text
stringlengths
8
5.74M
label
stringclasses
3 values
educational_prob
sequencelengths
3
3
Q: BlackBerry: Programmatic "Add to contacts" If I type a phone number into the phone application on my Blackberry (5.0.0) I can hit the menu button, and one of the options is "Add to contacts" which will bring up the add contact screen, with the phone number already populated. I would like to do the same thing in my app - bring up the 'add to contacts' screen and pre-fill it with a particular phone number. Is this possible on the BlackBerry 5.0 OS? A: While browsing for more information on BlackBerry contacts, I came across this support forum question, which answers my question indirectly. Posted here for anyone else in a similar situation: http://supportforums.blackberry.com/t5/Java-Development/Problem-adding-contact-to-phone/m-p/341728/highlight/true#M62692 try { ContactList contacts = null; try { contacts = (ContactList) PIM.getInstance().openPIMList(PIM.CONTACT_LIST, PIM.READ_WRITE); } catch (PIMException e) { // An error occurred return; } Contact contact = contacts.createContact(); String[] name = new String[ contacts.stringArraySize( Contact.NAME ) ]; name[Contact.NAME_GIVEN] = "Kate"; name[Contact.NAME_FAMILY] = "Turner"; contact.addStringArray(Contact.NAME, Contact.ATTR_NONE, name); AddressBookArguments entry = new AddressBookArguments(AddressBookArguments.ARG_NEW, contact); Invoke.invokeApplication(Invoke.APP_TYPE_ADDRESSBOOK, entry); } catch (Throwable t) { }
High
[ 0.6778042959427201, 35.5, 16.875 ]
How To Have The Perfect Wedding Day TIP! Finding your perfect wedding dress might be an expensive activity. When shopping for your dress, consider dresses that may not be categorized as a wedding dress. It is a great thing when people get married. Weddings are naturally romantic events, but they should also be artistic, aesthetic, and uplifting. A perfectly planned and executed wedding with no unwelcome surprises takes a lot of thought and care to plan. The tips contained within this article will be able to assist you. TIP! Purchasing a wedding gown online can save a lot of money. If you decide to go this route, purchase the dress early so you will have time to get it altered. The pictures you will have taken on your wedding day are meant to be a memento of your happy day for a lifetime. Even though it can me costly, your best bet is to have a professional photographer take your pictures so you get the best quality possible. TIP! The pictures you will have taken on your wedding day are meant to be a memento of your happy day for a lifetime. It pays to spend the extra cash to hire a wedding photographer in order to reduce the chance of some amateur screwing up your wedding photos. Try using the property of a loved one for the wedding venue. This will help you to significantly reduce the costs. Make sure you offer to hire help to prepare and to clean, though. Do not leave this up to the homeowner. TIP! Try using the property of a loved one for the wedding venue. If you know anyone with a large enough backyard, you can save a lot of money on your wedding. Getting married soon? Don’t even think about crash dieting to fit into your dress. Like any athlete will tell you, too much weight loss too quickly can result in being light-headed and dehydrated. You want to stay on your feet during the ceremony and reception. You would do better to choose a dress that has a corset back, as this allows you to adjust the fit with out the need for tailoring. TIP! Don’t starve yourself silly just to fit in a wedding dress. You may not feel good on the big day if you haven’t eaten enough. It is obvious that that most important aspect to think about in a marriage is the one whom you will marry. Don’t rush into this decision. Be sure you carefully take into account the traits that you require in a mate, and which ones will drive you insane. TIP! The single most important factor when you are getting married is also the most obvious, your choice in bride or groom. This is a huge commitment, and rushing into things for the sake of being married may be catastrophic. Do your research when it comes to your photographer. You do not want to have someone taking wedding pictures that you are not pleased with. There are online reviews readily available to you, and you can also ask people you know that might have planned a wedding recently. TIP! If you want to maximize your look on the day of the wedding but are on a budget, one of the things that you can do is to rent diamonds. This gives you that dazzling look you are seeking for a fraction of the cost, which allows you to stay well within your budget. You can embellish your bouquet with tiny crystals, rhinestones or perhaps diamonds if you can afford to. This can be done with the addition of adhesive or thermally attached crystals, smaller pieces of costume jewelry and maybe even a cherished heirloom. For a consistent look, all of the stones should coordinate in terms of cut, color, and size. TIP! Take your time in writing your vows, they’re personal and meaningful and must have effort put into them. Keep in mind that the union of marriage is a long term commitment and will require both parties to make some sacrifices. Make sure your wedding reception lighting can be dimmed at the venue. Certain occasions throughout the evening will call for their own separate mood and lighting, such as a first dance or cutting of the cake. Check with the venue about these specific options before booking anything for certain. TIP! Of course you probably know to tell your DJ or band what songs you expect, but also consider telling them songs you absolutely do not want at your wedding. Perhaps it’s heavy metal, or country music, or even a previous lover’s “special song”. When you are planning table seating, try to set guests in pairs, so you can ensure every table has an even number of those sitting at it. Facilitate conversation by making table arrangements according to age groups. TIP! Be sure to browse around for experienced and skilled photographers, before you commit to one for your wedding. You don’t want a photographer who disappoints. Place your colorful wedding cake on a swatch of fabric that coordinates with the cake. You can use solids, patters, silk, velvet or satin to tie the elements all together. TIP! Post a schedule of events on your wedding website or send an itinerary with your wedding invitations. This helps out-of-town guests make appropriate travel plans, especially guests who are going to participate in your wedding rehearsal or other events. Weddings are joyous occasions but they also bring a lot of stress and drama into play. Avoid wedding collapses, by using the advice you learned from this guide, to your advantage.
Low
[ 0.5106837606837601, 29.875, 28.625 ]
Q: How can I get the click event (single, double, long) in react native (expo)? I am making the button with several click events (single, double, long) in react native. I have already used the Touchable component and I got these events using a time delay. But this is not a good solution and there are some issues. it is that when I double-click, the single event has happened concurrently. In this case, I have to remove the single click event and get the only double click event. Is there any other good solution? A: Touchable opacity in react native doesn't have the onLongpress or for double click support. But You can use TouchableWithoutFeedback, as it supports onLongPress funtionality. Furthermore you can just add a custom code for implementing doubleclick in react native touchables. What you can do is to just save the count on click and clear the click counter after some seconds then trigger a funtion on onPress when it is clicked twice. Sample code for doubleclick in react native - <TouchableWithoutFeedback style={{ position: 'absolute', left: 0, padding: 20, backgroundColor:'green' }} onPress={() => { this.backCount++ if (this.backCount == 2) { clearTimeout(this.backTimer) console.warn("Clicked twice") } else { this.backTimer = setTimeout(() => { this.backCount = 0 }, 3000) #mention here the time for clearing the counter in ms } }} > </TouchableWithoutFeedback> Don't forget to initialize this.backCount = 0 in your constructor
High
[ 0.713432835820895, 29.875, 12 ]
President Trump is inciting a trade war, undermining NATO and painting Europe as a foe. It’s no wonder, then, that the European Union is looking elsewhere for friends. On Tuesday in Tokyo, it signed its largest trade deal ever, a pact with Japan that will slash customs duties on products like European wine and cheese, while gradually reducing tariffs on cars. The agreement will cover a quarter of the global economy — by some measures the largest free-trade area in the world — and is the latest in a string of efforts either concluded or in the works with countries like Australia, Vietnam and even China. The deal with Japan, and the others being negotiated, point to a more assertive Europe, one that is looking past the frosty ties with the United States, and even the coming withdrawal of Britain from the bloc. In recent months, European Union leaders have voiced ever more confident support for free trade, refusing to back down in the face of the threat of tariffs from Washington and instead aggressively courting new relationships. But no matter how many barriers to international commerce the European Union manages to tear down, its leaders will not change one economic fact of life: The United States remains the Continent’s largest trading partner. There is no escaping the damage from Mr. Trump’s campaign against imports like cars and steel.
Mid
[ 0.564299424184261, 36.75, 28.375 ]
In all my years on this planet, I have never tried dragonfruit. Terrible, I know! It's so dang pretty, and as the ladies of Beijos Events are showcasing, makes for a knockout brunch addition. Your guests will ohhh and ahhh and it can be our little secret that it only takes a hot second to whip up. So go ahead and impress the masses with this gorgeous Dragonfruit Breakfast Bowl. I discovered dragon fruit not to long ago, and I'm totally obsessed with it. If you haven't seen a dragonfruit, you are missing out! It's is probably one of the coolest looking fruits around. Its part of the cactus family, which explains why I love it so much. Us Beijos ladies and our love for anything cactus. It is hot pink on the outside, and a cool white and black speckled flesh on the inside. With our summer mornings being warm ones, this has been on the menu in our house a lot lately. Its fast, easy, healthy, and the kids love it! Don't forget its just pretty to look at. Hint: This is a perfect brunch item. Your guests will love it! Shhh... don't tell them how easy it is. QUICK TIPS When picking out a dragonfruit, look for one with bright and even colored skin. Blotchy spots are a no no. It should be soft, but not mushy. Make sure your fruit is COLD. Fruit taste so much more refreshing when its cold. If you are serving these bowls at a later time, simply assemble and then take out right before serving. Dragonfruit Breakfast Bowl Prep Time 5 Minutes Cook Time N/A Total Time 5 Minutes Ingredients 1 Dragonfruit 1/2 cup of assorted fruit (I like to use berries, pineapple, and mango) I used berries this time around cause that is what was in my fridge at the time. More Brunch Goodies this way... "}],"excerpt":"Whip up this pretty dragonfruit breakfast bowl for your next brunch get-together in as little as 5 minutes. It's a quick breakfast recipe that's as gorgeous as it gets.","designers":[],"images":[{"id":4765302,"path":"/submissions/uploads/215457/57a9c8805c2e4.jpg","width":2333,"height":3500,"ads":[{"mn":963861036,"placement":"gallery_desktop"},{"mn":963862086,"placement":"mobile_gallery"}],"credits":[{"name":"Yasmin Sarai Photography","type":"Photography","lbb":0,"enhanced":0,"url":"http://yasminsarai.com"}],"url":"/vault/image/4765302","gallery":81894},{"id":4765305,"path":"/submissions/uploads/215457/57a9c8807b49e.jpg","width":3500,"height":2333,"ads":[{"mn":963861036,"placement":"gallery_desktop"},{"mn":963862086,"placement":"mobile_gallery"}],"credits":[{"name":"Yasmin Sarai Photography","type":"Photography","lbb":0,"enhanced":0,"url":"http://yasminsarai.com"}],"url":"/vault/image/4765305","gallery":81894},{"id":4765278,"path":"/submissions/uploads/215457/57a9c87bd3b94.jpg","width":2333,"height":3500,"ads":[{"mn":963861036,"placement":"gallery_desktop"},{"mn":963862086,"placement":"mobile_gallery"}],"credits":[{"name":"Yasmin Sarai Photography","type":"Photography","lbb":0,"enhanced":0,"url":"http://yasminsarai.com"}],"url":"/vault/image/4765278","gallery":81894}],"videos":[],"gallery":81894,"collection":null,"terms":[{"id":"73003","living":true,"term_id":67685,"name":"Breakfast","slug":"breakfast","ads":[{"mn":963859485,"placement":"leaderboard_1"},{"mn":963859482,"placement":"leaderboard_2"},{"mn":963859483,"placement":"multisize_1"},{"mn":963859484,"placement":"multisize_2"},{"mn":963861036,"placement":"gallery_desktop"},{"mn":963862071,"placement":"mobile_lb"},{"mn":963862069,"placement":"mobile_content"},{"mn":963862070,"placement":"mobile_a"},{"mn":963862086,"placement":"mobile_gallery"}],"url":"/living/tag/breakfast","logos":[],"taxonomy":"tag"},{"id":"164681","living":true,"term_id":147197,"name":"Summer Entertaining","slug":"summer-entertaining","ads":[],"url":"/living/tag/summer-entertaining","logos":[],"taxonomy":"tag"},{"id":"66181","living":true,"term_id":5270,"name":"Brunch","slug":"brunch","ads":[],"url":"/living/tag/brunch","logos":[],"taxonomy":"tag"},{"id":"142224","living":true,"term_id":5922,"name":"Recipe","slug":"recipe","ads":[],"url":"/living/tag/recipe","logos":[],"taxonomy":"tag"},{"id":"1","living":false,"term_id":1,"name":"The Blog","slug":"blog","ads":[],"url":"/category/blog","logos":[],"taxonomy":"category"},{"id":"60995","living":true,"term_id":58857,"name":"Food & Drinks","slug":"recipes","ads":[{"mn":963859485,"placement":"leaderboard_1"},{"mn":963859482,"placement":"leaderboard_2"},{"mn":963859483,"placement":"multisize_1"},{"mn":963859484,"placement":"multisize_2"},{"mn":963861036,"placement":"gallery_desktop"},{"mn":963862071,"placement":"mobile_lb"},{"mn":963862069,"placement":"mobile_content"},{"mn":963862070,"placement":"mobile_a"},{"mn":963862086,"placement":"mobile_gallery"}],"url":"/living/category/recipes","logos":[],"taxonomy":"category"},{"id":"46135","living":true,"term_id":45425,"name":"Living","slug":"living","ads":[{"mn":963857931,"placement":"leaderboard_1"},{"mn":963857932,"placement":"leaderboard_2"},{"mn":963857933,"placement":"multisize_1"},{"mn":963857934,"placement":"multisize_2"},{"mn":963859376,"placement":"gallery_desktop"},{"mn":963862152,"placement":"mobile_lb"},{"mn":963862150,"placement":"mobile_content"},{"mn":963862151,"placement":"mobile_a"},{"mn":963862084,"placement":"mobile_gallery"}],"url":"/living","logos":[],"taxonomy":"blog"}],"details":[{"id":"73003","name":"Breakfast","url":"/living/tag/breakfast","taxonomy":"tag"},{"id":"164681","name":"Summer Entertaining","url":"/living/tag/summer-entertaining","taxonomy":"tag"},{"id":"66181","name":"Brunch","url":"/living/tag/brunch","taxonomy":"tag"},{"id":"142224","name":"Recipe","url":"/living/tag/recipe","taxonomy":"tag"},{"id":"60995","name":"Food & Drinks","url":"/living/category/recipes","taxonomy":"category"}],"vendors":[{"id":58935,"name":"Yasmin Sarai Photography","lbb":0,"enhanced":0,"inactive":0,"claimed":0,"slug":"yasmin-sarai-photography","url":"http://yasminsarai.com","type":"Photography","badge":"Camera"},{"id":182964,"name":"Beijos Events","lbb":0,"enhanced":0,"inactive":0,"claimed":0,"slug":"beijos-events","url":"http://www.beijosevents.com","type":"Design and Styling","thumb":"/submissions/uploads/64955/53f545fc189e5.jpg"}],"locations":[],"location":[],"recipe":{"id":"1296","post_id":"719811","title":"Dragonfruit Breakfast Bowl","serves":"1","prep_time":"300","cook_time":"0","ingredients":["1 Dragonfruit\r","1/2 cup of assorted fruit (I like to use berries, pineapple, and mango) I used berries this time around cause that is what was in my fridge at the time.\r","Melon scooper"],"instructions":["Slice your dragonfruit in half. \r","Using your melon scooper, scoop out most of the dragonfruit. \r","Add in your fruit of choice and the balls of dragonfruit. \r","Lastly, add spoon and demolish!"],"description":"","created_at":"2016-08-09 14:07:41","type":null},"colors":[],"meta":{"previewLayout":null,"seo":{"title":"5 Minute Dragonfruit Breakfast Bowl","description":"Whip up this pretty dragonfruit breakfast bowl for your next brunch get-together in as little as 5 minutes. It's a quick breakfast recipe that's as gorgeous as it gets.","keywords":"Brunch, Breakfast, Fruit, Dragonfruit, Tropical, Bowl, Recipe, Easy, Quick"},"social":{"title":"The Prettiest Ever 5-Minute Breakfast Bowl You'll Want to Gobble Up","description":"Whip up this pretty dragonfruit breakfast bowl for your next brunch get-together in as little as 5 minutes.","image":{"landscape":"http://isa2.stylemepretty.com/submissions/uploads/215457/57a9c8807b49e$!900x.jpg","portrait":"http://isa2.stylemepretty.com/submissions/uploads/215457/57a9c8805c2e4$!900x.jpg"}}},"ads":[{"mn":963859485,"placement":"leaderboard_1"},{"mn":963859482,"placement":"leaderboard_2"},{"mn":963859483,"placement":"multisize_1"},{"mn":963859484,"placement":"multisize_2"},{"mn":963861036,"placement":"gallery_desktop"},{"mn":963862071,"placement":"mobile_lb"},{"mn":963862069,"placement":"mobile_content"},{"mn":963862070,"placement":"mobile_a"},{"mn":963862086,"placement":"mobile_gallery"}],"published":"2016-08-11 09:00:14","updated":"2016-08-11 08:03:08","parent":0,"thumb":"http://isa2.stylemepretty.com/submissions/uploads/215457/57a9c8807b49e$!900x.jpg"}},"lastFetched":1521463817103}},"config":{"isLoading":false,"error":null,"data":{"landingPages":["/category/wedding-style","/category/real-weddings","/category/wedding-resources","/category/wedding-fashion","/category/wedding-flowers","/category/diy-projects","/category/community","/location/maui","/location/bahamas","/location/new-orleans","/location/florida","/location/hawaii","/location/chicago","/location/los-angeles","/location/san-francisco","/location/mexico","/location/london","/location/maryland","/location/new-zealand","/location/scotland","/location/san-diego","/location/new-hampshire","/location/georgia","/location/bali","/location/north-carolina","/location/canada","/location/kentucky","/location/south-carolina","/location/sydney","/location/australia","/location/arizona","/location/colorado","/location/connecticut","/location/marthas-vineyard","/location/virginia","/location/santa-barbara","/location/rhode-island","/location/british-columbia","/location/england","/location/manhattan","/location/greece","/location/iowa","/location/oregon","/location/long-island","/location/vermont","/location/brooklyn","/location/moorea","/location/new-mexico","/location/pennsylvania","/location/alabama","/location/illinois","/location/michigan","/location/ohio","/location/spain","/location/puerto-rico","/location/washington","/location/utah","/location/france","/location/philippines","/location/tuscany","/location/indiana","/location/tennessee","/location/oahu","/location/china","/location/new-england","/location/louisiana","/location/new-york-city","/location/missouri","/location/kansas","/location/dominican-republic","/location/caribbean","/location/new-jersey","/tag/destination-weddings-and-honeymoons","/location/colombia","/location/idaho","/location/maine","/location/minnesota","/location/ontario","/location/northern-california","/location/wyoming","/location/west-virginia","/location/indonesia","/location/the-hamptons","/location/nevada","/location/yucatan-peninsula","/location/waiheke-island","/location/vancouver","/location/oklahoma","/location/turks-and-caicos-islands","/location/europe","/location/wisconsin","/location/costa-rica","/location/florida-keys","/location/sweden","/location/alberta","/location/south-africa","/location/quebec","/location/topanga-canyon","/location/jamaica","/location/montana","/location/united-kingdom","/location/iceland","/location/arkansas","/location/switzerland","/location/brazil","/location/delaware","/tag/mid-atlantic","/location/guatemala","/location/baja","/location/denmark","/blog/destination-weddings","/location/mississippi","/location/italy","/location/morocco","/location/nebraska","/location/ireland","/location/california","/location/texas","/location/new-york","/location/south-america","/location/queens","/location/netherlands","/location/massachusetts","/location/thailand","/location/manitoba","/location/bordeaux","/location/germany","/location/north-dakota","/location/french-polynesia","/location/portugal","/location/united-states-virgin-islands","/location/taiwan","/location/austria","/location/australian-capital-territory","/location/north-america","/location/united-states","/location/central-america","/location/africa","/location/australia-south-pacific","/location/asia","/location/queensland-au","/location/victoria-au","/location/western-australia-au","/location/new-south-wales-au","/location/tasmania-au","/location/south-australia-au","/location/czech-republic","/location/croatia","/living","/tag/diy-2","/living/category/diy","/location/syracuse","/tag/southwest","/tag/midwest","/living/category/recipes","/location/finland","/living/category/fashion-beauty","/living/tag/entertaining","/living/tag/interior-design","/living/category/home","/","/blog/southeast-weddings","/location/chatham-new-york","/location/belgium","/blog/midwest-weddings","/blog/new-england-weddings","/blog/southwest-weddings","/blog/northwest-weddings","/blog/mid-atlantic-weddings","/blog/tri-state-weddings","/location/slovakia","/location/russia","/category/seasonal-wedding-trend","/location/monmouth-hills","/location/western-asia","/location/united-arab-emirates","/location/stevensville-maryland","/location/sicily","/location/amalfi-coast","/location/argentina","/location/walton-county-florida","/location/nepal","/category/weddings-101","/location/cuba-south-america","/location/northumberland","/tag/tri-state","/tag/new-england","/location/montenegro","/location/wales","/living/tag/lifestyle-collective","/location/west-indies","/tag/new-england-weddings","/living/tag/children-family","/location/terni","/category/planning-weddings-101","/season","/style","/setting","/region","/color","/flower"],"ads":{"ros_wedding":{"leaderboard_1":963859455,"leaderboard_2":963859452,"multisize_1":963859453,"multisize_2":963859454,"gallery_desktop":963859377,"mobile_lb":963862119,"mobile_content":963862117,"mobile_a":963862118,"mobile_gallery":963862091},"ros_living":{"leaderboard_1":963859459,"leaderboard_2":963859456,"multisize_1":963859457,"multisize_2":963859458,"gallery_desktop":963859376,"mobile_lb":963862116,"mobile_content":963862114,"mobile_a":963862115,"mobile_gallery":963862084},"living":{"leaderboard_1":963857931,"leaderboard_2":963857932,"multisize_1":963857933,"multisize_2":963857934,"gallery_desktop":963859376,"mobile_lb":963862152,"mobile_content":963862150,"mobile_a":963862151,"mobile_gallery":963862084},"wedding":{"leaderboard_1":963857911,"leaderboard_2":963857930,"multisize_1":963857912,"multisize_2":963857914,"mobile_lb":963862047,"mobile_content":963862045,"mobile_a":963862046}}}}},"scroll":{"body":{"x":0,"y":0}},"collection":{"slide":null,"resize":null,"ad":null,"slides":[],"source":"","navigation":[],"isLoading":true,"isFullScreen":false,"isViewing":false},"favorites":{"data":[],"lastFetched":null,"isLoading":false,"error":null,"favorite":{"error":null,"lastFetched":null,"isLoading":false}},"session":{"id":null}};
Low
[ 0.5239852398523981, 35.5, 32.25 ]
# SOME DESCRIPTIVE TITLE. # Copyright (C) YEAR MATE Desktop Environment team # This file is distributed under the same license as the marco package. # FIRST AUTHOR <EMAIL@ADDRESS>, YEAR. # # Translators: # Cédric Valmary <[email protected]>, 2018 # Sébastien Denux <[email protected]>, 2018 # 48c2de07903ce5a77a8e90265f95c4c2_8909374 <837c8d0ab97b27e737893c19f79bd4de_348476>, 2018 # Stefano Karapetsas <[email protected]>, 2018 # Quentin PAGÈS, 2020 # msgid "" msgstr "" "Project-Id-Version: marco 1.23.1\n" "Report-Msgid-Bugs-To: https://github.com/mate-desktop/marco\n" "POT-Creation-Date: 2019-11-18 19:44+0100\n" "PO-Revision-Date: 2018-03-11 16:12+0000\n" "Last-Translator: Quentin PAGÈS, 2020\n" "Language-Team: Occitan (post 1500) (https://www.transifex.com/mate/teams/13566/oc/)\n" "MIME-Version: 1.0\n" "Content-Type: text/plain; charset=UTF-8\n" "Content-Transfer-Encoding: 8bit\n" "Language: oc\n" "Plural-Forms: nplurals=2; plural=(n > 1);\n" #: src/50-marco-desktop-key.xml.in:2 msgid "Desktop" msgstr "Burèu" #: src/50-marco-desktop-key.xml.in:4 msgid "Show the panel's &quot;Run Application&quot; dialog box" msgstr "" #: src/50-marco-desktop-key.xml.in:6 src/org.mate.marco.gschema.xml:629 msgid "Show the panel's main menu" msgstr "Visualizar lo menut principal del panèl" #: src/50-marco-desktop-key.xml.in:8 src/org.mate.marco.gschema.xml:639 msgid "Take a screenshot" msgstr "Far una captura d'ecran" #: src/50-marco-desktop-key.xml.in:10 src/org.mate.marco.gschema.xml:644 msgid "Take a screenshot of a window" msgstr "Far una captura d'ecran d'una fenèstra" #: src/50-marco-desktop-key.xml.in:12 src/org.mate.marco.gschema.xml:649 msgid "Run a terminal" msgstr "Executar un terminal" #: src/50-marco-desktop-key.xml.in:14 src/org.mate.marco.gschema.xml:654 msgid "Rename current workspace" msgstr "Renommar l’espaci de trabalh acual" #: src/50-marco-global-key.xml.in:2 src/50-marco-window-key.xml.in:2 msgid "Window Management" msgstr "Gestion de las fenèstras" #: src/50-marco-global-key.xml.in:4 src/org.mate.marco.gschema.xml:564 msgid "Move between windows, using a popup window" msgstr "Se desplaçar entre las fenèstras via una fenèstra de primièr plan" #: src/50-marco-global-key.xml.in:6 src/org.mate.marco.gschema.xml:554 msgid "Move between windows of an application, using a popup window" msgstr "" "Se desplaçar entre las fenèstras d'una aplicacion via una fenèstra de " "primièr plan" #: src/50-marco-global-key.xml.in:8 src/org.mate.marco.gschema.xml:584 msgid "Move between panels and the desktop, using a popup window" msgstr "" "Se desplaçar entre los tablèus de bòrd e lo burèu via una fenèstra de " "primièr plan" #: src/50-marco-global-key.xml.in:10 src/org.mate.marco.gschema.xml:604 msgid "Move between windows immediately" msgstr "Se desplaçar entre las fenèstras dirèctament" #: src/50-marco-global-key.xml.in:12 src/org.mate.marco.gschema.xml:594 msgid "Move between windows of an application immediately" msgstr "Se desplaçar immediatament entre las fenèstras d'una aplicacion" #: src/50-marco-global-key.xml.in:14 src/org.mate.marco.gschema.xml:614 msgid "Move between panels and the desktop immediately" msgstr "Se desplaçar entre los tablèus de bòrd e lo burèu immediatament" #: src/50-marco-global-key.xml.in:16 src/org.mate.marco.gschema.xml:624 msgid "Hide all normal windows and set focus to the desktop" msgstr "Amagar totas las fenèstras normalas e balhar lo focus al burèu" #: src/50-marco-global-key.xml.in:23 src/org.mate.marco.gschema.xml:469 msgid "Switch to workspace 1" msgstr "Anar al espaci de trabalh 1" #: src/50-marco-global-key.xml.in:30 src/org.mate.marco.gschema.xml:474 msgid "Switch to workspace 2" msgstr "Anar al espaci de trabalh 2" #: src/50-marco-global-key.xml.in:37 src/org.mate.marco.gschema.xml:479 msgid "Switch to workspace 3" msgstr "Anar al espaci de trabalh 3" #: src/50-marco-global-key.xml.in:44 src/org.mate.marco.gschema.xml:484 msgid "Switch to workspace 4" msgstr "Anar al espaci de trabalh 4" #: src/50-marco-global-key.xml.in:51 src/org.mate.marco.gschema.xml:489 msgid "Switch to workspace 5" msgstr "Anar al espaci de trabalh 5" #: src/50-marco-global-key.xml.in:58 src/org.mate.marco.gschema.xml:494 msgid "Switch to workspace 6" msgstr "Anar al espaci de trabalh 6" #: src/50-marco-global-key.xml.in:65 src/org.mate.marco.gschema.xml:499 msgid "Switch to workspace 7" msgstr "Anar al espaci de trabalh 7" #: src/50-marco-global-key.xml.in:72 src/org.mate.marco.gschema.xml:504 msgid "Switch to workspace 8" msgstr "Anar al espaci de trabalh 8" #: src/50-marco-global-key.xml.in:79 src/org.mate.marco.gschema.xml:509 msgid "Switch to workspace 9" msgstr "Anar al espaci de trabalh 9" #: src/50-marco-global-key.xml.in:86 src/org.mate.marco.gschema.xml:514 msgid "Switch to workspace 10" msgstr "Anar al espaci de trabalh 10" #: src/50-marco-global-key.xml.in:93 src/org.mate.marco.gschema.xml:519 msgid "Switch to workspace 11" msgstr "Anar al espaci de trabalh 11" #: src/50-marco-global-key.xml.in:100 src/org.mate.marco.gschema.xml:524 msgid "Switch to workspace 12" msgstr "Anar al espaci de trabalh 12" #: src/50-marco-global-key.xml.in:107 src/org.mate.marco.gschema.xml:529 msgid "Switch to workspace on the left of the current workspace" msgstr "Anar a l'espaci de trabalh a esquèrra de l'espaci de trabalh actual" #: src/50-marco-global-key.xml.in:114 src/org.mate.marco.gschema.xml:534 msgid "Switch to workspace on the right of the current workspace" msgstr "Anar a l'espaci de trabalh a drecha de l'espaci de trabalh actual" #: src/50-marco-global-key.xml.in:121 src/org.mate.marco.gschema.xml:539 msgid "Switch to workspace above the current workspace" msgstr "Anar a l'espaci de trabalh endessús de l'espaci de trabalh actual" #: src/50-marco-global-key.xml.in:128 src/org.mate.marco.gschema.xml:544 msgid "Switch to workspace below the current workspace" msgstr "Anar a l'espaci de trabalh endessós de l'espaci de trabalh actual" #: src/50-marco-global-key.xml.in:131 src/org.mate.marco.gschema.xml:549 msgid "Switch to previously selected workspace" msgstr "Bascular a l’espaci de trabalh precedentament seleccionat" #: src/50-marco-window-key.xml.in:6 src/org.mate.marco.gschema.xml:735 msgid "Activate the window menu" msgstr "Activar lo menut fenèstra" #: src/50-marco-window-key.xml.in:10 src/org.mate.marco.gschema.xml:740 msgid "Toggle fullscreen mode" msgstr "(Des)activar lo mòde ecran complet" #: src/50-marco-window-key.xml.in:14 src/org.mate.marco.gschema.xml:745 msgid "Toggle maximization state" msgstr "Bascuolar l'estat d'agrandiment" #: src/50-marco-window-key.xml.in:18 src/org.mate.marco.gschema.xml:755 msgid "Maximize window" msgstr "Maximizar la fenèstra" #: src/50-marco-window-key.xml.in:22 src/org.mate.marco.gschema.xml:760 msgid "Restore window" msgstr "Restablir la fenèstra" #: src/50-marco-window-key.xml.in:26 src/org.mate.marco.gschema.xml:765 msgid "Toggle shaded state" msgstr "Basculer l'estat de replec" #: src/50-marco-window-key.xml.in:30 src/org.mate.marco.gschema.xml:775 msgid "Close window" msgstr "Tampar la fenèstra" #: src/50-marco-window-key.xml.in:34 src/org.mate.marco.gschema.xml:770 msgid "Minimize window" msgstr "Reduire la fenèstra" #: src/50-marco-window-key.xml.in:38 src/org.mate.marco.gschema.xml:780 msgid "Move window" msgstr "Desplaçar la fenèstra" #: src/50-marco-window-key.xml.in:42 src/org.mate.marco.gschema.xml:785 msgid "Resize window" msgstr "Redimensionar la fenèstra" #: src/50-marco-window-key.xml.in:50 src/org.mate.marco.gschema.xml:790 msgid "Toggle whether window is on all workspaces or just one" msgstr "Plaçar la fenèstra sus totes los espacis de trabalh, o sus un sol" #: src/50-marco-window-key.xml.in:54 src/org.mate.marco.gschema.xml:875 msgid "Raise window if it's covered by another window, otherwise lower it" msgstr "" "Metre la fenèstra al primièr plan s'es amagada per una autra fenèstra, " "siquenon en rière plan" #: src/50-marco-window-key.xml.in:58 src/org.mate.marco.gschema.xml:880 msgid "Raise window above other windows" msgstr "Metre la fenèstra al primièr plan" #: src/50-marco-window-key.xml.in:62 src/org.mate.marco.gschema.xml:885 msgid "Lower window below other windows" msgstr "Metre la fenèstra jos las autras fenèstras" #: src/50-marco-window-key.xml.in:66 src/org.mate.marco.gschema.xml:890 msgid "Maximize window vertically" msgstr "Maximizar la fenèstra verticalament" #: src/50-marco-window-key.xml.in:70 src/org.mate.marco.gschema.xml:895 msgid "Maximize window horizontally" msgstr "Maximizar la fenèstra orizontalament" #: src/50-marco-window-key.xml.in:74 src/org.mate.marco.gschema.xml:900 msgid "Tile window to east (right) side of screen" msgstr "" #: src/50-marco-window-key.xml.in:78 src/org.mate.marco.gschema.xml:905 msgid "Tile window to west (left) side of screen" msgstr "" #: src/50-marco-window-key.xml.in:82 msgid "Tile window to north-west (top left) corner" msgstr "" #: src/50-marco-window-key.xml.in:86 msgid "Tile window to north-east (top right) corner" msgstr "" #: src/50-marco-window-key.xml.in:90 msgid "Tile window to south-west (bottom left) corner" msgstr "" #: src/50-marco-window-key.xml.in:94 msgid "Tile window to south-east (bottom right) corner" msgstr "" #: src/50-marco-window-key.xml.in:98 src/org.mate.marco.gschema.xml:930 msgid "Move window to north-west (top left) corner" msgstr "Deplaçar la fenèstra cap al canton nòrd-oèst (en naut a esquèrra)" #: src/50-marco-window-key.xml.in:102 src/org.mate.marco.gschema.xml:935 msgid "Move window to north-east (top right) corner" msgstr "Desplaçar la fenèstra cap al canton nòrd-èst (en naut a drecha)" #: src/50-marco-window-key.xml.in:106 src/org.mate.marco.gschema.xml:940 msgid "Move window to south-west (bottom left) corner" msgstr "Desplaçar la fenèstra cap al canton sud-oèst (en bas a esquèrra)" #: src/50-marco-window-key.xml.in:110 src/org.mate.marco.gschema.xml:945 msgid "Move window to south-east (bottom right) corner" msgstr "Desplaçar la fenèstra cap al canton sud-èst (en bas a drecha)" #: src/50-marco-window-key.xml.in:114 src/org.mate.marco.gschema.xml:950 msgid "Move window to north (top) side of screen" msgstr "Desplaçar la fenèstra cap al costat nòrd de l'ecran (en naut)" #: src/50-marco-window-key.xml.in:118 src/org.mate.marco.gschema.xml:955 msgid "Move window to south (bottom) side of screen" msgstr "Desplaçar la fenèstra cap al costat sud de l'ecran (en bas)" #: src/50-marco-window-key.xml.in:122 src/org.mate.marco.gschema.xml:960 msgid "Move window to east (right) side of screen" msgstr "Desplaçar la fenèstra cap al costat èst de l'ecran (a drecha)" #: src/50-marco-window-key.xml.in:126 src/org.mate.marco.gschema.xml:965 msgid "Move window to west (left) side of screen" msgstr "Desplaçar la fenèstra cap al costat oèst de l'ecran (a esquèrra)" #: src/50-marco-window-key.xml.in:130 src/org.mate.marco.gschema.xml:970 msgid "Move window to center of screen" msgstr "Desplaçar la fenèstra al centre de l'ecran" #: src/50-marco-window-key.xml.in:134 src/org.mate.marco.gschema.xml:975 msgid "Move window to north (top) monitor" msgstr "" #: src/50-marco-window-key.xml.in:138 src/org.mate.marco.gschema.xml:980 msgid "Move window to south (bottom) monitor" msgstr "" #: src/50-marco-window-key.xml.in:142 src/org.mate.marco.gschema.xml:985 msgid "Move window to east (right) monitor" msgstr "" #: src/50-marco-window-key.xml.in:146 src/org.mate.marco.gschema.xml:990 msgid "Move window to west (left) monitor" msgstr "" #: src/50-marco-window-key.xml.in:154 src/org.mate.marco.gschema.xml:795 msgid "Move window to workspace 1" msgstr "Desplaçar la fenèstra al espaci de trabalh 1" #: src/50-marco-window-key.xml.in:162 src/org.mate.marco.gschema.xml:800 msgid "Move window to workspace 2" msgstr "Desplaçar la fenèstra cap al espaci de trabalh 2" #: src/50-marco-window-key.xml.in:170 src/org.mate.marco.gschema.xml:805 msgid "Move window to workspace 3" msgstr "Desplaçar la fenèstra cap al espaci de trabalh 3" #: src/50-marco-window-key.xml.in:178 src/org.mate.marco.gschema.xml:810 msgid "Move window to workspace 4" msgstr "Desplaçar la fenèstra al espaci de trabalh 4" #: src/50-marco-window-key.xml.in:186 src/org.mate.marco.gschema.xml:815 msgid "Move window to workspace 5" msgstr "Desplaçar la fenèstra al espaci de trabalh 5" #: src/50-marco-window-key.xml.in:194 src/org.mate.marco.gschema.xml:820 msgid "Move window to workspace 6" msgstr "Desplaçar la fenèstra al espaci de trabalh 6" #: src/50-marco-window-key.xml.in:202 src/org.mate.marco.gschema.xml:825 msgid "Move window to workspace 7" msgstr "Desplaçar la fenèstra al espaci de trabalh 7" #: src/50-marco-window-key.xml.in:210 src/org.mate.marco.gschema.xml:830 msgid "Move window to workspace 8" msgstr "Desplaçar la fenèstra al espaci de trabalh 8" #: src/50-marco-window-key.xml.in:218 src/org.mate.marco.gschema.xml:835 msgid "Move window to workspace 9" msgstr "Desplaçar la fenèstra al espaci de trabalh 9" #: src/50-marco-window-key.xml.in:226 src/org.mate.marco.gschema.xml:840 msgid "Move window to workspace 10" msgstr "Desplaçar la fenèstra al espaci de trabalh 10" #: src/50-marco-window-key.xml.in:234 src/org.mate.marco.gschema.xml:845 msgid "Move window to workspace 11" msgstr "Desplaçar la fenèstra al espaci de trabalh 11" #: src/50-marco-window-key.xml.in:242 src/org.mate.marco.gschema.xml:850 msgid "Move window to workspace 12" msgstr "Desplaçar la fenèstra cap al espaci de trabalh 12" #: src/50-marco-window-key.xml.in:250 src/org.mate.marco.gschema.xml:855 msgid "Move window one workspace to the left" msgstr "Desplacar la fenèstra cap a l'espaci de trabalha a drecha" #: src/50-marco-window-key.xml.in:258 src/org.mate.marco.gschema.xml:860 msgid "Move window one workspace to the right" msgstr "Desplacar la fenèstra cap a l'espaci de trabalha a esquèrra" #: src/50-marco-window-key.xml.in:266 src/org.mate.marco.gschema.xml:865 msgid "Move window one workspace up" msgstr "Desplacar la fenèstra cap a l'espaci de trabalha amont" #: src/50-marco-window-key.xml.in:274 src/org.mate.marco.gschema.xml:870 msgid "Move window one workspace down" msgstr "Desplacar la fenèstra cap a l'espaci de trabalha aval" #: src/org.mate.marco.gschema.xml:50 msgid "Modifier to use for modified window click actions" msgstr "Tòca d'utilizar per modificar las accions del clic" #: src/org.mate.marco.gschema.xml:51 msgid "" "Clicking a window while holding down this modifier key will move the window " "(left click), resize the window (middle click), or show the window menu " "(right click). The middle and right click operations may be swapped using " "the \"resize_with_right_button\" key. Modifier is expressed as \"<Alt>\" or " "\"<Super>\" for example." msgstr "" #: src/org.mate.marco.gschema.xml:55 msgid "Whether to resize with the right button" msgstr "Indica se lo boton drech pòt servir a redimensionar" #: src/org.mate.marco.gschema.xml:56 msgid "" "Set this to true to resize with the right button and show a menu with the " "middle button while holding down the key given in \"mouse_button_modifier\";" " set it to false to make it work the opposite way around." msgstr "" "Definir a « true » per redimensionar amb lo boton drech e afichar un menut " "amb lo boton del mitan en mantenent quichada la tòca balhada dins « " "mouse_button_modifier » ; definir a « false » per aver lo foncionament " "invèerse." #: src/org.mate.marco.gschema.xml:60 msgid "Whether to display preselected tab window border" msgstr "" #: src/org.mate.marco.gschema.xml:61 msgid "" "Set this to false to disable border of preselected window while performing " "tab switching." msgstr "" #: src/org.mate.marco.gschema.xml:65 msgid "Arrangement of buttons on the titlebar" msgstr "Agençament dels botons sus la barra de títol" #: src/org.mate.marco.gschema.xml:66 msgid "" "Arrangement of buttons on the titlebar. The value should be a string, such " "as \"menu:minimize,maximize,spacer,close\"; the colon separates the left " "corner of the window from the right corner, and the button names are comma-" "separated. Duplicate buttons are not allowed. Unknown button names are " "silently ignored so that buttons can be added in future marco versions " "without breaking older versions. A special spacer tag can be used to insert " "some space between two adjacent buttons." msgstr "" "Agençament dels botons sus la barra de títol. La valor deu èsser una cadena," " per exemple « menu:minimize,maximize,spacer,close » ; los dos punts separan" " lo canton esquèrre de la fenèstra del canton drech, e los noms dels botons " "an d'èsser separats per de virgulas. Los botons duplicats son pas " "autorizats. Los noms de boton desconeguts son silenciosament ignorats, e mai" " de botons poiràn èsser aponduts dins de versions futuras de marco sens " "copar las versions ancianas. Una balisa especiala « spacer » permet " "d'inserir un pauc d'espaci entre dos botons adjacents." #: src/org.mate.marco.gschema.xml:70 msgid "Window focus mode" msgstr "Mòde de focus de las fenèstras" #: src/org.mate.marco.gschema.xml:71 msgid "" "The window focus mode indicates how windows are activated. It has three " "possible values; \"click\" means windows must be clicked in order to focus " "them, \"sloppy\" means windows are focused when the mouse enters the window," " and \"mouse\" means windows are focused when the mouse enters the window " "and unfocused when the mouse leaves the window." msgstr "" "Lo mòde de focus de la fenèstra indica lo biais que las fenèstras son " "activadas. Presenta tres valors possiblas ; « click » significa que vos cal " "clicar sus las fenèstras per las activar, « sloppy » (« rajat ») significa " "que las fenèstras son activadas quand la mirga s'i plaça e « mouse » (« " "mirga »), significa que las fenèstras son activadas quand la mirga s'i plaça" " e desactivadas quand las quita." #: src/org.mate.marco.gschema.xml:75 msgid "Control how new windows get focus" msgstr "Contraròtla lo biais que las fenèstras novèlas venon activas" #: src/org.mate.marco.gschema.xml:76 msgid "" "This option provides additional control over how newly created windows get " "focus. It has two possible values; \"smart\" applies the user's normal focus" " mode, and \"strict\" results in windows started from a terminal not being " "given focus." msgstr "" "Aquesta opcion provesís un contraròtle suplementari sul biais que las " "fenèstras novèlas venon activas. A doas valors possiblas: « smart » que " "correspond al mòde d'activacion utilizaire normal e « strict » qu'activa pas" " las fenèstra aviadas dempuèi un terminal." #: src/org.mate.marco.gschema.xml:80 msgid "Whether raising should be a side-effect of other user interactions" msgstr "" "Indica se la mesa al primièr plan deu èsser un efièch de bòrd d'autras " "interaccions amb l'utilizaire" #: src/org.mate.marco.gschema.xml:81 msgid "" "Setting this option to false can lead to buggy behavior, so users are " "strongly discouraged from changing it from the default of true. Many actions" " (e.g. clicking in the client area, moving or resizing the window) normally " "raise the window as a side-effect. Setting this option to false, which is " "strongly discouraged, will decouple raising from other user actions, and " "ignore raise requests generated by applications. See " "http://bugzilla.gnome.org/show_bug.cgi?id=445447#c6. Even when this option " "is false, windows can still be raised by an alt-left-click anywhere on the " "window, a normal click on the window decorations, or by special messages " "from pagers, such as activation requests from tasklist applets. This option " "is currently disabled in click-to-focus mode. Note that the list of ways to " "raise windows when raise_on_click is false does not include programmatic " "requests from applications to raise windows; such requests will be ignored " "regardless of the reason for the request. If you are an application " "developer and have a user complaining that your application does not work " "with this setting disabled, tell them it is _their_ fault for breaking their" " window manager and that they need to change this option back to true or " "live with the \"bug\" they requested." msgstr "" #: src/org.mate.marco.gschema.xml:85 msgid "Action on title bar double-click" msgstr "Accion quand doble-clicatz sus la barra de títol" #: src/org.mate.marco.gschema.xml:86 msgid "" "This option determines the effects of double-clicking on the title bar. " "Current valid options are 'toggle_shade', which will shade/unshade the " "window, 'toggle_maximize' which will maximize/unmaximize the window, " "'toggle_maximize_horizontally' and 'toggle_maximize_vertically' which will " "maximize/unmaximize the window in that direction only, 'minimize' which will" " minimize the window, 'shade' which will roll the window up, 'menu' which " "will display the window menu, 'lower' which will put the window behind all " "the others, and 'none' which will not do anything." msgstr "" "Aquesta opcion determina los efièches d'un clic doble sus la barra de títol " "d'una fenèstra. Las valors possiblas son « toggle_shade » que replega la " "fenèstra o la desplega, « toggle_maximize » que maximiza la fenèstra o la " "remet a sa talha iniciala abans maximizacion, « toggle_maximize_horizontally" " » e « toggle_maximize_vertically » que limitan la maximizacion dins la " "direccion indicada, « minimize » que redusís la fenèstra, « shade » que " "replega la fenèstra, « menut » qu'aficha lo menut de la fenèstra, « lower » " "que plaça la fenèstra darrièr totas las autras e « none » que fa pas res." #: src/org.mate.marco.gschema.xml:90 msgid "Action on title bar middle-click" msgstr "Accion d'un clic del mitan sus la barra de títol" #: src/org.mate.marco.gschema.xml:91 msgid "" "This option determines the effects of middle-clicking on the title bar. " "Current valid options are 'toggle_shade', which will shade/unshade the " "window, 'toggle_maximize' which will maximize/unmaximize the window, " "'toggle_maximize_horizontally' and 'toggle_maximize_vertically' which will " "maximize/unmaximize the window in that direction only, 'minimize' which will" " minimize the window, 'shade' which will roll the window up, 'menu' which " "will display the window menu, 'lower' which will put the window behind all " "the others, and 'none' which will not do anything." msgstr "" "Cette option détermine les effets d'un clic du milieu sur la barre de titre " "d'une fenêtre. Les valeurs possibles sont « toggle_shade » qui replie la " "fenêtre ou la déplie, « toggle_maximize » qui maximise la fenêtre ou la " "remet à sa taille initiale avant maximisation, « " "toggle_maximize_horizontally » et « toggle_maximize_vertically » qui " "limitent la maximisation dans la direction indiquée, « minimize » qui réduit" " la fenêtre, « shade » qui replie la fenêtre, « menu » qui affiche le menu " "de la fenêtre, « lower » qui place la fenêtre derrière toutes les autres et " "« none » qui ne fait rien." #: src/org.mate.marco.gschema.xml:95 msgid "Action on title bar right-click" msgstr "Accion d'un clic drech sus la barra de títol" #: src/org.mate.marco.gschema.xml:96 msgid "" "This option determines the effects of right-clicking on the title bar. " "Current valid options are 'toggle_shade', which will shade/unshade the " "window, 'toggle_maximize' which will maximize/unmaximize the window, " "'toggle_maximize_horizontally' and 'toggle_maximize_vertically' which will " "maximize/unmaximize the window in that direction only, 'minimize' which will" " minimize the window, 'shade' which will roll the window up, 'menu' which " "will display the window menu, 'lower' which will put the window behind all " "the others, and 'none' which will not do anything." msgstr "" "Aquesta opcion determina los efièches d'un clic drech sus la barra de títol " "d'una fenèstra. Las valors possiblas son « toggle_shade » que replega la " "fenèstra o la desplega, « toggle_maximize » que maximiza la fenèstra o la " "remet a sa talha iniciala abans maximizacion, « toggle_maximize_horizontally" " » e « toggle_maximize_vertically » que limitan la maximizacion dins la " "direccion indicada, « minimize » que reduís la fenèstra, « shade » que " "replega la fenèstra, « menu » qu'aficha lo menut de la fenèstra, « lower » " "que plaça la fenèstra darrièr totas las autras e « none » que fa pas res." #: src/org.mate.marco.gschema.xml:100 msgid "Automatically raises the focused window" msgstr "Plaça automaticament la fenèstra activa al primièr plan" #: src/org.mate.marco.gschema.xml:101 msgid "" "If set to true, and the focus mode is either \"sloppy\" or \"mouse\" then " "the focused window will be automatically raised after a delay specified by " "the auto_raise_delay key. This is not related to clicking on a window to " "raise it, nor to entering a window during drag-and-drop." msgstr "" "Se VERAI e que lo mòde de focus es siá « sloppy » siá « mouse » alara la " "fenèstra qu'a lo focus es automaticament mes al primièr plan aprèp un " "relambi indicat per la clau auto_raise_delay. Aquò es pas similar a clicar " "sus una fenèstra per la metre al primièr plan, ni a desplaçar una fenèstra " "pendent un lisar-depausar." #: src/org.mate.marco.gschema.xml:105 msgid "Delay in milliseconds for the auto raise option" msgstr "" "Relambi en millisegondas per l'opcion de mesa automatica al primièr plan" #: src/org.mate.marco.gschema.xml:106 msgid "" "The time delay before raising a window if auto_raise is set to true. The " "delay is given in thousandths of a second." msgstr "" "Lo relambi abans la mesa al primièr plan de la fenèstra se l'opcion " "auto_raise a la valor VERAI. Es indicat en milens de segondas." #: src/org.mate.marco.gschema.xml:110 msgid "Current theme" msgstr "Tèma actiu" #: src/org.mate.marco.gschema.xml:111 msgid "" "The theme determines the appearance of window borders, titlebar, and so " "forth." msgstr "" "Lo tèma determina l'aparéncia de las bordaduras, de la barra de títol, etc. " "de la fenèstra." #: src/org.mate.marco.gschema.xml:115 msgid "Use standard system font in window titles" msgstr "" "Utilizar la poliça estandarda del sistèma dins los títols de las fenèstras" #: src/org.mate.marco.gschema.xml:116 msgid "" "If true, ignore the titlebar_font option, and use the standard application " "font for window titles." msgstr "" "Se VERAI, ignora l'opcion titlebar_font e utiliza la poliça estandarde de " "l'aplicacion pels títols de fenèstras." #: src/org.mate.marco.gschema.xml:120 msgid "Window title font" msgstr "Poliça de títol de las fenèstras" #: src/org.mate.marco.gschema.xml:121 msgid "" "A font description string describing a font for window titlebars. The size " "from the description will only be used if the titlebar_font_size option is " "set to 0. Also, this option is disabled if the titlebar_uses_desktop_font " "option is set to true." msgstr "" "Una cadena de descripcion de poliça descrivent una poliça per las barras de " "títol de fenèstras. La talha de la descripcion serà utilizada, çaquelà, pas " "que se l'opcion titlebar_font_size es reglada sus 0. Aquesta opcion es en " "otra desactivada se l'opcion titlebar_uses_desktop_font es reglada sus " "VERAI." #: src/org.mate.marco.gschema.xml:126 msgid "Number of workspaces" msgstr "Nombre d'espacis de trabalh" #: src/org.mate.marco.gschema.xml:127 msgid "" "Number of workspaces. Must be more than zero, and has a fixed maximum to " "prevent making the desktop unusable by accidentally asking for too many " "workspaces." msgstr "" "Nombre d'espacis de trabalh. Deu èsser superior a zèro e presenta un limit " "maximal fixar per evitar de rendre vòstre burèu inutilizable en demandant " "tròp d'espacis de trabalh." #: src/org.mate.marco.gschema.xml:131 msgid "Workspace wrap style" msgstr "" #: src/org.mate.marco.gschema.xml:132 msgid "" "The wrap style is used to determine how to switch from one workspace to " "another at the border of the workspace switcher. When set to \"no wrap\", " "nothing will happen if you try to switch to a workspace past the border of " "the workspace switcher. If set to \"classic\", the old marco behavior is " "used: the end of one row leads to the beginning of the next and the end of a" " column leads to the beginning of the next. If set to \"toroidal\", " "workspaces are connected like a doughnut: the end of each row leads to its " "own beginning and the end of each column leads to its own beginning." msgstr "" #: src/org.mate.marco.gschema.xml:136 msgid "Enable Visual Bell" msgstr "Activar la lo sonadís visual" #: src/org.mate.marco.gschema.xml:137 msgid "" "Turns on a visual indication when an application or the system issues a " "'bell' or 'beep'; useful for the hard-of-hearing and for use in noisy " "environments." msgstr "" "Activa una indicacion visuala quand una aplicacion o lo sistèma emet un bip " "; util pels malentendents e per una utilizacion dins d'environaments " "bruchoses." #: src/org.mate.marco.gschema.xml:141 msgid "System Bell is Audible" msgstr "Podètz ausir lo bip sistèma" #: src/org.mate.marco.gschema.xml:142 msgid "" "Determines whether applications or the system can generate audible 'beeps'; " "may be used in conjunction with 'visual bell' to allow silent 'beeps'." msgstr "" "Determina se las aplicacions o lo sistèma pòdon generir de bips ausibles ; " "pòt èsser utilizat en conjonccion amb « sonariá visuala » per permetre de " "bips silencioses." #: src/org.mate.marco.gschema.xml:146 msgid "Visual Bell Type" msgstr "Tipe de sonadís visual" #: src/org.mate.marco.gschema.xml:147 msgid "" "Tells Marco how to implement the visual indication that the system bell or " "another application 'bell' indicator has been rung. Currently there are two " "valid values, \"fullscreen\", which causes a fullscreen white-black flash, " "and \"frame_flash\" which causes the titlebar of the application which sent " "the bell signal to flash. If the application which sent the bell is unknown " "(as is usually the case for the default \"system beep\"), the currently " "focused window's titlebar is flashed." msgstr "" "Indica a Marco quin metòde d'indicacion visuala cal utilizar aprèp una " "sonariá del sistèma o d'una aplicacion. I a actualament doas valors " "possiblas, « fullscreen », que provòca lo cluquejament de tot l'ecran, e « " "frame_flash » que provòca lo cluquejament de la barra de títol de " "l'aplicacion qu'a mandat lo senhal de sonariá. Se l'aplicacion que manda la " "sonariá es desconeguda (es lo cas de la sonariá del sistèma per defaut), la " "barra de títol de la fenèstra qu'a actualament lo focus cluqueja." #: src/org.mate.marco.gschema.xml:151 msgid "Compositing Manager" msgstr "Gestionari de composicion" #: src/org.mate.marco.gschema.xml:152 msgid "Determines whether Marco is a compositing manager." msgstr "Determina se Marco es utilizat coma gestionari de composicion." #: src/org.mate.marco.gschema.xml:156 msgid "Fast Alt-Tab with compositing manager (disable thumbnails)" msgstr "" #: src/org.mate.marco.gschema.xml:157 msgid "" "If set to true, no window thumbnails will be displayed in the alt-tab popup " "window when the compositing manager is enabled. Application icons will be " "displayed instead. Note that on high resolution screens with many visible " "windows there can be a perceptible lag in rendering." msgstr "" #: src/org.mate.marco.gschema.xml:161 msgid "If true, trade off usability for less resource usage" msgstr "" "Se VERAI, afavorís una febla utilizacion de las ressorsas al detriment de la" " convivialitat" #: src/org.mate.marco.gschema.xml:162 msgid "" "If true, marco will give the user less feedback by using wireframes, " "avoiding animations, or other means. This is a significant reduction in " "usability for many users, but may allow legacy applications to continue " "working, and may also be a useful tradeoff for terminal servers. However, " "the wireframe feature is disabled when accessibility is on." msgstr "" "Se VERAI, Marco donarà a l'utilizaire mens de retorn d'informacions en " "utilizant de contorns en fial de fèrre, evitant d'animacions o autras " "floriduras. Aquò significa una baissa d'ergonomia per fòrça utilisatzaires " "mas pòt permetre a las vièlhas aplicacions de contunhar de foncionar, e pòt " "tanben èsser util als servidors de terminals X per melhorar las " "performàncias. Çaquelà, la foncion fial de fèrre es desactivat quand " "l'accessibilitat es activada." #: src/org.mate.marco.gschema.xml:166 msgid "" "(Not implemented) Navigation works in terms of applications not windows" msgstr "" "(pas implementat) La navigacion fonciona en tèrmes d'aplicacions e non pas " "de fenèstras" #: src/org.mate.marco.gschema.xml:167 msgid "" "If true, then Marco works in terms of applications rather than windows. The " "concept is a bit abstract, but in general an application-based setup is more" " like the Mac and less like Windows. When you focus a window in application-" "based mode, all the windows in the application will be raised. Also, in " "application-based mode, focus clicks are not passed through to windows in " "other applications. Application-based mode is, however, largely " "unimplemented at the moment." msgstr "" "Se VERAI, Marco fonciona en tèrmes d'aplicacions puslèu que de fenèstras. Lo" " concèpte es pro abstrach, mas, en general, una configuracion basada sus las" " aplicacions es mai pròcha de Mac OS que de Windows. Quand activatz una " "fenèstra en mòde basat sus las aplicacions, totas las fenèstras de " "l'aplicacion seràn mesas al primièr plan. En otra, en mòde basat sus las " "aplicacions, los clics de focus son pas transmeses a las fenèstras d'autras " "aplicacions. Pel moment, lo mòde basat sus d'aplicacions es generalament pas" " mes en òbra." #: src/org.mate.marco.gschema.xml:171 msgid "Disable misfeatures that are required by old or broken applications" msgstr "" "Desactiva los ajustaments requerits per las aplicaicons ancianas o mal " "concebudas" #: src/org.mate.marco.gschema.xml:172 msgid "" "Some applications disregard specifications in ways that result in window " "manager misfeatures. This option puts Marco in a rigorously correct mode, " "which gives a more consistent user interface, provided one does not need to " "run any misbehaving applications." msgstr "" "D'unas aplicacions negligisson las especificacions ; ne resulta un " "disfoncionament del gestionari de fenèstras. Aquesta opcion obliga Marco a " "adoptar un mòde rigorós qu'ofrís una interfàcia mai coerenta a l'utilizaire " "a condicion qu'aqueste aja pas besonh d'aviar d'aplicacions que respèctan " "pas las especificacions." #: src/org.mate.marco.gschema.xml:176 msgid "Determines if new windows are created on the center of the screen" msgstr "" #: src/org.mate.marco.gschema.xml:177 msgid "" "If set to true, new windows are opened in the center of the screen. " "Otherwise, they are opened at the top left of the screen." msgstr "" #: src/org.mate.marco.gschema.xml:181 msgid "Whether to enable window tiling" msgstr "" #: src/org.mate.marco.gschema.xml:182 msgid "" "If enabled, dropping windows on screen edges maximizes them vertically and " "resizes them horizontally to cover half of the available area. Drag-dropping" " to the top maximizes the window if allow-top-tiling is enabled." msgstr "" #: src/org.mate.marco.gschema.xml:186 msgid "Whether to maximize the window when dragged to the top of the screen" msgstr "" #: src/org.mate.marco.gschema.xml:187 msgid "" "If enabled, drag-dropping a window to the top of the screen will maximize " "it. Only works when allow-tiling is enabled." msgstr "" #: src/org.mate.marco.gschema.xml:191 msgid "Whether to enable cycling through different tile sizes" msgstr "" #: src/org.mate.marco.gschema.xml:192 msgid "" "If enabled, tiling a window will cycle through multiple different sizes by " "using the same keyboard shortcut multiple times in a row." msgstr "" #: src/org.mate.marco.gschema.xml:196 msgid "Window placement mode" msgstr "" #: src/org.mate.marco.gschema.xml:197 msgid "" "The window placement mode indicates how new windows are positioned. " "\"automatic\" means the system chooses a location automatically based on the" " space available on the desktop, or by a simple cascade if there is no " "space; \"pointer\" means that new windows are placed according to the mouse " "pointer position; \"manual\" means that the user must manually place the new" " window with the mouse or keyboard." msgstr "" #: src/org.mate.marco.gschema.xml:201 msgid "List of applications ignored by show-desktop" msgstr "" #: src/org.mate.marco.gschema.xml:202 msgid "" "Comma separated class list. Each running GUI application referenced to given" " windows manager class will be ignored by 'Show Desktop' functionality." msgstr "" #: src/org.mate.marco.gschema.xml:207 msgid "Icon size in alt-tab popup window" msgstr "" #: src/org.mate.marco.gschema.xml:208 msgid "" "Size of the application icons displayed in alt-tab popup window. The " "screen's scale factor is applied to this value." msgstr "" #: src/org.mate.marco.gschema.xml:213 msgid "Maximum number of columns in alt-tab popup window" msgstr "" #: src/org.mate.marco.gschema.xml:214 msgid "" "The popup window will be expanded to fit up to these many entries per row." msgstr "" #: src/org.mate.marco.gschema.xml:218 msgid "Expand the alt-tab popup window to fit longer window titles" msgstr "" #: src/org.mate.marco.gschema.xml:219 msgid "" "The popup window may be expanded up to the width determined by the config " "parameter 'alt-tab-max-columns'." msgstr "" #: src/org.mate.marco.gschema.xml:226 src/org.mate.marco.gschema.xml:231 #: src/org.mate.marco.gschema.xml:236 src/org.mate.marco.gschema.xml:241 #: src/org.mate.marco.gschema.xml:246 src/org.mate.marco.gschema.xml:251 #: src/org.mate.marco.gschema.xml:256 src/org.mate.marco.gschema.xml:261 #: src/org.mate.marco.gschema.xml:266 src/org.mate.marco.gschema.xml:271 #: src/org.mate.marco.gschema.xml:276 src/org.mate.marco.gschema.xml:281 #: src/org.mate.marco.gschema.xml:286 src/org.mate.marco.gschema.xml:291 #: src/org.mate.marco.gschema.xml:296 src/org.mate.marco.gschema.xml:301 #: src/org.mate.marco.gschema.xml:306 src/org.mate.marco.gschema.xml:311 #: src/org.mate.marco.gschema.xml:316 src/org.mate.marco.gschema.xml:321 #: src/org.mate.marco.gschema.xml:326 src/org.mate.marco.gschema.xml:331 #: src/org.mate.marco.gschema.xml:336 src/org.mate.marco.gschema.xml:341 #: src/org.mate.marco.gschema.xml:346 src/org.mate.marco.gschema.xml:351 #: src/org.mate.marco.gschema.xml:356 src/org.mate.marco.gschema.xml:361 #: src/org.mate.marco.gschema.xml:366 src/org.mate.marco.gschema.xml:371 #: src/org.mate.marco.gschema.xml:376 src/org.mate.marco.gschema.xml:381 #: src/org.mate.marco.gschema.xml:386 src/org.mate.marco.gschema.xml:391 #: src/org.mate.marco.gschema.xml:396 src/org.mate.marco.gschema.xml:401 msgid "Name of workspace" msgstr "Nom del espaci de trabalh" #: src/org.mate.marco.gschema.xml:227 src/org.mate.marco.gschema.xml:232 #: src/org.mate.marco.gschema.xml:237 src/org.mate.marco.gschema.xml:242 #: src/org.mate.marco.gschema.xml:247 src/org.mate.marco.gschema.xml:252 #: src/org.mate.marco.gschema.xml:257 src/org.mate.marco.gschema.xml:262 #: src/org.mate.marco.gschema.xml:267 src/org.mate.marco.gschema.xml:272 #: src/org.mate.marco.gschema.xml:277 src/org.mate.marco.gschema.xml:282 #: src/org.mate.marco.gschema.xml:287 src/org.mate.marco.gschema.xml:292 #: src/org.mate.marco.gschema.xml:297 src/org.mate.marco.gschema.xml:302 #: src/org.mate.marco.gschema.xml:307 src/org.mate.marco.gschema.xml:312 #: src/org.mate.marco.gschema.xml:317 src/org.mate.marco.gschema.xml:322 #: src/org.mate.marco.gschema.xml:327 src/org.mate.marco.gschema.xml:332 #: src/org.mate.marco.gschema.xml:337 src/org.mate.marco.gschema.xml:342 #: src/org.mate.marco.gschema.xml:347 src/org.mate.marco.gschema.xml:352 #: src/org.mate.marco.gschema.xml:357 src/org.mate.marco.gschema.xml:362 #: src/org.mate.marco.gschema.xml:367 src/org.mate.marco.gschema.xml:372 #: src/org.mate.marco.gschema.xml:377 src/org.mate.marco.gschema.xml:382 #: src/org.mate.marco.gschema.xml:387 src/org.mate.marco.gschema.xml:392 #: src/org.mate.marco.gschema.xml:397 src/org.mate.marco.gschema.xml:402 msgid "The name of a workspace." msgstr "Lo nom d'un espaci de trabalh." #: src/org.mate.marco.gschema.xml:409 src/org.mate.marco.gschema.xml:414 #: src/org.mate.marco.gschema.xml:419 src/org.mate.marco.gschema.xml:424 #: src/org.mate.marco.gschema.xml:429 src/org.mate.marco.gschema.xml:434 #: src/org.mate.marco.gschema.xml:439 src/org.mate.marco.gschema.xml:444 #: src/org.mate.marco.gschema.xml:449 src/org.mate.marco.gschema.xml:454 #: src/org.mate.marco.gschema.xml:459 src/org.mate.marco.gschema.xml:464 msgid "Run a defined command" msgstr "Executar la comanda definida" #: src/org.mate.marco.gschema.xml:410 src/org.mate.marco.gschema.xml:415 #: src/org.mate.marco.gschema.xml:420 src/org.mate.marco.gschema.xml:425 #: src/org.mate.marco.gschema.xml:430 src/org.mate.marco.gschema.xml:435 #: src/org.mate.marco.gschema.xml:440 src/org.mate.marco.gschema.xml:445 #: src/org.mate.marco.gschema.xml:450 src/org.mate.marco.gschema.xml:455 #: src/org.mate.marco.gschema.xml:460 src/org.mate.marco.gschema.xml:465 msgid "" "The keybinding that runs the correspondingly-numbered command in " "/apps/marco/keybinding_commands The format looks like \"<Control>a\" or " "\"<Shift><Alt>F1\". The parser is fairly liberal and allows lower or upper " "case, and also abbreviations such as \"<Ctl>\" and \"<Ctrl>\". If you set " "the option to the special string \"disabled\", then there will be no " "keybinding for this action." msgstr "" #: src/org.mate.marco.gschema.xml:470 src/org.mate.marco.gschema.xml:475 #: src/org.mate.marco.gschema.xml:480 src/org.mate.marco.gschema.xml:485 #: src/org.mate.marco.gschema.xml:490 src/org.mate.marco.gschema.xml:495 #: src/org.mate.marco.gschema.xml:500 src/org.mate.marco.gschema.xml:505 #: src/org.mate.marco.gschema.xml:510 src/org.mate.marco.gschema.xml:515 #: src/org.mate.marco.gschema.xml:520 src/org.mate.marco.gschema.xml:525 #: src/org.mate.marco.gschema.xml:530 src/org.mate.marco.gschema.xml:535 #: src/org.mate.marco.gschema.xml:540 src/org.mate.marco.gschema.xml:545 #: src/org.mate.marco.gschema.xml:550 src/org.mate.marco.gschema.xml:625 #: src/org.mate.marco.gschema.xml:630 src/org.mate.marco.gschema.xml:635 #: src/org.mate.marco.gschema.xml:640 src/org.mate.marco.gschema.xml:645 #: src/org.mate.marco.gschema.xml:650 src/org.mate.marco.gschema.xml:655 #: src/org.mate.marco.gschema.xml:736 src/org.mate.marco.gschema.xml:741 #: src/org.mate.marco.gschema.xml:746 src/org.mate.marco.gschema.xml:751 #: src/org.mate.marco.gschema.xml:756 src/org.mate.marco.gschema.xml:761 #: src/org.mate.marco.gschema.xml:766 src/org.mate.marco.gschema.xml:771 #: src/org.mate.marco.gschema.xml:776 src/org.mate.marco.gschema.xml:781 #: src/org.mate.marco.gschema.xml:786 src/org.mate.marco.gschema.xml:791 #: src/org.mate.marco.gschema.xml:796 src/org.mate.marco.gschema.xml:801 #: src/org.mate.marco.gschema.xml:806 src/org.mate.marco.gschema.xml:811 #: src/org.mate.marco.gschema.xml:816 src/org.mate.marco.gschema.xml:821 #: src/org.mate.marco.gschema.xml:826 src/org.mate.marco.gschema.xml:831 #: src/org.mate.marco.gschema.xml:836 src/org.mate.marco.gschema.xml:841 #: src/org.mate.marco.gschema.xml:846 src/org.mate.marco.gschema.xml:851 #: src/org.mate.marco.gschema.xml:856 src/org.mate.marco.gschema.xml:861 #: src/org.mate.marco.gschema.xml:866 src/org.mate.marco.gschema.xml:871 #: src/org.mate.marco.gschema.xml:876 src/org.mate.marco.gschema.xml:881 #: src/org.mate.marco.gschema.xml:886 src/org.mate.marco.gschema.xml:891 #: src/org.mate.marco.gschema.xml:896 src/org.mate.marco.gschema.xml:901 #: src/org.mate.marco.gschema.xml:906 src/org.mate.marco.gschema.xml:911 #: src/org.mate.marco.gschema.xml:916 src/org.mate.marco.gschema.xml:921 #: src/org.mate.marco.gschema.xml:926 src/org.mate.marco.gschema.xml:931 #: src/org.mate.marco.gschema.xml:936 src/org.mate.marco.gschema.xml:941 #: src/org.mate.marco.gschema.xml:946 src/org.mate.marco.gschema.xml:951 #: src/org.mate.marco.gschema.xml:956 src/org.mate.marco.gschema.xml:961 #: src/org.mate.marco.gschema.xml:966 src/org.mate.marco.gschema.xml:971 #: src/org.mate.marco.gschema.xml:976 src/org.mate.marco.gschema.xml:981 #: src/org.mate.marco.gschema.xml:986 src/org.mate.marco.gschema.xml:991 msgid "" "The format looks like \"<Control>a\" or \"<Shift><Alt>F1\". The parser is " "fairly liberal and allows lower or upper case, and also abbreviations such " "as \"<Ctl>\" and \"<Ctrl>\". If you set the option to the special string " "\"disabled\", then there will be no keybinding for this action." msgstr "" #: src/org.mate.marco.gschema.xml:555 src/org.mate.marco.gschema.xml:560 #: src/org.mate.marco.gschema.xml:565 src/org.mate.marco.gschema.xml:570 #: src/org.mate.marco.gschema.xml:575 src/org.mate.marco.gschema.xml:580 #: src/org.mate.marco.gschema.xml:585 src/org.mate.marco.gschema.xml:590 #: src/org.mate.marco.gschema.xml:595 src/org.mate.marco.gschema.xml:600 #: src/org.mate.marco.gschema.xml:605 src/org.mate.marco.gschema.xml:610 #: src/org.mate.marco.gschema.xml:615 src/org.mate.marco.gschema.xml:620 msgid "" "The format looks like \"<Control>a\" or \"<Shift><Alt>F1\". The parser is " "fairly liberal and allows lower or upper case, and also abbreviations such " "as \"<Ctl>\" and \"<Ctrl>\". If you set the option to the special string " "\"disabled\", then there will be no keybinding for this action. This " "keybinding may be reversed by holding down the \"shift\" key; therefore, " "\"shift\" cannot be one of the keys it uses." msgstr "" #: src/org.mate.marco.gschema.xml:559 msgid "Move backward between windows of an application, using a popup window" msgstr "" "Se desplaçar en arrièr entre las fenèstras d'una aplicacion via una fenèstra" " de primièr plan" #: src/org.mate.marco.gschema.xml:569 msgid "Move backward between windows, using a popup window" msgstr "" "Se desplaçar en arrièr entre las fenèstras via una fenèstra de primièr plan" #: src/org.mate.marco.gschema.xml:574 msgid "Move between windows on all workspaces, using a popup window" msgstr "" #: src/org.mate.marco.gschema.xml:579 msgid "Move backward between windows on all workspaces, using a popup window" msgstr "" #: src/org.mate.marco.gschema.xml:589 msgid "Move backward between panels and the desktop, using a popup window" msgstr "" "Se desplaçar en arrièr entre los tablèus de bòrd e lo burèu via una fenèstra" " de primièr plan" #: src/org.mate.marco.gschema.xml:599 msgid "Move backward between windows of an application immediately" msgstr "" "Se desplaçar immediatament en arrièr entre las fenèstras d'una aplicacion" #: src/org.mate.marco.gschema.xml:609 msgid "Move backward between windows immediately" msgstr "Se desplaçar en arrièr entre las fenèstras immediatament" #: src/org.mate.marco.gschema.xml:619 msgid "Move backward between panels and the desktop immediately" msgstr "" "Se desplaçar en arrièr entre los tablèus de bòrd e lo burèu immediatament" #: src/org.mate.marco.gschema.xml:634 msgid "Show the panel's \"Run Application\" dialog box" msgstr "" "Afichar la bóstia de dialòg « Aviar una aplicacion » del tablèu de bòrd" #: src/org.mate.marco.gschema.xml:662 src/org.mate.marco.gschema.xml:667 #: src/org.mate.marco.gschema.xml:672 src/org.mate.marco.gschema.xml:677 #: src/org.mate.marco.gschema.xml:682 src/org.mate.marco.gschema.xml:687 #: src/org.mate.marco.gschema.xml:692 src/org.mate.marco.gschema.xml:697 #: src/org.mate.marco.gschema.xml:702 src/org.mate.marco.gschema.xml:707 #: src/org.mate.marco.gschema.xml:712 src/org.mate.marco.gschema.xml:717 msgid "Commands to run in response to keybindings" msgstr "Comanda d'executar en responsa a las combinasons de tòcas" #: src/org.mate.marco.gschema.xml:663 src/org.mate.marco.gschema.xml:668 #: src/org.mate.marco.gschema.xml:673 src/org.mate.marco.gschema.xml:678 #: src/org.mate.marco.gschema.xml:683 src/org.mate.marco.gschema.xml:688 #: src/org.mate.marco.gschema.xml:693 src/org.mate.marco.gschema.xml:698 #: src/org.mate.marco.gschema.xml:703 src/org.mate.marco.gschema.xml:708 #: src/org.mate.marco.gschema.xml:713 src/org.mate.marco.gschema.xml:718 msgid "" "The /apps/marco/global_keybindings/run_command_N keys define keybindings " "that correspond to these commands. Pressing the keybinding for run_command_N" " will execute command_N." msgstr "" "Las claus /apps/marco/global_keybindings/run_command_N definisson las " "combinasons de tòcas que correspòndon a aquestas comandas. Quichatz la " "combinason per run_command_N executarà la command_N." #: src/org.mate.marco.gschema.xml:722 msgid "The screenshot command" msgstr "La comanda de captura d'ecran" #: src/org.mate.marco.gschema.xml:723 msgid "" "The /apps/marco/global_keybindings/run_command_screenshot key defines a " "keybinding which causes the command specified by this setting to be invoked." msgstr "" "La clau /apps/marco/global_keybindings/run_command_screenshot definís una " "combinason de tòcas qu'invòca la comanda indicada per aqueste reglatge." #: src/org.mate.marco.gschema.xml:727 msgid "The window screenshot command" msgstr "La comanda de captura d'ecran de fenèstra" #: src/org.mate.marco.gschema.xml:728 msgid "" "The /apps/marco/global_keybindings/run_command_window_screenshot key defines" " a keybinding which causes the command specified by this setting to be " "invoked." msgstr "" "La clau /apps/marco/global_keybindings/run_command_window_screenshot definís" " una combinason de tòcas qu'invòca la comanda indicada per aqueste reglatge." #: src/org.mate.marco.gschema.xml:750 msgid "Toggle whether a window will always be visible over other windows" msgstr "" "Activa o desactiva la proprietat d'una fenèstra d'èsser totjorn al primièr " "plan" #: src/org.mate.marco.gschema.xml:910 msgid "Tile window to north-west (upper left) corner of screen" msgstr "" #: src/org.mate.marco.gschema.xml:915 msgid "Tile window to north-east (upper right) corner of screen" msgstr "" #: src/org.mate.marco.gschema.xml:920 msgid "Tile window to south-east (lower right) corner of screen" msgstr "" #: src/org.mate.marco.gschema.xml:925 msgid "Tile window to south-west (lower left) corner of screen" msgstr "" #: src/core/bell.c:294 msgid "Bell event" msgstr "Eveniment sonariá" #: src/core/core.c:214 #, c-format msgid "Unknown window information request: %d" msgstr "Requèsta d'informacion de fenèstra desconeguda : %d" #. Translators: %s is a window title #: src/core/delete.c:96 #, c-format msgid "<tt>%s</tt> is not responding." msgstr "<tt>%s</tt> respond pas." #: src/core/delete.c:101 msgid "" "You may choose to wait a short while for it to continue or force the " "application to quit entirely." msgstr "" "Podètz esperar un moment per contunhar o insistir per quitar l'aplicacion." #: src/core/delete.c:110 msgid "_Wait" msgstr "_Esperar" #: src/core/delete.c:110 msgid "_Force Quit" msgstr "_Forçar a tampar" #: src/core/delete.c:180 #, c-format msgid "Failed to get hostname: %s\n" msgstr "Impossible d'obténer lo nom d'òste : %s\n" #: src/core/display.c:270 #, c-format msgid "Missing %s extension required for compositing" msgstr "Extension %s mancanta, mas necessària per la composicion" #: src/core/display.c:348 #, c-format msgid "Failed to open X Window System display '%s'\n" msgstr "Impossible de dobrir lo visual « %s » del sistèma X Window\n" #: src/core/keybindings.c:723 #, c-format msgid "" "Some other program is already using the key %s with modifiers %x as a " "binding\n" msgstr "" "Un autre programa utiliza ja la clau %s amb los modificators %x coma " "ligason\n" #. Displayed when a keybinding which is #. * supposed to launch a program fails. #: src/core/keybindings.c:2396 #, c-format msgid "" "There was an error running <tt>%s</tt>:\n" "\n" "%s" msgstr "" "I a agut una error al moment de l'execucion de <tt>%s</tt> :\n" "\n" "%s" #: src/core/keybindings.c:2485 #, c-format msgid "No command %d has been defined.\n" msgstr "Pas cap de comanda %d definida.\n" #: src/core/keybindings.c:3595 msgid "No terminal command has been defined.\n" msgstr "Pas cap de comanda de terminal definida.\n" #: src/core/keybindings.c:3735 msgid "<tt>Rename Workspace</tt>" msgstr "<tt>Renommar espaci de trabalh</tt>" #: src/core/keybindings.c:3736 msgid "New Workspace Name:" msgstr "Nom del novèl espaci de trabalh :" #: src/core/keybindings.c:3747 msgid "OK" msgstr "D’acòrdi" #: src/core/keybindings.c:3747 msgid "Cancel" msgstr "Anullar" #: src/core/main.c:132 #, c-format msgid "" "marco %s\n" "Copyright (C) 2001-%s Havoc Pennington, Red Hat, Inc., and others\n" "This is free software; see the source for copying conditions.\n" "There is NO warranty; not even for MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.\n" msgstr "" "marco %s\n" "Copyright © 2001-%s Havoc Pennington, Red Hat, Inc., e autres.\n" "Aquò es un logicial liure ; consultatz lo còde font per las\n" "condicions de còpia.\n" "I a PAS CAP de garantia ; quitament pas de VALOR MERCANDA o\n" "d'ADEQÜACION A UN USATGE PARTICULAR.\n" #: src/core/main.c:270 msgid "Disable connection to session manager" msgstr "Desactivar la connexion al gestionari de sesilhas" #: src/core/main.c:276 msgid "Replace the running window manager with Marco" msgstr "Remplaçar lo gestionari de fenèstras actiu per Marco" #: src/core/main.c:282 msgid "Specify session management ID" msgstr "Indicar l'ID de gestion de sesilha" #: src/core/main.c:287 msgid "X Display to use" msgstr "Visual X d'utilizar" #: src/core/main.c:293 msgid "Initialize session from savefile" msgstr "Inicializar la sesilha dempuèi lo fichièr de salvament" #: src/core/main.c:299 msgid "Print version" msgstr "Afichar la version" #: src/core/main.c:305 msgid "Make X calls synchronous" msgstr "Rendre los apèls X sincròns" #: src/core/main.c:311 msgid "Turn compositing on" msgstr "Activar la composicion" #: src/core/main.c:317 msgid "Turn compositing off" msgstr "Desactivar la composicion" #: src/core/main.c:323 msgid "" "Don't make fullscreen windows that are maximized and have no decorations" msgstr "" "Metre pas en ecran complet de fenèstras que son maximizadas e qu'an pas de " "decoracions" #: src/core/main.c:522 #, c-format msgid "Failed to scan themes directory: %s\n" msgstr "Lo percors del repertòri de tèmas a pas capitat : %s\n" #: src/core/main.c:538 #, c-format msgid "" "Could not find a theme! Be sure %s exists and contains the usual themes.\n" msgstr "" "Impossible de trobar un tèma ! Asseguratz-vos que %s existís e conten los " "tèmas costumièrs.\n" #: src/core/main.c:597 #, c-format msgid "Failed to restart: %s\n" msgstr "Impossible de tornar aviar : %s\n" #. FIXME: check if this can be avoided by GSettings #. FIXME! GSettings, instead of MateConf, has Minimum/Maximun in schema! #. * But some preferences depends on costants for minimum/maximum values #: src/core/prefs.c:641 src/core/prefs.c:794 #, c-format msgid "%d stored in GSettings key %s is out of range %d to %d\n" msgstr "" #: src/core/prefs.c:1088 msgid "" "Workarounds for broken applications disabled. Some applications may not " "behave properly.\n" msgstr "" "Solucions de cambi desactivadas per las aplicacions damatjadas. Es possible " "que d'unas aplicacions se compòrten pas corrèctament.\n" #: src/core/prefs.c:1194 #, c-format msgid "Could not parse font description \"%s\" from GSettings key %s\n" msgstr "" #: src/core/prefs.c:1256 #, c-format msgid "" "\"%s\" found in configuration database is not a valid value for mouse button" " modifier\n" msgstr "" "« %s » trobada dins la banca de donadas de configuracion es pas una valor " "corrècta pel boton de mirga\n" #: src/core/prefs.c:1844 #, c-format msgid "" "\"%s\" found in configuration database is not a valid value for keybinding " "\"%s\"\n" msgstr "" "« %s » trobat dins la banca de donadas de configuracion es pas una valor " "corrècta per la combinason de tòcas « %s »\n" #: src/core/prefs.c:2147 #, c-format msgid "Workspace %d" msgstr "Espaci de trabalh %d" #: src/core/screen.c:362 #, c-format msgid "Screen %d on display '%s' is invalid\n" msgstr "L'ecran %d sul visual « %s » es pas valid\n" #: src/core/screen.c:378 #, c-format msgid "" "Screen %d on display \"%s\" already has a window manager; try using the " "--replace option to replace the current window manager.\n" msgstr "" "L'ecran %d sul visual « %s » a ja un gestionari de fenèstras ; ensajatz " "d'utilizar l'opcion --replace per remplaçar lo gestionari de fenèstras " "actual.\n" #: src/core/screen.c:405 #, c-format msgid "Could not acquire window manager selection on screen %d display \"%s\"\n" msgstr "" "Impossible d'aver la seleccion del gestionari de fenèstras sus l'ecran %d " "del visual « %s »\n" #: src/core/screen.c:463 #, c-format msgid "Screen %d on display \"%s\" already has a window manager\n" msgstr "L'ecran %d sul visual « %s » a ja un gestionari de fenèstras\n" #: src/core/screen.c:677 #, c-format msgid "Could not release screen %d on display \"%s\"\n" msgstr "Impossible de liberar l'ecran %d sul visual « %s »\n" #: src/core/session.c:842 src/core/session.c:849 #, c-format msgid "Could not create directory '%s': %s\n" msgstr "Impossible de crear lo repertòri '%s' : %s\n" #: src/core/session.c:859 #, c-format msgid "Could not open session file '%s' for writing: %s\n" msgstr "Impossible de dobrir lo fichièr de sesilha « %s » en escritura : %s\n" #: src/core/session.c:999 #, c-format msgid "Error writing session file '%s': %s\n" msgstr "Error al moment d'escriure lo fichièr de session '%s' : %s\n" #: src/core/session.c:1004 #, c-format msgid "Error closing session file '%s': %s\n" msgstr "Error al moment de la tampadura del fichièr de sesilha « %s » : %s\n" #: src/core/session.c:1134 #, c-format msgid "Failed to parse saved session file: %s\n" msgstr "L'analsi del fichièr de sesilha enregistrat a fracassat : %s\n" #: src/core/session.c:1183 msgid "<marco_session> attribute seen but we already have the session ID" msgstr "" "L'atribut <marco_session> es estat trobat, mas avèm ja l'ID de sesilha" #: src/core/session.c:1196 src/core/session.c:1271 src/core/session.c:1303 #: src/core/session.c:1375 src/core/session.c:1435 #, c-format msgid "Unknown attribute %s on <%s> element" msgstr "Atribut %s desconegut sus l'element <%s>" #: src/core/session.c:1213 msgid "nested <window> tag" msgstr "balisa <window> imbricada" #: src/core/session.c:1455 #, c-format msgid "Unknown element %s" msgstr "Element %s desconegut" #: src/core/session.c:1807 msgid "" "These windows do not support &quot;save current setup&quot; and will have to" " be restarted manually next time you log in." msgstr "" "Aquestas fenèstras prenon pas en carga « l'enregistrament de la " "configuracion actuala » e deuràn èsser reaviadas manualament a la connexion " "venenta." #: src/core/util.c:101 #, c-format msgid "Failed to open debug log: %s\n" msgstr "La dobertura del jornal de debogatge a fracassat : %s\n" #: src/core/util.c:111 #, c-format msgid "Failed to fdopen() log file %s: %s\n" msgstr "" "L'execucion de la comanda fdopen() sul fichièr jornal %s a fracassat : %s\n" #: src/core/util.c:117 #, c-format msgid "Opened log file %s\n" msgstr "Dobertura del fichièr jornal %s\n" #: src/core/util.c:136 src/tools/marco-message.c:176 msgid "Marco was compiled without support for verbose mode\n" msgstr "Marco es estat compilat sens la presa en carga del mòde charraire\n" #: src/core/util.c:227 msgid "Window manager: " msgstr "Gestionari de fenèstras : " #: src/core/util.c:379 msgid "Bug in window manager: " msgstr "Anomalia dins lo gestionari de fenèstras : " #: src/core/util.c:412 msgid "Window manager warning: " msgstr "Alèrta del gestionari de fenèstras : " #: src/core/util.c:440 msgid "Window manager error: " msgstr "Error de gestionari de fenèstras : " #. Translators: This is the title used on dialog boxes #: src/core/util.c:560 src/core/util.c:658 src/marco.desktop.in:4 #: src/marco-wm.desktop.in:4 msgid "Marco" msgstr "Marco" #. first time through #: src/core/window.c:6004 #, c-format msgid "" "Window %s sets SM_CLIENT_ID on itself, instead of on the WM_CLIENT_LEADER " "window as specified in the ICCCM.\n" msgstr "" "La fenèstra %s posiciona SM_CLIENT_ID sus ela meteissa, al luòc de la " "posicionar sus la fenèstra WM_CLIENT_LEADER coma indicat dins l'ICCCM.\n" #. We ignore mwm_has_resize_func because WM_NORMAL_HINTS is the #. * authoritative source for that info. Some apps such as mplayer or #. * xine disable resize via MWM but not WM_NORMAL_HINTS, but that #. * leads to e.g. us not fullscreening their windows. Apps that set #. * MWM but not WM_NORMAL_HINTS are basically broken. We complain #. * about these apps but make them work. #: src/core/window.c:6582 #, c-format msgid "" "Window %s sets an MWM hint indicating it isn't resizable, but sets min size " "%d x %d and max size %d x %d; this doesn't make much sense.\n" msgstr "" "La fenèstra %s posiciona un indici MWM qu'indica qu'es pas redimensionabla, " "mas posiciona una talha minimala de %d x %d e una talha maximala de %d x %d " "; aquò a pas gaire de sens.\n" #: src/core/window-props.c:306 #, c-format msgid "Application set a bogus _NET_WM_PID %lu\n" msgstr "L'aplicacion a definit un _NET_WM_PID %lu erronèu\n" #. Translators: the title of a window from another machine #: src/core/window-props.c:457 #, c-format msgid "%s (on %s)" msgstr "%s (sus %s)" #. Simple case-- don't bother to look it up. It's root. #: src/core/window-props.c:489 #, c-format msgid "%s (as superuser)" msgstr "%s (al nom del superutilizaire)" #. Translators: the title of a window owned by another user #. * on this machine #: src/core/window-props.c:507 #, c-format msgid "%s (as %s)" msgstr "%s (al nom de %s)" #. Translators: the title of a window owned by another user #. * on this machine, whose name we don't know #: src/core/window-props.c:513 #, c-format msgid "%s (as another user)" msgstr "%s (al nom d'un autre utilizaire)" #: src/core/window-props.c:1499 #, c-format msgid "Invalid WM_TRANSIENT_FOR window 0x%lx specified for %s.\n" msgstr "Fenèstra WM_TRANSIENT_FOR 0x%lx invalida indicada per %s.\n" #: src/core/xprops.c:155 #, c-format msgid "" "Window 0x%lx has property %s\n" "that was expected to have type %s format %d\n" "and actually has type %s format %d n_items %d.\n" "This is most likely an application bug, not a window manager bug.\n" "The window has title=\"%s\" class=\"%s\" name=\"%s\"\n" msgstr "" "La fenèstra 0x%lx a la proprietat %s\n" "que deuriá aver lo tipe %s e lo format %d\n" "e a, en fach lo tipe %s e lo format %d n_items %d\n" "Es probablament un bug de l'aplicacion, e non pas del gestionari\n" "de fenèstras.\n" "Lo títol de la fenèstra es=\"%s\" sa classa=\"%s\" e son nom=\"%s\"\n" #: src/core/xprops.c:411 #, c-format msgid "Property %s on window 0x%lx contained invalid UTF-8\n" msgstr "La proprietat %s de la fenèstra 0x%lx conten un còde UTF-8 invalid\n" #: src/core/xprops.c:494 #, c-format msgid "" "Property %s on window 0x%lx contained invalid UTF-8 for item %d in the " "list\n" msgstr "" "La proprietat %s de la fenèstra 0x%lx conten un còde UTF-8 invalid per " "l'element %d dins la lista\n" #: src/tools/marco-message.c:150 #, c-format msgid "Usage: %s\n" msgstr "Sintaxi : %s\n" #: src/ui/frames.c:1338 msgid "Close Window" msgstr "Tampar la fenèstra" #: src/ui/frames.c:1341 msgid "Window Menu" msgstr "Menut Fenèstra" #: src/ui/frames.c:1344 msgid "Window App Menu" msgstr "" #: src/ui/frames.c:1347 msgid "Minimize Window" msgstr "Redusir la fenèstra" #: src/ui/frames.c:1350 msgid "Maximize Window" msgstr "Maximizar la fenèstra" #: src/ui/frames.c:1353 msgid "Restore Window" msgstr "Restablir la fenèstra" #: src/ui/frames.c:1356 msgid "Roll Up Window" msgstr "Repligar la fenèstra" #: src/ui/frames.c:1359 msgid "Unroll Window" msgstr "Desplegar la fenèstra" #: src/ui/frames.c:1362 msgid "Keep Window On Top" msgstr "Gardar la fenèstra al primièr plan" #: src/ui/frames.c:1365 msgid "Remove Window From Top" msgstr "Levar la fenèstra del primièr plan" #: src/ui/frames.c:1368 msgid "Always On Visible Workspace" msgstr "Totjorn sul espaci de trabalh visible" #: src/ui/frames.c:1371 msgid "Put Window On Only One Workspace" msgstr "Metre la fenèstra sus un sol espaci de trabalh" #. Translators: Translate this string the same way as you do in libwnck! #: src/ui/menu.c:65 msgid "Mi_nimize" msgstr "Red_uire" #. Translators: Translate this string the same way as you do in libwnck! #: src/ui/menu.c:67 msgid "Ma_ximize" msgstr "Ma_ximizar" #. Translators: Translate this string the same way as you do in libwnck! #: src/ui/menu.c:69 msgid "Unma_ximize" msgstr "R_establir" #. Translators: Translate this string the same way as you do in libwnck! #: src/ui/menu.c:71 msgid "Roll _Up" msgstr "Repl_egar" #. Translators: Translate this string the same way as you do in libwnck! #: src/ui/menu.c:73 msgid "_Unroll" msgstr "_Desplegar" #. Translators: Translate this string the same way as you do in libwnck! #: src/ui/menu.c:75 msgid "_Move" msgstr "_Desplaçar" #. Translators: Translate this string the same way as you do in libwnck! #: src/ui/menu.c:77 msgid "_Resize" msgstr "_Redimensionar" #. Translators: Translate this string the same way as you do in libwnck! #: src/ui/menu.c:79 msgid "Move Titlebar On_screen" msgstr "Desplaçar la barra de títol sus l'e_cran" #. separator #. Translators: Translate this string the same way as you do in libwnck! #: src/ui/menu.c:82 src/ui/menu.c:84 msgid "Always on _Top" msgstr "Totjorn al _primièr plan" #. Translators: Translate this string the same way as you do in libwnck! #: src/ui/menu.c:86 msgid "_Always on Visible Workspace" msgstr "_Totjorn sul espaci de trabalh visible" #. Translators: Translate this string the same way as you do in libwnck! #: src/ui/menu.c:88 msgid "_Only on This Workspace" msgstr "_Sonque sus aqueste espaci de trabalh" #. Translators: Translate this string the same way as you do in libwnck! #: src/ui/menu.c:90 msgid "Move to Workspace _Left" msgstr "Desplaçar cap a l'espaci de trabalh d'_esquèrra" #. Translators: Translate this string the same way as you do in libwnck! #: src/ui/menu.c:92 msgid "Move to Workspace R_ight" msgstr "Desplaçar cap a l'espaci de trabalh de _drecha" #. Translators: Translate this string the same way as you do in libwnck! #: src/ui/menu.c:94 msgid "Move to Workspace _Up" msgstr "Desplaçar dins l'espaci de trabalh _superior" #. Translators: Translate this string the same way as you do in libwnck! #: src/ui/menu.c:96 msgid "Move to Workspace _Down" msgstr "Desplaçar dins l'espaci de trabalh _inferior" #. separator #. Translators: Translate this string the same way as you do in libwnck! #: src/ui/menu.c:100 msgid "_Close" msgstr "_Tampar" #: src/ui/menu.c:197 #, c-format msgid "Workspace %d%n" msgstr "Espaci de trabalh %d%n" #: src/ui/menu.c:207 msgid "Workspace 1_0" msgstr "Espaci de trabalh 1_0" #: src/ui/menu.c:209 #, c-format msgid "Workspace %s%d" msgstr "Espaci de trabalh %s%d" #: src/ui/menu.c:388 msgid "Move to Another _Workspace" msgstr "Desplaçar cap a un autre _espaci de trabalh" #. This is the text that should appear next to menu accelerators #. * that use the shift key. If the text on this key isn't typically #. * translated on keyboards used for your language, don't translate #. * this. #: src/ui/metaaccellabel.c:80 msgid "Shift" msgstr "Shift" #. This is the text that should appear next to menu accelerators #. * that use the control key. If the text on this key isn't typically #. * translated on keyboards used for your language, don't translate #. * this. #: src/ui/metaaccellabel.c:86 msgid "Ctrl" msgstr "Ctrl" #. This is the text that should appear next to menu accelerators #. * that use the alt key. If the text on this key isn't typically #. * translated on keyboards used for your language, don't translate #. * this. #: src/ui/metaaccellabel.c:92 msgid "Alt" msgstr "Alt" #. This is the text that should appear next to menu accelerators #. * that use the meta key. If the text on this key isn't typically #. * translated on keyboards used for your language, don't translate #. * this. #: src/ui/metaaccellabel.c:98 msgid "Meta" msgstr "Meta" #. This is the text that should appear next to menu accelerators #. * that use the super key. If the text on this key isn't typically #. * translated on keyboards used for your language, don't translate #. * this. #: src/ui/metaaccellabel.c:104 msgid "Super" msgstr "Super" #. This is the text that should appear next to menu accelerators #. * that use the hyper key. If the text on this key isn't typically #. * translated on keyboards used for your language, don't translate #. * this. #: src/ui/metaaccellabel.c:110 msgid "Hyper" msgstr "Iper" #. This is the text that should appear next to menu accelerators #. * that use the mod2 key. If the text on this key isn't typically #. * translated on keyboards used for your language, don't translate #. * this. #: src/ui/metaaccellabel.c:116 msgid "Mod2" msgstr "Mod2" #. This is the text that should appear next to menu accelerators #. * that use the mod3 key. If the text on this key isn't typically #. * translated on keyboards used for your language, don't translate #. * this. #: src/ui/metaaccellabel.c:122 msgid "Mod3" msgstr "Mod3" #. This is the text that should appear next to menu accelerators #. * that use the mod4 key. If the text on this key isn't typically #. * translated on keyboards used for your language, don't translate #. * this. #: src/ui/metaaccellabel.c:128 msgid "Mod4" msgstr "Mod4" #. This is the text that should appear next to menu accelerators #. * that use the mod5 key. If the text on this key isn't typically #. * translated on keyboards used for your language, don't translate #. * this. #: src/ui/metaaccellabel.c:134 msgid "Mod5" msgstr "Mod5" #. Translators: This represents the size of a window. The first number is #. * the width of the window and the second is the height. #: src/ui/resizepopup.c:117 #, c-format msgid "%d x %d" msgstr "%d x %d" #: src/ui/theme.c:366 msgid "top" msgstr "naut" #: src/ui/theme.c:368 msgid "bottom" msgstr "bas" #: src/ui/theme.c:370 msgid "left" msgstr "esquèrra" #: src/ui/theme.c:372 msgid "right" msgstr "drecha" #: src/ui/theme.c:399 #, c-format msgid "frame geometry does not specify \"%s\" dimension" msgstr "la geometria del quadre indica pas la dimension « %s »" #: src/ui/theme.c:418 #, c-format msgid "frame geometry does not specify dimension \"%s\" for border \"%s\"" msgstr "" "la geometria del quadre indica pas la dimension « %s » per la bordadura « %s" " »" #: src/ui/theme.c:455 #, c-format msgid "Button aspect ratio %g is not reasonable" msgstr "La proporcion del boton %g es pas rasonabla" #: src/ui/theme.c:467 msgid "Frame geometry does not specify size of buttons" msgstr "La geometria del quadre indica pas la talha dels botons" #: src/ui/theme.c:1227 msgid "Gradients should have at least two colors" msgstr "Los degradats devon comportar al mens doas colors" #: src/ui/theme.c:1397 #, c-format msgid "" "GTK custom color specification must have color name and fallback in " "parentheses, e.g. gtk:custom(foo,bar); could not parse \"%s\"" msgstr "" #: src/ui/theme.c:1413 #, c-format msgid "" "Invalid character '%c' in color_name parameter of gtk:custom, only " "A-Za-z0-9-_ are valid" msgstr "" #: src/ui/theme.c:1427 #, c-format msgid "" "Gtk:custom format is \"gtk:custom(color_name,fallback)\", \"%s\" does not " "fit the format" msgstr "" #: src/ui/theme.c:1471 #, c-format msgid "" "GTK color specification must have the state in brackets, e.g. gtk:fg[NORMAL]" " where NORMAL is the state; could not parse \"%s\"" msgstr "" "L'especificacion de color GTK deu presentar l'estat entre croquets, p. ex. " "gtk:fg[NORMAL] ont NORMAL es l'estat ; impossible d'analisar « %s »" #: src/ui/theme.c:1485 #, c-format msgid "" "GTK color specification must have a close bracket after the state, e.g. " "gtk:fg[NORMAL] where NORMAL is the state; could not parse \"%s\"" msgstr "" "L'especificacion de color GTK deu comportar un croquet de tampadura aprèp " "l'estat, p. ex. gtk:fg[NORMAL] ont NORMAL es l'estat ; impossible d'analisar" " « %s »" #: src/ui/theme.c:1496 #, c-format msgid "Did not understand state \"%s\" in color specification" msgstr "Impossible de comprene l'estat « %s » dins l'especificacion de color" #: src/ui/theme.c:1509 #, c-format msgid "Did not understand color component \"%s\" in color specification" msgstr "" "Impossible de comprene lo compausant de color « %s » dins l'especificacion " "de color" #: src/ui/theme.c:1537 #, c-format msgid "" "Blend format is \"blend/bg_color/fg_color/alpha\", \"%s\" does not fit the " "format" msgstr "" "Lo format de mescla es « blend/bg_color/fg_color/alpha », « %s » correspond " "pas a aqueste format ." #: src/ui/theme.c:1548 #, c-format msgid "Could not parse alpha value \"%s\" in blended color" msgstr "Impossible d'analisar la valor alfa « %s » en color mesclada" #: src/ui/theme.c:1558 #, c-format msgid "Alpha value \"%s\" in blended color is not between 0.0 and 1.0" msgstr "" "La valor alfa « %s » en color mesclada es pas compresa entre 0,0 e 1,0" #: src/ui/theme.c:1604 #, c-format msgid "Shade format is \"shade/base_color/factor\", \"%s\" does not fit the format" msgstr "" "Lo format d'ombra es « shade/base_color/factor », « %s » correspond pas al " "format" #: src/ui/theme.c:1615 #, c-format msgid "Could not parse shade factor \"%s\" in shaded color" msgstr "Impossible d'analisar lo factor d'ombra « %s » en color ombrada" #: src/ui/theme.c:1625 #, c-format msgid "Shade factor \"%s\" in shaded color is negative" msgstr "Lo factor d'ombra « %s » en color ombrada es negatiu" #: src/ui/theme.c:1654 #, c-format msgid "Could not parse color \"%s\"" msgstr "Impossible d'analisar la color « %s »" #: src/ui/theme.c:2003 #, c-format msgid "Coordinate expression contains character '%s' which is not allowed" msgstr "" "L'expression de la coordenada conten lo caractèr « %s » qu'es pas autorizat" #: src/ui/theme.c:2030 #, c-format msgid "" "Coordinate expression contains floating point number '%s' which could not be" " parsed" msgstr "" "L'expression de la coordenada conten la valor en virgula flotanta « %s » que" " pòt pas èsser analisada" #: src/ui/theme.c:2044 #, c-format msgid "Coordinate expression contains integer '%s' which could not be parsed" msgstr "" "L'expression de la coordenada conten l'entièr « %s » qu'a pas pogut èsser " "analisat" #: src/ui/theme.c:2166 #, c-format msgid "" "Coordinate expression contained unknown operator at the start of this text: " "\"%s\"" msgstr "" "L'expression de la coordenada conteniá un operador desconegut al començament" " d'aqueste tèxte : « %s »" #: src/ui/theme.c:2223 msgid "Coordinate expression was empty or not understood" msgstr "L'expression de la coordenada èra voida o incompresa" #: src/ui/theme.c:2334 src/ui/theme.c:2344 src/ui/theme.c:2378 msgid "Coordinate expression results in division by zero" msgstr "L'expression de la coordenada provòca una division per zèro" #: src/ui/theme.c:2386 msgid "" "Coordinate expression tries to use mod operator on a floating-point number" msgstr "" "L'expression de la coordenada tempta d'utilizar l'operadour mod sus una " "valor en virgula flotanta" #: src/ui/theme.c:2442 #, c-format msgid "Coordinate expression has an operator \"%s\" where an operand was expected" msgstr "" "L'expression de la coordenada a un operador « %s » lai ont un operand èra " "esperat" #: src/ui/theme.c:2451 msgid "Coordinate expression had an operand where an operator was expected" msgstr "" "L'expression de la coordenada a un operand lai ont un operador èra esperat" #: src/ui/theme.c:2459 msgid "Coordinate expression ended with an operator instead of an operand" msgstr "" "L'expression de la coordenada èra acabada per un operador al luòc d'un " "operand" #: src/ui/theme.c:2469 #, c-format msgid "" "Coordinate expression has operator \"%c\" following operator \"%c\" with no " "operand in between" msgstr "" "L'expression de la coordenada a un operador « %c » segon l'operador « %c » " "sens operand entre eles" #: src/ui/theme.c:2620 src/ui/theme.c:2665 #, c-format msgid "Coordinate expression had unknown variable or constant \"%s\"" msgstr "" "L'expression de la coordenada possedís una variabla o constanta desconeguda " "« %s »" #: src/ui/theme.c:2719 msgid "Coordinate expression parser overflowed its buffer." msgstr "" "L'analisador d'expression de coordenadas a despassat la capacitat de son " "tampon." #: src/ui/theme.c:2748 msgid "Coordinate expression had a close parenthesis with no open parenthesis" msgstr "" "L'expression de la coordenada compòrta una parentèsi de tampadura, mas pas " "de parentèsi de dobertura" #: src/ui/theme.c:2812 msgid "" "Coordinate expression had an open parenthesis with no close parenthesis" msgstr "" "L'expression de la coordenada compòrta una parentèsi de dobertura, mas pas " "de parentèsi de tampadura" #: src/ui/theme.c:2823 msgid "Coordinate expression doesn't seem to have any operators or operands" msgstr "" "L'expression de la coordenada sembla pas comprene d'operador ni d'operand" #: src/ui/theme.c:3027 src/ui/theme.c:3047 src/ui/theme.c:3067 #, c-format msgid "Theme contained an expression that resulted in an error: %s\n" msgstr "Lo tèma conten una expression qu'a provocat una error : %s\n" #: src/ui/theme.c:4857 #, c-format msgid "" "<button function=\"%s\" state=\"%s\" draw_ops=\"whatever\"/> must be " "specified for this frame style" msgstr "" "<button function=\"%s\" state=\"%s\" draw_ops=\"whatever\"/> deu èsser " "indicat per aqueste estil de quadre" #: src/ui/theme.c:5393 src/ui/theme.c:5418 #, c-format msgid "Missing <frame state=\"%s\" resize=\"%s\" focus=\"%s\" style=\"whatever\"/>" msgstr "<frame state=\"%s\" resize=\"%s\" focus=\"%s\" style=\"whatever\"/> mancant" #: src/ui/theme.c:5462 #, c-format msgid "Failed to load theme \"%s\": %s\n" msgstr "Impossible de cargar lo tèma \"%s\" : %s\n" #: src/ui/theme.c:5594 src/ui/theme.c:5601 src/ui/theme.c:5608 #: src/ui/theme.c:5615 src/ui/theme.c:5622 #, c-format msgid "No <%s> set for theme \"%s\"" msgstr "Pas cap de <%s> definit pel tèma « %s »" #: src/ui/theme.c:5630 #, c-format msgid "" "No frame style set for window type \"%s\" in theme \"%s\", add a <window " "type=\"%s\" style_set=\"whatever\"/> element" msgstr "" "Cap d'estil de quadre pas definit pel tipe de fenèstra « %s » dins lo tèma «" " %s », apondètz un element <window type=\"%s\" style_set=\"whatever\"/>" #: src/ui/theme.c:6045 src/ui/theme.c:6107 src/ui/theme.c:6170 #, c-format msgid "User-defined constants must begin with a capital letter; \"%s\" does not" msgstr "" "Las constantas definidas per l'utilizaire devon començar per una majuscula ;" " « %s » comença per una minuscula" #: src/ui/theme.c:6053 src/ui/theme.c:6115 src/ui/theme.c:6178 #, c-format msgid "Constant \"%s\" has already been defined" msgstr "La constanta « %s » es ja estada definida" #. Translators: This means that an attribute which should have been found #. * on an XML element was not in fact found. #: src/ui/theme-parser.c:252 #, c-format msgid "No \"%s\" attribute on element <%s>" msgstr "Pas cap d'atribut « %s » sus l'element <%s>" #: src/ui/theme-parser.c:281 src/ui/theme-parser.c:299 #, c-format msgid "Line %d character %d: %s" msgstr "Linha %d caractèr %d : %s" #: src/ui/theme-parser.c:499 #, c-format msgid "Attribute \"%s\" repeated twice on the same <%s> element" msgstr "L'atribut « %s » es repetit dos còps dins lo meteis element <%s>" #: src/ui/theme-parser.c:523 src/ui/theme-parser.c:572 #, c-format msgid "Attribute \"%s\" is invalid on <%s> element in this context" msgstr "L'atribut « %s » es invalid dins l'element <%s> dins aqueste contèxte" #: src/ui/theme-parser.c:614 #, c-format msgid "Could not parse \"%s\" as an integer" msgstr "Impossible d'analizar '%s' coma entièr" #: src/ui/theme-parser.c:623 src/ui/theme-parser.c:678 #, c-format msgid "Did not understand trailing characters \"%s\" in string \"%s\"" msgstr "Caractèrs de fin « %s » pas compreses dins la cadena « %s »" #: src/ui/theme-parser.c:633 #, c-format msgid "Integer %ld must be positive" msgstr "L'entièr %ld deu èsser positiu" #: src/ui/theme-parser.c:641 #, c-format msgid "Integer %ld is too large, current max is %d" msgstr "L'entièr %ld es tròp elevat, lo max. actual es %d" #: src/ui/theme-parser.c:669 src/ui/theme-parser.c:785 #, c-format msgid "Could not parse \"%s\" as a floating point number" msgstr "Impossible d'analisar « %s » en tant que valor en virgula flotanta" #: src/ui/theme-parser.c:700 src/ui/theme-parser.c:728 #, c-format msgid "Boolean values must be \"true\" or \"false\" not \"%s\"" msgstr "" "Las valors booleanas devon èsser « true » o « false » e non pas « %s »" #: src/ui/theme-parser.c:755 #, c-format msgid "Angle must be between 0.0 and 360.0, was %g\n" msgstr "L'angle deu èsser entre 0,0 e 360,0. Èra de %g\n" #: src/ui/theme-parser.c:818 #, c-format msgid "Alpha must be between 0.0 (invisible) and 1.0 (fully opaque), was %g\n" msgstr "" "La valor alfa deu èsser compresa entre 0,0 (invisible) e 1,0 (entièrament " "opaca). Èra de %g\n" #: src/ui/theme-parser.c:883 #, c-format msgid "" "Invalid title scale \"%s\" (must be one of xx-" "small,x-small,small,medium,large,x-large,xx-large)\n" msgstr "" "Escala de títol invalida « %s » (deu aver una de las valors seguentas : xx-" "small, x-small, small, medium,large, x-large, xx-large)\n" #: src/ui/theme-parser.c:1039 src/ui/theme-parser.c:1102 #: src/ui/theme-parser.c:1136 src/ui/theme-parser.c:1239 #, c-format msgid "<%s> name \"%s\" used a second time" msgstr "<%s> - nom « %s » utilizat un segond còp" #: src/ui/theme-parser.c:1051 src/ui/theme-parser.c:1148 #: src/ui/theme-parser.c:1251 #, c-format msgid "<%s> parent \"%s\" has not been defined" msgstr "<%s> - parent « %s » pas definit" #: src/ui/theme-parser.c:1161 #, c-format msgid "<%s> geometry \"%s\" has not been defined" msgstr "<%s> - geometria « %s » pas definida" #: src/ui/theme-parser.c:1174 #, c-format msgid "<%s> must specify either a geometry or a parent that has a geometry" msgstr "<%s> deu indicar una geometria o un parent que ne possedís una" #: src/ui/theme-parser.c:1216 msgid "You must specify a background for an alpha value to be meaningful" msgstr "Vos cal indicar una valor pel paramètre alfa." #: src/ui/theme-parser.c:1284 #, c-format msgid "Unknown type \"%s\" on <%s> element" msgstr "Tipe desconegut \"%s\" sul element <%s>" #: src/ui/theme-parser.c:1295 #, c-format msgid "Unknown style_set \"%s\" on <%s> element" msgstr "style_set desconegut « %s » sus l'element <%s>" #: src/ui/theme-parser.c:1303 #, c-format msgid "Window type \"%s\" has already been assigned a style set" msgstr "Lo tipe de fenèstra « %s » ja a agut un jòc d'estils atribuit" #: src/ui/theme-parser.c:1333 src/ui/theme-parser.c:1397 #: src/ui/theme-parser.c:1623 src/ui/theme-parser.c:2858 #: src/ui/theme-parser.c:2904 src/ui/theme-parser.c:3062 #: src/ui/theme-parser.c:3298 src/ui/theme-parser.c:3336 #: src/ui/theme-parser.c:3374 src/ui/theme-parser.c:3391 #: src/ui/theme-parser.c:3407 src/ui/theme-parser.c:3444 #, c-format msgid "Element <%s> is not allowed below <%s>" msgstr "L'element <%s> es pas autorizat en dejós de <%s>" #: src/ui/theme-parser.c:1447 src/ui/theme-parser.c:1461 #: src/ui/theme-parser.c:1506 msgid "" "Cannot specify both \"button_width\"/\"button_height\" and \"aspect_ratio\" " "for buttons" msgstr "" "Impossible d'indicar a l'encòp « button_width » / « button_height » " "(largor/nautor) e « aspect_ratio » (proporcion) pels botons" #: src/ui/theme-parser.c:1470 #, c-format msgid "Distance \"%s\" is unknown" msgstr "Distància \"%s\" desconeguda" #: src/ui/theme-parser.c:1515 #, c-format msgid "Aspect ratio \"%s\" is unknown" msgstr "Proporcion « %s » desconeguda" #: src/ui/theme-parser.c:1577 #, c-format msgid "Border \"%s\" is unknown" msgstr "La bordadura \"%s\" es desconeguda" #: src/ui/theme-parser.c:1888 #, c-format msgid "No \"start_angle\" or \"from\" attribute on element <%s>" msgstr "" "Pas cap d'atribut « start_angle » (« començament d'angle ») o « from » (« " "dempuèi ») sus l'element <%s>" #: src/ui/theme-parser.c:1895 #, c-format msgid "No \"extent_angle\" or \"to\" attribute on element <%s>" msgstr "" "Pas cap d'atribut « extent_angle » (« extension d'angle ») o « to » (« vers " "») sus l'element <%s>" #: src/ui/theme-parser.c:2135 #, c-format msgid "Did not understand value \"%s\" for type of gradient" msgstr "Impossible de comprene la valor « %s » pel tipe de degradat" #: src/ui/theme-parser.c:2213 src/ui/theme-parser.c:2588 #, c-format msgid "Did not understand fill type \"%s\" for <%s> element" msgstr "Impossible de comprene lo tipe d'emplenatge « %s » per l'element <%s>" #: src/ui/theme-parser.c:2380 src/ui/theme-parser.c:2463 #: src/ui/theme-parser.c:2526 #, c-format msgid "Did not understand state \"%s\" for <%s> element" msgstr "Impossible de comprene l'estat « %s » per l'element <%s>" #: src/ui/theme-parser.c:2390 src/ui/theme-parser.c:2473 #, c-format msgid "Did not understand shadow \"%s\" for <%s> element" msgstr "Impossible de comprene l'ombra « %s » per l'element <%s>" #: src/ui/theme-parser.c:2400 #, c-format msgid "Did not understand arrow \"%s\" for <%s> element" msgstr "Impossible de comprene la sageta « %s » per l'element <%s>" #: src/ui/theme-parser.c:2714 src/ui/theme-parser.c:2810 #, c-format msgid "No <draw_ops> called \"%s\" has been defined" msgstr "Cap de <draw_ops> apelat « %s » es pas estat definit" #: src/ui/theme-parser.c:2726 src/ui/theme-parser.c:2822 #, c-format msgid "Including draw_ops \"%s\" here would create a circular reference" msgstr "L'inclusion del draw_ops « %s » aicí creariá una referéncia circulara" #: src/ui/theme-parser.c:2937 #, c-format msgid "Unknown position \"%s\" for frame piece" msgstr "Posicion desconeguda « %s » de la pèça del quadre" #: src/ui/theme-parser.c:2945 #, c-format msgid "Frame style already has a piece at position %s" msgstr "L'estil de quadre a ja una pèça a la posicion %s" #: src/ui/theme-parser.c:2962 src/ui/theme-parser.c:3039 #, c-format msgid "No <draw_ops> with the name \"%s\" has been defined" msgstr "Cap de <draw_ops> amb lo nom « %s » es pas estat definit" #: src/ui/theme-parser.c:2992 #, c-format msgid "Unknown function \"%s\" for button" msgstr "Foncion \"%s\" desconeguda pel boton" #: src/ui/theme-parser.c:3002 #, c-format msgid "Button function \"%s\" does not exist in this version (%d, need %d)" msgstr "" "La foncion « %s » del boton existís pas dins la version (%d, a besonh de %d)" #: src/ui/theme-parser.c:3014 #, c-format msgid "Unknown state \"%s\" for button" msgstr "Estat \"%s\" desconegut pel boton" #: src/ui/theme-parser.c:3022 #, c-format msgid "Frame style already has a button for function %s state %s" msgstr "L'estil de quadre a ja un boton per la foncion %s, estat %s" #: src/ui/theme-parser.c:3101 #, c-format msgid "\"%s\" is not a valid value for focus attribute" msgstr "« %s » es pas una valor valida per l'atribut de focus" #: src/ui/theme-parser.c:3110 #, c-format msgid "\"%s\" is not a valid value for state attribute" msgstr "« %s » es pas una valor valida per l'atribut d'estat" #: src/ui/theme-parser.c:3120 #, c-format msgid "A style called \"%s\" has not been defined" msgstr "Cap d'estil apelat « %s » es pas estat definit" #: src/ui/theme-parser.c:3141 src/ui/theme-parser.c:3164 #, c-format msgid "\"%s\" is not a valid value for resize attribute" msgstr "« %s » es pas una valor valida per l'atribut de redimensionament" #: src/ui/theme-parser.c:3175 #, c-format msgid "" "Should not have \"resize\" attribute on <%s> element for maximized/shaded " "states" msgstr "" "L'atribut « resize » (« redimensionament ») deuriá pas figurar sus l'element" " <%s> pels estats maximizat/reduch dins la barra de títol" #: src/ui/theme-parser.c:3189 #, c-format msgid "Should not have \"resize\" attribute on <%s> element for maximized states" msgstr "" "L'atribut « resize » (« redimensionament ») deuriá pas figurar sus l'element" " <%s> per l'estat maximizat" #: src/ui/theme-parser.c:3203 src/ui/theme-parser.c:3247 #, c-format msgid "Style has already been specified for state %s resize %s focus %s" msgstr "" "L'estil es ja estat indicat per l'estat %s, redimensionament %s, focus %s" #: src/ui/theme-parser.c:3214 src/ui/theme-parser.c:3225 #: src/ui/theme-parser.c:3236 src/ui/theme-parser.c:3258 #: src/ui/theme-parser.c:3269 src/ui/theme-parser.c:3280 #, c-format msgid "Style has already been specified for state %s focus %s" msgstr "L'estil es ja estat indicat per l'estat %s, focus %s" #: src/ui/theme-parser.c:3319 msgid "" "Can't have a two draw_ops for a <piece> element (theme specified a draw_ops " "attribute and also a <draw_ops> element, or specified two elements)" msgstr "" "Impossible d'aver dos atributs draw_ops per un element <piece> (lo tèma " "indicava un atribut draw_ops e un element <draw_ops> o dos elements)" #: src/ui/theme-parser.c:3357 msgid "" "Can't have a two draw_ops for a <button> element (theme specified a draw_ops" " attribute and also a <draw_ops> element, or specified two elements)" msgstr "" "Impossible d'aver dos atributs draw_ops per un element <button> (lo tèma " "indicava un atribut draw_ops e un element <draw_ops> o dos elements)" #: src/ui/theme-parser.c:3427 msgid "" "Can't have a two draw_ops for a <menu_icon> element (theme specified a " "draw_ops attribute and also a <draw_ops> element, or specified two elements)" msgstr "" "Impossible d'aver dos atributs draw_ops per un element <menu_icon> (lo tèma " "indicava un atribut draw_ops e un element <draw_ops> o dos elements)" #: src/ui/theme-parser.c:3491 #, c-format msgid "Bad version specification '%s'" msgstr "" #: src/ui/theme-parser.c:3562 msgid "" "\"version\" attribute cannot be used in metacity-theme-1.xml or metacity-" "theme-2.xml" msgstr "" "\"version\" attribute cannot be used in metacity-theme-1.xml or metacity-" "theme-2.xml" #: src/ui/theme-parser.c:3585 #, c-format msgid "Theme requires version %s but latest supported theme version is %d.%d" msgstr "" #: src/ui/theme-parser.c:3617 #, c-format msgid "Outermost element in theme must be <metacity_theme> not <%s>" msgstr "" #: src/ui/theme-parser.c:3637 #, c-format msgid "" "Element <%s> is not allowed inside a name/author/date/description element" msgstr "" "L'element <%s> es pas autorizat dins un element name/author/date/description" #: src/ui/theme-parser.c:3642 #, c-format msgid "Element <%s> is not allowed inside a <constant> element" msgstr "L'element <%s> es pas autorizat dins un element <constant>" #: src/ui/theme-parser.c:3654 #, c-format msgid "" "Element <%s> is not allowed inside a distance/border/aspect_ratio element" msgstr "" "L'element <%s> es pas autorizat dins un element distance/border/aspect_ratio" #: src/ui/theme-parser.c:3676 #, c-format msgid "Element <%s> is not allowed inside a draw operation element" msgstr "" "L'element <%s> es pas autorizat dins un element d'operacion de dessenh" #: src/ui/theme-parser.c:3686 src/ui/theme-parser.c:3726 #: src/ui/theme-parser.c:3731 src/ui/theme-parser.c:3736 #, c-format msgid "Element <%s> is not allowed inside a <%s> element" msgstr "L'element <%s> es pas autorizat dins un element <%s>" #: src/ui/theme-parser.c:3964 msgid "No draw_ops provided for frame piece" msgstr "Cap d'atribut draw_ops pas provesit per la pèça del quadre" #: src/ui/theme-parser.c:3979 msgid "No draw_ops provided for button" msgstr "Cap d'atribut draw_ops pas provesit pel boton" #: src/ui/theme-parser.c:4041 #, c-format msgid "No text is allowed inside element <%s>" msgstr "Pas cap de tèxte autorizat dins l'element <%s>" #: src/ui/theme-parser.c:4099 src/ui/theme-parser.c:4111 #: src/ui/theme-parser.c:4123 src/ui/theme-parser.c:4135 #: src/ui/theme-parser.c:4147 #, c-format msgid "<%s> specified twice for this theme" msgstr "<%s> indicat dos còps per aqueste tèma" #: src/ui/theme-parser.c:4426 #, c-format msgid "Failed to find a valid file for theme %s\n" msgstr "Impossible de trobar un fichièr valid pel tèma %s\n" #: src/ui/theme-viewer.c:256 msgid "_OK" msgstr "_D’acòrdi" #: src/ui/theme-viewer.c:268 msgid "This is a sample message in a sample dialog" msgstr "Es un messatge d'exemple dins una bóstia de dialòg d'exemple" #: src/ui/theme-viewer.c:352 #, c-format msgid "Fake menu item %d\n" msgstr "Element de menut factici %d\n" #: src/ui/theme-viewer.c:408 msgid "Border-only window" msgstr "Fenèstra amb solament de bordaduras" #: src/ui/theme-viewer.c:410 msgid "Bar" msgstr "Barra" #: src/ui/theme-viewer.c:427 msgid "Normal Application Window" msgstr "Fenèstra d'aplicacion normala" #: src/ui/theme-viewer.c:431 msgid "Dialog Box" msgstr "Bóstia de dialòg" #: src/ui/theme-viewer.c:435 msgid "Modal Dialog Box" msgstr "Bóstia de dialòg modala" #: src/ui/theme-viewer.c:439 msgid "Utility Palette" msgstr "Paleta utilitari" #: src/ui/theme-viewer.c:443 msgid "Torn-off Menu" msgstr "Menut destacat" #: src/ui/theme-viewer.c:447 msgid "Border" msgstr "Bordadura" #: src/ui/theme-viewer.c:451 msgid "Attached Modal Dialog" msgstr "" #: src/ui/theme-viewer.c:811 #, c-format msgid "Button layout test %d" msgstr "Tèst d'agençament de botons %d" #: src/ui/theme-viewer.c:836 #, c-format msgid "%g milliseconds to draw one window frame" msgstr "%g millisegondas per dessenhar un quadre de fenèstra" #: src/ui/theme-viewer.c:876 msgid "Usage: marco-theme-viewer [THEMENAME]\n" msgstr "Usatge : marco-theme-viewer [NOMDELTÈMA]\n" #: src/ui/theme-viewer.c:883 #, c-format msgid "Error loading theme: %s\n" msgstr "Error al moment de cargar lo tèma : %s\n" #: src/ui/theme-viewer.c:889 #, c-format msgid "Loaded theme \"%s\" in %g seconds\n" msgstr "Tèma « %s » cargat en %g segondas\n" #: src/ui/theme-viewer.c:933 msgid "Normal Title Font" msgstr "Poliça de títol normal" #: src/ui/theme-viewer.c:939 msgid "Small Title Font" msgstr "Pichona poliça de títol" #: src/ui/theme-viewer.c:945 msgid "Large Title Font" msgstr "Granda poliça de títol" #: src/ui/theme-viewer.c:950 msgid "Button Layouts" msgstr "Agençaments dels botons" #: src/ui/theme-viewer.c:955 msgid "Benchmark" msgstr "Performància" #: src/ui/theme-viewer.c:1012 msgid "Window Title Goes Here" msgstr "Lo títol de las fenèstras se tròba aicí" #: src/ui/theme-viewer.c:1114 #, c-format msgid "" "Drew %d frames in %g client-side seconds (%g milliseconds per frame) and %g " "seconds wall clock time including X server resources (%g milliseconds per " "frame)\n" msgstr "" "%d quadres foguèron dessenhats en %g segondas del costat client (%g " "millisegondas per quadre) e %g segondas passadas dins las ressorsas del " "servidor X (%g millisegondas per quadre)\n"
Mid
[ 0.5661764705882351, 28.875, 22.125 ]
There is concern about the long-term use and abuse of benzodiazepine anxiolytic/hypnotic drugs by patients and polydrug abusers. One of the most insidious adverse effects of benzodiazepines is memory impairment. Five double-blind, placebo-controlled outpatient experiments are proposed in healthy volunteers to test specific hypotheses regarding the acute and chronic effects of benzodiazepines on memory processes, guided by recent conceptual and methodological developments in human memory research. Experiment 1 will test the hypothesis that benzodiazepines selectively impair specific processes involved in working memory (a type of short-term memory that enables the temporary maintenance and on-line manipulation of information in the service of behavioral goals, and is critical for the performance of many higher-order cognitive functions), and that the benzodiazepine-induced working memory impairment differs qualitatively from that induced by the anticholinergic drug scopolamine. Experiments 2 and 3 will test the hypothesis that benzodiazepines selectively impair specific processes involved in metamemory (people's knowledge and awareness of their own memory; a fundamental prerequisite to acquiring new information and modifying one's behavior), and that the benzodiazepine-induced metamemory impairment differs qualitatively from that induced by both scopolamine and alcohol. Experiment 4 will test the hypothesis that the memory-impairing effects of benzodiazepines can be dissociated from the drugs' sedative effects by examining changes in the benzodiazepine hypnotic triazolam's amnestic versus sedative effects as a function of administration of varying doses of the stimulant d-amphetamine, conjointly with varying doses of triazolam. Experiment 5 will test the hypothesis regarding dissociation of amnestic versus sedative effects by examining the degree to which tolerance, over the course of repeated benzodiazepine administration, develops differentially to effects on sedation vs. memory; results will also provide information of direct clinical relevance to long-term benzodiazepine users. In addition to enhancing the understanding of benzodiazepine-induced amnesia and its neurochemical specificity, data from this novel project, which uniquely combines pharmacological and cognitive manipulations, will contribute to a better understanding of the specificity of human memory processes and of the relationship between memory and arousal. Information from this project can also be used to develop cognitive rehabilitation programs and to tailor drug abuse and anxiety treatment interventions to the specific capabilities of long-term users.
High
[ 0.6958698372966201, 34.75, 15.1875 ]
Find this pin and more on rogers city traditional bow traditional archery crossbow hunting longbow archery bows girls though the lutheran and catholic. Find catholic human services located at 201 s bradley hwy unit 2, rogers city, michigan, 49779 contact 9897347456 ratings, reviews, hours, phone number and directions from chamberofcommercecom. The rogers city girls basketball team hosted 2014 girls basketball: onaway vs rogers city central catholic vs oregon city, girls. Rogers city military men looking for women come to it's our business to match rogers city military men looking for women with singles who understand and. A look at online dating for catholics: benefits, but also risks as to where i could meet eligible single catholic women in the catholic in rogers, arkansas. 4 schools in rogers city, mi research the top rated public & private elementary, middle schools, and high schools on truliacom. Rogers city - cheboygan a 55-foot high crucifix made of a single redwood the 56-mile drive on us-23 between mackinaw city and rogers city is liberally. Explore statistics and parent ratings and reviews for st ignatius catholic school in rogers city, mi. Record book result or records results (rogers city), 2012-15 (lansing catholic central), 1996-99. Rogers city high school 1033 west huron avenue rogers city, mi 49779 phone: 989-734-9170 click here to see rogers city. Rchurch church directory has information on st ignatius of loyala catholic church in rogers city, michigan mi such as church address, phone number, denomination. Meet rogers city singles online christian singles, catholic democrats, pet lovers, cute rogers city women, handsome rogers city men, single. See photos and schedule a showing for 343 s fourth st, rogers city, mi 49779 this rogers city home was last updated on 05/10/17 get information about rogers city, mi schools and neighborhood info. Watch video scores from across the state of michigan in boys and girls basketball on jan 19 michigan high school basketball: boys, girls scores rogers city 41. Someone you can love is nearby browse profiles & photos of single lesbian women in rogers city, mi join matchcom, the leader in online dating with more dates, more. Meet single catholic women in rogers city are you ready to find a single catholic woman for a kindred spirit romance or are you only looking for someone to go on a date with to an amusement park this weekend. The 40th annual miss rogers city pageant takes place 7 pm friday at the rogers city high school five girls will compete grade at saint ignatius catholic. Someone you can love is nearby browse profiles & photos of single christian women in rogers city, mi join matchcom, the leader in online dating with more dates. Girls soccer wrestling girls volleyball rogers city, mi 49779 3 br 1 ba single-family single-family fixer upper $420,000. Meet single women in rogers city is it that time in your life that you are ready to find a single woman to start a relationship that leads to the alter. Join the hundreds of singles in michigan already online finding love and friendship in rogers city rogers city single parents rogers city catholic girls.
Mid
[ 0.590163934426229, 36, 25 ]
Q: Find out how maven-enforcer-plugin is used in certain pom files I am trying to compile apache tiles, module tiles-core but I have the following error: --- maven-enforcer-plugin:1.2:enforce (enforce-java) @ tiles-core --- Rule 0: org.apache.maven.plugins.enforcer.RequireJavaVersion failed with message: Detected JDK Version: 1.8.0 is not in the allowed range [1.7.0-45,1.8). Project apache tiles consists of parent and modules. I'm trying to compile tiles-core. However I cant find and understand where maven-enforcer-plugin is used in pom files to switch it off. Please, explain where this plugin is used. Parent pom file <?xml version="1.0"?> <!-- /* * $Id: pom.xml 1626664 2014-09-22 03:28:37Z nlebas $ * * Licensed to the Apache Software Foundation (ASF) under one * or more contributor license agreements. See the NOTICE file * distributed with this work for additional information * regarding copyright ownership. The ASF licenses this file * to you under the Apache License, Version 2.0 (the * "License"); you may not use this file except in compliance * with the License. You may obtain a copy of the License at * * http://www.apache.org/licenses/LICENSE-2.0 * * Unless required by applicable law or agreed to in writing, * software distributed under the License is distributed on an * "AS IS" BASIS, WITHOUT WARRANTIES OR CONDITIONS OF ANY * KIND, either express or implied. See the License for the * specific language governing permissions and limitations * under the License. */ --> <project xmlns="http://maven.apache.org/POM/4.0.0" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xsi:schemaLocation="http://maven.apache.org/POM/4.0.0 http://maven.apache.org/maven-v4_0_0.xsd"> <parent> <artifactId>tiles-master</artifactId> <groupId>org.apache.tiles</groupId> <version>6</version> <relativePath /> </parent> <modelVersion>4.0.0</modelVersion> <groupId>org.apache.tiles</groupId> <artifactId>tiles-parent</artifactId> <version>3.0.5</version> <packaging>pom</packaging> <name>Tiles 3</name> <description>Tiles 3: A framework for page composition.</description> <url>http://tiles.apache.org/framework/</url> <scm> <connection>scm:svn:http://svn.apache.org/repos/asf/tiles/framework/tags/tiles-parent-3.0.5</connection> <developerConnection>scm:svn:https://svn.apache.org/repos/asf/tiles/framework/tags/tiles-parent-3.0.5</developerConnection> <url>http://svn.apache.org/viewvc/tiles/framework/tags/tiles-parent-3.0.5</url> </scm> <ciManagement /> <modules> <module>tiles-api</module> <module>tiles-core</module> <module>tiles-template</module> <module>tiles-servlet</module> <module>tiles-jsp</module> <module>tiles-freemarker</module> <module>tiles-velocity</module> <module>tiles-el</module> <module>tiles-mvel</module> <module>tiles-ognl</module> <module>tiles-compat</module> <module>tiles-extras</module> <module>assembly</module> <module>tiles-test-pom</module> </modules> <issueManagement> <system>JIRA</system> <url>https://issues.apache.org/jira/browse/TILES</url> </issueManagement> <distributionManagement> <site> <id>apache-site</id> <url>scm:svn:https://svn.apache.org/repos/asf/tiles/site/staging/framework</url> </site> </distributionManagement> <dependencyManagement> <dependencies> <dependency> <groupId>org.apache.tiles</groupId> <artifactId>tiles-api</artifactId> <version>${project.version}</version> </dependency> <dependency> <groupId>org.apache.tiles</groupId> <artifactId>tiles-core</artifactId> <version>${project.version}</version> </dependency> <dependency> <groupId>org.apache.tiles</groupId> <artifactId>tiles-servlet</artifactId> <version>${project.version}</version> </dependency> <dependency> <groupId>org.apache.tiles</groupId> <artifactId>tiles-template</artifactId> <version>${project.version}</version> </dependency> <dependency> <groupId>org.apache.velocity</groupId> <artifactId>velocity-tools</artifactId> <version>2.0</version> <exclusions> <exclusion> <artifactId>struts-taglib</artifactId> <groupId>org.apache.struts</groupId> </exclusion> <exclusion> <artifactId>struts-tiles</artifactId> <groupId>org.apache.struts</groupId> </exclusion> <exclusion> <artifactId>struts-core</artifactId> <groupId>org.apache.struts</groupId> </exclusion> <exclusion> <groupId>commons-logging</groupId> <artifactId>commons-logging</artifactId> </exclusion> <exclusion> <artifactId>sslext</artifactId> <groupId>sslext</groupId> </exclusion> <exclusion> <artifactId>commons-chain</artifactId> <groupId>commons-chain</groupId> </exclusion> <exclusion> <artifactId>commons-validator</artifactId> <groupId>commons-validator</groupId> </exclusion> <exclusion> <artifactId>commons-digester</artifactId> <groupId>commons-digester</groupId> </exclusion> <exclusion> <artifactId>commons-beanutils</artifactId> <groupId>commons-beanutils</groupId> </exclusion> <exclusion> <artifactId>dom4j</artifactId> <groupId>dom4j</groupId> </exclusion> </exclusions> </dependency> <dependency> <groupId>commons-digester</groupId> <artifactId>commons-digester</artifactId> <version>2.0</version> <exclusions> <exclusion> <groupId>commons-logging</groupId> <artifactId>commons-logging</artifactId> </exclusion> </exclusions> </dependency> <dependency> <groupId>org.freemarker</groupId> <artifactId>freemarker</artifactId> <version>2.3.15</version> </dependency> <dependency> <groupId>ognl</groupId> <artifactId>ognl</artifactId> <version>2.7.3</version> </dependency> <dependency> <groupId>org.mvel</groupId> <artifactId>mvel2</artifactId> <version>2.0.11</version> </dependency> <dependency> <groupId>javax.servlet</groupId> <artifactId>servlet-api</artifactId> <version>2.5</version> <scope>provided</scope> </dependency> <dependency> <groupId>javax.servlet.jsp</groupId> <artifactId>jsp-api</artifactId> <version>2.1</version> <scope>provided</scope> </dependency> <dependency> <groupId>javax.el</groupId> <artifactId>el-api</artifactId> <version>1.0</version> <scope>provided</scope> </dependency> <dependency> <groupId>junit</groupId> <artifactId>junit</artifactId> <version>4.7</version> <scope>test</scope> </dependency> <dependency> <groupId>org.easymock</groupId> <artifactId>easymock</artifactId> <version>3.0</version> <scope>test</scope> </dependency> <dependency> <groupId>org.apache.shale</groupId> <artifactId>shale-test</artifactId> <version>1.0.5</version> <scope>test</scope> </dependency> <dependency> <groupId>org.easymock</groupId> <artifactId>easymockclassextension</artifactId> <version>3.0</version> <scope>test</scope> </dependency> <dependency> <groupId>org.slf4j</groupId> <artifactId>slf4j-api</artifactId> <version>1.7.6</version> </dependency> <dependency> <groupId>org.slf4j</groupId> <artifactId>jcl-over-slf4j</artifactId> <version>1.7.6</version> <optional>true</optional> </dependency> <dependency> <groupId>org.apache.tiles</groupId> <artifactId>tiles-request-api</artifactId> <version>${tiles.request.version}</version> </dependency> </dependencies> </dependencyManagement> <build> <pluginManagement> <plugins> <plugin> <artifactId>maven-jar-plugin</artifactId> <configuration> <archive> <manifestFile>${tiles.manifestfile}</manifestFile> <manifest> <addDefaultSpecificationEntries>true</addDefaultSpecificationEntries> <addDefaultImplementationEntries>true</addDefaultImplementationEntries> </manifest> </archive> </configuration> </plugin> <plugin> <groupId>org.apache.felix</groupId> <artifactId>maven-bundle-plugin</artifactId> <version>2.3.7</version> <inherited>true</inherited> </plugin> </plugins> </pluginManagement> <plugins> <plugin> <groupId>org.apache.felix</groupId> <artifactId>maven-bundle-plugin</artifactId> <configuration> <excludeDependencies>true</excludeDependencies> <manifestLocation>target/osgi</manifestLocation> <instructions> <_nouses>true</_nouses> <Bundle-SymbolicName>${tiles.osgi.symbolicName}</Bundle-SymbolicName> <Export-Package>${tiles.osgi.export}</Export-Package> <Private-Package>${tiles.osgi.private}</Private-Package> <Import-Package>${tiles.osgi.import}</Import-Package> <DynamicImport-Package>${tiles.osgi.dynamicImport}</DynamicImport-Package> <Bundle-DocURL>${project.url}</Bundle-DocURL> <Specification-Title>${project.name}</Specification-Title> <Specification-Version>${project.version}</Specification-Version> <Specification-Vendor>${project.organization.name}</Specification-Vendor> <Implementation-Title>${project.name}</Implementation-Title> <Implementation-Version>${project.version}</Implementation-Version> <Implementation-Vendor>${project.organization.name}</Implementation-Vendor> <Implementation-Vendor-Id>org.apache</Implementation-Vendor-Id> </instructions> </configuration> <executions> <execution> <id>bundle-manifest</id> <phase>process-classes</phase> <goals> <goal>manifest</goal> </goals> </execution> </executions> </plugin> <plugin> <groupId>org.apache.maven.plugins</groupId> <artifactId>maven-scm-publish-plugin</artifactId> <extensions>true</extensions> <configuration> <pubScmUrl>scm:svn:https://svn.apache.org/repos/asf/tiles/site/staging/framework</pubScmUrl> </configuration> </plugin> </plugins> <defaultGoal>install</defaultGoal> </build> <properties> <tiles.osgi.symbolicName>org.apache.${project.artifactId}</tiles.osgi.symbolicName> <tiles.osgi.export>org.apache.tiles.*;version=${project.version}</tiles.osgi.export> <tiles.osgi.import>*</tiles.osgi.import> <tiles.osgi.dynamicImport /> <tiles.osgi.private /> <tiles.manifestfile>target/osgi/MANIFEST.MF</tiles.manifestfile> <project.build.sourceEncoding>UTF-8</project.build.sourceEncoding> <tiles.request.version>1.0.6</tiles.request.version> <tiles.autotag.version>1.1.0</tiles.autotag.version> </properties> <dependencies> <dependency> <groupId>org.slf4j</groupId> <artifactId>slf4j-simple</artifactId> <version>1.5.8</version> <scope>test</scope> </dependency> </dependencies> <profiles> <profile> <id>apache-release</id> <build> <plugins> <plugin> <artifactId>maven-install-plugin</artifactId> <configuration> <createChecksum>true</createChecksum> </configuration> </plugin> <plugin> <groupId>org.codehaus.mojo</groupId> <artifactId>rat-maven-plugin</artifactId> <version>1.0-alpha-3</version> <executions> <execution> <phase>verify</phase> <goals> <goal>check</goal> </goals> <configuration> <addDefaultLicenseMatchers>false</addDefaultLicenseMatchers> <licenseMatchers> <classNames> <className>rat.analysis.license.ApacheSoftwareLicense20</className> </classNames> </licenseMatchers> <includes> <include>pom.xml</include> <include>src/**</include> </includes> <excludes> <exclude>**/*LICENSE.txt</exclude> <exclude>**/*MANIFEST.MF</exclude> </excludes> </configuration> </execution> </executions> </plugin> </plugins> </build> </profile> <profile> <id>linkcheck</id> <reporting> <plugins> <plugin> <artifactId>maven-linkcheck-plugin</artifactId> <version>1.1</version> <configuration> <excludedLinks> <excludedLink>/*</excludedLink> <excludedLink>**/index.html</excludedLink> <excludedLink>**/logo.png</excludedLink> <excludedLink>**/tiles-jsp/tagreference.html</excludedLink> </excludedLinks> </configuration> </plugin> </plugins> </reporting> </profile> </profiles> </project> Tiles core pom file <?xml version="1.0"?> <!-- /* * $Id: pom.xml 1626664 2014-09-22 03:28:37Z nlebas $ * * Licensed to the Apache Software Foundation (ASF) under one * or more contributor license agreements. See the NOTICE file * distributed with this work for additional information * regarding copyright ownership. The ASF licenses this file * to you under the Apache License, Version 2.0 (the * "License"); you may not use this file except in compliance * with the License. You may obtain a copy of the License at * * http://www.apache.org/licenses/LICENSE-2.0 * * Unless required by applicable law or agreed to in writing, * software distributed under the License is distributed on an * "AS IS" BASIS, WITHOUT WARRANTIES OR CONDITIONS OF ANY * KIND, either express or implied. See the License for the * specific language governing permissions and limitations * under the License. */ --> <project xmlns="http://maven.apache.org/POM/4.0.0" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xsi:schemaLocation="http://maven.apache.org/POM/4.0.0 http://maven.apache.org/maven-v4_0_0.xsd"> <parent> <groupId>org.apache.tiles</groupId> <artifactId>tiles-parent</artifactId> <version>3.0.5</version> </parent> <modelVersion>4.0.0</modelVersion> <artifactId>tiles-core</artifactId> <packaging>jar</packaging> <name>Tiles - Core Library</name> <description>Tiles Core Library, including basic implementation of the APIs. </description> <properties> <tiles.osgi.symbolicName>org.apache.tiles.core</tiles.osgi.symbolicName> </properties> <build> <resources> <resource> <directory>src/main/resources</directory> <excludes> <exclude>LICENSE.txt</exclude> <exclude>NOTICE.txt</exclude> </excludes> </resource> <resource> <directory>src/main/resources</directory> <includes> <include>LICENSE.txt</include> <include>NOTICE.txt</include> </includes> <targetPath>META-INF</targetPath> </resource> </resources> <plugins> <plugin> <groupId>org.apache.maven.plugins</groupId> <artifactId>maven-surefire-plugin</artifactId> <configuration> <skipTests>true</skipTests> </configuration> </plugin> </plugins> </build> <reporting> <plugins> <plugin> <groupId>net.sf.dtddoc</groupId> <artifactId>dtddoc-maven-plugin</artifactId> <version>1.1</version> <configuration> <docTitle>Tiles Definition File</docTitle> </configuration> </plugin> </plugins> </reporting> <dependencies> <dependency> <groupId>org.apache.tiles</groupId> <artifactId>tiles-api</artifactId> </dependency> <dependency> <groupId>commons-digester</groupId> <artifactId>commons-digester</artifactId> </dependency> <dependency> <groupId>org.slf4j</groupId> <artifactId>jcl-over-slf4j</artifactId> </dependency> <dependency> <groupId>org.slf4j</groupId> <artifactId>slf4j-api</artifactId> </dependency> <dependency> <groupId>junit</groupId> <artifactId>junit</artifactId> <scope>test</scope> </dependency> <dependency> <groupId>org.easymock</groupId> <artifactId>easymock</artifactId> <scope>test</scope> </dependency> <dependency> <groupId>org.easymock</groupId> <artifactId>easymockclassextension</artifactId> <scope>test</scope> </dependency> <dependency> <groupId>org.apache.shale</groupId> <artifactId>shale-test</artifactId> <scope>test</scope> </dependency> <dependency> <groupId>javax.servlet</groupId> <artifactId>servlet-api</artifactId> <scope>test</scope> </dependency> </dependencies> </project> A: The enforcer plugin reference is contained in the tiles-master pom which is the parent pom of your tiles-parent pom and derived from there. If you need to disable this rule permanently in your project adding the following should do the trick: <build> <plugins> <plugin> <artifactId>maven-enforcer-plugin</artifactId> <executions> <execution> <id>enforce-java</id> <phase>none</phase> </execution> </executions> </plugin> </plugins> </build> This delegates the enforcer plugin execution for id enforce-java to the none phase which is never executed. Adding another execution under a different id allows you to add your own enforcer rule if required.
Mid
[ 0.548148148148148, 27.75, 22.875 ]
vative of -y**5 + y - p*y**5 + 2*y**5 wrt y? -60*y**3 Let y(z) = -4*z**5 - 2*z**3 + 12*z**2 + 2*z. Let t(o) = -o**5 - o**3 + o**2 + o. Let a(g) = 4*t(g) - 2*y(g). Find the third derivative of a(s) wrt s. 240*s**2 Let q(c) = -4*c**3 - 2*c + 1. Let g(r) = 21*r**3 + 11*r - 4. Let z(k) = 2*g(k) + 11*q(k). What is the derivative of z(x) wrt x? -6*x**2 Suppose i - 8*t = -3*t - 2, 3*i = t - 6. Let r = i - -7. Find the second derivative of 2*o**2 - 4*o**2 - 2*o**2 + r*o**2 - o wrt o. 2 What is the second derivative of -11*d**2 + 21*d + 4*d - 6*d wrt d? -22 Suppose -5*s + 6 = -i + 4, i = 2*s - 2. Suppose 4*k - 12 + 4 = s. Differentiate -k + 4 + 2*d + 0*d with respect to d. 2 Suppose 7*c = 10*c. Let l be (-1 - c/1) + 3. Find the third derivative of 2*u**2 - 3*u**5 + 5*u**5 - 4*u**2 + u**l wrt u. 120*u**2 Suppose -z = -0*z - 2. What is the third derivative of -5*y**2 + 4*y**2 + 4*y**z - 3*y**3 - 4*y**2 wrt y? -18 Let r(u) be the first derivative of 11*u**3/3 - 10*u + 4. What is the first derivative of r(d) wrt d? 22*d Let l(r) be the third derivative of 0*r + 3*r**2 + 1/6*r**3 + 0*r**4 + 0 - 1/20*r**5. Find the first derivative of l(k) wrt k. -6*k Let k(h) be the second derivative of 0 + 0*h**5 + 0*h**2 + 1/4*h**4 - 3*h + 0*h**7 + 0*h**6 - 1/56*h**8 + 0*h**3. Find the third derivative of k(l) wrt l. -120*l**3 Let u = 14 - 11. Find the first derivative of -n + 4 - 11*n**4 - u*n + 4*n wrt n. -44*n**3 Let o(g) = 14*g**6 - 6*g**5 - 10*g**2. Let s(m) = -29*m**6 + 13*m**5 + 21*m**2. Let c(f) = 13*o(f) + 6*s(f). Find the third derivative of c(h) wrt h. 960*h**3 What is the first derivative of -8 - 5 + 6*p**3 - 11*p**3 wrt p? -15*p**2 Let g(t) be the first derivative of -9*t**5/5 + t**4/2 - 5*t**3/3 - 19. Find the third derivative of g(j) wrt j. -216*j + 12 Let h(r) be the third derivative of -r**8/6720 - r**7/2520 + r**4/24 - r**2. Let k(i) be the second derivative of h(i). Find the third derivative of k(y) wrt y. -6 Let j be (-10)/3*(-3)/2. Find the second derivative of 3*y**3 + 2*y**3 - 2*y - 2*y**3 - j*y**3 wrt y. -12*y Let x(k) be the third derivative of -k**7/2520 + k**5/30 - k**4/24 + 4*k**2. Let u(r) be the second derivative of x(r). Differentiate u(l) wrt l. -2*l Let d(v) = -5*v**4 + 2*v**3 - 2*v + 7. Let c(j) = -j**3 + j + 1. Let l(b) = 2*c(b) + d(b). Differentiate l(y) wrt y. -20*y**3 Let x(i) be the first derivative of -4*i**5 - 8*i + 12. Find the first derivative of x(h) wrt h. -80*h**3 Let m(p) be the first derivative of 0*p**4 + 1 + 0*p + 9/5*p**5 + 0*p**3 + 3/2*p**2. What is the second derivative of m(k) wrt k? 108*k**2 What is the third derivative of 3*r**3 - 17*r**3 + 0*r**3 + 3*r**2 + 0*r**2 wrt r? -84 Let a(x) = -34*x**4 - 6*x**3 - 51*x + 6. Let n(i) = -69*i**4 - 13*i**3 - 103*i + 13. Let p(v) = -13*a(v) + 6*n(v). Find the second derivative of p(y) wrt y. 336*y**2 Let y(t) be the first derivative of -t**6 + 0*t**3 + 3 + 0*t**5 + 0*t**4 - 1/2*t**2 + 0*t. Find the second derivative of y(a) wrt a. -120*a**3 Let z(s) be the third derivative of -1/24*s**4 - 5/6*s**3 + 0*s + 4*s**2 + 0. Differentiate z(i) wrt i. -1 Let t(a) = -a**2 + 8*a - 5. Let f be t(7). Find the third derivative of 4*z**6 - 3*z**2 + z**2 + 0*z**f wrt z. 480*z**3 Suppose -g - 5*h = -12 - 4, -2*g - 4*h = -14. Let m(r) = 3*r**2 - 6*r. Let j(f) = f. Let b(z) = g*m(z) + 5*j(z). What is the second derivative of b(u) wrt u? 6 Suppose 0 = -0*c - 5*c. Let v(p) be the first derivative of 2 - 1/3*p**3 - p + c*p**2. Differentiate v(s) wrt s. -2*s Let q(y) be the third derivative of 13*y**5/60 - 3*y**3/2 - 13*y**2. What is the first derivative of q(g) wrt g? 26*g Let a(n) be the second derivative of -n**6/120 + n**5/10 - n**2/2 + 2*n. Let j(v) be the first derivative of a(v). What is the third derivative of j(x) wrt x? -6 Let a = -8 - -8. Let r(w) be the first derivative of -3*w + a*w**2 + 2/3*w**3 + 1. What is the first derivative of r(s) wrt s? 4*s Suppose -2*v - j + 13 = 0, 13 = -v + 5*j - 8. Suppose 3 = -4*r + 15. Find the second derivative of 3 - l**v - l - r wrt l. -12*l**2 Find the second derivative of 13*g**3 + 18*g + g**4 - 13*g**3 wrt g. 12*g**2 Let s(q) = q**5 + 4*q**3 - 4*q**2 - 10*q. Let f(l) = 2*l**5 + 3*l**3 - 3*l**2 - 9*l. Let k(m) = 4*f(m) - 3*s(m). What is the second derivative of k(v) wrt v? 100*v**3 Let w(y) = -5*y**6 + 3*y**5 - 2*y**2 + 3. Let f(m) = 5*m**6 - 4*m**5 + m**2 - 4. Let v(z) = -3*f(z) - 4*w(z). What is the third derivative of v(q) wrt q? 600*q**3 Let a be (-13)/(-30) - 9/(-54). Let q(z) be the first derivative of 2*z + 0*z**3 - 2 + 0*z**4 + a*z**5 + 0*z**2. Differentiate q(d) wrt d. 12*d**3 Suppose 2*l + 3*l - 36 = 2*j, 3*j = 2*l - 21. Find the first derivative of -6*k + 2 + 6 - l wrt k. -6 What is the derivative of 33*h**4 + 177*h**3 + 180*h**3 - 357*h**3 + 60 wrt h? 132*h**3 Let r be 4/(-18) + (-40)/(-18). Find the second derivative of q**4 + 0*q + r*q**4 + 3*q - q wrt q. 36*q**2 Differentiate 6 - c**4 + 0*c**4 - 12 wrt c. -4*c**3 Find the second derivative of 3*d**3 - 10*d**3 - 9*d + 8*d**3 - 3*d wrt d. 6*d Find the third derivative of -7*j**2 - 60*j**4 - 4*j**3 + 57*j**4 + 4*j**3 wrt j. -72*j Suppose -4*w + 3 = -3*w, -4*n - 4*w = -16. Suppose -b + n = -4. Find the first derivative of b*v**4 + 0*v**4 + 1 - 6*v**4 wrt v. -4*v**3 Let g(p) be the first derivative of 0*p - 2/3*p**3 + 4 + 0*p**4 + 0*p**2 - 3/5*p**5. Find the third derivative of g(z) wrt z. -72*z Suppose -2*v = -0 - 10. What is the second derivative of 4*m**5 + m**v - 2*m + 6*m wrt m? 100*m**3 Differentiate -4*t**3 - 8*t**3 + 4 - 17 - 2*t**3 wrt t. -42*t**2 Suppose p + m = -9, 0 = p - 2*p - 4*m - 12. Let y = -5 - p. What is the second derivative of -y*u + 5*u**5 + 0*u**5 - u**5 wrt u? 80*u**3 Let k(y) be the third derivative of -1/336*y**8 + 0*y - 1/24*y**4 + 0*y**5 + 0*y**3 + 0*y**7 + 3*y**2 + 0 + 0*y**6. What is the second derivative of k(u) wrt u? -20*u**3 Let n = 6 + -11. Let a be (6/n)/((-4)/10). Find the third derivative of a*v**2 - v**2 + v**4 - 2*v**4 wrt v. -24*v Suppose -5 - 1 = -2*u. Find the first derivative of 7*l**3 + 9 - 6*l**3 - 9*l**u wrt l. -24*l**2 What is the third derivative of -20*h**6 + 8*h**6 + h**4 + 16*h**2 - h**4 wrt h? -1440*h**3 Suppose 3*n = 2*d - 9, -d + 5 = -2*n - 0*n. Differentiate -d - k + 5*k - 4*k + 2*k**2 wrt k. 4*k Let z = 14 + -14. Differentiate 3*x - x + 1 - 7*x + z*x wrt x. -5 Suppose 4*k + 6 = 22. Let h be (-2)/(-4) - (-10)/k. Find the third derivative of h*z**4 + 3*z**2 - 2*z**4 - 4*z**3 + 4*z**3 wrt z. 24*z Suppose -3 + 12 = 3*u. Suppose 2*k + 5 + 6 = 5*v, -u*k = 4*v - 18. Find the first derivative of 1 + 1 - 4 + o**k wrt o. 2*o Let h(g) = -g - 9. Let z be h(-9). Suppose o = 2 - z. What is the second derivative of -4*n**o - n + 3*n - 4*n wrt n? -8 Let b(n) be the third derivative of 19*n**6/40 - n**5/60 - 19*n**2. What is the third derivative of b(y) wrt y? 342 Let x be (-8)/(-4)*(-2)/(-2). Suppose -a + x*a - 3 = 0. Find the second derivative of -2*k + a*k + 2*k**2 - 4*k**2 wrt k. -4 Let u(m) be the second derivative of -m**7/42 - m**4/4 + 11*m. What is the third derivative of u(h) wrt h? -60*h**2 Let h(m) = -m**2 + 2*m + 5. Let k be h(4). Let q = k + 5. Differentiate -1 + 0*l + q + l wrt l. 1 Let b(o) = 15*o - 1 - 16*o + 1. Let p(u) = -2*u - 1. Let l(h) = 3*b(h) - 2*p(h). Find the first derivative of l(w) wrt w. 1 Let h(o) be the first derivative of 2 + 0*o**4 - 2/5*o**5 + 0*o**3 + 1/2*o**2 + 0*o. What is the second derivative of h(d) wrt d? -24*d**2 Let f be ((-1)/6)/(11 - 21). Let a(d) be the third derivative of f*d**6 + 1/8*d**4 - d**2 + 0*d + 0*d**5 + 0*d**3 + 0. Find the second derivative of a(q) wrt q. 12*q Let f(a) be the first derivative of -21*a**4/2 - 37*a**2/2 + 27. What is the second derivative of f(l) wrt l? -252*l What is the third derivative of -2*n**2 - 2*n + 4*n - 6*n**5 - 2*n wrt n? -360*n**2 Find the third derivative of -44*x**4 + 6*x + 41*x**2 - x**3 - 6*x + 20*x**2 wrt x. -1056*x - 6 Let d(t) be the third derivative of -3*t**5/20 + 13*t**3/6 + 5*t**2. What is the derivative of d(v) wrt v? -18*v Let l be (-20)/(-5) + 2 + 0 + -4. Let g(c) be the third derivative of -1/60*c**5 + 1/2*c**3 + 0 - c**l + 0*c + 0*c**4. Differentiate g(p) wrt p. -2*p Let u(z) be the second derivative of z**6/40 - z**3/3 - 3*z**2/2 - 2*z. Let c(o) be
Low
[ 0.5158924205378971, 26.375, 24.75 ]
Title: AN ACT TO AMEND SECTION 61-3-21, MISSISSIPPI CODE OF 1972, TO INCREASE THE MAXIMUM LEASE TERM AGREEMENTS FROM 40 YEARS TO 50 YEARS THAT AIRPORT AUTHORITIES MAY ENTER INTO LEASE AGREEMENTS FOR CERTAIN PURPOSES AND TO ADD A REPEAL DATE OF JULY 1, 2010, TO THIS SECTION; TO AMEND SECTION 61-5-11, MISSISSIPPI CODE OF 1972, IN CONFORMITY THERETO; AND FOR RELATED PURPOSES. Information pertaining to this measure was last updated on 05/15/07 at 07:52.
Mid
[ 0.627737226277372, 32.25, 19.125 ]
Though the comic series may have been canceled, motion comics are still trickling out to expand Overwatch's lore. The latest issue looks at Doomfist, his escape, his plans, and his fashion sense. Overwatch rarely gives its lore in-game. Rather, it uses third parties like cinematics and comics to expand the universe's story. The latest entry into the Big Book of Overwatch Lore focuses not only on the newest hero, Doomfist, but the other (known) members of Talon as well. The comic not only shows off Doomfist's first stop after his prison break (literally), but also some of the clothes the organization likes to wear when the mood strikes them. While it's not a guarantee these festive threads will make their way in game, a betting man wouldn't balk at the chance to put money on their inclusion. Elements from the comics have made their way into the game before, like Reaper's shrug emote. Who wouldn't want a Reaper costume with a big floppy hat and big puffy pants? That's right, no one. New faces show up in the motion comic as well. Though betting on any of them showing up in game is a far riskier bet than the costumes, any new character introduced to the lore immediately as their look analyzed and their movesets theorized. Hell, before we saw the Doomfist we have now, people speculated that the little kid in the first Overwatch cinematic was going to be wielding the gauntlet of destruction. So what do you think? Do the costumes look good, and do you want them in game? How about those new faces that show up prominently, and in the shadows – do you think they'll make their way onto the video game battlefield? Let us know in the comments!
Mid
[ 0.633620689655172, 36.75, 21.25 ]
Q: How to log into remote servers? I currently have a VBScript that reads a list of servers, and attempts to verify the password of a specific userid. The userid is locally on that server. I am checking to see that the password is not set to the default (I want to make sure it was changed to something else). The "list of servers" can be a mix of IP addresses, hostnames (like Rocky), or fully qualified DNS names (like rocky.bigcompany.com). The servers are a mixture of physical and virtual devices, and may or may not be on a domain. The existing VBScript I wrote handles all this, and works fine. I'm trying to re-write this same program in Powershell, and It's not working. Here's the function I have in VBScript that does what I want: Function LoginToServer(Computer, username, password) 'this function will log into a server On Error Resume next Set locator = CreateObject("WbemScripting.SWbemLocator") Set wmi = locator.ConnectServer(computer, "root\cimv2", username, password) 'check the error code and see if we logged in successfully LoginRC = Err.Number If LoginRC <> 0 Then msg = "Could not log into server: " & CStr(computer) & " With ID: " & CStr(username) lfo.lmsg "B", "WARN", msg Else msg = "Server: " & CStr(computer) & " Logged in successfully as: " & CStr(username) lfo.lmsg "B", "INFO", msg End If wmi.Security_.ImpersonationLevel = 3 'return the code back to calleer LoginToServer = LoginRC End Function … and here's what I've tried to do in PowerShell: Param($ComputerName = "LocalHost") $ErrorActionPreference = "Stop" # Actual Code starts here Write-Host "Attempting to ping server: $ComputerName" $IPResult = Test-Connection -ComputerName $ComputerName -Quiet if ($IPResult -eq "TRUE") { Write-Host "Ping OK - now attempting to log in" try { $ID = "userid" $PSW = "password" $password = ConvertTo-SecureString $PSW -AsPlainText -Force $cred = New-Object System.Management.Automation.PSCredential ($ID, $password) $sesh = New-PSSession -ComputerName $ComputerName -Credential $cred } catch { Write-Host "Error caught" $ErrorMessage = $_.Exception.Message $FailedItem = $_.Exception.ItemName } finally { $Time = Get-Date "$Time Computer: $ComputerName ERROR: $ErrorMessage ITEM: $FailedItem" | Out-File c:\temp\TestCredScript.log -Append } } else { Write-Host "Could not ping server" } How do I log into these remote computers with an ID and Password using PowerShell? A: Your two code samples do different things. The VBScript code connects via WMI whereas the PowerShell code tries to establish a PowerShell session. For the latter you need PowerShell Remoting enabled, which you probably don't have. While you probably may want to enable PSRemoting anyway, you can also use WMI from PowerShell. The Get-WmiObject cmdlet allows you to provide credentials and impersonation level, so you don't need to establish a connection first like you need to do with VBScript (if you want to use explicit credentials). Example querying the Win32_Process class on a remote computer: $computer = '...' $username = 'userid' $password = 'password' $pw = ConvertTo-SecureString $password -AsPlainText -Force $cred = New-Object Management.Automation.PSCredential ($username, $pw) Get-WmiObject -Computer $computer -Namespace 'root\cimv2' -Class Win32_Process -Impersonation 3 -Credential $cred See here for further information.
Mid
[ 0.589333333333333, 27.625, 19.25 ]
Bren'thyss'ruhl 2 (elf) This is the minotaur with a magically induced shapechange. He fell in love with a human and it just wasn't going to work, so he had a mage friend craft a ring that allowed him to take this form when he pleased.
Low
[ 0.38313253012048104, 19.875, 32 ]
Breakdown of tolerance to a neo-self antigen in double transgenic mice in which B cells present the antigen. Transgenic (Tg) mice expressing a foreign Ag, hen egg lysozyme (HEL), under control of the alphaA-crystallin promoter ("HEL-Tg" mice) develop immunotolerance to HEL attributed to the expression of HEL in their thymus. In this paper we analyzed the immune response in double (Dbl)-Tg mice generated by mating the HEL-Tg mice with Tg mice that express HEL Abs on their B cells ("Ig-Tg" mice). The B cell compartment of the Dbl-Tg mice was unaffected by the HEL presence and was essentially identical to that of the Ig-Tg mice. A partial breakdown of tolerance was seen in the T cell response to HEL of the Dbl-Tg mice, i.e., their lymphocyte proliferative response against HEL was remarkably higher than that of the HEL-Tg mice. T-lymphocytes of both Dbl-Tg and Ig-Tg mice responded to HEL at concentrations drastically lower than those found stimulatory to lymphocytes of the wild-type controls. Cell mixing experiments demonstrated that 1) the lymphocyte response against low concentrations of HEL is due to the exceedingly efficient Ag presenting capacity of the Ab expressing B cells and 2) breakdown of tolerance in Dbl-Tg mice can also be attributed to the APC capacity of B cells, that sensitize in vivo and stimulate in vitro populations of T cells with low affinity toward HEL, assumed to be escapees of thymic deletion. These results thus indicate that T cell tolerance can be partially overcome by the highly potent Ag presenting capacity of Ab expressing B cells.
Mid
[ 0.6437659033078881, 31.625, 17.5 ]
import torch import utils as u from argparse import Namespace from torch.nn.parameter import Parameter from torch.nn import functional as F import torch.nn as nn import math class Sp_GCN(torch.nn.Module): def __init__(self,args,activation): super().__init__() self.activation = activation self.num_layers = args.num_layers self.w_list = nn.ParameterList() for i in range(self.num_layers): if i==0: w_i = Parameter(torch.Tensor(args.feats_per_node, args.layer_1_feats)) u.reset_param(w_i) else: w_i = Parameter(torch.Tensor(args.layer_1_feats, args.layer_2_feats)) u.reset_param(w_i) self.w_list.append(w_i) def forward(self,A_list, Nodes_list, nodes_mask_list): node_feats = Nodes_list[-1] #A_list: T, each element sparse tensor #take only last adj matrix in time Ahat = A_list[-1] #Ahat: NxN ~ 30k #sparse multiplication # Ahat NxN # self.node_embs = Nxk # # note(bwheatman, tfk): change order of matrix multiply last_l = self.activation(Ahat.matmul(node_feats.matmul(self.w_list[0]))) for i in range(1, self.num_layers): last_l = self.activation(Ahat.matmul(last_l.matmul(self.w_list[i]))) return last_l class Sp_Skip_GCN(Sp_GCN): def __init__(self,args,activation): super().__init__(args,activation) self.W_feat = Parameter(torch.Tensor(args.feats_per_node, args.layer_1_feats)) def forward(self,A_list, Nodes_list = None): node_feats = Nodes_list[-1] #A_list: T, each element sparse tensor #take only last adj matrix in time Ahat = A_list[-1] #Ahat: NxN ~ 30k #sparse multiplication # Ahat NxN # self.node_feats = Nxk # # note(bwheatman, tfk): change order of matrix multiply l1 = self.activation(Ahat.matmul(node_feats.matmul(self.W1))) l2 = self.activation(Ahat.matmul(l1.matmul(self.W2)) + (node_feats.matmul(self.W3))) return l2 class Sp_Skip_NodeFeats_GCN(Sp_GCN): def __init__(self,args,activation): super().__init__(args,activation) def forward(self,A_list, Nodes_list = None): node_feats = Nodes_list[-1] Ahat = A_list[-1] last_l = self.activation(Ahat.matmul(node_feats.matmul(self.w_list[0]))) for i in range(1, self.num_layers): last_l = self.activation(Ahat.matmul(last_l.matmul(self.w_list[i]))) skip_last_l = torch.cat((last_l,node_feats), dim=1) # use node_feats.to_dense() if 2hot encoded input return skip_last_l class Sp_GCN_LSTM_A(Sp_GCN): def __init__(self,args,activation): super().__init__(args,activation) self.rnn = nn.LSTM( input_size=args.layer_2_feats, hidden_size=args.lstm_l2_feats, num_layers=args.lstm_l2_layers ) def forward(self,A_list, Nodes_list = None, nodes_mask_list = None): last_l_seq=[] for t,Ahat in enumerate(A_list): node_feats = Nodes_list[t] #A_list: T, each element sparse tensor #note(bwheatman, tfk): change order of matrix multiply last_l = self.activation(Ahat.matmul(node_feats.matmul(self.w_list[0]))) for i in range(1, self.num_layers): last_l = self.activation(Ahat.matmul(last_l.matmul(self.w_list[i]))) last_l_seq.append(last_l) last_l_seq = torch.stack(last_l_seq) out, _ = self.rnn(last_l_seq, None) return out[-1] class Sp_GCN_GRU_A(Sp_GCN_LSTM_A): def __init__(self,args,activation): super().__init__(args,activation) self.rnn = nn.GRU( input_size=args.layer_2_feats, hidden_size=args.lstm_l2_feats, num_layers=args.lstm_l2_layers ) class Sp_GCN_LSTM_B(Sp_GCN): def __init__(self,args,activation): super().__init__(args,activation) assert args.num_layers == 2, 'GCN-LSTM and GCN-GRU requires 2 conv layers.' self.rnn_l1 = nn.LSTM( input_size=args.layer_1_feats, hidden_size=args.lstm_l1_feats, num_layers=args.lstm_l1_layers ) self.rnn_l2 = nn.LSTM( input_size=args.layer_2_feats, hidden_size=args.lstm_l2_feats, num_layers=args.lstm_l2_layers ) self.W2 = Parameter(torch.Tensor(args.lstm_l1_feats, args.layer_2_feats)) u.reset_param(self.W2) def forward(self,A_list, Nodes_list = None, nodes_mask_list = None): l1_seq=[] l2_seq=[] for t,Ahat in enumerate(A_list): node_feats = Nodes_list[t] l1 = self.activation(Ahat.matmul(node_feats.matmul(self.w_list[0]))) l1_seq.append(l1) l1_seq = torch.stack(l1_seq) out_l1, _ = self.rnn_l1(l1_seq, None) for i in range(len(A_list)): Ahat = A_list[i] out_t_l1 = out_l1[i] #A_list: T, each element sparse tensor l2 = self.activation(Ahat.matmul(out_t_l1).matmul(self.w_list[1])) l2_seq.append(l2) l2_seq = torch.stack(l2_seq) out, _ = self.rnn_l2(l2_seq, None) return out[-1] class Sp_GCN_GRU_B(Sp_GCN_LSTM_B): def __init__(self,args,activation): super().__init__(args,activation) self.rnn_l1 = nn.GRU( input_size=args.layer_1_feats, hidden_size=args.lstm_l1_feats, num_layers=args.lstm_l1_layers ) self.rnn_l2 = nn.GRU( input_size=args.layer_2_feats, hidden_size=args.lstm_l2_feats, num_layers=args.lstm_l2_layers ) class Classifier(torch.nn.Module): def __init__(self,args,out_features=2, in_features = None): super(Classifier,self).__init__() activation = torch.nn.ReLU() if in_features is not None: num_feats = in_features elif args.experiment_type in ['sp_lstm_A_trainer', 'sp_lstm_B_trainer', 'sp_weighted_lstm_A', 'sp_weighted_lstm_B'] : num_feats = args.gcn_parameters['lstm_l2_feats'] * 2 else: num_feats = args.gcn_parameters['layer_2_feats'] * 2 print ('CLS num_feats',num_feats) self.mlp = torch.nn.Sequential(torch.nn.Linear(in_features = num_feats, out_features =args.gcn_parameters['cls_feats']), activation, torch.nn.Linear(in_features = args.gcn_parameters['cls_feats'], out_features = out_features)) def forward(self,x): return self.mlp(x)
Mid
[ 0.595918367346938, 36.5, 24.75 ]
Advertisement Feb 3, 2012 There's good news in numbers at PBS Board meeting ARLINGTON, Va. — PBS President Paula Kerger told the PBS Board that 2011 was an "amazing year amidst extraordinary challenges." Kerger, speaking Friday (Feb. 3) at PBS headquarters, sparked two rounds of applause from directors with lots of impressive numbers. According to Nielsen data, the 2010-11 season ended with a 1.33 national primetime average, up 4 percent over 2009-10. Currently, Kerger said, PBS's primetime audience is "significantly larger" than that of several popular cable outlets: 104 percent over Bravo, 75 percent over TLC, 70 percent over Discovery. PBS’s primetime numbers for news and public affairs programming are 60 percent higher than CNN's overall primetime average, Kerger said. Morning children's programming viewers in 2010-11 were up 18 percent for ages 2 to 5 over the previous year. Seventy-nine percent of children nationwide ages 2 to 11 watched PBS, a total of 32.7 million, up 3 percent from 2009-10. The PBS Arts Fall Festival reached nearly 19 million viewers on Friday evenings, Kerger said, noting: "What's interesting to me, when we looked at the cume audiences, we pulled in a lot of new people on Friday nights. This is a niche so underserved by the rest of the media." On the digital side, viewers watched more than 128 million videos across all of PBS’s web and mobile platforms in December 2011 alone, up from an average of 2 million monthly views in 2008. Facebook fans jumped 110 percent in the last year, to more than 1 million. Twitter followers of PBS now number 930,000. And then, of course, there's Masterpiece megahit Downton Abbey. Besides its hefty ratings — Season 2 premiered to an audience of 6.3 million viewers across all plays, the highest for a Masterpiece episode in 17 years — it provided "one of the great moments in the past month," Kerger said, when Downton won the Golden Globe for best mini-series and, according to Twitter, was the single most-Tweeted moment of the awards broadcast on Jan. 15. Kerger said she realizes that tough issues remain, as stations wrestle with funding cuts and system sustainability. "But it's important to occasionally pause and savor the moment," she said.
Mid
[ 0.635235732009925, 32, 18.375 ]
There's a problem with your browser or settings. Your browser or your browser's settings are not supported. To get the best experience possible, please download a compatible browser. If you know your browser is up to date, you should check to ensure that javascript is enabled. After wakeup, FE-1 Shkaplerov performed the routine inspection of the SM (Service Module) PSS Caution & Warning panel as part of regular Daily Morning Inspection. Anton also conducted the routine daily servicing of the SOZh system (Environment Control & Life Support System, ECLSS) in the SM. This included the weekly collection of the toilet flush (SP) counter and water supply (SVO) readings for calldown to TsUP-Moscow, as well as the weekly checkup on the Russian POTOK-150MK (150 micron) air filter unit of the SM’s & FGB’s SOGS air revitalization subsystem, gathering weekly data on total operating time & “On” durations for calldown. [SOZh servicing includes checking the ASU toilet facilities, replacement of the KTO & KBO solid waste containers and replacement of EDV-SV waste water and EDV-U urine containers]. CDR Burbank took the (approx.) monthly O-OHA (On-Orbit Hearing Assessment) test, his first, a 30-min NASA environmental health systems examination to assess the efficacy of acoustic countermeasures, using a special software application on the MEC (Medical Equipment Computer) laptop. [The O-OHA audiography test involves minimum audibility measurements for each ear over a wide range of frequencies (0.25-10 kHz) and sound pressure levels, with the crewmembers using individual-specific Prophonics earphones, new Bose ANC headsets (delivered on 30P) and the SLM (sound level meter). To conduct the testing, the experimenter is supported by special EarQ software on the MEC, featuring an up/down-arrow-operated slider for each test frequency that the crewmember moves to the lowest sound pressure level at which the tone can still be heard. The baseline test is required not later than about Flight Day 14 for each new Expedition and is then generally performed once per month. Note: There has been temporary hearing deficits documented on some U.S. and Russian crewmembers, all of which recovered to pre-mission levels.] Later, Dan performed the VolSci (Voluntary Weekend Science) activity selected for today, an EPO (Educational Payload Operations) demo of 3 student-designed games,- Save the World, Alligator Clip Capture, and Independence Day. The demos were filmed with the G1 camcorder for subsequent downlink via HD MPC (Multi-Protocol Converter) on Ku-band.[EPO Demos are educational videos conducted by crewmembers on-board the ISS. Today’s video is intended to be edited on the ground and will be seen by grade 5-8 students and educators. Demo 1: Using a dartboard, Dan demonstrated “sports in space”, showing how Newton’s Laws of Motion are applied to games in microgravity space. This video will be used on the Space Out Sports Website at http://education.ssc.nasa.gov/spacedoutsports.asp . Demo 2: Crewmember was to release 5 alligator clips in the cabin, allowing them to float, then floated up to capture each alligator clip, from underneath and above the clip (created by students at Kinser Elementary {Department of Defense} School in Okinawa, Japan. Demo 3: Earning points by successfully tossing a baton-like object through a floating ring, cut from a sheet of paper and pasted appropriately. Crewmember then was to repeatedly toss unsharpened pencil (or like object) through the floating paper rings (created by students at Manhattan Beach Middle, Manhattan Beach, CA.] Anton & Anatoly finished up their lengthy IFM (Inflight Maintenance) on the TVIS treadmill, performing the long-term periodic chassis Inspection which they had been unable to finish on 12/2. Afterwards, Anatoly was to perform the speed characterization test while recording acoustic survey data, which of course was also not done on 12/2. [The inspection included the belt slats, weld nuts, treadbelt, drum set screws, 50 truss blue roller assemblies, side black rollers, and bottom black rollers. The crew also replaced 3 misaligned belt slat screws.] At ~4:45am EST, Anton Shkaplerov & Anatoly Ivanishin participated in an event set up for them in Moscow to cast their ballot in the Elections to the 6th State Duma of the Russian Federation Federal Assembly and Moscow Regional Duma Elections, formally authorizing their proxy agent Dmitry Alexandrovich Zhukov to fill out the ballot for them, with the required confidentiality being observed. [Alexander Ivanovich Popkov, chairman of the local election committee of Korolev City, Moscow Region, explained the ballot procedure and read out the ballot bulletin, then asked “Dear Anton Nikolayevich and Anatoly Alexeyevich, do you authorize Dmitry Alexandrovich Zhukov to fill out ballot bulletins thus giving effect to your will?” After filling out the forms in secrecy, D. A. Zhukov invited the participants to the voting room and dropped the ballots in a portable box while providing voice commentary of his actions to Anton & Anatoly, who thanked them thusly: “Participation in Russia’s political life is a crucial right of every citizen of the country! By casting our vote we shape the direction our nation will take in the future. Our future depends on our vote!” Besides a group of political and communal VIPs, assembled media included “Novosti Cosmonavtiki” magazine; “Russia Today” TV company; ZVEZDA TV Channel; ITAR-TASS news agency; Branch of “Podmoskovye” TV Channel (City of Losino-Petrovsky); NTV TV company; Channel 1 TV company; and RIA Novosti.] A ~30-min. run of the GFI-8 "Uragan" (hurricane) earth-imaging program with the NIKON D3X digital camera with Sigma AF 300-800mm telelens, aiming for Darwin Island, Vulcan Cordon-Kaul, and the glaciers of Patagonia, A 10-min. photography session for the DZZ-13 “Seiner” ocean observation program, obtaining HDV (Z1) camcorder footage of color bloom patterns in the waters of the South-east Atlantic, South-Eastern Pacific, and the south-west Atlantic, then copying the images to the RSK-1 laptop, Another ~30-min. session for Russia's EKON Environmental Safety Agency, making observations and taking KPT-3 aerial photography of environmental conditions on Earth using the NIKON D3X camera with the RSK-1 laptop. GHF Checkout: On 12/1, JAXA ground controllers began an extensive checkout of the GHF (Gradient Heating Furnace) payload on the Kobairo Rack in the Kibo JPM (JEM Pressurized Module) which will continue through about 14 days.
Mid
[ 0.552147239263803, 33.75, 27.375 ]
The present invention relates generally to protective clothing for firefighters and, more particularly, to a combination boot and turnout pant wherein the pant legs are removably secured to a pair of boots to provide a substantially watertight seal yet permit the boots to be readily removed from the pant. Firefighting is very physically demanding work which must be performed under stressful conditions even in the best of circumstances. It is essential for firefighters to wear clothing which protects them from the hazards of the fire environment, while still providing comfort and preventing unnecessary distraction from their work. Firefighter apparel most often consists of a longsleeved turnout coat, protective gloves, full length turnout pant, and boots. When firefighters respond to a call, they normally pull on turnout pant and then put on boots which extend up into the pant. Alternatively, the pant legs may be provided with large enough openings such that booted feet can pass through the pant legs. Ideally, it would be better to have the boots secured to the pant such that firefighters can simply slip off their current footwear and climb into the turnout pant and attached boots. However, there are problems associated with permanently attaching the boots to the pant. These problems include, cleaning the boots and pant on a periodic basis and the effective destruction of the pant whenever a boot is damaged or vice versa. Although the pant and boots of prior art turnout apparel provide excellent protection when firefighters are standing upright on a dry surface, many duties of a firefighter require stepping or kneeling in standing water. These duties invariably result in water entering one or both boots and/or the pant thermal layer. Besides being uncomfortable, a wet pant thermal layer or boot full of water is an unnecessary distraction which prevents firefighters from fully concentrating on their work. Even the moisture barrier of prior art turnout pant cannot prevent water from inching up the thermal layer once it becomes wet. A wet thermal layer takes a long time to dry and, more importantly, has lower thermal protection for the firefighter than a dry thermal layer. U.S. Pat. No. 4,879,769 discloses a vertically extending strap and fastener attachment means for attaching firefighters trousers to their boots to prevent the trouser cuffs from riding up and lodging at the upper edge of the boots. However, the strap and fastener attachment of this patent does not provide a moisture proof barrier which will keep the inside layers of the trousers and/or the boots dry when a firefighter is wading or crawling through water. Accordingly, there is a need for an improved combination turnout pant and associated boots which provide a substantially watertight seal between the pant and the boots to substantially reduce the intrusion of water into the boots and into a pant thermal layer, yet permit removal of the boots from the pant for periodic cleaning and for replacement or repair of a damaged boot or pant, thereby providing advances in the art and, more importantly, better protection for firefighters.
Mid
[ 0.633802816901408, 33.75, 19.5 ]
IL-1 beta is an important immunoregulatory molecule which is released from human monocytes upon stimulation with LPS. Because this protein lacks a leader sequence, it is not "packaged" within the endoplasmic recticulum and is therefore not released from the cells via the same mechanism as other commonly secreted proteins. The exact mechanism of release of IL-1 is not known, although one theory set forth suggests that IL-1 is released from monocytes following apoptotic cell death. The purpose of this study is to determine what effect M-CSF, a cytokine able to promote monocyte survival, has on the release of IL-1 beta from human monocytes. Using a variety of techniques, including radiolabeling of monocyte proteins and immunoprecipitation, we have determined that pretreatment of monocytes with MCSF results in a significant decrease (80-90% less than control) in the amount of IL-1 beta released from human monocytes. This decrease appears to be due specifically to a suppression in the release of IL-1 from the cells and not to changes in transcription, translation or enzymatic conversion of the IL-1 beta molecule. In addition, we have found that the levels of protein kinase C (PKC) and IL-1 convertase enzyme (ICE) are not altered by pretreatment with M-CSF. Levels of these enzymes were examined because they have been implicated in facilitating IL-1 release. This project has been completed and the information submitted for publication.
High
[ 0.6756032171581771, 31.5, 15.125 ]
Movie channels have long used original documentaries to augment and thematically connect bunches of films, which is helpful if said movies are, well, mediocre. Movie channels have long used original documentaries to augment and thematically connect bunches of films, which is helpful if said movies are, well, mediocre. Encore joins in that practice via “Industrial Light & Magic: Creating the Impossible,” an entertaining hourlong doc that plays like little more than a promotional video for founder George Lucas’ special-effects house, which, as writer-director J.J. Abrams notes, has technically given filmmakers “the ability to do anything.” What this cheerleading production never bothers to ask, conveniently, is whether that’s an unqualified cause for cinematic celebration. Any history of ILM, of course, begins with “Star Wars,” and it’s interesting to hear filmmakers like Ron Howard or Pixar’s John Lasseter discuss how seeing that effects-laden marvel struck them (to borrow a line from “The Godfather,” another ’70s epic) like the proverbial thunderbolt. Beyond the “Star Wars” franchise, the signature moment in ILM’s impact on moviemaking hinged on Lucas’ decision to turn the company into a resource for the entire industry — one that has created “some of the most iconic images that cinema has ever seen” and “revolutionized” the business, as the narration by Tom Cruise puts it. True enough. But what’s missing from writer-producer-director Leslie Iwerks’ flowery tribute is any reference to the quality of FX-oriented pics, or even a modest notation that some of the films representing key moments of technological progress — “The Abyss,” “Willow,” “Jumanji” among them — were otherwise forgettable, unlike, say, “Terminator 2: Judgment Day.” Nor is there any contemplation about a potential downside to computer-generated imagery or its questionable impact on the quality of storytelling. Indeed, about the only thing close to a discouraging word is a fleeting mention that while opinions differ about Jar-Jar Binks (really? Find me the one person over age 6 who likes him, other than Lucas), the ability to seamlessly insert a CGI character into shots marked a tremendous breakthrough. Certainly, ILM’s wizardry has come at a propitious time, allowing filmmakers to create action sequences that wouldn’t have been feasible previously in terms of time, budget and realism, facilitating the explosion of comicbook and fantasy properties. There are also some enlightening glimpses that pull back the curtain on the wonders of CG effects. Still, “Creating the Impossible” will be paired with a marathon of such afterthoughts from the ILM filmography as “Jumanji,” “Jurassic Park III” and “Twister,” which lets a bit air out of the doc’s sails. And the title actually rather unfortunately sounds like “Siegfried & Roy: Masters of the Impossible,” a 1990s animated series about the magic duo. Then again, that might be Encore’s logical encore: Unleash the CGI white tigers!
Low
[ 0.5251046025104601, 31.375, 28.375 ]
-- Remove inconsistent config channel state revisions where config channel org is -- not equal to staterevision org. DELETE FROM suseStateRevisionConfigChannel scc WHERE NOT EXISTS (SELECT 1 FROM rhnConfigChannel cc, suseStateRevision sr, web_contact wc WHERE cc.id = scc.config_channel_id AND scc.state_revision_id = sr.id AND sr.creator_id = wc.id AND wc.org_id = cc.org_id); DELETE from rhnServerConfigChannel sscc WHERE NOT EXISTS (SELECT 1 FROM rhnConfigChannel cc, rhnserver s WHERE cc.id = sscc.config_channel_id AND sscc.server_id = s.id AND s.org_id = cc.org_id); -- Recalculate positions for entries after removing some of them on the previous step. -- These SQL queries will keep the actual position ordering but ensuring there is no missing position. UPDATE suseStateRevisionConfigChannel SET position = ( SELECT rank FROM ( SELECT state_revision_id, config_channel_id, position, (row_number() OVER (PARTITION BY state_revision_id ORDER BY position ASC)) rank FROM suseStateRevisionConfigChannel scc ) ranking WHERE config_channel_id = suseStateRevisionConfigChannel.config_channel_id AND state_revision_id = suseStateRevisionConfigChannel.state_revision_id); UPDATE rhnServerConfigChannel SET position = ( select rank from ( SELECT server_id, config_channel_id, position, (row_number() OVER (PARTITION BY server_id ORDER BY position ASC)) rank FROM rhnServerConfigChannel sscc ) ranking WHERE config_channel_id = rhnServerConfigChannel.config_channel_id AND server_id = rhnServerConfigChannel.server_id);
High
[ 0.6712018140589571, 37, 18.125 ]
[The blood pressure response to physical exertion in adults: a preliminary survey results]. Monitoring changes in blood pressure except controlling clinical symptoms and electrocardiogram during submaximal physical exertion is essential for analyzing stress test results. Taking into consideration changes in a blood pressure play an important role in diagnostic procedures and assessment of exercise tolerance in adults. The aim of this study was to assess changes in blood pressure among adults during gradually increasing physical exertion. Blood pressure assessment was conducted in every single workload during exercise stress test. The preliminary study was performed in the randomly selected group of normotensive subjects n=224 including 107 female and 117 male 25-64 years old. Study participants had no cardiovascular or other noncommunicable diseases diagnosed by a physician. To determine cardiorespiratory fitness in the examined persons the submaximal exercise stress tests on a bicycle ergometer were performed. Blood pressure measurements were obtained according to Polish Hypertension Society (2003) standards by trained technician with a sphygmomanometer during rest period and during last minute on each level of workload. Mean values of resting systolic and diastolic blood pressure were significantly higher in male comparing with female (125.6 +/- 12.8 mmHg vs 117.7 +/- 15.6 mmHg for systolic and 81.3 +/- 8.5 mmHg vs 76.2 +/- 8.1 mmHg for diastolic blood pressure). We found statistically significant increase of exercise systolic and diastolic blood pressure comparing with its resting level (p<0.001). For all study participants association of exercise systolic blood pressure level and workload can be illustrate by linear equation: for female systolic blood-pressure (mmHg) = 0.0500 x load (W) + 159.74 and for male systolic blood-pressure (mmHg) = 0.3917 x load (W) + 136.00. During gradually increasing physical exertion systolic blood pressure is rising proportionally to increasing physical exertion. Mean values of systolic blood pressure on each level of workload had strong, linear increase. This study results can be useful in clinical practice for exercise tolerance assessment in adults and helpful for identification subjects with hypertensive response to physical exertion or hypertensive patients.
High
[ 0.706231454005934, 29.75, 12.375 ]
using Harmony; using Multiplayer.Common; using RimWorld; using RimWorld.Planet; using System; using System.Collections; using System.Collections.Generic; using System.Linq; using System.Reflection; using System.Reflection.Emit; using UnityEngine; using Verse; using Verse.Grammar; namespace Multiplayer.Client { [HarmonyPatch(typeof(Game))] [HarmonyPatch(nameof(Game.LoadGame))] public static class SeedGameLoad { static void Prefix() { Rand.PushState(); if (Multiplayer.Client == null) return; Rand.Seed = 1; } static void Postfix() { Rand.PopState(); } } [HarmonyPatch(typeof(Map))] [HarmonyPatch(nameof(Map.ExposeData))] public static class SeedMapLoad { static void Prefix(Map __instance, ref bool __state) { if (Multiplayer.Client == null) return; if (Scribe.mode != LoadSaveMode.LoadingVars && Scribe.mode != LoadSaveMode.ResolvingCrossRefs && Scribe.mode != LoadSaveMode.PostLoadInit) return; int seed = __instance.uniqueID; Rand.PushState(seed); if (Scribe.mode != LoadSaveMode.LoadingVars) { //UniqueIdsPatch.CurrentBlock = __instance.MpComp().mapIdBlock; UniqueIdsPatch.CurrentBlock = Multiplayer.GlobalIdBlock; } __state = true; } static void Postfix(bool __state) { if (__state) { Rand.PopState(); if (Scribe.mode != LoadSaveMode.LoadingVars) UniqueIdsPatch.CurrentBlock = null; } } } [HarmonyPatch(typeof(Map))] [HarmonyPatch(nameof(Map.FinalizeLoading))] public static class SeedMapFinalizeLoading { static void Prefix(Map __instance, ref bool __state) { if (Multiplayer.Client == null) return; int seed = __instance.uniqueID; Rand.PushState(seed); //UniqueIdsPatch.CurrentBlock = __instance.MpComp().mapIdBlock; UniqueIdsPatch.CurrentBlock = Multiplayer.GlobalIdBlock; __state = true; } static void Postfix(bool __state) { if (__state) { Rand.PopState(); UniqueIdsPatch.CurrentBlock = null; } } } [HarmonyPatch(typeof(CaravanEnterMapUtility), nameof(CaravanEnterMapUtility.Enter), new[] { typeof(Caravan), typeof(Map), typeof(CaravanEnterMode), typeof(CaravanDropInventoryMode), typeof(bool), typeof(Predicate<IntVec3>) })] static class SeedCaravanEnter { static void Prefix(Map map, ref bool __state) { if (Multiplayer.Client == null) return; int seed = map.uniqueID; Rand.PushState(seed); __state = true; } static void Postfix(Map map, bool __state) { if (__state) Rand.PopState(); } } [HarmonyPatch(typeof(LongEventHandler), nameof(LongEventHandler.QueueLongEvent), new[] { typeof(Action), typeof(string), typeof(bool), typeof(Action<Exception>) })] static class SeedLongEvents { static void Prefix(ref Action action) { if (Multiplayer.Client != null && (Multiplayer.Ticking || Multiplayer.ExecutingCmds)) { action = PushState + action + Rand.PopState; } } static void PushState() => Rand.PushState(4); } // Seed the rotation random [HarmonyPatch(typeof(GenSpawn), nameof(GenSpawn.Spawn), new[] { typeof(Thing), typeof(IntVec3), typeof(Map), typeof(Rot4), typeof(WipeMode), typeof(bool) })] static class GenSpawnRotatePatch { static MethodInfo Rot4GetRandom = AccessTools.Property(typeof(Rot4), nameof(Rot4.Random)).GetGetMethod(); static IEnumerable<CodeInstruction> Transpiler(IEnumerable<CodeInstruction> insts) { foreach (CodeInstruction inst in insts) { if (inst.operand == Rot4GetRandom) { yield return new CodeInstruction(OpCodes.Ldarg_0); yield return new CodeInstruction(OpCodes.Ldfld, AccessTools.Field(typeof(Thing), nameof(Thing.thingIDNumber))); yield return new CodeInstruction(OpCodes.Call, AccessTools.Method(typeof(Rand), nameof(Rand.PushState), new[] { typeof(int) })); } yield return inst; if (inst.operand == Rot4GetRandom) yield return new CodeInstruction(OpCodes.Call, AccessTools.Method(typeof(Rand), nameof(Rand.PopState))); } } } public static class PatchThingMethods { [HarmonyPriority(MpPriority.MpFirst)] public static void Prefix(Thing __instance, ref Container<Map>? __state) { if (Multiplayer.Client == null) return; __state = __instance.Map; ThingContext.Push(__instance); if (__instance.def.CanHaveFaction) __instance.Map.PushFaction(__instance.Faction); } [HarmonyPriority(MpPriority.MpLast)] public static void Postfix(Thing __instance, Container<Map>? __state) { if (__state == null) return; if (__instance.def.CanHaveFaction) __state.PopFaction(); ThingContext.Pop(); } } public static class RandPatches { [HarmonyPriority(MpPriority.MpFirst)] public static void Prefix(ref bool __state) { Rand.PushState(); __state = true; } [HarmonyPriority(MpPriority.MpLast)] public static void Postfix(bool __state) { if (__state) Rand.PopState(); } } [MpPatch(typeof(GrammarResolver), nameof(GrammarResolver.Resolve))] [MpPatch(typeof(PawnBioAndNameGenerator), nameof(PawnBioAndNameGenerator.GeneratePawnName))] [MpPatch(typeof(NameGenerator), nameof(NameGenerator.GenerateName), new[] { typeof(RulePackDef), typeof(Predicate<string>), typeof(bool), typeof(string), typeof(string) })] static class SeedGrammar { [HarmonyPriority(MpPriority.MpFirst)] static void Prefix(ref bool __state) { Rand.Element(0, 0); // advance the rng Rand.PushState(); __state = true; } [HarmonyPriority(MpPriority.MpLast)] static void Postfix(bool __state) { if (__state) Rand.PopState(); } } [MpPatch(typeof(PawnGraphicSet), nameof(PawnGraphicSet.ResolveAllGraphics))] [MpPatch(typeof(PawnGraphicSet), nameof(PawnGraphicSet.ResolveApparelGraphics))] static class SeedPawnGraphics { [HarmonyPriority(MpPriority.MpFirst)] static void Prefix(PawnGraphicSet __instance, ref bool __state) { Rand.PushState(__instance.pawn.thingIDNumber); __state = true; } [HarmonyPriority(MpPriority.MpLast)] static void Postfix(bool __state) { if (__state) Rand.PopState(); } } }
Low
[ 0.502136752136752, 29.375, 29.125 ]
Hippocampal corticosterone receptors and novelty-induced behavioral activity: effect of kainic acid lesion in the hippocampus. Rats were injected bilaterally in the dorsal and ventral hippocampus with kainic acid (KA) or with artificial CSF and their behavior and brain corticosterone (B) receptor systems were studied. The hippocampal KA injection destroyed part of the pyramidal neurons and of the dentate gyrus neurons. These neurons contain a receptor system for B. At 2 weeks after the KA lesion this B receptor system displays an increase in apparent maximal binding capacity (Bmax) of approximately 25%. The compensatory increase in B receptor concentration is reflected in an increased uptake of [3H]B in cell nuclei of hippocampal slices incubated in vitro with saturating concentrations of the steroid. Administration of a tracer dose of [3H]B shows that labelled steroid can enter in vivo the cell nuclear compartment of the KA-lesioned lobe. The role of B was investigated on novelty-induced behavioral activities of KA-lesioned and sham-lesioned animals in a large open and a small closed field at 10 days after bilateral adrenalectomy (ADX) or sham-ADX which is 14 days after the (sham) lesion. B (300 micrograms/kg rat) was administered s.c. 1 h prior to the test. KA lesion resulted in an increase in exploratory activity and a reduction in grooming and immobility. After ADX the effect of KA on exploration was reduced in the 5 min open field and abolished in the 30 min closed field. ADX animals displayed more grooming behavior (closed-field). B replacement of ADX rats reinstated the exploratory hyperactivity of KA-lesioned rats. On some components of the behavior such as ambulation in open-field and locomotion in closed field, there was even a larger responsiveness to B in the KA-lesioned rats than in the control animals. It is concluded that (1) after KA lesion of receptor containing neurons, the remaining tissue displays a compensatory increase in number of B receptor sites; (2) B is required for full expression of exploratory activity of rats with or without KA lesions; (3) the KA-lesioned rats display a larger responsiveness to B; and (4) the increased number of B receptor sites may underlie the larger responsiveness to B.
High
[ 0.7464114832535881, 29.25, 9.9375 ]
Q: Linear ODE question We have an first order ODE : Equation1 : $y' + y = x$ ? We can view the left-hand side as an operator acting on $y$. In that case $L=(d/dx + 1)$ $L(y_1) = x$ $L(y_2)=x$ $L(y_1+y_2)=x$ So, clearly $L(y_1+y_2) = x \neq L(y_1)+L(y_2) = 2x$ So why is $y'+y=x$ is a linear ODE ? A: As we discussed earlier in another thread, the following $$ L(y):=y'+y $$ is a linear operator. Note it is not $y'+1$. And note that linear means $$ L(\alpha y+ \beta z)=\alpha L(y)+ \beta L(z) $$ for every scalars $\alpha,\beta$, and every differentiable functions $y,z$. The fact that $L$ is linear is merely the fact that differentiation is linear. What you wrote $L(y_1+y_2)=L(y_1)+L(y_2)$ does not suffice to claim linearity of $L$. Now your ODE can be written $$ L(y)=f $$ with $f(x)=x$. The solution set is either empty, or an affine subspace $$y_p+\ker L$$ where $y_p$ can be any particular solution. This is exactly like linear systems $$ AX=B $$ where $A$ is a rectangular matrix. The solution set is either empty (the system is not compatible), or an affine subspace $$ X_p+\ker A $$ where $X_p$ is any particular solution. People say linear to stress out the fact that there is a linear part in the equation which yields the affine structure of the solution set. One could also say that the equation is affine, by writing it $L(y)-f=0$ and observing that $y\longmapsto L(y)-f$ is affine. But nobody says that, as far as I know.
High
[ 0.676543209876543, 34.25, 16.375 ]
Background {#Sec1} ========== Osteosarcoma is a bone malignancy primarily affecting adolescents and young adults, which is characterized by substantial clinical heterogeneity. Although patients with optimal neoadjuvant chemotherapy response (\>90% necrosis) have good prognosis, those with lower levels of tumor necrosis have more heterogeneous outcomes \[[@CR1], [@CR2]\]. Stratification of patients using pathologic necrosis as the only prognostic stratification factor has not led to improved outcomes in adjuvant clinical trials \[[@CR3]--[@CR5]\]. MicroRNAs (miRNAs) have emerged as novel candidate biomarkers as well as potential modulators of tumor behavior. We recently described miRNA expression models for recurrence and overall survival from formalin-fixed-paraffin-embedded (FFPE) biopsy specimens that confer strong prognostic discrimination independent of chemotherapy response \[[@CR6]\]. The majority of these prognostic miRNAs are located on the 14q32 locus, one of the few genomic regions that are imprinted in normal cells, which is thought to be critical in tissue development via a tightly controlled, allele-specific DNA methylation effect on gene expression. In addition, this locus contains a large cluster of non-coding elements, both miRNAs and other small nucleolar RNAs (snoRNAs) and long non-coding RNAs \[[@CR7], [@CR8]\]. In this study, we provide evidence for the clinical utility of 14q32 miRNAs as individualized prognostic biomarkers in osteosarcoma. Additionally, we show that there are substantial global transcriptional (miRNA and messenger RNA (mRNA)) changes across clinical risk groups, and we find in vitro and clinical evidence that differential methylation in the 14q32 non-coding cluster region may be underlying the miRNA expression changes and different tumor aggressiveness phenotypes. Our findings suggest that the non-coding 14q32 cluster contains a large number of useful clinically relevant biomarkers and is a locus of substantial genomic and epigenetic alterations that give rise to novel subtypes of osteosarcoma with distinct clinical, molecular, and biological context and therapeutic implications. Results {#Sec2} ======= 14q32 miRNAs accurately predict individual patient outcome {#Sec3} ---------------------------------------------------------- While miRNA profiles were prognostic of outcome in recent studies, the precise clinical utility of miRNAs located in the 14q32 region for individualized patient outcome prediction has not yet been determined. We used two previously published genomic datasets with outcome annotation (called "Boston" and "Utah" datasets) and studied the clinical prognostic utility of the 14q32 miRNAs via the time-dependent receiver operator characteristic (tdROC) curve method. A summary table for the two datasets, the details of which have been previously reported \[[@CR6], [@CR9]\], is provided in Additional file [1](#MOESM1){ref-type="media"}. In order to minimize overfitting that is frequently associated with the construction of complex multivariate models, we used the simple, yet robust "signed average" approach. First, we generated a tdROC curve based on the signed average of the top 5 prognostic miRNAs residing at the 14q32 locus, which were previously identified in the Boston dataset \[[@CR6]\] (and were able to be mapped on the Agilent platform used in the Utah dataset). These were miR-495, miR-329, miR-487b, miR-410, and miR-656, and the resulting tdROC curve was highly discriminatory for recurrence at 120 months (area under the curve (AUC) = 0.743; Fig. [1a](#Fig1){ref-type="fig"}). Then, we mapped this five-miRNA profile on the Agilent array and assessed its performance in the Utah cohort again using the signed average method. In this analysis, the prognostic model was fully frozen (selected miRNA features and signs were predefined in the Boston cohort) and applied to the Utah cohort, and we found that the 5-miRNA profile maintained a very strong discriminatory power for overall survival at 60 months (AUC = 0.723, permutation *p* = 0.03; Fig. [2a](#Fig2){ref-type="fig"}). The 60-month endpoint was chosen due to the much shorter follow-up in the Utah cohort.Fig. 1Time-dependent ROC analyses using various sets of 14q32 miRNA markers in the Boston cohort. **a** Signed averaged expression of top 5 miRNA markers (miR-495, miR-329, miR-487b, miR-410, miR-656). **b** Signed averaged expression of 18 miRNA markers from a previously published 18-miRNA signature. **c** Signed averaged expression of all miRNAs on 14q32 Fig. 2Time-dependent ROC analyses using various sets of 14q32 miRNAs in the Utah cohort. **a** Signed averaged expression of top 5 miRNA markers. **b** Signed averaged expression of 14 miRNAs mapped to the Agilent platform from the previously published 18 miRNA signature. **c** Penalized Cox regression model using three of the top 3 miRNA markers Given the rich miRNA content of the 14q32 chromosomal region, we were interested to test if the power for prognostic discrimination extended beyond the top 5 miRNA prognostic markers. Thus, we extended this analysis to a group of 18 miRNAs on the same locus that were part of a larger prognostic profile (that included the top 5) in the previous study and found that that they still accurately predicted an individual patient's risk to recur in both the Boston and Utah cohorts (Figs. [1b](#Fig1){ref-type="fig"} and [2b](#Fig2){ref-type="fig"}). Then, we tested all 62 miRNAs that are located on 14q32, and we found that the collection of these miRNAs offered good discriminatory capacity as well in the Boston cohort (Fig. [1c](#Fig1){ref-type="fig"}). We could not perform this analysis in the Utah cohort due to significant differences in the probe content between miRNA DASL (cDNA-mediated annealing, selection, extension, and ligation) and Agilent miRNA arrays, such that a significant subset of the total group of 14q32 miRNAs could not be mapped on the arrays from the Utah cohort. These results demonstrate that significant prognostic power resides on the entire 14q32 non-coding region, and miRNA subsets from this locus can be used for very accurate prognostic discrimination, using a simple method that minimizes model overfitting. ### Model streamlining and additional validation {#Sec4} As a prelude for future clinical optimization, we also performed multivariate modeling using penalized Cox regression and found a possible modest gain in accuracy with potential use of only three mRNA markers (AUC = 0.891, permutation *p* \< 0.01, and AUC = 0.806, *p* = 0.02, for the two datasets, respectively; Fig. [2c](#Fig2){ref-type="fig"}). We then tested the 3-miRNA profile on another, third dataset, which became recently available (called the "Texas" dataset \[[@CR10]\]) and had not been used before in any of our analyses (Additional file [1](#MOESM1){ref-type="media"}). After mapping the profile to the Taqman qRTPCR assay used in the Texas dataset, we performed penalized Cox regression, which strongly supported the reproducibility of the 3-miRNA model (AUC = 0.788, permutation *p* = 0.04; Fig. [3a](#Fig3){ref-type="fig"}). In order to further control for any residual amount of overfitting for the 3-miRNA model, we also performed the same analysis using 20 randomly generated lists of 3 miRNAs from the global Taqman assay, and none of these randomly generated models performed as well as the candidate 3-miRNA model. We then extended our analysis to the entire group of prognostic miRNAs previously identified in the Boston dataset. Using 23 of those 27 miRNAs that were available on the Taqman platform, we performed unsupervised hierarchal clustering of the samples in the Texas dataset. This resulted in two groups with substantially different survival (median survival 42 months versus not yet reached, log-rank *p* value 0.06; Fig. [3b](#Fig3){ref-type="fig"}). Given the sample size limitations and the technical differences between the three different expression platforms (DASL, Agilent, Taqman) involved in this analysis, these results provide strong independent evidence for the prognostic role of the 14q32 miRNA cluster in osteosarcoma.Fig. 3Prognostic analysis using 14q32 miRNAs in the Texas dataset. **a** Time-dependent ROC analysis using the candidate top 3 miRNA markers in a penalized Cox regression model in the Texas dataset. **b** Kaplan-Meier analysis using two patient clusters generated by unsupervised hierarchical clustering using 23 of all previously defined 27 prognostic 14q32 miRNAs that were available on the TaqMan qRTPCR assay 14q32 prognostic profiles and outcome following chemotherapy regimen selection {#Sec5} ------------------------------------------------------------------------------ For the patients who experience suboptimal response to standard preoperative methotrexate, doxorubicin, and cisplatin (MAP) chemotherapy (defined as \<90% necrosis in the operative specimen), there remains uncertainly as to whether adding alternate chemotherapy regimens such as ifosfamide/etoposide (IE) offer any benefit, with studies to date, including a recent large randomized trial, failing to show survival benefit. We were interested to assess if the miRNA profiles may have prognostic interaction with chemotherapy choice. In the Boston dataset (the only one for which details of postoperative alternative chemotherapy regimens were available), we constructed multivariate models using the signed averaged expression values for the 5-miRNA and 18-miRNA profiles, together with two clinicopathologic covariates, namely chemotherapy-induced necrosis and use of postoperative alternate chemotherapy regimen in addition to conventional MAP chemotherapy. tdROC analysis showed improved prognostic power with the combined models (AUC = 0.852, permutation *p* \< 0.01, and AUC = 0.854, permutation *p* = 0.07, respectively) at the 60-month follow-up time (Fig. [4](#Fig4){ref-type="fig"}) while use of chemotherapy as the sole prognostic variable was (as expected) not prognostic, and analysis combining the profiles with use or not of alternate chemotherapy did not show any improvement in prognostic power. (Analysis at a follow-up time of 120 months produced similar, only slightly lower, AUC values compared to the 60-month time point analysis (Additional file [2](#MOESM2){ref-type="media"}). This observation raises the possibility that these miRNA profiles may affect outcomes in the context of pathologic necrosis and use of alternate adjuvant chemotherapy, although this would need to be proven in a larger prospectively designed study, where predictive interaction with chemotherapy can be statistically assessed.Fig. 4Multivariate prognostic models including 14q32 miRNA profiles and clinicopathologic covariates. Multivariate models included signed averaged expression of **a** 5-miRNA and **b** 18-miRNA profiles (only 14 of 18 were included in this platform), together with pathologic necrosis and use of alternate postoperative chemotherapy regimen Robust osteosarcoma molecular subtype discrimination with subsets of 14q32 miRNAs {#Sec6} --------------------------------------------------------------------------------- We then considered the hypothesis that 14q32 miRNAs are not simply markers of prognosis but signify previously unrecognized distinct molecular subtypes of osteosarcoma. To address this, we first ascertained that sample assignments as "high" or "low" risk were not sensitive to the precise classification algorithm that was used. For example, class assignments were highly similar whether the 5-miRNA profile was used in the signed averaged expression model (described in the previous paragraph) or in a clustering-based grouping (Fisher's exact *p* \< 0.001) or in the supervised multivariate 5-miRNA model previously published (Fisher's *p* \< 0.001). This observation also held true in the Utah dataset (Fisher's *p* \< 0.001, for the signed average-based versus clustering-based grouping). Further, the classification was stable when we used a larger set of 18 miRNAs from this locus to classify samples using any of these methods in both datasets (Fig. [5a, b](#Fig5){ref-type="fig"}). Finally, similar concordance was observed in the Texas data, where the 3-miRNA model classification was highly associated with the groups generated by hierarchical clustering using 3, 5, and 23 of the prognostic miRNAs mapped on the Taqman platform (Fisher's *p* = 0.04, 0.07, and 0.03, respectively). Confirmation of strong similarity in terms of risk group assignments for the samples independent of the specific number of miRNAs and grouping method suggests that the miRNA markers track potential underlying molecular phenotype.Fig. 5Display (multidimensional scaling (MDS)) of sample risk stratification based on 14q32 prognostic miRNAs. **a** MDS of the Boston cohort using 18 miRNAs. **b** MDS of the Utah cohort using 14 miRNAs that were mapped on the Agilent array. *Yellow/blue color* represents sample risk assignments according to the 5-miRNA prognostic model. Classification was highly concordant between the 5 and the 18 miRNA set Substantial global miRNA changes across osteosarcoma subtypes {#Sec7} ------------------------------------------------------------- If the two prognostic risk groups represent molecular subtypes, one might expect that they display large-scale molecular differences in addition to the marker 14q32 miRNAs. Thus, we performed global miRNA differential expression analysis between the high- and low-risk groups in the Boston dataset (which were defined in our previous report) and found that 492 miRNA probes (64%) were differentially expressed across the risk subtypes (*t* test *p* \< 0.05; Benjamini-Hochberg false discovery rate (FDR) \<0.07; Fig. [6a](#Fig6){ref-type="fig"}, Additional file [3](#MOESM3){ref-type="media"}). Since the proposed subtypes are not yet established, and in order to ascertain that these subtype-related miRNA expression differences are not due to a statistical artifact, we generated 100 random splits of the samples and tested them for differential miRNA expression. None of these randomly generated groups yielded a similar level of global miRNA differential expression. Multidimensional scaling (principal component analysis) was then performed with the global miRNA content (all miRNAs only filtered by low variance), and the three-dimensional sample groups were highly associated with the 5-miRNA model risk predictions (Fisher's *p* \< 0.001; Fig. [7a](#Fig7){ref-type="fig"}). Of interest, hierarchical clustering the samples using the global miRNA content provided a trend for prognostic discrimination (median RFS 126 versus 151 months; log-rank *p* = 0.092; Fig. [7b](#Fig7){ref-type="fig"}), though it did not reach the level of statistical significance achieved when using the 14q32 miRNA markers. We then assessed the correlation of the miRNAs with DICER, a key gene involved in the miRNA biogenesis and processing machinery. We found that only a small fraction of the miRNAs that were differentially expressed between the subtypes (5%) were moderately or strongly correlated with *DICER1* (Spearman rank correlation coefficient = 0.44--0.51; *p* \< 0.01; Additional file [4](#MOESM4){ref-type="media"}), suggesting that DICER may account for (only) a small part of the miRNA deregulation in the subtypes.Fig. 6Global miRNA differential expression and overlap in the Boston and Utah datasets. **a** Global miRNA differential expression between high- and low-risk subtypes in the Boston dataset (*left panel*) and the Utah dataset (*right panel*). *Blue dots* represent probes with statistically significant differential expression. **b** Overlap between the Boston and Utah datasets in terms of miRNAs shown in **a**. *Left panel* shows the total overlap of all differentially expressed miRNAs. *Right panel* shows the overlap in miRNAs upregulated in high-risk subtypes (hypergeometric test *p* \< 0.0001 for the overlap in both comparisons). Overlap in miRNAs downregulated in high-risk subtypes was smaller but still statistically significant (*p* \< 0.01) Fig. 7Global miRNA content distinguishes patients with different recurrence and survival probabilities. **a** MDS of the Boston cohort. **b** Kaplan-Meier analysis (recurrence-free survival) in the Boston cohort groups based on unsupervised hierarchical clustering of samples using the global miRNA content. **c** MDS of the Utah cohort. *Yellow/blue color* represents sample risk assignments according to the 5-miRNA prognostic model. Classification was highly concordant for the 5-miRNA set and clustering using the global miRNA content These findings were reproduced in the Utah dataset, where 546 miRNA probes (36%) were differentially expressed across survival risk groups (*p* \< 0.05; FDR \<0.139; Fig. [6a](#Fig6){ref-type="fig"}, Additional file [3](#MOESM3){ref-type="media"}), but with no similar differences observed in any of the 100 random sample splits. Multidimensional scaling/principal component analysis using the global miRNA content also demonstrated that the risk groups were significantly associated with the 5-miRNA signed averaged expression-based predictions (Fisher's *p* = 0.05; Fig. [7c](#Fig7){ref-type="fig"}) and classification was highly concordant regardless of the number of miRNAs used in clustering. Finally, in the Texas dataset, hierarchical clustering using different numbers of miRNAs (3, 5, 23) produced highly similar groups, which were also similar to clustering using the 14q32 miRNAs or even the global miRNA content (Fisher's *p* \< 0.05 for all comparisons). These results from the three datasets support the notion that these risk groups represent true molecular osteosarcoma subtypes with substantial underlying molecular differences beyond the set of 14q32 miRNAs. We then explored this hypothesis in a publicly available miRNA dataset from 19 osteosarcoma cell lines \[[@CR11]\]. In this dataset, experimental data were available, grouping the cell lines according to their proliferative capacity. We compared highly aggressive and less aggressive cell lines (by virtue of high proliferation versus low proliferation, as previously published \[[@CR12]\]) and again found a substantial amount of differential miRNA expression. Importantly, we also found a moderate to strong amount of overlap in subtype-specific differential expression among the two clinical and the cell line datasets. Figure [6](#Fig6){ref-type="fig"} shows the scale of differential miRNA expression between high- and low-risk subtypes and the degree of overlap between the two clinical datasets, which was highly significant using a hypergeometric distribution test. Generally, there was a much stronger concordance in miRNAs upregulated in the aggressive phenotype than in miRNAs downregulated in the aggressive phenotype among the datasets. Details of the cell line miRNA differential expression analysis are provided in Additional file [3](#MOESM3){ref-type="media"}. The observation of reproducible large-scale miRNA overexpression in aggressive samples in two clinical and one in vitro datasets further supports the hypothesis of distinct molecular osteosarcoma subtypes with different biologic and clinical behavior. Global mRNA expression changes across osteosarcoma subtypes {#Sec8} ----------------------------------------------------------- We also studied global mRNA transcript changes (other than microRNA), which were available for a subset of 37 samples from the Boston dataset, with respect to the risk subtypes, and found that 1362 mRNA probes (13%) were differentially expressed across risk subtypes (*p* \< 0.05; FDR \<0.275) in the Boston dataset. Although these changes were statistically more modest compared to the respective miRNA changes in supervised univariate analysis (partly due to the smaller sample size of the mRNA dataset), they still are consistent with the notion of largely different transcriptional programs between the two subtypes. Also, unsupervised genome-wide gene expression (mRNA) clustering generated subgroups (Additional file [5](#MOESM5){ref-type="media"}) that showed a strong trend for association with both the 5- and 18-miRNA previously defined model risk predictions (Fisher's exact *p* = 0.05--0.08 for different association tests). These observations further speak to the possible existence of distinct molecular phenotypes. Interestingly, the list of differentially expressed genes was enriched for all the transcripts on the 14q32 genomic locus, taken collectively as a single gene set or potential functional unit (KS/LS enrichment *p* = 0.06). This collection includes 124 coding genes and 95 non-coding RNAs (long non-coding RNAs and small nucleolar RNAs (snoRNAs), which were included in the DASL whole genome array), raising the possibility of a regional mechanism of coordinated regulation affecting both coding and non-coding RNA elements on the 14q32 locus. 14q32 miRNAs are highly correlated with other 14q32 non-coding genes {#Sec9} -------------------------------------------------------------------- In a hypothesis-based approach, we tested the 14q32 miRNAs and found that several of them were also highly correlated with other non-coding genes located on 14q32. For example, *MEG3*, a long non-coding RNA, was also highly correlated with several of the miRNAs, as were numerous snoRNAs located near the 14q32 miRNA cluster (*p* \< 0.05, uncorrected because of the small number of variables). These correlations (Table [1](#Tab1){ref-type="table"}) suggest a potentially highly coordinated mechanism of expression regulation including coding as well as non-coding elements within the larger imprinted 14q32 chromosomal region. A list of all significant correlations of the 14q32 genes with prognostic miRNAs is shown in Additional file [6](#MOESM6){ref-type="media"}.Table 1Association between long (or short) non-coding genes with prognostic miRNAs on the 14q32 locusGene nameNumber of miRNAsAverage correlationCorrelation rangeSNORD112100.3910.488 to 0.326SNORD113-2170.4610.569 to 0.360SNORD113-3160.4420.561 to 0.342SNORD113-520.3570.368 to 0.345SNORD113-640.3650.392 to 0.328SNORD113-8170.5710.723 to 0.437SNORD113-9180.4090.508 to 0.350SNORD114-130.3630.409 to 0.328SNORD114-1310.4500.450SNORD114-172−0.337−0.326 to −0.348SNORD114-2420.3670.407 to 0.327MEG3130.4490.570 to 0.327Analysis in the Boston dataset (Spearman *p* \< 0.05; total number of miRNAs tested, 28) 14q32 prognostic miRNAs correlate with aggressive osteosarcoma behavior in vitro {#Sec10} -------------------------------------------------------------------------------- We used the 19-osteosarcoma cell line dataset (introduced above) to test the hypothesis that 14q32 miRNAs define distinct osteosarcoma subtypes in vitro, correlated with tumor aggressiveness as predicted by our genomic analysis of the clinical osteosarcoma cohorts. In this study, five variables were used as metrics of cancer cells' aggressiveness: tumorigenicity, colony-forming ability, invasion, migration, and proliferation \[[@CR13]\]. We selected all miRNAs on the 14q32 locus, which were associated with recurrence in univariate analysis, in our previous study of the clinical Boston cohort (Cox regression *p* \< 0.05), resulting in a matrix of 27 miRNAs (a subset of which is the 5-miRNA profile shown above). We studied the association between the 14q32 prognostic miRNAs with cell line "aggressiveness" metrics, as reported in the public dataset. We found that the median expression levels of the 27 prognostic miRNAs (in aggregate) were higher in the aggressive cell lines (defined by proliferative capacity, Mann-Whitney *p* = 0.02). In addition, unsupervised hierarchical clustering of the cell lines using the expression patterns of these miRNAs distinguished a cluster of mainly aggressive cell lines based on a composite metric of migration/invasion/colony-forming capacity, which can be viewed as an in vitro surrogate for metastatic potential (Fig. [8](#Fig8){ref-type="fig"}, Fisher's *p* = 0.05 for association between the composite metric and miRNA-based cluster groups).Fig. 8Hierarchical clustering of aggressive and non-aggressive cell lines. Separation by hierarchical clustering of aggressive and non-aggressive cell lines based on 27 miRNAs from 14q32 that are significantly associated with recurrence in the clinical Boston cohort (clusters were the same whether the top 5 or all 27 miRNAs were used). Aggressive cell lines tend to segregate preferentially together. (Mann-Whitney *p* = 0.02 for supervised median expression difference between the two groups). *Red*: relative overexpression. *Green*: relative underexpression Further, we found a number of significant or strongly trending (*p* \< 0.1) associations testing each individual miRNA in relation to the different aggressiveness metrics of the cell lines (Additional files [7](#MOESM7){ref-type="media"} and [8](#MOESM8){ref-type="media"}). In a two-group differential expression analysis (high versus low proliferative cell lines), 13 miRNAs were upregulated in the more proliferative cell lines. Eight miRNAs were upregulated in highly invasive cell lines, while one was downregulated. Three miRNAs were upregulated in cell lines with increased migratory ability, while two were downregulated. Two miRNAs were upregulated in cell lines with higher colony-forming ability, while two miRNAs were upregulated in cell lines with higher tumorigenicity. Generally, the large majority of the miRNAs appear upregulated in the more aggressive phenotype, with the exception of hsa-miR-493 and hsa-miR-411\*, which were consistently downregulated in the aggressive cell lines. To circumvent possible pitfalls of binarization in cell line assays, we also analyzed proliferation as a continuous variable. In this analysis more (17) of the 27 prognostic miRNAs were highly or moderately correlated either positively (Spearman coefficient = 0.394 to 0.646) or negatively (Spearman coefficient = −0.403 to −0.582) with greater levels of proliferation at 72 h, which was the end time point of the proliferation experiments in the public data (all at *p* \< 0.1). Two miRNAs were highly or moderately correlated with colony-forming ability (Spearman = 0.618, 0.653; *p* \< 0.1) while three miRNAs were highly or moderately correlated with invasiveness (Spearman = 0.405, −0.418, −0.54; *p* \< 0.1). Again, the majority of these correlations were positive, while hsa-miR-493 expression was negatively correlated with migration capacity at a significant or trending level (Spearman = −0.453; *p* \< 0.1). This miRNA was the only one consistently negatively associated with the other more aggressive phenotypes in all types of statistical analysis. Proliferation appears to be the single individual attribute better capturing the extent of association between 14q32 miRNAs and cell line aggressiveness. However, the composite invasion/migration/colony-forming capacity metric also showed a clear association with aggressiveness, as a possible surrogate for clinical metastatic potential. Genomic map and context for methylation regulation in the imprinted 14q32 locus {#Sec11} ------------------------------------------------------------------------------- The hallmark of 14q32 is allele-specific methylation (imprinting). In order to explore the genomic context as it relates to imprinting control on miRNAs, we first considered a map of the locus containing the genes, non-coding RNAs (miRNAs or others), and CpG densities localized on 14q32 (Fig. [9a](#Fig9){ref-type="fig"}). Most of the prognostic miRNAs (previously defined in the clinical cohorts) are generally clustered in a 350-kb region of 14q32, which also contains the majority of all other non-coding RNAs on this locus, including 41 out of 47 snoRNAs. The non-coding RNA cluster also includes the *DLK1-DIO3* differentially methylated region (DMR), which includes both the intergenic DMR (IG-DMR) and the *MEG3* DMR and controls imprinting of this locus (Fig. [9b](#Fig9){ref-type="fig"}). Upon further exploration, we noted that there are several CpG islands (CGIs) within the 14q32 miRNA/non-coding cluster. CGIs are unmethylated in "normal tissue"; however, variable degrees of CGI methylation have been associated with various disease states including cancer \[[@CR14]\].Fig. 9Map of the 14q32 locus and its non-coding cluster. **a** Map of the 14q32 locus. **b** Map of the non-coding RNA cluster on the 14q32 locus. Long non-coding RNAs are in *green*, miRNAs in *red*, snoRNAs in *blue*, differentially methylated regions (*DMRs*) in *yellow*, CpG content in *gray*, and CpG islands in *violet* Methylation at the imprinted *MEG3* locus on 14q32 correlates with deregulation of the non-coding RNA cluster {#Sec12} ------------------------------------------------------------------------------------------------------------- Based on these observations, we were interested to study the association between miRNA expression and DNA methylation. The non-coding RNA cluster lies in the *DLK1-DIO3* imprinted region, which also includes the long non-coding RNAs, *MEG3*, *MEG8*, and *MEG9* (Fig. [8](#Fig8){ref-type="fig"}), and is regulated by at least two DMRs, the intergenic DMR and the *MEG3* DMR \[[@CR15]--[@CR17]\], with involvement of CCCTC zinc finger-binding factor (CTCF). Recent data suggest a process of loss of imprinting (LOI) in this region, which is involved in cancer development \[[@CR18]\], and a correlation between methylation patterns in the *MEG3* promoter and expression of several miRNAs in the 14q32 ncRNA cluster has been suggested. The direction of the correlation may be different for methylation of CTCF binding sites (positive) versus conventional promoter methylation (negative) \[[@CR16]\]. This is consistent with the known role of CTCF as a transcription enhancer blocker. We hypothesized that this regulatory pattern may hold true in osteosarcoma, and we tested this hypothesis using publicly available miRNA expression (Agilent array) and methylation data (Illumina 27K array) from the previously mentioned 19-osteosarcoma cell line dataset. We focused on seven CpG sites interrogated by the 27K array, which are located upstream of the miRNAs and proximal to the *MEG3* promoter (no intergenic probes are interrogated by this array). One of these CpG sites, corresponding to the probe cg09280976, is located within a known CTCF binding site in the *MEG3* promoter, and another one, corresponding to the probe cg04291079, is located in the *MEG3* gene body, in a region where there is no known CTCF binding site. The other five probes are located close to but not entirely within CTCF binding sites. In our analysis, we found that 7 of the 27 14q32 prognostic miRNAs showed moderately or highly positive correlation with the methylation probe cg09280976 at a significant or strongly trending level (Spearman = 0.596--0.404; *p* \< 0.1; Table [2](#Tab2){ref-type="table"}). Eight of these 27 miRNAs were moderately or highly negatively correlated with the methylation probe cg04291079 at a significant or strongly trending level (Spearman = −0.393 to −0.552; *p* \< 0.1; Table [2](#Tab2){ref-type="table"}), while two were moderately positively correlated (Spearman = 0.554--0.400; *p* \< 0.1; Table [2](#Tab2){ref-type="table"}). Methylation probes located near, but not entirely within, CTCF binding sites showed variable, positive and negative, correlations with miRNAs (Table [2](#Tab2){ref-type="table"}).Table 2Correlation between *MEG3* methylation probes and prognostic miRNAsMethylation probeDistance from *MEG3* TSSCorrelation with 14q32 prognostic miRNAsNumber of miRNAsOverlap with CTCF binding sitecg16561326NoneNoneNear site (in promoter)cg09287750.466 (0.596 to 0.404)7In site (in promoter)cg25831560.459 (0.528 to 0.396)3Near site (in promoter)cg05711−218−0.5611Near site (within gene body)cg1537−628−0.443 (−0.408 to −0.631)13Near site (within gene body)cg1510−12640.546 (0.621 to 0.428)2Near site (within gene body)cg0429−1968−0.283 (−0.554 to −0.552)10Not in site (within gene body)Locations of *MEG3* promoter and gene body methylation probes with respect to MEG3 transcription start sites (TSSs), CTCF binding sites, and correlation with the 14q32 prognostic miRNAs associated with proliferation (*p* \< 0.1) We also found that expression of 23 of the 27 prognostic miRNAs was also positively correlated with *MEG3* expression (Spearman = 0.808--0.409; *p* \< 0.1) while only one miRNA was negatively correlated (Spearman = −0.582; *p* \< 0.1). Finally, four of the methylation probes in the non-coding RNA cluster were positively correlated with *MEG3* expression (Spearman = 0.528--0.41; *p* \< 0.1). These results, taken together, suggested a possible methylation-based regulation of both short and long non-coding RNAs in this imprinted genomic region. We then sought to validate these observations using a genomic resource that recently became available by the NIH. The NCI Therapeutically Applicable Research to Generate Effective Treatments (TARGET) osteosarcoma project generated several genomic profiles for a large number of patient samples and includes DNA methylation data (on the more advanced Illumina 450K methylation array) as well as miRNA TaqMan qRTPCR expression data. For most of the *MEG3* CpG sites targeted by methylation probes, we found remarkable similarity between the moderate or moderately strong methylation/miRNA correlations observed in the cell lines (Table [2](#Tab2){ref-type="table"}) and the correlations seen in the TARGET data (Fig. [10](#Fig10){ref-type="fig"}). This was particularly striking, for the two methylation sites were previously identified as clearly within (targeted by probe cg09280976) or clearly not within a CTCF binding site (targeted by probe cg04291079), both showing the same positive or negative association with miRNA expression seen in the cell line analysis. The rest of the *MEG3*methylation sites showed generally similar variable associations seen in the cell line data with the exception of two probes within the gene body. These differences could be possibly related to the small sample size and inherently heterogeneous nature of the cell lines, as well as the fact that the effect of gene body methylation is much less clear than that of promoter methylation. Also, one promoter site (probe cg1656), which did not show significant associations in the cell lines, did show moderately strong associations in the TARGET data, which probably further supports the original hypothesis as it is located very near a CTCF binding site and it should be expected to show a clear positive correlation with expression. Due to publication restrictions currently in place by the NCI on the osteosarcoma TARGET data (see "[Methods](#Sec17){ref-type="sec"}"), we are only allowed to provide numerical details of the correlation coefficients for a small subset of the miRNAs. Therefore, as an example, we show the average correlation coefficients for the following four miRNAs: miR-495, miR-329, miR-656, and miR-411\*, which were some our top miRNA prognostic markers in the three previously analyzed clinical datasets (Boston, Utah, Texas). For these four miRNAs, the average correlation coefficients were as follows: cg09971646, 0.2105; cg16567044, 0.408; cg09280976, 0.323; cg25836301, 0.219; cg05711886, 0.185; and cg15101633, 0.199. These correlation coefficients were largely unchanged when the larger group of prognostic 14q32 miRNAs was considered.Fig. 10Association between *MEG3* methylation patterns and 14q32 miRNA expression in the clinical NCI TARGET data. Analysis of 10 probes for CpG sites within the *DLK1/MEG3* imprinted region included on the Illumina 450K methylation array. Correlation coefficients for each probe, averaged over the prognostic 14q32 miRNAs, are shown. Coefficients between 0.3 and 0.5 were considered moderately strong, and those between 0.15 and 0.3 were considered moderate. A + or − sign symbolizes a positive or negative correlation coefficient, respectively (Spearman *p* \< 0.1). Upstream or downstream distances of the CpG sites from the *MEG3* TSS are also shown Of interest, additional three CpG sites targeted by probes in the arrays and located in the *DLK1* gene locus showed moderate, variable (positive/negative), or no association with the miRNAs, potentially to be expected given their localization \~100 kb upstream of the *MEG3* transcription start site (TSS), further underscoring the potential specificity of the *MEG3* methylation effect on the non-coding RNA cluster. Differential methylation at the imprinted 14q32 locus correlates with aggressive osteosarcoma behavior in vitro {#Sec13} --------------------------------------------------------------------------------------------------------------- Next, we used the same cell line data to determine if methylation patterns in the non-coding RNA cluster correlated with aggressiveness phenotypes. First, we performed hierarchical clustering using the methylation patterns of the seven *MEG3* methylation probes analyzed in the previous section and examined the resulting clusters for the 19 cell lines. We observed that the cell line clusters were significantly associated with aggressiveness (measured by proliferation, Fisher's *p* \< 0.05 when using either two or three proliferation groups, high/low or high/intermediate/low, as previously published) (Fig. [11a](#Fig11){ref-type="fig"}). Similar results were obtained when we repeated the clustering including additional four probes from the 27K array located in the *DLK1* promoter and gene body (recognizing that methylation effects often represent an aggregate of changes in a broader genomic region, especially when CTCF binding is involved).Fig. 11Association between methylation patterns and cell line proliferation. **a** Unsupervised clustering of the *MEG3* methylation probes shows an association between methylation patterns and proliferative capacity (Fisher's *p* \< 0.05). **b** Three-way plot of methylation intensity of the cg09280976 probe versus average prognostic miRNA expression and cell line proliferative capacity. **c** Three-way plot of methylation intensity of the cg04291079 probe versus average prognostic miRNA expression and proliferative capacity In a two-group differential methylation analysis between two proliferation phenotypes (high/low), 7 of 11 CpG sites had higher methylation in cell lines with increased colony-forming ability (*p* \< 0.1) (high and low categories as previously published). Four CpG sites had higher methylation in more invasive cell lines, cell lines with greater migratory capability (*p* \< 0.1) as well as cell lines with higher tumorigenicity (*p* \< 0.1), compared to their respective less aggressive counterparts. In a continuous variable correlation analysis, methylation at five CpG sites was positively correlated with colony-forming ability (Spearman = 0.634--0.392; *p* \< 0.1). Methylation intensity at one CpG site near *DLK1* was also positively correlated with invasive ability (Spearman = 0.599); trending *p* \< 0.1) while another CpG site was positively correlated with migration (Spearman = 0.5; *p* \< 0.05). Detailed results of the differential methylation analyses and the continuous variable correlation analyses are included in Additional file [9](#MOESM9){ref-type="media"}. We then hypothesized that there may be a three-way association between prognostic miRNA expression, methylation, and cell line aggressiveness. As an example, we focused on two CpG sites represented by Illumina 27K array probes cg09280976 and cg04291079, because, as explained above, their corresponding locations are known to be clearly within or clearly outside known CTCF binding sites and it was therefore conceptually easier to predict biologic associations. For each probe, we plotted CpG methylation versus average expression of miRNAs that were associated with that probe and with proliferative capacity at a Spearman *p* \< 0.1 versus proliferative capacity as a continuous variable. The resulting 3-D plots (Fig. [11b, c](#Fig11){ref-type="fig"}) recapitulate possible biologic interactions in this imprinted region. For the probe that is located within a CTCF binding site, we observe two cell line clusters in the "corners" of the plot displaying the patterns "high methylation/high expression/high aggressiveness" and "low methylation/low expression/low aggressiveness," respectively, consistent with the known transcription enhancer-blocking role of CTCF in the imprinted locus (Fig. [11b](#Fig11){ref-type="fig"}). For the probe that is located outside CTCF binding sites, we also observe two cell line clusters in diagonally opposed corners as compared to panel b. These clusters display patterns of "high methylation/low expression/low aggressiveness" and "low methylation/high expression/high aggressiveness," respectively, consistent with a conventional negative regulatory effect of promoter methylation on expression. Associations between individual probe methylation and aggressiveness showed a strong trend for significance in panel b, while in panel c they did not, possibly related to the possible heterogeneity in the cell line group and the presence of some cell lines that did not necessarily follow these clear biologic patterns. Also, it is unlikely that one methylation probe, in isolation, can fully account for overall tumor behavior especially when its regulatory effect would be contrary to the broader methylation effect in this same region. Differential miRNA network targeting between high- and low-risk tumors reveals possible therapeutic targets {#Sec14} ----------------------------------------------------------------------------------------------------------- Expression levels of miRNAs do not fully reflect their biologic activity. We previously reported on miRNA gene targets with gene set enrichment and found modest evidence that some miRNAs appear to exert regulatory influence \[[@CR6]\]. However, this approach assumes that the regulators affect each gene equally and does not take into account multiple sources of information on gene regulation. Inference on biologic activity can be drawn by analyzing miRNA regulation of target gene expression in the context of a gene regulatory network. Our group recently described a network inference method for network that models the regulatory effects of transcription factors. This method (called "PANDA") integrates different "omics" data types to infer network edges that accurately estimate gene expression regulation \[[@CR19], [@CR20]\]. Here, we implemented a modification of PANDA (called "PUMA," PANDA Using MicroRNA Associations), which estimates regulatory effects of miRNAs on gene expression. We implemented PUMA to reconstruct networks for the high- and low-risk osteosarcoma subtypes using mRNA expression data from the Boston clinical cohort and "prior" data from the STRING database, JASPAR, and TargetScan. The gene regulatory networks showed substantial differences in gene targeting between the two risk groups. This is interesting in light of our earlier finding of a large number of differentially expressed miRNAs between the high- and low-risk patient groups, especially because our network construction model did not incorporate miRNA expression levels. In order to place this finding in a wider context, we analyzed chemotherapy response phenotypes in a similar manner and found much less differential miRNA targeting between groups of patients with optimal versus suboptimal chemotherapy-induced necrosis (Fig. [12a](#Fig12){ref-type="fig"}). We then focused on a network module derived by the 5-miRNA prognostic profile to determine what differences in gene regulation may be driven by these miRNAs (Fig. [12b, c](#Fig12){ref-type="fig"}). We identified significant differences in multiple edges of these networks using a permutation test on sample labels (Additional file [10](#MOESM10){ref-type="media"}). Patients with poor prognosis showed a particularly active module targeted by miR-495. The top differential edges of this network included at least two tumor suppressor genes (*GAS1* and *CD9*). Although miR-495 showed the strongest overall statistical signal for perturbed regulation, the other four miRNAs also contributed a number of statistically significant differential edges. These included multiple genes of known or potential significance including, for example, another known tumor suppressor gene in osteosarcoma (*RASF5*), which was differentially regulated by two of five miRNAs in this network module. Thus, increased targeting of tumor suppressor genes may be a mechanism by which these prognostic miRNAs individually or synergistically could affect tumor behavior and prognosis. Furthermore, Gene Ontology analysis of target genes in the network modules suggested that these miRNAs may differentially regulate pathways of cellular senescence, insulin signaling, osteoblast differentiation, and processes related to cellular proliferation and cell cycle and growth signaling (Additional file [11](#MOESM11){ref-type="media"}).Fig. 12Differential miRNA networks between high- and low-risk patient groups in the Boston cohort. **a** Differential regulation ("targeting") by all miRNAs present in the Boston dataset across the two recurrence risk groups (clustering high/low). For comparison, samples with high versus low chemotherapy-induced necrosis do not demonstrate major differences in miRNA targeting. **b** Network module derived from the 5-miRNA profile. Node size corresponds to the number of edges (connections). Edge thickness is proportional to statistical significance. **c** The two miRNAs with the highest number of significant edges from the network module shown in **b**. For both miRNAs, the 20 most differential edges are shown. **d** Selected candidate drug-gene interaction from the network module. In all networks, *red* and *blue edges* indicate edges with higher targeting in the high-risk and low-risk groups, respectively. In **c** and **d**, genes upregulated and downregulated in the high-risk group are shown in *red* and *blue*, respectively We then curated the list of all significant edges from the 5-miRNA network (in all 652 edges/637 genes) and screened it against the Drug Gene Interaction Database, a previously published interactive database of gene drug interaction supported by clinical or preclinical evidence. Figure [12d](#Fig12){ref-type="fig"} shows a selected subset of these interactions, suggesting possible hypotheses for therapeutic development including histone deacetylase (HDAC) inhibitors, proteasome inhibitors, or mTOR inhibitors, some of which are already in clinical or preclinical development in sarcoma or osteosarcoma. A detailed list of possible gene-drug interactions from the networks is provided in Additional file [12](#MOESM12){ref-type="media"}. Discussion {#Sec15} ========== We, and others, previously reported that a collection of miRNAs on the 14q32 locus is associated with prognosis in osteosarcoma \[[@CR6], [@CR21]\]. Prognostic association via a Kaplan-Meier analysis does not guarantee the value of a test for predicting individual patient course. Thus, our tdROC analysis complements prior findings and demonstrates an excellent discriminatory power for miRNAs in this locus, which was replicated in three separate miRNA datasets. This replication is quite significant when one considers the very different characteristics of the three datasets (different array platforms, frozen versus paraffin tissue material, somewhat different clinical characteristics with respect to age distribution and the mix of metastatic/nonmetastatic cases, and a relatively small number of recurrence/death events in two of the datasets), which may also explain any minor differences in the findings among the three datasets. New studies will be required, in larger multi-institutional cohorts, in order to select the optimal subset of miRNAs among the 50--60 present at 14q32, for a clinically useful test to be developed. While potentially different subsets of these miRNAs could also be appropriate markers, we believe that the 5-miRNA or 3-miRNA profiles described in this study would be excellent candidates. Evidence to date has been disappointing with respect to the use of alternate chemotherapy regimens, such as ifosfamide/etoposide, for patients who do not achieve an optimal pathologic response to standard preoperative chemotherapy with the MAP regimen. This was further underscored by the recent publication of the results from the large international randomized EURAMOS-1 study. This may signify true lack of clinical benefit from these regimens, but it could also suggest lack of an optimal stratification approach for selection of the right patient subset. Our findings suggest that these miRNAs may also be candidates for further study as possible markers for selecting patients for such alternate regimens, in stratification schemes that may include miRNA expression and conventional pathologic necrosis in the operative specimen. Proof of this concept will require analysis in a large cohort with prospectively randomized chemotherapy regimen allocation, such that a formal test of interaction can be performed. It was inherently not possible to perform such analysis in our data, but our findings would perhaps justify such a study in the future. We suggest that, in addition to being prognostic markers, these miRNAs may track previously unidentified osteosarcoma molecular subtypes, potentially related to imprinting defects at 14q32. We found that the subgroups of patients defined by the miRNA risk profile harbor substantially different global (genome-wide) miRNA expression patterns, as well as different mRNA expression patterns. The miRNA patterns were more strongly associated with patients' outcome compared to mRNA patterns. It is quite possible that miRNAs are better surrogates for tumor behavior, given their capacity to regulate large numbers of coding genes. In addition, miRNA detection may be more degradation proof than mRNA detection in banked tissue, though our results are possibly confounded by the smaller sample size of the mRNA dataset (compared to the miRNA dataset). That having been said, the characterization of patient samples as "high risk" versus "low risk" was consistent regardless of which particular method (supervised or unsupervised) or subset of miRNAs was used for sample risk prediction, and clustering-based groups were associated whether using either the global miRNA or the global mRNA data. Furthermore, the large-scale miRNA differences between high- and low-risk samples were also reproducible in two additional clinical and one in vitro datasets. Taken together, these observations support the notion of robust molecular subtypes in osteosarcoma with very different transcriptional programs, coding and non-coding. Using the largest (published to date) osteosarcoma cell line dataset with genome-wide molecular information, we found that the expression patterns of the 14q32 miRNAs as a function of cell line aggressiveness were largely concordant with the findings in the clinical datasets. Cell line proliferation seemed to be the single best correlate of individual miRNA expression, although a composite metric of invasion/migration/colony formation that was used as a surrogate for metastatic potential also showed a clear association with collective 14q32 miRNA patterns. These findings notwithstanding, it should be acknowledged that attributes such as invasion and migration and overall clinical metastatic potential may also be more heavily dependent on tumor-stroma interactions and other elements, which are generally lost in cell line systems and which our current bioinformatics analysis in the cell lines may not adequately capture. Some of the individual miRNA associations presented are only strongly trending as opposed to nominally significant in the cell lines; however, the cell line datasets are often imperfect correlates of clinical observations, and the cell line dataset was much smaller compared to the clinical datasets, where the associations have been shown to be more robust. Also, 14q32 miRNAs can probably be considered functionally interrelated, and when we analyzed them in aggregate via clustering, their association with cell line aggressiveness was robust. Previous reports have demonstrated both tumor-promoting and tumor-suppressing effects of 14q32 miRNAs in different settings, but the outcome-related findings in our study are consistent with previously reported effects of these miRNAs in other malignancies such as leukemia, lung cancer, and liver cancer as well as their growth-promoting effect in mouse pluripotent stem cells \[[@CR16], [@CR22]--[@CR24]\]. Network analysis using inferred miRNA-mRNA regulatory events by integrating target prediction with mRNA data provided insights into potential 14q32 miRNA-driven mechanisms in tumors with different prognosis and suggested that these may include perturbation of tsumor suppressor genes \[[@CR25]--[@CR29]\]. Furthermore, this analysis recapitulated the strong correlation between the miRNAs and tumor aggressiveness showing that their target networks include a large number of proliferation and cell cycle-related pathways and further supporting the notion of distinct regulatory programs affecting cellular behavior in the proposed osteosarcoma subtypes. To place these results in context, we observed a much wider network perturbation related to tumor aggressiveness and recurrence, compared to chemotherapy response, an endpoint that is more proximal in the natural history of the tumor. This leads us to speculate that overcoming short-term chemotherapy resistance may prove easier than achieving long-term remission or cure in osteosarcoma. This network analysis is limited by the fact that it provides in silico evidence, requiring future functional elucidation. Due to the multidimensional and multi-interactive nature of the networks, complex experimental designs will be needed in order to provide optimal in vitro systems for functional exploration of these networks. However, this is one of the first large-scale attempts to generate such networks in human specimen cohorts in this rare tumor. The 14q32 chromosomal band uniquely contains a very large cluster (\>100) of non-coding RNAs, including snoRNAs, microRNAs, and long non-coding RNAs, which is the largest known miRNA cluster in the genome (54 miRNAs). Genetic defects at 14q32 have been associated with severe developmental abnormalities, suggesting a very tight regulatory role in early tissue growth and differentiation. In our study, we noted a high degree of coordinated expression between miRNAs, snoRNAs, and long non-coding RNAs, suggesting perhaps an integrated mechanism of expression regulation in this region. Furthermore, 14q32 is an imprinted genomic region \[[@CR7], [@CR30], [@CR31]\]. Imprinting is defined as allele-specific expression and is found in genomic regions critical for tissue growth and embryonic development. Typically, non-coding RNAs are expressed on the maternal allele while coding RNAs are expressed on the paternal allele, controlled by allele-specific methylation in genomic areas called imprinting control regions, or differentially methylated regions (DMRs). Disruption of this mechanism, called "loss of imprinting" (LOI), has been described not only in developmental abnormalities but also in cancer \[[@CR18]\]. An enhancer-blocking factor, CCTC zinc finger-binding factor (CTCF), is also involved in gene and miRNA expression control in imprinted regions such as the *H19-IGF2* and 14q32 loci, in a methylation-sensitive manner. Specifically, it binds to unmethylated insulator sequences on DNA, preventing active enhancer-promoter interactions, thereby reducing transcription \[[@CR15], [@CR17], [@CR32]\]. Our data support a three-way interaction between methylation, miRNA expression, and the phenotype (tumor aggressiveness), possibly contingent upon CTCF binding activity. Specifically, expression patterns of a large subset of the 14q32 miRNAs were associated with methylation patterns in the *ME*G3 DMR region, and both were associated with tumor aggressiveness. The mechanism behind this interaction is likely complex. We found that hypermethylation of *MEG3* DMR sites within a CTCF binding domain is associated with increased miRNA expression (potentially by inhibiting CTCF binding and its enhancer-blocking effect as described above) and higher tumor aggressiveness. In contrast, hypermethylation of *MEG3* DMR sites outside a CTCF binding domain is associated with decreased miRNA expression and decreased tumor aggressiveness. A very similar mechanism of methylation-sensitive CTCF binding and miRNA expression control at 14q32 was recently described in acute promyelocytic leukemia, and other reports have shown regulation of this imprinted domain by allele-specific enhancer activity in human embryonic stem cells \[[@CR15]--[@CR17], [@CR32]\]. This genomic region has been reported to contain a large number of enhancer elements \[[@CR33]\], and further studies will be required in order to identify which of them may be involved in the regulation of non-coding 14q32 genes in osteosarcoma. The basic methylation/expression associations discovered in the cell lines were also reproducible in the large clinical osteosarcoma TARGET dataset. Perhaps more importantly, findings related to methylation sites within or outside known CTCF binding domains were highly similar between the in vitro and the clinical TARGET data. Future functional characterization and validation of the CTCF-related methylation/expression loop will require elaborate targeted designs including perhaps CRISPR approaches, but our initial observations herein, both in an in vitro and in a large clinical dataset, provide first evidence in support of this hypothesis. Both coding and non-coding 14q32 genes, taken collectively as a single gene set, were enriched in the overall transcription program differences characterizing the subtypes. We also found evidence of coordinated expression regulation of coding and non-coding genes on 14q32, most strikingly a strong positive correlation between snoRNAs and miRNAs. Whether all these changes or changes in genes like *DICER* (a known miRNA processing gene) are functional elements of a wider pathogenetic mechanism controlled by imprinting and related to the biology of the osteosarcoma subtypes remains to be clarified. While very little is known on the function of snoRNAs in general, it is interesting to note that overexpression of 14q32 snoRNAs has been reported to promote tumor growth in acute leukemia \[[@CR34], [@CR35]\]. The methylation platform employed in the cell line dataset was not comprehensive enough to allow assessment of all relevant *MEG3* DMR CpG sites as well as the intergenic DMR sites. In addition, recent reports have suggested that the effect of methylation on gene expression in osteosarcoma may be different for different genomic "compartments" such as promoter CGIs, CGI shores, enhancers, or intergenic regions. Pilot analysis in a small clinical cohort showed either hypermethylation or hypomethylation in osteosarcoma tumors with high recurrence potential, and one other recent study also provided initial evidence of and insight into the effect of 14q32 methylation patterns in osteosarcoma \[[@CR36], [@CR37]\]. Our findings do not contradict but rather complement these reports and indicate that both IG-DMR and *MEG3* DMR methylation in conjunction with loss of imprinting, possible gene enhancer function, and expression of the entire 14q32 non-coding RNA cluster should be thoroughly studied in relation to osteosarcoma biology and outcome. It is unclear what fraction of osteosarcoma tumors harbors the methylator phenotype proposed here, and studies in small clinical cohorts may underestimate its incidence. Though methylation data on the clinical cohorts were not available, the miRNA-defined high-risk patient group appears enriched for this phenotype, and the cell line data suggest that it could affect about 20--25% of the cases. This would be consistent with data in other tumor settings where the CpG island methylator phenotype (CIMP) is a relatively rare epigenetic phenomenon \[[@CR14]\]. In addition, methylation changes in different imprinting control regions or genomic compartments may lead to different phenotypes. Integrated studies utilizing methyl sequencing and global non-coding and coding gene profiling in large national cohorts, such as the NCI TARGET osteosarcoma initiative, will hopefully provide answers to these questions. In addition, these comprehensive studies can also fully address the possible influence of chromosomal amplification or copy number variation on miRNA expression. This was not examined in our study, though prior literature suggests that genomic copy number variation may not be a big factor in the regulation of gene expression at 14q32 \[[@CR38]--[@CR43]\]. Ultimately, this line of research will allow the development of a set of mechanistically relevant clinical biomarkers based on loss of imprinting and/or non-coding RNA expression, with important therapeutic implications. Randomized trials have tested the addition of interferon or ifosfamide and etoposide to the standard neoadjuvant chemotherapy consisting of cisplatin/doxorubicin/methotrexate in localized osteosarcoma patients, using chemotherapy-induced pathologic necrosis as a risk stratification marker \[[@CR3]--[@CR5], [@CR44]\]. While results to date point toward a lack of additional, or uncertain, benefit with either intervention, it is conceivable that rather than absolute lack of antitumor activity, these results reflect an imperfect marker for treatment stratification. Our prior work has shown that 14q32 miRNAs confer prognostic value independent of chemotherapy response, with the added benefit that they can be obtained early, at the time of diagnosis, as opposed to after 10 weeks of preoperative treatment \[[@CR6]\]. As suggested above, a strategy that combines pathologic necrosis with miRNA biomarkers may allow for better treatment stratification in the future. Furthermore, development of methylation 14q32 biomarkers may enhance the discriminatory power of the miRNA assays, or even perhaps surpass them, as previous reports have suggested that methylation markers may be more stable and less susceptible to random variations over time in human cancer specimens \[[@CR45]\]. Testing all these hypotheses in archived clinical trial material, such as that of the NCI TARGET initiative, could revolutionize an approach to adjuvant treatment as well as treatment with demethylating agents, such as decitabine, currently in clinical trials in metastatic osteosarcoma. In addition, new studies employing RNA and DNA methylation sequencing approaches will provide further depth in our understanding of the clinical and biologic effects addressed in this study. Finally, our drug-gene interaction screen, though computational in nature, was based on multiple sources of public experimental and clinical data, providing additional testable hypotheses for therapeutic development. Some of the drugs from our screen are already in clinical development for osteosarcoma (such as HDAC inhibitors), and an altered mTOR/PI3K/PTEN pathway was identified as a therapeutic target in 25% of tumors in a recently reported osteosarcoma genomic study \[[@CR46]\]. One might envision a possible combinatorial and stratified application of these drugs, based on the molecular subtypes presented here. Conclusions {#Sec16} =========== In conclusion, our findings support a set of clinically applicable biomarkers of osteosarcoma outcome localized on the 14q32 chromosome and suggest that this genomic region defines previously unrecognized molecular subtypes with distinct transcriptional programs and epigenetic regulation. An unmet medical challenge in osteosarcoma is the propensity of this tumor for early metastasis despite effective chemotherapy in a significant subset of patients. Modulation of the non-coding 14q32 region may ultimately address the highly proliferative and migratory potential of the aggressive subtypes, thus providing valuable new therapeutic avenues in this disease. Methods {#Sec17} ======= Human and cell line miRNA, mRNA, and methylation array data {#Sec18} ----------------------------------------------------------- We used three previously published clinically annotated human osteosarcoma datasets. One consisted of DASL miRNA expression data from 65 and mRNA data from 37 diagnostic biopsy specimens from Beth Israel Deaconess Medical Center and Boston Children's Hospital (called "Boston dataset," GEO accession GSE39040), and another consisted of Agilent miRNA expression data from 27 frozen tissue specimens from the University of Utah (called "Utah dataset," Array Express accession E-MTAB-1136). The third dataset consisted of ABI TaqMan human microRNA qRTPCR data from 25 frozen diagnostic biopsy samples from the University of Texas Health Science Center (called "Texas dataset," GEO accession GSE79181, details of which were published before \[[@CR10]\]). Cell line miRNA data (Agilent arrays) and methylation data (Illumina 27K array) were derived from 19 osteosarcoma cell lines (published by the Institute of Cancer Research, Oslo University, GEO accession GSE28425, GSE36004). Transcription and methylation array details as well as clinical cohort and cell line annotations have been previously reported \[[@CR6], [@CR9], [@CR11], [@CR47]\]. We also used new data provided by the NCI, which launched the TARGET initiative, producing a repository of large-scale genomic data from a number of rare pediatric cancers. Within the osteosarcoma TARGET project, methylation profiles for 86 osteosarcoma patients (Illumina 450K array) and miRNA expression profiles for 89 osteosarcoma patients (MegaPlex TaqMan) became recently publicly available (<http://target.nci.nih.gov/dataMatrix/TARGET_DataMatrix.html>, retrieved November 10, 2016). The NCI has currently placed a limitation on publishing findings from analyzing osteosarcoma TARGET data. (<https://ocg.cancer.gov/programs/target/target-publication-guidelines>). This limitation allows investigators to only publish data from a focused analysis of a handful of genes, until the primary osteosarcoma project TARGET investigator team publishes their first "global" analysis of the genomic data. In complying with this limitation, any TARGET-derived data we present here are only related to methylation and expression analysis of a very small number of genes and miRNAs, all focused on the 14q32 locus. Therefore, our analysis is in no way similar in scope to the (currently unpublished) global genomic investigation of osteosarcoma undertaken by the TARGET initiative. For any global expression analysis in the Boston, Utah, and Texas datasets, variance filtering was performed excluding 33% of probes with the lowest variance for the miRNA arrays and 66% of probes with the lowest variance for mRNA arrays, before performing any genome-wide (global) analyses. MiRNA expression values were quantile normalized before being subjected to further statistical analysis. For analyses involving methylation intensity, we utilized the *M* value (a transformation of the conventional beta value) as it has been shown to possess better statistical properties for differential analysis \[[@CR48]\]. Further methodological details related to processing and analyzing these data are provided in Additional file [13](#MOESM13){ref-type="media"}. Recurrence and survival prediction and tdROC curves {#Sec19} --------------------------------------------------- In order to avoid overfitting, we used the signed average method and leave-one-out cross-validation in all survival analyses. In this approach, we averaged the expression levels of individual miRNA features in each candidate profile, weighted only by the sign of their hazard ratio (positive or negative) in univariate Cox regression analysis, and the resulting signed averaged metric was used as the prognostic index \[[@CR49]--[@CR51]\]. Kaplan-Meier analysis with log-rank test and Cox regression were used to analyze or model recurrence and survival as necessary. In the Utah dataset, time-censored recurrence data were not available, so we used overall survival as the time-censored endpoint. Time-dependent receiver operating characteristic (tdROC) and area under the curve (AUC) analyses were performed as previously described. For the Boston dataset, the tdROC endpoint was 120 months, while for the Utah dataset, it was set to 60 months due to the shorter follow-up available in that study. Penalized multivariate Cox regression analysis was performed as previously described \[[@CR52]\]. Class comparison, gene set enrichment, and clustering {#Sec20} ----------------------------------------------------- Two-class comparison of continuous variables was done using the *t* test, and *p* values were corrected with the Benjamini-Hochberg FDR test while the Mann-Whitney test was used for non-parametric two-class continuous variable comparisons. In the case of testing a small number of variables based on prespecified hypotheses, we present unadjusted univariate *p* values. Univariate two-sided *p* values \<0.05 were considered significant, except in some exploratory analyses in cell lines involving a limited number of preselected methylation and expression probes, where we also report associations at a *p* \< 0.1 as suggestive of biologic inference. When examining the proposed molecular tumor subtypes, not previously established in the literature, we generated 100 random splits of the samples and considered that the expression differences between the proposed subtypes are significant if less than 5% of the random splits showed the same degree of differential expression as the proposed subtypes. We performed gene set analysis using the KS/LS statistic to determine if the expression profiles of the high- and low-risk groups were enriched for gene sets or miRNA targets of interest, according to the functional class scoring method \[[@CR53]\]. Unsupervised hierarchical clustering was performed with the average linkage method as previously described \[[@CR54]\]. We also used multidimensional scaling to construct 3-D representation of sample locations in the multivariate expression space. Standard biostatistical tests {#Sec21} ----------------------------- We explored categorical associations using 2 × 2 tables and Fisher's exact test. Spearman rank correlation was used to determine the association between continuous variables. The hypergeometric distribution test was used to assess significance of the overlap between two miRNA lists. All reported *p* values are two-sided. Chromosomal coordinates for methylation site localization and CTCF and enhancer binding site identification {#Sec22} ----------------------------------------------------------------------------------------------------------- Data plots showing gene coordinates and CpG island frequencies were plotted using Circos \[[@CR55]\]. Chr14q32 was defined as the region between the co-ordinates 89,800,000 and 109,000,000 on chromosome 14. The location of genes, non-coding RNA, and miRNAs within these co-ordinates were derived from UCSC hg19 gene annotation tables. UCSC bed file annotations of CpG island locations in hg19 were used to determine CpG island location. CPG frequency was determined by counting the number of CpG islands within 100,000 bp upstream a given location. CTCF binding sites in *MEG3* were determined in previous studies \[[@CR16], [@CR17]\]. These sites were cross-referenced with the University of Tennessee CTCF binding site database, which includes data from the UCSC genome browser and the Broad Institute \[[@CR56]\]. Search for enhancer sites was performed using the VISTA Enhancer Browser (Lawrence Berkeley National Laboratory) as previously described \[[@CR33]\]. MiRNA regulatory network analysis and drug-gene interaction screen {#Sec23} ------------------------------------------------------------------ We used a method called PUMA (PANDA using MicroRNA Associations, Kuijjer et al., in preparation). This is a network reconstruction algorithm that models gene regulation by miRNAs and transcription factors and is an extension of our previously published network reconstruction method PANDA \[[@CR19]\], which uses message passing between regulatory, protein-protein interaction, and gene expression data to model information flow between regulators and their target genes. PUMA extension works similar to PANDA, but in the message-passing steps does not allow microRNAs to form edges in the protein-protein interaction network, thereby indirectly influencing microRNA-target gene edges. We reconstructed networks for both subtypes and generated a set of "background" permuted networks to estimate edge significance (defined as activity score outside the four standard deviation range of the background distribution. Details are provided in Additional file [14](#MOESM14){ref-type="media"}, and implementation of the PUMA algorithm is available at <https://github.com/mararie/PUMA>. For drug target identification, we utilized the Drug Gene Interaction Database (DGIdb) as previously described \[[@CR57]\]. Bioinformatics/biostatistics analysis software {#Sec24} ---------------------------------------------- We used the NCI BRB-ArrayTools software (developed by Dr Richard Simon and the BRB-ArrayTools Development Team) and the SPSS software, version 18 (IBM Corporation, NY). Additional files ================ {#Sec25} Additional file 1:Clinical characteristics of the Boston, Utah, and Texas datasets. These published datasets were used to assess the prognostic value of a subset of miRNA subsets located on 14q32 via the tdROC curve method. Available follow-up was different between the two datasets such that we needed to choose a primary endpoint of 120 months for the Boston dataset and 60 months for the Utah and Texas datasets. (PDF 141 kb) Additional file 2:Multivariate prognostic models including 14q32 miRNA profiles and clinicopathologic covariates, analyzed at the follow-up time of 120 months. (PDF 447 kb) Additional file 3:Differentially expressed miRNAs between the two subtypes in the three datasets. The Boston, Utah, and cell line data were analyzed to determine the differential expression of their miRNA population. (PDF 154 kb) Additional file 4:Correlations between DICER and differentially expressed miRNAs in the Boston dataset. DICER1 is a gene that encodes for an endoribonuclease essential for the formation of microRNA, and it is also located on 14q32. We analyzed the correlation between miRNA expression on the 14q32 locus and DICER1 expression and found that a small fraction (5%) of miRNAs was significantly correlated with DICER1. (PDF 174 kb) Additional file 5:Boston dataset hierarchical clustering using the messenger RNA (whole-genome) profiles. (Based on data available for a subset of 37 patients only). (PDF 20 kb) Additional file 6:Correlations between prognostic miRNAs and other 14q32 transcripts in the Boston dataset. Eighteen prognostic miRNAs that we found on 14q32 were compared with the remaining coding and non-coding transcripts on that same locus to investigate whether a larger pattern of co-regulation may exist. (PDF 424 kb) Additional file 7:Association between prognostic 14q32 miRNAs and cell line aggressiveness (binary analysis). An analysis between 14q32 miRNA expression and the following characteristics associated with cell line aggressiveness was performed: proliferation, invasiveness, migration, colony forming, and tumorigenicity. These attributes were analyzed as binary (categorical) variables. (PDF 538 kb) Additional file 8:Association between prognostic 14q32 miRNAs and cell line aggressiveness (continuous variable analysis). Spearman correlation coefficients were assigned between 14q32 miRNAs and continuous variables representing cell line aggressiveness (colony forming, invasiveness, migration, and proliferation). (PDF 462 kb) Additional file 9:Association between *DLK1/MEG3* methylation and cell line aggressiveness. The relationship between methylation and cell line aggressiveness was analyzed for methylation site neighboring or on *DLK1* and *MEG3*, both located on 14q32. This analysis was limited by the number of available methylation probes for this region on the Illumina methylation array. Cell line aggressiveness was assessed via colony forming, invasiveness, migration, and tumorigenicity. (PDF 447 kb) Additional file 10:Network edge differences between the two subtypes. (PDF 557 kb) Additional file 11:Significant network GO categories. (PDF 412 kb) Additional file 12:Network gene-drug screen interactions. This includes a detailed list of possible gene-drug interactions as a result from the screen applied between the significant edges from the 5-miRNA network and the Drug Gene Interaction Database. (PDF 488 kb) Additional file 13:Supplementary methods. Additional details are provided on certain aspects of our analytical procedures. (PDF 461 kb) Additional file 14:Supplementary PUMA methods. This file is the detailed protocol followed for the implementation of PUMA in order to reconstruct networks for high- and low-risk osteosarcoma subtypes. (PDF 998 kb) AUC : Area under the curve CGI : CpG island CIMP : CpG island methylator phenotype CTCF : CCCTC zinc finger-binding factor DASL : cDNA-mediated annealing, selection, extension, and ligation DGIdb : Drug Gene Interaction Database DMR : Differentially methylated region HDAC : Histone deacetylase IG-DMR : Intergenic DMR KS : Kolmogorov-Smirnov LS : least squares LOI : Loss of imprinting PANDA : Passing Attributes between Networ for Data Assimilation PUMA : PANDA Using MicroRNA Associations snoRNAs : Small nucleolar RNAs tdROC : Time-dependent receiver operating characteristic TSS : Transcription start site **Electronic supplementary material** The online version of this article (doi:10.1186/s13045-017-0465-4) contains supplementary material, which is available to authorized users. Results published here are in part based upon data generated by the Therapeutically Applicable Research to Generate Effective Treatments (TARGET) initiative managed by the NCI. Information about TARGET can be found at <http://ocg.cancer.gov/programs/target>. Specifically, we wish to acknowledge the Children's Oncology Group (COG) for collecting the tissues for TARGET as part of COG clinical and biological protocols (Peter C. Adamson, MD, Children's Hospital of Philadelphia, Philadelphia, PA, USA) and the principal investigators for the Osteosarcoma project (Ching Lau, MD, PhD, Texas Children's Hospital, Houston, TX, USA; Paul Meltzer, MD, PhD, National Cancer Institute, National Institutes of Health, Bethesda, MD, USA). We also wish to thank Dr Yidong Chen (University of Texas Health Science Center at San Antonio) for assistance in the use of the osteosarcoma data generated by her group (GEO accession CSE79181). Funding {#FPar1} ======= This study was supported by National Cancer Institute grant 1R01CA178908 to DS and grant 1R35CA197449 to JQ. BHK was supported by the Gattuso-Slaight Personalized Cancer Medicine Fund at Princess Margaret Cancer Centre, the Cancer Research Society (Canada), Ministry of Economic Development, Employment and Infrastructure and the Ministry of Innovation of the Government of Ontario, and the Canadian Institutes of Health Research. DS and EC wish to acknowledge the generous support of Wendell Colson and Joanne Casper to the MGH Sarcoma Research Program. The funders had no role in the study design, data collection and analysis, decision to publish, or preparation of the manuscript. Availability of data and materials {#FPar2} ================================== All data are available from the GEO accession numbers GSE39040, GSE28425, GSE36004, and CSE79181 and Array Express accession number E-MTAB-1136. NCI TARGET-generated data used for osteosarcoma methylation and miRNA analysis are available at <http://target.nci.nih.gov/dataMatrix/TARGET_DataMatrix.html>. Authors' contributions {#FPar3} ====================== KEH, ADK, and DS conceived the study. KEH, ADK, MLK, WB, AR, CG, HK, JG, APA, and DS performed the studies and analyzed the data. KEH, ADK, MLK, WB, AR, CG, HK, KJ, MCG, MSA, GC, FH, EC, ZD, JQ, BHK, and DS wrote the manuscript. All authors read and approved the final manuscript. Competing interests {#FPar4} =================== The authors declare that they have no competing interests. Consent for publication {#FPar5} ======================= Not applicable. Ethics approval and consent to participate {#FPar6} ========================================== All data were obtained from publicly available datasets. Ethics approval prior to performance of the previously published studies had been previously obtained at all participating institutions. Publisher's Note {#FPar7} ================ Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Mid
[ 0.577319587628865, 28, 20.5 ]
400000 (base 5) in base 3? 12101202012 11111100110110001 (base 2) to base 9 216521 What is -314425 (base 8) in base 12? -50731 Convert 12001002001021 (base 3) to base 9. 5032037 What is -82118 (base 10) in base 12? -3b632 1415069 (base 11) to base 4 21103000100 What is -1202201101201 (base 3) in base 8? -3452351 What is 10024043 (base 5) in base 8? 234032 -49662 (base 10) to base 2 -1100000111111110 19b271 (base 12) to base 7 3603025 Convert -3b07c5 (base 13) to base 14. -292cb8 What is -6ceb1 (base 15) in base 5? -42110231 Convert 111010010000010011 (base 2) to base 8. 722023 -111000001010110101 (base 2) to base 11 -147944 61cdaa (base 14) to base 13 8b7660 What is 13000203 (base 4) in base 14? a667 Convert 103321203 (base 4) to base 12. 3b203 Convert a29399 (base 11) to base 8. 6233022 -73660 (base 15) to base 2 -1011001010101110100 Convert -1d2c5 (base 15) to base 5. -11021020 What is -a5855e (base 15) in base 13? -1829621 What is 132095 (base 15) in base 14? 19c856 Convert 1c06b2 (base 15) to base 2. 101001110000101001000 What is 26c978 (base 14) in base 3? 2112010102112 Convert 95352 (base 11) to base 15. 2b214 -1010111011100101111 (base 2) to base 11 -225129 What is 101100010111000010111 (base 2) in base 4? 11202320113 What is 757122 (base 8) in base 16? 3de52 Convert -178389 (base 13) to base 14. -114b32 What is -15600b (base 16) in base 3? -2122011121002 Convert -1422a7 (base 14) to base 6. -22541123 Convert -467253 (base 8) to base 5. -20100103 Convert -1100100110111110001 (base 2) to base 15. -82649 Convert 444561 (base 7) to base 8. 231234 857617 (base 10) to base 12 354381 Convert -237d0 (base 14) to base 13. -3056c What is -6b2604 (base 15) in base 6? -301433221 -7d9585 (base 14) to base 5 -2044234334 Convert -1010001001111100010111 (base 2) to base 14. -4d426b Convert 20401323 (base 5) to base 4. 221100003 What is 32422232 (base 6) in base 9? 1733842 What is -2028e3 (base 16) in base 13? -58a417 Convert 18aa8 (base 12) to base 16. 8d20 180339 (base 10) to base 7 1350525 Convert 223224100 (base 6) to base 8. 17435044 Convert -20443022 (base 5) to base 2. -101001111001110101 What is -854a62 (base 12) in base 4? -20001113222 What is 134b7 (base 15) in base 2? 1111000101111110 -3883c (base 13) to base 11 -716a8 Convert 11000110010011110000001 (base 2) to base 5. 3130420202 -591722 (base 10) to base 11 -37462a Convert -20104024 (base 6) to base 15. -b36bd What is 176455 (base 10) in base 2? 101011000101000111 25a448 (base 15) to base 9 3353155 10333231 (base 5) to base 14 24a36 What is 226ba (base 14) in base 8? 243314 Convert -3e238 (base 16) to base 12. -103360 Convert -5277031 (base 8) to base 6. -50105001 1226612 (base 7) to base 5 20032201 103211112 (base 4) to base 3 11002000220 Convert 2966244 (base 10) to base 5. 1224404434 704290 (base 10) to base 13 1b8752 What is -b3873d (base 14) in base 5? -3022222231 What is 1031707 (base 8) in base 15? 568ee Convert 11224023 (base 5) to base 16. 18d83 What is -35ba47 (base 16) in base 13? -9638b6 Convert 12052504 (base 6) to base 3. 201022201211 Convert 12104103 (base 5) to base 10. 113028 What is 170775 (base 9) in base 13? 390bc 135181 (base 9) to base 16 14263 What is -1032123334 (base 5) in base 15? -2ddc99 -624535 (base 7) to base 14 -2b155 What is 95923 (base 15) in base 11? 2a45a7 Convert 10221221022020 (base 3) to base 14. 3cb101 What is 2211010220000 (base 3) in base 5? 340424433 What is -116251 (base 8) in base 13? -15340 What is -220212122020200 (base 3) in base 4? -302123200122 What is 4144104 (base 5) in base 8? 206056 Convert 3688180 (base 9) to base 6. 111004030 -228a05 (base 13) to base 6 -25315323 Convert 27a0451 (base 12) to base 10. 7921789 What is 372078 (base 9) in base 4? 312311123 What is 11023241322 (base 5) in base 12? 3bb4505 Convert -3161663 (base 8) to base 15. -11a44d 40122 (base 5) to base 12 1575 What is 33842 (base 11) in base 16? bf22 Convert 17a1b (base 12) to base 5. 2044140 What is 91955 (base 12) in base 11? 11a597 What is 101042244 (base 5) in base 8? 1436762 -1483172 (base 10) to base 9 -2710468 4120203 (base 6) to base 7 1450353 -22012111200001 (base 3) to base 16 -4286e3 59513 (base 15) to base 11 184947 -121211000202 (base 3) to base 13 -b7866 Convert -682437 (base 10) to base 7. -5541420 What is 98985 (base 10) in base 5? 11131420 Convert 163288 (base 13) to base 9. 1027037 What is -102024312 (base 5) in base 12? -18524b 757762 (base 8) to base 6 5235350 -49087 (base 15) to base 7 -1660210 13615a (base 13) to base 8 1626602 Convert -1001010010100010 (base 2) to base 9. -57167 What is 1a26455 (base 11) in base 5? 1333414013 Convert a7719 (base 11) to base 6. 3204550 Convert -224a044 (base 11) to base 4. -33001031322 -5251632 (base 7) to base 6 -21333340 Convert -34320033 (base 5) to base 10. -307518 -544305531 (base 6) to base 14 -1413807 Convert -11303030032 (base 5) to base 11. -7338614 What is -246647 (base 12) in base 8? -2204027 Convert -202403 (base 6) to base 8. -37403 Convert -27056 (base 9) to base 6. -220340 Convert -dcdd58 (base 16) to base 9. -30211351 269685 (base 10) to base 6 5440313 What is 4502a64 (base 11) in base 10? 7895441 -234054133 (base 7) to base 4 -313100030311 Convert -235947 (base 13) to base 5. -203401314 -772046 (base 11) to base 10 -1232556 Convert 561dc2 (base 15) to base 13. b0a554 What is 1870e8 (base 15) in base 4? 10202011322 4756440 (base 8) to base 2 100111101110100100000 -2168578 (base 14) to base 5 -13024203210 1a1a00 (base 16) to base 7 20353102 Convert -15b85a (base 12) to base 13. -100876 Convert -14754 (base 16) to base 9. -136846 What is 2013332021 (base 4) in base 12? 22a375 Convert -105834 (base 9) to base 15. -13b9d 15916226 (base 10) to base 14 2184534 What is -41186 (base 13) in base 8? -343760 Convert 1011110111111111101000 (base 2) to base 4. 23313333220 33002341 (base 7) to base 8 12614366 What is 63754 (base 16) in base 2? 1100011011101010100 Convert 522264 (base 7) to base 9. 146000 What is -58678 (base 15) in base 13? -9b228 123a9b1 (base 12) to base 16 366415 2831226 (base 10) to base 9 5284636 -22023403 (base 5) to base 9 -317513 -1010110100001101001011 (base 2) to base 16 -2b434b Convert -285471 (base 11) to base 8. -1547757 Convert -21203240 (base 5) to base 7. -1342420 -41410430 (base 6) to base 13 -32c95b Convert 333261 (base 10) to base 6. 11050513 -15203351 (base 6) to base 15 -a6d8a What is -1482616 (base 9) in base 12? -3378b0 Convert -752cbc (base 13) to base 11. -1607a36 Convert -121112001220 (base 3) to base 14. -86717 Convert 81696 (base 15) to base 9. 684206 What is -3326a (base 15) in base 7? -1244623 What is -1145251 (base 7) in base 12? -70531 What is 1004112 (base 8) in base 13? 93392 What is -395a432 (base 12) in base 4? -223023123212 What is 1297b (base 14) in base 16? b2d1 What is 11121211212210 (base 3) in base 11? 1429295 3651621 (base 8) to base 4 3311032101 Convert 444244213 (base 6) to base 9. 16123660 Convert 103342 (base 12) to base 9. 427085 What is -66b48 (base 13) in base 15? -3a3b2 Convert -12012011000021 (base 3) to base 6. -135043011 -133727 (base 11) to base 12 -a152b What is 236a7 (base 11) in base 8? 102506 204333045 (base 6) to base 12 1244185 Convert -135431351 (base 6) to base 15. -3a1151 What is -2122123101 (base 4) in base 5? -130220104 What is -2021202121011 (base 3) in base 2? -100101000110010111111 93f79 (base 16) to base 4 2103331321 What is 1314334 (base 6) in base 10? 72274 Convert 10101110100011101001 (base 2) to base 7. 6035335 33a699 (base 11) to base 14 101348 Convert -68d38 (base 14) to base 10. -255046 What is 4475154 (base 9) in base 7? 26333041 152104 (base 7) to base 16 736f Convert 113626 (base 7) to base 6. 235051 96085 (base 14) to base 3 200102000110 What is 4470 (base 13) in base 16? 2553 482a5a (base 11) to base 16 bad55 Convert 3777a8 (base 15) to base 4. 22020321002 Convert -1111111001111110 (base 2) to base 6. -1221342 What is 12240442 (base 5) in base 13? 41a8c Convert -691994 (base 10) to base 9. -1264212 c09679 (base 13) to base 15 5d651d What is 17629 (base 14) in base 12? 2a071 What is -79833 (base 11) in base 12? -569a6 What is -3123441412 (base 5) in base 14? -c053b7 What is 1134155 (base 6) in base 4? 32131313 C
Low
[ 0.512941176470588, 27.25, 25.875 ]
Freeman already has a better statistical output than Ryan in most categories, and with arguably a worse supporting cast. Can't say I know a lot about the Falcons offensive line, though. Freeman has thrown less interceptions, but Ryan has almost 100 more attempts than Freeman does. Still, 474 passes by Freeman with only six picks - don't think that number goes much higher with 100 more throws. Ryan has him beat slightly by completion percentage, but Freeman has a higher YPA by almost a full point. Here's a stat for you - in passes between 20-30 yards, Freeman has a 64.5 completion percentage to Ryan's 57.4. Quite the number. And Freeman's clutch - with the exception of the Grimes pick that sealed the deal for Atlanta a few weeks ago. Ryan isn't my favorite QB out of this group but he sure does get trashed alot for such a good young QB. None of these guys are perfect, and listening to some speak on these boards if you don't throw 4k yards, 30 TD's and less then 10 picks your not good enough. The only guy IMO who isn't gonna be on par with the rest of these guys careers is Mark Sanchez. Every single other guy could end up a top 10 QB at some point in their career, but Ryan really doesn't get much respect but I guess he doesn't have a big arm or do it the flashy way. "Chucking it up and letting the best WR and TE bail him out"? Yea, because Gonzo is totally the type of player right now who would bail out a QB. If your #1 WR was as good as Roddy White and you had the lovely Michael Jenkins as your #2 who would you be throwing to? Maybe he should stop throwing to Roddy who is open 97% of the time and throw to Jenkins who outside of blocking is useless. He's made some very clutch plays when they needed him to, with accurate and precise throws. Why the hate? I don't think he's better then Freeman personally but I know most teams would kill for a QB of his caliber, and quite honestly if they had a guy like Sproles, or a slot WR, or a #2 WR that could open up that offense you might see his stats get even better, which by the way is remarkable for what he has to work with. __________________ Quote: Originally Posted by Scott Wright I guarantee that if someone picks Cam Newton in the Top 5 they will regret it. Freeman already has a better statistical output than Ryan in most categories, and with arguably a worse supporting cast. Can't say I know a lot about the Falcons offensive line, though. Freeman has thrown less interceptions, but Ryan has almost 100 more attempts than Freeman does. Still, 474 passes by Freeman with only six picks - don't think that number goes much higher with 100 more throws. Ryan has him beat slightly by completion percentage, but Freeman has a higher YPA by almost a full point. Here's a stat for you - in passes between 20-30 yards, Freeman has a 64.5 completion percentage to Ryan's 57.4. Quite the number. And Freeman's clutch - with the exception of the Grimes pick that sealed the deal for Atlanta a few weeks ago. I don't disagree with most of this. Freeman obviously has a stronger arm than Ryan, and that is part of the reason people will always say he was the higher ceiling (the other being his size and mobility). The YPA part I explained in the other thread, we never really go deep or for YAC, we are a possession team, and that is what Mike Mularkey asked Ryan to do this season. We would run the ball a couple times, put Ryan in a 3rd and like 7 half the time, and he would get the job done. We would go ten yards at a time and hold on to the ball for a very high percentage of the game. We will see if Ryan gets the chance to spread the ball around more next season, as it is looking more and more like Mularkey may be leaving for a HC position. There is no doubt in my mind that Ryan could have a much YPA had he been asked to do different things out there. He just seems to always clutch it out when we need it on these 3rd downs, and pretty much whenever we are down in the 4th quarter. The thing is, what our offense does works, it isn't sexy but we grind the clock out and it gets the job done as the team finished 13-3. "I don't do Pro Days, we send our scouts to those. I would rather spend my time watching film. The eye in the sky never lies. Functional Strength and athletic ability are the first things we look for in a college prospect." - Mark Dominik, Buccaneers GM The bucs should get some o-line help in the draft for Freeman. Every one of their o-lineman graded out negatively this year along with the tightends in blocking. 9 different guys had 300+ snaps on the o-line. I'm probably being a little too hard on Ryan due to the overhype. I think he's the 2nd best QB on the list, at the moment, with Flacco third. I don't understand why so many people voted Stafford. Based on what? College? It's a hunch I guess. I kind of understand where they're coming from, but I just can't give him the same credit. His signature game so far in his career was when he led a comeback vs the Browns. The freakin Browns. And he happens to seperate his shoulder while doing it. I think we're all selling Sanchez short to be honest. I know he has his flaws and made his share of mistakes, but the guy has had some great games too, and I think we overrate the talent around him. And he's won big games. More big games than any of these guys. For the record, let's note that defense for both of those teams that day were absolutely abysmal. I mean...Brady Quinn was caught in a shootout with him. So how significant was that game really? I think it has less to do with the actual football and more to do with the fact that he was willing to kill himself for a meaningless win in a meaningless season. The toughness, leadership, and poise he showed in that clip alone is what has me impressed. I understand that it was just a game against the Browns, but he endeared himself to alot of people in alot of different fan bases with that performance. __________________ Quote: Originally Posted by Mr. Goosemahn The APS is strong in this one. Quote: Originally Posted by killxswitch Tears for Fears is better than whatever it is you happen to be thinking about right now. Stafford is my pick hopefully he can stay healthy and turn the Lions into winners. Josh Freeman is the truth though. I mean, wow. What a fun QB to watch, I found myself watching a lot of Bucs games this year. Also, Matt Ryan was never asked to put a team on his back and carry an offense the way Freeman has. Freeman finally got a running game in the 6th game of the season this year and he is even more dangerous. Yeah this is coming from a Bucs fan, but honestly, any one who watches him and knows football would have to agree that the ceiling is alot higher for Freeman than Matt Ryan. There's been several games where we have depended on Matt Ryan to win the game, that's absolutely ridiculous. And I don't get this with Bucs fans. (Not necessarily you, just in general) Either Blount, Williams, K2, Penn are as great as you guys say they are or they are rookies and nothings that Freeman carried to greatness. Agreed, Freeman has more physical tools. Quote: Originally Posted by Saints-Tigers As for not having 30 tds and 4000 yards as a young player, when you are called the next Peyton Manning/Tom Brady, I expect a lot more, sue me. 3700 yards and 28 TDs. You're right, he's so far off from that! Quote: Originally Posted by bearsfan_51 Bingo. Now that Favre is gone, Matt Ryan is the new most overrated QB in football. He's well-suited for their conservative offensive, but that doesn't make him an elite player. Damn that Matt Ryan for playing in a balanced offensive attack! Our offensive is conservative why? Because we don't make mistakes? Or because we don't throw the ball deep 15 times a game?
Mid
[ 0.6259351620947631, 31.375, 18.75 ]
Q: How to copy IntBuffer into int[] While working with off heap buffers one might want to copy them into array. Let's assume we don't know if buffer is off or on heap. How to fill the implementation? IntBuffer b = ... // could be off or on -heap int[] array = toArray(b) public int[] toArray(IntBuffer b) { //??? } A: The following code should work for direct buffers and array backed buffers. It should also take into account shared buffers so for example a buffer [0, 1, 2, 3] sliced in half would allow you to call toArray() on both buffer slices and return what you expect. It will copy the full contents of that particular buffer (whether sliced or not) with no regards to the positions or limits. It has plenty of side effects for non-array backed buffers though, so don't write code like this (or document the side effects at least). public int[] toArray(IntBuffer b) { if(b.hasArray()) { if(b.arrayOffset() == 0) return b.array(); return Arrays.copyOfRange(b.array(), b.arrayOffset(), b.array().length); } b.rewind(); int[] foo = new int[b.remaining()]; b.get(foo); return foo; } since array() returns the actual backing array, any changes are reflected in the buffer. If you don't want that, clone() the array before returning it (not needed for sliced buffers, since copyOfRange is used for them). There are probably some unconsidered edge cases there, so if you find any, put a comment below and I'll reward you with a (nasty) surprise.
High
[ 0.6715328467153281, 28.75, 14.0625 ]
794 F.2d 677 Cardinaliv.Sec., H.H.S. 84-6138(R) United States Court of Appeals,Second Circuit. 12/14/84 1 E.D.N.Y. AFFIRMED
Low
[ 0.47925311203319504, 28.875, 31.375 ]
Duensing struck out 61 and walked 18 with 13 holds in 62 1/3 innings in 2017. He had the third-lowest ERA among left-handed National League relievers with at least 65 appearances and also ranked third among NL lefties by stranding 28 of 33 inherited runners (84.8 percent).
High
[ 0.679802955665024, 34.5, 16.25 ]
That's good! Is that at the Broncos' game? -----Original Message----- From: Williams, Bob [mailto:[email protected]] Sent: Tuesday, November 20, 2001 10:03 AM To: Lucci, Paul T. Subject: FW: Your son's first NFL Game -----Original Message----- From: Bevans, Larry Sent: Tuesday, November 20, 2001 9:06 AM To: Williams, Bob; Newell, Stephen; Turner, Robert; Novak, Michael Subject: FW: Your son's first NFL Game Subject: FW: Your son's first NFL Game > > > > >Your son's first NFL Game > > > > > > > > > >Ticket to the Game $80.00 > > > > >Ballgame food $25.00 > > > > >First Beer with your Dad $5.50 > > > > >Seeing your first set close up......priceless > > > > > > > > > > > > > > > >There are things that money just can't buy. > > > > > > > > > ****************************************************************** This email and any files transmitted with it from the ElPaso Corporation are confidential and intended solely for the use of the individual or entity to whom they are addressed. If you have received this email in error please notify the sender. ******************************************************************
Low
[ 0.44081632653061203, 27, 34.25 ]
using Unity.Collections; using Unity.Entities; using Unity.Transforms; using UnityEngine; using UnityEngine.Profiling; using UnityMMO; using UnityMMO.Component; namespace UnityMMO { public class NameboardData : MonoBehaviour { public enum ResState { WaitLoad,//等待判断是否离主角够近,够近才进入此状态等待加载prefab // Loading,//加载中 Loaded,//已加载 // Deleting,//远离主角,别加载了 DontLoad,//不需要再加载了 } public ResState UIResState; public Transform LooksNode; public string Name; public float Height; public NameboardData() { UIResState = ResState.WaitLoad; LooksNode = null; Name = ""; Height = 1.6f; } public void SetName(string name) { // Debug.Log("nameboard name:"+name+" "+new System.Diagnostics.StackTrace().ToString()); Name = name; if (UIResState == ResState.Loaded && LooksNode != null) { var nameboard = LooksNode.GetComponent<Nameboard>(); nameboard.Name = name; } } public void UnuseLooks() { if (UIResState == ResState.Loaded && LooksNode != null) { LooksNode.gameObject.SetActive(false); ResMgr.GetInstance().UnuseGameObject("Nameboard", LooksNode.gameObject); UIResState = ResState.WaitLoad; LooksNode = null; } } } }
Mid
[ 0.563679245283018, 29.875, 23.125 ]
1/4 SWAY, SWAY, 1/4 TURN STEP, BRUSH, SHUFFLE FORWARD, SHUFFLE FORWARD1-2Step 1/4 left on left and sway hip left, step right and sway hip rightHands: pick up lady's left, man's right on count 1, release man's left, lady's right on count 23-4Turn 1/4 left and step forward left now facing LOD, brush right forward5&6-7&8Step right forward, step left together, step right forward, step left forward, step right together, step left forward 2 HIP BUMPS, STEP SIDE, STEP 1/4 TURN, SHUFFLE SIDE, ROCK, REPLACE1&2-3Step right forward hip right-left-right weight on right, step left side4-5&6Turn 1/4 right and step forward right to face partner, step left side, step right together, step left sideHands: pick up lady's right, man's left on 4 (now in two hand hold)7-8Rock right back, recover to leftHands: release man's right, lady's left on count 7, then back to two hand hold on count 8
Mid
[ 0.612529002320185, 33, 20.875 ]
using System; using System.Collections.Generic; using System.Linq; namespace NAPS2.Platform { public interface ISystemCompat { bool IsWiaDriverSupported { get; } bool IsTwainDriverSupported { get; } bool IsSaneDriverSupported { get; } bool CanUseWin32 { get; } bool UseUnixFontResolver { get; } bool IsWia20Supported { get; } } }
Low
[ 0.43595505617977504, 24.25, 31.375 ]
“I think we would see changes come to the Loop. The Loop has always been designed as a rather funky place. Not designed, it’s happened,” Welsch said. “But it has always been comfortable for people of all ages, all ethnicities, all levels of income. And I think something like Social House would make some people uncofmfortable.” City Manager Lehman Walker said the club could face steep fines for being in “violation of several municipal code ordinances.” In addition to failing to obtain a new liquor license, Walker said, the club opened Friday without securing an occupancy permit or a business license from the city. Walker said Social House II could be fined up to $1,000 per day for each of the ordinance violations. “They are operating illegally now and they have been operating illegally since last Friday,” Walker said. The council meeting capped a day of legal maneuvering that began in the morning with the city filing papers seeking a temporary St. Louis County Circuit Court injunction to block Social House II from serving future customers. A hearing on that matter could be held as early as Tuesday.
Low
[ 0.5261044176706821, 32.75, 29.5 ]
The Brett Favre story is taking yet another turn on Tuesday. Favre emerged from a plane in Minnesota on Tuesday, with the expectation that he will rejoin the Vikings. Three teammates, Jared Allen, Steve Hutchinson and Ryan Longwell, were absent from practice earlier in the day and went to Mississippi to recruit Favre. Fox Sports reported that Favre told his teammates that he is back in for another season. NFL Network also reported Favre would rejoin the Vikings. UPDATE: Favre back with Vikings, thanks to teammates' recruiting Also, Favre's official website sent out an e-mail today saying, "Stay tuned for breaking news from the Minnesota Vikings today on Brett Favre's possible return." (via PFT) The Vikings have not confirmed the news. Favre's agent, Bus Cook, has not returned messages from USA TODAY. Favre's trip north comes exactly one year after news broke that he would emerge from retirement for the second year in a row and would sign with the Vikings. His first season in Minnesota ended with a loss in the NFC title game in New Orleans. Favre, 40, then had surgery on his left ankle in May. He has said since then he couldn't commit to another year until he was satisfied his body could endure it. FAVRE WATCH: Track what QB has said about playing since January PHOTOS: Brett Favre in pictures Head coach Brad Childress said in late July that Favre would only need "two or three" weeks of preparation before the regular season. The Vikings' first game in three weeks from Thursday against the Saints. Update, 3:20 p.m. ET: NFL Network reported Favre left Mississippi on a plane at 2:2o p.m. ET headed for Minnesota. Update, 4:05 p.m. ET: Favre's website said it is "awaiting a statement soon from the Vikings. As soon as this is available we will pass it along." Update, 4:50 p.m. ET: TV cameras showed Favre getting off a plane in Minnesota and getting into a black SUV. Update, 5:45 p.m. ET: Vikings TE Visanthe Shiancoe said on Twitter there was a "circus in Winter Park" at the team facility. -- Sean Leahy
Mid
[ 0.6241758241758241, 35.5, 21.375 ]
UN Security Council representative Vasily Nebenzya vehemently denied British allegations that Russia perpetrated a nerve agent attack on UK soil, while imploring Council members to think critically about the incident. Nebenzya stated that, following the letter and the 24-hour ultimatum from British Prime Minister Theresa May, Russia had called for an open, not closed, meeting of the Security Council, in the interests of transparency. “We wanted to make sure everyone sees what’s happening here,” Nebenzya said. He went on to decry the “completely irresponsible statements” and “threats against a permanent member of the UNSC” made by British politicians calling the international community to look beyond “highly likely” type of proof, while reaffirming that Russia “had nothing to do with this incident.” WHY UN, NOT HAGUE? Nebenzya questioned why the case was being “dragged” before the Council, ignoring procedure. He alleged that the real reason the British government broke protocol was that it feared that “real experts” in The Hague would not be convinced by the evidence. “We asked for samples of the substance used to assist in a joint investigation. This request was ignored,” he said. The Organization for the Prohibition of Chemical Weapons is located in The Hague. CUI BONO? “Is this something that benefits Russia on the eve of Russian elections and the World Cup? Abiding on presumption of innocence, I can think of a great number of countries that would benefit from such accusations,” Nebenzya said, declining to name them on the UNSC floor, however. He described Skripal as “pardoned” and “no longer a threat to Russia,” while simultaneously being “the perfect victim who could justify any unthinkable lie, any kind of untruth tarnishing Russia.” “Let me repeat. Russia had nothing to do with this incident. The British ultimatum isn't worthy of our attention and is null and void,” he said. “We trust they will provide samples of the substances for examination for a joint investigation. This is not optional, this is a mandatory requirement. We have nothing to fear and nothing to hide.” TUBES INSTEAD OF WORDS Nebenzya called on his colleagues in the Security Council to invoke the spirit of Arthur Conan Doyle’s famous detective, Sherlock Holmes, and think critically about the incident and about the evidence and subsequent allegations. “We demand material proof of the alleged Russian nerve agent traces from this event,” he said. “Merely stating that there is incontrovertible proof is unacceptable. An independent analysis would be more appropriate.” He alluded to the fact that such rapid analysis and verification by British authorities might itself prove damning to their claims. “For the British specialists to be perfectly confident that this was a Novichok agent and not any other kind, they would need a control standard for proof. It [the substance used in the attack] must be compared to a control substance,” Nebenzya stated. “They have a collection and they have the formula. In other words, if the UK is so firmly convinced this is Novichok, they have samples and formula and are capable of formulating it themselves.” “It is no longer necessary to show the Council test tubes with white substances. It is enough to send letters with egregious accusations,” he said. WHAT ABOUT OTHER COUNTRIES? Nebenzya highlighted that multiple NATO-member countries had previously initiated programs to develop VX-type nerve agents themselves and that developmental work on Soviet-era nerve agents stopped in 1992. In 2017, the Russian Federation completed the destruction of all existing stockpiles in accordance with OPCW guidelines. To date, the US has not destroyed its chemical stockpile. If you like this story, share it with a friend!
Mid
[ 0.6286919831223621, 37.25, 22 ]
Effects of acute, oral ethanol on cardiovascular performance before and after experimental blunt cardiac trauma. Acute changes in hemodynamic and electrophysiologic indices were measured following blunt cardiac trauma, oral ethanol, and a combination of both in dogs. Impacts with a velocity of 10 m/sec and a contact compression of 5 cm were delivered to most of the pericardium. Transient arrhythmias in impacted animals resulted in significant reductions in all hemodynamic responses at 15 minutes post-impact. Intragastric doses of 50% ethanol/distilled water yielded average blood alcohol concentrations of 60 +/- 10 mg%, 120 +/- 20 mg%, and 180 +/- 15 mg%. Alcohol effected significant reductions in dp/dt and cardiac index and elevations in total peripheral resistance during treatment. Alcohol and trauma resulted in per cent mortalities of 17, 50, and 71% for each such group primarily from electrical-mechanical dissociation. Surviving animals experienced significant declines in dp/dt, cardiac index, and mean aortic pressure at 15 minutes post-impact. Mean aortic pressure remained depressed while dp/dt, cardiac index, and total peripheral resistance returned to control values.
Mid
[ 0.603524229074889, 34.25, 22.5 ]
Featured Post Highfive is so simple that setting up every meeting room takes just minutes and every employee will be able to start or join a call from any room with ease. Never be called into a meeting just to get it started again. This is how video conferencing should work! Performance in games development is paramount: every microsecond counts to be able to do everything in less than 33ms (aiming at 16ms). C# foreach statement is one of the worst performance killers, and here I explain why. Is your Office 365 signature not working the way you want it to? Are signature updates taking up too much of your time? Let's run through the most common problems that an IT administrator can encounter when dealing with Office 365 email signatures.
Low
[ 0.52734375, 33.75, 30.25 ]
Q: Did Godel consult Einstein on his work? I have been told that Kurt Godel was among the Mathematicians that Einstein consulted on occasion in his work. Can anyone tell me if this is true or not, or if it is at least plausible? If it is true, would that be an example of a Philosopher making a contribution to Physics? A: I do not think "consult" is the right word. They worked together at the Institute of Advanced Study in Princeton, became personal friends, their offices were nearby and they had many conversations. Todorov tells the story of their friendship in Kurt Goedel and His Universe, see also Berlinsky's Einstein and Gödel. But that only happened after 1940 when Goedel finally emigrated from Vienna. By that time Einstein's major work, special and general relativity, quantum statistics and entanglement, etc., was already done. As Morgenstern reminisced in a 1965 letter to Bruno Kreisky, "Einstein told me that his own work no longer meant much, that he came to the Institute merelyum das Privileg zu haben, mit Gödel zu Fuss nach Hause gehen zu dürfen (to have the privilege to be able to walk home with Gödel)". Gödel, on the other hand, was still active, but it is unclear that he consulted Einstein either, even when he ventured in 1948 into constructing a solution of general relativity with closed timelike curves, the well-known Gödel's universe. Todorov adds: "Einstein is such a legend that most people are afraid to approach him. Gödel isn't. There is a feeling of equality between them. Their debates range from the trivial to the profound. Gödel is skeptical about Einstein's idea of a unified field theory and says so ([Y02] p. 56). [...] In spite of being close to each other it is not clear whether Gödel discussed his work on general relativity with Einstein prior to its completion. As witnessed by Straus, Gödel was totally solitary and would never talk to anybody while working." As for a philosopher contributing to physics, both Gödel and Einstein were part-time philosophers. The ideas of relativity came, in part, from Einstein's reflections on the positivist philosophy of Mach. His defense of metaphysical realism in debates with Bohr over completeness of quantum mechanics are also well-known. But as Einstein was first and foremost a physicist, so Gödel was first and foremost a mathematician, a mathematical logician more precisely, and only then a platonist philosopher. And that was how Einstein saw it. According to Strauss: "Einstein... felt that he should not become a mathematician because the wealth of interesting and attractive problems was so great that you could get lost in it. In physics he could see what the important problems were and could, by strength of character and stubbornness, pursue them. But he told me once 'Now that I've met Gödel, I know that the same thing does exist in mathematics'".
Mid
[ 0.545073375262054, 32.5, 27.125 ]
Hinges & Slotting Tools This is a Great Planes Slot Machine Motorized Hinge Slotting Tool. With Great Planes' electric-powered Slot Machine, you can cut ALL of your kit's hinge slots in about 10 minutes! Quickly cuts clean, perfect hinge slots without gouging or being hindered by hard spots in the wood. Du-Bro Hinge Slotter Kit takes the hassle out of slotting control surfaces for gluing hinges. The centering/parallel guide centerd hinge slotter on up to 3/4" material. Four handle set plus guide and centering tool for three different size slotting forks: mini, standard and heavy duty hinges. Designed to work with all Du-Bro hinges. The 3 slotters and the "picker" are permanently mounted to red nylon handles. Packedged in reusable, recyclable clamshell storage blister. This is a package of Great Planes 3/16" Super Hinge Points. Hinge Points are unique. Instead of trying to chisel a slot as with ordinary hinges, simply drill a hole, add some glue and insert the hinge point. Simple, perfectly straight hinging can be done quickly. This is a package of Great Planes 1/8" Hinge Points. Hinge Point hinges are truly unique. Instead of trying to chisel a slot, as with ordinary hinges, simply drill a hole, add some glue and insert the hinge point. Simple, perfectly straight hinging can be done quickly. Service Links We're Social! Disclaimer: Price, availability, and specifications of items on this website are subject to change. Hobby People is not responsible for inadvertent errors on this website. Some items are limited to stock on hand. Health Risk Warning: Some products on this site may contain chemicals known to the state of California to cause cancer, birth defects, or other reproductive harm.
Mid
[ 0.6109785202863961, 32, 20.375 ]
Q: How to add option values on silviomoreto's Bootstrap-Select I used silviomoreto's bootstrap-select but I'm having problems. I have 2 Dropdowns (Select) a Region dropdown and Cities. Now, I have a jquery onchange function, the function will change the values in the cities dropdown depending on the region selected. Here's my code: <select id="region" class="selectpicker"></select> <select id="cities" class="selectpicker"></select> $("#region").on('change', function () { $("#cities").html('<option>city1</option><option>city2</option>'); }); The problem is I think the compatibility? When I removed the class="selectpicker" it works fine, but I can't remove it because I used it for my dropdown ui. I checked the documentation in here https://developer.snapappointments.com/bootstrap-select/ but I can't find relevant answer to my question. Thanks! A: Try selectpicker('refresh'). refresh() To programmatically update a select with JavaScript, first manipulate the select, then use the refresh method to update the UI to match the new state. This is necessary when removing or adding options, or when disabling/enabling a select via JavaScript. Snippet $("#cities") .html('<option>city1</option><option>city2</option>') .selectpicker('refresh'); Working Demo: http://jsfiddle.net/codeandcloud/nr54vx7b/
Mid
[ 0.648475120385232, 25.25, 13.6875 ]
You are sending an email that contains the article and a private message for your recipient(s). Your Name: Your e-mail: * Required! Recipient (e-mail): * Subject: * Introductory Message: HTML/Text (Photo: Yes/No) (At the moment, only Text is allowed...) Message Text: Emphasis on user experience coupled with new software business models has altered the competitive landscape for smartphones, resulting in new leaders like Apple and Google now accounting for three-quarters of the global smartphone market. IHS iSuppli forecasts that shipments this year of smartphones operating either the Apple iOS or Google's Android will reach 519.0 million units, up from 338.6 million units in 2011. The combined share this year of Apple and Google smartphones will amount to a 76 percent, with the remaining portion of market split among four other segments, including Nokia?s Symbian, Research In Motion's BlackBerry, Microsoft's Windows Phone and other systems like Bada and Linux, the research firm reported. Smartphone share for Apple and Google last year already was at 68 percent, so this year's increase came at the tremendous expense of the other players that, except for the emerging Windows Phone platform, are forecast to be relegated to even more marginal positions in the years to come. According to IHS, by 2016, Apple and Google will command nearly 80 percent share of the smartphone market, with Windows Phone emerging as the only remaining viable competitor. Prior to the explosive growth of the Apple and Google smartphone platforms, cellphone manufacturers had relied on specialized third-party operating system providers like Symbian and Windows to provide the core software technologies in order to build advanced mobile devices. The fundamental economics of this classic value chain has since been upended, with both Apple and Google introducing novel and successful business models for mobile software. The success of this non-traditional business model is evident in the current market dominance by Apple and Google of the smartphone platform market - simultaneously accompanied by the decline of traditional stalwarts. For instance, the share of Nokia's Symbian operating system - previously to the world's largest mobile phone brand - will be practically nonexistent by next year as a result of the smartphone merger between the Finnish giant and Microsoft. Canada?s Research In Motion is also mired in delays in introducing a new operating system to its flagship BlackBerry phone, while its once-indomitable customer base is leaving for more popular smartphone platforms. "The catalyst responsible for popularizing smartphones was a breakthrough in user interface design, pioneered by the Apple iOS and its influential iPhone," IHS iSuppli said. What the iPhone did was to embody a mobile-centric product - not merely serve as an extension of the traditional PC, IHS iSuppli believes. Apple demonstrated to the mobile industry that by vertically integrating the software and hardware designs, as well as incorporating a brand-new, easy-to-use interface with a compelling new hardware component such as a capacitive touch screen, a smartphone device could be produced that completely captured the imagination of the public - and still holds in thrall to this day. In smartly integrating the design of both the hardware and software components of the iPhone, Apple squeezed out the traditional role of software providers in the supply chain. Apple also demonstrated that the value of a device resided in not just the sum of its components but in how well the different parts worked together. For its part, Google approached the smartphone market from a different perspective - primarily driven by the revenue potential of mobile advertisements. To capitalize on the mobile market, the Android operating system was designed as an open-source platform, giving Android a neutral third-party appeal to mobile handset makers. Such an open-source model also meant that Google could singlehandedly eliminate the licensing fee in its quest to encourage adoption of its operating system by smartphones. Google provided further incentives by giving away popular value-added applications and services, such as navigation and email. Both Apple and Google also undertook the task of creating, and then expanding, their individual ecosystems?the App Store on Apple?s part, and Android Marketplace for Google. Operating in a new dynamic, ecosystems redefined the smartphone industry and set the pace for future battles among platforms and handset manufacturers, such that competition was no longer dictated by the hardware design cycle alone. Instead, the ecosystem expanded on the idea of the smartphone as a self-contained product?and then transformed the mobile handset even further into a central hub for a larger set of product offerings that included unique user experiences, digital media content and additional capabilities via applications.
High
[ 0.6652267818574511, 38.5, 19.375 ]
Rewards Program Recommend your friends, family, and co-workers to get an insurance quote from us and we’ll donate $10 to our current community cause campaign or send you a $10 Gift Card for every person you recommend!
Low
[ 0.31614654002713705, 14.5625, 31.5 ]
Faced with sexual assault and sexual harassment allegations, Michael Di Biase, the deputy mayor of Vaughan has announced his resignation. The deputy mayor's resignation comes the same day he was found to have breached the municipality's Code of Ethical Conduct, says the city's integrity commissioner. A employee at the City of Vaughan alleges Di Biase sexually assaulted, sexually harassed and reprimanded her, as outlined in a report released by Suzanne Craig on Thursday. As sexual assault falls under the criminal code, Craig, as integrity commissioner, must advise the employee to pursue allegations with police. It is not immediately clear if the complainant has reported the allegations to police. Craig's detailed report describes some of the allegations in graphic detail, including one moment when the complainant said Di Biase "groped me, kissed me, touched my breasts and pushed himself against me." Phone conversation recorded In an audio transcript outlined in the report, Di Biase says to the complainant: "I am sorry I did it… temptation… whatever you want to call it." The call was recorded by the complainant and submitted to the integrity commissioner. The complainant goes on to ask Di Biase, "why would you touch my breasts and kiss me and put your tongue in my mouth right after that, when I am so visibly upset." He responds, "I didn't put my tongue in your mouth... I tried... but you said no." She also tells him "you touched my breast," to which he answers, "OK, I am sorry." The allegations go on to say that Di Biase sexually harassed the complainant for five months, between March and July 2016. After this period, the employee left the City of Vaughan, and only returned briefly in October. During this time, it's alleged Di Biase kissed the employee without her consent five times, and touched her breasts on four occasions. He groped me, kissed me, touched my breasts and pushed himself against me. - Complainant According to the report, Di Biase did not deny kissing the complainant on the lips "on several occasions." But he denied touching her inappropriately — something the audio recording contradicts, said Craig. Further, he said any physical interaction was consensual. Surveillance allegations The complainant also alleges Di Biase had her followed and surveilled by an unknown man driving a black SUV, which was parked outside her house. According to the report, Di Biase denied any involvement in the incident. Craig said she did not have conclusive evidence that he was involved. The ethics czar received the complaints in January, which prompted this investigation. She recommended council take the following sanctions against Di Biase: Pay suspension for 90 days (the maximum sanction allowed under the Code.) Issue an apology to the complainant and the City of Vaughan. Remove his title as Deputy Mayor. No authority over office staff. No right to chair meetings and sit on committees. Council does not have to accept Craig's recommendations on sanctions, but is expected to use them to make an informed decision. In a statement, Vaughan Mayor Maurizio Bevilacqua said he finds the report's contents "gravely concerning" and that the city is taking the matter very seriously. Further he adds that the city "condemns all acts of workplace harassment and reprisal of any kind." Vaughan is Canada's 17th largest municipality, and the 8th largest in Ontario with more than 320,000 residents. Previously investigated by integrity commissioner This isn't the first time Di Biase has been found in violation of the municipal code of conduct. In 2015, the integrity commissioner reported that DiBiase swore and bullied staff who wouldn't hand over confidential details about bids for city work. The OPP alleges in court documents that Michael Di Biase, the former mayor and deputy mayor of Vaughan, seems to have accepted help building his family cottage from one of the biggest recipients of city construction contracts, Maystar General. (City of Vaughan) He challenged the integrity commissioner's findings and council's subsequent decision to dock him three months' pay, but that judicial review was dismissed by the courts. He did not appeal. The probe was prompted by a complaint based on a CBC investigation last fall, which detailed allegations that personnel from Maystar, a major Vaughan construction company that has received more than $150 million in business from the city since 2002, appeared to be helping build Di Biase's family cottage. The integrity commissioner did not investigate that allegation, saying that it could be a criminal matter and so it's up to police to look into it. She is, however, also currently examining Di Biase's role in a real-estate controversy where environmentally sensitive land long protected by the city was recently opened up to residential development. Further, the Ontario Provincial Police are looking into Di Biase's relationship with the construction company that built Vaughan's city hall and obtained various other contracts totaling over $150 million. Di Biase has strongly denied that Maystar was involved in the cottage construction. A longtime city councillor, Di Biase also served as mayor of Vaughan from 2002 to 2006.
Mid
[ 0.614657210401891, 32.5, 20.375 ]
When biological components are separated and analyzed by use of biological samples of blood or the like, high-performance liquid chromatography apparatus (HPLC apparatus) using high performance liquid chromatography (HPLC) are widely used (e.g., refer to Patent Document 1). As shown in FIG. 13, a general HPLC apparatus 9 is configured to prepare a sample containing biological components in a sample preparation unit 90 and then to introduce the sample into an analytical column 91 to thereby adsorb the biological components to a filler of the analytical column 91. When glycated hemoglobin is measured by using whole blood as a sample, red blood cells collected from whole blood are hemolyzed and then a biological sample in a state in which the laked blood is diluted is introduced into the analytical column 91. On the other hand, a biological component adsorbed on a filler is eluted by supplying an eluent from an eluent bottle 93 to the analytical column 91 by a liquid feed pump 92. The eluent including the biological component from the analytical column 91 is introduced into a photometry mechanism 94, where the biological component is analyzed by continuously measuring the absorbance of the eluent including the biological component. As shown in FIG. 14, the photometry mechanism 94 radiates light from a light source 97 while the eluent including the biological component flows through a path 96 of a photometry cell 95 and receives a transmitted beam at that time in a light receiving section 98. The wavelength of light received in a light receiving section 98 is selected in an interference filter 99, while a signal of an output level corresponding to the amount of light received is output from the light receiving section 98. Since the photometry of an eluent in the photometry mechanism 94 is continuously executed, the relationship between the elution time and the amount of light received (absorbance) is obtained as a chromatogram shown in FIG. 15. The HPLC apparatus 9 further calculates the total amount of hemoglobin based on a chromatogram that is a change with the lapse of time of absorbance and also calculates the glycated hemoglobin concentration as a proportion occupied by the amount of glycated hemoglobin in the total amount of hemoglobin (part shown by a cross hatching in FIG. 15). However, the amount of dissolution in an eluent of a gas such as oxygen varies depending on the temperature of the eluent. Therefore, when the temperature (environmental temperature) outside the apparatus varies or the biological component is analyzed in a state at a different environmental temperature, the state of a dissolved gas in an eluent (amount of dissolution) is different. Hence, when the dissolved oxygen concentration in an eluent varies along with the variation of environmental temperature, or the like, the ratio of the amounts of oxyhemoglobin and deoxyhemoglobin in hemoglobin varies. In addition, even in a biological sample introduced into the analytical column 91, the ratio of the amounts of oxyhemoglobin and deoxyhemoglobin in hemoglobin can vary at each measurement of each time. On the other hand, a sample is used that has a relatively large amount of oxygen by dilution of laked blood, as a biological sample introduced into the analytical column 91, and therefore 415 nm that is the maximum absorption wavelength of oxyhemoglobin is adopted as a measurement wavelength in the photometry mechanism 94. Thus, under environments in which the change in environmental temperature is large, or the like, the ratios of the amounts of oxyhemoglobin and deoxyhemoglobin vary, whereby precise measurements become difficult when they are measured at the same wavelength. Patent Document 1: Japanese Patent Laid-Open No. 7-120447
Mid
[ 0.6419437340153451, 31.375, 17.5 ]
Although they're less common than "ordinary" headaches (mostly thought of as tension headaches), migraines are a significant problem for millions of people. Estimates show that about 35 million Americans have frequent migraines and migraine symptoms, with ... A cluster headache is one of the most painful afflictions known to mankind. Sufferers have described cluster headaches as a hot dagger being poked through the eye and into the brain. Women have even compared cluster ... Millions of people suffer from chronic, lingering headaches that can develop almost daily — yet the causes of a tension headache are not well-understood. Tension headaches, which can feel like uncomfortable tightness or pressure around ... Article Topics FDA Compliance The information on this website has not been evaluated by the Food & Drug Administration or any other medical body. We do not aim to diagnose, treat, cure or prevent any illness or disease. Information is shared for educational purposes only. You must consult your doctor before acting on any content on this website, especially if you are pregnant, nursing, taking medication or have a medical condition.
Mid
[ 0.629107981220657, 33.5, 19.75 ]
Counter Become a Fan Cat Quote February 23, 2011 The mideast uprisings: a lesson for strong men, mad men and counterfactual historians Manipulated over the past century and a half by greedy outsiders and their own repressive leaders, many Arabs in the middle east and north Africa are saying, "Enough already!" In country after country from Morocco to Bahrain, popular uprisings are now a raging fire. The long simmering resentment of ordinary people against widespread corruption, unemployment, grotesque inequalities and curtailment of freedom which is now a growing explosive anger, is said to have been sparked by the self-immolation of a young Tunisian man who refused to be cowed down by the brutality of a corrupt police force. The wave of protests has caught the world by surprise, especially the recent events in Egypt where the stunning removal from power of Hosni Mubarak, the long time dictator and US ally was unimaginable just a few short months ago. Egyptians themselves are probably among the most surprised. This time the bogeyman for the mass demonstrators is not the US or Israel, but their own leaders who have long exploited anti-US sentiments to control the citizenry while doing the bidding of the west for their own profit. I have no special insights to add to what we are hearing in the news about the middle east. Things are in a ferment; it is hard to predict how the present and future will shape up in Egypt or elsewhere, and what the implications are for the coming trends in geo-politics. At this moment, the hottest spot in the Arab fire storm is in Libya where the crazy colonel has threatened to become a martyr while inciting a civil war among his countrymen with the help of foreign mercenaries. A map of the region shows the time line and the current status of events in the affected areas. In the midst of this turmoil, which seems to be entirely homegrown and the result of years of repression by brutal and brittle dictatorships, it is very tiresome to hear some commentators pontificate on what the west, especially the US, should or should not have done. I am not talking only about neo-con warmongers or demented talk show fearmongers, who have predictably become sudden critics of democracy and liberty. Some serious conservative thinkers are also weighing in with the tired, tested and failed foreign policy solutions of the past that led to disasters such as the immoral wars in Vietnam and Iraq. Once again, they blithely assume that the US can always shape things to its own liking elsewhere in the world and "stability" can be assured by backroom politicking within the US state department and the White House briefing room. Here is an excerpt from an irritatingly arrogant essay by Niall Ferguson in Newsweek. The wave Obama just missed—again—is the revolutionary wave of Middle Eastern democracy. It has surged through the region twice since he was elected: once in Iran in the summer of 2009, the second time right across North Africa, from Tunisia all the way down the Red Sea to Yemen. But the swell has been biggest in Egypt, the Middle East’s most populous country. In each case, the president faced stark alternatives. He could try to catch the wave, Bismarck style, by lending his support to the youthful revolutionaries and trying to ride it in a direction advantageous to American interests. Or he could do nothing and let the forces of reaction prevail. In the case of Iran, he did nothing, and the thugs of the Islamic Republic ruthlessly crushed the demonstrations. This time around, in Egypt, it was worse. He did both—some days exhorting Egyptian President Hosni Mubarak to leave, other days drawing back and recommending an “orderly transition.” The result has been a foreign-policy debacle. The president has alienated everybody: not only Mubarak’s cronies in the military, but also the youthful crowds in the streets of Cairo. Whoever ultimately wins, Obama loses. And the alienation doesn’t end there. America’s two closest friends in the region—Israel and Saudi Arabia—are both disgusted. The Saudis, who dread all manifestations of revolution, are appalled at Washington’s failure to resolutely prop up Mubarak. The Israelis, meanwhile, are dismayed by the administration’s apparent cluelessness. Last week, while other commentators ran around Cairo’s Tahrir Square, hyperventilating about what they saw as an Arab 1989, I flew to Tel Aviv for the annual Herzliya security conference. The consensus among the assembled experts on the Middle East? A colossal failure of American foreign policy.This failure was not the result of bad luck. It was the predictable consequence of the Obama administration’s lack of any kind of coherent grand strategy, a deficit about which more than a few veterans of U.S. foreign policy making have long worried.... The best national-security advisers have combined deep knowledge of international relations with an ability to play the Machiavellian Beltway game, which means competing for the president’s ear against the other would-be players in the policymaking process: not only the defense secretary but also the secretary of state and the head of the Central Intelligence Agency. No one has ever done this better than Henry Kissinger. But the crucial thing about Kissinger as national-security adviser was not the speed with which he learned the dark arts of interdepartmental turf warfare. It was the skill with which he, in partnership with Richard Nixon, forged a grand strategy for the United States at a time of alarming geopolitical instability. So, what exactly could the US have done in Egypt? Wasn't Vietnam a colossal failure despite the brilliant Machiavellian ways of Kissinger and Nixon that Mr. Ferguson so admires? Isn't Iraq, the brainchild of Cheney-Rumsfeld-Bush, the misguided Bismarckian trio who tried to infuse democracy by war and violence, a continuing mess? (During the Egyptian protest Cheney claimed that Mubarak was not a dictator) Aren't 9 /11, the complicated war in Afghanistan and the tensions in Pakistan the detritus of our clever cold war calculations which have boomeranged and come back to haunt us? Ferguson is a historian. His specialty is "counterfactual history"- what the world may have been like if powerful individuals had gone down one political path instead of another. Here are some of my own wishful counterfactuals regarding the world and the Islamic middle east and south Asia in particular. What if after WWI and the collapse of the Ottoman Empire, the Arab world had not been carved up like a child's jig-saw puzzle by western colonizers hungry for oil and imperial hegemony, without any regard for regional allegiances, religious sensibilites and tribal identities? What would Iran be like today if we hadn't toppled the democratically elected Mohammed Mossadegh in favor of the Shah of Iran only to ensure profits for American and British oil companies? What if the US had dealt with democratic India after its independence even handedly as a reasonable political partner and not a Soviet stooge to be kept in check by heavily arming successive Pakistani military and civilian dictatorships? What if the US had indeed acted as an impartial referee in the Israel-Palestine conflict and not routinely caved in to powerful pro-Israel lobbies at home? What if we had controlled our knee jerk fear and pride and tolerated Najibullah's communist rule in Afghanistan instead of collaborating with the savage Taliban to teach a lesson to our then arch enemy, the Soviet Union? What if Israel had not supported Hamas / Muslim Brotherhood in order to weaken the secular resistance movement of the PLO? And the most controversial counterfactual of all: What if the Soviet Union were still in existence as a counterbalance to the US superpower? Would we have invaded Iraq without just cause, created the deep morass in the Af/Pak region and seen a sharp rise in religious fundamentalism? Counterfactual historical musings are sometimes as useful as trying to squeeze the toothpaste back into the tube. Sure, future policies should be based on 20/20 hindsight but only if we correct past errors and not repeat them. Perhaps Obama's "do nothing but use lofty rhetoric to soothe" is a good enough policy for the bubbling cauldron of the middle east now, where people are focused on toppling corrupt dinosauric leaders and shaping their own future with a semblance of dignity. If the Arab revolution results in putting in place governments we don't like or situations we deem unstable, we will just have to deal with them with caution. If oil prices rise, we will have to tighten our belts. If Islamic parties come in power, we'd better treat them with civility, common sense, resigned humility and not the customary self serving heavy hand, so that they come to see moderation as a better choice than extremism. We must be honest enough to support the principles of fairness, liberty and dignity for the Arab public that we proclaim to uphold for ourselves. Stability may result in time, naturally and organically without our meddling, through the willing participation of the common man on the streets of Tripoli, Manama, Tunis and Cairo. We can only hope but cannot guarantee that stable democratic societies will emerge from the current upheaval. Meanwhile, the Obama administration has its work cut out in the American midwest. Update (November, 2011): In the mere nine months since I made these observations, much has happened. Tunisia is in the process of establishing a democratic government; Syria finds itself in the midst of a bloody turmoil and President Bashar al-Assad is being roundly condemned by his neighbors; Bahrain and Yemen continue to smolder under the patina of apparent quiet; after four decades of heading a capricious and iron fisted regime Muammar Gaddafi met with a gruesome end and Egypt's Tahrir Square is busy again with teeming crowds of protesters unhappy with the post-Mubarak administration. In the US, popular protests have spread from the Wisconsin state capitol to public parks, college campuses and downtown centers of major cities. Far away from the middle east and Zuccotti Park, another oppressive and secretive dictatorship's downfall may be imminent at long last. In the poverty stricken, ravaged land of Myanmar, democracy activist Aung San Suu Kyi's party is set to contest all parliamentary seats in the upcoming election. In early December Secretary of State Hillary Clinton will be dispatched there in an effort to help lift the now moldering bamboo curtain that has isolated the Burmese people from the rest of the world for decades. Comments Why do all commentators of various stripes agonize over Obama's words and lack of 'deeds'? What's wrong with just words that soothe and maybe, just maybe, inspire? Even if one doesn't want to credit Obama with any input into what went on in Tunisia and Egypt, is it possible that he is merely a catalyst - a facilitator, without actually participating actively in the 'chemical' reaction stirred up by other initiating factors? Ferguson is indulging in the 'woe is us' breastbeating, angry that the colonizing narrative of Western democracy enlightening the Arab world is slipping away into the dustbin of history, including a great many of his pet theories on how the world can and should work. It may be messy, but if and when democracy rises in Tunisia, Egypt, maybe even Libya, it will be a home-grown variety, with all the steps forward and backward like a wobbly toddler learning to walk for the first time. There will be falls, stumbles. But some day, the walk will turn into a confident run. Well said Ruchira! I agree with everything you have written here. I am also tired of commentators, like the former National Security chief Brzenski go on about how in Egypt there is no one from the opposition who is "able enough" to head the government there. Interesting and annoying how commentators use the "weak opposition" line to support what might be (read: are) their own interests. I remain optimistic re: the inquilaabs in the "Middle East" and North Africa. What a wonderful essay. I too find the president to be justified in standing back a bit -- it's hardly the easy or the wimpy thing to do, refraining from rushing to take sides in someone else's struggle. For one thing, it enhances the US appearance of being a fair dealer (let other countries do it their way, okay?), and repairs our image as an over-hasty bully -- to the extent it can be repaired in the short term. After eight years of W, Niall Ferguson is bitching about caution? Well said, Ruchira. I also think it's foolish to base judgments on a quick reading of public diplomacy. I'm all for transparency, but when we're suddenly challenged to turn the aging battleship that is American foreign policy around on a dime, I certainly hope that Obama and the State Dept. are very busy communicating on many more fronts, trying many more angles, than we are privy to. Post World War II the US set itself against Asian nationalism. It was one thing to distrust Mao and Ho, but even people like Jawaharlal Nehru, who was a mild socialist, were distrusted. In part this was at the instigation of Britain, and in part because of the self-perceived interests of a world power which meant that there could be no friends in the world, only surrogates. This, in fact, is the lesson that emerges from the different kinds of relations the US had with France and UK in the 1950-1990 period. Counterfactual history is not toothpaste. It's laugh out loud absurdity. Ferguson's model is Krok & Loon's The American Spectacle: 1492 to the Present, a high school history textbook parody included in the National Lampoon's 1964 High School Yearbook. Chapter 1 concludes with review questions, Mastering What You Have Learned. The Brain Teaser: What do you think the outcome of the Revolutionary War would have been if George Washington had been born a horse? If Ferguson is a historian, George Washington was a horse. He doesn't know what it means for a strategy to be coherent, let alone grand. Why must the west do anything at all? These people should settle their own polity without interference and without regard to the strategic interests of western oligarchies. As they, in fact, are. The basis for democracy is the sovereign will of the people, not the economic and military interests of the US administration and congress. Awesome post. First time I am coming here, and am throughly impressed. @Sujatha - In my opinion, Obama has done the bravest thing possible, by just letting things happen. This has allowed both the Tunisian, and Egyptian people to have complete ownership of their revolutions. Their stake in the future of the country is now 100%. If the US had involved itself (and the external, internal, and political pressure on Obama to do so was tremendous), the value of these uprisings would have been completely diluted, since they would have been tainted by the presence of the foreign hand, destroying their indigenous nature. @Dean - Your characterization of Ferguson is brilliant. The guy is a fool extraordinaire. Its amazing that someone like this can get published in supposedly respectable journals and newspapers. Right on most counts. But the Taliban were not the ones with whom the US collaborated to defeat the USSR. They had very little to do with the Afghan people's war against the Soviet Union. They grew up in the refugee camps & madrasses of the Pakistan border region, finding common cause with the radical Islamic elements of the Mujahideen in the wake of the Soviet withdrawal. Our disinterest after this withdrawal certainly contributed to their eventual ganing the upper hand against the other Muj groups and getting rid of Najibullah. Indeed, the motley crowd we armed and trained with the help of the Pakistani army to foment the rebellion against the USSR was collectively known as the Mujahideens / Mujahedins. After the Soviets retreated, the group splintered across ethnic backgrounds. The Arab fighters came to coalesce as Al Qaida under the leadership of Bin Laden. Afghan Mujahedins became the Taliban and formed the government in Afghanistan with ex-Mujahedins like Mulla Omar at the helm. The two groups remained on the same page philosophically and mutually dependent strategically. The Arabs wielded considerable power behind the scenes in the newly "liberated" Taliban ruled "Islamic Republic of Afghanistan." And yes, the refugee camps in the Af/Pak border region were (and continue to be) a breeding and recruiting ground for both organizations. I guess the point I was making is that we made the "Taliban" possible by aiding, abetting and creating their past Mujahedin avatars.
Low
[ 0.49705304518664006, 31.625, 32 ]
658 F.Supp. 438 (1987) Rothie Louise HARRIS, Plaintiff, v. STANDARDIZED SANITATION SYSTEMS, INC., A Corporation; Pacific Floor Machine Manufacturing Company, A Corporation; and Howell Electric Motors, A Corporation, Defendants. Nancy Michelle McFADDEN, Plaintiff, v. STANDARDIZED SANITATION SYSTEMS, INC., A Corporation; Pacific Floor Machine Manufacturing Company, A Corporation; and Howell Electric Motors, A Corporation, Defendants. Civ. Nos. 85-2311, 86-2030. United States District Court, W.D. Arkansas, Fort Smith Division. February 23, 1987. Bill B. Wiggins and Robert S. Blatt, Fort Smith, Ark., for plaintiff. *439 James A. Arnold, II, Shaw, Ledbetter, Hornberger, Cogbill & Arnold, Fort Smith, Ark., for Standardized Sanitation Systems, Inc. Woody Bassett, Bassett Law Firm, Fayetteville, Ark., for Pacific Floor Mach. Mfg. Co. Robert L. Jones, Jr., Fort Smith, Ark., for Howell Elec. Motors. MEMORANDUM OPINION H. FRANKLIN WATERS, Chief Judge. The court has reviewed the motion for partial summary judgment filed by defendants, Standardized Sanitation Systems, Inc., and Pacific Floor Machine Manufacturing Company, and believes that although the facts pertinent to the statute of limitations issue are undisputed, the defendants are not entitled to judgment as a matter of law. In addition, the court has determined that there are genuinely disputed material facts pertinent to the plaintiffs' claims for recovery of medical expenses incurred during their minority. The motion for summary judgment will be denied by order entered concurrently herewith. I. STATUTE OF LIMITATION After considering defendants' statement of undisputed facts and plaintiffs' response thereto, the court finds the following material facts to be uncontested. The accident giving rise to plaintiffs' injuries occurred on July 15, 1982. Plaintiffs were both minors at the time of the accident but have since attained the age of majority. A complaint was filed by plaintiffs on December 20, 1985, asserting a product liability action against defendants. The plaintiffs' cause of action rests on both negligence and strict liability theories of recovery. Defendants filed a motion for summary judgment on January 2, 1987, contending, inter alia, that plaintiffs' cause of action based on strict liability was time barred. The court does not agree. A products liability action (whether pursued on a theory of negligence, breach of warranty, or strict liability) must be brought within three years from the date on which the death, injury or damage complained of occurs. Ark.Stat.Ann. § 34-2803. See also Heimann, The Arkansas Product Liability Act of 1979, 35 Ark.L. Rev. 364 (1981). It is not contested that plaintiffs' claims are barred by this limitation period unless a savings statute extends the time for filing. Plaintiffs assert that the Arkansas General Savings Statute (Ark.Stat.Ann. § 37-226) does so extend the limitation period. Arkansas' general savings statute allows a minor to bring any action which accrued during the time of his minority within three years after he reaches the age of majority. See Ark.Stat.Ann. § 37-226. Plaintiffs have filed this cause of action within the time specified in section 37-226. The question posed by defendants, however, is whether plaintiffs are entitled to rely on the savings statute to extend the time for filing a products liability action brought on a theory of strict liability. In 1913, the Arkansas Supreme Court held that the general savings statute does not apply "where a statutory right of action is given, which did not exist at common law, and the statute giving the right also fixes the time within which the right may be enforced...." Anthony v. St. Louis, I.M. & S. Ry. Co., 108 Ark. 219, 221, 157 S.W.2d 394 (1913). What has become known as the Anthony rule rested upon a logical premise that in such a situation where a statute both creates a new right and contains a period of limitation "the time so fixed becomes a limitation or condition upon the right of action, and will control." Id. 108 Ark. at 221, 157 S.W.2d 394. The Eighth Circuit recognized and approved of the Anthony rule in Crawford v. Martin Marietta Corp., 622 F.2d 339 (8th Cir.1980). The court has examined the history of strict liability in Arkansas and believes that such a cause of action did not exist at common law, however, the Arkansas statute creating the right to proceed on a theory of strict liability does not contain a time limitation on filing such actions. Therefore, the Anthony rule does not apply to *440 bar plaintiffs' reliance on the extended filing period available for minors under Arkansas' general savings statute. The findings of the court are based on the following analysis. Since the recognition of strict liability in tort for the sale of dangerously defective products in Greenman v. Yuba Power Products, Inc., 59 Cal.2d 57, 377 P.2d 897, 27 Cal.Rptr. 697 (1962), many states have adopted the Restatement (Second) of Torts approach to strict liability or a substantial equivalent. Heinman, The Arkansas Product Liability Act of 1979, 35 Ark.L.Rev. 364, 364 n. 1 (1981). Arkansas is no exception. In 1973, the Arkansas legislature recognized a cause of action based upon strict liability. See Ark.Stat.Ann. §§ 85-2-318.2, 85-2-318.3. The Arkansas Supreme Court in discussing the legislative enactment stated: Strict liability is a new theory of recovery in a cause of this sort [product liability]. It is a liability imposed by statute. It confers upon a plaintiff the right to recover damages upon a theory and under circumstances where a cause of action did not formerly exist. (citations omitted) Before the adoption of the act, appellee could have only recovered by proving negligence or a breach of warranty. After the passage of the act, for one in appellee's position, neither negligence nor breach of warranty would be an essential ingredient of the cause of action on strict liability. Thus a new cause of action exists and a new liability is imposed. General Motors Corp. v. Tate, 257 Ark. 347, 353, 516 S.W.2d 602 (1974). The court believes it to be well settled that strict liability is an entirely statutory cause of action in Arkansas that did not exist at common law. However, as noted above, this finding does not entitle the defendants to judgment as a matter of law. In order for the Anthony rule to come into play, the statute creating the right to proceed on a theory of strict liability must contain its own period of limitation. Despite defendants' attempts to convince the court otherwise, the 1973 statute which first recognized strict liability actions in Arkansas does not contain a specific period of limitation. See Ark.Stat.Ann. § 85-2-318.2. After passage of the Act, courts applied the general three-year negligence limitation period found in Ark.Stat.Ann. § 37-206 to strict liability actions. Then, in 1979, the legislature passed The Product Liability Act which contained a three-year limitation period for all product liability actions. Ark.Stat.Ann. § 34-2803. Defendants attempt to merge this statute of limitation with the earlier statute adopting strict liability as a viable cause of action in Arkansas. Thus, defendant would place this case on all fours with Anthony, supra. The court cannot see its way to adopt the defendants' theory for several reasons. First, the 1979 Product Liability Act established a general period of limitation for all product liability actions whether brought on a theory of negligence, warranty or strict liability. The Act did not set a specific statute of limitations for causes of actions brought pursuant to Ark.Stat.Ann. § 85-2-318.2. Second, it cannot be said that the 1979 Act in itself creates a new cause of action based on strict liability and contains a limitations period for that right. See French v. Grove Mfg. Co., 656 F.2d 295 (8th Cir.1981). In French, the Eighth Circuit quite emphatically stated that the 1979 Act merely sets forth definitions to be used, establishes a limitations period, and enumerates defenses and indemnification remedies available in a products liability action. The Act does not create any new causes of action or substantive rights and liabilities. Id. at 298. In summary, the Anthony rule prohibits application of the general savings statute to statutes which 1) create a right that did not exist at common law and 2) contain a specific statute of limitation. The Arkansas statute governing causes of action based on strict liability does create a new right that was not available at common law. However, the statute does not contain a specific period of limitation. Rather, such actions are governed by the general statute of limitations applicable to all products liability cases. Therefore, the general *441 savings statute operates to extend the time for minors to file a products liability action brought on a strict liability theory. The present cause of action filed by plaintiffs is not time barred. II. MEDICAL EXPENSES INCURRED DURING MINORITY Defendants have also requested partial summary judgment on plaintiffs' prayer for damages to compensate them for medical expenses incurred during their minority. The court believes that there are genuinely disputed issues of material fact with regard to this claim and thus summary judgment would be improper. By its very terms, Rule 56 of the Federal Rules of Civil Procedure allows summary judgment where there is no genuine issue of material fact and the moving party is entitled to judgment as a matter of law. "As to materiality, the substantive law will identify which facts are material. Only disputes over facts that might affect the outcome of the suit under the governing law will properly preclude the entry of summary judgment." Anderson v. Liberty Lobby, Inc., ___ U.S. ___, 106 S.Ct. 2505, 91 L.Ed.2d 202 (1986). In the case at hand, the parties have correctly identified the essence of the governing substantive law in their respective discussions of Sibley v. Ratliffe, 50 Ark. 477, 8 S.W.2d 686 (1888). In Sibley, the Arkansas Supreme Court adopted the traditional rule that "in case of an injury to a minor child, two causes of action arise — one in favor of an infant for his personal injuries and one in favor of the parent for losses suffered by him or her." Sibley, 50 Ark. at 480, 8 S.W.2d 686. While the Sibley rule still carries precedential value, its holding has been limited to those cases "where the child is unemancipated and not responsible for his own debts and has not paid the bill for such expenses." Parrott v. Mallett, 262 Ark. 525, 558 S.W.2d 152 (1977). Thus, the substantive law identifies emancipation of the minor, responsibility for debts incurred and who paid for the medical expenses as material facts. To survive summary judgment, Rule 56 requires the presence of a genuine dispute as to these material facts, that is, summary judgment will not lie if the evidence is such that a reasonable jury could return a verdict for the nonmoving party. See Anderson, supra. In determining whether a factual dispute is genuine, the inquiry performed is the threshold inquiry of determining whether there is the need for a trial — whether, in other words, there are any genuine factual issues that properly can be resolved only by a finder of fact because they may reasonably be resolved in favor of either party. Anderson, supra. The court believes that reasonable minds could differ on the question of whether the plaintiffs were emancipated minors responsible for their own debts and thus there remains a genuine issue for trial precluding a grant of summary judgment. For the reasons set forth above, the defendants' motion for summary judgment will be denied.
Low
[ 0.49612403100775104, 32, 32.5 ]
Combining tactics to exploit Allee effects for eradication of alien insect populations. Invasive species increasingly threaten ecosystems, food production, and human welfare worldwide. Hundreds of eradication programs have targeted a wide range of nonnative insect species to mitigate the economic and ecological impacts of biological invasions. Many such programs used multiple tactics to achieve this goal, but interactions between tactics have received little formal consideration, specifically as they interact with Allee dynamics. If a population can be driven below an Allee threshold, extinction becomes more probable because of factors such as the failure to find mates, satiate natural enemies, or successfully exploit food resources, as well as demographic and environmental stochasticity. A key implication of an Allee threshold is that the population can be eradicated without the need and expense of killing the last individuals. Some combinations of control tactics could interact with Allee dynamics to increase the probability of successful eradication. Combinations of tactics can be considered to have synergistic (greater efficiency in achieving extinction from the combination), additive (no improvement over single tactics alone), or antagonistic (reduced efficiency from the combination) effects on Allee dynamics. We highlight examples of combinations of tactics likely to act synergistically, additively, or antagonistically on pest populations. By exploiting the interacting effects of multiple tactics on Allee dynamics, the success and cost-effectiveness of eradication programs can be enhanced.
High
[ 0.6666666666666661, 35.25, 17.625 ]
Wow! Iím clearly in the minority here but, I truly find these figures to be completely and utterly hideous. Wow, really Todd? Is it mostly just the soft goods that are bothering you? I can understand that a little, since I'm not a big propenent of them either, and they do look a little "clumpy" on these figures... If it's just the soft goods, then do you like the Han at all, that comes without any soft goods? Just curious if that's all your beef is with, or if it runs any deeper than that... If it were just the cloth I might have been able to get past it. Maybe? But when you add ToyBiz-style articulation to ridiculously frumpy "soft goods", both things that I absolutely detest, thatís the worst thing that could happen to Star Wars figures as far as Iím concerned. Again, lucky for Hasbro Iím in the minority on this issue. I'm aware that many people want to see more soft goods and more articulation in the 3-3/4" line so this news must be very welcome news for them. But, I wonder how many people would like these figures if they were not coming packaged on the faux vintage cards? I know I still wouldn't. Beyond the packaging, nothing about the three figures revealed so far feels ďvintageĒ to me. Damn, at first glance I thought I was looking at new 12Ē Luke and Ben figures not 3-3/4Ē figures. What does that say? Besides perhaps that my eyes are going bad. I was really looking forward to getting those vintage-style cards too, but truth be told, nostalgia isnít more important than my personal preferences, But hey, I still look forwrd to the forthcoming Original Trilogy Collection cards and figures. Even the Repacks. So, what are your predictions for the remaining 9 figures for this line? ANH:LukeHanObi-WanLeia ESB:YodaLandoVaderBoba Fett ROTJ:ChewyC-3POR2-D2Stormtrooper Ding ding ding! So what do I (and MikeyD) win?! OK, so I got the movies reversed on the Fett and R2, but character-wise I was 12 for 12! But as I mentioned in Justin's Stormtrooper thread, I really would've rather seen a nicely articulated and cloth robed Emperor, instead of the super popular army builder - the Stormtrooper. I still think that the VOTC 12 will get recarded and rereleased as part of the regular line a little later on - hopefully even in the OTC assortment. Hasbro just put too much time and money into finally making the definitive versions of these characters to only put them out in a "limited" release. Here's the official announcement from Hasbro's Q & A, including release dates: Quote Question: Who are the 12 characters in the Vintage figures waves? And when will they be available? Answer: www.starwars.hasbro.com will be doing a weekly spotlight on each of these figures starting in the Spring. However, the 12 figures will be: Wave 1: Luke, Obi-Wan, Han Solo, Princess Leia - Planned to be available in JulyWave 2: Darth Vader, C-3P0, Yoda, Lando Calrissian - Planned to be available in AugustWave 3: Stormtrooper, Chewbacca, R2-D2, Boba Fett - Planned to be available in September Wow! Cool deal. Thanks for the heads up (and scoop) Nick! The Vader and C-3PO (with partially silver leg) look great! Yoda... hard to tell, but not super striking to me as of yet. Lando doesn't look so hot on the other hand. I think I like the POTJ version much better, though this one will have more articulation. I'll have to see them in person to make my final judgement though. Hopefully that C-3PO is fully articulated EVERYWHERE. That would be a dream come true finally... I wonder if Vader's cape is really held by the chain, which looks a little too big all spread across his shoulders like that. The rest of him looks excellent though! Wonder why Leia got left out of the mix (again)... Maybe they're having some problems with her final sculpt or something, otherwise we would've seen her up close by now, I'd imagine. She wasn't at Toy Fair either, for some reason... This certainly was a nice surprise to see this morning. I think that these figures look pretty great, not so sure about the Lando yet. I think I might like the POTJ version better (the cape at least was better), but the articulation on this one looks much improved. The rest look great, I am really diggin the Vader. I really like the nods to the vintage line, with Yoda coming with a snake, cloth included, etc. I can't wait to see the rest! Yeah, 3rd me for a thank you to Nick for the images... They all look great to me, though Luke still is the "Stinker" of the bunch. Fair enough since I'm happy with the other Tatooine Lukes in the small army of them we've received over the years. I look at it as this LUke's gonna be a great piece for customizing (god willing he's available enough/for a fair price in more generic packaging). -Lando... I love Lando's look actually. I have heard people question why his pants are so high, but it's actually his belt that gives that illusion. I think the cape on the POTJ Lando's better looking though, but these are definitely not looking like production figures to me at this point so I'll reserve judgement on the cape for now. -C-3PO kicks butt of course. A nice clean 3PO is a good idea since it's been a long time since one's been available. I'm guessing he's articulated well, but it's real tough to say by the picture. I wonder if his limbs are removable as well? Include the net then perhaps? -Yoda ROCKS! Best Yoda Ever, quite simply. This, like Scott, is the Yoda I've always wanted. A Vintage-esque Yoda who even has a SNAKE to wrap around the barrel of Luke's X-Wing laser. That's great. -Darth Vader also is a great looking figure, and I predict he'll be one of the hottest figures out of the lineup. Super Articulated, and I do believe that chain's attached to the cape. Looks great to me. I really want one to pop a Throne Room Duel Vader head onto though, for a Rem. Helmet version (should this version not have that feature). Great stuff all around, and I still love the 3 from Toy Fair as much as the day I saw them. Again, if Hasbro makes these so limited nobody can find them, and they're not available within the basic line, I think it'll be one of the single biggest mistakes ever made with this line. There's already huge outcry for people to get 2, 3, or more sets of these... Customizers are buzzing about wanting extras at a fair price. These are easily the best versions of these characters, and should really see some re-release status. Great stuff. Can't wait to see the final 4, who I think will make up the hottest wave of all. Stormtrooper and Boba Fett? Fuggeddabout it! Those will fly off shelves, even at $10 I believe. SilverZ Vader is simply amazing. I even like the cape. There's nothing apparently missing from this one. Looks like Ultimate Vader to me. Since he looks to have a ballsocket head I'd put bets on a removable helmet version quickly after if this doesn't include the feature.
Low
[ 0.5, 29, 29 ]
Open this photo in gallery Commissioner Julie Gelfand, of the Environment and Sustainable Development Commission, holds a news conference in Ottawa, Tuesday, October 3, 2017. Fred Chartrand/The Canadian Press Only five of 12 provinces and territories have targets for reducing greenhouse-gas emissions by 2020, and only two are on track to hit those goals with domestic reductions, a report from Canadian auditors-general said Tuesday. Federal, provincial and territorial auditors worked together to assess Canada’s response to climate change, both in reducing greenhouse-gas emissions (GHGs) and adapting to the changing conditions. Quebec did not participate in the study. Of those provinces and territories that were included, only New Brunswick and Nova Scotia have climate targets for 2020 that they are likely to achieve through domestic action, while Ontario is relying on a cap-and-trade system that includes emissions reductions from outside the province. Story continues below advertisement “On the basis of current federal, provincial, and territorial policies and actions, Canada is not expected to meet its 2020 target for reducing greenhouse-gas emissions,” the report said. “Meeting Canada’s 2030 target will require substantial effort and actions beyond those currently planned or in place.” At the Copenhagen climate summit in 2009, then Conservative prime minister Stephen Harper set a goal of reducing GHGs by 17 per cent below 2005 levels by 2020. At Paris in 2015, Prime Minister Justin Trudeau pledged Canada would reduce emissions by 30 per cent below 2005 levels by 2030. Catherine McKenna is defending the government’s climate policies after a new audit said Ottawa and the provinces lacked clear plans to adapt to climate change. The environment minister called the report “backwards looking.” The Canadian Press Despite the presence of a federal goal that relies in part on provincial action, nine of 13 provinces and territories have no GHG targets for 2030, including Alberta, British Columbia, and Newfoundland and Labrador. The federal government is expected to introduce legislation this spring to establish a federal “backstop” that would impose a carbon tax in provinces that refuse to establish their own levy or cap-and-trade policy, or that fail to meet federal standards for their system. The federal carbon tax plan is vigorously opposed by the Saskatchewan government and conservative opposition parties in Ontario and Alberta, where elections loom. The federal and provincial governments are also pursuing a host of other policies, including the phase-out of coal-fired electricity; efforts to encourage energy efficiency and fuel switching in buildings, and policies aimed at reducing reliance on gasoline and diesel in transportation. All those approaches drive up costs for businesses and consumers, depending on whether they succeed in cutting their energy use. In the report released Tuesday, the auditors also found that federal, provincial and territorial governments are not adequately preparing for the changes that global warming will bring, including changing rainfall patterns with droughts and more frequent severe storms, melting Arctic sea ice and tundra, and higher sea levels. ”It is important for governments to systematically assess their risks in order to adapt to the changes to come and to allocate resources to the most pressing concerns,” the auditors said.
Mid
[ 0.5769230769230761, 33.75, 24.75 ]
--- abstract: | The two-time correlation function for probe spin interacting with spin system (bath) is studied. We show that zeros of this function correspond to zeros of partition function of spin system in complex magnetic field. The obtained relation gives new possibility to observe the Lee-Yang zeros experimentally. Namely, we show that measuring of the time dependence of correlation function allows direct experimental observation of the Lee-Yang zeros. [*[**Keywords:**]{} Spin system, Lee-Yang zeros, two-time correlation function*]{}\ PACS numbers: 05.30.-d, 64.60.De title: ' Lee-Yang zeros and two-time spin correlation function ' --- Kh. P. Gnatenko [^1], A. Kargol [^2], V. M. Tkachuk [^3] $^{1,3}$ *Ivan Franko National University of Lviv,* *Department for Theoretical Physics,12 Drahomanov St., Lviv, 79005, Ukraine* $^{2}$ *Instytut Matematyki, Uniwersytet Marii Curie-Sklodowskiej,* *20-031 Lublin, Poland* Introduction ============ After works of Lee, Yang [@Yang52; @Lee52] and Fisher [@Fish65] analysis of partition function zeros are considered as a standard tool of studying properties of phase transitions in different systems [@Wu]. It is well known that the partition function of physical system is positive and can not be equal to zero. The partition function may have zeros if we allow the parameters in the hamiltonian of a system to be complex. These zeros are called Lee-Yang zeros. Lee and Yang studied zeros of partition function for ferromagnetic Ising model with complex magnetic field [@Lee52] and proved the theorem that all zeros are purely imaginary. This theorem holds for any Ising-like model with ferromagnetic interaction [@Lieb81] (see also [@Koz97; @Koz03; @Koz99]). Later Fisher generalized the Lee-Yang result to the case of complex temperature [@Fish65]. Studies of zeros of partition function for spin systems have attracted much attention (see, for instance, [@Binek98; @Wei12; @Wei14; @Peng15; @Kra15; @Kra16] and references therein). At the same time there are essentially smaller number of papers devoted to studies of zeros of partition function of Bose systems (see, for instance, [@Mul01; @Dij15; @Borrmann; @Gna17]) and Fermi systems (see, for instance,[@Bha11; @Zvyagin]). It is worth noting that studies of partition function zeros are important fundamentally. Zeros of partition function fully determine the analytic properties of free energy and are very useful for studies thermodynamical properties of many-body systems. Because of difficulties in the experimental realization of a many-body system with complex parameters, for a long time studies of Lee-Yang zeros were only theoretical. In 1998 an experimental access to study the density function of zeros on the Lee-Yang circle for a ferromagnet was provided [@Binek98]. Later in paper [@Wei12](see also [@Wei14]), analyzing decoherence of probe spin, the possibility of direct experimental observation of Lee-Yang zeros for partition function of spin system was shown. The authors of [@Peng15] reported direct experimental observation of Lee-Yang zeros. In [@Flindt13] it was suggested that dynamical phase transitions may be also analyzed and detected within the framework of Lee-Yang zeros. Report on experimental determination of the dynamical Lee-Yang zeros was presented in [@Bran17]. In our recent paper [@Gna17] we showed the possibility of experimental observation of Lee-Yang zeros for interacting Bose gas, considering time-dependent correlation function. In [@Gna172] we found that zeros of time-dependent correlation functions of q-deformed Bose gas are related with the Fisher zeros. In the present paper we relate zeros of two-time correlation function of probe spin with zeros of partition function of spin system (bath) with which probe spin is interacted. This relation in principle gives a new possibility for experimental observation of Lee-Yang zeros for spin systems in addition to that presented in [@Wei12; @Peng15]. The paper is organized as follows. In section 2 we give the preliminary information about the system under consideration. In Section 3 we find relation of zeros of two-time spin-1/2 correlation functions with Lee-Yang zeros. The possibility of simple experimental realization of considered system is shown in section 4. Conclusions are presented in Section 5. Hamiltonian of system under consideration ========================================= We are interested in study of the Lee-Yang zeros of spin-1/2 system under magnetic field with sufficiently general Hamiltonian $$\begin{aligned} \label{Hamilt} H=H'-h\sum_{i=1}^N\sigma^z_j,\end{aligned}$$ and only one restriction that $H'$ commutes with the total spin $$\begin{aligned} \label{comm} [H',\sum_{i=1}^N\sigma^z_j]=0.\end{aligned}$$ Hamiltonian $H^{\prime}$ can be Ising Hamiltonian $H'=-\sum_{jj'}J_{jj'}\sigma^z_j\sigma^z_{j'}$, Heisenberg Hamiltonian $H'=-\sum_{jj'}J_{jj'}({\bm \sigma}_j{\bm \sigma}_{j'})$ or some other that satisfy (\[comm\]). Pauli operators $\sigma^{\alpha}_j$ ($\alpha=x,y,z,$ or $1,2,3$) are related with the spin operators $s^{\alpha}_j=\hbar\sigma^{\alpha}_j/2$ and satisfy the following commutation relations $$\begin{aligned} [\sigma^{\alpha}_j,\sigma^{\beta}_{j'}]=2i\delta_{jj'}\epsilon^{\alpha \beta \gamma}\sigma^{\gamma}_j.\end{aligned}$$ In addition these operators satisfy anticommutation relation $$\begin{aligned} \{\sigma^{\alpha}_i, \sigma^{\beta}_i\}=2\delta^{\alpha\beta}.\end{aligned}$$ Here $\epsilon^{\alpha \beta \gamma}$ is antisymmetric tensor and $\delta_{jj'}$, $\delta^{\alpha\beta}$ are Kronecker symbols. We include into consideration probe spin-1/2 coupled to the considered system (bath) which is described by Hamiltonian (\[Hamilt\]), with the probe-bath interaction $$\begin{aligned} H_{int}=-\lambda\sigma^z_0 \sum_{j=1}^N\sigma^z_j,\end{aligned}$$ where $\sigma^z_0$ corresponds to the probe spin, $\lambda$ is a coupling constant. So, the total Hamiltonian is $$\begin{aligned} \label{TotalH} H_T=H+H_0+H_{int},\end{aligned}$$ here $H_0=-h_0\sigma^z_0$ is the Hamiltonian of probe spin placed in magnetic field $h_0$. Hamiltonian similar to (\[TotalH\]) was considered in [@Wei12]. Two-time spin correlation function ================================== Let us consider two-time correlation function for probe spin, which reads $$\begin{aligned} \langle \sigma_0^+(t+\tau)\sigma_0^-(t) \rangle={1\over Z_T}{\rm Tr}e^{-\beta H_T}\sigma_0^+(t+\tau)\sigma_0^-(t),\end{aligned}$$ where, $\sigma_0^{\pm}=(\sigma_0^x\pm i\sigma_0^y)/2$, $Z_T={\rm Tr}e^{-\beta H_T}$ is partition function of the total Hamiltonian, ${\rm Tr}={\rm Tr}_{1,2,...,N} {\rm Tr}_0$ is going over all spins including the probe one. Heisenberg representation for operators reads $$\begin{aligned} \sigma_0^-(t)=e^{iH_T t/\hbar}\sigma_0^-e^{-iH_T t/\hbar}=\nonumber\\ e^{-i\lambda\sigma^z_0 \sum_{j=1}^N\sigma^z_jt/\hbar-ih_0\sigma^z_0 t/\hbar} \sigma_0^- e^{i\lambda\sigma^z_0 \sum_{j=1}^N\sigma^z_j t/\hbar+ih_0\sigma^z_0 t/\hbar},\end{aligned}$$ here we take into account that the probe spin operators commute with other ones. In addition taking into account that $\sigma_0^-$ anticommutes with $\sigma_0^z$, $\{\sigma_0^-,\sigma_0^z\}=0$, we find $$\begin{aligned} \sigma_0^-(t)=\sigma_0^-e^{i2\lambda\sigma^z_0 \sum_{j=1}^N\sigma^z_j t/\hbar+i2h_0\sigma^z_0 t/\hbar}.\end{aligned}$$ The conjugated operator to $\sigma_0^-(t)$ reads $$\begin{aligned} \sigma_0^+(t)=e^{-i2\lambda\sigma^z_0 \sum_{j=1}^N\sigma^z_j t/\hbar-i2h_0\sigma^z_0 t/\hbar}\sigma_0^+,\end{aligned}$$ The product of these operators can be written as $$\begin{aligned} \sigma_0^+(t+\tau)\sigma_0^-(t)=\nonumber\\ =e^{-i2\lambda\sigma^z_0 \sum_{j=1}^N\sigma^z_j (t+\tau)/\hbar-i2h_0\sigma^z_0 (t+\tau)/\hbar}\sigma_0^+\sigma_0^- e^{i2\lambda\sigma^z_0 \sum_{j=1}^N\sigma^z_j t/\hbar+i2h_0\sigma^z_0 t/\hbar}=\nonumber\\ ={1\over 2}(1+\sigma^z_0)e^{-i2\lambda\sigma^z_0 \sum_{j=1}^N\sigma^z_j \tau/\hbar-i2h_0\sigma^z_0 \tau/\hbar}.\end{aligned}$$ Then correlation function reads $$\begin{aligned} \langle \sigma_0^+(t+\tau)\sigma_0^-(t)\rangle= \nonumber \\ ={1\over Z_T}{\rm Tr}_{1,2,...,N} {\rm Tr}_0e^{-\beta H_T}{1\over 2}(1+\sigma^z_0) e^{-i2\lambda\sigma^z_0 \sum_{j=1}^N\sigma^z_j \tau/\hbar-i2h_0\sigma^z_0 \tau/\hbar}=\nonumber\\ ={1\over Z_T}{\rm Tr}_{1,2,...,N} e^{-\beta (H'-h\sum_{i=1}^N\sigma^z_j)}{\rm Tr}_0{1\over 2}(1+\sigma^z_0) e^{(\beta\lambda -i2\lambda \tau/\hbar)\sigma^z_0 \sum_{j=1}^N\sigma^z_j+(\beta h_0-2ih_0\tau/\hbar)\sigma^z_0},\end{aligned}$$ here we substitute the total Hamiltonian given by (\[TotalH\]). Taking trace over the probe spin and using identity $$\begin{aligned} {\rm Tr}_0{1\over 2}(1+\sigma^z_0)e^{\sigma^z_0 \hat A}=e^{\hat A},\end{aligned}$$ where $\hat A$ is an operator which commutes with $\sigma^z_0$, we obtain very interesting result $$\begin{aligned} \label{CorPart} \langle \sigma_0^+(t+\tau)\sigma_0^-(t)\rangle={e^{(\beta h_0-2ih_0\tau/\hbar)}\over Z_T}{\rm Tr}_{1,2,...,N} e^{-\beta (H'-\tilde h\sum_{j=1}^N\sigma^z_j)}=\nonumber\\=e^{(\beta h_0-2ih_0\tau/\hbar)}{Z(\beta,\tilde h)\over Z_T},\end{aligned}$$ here $Z(\beta,\tilde h)$ is the partition function of Hamiltonian (\[Hamilt\]) with complex magnetic field $$\begin{aligned} \label{compField} \tilde h=h+\lambda -i{2\lambda\tau\over \beta\hbar }.\end{aligned}$$ Thus, we find the direct relation (\[CorPart\]) of two-time correlation function with the partition function of spin system in complex magnetic field. According to (\[CorPart\]) zeros of correlation function are zeros of partition function $Z(\beta,\tilde h)$ of Hamiltonian (\[Hamilt\]) with complex magnetic field. Triangle spin cluster ===================== In this section we consider one of the possible simple realizations of the total Hamiltonian considered in the previous sections. Let us study triangle spin cluster the Hamiltonian of which can be associated with the total Hamiltonian $H_T$. Namely, the Hamiltonian $$\begin{aligned} H_T=-J\sigma_0^z\sigma_1^z-J\sigma_0^z\sigma_2^z-J\sigma_1^z\sigma_2^z -h(\sigma_0^z+\sigma_1^z+\sigma_2^z)=\nonumber\\ =-J\sigma_1^z\sigma_2^z- h(\sigma_1^z+\sigma_2^z) -h\sigma_0^z-J\sigma_0^z(\sigma_1^z+\sigma_2^z)\end{aligned}$$ can be rewritten in the form (\[TotalH\]) with $$\begin{aligned} \label{Twospin} H=-J\sigma_1^z\sigma_2^z- h(\sigma_1^z+\sigma_2^z),\\ H_0=-h\sigma_0^z,\\ H_{\rm int}=-J\sigma_0^z(\sigma_1^z+\sigma_2^z),\end{aligned}$$ where $\lambda=J$ and $h_0=h$. Thus in this case one of the spins (we choose this spin to be $\sigma_0$) can be considered as the probe spin (see Fig. 1). ![Triangle spin cluster with $\sigma_0$ being the probe spin. Time correlation function of the probe spin is proportional to partition function of two spins $\sigma_1$ and $\sigma_2$ in complex magnetic field.[]{data-label="f1"}](m.eps){width="50.00000%"} According to (\[CorPart\]) the time correlation function for spin $\sigma_0$ is related with partition function of two other spins described by Hamiltonian (\[Twospin\]) in complex magnetic field (\[compField\]). The partition function of this Hamiltonian reads $$\begin{aligned} Z(\beta,\tilde h)=e^{\beta (J-2 \tilde{h})}\left(q^2+2q e^{-2\beta J}+1\right),\end{aligned}$$ where we introduce the notation $$\begin{aligned} q=e^{2\beta \tilde h}.\label{q1}\end{aligned}$$ This partition function has zeros $Z(\beta,\tilde h)=0$ at the points $$\begin{aligned} \label{q} q_{\pm}=-e^{-2\beta J}\pm\sqrt{e^{-4\beta J}-1}.\end{aligned}$$ For antiferromagnetic interaction $J<0$ solutions (\[q\]) are real, for ferromagnetic interaction $J>0$ we have the complex solutions $$\begin{aligned} \label{qc} q_{\pm}=-e^{-2\beta J}\pm i\sqrt{1-e^{-4\beta J}}.\end{aligned}$$ Let us consider this case in details. One can verify that $|q|=1$. So, the solutions (\[qc\]) can be represented in the form $$\begin{aligned} q_{\pm}=e^{i\phi}, \ \ \phi=\mp\tan\sqrt{e^{4\beta J}-1} +2\pi n, \ \ n=0,\pm1,\pm2,....\label{rez}\end{aligned}$$ It means that zeros are achieved at purely imaginary magnetic field that is in agreement with the Lee-Yang theorem. Taking into account (\[compField\]), definition of $q$ (\[q1\]) and (\[rez\]) we find that zeros of partition function and zeros of correlation function are achieved at $h=-J$ and $$\begin{aligned} \label{timeZero} \tau={\hbar\over 4J}\left(\pm\tan\sqrt{e^{4\beta J}-1} +2\pi n\right).\end{aligned}$$ So, the time correlation function has zeros at the moments of time given by (\[timeZero\]). Note that considered in this section simple Ising model describes the behavior of spins for instance in a Molecular Dysprosium Triangle [@Luz08]. So, measuring of time correlation function in this system allows experimental observation of the Lee-Yang zeros. Conclusions =========== The main result of this paper is presented by formula (\[CorPart\]) which relates the two-time spin-1/2 correlation function with the partition function of spin system in complex magnetic field. The imaginary part of magnetic field according to (\[compField\]) is related with the time of evolution. Thus measure of time correlation function allows experimental observation of Lee-Yang zeros. The Lee-Yang theorem states that zeros of partition function for ferromagnetic spin system lie on imaginary axis of magnetic field $\tilde h$. Thus, the zeros of correlation function and respectively the zeros of partition function are achieved at ${\rm Re} \tilde h=0$, that means that $h=-\lambda$. At this condition the correlation function has zeros at different moments of time that correspond to zeros of partition function. So, measuring of time dependence of the correlation function allows direct experimental observation of Lee-Yang zeros. This result provides new experimental possibilities in studies of Lee-Yang zeros in addition to that presented in [@Wei12; @Peng15], where zeros were related with decoherence. We show the possibility of experimental realization of spin systems considered in this paper. One of the simplest possible realization is triangle Ising cluster model which describes the behavior of spins in a Molecular Dysprosium Triangle [@Luz08]. A spin of this system can be considered as probe spin. Time correlation function of probe spin in this case is proportional to partition function of two other spins in complex magnetic field. Zeros of the time correlation function are achieved at the moments of time given by (\[timeZero\]). Observation of these zeros is equivalent to observation of Lee-Yang zeros. The realization of this new possibility of experimental observation of Lee-Yang zeros is related with recent progress in experimental measurements of the time correlation function [@Kna13; @Ped14; @Uhr17; @Xin17], in particular, spin time correlation functions. We hope that these methods of measurements of spin correlation function can be applied to the system considered in present paper that allows new possibility for direct experimental observation of Lee-Yang zeros. Acknowledgments {#acknowledgments .unnumbered} =============== This work was supported in part by the European Commission under the project STREVCOMS PIRSES-2013-612669 and by the State Found for Fundamental Research under the project F76. The authors thank Prof. Yu. Kozitsky, Prof. Yu. Holovatch and Dr. M. Krasnytska for useful comments and discussions. [99]{} C. N. Yang and T. D. Lee, Statistical Theory of Equations of State and Phase Transitions. I. Theory of Condensation, Phys. Rev. [**87**]{}, 404 (1952). T. D. Lee and C. N. Yang, Statistical Theory of Equations of State and Phase Transitions. IL Lattice Gas and Ising Model, Phys. Rev. [**87**]{}, 410 (1952). M. E. Fisher, in Lectures in Theoretical Physics, edited by W. E. Brittin (University of Colorado Press, Boulder, CO, 1965), Vol. 7c, p. 1. F. Y. Wu, Professor C. N. Yang and Statistical Mechanics Int. J. Mod. Phys. B [**22**]{}, 1899 (2008). E. H. Lieb, A. D. Sokal, A General Lee-Yang Theorem for One-Component and Multicomponent Ferromagnets, Commun. Math. Phys. [**80**]{}, 153 (I981). Yu. V. Kozitsky, Hierarchical Ferromagnetic Vector Spin Model Possessing the Lee–Yang Property. Thermodynamic Limit at the Critical Point and Above, Journal of Statistical Physics, [**87**]{}, 799 (1997). Yu. Kozitsky, Laguerre entire functions and the Lee–Yang property, Applied Mathematics and Computation [**141**]{}, 103 (2003). Yu. Kozitsky, L. Wolowski (2001) Laguerre entire functions and related locally convex spaces , Complex Variables, Theory and Application: An International Journal, [**44**]{}, 225 (2001). Ch. Binek, Density of Zeros on the Lee-Yang Circle Obtained from Magnetization Data of a Two-Dimensional Ising Ferromagnet, Phys. Rev. Lett. [**81**]{}, 5644 (1998). Bo-Bo Wei and Ren-Bao Liu, Lee-Yang Zeros and Critical Times in Decoherence of a Probe Spin Coupled to a Bath, Phys. Rev. Lett. [**109**]{}, 185701 (2012). Bo-Bo Wei, Shao-Wen Chen, Hoi-Chun Po, Ren-Bao Liu, Phase transitions in the complex plane of physical parameters, Scientific Report [**4**]{} , 5202 (2014). Xinhua Peng, Hui Zhou, Bo-Bo Wei, Jiangyu Cui, Jiangfeng Du, Ren-Bao Liu, Experimental observation of Lee-Yang Zeros, Phys. Rev. Lett. [**114**]{}, 010601 (2015). M. Krasnytska, B. Berche, Yu. Holovatch, R. Kenna, Violation of Lee-Yang circle theorem for Ising phase transitions on complex networks, EPL, [**111**]{}, 60009 (2015). M. Krasnytska, B. Berche, Yu. Holovatch, R. Kenna, Partition function zeros for the Ising model on complete graphs and on annealed scale-free networks, J. Phys. A, [**49**]{}, 135001 (2016). O. Mulken, P. Borrmann, J. Harting, and H. Stamerjohanns, Classification of phase transitions of finite Bose-Einstein condensates in power-law traps by Fisher zeros, Phys. Rev. A, [**64**]{}, 013611 (2001). W. van Dijk, C. Lobo, A. MacDonald, and R. K. Bhaduri, Fisher zeros of a unitary Bose gas, Can. J. Phys. [**93**]{} 830 (2015). P. Borrmann, O. Mulken, and J. Harting, Classification of phase transitions in small systems, [**84**]{}, 3511 (2000). Kh. P. Gnatenko, A. Kargol, V. M. Tkachuk, Two-time correlation functions and the Lee-Yang zeros for an interacting Bose gas, Phys. Rev. E [**96**]{}, 032116 (2017). Kh. P. Gnatenko, A. Kargol, V. M. Tkachuk, Time correlation functions and Fisher zeros for q-deformed Bose gas, arXiv:1711.06192. R. K. Bhaduri, A. MacDonald and W. van Dijk, Anomalous Fisher-like zeros for the canonical partition function of noninteracting fermions, EPL, [**96**]{}, 56003 (2011). A. A. Zvyagin, Nonequilibrium dynamics of a system with two kinds of fermions after a pulse, Phys. Rev. B [**95**]{}, 075122 (2017). Christian Flindt and Juan P. Garrahan, Trajectory Phase Transitions, Lee-Yang Zeros, and High-Order Cumulants in Full Counting Statistics, Phys. Rev. Lett. [**110**]{}, 050601 (2013). Kay Brandner, Ville F. Maisi, Jukka P. Pekola, Juan P. Garrahan, and Christian Flindt, Experimental Determination of Dynamical Lee-Yang Zeros, Phys. Rev. Lett. [**118**]{}, 180601 (2017). Javier Luzon, Kevin Bernot, Ian J. Hewitt, Christopher E. Anson, Annie K. Powell, and Roberta Sessoli, Spin Chirality in a Molecular Dysprosium Triangle: The Archetype of the Noncollinear Ising Model, Phys. Rev. Lett. [**100**]{}, 247205 (2008). Michael Knap, Adrian Kantian, Thierry Giamarchi, Immanuel Bloch, Mikhail D. Lukin, and Eugene Demler, Probing Real-Space and Time-Resolved Correlation Functions with Many-Body Ramsey Interferometry, Phys. Rev. Lett. [**111**]{}, 147205 (2013). J. S. Pedernales, R. Di Candia, I. L. Egusquiza, J. Casanova, E. Solano, Efficient Quantum Algorithm for Computing n-time Correlation Functions, Pys. Rev. Lett. [**113**]{}, 020505 (2014). Philipp Uhrich, Salvatore Castrignano, Hermann Uys, and Michael Kastner, Noninvasive measurement of dynamic correlation functions, Phys. Rev. A [**96**]{}, 022127 (2017). Tao Xin, Julen S. Pedernales, Lucas Lamata, Enrique Solano, Gui-Lu Long, Measurement of linear response functions in Nuclear Magnetic Resonance, Scientific Reports [**7**]{}, 12797 (2017). [^1]: E-Mail address: [email protected] [^2]: E-Mail address: [email protected] [^3]: E-Mail address: [email protected]
Mid
[ 0.644274809160305, 26.375, 14.5625 ]
Q: Return a value not an array from a controller to view php codeigniter I use this in my controller, function phpcalview() { $year = $this->input->post('yearvv'); $year1 = $year+1; //echo $year1; $this->load->view('phpcal',$year1); } How to $year1 value to my view phpcal and get that value in the textbox yearvv A: function phpcalview() { $year = $this->input->post('yearvv'); $data['year1'] = $year+1; $this->load->view('phpcal',$data); } in view: echo $year1;
Mid
[ 0.59952606635071, 31.625, 21.125 ]
Q: How to send data from an Android application to a server? I'm developping an online Chess game in Android. The first player uses the app and the second a webpage in html. What i want to do is to send the text with the information of every move each player makes in his turns. All the processing and validation parts of the game will be done in the Android application. The second player just receives the text, parses it into html code and then send a very similar text to the application in order to receive the authorisation of the move. I'm really trying to spend the least possible of internet resources. I've been searching what's my best option in order to send the messages with Android, but since I'm not very experienced with it, I don't know what to do. I found these possibilities for sending the messages: GCM Android ServerSockets and Sockets Making Push technology, like long-polling I have never used any of those technologies, but I would like to know which one could be the best for starting to make a deeper research of. As you can see a chess game doesn't need a great amount of messaging since I have to send and receive a single message per move and per the authorisation of it by the chess engine in the Android application. If you know a better solution or links with an example of the technology I should use, I would be very grateful. A: On your case it's just matter if the the Android player will need to be with the app running (real time play) or there will be the option to send the play, play turn off the app, and see the next move in a few hours? If it's a real time just open the connection and use polling or sockets to keep the game running. If it won't be a real time game, GCM is probably your best approach. But remind that both options will mean you'll need your own web-server running stuff.
Mid
[ 0.568848758465011, 31.5, 23.875 ]
Co-lead author with the University of Sydney Ms Jianping Zhang, at CSIRO where she now works. Photo top of page: credit Jianping Zhang. Researchers from the University of Sydney, CSIRO, the United Kingdom’s John Innes Centre, Limagrain UK and the National Institute of Agricultural Botany (NIAB) have isolated the first major resistance genes against the stripe rust disease that is devastating wheat crops worldwide. The discovery by the scientists, who have cloned three related rust resistance genes – called Yr7, Yr5, and YrSP – will enable these important genes to be accurately monitored and integrated into breeding programs in the fight against ever-changing pathogens that could kill about 70 percent or more of whole wheat crops at a time. Wheat is relied on by more than one-third of the world’s population and one of the most economically important stable foods. Wheat rust is one of the most widespread and devastating diseases and stripe rust – which is bright yellow and shaped as stripes – is the most problematic of these pathogens worldwide because it easily adapts to different climates and environments. As well, there are not many effective genes that breeders can use in their varieties. The characterisation of these three genes was made possible in a short period of time because of improving technology and the collaboration led out of Australia and the UK. The University of Sydney’s cereal rust research team under the directorship of Professor Robert Park – a world-leader in wheat rust research – created mutation populations in 2015 and identified mutants for each gene, while unknowingly in parallel, scientists in the UK were working on two of the genes. They found out about each other’s work at an international conference (the 13th International Wheat Genetics Symposium) in April 2017 and started collaborating. The findings are published today in Nature Plants.
High
[ 0.6876513317191281, 35.5, 16.125 ]
936 A.2d 588 (2007) Stephen C. MACKIE et al. v. STATE of Rhode Island et al. No. 2006-63-M.P. Supreme Court of Rhode Island. December 11, 2007. *589 Joseph S. Larisa, Jr., Providence, for plaintiff. Terrence J. Tierney, for defendant. *590 Present: WILLIAMS, C.J., FLAHERTY, SUTTELL, and ROBINSON, JJ. OPINION Chief Justice WILLIAMS, for the Court. In an effort to reduce the number of childhood lead poisonings in Rhode Island, the General Assembly enacted legislation intended to identify and correct lead hazards in this state. This legislation, the Lead Hazard Mitigation Act (LHMA), G.L. chapter 128.1 of title 42, has, nevertheless, sparked yet another controversy over lead paint.[1] This case came before the Supreme Court for oral argument on November 5, 2007, pursuant to a petition for a writ of certiorari filed by defendants, the State of Rhode Island, Patrick Lynch, in his capacity as Attorney General of Rhode Island, David R. Gifford, M.D., M.P.H., in his capacity as director of the Rhode Island Department of Health, and Susan Baxter, in her capacity as chairwoman of the Rhode Island Housing Resources Commission (defendants or state). In their petition, defendants sought this Court's review of a Superior Court decision, in which a portion of the LHMA was declared unconstitutional, as being violative of the Equal Protection Clause of the Rhode Island Constitution. This Court granted defendants' petition, and for the reasons set forth herein, quashes the decision of the Superior Court. I Facts and Travel A The Lead Hazard Mitigation Act In 2002 the General Assembly enacted the LHMA (P.L. 2002, ch. 187, § 3) and declared its purpose to be threefold. Section 42-128.1-3 provides that "[i]n order to promote the prevention of childhood lead poisoning in Rhode Island," the LHMA is intended "(1) To increase the supply of rental housing in Rhode Island in which lead hazards are, at a minimum, mitigated; "(2) To improve public awareness of lead issues and to educate both property owners and tenants about practices that can reduce the incidence of lead poisoning; "(3) To resolve disjointed insurance practices arising from lead liabilities exclusions." To that end, the LHMA imposes several duties on owners of rental dwellings constructed before 1978. These duties include: (1) attending a lead hazard awareness seminar; (2) evaluating the dwelling unit and premises for lead hazards; (3) correcting lead hazards by meeting the lead hazard mitigation standard; (4) providing tenants with information; and (5) correcting lead hazards within thirty days after notification. Section 42-128.1-8(a). The LHMA originally provided that the lead hazard mitigation requirements would apply to the first change in ownership or tenancy after July 1, 2004; however, in 2004, that date was postponed to July 1, *591 2005, and in 2005, it again was postponed to November 1, 2005. See P.L. 2002, ch. 187, § 3; P.L. 2004, ch. 221, § 2; P.L. 2005, ch. 142, § 2. In 2005, the General Assembly also amended the act to include an exemption for certain property owners. P.L. 2005, ch. 142, § 2. The statute now in effect includes this exemption, which provides: "(e) Notwithstanding the foregoing, the provisions of this chapter shall not apply to common areas in condominium complexes that are owned and operated by condominium associations, or to pre-1978 rental dwelling units that are: "(1) Lead safe or lead free; or "(2) Temporary housing; or "(3) Elderly housing; or "(4) Comprised of two (2) or three (3) units, one of which is occupied by the property owner; or [sic] "The department of health shall report to the legislature annually on the number of children who are lead poisoned in any of the exempted dwelling units as referred to in subdivision (e)(4) of this section." Section 42-128.1-8(e). At the center of this litigation is subsection (e)(4) of § 42-128.1-8, which exempts owner-occupied two- and three-unit dwellings from the act's mandates. The plaintiffs, owners of rental properties in various locations throughout the state, alleged that this exemption results in different treatment for similarly situated property owners without regard to any lead hazard to children. The plaintiffs asserted that the act is arbitrary in treating owner-occupied and non-owner-occupied dwellings of the same size differently and in treating owner-occupied two- and three-unit dwellings differently from owner-occupied four- or five-unit dwellings. The plaintiffs' complaint sought both declaratory and injunctive relief. More specifically, it requested that the Superior Court declare the LHMA unconstitutional and enjoin the state from enforcing the act. B Evidentiary Phase of the Declaratory Judgment Hearing A three-day hearing commenced in late 2005 in the Superior Court on plaintiffs' request for a declaratory judgment.[2] The plaintiffs, to support their contention that the exemption found in the LHMA is arbitrary, relied on certain exhibits. The plaintiffs first submitted a letter from Dr. David R. Gifford, director of the Rhode Island Department of Health (DOH) to Representative Joseph A. Trillo, who served on the legislative commission that studied the LHMA in 2005. Accompanying the letter was a summary of data about childhood lead poisonings in 2004. According to this data, 175 children were significantly poisoned that year and, of those, 129 poisonings resulted in a property inspection. Of those 129 inspections, sixty-three were identified either as "owner-occupied" or "possibly owner-occupied" buildings and sixty-four involved non-owner-occupied buildings. There was insufficient data to categorize the remaining two properties. The plaintiffs also introduced an affidavit from Eben Dowell, an urban information specialist, who studied the DOH blood lead testing records from 1998 to 2002 for children seventy-two months old or younger living in multifamily properties in Providence. In his affidavit, Dowell concluded that "the occurrence of *592 elevated blood levels was related to the rate of owner-occupancy." Dowell's study revealed that of the properties in which at least one child had been found with a blood lead level of at least ten micrograms per deciliter, 59 percent were not owner-occupied. This percentage increases, according to Dowell's study, with a larger number of children poisoned. For example, of the properties in which at least two children were poisoned, 63 percent were not owner-occupied, and of the properties in which at least three children were poisoned, 69 percent were not owner-occupied. Dowell's study also reported that the percentage of non-owner-occupied properties was higher for more severely poisoned children. For example, of the properties in which one child had been found with a blood lead level of at least twenty micrograms per deciliter, 63 percent were not owner-occupied. This percentage also increased with a larger number of children poisoned. Of the properties in which two children were poisoned, 69 percent were not owner-occupied and of the properties in which three children were poisoned, 71 percent were not owner-occupied. The plaintiffs additionally submitted affidavits of Stephen Mackie and Joe Sousa, both of whom are plaintiffs in this action, saying that they were harmed by the LHMA's requirements as owners of rental properties in which they do not reside. Lastly, plaintiffs submitted printouts of the Housing Resource Commission website, which addressed frequently asked questions about the LHMA. For their part, defendants countered plaintiffs' exhibits with a number of their own. The defendants first introduced the minutes of five meetings conducted by the Special Legislative Commission to Study the Lead Hazard Mitigation Law. The minutes included updates on the LHMA's implementation and recorded statements from a public meeting at which a number of individuals expressed their favor and disfavor with the law. Additionally, in an effort to refute statistics set forth by plaintiffs, defendants offered as exhibits affidavits from a number of professionals who indicated that plaintiffs' complaint cited data that was based solely on the 129 cases of significantly lead-poisoned children and did not reflect the more accurate number of total childhood lead poisonings in 2004. Susan Bodington, deputy director of programs for Rhode Island Housing and director of policy at the Rhode Island Housing and Mortgage Finance Corporation, said that 1,461 children entering kindergarten in Rhode Island in 2004 tested positive for elevated blood lead levels, far more than the figure provided in plaintiffs' complaint, which alleged that 129 children tested positive for lead poisoning in 2004. Bodington also explained that "[r]isks of poisonings are reduced in owner[-]occupied buildings because the owners is [sic] on the premises and can visually identify any lead hazards, is [sic] accessible to the tenants if they observe any lead hazards, and because it is in the owner's self interest to maintain a safe and healthy property for themselves and their family." Bodington offered further explanation for the need to differentiate buildings based on the number of units. She noted that rental dwellings in structures with four or more units typically are investment properties and that it was not uncommon to distinguish such properties from buildings with fewer units. She cited, for example, the state fire code, which confers additional requirements on owners of four-unit buildings. In Bodington's opinion, in buildings with more units, "there are increased potential health and safety risks to a greater number of tenants." *593 Daniela Quilliam, an epidemiologist at the DOH, also took issue with the number of childhood lead poisonings plaintiffs cited. According to Quilliam, a total of 1,685 children younger than age six tested positive for lead poisoning in Rhode Island in 2004. Of those, 1,167 were children who were newly poisoned in 2004. The defendants also introduced into evidence an affidavit of Kimberly C. Booth, the president of a health-care consulting firm that provides services to the Lead Clinic at St. Joseph's Hospital. Booth stated that she examined 1,851 case records, of which 48 percent listed the owner's place of residence. Of the 893 properties for which records indicated the owner's address, ninety-five were single-family owner-occupied dwellings, which she excluded from her analysis. With respect to the remaining properties, she found that 62 percent were non-owner-occupied and 38 percent were owner-occupied. According to Booth, the data showed that home repairs required to abate lead hazards in owner-occupied dwellings were not as extensive as repairs required in absentee-owned property. Finally, Booth said that the data she examined revealed that there was a 10 percent higher rate of repeat poisonings for non-owner-occupied properties. An affidavit of Liz Colon, an employee of the Childhood Lead Action Project, also criticized plaintiffs' statistics. Colon faulted plaintiffs for asserting that only 129 children were significantly poisoned in Rhode Island in 2004. Colon explained that such a figure represents only those incidences in which the DOH conducted inspections as part of interventions. Colon also referred to several studies that Brown University students conducted, one of which concluded that "'occupants of dwellings * * * that are non-owner[-]occupied are at an increased risk for lead poisoning.'" In addition to these exhibits, defendants also submitted various affidavits from people who believed the exemptions in the LHMA were reasonable. Kent Ackley, an environmental lead inspector in Rhode Island, said that there is "ample reason for the state to distinguish between [two-] and [three][-]family owner[-]occupied rental dwellings and those that are not owner[-]occupied." Ackley said that it was his professional opinion that "there exists a sound reason for the distinction between owner[-]occupied and non-owner-occupied [two-] and [three][-]unit rental dwellings because when the owner resides in the premises those properties generally receive more attentive maintenance." Ackley also provided justification for distinctions between two- and three-family owner-occupied rental dwellings and four or more family owner-occupied rental dwellings. Ackley explained that maintenance duties in properties with more units are more onerous to the property owner and require a skilled person to make the repairs. He also suggested that owners of four or more family properties have a greater rental revenue stream, thereby increasing property owners' ability to finance any required maintenance. The defendants also presented an affidavit of Robert C. Tommasino, general counsel for the Rhode Island Joint Reinsurance Association. Tommasino said that the LHMA's exemptions are understandable and rational from a property and casualty insurer's perspective. He explained that property insurers often differentiate between commercial and personal residential risks when writing insurance policies based upon the number of units in a dwelling. However, he said that, in the insurance business, the line is drawn at more *594 than four units, rather than more than three, as is drawn in the LHMA. Tommasino also explained that the property insurance industry "has a significant history of claims demonstrating that owner[-]occupied dwellings are less likely to have general liability claims brought and sustained against them than non-owner[-]occupied dwellings." The defendants also found beneficial the affidavit of Dowell submitted by plaintiffs; defendants relied on that same affidavit to support their position. In Dowell's study, he had concluded that "the occurrence of elevated blood lead levels was related to the rate of owner-occupancy." June Tourangeau, a licensed practical nurse and a lead-care coordinator at the Lead Clinic at St. Joseph's Hospital, also submitted an affidavit on defendants' behalf. Tourangeau stated that, based on her experience in visiting the residences of hundreds of lead-poisoned children in Rhode Island, it was her professional opinion that "there are more repeated lead poisonings in homes that are not owner-occupied compared with those where the owner resides in the dwelling." Finally, defendants offered an affidavit from Dr. Patricia A. Nolan, M.D., former director of the DOH, in which she outlined what she perceived as rational bases for differentiating between owner-occupied and non-owner-occupied units. According to Dr. Nolan "[t]he rational basis for differentiating requirements for owner-occupied and non-owner-occupied units with respect to preventing and managing lead hazards include inspection and enforcement experience, the large number of young children living in non-owner-occupied units, and the experience gained from the application of similar standards to Section 8 housing units pursuant to the regulations of the U.S. Department of Health and Urban Development." These nineteen documents were all admitted as full exhibits. At the hearing on plaintiffs' request for a declaratory judgment, plaintiffs' counsel cross-examined Dr. Nolan about assertions in her affidavit. Doctor Nolan testified that the DOH's focus with respect to lead poisoning changed from secondary to primary prevention while she was director. Secondary prevention targeted the environment of children who already had tested positive for lead poisoning, while primary prevention sought to identify lead hazards before a child became poisoned and to encourage owners to make their properties safe. According to Dr. Nolan, the LHMA reflects the state's movement toward primary prevention. Doctor Nolan testified that although the department did not have "studies per se," in the experience of their case managers and lead inspectors, owners who live on the premises tend to respond quicker to lead hazards. She also testified that the risk of lead poisonings increases in larger unit buildings, attributing that increase to the greater number of children living in such properties and the fact that it is more difficult to maintain such larger premises. On January 10, 2006, the trial justice issued a decision declaring § 42-128.1-8(e)(4) unconstitutional, as being violative of the Equal Protection Clause of the Rhode Island Constitution. Mackie v. State of Rhode Island, No. PC 05-5144, 2006 WL 61053, 2006 R.I.Super. Lexis 3, at *26 (R.I.Super.Jan. 10, 2006). The trial justice found that there was "no rational basis for allowing the children who live in these two[-] and three-unit owner-occupied buildings to be at risk while children living in other units enjoy the protections of the Lead Hazard Mitigation Act." Id. at *9, 2006 R.I.Super. Lexis 3 at *25. He further *595 opined that "[t]he children in the owner-occupied two[-] and three-deckers cannot be left to the tender mercies of the building owners while children in other apartments enjoy the salubrious benefits of this remedial legislation." Id. Finally, the trial justice suggested that the statute was inequitable insofar as it imposed financial burdens on non-owner-occupied property owners. Id. at *8-9, 2006 R.I.Super. Lexis 3 at *25-26. But although he ruled that the statute was unconstitutional, the trial justice concluded his written opinion by stating that the court would not enjoin the state from enforcing the statute. Id. at *9, 2006 R.I.Super. Lexis 3 at *26. Instead, he encouraged legislators to "promptly revisit the legislation and remedy the statute's constitutional defects." Id. On January 30, 2006, the trial justice denied the state's motion for entry of final judgment pursuant to Rule 54(b) of the Superior Court rules of Civil Procedure. Thereafter, by order dated March 6, 2006, the trial justice denied the state's motion to stay the decision. On March 14, 2006, the state petitioned this Court for a writ of certiorari, asserting three legal errors and contending that the trial justice's denial of its motion for entry of final judgment made appellate review unavailable through any other process. Accordingly, this Court granted the state's petition, as well as the petitions of amici curiae requesting permission to submit briefs concerning this important issue. II Analysis The state raises three issues for this Court's certiorari review. First and most importantly, the state argues that the trial justice erred by concluding that § 42-128.1-8(e)(4) violates the Rhode Island Constitution. Second, the state contends that the trial justice improperly shifted to the state the burden of proving a rational basis for the challenged classification. Finally, the state takes issue with the trial justice's failure to enter a final judgment pursuant to Rule 54(b), after having ruled that § 42-128.1-8(e)(4) violates the Rhode Island Constitution. A Standard of Review It is well settled that this Court presumes that legislative enactments are valid and constitutional. Mosby v. Devine, 851 A.2d 1031, 1045 (R.I.2004) (citing City of Pawtucket v. Sundlun, 662 A.2d 40, 45 (R.I.1995)). When reviewing a challenge to a statute's constitutionality, this Court exercises the "greatest possible caution." Cherenzia v. Lynch, 847 A.2d 818, 822 (R.I.2004) (quoting Gorham v. Robinson, 57 R.I. 1, 7, 186 A. 832, 837 (1936)). Unless the party challenging the statute's constitutionality can "prove beyond a reasonable doubt that the act violates a specific provision of the constitution or the United States Constitution, this Court will not hold the act unconstitutional." Id. (citing Sundlun, 662 A.2d at 44-45). B Equal Protection The state's primary argument before this Court on certiorari review is that the trial justice erred by declaring that a provision of the LHMA violates the Rhode Island Constitution's guarantee of equal protection under the law. The plaintiffs, however, contend that the LHMA violates the Equal Protection Clause insofar as it discriminates against a class consisting of certain absentee landlords and owners of property with four or more units. *596 In the typical case, this Court is "quite reluctant to reach constitutional issues when there are adequate non-constitutional grounds upon which to base our rulings." State v. Lead Industries Association, Inc., 898 A.2d 1234, 1239 (R.I.2006) (quoting In re Court Order Dated October 22, 2003, 886 A.2d 342, 350 n. 7 (R.I.2005)); see also State v. Berberian, 80 R.I. 444, 445, 98 A.2d 270, 270-71 (1953) (noting that "this [C]ourt will not decide a constitutional question raised on the record when it is clear that the case before it can be decided on another point and that the determination of such question is not indispensably necessary for the disposition of the case"). However, because this Court's resolution of the statute's constitutionality is indispensably necessary for the disposition of this case, we proceed with our analysis of the LHMA's constitutionality. Rhode Island's Equal Protection Clause, article 1, section 2, of the Rhode Island Constitution, forms the basis of plaintiffs' primary claim. Like the corresponding federal guarantee in the Fourteenth Amendment to the United States Constitution, the Equal Protection Clause of the Rhode Island Constitution provides, in relevant part, that no person shall be "denied equal protection of the laws." R.I. Const. art. 1, sec. 2; see also Rhode Island Insurers' Insolvency Fund v. Leviton Manufacturing Co., 716 A.2d 730, 734 (R.I. 1998) (holding that state and federal equal protection guarantees provide similar protections). Nevertheless, this protection "does not `demand that a statute necessarily apply equally to all persons. * * * [Or] require [that] things which are different in fact * * * to be treated in law as though they were the same.'" Kleczek v. Rhode Island Interscholastic League, Inc., 612 A.2d 734, 737 (R.I.1992) (quoting Rinaldi v. Yeager, 384 U.S. 305, 309, 86 S.Ct. 1497, 16 L.Ed.2d 577 (1966)). Indeed, this Court consistently has held that "the Legislature enjoys `a wide scope of discretion in enacting laws that affect some classes of citizens differently from others.'" Cherenzia, 847 A.2d at 823 (quoting Boucher v. Sayeed, 459 A.2d 87, 91 (R.I.1983)). Therefore, not all legislative classifications are impermissible. Id. (citing Kennedy v. State, 654 A.2d 708, 712 (R.I.1995)). Because the challenged statute does not impinge on a fundamental right, nor does it create a suspect classification, this Court will employ a rational basis test to determine whether it violates the Rhode Island Constitution. See id. at 823-25. "Under this analysis, if we can conceive of any reasonable basis to justify the classification, we will uphold the statute as constitutional." Id. at 825 (citing Kennedy, 654 A.2d at 712-13). In conducting such a review, this Court will not "delve into the Legislature's `motives' for passing legislation." Power v. City of Providence, 582 A.2d 895, 903 (R.I.1990). We have held that "[e]ven if the Legislature had a constitutionally improper `motive' when it passed legislation, the legislation would still hold up to rational basis scrutiny if this [C]ourt could find any legitimate objective." Id. (citing In re Advisory Opinion to the House of Representatives, 485 A.2d 550, 552 (R.I.1984)). Furthermore, in conducting this review it is wholly irrelevant whether this Court can rationally conclude that the legislation would resolve a legitimate problem. Rather, the proper inquiry is whether the General Assembly rationally could conclude that the legislation would resolve a legitimate problem. Power, 582 A.2d at 902 (noting that the United States Supreme Court in Weinberger v. Salfi, 422 U.S. 749, 777, 95 S.Ct. 2457, 45 L.Ed.2d 522 (1975) has held that the proper inquiry in an action brought pursuant to the Equal Protection Clause of the United States *597 Constitution is "to determine whether Congress could rationally conclude that its legislation would effectuate a resolution to a legitimate problem"). Indeed, "the Equal Protection Clause is violated `only if the [legislative] classification rests on grounds wholly irrelevant to the achievement of the State's objective. * * * A statutory discrimination will not be set aside if any state of facts reasonably may be conceived to justify it.'" Id. (quoting McGowan v. Maryland, 366 U.S. 420, 425-26, 81 S.Ct. 1101, 6 L.Ed.2d 393 (1961)). In accordance with these standards, a party "attacking the rationality of [a] legislative classification [has] the burden `to negative every conceivable basis which might support it.'" Medeiros v. Vincent, 431 F.3d 25, 32 (1st Cir.2005) (quoting Abdullah v. Commissioner of Ins., 84 F.3d 18, 20 (1st Cir.1996)); see also Rhode Island Insurers' Insolvency Fund, 716 A.2d at 733-34 (noting that the party challenging the constitutionality of a statute bears the burden of proving its unconstitutionality). Turning to the facts of this case, the exemption found in § 42-128.1-8(e)(4) treats differently the owners of two- and three-family properties who live in one of those units from owners who do not live at their rental property or who own rental property with four or more units. Nevertheless, we conclude that such a classification passes constitutional muster because the General Assembly rationally could have concluded that the legislation was one step toward resolving the problem of lead poisoning of children in Rhode Island. Both before the trial justice and now on appeal, the state has offered a plethora of reasons to support the current statutory scheme. Although it was not required to support those reasons with empirical evidence, Medeiros, 431 F.3d at 31, the state provided the trial court with the affidavits of numerous professionals, many of whom identified studies that revealed that owner-occupied properties were less likely to have incidents of childhood lead poisoning than non-owner-occupied properties. These professionals also provided justifications for distinctions made between two- and three-family properties and properties with four or more units. After reviewing the evidence presented, the trial justice concluded that there was "no rational basis for allowing the children who live in these two[-] and three-unit owner-occupied buildings to be at risk while children living in other units enjoy the protections of the Lead Hazard Mitigation Act." Mackie, No. PC 05-5144, 2006 WL 61053 at *9, 2006 R.I.Super. Lexis 3, at *25. Such a statement, however, suggests that the trial justice found the statute to be unconstitutional because it did not protect all children living in rental properties. Although such a solution indeed would be laudable, the proper scope of the trial justice's review was not to consider whether a different solution would better protect children, but rather to decide whether the General Assembly had a rational basis to believe that its chosen solution would remedy a legitimate state problem. After engaging in this inquiry, we are of the opinion that it would be perfectly rational for the General Assembly to have believed that owners who live on the premises are more likely to remedy lead hazards for their own safety and that of their families. Furthermore, legislators rationally could have concluded that owners who live on the premises are more accessible and are, therefore, more likely to be attentive to maintenance duties. Such a belief would be well founded, especially given that the evidence on the record reveals *598 that a higher number of childhood lead poisonings was reported in non-owner-occupied premises than owner-occupied premises. Additionally, the General Assembly rationally could have concluded that properties with four or more units are more difficult to maintain, therefore making it less likely that the owner, whether or not living on the premises, would keep up with such responsibilities. Finally, the General Assembly could have concluded that the number of children who potentially could be poisoned is greater in properties with four or more units simply given that such properties have the potential to house more residents. Admittedly, the current statutory scheme and its exemptions will not eradicate the state's childhood lead poisoning problem with one sweep of the legislative pen. But, we are persuaded that the General Assembly believed that targeting the areas where poisonings are most prevalent is one step toward achieving that end. The First Circuit has made it clear that "a statute or regulation is not lacking in a rational basis simply because it addresses a broader problem in small or incremental stages. * * * It is only necessary that there be some rational relation between the method chosen and the intended result." Medeiros, 431 F.3d at 31-32. We are cognizant that when enacting statutes with such far-reaching goals, the General Assembly must start somewhere. Because plaintiffs have failed to carry their heavy burden of negating every conceivable rational basis that might support the exception set forth in the statute, we conclude that the trial justice erred in ruling that the LHMA's exemptions were unconstitutional.[3] Finally, this Court expresses its appreciation for the assistance of briefs submitted by amici curiae, which helped the Court prepare for oral argument and in its decision-making process. Conclusion For the foregoing reasons we reverse the decision of the Superior Court and remand this case for entry of final judgment in accordance with this opinion. Justice GOLDBERG did not participate. NOTES [1] An unrelated lead paint public nuisance action was the first to raise public awareness of the prevalence of childhood lead poisoning in Rhode Island and occasioned the longest civil jury trial in the state's history. See State of Rhode Island v. Lead Industries Association, Inc., No. PC 99-5226, 2007 R.I.Super. Lexis 32 (R.I.Super.Feb. 26, 2007); see also Peter B. Lord, Jurors in Lead-Paint Trial Say They're Proud of Verdict, The Providence Journal, Mar. 12, 2006, at B1 (noting that "court officials believe [the lead paint trial] was the longest civil trial in state history"). [2] Although this hearing was originally scheduled to consider plaintiffs' motion for a preliminary injunction, the trial justice found it more appropriate to focus on plaintiffs' request for a declaratory judgment. [3] Although the analysis set forth herein obviates the need for this Court to address the state's contention that the trial justice erred by not entering final judgment in this matter, we pause to note our concern with the trial justice's refusal to enter final judgment. This, coupled with the trial justice's refusal to restrain the implementation of legislation that he found unconstitutional, left the parties in legal limbo. The Rhode Island Constitution vests this Court with "final revisory and appellate jurisdiction upon all questions of law and equity." R.I. Const. art. 10, sec. 2. By refusing to enter final judgment, the trial justice, in effect, circumvented this Court's constitutionally vested jurisdiction by preventing an aggrieved party from appealing his decision to this Court. We cannot sanction such judicial action, which could burden litigants by requiring them to petition this Court for a writ of certiorari to obtain appellate review.
Mid
[ 0.5907990314769971, 30.5, 21.125 ]
[Uterine multiple node fibromyomatosis associated with an asymptomatic leiomyoma of the small intestine]. Benign small bowel tumours are rare, often asymptomatic and are founded incidentally at surgery or post mortem examination. In about 70% patients with benign small bowel tumour were reported to have associated benign or malignant tumours of other districts. The Authors report a case of leiomyoma of the small intestine associated with multinodular leiofibromyomatosis of the uterus.
Mid
[ 0.5920398009950241, 29.75, 20.5 ]
Q: Compare dictionaries in python dict1 = { key1: value1, key2: value2, key3: value3 } dict2 = { key1: value1, key4: value4, key3: value2 } fdict = {} when I compare the above two dictionaries, I want to store key1: value1 to fdict dictionary: my attempt: for key in dict1.keys(): if key in dict2.keys(): if dict1[key] == dict2[key]: fdict[key] == dict1[key] I am having "key error" when I tried above method.. any suggestions? A: Well, for one, you get KeyError because you try to look up keys which don't exist in both dicionaries. It sounds to me like you want to compute an intersection of two dictionaries. In such case, it's enough to: >>> a = dict(a=1, b=2, c=3) >>> b = dict(b=2, c=3, d=4) >>> dict(a.items() & b.items()) {'c': 3, 'b': 2}
Mid
[ 0.591111111111111, 33.25, 23 ]
Non-linear associations between sleep duration and the risks of mild cognitive impairment/dementia and cognitive decline: a dose-response meta-analysis of observational studies. Mount evidence from observational studies suggested that associations between sleep duration and the risks of mild cognitive impairment (MCI)/dementia or cognitive decline had been recognized. To explore the precise and continuous effect of sleep duration on these risks, we conducted a dose-response meta-analysis to quantitatively assess it. Five prospective cohort studies and 4 cross-sectional studies were eligible for inclusion criteria, which involved 62937 individuals, and documented 2718 MCI/dementia cases and 5596 cognitive decline cases. The pooled RR per 1 h increases in sleep duration was 0.99 (95% CI 0.97-1.01, I2 = 62.40%, P = 0.02, n = 6) for cognitive decline risk, and 0.98 (95% CI 0.97-1.00, I2 = 0%, P = 0.42, n = 4) for MCI/dementia risk. Similar U-shaped non-linear relationship of sleep duration and the risks of MCI/dementia and cognitive decline was revealed, respectively (all Pnon-linearity < 0.001), whose peaks are approximately 7 h. In conclusion, 7 h sleep duration tends to acquire the least risk of MCI/dementia or cognitive decline; however, more well-designed randomized controlled trials are urgently needed to balance potential modifiers.
Mid
[ 0.646511627906976, 34.75, 19 ]
Ralph Charles Ralph Charles (born 5 February 1943) is an English amateur welterweight and professional light welter/welter/light middle/middleweight boxer of the 1960s and '70s who as an amateur won the Amateur Boxing Association of England (ABAE) 1959 Junior Class-A title against Kenneth "Ken"/"Kenny" J. Cooper (Warley ABC), boxing out of West Ham Boys & ABC, won the Amateur Boxing Association of England (ABAE) 1960 Junior Class-B title against J. Harwood (National Association of Boys Clubs), boxing out of West Ham Boys & ABC, and was runner-up for the 1963 Amateur Boxing Association of England welterweight title, against Johnny Pritchett (Bingham & District ABC), boxing out of West Ham ABC, and as a professional won the British Boxing Board of Control (BBBofC) Southern Area welterweight title, BBBofC British welterweight title, European Boxing Union (EBU) welterweight title, and Commonwealth welterweight title, and was a challenger for the World Boxing Council (WBC) welterweight title, and World Boxing Association (WBA) World welterweight title against José Nápoles, his professional fighting weight varied from , i.e. light welterweight to , i.e. middleweight. References External links Image - Ralph Charles Category:1943 births Category:English male boxers Category:Middleweight boxers Category:Light-middleweight boxers Category:Light-welterweight boxers Category:Living people Category:Place of birth missing (living people) Category:Boxers from Greater London Category:Welterweight boxers
High
[ 0.6784140969162991, 28.875, 13.6875 ]
Tibaná Tibaná is a town and municipality in the Colombian Department of Boyacá, part of the subregion of Márquez Province. The urban centre of Tibaná is situated on the Altiplano Cundiboyacense at an altitude of and a distance of from the department capital Tunja. It borders Jenesano in the north, Ramiriquí and Chinavita in the east, Chinavita and Úmbita in the south and in the west Turmequé and Nuevo Colón. Etymology Tibaná is named after the Tibanaes, a Chibcha-speaking tribe of the Muisca. Tiba means "chief". History The area around Tibaná was part of the Muisca Confederation and loyal to the zaque of Hunza. Modern Tibaná was founded early in the Spanish conquest; on October 12, 1537 Spanish conquistador Gonzalo Jiménez de Quesada established the village. Economy Main economical activity of Tibaná is horticulture (deciduous trees) and agriculture (potatoes). Mining is restricted to small-scale operations, mainly coal, gravel and clay. References Category:Municipalities of Boyacá Department Category:Populated places in the Boyacá Department Category:Populated places established in 1537 Category:1537 establishments in the Spanish Empire Category:1537 disestablishments in the Muisca Confederation Category:Muysccubun
Mid
[ 0.5560439560439561, 31.625, 25.25 ]
Q: What is the scope of Self? I am asking to advance my understanding of Self. Please consider the following: type PTestObject = ^TTestObject; TTestObject = class(TObject) private FCaption : String; public procedure MakeThePointer; property Caption : String read FCaption write FCaption; end; TForm4 = class(TForm) ButtonFirst: TButton; ButtonSecond: TButton; ButtonThird: TButton; procedure ButtonFirstClick(Sender: TObject); procedure ButtonSecondClick(Sender: TObject); procedure ButtonThirdClick(Sender: TObject); private public end; var Form4: TForm4; PointerOfTest : PTestObject; TestObj : TTestObject; implementation {$R *.dfm} procedure TTestObject.MakeThePointer; begin PointerOfTest := @Self; end; procedure TForm4.ButtonFirstClick(Sender: TObject); begin TestObj := TTestObject.Create; TestObj.Caption := 'Hello'; TestObj.MakeThePointer; end; procedure TForm4.ButtonSecondClick(Sender: TObject); begin TestObj.MakeThePointer; ShowMessage(PointerOfTest^.Caption); end; procedure TForm4.ButtonThirdClick(Sender: TObject); begin // TestObj.MakeThePointer; - Because I do not do this I get Access Violation ShowMessage(PointerOfTest^.Caption); end; The idea is to create a pointer to TestObj's Self and then later access it again. If I call MakeThePointer in the same Click event (ButtonSecondClick) where I access that pointer it works fine. If I do not call MakeThePointer before accessing the pointer (ButtonThirdClick) then it seems that TestObj's Self does not exist in such a way that the previously created pointer is valid and I get an Access Violation. Please correct me if I am wrong but I assume that Self is a variable local to each of the object's methods. Thus it will have scope only for each of that methods separately? Now consider this... If that is the case then why does the following work if ButtonFirst is clicked, then ButtonSecond? It seems that the Self variable has landed on the same address thus allowing the following to work. May I assume that the Self variable will always be on the same address or will it change? type TFormOther = class(TForm) ButtonFirst: TButton; ButtonSecond: TButton; procedure ButtonFirstClick(Sender: TObject); procedure ButtonSecondClick(Sender: TObject); private public procedure MakeThePointer; procedure SetTheCaption; end; var FormOther: TFormOther; PointerOfForm : ^TForm; implementation {$R *.dfm} procedure TFormOther.MakeThePointer; begin PointerOfForm := @Self; end; procedure TFormOther.SetTheCaption; begin PointerOfForm^.Caption := 'Hello'; end; procedure TFormOther.ButtonFirstClick(Sender: TObject); begin MakeThePointer; end; procedure TFormOther.ButtonSecondClick(Sender: TObject); begin SetTheCaption; end; A: What is the scope of Self? In a method Self is best thought of as a local variable. Its address, @Self, is therefore valid until the method returns. This explains why your code fails. Your code dereferences the pointer after the method has returned, by which point the pointer is not valid. May I assume that the Self variable will always be on the same address? No you may not. I think your problems start here: type PTestObject = ^TTestObject; Because TTestObject is a class, a variable of type TTestObject, such as your Self, is a reference. A reference is a fancy name for a pointer. In this case, your Self, inside methods of TTestObject is a pointer to the instance. So use TTestObject instead of ^TTestObject and your problems dissolve.
Mid
[ 0.578034682080924, 25, 18.25 ]
Synopsis On the battlefield, a soldier's best friends are his gun and his gear—because his life depends on them. But what will it take to fight and survive on the battlefields of tomorrow? What will those combat arenas consist of, and where will they be? And what will our nation's fighting men and women carry with them into battle? Future Weapons is a compendium of the weapons of war that may accompany our soldiers in the near and far future, as well as an insightful look at the soldier, sailor, and airman of today and tomorrow. All manner of military hardware is covered, as well as information about cutting-edge technology that will become standard in weapons to come, the possibility of robotic soldiers, vehicles, protective armor, and the prospects of fighting a war in both space and cyberspace. Buy the eBook List Price $24.80 AUD Price: $19.90 AUD Get $5 off (Save on your first purchase worth $5.01 or more) You are in the Australia store Not in Australia? Choose your country's store to see books available for purchase.
Mid
[ 0.552268244575936, 35, 28.375 ]
Love & Death: Bitten Mac OSGames Damon, a dark, handsome vampire cursed by an evil vampire queen, meets Victoria, a curious, young woman determined to save her village. After their chance meeting, each discovers the other can help overcome these dire circumstances. In Love & Death: Bitten, a Hidden Object Adventure, you’ll play as Victoria by day and Damon by night, solving unique puzzles, collecting and combining hidden items and unlocking secret passages. Will Damon and Victoria’s story end in love….or death? • Unique, dual-character gameplay allows you to play one character in the day and another character at night • Over 30 locations to explore• 9 unique puzzles
Mid
[ 0.6491646778042961, 34, 18.375 ]
Q: Difference between LINQ Queries & Lambda expression Why to use lambda expression when we have LINQ queries just to shorten the length of code , increase the speed of development or is there any other reason which can only be achieved by Lambda expression & not by LINQ queries. A: Query expressions only cover a small subset of the LINQ operators, and are only applicable when you have the actual expression involved to hand, rather than (say) having a Func<T, bool> to act as the predicate, in which case things become ugly. So instead of writing: Func<Foo, bool> predicate = ...; // Get predicate from somewhere var query = from x in collection where predicate(x) select x; I'd much rather write: Func<Foo, bool> predicate = ...; // Get predicate from somewhere var query = collection.Where(predicate); There are various other cases where using non-query expression syntax is simpler, particularly if your query only uses a single operator. Query expressions are effectively translated into non-query expressions, so anything you can do in query expressions can be expressed in non-query expressions. Use query expressions where they make the code simpler and more readable; don't use them where they don't. I have more information about how query expressions work in a blog post that you may be interested in. A: any other reason which can only be achieved by Lambda expression & not by LINQ queries. There are some LINQ extension methods which do not have counterparts in LINQ query expressions, and will require the use of Lambda Expressions. A good example is Enumerable.ToLookup - if you want to create an ILookup, you need to use lambdas to generate this.
High
[ 0.679334916864608, 35.75, 16.875 ]
Getty Images First, it was Steve Nash, Derrick Rose, Marc Gasol and Kobe Bryant. Then, it was Brook Lopez earlier this week. And on Friday, there were two more big names in the NBA who sustained long-term injuries, Russell Westbrook and Al Horford. But even if it feels like a historic season of players going down for long stretches—not including role players such as Raymond Felton (strained hamstring) and Michael Kidd-Gilchrist (broken hand)—the number of these injuries has not been out of the ordinary, according to the NBA. A league spokesperson told Bleacher Report on Saturday that a preliminary analysis of "significant" injuries, defined as those forcing a player to miss 10 or more games, shows that they are trending at a similar rate compared to the last five seasons through roughly the first two months of play. When several superstars go down, such as Rose, Bryant and Westbrook, it can give the impression that things are worse than they really are. The spokesperson said that the league didn't track injuries as closely before 2008 and that it doesn't have detailed data available as far back as 2000. Given that limited range, the league pointed to 2010-11 as being one of the biggest seasons for significant injuries. There was Andrew Bynum (meniscus tear in right knee), Yao Ming (stress fracture in left ankle), Joakim Noah (torn ulna collateral ligament in right thumb), Shaquille O'Neal (right leg injuries), Brandon Roy (both leg injuries), Anderson Varejao (torn tendon in right ankle) and David West (ACL tear in left knee). The season before that was also noteworthy, as these marquee players were sidelined: Blake Griffin (stress fracture in left knee), Tracy McGrady (microfracture surgery on left knee), Yao Ming (broken bone in left foot) and Michael Redd (ACL and MCL re-tears in left knee). The league spokesperson also disputed recent reports that suggest ACL tears are on the rise, saying the league's averaged about 4.5 per season over the past seven years, with no more than five in a year and no less than three. Trainers' Perspective on Injury Prevention While there has been no significant difference in the number of major injuries this season, there are still deficiencies in the NBA training world, according to four experts in the field—trainers Ed Downs, Keith Veney and Micah Lancaster and Suns physical therapist Dr. Mike Clark. For starters, Veney and Lancaster believe some of the players' injuries stem from their AAU days, as their summers—when some relaxation should be encouraged—have become much more competitive hoops with more travel across the country. Ned Dishman/Getty Images "They are playing too much basketball as a youth," said Veney, who's also a shooting specialist and has worked with Dirk Nowitzki, Paul Pierce, Kemba Walker, Brandon Jennings and others while hosting camps across the country. "Way too much AAU basketball." "I agree," said Lancaster, who has worked with more than 15 NBA players, including Dwyane Wade, Kyrie Irving and Evan Turner. "The whole AAU movement has guys putting so much wear and tear on their bodies at earlier ages." Once they get to the NBA, Veney said "many" players don't do enough training; he suggested more than 50 percent of guys in the league don't go hard in the offseason or practice wrong techniques. Increased global travel and more off-the-court opportunities have been bigger distractions. "How are you in the NBA for 10 years and can't shoot for an NBA player and you're overweight?" he said. "Many of them don't care enough about basketball when they're getting millions. They don't take advantage of all the things they have available to get better." Downs said a good number of players simply play pickup basketball in the summer and then wait until training camp to get into real game shape; therefore, they can be playing catch up with their bodies. To that point, Lancaster said many development coaches on NBA teams these days are former players who don't have a high respect for quality training. "They think that players are more so naturals that need to run through the normal fundamentals and shot reps," he said. "Then there are the new emerging trainers that rely on innovation and believe that training can be a ton of more effective and efficient workouts. The NBA is at a very interesting time right now." Among the players that do care, Lancaster believes an increased number are training inadequately during the offseason. He said because there is more of an emphasis on "staying healthy rather than staying healthy and improving," more guys are turning to "repetition-based maintenance training" to help preserve their health and prolong their careers. The workouts involve slow-paced spot shooting for hours at a time—for example, taking 1,000 jumpers per day. Lancaster said that style of training—which is high-rep, low-impact-based—can lead to more consistent injuries because the decrease in speed and intensity of the workouts can make it "a shock to their bodies when they return to fast and intense action." "I know so many NBA trainers who train the maintenance way, and I cringe. I also completely understand why players get sucked into a maintenance approach; they feel it's safer for their careers," he said. "But I think it's actually more of a health risk, and they don't see the improvements to their game year after year—like Kobe, LeBron (James) and (Kevin) Durant experience. That's because they have very intense training styles and have stayed healthy for the majority of their careers—same with (Kevin) Garnett and (Paul) Pierce." Nathaniel S. Butler/Getty Images Lancaster's approach is designing condensed training sessions that resemble game simulation through dynamic and difficult drills, but it doesn't wear the players' bodies down because of the shorter time on the court. He said his clients have stayed "pretty healthy" because they have utilized his techniques throughout the year. He provides useful training tools to help maintain their focus. "I train using tools that help simulate the game, and I think lower reps and higher intensity are key," he said. "I have med balls for contact and game resistance, rip cones that force lower hips on the drive and other tools that are designed to simulate realistic game movements. That way, players can train like they have a trainer all the time. Once players learn how to use those tools to simulate game-like action, they can train with that kind of intensity all year round." Downs, who has worked with Wade, James and Chris Bosh and more than 10 All-Stars, said while maintenance work is helpful during the season, he agreed with Lancaster in that players "need reps, high intensity in the summer." He also said because NBA players test multiple athletic attributes to the limit consistently—running, changing directions, jumping and banging, especially during a three-to-five-game-a-week schedule, unlike many other pro sports—they need "almost every system of training to be effective throughout a long, arduous season." "There are different levels of training that should be done by an NBA player versus other athletes," Downs said. "They are arguably the most athletic athlete because of explosive power, and different aerobic and anaerobic fitness, and they need systems to be prepared for all of that. So there are times they need high intensity with high reps versus low intensity with low power reps." Downs said he sees way too much improper training in the NBA nowadays, and a lot of it stems from too focused muscle-gain regimens such as CrossFit. He said maintaining build in strength programs is more critical. He's even heard of NBA wives getting their husbands into CrossFit, but explained the workouts are not designed for pro-level basketball players. "It's great, quick 20 minutes of work—get in and get out—but it's risk of injury and the way it sets you up for them is tremendous," he said. "Studies have shown that CrossFit has its benefits, but not for the typical NBA guy. It causes too many imbalances, which in turn causes overcompensation issues. Then you put too many minutes on top of that, and a disaster waiting to happen." Downs stressed that NBA players should not be going for the NFL tight end look, which has become a far too common trend. He made it clear there is only one LeBron in the league. "There are a lot of skinny dudes that are bad as hell on the court, built for endurance and speed versus a big tight end," he said. "And to clarify the tight end comparison, LeBron James does not count. I don't know where the hell he came from, but he is a freak of nature if there has ever been one. I think his ancestors lived on Mount Olympus. Within minutes, he adapts to advanced functional movement balance exercises that a Cirque du Soleil performer would find challenging." Rocky Widner/Getty Images Besides James' unique biological makeup, there is an underrated element of his training that more players can follow: his detailed stretching and recovery routines for maintenance. He goes through a half hour of stretching before every workout, and every minute pregame and postgame, he's doing something with a purpose to peak just for the start of the game or to prepare for the next one, respectively. Then on off days, he has an entire recovery process with hyperbaric chambers. He pours in hours focusing not even on lifting or drilling—just on maintenance. Post-playing recovery speaks to a larger issue, according to Dr. Clark, who is a leading member of the Suns' highly praised training staff. He said it's an important, overlooked area that could help players not only play longer minutes, but also remain healthier throughout the season. "Everybody could do a much better job on recovery, and recovery is your nutrition," he said. "When you're done with practice or a game or training, you have a 30-minute window opportunity where you can take a sports protein shake. Your body can recover nutritionally very, very quickly, but most athletes don't like that. They just want to get out, practice, shower up and get out of there. "Also, a lot of guys don't hydrate themselves enough after practice, training or a game. Once you start to become dehydrated, that affects your tissue, flexibility, it affects your recovery, all that stuff. A lot of guys don't go through and re-lengthen their muscles that just got short by either training, practice or the game, so they don't stretch. While a lot of guys are pretty good about icing their knees—getting into the cryotub, sauna, whatever—most guys do not do enough flexibility and tissue laceration at the end of the session." No matter what, as Downs and Lancaster made sure to address, no type of training can duplicate real-time game action and unexpected movements. Therefore, occasionally injuries are bound to happen, and fans need to face that reality. "It's difficult to simulate the exact torque and explosiveness in training; the game is too far separated," Lancaster said. "Sweating through hard work and actually simulating the game can be very different beasts—the speed, the reactions, the unexpected and isolated bumps. Getting your hips and shoulders to game realistic levels are tough to simulate in training, and even in offseason game play." Overall, better precautions can be taken: more sufficient training, not rushing back from injury, increased research on trainers and better collaboration between team doctors and individual trainers, so the players' medical histories are always factored into workout planning. Downs and Lancaster also pointed to sitting out one to two games per week for older players, if necessary, to improve their longevity. Both trainers called the protective rest "the new strategy" in the league, which the Spurs and Heat have made popular recently. "That's why you see how the Heat are being smart sitting D-Wade at times for his body, to build it throughout the season versus the first 10 games," Downs said. While some fans might be turned off to the idea of Wade playing one night and then sitting the next, his stats (20.0 points, 5.0 assists, 4.8 rebounds and 2.1 steals per game while shooting a career-high 54.7 percent from the field), and the Heat's record (22-7), tell a story of where the Heat want to be—and will likely be—at the end of April entering the playoffs. by then, they should still be the team to beat. Jared Zwerling covers the NBA for Bleacher Report. Follow him on Twitter and Instagram.
Low
[ 0.527472527472527, 30, 26.875 ]
Survey of orbital tumors at a comprehensive cancer center in the United States. The purpose of this study was to evaluate the frequencies of various types of orbital lesions seen at a comprehensive cancer center in the United States. In this retrospective case series, we reviewed the medical records of 268 consecutive patients referred to our orbital oncology service for evaluation of an orbital mass between November 1998 and February 2009. Each orbital lesion was documented by CT and/or MRI, and in most cases diagnosis was established with a tissue biopsy. Patients who were seen for second opinions and had inadequate follow-up data were excluded, as were patients with thyroid eye disease or orbital hemorrhage. The study included 134 men and 134 women aged 1 to 89 years at diagnosis (median, 55 years). Follow-up ranged from 0.06 to 192 months (median, 15 months). Of the tumors, 171 (64%) were primary orbital, 69 (26%) were secondary orbital, and 28 (10%) were metastatic tumors. Lesion types were as follows: secondary orbital tumors, 69 (26%); lymphoproliferative lesions, 68 (25%); metastases, 28 (10%); epithelial lacrimal gland tumors, 27 (10%); inflammatory conditions, 21 (8%); vascular lesions, 20 (7%); mesenchymal tumors, 18 (7%); optic nerve and nerve sheath tumors, 7 (3%); peripheral nerve tumors, 3 (1%); histiocytic lesions, 3 (1%); cystic lesions, 3 (1%); and other lesions, 1 (<1%). The most common histopathologic diagnoses were lymphoma, 50 cases (19%); orbital extension of sinus tumor, 25 (9%); lacrimal gland adenoid cystic carcinoma, 18 (7%); cavernous hemangioma, 15 (6%); orbital extension of brain tumor, 14 (5%); idiopathic orbital inflammation, 14 (5%); plasmacytoma, 8 (3%); reactive lymphoid hyperplasia, 7 (3%); metastatic breast cancer, 7 (3%); orbital extension of ocular adnexal basal cell carcinoma, 7 (3%); orbital extension of ocular adnexal melanoma, 6 (2%), rhabdomyosarcoma, 6 (2%); metastatic gastrointestinal cancer, 5 (2%); sarcoidosis, 5 (2%); and other less common lesions. Forty-two lesions (16%) were intraconal, and 226 (84%) were extraconal. There were 169 (63%) malignant tumors and 99 (37%) were benign tumors. The rate of malignant lesions was 65% in children and 63% in adults (≥18 years). Malignant conditions encountered at a higher rate than previously reported included lymphoma (19% vs 8% to 13%), secondary orbital tumors (26% vs 13% to 20%), orbital metastases (10% vs 2% to 7%), and malignant epithelial lacrimal gland tumors (9% vs 2% to 3%). Our findings highlight the distinctive nature of the orbital oncology experience at a comprehensive cancer center. We found higher than previously reported rates of malignant tumors (63% of all tumors), particularly secondary tumors, malignant epithelial lacrimal gland tumors, and orbital metastases.
High
[ 0.683046683046683, 34.75, 16.125 ]
Co-dependent or Selfless? This post was first shared here on the Biblical Counseling Coalition blog in 2012. Co-dependent or Selfless? Therefore if there is any encouragement in Christ, if there is any consolation of love, if there is any fellowship of the Spirit, if any affection and compassion, make my joy complete by being of the same mind, maintaining the same love, united in spirit, intent on one purpose. Do nothing from selfishness or empty conceit, but with humility of mind regard one another as more important than yourselves; do not merely look out for your own personal interests, but also for the interests of others. Have this attitude in yourselves which was also in Christ Jesus… Phil. 2:1-5 (NASB) In the mid-1980’s the term “co-dependency” began to be used in various self-help groups to describe behavior patterns in people who were in relationships with self- destructive people. Typically, their spouses or family members were addicts or alcoholics who were irresponsible and the “co-dependent” stepped in to shield them from consequences or had been protecting them from harm. I do not think it is godly to shield someone from the consequences of their actions; a person who is involved in sinful behaviors needs to repent and change for the glory of God! I also agree that some people can take “love” too far and become idolaters of others. These people too need a balanced view of what loving one another looks like. Ed Welch calls co-dependency behaviors “fear of man” in his books (When People are Big and God is Small and What Do You Think of Me? Why Do I Care?) I agree with his conclusions on the matter. There are people, more women than men who desire the approval of others so deeply that they are willing to sin to get it. My concern is centered on the thinking that includes the biblical roles of mothers and wives as being “co-dependent.” The balanced view will always be found in Scripture, and for the Christian that is our ultimate authority. Oneness is not co-dependency Then the LORD God said, “It is not good for the man to be alone; I will make him a helper suitable for him.” Genesis 2:18 (NASB) Adam found that he was incomplete without a woman. God created the woman as the only suitable helper for a man, she is his counterpart. Man and woman are biblically designed to meet each other’s legitimate needs and to address the physical deficits in one another. The Bible says that two individuals become one in marriage; one in the most intimate physical sense and one in several other ways as well. Very often in marriage, husband and wife are so well connected and in tune with each other that they often know each other’s thoughts, beliefs, and desires. For instance, I can always tell when my husband has something troubling on his mind. I am so aware of his movements and characteristics that I can tell when something is amiss. When I hurt, he hurts; when he rejoices I rejoice too! We share a connectedness that goes beyond sharing a home and a bed; we are literally soul mates. This is not unusual for a couple who has been married for a number of years. They are one in heart and soul, especially when they share a love of Christ through salvation. They can anticipate each other’s needs and actively work to place the other before themselves. When children come along the family dynamic changes as both mother and father now include the needs and desires of the little ones along with those of their spouse. The greater share is taken by the wife and mother as she is the primary caregiver in the traditional family. She sets herself aside for the well-being of her child. Mothers are considered to be the nurturing parent and she is usually more in tune with the cries of the baby and the “language” of the toddler. I think because of the unique physical relationship we share with our children as we provide food and shelter for them within our bodies we have a God-given understanding of them from even before they are born. Mothers will say they are aware of what the baby’s cries mean, what a certain gesture means, or a facial expression is communicating. I am thankful that many Christian women have returned to the home and are fulfilling the biblical mandate of Titus 2:3-5: Older women likewise are to be reverent in their behavior, not malicious gossips nor enslaved to much wine, teaching what is good, so that they may encourage the young women to love their husbands, to love their children, to be sensible, pure, workers at home, kind, being subject to their own husbands, so that the word of God will not be dishonored. (NASB) What is concerning to me is how these God-honoring attitudes and actions are being labeled as co-dependent and how women are being discouraged from a life of serving others in the name of “mental health!” I maintain that it is simply living the gospel to be selfless and to put others before self. In so doing, we are following the example of Christ and the other heroes of our faith who lived and died for the benefit of other people. There can be no higher calling than that. Join the conversation Is this yet another attack on biblical principles and the roles of women from those who would discount the Bible as relevant and applicable in today’s world? What do you think? Let's Keep in Touch! Subscribe to get our latest content by email. Never miss out on a special offer or opportunity! About The Author Julie Ganschow has been involved in Biblical Counseling and Discipleship for more than 20 years. She is passionate about heart change for life change. Julie is a gifted counselor and teacher, has authored numerous books and materials for biblical counseling, and co-authored a biblical counseling training course. She is a featured contributor in GriefShare and a frequent retreat and conference speaker. She is the founder and Director of Reigning Grace Counseling Center and Biblical Counseling for Women. She has been writing a daily blog on women’s counseling issues since 2008. She holds an M.A. in Biblical Counseling, in addition to certification with the Association of Certified Biblical Counselors (ACBC) and the International Association of Biblical Counselors (IABC). She also serves on the Counsel Board for the Biblical Counseling Coalition She makes her home in Kansas City, Missouri with her wonderful husband Larry. You can find her blog at bc4women.org and information about her ministries at rgcconline.org, and biblicacounselingforwomen.org Related Posts 1 Comment Cindyl on 11/07/2017 at 8:28 pm I have thought about this a lot because I have been in recovery for being codependent & see where you are coming from and loved what you had to say. From what I have been thinking is that codependent and selfless are 2 different things. And do not think it is an attack… I think men and women need to know when they are codependent- as everyone does have some codependent tendencies in them, not to say they are codependent. Codependency is not having healthy boundaries or a healthy self view. People pleasing to the extreme. Probably raised in an abusive or controlling home. And do not know how to love themselves. As the Bible says- love your neighbor as you love yourself. And I just heard today from a lady which I loved and will share… she said- we can’t give what we don’t have. We have to fill our cups and the overflow is for others, but whats in the cup is for ourselves. I agreed with that, because being codependent- you leave nothing for yourself. No thoughts, no nothing. All resources are depleted and you have nothing left to give. And thats not healthy. Codependent is not being selfless- because codependent is a sate of mind where you are worthless. While being selfless is being confident and extending that out to others when prompted. Its having boundaries because you know your worth and value. New Course Available! Reaching the Heart of Your Teen Free Mp3 download by Larry & Julie Ganschow Success! Enjoy your free audio recording from the Counter Culture Conference when you confirm your subscription in your email account . You may find more content that you will enjoy at www.bc4women.org and www.rgcconline.org.
Mid
[ 0.567441860465116, 30.5, 23.25 ]
Incorporation of NLR into NIH stratification system increases predictive accuracy for surgically resected gastrointestinal stromal tumors. Previous studies have reported that preoperative neutrophil-to-lymphocyte (NLR) and platelet-to-lymphocyte ratios were prognostic for various types of cancers. The aim of this study was to investigate the predictive utilities of preoperative peripheral blood counts in patients with gastrointestinal stromal tumors (GISTs). We enrolled 510 consecutive, previously untreated patients who underwent surgery for primary, localized GISTs. The relationship between recurrence-free survival and outcome variables was assessed by univariate and multivariate analyses, while the clinicopathologic relevance of NLR was determined using the Chi-square test. A preoperative NLR ≥2 was associated with poor prognosis in patients undergoing surgeries for primary, localized GISTs. It was an independent predictor only in patients classified as National Institutes of Health high risk but not in the entire population. Preoperative NLR is a feasible and reproducible peripheral biomarker that helps identify patients for intensive adjuvant therapy and frequent surveillance.
High
[ 0.6783042394014961, 34, 16.125 ]
Okay, so, I was trying to figure out when the next new House would show. I ended up finding a summary for it, which made me go OMGWTF. "While the staff tries to diagnose a woman suffering from uncontrollable muscle flailing and crashes her car, House and Stacy try to resolve their relationship issues once and for all. Cameron refuses to get the results of her HIV test." So, uh, that's how this happened. niqaeli: ...zomg. They didn't drop the plotline entirely! TV.com's summary for Need to Know: "While the staff tries to diagnose a woman suffering from uncontrollable muscle flailing and crashes her car, House and Stacy try to resolve their relationship issues once and for all. Cameron refuses to get the results of her HIV test." jmtorres: *eyeroll* niqaeli: Yeah, what did you expect? jmtorres: cameron, you dumbfuck niqaeli: But yu know what would be beautiful? If Cam refused but Chase got his and was positive. jmtorres: HA niqaeli: And he's like, "No, really you need to go get those results RIGHT NOW." niqaeli: House: *blink* Why do you care so much about Cameron being a moron? Unless... niqaeli: Chase: *glare* niqaeli: House: Well, crap. niqaeli: Wilson: What did I miss? jmtorres: House: *starts hitting on Foreman* Foreman: WTF, man? House: You're the only safe one left. Foreman: ... House: Who saw that coming? It's so statistically unlikely! Foreman: Oh, screw *you.* House: My point exactly. niqaeli: Hee! niqaeli: Wilson: ...what, I'm chopped liver? niqaeli: House: Yes. You'd go well with onions. And a little later:niqaeli: But, seriously. House would be all "Dammit, I'm losing two of my people and screw this Foreman-is-my-boss shit, they're my people. Two! I had them all broken in and comfy." niqaeli: Wilson: Yes, it's so hard breaking the spirit in one's minions. jmtorres: lol niqaeli: House: *sticks his tongue out* Wilson: You know, you are allowed to be upset about this. I won't tell anyone that the big bad House has human emotions. niqaeli: House: Oh, you know how to woo a man. Take me now, Jimmy. niqaeli: Wilson: *sigh* James. And stop deflecting. I know you better. I may be the only person who does. niqaeli: House: This is touching, really. You, reaching out to the bitter asshole. Me, deflecting it and being the bitter asshole. If only my heart would melt already, we could be a Lifetime movie. niqaeli: Wilson: You know, this is not your most attractive side. House: Which does make one wonder why you put up with me. Wilson: Oh, we both know that one. Seriously, though. You enjoy tormenting Cameron and have some small, tiny measure of affection for her due to all the fun you can have with her and you actually, against all reason, like Chase. Despite the crap he pulled on you with Vogler. I think you must be attracted to him, the only other people you let get away with that much are Stacy and me. House: Yeah, okay, I'm upset. You got me. Can we move on? Please? You know what chick flick moments do to my bowels. Wilson: Yeah. Sure. niqaeli: Elsewhere: Cameron: I can't believe you! Chase: I'm not the one who was being avoidant and stupid. Cameron: You never told me! Chase: What, thanks for the sex that was a really bad idea and by the way I might have been exposed too? Cameron: Yes! Chase: You have martyr complex the size of Mount Rushmore, like you needed that? Besides, it was... I was sober, you weren't. If this is anyone's fault, it's mine.jmtorres: Cameron: Okay, now you're just treating me like a child. Chase: You were on DRUGS.niqaeli: Cameron: Yeah, okay, but really. I made a stupid choice, you made a stupid choice.niqaeli: Chase: *stares at Cam*
Low
[ 0.5022935779816511, 27.375, 27.125 ]
import React, { Component } from 'react'; import Tag from './Tag'; class SizeSelector extends Component { setSize = value => { this.props.onUpdateSize(value); }; render() { const { activeSize } = this.props; return ( <div> <Tag active={activeSize} text={140} onClick={() => this.setSize(140)}> Small </Tag> <Tag active={activeSize} text={180} onClick={() => this.setSize(180)}> Medium </Tag> <Tag active={activeSize} text={200} onClick={() => this.setSize(200)}> Large </Tag> </div> ); } } export default SizeSelector;
Low
[ 0.5173333333333331, 24.25, 22.625 ]
Alternative splicing: therapeutic target and tool. Alternative splicing swells the coding capacity of the human genome, expanding the pharmacoproteome, the proteome that provides targets for therapy. Splicing, both constitutive and regulated forms, can itself be targeted by conventional and molecular therapies. This review focuses on splicing as a therapeutic target with a particular emphasis on molecular approaches. The review looks at the use of antisense oligonucleotides, which can be employed to promote skipping of constitutive exons, inhibit inappropriately activated exons, or stimulate exons weakened by mutations. Additionally this manuscript evaluates methods that reprogram RNAs using reactions that recombine RNA molecules in trans. Preliminary, but exciting, results in these areas of investigation suggest that these methods could eventually lead to treatments in heretofore intractable ailments.
High
[ 0.6763540290620871, 32, 15.3125 ]
Conventionally, in pneumatic tires (hereinafter, referred to as tires) mounted on passenger cars, for example, a method for forming a plurality of circumferential grooves in a tread has been widely used in order to ensure a water drainage performance on a wet road surface. For example, there is known a tire provided at groove bottom portions of circumferential grooves thereof with projections inclined with respect to center lines of the circumferential grooves in a tread in order to facilitate the drainage of rainwater that has entered the circumferential grooves (for example, Patent Document 1). With such a tire, a water flow is generated in the rainwater that has entered the circumferential grooves, resulting in the improvement of a water drainage performance. However, the above-mentioned conventional tire has the following problems. That is, the tire having groove bottom portions provided with projections has a problem that a buckling, that is, the tread is warped inward in the tire radial direction in the vicinity of the circumferential grooves, starting from the projections, easily occurs. If the buckling occurs, a ground contact shape of the tread is not stable, and as a result, braking performance is reduced. Meanwhile, in order to suppress the occurrence of the buckling in the vicinity of the circumferential grooves, reinforcing the groove bottom portions of the circumferential grooves or wall surfaces of land portions forming the circumferential grooves is also considered. This case leads to another problem that the sectional area (volume) of the circumferential groove is reduced, resulting in the deterioration of a water drainage performance.
Mid
[ 0.6292134831460671, 35, 20.625 ]
Adatbázis hiba: You have an error in your SQL syntax; check the manual that corresponds to your MySQL server version for the right syntax to use near 'get = 'hasznalt_xx_sz_i_antik_kanape_agy'' at line 3
Mid
[ 0.54083885209713, 30.625, 26 ]
How a high school student 'stumbled upon' Apple's FaceTime bug and tried to report it "I stumbled upon this glitch that like the whole world knows about now." Grant Thompson was trying to get some friends together to play video games one Saturday when he discovered an alarming glitch in Apple's popular FaceTime application. "I stumbled upon this glitch that like the whole world knows about now," Thompson told ABC News in an interview Tuesday night. The 14-year-old student in Tucson, Arizona, called his friend Nathan using FaceTime on Jan. 19, but he wasn't answering. So Thompson swiped up on his iPhone to add another friend, Diego, to the call, a now-disabled feature in the app that -- to Thompson's surprise -- immediately connected him to Nathan even though he still hadn't picked up. "Once I added Diego, it forced my first friend Nathan to join [the FaceTime call]," Thompson told ABC News. "He hadn't answered yet, but it had that answering ring tone, and so I said, 'Hey, Nathan, what's up?'" "He was like, 'Grant? You can hear me?" Thompson recalled. "He told me that he never even answered the call, yet both of us could hear each other crystal clear." The three friends spent the next half hour trying to recreate what happened on each other's iPhones -- and it worked every time. "We were all shocked," Thompson said. "We realized this was an actual bug that forced people to answer the calls." The teen shared the discovery with his mother, Michele Thompson, who was skeptical. "At first she was pretty suspicious, she didn't really believe that I found a glitch," he said. "I used my phone, her phone and my sister's phone to make my mom's phone force answer, without ever clicking 'Accept.' And once that happened, she believed that I could really do this." Over the next week, the Thompsons tried to notify Apple of the bug via emails, telephone calls and social media -- but largely to no avail. Michele Thompson said she even tried getting the tech company's attention through its bug bounty program, which offers monetary rewards for finding and reporting security flaws. The program, launched in 2016, pays up to $200,000 for detecting vulnerabilities in certain Apple software. "I knew [Apple] had a bounty reward program, they had a security manual that was 80 pages that I looked at," Michelle Thompson told ABC News in an interview Tuesday night. "I didn't know if this qualified, and by no means am I a tech expert." But the program wasn't user-friendly to non-developers like herself trying to flag a major flaw, she said. "I do wish they had a better process to let a citizen report a bug," she added, "because it was a pretty complicated process." Apple did not immediately respond to ABC news' request for comment Wednesday about the Thompsons' bug report. On Monday, media outlets caught word of the glitch and the story went viral. That evening, Apple temporarily disabled its Group FaceTime app. "We're aware of this issue and we have identified a fix that will be released in a software update later this week," an Apple spokesperson said in a statement to ABC News on Monday night. Michele Thompson said she received an email from Apple's security team on Tuesday afternoon. "It said, 'Dear Michele, we've received your bug report. We like to give credit to those who find bugs on our website. We'd like to know what name you'd like us to use.' And that's all it said," she told ABC News. "I think we've done our part, I reached out to them. I would love to talk with them further." On Wednesday, New York State Attorney General Letitia James and Governor Andrew M. Cuomo announced an investigation into Apple’s failure to warn consumers about the FaceTime bug and "slow reponse" to address the issue, according to a press release issued by their offices. “New Yorkers shouldn’t have to choose between their private communications and their privacy rights,” James said in the release. ABC News' Thomas Austen and Soo Youn contributed to this report.
Mid
[ 0.554809843400447, 31, 24.875 ]
Bacterial Spores in Food: Survival, Emergence, and Outgrowth. Spore-forming bacteria are ubiquitous in nature. The resistance properties of bacterial spores lie at the heart of their widespread occurrence in food ingredients and foods. The efficacy of inactivation by food-processing conditions is largely determined by the characteristics of the different types of spores, whereas food composition and storage conditions determine the eventual germination and outgrowth of surviving spores. Here, we review the current knowledge on variation in spore resistance, in germination, and in the outgrowth capacity of spores relevant to foods. This includes novel findings on key parameters in spore survival and outgrowth obtained by gene-trait matching approaches using genome-sequenced Bacillus spp. food isolates, which represent notorious food spoilage and pathogenic species. Additionally, the impact of strain diversity on heat inactivation of spores and the variability therein is discussed. Knowledge and quantification of factors that influence variability can be applied to improve predictive models, ultimately supporting effective control of spore-forming bacteria in foods.
High
[ 0.6666666666666661, 32.25, 16.125 ]
Challenges to Membership Organizations: European Trade Unions in Comparison Research question/goal: Trade unions and other collective membership organizations have difficulties in mobilizing members and representing ever more heterogeneous interests within their domain. In many European countries trade unions face considerable membership problems with multiple implications for labour relations and societies in general. The project aimed at studying changes in membership organizations across Europe from different perspectives, combining analyses at the national, organizational and individual level. The project organized two workshops in the context of the EU-funded EQUALSOC network at the MZES in March 2007 and at AIAS, University of Amsterdam in July 2009. A special issue with seven papers was edited by Alex Bryson (LSE), Bernhard Ebbinghaus (MZES) and Jelle Visser (AIAS) on “Causes, Consequences and Cures of Union Decline” and published in the European Journal of Industrial Relations in June 2011. As part of the project, a working paper with descriptive statistics and a journal article with a multi-level analysis of the European Social Survey were published by the Mannheim team. Union density still varies considerably between a mostly low level in Southern and Eastern European societies and high levels in Nordic countries. In addition to social structural causes for low union density of women, the unemployed and atypical employed, several institutional factors provide selective incentives for membership and foster union access to workplaces. When controlling for individual factors, the cross-national variations in union density depend largely on meso- and macro-level variables, in particular workplace representation, establishment size, Ghent unemployment insurance and a society’s social capital. These institutional and social contextual factors matter in explaining differences in union membership across Europe. Conference Presentations Ebbinghaus, Bernhard (2014): Trends in union membership, varieties of capitalism, and mechanisms of member inclusion and exclusion. [WSI LRC Workshop Varieties of Capitalism and Its Implications for Labour Relations Research, European University Institute, Florence, May 29th to May 31st, 2014]more Ebbinghaus, Bernhard (2009): Institutions and Social Context Matter: Comparing Union Membership in Europe. [EQUALSOC/TRALEG-Workshop: The Demise of Collective Organizations in Europe, AIAS, University of Amsterdam, July 24th to July 25th, 2009]more
High
[ 0.721259842519685, 28.625, 11.0625 ]
Q: adding numbers in a for loop I tried to sum some numbers in a for loop but it didn't go as I expected float sum = 0; int i; printf("0.1+0.1=%f\n", 0.1 + 0.1); for (i = 0; i<1000000; i++) { sum = sum + 0.1; } printf("the sum need to be 100000 \n"); printf("the real sum is:\n %f\n", sum); system("PAUSE"); this program prints: 0.1+0.1=0.200000 the sum need to be 100000 the real sum is: 100958.343750 Press any key to continue . . . can you explain please this strange result? A: the international standard for floating point numbers does not have an exact representation for some decimal numbers. http://en.wikipedia.org/wiki/IEEE_754 It is due to the way they are stored in memory, the way the mantissa and exponent are stored. https://en.wikipedia.org/wiki/Floating_point This is also the reason why you should never compare two float numbers even if they look "the same". I still remember how surprised I was the fist time a simple code comparing two float numbers didn't work :) This alone would open a dedicated universe of discussions. It is very worth reading anyway: http://floating-point-gui.de/errors/comparison/
High
[ 0.691019786910197, 28.375, 12.6875 ]
IFN-alpha treatment of p190 bcr abl transgenic mice. Interferon-alfa (IFN-alpha) is one of the most effective drugs in the treatment of chronic myeloid leukemia (CML). Recently, IFN-alpha has also been tried in the treatment of Ph-positive acute lymphoid leukemia (ALL), a disease in part sharing the same molecular genetic lesion as CML, namely a BCR/ABL fusion gene. In the present study we analyzed the effect of IFN-alpha (rHuIFN-alphaA/D) on a mouse model for Ph-positive ALL - mice transgenic for the P190 BCR/ABL fusion gene. IFN-alpha treatment was started in the early leukemic phase and continued throughout the course of the disease in eight transgenic animals. No prolonged survival or altered disease pattern with regard to the development of leukemia and/or lymphoma was observed. We conclude that IFN-alpha, at least in a transgenic setting, does not interfere with the leukemogenic process induced by the P190 BCR/ABL fusion gene.
Mid
[ 0.6071428571428571, 34, 22 ]
Miguel Cuenco Miguel Diosomito Cuenco (December 15, 1904 – June 30, 1990) was a Filipino Visayan lawyer, journalist, and legislator from Cebu, Philippines. Except the years from 1946 to 1949, he had served as member of the Lower House of Congress representing the 5th legislative district of Cebu from 1935 until 1965. Early life Miguel Cuenco was born to the couple Mariano Albao Cuenco of Sogod, Cebu and Remedios Lopez Diosomito of Baybay, Leyte on December 15, 1904. His siblings were Jose Ma. Cuenco, the first Archbishop of Jaro, Iloilo, and former Senate President Mariano Jesus Cuenco. Education Acquiring a Liberal Arts degree at the Colegio de San Carlos when he was 14 years old, he was involved in various student activities, won prizes in philosophy and oratorical contests, and recognized for his writing skills in the Spanish language. He earned a law degree from the University of Santo Tomas at the age of 18 and became a lawyer on November 16, 1926. At the University of Santo Tomas, he was an editor of school papers Revista Escolar de Derecho and Unitas. He pursued further studies in the United States, attending Yale University, Harvard University and Georgetown University in Washington DC where he took Diplomacy and International Relations. Miguel Cuenco married Fara Remia Jalbuena Ledesma on May 27, 1948. The couple had three children, but only their daughter Marietta survived to adulthood. Journalism At a young age, he was an editor for La Juventud, a Spanish newspaper. He also became a reporter and editor of El Precursor, a Cebu periodical founded by election lawyer Domingo Franco and whose management would be taken over later on to his brother, Mariano. Legal education He also was a professor of political law at the University of San Carlos and later became the dean of the College of Law. Before the war, he was appointed by the Supreme Court as member of the committee responsible for amending the Code of Legal Ethics by the recommendation of Jose P. Laurel. Political career When Sergio Osmeña retired from politics after his defeat in the 1946 presidential election, the Cuenco family took political hold in the locality by allying themselves with Manuel Roxas, the newly elected president, as well as a local political leader named Ramon Durano. The Cuencos did not have large landholdings, but they had commercial interests in Cebu City and owned Bisaya Land Transportation Company, one of only two major land transportation companies at that time. The Osmeñas and Cuencos later established alliance in 1954 to 1955, a political fusion that Miguel hesitated to join for quite some time. Affiliated with the Nacionalista Party, Miguel Cuenco was elected member of the Philippine Legislature for two terms representing the 5th legislative district of Cebu in 1931 to 1935, succeeding his brother Mariano Jesus Cuenco. He was again voted to serve in the same elected post for the 1st National Assembly and the 2nd National Assembly during the Commonwealth period from 1935 to 1941. Before the outbreak of World War II in 1941, he was again reelected but only served after the war in 1945. After the war, he was voted again as Congressman of the Cebu's 5th district for four terms starting in 1950 until 1965. As legislator in the Lower House of Congress, he authored the Republic Act 709, a law approved on June 5, 1952 and that required the mandatory teaching of Spanish language in colleges and universities. He was Chairman on the Committee on Elections from 1931 until 1935, Chairman of the Committee on Public Works from 1934 to 1945, Chairman of the Committee on Foreign Affairs, and member of the following committees: on Revision of Laws, and on Labor and Industrial Relations. In April of 1954, he was part of the Philippine delegation to the Geneva International Conference. However, he declined the offers of President Manuel Roxas and later President Elpidio Quirino for diplomatic posts for the United States, United Nations, Spain, Rome or Shanghai. Business In addition, Miguel Cuenco was a business executive, working as Vice President of the Bisaya Land Transportation Company Inc and the manager of the company's shipping department. The company was wholly owned by Filipino and engaged in transportation and shipping in the Visayas and Mindanao. In 1958, he filed a complaint against Dioscoro Lazaro, Manuel Cuenco, Jose P. Velez, Jesus P. Velez, Federico A. Reyes, and Nicolas Jumapao for an article published on The Republic Daily, a Cebu newspaper of which Lazaro was the publisher, that reported Cuenco was sued by the company for issues allegedly involving the company's management. The case was dismissed by the Supreme Court on March 31, 1976. The Supreme Court also ruled a separate case involving the assets of Bisaya Land Transportation, stating that Cuenco's rights to the assets only arise upon the dissolution of the company. Later years On December 17, 1965, he announced his retirement from politics . He had received various awards, including recognition from the Legislative Press Club, Philippine Women Voter's League, and University of San Carlos (distinguished alumnus). He was 86 when he died on June 30, 1990. Historical commemoration A statue was erected in his honor in the plaza of Alegria, Cebu. References Category:1990 deaths Category:20th-century Filipino writers Category:Members of the National Assembly of the Philippines Category:University of San Carlos alumni Category:University of Santo Tomas alumni Category:1904 births Category:20th-century Filipino lawyers Category:Members of the Philippine Legislature Category:Members of the House of Representatives of the Philippines from Cebu Category:Georgetown University alumni
High
[ 0.6748166259168701, 34.5, 16.625 ]
Brendan’s Log: LINCOLN (2012) This week I changed my mind about Steven Spielberg, which I guess is something of a major life event if you could properly chart the rising and falling tastes of young movie snobs. I was truly wrecked by his A.I.: ARTIFICIAL INTELLIGENCE only twenty minutes in; it contains passages of intense, terrifying power, the sort of film that awakens your inner child, takes it by the hand, and then leads it into the woods and abandons it there forever. All else aside, I had rarely seen a film of his that struck me beyond a sense of being impressed with its technical accomplishment since his TV debut, DUEL. LINCOLN is such a picture. Without being a policy junkie or even someone who pays dutiful attention to the newspapers, the pull of Tony Kushner’s ornate script, each scene a wood carving, depletes all reserves of resistance. It is so tailored for its director that even among the long monologues which seem fashioned from primary source documents of the President’s own speeches or memoirs and the Congressional proceedings, Kushner has given William N. Bilbo, Richard Shell, and Col. Robert Latham (characters played by James Spader, Tim Blake Nelson, and John Hawkes) moments in the sun. In a sense they operate as mechanical fixtures of the plot, demonstrating the necessity of a certain wheeling-and-dealing to win the necessary votes on Lincoln and the 13th Amendment’s behalf. They are also sublime comic figures in the tradition of John Ford (aped, gorgeously, as recently as Spielberg’s WAR HORSE), existing as whole persons even as they mostly drift to the outskirts of Spielberg’s grand American tapestry. For LINCOLN’s great achievement lies in its metonymic quality, its procedural how-a-bill-becomes-an-amendment focus honing in on one facet of American government (Congress, though of course Lincoln in a couple of scenes with his cabinet walks us through some operations of the Executive branch) to illuminate a moment in national history. I doubted Spielberg’s ability to make a convincing film about the abolition of slavery with nary a black character in sight. Kushner seems to have inserted Gloria Reuben’s Elizabeth Keckley largely as a theatrical device; she stands silent in several scenes, observing the conflict between whites as she remains passive in a decisive moment in her people’s history. Had she remained silent, it would have been a cheap joke, a facile undermining of the film’s nuanced approach to the process of securing basic human rights. The inevitable moment in which she and Lincoln speak frankly to each other about their relationship doesn’t much twist our perception of the President, but is gratifying nonetheless in the balance it strikes between depicting him as a radically enlightened individual and as a person with prejudices of his own. Spielberg’s visual trademark has long been a certain look of awe in the faces of his actors, usually turned upwards at a spaceship or the craning neck of a brachiosaur. No such fantastic vision occurs in LINCOLN, replete though it is with shots of sumptuous period detail; in longer takes, cinematographer Janusz Kaminski evokes both Max Ophuls and Terence Davies. In this latest picture it is the impending historical moment which invokes reverence, most often personified through Daniel Day-Lewis’s keenly affected performance, a man who often withdraws into himself, mumbling a long monologue about nothing in particular when he feels the forces of time and memory beginning to swirl around him. The faces of the many supporting players who are his audience flicker with trepidation, an almost religious uncertainty. Like the representatives about to pass an amendment, they have only a vague sense of what they are watching, not because Abraham Lincoln possessed any mythical, mystical qualities, but because they’re witnessing only a brief moment in the life of a person, like a country, only possible to comprehend from a distance. – Brendan
High
[ 0.691421254801536, 33.75, 15.0625 ]
Features Traktor Scratch is the direct competitor to Serato Scratch. With proven better response and sound quality, The Traktor Scratch A6 is a complete digital vinyl system for spinning MP3s using super-tight vinyl and CD control, including the Traktor Audio 6 interface with extra loud output and 6 inputs and 6 outputs, timecode vinyl and CDs, and the flagship Traktor PRO 2.5 software. The newly developed Native Scratch technology features Traktor Scratch MK2 timecode vinyl and CD control for the next step in tight timecode performance. Spin super-precise 2 kHz control signal on 120g vinyl, it feels just like your digital track was cut to a 12″ and with the innovative vinyl marker stickers you get clear visual reference at all times. Alternatively, use your CDJs with Traktor MK2 timecode in relative mode, and stay ahead of the competition, with Traktor’s loops and hot cues and your CDJs’ cue and manual looping functionality, you get the best out of both systems.
Mid
[ 0.6431924882629101, 34.25, 19 ]
Haha I love this! ALL THE YESToon Link's expression is my absolute favorite, it looks like he doesn't want his picture taken at all XDAnd I thought it was all the Links together until I saw Ben. That scared me XD Young Link is so damn adorable, he'd be my first choice for a well-deserved squish and hug xDD Nice attention to detail with Skyward's earrings, and BEN's expression is just about the perfect amount of creep xD I always love your hero renditions ^^
Mid
[ 0.541950113378684, 29.875, 25.25 ]
How to Use Your Imagination to Relax Your Body for Meditation As meditation and the emerging field of mind-body medicine remind people— and yogis and sages have been saying for millennia — your body, your mind, and your heart form one seamless and inseparable whole. When your thoughts keep leaping from worry to worry, your body responds by tightening and tensing, especially in certain key places like the throat, the heart, the solar plexus, and the belly. When the discomfort gets intense enough, you register it as an emotion — fear, perhaps, or anger or sadness. Because it connects you with your direct experience — and ultimately with a realm of pure being beyond the mind — meditation naturally relaxes your body while it focuses your mind. As a beginner, though, you may not experience this natural relaxation for days or even weeks. So it can be helpful to practice one of the techniques in the following list before you meditate, especially if you tend to be noticeably tense. (If you’re one of those rare people who are so relaxed that you drift off to sleep at the slightest provocation, you may want to skip this exercise.) Shower of relaxation: Imagine taking a warm shower. As the water cascades across your body and down your legs, it carries with it all discomfort and distress, leaving you refreshed and invigorated. Honey treatment: Imagine a mound of warm honey perched on the crown of your head. As it melts, it runs down your face and head and neck, covering your shoulders and chest and arms, and gradually enveloping your whole body down to your toes. Feel the sensuous wave of warm liquid draining away all tension and stress and leaving you thoroughly relaxed and renewed. Peaceful place: Imagine a safe, protected, peaceful place — perhaps a forest, a meadow, or a sandy beach. Experience the place fully with all your senses. Notice how calm and relaxed you feel here; now allow that feeling to permeate every cell of your body. Body scan: Beginning with the crown of your head, scan your body from top to bottom. When you come to an area of tension or discomfort, gently allow it to open and soften; then move on. Relaxation response: Choose a word or brief phrase that has deep spiritual or personal significance for you. Now close your eyes and repeat this sound softly, again and again. Because the meditation takes at least 15 minutes to complete, you probably won’t do it each time you meditate, but it does show you how to relax your body part by part. By the way, deep relaxation is a great antidote for insomnia — just practice it in bed and then drift off to sleep!
Mid
[ 0.575824175824175, 32.75, 24.125 ]
Serum angiotensin-converting enzyme. Isolation and relationship to the pulmonary enzyme. Angiotensin-converting enzyme from rabbit serum was purified almost 60,000-fold to apparent homogeneity by a procedure exploiting its affinity for antibodies prepared against the enzyme from lung. The pure serum and pulmonary enzymes exhibited identical behavior during gel filtration, sucrose gradient centrifugation, and disc gel electrophoresis in the reduced, denatured state. Their catalytic properties with hippurylhistidylleucine, angiotensin I, and bradykinin as substrates were similar and their reactivity with antilung enzyme antibody was indistinguishable as examined by immunodiffusion, inhibition dose-response curves, and radioimmunoassay. Their content of fucose, mannose, galactose, and N-acetylglucosamine was also comparable; however, N-acetylneuraminic acid was much more abundant in the serum glycoprotein. This difference may reflect selective removal of sialic acid-deficient enzyme molecules from the circulation by the hepatic lectin which has been postulated to initiate the catabolic phase for plasma glycoproteins (Ashwell, G., and Morell, A.G. (1974) Adv. Enzymol. Relat. Areas Mol. Biol. 41, 91-128).
High
[ 0.669975186104218, 33.75, 16.625 ]
Q: How to get unmatched records using SQL query? Actually if i am doing INNER JOIN of two tables then i will get all matched records from the two tables. But i want to get all the unmatched rows only. Is there any way to do that? Or Any JOIN available for that? A: There is join you can use. You need an OUTER JOIN, and only select rows with a NULL on the join condition. Another option is to use a sub query with a NOT EXISTS or NOT IN as part of your main WHERE clause.
High
[ 0.717391304347826, 33, 13 ]
Q: Image over Image CSS I am creating a webpage and I am trying to put a png (buttons) over gif files. When the page renders, it makes the png file appear after or under the gif file. I tried using and tags but neither work. I have also tried using various CSS padding, alignments etc. but it doesn't seem to work. Is there a way (code) to get images to appear on top of images? A: Each element in a page has a particular stacking order. If you do not set them explicitly then it will be stacked in accordance to the order in DOM. You can control the stacking order by setting the property z-Index The higher the z-index value goes the higher will be the stacking order for the element. If you can set the gif image as the background of a cell then background-image property will be the best one. First set the gif image as a background to the cell and place the png button in the cell and position it inside the cell. A: Use the "background-image" CSS attribute on a block-level element (<div>, <td> etc.) for the background GIF, then place the PNG buttons inside that block element. Like this: <style type="text/css"> div#withBackground { background-image: url('bitmaps/bg-image.gif'); background-repeat: no-repeat; } </style> <div id="withBackground"> <img src="bitmaps/fg-image.png" /> </div>
High
[ 0.710644677661169, 29.625, 12.0625 ]
A Florida bill that classifies certain criticisms of Israel as anti-Semitic has passed unanimously in the state Senate, despite drawing sweeping condemnation from Palestine and free speech advocates who say the legislation violates the United States Constitution. The bill, known as HB 741, passed on Monday in a 40-0 vote in Florida's upper legislative chamber. It was passed just days after a US federal court judge struck down a controversial an anti-Boycott, Divestment and Sanctions (BDS) law in Texas, saying it breached Americans' First Amendment right to free speech. In fact, the Florida bill is one of several pieces of legislation in US states that would restrict criticism of Israel over its human rights abuses against Palestinians, as well as define those critiques as anti-Semitic. 'Freedom [of speech] is at risk of being thrown down the drain with this kind of legislation' - Wilfredo Ruiz, Florida's Council on American-Islamic Relations "In a nation where freedom of speech has been gained through blood, sweat and tears … we find that that freedom is at risk of being thrown down the drain with this kind of legislation," said Wilfredo Ruiz, communications director for Florida's Council on American-Islamic Relations (CAIR-Florida). Specifically, the Florida bill outlaws religious discrimination in schools, including universities and colleges, and mirrors the Anti-Semitism Awareness Act that was introduced in the US Congress last year. But the definitions of anti-Semitism used in the bill criminalise certain criticisms of Israel, causing the legislation and others like it to come under fire from human rights groups and legal experts. According to Ruiz, the bill is an attack on core American values. "The question is, who is this legislation for?" he told Middle East Eye in an interview a few weeks before the legislation was passed in the Senate. "It's certainly not for the American people because this is an attempt against the American people's constitutional rights." Florida's bill The Florida bill was introduced by State Representatives Randy Fine and Mike Caruso, both of whom did not respond to multiple MEE requests for comment. During its cycle through the state legislature, opponents said that while they supported efforts to outlaw religious discrimination in schools, the bill's guidelines for what can be called anti-Semitic were problematic. Among other examples, the bill defines anti-Semitism as "applying a double standard to Israel by requiring behavior of Israel that is not expected or demanded of any other democratic nation, or focusing peace or human rights investigations only on Israel". Groups such as the American Civil Liberties Union (ACLU) say that clause may bar students from holding protests that criticise only Israel, without mentioning other nations' human rights violations. Anti-BDS bill: The right to boycott is part of the US 'constitution' Read More » Alan Levine, a civil rights and constitutional lawyer based in Florida, told MEE that the legislation is part of a "next generation" of bills seeking to silence those who would challenge Israel. "This is the second wave of pro-Israel legislation. The first was directed at boycott efforts," Levine said, referring to legislation that has targeted BDS, a campaign that seeks to hold Israel accountable for its human rights abuses against Palestinians. "And now it's weaponising anti-Semitism," Levine said. The Florida bill will now be sent to the desk of Republican Governor Ronald DeSantis, a staunch backer of Israel who is expected to promptly sign it into law. "Florida is the most Israel-friendly state in the country and we will not stand for discrimination against the Israeli people of any kind," DeSantis said in January. "BDS is nothing more than a cloak for anti-Semitism, and as long as I'm Governor, BDS will be DOA [dead on arrival]. I cannot wait to strengthen the already unwavering bond between Florida and the great state of Israel." In 2016, when DeSantis was a member of the US House of Representatives, Florida's legislature passed an anti-BDS law prohibiting public entities from contracting projects worth over $1m with any company or non-profit group that boycotts Israel. Last year that law was expanded to remove the $1m threshold, meaning all projects, regardless of their value, would be subjected to the anti-BDS provision. According to Palestine Legal, a non-profit group that advocates for Palestinian rights, Florida is one of 27 states that have enacted anti-BDS legislation as of March 2019. Fourteen other states have introduced similar legislation, as well. Last year, US courts in Kansas and Arizona ruled that it is unconstitutional to force government contractors to refrain from boycotting Israel, blocking the anti-BDS laws in both states. Several others are being challenged in courts. Anti-BDS bill: For Israel, the terrain is shifting unfavourably Read More » Levine said he thinks Florida's HB 741 similarly would be knocked down in court when challenged, but that process will take a long time to get through the judicial system. "That's at the end of a long and very troubling road for young people, who just want to go out and make their views known," Levine said. He added that the legislation also belittles what he called "real anti-Semitism". "Anti-Semitism is about hating Jews; it has a long and ugly history ... there's no evidence as far as I can tell that criticism of Israel has anything to do with hatred of Jews," Levine said. Palestine advocates undeterred Reem Zaitoon, a student at Florida State University and president of the school's Students for Justice in Palestine advocacy group (SPJ), told MEE that the legislation will not stop her organisation from continuing their regular protests. "Even with punishment and persecution looming above us, which can become very real, it won't stop us," Zaitoon said. She said Palestine advocates in the US take their strength from the resilience and strength shown by Palestinians living under Israeli military occupation, who are "getting shot at every single week [and yet] continue to come out and risk their lives". 'Even with punishment and persecution looming above us, which can become very real, it won't stop us' - Reem Zaitoon, head of Students for Justice in Palestine at Florida State University "It's that kind of resilience that will make us stay and make us keep doing what we are doing no matter the cost, no matter the risk," Zaitoon said. Levine, the civil rights lawyer, does not disagree, but adds that a law criminalizing protest represents a challenge for Palestine activists. "Both on and off campuses, there's no question that people are going to feel intimidated by a bill that says, 'if you criticise Israel, if you point out their human rights violations … you may be subject to the penalties of this law,'" Levine said. "That's really a deterrent; It's what constitutional lawyers call a 'chilling effect'." But Zaitoon said the key will be to keep educating students about the realities of daily life for Palestinians - and encourage them to protest and to make their voices heard. "To get a student agitated - that's powerful," she said. "Change really does happen through education."
Mid
[ 0.605504587155963, 33, 21.5 ]
Subscribe Category: Ubuntu Today Lets make our own OS/Kernel, which doesn’t support USB and BLUETOOTH. After reading this article, you are able to make any kind of your kernel, like disabled graphics disabled Soundcard; you can also disable your CD-ROM, WLAN, MULTIMEDIA. In short you can make your own OS/Kernel as per your requirement. Here, we are going to make a kernel, which doesn’t support USB, Bluetooth. This kind of OS is mostly used in Cyber Cafe, Education Department, School or offices, at which security of data is very important. So let’s concentrate on our pretty interesting task: (yes, every tough task could be make easy by just make it interesting) Ok, let’s start our process: Step 1: Get Latest Linux kernel code Visit http://kernel.org/ and download the latest source code. File name would be Linux- x.y.z.tar.bz2, where x.y.z is actual version number. For example file linux-3.5.3.tar.bz2 represents 3.5.3kernel version. Download it on your desktop path now; you have kernel linux-3.5.3.tar.bz2 on your desktop [Create a folder on desktop with a name (avoid space in name). suppose we make folder “jimit” (without quotes), copy your linux-3.5.3.tar.bz2 file in this folder] Step 2: Open Terminal and direct your path Open terminal (CTRL+ALT+T) and type a path of that folder in which you copied your kernel After reaching to your folder, here it is “jimit”, you can check your kernel by just type a command: ls (it’s not required) [NOTE: during whole process, you need not require to write $ or # symbol, you have to just type commands] Step 3: Extract your kernel Now, this kernel file is like a rar file, you have to extract this file for that type this command 1 $tar-xjvflinux-x-x-x.tar.bz2 [ Here, Linux -x-x-x means type your kernel version like Linux -3.5.3.tar.bz2,after typing this command ,this file will be extracted on same folder.] Now, after extracting this folder, go in to that extracted folder and type: 1 $cd linux3.5.3 Step 4: Kernel Configuration Now type: 1 $make menuconfig [if its not work,then you have to install ncurses library,for that just type:] 1 sudo apt-get install ncurses-dev As you type this command, after little process one blue window will open Here, for disable USB support, go on to device drivers and then in Submit space up to when * or M symbol is removed. For disable this supports, there must be a null before it.[For back window, hit Esc key for two times] same for Bluetooth just go in network support, and then in Bluetooth.hit space and disable it but giving it null. Now for save and exit, hit Esc key two times, and give yes for save & quit. After extracting and support changes, type one another command 1 $make Type this command and sleep for 3 hours (dual core processor people),i3,i5 processor people can sleep just for 1-2 hours. yes, if you have dual core processor or any old processor ,this process will take 3 hours, else it will take 1-2 hours. Now wake up, process is almost done. Step 5: Buildup Module Now, type another command 1 $make modules Step 6: Become Root user After all this commands, you have to become a root user, means you have an authority for doing any changes by commands, for that type this commands 1 $sudo su As you type this, system will ask you for password, give it, and you can see $ symbol is replaced by # symbol, it means you are a root user, then type another command, 1 # make modules_install And then type last one 1 2 3 4 # make install # cd /boot # mkinitrd -o initrd.img-3.5.3 3.5.3 (or use mkinitramfs) # update-grub It’s done. Now just type 1 # reboot. And system will restart. As you can see at the starting of system, you have an option of kernel, select your kernel (for here it is 3.5.3) and access it, in which you are not able to access your USB and BLUETOOTH. Hello everybody, Today we are going to learn that, how to lock our private folder, file in Ubntu in just few mins. It’s mainly used when we need to secure our important data from others. Here,we just remove the permission read(r) ,write(w) and execute(x) of file, then it will automatically be locked, and for that we just need to write a few commands. Before that lets make a folder xyz on desktop. We are going to lock this folder “xyz”. Step 1: Open terminal (CTRL+ALT+T) Then go to on your folder path,here,our folder is on desktop. Then type: Step 2: cd Desktop then type: step 3: ls -l Now,here you can see folder name “XYZ”,2nd line from bottom. [here,GREEN BOX] Exactly in that first row, you can see like this drwxrwxrwx ( it shows the permission of xyz file) where, d = directory r =read w=write x= execute. Now, we want to lock this xyz file, means remove permission of read, write and execute then just type: step 4: chmod 000 xyz DONE.. now go to that file, and try to open that file.. this is our file location,on which you can see like cross symbol,which indicates that you dont have permission to open this file. if you are trying to open this file, you will get error like this. now to UNLOCK this folder, type in terminal step 5: chmod 777 xyz after giving this command, you can see on folder that,cross symbol is magically removed, that means now you are able to access this folder.
Mid
[ 0.575824175824175, 32.75, 24.125 ]
Q: python find if newline is in string I am trying to find if a "\n" character is in a string using this: if "\n" in errors.text This works fine for a string like "one\ntwo" but when the newline is at the end of the string like "one\n", it doesn't seem to work. I am using selenium to get this string from a website. Is it possible that it is not catching the newline at the end and simply not including it? Or could this be the problem? fixedText = errors.text.split("\n")[0] I want the fixed text to remove all newlines and only get the first line of text. It works except for the case discussed above A: If you want the fixed text to only be the first line in a string, you can do this: if errors.text: # skips empty strings fixedText = errors.text.split("\n")[0] This is because split() is reasonably robust: >>> 'a'.split()[0] 'a' >>> 'a\n'.split()[0] 'a' >>> 'a\n1'.split()[0] 'a' >>> ''.split() [] That last example demonstrates why we check for an empty string before trying to index the resulting list.
Mid
[ 0.555555555555555, 26.875, 21.5 ]
"Nasty Baby," a new film opening Friday in which the "Saturday Night Live" veteran plays a Brooklyn woman trying to conceive a baby with her gay best friend (Sebastián Silva, also the film's writer and director), began as a 22-page outline that was improvised into its final dramatic form. So what's it like for a comedy legend to bring her "yes and" skills to darker material? "It is improv, so you know the rules that go along with it, but definitely improvising a drama, it was a very different muscle than doing comedy," Wiig says. "We would discuss what needed to happen in the scene and how each character felt about it and how they would relate to each other. Sebastian would tell us what we needed to do, and just kind of try it." Improvising a drama might have been new territory but this is far from the first time Wiig, 42, has ventured away from her comedic sweetspot; for every "Bridesmaids" or the upcoming "Ghostbusters" reboot on her resume, there's "The Diary of a Teenage Girl," or "The Skeleton Twins." "I feel like people always ask me why I'm doing different things, and I feel like it should be a question of 'Why am I doing the same thing?" I wouldn't want to do the same thing over and over again," Wiig says. "I just feel really lucky that I get the opportunity to do this, because I know from a comedic background, I'm not the first person on people's lists when I do a drama." It's a strange stigma, one that has extended to the Academy Awards' famous reluctance to acknowledge comedies as viable best picture contenders. "I think sense of humor is so personal and that you can have a dramatic film that people can say, 'Yes, I agree, this is a good dramatic film,'" Wiig says. "With comedy, it's different because different people find different things funny." "Kristen is super funny, so inventive when it comes to humor, goofy, a comedic genius," says Silva. "That same sort of intelligence she can put wherever she wants. She has done it with comedy but she can do it with anything."
Mid
[ 0.6476190476190471, 34, 18.5 ]
Field of the Invention The present invention relates to methods for increasing the generation of positive transformants of a filamentous fungal host cell expressing multiple recombinant polypeptides. Description of the Related Art Recombinant production of a polypeptide in a filamentous fungal host cell may provide for a more desirable vehicle for producing the polypeptide in commercially relevant quantities. The recombinant production of a polypeptide is generally accomplished by constructing an expression cassette in which the DNA coding for the polypeptide is placed under the expression control of a promoter from a regulated gene. The expression cassette is introduced into the host cell, usually by plasmid-mediated transformation. Production of the polypeptide is then achieved by culturing the transformed host cell under inducing conditions necessary for the proper functioning of the promoter contained on the expression cassette. Filamentous fungal cells may be transformed with a vector by a process involving protoplast formation, transformation of the protoplasts, and regeneration of the cell wall in a manner known per se. Co-transformation of two or more vectors expressing multiple recombinant proteins does not efficiently provide positive transformants producing significant amounts of the multiple recombinant polypeptides. There is a need in the art for methods that improve the efficiency of obtaining positive transformants producing significant amounts of multiple recombinant polypeptides to reduce the number of transformants to be screened compared to positive transformants generated by co-transformation of vectors for each of the multiple recombinant polypeptides. The present invention provides improved methods for the generation of positive transformants of a filamentous fungal host cell expressing multiple recombinant polypeptides.
Mid
[ 0.627802690582959, 35, 20.75 ]
Effects of estrogen in the regulation of nitric oxide pathway during development of hypertension in rats. A down-regulation of nitric oxide (NO) synthesis has been involved in the genesis of cardiovascular complications associated with hypertension. This study was designed to assess the role of estrogen in the modulation of the pressor response elicited by N-methyl-L-arginine (L-NMA) in conscious spontaneously hypertensive (SHR) rats before and after ovariectomy. Four-week-old female SHR (n = 6) and age matched Wistar-Kyoto (WKY; control n = 7) rats were treated with mestranol (50 micrograms/100 g BW) twice a week for 8 weeks. At week 12, SHR and WKY were instrumented with catheters in the femoral artery and vein. L-NMA (30 mg/kg, i.v.) was infused over 1 min in SHR and WKY rats prior to and 3 weeks following ovariectomy. Results were compared to control rats, non-estrogen treated female SHR (n = 6) and WKY (n = 6). Our data show that the pressor response induced by L-NMA in estrogen-treated SHR was similar to estrogen-treated WKY (29 +/- 4 vs 25 +/- 2 mmHg). As compared to intact SHR and WKY, our data demonstrate that 3 weeks following ovariectomy, baseline blood pressure increased by 15% in SHR but remained unchanged in ovariectomized WKY. Furthermore, the magnitude of the L-NMA-induced pressor effect was significantly decreased in ovariectomized SHR and WKY. Our data support the concept that estrogen treatment does not play a significant role in the modulation of NO pathway in female SHR, whereas the presence of an intact ovaria modulates the NO pathway in female WKY.
Mid
[ 0.6359447004608291, 34.5, 19.75 ]
Q: What can you say about the Linear transformation? if $T:V \to V$ be a linear transformation and the composite $T(T)=0$,then $T$? 1) Kernel of $T$ is subset of image of $T$. 2)Image of $T$ is subset of kernel of $T$. 3) $T$ is a zero transformation. 4)$T$ is a non singular linear transformation. A: If $T (T)=0$, then you can conclude that $Im ( T)$ is a subset of $Ker (T)$. To show: $Im(T) \subset Ker(T)$ Let $y \in Im (T)$ then there exists $x \in V$ such that $T(x)=y$, now, $T(T)=0 \Rightarrow T(T(x))=0 \Rightarrow T(y)=0 \Rightarrow y\in Ker (T) .$ Thus,$Im(T) \subset Ker(T).$
High
[ 0.670967741935483, 39, 19.125 ]
José Riquelme y López Bago José Riquelme y López-Bago (Tarragona, August 31, 1880 - Paris, 28 January 1972) was a Spanish soldier noted for his involvement in the Second Moroccan War and the Spanish Civil War. He opposed the dictatorship of General Primo de Rivera. In 1987 he was honoured posthumously by King Juan Carlos who restored to him the rank of Lieutenant general. Career Riquelme spent most of his military career in Africa, during the Rif War. In 1921 he was Colonel and Chief of the Indigenous Police. After the Battle of Annual, he was involved in a confrontation with General Sanjurjo over the Expediente Picasso. In 1924 he participated in the Battle of Tétouan. In 1929 he was a member of the military court that tried José Sánchez Guerra for the artillery revolt at Ciudad Real. The acquittal of the Conservative politician caused Riquelme to be overlooked for further appointments. The chief minister and Minister of War, Alexander Lerroux submitted Decree of 15 February 1935 for the signature of the President of the Republic, appointing Riquelme as chief of the Second Organic Division, based in the city of Seville. He served as commander in chief of the First Military Region from the early days of the General Franco uprising and, at the end of the war, occupied the post of Commander General of the interior zone of the eastern region (Catalonia). As General of the Infantry Brigade he remained faithful to the Republican government from the early days of the Spanish Civil War. He was appointed head of the Organic Division I, occupying the vacant position that existed after the failed coup of July 18. He commanded the forces that attacked Toledo and later fought in the Battle of Guadarrama. However, in early September his forces suffered heavy defeats in Oropesa and Talavera de la Reina that caused processing. Discharged in 1938, he returned to service as military commander for Barcelona. Exile and death From 1939, after the fall of Catalonia, López-Bago was exiled in France until his death in Paris in 1972. His remains are interred in the Père Lachaise Cemetery, Paris. Personal life López-Bago married Milagros Ojeda Varona, his first wife, who was President of the Red Cross in Larache and his second wife, Manuela Ruiz Juan, who was president of the Red Cross committee for the Spanish Republic in exile in France. He has a granddaughter in Mexico from his first wife, Maria Rosa Judez Riquelme, and two great-grandchildren, Francisco and Diego Alberto Flores Judez. References Category:Spanish military personnel of the Spanish Civil War (Republican faction) Category:Spanish generals Category:1880 births Category:1972 deaths
Mid
[ 0.64021164021164, 30.25, 17 ]
Calculating CO2 Emissions from Mobile Sources Transcription 1 Calculating CO2 Emissions from Mobile Sources Guidance to calculation worksheets I. Overview I.A. Purpose and domain of this section This guidance is intended to facilitate corporate-level measurement and reporting of greenhouse gases (GHG) emissions from transportation and other mobile sources. The section addresses direct GHG emissions from owned or controlled mobile sources and indirect emissions from the use of transportation sources that are owned or controlled by other entities. In this tool the following categories of mobile sources are covered: Road transport Rail transport Air transport Water transport This is a cross-sectoral guideline which should be applied by all industry and service sectors whose operations involve the combustion of fossil fuel in mobile sources or the purchase of freight and/or travel services. I.B. Assumptions This guidance is based on the assumption that all carbon burned as fuels is emitted mostly as carbon dioxide (CO 2 ), CO, and VOCs (including CH 4 ) except for the unoxidized fraction which remains as ash or soot. CO and VOCs are eventually oxidized to CO 2 in the atmosphere. If companies purchase electricity for owned or operated electric vehicles and have records of electricity purchased for that purpose, the related emissions should be reported as indirect emissions under scope 2 in the GHG Protocol, 'Stationary Combustion Tool. I.C. Direct Versus Indirect Emissions Corporate transportation emissions can take the form of either direct or indirect emissions. Direct emissions refer to only those emissions that are associated with owned or controlled sources, such as company owned vehicle fleets and corporate aircraft. Indirect emissions refer to all other company-related emissions, including employee commuting, short-term vehicle rentals, and upstream/downstream transportation emissions, such as those associated with material inputs or consumer use. This tool allows calculation of direct and relevant indirect emissions. Table 1 provides a broad guidance to help users classify their direct and/or indirect emissions. I.D. Choice of Greenhouse Gases The degree of difficulty in calculating transportation emissions depends largely on which gases are included in the analysis. In most cases, CO 2 emissions are relatively straightforward to estimate, since they are primarily dependent on only two factors: the type and quantity of fuel burned. 1 N 2 O 1 Some variability does exist in the fraction of gasoline oxidized (one of the determinants of CO 2 emissions from combusting fuel), depending on the transportation equipment used. However this variability is minimal. In the U.S. Inventory, this fraction is assumed to be 99 percent. Variations in the energy content and carbon content of different fuel formulations (e.g., summer vs. winter gasoline; reformulated vs. oxygenated vs. conventional) can also introduce some error when applying national GHG emission estimates. 2 and CH 4 emissions, on the other hand, depend largely on the emissions control equipment used (e.g., type of catalytic converter). Since N 2 O and CH 4 emissions comprise a relatively small proportion of overall transportation emissions, only CO 2 emissions estimates are included in this tool. Estimates of N 2 O and CH 4 emissions is optional at the discretion of the user. In some cases such as a car rental company, or a company owning a large fleet of vehicles with catalytic controls, emissions from N 2 O might be significant. A few sources that provide detailed information on how to calculate N 2 O emissions are listed below: (i) IPCC/UNEP/OECD/IEA (1997) Revised 1996 IPCC Guidelines for National Greenhouse Gas Inventories, Paris: Intergovernmental Panel on Climate Change, United Nations Environment Programme; (ii) IPCC Good Practice Guidance, 2000; (iii) Inventory of U.S. Greenhouse Gas Emissions and Sinks: , U.S. Environmental Protection Agency, Office of Atmospheric Programs, EPA, April II. Calculation methodology used in the tool For all mobile sources, one may apply either a fuel-based or distance-based methodology to calculate CO 2 emissions. In the fuel-based approach, fuel consumption is multiplied by the CO 2 emission factor for each fuel type. This emission factor is developed based on the fuel s heat content, the fraction of carbon in the fuel that is oxidized (generally approximately 99% but assumed to be 100% in this tool), and the carbon content coefficient. Since this approach uses previously aggregated fuel consumption data, it is considered fuel-based. Fuel based approach can be used also when vehicle activity data and fuel economy factors are available that enables calculation of fuel consumption. In the distance-based method, emissions can be calculated by using distance based emission factors to calculate emissions. Activity data could be in terms of vehicle kilometers (or miles) traveled, freight ton-kilometers (or miles), passenger-kilometers (or miles), etc. Because the data on fuel are generally more reliable, the fuel-based method is the preferred approach for this tool. The distance based method should only be used as a last resort as it can introduce considerably higher levels of uncertainty in the CO 2 estimates. III. Choice of Activity Data and Emission Factors The following section presents possible sources of activity data and lists default emission factors, to be used if customized emission factors are not available. III. A. Activity Data Typical data source documentation for the different modes of transport are shown in Table 2. Fuel consumption data will usually be available from fuel receipts or other purchase records. 2 Otherwise, reports may be available on fuel expenditures only (i.e., fuel cost, but not actual fuel quantities). In this case, data on average fuel price are necessary in order to convert expenditures to fuel consumption. This data might be available directly from suppliers. Otherwise, national, regional, or local average fuel price data may be used. Direct measurement data may include information from fuel gauges or storage tanks, available in company records. 2 When using these receipts, distinguishing actual fuel consumption from fuel stock is important. Any fuel that is purchased but not consumed should not be incorporated into the emissions estimate. 3 If the distance-based approach is used for road transportation, data on distance traveled by vehicle type are necessary. These data should be available from records of odometer readings or other travel records. Data on fuel economy by vehicle type may be available in company fleet records, including original fleet purchase records. If the distance-based approach is used for air transport, data on distance traveled should be available in company records. Specific information on fuel consumed per unit of distance may be available from aircraft manufacturers or in company records. If the distance-based approach is used for water transport or rail transport, data on distance traveled should be available from company travel records. Data on average fuel consumed per unit of distance should be available in company records, including original purchase records. Fuel receipts. These receipts must be broken down by fuel and transportation-use only. Direct measurements of fuel use. This data can be obtained from vehicle fuel gauges or storage tanks. Otherwise, data can be obtained from financial records on fuel expenditures. These records can be used to generate estimates of fuel consumption using data on average fuel cost. III.B. Emission Factors Table 3 shows the CO 2 default emission factors, depending on fuel type. In the case of road transportation, companies and other entities have the option to override these defaults if they have appropriate data on the type of fuel used (i.e., the type and proportion of fuel additives) based on fuel characteristics for geographical regions. To do so, companies should specify the location where fuel is purchased and use default emission factors, for that geographic region. Companies may base customized emission factors on company-specific heat rates and/or carbon content coefficients for each fuel combusted. These data may be available from fuel purchase records. In most cases, default emission factors will be used, based on generic fuel type categories (e.g., unleaded gasoline, diesel, etc.). However, these emission factors may be customized by using company-specific information on fuel characteristics, based on either a) company-specific heat rate and/or carbon content coefficient information; or b) the location of gasoline purchases IV. Description of Calculation Methods This section describes the methods for calculating GHG emissions from transportation sources. Section IV.A. describes the fuel-based method and Section IV.B. describes the distance-based method for road transportation, air transport, water-borne sources (i.e., boat transportation) and rail transport. Both methods are available for all modes, however the fuel-based method is the preferred approach. IVA. Fuel-based Method: Calculations Based on Aggregated Fuel Consumption Data This section outlines the necessary steps for calculating CO 2 emissions from mobile sources using the fuel-based method, which is essentially the same as the fuel-based approach used to estimate GHG emissions from stationary combustion sources (see footnote 1). The major difference between stationary and mobile GHG emissions estimates is the different types of fuels and fuel emission factors for the two sources, although some are similar. The fuel-based approach is fairly straightforward and requires essentially two main steps: 4 Step 1: Gather fuel consumption data by fuel type. Fuel use data can be obtained from several different sources including fuel receipts, financial records on fuel expenditures, or direct measurements of fuel use. More detail on choice of fuel use data can be found in Section III.A. When the amount of fuel is not known, it can be calculated based on distance traveled and an efficiency factor of fuel-perdistance(such as miles per gallon, or liters per 100km) using Steps 1.1 and 1.2. Step 1.1: Collect data on distance traveled by vehicle type and fuel type. Distance traveled data can basically come in three forms, distance (e.g., kilometers) passenger-distance (e.g., passenger-kms), or freight distance (e.g., ton-miles). Step 1.2: Convert distance traveled data into fuel use values based on fuel economy factors. Fuel economy factors depend on the type, age, and operating practice of the vehicle in question. There are also different fuel economy factors for each of the different types of distance traveled activity data. Several default factors are given in Table 4 for different types of mobile sources. Fuel Use = Distance x Fuel Economy Factor Note: the units for the fuel economy factor will depend on the type of distance traveled activity data known (e.g., gallons per ton-mile if ton-miles given). Step 2: Convert fuel estimate to CO 2 emissions by multiplying results from step 1 by fuel-specific factors. There are different methods available to convert fuel use data into CO 2 emissions. The recommended approach is to first convert fuel use data into an energy value using the heating value of the fuel (if fuel use data is not first collected in terms of energy). The next step is to multiply by the emission factor of the fuel. Default or customized factors can be used (see Table 3). The fuel-based approach is the same for the different modes of transportation; road transport, air transport, water transport and rail transport. Differences arise for different types of fuels used in that the gasoline factors (primarily used for road transport) differ based on geographic area more so than other fuels. The following equation outlines the recommended approach to calculating CO 2 emissions based on fuel use (assuming data is first obtained in terms of mass or volume). CO 2 Emissions = Fuel Used x Heating Value x Emission factor IV.B. Distance-based Method: Calculations Based on Distance Traveled and Distance-based Emission Factors This section outlines the necessary steps for calculating CO 2 emissions from mobile sources using the distance-based method. This method can be used when vehicle activity data is in the form of distance traveled but fuel economy data is not available. In this case distance-based emission factors will be required to calculate CO 2 emissions. Calculating emissions requires two main steps: Step 1: Collect data on distance traveled by vehicle type and fuel type. Distance traveled data can basically come in three forms, distance (e.g., 5 kilometers) passenger-distance (e.g., passenger-kms), or freight distance (e.g., ton-miles). Step 2: Convert distance estimate to CO 2 emissions by multiplying results from step 1 by distance based emission factors. Several distance based default emission factors are given in Table 5 for different types of mobile sources and activity data. The following equation outlines the approach to calculating emissions based on distance traveled when fuel economy data is not available. CO 2 Emissions = Distance Traveled x Emission factor V. Choice of Methods As discussed in section IV, the fuel-based method is the preferred approach for all modes. There is greater uncertainty associated with calculations that are based on fuel expenditure or travel data. Deciding which approach to take fuel-based or distance-based depends on data availability. If neither the fuel-based or distance-based criteria can be met, additional data must be collected. Below are the criteria for determining which approach is feasible: V.A. V.B. Criteria for Fuel-based Method Are transportation-specific fuel purchase records available? 3 OR Are direct measurement data available (e.g., vehicle fuel gauge data)? OR Are financial records that summarize expenses on fuel available? Criteria for Distance-based Method Are distance activity data by vehicle type available? Are fuel economy factors by vehicle type available? Are distance based emission factors available? VI. Inventory Quality Assurance/Quality Control To ensure the credibility of the inventory, rigorous QA/QC procedures should be followed to ensure the accuracy, transparency, and verifiability of the estimates. The following issues must be addressed: Chapter 8 in the GHG protocol 1 st Edition, provides general guidelines for implementing a QA/QC process for all emission estimates. For transportation sources, this process should include a review of all activity data (e.g., fuel consumption data, distance traveled estimates), as well as any information used to develop customized emission factors (e.g., location of fuel purchases, cruising aircraft fuel consumption). 3 If fuel purchase records are not separated for transportation only, you may use the stationary combustion tool (available on the GHG Protocol website: 6 Checks should ensure that the best and most accurate emission factors are being used. If custom emission factors are available, are there any significant differences with the default numbers? VI.A. Uncertainty Assessment Uncertainties in calculating transportation emissions from mobile sources may result from several factors: If fuel-based method is used, fuel receipts are incomplete or do not clearly indicate purchases of specific fuel types; If fuel-based method is used, conversion of fuel expenditure data to fuel quantity based on fuel price data; If distance-based method is used, estimates of distance traveled and/or fuel economy are roughly estimated; and Emission factors are not customized to reflect actual conditions (e.g., default CO 2 emission factors are used for highway sources, instead of customized factors based on location of fuel purchases). In general, use of the fuel-based methods for produces less uncertainty than use of the distancebased methods. VII. Reporting and Documentation While documentation is not required to be reported or provided, it is generally necessary for companies or other entities interested in having their emissions audited and certified. In order to ensure that estimates are independently verifiable, quantitative input data used to develop emission estimates should be clearly documented, including listing of relevant year to which the data applies. Documentation should take the form of hard copies whenever possible, however electronic copies may be provided in certain cases. Table 2 shows the suggested documentation for mobile sources. 7 Table 1. Direct and Indirect Emissions from Mobile Sources Direct Emissions (Scope 1 Emissions) Travel in any owned or controlled 5 transportation devices, e.g. emissions due to fuel combustion from company owned airplanes, cars, trucks etc Indirect Emissions from Import of Energy (Scope 2 Emissions) 4 Import of electricity or steam to drive any owned or controlled transportation devices, e.g. import of electricity to drive company owned or controlled electric trains Other Indirect Emissions (Scope 3 Emissions) Travel in any transportation devices owned or controlled by another entity, e.g. employee commuting, business travel, goods transportation etc. in transport devices owned or controlled by another entity Table 2. Documentation for Mobile Sources Road transportation Air Transport Water Transport Methodology Source Fuel-based Distance-based Fuel receipts; or Fuel expenditure records; or Direct measurement records, including official logs of vehicle fuel gauges or storage tanks. Fuel receipts; or Fuel expenditure records; or Direct measurement records, including official logs of vehicle fuel gauges or storage tanks. Fuel receipts; or Fuel expenditure records; or Direct measurement records, including official logs of vehicle fuel gauges or storage tanks. Odometer logs or other records of vehicle miles of travel (must be given by vehicle type); and Company fleet records, showing data on fuel economy by vehicle type; or Vehicle manufacturer documentation showing fuel economy by vehicle type. Company records of fuel consumed per unit-of-distance traveled; or Aircraft manufacturer records of fuel consumed per unit-ofdistance traveled. Odometer logs or other records of miles (kms) of travel (must be given by vehicle type); and Company records of fuel consumed per unit-of-distance traveled; 4 Use stationary combustion tool to calculate scope 2 emissions. 5 See chapter 3 (Setting Organizational Boundaries) in GHG Protocol a corporate accounting and reporting standard, October 2001. Fact sheet Conversion factors Energy and carbon conversions 2011 update 1 Introduction This leaflet provides a number of useful conversion factors to help you calculate energy consumption in common units Technical Note: Conversion of fuel data to MWh Questions 12.2 and 12.3 of the information request ask for energy and fuel inputs to be reported according to standardized units commonly used for measuring 1 Worked example using the carbon footprint calculator after Engineers Ireland, 2010 Engineers Ltd. is a medium-sized engineering company with 40 employees. The management team want to promote the company Guidelines to Account for and Report on Guidelines Greenhouse togas Account Emissions for and Report Removals on Greenhouse for Buildings Gas (Commercial, Emissions and Residential Removals for orinstitutional Northeastern University Greenhouse Gas Inventory (2010) October 29, 2013 EXECUTIVE SUMMARY In accordance with American College and University Presidents Climate Commitment, the following report documents Prudential plc. Basis of Reporting: GHG emissions data and other environmental metrics. This Basis of Reporting document supports the preparation and reporting of GHG emissions data and other environmental The CarbonNeutral Company calculation methodology for the carbon calculator The CarbonNeutral Company carbon calculator allows an individual to calculate carbon emissions for flights driving, household 2012 Guidelines to Defra / DECC's Conversion Factors for Company Reporting Produced by AEA for the Department of Energy and Climate Change (DECC) and the Department for Environment, Food and Rural Affairs Supplier Guidance Document Energy and Fuel Use Data from Hertfordshire County Council Outsourced Services Hertfordshire County Council Version 5.1 January 2014 Contents Page 1. Background 3 2. Who we need Electricity North West Carbon Footprint Report 2013-2014 1. Introduction This report details the carbon consumption arising from the undertakings of Electricity North West Limited for the financial year FACTSHEET: Carbon Accounting for Smaller Entities has developed a system called Carbon Accounting for Smaller Entities (CASE). This is a method of accounting for carbon that has been developed particularly Carbon Footprint Report 2013 Explanatory Document to Carbon Report 1 Overview This report sets out to explain the rationale behind the methods we used, and the exceptions, difficulties or discrepancies Calculations and Emission Factors The CarbonNeutral Company works for organisations and individuals who want to reduce their carbon footprint. Our core services are carbon consulting and carbon offsetting Greenhouse Gas Emissions Assessment - Steffie Broer - THE APPROACH Climate change, caused by the emission of greenhouse gases (GHGs), threatens to have severe impacts on the environment and society over carbon footprinting a guide for fleet managers Introduction For some organisations, carbon footprinting is perceived to be about reducing emissions purely for environmental reasons. But it is primarily PURPOSE The purpose of this policy is to document the process for purchasing and managing the City s diverse vehicle fleet, which include both vehicles and heavy equipment, in a manner that minimizes greenhouse Submitted by United States of America Informal document WP.29-155-11 (155 th WP.29, 15-18 November 2011, agenda item 14) United States of America Environmental Protection Agency and National Highway Traffic 2014 Government GHG Conversion Factors for Company Reporting: FINAL July 2014 Crown copyright 2014 You may re-use this information (not including logos) free of charge in any format or medium, under the Calculating Your Carbon Footprint Overview In this activity, students will calculate their household s carbon footprint using the US EPA s Personal Emissions Calculator and will compare the size of their Biomethane in Vehicles October 2008 1 Gas vehicles A gas vehicles is a vehicle fuelled buy a gaseous fuel not liquid fuel. Seems simple, but not all gasses are the same, and storage methods vary 2 Definitions NATIONAL GREENHOUSE ACCOUNTS FACTORS Australian National Greenhouse Accounts July 2014 20 January 2008 Published by the Department of the Environment. www.environment.gov.au Commonwealth of Australia 2014 INDIANA UNIVERSITY PURDUE UNIVERSITY - INDIANAPOLIS CARBON FOOTPRINT 4/10/2009 Greenhouse Gas (GHG) Report for IUPUI Campus This report provides the for the Indiana University Purdue University Indianapolis 1 Shrink That Footprint is an independent research group devoted to helping people concerned about climate change understand, calculate and reduce their carbon footprints. In particular we focus on reducing Communicating Your Commitment: Your Guide to Clean Energy Messaging Congratulations on your recent purchase of clean energy from Renewable Choice! Whether you ve purchased green power in the form of renewable energy consumption and carbon dioxide emissions on the railway March 2007 Summary This paper addresses the current carbon dioxide (CO 2 ) emissions of rail, car and domestic air travel, together with trends CANADIAN WESTERN NATURAL GAS COMPANY LIMITED ACCEPTING THE CHALLENGE EXECUTIVE SUMMARY In May of 1995, Canadian Western Natural Gas joined Canadian industry leaders in support of Canada's Voluntary Challenge Energy Efficiency of Ships: what are we talking about? Flickr.com/OneEIghteen How do you measure ship efficiency? What is the best metric? What is the potential for regulation? CONTEXT In July 2011, the Technical Paper E1 (a) Energy Consumption in Cornwall Cornwall Council January 2012 N.B. This is a live document that will be updated. 1 2 Technical Paper E1 (a) Energy Consumption in Cornwall Contents L 103/10 Official Journal of the European Union 23.4.2009 II (Acts adopted under the EC Treaty/Euratom Treaty whose publication is not obligatory) DECISIONS COMMISSION COMMISSION DECISION of 16 April 2009 SCRA Sustainability Report 2012/13 Changing f or children and young people SCRA Sustainability Report 2012/13 This report contains information about SCRA s environmental impact during 2012/13. This information STATISTICAL RELEASE: 15 DECEMBER 2011 EMISSIONS OF AIR POLLUTANTS IN THE UK, 1970 TO 2010 The UK has met current international targets to reduce total emissions by 2010 of four air pollutants that cause 2013 SmartWay Excellence Awards The 2013 SmartWay Excellence Awards program for shippers, logistics companies and freight carriers is a recognition program of the U.S. Environmental Protection Agency s How Clean is Your Car Brand? The car industry's commitment to the EU to reduce CO 2 emissions: a brand-by-brand progress report October 2006 How Clean is Your Car Brand? The car industry's commitment to Carbon Footprint Calculator for Royal Society of Arts This Carbon Calculator has been produced for Royal Society of Arts to enable the company to better understand its environmental performance in terms Jersey Energy Trends 25 Headlines In 25 total final energy demand in Jersey was 187 million toe (2,17, 9 MWh) an increase of.1% on 24. Final consumption of electricity grew by 1.2% between 24 and 25. Over
High
[ 0.674509803921568, 32.25, 15.5625 ]
In a mobile communication system, a single base station (i.e., Node-B) communicates with at least one mobile station over a radio frequency (RF) channel. In a system for transmitting a packet over a multiple sub-carrier, a base station receives the packet over a wired Internet, and transmits the received packet to each mobile station according to a predetermined communication scheme. In this case, downlink scheduling takes a role in determining when the base station transmits data, what frequency bandwidth the base station uses and which mobile station the base station transmits data to. The base station receives data from the mobile station using a pre-determined communication scheme, demodulates the received data, and transmits the demodulated packet to the wired Internet. Uplink scheduling takes a role in determining when the mobile station transmits data, what frequency bandwidth the mobile station uses and which base station the mobile station transmits data to. Typically, a mobile station having a good channel condition can transmit/receive data using much more frequency resources during a longer time. In communication system for performing communication using at least two carriers, communication resource includes a time-domain resource and a frequency-domain resource, and the time-domain resource and the frequency-domain resource can be defined in predetermined units. For example, a resource block composed of N sub-carriers and M time units (e.g., M sub-frames) can be defined (where, N or M may be set to an integer>1) FIG. 1 shows an example of the resource block. Referring to FIG. 1, each square indicates a single resource block. The single resource block comprises the set of a predetermined number of sub-carriers transmitted within a predetermined time. In a downlink, the base station allocates the resource block to a selected mobile station according to a predetermined scheduling rule, and transmits data to the mobile station using the allocated resource block. In an uplink, the base station allocates the resource block to the selected mobile station according to a predetermined scheduling rule, and transmits data to the base station using the resource block. A method for controlling a packet-reception failure is classified into an automatic repeat request (ARQ) and a hybrid automatic repeat request (HARQ). In the ARQ, if a transmitter receives an acknowledgement (ACK) signal after transmitting a packet (or a frame), it transmits a new packet. Otherwise, if the transmitter receives a negative acknowledgement (NACK) signal, it re-transmits the packet. If a receiver receives a packet and successfully decodes the received packet, it transmits an ACK signal. Otherwise, if the receiver fails to decode the packet, it transmits a NACK signal, deletes the received packet from a buffer, and waits for a re-transmission packet. In the HARQ, if a transmitter receives an acknowledgement (ACK) signal after transmitting a packet, it transmits a new packet. Otherwise, if the transmitter receives a negative acknowledgement (NACK) signal, it re-transmits the packet to which a FEC (Forward Error Correction) coding is applied. Therefore, if the decoding process for the received packet is successfully performed, the receiver transmits the ACK signal. Otherwise, it transmits the NACK signal and stores the received packet in a buffer. Upon receipt of the re-transmission packet according to the NACK signal, the receiver combines the re-transmission packet with the stored packet, and decodes the combined result, to increase a successful reception rate. The HARQ can be classified into a synchronous HARQ and an asynchronous HARQ according to re-transmission timing. In case of the synchronous HARQ, if a first transmission of a packet fails, a re-transmission of the packet is executed at a specific time determined by the system. For example, if the system is designed to re-transmit the packet at intervals of a fourth time unit after the first transmission failure, there is no need to inform the receiver of any information about re-transmission time. Therefore, if the transmitter receives the NACK signal, it re-transmits the packet at intervals of four time units. In case of the asynchronous HARQ, re-transmission time information is scheduled. Therefore, the re-transmission time corresponding to the NACK signal is changed according to a variety of factors such as a channel condition. The HARQ can be classified into a channel-adaptive HARQ and a channel-non-adaptive HARQ on the basis of specific data indicating whether channel condition information is reflected or not in determining an amount of resources for re-transmission. The channel-non-adaptive HARQ uses a same number of resource blocks determined in a first transmission to modulate a re-transmission packet. For example, if the transmitter transmits data using 8 resource blocks for a first transmission, it re-transmits the data using the 8 resource blocks in the same manner of the first transmission. The channel-adaptive HARQ changes the number of resource blocks to modulate a re-transmission packet according to channel conditions. For example, although the transmitter transmits data using 8 resource blocks for a first transmission, it re-transmits the data using 8 or less resource blocks according to channel condition. A synchronous HARQ, an asynchronous HARQ, a channel-non-adaptive HARQ, and a channel-adaptive HARQ method are combined to acquire four type HARQ control methods. Representative examples of the four type HARQ control methods are an as synchronous channel-adaptive HARQ and a synchronous channel-non-adaptive HARQ. The asynchronous channel-adaptive HARQ adaptively changes a re-transmission timing and an amount of resources according to channel condition, such that it can more efficiently re-transmit desired data. However, the asynchronous channel-adaptive HARQ has a disadvantage in that it inevitably increases overhead. The synchronous channel-non-adaptive HARQ fixes a re-transmission timing and an amount of resources required for the re-transmission, such that almost no overhead is required for the re-transmission. However, the synchronous channel-non-adaptive HARQ has a disadvantage in that it inevitably deteriorates re-transmission efficiency. A system for transmitting a signal using at least two carriers allocates radio resources in units of a resource block composed of the set of a predetermined number of sub-carriers transmitted within a fixed time. In case that the radio resources are allocated in resource block units, method of allocating radio resources efficiently to a mobile station that performs re-transmission is needed.
Mid
[ 0.611111111111111, 35.75, 22.75 ]