text
stringlengths
8
5.74M
label
stringclasses
3 values
educational_prob
listlengths
3
3
1. Field of the Invention This invention relates to a method and an apparatus for decoding a Transport Format Combination Indicator (TFCI) inserted into a radio frame, in a mobile communications system using a Wideband-Code Division Multiple Access (hereinafter referred to as W-CDMA) system. The present invention also relates to a mobile station apparatus and a base station apparatus, which include the above decoding method and the above decoding. The present invention further relates to a method which is used for multiplexing information in mobile communications and which is suitable for the above decoding method. 2. Description of the Related Art One method used in current mobile communications field is a method of multiplexing different pieces of information such as audio and packet having different qualities of service (hereinafter referred to as QoS) into a same radio frame and then transporting the frame through a radio circuit. One of such methods is known as a W-CDMA method being studied by a Third Generation Partnership Project (hereinafter referred to as 3GPP). FIG. 9 shows an exemplary state of a plurality of pieces of information being multiplexed in accordance with the W-CDMA method. As shown in FIG. 9, one radio frame has a length of 10 milliseconds (hereinafter referred to as msec) and may multiplex a plurality of pieces of information in each radio frame. The W-CDMA method used in FIG. 9 may select and set a Transmission Time Interval (hereinafter referred to as TTI and which represents the shortest time length during which data may be decoded) for each of a plurality of pieces of information to be multiplexed, out of predetermined four kinds of TTIs. The four kinds of TTIs to be selected include 10 msec, 20 msec, 40 msec and 80 msec. In a case of FIG. 9, information A has a TTI of 10 msec, information B has a TTI of 20 msec, and information C has a TTI of 10 msec. In addition, the number of data within the TTI of each information (hereinafter, the number of data within the TTI is referred to as intra-TTI data length) may be arbitrarily selected. In other words, the W-CDMA method allows having different intra-TTI data lengths of a plurality of pieces of information to be multiplexed, even within a same type of radio frames. This allows pieces of information having different QoSs to be multiplexed and transported. As described above, the W-CDMA method allows the pieces of information having different intra-TTI data lengths to be multiplexed and transported, so that information regarding the intra-TTI data length of each of the pieces of information to be multiplexed needs to be transmitted to a receiving side. Thus, in the W-CDMA method, a Transport Format Combination Indicator (hereinafter referred to as TFCI) is used as information indicating a combination of intra-TTI data lengths of the plurality of pieces of information to be multiplexed so as to be inserted in the radio frame as shown in FIG. 10 and transported. In other words, as shown in FIG. 10, one frame is composed of fifteen slots, and each of the slots has the plurality of pieces of information to be multiplexed and TFCI inserted therein. The TFCI indicates the intra-TTI data length of each piece of information by a value of a transport format of each piece of information (normally the number of the transport format). A value of the TFCI is determined with regard to a combination of values of transport formats of the plurality of pieces of information-to be multiplexed. For example, FIG. 11 shows a case where two pieces of information having different QoS (i.e., information 1 and information 2) are multiplexed, and an exemplary mapping table showing a correspondence between a value of the Transport Format (hereinafter referred to as TF value), which represents the intra-TTI data lengths of the information 1 and the information 2, and TFCI values. TF1 and TF2 represent TF values of the information 1 and the information 2, respectively. In FIG. 11, TF1 shows that the information 1 has sixty-four kinds of intra-TTI data lengths, and TF2 shows that the information 2 has four kinds of intra-TTI data length. In addition to the use of the TFCI, details of the intra-TTI data length of the TF values TF1 and TF2 of each piece of information and a mapping table as shown in FIG. 11 are notified through a control channel to the receiving side. FIG. 12 shows an exemplary table showing a correspondence between the TF value of each piece of information and the intra-TTI data length thereof in a case of the TF values TF1 and TF2 of the information 1 and the information 2 and the intra-TTI data lengths. From the description above, the W-CDMA method allows the receiving side to extract the TFCI out of the received data, thereby allowing a TFCI decoder to decode the extracted TFCI to obtain the TFCI value. As a result, the TF value of each piece of information is calculated based on the table showing the correspondence between TFCIs which have been previously acquired through the control channel and the TF values. Then, the table showing the correspondence between the TF value of each piece of information and the intra-TTI data length is used to calculate the intra-TTI data length corresponding to the calculated TF value of each piece of information. Finally, received multiplexed data is divided into the information 1 and the information 2, thereby allowing respective data to be decoded. The W-CDMA method represents the TFCI as information of 10 bits and has 1024 combinations of TF values for the plurality of pieces of information to be multiplexed. When the number of combinations of TF values for the plurality of pieces of information to be multiplexed may be expressed by 10 bits of less, the TFCIs of the pieces of information are made to have 10 bits by inserting “0” into the most significant bit (MSB) side of the TFCI. In addition, the TFCI is encoded at a sending side for the purpose of error correction. How to encode TFCI bits in accordance with 3GPP standards will be described as follows. When information of 10 bits of the TFCI to be inputted into an encoder are assumed to be a9, a8, a7, a6, a5, a4, a3, a2, a1 and a0 (wherein a9 is the MSB and a0 is a least significant bit (LSB)), a code word bi (i=0, . . . , 31) included in an output from the encoder is calculated through an expression (1) shown in FIG. 13. In the expression (1), Mi,n represents a coefficient acquired through the table shown in FIG. 14. According to the 3GPP standards, the-TFCI stored in one radio frame shown in FIG. 9 has a field of 30 bits. Thus, the code word bi of 32 bits is subject to a puncture processing to delete b30 and b31, thereby obtaining 30 bits. Thereafter, the field of 30 bits is inserted into a TFCI field of the radio frame shown in FIG. 9. Subsequently, data of the radio frame shown in FIG. 9 is subject to a QPSK modulation and further subject to a spectrum diffusion modulation, to then transport the data. The data in the radio frame as described above is received by a base station or a mobile station (e.g., mobile terminal). Then, the received data is subject to an extraction to extract a TFCI code word from the TFCI field, thereby decoding the extracted TFCI code word as described in the following. Thereafter, the TFCI value of the decoded TFCI code word is checked in order to detect the correspondence between each of the plurality of pieces of information being multiplexed and the intra-TTI data length by referring to the table which has been previously sent from the control channel. The detected correspondence is used as a base for dividing the plurality of pieces of information being multiplexed, to then decode the plurality of pieces of information. FIG. 15 shows an example of a configuration of a decoding section of TFCI code word. A received signal is subject to an inverse diffusion to collect TFCI code words inserted in the radio frame, then inputting the collected TFCI code words into a de-puncture processing section 1. The de-puncture processing section 1 inserts two “0”s into the last part of the inputted 30 bits of TFCI code word, thereby obtaining 32 bits of TFCI code word. The TFCI code word which has been inserted with 2 bits of “0” is represented as Ri (where i=0, 1, . . . , 31). The TFCI code word Ri of 32 bits is supplied to a de-masking processing section 2. The de-masking processing section 2 performs a de-masking processing that corresponds to the one using Mi,6 to Mi,9 of the above described coefficients Mi,n shown in FIG. 14. In other words, the coefficients Mi,6 to Mi,9 among the coefficients Mi,n are mask codes and are used by the de-masking processing section 2 for removing a mask. The specific de-masking processing will be performed according to the following procedures of {circle around (1)} and {circle around (2)}. {circle around (1)} A value is selected which may be a candidate for high-order four bits (a9, a8, a7, a6) of the TFCI corresponding to the mask codes Mi,9. When the TFCI may take values ranging from 0 to 255, for instance, the value of the TFCI may be expressed by 8 bits and thus 2 bits a9 and a8 from the most significant bit of 10 bits of the TFCI is “0”. In this case, a7 and a6 may take “0” or “1” and thus, there are four patterns of high-order four bits of the TFCI. {circle around (2)} An expression (2) shown in FIG. 13 is used to obtain a value of EX. If the result shows the value EX=“1”, a plus or minus sign of “Ri” is inverted and, if the result shows the value EX=“0”, “Ri” is left as it is. This processing is performed for all of the values of “Ri” where i=0,1, . . . 31. Next, the data which has been de-masked by the de-masking processing section 2 is subject to a fast Hadamard transformation (FHT) by a fast Hadamard transformation section 3 to obtain a correlation value. The fast Hadamard transformation is a calculation method of efficiently performing a multiplication of the de-masked data and a Hadamard matrix. The above processing according to the procedures of {circle around (1)} and {circle around (2)} is performed to all possible patterns of candidates of high-order four bits of the TFCI (a9, a8, a7, a6). In the case of the above-described FIG. 11 where the TFCI may take the values ranging from 0 to 225, the candidates of bits a9, a8, a7, a6 may take four patterns as described above and thus, the de-masking processing and the fast Hadamard transformation processing are repeated total of four times. In a case where the TFCI value is 512 or more and all of 10 bits of the TFCI is used, the candidates of bits a9, a8, a7, a6 may take 16 patterns and thus, the de-masking processing and the fast Hadamard transformation processing are repeated total of 16 times. All of the results of repeating the de-masking processing and the fast Hadamard transformation processing a plurality of times are supplied to a correlation computation section 4. This correlation computation section 4 compares absolute values of all correlation values acquired through the above-described plurality of outputs by the fast Hadamard transformation section 4 to detect a maximum value of the absolute values, thereby obtaining a TFCI value which has been transmitted. With regard to the TFCI value thus obtained, the mapping table as shown in FIG. 11 which has been previously sent by the control channel and the table shown in FIG. 12 are referred as described above to find the intra-TTI data length of the information being multiplexed, thereby dividing the multiplexed data into each piece of information for decoding. It is noted that each of the processing sections shown in FIG. 15 may be separately configured as an independent hardware, or a part or the entirety of the processing sections shown in FIG. 15 maybe configured as a Digital Signal Processor (DSP).
Mid
[ 0.642706131078224, 38, 21.125 ]
Long-term plasma levels and dose modulation of alacepril in patients with chronic renal failure. Because most angiotensin-converting enzyme inhibitors are excreted into urine, any decrease in renal function increases the plasma levels of these drugs. This study was designed to investigate the appropriate doses of alacepril in patients with chronic renal failure. The total plasma concentration of captopril, an active metabolite of alacepril, was measured in 47 patients with chronic renal failure or normal renal function. Fifteen patients on chronic hemodialysis were also enrolled in this study. In patients treated with 12.5, 25 and 50 mg alacepril, the plasma concentration of captopril was linearly correlated with serum creatinine and creatinine clearance (Ccr). There was an approximately 40% decrease of the plasma captopril concentration after 4 h of hemodialysis. Among patients treated with 25 or 50 mg alacepril for 4.5 years, the plasma concentration of captopril gradually increased along with an increase in serum creatinine (from 2.0 to 5.8, and from 1.9 to 7.1 mg/dL, respectively). Although the plasma concentration of captopril was higher in the 50 mg group, the increase in serum creatinine during this period was not different between the two groups. The plasma aldosterone concentration did not increase during this period. These data suggest that alacepril should be reduced from 50 to 25 and 12.5 mg/day in patients with a serum creatinine level of greater than 2-3 and 4-6 mg/dL, respectively, in order to maintain a plasma level equivalent to that in subjects with normal renal function receiving 50 mg/day alacepril. For patients on chronic hemodialysis, 12.5 mg alacepril is the appropriate dose.
High
[ 0.6965174129353231, 35, 15.25 ]
//Log //Singleton that logs information //Log singleton var Log = { elem: null, timer: null, getElem: function() { if (!this.elem) { return (this.elem = $('log-message')); } return this.elem; }, write: function(text, hide) { if (this.timer) { this.timer = clearTimeout(this.timer); } var elem = this.getElem(), style = elem.parentNode.style; elem.innerHTML = text; style.display = ''; if (hide) { this.timer = setTimeout(function() { style.display = 'none'; }, 2000); } } }; //RightMenu var RightMenu = function(airlineList, airlineMgr) { var me = this; me.airlineList = airlineList; me.airlineMgr = airlineMgr; me.selectedAirlines = $('selected-airlines'); airlineList.addEventListener('mousemove', function(e) { me.onMouseMove(e); }, false); airlineList.addEventListener('mouseout', function(e) { me.onMouseOut(e); }, false); airlineList.addEventListener('change', function(e) { me.onChange(e); }, false); me.selectedAirlines.addEventListener('click', function(e) { me.onClick(e); }, false); me.selectedAirlines.addEventListener('mousemove', function(e) { me.onHover(e); }, false); me.selectedAirlines.addEventListener('mouseout', function (e) { me.onLeave(e); }, false); }; RightMenu.prototype = { load: function(html) { this.airlineList.innerHTML = html; }, onMouseMove: function(e) { var target = e.target, nodeName = target.nodeName; if (nodeName == 'INPUT') { target = target.parentNode; } if (nodeName == 'LABEL') { target = target.parentNode; } if (target.nodeName == 'LI') { var elem = target, prev = elem, next = elem.nextSibling, x = e.pageX, y = e.pageY, tol = 30, box, elemY, style, lerp; while (prev || next) { if (prev) { style = prev.style; box = prev.getBoundingClientRect(); elemY = (box.top + box.bottom) / 2; lerp = (1 + Math.min(Math.abs(y - elemY), tol) / tol * -1); prev = prev.previousSibling; style.fontSize = (1 + (1.6 - 1) * lerp) + 'em'; } if (next) { style = next.style; box = next.getBoundingClientRect(); elemY = (box.top + box.bottom) / 2; lerp = (1 + Math.min(Math.abs(y - elemY), tol) / tol * -1); next = next.nextSibling; style.fontSize = (1 + (1.6 - 1) * lerp) + 'em'; } } } }, onMouseOut: function(e) { var nodeName = e.relatedTarget && e.relatedTarget.nodeName; if (nodeName && 'INPUT|LI|LABEL'.indexOf(nodeName) == -1) { Array.prototype.slice.call(airlineList.getElementsByTagName('li')).forEach(function(elem) { elem.style.fontSize = '1em'; }); } }, onChange: function(e) { var checkbox = e.target, label = checkbox.parentNode, airlineId = checkbox.id.split('-')[1], name = label.textContent, airlineMgr = this.airlineMgr, color = airlineMgr.getColor(airlineId) || airlineMgr.getAvailableColor(); if (checkbox.checked) { this.selectedAirlines.innerHTML += '<li id=\'' + airlineId + '-selected\'>' + '<input type=\'checkbox\' checked id=\'' + airlineId + '-checkbox-selected\' />' + '<div class=\'square\' style=\'background-color:rgb(' + color + ');\' ></div>' + name + '</li>'; } else { var node = $(airlineId + '-selected'); node.parentNode.removeChild(node); } }, onClick: function(e) { var target = e.target, node; if (target.nodeName == 'INPUT') { var airlineId = target.parentNode.id.split('-')[0]; var checkbox = $('checkbox-' + airlineId); checkbox.checked = false; airlineMgr.remove(airlineId); target = target.parentNode; node = target.nextSibling || target.previousSibling; target.parentNode.removeChild(target); if (node && node.id) { centerAirline(node.id.split('-')[0]); } } else { if (target.nodeName == 'DIV') { target = target.parentNode; } centerAirline(target.id.split('-')[0]); } }, onHover: function(e) { var target = e.target, airlineId; if (target.nodeName == 'INPUT') { airlineId = target.parentNode.id.split('-')[0]; } else { if (target.nodeName == 'DIV') { target = target.parentNode; } airlineId = target.id.split('-')[0]; } for (var name in models.airlines) { models.airlines[name].lineWidth = name == airlineId ? 2 : 1; } }, onLeave: function(e) { var rt = e.relatedTarget, pn = rt && rt.parentNode, pn2 = pn && pn.parentNode; if (rt != this.selectedAirlines && pn != this.selectedAirlines && pn2 != this.selectedAirlines) { for (var name in models.airlines) { models.airlines[name].lineWidth = 1; } } } }; //AirlineManager //Takes care of adding and removing routes //for the selected airlines var AirlineManager = function(data, models) { var airlineIdColor = {}; var availableColors = { '171, 217, 233': 0, '253, 174, 97': 0, '244, 109, 67': 0, '255, 115, 136': 0, '186, 247, 86': 0, '220, 50, 50': 0 }; var getAvailableColor = function() { var min = Infinity, res = false; for (var color in availableColors) { var count = availableColors[color]; if (count < min) { min = count; res = color; } } return res; }; return { airlineIds: [], getColor: function(airlineId) { return airlineIdColor[airlineId]; }, getAvailableColor: getAvailableColor, add: function(airline) { var airlineIds = this.airlineIds, color = getAvailableColor(), routes = data.airlinesRoutes[airline], airlines = models.airlines, model = airlines[airline], samplings = 10, vertices = [], indices = [], fromTo = [], sample = [], parsedColor; parsedColor = color.split(','); parsedColor = [parsedColor[0] / (255 * 1.3), parsedColor[1] / (255 * 1.3), parsedColor[2] / (255 * 1.3)]; if (model) { model.uniforms.color = parsedColor; } else { for (var i = 0, l = routes.length; i < l; i++) { var ans = this.createRoute(routes[i], vertices.length / 3); vertices.push.apply(vertices, ans.vertices); fromTo.push.apply(fromTo, ans.fromTo); sample.push.apply(sample, ans.sample); indices.push.apply(indices, ans.indices); } airlines[airline] = model = new O3D.Model({ vertices: vertices, indices: indices, program: 'airline_layer', uniforms: { color: parsedColor }, render: function(gl, program, camera) { gl.lineWidth(this.lineWidth || 1); gl.drawElements(gl.LINES, this.$indicesLength, gl.UNSIGNED_SHORT, 0); }, attributes: { fromTo: { size: 4, value: new Float32Array(fromTo) }, sample: { size: 1, value: new Float32Array(sample) } } }); model.fx = new Fx({ transition: Fx.Transition.Quart.easeOut }); } this.show(model); airlineIds.push(airline); //set color for airline Id availableColors[color]++; airlineIdColor[airline] = color; }, remove: function(airline) { var airlines = models.airlines, model = airlines[airline], color = airlineIdColor[airline]; this.hide(model); //unset color for airline Id. availableColors[color]--; delete airlineIdColor[airline]; }, show: function(model) { model.uniforms.animate = true; this.app.scene.add(model); model.fx.start({ delay: 0, duration: 1800, onCompute: function(delta) { model.uniforms.delta = delta; }, onComplete: function() { model.uniforms.animate = false; } }); }, hide: function(model) { var me = this; model.uniforms.animate = true; model.fx.start({ delay: 0, duration: 900, onCompute: function(delta) { model.uniforms.delta = (1 - delta); }, onComplete: function() { model.uniforms.animate = false; me.app.scene.remove(model); } }); }, getCoordinates: function(from, to) { var pi = Math.PI, pi2 = pi * 2, sin = Math.sin, cos = Math.cos, theta = pi2 - (+to + 180) / 360 * pi2, phi = pi - (+from + 90) / 180 * pi, sinTheta = sin(theta), cosTheta = cos(theta), sinPhi = sin(phi), cosPhi = cos(phi), p = new Vec3(cosTheta * sinPhi, cosPhi, sinTheta * sinPhi); return { theta: theta, phi: phi, p: p }; }, //creates a quadratic bezier curve as a route createRoute: function(route, offset) { var key1 = route[2] + '^' + route[1], city1 = data.cities[key1], key2 = route[4] + '^' + route[3], city2 = data.cities[key2]; if (!city1 || !city2) { return { vertices: [], from: [], to: [], indices: [] }; } var c1 = this.getCoordinates(city1[2], city1[3]), c2 = this.getCoordinates(city2[2], city2[3]), p1 = c1.p, p2 = c2.p, p3 = p2.add(p1).$scale(0.5).$unit().$scale(p1.distTo(p2) / 3 + 1.2), theta1 = c1.theta, theta2 = c2.theta, phi1 = c1.phi, phi2 = c2.phi, pArray = [], pIndices = [], fromTo = [], sample = [], t = 0, count = 0, samplings = 10, deltat = 1 / samplings; for (var i = 0; i <= samplings; i++) { pArray.push(p3[0], p3[1], p3[2]); fromTo.push(theta1, phi1, theta2, phi2); sample.push(i); if (i !== 0) { pIndices.push(i -1, i); } } return { vertices: pArray, fromTo: fromTo, sample: sample, indices: pIndices.map(function(i) { return i + offset; }), p1: p1, p2: p2 }; } }; };
Low
[ 0.51889168765743, 25.75, 23.875 ]
Q: how to set update and delete button for every item in listview activity_main.xml <?xml version="1.0" encoding="utf-8"?> <RelativeLayout xmlns:android="http://schemas.android.com/apk/res/android" xmlns:app="http://schemas.android.com/apk/res-auto" xmlns:tools="http://schemas.android.com/tools" android:layout_width="match_parent" android:layout_height="match_parent" tools:context=".MainActivity"> <ScrollView android:id="@+id/scroll_view" android:layout_width="match_parent" android:layout_height="match_parent"> <LinearLayout android:id="@+id/linearlayout1" android:layout_width="match_parent" android:layout_height="match_parent" android:orientation="vertical"> <TextView android:id="@+id/tv_name1" android:layout_width="match_parent" android:layout_height="wrap_content" android:layout_marginLeft="30dp" android:layout_marginTop="15dp" android:layout_marginRight="30dp" android:padding="15dp" android:text="Name:" android:textSize="15sp" /> <EditText android:id="@+id/et_name1" android:layout_width="match_parent" android:layout_height="wrap_content" android:layout_marginLeft="30dp" android:layout_marginRight="30dp" android:hint="Enter Your Name" android:padding="15dp" android:textSize="15sp" /> <TextView android:id="@+id/tv_email" android:layout_width="match_parent" android:layout_height="wrap_content" android:layout_marginLeft="30dp" android:layout_marginRight="30dp" android:padding="15dp" android:text="Email:" android:textSize="15dp" /> <EditText android:id="@+id/et_email" android:layout_width="match_parent" android:layout_height="wrap_content" android:layout_marginLeft="30dp" android:layout_marginRight="30dp" android:hint="Enter Your Mail" android:textSize="15dp" /> <TextView android:id="@+id/tv_phoneno" android:layout_width="match_parent" android:layout_height="wrap_content" android:layout_marginLeft="30dp" android:layout_marginRight="30dp" android:padding="15dp" android:text="Phone No:" android:textSize="15dp" /> <EditText android:id="@+id/et_phoneno" android:layout_width="match_parent" android:layout_height="wrap_content" android:layout_marginLeft="30dp" android:layout_marginRight="30dp" android:hint="Enter your Contact No" android:padding="15dp" android:textSize="15dp" /> <LinearLayout android:layout_width="match_parent" android:layout_height="match_parent" android:orientation="horizontal" android:padding="15dp" android:weightSum="2"> <TextView android:id="@+id/tv_dob" android:layout_width="0dp" android:layout_height="wrap_content" android:layout_marginLeft="30dp" android:layout_marginRight="30dp" android:layout_weight="1" android:text="DOB:" android:textSize="15dp" /> <Button android:id="@+id/datepicker1" android:layout_width="0dp" android:layout_height="30dp" android:layout_marginLeft="30dp" android:layout_marginRight="70dp" android:layout_weight="1" android:textSize="15dp"> </Button> </LinearLayout> <TextView android:id="@+id/tv_qualification" android:layout_width="match_parent" android:layout_height="match_parent" android:layout_marginLeft="30dp" android:layout_marginRight="30dp" android:padding="15dp" android:text="Qualification" android:textSize="15dp" /> <EditText android:id="@+id/et_qualification" android:layout_width="match_parent" android:layout_height="wrap_content" android:layout_marginLeft="30dp" android:layout_marginRight="30dp" android:hint="Enter Your Qualification" android:padding="15dp" android:textSize="15dp" /> <LinearLayout android:id="@+id/linearlayout2" android:layout_width="match_parent" android:layout_height="match_parent" android:orientation="horizontal" android:padding="15dp" android:weightSum="2"> <TextView android:id="@+id/tv_time" android:layout_width="0dp" android:layout_height="wrap_content" android:layout_marginLeft="30dp" android:layout_marginRight="30dp" android:layout_weight="1" android:text="Time:" android:textSize="15dp" /> <Button android:id="@+id/timepicker1" android:layout_width="0dp" android:layout_height="30dp" android:layout_marginLeft="30dp" android:layout_marginRight="70dp" android:layout_weight="1" android:textSize="15dp"> </Button> </LinearLayout> <Button android:id="@+id/button_save" android:layout_width="wrap_content" android:layout_height="wrap_content" android:text="Save" android:layout_gravity="center" android:textSize="15dp"> </Button> </LinearLayout> </ScrollView> </RelativeLayout> MainActivity import android.app.DatePickerDialog; import android.app.TimePickerDialog; import android.content.Intent; import android.icu.text.SimpleDateFormat; import android.os.Build; import android.support.annotation.RequiresApi; import android.support.v7.app.AppCompatActivity; import android.os.Bundle; import android.view.View; import android.widget.Button; import android.widget.DatePicker; import android.widget.EditText; import android.widget.TextView; import android.widget.TimePicker; import java.text.ParseException; import java.util.Calendar; import java.util.Date; import static android.content.Intent.EXTRA_EMAIL; import static android.content.Intent.EXTRA_PHONE_NUMBER; import static android.os.DropBoxManager.EXTRA_TIME; import static android.security.KeyChain.EXTRA_NAME; public class MainActivity extends AppCompatActivity implements View.OnClickListener { public static final String EXTRA_NAME = "com.example.android.persondetails.EXTRA_NAME"; public static final String EXTRA_EMAIL = "com.example.android.persondetails.EXTRA_EMAIL"; public static final String EXTRA_PHONE_NUMBER = "com.example.android.persondetails.EXTRA_PHONE_NUMBER"; public static final String EXTRA_DOB = "com.example.android.persondetails.EXTRA_DOB"; public static final String EXTRA_QUALIFICATION = "com.example.android.persondetails.EXTRA_QUALIFICATION"; public static final String EXTRA_TIME = "com.example.android.persondetails.EXTRA_TIME"; Button button1, button2, button3; TextView textView1, textView2, textView3, textView4, textView5, textView6; EditText editText1, editText2, editText3, editText4; private int mYear, mMonth, mDay, mHour, mMinute, format; @Override protected void onCreate(Bundle savedInstanceState) { super.onCreate(savedInstanceState); setContentView(R.layout.activity_main); button3 = (Button) findViewById(R.id.button_save); textView1 = (TextView) findViewById(R.id.tv_name1); textView2 = (TextView) findViewById(R.id.tv_email); textView3 = (TextView) findViewById(R.id.tv_phoneno); textView4 = (TextView) findViewById(R.id.tv_dob); textView5 = (TextView) findViewById(R.id.tv_qualification); textView6 = (TextView) findViewById(R.id.tv_time); button1 = (Button) findViewById(R.id.datepicker1); button2 = (Button) findViewById(R.id.timepicker1); button1.setOnClickListener(this); button2.setOnClickListener(this); button3.setOnClickListener(this); } @Override public void onClick(View v) { if (v == button1) { final Calendar c = Calendar.getInstance(); mYear = c.get(Calendar.YEAR); mMonth = c.get(Calendar.MONTH); mDay = c.get(Calendar.DAY_OF_MONTH); format = c.get(Calendar.AM_PM); DatePickerDialog datePickerDialog = new DatePickerDialog(this, new DatePickerDialog.OnDateSetListener() { @Override public void onDateSet(DatePicker view, int year, int monthOfYear, int dayOfMonth) { textView4.setText(dayOfMonth + "-" + (monthOfYear + 1) + "-" + year); } }, mYear, mMonth, mDay); datePickerDialog.show(); } if (v == button2) { final Calendar c = Calendar.getInstance(); mHour = c.get(Calendar.HOUR_OF_DAY); mMinute = c.get(Calendar.MINUTE); format = c.get(Calendar.AM_PM); final TimePickerDialog timePickerDialog; timePickerDialog = new TimePickerDialog(this, new TimePickerDialog.OnTimeSetListener() { @RequiresApi(api = Build.VERSION_CODES.N) @Override public void onTimeSet(TimePicker timePicker, int selectedHour, int selectedMinute) { String time = selectedHour + ":" + selectedMinute; SimpleDateFormat fmt = new SimpleDateFormat("HH:mm"); Date date = null; try { date = fmt.parse(time); } catch (ParseException e) { e.printStackTrace(); } SimpleDateFormat fmtOut = new SimpleDateFormat("hh:mm aa"); String formattedTime = fmtOut.format(date); textView6.setText(formattedTime); } }, mHour, mMinute, false); timePickerDialog.setTitle("Select Time"); timePickerDialog.show(); } if (v == button3) { EditText editText1 = (EditText) findViewById(R.id.et_name1); String text = editText1.getText().toString(); EditText editText2 = (EditText) findViewById(R.id.et_email); String text1 = editText2.getText().toString(); EditText editText3 = (EditText) findViewById(R.id.et_phoneno); String text2 = editText3.getText().toString(); TextView textView6 = (TextView) findViewById(R.id.datepicker1); String text3 = textView6.getText().toString(); EditText editText4 = (EditText) findViewById(R.id.et_qualification); String text4 = editText4.getText().toString(); TextView textView4 = (TextView) findViewById(R.id.timepicker1); String text5 = textView4.getText().toString(); button3=(Button)findViewById(R.id.button_save); Intent intent = new Intent(MainActivity.this, SecondActivity.class); intent.putExtra(EXTRA_NAME, text); intent.putExtra(EXTRA_EMAIL, text1); intent.putExtra(EXTRA_PHONE_NUMBER, text2); intent.putExtra(EXTRA_DOB, text3); intent.putExtra(EXTRA_QUALIFICATION, text4); intent.putExtra(EXTRA_TIME, text5); startActivity(intent); } } } second_layout.xml <?xml version="1.0" encoding="utf-8"?> <RelativeLayout xmlns:android="http://schemas.android.com/apk/res/android" android:layout_width="match_parent" android:layout_height="match_parent" android:orientation="vertical" > <TextView android:layout_width="wrap_content" android:layout_height="wrap_content" android:id="@+id/tv_name1" android:text="Name" android:textSize="15dp" /> <TextView android:layout_width="wrap_content" android:layout_height="wrap_content" android:id="@+id/tv_phoneno" android:layout_below="@+id/tv_name1" android:text="contactno" android:textSize="15dp" /> <TextView android:layout_width="wrap_content" android:layout_height="wrap_content" android:layout_below="@+id/tv_phoneno" android:id="@+id/tv_email" android:text="Email" android:textSize="15dp" /> <TextView android:layout_width="wrap_content" android:layout_height="wrap_content" android:id="@+id/tv_dob" android:layout_below="@+id/tv_email" android:text="DOB" android:textSize="15dp" /> <TextView android:layout_width="wrap_content" android:layout_height="wrap_content" android:id="@+id/tv_qualification" android:layout_below="@+id/tv_dob" android:text="Qualification" android:textSize="15dp" /> <TextView android:layout_width="wrap_content" android:layout_height="wrap_content" android:id="@+id/tv_time" android:layout_below="@+id/tv_qualification" android:text="Time" android:textSize="15dp" /> <LinearLayout android:layout_width="match_parent" android:layout_height="match_parent" android:orientation="horizontal" android:layout_marginTop="120dp" android:weightSum="2" > <Button android:layout_width="0dp" android:layout_height="wrap_content" android:layout_below="@+id/tv_time" android:layout_weight="1" android:textSize="15dp" android:text="Delete" android:padding="10dp" android:id="@+id/delete" /> <Button android:layout_width="0dp" android:layout_height="wrap_content" android:layout_weight="1" android:textSize="15dp" android:text="Update" android:id="@+id/update" android:padding="10dp" /> </LinearLayout> </RelativeLayout> SecondActivity.java package com.example.android.persondetails; import android.content.Intent; import android.os.Bundle; import android.support.v7.app.AppCompatActivity; import android.util.Log; import android.widget.ArrayAdapter; import android.widget.Button; import android.widget.ListView; import android.widget.TextView; import java.util.ArrayList; import java.util.List; import static java.util.Calendar.AM; public class SecondActivity extends AppCompatActivity { private ListView lvPerson; private Button addBtn,dleBtn; private PersonListAdapter adapter; private List<Person> mPersonList; @Override protected void onCreate(Bundle savedInstanceState) { super.onCreate(savedInstanceState); setContentView(R.layout.list_view); mPersonList = new ArrayList<Person>(); addBtn = (Button) findViewById(R.id.update); dleBtn = (Button) findViewById(R.id.delete); lvPerson = (ListView) findViewById(R.id.listView); Intent intent = getIntent(); String text = (String) intent.getStringExtra(MainActivity.EXTRA_NAME); String text1 = (String) intent.getStringExtra(MainActivity.EXTRA_PHONE_NUMBER); String text2 = (String) intent.getStringExtra(MainActivity.EXTRA_EMAIL); String text3 = (String) intent.getStringExtra(MainActivity.EXTRA_QUALIFICATION); String text4 = (String) intent.getStringExtra(MainActivity.EXTRA_DOB); String text5 = (String) intent.getStringExtra(MainActivity.EXTRA_TIME); Log.d("PersonDetails", text + " " + text1 + "" + text2 + "" + text3 + "" + text4 + "" + text5); mPersonList.add(0,new Person(text,text1,text2,text3,text4,text5)); addMethod(); setAdapter(); } private void addMethod() { mPersonList.add(1,new Person("Narendra", "83330072", "[email protected]", "btech", "14 / 06 / 1996", "5-30 AM")); mPersonList.add(2,new Person("Banu", "715452", "[email protected]", "btech", "14 / 06 / 1996", "5-45 AM")); mPersonList.add(3,new Person("Kalyan", "83330072", "[email protected]", "btech", "14 / 06 / 1998", "5-30 AM")); mPersonList.add(4,new Person("Teja", "8775564", "[email protected]", "btech", "14 / 06 / 1990", "5-30 AM")); mPersonList.add(5,new Person("Manu", "86423", "[email protected]", "btech", "14 / 06 / 1996", "5-30 AM")); } private void setAdapter() { adapter = new PersonListAdapter(SecondActivity.this, mPersonList); lvPerson.setAdapter(adapter); } } how to set dailog to update button and one dailog should need to open it should be in editing what we had like in main activityxml after clicking delete it should be deleted,update means open dailog and reedit and update PersonListAdapter.java package com.example.android.persondetails; import android.content.Context; import android.os.Build; import android.support.annotation.RequiresApi; import android.view.LayoutInflater; import android.view.View; import android.view.ViewGroup; import android.widget.BaseAdapter; import android.widget.TextView; import java.util.List; public class PersonListAdapter extends BaseAdapter { private Context mContext; private List<Person> mPersonList; PersonListAdapter(Context mContext, List<Person> mPersonList) { this.mContext = mContext; this.mPersonList = mPersonList; } @Override public int getCount() { return mPersonList.size(); } @Override public Object getItem(int position) { return mPersonList.get(position); } @RequiresApi(api = Build.VERSION_CODES.P) @Override public View getView(int position, View convertView, ViewGroup parent) { ViewHolder holder; if (convertView == null) { holder = new ViewHolder(); convertView = LayoutInflater.from(mContext).inflate(R.layout.second_layout, parent, false); holder.tv_name = (TextView) convertView.findViewById(R.id.tv_name1); holder.tv_contact = (TextView) convertView.findViewById(R.id.tv_phoneno); holder.tv_email=(TextView)convertView.findViewById(R.id.tv_email); holder.tv_dob=(TextView)convertView.findViewById(R.id.tv_dob); holder.tv_qualification=(TextView)convertView.findViewById(R.id.tv_qualification); holder.tv_time=(TextView)convertView.findViewById(R.id.tv_time); convertView.setTag(holder); } else { holder = (ViewHolder) convertView.getTag(); } holder.tv_name.setText(mPersonList.get(position).getName()); holder.tv_contact.setText(mPersonList.get(position).getContactno()); holder.tv_email.setText(mPersonList.get(position).getEmail()); holder.tv_dob.setText(mPersonList.get(position).getDatepicker()); holder.tv_qualification.setText(mPersonList.get(position).getQualification()); holder.tv_time.setText(mPersonList.get(position).getTimepicker()); return convertView; } @Override public long getItemId(int position) { return position; } class ViewHolder { TextView tv_name; TextView tv_email; TextView tv_contact; TextView tv_dob; TextView tv_qualification; TextView tv_time; } } Person.java package com.example.android.persondetails; public class Person { private String name; private String contactno; private String email; private String qualification; private String datepicker; private String timepicker; public Person(String name, String contactno, String email, String qualification, String datepicker, String timepicker) { this.name = name; this.contactno = contactno; this.qualification=qualification; this.datepicker=datepicker; this.email=email; this.timepicker=timepicker; } public String getName() { return name == null ? "" : name; } public void setName(String name) { this.name = name; } public String getContactno() { return contactno; } public void setContactno(String contactno){ this.contactno=contactno; } public String getEmail() { return email; } public String getQualification() { return qualification; } public String getDatepicker() { return datepicker; } public String getTimepicker() { return timepicker; } } list_view.xml <?xml version="1.0" encoding="utf-8"?> <RelativeLayout xmlns:android="http://schemas.android.com/apk/res/android" xmlns:app="http://schemas.android.com/apk/res-auto" xmlns:tools="http://schemas.android.com/tools" android:layout_width="match_parent" android:layout_height="match_parent" tools:context=".Person"> <ListView android:id="@+id/listView" android:layout_width="match_parent" android:layout_height="match_parent"> </ListView> </RelativeLayout> AndroidManifest.xml <?xml version="1.0" encoding="utf-8"?> <manifest xmlns:android="http://schemas.android.com/apk/res/android" package="com.example.android.persondetails"> <application android:allowBackup="true" android:icon="@mipmap/ic_launcher" android:label="@string/app_name" android:roundIcon="@mipmap/ic_launcher_round" android:supportsRtl="true" android:theme="@style/AppTheme" > <activity android:name=".SecondActivity"> </activity> <activity android:name=".MainActivity" android:parentActivityName=".MainActivity"> <intent-filter> <action android:name="android.intent.action.MAIN" /> <category android:name="android.intent.category.LAUNCHER" /> </intent-filter> </activity> </application> </manifest> A: You need to add two buttons such as Update and Delete in the list item's layout. So the list holder class will look like: class ViewHolder { TextView tv_name; TextView tv_email; TextView tv_contact; TextView tv_dob; TextView tv_qualification; TextView tv_time; Button btn_update; //Update for item Button btn_delete; //Delete an item. } Once you have done this then do the following in adapter's getView() method. Notice the comments carefully to understand the implementational logic further. public View getView(int position, View convertView, ViewGroup parent) { ViewHolder holder; if (convertView == null) { holder = new ViewHolder(); convertView = LayoutInflater.from(mContext).inflate(R.layout.second_layout, parent, false); holder.tv_name = (TextView) convertView.findViewById(R.id.tv_name1); holder.tv_contact = (TextView) convertView.findViewById(R.id.tv_phoneno); holder.tv_email=(TextView)convertView.findViewById(R.id.tv_email); holder.tv_dob=(TextView)convertView.findViewById(R.id.tv_dob); holder.tv_qualification=(TextView)convertView.findViewById(R.id.tv_qualification); holder.tv_time=(TextView)convertView.findViewById(R.id.tv_time); //bind holder.btn_update and holder.btn_delete here convertView.setTag(holder); } else { holder = (ViewHolder) convertView.getTag(); } holder.tv_name.setText(mPersonList.get(position).getName()); holder.tv_contact.setText(mPersonList.get(position).getContactno()); holder.tv_email.setText(mPersonList.get(position).getEmail()); holder.tv_dob.setText(mPersonList.get(position).getDatepicker()); holder.tv_qualification.setText(mPersonList.get(position).getQualification()); holder.tv_time.setText(mPersonList.get(position).getTimepicker()); holder.btn_update.setOnClickListener(new View.OnClickListener() { @Override public void onClick(View v) { //Call your dialog to update and pass "mPersonList.get(position)" model so that data in the model will be updated. //Once update is done call refreshList() from the confirmation dialog button. } }); holder.btn_delete.setOnClickListener(new View.OnClickListener() { @Override public void onClick(View v) { mPersonList.remove(position); refreshList(); } }); return convertView; } private void refreshList() { notifyDataSetChanged(); } One suggestion, try to avoid using variables like button1, button2, editText1, textView1 like school students. Instead of these, use a proper and meaningful name for the variables.
Low
[ 0.48988764044943806, 27.25, 28.375 ]
The present invention relates to a communication apparatus and a communication method of a multi carrier transmission system, and in particular, to a communication apparatus and a communication method using a multi carrier transmission method (Digital Wavelet Multi Carrier-transmission system, hereinafter, described as “DWMC transmission system”) which carries out data transmission by digital modulating and demodulating processing with the use of a real coefficient wavelet filter bank. In a terrestrial digital broadcasting system etc., wide band data transmission is enabled by a multi carrier transmission system with the use of OFDM (Orthogonal Frequency Division Multiplexing). As a data transmission system depending on this type of the multi carrier transmission system with the use of OFDM, a multi carrier transmission method depending on digital modem processing with the use of a real coefficient wavelet filter bank (DWMC transmission method) has been proposed. In the DWMC transmission method, a plurality of digital modulated waves are combined by use of the real coefficient filter bank, and thereby, transmission signals are generated. As a modulation system of each carrier, PAM (Pulse Amplitude Modulation) etc. are used. Data transmission, which depends on the DWMC transmission method, will be described by use of FIGS. 15 to 18. FIG. 15 is a view which shows an example of an wavelet wave form, and FIG. 16 is a view which shows an example of a transmission wave form in the DWMC transmission method, and FIG. 17 is a view which shows an example of a transmission spectrum in the DWMC transmission method, and FIG. 18 is a view which shows a configuration example of a transmission frame in the DWMC transmission method. In the data transmission which depends on the DWMC transmission method, as shown in FIG. 15, impulse responses of each sub carrier are transmitted over being overlapped in each sub carrier. Each transmission symbol becomes such a time wave form that impulse responses of each sub carrier were combined, as shown in FIG. 16. An example of an amplitude spectrum is shown in FIG. 17. In the DWMC transmission method, approximately several dozen through several hundred of transmission symbols in FIG. 16 are collected to configure one transmission frame. A configuration frame of the DWMC transmission frame is shown in FIG. 18. In this DWMC transmission frame, a symbol for frame synchronization, a symbol for equalization etc. are included in addition to a symbol for information data transmission. FIG. 19 is a block diagram which shows a conceptual configuration of a communication apparatus as a past example, which is configured by having a transmitting device and a receiving device in case that the DWMC transmission system was adopted. In FIG. 19, a receiving device 199 is configured by having an A/D converter 110 which carries out analog-digital conversion, a wavelet transform unit 120 which carries out discrete wavelet transformation, a parallel/serial (P/S) converter 130 which converts parallel data into serial data, and a decision unit 140 which carries out judgment of received signals. A transmitting device 299 is configured by having a symbol mapper 210 which converts bit data into symbol data to carry out symbol mapping, a serial/parallel (S/P) converter 220 which converts serial data into parallel data, an inverse wavelet transform unit 230 which carries out inverse discrete wavelet transformation, and a D/A converter 240 which carries out digital-analog conversion. An operation of the communication apparatus with the above-described configuration will be described. Firstly, in the transmitting device 299, bit data of transmission data is converted into symbol data by the symbol mapper 210, and symbol mapping (PAM) is carried out in accordance with each symbol data. Then, serial data is converted into parallel data by the S/P converter 220, and thereby, a real number value di (i=1˜M, M is a plural number) is given to symbol data with respect to each sub carrier. After that, this real number value is inverse discrete wavelet transformed on a time axis by the inverse wavelet transform unit 230. By this means, sample values of time axis wave forms are generated, and a sample value series, which represents transmission symbols, is generated. Then, this sample value series is converted into analog base band signal wave forms which are continuing in terms of time by the D/A converter 240, and then, transmitted. Here, the number of sample values on a times axis, which are generated by the inverse discrete wavelet transformation, is normally 2 to the n-th power pieces (n is a positive integer). In the receiving device 199, analog base band signal wave forms, which are obtained from received signals, are sampled with the same sample rate as that of a transmitting side by the A/D converter 110, to obtain a sample value series. Then, this sample value series is discrete wavelet transformed on a frequency axis by the wavelet transform unit 120, and parallel data is converted into serial data by the P/S converter 130. Finally, an amplitude value of each sub carrier is calculated in the decision unit 140, and judgment of a received signal is carried out to obtain reception data. In addition, as an example of the communication apparatus with the use of the DWMC transmission method, proposed is a power line carrier communication apparatus which carries out data transmission by utilizing a power line which were disposed in a house etc., as communication medium (e.g., see, JP-A-2003-218831). In the meantime, in the multi carrier transmission system, there is a case to dispose a pilot symbol for transmitting a pilot signal by use of a sine wave signal in a predetermined symbol, in order to carry out adjustment etc. of a phase of transmission data. By information of this pilot symbol, it becomes possible to adjust an amplitude and a phase of transmission data, and to improve an equalization characteristic of a channel characteristic (compensation of a transmission characteristic, etc.) between a transmitting device and a receiving device. A past multi carrier transmission system with the use of FFT (Fast Fourier Transform) based OFDM is one which carries out FFT as complex number conversion, and therefore, it is possible to generate a pilot symbol having complex information which represents an amplitude and a phase, only by transmitting a known signal (e.g., a signal in which identical data such as all 1 continues) by use of one symbol, in case of disposing a pilot symbol (e.g., see, JP-A-2000-278237). In contrast to this, a multi carrier transmission system, which depends on wavelet transformation based OFDM to be used in the DWMC transmission method, is one which carried out wavelet transformation as real number conversion, and in addition, even if a pilot symbol, which was simply configured by one symbol, is demodulated, it is not possible to obtain complex information since a filter length is longer than a symbol length, and therefore, in the multi carrier transmission system which depends on wavelet transformation based OFDM, a pilot symbol was not used.
Low
[ 0.508163265306122, 31.125, 30.125 ]
133 S.E.2d 311 (1963) 204 Va. 763 CELINA MUTUAL INSURANCE COMPANY v. Milton COHEN et al. Supreme Court of Appeals of Virginia. December 2, 1963. *312 Robert G. Winters, Norfolk (Pilcher, Underwood, Pilcher & Winters, Norfolk, on brief), for appellant. Spencer Gill, John B. Preston, Norfolk (Rixey & Rixey, Norfolk, on brief), for Hartford Accident & Indemnity Co. Before EGGLESTON, C. J., and SPRATLEY, BUCHANAN, WHITTLE, SNEAD, I'ANSON, and CARRICO, JJ. I'ANSON, Justice. Celina Mutual Insurance Company (herein called Celina) brought this declaratory judgment suit against Milton Cohen, Emil Deutsch, Rex C. Clifton, Edmond Jacobs, Hartford Accident and Indemnity Company and Allstate Insurance Company, appellees herein, to determine whether Edmond Jacobs had coverage on a 1961 Plymouth station wagon under a "garage liability policy" issued by Celina to Midtown Motors, Inc., or a "family automobile policy" Celina issued to Frances R. Jacobs, wife of Edmond Jacobs, and to enjoin appellees Milton Cohen, Emil Deutsch and Rex C. Clifton, who sustained damages in a collision with the station wagon owned and operated by Edmond Jacobs, from taking any further actions to impose liability on Celina under either of its insurance contracts. Deutsch had an automobile liability policy with an uninsured motorist endorsement issued by Hartford Accident and Indemnity Company, and Allstate Insurance Company had issued a policy to Clifton with a similar endorsement. Both of these policies were in force on the day of the accident, and the companies requested in their answers that the court determine their liabilities, if any, under their policies. The case was heard by the chancellor on a stipulation of facts and exhibits, and he held that the family automobile policy issued by Celina to Frances R. Jacobs was in force and afforded coverage to the 1961 Plymouth station wagon operated by Jacobs at the time of the accident; that Jacobs had reported the accident as soon as practicable as required by the policy; and that because of a stipulation by the parties Jacobs had no coverage under the garage liability policy. From this decree Celina appealed. Coverage under the garage liability policy is not an issue on this appeal. However, Celina contends that the chancellor erred in holding that Jacobs was afforded coverage under the terms of the family automobile policy and that he gave the required notice of the accident to Celina under the terms of its policy. The evidence shows that on March 11, 1961, Celina issued a family automobile policy to Mrs. Jacobs covering a 1952 Willys sedan, which was the only automobile owned by the Jacobs family. The policy was effective until September 11, 1961, and it was later renewed to extend to March 11, 1962. On or about March 24, 1961, Mr. Jacobs, an automobile salesman, purchased a 1961 Plymouth station wagon from Midtown Motors, Inc., under an installment contract. Pursuant to an agreement between the contracting parties, Jacobs was permitted to *313 use dealer's license plates on the car and was afforded liability coverage under Midtown's garage insurance policy issued to it by Celina. Title to the station wagon was not obtained by Jacobs until January 29, 1962. On February 28, 1962, while the station wagon was being operated by Jacobs, it collided with the rear of an automobile operated by Clifton, causing Clifton's car to strike the rear of Deutsch's automobile, thereby damaging the cars and injuring Clifton, Deutsch and Cohen, the latter being a passenger in Deutsch's car. On March 8, 1962, Cohen instituted a suit for damages against Jacobs and Clifton, and the next day Jacobs was notified that Clifton intended to institute a suit for damages against him. On March 16, five days after the family policy issued by Celina to Mrs. Jacobs had expired, Jacobs gave notice of the accident to Celina's local agent and adjuster and claimed that the station wagon was covered under Midtown's garage liability policy. Jacobs was advised that he was not covered by that policy, but that he might have coverage under the family policy which Celina had issued to Mrs. Jacobs. Thereafter Clifton and Deutsch instituted actions against Jacobs and before the three suits against him were concluded, which were defended by Celina under reservation of rights agreements, this declaratory judgment suit was brought by Celina. The family automobile policy issued to Mrs. Jacobs contains, under "PART I," covering liability for bodily injury and property damages, the following relevant provisions: "To pay on behalf of the insured all sums which the insured shall become legally obligated to pay as damages * * * arising out of the ownership, maintenance or use of the owned automobile * * *. * * * * * * "Persons Insured. The following are insureds under Part I: "(a) With respect to the owned automobile, (1) The named insured and any resident of the same household; * * *." (Italics supplied.) The definitions of certain terms used in the foregoing provisions are as follows: "`named insured' means the individual named in Item I of the declarations and also includes his spouse, if a resident of the same household;" "`owned automobile' means a private passenger * * * automobile * * * owned by the named insured * * *." Following "PART III — PHYSICAL DAMAGE," under the heading "Conditions" this language is found: "(Unless otherwise noted, conditions apply to all Parts.) * * * * * * "2. Premium. If the named insured disposes of, acquires ownership of or replaces a private passenger, farm or utility automobile or, with respect to Part III, a trailer, he shall inform the company during the policy period of such change. Any premium adjustment necessary shall be made as of the date of such change in accordance with the manuals in use by the company. The named insured shall, upon request, furnish reasonable proof of the number of such automobiles or trailers and a description thereof. * * * * * * "6. Action Against Company—Part I. No action shall lie against the company unless, as a condition precedent thereto, the insured shall have fully complied with all the terms of this policy * * *." (Italics supplied.) Counsel for Celina concedes that Mr. Jacobs is a "named insured" under the family policy since he was the spouse of Frances R. Jacobs and a resident of the *314 same household; and that the 1961 Plymouth station wagon became an "owned automobile" under the definitions in the policy when Jacobs acquired title to it on January 29, 1962. But he argues that Jacobs was not afforded coverage under the terms of the policy because the company was not notified of the acquisition of the station wagon during the policy period, as required by the first sentence of Condition 2 of the insurance contract. He further argues that Condition 2 constituted only an offer to cover after-acquired automobiles if the company was notified within the policy period, and since Jacobs did not notify Celina of his acquisition of the station wagon until five days after the policy had expired, there had been no acceptance of the offer, and hence he had no coverage. On the other hand, counsel for Hartford Accident and Indemnity Company and Allstate Insurance Company argue that Condition 2 states a method of adjusting the premium, where necessary, upon the addition of any other automobile, and it does not state that the failure to notify Celina of the acquisition of a car within the policy period shall terminate the coverage previously extended. See the recent case of Beasley v. Wolf (Fla.App.), 151 So.2d 679 (1963). The pivotal question is whether Jacobs was covered under the family policy for an accident which occurred during the policy period, when notice of the acquisition of the station wagon was not given to the company, pursuant to Condition 2, until after the policy had expired. It is manifest from a reading of the provisions of the policy that its purpose was to insure against all risks arising out of the operation of the automobile described in the policy, and, in addition, to provide coverage at the earliest possible moment of any after-acquired automobile, whether a replacement car or an additional automobile, provided the insured notified the insurance company of such change within the period prescribed in the policy. Imperial Casualty and Indemnity Co. v. Relder, 308 F.2d 761, 765 (8 Cir., 1962); Mathews v. Marquette Casualty Co. (La.App.), 152 So.2d 577, 581 (1963). We are not unmindful that it has been held, in construing family automobile insurance contracts containing substantially the same notice requirement as that of Condition 2, that such notice is a condition subsequent rather than a condition precedent, and that such coverage is automatically effective upon the acquisition of a new automobile and remains in effect until the end of the specified period, irrespective of whether notice is given or not. Inland Mut. Ins. Co. v. Stallings (4th Cir.), 263 F.2d 852; 7 Am.Jur.2d, Automobile Insurance, § 100, pp. 408, 409; Anno. 34 A.L.R.2d 936, at pp. 744, 745. However, under Condition 6 of the policy in the present case, "[n]o action shall lie against the company unless, as a condition precedent thereto, the insured shall have fully complied with all the terms of this policy." The named insured did not notify Celina of the acquisition of the 1961 Plymouth station wagon during the policy period as required by the unambiguous first sentence in Condition 2. Hence there was no full compliance with all the terms of the policy, which was a condition precedent to any action on the policy against the company. The provision for notice to the insurance company during the policy period if a named insured disposes of, acquires ownership of or replaces a private passenger automobile is most liberal. Under the terms of the policy Jacobs had coverage on the station wagon immediately upon obtaining title to it. All he was required to do was to notify the insurance company of its acquisition at any time during the policy period. But since he did not notify the company until five days after the policy had expired, Celina has no liability under the family policy it issued to Mrs. Jacobs. See Maryland Casualty Co. v. Toney, 178 Va. 196, 204, 16 S.E.2d 340, 344. *315 Hence Jacobs was an uninsured motorist, and Deutsch and Clifton have uninsured motorist coverage under their respective policies with Hartford Accident and Indemnity Company and Allstate Insurance Company. For the reasons stated, the decree of the lower court is reversed, the case is remanded, and the chancellor is directed to enter a decree in accordance with the findings expressed herein. Reversed and remanded.
Low
[ 0.520388349514563, 33.5, 30.875 ]
Every Fourier optical system is equivalent to consecutive fractional-Fourier-domain filtering. We consider optical systems composed of an arbitrary number of lenses and filters, separated by arbitrary distances, under the standard approximations of Fourier optics. We show that every such system is equivalent to (i) consecutive filtering operations in several fractional Fourier domains and (ii) consecutive filtering operations alternately in the space and the frequency domains.
High
[ 0.6776232616940581, 33.5, 15.9375 ]
Q: Como hacer que una etiqueta select muestre dos flechas Hola tengo una etiqueta select la cual me muestra mombres de ciudades, sin embargo quiero que la etiquetq select me muestre dos flechas algo asi: Como puedo hacer eso en el css? A: Podrías hacer algo con los estilos, modificando el appearance y poniendo una imagen como tu flecha deseada. .form-select { width: 200px; } .form-select select { width: 100%; height: 30px; margin: 8px 0; border: 1px solid #efefef; box-shadow: 0 1px 2px rgba(0,0,0,0.2); background: #fff url('https://www.freeiconspng.com/uploads/arrow-up-icon-23.png') no-repeat; background-size: 15px; background-position: right 10px center; font-family: 'Arial'; padding-left: 15px; -webkit-appearance: none; -moz-appearance: none; appearance: none; -webkit-border-radius: 4px; -moz-border-radius: 4px; border-radius: 4px; } <div class="form-select"> <select name="select"> <option value="1">Mi valor 1</option> <option value="2">Mi valor 2</option> <option value="3">Mi valor 3</option> <option value="4">Mi valor 4</option> <option value="5">Mi valor 5</option> <option value="6">Mi valor 6</option> </select> </div>
Mid
[ 0.5892857142857141, 33, 23 ]
Q: Problem in a conditional to decide when to activate the function of each property passed to the component how are you? I'm having a problem when passing two functions (both functions make a put call in an api) as a property for the same component (I'll leave the code for them below), this component has a form but the first function (updateClientAddress) does not have all fields that the second function (updatePartnerAddress) has, so I'm trying to think of a logic to decide when to use each function, that is, when I should activate the client function or when I should activate partner. Client.js: (obs: the updateAddress inside of {} is the put function that calls the api) <FormModalAddress onClose={() => toggleModal(false, setFormAddressShow)} show={formAddressShow} updateClientsAddressRoute={updateAddress} {...defaultModalProps} /> Partner.js: (obs: the updateAddress inside of {} is the put function that calls the api) <FormModalAddress onClose={() => toggleModal(false, setFormAddressShow)} show={formAddressShow} getPartnersAddressRoute={getAddress} updatePartnersAddressRoute={updateAddress} {...defaultModalProps} /> FormModalADdress.js: component that receives the updateClientsAddress and updatePartnersAddress functions as props const FormModalBankInformation = ({ updateClientsAddressRoute, updatePartnersAddressRoute }) => { const update = async () => { const address = await updatePartnersAddressRoute(id, { service_location_area: parseFloat(serviceLocationArea.value), zip_code: zipCode.value, city: city.value, district: district.value, state: state.value, street: street.value, street_number: parseInt(streetNumber.value), complement: complement.value, }); console.log("ADDRESS AFTER: ", address); }; } OBS: Client doesnt have service_location_area field, so when i call, I need to define when to call each update (both client and partner) and when I call client I have to remove that field that does not belong to the update client. Thanks again! A: Your FormModalAddress.js contains the component named FormModalBankInformation which does not match your other components named FormModelAddress, is this just a mistake? I'm going to assume that this is actually the FormModalAddress component you are showing. I think you are calling the same form modal from different places, and need the same form to run a different callback depending on what is supplied to the component, is that correct? If that's the case you could build your fields object first, and add in the service_location_area property if the updatePartnersAddressRoute function has been supplied. This assumes that you aren't supplying both functions all the time of course, either one or the other. const FormModalBankInformation = ({ updateClientsAddressRoute, updatePartnersAddressRoute }) => { const update = async() => { const fields = { zip_code: zipCode.value, city: city.value, district: district.value, state: state.value, street: street.value, street_number: parseInt(streetNumber.value), complement: complement.value, } ' if (updatePartnersAddressRoute) { fields.service_location_area = parseFloat(serviceLocationArea.value), } const address = await updatePartnersAddressRoute(id, fields); console.log("ADDRESS AFTER: ", address); }; } A cleaner way to do it might be to only have one property on the component, for example called 'updateRoute', and have an additional flag property of 'isPartner'. When isPartner === true you can add in the additional value, and then you don't need to duplicate the logic of calling the update functions, since it will call whatever function the parent component supplies. Just a thought. Cheers
Mid
[ 0.559701492537313, 28.125, 22.125 ]
Old-school cool: Lauren Bacall knew how to whistle, and that wasn't all Call her what you will: The last of the movie stars, a disappearing breed, one of the final members of Hollywood's Golden Age. The fact is, there are very few actors of Lauren Bacall's caliber with us these days, and no one is minting more. Bacall, who died Tuesday at age 89, transcended the worlds of film and theater to leave her mark on American pop culture. It isn't just her movie fame she'll be remembered for, but for her grace, her class, her old-school cool. Generations who only know her as a glamorous pinup in flickering black-and-white movies, take note: Bacall lived her life in full-on color. The husky-voiced star was a Hollywood legend and an icon of a glamorous age. The LookHer famous expression, peeking out from under arching eyebrows, came as a result of being nervous, she said. In her first film, "To Have and Have Not," she was 19 and afraid. She tucked her chin down to minimize the anxious shaking, tilted her eyes up, and a legend was born. She didn't look scared, she looked strong — shy, yet confident. Husband and legendary love Humphrey Bogart once described it best when he called her "steel with curves." John Kobal Foundation / via Getty Images Lauren Bacall's distinctive "Look" became one of her trademarks. That voiceOther beauties spoke in a breathy tone, like Marilyn Monroe, or even squeaked, a la Gracie Allen, but Bacall's throaty tones gave her a suggestive, sexy edge. "We won't go into the number of times I have been called 'mister' on the other end of the telephone," she wrote in her memoir "Now." Her husky delivery may have confused phone callers, but it captivated filmgoers and gave a 19-year-old girl gravitas to grow on. She knew how to whistleSome actors spend years without delivering a line as memorable as the one Bacall managed her first time out, when she was teasing Bogart in "To Have And Have Not." Her slim body turns in the doorway and she tells him, “You don't have to act with me, Steve. You don't have to say anything, and you don't have to do anything. Not a thing. Oh, maybe just whistle. You know how to whistle, don't you, Steve? … You just put your lips together and blow." The words may seem simple in 2014, but in 1944, and with Bacall's sultry delivery, they dripped with all the double-entendre passion a movie could muster. Her flawless styleBacall was a model first, and she never lost that perfectly put-together style. Finger waves kept her hair neat and elegant. Her eyebrows were always perfectly groomed and arched, her makeup flawlessly applied. She didn't flit from one fashion trend to the next, but consistently dressed her slender figure in original looks that never went overboard. Sophisticated suits, striking slacks and structured shapes were the rule, and she never had to show too much skin to look sexy. Courtesy Everett Collection Lauren Bacall and Humphrey Bogart in "Key Largo." A lifetime loveTheir romance was so legendary it even found its way into a soft-rock song. In 1981, singer Bertie Higgins sang wistfully of a couple who "had it all ... just like Bogie and Bacall, starring in our own late-late show, sailing away to Key Largo," a reference to the 1948 movie they co-starred in. The image worked because the couple worked. Bogart was more than twice Bacall's age and married when they met, but the chemistry onscreen and off was undeniable. They wed when she was 20 and he 45, had two children, and the union survived until his untimely death from esophageal cancer in 1957. She would marry again — actor Jason Robards — and have another child, but no one could make the world forget Bogie and Bacall. When she passed away many social media tweets envisioned a heavenly reunion of the two actors, who had only a dozen years together. A short marriage, but one for the ages.
Mid
[ 0.6300268096514741, 29.375, 17.25 ]
Narrow superior mediastinum and pseudomasses: CT features. The authors report three cases of abnormal chest radiography mimicking mediastinal masses. These radiographic findings were unrelated to any pathology, were discovered in asymptomatic patients, and must be considered consequences of unusually narrow thoracic inlets. Mean and standard deviations of the anteroposterior diameter of the superior mediastinum are given. Computed tomography of the chest yielded valuable diagnostic information and made it possible to exclude mediastinal masses.
High
[ 0.6623036649214661, 31.625, 16.125 ]
Quantitation of the critically ischemic zone at risk during acute coronary occlusion using PET. Critical myocardial ischemia has been defined experimentally during acute coronary occlusion as flow reduction of 50% or more since cellular ATP depletion begins to occur beyond this flow reduction threshold, placing tissue at risk of cellular injury. To test the hypothesis that critically ischemic fractional left ventricular mass can be measured noninvasively with PET, nine dogs were imaged in a multi-slice positron camera using the perfusion tracer 13N-ammonia, while radiolabeled microspheres were injected into the left atrium during acute coronary occlusion. Images were processed using a 50% threshold and the size of the resulting perfusion defect was expressed as a fraction of total left ventricular image volume. The critically ischemic left ventricular fraction determined in vitro from the microsphere perfusion data, ranged from 5% to 30% of the total left ventricular weight and correlated closely with that determined noninvasively by PET with r = 0.94 (y = 1.05X - 2.0%). We conclude that the fraction of left ventricular myocardium rendered critically ischemic during acute coronary occlusion can be measured accurately and noninvasively in vivo using perfusion imaging with positron emission tomography.
High
[ 0.6570680628272251, 31.375, 16.375 ]
namespace WCell.RealmServer.Instances { /// <summary> /// Used to "flavor" Raid instances /// </summary> public class RaidInstanceSettings : InstanceSettings { public RaidInstanceSettings(BaseInstance instance) : base(instance) { } } }
Low
[ 0.503846153846153, 32.75, 32.25 ]
Fire Safety - Madison, WI $65.00 Required Choose Date : Person(s) attending: QTY This item is out of stock The safety of the clients is of paramount concern. In this class, you will learn appropriate methods for preventing fire, teaching evacuation skills, and responding to a fire. Basic fire safety practices will be discussed including maintenance of fire alarm systems, use of fire extinguishers, prevention of fires, practice of fire evacuation drills, and other aspects of effective fire management. The class price includes the $20.00 registry fee for placement of the student's name on the Wisconsin CBRF Training Registry.
High
[ 0.698630136986301, 31.875, 13.75 ]
Pages 06 March 2010 The Go-Aheadism of Citybus continues Go-Ahead to transfer more Solos to replace the Mercedes 709s SOME of Plymouth's ageing fleet of single-decker Mercedes buses are to be pensioned off. Citybus's new owner, Go-Ahead, is transferring 12 Optare Solo vehicles from its bus companies in the South and North of England. The single deck, easy access buses will replace the Mercedes 709s that have been in the fleet since 1995. Andrew Wickham, managing director at Plymouth Citybus, said that more than £70,000 would be invested to refurbish the vehicles inside and out, with the addition of new destination displays and CCTV cameras. "The new liveried buses will be introduced into service over the next few months after our fitters and spray shop teams complete the refurbishments," Mr Wickham said.This is Plymouth We of course already have 4 of them in Plymouth currently being refurbished so hopefully it wont be too long before the first one enters service. I do like one of the comments on the story though: "Why don't Go-ahead buy all the bendy buses that Boris Johnson is forcing the London Bus system to sell. There must be a good deal to be done and they would be useful, capacious and look quite smart around Plymouth" Clearly they don't know that Go-Ahead already own more of the bendy buses than they know what to do with! The ex London bendy buses are slowly starting to find new uses with some heading for Liverpool (Arriva) and within Go-Ahead both Wilts and Dorset and Brighton & Hove are also trialling bendy buses in service. I am sure it wont be long before Citybus get to try one. I am sure there are a few routes which could accommodate bendy buses in Plymouth, although the biggest obstacle is always going to be Royal Parade which clearly struggles to cope with the load it already has. I guess we will have to wait and see! First on Twitter / Facebook 02 March 09:19: DEVON: No reported issues at the moment. 02 March 16:48 PLYMOUTH: Traffic particularly heavy at Derriford due to road works/ traffic management scheme. Delays to services 7,15 & 83/84/86 expected. 04 March 18:15 PLYMOUTH: Heavy traffic in Crownhill area affecting ugo services 7, 15 & 17 plus PR1 & Tavy Linx services 83/84/86. 05 March 18:36 The weather is looking to be fine across Devon & Cornwall this weekend so why not have a day out with First? We've great value day tickets. It is still an investment - the buses cost money even if they are transfers from within the group. Citybus were looking to replace the older Mercs before they were taken over, its just a bit easier for them now as part of a large group About Me My main on-line activity is the Plymothian Transit Blog which covers anything and everything to do with transport in and around Plymouth. My main interest was always buses and coaches so these feature heavily in the blog but I am also covering the railways and the road of Plymouth past and present. The development of the City also gets a mention from time to time.
Low
[ 0.532520325203252, 32.75, 28.75 ]
1. Dakota Boutin (Prince Albert) He’ll never score a bigger goal. Boutin ended the longest game in the 41-year history of Canada’s National Midget Championship, scoring at 18:36 of the third overtime period to give the Mintos the national title. Boutin, who started the season in Moose Jaw with the host Generals, bookended the tournament – he had the first goal in Monday’s opening game in addition to Sunday’s winner. 2. Connor Ingram (Prince Albert) & Étienne Montpetit (Châteauguay) How do you choose just one? Ingram and Montpetit put on a goaltending clinic in Sunday’s gold medal game, combining to stop 117 of 124 in shots almost five-and-a-half periods of hockey – Ingram finished with a slight edge in saves, 60-57. Both were at their best in overtime, making spectacular glove saves at each end to keep the longest TELUS Cup game ever going. 3. Linden Hora (Okanagan) Hora started and finished the Rockets’ comeback in their 3-2 bronze medal game win over Toronto, getting them on the board six minutes into the third period before scoring the overtime winner. Okanagan’s medal is just the fifth by a B.C. team in 41 years; Burnaby Winter Club won a gold (1982) and two bronze (1977, 1980), and North Kamloops won bronze when it hosted in 1996. 3 STARS OF THE DAY – SATURDAY, APRIL 26 1. Étienne Montpetit (Châteauguay) Montpetit was almost unbeatable in the Grenadiers’ goal, making 39 saves and keeping Toronto off the scoreboard for the first 45 minutes while his team built a 5-0 lead. Châteauguay was outshot by the Young Nationals in every period, but Montpetit stopped 15, 13 and 11 shots, playing a major role as the Quebec champions advanced to their first-ever TELUS Cup gold medal game. 2. Lance Yaremchuk (Prince Albert) The Mintos knew they needed to score goals against an offensive-minded team like Okanagan and Yaremchuk did just that, recording the second hat trick of the week, adding an assist and leading Prince Albert to Sunday’s final. Already with a goal in the first period, Yaremchuk added the game-winner early in the third, set up the insurance goal and capped his hat trick into an empty net. 3. Danick Crête (Châteauguay) The Grenadiers spread around the scoring in their semifinal win over Toronto, with 10 players recording at least one point, but it was Crête who led the way from the back end. The Châteauguay defenceman got the scoring started two minutes in, took the shot that led to the final goal with two minutes left and added another assist in between, doubling his point total from three to six. 3 STARS OF THE DAY – FRIDAY, APRIL 25 1. Tanner Campbell (Okanagan) The Rockets’ No. 2 scorer during the regular season with 67 points in 38 games, Campbell had been quiet during the first four days of preliminary round action, held off the scoresheet entirely. But he broke out in a big way in Friday’s 11-2 rout of Toronto, scoring twice and adding two assists to help the Pacific Region champions become the 23rd team in 41 years to score 11 goals in a game. 2. Martin-Olivier Cardinal (Châteauguay) With his team trailing 2-0 and time ticking down in the second period, the Grenadiers’ captain gave his team the spark it needed, rifling home a power play goal to cut the lead in half. Cardinal played big minutes with Châteauguay’s season on the line, and was on the ice to help set up Brandon McCulloch’s empty-net goal that helped clinch the 29th consecutive semifinal appearance for Quebec. 3. Lane Michasiw (Prince Albert) Just another ho-hum shutout for the Mintos’ netminder, who needed to make just 17 saves for his second consecutive clean sheet, finishing the preliminary round with ridiculous numbers – a 2-0-1 record, 0.33 goals-against average and .988 save percentage. Michasiw capped an impressive round robin with a pair of awards, sharing Top Goaltender honours with Connor Ingram and earning the nod as MVP. 3 STARS OF THE DAY – THURSDAY, APRIL 24 1. Lane Michasiw (Prince Albert) It was only a matter of time before a Mintos goaltender reached the top spot, and Michasiw gets the nod after turning aside all 30 shots he faced to blank the Moose Jaw Generals 2-0. The win helped Prince Albert clinch a spot in the semifinals, and tied the all-time tournament record for longest unbeaten streak, at 18. Oh, and Michasiw has a 0.50 GAA and .985 save percentage in his two starts … not bad. 2. Ethan Marsh (Halifax) The Macs’ remarkable comeback win over the Okanagan Rockets – in which Halifax scored four times in 10:31 to turn a 4-1 deficit into a 5-4 win – was a complete team effort, with eight players recording points in the third period alone. But Marsh had the game-winner, scoring the goal that kept the Macs’ semifinal hopes alive and setting up an exciting final day of preliminary round action. 3. Oliver Jacobs (Toronto) First start of the week? Against the tournament’s highest-scoring team? With a chance to clinch a semifinal berth? No problem for Jacobs, who played a starring role in the Young Nationals’ 3-1 win over the Grenadiers de Châteauguay, stopping 23 of 24 shots, holding the Quebec champions to just a lucky-bounce goal early in the third period and making sure Toronto will take part in the weekend. 3 STARS OF THE DAY – WEDNESDAY, APRIL 23 1. Marco Bozzo (Toronto) Bozzo was a power play machine on Wednesday night, scoring three of the Young Nationals’ four goals with the man advantage in a win over the host Moose Jaw Generals. The Toronto forward scored from in close and on a tip-in in the first period, and hammered home his hat trick marker in the last minute of the third to help the Central Region champions to first place after three days. 2. Connor Ingram (Prince Albert) Another day, another Mintos goaltender on the list. Ingram made it three-straight games with at least 30 saves for a Prince Albert netminder, stopping 30 of 31 to help the Saskatchewan side to a 1-1 tie with the Okanagan Rockets. Ingram and Lane Michasiw have been lights out for the Mintos, posting a combined .969 save percentage (95 saves on 98 shots) in their team’s first three games. 3. Tyler Hylland (Châteauguay) On a day where more than half the Grenadiers skaters put their names on the scoresheet, Hylland led the way; the Mercier, Que., native had a goal and three assists and was in on four of the first six Chateauguay goals as the Quebec champions routed Halifax 7-3. Hylland was one of eight Grenadiers to record multiple points, and moved to second on the tournament scoring list. 3 STARS OF THE DAY – TUESDAY, APRIL 22 1. Tanner Wishnowski (Okanagan) Wishnowski jumped up one spot on the list from Monday thanks to another three-point performance. He opened the scoring for Okanagan, made it a 3-2 game with a spectacular end-to-end rush and set up Cory Santoro for the tying goal with another see-it-to-believe-it effort; through two games, the Rockets have scored six goals, and Wishnowski has been in on all six – three goals, three assists. 2. Tyler Longo (Toronto) With his Young Nationals nursing a 1-0 lead after two periods, in a game that had featured only 19 shots to that point, Longo stepped up with a pair of insurance goals. He kept on a two-on-one early in the third period, beating Reilly Pickard under the glove, and hammered in the 3-0 goal from the slot with just over two minutes to go, clinching Toronto’s first win of the tournament. 3. Lane Michasiw (Prince Albert) The Mintos goaltender turned in his team’s second straight 30+-save performance, stopping 35 of 36 to help the West Region champions earn a single point against Châteauguay. Michasiw made 29 of his saves over the final 40 minutes, including breakaway stops off Brandon McCulloch and Alexandre Payusov – two of the Grenadiers’ top scorers – to help Prince Albert to first place. 3 STARS OF THE DAY – MONDAY, APRIL 21 1. Justin Ritcey (Halifax) The McDonald’s goaltender, making his second straight TELUS Cup appearance (he played with the Valley Wildcats in 2013), was spectacular in the tournament-opening 2-2 tie with the host Generals, stopping the first 29 shots he faced and finishing with 38 saves, many of them jaw-droppers. Ritcey almost single-handedly earned Halifax a single point despite being outshot 40-14 by Moose Jaw. 2. Tanner Wishnowski (Okanagan) Wishnowski did it as the scorer and set-up man, and did it at even strength, on the PP and on the PK, helping the Rockets erase a 3-1 deficit and earn a single point against Châteauguay. The defenceman helped set up Brett Young’s shorthanded goal late in the first period, scored the 3-2 goal late in the second, and provided a pretty cross-crease feed to Liam Finlay for the tying goal in the third. 3. Dakota Boutin (Prince Albert) Back on familiar ice, Boutin didn’t waste any time making an impact; the Mintos forward scored the first goal of the TELUS Cup and set up Lance Yaremchuk for the eventual game-winner – all in the first period – to help Prince Albert to the lone win on Day 1. The 16-year-old is no stranger to Mosaic Place; Boutin played last year, and the first 11 games of this season, with the Moose Jaw Generals.
Mid
[ 0.6398104265402841, 33.75, 19 ]
RIGA (Reuters) - Latvia came under renewed pressure to accelerate financial reforms as a senior U.S. official, at a meeting with its prime minister, underscored the urgent need for stricter controls after a money laundering scandal. Assistant Secretary for Terrorist Financing in the U. S. Department of the Treasury Marshall Billingslea speaks during a news conference in Riga, Latvia May 16, 2019. REUTERS/Ints Kalnins His remarks come more than a year after the United States acted to shut down ABLV, a Latvian bank it said was linked to North Korea’s nuclear weapons program, to money laundering and Russian corruption. Marshall Billingslea, who heads the Office of Terrorist Financing and Financial Crimes at the U.S. Treasury, said during a visit to Latvia on Thursday that the Baltic state required “urgently needed legislation” that was “long overdue”. “The new government is moving swiftly but there is a lot that has to be done,” said Billingslea, praising Prime Minister Krisjanis Karins’s intentions but highlighting the need for results. “The proof is in the pudding.” The bank’s closure was the first in a series of European money-laundering scandals that later sucked in Nordic lenders, prompting a pan-European debate about how to control such financial crime. ABLV, and Latvia’s supervision of its winding-down, remains at the center of tension between Latvia and Washington, which wants tighter control of the bank’s liquidation, people with direct knowledge of the matter have said. After Latvia secured independence in 1991 from the then-Soviet Union, more than a dozen of its banks promoted themselves as a gateway to Western markets for clients in former Soviet states, promising Swiss-style secrecy. That policy has now been abandoned under U.S. pressure but despite forecasts by Latvian officials a year ago after the shuttering of ABLV that many other banks would also close, they are still open. The United States, which through the dollar currency holds large sway over financial markets, is pushing back against Russian influence globally. Billingslea visited Latvia for talks with Karins, who is seeking to pass legislation to give parliament more power in hiring and firing the country’s bank supervisor. The bank supervisor has accused the Riga government of interfering in his work and said the legal changes, which also grant the regulator more power to close banks with “dirty money”, were a veiled attempt to oust him. Latvia faces a review by international money-laundering standards watchdog Moneyval in the coming months, which some officials fear could label the country as risky, alongside the likes of Serbia and Pakistan. Karins, who took over as prime minister in January, said alongside Billingslea that he was serious about reform. “My focus...is to put the system in order,” Karins told reporters. “If Latvia...failed to implement Moneyval’s recommendations, it would push our country into the grey list or even black list, which would mean a recession. It would mean lost jobs.” Latvia’s central bank governor is also being investigated for corruption, including bribery linked to ABLV, after being detained more than a year ago. He has yet to be prosecuted, returned to his job and denies the allegations.
Mid
[ 0.655502392344497, 34.25, 18 ]
This invention relates to a method for the preparation of emulsions of oil in water and more particularly the preparation of high internal phase ratio (HIPR) emulsions of viscous oils in water. Many crude oils are viscous when produced and are thus difficult, it not impossible, to transport by normal methods from their production location to a refinery. Several methods have been suggested for the transportation of such crudes by pipeline. These include (1) heating the crude and insulating the pipeline, (2) adding a non-recoverable solvent, (3) adding a recoverable solvent, (4) adding a lighter crude oil, (5) forming an annulus of water around the crude and (6) emulsifying the crude in water. Methods (1)-(4) can be expensive in terms of added components and capital expenditure and method (5) is technically difficult to achieve. Method (6) whilst superficially attractive presents special difficulties. The dispersion of a highly viscous oil in a medium of much lower viscosity is an unfavorable process on hydrodynamic grounds. This problem is further complicated by the economic requirement to transport emulsions containing relatively high oil phase volumes without sacrificing emulsion fluidity. Mechanical dispersing can lead to the formation of polydisperse or multiple emulsions, both of which are less suitable for transportation. In the case of a system comprising dispersed spheres of equal size, the maximum internal phase volume occupied by a hexagonally close-packed arrangement is ca 74%. In practice, however, emulsions are rarely monodisperse and it is therefore possible to increase the packing density without causing appreciable droplet distortion. Attempts to increase further the internal phase volume results in greater droplet deformation and, because of the larger interfacial area created, instability arises; this culminates in either phase inversion or emulsion breaking. Under exceptional circumstances, it is possible to create dispersions containing as high as 98% disperse phase volume without inversion or breaking. Emulsified systems containing 70% internal phase are known as HIPR emulsions. HIPR oil-in-water emulsions are normally prepared by dispersing increased amounts of oil into the continuous phase until the internal phase volume exceeds 70%. Clearly, for very high internal phase volumes, the systems cannot contain discrete spherical oil droplets; rather, they will consist of highly distorted oil droplets, separated by thin interfacial aqueous films. A useful state-of-the-art review of HIPR emulsion technology is given in Canadian Patent No. 1,132,908. British Patent Specification No. 1,283,462 discloses a method for producing an oil-in-water emulsion comprising beating up a mixture of the oil and water together with emulsifying agent in a vessel having a bottom exit to disperse the oil in droplets of an average size of not more than 10 microns in diameter throughout the water to form a concentrated emulsion, continuously withdrawing concentrated emulsion from the bottom exit of the vessel while simultaneously introducing components of the mixture into the top of the vessel to form further concentrated emulsion. The oils are synthetic polymers or thickened animal or vegetable oils. The action of the beater results in particle sizes in the dispersed phase of not more than 10 microns in diameter, usually from about 0.5 to 2 microns in diameter. The concentration of surfactant used is relatively high, 4-10% by weight of the total composition. This results in concentrated, thick, extremely stable emulsions which have thixotropic properties and are useful as vehicles for paints or other coatings. While U.S. Pat. No. 1,283,462 discloses that the concentrated emulsions are discharged through a short conduit from the emulsifying vessel to a tank in which they are further diluted, the concentrated emulsions are not suitable, nor are they intended, for transportation over long distances through relatively large diameter pipelines such as those used for the transportation of crude oil. Furthermore, because of their extreme stability these emulsions cannot be, and are not intended to be, readily broken. Thus, they are unsuitable for applications where it is desired eventually to resolve the emulsions into their constituent parts, such as the treatment of crude oil where water must be removed before fractionation in an oil refinery distillation unit.
Mid
[ 0.566585956416464, 29.25, 22.375 ]
Locking devices which provide a housing with internal spring loaded jaws for receiving and locking the head of a shouldered stud are well known in the art and are widely used in the transportation industry to lock the doors of freight cars and trucks. However such devices are susceptible to being broken by applying a hammer blow to the housing, which transmits a bending moment to the jaws and tends to move them toward the open position.
Low
[ 0.475409836065573, 29, 32 ]
Medicinal Plants of Bangladesh Medicinal Plants Database of Bangladesh includes the authentic Taxonomic Information, Vernacular/Bangla Name, Tribal and English Name, Family, Description and Photograph of the Plants, Chemical Constituents, Uses and Distribution of the species in Bangladesh. MPBD also contain dictionary of Botanical and Pharmacological terms. Description of the Plant Using Information Young plants are efficacious in colds. Leaves are laxative, diuretic and appetizer; cure urinary discharges and good for the eyes. Flowers are hypnotic, diuretic, expectorant and tonic to the liver; cures inflammations, boils, ringworms, scabies, leucoderma, piles, bronchitis and jaundice; improve the complexion. Hot infusion of the dried flowers is diaphoretic; used in jaundice, nasal catarrh and muscular rheumatism. Cold infusion of flowers is laxative and toinc; used in measles and scarlatina to favour efflorescence of eruptions. Seeds are purgative, carminative, bechic and aphrodisiac; cure scabies and catarrh. Seed oil has got the same properties as the seed; it is useful in paralysis and itch and as a liniment in rheumatism. Root is diuretic. Visit Our Pages: About MPBD Medicinal Plants Database of Bangladesh aims to create opportunities for researcher and students from different disciplines such as Botany, Zoology, Pharmacology, Microbiology, and different herbal medicine industries to easily access. A plan for regular update and enrich this database has been made. Read more About Us.
High
[ 0.699878493317132, 36, 15.4375 ]
1. Field of the Invention The present invention relates to an embedded semiconductor device substrate having a semiconductor device buried in an insulating resin layer of a printed wiring board, and a method of producing the same. 2. Description of the Related Art In recent years, the semiconductor package having a semiconductor device mounted therein has been continuously reduced in size and weight. Therefore, there has been increasing adopted a structure in which an electrode portion of a semiconductor package is formed into an area array, such as BGA (Ball Grid Array) and CSP (Chip Scale Package). Furthermore, not only a two-dimensional size reduction such as the BGA and CSP, but also a multi chip package in which a plurality of semiconductor devices are stacked in a single package has been proposed such as disclosed in Japanese Patent Application Laid-Open No. H11-3970. On the other hand, in addition to such size reduction of semiconductor packages, an embedded semiconductor device substrate having a semiconductor device buried inside of a printed wiring board has been proposed such as disclosed in Japanese Patent Application Laid-Open No. H09-321408. In the embedded semiconductor device substrate disclosed in Japanese Patent Application Laid-Open No. H09-321408, a semiconductor device having stud bumps formed thereon is mounted in a recessed portion formed beforehand on a printed wiring board, and an insulating layer is then formed so as to cover the semiconductor device. However, in the embedded semiconductor device substrate described in Japanese Patent Application Laid-Open No. H09-321408, since a routering is necessary for forming a recessed portion in a printed wiring board, which increases the processing time remarkably. In addition, in order to bury a semiconductor device, it is necessary to form a holding surface for holding the semiconductor device at a bottom of the recessed portion, and an insulating layer is needed for the holding surface. In consequence, the thickness of the embedded semiconductor device substrate having the semiconductor device varied therein becomes very large, which makes the size reduction difficult. So, there has been proposed a method which does not form a recessed portion beforehand in a printed wiring board but buries a semiconductor device during production of a printed wiring board to thereby produce an embedded semiconductor device substrate, in Japanese Patent Application Laid-Open No. 2004-335641. The production method disclosed therein will be explained with reference to FIGS. 10A to 10F. First, as shown in FIG. 10A, a semiconductor device 101 is mounted through an insulating epoxy resin 104 on a Cu foil 103. Next, as shown in FIG. 10B, a prepreg material 105 is disposed at such a location that an opening 105a of the prepreg materiel 105 contains the semiconductor device 101. The prepreg material 105 has approximately the same thickness as the thickness of the semiconductor device 101, and the opening 105a having a shape corresponding to the shape of the semiconductor device 101 is formed with a punching press. In addition, on the prepreg material 105, there is put an RCC (Resin Coated Cupper) material 107 having an epoxy resin 106 as an insulating resin coated on a Cu foil 103a. The Cu foil 103, prepreg material 105, and RCC material 107 (epoxy resin 106/cupper foil 103a) are disposed by stacking in this way, and are subjected to thermocompression bonding in a vacuum atmosphere as shown in FIG. 10C. Next, as shown in FIG. 10D, a part of the Cu foil 103a corresponding to an electrode portion 102 on the semiconductor device 101 is removed by ordinary etching to form a hole portion. Then, a part of the epoxy resin 106 which is exposed via the hole portion is removed by a laser such as a CO2, YAG, or excimer laser to form an opening 108, whereby the electrode portion 102 of the semiconductor device 101 is exposed therethrough. Next, as shown in FIG. 12E, while a Cu layer 103b is formed on the entire surface by plating, the opening 108 is filled with the Cu layer 103b. Subsequently, a resist material is coated on the Cu layer 103b, and a wiring pattern is formed in an exposure step through a mask and a development step, so that the embedded semiconductor device substrate having the semiconductor device 101 integrated therein as shown in FIG. 10F is obtained. In the embedded semiconductor device substrate disclosed in Japanese Patent Application Laid-Open No. 2004-335641 above, by forming an opening accurately by use of a laser, electrodes of a semiconductor device are exposed outside. Furthermore, by etching a Cu layer formed on a printed wiring board by use of a mask, a wiring pattern connected to the electrodes is formed. Hence, there is required an etching accuracy of such an extent as to surely connect the electrodes of the semiconductor device and the wiring pattern on the printed wiring board to each other. On the other hand, since a large number of semiconductor devices are produced from a single semiconductor wafer, there are differences between individual semiconductor devices obtained therefrom, and there are positional errors between the individual semiconductor devices also with regard to electrode positions. Furthermore, there will be necessarily generated a mounting error within a predetermined range in the mounting position of a semiconductor device to a printed wiring board. Therefore, there is generated a displacement with respect to a design position between the patterning position of a wiring pattern, and the position of an electrode of a semiconductor device. Generally, in prospect of this displacement, the patterning using a mask is made so as to provide a pattern shape with a predetermined amount of margin. Nevertheless, as the pitch of electrodes of a semiconductor device is reduced, it becomes impossible to take a sufficient margin to avoid interference with an adjacent wiring pattern. That is, it becomes difficult to allow the above described errors when mounting semiconductor devices to a printed wiring board and positional errors of electrodes between individual semiconductor devices, by means of a margin of a pattern shape. Thereby, the electrodes of the semiconductor devices and the wiring on the printed wiring board will not be connected. Such a situation becomes significant as the pitch between electrodes of a semiconductor device is reduced, and it is believed that it will become a more serious problem in the future.
Mid
[ 0.544, 34, 28.5 ]
Fisher, from 1997 to 2001, was Deputy United States Trade Representative (USTR) with the rank of Ambassador. During this period, Ambassador Fisher oversaw trade policy for Asia and the Pacific and the Americas. He represented the U.S. at both the 1999 New Zealand and 2000 Australia Ministerial meetings of the 21-member states of APEC. Ambassador Fisher negotiated the U.S.-Korea Auto Agreement of 1998; the U.S.-Vietnam Bilateral Trade Agreement, which was signed by President Bush in 2001; and the initiation of the U.S.-Singapore Free Trade Agreement. He was a member of the team that negotiated the U.S.-China agreement for Chinese accession to the World Trade Organization and, separately, the bilateral aspects of Taiwan's accession. He chaired the American delegation for the Enhanced Initiative on Competition and Deregulation of the Japanese Economy for three years, an exercise that resulted in significant changes in the structure of Japan's telecommunications (the deregulation of NTT's telephone monopoly), housing, energy, health care, retailing (the "Large Scale Retail Store Law"), and financial sectors. Fisher was the chief operating officer of the U.S. government for NAFTA, the largest trading relationship of the U.S., accounting for 40% of U.S. exports and 30% of U.S. imports. He had oversight responsibilities for the development of the Free Trade Area of the Americas, representing the U.S. at the Ministerial (Cabinet) level for multilateral negotiations with the 33 Latin and Caribbean nations involved. He negotiated numerous high-profile issues throughout the hemisphere, including the deregulation of Telmex, the removal of Canadian restrictions on U.S. magazine publications, the protection of U.S. companies' intellectual property rights in Argentina and Brazil, and the initiation of the U.S.-Chile Free Trade Agreement. Before joining USTR, Mr. Fisher was managing partner of Value Partners Ltd. and Fisher Capital Management from 1987 through 1997. With $500 million in equity capital, both firms specialized in buying claims to publicly-traded assets selling significantly below true value in securities markets of the U.S., Europe and throughout Asia. (Mr. Fisher resided in Tokyo in 1990.) Previously, Mr. Fisher was senior manager of Brown Brothers Harriman and Co., where he began his career in 1975 specializing in fixed income and foreign exchange markets. Mr. Fisher is a first generation American. He is equally fluent in Spanish and English, having spent his formative years in Mexico. He attended the U.S. Naval Academy (1967-1969), graduated with honors from Harvard in economics (1971), read Latin American history at Oxford (1972-1973), and received an MBA from Stanford Graduate School of Business (1975). "Richard W. Fisher, President and CEO of the Federal Reserve Bank of Dallas, received The American Assembly’s Service to Democracy Award at a dinner in his honor on October 18, 2006, at the James M. Collins Executive Education Center at Southern Methodist University in Dallas." [1]
High
[ 0.688221709006928, 37.25, 16.875 ]
TMCnet FEATURE TMCNET eNEWSLETTER SIGNUP Advantages Offered by Using Speech Recognition Services on Your Laptop There are a number of people who only think of data in terms of text and numbers; however, not only does voice documentation hold a position in the realm of data collection tools that are able to be used by healthcare, communications and entertainment industries, it also offers a number of financial benefits. Documentation using voice is not just about being able to capture information, which is what most people believe about it. Now this voice recognition is used in such a way that the document that is created is able to be reused through a business’s or organization’s downstream for a number of other purposes such as quality assurance functions and reviews. Voice is all about turning a type of information into a language of actual understanding. It takes the unstructured text and transforms it into a meaning that is able to be transferred from system to system. Some of the financial benefits offered by speech recognition services are highlighted here. Data that is Reusable Speech data is able to be reused, just as any other type of data can. This reusability offers a means to not have to put in man hours reproducing text that is already done. With the additional editing tools, such as HDCam SR Editing, you can ensure the resulting product is free from any type of errors. Flexibility Speech recognition is not just linked to one single device. With the technology that is available today, there are a number of cloud based apps which will allow a user to share this information across the entire board, which means that no matter where it is being used, everyone who may need access can easily gain it. Fewer Errors While speech recognition is most closely associated with medical uses, there are a number of other uses that make it a valuable addition to an industry. In the realm of television and movies, this can be invaluable for creating closed captioned titles or subtitles. This is essential for the success of many programs and movies. The good news is that there are now more speech recognition technology options than ever before. This will mean that it should be no problem to find the right solution for your needs. As you can see, the benefits are many, which can make this type of technology an asset to a number of different businesses. The good news is, the latest laptops available on the market offer the ability to use this type of technology. As a result, you can have all the features and benefits at your fingertips that are listed here. You need to take your time when choosing a laptop and make sure to look at some of the latest laptop reviews. Doing so will help ensure you make an informed decision.
High
[ 0.6712962962962961, 36.25, 17.75 ]
Q: Azure Mobile Services and Asp.net Identity Architecture I am hoping someone can clear up how these things can work together. I want to be my own identity provider, so in my web api I have an OAuth token provider. I want users to register with me and then be authenticated using my token provider. The idea in the future is that more of my mobile apps and web apps will be accessible using the OAuth login sharing the user's identity. So, if I use azure mobile services how do I implement the normal asp.net identity stuff? And, how would a normal web app be able to use the data stored in azure mobile services? Would I have two dbcontexts one for mobile and one for web? I've been reading and watching a lot of stuff on azure but nothing seems to show how I can do this. Most of it has to do with using external providers like facebook, ms, twitter, etc. I want to be one of those external providers, just not sure how to do it and allow my websites to still use the .net identity data. If you could point me to or post some example / tutorial / blogs that would be great. A: This is a supported scenario, although it isn't documented very well at the moment. The Mobile Services .NET runtime is built on the ASP.NET Katana authentication middleware. The mobile service abstracts these middleware using the LoginProvider base class. The authentication model was recently made extensible for situations such as yours. In order to have Mobile Services recognize and use your identity provider, you would have to create your own LoginProvider. There are currently two examples of this: Adding a Katana middleware as an identity provider - part of this post. Creating a custom username/password setup - tutorial here. You could certainly use these techniques to wrap the standard ASP.NET identity functionality. As to your question about accessing the data, there are a variety of approaches. Your web app could treat Mobile Services as a backend and pass through requests. This is basically treating the web app as an additional client platform, peer to your mobile apps. Another option is to, as you said, create multiple DBContexts. While you might get slightly better performance, this comes with a code maintainability tradeoff. It also wouldn't scale well if you build multiple web apps on the same data backend.
High
[ 0.7267833109017491, 33.75, 12.6875 ]
Additionally, we've corrected a couple of critical quest bugs, plus an absolutely massive number of smaller issues with in-game object details, cleaned up behavior when the player does unexpected stuff (like poking new air-holes in an NPC's head with an SMG right after accepting their quest to track down that family heirloom), and have updated the game's text in both English and other languages. This one is in the running for being our biggest Wasteland 2 patch so far - and certainly of the new year. Fixed a bug in identifying the Broken Man during the Hollywood/Griffith questline that could in some cases render the peace outcome unattainable. Updated Prison HQ. A large rolling gate now blocks the Prison HQ to prevent quest sequence breaks. The gate is opened by Danforth at the appropriate time during the story, or when the player fixes the broken robot to destroy the turrets and gate. Huge bug fix pass - nearly our biggest patch ever!? Large English text updates. Localization fixes and updates across all languages. For full release notes, see here: http://wastelandrpg.tumblr.com/post/110571021686/wasteland-2-patch-6-changelog-65516 Wasteland 2 56 223 Wasteland 2 wins PCWorld Game of the Year and more Dec 30, 2014 As the year comes to a close, we look back to an amazing period for PC games and RPGs in particular. Given so many great titles came out this year, we were absolutely thrilled and humbled to hear that PCWorld has selected Wasteland 2 as their Game of the Year[www.pcworld.com]. It is gratifying to see the strong response from fans matched by the press, and it's thrilling to close out this year being recognized among the best of what the gaming world had to offer! PCWorld's honors are joined by John "TotalBiscuit" Bain's Best Thing to Come Out of Crowdfunding, Gamers Honest Truth's Indie Award[gamershonesttruth.com] and an entry in Shacknews' Games of the Year list. Once again, our thanks go out to our backers and fans, without you this never would have been possible. And the book is not quite closed yet, we have high hopes for the future and plan to continue supporting Wasteland 2 beyond this year and into 2015. And with Torment: Tides of Numenera, computer RPG fans have much, much more to look forward to from us as well! Wasteland 2 45 297 Wasteland 2 Patch 5 Release Notes (61997) Dec 15, 2014 Aaannd here we go! Patch 5 for Wasteland 2 is out, featuring a bevy of fixes, changes and improvements for your gaming enjoyment! Highlights Added Castilian Spanish community localization to the game. It can be selected by picking "español castellano" from the Gameplay Options menu. Existing Spanish language players will have their language defaulted to the now-renamed "español americano" option. Large localized text clean up for all languages Optimized the way random encounter data is stored to reduce loading time and file size. Added more sound effects throughout the game. Clean-up of smaller bug fixes throughout the game. Full change list can be found here: Wasteland 2 45 181 Wasteland 2 Patch 4 (60792) Release Notes Nov 18, 2014 Patch 4 for Wasteland 2 is here! This update is primarily a bug-fix pass that we put out to resolve some critical issues that arose sooner rather than later. Despite being a "hotfix", we have 300+ fixes in this update... dive in to the full notes below! Highlights This patch is primarily a bug-fixing update to correct a number of critical issues below: Fixed Canyon of Titan endless combat bug with the raiders in the "junk fort" near Outpost One. Fixed Canyon of Titan endless combat bug with Diamondback Militia. Fixed Temple of Titan unending cutscene bug when arrested by Father Enola. See here for the full details: http://wastelandrpg.tumblr.com/post/102989563471/wasteland-2-patch-4-changelog-60792 Wasteland 2 24 135 Wasteland 2 Patch 3 (59820) Release Notes Nov 5, 2014 Patch 3 for Wasteland 2 is here, bringing our biggest change and improvement list yet! Most notably, we've got Steam Achievements, colorblind mode, and you can now carry your Ranger squad over into a second adventure after finishing the game the first time! Highlights Added Steam Achievements! Collect them all, if you dare. These are currently only in for Windows. Steam Achievements should be backwards compatible for many (but not all) save files, so players will receive achievements automatically by loading up their save files. Added and improved epilogue text to fix bugs and add more details that were previously missing. Added colorblind mode! Activate it in the Display Options menu. This mode changes certain HUD element colors, primarily in combat, to be easier to discern for people with colorblindness. Added a new brightness/saturation calibration screen to get the game looking as good as it should on a display near you. Characters are now automatically exported at the end of the game. Veteran characters will now be noted as such in character creation. Further improvements to Text Size setting so it now affects much more text across the interface. This will help out players who are visually impaired, or who play on high-DPI displays, or TVs. Added an option to show/hide selection circles on the party, for those who would prefer them off. Continued cleanup of bugs and issues, especially in California. For the full list of changes, check out the nitty-gritty here: Wasteland 2 77 270 Wasteland 2 Patch 2 (58154) Release Notes Oct 13, 2014 Patch 2 is here! This update brings over 4300 words' worth of changes and improvements, but we expect most of you will want the most important bits, so here they are! Highlights - Large amount of memory optimizations, particularly with audio, to improve performance and stability on lower-spec systems and 32-bit operating systems. - Loading now continues when the game is tabbed out, and pauses after finishing. - Further UI fixes and improvements, such as new and correctly used icons. - Many localization updates and bug fixes across all languages. For full release notes, please see: Wasteland 2 100 284 Wasteland 2 Patch 1 (56458) Release Notes Sep 26, 2014 The first patch for Wasteland 2 just went live. View full patch notes on our tumblr[wastelandrpg.tumblr.com]. Highlights - Removed unused DX11 support to improve stability and allow Steam overlay to work properly - Many UI fixes/polish for better ease of use and readability - Slight reduction to jam rates for large offenders - Added mini-maps to all shrine locations - Improved localizations based on context and fixes for missing translated text - Preserved time stamps on save games when using Steam Cloud - Optimization pass to some of the more expensive levels. Wasteland 2 96 207 Are You Ready For The End of Times? Sep 18, 2014 We are 9 hours out from Wasteland 2’s Release! After 25 years the Desert Rangers are returning to save the last remnants of humanity. Get ready to embark on an all-new adventure into the desolate wastes of Arizona and California! If you own Wasteland 2 in Early Access, your copy will turn into a final release copy automatically. If you have it installed this will be applied to your current installation as a patch. Wasteland 2 will launch with two editions: Classic Edition ($39.99/€39.99/£29.99) Digital Deluxe Edition ($59.99/€54.99/£44.99) Stay tuned! - Wasteland 2 Development Team Wasteland 2 71 119 Wasteland 2 manual released Sep 9, 2014 Check out the digital version of the Wasteland 2 Manual! This 100-page Ranger Field Manual will come printed with physical copies of the game, but we're making it available to everyone to read and enjoy right now. 10 more days to release! You will find the manual under the "Manual" link in the Wasteland 2 page on your Steam Library, or on Google Drive at Wasteland 2 26 78 New Combat Trailer Sep 4, 2014 Be sure to check out the new combat trailer narrated by our own General Vargas: /> General Vargas talks us through Wasteland 2’s combat system and all that goes into it. Creating your character and party with the attribute and skill decisions that go into it. Fighting some high-level enemies the wrong way with the wrong party or the right way with the right party. Using environment to your advantage and even using your skills to gain extra allies on your side. Wasteland 2 will be available for purchase through digital retailers for $40/€40/£35.
Low
[ 0.505938242280285, 26.625, 26 ]
... Pig Figurines Set Our Pig Figurine Set features 6 adorable pigs in various inquisitive poses. They will capture your heart immediately and will become a treasured part of your collection for years to come. Handpainted... ... Pig Figurines Set Our Pig Figurine Set features 6 adorable pigs in various inquisitive poses. They will capture your heart immediately and will become a treasured part of your collection for years to come. Handpainted... more ... artists who use their artistic talents to hand-paint the beautiful designs on the beads. In this category you can see our large selection of ceramic and porcelain animal beads. NOTE: Our Min... ... artists who use their artistic talents to hand-paint the beautiful designs on the beads. In this category you can see our large selection of ceramic and porcelain animal beads. NOTE: Our Min... more ... in an exhibition in May 1960, dedicating a room to his luxurious, "surprising" ceramic table decorations. Each group of six figurines averaging 11 inches in height sold for $750 and were described in... ... in an exhibition in May 1960, dedicating a room to his luxurious, "surprising" ceramic table decorations. Each group of six figurines averaging 11 inches in height sold for $750 and were described in... more ... Add to Wishlist | Add to Compare Email to a Friend twitter Description Made of ceramic. Created and painted by the hands of skilled craftsmen. Lifelike animal cup, home and life style goods with artwork... ... Add to Wishlist | Add to Compare Email to a Friend twitter Description Made of ceramic. Created and painted by the hands of skilled craftsmen. Lifelike animal cup, home and life style goods with artwork... more ... Solar Color Changing Ceramic Animals. Weather and water resistant, these figurines can be placed in nearly any outdoor environment and are powered by the energy of the sun. Each handpaintedceramicfigurine has cut-out... ... Solar Color Changing Ceramic Animals. Weather and water resistant, these figurines can be placed in nearly any outdoor environment and are powered by the energy of the sun. Each handpaintedceramicfigurine has cut-out... more ... its first kiln firing. The figures are then handpainted with a colorful variety of ceramic slips and bright enamel glazes. When the handpainting is completed each figurine once again needs to be fired in the... ... its first kiln firing. The figures are then handpainted with a colorful variety of ceramic slips and bright enamel glazes. When the handpainting is completed each figurine once again needs to be fired in the... more ... ‘More Than Words’ figurine. Designed and sculpted in Great Britain by artist Neil Welch, each piece is cast in a blend of heavy porcelain and ceramic, and then fired and handpainted in a soft color... ... ‘More Than Words’ figurine. Designed and sculpted in Great Britain by artist Neil Welch, each piece is cast in a blend of heavy porcelain and ceramic, and then fired and handpainted in a soft color... more
Low
[ 0.524663677130044, 29.25, 26.5 ]
City Elections Mayor & Council Seats It is the responsibility of the City Secretary’s office to conduct and oversee the City election process. The open Council seats are at large positions; you may file for any one seat regardless of where you live in Fair Oaks Ranch. Elections, if not cancelled due to unopposed candidate filings, are held in May. There will be no elections held for city offices for the 2019 year - places 3, 4 and 5 were unopposed. The City Secretary provided the certificate of unopposed candidates to City Council at the March 7, 2019 council meeting. Council declared the following unopposed candidate elected to office and cancelled the election: Council Member, Place 3 - Steve Hartpence Council, Place 4 - Laura Koerner Council Member, Place 5 - Snehal R. Patel The Certificates of Election and Oaths of Office shall be issued to each candidate after the regular canvassing period would have taken place. County Elections will not be held at City Hall for May 2019. Please contact your County Voter Registrar for polling site details. Title 15 of the Texas Election Code pertains to campaign contributions and expenditure. All financial reports must be completed by the candidate's campaign treasurer, signed by the candidate, and filed in the City Secretary's office. Questions regarding the forms, reporting procedures, contributions, or expenditures, are to be directed to the Texas Ethics Commission at (512) 463-5800 as the election law strictly limits the role of the City Secretary's office to accepting and filing the various applications, affidavits, and statements, and noting the date of filing thereon.
Low
[ 0.49392712550607204, 30.5, 31.25 ]
Cruz Tells Parents to “Spank the Bejesus” Out of 10-Year-Old Heckler LA PORTE, INDIANA — Ted Cruz reacted quickly and angrily last night when a young boy laughed at him and hollered out “you suck” during a raucous rally in this small manufacturing city. “No, you suck!” snapped Cruz as he pointed at the boy who immediately turned and grabbed onto his father’s leg. “You need to be seen and not heard, little man!” “I was spanked regularly with a wooden spatula when I was your age and I learned firm respect for my elders and leaders — I was whupped and I turned out all right.”“As the Bible says, spare the rod and spoil the child,” shouted Cruz as the mother and father hurried the boy away from the stage. (*Editor’s note: Mr. Cruz is incorrect in attributing this quote to the Bible. It was written and published by British poet Samuel Butler in the 17th century to make fun of religious extremists. Proverbs 22:15 does come close however: “Foolishness is bound in the heart of a child but the rigid rod of correction shall drive it from him.”) “I would spanketh that child,” Cruz shouted at the departing family. “Spanketh the sass out of him. Spank him hard to show him you loveth him.”The Cruz spanking outburst interrupted his lengthy attack on “the filthy open season in our nation’s public bathrooms”, Target stores for “letting leering male perverts share bathrooms with women”, and Donald Trump for encouraging transgenders to use whichever bathroom they want in any of his Trump buildings. Political pundits are taking this as a signal that the Republican candidates are switching their leadership focus from who gets to urinate in which washrooms to talking about spanking. Local newspaper the La Porter Herald-Angus told CNN that the young boy is from the city and is a “really good kid”. His parents refused to comment as they left with the frightened child other than to say quickly that “Cruz really, really overreacted to a little boy. He scared us all.” Newsletter Categories Follow The Lapine About The Lapine The Lapine is Canada's Best Satirical Online Newspaper. It satirizes politics, life, media and the human condition, with a special focus on Canada. No Lapine content is intended to hurt even the most delicate of feelings…but it’s bound to happen. Get over it. But if you have concerns, let us know. Did we mention that The Lapine is satire?
Low
[ 0.495069033530571, 31.375, 32 ]
Monster Hunter XX revealed at Nintendo Direct (10/27/2016) Today’s Nintendo Direct was dedicated to Capcom’s Monster Hunter. The short and sweet livestream revealed the upcoming sequel in the Monster Hunter franchise, Monster Hunter XX. The recorded stream above starts at the 34-minute mark. Here’s what we’ve learned about the new game so far: Two new monsters: Ouma Diablos: as if the Diablos species in-game isn’t enough misery already Valfark (transliterated from Katakana): a dragon with fiery jet-like wings An unrevealed style: based on the silhouette, it looks like a bombing-based style. New hunt locations This new hub based on a cluster of three airships Return of G-Rank quests Returning monsters like Barroth and Barioth Two new play styles for Nyantas/Prowlers: Bushido and Aerial styles Game saves from the previous Monster Hunter X can be imported to Monster Hunter XX. Players with saved Monster Hunter Stories will also receive in-game bonuses in XX. The game will be released in Japan by March 18, 2017. There’s no word on its English version yet, but considering Monster Hunter’s track record, we might have to wait at least a year for its international version.
Mid
[ 0.54510556621881, 35.5, 29.625 ]
Playmobil City Action Take Along Police Station 69 Pieces Playmobil City Action Take Along Police Station 69 Pieces. Protect the town with the Take Along Police Station. Monitor the situation from the headquarters, answering emergency calls and dispatching the police officer. The officer races to rescue and tracks down criminals on his speedy motorcycle. Once captured, prisoners can be locked away in the station's jail cell. But beware! Some will try to escape through the breakaway window. The Playmobil City Action Take Along Police Station 69 Pieces Playset Features: As an added bonus, this set doubles as a take along case When kids have finished their heroic deeds, simply store the pieces inside, fold up the floor and grab hold of the carrying handle for an exciting set that can travel anywhere Set includes three figures, police station, lockable jail cell, motorcycle, station control board, computer, phone, walkie talkie, handcuffs, and additional accessories Since 1974, PLAYMOBIL toys, created by Hans Beck, have become a classic throughout children's playrooms, with play themes ranging from a knight's castle to a sunny vacation hotel. Playmobil's award-winning toys set the benchmark for high-value, quality play products that spark imaginative play for children all over the world. Toys > Category > Building Blocks, LEGO Toys > Playmobil > City Action. Toys & Games > Toys > Art & Drawing Toys > Toy Craft Kits.
Low
[ 0.525139664804469, 35.25, 31.875 ]
<?xml version="1.0"?> <!-- DO NOT ALTER OR REMOVE COPYRIGHT NOTICES OR THIS HEADER. Copyright (c) 2017 Oracle and/or its affiliates. All rights reserved. The contents of this file are subject to the terms of either the GNU General Public License Version 2 only ("GPL") or the Common Development and Distribution License("CDDL") (collectively, the "License"). You may not use this file except in compliance with the License. You can obtain a copy of the License at https://oss.oracle.com/licenses/CDDL+GPL-1.1 or LICENSE.txt. See the License for the specific language governing permissions and limitations under the License. When distributing the software, include this License Header Notice in each file and include the License file at LICENSE.txt. GPL Classpath Exception: Oracle designates this particular file as subject to the "Classpath" exception as provided by Oracle in the GPL Version 2 section of the License file that accompanied this code. Modifications: If applicable, add the following below the License Header, with the fields enclosed by brackets [] replaced by your own identifying information: "Portions Copyright [year] [name of copyright owner]" Contributor(s): If you wish your version of this file to be governed by only the CDDL or only the GPL Version 2, indicate your decision by adding "[Contributor] elects to include this software in this distribution under the [CDDL or GPL Version 2] license." If you don't indicate a single choice of license, a recipient has the option to distribute your version of this file under either the CDDL, the GPL Version 2 or to extend the choice of license to its licensees as provided above. However, if you add GPL Version 2 code and therefore, elected the GPL Version 2 license, then the option applies only if the new code is made subject to such option by the copyright holder. --> <jxb:bindings version="1.0" xmlns:jxb="http://java.sun.com/xml/ns/jaxb" xmlns:xs="http://www.w3.org/2001/XMLSchema"> <!-- These xjc errors are fixed by these JAXB schema annotations. --> <!-- [xjc] [ERROR] Property name "Class" is reserved by java.lang.Object. [xjc] line 19 of file:fix-collides/example .xsd [xjc] [ERROR] Property "Zip" is already defined. [xjc] line 20 of file:fix-collides/example .xsd [xjc] [ERROR] The following location is relevant to the above error [xjc] line 22 of file:fix-collides/example .xsd --> <jxb:bindings schemaLocation="example.xsd" node="/xs:schema"> <jxb:schemaBindings> <jxb:package name="example"/> </jxb:schemaBindings> <!-- Resolve collision between XML name and Java keyword "class". --> <jxb:bindings node="//xs:element[@name='Class']"> <!-- Customize Element interface name --> <jxb:class name="Clazz"/> <!-- Definition level customization: All references to this global element will be by this customized property name. --> <jxb:property name="Clazz"/> </jxb:bindings> <jxb:bindings node="//xs:complexType[@name='FooBar']"> <!-- resolve name collision between attribute and element "zip" --> <jxb:bindings node=".//xs:attribute[@name='zip']"> <jxb:property name="zipAttribute"/> </jxb:bindings> </jxb:bindings> <!-- node="//xs:complexType[@name='FooBar']" --> </jxb:bindings> </jxb:bindings>
Low
[ 0.44761904761904703, 23.5, 29 ]
A muse and belief that have survived from a previous time.Focusing on presenting a sentimental interest that founds theinspiration to a real feeling of creating a poem,through the combination of melancholic landscapesand their deep and quiet eyes.
Low
[ 0.5252525252525251, 32.5, 29.375 ]
Buy This About Movses Pogossian's follow up release to his Bach Sonatas and Partitas recording on New Focus explores three works for solo violin that are inspired by those iconic pieces. Featuring solo music by Kaija Saariaho, Gabriela Lena Frank, and Andrew McIntosh, Pogossian's powerful performances carry the spirit of this most intimate of instrumentations forward, connecting the listener with Bach and extending the legacy of the unaccompanied string works. Movses Pogossian’s “Inspired by Bach” documents three new works that follow in the inescapable shadow of Bach’s music for unaccompanied violin. Two of the works presented here (Saariaho and McIntosh), inspired as they are by Bach’s pieces, incorporate elements which enhance the solo violin while Gabriela Lena Frank’s preserves the unaccompanied format. Saariaho’s Frises for violin and live electronics opens with a drone over which lyricism and instability alternate in free, improvisatory passages. Electronic sounds emerge periodically, splashing the texture with glistening timbres. Saariaho writes that the second section, “Frise de Fleurs”, is based on a ground bass — more active electronics establish a multi-dimensional texture. Delays define the electronic part in the third movement, processing more active and angular violin material. Saariaho writes that she aimed not to create symmetry in her development of this material, but instead constant metamorphosis. The final part, “Frise Grise”, is eerie and processional, as Saariaho develops a passacaglia in the accompanimental left hand pizzicati on three strings,while the haunting melody is played on the fourth string and doubled down the octave in the electronics. Gabriela Lena Frank’s Suite Mestiza is inspired by the richness of the Andean culture in South America. Frank’s movements of the suite are programmatic and colorful, each painting a picture of a different scene or character from the diverse landscape of the Andes. The imploring voice of a street vendor can be heard in the insistent double stops and the descending scale passages in the second movement, “Vendedora Cholita”. The third movement evokes the high pitched plucked string instrument, the charango, humorously depicting it in the hands of a quirky elderly performer. Fleet fireflies ubiquitous in Peru are portrayed in the virtuosic final movement, “Luciérnagas”. Andrew McIntosh’s seven movement Sheer for solo violin adds four assisting performers playing bowed wine glasses. The work opens with a vigorous fifteen second outburst that echoes the bariolage passagework in Bach’s solo violin works — perhaps the aggression heard in these phrases is indicative of McIntosh’s desire to break away from the master’s all pervasive shadow. The rest of the movement is a meditation on sustained tones, an about-face from the initial forceful gesture. We hear echoes of Bach’s implied counterpoint in the second and sixth movements as well, while the fourth movement is an exploration of intervals and their microtonal shadings, as if turning an object in one’s hand and looking at it from all possible angles. The fifth movement opens as the first did, with a short burst of energetic, violinistic activity followed by a meditation on one pitch. Later in the movement, the bowed wine glasses provide pedal harmonies, liberating the solo violinist to return to the intense physicality of the opening gesture. The piece closes with a movement similar to the fourth, a meditation on pitch with bowed wine glass accompaniment. The three works on this recording touch on aesthetics new and old, from Saariaho’s incorporation of older formal techniques such as passacaglia within a context that integrates live electronics, Frank’s colorful depiction of Andean life, and McIntosh’s stark exploration of the essence of violin sound production, “Inspired by Bach” is a thoughtful and reflective look at contemporary approaches to composition for solo violin. Movses Pogossian’s performances are lyrical and deeply expressive, and he is the ideal ambassador for this repertoire that marries experimentation with tradition, and exploration with communication. Recorded on May 23, 2017 (Frises), and November 21-22, 2017 (Suite Mestiza/Sheer), at the Recording Studio of the UCLA Herb Alpert School of Music Electronics Realization and Mixing (Frises): Jean-Baptiste Barrière Logistical and Technical Support: Luis Henao Graphic Design: Anneliese Varaldiev and Karin Elsener Movses Pogossian Armenian-born violinist Movses Pogossian made his American debut with the Boston Pops in 1990, about which Richard Dyer of the Boston Globe wrote: “There is freedom in his playing, but also taste and discipline. It was a ery, centered, and highly musical performance.” He was a prizewinner at the 1986 Tchaikovsky International Competition, and the youngest ever first-prize winner of the 1985 USSR National Violin Competition, whose previous winners included David Oistrakh and Gidon Kremer. He has performed extensively as a soloist and recitalist in Europe, North America and Asia, and was artist-in-residence of the Los Angeles Chamber Orchestra during their 2016/17 season. An avid chamber musician, Pogossian has collaborated with such artists as Jeremy Denk, Kim Kashkashian and Alexei Lubimov, and with members of the Tokyo, Kronos and Brentano String Quartets. A committed champion of new music, he has premiered over seventy works, many of them written for him. He has worked closely with composers such as György Kurtág, Tigran Mansurian, John Harbison and Augusta Read Thomas. At Kurtág’s invitation, Pogossian made his Darmstadt Festival debut in 2008, performing Kafka Fragments to critical acclaim. In Los Angeles, Pogossian is the Artistic Director of the Dilijan Chamber Music series, now in its fourteenth season, and frequently performs with the acclaimed series Monday Evening Concerts. He was a recipient of the 2011 Forte Award, given by the new-music organization Jacaranda for his outstanding contributions in this eld. Movses Pogossian’s discography includes several CDs for solo violin, including the recently released recording of the Complete Sonatas and Partitas by J.S. Bach, Blooming Sounds, and In Nomine, as well as György Kurtág’s Kafka Fragments, with soprano Tony Arnold. In his review of Kafka Fragments, Paul Grif ths writes “ . . . remarkable is Pogossian’s contribution, which is always beautiful, across a great range of colors and gestures, and always seems on the edge of speaking—or beyond.” In 2015, Pogossian’s recording of composer Stefan Wolpe’s Complete Works for Violin (Bridge Records) was included in the Top Ten list of the Sunday Times (UK), and in 2018, the Bridge label will release a lmed performance on DVD of chamber music by Arnold Schoenberg and Anton Webern. The centerpiece of this presentation is one of Schoenberg’s most important works—his String Trio, Op. 45, performed by Pogossian, violist Kim Kashkashian and cellist Rohan de Saram—which was recorded for this DVD in Schoenberg’s Brentwood home, in the very room in which it was composed. Pogossian’s upcoming CD releases include another collaboration with Kim Kashkashian: a compilation of chamber works by Armenian composer Tigran Mansurian. Since earning advanced degrees in music from the Komitas Conservatory in Armenia and the Tchaikovsky Conservatory in Moscow, Pogossian has held teaching positions at a number of universities in the US, and is currently Professor of Violin Studies at the UCLA Herb Alpert School of Music. Deeply committed to both music education and community involvement, Pogossian proudly participates in the Music for Food Project, which raises awareness of world hunger, allowing performers and listeners alike to experience the powerful role which music can play as a catalyst for change. Reviews I Care If You Listen Movses Pogossian is an Armenian-born violinist and champion of new music. He has premiered over 70 pieces, has worked closely with György Kurtág, Tigran Mansurian, John Harbison and Augusta Read Thomas, and has collaborated with Music for Food, a non-profit organization that raises awareness about world hunger. His new album, titled Inspired by Bach, has been released on New Focus Recordings and includes works by Kaija Saariaho, Gabriela Lena Frank, and Andrew McIntosh. Inspired by Bach is Pogossian’s artistic response to his previous album, J.S. Bach: Six Sonatas and Partitas for Solo Violin (New Focus Recordings). There is great value to the fact that Pogossian has decided to follow such a massive recording project with the commissioning of new works that could easily become canon for the contemporary violin repertoire. Inspired by Bach opens with Kaija Saariaho’s Frises (2011) for violin and electronics, written in four movements. It was originally composed for and dedicated to violinist Richard Schmoucler, and commissioned by the Borusan Art Centre, Istanbul. The first movement opens with a pure tone low D that is gradually transformed by electronics, trills, and over-pressure of the bow. It is a meditative and intimate experience that gives the listener an opportunity to solely focus on the music, helping to clear your thoughts so you can hear the piece with a clean mind. The second movement features a bass line that grounds the melodic material, emulating Bach’s use of bass lines in his solo violin works. The third movement is a groovy conversation between the violin and the electronics that is interrupted by a stunning violin monologue. It’s a dance-like movement that lifts the listener from the comforting ground in which the previous movement was rooted. The fourth movement comes back down to Earth with beautiful electronics that are in lower octaves with the violin. The album continues with Suite Mestiza (2017) for solo violin by Gabriela Lena Frank, composed for Pogossian and commissioned through New Music USA’s New Music Connect program. This piece is a colorful exploration of Andean culture written in seven movements. Suite Mestiza opens with a beautiful and intimate movement titled “Haillí” (Prayer). Frank’s writing and the intention in Pogossian’s playing make the very beginning of the movement sound like a boldly-spoken prayer being said in isolation in the Andean mountains. The third movement, “Charanguista Viejo” (Old Charango Player) showcases a very dry pizzicato that evokes the pointed and sharp sound of a charango (a small Andean string instrument, from the lute family). The last movement, “Luciérnagas” (Fireflies), is bright and fast, like fireflies giving small glimpses of light in the night. Inspired by Bach closes with a work by Andrew McIntosh titled Sheer (2017) for solo violin and eight wine glasses. This work was also been composed for Pogossian and commissioned through New Music USA’s New Music Connect program. The seven-movement piece requires the assistance of four performers playing bowed wine glasses. The first movement of Sheer opens with a virtuosic yet brief bariolage passage (alternation of notes on neighboring strings)followed by long tones. The fourth movement is an exploration of microtonal relationships within standard musical intervals. The last movement of the piece is a study of harmonics and the different timbres they can create, while the eight wine glasses accompany the violin in the background. Movses Pogossian offers a beautiful and honest performance of very different pieces. It is clear that he is a master of his craft, and that every work was treated with immense love and care, but what stands out the most is that Inspired by Bach presents a bold claim for violin repertoire. In a world where violinists continue to attempt to find “revolutionary ways” to perform Bach, the creation and recording of new works that integrate new techniques, electronics and even wine glasses, is a breath of fresh air. Inspired by Bach gives ample space for violinists to embrace the new, without forgetting the old, and sets an ideal example of what the process and result of commissioning new works should be like. -Natalie Calma, 6.4.19, I Care If You Listen The WholeNote Links between past and present are central to another solo recital, as violinist Movses Pogossian follows up his 2017 release of the Bach Solo Sonatas and Partitas with Inspired by Bach, a CD that features three new works that he feels “follow in the inescapable shadow of Bach’s music for unaccompanied violin… connecting the listener with Bach and extending the legacy of the unaccompanied string works.” The connection with Bach may be a bit tenuous at times, but they certainly do fulfill the latter aim. Kaija Saariaho’s four-movement Frises starts with the final D of the Bach D-Minor Chaconne, and each of the movements is focused on one historical ostinato-variation form – passacaglia or chaconne, for instance. In a concert setting, prepared sound materials are triggered by the soloist during the performance, together with real-time processing of the violin sound. Not here, though: Pogossian recorded the violin part alone, with Jean-Baptiste Barrière adding the electronics afterwards. It’s a tough listen at times, but always engrossing. The American composer and pianist Gabriela Lena Frank’s Suite Mestiza was inspired by South American Andean culture, in particular sights and sounds remembered from trips to Peru with her mother. Described as programmatic and colourful, the seven movements depict scenes and characters from the Andes region. It’s imaginative and wide-ranging writing that draws quite remarkable playing from Pogossian. You can watch his performance on YouTube. The American composer and violinist Andrew McIntosh says that his seven-movement work was partly inspired by the idea of juxtaposing different, clearly defined but unconnected shapes and colours. Certainly his Shasta starts that way, a fast and bustling opening that recalls the bariolage passages in the Bach works, followed by a still, long-held single note. An unexpected addition is the scoring for eight wine glasses bowed by four performers; they make their most noticeable contribution in the final movement, giving the work a peaceful ending that sounds like gentle breathing. Whatever the technical or musical challenges, nothing seems to create problems for Pogossian, who is quite superb throughout a terrific CD. -Terry Robbins, 2.27.19, The WholeNote Vital Weekly Armenian-born violinist Movses Pogossian released for New Focus Recordings in 2017 ‘Six Sonatas and Partitas for Solo Violin’. With the follow up, ‘Inspired by Bach’, he presents three compositions from three composers: Frises (2011) by Kaija Saariaho, Suite Mestiza (2017) by Gabriela Lena Frank, and Sheer (2017) by Andrew McIntosh. The points out that Bach was a point of departure – in whatever way – for the composers involved here. Frises consists of four contrasting sections for violin and electronics. Suite Mestiza takes inspiration from the mixed-race cultures of Peru. Sheer is a suite of also seven small pieces for solo violin and eight wine glasses played by four musicians. All three are interesting and absolutely worthwhile compositions that are performed superbly by the playing and interpretation by Pogossian. He gives a very warm, expressive and moving performance. Pure beauty! -Dolf Mulder, 12.3.18, Vital Weekly Related Albums Search Menu About New Focus Recordings is an artist led collective label featuring releases in contemporary creative music of many stripes, as well as new approaches to older repertoire. The label was founded by guitarist Dan Lippel, composer/engineer/producer Ryan Streber, and composer Peter Gilbert in 2004, formed …Read More …
Mid
[ 0.626506024096385, 32.5, 19.375 ]
Q: NoClassDefFoundError on HelloWorld program I've looked through the other NoClassDefFoundError questions and not found a solution that works for me. I'm using the Eclipse IDE to write a program, and it runs fine when I right-click -> Run as Java application in Eclipse, but attempting to run it through the command line runs into the above error. The JRE I'm using is (I think) Java60. The program is compiled using javac HelloWorld.java which runs fine, then a call to java -cp . HelloWorld throws the error. Any help with troubleshooting this would be much appreciated. Code is: package tool; public class HelloWorld { public static void main(String[] args){ System.out.println("Hello World!"); } } Running from "C:\MADtool\HostDBtoMADTool\src\tool" Output from the command line is: C:\MADtool\HostDBtoMADtool\src\tool>java -cp . HelloWorld Exception in thread "main" java.lang.NoClassDefFoundError: HelloWorld (wrong nam e: tool/HelloWorld) at java.lang.ClassLoader.defineClass1(Native Method) at java.lang.ClassLoader.defineClass(Unknown Source) at java.security.SecureClassLoader.defineClass(Unknown Source) at java.net.URLClassLoader.defineClass(Unknown Source) at java.net.URLClassLoader.access$100(Unknown Source) at java.net.URLClassLoader$1.run(Unknown Source) at java.net.URLClassLoader$1.run(Unknown Source) at java.security.AccessController.doPrivileged(Native Method) at java.net.URLClassLoader.findClass(Unknown Source) at java.lang.ClassLoader.loadClass(Unknown Source) at sun.misc.Launcher$AppClassLoader.loadClass(Unknown Source) at java.lang.ClassLoader.loadClass(Unknown Source) at sun.launcher.LauncherHelper.checkAndLoadMain(Unknown Source) A: You enter the package "tools" and make a javac (which is correct), but then you try to start the class from within that package folder (what is wrong). You have to change to the src-directory first, because the classpath is relative to the source-folder. If you use packages (what you really should do). You must ensure to start your code from the correct start-folder: C:\MADtool\HostDBtoMADtool\src>java -cp . HelloWorld update Take a look at classpath definitions: Wikipedia
Mid
[ 0.6445623342175061, 30.375, 16.75 ]
Solve 7*h - r*h - 15 = 0 for h. 5 Let u be 3 + 3/(-1) + 11. Let d = -5 + u. Solve c + d = 1 for c. -5 Suppose -2*h = -5*a + 11, 0*h - 2*h - 5*a + 19 = 0. Suppose 3*i - h*i + 1 = 0. Let n(o) = -6*o. Let p be n(i). Solve -p*c = -3*c for c. 0 Suppose -2 = 2*h - 3*h. Suppose 0 = -h*q + 7 - 3. Let v be (3 - (-1 - -2))*1. Solve v*x + 4 = -q for x. -3 Suppose 2*f = 3*b - 20, -2*b + 24 = 3*b - f. Let x be ((0/(-3))/3)/2. Suppose -5*y + 19 + 3 = -s, -5*y = -4*s - 13. Solve b*r - y*r = x for r. 0 Let h = -3 + 0. Let b be 0 + (h - 5)/(-4). Solve 0 = -5*f + 7 - b for f. 1 Suppose 0 = -a - 4*a. Suppose -28*n + 26*n = a. Solve -5*q = -n*q + 10 for q. -2 Suppose f = 2*f - 15. Suppose 6*v - v - f = 0. Solve v*u = -4 - 11 for u. -5 Suppose 5*t - 30 - 15 = 0. Solve -2*k + t = -5*k for k. -3 Let a be (-2)/10 - 1227/15. Let x = 120 + a. Suppose 0 = 2*c - 4*g - x + 12, -c - 22 = 5*g. Solve -c*i + 10 = -i for i. 5 Let a(b) = -b**2 + 4*b + 4. Let s be a(5). Let p(c) = -c**3 - 1. Let i be p(s). Solve 5*m + 0*m = i for m. 0 Suppose 0 = -5*m - 3*n - n - 1, 5*n = -20. Suppose m*o + 24 = 3*r, -r - 6 + 18 = -3*o. Let s = -3 + r. Solve v + s*v = -4 for v. -1 Suppose 2*v + 5 = 3*v, 41 = -2*y + 3*v. Let h be 2 - (-23 + -1 + -2). Let o = h + y. Solve 6*b - o = 3*b for b. 5 Let x(s) = -s**3 - 6*s**2 - 5*s - 7. Let d be x(-6). Suppose 0 = -5*q - 8 + d. Suppose 0 = 2*t - q*t + 12. Solve -t = 5*o - o for o. -3 Let v be 1 + 0 + (4 - 6) + 9. Solve 0 = -3*m + m - v for m. -4 Let v = -19 - -19. Let q = -1 - -8. Let s = q - 3. Solve v = 2*x - s*x - 2 for x. -1 Let f(v) = 2*v**2 + 2*v - 2. Let q be f(-3). Solve q = -o + 3*o for o. 5 Suppose q + 30 = 7*q. Solve 3*a + 8 = q for a. -1 Suppose 0 = -5*z + 3*n + 29, 5*z + n = 2*n + 23. Let k be (15/z)/(9/24). Solve 6*j - k = j for j. 2 Let g = 3 + -3. Suppose 0 = -3*x + s - 5*s - 1, 3*x - 3*s - 27 = g. Suppose -5*h = -x*j + 15, 0 = -4*h - 4*j + 1 + 27. Solve h*t - 1 = t for t. 1 Let f(m) = -2*m - 5. Let x be f(-3). Suppose -5*g = -3*h - 1, 5*g = h + 8 - x. Solve g*j - 1 + 11 = 0 for j. -5 Let y(m) = 3*m + 3. Let b be y(-2). Let z = -3 - b. Solve z = g + 1 - 2 for g. 1 Let q be (0 - 0)/(2/1). Solve q = 2*s + 9 - 3 for s. -3 Suppose 4*l + 5 = 5*b - l, 5*l + 5 = -2*b. Suppose 0*n - 54 = -3*n. Let a be (3/2)/(n/48). Solve -a*s + 3*s = b for s. 0 Suppose 3*c = 9, 2*c + 15 = 3*t + 4*c. Solve t*w - 4 = 2*w for w. 4 Let c(s) = s - 8. Let t be c(11). Let p = 5 - t. Solve -i = -p*i + 2 for i. 2 Let s(f) = -f**2 - 6*f. Let o(r) = -3*r - 1. Let d(w) = -2*w. Let n(g) = 5*d(g) - 4*o(g). Let z be n(-5). Let b be s(z). Solve 0 = a - b + 3 for a. -3 Let q be (96/36)/(4/18). Suppose 0 = -q*c + 17*c. Solve c = -2*l - 4 + 2 for l. -1 Let q = 9 + -4. Suppose -t + 3*d + 11 = -3, -q*d = 15. Suppose -13 = -t*k + 12. Solve -3*y = -k*y - 10 for y. -5 Suppose 0 = 6*b + 35 - 41. Solve s = -0*s + b for s. 1 Suppose -4*q = -3*p - p + 8, -2*p + 13 = -5*q. Let f(i) = i**3 + 8*i**2 + 9*i + 9. Let m be f(-7). Let h = q - m. Solve 0 - 10 = -h*y for y. 5 Suppose 3*l + 2 = 11. Suppose -2*n - 5*k + 20 = 0, -l*k + 3 = n - 9. Suppose n = 4*d - 7*d + 9. Solve d*i + 2 = -7 for i. -3 Let v be (2 - -2)*10/(-2). Let b be v/(-6)*24/20. Let p(d) = 2*d - 1. Let a be p(2). Solve -a*f + b = f for f. 1 Let q(v) = v. Let b be q(3). Let p be (-2)/(-2) + -3 - -7. Suppose -p*s - 21 = -3*j + 2*j, 9 = 5*j - s. Solve 0 = f + j - b for f. 2 Let y(l) be the first derivative of l**3/3 - 3*l**2/2 - 1. Let u be y(4). Let c = u - 1. Solve 1 = -2*w - c for w. -2 Let u be -2 + (-2 - -3)*9. Suppose 4*f + 2*k - u + 1 = 0, -2*f + 4*k = 12. Solve -2*h = 4 - f for h. -2 Suppose 0 = 2*b + y - 8, 3*b - 2 = -4*y - 0*y. Solve 3*n - 5*n - b = 0 for n. -3 Suppose -a - 10 = 3*h, 4*a - 2 = 2*h + 14. Suppose -3*s - s + 8 = 0, -a*i = -5*s + 8. Let p be (i/(-1))/(2/(-6)). Solve 0 = p*f + 1 - 4 for f. 1 Suppose -4*h + 0 = 4*d - 28, 3*d - 18 = -2*h. Solve 2 = -3*q - d for q. -2 Suppose -2*z + 0*z - 4*s - 24 = 0, -4*s - 12 = -4*z. Let v(y) = y**2 + y. Let x be v(z). Let j be 4/x + (0 - -2). Solve -j*t + 2 = -10 for t. 3 Let l(a) = -a**3 - 2*a**2 + 3*a - 2. Let n be l(-3). Let x be (90/(-25))/(n/10). Solve 5*r - x = 7 for r. 5 Suppose 4*k + 21 = -j, 2*k = -2*j + 2 - 14. Let y be (-1 + -1)*(0 + j). Solve -y - 3 = -z for z. 5 Let s = 8 - 5. Let x be 1 + (s + -1)*2. Let a = 62 + -42. Solve x*n + a = n for n. -5 Let h = 32 + -28. Solve h*z + 2 = 3*z for z. -2 Suppose -6 = 3*z - z. Let f be (-8)/3*(z + -3). Solve -f = v + 3*v for v. -4 Let n = -6 - -7. Solve -4*j + n = -3 for j. 1 Let c(w) = -w**3 - 6*w**2 - 8*w - 3. Let a be c(-6). Suppose -6*s + s = a. Let t = -5 - s. Solve t*p - 8 = -0*p for p. 2 Let t(j) = -j**3 - 7*j**2 + 9*j + 8. Let b be t(-8). Solve -5*w + 3 + 2 = b for w. 1 Let c = -20 - -35. Suppose -4*h + 9 = -c. Solve 5*o + h = 1 for o. -1 Let u be (-46)/(-14) - (-4)/(-14). Let o = -49 - -65. Solve -u*k + o = k for k. 4 Let g = -3 + 5. Let l be ((-42)/35)/((-4)/10). Let x = -2 + l. Solve 0 = f + x - g for f. 1 Let g(p) = -2*p + 4. Let m be g(-6). Suppose s = 2*u - 3*s - m, -3*u + 4*s = -16. Solve u = b - 1 for b. 1 Let o(l) = l**3 + l + 13. Let v be o(0). Suppose -4*i - v = -4*p - 5, 0 = -2*p + 3*i + 1. Solve -3 = p*n + 2 for n. -1 Let i = 9 - 7. Let b(x) = -x - 1 - i + 0*x - 1. Let k be b(-7). Solve 12 = -6*p + k*p for p. -4 Let q(g) = g. Let z be q(4). Solve 2 + 18 = z*a for a. 5 Let c(j) = -j**3 + 24*j**2 + 26*j - 5. Let b be c(25). Solve -4*h - 8 = -b for h. 3 Suppose -w + 0*w = -3*m + 60, w = 4*m - 79. Suppose -3*x - x = -4. Let i be 16/(-4)*-1*1. Solve x = i*s - m for s. 5 Let y(x) = -x**3 + 9*x**2 - 8*x + 3. Let l be (-3 - -1)/((-1)/25). Let r be (12/(-5))/((-15)/l). Let b be y(r). Solve -b*a = -2*a for a. 0 Let p = 5 + -2. Suppose -16*t = -13*t - p. Solve -t + 7 = -3*z for z. -2 Let j be (20/16)/(1/4). Let f be j - 2 - (-5 + 3). Solve -3*d + 8*d = f for d. 1 Suppose -5*c - 34 = -5*h - 6*c, 5*h = 2*c + 22. Suppose 3*o - h = -0*o. Solve 1 = o*f - 5 for f. 3 Let v = -3 - 8. Let o(i) = i**3 + 12*i**2 + 12*i + 11. Let n be o(v). Solve -2*d - 9 + 1 = n for d. -4 Let d(v) = v**3 - 7*v**2 - 8*v + 4. Suppose -4*j + 59 = 5*p, -5*j = 2*p - 12 + 2. Let n be (20/p)/(1/6). Let y be d(n). Solve 15 = -y*r - 5 for r. -5 Suppose -3*l + 3 + 3 = 0. Suppose -a = 3*a. Solve a = -3*n - l*n - 5 for n. -1 Suppose -4*c + 9 + 7 = 0. Let i = c + -1. Solve -2*v - 9 = -i for v. -3 Let k be -9*((-24)/9)/4. Let a be (20/k)/((-4)/(-6)). Suppose -d + 1 = -5*v - 2, -d - a*v = -3. Solve r + d = 1 for r. -2 Let c be (2 + -3)*-7 - 4. Solve 0 = 2*v - c*v - 2 for v. -2 Suppose 0*n - n + 2*u + 18 = 0, 2*u = 5*n - 58. Let w(v) = -v**2 + 11*v - 9. Let b be w(n). Solve q = b + 2 for q. 3 Suppose -h = -5*j + 17, -j = -5*h - 0*j + 11. Suppose 3*m - 2 = -2*w, 3*w = -2*w - 3*m + 14. Solve 5 + w = h*a for a. 3 Suppose -2*x = -2*f + 12, -3*f = x + 4*x + 14. Solve 0*q = f*q for q. 0 Let l(x) = x**2 + 12*x + 20. Let y be l(-10). Suppose m - 3*f + 0*f = -4, y = -3*m + 2*f + 16. Solve -4*z = -m*z - 4 for z. -1 Let f = -33 - -33. Solve -y - 5 = -f*y for y. -5 Let h be (-3)/((-15)/4) - (-78)/15. Solve 3*r - h = 9 for r. 5 Suppose -42 = -3*u - 0*u + 2*p, 2*p = -3*u + 30. Suppose 2*g + 4*g = u. Solve 0 = -g*b + 8 - 2 for b. 3 Let s be -1 - ((0 - 0) + 2). Let c = 1 - s. Solve -8 = -c*w - 0*w for w. 2 Let k be (-15)/(-2) - (-4)/(-8). Suppose -k*p + 4*p = 0. Solve -f + 0*f = p for f. 0 Suppose 2*g + 5 = 7*g. Solve 5*h = -26 + g for h. -5 Suppose o + 4*j - 20 = 3*o, -10 = -4*o - 2*j. Solve 4 = -o*p + p for p. 4 Let s(r) = -r - 17. Let a be s(-17). Solve k + k = a for k. 0 Suppose -3*w + 16 = 5*x - x, 5*x + 10 = 0. Suppose -4*b = -w - 12. Solve -20 = -3*s - b for s. 5 Suppose 5*g = 57 + 48. Suppose 2*k - g = -0*f - 5*f, f + 6 = 3*k. Solve f*o + 21 = 6 for o. -5 Let n = 58 - 56. Solve 0 = -x - x + n for x. 1 Suppose 0 = 5*l + 38 - 48. Solve 2*h = l + 6 for h. 4 Suppose 4*v - 5*o - 31 = -0, o - 9 = -3*v. Solve -2*d = -6*d + v for d. 1 Let n(q) be the first derivative of -q**3/3 - 3*q**2 - 7*q + 1. Let i be n(-5). Let k be 0/((4/1)/i). Solve 5 = -k*t + t for t. 5 Suppose -2*q = 8, -6*q - 20 = -3*i - q. Solve 0 = -5*a - i*a + 5 for a. 1 Suppose x + 9 = 4*x. Solve x*q + q - 16 = 0 for q. 4 Let d(j) = -j**3 - 7*j**2 - 6*j. Let m be d(-4). Let p be 2/(-8) + 66/m. Let u = p
Low
[ 0.51490514905149, 23.75, 22.375 ]
New fabric innovations include a special mesh lace hem that was specifically developed by Nike and Abe to adorn the trim of graphic Nike T-shirts. The detail pays homage to sacai’s cool and subversive take on femininity. Abe also applied her signature paneling to several of the garments. Through technical innovation, the partners were able to achieve this effect by pleating the classic ripstop fabric for the first time. Bonded zippers that are attached without any stitching are another example of advanced design.
Mid
[ 0.644385026737967, 30.125, 16.625 ]
Pakistanis angered by US official’s remarks about inclusion in visa ban Pakistan’s people and politicians have reacted with fear and concern to a top White House official’s remarks that their country could be included in list of countries from where immigration to the US has been banned. worldUpdated: Jan 30, 2017 22:56 IST Imtiaz Ahmad Hindustan Times, Islamabad Izzy Berdan, of Boston, center, wears an American flags as he chants slogans with other demonstrators during a rally against President Trump's order that restricts travel to the US, in Boston. Trump signed an executive order that bans legal US residents and visa-holders from seven Muslim-majority nations from entering the US for 90 days and puts an indefinite hold on a program resettling Syrian refugees.(AP Photo) A top White House official’s comments hinting at Pakistan being included in the list of countries from where immigration to the US has been banned has sparked fears and anger among the people and politicians of the country. US President Donald Trump issued a controversial executive order banning immigration from seven Muslim-majority countries – Iran, Iraq, Libya, Sudan, Yemen, Syria and Somalia. He also said in an interview that citizens of Afghanistan, Pakistan and Saudi Arabia would face “extreme vetting”. White House chief of staff Reince Priebus told CBS News the seven countries were chosen because they were “most identifiable with dangerous terrorism” and added: “Now, you can point to other countries that have similar problems, like Pakistan and others. Perhaps we need to take it further. But for now, immediate steps…is to do further vetting for people travelling in and out of those countries.” Some politicians in Pakistan see the ban as part of Trump’s overt “Anti-Muslim” policies. “What is clear is that Donald Trump is targeting Muslims, not terrorists,” Pakistan People’s Party lawmaker Khursheed Shah, the leader of opposition in Parliament, told reporters in Islamabad. Pakistan Tehreek-e-Insaf (PTI) chief Imran Khan said he hoped the US will slap a visa ban on Pakistanis so that people here could focus on their own country. “I pray that Trump stops giving us visas because then we will try fixing our own country,” the cricketer-turned-politician said while addressing a gathering in Sahiwal on Sunday. “The prime minister goes abroad even if he gets a headache. If (the ban) happens, we will have to improve Pakistan and stand on our own feet,” he said. Pakistan’s Foreign Office criticised the process of vetting based on religion and warned that such a move could be counter-productive in the long term. Priebus said the executive order was signed after a lot of planning. “These are countries that harbour and train terrorists. These are countries that we want to know who is coming and going in and out of to prevent calamities from happening in this country,” he said. “Some people have suggested, that, well, maybe we should have given everyone a three-day warning. But that would just mean that a terrorist would just move up their travel plans by three days. Identifying too many people in these countries and giving them a heads-up in these countries would only potentially flag the executive order for bad order,” he added. Priebus acknowledged that the visa restrictions could come up when Trump speaks to the leaders of Saudi Arabia, the United Arab Emirates and other countries.
Mid
[ 0.543290043290043, 31.375, 26.375 ]
....that you can't trust the government because the governmen't is not a trusting entity. Why should the US government trust hackers from a foreign country to develop code to be used by it's military systems. It is a huge concession for DARPA to even allow the use of code developed by a Canadian based company. Let's face the facts, if you do not play by the rules, you will be punished.
Low
[ 0.47131147540983603, 28.75, 32.25 ]
Motorola Moto G 2014 sleeve case pouch light denim with red owl Motorola Moto G 2014 handmade sleeve will protect your phone from scratchings and dust. This case will keep your device safe and portable. The handmade case is really practical and simple to use with minimalist and elegant design. Case is made of light denim fabric with cotton fabric inside, padded with a layer of fleece and with red owl drawing designed and printed by Begoos. You can choose the inside fabric color from the available list of colors. If you have a bumper or a slim case for your phone the sleeve can be made a little bigger so there would be an extra room, the only thing you need to do is to add in the order note that you need the case bigger for a bumper or extra case.
Mid
[ 0.605577689243027, 38, 24.75 ]
**A giant, periodic flare from the soft gamma repeater SGR1900+14** K. Hurley$^a$, T. Cline$^b$, E. Mazets$^c$, S. Barthelmy$^b$, P. Butterworth$^b$, F. Marshall$^b$ , D. Palmer$^b$ R. Aptekar$^c$, S. Golenetskii$^c$, V. Il’Inskii$^c$, D. Frederiks$^c$, J. McTiernan$^a$, R. Gold$^d$, J. Trombka$^b$ a UC Berkeley Space Sciences Laboratory, Berkeley, CA 94720-7450 b NASA Goddard Space Flight Center, Code 661, Greenbelt, MD 20771 c Ioffe Physical-Technical Institute, St. Petersburg, 194021, Russia d The Johns Hopkins University, Applied Physics Laboratory, Laurel, MD 20723 **Soft gamma repeaters are high-energy transient sources associated with neutron stars in young supernova remnants$^1$. They emit sporadic, short ($\sim$ 0.1 s) bursts with soft energy spectra during periods of intense activity. The event of March 5, 1979 was the most intense and the only clearly periodic one to date$^{2,7}$. Here we report on an even more intense burst on August 27, 1998, from a different soft gamma repeater, which displayed a hard energy spectrum at its peak, and was followed by a $\sim$ 300 s long tail with a soft energy spectrum and a dramatic 5.16 s period. Its peak and time integrated energy fluxes at Earth are the largest yet observed from any cosmic source. This event was probably initiated by a massive disruption of the neutron star crust, followed by an outflow of energetic particles rotating with the period of the star. Comparison of these two bursts supports the idea that magnetic energy plays an important role, and that such giant flares, while rare, are not unique, and may occur at any time in the neutron star’s activity cycle.** Four soft gamma repeaters (SGRs) are known. All appear to be associated with radio supernova remnants, indicating that they are young$^4$ ($<$20,000 y). SGRs are probably strongly magnetized neutron stars (’magnetars’$^5$), in which, unlike the radio pulsars, the magnetic energy dominates the rotational energy. SGR0525-66 produced both the unusual, energetic and periodic burst of March 5 1979$^{6,7,8}$ and a series of subsequent, much smaller bursts$^{9,10}$. It lies towards the N49 supernova remnant in the Large Magellanic Cloud$^{11,12}$. A quiescent soft X-ray source has been identified which may be the neutron star$^{13}$. SGR1900+14, first detected in 1979, was, until recently, the least prolific SGR$^{14,15}$, hindering attempts to locate it precisely. Several lines of evidence suggested that it was associated with the galactic supernova remnant G42.8+0.6$^{16}$ and a quiescent soft X-ray source$^{17}$. This possible association was strengthened by a source location obtained with the network synthesis method$^{18}$, and more recently by triangulation$^{19,20,21}$, although since this X-ray source lies outside the remnant, the connection between the two could still be considered to be unresolved. An observation of the quiescent soft X-ray source possibly associated with SGR1900+14 by the ASCA spacecraft in April 1998 showed that the X-rays exhibited a 5.16 s period$^{22}$. In May, SGR1900+14 came out of a long dormant phase, emitting strong, frequent bursts$^{19,23}$. On August 27, it emitted the exceptionally intense giant flare reported here, detected by instruments on GGS-Wind$^{24}$, Ulysses$^{21}$, the Rossi X-Ray Timing Explorer$^{25}$ (RXTE), BeppoSAX, and the Near Earth Asteroid Rendezvous (NEAR). The entire event profile is shown in figure 1 with Ulysses 0.5 s resolution data. In very general terms, the burst rose to a maximum and decayed roughly as a power law in time with an index of $\sim$- 1.8. However, the event onset is complex; Konus-Wind observations resolve components $<$4 ms. A sinusoidal component dramatically modulated the later part of the profile for the duration of the observation with varying amplitudes, the first direct detection of the 5.16 s periodicity at hard X-ray energies. The inset to Figure 1 shows 31.25 ms time resolution Ulysses data, demonstrating that the 5.16 s pulsations commenced approximately 35 s after the peak. It is clear that the pulse profile is considerably more complex than a single sinusoidal curve, with at least 4 maxima and minima in a single cycle. A remarkable coincidence, the initiation of NEAR gamma-ray monitoring only days before August 27th but after many months of silent cruise towards Eros, made possible the high-precision source localization of this event by triangulation, i.e. analysis of the arrival times at Ulysses, GGS-Wind, RXTE, and NEAR. This is the only time, other than for the March 5, 1979 event$^{11,12}$, that an SGR has been localized by triangulation at three or more widely separated spacecraft, leading directly to an error box. All six source annuli, determined from the various two-spacecraft comparisons, are consistent with the coordinates of the quiescent soft X-ray source$^{18,21}$ (RA(J2000) = 19 h 07 m 14 s, Dec(J2000) = 9$^{\rm o}$ 19’ 19"). The details will be reported elsewhere, but we note that this positional agreement, as well as the agreement between the periodicities found in soft X-rays and in the giant flare light curve, now leave no doubt about the association between the SGR and the quiescent X-ray source. The temperature of the energy spectrum of this event is shown in figure 1. With the exception of the peak, the temperature is kT$\sim$30 keV, which is similar to SGR bursts in general. At the peak, however, the temperature averaged over a 1 s interval is kT $\sim$ 240 keV. Finer time resolution measurements were recorded by Konus, indicating a peak temperature $\sim$ 1200 keV, and a maximum photon energy of 2 MeV. Hard spectra such as these are not characteristic of SGR bursts; one was observed for the peak of the March 5 1979 event$^{6,26}$. Table 1 compares the properties of these two giant flares. Comparisons between very intense bursts observed by different instruments are subject to numerous uncertainties. Dead time effects, different time resolutions and energy ranges, and pulse pile-up are difficult or even impossible to correct for; hence the “approximate” and “greater than” symbols in Table 1. However, to within these uncertainties, the parameters of the August 27 1998 event are consistent with it having the largest peak flux and fluence of any of the several thousand SGRs and cosmic gamma-ray bursts observed to date. Recently it has been suggested$^{23,27}$ that the neutron stars associated with SGRs are magnetars, i.e. that they have magnetic fields of several times 10$^{14}$ G$^5$. This is based on observations of the quiescent counterparts in X-rays, which display pulsations with a slowly lengthening period; the spin-down is interpreted as due to magnetic dipole radiation. In the magnetar model, the giant flares of August 27 and March 5 are due to a readjustment of the magnetic field, accompanied by a massive, large-scale cracking of the neutron star crust. In both cases the initial hard spectrum would be produced by the conversion of magnetic energy to energy in a clean electron-positron and photon fireball uncontaminated by ions, which would soften the spectrum. The highest energy photons observed are only slightly above the electron-positron pair production threshold; this is consistent with attenuation due to this process, although there is at present no direct evidence for a cutoff. Expanding away from the stellar surface, part of the fireball would be trapped in the magnetosphere, producing the observed soft tails. The periodicity indicates that this emission was either anisotropic and/or that it occurred close enough to the neutron star to be occulted by it; the decay in intensity with approximately constant spectral temperature is interpreted as a shrinking in the volume of the emission region. The complex pulse structure implies that several regions of the magnetosphere were involved. It is noteworthy that, despite the factor of 25 difference between the peak luminosities of the August 27 and March 5 events, the ratios of peak to total energy are within a factor of 2 of each other, suggesting that similar magnetic field geometries may play an important role. Since the soft spectrum which follows the intense main peak in both cases is attributed to radiation from an optically thick pair plasma trapped in the neutron star’s magnetosphere, the magnetic field strength may be estimated from the energy in this component$^5$: $ B > 4X10^{14} \left( \frac{\Delta R}{10 km} \right) ^{-3/2} \left( \frac{1+ \Delta R/R}{2} \right) ^3 \left( \frac {E_{tail}}{3.6x10^{44} erg} \right) ^{1/2} G $ Where R is the radius of the neutron star and $\Delta$ R ($\sim$10 km) is the outer radius of the magnetic flux loop containing the pair plasma. For the March 5 event, this gives $B>4x10^{14} G$; for August 27, $B>10^{14} G$, providing a confirmation of the magnetar model which is independent of the observation and interpretation of the spin-down, but consistent with it. The existence of a strong magnetic field helps to explain the high luminosities encountered in both events, five to six orders of magnitude greater than the Eddington limit. A strong magnetic field suppresses the Compton scattering cross-section, and reduces the opacity$^5$. The giant flare of March 5 1979 was observed to precede the much smaller event series from SGR0525-66. Observations during the preceding six months failed to reveal any source activity, and it was speculated at the time that this was a unique, catastrophic event in the life of a neutron star, and one that initiated the series of bursts subsequently observed. Our observation of the August 27 1998 event leads to a different interpretation. The source evolved from a weak, infrequent repeater to an intensely active one, indicating that the neutron star’s crust was able to adjust to magnetic stresses by undergoing relatively minor, localized cracking for a long period. The small precursor to the giant flare was comparable in intensity to these bursts, and may have been the final trigger for it. In the following months, these bursts have continued. Thus our observations imply that rare giant flares on SGRs may be the rule, rather than the exception, and that they may occur at any time. It therefore seems likely that SGR0525- 66 emitted relatively weak bursts prior to March 5, 1979, which went undetected due to spacecraft coverage and/or weakness. The magnetar theory predicts that on any given SGR, such events may recur on a timescale of $\sim$decades or more$^{28}$. It is now almost two decades since the March 5 event; future monitoring of this and other SGRs can confirm this idea. **References** 1\. Hurley, K., Are the Soft Gamma Repeaters a Motley Crew? , in 3rd Huntsville Symposium, AIP Conf. Proc. 384 (AIP: New York), Eds. C. Kouveliotou, M. Briggs, and G. Fishman, 889-896 (1996) 2\. Mazets, E., Golenetskii, S., Guryan, Yu, and Ilyinskii, V., The 5 March 1979 event and the distinct class of short gamma bursts: are they of the same origin?, Astrophys. Space Sci. 84, 173-189 (1982) 3\. Cline, T., The Unique Cosmic Event of 1979 March 5, Comments on Astrophysics 1,13-20 (1980) 4\. Braun, R., Goss, W., and Lyne, A., Three Fields Containing Young Pulsars: The Observable Lifetime of Supernova Remnants, Ap. J. 340, 355-361 (1989) 5\. Thompson, C., and Duncan, R., The Soft Gamma Repeaters as Very Strongly Magnetized Neutron Stars. I. Radiative Mechanism for Outbursts, Mon. Not. R. Astron. Soc. 275, 255-300 (1995) 6\. Mazets, E., et al., T., A Flaring X-Ray Pulsar in Dorado, Nature, 282, 587-589 (1979) 7\. Barat, C., et al., Evidence for Periodicity in a Gamma Ray Burst, Astronomy and Astrophysics Lett., 79, L24-L25 (1979) 8\. Cline, T., et al., Detection of a Fast, Intense and Unusual Gamma Ray Transient, Ap. J. Lett. 237, L1-L5 (1980) 9\. Golenetskii, S., Ilinskii, V., Mazets, E., and Guryan, Yu., Repeating Gamma Ray Bursts From the Source FXP 0520-66, Sov. Astron. Lett., 5, 340-342 (1979) 10\. Golenetskii, S., Ilyinskii, V., Mazets, E., Recurrent Bursts in the source of the 5 March 1979 event, Nature 307, p. 41-43 (1984) 11\. Evans, W., et al., Location of The Gamma-Ray Transient Event of 1979 March 5, Ap. J. Lett. 237, L7-L9 (1980) 12\. Cline, T., et al., Precise Source Location of the Anomalous 1979 March 5 Gamma Ray Transient, Ap. J. Lett., 255, L45-L48 (1982) 13\. Rothschild, R., Kulkarni, S., and Lingenfelter, R., Discovery of an X-ray Source Coincident with the Soft Gamma Repeater 0525-66, Nature 368, 432-434 (1994) 14\. Mazets, E., Golenetskii, S., and Guryan, Yu., Soft Gamma Ray Bursts From the Source B1900+14, Sov. Astron. Lett., 5(6), 343-344 (1979) 15\. Kouveliotou, C., et al., Recurrent Burst Activity from the Soft Gamma-Ray Repeater SGR 1900+14, Nature 362, 728-730 (1993) 16\. Kouveliotou, C., et al., The Rarity of Soft Gamma-Ray Repeaters Deduced from Reactivation of SGR1806-20, Nature 368, 125-127 (1994) 17\. Vasisht, G., Kulkarni, S., Frail, D., and Greiner, J., Supernova Remnant Candidates for the Soft Gamma-Ray Repeater 1900+14, Ap. J. 431, L35-L38 (1994) 18\. Hurley, K., et al., Network Synthesis Localization of Two Soft Gamma Repeaters, Ap. J. 431, L31-L34 (1994) 19\. Hurley, K., Kouveliotou, C., Mazets, E., and Cline, T., SGR1900+14, IAUC 6929, (1998a) 20\. Hurley, K. et al., Reactivation and Precise IPN Localization of the Soft Gamma Repeater SGR1900+14, ApJ, in press (1998b) 21\. Hurley, K., Cline, T., Mazets, E., and Golenetskii, S., SGR1900+14, IAUC 7004, (1998c) 22\. Hurley, K., Kouveliotou, C., Murakami, T., and Strohmayer, T., SGR1900+14, IAUC 7001 (1998e) 23\. Kouveliotou, C., Strohmayer, T., Hurley, K., van Paradijs, J., and Woods, P., SGR1900+14, IAUC 7001 (1998b) 24\. Cline, T., Mazets, E., and Golenetskii, S., SGR1900+14, IAUC 7002 (1998) 25\. Marshall, F., et al., IAUC 7005 (1998) 26\. Fenimore, E., Klebesadel, R., and Laros, J., The 1979 March 5 Gamma-Ray Transient: Was It a Classical Gamma-Ray Burst?, Ap. J. 460, 964-975 (1996) 27\. Kouveliotou, C., et al., An X-ray Pulsar With a Superstrong Magnetic Field in the Soft Gamma-Ray Repeater SGR1806-20, Nature, 393, 235-237 (1998) 28\. Duncan, R., private communication (1998) 29\. Hurley, K., et al., The Solar X-ray/Cosmic Gamma-ray Burst Experiment Aboard Ulysses, Astron. Astrophys. Suppl. Ser. 92, 401-410 (1992) 30\. Barat, C. et al., Fine Time Structure in the 1979 March 5 Gamma-Ray Burst, Astron. Astrophys. 126, 400-402, 1983 **Acknowledgments. We are grateful to R. Duncan for discussions about the magnetic field estimate. This work was supported in the U.S. by a grant from NASA and a contract from JPL, and at the Ioffe Institute by an RSA contract.** [|p[1.5in]{}|p[1.5in]{}|p[1.5in]{}|]{}\ & August 27 1998 & March 5 1979\ Rise time & Complex, structures $<$4 ms & Simple, $<$2 ms\ Morphology of main peak & Complex structure, duration $\sim$1 s & Complex structure, duration $\sim$150 ms$^{30}$\ Periodicity & 5.16 s & 8.1 s\ Peak flux, erg cm$^{-2}$ s$^{-1}$ & $\geq$ 3.4x10$^{-3}$ , $>$ 25 keV & $\sim$1.5x10$^{-3}$ , $>$ 50 keV\ Fluence, erg cm$^{-2}$ & $\geq$ 7x10$^{-3}$ & $\sim$2x10$^{-3}$\ Spectrum at peak, kT (keV) & 240 (average over 1 s) & 246 (average over 200 ms)$^{26}$\ Highest photon energy in peak & 2 MeV & $>$ 1 MeV\ Spectrum of pulsations, kT (keV) & 30 & 30\ Source distance, kpc & $\sim$7 (G42.8+0.6) & $\sim$50 (N49)\ Peak source luminosity, erg/s & $\geq$ 2x10$^{43}$ & $\sim$5x10$^{44}$\ Precursor observed? & Yes & No\ Delay between main peak and periodic emission & 35 s & None\ Ratio of energy in main peak to total energy in burst & 0.46 & 0.25\ Source activity in months preceding the burst & Intense & None observed\ Figure 1. Ulysses data for the August 27 1998 giant flare. a\. 25-150 keV time history, corrected for dead time effects, from the 0.5 s resolution continuously available real time data. Zero seconds corresponds to 37283.12 s UT at Earth. This event was so intense that it temporarily saturated or shut down some experiments, but because of the relatively small detection area of the Ulysses$^{29}$ sensor (20 cm$^2$) it was not subject to severe dead time or pulse pile-up problems; in fact solar flare data producing considerably higher count rates have been successfully analyzed with this instrument. b\. Spectral temperature as a function of time. The spectra were measured by Ulysses in intervals with increasing durations of 1 - 48 s. No simple, two-parameter fit describes the spectrum well, in part because the measurement uncertainties are dominated by systematic effects. However, we have used an optically thin thermal bremsstrahlung spectrum to characterize grossly the spectral temperature. c\. 0.03125 s resolution time history of the event from the triggered data, available for 64 s. The burst triggered on the precursor (arrow) $\sim$0.4 s prior to the main peak. A grid is drawn to indicate the 5.16 s periodicity, showing its absence for the first $\sim$35 s after the main peak. The short horizontal line at the top indicates the position of the hard spectral peak measured by Ulysses. Zero seconds corresponds to 37327.81 s UT at Earth.
Mid
[ 0.566037735849056, 33.75, 25.875 ]
<?xml version="1.0" encoding="utf-8"?> <LinearLayout xmlns:android="http://schemas.android.com/apk/res/android" xmlns:app="http://schemas.android.com/apk/res-auto" xmlns:tools="http://schemas.android.com/tools" android:layout_width="match_parent" android:layout_height="match_parent" android:orientation="vertical" android:paddingBottom="@dimen/activity_vertical_margin" android:paddingLeft="@dimen/activity_horizontal_margin" android:paddingRight="@dimen/activity_horizontal_margin" android:paddingTop="@dimen/activity_vertical_margin" tools:context="com.ddiehl.timesincetextview.sample.MainActivity"> <com.ddiehl.timesincetextview.TimeSinceTextView android:id="@+id/time_now" android:layout_width="wrap_content" android:layout_height="wrap_content" android:textAppearance="@android:style/TextAppearance.Medium" /> <com.ddiehl.timesincetextview.TimeSinceTextView android:id="@+id/time_seconds" android:layout_width="wrap_content" android:layout_height="wrap_content" android:textAppearance="@android:style/TextAppearance.Medium" /> <com.ddiehl.timesincetextview.TimeSinceTextView android:id="@+id/time_seconds_abbreviated" android:layout_width="wrap_content" android:layout_height="wrap_content" android:textAppearance="@android:style/TextAppearance.Medium" app:tstv_abbreviated="true" /> <com.ddiehl.timesincetextview.TimeSinceTextView android:id="@+id/time_minutes" android:layout_width="wrap_content" android:layout_height="wrap_content" android:textAppearance="@android:style/TextAppearance.Medium" /> <com.ddiehl.timesincetextview.TimeSinceTextView android:id="@+id/time_minutes_abbreviated" android:layout_width="wrap_content" android:layout_height="wrap_content" android:textAppearance="@android:style/TextAppearance.Medium" app:tstv_abbreviated="true" /> <com.ddiehl.timesincetextview.TimeSinceTextView android:id="@+id/time_hours" android:layout_width="wrap_content" android:layout_height="wrap_content" android:textAppearance="@android:style/TextAppearance.Medium" /> <com.ddiehl.timesincetextview.TimeSinceTextView android:id="@+id/time_hours_abbreviated" android:layout_width="wrap_content" android:layout_height="wrap_content" android:textAppearance="@android:style/TextAppearance.Medium" app:tstv_abbreviated="true" /> <com.ddiehl.timesincetextview.TimeSinceTextView android:id="@+id/time_days" android:layout_width="wrap_content" android:layout_height="wrap_content" android:textAppearance="@android:style/TextAppearance.Medium" /> <com.ddiehl.timesincetextview.TimeSinceTextView android:id="@+id/time_days_abbreviated" android:layout_width="wrap_content" android:layout_height="wrap_content" android:textAppearance="@android:style/TextAppearance.Medium" app:tstv_abbreviated="true" /> <com.ddiehl.timesincetextview.TimeSinceTextView android:id="@+id/time_weeks" android:layout_width="wrap_content" android:layout_height="wrap_content" android:textAppearance="@android:style/TextAppearance.Medium" /> <com.ddiehl.timesincetextview.TimeSinceTextView android:id="@+id/time_weeks_abbreviated" android:layout_width="wrap_content" android:layout_height="wrap_content" android:textAppearance="@android:style/TextAppearance.Medium" app:tstv_abbreviated="true" /> <com.ddiehl.timesincetextview.TimeSinceTextView android:id="@+id/time_months" android:layout_width="wrap_content" android:layout_height="wrap_content" android:textAppearance="@android:style/TextAppearance.Medium" /> <com.ddiehl.timesincetextview.TimeSinceTextView android:id="@+id/time_months_abbreviated" android:layout_width="wrap_content" android:layout_height="wrap_content" android:textAppearance="@android:style/TextAppearance.Medium" app:tstv_abbreviated="true" /> <com.ddiehl.timesincetextview.TimeSinceTextView android:id="@+id/time_years" android:layout_width="wrap_content" android:layout_height="wrap_content" android:textAppearance="@android:style/TextAppearance.Medium" /> <com.ddiehl.timesincetextview.TimeSinceTextView android:id="@+id/time_years_abbreviated" android:layout_width="wrap_content" android:layout_height="wrap_content" android:textAppearance="@android:style/TextAppearance.Medium" app:tstv_abbreviated="true" /> </LinearLayout>
Low
[ 0.5, 29, 29 ]
Acrid clouds of tear gas still hung in the air as Avery Cheng crouched to the ground, weeping, on a pedestrian overpass. Crowds of young protesters in T-shirts and surgical masks sprinted past, coughing and splashing water in their eyes. Police in riot gear marched toward the running crowds, shooting rubber bullets, bean bags and tear gas canisters, then chasing the mostly unarmed youth with batons and pepper spray. The protesters ran, rubbing their eyes, then stopped to turn and chant, “Retract! Retract!” Riot police continued to advance. “This is just so cruel,” said the 19-year-old Cheng. He’d come to Hong Kong’s legislative center Wednesday morning to protest an extradition bill that would allow Hong Kong to send people to mainland China for trial. Hong Kongers, who don’t have a great deal of trust in China’s judicial system, fear the change would be the end of freedom of speech and assembly that Hong Kong maintains as a semiautonomous region. More than a million people marched in protest against the bill on Sunday, according to organizers. Yet, Hong Kong’s chief executive, Carrie Lam, said Hong Kong’s Legislative Council would proceed with the bill, discuss it on Wednesday and vote by June 20. The government later announced it would delay discussion of the bill, which is expected to pass despite public opinion because Beijing controls a majority of the legislature. 1 / 10 As people massed outside government headquarters in Hong Kong on June 12, violent clashes erupted. Police fired tear gas and rubber bullets at those demonstrating against a proposed extradition bill, which has become a focus among those concerned about greater Chinese control and erosion of civil liberties in Hong Kong. (Kin Cheung / Associated Press) 2 / 10 Protesters carry an injured friend after clashes with police during a rally against a controversial extradition law proposal in Hong Kong. (Anthony Wallace / AFP/Getty Images) 3 / 10 Police face off with the crowds in Hong Kong. Earlier in the day, protesters forced the delay of a legislative debate over a controversial bill that would allow criminal suspects in Hong Kong to be sent for trial in mainland China. (Anthony Wallace / AFP/Getty Images) 4 / 10 Police use tear gas on demonstrators, who carry umbrellas in a redux of Hong Kong’s 2014 pro-democracy Umbrella Movement. (Anthony Wallace / AFP/Getty Images) 5 / 10 A protester flees tear gas fired by police during the Hong Kong rally. (Jerome Favre / EPA-EFE/REX ) 6 / 10 A woman gets first aid after tear gas is fired. (Vernon Yuen / EPA-EFE/REX ) 7 / 10 Many in the crowd donned surgical masks to safeguard against tear gas as well as to hide their features. Beijing is increasingly using electronic surveillance such as facial recognition technology to build dossiers on those it considers politically unreliable. (Vernon Yuen /EPA-EFE/REX ) 8 / 10 Umbrella-toting protesters run after police fire tear gas. (Philip Fong / AFP/Getty Images) 9 / 10 Medical volunteers help a demonstrator. (Anthony Wallace / AFP/Getty Images) 10 / 10 Water is poured over the face of a protester suffering the effects of tear gas. (Anthony Wallace / AFP/Getty Images) That didn’t stop tens of thousands of protesters from showing up Wednesday, aiming to obstruct legislative procedures by blocking access to the building. Hundreds of demonstrators had already arrived at the complex by Tuesday night, some of them church members who sang hymns facing police from 9 p.m. until dawn, waving white flowers in the air. “We are singing because we want to say that although the government is ruling us, above them there is a Lord who sees what’s happening, who is just, and who knows they lie and everything they do,” said Ryan Tsang, a 26-year-old participant. The older church members were also there to watch over youth protesters and protect them in case violence broke out, he added. Protestors running as police deploy more tear gas in #HongKong #反送中 pic.twitter.com/LgflBMHQSd — Alice Su 苏奕安 (@aliceysu) June 12, 2019 A middle-aged woman handed out slips of advice and free legal hotline numbers in case of detention. Two 22-year-olds wearing face masks helped her pass them out, giving their names as Tony and John but refusing to give last names out of fear that police would target them. “One million people came out, but it was still useless. We need to upgrade our action. We need to be more aggressive,” Tony said. “As a Hong Konger, this may be the last time we have to stand out.” The demonstration remained peaceful as dawn broke, though the police presence had escalated steadily, with authorities performing searches and identity checks at the nearby commuter rail station and in the crowds through the night. At least 72 people were reported injured — two seriously — and police arrested 19 people on charges of illegal assembly and obstructing security forces. At least 22 protesters were hospitalized, according to local media. By 8:30 a.m., thousands of additional demonstrators had begun flocking to the legislative building, blocking access by occupying the streets around it. Volunteers built supply stations filled with water, toilet paper, umbrellas, goggles and cling wrap — to protect from anticipated tear gas — and made assembly lines to pass them toward the road’s center. It was like the pro-democracy Umbrella Movement of 2014 on fast forward, and demonstrators seemed experienced in the same logistics and nonviolent tactics they’d used five years ago. Volunteers collected trash and set up recycling centers. Others directed pedestrian traffic through the crowded escalators and overpasses. A row of pastors stood at the entrance to the legislative building, facing a line of police five rows deep. They wanted to keep their bodies in between the police and the youths, they said. In one corner of a shopping mall, 17-year-old Morgan Chan sat cross-legged on the floor, reading a collection of essays by the 20th century revolutionary Chinese writer Lu Xun. Protesters react after police fire tear gas June 12 during a rally against a proposed extradition law in Hong Kong. (Anthony Wallace / AFP/Getty Images) “I’m reading him now because he was against the bad government at that time. So I think we will get some support from this book,” Chan said, flipping to a famous story called Ah Q. “It’s about how foolish people were in the past, but actually it’s the same right now,” Chan said, adding that those who trusted the government while it “blacklisted” citizens’ human rights were fools. He’d come to protest with his sister, 19-year-old Jojo Chan, even though they didn’t think things would change. “I know it is impossible to change the minds of the government, but I think we need to do something,” Morgan Chan said. “At least, we need to try.” Celebration rippled through the crowd at midday as the government announced a delay of the legislative meeting. But protesters decided to stay, worrying that the council might convene and push a quick vote through if they left the scene. On one pedestrian overpass, a group of hunger strikers sat on the floor, many of them older activists who wanted to support the young. Some were fasting in 24-hour shifts, relay style; others were fasting for 103 hours, to honor the 1.03 million people who’d reportedly marched on Sunday. “The young people know what they’re doing,” said 71-year-old art curator Jimmy Choi, also on hunger strike. “I’m very proud of our young kids. When they debate with government officials, they often beat them.” “Sing hallelujah to the Lord,” some Hong Kongers sing, holding white flowers, standing around the police #HongKong #反送中 pic.twitter.com/mfJ2rQL5Y6 — Alice Su 苏奕安 (@aliceysu) June 11, 2019 He was fasting in solidarity and in belief that today’s protesters would inspire later generations, he said, just as the 2014 Umbrella Movement had “failed” but planted a seed of resistance in the youth who were out today. “The mainland government is so powerful. We can’t fight them. We’re fighting a long battle,” Choi said. “But the war, you cannot tell.” “People think Hong Kongers are too practical and apolitical. It’s not true,” said 50-year-old Jessica Yeung, a professor also on hunger strike. “Hong Kong people are very highly educated. We know what is happening to us and we are very clear what’s our bottom line. The government can’t treat us like this. We know our rights very well.” Protesters continued to gain ground through the early afternoon, climbing onto highways and pressing against metal barriers as police stood, watching. Cheers burst out when rain began to pour, umbrellas popping open like bouquets opened to the sky above the crowds. Under one cluster of umbrellas, a group of social workers said they had come because extradition would threaten the work they do with Hong Kong’s most vulnerable people. “We work with low-income groups, the poor people in Hong Kong,” said Ki Lau, a 30-year-old social worker. Her work often involved raising awareness of unfair or misused government policies, which meant she could be a target if the bill passes. “If they pass the law, there’s nothing you can do, because the Chinese government can do anything they like and bring you to China and to their court. It’s the endgame,” Ki said. Most Hong Kong people don’t know what to do now, she added. “We’re just coming out to group the people and stay stronger together, to encourage each other,” Ki said. “We don’t know about the future. It’s going to be bad for Hong Kong.” Tension began to rise around 3:30 p.m. Protesters had airdropped messages around the demonstration area giving the government a 3 p.m. deadline to retract the bill. If not, the protesters would escalate to extended strikes, obstructing public transport and potentially storming the legislative council building, the messages said. As the deadline passed, both the crowds and police began to build. Rows of armored police surged out of the legislative building, swarming toward the protesters’ lines. Volunteers in sneakers sprinted toward the protesters’ side, passing boxes of helmets and goggles to the front. The front rows opened their umbrellas. Clashes broke out on multiple sides of the building at the same time. Some protesters surged forward, throwing water bottles in the air and pushing their way into the legislative building. Police surged as well, wielding batons, shields and pepper spray. Then came the tear gas, mushrooming into the sky and spreading with the wind. The sound of shots filled the air as police fired rubber bullets and bean bags toward civilians. The crowds ran, umbrellas still raised. They stopped, turned around, many of the youth calling each other to come back and fight again. Police used more tear gas. Some protesters dispersed. Others kept charging back. Inside the legislative building, lawmaker Charles Mok shouted in distress at the police forces. “This is [the Legislative Council]! Do you think you’re the boss here?” he said. “It’s game over for Hong Kong, do you know?” By sunset, riot police had forcefully cleared the entire legislative complex, pushing protesters to a new front line in Hong Kong’s central business district. Discarded masks, torn banners and tear gas canisters littered empty streets where crowds had sung in vigil the night before. Rage and grief began to build. The teachers’ union announced a citywide strike. Hong Kong Red Cross set up emergency relief stations. Thousands of protesters remained on the streets, barricading themselves against the police. The government shut down the closest commuter rail station. As riot police continued to advance toward protesters, Lam, the chief executive, interrupted news broadcasts with a televised statement, saying the protests were organized riots. “It’s impossible these actions show love for Hong Kong,” Lam said. “If you pursue your goals with radical and violent means, these scenes will just get worse.” Lam also gave a broadcast interview to local media, weeping on-screen and saying she’d made many sacrifices for Hong Kong, to the point where her husband said she’d “sold [herself] to Hong Kong” rather than selling out Hong Kong. Pro-democracy legislators condemned police “abuse of force” and called for mass strikes on television. “Hong Kongers have by no means rioted!” the Civil Human Rights Front, organizers of the Sunday march, said in a statement. “The protest today took place solely because Carrie Lam ignored the voice of 1.03 million people, and refused to withdraw the extradition bill. Carrie Lam is fully responsible for the fury of people!” The statement also urged the international community to intervene, to condemn the police crackdown and to urge the Hong Kong government to withdraw the bill. As night fell, riot police set off tear gas in the central business district and began advancing through the streets again, attacking the protesters and their metal barricades as onlookers cried, “Shame on you!” One person shouted, “This is our Hong Kong, this is not Carrie Lam’s Hong Kong.” Another yelled, “Where is your conscience? Respect yourself, you’re human too.” Protesters ran and regrouped, still chanting “Retract! Retract!”
Mid
[ 0.5477272727272721, 30.125, 24.875 ]
Guidelines for pediatric cancer centers. Since the American Academy of Pediatrics published guidelines for pediatric cancer centers in 1986 and 1997, significant changes in the delivery of health care have prompted a review of the role of tertiary medical centers in the care of pediatric patients. The potential effect of these changes on the treatment and survival rates of children with cancer led to this revision. The intent of this statement is to delineate personnel and facilities that are essential to provide state-of-the-art care for children and adolescents with cancer. This statement emphasizes the importance of board-certified pediatric hematologists/oncologists, pediatric subspecialty consultants, and appropriately qualified pediatric medical subspecialists and pediatric surgical specialists overseeing the care of all pediatric and adolescent cancer patients and the need for facilities available only at a tertiary center as essential for the initial management and much of the follow-up for pediatric and adolescent cancer patients.
High
[ 0.6926174496644291, 32.25, 14.3125 ]
Natural-language processing Natural-language processing (NLP) is an area of computer science and artificial intelligence concerned with the interactions between computers and human (natural) languages, in particular how to program computers to process and analyze large amounts of natural language data. (Click here to read more about it) Simple Explanation: NLP can be defined as a processing and understanding of raw human data for example let’s consider a small baby of age 1 or 2 year in front of you and you got a bottle of milk and you say to that kid “hey do you want some milk baby” then all he hears is “blah blah blah blah blah MILK blah” and he properly responds because he’s got a “picture” of a milk bottle in his head connected to the word “MILK” so even when you change the statement to “baby I got a milk bottle with me would you like to have it” the baby will respond in the same manner because he heard the word “MILK”. Now let’s take a real coding example : There are lots of library/package/module available for NLP for C#, nodejs, python, etc. I have used nodejs as my preferred language for creating AI bots, so there is a package called “natural” you can install it by using “npm install natural” (GitHub Source) All you have to do is just define some phrases to the nlp function and it will detect accordingly. Example pseudo code : myPhrases = { DrinkMilk: [“bottle”,”milk”,”want”,”drink”] DontDrinkMilk: [“bottle”,”milk”,”dont”,”not”, “no”, “do not”,”drink”] } //The above variable myPhrases has two set of keys each having predefined set of words to consider while processing the data InitializeNLP(myPhrases) //Initializes the nlp with the above variable to process the data. result = ProcessData(“Hey do you want some milk”) Print(result) result = ProcessData(“Drink the milk from this bottle”) Print(result); //Output #1: { probabilities: [ {label : ‘DrinkMilk’ , score: 0.9929102} , { label: ‘DontDrinkMilk’, score: 0.00512200}], guess: ‘DrinkMilk’ } //Output #2: { probabilities: [ {label : ‘DrinkMilk’ , score: 0.959212} , { label: ‘DontDrinkMilk’, score: 0.00512200}], guess: ‘DrinkMilk’ } result = ProcessData(“hey don't drink that milk”) Print(result) result = ProcessData(“don't drink the milk from that bottle”) Print(result) //Output #1 { probabilities: [ {label : ‘DrinkMilk’ , score: 0.715689} , { label: ‘DontDrinkMilk’, score: 0.00512200}], guess: ‘DontDrinkMilk’ } //Output #2 { probabilities: [ {label : ‘DrinkMilk’ , score: 0.6562100} , { label: ‘DontDrinkMilk’, score: 0.00512200}], guess: ‘DontDrinkMilk’ } You can now respond or process the data based on the guesses made by NLP output by using a switch case or if clause e.g :
High
[ 0.704301075268817, 32.75, 13.75 ]
Edit the code With a built-in assembler for every supported architecture, you can edit an instruction on the fly and patch the binary. The analysis will reprocess the changed instructions in order to update the analysis. The plugin framework exposes full access to the assembler so you can script it as you need.
High
[ 0.683464566929133, 27.125, 12.5625 ]
{ "Names": { "aa": "afarski", "ab": "abhaski", "ace": "ačinski", "ach": "akoli", "ada": "adangmejski", "ady": "adigejski", "ae": "avestanski", "af": "afrikans", "afh": "afrihili", "agq": "aghem", "ain": "ainu", "ak": "akan", "akk": "akadijski", "ale": "aleutski", "alt": "južni altai", "am": "amharski", "an": "aragonski", "ang": "staroengleski", "anp": "angika", "ar": "arapski", "arc": "aramejski", "arn": "mapuški", "arp": "arapaho", "arw": "aravak", "as": "asamski", "asa": "asu", "ast": "asturijski", "av": "avarski", "awa": "avadhi", "ay": "ajmara", "az": "azerbejdžanski", "ba": "baškirski", "bal": "baluči", "ban": "balinezijski", "bas": "basa", "bax": "bamunski", "bbj": "gomala", "be": "bjeloruski", "bej": "beja", "bem": "bemba", "bez": "bena", "bfd": "bafut", "bg": "bugarski", "bgn": "zapadni belučki", "bho": "bojpuri", "bi": "bislama", "bik": "bikol", "bin": "bini", "bkm": "kom", "bla": "siksika", "bm": "bambara", "bn": "bengalski", "bo": "tibetanski", "br": "bretonski", "bra": "braj", "brx": "bodo", "bs": "bosanski", "bss": "akoski", "bua": "buriat", "bug": "bugiški", "bum": "bulu", "byn": "blin", "byv": "medumba", "ca": "katalonski", "cad": "kado", "car": "karipski", "cay": "kajuga", "cch": "atsam", "ccp": "čakma", "ce": "čečenski", "ceb": "cebuano", "cgg": "čiga", "ch": "čamoro", "chb": "čibča", "chg": "čagatai", "chk": "čukeski", "chm": "mari", "chn": "činukski žargon", "cho": "čoktav", "chp": "čipvijanski", "chr": "čeroki", "chy": "čejenski", "ckb": "centralnokurdski", "co": "korzikanski", "cop": "koptski", "cr": "kri", "crh": "krimski turski", "crs": "seselva kreolski francuski", "cs": "češki", "csb": "kašubijanski", "cu": "staroslavenski", "cv": "čuvaški", "cy": "velški", "da": "danski", "dak": "dakota", "dar": "dargva", "dav": "taita", "de": "njemački", "del": "delaver", "den": "slave", "dgr": "dogrib", "din": "dinka", "dje": "zarma", "doi": "dogri", "dsb": "donjolužičkosrpski", "dua": "duala", "dum": "srednjovjekovni holandski", "dv": "divehi", "dyo": "jola-foni", "dyu": "diula", "dz": "džonga", "dzg": "dazaga", "ebu": "embu", "ee": "eve", "efi": "efik", "egy": "staroegipatski", "eka": "ekajuk", "el": "grčki", "elx": "elamitski", "en": "engleski", "enm": "srednjovjekovni engleski", "eo": "esperanto", "es": "španski", "et": "estonski", "eu": "baskijski", "ewo": "evondo", "fa": "perzijski", "fan": "fang", "fat": "fanti", "ff": "fulah", "fi": "finski", "fil": "filipino", "fj": "fidžijski", "fo": "farski", "fon": "fon", "fr": "francuski", "frm": "srednjovjekovni francuski", "fro": "starofrancuski", "frr": "sjeverni frizijski", "frs": "istočnofrizijski", "fur": "friulijski", "fy": "zapadni frizijski", "ga": "irski", "gaa": "ga", "gag": "gagauški", "gay": "gajo", "gba": "gbaja", "gd": "škotski galski", "gez": "staroetiopski", "gil": "gilbertski", "gl": "galicijski", "gmh": "srednjovjekovni gornjonjemački", "gn": "gvarani", "goh": "staronjemački", "gon": "gondi", "gor": "gorontalo", "got": "gotski", "grb": "grebo", "grc": "starogrčki", "gsw": "njemački (Švicarska)", "gu": "gudžarati", "guz": "gusi", "gv": "manks", "gwi": "gvičin", "ha": "hausa", "hai": "haida", "haw": "havajski", "he": "hebrejski", "hi": "hindi", "hil": "hiligajnon", "hit": "hitite", "hmn": "hmong", "ho": "hiri motu", "hr": "hrvatski", "hsb": "gornjolužičkosrpski", "ht": "haićanski kreolski", "hu": "mađarski", "hup": "hupa", "hy": "armenski", "hz": "herero", "ia": "interlingva", "iba": "iban", "ibb": "ibibio", "id": "indonezijski", "ie": "interlingve", "ig": "igbo", "ii": "sičuan ji", "ik": "inupiak", "ilo": "iloko", "inh": "ingušetski", "io": "ido", "is": "islandski", "it": "italijanski", "iu": "inuktitut", "ja": "japanski", "jbo": "lojban", "jgo": "ngomba", "jmc": "makame", "jpr": "judeo-perzijski", "jrb": "judeo-arapski", "jv": "javanski", "ka": "gruzijski", "kaa": "kara-kalpak", "kab": "kabile", "kac": "kačin", "kaj": "kaju", "kam": "kamba", "kaw": "kavi", "kbd": "kabardijski", "kbl": "kanembu", "kcg": "tjap", "kde": "makonde", "kea": "zelenortski", "kfo": "koro", "kg": "kongo", "kha": "kasi", "kho": "kotanizijski", "khq": "kojra čini", "ki": "kikuju", "kj": "kuanjama", "kk": "kazaški", "kkj": "kako", "kl": "kalalisutski", "kln": "kalenjin", "km": "kmerski", "kmb": "kimbundu", "kn": "kanada", "ko": "korejski", "koi": "komi-permski", "kok": "konkani", "kos": "kosrejski", "kpe": "kpele", "kr": "kanuri", "krc": "karačaj-balkar", "kri": "krio", "krl": "karelijski", "kru": "kuruški", "ks": "kašmirski", "ksb": "šambala", "ksf": "bafia", "ksh": "kelnski", "ku": "kurdski", "kum": "kumik", "kut": "kutenai", "kv": "komi", "kw": "kornski", "ky": "kirgiški", "la": "latinski", "lad": "ladino", "lag": "langi", "lah": "landa", "lam": "lamba", "lb": "luksemburški", "lez": "lezgijski", "lg": "ganda", "li": "limburški", "lkt": "lakota", "ln": "lingala", "lo": "laoski", "lol": "mongo", "loz": "lozi", "lrc": "sjeverni luri", "lt": "litvanski", "lu": "luba-katanga", "lua": "luba-lulua", "lui": "luiseno", "lun": "lunda", "luo": "luo", "lus": "mizo", "luy": "luhija", "lv": "latvijski", "mad": "madureški", "maf": "mafa", "mag": "magahi", "mai": "maitili", "mak": "makasar", "man": "mandingo", "mas": "masai", "mde": "maba", "mdf": "mokša", "mdr": "mandar", "men": "mende", "mer": "meru", "mfe": "mauricijski kreolski", "mg": "malgaški", "mga": "srednjovjekovni irski", "mgh": "makuva-meto", "mgo": "meta", "mh": "maršalski", "mi": "maorski", "mic": "mikmak", "min": "minangkabau", "mk": "makedonski", "ml": "malajalam", "mn": "mongolski", "mnc": "manču", "mni": "manipuri", "moh": "mohavk", "mos": "mosi", "mr": "marati", "ms": "malajski", "mt": "malteški", "mua": "mundang", "mus": "kriški", "mwl": "mirandeški", "mwr": "marvari", "my": "burmanski", "mye": "mjene", "myv": "erzija", "mzn": "mazanderanski", "na": "nauru", "nap": "napolitanski", "naq": "nama", "nb": "norveški (Bokmal)", "nd": "sjeverni ndebele", "nds": "donjonjemački", "ne": "nepalski", "new": "nevari", "ng": "ndonga", "nia": "nias", "niu": "niue", "nl": "holandski", "nmg": "kvasio", "nn": "norveški (Nynorsk)", "nnh": "ngiembon", "no": "norveški", "nog": "nogai", "non": "staronordijski", "nqo": "nko", "nr": "južni ndebele", "nso": "sjeverni soto", "nus": "nuer", "nv": "navaho", "nwc": "klasični nevari", "ny": "njanja", "nym": "njamvezi", "nyn": "njankole", "nyo": "njoro", "nzi": "nzima", "oc": "oksitanski", "oj": "ojibva", "om": "oromo", "or": "odija", "os": "osetski", "osa": "osage", "ota": "osmanski turski", "pa": "pandžapski", "pag": "pangasinski", "pal": "pahlavi", "pam": "pampanga", "pap": "papiamento", "pau": "palauanski", "pcm": "nigerijski pidžin", "peo": "staroperzijski", "phn": "feničanski", "pi": "pali", "pl": "poljski", "pon": "ponpejski", "prg": "pruski", "pro": "staroprovansalski", "ps": "paštu", "pt": "portugalski", "qu": "kečua", "quc": "kiče", "raj": "rajastani", "rap": "rapanui", "rar": "rarotongan", "rm": "retoromanski", "rn": "rundi", "ro": "rumunski", "rof": "rombo", "rom": "romani", "ru": "ruski", "rup": "arumunski", "rw": "kinjaruanda", "rwk": "rua", "sa": "sanskrit", "sad": "sandave", "sah": "jakutski", "sam": "samaritanski aramejski", "saq": "samburu", "sas": "sasak", "sat": "santali", "sba": "ngambaj", "sbp": "sangu", "sc": "sardinijski", "scn": "sicilijanski", "sco": "škotski", "sd": "sindi", "sdh": "južni kurdski", "se": "sjeverni sami", "see": "seneka", "seh": "sena", "sel": "selkup", "ses": "kojraboro seni", "sg": "sango", "sga": "staroirski", "sh": "srpskohrvatski", "shi": "tahelhit", "shn": "šan", "shu": "čadski arapski", "si": "sinhaleški", "sid": "sidamo", "sk": "slovački", "sl": "slovenski", "sm": "samoanski", "sma": "južni sami", "smj": "lule sami", "smn": "inari sami", "sms": "skolt sami", "sn": "šona", "snk": "soninke", "so": "somalski", "sog": "sogdien", "sq": "albanski", "sr": "srpski", "srn": "srananski tongo", "srr": "serer", "ss": "svati", "ssy": "saho", "st": "južni soto", "su": "sundanski", "suk": "sukuma", "sus": "susu", "sux": "sumerski", "sv": "švedski", "sw": "svahili", "swb": "komorski", "syc": "klasični sirijski", "syr": "sirijski", "ta": "tamilski", "te": "telugu", "tem": "timne", "teo": "teso", "ter": "tereno", "tet": "tetum", "tg": "tadžički", "th": "tajlandski", "ti": "tigrinja", "tig": "tigre", "tiv": "tiv", "tk": "turkmenski", "tkl": "tokelau", "tl": "tagalog", "tlh": "klingonski", "tli": "tlingit", "tmh": "tamašek", "tn": "tsvana", "to": "tonganski", "tog": "njasa tonga", "tpi": "tok pisin", "tr": "turski", "trv": "taroko", "ts": "tsonga", "tsi": "tsimšian", "tt": "tatarski", "tum": "tumbuka", "tvl": "tuvalu", "tw": "tvi", "twq": "tasavak", "ty": "tahićanski", "tyv": "tuvinijski", "tzm": "centralnoatlaski tamazigt", "udm": "udmurt", "ug": "ujgurski", "uga": "ugaritski", "uk": "ukrajinski", "umb": "umbundu", "ur": "urdu", "uz": "uzbečki", "vai": "vai", "ve": "venda", "vi": "vijetnamski", "vo": "volapuk", "vot": "votski", "vun": "vunjo", "wa": "valun", "wae": "valser", "wal": "valamo", "war": "varej", "was": "vašo", "wbp": "varlpiri", "wo": "volof", "xal": "kalmik", "xh": "hosa", "xog": "soga", "yao": "jao", "yap": "japeški", "yav": "jangben", "ybb": "jemba", "yi": "jidiš", "yo": "jorubanski", "yue": "kantonski", "za": "zuang", "zap": "zapotečki", "zbl": "blis simboli", "zen": "zenaga", "zgh": "standardni marokanski tamazigt", "zh": "kineski", "zu": "zulu", "zun": "zuni", "zza": "zaza" }, "LocalizedNames": { "ar_001": "moderni standardni arapski", "de_CH": "visoki njemački (Švicarska)", "fa_AF": "dari", "nds_NL": "donjosaksonski", "nl_BE": "flamanski", "ro_MD": "moldavski", "zh_Hans": "kineski (pojednostavljeni)", "zh_Hant": "kineski (tradicionalni)" } }
Mid
[ 0.6221498371335501, 23.875, 14.5 ]
<resources> <!-- Base application theme. --> <style name="AppTheme" parent="Theme.AppCompat.Light"> <!-- Customize your theme here. --> </style> </resources>
Low
[ 0.41902313624678605, 20.375, 28.25 ]
Ethnicity and Culture: Some of the ethnic groups speak languages identified with their names. Igala people speak Igala, a Kwa The first primary school building in the former Northern Region, Lokoja language which is related to both Yoruba and Idoma while the Ebira people speak Ebira and the Ugori people speak Ogodi. Inikpi and Ogaganyi festivals are highly regard ed among the Igala people. Inikpi, with the associated shrine, is a commemoration of the act of the heroine, Inikpi, who offered herself for sacrifice to save Igala Kingdom during the precolonial slave trade induced interethnic wars. The Ogaganyi Ogani masquerades, Ogbadu festival, Egungur (Egungwu) festival in Kogi and Oyi LGAs, Ekwuec in Okene LGA and other cultural festivals around the state are some of the important cultural activities. The rich culture is also illustrated by art works on costumes and horns, artifacts and other cultura displays. These include: The ancient palace of the Attah; The about 400yearold Odogo Tower. enemies' activities; Awo a tunnel about one kilometre long, that served as a place to hide for the members of the royal family during war time in Idah; AafinKabba: the old Obaro's palace built of mud with which is now about two centuries old; Late Atta Ebira's Palace built in 1927; OjuwoAtogwu: an ancient earth work declared a national monument in 1963; and Pottery works in Bassa LGA. Bassa Nge music includes lnyaduku, Edzo, Kerengwu and Badankolo which are popular with the people. Much of the ancient works of art have declined in importance, owing to the adoption of Islam, Christianity and other modern ways of life by a large number of the people. Population Structure and Distribution: The total population of Kogi State increased by 63.66 percent over some twentyeight Itakpe Iron Ore Mining Complex years, i.e. from 1,282,538 in 1963 to 2,099,046 in 1991. The spatial distribution of the population by local government area reveals that the first five local government areas which had the highest proportions of population in 1963 are also the same ones with the highest population figures in 1991, though not in the same order or ranking. These are Ankpa (16.86 percent), Idah (11.15 percent), Okene (10.74 percent), Dekina (9.65 percent) and Adavi (7,67 percent) in 1963. Okene was at the top of this list with 14.73 percent of the population, followed by Ankpa 1 (11.83 percent) Idah (10.23 percent), Dekina (9.61 percent) and Adavi (9.29 percent). The most dramatic rate of increase was recorded by Ajaokuta LGA, with 1,324.14 percent, i.e. from 5,641 in 1963 to 80,336 in 1991. The huge increase in population could be explained by the returnmigration of some Ebira people from the cocoa belt of southwestern Nigeria to the state since the establishment of the Ajaokuta Steel Company and the associated Itakpe Iron Ore Mining Company. Olamaboro LGA had an increase of 134.89 percent and Okene's population increased by 124.55 percent over the period. Ankpa had the lowest rate of population increase of 14.81 percent over this period. Urban and Rural Development: When the British Government took full control of the colonial administration of Nigeria in 1900, it introduced major policies which, for sixty years, greatly influenced urban and rural development and the general economic conditions everywhere in the country (Mabogunje, 1968). Lord Lugard used the system of Indirect Rule for his provincial administration and he introduced the Township Ordinance of 1917 which made provision for the creation and administration of all towns and municipalities in Nigeria. The townships were classified into three: first, second and third class townships. Paparanda Square, Lokoja Lagos was the only firstclass township in the country. The six secondclass townships in the northern provinces in 1919 included Lokoja, while the twelve thirdclass townships in the northern provinces included Ankpa, with a later addition of Idah. This classification had important implications for the allocation of public utilities to the towns. Lokoja, for example, had a small water supply scheme in 1929, yet it was not on the list of the towns with regular water supply system or electricity in 1950. This was the situation of other towns in Kabba Province, in spite of their proximity to Rivers Niger and Benue and their tributaries. The situation of the towns and villages in Kogi State in terms of public utilities was much worse at the close of the 20th century and the turn of the millennium (1999) owing to the increas ing population, the general environmental degradation and pollution. Most of the towns in Kogi State remained relatively small, as indicated by the large proportion of 94.25 percent rural population in 1963. The entire state suffered from a long period of neglect in the aeneral allocation of oublic utilities and other social amenities. Yet, one of the essential factors recommended in a comprehensive approach to rural development is the provision of basic amenities to more locations in the rural areas (Abiodun, 1985). The creation of this new State, with Lokoja as the capital, was accompanied by the creation of new local government areas. The original four LGAs from the former Kwara state plus the five LGAs from Benue State increased to twentyone LGAs in the new Kogi State by a process of "fis son. The allocation of additional functions to the local governments, the changes in the Federal revenue allo cation formula in favour of local governments and the new democratic administrations at the three tiers of government are changes which are bound to enhance the effectiveness of more of them in urban and rural development, other things being equal. Some specific projects have been implemented to aid rural development. These include: The Ayangba Agricultural Development Project (AADP) inherited from the former Benue State Government; Land development schemes at Obinagu Avrugo, lyegu, Oko Agbo, Alade, Odika Hane, Okele, Alloma, Ochadamu and Ede to encourage mechanisation of agri cultural processes; Rural development centres built atAdoru, Alloma, Ugwolawo, Ajaka. Onedaga and Ogboligbo to supply farm inputs such as fertilizer and seeds and the services of veterinary staff to farmers; Kogi Oil Palm Production Company established to manage the abandoned plantations; The Agricultural Training Institute at Ochaja; The farm Institute at Oforachi converted to Home Overseers Institute Centre to train housewives in sanitation, nutrition, sewing, knitting and gardening; and The Kogi AgroAllied Investment . Ajaokuta Steel Complex The Better Life Programme, initiated in 1987 b) the Babangida administration, resuscitated the old Domestic Science Centres and turned them into MultiPurpose Centres to train women in weaving pottery, cookery, sewing, arts and crafts, soap anc pomade ointments making and adult literacy classes. Wkulikuli at Chikara and pottery at Ebuhu ir KotonKarfe LGAs (Ogunjumo, 1992). Lokoja and some of the other LGA's headquarters are expanding as a result of their new roles, bu urban primacy is not yet a problem in a basically rural .
Mid
[ 0.612975391498881, 34.25, 21.625 ]
I was more worried about cleaning it through the break in process, and had a time frame to shoot that day, I know it has way more potential, once I get a day off without guests coming over, I'm sure now that the scope is zeroed and am familiar with it, there is a lot to learn. Just have to burn through a ton of ammo, its like racing you're not gonna go fast without burnin' through a bunch of tires right?
Low
[ 0.41609195402298804, 22.625, 31.75 ]
Pi2 Gruis {{DISPLAYTITLE:Pi2 Gruis}} π2 Gruis, Latinised as Pi2 Gruis, is a binary star system in the southern constellation of Grus. It is faintly visible to the naked eye as a yellow-white hued star with an apparent visual magnitude of 5.622. Based upon an annual parallax shift of as seen from the Earth, the system is located 130 light years from the Sun. The primary, component A, is an F-type star of uncertain luminosity class. Malaroda (1975) gave it a stellar classification of F3 III-IV, which would indicate an evolving subgiant/giant star hybrid spectrum, whereas Houk (1978) listed it as class F0 V, suggesting that it is an F-type main sequence star. It has been considered to be a chemically peculiar star, but this is now considered doubtful. It is 758 million years old with 1.4 times the mass of the Sun. The star is 1.9 times the Sun's radius and is radiating 7 times the luminosity of the Sun from its photosphere at an effective temperature of 6,788 K. The companion is a magnitude 11.3 star at an angular separation of 4.6 arc seconds. Gaia Data Release 2 has measured a separate annual parallax for it of , almost identical to the primary star, and indicates that it is a red dwarf. References Category:F-type stars Category:Binary stars Category:Grus (constellation) Gruis, Pi2 212132 110506 8524 Category:Durchmusterung objects
Mid
[ 0.630208333333333, 30.25, 17.75 ]
# Change Log All notable changes to this project will be documented in this file. See [Conventional Commits](https://conventionalcommits.org) for commit guidelines. ## [2.0.25](https://github.com/thi-ng/umbrella/compare/@thi.ng/[email protected][email protected]/[email protected]) (2020-09-22) **Note:** Version bump only for package @thi.ng/intervals ## [2.0.24](https://github.com/thi-ng/umbrella/compare/@thi.ng/[email protected][email protected]/[email protected]) (2020-09-13) **Note:** Version bump only for package @thi.ng/intervals ## [2.0.23](https://github.com/thi-ng/umbrella/compare/@thi.ng/[email protected][email protected]/[email protected]) (2020-08-28) **Note:** Version bump only for package @thi.ng/intervals ## [2.0.22](https://github.com/thi-ng/umbrella/compare/@thi.ng/[email protected][email protected]/[email protected]) (2020-08-17) **Note:** Version bump only for package @thi.ng/intervals ## [2.0.21](https://github.com/thi-ng/umbrella/compare/@thi.ng/[email protected][email protected]/[email protected]) (2020-08-16) **Note:** Version bump only for package @thi.ng/intervals # [2.0.0](https://github.com/thi-ng/umbrella/compare/@thi.ng/[email protected][email protected]/[email protected]) (2019-11-30) ### Bug Fixes * **intervals:** add union/intersection tests ([d301628](https://github.com/thi-ng/umbrella/commit/d301628bf0f9c3c7c09ebe2eb8e98a98b899d5c4)) * **intervals:** update compare() to consider openness, add tests ([995b32a](https://github.com/thi-ng/umbrella/commit/995b32ac5fb4c4ecfa978555dc99d7c6e1264b0f)) ### Features * **intervals:** fix [#171](https://github.com/thi-ng/umbrella/issues/171), various fixes, additions, add tests ([2d13c71](https://github.com/thi-ng/umbrella/commit/2d13c7169f978918af444d89fcd50420761a6401)) ### BREAKING CHANGES * **intervals:** inverted meaning of isBefore/isAfter() to be more understandable # [1.0.0](https://github.com/thi-ng/umbrella/compare/@thi.ng/[email protected][email protected]/[email protected]) (2019-01-21) ### Build System * update package build scripts & outputs, imports in ~50 packages ([b54b703](https://github.com/thi-ng/umbrella/commit/b54b703)) ### BREAKING CHANGES * enabled multi-outputs (ES6 modules, CJS, UMD) - build scripts now first build ES6 modules in package root, then call `scripts/bundle-module` to build minified CJS & UMD bundles in `/lib` - all imports MUST be updated to only refer to package level (not individual files anymore). tree shaking in user land will get rid of all unused imported symbols. # [0.2.0](https://github.com/thi-ng/umbrella/compare/@thi.ng/[email protected][email protected]/[email protected]) (2018-12-19) ### Features * **intervals:** add Interval.parse(), update docs, readme, deps ([a78c6a7](https://github.com/thi-ng/umbrella/commit/a78c6a7)) # 0.1.0 (2018-12-18) ### Features * **intervals:** add new package ([b0a3142](https://github.com/thi-ng/umbrella/commit/b0a3142))
Low
[ 0.501424501424501, 22, 21.875 ]
<!DOCTYPE html> <html lang="en"> <head> <meta http-equiv="refresh" content="0;URL=../../libc/fn.readdir64_r.html"> </head> <body> <p>Redirecting to <a href="../../libc/fn.readdir64_r.html">../../libc/fn.readdir64_r.html</a>...</p> <script>location.replace("../../libc/fn.readdir64_r.html" + location.search + location.hash);</script> </body> </html>
Low
[ 0.293906810035842, 10.25, 24.625 ]
Good News from the Campaign Trail! I wanted to take some time out of my busy campaign schedule - I'm visiting at least five different towns today - to talk to the communities that have fertilized the soil for our grassroots campaign. I've been endorsed by E-Quality Giving, the nation's largest online LGBT donor community, and I'm currently leading my closest competitor for their PAC endorsement by a 3:1 margin - though that doesn't mean you shouldn't drop by and cast your vote. Hillary Rosen, a member of the Democratic National Committee and major donor to Democratic and LGBT causes, added her voice to ours when she endorsed my candidacy for the U.S. Senate. "I am a steely-eyed cynic when it comes to supporting a candidate just because they are gay. They need to be able to win. This guy can win. He knows what it will take to win this seat and has already made an impressive start. The grassroots activity being generated in North Carolina for their upcoming primary is huge and Jim is right at the forefront of the organizing... make no mistake about it - this race is not symbolic - it's winnable. Jim isn't just making history; he is helping to define our future." I've also been endorsed by Ambassador James C. Hormel. Nominated as the country's first openly gay Ambassador by President Clinton, Hormel's appointment to Luxembourg spanned June 1999 to December 2000. Ironically, Hormel's appointment was opposed by then-Senator Jesse Helms. Come January 3rd, I'll be sitting in Jesse's seat. Other high profile supporters include Senator Bob Kerrey, Nobel Prize nominee and founding member of the National Black Justice Coalition Mandy Carter, contemporary artist Ross Bleckner, former UNC-Chapel Hill chancellor Paul Hardin, former Carrboro mayor and the first elected openly-gay mayor in North Carolina Mike Nelson, gay Chapel Hill Council member Mark Kleinschmidt and hundreds of supporters from across the country who have invested their time, energy, and money, often in low-dollar contributions to our effort. A little over a week ago, our campaign earned the endorsement of Blue America PAC, a progressive, online community composed of the high-profile blogs Crooks & Liars, Firedoglake, Digby's Hullabaloo, and Down with Tyranny. They are paving the road to a grassroots, people-powered democracy, and I was happy to join them to talk about the race on March 1st. The blogosphere doesn't just like what I'm saying - they're impressed by what our campaign is accomplishing. According to respected North Carolina blogger Ed Cone, "The Jim Neal campaign seems to be redefining the art of grassroots politics in North Carolina" with a inventive, unique plan to reach out to North Carolina's democratic activists on the precinct level. Our grassroots approach is paying off, and I'm happy to announce that I've taken the lead in the most recent SurveyUSA poll of the Democratic Primary. Our message of citizen-driven democracy is resonating with voters. We're traveling all over the state and we're using the best new technology to connect with people. Everywhere, people are saying they want to take their government back from the special interests and career politicians. They're tired of politics-as-usual and they're ready to act. When we get our message out, we win. And thanks to the support of regular citizens who are donating 5, 10 dollars, whatever they can afford, we are able to get our message out. Diverse communities are converging for change, and I thank all of you who have combined your efforts with ours. This is the year that you'll get to vote for what we want - so I'm doing my best to represent the change you want. Leave a comment We want to know your opinion on this issue! While arguing about an opinion or idea is encouraged, personal attacks will not be tolerated. Please be respectful of others. The editorial team will delete a comment that is off-topic, abusive, exceptionally incoherent, includes a slur or is soliciting and/or advertising. Repeated violations of the policy will result in revocation of your user account. Please keep in mind that this is our online home; ill-mannered house guests will be shown the door.
Mid
[ 0.6074766355140181, 32.5, 21 ]
Comparative effects of two topical antiseptics (chlorhexidine vs KMn04) on bacterial skin flora in atopic dermatitis. In order to determine the efficacy and tolerance of two topical antiseptics, chlorhexidine vs KMn04 (diluted at 1:20,000), we compared their bacteriological and clinical effects in a randomized trial on 20 children with Atopic Dermatitis (AD) treated with topical steroids (desonide). After treatment, a clinical improvement was noted in the two groups, though without statistical differences. In vivo: Before treatment, Staphylococcus aureus (S.A.) density was high and predominant in both groups. After treatment, the decrease in S.A. was greater in the chlorhexidine group than in the KMn04 group, without significant difference. In vitro: At the clinical dilution used, there was a statistical difference (p < 0.05) between the number of killed bacteria in the chlorhexidine group (-3 log) and the number in the KMn04 group (-1 log). This study confirms the role and importance of the choice of a topical antiseptic in the treatment of AD.
Mid
[ 0.640371229698375, 34.5, 19.375 ]
On Thursday, a Navajo court in Window Rock, Arizona removed tribal presidential candidate Chris Deschene from the ballot for refusing to prove his fluency in the Navajo language, as is required by Navajo law. The decision highlights a growing dispute over the future of the country’s largest Native American community, the role of language in establishing its identity, and what it means to be Navajo in modern society. According to the 2010 census, around 169,000 people say they speak Navajo; yet fewer and fewer of those under 50, like 43-year-old Deschene, are fluent, stoking fears that the language—and the Navajo identity—could die out. In an interview with The New Republic, Dr. Evangeline Parsons-Yazzie, a 61-year-old Navajo professor emeritus of Navajo (the language) at Northern Arizona University, discusses the generational divide, how to define fluency, and the future of the Navajo Nation. Elaine Teng: Can you explain to our readers what’s at stake in this dispute over Chris Deschene’s eligibility for the presidency? Evangeline Parsons-Yazzie: I can see both sides of the argument. On one hand, the Navajo language has been declared an endangered language, which means that the children are no longer speaking the language. I think Chris Deschene represents many of those young people who speak very little but understand quite a bit, not that he necessarily is one of them. The people who brought this dispute against him have shut out all other young Navajos who would have liked to have him represent their people. [These young people] are very good orators in English and would have represented their people very, very well on a state, national, and international level. At this point, that’s what’s needed. On the other hand, I can understand why the people who created the dispute are saying what they are, because our language does represent sovereignty. Sovereignty is something we inherited and we’re supposed to maintain. It’s a gift to us, and that’s how the elders who are fluent speakers see it. Therefore, they want their youth to be able to come back before them and speak in their language. It’s the elders who make up the voting public, and they feel that the president of the Navajo Nation should be able to explain to them in Navajo the issues that are facing them. ET: So this seems to be a generational question. If young people feel shut out from the process, do you think this will create change?
High
[ 0.662309368191721, 38, 19.375 ]
1. Field of the Invention The present invention relates to liquid crystal display apparatuses and a fabrication method thereof. More particularly, the present invention relates to a liquid crystal display apparatus suppressed of orientation defect and a method of fabricating such a liquid crystal display apparatus. 2. Description of the Background Art In a conventional liquid crystal display apparatus employing a thin film transistor, an oriented film is applied after forming a thin film transistor on a substrate, and plastic beads and the like are applied after a rubbing process for the purpose of achieving uniform cell thickness. However, in the case where light of 1,000,000 l.times. is directed as in projection, light will pass through due to the plastic beads. A portion will become the illuminance point. To solve this problem, Japanese Patent Laying-Open No. 60-182414 discloses a method of achieving uniform cell thickness. Instead of plastic beads, photosensitive resin is applied having a thickness corresponding to the diameter of the plastic beads on a substrate where an oriented film subjected to rubbing is formed. By forming a columnar pattern, the thickness of the cell is rendered uniform. However, a molecular film is adsorbed at the surface of the oriented film when photosensitive resin is applied on the oriented film and patterned in columnar configuration. The orientation directivity was degraded to induce orientation defect by the technique disclosed in Japanese Patent Laying-Open No. 60-182414.
Mid
[ 0.643391521197007, 32.25, 17.875 ]
[A review of 25 years' clinical application of fast electrons in radiation therapy (author's transl)]. The first betatron developed for current use of fast electrons in radiation therapy (15 MeV, Siemens) has been installed at the Dermatologische Klinik der Universität Göttingen in 1952 (Bode, Markus). The first human carcinoma treated with fast electrons was irradiated using the first 6-MeV-betatron (Dr. Gund, Siemens) at the 2nd institute of physics of the Göttingen university (Bode, Kopfermann, Paul, 1949). Characteristics of the electron radiation utilized for treatment and its particular advantages in dermatological radation therapy are reported. Two clinical examples, one of them the first human carcinoma irradiated with fast electrons, are described, and the frequency distribution of the indications for electron therapy at the dermatological clinics of the university is tabulated for a total of 3419 cases treated between 1949 and 1972 (Bode et al.).
High
[ 0.6650485436893201, 34.25, 17.25 ]
Acetomicrobium hydrogeniformans Acetomicrobium hydrogeniformans is an anaerobic and moderately thermophilic bacterium from the genus of Acetomicrobium which has been isolated from oil production water from North Slope Borough in the United States. References External links Type strain of Acetomicrobium hydrogeniformans at BacDive - the Bacterial Diversity Metadatabase Category:Bacteria described in 2012 Category:Bacteria Category:Synergistetes
Mid
[ 0.6374695863746951, 32.75, 18.625 ]
Domestic Violence Collaborative news group MuckRock is launching a new project that aims to shed light on the problem of domestic violence perpetrated by police officers. But according to the group, the cost of paying for these records is “daunting.” ByRobin L. Barton |June 27, 2018 Our society still clings to stereotypes of men as being macho, strong and able to take care of themselves. So it’s no surprise if many victimized men feel they would get no sympathy, support or help if they admitted that their wives or girlfriends physically abused them. ByStephen Handelman |May 24, 2018 A national awareness campaign similar to the anti-drinking and driving movement is the most promising way to address the nation’s domestic violence problem, according to speakers at John Jay College Wednesday. They called it a public health challenge. New Jersey police Sgt. Philip Seidle shot and killed his wife in 2015, three weeks after their divorce became final. A lawsuit by the victim’s children says police officials ignored numerous signs of his potential for violence, including a long record of excessive force complaints and 12 different calls for help from the victim, Tamara Wilson-Seidle. ByMegan Hadley |May 23, 2018 Lynn Rosenthal and Bea Hanson, prominent players in the Obama White House, told a conference at John Jay College Tuesday they were worried that the upcoming reauthorization of the Violence Against Women Act would not cover the programs needed to help women experiencing intimate partner violence. Connecticut has a long record of arresting both domestic abusers and spouses or partners who fight back during an assault. A bill to curtail the practice cruised through the state legislature last week and is expected to be signed into law by the governor. Nine officers in Connecticut were hurt last week when a barn exploded in the midst of a domestic violence situation–a reminder of the volatility of such incidents. “We don’t walk around covered head to toe in Kevlar,” said a New Haven officer. “So there is no preparation for these things.” The surge of firearms-involved calls to the National Domestic Violence Hotline involving firearms was attributed to increased publicity about mass shootings. Nearly 12,000 of the hotline’s calls in 2017 were related to guns, up from about 6,800 such contacts in 2016. ByClaudia Bellante |April 17, 2018 A dedicated network of psychologists, advocates and shelters has emerged to cope with the rise in domestic violence victims since last year’s Hurricane Maria. The challenge is complicated by the slow pace of reconstruction and the lack of government resources. Gun-control advocates who push for “one-size-fits-all” enforcement of laws that make it illegal for anyone convicted of misdemeanor domestic violence offenses to possess firearms “ignore the reality of intimate-partner abuse,” argues a paper published this month in the Ohio State Law Journal. Watch Video of 2018 Justice Trailblazer Dinner Honoring Bill Moyers WORTH A READ William Edwards, released from jail with a GPS tracking device that he has to pay for, is one of thousands of poor defendants left at the mercy of an ‘E-carceration” system increasingly run by for-profit services, writes an attorney who is leading a class action lawsuit combating the practice. The “piecemeal” approach by state and federal court approach to addressing trial-level errors fails to account for the complex ways that seemingly independent errors interact with one another, writes a professor at the Northeastern University School of Law. Vox news reporter German Lopez reports there were plenty of reasons for the low turnout from white nationalists at Sunday's Unite the Right rally, including alt.right organizers' fear of retribution. He quotes neo-Nazi Andrew Anglin as warning prospective participants: "Getting doxed as a neo-Nazi street fighter will ruin your life, forever.” A Brooklyn, N.Y,-based grassroots group is teaching people with substance abuse disorder how to avoid getting ensnared in the criminal justice system. Organizer Jason Del Aguila says the first step is empowering individuals in their encounters with the courts and police. Recent Comments “And Alt-Left groups? To be clear, when violence has broken out at Alt-Right gatherings, virtually every time it…”
Mid
[ 0.6023529411764701, 32, 21.125 ]
// Copyright 2020, Google Inc. All rights reserved. // // Licensed under the Apache License, Version 2.0 (the "License"); // you may not use this file except in compliance with the License. // You may obtain a copy of the License at // // http://www.apache.org/licenses/LICENSE-2.0 // // Unless required by applicable law or agreed to in writing, software // distributed under the License is distributed on an "AS IS" BASIS, // WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. // See the License for the specific language governing permissions and // limitations under the License. using System; namespace FirebaseAdmin.Auth.Providers { /// <summary> /// The base auth provider configuration interface. /// <para> /// Auth provider configuration support requires Google Cloud's Identity Platform (GCIP). To /// learn more about GCIP, including pricing and features, see the /// <a href="https://cloud.google.com/identity-platform">GCIP documentation</a>. /// </para> /// </summary> /// <typeparam name="T">Type of <see cref="AuthProviderConfig"/> that can be created or /// updated using this argument type.</typeparam> public abstract class AuthProviderConfigArgs<T> where T : AuthProviderConfig { /// <summary> /// Gets or sets the provider ID defined by the developer. For an OIDC provider, this is /// always prefixed by <c>oidc.</c>. For a SAML provider, this is always prefixed by /// <c>saml.</c>. /// </summary> public string ProviderId { get; set; } /// <summary> /// Gets or sets the user-friendly display name of the configuration. This name is /// also used as the provider label in the Cloud Console. /// </summary> public string DisplayName { get; set; } /// <summary> /// Gets or sets a value indicating whether the provider configuration is enabled or /// disabled. A user cannot sign in using a disabled provider. /// </summary> public bool? Enabled { get; set; } internal static bool IsWellFormedUriString(string uri) { return Uri.IsWellFormedUriString(uri, UriKind.Absolute); } internal abstract AuthProviderConfig.Request ToCreateRequest(); internal abstract AuthProviderConfig.Request ToUpdateRequest(); internal abstract ProviderConfigClient<T> GetClient(); } }
Low
[ 0.5067698259187621, 32.75, 31.875 ]
The goal of this competitive renewal application is to increase the clinical utility of labeled mAbs for cancer diagnosis and therapy by developing more effective strategies for labeling internalizing mAbs and mAb fragments with radioiodine nuclides and 211At. With the emergence of the epidermal growth factor receptor variant III (EGFRvIII) as a tumor-specific molecular target on glioma and other tumors, research during the previous grant period was focused on the development of strategies for labeling mAbs reactive with this rapidly internalizing mutant receptor. Our studies revealed that radio iodination of anti-EGFRvIII mAbs using reagents containing benzoates bearing charged substituent's or D-amino acid peptides significantly improved retention of radioactivity in EGFRvIII-expressing tumor cells and xenografts compared with mAbs labeled by conventional approaches. The most promising results were obtained with N5-(3-[*I]iodobenzoyl)-Lys5-N1-maleimido-D-Gly1- GEEEK ([*I]IB-Mal-D-GEEEK), which includes 3 D-glutamates to provide a negatively charged, proteolytically inert moiety and an iodobenzoyl group to minimize dehalogenation. Our hypothesis is that optimized labeling methods for internalizing mAbs such as anti-EGFRvIII based on the IB-Mal-D-GEEEK template will enhance tumor retention and tumor-to-normal tissue ratios, thereby improving their clinical potential as diagnostic and therapeutic agents. We propose to: 1) label anti-EGFRvIII mAbs and fragments with radioiodine nuclides and 211At using IB-Mal-D-GEEEK and its [211At]astatobenzoyl Mal-D-GEEEK analogue and to evaluate their potential as diagnostic and therapeutic radiopharmaceuticals;2) investigate strategies for improving the Mal- GEEEK reagent for labeling internalizing mAbs including alteration in D-peptide sequence (number and nature of negatively charged amino acids), use of a less hydrophobic dehalogenation resistant prosthetic group such as iodopyridine, incorporation of a cathepsin B cleavable linker, and coupling the radiohalogenation precursor to the mAb prior to the labeling reaction;3) investigate the nature of the low and high molecular weight labeled catabolites generated in tumor cells in vitro and tumor and normal tissues in vivo;4) evaluate the therapeutic efficacy of promising 131I- and 211At-labeled anti-EGFRvIII conjugates in athymic rodents with subcutaneous, intracranial, and neoplastic meningitis xenografts;and 5) With the best radio labeled anti-EGFRvIII conjugates, conduct all the toxicity, efficacy, dosimetry, and other FDA-required studies for Investigational New Drug permits, to all performance of clinical trials in malignant glioma patients under our Brain Tumor Center grant (NS20023 PUBLIC HEALTH RELEVANCE: Our goal is to develop methods for attaching iodine radio nuclides and 1-particle emitting 211At to monoclonal antibodies (mAbs) in such a way that the radioactivity remains trapped in the cancer cell after cellular metabolism of mAb. Although the proposed research is focused on improving the imaging and treatment of brain tumors and mAbs that target EGFRvIII, these labeled mAbs also might be useful in the management of other cancers that over express this tumor-specific receptor. Furthermore, these labeling methods should be applicable to other internalizing mAbs and fragments, increasing the potential impact of this work.
High
[ 0.7163742690058481, 30.625, 12.125 ]
Q: Parsing a .json file (java). trying to get the item from the file, the result is null Need some help with java+json. My question is about the .json file. When parsing a file, I get null value. There may be a problem in the file itself, or i'm using the wrong parsing path. I have a class PhotocameraDTO: import com.fasterxml.jackson.annotation.JsonIgnoreProperties; import com.fasterxml.jackson.annotation.JsonProperty; @JsonIgnoreProperties(ignoreUnknown = true) public class PhotocameraDTO { @JsonProperty("id") private int id; @JsonProperty("name") private String name; @JsonProperty("type") private String type; @JsonProperty("sensor") private String sensor; @JsonProperty("lenses") private String lenses; @JsonProperty("display") private String display; public int getId() { return id; } public String getName() { return name; } public String getType() { return type; } public String getSensor() { return sensor; } public String getLenses() { return lenses; } public String getDisplay() { return display; } @Override public String toString() { return ("PhotocameraDTO [id=" + id + ", name=" + name + ", type=" + type + ", sensor=" + sensor + ", lenses=" + lenses + ", display=" + display + "]"); } And .json file (made a screenshot, since the code does not load as valid): http://prntscr.com/ls3fgn And my class with main: package task2; import java.io.FileInputStream; import java.io.IOException; import java.util.ArrayList; import java.util.List; import com.fasterxml.jackson.core.JsonParseException; import com.fasterxml.jackson.databind.DeserializationFeature; import com.fasterxml.jackson.databind.JsonMappingException; import com.fasterxml.jackson.databind.ObjectMapper; import com.fasterxml.jackson.databind.type.TypeFactory; public class PhotocamerasTypes { public static void main(String[] args) throws JsonParseException, JsonMappingException, IOException { FileInputStream fis = new FileInputStream("src/main/resources/photocameras.json"); ObjectMapper objectMapper = new ObjectMapper(); objectMapper.enable(DeserializationFeature.ACCEPT_SINGLE_VALUE_AS_ARRAY); TypeFactory typeFactory = TypeFactory.defaultInstance(); List<PhotocameraDTO> photocameras = objectMapper.readValue(fis, typeFactory.constructCollectionType(ArrayList.class, PhotocameraDTO.class)); System.out.println(photocameras); } } Result: [PhotocameraDTO [id=0, name=null, type=null, sensor=null, lenses=null, display=null]] And now i found the mistake, but i don't now how to fix it. My json file has a structure like: { [{....},{.....}] } My code works if json file has structure like: [{....},{.....}] But I don't how to fix my code for the structure with "{" at the beginning of the file. A: You can add the class: public class ItemsDTO<T> { @JsonProperty("items") private List<T> items; public List<T> getItems() { return items; } public void setItems(List<T> items) { this.items = items; } } then modify the main method: public static void main(String[] args) throws JsonParseException, JsonMappingException, IOException { FileInputStream fis = new FileInputStream("src/main/resources/photocameras.json"); ObjectMapper objectMapper = new ObjectMapper(); objectMapper.enable(DeserializationFeature.ACCEPT_SINGLE_VALUE_AS_ARRAY); ItemsDTO<PhotocameraDTO> itemsDto = objectMapper.readValue(fis, new TypeReference<ItemsDTO<PhotocameraDTO>>() {}); List<PhotocameraDTO> photocameras = itemsDto.getItems(); System.out.println(photocameras); }
Mid
[ 0.5576036866359441, 30.25, 24 ]
The prognostic significance of DNA ploidy in clinically localized prostate cancer treated with radiation therapy. To determine the prognostic significance of deoxyribonucleic acid (DNA) ploidy in comparison to pretreatment prostate specific antigen (PSA) and other prognostic factors for patients with adenocarcinoma of the prostate treated with external beam radiotherapy. Paraffin-embedded prostatic adenocarcinoma material was obtained from patients treated from 1987-1991. Sufficient histologic material for flow cytometric DNA content analysis was obtained from 86 patients and adequate histograms were obtained from 76 of these. The DNA histogram profiles were classified as diploid, tetraploid, or aneuploid. Median patient follow-up was 36 months. There were 54 patients with diploid tumors, and 22 with nondiploid tumors (11 tetraploid and 11 aneuploid). Since the disease outcome for tetraploid and aneuploid tumors was the same, these were pooled (nondiploid tumors). The distribution of diploidy and nondiploidy correlated with pretreatment PSA (p < 0.0005) and grade (p = 0.055), but not with stage, pretreatment prostatic acid phosphatase, transurethral resection, pretreatment serum testosterone, or age. In actuarial univariate analyses, DNA ploidy was a significant predictor of outcome for local failure, distant metastases, any clinical relapse, rising PSA, and rising PSA and/or relapse. Ploidy was not a significant predictor of overall survival, although there were only six deaths. Diploidy predicted for improved outcome, for example, 34.6% incidence of a rising PSA and/or relapse at 4 years compared to 76.9% with nondiploidy (p < 0.0001). An actuarial univariate analysis of other potential prognostic factors using the composite endpoint of rising PSA and/or relapse also revealed pretreatment PSA, grade, pretreatment prostatic acid phosphatase, stage, and serum testosterone to be significant predictors of outcome. In Cox proportional hazards analysis, pretreatment PSA, DNA ploidy, and grade were the only independent prognostic factors for disease outcome using the composite endpoint. DNA ploidy is an independent predictor of outcome in patients with Stages T1-T3 prostate cancer treated with definitive external beam radiotherapy.
High
[ 0.7116564417177911, 29, 11.75 ]
About HRG HIBM Research Group (HRG) is a 501(c)(3) non-profit public benefit corporation, engaged in clinical testing services and collaborative biomedical research towards accelerating the development of therapy for HIBM The laboratory is accredited by the College of American Pathologists (CAP), and licensed by the Department of Health Services Clinical Laboratory Improvement Amendments program (CLIA) and California Department of Health Laboratory Field Services (LFS). The College of American Pathologists (CAP) Laboratory Accreditation is an internationally recognized program and the only one of its kind that utilizes teams of practicing laboratory professionals as inspectors. Designed to go well beyond regulatory compliance, the program helps laboratories achieve the highest standards of excellence to positively impact patient care. The California Laboratory Field Services (LFS) mission is to ensure quality standards in clinical and public health laboratories and laboratory scientists through licensing, examination, inspection, education, and proficiency testing. LFS provides oversight for clinical and public health laboratory operations and for testing in clinical laboratories.
High
[ 0.6615384615384611, 32.25, 16.5 ]
- ATTENTION - Please go to the right hand side of my blog and u will see the tab labeled "- Look Here -". Usually 1 page only can view up to 10 posts so remember to click " Older Post " for more. Once u have decided to own an item, pls fill up the order form at the bottom of the page or email me at [email protected]. (Advise: Pls measure urself b4 u decide to purchase. Measurement of an item is there for u. Don't put blame on us if its too big or too small or whatsoever reason. Announcement 1.3.11 - There will be a batch of clothing from Hongkong, Taiwan and a minor from Thailand. It's limited, only 1-2 pcs per pattern. ALL guarantee plus size otherwise stated. Price will b slightly higher but still in affordable range. Stay Tune for updates!! 23.1.11 - ALL SOLD item had been removed from this blog. Thank you for ur support (yeah, U!!) Nice trading with u. 25/2/10 - Remm to follow us in this blog or add as a friend in facebook. If you're kind enuf pls leave a comment, bad or goods. So we can improved to serve you better. 12/2/10 - Please understand that i'm from East Malaysia, a place called Sarawak, Kuching. Price will be slightly higher than those seller from West Malaysia due to the tax/shipping thingy. It definitely add up an disadvantage for us :( All price fixed otherwise stated. Thank You!! *Happy New Year*
Low
[ 0.502100840336134, 29.875, 29.625 ]
Wednesday, February 22, 2006 Scheduled for publication this May, Michael Schiefelbein's latest novel, Vampire Transgressions, continues the story of Victor Decimus, a 2,000-year-old vampire struggling to follow the rules for survival: Don't associate with other vampires and, once he's convinced a human to take his place, immediately depart for the "Dark Realm." But Decimus is in a bind, having fallen in love with his human replacement, whose name happens to be Paul. Yes, according to St. Martin's Press, "the two enjoy an intense life as vampire lovers, living in Georgetown and mingling at their private nightclub where little is forbidden. But their transgression is not taken lightly and agents for the Dark Realm are now on the prowl, looking to enforce the rules and, if necessary, punish Paul and Victor by threatening all that remains precious to them." Friday, February 17, 2006 The sheriff of Spotsylvania County, Va., has announced that his detectives, while pursuing suspected prostitutes, will no longer go all the way with them and then charge them with said crime. In bringing down the nearby Moon Spa, local law enforcers spent $1,200 in "massages" and one officer even left a $350 tip. Sheriff Howard Smith said the repeated visits were necessary "so detectives could build trust with the operators" and that sexual contact was required for a conviction. But, as noted by the Associated Press, "law enforcement officials say undercover officers only need to get an offer of sex for money to move the case forward." On the other hand, Sheriff Smith said his men needed the sex "because most professionals know not to say anything incriminating. And conversation is difficult, he said, because masseuses at the Asian-run parlors in the northern Virginia county speak little English." Thursday, February 16, 2006 A Galley Slave reader had mentioned this and I've just finished reading it. I'm talking about Gene Weingarten's essay for the Washington Post, "The Peekaboo Paradox", about Washington children's entertainer Eric Knaus, aka The Great Zucchini. Knaus earns $300 for making kids laugh, does about eight shows a weekend, and has no idea where the money goes. (But Weingarten does take a side-trip with him to Atlantic City.) All in all, an exemplary piece of reporting. The California Supreme Court has found that the writing staff of Friends was not guilty of sexual harrassment even as the scribes joked, in the workplace, about masturbation, genitalia, and had recourse to certain names for the female sex that women do not at all like, you know, those words starting with B and C. here Wednesday, February 15, 2006 I've been reading Josh Friedman's screenwriting blog, I Find Your Lack of Faith Disturbing. It's quite something. That something may be vicious, hilarious, startling, or any of the various, not entirely consistent terms that must go under the rubric of morbid humor. Subjects range from the professional to the personal. And Friedman's dissections of the Hollywood filmmaking hierarchy are hilarious, though not quite as breathtaking as what he has to say about his run-in with cancer. Friedman, who wrote the screenplay for War of the Worlds, is an atheist, as his blog's name suggests. One notes also that this science-fiction-loving materialist refers often to poop and matter. They are among his favorite words. And there is something Darwinian in the recurring metaphor of the infinite monkey. See his blog's a zoo and you get to look at his life, like that of a monkey in his cage, but, wait, Hollywood is also a zoo and the executives and operators and actresses are also zoo-animals or zoo-keepers. I have yet to parse the whole thing out, but what makes me stop short and worry about the durability of Friedman's faithlessness is instead the adjective he uses to dress up his main monkey metaphor: infinite. Who knew that Newsweek's Periscope section had an obituary sidebar called "Transition"? The two personages transitioning out of a living state mentioned in last week's issue were Wendy Wasserstein and Betty Friedan. I don't mean to be flip about the end of life, or what some crass bastards refer to as death. So let me just offer my condolences to the families of the transitioned. Tuesday, February 14, 2006 In case you had your doubts about the way things are going in Russia, check out Nina Khrushcheva's depressing op-ed in Sunday's Washington Post. A few stats: 51 percent of young Russians (ages 16-29) believe Stalin was "a wise leader." Was Stalin a "cruel tyrant"? 47 percent say no. And 56 percent of young Russians think "Stalin may have made some mistakes but did more good than bad." As Khrushcheva, the great-granddaughter of Nikita Khrushchev, explains: "We yearned for monumental--if oppressive--leaders, like Ivan the Terrible or Stalin. Yes, they killed and imprisoned, but how great were our victories and parades! So what if Stalin ruled by fear? That was simply a fear for one's life. However terrifying, it wasn't as existentially threatening as the fear of freedom, of individual choice, with no one but oneself to blame if democracy turned into disarray and capitalism into corruption. What an age of wonders we live in. Finally the day has come where you can make gay cowboy dolls based on movie characters hump each other, because some genius on eBay is selling a handmade 'Brokeback Mountain' doll set, including dolls based on the Heath Ledger and Jake Gyllenhall characters, 2 horses, a campfire, a dog, a tent, a liquor bottle and a tree. The dolls come with a hand painted background set and are fully pose-able. Or at least it says they're fully pose-able. My Kim Possible and Catwoman dolls said the same thing, but it's almost impossible to keep them in a 69, and they usually fall over, sometimes before I'm even finished. Couple of teases is what they are. Monday, February 13, 2006 I grew up in the mid-west. You don't ask what a person's religion is, you don't ask what their politics are, you don't ask how much money they make and I pretty much still have that attitude about it. It's none of anybody's business and I don't advantage anyone by telling them what my personal politics are... The arguments are much too subtle to be entered in that way, to my mind. There are things that I think are happening in the world that are egregious mistakes but I'm only operating out of my own box and I don't have any expertise. I'm a voter... I have one vote, that's all I should have. Saturday, February 11, 2006 Manuel Villanueva realizes he has been getting a pretty good deal since he signed up for Netflix Inc.'s online DVD rental service 2 1/2 years ago, but he still feels shortchanged. That's because the $17.99 monthly fee that he pays to rent up to three DVDs at a time would amount to an even bigger bargain if the company didn't penalize him for returning his movies so quickly. Netflix typically sends about 13 movies per month to Villanueva's home in Warren, Mich. — down from the 18 to 22 DVDs he once received before the company's automated system identified him as a heavy renter and began delaying his shipments to protect its profits. The same Netflix formula also shoves Villanueva to the back of the line for the most-wanted DVDs, so the service can send those popular flicks to new subscribers and infrequent renters. The little-known practice, called "throttling" by critics, means Netflix customers who pay the same price for the same service are often treated differently, depending on their rental patterns. Or maybe it was Dr. Ruth? Either way, attendees at a children's fundraiser in New York last week got a real treat when they broke open their fortune cookies. The host, Brooklyn borough president Marty Markowitz, intended the cookies to contain messages like "Brooklyn--the 10th planet" or "Brooklyn--it's like an everything bagel." Instead, some 350 fortunes (out of 1,750) turned out to be "graphically lurid." Yes, due to some mix-up, the guests were served porno-fortune cookies. "They were not cutesy. Triple-X to say the least," said Markowitz. Still, I'd take them over the usual mundane ones ("You are patient in times of trouble," "You enjoy traveling," "You are kind to strangers," "You like Chinese food"). And at the very least, the guests probably didn't have to add the words "in bed." Thursday, February 09, 2006 I expect to see this worked into a movie script some day. The bad guys abduct some unsuspecting teenagers and threaten them into walking into banks and passing notes to tellers demanding money. Or else? Not quite clear from the WashPo story. But if I were writing the movie, the kids' notes would say the kids would be killed if they didn't come out with money. Or make them suicide-bank-robbers, kids strapped with explosives that will go off unless they exit with a lot of cash. The obvious reversal: The kids are the real robbers, pretending to be abducted and acting out orders, while one of their accomplices scoots away with the dough. The paper does note that the kids were unarmed. So it's possible the actual criminals in this story have outwitted my lumbering scenarios by forcing the kids to do the job armed with confidence alone, like George Clooney in Out of Sight. That's even more elegant with the reversal: The kids turn out not only to the bad guys, but wicked smart. But now that I've written this post, I wonder if all the movie-savvy people around here will tell me, oh no, that's been done like a hundred times. Galley friend Brendan Conway, primarily of Washington Times but also an editor for Doublethink, has a terrific story in this week's NYPress about a military interrogator who's going into the private sector as, what else, a consultant. He wants to bring the lessons of military intelligence to a cubicle near you. This issue of the New York Press sadly marks the end of Harry Siegel's tenure as editor, as Siegel and several of his colleagues—some of them good friends of ours—resigned after their publisher refused to allow them to reprint the infamous Danish Muhammed cartoons. Ruling that these cartoons were beyond the pale was an especially craven and hypocritical decision for the Press management, which takes a huge chunk of its revenues from lewd ads promising escort services, phone sex, and the like. Indeed, the Press's own pages have known any number of examples of filth, not least of all in its prose. When I worked there for about five minutes in 1996, the most often-uttered word in the office was the F-Bomb. Ah yes, but risking the displeasure of Islamists looking to shame their critics and enemies into silence, that's another matter. Monday, February 06, 2006 Probably not, but the U.S. Senate isn't taking any chances. According to the Montgomery Advertiser, Stormie Janzen, a scheduler for Senator Jeff Sessions of Alabama, was recently asked to shut down her weblog, which was on MySpace.com. It supposedly showed Stormie in a bare midriff and unzipped jeans. Her biggest turn-on? Men in button-fly jeans. The 34-year-old staffer is "single, straight, and a Scorpio." She also earns an annual salary of $64,139 as a scheduler. Would someone tell me how this happened? We were the fucking vanguard of shaving in this country. The Gillette Mach3 was the razor to own. Then the other guy came out with a three-blade razor. Were we scared? Hell, no. Because we hit back with a little thing called the Mach3Turbo. That's three blades and an aloe strip. For moisture. But you know what happened next? Shut up, I'm telling you what happened—the bastards went to four blades. Now we're standing around with our cocks in our hands, selling three blades and a strip. Moisture or no, suddenly we're the chumps. Well, fuck it. We're going to five blades. Sure, we could go to four blades next, like the competition. That seems like the logical thing to do. After all, three worked out pretty well, and four is the next number after three. So let's play it safe. Let's make a thicker aloe strip and call it the Mach3SuperTurbo. Why innovate when we can follow? Oh, I know why: Because we're a business, that's why! . . . We didn't claw our way to the top of the razor game by clinging to the two-blade industry standard. We got here by taking chances. Well, five blades is the biggest chance of all. Here's the report from Engineering. Someone put it in the bathroom: I want to wipe my ass with it. They don't tell me what to invent—I tell them. And I'm telling them to stick two more blades in there. I don't care how. Make the blades so thin they're invisible. Put some on the handle. I don't care if they have to cram the fifth blade in perpendicular to the other four, just do it! I love the city of Pittsburgh and generally admire the Steelers. Cower is a great coach; Hines Ward is a fabulous player; they beat the Colts--what's not to like? But it's not clear that the best team won last night. (Actually, it's not clear that either the Steelers or the Hawks really looked like championship-caliber squads.) If not for the benefit of some highly questionable calls, Pittsburgh probably loses that game. They trailed the Seahawks in first downs, total yards, and time of possession. They had more turnovers than the Seahawks and their quarterback finished with a passer rating of 22.6. That's 22.6 for the winning quarterback! Makes you long for the legendary days of Brad Johnson and Trent Dilfer. Does anyone have a link to a page with quarterback ratings for previous Super Bowls? Because I'd be surprised if there was another game in recent years where the rating of the two quarterbacks--combined--barely broke 90. (Hasselbeck and Roethlisberger put together totaled 90.4.) In any event, maybe this was a fitting finish to one of the more disappointing NFL seasons. Everywhere you looked, the league suffered from disappointments that stemmed from things not on the field. The Eagles had their undefeated season demolished in the first week, when McNabb was speared. Before the season was over, they were playing without their star quarterback, running back, or wide-out. The Colts had their undefeated season wrecked when their coach suffered a debilitating family tragedy. And the Patriots, clearly still the class of the league, were so riddled with injury that they never really had a fair shot. With the elite teams hobbled, the playoffs stunk with few close games and many, many instances of lousy officiating. So maybe last night shouldn't have been much of a surprise. Sunday, February 05, 2006 I'm not saying there were any great commercials during Super Bowl XL, but there were a few good ones. My picks go to the Nextel/Sprint homage to Benny Hill and Ameriquest's mile-high club spoof. Not bad was ESPN's mobile ad to the tune of Chad and Jeremy's "A Summer Song." As for bad (or lame), I would say Gillette's Fusion razor (five blades!) is up there. No doubt you all have your own best and worst. Friday, February 03, 2006 If you're thinking about getting in on an Oscar pool, now is a good time to look at what the HSX market thinks of the race. Somewhat surprisingly, the HSX market favors Brokeback for Best Picture, but has Crash a close second. We'll see if this trend holds. Ang Lee is favored by a slightly wider margin over George Clooney for Best Director. The Best Actor race is still wide open. Best Actress is also still close, with Reese Witherspoon getting the early edge over Felicity Huffman. (How tragic would it be if Huffman won an Oscar before Bill Macy?) The market is still sorting out the other awards, with most races very close. Of course, intuition says that Brokeback will win nearly across the board, so it will be interesting to see if the market catches up with intuition, or if the conventional wisdom turns out to be wrong. Thursday, February 02, 2006 How is it that a book and author that have been so indisputably influential remain so obscure? As this article makes clear, it’s partly because the author chose to let her book speak for itself, and has for the nearly five decades since the book’s publication quietly but firmly rejected the cult of authorial celebrity. She did not even play the Salinger-like game of being the well-known recluse. She simply refused to become a public person. Man what an awesome year Jennifer Aniston is having. She's had three movies come out that bombed, she got her ass dumped and now gets to see daily updates as her ex starts a family, and now her prized investment blows up and basically becomes worthless. I think I read somewhere that science proved stuff like this happens because a girl isn't pretty or thin enough. Makes me feel bad for that time during oral when I thumped her on the forhead and said "do it better". Wednesday, February 01, 2006 In due course we will be told that what Hamas has been insisting on for years -- the utter destruction of Israel -- is not really a serious goal. Hamas should not be taken literally, and anyway it will be forced to moderate both its platform and its policies by the reality of governing. When, for instance, it repeats the words of its charter -- "The solution of the problem [Israel] will only take place by holy war" -- we will be assured that it is just throwing red meat to what in America is called "the base." As for its truculent anti-Semitism -- not to be confused in this case with anti-Zionism -- it, too, will be dismissed as without consequence. Hamas will have to deal with reality -- and Israel, in the region, is the mightiest reality of them all. Yasser Arafat came to understand that. But Arafat's Fatah movement was secular and nationalistic. In this sense it was modern -- another secular nationalistic movement, much like Zionism. Hamas, on the other hand, can be traced back to the Muslim Brotherhood and its 1928 declaration: "The Koran Is Our Constitution." It is not modern; it is medieval. It gleefully sends people off to their death as suicide bombers, spackling the walls of Tel Aviv restaurants with the flesh of the innocent while assuring the bombers a place in paradise. This is loathsome. This is terrifying. That is the whole idea. The mistake of the Bush administration is to think, based on not much thinking to begin with, that people are people -- pretty much the same the world over. This is why the president extols democracy. It must be what everyone wants because it is what everyone here wants. To denigrate this kind of talk suggests racism -- You mean we are not all the same? -- or a musty neocolonialism. But the hard truth is that culture and religion matter, and we should not expect moderation just because that's how we would react. Toto knows the truth. The Middle East is not Kansas. At issue, you may recall, was whether some "cover your ass" memos purportedly typed for the file by George W. Bush's superior, Lt. Col. Jerry B. Killian—files expressing dissatisfaction with Dubya's special treatment in the Guard—were genuine. Immediately after the 60 Minutes story aired, multiple bloggers produced evidence "showing" that the documents couldn't have been genuine, for technical reasons. This was accepted as gospel truth by Howard Kurtz of the Washington Post and other mainstream reporters. In the end, however, the evidence was found to be specious. We still don't know whether the documents were genuine.
Mid
[ 0.5726872246696031, 32.5, 24.25 ]
The spectacle of corporate magnates from Detroit pleading to be on Uncle Sam's dole is a sordid one. So why aren't more Americans appalled? One reason is widespread misunderstanding -- much of it sowed by these auto makers -- about the size of their firms. The Big Three, we are told, are "too big to be allowed to fail." This myth begins with the idea that GM, Ford and Chrysler are so huge that if they go belly-up, the livelihoods of a disproportionately large number of workers and suppliers would be affected. At once, the...
Low
[ 0.465069860279441, 29.125, 33.5 ]
Sixers Postgame: Al Harrington Al Harrington spoke to FOX Sports Florida's Dante Marchitelli after the Magic's win over the Philadelphia 76ers on Tuesday.
Mid
[ 0.54524886877828, 30.125, 25.125 ]
What Do We Want? If we had a choice, would Hoosiers choose more jobs or higher-paying jobs? More jobs is the short-hand for a better economy. Higher-paying jobs might sound like a program designed for an elite group within the society. Higher pay may also be associated with working longer hours or working under more stressful conditions. The number of jobs in Indiana increased slower than in the nation (0.2 percent vs. 0.3 percent) between 2002 and 2003 (using the most recent data from the U.S. Bureau of Economic Analysis). At the same time, the total earnings of workers in the state advanced by 5.4 percent while the U.S. gain was 4.1 percent. As a result, average earnings per job grew in Indiana by 5.1 percent while the national advance was only 3.8 percent. For the year, Indiana ranked ninth in growth of average earnings per job (see Figure 1). Within Indiana, the range of growth in earnings per job went from a high of 22.6 percent in Gibson County (largely attributable to Toyota) to a low of -0.6 percent in Ripley County (see Figure 2). In dollar terms, the average job in Indiana gained $1,862 in 2003, $287 (18 percent) more than in the United States as a whole. But which sectors of the economy gave us this lead? Of 23 sectors in Indiana, 21 grew in earnings per job, led by the military (see Table 1). The second fastest-growing sector was manufacturing (10.4 percent), which was one of seven sectors that declined in employment (-2.5 percent). Only two sectors had employment growth and a decline in earnings per job. As seen by the forestry sector, employment growth (8.7 percent) can be associated with a decline in average earnings per job (-5.1 percent). These data cannot tell us how much of these changes is the result of added overtime in manufacturing or the creation of entry-level jobs in forestry. From a policy point of view, we need to focus on both employment and the earnings derived from existing and new jobs. Morton J. Marcus Director Emeritus, Indiana Business Research Center, Kelley School of Business, Indiana University
High
[ 0.670050761421319, 33, 16.25 ]
As Trump postures as friend of miners, retirees and widows face April 30 health care cutoff By Samuel Davidson 29 March 2017 In a ceremony at the Environmental Protection Agency Tuesday, President Donald Trump signed an executive order reopening federal lands to coal mining giants like Peabody Energy, and rolling back the modest Obama-era proposals to limit coal-fired power plants. In his remarks the billionaire president postured as a champion of coal miners, falsely claiming that the destruction of environmental protections and elimination of what he called “job-killing regulations” such as occupational safety and health laws would protect their jobs and livelihoods. The administration’s real attitude to miners and their families is demonstrated by its indifference to the imminent loss of pensions and health care benefits for tens of thousands of retirees who labored their entire lives producing profits for the coal bosses. An estimated 22,600 retirees and surviving spouses face a cutoff of retiree health benefits on April 30. The majority worked at Patriot Coal mines in West Virginia, Indiana, Illinois, Kentucky and Ohio. The company was formed when Peabody Coal, the world’s largest private coal company, spun off its unionized operations in 2007 to escape further payments into the United Mine Workers of America (UMWA) Health and Retirement funds. After Patriot Coal filed for bankruptcy in 2012, the UMWA negotiated a Voluntary Employees Beneficiary Association (VEBA) scheme with the company, which paid the union to take over the provision of retiree health benefits. The new VEBA fund provided union executives with lucrative posts managing the funds, but only a fraction of the amount needed to secure the benefits for the retired miners. The promised contributions to the VEBA were never full paid, as Patriot filed for bankruptcy again in 2015 and Peabody filed for bankruptcy in 2016. Other UMWA Health and Pension plans are in no better shape and are predicted to run out of funds by the end of the year. The collapse in global demand and coal prices, and the resulting layoffs throughout the industry, have drastically reduced the amount of money going into the funds. Many other companies, with the full cooperation of the UMWA, followed the Peabody-Patriot pattern to shed pension and health care obligations. A total of 120,000 active and retired miners and their dependents are threatened with the loss of pensions and health benefits because of the near bankruptcy of various UMWA-administered pension and benefit funds. On March 1, the UMWA funds sent a letter to 22,600 retirees and widows informing them their retiree benefits would be cut off in 60 days. This was the third such letter in the last five months. In December, after a political stunt by Democratic senators from coal states, Congress agreed to an extension of benefits until April 30. The UMWA is boosting illusions in various Democratic politicians who have long been in the pockets of the coal companies. The union’s web site prominently displays a March 8 letter from US Senators Joe Manchin, Democrat from West Virginia, and Bob Casey, Democrat from Pennsylvania, along with several other US Senators from coal producing states. The letter asks the Senate Finance Committee chairman—the notoriously right-wing Orrin Hatch—to include the Coal Miners Protection Act in the “waiver needed for the nomination of Mr. Robert Lighthizer to be the United States Trade Representative.” Trump’s pick for trade representative needs the waiver because as an attorney 25 years ago, he represented a business organization tied to the Chinese government, in a trade dispute case against a US-based fan manufacturer. The Democrats and the unions are threatening to make an issue of this based on economic nationalism. Lighthizer has since represented US Steel in trade cases against China and will be taking his place alongside Trump’s virulently anti-Chinese Commerce Secretary Wilbur Ross who had the enthusiastic support of the unions. The UMWA has been pushing for the passage of the Miners Protection Act because it proposes to shore up the UMWA Pension and Health funds with an infusion of cash from the interest being earned on money in the Abandoned Mine Reclamation Fund. Whether such a deal is reached or not, massive attacks on retirement benefits on coal miners and millions of truckers and other workers are being prepared, with the full backing of both big business parties. As for the union executives, their only interest is shoring up their positions as managers of multi-billion-dollar investment funds. In the meantime, miners are being kept in the dark about their fate. “We haven’t been told anything,” Dave, a retired miner from the Maple Creek mine in Monongahela, Pennsylvania, south of Pittsburgh, told the World Socialist Web Site . Another Pennsylvania miner agreed, saying, “I haven’t heard anything. Our mine is non-union, but there are many miners that used to be in the union and they don’t know what is going to happen to them.” The UMWA “wanted us to go to Washington” in February to lobby Congress, Dave explained, “but I’m 73 and couldn’t go.” Dave worked 23 years underground until he was laid off and he later retired. “I loved being underground. Most people would never work in the mine, but believe it or not, I loved it. I was first laid off in 1992, and I didn’t work steady since. I finally turned in my papers and took my pension, which isn’t very much. “We had to fight to get our pension and health care. I’ve been on long strikes when we didn’t know how we were going to eat. Now the union is on the side of the companies, they have given all these concessions, and for what?” Deadly black lung is also on the rise, with approximately 1,000 miners each year dying of the disease. Companies routinely work to deny miners benefits through a process in which a company doctor claims the miner is not 100 percent disabled or that the disease was not caused by working in the mine. David Neel, a miner with 39 years, has been denied benefits twice. He told the WSWS, “A lot of other miners have it worse than me. I’ve made two applications and am working on a third attempt for my black lung approval. The first try I took care of the health issue. Then I met with the union rep and he sent me to a local hospital for the union info. Then I was sent to a management doctor and was advised it would never go through on the first attempt. “I was advised to wait a year and start again. The union attorney said I should go to Chicago to a physician they have out there. How the hell am I supposed to do that? I have been off on SSD (Social Security Disability) with virtually nothing coming in. I’ve got 39 years in coal mining but like everything else, the government and big business are cuddled up in bed together.” The World Socialist Web Site invites coal miners, retirees, health care experts, those suffering from black lung and their spouses to contact our site. Please enable JavaScript to view the comments powered by Disqus.
Low
[ 0.47429906542056005, 25.375, 28.125 ]
FRAG DCL IN[0], COLOR, LINEAR DCL OUT[0], COLOR DCL IMMX[0..1] {{ 0.5, 0.4, 0.6, 1.0 }, { 0.5, 0.4, 0.6, 0.0 }} MAD OUT[0], IN[0], IMMX[0], IMMX[1] END
Low
[ 0.49777777777777704, 28, 28.25 ]
1. Introduction {#sec147029} =============== The prevalence of primary cardiac tumors in childhood is reported at 0.08% with the most frequent tumor being rhabdomyomas ([@A32619R1]). Inflammatory myofibroblastic tumor (IMT) most commonly occurs in the gastrointestinal tract and lung and rarely originates within the cardiac chambers. However, several case reports described potentially fatal outcomes with cardiac IMT due to sudden death. This case report describes the management of an 11-year-old male initially presenting with an ST elevated myocardial infarction of the left main artery and the outcomes of performing percutaneous intervention to alleviate the obstructive tumor. 2. Case Presentation {#sec147030} ==================== An 11-year-old male presented with chest pain after wrestling with his friends. He complained of flu like symptoms with subjective fevers 2 - 3 weeks earlier. When he presented to the emergency room, his EKG showed 9mm ST-segment elevation in the anterior and anterior-lateral leads [Figure 1A](#fig27823){ref-type="fig"}. Echocardiography revealed a 1.0 × 1.4 mm pedunculated mass attached to the anterior mitral valve flowing through the left ventricular outflow tract (LVOT) with an ejection fraction of 20% [Figure 1B](#fig27823){ref-type="fig"}. The initial diagnosis considered was endocarditis with embolization. The patient was intubated for respiratory distress secondary to significant pulmonary edema and had several episodes of non-sustained ventricular tachycardia on telemetry. He was brought emergently to the catheterization lab to evaluate his coronary arteries and fluoroscopy showed a filling defect in the distal left main artery (LM) extending into the bifurcation [Figure 1C](#fig27823){ref-type="fig"}. Heparin and eptifibitide were started and an intra-aortic balloon pump (IABP) was placed. A BMW wire was advanced into the left circumflex (LCx) and a Choice PT wire was advanced into the left anterior descending artery (LAD). Alleviation of the filling defect using aspiration thrombectomy (Pronto LP, Vascular Solutions, Inc., Minneapolis, MN and Angiojet, Medrad, Inc., Warrendale, PA) was unsuccessful [Figure 1D](#fig27823){ref-type="fig"}. Furthermore, when the catheters were advanced across the mass, thrombus embolized into the LAD and LCx causing acute no-reflow. Due to the critical presentation of the patient, it was decided to proceed with percutaneous intervention to establish coronary flow and stabilize the patient in anticipation for possible surgery. Kissing balloon angioplasty was performed with two Emerge 2.0 × 12 mm balloons inflated to 6 ATM at the LM bifurcation with some improvement in blood flow. A Vision 2.5 × 12 mm bare metal stent (BMS) was advanced into the proximal LCx and a Vision 3.0 × 15 mm BMS was advanced into the distal LM to proximal LAD and deployed using the mini-crush technique and had simultaneous kissing balloon angioplasty post dilation [Figure 1E](#fig27823){ref-type="fig"}. The filling defect propagated into the proximal to mid LM and another Vision 4.0 × 15 mm BMS was deployed in the ostial to mid LM with final angiography revealing patent coronary TIMI-3 flow [Figure 1F](#fig27823){ref-type="fig"} and [G](#fig27823){ref-type="fig"}. The patient was monitored in the ICU with continuous eptifibitide and maintained IABP placement. He had open-heart surgery 4 days later, which revealed an elongated mass that attached to the chordae and anterior mitral valve and extended through the LVOT and aortic valve into the LM. The mass was resected with preservation of the mitral valve and the coronary stents were removed from the LM [Figure 1H](#fig27823){ref-type="fig"} and [I](#fig27823){ref-type="fig"}. Pathology reported the vegetation likely due to inflammatory myofibroblastic tumor (IMT). After 3 months, the patient did not have any recovery of his left ventricular function and was referred for cardiac transplant. ![A, EKG demonstrating 9 mm ST-segment elevation in the anterior leads; B, pedunculated mass attached to the mitral leaflet protruding into the LVOT; C, filling defect at the distal left main extending into the bifurcation; D, unsuccessful aspiration thrombectomy; E, kissing balloon at the left main bifurcation; F, filling defect propagated into the prox to mid left main; G, final angiography demonstrating alleviation of the filling defect and TIMI-3 flow; H, resected elongated vegetation that extended from the mitral valve through the LVOT into the left main with retrieved coronary stents; I, resected elongated vegetation that extended from the mitral valve through the LVOT into the left main.](cardiovascmed-05-03-32619-g001){#fig27823} 3. Discussion {#sec147031} ============= A previous publication of this case was reported in World Journal of Pediatric Congential Heart Surgery describing the surgical perspective while this publication was focused on the coronary intervention aspect ([@A32619R2]). When the patient presented with STEMI and a large mass was seen in the LVOT on echocardiogram, the initial diagnosis was embolized vegetation. The patient was hypotensive on multiple IV pressors and not a candidate for immediate surgery. He was brought to the cardiac catheterization laboratory with the intention to treat his embolized vegetation with aspiration thrombectomy but there was little success. Surprisingly, the mass was highly thrombogenic and embolized multiple clots into the LAD and LCx causing no reflow. Due to the patient's hemodynamic instability, it was decided to proceed for percutaneous intervention with stent deployment to maintain coronary patency and to stabilize the patient. Coronary revascularization was successful after a total of 4 stent placements and the patient was transferred to the intensive care unit. He underwent surgery several days later and had successful resection of the tumor as well as retrieval of the coronary stents. Inflammatory myofibroblastic tumor (IMT) was initially described in the lung in 1939 but has been reported to occur in multiple organs including the heart since then ([@A32619R3]). The tumor is classified as low-grade neoplasm but when it originates within the heart, it may cause symptoms of shortness of breath, transient ischemic attacks, syncope, myocardial infarction, and sudden death. The histopathology of IMT is thought to be due to an exaggerated immunologic response to injury, inflammation, and infection by a proliferation of myofibroblastic mesenchymal spindle cells. Moreover, several reports revealed fibrin to be covering the surface of IMT, which may have explained why there were multiple thrombus embolizations during coronary intervention ([@A32619R4]). Clinical presentation of these patients may include fever, growth impairment, iron-deficiency anemia, thrombocytosis, and hypergammaglobulinemia ([@A32619R5]). Most often, these tumors are discovered incidentally during radiological studies and there are no established criteria to determine definitive diagnosis. Biopsies are often not enough for diagnosis and a whole specimen is usually needed. After resection of the tumor, there may be recurrence which can present as being much more rapid and aggressive than before leading to catastrophic outcomes ([@A32619R6]). This is the first known case report describing percutaneous intervention of a cardiac IMT obstruction of the left main artery. Surgery remains the definitive treatment and patients who are stable should proceed. For those who are hemodynamically unstable, coronary stenting can be considered as an option for temporary coronary revascularization and stabilization while bridging to surgery. Operators performing the catheterization should be aware that the tumor is highly thrombogenic and the patient should be on anticoagulation therapy. LM intervention is a complex high-risk procedure with high mortality but we report a successful outcome.
High
[ 0.68010752688172, 31.625, 14.875 ]
Candidates would gut vital social programs The video that emerged of Mitt Romney accusing 47 percent of Americans is shocking because it shows how out of touch he is. However it should also be noted that his claim is clearly untrue, merely a meme propagated by rich, the super rich and their super PACs to persuade gullible Americans to vote against their best interests. According to The Tax Policy Center, only 18.1 percent of U.S. households paid no federal taxes in 2011 or a negative federal income tax or no federal payroll taxes. Of this 18 percent, more than half were seniors whose income came from Social Security, which only becomes taxable at a threshold they did not attain. And most of the rest of the other half were people other than seniors making less than $20,000 a year. These used the earned income tax credit and the child credit to zero out any taxes they might otherwise have had to pay. In other words, poor people. People just getting by. People who would be eating cat food or going completely hungry part of each month were it not for the food stamp program and other forms of assistance Mitt Romney, Paul Ryan and Scott Brown want to gut.
Mid
[ 0.5606694560669451, 33.5, 26.25 ]
// // Generated by class-dump 3.5 (64 bit). // // class-dump is Copyright (C) 1997-1998, 2000-2001, 2004-2013 by Steve Nygard. // #import "WebviewJSEventHandlerBase.h" @interface WebviewJSEventHandler_showToolbar : WebviewJSEventHandlerBase { } - (void)handleJSEvent:(id)arg1 HandlerFacade:(id)arg2 ExtraData:(id)arg3; @end
Low
[ 0.47619047619047605, 27.5, 30.25 ]
1. Introduction {#sec1-ijms-19-01030} =============== Thyroid cancer (TC) is the commonest endocrine malignancy and its incidence shows a steady increase in most countries \[[@B1-ijms-19-01030]\]. In China, thyroid cancer is the fifth most frequent cancer for females with a rate of 16.32/100,000 \[[@B2-ijms-19-01030]\]. According to the criteria of the World Health Organization (WHO), thyroid cancers are classified into five histological subtypes, including follicular carcinoma, papillary carcinoma, medullary carcinoma, undifferentiated anaplastic thyroid carcinoma (ATC), and others \[[@B3-ijms-19-01030]\]. The majority of thyroid cancers are diagnosed as papillary carcinomas with promising prognosis \[[@B4-ijms-19-01030]\], while ATC, though having a low incidence (1.7% among all thyroid cancer cases), accounts for 33--50% of TC-related death because of its aggressive growth, distal metastases formation and, especially, the lack of reliable adjuvant treatments \[[@B5-ijms-19-01030]\]. Therefore, the efficient management of ATC patients becomes one of the main therapeutic challenges in the field. Thyroidectomy is the first choice to treat ATCs, followed by chemoradiotherapy \[[@B6-ijms-19-01030]\]. Docetaxel and cisplatin are the commonly used anti-ATC drugs but usually encounter drug resistance and cause severe adverse effects \[[@B7-ijms-19-01030]\]. Retinoic acid (RA) is known as a differentiation inducer able to improve radioiodide uptake and radiosensitivity of thyroid cancers \[[@B8-ijms-19-01030]\]. Although promising results were obtained in RA-treated ATC cells (FRO) \[[@B9-ijms-19-01030]\], the clinical efficacy of RA-based redifferentiation therapy is still in dispute \[[@B10-ijms-19-01030],[@B11-ijms-19-01030]\]. It is therefore necessary to explore alternative adjuvant agents for a better treatment of ATCs. Resveratrol is a natural occurring product with multifaceted biological activities. A body of evidence demonstrates this polyphenol compound exerts inhibitory effects on many types of cancers including those with RA resistance \[[@B12-ijms-19-01030]\] by inducing redifferentiation and apoptosis \[[@B13-ijms-19-01030]\] and by inactivating cancer-associated signaling pathways \[[@B14-ijms-19-01030],[@B15-ijms-19-01030],[@B16-ijms-19-01030]\]. More importantly, the anticancer dose of this polyphenol compound exerts minor cytotoxic effects on normal cells \[[@B15-ijms-19-01030]\]. In this context, resveratrol may be a potential candidate for ATC therapy. However, the data concerning the effects of resveratrol on ATC cells and the comparative advantage of combining resveratrol with RA in ATC treatment remain limited. This study thus aims to address these issues using three human ATC cell lines. 2. Results {#sec2-ijms-19-01030} ========== 2.1. RA Resistance of Anaplastic Thyroid Cancer (ATC) Cell Lines {#sec2dot1-ijms-19-01030} ---------------------------------------------------------------- The results of hematoxylin-eosin (H/E) morphological staining and immunocytochemical staining demonstrate that after 10 µM RA treatment for 48 h, no distinct cell death is observed in THJ-11T, THJ-16T, and THJ-21T cell populations ([Figure 1](#ijms-19-01030-f001){ref-type="fig"}A) and the levels and intracellular distribution patterns of Cyclin D1 remain unchanged (Insets of [Figure 1](#ijms-19-01030-f001){ref-type="fig"}A). 3-\[4,5-Dimethylthiazol-2-yl\]-2,5-diphenyl-tetrazolium bromide (MTT) cell proliferation assays ([Figure 1](#ijms-19-01030-f001){ref-type="fig"}B) reveal that after 5 µM and 10 µM RA treatment for 48 h, the optical density (OD) values of THJ-11T, THJ-16T, and THJ-21T cells are not significantly altered (*p* \> 0.05) compared with that of the 0.2% dimethyl sulfoxide (DMSO)-treated counterparts (Control). Flow cytometry analysis ([Figure 1](#ijms-19-01030-f001){ref-type="fig"}C) shows no remarkable increase of the apoptotic fractions in the three ATC cell lines after 48 h RA treatment. S phase fractions of THJ-16T and THJ-21T are increased from 38.4% to 53.72% and from 31.3% to 56.11%, respectively, after 48 h 10 µM RA treatment. The cell cycle of RA-treated THJ-11T cells is similar to that of the untreated counterpart. 2.2. Resveratrol Suppresess the Growth of THJ-16T and THJ-21T Cells {#sec2dot2-ijms-19-01030} ------------------------------------------------------------------- H/E morphological staining demonstrates that after 100 µM resveratrol treatment for 48 h, THJ-16T and THJ-21T but not THJ-11T cells show extensive cell death ([Figure 2](#ijms-19-01030-f002){ref-type="fig"}A). MTT cell proliferation assay ([Figure 2](#ijms-19-01030-f002){ref-type="fig"}B) reveals that after 25 µM, 50 µM, 100 µM, and 200 µM resveratrol treatment for 48 h, the OD values of THJ-16T and THJ-21T cells decrease significantly in a dose-related fashion (*p* \< 0.01) in comparison with those of the 0.2% DMSO (Control) and the resveratrol-treated THJ-11T cells. Flow cytometry analysis shows cell cycle arrest at G1 phase (76.3% and 75.7%) and increased apoptotic index (10.8% and 5.5%) of THJ-16T and THJ-21T, respectively, after 48 h 100 µM resveratrol treatment ([Figure 2](#ijms-19-01030-f002){ref-type="fig"}C). The total THJ-16T and THJ-21T cell numbers are significantly decreased ([Figure 2](#ijms-19-01030-f002){ref-type="fig"}D) to the extents of 68.6% and 71.9% after 48 h resveratrol treatment (*p* \< 0.05). Meanwhile, remarkably reduced Cyclin D1 (Insets of [Figure 2](#ijms-19-01030-f002){ref-type="fig"}A) and 3.6-fold and 1.9-fold increase of the active form of caspase-3 ([Figure 2](#ijms-19-01030-f002){ref-type="fig"}C) are found in resveratrol-treated THJ-16T and THJ-21T, but not in THJ-11T cells. 2.3. Resveratrol Resistance of THJ-11T Cells {#sec2dot3-ijms-19-01030} -------------------------------------------- As shown in [Figure 2](#ijms-19-01030-f002){ref-type="fig"}D, resveratrol-treated THJ-11T cells show no distinct morphological change, and their total number displays a 7.4% increase in comparison with their normally cultured counterparts (*p* \> 0.05). There is no significant difference of the OD values between 0.2% DMSO- and resveratrol-treated THJ-11T cells (*p* \> 0.05). Flow cytometry analysis shows neither cell cycle arrest nor increased apoptotic index in 100 µM resveratrol-treated THJ-11T population. The patterns of Cyclin D1 immunocytochemical staining (insets of [Figure 2](#ijms-19-01030-f002){ref-type="fig"}A) and the states of pro- and active-caspase-3 ([Figure 2](#ijms-19-01030-f002){ref-type="fig"}C) show little changes in the resveratrol-treated population. 2.4. Resveratrol Reverses Retinoic Acid Resistance of THJ-11T Cells {#sec2dot4-ijms-19-01030} ------------------------------------------------------------------- The combination of 100 µM resveratrol and 10 µM RA was employed to treat THJ-11T cells for 48 h. The results reveal a dose-related growth arrest in terms of decreased OD values (*p* \< 0.05; [Figure 3](#ijms-19-01030-f003){ref-type="fig"}A and 3C), increased nonviable cell fraction (*p* \< 0.05; [Figure 3](#ijms-19-01030-f003){ref-type="fig"}D), and frequent detection of deoxynucleotidyl transferase-mediated dUTP-biotin nick and labeling assay (TUNEL)-positive cells ([Figure 3](#ijms-19-01030-f003){ref-type="fig"}B) in comparison with cells cultured in 0.2% DMSO-containing medium. Immunocytochemical staining ([Figure 3](#ijms-19-01030-f003){ref-type="fig"}E) reveals that thyroglobulin (Tg) expression is extremely low in THJ-11T cells and remarkably increased after resveratrol treatment. E-cadherin is expressed at low levels and distributed in the cytoplasm; however, after resveratrol treatment, it becomes upregulated and appears at THJ-11T plasma membrane. Similar findings are evidenced in THJ-11T cells treated with the resveratrol and RA combination. 2.5. Significant Upregulation of Cellular Retinoic Acid-Binding Protein 2 (CRABP2) in Resveratrol-Treated THJ-11T Cells {#sec2dot5-ijms-19-01030} ----------------------------------------------------------------------------------------------------------------------- Because cellular retinoic acid-binding protein 2 (CRABP2) and fatty acid-binding protein (FABP5) are factors that determine the response of cancer cells to RA \[[@B17-ijms-19-01030]\], their expression patterns in THJ-11T cells without and with resveratrol treatment were examined by CRABP2- and FABP5-oriented double immunofluorescent labeling. As shown in [Figure 4](#ijms-19-01030-f004){ref-type="fig"}A, FABP5 is stably expressed in THJ-11T cells irrespective of resveratrol treatment; CRABP2 labeling is extremely weak in normally cultured cells and becomes distinct especially in the nuclei cells treated for 48 h with 100 µM resveratrol. The mean gray value of nuclear CRABP2 labeling in resveratrol-treated cells is 15.8 folds higher than that in control cells; no statistical difference of nuclear FABP5 gray values between THJ-11T cells treated or not with resveratrol treatment are found (*p* \> 0.05; [Figure 4](#ijms-19-01030-f004){ref-type="fig"}B). The gray density analyses of the Western blotting results demonstrate a 16-fold increase of CRABP2 and a 24.3% increase of FABP5 in 100 µM resveratrol-treated cells ([Figure 4](#ijms-19-01030-f004){ref-type="fig"}C). In accordance, RT-PCR reveals that *crabp2* transcript is almost undetectable in normally cultured THJ-11T cells but is 34-fold upregulated in 100 µM resveratrol-treated cells ([Figure 4](#ijms-19-01030-f004){ref-type="fig"}D). The level of *fabp5* expression is slightly (10.4%) increased after 48 h resveratrol treatment. 2.6. Differential Response of Retinoic Acid Receptor (RAR)-β and Peroxisome Proliferator-Activated Receptor (PPAR)-β/δ to Resveratrol {#sec2dot6-ijms-19-01030} ------------------------------------------------------------------------------------------------------------------------------------- It has been known that CRABP2 and FABP5 signals are closely related to retinoic acid receptor (RAR)-β and peroxisome proliferator-activated receptor (PPAR)-β/δ, respectively \[[@B17-ijms-19-01030]\]. Therefore, the protein levels of RAR-β and PPAR-β/δ in THJ-11T cells in the absence or presence of resveratrol treatment were examined by immunocytochemical staining and Western blotting. It was found that RAR-β is weakly stained in the cytosol and that PPAR-β/δ is strongly labeled in the nuclei of THJ-11T cells; increased RAR-β with distinct nuclear translocation and reduction of cytosolic and nuclear PPAR-β/δ labeling are observed in cells treated with 100 µM resveratrol for 48 h ([Figure 5](#ijms-19-01030-f005){ref-type="fig"}A). The mean gray value of nuclear RAR-β labeling increases 2.8 folds and that of nuclear PPAR-β/δ shows a 57% reduction in resveratrol-treated cells ([Figure 5](#ijms-19-01030-f005){ref-type="fig"}B). The results of Western blotting demonstrate a 5-fold increase of RAR-β and a 56% reduction of PPAR-β/δ in resveratrol-treated THJ-11T cells ([Figure 5](#ijms-19-01030-f005){ref-type="fig"}C). 3. Discussion {#sec3-ijms-19-01030} ============= Undifferentiated thyroid carcinoma or anaplastic thyroid cancer (ATC), though characterized by a low incidence, is the most lethal thyroid malignancy \[[@B18-ijms-19-01030]\] because the majority of ATC patients die within one year after diagnosis \[[@B19-ijms-19-01030]\]. In addition to the highly aggressive behavior of this type of cancer, the lack of efficient adjuvant therapy is the main reason for the extremely poor prognosis of ATCs \[[@B18-ijms-19-01030]\]. RA has been commonly used in combination with radiotherapy to treat aggressive thyroid cancers and it can decrease the viability of FRO ATC cell line through anti-proliferative and cytotoxic activities \[[@B9-ijms-19-01030]\]. To elucidate whether these effects also occur in other ATC cells, three ATC cell lines (THJ-11T, -16T, and -21T) are employed and treated with RA in this study. The results clearly demonstrate that RA exerts a small inhibitory effect on these cell lines in terms of proliferation activity, cyclin D1 labeling pattern, and cell death compared with their untreated counterparts. These findings thus suggest the frequent establishment of RA resistance in ATCs and the necessity to explore more reliable agents against this highly aggressive malignancy. Resveratrol is a potential candidate because of its nontoxic properties in normal cells and its ability to induce redifferentiation and apoptosis in cancer cells \[[@B20-ijms-19-01030]\] and to inhibit cancer-associated signaling \[[@B21-ijms-19-01030],[@B22-ijms-19-01030],[@B23-ijms-19-01030]\]. So far, no data are available concerning the effects of resveratrol on ATC cells. It has been found that resveratrol effectively suppresses the growth and induces neuronal differentiation of RA-resistant medulloblastoma cells \[[@B12-ijms-19-01030]\]. We therefore considered that this non-toxic polyphenol compound might exert similar effects on the three RA-resistant ATC cell lines. Our results reveal distinct inhibitory effects of 100 µM resveratrol on THJ-16T and THJ-21T cells in the forms of remarkable growth arrest (68.6% and 71.9%), G1-phase accumulation with downregulated Cyclin D1 expression, and increased apoptotic fractions (10.3% and 5.5%) with distinct casepase-3 activation. Additionally, these findings prove, for the first time, the therapeutic value of resveratrol in the treatment of ATCs, especially those with RA resistance. Nevertheless, resveratrol is not a universal anti-ATC agent because THJ-11T cells show a limited response to resveratrol under the same experimental conditions, suggesting the necessity to conduct a resveratrol-based anti-ATC therapy in a personalized manner. In this context, THJ-11T and other two resveratrol-sensitive ATC cell lines would be of value in exploring the specific molecular elements that determine resveratrol therapeutic efficacy. Meanwhile, it is necessary to find alternative approaches to treat ATC cells that are sensitive neither to RA nor to resveratrol. A body of evidence reveals that resveratrol can sensitize cancer cells to conventional anticancer drugs. For instance, it enhances the effects of temozolomide on glioblastoma-initiating cells by promoting redifferentiation \[[@B24-ijms-19-01030]\] and of cisplatin on non-small-cell lung cancer cells by inducing mitochondrial dysfunction and cell apoptosis \[[@B25-ijms-19-01030]\]. We therefore presumed that resveratrol might be helpful in reversing RA resistance in ATC cells. This speculation was tested by treating THJ-11T cells with a resveratrol and RA combination (Res/RA). Differently from the situation found in THJ-11T cells treated with 100 µM resveratrol or 10 µM RA only, decreased proliferation activity accompanied with increased fractions of nonviable cells and TUNEL-positive labeling cells were evidenced in Res/RA-treated populations. Our results thus confirm the efficacy of resveratrol to reverse RA resistance in ATC cells and suggest the potential clinical utility of this combination in the management of ATCs that are sensitive neither to resveratrol nor to RA. This notion is further supported by the redifferentiation tendency of resveratrol-treated THJ-11T in terms of increased Tg and E-cadherin production and, especially, the appearance of membranous E-cadherin localization that, as shown in the current study, are extremely low and even absent in undifferentiated and, especially, anaplastic thyroid cancers \[[@B26-ijms-19-01030],[@B27-ijms-19-01030],[@B28-ijms-19-01030],[@B29-ijms-19-01030]\]. As the next step, the potential of resveratrol to improve I^131^ uptake of ATC cells should be investigated. CRABP2 has been known as the central player of RA tumor suppression, and, in contrast, FABP5 has been known as an RA tumor promotion signaling; these molecules function by delivering RA to its corresponding nuclear receptors, i.e., RAR-β and PPAR-β/δ, respectively \[[@B30-ijms-19-01030],[@B31-ijms-19-01030],[@B32-ijms-19-01030]\]. It is, therefore, proposed that the ratio of CRABP2 and FABP5 and the status of expression of their corresponding nuclear receptors may determine RA sensitivities of cancer cells \[[@B17-ijms-19-01030],[@B33-ijms-19-01030],[@B34-ijms-19-01030]\]. Given the evidence that resveratrol can enhance RA sensitivity, the expression patterns of CRABP2, RAR-β, FABP5, and PPAR-β/δ in THJ-11T cells and the impact of resveratrol in them were analyzed. The results clearly demonstrate that the ratio of CRABP2/FABP5 is imbalanced THJ-11T cells because of an extremely low CRABP2 expression; this situation is reversed upon resveratrol treatment with a remarkably increased level of CRABP2 and largely unchanged FABP5 expression. Concurrently, a distinct RAR-β nuclear accumulation and a reduced PPAR-β/δ expression and nuclear labeling are found in resveratrol-treated cells. On the basis of the above findings, it would be reasonable to consider that CRABP2/RAR-β- and FABP5/PPAR-β/δ-mediated RA signaling pathways are reprogrammed by resveratrol, which may enhance RA sensitivity of THJ-11T cells and, presumably, of RA-resistant ATC cases. In this context, resveratrol would be of potential value in improving the efficacy and in avoiding the adverse effects of RA in the treatment of ATCs. 4. Materials and Methods {#sec4-ijms-19-01030} ======================== 4.1. Thyroid Cancer Cell Lines and Culture {#sec4dot1-ijms-19-01030} ------------------------------------------ THJ-11T, 16T, and 21T cell lines \[[@B35-ijms-19-01030]\] were kindly provided by Quentin Liu, Institute of Cancer Stem Cell, Dalian Medical University. They were cultured in 1640 medium with [l]{.smallcaps}-glutamine (Hyclone, Logan, UT, USA), supplemented with 10% fetal bovine serum (Gibco, Grand island, NY, USA) for THJ-11T and THJ-21T, and with 5% fetal bovine serum for THJ-16T. An amount of 5 × 10^4^/mL cells were plated onto culture dishes (Nunc A/S, Roskilde, Denmark) at 37 °C and 5% CO~2~ for 24 h before the experiments were performed. For haematoxylin and eosin (H/E), immunocytochemical staining and flow cytometry analyses (Becton Dickinson, San Jose, CA, USA), dozens of cell-bearing coverslips were prepared under the same experimental conditions using coverslip-preparation dishes (Jet Biofile Tech. Inc., Guangzhou, China; China invention patent No. ZL200610047607.8) for multiple experimental purposes. 4.2. Reagents and Cell Treatments {#sec4dot2-ijms-19-01030} --------------------------------- Resveratrol and all-trans retinoic acid (RA; Sigma-Aldrich, St. Louis, MO, USA) were dissolved in dimethylsulfoxide (DMSO; Sigma-Aldrich) and diluted with culture medium to 100 µM and 10 µM, respectively, as the working concentrations, just before use \[[@B36-ijms-19-01030]\]. The cells were treated with 100 µM resveratrol or 10 µM RA for 48 h and observed at 8 h intervals. Normally cultured cells and cells treated with 0.2% DMSO were used as the untreated, background, and insensitive controls. Cell numbers and viability were checked at 12 h intervals, and the cell-bearing coverslips were fixed in cold acetone for morphological and immunocytochemical staining or in 4% paraformaldehyde (pH 7.4) for TUNEL apoptosis assay and immunofluorescence (IF) assay. The experimental groups were designed in triplicate, and each of the experiments was repeated at least three times. The data obtained were summarized and statistically quantified for a confidential conclusion. 4.3. Evaluation of Cell Proliferation and Death {#sec4dot3-ijms-19-01030} ----------------------------------------------- To elucidate the cellular response of ATC cells to resveratrol treatment, H/E staining, viable/nonviable cell counting (Automated Cell Counter, Bio-Rad, Singapore), and 3-\[4,5-Dimethylthiazol-2-yl\]-2,5-diphenyl-tetrazolium bromide (MTT) cell proliferation assay were performed on coverslips bearing THJ-11T, THJ-16T, and THJ-21T cells treated or not with the drugs by the methods described elsewhere \[[@B37-ijms-19-01030]\]. Flow cytometry (Becton Dickinson, San Jose, CA, USA) was employed to determine the cell cycle phases and apoptotic incidence, and the data obtained were analyzed with a with MOD FIT software (Version 5.0, Verity Software House Inc., Topsham, ME, USA) \[[@B37-ijms-19-01030]\]. Cells treated with 0.2% DMSO were used as controls. The DNA fragmentation assay in THJ-11T cells on coverslips, treated with both RA and resveratrol, was performed by using a modification of the terminal deoxynucleotide transferase (TdT)-mediated dUTP-biotin nick end-labeling method (TUNEL; Roche Inc., Basel, Switzerland). Cells on coverslips without drug treatment were used as a negative control. Fluorescence microscopy (BX51, Olympus, Tokyo, Japan) was used to observe and photograph the cells on coverslips. 4.4. Protein Preparation and Western Blotting {#sec4dot4-ijms-19-01030} --------------------------------------------- Western blotting was conducted using antibodies against CRABP2 (Proteintech, Chicago, IL, USA; 1:200), FABP5 (Proteintech, Chicago, IL, USA; 1:200), RAR-β (Bioss. Inc., Beijing, China; 1:150), PPAR-β/δ (Bioss. Inc., Beijing, China; 1:200), pro-caspases-3, and active-caspases-3 (Abcam Inc., Cambridge, UK; 1:500 and 1:500). The experiment was performed by the method described elsewhere \[[@B15-ijms-19-01030]\]. Briefly, the sample proteins (20 µg/well) were separated by 10% SDS-PAGE electrophoresis and transferred to polyvinylidene difluoride membrane (Amersham, Buckin ghamshire, UK). The membrane was blocked in 5% skimmed milk (Sigma-Aldrich) Tris-buffered saline (TBS-T) (10 mM Tris--HCl, pH 8.0, 0.5% Tween 20 and 150 mM NaCl) at 4 °C overnight. After three washes with TBS-T, the membrane was incubated for 3 h with the primary antibody at room temperature, followed by 1 h incubation with horseradish peroxidase (HRP)-conjugated anti-rabbit IgG (Zymed Lab Inc., San Francisco, CA, USA). The enhanced chemiluminescence system (Roche, Penzberg, Germany) was used to detect the bound antibody. The labeling signal was removed with a stripping buffer (62.5 mM Tris--HCl, pH 6.7, 100 mM 2-mercaptoethanol, 2% sodium dodecyl sulfate (SDS), and the membrane was reprobed with another antibody until all the parameters were examined. 4.5. Immunocytochemical Staining and Double Immunofluorescent Labeling {#sec4dot5-ijms-19-01030} ---------------------------------------------------------------------- Immunocytochemical staining was conducted on cell-bearing coverslips by the method described elsewhere \[[@B15-ijms-19-01030]\]. The antibodies used were: Cyclin D1 (Bioss Inc., Beijing, China; 1:100), Tg (Bioss. Inc., Beijing, China; 1:200), E-cadherin (Bioss. Inc., Beijing, China; 1:100), RAR-β (Bioss. Inc., Beijing, China; 1:150), and PPAR-β/δ (Bioss. Inc., Beijing, China; 1:200). Cells incubated in 0.2% DMSO-containing medium were used as a control. The color reaction was performed by using 3,3′-diaminobenzidine tetrahydrochloride (DAB) after the binding of the primary antibody (Vector Laboratories, Burlingame, CA, USA). For double immunofluorescent staining (IF), mouse anti-CRABP2 and rabbit anti-FABP5 were employed in the working concentrations of 1:120. Briefly, the cell-bearing coverslips were washed with phosphate-buffered solution (PBS, pH 7.4), incubated in 3% H~2~O~2~ for 10 min and then with anti-CRABP2 (1:120; Proteintech, Chicago, IL, USA) and anti-FABP5 (1:120; Proteintech, Chicago, IL, USA) at 4 °C for one night in a humid chamber. Finally, the coverslips were co-incubated with FITC-conjugated goat anti-mouse IgG and PE-conjugated goat anti-rabbit IgG (both 1:100; Santa Cruz Biotechnology, Santa Cruz, CA, USA) at 37 °C for 60 min in the dark, sealed with fluorescence mounting medium, and observed and imaged under a fluorescence microscope (BX53F, Olympus, Tokyo, Japan). 4.6. RNA Isolation and RT-PCR {#sec4dot6-ijms-19-01030} ----------------------------- The RNA was isolated from THJ-11T cell lines treated or not with resveratrol for 48 h and subjected to reverse transcription (RT) \[[@B37-ijms-19-01030]\]. For RT, 0.5 µg of each RNA sample was added to 20 µL of RT reaction mixture (Takara, Inc., Ltd., Dalian, China) containing 4 µL of MgCl~2~, 2 µL of 10 RNA PCR buffer, 9.5 µL of RNase-free distilled H~2~O, 2 µL of dNTP mixture, 0.5 µL of RNase inhibitor, 1 µL of AMV reverse transcriptase, and 1 µL of oligo dT-adaptor primer. The reaction was carried out at 55.8 °C for 30 min, at 98 °C for 5 min, and at 58 °C for 5 min \[[@B38-ijms-19-01030]\]. Polymerase chain reaction (PCR) was conducted with a pair of primers specific for *crabp2* (forward primer: 5′-ATGCCCAACTTCTCTGGCAA-3′; reverse primer: 5′-CGTCATGGTCAGGATCAGTT-3′), *fabp5* (forward primer: 5′-AGCAGCTGGAAGGAAGATGG-3′; reverse primer: 5′-CTGATGCTGAACCAATGCAC-3′), and *β-actin* (forward primer: 5′-GCATGGAGTCCTGTGGCAT-3′, reverse primer: 5′-CTAGAAGCATTTGCGGTGG-3′). The PCR for *crabp2* was performed as follows: after initial denaturation for 2 min at 85 °C and 2 min at 94 °C, the samples were subjected to 30 cycles at 94 °C for 30 s, 59 °C for 30 s, 72 °C for 60 s. Then, after a final extension time of 10 min at 72 °C, the samples were stored at 4 °C. The PCR for *fabp5* was performed as follows: after initial denaturation for 5 min at 95 °C, the samples were subjected to 40 cycles at 94 °C for 45 s, 55 °C for 45 s, 72 °C for 90 s. Then, after a final extension time of 10 min at 72 °C, they were stored at 4 °C \[[@B39-ijms-19-01030]\]. Agarose gels (1.2%) containing ethidium bromide (0.5 µg/mL) were prepared for the separation of the PCR products, and UVP Biospectrum Imaging System (UVP, Inc, Upland, CA, USA) was used to visualize and photograph the samples. 4.7. ImageJ-based Quantification of Nuclear Translocation {#sec4dot7-ijms-19-01030} --------------------------------------------------------- As described described elsewhere \[[@B40-ijms-19-01030]\], five view fields in each immunocytochemically stained cell coverslip were photographed under a microscope (×40), and the images were adjusted by RGB (red green blue)/HSB (hue saturation brightness) stack until only the green (CRABP2), red (FABP5), or brown (RAR-β or PPAR-β/δ) labeling were shown. The nuclei were selected using ROI (regions of interest) Manager tool, and their gray values were evaluated and summarized by calculating the mean ± standard deviation (SD). One-way ANOVA was employed to evaluate the statistical difference of the gray values between controls and resveratrol-treated cells. 4.8. RA Sensitivity Assay of Resveratrol-Treated THJ-11T Cells {#sec4dot8-ijms-19-01030} -------------------------------------------------------------- THJ-11T cells were treated with 100 µM resveratrol, 10 µM RA, or their combination for 48 h. To elucidate the response of resveratrol-treated THJ-11T cells to RA, H/E staining, viable/nonviable fractionation, TUNEL labeling, and MTT cell proliferation assay were performed in THJ-11T cells treated differently by methods described elsewhere \[[@B41-ijms-19-01030],[@B42-ijms-19-01030]\]. 4.9. Statistical Analyses {#sec4dot9-ijms-19-01030} ------------------------- Each experiment was conducted for three times, and the data obtained were analyzed together. The results of the MTT cell proliferation assay and cell counting were evaluated with ANOVA and the independent-samples *t*-test. The bar graphs present the mean ± standard deviation (SD) of separate experiments (*n* ≥ 8). When required, *p*-values are provided in the figures and their legends. 5. Conclusions {#sec5-ijms-19-01030} ============== The effectiveness of resveratrol and retinoic acid against anaplastic thyroid cancer (ATC) cells is investigated in this study. The results show that all three ATC cell lines employed are insensitive to RA treatment, while two of them are sensitive to resveratrol in terms of growth arrest, G1 phase accumulation, and extensive apoptosis. Resveratrol exerts little inhibitory effect on THJ-11T ATC cells but upregulates Tg and E-cadherin expression and efficiently reverses their RA resistance by activating CRABP2/RAR-mediated tumor suppression signaling. Our findings thus demonstrate, for the first time, the therapeutic advantages of resveratrol in suppressing ATC cell growth by itself or in combination with RA. We suggest that this nontoxic polyphenol compound is of potential value in improving the clinical management of the lethal ATCs, especially those resistant to RA. This work was supported by grants from the National Natural Science Foundation of China (Nos. 81450016, 81272786, 81071971, 81072063 and 30971038), the Research Fund for PhD supervisors from the National Education Department of China (20122105110005), and the Program Fund for Liaoning Excellent Talents in University (LJQ2012078). Hong Li and Jia Liu carried out experiments, data analyses, and manuscript writing; Yi-Tian Li, Xiao-Ting Tian, Xu Zheng, Mo-Li Wu performed the experiments; Xiao-Xin Cheng, Qing-You Kong, Guang-Wen Zhu cultured the cells; all authors read and approved the final manuscript. The authors declare no conflict of interest. ###### Lack of response of the three anaplastic thyroid cancer (ATC) cell lines to 10 µM retinoic acid (RA) treatment. (**A**) H/E staining (×40) and Cyclin D1 immunocytochemical staining (insets; ×40); (**B**) 3-\[4,5-Dimethylthiazol-2-yl\]-2,5-diphenyl-tetrazolium bromide (MTT) cell proliferation assay; (**C**) flow cytometry. Control, without resveratrol treatment; RA-alone, 10 µM retinoic acid treatment. NS, without statistical significance (*p* \> 0.05); the error bars, the mean ± standard deviation; ![](ijms-19-01030-i003.jpg), apoptosis peak; ![](ijms-19-01030-i001.jpg), G1 phase; ![](ijms-19-01030-i002.jpg), S phase; ![](ijms-19-01030-i001.jpg), G2 phase. ![](ijms-19-01030-g001a) ![](ijms-19-01030-g001b) ###### Different responses of the three ATC cell lines to resveratrol treatment. (**A**) H/E staining (×40) and Cyclin D1 immunocytochemical staining (insets; ×40) (**B**) MTT cell proliferation assay; (**C**) flow cytometry and Western blotting for pro-caspase-3 and active-caspase-3; (**D**) viable cell counting. \*, with statistical significance (*p* \< 0.05); the error bars, the mean ± standard deviation. Control, without resveratrol treatment; Res, 100 µM resveratrol treatment. NS, without statistical significance (*p* \> 0.05); ![](ijms-19-01030-i003.jpg), apoptosis peak; ![](ijms-19-01030-i001.jpg), G1 phase; ![](ijms-19-01030-i002.jpg), S phase; ![](ijms-19-01030-i001.jpg), G2 phase. ![](ijms-19-01030-g002a) ![](ijms-19-01030-g002b) ###### Resveratrol reverses the retinoic acid sensitivity of THJ-11T cells. (**A**) H/E staining (×40); (**B**) deoxynucleotidyl transferase-mediated dUTP-biotin nick and labeling assay (TUNEL) for apoptotic cell labeling (Green in color; ×40); (**C**) MTT cell proliferation assay; (**D**) viable cell counting; (**E**) immunocytochemical staining of thyroglobulin (Tg) and E-cadherin (×40). Control, cultured in 0.2% dimethylsulfoxide (DMSO)-containing medium; RA, retinoic acid treatment; Res, resveratrol treatment; Resveratrol plus RA, treated with a combination of 10 µM retinoic acid and 100 µM resveratrol for 48 h; Resveratrol-alone, 100 µM resveratrol; \*, with statistical significance (*p* \< 0.05); the error bars, the mean ± standard deviation. Arrows indicate the ports with higher magnification (×80) in the insets. ![](ijms-19-01030-g003a) ![](ijms-19-01030-g003b) ![Differential expression of CRABP2 and FARP5 in THJ-11T cells in the absence or presence of 100 µM resveratrol. (**A**) Double immunofluorescent labeling (×40); (**B**) ImageJ (Version 1.0, National Institutes of Health, Bethesda, MD, USA)-based quantification of nuclear labeling of CRABP2 and FABP5; (**C**) Western blotting; (**D**) RT-PCR. Control, 0.2% DMSO-treated cells; Resveratrol-alone, 100 µM resveratrol treatment; Ratio, ratio between the levels of the target molecules and that of β-ACTIN/*β-actin*; \*, with statistical significance (*p* \< 0.05); NS, no statistical significance (*p* \> 0.05); the error bars, the mean ± standard deviation.](ijms-19-01030-g004){#ijms-19-01030-f004} ![Immunocytochemical and Western blotting demonstration of resveratrol-induced alterations of RAR-β and PPAR-β/δ expression and their intracellular distribution patterns in THJ-11T cells. (**A**) Immunocytochemical staining (×40); (**B**) ImageJ-based quantification of nuclear labeling of RAR-β and PPAR-β/δ; (**C**) Levels of RAR-β and PPAR-β/δ determined by Western blotting. Control, 0.2% DMSO-treated cells; Resveratrol, 48 h 100 µM resveratrol treatment. Arrows indicate the portions in higher magnification in the insets (×80). Ratio, ratio between the levels of the target molecules and that of β-ACTIN; \*, with statistical significance (*p* \< 0.05); NS, no statistical significance (*p* \> 0.05); the error bars, the mean ± standard deviation. Gray values, nuclear RAR-β and PPAR-β/δ immunocytochemical staining densities.](ijms-19-01030-g005){#ijms-19-01030-f005}
Mid
[ 0.606965174129353, 30.5, 19.75 ]
Malfoozaat (writings) is a book of Ahmad Radha Khaan (d.1340/1921) who was the founder of the Indian subcontinent sect known as Bareilwi’s. However this word has been misconstrued and translated as Ahlus- Sunnah Wal-Jamaah which is highly erroneous. The Bareilwee’s however do not like to use this term rather they use terms, which are synonymous with soofee terminology. For example they will attribute themselves to one of the soofee tareeqah like, Qaadiree or Naqshbandee and so on. In essence they are bareilwees, which is best understood to be a subsect of soofism and it is related to the more vast classification of soofism by the tareeqahs. The western Soofee sympathisers and propagators in the west like Hishaam Kabbanee, Nuh Ha Meem Keller, Hamza Yusuf Hanson, Abdul-Hakim Muraad, Gibril Fouad Haddaad and others all promote and endorse Ahmad Radha Khaan and his works, they defend him, revere him and promote him in whatever form possible, sometimes directly and most directly when answering questions. We will mention some statements from this book, which will highlight some defective and corrupt beliefs of the bareilwis. Some of these examples will clearly show some of the shirk of the bareilwis which propagate and secondly it will shed some light on the beliefs of bareilwi church father, Ahmad Radha khaan. (1) Ahmad Radha Khaan was asked are their muslims amongst jinns and angels. He replied, “An angel became muslim and she would often come to visit me. One day she did not come so I questioned her, she replied, “One of my close friends died in Hindustaan (Hindh-Early day India) so I went there and on the way I saw Iblees praying the salah.” (Malfoozaat (1/29). (2) Someone asked Ahmad Radha Khaan concerning the drowning of Junaid Baghdaadee when he said ‘Yaa Allaah’ (Oh Allaah). Ahmad Radha Khaan replies, “It was the river of Hadeeqah where Sayyidee Junaid Baghdadee was travelling and he started to walk on the water as he did on the land. Another man who was behind him who also needed to get across the river but there was no boat at the time. He saw Junaid walking across the water so he asked, “How may I cross” so Junaid said, “Say Yaa Junaid Yaa Junaid (Oh Junaid Oh Junaid). So the man did as he was told and he started to walk on the water as he did on land. When he reached the middle, The accursed Shaytaan put whisperings in his heart that Junaid is saying Yaa Allaah and he said to me to say Yaa Junaid. So I also started saying Yaa Allaah, and immediately he fell into the water??? he said, “Oh Junaid im going (to die).” So Junaid said, “Say Yaa Junaid Yaa Junaid.” I started to say it again and eventually i crossed the river.” when they were both across the man behind said to Junaid, “Why is it that when you say ‘Yaa Allaah’ you walk and do not drown and when I say ‘Yaa Allaah’ I drown.” Junaid said, “Oh childish one, you have not even reached Junaid yet and you want to reach Allaah.” (Malfoozaat (1/131). This is the belief of the Bareilwi soofees that The accursed Shaytaan put whisperings in his heart to say Yaa Allaah and you have clearly read that the soofees call the people to their worship as did Junaid here. (3) Ahmad Radha Khaan writes, “There were Two walee’s and they lived either side of a wide river, one day one of them made rice pudding and told his servant to take it to his friend. The servant replied “Master, how can I, there is a river in the way, how will I get across, I have no sailing equipment” the man replied “go to the river and say to it “I have come from a man who has not slept with his wife”. The servant was amazed as the walee had children nonetheless he thought it was important to follow what the walee had said. He did as he was instructed and immediately a path formed between the river, he walked across and gave it to the other walee who ate the rice pudding and said “Give my salaam to your Master” the servant replied “I can only do that when I get across the river” The walee replied say to the river “I have come from the one who has not eaten for 30 years” the servant was amazed as the walee (Supposed Pious man) had just eaten in front of him, he got to the river and did as he was told and another path was formed between the river gave him way and he walked across.” (Malfoozaat (1/131-132). (4) Ahmad Radha Khaan writes, “Our peer (holy men) can be present in every place in 10,000 places in 10,000 cities at one time” and he gives an example, “it was possible for Sayyidee Fathe Muhammad Quddus to be present in 10 different gatherings at once.” Then Ahmad Radha gives an evidence for this which was, “Look at Krishan Kehnayyah, he was a disbeliever and he would also be present in a number of places at once.” (Malfoozaat (1/141-142). Ao’odhoobillah, look at this in order to substantiate his aqeedah of shirk he gives the example of the hindu mushrik kaafir god. Furthermore we thought the soofees bareilwis held the beliefs that Allaah was incarnate (hulool) and present everywhere (Wahdatul-Wajood-Unity of existence) we did not know they held the same corruptive and false belief for their holy men. (5) Ahmad Radha Khaan says, “The earth and heavens cannot remain in existence if it were not for the presence of a Ghauth.” (Malfoozaat (1/142). A gauth is a person who (according to the soofee bareilwis) has been given special rights and authority by Allaah to look after the affairs of the creation. This is clear Shirk in the Lordship of Allaah by the Soofee Bareilwis as even the Mushrikeen of Makkah did not hold this belief. Furthermore we ask the bareilwis soofees a question, that if this is the case then we would like to know the name of the gauth of this time and the names of the previous ones who kept the earth in existence. In Indian peninsula and else where, it is quite common to invoke a dead person for example like yaa Khwaja, yaa Ali, etc etc, for situations when they need help. So here is a list of queries that such a person should be asked: 1. Can the person (for e.g., Khwaja Ajmeri), dead or alive, hear from a long distance? For eg. people can invoke Khwaja Ajmeri from Pakistan, India, Bangladesh, Thailand, Malaysia, USA, Canada, etc. from all over the world. Can he, i.e., Khwaja Ajmeri, can hear them from such a long distance. This is a very simple task for Allah (Subhanahu wataala) but is it possible for Khwaja Ajmeri also? 2. Can the person (for e.g., Khwaja Ajmeri), dead or alive, hear simultaneously from many people at the same time (Multitasking)? For eg. many people may invoke Khwaja Ajmeri from all over the world at the same time. Can he, i.e., Khwaja Ajmeri, can hear them at the same time or a queue is required. This is a very simple task for Allah (Subhanahu wataala) but is it possible for Khwaja Ajmeri also? 3. Can the person (for e.g., Khwaja Ajmeri), dead or alive, understand all the different languages? Because there are many different languages and dialects throughout the world. A Tamil will invoke or call upon in tamil language. A Srilankan will invoke or call upon in sinhalese language. A Britisher will invoke or call upon in english language. A French will invoke or call upon in french language. A Chinese will invoke or call upon in chinese language. An Indonesian will invoke or call upon in indonesian language. An Arab will invoke or call upon in arabic language. A Japanese will invoke or call upon in japanese language. Sometimes it also happens that the person (for e.g., Khawaja Ajmeri) whom people are calling upon or invoking, died as an illiterate. So is it that, after his death, can he understands all the different languages and dialects? This is a very simple task for Allah (Subhanahu wataala) but is it possible for Khwaja Ajmeri also? 4. Can the person (for e.g., Khwaja Ajmeri), dead or alive, can hear a dumb person or can he hear a person who is invoking him or calling upon him in his heart? “And Allah is Knowing of that within the breasts.” 3.154 This is a very simple task for Allah (Subhanahu wataala) but is it possible for Khwaja Ajmeri also? 5. Whether the person (for e.g., Khwaja Ajmeri), dead or alive, needs to sleep or take a break? Or he (for e.g., Khwaja Ajmeri) is ever awake and doesn’t require a rest? As we know very well that Allah (Subhanahu wataala) never requires a sleep or rest as follows: “Allah! There is no god but Him: the Living, the Eternal. He neither slumbers nor sleeps.” – 2.255 If the person (for e.g., Khwaja Ajmeri), dead or alive, needs to sleep or take a break then we must have a time table so as to when we should call or invoke him so that he may not get disturbed or the call should not get unheard. For instance, the person may be calling or invoking YA KHWAJA al madad, but KHWAJA might be having a nap, so no help for the poor caller. This is a very simple task for Allah (Subhanahu wataala) but is it possible for Khwaja Ajmeri also? 6. Can the person (for e.g., Khwaja Ajmeri), dead or alive, solve all the problems of the people? If that is the case, then what is the use of Allah (nauzbillah)? Or else if the person (for e.g., Khawaja Ajmeri) has a limitations, then in such a case, we must have a list of things that the person (for e.g., Khawaja Ajmeri), can resolve and what he cannot. This is a very simple task for Allah (Subhanahu wataala) but is it possible for Khwaja Ajmeri also? 7. Can the person (for e.g., Khwaja Ajmeri), dead or alive, cause harm to the people or his duty is just to lend a safe hand for the people in trouble? Has anyone heard that KHWAJA AJMERI causes people to be in trouble? This is a very simple task for Allah (Subhanahu wataala) but is it possible for Khwaja Ajmeri also? 8. Who causes the people to be in trouble? Is it the person (for e.g., Khwaja Ajmeri), dead or alive, or Allah (Subhanahu Wataala)? If Allah (Subhanahu Wataala) causes the people to be in trouble and the person, dead or alive, he delivers people from their miseries then, naudhubillah, Allah (Subhanahu Wataala) would be considered as an oppressor whereas the person, dead or alive, would be considered as a helper. “And if Allah afflicts you with any harm, then none can remove it except Him; and if He wanted good for you, then none can turn away His grace, He brings it to whom He wishes of His servants. And He is the Forgiver, the Merciful.” – 10.107 9. If Allah (Subhanahu Wataala) is adamant on causing harm and the person, dead or alive, is adamant on relieving the caller, then who will win? Allah says: “Indeed your Lord is the Doer of what He wills” [Sûrah Hûd: 107] and “(He is the) Doer of what He wills.” [Sûrah al-Burûj: 16] 10. If someone dies, then to whom shall we call upon or invoke for salvation for that dead person? So if you can call upon Allah (Subhanahu Wataala) after the death of any person then why not call upon Him alone when you are alive for other benefits. This is a very simple task for Allah (Subhanahu wataala) but is it possible for Khwaja Ajmeri also? that the Religion is what came from Allaah, the Blessed and Most High. It is not something left to the intellect and opinions of men. Knowledge it is what comes from Allaah and His Messenger, so do not follow anything based upon your desires and so deviate away from the Religion and leave Islaam. There will be no excuse for you since Allaah’s Messenger explained the Sunnah to his Ummah and made it clear to his Companions and they are the Jamaa’ah, and they are the Main Body (as-Sawaad ul-A’dham), and the Main Body is the truth and its followers.[1] So he who contradicts the Companions of Allaah’s Messenger sallallahu alaihiwasallam in any of the affairs of the Religion, then he has fallen into disbelief.[2] “Stick to the main body (as-Sawaadul – a’dham), so a man said, “What is the ‘Main Body’? So Abu Umaamah said,’This Ayah(54) in Soorah an-Noor: “But if you turn away,he Muhammad is oniy responsible for the duty placed on him and you for that placed on you.” Ibn Mas’ood, radiallahu ‘anhu, said, “The Jamaa’ah is what conforms to the truth, even if you are alone.” ” Reported by Ibn’Asaakir in Taareekh Dimashq with a saheeh isnaad as pointed out by Shaikh al-Albaanee in al-Mishkaat (1/61). 2. Allaah, the Most High, did not only warn against opposing His Messenger sallallahu alaihiwasallam, but also warned against the following of any way other than that of the first Believers: the Companions, radiallaahu ‘anhum, amongst whom the Qur’aan was sent down and who learned directly from the Messenger sallallahu alaihiwasallam. Allaah, the Most High says: If anyone contends with the Messenger even after guidance has been plainly conveyed to him and follows a path other than that of the Believers (i.e. the Companions), We shall leave him in the path he has chosen and land him in Hell. What an evil refuge! (Surah an-Nisaa’ (4):115) So he who totally abondons their way and instead follows the way of the devils, like the extreme Raafidess, Baatinees and the extreme Soofees who worship others besides Allaah, then he has left the religion. Many of those who have clenched on to the “Poem of Scarf” by Busairi with their molar teeth, are those who claim to be the blind followers of Imam Aboo Hanifah (Rahimahullah), ascribing themselves to the Deobandi and Barelvi sects. I won’t be speaking about Barelviyyah because we know their clear cut deviation from the Path of Ahl us Sunnah. But I will be speaking about Deobandiyyah who opposes follower of Barelviyyah and accuse them of doing Shirk while they (Deobandis) themselves are promoting Shirk and Kufr. The founder of Jamaat ut Tabligh, Maulana Muhammed Ilyas, stated in his parting advice to Maulana Yusuf, his successor at the time of his death: “Ulema should read the Qasidah Burdah and the Shiyaamul Habeeb with respect and honor, otherwise without respect and longing, it will be of no use. From reading the Qasidah Burdah attachment with Rasoolullah (Sallallahu alaihi wasallam) is established.” [Refer to the forward of Qasidah Burdah published by Kanaqah e Zakariyya, Jamaad ul Oola 1415/ october 1995, Lenasia, South Africa.] I say, rather than an Individual establishing an attachment with Rasoolullah (sallallahu alaihi wasallam), he or she is indeed forging an attachment with shirk and promoting none other than the founder of Jamaat ut Tabligh. The hidden agenda of Jamaat ut Tabligh is evident to Ahlus Sunnah wal Jamaah, which is to revive sufism, seizing the Innocent people from following the Sunnah, steering them towards following them the teachings of the Great Sufi, Maulan Ilyas; its founder and the reviver of Sufism through his bigoted sect Jamaat ut Tabligh. In reality, Jamaat ut Tabligh is reviving and promoting the Dawahs of Sufis, even on their death beds. A sincere advice to those who allow music and its instruments -in the name of Islaam. 1. The first of these is from the best of all the past and present scholars, the Prophet (ȘallaAllaahu ‘alayhi wasallam). As narrated by Aboo Umaamah al-Baahilee (radhiyallaahu ‘anhu): “Do not indulge in selling the qaynaat [female servants specialized for singing to their masters], and do not buy them, and do not teach them to sing, and there is no good in trading in them, and their worth is haraam. And in the likes of this, was revealed this verse : ‘And of mankind is he who purchases lahhwal-hadeeth [idle talks] to mislead (men) from the Path of Allâh without knowledge.’ to the end of the verse.” I (Shaikh al-Albaanee) think that at this point you have seen clearly that this verse is an explicit proof against music. So let those who claim that there is no prohibition of it in the Qur’aan take heed. “Indeed, there will be in my Ummah such people who will make permissible for themselves fornication, silk, wine and musical instruments….” [Narrated by Imaam al-Bukhaari in his Saheeh, Aboo Daawood in his Sunan] Al-Haafidh Ibn Hajar al-‘Asqalaani said: ‘And in this hadeeth is a severe warning for the one who deceives by [and] makes permissible that which is impermissible by changing its name..’ [Fath-ul Baaree.] Imaam Al-Albaanee said : ‘In his statement : make permissible’ it is a clear proof that the four things mentioned are not halaal (permissible) in the legislation: and amongst them is : musical instruments.’ “Indeed a people from among my nation will consume wine; and will call it by other than its name [they will change the name of it], while singers and musical instruments are played over their heads: Allah will cause the earth to swallow them and change them into monkeys and swines.” [Narrated by Ibn Maajah, and Ibnul Qayyim said it is authentic in two different places in his book Ighaathatul-luhfaan : 1/347 & 361. And it is in Șaheeh at-Targheeb wa tarheeb : 2378.] “Two voices are cursed in this world and the hereafter; Music at the time of happiness and wailing at the time of calamity.” [Narrated by Al-Bazzaar in his Musnad: 1/377, Kashful astaar-795, and Adh-Dhiyaa al Maqdisee in al- Ahadeeth al-Mukhtaara: 6/188/2200&2201. Al-Bazzaar said : We don’t know it from Anas except from this chain.’ I say: ‘Its chain is good, rather it is authentic with what follows: And it has been followed by the narration of ‘Isa ibn Tamhan from Anas as narrated by Ibn Simaak. So the hadeeth is authentic, and all Perfect praise is for Allaah. And it is emphasized in its strength of Authenticity by the following hadeeth [hadeeth no.5] ] “Surely I do not prohibit crying ; but verily I have prohibited two asinine and evil voices: a voice at the time of happiness; play, leisure and music, and voices at the time of a calamity; slapping of the faces, and tearing of clothes and wailing.” [Sunan at-Tirmidhee and he said : It is a good hadeeth. Al-Haakim : 4/40, Al-Bayhaqee: 4/69] Imaam Ibn Taymiyyah (rahimahullaah) said : ‘This hadeeth is from the best of what is proof on the impermissibility of singing, as in the wording of the one narrated by Jaabir : ‘voice at the time of happiness: play, vain talk and the instruments of shaytaan.’ Thus he prohibited the sounds which are carried out at the times of enjoyment just as he prohibited the sounds made at the time of a calamity, and the sounds made at the time of joy are the sounds of music.’ “Allaah has prohibited on me – or prohibited- alcohol, and gambling, and the drum, and every intoxicant is haraam.” This has been narrated from Ibn ‘Abbaas Qays ibn Habtaar, and it has been narrated from him [Qays] in two routes: The first one: From ‘Alee ibn Badheema who said Qays ibn Habtaar narrated to me… [Aboo Daawood : 3696, al-Bayhaqee: 10/221, Musnad Imaam Ahmad : 1/274] The other one: From ‘Abdulkareem ibn al-Jazariyy from Qays ibn Habtaar with the wording: “Indeed Allaah has prohibited on you : alcohol, and gambling, and the drum.’ And then he said : ‘and every intoxicant is haraam.” [Al-Bayhaqee: 10/213-221, Musnad Imaam Ahmad: 1/289. And this chain is authentic. And also shaykh Ahmad Shaakir authenticated it in his notes on the Musnad of Imaam Ahmad in two different places: 4/158 & 218.] “In this Ummah there will be [people who will be] sunk into the earth, deformed, and upon whom stones will rain from the skies.” It was said: ‘And when will that be?’ He replied: “When singing girls and instruments of music will appear (become prevalent), and alcohol will be drunk.” [ Narrated by Tirmidhee in the book of Fitan: 2213 , Ibn Abi ad Dunya in Dhamm al-Malaahi.] 8. And it has come in one route as mursal, and in another route as connected – and this is more authentic of the two- from Abul-‘Abbaas al-Hamdaani from ‘Ammaara ibn Raashid, from al-Ghaazee ibn Rab’eea , raised to the Messenger of Allaah (Șallallaahu ‘alayhi wasallam) : “There will be a people who will be deformed -into monkeys and swines- while they are reclining on their couches. Because of their consuming of alcohol and their using of the lute [instruments] and singing girls.” 9. And it is strengthened more by the corroborating narrations regarding the fitan [trials to appear at the end of times] , and from these is the hadeeth : “A group among this Nation will spend a night in drinking and eating, and entertainment and play; and by the time morning reaches them they will be turned into swine and monkeys, and they will be ceased by a rain of stones, and splitting of the earth to swallow them. Thus the people will say : ‘Last night the clan of so-and-so was swallowed by the earth,’ and they will also say: ‘In the night the house of so-and-so individually was swallowed into the earth.’ And indeed stones from the skies will descend upon them -on a certain tribe and those around them- just as they descended on the people of Loot ; And a [violent]dry wind which destroyed the people of ‘Aad will be sent to a tribe and those around them : [All of this] because of their drinking of alcohol, and wearing of silk [by men], and entertaining female singers, and consuming of ribaa [usury], and cutting of the ties of kinship.” [Al-Haakim: 4/515, Al-Bayhaqee in Shu’b al-Eeman: 5/16, Ahmad: 5/329, Al-Asbahaanee in At-Targheeb: 1/498-499, Abu Nu’aym in al-Hilyah: 6/295. It was authenticated by Al-Haakim and Ad-Dhahabee agreed with him, although it has something to look into; check Șaheeha: 1604. ] [Imaam Al-Albaanee continues to say] : ‘Yes, and at this point [this narration] becomes authentic without any doubt –due to these corroborating evidences.’ Upto where he said: 10.‘And there is another narration like this from Anas (radhiyallaahu anhu) who said: ‘The Messenger of Allaah (Șallallaahu ‘alayhi wasallam) said: “When my nation make permissible six things, then for them is destruction : ‘When cursing each other [increases] becomes apparent between them, and drinking of intoxicants, and wearing of silk [by men], and employment of singers, and when the men resort to be sufficed by men, and the women by women [i.e. when they take on homosexuality.” [At-Tabaraanee in Mu’jam al-Waseet (1/59/1060 by my enumeration), and al-Bayhaqee in Shu’b: 5/377- 378 through two routes from him of which Bayhaqee used to strengthen [the authenticity] by them.] The poet Busairi is swearing and taking an oath by the moon, whereas the Messenger of Allah (sallallahu alaihi wa sallam) said: whoever swears by other than Allah has indeed disbelieved or committed the act of Shirk [associating partners with Allah]. This is an authentic hadith reported by Imam Ahmed in his Musnad. In chapter three, Busairi writes, If his miracles were proportionate (according) to his rank, in greatness, Then his name would have, when called out, brought decaying bones back to life. Refutation: The meaning of the aforementioned two lines of the poetry is the following: If the miracles of the Messenger of Allah (sallallahu alaihi wasallam) were ordained proportionately according to his rank in greatness, the dead would have become decayed would have arise and come back to life with the remembrance of the name of the Messenger of Allah (sallallahu alaihi wasallam). Of course, this does not happen. Therefore, [according to Busairi] Allah, the Most High did not grant the Messenger of Allah (Sallallahu alaihi wasallam) his right from the Miracles. It is as though Busairi is objecting to Allah, the Most High, because Allah, the Most High, did not grant and give the Messenger of Allah (Sallallahu alaihi wasallam) this right!! This is a Lie and fabrication upon Allah, the Most High, because Allah, the Most High, has indeed granted every single Prophet proportional miracles for him. For example, Allah had bestowed and granted upon Isa (alaihissalam) the miracle of healing the one who was blind, and the leper, and bringing the dead alive [by Allah’s permission], and He, the Most High, also granted and bestowed upon our leader Muhammed (sallallahu alaihi wasallam) by giving him the miracle of the Noble Quran, increasing the little food and water he had, and the splitting of moon etc. In conclusion, what is strange is that some people believe this poem has been called and named the “poem of the scarf” and “the poem of healing”, because the poet Busairi- as they claim – became sick, the he saw the Messenger of Allah (sallallahu alaihi wasallam), who gave Busairi a long outer garment open in front with wide sleeves [like a robe]. Busairi wore this garment and was relieved from his sickness. This is indeed a lie and fabrication from these people in order to elevate the significance and importance of the poem. How can the Messenger of Allah (sallallahu alaihi wasallam) be pleased with these types of words that contradict and opposes the Quran, the guidance of the Messenger of Allah (sallallahu alaihi wasallm) and in which there is explicit polytheism? It is known that a Man came to Messenger of Allah (Sallallahu alaihi wasallam) and said to him: whatever Allah wishes and you wish, so the Messenger of Allah (sallallahu alaihi wasallam) responded to him by saying: Have you taken me as a partner with Allah! Say whatever Allah wishes alone. Our Other Blogs Umar Ibn Al-Khattab said: "If a man comes out of his house carrying a burden of sins like the mountains of Tihamah, then when he hears some knowledge he fears Allah and repents, he will go back home with no sins on him. So do not forsake the gatherings of the scholars." [Miftah Dar as-Sa’adah, 1/122; Fara’id al-Kalam, p. 135.] Recent Posts from : Islam PDFs Hasan al-Basri said: Allah has said, “I did not create jinn and humans except to worship Me. I seek no provision from them, nor do I need them to feed Me.” (Quran 51:56-57) Thus He commanded them to worship Him, for which (purpose) He had created them, and Allah is not one to create them […] Following the publication of ‘Khalid ibn Waleed – Sword of Allah,’ there has been a huge revival in reader’s interest for books dealing with early Islamic History. It was decided that we complete the task of publishing the [out of print] books by A.I.Akram on the first hundred years of Islam. They are as follows; […] As a Muslim, we believe this life to be a test for the life hereafter. The primary guideline for this test’s preparation comes from Qur’an, the divine revelation and Hadiths of the Prophet Muhammad PBUH. This book; “Real Life Lessons from the Holy Quran” aims at helping fellow Muslims to understand Islamic way of living […] The book Silent Moments deals with the science of death, which is the research work of brother Abdul Malik Al-Qasim, a renowned and a pious scholar of the Quran and the Sunnah as well as the Arabic Language. Nowadays, these worthy books are hardly available and due to their being in large volumes, people have […] Critics of Islam often bring up issues that seem to be controversial without providing the proper context for the situation or how such a situation would have been viewed in light of Arab society at the time of the Prophet – peace be upon him. This leads to false information being spread and misleading impressions […] Tafsir al-Quran al-Azim, popularly Tafsir ibn Kathir is a classic Sunni Islam tafsir (commentary of the Quran) by Ibn Kathir. It is considered to be a summary of the earlier tafsir by al-Tabari, Tafsir al-Tabari. It is especially popular because it uses the hadith to explain each verse and chapter of the Quran. […] Allah has told us that on the Day of Resurrection nothing would help us except our truthfulness. He will make Kadhib (liar) in speech and· actions the flag by which the hypocrites will be distinguished. Everything that the Lord blames them with has originated within the lying of their speech and actions. So the […] Solutions to all the problems of the Muslim nation are present in the life of Allah’s Messenger . His life is certainly an example for us to follow and a model for us to refer to at all times. No matter what problem arises in our lives, if we look to the Prophet’s Seerah […] During his stay in Canada, he came across the Western Intelligentsia and was shocked to find its misgivings and misunderstanding about Islam, Quran and The Holy Prophet (S.A.W.). He found most of the so called scholars – orientalists deliberately misrepresenting Islam and its Teachings. Hence, to dispel their misgivings, and wrong notions about Islam and […] Currently, there are many people, particularly in the developed societies, thirsty for the guidance of Allah. There are millions of people, who are unhappy with their modern and unfulfilling material life. Modern civilization failed to give them the spiritual satisfaction they need. These people are in need for sincere Muslims who are capable of bringing […] Recent Posts from: The People Of Book Few points of contrast between the teachings of Christianity and Islam Christianity Islam 1 The conception of the Triune God. Pure Monotheism 2 Jesus was ‘the only begotten son of God’. Jesus was nothing else than human; he was a divinely inspired Teacher and a great and holy Prophet. 3 Eve was the first to […] According to Genesis 6:6, the Bible says: “The LORD regretted that he had made human beings on the earth, and his heart was deeply troubled.” The argument using this verse is quite simple. If God is all knowing, then God cannot make mistakes. Only those who make mistakes have regret, therefore the Christian God […] Luke 1:1-4 1. For as much as many have taken in hand to set forth in order a declaration of those things which are most surely believed among us, 2. Even as they delivered them unto us, which from the beginning were eyewitnesses, and ministers of the word; 3. It seemed good to me also, having had […] Below is the verses from Bible [which is corrupted] showing how Prophet David [Dawud] committed adultery with a married women. Not only that, he later on conspired to kill her husband just to marry her. Allah’s refuge is sought from such evil attributed towards a Prophet of God. Prophet of Islam, Dawud [David], peace […] Does the Bible quote Jesus as claiming equality with God? Bible texts are produced to show that Jesus used the terms “son of man”, “son of God”, “Messiah”, and “saviour”. But each of these terms is applied to other individuals in the Bible. Ezekiel was addressed as “son of man” (Ezekiel chapter 3). Jesus himself speaks of the peacemakers […] Let us look at Luke 24:44-48 from the NIV Bible: Luke 24: 44- He said to them, “This is what I told you while I was still with you: Everything must be fulfilled that is written about me in the Law of Moses, the Prophets and the Psalms.” 45- Then he opened their minds […] These were not written by Prophet Moses [peace be upon him] rather were written by someone else who is unknown. For example: In the book of Deuteronomy, there is in verse 34: 5,6,7 “And Moses the servant of the Lord died there, in the land of Moab by the commandment of the Lord. He buried him in […]
Low
[ 0.52760736196319, 32.25, 28.875 ]
[LH receptors. A new family of G-protein receptors]. Monoclonal antibodies have been raised against porcine LH receptor and allowed to clone the corresponding messenger RNA from testicular cells. The structure of the LH receptor have been determined. It shows similarities but also differences to other G protein coupled receptors. In particular a large extracellular domain is specific for that family of receptors. Variants forms of the LH receptor generated by alternative splicing and lacking transmembrane domains have been isolated. Immunochemical and immunocytochemical studies have been performed. Three different forms of the LH receptor are physiologically expressed: a mature 85 kDa transmembrane species, a 68 kDa high mannose containing species corresponding to a precursor which accumulate inside the cells, and truncated 45-48 kDa molecular weight species corresponding to the variant messenger RNAs identified during the cloning of the receptor. A novel zonation of the ovary has been described by immunocytochemical studies. Cross hybridisation with the LH receptor clone allowed to isolate the related human TSH receptor from thyroïds. The human LH and FSH receptor genes have been localized to chromosome 2p21 and the TSH receptor gene to chromosome 14q31. The genes are very large and have introns only within their 5' part corresponding to the extracellular domain of the receptor.
High
[ 0.6913580246913581, 31.5, 14.0625 ]
Q: Create tables automatically by calling .sql file in Spring Batch? I followed many links like Spring Batch Framework - Auto create Batch Table and https://docs.spring.io/spring-boot/docs/2.0.0.M7/reference/htmlsingle/#howto-initialize-a-spring-batch-database, but that doesn't satisfy my requirement In Spring Boot 2.0, how we can call sql file (created manually and have all the schema details) so that Spring Batch can create it manually for us and if schema is already present then skip the execution ? <!-- Create meta-tables --> <jdbc:initialize-database data-source="dataSource"> <jdbc:script location="classpath:hsqldb/initial-query.sql" /> <jdbc:script location="org/springframework/batch/core/schema-drop-hsqldb.sql" /> <jdbc:script location="org/springframework/batch/core/schema-hsqldb.sql" /> </jdbc:initialize-database> I am looking to do 1. If Schema already present then don't create any tables 2. If schema is not present then create the tables Project structure DROP TABLE IF EXISTS report; CREATE TABLE report ( id INT NOT NULL PRIMARY KEY, date DATETIME, impression BIGINT, clicks INT, earning DECIMAL(12,4) )ENGINE=InnoDB DEFAULT CHARSET=latin1 AUTO_INCREMENT=1; application.properties # Data Source spring.datasource.url=jdbc:mysql://localhost:3306/spring_batch spring.datasource.driver-class-name=com.mysql.cj.jdbc.Driver spring.datasource.username=root spring.datasource.password=root spring.jpa.hibernate.ddl-auto=update # SPRING BATCH (BatchProperties) # Database schema initialization mode. spring.batch.initialize-schema=always # Execute all Spring Batch jobs in the context on startup. #spring.batch.job.enabled=false # Path to the SQL file to use to initialize the database schema. spring.batch.schema=classpath:schema-all.sql A: What I've observed that is - if I enabled below spring.batch.initialize-schema=always then all the tables creates fine +------------------------------+ | Tables_in_test | +------------------------------+ | batch_job_execution | | batch_job_execution_context | | batch_job_execution_params | | batch_job_execution_seq | | batch_job_instance | | batch_job_seq | | batch_step_execution | | batch_step_execution_context | | batch_step_execution_seq | If I put the below line then it only creates the report.xml spring.batch.schema=classpath:schema-all.sql Is there any way if we can create both ?
Mid
[ 0.592326139088729, 30.875, 21.25 ]
An artisanal law firm based in beautiful Port Townsend. Created by attorney and law professor, Denis Stearns, to provide real-world solutions to a wide range of challenges on behalf of businesses, non-profit organizations, and injured persons. Information & Resources This just might be what you were looking for! Searching online for information can be overwhelming, especially when you are not quite sure what you are looking for, or even what you need to know. This page is a kind of library of information and resources, on a wide variety of topics, including articles that Denis has written for publication. Scholarly Articles by Denis ~ Despite knowledge that commerce in food is a profit-driven enterprise, the public has consistently put great faith in the wholesomeness and safety of the food being purchased. To some extent, such faith is necessary, even if not always justified. In making the decision to put a bite of food in one’s own mouth, or the mouth of a friend or family member, a form of faith or trust must accompany the act of eating. For who would knowingly eat food suspected to be unsafe? But that is precisely what millions of people do every year, with a great many of them falling ill as a result. It is true that only a small minority of those made ill ever learn what particular food item was the cause and what particular manufacturer was responsible. It is, however, no secret that food, in general, is a significant cause of illness each year, and is not as safe as it could be if made with greater care under more effective and transparent regulatory oversight. And it is precisely because food both could be safer, and is so often found to be unsafe, that the dynamic of concealment and revelation so inevitably leads to either denial or despair on the part of the public, with “consumers often feel[ing] powerless with reference to avoiding food safety problems.” Approximately fifty-years ago, the American Law Institute published Section 402A of the Restatement (Second) of Torts, the rule of strict liability in tort for all products that are in a defective condition unreasonably dangerous to the user. This rule would lead to a “revolution” in tort law, giving rise to products liability as a distinct field of law. What is rarely acknowledged, however, is that the first version of Section 402A promulgated was a “special rule” that applied only to food. For several decades, prior to the promulgation of this “special rule,” courts had worked out rules and rationales to justify the creation of a remedy for those injured by unsafe food products, a remedy that was available despite contract rules that would have otherwise prevented any recovery, like the rule of privity and doctrine of caveat emptor. With the courts having recognized an implied warranty of quality for food, tort scholars began to argue in favor of strict liability for all defective products, with the right to recover springing from tort not contract. Using his influence as both a leading torts scholar, and as the Reporter for the Restatement (Second) of Torts, William Prosser was able to build the necessary consensus to extend the special rule for food to “intimate bodily products,” and then all products, leaving the special rule for food behind. This article will examine Prosser’s effort in light of his own scholarship and writing, especially his classic articles, The Assault on the Citadel and The Fall of the Citadel, articles that were modeled in style after turn-of-the-century boys-adventure stories, which had in jingoistic terms extolled the virtue of empire-building. Among other things, this article will depict Prosser’s efforts as an ultimately imperialistic enterprise, an effort to advance and expand the scope of that which tort law could control. But with tort law forgetting food, the rules of product liability were doomed to theoretical incoherence, and left vulnerable to a predictable anti-consumer backlash. This article concludes with a defense of the centrality of food to law, and the need for special rules for food, while also surveying the damage done to food safety by the law having forgotten about food for so long. Two decades ago this year, the Jack in the Box E. coli outbreak, in which five victims died, and hundreds more were seriously injured, dramatically changed the way the world looked at food and food safety. Although deemed “trivial” by tort scholars, who nonetheless used legal doctrines first developed in food cases to justify the extension of strict liability to all products, this article uses the Jack in the Box outbreak as a point of departure for exploring not only the relationship between food, being, and knowledge, but to posit that commerce in food, and the inevitability of profit-motivated food adulteration, are central to the presumed need for regulation of quality. What this presumption ignores, however, is that regulation creates the possibility of large-scale food systems in which the anonymity and invisibility necessary to food adulteration can occur. When food is manufactured and marketed on a smaller, more local scale, especially as a by-product of a community’s efforts to feed itself, there is no corresponding need for regulations because the expectations of a quality become largely self-enforcing. It is only when food-production becomes external to community, and the subject of faceless transactions, that the need for regulation appears to be imperative. This regulatory imperative is also facilitated by a modern conception of products as that which exist independent of any “real” maker, a conception that is undermined if food is used as a means of critique. Finally, looking at how the relations and interactions of people can be described as falling along a spectrum from the face-to-face to the faceless, and at the relation of people to products (especially food products), the article concludes with the bold claims that (1) law makes food less safe by facilitating commerce and thus anonymity in the market, and (2) the effectiveness law should be judged by how well it facilitates community and, as a result, makes law less apparently needed, not more. Most critiques of regulation are premised on the concepts of “free markets” and “market failures” as justifying, or not, the need for government interventions and control of the marketplace. Using the market for food as an example, this article questions not only the possibility of a buyer being a free actor when buying food, but also whether it is meaningful to speak in terms of a “free” market at all. One centerpiece of this questioning is the author’s coining of the term “(cr)edibility” to stand for the twinned ideas of credibility and edibility as defining the nature of all commercial food exchange. It is “(cr)edibility” that consumers seek in the food that they buy and eat, but it is just this “(cr)edibility” that the market can never deliver; this is the real “market failure” that must be understood when examining market for food. This article additionally interrogates the idea of food safety by opening the question of whether a rational economic actor in a free market for food can reasonably be expected to invest in improving the safety of the food products he makes and sells. It is precisely the lack of (cr)edibility in the market—i.e., the absence of reliable quality signals, the lack of traceability, the high degree of anonymity, and the destruction of trust—that creates the structural impediments and powerful disincentive for improving the quality and safety of food. Using a series of case-studies taken from the author’s practice as an attorney who represents the victims of foodborne illness, including outbreaks related to Salmonella in peanut butter and E. coli OI157:H7 in bagged spinach, the author concludes the article by offering some thoughts on proposed core values that, if somehow made an essential or defining part of the market for food, would go far in making food in the United States, if not (cr)edible, at least much safer to eat. Rendered Stateless: The Extraordinary Apprehension of Foreign Nationals and the Politics of Exclusion, 10 Wis. Int’l L. J. 78 (Fall 1991). (Winner of the Quackenbush Award for the Best International Law Journal Article of the year.) Food-Related Websites Containing Lots of News and Information ~ Food Safety News is a leading website reporting on food safety, food law and policy, and all things food related. Created and sponsored by Marler Clark, the Food Safety Attorneys.
Mid
[ 0.586129753914988, 32.75, 23.125 ]
--- abstract: 'The problem of testing monotonicity of a Boolean function $f:\{0,1\}^n \to \{0,1\}$ has received much attention recently. Denoting the proximity parameter by $\varepsilon$, the best tester is the non-adaptive $\widetilde{O}(\sqrt{n}/\eps^2)$ tester of Khot-Minzer-Safra (FOCS 2015). Let $\bI(f)$ denote the total influence of $f$. We give an adaptive tester whose running time is $\bI(f)\poly(\varepsilon^{-1}\log n)$.' author: - | Deeparnab Chakrabarty\ Dartmouth College\ [[email protected]]{} - | C. Seshadhri\ University of California, Santa Cruz\ [[email protected]]{} bibliography: - 'derivative-testing.bib' title: Adaptive Boolean Monotonicity Testing in Total Influence Time --- Introduction {#sec:intro} ============ Consider the boolean hypercube $\{0,1\}^n$, endowed with the coordinate-wise partial order denoted by $\prec$. A function $f:\{0,1\}^n \to \{0,1\}$ is monotone if $\forall x \prec y, f(x) \leq f(y)$. Let $d(f,g)$, the distance between two functions $f, g$, be $|\{x: f(x) \neq g(x)\}|/2^n$. The distance to monotonicity, $\eps_f$, is the minimum distance of $f$ to a monotone $g$. The problem of monotonicity testing is as follows. Given query access to $f$ and a proximity parameter $\eps > 0$, design a (randomized) procedure that accepts if $f$ is monotone ($\eps_f = 0$), and rejects if $f$ is $\eps$-far from monotone ($\eps_f > \eps$). Both the above guarantees hold with probability at least $2/3$. Such a procedure is called a monotonicity tester. A tester is non-adaptive if the queries made are independent of the values of $f$, and adaptive otherwise. A tester is one-sided if it accepts monotone functions with probability $1$, and two-sided otherwise. The problem of monotonicity testing over the hypercube has been the subject of much study [@Ras99; @GGLRS00; @DGLRRS99; @ChSe13-j; @ChenST14; @ChenDST15; @KMS15; @BeBl16; @Chen17]. The first result was the $O(n/\eps)$ tester by Goldreich et al. and Dodis et al. [@GGLRS00; @DGLRRS99] (refer to Raskhodnikova’s thesis [@Ras99]). The authors unearthed a connection to directed isoperimetric theorems to give a $o(n)$ tester [@ChSe13-j], whose analysis was further improved by Chen et al. [@ChenST14]. In a remarkable result, Khot-Minzer-Safra (henceforth KMS) designed an $\otilde(\sqrt{n}/\eps^2)$-query non-adaptive, one-sided tester [@KMS15]. The key ingredient is a directed analog of Talagrand’s isoperimetry theorem [@Tal93]. The significance of the $\sqrt{n}$ bound of KMS to $f$ is underscored by a nearly matching lower bound by Fischer et al. for non-adaptive, one-sided testers [@FLNRRS02]. A nearly matching two-sided, non-adaptive lower bound of $\Omega(n^{1/2-\delta})$ for any $\delta > 0$ was showed by Chen et al. [@ChenST14; @ChenDST15] using highly non-trivial techniques of generalized Central Limit Theorems. In a major advance, Belovs and Blais [@BeBl16] proved the first polynomial *adaptive* (two-sided) lower bound of $\widetilde{\Omega}(n^{1/4})$. This was further improved by Chen et al. [@Chen17] to $\widetilde{\Omega}(n^{1/3})$. Both of these are highly non-trivial results, showing that challenges in arguing about adaptive monotonicity testers. Interestingly, Belovs and Blais [@BeBl16] show $O(\log n) + 2^{O\left(1/\eps^3\right)}$ time adaptive monotonicity testers for Regular Linear Threshold Functions, which form the hard distribution of the nearly $\Omega(\sqrt{n})$ lower bound of Chen et al. [@ChenST14; @ChenDST15]. This leads to the main open problem in monotonicity testing of Boolean functions: Does adaptivity always help? Results ------- Given our (current) inability to resolve that question, we ask a refined, simpler question. Is there some natural condition of functions under which the $\sqrt{n}$ non-adaptive complexity of KMS can be beaten? Let $\bI(f)$ denote the total influence (also called the average sensitivity) of $f$. Letting $\cD$ be the uniform distribution over all pairs $(x,y)$ at Hamming distance $1$, $\bI(f) := n\cdot\Pr_{(x,y) \sim \cD}[f(x) \neq f(y)]$. Our main theorem follows. \[thm:intro\] Consider the class of functions with total influence at most $I$. There exists a one-sided, adaptive monotonicity tester for this class with running time $O(I\cdot \poly(\log n)/\eps^4)$. Thus, for low influence functions, the KMS $\sqrt{n}$ bound can be (adaptively) beaten. The non-adaptive lower bound of Fischer et al. [@FLNRRS02] only requires constant influence functions, so shows that adaptivity provably helps for such functions. For $\bI(f) \gg \sqrt{n}$, a claim of KMS (explained later) implies the existence of non-adaptive $O(n/\bI(f)))$ testers. The tradeoff between and this bound is basically $\sqrt{n}$, the maximum possible influence of a monotone function. We note that all adaptive lower bound constructions have functions with influence $\Theta(\sqrt{n})$ [@BeBl16; @Chen17]. Preliminaries {#sec:prelims} ============= We use $H_n$ to denote the standard (undirected) hypercube graph on $\{0,1\}^n$, where all pairs at Hamming distance $1$ are connected. An edge $(x,y)$ of $H_n$ is influential, if $f(x) \neq f(y)$. The number of influential edges is precisely $\bI(f)\cdot 2^{n-1}$. An influential edge $(x,y)$ is a violating edge if $x \prec y$, $f(x) = 1$, and $f(y) = 0$. Our tester will perform random walks of $H_n$. Note that $H_n$ is regular, so this is a symmetric Markov Chain. We crucially use the central result of KMS, in essence a directed analogue of Talagrand’s isoperimetric theorem. (Lemma 7.1 in  [@KMS15], paraphrased)\[lem:kms\] Given any Boolean function $f:\{0,1\}^n \to \{0,1\}$ which is ${\varepsilon}$-far from being monotone, there exists a subgraph $G = (A,B,E)$ of the hypercube and parameters $\sigma \in (0,1)$, $d\in \mathbb{Z}_{>0}$ such that - Each edge $(a,b)\in E$ with $a\in A$ and $b\in B$ is a violating edge. - $|B| = \sigma\cdot 2^n$. - The degree of each vertex in $B$ is exactly $d$ and the degree of each vertex in $A$ is at most $2d$. - $\sigma^2d = \Theta({\varepsilon}^2/\log^4 n)$. We also mention a simpler lemma from KMS which we use. (Theorem 9.1 in [@KMS15], paraphrased) \[lem:inf\] If $\bI(f) > 6\sqrt{n}$, then a constant fraction of influential edges are violating edges. When $\bI(f) > 6\sqrt{n}$, one can find a violation in time $O(n/\bI(f)) = O(\bI(f))$ by simply sampling random edges. Thus, we will focus on the case $\bI(f) \leq 6\sqrt{n}$. #### Idea. Our analysis is short and follows the analysis of the KMS tester. The tester of KMS can be throught of as performing random walks on the *directed* hypercube with orientation corresponding to the partial order. Their analysis lower bounds the probability of encountering a violation. Our insight is that one can perform an analogous analysis for walks on the *undirected* hypercube $H_n$. Suppose we perform an $\ell$-step random walk (on $H_n)$ from $x$ that ends at $y$. If $f(x) \neq f(y)$, then the walk clearly passed through an influential edge. The power of adaptivity is that we can find such an influential edge through binary search. This idea of using binary search is also present in the algorithm of Belovs and Blais [@BeBl16] to adaptively test regular linear threshold functions. We bound the probability that this influential edge is a violation. Our insight is that, by setting the length $\ell$ appropriately, this probability can be lower bounded by (essentially) $1/\bI(f)$. Tester ====== Let $f:\{0,1\}^n \to \{0,1\}$ be a Boolean function over the hypercube with total influence $\bI(f)$. **Input:** A Boolean function $f: \{0,1\}^n \to \{0,1\}$ and a parameter $\eps \in (0,1)$ 1. Choose $k\in_R \{0,1,2,\ldots,\ceil{\log n}\}$ uniformly at random. Set $\ell := 2^k$. 2. Choose $x\in \{0,1\}^n$ uniformly at random. 3. Perform an $\ell$-length random walk $p$ on $H_n$ starting from $x$ to reach $y\in \{0,1\}^n$. 4. If $f(x) \neq f(y)$: 1. Perform binary search on $p$ to find an influential edge $(u,v)\in p$. 2. REJECT if $(u,v)$ is a monotonicity violation. 5. If not REJECTED so far, then ACCEPT. follows directly from the following. \[thm:main\] Assume $\bI(f) \leq 6\sqrt{n}$. If $f$ is ${\varepsilon}$-far from being monotone, then Algorithm \[fig:alg\] rejects with probability $\Omega\left(\frac{{\varepsilon}^4}{\bI(f)\log^9 n}\right)$. \[def:pers\] Given a positive integer $\ell$, we call a vertex $x\in \{0,1\}^n$ [*$\ell$-sticky*]{} if an $\ell$-length random walk from $x$ on $H_n$ contains no influential edges with probability $\geq 1/2$. A vertex is called non-$\ell$-sticky otherwise. An edge is $\ell$-sticky if both endpoints are $\ell$-sticky. The following simple monotonicity property follows from the definition. \[obs:sticky\] If $x$ is $\ell$-sticky and $\ell' < \ell$, then $x$ is $\ell'$-sticky as well. \[lem:simple\] The fraction of non-$\ell$-sticky vertices of a hypercube is at most $\frac{2\ell\cdot \bI(f)}{n}$. Given $x\in \{0,1\}^n$ and a positive integer $\ell > 0$, define the random variable $Z_{x,\ell}$ that is the number of influential edges in a random walk of length $\ell$ starting from $x$. Therefore, $x$ is $\ell$-non-sticky iff $\Pr[Z_{x,\ell} > 0] > 1/2$. Let $N$ denote the set of $\ell$-non-sticky vertices. Since $Z_{x,\ell}$ is non-negative and integer valued we get $\Pr[Z_{x,\ell} > 0] \leq \Exp[Z_{x,\ell}]$. $$\label{eq:simple} |N|/2^n < \frac{2}{2^n} \sum_{x \in N} \Pr[Z_{x,\ell} > 0] < \frac{2}{2^n}\sum_{x\in \{0,1\}^n}\Pr[Z_{x,\ell}>0] ~~\leq~~ \frac{2}{2^n}\sum_{x\in \{0,1\}^n} \Exp[Z_{x,\ell}]$$ The RHS above is precisely twice the expected number of influential edges encountered in an $\ell$-length random walk starting from the uniform distribution on $H_n$. Let $\cP_\ell$ denote the uniform distribution on $\ell$-length paths in $H_n$. For $p \sim \cP_\ell$, $p_t$ denotes the $t$th edge in $p$, and let $\chi(e)$ be the indicator for edge $e$ being influential. The RHS of  is equal to $2\Exp_{p \sim \cP_\ell}[\sum_{t \leq \ell} \chi(p_t)] = 2\sum_{t \leq \ell} \Exp_{p \sim \cP_\ell} [\chi(p_t)]$. Since the uniform distribution is stationary for random walks on $H_n$, the distribution induced on $p_t$ is the uniform distribution on edges in $H_n$. Thus, $\Exp_{p \sim \cP_\ell} [\chi(p_t)] = \bI(f)/n$ and the RHS of  is $2\ell \cdot \bI(f)/n$. For any integer $\ell > 0$, let $F_\ell$ be the set of $\ell$-sticky violating edges. That is, $$F_\ell := \{(x,y) \in H_n : (x,y) \textrm{ is violating and}, ~ x,y ~\textrm{ are $\ell$-sticky} \}$$ \[lem:simple2\] If $\ell$ is the length of the random walk chosen in Step 1, then Algorithm \[fig:alg\] rejects with probability $\Omega\left(\frac{\ell}{n}\cdot \frac{|F_\ell|}{2^n}\right)$. Fix an edge $(u,v) \in F_\ell$. Let $p = (e_1,\ldots,e_\ell)$ be the edges of a random walk $p$. Each edge $e_t$ for $1\leq t\leq \ell$ is a uniform random edge of $H_n$. Therefore, for any fixed edge $(u,v)$, $\Pr[e_t = (u,v)] = \frac{2}{n2^n}$. Now, given $1\leq t\leq \ell$, define $\calE^t_{u,v}$ to be the event that the $t$th edge of $p$ is $(u,v)$ [*and*]{} no other edge of $p$ is influential. Since $(u,v)$ is itself influential, $\calE_{u,v}$ is the disjoint union $\vee_{t=1}^\ell \calE_{u,v}^t$. Furthermore, for two distinct edges $(u,v)$ and $(u',v')$ in $F_\ell$, the events $\calE_{u,v}$ and $\calE_{u',v'}$ are disjoint. Observe that $$\label{eq:dingo} \Pr[\textrm{Algorithm~\ref{fig:alg} rejects given $\ell$}] \geq \Pr[\bigvee_{(u,v)\in F_\ell} \calE_{u,v}] = \sum_{(u,v)\in F_\ell} \Pr[\calE_{u,v}]$$ The equality follows since the events are mutually exclusive. The inequality follows since if $\calE_{u,v}$ occurs then the end points of $p$ must have differing values and binary search on $p$ will return the violation $(u,v)$. Consider the event $\calE_{u,v}^t$. For this event to occur, $e_t$ must be $(u,v)$. Consider the conditional probability $\Pr[\calE_{u,v}^t~|~e_t = (u,v)]$. Let $\calF_u$ be the event that a $(t-1)$-length random walk from $u$ contains no influential edges, and let $\calF_v$ be the event that an [*independent*]{} $(\ell-t)$-length random walk from $v$ contains no influential edges. \[clm:sigh\] $\Pr[\calE_{u,v}^t~|~e_t = (u,v)] = \Pr[\calF_u \wedge \calF_v] = \Pr[\calF_u]\cdot\Pr[\calF_v]$ Conditioned on $e_t = (u,v)$, the distribution of the first $(t-1)$ steps of the random walk is the uniform distribution of $(t-1)$-length paths that end at $u$. This is the same distribution of the $(t-1)$-length random walk starting from $u$. The distribution of the last $(\ell-t)$ steps, conditioned on $e_t = (u,v)$, is the $(\ell-t)$-length random walk starting from $v$. Since $(u,v)$ is an $\ell$-sticky edge, by and , $\Pr[\calF_u] \geq 1/2$ and $\Pr[\calF_v] \geq 1/2$. The proof is completed by plugging the following bound into . $$\begin{aligned} \Pr[\calE_{u,v}] = \sum_{t=1}^\ell \Pr[\calE_{u,v}^t] = \sum_{t=1}^\ell \Pr[e_t = (u,v)] \cdot \Pr[\calE_{u,v}^t~|~ e_t = (u,v)] & = \frac{2}{n2^n} \sum_{t=1}^\ell \Pr[\calE_{u,v}^t~|~ e_t = (u,v)] \\ & \geq \frac{\ell}{4n2^n}\end{aligned}$$ We complete the proof of . Let $G = (A,B,E), \sigma, d$ be as in . First, we take care of a corner case. Suppose $\sigma < 100/\sqrt{n}$. Since $\sigma^2d = \Omega(\eps^2/\log^4 n)$, we get $\sigma d = \Omega(\eps^2 \sqrt{n}/\log^4n)$. Since the number of violating edges is $\geq |E| = \sigma d 2^n$ and since each violating edge is influential, we get that $\bI(f) \geq |E|/2^n = \Omega(\eps^2\sqrt{n}/\log^4n)$. With probability $1/\log n$, Algorithm \[fig:alg\] sets $\ell = 1$, in which case the tester basically checks whether a uniform random edge in $H_n$ is a violation. Conditioned on setting $\ell = 1$, the rejection probability is $\Omega(2|E|/n2^n) = \Omega(\eps^2/\sqrt{n}\log^4n) = \Omega(\eps_f^4/\bI(f)\log^8 n)$. Thus, in the case $\sigma < 100/\sqrt{n}$, we have proved . Henceforth, assume that $\sigma \geq 100/\sqrt{n}$. Since $\bI(f) \leq 6\sqrt{n}$, we deduce that $\frac{n\sigma}{16\cdot\bI(f)} > 1$. Thus, there exists a non-negative power of $2$ (call it $\ell^*$) such that $\frac{\sigma}{16} < \frac{\ell^*\cdot \bI(f)}{n} \leq \frac{\sigma}{8}$. Let $A'$ and $B'$ be the subset of $A$ and $B$ that are $\ell^*$-sticky. Let $E'\subseteq E$ be the edges with end points in $A'$ and $B'$. Note that any edge of $E' \subseteq F_{\ell^*}$. By Lemma \[lem:simple\], we get that the fraction of $\ell^*$-non-sticky nodes is at most $2\ell^*\cdot \bI(f)/n \leq \sigma/4$. Since the degree of any node in $G$ in Lemma \[lem:kms\] is $\leq 2d$, we get $$|F_{\ell^*}| \geq |E'| \geq |E| - (2d)\cdot \frac{\sigma\cdot 2^n}{4} = \frac{\sigma d 2^n}{2}.$$ The probability the algorithm chooses $\ell = \ell^*$ is $1/{\log n}$. Lemma \[lem:simple2\] gives us $$\begin{aligned} \Pr[\textrm{Algorithm rejects}] & \geq \frac{1}{\log n}\cdot \Pr[\textrm{Algorithm rejects}| \ell = \ell^*] \\ & \geq \frac{1}{\log n} \cdot \left(\frac{\ell^*}{n}\cdot \frac{|F_{\ell^*}|}{2^n}\right) ~~~~~~~ (\textrm{by Lemma~\ref{lem:simple2}}) \\ & \geq \frac{1}{\log n} \cdot \frac{\ell^*}{n} \cdot \frac{\sigma d}{2} \\ & \geq \frac{1}{\bI(f)} \cdot \left(\frac{\sigma^2 d}{32\log n}\right) ~~~~~~~ (\textrm{plugging $\ell^* \geq \sigma n/(16\cdot\bI(f))$})\\ & \geq \frac{1}{\bI(f)}\cdot \frac{{\varepsilon}^2}{\log^5 n} ~~~~~~~ (\textrm{by Lemma~\ref{lem:kms}})\end{aligned}$$
Mid
[ 0.57471264367816, 31.25, 23.125 ]
Saturday, March 02, 2013 Behind the Counter: chapter six : Frollicking with FiFi If I saw one person try to bring a dog into Wal-Mart, I must have seen a thousand in the six years I worked there. I also laid eyes on customers trying to walk in with hamsters, ferrets, a three-foot lizard, a pair of matched macaw, a smattering of felines, three parakeets and a grand total of five actual service dogs. Four were leading vision impaired customers, the fifth was trained to detect some sort of condition in a young girl. . Nothing really exotic (no livestock) ever came through though, unless you count the customers. That zoo never ended. She pops the dog out as soon as she's past a register, so of course someone asks her to please take the animal outside. She doesn't argue. She just keeps walking. Away. The visibly perturbed supervisor, a short, squat man named Nick who has always loved ordering the rest of us around, chases her and orders the dog out of the store. The girl cries fake tears, pleads, whines and then raises her voice a little. Nada. As she leaves, she gets about 10 feet away starts talking to the dog loud enough for us to hear. Her opening sentence? "I bet if I was Paris Hilton they wouldn't throw me out of here!" About ten feet from the door and half the store from Nick, she yells out: "F**** you, a######," flips off the door greeter, kicks the trash can and leaves. What a delightful morning. Afternoons could be even better. Too hot for the snowbirds to be outside, early bird specials don't start till four. What to do? Shop at the Wal-Mart! The persnickety type. The type that shop at Wal-Mart. The incredibly stupid type. The type that try to bring in a cute little Yorkie so sweet sweet FiFi there can lay in all the beds and see which one fits her best, yes princess can! The door greeter stopped Mr. Smith as he walked in, put FiFi in a buggy and tried to enter the store. Mr smith took FiFi to his car, zipped her into a breathable mesh and durable leather puppy traveling case and tried the opposite door. SuperCenters have multiple entrances; ours had five but much larger stores existed. I'd have put more than even money on him getting the dog through, but he ran into a bit of bad luck when the dog yapped right by the greeter. He demanded a "manager." Somehow, I got sent over. The stance on dogs is clear: no. He finally got that. So, to punish me for ruining such a lovely Thursday afternoon of shopping for Mr smith and FiFi, he decided to get even. Mr. Smith: "I want a dog bed." Me: "ok sir. But you cannot take the animal into the store with you." Mr. Smith: "I can't leave her in the car!" Me: "can you take her home and come back?" Mr. Smith: "that's six miles each way in traffic! That's about 20 minutes and we are already right here. Wait. Can you watch her? Or how about that black girl right there? She just stands here by the door anyway. I'll be right back!" Me: "sir. We cannot be responsible for your animal. " Mr. Smith: "well I have to buy a bed. " Me: "I don't know what to tell you sir. Maybe go to a pet store?" Emboldened by the advance of his dog bed agenda, mr smith assumed a commanding tone. Mr. Smith: "Now you take a good look." Me: "oooooooo-Kay???" Mr. Smith: "you get a REAL good look" I'm clueless. Like a ballet student dumped on the ten-yard line at Homecoming with an ox of a lineman bearing down on one side and crushing self doubt on the other. I have no idea what this man is telling me to "Get a look" at. I say so. Mr. Smith: "I want you to pick out a bed that is exactly right for FiFi." This comes out at something between a shriek and a yell. Me: "ok sir. I got it. She's a small dog. I'll bring those out first." Five trips later, he's looked at every small and medium pet bed we have, even ordering me to bring out the medium and large cat beds "just in case." He wants to know if we have blankets. I refuse. He asks for different colors of two beds, which I fetch. And then a slight fault in the stitching means I'm sent back to Pets, which is left past 24 registers, 5 aisles of Pharmacy, the Pharmacy window, 8 aisles of HBA (health & beauty, ie personal care) and then! Pets yet again. I got exercise that day. I had a smile pasted on, although I was steady projecting "DIE BASTARD DIE" via the death ray in my mind. I finally produced something he was willing to buy. Of course he wanted to write a check. He returned that dog bed less than two hours later, saying the dog would never lay down in it and it "looked much more uncomfortable in better light." I said nothing about all the dog hair in the bed, on the bed and on the sides. The telltale dusting of FiFi's white hair stood out like Mormons in a brewery. Return. Defective. Next. The dog had no issue with the bed. But after we wouldn't let him in with his precious FiFi, damned if he was going to give us money. Running me like a raw recruit was just a bonus. 1 comment: Hi there! great stuff here, I'm glad that I drop by your page and found this very interesting. Thanks for posting. Hoping to read something like this in the future! If your looking for a job like Customer Service Representative is desired for a position on the North Shore. Candidate should have excellent verbal and written communication skills, high attention to detail, and a minimum of 3 years experience in a customer service position. Applicants should have the ability to work with spreadsheets, data tables from computer generated reports, and comfort working with IT systems.
Low
[ 0.5296803652968031, 29, 25.75 ]
Thinking and caring about cognitive inconsistency: when and for whom does attitudinal ambivalence feel uncomfortable? The relation between conflicting evaluations of attitude objects (potential ambivalence) and associated unpleasant feelings (felt ambivalence) was investigated. Participants indicated their potential and felt ambivalence about capital punishment (Studies 1 and 2) and abortion (Studies 1-3). The simultaneous accessibility (J. N. Bassili, 1996) of participants' potential ambivalence (i.e., how quickly and equally quickly conflicting evaluations came to mind) was measured using response latency (Studies 1-3) and manipulated by repeated expression (Study 3). The relation between potential ambivalence and felt ambivalence was strongest when potential ambivalence was high in simultaneous accessibility (Studies 1-3). This pattern was most pronounced for participants who were high in preference for consistency (Study 3; R. B. Cialdini, M. R. Trost, & T. J. Newsom, 1995). Similarities of ambivalence and cognitive dissonance constructs are discussed.
Mid
[ 0.648578811369509, 31.375, 17 ]
Question: When did industry specific ETFs become a hot product??? When did industry specific ETFs become a hot product??? I’m so confused. Emily Patterson-Kane: I don’t think it’s new, Fidelity and Motley Fool were talking about them may years ago. Christopher Hong: Sure. It’s just that half of talk about investing on FB groups is about which ETFs will beat the market… Emily Patterson-Kane: Must be the groups you are on, I haven;t seen it mentioned anywhere but here. Christopher Hong: Yeah the last one was pretty much geared towards personal finance and beginner investors Christopher Hong: The last one I was on Emily Patterson-Kane: ETFs are great for beginners. It’s where I started. Christopher Hong: But industry specific ETFs pretty much defeat the purpose of an ETF… aren’t they meant to reduce risk for an average investor? Emily Patterson-Kane: Christopher Hong The next step from all market is sector. Where you choose a sector that is doing well but don;t need to know how to pick a particular stock. Christopher Hong: Okay. I disagree. I think there is more risk in those ETFs Christopher Hong: Even if you think you can beat the market in it Emily Patterson-Kane: Christopher Hong Less risk than in single stocks. It’s an intermediate option. Emily Patterson-Kane: Christopher Hong You beat the market because some sectors do better than others seasonally and for other reasons. Christopher Hong: I think people are just lucky when they choose an ETF that beats the market. Long term definitely not a sustainable option to me. Christopher Hong: I don’t want to go into the fact that more diversification does not = less risk Emily Patterson-Kane: Christopher Hong Most of mine are market beating multi-year. Others I bought because they would beat the market that year (foreign and emerging markets for the last year for example), but beating the market is not always the goal. One reason I use them is to avoid investing in things I am philosophically opposed to. What you can do with stocks you can do with sector ETFs but with less volatility. Emily Patterson-Kane: Christopher Hong Except that in an overwhelming majority of cases it is. Christopher Hong: https://youtu.be/zrCo0m5gSfc Why Jack Bogle Doesn’t Like ETFs | Forbes youtube.com Christopher Hong: If I had to make a bet on aggregate ETF pickers will do significantly worse than the market in the long run Christopher Hong: My point is that I believe ETF pickers will probably do much worse in the long run than general market investors. Emily Patterson-Kane: If they lack the relevant skills and knowledge, sure, like any investing tool. Christopher Hong: … wouldn’t people who have the knowledge and relevant skills actually avoid ETF picking?
Mid
[ 0.586842105263157, 27.875, 19.625 ]
Urban CoyotesCoyotes are native to North America but originated in the southwest United States. Their adaptability, along with the regional decline (extirpation) of larger predators, has facilitated a dramatic range expansion over the last century. Coyotes are now found all across North America and have established themselves in every major city continent-wide. Appearance The coyote (Canis latrans) is a member of the canid, or dog—family. In Wisconsin, other members of the canid family include the gray (timber) wolf (Canis lupus), the red fox (Vulpes vulpes), and the gray fox (Urocyon cinereoargenteus). Domestic dogs (Canis spp.) are also members of the canid family. Coyotes often resemble a small German Shephard with their grayish coat, pointed ears, long and slender snout, and bushy, black-tipped tails. Adult coyotes weigh between 25-40 pounds, but their thick coats often make them appear much larger, especially during winter months. Habitat Coyotes are habitat generalists, meaning that they can inhabit a wide variety of land uses (e.g. agriculture, urban, undeveloped) and covers (e.g. woodland, grassland, shrubland). This adaptability has allowed coyotes to successfully move into and live in (colonize) urban areas where food and shelter are seemingly abundant. It is important to understand that coyotes were not forced to move into urban areas and it is not necessarily because urban areas have expanded into less developed areas; rather, they moved into and adapted to human-dominated ecosystems like they have adapted to many other North American ecosystems because of the availability of suitable habitat (e.g. food, water, shelter, and space). Research has shown that in urban areas, coyotes spend the majority of their time in green spaces such as parks, golf courses, and cemeteries, but will move outside of and between these green spaces during dispersal periods and when they are hunting (Gehrt et al. 2009). Diet Despite living in urban habitats, urban coyotes still maintain a predominantly natural food base to their diet. Urban coyotes feed heavily on rodents and other small mammals, with deer (primarily fawns) and geese serving as some of their secondary food sources. Research has shown that urban coyotes are the number one predator of urban geese. Overabundant goose and deer populations can negatively impact the ecosystem in urban areas. By being the top predator in urban areas, coyotes are a keystone species in helping to maintain healthy functioning urban ecosystems. Urban coyotes are also known to consume fruits, berries, seeds, and corn. It is very important to not feed urban wildlife (raccoons, squirrels, deer, ducks, geese, fox, coyotes, etc.). The urban ecosystems in Milwaukee County provide plenty of natural food sources to urban wildlife. Behavior Coyotes are naturally secretive and skittish creatures. In rural areas coyotes are active mostly during the daytime and during dawn and dusk. Contrastingly, research has shown that urban coyotes have adapted to focus most of their activity to night when the likelihood of encountering humans is much lower. While primarily nocturnal, urban coyotes may still be seen during the day when they have either been flushed out of an area or when they need to continue hunting to feed pups. EcologyJanuary – May: Adult coyotes typically mate in February prior to searching for dens in April. It is during the breeding, denning, and pup rearing season that coyotes can become aggressive towards other canines within their perceived territories and/or near dens or pups. Coyotes will only use dens during an approximately eight week period during spring when pups are first born. Dens are usually inconspicuous and typically placed in areas secluded from human activity. However, in urban areas some coyotes may attempt to den underneath decks or patios. June – August: After the pups are approximately eight weeks old coyotes will begin to leave the den sites and travel their territory searching for food. During this time the adult coyotes are still extremely protective of their young. September – December: Coyote pups grow into young adults rapidly, and by the fall of their first or second year of life they will begin to disperse from their natal territory in an attempt to establish a territory of their own and/or find a mate. With fall comes a natural peak in coyote activity. Disease Coyotes may be host to parasites such as mites, ticks, and fleas. Additionally, coyotes may carry diseases such as canine parvo virus, canine distemper, and Lyme. The coyote-strain of rabies is restricted to southern Texas but coyotes can be infected with rabies from other species. If you are a pet owner, keep your pet's vaccinations up to date to avoid complication from contact with an infected wild animal or its secretions. Preventing Habituation Coyotes are intelligent, highly adaptable animals that have co-existed with humans for many years. Naturally, coyotes are very skittish and weary creatures that will avoid human contact by either running away when encountered and/or restricting their activities to nocturnal hours. In some circumstances however, often in urban and suburban environments, coyotes may lose their innate fear of humans, also known as "habituation". Habituation may result from food attractants in backyards or neighborhoods (such as pet food, unsecured garbage, fallen fruit, etc.) and/or repeated exposure to humans without negative reinforcement. A coyote may appear to be habituated or exhibiting bold behavior if it is observed doing things such as languishing in parks during the daytime in close proximity to humans, following humans and their pets, or not leaving the area upon encountering people. These bold behaviors associated with habituation are what can ultimately lead to human-coyote conflicts in urban areas. In order to proactively manage coyote behavior for a safe, sustainable, and long-term coexistence with our wild urban neighbors it is of the upmost importance that we all understand how human behavior/actions can reinforce and reshape coyote behavior. To deter repeated coyote visits in your yard use the yard audit form to assist in identifying potential attractants. Be sure to remove any food sources like bird feeders for 2-3 weeks and begin hazing the coyote(s) to make visits to your yard a very unpleasant experience for them. Hazing Hazing is a form of behavior modification that involves using scare tactics to deter a wild animal from frequenting an area. There are several techniques that can be used to haze coyotes, but in order to be successful in re-instilling their natural fear of humans the hazing must be consistent (until the nuisance behavior stops) and on a community-level. Hazing should not be done when an active den or pups are present because adult coyotes will defend their young. Hazing also should not be done on an animal that is visibly sick or injured (acting restless or agitated, making choking motions, drooling excessively). For more information and a demonstration on hazing, watch this videodeveloped by Public Health and Dane County in collaboration with the UW Madison Urban Canid Project. Reporting Coyote Observations Residents of Milwaukee County are encouraged to join the Milwaukee County Coyote Watch page on iNaturalist and add their coyote observations. This information assists researchers and wildlife managers in understanding urban coyote behavior and activity patterns within urban areas such as Milwaukee County. Living with Urban Coyotes 101 – Things to Remember: Do NOT feed coyotes – in your yard or on parkland! Do respect coyotes as wild animals – they will lose their instinct to be fearful of humans if they begin to associate food with a human presence. For more information The Wisconsin Department of Natural Resources has a detailed coyote webpageor speak with your local county biologist by calling 1-888-936-7463. Urban coyote research is a relatively new branch of wildlife research, but several projects in the Midwest and around the country are leading the way to explore the ecology of urban coyotes and understand ways to live with them. View a research project summaryhere.
Mid
[ 0.616740088105726, 35, 21.75 ]
Kivia powder (kiwi fruit extract) shows gut health benefits An extract of kiwifruit containing Zyactinase called Kivia may enhance bowel movement frequency and improve other symptoms of occasional constipation, say new data from a randomized clinical trial. A daily 5.5 gram dose of Kivia powder by New Zealand’s Vital Food Processors Ltd. was associated with a reduction in abdominal pain and flatulence in subjects with occasional constipation, according to findings published in the Nutrition Journal​​.​ While the exact mechanism of action is still to be elucidated, researchers led by Dr Jay Udani at Medicus Research note that kiwifruit extract is rich in enzymes able to aid in digestion, as well as potential prebiotics which may enhance the growth of beneficial bacteria in the gut. “Improvements were noted in the number of bowel movements, with increased bowel movements in the group using the studied extract,” ​they wrote. “There were also improvements observed in bowel health and stool formation.​ “This suggests that Kivia powder improved bowel habits in this group of subjects.”​ Formulations​ Justus Homburg, from Vital Food Processors Ltd, told NutraIngredients-USA that the product was launched in New Zealand in 2007, where it has become a key market leader in the digestive health segment, and in Australia in 2012, where the product has enjoyed a successful market launch. Kivia currently is available in three formulations: a water-soluble powder that end-users mix with a small amount of water and drink; an easy-to-swallow capsule; and a chewable tablet, added Homburg. While the Kivia is not commercially available in the US, the company is evaluating alternative approaches to commercializing the product in the US and elsewhere in the world. “The powder to which the Medicus research project refers is actually a specific formulation for end-user applications. The powder is not an active ingredient to be used in different applications or in different products,”​ he explained. Study details​ Dr Udani and his co-workers recruited 87 people with occasional constipation to participate in their randomized, double-blind, placebo-controlled, parallel-group trial. Participants were randomly assigned to receive either the Kivia product or placebo daily for four weeks. Results showed that the Kivia group experienced significant increases in spontaneous bowel movements at every week, compared to data from the start of the study. Significant differences were also observed between the kiwifruit extract group and placebo at weeks 3 and 4. In addition, significant increases were recorded between the active and placebo groups for complete spontaneous bowel movements. Dr Udani and his co-workers found that abdominal discomfort or pain was significantly reduced in the kiwifruit group, as was flatulence. Finally, bowel movements in the Kivia group were found to be significantly smoother and softer by the second week of the trial. “Treatment with Kivia powder, an extract of kiwifruit containing Zyactinase, for four weeks was well tolerated and more effective than placebo in gently enhancing bowel movement frequency and reducing abdominal pain and flatulence in subjects with occasional constipation,” ​they concluded. Expanding the clinical trial foundation​ Homburg confirmed that one study is currently underway and there is another set to start recruiting patients before the end of this year. “Clinical development has been and will continue to be a very important element to our product development and commercialization efforts,”​ said Homburg. “Underpinning Kivia’s development are, in addition to the study Dr Udani executed on Vital Foods’ behalf, several open-label studies and two randomized, placebo-controlled, double-blinded studies. Both the study currently underway and the one we expect to start later this year are randomized, placebo-controlled, double-blinded trials.​ “While we can always do better, we are pleased with our developing understanding of how the product works and what it does as well as our expanding clinical trial foundation, one on which we continue to build through the assistance of organizations such as Medicus Research, to support the product. ​ “The focus of the current and future clinical trial efforts will be to expand on the product’s positioning and support the benefits provided by the product with clinical data.”​
Mid
[ 0.618811881188118, 31.25, 19.25 ]
My problem is that, my fan would not work or spin at all. I found this out when i was fiddling around Ubuntu and started up Mozilla. While i was surfing around, the laptop switched off by itself. Then, i touched the vent and it was uber hot. I booted into Windows and the fan works just fine as normal. Hi! I'm the owner of a brazilian rebranded Benq S57. We have the same problem around, but as far as I could check, it's a problem in the bios. I'm not sure BenQ has a new bios for that (in Brazil nobody tried the BenQ Bios, since the first guy ever to try it used the wrong program and lost his motherboard... ok, that was probably the program's fault, not the bios, but can you convince someone else to test in such a situation? ;) ). Anyway, I could solve my problems appending the option during boot time (after you edit your grub configuration, for some reason I'm not aware, you must first **turn off** your system and then start it again will probably go fine. A simple restart *does not* work, ok?): acpi.power_nocheck=1 This can be done by sudo gedit /etc/default/grub And then edit the line: GRUB_CMDLINE_LINUX_DEFAULT="quiet splash" into: GRUB_CMDLINE_LINUX_DEFAULT="quiet splash acpi.power_nocheck=1" After that, just update your grub: sudo update-grub2 (or is it just update-grub?) and turn off your system. The next power on, your cooler will be working fine, I guess. Sincerely, Ricardo
Mid
[ 0.5423728813559321, 36, 30.375 ]
Q: Ruby refinements subtleties There is a pretty good documentation of the current implementation of refinements in ruby here: http://ruby-doc.org//core-2.2.0/doc/syntax/refinements_rdoc.html, but there are some strange corner cases. First, include module is orthogonal to using module (one include the instance method of module while the other activates the refinement). But there is a trick to include a refinement module itself, see Better way to turn a ruby class into a module than using refinements?. def to_module(klass) Module.new do #note that we return the refinement module itself here return refine(klass) { yield if block_given? } end end class Base def foo "foo" end end class Receiver include to_module(Base) { def foo "refined " + super end } end Receiver.new.foo #=> "refined foo" Strangely this refinement module can't be used with using! m=to_module(Base) {} m.class #=> Module using m #=>TypeError: wrong argument type Class (expected Module) So using only work on the enclosing module of the refinement modules. Secondly I wanted to use the above yield trick to be able to pass a Proc to refine (even through it only accepts a block), without resorting to converting the Proc back to source as in https://www.new-bamboo.co.uk/blog/2014/02/05/refinements-under-the-knife/. But using yield as in the include example does not work: def ref_module1(klass) Module.new do refine(klass) { yield } end end class Receiver1 using ref_module1(Base) { def foo "refined " + super end } def bar Base.new.foo end end Receiver1.new.bar #=> NoMethodError: super: no superclass method `foo' We see that Receiver1 still use Bar#foo and not the refined method. Howewer we can use module_eval instead: def ref_module2(klass,&b) Module.new do refine(klass) { module_eval(&b) } end end class Receiver2 using ref_module2(Base) { def foo "refined " + super end } def bar Base.new.foo end end Receiver2.new.bar #=> "refined foo" I don't quite understand why module_eval works here and not the yield method. Inside the refinement block, the 'default_definee' is the refinement module, so module_eval which puts the 'default_definee' to self='the refinement module' should not affect it. And indeed in the 'include' example at the beginning, I get the same result when I use module_eval or a direct yield. Can anyone explain this behavior? A: Context (or binding) is the reason why module_eval works and yield doesn't in your last set of examples. It actually has nothing to do with refinements, as demonstrated below. Starting with module_eval: class Foo def run(&block) self.class.module_eval(&block) end end foo = Foo.new foo.run { def hello "hello" end } puts foo.hello # => "hello" puts hello => # '<main>': undefined method 'hello' for main:Object (NameError) In Foo#run we call module_eval on Foo. This switches the context (self) to be Foo. The result is much like we had simple defined hello inside of class Foo originally. Now let's take a look at yield: class Foo def run yield end end foo = Foo.new foo.run { def hello "hello" end } puts hello # => "hello" puts foo.hello # => '<main>': private method 'hello' called for ... yield simply invokes the block in its original context, which in this example would be <main>. When the block is invoked, the end result is exactly the same as if the method were defined at the top level normally: class Foo def run yield end end foo = Foo.new def hello "hello" end puts hello # => "hello" puts foo.hello # => '<main>': private method 'hello' called for ... You might notice that foo seems to have the hello method in the yield examples. This is a side effect of defining hello as a method at the top level. It turns out that <main> is just an instance of Object, and defining top level methods is really just defining private methods on Object which nearly everything else ends up inheriting. You can see this by opening up irb and running the following: self # => main self.class # => Object def some_method end "string".method(:some_method) # => #<Method: String(Object)#some_method> Now back to your examples. Here's what happens in the yield example: def ref_module1(klass) Module.new do refine(klass) { yield } end end class Receiver1 # like my yield example, this block is going to # end up being invoked in its original context using ref_module1(Base) { def foo "I'm defined on Receiver1" end } def bar # calling foo here will simply call the original # Base#foo method Base.new.foo end end # as expected, if we call Receiver1#bar # we get the original Base#foo method Receiver1.new.bar # => "foo" # since the block is executed in its original context # the method gets defined in Receiver1 -- its original context Receiver1.new.foo # => "I'm defined on Receiver1" As for module_eval, it works in your examples because it causes the block to be run in the context of the new module, rather than on the Receiver1 class.
Mid
[ 0.598885793871866, 26.875, 18 ]
The Patriots are supposed to be perfect at everything. In August, I went searching for flaws in the Patriots’ dynasty, and I had a hard time finding any. That’s why the 2017 season has been so weird. It’s not that the Pats’ record is bad—they’re 4-2, which might not be as good as many people expected in the preseason, but is still good enough for first place in the AFC East. It’s that their defense hasn’t just been bad; it’s been horrendous: McCown passed for 354 yds. NE the only team in NFL history to allow a player to throw for at least 300 in 6 straight games, per Elias. #Jets — Rich Cimini (@RichCimini) October 16, 2017 The Patriots allowed an opposing quarterback to pass for 300 yards against them in just four games (including playoffs) last season. They allowed an opponent to throw for 300 yards in just four games in the season before that, and five in the 2015 campaign. This year, they’re 6-for-6 in allowing 300-plus-yard passers. No team has ever been that bad in any six consecutive weeks, let alone the first six weeks of a given season. The Patriots have been worst in the NFL in total yardage allowed (2,644), yards per play allowed (6.6), first downs allowed (146), passing yardage allowed (1,949, nearly 200 worse than the 31st-ranked Colts team), and adjusted yards per attempt allowed (8.9). They are 30th of 32 in points allowed per game (26.5), and that’s with the help of a few timely turnovers. New England is among the worst teams in the league in sack percentage (24th), opposing completion percentage (27th), and opposing third-down conversion percentage (26th). The 42 points allowed against the Chiefs in Week 1 were the most the Pats have given up in a game this millennium. This comes a year after New England led the NFL in scoring defense (15.6 points per game) and ranked in the top 10 in most defensive categories. And the front office added to that defense by signing cornerback Stephon Gilmore, who turned in the best season of his career for the Bills in 2016, to a $65 million contract in March. In Gilmore, Malcolm Butler, and Devin McCourty, three of the four starters in the Patriots secondary are Pro Bowlers. So why is everything suddenly falling apart? I watched every completed pass that the Pats have allowed this season with the hope of pinpointing specific problems. It’s hard, because this defense is bad at everything. It’s bending and breaking; it’s allowing opponents to hit quick passes and get open deep; it’s miscommunicating and losing one-on-one battles in man coverage. To grasp just how ineffective the Patriots’ 2017 defense has been, check out the following six clips—one from each game in which they’ve given up more than 300 passing yards. 1. 75-yard Touchdown Pass to Tyreek Hill (Week 1 vs. Kansas City) The Patriots got torched by Alex Smith in Week 1, but perhaps that shouldn’t be surprising—Alex Smith has since transformed into the greatest player in football history. His 368-yard, four-touchdown outing in the Chiefs’ 42-27 win included two 75-plus-yard scores. One was a 78-yard pass to running back Kareem Hunt on a play during which Kansas City ran four verts with a jet sweep play-action. I won’t blame the Pats much for that one—nobody on the planet can stop four verts, and every team should run it on every play. But this third-quarter Hill touchdown was the result of a bad breakdown: Gilmore thinks he has safety help from McCourty. McCourty does not think that. This may seem like a freak accident and not a trend, but there have since been a whole bunch of plays that the Pats have allowed just like it. 2. 16-yard Completion to Tommylee Lewis (Week 2 at New Orleans) Drew Brees racked up 356 passing yards, including six completions of 20 yards or more, in the Saints’ 36-20 loss to New England. Brees, it turns out, is capable of throwing difficult passes accurately. But let’s focus on a pass that didn’t require him to be one of the best QBs in the sport’s history: New Orleans wide receivers Brandon Coleman and Lewis are stacked on top of each other, with Eric Rowe and Gilmore set to defend them. Coleman sprints downfield while Lewis breaks off his route just a yard beyond the line of scrimmage. Rowe and Gilmore both follow Coleman. A team doesn’t allow opposing quarterbacks to pass for 300 yards every week without consistently letting them move the ball with relative ease. Sometimes, the Pats’ decision to give up short yardage while covering downfield routes is strategic; here, it’s the result of a dumb mix-up that turns a nothing route into 16 yards and a first down. 3. 35-yard Completion to Ryan Griffin (Week 3 vs. Houston) I spent about an hour watching every pass that Deshaun Watson threw in this game as I tried to decide which one showed the Patriots doing a bad job. Honestly, the Pats did fine. They had no egregious breakdowns in a 36-33 victory—Watson just played his damn butt off. In theory, the Patriots should have continued to guard the tight end on the far side of the play above while Watson scrambled. Nobody does that, though, because nobody expects a quarterback to run around for seven seconds and then make a throw 35 yards across the field. I’ll get back to trashing the Pats soon, but for now I’d like to say that Watson is very good. 4. 10-yard Touchdown Pass to Devin Funchess (Week 4 vs. Carolina) There are more Patriots arguing about who should guard Funchess than actually guarding Funchess on this play: Funchess motions to the left side of the formation, ending up bunched with two other receivers. Rowe promptly follows Funchess, then seems to realize that his responsibility does not include following Funchess, and gesticulates wildly at the defenders on the left side of the formation. When the ball is snapped, Rowe briefly provides double coverage on Panthers tight end Ed Dickson’s out route. He soon realizes that nobody is tracking Funchess. Cam Newton has made few easier throws all season. 5. 42-yard Completion to DeSean Jackson (Week 5 at Tampa Bay) This wasn’t a truly bad performance by the Patriots: Jameis Winston had 109 passing yards entering the fourth quarter and then threw for 225 yards across his team’s final three drives. But the Patriots played the end of this game like it was a blowout despite Winston nearly leading the Buccaneers to victory. After missing two second-half field goals, the Bucs lost just 19-14, and they’d gotten to within 19 yards of New England’s end zone when the clock expired on their final drive. This pass to Jackson came on a third-and-2 with just under 10 minutes left to play. The Pats were an exceptional McCourty tackle away from giving up an easy 89-yard touchdown: I don’t really know what the defense is hoping to accomplish here. The scenario is third-and-2; Butler is covering Jackson like it’s third-and-22: When the ball is thrown, Butler isn’t even in the frame: In one sense, I understand Butler’s logic in playing so far off of Jackson. The Patriots have virtually all of their defenders in the box except for one high safety, and want to ensure that a speedster like Jackson won’t sneak behind them for a big play. But that mentality creates the big play. With eight guys near the line of scrimmage and Butler in space, nobody is within a parsec of Jackson. The Patriots build him a runway and he launches downfield. 6. 44-Yard Completion to Jermaine Kearse (Week 6 at New York) Most of the quarterbacks New England has faced early in the season have been among the league’s best: Smith is having a hell of a year; Brees is a future Hall of Famer; Winston is a former Rookie of the Year; and Newton was the 2015 MVP. But the Pats also gave up 354 passing yards to Josh McCown, the sixth-highest total of his 15-year career. On this throw from McCown to Jermaine Kearse, the announcers joked that it looked like Kearse was fielding a punt: This is basically the same mistake that the Patriots made in allowing the 16-yard gain against the Saints, but this time it occurs 25 yards downfield. Kearse and Robby Anderson run alongside each other for a stretch, then Anderson continues downfield while Kearse heads toward the sideline. In this zone defense, Butler’s responsibility is to defend Kearse as he heads to the boundary. Instead, he sticks with Anderson as if he’s in man coverage. 44-yarder to Kearse was an overload concept vs #Patriots’ cover-3. They run 2 WRs into Butler’s zone. Instead of passing off Anderson to the safety he stays with him, leaves Kearse wide open. Nice route by Kearse to delay his run to the outside. Fools Butler. pic.twitter.com/aGeb1p6fdp — Evan Lazar (@ezlazar) October 18, 2017 As with the clips from the Saints and Panthers games, this all starts with receivers lining up in a bunched set. If an offense puts a bunch of wide receivers in a formation next to each other, the Patriots are liable to lose track of somebody. The New England pass rush is also problematic here—the Jets have a bottom-tier offensive line, and McCown isn’t especially mobile. Still, the Jets are able to gain a chunk of yards with a slow-developing route. The Patriots have earned the benefit of the doubt at this point, and head coach Bill Belichick delivered a soliloquy on Monday about how a football team is a work in progress. (Belichick is known for giving terse answers to questions in press conferences, but he’ll talk all day when he is passionate about something.) But what Belichick said is true of every team in the NFL, and the Patriots are worse than just about anybody on defense right now. Luckily for New England, it has Tom Brady at quarterback. He’s very good, and can often help New England score enough points that the team wins even when the defense falters. But for as brilliant as Brady is, I doubt he can win a Super Bowl alongside a league-worst defense. And if the Pats can’t play a zone without forgetting to guard one of the opposing team’s wide receivers, they’re in danger of having the worst defense in the league.
Mid
[ 0.578833693304535, 33.5, 24.375 ]
{% set volumeUid = craft.app.projectConfig.get('users.photoVolumeUid') %} {% if volumeUid %} <div class="user-photo" data-user="{{ user.id }}"> <div id="current-photo"> <img sizes="100px" srcset="{{ user.getThumbUrl(100) }} 100w, {{ user.getThumbUrl(200) }} 200w" alt=""> </div> <div class="user-photo-controls"> <input type="file" name="photo" class="hidden" /> {% if user.photo %} <button type="button" class="btn upload-photo">{{ "Change photo"|t('app') }}</button> <button type="button" class="btn delete-photo">{{ "Delete photo"|t('app') }}</button><br><br> <button type="button" class="btn edit-photo" data-photoid="{{ user.photoId }}">{{ "Edit photo"|t('app') }}</button> {% else %} <button type="button" class="btn upload-photo">{{ "Upload a photo"|t('app') }}</button> {% endif %} </div> </div> {% else %} <p>{{ 'Please set a volume for storing the user photos in user settings page first.'|t('app') }}</p> {% endif %}
Mid
[ 0.567961165048543, 29.25, 22.25 ]
Genes and their associated enzymatic complexes govern the main pathways of autophagy. Macroautophagy is the pathway for removal of degraded or damaged proteins and organelles at a cellular level. Modulation of this highly specific process has been a general approach toward the treatment of diseases associated with cellular over-accumulation of some misfolded proteins. Whereas the other major protein clearance pathway, the ubiquitin proteasome pathway, is unable to degrade aggregated proteins (normal or misfolded), autophagy can engulf and clear protein aggregates as well as monomeric proteins. Misfolded proteins, as monomers or in aggregates, can cause neurodegeneration by using up critical components of the chaperone-protein folding processes and protein clearance pathways, leading to additional protein misfolding and the loss of function of a variety of essential proteins. Aggregates may also cause direct damage to organelles and interfere with an array of cellular functions such as transcription and axonal transport. Likewise, abberant autophagy is implicated in various cancers. Thus, compositions and methods which stimulate the autophagic clearance of misfolded proteins and/or protein aggregates is of considerable interest. An illustrative example of neurodegenerative disorders related to cellular over-accumulation of misfolded proteins is Huntington's disease. Huntington's disease is categorized as a trinucleotide repeat disorder and caused by expansion of a repeated section of the gene, HTT, that encodes the protein HUNTINGTIN. Normal HUNTINGTIN protein contains a region referred to as the “PolyQ region”, which has a repeated sequence of the DNA triplet base cytosine-adenine-guanine (CAG), which codes for the amino acid glutamine (Q). A mutant HUNTINGTIN gene, mHTT, generates a mutant HUNTINGTIN protein with a PolyQ region containing greater than 36 glutamine residues. This mutant protein is misfolded and is also cleaved to produce numerous fragments. Both the misfolded protein and the fragments are contemplated to be particularly toxic. Accordingly, areas of the brain possessing cells with the mutant gene and correspondingly high likelihood and/or presence of misfolded protein are found to show a correspondingly higher incidence of adverse effects. Another example of a misfolded-protein associated disorder is Parkinson's disease. In Parkinson's patients, over-expression of the protein, α-SYNUCLEIN, can result from duplication or triplication of the SNCA gene locus and occurs for unknown reasons in the vast majority of Parkinson's patients, who develop the disease without any identifiable mutation. In addition, A53T and A30P point mutations of the gene have been demonstrated to trigger the early onset of Parkinson's. Further, over-expression of the wild type protein in transgenic mice and flies has been shown to cause progressive neuronal defects. The accumulation of α-SYNUCLEIN in misfolded and aggregated forms, is strongly associated with neuronal dysfunction and death. Clearly, the homeostatic removal of misfolded proteins and/or protein aggregates is a prime therapeutic target for the treatment of Huntington's, Parkinson's, and other such related disorders. Examples of other disorders and diseases categorized as proteopathies include, but are not limited to: Alzheimer's disease, frontotemporal dementia, amyotrophic lateral sclerosis (ALS), spinocerebellar ataxia of types 1, 2, 3, 6, 7 and 17, spinobullar muscular atrophy; dentatorubral-palli-doluysian atrophy, peripheral neuropathy, and dementia. Treatment of these types of diseases can be affected by the administration of an active pharmaceutical ingredient, which is capable of inducing autophagic removal of the particular toxic misfolded proteins and/or protein aggregates. Some bacterial and viral infections are treatable by autophagic upregulation, as well. Pathogens can be engulfed by autophagosomes and further disposed of by lysosomes. Streptococcus (Group A) and Herpes virus (Type I) are important examples of pathogens, although not limiting, that are susceptible to this kind of capture. There remains a need for compounds that are effective stimulants of autophagic removal of misfolded proteins and/or protein aggregates and such compounds can be used in treating neurodegenerative disorders. Compounds that induce neuronal autophagy and can be used to treat and prevent neurodegenerative disorders characterized by misfolded proteins and/or protein aggregates are provided herein.
High
[ 0.690121786197564, 31.875, 14.3125 ]
Tune in Featured Guest Andrew Schaefer Andrew Schaefer entered the entertainment industry after a career as a Semi-pro Quarterback. Starting in community theatre he later moved toward the film market and has now successfully produced and starred in the new Indie film MOONSHINE KINGDOM. He can be seen in the upcoming NIKE commercial as well as the "Tech The Halls" Radio Shack commercial currently airing on television this Holiday season 2013.
Low
[ 0.486810551558753, 25.375, 26.75 ]
=begin @author: aaditkamat @date: 31/12/2018 =end def ind (m, n) m == n ? 0 : 1 end def dist(first, second) first_length = first.length second_length = second.length m = Array.new(first_length + 1) { Array.new(second_length + 1) } (first.length + 1).times do |i| m[i][0] = i; end (second_length + 1).times do |i| m[0][i] = i; end (1..first_length).each do |i| (1..second_length).each do |j| values = [m[i - 1][j] + 1, m[i][j - 1] + 1, m[i - 1][j - 1] + ind(first[i - 1], second[j - 1])]; values.sort! m[i][j] = values[0] end end m[first_length][second_length] end def main puts "Enter two strings: " first = gets.chomp! second = gets.chomp! puts "The Levenshtein distance between \"#{first}\" and \"#{second}\" is: #{dist(first, second)}" end main
Low
[ 0.519230769230769, 27, 25 ]
syntax = "proto3"; message Foo{ int64 bar = 1; } message Test{ oneof group{ string string = 1; int64 integer = 2; Foo foo = 3; } }
Mid
[ 0.54679802955665, 27.75, 23 ]
Q: Creating relationship Neo4J during import if value is 1 Hello all you helpful folks! I have been tasked with converting our RDBM into a Graph database for testing purposes. I am using Neo4J and have been successful on importing various tables into their appropriate nodes. However, I have run into a slight hiccup when it comes to the department node. Certain department are partnered with a particular department. Within the RDBMS model, this is simple a column named: Is_Partner because this database was originally set up with one partner in mind (Hence the whole: Moving to a Graph database thing). What I need to do is match all department with the Is_Partner value of 1 and assign a relationship to from the partner who has the value of 1 in Is_Partner and assign it to a specific partner (Edge: ABBR, Value: HR). I have written the script, but it tells me it's successful, but 0 edits are made... USING PERIODIC COMMIT LOAD CSV WITH HEADERS FROM "file:///Department.csv" AS row MATCH (partner:Department {DepartmentID: row.DepartmentID}) WHERE row.IS_PARTNER = "1" MERGE (partner)-[:IS_PARTNER_OF]->(Department{ABBR: 'HR'}); I'm pretty new to Graph Databases, but I know Relational Databases quite well. Any help would be appreciated. Thank you for your time, Jim Perry A: There are a few problems with your query. If you want to filter on CSV use WITH statement with a WHERE filter. Also you want to MERGE HR department node separately and then MERGE relationship separately. USING PERIODIC COMMIT LOAD CSV WITH HEADERS FROM "file:///Department.csv" AS row WITH row WHERE row.IS_PARTNER = "1" MATCH (partner:Department {DepartmentID: row.DepartmentID}) MERGE (dept:Department{ABBR: 'HR'})) MERGE (partner)-[:IS_PARTNER_OF]->(dept); If it still return no results/changes, check out if your MATCH statement return anything as this is usually the problem. USING PERIODIC COMMIT LOAD CSV WITH HEADERS FROM "file:///Department.csv" AS row WITH row WHERE row.IS_PARTNER = "1" MATCH (partner:Department {DepartmentID: row.DepartmentID}) RETURN partner
Mid
[ 0.6462395543175481, 29, 15.875 ]
Featured Products Welcome to A/K Collectibles Model Cars And More. We specialize in out-of-production model car kits. We also carry many of the "New Release" model car kits. Hundreds of die-cast models from 1:64 - 1:18. And a small selection of military & plane model kits. We add new merchandise daily. So if there's a model kit your looking for, please e-mail us and we'll see if we can help you find it. TO PLACE AN ORDER, PLEASE SEND US AN E-MAIL OR GIVE US A CALL. [email protected] 402-598-5308
Mid
[ 0.5943600867678951, 34.25, 23.375 ]
Q: Doesn't load content when initialize page ajax jquery When I initialize mi website I want to load content of a file txt. But this doesn't load. I made... $("ul li a#start").on('load', function() { $.ajax({ url : "pages/conoceGranada.txt", dataType: "text", success : function (data) { $("#content").html(data); } }); }); But that doesn't work Mi file git is in https://github.com/Mangulomx/web A: $( document ).ready(function() { $.ajax({ url : "pages/conoceGranada.txt", dataType: "text", success : function (data) { $("#content").html(data); } }); } here is the solution
Low
[ 0.46770025839793206, 22.625, 25.75 ]
--- abstract: 'There is a growing interest in the properties of ionic liquids (ILs) and IL-solvent mixtures at metallic interfaces, particularly due to their applications in energy storage. The main focus so far has been on electrical double layers with ILs far from phase transitions. However, the systems in the vicinity of their phase transformations are known to exhibit some remarkable features, such as wetting transitions and capillary condensation. Herein, we develop a mean-field model suitable for the IL-solvent mixtures close to demixing, and combine it with the Carnahan-Starling (CS) and lattice-gas expressions for the excluded volume interactions. This model is then solved analytically, using perturbation expansion, and numerically. We demonstrate that, besides the well-known camel and bell-shaped capacitances, there is a bird-shaped capacitance, having three peaks as a function of voltage, which emerge due to the proximity to demixing. In addition, we find that the camel-shaped capacitance, which is a signature of dilute electrolytes, can appear at high IL densities for ionophobic electrodes. We also discuss the differences and implications arising from the CS and lattice-gas expressions in the context of our model.' author: - Carolina Cruz - Svyatoslav Kondrat - Enrique Lomba - Alina Ciach bibliography: - 'ILsDemix.bib' title: 'Effect of proximity to ionic liquid-solvent demixing on electrical double layers' --- Introduction ============ Ionic liquids (ILs) and IL–solvent mixtures have become the focus of research in electrochemistry due to their unique properties, such as exceptional electrochemical and thermal stability, and low vapour pressure. This makes them attractive materials for many applications [@Welton1999; @Fedorov2014], for instance, for electrochemical reactions, as lubricants for micro and nanodevices [@C2CP23814D], as extraction liquids for the purification of metals, colloids and biomass, etc [@Fedorov2014]. The classical theory of electrolytes was developed in the early $20th$ century, with the achievements of Gouy, Chapman, Debye, Hückel and Langmuir channeled into the so-called Poisson-Boltzmann (PB) model [@Ben-Yaakov2011]. The PB model is a mean-field model which describes ions as isolated point-like charges in a solvent considered as a continuum dielectric [@Parsons1990]. Electrical double layers (EDLs) emerge when electrolytes are put in contact with charged surfaces. An EDL results from the formation of an ion ‘cloud’ of opposite sign to that of the surface charge, and its width is influenced by the competition between the thermal motion of the ions, which tends to homogenize their distribution, and the Coulomb interactions, which attract the counterions to the surface [@Parsons1990]. Within the linearized PB (Debye–Hückel approximation), the thickness of this layer is given by the Debye length $\lambda_D=(4\pi\rho_b\lambda_B)^{-1/2}$, where $\rho_b$ is the ion density and $\lambda_B$ the Bjerrum length. The application of the PB model to EDLs, known as the Gouy–Chapman model, predicts the well-known U-shaped dependence of the EDL capacitance on the applied potential. However, the classical description of ELDs is only valid for dilute electrolytes (concentrations below $0.01$M), but it is not suitable for ILs due to typically high concentrations of ions, at which the ion sizes start to play a role . Indeed, theories developed for EDLs have shown that excluded volume interactions are crucial to describe the structure of the EDL with ILs properly [@PhysRevLett.79.435; @DiCaprio2003; @antypov05a; @Oldham2008; @McEldrew2018; @Bohinc2001a; @Kornyshev2007a; @kilic:pre:07a; @Frydel2012; @Minton2016; @Girotto2018]. Steric interactions restrict the absorption of counterions at an electrode, and hence influence the charge density in the EDL. This leads to the emergence of the so-called camel and bell-shape capacitances, obtained at low and high IL concentrations, respectively [@Kornyshev2007a], instead of the classical Gouy-Chapman’s U-shape. Temperature also plays an important role in the structure and capacitance of EDLs. However, contradictory results have been reported in the literature and consensus is yet to be reached as to whether capacitance increases or decreases with temperature and under which conditions. According to the Gouy-Chapman theory, the capacitance decreases for increasing temperature, but the experiments showed also the opposite trends [@Lockett2008b; @Silva2008; @Druschler2012a; @Ivanistsev2017a]. For instance, @Silva2008 [@Silva2008] studied the \[BMIM\]\[PF6\] ionic liquid and three different electrodes and found that the differential capacitance increases with temperature at all potentials. @Lockett2008b [@Lockett2008b] found the same behaviour for imidazolium-based ionic liquids in contact with glassy carbon electrodes. More careful theoretical work suggested that both trends are possible [@holovko:01; @Reszko-Zygmunt2005; @chen_kornyshev:18], but there is no general agreement on the origin of this behaviour. For instance, @holovko:01 [@holovko:01] proposed that the increase of capacitance is related to the decreased inter-ionic interactions and weaker ion associations, while @chen_kornyshev:18 [@chen_kornyshev:18] argued that the temperature dependence of EDLs is chiefly determined by the strength and extent of the van der Waals interactions. Interestingly, it was shown that the transition between the camel and bell-like capacitances can be induced also by varying temperature [@Vatamanu2011a; @chen_kornyshev:18], with the bell shape emerging at high temperatures due to breaking of ‘ion pairs’ and consequently stronger screening [@chen_kornyshev:18]. The focus of the above-mentioned studies was on room–temperature ILs and IL–solvent mixtures far from phase transitions. However, it is well–known that, for neutral fluids, the fluid structure at a surface undergoes drastic changes (such as wetting or prewet-ting transitions, layering, etc), when the system approaches a phase transition [@Bonn2009]. In a recent work [@Cruz2019a], we have proposed a model suitable for IL–solvent mixtures close to demixing. Treating solvent as a continuum (appropriate for small solvent molecules, such as water or acetonitrile), but describing ILs as amenable to phase separate into the ion-rich and ion-dilute phases, we showed that the capacitance and stored energy become sensitive functions of temperature in the vicinity of demixing. We also demonstrated the emergence of a new, *bird*-shaped capacitance, having three peaks as a function of voltage. Herein, we present a more detailed investigation of this system, while we also extend our study to systems, in which solvent and ions are of comparable size. We first describe the details and the derivation of the model (Sec. \[theory\]), and discuss its phase behaviour in bulk (Sec. \[Bulk phase diagram\]). Then, we derive analytic expressions for the density, potential and charge profiles, as well as for the capacitance, by applying the perturbation expansion (Sec. \[Sec:Analytical\_solution\]). The results of numerical calculations are discussed in Sec. \[Section:Num\_Results\]. We summarize in Sec. \[Section:Conclusion\]. Model {#theory} ===== We consider a mixture of ionic liquid (IL) and neutral solvent, which can phase separate below its upper critical point [@Elshwishin2014]. Our interest is in the one-phase region just above demixing. We assume that the mixture is in contact with a planar metallic electrode, and the electrostatic potential, $U$, is kept constant with respect to the bulk. This system can be described by the following grand thermodynamic potential $$\label{om} \Omega[\rho_{\pm},u]/A = \omega_{el}+ \omega_{vdW}-Ts-\mu_i\int_0^{\infty}dz \rho_i(z),$$ where $\omega_{el}$, $\omega_{vdW}$ and $s$ are the electrostatic energy, the energy associated with van der Waals-like dispersion (non-Coulombic) interactions and the entropy (all per surface area), respectively; $T$ is temperature, $A$ is the surface area of the electrode, $\mu_i$ is the chemical potential, and $\rho_i(z)$ is the local density of different components, where $i= \left\lbrace +,-,s\right\rbrace$ denotes cations, anions and solvent, respectively. The electrostatic energy is given by $$\label{uel} \beta\;\omega_{el}[c(z), u(z)]=\int_0^{\infty} dz \Big[cu-\frac{1}{8\pi \lambda_B}\Big (\frac{\partial u}{\partial z}\Big)^2\Big],$$ where $\beta=1/(k_B T)$, $u$ is the electrostatic potential in $k_BT/e$ units with $k_B$ denoting the Boltzmann constant; $c=\rho_+-\rho_-$ is the charge density per elementary charge $e$ and $\lambda_B=\beta e^2/\epsilon$ is the Bjerrum length, where $\epsilon$ is the dielectric constant. It is well known that $\epsilon$ depends on temperature, particularly for polar solvents [@Gagliardi2007; @Riniker2012; @Orhan2014]. Nevertheless, we assume $\epsilon$ to be temperature-independent, and note that its temperature variation should not affect the results qualitatively, as pointed out in [@Cruz2019a]. In addition, it is known that polarizability of solvent and of ions may play an important role in the structure and properties of electrical double layers [@Gongadze2012; @Fedorov2008b; @Fedorov2010; @Girotto2017; @Pousaneh2012a; @Pousaneh2014]. In particular, @Gongadze2012 [@Gongadze2012] demonstrated a potentially strong variation of the dielectric constant close to a planar charged surface. These authors derived a formula for a position-dependent $\epsilon$, by taking into account excluded volume effects and solvent polarization. In general, such variation of $\epsilon$ shall also depend on the affinity of ions/solvent towards electrode (electrode’s ionophilicity, see below), as well as on the applied potential. To avoid such complications, and to capture generic effects, unobscured by the chemical complexity, we have decided to take a position-independent dielectric constant, as in the majority of studies [@PhysRevLett.79.435; @DiCaprio2003; @Kornyshev2007a; @Fedorov2008a; @Oldham2008; @Fedorov2010; @Girotto2017; @Girotto2018; @chen_kornyshev:18; @McEldrew2018]; clearly, the change of $\epsilon$ close to the surface will affect the results quantitatively, but it is reasonable to expect that the qualitative behaviour will not be altered. The term $\omega_{vdW}$ describes the contribution from attractive non-Coulombic van der Waals-like interactions to the internal energy, which may lead to demixing of the IL and solvent. The explicit expression for $\omega_{vdW}$ is difficult to obtain due to the complexity of the interactions between the ions and solvent. However, when the phase separation is driven by the chemical difference between IL and neutral solvent, we can take into account only the effective interactions leading to phase separation. In this case, for the bulk system one can write $$\label{USR3} \omega_{vdW}-\sum_i\mu_i\int d{\bf r}\rho_i({\bf r})= \frac{1}{2}\int d{\bf r}_1\int d{\bf r}_2 J(r)g(r)\rho({\bf r}_1)\rho({\bf r}_2) -\mu\int d{\bf r}\rho({\bf r}) ,$$ where $\mu$ is the difference between the chemical potentials of an IL and solvent, $J(r)$ represents the effective interactions leading to phase separation, $g(r)$ is the pair distribution function, $r=|{\bf r}_1-{\bf r}_2|$, and $\rho({\bf r})=\rho_+({\bf r})+\rho_-({\bf r})$ is the number density of the IL at position ${\bf r}$. We have used the approach of Ref. [@Pousaneh2012a; @Pousaneh2014] to transform Eq.  to $$\label{USR4} \Big[\omega_{vdW}-\sum_i\mu_i\int d{\bf r}\rho_i({\bf r})\Big]/A \approx K\Bigg\{ \int_0^{\infty}dz \Bigg[\frac{\xi_0^2}{2} \Bigg(\frac{\partial \rho}{\partial z}\Bigg)^2-\frac{1}{2}\rho^2 \Bigg] + \frac{\xi_0}{2} \rho^2(0) - h_1 \rho(0) \Bigg\} -\mu\int_0^{\infty} dz\rho,$$ where $$\label{J} K=- \int d{\bf r}J(r)g(r)>0$$ measures the strength of the dispersion interactions, and $$\label{xi0} \xi_0^2=\frac{1}{2}\frac{\int d{\bf r}J(r)g(r)r^2}{\int d{\bf r}J(r)g(r)}$$ describes the spatial extension of these interactions ($\xi_0$ is of the same order of magnitude as the molecular size $a$). In Eq. , we took into account that the interactions with the missing fluid neighbours beyond the system boundary should be subtracted (the first boundary term), and we included the direct short-range interactions of the fluid particles with the wall (the second boundary term). The electrode’s ionophilicity is denoted by $h_1$ and describes the preference of the electrode for ions or solvent; $h_1 > 0$ means that the wall favours ions, and we assumed this preference to be the same for anions and cations. Within the local density approximation, the entropy is $$\label{Ts} -Ts =-T\int_0^{\infty} dz s([\rho_i(z)])= k_BT \int_0^{\infty} dz \Bigg[\rho_+\ln(a^3 \rho_+)+\rho_-\ln(a^3 \rho_-) +\beta f_{ex}\Bigg].$$ The first two terms in Eq.  come from the entropy of mixing of ions, and the last term is the excess free energy associated with the excluded volume interactions. If the cations and anions are of comparable size, but the solvent molecules are much smaller, such that the solvent can be treated as a structureless continuum, it seems reasonable to use the Carnahan - Starling (CS) approximation [@Carnahan1969EquationSpheres] for the excluded volume interactions between the ions only, *i.e.*, $$\begin{aligned} \label{fexCS} \beta f_{ex}^{CS}(\rho)=\rho\Bigg( \frac{4\eta -3\eta^2}{(1-\eta)^2}-1 \Bigg),\end{aligned}$$ where $\eta=\pi \rho a^3 /6$ is the packing fraction of ions. However, if both ions and solvent are of comparable size, it might be more suitable to use the popular lattice-gas expression $$\begin{aligned} \label{fexBK} \beta f_{ex}^{lg}(\rho)=(\rho_{tot}-\rho)\ln \big[a^3(\rho_{tot}-\rho)\big], \end{aligned}$$ which arises from the solvent’s ideal-gas entropy, $ \beta f_{ex}=\rho_s\ln a^3 \rho_s$, by assuming the local incompressibility conditions, $\rho_+({\bf r})+\rho_-({\bf r})+\rho_s({\bf r})=\rho_{tot}$ ($/rho_{tot}=a^{-3}$ for the lattice–gas model). Eq.  has been employed in a number of important studies, most notably by @Bikerman1942 [@Bikerman1942], @wicke1952einfluss [@wicke1952einfluss; @Eigen1954], @PhysRevLett.79.435 [@PhysRevLett.79.435], @kilic:pre:07a [@kilic:pre:07a] and @Kornyshev2007a [@Kornyshev2007a]. In Eqs.  and , the cations and anions are assumed to be of the same size, i.e., $a_-=a_+=a$, whereas often $a_{+}\neq a_{-}$ [@Gongadze2015; @Sin2015; @Gongadze2018]. @Gongadze2015 [@Gongadze2015] proposed an improved mean-field model of EDLs that accounts for such ion-size asymmetry, and found that it leads to a pronounced decrease of the capacitance and to shape asymmetry of the capacitance-voltage curves (with respect to the potential of zero charge), which seems to be consistent with the experimental observations [@Lockett2008c; @Lockett2010]. These results suggest that the asymmetry in ion sizes may reduce the capacitance calculated in this work, and will additionally bring asymmetry in the capacitance-voltage dependence, but the qualitative behaviour due to proximity to demixing shall be captured already by a model featuring the same sizes of cations and anions. Summing up, our final expression of the grand potential is [@Cruz2019a] $$\begin{gathered} \label{Eq_GP} \beta\; \Omega[\rho_{\pm},u]/A = \int_0^{\infty} dz \Bigg[ \rho_{+} \ln(a^3 \rho_{+})+\rho_{-} \ln(a^3 \rho_{-})+\beta f_{ex}(\rho)\Bigg] + \int_0^{\infty} dz \Bigg[ cu - \frac{1}{8 \pi \lambda_B} \Bigg( \frac{\partial u}{\partial z}\Bigg)^2\Bigg] \\ + \beta K \left\lbrace \int_0^{\infty} dz \Bigg[ \frac{\xi_0^2}{2} \Bigg( \frac{\partial \rho}{\partial z}\Bigg)^2- \frac{1}{2}\rho^2 \Bigg] + \frac{\xi_0}{2}\rho_0^2 - h_1 \rho_0\right\rbrace - \beta \mu \int_0^{\infty} \rho dz.\end{gathered}$$ The equilibrium properties of the system are described by the minimum of $\Omega$. Minimization with respect to $u$ and $c$ yields $$ \lambda_D^2 u'' = - c = (1 + \phi/\bar{\rho_b}) \tanh(u), \label{eq:potential}$$ where $\lambda_D=(4\pi\rho_b\lambda_B)^{-1/2}$ is the Debye screening length in bulk electrolyte and $\rho_b$ is the equilibrium ion density (in bulk) and $\phi=\bar \rho -\bar \rho_{b}(\bar \rho_{b} = a^3 \rho_b)$. The boundary conditions are, naturally, $u(\infty)=0$ and $u(0)= eU/k_BT$, where $U$ is the potential applied at an electrode with respect to bulk. Minimization with respect to $\rho$ gives $$ \xi_0^2\; \phi'' + \phi = \bar{T} \left[ \ln (1 + \phi/\bar{\rho_b})- \ln(\cosh(u)) + \Delta \mu_{ex} \right], \label{eq:iondensity}$$ where $\Delta \mu_{ex} = \mu_{ex}-\mu^{b}_{ex}$ with $\mu_{ex}=\beta \partial f_{ex}/\partial \rho$, $\mu^{b}_{ex}=\mu_{ex}(z=\infty)$, and $\bar{T}= k_B T a^3/K$ is dimensionless temperature. The boundary conditions are $ \phi(\infty) = 0$ and $ \xi_0 \phi'(0) - \phi(0) + \tilde{h_1} = 0$, where $\tilde{h_1}= a^3h_1/\xi_0-\rho_b$. From the solution of Eq. -, the total charge, $Q$, stored in an EDL is $$\label{Eq:Q} Q=-e\int_0^{\infty}c dz = \evalat[\bigg]{\frac{4 \pi}{\epsilon} \frac{du}{dz}}{z=0}.$$ An important quantity, which can be assessed experimentally, is the differential capacitance: $$C=\frac{\partial Q}{\partial U}. \label{Eq:DiffCap}$$ We have calculated these quantities both numerically and analytically, and the results are discussed in Sections \[Sec:Analytical\_solution\] and \[Section:Num\_Results\]. First, however, we briefly describe the bulk system, *i.e.*, the system in the absence of an electrode. Bulk phase diagram {#Bulk phase diagram} ================== ![**Bulk phase diagrams of ionic liquid (IL)-solvent mixtures.** The solid lines represent the first order phase transition between the homogeneous and IL-solvent demixed phases, and the dashed lines are the spinodal curves given by Eq. . The circles denote (upper) critical points. Temperature is expressed in terms of the critical temperature $T_c$.[]{data-label="Phase_Diagrams"}](figures/Figure_1_PhaseDiagram.eps "fig:") \[fig:foo-1\] In the absence of electrode, the thermodynamic potential is given by $$\label{Omegab} \beta \; \Omega_{b}(\rho_b)/A = -\beta K \rho_b^2 /2 + \Big[ \rho_b\ln(\rho_b/2 )+ \beta f_{ex}(\rho_b)\Big]-\mu\rho_b.$$ The equilibrium condition, $\partial\Omega_b/\partial\rho_b=0$, leads to a non-linear equation, which we solved numerically. Our analysis indicates that, in some parameter region, there are two solutions, corresponding to the IL-rich ($\rho_b=\rho_1$) and IL-poor ($\rho_b=\rho_2$) phases. The first order phase transition between these phases occurs when $\Omega_{b}(\rho_1) = \Omega_{b}(\rho_2)$. This is shown in Fig. \[Phase\_Diagrams\] by solid lines for the CS and lattice-gas models. At the spinodal line, $\delta^2\Omega_b/\delta \rho_b^2=0$, the homogeneous IL-solvent mixture becomes unstable with respect to density fluctuations (this corresponds to the diverging correlation length, c.f. Eq. ). Within our mean-field theory, the spinodal line is given by $$\label{eq:spinodal} \bar{T}_c(\bar{\rho}_b)=\alpha^{-1}(\bar{\rho}_b),$$ where $$\label{w} \alpha (\bar{\rho}_b)=\Bigg[\evalat[\bigg]{\frac{\partial \mu_{ex}}{\partial \bar{\rho}}}{\bar{\rho}=\bar{\rho}_b}+\bar{\rho}_b^{-1} \Bigg].$$ The spinodals are shown by dashed lines in Fig. \[Phase\_Diagrams\]. The point on the spinodal that satisfies $d\bar{T}_c(\bar{\rho}_b)/d\bar{\rho}_b=0$ corresponds to a critical point (solid circles in the same figure). For the CS and lattice-gas expressions, we found for the critical points $\bar{\rho}_c\approx0.25$, $\bar{T}_c\approx0.09$ and $\bar{\rho}_c\approx0.5$, $\bar{T}_c\approx 0.25$, respectively. We note that the obtained phase diagrams (Fig. \[Phase\_Diagrams\]) are in good qualitative agreement with the experimental data (see, *e.g.*, Refs. [@butka:08:ILPhaseTransitions; @Crosthwaite2004; @rotrekl_bendova:17:ILSDemixing]). Approximate analytical solution {#Sec:Analytical_solution} =============================== To study the behaviour of IL-solvent mixtures at metallic surfaces within our model, one needs to solve Eqs. - , which we have done numerically. However, before describing the results of those calculations, it is useful to discuss approximate analytical solutions, which can be obtained for weak surface potentials, $U$, and ionophilicities, $\tilde{h}_1$. To this end, we used the standard perturbation analysis, *i.e.*, we assumed $u=u_0+\varepsilon u_1+ \varepsilon^2 u_2+\varepsilon^3 u_3...$ and $\phi = \phi_0+\varepsilon \phi_1+ \varepsilon^2 \phi_2+... $, where $\varepsilon$ is a small parameter. In the first order approximation, we obtained the following equations $$\begin{aligned} \frac{d^2u_1}{dz^2} =\lambda_D^{-2} u_1(z) \label{ELl1} \end{aligned}$$ and $$\begin{aligned} \frac{d^2\phi_1}{dz^2} =\xi^{-2}\phi_1(z), \label{ELl2} \end{aligned}$$ where $$\label{xi} \xi = \xi_0 \Big( \frac{\bar T}{\bar T_c (\bar \rho_b)}-1 \Big)^{-1/2}$$ is the correlation length and $\bar T_c$ is given by Eq. . The solutions to Eqs.  and are $$u_{1}(z) =U e^{-\kappa z}$$ and $$\phi_{1}(z) = \frac{\tilde{h_1}}{\xi_0/\xi+1}e^{-z/\xi}.$$ Thus, as one may expect, in the first order approximation, the fields $u$ and $\phi$ are fully decoupled, that is, the behaviour of $u$ is determined solely by the Debye screening length, $\lambda_D$, as in the classical Debye-Hückel theory, while the decay of $\phi$ is governed by the correlation length, $\xi$. ![**Density profiles for the Carnahan-Starling and lattice-gas entropies.** The dashed and solid lines correspond to the analytical and numerical solutions, respectively. The profiles were obtained at the applied potentials, $U$, as indicated on the plots, for ionophilicity $\tilde{h}_1=a^3h_1/\xi_0-\bar \rho_b=0$, and for $\xi_0=\lambda_B=a$. (**a**) Order parameter $\phi=a^3\;(\rho-\rho_b)$ for the Carnahan-Starling (CS) entropy, where $\rho=\rho_{+}+\rho_{-}$ is the total ion density. (**b**) Charge density $c=a^3\;(\rho_{+}-\rho_{-})$ for the CS approximation. (**c**) and (**d**) The same as (a) and (b) but for the lattice-gas entropy. Voltage is expressed in terms of the thermal voltage $V_{T_c}= k_B\;T_c/e$ taken at $T_c$.[]{data-label="Profiles"}](figures/Figure_2_Profiles.eps) In the second order perturbation, we obtained $$\label{eq:u2} \frac{d^2 u_2}{dz^2} = \lambda_D^{-2} u_2 + \frac{\lambda_D^{-2}}{\bar{\rho}_b}\phi_1 u_1$$ and $$\label{eq:phi2} \frac{d^2 \phi_2}{dz^2} = \xi^{-2} \phi_2 + \frac{\bar{T}}{2 \; \xi_0^2 \; \bar{\rho}_b^2} \Bigg[A(\bar \rho_b) \phi_1^2- \bar{\rho}_b^2 u_1^2\Bigg],$$ where $$A(\bar{\rho}_b) = \bar{\rho}_b^2 \; \evalat[\bigg]{\frac{\partial^2 \bar{\mu}_{ex}}{\partial \bar{\rho}^2}}{\bar{\rho}=\bar{\rho}_b} -1.$$ Note that $A(\bar{\rho}_b=\bar{\rho}_c)=0$, where $\bar{\rho}_c$ is the critical density. Thus, in the second order, the $u$ and $\phi$ fields become coupled, and it is this coupling that determines the highly non-linear behaviour of the system as it approaches demixing. The solutions to Eqs.  and are lengthy and are not presented here. Fig. \[Profiles\] compares the second–order analytical and numerical solutions to Eqs.  and for the Carnahan-Starling and lattice-gas entropies. For the order parameter, $\phi$, analytic and numerical solutions differ significantly for increasing the applied potential. Interestingly, however, for the charge density the perturbation expansion provides a relatively good approximation and the solutions agree even for higher potentials. Differential capacitance ------------------------ Differential capacitance can be computed by plugging the electrostatic potential, $u$, obtained by the perturbation expansion, into Eq.  and ; the result is $$\label{Cper} C = C_0+ C_2 U^2+...,$$ where $$\label{C0} C_0= C_{D} \Big[ 1 + \frac{\tilde h_1\;\xi/\lambda_D}{(1+\xi_0/\xi)(2\xi/\lambda_D +1)} + O(\tilde h_1^2)\Big]$$ and $$ C_2=\frac{C_{D}}{4}\Bigg[ \frac{3(4\xi/\lambda_D +\xi/\xi_0 +1)\big[(\xi/\xi_0)^{2}+1\big]} {2 (\xi/\xi_0 +1)(2\xi/\lambda_D +1)^2 \bar{\rho}_b \; \alpha(\bar{\rho}_b)} -1\Bigg]+O(\tilde h_1), \label{eq:C2_big}$$ where $C_{D}=(a/\lambda_D) C_H$ is the Debye capacitance and $C_H=\epsilon/4 \pi a$ the Helmholtz capacitance. The sign of $C_2$ describes the shape of the capacitance at low potentials. A positive $C_2$ corresponds to the so-called camel shape, exhibiting a minimum at $u=0$, while a negative $C_2$ means a maximum at $u=0$ and is often associated with the bell-shaped capacitance [@Kornyshev2007a]. Such capacitance shapes have been extensively studied in the literature [@Kornyshev2007a; @Lockett2008b; @chen_kornyshev:18; @Vatamanu2011a; @Fedorov2008a; @Alam2008a; @Fedorov2008b; @Fedorov2010; @Girotto2017; @Girotto2018]. ![**Capacitance close to demixing from perturbation expansion.** **(a)** Capacitance diagram showing the region of positive and negative curvature in the low-voltage capacitance ($C_2>0$ and $C_2<0$, respectively, see Eq. ) for the Carnahan-Starling (CS) model (Eq. ). **(b)** Example of capacitance in the low-voltage region for the CS model. Voltage is expressed in terms of the thermal voltage $V_{T_c}= k_B\;T_c/e$ taken at $T_c$, and the capacitance is measured in units of the Helmholtz capacitance $C_H= \epsilon/4 \pi a$, where $a$ is the ion diameter. Dashed lines show the analytical approximation and the solid lines were obtained by solving Eqs. -  numerically (see Sec. \[Section:Num\_Results\]). **(c)**-**(d)** The same as (a)-(b) but for the lattice-gas model (Eq. ). In all plots, the ionophilicity $\tilde{h}_1=a^3h_1/\xi_0-\bar \rho_b=0$.[]{data-label="Transition_Lines"}](figures/Figure_3_AnalitCap.eps) In the absence of dispersion interactions ($K=0$ in Eq. ), Eqs.  and reduce to $ C_0= C_{D}$ and $$ C_2=\frac{C_{D}}{4}\Bigg(\frac{3}{2\bar \rho_b \; \alpha(\bar{\rho}_b)}-1\Bigg), \label{eq:C2}$$ respectively. For $K=0$, therefore, the sign of $C_2$, and thus the capacitance shape, depend only on the IL density. For the lattice–gas model, combining Eq.  and Eq.  gives $$C_2=\frac{C_D}{4}\Bigg(1-3\bar \rho_b \Bigg),$$ which changes sign at $\rho_b^{lg}=1/3$, implying a transformation between the bell and camel shapes at $\rho_b^{lg}$, as first pointed out by Kornyshev [@Kornyshev2007a]. For the CS free energy, Eq. , we obtained (for $K=0$) $$\begin{aligned} C_2=\frac{C_D}{4}\Bigg[\frac{3(1-\eta_b)^4}{2(1+4\eta_b+4\eta_b^2-4\eta_b^3+\eta_b^4)}-1\Bigg].\end{aligned}$$ We have solved the equation $C_2=0$ numerically and obtained for the transition between the camel and bell shapes $\rho_b^{CS}\approx 0.098$. Note that this value is significantly lower than $\rho_b^{lg}= 1/3$ predicted by the lattice-gas model. This is similar to the critical density, which is also higher for the lattice-gas model (Fig. \[Phase\_Diagrams\]). Considering dispersion interactions ($K \neq 0$), Eq.  becomes more complex and we solved it numerically using `bvp4c` routine in MATLAB$^{\textrm{\textregistered}}$ $2017a$ software. Figs. \[Transition\_Lines\]$a,c$ show the resulting diagrams, which separate the regions of positive and negative curvatures in the low voltage capacitance. The examples of the capacitance shapes are presented in Figs. \[Transition\_Lines\]$b,d$. This figure also demonstrates that our approximate solutions are valid only in the vicinity of $u=0$, and hence the full numerical solution is needed to describe properly the capacitance behaviour. Numerical results {#Section:Num_Results} ================= We have solved Eqs.  and numerically to analyze the capacitive properties of our system in a wide range of voltages, temperatures and densities. In order to calculate the differential capacitance, we first computed the accumulated charge $Q$ according to Eq. , and then differentiated it numerically with respect to the electrostatic potential (Eq. ). Differential capacitance ------------------------ Carnahan-Starling Lattice-gas Fig. \[Capacitance\_Diagram\]$a$ shows that, for the CS model, there are three capacitance shapes [@Cruz2019a]: camel ($C_2>0$), and bird and bell shapes ($C_2<0$, compare Fig. \[Transition\_Lines\]$a,b$). The lattice-gas model also predicts the emergence of all three capacitance shapes (Fig. \[Capacitance\_Diagram\]$d$). This is interesting since recently @chen_kornyshev:18 [@chen_kornyshev:18] extended the steric-only lattice-gas model (*i.e*, $K=0$ in Eq. ) to account for the temperature dependence and studied the capacitance in a wide range of temperature, but they did not observe the bird-like capacitance. Figs. \[Capacitance\_Diagram\]$b, e$ present the capacitance diagrams for the temperatures above the critical temperature $T_c$ (*i.e.*, IL–solvent is always in the mixed state). It shows the regions of the camel, bird and bell-shaped capacitances for the CS and lattice-gas models. Both models exhibit the diagrams of similar topology. For the lattice-gas model, however, the transformations between the various capacitance shapes are shifted to higher densities. This is consistent with the $K=0$ result (Fig. \[Transition\_Lines\]), and is in similarity to the bulk phase diagram, in which the demixing region is also shifted to higher densities (Fig. \[Phase\_Diagrams\]$b$). Figs. \[Capacitance\_Diagram\]$c, f$ show the capacitance diagrams for the temperature below $T_c$. Interestingly, the CS model predicts the camel shape even for high densities, but only provided the electrode is strongly ionophobic. This is likely because, close to demixing, an ionophobic electrode can induce a (macroscopically) thick layer of an ion-poor (or solvent-rich) phase, so that the system in the vicinity of the electrode behaves as being effectively dilute; note that for higher temperatures (far from demixing), only the bell shape is observed for dense ILs (Fig. \[Capacitance\_Diagram\]$b$). It is also interesting to note that the bell and camel shapes are separated by a narrow domain of bird-like capacitance. For the lattice-gas model, however, there is no camel shape at high densities, where only the birds and bells are observed. It must be noted that our theory is inaccurate at high densities, where steric repulsions start to play the dominant role. In view of the above results, it will be interesting to study this region by more robust theories or by simulations. Energy storage -------------- ![**Energy storage and charging close to demixing.** **(a)** Stored energy per surface area for the Carnahan-Starling (CS) entropy as a function of voltage at constant ion density and electrode’s ionophilicity, and for two temperatures. Energy density is measured in units of $E_T = k_BT/a^2$ taken at $T_c$, and voltage is expressed in terms of the thermal voltage $V_{T_c}= k_B\;T_c/e$ taken at $T_c$. **(b)** Differential capacitance and **(c)** charging parameter $X_D$ for the same temperatures as in (a). Capacitance is measured in units of the Helmholtz capacitance $C_H= \epsilon/4 \pi a$, where $a$ is the ion diameter. **(d)-(f)** The same as (a)-(c) but for the lattice-gas entropy.[]{data-label="Fig:energy"}](figures/Figure_5_Energy.eps) From the capacitance, we have calculated the energy density stored in an EDL as a function of the applied potential $$E(U) = \int_0^U C(u) u du .$$ The stored energy, together with the examples of the capacitance and charging parameter, are shown in Fig. \[Fig:energy\]. The charging parameter is [@forse:jacs:16:chmec; @breitsprecher17a] $$X_D = \frac{e}{C(U)} \frac{ d\Gamma}{dU},$$ where $\Gamma=\int_0^{\infty} \phi(z) dz$ is the surface coverage by ionic liquid. Fig. \[Fig:energy\]$a$ shows the energy obtained for two temperatures for the CS entropy. In the entire range of voltages studied, the energy is higher for the lower temperature (closer to demixing). As suggested in [@Cruz2019a], this temperature dependence of the stored energy can be used to generate electricity from waste heat [@janssen:14:prl; @haertel:15:ees; @wang:15:nanolett; @Janssen2017; @Janssen2017a; @Janssen2017]. The increase of energy with decrease of temperature can be related to the capacitance behaviour. Close to demixing, capacitance increases due to the voltage-induced increase of ion density at the surface, so that the bell-shaped capacitance acquires wings and becomes bird-shaped (Fig. \[Fig:energy\]$b$). This is manifested in the behaviour of the charging parameter, which becomes greater than unity for the temperature close to demixing (Fig. \[Fig:energy\]$c$); thus, both cations and anions are adsorbed into the surface layer, leading to a strong peak in the charging parameter and capacitance. For higher voltages, however, the charging parameter decreases to $X_D \approx 1$ and the capacitance also decreases in this range of voltages. For the lattice-gas entropy, the temperature dependence of the stored energy is weaker, as compared to the CS model (Fig. \[Fig:energy\]$d$). Moreover, the two curves cross each other at higher voltages, and the stored energy becomes higher for higher temperatures. Qualitatively, however, the differential capacitance (Fig. \[Fig:energy\]$e$) and the charging parameter (Fig. \[Fig:energy\]$f$) exhibit similar behaviours as for the CS model. Summary {#Section:Conclusion} ======= We have studied electrical double layers with ionic liquid–solvent mixtures close to demixing (Fig. \[Phase\_Diagrams\]). We proposed a model, Eq. , appropriate for this system, and considered the Carnahan-Starling (CS) and lattice-gas expressions for the excess free energy associated with the excluded volume interactions. This model was treated both analytically and numerically, and the results can be summarized as follows. 1. Analytic expressions were obtained by using perturbation expansion, which provide good agreement with the numerical results for the charge density at low potentials (Fig. \[Profiles\]). We also determined the capacitance shapes (at low potentials) and calculated analytically the capacitance diagrams, showing the regions of positive (camel-shaped) and negative curvatures. The transformation between these shapes can be induced by changing the ion density and temperature (Fig. \[Transition\_Lines\]). 2. \[sum:bird\_cap\] Our numerical calculations revealed the emergence of a *bird*-shaped capacitance, having three peaks as a function of voltage. We also calculated the capacitance diagrams, this time showing the regions with the camel, bird and bell shapes, obtained by changing the electrode’s ionophilicity and bulk ion density at different fixed temperatures (Fig. \[Capacitance\_Diagram\]). 3. \[sum:high\_conc\] Interestingly, for the Carnahan-Starling free energy (here applicable for small solvent molecules), the camel-shaped capacitance, which is a signature of dilute electrolytes, can appear at high densities in the case of ionophobic electrodes; the model with the lattice-gas entropy does not exhibit the camel-like capacitance in the high density regime, however. 4. We calculated the energy stored in an EDL at different temperatures (Fig. \[Fig:energy\]a,d). For the CS entropy, the energy increases when approaching demixing, which can be used to generated electricity from heat [@Cruz2019a; @janssen:14:prl; @haertel:15:ees; @wang:15:nanolett; @Janssen2017; @Janssen2017a]. For the lattice-gas model, however, there seems to be no energy enhancement when approaching demixing. This suggests that the type of solvent (particularly the size of solvent molecules) can play an important role in the energy storage. It will be interesting to study such solvent-dependent effects in more details in future work. 5. \[sum:bird\_camel\_temp\] We also found that a transformation between the bell and bird shapes can be caused by varying temperature (Fig. \[Fig:energy\]b,e). This is due to a voltage-induced adsorption of an IL at an electrode, as manifested by the charging parameter $X_D$, which shows a strong peak at a non-zero voltage. Such an enhanced electrosorption leads to stronger screening and hence to the appearance of wings in the bell-shaped capacitance. We presented here a simple model, and to keep it simple, we had to make a number of simplifying assumptions, in order to be able to develop some analytical insights. In particular, we assumed the cations and anions to be of the same size; we took the dielectric constant temperature and position-independent; and, most importantly, we treated the hard-core interactions on the level of the local-density approximation. While it is clear that more realistic models, or simulations, will alter the results of our calculations quantitatively, it is reasonable to expect that the qualitative behaviour *is* captured by our model (particularly points \[sum:bird\_cap\] and \[sum:bird\_camel\_temp\] above). Thus, our model provides the basis for further studies of electrical double layers in the vicinity of ionic liquid–solvent demixing. It will be interesting to validate our predictions by more rigorous theories, simulations and experiments, especially those obtained at high ion concentrations (e.g. point \[sum:high\_conc\] above), at which the local density approximation is known to be inaccurate [@antypov05a]. Finally, we note that @Alam2008 [@Alam2008] have observed experimentally the appearance of humps at the potential of zero charge in the U-shaped capacitance for N$_2$-saturated room-temperature ILs on some electrodes; the emergence of wings in the bell-shaped capacitance was reported in a simulation study by @Sha2014 [@Sha2014] for *neat* BMIM-PF$_6$ on a gold surface. Our analysis suggests that these behaviours can be related to the wetting properties of ionic liquids. It will be useful to study such relations more systematically, in order to link explicitly the wetting and electrochemical characteristics of ionic liquid-electrode systems. This work was supported by the European Unions Horizon 2020 research and innovation programmes under the Marie Skłodowska-Curie grant agreement No. 711859 to C.C and No. 734276 to A.C. and S.K. Additional funding was received from the Ministry of Science and Higher Education of Poland for the project No. 734276 in the years 2017-2018 (agreement No. 3854/H2020/17/2018/2) and for the implementation of the international co-financed project No. 711859 in the years 2017-2021. We are grateful to Yan Levin for critical reading of the manuscript and insightful comments.
High
[ 0.70948905109489, 30.375, 12.4375 ]
Posnett et al. model commiter / project relationships in open source repositories as a bipartite graph and use metrics from ecology to analyze the graph. They analyze the role of expertise and focus in commiters’ acitivities on the quality of the software. This is a very recent and solid piece of software engineering literature, which is founded on ecological theoretical basis. However, the purpose is analytical rather than engineering, as is the case in DIVERSIFY.
Mid
[ 0.619718309859154, 33, 20.25 ]
British footballers have 'worryingly poor' teeth: study London: Professional footballers in UK have worryingly poor teeth that could be marring their performance on the pitch, say dentists in a surprising finding. Nearly four out of 10 had cavities, the study on players at eight clubs in England and Wales showed. The dentists, from the International Centre for Evidence-Based Oral Health at University College London, examined 187 players' sets of teeth. They found 53 per cent had dental erosion, 45 per cent were bothered by the state of their teeth and seven per cent said it affected their ability to train or play. Around 40 per cent had tooth decay, compared with 30 per cent of people of a similar age in the general population. "These are individuals who otherwise invest so much in themselves so it's a surprising finding," Prof Ian Needleman, one of the researchers, told the BBC News. "There are two main groups - some have a catastrophiceffect, they have very severe abscesses that stop them in their tracks and they cannot play or train. "There'll be others experiencing pain affecting sleeping or sensitivity every time they take a drink. "At this level of athlete, even small differences can be quite telling." Nutrition is one of the primary suspects with frequent consumption of sugary or acidic foods during training potentially accounting for tooth decay and erosion. A lot of air in the mouth during exercise can also dry it out so there is less protection from saliva. Needleman said that while "these findings are worrying" clubs were giving dental health a "higher priority" and were educating their players. Previous research has shown "striking" levels of bad teeth in athletes competing at the London 2012 Olympic Games. The teeth of athletes at London 2012 were broadly in the same state as those of footballers. Players from Manchester United, Hull, Southampton, Swansea, West Ham, Brighton, Cardiff and Sheffield United all took part in the study. "Oral health is an area where many athletes have greater problems than the general population so it has been a massive achievement for so many professional football clubs to collaborate with each other to help us understand the scale of this problem better," Stijn Vandenbroucke, the head of medicine and sports science at West Ham, said. The study was published in the British Journal of Sports Medicine.
High
[ 0.6858513189448441, 35.75, 16.375 ]
1. Introduction =============== Survival in HIV-infected individuals has improved since the introduction of combination antiretroviral therapy (cART).\[ [@R1] [@R2]\] However, there continue to be individuals for whom cART fails to suppress HIV to undetectable viral load (VL) levels. [@R3] According to previous studies, cumulative rates of virological failure (VF) after 2 years from initial suppression ranged from 20% to 40%. \[[@R4] [@R5] [@R6] [@R7]\] Numerous predictors, such as younger age, African--American ethnicity, poor adherence to medication, missed visits, lower baseline CD4 counts, and higher baseline HIV RNA levels, have been associated with VF. \[[@R6] [@R7] [@R8] [@R9] [@R10] [@R11] [@R12] [@R13]\] Recently, some studies have reported that elevated total CD8 counts may be a potential predictor of VF.\[ [@R14] [@R15]\] Interestingly, a study reported that initial or serial elevated CD8 counts while on cART or an increase in CD8 counts from cART initiation may be early warning indicators of future treatment failure. [@R15] Also, because monitoring of CD8 counts with CD4 T cells is done in most countries, including in resource-limited settings, whether CD8 counts could be used an alternative marker of VF is important to know in terms of potential financial savings. However, these issues remain unresolved. Thus, we investigated whether elevated CD8 counts were associated with increased risk of VF in the first 4 years of cART in Asian HIV-infected patients. 2. Methods ========== We analyzed data from the Therapeutics, Research, Education and AIDS Training in Asia (TREAT Asia) HIV Observational Database (TAHOD). [@R16] TAHOD is a multicenter, prospective, observational cohort study that was initiated in 2003 to assess HIV treatment outcomes in the Asia-Pacific region. [@R16] Patients were included in the analysis if they started cART between 1996 and 2013 with at least one CD8 measurement within 6 months prior to cART initiation and at least one CD8 and VL measurements beyond 6 months after starting cART. The analysis dataset included follow-up data collected until September 2013. We defined VF as VL ≥400 copies/mL after 6 months on cART. Elevated CD8 was defined as CD8 ≥1200 cells/μL.\[ [@R15] [@R17]\] Time to VF was modeled using Cox regression analysis, stratified by site. The risk analysis period began at 6 months from the start of cART and was censored at the last available VL test. CD8 counts while on cART were analyzed as a time-updated covariate lagged to the next visit. Missing CD8 observations were filled in using last observation carried forward methods (LOCF) for up to 18 months. The covariate was then coded as "unknown" after 18 months until the next measurement. Other clinical characteristics adjusted in the model were age, sex, mode of HIV exposure, pre-cART VL, CD4 and CD8, prior mono or dual therapy, initial cART regimen, hepatitis B and C coinfection, CDC disease stage, and prior TB diagnosis. Due to potential collinearity between CD4 and CD8, we did not include pre-cART CD4 and pre-cART CD8 variables in the same model. The regression models were fitted using a backward stepwise selection process. Variables significant in the univariate model at *P* \< 0.10 were chosen for inclusion in the multivariate model. Variables with *P* \< 0.05 in the final multivariate model were considered statistically significant. Sensitivity analyses were performed by lagging CD8 counts for 6 months as well as measuring the effects of the changes in CD8 from pre-cART values on VF. Ethics approval was obtained from institutional review boards at each of the participating clinical sites, the data management and analysis center, and the coordinating center. All data management and statistical analyses were performed using SAS software version 9.3 (SAS Institute Inc., Cary, NC) and STATA software version 12.1 (STATA Corp., College Station, TX). 3. Results ========== In total, 2475 patients from 19 sites in China, including Hong Kong SAR, India, Indonesia, Japan, Malaysia, Philippines, Singapore, South Korea, Taiwan, Thailand, and Vietnam were included in this analysis. Of the 2475 patients, 665 (27%) experienced VF in the first 4 years of cART (Table [1](#T1){ref-type="table"}). Most patients were males (78.8%) with heterosexual HIV exposure (54.9%). More than half (64.2%) initiated cART with nucleoside reverse transcriptase inhibitors (NRTIs) and non-NRTI (NNRTI) combinations. The median CD8 count prior to cART initiation was 752 cells/μL (interquartile range \[IQR\] 480--1089). At the time of VF, the mean VL was 82,558 copies/mL and the median was 3500 copies/mL (IQR 786--42,100 copies/mL). Additionally, there were 196/665 patients (29%) with VL 400--1000 copies/mL, 209 (31%) with VL 1001--10,000 copies/mL, 160 (24%) with VL 10,001--100,000 copies/mL, and 100 (15%) with VL \> 100,000 copies/mL. However, there was no increasing trend in the proportion of patients with CD8 elevation across these VL groups (*P* = 0.357). ###### Patient characteristics. ![](medi-95-e4570-g001) Table [2](#T2){ref-type="table"} shows the Cox regression analysis for time to first VF in the first 4 years on cART. The overall rate of failure was 12.95 per 100 person-years. In the univariate analysis, variables that were significant at *P* \< 0.10 were time-updated CD8 counts (*P* \< 0.001), age (*P* = 0.005), mode of HIV exposure (*P* \< 0.001), pre-cART CD4 count (*P* \< 0.001), prior mono/dual therapy (*P* \< 0.001), initial cART regimen (*P* \< 0.001), CDC disease stage at cART initiation (*P* \< 0.001), and prior tuberculosis diagnosis (*P* \< 0.001). In the final multivariate model, factors significantly associated with greater hazards of VF were elevated CD8 of ≥ 1200cells/μL after cART initiation versus CD8 \< 1200 cells/μL (hazard ratio \[HR\] = 1.35, 95% confidence interval \[CI\] = 1.14--1.61; *P* = 0.001), injecting drug use compared with heterosexual HIV exposure (HR = 1.74, 95% CI = 1.19--2.54; *P* = 0.005), having prior mono/dual therapy compared to initiating with cART (HR = 2.43, 95% CI = 2.01--2.95; *P* \< 0.001), and being on a protease inhibitor (PI)-based regimen (HR = 1.37, 95% CI = 1.12--1.67; *P* = 0.002) and other treatment combinations (HR = 1.60, 95% CI = 1.13--2.27; *P* = 0.008) compared with NRTI + NNRTI combinations. Variables that showed a protective effect for VF were older age groups of 31 to 40 years (HR = 0.74, 95% CI = 0.61--0.90; *P* = 0.002), 41 to 50 years (HR = 0.66, 95% CI = 0.53--0.83; *P* \< 0.001), 51 years and above (HR = 0.71, 95% CI = 0.54--0.94; *P* = 0.017), compared with age ≤ 30 years, and pre-cART CD4 counts \> 200 cells/μL (HR = 0.68, 95% CI = 0.55--0.83; *P* \< 0.001) versus CD4 ≤ 50 cells/μL. ###### Time to virological failure. ![](medi-95-e4570-g002) To determine whether elevated CD8 caused subsequent VF or whether the association seen in Table [2](#T2){ref-type="table"} was the result of CD8 levels increasing due to VF, we performed a sensitivity analysis by lagging CD8 counts for 6 months. The lagging meant that VF could not be associated with CD8 measurements taken less than 6 months prior to the failure date, thus minimizing the possibility of capturing the increase in CD8 as a response to VF. Table [3](#T3){ref-type="table"}(i) shows the univariate and the adjusted HRs for the lagged CD8 variable. There was no evidence to suggest that having an elevated CD8 count at least 6 months prior was associated with VF in either the univariate (HR = 1.07, 95% CI = 0.90--1.28; *P* = 0.420) or the adjusted (HR = 1.08, 95% CI = 0.91--1.29; *P* = 0.389) model. This indicates that the relationship between CD8 and VF observed in Table [2](#T2){ref-type="table"} was possibly due to the CD8 cells responding to the increase in VL rather than causing the VL increase itself. When absolute CD8 count was replaced by changes in CD8 from pre-cART values (Table [3](#T3){ref-type="table"}\[ii\]), the increase in CD8 was borderline significant in the univariate model (HR = 1.18, 95% CI = 1.00--1.40; *P* = 0.056), but was not associated with VF in the adjusted model (HR = 1.01, 95% CI = 0.84--1.22; *P* = 0.909). ###### Sensitivity analyses: (i) CD8 counts lagged for 6 months, and (ii) CD8 counts replaced by changes in CD8 from pre-cART values. ![](medi-95-e4570-g003) 4. Discussion ============= In this study, we found that the most recent elevated CD8 count after cART was significantly associated with VF, but there was no association between elevated CD8 counts measured at least 6 months prior and the subsequent virological outcome. This suggests that the CD8 levels may be considered not as a predicting factor of VF but a potential indicator for VF in HIV-infected patients after starting cART. The relationship between CD8 response and HIV outcomes is not fully understood. CD8 response can be measured through HIV-specific CD8, CD8 activation, and total CD8 counts. [@R15] Among them, HIV-specific CD8 have an important role in the control of viremia, [@R18] increasing in response to ongoing HIV replication [@R19] and have been associated with poor outcomes.\[ [@R20] [@R21]\] Activation of CD8 subsets may accelerate immune dysfunction. The expression of CD38 on CD8 has been linked to HIV disease progression. \[[@R22] [@R23] [@R24]\] One cross-sectional study showed that elevated levels of CD8 CD38 were found in HIV-infected patients with VF after cART. [@R14] However, it lacked sufficient sensitivity and specificity to replace viral load testing in assessing the efficacy of ART. Additionally, some studies have demonstrated elevation of total CD8 counts in untreated HIV infection \[[@R25] [@R26] [@R27]\] and showed significant associations between elevated baseline total CD8 counts and progression to AIDS.\[ [@R28] [@R29]\] Moreover, a retrospective cohort study recently reported that an increase in CD8 counts from cART initiation was significantly associated with treatment failure. [@R15] This suggests that elevated CD8 counts after cART may be useful as a predictor of VF. Krantz et al [@R15] explained these associations by the adverse effects of a hyperdynamic immune response or low-level viremia associated with increased risk of VF. However, in our study, the relationship between CD8 counts and VF may be due to the CD8 cells responding to, rather than causing, the VL increase. Possible explanations for these findings include the overstimulation of CD8 immune responses against increased circulating HIV or subsequent CD8 compensation, known as "blind T-cell homeostasis," with decreased CD4 in VF. [@R30] Leonard et al [@R30] hypothesized that in T cell loss, both CD4 and CD8 will be produced until the absolute T-cell count is normal. This suggests that the selective loss of CD4 will induce the production of both CD4 and CD8 with the result that T-cell counts will return to normal, but there would be a persistent CD8 elevation and CD4 decrease. [@R30] On the other hand, these findings suggest that using CD8 levels may be a potential indicator for VF in HIV-infected patients after starting cART. If CD8 levels could be used as a marker of VF, they could supplement more expensive and technologically complex VL testing. In addition, as current flow cytometer access is greater in resource-limited settings than PCR, this could facilitate more active monitoring in patient care settings. Further studies would be needed to determine the clinical and economic outcome of using CD8 levels as an indicator for VF after cART. Also, because another situation to suspect VF is CD4 count drop or failure to increase, comparing CD4 with CD8 values in terms of association with VF could be needed. Our study limitations are primarily related to the potential for bias in our patient sampling and data. Participating cohort study sites are primarily tertiary-care referral centers, which could impact the acuity of patients as well as the level of laboratory monitoring conducted. In addition, not all TAHOD sites performed routine CD8 or VL testing, and levels of data completeness varied by both site and country. Our findings should be interpreted in these contexts, and may not necessarily apply to the broader patient populations in the Asia-Pacific. Secondly, we defined elevated CD8 as ≥ 1200 cells/μL. Although this value is the upper limit of normal, according to clinical laboratory reference values, it is based on values from Western populations. In conclusion, our study indicates that the observed relationship between CD8 counts and VF in our cohort may have been due to CD8 cell responses to increases in VL rather than causing the increases themselves. The potential utility of CD8 levels in monitoring for VF could make it an adjunct to VL testing in the future. Acknowledgments =============== TAHOD-TASER study members: • A Kamarulzaman, SF Syed Omar, S Ponnampalavanar, I Azwa, N Huda and LY Ong, University Malaya Medical Centre, Kuala Lumpur, Malaysia; • BLH Sim, YM Gani and R David, Hospital Sungai Buloh, Sungai Buloh, Malaysia; • PS Ly and V Khol, National Center for HIV/AIDS, Dermatology and STDs, Phnom Penh, Cambodia; • E Yunihastuti, D Imran and A Widhani, Working Group on AIDS Faculty of Medicine, University of Indonesia/ Cipto Mangunkusumo Hospital, Jakarta, Indonesia; • FJ Zhang, HX Zhao and N Han, Beijing Ditan Hospital, Capital Medical University, Beijing, China; • JY Choi, Na S and JM Kim, Division of Infectious Diseases, Department of Internal Medicine, Yonsei University College of Medicine, Seoul, South Korea; • M Mustafa and N Nordin, Hospital Raja Perempuan Zainab II, Kota Bharu, Malaysia; • N Kumarasamy, S Saghayam and C Ezhilarasi, Chennai Antiviral Research and Treatment Clinical Research Site (CART CRS), YRGCARE Medical Centre, VHS, Chennai, India; • OT Ng, PL Lim, LS Lee and R Martinez-Vega, Tan Tock Seng Hospital, Singapore; • MP Lee‡, PCK Li, W Lam and YT Chan, Queen Elizabeth Hospital and KH Wong, Integrated Treatment Centre, Hong Kong, China; • P Kantipong and P Kambua, Chiangrai Prachanukroh Hospital, Chiang Rai, Thailand; • P Phanuphak, K Ruxrungtham, A Avihingsanon, C Phadungphon and S Sirivichayakul, HIV-NAT/Thai Red Cross AIDS Research Centre, Bangkok, Thailand; • R Ditangco†, E Uy and R Bantique, Research Institute for Tropical Medicine, Manila, Philippines; • S Oka, J Tanuma and T Nishijima, National Center for Global Health and Medicine, Tokyo, Japan; • S Pujari, K Joshi, S Gaikwad and A Chitalikar, Institute of Infectious Diseases, Pune, India; • S Kiertiburanakul, S Sungkanuparph, L Chumla and N Sanmeema, Faculty of Medicine Ramathibodi Hospital, Mahidol University, Bangkok, Thailand; • TP Merati†, DN Wirawan and F Yuliana, Faculty of Medicine, Udayana University and Sanglah Hospital, Bali, Indonesia; • R Chaiwarith, T Sirisanthana, W Kotarathititum and J Praparattanapan, Research Institute for Health Sciences, Chiang Mai University, Chiang Mai, Thailand; • TT Pham, DD Cuong and HL Ha, Bach Mai Hospital, Hanoi, Vietnam; • VK Nguyen, VH Bui, THD Nguyen and TD Nguyen, National Hospital for Tropical Diseases, Hanoi, Vietnam; • W Ratanasuwan and R Sriondee, Faculty of Medicine Siriraj Hospital, Mahidol University, Bangkok, Thailand; • WW Wong, WW Ku and PC Wu, Taipei Veterans General Hospital, Taipei, Taiwan; • AH Sohn, N Durier, B Petersen and T Singtoroj, TREAT Asia, amfAR - The Foundation for AIDS Research, Bangkok, Thailand; • DA Cooper, MG Law, A Jiamsakul and DC Boettiger, The Kirby Institute, UNSW Australia, Sydney, Australia. † Current Steering Committee Chairs; ‡ co-Chairs Abbreviations: cART = combination antiretroviral therapy, CI = confidence interval, HR = hazard ratio, IQR = interquartile range, LOCF = last observation carried forward, NNRTI = non-nucleoside reverse transcriptase inhibitor, NRTI = nucleoside reverse transcriptase inhibitor, PI = protease inhibitor, TAHOD = TREAT Asia HIV Observational Database, TREAT Asia = Therapeutics, Research, Education and AIDS Training in Asia, VF = virological failure, VL = viral load. All authors have contributed significantly and they are in agreement with the content of the manuscript. Authorship: Conception/design: NSK, JYC; provision of study materials: all authors; collection and/or assembly of data: all authors; data analysis and interpretation: NSK, AJ, JYC; manuscript writing: all authors; final approval of manuscript: all authors. Funding/support: The TREAT Asia HIV Observational Database is an initiative of TREAT Asia, a program of amfAR, The Foundation for AIDS Research, with support from the U.S. National Institutes of Health\'s National Institute of Allergy and Infectious Diseases, Eunice Kennedy Shriver National Institute of Child Health and Human Development, and National Cancer Institute, as part of the International Epidemiologic Databases to Evaluate AIDS (IeDEA; U01AI069907). Queen Elizabeth Hospital and the Integrated Treatment Centre received additional support from the Hong Kong Council for AIDS Trust Fund. TREAT Asia is also supported by ViiV Healthcare. The Kirby Institute is funded by the Australian Government Department of Health and Ageing, and is affiliated with the Faculty of Medicine, UNSW Australia. The content of this publication is solely the responsibility of the authors and does not necessarily represent the official views of any of the governments or institutions mentioned above. The authors have no conflicts of interest to disclose.
Mid
[ 0.6153846153846151, 32, 20 ]