s date of birth, place of birth, and mother’s maiden name; (f) Other information that, alone or in combination, is linked or linkable to a specific student that would allow a reasonable person in the school community, who does not have personal knowledge of the relevant circumstances, to identify the student with reasonable certainty; or Case No. 2017-00570-PQ -10- REPORT AND RECOMMENDATION (g) Information requested by a person who the educational agency or institution reasonably believes knows the identity of the student to whom the education record relates. The video does not contain any of the information listed in subsections (a) through (e). However, Solon SD provides clear and convincing evidence that Patton became aware of the identity of all the students involved in the incident prior to making his public records request. (Response at p. 3-4, 6-8; Exhibit 1, Regano Aff. at ¶ 10; Exhibit 1A; Patton Aff. at ¶ 7-10.) Pursuant to R.C. 3319.321(B), I conclude that Solon SD is required to withhold all “personally identifiable information,” as defined in C.F.R. § 99.3 subsections (f) and (g), of all students in the bus video. Extent of Redaction {¶14} Public records may be redacted only to withhold exempt information, and the public office “shall make available all of the information that is not exempt.” R.C. 149.43(B)(1); accord ESPN at ¶ 33-35. Patton has offered that “the District could simply blur or otherwise obscure the faces and any other identifying student information in the school bus surveillance video. The District can even charge me for the costs of this redaction. See R.C. §149.43(B)(6).” (Complaint, ¶ 4.) Patton expresses specific interest in video of an “empty seat across the aisle.” (Reply at 7; Complaint, Exhibit C, p. 1), and “the windshield [sic - only side windows are visible].” Id. {¶15} As the District observes, it is in the best position to evaluate what personal characteristics and other information in the video would disclose a student’s identity. (Response at 6.) The unredacted video captures student faces, hair, body shapes, clothing, backpacks, phones, voices,4 and actions during the altercation, and other items that may serve to identify a student to a parent who is already familiar with that information and those characteristics. I find that at the discretion of Solon SD, any such items may be obscured, including the entire student where protected information is 4 Although personally identifiable audio information would be subject to redaction on the same bases as video images, the entire audio track appears to have been released to Patton with the redacted video. Case No. 2017-00570-PQ -11- REPORT AND RECOMMENDATION inextricably intertwined. Non-personally identifying information, such as the side windows, the intermittent appearance of unoccupied seats, seat backs, and the floor, should not be obscured unless inextricably intertwined with student identity or actions.5 Timeliness {¶16} Solon SD did not provide an initial, redacted version of the requested video until more than seven months after Patton’s November 8, 2016 request, and has not provided any explanation for the delay in its response. I find that Solon SD failed to comply with its obligation under R.C. 149.43(B)(1) to provide copies of the requested records “within a reasonable period of time.” Inquiry as to Purpose of Public Records Request {¶17} Patton asserts that during a meeting on May 31, 2017, an official of Solon SD asked him, “Why do you want the video?” (Complaint at ¶ 8; Reply, Exhibit B, ¶ 15- 19.) Patton claims that this question constituted a violation of R.C. 149.43(B). The referenced prohibition is found in R.C. 149.43(B)(4): (4) Unless specifically required or authorized by state or federal law or in accordance with division (B) of this section, no public office or person responsible for public records may limit or condition the availability of public records by requiring disclosure of the requester’s identity or the intended use of the requested public record. Any requirement that the requester disclose the requester’s identity or the intended use of the requested public record constitutes a denial of the request. (Emphasis added.) The official’s inquiry as to purpose was posed six months after Solon SD denied Patton’s initial request, and four months after he had reiterated the request and received a second denial. The statutory language does not creat e a per se violation for inquiring as to intended use, but instead forbids an office to “limit or condition the availability of public records by requiring disclosure of * * * the intended use of the requested public record.” Id. The fact that the office had twice denied the 5 Other than the required redaction of personally identifying student information, the parties remain at liberty to negotiate the editing in any way that reduces time for respondent, and costs to the requester. Case No. 2017-00570-PQ -12- REPORT AND RECOMMENDATION request in writing before an official posed the question during a later discussion constitutes persuasive circumstantial evidence that Solon SD did not limit or condition the availability of the records based on disclosure of Patton’s purpose. This conclusion is consistent with the fact that the explanation and legal authorities provided in the written denials, if applicable, prohibited Solon SD from releasing the subject records even if it were so inclined. I conclude that Patton fails to show by clear and convincing evidence that Solon SD’s actions on May 31, 2017 constituted a violation of R.C. 149.43(B)(4). {¶18} R.C. 149.43(B)(5) has no application here, as the provision applies only to situations where a public office believes that knowing the intended use would enhance the ability of the public office to “identify, locate, or deliver the records sought.” Here, both parties were already aware of the identity and location of the requested record, and Solon had twice refused to deliver it. As with (B)(4), this statute does not create a per se violation for asking the question, but instead frames a limited option for a public office to make a useful inquiry where that inquiry would otherwise violate (B)(4). Conclusion {¶19} Upon consideration of the pleadings, attachments, and responsive records filed under seal, I recommend that the court find that Solon SD’s motion to dismiss the claim as moot be GRANTED as to the portion released to Patton prior to this report and recommendation. I further recommend that the court find that the entirety of the bus surveillance video is a record of Solon SD, but that Solon SD is entitled to redact those portions of the video prohibited from release under FERPA and R.C. 3319.321, as detailed above under Extent of Redaction. {¶20} I recommend that the court issue an order GRANTING Patton’s claim for relief for production of records as detailed above. I further recommend that the court order that Patton is entitled to recover from Solon SD the costs associated with this action, including the twenty-five dollar filing fee. R.C. 2743.75(F)(3)(b). Case No. 2017-00570-PQ -13- REPORT AND RECOMMENDATION {¶21} Pursuant to R.C. 2743.75(F)(2), either party may file a written objection with the clerk of the Court of Claims of Ohio within seven (7) business days after receiving this report and recommendation. Any objection shall be specific and state with particularity all grounds for the objection. A party shall not assign as error on appeal the court’s adoption of any factual findings or legal conclusions in this report and recommendation unless a timely objection was filed thereto. R.C. 2743.75(G)(1). JEFFERY W. CLARK Special Master cc: David V. Patton Kathryn I. Perrico 33595 Bainbridge Road Miriam Pearlmutter Suite 200A 1301 East Ninth Street Solon, Ohio 44139 Suite 3500 Cleveland, Ohio 44114-1821 Filed December 27, 2017 Sent to S.C. Reporter 1/11/18
Mid
[ 0.611111111111111, 35.75, 22.75 ]