text
stringlengths 8
5.74M
| label
stringclasses 3
values | educational_prob
listlengths 3
3
|
---|---|---|
Dot Garland Style — Cards Dot Garland for the holidays is chic and festive in its joyful hand-lettered fonts, its strings of tiny brightly colored dots are gently tossed across the top and bottom. A bright and colorful wood grain texture provides a colorful background for your message. Enjoy the holidays and send your holiday wishes simply and with joy using your favorite photo on Dot Garland holiday style. Photo Tip: Choose a photo that has a top and bottom edge that is simple and evenly colored, such as snow, a foggy mist, a plain sky, lawn, etc. Customize your Dot Garland cards today! | Mid | [
0.5567451820128481,
32.5,
25.875
]
|
Q: How to customize custom drawable defined in XML at runtime? I made a custom, multi-layered drawable to act as the background for a button. Sometimes, I want part of this drawable layer to be blue. Sometimes I want it to be green. Point is, it's a variable, and I want it to be definable in the associated custom view XML. Is this possible? How do I write a drawable in XML whose value I can determine at runtime? custom_button.xml <?xml version="1.0" encoding="utf-8"?> <inset xmlns:android="http://schemas.android.com/apk/res/android" android:insetLeft="@dimen/button_inset_horizontal_material" android:insetTop="@dimen/button_inset_vertical_material" android:insetRight="@dimen/button_inset_horizontal_material" android:insetBottom="@dimen/button_inset_vertical_material"> <shape android:shape="rectangle"> <corners android:radius="@dimen/control_corner_material" /> <solid android:color="?attr/colorButtonNormal" /> <padding android:left="@dimen/button_padding_horizontal_material" android:top="@dimen/button_padding_vertical_material" android:right="@dimen/button_padding_horizontal_material" android:bottom="@dimen/button_padding_vertical_material" /> </shape> </inset> The line <solid android:color="?attr/colorButtonNormal" /> is what I want to set at runtime. I have my custom view for this class already receiving the color value I want to use here - how do I apply it to the XML of this drawable? A: Like this: InsetDrawable drawable = (InsetDrawable) myButton.getBackground(); GradientDrawable shape = (GradientDrawable) drawable.getDrawable(); shape.setColor(Color.BLUE); I made a custom, multi-layered drawable to act as the background for a button. This assumes myButton is the button which you refer to above and has been defined with android:background="@drawable/custom_button" EDIT For an API level 1 way to do this: Make a custom_shape.xml drawable: <shape android:shape="rectangle"> <corners android:radius="@dimen/control_corner_material" /> <solid android:color="?attr/colorButtonNormal" /> <padding android:left="@dimen/button_padding_horizontal_material" android:top="@dimen/button_padding_vertical_material" android:right="@dimen/button_padding_horizontal_material" android:bottom="@dimen/button_padding_vertical_material" /> </shape> Write a method to change the colour of this drawable and put an inset around it: private void changeColor() { // Get shape from XML GradientDrawable shape = (GradientDrawable) getResources().getDrawable(R.drawable.custom_shape); shape.setColor(Color.BLUE); // Programmatically create Inset InsetDrawable drawable = new InsetDrawable(shape, getResources().getDimensionPixelSize(R.dimen.button_inset_horizontal_material), getResources().getDimensionPixelSize(R.dimen.button_inset_vertical_material), getResources().getDimensionPixelSize(R.dimen.button_inset_horizontal_material), getResources().getDimensionPixelSize(R.dimen.button_inset_vertical_material)); // Apply to button myButton.setBackground(drawable); } | High | [
0.6702849389416551,
30.875,
15.1875
]
|
#include "stdafx.h" #include "settler_melee_attacks_system.hpp" #include "../../utils/thread_safe_message_queue.hpp" #include "../helpers/weapons_helper.hpp" #include "../../raws/items.hpp" #include "../../raws/defs/item_def_t.hpp" #include "../../raws/materials.hpp" #include "../../raws/defs/material_def_t.hpp" #include "../gui/log_system.hpp" #include "../../global_assets/rng.hpp" #include "damage_system.hpp" #include "../gui/particle_system.hpp" #include "../helpers/inventory_assistant.hpp" namespace systems { namespace settler_melee_attack { using namespace bengine; using namespace weapons; thread_safe_message_queue<settler_attack_message> melee; void request_melee(settler_attack_message msg) { melee.enqueue(settler_attack_message{ msg.attacker, msg.victim }); } void run(const double &duration_ms) { melee.process_all([](const settler_attack_message &msg) { auto attacker = entity(msg.attacker); auto defender = entity(msg.victim); if (!attacker || !defender) return; auto attacker_pos = entity(msg.attacker)->component<position_t>(); auto defender_pos = entity(msg.victim)->component<position_t>(); if (!attacker_pos || !defender_pos) return; color_t red{ 1.0f, 0.0f, 0.0f }; particles::melee_attack(*attacker_pos, *defender_pos, red); auto attacker_stats = attacker->component<game_stats_t>(); // TODO: civ_dislike_attacker(defender); std::size_t weapon_id = get_melee_id(*attacker); std::string weapon_name = "fists"; int weapon_n = 1; int weapon_d = 4; int weapon_mod = 0; int weapon_quality = 0; if (weapon_id != 0) { auto weapon_component = entity(weapon_id)->component<item_t>(); if (weapon_component) { auto weapon_finder = get_item_def(weapon_component->item_tag); if (weapon_finder != nullptr) { weapon_name = weapon_finder->name; weapon_n = weapon_finder->damage_n; weapon_d = weapon_finder->damage_d; weapon_mod = weapon_finder->damage_mod + get_material(weapon_component->material)->damage_bonus;; } auto q = entity(weapon_id)->component<item_quality_t>(); if (q && q->quality > 3) ++weapon_quality; if (q && q->quality == 7) ++weapon_quality; auto wear = entity(weapon_id)->component<item_wear_t>(); if (wear) { if (wear->wear > 0) { --wear->wear; } else { LOG logger; logger.text(weapon_name + std::string(" has broken!")); logging::log_message lmsg{ logger.chars }; logging::log(lmsg); inventory::delete_item(weapon_id); } } } } LOG ss; ss.settler_name(msg.attacker)->text(" attacks ")->other_name(msg.victim)->text(" with their ")->col(color_t{ 1.0f,0.0f,0.f })->text(weapon_name + std::string(". "))->col(color_t{ 1.0f,1.0f,1.0f }); const int skill_modifier = get_skill_modifier(*attacker_stats, "Melee Attacks"); const int die_roll = rng.roll_dice(1, 20) + stat_modifier(attacker_stats->strength) + skill_modifier + weapon_quality; const int armor_class = calculate_armor_class(*defender); if (die_roll > armor_class) { const int damage = std::max(1, rng.roll_dice(weapon_n, weapon_d) + weapon_mod + stat_modifier(attacker_stats->strength) + skill_modifier) + weapon_quality; damage_system::inflict_damage(damage_system::inflict_damage_message{ msg.victim, damage, weapon_name }); ss.text(std::string("The attack hits, for ") + std::to_string(damage) + std::string(".")); gain_skill_from_success(msg.attacker, *attacker_stats, "Melee Attacks", armor_class, rng); } else { ss.text("The attack misses."); } logging::log_message lmsg{ ss.chars }; logging::log(lmsg); }); } } } | Mid | [
0.5658914728682171,
36.5,
28
]
|
Q: How much more secure is encryption if the program requires random input from the user? I know there are existing questions about how Truecrypt uses mouse input to increase entropy. My question is, how much of a difference does it make? I don't know of any other encryption utilities that do this, so does this mean the rest of them (like 7-zip) are unsafe? To my knowledge the typical way of doing this is to use the computer time as the seed to the random number generator, which in a sense is the same as user input as an attack doesn't know (to the millisecond) when the user presses the button. How much more secure is encryption if it uses user input like moving the mouse or random keyboard strokes? A: Basically zero. Operating systems already integrate every source of potential randomness that they can get their hands on in order to seed their randomness APIs (examples being CryptGenRandom() on Windows, /dev/urandom on POSIX variants, getrandom(2) on Linux, and getentropy(2) on FreeBSD). These sources include mouse movements, disk timings, and other unpredictable events. The thing is, once you reach a certain point — say 256 bits of collected entropy, which takes less than a few seconds in practice — the operating system can generate an effectively unlimited stream of unpredictably random numbers for the remaining lifetime of the system. Many operating systems even save this internal state upon reboots, preventing the need to reinitialize the system random number generator from scratch ever again. More entropy at that point doesn't really get you more unpredictability, and collecting mouse movements is already done as part of this process anyway. Additional entropy does allow for the operating system to recover from theoretical exposure or tainting of its internal random state, but this is very unlikely to occur in practice on a non-compromised machine. To my knowledge the typical way of doing this is to use the computer time as the seed to the random number generator… No cryptographically-secure RNG uses the system clock for this purpose. As @CBHacking points out, this is an exceedingly weak source of random numbers, since "what time is it" is highly predictable (and sometimes easily influenced by outside sources). Microsecond-level timings of human input can also be semi-predictable, but collecting and mixing this data repeatedly can very quickly yield a good source of entropy. Modern RNG mixing functions are very good at extracting and combining even small amounts of entropy. | Low | [
0.43717277486910905,
20.875,
26.875
]
|
Category: recipes Alex French Guy Cooking loves instant ramen but wants to cut down on some of the salt, MSG, and fat that a lot of instant ramen come with, so he decided to make his own. Watch the intro video here, then watch the rest of the videos for the actual instructions. There’s a bit of work involved, but if you’re… Read more → Based on the Naruto manga and anime series, ramem tacos can be had at MTV’s Fandom Fest at Petco Interactive Zone! Nowhere near San Diego? Don’t have a Comic Con badge? Watch the video below and learn how to make your own Ichiraku ramen taco. Read more → If you’ve never seen Blade Runner, stop what you’re doing, put down that bowl of ramen, and go see it. Now! It’s one of the best movies ever made, sci fi or not. And if you want to make some noodles to help celebrate its 35 anniversary, head over to Nerdist for their recipe for Blade Runner Ramen. Yeah, I… Read more → For some people, good chashu is an integral part of a good bowl of ramen. Good luck with that if you’re making instant ramen at home. But instead of going through the trouble of making chashu from scratch, just follow these steps for almost-instant gratification: 1. Go to your local Trader Joe’s. 2. Buy a pack of their “Fully Cooked… Read more → There really aren’t that many English cookbooks for “real” ramen. I mean, there’re cookbooks on how to how to make instant ramen more exciting, like this, but if you’re looking for cookbooks on authentic ramen, there’re very few choices. Along comes Amy Kimoto-Kahn, who’s been offering ramen recipes on her easypeasyjapaneasey blog. Amy’s been doing this for quite a while,… Read more → It’s not exactly an easy recipe, but if you’re curious about what goes into making a ramen soup from scratch, here’s ramen chef Keizo Shimamoto’s take on a chicken-based ramen broth. Actual ingredients and step by step recipe here! Read more → My wife pointed this out to me while we were at Mitsuwa Supermarket today, stocking up on ramen, snacks, and canned coffee (20% off everything this weekend! woohoo!). At $9.99/lb, that’s more expensive than some high quality steaks I’ve seen! I was excited to try this out. I took my first bite of the chashu right out of the box,… Read more → By popular request (yeah, here at ramen hq, we consider one request to be popular), we decided to delve into the world of real cooking and experimented with making hanjuku eggs. After some research, trial and error, and mixing and matching of different recipes, we believe we’re off to a good start. Read more → Search for: Most Americans know ramen only in the 5000-pack for a buck instant variety and as “starving college student food.” But ramen is so much more. Read more... | Mid | [
0.539301310043668,
30.875,
26.375
]
|
Q: Dynamically Update ContextKey of DynamicPopulateExtender with DropDownList Value I have a DynamicPopulateExtender control and I want it to render html based on the value of an asp:DropDownList. The problem is how to write the javascript that grabs the value of the drop down, assigns it to the DynamicPopulate control's contextKey, and then triggers the update. Currently my code freezes when I get to the populate() method in the JavaScript so I think my JavaScript needs some work. Here is my DropDownList, the Extender, and the panel I want to update: <asp:DropDownList id="cboResponse" cssclass="DataControl" DataTextField="lov_label" DataValueField="lov_cd" runat="server" /> <asp:Panel ID="pSectFunc" runat="server" /> <ajaxToolkit:DynamicPopulateExtender ID="DPE" runat="server" TargetControlID="pSectFunc" ServicePath="/ajax/SAT.asmx" ServiceMethod="GetPanelHTML" /> And here is the javascript I currently have. I can get the value from the drop down into ServiceId but I am unable to find and invoke the extender with the correct ContextKey: <script type="text/javascript"> function ValPickListSelection(val, args) { args.IsValid = document.getElementById(val.controltovalidate).selectedIndex > 0; } //Need to update the contextKey of the DynamicPopulateExtender with the correct //ServiceId so it can render the correct sector-function combination. $(document).ready(function () { $('#<%= cboResponse.ClientID %>').change(function () { var dpe = $('#<%= DPE.ClientID %>'); var ServiceId = Number($(this).val()); if (ServiceId > 0) { dpe.ContextKey = ServiceId; dpe.populate(); } }); }); </script> A: You need to set the DynamicPopulateExtender's BehaviorID attribute. Then use the jQuery $find() to get a reference to the control. <script type="text/javascript"> $(document).ready(function () { $('#<%= cboResponse.ClientID %>').change(function () { var dpe = $find('DPE_Behavior'); var contextKey = Number($(this).val()); if (dpe) { dpe.populate(ServiceId); } }); }); </script> | Mid | [
0.587677725118483,
31,
21.75
]
|
The Boredom Pandemic The confinement measures aimed at controlling the spread of COVID-19 could lead to another pandemic with an even higher infection rate: a pathological form of tedium called alysosis. Recent research suggests that it can lead to risky behavior, greater impulsivity, and political extremism. LONDON – As people around the world find themselves in confinement to control the COVID-19 pandemic, look out for another affliction with an even higher infection rate than any virus. Boredom is now a serious health risk. Is it possible that the more preoccupied we become with the physical danger posed by the virus, the more we underestimate the mental harms produced, for example, by negative emotional states such as boredom? Some psychoanalysts believe that boredom, if it becomes entrenched, can become a neurotic condition called “alysosis.” Historically, ennui was associated with workplace tedium. By contrast, the epidemic of monotony we are facing is an unusual variant of what psychologists call “leisure boredom.” Because many have not encountered this kind of boredom before, they may be worse at managing it. Severe boredom has been reported to be linked with a host of problems, including gambling, reckless driving, self-harm, alcoholism, substance abuse, depression, suicide, psychosis, paranoia, irritability, aggression, and even homicide. In 2018, the Journal of Forensic Sciences published an investigation into the motive behind the murder by two sixteen-year-olds in Idaho of a classmate, who was stabbed 30 times. It concluded that relief from boredom and the need for excitement, which were evident in the case, are common factors in a variety of legitimate and deviant leisure experiences. Boredom is hardly a new area of inquiry. In The Antichrist, philosopher Friedrich Nietzsche noted, “Against boredom even gods struggle in vain.” In Notes from Underground, Fyodor Dostoyevsky wrote, “Of course boredom may lead you to anything. It is boredom sets one sticking golden pins into people, but all that would not matter. What is bad (this is my comment again) is that I dare say people will be thankful for the gold pins then.” Subscribe to Project Syndicate Enjoy unlimited access to the ideas and opinions of the world's leading thinkers, including weekly long reads, book reviews, and interviews; The Year Ahead annual print magazine; the complete PS archive; and more – all for less than $2 a week. Subscribe Now The most recent psychological research into boredom has uncovered a tendency for tedium to drive people to political extremes, greater risk taking, and impulsivity. If these findings are replicated in households, even when the viral pandemic has subsided, we could be left with a fundamentally altered psychological and political landscape. In 2016, psychologists Wijnand van Tilburg, from the University of Essex, and Eric Igou, from the University of Limerick, published a study in the European Journal of Social Psychology titled “Going to Political Extremes in Response to Boredom.” They point out that “existential threats” were previously thought to drive the electorate to embrace political extremes. For example, demagogues who emphasize the danger to society from foreigners and other scapegoats induce fear in the electorate. But Tilburg and Igou found that inducing tedium by giving people a very boring task leads to significant political polarization. Tilburg and Igou report that those who hold more radical political views claim to have a greater sense of understanding of the world, even if their explanations can be overly simplistic or incorrect. Thus, the psychology of the predicament when facing a major threat drives us to seek for certainty and coherence, while boredom’s tendency to trigger a search for meaning helps to explain the political shifts it induces. This argument suggests that the current viral pandemic represents a “double whammy” that is pushing the world further toward political extremism. In addition to confinement, flu-like symptoms, and deaths, COVID-19 also has delivered a potent existential threat in the form of mass ennui. In a recent study, Gillian Wilson of The New School replicated Tilburg’s and Igou’s findings that boredom drives people toward political extremes. But she found that boredom induces extremism among conservatives rather than liberals. An intriguing implication of this might be increased electoral support for right-wing leaders like Donald Trump and Boris Johnson, which could encourage them to pursue even more authoritarian policies. Indeed, this viral pandemic may lead to a political spiral into fanaticism – on a mass scale. Another recent study published in the Journal of Behavioral Decision Making found that people prone to boredom reported greater risk‐taking across financial, ethical, recreational, and health and safety domains. The research – by Tilburg, Igou, and Ayşenur Kılıç – suggested that elevated risk‐taking might be due to the erosion of self‐control that occurs under boredom. A study published in Social Psychology, this one by Igou, Tilburg, and Andrew Moynihan, provides more evidence of heightened risk-taking. This research may be taken as a warning that telling people to stay indoors and comply with other anti-contagion rules can backfire if such measures elevate boredom. The bored are more likely to engage in risky behavior, whether breaking laws and rules, or taking chances with their health. Whether we realize it or not, a key reason why we go on holiday is that a change in environment is a cure for tedium. But this treatment is denied to us for the foreseeable future. We can’t even change our scenery by getting outside as much as we need to – or should. Authoritarians and dictators around the world may already be rejoicing at the support that could soon come their way. Support High-Quality Commentary For more than 25 years, Project Syndicate has been guided by a simple credo: All people deserve access to a broad range of views by the world's foremost leaders and thinkers on the issues, events, and forces shaping their lives. At a time of unprecedented uncertainty, that mission is more important than ever – and we remain committed to fulfilling it. But there is no doubt that we, like so many other media organizations nowadays, are under growing strain. If you are in a position to support us, please subscribe now. As a subscriber, you will enjoy unlimited access to our On Point suite of long reads and book reviews, Say More contributor interviews, The Year Ahead magazine, the full PS archive, and much more. You will also directly support our mission of delivering the highest-quality commentary on the world's most pressing issues to as wide an audience as possible. By helping us to build a truly open world of ideas, every PS subscriber makes a real difference. Thank you. Very thoughtful and comprehensive colomn. I am surprised to note that the author omits to mention that boredom can give rise to overeating junk food and watching TV which finally would lead to obesity and related problems. It is so in N.America and perhaps not in Europe! New Comment It appears that you have not yet updated your first and last name. If you would like to update your name, please do so here. Pin comment to this paragraph After posting your comment, you’ll have a ten-minute window to make any edits. Please note that we moderate comments to ensure the conversation remains topically relevant. We appreciate well-informed comments and welcome your criticism and insight. Please be civil and avoid name-calling and ad hominem remarks. Mass protests over racial injustice, the COVID-19 pandemic, and a sharp economic downturn have plunged the United States into its deepest crisis in decades. Will the public embrace radical, systemic reforms, or will the specter of civil disorder provoke a conservative backlash? For democratic countries like the United States, the COVID-19 crisis has opened up four possible political and socioeconomic trajectories. But only one path forward leads to a destination that most people would want to reach. Log in/Register Please log in or register to continue. Registration is free and requires only your email address. Emailrequired PasswordrequiredRemember me? Please enter your email address and click on the reset-password button. If your email exists in our system, we'll send you an email with a link to reset your password. Please note that the link will expire twenty-four hours after the email is sent. If you can't find this email, please check your spam folder. | Mid | [
0.6423690205011391,
35.25,
19.625
]
|
const filterAmbiguousDirectiveAliases = require('./filterAmbiguousDirectiveAliases')(); const words = ['Http', 'ngModel', 'NgModel', 'NgControlStatus']; describe('filterAmbiguousDirectiveAliases(docs, words, index)', () => { it('should not try to filter the docs, if the docs are not all directives or components', () => { const docs = [ { docType: 'class', name: 'Http' }, { docType: 'directive', name: 'NgModel', directiveOptions: { selector: '[ngModel]' } }, { docType: 'component', name: 'NgModel', componentOptions: { selector: '[ngModel]' } } ]; // take a copy to prove `docs` was not modified const filteredDocs = docs.slice(0); expect(filterAmbiguousDirectiveAliases(docs, words, 1)).toEqual(filteredDocs); expect(filterAmbiguousDirectiveAliases(docs, words, 2)).toEqual(filteredDocs); }); describe('(where all the docs are components or directives', () => { describe('and do not all contain the matching word in their selector)', () => { it('should not try to filter the docs', () => { const docs = [ { docType: 'directive', name: 'NgModel', ['directiveOptions']: { selector: '[ngModel]' } }, { docType: 'component', name: 'NgControlStatus', ['componentOptions']: { selector: '[ngControlStatus]' } } ]; // take a copy to prove `docs` was not modified const filteredDocs = docs.slice(0); expect(filterAmbiguousDirectiveAliases(docs, words, 1)).toEqual(filteredDocs); expect(filterAmbiguousDirectiveAliases(docs, words, 2)).toEqual(filteredDocs); // Also test that the check is case-sensitive docs[1].componentOptions.selector = '[ngModel]'; filteredDocs[1].componentOptions.selector = '[ngModel]'; expect(filterAmbiguousDirectiveAliases(docs, words, 2)).toEqual(filteredDocs); }); }); describe('and do all contain the matching word in there selector)', () => { it('should filter out docs whose class name is not (case-insensitively) equal to the matching word', () => { const docs = [ { docType: 'directive', name: 'NgModel', ['directiveOptions']: { selector: '[ngModel],[ngControlStatus]' } }, { docType: 'component', name: 'NgControlStatus', ['componentOptions']: { selector: '[ngModel],[ngControlStatus]' } } ]; const filteredDocs = [ { docType: 'directive', name: 'NgModel', ['directiveOptions']: { selector: '[ngModel],[ngControlStatus]' } } ]; expect(filterAmbiguousDirectiveAliases(docs, words, 1)).toEqual(filteredDocs); }); }); }); }); | Mid | [
0.575280898876404,
32,
23.625
]
|
Dyspeptic retired Marine wife/tech wench attempts to enlighten the great unwashed of the blogosphere while dodging snarky commentary from the local knavery. October 15, 2009 A Little Thought Experiment But what I thought was even more interesting was what you find if you compare what single men and single women search on: It's tempting to see a bidirectional cause and effect thing going on here, but I'm not sure that's valid. Even more curious, however, is what happens when you change just one word ("is" to "does"). That focuses the question more on what men and women are actually doing as opposed to how their behavior is perceived by the opposite sex. I would think that would be slightly more accurate since it isn't passing through the filter of interpretation: Finally, what are the differences between single and married behaviors by both sexes? What is the takeaway here? Well, for one thing farting is a much bigger problem in male/female relationships than we ever suspected.... As a final experiment, I eliminated the behaviors that married men and married women BOTH objected to. What is left was thought provoking: Posted by Cassandra at October 15, 2009 07:11 AM Trackback Pings TrackBack URL for this entry: http://www.villainouscompany.com/mt/mt-tb.cgi/3225 I'm surprised the nagging thing made it onto Google, because it seems to be one of those words that means "shut up" and not necessarily a behavioral description for which someone is actively searching for an explanation. Many of the women I've talked to get REALLY irritated by the use of that word, and from their perspective it seems as if they get called a nag whenever they remind their spouses that things around the house need to get done and they need help with it. Not that I'm saying that women are flawless martyrs and if those men would just get on the train and do as they are told things would be peachy perfect (true as that may be - I KID!). But it does seem to be a "safe" pejorative to label women with whether it is true at the moment or just used to end a conversation someone doesn't want to hear. I totally agree that it's better to talk to your spouse, but I will admit to having searched on questions that confused me (not always about my spouse, but just about men in general). Being on the Internet has made me aware of some fairly widespread attitudes and behavior in men that I'd never really seen before, or had seen but thought was just on the fringes. For a long time, some of the things I saw shocked me and shook my faith in human nature. A lot of it has deeply upset me, and when something upsets me, I try to figure it out so I can understand. I have to say that being on the Internet has given me the very strong impression that an awful lot of men neither like nor respect women. As someone who has always liked and respected men, that's pretty disturbing. I couldn't help noticing on that last comparison that no matter which starting point you look at it from, the last comparison works very well from a cause/effect standpoint. Before someone jumps all over me, let me repeat part of that last sentence: "no matter which starting point you look at it from". I think men are more likely to ignore you if they think you nag them. But on the other hand, if someone responds to you the first time, there is no reason to "nag" - a nag is usually a persistent reminder or criticism that results from being ignored. Like so many other things, I think marriages that fail often do so because of a negative feedback loop - one partner does x so the other responds by doing y. And the cycle of violence commences ;p Many of the women I've talked to get REALLY irritated by the use of that word, and from their perspective it seems as if they get called a nag whenever they remind their spouses that things around the house need to get done and they need help with it. AFW, I don't presume to speak for anyone other than myself, but I can explain what the difference between "reminding" and "nagging" is to me. Reminding: "Honey, don't forget, you said you'd take out the trash after dinner." Nagging: ""Honey, don't forget, you said you'd take out the trash after dinner. And you need to, because the chicken package will really start to smell. And the trash is coming tomorrow. And don't forget to close the lid on the trashcan. You know those neighborhood dogs will knock over the can if you don't..." Prod, don't stab. Mind you, I understand rationally what she's doing. She's trying to justify why she's reminding me. She doesn't want to seem like she's nagging me, so by giving me all the reasons it needs to get done she's being logical. The problem is, I don't NEED the reasons. She reminded me I said I'd do something, and that's all I needed. Giving the reasons AFTER reminding me feels like she is badgering me over and over again about it. I have to say that being on the Internet has given me the very strong impression that an awful lot of men neither like nor respect women. As someone who has always liked and respected men, that's pretty disturbing. Cass, don't let it get to you. I remember exactly when it was I lost my faith in the common intellect of my fellow citizens. I was working at a pizza stand in King's Dominion amusement park in Virginia. Folks would ask, repeatedly, stupid questions. Illiteracy could explain some of it, but other elements aren't covered by that. The problem with being exposed to the public is that you count the hits, and not the misses. I get that phrase from another blog I read that talked about airplane crashes (Bill Whittle's I believe). Folks will always take notice of a plane crash, but never think of the hundreds of thousands of planes that landed safely that same day. Similarly, you get exposed to the worst of humanity on the internet. And in this particular case, you're taking examples of people asking questions of google because they don't understand why their other half is doing things they don't like. Folks have no need to ask "Why is my wife so good to me?" or "Why is my husband so loving?" People who are happy with their spouses behavior don't need to ask why. You're counting the hits, but can't see all the misses. I understand rationally what she's doing. She's trying to justify why she's reminding me. She doesn't want to seem like she's nagging me, so by giving me all the reasons it needs to get done she's being logical. BINGO. I know that on the rare occasions I ask my husband to do something, I always feel the need to justify my request. I tend to avoid asking him to do ANYTHING. What is sad to me is that guys nearly always resent this, when the very fact that the woman is justifying her request shows she's NOT trying to be a jerk about it. To me, nagging is when you make a request and then belittle him or launch into a recital of every single thing the man hasn't done that you've asked to, or every disappointment in your relationship. And I've seen women do this. We also (sometimes) micromanage HOW a task is performed. Sometimes this is important, like when your husband puts a red shirt in with your load of white laundry and the whole thing is ruined beyond repair. But often it's not. It doesn't matter how the dishwasher is loaded unless the dishes aren't getting clean or he is breaking your dishes. In our house, the person who performs the chore makes the rules and the other one is expected to STFU unless there's a pretty compelling reason for stepping in. Ironically, my spouse is more likely to criticize the way I do something because he's more meticulous and methodical and I'm more freeform :p My poor spouse has come home a few times to find me in tears over some ugly thing I've read on the 'Net. I always ask him, "Honey, do all men think this way? If not, why don't more men speak up when one of them says something that is clearly hateful?" He says that men just shrug that sort of thing off, and also that they know their manhood will be questioned if they're decent. I've seen this happen many a time to some poor guy who tried to do the right thing. I have to say that I still have trouble understanding why anyone would say nothing. It gives the impression of consensus even when that's not the case. I think the thing that disturbs me most is the impression I often get that certain attitudes are accepted by men in general. When someone says something ugly or disgusting and other men applaud or approve it and not one objects, it's hard to come away with any other impression. My problem with disagreements is that I'm not as smart as I think I am. Afterward, I think of something that I needed to say, typically that bolstered my side. But I don't want to bring it up, as it re-instates the "discussion", so I tell myself I will think faster next time. Right. Like that works. My the key for holding things together is the future, not the present. Not the argument, but having plans for a vacation, an event, a visit, a dream, preferably several, spaced out over this week, next month, this year, and so on. Something to look forward to. And to think - is my spouse who I want to do this with? I should hope so. Seeing as how I should have made list, and the compromises entailed, with my spouse. If you can't think of things you want to do together next month, you're doomed. I don't think it was this way, at least on this scale, when I was dating Walkin' Boss. Certainly not when I was a child. I agree, bthun. My Dad always spoke highly of women. It was obvious from his behavior and speech that he liked women, thought they were smart and good people, and enjoyed their company. That's what I looked for in a boyfriend - someone like my Dad. If a guy didn't like or respect women (and there are lots of men out there who don't - you can sense it in the way they treat you from the get go) I stayed far, far away from him no matter how "nice" he acted. Sadly, there are also many men who will ditch the kind of woman they say they want in a heartbeat for one who acts the way they say they don't like :p This is really no different from women who continually date players and losers. I think there are a lot of behaviors that are mutually objectionable no matter what sex you are. They're just inconsiderate and/or destructive. And then there are other behaviors that seem to be more closely linked to whether we're male or female. I don't see one sex as being any better than the other in this regard. On the Internet I hear men complain constantly about the way society sets a lower standard for women and how (consequently) women don't behave as well as they used to. I think that's true. But what's kind of funny about this to me is that women are behaving more like men do, both now and in the past and men don't like this one bit. Why do they condone objectionable behavior when a man does it but condemn it when a woman does it? I rarely hear anyone acknowledge that a man who behaved the way many men behave today would have been shunned by society when I was growing up. Men, too, are demanding that behaviors society has never approved of be not just legitimized but mainstreamed and approved of. "I rarely hear anyone acknowledge that a man who behaved the way many men behave today would have been shunned by society when I was growing up." There may be a few old, moss-backed knuckle-draggers around who would ack that sentiment. I know that on more than a few occasions, I've had younger fellows snort and sneer at my sense of propriety regarding conduct towards others in both public and private settings. Ah, whacha gonna do with witnesses and forensic science being what it is? I think the thing that disturbs me most is the impression I often get that certain attitudes are accepted by men in general. When someone says something ugly or disgusting and other men applaud or approve it and not one objects, it's hard to come away with any other impression. Well, let me give you another similar thing that makes me angry, and perhaps it will help. Some piece of human filth rapes a schoolgirl in Okinawa. The fact that this particular waste of oxygen happened to belong to the United States Marine Corps suddenly gave the press the excuse to tar everyone who happened to serve in Okinawa with the waste of flesh as child rapists. And what could those Marines say about it? Nothing. They were not allowed to defend themselves. Does that mean they approve of the behavior of the rapist? Of course not. Does their silence mean they approve of the press' characterization of them? Of course not. Does the fact that they did not allow the locals to put the rapist on trial mean they were defending him? Of COURSE not. But you can see how there would be that presumption. I cry reading these: Medal of Honor, scroll to the Korean War. I cry seeing the last helicopter leaving Vietnam. I can make a presentation to 1,000 people, but can't describe talking to a man who jumped from the bow of a tanker hit by lightning when he saw the deck rising up towards him, and lived, but the man next to him didn't, without falling apart completely. OK, I'm shaking. Really weird. Must get back to work. Later. Like maybe at lunchtime. I assume that the Marines on Okinawa at that time were UNDER ORDERS not to talk about it. Not really the same thing for men who aren't Marines remaining silent - or even applauding/condoning - abhorrent behaviors in other men.... I manage some things over at The Victory Caucus. One of the things I took care of was the Forums. More recently, we'd been the victims of p0rn spam. Some of those disgusting images included unclothed women peeing. I don't get it, but apparently it does something for someone... Luckily, I was able to have the admin shut the forums down because I just couldn't keep up with it anymore... In the spirit of all seriousness aside... I can't speak for anyone else, but if my SO attempted to do that to me, she'd be tied up in the garage. On a line which had a radius not to exceed the area of newspaper spread upon the floor. I suppose the part that amazes me is that such nonsense -is degradation still considered degrading?- is wide-spread enough to make it statistically significant enough to appear at the top of your google queries. As I initially said, frightening and confusing that there are half-bubble off plumb types in statistically significant numbers... I think the way some men treat women (i.e., like trash and with no respect) harkens back to the discussion we had about women and promiscuity. People have a way of being treated commensurate with the way they behave. And unfortunately, too many men see the Britney Spears wannabes as ALL women, rather than the ridiculously dysfunctional ones. We all suffer for the omnipresence of that representation in our society. It goes back to women being our own worst enemy. It's certainly not THE reason, or the only reason, nor does it absolve those with outdoor plumbing from their own problems and issues, but it's a definable point on the downward spiral. First person to ask a WDMB question was the pee query. So next girl, wanting to know WDMB buy me diamonds?, types in WDMB and sees the pee query pop up. WTF? And she clicks. So now google has 2 searches for the same thing, and only one for diamonds. And so on. I assume that the Marines on Okinawa at that time were UNDER ORDERS not to talk about it. Not really the same thing for men who aren't Marines remaining silent - or even applauding/condoning - abhorrent behaviors in other men.... My point exactly. Sometimes silence means something other than acceptance. Sometimes it just means there are other reasons not to respond. Because you can't reason a person out of something they didn't reason their way into. and And you can't punch someone through a computer screen. are actually more to the point. As a general rule, there's not much point with arguing with an idiot online (and for 100% clarity sake, I am NOT implying anyone here is an idiot). If they're not just merely trolling, then the odds are, if they say abhorrent things about women, other men speaking up about it isn't going to make them change, and could in fact, simply provoke more such statements. Now in a personal (meatspace) setting, if random dude says something abhorrent, odds are one or more men will shortly straighten him out. Which is why such statements don't really occur all that much in person (as opposed to online). I agree re the erosion of societal standards and mores, but isn't this exactly what the boomers wanted? Wasn't the 60s all about rejecting their parents societal standards so everyone could be free, groovy, and do whatever they wanted? Everything was permitted, drugs, unrestricted sex, etc. In the 70s, the boomers brought full hedonism to the fore. It wasn't called the "Me" generation for nothing. "If it feels good, do it" was the mantra. In the 80s, boomers figured out they weren't going to stay young forever, and that an endless party didn't make for much of a future. So the narcissists became yuppies and focused on material wealth and achievement, but again without much concern for morals or society standards. I find it hilarious that the boomers, now approaching retirement, finally are getting around to bemoaning the social and moral anarchy they themselves helped create. "Girls Gone Wild" behavior would not have been tolerated in their parents' day, but is little different from the "free love" attitude ushered in by the boomers themselves in the 60s and 70s. Also, the same boomers who now are talking about respect for the elderly, had no such respect as youths. Who came up with the idea of "Don't trust anyone over 30"? I look at all this and say "Duh!", what did you boomers think would be the end result of you actions? Or was the narcissism so all-pervasive that no-one really thought at all? My guess why "Why is my so mean to me?" is so prevalent is that the two sexes have different concepts of what nature of behavior = "mean". Certainly there's overlap, but equally certainly there is behavior that one partner thinks is mean that the other partner thinks is not - or doesn't even think of it at all. I look at all this and say "Duh!", what did you boomers think would be the end result of you actions? The Age of Aquarius. Well, not me, personally - even at my most teenaged and liberal I figured human nature was human nature - but many boomers did, in fact, believe that some basic change in humankind (astrological, evolutionary, whatever) had occurred that would make everything different. And better, of course. Which would make the answer to your second question: Or was the narcissism so all-pervasive that no-one really thought at all? Yes. However, the boomers didn't raise themselves. Back in the 60s and 70s when so many adults were wringing their hands over how the world was going to hell in a handbasket, cooler heads would remind us that every generation since the beginning of time had thought its elders had done everything wrong and the boomers were just following in that tradition, perhaps a little more enthusiastically. I found this reassuring until I realized that in previous generations the elders either laughed when their kids told them they were total screw-ups or they threw the kids out of the house. The baby boomers' elders, however, said, "You're right. Okay, kids, tell us what we should be doing instead." It was the parental equivalent of giving a 13-year-old the keys to the liquor cabinet and the car. The sad fact is that no one "grew up" a lot of the boomers so a lot of us have had - are still having - to grow ourselves up. If you think it's hard raising a kid right, try raising your 50-year-old self right. And, no, this isn't a "let's all blame the boomers' parents" claim. They had their reasons for being less firm (and probably less confident) than parents before them. Some were historical: like they had a brutal time with the Depression and WW2 and they wanted things easier for their kids. Some were demographic - we had them outnumbered and surrounded. Some were economic - many boomer's parents had a lot of money comparatively speaking so family discipline was no longer essential for family economic survival. And I suspect some of it had to do with science - when science is the deity it's harder to make an argument for values that have been time-tested and found to work but don't lend themselves easily to quantifiable formulas. I'm sure that's due to the efforts of some spammer. They spam links to some pr0n site in a thousand different forums, and if Google's algorithms aren't quite smart enough to pick up on it being spam, it rises to the top of the list. Miss Ladybug mentioned forum administration; I do that myself. Fortunately, there are some really good tools now, and with a certain amount of due diligence (like banning a few entire Russian/Ukranian networks whose total purpose for existing is spamming), I only have to deal with two or three a week. But back to the topic: I hang out on Glenn Sacks's site a lot, and as you can imagine, there are a lot of guys there who are pretty down on women. But in most cases, it's because they've been hurt very badly by a woman. They need to blow off some steam, and there are very few places these days where it's acceptable for a man to do that. Then, there are some who really are misogynist. And then some of them are just plain trolls. The interesting thing is that most of the trolls are women who come over to bait the men, which is the opposite of what you see across most of the Internet where this sort of thing comes up. What does this prove? Well, Cass talks about getting the impression from the Internet that most men don't care much for women. If you were to spend a lot of time on Feministing, though, you would get the impression that most women don't care for men. And you could get the same from Glenn's trolls. However, for every troll at Glenn's, there are at least two other female posters who will jump in and say that yes, they want to see true equality in divorce laws, and get rid of hiring quotas that favor women. And that they recognize that men in general, and husbands and fathers in particular, get pretty shabby treatment from the current popular culture. Let's not forget how many children are growing up in broken homes these days. If you're a male teenager, and you've never had a father figure in your life, and all you know about sex relations is from TV and movies, it would be easy to get the impression that being married means being neutered. Whose fault is this? How is a 14-year-old supposed to know different? Example from the other perspective: I've noticed a problem among many young women these days -- not all, certainly, but quite a few -- that they don't really think of men as human beings. Meaning that they don't think that men have feelings, and therefore, they don't have to worry about hurting men. Where did they learn that? Most likely from popular culture, and from what they were exposed to while they were growing up. If they didn't have strong parents to tell and demonstrate to them otherwise, then yes, they might just get that view. It's not their fault; when they are 8 or 10 or 12 years old, how are they supposed to know different? (And yeah, I'm pretty pessimistic on the future of gender relations in the West.) Finally, allow me to offer up Cousin Dave's Three Simple Rules for Women Asking Their Husbands To Do Stuff: 1. Don't ask your husband to do things at random times. Now, I'm not just talking about wanting the lawn mowed *right now* in the middle of the football game, although that's part of it. What I really mean is, when your husband is in the middle of doing some task, don't hit him with reminders of other tasks that need doing. Men are pretty single-task focused, especially if it's a difficult task. If I'm in the middle of fixing the car or cutting down a dead tree, and you ask me about something else, all you've succeeded in doing is breaking my concentration. I won't remember it once you walk away, and later we'll both be pissed because you will have to remind me again, and I'll resent being interrupted. Wait until I'm done with that task, and then we can go over other tasks. And under no circumstances do you walk up to your guy while he's in the middle of something and demand, "Haven't you got that done yet?" 2. Keep task requests down to a few at a time. Nobody likes to be barraged with a laundry list of things to do. If there really is a laundry list of things to be done, then the two of you need to organize it. Make an actual list, and then (this is important) figure out which things are top priority and which things will take a long time to do. If the front door needs to be refinished, and it has to be taken off the hinges to do, chances are it's going to take all day. Refinishing a door is a lot of work, and you can't very well stop for the night and sleep in a wide-open house. So if the vacuuming really needs to be done today, the front door will have to wait until tomorrow. 3. As Cass said, it works best if you keep task requests short and to the point. Once we've been reminded of the task that needs doing, it will most likely be obvious to us *why* it needs doing. If you give us a long-winded justification for why the task needs doing, it sounds like you're talking down to us. If there is a non-obvious explanation, do it like this: "I just threw some rotten vegetables into the trash. I know it's not full, but would you take it out anyway?" See, this way, you are asking us to do something on your behalf. That's much better than being told that we're too stupid to understand why it needs doing. 4. Okay, the fourth of the three rules (comfy chair!): If you have some insanely complicated way of doing something, you're on your own. I have been married to my dear lovely wife for 16 wonderful years, and yet I still do not understand how she sorts laundry. I always sorted laundry into whites, light colors, and dark colors. She sorts laundry into about 15 different piles, according to criteria that are unfathomable to me. Every one of these piles has subtle yet vitally important variations on exactly how they should be washed, dried, and folded. The upshot is this: I am responsible for my own underwear, socks, T-shirts, yard/housework clothes, and towels. The rest of the laundry is her problem. Women are huge multitaskers. My husband had to tell me the 'don't talk to me when I'm in the middle of something if you want my full attention" thing. I genuinely didn't understand b/c I can do 3 or 4 things at once. But when I'm tired or stressed my ability to do that is degraded, so I can also understand needing to do one thing at a time. So once he told me, I began trying to do things differently. With us, it's not so much me asking him to do things b/c I rarely do that. It's more me wanting to have a conversation or ask him his opinion on something. I don't mind being asked a question when I'm watching TV b/c I hate TV and only pay attention 1/2 way. It does surprise me, a bit, to hear you and Yu-Ain say you perceive being given a reason as 'talking down' to you. That is just so foreign to me. To me, that's a sign of respect: IOW, "I don't expect you to say 'how high' just because I say "jump". I'm not the boss of you, so if I want you to do something I need to give you a good reason." I dunno... I am not arguing that this is how it's perceived. I just don't understand WHY that's how it's perceived. At any rate, if I want the trash out I just take it myself. But my husband, if he's in the room, will almost invariably stop me and offer to do it. I don't expect him to - he just does it anyway. And I never have to remind or nag him. So I guess we are weird that way. Or else I am just extremely lucky. Cass talks about getting the impression from the Internet that most men don't care much for women. If you were to spend a lot of time on Feministing, though, you would get the impression that most women don't care for men. That is true. But is it reasonable to expect courtesy or rationality from a site like Feministing? It's a site created for women to marinate in resentment and nurse grievances. It attracts that kind of person but sites like that are hardly a big draw for most people because they have lives. Neither do I expect people to be reasonable or nice on overtly male sites, like ones that do nothing but post p0rn. It's not reasonable to expect to find guys who respect women (much less care what they think) on a site like that. I might not care for the way they talk about women, but I'd have to hear them first. Since I don't frequent that kind of site it's easy to avoid. What bothers me is encountering that kind of stuff on general purpose political sites with large, mixed sex audiences. When people (especially conservatives who pride themselves on their supposed moral superiority to liberals) say irrational and offensive things like 'all women are selfish/evil/stupid [fill in the blank]' in public, as it were, that seems different to me. I will admit to thinking people like that are still living in their mothers' basements, but there seems to be a disturbingly large number of these fellows about :p I will admit to thinking people like that are still living in their mothers' basements, but there seems to be a disturbingly large number of these fellows about :p Actually Ms. Cass, that's not mutually exclusive. If they're still living in their mothers' basements, then what else have they to do in the evenings except troll the internet. It does surprise me, a bit, to hear you and Yu-Ain say you perceive being given a reason as 'talking down' to you. That is just so foreign to me. It is foriegn. We were raised differently than girls were, we don't even share the same hormones (in the same ratios at least) nor the same chromosomes. Our brain chemistry is different. It will seem foriegn because it is. It's neither bad nor good, it just is. At any rate, if I want the trash out I just take it myself. But my husband, if he's in the room, will almost invariably stop me and offer to do it. I don't expect him to - he just does it anyway. That's the sign of a good man. It's also an advantage you ladies have over we neanderthals. As an experiment, pretend you are having difficulty lifting something heavy when there is a man nearby. If he instantly volunteers to carry it for you, he is a gentleman. If he does not immediately come to lift it for you, you can up the ante by saying "Excuse me, but this is too heavy for me, and you're so strong, would you mind moving this over there for me?" Batting of eyelashes is unnecessary. If he refuses, he's a less polite term for a burro. If he moves it, he's an average man. It does surprise me, a bit, to hear you and Yu-Ain say you perceive being given a reason as 'talking down' to you. That is just so foreign to me. I don't remember saying this. Certainly not on this thread. If I did somewhere else, I think it's an inexact characterisation. I don't mind being given the reason (though I don't particularly need it, not because you're "my boss" but because I *trust* that you have a good reason for it, and that's good enough for me unless I see a particular reason against it). I don't even mind being given the second and sometimes even third reason. I do mind the 16th reason. At this point it seems like you don't trust me that I am fully aware of the thing's importance. Post a comment To reduce comment spam, comments on older posts are put into moderation 5 days after the last activity. Comments with more than one link also go into moderation. If you don't see your comment after posting it, try refreshing the screen. If you still don't see it, your comment is probably in the moderation queue. | Mid | [
0.55011135857461,
30.875,
25.25
]
|
Belfast Giants’ Jordan Smotherman is the Elite League’s Player of Week 27. The 32-year old, who joined the Giants at the beginning of February, scored two key goals over the weekend as the Giants beat Glasgow on Friday before defending Read | Mid | [
0.581497797356828,
33,
23.75
]
|
*l - 3490*l - 6188*l. -11478*l Collect the terms in 48454763*x**2 - 4*x**3 + 48454764*x**2 - 96909527*x**2. -4*x**3 Collect the terms in 26 - 52 + 25 + 41*w. 41*w - 1 Collect the terms in 6*c**2 + 52*c - 12*c - 24*c - 16*c. 6*c**2 Collect the terms in 32712*h + 8*h**2 - 13*h**2 - 15*h**2 - 32712*h. -20*h**2 Collect the terms in 7768*x + 7747*x - 15486*x. 29*x Collect the terms in 278*t - 19 - 274*t + 33 - 14. 4*t Collect the terms in 10956*x + 8009*x + 5289*x. 24254*x Collect the terms in 92*x**2 - 34*x**2 - 22*x**2 - 33*x**2. 3*x**2 Collect the terms in 57*u + 68*u - 140*u - 7. -15*u - 7 Collect the terms in -5*x**2 + 184029*x**3 + 5*x**2 - 184017*x**3. 12*x**3 Collect the terms in 116*z**2 + 123*z**2 + 95 - 95 - 241*z**2. -2*z**2 Collect the terms in 450*p**2 - p + p + 533*p**2 - 1438*p**2 + 450*p**2. -5*p**2 Collect the terms in -15291 - 15297 - 15296 - m**3 + 17*m**3 + 45884. 16*m**3 Collect the terms in -210*r**2 - 812*r**2 - 856*r**2. -1878*r**2 Collect the terms in 172 - 66*g**2 - 82 - 43 - 47. -66*g**2 Collect the terms in -8 - 8 - 8 - 25*l**2 + 19 - 22*l**2 + 41*l**2. -6*l**2 - 5 Collect the terms in -729*o + 728*o + 3*o**2 + o**2 - 3*o**2 - 4*o**2. -3*o**2 - o Collect the terms in 16*b + 9 - 6*b + 14*b - 5*b + 6*b. 25*b + 9 Collect the terms in -13*w + 1 - 101*w**2 - 12*w**2 - 11*w. -113*w**2 - 24*w + 1 Collect the terms in 92311*v - 46163*v - 46154*v. -6*v Collect the terms in 5*w**2 + 12196*w**3 - 6084*w**3 - 5*w**2 - 6119*w**3. -7*w**3 Collect the terms in 1476*z**2 - 777*z**2 - 702*z**2. -3*z**2 Collect the terms in -12*g + 103*g + 125*g. 216*g Collect the terms in -284*n + 841*n - 280*n + 79*n**2 - 277*n. 79*n**2 Collect the terms in -123 - 5*y**3 + 3*y**3 - 52 - 4*y**3 - y**3. -7*y**3 - 175 Collect the terms in 618*o**3 + 4*o**3 + 925*o**3. 1547*o**3 Collect the terms in -5*l**3 - 60*l**3 - 57*l**3 + 75*l**3 - 54*l**3. -101*l**3 Collect the terms in -67*h - 5*h**2 - 3*h**2 - 30*h + 3*h**2. -5*h**2 - 97*h Collect the terms in -4481*j - 3806*j + 1354*j. -6933*j Collect the terms in -3 + 3 + 1 - 42576*d. -42576*d + 1 Collect the terms in 26675*x**3 - 79915*x**3 + 26633*x**3 + 26657*x**3. 50*x**3 Collect the terms in -4*z**2 - 2825182 + 0*z**2 + 2825182 + 3*z**2. -z**2 Collect the terms in -2 + 23*f**3 - 3 - 91*f**3 + 4. -68*f**3 - 1 Collect the terms in 1444*i**2 - 251*i**2 + 4*i - 4*i. 1193*i**2 Collect the terms in -9*i**3 - 7*i**3 + 18*i + 15*i - 1 - 1. -16*i**3 + 33*i - 2 Collect the terms in -652907*p + 652907*p - 5*p**2 + 24*p**2 + 9*p**2. 28*p**2 Collect the terms in 17 - 2 + 22*p + 10 - 28. 22*p - 3 Collect the terms in -4599514 + 9198977 - 2*t - 4599463. -2*t Collect the terms in -19*a - 20*a - 47*a - 4*a. -90*a Collect the terms in 468048*c + 8 - 468037*c + 14. 11*c + 22 Collect the terms in 40*j**2 + 15*j**2 + 26*j**2 - j. 81*j**2 - j Collect the terms in 109*h**3 - 251*h**3 - 238*h**3 - 197*h**3. -577*h**3 Collect the terms in 11 - 259*s**2 - 60*s**2 - 8 - 3. -319*s**2 Collect the terms in -83*n**2 + 223*n**2 - 138*n**2 - 77*n**2. -75*n**2 Collect the terms in 4*i - 1 + 19 - 22 - 5*i - 26. -i - 30 Collect the terms in 710 - 710 - 36*a. -36*a Collect the terms in -14*t**3 + 129 - 129 + 9*t**3 + 3*t**3. -2*t**3 Collect the terms in -164 + 164 + 113*i - 113*i - 10*i**3. -10*i**3 Collect the terms in -8289*r - 2 + 2457*r - 9624*r. -15456*r - 2 Collect the terms in -4*g**3 + 12*g**2 - 37*g**2 + 10*g**2 + 16*g**2 + g**2. -4*g**3 + 2*g**2 Collect the terms in 232*i - 38*i + 319*i - 72*i. 441*i Collect the terms in 3480*l**2 - 10455*l**2 + 3481*l**2 + 3483*l**2. -11*l**2 Collect the terms in 9*s**3 + 8*s**3 - 2*s**2 - 12 + 10*s**3. 27*s**3 - 2*s**2 - 12 Collect the terms in -12*a**2 - 159 - 7*a + 7*a + 159. -12*a**2 Collect the terms in 12 + 17*v**3 + 18*v**3 + 31*v**3 - 12 - 72*v**3. -6*v**3 Collect the terms in 16*d - 76 + 93 + 7*d - 22*d. d + 17 Collect the terms in 176*y**2 - 40*y**2 + 43*y**2. 179*y**2 Collect the terms in -b**3 + 7933 + 2*b - 2*b - 7933. -b**3 Collect the terms in 392*s**3 + 388*s**3 + 377*s**3 + 383*s**3 - 1538*s**3. 2*s**3 Collect the terms in -49*g**3 + 2*g**2 - 224*g**3 + 69*g**3. -204*g**3 + 2*g**2 Collect the terms in -6913*w**3 - 6908*w**3 + 20724*w**3 - 6912*w**3. -9*w**3 Collect the terms in -1 + 135*o**2 - 2 - 79*o**2 + 123*o**2. 179*o**2 - 3 Collect the terms in 72 - 20*o + 17*o + 6*o. 3*o + 72 Collect the terms in -146*u**2 + 400*u**2 + 319*u**2. 573*u**2 Collect the terms in -37 + 37 - 3*x**3 + 18*x - 18*x. -3*x**3 Collect the terms in 7*i**2 - 4*i**2 + 82*i**3 - 4*i**2 + 3*i - i**2. 82*i**3 - 2*i**2 + 3*i Collect the terms in -510*o**2 - 209*o**2 + 425*o**2 - 530*o**2. -824*o**2 Collect the terms in -5*r**2 + 48*r**3 - 55*r**3 + 26*r**3 - r**2. 19*r**3 - 6*r**2 Collect the terms in 12 + 15 - 3*s - 8. -3*s + 19 Collect the terms in -3*l + 2 + 4 + 29 + 13*l + 18. 10*l + 53 Collect the terms in 8*q + 16*q + 56 - 8*q. 16*q + 56 Collect the terms in -p**2 - 13*p**2 + 113127*p**3 + 4*p**2 - 113124*p**3. 3*p**3 - 10*p**2 Collect the terms in -10 - 7 + 54*g**3 + 15. 54*g**3 - 2 Collect the terms in -11298*z**3 + 3723*z**3 - 6399*z**3. -13974*z**3 Collect the terms in 160*s + 278*s + 164*s - 7. 602*s - 7 Collect the terms in -52511731*o**2 + 52511731*o**2 - 9*o**3. -9*o**3 Collect the terms in -84*a - 78*a - 79*a - 82*a + 318*a. -5*a Collect the terms in -3*n**2 + 3*n**2 - 20*n**2 + 39*n**2 - 5*n**2. 14*n**2 Collect the terms in 6*v**2 + 13*v**2 - v**3 + 16*v**2 - 65*v**2. -v**3 - 30*v**2 Collect the terms in 25069*r**3 - 50137*r**3 + 25065*r**3. -3*r**3 Collect the terms in -132*b**3 - 291*b**3 - 60*b**3 - 187*b**3. -670*b**3 Collect the terms in 14*l + 16*l - 9*l - 38*l + 18*l. l Collect the terms in 18*w + 3*w**2 + 1669 - 835 - 834. 3*w**2 + 18*w Collect the terms in -18*r - 349*r**2 - 99*r**2 + 18*r. -448*r**2 Collect the terms in -14 - 12 + 42 - 18 - 63*m. -63*m - 2 Collect the terms in -137*j - 36*j + 68*j - 121*j - 76*j. -302*j Collect the terms in i - 7*i - 113 + 2*i + 2*i - 20. -2*i - 133 Collect the terms in -4676*r**3 + 8266*r - 8266*r. -4676*r**3 Collect the terms in -319*d + 216*d + 177*d - 1. 74*d - 1 Collect the terms in 291*x - 575*x - 67*x**3 + 284*x. -67*x**3 Collect the terms in 14*z**3 - 12*z**3 - 5*z + 3*z**3. 5*z**3 - 5*z Collect the terms in 22*m + 20*m - 17*m. 25*m Collect the terms in -149*y**3 - 169*y**3 - 174*y**3 + 456*y**3. -36*y**3 Collect the terms in -334*x**3 - 303*x**3 + 666*x**3. 29*x**3 Collect the terms in 891*l**3 + 890*l**3 + 892*l**3 - 2679*l**3. -6*l**3 Collect the terms in 6 - 57*y**3 - 3 + 4. -57*y**3 + 7 Collect the terms in 14*o**3 + 35*o - 267*o - 13*o**3. o**3 - 232*o Collect the terms in -246*g - 201*g**2 + 202*g**2 + 287*g. g**2 + 41*g Collect the terms in 372*r**2 - 1168*r**2 + 419*r**2 + 370*r**2. -7*r**2 Collect the terms in 9149*i + 8671*i - 17818*i. 2*i Collect the terms in 5 - 9 - 20*k**2 + 2 + 33*k**2 + 27*k**2. 40*k**2 - 2 Collect the terms in -1234*k + 29214*k**3 - 29213*k**3 + 2463*k - 1229*k. k**3 Collect the terms in 0*h + 2*h**3 - 21*h**3 - 82*h**3 - 15*h**3 - 2*h. -116*h**3 - 2*h Collect the terms in 3 + 58*t**3 - 143*t**2 - 3 - 2*t + 143*t**2. 58*t**3 - 2*t Collect the terms in 1865*b**2 + 1860*b**2 + 1737*b**2 - 5466*b**2. -4*b**2 Collect the terms in 0*v**2 + 93*v**3 - 595*v + 595*v + 0*v**2. 93*v**3 Collect the terms in -58 - 5*h + h**2 + h**2 - h + 9*h + 6*h. 2*h**2 + 9*h - 58 Collect the terms in 15*i**3 + 26149*i - 13073*i - 13076*i. 15*i**3 Collect the terms in -127*c**3 - 10489 + 10489. -127*c**3 Collect the terms in 45*o - 14*o + 46*o. 77*o Collect the terms in 182988096*o**2 - 365976182*o**2 + 182988087*o**2. o**2 Collect the terms in 213*o**2 + 10*o**2 + 40*o**2. 263*o**2 Collect the terms in -1622*t - 1112*t - 956*t. -3690*t Collect the terms in 23 - 62 + 19 - 4*f + 17. -4*f - 3 Collect the terms in -13 - 20*x - 58*x + 735*x + 13. 657*x Collect the terms in 4*r**3 + r - 4*r**3 + 12*r**2 - 12*r**2 + 3*r**3. 3*r**3 + r Collect the terms in 6723 + 2213 - d + 3918. -d + 12854 Collect the terms in 155*s**3 - 26*s**2 + 26*s**2 - 314*s**3 + 162*s**3. 3*s**3 Collect the terms in -84*k**2 + 48*k**2 + 85*k**2 + 91*k**2 + 45*k**2. 185*k**2 Collect the terms in -12*c + 0 - 35*c**2 + 0 + 32*c**2 - 19*c. -3*c**2 - 31*c Collect the te | Low | [
0.48333333333333306,
25.375,
27.125
]
|
Ulloa late show keeps Foxes out in front as Arsenal stumble AFP17 Apr 2016 London (AFP) – Leonardo Ulloa’s penalty in the fifth-minute of stoppage-time rescued a point for 10-man Premier League leaders Leicester City in a dramatic 2-2 draw at home to West Ham United on Sunday that left the Foxes eight points clear at the top. England striker Jamie Vardy, who had given Leicester the lead with his 22nd league goal of the season, was controversially sent off by Jonathan Moss for what the referee ruled a deliberate dive in the box early in the second half as the forward tried to claim a penalty. It looked as if 10-man Leicester would cling on for all three points until, with six minutes left, Andy Carroll equalised from the penalty spot after Foxes captain Wes Morgan needlessly bundled over Winston Reid in the box. Two minutes later Aaron Cresswell gave visitors West Ham the lead at the King Power Stadium when he bent a sublime shot into the top corner. Leicester then thought they should have been awarded a penalty when defender Robert Huth was grabbed round the neck inside the Hammers’ box. But Moss was unmoved and it seemed the Foxes’ best chance of an equaliser had disappeared. Claudio Ranieri’s men, however, kept battling and in the 95th-minute of the match Moss, in what seemed a far less clear-cut case than the Huth incident, pointed to the spot following Carroll’s challenge on Jeffrey Schlupp. Ulloa held his nerve with a well-struck penalty and a frenetic match ended all square at 2-2, with Leicester still in pole position to be crowned champions of England for the first time in the Midlands club’s 132-year history. However, second-placed Tottenham Hotspur, chasing a first English title since 1961, will cut Leicester’s lead to just five points with four matches remaining if they win away to Stoke City on Monday. “Our performance was fantastic, this is our soul, we play every match with this, blood, heart and soul, it was magnificent,” he added. Arsenal’s bid to play in the Champions League for a 19th consecutive season suffered a setback after they were held to a 1-1 draw by London rivals Crystal Palace on Sunday. Alexis Sanchez headed the Gunners in front on the stroke of half-time but FA Cup semi-finalists Palace equalised nine minutes before the final whistle at the Emirates Stadium when Yannick Bolasie’s shot from the edge of the box somehow evaded Petr Cech at the Arsenal goalkeeper’s near post. The draw meant Arsene Wenger’s side failed to regain third place from Manchester City and were only four points in front of fifth-placed Manchester United, with just the top four clubs at the end of the season guaranteed Champions League football next term. “I don’t know how it works mathematically but we are too disappointed to think about the league, we have to think about the Champions League and fight to be in the Champions League,” Arsenal manager Wenger told the BBC. Sunday’s other Premier League match saw Liverpool move to within two points of the top six after a 2-1 win away to Bournemouth. Fresh from their Europa League quarter-final win over manager Jurgen Klopp’s former club Borussia Dortmund, Liverpool scored twice towards the end of the first half at Dean Court through Roberto Firmino and England striker Daniel Sturridge. Joshua King pulled a goal back in stoppage-time at the end of the match but it was too late for the Cherries, who nevertheless remain on course to avoid relegation. Klopp fielded a much-changed side, with Danny Ward in goal instead of Simon Mignolet, and afterwards the Reds boss said: “They’ve never played together. | Low | [
0.507936507936507,
28,
27.125
]
|
.tooltip { display: block !important; font-size: 85%; font-weight: normal; z-index: 10000; .tooltip-inner { background: #555; color: white; box-shadow: inset 0 0 0 1px rgba($theme-base, 0.05); border-radius: 6px; padding: $gutter-h ($gutter-w * 0.8); } .tooltip-arrow { display: none; } &[x-placement^="top"] { margin-bottom: 2px; } &[x-placement^="bottom"] { margin-top: 2px; } &[x-placement^="right"] { margin-left: 2px; } &[x-placement^="left"] { margin-right: 2px; } &.popover { $color: #f9f9f9; .popover-inner { background: $color; color: black; padding: 24px; border-radius: 5px; box-shadow: 0 5px 30px rgba(black, .1); } .popover-arrow { border-color: $color; } } &[aria-hidden='true'] { visibility: hidden; opacity: 0; transition: opacity .15s, visibility .15s; } &[aria-hidden='false'] { visibility: visible; opacity: 1; transition: opacity .15s; } } | Low | [
0.46517412935323305,
23.375,
26.875
]
|
President Donald Trump will head to West Virginia on Wednesday to deliver remarks at a fundraiser hosted by coal baron Bob Murray, underscoring the close relationship the coal industry has with the White House even as the industry steadily declines. The fundraiser comes in the middle of another turbulent month for coal, with Blackhawk Mining the latest company to file for Chapter 11 bankruptcy. Meanwhile, suffering Appalachian coal miners afflicted by black lung disease have been lobbying Congress this week, as coal jobs and benefits ebb away. Murray, CEO of Murray Energy, will host Trump in Wheeling, West Virginia, on Wednesday at a private fundraising committee reception. Attendees of the fundraiser include West Virginia Gov. Jim Justice (R), among other lawmakers. In a June letter from Murray requesting Justice’s attendance, the coal executive emphasized re-electing Trump. “The future of the coal industry and our family livelihoods depend on President Trump being re-elected,” Murray wrote. He also advised donations of at least $150 per attendee to the Trump Victory fundraising committee. The coal magnate is a long-time supporter of the president and has maintained ties with the administration. He has pushed for the rollback of environmental regulations through a “wish list” given to the administration, in addition to backing a bailout for struggling coal and nuclear plants. Trump in turn has repeatedly lauded “beautiful clean coal” as a key U.S. product. But coal’s grim trajectory is increasingly at odds with Trump’s rhetoric, even as he has repeatedly sought to rescue the industry. Market forces — namely, the dramatic rise of renewables and natural gas — have helped to push coal into a downward spiral, one confirmed by the government’s own figures. And the list of of coal companies declaring bankruptcy keeps growing. Eight major U.S. coal producers have filed for bankruptcy since November 2017, five of them this year. This includes Cloud Peak Energy, Blackjewel, and Cambrian. Last week, Blackhawk Mining became the latest to file for bankruptcy. While Blackhawk has said this will not affect its 2,800 employees, the company’s financial struggles are widely reflected across the industry. Meanwhile, coal workers are increasingly caught in the crossfire. Some companies have sought to void union contracts and walk away from pension obligations, moves that have seen success in court despite outcry from groups like United Mine Workers of America (UMWA). Many retired miners in particular are sick and unable to work after years of physical labor compounded by a condition known as coal workers’ pneumoconiosis, or black lung. That disease is caused by long-term exposure to coal dust and results in respiratory issues and declining lung function. There is currently no cure for black lung. Trump’s travels to coal country coincide with a trip by a large group of Appalachian miners to Washington, D.C., this week. Many have come to request that Congress bolster the Black Lung Disability Trust Fund, which has faced growing debt. That fund provides for miners when companies cannot, including when the corporations go bankrupt. A steadily-increasing tax on coal supported the fund but its higher rate expired last year and the trust fund’s debt is projected to be around $15 billion by 2050. Coal companies have meanwhile lobbied against raising the tax, as doing so impacts them financially. “Coal miners deserve better. They always have. I certainly hope that lawmakers will be listening this week,” wrote Tyler Hughes, a field director with the nonprofit Appalachian Voices, in a post this week foreshadowing the D.C. trip. Some lawmakers have sought to support the fund, including Reps. Bobby Scott (D-VA) and Alma Adams (D-NC), while Sen. Bob Casey (D-PA) has introduced a bill to help miners access the fund’s benefits. But Majority Leader Mitch McConnell (R-KY) will be critical for efforts to raise the tax and miners, as he has the power to push legislation forward in the Senate. Miners who met with the senator on Tuesday said they left the interaction disappointed. Many affected by black lung came attached to oxygen tanks in order to meet with McConnell, but they said he gave them only a few minutes of his time and made no guarantees about the disability fund. Their efforts have added to an argument made by environmental activists, that lawmakers should focus on protecting impacted communities as the country transitions away from fossil fuels. The Green New Deal framework emphasizes prioritizing frontline communities like coal miners through a “just transition,” all while working to rapidly decarbonize the U.S. economy to reach net-zero emissions. Unions have been split on the Green New Deal, citing concerns over jobs. But while miners desperately lobby lawmakers like McConnell for help, they worry time is running out — as coal companies continue moving towards bankruptcy, all workers, with or without black lung, will be impacted. And right now, all eyes are on Murray Energy, the only one of the original companies to still be paying dues into a miners’ pension plan established in 1974. That plan is set to collapse by 2022 unless stabilized by lawmakers. But if Murray Energy were to go under, that deadline could come sooner. It is unclear what role Trump might play in pushing to keep the company afloat should its financial situation decline to the point of bankruptcy. Historically, the president has taken to Twitter in an effort to show support for keeping coal plants alive. Trump’s allies have also doubled down on propping up coal companies. On Tuesday, Ohio Gov. Mike DeWine (R) signed legislation bailing out coal and nuclear plants, a measure supported by Trump. DeWine will be among the attendees at Wednesday’s Murray fundraiser. | Mid | [
0.553333333333333,
31.125,
25.125
]
|
1979 Western Wilderness Prices, Values and Specs Originating in 1971, Western Wilderness has been considered as constructer of quality truck camper for decades. Western Wilderness truck campers are designed as weekend vacationing products suited for fitting the beds of large pickup trucks. A recreational product company operating in the state of Washington for 27 years, Western Wilderness production concluded after the 1998 model year. | Low | [
0.492537313432835,
28.875,
29.75
]
|
Iris Harrell: The 2009 Fred Case Remodeling Entrepreneur of the Year “Secretly, I know that many entrepreneurs are unemployable, but we can make things happen. That’s our weakness and our strength.” —Iris Harrell, Harrell Remodeling Inc., Mountain View, Calif. Years before she first picked up a hammer, sketched out a bathroom, developed a P&L statement, or realized that she was stunningly good at creating jobs for others, Iris Harrell’s restless curiosity nearly got her fired “so many times,” she says. In hindsight, it was courage. At the time, it was radical. As a world history teacher in rural Virginia, wanting to better understand the culture in which her students lived, she infiltrated a Ku Klux Klan meeting “in a field somewhere, at night. And I passed!” she says, a realization that was almost as terrifying as the experience itself. In her next classroom, in nearby yet world-apart inner-city Richmond, she invited speakers from diverse religious backgrounds — Mormon missionaries, an atheist Unitarian minister, a Muslim — “anything to keep the students from jumping out of the windows.” Then onto a Navajo reservation in Arizona, her classroom a bare-bones Hogan and her 7th graders barely able to work at a 4th grade level. “Teaching was where I got my wide cultural understanding,” Harrell says. It also sparked her talent for finding the best in diverse groups of people, and helped prepare her for just about every adversity an entrepreneur might face, and then some. These range from Silicon Valley’s economic busts and booms (Harrell Remodeling’s revenue growth averaged 19% a year from 1986 until peaking at $11 million in 2007) to the sexism and homophobia that she sees simply as opportunities to educate, elevate, and bring understanding. “Iris has incredible grit and determination. She just doesn’t give up,” says Michael McCutcheon of McCutcheon Construction, a San Francisco Bay‑area peer. Others describe her as “fearless,” “driven by numbers, not emotions,” “decisive,” and “a master salesperson.” Yet this woman who didn’t discover her calling in remodeling until she was 32, and who built one of the most innovative companies in the industry, is beloved, not resented or feared. “She has lived a life of such quality and passion,” says Greg Stine, CEO of Polaris Marketing, who started working with HRI during the 2001-02 recession. “There were times I got paid to work with Iris and her team and I thought, ‘This is stealing; I should be paying them for teaching me.’” McDermaid Painting owner Gus Camolinga is a trade contractor to 25 builders but refers clients to Harrell Remodeling alone. “They’re the only company that I trust will deliver a good-quality product,” he says. “The price is premium, but Iris says what she’s going to do, and does what she says, and the end product is absolutely beautiful and you have no regrets,” says three-time client Victoria Klein. And HRI chief estimator Kathy Paul, who thinks of her work as “an archeological dig” (intellectual curiosity seems to be in the water), says that her 11 years at HRI are just the start of her career at the place where she fully intends to work until she retires, in part because she owns a stake in the company. All HRI employees, in fact, are employee-owners. Many others, including trade partners and clients, demonstrate a similarly intense loyalty not only to Harrell, but also to her company’s bottom line. Consider the following practices a starter list of reasons why. Observe, Learn, Do “Iris could do it anywhere. In Omaha or Boston or Midland, Texas, she would build a company that represents her core values, treats people well, and figures out what its customers need.” —Greg Stine, Polaris Marketing She did it in Dallas, in fact. In 1982, seven years after leaving the classroom to tour with a folk-rock band (she played bass and guitar) and, later, to work in the nonprofit arena, she became a licensed contractor. For four years, she and an all-woman carpentry team ran Iris F. Harrell Remodeling. Well, as with everything in Harrell’s life, the truth is more complex than that. In 1979, while living in Texas, she met Ann Benson, a librarian who “thought if you could read about it, you could do it,” Harrell says. Then with a master’s degree but already bored with her third career, she learned from Benson that she was within reach of two things she had always yearned for: a stable family life and a gratifying career. Growing up in Virginia, Harrell and her two brothers ping-ponged from town to country, as her father’s itinerant occupations (carpenter, farmer, storekeeper) clashed with her mother’s independence and entrepreneurism. Her mother eventually ran a successful beauty shop, but “when she started making more money than my father, it became an issue.” Her parents divorced in Harrell’s senior year of high school — the sixth school she had attended. Though she “had never even held a hammer” when she met Benson, the couple began to spend weekends working on their own home, as well as on the rental properties owned by Benson’s mother, Jane. “I checked out every book from the library I could find about home improvement,” Harrell says. She was a quick study and enjoyed the hands-on work, but her efforts to get a job — even an unpaid apprenticeship — in construction failed. “I gathered up all my courage to walk down to this union hall,” Harrell says. But she was shooed away because she was a woman. “So I walked back out of that hole and started making calls. I said, ‘I will work anywhere. I’ll drive your trucks. I’ll buy your materials,’ but nobody would give me the time of day.” | Mid | [
0.64390243902439,
33,
18.25
]
|
Q: Can't create table (errno:121) when importing mysql workbench export dump only on Linux I created a .sql dump file by exporting my tables using MySQL Workbench on a Windows machine. If I try to import that file again on Windows, everything works fine. If I try to import that file using mysql -u user -p TABLE < dumpfile.sql, I get a Can't create table (errno:121) error. The original tables were created by Hibernate. A table which causes the problem is this many-to-many relationship: CREATE TABLE USER_ITEM ( USERID int(11) NOT NULL, ITEMID int(11) NOT NULL, PRIMARY KEY (USERID,ITEMID), KEY FK_7ykraq12rrlicwxhjfs13re56 (ITEMID), CONSTRAINT FK_7ykraq12rrlicwxhjfs13re56 FOREIGN KEY (ITEMID) REFERENCES item (ID), CONSTRAINT FK_c8pcrsn7fey94ipgiy12g3d4e FOREIGN KEY (USERID) REFERENCES user (ID) ) ENGINE=InnoDB DEFAULT CHARSET=utf8; It seems like Hibernate and Workbench created an index on ITEMID which has the same foreign key as my first constraint. Why? And why causes this only a problem when importing my dump file on Linux but not on Windows using MySQL workbench? Can I just rename the first constraint's foreign key? A: It seems that there was a problem with my database. Recreating it solved that problem. | Mid | [
0.602409638554216,
37.5,
24.75
]
|
v0.6.6: date: 2015-09-21 changes: - add support for ts-node (formerly typescript-node) v0.6.5: date: 2015-07-22 changes: - add support for typescript 1.5 via typescript-node v0.6.4: date: 2015-07-07 changes: - add support for earlgrey v0.6.3: date: 2015-07-03 changes: - prefer babel/core to babel v0.6.2: date: 2015-05-20 changes: - update module list for iced coffee-script v0.6.1: date: 2015-05-20 changes: - Fix toml loader. v0.6.0: date: 2015-05-19 changes: - Combine fallbacks and loaders into `extensions`. - Provide implementation guidance. v0.5.1: date: 2015-03-01 changes: - Add support for CirruScript. v0.5.0: date: 2015-02-27 changes: - Refactor es6 support via Babel (formerly 6to5) v0.4.3: date: 2015-02-09 changes: - Switch support from typescript-require to typescript-register. v0.4.2: date: 2015-01-16 changes: - Add support for wisp. v0.4.1: date: 2015-01-10 changes: - Add support for 6to5 (es6) v0.4.0: date: 2014-01-09 changes: - Add support for fallback (legacy) modules - Add support for module configurations v0.3.10: date: 2014-12-17 changes: - Add support for json5. v0.3.9: date: 2014-12-08 changes: - Add support for literate iced coffee. v0.3.8: date: 2014-11-20 changes: - Add support for [cjsx](https://github.com/jsdf/coffee-react). v0.3.7: date: 2014-09-08 changes: - Add support for [TypeScript](http://www.typescriptlang.org/). v0.3.6: date: 2014-08-25 changes: - Add support for coffee.md. v0.3.5: date: 2014-07-03 changes: - Add support for jsx. v0.3.4: date: 2014-06-27 changes: - Make .js first jsVariant entry. v0.3.3: date: 2014-06-02 changes: - Fix casing on livescript dependency. v0.3.0: date: 2014-04-20 changes: - Simplify loading of coffee-script and iced-coffee-script. v0.2.0: date: 2014-04-20 changes: - Move module loading into rechoir. v0.1.0: date: 2014-04-20 changes: - Initial public release. | Mid | [
0.562899786780383,
33,
25.625
]
|
A NEW APPROACH For more than half a century, governments have aggressively pursued a disastrous “war on drugs” policy that criminalises a health problem and has only succeeded in making things worse. These policies are causing harm and are killing young people. It’s time for a complete re-think. But the old parties don’t have the courage to take this issue on. The Greens are leading a new, realistic and evidence-based approach to drug policy, one that reflects the reality of people’s’ choices to use drugs in Australia. In particular, we support pill testing at music festivals and in the community, the removal of sniffer dogs at music festivals and in our clubs, and regulating cannabis for adult use. The Greens’ drug policy revolution will restore this country’s reputation as a leader in innovative drug policy by treating drug use as the health issue that it is, rather than the criminal issue other parties think it is. Only The Greens care about having an honest conversation about drugs to minimise harm and save lives. | High | [
0.65648854961832,
32.25,
16.875
]
|
At Blessed Sacrament Catholic Church, we strive to build a welcoming environment in which the liturgy unites our diverse community. Christ continues his work of our redemption through the liturgy. We are all nourished by the Word and Sacrament, and are empowered to live our lives as a reflection of Christ's love. Through the liturgy, we are motivated to work for peace and justice. To our parishioners' needs, we offer a full array of opportunities for preparation and reception of the church’s sacraments. | Mid | [
0.6394230769230761,
33.25,
18.75
]
|
--- abstract: 'Representing single stellar populations, globular clusters (GCs) are relatively easy to model, thus providing powerful tools for studying the evolution of galaxies. This has been demonstrated for the blue compact galaxy ESO338-IG04. GC systems in galaxies may be fossils of starbursts and mergers. Thus studies of GCs in the local universe may add to our understanding of the formation and evolution of galaxies and the distant universe.' author: - 'G. Östlin' title: Globular Clusters in Blue Compact Galaxies as Tracers of the Starburst History --- Introduction – Globular cluster formation and destruction ========================================================= Globular clusters (GCs) are in general old stellar systems with masses $10^4$ to $10^7 M\odot$, and are believed to be among the first ingredients to form in the process of galaxy formation. Thus understanding how GCs form is vital for understanding how galaxies form. Extragalactic GC systems in e.g. elliptical (E) galaxies often have bimodal colour distributions, indicating the presence of populations with different metallicity and/or age. Studies of merging galaxies, e.g. the “Antennae” (Whitmore and Schweizer 1995) and NGC 7252 (Miller et al. 1997), have shown that these often contain young GC candidates in great numbers. These galaxies are believed to evolve into E galaxies as the merger remnants relax. The GC candidates in the more evolved mergers have redder colours indicating higher ages. Very young so-called “super star clusters” (SSCs) have been found in many starburst galaxies, including dwarfs (e.g. Meurer et al. 1995). The SSCs have properties which largely agree with those expected for young GCs, although the masses are quite uncertain, and are probably younger examples of the objects seen in the mergers. The triggering mechanism for the starbursts in the dwarfs that host SSCs is still an open question, but dwarf mergers are not ruled out. SSCs have also been found in the centres and circum-nuclear rings in giant barred spirals (e.g. Barth et al. 1995 and Kristen et al. 1997) In conclusion young globular cluster candidates are found in extreme and energetic environments indicating that they can only be formed under special conditions. The coeval formation of many GCs will require extreme conditions, e.g. very high pressures and gas densities (Elmegreen and Efremov, 1997), conditions which are fulfilled in mergers. Moreover, bars trigger gas flows and nuclear rings may be created by dynamical resonances, enhancing the density. A newly formed GC will not automatically become an old GC (like the ones in our Galaxy) as time goes by, but faces the risk of destruction and dissolution. Their ability to survive depends on their interaction with their environment, but also on their IMF. A galactic bar for instance is not a favourable place for GC survival since strong shocks will easily disrupt many young GCs. The conditions in mergers, and in particular dwarf galaxies may be more favourable for GC survival. Young and old GCs in ESO 338-IG04 ================================= ESO338-IG04 is a blue compact galaxy (BCG). A BCG is characterised by compact appearance and HII region like spectra indicating high star formation rates, and in general low chemical abundances. Most BCGs are dwarf galaxies that, for some reason, presently are undergoing starbursts. HST/WFPC2 images reveals that ESO338-IG04 hosts a very rich population of compact star clusters counting more than one hundred objects (Östlin et al. 1998). The centre is crowded with young SSCs, but in addition lots of intermediate age and old objects are found outside the starburst region (there might well be some in the centre as well but they drown in the light from young SSCs). Photometric modelling (using Salpeter and Miller-Scalo IMFs) indicates masses in the range $10^4$ to more than $ 10^7 M\odot$ and a wide range of ages, from a few Myr up to 10 Gyr (see Fig 1). The spread in ages is real and not caused by observational errors. Moreover, there are groupings in the age distribution indicating that the cluster formation history has not been continuous. Most apparent is of course the numerous very young and luminous SSCs, but perhaps even more interesting is the presence of one or two populations of massive GCs with age 2 to 5 Gyr. This population, when corrected for objects below the detection limit, shows that starburst progenitor had a specific frequency $S_N$ (a measure of the number of GCs relative to the host galaxy luminosity) comparable to those of giant Es. In addition there are old ($\ge 10$ Gyr) and 0.5 Gyr GCs present. Follow up spectroscopy of two GC candidates in ESO338-IG04 confirms the the results from photometry (Östlin et al. 1998c, in preparation). The dynamics and morphology of this galaxy indicates that a dwarf merger is responsible for the starburst (Östlin et al. 1998a, 1998b). Thus we have a splendid low luminosity ($M_B = -19$) counterpart of the giant mergers mentioned above. Even if young GCs of course may disrupt or dissolve, the presence of intermediate age GCs proves that GC formation is not a phenomenon that was isolated to the very earliest days of galaxy formation. SSCs are often found in BCGs which suggest that they might be a good laboratory for studying GC formation; and a closer look for aged GCs may provide important information on previous bursts. GCs as starburst fossils ======================== We have seen that objects which are likely to be young GCs have been found in galaxies which are starbursts and/or mergers. The presence of intermediate age GCs in ESO338-IG04 and somewhat aged objects in the merger remnants suggest that at least a considerable fraction of young GCs will survive. It is a general property of starbursts to reveal the presence of SSCs when studied at high spatial resolution. R136, the central cluster in 30 Dor., may [*perhaps*]{} be the closest example of a GC in the making. Even if not all SSCs become GCs, we can conclude that all newly formed GCs must have properties similar to SSCs. Moreover the coeval formation of many massive GCs would produce a starburst in itself. Let us illustrate this in a figure (Fig 2): A starburst leads to SSCs of which at least a fraction becomes GCs, and the reverse is also true, although SSCs may form also in bars, which however are hostile environments. Therefore the age distribution of the GC population can be used to infer the SSC, and thus starburst, history. It is also clear that mergers are capable of trigger starbursts, but we do not know yet if a merger is required for the occurrence of a global starburst in a galaxy. If that would be the case, GC populations could be used to trace the merger history of galaxies. Of course, the question marks in Fig. 2 must be straightened out before GCs can be used as general probes. Although GCs provide information on the starbursts history of galaxies, they do not necessarily tell us about the overall star formation history, afterall GC free galaxies exist. There is obviously two different modes of star formation: the “violent” starburst mode which favours cluster formation and the “quiet” mode that may still produce the bulk of the field stars in most galaxies (Van den Bergh 1998). In nearby galaxies the star formation history (SFH) of the field population can be studied through deep colour magnitude diagrams (cf. Tolstoy this volume). In most galaxies however one has to infer the overall SFH from the integrated stellar population. A GC is much easier to model because it represents a true single coeval (on the scale of a few Myrs) stellar population. Spectroscopy can be used to investigate metallicities to circumvent the age-metallicity degeneracy. Thus GCs can serve as excellent probes for unveiling the starburst history in moderately distant galaxies. But also a more complete picture of the GC content in local galaxies would provide important information. This might be of importance for interpreting deep surveys which often are biased towards starburst galaxies. Depending on how strong the connection to mergers will prove to be, GC populations may also be useful for studying the morphological and number evolution of the galaxy population. Barth A., Ho L., Filippenko A., Sargent W., 1995, AJ 110, 1009 Elmegreen B., Efremov Y., 1997, ApJ 480, 235 Kristen H., Jörsäter S., Lindblad P.O., Boksenberg A., 1997 A&A 328, 483 Östlin G., Bergvall N., Rönnback J., 1998a, A&A 335, 85 Östlin G., Amram P., Bergvall N., Masegosa J., Boulesteix J., 1998b, A&AS accepted Östlin G., Karlsson T., Bergvall N., 1999. in preparation Meurer G., Heckman T., Leitherer, Kinney, Robert, Garnett, 1995 AJ 110, 2665 Miller B., Whitmore B., Schweizer F., Fall M.,1997 AJ 114, 2381 van den Bergh S., 1998, ApJ 507, L39 Whitmore B., Schweizer F., 1995, AJ 109, 960 | Mid | [
0.648,
30.375,
16.5
]
|
Q: Query with current date and time I've built the following query to retrieve articles in Sharepoint: (-PublishingExpirationDate<yesterday OR EmptyEndDate:0) (PublishingStartDate<2015-09-29 OR EmptyStartDate:0) I read the syntax reference, but didn't find what I need: https://msdn.microsoft.com/EN-US/library/office/ff394606.aspx Is there a method to replace a hard coded date with today's date and time, instead of 'today', 'yesterday' or a date? A: Through KQL it is only possible to query by day ranges ie Today,yesterday etc. If you want to tune it further to limit results by exact current time, then you will have to use FQL instead. See this blog on the same. | Mid | [
0.636144578313253,
33,
18.875
]
|
The Charities Trust Font Size About the Trust The Club can trace its long tradition of donating to charitable causes back to at least 1915, but it was in the 1950s, as Hong Kong struggled to cope with post-war reconstruction and a massive influx of immigrants, that this role became integral to its operation. In 1955, the Club formally decided to devote its surplus each year to charity and community projects, and in 1959, a separate company, the Hong Kong Jockey Club (Charities) Ltd, was formed to administer donations. In 1993, a new entity was established, The Hong Kong Jockey Club Charities Trust, to reflect the evolving nature, scale and scope of donations. The Club's Charities Trust is one of the world's top ten charity donors. The Trust's substantial donations to the community are made possible by the Club's unique operational model which integrates racing, wagering, membership and philanthropy. The Club uses its surpluses generated by regulated betting to benefit Hong Kong people from all walks of life. Some 70% of the Club's net annual surpluses are donated to the Trust, enabling the Club to have played a significant role in the community's development over the years. Working with Government, non-governmental organisations (NGOs) and community partners, the Trust is committed to improving the quality of life of the people of Hong Kong, and providing immediate relief to those most in need. As a philanthropic organisation in its own right, the Trust also proactively identifies and initiates projects that anticipate future community and social needs. The Trust serves 10 principal areas of civic and social needs in its contributions: Strategic Themes While the Trust continues to fund a wide range of projects, it is placing special emphasis on four areas of strategic focus over the next three to five years: Annual Donation The Hong Kong Jockey Club Charities Trust has donated an average of over HK$2.8 billion a year to the community over the past decade by way of its own major initiatives and donations, supporting the projects of well over 150 charitable groups and organisations each year. In 2016/17, the total approved donations were HK$7.6 billion, benefiting 216 charitable and community projects. These included a special donation of HK$3.5 billion for the construction of the Hong Kong Palace Museum in celebration of the 20th Anniversary of the Hong Kong Special Administrative Region. | High | [
0.6666666666666661,
29.125,
14.5625
]
|
Peroxisome Proliferator-Activated Receptor-δ Supports the Metabolic Requirements of Cell Growth in TCRβ-Selected Thymocytes and Peripheral CD4+ T Cells. During T cell development, progenitor thymocytes undergo a large proliferative burst immediately following successful TCRβ rearrangement, and defects in genes that regulate this proliferation have a profound effect on thymus cellularity and output. Although the signaling pathways that initiate cell cycling and nutrient uptake after TCRβ selection are understood, less is known about the transcriptional programs that regulate the metabolic machinery to promote biomass accumulation during this process. In this article, we report that mice with whole body deficiency in the nuclear receptor peroxisome proliferator-activated receptor-δ (PPARδmut) exhibit a reduction in spleen and thymus cellularity, with a decrease in thymocyte cell number starting at the double-negative 4 stage of thymocyte development. Although in vivo DNA synthesis was normal in PPARδmut thymocytes, studies in the OP9-delta-like 4 in vitro system of differentiation revealed that PPARδmut double-negative 3 cells underwent fewer cell divisions. Naive CD4+ T cells from PPARδmut mice also exhibited reduced proliferation upon TCR and CD28 stimulation in vitro. Growth defects in PPAR-δ-deficient thymocytes and peripheral CD4+ T cells correlated with decreases in extracellular acidification rate, mitochondrial reserve, and expression of a host of genes involved in glycolysis, oxidative phosphorylation, and lipogenesis. By contrast, mice with T cell-restricted deficiency of Ppard starting at the double-positive stage of thymocyte development, although exhibiting defective CD4+ T cell growth, possessed a normal T cell compartment, pointing to developmental defects as a cause of peripheral T cell lymphopenia in PPARδmut mice. These findings implicate PPAR-δ as a regulator of the metabolic program during thymocyte and T cell growth. | High | [
0.703448275862068,
31.875,
13.4375
]
|
Q: What, exactly, makes SPECK and SIMON particularly suitable for IoT devices? For some IoT devices, the data that needs to be sent is confidential, and hence sending it in plain text is not acceptable. Therefore, I've been considering how to encrypt data sent between IoT devices. An article I recently read on the RFID Journal website mentions the NSA-developed SPECK and SIMON ciphers as particularly suited to IoT applications: NSA is making the ciphers [...] publicly available at no cost, as part of an effort to ensure security in the Internet of Things (IOT), in which devices are sharing data with others on the Internet. [...] NSA researchers developed SIMON and SPECK as an improvement on block cipher algorithms already in use that were, in most cases, designed for desktop computers or very specialized systems Why should I select a newer algorithm such as SIMON or SPECK for my IoT device, especially for applications where power is constrained (e.g. battery power only)? What are the benefits compared to other encryption systems such as AES? A: In "The Simon and Speck Block Ciphers on AVR 8-bit Microcontrollers" Beaulieu et al. investigate the implementation of SIMON and SPECK on a low-end 8-bit microcontroller and compare the performance to other cyphers. An Atmel ATmega128 is used with 128 Kbytes of programmable flash memory, 4 Kbytes of SRAM, and thirty-two 8-bit general purpose registers. Three encryption implementations are compared: RAM-minimizing These implementations avoid the use of RAM to store round keys by including the pre-expanded round keys in the flash program memory. No key schedule is included for updating this expanded key, making these implementations suitable for applications where the key is static. High-throughput/low-energy These implementations include the key schedule and unroll enough copies of the round function in the encryption routine to achieve a throughput within about 3% of a fully- unrolled implementation. The key, stored in flash, is used to generate the round keys which are subsequently stored in RAM. Flash-minimizing The key schedule is included here. Space limitations mean we can only provide an incomplete description of these implementations. However, it should be noted that the previous two types of implementations already have very modest code sizes. To compare different cyphers a performance efficiency measure - rank - is used. The rank is proportional to throughput divided by memory usage. SPECK ranks in the top spot for every block and key size which it supports. Except for the 128-bit block size, SIMON ranks second for all block and key sizes. ... Not surprisingly, AES-128 has very good performance on this platform, although for the same block and key size, SPECK has about twice the performance. For the same key size but with a 64-bit block size, SIMON and SPECK achieve two and four times better overall performance, respectively, than AES. Comparing SPECK 128/128 to AES-128 the authors find that the memory footprint of SPECK is significantly reduced (460 bytes vs. 970 bytes) while throughput is only slightly decreased (171 cycles/byte vs. 146 cycles/byte). Thus SPECK's performance (in the chosen metric) is higher than AES. Considering that speed is correlated with energy consumption the authors conclude that "AES-128 may be a better choice in energy critical applications than SPECK 128/128 on this platform." The authors however are uncertain whether heavy usage of RAM access (high-speed AES implementations) are more energy efficient than a register-based implementation of SPECK. In either case a significant reduction in flash memory usage can be achieved which might be of relevance on low-end microcontrollers. If an application requires high speed, and memory usage is not a priority, AES has the fastest implementation (using 1912 bytes of flash, 432 bytes RAM) among all block ciphers with a 128-bit block and key that we are aware of, with a cost of just 125 cycles/byte. The closest AES competitor is SPECK 128/128, with a cost of 138 cycles/byte for a fully unrolled implementation. Since speed is correlated with energy consumption, AES-128 may be a better choice in energy critical applications than SPECK 128/128 on this platform. However, if a 128-bit block is not required, as we might expect for many applications on an 8-bit microcontroller, then a more energy effcient solution (using 628 bytes of flash, 108 bytes RAM) is SPECK 64/128 with the same key size as AES-128 and an encryption cost of just 122 cycles/byte, or SPECK 64/96 with a cost of 118 cycles/byte. Additionally, this talk has an Enigma figure in it, who could resist a cypher that references Enigma? | High | [
0.712100139082058,
32,
12.9375
]
|
Shoolini University of Biotechnology and Management Sciences Shoolini University of Biotechnology and Management Sciences, also known simply as Shoolini University, is a private university located near Kasauli in Solan district, Himachal Pradesh, India. It is located 33 km from Chandigarh and 27 km from Shimla. The University is run under the aegis of Foundation of Life Sciences and Business Management. The university has been ranked '101-150' among Indian Universities by NIRF for the years 2017,2018 and 2019. It is also accredited by NAAC with a B++ grade. The university has received research projects from government bodies like DST, ICMR, DRDO, DAE, MNRE. They host one of the first commercial food testing laboratories in Himachal Pradesh. The University set up a Cancer Research Center in 2019. History Shoolini University was established in 2009 with approval from the University Grants Commission of India by the Foundation of Life Sciences and Business Management. Prior to this, the foundation had established SILB (Shoolini Institute of Lifesciences & Business Management). Academics Shoolini University has a research-driven model and they filed more than 100 patents in 2018. They have courses in Biotechnology, Management Sciences, Liberal Arts, Engineering, Sciences, and Pharmaceutical Sciences for undergraduate, postgraduate and Ph.D programmes. They also have courses for Agriculture, Mass Communication & Journalism, Hotel Management, Yoga Sciences, Disaster Management and Law. Accreditation Like all universities in India, Shoolini University is recognized by the University Grants Commission (UGC).The University also has accredition from the Pharmacy Council of India (PCI). In 2016, the National Assessment and Accreditation Council accredited the university as B++ (top 15% in India). Rankings Shoolini University of Biotechnology and Management Sciences was ranked in the 101–150 band among universities in India by the National Institutional Ranking Framework (NIRF) ranking in 2019, 30 in NIRF's Pharmacy ranking and 65 in NIRF's Management ranking. In 2018, the University was ranked in the 101-150 band among universities in India by NIRF and 30 in NIRF's Pharmacy ranking. Activities Tie-ups and associations Shoolini University has signed memorandum of understandings (MoU) with several international universities and organisations . Some of them are: University of Arkansas, United States Seoul National University Chung Yuan Christian University University of LA Verne, USA British Columbia Institute of Technology Bukovinian State Medical University, Ukraine Sprott Shaw College, Canada Ulster University Lanzhou University, China University of Suwon, South Korea Gachon University, South Korea Gwangju Institute of Science and Technology (GIST), South Korea Kabul University Consortium of Universities — 'One Belt, One Road' SPRINT and Guru Series of Lecture The University runs a program called SPRINT (Skill Programming Through Rapid and Intensive Training) which is a specialized program mandatory for all university students, with the aim of preparing them for interviews and job placements. In 2017, the University completed its 100th SPRINT. Named after the Paramahansa Yogananda, the university has initiated a lecture series under the banner of 'Guru Series of Lectures'. Luminaries from various fields are called to the institution to address the students and faculty on topics of their interest. Some of the speakers who have visited under this lecture series include Nobel Laureate Robert Huber, India's first woman IPS Officer Kiran Bedi, Yuvraj Singh , Vivek Mohan, Kamal Davar and World Food Prize winner Howarth Bouis. References Shoolini Engineering Scholarship Test External links Category:Private universities in India Category:Universities in Himachal Pradesh Category:Educational institutions established in 2009 Category:2009 establishments in India Category:Education in Solan district | High | [
0.668515950069348,
30.125,
14.9375
]
|
MINING This is the toughest environment earthmoving machines can operate in, with remote sites, difficult geological situations and often extreme meteorological conditions.Mining machinery, therefore needs to be reliable, durable and with a competitive cost per hour. To meet the needs of mining professionals, ITM has extended its undercarriage components range, developing a new series of track chains for mining dozers. Components are lab-tested up to 2000 hours, installed and then tested in the field to ensure enhanced performance and increased durability. CoNSTRUCTION The construction industry is probably the sector with the broadest range of applications: excavators, dozers, track mounted cranes and cranes with special attachments. The ITM product range includes greased tracks for next generation fast running excavators, angled track shoes and flat crane shoes for low ground pressure applications. Its sprockets, idlers and rollers are built to withstand high shock and impact loads on job sites to give long service life. ROAD BUILDING The road building industry presents two major applications for tracked vehicles: milling machines and paver machines. ITM supplies the leading manufacturers of milling and paver machines with complete track frames with rubber padded or PU padded shoes, which ensure low vibration of the running tracks, smooth operation and ease in relocating the machine. Most components are tailor-made to meet the client’s specific technical needs. ITM is currently working on complete new undercarriage systems with a damping function and short pitch track chains. AGRICuLTURE Different soil and extreme meteorological conditions are some of the difficulties experienced in this type of application, where during the harvest machines work 24 hours a day, 7 days a week. ITM works tirelessly to maximize the lifetime of its undercarriage parts as the market demands reduced maintenance time and increased number of worked hours. ITM’s innovative solutions include new lower rollers with H.T. technology called “Direct Differential Quenching” and new track chains with floating bushing (sealed and lubricated versions) for popular sugarcane harvester models, that guarantee 60% increase in working hours and 30% reduction in maintenance costs. FORESTRY Forestry machinery is designed to operate in particular weather conditions and on sloping, uneven ground. It is fitted with special tools to chop down trees and gather, load and transport logs. The undercarriages of these machines are often subjected to excessive stress, so ITM produces heavy duty components that are both highly resistant and durable.Its greased track chains, for example, reduce friction, prolong the life of the bushings, reduce noise and the risk of the joints blocking in cold weather. Special applications include the material handling sector for continuous ship unloaders, and scrapers and conveyors, bucket wheels excavators and mobile crushers. MARINE Reliability is the key factor for the marine industry and machinery needs to be able to handle heavy loads in tough conditions.The ITM team has designed and built several complete side frames to suit in tensioners as part of deck equipment for cable and pipe laying vessels. The equipment is able to load thousands of tons of cable or pipes into the carousel and maintain cable or pipe tension as they are laid on the seabed. The ITM team also has a range of rollers with special low friction bearing types and is currently developing new rollers with additional sealing specifically designed for the marine industry. HIGH SPEED TRANSPORT High speed train travel is rapidly becoming the most popular form of transport for short and medium range distances with Japanese, European and Chinese manufacturers leading the field. The braking system of high speed trains is one of the most critical, as the steel brake discs must take trains from 400 km/h to 0 km/h in just a few seconds. ITM’s brake discs are the product of steel processing know-how, analyses and simulations, the latest cutting-edge technology and strict controls to deliver a product that meets the most stringent quality standards. This website uses technical and third-party cookies to collect statistical information on users. To find out more and learn how to manage cookies, click here. If you continue browsing the website, going to other areas or selecting an item - for example, an image or a link - you thereby give your consent to the use of cookies and to the other profiling technologies we use. To hide this message, click here. | High | [
0.665071770334928,
34.75,
17.5
]
|
<?php /* * This file is part of PHPUnit. * * (c) Sebastian Bergmann <[email protected]> * * For the full copyright and license information, please view the LICENSE * file that was distributed with this source code. */ namespace PHPUnit\Framework; use ArrayAccess; use Countable; use DOMDocument; use DOMElement; use PHPUnit\Framework\Constraint\ArrayHasKey; use PHPUnit\Framework\Constraint\ArraySubset; use PHPUnit\Framework\Constraint\Attribute; use PHPUnit\Framework\Constraint\Callback; use PHPUnit\Framework\Constraint\ClassHasAttribute; use PHPUnit\Framework\Constraint\ClassHasStaticAttribute; use PHPUnit\Framework\Constraint\Constraint; use PHPUnit\Framework\Constraint\Count; use PHPUnit\Framework\Constraint\DirectoryExists; use PHPUnit\Framework\Constraint\FileExists; use PHPUnit\Framework\Constraint\GreaterThan; use PHPUnit\Framework\Constraint\IsAnything; use PHPUnit\Framework\Constraint\IsEmpty; use PHPUnit\Framework\Constraint\IsEqual; use PHPUnit\Framework\Constraint\IsFalse; use PHPUnit\Framework\Constraint\IsFinite; use PHPUnit\Framework\Constraint\IsIdentical; use PHPUnit\Framework\Constraint\IsInfinite; use PHPUnit\Framework\Constraint\IsInstanceOf; use PHPUnit\Framework\Constraint\IsJson; use PHPUnit\Framework\Constraint\IsNan; use PHPUnit\Framework\Constraint\IsNull; use PHPUnit\Framework\Constraint\IsReadable; use PHPUnit\Framework\Constraint\IsTrue; use PHPUnit\Framework\Constraint\IsType; use PHPUnit\Framework\Constraint\IsWritable; use PHPUnit\Framework\Constraint\JsonMatches; use PHPUnit\Framework\Constraint\LessThan; use PHPUnit\Framework\Constraint\LogicalAnd; use PHPUnit\Framework\Constraint\LogicalNot; use PHPUnit\Framework\Constraint\LogicalOr; use PHPUnit\Framework\Constraint\LogicalXor; use PHPUnit\Framework\Constraint\ObjectHasAttribute; use PHPUnit\Framework\Constraint\RegularExpression; use PHPUnit\Framework\Constraint\SameSize; use PHPUnit\Framework\Constraint\StringContains; use PHPUnit\Framework\Constraint\StringEndsWith; use PHPUnit\Framework\Constraint\StringMatchesFormatDescription; use PHPUnit\Framework\Constraint\StringStartsWith; use PHPUnit\Framework\Constraint\TraversableContains; use PHPUnit\Framework\Constraint\TraversableContainsOnly; use PHPUnit\Util\InvalidArgumentHelper; use PHPUnit\Util\Type; use PHPUnit\Util\Xml; use ReflectionClass; use ReflectionException; use ReflectionObject; use ReflectionProperty; use Traversable; /** * A set of assertion methods. */ abstract class Assert { /** * @var int */ private static $count = 0; /** * Asserts that an array has a specified key. * * @param int|string $key * @param array|ArrayAccess $array * @param string $message * * @throws ExpectationFailedException * @throws \SebastianBergmann\RecursionContext\InvalidArgumentException */ public static function assertArrayHasKey($key, $array, string $message = ''): void { if (!(\is_int($key) || \is_string($key))) { throw InvalidArgumentHelper::factory( 1, 'integer or string' ); } if (!(\is_array($array) || $array instanceof ArrayAccess)) { throw InvalidArgumentHelper::factory( 2, 'array or ArrayAccess' ); } $constraint = new ArrayHasKey($key); static::assertThat($array, $constraint, $message); } /** * Asserts that an array has a specified subset. * * @param array|ArrayAccess $subset * @param array|ArrayAccess $array * @param bool $strict Check for object identity * @param string $message * * @throws ExpectationFailedException * @throws \SebastianBergmann\RecursionContext\InvalidArgumentException */ public static function assertArraySubset($subset, $array, bool $strict = false, string $message = ''): void { if (!(\is_array($subset) || $subset instanceof ArrayAccess)) { throw InvalidArgumentHelper::factory( 1, 'array or ArrayAccess' ); } if (!(\is_array($array) || $array instanceof ArrayAccess)) { throw InvalidArgumentHelper::factory( 2, 'array or ArrayAccess' ); } $constraint = new ArraySubset($subset, $strict); static::assertThat($array, $constraint, $message); } /** * Asserts that an array does not have a specified key. * * @param int|string $key * @param array|ArrayAccess $array * @param string $message * * @throws ExpectationFailedException * @throws \SebastianBergmann\RecursionContext\InvalidArgumentException */ public static function assertArrayNotHasKey($key, $array, string $message = ''): void { if (!(\is_int($key) || \is_string($key))) { throw InvalidArgumentHelper::factory( 1, 'integer or string' ); } if (!(\is_array($array) || $array instanceof ArrayAccess)) { throw InvalidArgumentHelper::factory( 2, 'array or ArrayAccess' ); } $constraint = new LogicalNot( new ArrayHasKey($key) ); static::assertThat($array, $constraint, $message); } /** * Asserts that a haystack contains a needle. * * @param mixed $needle * @param mixed $haystack * @param string $message * @param bool $ignoreCase * @param bool $checkForObjectIdentity * @param bool $checkForNonObjectIdentity * * @throws ExpectationFailedException * @throws \SebastianBergmann\RecursionContext\InvalidArgumentException */ public static function assertContains($needle, $haystack, string $message = '', bool $ignoreCase = false, bool $checkForObjectIdentity = true, bool $checkForNonObjectIdentity = false): void { if (\is_array($haystack) || (\is_object($haystack) && $haystack instanceof Traversable)) { $constraint = new TraversableContains( $needle, $checkForObjectIdentity, $checkForNonObjectIdentity ); } elseif (\is_string($haystack)) { if (!\is_string($needle)) { throw InvalidArgumentHelper::factory( 1, 'string' ); } $constraint = new StringContains( $needle, $ignoreCase ); } else { throw InvalidArgumentHelper::factory( 2, 'array, traversable or string' ); } static::assertThat($haystack, $constraint, $message); } /** * Asserts that a haystack that is stored in a static attribute of a class * or an attribute of an object contains a needle. * * @param mixed $needle * @param string $haystackAttributeName * @param object|string $haystackClassOrObject * @param string $message * @param bool $ignoreCase * @param bool $checkForObjectIdentity * @param bool $checkForNonObjectIdentity * * @throws ExpectationFailedException * @throws \SebastianBergmann\RecursionContext\InvalidArgumentException */ public static function assertAttributeContains($needle, string $haystackAttributeName, $haystackClassOrObject, string $message = '', bool $ignoreCase = false, bool $checkForObjectIdentity = true, bool $checkForNonObjectIdentity = false): void { static::assertContains( $needle, static::readAttribute($haystackClassOrObject, $haystackAttributeName), $message, $ignoreCase, $checkForObjectIdentity, $checkForNonObjectIdentity ); } /** * Asserts that a haystack does not contain a needle. * * @param mixed $needle * @param mixed $haystack * @param string $message * @param bool $ignoreCase * @param bool $checkForObjectIdentity * @param bool $checkForNonObjectIdentity * * @throws ExpectationFailedException * @throws \SebastianBergmann\RecursionContext\InvalidArgumentException */ public static function assertNotContains($needle, $haystack, string $message = '', bool $ignoreCase = false, bool $checkForObjectIdentity = true, bool $checkForNonObjectIdentity = false): void { if (\is_array($haystack) || (\is_object($haystack) && $haystack instanceof Traversable)) { $constraint = new LogicalNot( new TraversableContains( $needle, $checkForObjectIdentity, $checkForNonObjectIdentity ) ); } elseif (\is_string($haystack)) { if (!\is_string($needle)) { throw InvalidArgumentHelper::factory( 1, 'string' ); } $constraint = new LogicalNot( new StringContains( $needle, $ignoreCase ) ); } else { throw InvalidArgumentHelper::factory( 2, 'array, traversable or string' ); } static::assertThat($haystack, $constraint, $message); } /** * Asserts that a haystack that is stored in a static attribute of a class * or an attribute of an object does not contain a needle. * * @param mixed $needle * @param string $haystackAttributeName * @param object|string $haystackClassOrObject * @param string $message * @param bool $ignoreCase * @param bool $checkForObjectIdentity * @param bool $checkForNonObjectIdentity * * @throws ExpectationFailedException * @throws \SebastianBergmann\RecursionContext\InvalidArgumentException */ public static function assertAttributeNotContains($needle, string $haystackAttributeName, $haystackClassOrObject, string $message = '', bool $ignoreCase = false, bool $checkForObjectIdentity = true, bool $checkForNonObjectIdentity = false): void { static::assertNotContains( $needle, static::readAttribute($haystackClassOrObject, $haystackAttributeName), $message, $ignoreCase, $checkForObjectIdentity, $checkForNonObjectIdentity ); } /** * Asserts that a haystack contains only values of a given type. * * @param string $type * @param iterable $haystack * @param null|bool $isNativeType * @param string $message * * @throws ExpectationFailedException * @throws \SebastianBergmann\RecursionContext\InvalidArgumentException */ public static function assertContainsOnly(string $type, iterable $haystack, ?bool $isNativeType = null, string $message = ''): void { if ($isNativeType === null) { $isNativeType = Type::isType($type); } static::assertThat( $haystack, new TraversableContainsOnly( $type, $isNativeType ), $message ); } /** * Asserts that a haystack contains only instances of a given class name. * * @param string $className * @param iterable $haystack * @param string $message * * @throws ExpectationFailedException * @throws \SebastianBergmann\RecursionContext\InvalidArgumentException */ public static function assertContainsOnlyInstancesOf(string $className, iterable $haystack, string $message = ''): void { static::assertThat( $haystack, new TraversableContainsOnly( $className, false ), $message ); } /** * Asserts that a haystack that is stored in a static attribute of a class * or an attribute of an object contains only values of a given type. * * @param string $type * @param string $haystackAttributeName * @param object|string $haystackClassOrObject * @param bool $isNativeType * @param string $message * * @throws ExpectationFailedException * @throws \SebastianBergmann\RecursionContext\InvalidArgumentException */ public static function assertAttributeContainsOnly(string $type, string $haystackAttributeName, $haystackClassOrObject, ?bool $isNativeType = null, string $message = ''): void { static::assertContainsOnly( $type, static::readAttribute($haystackClassOrObject, $haystackAttributeName), $isNativeType, $message ); } /** * Asserts that a haystack does not contain only values of a given type. * * @param string $type * @param iterable $haystack * @param null|bool $isNativeType * @param string $message * * @throws ExpectationFailedException * @throws \SebastianBergmann\RecursionContext\InvalidArgumentException */ public static function assertNotContainsOnly(string $type, iterable $haystack, ?bool $isNativeType = null, string $message = ''): void { if ($isNativeType === null) { $isNativeType = Type::isType($type); } static::assertThat( $haystack, new LogicalNot( new TraversableContainsOnly( $type, $isNativeType ) ), $message ); } /** * Asserts that a haystack that is stored in a static attribute of a class * or an attribute of an object does not contain only values of a given * type. * * @param string $type * @param string $haystackAttributeName * @param object|string $haystackClassOrObject * @param bool $isNativeType * @param string $message * * @throws ExpectationFailedException * @throws \SebastianBergmann\RecursionContext\InvalidArgumentException */ public static function assertAttributeNotContainsOnly(string $type, string $haystackAttributeName, $haystackClassOrObject, ?bool $isNativeType = null, string $message = ''): void { static::assertNotContainsOnly( $type, static::readAttribute($haystackClassOrObject, $haystackAttributeName), $isNativeType, $message ); } /** * Asserts the number of elements of an array, Countable or Traversable. * * @param int $expectedCount * @param Countable|iterable $haystack * @param string $message * * @throws ExpectationFailedException * @throws \SebastianBergmann\RecursionContext\InvalidArgumentException */ public static function assertCount(int $expectedCount, $haystack, string $message = ''): void { if (!$haystack instanceof Countable && !\is_iterable($haystack)) { throw InvalidArgumentHelper::factory(2, 'countable or iterable'); } static::assertThat( $haystack, new Count($expectedCount), $message ); } /** * Asserts the number of elements of an array, Countable or Traversable * that is stored in an attribute. * * @param int $expectedCount * @param string $haystackAttributeName * @param object|string $haystackClassOrObject * @param string $message * * @throws ExpectationFailedException * @throws \SebastianBergmann\RecursionContext\InvalidArgumentException */ public static function assertAttributeCount(int $expectedCount, string $haystackAttributeName, $haystackClassOrObject, string $message = ''): void { static::assertCount( $expectedCount, static::readAttribute($haystackClassOrObject, $haystackAttributeName), $message ); } /** * Asserts the number of elements of an array, Countable or Traversable. * * @param int $expectedCount * @param Countable|iterable $haystack * @param string $message * * @throws ExpectationFailedException * @throws \SebastianBergmann\RecursionContext\InvalidArgumentException */ public static function assertNotCount(int $expectedCount, $haystack, string $message = ''): void { if (!$haystack instanceof Countable && !\is_iterable($haystack)) { throw InvalidArgumentHelper::factory(2, 'countable or iterable'); } $constraint = new LogicalNot( new Count($expectedCount) ); static::assertThat($haystack, $constraint, $message); } /** * Asserts the number of elements of an array, Countable or Traversable * that is stored in an attribute. * * @param int $expectedCount * @param string $haystackAttributeName * @param object|string $haystackClassOrObject * @param string $message * * @throws ExpectationFailedException * @throws \SebastianBergmann\RecursionContext\InvalidArgumentException */ public static function assertAttributeNotCount(int $expectedCount, string $haystackAttributeName, $haystackClassOrObject, string $message = ''): void { static::assertNotCount( $expectedCount, static::readAttribute($haystackClassOrObject, $haystackAttributeName), $message ); } /** * Asserts that two variables are equal. * * @param mixed $expected * @param mixed $actual * @param string $message * @param float $delta * @param int $maxDepth * @param bool $canonicalize * @param bool $ignoreCase * * @throws ExpectationFailedException * @throws \SebastianBergmann\RecursionContext\InvalidArgumentException */ public static function assertEquals($expected, $actual, string $message = '', float $delta = 0.0, int $maxDepth = 10, bool $canonicalize = false, bool $ignoreCase = false): void { $constraint = new IsEqual( $expected, $delta, $maxDepth, $canonicalize, $ignoreCase ); static::assertThat($actual, $constraint, $message); } /** * Asserts that a variable is equal to an attribute of an object. * * @param mixed $expected * @param string $actualAttributeName * @param object|string $actualClassOrObject * @param string $message * @param float $delta * @param int $maxDepth * @param bool $canonicalize * @param bool $ignoreCase * * @throws ExpectationFailedException * @throws \SebastianBergmann\RecursionContext\InvalidArgumentException */ public static function assertAttributeEquals($expected, string $actualAttributeName, $actualClassOrObject, string $message = '', float $delta = 0.0, int $maxDepth = 10, bool $canonicalize = false, bool $ignoreCase = false): void { static::assertEquals( $expected, static::readAttribute($actualClassOrObject, $actualAttributeName), $message, $delta, $maxDepth, $canonicalize, $ignoreCase ); } /** * Asserts that two variables are not equal. * * @param mixed $expected * @param mixed $actual * @param string $message * @param float $delta * @param int $maxDepth * @param bool $canonicalize * @param bool $ignoreCase * * @throws ExpectationFailedException * @throws \SebastianBergmann\RecursionContext\InvalidArgumentException */ public static function assertNotEquals($expected, $actual, string $message = '', $delta = 0.0, $maxDepth = 10, $canonicalize = false, $ignoreCase = false): void { $constraint = new LogicalNot( new IsEqual( $expected, $delta, $maxDepth, $canonicalize, $ignoreCase ) ); static::assertThat($actual, $constraint, $message); } /** * Asserts that a variable is not equal to an attribute of an object. * * @param mixed $expected * @param string $actualAttributeName * @param object|string $actualClassOrObject * @param string $message * @param float $delta * @param int $maxDepth * @param bool $canonicalize * @param bool $ignoreCase * * @throws ExpectationFailedException * @throws \SebastianBergmann\RecursionContext\InvalidArgumentException */ public static function assertAttributeNotEquals($expected, string $actualAttributeName, $actualClassOrObject, string $message = '', float $delta = 0.0, int $maxDepth = 10, bool $canonicalize = false, bool $ignoreCase = false): void { static::assertNotEquals( $expected, static::readAttribute($actualClassOrObject, $actualAttributeName), $message, $delta, $maxDepth, $canonicalize, $ignoreCase ); } /** * Asserts that a variable is empty. * * @param mixed $actual * @param string $message * * @throws ExpectationFailedException * @throws \SebastianBergmann\RecursionContext\InvalidArgumentException */ public static function assertEmpty($actual, string $message = ''): void { static::assertThat($actual, static::isEmpty(), $message); } /** * Asserts that a static attribute of a class or an attribute of an object * is empty. * * @param string $haystackAttributeName * @param object|string $haystackClassOrObject * @param string $message * * @throws ExpectationFailedException * @throws \SebastianBergmann\RecursionContext\InvalidArgumentException */ public static function assertAttributeEmpty(string $haystackAttributeName, $haystackClassOrObject, string $message = ''): void { static::assertEmpty( static::readAttribute($haystackClassOrObject, $haystackAttributeName), $message ); } /** * Asserts that a variable is not empty. * * @param mixed $actual * @param string $message * * @throws ExpectationFailedException * @throws \SebastianBergmann\RecursionContext\InvalidArgumentException */ public static function assertNotEmpty($actual, string $message = ''): void { static::assertThat($actual, static::logicalNot(static::isEmpty()), $message); } /** * Asserts that a static attribute of a class or an attribute of an object * is not empty. * * @param string $haystackAttributeName * @param object|string $haystackClassOrObject * @param string $message * * @throws ExpectationFailedException * @throws \SebastianBergmann\RecursionContext\InvalidArgumentException */ public static function assertAttributeNotEmpty(string $haystackAttributeName, $haystackClassOrObject, string $message = ''): void { static::assertNotEmpty( static::readAttribute($haystackClassOrObject, $haystackAttributeName), $message ); } /** * Asserts that a value is greater than another value. * * @param mixed $expected * @param mixed $actual * @param string $message * * @throws ExpectationFailedException * @throws \SebastianBergmann\RecursionContext\InvalidArgumentException */ public static function assertGreaterThan($expected, $actual, string $message = ''): void { static::assertThat($actual, static::greaterThan($expected), $message); } /** * Asserts that an attribute is greater than another value. * * @param mixed $expected * @param string $actualAttributeName * @param object|string $actualClassOrObject * @param string $message * * @throws ExpectationFailedException * @throws \SebastianBergmann\RecursionContext\InvalidArgumentException */ public static function assertAttributeGreaterThan($expected, string $actualAttributeName, $actualClassOrObject, string $message = ''): void { static::assertGreaterThan( $expected, static::readAttribute($actualClassOrObject, $actualAttributeName), $message ); } /** * Asserts that a value is greater than or equal to another value. * * @param mixed $expected * @param mixed $actual * @param string $message * * @throws ExpectationFailedException * @throws \SebastianBergmann\RecursionContext\InvalidArgumentException */ public static function assertGreaterThanOrEqual($expected, $actual, string $message = ''): void { static::assertThat( $actual, static::greaterThanOrEqual($expected), $message ); } /** * Asserts that an attribute is greater than or equal to another value. * * @param mixed $expected * @param string $actualAttributeName * @param object|string $actualClassOrObject * @param string $message * * @throws ExpectationFailedException * @throws \SebastianBergmann\RecursionContext\InvalidArgumentException */ public static function assertAttributeGreaterThanOrEqual($expected, string $actualAttributeName, $actualClassOrObject, string $message = ''): void { static::assertGreaterThanOrEqual( $expected, static::readAttribute($actualClassOrObject, $actualAttributeName), $message ); } /** * Asserts that a value is smaller than another value. * * @param mixed $expected * @param mixed $actual * @param string $message * * @throws ExpectationFailedException * @throws \SebastianBergmann\RecursionContext\InvalidArgumentException */ public static function assertLessThan($expected, $actual, string $message = ''): void { static::assertThat($actual, static::lessThan($expected), $message); } /** * Asserts that an attribute is smaller than another value. * * @param mixed $expected * @param string $actualAttributeName * @param object|string $actualClassOrObject * @param string $message * * @throws ExpectationFailedException * @throws \SebastianBergmann\RecursionContext\InvalidArgumentException */ public static function assertAttributeLessThan($expected, string $actualAttributeName, $actualClassOrObject, string $message = ''): void { static::assertLessThan( $expected, static::readAttribute($actualClassOrObject, $actualAttributeName), $message ); } /** * Asserts that a value is smaller than or equal to another value. * * @param mixed $expected * @param mixed $actual * @param string $message * * @throws ExpectationFailedException * @throws \SebastianBergmann\RecursionContext\InvalidArgumentException */ public static function assertLessThanOrEqual($expected, $actual, string $message = ''): void { static::assertThat($actual, static::lessThanOrEqual($expected), $message); } /** * Asserts that an attribute is smaller than or equal to another value. * * @param mixed $expected * @param string $actualAttributeName * @param object|string $actualClassOrObject * @param string $message * * @throws ExpectationFailedException * @throws \SebastianBergmann\RecursionContext\InvalidArgumentException */ public static function assertAttributeLessThanOrEqual($expected, string $actualAttributeName, $actualClassOrObject, string $message = ''): void { static::assertLessThanOrEqual( $expected, static::readAttribute($actualClassOrObject, $actualAttributeName), $message ); } /** * Asserts that the contents of one file is equal to the contents of another * file. * * @param string $expected * @param string $actual * @param string $message * @param bool $canonicalize * @param bool $ignoreCase * * @throws ExpectationFailedException * @throws \SebastianBergmann\RecursionContext\InvalidArgumentException */ public static function assertFileEquals(string $expected, string $actual, string $message = '', bool $canonicalize = false, bool $ignoreCase = false): void { static::assertFileExists($expected, $message); static::assertFileExists($actual, $message); static::assertEquals( \file_get_contents($expected), \file_get_contents($actual), $message, 0, 10, $canonicalize, $ignoreCase ); } /** * Asserts that the contents of one file is not equal to the contents of * another file. * * @param string $expected * @param string $actual * @param string $message * @param bool $canonicalize * @param bool $ignoreCase * * @throws ExpectationFailedException * @throws \SebastianBergmann\RecursionContext\InvalidArgumentException */ public static function assertFileNotEquals(string $expected, string $actual, string $message = '', bool $canonicalize = false, bool $ignoreCase = false): void { static::assertFileExists($expected, $message); static::assertFileExists($actual, $message); static::assertNotEquals( \file_get_contents($expected), \file_get_contents($actual), $message, 0, 10, $canonicalize, $ignoreCase ); } /** * Asserts that the contents of a string is equal * to the contents of a file. * * @param string $expectedFile * @param string $actualString * @param string $message * @param bool $canonicalize * @param bool $ignoreCase * * @throws ExpectationFailedException * @throws \SebastianBergmann\RecursionContext\InvalidArgumentException */ public static function assertStringEqualsFile(string $expectedFile, string $actualString, string $message = '', bool $canonicalize = false, bool $ignoreCase = false): void { static::assertFileExists($expectedFile, $message); /** @noinspection PhpUnitTestsInspection */ static::assertEquals( \file_get_contents($expectedFile), $actualString, $message, 0, 10, $canonicalize, $ignoreCase ); } /** * Asserts that the contents of a string is not equal * to the contents of a file. * * @param string $expectedFile * @param string $actualString * @param string $message * @param bool $canonicalize * @param bool $ignoreCase * * @throws ExpectationFailedException * @throws \SebastianBergmann\RecursionContext\InvalidArgumentException */ public static function assertStringNotEqualsFile(string $expectedFile, string $actualString, string $message = '', bool $canonicalize = false, bool $ignoreCase = false): void { static::assertFileExists($expectedFile, $message); static::assertNotEquals( \file_get_contents($expectedFile), $actualString, $message, 0, 10, $canonicalize, $ignoreCase ); } /** * Asserts that a file/dir is readable. * * @param string $filename * @param string $message * * @throws ExpectationFailedException * @throws \SebastianBergmann\RecursionContext\InvalidArgumentException */ public static function assertIsReadable(string $filename, string $message = ''): void { static::assertThat($filename, new IsReadable, $message); } /** * Asserts that a file/dir exists and is not readable. * * @param string $filename * @param string $message * * @throws ExpectationFailedException * @throws \SebastianBergmann\RecursionContext\InvalidArgumentException */ public static function assertNotIsReadable(string $filename, string $message = ''): void { static::assertThat($filename, new LogicalNot(new IsReadable), $message); } /** * Asserts that a file/dir exists and is writable. * * @param string $filename * @param string $message * * @throws ExpectationFailedException * @throws \SebastianBergmann\RecursionContext\InvalidArgumentException */ public static function assertIsWritable(string $filename, string $message = ''): void { static::assertThat($filename, new IsWritable, $message); } /** * Asserts that a file/dir exists and is not writable. * * @param string $filename * @param string $message * * @throws ExpectationFailedException * @throws \SebastianBergmann\RecursionContext\InvalidArgumentException */ public static function assertNotIsWritable(string $filename, string $message = ''): void { static::assertThat($filename, new LogicalNot(new IsWritable), $message); } /** * Asserts that a directory exists. * * @param string $directory * @param string $message * * @throws ExpectationFailedException * @throws \SebastianBergmann\RecursionContext\InvalidArgumentException */ public static function assertDirectoryExists(string $directory, string $message = ''): void { static::assertThat($directory, new DirectoryExists, $message); } /** * Asserts that a directory does not exist. * * @param string $directory * @param string $message * * @throws ExpectationFailedException * @throws \SebastianBergmann\RecursionContext\InvalidArgumentException */ public static function assertDirectoryNotExists(string $directory, string $message = ''): void { static::assertThat($directory, new LogicalNot(new DirectoryExists), $message); } /** * Asserts that a directory exists and is readable. * * @param string $directory * @param string $message * * @throws ExpectationFailedException * @throws \SebastianBergmann\RecursionContext\InvalidArgumentException */ public static function assertDirectoryIsReadable(string $directory, string $message = ''): void { self::assertDirectoryExists($directory, $message); self::assertIsReadable($directory, $message); } /** * Asserts that a directory exists and is not readable. * * @param string $directory * @param string $message * * @throws ExpectationFailedException * @throws \SebastianBergmann\RecursionContext\InvalidArgumentException */ public static function assertDirectoryNotIsReadable(string $directory, string $message = ''): void { self::assertDirectoryExists($directory, $message); self::assertNotIsReadable($directory, $message); } /** * Asserts that a directory exists and is writable. * * @param string $directory * @param string $message * * @throws ExpectationFailedException * @throws \SebastianBergmann\RecursionContext\InvalidArgumentException */ public static function assertDirectoryIsWritable(string $directory, string $message = ''): void { self::assertDirectoryExists($directory, $message); self::assertIsWritable($directory, $message); } /** * Asserts that a directory exists and is not writable. * * @param string $directory * @param string $message * * @throws ExpectationFailedException * @throws \SebastianBergmann\RecursionContext\InvalidArgumentException */ public static function assertDirectoryNotIsWritable(string $directory, string $message = ''): void { self::assertDirectoryExists($directory, $message); self::assertNotIsWritable($directory, $message); } /** * Asserts that a file exists. * * @param string $filename * @param string $message * * @throws ExpectationFailedException * @throws \SebastianBergmann\RecursionContext\InvalidArgumentException */ public static function assertFileExists(string $filename, string $message = ''): void { static::assertThat($filename, new FileExists, $message); } /** * Asserts that a file does not exist. * * @param string $filename * @param string $message * * @throws ExpectationFailedException * @throws \SebastianBergmann\RecursionContext\InvalidArgumentException */ public static function assertFileNotExists(string $filename, string $message = ''): void { static::assertThat($filename, new LogicalNot(new FileExists), $message); } /** * Asserts that a file exists and is readable. * * @param string $file * @param string $message * * @throws ExpectationFailedException * @throws \SebastianBergmann\RecursionContext\InvalidArgumentException */ public static function assertFileIsReadable(string $file, string $message = ''): void { self::assertFileExists($file, $message); self::assertIsReadable($file, $message); } /** * Asserts that a file exists and is not readable. * * @param string $file * @param string $message * * @throws ExpectationFailedException * @throws \SebastianBergmann\RecursionContext\InvalidArgumentException */ public static function assertFileNotIsReadable(string $file, string $message = ''): void { self::assertFileExists($file, $message); self::assertNotIsReadable($file, $message); } /** * Asserts that a file exists and is writable. * * @param string $file * @param string $message * * @throws ExpectationFailedException * @throws \SebastianBergmann\RecursionContext\InvalidArgumentException */ public static function assertFileIsWritable(string $file, string $message = ''): void { self::assertFileExists($file, $message); self::assertIsWritable($file, $message); } /** * Asserts that a file exists and is not writable. * * @param string $file * @param string $message * * @throws ExpectationFailedException * @throws \SebastianBergmann\RecursionContext\InvalidArgumentException */ public static function assertFileNotIsWritable(string $file, string $message = ''): void { self::assertFileExists($file, $message); self::assertNotIsWritable($file, $message); } /** * Asserts that a condition is true. * * @param mixed $condition * @param string $message * * @throws ExpectationFailedException * @throws \SebastianBergmann\RecursionContext\InvalidArgumentException */ public static function assertTrue($condition, string $message = ''): void { static::assertThat($condition, static::isTrue(), $message); } /** * Asserts that a condition is not true. * * @param mixed $condition * @param string $message * * @throws ExpectationFailedException * @throws \SebastianBergmann\RecursionContext\InvalidArgumentException */ public static function assertNotTrue($condition, string $message = ''): void { static::assertThat($condition, static::logicalNot(static::isTrue()), $message); } /** * Asserts that a condition is false. * * @param mixed $condition * @param string $message * * @throws ExpectationFailedException * @throws \SebastianBergmann\RecursionContext\InvalidArgumentException */ public static function assertFalse($condition, string $message = ''): void { static::assertThat($condition, static::isFalse(), $message); } /** * Asserts that a condition is not false. * * @param mixed $condition * @param string $message * * @throws ExpectationFailedException * @throws \SebastianBergmann\RecursionContext\InvalidArgumentException */ public static function assertNotFalse($condition, string $message = ''): void { static::assertThat($condition, static::logicalNot(static::isFalse()), $message); } /** * Asserts that a variable is null. * * @param mixed $actual * @param string $message * * @throws ExpectationFailedException * @throws \SebastianBergmann\RecursionContext\InvalidArgumentException */ public static function assertNull($actual, string $message = ''): void { static::assertThat($actual, static::isNull(), $message); } /** * Asserts that a variable is not null. * * @param mixed $actual * @param string $message * * @throws ExpectationFailedException * @throws \SebastianBergmann\RecursionContext\InvalidArgumentException */ public static function assertNotNull($actual, string $message = ''): void { static::assertThat($actual, static::logicalNot(static::isNull()), $message); } /** * Asserts that a variable is finite. * * @param mixed $actual * @param string $message * * @throws ExpectationFailedException * @throws \SebastianBergmann\RecursionContext\InvalidArgumentException */ public static function assertFinite($actual, string $message = ''): void { static::assertThat($actual, static::isFinite(), $message); } /** * Asserts that a variable is infinite. * * @param mixed $actual * @param string $message * * @throws ExpectationFailedException * @throws \SebastianBergmann\RecursionContext\InvalidArgumentException */ public static function assertInfinite($actual, string $message = ''): void { static::assertThat($actual, static::isInfinite(), $message); } /** * Asserts that a variable is nan. * * @param mixed $actual * @param string $message * * @throws ExpectationFailedException * @throws \SebastianBergmann\RecursionContext\InvalidArgumentException */ public static function assertNan($actual, string $message = ''): void { static::assertThat($actual, static::isNan(), $message); } /** * Asserts that a class has a specified attribute. * * @param string $attributeName * @param string $className * @param string $message * * @throws ExpectationFailedException * @throws \SebastianBergmann\RecursionContext\InvalidArgumentException */ public static function assertClassHasAttribute(string $attributeName, string $className, string $message = ''): void { if (!self::isValidAttributeName($attributeName)) { throw InvalidArgumentHelper::factory(1, 'valid attribute name'); } if (!\class_exists($className)) { throw InvalidArgumentHelper::factory(2, 'class name', $className); } static::assertThat($className, new ClassHasAttribute($attributeName), $message); } /** * Asserts that a class does not have a specified attribute. * * @param string $attributeName * @param string $className * @param string $message * * @throws ExpectationFailedException * @throws \SebastianBergmann\RecursionContext\InvalidArgumentException */ public static function assertClassNotHasAttribute(string $attributeName, string $className, string $message = ''): void { if (!self::isValidAttributeName($attributeName)) { throw InvalidArgumentHelper::factory(1, 'valid attribute name'); } if (!\class_exists($className)) { throw InvalidArgumentHelper::factory(2, 'class name', $className); } static::assertThat( $className, new LogicalNot( new ClassHasAttribute($attributeName) ), $message ); } /** * Asserts that a class has a specified static attribute. * * @param string $attributeName * @param string $className * @param string $message * * @throws ExpectationFailedException * @throws \SebastianBergmann\RecursionContext\InvalidArgumentException */ public static function assertClassHasStaticAttribute(string $attributeName, string $className, string $message = ''): void { if (!self::isValidAttributeName($attributeName)) { throw InvalidArgumentHelper::factory(1, 'valid attribute name'); } if (!\class_exists($className)) { throw InvalidArgumentHelper::factory(2, 'class name', $className); } static::assertThat( $className, new ClassHasStaticAttribute($attributeName), $message ); } /** * Asserts that a class does not have a specified static attribute. * * @param string $attributeName * @param string $className * @param string $message * * @throws ExpectationFailedException * @throws \SebastianBergmann\RecursionContext\InvalidArgumentException */ public static function assertClassNotHasStaticAttribute(string $attributeName, string $className, string $message = ''): void { if (!self::isValidAttributeName($attributeName)) { throw InvalidArgumentHelper::factory(1, 'valid attribute name'); } if (!\class_exists($className)) { throw InvalidArgumentHelper::factory(2, 'class name', $className); } static::assertThat( $className, new LogicalNot( new ClassHasStaticAttribute($attributeName) ), $message ); } /** * Asserts that an object has a specified attribute. * * @param string $attributeName * @param object $object * @param string $message * * @throws ExpectationFailedException * @throws \SebastianBergmann\RecursionContext\InvalidArgumentException */ public static function assertObjectHasAttribute(string $attributeName, $object, string $message = ''): void { if (!self::isValidAttributeName($attributeName)) { throw InvalidArgumentHelper::factory(1, 'valid attribute name'); } if (!\is_object($object)) { throw InvalidArgumentHelper::factory(2, 'object'); } static::assertThat( $object, new ObjectHasAttribute($attributeName), $message ); } /** * Asserts that an object does not have a specified attribute. * * @param string $attributeName * @param object $object * @param string $message * * @throws ExpectationFailedException * @throws \SebastianBergmann\RecursionContext\InvalidArgumentException */ public static function assertObjectNotHasAttribute(string $attributeName, $object, string $message = ''): void { if (!self::isValidAttributeName($attributeName)) { throw InvalidArgumentHelper::factory(1, 'valid attribute name'); } if (!\is_object($object)) { throw InvalidArgumentHelper::factory(2, 'object'); } static::assertThat( $object, new LogicalNot( new ObjectHasAttribute($attributeName) ), $message ); } /** * Asserts that two variables have the same type and value. * Used on objects, it asserts that two variables reference * the same object. * * @param mixed $expected * @param mixed $actual * @param string $message * * @throws ExpectationFailedException * @throws \SebastianBergmann\RecursionContext\InvalidArgumentException */ public static function assertSame($expected, $actual, string $message = ''): void { if (\is_bool($expected) && \is_bool($actual)) { static::assertEquals($expected, $actual, $message); } static::assertThat( $actual, new IsIdentical($expected), $message ); } /** * Asserts that a variable and an attribute of an object have the same type * and value. * * @param mixed $expected * @param string $actualAttributeName * @param object|string $actualClassOrObject * @param string $message * * @throws ExpectationFailedException * @throws \SebastianBergmann\RecursionContext\InvalidArgumentException */ public static function assertAttributeSame($expected, string $actualAttributeName, $actualClassOrObject, string $message = ''): void { static::assertSame( $expected, static::readAttribute($actualClassOrObject, $actualAttributeName), $message ); } /** * Asserts that two variables do not have the same type and value. * Used on objects, it asserts that two variables do not reference * the same object. * * @param mixed $expected * @param mixed $actual * @param string $message * * @throws ExpectationFailedException * @throws \SebastianBergmann\RecursionContext\InvalidArgumentException */ public static function assertNotSame($expected, $actual, string $message = ''): void { if (\is_bool($expected) && \is_bool($actual)) { static::assertNotEquals($expected, $actual, $message); } static::assertThat( $actual, new LogicalNot( new IsIdentical($expected) ), $message ); } /** * Asserts that a variable and an attribute of an object do not have the * same type and value. * * @param mixed $expected * @param string $actualAttributeName * @param object|string $actualClassOrObject * @param string $message * * @throws ExpectationFailedException * @throws \SebastianBergmann\RecursionContext\InvalidArgumentException */ public static function assertAttributeNotSame($expected, string $actualAttributeName, $actualClassOrObject, string $message = ''): void { static::assertNotSame( $expected, static::readAttribute($actualClassOrObject, $actualAttributeName), $message ); } /** * Asserts that a variable is of a given type. * * @param string $expected * @param mixed $actual * @param string $message * * @throws ExpectationFailedException * @throws \SebastianBergmann\RecursionContext\InvalidArgumentException */ public static function assertInstanceOf(string $expected, $actual, string $message = ''): void { if (!\class_exists($expected) && !\interface_exists($expected)) { throw InvalidArgumentHelper::factory(1, 'class or interface name'); } static::assertThat( $actual, new IsInstanceOf($expected), $message ); } /** * Asserts that an attribute is of a given type. * * @param string $expected * @param string $attributeName * @param object|string $classOrObject * @param string $message * * @throws ExpectationFailedException * @throws \SebastianBergmann\RecursionContext\InvalidArgumentException */ public static function assertAttributeInstanceOf(string $expected, string $attributeName, $classOrObject, string $message = ''): void { static::assertInstanceOf( $expected, static::readAttribute($classOrObject, $attributeName), $message ); } /** * Asserts that a variable is not of a given type. * * @param string $expected * @param mixed $actual * @param string $message * * @throws ExpectationFailedException * @throws \SebastianBergmann\RecursionContext\InvalidArgumentException */ public static function assertNotInstanceOf(string $expected, $actual, string $message = ''): void { if (!\class_exists($expected) && !\interface_exists($expected)) { throw InvalidArgumentHelper::factory(1, 'class or interface name'); } static::assertThat( $actual, new LogicalNot( new IsInstanceOf($expected) ), $message ); } /** * Asserts that an attribute is of a given type. * * @param string $expected * @param string $attributeName * @param object|string $classOrObject * @param string $message * * @throws ExpectationFailedException * @throws \SebastianBergmann\RecursionContext\InvalidArgumentException */ public static function assertAttributeNotInstanceOf(string $expected, string $attributeName, $classOrObject, string $message = ''): void { static::assertNotInstanceOf( $expected, static::readAttribute($classOrObject, $attributeName), $message ); } /** * Asserts that a variable is of a given type. * * @param string $expected * @param mixed $actual * @param string $message * * @throws ExpectationFailedException * @throws \SebastianBergmann\RecursionContext\InvalidArgumentException */ public static function assertInternalType(string $expected, $actual, string $message = ''): void { static::assertThat( $actual, new IsType($expected), $message ); } /** * Asserts that an attribute is of a given type. * * @param string $expected * @param string $attributeName * @param object|string $classOrObject * @param string $message * * @throws ExpectationFailedException * @throws \SebastianBergmann\RecursionContext\InvalidArgumentException */ public static function assertAttributeInternalType(string $expected, string $attributeName, $classOrObject, string $message = ''): void { static::assertInternalType( $expected, static::readAttribute($classOrObject, $attributeName), $message ); } /** * Asserts that a variable is not of a given type. * * @param string $expected * @param mixed $actual * @param string $message * * @throws ExpectationFailedException * @throws \SebastianBergmann\RecursionContext\InvalidArgumentException */ public static function assertNotInternalType(string $expected, $actual, string $message = ''): void { static::assertThat( $actual, new LogicalNot( new IsType($expected) ), $message ); } /** * Asserts that an attribute is of a given type. * * @param string $expected * @param string $attributeName * @param object|string $classOrObject * @param string $message * * @throws ExpectationFailedException * @throws \SebastianBergmann\RecursionContext\InvalidArgumentException */ public static function assertAttributeNotInternalType(string $expected, string $attributeName, $classOrObject, string $message = ''): void { static::assertNotInternalType( $expected, static::readAttribute($classOrObject, $attributeName), $message ); } /** * Asserts that a string matches a given regular expression. * * @param string $pattern * @param string $string * @param string $message * * @throws ExpectationFailedException * @throws \SebastianBergmann\RecursionContext\InvalidArgumentException */ public static function assertRegExp(string $pattern, string $string, string $message = ''): void { static::assertThat($string, new RegularExpression($pattern), $message); } /** * Asserts that a string does not match a given regular expression. * * @param string $pattern * @param string $string * @param string $message * * @throws ExpectationFailedException * @throws \SebastianBergmann\RecursionContext\InvalidArgumentException */ public static function assertNotRegExp(string $pattern, string $string, string $message = ''): void { static::assertThat( $string, new LogicalNot( new RegularExpression($pattern) ), $message ); } /** * Assert that the size of two arrays (or `Countable` or `Traversable` objects) * is the same. * * @param Countable|iterable $expected * @param Countable|iterable $actual * @param string $message * * @throws ExpectationFailedException * @throws \SebastianBergmann\RecursionContext\InvalidArgumentException */ public static function assertSameSize($expected, $actual, string $message = ''): void { if (!$expected instanceof Countable && !\is_iterable($expected)) { throw InvalidArgumentHelper::factory(1, 'countable or iterable'); } if (!$actual instanceof Countable && !\is_iterable($actual)) { throw InvalidArgumentHelper::factory(2, 'countable or iterable'); } static::assertThat( $actual, new SameSize($expected), $message ); } /** * Assert that the size of two arrays (or `Countable` or `Traversable` objects) * is not the same. * * @param Countable|iterable $expected * @param Countable|iterable $actual * @param string $message * * @throws ExpectationFailedException * @throws \SebastianBergmann\RecursionContext\InvalidArgumentException */ public static function assertNotSameSize($expected, $actual, string $message = ''): void { if (!$expected instanceof Countable && !\is_iterable($expected)) { throw InvalidArgumentHelper::factory(1, 'countable or iterable'); } if (!$actual instanceof Countable && !\is_iterable($actual)) { throw InvalidArgumentHelper::factory(2, 'countable or iterable'); } static::assertThat( $actual, new LogicalNot( new SameSize($expected) ), $message ); } /** * Asserts that a string matches a given format string. * * @param string $format * @param string $string * @param string $message * * @throws ExpectationFailedException * @throws \SebastianBergmann\RecursionContext\InvalidArgumentException */ public static function assertStringMatchesFormat(string $format, string $string, string $message = ''): void { static::assertThat($string, new StringMatchesFormatDescription($format), $message); } /** * Asserts that a string does not match a given format string. * * @param string $format * @param string $string * @param string $message * * @throws ExpectationFailedException * @throws \SebastianBergmann\RecursionContext\InvalidArgumentException */ public static function assertStringNotMatchesFormat(string $format, string $string, string $message = ''): void { static::assertThat( $string, new LogicalNot( new StringMatchesFormatDescription($format) ), $message ); } /** * Asserts that a string matches a given format file. * * @param string $formatFile * @param string $string * @param string $message * * @throws ExpectationFailedException * @throws \SebastianBergmann\RecursionContext\InvalidArgumentException */ public static function assertStringMatchesFormatFile(string $formatFile, string $string, string $message = ''): void { static::assertFileExists($formatFile, $message); static::assertThat( $string, new StringMatchesFormatDescription( \file_get_contents($formatFile) ), $message ); } /** * Asserts that a string does not match a given format string. * * @param string $formatFile * @param string $string * @param string $message * * @throws ExpectationFailedException * @throws \SebastianBergmann\RecursionContext\InvalidArgumentException */ public static function assertStringNotMatchesFormatFile(string $formatFile, string $string, string $message = ''): void { static::assertFileExists($formatFile, $message); static::assertThat( $string, new LogicalNot( new StringMatchesFormatDescription( \file_get_contents($formatFile) ) ), $message ); } /** * Asserts that a string starts with a given prefix. * * @param string $prefix * @param string $string * @param string $message * * @throws ExpectationFailedException * @throws \SebastianBergmann\RecursionContext\InvalidArgumentException */ public static function assertStringStartsWith(string $prefix, string $string, string $message = ''): void { static::assertThat($string, new StringStartsWith($prefix), $message); } /** * Asserts that a string starts not with a given prefix. * * @param string $prefix * @param string $string * @param string $message * * @throws ExpectationFailedException * @throws \SebastianBergmann\RecursionContext\InvalidArgumentException */ public static function assertStringStartsNotWith($prefix, $string, string $message = ''): void { static::assertThat( $string, new LogicalNot( new StringStartsWith($prefix) ), $message ); } /** * Asserts that a string ends with a given suffix. * * @param string $suffix * @param string $string * @param string $message * * @throws ExpectationFailedException * @throws \SebastianBergmann\RecursionContext\InvalidArgumentException */ public static function assertStringEndsWith(string $suffix, string $string, string $message = ''): void { static::assertThat($string, new StringEndsWith($suffix), $message); } /** * Asserts that a string ends not with a given suffix. * * @param string $suffix * @param string $string * @param string $message * * @throws ExpectationFailedException * @throws \SebastianBergmann\RecursionContext\InvalidArgumentException */ public static function assertStringEndsNotWith(string $suffix, string $string, string $message = ''): void { static::assertThat( $string, new LogicalNot( new StringEndsWith($suffix) ), $message ); } /** * Asserts that two XML files are equal. * * @param string $expectedFile * @param string $actualFile * @param string $message * * @throws ExpectationFailedException * @throws \SebastianBergmann\RecursionContext\InvalidArgumentException */ public static function assertXmlFileEqualsXmlFile(string $expectedFile, string $actualFile, string $message = ''): void { $expected = Xml::loadFile($expectedFile); $actual = Xml::loadFile($actualFile); static::assertEquals($expected, $actual, $message); } /** * Asserts that two XML files are not equal. * * @param string $expectedFile * @param string $actualFile * @param string $message * * @throws ExpectationFailedException * @throws \SebastianBergmann\RecursionContext\InvalidArgumentException */ public static function assertXmlFileNotEqualsXmlFile(string $expectedFile, string $actualFile, string $message = ''): void { $expected = Xml::loadFile($expectedFile); $actual = Xml::loadFile($actualFile); static::assertNotEquals($expected, $actual, $message); } /** * Asserts that two XML documents are equal. * * @param string $expectedFile * @param DOMDocument|string $actualXml * @param string $message * * @throws ExpectationFailedException * @throws \SebastianBergmann\RecursionContext\InvalidArgumentException */ public static function assertXmlStringEqualsXmlFile(string $expectedFile, $actualXml, string $message = ''): void { $expected = Xml::loadFile($expectedFile); $actual = Xml::load($actualXml); static::assertEquals($expected, $actual, $message); } /** * Asserts that two XML documents are not equal. * * @param string $expectedFile * @param DOMDocument|string $actualXml * @param string $message * * @throws ExpectationFailedException * @throws \SebastianBergmann\RecursionContext\InvalidArgumentException */ public static function assertXmlStringNotEqualsXmlFile(string $expectedFile, $actualXml, string $message = ''): void { $expected = Xml::loadFile($expectedFile); $actual = Xml::load($actualXml); static::assertNotEquals($expected, $actual, $message); } /** * Asserts that two XML documents are equal. * * @param DOMDocument|string $expectedXml * @param DOMDocument|string $actualXml * @param string $message * * @throws ExpectationFailedException * @throws \SebastianBergmann\RecursionContext\InvalidArgumentException */ public static function assertXmlStringEqualsXmlString($expectedXml, $actualXml, string $message = ''): void { $expected = Xml::load($expectedXml); $actual = Xml::load($actualXml); static::assertEquals($expected, $actual, $message); } /** * Asserts that two XML documents are not equal. * * @param DOMDocument|string $expectedXml * @param DOMDocument|string $actualXml * @param string $message * * @throws ExpectationFailedException * @throws \SebastianBergmann\RecursionContext\InvalidArgumentException */ public static function assertXmlStringNotEqualsXmlString($expectedXml, $actualXml, string $message = ''): void { $expected = Xml::load($expectedXml); $actual = Xml::load($actualXml); static::assertNotEquals($expected, $actual, $message); } /** * Asserts that a hierarchy of DOMElements matches. * * @param DOMElement $expectedElement * @param DOMElement $actualElement * @param bool $checkAttributes * @param string $message * * @throws AssertionFailedError * @throws ExpectationFailedException * @throws \SebastianBergmann\RecursionContext\InvalidArgumentException */ public static function assertEqualXMLStructure(DOMElement $expectedElement, DOMElement $actualElement, bool $checkAttributes = false, string $message = ''): void { $tmp = new DOMDocument; $expectedElement = $tmp->importNode($expectedElement, true); $tmp = new DOMDocument; $actualElement = $tmp->importNode($actualElement, true); unset($tmp); static::assertEquals( $expectedElement->tagName, $actualElement->tagName, $message ); if ($checkAttributes) { static::assertEquals( $expectedElement->attributes->length, $actualElement->attributes->length, \sprintf( '%s%sNumber of attributes on node "%s" does not match', $message, !empty($message) ? "\n" : '', $expectedElement->tagName ) ); for ($i = 0; $i < $expectedElement->attributes->length; $i++) { $expectedAttribute = $expectedElement->attributes->item($i); $actualAttribute = $actualElement->attributes->getNamedItem( $expectedAttribute->name ); if (!$actualAttribute) { static::fail( \sprintf( '%s%sCould not find attribute "%s" on node "%s"', $message, !empty($message) ? "\n" : '', $expectedAttribute->name, $expectedElement->tagName ) ); } } } Xml::removeCharacterDataNodes($expectedElement); Xml::removeCharacterDataNodes($actualElement); static::assertEquals( $expectedElement->childNodes->length, $actualElement->childNodes->length, \sprintf( '%s%sNumber of child nodes of "%s" differs', $message, !empty($message) ? "\n" : '', $expectedElement->tagName ) ); for ($i = 0; $i < $expectedElement->childNodes->length; $i++) { static::assertEqualXMLStructure( $expectedElement->childNodes->item($i), $actualElement->childNodes->item($i), $checkAttributes, $message ); } } /** * Evaluates a PHPUnit\Framework\Constraint matcher object. * * @param mixed $value * @param Constraint $constraint * @param string $message * * @throws ExpectationFailedException * @throws \SebastianBergmann\RecursionContext\InvalidArgumentException */ public static function assertThat($value, Constraint $constraint, string $message = ''): void { self::$count += \count($constraint); $constraint->evaluate($value, $message); } /** * Asserts that a string is a valid JSON string. * * @param string $actualJson * @param string $message * * @throws ExpectationFailedException * @throws \SebastianBergmann\RecursionContext\InvalidArgumentException */ public static function assertJson(string $actualJson, string $message = ''): void { static::assertThat($actualJson, static::isJson(), $message); } /** * Asserts that two given JSON encoded objects or arrays are equal. * * @param string $expectedJson * @param string $actualJson * @param string $message * * @throws ExpectationFailedException * @throws \SebastianBergmann\RecursionContext\InvalidArgumentException */ public static function assertJsonStringEqualsJsonString(string $expectedJson, string $actualJson, string $message = ''): void { static::assertJson($expectedJson, $message); static::assertJson($actualJson, $message); static::assertThat($actualJson, new JsonMatches($expectedJson), $message); } /** * Asserts that two given JSON encoded objects or arrays are not equal. * * @param string $expectedJson * @param string $actualJson * @param string $message * * @throws ExpectationFailedException * @throws \SebastianBergmann\RecursionContext\InvalidArgumentException */ public static function assertJsonStringNotEqualsJsonString($expectedJson, $actualJson, string $message = ''): void { static::assertJson($expectedJson, $message); static::assertJson($actualJson, $message); static::assertThat( $actualJson, new LogicalNot( new JsonMatches($expectedJson) ), $message ); } /** * Asserts that the generated JSON encoded object and the content of the given file are equal. * * @param string $expectedFile * @param string $actualJson * @param string $message * * @throws ExpectationFailedException * @throws \SebastianBergmann\RecursionContext\InvalidArgumentException */ public static function assertJsonStringEqualsJsonFile(string $expectedFile, string $actualJson, string $message = ''): void { static::assertFileExists($expectedFile, $message); $expectedJson = \file_get_contents($expectedFile); static::assertJson($expectedJson, $message); static::assertJson($actualJson, $message); static::assertThat($actualJson, new JsonMatches($expectedJson), $message); } /** * Asserts that the generated JSON encoded object and the content of the given file are not equal. * * @param string $expectedFile * @param string $actualJson * @param string $message * * @throws ExpectationFailedException * @throws \SebastianBergmann\RecursionContext\InvalidArgumentException */ public static function assertJsonStringNotEqualsJsonFile(string $expectedFile, string $actualJson, string $message = ''): void { static::assertFileExists($expectedFile, $message); $expectedJson = \file_get_contents($expectedFile); static::assertJson($expectedJson, $message); static::assertJson($actualJson, $message); static::assertThat( $actualJson, new LogicalNot( new JsonMatches($expectedJson) ), $message ); } /** * Asserts that two JSON files are equal. * * @param string $expectedFile * @param string $actualFile * @param string $message * * @throws ExpectationFailedException * @throws \SebastianBergmann\RecursionContext\InvalidArgumentException */ public static function assertJsonFileEqualsJsonFile(string $expectedFile, string $actualFile, string $message = ''): void { static::assertFileExists($expectedFile, $message); static::assertFileExists($actualFile, $message); $actualJson = \file_get_contents($actualFile); $expectedJson = \file_get_contents($expectedFile); static::assertJson($expectedJson, $message); static::assertJson($actualJson, $message); $constraintExpected = new JsonMatches( $expectedJson ); $constraintActual = new JsonMatches($actualJson); static::assertThat($expectedJson, $constraintActual, $message); static::assertThat($actualJson, $constraintExpected, $message); } /** * Asserts that two JSON files are not equal. * * @param string $expectedFile * @param string $actualFile * @param string $message * * @throws ExpectationFailedException * @throws \SebastianBergmann\RecursionContext\InvalidArgumentException */ public static function assertJsonFileNotEqualsJsonFile(string $expectedFile, string $actualFile, string $message = ''): void { static::assertFileExists($expectedFile, $message); static::assertFileExists($actualFile, $message); $actualJson = \file_get_contents($actualFile); $expectedJson = \file_get_contents($expectedFile); static::assertJson($expectedJson, $message); static::assertJson($actualJson, $message); $constraintExpected = new JsonMatches( $expectedJson ); $constraintActual = new JsonMatches($actualJson); static::assertThat($expectedJson, new LogicalNot($constraintActual), $message); static::assertThat($actualJson, new LogicalNot($constraintExpected), $message); } public static function logicalAnd(): LogicalAnd { $constraints = \func_get_args(); $constraint = new LogicalAnd; $constraint->setConstraints($constraints); return $constraint; } public static function logicalOr(): LogicalOr { $constraints = \func_get_args(); $constraint = new LogicalOr; $constraint->setConstraints($constraints); return $constraint; } public static function logicalNot(Constraint $constraint): LogicalNot { return new LogicalNot($constraint); } public static function logicalXor(): LogicalXor { $constraints = \func_get_args(); $constraint = new LogicalXor; $constraint->setConstraints($constraints); return $constraint; } public static function anything(): IsAnything { return new IsAnything; } public static function isTrue(): IsTrue { return new IsTrue; } public static function callback(callable $callback): Callback { return new Callback($callback); } public static function isFalse(): IsFalse { return new IsFalse; } public static function isJson(): IsJson { return new IsJson; } public static function isNull(): IsNull { return new IsNull; } public static function isFinite(): IsFinite { return new IsFinite; } public static function isInfinite(): IsInfinite { return new IsInfinite; } public static function isNan(): IsNan { return new IsNan; } public static function attribute(Constraint $constraint, string $attributeName): Attribute { return new Attribute($constraint, $attributeName); } public static function contains($value, bool $checkForObjectIdentity = true, bool $checkForNonObjectIdentity = false): TraversableContains { return new TraversableContains($value, $checkForObjectIdentity, $checkForNonObjectIdentity); } public static function containsOnly(string $type): TraversableContainsOnly { return new TraversableContainsOnly($type); } public static function containsOnlyInstancesOf(string $className): TraversableContainsOnly { return new TraversableContainsOnly($className, false); } /** * @param int|string $key */ public static function arrayHasKey($key): ArrayHasKey { return new ArrayHasKey($key); } public static function equalTo($value, float $delta = 0.0, int $maxDepth = 10, bool $canonicalize = false, bool $ignoreCase = false): IsEqual { return new IsEqual($value, $delta, $maxDepth, $canonicalize, $ignoreCase); } public static function attributeEqualTo(string $attributeName, $value, float $delta = 0.0, int $maxDepth = 10, bool $canonicalize = false, bool $ignoreCase = false): Attribute { return static::attribute( static::equalTo( $value, $delta, $maxDepth, $canonicalize, $ignoreCase ), $attributeName ); } public static function isEmpty(): IsEmpty { return new IsEmpty; } public static function isWritable(): IsWritable { return new IsWritable; } public static function isReadable(): IsReadable { return new IsReadable; } public static function directoryExists(): DirectoryExists { return new DirectoryExists; } public static function fileExists(): FileExists { return new FileExists; } public static function greaterThan($value): GreaterThan { return new GreaterThan($value); } public static function greaterThanOrEqual($value): LogicalOr { return static::logicalOr( new IsEqual($value), new GreaterThan($value) ); } public static function classHasAttribute(string $attributeName): ClassHasAttribute { return new ClassHasAttribute($attributeName); } public static function classHasStaticAttribute(string $attributeName): ClassHasStaticAttribute { return new ClassHasStaticAttribute($attributeName); } public static function objectHasAttribute($attributeName): ObjectHasAttribute { return new ObjectHasAttribute($attributeName); } public static function identicalTo($value): IsIdentical { return new IsIdentical($value); } public static function isInstanceOf(string $className): IsInstanceOf { return new IsInstanceOf($className); } public static function isType(string $type): IsType { return new IsType($type); } public static function lessThan($value): LessThan { return new LessThan($value); } public static function lessThanOrEqual($value): LogicalOr { return static::logicalOr( new IsEqual($value), new LessThan($value) ); } public static function matchesRegularExpression(string $pattern): RegularExpression { return new RegularExpression($pattern); } public static function matches(string $string): StringMatchesFormatDescription { return new StringMatchesFormatDescription($string); } public static function stringStartsWith($prefix): StringStartsWith { return new StringStartsWith($prefix); } public static function stringContains(string $string, bool $case = true): StringContains { return new StringContains($string, $case); } public static function stringEndsWith(string $suffix): StringEndsWith { return new StringEndsWith($suffix); } public static function countOf(int $count): Count { return new Count($count); } /** * Fails a test with the given message. * * @param string $message * * @throws AssertionFailedError */ public static function fail(string $message = ''): void { self::$count++; throw new AssertionFailedError($message); } /** * Returns the value of an attribute of a class or an object. * This also works for attributes that are declared protected or private. * * @param object|string $classOrObject * @param string $attributeName * * @throws Exception * * @return mixed */ public static function readAttribute($classOrObject, string $attributeName) { if (!self::isValidAttributeName($attributeName)) { throw InvalidArgumentHelper::factory(2, 'valid attribute name'); } if (\is_string($classOrObject)) { if (!\class_exists($classOrObject)) { throw InvalidArgumentHelper::factory( 1, 'class name' ); } return static::getStaticAttribute( $classOrObject, $attributeName ); } if (\is_object($classOrObject)) { return static::getObjectAttribute( $classOrObject, $attributeName ); } throw InvalidArgumentHelper::factory( 1, 'class name or object' ); } /** * Returns the value of a static attribute. * This also works for attributes that are declared protected or private. * * @param string $className * @param string $attributeName * * @throws Exception * @throws ReflectionException * * @return mixed */ public static function getStaticAttribute(string $className, string $attributeName) { if (!\class_exists($className)) { throw InvalidArgumentHelper::factory(1, 'class name'); } if (!self::isValidAttributeName($attributeName)) { throw InvalidArgumentHelper::factory(2, 'valid attribute name'); } $class = new ReflectionClass($className); while ($class) { $attributes = $class->getStaticProperties(); if (\array_key_exists($attributeName, $attributes)) { return $attributes[$attributeName]; } $class = $class->getParentClass(); } throw new Exception( \sprintf( 'Attribute "%s" not found in class.', $attributeName ) ); } /** * Returns the value of an object's attribute. * This also works for attributes that are declared protected or private. * * @param object $object * @param string $attributeName * * @throws Exception * * @return mixed */ public static function getObjectAttribute($object, string $attributeName) { if (!\is_object($object)) { throw InvalidArgumentHelper::factory(1, 'object'); } if (!self::isValidAttributeName($attributeName)) { throw InvalidArgumentHelper::factory(2, 'valid attribute name'); } try { $attribute = new ReflectionProperty($object, $attributeName); } catch (ReflectionException $e) { $reflector = new ReflectionObject($object); while ($reflector = $reflector->getParentClass()) { try { $attribute = $reflector->getProperty($attributeName); break; } catch (ReflectionException $e) { } } } if (isset($attribute)) { if (!$attribute || $attribute->isPublic()) { return $object->$attributeName; } $attribute->setAccessible(true); $value = $attribute->getValue($object); $attribute->setAccessible(false); return $value; } throw new Exception( \sprintf( 'Attribute "%s" not found in object.', $attributeName ) ); } /** * Mark the test as incomplete. * * @param string $message * * @throws IncompleteTestError */ public static function markTestIncomplete(string $message = ''): void { throw new IncompleteTestError($message); } /** * Mark the test as skipped. * * @param string $message * * @throws SkippedTestError */ public static function markTestSkipped(string $message = ''): void { throw new SkippedTestError($message); } /** * Return the current assertion count. */ public static function getCount(): int { return self::$count; } /** * Reset the assertion counter. */ public static function resetCount(): void { self::$count = 0; } private static function isValidAttributeName(string $attributeName): bool { return \preg_match('/[a-zA-Z_\x7f-\xff][a-zA-Z0-9_\x7f-\xff]*/', $attributeName); } } | Low | [
0.5338645418326691,
33.5,
29.25
]
|
Q: Can not open mysql connection My SQL Connection is as follows : MySqlConnection mcon = new MySqlConnection("SERVER=mysql1.000webhost.com;DATABASE=a7232830_UsrAuth;UID=a7232830_UsrDet;PASSWORD=P@u!301094;"); while debugging it stops at mcon.Open(); and says An unhandled exception of type 'MySql.Data.MySqlClient.MySqlException' occurred in MySql.Data.dll Additional information: Unable to connect to any of the specified MySQL hosts. even after I had created a firewall permission allowing connections made by this process. A: On the website 000webhost.com you can't directly connect to MySQL (http://www.000webhost.com/faq.php?ID=27). If you want to get data from MySQL by using free account you should communicate via web service, e.g. you can use NuSOAP library to create web service. | Low | [
0.528985507246376,
27.375,
24.375
]
|
'''J.D.s''' was a queer [[punk]] [[zine]] founded in Toronto by [[G.B. Jones]] and co-published with [[Bruce LaBruce]]. '''J.D.s''' was a queer [[punk]] [[zine]] founded in Toronto by [[G.B. Jones]] and co-published with [[Bruce LaBruce]]. − " J.D.s is seen by many to be the catalyst that pushed the queercore scene into existence", writes Amy Spencer in ''DIY: The Rise Of Lo-Fi Culture''. '''J.D.s''' ran from 1985 to 1991, during which time eight issues were released. + " J.D.s is seen by many to be the catalyst that pushed the queercore scene into existence", writes [[Amy Spencer]] in ''[[DIY: The Rise Of Lo-Fi Culture]]''. '''J.D.s''' ran from 1985 to 1991, during which time eight issues were released. A [[Cut and Paste|cut and paste]], photocopied zine, it proved influential. After the release of the first few issues, the editors wrote a manifesto entitled "Don't Be Gay", which was featured in ''[[Maximum Rock 'N' Roll]]''. According to Amy Spencer, "The article appeared in February 1989 and simultaneously attacked both punk and gay subcultures. Following their article, a queer punk culture did begin to emerge." After the release of the first few issues, the editors wrote a manifesto entitled "Don't Be Gay", which was featured in ''[[Maximum Rock 'N' Roll]]''. According to Amy Spencer, "The article appeared in February 1989 and simultaneously attacked both punk and gay subcultures. Following their article, a queer punk culture did begin to emerge." Line 7: Line 9: '''J.D.s''' stood for 'Juvenile Delinquents'. The editors originally called their movement "homocore" but later replaced the word 'homo' with 'queer', to disassociate themselves completely from the confines of the gay and lesbian communities' orthodoxy. G.B. Jones, interviewed in ''DIY: The Rise Of Lo-Fi Culture'', says, "...we were just as eager to provoke the gays and lesbians as we were the punks." '''J.D.s''' stood for 'Juvenile Delinquents'. The editors originally called their movement "homocore" but later replaced the word 'homo' with 'queer', to disassociate themselves completely from the confines of the gay and lesbian communities' orthodoxy. G.B. Jones, interviewed in ''DIY: The Rise Of Lo-Fi Culture'', says, "...we were just as eager to provoke the gays and lesbians as we were the punks." − The zine featured the photos and the "Tom Girl" drawings of G.B. Jones, fiction by Bruce LaBruce, and the "J.D.s Top Ten Homocore Hits", a list of queer themed songs such as "Off-Duty Sailor" by The Dicks, "Only Loved At Night" by The Raincoats, "The Anal Staircase" by Coil, "I, Bloodbrothers Be" by Shockheaded Peters, ""Homophobia" by Victims Family, "(Gimme Gimme Gimme) My Man After Midnight by The Leather Nun and many others. Groups such as Anti-Scrunti Faction were featured in the zine. Contributors included [[Donny The Punk]], artist and zine editor [[Carrie McNinch]], comic artist and zine editor [[Anonymous Boy]], punk artist Regi Mentle, author [[Dennis Cooper]], performer and zine editor [[Vaginal Davis]] and zine editors Klaus and [[Jena von Brucker]]. + The zine featured the photos and the "Tom Girl" drawings of G.B. Jones, fiction by Bruce LaBruce, and the "J.D.s Top Ten Homocore Hits", a list of queer themed songs such as "Off-Duty Sailor" by The Dicks, "Only Loved At Night" by The Raincoats, "The Anal Staircase" by Coil, "I, Bloodbrothers Be" by Shockheaded Peters, ""Homophobia" by Victims Family, "(Gimme Gimme Gimme) My Man After Midnight" by The Leather Nun, and many others. Groups such as Anti-Scrunti Faction were featured in the zine. Contributors included comic artist and zine editor [[Anonymous Boy]], author [[Dennis Cooper]], performer and zine editor [[Vaginal Davis]], [[Donny The Punk]], artist and zine editor [[Carrie McNinch]], punk artist Regi Mentle, Tab Twain, and zine editors Klaus and [[Jena von Brucker]]. − In 1990, '''J.D.s''' released the first compilation of queercore songs, a cassette tape entitled ''J.D.s Top Ten Homocore Hit Parade Tape'' which featured songs by The Apostles, Academy 23, and No Brain Cells from the UK, Fifth Column from Canada, Bomb and Nicki Parasite (of The Parasites) from the U.S., and Gorse from New Zealand. + In 1990, '''J.D.s''' released the first compilation of queercore songs, a cassette tape entitled ''J.D.s Top Ten Tape'' which featured songs by The Apostles, Academy 23, and No Brain Cells from the UK, Fifth Column from Canada, Bomb and Nicki Parasite (of The Parasites) from the U.S., and Gorse (whose members included John, the editor of [[PMt]]) from New Zealand. + + Also in 1990, G.B. Jones and Bruce LaBruce began presenting '''J.D.s''' movie nights in London, San Francisco, Montreal and Toronto, with the editors and various contributors showing their low budget films made on Super 8 film. − Also in 1990, G.B. Jones and Bruce LaBruce began presenting '''J.D.s''' movie nights in London, San Francisco, Montreal and Toronto, with the editors and various contributors showing their low budget films made on Super 8. + In 1991 G.B. Jones and associates began a new fanzine called [[Double Bill]]. − In 1991, G.B. Jones and associates began a new fanzine called [[Double Bill]]. + ==Library holdings== + Complete runs of JDs are held by the GLBT Historical Society in San Francisco and the Canadian Lesbian and Gay Archives in Toronto. + + ==External Links== + *[http://www.lexander.co/jds.html ''J.D.s'' available at Lexander Gallery] + *[http://www.eastvillageboys.com/2008/12/13/gb-jones-girl-gone-wild/ G.B. Jones on The J.D.s Years from East Village Boys] Revision as of 08:52, 5 April 2011 " J.D.s is seen by many to be the catalyst that pushed the queercore scene into existence", writes Amy Spencer in DIY: The Rise Of Lo-Fi Culture. J.D.s ran from 1985 to 1991, during which time eight issues were released. A cut and paste, photocopied zine, it proved influential. After the release of the first few issues, the editors wrote a manifesto entitled "Don't Be Gay", which was featured in Maximum Rock 'N' Roll. According to Amy Spencer, "The article appeared in February 1989 and simultaneously attacked both punk and gay subcultures. Following their article, a queer punk culture did begin to emerge." J.D.s stood for 'Juvenile Delinquents'. The editors originally called their movement "homocore" but later replaced the word 'homo' with 'queer', to disassociate themselves completely from the confines of the gay and lesbian communities' orthodoxy. G.B. Jones, interviewed in DIY: The Rise Of Lo-Fi Culture, says, "...we were just as eager to provoke the gays and lesbians as we were the punks." The zine featured the photos and the "Tom Girl" drawings of G.B. Jones, fiction by Bruce LaBruce, and the "J.D.s Top Ten Homocore Hits", a list of queer themed songs such as "Off-Duty Sailor" by The Dicks, "Only Loved At Night" by The Raincoats, "The Anal Staircase" by Coil, "I, Bloodbrothers Be" by Shockheaded Peters, ""Homophobia" by Victims Family, "(Gimme Gimme Gimme) My Man After Midnight" by The Leather Nun, and many others. Groups such as Anti-Scrunti Faction were featured in the zine. Contributors included comic artist and zine editor Anonymous Boy, author Dennis Cooper, performer and zine editor Vaginal Davis, Donny The Punk, artist and zine editor Carrie McNinch, punk artist Regi Mentle, Tab Twain, and zine editors Klaus and Jena von Brucker. In 1990, J.D.s released the first compilation of queercore songs, a cassette tape entitled J.D.s Top Ten Tape which featured songs by The Apostles, Academy 23, and No Brain Cells from the UK, Fifth Column from Canada, Bomb and Nicki Parasite (of The Parasites) from the U.S., and Gorse (whose members included John, the editor of PMt) from New Zealand. Also in 1990, G.B. Jones and Bruce LaBruce began presenting J.D.s movie nights in London, San Francisco, Montreal and Toronto, with the editors and various contributors showing their low budget films made on Super 8 film. In 1991 G.B. Jones and associates began a new fanzine called Double Bill. Library holdings Complete runs of JDs are held by the GLBT Historical Society in San Francisco and the Canadian Lesbian and Gay Archives in Toronto. | Mid | [
0.538216560509554,
21.125,
18.125
]
|
CALLOUS lead thieves have targeted Red Cross House in Irvine – for the third time in six months. Their latest sick attempt to strip lead from the roof of the centre – which cares for some of the most vulnerable people in the community – came in the early hours of Monday. It was the second time in a fortnight they had struck at the centre in Tarryholme Drive. On previous occasions they took roofing lead leaving the centre with a £3000 headache. Their latest attempt centred on the library roof but they left empty-handed when a neighbour spotted lights on the roof and called the police. Lead and other metals on the roof are coated in special indelible anti-vandalism paint which stains skin on contact. The paint also alerts scrap dealers to the fact that the material has been stolen. Margaret Geddes, manager of the British Red Cross Options for Independence Centre, said: “This is the third time in six months and second time in a fortnight that we have been targeted by metal thieves taking lead from our roof. “In that time, we have had to spend more than £3000 on repairs – money which could have been better spent elsewhere. “Why anyone would target a Red Cross building where people are among the most vulnerable in society is beyond understanding. “As well as paying for repairs to the roof, we will now have to spend more money on anti-theft measures. “Obviously we are very grateful to the person who spotted the thieves on Monday and raised the alarm. “We are part of the fabric of the local community and it is heartening to know they are looking out for us.” | Low | [
0.536170212765957,
31.5,
27.25
]
|
Late last week, David Hornik of August Capital and Paul Graham of Y Combinator sat with Bloomberg WEST’s television arm to discuss the startup, fundraising, and technology landscapes. Given the prominence of the two men in those areas, their words carry weight and can drive market sentiment. Bloomberg was kind enough to transcribe the segment – which you can watch in its entirety here – and email us the notes. We’ve selected the key parts for your enjoyment, polishing the transcript lightly along the way. Pinterest Pinterest recently locked down $200 million in funding at a valuation of $2.5 billion. The round was long rumored, but still made waves when it was completed. Given the site’s rapid growth, and non-existent revenues, the usual fears about future monetization potentials are in full effect. From the clip, here’s our two investors [Bolding: TNW]: David Hornik: Ultimately, I know nothing about the internals of the company. What I do know is that it has captured the engagement of millions of people and has captured the attention and time of millions of people. And more importantly, around commerce. These are the things I bought, these are the things I like, these are the things I want to buy. If you can understand intent in commerce, you can make money from it. There is some opportunity. Do I think that $2.5 billion for a company that has zero dollars in revenue and is entirely a bet [..] feels a little rich […] I would not have made that bet. Paul Graham: If there is one guy in the world that I would trust with this social company that does not make any money and yet is valued at $2 billion, it would be him. That guy is not going to screw up. He is going to land this plane. You will see. I hereby predict. David’s point leads to Paul’s, in that for Paul to be correct, David has to be accurately describing Pinterest’s potential. The question becomes whether Pinterest can develop its revenue channels around consumer intent, while continuing to grow its user base. If it can, the rate of its revenue growth will determine when and if it can go public. The obvious next question is what ‘landing the plane’ looks like for Pinterest. Still, Graham, who noted in the segment that Pinterest’s Ben Silbermann is an alum of Y Combinator, was all but unqualified in his certainty of success. Valiant Capital Partners, the lead investor in its last round, agrees. This leads us to our next segment. Valuations $2.5 billion for Pinterest and a rising cadre of billion dollar firms – on private market paper – have lead some to cry foul on valuations, that they have lost touch with reality and reasonable business fundamentals. Following a discussion of the decline of Facebook’s valuation pre and post-IPO, David Hornik stated that he had expected paper valuations to decline. However, he states, they haven’t: [P]eople confuse these outrageous secondary market valuations for the actual value of the business. I would have thought that, then, that valuations would come back to earth. But they haven’t. This ties into his above statement: Pinterest’s last round was too “rich” for his tastes. However, while David might not want to participate in certain bets being made in favor of companies valued in the billions, that doesn’t mean that the opposite is true, as we will see next. Airbnb and Dropbox Airbnb and Dropbox both sport valuations in the billions. So, Hornik might be willing to make a counter wager? No: Paul Graham: I would be scared to bet against [the founders]. Put it that way. Would you? David Hornik: Bet against Drew? Chesky? No. Paul Graham: Exactly. If you really think that something is overpriced, you should be willing to bet against it. The concept of shorting a company by investing in its rivals may be a touch esoteric, but it has a ring of truth to it, given that investors of other asset classes employ similar methods regularly. It will be interesting to see how well the next set of technology companies that go public perform. If they stumble as Groupon and Zynga have, an icing of public investor sentiment for technology offerings could lead to a rippling decrease in valuations down the funding line. | Low | [
0.533190578158458,
31.125,
27.25
]
|
but on the wedding day , they also sign a divorce agreement which is effective one year after their marriage . | Low | [
0.299191374663072,
13.875,
32.5
]
|
For many in the IT industry, the dream is to set up a tech start-up and grow it into the next Google or Apple. Individual start-up scenes are thriving in EMEA, but from staffing to rent, exit potential to government support, there are huge differences between countries. But which country is right for your fledgling tech company? ZDNet examines some of the major hubs in the region, and what each can bring to the start-up table. A few years ago, when East London's rents meant would-be start-up CEOs could get office space for cheap not far from where they lived, near bars and coffee shops and 'edgy' street art, something of a tech cluster began to form. In 2010, the government got wind of the burgeoning start-up scene and rallied it into a press opportunity , rechristening the area Tech City and talking loudly about how the area had potential to one day rival Silicon Valley. Tech City may be an artificial construct – tech businesses were in the area before the government turned a grassroots movement into a bandwagon – but there's no denying the area is having a moment. It's now ranked as one of only two European start-up hubs among the top 20 worldwide, and the only one in the top 10, according to recent research by Startup Genome and Telefonica (PDF). "The start-up scene - if you compared it to, say, 2006 - is leaps and bounds different now. Six years ago, there wasn't the volume of service providers familiar with the kinds of deals that were being done, there wasn't enough acknowledgement of entrepreneurs, there wasn't enough media, there wasn't enough of co-location of start-ups so they could leverage each other learnings. Even though there were start-ups being created, the ecosystem wasn't as mature," Carlos Eduardo Espinal, partner at Seedcamp, says. The Tech City area – also known as Silicon Roundabout thanks to its proximity to the Old Street roundabout - is now home to several hundred fledgling tech businesses (although exactly how many hundred varies depending on who you listen to – figures from 200 to 600 have emerged ), as well as hundreds more digital outfits, including online marketers, social media gurus and web designers. "The start-up scene - if you compared it to, say, 2006 - is leaps and bounds different now" — Carlos Eduardo Espinal, Seedcamp A Petri dish for start-up talent There's a lot of young, enthusiastic digital and tech types who both live and work in the area, providing a ready workforce and something of a tech social scene - networking events and talking shops like the Silicon Drinkabout are all held on a regular basis. For those that like a pint and an idea-swapping session, that's all there to be had. (Although I've yet to meet a Tech City start-up worker who has actually admitted to going to one – East Londoners are too cool for networking.) When 10gen opened its first EMEA office, it decided to set up shop in Tech City, drawn by the community meet-ups, the proximity of customers, and the mix of people on its doorstep. "You can get talented people throughout London because people will commute in, but the advantage of Tech City is that it's self-selecting: you're getting people here who want to be involved in start-ups and want to be involved in new technology, and want to innovate. And that's not just from a tech point of view, it's also graphic design, media and all those other areas. The area is a magnet for that," Alvin Richards, 10gen's technical director for EMEA, says. Among the more familiar digital names around Tech City are the likes of Mind Candy (the company behind the tween entertainment juggernaut Moshi Monsters), gadget vendors Firebox, custom printers Moo, and enterprise collaboration platform and G-Cloud favourite Huddle. The big boys move in Thanks to David Cameron's PR blitz – which shone a spotlight on the area if little else – the neighbourhood's profile has been raised no end, and it's now attracting technology's bigger boys: Amazon , Microsoft, Twitter and Google have all opened offices there. "There just isn't enough space - once you get into that middle space, you're moving out, basically" — Tom Adeyoola, Metail But while the boom in tech companies - particularly at the larger end of the scale - moving to Tech City has helped cement its reputation as a serious contender for Europe's start-up capital, it has also caused a shortage of office space and had a knock-on effect on the cost of rent, potentially putting off the small businesses that made the area desirable in the first place. Retail start-up Metail saw the price of office square footage rise by 50 percent in little over a year. "If you're a company that has grown beyond being five to 10 people, the next phase is a 2,000 square foot office, and there just aren't any in the area... Several other people I know, also looking in the sweet spot of 2,000 to 3,000 square feet, have all left the area. There just isn't enough space - once you get into that middle space, you're moving out, basically," Tom Adeyoola, CEO of Metail, says. One option for the office-less is the growing number of co-working spaces and start-up hubs that have sprung up in Tech City areas aimed at London tech start-ups, including White Bear Yard, the Trampery and Tech Hub. There's also Google's Campus: opened in May , the seven-storey centre provides office space to start-ups, hosts events and holds mentoring programmes where Googlers share the benefit of their experience. Read this Is Poland the best place to start your start-up? For those wanting to set up a tech company, there's a lot to consider. ZDNet takes a look at some of the major start-up hubs in EMEA and what each can bring for those wanting to get their own IT business off the ground. Next up: Central and Eastern Europe. Read More For those that have, or want, to look beyond Tech City, there are shared working spaces elsewhere in the city – Innovation Warehouse, for example. And, for those looking beyond London, there's also the possibility of Cambridge – arguably the UK's second tech city - less than an hour away by train. "We have kept our technology operations in Cambridge and not merged our offices because there's a better talent pool up there. Cambridge is definitely cheaper [for hiring staff], and we can great really great talent out of the universities. The closeness to universities is key for talent acquisition, and Silicon Roundabout doesn't have that connection," Adeyoola says. For those with hiring on their mind, Tech City has made moves to ease the recruitment process, with the area recently getting its own jobs fair, the Silicon Milkroundabout and, while it may not have Cambridge on its doorstep, there's no shortage of solid local universities: Goldsmiths, UCL, Kings, City or Imperial, for example. The latter two have their own incubator spaces – and they've got no shortage of company: there are a clutch of incubators focused on London, including the Telefonica-backed Wayra academy, which opened its London HQ doors earlier this year. Seedcamp is also a regular fixture in London, and mobile giant Vodafone has plans to establish its own start-up zone. A growth in funding Funding for start-ups in London has "evolved tremendously" over the last handful of years, according to Eileen Burbidge, a VC at Passion Capital. "There's a lot more early-stage capital available for start-ups now than there ever has been. And there are more options – there are definitely, in quantitative terms, more early-stage investment firms than there were two years ago or even a year ago. I also feel like there are more business angels who are available too, and they're not just old-school business angel types who are looking for a place to put their money, but people who have been part of the first wave of entrepreneurship in the late 1990s and early 2000s and who want to be involved, give strategic advice and counsel, and also put in money," Burbidge says. Efforts have also been made by government to make things more welcoming for any UK start-up getting a sniff of success. The coalition is looking at relaxing the rules for businesses wanting to float in the country. There are also tax breaks for investors stumping up seed funding and tax relief for SMEs on R&D expenditure. "There's a lot more early stage capital available for start-ups now than there ever has been" — Eileen Burbidge, Passion Capital The government is also keen to attract overseas start-ups, and recently introduced the entrepreneurs' visa, which allows entry into the country for would-be business owners that already have £50,000 in funding from UK VCs, government departments or seed funds. However, for all its buzz and bluster, there have been few exits from Tech City: while TweetDeck joined Twitter last year in a £25m takeover, other buyouts among companies of any size have been hard to come by in the area. (Exits the size of Cambridge-based Autonomy, bought by HP in 2011 for £7.1bn , are rather the exception than the rule.) But with the London tech scene maturing nicely, and the first wave of internet entrepreneurs now looking to reinvest their exit money elsewhere, even the smaller exits have a part to play. "Successes even in the small or mid-range are also important because those often don't take as long – compared to something like Autonomy, where people built the business over more than a decade," says Burbidge. "Sometimes smaller and mid-range exits are actually more important to get the ecosystem percolating and people moving through it, so with something like Tweetdeck – it wasn't a huge exit but there was a decent-sized team, you saw someone could start something, get it to a nice user base and then sell it - it's a great case study." Read this Is Sweden the best place to start your start-up? For those wanting to set up a tech company, there's a lot to consider. ZDNet takes a look at some of the major start-up hubs in EMEA and what each can bring for those wanting to get their own IT business off the ground. First up: Sweden. Read More While the UK is currently undergoing the same economic crisis as many other countries in Europe, it still remains the "favoured destination" for VC funding, according to Dow Jones VentureSource's third quarter figures. Companies in the UK raised €301m through 59 deals during the quarter and, while VentureSource didn't break down how much of that was for tech start-ups, around one-third of funding in Europe is spent on IT – the only industry that saw year-on-year funding growth (although it's worth noting that both the volume of deals and the value of funding is down year on year in the UK. Questions have also been raised over whether there's enough funding available for deals in the under-£2m range). And while comparing the flow of funding from the UK and the US – or even Europe and the US – is like comparing a minnow and a blue whale, London has links to US VCs, and has the advantage of the shared language and a relatively short hop to the East Coast. While Berlin , the only other European start-up hub to make it into the global top 20 globally, is closing the gap, London still remains the region's number one. "In recent years London has burst onto the scene and has become the most successful start-up ecosystem in Europe, producing the largest output of start-ups in the European Union by far. But its output is still 63-percent lower than Silicon Valley. London looks to be well positioned for continued growth as the leading start-up ecosystem in Europe, and first choice for fast growing US start-ups to establish their European headquarters," Startup Genome and Telefonica's report said. Or, as Seedcamp's Espinal puts it, "London is establishing itself clearly as an epicentre for the tech community globally and will only get stronger." | High | [
0.6600496277915631,
33.25,
17.125
]
|
Seborrheic keratoses: a study comparing the standard cryosurgery with topical calcipotriene, topical tazarotene, and topical imiquimod. Patients with seborrheic keratoses frequently desire an effective topical therapy for seborrheic keratoses. To compare topical calcipotriene, topical tazarotene, and topical imiquimod with standard cryosurgery in the treatment of seborrheic keratoses. Fifteen patients with numerous seborrheic keratoses were enrolled in an open-label study comparing cryosurgery with topical agents. Eight separate seborrheic keratoses were selected to be treated with topical medications. One lesion was treated with cryosurgery. One treatment with cryosurgery led to clinical and histological improvement of all lesions treated. Neither scarring nor recurrence resulted in cryosurgery. In seven of 15 patients, tazarotene 0.1% cream applied BID caused clinical improvement in lesions within 16 weeks. Cryosurgery produces clinical and histological improvement of seborrheic keratoses. The result with cryosurgery was cosmetically acceptable to all patients. Responders to tazarotene cream 0.1% found it cosmetically acceptable. | Mid | [
0.597468354430379,
29.5,
19.875
]
|
# encoding: UTF-8 require 'pry' require 'pry-rails/version' if defined?(Rails) && !ENV['DISABLE_PRY_RAILS'] require 'pry-rails/railtie' require 'pry-rails/commands' require 'pry-rails/model_formatter' require 'pry-rails/prompt' end | Low | [
0.5042194092827,
29.875,
29.375
]
|
Stylist Tips & Tricks Because our items undergo constant dry-cleaning, the zipper may become a bit tough to zip. If this happens, try using a bar of solid soap or a solid candle on the track, which may help you zip your dress with more ease. | Low | [
0.492537313432835,
33,
34
]
|
Q: How to replace a Materialize Select with Text-Input dynamically? I'm trying to elicit a change from a Materialize select to a text[input] of input when the user clicks on Other I've tried using .replaceWith(), instance.destroy();, and $(this).remove() all to no avail. HTML: <link href="https://fonts.googleapis.com/icon?family=Material+Icons" rel="stylesheet"> <h5>Materialize select</h5> <div class="row"> <div class="input-field col s12"> <i class="material-icons prefix">device_hub</i> <select id="mySelect" class="change_select_to_text_on_other"> <option value="" selected>Choose "Other" to trigger!</option> <option value="1">Option 1</option> <option value="2">Option 2</option> <option value="other">Other</option> </select> <!--This is what I would like replace the select option with when other is clicked!: <input id="first_name" type="text" class="validate"> <label for="first_name">Make your own selection!</label--> </div> </div> JS: var $select1 = $('#mySelect'); $select1.material_select(); $select1.on('change', function (e) { if(e.target.value == 'other'){ $( this ).replaceWith( "<h2>New heading</h2>" ); var instance = M.FormSelect.getInstance($(this)); instance.destroy(); } }); Fiddle When the user clicks on other option the select gets replaced with a text input. Thanks! A: Is this close to what you want? I used a newer version of materialize.js https://cdnjs.cloudflare.com/ajax/libs/materialize/1.0.0/js/materialize.min.js So I used $select1.formSelect(); instead of $select1.material_select(); The complete code: $(function () { var $select1 = $('#mySelect'); $select1.formSelect(); $select1.on('change', function (e) { if (e.target.value == 'other') { $(this).replaceWith(`<input id="first_name" type="text" class="validate"> <label for="first_name">Make your own selection!</label>`); $( ".select-dropdown.dropdown-trigger" ).remove(); $( ".caret" ).remove(); } }); }) | Mid | [
0.615751789976133,
32.25,
20.125
]
|
Oral primary angiosarcoma of the lower lip mucosa: report of a case in a 15-year-old boy. Angiosarcomas are rare soft tissue malignant tumors with dismal prognosis. Head and neck involvement is uncommon (5%) and usually affects the scalp or facial skin. We present the case of an inferior lip mucosal low-grade angiosarcoma in a 15-year-old boy treated exclusively with surgery. One and a half years after treatment, the patient was free of signs of recurrence. Prompt and accurate diagnosis with adequate imaging modalities and multidisciplinary treatment are crucial for optimal management of these neoplasms. Lip mucosal involvement is exceptional with only a few cases described in the literature, all in patients older than 60 years To our knowledge, this is the youngest patient ever reported. | High | [
0.6780551905387641,
32.25,
15.3125
]
|
The King Crimson Double Trio were a bit of an unwieldy beast but were certainly one of the most exciting incarnations of the band once they hit their stride. This set captures them in Japan after completing an extensive U.S. tour, and they were firing on all cylinders as a unit. San Diego '69 is a 1995 bootleg CD by The Rolling Stones. Released by The Swingin' Pig, it is taken from a show recorded at the Sports Arena in San Diego, California (United States) on 10 November, 1969. Julianne Moore gives a breakthrough performance as Carol White, a Los Angeles housewife in the late 1980s who comes down with a debilitating illness. After the doctors she sees can give her no clear diagnosis, she comes to believe that she has frighteningly extreme environmental allergies. A profoundly unsettling work from the great American director Todd Haynes, Safe functions on multiple levels: as a prescient commentary on self-help culture, as a metaphor for the AIDS crisis, as a drama about class and social estrangement, and as a horror film about what you cannot see. This revelatory drama was named the best film of the 1990s in a Village Voice poll of more than fifty critics. Whisper of the Heart follows the story of teenage bookworm Shizuku who is struggling to find out who she is as she approaches the last summer of junior high school. Energetic and free-spirited, she harbours ambitions to write. But Shizuku is a voracious reader and plans on using the library to read away the summer vacation. When she finds that the same mystery borrower has got to every book before her, she meets Seiji, a trainee violin-maker who challenges her to stop reading and start writing. Paralyzed by postgraduation ennui, a group of college friends remain on campus, patching together a community for themselves in order to deny the real-world futures awaiting them. Academy Award–nominated screenwriter Noah Baumbach’s hilarious and touching directorial debut was one of the highlights of the American independent film scene of the nineties, speaking directly to a generation of adults-to-be unable to reconcile their hermetic educational experience with workaday responsibility, and posing the eternal question, where do we go from here? Stingingly funny and incisive, Baumbach’s breakthrough features endlessly quotable dialogue, delivered by a stellar ensemble cast. Terry Zwigoff’s landmark 1995 film is an intimate documentary portrait of the underground artist Robert Crumb, whose unique drawing style and sexually and racially provocative subject matter have made him a household name in popular American art. Zwigoff candidly and colorfully delves into the details of Crumb’s incredible career and life, including his family of reclusive eccentrics, some of the most remarkable people you’ll ever see on-screen. At once a profound biographical portrait, a riotous examination of a man’s controversial art, and a devastating look at a troubled family, Crumb is a genuine American original. | Mid | [
0.5472527472527471,
31.125,
25.75
]
|
Q: Importing .py file requires importing a lot more I'm using python 2.7 / pythonxy / Spyder. I've got a.py and b.py and I want to call a def from a.py in b.py. So I write "import a" in b.py but I get a load of errors. The errors appear to be caused by the fact that the numpy functions are not recognized in a.py even though they are by default preloaded by Spyder. From other questions and answers I get that the silly solution is to import the functions in a.py. So I start adding them in a.py by typing from numpy import xxxxxx. But this still leaves me errors. The first 2 are: "return round(a-b, 2) - TypeError: only length-1 arrays can be converted to Python scalars". "d2=sorted(d2,key=lambda kv: kv[2],reverse=True - ValueError: The truth value of an array with more than one element is ambiguous. Use a.any() or a.all()" When I just run a.py I don't get these errors, so I know the code is right. What I don't know is what I have to do the be allowed to import a.py which contains these lines? A: To import a python file into another python file, the best way is try: __import__(sys.argv[1]) except Exception as e: my_traceback = sys.exc_info()[2] Here you send the file name as a parameter to the other python file. | Low | [
0.49900199600798406,
31.25,
31.375
]
|
Q: scikit learn: update countvectorizer after selecting k best features I have a count vectorizer with a large number of features, and I would like to be able to select the k best features from a transformed set and then update the count_vectorizer to contain only those features. Is this possible? import pandas as pd import numpy as np import scipy as sp import scipy.stats as ss import re from sklearn.feature_extraction.text import CountVectorizer from sklearn.ensemble import RandomForestClassifier merge=re.compile('\*\|.+?\|\*') def stripmerge(sub): for i in merge.findall(sub): j=i j=j.replace('*|','mcopen') j=j.replace('|*','mcclose') j=re.sub('[^0-9a-zA-Z]','',j) sub=sub.replace(i,j) return sub input=pd.read_csv('subject_tool_test_23.csv') input.subject[input.subject.isnull()]=' ' subjects=np.asarray([stripmerge(i) for i in input.subject]) count_vectorizer = CountVectorizer(strip_accents='unicode', ngram_range=(1,1), binary=True, stop_words='english', max_features=500) counts=count_vectorizer.fit_transform(subjects) #see the first output example here from sklearn.feature_selection import SelectKBest from sklearn.feature_selection import chi2 good=np.asarray(input.unique_open_performance>0) count_new = SelectKBest(chi2, k=250).fit_transform(counts, good) First output example, features make sense >>> counts[1] <1x500 sparse matrix of type '<type 'numpy.int64'>' with 3 stored elements in Compressed Sparse Row format> >>> subjects[1] "Lake Group Media's Thursday Target" >>> count_vectorizer.inverse_transform(counts[1]) [array([u'group', u'media', u'thursday'], dtype='<U18')] Second output example, features no longer match up. >>> count_new = SelectKBest(chi2, k=250).fit_transform(counts, good) >>> count_new.shape (992979, 250) >>> count_new[1] <1x250 sparse matrix of type '<type 'numpy.int64'>' with 2 stored elements in Compressed Sparse Row format> >>> count_vectorizer.inverse_transform(count_new[1]) [array([u'independence', u'easy'], dtype='<U18')] >>> subjects[1] "Lake Group Media's Thursday Target" Is there a way to apply the feature selection results to my count vectorizer so that I can generate new vectors with only the important features? A: The way I got around this was by running the feature selection, determining which columns from the original set were selected, creating a dictionary out of those, and then running a new count vectorizer limited to that dictionary. Takes a bit longer with large data sets, but it works. ch2 = SelectKBest(chi2, k = 3000) count_new = ch2.fit_transform(counts, good) dict=np.asarray(count_vectorizer.get_feature_names())[ch2.get_support()] count_vectorizer=CountVectorizer(strip_accents='unicode', ngram_range=(1,1), binary=True, vocabulary=dict) | Mid | [
0.614736842105263,
36.5,
22.875
]
|
1. Introduction {#s0005} =============== In the last century, intracoronary application of acetylcholine (ACh) was established as a diagnostic provocation test of coronary spasm in patients with suspected vasospastic angina. Because the effects of ACh is short-lived, this provocation test can evaluate the direct effects of high-dose ACh on vasomotion in the epicardial coronary arteries. Vasospasm is considered to be the dysregulation of endothelium controlling vasomotion, inappropriate hypercontractility of vascular smooth muscle, or both [@bib1]. ACh yields endothelium-dependent muscarinic vasodilation in normal coronary arteries, whereas it induces vasoconstriction in coronary arteries with endothelial injury [@bib2]. Since autonomic regulation involves arrhythmogenesis as well as coronary vasomotor tonus, intracoronary high-dose application of short-lived ACh may have a key role, not only in the diagnostic provocation test of coronary vasospasm, but also in the arrhythmogenesis by cholinergic electrophysiological actions, irrespective of the association with severe cardiac ischemia due to coronary spasm. 2. Discussion {#s0010} ============= 2.1. ACh and coronary spasm provocation test {#s0015} -------------------------------------------- ACh, a neurotransmitter of the parasympathetic nervous system, is inactivated quickly by circulating cholinesterase, and is effective for only a very short period when applied by intracoronary injection. Vasomotor function is regulated by the balance between the endothelium-derived contracting factors (thromboxane A~2~, leukotrienes, and others) and the relaxing factor of nitric oxide (NO). ACh disrupts the intrinsic balance of endothelium-derived opposing factors leading to the focal or diffuse coronary spasm at the site, releasing insufficient NO [@bib3]. This property is utilized widely in coronary angiography to evoke coronary spasm for diagnosis of vasospastic angina. Although the spasm provocation test using ACh is regarded as a safe and reliable technique to diagnose vasospastic angina, arrhythmogenic complications are not unusual. Consequently, the Japanese Circulation Society guideline recommends temporary pacemaker lead insertion during ACh application to reverse transient bradycardia and atrioventricular block based on parasympathetic activation [@bib4]. Paroxysmal atrial fibrillation (AF) is also ascribed to the cholinergic effects of ACh on the atria, where ACh-activated potassium (K^+^) channels are abundant. The activation of ACh-activated K^+^ current (*I*~K-ACh~) reduces atrial refractoriness heterogeneously, which underlies focal ectopic activities triggering AF and multiple reentries sustaining AF [@bib5], [@bib6]. Sueda and Kohno have reported more serious complications of this provocation test [@bib7]. They concluded that ventricular tachycardia and/or fibrillation (VT/VF), observed during the intracoronary application of ACh, occurred more frequently than with the intracoronary injection of ergonovine, and that VT/VF occurred more frequently in Asian patients than in Western patients undergoing the ACh application test. Although spasm-induced myocardial ischemia is the main underlying cause of serious complications, such as cardiogenic shock and severe hypotension associated with VT/VF, the exact etiology of the VT/VF observed in the ACh provocation test remains to be determined. 2.2. Cardiac ischemia and early repolarization syndrome (ERS) {#s0020} ------------------------------------------------------------- ACh was originally applied for the diagnostic provocation test of coronary spasm in patients with suspected vasospastic angina [@bib2]. Coronary vasospasm results in severe cardiac ischemia by profound reduction of major epicardial coronary flow and evident ST segment elevation on a surface electrocardiogram (ECG). The relationship between ERS and vasospastic angina has been drawing increasing attention, since the J wave is sometimes observed immediately before the onset of VT/VF in patients with vasospastic angina and acute myocardial infarction (AMI) [@bib8], [@bib9], [@bib10], [@bib11], [@bib12]. Acute cardiac ischemia is accompanied by marked reduction of oxygen supply, tissue acidosis, accumulation of ischemic metabolites, and subsequent electrophysiological and electrocardiographic derangements [@bib13]. Cardiac repolarization is accelerated by the sum of reduced inward sodium (Na^+^) and calcium (Ca^2+^) currents (*I*~Na~ and *I*~Ca~) and augmented various outward K^+^ currents, which is heterogeneous, because of the differential sensitivity to ischemia between the epicardium and endocardium [@bib14], [@bib15]. VT/VF, observed in ERS during ischemic events, are considered to be because of regionally different ischemic sensitivity, leading to phase 2 reentry. When considering that transient outward current (*I*~to~) is a major ionic current responsible for J wave formation, in 1988, Litovsky and Antzelevitch reported that epicardial *I*~to~ is prominent relative to endocardial *I*~to~ [@bib16]. Thereafter, the ventricular wall was recognized as being heterogeneous with respect to the *I*~to~ channel expression, density, and *I*~to~-mediated epicardial phase 1 magnitude [@bib17], [@bib18], [@bib19]. Moreover, epicardial *I*~to~ is suspected to be more sensitive to ischemia compared with the endocardial *I*~to~. In 1993, Lukas and Antzelevitch investigated this regionally different sensitivity of *I*~to~ to ischemia in canine hearts [@bib14]. They demonstrated that the action potential (AP) plateau was abolished in the epicardium but not abolished in the endocardium by simulated ischemia (hypoxic and acidic conditions with high K^+^ concentration) and that 4-aminopiridine restored the epicardial AP plateau. *I*~to~ is sensitive to 4-aminopiridine, and is a major time-dependent, voltage-sensitive current responsible for early repolarization. Conversely, there are ligand-gated, time-independent outward K^+^ currents. Intracellular adenosine triphosphate (ATP) has a ligand action to inhibit ATP-sensitive K^+^ channel current (*I*~K-ATP~). *I*~K-ATP~ is activated by severe ischemia associated with intracellular ATP depletion, leading to AP shortening and extracellular K^+^ accumulation [@bib20]. Pharmacological modulation of *I*~K-ATP~ affects the canine epicardial, but not the endocardial, AP repolarization, development of phase 2 reentry, and lethal ventricular arrhythmia, i.e., *I*~K-ATP~ activation by pinacidil promotes, whereas *I*~K-ATP~ inhibition by glybenclamide suppresses, these electrophysiological findings in canine ventricular tissues. These results indicate that *I*~K-ATP~ shows regionally different sensitivity to ischemia and plays a crucial role in the ischemic J wave formation and subsequent occurrence of VT/VF [@bib21]. Identification of patients at risk of ischemic VT/VF is important. Arrhythmogenic vulnerability in the setting of AMI may be associated with a genetic predisposition, leading to the heterogeneous excitability, refractoriness, and conduction, which are based on depolarization and/or repolarization abnormalities [@bib22]. 2.3. J wave and ERS {#s0025} ------------------- ERS is characterized by J point elevation on surface ECGs, and the J wave is characterized by dynamic morphological changes that show a hump, notch, or slur at the end of the QRS complex on surface ECGs. Global prevalence of the J wave in the general population varies widely from 0.9% to 24.8% [@bib23], which depends on the ethnicity, age, gender, and the diagnostic criteria of the J wave itself. ERS was formerly considered a normal benign repolarization variant, but the cumulative evidence, since 2008, indicates that ERS contains a possible risk of lethal VT/VF and sudden cardiac death (SCD) [@bib24]. The Shanghai score system for diagnosis of ERS was proposed by the expert consensus conference [@bib25]. Based on this proposal, patients with ERS, showing dynamic changes of J point elevation, followed by descending ST segment, observed in inferior leads, associated with short-coupled premature ventricular beats (PVBs), are considered to be in a high-risk group. Patients showing bradycardia-dependent J waves also have a poor prognosis, whereas those with tachycardia-dependent J waves showed no SCD [@bib26]. The exact mechanisms of such phenotypic ECG manifestations of the J wave, leading to poor prognosis, are explained by the electrocardiologic differential theory, i.e., bradycardia induces full recovery of *I*~to~ from the preceding AP, leading to an accentuated phase 1 notch and a delayed AP dome in the epicardium. A distinct phase 1 notch in the epicardial AP is reflected by high amplitude J waves. Delayed appearance of the epicardial AP dome forms an inward transmural voltage gradient in the late repolarization phase, which causes a descending ST segment and an inverted T wave. A prognostic difference of ERS in inferolateral comparison is also noted, i.e., the inferior ERS shows a poor prognosis relative to the lateral ERS [@bib25]. This is explained by the fact that inferior *I*~to~ density is greater than lateral *I*~to~ density [@bib27]. 2.4. Brugada syndrome and ERS {#s0030} ----------------------------- Brugada syndrome (BrS) was first reported in 1992 by Brugada and Brugada [@bib28] in a multicenter report. Electrocardiographic manifestations of BrS were described originally as right bundle branch block and persistent ST segment elevation. However, these characteristic features are interpreted today as an early repolarization pattern, observed particularly in the anterior right ventricular outflow tract region [@bib25]. Moreover, patients with BrS, associated with inferolateral early repolarization pattern show a higher risk of VT/VF, indicating that BrS, in addition to inferolateral early repolarization, reflects extensive J wave manifestations, leading to an electrical storm [@bib29], [@bib30], [@bib31]. BrS and ERS are related manifestations in a broader spectrum of J wave syndromes, i.e., primary electrical disorders without structural heart diseases [@bib25]. BrS and ERS show common features of inherited channelopathy, pathophysiological mechanisms causing VT/VF, and therapeutic effectiveness of pharmacological and non-pharmacological options. Both syndromes show ischemic ST elevation, male predominance, and evident vagal influences [@bib32]. The magnitude of ST elevation and the occurrence of VT/VF in patients with BrS and ERS are generally dependent on heart rate [@bib33] and frequently observed at night, with a full stomach or when vomiting [@bib34], [@bib35], [@bib36]. Vagal dominance in the genesis of VT/VF in these patients is also reported in clinical studies using heart rate variability [@bib37] and other autonomic function tests [@bib38]. These syndromes are associated with mutations or rare variants of genes encoding channel proteins of *I*~K-ATP~, *I*~Na~, or *I*~Ca~, which result in the gain of function in *I*~K-ATP~ or the loss of function in *I*~Na~ and *I*~Ca~. With respect to therapeutic options, isoproterenol infusion is emerging as a promising pharmacological intervention. Quinidine and bepridil are effective as conservative pharmacological treatments. Implantable cardioverter-defibrillators (ICDs) should be considered in cases presenting with drug-refractory VT/VF. These pharmacological and non-pharmacological modalities are common therapeutic strategies in treatment of J wave syndromes. However, there are some differences between the J wave syndromes when comparing the provocation test and long-term prevention of arrhythmic events. Diagnostic tools for BrS are not necessarily helpful in ERS, since BrS is unmasked on surface ECG by using a class Ic antiarrhythmic agent, which is a potent blocker of *I*~Na~. In Japan, pilsicainide is an example of a class Ic agent widely used for diagnostic testing for suspected BrS. However, class Ic agents tend to mask J waves in ERS, partly because of the QRS widening based on the ventricular conduction slowing [@bib25]. Therefore, pharmacological probes to evoke persistent J waves have not yet been established. Antiarrhythmic effects of marine-derived ω-3 fatty acids, such as eicosapentaenoic acid (EPA), on ERS are reported in Japan. Hisamatsu et al. investigated the preventive effects of ω-3 fatty acid intake on cardiac death in community-dwelling men, without baseline cardiac diseases, in a prospective study. They concluded that risk of cardiac death associated with ERS might be attenuated by dietary intake of ω-3 fatty acid [@bib39]. Endo et al. also investigated the relationship between serum EPA concentration and ERS in patients with AMI undergoing percutaneous coronary intervention. They demonstrated that J wave appearance and arrhythmic events were more frequent in patients with low serum EPA and suggested that the J wave is linked to low EPA in patients with AMI associated with ischemic VT/VF [@bib40]. However, such favorable effects of EPA on BrS have not yet been reported. 2.5. ACh and the J wave {#s0035} ----------------------- Screening out small groups of high-risk patients with ERS from the vast majority of those in the low-risk group of ERS and then giving appropriate therapy with an ICD to the limited high-risk patients, is essential to prevent SCD caused by VF/VT. For this purpose, use of pharmacological agents for diagnostic J wave induction is required. Kodama et al. reported a case of aborted SCD presenting with a de novo J wave by a coronary spasm provocation test using ACh [@bib41]. A 51-year-old man experienced a cardiac arrest during a winter full marathon. He underwent by-stander cardiopulmonary resuscitation and he was rescued without the use of an automated external defibrillator (AED). Vasospastic angina was suspected, and no structural heart diseases were found by routine noninvasive cardiac examinations after referral. During left coronary infusion of ACh, this patient did not complain of chest pain, and coronary angiography demonstrated no spastic findings. The surface ECG demonstrated no discernible ST-T changes but distinct J waves in the inferior leads ([Fig. 1](#f0005){ref-type="fig"}). Short-coupled repetitive PVBs ([Fig. 1](#f0005){ref-type="fig"}) and the gradual appearance of J waves ([Fig. 2](#f0010){ref-type="fig"}) were observed during an increase in ACh dose from 10 to 100 μg. Since there was no evidence of coronary spasm in this case, dose-dependent effects of ACh on surface ECG findings are presumably based on the direct pharmacological actions of ACh, but not mediated by cardiac ischemia. In ambulatory monitoring performed after the ACh application test, nocturnal appearance of the J waves and their disappearance in the early morning were consistent with the cholinergic actions of ACh ([Fig. 3](#f0015){ref-type="fig"}). Although no evidence for life-threatening arrhythmia was found, ACh-induced couplet premature ventricular beats (PVBs), as observed in [Fig. 1](#f0005){ref-type="fig"}, are considered as a cause of the aborted SCD in this patient with a resuscitation history.Fig. 1Electrocardiogram (ECG) recorded before (A) and under coronary spasm provocation test using the following incremental doses of acetylcholine (ACh): 10 μg (B), 30 μg (C), and 100 μg (D). J wave was absent before but was evident in the inferior leads of ECG during ACh administration (arrows). Short-coupled repetitive premature ventricular beats (PVBs) were observed in the precordial leads at the maximum dose of ACh (E). The origin of the triggering PVBs with superior-axis and left-bundle-branch-block morphology is not inconsistent with the area presenting with a J wave [@bib41].Fig. 1Fig. 2Electrocardiogram (ECG) during the coronary spasm provocation test using acetylcholine (ACh). A persistent J wave was shown in lead II, whereas gradual fragmentation of the QRS complex and clear J wave formation were observed in lead III under the application of the maximum dose (100 μg) of ACh. The minimal amplitude of the S wave in lead I was not augmented according to the appearance of the J wave in lead III, indicating that this surface ECG does not indicate that a right bundle branch block was caused by ACh.Fig. 2Fig. 3Ambulatory electrocardiogram monitoring indicates nocturnal appearance of a J wave at the end of the QRS complex (arrows), associated with a transient sinoatrial conduction block recorded at 23:46 pm (A), and disappearance of the J wave in the early morning at 6:55 am (B) at the equivalent baseline heart rate, i.e., minimum RR interval in A is 1240 ms, and basic RR interval in B is 1160 ms.Fig. 3 2.6. Mechanistic consideration {#s0040} ------------------------------ J waves are currently recognized as a surface ECG manifestation of the transmural voltage gradient of epicardial, in contrast to endocardial, ventricular AP at the early repolarization phase (phase 1) [@bib25]. At that moment, the transmural voltage gradient is augmented by a distinct epicardial AP notch, caused by activation of *I*~to~. ACh is considered to evoke J waves irrespective of the outcome of the provocation test of coronary vasospasm using ACh. An example of a positive case of the ACh application test was Sato et al.'s investigation of ischemic J wave dynamics in relation to ST segment changes [@bib42]. They compared the VF occurrence in patients with vasospastic angina presenting with J waves, with those showing no J waves in the baseline ECG. They concluded that J wave appearance is associated with ST elevation and that these ECG findings are a sign of ischemic VF. The ischemic J wave is based on the accelerated epicardial repolarization because of the greater sensitivity of the epicardium to ischemia [@bib14], [@bib15]. Different ischemic sensitivity across the ventricular wall is attributed to the preferential activation of epicardial, but not endocardial, *I*~K-ATP~ [@bib21]. In addition to the transmural difference, there is also an inferolateral difference, i.e., inferior *I*~to~ density is greater than lateral *I*~to~ density [@bib27], which is compatible with the fact that J waves are observed particularly in inferior leads, indicating a high risk of VF in patients with vasospastic angina [@bib12], [@bib25], [@bib27]. In acute ischemia, inward currents are suppressed, i.e., tissue acidosis inhibits *I*~Ca~, and interstitial K^+^ accumulation inactivates *I*~*Na*~ [@bib13], which also promotes an outward shift in balance of the net transmembrane ionic currents. Even in a negative provocation test, ACh increases membrane K^+^ conductance by enhancing *I*~K-ACh~, which is abundant in the atria but is also found in the ventricles. Koumi and Wasserstrom demonstrated that human ventricular *I*~K-ACh~ shows channel conductance and kinetics similar to those in human atrial *I*~K-ACh~, but that ventricular *I*~K-ACh~ (concentration of ACh at half-maximal stimulation (*K*~D~)=0.13 μM) is less sensitive to ACh relative to atrial *I*~K-ACh~ (*K*~D~=0.03 μM) [@bib43]. Activation of *I*~K-ACh~ contributes to the net outward current augmentation that produces the epicardial AP notch and J wave formation. Furthermore, ACh increases parasympathetic tone by exerting cholinergic actions, which include negative chronotropism, which leads to a bradycardia-dependent J wave appearance [@bib44]. ACh-induced muscarinic receptor activation inhibits inward *I*~Ca~ [@bib45]. These direct actions of ACh shift the net transmembrane ionic current balance toward the outward direction. Koncz et al. established the aerobic ERS model of coronary-perfused canine heart preparation using pilsicainide (*I*~Na~ blocker), pinacidil (*I*~K-ATP~ opener), verapamil (*I*~Ca~ blocker), and ACh as a cholinergic agent [@bib27]. BrS shares some characteristic features of inherited channelopathy with ERS. Yan and Antzelevitch [@bib46] actually demonstrated ACh-induced epicardial AP dome depression and ST elevation in an arterially perfused myocardial wedge preparation as an experimental model of BrS ([Fig. 4](#f0020){ref-type="fig"}). Noda et al. reported that, clinically, right, but not left, coronary ACh infusion tends to elevate ST segment in the right precordial leads, without coronary spasm in patients with BrS [@bib47]. These experimental and clinical studies indicate that ACh unmasks ERS, which is not mediated by ACh-induced coronary spasm.Fig. 4In arterially perfused canine myocardial wedge preparations (A), acetylcholine (ACh) (3 μm/L) reduces dome amplitude in the epicardial action potential (AP) and elevates the ST segment in a transmural electrocardiogram (ECG). In another preparation (B), flecainide (7 μm/L), a potent Na channel blocker, is applied. Thereafter, ACh (2 μm/L) causes loss of the AP dome in the epicardium, but not in the endocardium, and ST segment elevation in a transmural ECG under the presence of flecainide. Isoproterenol (0.5 μm/L) restores these epicardial AP configurations and ECG changes [@bib46].Fig. 4 3. Conclusions {#s0045} ============== In addition to coronary vasomotor regulation, the pathophysiological mechanisms of J wave manifestation on surface ECGs were reviewed by focusing on the electrophysiology and basic pharmacology of ACh, which may have a role as a potential diagnostic probe of J wave syndromes. ACh unmasks the J waves; this is mediated by *I*~K-ATP~ activation in ischemic conditions and by direct cholinergic effects of ACh on *I*~K-ACh~ activation in non-ischemic conditions. These ligand-gated K^+^ channel activations increase background K^+^ conductance and shift the balance of epicardial transmembrane ionic currents toward the outward direction. There may be intermediate conditions between the distinct ischemic and non-ischemic states, where heterogeneous epicardial augmentation of *I*~to~, in addition to reduced *I*~Ca~ and *I*~Na~, might be the persistent underlying substrate of the J wave syndrome ([Fig. 5](#f0025){ref-type="fig"}). Basic studies using canine ventricular tissue and cell preparations confirmed this possibility [@bib25], which is also suspected by a case presenting de novo appearance of J waves without evidence of coronary spasm under the cumulative intracoronary application of ACh [@bib39]. However, a prospective cohort of ACh application tests, widely conducted in catheterization laboratories, is required to strengthen the conceptual framework ([Fig. 5](#f0025){ref-type="fig"}) regarding the hypothetical ACh challenge test of ERS.Fig. 5A schematic illustration of the mechanisms of J wave formation from the viewpoint of epicardial transmembrane ionic currents as it relates to cardiac ischemia.Fig. 5 Disclosures {#s0050} =========== Financial support {#s0055} ----------------- This report received no financial support. Conflict of interest {#s0060} ==================== All authors declare no conflict of interest related to this study. We thank the staff in the Department of Medicine and Biosystemic Science of Kyushu University Graduate School of Medical Sciences (Fukuoka, Japan) for their enthusiastic cooperation with us in our work in the electrophysiology laboratory. We also thank Ms. Kanae Nagao for her secretarial assistance and Ms. Noriko Muta for her technical assistance. | Mid | [
0.635327635327635,
27.875,
16
]
|
Analysis Grid for Environments Linked to Obesity (ANGELO) framework to develop community-driven health programmes in an Indigenous community in Canada. Indigenous First Nations people in Canada have high chronic disease morbidity resulting in part from enduring social inequities and colonialism. Obesity prevention strategies developed by and for First Nations people are crucial to improving the health status of this group. The research objective was to develop community-relevant strategies to address childhood obesity in a First Nations community. Strategies were derived from an action-based workshop based on the Analysis Grid for Environments Linked to Obesity (ANGELO) framework. Thirteen community members with wide-ranging community representation took part in the workshop. They combined personal knowledge and experience with community-specific and national research to dissect the broad array of environmental factors that influenced childhood obesity in their community. They then developed community-specific action plans focusing on healthy eating and physical activity for children and their families. Actions included increasing awareness of children's health issues among the local population and community leadership, promoting nutrition and physical activity at school, and improving recreation opportunities. Strengthening children's connection to their culture was considered paramount to improving their well-being; thus, workshop participants developed programmes that included elders as teachers and reinforced families' acquaintance with First Nations foods and activities. The research demonstrated that the ANGELO framework is a participatory way to develop community-driven health programmes. It also demonstrated that First Nations people involved in the creation of solutions to health issues in their communities may focus on decolonising approaches such as strengthening their connection to indigenous culture and traditions. External funds were not available to implement programmes and there was no formal follow-up to determine if community members implemented programmes. Future research needs to examine the extent to which community members can implement programmes on their own and whether community action plans, when implemented, lead to short- and long-term benefits in health outcomes. | High | [
0.695770804911323,
31.875,
13.9375
]
|
/* * Copyright (C) 2019 The Android Open Source Project * * Licensed under the Apache License, Version 2.0 (the "License"); * you may not use this file except in compliance with the License. * You may obtain a copy of the License at * * http://www.apache.org/licenses/LICENSE-2.0 * * Unless required by applicable law or agreed to in writing, software * distributed under the License is distributed on an "AS IS" BASIS, * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. * See the License for the specific language governing permissions and * limitations under the License */ package com.android.settings.homepage.contextualcards.slices; import static org.mockito.ArgumentMatchers.any; import static org.mockito.Mockito.doReturn; import static org.mockito.Mockito.never; import static org.mockito.Mockito.verify; import android.app.role.RoleManager; import android.content.Context; import android.content.pm.ApplicationInfo; import android.content.pm.PackageInfo; import android.content.pm.PackageManager; import com.android.settings.notification.NotificationBackend; import org.junit.Before; import org.junit.Test; import org.junit.runner.RunWith; import org.mockito.Mock; import org.mockito.MockitoAnnotations; import org.robolectric.RobolectricTestRunner; import org.robolectric.RuntimeEnvironment; @RunWith(RobolectricTestRunner.class) public class NotificationMultiChannelAppRowTest { @Mock private NotificationBackend mNotificationBackend; private Context mContext; private NotificationMultiChannelAppRow mNotificationMultiChannelAppRow; private PackageInfo mPackageInfo; @Before public void setUp() { MockitoAnnotations.initMocks(this); mContext = RuntimeEnvironment.application; mPackageInfo = new PackageInfo(); mPackageInfo.applicationInfo = new ApplicationInfo(); mPackageInfo.applicationInfo.packageName = "com.android.test"; mNotificationMultiChannelAppRow = new NotificationMultiChannelAppRow(mContext, mNotificationBackend, mPackageInfo); } @Test public void call_isMultiChannel_shouldLoadAppRow() throws Exception { doReturn(3).when(mNotificationBackend).getChannelCount(any(String.class), any(int.class)); mNotificationMultiChannelAppRow.call(); verify(mNotificationBackend).loadAppRow(any(Context.class), any(PackageManager.class), any(RoleManager.class), any(PackageInfo.class)); } @Test public void call_isNotMultiChannel_shouldNotLoadAppRow() throws Exception { doReturn(1).when(mNotificationBackend).getChannelCount(any(String.class), any(int.class)); mNotificationMultiChannelAppRow.call(); verify(mNotificationBackend, never()).loadAppRow(any(Context.class), any(PackageManager.class), any(RoleManager.class), any(PackageInfo.class)); } } | Mid | [
0.567164179104477,
33.25,
25.375
]
|
Q: Redirect a network request Morning all, I don't even know if this is possible, and if it is, I'm struggling to know where to start. I'll describe the problem: I have application A, which is a third-party application in Java, and application B, which is MY application, also in Java. They're both Java for cross-platform reasons. Application A is a client and is going to try and connect to a server at an unknown IP. I can control, through app A, which IP or hostname it tries to connect to. What I need to do, using app B, is intercept the connection request from app A and change the destination IP. For example, I could tell app A to connect to 'localhost'. When active, app B would intercept this request, notice that localhost should be redirected and actually send the request to an external IP. App A should be oblivious to the change. Using the Windows host file isn't possible, as it's got to be cross platform. Is this possible? Where do I start? I'm a relatively experienced C/C++/C# programmer, using Java for a change. A: You are looking for a transparent proxy. Maybe you can study this code. | High | [
0.6901408450704221,
36.75,
16.5
]
|
Emotion Dysregulation in the Context of Pain and Alcohol Use Among Latinos in Primary Care. Latinos experience more severe pain relative to other racial/ethnic groups. Although pain is associated with alcohol use, little is known about pain/alcohol associations among Latinos. The current study examined whether emotion dysregulation explained associations between pain intensity/disability and alcohol use among Latinos in primary care. Participants were 252 low-income Latino adults (mean age = 38.7 years, SD = 10.8; 86.1% female; 95.2% reported Spanish as their first language) who completed self-report measures of pain, emotion dysregulation, and alcohol use. There was a significant indirect effect of pain intensity via emotion dysregulation in relation to alcohol use severity. In addition, there was a significant indirect effect of pain-related disability via emotion dysregulation in relation to alcohol use severity. Pain intensity and pain-related disability were each associated with emotion dysregulation, which in turn was associated with the severity of alcohol use. Effects were evident after controlling for sex, marital status, education, and years in the United States. Alternative models examined "reverse" indirect effects and were statistically rejected. Among Latinos in primary care, emotion dysregulation is a possible explanatory factor underlying pain and alcohol use associations. | High | [
0.6822916666666661,
32.75,
15.25
]
|
Applications of anti-curosurf antibodies to understanding the biology of alveolar surfactant. The structure of surfactant-binding proteins from alveolar cell membranes was investigated using monoclonal anti-idiotypic antibodies directed against surfactant-binding regions of anti-surfactant monoclonal antibodies. Two different series of monoclonal anti-surfactant antibodies were used. One series included antibodies against rabbit surfactant, and the other antibodies against porcine surfactant. In addition, two monoclonal anti-idiotype antibodies were made. These anti-idiotype antibodies, called A2R and A2C, bind both anti-Curosurf and anti-rabbit surfactant antibodies comparably. They recognize a 30-kDa cell membrane protein on alveolar and bronchial epithelial cells. In addition, A2C and A2R block the binding of radiolabeled surfactant to these cells. Using a combination of A2C and A2R cDNA expression libraries from both human and porcine lungs were screened. One independent clone was identified in each library that produced protein that bound these monoclonal antibodies. The protein encoded by the cDNA in each clone bound radiolabeled recombinant surfactant protein-A. It is concluded that human and porcine alveolar cell SP-A binding proteins have been identified and its cDNA cloned. The potential implications of this finding for the understanding and treatment of surfactant deficiency states are considerable. | High | [
0.695266272189349,
29.375,
12.875
]
|
The parents who tortured and starved 12 of their 13 kids in California will now face 25 years to life in prison as part of a deal with the prosecution. David Allen Turpin and Louise Anna Turpin, the reportedly “good Christian family” who held their children captive with chains and padlocks until one of them escaped and called 911, were arrested last year after their kids were found living in deplorable conditions. Now, the “parents” have accepted a plea deal that guarantees they spend at least 25 years in prison. The two appeared in court on Friday and each pleaded guilty to 14 counts in connection to the abuse case — including torture, false imprisonment, adult dependent abuse and child endangerment. Louise Turpin, 49, shed tears as she pleaded guilty while her husband, 56, was more stoic. They accepted a plea deal, meaning they will not have to go to trial. Their children will not have to testify. While a plea deal may seem like a light punishment given what could have happened in a trial, spending the next two decades, at least, in prison could take up most (if not all) of the rest of their lives. More importantly, the deal means their children won’t have to go through the pressure of a trial and reliving the worst moments of their lives. According to the parents of David Turpin, their son had more than a dozen children because God commanded the couple to do so. The children were taught via “very strict homeschooling” and they were routinely told to memorize long passages from the Bible. That alone isn’t necessarily a problem, but it shows you the disconnect between their professed faith and their actual actions. Riverside County District Attorney Michael Hestrin called the case the worst child abuse he’s ever seen. Hestrin said he met with the children prior to Friday’s developments. He said the children were uniformly pleased that they won’t have to testify. “I met with all the victims prior to today, all of them including the 3-year-old, and I was very taken by them, by their optimism, by their hope for the future, for their future. They have a zest for life and huge smiles and I was, I am optimistic for them,” Hestrin said. Optimism is all we can hope for, given that this kind of trauma won’t disappear entirely. At least if these two are out of the picture, the children have a chance of growing up without abusive parents getting in their way. They deserve so much better than the cards they’ve been dealt up to this point. | Mid | [
0.5774058577405851,
34.5,
25.25
]
|
A portion of the disclosure of this patent document contains material that is subject to copyright protection. The copyright owner has no objection to the facsimile reproduction by anyone of the patent document or the patent disclosure as it appears in the Patent and Trademark Office patent file or records, but otherwise reserves all copyright rights whatsoever. The present invention relates to the field of postage metering systems, and more particularly to a portable, secure, low cost, and flexible postage metering system. A postage meter allows a user to print postage or other indicia of value on envelopes or other media. Conventionally, the postage meter can be leased or rented from a commercial group (e.g., Neopost Inc.). The user purchases a fixed amount of value beforehand and the meter is programmed with this amount. Subsequently, the user is allowed to print postage up to the programmed amount. Historically, postage meters have been dedicated, stand-alone devices, capable only of printing postage indicia on envelopes (or labels, in the case of parcels). These devices normally reside at a single user location and only provide postage metering for that location. Such postage meters often require the user to physically transport the device to a post office for resetting (i.e., increasing the amount of postage contained in the meter). An advance over this system is the ability to allow the user to reset the meter via codes that are provided by either the manufacturer or the postal authority once payment by the user had been made. Modem electronic meters are often capable of being reset directly by a registered party, on-site (at the user""s location) via a communications link. A system that performs meter resetting in this manner is known as a Computerized Meter Resetting System (or xe2x80x9cCMRSxe2x80x9d). The party having authority to reset the meter and charge the user (usually the manufacturer or the postal authority) thus gains access to and resets the meter. Even with these advancements, postage meters are still, for the most part, restricted to use at a single physical location. As such devices are dedicated (and rather sophisticated in their fail-safe attributes and security), their price tends to be prohibitive for small entities. Moreover, the items requiring postage must often be brought to the device because of the device""s physical size and the need for supporting connections (i.e., power, communications, and the like). As can be seen, a postage metering system that is portable, low-cost, secure, and flexible in operation is highly desirable. Moreover, a system that centralizes both postage accounting and security features is also highly desirable. Such a system would allow the printing of postage indicia at locations that are convenient to the end-user by allowing the user to take a portion of the system to the item in need of postage, rather than the reverse. The invention provides a postage metering system that is portable, low-cost, secure, and flexible in operation. A secure metering device (SMD) maintains important postal information and provides the required secure processing. A computer (or host PC) provides the user interface and coordinates transactions between the SMD, a user, and a provider. By careful partitioning of the various features of the metering system, the SMD can be manufactured in a (relatively) small-size and low-cost unit. Similarly, the use of a small, dedicated printer enhances portability and low cost. An embodiment of the invention provides a postage metering system that includes a host PC, an SMD, and a printer. The host PC includes a user interface to receive postage information. The SMD operatively couples to the computer via a communications link and includes a processor and a tamper evident enclosure. The processor is configured to receive the postage information from the computer, direct generation of an indicium, and account for the indicium. The tamper evident enclosure houses the processor and other security sensitive elements of the SMD. The printer couples to the SMD and is configured to receive and print the indicium. Another embodiment of the invention provides a metering device that includes a memory element, an interface circuit, a processor, and an enclosure. The memory element is configured to store accounting information and information related to the operation of the metering device. The interface circuit is configured to receive a message that includes a code that identifies that message. The processor operatively couples to the memory element and the interface circuit. The processor is configured to receive the message, process the message to generate an indicium, and update the accounting information to account for the generated indicium. The enclosure houses the processor and indicates tampering of elements within the enclosure. Yet another embodiment of the invention provides a method for printing an indicium. In accordance with this embodiment, an SMD is first registered with a provider. The SMD is then funded via a funding transaction with the provider, wherein the funding is performed via an electronic communications link. After funding, the SMD receives a request to print the indicium. The SMD verifies if sufficient funds exist in the SMD to cover the value of the indicium. If sufficient funds exist, the SMD generates a signed message that includes the indicium. The signed message is verified for authenticity and, if authentic, the indicium is printed. The foregoing, together with other aspects of this invention, will become more apparent when referring to the following specification, claims, and accompanying drawings. | Mid | [
0.580896686159844,
37.25,
26.875
]
|
Ascension Day Lyrics Rising from a black bondage below into the pre-past Legendary ancient mask now summoned by magicians See massive retaliation out of the abyss Who is the first to encounter darkened fate like this? A once deserted battlefield - above Exumer's face A glance up to the thunderous skies Ascension day - today Britain under Norman terror, innocent the victims Thrashing, raping, burning, killing, slaying, now revenge Young Hasting defender lowers the mask to his face Long forgotten force within begins the deadly race An invocation to be witnessed by the fighting masses The moons of Leng, a sea of blood The ascension of the mask The warrior and the mask Showing no remorse Killing without end A way of no return The warrior and the mask Invincible strength The Abramelin Possessed by the flame The war - that you have fought so hard The end will not come so soon So warrior - you think that you have won This time you better think twice You're wrong -you cannot escape your fate Forged in the realms of war Listen - there is no invincible strength As there is no eternal life ... die! Crying screams of disillusionment into the night A fighter victorious, now consumed by fright The steel mask he's wearing it won't come off From inside the steel spikes push slowly in his eyes Paying the prize of hybris on the field of war The sorcerer he laughs/Ascension day - today | Mid | [
0.575875486381322,
37,
27.25
]
|
Bosses's attacks have strengthened strikers determination on the picket line this morning (Pic: Bridget Parsons) Teachers at Birmingham’s Small Heath School began a three-day strike today, Tuesday, in an increasingly bitter dispute with school bosses. A big turnout from supporters from outside the school boosted picket lines while a stream of vehicles tooted their horns in solidarity. NUT union members are striking in defence of victimised union rep Simon O’Hara. They plan two further three-day strikes in the two weeks after next week’s half term. One striker told Socialist Worker, “The NUT is going strong and our members are out in full force today. There’s nobody wavering. Simon’s a very hardworking and dedicated teacher. He’s got lots of support. “I taught a lesson yesterday and the kids were all asking about him. They all say he’s a really good teacher.” One teacher joined the NUT the day before the strike so they could join the action. Another filled out their NUT membership form on the picket line. As one teacher told Socialist Worker, “The NUT has grown during this dispute. Strikers are completely united and strong.” A series of escalating strikes forced bosses to back down at the end of last month over plans to turn the school into an academy. They also retreated on plans to push through 71 job cuts. And two members of the interim executive board that runs the school resigned. But bosses then suspended another NUT member at the school. One striker said this had “strengthened the resolve of the NUT”. | Mid | [
0.633832976445396,
37,
21.375
]
|
Without seeing the stylesheet, it's impossible to guess what the problem is. You can attach it (using the little checkbox above the reply block), or you can email it to stylus-field-report (at) stylusstudio.com, and we'll take a look at it for you. Please remove the attached stylesheet in this thread from public view immediately. This was a debugging problem for your benefit exclusively. This was not a question about using your products or using the XSL language. This stylesheet runs in Saxon. I'm quite shocked that you would publish my stylesheet under these circumstances. You might be shocked too. | Low | [
0.49052631578947303,
29.125,
30.25
]
|
Q: SQL statements via php in javascript i'd like to know if it's allowed, i mean it worked for me, but is it a good practice? if not, what issues i will be dealing with ahead... i'm a php/script virgin btw. // button <button type="button" class="btn btn-primary" id="Submit-button" >Save changes</button> <script> $("#Submit-button").click(function() { <?php $db_connection = new mysqli(DB_HOST, DB_USER, DB_PASS, DB_NAME); $result = $db_connection->query('update reservation set gm_submit="Y"'); ?> }); </script> -------UPDATE--------------- k.. here's what i did... and it worked fine... $("#SaveButton").click(function() { $.ajax({ url: 'db.php', type: 'POST', data: {} }); }); i'm fine by this? A: Use ajax post and process the db updation. $.ajax({ url: 'db.php', type: 'POST', data: {} }); DB.php <?php $db_connection = new mysqli(DB_HOST, DB_USER, DB_PASS, DB_NAME); $result = $db_connection->query('update reservation set gm_submit="Y"'); ?> | Mid | [
0.630102040816326,
30.875,
18.125
]
|
Big Kirk Hallam Community Centre It is with huge sadness and shock that we can confirm that several people were hurt this morning when a van hit them, while they patiently waited for the Foodbank. For those that do- please pray for a swift return to full health for everyone involved. Thanks go to the team from Butterflies nursery who quickly helped, and to the Para medics and police who quickly cane to the scene. | Low | [
0.281129653401797,
13.6875,
35
]
|
Q: Autoclose dialog in Flutter I want to autoclose dialog a few seconds after opening. The solution that I found is to call Navigator.of(context).pop(); delayed and it works. But the problem occurs if I closed it manually (by clicking outside) before the execution of the Navigator.pop command. Then Navigator.pop just closes the app and I see just a black screen. I need a way to destroy this delay on closing the dialog or to find another workaround. showDialog( context: context, builder: (BuildContext builderContext) { Future.delayed(Duration(seconds: 5), () { Navigator.of(context).pop(); }); return AlertDialog( backgroundColor: Colors.red, title: Text('Title'), content: SingleChildScrollView( child: Text('Content'), ), ); } ); A: You can use a Timer to achieve this. You can cancel the timer whenever you want. Declare a timer property in your class: Timer _timer; And change your showDialog code like: showDialog( context: context, builder: (BuildContext builderContext) { _timer = Timer(Duration(seconds: 5), () { Navigator.of(context).pop(); }); return AlertDialog( backgroundColor: Colors.red, title: Text('Title'), content: SingleChildScrollView( child: Text('Content'), ), ); } ).then((val){ if (_timer.isActive) { _timer.cancel(); } }); | Mid | [
0.647201946472019,
33.25,
18.125
]
|
The humoral immune system in coeliac disease. IgA is transported into intestinal secretions to perform exclusion of luminal antigens. The prerequisites are antigen sampling by the Peyer's patch M cells, antigen processing by antigen-presenting cells, and presentation of antigenic peptides by HLA class II molecules to immunocompetent T-cells. The basis for intestinal immunity is the maturation cycle of specifically primed T and B cells from the gut-associated lymphoid tissue via mesenteric lymph nodes and peripheral blood back to the intestinal lamina propria. In coeliac disease, patients are sensitized against gluten and serum gliadin antibodies are often detected. Gliadin antibodies are also found in other gastrointestinal diseases, other disorders and in healthy individuals not carrying the coeliac disease-specific DQA/DQB alleles. On the other hand, serum reticulin and endomysium autoantibodies are both sensitive and highly disease-specific. Positivity in patients with normal jejunal morphology indicates latency of coeliac disease. These tissue autoantibodies are directed against fibroblast-derived extracellular matrix proteins. The immune system is involved in the amplification and perpetuation of the abnormalities of the intestinal mucosa in coeliac disease. The role of antibody in the pathogenesis remains unknown. The author hypothesizes gluten-triggered autoimmune mechanism to be operative. | High | [
0.683291770573566,
34.25,
15.875
]
|
Grown-ups are autistic, too Autism, which affects one in every 100 people, inhibits the ability to communicate, recognise emotions and socialise, and can take a mild or severe form. London - One in 100 adults has autism, according to a major report. Experts say the disorder and similar conditions such as Asperger’s syndrome are far more widespread than previously thought. And as with children, the study has found that autism is far commoner in males than females. About 1 in 50 men has the condition in some form compared to just 1 in 300 women. In addition, the report by the NHS Information Centre also found that a third of adults with learning difficulties was autistic. Although autism has been widely studied in children, until recently little was known about the prevalence amongst adults. Researchers asked more than 7,400 men and women a series of questions that can pick up signs of autism. Those whose answers suggested they might have the condition were invited to take part in a more rigorous test. In another survey researchers interviewed more than 300 adults with learning difficulties and their carers. Their combined results found that 1.1 percent of all adults had some form of autism. This is similar to the estimated prevalence amongst children - although some studies claim it could be as high as 1 in 60. Mark Lever, chief executive of The National Autistic Society, said: 'There has long been a tendency to view autism as solely a condition affecting children but this is the first study to find that the prevalence of autism is roughly the same for adults as it is for children. 'Many people with autism currently face a battle to get appropriate support, with 63 percent of adults saying they do not have enough to meet their needs. Now that we know how many adults with autism there are in England local authorities should be better able to estimate local need and plan services accordingly.' Autism and Asperger’s cause a range of behavioural problems that vary between individuals. Until about 20 years ago the conditions were considered relatively rare. But in the 1990s there was a huge surge in the number of autism cases reported in children, after a wider diagnostic definition of the condition was introduced. Autism also became far more high profile after a controversial study it may be triggered by the MMR vaccine – this link has since been widely disputed. - Daily Mail | High | [
0.6730506155950751,
30.75,
14.9375
]
|
Q: Difference between a constant DC and PWM I was wondering what would you get on subtracting a 12V (From 0 to 12V) PWM (50% duty cycle), from a 12V constant DC source? I am sorry, english is not my first language. I mean that if from an arduino or a comparator, we connect the output pwm to a motor, and other side of the motor to a 12V source, then what kind of voltage drop can we expect across the resistor. A: I was wondering what would you get on subtracting a 12V (From 0 to 12V) PWM (50% duty cycle), from a 12V constant DC source? Well half the time you'd get 0V (12V - 12V = 0V) and the rest of the time you'd get 12V (12V - 0V = 12V). In fact what the subtraction does is invert the squarewave about a mean level of 6V but, because it has a 50% duty cycle it looks exactly the same. If instead you had a 30% duty cycle (12V 30% of the time) you'd end up with a waveform that has 12V 70% of the time. | Mid | [
0.64,
36,
20.25
]
|
--- abstract: 'Hadamard ideals were introduced in 2006 as a set of nonlinear polynomial equations whose zeros are uniquely related to Hadamard matrices with one or two circulant cores of a given order. Based on this idea, the cocyclic Hadamard test enable us to describe a polynomial ideal that characterizes the set of cocyclic Hadamard matrices over a fixed finite group $G$ of order $4t$. Nevertheless, the complexity of the computation of the reduced Gröbner basis of this ideal is $2^{O(t^2)}$, which is excessive even for very small orders. In order to improve the efficiency of this polynomial method, we take advantage of some recent results on the inner structure of a cocyclic matrix to describe an alternative polynomial ideal that also characterizes the mentioned set of cocyclic Hadamard matrices over $G$. The complexity of the computation decreases in this way to $2^{O(n)}$, where $n$ is the number of $G$-coboundaries. Particularly, we design two specific procedures for looking for $\mathbb{Z}_t \times \mathbb{Z}_2^2$-cocyclic Hadamard matrices and $D_{4t}$-cocyclic Hadamard matrices, so that larger cocyclic Hadamard matrices (up to $t \leq 31$) are explicitly obtained.' address: - - - - - | Dpto. Matemática Aplicada I. Univ. Sevilla.\ Avda. Reina Mercedes s/n 41012 Sevilla, Spain author: - 'V. Álvarez' - 'J.A. Armario' - 'R.M. Falcón' - 'M.D. Frau' - 'F. Gudiel' bibliography: - 'HadGrob.bib' nocite: '[@*]' title: Gröbner bases and cocyclic Hadamard matrices --- Hadamard matrix ,basis of cocycles ,polynomial ring ,ideal. \[thm\][Lemma]{} Introduction. ============= A [*Hadamard matrix*]{} $H$ of order $n$ is an $n\times n$ matrix with every entry either $1$ or $-1$, which satisfies $HH^T=nI$, where $I$ is the identity matrix of order $n$. Although it is well-known that $n$ has to be necessarily $1,\,2$ or a multiple of $4$ (as soon as three or more rows have to be simultaneously orthogonal), there is no certainty whether such a Hadamard matrix exists at every possible order. Currently, the smallest order for which no Hadamard matrix is known is 668. The [*Hadamard conjecture*]{} asserts that there exists a Hadamard matrix of order $4t$ for every natural number $t$. There exist so many different constructions for Hadamard matrices: Sylvester, Paley, Williamson, Ito, Goethals-Seidel, one and two circulant cores or cocyclic matrices, amongst others (see [@Hor07]). Nevertheless, most of them fail to yield Hadamard matrices for every order which is a multiple of 4 and therefore are not suitable candidates for a proof of the Hadamard conjecture. Among all these constructions, it seems that the two most promising are the Goethals-Seidel arrays and the cocyclic constructions. Actually, the one and two circulant cores constructions have recently been described to be somehow cocyclic-based (the cores themselves are cocyclic over $\mathbb{Z}_{4t-1}$ and $D_{4t-2}$, respectively). A stronger version of the Hadamard conjecture, posed by [@HdL95] is the [*cocyclic Hadamard conjecture:*]{} this states that there exists a cocyclic Hadamard matrix at every possible order. Currently the smallest order for which no cocyclic Hadamard matrix is known is 188. [@Kotsireas2006] introduced the concept of [*Hadamard ideal*]{} as a set of nonlinear polynomial equations whose zeros determine the set of Hadamard matrices with one circulant core. Shortly after, [@Kotsireas2006a] used the same ideal together with a series of new polynomials in order to determine the set of Hadamard matrices with two circulant cores, by means of which they computed the Hadamard matrices with two circulant cores up to order 52. In this paper, we define several [*cocyclic Hadamard ideals*]{}, whose zeros determine the set of cocyclic Hadamard matrices over a finite group $G$ of order $4t$. Based on the cocyclic test of [@HdL95], our first approach (Theorem \[thm1\]) gives rise to a procedure [CocGM($t,G,opt$)]{} which works just for very small $t$, actually $t \leq 3$. In order to improve the efficiency of this polynomial method and provided a basis of $G$-cocycles is known, we define in Theorem \[thmbasesgeneral\] an alternative ideal based upon the system of equations described by [@AAFR08], which also characterize the set of $G$-cocyclic Hadamard matrices. This gives a procedure [CocCB($t,G,opt$)]{} suitable for larger values of $t$. Furthermore, from the knowledge of the properties of cocyclic matrices over $\mathbb{Z}_t\times \mathbb{Z}_2^2$ and $D_{4t}$ described by [@AGG15; @AAFGGO16], improved versions of this procedure ([CocAH($t,col,dist,H$)]{} and [CocDH($t,opt,H$)]{}, based on Theorems \[thm2\] and \[thm3\], respectively) are used to perform local searches for $\mathbb{Z}_t\times \mathbb{Z}_2^2$-cocyclic Hadamard matrices and $D_{4t}$-cocyclic Hadamard matrices, so that matrices of order up to $4t \leq 124$ are found. All the procedures have been implemented as a library [*hadamard.lib*]{} in the open computer algebra system for polynomial computations [Singular]{}, developed by [@Decker2016]. Examples illustrating the use of this library and the library itself are available online at `http://personales.us.es/raufalgan/LS/hadamard.lib`. The remainder of the paper is organized as follows. The first part of Section \[sec:prelim\] is devoted to describe some preliminary concepts and results on Hadamard matrices and algebraic geometry, that are used in the rest of the paper. Later, we define a zero-dimensional ideal that determines the set of cocyclic Hadamard matrices over a given group $G$ of order $4t$, which comes from a straightforward translation of the cocyclic Hadamard test of [@HdL95]. In Section \[sec:cocyclic\], we propose an alternative to the previous construction by defining a new zero-dimensional ideal, based on the results of [@AAFR08]. Actually, we particularize this procedure for $\mathbb{Z}_t\times \mathbb{Z}_2^2$-cocyclic Hadamard matrices and $D_{4t}$-cocyclic Hadamard matrices, attending to the properties described by [@AGG15; @AAFGGO16]. The last section is devoted to conclusions and outlines for further work. Preliminaries. {#sec:prelim} ============== We expose in this section some basic concepts and results on Hadamard matrices and algebraic geometry that are used throughout the paper. We refer to the monographs of [@McL95], [@Hor07], [@dLF11] and [@Cox1998; @Cox2007] for more details about these topics. Assume throughout that $G=\{ g_1=1, \ldots, g_{4t}\}$ is a multiplicative finite group of $4t$ elements, not necessarily abelian. A function $\psi\colon G\times G\rightarrow \langle -1\rangle\cong \mathbb{Z}_2$ is said to be a [*(binary) cocycle*]{} over $G$, or simply $G$-cocycle for short, if it satisfies that $$\label{eqcocyclic} \psi(g_i,g_j)\psi(g_ig_j,g_k)=\psi(g_j,g_k)\psi(g_i,g_jg_k), \text{ for all } g_i,g_j,g_k\in G.$$ The cocycle $\psi$ is naturally displayed as a [*cocyclic matrix*]{} $M_\psi$ whose $(i,j)^{\text{th}}$ entry is $\psi(g_i,g_j)$ for all $g_i,g_j\in G$. Since it must be $\psi(1,g_j)=\psi(g_i,1)$ for all $g_i,g_j\in G$, the first row and column of $M_\psi$ are all either 1 or $-1$. In the first case, the cocycle $\psi$ and its cocyclic matrix $M_\psi$ are said to be [*normalized*]{}. There is a one to one correspondence between normalized and non normalized cocycles. In what follows, we reduce ourselves to normalized cocycles, for commodity. Given $g_d\in G$, the [*elementary coboundary*]{} $\partial_d$ is the cocycle over $G$ defined as $$\partial_d(i,j):=\delta_{g_d}(g_i)\delta_{g_d}(g_j)\delta_{g_d}(g_ig_j),$$ where $\delta_{g_d}\colon G\rightarrow \{-1,1\}$ is the characteristic set map such that $\delta_{g_d}(g_i)=-1$ if $g_i=g_d$ and $1$, otherwise. The [*generalized coboundary matrix*]{} $\overline{M}_{\partial_d}$ consists of negating the $d^{\text{th}}$-row of the matrix $M_{\partial_d}$. Note that negating a row or a column of a matrix does not change its Hadamard character. This is just a particular case of a more general set: there is an equivalence relation (termed [*Hadamard equivalence*]{}) on Hadamard matrices, so that two matrices are Hadamard equivalent whenever they differ in a series of row and/or column negations and/or permutations. [@AAFR08] proved that every generalized coboundary matrix $\overline{M}_{\partial_d}$ has the following properties a) $\overline{M}_{\partial_d}$ contains exactly two negative entries in each row $s\neq 1$, which are located at positions $(s,d)$ and $(s,e)$, for $g_e=g_s^{-1}g_d$. b) Given $g_s\neq 1$ and $g_c$ in $G$, there are exactly two generalized coboundary matrices ($\overline{M}_{\partial_c}$ and $\overline{M}_{\partial_d}$), with a negative entry in the position $(s,c)$, where $g_d=g_sg_c$. c) Two generalized coboundary matrices share their two negative entries at the $s^{\text{th}}$ row if and only if $g_s^2=1$. A [*basis*]{} ${\bf B}=\{ \psi_1 , \ldots, \psi_k\}$ of cocycles over $G$ consists of some elementary coboundaries $\partial_i$ and some representative cocycles. Every cocycle over $G$ admits a unique representation as a product of the generators in ${\bf B}$, $\psi=\psi_1^{x_1}\cdots \psi_k^{x_k}$, $x_i \in \mathbb{Z}_2$. The tuple $(x_1,\ldots,x_k)_{\bf B}$ defines the [*coordinates*]{} of $\psi$ with regards to ${\bf B}$. Accordingly, every cocyclic matrix $M_\psi=(\psi(i,j))$, for $\psi=(x_1,\ldots,x_k)_{\bf B}$, admits a unique decomposition $M_\psi=M_{\psi_1}^{x_1} \cdots M_{\psi_k}^{x_k}$ as the Hadamard pointwise product of those matrices $M_{\psi_i}$ corresponding to entries $x_i=1$. In general, the number of elements of ${\bf B}$ is an open question. Furthermore, since the elementary coboundary $\partial_1$ related to the identity element $1\in G$ is not normalized, we may assume that $\partial_1 \notin {\bf B}$. In what follows, we use generalized coboundary matrices instead of classical coboundary matrices. Let us point out that any matrix obtained as the Hadamard product of generalized coboundary matrices and representative cocycles is Hadamard equivalent to a cocyclic matrix by means of negations of certain rows. A cocycle $\psi$ (over $G$) is said to be [*orthogonal*]{} if its cocyclic matrix $M_\psi$ is Hadamard. In such a case, $M_\psi$ is said to be a [*a cocyclic Hadamard matrix over $G$*]{}. The set of cocyclic Hadamard matrices over $G$ is denoted by $\mathcal{H}_G$. The [*cocyclic Hadamard test*]{} of [@HdL95] asserts that a normalized cocyclic matrix $M_\psi$ is Hadamard if and only if $$\label{cTestHad} \sum_{j\in G} \psi(i,j)=0, \text{ for all } i\in G\setminus\{1\}.$$ A row of $M_\psi$ is termed [*Hadamard row*]{} precisely when its summation is zero. This way, $M_\psi$ is Hadamard if and only if every row (but the first) is a Hadamard row. We expose now some basic concepts of algebraic geometry. Let $X$ and $\mathbb{K}[X]$ be, respectively, the set of $m$ variables $\{x_1,\ldots,x_m\}$ and the related multivariate polynomial ring over a field $\mathbb{K}$. The [*affine variety*]{} $V(I)$ of an ideal $I\subseteq \mathbb{K}[X]$ is the set of points in $\mathbb{K}^m$ that are zeros of all the polynomials of $I$. The ideal $I$ is said to be [*zero-dimensional*]{} if $V(I)$ is finite. It is said to be [*radical*]{} if every polynomial $p\in \mathbb{K}[X]$ belongs to $I$ whenever there exists a natural number $n$ such that $p^n\in I$. A [*term order*]{} $<$ on the set of monomials of $\mathbb{K}[X]$ is a multiplicative well-ordering that has the constant monomial $1$ as its smallest element. The largest monomial of a polynomial $p$ of $I$ with respect to the term order $<$ is its [*leading monomial*]{}. The ideal generated by the leading monomials of all the non-zero elements of $I$ is its [*initial ideal*]{} $I_<$. Those monomials of polynomials of $I$ that are not leading monomials of any polynomial of $I$ are called [*standard monomials*]{}. If the ideal $I$ is zero-dimensional, then the number of standard monomials of $I$ coincides with the dimension of $\mathbb{K}[X]/I$ over $\mathbb{K}$, which is greater than or equal to the number of points of $V(I)$. The equality holds when $I$ is radical. This dimension can be obtained by computing the [*Hilbert function*]{} $\mathrm{HF}_{\mathbb{K}[X]/I}$, which maps each non-negative integer $d$ onto $\mathrm{dim}_k(\mathbb{K}[X]_d/I_d)$, where $\mathbb{K}[X]_d$ denotes the set of homogeneous polynomials in $\mathbb{K}[X]$ of degree $d$ and $I_d=\mathbb{K}[X]_d\cap I$. In particular, $\mathrm{dim}_k(\mathbb{K}[ X]/I)=\sum_{0\leq d}\mathrm{HF}_{\mathbb{K}[X]/I}(d)$. If the ideal $I$ is zero-dimensional, then the number $\mathrm{HF}_{\mathbb{K}[X]/I}(d)$ coincides with the set of standard monomials of degree $d$, regardless of the term order. As a consequence, the Hilbert function of $\mathbb{K}[X]/I$ coincides with that of $\mathbb{K}[X]/I_<$, for any term order $<$, which can be obtained by using for instance the algorithm of [@Mora1983]. Previously, it is required to determine the initial ideal $I_<$. In any case, [@Bayer1992] already proved that the problem of computing Hilbert functions is NP-complete. A [*Gröbner basis*]{} of the ideal $I$ is any subset $GB$ of polynomials of $I$ whose leading monomials with respect to a given term order generate the initial ideal $I_<$. It is [*reduced*]{} if all its polynomials are monic and no monomial of a polynomial in $GB$ is generated by the leading monomials of the rest of polynomials in the basis. There exists only one reduced Gröbner basis of the ideal $I$. This basis generates the initial ideal $I_<$ and can be used, therefore, to determine the cardinality of its affine variety $V(I)$. Further, the points of this variety can been enumerated once the reduced Gröbner basis is decomposed into finitely many disjoint subsets, each of them being formed by the polynomials of a triangular system of polynomial equations, whose factorization and subsequent resolution are easier than the system related to the generators of the original ideal $I$. See in this regard the articles of [@Hillebrand1999], [@Lazard1992] and [@Moller1993]. Gröbner bases can be used, therefore, to determine both the cardinality and the elements of the set $\mathcal{H}_G$ of cocyclic Hadamard matrices over a multiplicative finite group $G$ of $4t$ elements. Let $\mathbb{Q}[X_G]$ be the polynomial ring over the set of variables $\{X_G\}=\{x_{i,j}\colon\, g_i,g_j\in G\}$ and let us define the polynomial $$p_{i,j,k}(\text X):=x_{i,j}-x_{ij,k}x_{j,k}x_{i,jk}, \text{ for all } g_i,g_j,g_k\in G,$$ where the products $ij$ and $jk$ are induced by the group law in $G$. The next result shows how the set $\mathcal{H}_G$ of cocyclic Hadamard matrices over $G$ can be identified with the affine variety defined by a zero-dimensional radical ideal of nonlinear polynomials in $\mathbb{Q}[X_G]$. \[thm1\] The set $\mathcal{H}_G$ can be identified with the set of zeros of the zero-dimensional ideal $$\begin{aligned} I_G\, := \, & \langle\,x_{i,j}^2-1, x_{1,j}-1, x_{i,1}-1\colon\, i,j\in G\setminus\{1\}\,\rangle\, + \langle\,p_{i,j,k}(\text X)\colon\, i,j,k\in G\,\rangle\, + \\ \ & \langle\,\sum_{j\in G}x_{i,j}\colon\, i\in G\setminus\{1\}\,\rangle\, \subset \mathbb{Q}[X_G].\end{aligned}$$ Besides, $|\mathcal{H}_G|= \mathrm{dim}_{\mathbb{Q}}(\mathbb{Q}[X_G]/I_G)$. Let $P=(p_{i,j})$ be a point of the affine variety $V(I_G)$. From the first subideal of $I_G$, every component $p_{i,j}$ of $P$ is either $1$ or $-1$, for all $i,j\in G$. Let $\psi:G\times G\rightarrow \{\pm 1\}$ be defined such that $\psi(i,j)=p_{i,j}$, for all $g_i,g_j\in G$. Since the second subideal of $I_G$ implies that $\psi$ satisfies identity (\[eqcocyclic\]) for all $g_i,g_j,g_k\in G$, the point $P$ can be identified with the cocyclic matrix $M_\psi$ related to $\psi$. Finally, the third subideal of $I_G$ implies that $M_\psi$ satisfies identity (\[cTestHad\]) and hence, $M_\psi$ is Hadamard. The affine variety $V(I_G)$ coincides, therefore, with the set $\mathcal{H}_G$, whose finiteness involves the ideal $I_G$ to be zero-dimensional. Besides, since $I_G\cap \mathbb{Q}[x_{i,j}]=\langle\,x_{ij}^2-1\,\rangle\subseteq I_G$ for all $i,j\in G$, Proposition 2.7 of [@Cox1998] involves $I_G$ to be radical and hence, $|\mathcal{H}_G|=|V(I_G)|= \mathrm{dim}_{\mathbb{Q}}(\mathbb{Q}[X_G]/I_G)$. Notice that the computation of the reduced Gröbner basis of a zero-dimensional ideal is extremely sensitive to the number of variables. See in this regard the articles of [@Hashemi2009], [@Hashemi2011], [@Lakshman1991] and [@Lakshman1991a]. In the last reference, the authors proved that the complexity of our computation is $d^{O(n)}$, where $d$ is the maximal degree of the polynomials of the ideal and $n$ is the number of variables. In the case of Theorem \[thm1\], this complexity is $2^{O(t^2)}$, which renders the computation only possible for very low values of $t$ that are not useful to analyze the Hadamard conjecture. Thus, for instance, using our procedure [CocGM($t,G,opt$)]{} in an Intel Core i7-2600, with a 3.4 GHz processor and 16 GB of RAM, the computation of the reduced Gröbner bases of the ideals related to the group $\mathbb{Z}_t\times \mathbb{Z}^2_2$ and the dihedral group $D_{4t}$ are only feasible for $t\leq 3$. For higher orders, the system runs out of memory. Notice that, depending on whether the parameter [opt]{} is equal to 1 or 2, the procedure calculates either just the number of cocyclic Hadamard matrices over $G$ or the explicit full set of these matrices. In Section \[sec:cocyclic\] we define another ideal $J_G$ for computing $\mathcal{H}_{G}$ in a more subtle way, progressing on the previous work of [@AAFR08] and provided a basis for cocycles over $G$ is known. Unfortunately, it will be still extremely hard to compute $\mathcal{H}_{G}$ for large $|G|$. Nevertheless, taking advantage of the properties of cocyclic matrices over $D_{4t}$ and $\mathbb{Z}_t\times \mathbb{Z}^2_2$ described by [@AGG15; @AAFGGO16], this ideal $J_G$ may be specifically simplified for computing $\mathcal{H}_{D_{4t}}$ and $\mathcal{H}_{\mathbb{Z}_t\times \mathbb{Z}^2_2}$ in a better way. Ideals built from a basis for $G$-cocycles {#sec:cocyclic} ========================================== In order to reduce the complexity of the computation of the reduced Gröbner basis that has been exposed in the previous section, we consider a new zero-dimensional radical ideal $J_G$ related to the set $\mathcal{H}_G$, where we diminish the number of variables and the maximal degree of the polynomials progressing on the knowledge of an explicit basis for cocycles over $G$. Let $G$ be a multiplicative finite group of order $4t$, ${\bf B}=\{\psi_1,\ldots,\psi_k\}$ be a basis for normalized cocycles over $G$ and $\psi$ be a normalized cocycle over $G$ of coordinates $(x_1,\ldots,x_k)_{\bf B}$ with regards to ${\bf B}$. Let $m^d_{i,j}$ denote the $(i,j)^{\text{th}}$ entry of $M_{\psi_d}$, so that the $(i,j)^{\text{th}}$ entry of $M_\psi$ is $(m_{i,j}^1)^{x_1}\cdots (m_{i,j}^k)^{x_k}$. Recall that normalized cocyclic Hadamard matrices are precisely those matrices that are built up from Hadamard rows (excepting the first row, consisting all of 1s). In these circumstances, the $i^{th}$-row of the previous matrix $M_\psi$ is Hadamard if and only if $${\displaystyle}\sum _{j=1}^{4t}(m_{i,j}^1)^{x_1}\cdots (m_{i,j}^k)^{x_k}=0.$$ The next result holds. \[sistema\] The matrix $M_\psi$ is Hadamard if and only if the vector of coordinates $(x _1, \ldots , x _k)_{\bf B}$ of $\psi$ with regards to ${\bf B}$ satisfies the following system of $4t-1$ equations and $k$ unknowns $$\label{system}\left\{ \begin{array}{lcc} (m_{2,1}^1)^{x_1}\ldots (m_{2,1}^k)^{x_k}+\ldots+ (m_{2,4t}^1)^{x_1} \ldots (m_{2,4t}^k)^{x_k}&=&0 \\ &\vdots& \\ (m_{4t,1}^1)^{x_1} \ldots (m_{4t,1}^k)^{x_k}+\ldots+ (m_{4t,4t}^1)^{x_1} \cdots (m_{4t,4t}^k)^{x_k}&=&0 \end{array}\right.$$ $\Box$ The solutions of the system (\[system\]) constitute precisely the whole set of normalized cocyclic Hadamard matrices over $G$. Trying to solve this system may be as complicated as performing an exhaustive search for cocyclic Hadamard matrices over $G$. Instead, we intend to translate the system (\[system\]) in terms of a set of nonlinear $\mathbb{Q}[X]$-polynomial equations over the set of variables $\{ X\}=\{x_1,\ldots,x_k\}$ (whose $0,1$ values are related to the coordinates of $G$-cocycles with regards to ${\bf B}$), and to study the structure of the associated ideal. A succinct algebraic description of the quadratic constrains $\{ X\}\subset \{0,1\}^k$ is provided by the following set of $k$ algebraic equations: $$\label{0dime} x_i(x_i-1)=0, \,\, \text{ for all } i\in\{1,\ldots,k\}.$$ In order to define the rest of polynomial equations that arise from the system (\[system\]), we use the next two main ideas or simplifications: - From a practical point of view, we may assume we work with a fixed representative cocycle $\rho$ among all of the possible choices of representative cocycles. In fact, empirically, in the groups most intensively studied, there always exists a better combination of representative cocycles for producing Hadamard matrices. See in this regard the works of [@AAFR08; @AGG15; @AAFGGO16], [@BH95], [@Fla97] and [@Hor07]. We will denote by $M_\rho=(r_{i,j})$ the matrix related to the Hadamard product $\rho$ of these representative cocycles. Obviously, this pruning in the searching space might eliminate some cocyclic Hadamard matrices. If we want to find the whole set of cocyclic Hadamard matrices, we have to perform an analogous search for the other possible choices of $M_\rho$. In what follows we assume that $\psi _1, \ldots , \psi _{k-m} \in {\bf B}$ are $G$-coboundaries, $\psi _{k-m+1}, \ldots, \psi_k\in {\bf B}$ are representative $G$-cocycles and $\rho= \prod _{i=k-m+1}^k \psi _i ^{x_i}$ is a fixed linear combination of these representative cocycles. - The second property of the generalized coboundary matrices implies that the $h^{\text{th}}$ summand of the $l^{\text{th}}$ equation in (\[system\]) reduces to be $r_{l+1,h} (m_{l+1,h}^i)^{x_i} (m_{l+1,h}^j)^{x_j}$, for $i$ and $j$ defining the (unique) two generalized coboundaries $\overline{M}_{\partial_i}$ and $\overline{M}_{\partial_j}$ sharing a negative entry in the position $(l+1,h)$. Notice that, eventually, one or even the two of these coboundaries $\partial _i,\partial _j$ might not be in [**B**]{}. Actually, the monomial $s_{l,h}(\text X)$ related to the mentioned $h^{\text{th}}$ summand of the $l^{\text{th}}$ equation in (\[system\]) depends on whether the two, just one or none of the coboundaries $\partial _i,\partial _j$ (precisely those whose related generalized coboundary matrices contribute a negative entry at position $(l+1,h)$) are in [**B**]{}. More concretely, - If $\partial_i,\partial_j, \in {\bf B}$, then $$s_{l,h}(\text X):=r_{l+1,h}\,(1-2x_i)(1-2x_j).$$ - If just $\partial_i \in {\bf B}$, then $$s_{l,h}(\text X):=r_{l+1,h}\,(1-2x_i).$$ - If $\partial_i,\partial_j, \notin {\bf B}$, then $$s_{l,h}(\text X):=r_{l+1,h}.$$ Let $S_l(\text X):=\sum_{j=1}^{4t}s_{l,j}(\text X)$ and let $\mathcal{H}^\rho_{G}$ be the set of solutions of (\[system\]) of the form $\psi=\rho \prod _{i=1}^{k-m} \psi_i ^{x_i}$. The set $\mathcal{H}^\rho_{G}$ coincides with the set of solutions of the system of polynomial equations $$\begin{cases}\begin{array}{rc}x_i(x_i-1)=0, & \,\, \text{ if } 1\leq i\leq k-m,\\ \quad S_l(\text X)=\sum_{j=1}^{4t} s_{l,j}(\text X)=0, & \,\,\text{ if }1\leq l\leq 4t-1.\end{array}\end{cases}$$ Similarly to Theorem \[thm1\], the next result holds. \[thmbasesgeneral\] The set $\mathcal{H}^\rho_{G}$ can be identified with the set of zeros of the following zero-dimensional ideal of $\mathbb{Q}[X]$. $$J_G:=\langle\,x_i^2-x_i\colon\, i\in \{1,\ldots,k-m\}\,\rangle\, +\langle\,\sum_{h=1}^{4t} s_{l,h}(\text X)\colon\, l\in\{1,\ldots 4t-1\}\,\rangle.$$ Moreover, $|\mathcal{H}^\rho_{G}|= \mathrm{dim}_{\mathbb{Q}}(\mathbb{Q}[ X]/J_G)$. $\Box$ Observe in particular that, according to Lakshman and Lazard, the complexity of the computation of the reduced Gröbner decreases from $2^{O(t^2)}$ in Theorem \[thm1\] to $2^{O(k-m)}$ in Theorem \[thmbasesgeneral\]. In order to check the efficiency of this alternative, we have implemented in our library [*hadamard.lib*]{} a second procedure called [CocCB($t,G,opt$)]{} that determines, depending on whether $opt=1$ or 2, the number or the explicit set of cocyclic Hadamard matrices developed over a given group $G$. The procedure has been tested in the computation of the number of cocyclic Hadamard matrices developed over the group $\mathbb{Z}_t \times \mathbb{Z}^2_2$ and the dihedral group $D_{4t}$ of order $4t$. Specifically, we have run the procedure in a system with an [*Intel Core i7-2600, 3.4 GHz*]{} and [*Ubuntu*]{}. Running times are exposed in Table \[table1\]. --- ----------------------------------------------------- ------------- ------------- -------------------------- ------------- ------------- t $|\mathcal{H}_{\mathbb{Z}_t\times \mathbb{Z}_2^2}|$ [*CocGM*]{} [*CocCB*]{} $|\mathcal{H}_{D_{4t}}|$ [*CocGM*]{} [*CocCB*]{} 1 6 0 (0) 0 (0) 6 0 (0) 0 (0) 3 24 129 (5718) 0 (0) 72 - 0 (0) 5 120 - 10 (120) 1400 - 15 (-) 7 - - - 7488 - 68195 (-) --- ----------------------------------------------------- ------------- ------------- -------------------------- ------------- ------------- : Running times related to [*CocGM*]{} and [*CocCB*]{}.[]{data-label="table1"} Actually, this procedure [CocCB($t,G,opt$)]{} might be improved if a deeper knowledge about the inner structure of cocyclic matrices over $G$ is known. In particular, progressing on the works of [@AGG15; @AAFGGO16], we have been able to design two specific procedures for looking for $\mathbb{Z}_t \times \mathbb{Z}_2^2$-cocyclic Hadamard matrices and $D_{4t}$-cocyclic Hadamard matrices, so that larger cocyclic Hadamard matrices (up to $t \leq 31$) are obtained. The details are exposed in the next two subsections. The group $\mathbb{Z}_t\times \mathbb{Z}^2_2$ --------------------------------------------- Consider the group $G=\mathbb{Z}_t \times \mathbb{Z}_2^2$, $t>1$ odd, with ordering $$G=\{(0,0,0),(0,0,1),(0,1,0),(0,1,1),(1,0,0),\ldots,(t,1,1)\},$$ indexed as $\{1,\ldots,4t\}$. A basis ${\bf B}=\{\partial _2,\ldots, \partial _{4t-2},\beta_1,\beta_2,\beta_3\}$ for cocycles over $G$ is described by [@AAFR08; @AAFR09], and consists of $4t-3$ coboundaries and three representative cocycles. As usual, $\partial _i$ refers to the coboundary associated to the $i^{th}$-element in $G$. An explicit description of these cocycles was exposed by [@AAFR08]. Notice that all cocyclic Hadamard cocyclic matrices over $\mathbb{Z} _t \times \mathbb{Z}_2^2$ known so far use all the three representative cocycles $\beta_1,\beta_2$ and $\beta_3$ simultaneously (see the paper of [@BH95] for details). Thus, we assume $$M_\rho=1_t \otimes \left(\begin{array}{rrrr}1&1&1&1\\1&-1&1&-1 \\1&-1&-1&1\\1&1&-1&-1 \end{array}\right)$$ and hence, we restrict (\[0dime\]) to the equations related to the $4t-3$ coboundaries, that is, $$x_i(x_i-1)=0, \,\, \text{ for all } i\in\{1,\ldots,4t-3\}.$$ Let us point out that the system (\[system\]) is equivalent to the one built up with the equations from the $4^{\text{th}}$ to the $(2t+1)^{\text{th}}$ (see the works of [@AAFR08; @AGG15]). So, we have only $2t-2$ polynomials of the form $S_l(\text X)=s_{l,1}(\text X)+\ldots+s_{l,4t}(\text X)$. Before computing the monomials $s_{l,h}(\text X)$, we state the following lemma, which follows straightforwardly by inspection. In the sequel, $[n]_m$ denotes $n\mod m$ for short. Given the position $(s,c)$ with $5\leq s\leq 2t+2$ and $1\leq c\leq 4t$, the two generalized coboundary matrices with entries $-1$ at the position $(s,c)$ are $\overline{M}_{\partial_c}$ and $\overline{M}_{\partial_{j(s,c)}}$ where $$j(s,c) := 1\,+\,4\displaystyle \left[\left\lfloor \frac{s-1}{4}\right\rfloor+\left\lfloor\frac{c-1}{4}\right\rfloor\right]_t \, +\,2\left[\left\lfloor\frac{[s-1]_4}{2}\right\rfloor \,+\,\left\lfloor\frac{ [c-1]_4}{2}\right\rfloor\right]_2 \,+\, \left[s+c\right]_2.$$ $\Box$ Taking into account this lemma and the basis ${\bf B}$ of cocycles, we compute the monomials $$s_{l,h}(\text X):=r_{l+4,h}\,(1-2x_{h-1})^{\chi_{\bf B}(h)}\,(1-2x_{j(l+4,h)-1})^{\chi_{\bf B}(j(l+4,h))},$$ for $1\leq l\leq 2t-2$ and $1\leq h\leq 4t$, where $$\chi_{\bf B}(i):=\left\{\begin{array}{cl} 1, & \text{if}\,\, \partial_i\in {\bf B},\\ 0, & \text{otherwise}. \end{array}\right.$$ Similarly to Theorem \[thm1\], the next result holds. \[thm2\] The set $\mathcal{H}^\rho_{\mathbb{Z}_t\times \mathbb{Z}^2_2}$ can be identified with the set of zeros of the following zero-dimensional ideal of $\mathbb{Q}[X]$. $$J_{\mathbb{Z}_t\times \mathbb{Z}^2_2}:=\langle\,x_i^2-x_i\colon\, i\in \{1,\ldots,4t-3\}\,\rangle\, +\langle\,\sum_{h=1}^{4t} s_{l,h}(\text X)\colon\, l\in\{4,\ldots 2t+1\}\,\rangle.$$ Besides, $|\mathcal{H}^\rho_{\mathbb{Z}_t\times \mathbb{Z}^2_2}|= \mathrm{dim}_{\mathbb{Q}}(\mathbb{Q}[X]/J_{\mathbb{Z}_t\times \mathbb{Z}^2_2})$. $\Box$ Actually, some additional assumptions, as those exposed by [@AGG15], may be considered. Coboundaries $\partial _i$ on $\mathbb{Z}_t\times \mathbb{Z}^2_2$-cocyclic Hadamard matrices $M_\psi = M_\rho \prod _{i\in I} M_{\partial _i}$ are somehow symmetrically distributed, in the sense that the relation $4k+j \in I \Leftrightarrow 4t-4k+j \in I$, $1 \leq k \leq \frac{t-1}{2}$, $1 \leq j \leq 4$, holds. Furthermore, the number $c_k$ of coboundaries of each subset $\{ 4k+j\in I: \; 1 \leq j \leq 4\}$, for a fixed $2 \leq k \leq t$, satisfies $c_1 - c_k \equiv 1 \; \mbox{mod }2$. And the number $r_j$ of coboundaries of each subset $\{ 4k+j\in I: \; 1 \leq k \leq t\}$, for $1 \leq j \leq 4$, give rise to a tuple $dist=(r_1,r_2,r_3,r_4)$ (termed [*distribution*]{} by [@AGG15]) which certainly satisfies some additional properties. Any $\mathbb{Z}_t\times \mathbb{Z}^2_2$-cocyclic matrix $M_\psi = M_\rho \prod _{i\in I} M_{\partial _i}$ may be uniquely identified as a $(4 \times t)$ binary matrix $D_\psi=(d_{jk})$ (termed [*diagram*]{} by [@AGG15]), such that $d_{jk}=1$ if and only if $4(k-1)+j \in I$. The conditions described above have a straightforward translation in terms of $D_\psi$. More concretely, - column $i$ of $D_\psi$ is equal to column $t+2-i$, for $2 \leq i \leq t$. - the sum of column $2 \leq j\leq t$ of $D_\psi$ is of different parity of that of column 1 of $D_\psi$. - the sum of each row of $D_\psi$ gives the distribution $dist=(r_1,r_2,r_3,r_4)$. Thus the method may be improved, as soon as the distribution $dist$ and the number of coboundaries per column $col=(c_2,\ldots,c_{\frac{t-1}{2}})$ are provided. We have implemented this method as a [Singular]{} procedure called [CocAH($t,col,dist,H$)]{}. Since exhaustive calculations are not feasible for $t\geq 11$, we have included in this procedure a new parameter $H=(x_2,\ldots,x_{2t+2})$, which determines which coboundaries are fixed ($x_i=1$ means $\partial _i$ is used, whereas $x_i=0$ implies $\partial _i$ is not used), and which of them are unknowns to be settled in the search (those corresponding to values $x_i=2$). This way, $\mathbb{Z}_t\times \mathbb{Z}^2_2$-cocyclic Hadamard matrices have been found up to $t \leq 31$, as Table \[table2\] shows. The dihedral group $D_{4t}$ --------------------------- Let $G$ be the dihedral group $D_{4t}=\langle a, b \,\colon\, a^{2t}=b^2=1,\,bab=a^{-1}\rangle$ with ordering $$\{1,a,\ldots,a^{2t-1},b,ab,\ldots,a^{2t-1}b\},$$ indexed as $\{1,\ldots,4t\}$. A basis ${\bf B}$ for cocycles over $G$ is explictly described by [@AAFR08; @AAFR09]. For $t>2$, the basis consists of $4t-3$ coboundaries $\partial_k$ and three representative cocycles $\beta_i$, so that ${\bf B}=\{\partial _2,\ldots, \partial _{4t-2},\beta_1,\beta_2,\beta_3\}$. In the sequel we assume $t>2$. [@Fla97] observed that cocyclic Hadamard matrices over $D_{4t}$ mostly use $\beta_2\cdot \beta_3$ and do not use $\beta_1$. So, we assume $M_\rho=M_{\beta_2} \cdot M_{\beta_3} =\left( \begin{array}{cr} A&A\\B&-B \end{array}\right)$, where $$A=\left( \begin{array}{crcr} 1&1&\cdots & 1\\ 1&&_{\cdot}\cdot^{\cdot}&-1\\ \vdots&_{\cdot}\cdot^{\cdot}&_{\cdot}\cdot^{\cdot}&\vdots\\ 1&-1&\cdots&-1\end{array} \right) \quad \mbox{and} \quad B=\left( \begin{array}{rrrr} 1&-1&\cdots & -1\\ \vdots&\ddots&\ddots&\vdots\\ 1&&\ddots&-1\\ 1&1&\cdots&1\end{array} \right).$$ Therefore, in this case, (\[0dime\]) is rewritten as $$x_i(x_i-1)=0, \,\, \text{ for all } i\in\{1,\ldots,4t-3\}.$$ According to [@AAFR08], the last $3t$ equations in the system (\[system\]) are superfluous for $D_{4t}$-cocyclic Hadamard matrices. So, we have only $t-1$ polynomials of the form $S_l=s_{l,1}+\ldots+s_{l,4t}$. Before computing the monomials $s_{l,h}$, we state the following lemma, which follows straightforwardly by inspection. The two generalized coboundary matrices with entries $-1$ in a position $(s,c)\in \{2,\ldots,t\}\times\{1,\ldots,4t\}$ are $\overline{M}_{\partial_c}$ and $\overline{M}_{\partial_{j(s,c)}}$, where - If $1\leq c\leq 2t$, then $$j(s,c):=\left\{\begin{array}{cl} 2t, & \mbox{if $c+s-1=2t$},\\ c+s-1 \mod 2t, & \mbox{otherwise}. \end{array}\right.$$ - If $2t+1\leq c\leq 4t$, then $$j(s,c):=\left\{\begin{array}{cl} c+s-1, & \mbox{if $c+s-1\leq 4t$},\\ 2t + (c+s-1 \mod 2t), & \mbox{otherwise}. \end{array}\right.$$ $\Box$ Taking into account this lemma and the basis of cocycles ${\bf B}$, we compute the monomials $$s_{l,h}:=r_{l+1,h}\,(1-2x_{h-1})^{\chi_{\bf B}(h)}\,(1-2x_{j(l+1,h)-1})^{\chi_{\bf B}(j(l+1,h))},$$ for $1\leq l\leq t-1$ and $1\leq h\leq 4t$. Similarly to Theorem \[thm1\], the next result holds. \[thm3\] The set $\mathcal{H}^\rho_{D_{4t}}$ can be identified with the set of zeros of the following zero-dimensional ideal of $\mathbb{Q}[ X]$. $$J_{D_{4t}}:=\langle\,x_i^2-x_i\colon\, i\in \{1,\ldots,4t-3\}\,\rangle\,+\,\langle\,\sum_{h=1}^{4t} s_{l,h}(\text X)\colon\, l\in\{1,\ldots t-1\}\,\rangle.$$ Besides, $|\mathcal{H}^\rho_{D_{4t}}|= \mathrm{dim}_{\mathbb{Q}}(\mathbb{Q}[ X]/J_{D_{4t}})$. $\Box$ We have implemented this method as a [Singular]{} procedure called [CocDH($t,opt,H$)]{}. Once again, the parameter $opt$ indicates whether to compute the cardinality or the full set $\mathcal{H}^\rho_{D_{4t}}$ of $D_{4t}$-cocyclic matrices. And the auxiliary parameter $H=(x_2,\ldots,x_{4t-2})$ once again determines which coboundaries are fixed ($x_i=1$ means $\partial _i$ is used, whereas $x_i=0$ implies $\partial _i$ is not used), and which of them are unknowns to be settled in the search (those corresponding to values $x_i=2$). Similarly to the $\mathbb{Z}_t\times \mathbb{Z}^2_2$ case, an initial distribution of the coboundaries is fixed by considering the tuple $dist=(d_1,\ldots,d_t)$ such that $$\begin{cases} d_1:= x_1+x_{2t-2} + x_{2t+1},\\ d_i:=x_i+x_{2t-i+1} + x_{2t+i} + x_{4t-i-1}, \text{ for all } i\in\{2,\ldots,t-1\},\\ d_t:=x_{2t-1}+x_{2t}. \end{cases}$$ This way, $D_{4t}$-cocyclic Hadamard matrices have been found up to $t \leq 33$, as Table \[table3\] shows. In the table, those initial coboundaries that are not permitted to be used are underlined. Conclusions =========== By means of distinct techniques in algebraic geometry, this paper has been concerned with the computation of cocyclic Hadamard matrices over a fixed group $G$ of order $4t$, as the affine varieties of certain non-zero dimensional radical ideals. All the procedures that are described in the paper have been implemented in the open computer algebra system for polynomial computations [Singular]{} and are included in the library [*hadamard.lib*]{}, which is available online at `http://personales.us.es/raufalgan/LS/hadamard.lib`. Based on the classic cocyclic test of [@HdL95], our first approach (Theorem \[thm1\]), has excessive complexity even for very small $t$. In order to improve the efficiency of this polynomial method, we have used recent results on the inner structure of a cocyclic matrix and we have defined a different ideal that also characterizes the set of $G$-cocyclic Hadamard matrices (Theorem \[thmbasesgeneral\]). Improved versions of this procedure ([CocAH($t,col,dist,H$)]{} and [CocDH($t,opt,H$)]{}, based on Theorems \[thm2\] and \[thm3\], respectively) have been used to perform local searches for $\mathbb{Z}_t\times \mathbb{Z}_2^2$-cocyclic Hadamard matrices and $D_{4t}$-cocyclic Hadamard matrices, so that matrices of order up to $4t \leq 124$ have been found. To this end, an auxiliary data $H$ is needed to perform these local searches, for $t\geq 11$ (an exhaustive search is only feasible for $t<11$). More concretely, the list $H$ indicates which coboundaries are fixed (either used or not), and which of them are considered unknowns to be settled. A very interesting future work is trying to characterize if there exist some typo structures for $H$ such that the existence of cocyclic Hadamard matrices over either $\mathbb{Z}_t\times \mathbb{Z}_2^2$ or $D_{4t}$ is predicted. | High | [
0.6657608695652171,
30.625,
15.375
]
|
Petrobras to export new crude oil from Buzios from the fourth quarter of 2018 Buzios production began in April 2018, in the pre-salt region of the Santos Basin, about 200 km off the coast of Rio de Janeiro, on the P-74 platform, according to a statement released by Petrobras in April. Petrobras must export a new type of crude oil, known as Buzios, the last quarter of 2018, sources close to the S & P Global Platts on Monday. Exports of the new gross product would be directed mainly to China, one source said. Búzios production began in April 2018, in the pre-salt region of the Santos Basin, about 200 km off the coast of Rio de Janeiro, on the P-74 platform, according to a statement released by Petrobras in April. In addition to the P-74, four other platforms will be allocated to this field between 2018 and 2021, each capable of processing up to 150,000 barrels of oil and 6 million cubic meters of gas per day, according to the company. Buzios is a medium heavy crude, rich in medium and heavy distillates, with an API gravity of about 28.4 degrees. The sulfur content is about 0.31%. The launch of this oil will raise Petrobras’ total exports to about 750,000 b / d by 2019, sources close to the company said. Brazil was the second largest supplier of crude oil to China in June, only 100,000 tonnes less than Angola, around 1.15 million tonnes, down 2.7% from the previous month. The strong buying interest of independent refineries in China in the first half of 2018 raised Brazil’s total imports in the period to 8.5 million tons, an increase of 67.7% over the previous year. In addition to the traditional classes in Brazil – Lula, Lapa, Iracema and Sapinhoa - independent refiner Tianhong Petrochemical bought 40,000 tonnes of Mero crude in June after the first Mero crude oil was brought to China by Vitol in May. Mero is a new crude with an API gravity of about 28.6 degrees and a sulfur content of about 0.32%. | Mid | [
0.572043010752688,
33.25,
24.875
]
|
Once favored to become pope, Scola made his remarks at the Catholic University of the Sacred Heart for the opening of a conference focusing on Roman Emperor Constantine's 313 Edict of Milan granting imperial toleration to Christianity. Scola advocated a "healthy secularism" allowing religious freedom, defined by him as a "true litmus test" for a civilized society. To Scola, this "freedom means above all encouraging religious pluralism and opening to all forms of religious expression," including "eliminating laws that criminally punish blasphemy."Speaking at a conference in Milan, Italy, on May 8, 2013, that city's archbishop, Cardinal Angelo Scola, called for the abolition of blasphemy laws worldwide. Such a step would significantly help protect globally the freedom of speech and religion desperately needed by Christians in particular while countering Islamic fanaticism with freedom. As the Catholic cable television channel EWTN reported online, the role of blasphemy laws in Muslim-majority countries in persecuting Christians and other religious minorities formed the global context of Scola's remarks. As reviewed previously by this writer, the authors of Persecuted: The Global Assault on Christians have extensively documented that "Christians are the single most widely persecuted religious group in the world today," a "terrible trend…on the upswing." Moreover, "it is in the Muslim world where persecution of Christians is now most widespread, intense, and, ominously, increasing." Abolition of Muslim blasphemy laws, often used to prohibit propagation of Christian beliefs contradicting Muslim doctrine, would eliminate one important instrument of Islamic repression. Such religious freedom would protect not just private rights, but also public peace. "Religious freedom," notes Scola's fellow Catholic, Professor Thomas F. Farr of Georgetown University's Berkley Center for Religion, Peace, & World Affairs, "the evidence shows, can be an antidote to religion-related extremism, including terrorism." Freedom, analyzes Farr, dilutes fanaticism by forcing various faiths to justify their claims intellectually without coercion in a marketplace of ideas. "What if," speculates Farr, Osama Bin Laden had been raised in a Saudi Arabia that allowed for religious freedom? What if, instead of being steeped exclusively in the toxic teachings of Wahhabism and Sayyid Qutb, he had been exposed to other forms of Islam, to critics of Islam, to other forms of religious belief, and to liberal religion-based arguments about justice and the common good? Christians like Scola and Farr have a perfectly sound theological basis for faith-based advocacy of religious freedom. As the prominent Protestant pastor and theologian John Piper haswritten, numerous Biblical verses relate that "Christ did his work by being insulted" in stark contrast to Islam in which the "work of Muhammad is based on being honored." As the somewhat religiously eclectic but committed freethinker Thomas Jefferson wrote to a majoritarian-Christian America in his landmark 1779 (adopted 1785) Virginia Statute for Religious Freedom, "all attempts to influence" individual religious belief by temporal punishments, or burthens, or by civil incapacitations…are a departure from the plan of the holy author of our religion, who being lord both of body and mind, yet chose not to propagate it by coercions on either, as was in his Almighty power to do, but to extend it by its influence on reason alone. Ironically, Christian calls for religious freedom with respect to Islam would manifest precisely the Christian concept of the "church militant" (ecclesia militans). Muslim entities like the 57 Muslim-majority member states (including "Palestine") of the Organization of Islamic Cooperation (OIC) have often tried to hide advocacy of de facto Islamic blasphemy laws behind a supposedly "ecumenical veneer" of opposition to "defamation of religion" in general. Christian calls for religious freedom, come what may in criticism and/or condemnation of any particular faith, ostentatiously breaks ranks with this united front claimed by some Muslims, leaving them to defend religious repression on their own. European opponents of blasphemy laws like Scola, though, will have to begin actually with their own continent. Scola's native Italy as well as seven other European countries (out of a total of 45, or 18%) had blasphemy laws according to a 2011 Pew Forum on Religion and Public Life study. Somewhat similar to blasphemy laws, laws against "defamation" of religion also existed in 36 European countries (80%), while collectively religious restrictions of various sorts exist in 47% of countries worldwide. As many have already noted (see here, here, and here), ultimately arbitrary European enforcement of such laws today more often than not involve the Islamic faith of recently arrived immigrant communities, not Europe's historically dominant Judeo-Christian beliefs. Accordingly, concerns about limiting free speech with respect to Islam played a role in the 2012 abolition of the blasphemy law in one of the eight European countries listed by Pew in 2011, Holland. The Dutch precedent is a model to follow for all faithful people who believe that they have a religious truth that will set free, a truth that need not fear freedom. | High | [
0.675257731958762,
32.75,
15.75
]
|
Writing in 2007, French social philosopher André Gorz (1923–2007) was remarkably prophetic, foretelling the international economic meltdown of 2008: “The real economy is becoming an appendage of the speculative bubbles sustained by the finance industry—until that inevitable point when the bubbles burst, leading to serial bank crashes and threatening the global system of credit with collapse and the real economy with a severe, prolonged depression.” This prescient article is collected in Ecologica alongside many of Gorz’s final writings and interviews, which together offer practical and often path-breaking set of solutions to our current economic and political problems. In his writings Gorz condemns the speculative global economic system and anatomizes its terminal crisis. Advocating an exit from capitalism through the self-limitation of needs and the networked use of the latest technologies, he outlines a practical, democratically based solution to our current predicament. Compiled by Gorz, Ecologica is intended as a final distillation of his work and thought, a guide to the survival of our planet. It is a work of political, rather than scientific ecology—Gorz aruges that the key to planetary survival is not a surrender to environmental experts and eco-technocrats, but a switch to non-consumerist modes of living that would amount to a type of cultural revolution. “To my mind the greatest of modern French social thinkers.”—Herbert Gintis, author of Schooling in Capitalist America “Gorz’s work was always within the Utopian tradition—a label he welcomed but which was used pejoratively by his opponents . . . Many of his derided early warnings about globalization and environmental degradation have become commonplace discourses in political debates today. Ultimately, Gorz’s Utopianism was expressed in a very practical sense—we never know how far along the road we are if we have no idea of the destination.”—Independent André Gorz, also known by his pen name Michel Bosquet, was an Austrian and French social philosopher. Also a journalist, Gorz was the editor of Les Temps modernes and co-founded Le Nouvel Observateur, a leftist weekly, in 1964. His other books include Socialism and Revolution and Farewell to the Working Class. Chris Turner is a writer and translator who lives in Birmingham, England. | High | [
0.7378129117259551,
35,
12.4375
]
|
Selma Blair Ageing Looks Natural? Though appears naturally, but actress Selma Blair cannot escape from plastic surgery rumors. Some years ago, media said that Selma Blair had taken Botox injections and some filler procedures to her face to make it looks fresh. But the rumors vanished as soon as the actress proofed by herself that there are no cosmetic procedures she had taken. She said that she loves appears naturally and the signs of ageing can be seen by anyone. She just said that she does not hate plastic surgery but she needs to think twice before take it. Because of her age, what she just need is just more intense beauty care products and treatments, not Botox injections or facial fillers. Selma Blair Selma Blair Beitner was born in Southfield, Michigan, US in June 23 1972. As an actress, Selma has starred in a variety of genres of film, including some commercial Hollywood motion pictures, art house and indie films. Her professional acting career started in 1995 and then made her debut in the film industry one year later. Her first works consisted of some television guest roles, lead roles in unreleased projects and brief appearances in mainstream films. Selma Blair achieved international fame after she played as Liz Sherman in the 2004 fantasy film Hellboy and 2008 Hellboy II: The Golden Army. However, before her appearance in the Marvel film, Selma has played in some other films, including Legally Blonde, The Sweetest Thing, The Fog and Purple Violets. Her latest film entitled Columbus Circle, produced in 2012. Selma Blair Before And After Plastic Surgery? We know that Selma Blair has entered 40 and some wrinkles will appear soon. However, despite she is a famous actress, we can see clearly the signs of ageing ion her face. Though there are no wrinkles, but some other signs cannot be covered. Those signs show that Selma is clear from Botox injection or facial fillers like the rumored spread by media some years ago. | Mid | [
0.617117117117117,
34.25,
21.25
]
|
1. Introduction =============== Neuromuscular electrical stimulation (NMES) is a commonly used physical therapy method used in human subjects to re-educate motor function \[[@B1-sensors-15-17241]\], increase peripheral blood circulation \[[@B2-sensors-15-17241]\], improve muscle power , and help burning fat \[[@B3-sensors-15-17241]\], *etc.* \[[@B4-sensors-15-17241],[@B5-sensors-15-17241]\]. It would be desirable for users to make NMES therapy devices be convenient and wearable in everyday use for patients with various rehabilitation and healthcare needs. Conventionally, NMES devices mostly use self-adhesive hydrogel electrodes as stimulation electrodes. These gelled electrodes may be advantageous for fixation and good contact with skin surface, but the extended use of hydrogel electrodes can decrease hydrogel resistivity due to drying out, resulting in reduction of stimulation performance \[[@B6-sensors-15-17241]\]. In addition, hydrogel electrodes may cause skin irritation and allergic reactions in patients over time, their repeated use may be unhygienic, and they are not washable or properly sanitized after use. Therefore, these limitations in use of conventional hydrogel electrodes in stimulation devices could make them uncomfortable and inconvenient for long time users. For more comfort and convenient stimulation, textile electrodes fabricated by the integration of conductive yarn into fabrics would be expected to be an alternative to hydrogel electrodes. In the last decade, more and more interest has been focused on textile electrodes for their potential applications in personal and family health care. Compared to conventional self-adhesive hydrogel electrodes, textile electrodes possess a number of the better features such as being more comfortable to wear and causing almost no skin irritation in long-term use due to their good ventilation, flexibility, foldability, and non-hydrogel characteristics. In addition, textile electrodes can be easily integrated into clothes and conveniently cleaned. With these good properties, textile electrodes should be more suitable in long-term uses such as monitoring physiological signals in clinical applications. Currently, textile electrodes have been used in long-term monitoring of electrocardiogram (ECG) \[[@B7-sensors-15-17241],[@B8-sensors-15-17241],[@B9-sensors-15-17241]\], electromyography (EMG) \[[@B10-sensors-15-17241],[@B11-sensors-15-17241],[@B12-sensors-15-17241]\], electroencephalogram (EEG) \[[@B13-sensors-15-17241]\] signals, and so forth. As an example, self-fabricated textile electrodes have been successfully utilized in our laboratory to record the EMG signals for control of multifunctional myoelectric prostheses \[[@B14-sensors-15-17241]\]. Our results suggested that the textile electrodes could work well in the control of myoelectric prostheses that would be worn by limb amputees for a quite long period every day. Recently, textile electrodes also have been applied to facilitate electric stimulation in sports and rehabilitation applications \[[@B15-sensors-15-17241],[@B16-sensors-15-17241],[@B17-sensors-15-17241],[@B18-sensors-15-17241]\]. By using various types of washable textile electrodes, Li *et al*. \[[@B17-sensors-15-17241]\] designed an intelligent garment for transcutaneous electrical nerve stimulation. Their experimental results suggested that textile electrodes could achieve similar electrical properties as those of conventional hydrogel electrodes, and could effectively deliver electrical power to the target regions of the human body. The recent study \[[@B18-sensors-15-17241]\] designed a screen printed flexible and breathable fabric electrode array for wearable functional electrical stimulation. The performance tests of the fabric electrode array were conducted on two intact subjects for the involuntary hand and wrist movements by stimulating their wrist and finger extensor muscles. Their experiments showed that the fabric electrode array can produce similar levels of movement as a flexible printed-circuit-board (PCB) array with a hydrogel layer. In addition, in order to improve the stimulation effectiveness and the wearing comfort, different conductive textile materials were investigated and compared in manufacturing textile stimulation electrodes \[[@B16-sensors-15-17241]\]. With integration of conductive textile stimulation electrodes, some smart garments were developed for restoring hand functions \[[@B16-sensors-15-17241]\] and for pain relief \[[@B17-sensors-15-17241]\]. Furthermore, easy and cost-effective fabric manufacturing methods were investigated to make textile stimulation electrode use feasible in both clinical and home environments \[[@B18-sensors-15-17241]\]. These previous studies all suggested that textile electrodes should be an ideal alternative for neuromuscular electrical stimulation in physical therapy and rehabilitation. Note that it would be expected by users that the conductive stimulation electrodes would provide effective muscle activation at the targeted locations of body with the least pain and without permanent skin damage (burns) and irritation. Although the feasibility and performance of textile electrodes in neuromuscular electrical stimulation have been investigated well in a number of previous studies \[[@B15-sensors-15-17241],[@B16-sensors-15-17241],[@B17-sensors-15-17241],[@B18-sensors-15-17241]\], some important issues such as the impedance spectroscopy, the stimulation comfort, and the underlying discomfort mechanisms of textile electrodes are not well investigated yet. In previous studies \[[@B15-sensors-15-17241],[@B19-sensors-15-17241]\], the stimulation comfort of conventional hydrogel electrodes has been investigated and the results showed that some issues such as the distribution of stimulation current densities, the size and materials of the stimulation electrodes would affect the perceived comfort in neuromuscular electrical stimulation. However, the stimulation comfort and underlying mechanism of textile electrodes in wearable neuromuscular electrical stimulation, which would be significant in their clinical neural rehabilitation applications, remains unknown. In this study, we used a self-fabricated surface electrode with conductive textiles to investigate its stimulation comfort. The electrode impedance spectroscopies of the dry textile electrode as well as a wet textile electrode and a hydrogel electrode were assessed on healthy subjects. Based on the measured impedance data, the equivalent circuit model was developed and fitting data of different types of electrode were obtained. Moreover, the stimulation threshold and comfort of both dry and wet textile electrodes were analyzed and compared with those of hydrogel electrode in the healthy subjects. Finally, the finite element models of the dry textile electrode, the wet textile electrode and the hydrogel electrode were developed to analyze what causes the stimulation discomfort of the textile electrode. This study might provide some insights into improving stimulation comfort and effectiveness of textile electrodes. 2. Methods ========== 2.1. Design of a Textile Electrode for Electrical Stimulation ------------------------------------------------------------- The studied textile electrode consisted of conductive fabric, textile filling, textile band, and metal snap fastener, as shown in [Figure 1](#sensors-15-17241-f001){ref-type="fig"}. The conductive fabric was made of silvered polyamide with additional Spandex. Absorbent sponge was used as textile filling, which was enwrapped with the conductive fabric. The textile band was used as a textile base. The metal snap fastener was employed for connection with stimulation devices. An elastic Velcro strap was utilized to locate the textile electrode at the proper location on the legs in the functional electrical stimulation application. The dimension of each layer of the textile electrode is about 6 cm × 4 cm, and the thicknesses of the conductive fabric and the absorbent sponge are about 0.4 mm and 5 mm, respectively. {#sensors-15-17241-f001} 2.2. Impedance Spectroscopy Measurement of the Textile Electrode ---------------------------------------------------------------- In order to estimate the impedance spectroscopy of the self-fabricated textile electrode, ten healthy subjects (four females and six males, aged 28.4 ± 2.59 years) participated in the electrode-skin impedance spectroscopy measurement experiments. The recruitment process of subjects and the experimental protocols were approved by the Ethics Committee for Human Research, Shenzhen Institutes of Advanced Technology, Chinese Academy of Sciences. All subjects were informed about the purpose and the procedures to be used in the study. The electrode-skin impedance was measured using a Gamry Potentiostat (Reference 600) with a 10-mV (RMS) AC sinusoid signal in a frequency range of 0.1 Hz to 100 kHz. A two-electrode cell configuration was setup in the Gamry system. The subjects were seated on a chair with the tested lower leg horizontally placed on a table with adjustable height. The skin area over the tibialis anterior (TA) muscle was cleaned with 75% isopropyl alcohol before the placement of each type of electrode. A pair of electrodes (either textile or hydrogel) were placed over the TA muscle with a proximal inter-electrode distance of 4 cm, as shown in [Figure 2](#sensors-15-17241-f002){ref-type="fig"}. For each subject, two types of textile electrodes (dry one and wet one) were used, respectively. A wet textile electrode was made by pouring about 2 mL of pure water onto a dry textile electrode. {#sensors-15-17241-f002} Microscopic views of the dry and wet textile electrodes are shown in [Figure 3](#sensors-15-17241-f003){ref-type="fig"}, from which we could see that there are some water drops between the textile grids in the wet electrode ([Figure 3](#sensors-15-17241-f003){ref-type="fig"}b). For comparison purposes, a commercially available common hydrogel electrode (Nanjing Dalun Medical Technology Co. Ltd., Nanjing, China) was also used in the experiments. All these electrodes had a similar size of approximately 6 cm × 4 cm. For each subject, the three types of electrode would be mounted on his/her TA muscle in a random order, respectively. The electrode locations were marked with a pen to ensure that the replacement of each type of electrodes could be at the same sites. {#sensors-15-17241-f003} 2.3. Stimulation Thresholds and Comfort Evaluation -------------------------------------------------- To estimate the stimulation thresholds and comfort, we recruited ten healthy subjects (six males and four females, aged 23.4 ± 1.8 years) for the experiments of electrical stimulation of the TA muscle. The protocols of the stimulation experiments were approved by the Ethics Committee for Human Research, Shenzhen Institutes of Advanced Technology, Chinese Academy of Sciences. All the subjects were informed about the purpose and the procedures of the study. The subjects were seated on a chair with their foot not touching the floor. The skin area over the TA muscle was cleaned with 75% isopropyl alcohol before the placement of each type of electrodes. An evoked potential system (NCC Medical, Shanghai, China) was used to produce monophasic rectangular stimulation pulses that were used in the experiment to estimate the sensory, pain, and motor thresholds of the three different electrode types. The stimulation pulse was set at a frequency of 30 Hz with a 200 μs pulse width. The stimulation current amplitude was gradually increased from the initial value of 1 mA with 1 mA steps to find the sensory, motor, and pain thresholds, respectively, in four consecutive stimulation sessions, as described previously in \[[@B19-sensors-15-17241]\]. The first two sessions allowed subjects to become accustomed to the surface stimulation sensation, and then another two were used to calculate the mean values of the thresholds of the three sensing levels to electrical stimulation. The sensory threshold to electrical stimulation was the amplitude of stimulating current at which the subjects started feeling the electrical stimulation on their TA muscle. The motor threshold was recorded as the stimulation amplitude when the visible foot dorsiflexion movement was first observed with increasing stimulation current strength. When the subjects felt obvious pain along with increasing stimulation current strength, the amplitude of the stimulating current was considered as the pain threshold. Note that if the pain threshold of a subject was reached before inducing a visible foot dorsiflexion movement, his/her motor threshold would be unavailable. For every subject, three types of electrodes (dry and wet textile as well as hydrogel) were tested in a random order for determining the stimulation thresholds of the three sensing levels, respectively. For each of the subjects, the stimulation comfort was evaluated at the stimulation amplitudes corresponding to his/her pain thresholds (Pth) with three different electrodes, respectively. The subjects would be asked to rate stimulation sensations according to the transcutaneous electrical stimulation comfort questionnaire (TESCQ) scale developed by Lawrence \[[@B19-sensors-15-17241]\]. In brief, TESCQ is a modified form of the short term McGill pain questionnaire, with 14 different sensations related to cutaneous, deep and general sensory receptors. In the experiments of this study, the hydrogel, wet textile, and dry textile electrodes were applied in a randomized order at the same stimulation sites on the TA muscle. The total score for cutaneous, deep and general categories was calculated and displayed to compare stimulation comfort of different types of electrodes. 2.4. Modeling of Transcutaneous Electrical Stimulation ------------------------------------------------------ In order to more deeply understand discomfort sensations during stimulation, three dimensional finite element models of different electrode types were developed with the aid of software (COMSOL Multiphysics 4.3a, COMSOL, Stockholm, Sweden). The skin model represented a 2 cm × 7 cm area of human skin, which consisted of five horizontal layers: stratum corneum, epidermis, dermis, fat, and muscle, as illustrated in [Figure 4](#sensors-15-17241-f004){ref-type="fig"}. The thickness and electrical parameters of each layer are listed in [Table 1](#sensors-15-17241-t001){ref-type="table"}. For the dry textile electrode, since the conductive fabric touched with skin directly, only a layer of square shaped sheet with a thickness of 0.4 mm was modeled (see [Figure 4](#sensors-15-17241-f004){ref-type="fig"}). The conductivity value of dry textile electrode was estimated from the measured resistance of conductive fabric. The line width was set at 0.15 mm with a separation of 0.35 mm by approximate estimation from the microphotos of dry textile electrodes. Besides, the wet textile electrode could be treated as homogeneous conductive solution similar to 0.9% NaCl. Then the conductivity of wet textile electrode was set as 1.4 S/m in the model. The thickness of the wet textile electrode was set as 5.8 mm, which was estimated from two layers of conductive fabric (0.4 mm each) and a sandwiched absorbent sponge (5 mm). The hydrogel electrode was modeled as a foil and a layer of hydrogel \[[@B20-sensors-15-17241]\]. All electrodes were modeled as 1 cm length × 1 cm width. A stationary electrical field of the skin area was developed in the model \[[@B21-sensors-15-17241]\]. Both the anode (return) and cathode electrodes were placed on the surface of stratum corneum with a separation distance of 6 cm. The top surface of the anode electrode was set as the ground and the top surface of the cathode electrode was set as the stimulation current source (−2 mA). {#sensors-15-17241-f004} sensors-15-17241-t001_Table 1 ###### The electrical conductivity and thickness of each layer in the finite element model. Layer Electrical Conductivity (S/m) Thickness (μm) ------------------------- ------------------------------------------------------------------------------------ ---------------------------------------------------------- Stratum corneum 2 × 10^−5^ \[[@B22-sensors-15-17241],[@B23-sensors-15-17241]\] 29 \[[@B24-sensors-15-17241],[@B25-sensors-15-17241]\] Epidermis Horizontal:0.95, vertical:0.15 \[[@B20-sensors-15-17241],[@B22-sensors-15-17241]\] 60 \[[@B24-sensors-15-17241],[@B25-sensors-15-17241]\] Dermis Horizontal:2.57, vertical:1.62 \[[@B20-sensors-15-17241],[@B22-sensors-15-17241]\] 1300 \[[@B26-sensors-15-17241],[@B27-sensors-15-17241]\] Fat 0.04 \[[@B28-sensors-15-17241]\] 2500 \[[@B29-sensors-15-17241]\] Muscle Horizontal:0.25, vertical:0.75 \[[@B28-sensors-15-17241]\] 10000 \[[@B29-sensors-15-17241]\] Textile electrode sheet 1.4 × 10^5^ Thickness: 400, line width:150 Wet textile electrode 1.4 \[[@B30-sensors-15-17241]\] 5800 Hydrogel 4.6 × 10^−3^ 1000 Foil electrode 6.67 × 10^5^ \[[@B20-sensors-15-17241]\] 50 During transcutaneous electrical stimulation, discomfort feeling is mainly related to the activation of Aδ fiber. The pain sensing Aδ fibers usually terminate in the junction of epidermis and dermis \[[@B21-sensors-15-17241]\]. Thus it can be assumed as a vertical direction from epidermis towards fat for simplicity. Therefore, the electric field gradient (activation function) along the vertical direction can be used to describe the activation of Aδ fibers in response to transcutaneous electrical stimulation with different electrode types. 3. Results ========== 3.1. Electrode Impedance Spectroscopy ------------------------------------- As a steady-state technique, electrochemical impedance spectroscopy (EIS) is a powerful tool for the assessment of electrode interfaces. The average EIS results of the hydrogel electrode, textile electrode, and wet textile electrode (w-textile electrode) measured on the subjects are demonstrated in [Figure 5](#sensors-15-17241-f005){ref-type="fig"} with a logarithmic plot. It can be seen from [Figure 5](#sensors-15-17241-f005){ref-type="fig"} that the impedance of the textile electrode was higher than that of the hydrogel electrode, but after fully absorbing the water, the impedance of the wet-textile electrode decreased significantly across the whole frequency interval. The average impedance at 1 kHz reduced from 4.72 kΩ of the dry textile electrode to 0.95 kΩ of the wet textile electrode, about 40% lower than the hydrogel electrode (1.57 kΩ). {#sensors-15-17241-f005} In order to facilitate data fitting, a simplified equivalent circuit model was proposed (shown in [Figure 6](#sensors-15-17241-f006){ref-type="fig"}), where R~all~ is the total resistance of the body (R~body~) and electrode (R~electrode~), R~T-all~ and Z~CPE-all~ represent the total charge transfer resistance (R~T~) and double-layer constant-phase element (Z~CPE~) at the electrode-skin interface, respectively. The constant phase element (CPE) was introduced to represent the dissipative double-layer capacitance, which reflects the characteristics of a microscopic fractal at blocking electrode-electrolyte interfaces. The concept of CPE could be explained with the following equation: where *j* = √-1, ω is the angular frequency (rad∙s^−1^) = 2π*f*, and *f* is frequency in Hz. The parameters of the CPE are defined by q and n. The parameter q indicates the value of the capacitance of the CPE as n approaches 1, and it has the numerical value of 1/Z~CPE~ at ω = 1 rad/s. The parameter n reveals the micro fractal and distribution of the phase-phase interface. It correlates to energy dispersion on the electrode-electrolyte interface and can be affected by a series of factors, such as surface roughness, distribution of reaction rates, or a non-uniform current distribution. When n = 1, this CPE is identical to a capacitor. To determine the electrode resistance, all three types of electrodes (hydrogel electrode, textile electrode and w-textile electrode) were also placed one by one on a stainless steel plate with a length of 8 cm and a width of 6 cm. A bandage was used to maintain good contact between the electrode and the stainless steel plate. The AC impedance of the electrodes on the stainless steel plate was measured in the frequency range between 0.1 Hz and 100 kHz and presented in [Figure 7](#sensors-15-17241-f007){ref-type="fig"}. It can be seen from [Figure 7](#sensors-15-17241-f007){ref-type="fig"} that the impedances of all the three types of electrodes at the whole testing frequency range were almost independent of frequency. The value of R~electrode~ was obtained from data fitting using the equivalent circuit in [Figure 6](#sensors-15-17241-f006){ref-type="fig"}b. {#sensors-15-17241-f006} {#sensors-15-17241-f007} The fitting data for the proposed equivalent circuit model is summarized in [Table 2](#sensors-15-17241-t002){ref-type="table"}. As [Table 2](#sensors-15-17241-t002){ref-type="table"} indicates, the electrode resistance of the hydrogel electrode was significantly higher than those of the textile and w-textile electrodes. This suggests that the hydrogel component of the electrode may hinder the transfer of ions within the polymer film and subsequently increase the charge transfer resistance. The dry textile electrode shows the highest charge transfer resistance and lowest CPE-n value, which is presumably due to the poor contact between the textile and skin. However, after being fully absorbed in water, the charge transfer resistance dramatically reduced and the capacitance (CPE-q) increased from 1.04 μF^n-1^ to 1.52 μF^n-1^, 50% higher than the hydrogel electrode. Besides this, the CPE-n value increased to 0.83, which is approximated to an ideal capacitor. sensors-15-17241-t002_Table 2 ###### Fitting data for proposed equivalent circuit model shown in [Figure 6](#sensors-15-17241-f006){ref-type="fig"}b. Statistical results were expressed as mean ± S.E.M. Parameters Unit Hydrogel Textile w-Textile ---------------- ----------- ---------------- ----------------- --------------- *Z (at 1 kHz)* Ω 1572.3 ± 83.78 4716.7 ± 815.60 947.5 ± 53.65 *R~all~* Ω 269.2 ± 9.13 97.1 ± 21.5 80.18 ± 4.73 *R~T-all~* kΩ 304.1 ± 109.79 477.0 ± 141.69 79.3 ± 24.17 CPE-q μF^n-1^ 0.98 ± 0.11 1.04 ± 0.12 1.52 ± 0.14 CPE-n 0 ≤ n ≤ 1 0.83 ± 0.01 0.70 ± 0.02 0.83 ± 0.01 *R~electrode~* Ω 90.98 ± 1.44 1.33 ± 0.35 0.80 ± 0.02 *R~body~* Ω 87.24 94.44 78.58 3.2. Stimulation Thresholds --------------------------- The mean stimulation thresholds of the three types of sensation (sensory, motor, and pain) for different electrodes are listed in [Table 3](#sensors-15-17241-t003){ref-type="table"}. A paired t-test was used in the statistical computation. There were significant differences in sensory thresholds between hydrogel electrode (6.3 ± 0.59 mA) and dry textile electrode (2.45 ± 0.34 mA), and between the wet textile electrode (5.9 ± 0.65 mA) and dry textile electrode. However, there was no significant sensory threshold difference between the hydrogel electrode and wet textile electrode. The results also showed a significant difference in motor thresholds between hydrogel electrode (19.9 ± 1.29 mA) and wet textile electrode (21.6 ± 1.42 mA). Note that the motor threshold for the dry textile electrode was not be available ([Table 3](#sensors-15-17241-t003){ref-type="table"}) because the subjects felt obvious pain before the stimulation current induced a visible foot dorsiflexion movement, so the electrical stimulation experiment was stopped to avoid causing intolerable pain to the subjects. With regard to pain thresholds, dry textile electrode showed the lowest threshold (4 ± 0.47 mA), while no significant differences were found between hydrogel electrode (33.15 ± 2.01 mA) and wet textile electrode (31.90 ± 2.01 mA). sensors-15-17241-t003_Table 3 ###### Comparison of the mean stimulation thresholds of sensory, motor and pain for different types of electrode. Statistical results are expressed as mean ± S.E.M. NA denotes not available. Threshold (mA) Hydrogel Wet Textile Dry Textile ---------------- ------------------- ------------------- ------------- Sensory 6.3 ± 0.59 \*^1^ 5.9 ± 0.65 \*^2^ 2.35 ± 0.30 Motor 19.9 ± 1.29 ^†^ 21.6 ± 1.42 NA Pain 33.15 ± 2.01 ^‡1^ 31.90 ± 2.01 ^‡2^ 3.2 ± 0.53 Superscripts indicate a significant difference in sensory threshold between: \*^1^ the hydrogel and dry textile electrodes, *p* \< 0.05; \*^2^ the wet textile and dry textile electrodes, p \< 0.05; ^†^ the hydrogel and wet textile electrodes, *p* \< 0.05; or a significant difference in pain threshold between: ^‡1^ the hydrogel and dry textile electrode, *p* \< 0.05; ^‡2^ the wet textile and dry textile electrodes, *p* \< 0.05. 3.3. Comfort Evaluation ----------------------- Subjects were asked to rate the stimulation comfort of the different electrode types using the TESCQ questionnaire at 1хPth stimulation intensity. The sums of TESCQ scores from all the subjects are shown in [Figure 8](#sensors-15-17241-f008){ref-type="fig"}. At the 1хPth stimulation intensity, the cutaneous related stinging, hot burning, sharp, stabbing, and pricking pain sensations were distinct for different types of stimulation electrodes. With respect to the deep categorized pulling, aching, gnawing, and cramping pain, dry textile electrode only showed a score for pulling, while the wet textile electrode and hydrogel electrode showed moderate scores of pulling, gnawing and cramping. With regard to the general category, tingling and throbbing were the prominent sensations for all electrode types. The sums of scores of cutaneous, deep and general category for each electrode type from all the subjects are summarized in [Table 4](#sensors-15-17241-t004){ref-type="table"}. While the total cutaneous score of the dry textile electrode was significantly higher than those of the hydrogel electrode and wet textile electrode, the total deep and general scores of dry textile electrode were much less than those of the other electrode types. Furthermore, the total cutaneous score of the wet textile electrode was slightly higher than that of the hydrogel electrode, but the deep and general scores of the wet textile electrode were similar to that of the hydrogel electrode. ###### The sums of TESCQ scores of cutaneous, deep and general categories with the three different electrode types from all the subjects.   sensors-15-17241-t004_Table 4 ###### Sum of TESCQ scores for different types of electrode from all the subjects. Electrode Type Cutaneous Pain Deep Pain General Pain ---------------- ---------------- ----------- -------------- Hydrogel 19 8 27 Dry textile 49 1 15 Wet textile 27 10 26 3.4. Finite Element Analysis ---------------------------- Since pain receptors are normally located in the dermis, so the electric field gradient along the z direction was critical in the determination of painful feelings. The electric field gradient at the depth of the epidermis-dermis junction was simulated and plotted in [Figure 9](#sensors-15-17241-f009){ref-type="fig"} for the comparison of pain sensing fiber activation when using the different electrode types. {#sensors-15-17241-f009} In [Figure 9](#sensors-15-17241-f009){ref-type="fig"}, the hot spots (high values of activation function) were mainly located below the anode electrode of all the electrode types. Besides, hot spots appeared below the silvered threads of the dry textile electrode, while the hot spots only appeared around the edges of the hydrogel and wet textile electrodes. Compared with other electrodes, the dry textile electrode showed strong activation function along the z direction (normal direction). 4. Discussion ============= Textile electrodes have been developed as a new type of surface electrical stimulation electrode that may replace traditional hydrogel electrodes in wearable healthcare applications due to their excellent long term use, washability, convenience, breathability, and easy integration in clothes. Previous studies have shown that as electrical stimulation electrodes textile electrodes could display similar electrical properties as conventional hydrogel electrodes \[[@B17-sensors-15-17241],[@B18-sensors-15-17241]\]. However, the stimulation comfort of textile electrodes needs to be assessed, which would be an important feature for their practical use. In this study, the stimulation characteristics and comfort of a textile electrode were investigated and compared with those of a hydrogel electrode and a wet textile electrode. Our results demonstrated that a wet textile electrode can have similar stimulation thresholds of sensations and comfort as a hydrogel electrode. Using a wetting textile electrode could improve the contact characteristics of the electrode-skin interface for better stimulation comfort in practical applications. For example, a wetted fabric electrode has been used by Bioness Inc. (Santa Clarita, CA, USA) \[[@B31-sensors-15-17241]\] to improve the stimulation performance. It is true that maintaining the moisture of a textile electrode for a long time would be difficult, but it is still feasible. For example, in the work of Weder \[[@B32-sensors-15-17241]\], the textile electrode was integrated with a small water reservoir to guarantee wetting of the textile for a long time. Besides, Keller has suggested that an additional interface layer such as hydrogel or some new skin interface material would be needed in order to improve the contact between the textile electrode and the skin \[[@B15-sensors-15-17241]\]. Many endeavors have now been put into the area of textile electrodes to overcome the challenges of the electrode skin interface and improve the stimulation comfort of this new type of electrode. Electrical impedance characteristics affect the stimulation efficiency and selectivity. It was reported that the stimulation efficiency and focality were lower in low resistivity hydrogel electrodes compared to high resistivity hydrogel ones \[[@B6-sensors-15-17241]\]. However, only simulation results were presented in that study. In our study, with the same application of TA muscle stimulation for dorsiflexion, the motor threshold of a low resistive electrode (wet textile electrode) was statistically lower than that of a high resistive electrode (hydrogel electrode) in experiments on healthy subjects. This illustrates how electrode impedance influences the activation of motor neuron fibers. In transcutaneous electrical stimulation applications, it is important to design proper electrode impedance parameters to activate the targeted neural fibers. An interesting finding of the finite element modeling was that the activation zone is mainly located below the anode electrode. In previous models \[[@B6-sensors-15-17241],[@B28-sensors-15-17241],[@B33-sensors-15-17241]\], activated nerves were parallel to the anode cathode axis and located at muscle level depth. The cathode electrode produces a positive activation function value while the anode electrode produces negative activation function value, which indicates that the activated zone is located under the cathode electrode. In our model, the activation function along the z direction at the depth of epidermis-dermis junction was used to explain painful sensations during surface electrical stimulation. The modeling results showed a strong activation under the textile electrode anode. Furthermore, in our electrical stimulation experiments on subjects, they did experience a strong painful feeling under the anode electrode using the dry textile electrode at low stimulus intensities. It is widely accepted that an "edge biting" effect would be experienced by subjects using hydrogel electrodes. Our simulated results from the FEM model also showed a strong activation of pain sensing fibers at the edge of the hydrogel electrode, as shown in [Figure 9](#sensors-15-17241-f009){ref-type="fig"}, which is in accord with this "edge biting" effect. These simulated results suggest that by using the FEM model some reasonable explanations of a possible mechanism of the painful feelings caused by surface electrical stimulation of a textile electrode could be proposed. Note that like previous relevant model studies \[[@B20-sensors-15-17241],[@B28-sensors-15-17241],[@B33-sensors-15-17241]\], the FEM model used in this study is also simple. It may be necessary to use a more elaborate FEM model based on the anatomical structure of human body as well as electrophysiology to reveal the mechanism of electrical stimulation pain. Although the developed model can explain the painful feelings of dry textile electrodes at low current levels, the model still has some limitations. A simplified layered geometry was used to represent the human skin without considering the influence of pores and glands. The tissue of each layer was assumed as purely resistive, and the capacitive and dispersive properties of tissue were neglected. Furthermore, the electrode-skin interface characteristics such as capacitive or pseudo-capacitive coupling were not included in the model. The activating function at the specific depth along the z direction was used to describe the pain sensing fiber activation situation in the model. In fact, the Aδ fiber may have a complex geometric shape and orientation \[[@B21-sensors-15-17241],[@B34-sensors-15-17241]\]. 5. Conclusions ============== This study has investigated the electrical stimulation comfort of textile electrodes in comparison with traditional hydrogel electrodes. The electrical impedance spectral analysis showed a poor contact between the dry textile electrode and skin, while this contact was improved with a wet textile electrode. The stimulation experiment demonstrated that dry textile electrodes may cause pain at very low electric currents, while the wet textile electrode and hydrogel electrode can activate foot dorsiflexion movements without pain. The reason behind this is indicated by modeling results that the pain sensing fiber will be activated more readily by a dry textile electrode than a wet textile electrode or hydrogel electrode. Further work needs to be conducted in order to improve the electrode skin contact of dry textile electrodes. This work was supported in part by the National Natural Science Foundation of China under grants (\#61135004, \#61201114), the National Key Basic Research Program of China (\#2013CB329505), the Shenzhen Governmental Basic Research Grant (\#JCYJ20130402113127532) and the Shenzhen Governmental Technique Development Grant (\#CXZZ20130322162918836). The authors would also like to thank Syedah Sadaf Zehra for revising the manuscript. Finally, the authors would like to thank the two anonymous reviewers for their insightful comments on the paper. H.Z. and G.L. initiated and supervised the research project. Y.L. performed the impedance measurements and analysis of electrode. H.Z. and W.C. developed the finite element models of three electrode types. H.Z. and Z.W. performed stimulation comfort assessment experiment on subjects. H.Q.Z. manufactured the textile electrode. H.Z. and G.L. wrote the draft of the paper, and L.K. and G.L. discussed the results and revised the paper. The authors declare no conflict of interest. | High | [
0.6633663366336631,
33.5,
17
]
|
“I won’t do it,” he said. “I don’t care who they are; I won’t buddy up to people I don’t like and respect just because I want something from them.” This came from a senior manager at a Fortune 500 company. It was a theme we hear over and over from managers at all levels. They’re reluctant to take part in what they call “political games.” They consider organizational conflict and competition mostly ego-driven, adolescent games. They want disputes settled through data, analysis, and logic, by what’s “right” — not by who knows whom, who owes whom, or who plays golf with whom. To build relationships simply because they want something from other people is, to them, blatant manipulation. So they withdraw from much organizational give-and-take. Like our senior manager, they deal with others when there’s an issue or problem, but they don’t build productive ongoing relationships except with those few they happen to like personally. Otherwise, they hunker down and focus on their own groups and work. Are you one of those managers? If so, you’re probably making yourself and your group less effective than you could or should be. Ask yourself this: Do I have the influence in my organization that I’d like to have, that I think I should have? Do others listen to my point of view? Do disagreements between my group and others get resolved in our favor? Do we get the resources, information, or the time and attention we need and deserve? Are we constantly distracted by outside pressures? If any of these questions touches a nerve, you may need to rethink how you deal with the political environment that exists in your and every other organization. Much as you might like to avoid them, the best way to deal with political environments is to engage them, to turn toward them. To turn away is to abdicate your responsibilities as a leader and manager. It is to let down yourself, your team, and even the organization as a whole. Unless you reach out, engage others, and create active, ongoing relationships — relationships you sustain even when there’s no immediate problem — you will lack the ability to exercise influence beyond your group. And even in your own world, your influence will be limited. If you’ve ever worked for a boss who lacked any organizational clout or credibility, you know how frustrating that is. We’re not saying organizations are benign worlds where everyone wants the best for everyone else. They’re often maelstroms of conflicting goals, divergent interests, and fierce struggles for scarce resources. More often than not, however, the conflict is driven by legitimate business differences. Such conflict may turn personal, if those involved aren’t mature enough to keep it above that plane, but their failure doesn’t mean the fundamental problem isn’t a real one that needs to be worked through actively by all involved. Of course, there are organizational bullies who do play personal games, pick fights, and try to intimidate others. They define themselves by the interpersonal battles they win, not by the results they’ve accomplished for the organization. They do build ego empires. How do you deal with them? Again, not by withdrawing. The right approach is not to avoid the politics but to take part in positive ways for good ends. The organizational maelstrom can be dysfunctional and personal, but it need not be. As you actively reach out and create allies and supporters around a common cause, as you jump into the fray, these guidelines can help you exercise influence in political environments without “playing politics”: Keep your efforts clearly and obviously focused on the ultimate good of the enterprise. Work with others for mutual advantage, not just your own. Don’t make disagreements personal or let them become personal. Well-intentioned people can disagree and still respect each other. Conduct yourself according to a set of standards important to you — honesty, forthrightness, openness, dependability, integrity — no matter what others do. Build ongoing, productive relationships with everyone you need to do your work, as well as those who need you, not just those you like. Always remember, these are professional relationships, not personal friendships. You don’t have to like them or they you; you just have to work productively with each other. To be a force for good judgment and fairness when important decisions are made in your organization, you need to reach out and actively build ties with others. Staying above it all may feel like the moral high road, but it’s just abdication. | High | [
0.6560364464692481,
36,
18.875
]
|
Predominant right ventricular infarction. Clinical and electrocardiographic features. Based on two-dimensional echocardiographic wall motion abnormalities, 82 patients with acute inferior wall myocardial infarction were divided into 3 groups: group 1. predominant right ventricular infarction-20 patients; group 2. combined right and left ventricular infarction-33 patients; and group 3. predominant left ventricular infarction-29 patients. There were no significant statistical differences between the three groups regarding age, sex, Killip class on admission and jugular venous engorgement. Group 2 patients had higher peak creatine kinase levels and a lower rate of life threatening ventricular arrhythmia than the other groups. On M-mode echo, patients in group 1 had higher RV/LV ratios and lower left ventricular systolic and diastolic dimensions than group 3 patients. On 2-D echo and radionuclear studies, group 1 patients had more right ventricular wall motion abnormalities and minimal left ventricular wall motion disturbances. The left ventricular ejection fraction was higher and the right ventricular ejection fraction lower in group 1 patients than in those groups 2 and 3. The electrocardiogram showed small Q and relatively tall R waves in II, III, AVF in group 1 patients, and deep Q with loss of R waves in patients with combined or exclusive left ventricular infarction (groups 2 and 3). We conclude that predominant right ventricular infarction, which occurs in 24% of inferior wall infarction patients cannot be characterized clinically; however, an electrocardiographic pattern was found to detect this form of infarction with a sensitivity of 80% and a specificity of 70%. Combined left and right ventricular infarction and exclusive left ventricular infarction could be detected electrocardiographically with a sensitivity of 70% and a specificity of only 30%. | High | [
0.7070457354758961,
35.75,
14.8125
]
|
Dunkeld, QLD Suburbs Nearby Suburbs Attractions welcomes in Dunkeld, Outback Queensland QLD Dunkeld, find events and things to do in and around Dunkeld, Attractions supports the local community in Dunkeld by making it easy to discover fun community events, activities Find Attractions in Outback Queensland Dunkeld QLD, 4465 search things to do and see in your holiday location with Attractions Australia. If you are planning a visit to Dunkeld here are some of the attractions nearby that you can enjoy while you are there. | Mid | [
0.5990990990990991,
33.25,
22.25
]
|
Apple really should only allow reviews from people who actually purchased the app. I can’t keep repeating this enough. Nearly every paid app has an unfairly low star-rating average because they all get a bunch of low-star reviews from people who haven’t even tried them complaining about the price. 1 star from ellerykurtz: “Let’s see…I can pull up MTA website map on the internet….or I can ask the token booth clerk for a free map…..or I can pay money for something that is already out there for free?” 3 stars by Simon Lin: “Price is too hight. lower the pirce, i will buy it immediately….” 2 stars by Rolandzj: “I would wait until the price drops” 1 star by Missing Metro: “I am not buying this one unless the price drops—-$4.99 sounds about right. In the meantime, I will wait for another devvelopr to come out with a NYC subway application that is appropriately priced.” 1 star by retarded app: “If you really would like a portable NYC subway map just find a HIGH rez picture of one online & save it to your iphone” 3 stars by kev777: “I know plenty of other people with iPhones in NYC and they’d love this app and would recommend it to their own friends too but they would never fork over $9.99 for it. Never. Make it $4.99 and myself plus the many other friends I know with iPhones will buy quicker than you can say, ‘MTA.’” Now let me put this in perspective: Everyone with an iPhone has paid $200-600 for it. iPod touch owners have paid $300-500. Every legitimate U.S. iPhone owner pays at least $60/month for it before taxes. The average NYC subway fare (including unlimited passes) is about $1.50 per ride. The monthly unlimited pass costs $81. A decent one-bedroom apartment in Manhattan costs $2000-3000 per month. It’s pretty hard to get a decent take-out lunch in most parts of Manhattan for less than $6. If you want to sit down, after a drink and tip, you’ll probably spend at least $15. It costs a developer $100 to publish on the App Store. Apple takes a 30% commission. Software development is hard. An app that people will pay money for (at any price) will have generally taken months to develop. It takes a special kind of asshole to complain that $10 is too much for an iPhone app, yet $5 would be perfectly justifiable. | Mid | [
0.562200956937799,
29.375,
22.875
]
|
Saturday, June 05, 2010 Professor Wichman for President! Well, It's Saturday Night and Nobody Got EMAIL! This one is from my very, very, VERY, liberal friend, JR, and he just LOVES this email. It seems this professor sent an email out at Michigan State, because the Muslims on his campus were protesting..."cartoons." I did NOT read about this in the news. As you can see from JR's comments, he wants Wickman for President. I'd be happy if he just took over Helen Thomas' chair. GO, MICHIGAN STATE! Very interesting -- the University is standing by their professor and not Wickman for President! I'm dead serious! I hope MSU keeps it's balls bowing down to special interest groups! (JR) Claim: A Michigan professor sent an e-mail telling Muslim students to leave the country. Status: True. The story begins at Michigan State University with a mechanical engineering professor named Indred Wichman. Wichman sent an e-mail to the Muslim Student's Association.The e-mail was in response to the students' protest of the Danish cartoons that portrayed the Prophet Muhammad as a terrorist. The group had complained the cartoons were 'hate speech.' ============Enter Professor Wichman. ==========================================In his e-mail, he said the following: Dear Muslim Association, As a professor of Mechanical Engineering here at MSU I intend to protest your protest. I am offended not by cartoons, but by more mundane things like beheadings of civilians, cowardly attacks on public buildings, suicide murders, murders of Catholic priests (the latest in Turkey), burnings of Christian churches, the continued persecution of Coptic Christians in Egypt, the imposition of Sharia law on non-Muslims, the rapes of Scandinavian girls and women (called 'whores' in your culture), the murder of film directors in Holland, and the rioting and looting in Paris France. This is what offends me, a soft-spoken person and academic, and many, many of my colleagues. I counsel you dissatisfied, aggressive, brutal, and uncivilized slave-trading Muslims to be very aware of this as you proceed with your infantile 'protests.' If you do not like the values of the West - see the First Amendment - you are free to leave. I hope for God's sake that most of you choose that option. Please return to your ancestral homelands and build them up yourselves instead of troubling Americans. Cordially,I. S. WichmanProfessor of Mechanical Engineering As you can imagine, the Muslim group at the university didn't like this too well. They're demanding that Wichman be reprimanded, that the university impose mandatory diversity training for faculty, and mandate a seminar on hate and discrimination for all freshmen. Now, the local chapter of CAIR has jumped into the fray. CAIR, the Council on American-Islamic Relations, apparently doesn't believe that the good professor had the right to express his opinion. For its part, the university is standing its ground in support of Professor Wichman, saying the e-mail was private, and they don't intend to publicly condemn his remarks. (Nobody says...WOW.) Send this to your friends, and ask them to do the same. Tell them to keep passing it around until the whole country gets it. We are in a war. This political correctness crap is getting old and killing us. If you agree with this, Please send it to all your friends, If not, simply delete it. GO, MICHIGAN STATE! Wickman for President! I'm dead serious! (JR) UPDATE: it seems this event happened around 2006, and that it was an email to a "friend" that was released to the world...the guy later apologized for his remarks. Which means, he didn't want to lose his job, I think, and that's what you get when you elect an American President named Obama. Links to this post: About Me I am a nobody. If the different classes of America were color-coded, I would be in the yucky brown, one rink up from the bottom. I grew up in Naples, Florida and live near the Mississippi River now with my husband and two dogs. I am part of the slowly disappearing middle-class. I was a musician most of my life:drummer/singer/keyboards---but I retired before the plastic surgery flu hit. I have no degrees,which could be a good thing...depending on how you view our educational system. I do have three patents...but that really doesn't make me a somebody. The one thing that is constant in my life is my OPINIONS...which I have more of than perhaps even Carl Segan could have imagined, mostly political. Hopefully other nobodys will put their opinions on my site. But if you are a somebody...you're more than welcomed to help out. I will try to prove that sometimes nobody knows the answers, sometimes nobody cares, sometimes nobody wins, and most importantly...NOBODY is perfect. Please bear this in mind when you read my thoughts. I don't mean to offend nobody, it's all in good fun. | Low | [
0.501022494887525,
30.625,
30.5
]
|
New Story Just Out: Rare And Mysterious Vomiting Illness Linked To Heavy Marijuana Use Yet another interesting headline in the world of health and well-being. Rare And Mysterious Vomiting Illness Linked To Heavy Marijuana Use For a small percentage of people who smoke marijuana, long term use can make them sick with violent vomiting.California doctors worry they’ll see more cases when pot is fully legalized in January. | Mid | [
0.547325102880658,
33.25,
27.5
]
|
Q: Strict and clean HTML and CSS for teaching website We are in the process of creating a book with the purpose of teaching people the art of html and CSS to create a website from scratch. In our book the focal point, so to say, is that the reader is given a webdesign that he converts into a website by himself. The reader is given the webdesign for the website of a (fictive) restaurant. The website will, when finished by the reader, consist of just the front page and three almost identical sub pages (only the text content will differ). To be sure of an ideal, down to Earth, basic and typical website we are asking for a code review of the HTML and CSS behind these pages that make up this website. We have strained our selves to keep the code short, simple, clean and strict. The reviewers should keep in mind that the site ought to be illustrating recommended methods in coding the different parts as well as best practice and recommended ways of organising the code, and the site should contain typical standard parts for a website to be basic and fundamental for a students learning. Please ask any relevant questions to clarify things. Below you will see first the entire html for the front page, then the CSS and then the HTML for a sub page. In the bottom you will find a screenshot of both front page and sub page. (Note: The page is in Danish) We hope for some useful feedback and hope you like it. HTML (frontpage index.html) <!DOCTYPE html> <html> <head> <meta http-equiv="Content-Type" content="text/html; charset=utf-8"> <link rel="stylesheet" type="text/css" href="css/global.css"> <title>Eos Café</title> </head> <body> <div id="container"> <header> <a href="/"><img src="images/logo.jpg" alt="Eos Café" id="logo"></a> <nav> <a href="#">Menu</a> <a href="#">Bestil</a> <a href="#">Arrangementer</a> <a href="#">Kontakt</a> </nav> </header> <nav id="submenu"> <ul> <li><a href="menu/forretter.html">Forretter</a></li> <li><a href="menu/hovedretter.html">Hovedretter</a></li> <li><a href="menu/desserter.html">Desserter</a></li> <li><a href="#">Salater</a></li> <li><a href="#">Supper</a></li> <li><a href="#">Vine</a></li> <li><a href="#">Drikke</a></li> </ul> </nav> <section id="content"> <h1>Madforkælelse</h1> <div id="text"> <div id="manchet"> <img src="images/coffeecup.jpg" alt=""> <p>Velkommen til Eos Café. Vi har de lækre retter på bordet og den helt rigtige vin. Kom ind og oplev maden og stemningen! Velkommen til Eos Café.</p> </div> <p>Lorem ipsum dolor sit amet, consectetur adipiscing elit. Sed tempus accumsan tincidunt.<br> Etiam eget sem nec massa facilisis vulputate. Fusce suscipit dictum sodales. Etiam tempus sollicitudin mauris ut eleifend. Duis aliquet lacus sit amet dolor blandit fermentum. Cras iaculis metus quis odio <a href="#">auctor fringilla</a>. Nunc tristique quam mi, in interdum felis. Cras lobortis vehicula ligula, quis condimentum mauris porttitor at. Cras in augue ut leo blandit fringilla blandit eget mi.</p> </div> <img id="img1" src="images/dummy1.jpg" alt=""> <img id="img2" src="images/dummy1.jpg" alt=""> <img id="img3" src="images/dummy3.jpg" alt=""> </section> <footer> <div id="openhours"> <h4>Åbningstider</h4> <table cellspacing="0"> <tr> <th colspan="2">Caféens åbningstider</th> <th colspan="2">Køkkenets åbningstider</th> </tr> <tr> <td>Man-tors</td> <td>11.00-21.00</td> <td>Man-tors</td> <td>11.00-21.00</td> </tr> <tr> <td>Fre-lør</td> <td>11.00-22.00</td> <td>Fre-lør</td> <td>11.00-22.00</td> </tr> <tr> <td>Søn</td> <td>17.00-21.30</td> <td>Søn</td> <td>17.00-21.30</td> </tr> </table> </div> <div id="address"> <h4>Her bor vi</h4> Adresse:<br> Engsvinget 45<br> 3400 Hillerød<br> Se kort </div> <div id="socialicons"> <hr> © Eos Café <span> Hold dig opdateret: <img src="images/facebook.jpg" alt="Facebook"> <img src="images/google.jpg" alt="Google+"> <img src="images/twitter.jpg" alt="Twitter"> <img src="images/rss.jpg" alt="RSS"> </span> </div> </footer> </div> </body> </html> CSS (global.css) * {margin: 0; padding: 0;} /*Fjerne standardegenskaber*/ /*GENERELT*/ section, header, footer { position: relative; } body, html { background-color: #929292; margin: 0; padding: 0; } #container { background-color: #e6e6e6; margin: 0 auto; /*Centrering*/ width: 1000px; } nav a { /*Generelt til navigation*/ font-family: verdana; text-decoration: none; } /*SIDEHOVED*/ header { height: 160px; background-color: white; border-top: solid 3px #912124; border-bottom: solid 1px #dad9d9; padding: 20px 0 0 90px; } #logo { width: 160px; } header nav { /*Topmenu*/ bottom: 20px; height: 30px; position: absolute; right: 100px; } header nav a { /*Topmenu-links*/ color: #979696; font-size: 14px; margin: 0 10px; padding-bottom: 5px; text-transform: uppercase; } header nav a:hover { border-bottom: solid 3px #912124; color: #606060; } /*SIDEMENU*/ #submenu { float: left; width: 200px; } #submenu ul { float: right; list-style: none; margin-top: 50px; text-align: center; } #submenu ul a { color: #912124; font-size: 12px; } #submenu ul a:hover { color: black; } #submenu li { margin: 10px 0; } /*INDHOLD*/ section { background-color: #ededed; color: #1f1f1f; float: right; font-family: arial; font-size: 12px; padding: 50px 50px 50px 50px; width: 650px; /*750px minus padding*/ } section p { margin: 5px 0; } section h1 { color: #525252; font-size: 24px; margin-bottom: 20px; text-transform: uppercase; } section #manchet, h2 { color: #912124; font-family: georgia; font-style: italic; margin-bottom: 20px; } section #manchet img { float: left; margin-right: 10px; } section #text { float: left; padding: 0 20px 20px 0; width: 400px; } section #img1 { height: 180px; float: right; } section #img2 { clear: left; height: 180px; float: left;} section #img3 { height: 180px; float: right; } section a { color: #6ba6c1; } section a:hover { text-decoration: none; } /*SIDEFOD*/ footer, footer table { color: white; font-family: arial; font-size: 12px; } footer { background-color: #1f1f1f; clear: both; padding-top: 30px; } footer #openhours { float: left; padding-left: 300px; width: 400px; } footer #address { float: left; } footer th { padding-right: 60px; } footer th, footer td { line-height: 150%; } footer h4 { font-size: 14px; margin-bottom: 10px; text-transform: uppercase; } footer hr { border-bottom: solid 1px #292929; border-left: none; border-right: none; border-top: solid 1px #030303; margin-bottom: 20px; } footer #socialicons { clear: both; margin: 0 auto; /*Centrering*/ padding: 20px 80px; position: relative; text-align: center; text-transform: uppercase; } footer #socialicons span { position: absolute; right: 80px; top: 42px; } /*UNDERSIDER*/ h2 { font-size: 12px; /*Overskriv standardegenskaber*/ font-weight: normal; } .dish { position: relative; height: 97px; } .dish img { float: left; margin-right: 44px; } hr { clear: both; border: none; border-top: solid 1px #dad9d9; margin: 12px 0; } .dish span { position: absolute; right: 10px; top: 0; font-style: italic; } HTML (subpage menu/forretter.html) <!DOCTYPE html> <html> <head> <meta http-equiv="Content-Type" content="text/html; charset=utf-8"> <link rel="stylesheet" type="text/css" href="/css/global.css"> <title>Eos Café</title> </head> <body> <div id="container"> <header> <a href="/"><img src="/images/logo.jpg" alt="Eos Café" id="logo"></a> <nav> <a href="#">Menu</a> <a href="#">Bestil</a> <a href="#">Arrangementer</a> <a href="#">Kontakt</a> </nav> </header> <nav id="submenu"> <ul> <li><a href="#">Forretter</a></li> <li><a href="#">Hovedretter</a></li> <li><a href="#">Desserter</a></li> <li><a href="#">Salater</a></li> <li><a href="#">Supper</a></li> <li><a href="#">Vine</a></li> <li><a href="#">Drikke</a></li> </ul> </nav> <section id="content"> <hgroup> <h1>Forretter</h1> <h2>Menukort</h2> </hgroup> <div class="dish"> <img src="/images/dummy2.jpg" alt="#"> <h3>Flamberet and</h3> <p>Med grønne æbler og hvid sovs.<br>Lorem ipsum dolor sit amet, consectetur adipiscing elit. Sed tempus accumsan tincidunt. Etiam eget sem nec massa facilisis vulputate. Fusce suscipit dictum sodales.</p> <span>Pris: 199,-</span> </div> <hr> <div class="dish"> <img src="/images/dummy2.jpg" alt="#"> <h3>Flamberet and</h3> <p>Med grønne æbler og hvid sovs.<br>Lorem ipsum dolor sit amet, consectetur adipiscing elit. Sed tempus accumsan tincidunt. Etiam eget sem nec massa facilisis vulputate. Fusce suscipit dictum sodales.</p> <span>Pris: 199,-</span> </div> <hr> <div class="dish"> <img src="/images/dummy2.jpg" alt="#"> <h3>Flamberet and</h3> <p>Med grønne æbler og hvid sovs.<br>Lorem ipsum dolor sit amet, consectetur adipiscing elit. Sed tempus accumsan tincidunt. Etiam eget sem nec massa facilisis vulputate. Fusce suscipit dictum sodales.</p> <span>Pris: 199,-</span> </div> </section> <footer> <div id="openhours"> <h4>Åbningstider</h4> <table> <tr> <th colspan="2">Caféens åbningstider</th> <th colspan="2">Køkkenets åbningstider</th> </tr> <tr> <td>Man-tors</td> <td>11.00-21.00</td> <td>Man-tors</td> <td>11.00-21.00</td> </tr> <tr> <td>Fre-lør</td> <td>11.00-22.00</td> <td>Fre-lør</td> <td>11.00-22.00</td> </tr> <tr> <td>Søn</td> <td>17.00-21.30</td> <td>Søn</td> <td>17.00-21.30</td> </tr> </table> </div> <div id="address"> <h4>Her bor vi</h4> Adresse:<br> Engsvinget 45<br> 3400 Hillerød<br> Se kort </div> <div id="socialicons"> <hr> © Eos Café <span> Hold dig opdateret: <img src="/images/facebook.jpg" alt="Facebook"> <img src="/images/google.jpg" alt="Google+"> <img src="/images/twitter.jpg" alt="Twitter"> <img src="/images/rss.jpg" alt="RSS"> </span> </div> </footer> </div> </body> </html> Screenshot, frontpage: Screenshot, subpage: Screenshot of the page on a larger screen: A: Your logo (resp. site title) should be in a h1. Otherwise your page (→ body) got no heading a wrong heading in the outline (see explanation below): <h1><a href="/"><img src="images/logo.jpg" alt="Eos Café" id="logo"></a></h1> You could specify width/height attributes for the img. (Thanks, @darcher) Instead of <meta http-equiv="Content-Type" content="text/html; charset=utf-8"> you could use the shorter HTML5 variant: <meta charset="utf-8"> The links in the nav should (but don’t have to) be in a ul (which is very common). If you don’t want to use a list, you should at least use block elements around each link (div probably), otherwise the links will be listed in one line for users without CSS, making the navigation hard to use (because of no delimiters). Don’t start with h4 in the footer. If you use h1 for the site title (see above), use h2. Or use section explicitly, then you could use h1 (or stay with h2). You could use the time element for the opening hours. hgroup is gone. As there is no real alternative yet, use a div (resp. p if applicable) for the subheading/tagline (and group both, the heading and the subline, in header). You could use the small element for "© Eos Café". I don’t think that your uses of hr is correct here ("[…] a paragraph-level thematic break […]"). Znarkus asked in the comments, why the site title should be in a h1: It’s because of the document outline (note that the behaviour changed in the Editor’s Draft, but we’d have to wait to see what happens to it in the future; it’s discussed on the mailing list). I explained it some time ago on Stack Overflow, too (which might be easier to follow than this try here ;)). In HTML5, every sectioning element/root has an own heading, so to speak, even if you don’t explicitly provide one. If you don’t, you’ll get an implied heading (→ "untitled" section in the document outline). Practically that means, if you use sectioning elements correctly everywhere, you wouldn’t have to provide a heading at all, and you’d still get a perfect outline (but of course this would be a bad practice). Now the problem in this example document is, that there are also headings that are not included in a sectioning element. As the body is a sectioning root, it longs for a heading. And it finds one: the h4 in the footer: "Åbningstider", because it is the first heading that is not part of a sectioning element (section, article, nav, aside). That means that the document outline will look like: 1: Åbningstider (the first h4 in the footer) 1.1: Untitled (the nav, missing a heading) 1.2; Untitled (the nav (submenu), missing a heading) 1.3: Madforkælelse (the h1 in the section) 2: Her bor vi (the h4 in the footer) This is of course wrong. The page heading shouldn’t be "Åbningstider" nor "Her bor vi". If we’d enclose the sections (introduced by the h4s) in the footer in sectioning elements, we’d get the following outline: 1: Untitled (the body, missing a heading) 1.1: Untitled (the nav, missing a heading) 1.2: Untitled (the nav (submenu), missing a heading) 1.3: Madforkælelse (the h1 in the section) 1.4: Åbningstider (the section in the footer) 1.5: Her bor vi (the section in the footer) Now this outline is correct. But the untitled top-heading is, of course, ugly. Let’s think about what the correct heading would be: It should be a heading that describes all sub-sections (1.1 to 1.5), that is, everything that is included in the page. There can only be one answer: The site title. It describes the site-wide navigation and the site-wide footer. You can’t use the main content heading as page heading, because the site-wide navigation is not in scope of the main content. There is typically only one case where you can use the main content heading as the page heading: if there is no "site", i.e. if there is no navigation/footer/sidebar (that would be a stand-alone document). A: As this site is for teaching purposes and since I am a student, I would suggest you include every possible HTML tag and CSS property. I noticed HTML tags like <b>, <i>, <em>, etc. are not used. I know such tags are not of much importance when we are using CSS, but it will be very helpful to readers. Also, include a page for making a simple form on the website. Forms are widely used on websites, and it would greatly help the readers and beginners. Rather than only making them prepare an external CSS stylesheet, include some internal and inline CSS code to explain the difference between each and their execution. These were just some suggestions on my part. I hope I could help you. | Mid | [
0.6536144578313251,
27.125,
14.375
]
|
Whisnant Nunatak Whisnant Nunatak () is a small coastal nunatak protruding above the terminus of Rogers Glacier between McKaskle Hills and Maris Nunatak, at the east side of Amery Ice Shelf. Delineated in 1952 by John H. Roscoe from U.S. Navy Operation Highjump aerial photographs taken in March 1947. Named by Roscoe for J.R. Whisnant, Operation Highjump air crewman on photographic flights over this and other coastal areas between 14 and 164 East longitude. Category:Nunataks of Princess Elizabeth Land Category:Ingrid Christensen Coast | Low | [
0.5225225225225221,
29,
26.5
]
|
The delivery of radio frequency (RF) energy to target regions within solid tissue is known for a variety of purposes of particular interest to the present invention. In one particular application, RF energy may be delivered to diseased regions (e.g., tumors) for the purpose of ablating predictable volumes of tissue with minimal patient trauma. RF ablation of tumors is currently performed using one of two core technologies. The first technology uses a single needle electrode, which when attached to a RF generator, emits RF energy from an exposed, uninsulated portion of the electrode. The second technology utilizes multiple needle electrodes, which have been designed for the treatment and necrosis of tumors in the liver and other solid tissues. U.S. Pat. No. 6,379,353 discloses such a probe, referred to as a LeVeen Needle Electrode™, which comprises a cannula and an electrode deployment member reciprocatably mounted within the delivery cannula to alternately deploy an electrode array from the cannula and retract the electrode array within the cannula. Using either of the two technologies, the energy that is conveyed from the electrode(s) translates into ion agitation, which is converted into heat and induces cellular death via coagulation necrosis. The ablation probes of both technologies are typically designed to be percutaneously introduced into a patient in order to ablate the target tissue. In the design of such ablation probes, which may be applicable to either of the two technologies, RF energy is often delivered to an electrode located on a distal end of the probe's shaft via the shaft itself. This delivery of RF energy requires the probe to be electrically insulated to prevent undesirable ablation of healthy tissue. In the case of a single needle electrode, all but the distal tip of the electrode is coated with an electrically insulative material in order to focus the RF energy at the target tissue located adjacent the distal tip of the probe. In the case of a LeVeen Needle Electrode™, RF energy is conveyed to the needle electrodes through the inner electrode deployment member, and the outer cannula is coated with the electrically insulative material to prevent RF energy from being transversely conveyed from the inner electrode deployment member along the length of the probe. The procedure for using the ablation probe requires the insulative coating to have sufficient durability. To illustrate, when designing RF ablation probes, it is desirable to make the profile of the probe shaft as small as possible, namely to have a smaller gauge size, in order to minimize any pain and tissue trauma resulting from the percutaneous insertion of the probe into the patient. Thus, it is advantageous for the electrically insulative material applied to the probes be as thin as possible. However, RF ablation probes are often introduced through other tightly toleranced devices that may compromise the integrity of the thinly layered insulation, thereby inadvertently exposing healthy tissue to RF energy. For example, probe guides are often used to point ablation probes towards the target tissue within a patient. A typical probe guide takes the form of a rigid cylindrical shaft (about 1-2 inches in length) that is affixed relative to and outside of a patient, and includes a lumen through which the ablation probe is delivered to the target tissue. To maximize the accuracy of the probe alignment, it is desirable that the guide lumen through which the probe is introduced be about the same size as the outer diameter of the probe, thereby creating a tight tolerance between the probe and the probe guide. As another example, ablation probes are also often used with co-access assemblies that allow several different devices, such as ablation probes, biopsy stylets, and drug delivery devices, to be serially exchanged through a single delivery cannula. To minimize pain and tissue trauma, it is desirable that the profile of the delivery cannula be as small as possible. To achieve this, the lumen of the delivery cannula will typically be the same size as the outer diameter of the ablation probe, thereby creating a tight tolerance between the probe and the delivery cannula. As a result, during the initial introduction of the probe through a delivery device, such as a probe guide or cannula of a co-access system, it is possible that a portion of the insulation may shear off as the probe is introduced through the delivery device. Consequently, the attending physician will either have to replace the probe with a new one or risk ablating healthy tissue. Thus, the durability of the insulative coating is critical to prevent damaging healthy tissue and/or having to discard the probe. Besides providing the insulation on the ablation probe with the necessary durability, it is also necessary to ensure that the distal end of the ablation probe, where the RF energy will be directed, is in contact with the target tissue. This may be achieved with an imaging device located outside the patient's body, such as an ultrasound imager. The echogenicity of the probe determines how well the probe may be located using ultrasound techniques. That is, the more echogenetic the ablation probe, the easier it is to determine the location of the probe with ultrasound imaging and to ensure accurate contact with the target tissue. To achieve greater echogenicity, it is known in the art, for example, to make marks or nicks along the shaft in order to increase the amount of edges and surfaces on the shaft, thereby creating a non-uniform surface profile. Echogenicity increases as the number of edges and surfaces for reflecting the ultrasound is increased. This technique may also be applied to insulative coating on the probe shaft. It is also known in the art to have air bubbles interspersed throughout the insulative coating in order to increase echgenicity. However, the inclusion of air bubbles may degrade the integrity of the insulative coating, which may also occur when marks or nicks are made in the insulative coating. Therefore, there is a need in the art for an ablation probe with an insulative coating having improved echogenicity for properly positioning the ablation device relative to the target tissue, while also having sufficient durability and size to remain intact during insertion and use of the ablation probe. | Mid | [
0.548856548856548,
33,
27.125
]
|
Pauson–Khand reaction The Pauson–Khand reaction (or PKR or PK-type reaction) is a chemical reaction described as a [2+2+1] cycloaddition between an alkyne, an alkene and carbon monoxide to form a α,β-cyclopentenone. The reaction was discovered by Ihsan Ullah Khand (1935-1980), who was working as a postdoctoral associate with Peter Ludwig Pauson (1925-2013) at the University of Strathclyde in Glasgow. This reaction was originally mediated by stoichiometric amounts of dicobalt octacarbonyl, but newer versions are both more efficient and catalytic. With unsymmetrical alkenes or alkynes, regioselectivity can be problematic, but less so with intramolecular reactions. The reaction works with both terminal and internal alkynes although internal alkynes tend to give lower yields. The order of reactivity for the alkene is strained cyclic alkene > terminal alkene > disubstituted alkene > trisubstituted alkene. Unsuitable alkenes are tetrasubstituted alkenes and alkenes with strongly electron withdrawing groups. Takayama and co-workers used an intramolecular Pauson–Khand reaction to cyclise an enyne containing a tert-butyldiphenylsilyl (TBDPS) protected primary alcohol. This was a key step in the asymmetric total synthesis of the Lycopodium alkaloid huperzine-Q. The inclusion of a cyclic siloxane moiety in the reagent ensures that the product is formed with the desired conformation – only a single enantiomer of the product was obtained in the Pauson–Khand reaction sequence. Variations Wilkinson's catalyst, based on the transition metal rhodium, also effectively catalyses PK reactions but requires silver triflate as a co-catalyst. Molybdenum hexacarbonyl is a carbon monoxide donor in PK-type reactions between allenes and alkynes with dimethyl sulfoxide in toluene. Cyclobutadiene also lends itself to a [2+2+1] cycloaddition although this reactant is generated in situ from decomplexation of stable cyclobutadiene iron tricarbonyl with ceric ammonium nitrate (CAN). An example of a newer version is the use of the chlorodicarbonylrhodium(I) dimer, [(CO)2RhCl]2, in the synthesis of (+)-phorbol by Phil Baran. In addition to using a rhodium catalyst, this synthesis features an intramolecular cyclization that results in the normal 5-membered α,β-cyclopentenone as well as 7-membered ring. See also Nicholas reaction References Category:Cycloadditions Category:Multiple component reactions Category:Name reactions | High | [
0.70204081632653,
32.25,
13.6875
]
|
Q: How to show a single validation message for the whole JSF form? I have a JSF form with number of fields. PrimeFaces normally does validation in this way: http://www.primefaces.org/showcase-labs/ui/pprAjaxValidations.jsf But I have more than 30 fields in my JSF form, so if I did this validation, it does not look good. How can I provide only a single message like "Please fill missing values" for any field if it is missing? A: Your could render the message conditionally based on FacesContext#isValidationFailed(). <h:outputText value="Please fill out missing values" rendered="#{facesContext.validationFailed}" /> Note that this would only make sense if you have only the required="true" validation enabled and you thus don't use any converters or other more specific validators for which the enduser would of course like to see a more specific message. | Mid | [
0.648379052369077,
32.5,
17.625
]
|
You probably won’t see Jay-Z or Beyonce at Nets games much anymore According to a report from TMZ, former Nets owner, Barclays Center opener, and season ticket holder Sean “Jay-Z” Carter is moving his family to Los Angeles. According to the report, Jay-Z & Beyonce haven’t closed a deal on a house yet, but have enrolled Blue Ivy in a private school that costs upwards of $15,000 annually. Jay-Z & Beyonce have courtside seats to the Brooklyn Nets, and have since the arena opened for NBA games in 2012. But they haven’t been seen at Barclays Center since Prince William & Princess Kate took in the Nets-Cavaliers game on December 9th, and only showed up on rare occasion. The two actually attended the recent Nets-Clippers game in Los Angeles’s Staples Center on January 23rd, and saw Clippers-Cavaliers there a week earlier. | Low | [
0.48076923076923006,
28.125,
30.375
]
|
Effect of pregnancy on activation of central pathways following atrial distension. Stimulation of the atrial volume receptors increases neural traffic to the ventrolateral medulla, which in turn sends output to, and receives input from, the lateral hypothalamic area. An integrated reflex and hormonal response is thus initiated. We wished to investigate first whether atrial distension results in activation of selected nuclei in the forebrain and, second, whether pregnancy modifies this response. Rats were implanted with indwelling intracardiac balloons positioned at the superior vena caval/right atrial junction. One week later, the balloons were inflated. The animals were then anesthetized, their brains fixed by perfusion, and the tissue prepared for visualization of c-fos activity. Atrial distension caused a significant increase in c-fos expression in the paraventricular nucleus, the medial preoptic area, and the lateral septum. This response was markedly attenuated in the pregnant animals. In conclusion, during pregnancy central pathways that are normally activated in responses to volume expansion, fail to respond to atrial distension. We propose that this allows blood volume to increase in the pregnant animal, without triggering homeostatic mechanisms. | High | [
0.6557377049180321,
35,
18.375
]
|
Real-time stereo matching using orthogonal reliability-based dynamic programming. A novel algorithm is presented in this paper for estimating reliable stereo matches in real time. Based on the dynamic programming-based technique we previously proposed, the new algorithm can generate semi-dense disparity maps using as few as two dynamic programming passes. The iterative best path tracing process used in traditional dynamic programming is replaced by a local minimum searching process, making the algorithm suitable for parallel execution. Most computations are implemented on programmable graphics hardware, which improves the processing speed and makes real-time estimation possible. The experiments on the four new Middlebury stereo datasets show that, on an ATI Radeon X800 card, the presented algorithm can produce reliable matches for 60% approximately 80% of pixels at the rate of 10 approximately 20 frames per second. If needed, the algorithm can be configured for generating full density disparity maps. | High | [
0.7065868263473051,
29.5,
12.25
]
|
<cpu match='strict'> <model>Penryn</model> </cpu> | Low | [
0.504065040650406,
31,
30.5
]
|
Active transport of dimethialium in Saccharomyces cerevisiae. Dimethialium, a derivative of thiamine which has a methyl group in place of hydroxyethyl group at the t-position of the thiazole moiety, was found to be accumulated in nonproliferating cells of Saccharomyces cerevisiae by the same transport mechanism for thiamine. The results strongly support the supposition that thiamine as well as dimethialium can be transported and accumulated without obligatory phosphorylation in yeast cells, since dimethialium is not phosphorylated by yeast thiamine pyrophosphokinase. | High | [
0.6565517241379311,
29.75,
15.5625
]
|
The Dorsal Frontoparietal Network: A Core System for Emulated Action. The dorsal frontoparietal network (dFPN) of the human brain assumes a puzzling variety of functions, including motor planning and imagery, mental rotation, spatial attention, and working memory. How can a single network engage in such a diversity of roles? We propose that cognitive computations relying on the dFPN can be pinned down to a core function underlying offline motor planning: action emulation. Emulation creates a dynamic representation of abstract movement kinematics, sustains the internal manipulation of this representation, and ensures its maintenance over short time periods. Based on these fundamental characteristics, the dFPN has evolved from a pure motor control network into a domain-general system supporting various cognitive and motor functions. | High | [
0.696969696969697,
31.625,
13.75
]
|
[Urethral replacement with free urinary bladder mucosal transplant]. An electro-resection was carried out in a subvesical blind-hole stenosis in a 5 month old male baby. Afterwards a 3 cm long urethral defect resulted in the penoscrotal junction. This was bridged with a free mucosal graft from the urinary bladder by the technique of Memmelaar and Hendren. | Mid | [
0.649572649572649,
28.5,
15.375
]
|
// // Generated by class-dump 3.5 (64 bit). // // class-dump is Copyright (C) 1997-1998, 2000-2001, 2004-2013 by Steve Nygard. // #import "MSStylePartCollection.h" @interface MSShadowStyleCollection : MSStylePartCollection { } + (Class)immutableClass; - (id)stylePartForInserting; @end | Low | [
0.43438914027149306,
24,
31.25
]
|
Mitzie Hunter Mitzie Hunter (born September 14, 1971) is a politician in Ontario, Canada. She is a Liberal member of the Legislative Assembly of Ontario who was first elected in a by-election on August 1, 2013 and later re-elected in the elections of 2014 and 2018. She represents the Toronto riding of Scarborough—Guildwood. She served as a member of cabinet in the government of Kathleen Wynne. She is a candidate for the 2020 Ontario Liberal Party leadership election. Background Hunter and her family immigrated to Canada from Jamaica in 1975. She grew up in Scarborough, graduated from the University of Toronto with a BA, and completed her MBA from the Rotman School of Management. She was CEO of the Greater Toronto CivicAction Alliance, and was previously CAO of Toronto Community Housing. She also served as Vice President at Goodwill Industries of Toronto. Politics In 2013 she ran as the Liberal candidate in a by-election called to replace Margarett Best who resigned due to health reasons. She defeated Progressive Conservative candidate Ken Kirupa by 1,246 votes. She faced Kirupa again in 2014 this time defeating him by 7,610 votes. In June 2014, she was appointed as an Associate Minister for the Ministry of Finance responsible for the Ontario Retirement Pension Plan. On June 13, 2016, she was promoted to the senior position of Minister of Education. On January 17, 2018, it was announced that Ms. Hunter would leave her position as Minister of Education to replace outgoing Deb Matthews as the new Minister of Advanced Education and Skills Development. On August 14, 2019, Hunter announced her candidacy for the 2020 Ontario Liberal Party leadership race. Cabinet positions Electoral record References External links Category:1971 births Category:Black Canadian politicians Category:Black Canadian women Category:Women government ministers of Canada Category:Jamaican emigrants to Canada Category:Living people Category:Members of the Executive Council of Ontario Category:Ontario Liberal Party MPPs Category:People from Scarborough, Toronto Category:Politicians from Toronto Category:Women MPPs in Ontario Category:University of Toronto alumni Category:21st-century Canadian politicians Category:21st-century Canadian women politicians | High | [
0.7346278317152101,
28.375,
10.25
]
|
A Juul representative repeatedly told a ninth-grade classroom that the company's e-cigarette was "totally safe" before showing underage students the device, according to two teenagers who testified under oath to Congress. | Low | [
0.526442307692307,
27.375,
24.625
]
|
The use of impulse oscillometry for separate analysis of inspiratory and expiratory impedance parameters in horses: effects of sedation with xylazine. To improve the outcome of parameters measured by the impulse oscillometry system (IOS) in horses by separate assessment of inspiratory and expiratory impedance spectra in the frequency range between 1 and 10 Hz. As basis for further studies, the influence of sedation with xylazine on respiratory impedance was also investigated. (i) The respiratory impedance of 11 horses was measured using IOS before and 6 min after sedation (xylazine; 0.6 mg/kg b.w.). (ii) The time course of impedance parameters in a period of 24 min after administration of xylazine was evaluated in 12 horses at regular intervals of 3 min. Resistance (R(rs)), reactance (X(rs)), and coherence (Co) were calculated as mean spectra (R(rs),X(rs),Co) of the entire measurement as well as separated into inspiration (Ri(rs),Xi(rs),Coi) and expiration (Re(rs),Xe(rs),Coe) at frequencies of 1, 5, and 10 Hz. (i) R(rs), X(rs) as well as Re(rs) and Xe(rs) revealed no significant influence of sedation. However, separate analysis of inspiration and expiration revealed a significant influence of sedation on all inspiratory impedance parameters. (ii) During the 24 min period after sedation, almost all inspiratory parameters were found significantly dependent on the time course of sedation whereas expiratory parameters Re10, Xe1, and Xe5 were not influenced. These results indicate that confounding factors due to sedation act mainly during inspiration. Muscle relaxation in upper airways due to xylazine is suspected to be the main cause of these phenomena. | Mid | [
0.649651972157772,
35,
18.875
]
|
Q: Classes: Interacting with 2 class instances in one function It's my first time with classes in python and I quickly wrote a simple class which lets you move rocket by coordinates. I don't know though how to make a function called let's say "distance" that would return distance between two different instances(rockets). Just to be clear, I know how to calculate the distance, I don't know how to build a function class Rocket: def __init__(self , start = (0, 0)): self.start = start self.x = self.start[0] self.y = self.start[1] if not self.crash(): self.start = (0,0) print("You crashed!! Your position has been restarted to (0,0)") def __repr__(self): return "tbd" def get_position(self): return "Your curret posiiton is {}".format(self.start) def move_side(self,x): self.x += x self.start = (self.x, self.y) def move_up(self,y): self.y += y self.start = (self.x, self.y) if not self.crash(): self.start = (0,0) print("You crashed!! Your position has been restarted to (0,0)") def move(self,x,y): self.x += x self.y += y self.start = (self.x,self.y) def land_rocket(self): self.y = 0 self.start = (self.x,self.y) def crash(self): if self.y >= 0: return True return False def distance(self,other): return "???" A: You need to define a class method that takes an extra argument, which is the object from which you want to calculate the distance. To apply the cartesian distance formula, know that ** stands for exponentiation and that you can import math.sqrt for square root. import math class Rocket: ... def distance(self, other): return math.sqrt((self.x - other.x) ** 2 + (self.y - other.y) ** 2) The above code only requires other to have x and y attributes, it does not need to be a Rocket instance. | Mid | [
0.639269406392694,
35,
19.75
]
|
LED-based multi-wavelength phase imaging interference microscopy. LED-based multi-wavelength phase imaging interference microscopy combines phase-shifting interferometry with multi-wavelength optical phase unwrapping. This technique consists of a Michelson-type interferometer illuminated with a LED. The reference mirror is dithered for obtaining interference images at four phase quadratures, which are then combined to calculate the phase of the object surface. The 2pi ambiguities are removed by repeating the experiment using two or more LEDs at different wavelengths, which yields phase images of effective wavelength much longer than the original. The resulting image is a profile of the object surface with a height resolution of several nanometers and range of several microns. The interferographic images using broadband sources are significantly less affected by coherent noise. | High | [
0.6613119143239621,
30.875,
15.8125
]
|
Cytotoxicity of Nubein6.8 peptide isolated from the snake venom of Naja nubiae on melanoma and ovarian carcinoma cell lines. This study was conducted to examine the cytotoxic effects of Nubein6.8 isolated from the venom of the Egyptian Spitting Cobra Naja nubiae on melanoma (A375) and ovarian carcinoma cell lines and to reveal its mode of action. The size of Nubein6.8 (6801.8 Da) and its N-terminal sequence are similar to cytotoxins purified from the venom of other spitting cobras. Nubein6.8 showed a high significant cytotoxic effect on A375 cell line and moderate effect on A2780. A clonogenic assay showed that Nubein6.8 has a significant long-term potency on A375 cell survival when compared to A2780. The molecular intracellular signaling pathways of Nubein6.8 have been investigated using Western blotting analysis, flow cytometry, and microscale protein labeling. This data revealed that Nubein6.8 has DNA damaging effects and the ability to activate apoptosis in both tumor cell lines. Cellular uptake recordings revealed that the labeled-Nubein6.8 was intracellularly present in A375 cells while A2780 displayed resistance against it. SEM examination showed that Nubein6.8 was found to have high accessibility to malignant melanoma cells. The apoptotic effect of Nubein6.8 was confirmed by TEM examination that revealed many evident characteristics for Nubein6.8 apoptotic efficacy on A375 cell sections. Also, TEM reflected many resistant characteristics that faced Nubein6.8 acquisition through ovarian carcinoma cell sections. Accordingly, the snake venom peptide of Nubein6.8 is a promising template for developing potential cytotoxic agents targeting human melanoma and ovarian carcinoma. | High | [
0.699853587115666,
29.875,
12.8125
]
|
It was in 1991, in Princeton, after a meeting of seven men and one woman – I am very honoured I was woman – that the IAPT was born. But like all births, this birth was not an unexpected event. There was a gestation-period: a period of bi-lateral international meetings between practical theologians. For instance, in July 1990 about twenty practical theologians from the Netherlands and the USA met in the Mennonite Center in Elspeet, in the Netherlands. The theme was: “Transformation of the Local Church”. Although these bi-lateral conferences were interesting and fruitful, the need was felt for a broader organization, where practical theologians from all over the world could communicate. Other disciplines had such organizations. It was time for practical theology to become an adult discipline on the forum of theologies. So in 1991, August, 1-4, the seven founding fathers and the one founding mother came together in Princeton, where Rick Osmer was our host. The first evening we met each other for dinner in Rick’s home: it was clear that we had one purpose and were eager to work together. But still there were differences of opinion that would have a long life in the IAPT, once founded...Read Full Text Here The Beginnings of the International Academy of Practical Theology, by Friedrich Schweitzer Every true beginning has its own myth. More than 20 years after the inception of the idea that there should be such an academy, the processes that have led to these beginnings are beginning to sink into the realm of myth and mystery. From what I remember, the idea for an international academy first came up during a conference on practical theology in 1990 at Blaubeuren/Germany, the site of Tuebingen university’s conference center. This conference brought together a number of new interests in * as an academic discipline, from Germany, from the United States, and from other countries, most of all the Netherlands. Key speakers were, among others, Don Browning, James Fowler, Dietrich Rössler, Karl Ernst Nipkow. I myself had been active as one of the organizers of the conference. Since I had been a postgraduate student at Harvard in the late 1970s and also had started internationalizing my own work by organizing international conferences since the early 1980s, the idea of an international academy seemed very attractive to me. Moreover, it became clear that there was a convergence of similar developments in different countries that we could make use of. Two key ideas were behind the efforts for founding the new academy. First, it was not considered sufficient that the various subdisciplines of * should have their international organizations (such organizations exist in a number of areas, like religious education, homiletics, pastoral counseling, etc.) . If * should be taken seriously as a discipline, it should also have its own organization at an international level. Second, the aim of the academy should be to bring together researchers who are working within the field of * in different countries. In other words, the aim was not to organize conferences but to facilitate international research projects as well as to create ongoing exchange on research...Read Full Text Here | High | [
0.658031088082901,
31.75,
16.5
]
|
Dark Matter 2x10 Promo Season 2 Episode 10 Promo | Mid | [
0.5964912280701751,
34,
23
]
|
Mary Kay Letourneau And Former Student Discuss Married Life After Her Rape Scandal... Mary Kay Letourneau and former student to discuss married life after rape scandal with Barbara Walters HEIDI GUTMAN/ABCFormer Seattle teacher Mary Kay Letourneau Fualaau and husband Vili Fualaau are seen with Barbara Walters on the eve of their 10th wedding anniversary. After nearly 20 years, they're still together and say better than ever. Mary Kay Letourneau Fualaau, the former Seattle teacher who in 1997 famously became pregnant by her 13-year-old student whom she went on to marry, is celebrating her upcoming 10th wedding anniversary in a tell-all interview alongside her husband, Vili Fualaau. In a sit-down interview with Barbara Walters, scheduled to air on "20/20" Friday, the couple will discuss their scandalous relationship — which sentenced her to seven and a half years behind bars — and what keeps them together, despite their 21-year age difference, according to ABC. MARK GREENBERG/APMary Kay Letourneau (l.) wed Vili Fualaau (r.) shortly after her release from prison in 2005. The 52-year-old Letourneau, who today has two teenaged girls with her former sixth-grade student and four others from a prior marriage, will also discuss her plans to have her status as a registered sex offender lifted and one day teach again. That would come nearly two decades after she was arrested on child rape charges. ALAN BERNER/APMary Kay Letourneau, seen in court in 1998 on child rape charges, was sentenced to seven and a half years in prison. Vili Fualaau, for his part, will discuss his personal struggle with alcoholism and depression as well as his belief that the system failed him when he was a minor. Following his then-teacher's conviction he filed a lawsuit against the Des Moines Police Department and the Highline School District for failing to protect him from sexual exploitation, stemming from his relationship with Letourneau When Letourneau was released from prison in 2004, she told Walters that she planned to marry her former student. "We've always planned that and it hasn't changed," she said. Proving her vow to be more than just talk, the couple wed in 2005. Their two daughters are now older than Vili Fualaau was when he conceived them and plan to make an appearance alongside their parents Friday. I'd love to be a fly on the wall in their house to see what their relationship is like today. I think he could take it or leave it, but I don't see her ever letting him go. I imagine the power dynamic between them is much different now than it was when she was the only adult in the relationship. I wonder what her relationship with her first set of kids is like? How do she and Vili explain the history of their relationship to their daughters? I have so many questions. I'd love to be a fly on the wall in their house to see what their relationship is like today. I think he could take it or leave it, but I don't see her ever letting him go. I imagine the power dynamic between them is much different now than it was when she was the only adult in the relationship. I wonder what her relationship with her first set of kids is like? How do she and Vili explain the history of their relationship to their daughters? I have so many questions. Click to expand... Me too..I'm thinking she's a pretty crazy chick and will hold onto him for dear life. He was ONLY TWELVE when she started banging him.. | Mid | [
0.577102803738317,
30.875,
22.625
]
|
import sys from doctest import testmod import numpy import einops import einops.layers import einops.parsing from einops._backends import AbstractBackend from einops.einops import rearrange, parse_shape, _optimize_transformation from . import collect_test_backends __author__ = 'Alex Rogozhnikov' def test_doctests_examples(): if sys.version_info >= (3, 6): # python 3.5 and lower do not keep ordered dictionaries testmod(einops.layers, raise_on_error=True, extraglobs=dict(np=numpy)) testmod(einops.einops, raise_on_error=True, extraglobs=dict(np=numpy)) def test_backends_installed(): """ This test will fail if some of backends are not installed or can't be imported Other tests will just work and only test installed backends. """ from . import skip_cupy errors = [] for backend_type in AbstractBackend.__subclasses__(): if skip_cupy and backend_type.framework_name == 'cupy': continue try: # instantiate backend_type() except Exception as e: errors.append(e) assert len(errors) == 0, errors def test_optimize_transformations_numpy(): print('Testing optimizations') shapes = [[2] * n_dimensions for n_dimensions in range(14)] shapes += [[3] * n_dimensions for n_dimensions in range(6)] shapes += [[2, 3, 5, 7]] shapes += [[2, 3, 5, 7, 11, 17]] for shape in shapes: for attempt in range(5): n_dimensions = len(shape) x = numpy.random.randint(0, 2 ** 12, size=shape).reshape([-1]) init_shape = shape[:] n_reduced = numpy.random.randint(0, n_dimensions + 1) reduced_axes = tuple(numpy.random.permutation(n_dimensions)[:n_reduced]) axes_reordering = numpy.random.permutation(n_dimensions - n_reduced) final_shape = numpy.random.randint(0, 1024, size=333) # just random init_shape2, reduced_axes2, axes_reordering2, final_shape2 = combination2 = \ _optimize_transformation(init_shape, reduced_axes, axes_reordering, final_shape) assert numpy.array_equal(final_shape, final_shape2) result1 = x.reshape(init_shape).sum(axis=reduced_axes).transpose(axes_reordering).reshape([-1]) result2 = x.reshape(init_shape2).sum(axis=reduced_axes2).transpose(axes_reordering2).reshape([-1]) assert numpy.array_equal(result1, result2) # testing we can't optimize this formula again combination3 = _optimize_transformation(*combination2) for a, b in zip(combination2, combination3): assert numpy.array_equal(a, b) def test_parse_shape_imperative(): backends = collect_test_backends(symbolic=False, layers=False) backends += collect_test_backends(symbolic=False, layers=True) for backend in backends: print('Shape parsing for ', backend.framework_name) x = numpy.zeros([10, 20, 30, 40]) parsed1 = parse_shape(x, 'a b c d') parsed2 = parse_shape(backend.from_numpy(x), 'a b c d') assert parsed1 == parsed2 == dict(a=10, b=20, c=30, d=40) assert parsed1 != dict(a=1, b=20, c=30, d=40) != parsed2 parsed1 = parse_shape(x, '_ _ _ _') parsed2 = parse_shape(backend.from_numpy(x), '_ _ _ _') assert parsed1 == parsed2 == dict() parsed1 = parse_shape(x, '_ _ _ hello') parsed2 = parse_shape(backend.from_numpy(x), '_ _ _ hello') assert parsed1 == parsed2 == dict(hello=40) parsed1 = parse_shape(x, '_ _ a1 a1a111a') parsed2 = parse_shape(backend.from_numpy(x), '_ _ a1 a1a111a') assert parsed1 == parsed2 == dict(a1=30, a1a111a=40) def test_parse_shape_symbolic(): backends = collect_test_backends(symbolic=True, layers=False) backends += collect_test_backends(symbolic=True, layers=True) for backend in backends: if backend.framework_name == 'keras': # need special way to compile, shape vars can be used only inside layers continue print('special shape parsing for', backend.framework_name) input_symbols = [ backend.create_symbol([10, 20, 30, 40]), backend.create_symbol([10, 20, None, None]), backend.create_symbol([None, None, None, None]), ] if backend.framework_name in ['mxnet.symbol']: # mxnet can't normally run inference input_symbols = [backend.create_symbol([10, 20, 30, 40])] for input_symbol in input_symbols: shape_placeholder = parse_shape(input_symbol, 'a b c d') shape = {} for name, symbol in shape_placeholder.items(): shape[name] = symbol if isinstance(symbol, int) \ else backend.eval_symbol(symbol, [(input_symbol, numpy.zeros([10, 20, 30, 40]))]) print(shape) result_placeholder = rearrange(input_symbol, 'a b (c1 c2) (d1 d2) -> (a b d1) c1 (c2 d2)', **parse_shape(input_symbol, 'a b c1 _'), d2=2) result = backend.eval_symbol(result_placeholder, [(input_symbol, numpy.zeros([10, 20, 30, 40]))]) print(result.shape) assert result.shape == (10 * 20 * 20, 30, 1 * 2) assert numpy.allclose(result, 0) def test_is_float_type(): backends = collect_test_backends(symbolic=False, layers=False) backends += collect_test_backends(symbolic=False, layers=True) for backend in backends: for dtype in ['int32', 'int64', 'float32', 'float64']: is_float = 'float' in dtype input = numpy.zeros([3, 4, 5], dtype=dtype) input = backend.from_numpy(input) if 'chainer' in backend.framework_name and not is_float: continue # chainer doesn't allow non-floating tensors assert backend.is_float_type(input) == is_float, (dtype, backend, input.dtype) | Mid | [
0.577249575551782,
42.5,
31.125
]
|
/* @flow */ import { addProp } from 'compiler/helpers' export default function html (el: ASTElement, dir: ASTDirective) { if (dir.value) { addProp(el, 'innerHTML', `_s(${dir.value})`, dir) } } | Low | [
0.48251748251748205,
25.875,
27.75
]
|
Involvement of alpha6 nicotinic receptor subunit in nicotine-elicited locomotion, demonstrated by in vivo antisense oligonucleotide infusion. Enhanced locomotion in a habituated environment is a well documented effect of nicotine mediated by the mesotelencephalic dopaminergic system. The nicotinic receptor subunit alpha6 is, among other subunits, strongly expressed in the dopaminergic neurons of the mesencephalon. To examine the functional role of this subunit, we inhibited its expression in vivo using antisense oligonucleotides. In vitro treatments of embryonic mesencephalic neuron cultures demonstrated that the alpha6 antisense oligonucleotides caused a marked decrease in the level of alpha6 subunit protein. In vivo, 1 week infusion of alpha6 antisense oligonucleotides by osmotic mini-pump reduced the effect of nicotine on locomotor activity in habituated environment by 70%. These data support the notion that the effects of nicotine on the dopaminergic system involve alpha6 subunit containing nAChRs. | High | [
0.6828025477707,
33.5,
15.5625
]
|
If this is your first visit, be sure to check out the FAQ by clicking the link above. You may have to register before you can post: click the register link above to proceed. To start viewing messages, select the forum that you want to visit from the selection below. So Jeff...is that the way it's gonna be? BHO is NOT to be held accountable if Bush 43 did the opposite (or the same, depending on what the Dems need to bitch about) at ANY time during his administration? BHO said in his press "conference" (a staged address with planted questions...I loved it.....) that our current financial situation might not turn around regardless of what happens during his administration. Now if that is not setting us up to accept failure under his watch, I don't know what is......he's been in office three weeks and he's already telling us that failure will be the fault of the situation that he inherited. So that's what "change" is.....glad to know the current definition, 'cause that sure isn't what was being said when the campaign was going on. And I loved the comment from the woman from Elkhart, IN, who wanted to know when all that stimulus money was going to be coming to her town....did he leave them an IOU? kg Was the press conference staged? I saw one conservative blog comment that said it was obviously staged because he had a carefully prepared speech in response to each question -- meaning, I assume, that it would have been better had he been unprepared? Another conservative site proclaimed that Fox News had been prevented from asking a question for the fifth time in a row at Obama press conferences. Presumably they know something about Major Garrett (The Fox News correspondent who asked a question about a biden comment) that the rest of us don't know. With respect to the "inherited" financial collapse, I'm not sure what you're suggesting. Is it that you believe it is not a problem or is it that you believe that the collapse was caused by the Obama administration? I also liked the Elkhart woman's question about how funds woud get to them. I thought his answer was pretty straight and not necessarily exactly what she would have liked him to say. The impression I get in reading these threads is that none of the complaints is real. If Obama said that 2 + 2 = 4, there would be a thread saying that Obama was once again trying to manipulate numbers to support a fantasy. If he didn't say it there would be a thread complaining that he was avoiding the numbers. I can understand if someone does not believe any stimulus program is needed, even though I disagree. I can understand if someone wants the stimulus program to be based primarily or solely on tax cuts, although I disagree and believe the data do not support that approach. I can understand the belief that we should do nothing to grow the deficit further, but do not understand if the same person wants the tax cuts to be made permanent despite the fact that they would add trillions to the deficit. Amazingly, those are the same people who call California "La La Land." There is little to discuss when issues are raised solely to make noise. There are a lot of real issues and they are pretty serious for most of us. I don't think that our current economic problems are going to be resolved in a manner that will please anyone from an ideological perspective. Obviously, a big part of the equation is whether or not there actually is a major problem at all. Do we actually believe that banks will collapse without support? Do we believe that enough banks will survive collapse to allow our financial system to continue to operate? Do we believe that the snowball effects of rising unemployment, collapsing consumer credit, collapsing business credit, massive business losses, and more layoffs will continue until unemployment hits Depression era levels? Do we believe that, if such problems are actually in our future, that they are the inevitable product of some long term business cycle and we should simply starve our way back to prosperity? Are any of these fair questions, or are they simply scare tactics to encourage the masses to vote their way into an atheistic, socialistic, communist dictatorship that will probably be run by homosexuals who will require all pregnancies to be terminated by abortion? With the exception of the last, I think these are fair questions. I may have thoughts about them, but I do not have answers and I doubt that the administration does either. Unfortunately, our options are to do nothing, with unknown consequences, or do something that may or may not work. Neither is a good option. Whatever happens, I suspect that most on this forum will complain in advance about whatever the administration does. Whatever happens, most on this forum will blame the administration if the economy gets worse and, if the economy gets better, most on this forum will say that it's proof of the strength of our system that it recovered despite whatever the administration did or, alternatively, that it recovered because of something done by GWB or the Republicans in Congress. Personally, I don't really care who gets the credit. I would like to see things get better than they are now. My suspicion is that things will get a lot worse first. Get used to it folks, If the Dems have any success, they will take sole credit / If they fail, they will fall back on the old, "we're still trying to undo the last 8 years"... sad but all too true. Like an earlier post mentioned... it's your show now, do something positive... ya know, like all the sunshine you sold to your voters during the Obamarama election campaign. Was the press conference staged? I saw one conservative blog comment that said it was obviously staged because he had a carefully prepared speech in response to each question -- meaning, I assume, that it would have been better had he been unprepared? Another conservative site proclaimed that Fox News had been prevented from asking a question for the fifth time in a row at Obama press conferences. Presumably they know something about Major Garrett (The Fox News correspondent who asked a question about a biden comment) that the rest of us don't know. Yes the press conference was obviously staged. The reporters allowed to ask questions were selected beforehand and asked to provide the question(s) they wanted to ask in advance, so the staff could prepare answers for their leader. I suspect most of his press conferences will be more of the same. Would it be better if Obomo was unprepared? My opinion is, given how woefully unprepared this man is to hold any office, probably not; his 'off the cuff' remarks have done nothing to inspire confidence in him as he appears petulant and buffoonish when he's questioned off script. As for certain media being ignored, White House press staff do try to avoid reporters they know will make their man look bad. That's their job. But at some point the President has to be able to answer questions with some degree of knowlege, even ones that aren't supplied in advance. This president has not shown even a basic grasp of the subject matter at hand (what's in the stimulus package). | Low | [
0.515555555555555,
29,
27.25
]
|
Followers Subscribe Monday, September 10, 2012 The Dr Tabubil Files: The Mines, the Miners and Bulk Billing My sister, the estimable Dr Tabubil, is spending ten weeks on a rural clinical rotation in Cloncurry, a small pastoral town in the Queensland Outback. It's a fantastic place, and together we have collaborated on a series of guest posts all about living and working in the Red Centre. Enjoy! The patients here in Cloncurry are typical for a small town in cattle grazing country, with a high and regular flow of tourists (Grey Nomads and Backpackers) coming through. I have my regulars, who are already disappointed I’m only there for 10 weeks (yay!) and I see a fair amount of the transient population - the workers from the more remote stations, and the men and women who work in the mines nearby. The countryside around Cloncurry seems to be littered with mines. The mother load around Cloncurry is copper. Just recently, though the Great Australian Mine has just found a rich body of Gold that will yield some spectacular kilo loads per tonne and keep the mines in cash for a long time - even if (or when) the copper runs out. These miners are young men and a few women who, once finished with school ( at 16 if they drop out, 17 or 18 if they graduate) sign a contract with the mines for a very large starting salary - AUD $80 000 a year. Occasionally it can be frustrating when these young miners ask for a little too much. Occasionally they'll present to the clinic with a medical complaint, and expect to be bulk billed (Bulk billing is what happens when you are on medicare, our national health-care scheme, and the whole bill is taken care of by the medicare plan.) Apart from that, I LOVE bulk billing. This generally applies to people on a pension, or under the age of 16, or people who have a DVA Veterans card or some other sort of concession, but up here we have some reasonable discretion about when and how to use it – like if they have come in on a recall for results, or it was a hellish day and the patient waited for 2 hours for us to be free. Or, in my case, when I stumbled upon a patient’s recent personal tragedy, and made her cry, by saying, in a really bright voice - “Are there any preexisting conditions in your family?” And she burst into tears and said “My brother is in a full body traction cast! He fell off of a quad-bike last week!!” and cried and cried and cried. I felt so awful. I spent 15 minutes just sitting there and holding her hand and listening while she told me all about it. It was so sad. I definitely bulk billed that one. People come from all over to work in the mines - from all over Australia, from all over the world. I love my job – I meet so many people. My favorite part of a consult is the moment when I say: "Hello – who are you? And where are you from?" Because I get a story. People will come up to the mines for six months, or for a year, for two years, on a sabbatical from an academic job, because they're on the run from a spouse or some other family situation, and they'll make enough money to go home for a while, and then they'll come back again. Again and again and again. The outback seems to get into your blood. And then there are patients from the really wealthy cattle families. One family in particular is the tenth richest family in Queensland. Based out of Cloncurry, they own a full third of Queensland's grazing country. Their trip in for a checkup is racked with hardship – do they fly their private plane to town, or drive up in their Bentley? Bulk billing is fantastic – I really got into the swing of it, until the boss had to come and tell that I needed to ease back a little. "Dr Tabubil - we appreciate that you're being a compassionate doctor, but – this is Cloncurry. Not Brisbane. If they look like they can afford it – charge them. If they look like they can’t afford it – charge them anyway. Chances are their private jet is waiting for them at the airport to take them back to the muster, which is why they look like they've been rolled on by a horse and they smell like the back end of a stable. They are working millionaires." Of course, there are people here in town who really can’t afford it. But the reception staff knows who they are and they probably have a concession card anyway. Even so, when some eighteen year old kid comes in after I’ve seen him throwing bills on the bar the previous night in the pub and looks at me and says - "SO, can ya, like, bulk bill?" Well, when that eighteen year old is making 80 000 dollars a year, I generally sigh, and smile sweetly, and say “Oh, NO, I’m sooo sorry. It’s just not applicable.” About Me I am an Australian architect, married to a Canadian who followed me home. In September 2011 we relocated from rural South Australia to the bustling metropolis of Santiago, Chile, where it's warmer than Canada, but less insect-y than Australia. How's that for a compromise? | Low | [
0.5348837209302321,
34.5,
30
]
|
--- abstract: 'The vortex lattice structures of Sr$_2$RuO$_4$ for the odd parity representations of the superconducting state are examined for the magnetic field along the crystallographic directions. Particular emphasis is placed upon the two dimensional representation which is believed to be relevant to this material. It is shown that when the zero-field state breaks time reversal symmetry, there must exist [*two*]{} superconducting transitions when there is a finite field along a high symmetry direction in the basal plane. Also it is shown that a square vortex lattice is expected when the field is along the $c$-axis. The orientation of the square lattice with respect to the underlying ionic lattice yields information as to which Ru 4$d$ orbitals are relevant to the superconducting state.' address: 'Theoretische Physik, Eidgenossiche Technische Hochschule- Hönggerberg, 8093 Zürich, Switzerland' author: - 'D.F. Agterberg' title: 'Vortex lattice structures of Sr$_2$RuO$_4$' --- The oxide superconductor Sr$_2$RuO$_4$ is structurally similar to the high $T_c$ materials but differs markedly from the latter in its electronic structure [@mae94]. In particular, the normal state near the superconducting transition of Sr$_2$RuO$_4$ is well described by a quasi-2D Landau Fermi liquid [@mac296]. There now exists considerable evidence that the superconducting state of Sr$_2$RuO$_4$ [@mae94] is not a conventional $s$-wave state. NQR measurements show no indication of a Hebel-Slichter peak in $1/T_1T$ [@ish97], $T_c$ is strongly suppressed by non-magnetic impurities [@mac98], and tunneling experiments are inconsistent with $s$-wave pairing [@jin98]. While these measurements demonstrate that the superconducting state is non $s$-wave, they do not determine what pairing symmetry actually occurs in this material. The determination of the pairing symmetry in unconventional superconductors is a notoriously difficult problem and theoretical insight provides a useful guide. The observations that the Fermi liquid corrections due to electron correlations are similar in magnitude to those found in superfluid $^3$He and that closely related ruthenates are itinerant ferromagnets have led to the proposal that the superconducting state in Sr$_2$RuO$_4$ is of odd-parity [@ric95]. Even with this insight there still remain five odd-parity states that have different symmetry - all of which have a nodeless gap and therefore similar thermodynamic properties [@ric95]. Recently, $\mu$SR measurements indicate that a spontaneous internal magnetization begins to develop at $T_c$ [@luk98]. The most natural interpretation of this magnetization is that the superconducting state [*breaks*]{} time reversal symmetry (${\cal T}$). This places a strong constraint on the pairing symmetry in Sr$_2$RuO$_4$ since it implies that the superconducting order parameter must have more than one component [@sig91]. Of the possible representations (REPS) of the $D_{4h}$ point group only the two dimensional (2D) $\Gamma_{5u}$ and $\Gamma_{5g}$ REPS exhibit this property. Of these two the $\Gamma_{5u}$ REP is the most likely to occur in Sr$_2$RuO$_4$ due to arguments of Ref. [@ric95] and the quasi-2D nature of the electronic properties. The order parameter in this case has two components $({\eta_1,\eta_2})$ that share the same rotation-inversion symmetry properties as $(k_x,k_y)$ [@sig91]. The broken ${\cal T}$ state would then correspond to $(\eta_1,\eta_2)\propto(1,i)$. I investigate within Ginzburg Landau (GL) theory the vortex lattice structures expected for the odd-parity REPS of the superconducting state; focusing mainly on the $\Gamma_{5u}$ REP. It is initialy shown that a general consequence of the broken ${\cal T}$ state described above is that in a finite magnetic field oriented along a high symmetry direction in the basal plane there will exist a [*second*]{} superconducting transition in the mixed state as temperature is reduced. The observation of such a transition would provide very strong evidence that the order parameter belongs to the $\Gamma_{5u}$ REP. The form of the vortex lattice for a field along the $c$-axis is then investigated for both the one dimensional (1D) and the 2D $\Gamma_{5u}$ REPS of the superconducting state. It is shown that a square vortex lattice is expected to appear for all the REPS, however observable differences exist between the 1D and the 2D REPS. Finally, within the recently proposed model of orbital dependent superconductivity of Sr$_2$RuO$_4$ [@agt97] it is also shown that the orientation of square vortex lattice with respect to the underlying crystal lattice dictates which of the Ru $4d$ orbitals give rise to the superconducting state. To demonstrate the presence of the two superconducting transitions described above consider the magnetic field along the $\hat{x}$ direction ($x$ is chosen to be along the basal plane main crystal axis) and a homogeneous zero-field state $(\eta_1,\eta_2)\propto(1,i)$. In general the presence of a magnetic field along the $\hat{x}$ direction breaks the degeneracy of the $(\eta_1,\eta_2)$ components, so that only one component will order at the upper critical field \[[*e.g.*]{} $(\eta_1,\eta_2)\propto(0,1)$\]. As has been shown for type II superconductors with a single component the vortex lattice is hexagonal at $T_c$ and the order parameter solution is independent of $x$ so that $\sigma_x$ (a reflection about the $\hat{x}$ direction) is a symmetry operation of the $(\eta_1, \eta_2)\propto (0,1)$ vortex phase [@luk95]. Now consider the zero-field phase $(\eta_1,\eta_2)\propto(1,i)$, $\sigma_x$ transforms $(1,i)$ to $(-1,i)\ne e^{i\phi}(1,i)$ where $\phi$ is phase factor. This implies that $\sigma_x$ is [*not*]{} a symmetry operator of the zero-field phase. It follows that there must exist a transition in the finite field phase at which $\eta_1$ becomes non-zero. Similar arguments hold for the field along any of the other three crystallographic directions in the basal plane. Evidence for this transition may already exist in the ac magnetic susceptibility measurements of Yoshida [*et. al.*]{} [@yos96]. They observed a second peak in the imaginary part of the magnetic susceptibility only when the flux lines were parallel to the basal plane. For a more detailed analysis consider the following dimensionless GL free energy density for the $\Gamma_{5u}$ REP $$\begin{aligned} f=&-|\vec{\eta}|^2+|\vec{\eta}|^4/2+\beta_2(\eta_1\eta_2^*-\eta_2\eta_1^*)^2/2 +\beta_3|\eta_1|^2|\eta_2|^2 +|D_x\eta_1|^2+|D_y\eta_2|^2\label{eq1}\\ &+\kappa_2(|D_y\eta_1|^2+ |D_x\eta_2|^2)+ \kappa_5(|D_z\eta_1|^2+|D_z\eta_2|^2) \nonumber \\ & +\kappa_3[(D_x\eta_1)(D_y\eta_2)^*+h.c.]+ \kappa_4[(D_y\eta_1)(D_x\eta_2)^*+h.c.] +h^2. \nonumber\end{aligned}$$ where $h=\nabla\times {\bf A}$, $D_{\nu}=\nabla_{\nu}/\kappa-iA_{\nu}$, $f$ is in units $B_c^2/(4\pi)$, lengths are in units $\lambda=[\hbar^2 c^2 \beta_1/(16 e^2 \kappa_1 \alpha \pi)]^{1/2}$, $h$ is in units $\sqrt{2}B_c=\Phi_0/(4\pi\lambda\xi)^{1/2}$, $\alpha=\alpha_0(T-T_c)$, $\xi=(\kappa_1/\alpha)^{1/2}$, and $\kappa=\lambda/\xi$. Note that $\lambda,\xi$, $B_c$ and $\kappa$ are simply convenient choices and do not correspond to measured values of these parameters. A thorough analysis of Eq. \[eq1\] is difficult due to the unknown phenomenological parameters $\beta_2,\beta_3, \kappa_2,\kappa_3$, and $\kappa_4$. To simplify the analysis these parameters are determined in the weak-coupling, clean-limit for an arbitrary Fermi surface. Taking for the $\Gamma_{5u}$ REP the gap function described by the pseudo-spin-pairing gap matrix: $\hat{\Delta}=i[\eta_1 v_x/\sqrt{\langle v_x^2\rangle}+ \eta_2v_y/\sqrt{\langle v_x^2\rangle}]\sigma_z \sigma_y$ where the brackets $\langle \rangle$ denote an average over the Fermi surface and $\sigma_i$ are the Pauli matrices, it is found that $\beta_2=\kappa_2=\kappa_3=\kappa_4=\gamma$ and $\beta_3=3\gamma-1$ where $\gamma=\langle v_x^2v_y^2 \rangle / \langle v_x^4 \rangle$. Note that $0\le\gamma\le1$ and that $\gamma=1/3$ for a cylindrical or spherical Fermi surface. These parameters agree with the cylindrical Fermi surface results of Ref. [@zhu97]. It is easy to verify that in zero-field $(\eta_1,\eta_2)\propto(1,i)$ is the stable ground state for all $\gamma$. It is informative to determine the values of $\gamma$ that are relevant to Sr$_2$RuO$_4$. LDA band structure calculations [@ogu95; @sin95] reveal that the density of states near the Fermi surface are due mainly to the four Ru $4d$ electrons in the $t_{2g}$ orbitals. There is a strong hybridization of these orbitals with the O $2p$ orbitals giving rise to antibonding $\pi^*$ bands. The resulting bands have three quasi-2D Fermi surface sheets labeled $\alpha,\beta,$ and $\tilde{\gamma}$ (see Ref. [@mac296]). The $\alpha$ and $\beta$ sheets consist of $\{xz,yz\}$ Wannier functions and the $\tilde{\gamma}$ sheet of $xy$ Wannier functions. In general $\gamma$ is not given by a simple average over all the sheets of the Fermi surface. A knowledge of the pair scattering amplitude on each sheet and between the sheets is required to determine $\gamma$ [@agt97; @maz97]. Recently, to account for the large residual density of states observed in the superconducting state, it has been proposed that either the $xy$ or the $\{xz,yz\}$ Wannier functions exhibit superconducting order [@agt97]. This model implies that that there are two possible values of $\gamma$; one for the $\tilde{\gamma}$ sheet ($\gamma_{xy}$) and one for an average over the $\{\alpha,\beta\}$ sheets ($\gamma_{xz,yz}$). A tight binding model indicates $\gamma_{xy}=0.67$ and $\gamma_{xz,yz}=0.11$ [@agt98]. These values are sensitive to changes in the parameters of the tight binding model, however the qualitative result that $\gamma_{xy}>1/3$ and $\gamma_{xz,yz}<1/3$ is robust. Physically $\gamma_{xy}>1/3$ because of the proximity of the $\tilde{\gamma}$ Fermi surface sheet to a Van Hove singularity and $\gamma_{xz,yz}<1/3$ due to quasi 1D nature of the $\{\alpha,\beta\}$ surfaces [@ogu95; @sin95]. Following Burlachov [@bur85] for the solution of upper critical field $H_{c_2}^{ab}$ for the field in the basal plane, the vector potential is taken to be ${\bf A}=Hz(\sin\theta,-\cos\theta,0)$ ($\theta$ is the angle the applied magnetic field makes with the $\hat{x}$ direction). After setting the component of ${\bf D}$ along the field to be zero it is found that $H_{c_2}^{ab}(\theta)=\kappa/(\kappa_5\lambda(\theta)/2)^{1/2}$ where $\lambda(\theta)=1+\gamma-[(1-\gamma)^2-(1+\gamma)(1-3\gamma) \sin^2 2\theta ]^{1/2}$. A measurement of the temperature independent four-fold anisotropy in $H_{c_2}^{ab}$ thus determines $\gamma$. To determine the field at which the second transition discussed above occurs consider the magnetic field along the $\hat{x}$ direction. The free energy of Eq. \[eq1\] is then similar to that studied in UPt$_3$ [@gar94; @joy91; @luk95] and since Sr$_2$RuO$_4$ is a strong type II superconductor with a GL parameter of 31 for the field in the basal plane [@yos96] the procedure of Garg and Chen [@gar94] to study the second transition can be applied here. At $H_{c_2}^{ab}$ $\eta_1$ orders and and the vortex lattice solution is given by [@luk95; @gar94; @joy91] $$\eta_1=\sum_nc_ne^{i nqz}e^{-(\kappa_5/\gamma)^{1/2}\kappa H[y-qn/(\kappa H)]^2/2} \label{eqeta1}.$$ where $c_n=e^{in^2\pi/2}$ and $q$ has the two possible values $q_1^2=\sqrt{3}H\kappa \pi (\gamma/\kappa_5)^{1/2}$ or $q_2^2=H\kappa \pi (\gamma/\kappa_5)^{1/2}/\sqrt{3}$ (these two solutions are degenerate in energy). At the second transition the $\eta_2$ component becomes non-zero. As is discussed in Refs. [@gar94; @joy91] the solution for $\eta_2$ corresponds to a lattice that is displaced relative to that of $\eta_1$ by ${\bf d}=(\bar{y},\bar{z})$. Accordingly, the field at which the second transition occurs is found by substituting $$\eta_2=ir\sum_nc_ne^{i(nq+\kappa H \bar{y})(z-\bar{z})}e^{- \sqrt{\kappa_5}\kappa H[y-\bar{y}-qn/(\kappa H)^2]/2}$$ and Eq. \[eqeta1\] into the free energy, minimizing with respect to the displacement vector ${\bf d}$, and determining when the coefficient of $r^2$ becomes zero. This yields for the ratio of the second transition ($H_2$) to the upper critical field $$\frac{H_2}{H_{c_2}^{ab}}=\gamma^{1/2}\frac{\beta_A-\gamma(2S_1-|S_2|) _{min}} {\beta_A-\gamma^{3/2}(2S_1-|S_2|)_{min}}\label{eq4}$$ where $\beta_A=1.1596$, $S_1=\overline{|\eta_1|^2|\eta_2|^2}/ (\overline{|\eta_1|^2}\hphantom{a}\overline{|\eta_2|^2})$, $S_2=\overline{(\eta_1\eta_2^*)^2}/(\overline{|\eta_1|^2} \hphantom{a}\overline{|\eta_2|^2})$, the over-bar denotes a spatial average, and the subscript $min$ means take the minimum value with respect to ${\bf d}$ and with respect to $q=q_1$ or $q=q_2$. The numerical solution of Eq. \[eq4\] is shown in Fig. \[fig1\]. Three vortex lattice configurations are found to be stable as a function of $\gamma$ (depicted in Fig. \[fig1\]). For $0<\gamma<0.187$ $q=q_2$ and ${\bf d}=(T_y,T_z)/4$ ($T_y$ and $T_z$ are the translation vectors of the centered rectangular cell for the $\eta_1$ lattice), for $0.187<\gamma<0.433$ $q=q_1$ and ${\bf d}=(T_y,T_z)/4$, and for $0.433<\gamma<1$ $q=q_2$ and ${\bf d}=0$. For the field along $\hat{x}\pm\hat{y}$ the ratio $H_2/H_{c_2}$ is given by Eq. \[eq4\] with $\gamma$ replaced by $(1-\gamma)/(1+3\gamma)$. As a consequence the form of the vortex lattice will depend on the field direction. As has been discussed in detail in Ref. [@joy97] the shape of the vortex lattice unit cell for $H<H_2$ will be strongly field dependent. 0.1 cm Consider the magnetic field oriented along the $c$-axis. Setting $D_z=0$ writing $\Pi_+=\kappa(iD_x+D_y)/(2H)$, $\Pi_-=\kappa(iD_x-D_y)/(2H)$, $\eta_+=(\eta_x+i\eta_y)/\sqrt{2}$, and $\eta_-=(\eta_x-i\eta_y)/\sqrt{2}$, minimizing the quadratic portion of Eq. \[eq1\] with respect to $\eta_+$ and $\eta_-$ yields $$2\kappa \pmatrix{\eta_+\cr \eta_-}=H\pmatrix{(1+\gamma)(1+2N) &(1+\gamma)\Pi_+^2+(1-3\gamma)\Pi_-^2\cr (1+\gamma)\Pi_-^2+(1-3\gamma)\Pi_+^2& (1+\gamma)(1+2N)}\pmatrix{\eta_+\cr \eta_-}\label{eq5}.$$ where $N=\Pi_+\Pi_-$. The maximum value of $H$ that allows a non-zero solution for $(\eta_+,\eta_-)$ yields the upper critical field $H_{c_2}^c$. For $\gamma\ne 1/3$ $H_{c_2}^c$ must be found numerically (note that for $\gamma=1/3$ the solution can be found analytically [@zhi89; @sig91]). Expanding $(\eta_+,\eta_-)$ in terms of the eigenstates of $N$ (Landau levels) up to $N=32$ and diagonalizing the resulting matrix yields the result for $H_{c_2}^c(\gamma)$ shown in Fig. \[fig2\]. The solution for the form of the vortex lattice represents a complex problem due to presence of many Landau levels in the solution of $(\eta_+,\eta_-)$ and the weak type II nature of Sr$_2$RuO$_4$ for the field along the $c$ axis (Ref. [@yos96] indicates $\kappa\approx 1.2$). Here I present results that are strictly valid in the large $\kappa$ limit and leave the treatment for general $\kappa$ to a later publication (a perturbative calculation indicates that the qualitative results are unchanged for $\kappa=1.2$) [@agt98]. The form of the eigenstate of the $H_{c_2}^c$ solution is found to be $\eta_+({\bf r})=\sum_{n\ge 0} a_{4n+2} \phi_{4n+2}({\bf r})$ and $\eta_-({\bf r})=\sum_{n\ge 0} a_{4n} \phi_{4n}({\bf r})$ where $\phi_n({\bf r})= \sum_m c_me^{iqm\tilde{y}}2^{-n/2}H_n(\tilde{x}-qm/(\kappa H))e^{-\kappa H(\tilde{x}-qm/(\kappa H))^2/2}/(n!)^{1/2}$ where the coefficients $a_n$ are real, $(\tilde{x},\tilde{y})$ is the vector $(x,y)$ rotated by an angle $\tilde{\theta}$ about the $z$ axis and $H_n(x)$ represent Hermite polynomials. In the large $\kappa$ limit the form of the vortex lattice is found by minimizing $\beta=\overline{f_4} /(\overline{|\eta|^2})^2$ ($f_4$ is the quartic part of Eq. \[eq1\]) with respect to the coefficients $c_n$, $q$, and $\tilde{\theta}$. It is assumed that $c_n=c_{n+2}$. This restricts the vortex lattice structures to be centered rectangular with a short axis $L_y=2\pi/q$ and a long axis $L_x=2q/(\kappa H)$. The ratio $t=L_x/L_y$ is $\sqrt{3}$ for a hexagonal vortex lattice and is 1 for a square vortex lattice. I further restrict the analysis to the two orientations $\tilde{\theta}=\{0,\pi/4\}$ since these correspond to aligning one of the vortex lattice axes with one of the high symmetry directions in the basal plane. Remarkably, the treatment of the many Landau levels in the solution of $\eta_+$ and $\eta_-$ becomes numerically straightforward when $\beta$ is expressed as a sum over the reciprocal lattice given by ${\bf l}=\hat{x}l_12\pi/L_x+\hat{y}l_22\pi/L_y$ [@agt98] (see also Ref. [@fra96]). It is found that $\beta$ is minimized for $c_n=e^{in^2\pi/2}$ and that the values of $t$ and $\tilde{\theta}$ depend upon $\gamma$. For $\gamma\le 1/3$ ($\gamma\ge 1/3$) $\tilde{\theta}=0$ ($\tilde{\theta}=\pi/4$) and $t$ varies continuously from $\sqrt{3}$ to 1 as $\gamma$ decreases (increases) from $1/3$ to $1/3-0.0050$ ($1/3+0.0050$). For $\gamma<1/3-0.0050$ and $\gamma>1/3+0.0050$ the minimum $\beta$ corresponds to $t=1$. This implies that for $\gamma_{xz,yz}$ a square vortex lattice rotated $\pi/4$ about the $c$ axis from the crystal lattice is expected and for $\gamma_{xy}$ a square vortex lattice that is aligned with the underlying crystal lattice is expected near $H_{c_2}^c$. Note the appearance of the square vortex lattice correlates with an anisotropy in $H_{c_2}^{ab}$ of $|1-H_{c_2}^{ab}(\theta=0)/H_{c_2}^{ab}(\theta=\pi/4)|>0.01$. 0.1 cm The recent observation of a square vortex lattice in Sr$_2$RuO$_4$ [@for98] makes it of interest to compare the above behavior to that expected for the 1D REPS of $D_{4h}$. It is well known that for single component order parameters non-local corrections to the standard GL theory stabilize a square vortex lattice [@tak71; @aff96; @dew97]. In particular the the following non-local term will stabilize the square lattice $$\epsilon [|(D_x^2-D_y^2)\psi|^2-|(D_xD_y+D_yD_x)\psi|^2].$$ Treating this term as a perturbation to the GL free energy leads to $\psi=\phi_0-\tilde{\epsilon}\phi_4$ where $\tilde{\epsilon}=\sqrt{6}\epsilon H/\kappa$ ($\kappa$ is the GL parameter) near $H_{c_2}^c$. As $\tilde{\epsilon}$ increases (note $\tilde{\epsilon}=0$ at $T_c$) the vortex lattice continuously distorts from hexagonal to square [@tak71; @aff96; @dew97] until the square vortex lattice is stable for $|\tilde{\epsilon}|>0.024$. The sign of $\epsilon$ determines the orientation of the vortex lattice; for $\epsilon>0$ the vortex lattice is aligned with the underlying lattice while for $\epsilon<0$ the lattice is rotated $\pi/4$ with respect to the underlying crystal lattice [@tak71; @dew97]. The sign of $\epsilon$ has been determined within a weak coupling clean limit approximation for the 1D odd-parity REPS. For the $A_{1u}$ REP using $\hat{\Delta}=\psi(\hat{x}v_x/\sqrt{\langle v_x^2 \rangle}+\hat{y}v_y/\sqrt{\langle v_x^2 \rangle})\cdot \vec{\sigma} i\sigma_y$ the sign of $\epsilon$ is determined by the sign of $3\langle(v_x^2+v_y^2)v_x^2v_y^2\rangle/\langle(v_x^2+v_y^2)v_x^4\rangle-1$. Using a form for $\hat{\Delta}$ that is analogous to that used for the $A_{1u}$ REP, the same result is found for all the 1D odd-parity REPS. This implies that the final orientation of the square vortex lattice for the $1D$ REPS is the same as that found for the $2D$ REP for superconducting order in the $xy$ or the $\{xz,yz\}$ orbitals. The behavior of the vortex lattice for the 1D REPS as a function of $\tilde{\epsilon}$ is very similar to that for the 2D REP as a function of $\gamma$. An observable difference between the 2D and the 1D REPS is that for the 2D REP the vortex lattice remains square up to $T_c$ while for the 1D REPS the vortex lattice is hexagonal at $T_c$. Also, the GL theories for the 1D and the 2D REPS predict a four-fold anisotropy in $H_{c_2}^{ab}$ but this anisotropy vanishes at $T_c$ for the 1D REPS and does not vanish at $T_c$ for the 2D REP. In conclusion I have examined GL models for the odd-parity REPS of the superconducting state for Sr$_2$RuO$_4$. It was found that if the zero-field ground state breaks ${\cal T}$ symmetry (the 2D REP) then there should exist a second transition in the mixed state when the magnetic field is applied along a high symmetry direction in the basal plane. It was also shown that when the field is along the $c$-axis there will be a square vortex lattice for all the possible odd parity superconducting states. I acknowledge support from the Natural Sciences and Engineering Research Council of Canada and the Zentrum for Theoretische Physik. I wish to thank E.M. Forgan, G.M. Luke, A. Mackenzie, Y. Maeno, T.M. Rice, and M. Sigrist for useful discussions. Y. Maeno, H. Hashimoto, K.Yoshida,S.Nishizaki, T. Fujita, J.G. Bednorz, and F. Lichtenberg, Nature [**372**]{}, 532 (1994). A.P Mackenzie, S.R. Julian, A.J. Diver, G.G. Lonzarich, Y. Maeno, S.Nishizaki, and T. Fujita, Phys. Rev. Lett. [**76**]{}, 3786 (1996). K. Ishida, Y.Kitaoka, K. Asayama, S.Ikeda, and T. Fujita, Phys. Rev. B [**56**]{}, 505 (1997). A.P. Mackenzie, R.K.W. Haselwimmer, A.W. Tyler, G.G Lonzarich, Y. Mori, S. Nishizaki, and Y. Maeno, Phys. Rev. Lett. [**80**]{}, 161 (1998). R. Jin, Yu. Zadorozhny, Y. Liu, Y. Mori, Y. Maeno, D.G. Schlom, and F. Lichtenberg, J. Chem. Phys. of Solids, in press. T.M. Rice and M. Sigrist, J. Phys.: Condens. Matter [**7**]{}, L643 (1995). G.M. Luke, Y. Fudamoto, K.M. Kojima, M.I. Larkin, B. Nachumi, Y.J. Uemura, Y. Maeno, Z. Mao, Y. Mori, and H. Nakamura, to be published. M. Sigrist and K. Ueda, Rev. Mod. Phys. [**63**]{}, 239 (1991). D.F. Agterberg, T.M. Rice, and M. Sigrist, Phys. Rev. Lett. [**78**]{},3374 (1997). I.A. Luk’yanchuk and M.E. Zhitomirsky, Supercond. Rev. [**1**]{}, 207 (1995). K. Yoshida, Y. Maeno, S. Nishizaki, and T. Fujita, J. Phys. Soc. Jpn. [**65**]{}, 2220 (1996). J.X. Zhu, C.S. Ting, J.L. Shen, and Z.D. Wang, Phys. Rev. B [**56**]{}, 14 093 (1997). T. Oguchi, Phys. Rev. B [**51**]{}, 1385 (1995). D.J. Singh, Phys. Rev. B [**52**]{}, 1358 (1995). I.I. Mazin and D.J. Singh, Phys. Rev. Lett. [**79**]{}, 733 (1997). D.F. Agterberg, in preparation. L.I. Burlachkov, Sov. Phys. JEPT [**62**]{}, 800 (1985). A. Garg and D.C. Chen, Phys. Rev. B [**49**]{}, 479 (1994). R. Joynt, Europhys. Lett. [**16**]{}, 289 (1991). R. Joynt, Phys. Rev. Lett. [**78**]{}, 3185 (1997). M.E. Zhitomirskii, JEPT Lett. [**49**]{}, 378 (1989). M. Franz, C. Kallin, P.I. Soininen, A.J. Berlinsky, and A.L. Fetter, Phys. Rev. B [**53**]{}, 5795 (1996). E.M. Forgan, [*et. al.*]{}, to be published. K. Takanaka, Prog. Theor. Phys. [**46**]{}, 1301 (1971). I. Affleck, M. Franz, and M.H.S. Amin, Phys. Rev. B [**55**]{}, R704 (1996). Y. De Wilde, M. Iavarone, U. Welp, V. Metlushko, A.E. Koshelev, I. Aranson, G.W. Crabtree, and P.C. Canfield, Phys. Rev. Lett. [**78**]{}, 4273 (1997). | Mid | [
0.6282722513089001,
30,
17.75
]
|
On the neuropathology of schizophrenia and its dementia: neurodevelopmental, neurodegenerative, or both? The neuropathology of schizophrenia has begun to emerge following renewed investigation in the past 20 years. However, there remain inconsistencies in the data and their interpretation. In particular, although the brains of schizophrenics have been reported to show an excess of neurodegenerative changes, especially astrocytic gliosis and Alzheimer's disease, it is unclear whether these features are an intrinsic part of the neuropathology of schizophrenia. Nor is it apparent how they relate to the symptoms of dementia which afflict a proportion of schizophrenics. This review focuses upon these questions. Two main conclusions are drawn. Firstly, the neuropathological features of schizophrenia together support a neurodevelopmental pathogenesis wherein the aforementioned degenerative changes are either epiphenomenal, artefactual, or are limited to a subgroup of cases which are otherwise indistinguishable clinically or pathologically. Secondly, the dementia of schizophrenia is not attributable to Alzheimer's disease nor to any other recognized neuropathological substrate. | High | [
0.678237650200267,
31.75,
15.0625
]
|
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.