text
stringlengths
8
5.74M
label
stringclasses
3 values
educational_prob
listlengths
3
3
--- author: kapnobatai136 category: feature type: normal links: - '[Built-In Apps](https://zapier.com/apps/categories/zapier-tools){website}' --- # Built-In Options --- ## Content Zapier provides built-in options for the most used integrations, common actions and for actions that can't be found in any other apps (e.g. delay). Out of the most popular options, you can distinguish: - Email - you can send emails without having an account for any provider - SMS - you can send sms without having an account for any provider - Delay - you can set timer for when your action should happen - Formatter - transform the data you receive (e.g. take a string and convert it to lowercase) - Schedule - same as delay, but the input is a specified interval (e.g. every week) There are many other [built-in options](https://zapier.com/apps/categories/zapier-tools), and you can usually find them by searching for `Zapier`. --- ## Practice Which of these **is not** a built-in app? ??? - Google Sheets - Email - SMS - Schedule --- ## Revision Which of these **is** a built-in app? ??? - Email - Slack - Twitter - Gmail
Mid
[ 0.553299492385786, 27.25, 22 ]
5(&200(1'(' )25 )8//7(;7 38%/,&$7,21 3XUVXDQW WR 6L[WK &LUFXLW 5XOH  (/(&7521,& &,7$7,21  )(' $SS 3 WK &LU )LOH 1DPH DS 81,7('67$7(6&28572)$33($/6 )257+(6,;7+&,5&8,7 BBBBBBBBBBBBBBBBB /28,6 7 %$8(5 ; 3ODLQWLII$SSHOODQW    1R Y  !  %(77< ' 0217*20(5<  'HIHQGDQW$SSHOOHH  1 $SSHDOIURPWKH8QLWHG6WDWHV'LVWULFW&RXUW IRUWKH1RUWKHUQ'LVWULFWRI2KLRDW7ROHGR 1Rn'DYLG$.DW]'LVWULFWsXGJH $UJXHG6HSWHPEHU 'HFLGHGDQG)LOHGsXQH %HIRUH%$7&+(/'(5DQG*,/0$1&LUFXLWsXGJHV +22''LVWULFWsXGJH BBBBBBBBBBBBBBBBB &2816(/ $5*8('  : 'DYLG $UQROG 1$7+$1  52%(576 7ROHGR2KLRIRU$SSHOODQWsDFN:'HFNHU2)),&(2) 7+( $77251(< *(1(5$/ (03/2<0(17 /$: 7KH +RQRUDEOH 'HQLVH 3DJH +RRG 8QLWHG 6WDWHV 'LVWULFW sXGJH IRU WKH (DVWHUQ 'LVWULFW RI 0LFKLJDQ VLWWLQJ E\ GHVLJQDWLRQ   %DXHUY0RQWJRPHU\ 1R 6(&7,21&ROXPEXV2KLRIRU$SSHOOHH21%5,(): 'DYLG$UQROG1$7+$1 52%(5767ROHGR2KLRIRU $SSHOODQWsDFN:'HFNHU2)),&(2)7+($77251(< *(1(5$/(03/2<0(17/$:6(&7,21&ROXPEXV 2KLRIRU$SSHOOHH +22''sGHOLYHUHGWKHRSLQLRQRIWKHFRXUWLQZKLFK *,/0$1 s MRLQHG  %$7&+(/'(5 s SS   GHOLYHUHGDVHSDUDWHGLVVHQWLQJRSLQLRQ BBBBBBBBBBBBBBBBB 23,1,21 BBBBBBBBBBBBBBBBB '(1,6(3$*(+22''LVWULFWsXGJH2Q0D\ /RXLV 7 %DXHU ILOHG WKH LQVWDQW VXLW DJDLQVW %HWW\ ' 0RQWJRPHU\WKH2KLR$WWRUQH\*HQHUDOFODLPLQJ WKDW 0RQWJRPHU\YLRODWHG%DXHUjVULJKWWRIUHHGRPRIVSHHFKDQG DVVRFLDWLRQXQGHUWKH)LUVWDQG)RXUWHHQWK$PHQGPHQWVWRWKH 8QLWHG6WDWHV&RQVWLWXWLRQDVVHFXUHGE\86&†  WKDW0RQWJRPHU\YLRODWHG3ODLQWLIIjVOLEHUW\LQWHUHVWDULVLQJ XQGHU WKH )RXUWHHQWK $PHQGPHQW RI WKH 8QLWHG 6WDWHV VHFXUHG E\  86& †  DQG   WKDW 0RQWJRPHU\ YLRODWHG%DXHUjVULJKWWRIUHHGRPRIVSHHFKDQGDVVRFLDWLRQ XQGHU$UWLFOH††DQGRIWKH2KLR&RQVWLWXWLRQ ,Q  /RXLV 7 %DXHU ZDV DQ H[HFXWLYH DVVLVWDQW WR 8QLWHG6WDWHV6HQDWRUsRKQ*OHQQD'HPRFUDWLQFKDUJHRI WKH6HQDWRUjV7ROHGR2IILFH6HQDWRU*OHQQFORVHGKLV7ROHGR 2IILFHLQsDQXDU\DQG%DXHUORVWKLVMRE6HQDWRU*OHQQ PDGH LQTXLULHV RQ %DXHUjV EHKDOI DQG %DXHU ZDV ODWHU FRQWDFWHG E\ .HYLQ .HUQV &KLHI RI WKH &ULPH 9LFWLPV 6HFWLRQRIWKH$WWRUQH\*HQHUDOjV2IILFH%DXHUZDVKLUHGDV DILHOGLQYHVWLJDWRU)URP$SULOWRsXQH /RXLV 7 %DXHU ZDV HPSOR\HG DV D &ULPH 9LFWLPV &ODLP ,QYHVWLJDWRUIRUWKH6WDWHRI2KLRjV$WWRUQH\*HQHUDOjV2IILFH %DXHU LV D UHJLVWHUHG 'HPRFUDW  )URP  WR  D 'HPRFUDWKHOGWKHSRVLWLRQRI$WWRUQH\*HQHUDOLQ2KLR,Q 1RYHPEHU  %HWW\ ' 0RQWJRPHU\ ZDV HOHFWHG DV WKH $WWRUQH\ *HQHUDO  6KH LV D 5HSXEOLFDQ  0RQWJRPHU\ 1R %DXHUY0RQWJRPHU\  UHSODFHG%DXHUZLWKsHUU\(YHUVPDQ(YHUVPDQKDGVHUYHG DVDsXYHQLOH3UREDWLRQ2IILFHUIRUILYHDQGRQHKDOI\HDUV LPPHGLDWHO\EHIRUHEHFRPLQJDILHOGLQYHVWLJDWRU(YHUVPDQ LVDOVRWKH&KLHIRI3ROLFHIRUWKH9LOODJHRI+DVNLQV2KLR $WDFDVHPDQDJHPHQWFRQIHUHQFHRQ2FWREHUWKH GLVWULFW FRXUW ELIXUFDWHG SUHWULDO EULHILQJ RQ WKH LVVXHV RI TXDOLILHGLPPXQLW\DQGWKHPHULWVRI%DXHUjVFODLPV  7KH RQO\LVVXHEHIRUHWKHGLVWULFWFRXUWZDV0RQWJRPHU\jVPRWLRQ IRUVXPPDU\MXGJPHQWEDVHGRQTXDOLILHGLPPXQLW\2QsXO\   WKH GLVWULFW FRXUW LVVXHG DQ RSLQLRQ DQG RUGHU JUDQWLQJ0RQWJRPHU\j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jVRUGHUDQGMXGJPHQWLV5(9(56(' ,s85,6',&7,21 sXULVGLFWLRQLVSURSHUXQGHU86&†EHFDXVHWKH &RPSODLQWDOOHJHVDFODLPXQGHU86&†$SSHOODWH MXULVGLFWLRQLVDSSURSULDWHXQGHU86&†EHFDXVH %DXHUDSSHDOVIURPDILQDOMXGJPHQWHQWHUHGE\WKHGLVWULFW FRXUW%DXHUWLPHO\ILOHGDQRWLFHRIDSSHDO  %DXHUY0RQWJRPHU\ 1R 1R %DXHUY0RQWJRPHU\  ,,$1$/<6,6 HQKDQFHGFDSDFLW\ZLWKUHVSHFWWR0RQWJRPHU\7KXVZKLOH WKHVHZLWQHVVHVjOLPLWHGWHVWLPRQ\LVSHUKDSVLQVWUXFWLYHRQ $ 6WDQGDUGRI5HYLHZ WKHLVVXHRIWKHVFRSHRI0U(YHUVPDQjVFXUUHQWGXWLHVLWLV QRW FRQFOXVLYH  0RUHRYHU EHFDXVH WKHLU WHVWLPRQ\ LV %DXHU FODLPV WKDW WKH GLVWULFW FRXUW HUUHG LQ HQWHULQJ UHFRQFLODEOH ZLWK WKH WHVWLPRQ\ RI 0RQWJRPHU\ DQG VXPPDU\ MXGJPHQW LQ IDYRU RI 0RQWJRPHU\  $ GLVWULFW (YHUVPDQ LW GRHV QRW FUHDWH D JHQXLQH GLVSXWHG LVVXH RI FRXUWjVJUDQWRIVXPPDU\MXGJPHQWLVVXEMHFWWRDGHQRYR PDWHULDOIDFW UHYLHZE\WKHDSSHOODWHFRXUW((2&Y8QLYHUVLW\RI'HWURLW  )G   WK &LU   (DWRQ Y 0RQWJRPHU\ )LQDOO\EHFDXVH,DJUHHZLWKWKHGLVWULFWFRXUWjVFRQFOXVLRQ &RXQW\)G WK&LU  WKDW0U%DXHUjVGXHSURFHVVFODLPZDVGHSHQGHQWXSRQKLV )LUVW $PHQGPHQW FODLP , ZRXOG DOVR DIILUP WKH GLVWULFW 5XOH  F  SURYLGHV WKDW VXPPDU\ MXGJPHQW VKRXOG EH FRXUWjV GLVPLVVDO RI &RXQW ,, RI 0U %DXHUjV FRPSODLQW HQWHUHGRQO\ZKHUHWKHSOHDGLQJVGHSRVLWLRQVDQVZHUVWRWKH 7KHUHIRUH IRU WKH UHDVRQV GHVFULEHG DERYH , UHVSHFWIXOO\ LQWHUURJDWRULHV DQG DGPLVVLRQV RQ ILOH WRJHWKHU ZLWK GLVVHQWIURPWKHPDMRULW\jVRSLQLRQ DIILGDYLWVLIDQ\VKRZWKDWWKHUHLVQRJHQXLQHLVVXHDVWRDQ\ PDWHULDO IDFW DQG WKDW WKH PRYLQJ SDUW\ LV HQWLWOHG WR D MXGJPHQW DV D PDWWHU RI ODZ  )HG5&LY3  F   7KH SUHVHQFH RI IDFWXDO GLVSXWHV ZLOO SUHFOXGH JUDQWLQJ RI VXPPDU\ MXGJPHQW RQO\ LI WKH GLVSXWHV DUH JHQXLQH DQG FRQFHUQPDWHULDOIDFWV$QGHUVRQY/LEHUW\/REE\,QF 86      $ GLVSXWH DERXW D PDWHULDO IDFW LV JHQXLQHRQO\LIWKHHYLGHQFHLVVXFKWKDWDUHDVRQDEOHMXU\ FRXOG UHWXUQ D YHUGLFW IRU WKH QRQPRYLQJ SDUW\  ,G $OWKRXJKWKH&RXUWPXVWYLHZWKHPRWLRQLQWKHOLJKWPRVW IDYRUDEOHWRWKHQRQPRYLQJSDUW\ZKHUHWKHPRYLQJSDUW\ KDVFDUULHGLWVEXUGHQXQGHU5XOH F LWVRSSRQHQWPXVWGR PRUHWKDQVLPSO\VKRZWKDWWKHUHLVVRPHPHWDSK\VLFDOGRXEW DVWRWKHPDWHULDOIDFWV0DWVXVKLWD(OHFWULF,QGXVWULDO&R Y =HQLWK 5DGLR &RUS  86     &HORWH[ &RUS Y &DWUHWW  86      6XPPDU\ MXGJPHQWPXVWEHHQWHUHGDJDLQVWDSDUW\ZKRIDLOVWRPDNHD VKRZLQJVXIILFLHQWWRHVWDEOLVKWKHH[LVWHQFHRIDQHOHPHQW HVVHQWLDOWRWKDWSDUW\ VFDVHDQGRQZKLFKWKDWSDUW\ZLOOEHDU WKHEXUGHQRISURRIDWWULDO,QVXFKDVLWXDWLRQWKHUHFDQEH QRJHQXLQHLVVXHDVWRDQ\PDWHULDOIDFWVLQFHDFRPSOHWH IDLOXUH RI SURRI FRQFHUQLQJ DQ HVVHQWLDO HOHPHQW RI WKH QRQPRYLQJ SDUW\ V FDVH QHFHVVDULO\ UHQGHUV DOO RWKHU IDFWV LPPDWHULDO&HORWH[&RUS86DW$FRXUWPXVW ORRN WR WKH VXEVWDQWLYH ODZ WR LGHQWLI\ ZKLFK IDFWV DUH PDWHULDO$QGHUVRQ86DW  %DXHUY0RQWJRPHU\ 1R 1R %DXHUY0RQWJRPHU\  ZKHWKHU WKH MRE GXWLHV RI VXFK D SRVLWLRQ DUH SROLWLFDO ZH % 3ROLWLFDO3DWURQDJH'LVPLVVDOV PXVWDQDO\]HWKHSRVLWLRQLQOLJKWRIWKHMREGHVFULSWLRQDVWKH MRELVHQYLVLRQHGE\WKHQHZDSSRLQWLQJDXWKRULW\6HH6PLWK 7KH6XSUHPH&RXUWLQDWULORJ\RIFDVHVKDVGHWHUPLQHG Y6XVKND)G WK&LU  m7KHWZRWHVWV WKDW ZLWK OLPLWHG H[FHSWLRQV WKH *RYHUQPHQW FDQQRW RXWOLQHGLQ)DXJKHQGHUµWKHMREDVDFWXDOO\SHUIRUPHGjDQG FRQGLWLRQ SXEOLF HPSOR\PHQW RQ WKH EDVLV RI SROLWLFDO µWKH MRE DV HQYLVLRQHGj DUH QRW FRPSOHWHO\ VHSDUDWH DQG DIILOLDWLRQ(OURGY%XUQV86  %UDQWLY LQGHSHQGHQW5DWKHULIRQHRUWKHRWKHUWHVWLVFOHDUO\DQG )LQNHO86  DQG5XWDQY5HSXEOLFDQ3DUW\ GLUHFWO\DSSOLFDEOHWKHRWKHULVQRWLQGHSHQGHQWO\QHFHVVDU\ RI,OOLQRLV86   DOWKRXJKLWPD\EHVRPHZKDWLQIRUPDWLYHl  FLWLQJ0F&ORXG Y7HVWD)G WK&LU  ,Q (OURG WKH 6XSUHPH &RXUW KHOG WKDW mWKH SUDFWLFH RI SDWURQDJH GLVPLVVDOV FOHDUO\ LQIULQJHV )LUVW $PHQGPHQW 7KH7ROHGR&9&,SRVLWLRQLVDQmXQFODVVLILHGlSRVLWLRQ LQWHUHVWVl86DW7KH6XSUHPH&RXUWQRWHGWKDW +RZHYHUFRQWUDU\WRRXULQVWUXFWLRQLQ0F&ORXGWKHPDMRULW\ H[FHSWLRQVH[LVWXQGHUDSSURSULDWHFLUFXPVWDQFHV3DWURQDJH WDNHVDQDUURZYLHZRIWKHHYLGHQFHDQGFRQFOXGHVWKDW0U GLVPLVVDOVDUHSHUPLWWHGZKHQWKHSRVLWLRQVLQYROYHSROLF\ (YHUVPDQjVGXWLHVDUHQRQSROLWLFDO$VWKHPDMRULW\RSLQLRQ PDNLQJ UROHV  ,G DW   ,Q GHWHUPLQLQJ ZKHWKHU DQ DFNQRZOHGJHV $WWRUQH\ *HQHUDO 0RQWJRPHU\ DUJXHV WKDW HPSOR\HHRFFXSLHVDSROLF\PDNLQJSRVLWLRQWKHIRFXVVKRXOG (YHUVPDQLVKHUmH\HVDQGHDUVlLQWKHFRPPXQLW\DQGKHU EH ZKHWKHU WKH HPSOR\HH DFWV DV DQ DGYLVRU RU IRUPXODWHV mDOWHUHJRlDWWKHUHJLRQDOOHYHO0RQWJRPHU\jVYLVLRQRIWKH SODQV IRU WKH LPSOHPHQWDWLRQ RI EURDG JRDOV  ,G  7KH UROHRIWKH7ROHGR&9&,LVREYLRXVO\SROLWLFDO2YHUDOOWKH 6XSUHPH&RXUWLQ%UDQWLUHDIILUPHGWKH(OURGKROGLQJWKDWDQ GXWLHV RI WKH 7ROHGR &9&,  ERWK DV HQYLVLRQHG E\ LQGLYLGXDOHPSOR\HHjV)LUVW$PHQGPHQWULJKWVPXVW\LHOGWR 0RQWJRPHU\DQGDVDFWXDOO\LPSOHPHQWHGE\(YHUVPDQDQG WKH*RYHUQPHQWjVLQWHUHVWRQO\ZKHQWKHHPSOR\HHjVSROLWLFDO 0RQWJRPHU\  HVWDEOLVK WKDW WKH 7ROHGR &9&, SRVLWLRQ DIILOLDWLRQ mZRXOG LQWHUIHUH ZLWK WKH GLVFKDUJH RI SXEOLF LQYROYHVWKHFRPPXQLFDWLRQRIFRQILGHQWLDOLQIRUPDWLRQWR GXWLHVl%UDQWL86DW$SXEOLFHPSOR\HUPXVW RQHZLWKSROLF\PDNLQJDXWKRULW\7KXV,ZRXOGILQGWKDWWKH GHPRQVWUDWHWKDWDFHUWDLQSROLWLFDODIILOLDWLRQLVmHVVHQWLDOWR 7ROHGR&9&,SRVLWLRQLVVXIILFLHQWO\SROLWLFDOWRIDOOZLWKLQ WKHGLVFKDUJHRIWKHHPSOR\HHjVJRYHUQPHQWUHVSRQVLELOLWLHVl &DWHJRU\7KUHHDQGLVWKXVDQH[FHSWLRQWRWKHUXOHODLGRXWLQ ,GDW,Q5XWDQWKH6XSUHPH&RXUWQDUURZHGWKHUDQJH %UDQWL RIMREVOHJLWLPDWHO\VXEMHFWWRSDWURQDJHUHPRYDOZKHQLWKHOG WKDWD*RYHUQPHQWjVLQWHUHVWLQVHFXULQJHPSOR\HHVZKRZLOO 7KHPDMRULW\RSLQLRQUHOLHVXSRQWKHWHVWLPRQ\RIsHII)U\H EH OR\DO LQ WKH LPSOHPHQWDWLRQ RI LWV SROLFLHV FDQ EH DQG %LOO 'LQDQ %DXHUjV GLUHFW VXSHUYLVRU DQG (YHUVPDQjV DGHTXDWHO\VHUYHGE\FKRRVLQJRUGLVPLVVLQJRQO\mKLJKOHYHO FXUUHQW VXSHUYLVRU UHVSHFWLYHO\ DV WKH EDVLV IRU ILQGLQJ D HPSOR\HHVlRQWKHEDVLVRISROLWLFDOYLHZV5XWDQ86 GLVSXWHGLVVXHRIPDWHULDOIDFWWKDWZRXOGSUHFOXGHVXPPDU\ DW MXGJPHQW+RZHYHUWKHWHVWLPRQ\RI)U\HDQG'LQDQIRFXVHV JHQHUDOO\RQWKHUROHRIWKH&9&,VWDWHZLGHDVRSSRVHGWRWKH 7KHGLVWULFWFRXUWIRXQGWKDWWKH%UDQWLH[FHSWLRQDSSOLHGWR VSHFLILFIXQFWLRQRIWKH&9&,LQWKH7ROGHRDUHD0RUHRYHU WKHLQVWDQWFDVH$SSO\LQJWKH%UDQWLH[FHSWLRQWRDJLYHQ WKH\WHVWLILHGZLWKUHJDUGWRWKHUHVSRQVLELOLWLHVLQKHUHQWLQ HPSOR\PHQWSRVLWLRQWKHGLVWULFWFRXUWPXVWH[DPLQHERWKWKH (YHUVPDQjVSRVLWLRQDVLWUHODWHVWR)U\HDQG'LQDQRQO\DQG LQKHUHQW GXWLHV RI WKH SRVLWLRQ DQG WKH GXWLHV WKDW WKH QHZ QRW ZLWK UHJDUG WR KLV GXWLHV UHODWLQJ WR $WWRUQH\ *HQHUDO KROGHURIWKHSRVLWLRQZLOOSHUIRUP)DXJKHQGHUY&LW\RI 0RQWJRPHU\7KHUHLVQRHYLGHQFHWKDWHLWKHU)U\HRU'LQDQ 1RUWK2OPVWHG)G WK&LU :KHQ ZRXOG KDYH DQ\ NQRZOHGJH RU DZDUHQHVV RI (YHUVPDQjV ORRNLQJ DW WKH QDWXUH RI WKH SRVLWLRQ DQG WKH GXWLHV WR EH  %DXHUY0RQWJRPHU\ 1R 1R %DXHUY0RQWJRPHU\  SHUIRUPHGWKHFRXUWPXVWORRNDWWKHSRVLWLRQDVHQYLVLRQHG BBBBBBBBBBBBBBBBB E\WKHQHZO\HOHFWHGRIILFLDODQGDVSHUIRUPHGE\WKH QHZ HPSOR\HH UDWKHU WKDQ WKH WDVNV WKDW KDG SUHYLRXVO\ EHHQ ',66(17 SHUIRUPHG E\ WKH SODLQWLII EHFDXVH WKH RIILFLDO PXVW EH BBBBBBBBBBBBBBBBB SHUPLWWHGWRUHRUJDQL]HWKHVWDII,GDW7KH6L[WK &LUFXLW KDV LGHQWLILHG IRXU FDWHJRULHV RI SRVLWLRQV ZKLFK $/,&(0%$7&+(/'(5&LUFXLWsXGJHGLVVHQWLQJ, SUHVXPSWLYHO\IDOOLQWRWKH%UDQWLH[FHSWLRQ ZULWHVHSDUDWHO\EHFDXVH,EHOLHYHWKDWWKHSRVLWLRQRI&ULPH 9LFWLPV&ODLPV,QYHVWLJDWRU m&9&,l LQ7ROHGRLVRQHWKDW &DWHJRU\2QHSRVLWLRQVVSHFLILFDOO\QDPHGLQUHOHYDQW IDOOV ZLWKLQ WKH %UDQWL H[FHSWLRQ DQG EHFDXVH , EHOLHYH IHGHUDO VWDWH FRXQW\ RU PXQLFLSDO ODZ WR ZKLFK 0U%DXHUKDVSUHVHQWHGQRJHQXLQHLVVXHVRIPDWHULDOIDFW GLVFUHWLRQDU\DXWKRULW\ZLWKUHVSHFWWRWKHHQIRUFHPHQWRI WKDWZRXOGSUHFOXGHVXPPDU\MXGJPHQWLQWKLVFDVH,ZRXOG WKDW ODZ RU WKH FDUU\LQJ RXW RI VRPH RWKHU SROLF\ RI WKHUHIRUHDIILUPWKHGLVWULFWFRXUWjVRSLQLRQ SROLWLFDOFRQFHUQLVJUDQWHG $VWKHPDMRULW\RSLQLRQULJKWO\VHWVIRUWKWKLV&LUFXLWKDV &DWHJRU\7ZRSRVLWLRQVWRZKLFKDVLJQLILFDQWSRUWLRQ LGHQWLILHGIRXUFDWHJRULHVRISRVLWLRQVZKLFKSUHVXPSWLYHO\ RIWKHWRWDOGLVFUHWLRQDU\DXWKRULW\DYDLODEOHWRFDWHJRU\ IDOOLQWRWKH%UDQWLH[FHSWLRQ6HH0F&ORXGY7HVWD)G RQHSRVLWLRQKROGHUVKDVEHHQGHOHJDWHGRUSRVLWLRQVQRW  WK&LU 7KHGLVWULFWFRXUWIRXQGWKDWWKH QDPHGLQODZSRVVHVVLQJE\YLUWXHRIWKHMXULVGLFWLRQjV 7ROHGR&9&,SRVLWLRQILWLQWR&DWHJRU\7KUHHDQG,DJUHH SDWWHUQ RU SUDFWLFH WKH VDPH TXDQWXP RU W\SH RI ZLWKWKLVFRQFOXVLRQIRUWKHIROORZLQJUHDVRQV GLVFUHWLRQDU\DXWKRULW\FRPPRQO\KHOGE\FDWHJRU\RQH SRVLWLRQVLQRWKHUMXULVGLFWLRQV $FFRUGLQJWR(YHUVPDQKHSURYLGHVLQIRUPDWLRQWRSROLFH FKLHIVUHJDUGLQJVHUYLFHVFRQIHUHQFHVDQGWUDLQLQJRIIHUHGE\ &DWHJRU\ 7KUHH  FRQILGHQWLDO DGYLVRUV ZKR VSHQG D WKH $WWRUQH\ *HQHUDOjV RIILFH KH UHFHLYHV IHHGEDFN RQ VLJQLILFDQW SRUWLRQ RI WKHLU WLPH RQ WKH MRE DGYLVLQJ $WWRUQH\ *HQHUDO SURJUDPV KH QHWZRUNV WR mHQKDQFH WKH FDWHJRU\RQHRUFDWHJRU\WZRSRVLWLRQKROGHUVRQKRZWR OHYHORIWUXVWFRRSHUDWLRQDQGFRPPXQLFDWLRQEHWZHHQORFDO H[HUFLVH WKHLU VWDWXWRU\ RU GHOHJDWHG SROLF\PDNLQJ ODZHQIRUFHPHQWlDQGWKH$WWRUQH\*HQHUDOjVRIILFHDQGKH DXWKRULW\RURWKHUFRQILGHQWLDOHPSOR\HHVZKRFRQWURO VSHDNVDWWKHORFDOXQLYHUVLW\DQGKLJKVFKRRO7KHVHGXWLHV WKHOLQHVRIFRPPXQLFDWLRQVWRFDWHJRU\RQHSRVLWLRQV GHPRQVWUDWHKLVSROLWLFDOUROHDVDQDGYLVRUDQGUHSUHVHQWDWLYH FDWHJRU\WZRSRVLWLRQVRUFRQILGHQWLDODGYLVRUV RIWKH$WWRUQH\*HQHUDOWRWKHODZHQIRUFHPHQWFRPPXQLW\LQ WKH7ROHGRDUHD &DWHJRU\)RXUSRVLWLRQVWKDWDUHSDUWRIDJURXSRI SRVLWLRQV ILOOHG E\ EDODQFLQJ RXW SROLWLFDO SDUW\ :HKDYHKHOGWKDWWKH%UDQWLH[FHSWLRQmLVWREHFRQVWUXHG UHSUHVHQWDWLRQ RU WKDW DUH ILOOHG E\ EDODQFLQJ RXW EURDGO\VRDVSUHVXPSWLYHO\WRHQFRPSDVVSRVLWLRQVSODFHG VHOHFWLRQV PDGH E\ GLIIHUHQW JRYHUQPHQWDO DJHQWV RU E\ WKH OHJLVODWXUH RXWVLGH RI WKH µPHULWj FLYLO VHUYLFHl ERGLHV 0F&ORXG)GDW$FFRUGLQJO\HYHQmLIWKHUHLVDQ\ DPELJXLW\DERXWZKHWKHUDSDUWLFXODUSRVLWLRQIDOOVLQWRDQ\RI 0F&ORXGY7HVWD)G WK&LU  WKH>WKHFDWHJRULHV@ DQGVRDOVRZLWKLQWKH%UDQWLH[FHSWLRQ  LWLVWREHFRQVWUXHGLQIDYRURIWKHJRYHUQPHQWDOGHIHQGDQWV 7KHGLVWULFWFRXUWEHORZIRXQGWKDWWKHILHOGLQYHVWLJDWRU ZKHQWKHSRVLWLRQDWLVVXHLVXQFODVVLILHGRUQRQPHULWXQGHU SRVLWLRQILWLQWR&DWHJRU\7KUHH7KHGLVWULFWFRXUWUHOLHGRQ VWDWH ODZ   l  ,G DW   )XUWKHU ZKHQ FRQVLGHULQJ 0RQWJRPHU\jVYLVLRQRIWKHILHOGLQYHVWLJDWRUjVSRVLWLRQDV  %DXHUY0RQWJRPHU\ 1R 1R %DXHUY0RQWJRPHU\  5(0$1'('IRUIXUWKHUSURFHHGLQJVQRWLQFRQVLVWHQWZLWK SHUIRUPHGE\(YHUVPDQ7KHSRVLWLRQZDVWRLQFOXGHDPRUH WKLVRSLQLRQ DFWLYH UROH LQ VXSSRUWLQJ FULPLQDO ODZ HQIRUFHPHQW E\ SURYLGLQJPRUHH[WHQVLYHVHUYLFHVWRORFDOODZHQIRUFHPHQW DJHQFLHV  7KH GLVWULFW FRXUW IRXQG WKDW (YHUVPDQ DWWHQGV PRUH PRQWKO\ PHHWLQJV RI WKH UHJLRQDO FRQVRUWLXP RI QRUWKZHVWHUQ2KLRSROLFHDJHQFLHVDFWVDVDOLDLVRQEHWZHHQ ORFDO SROLFH DJHQFLHV DQG WKH $WWRUQH\ *HQHUDOjV RIILFH GLVWULEXWHVLQIRUPDWLRQWRYLFWLPZLWQHVVSURJUDPVOHFWXUHV WR ORFDO KLJK VFKRRO DQG XQLYHUVLW\ FODVVHV DQG JDWKHUV IHHGEDFN IRU LPSURYLQJ WKH FULPH YLFWLPVj SURJUDP  7KH GLVWULFW FRXUW UHOLHG RQ 0RQWJRPHU\jV DUJXPHQWV WKDW (YHUVPDQ LV GLUHFWO\ LQYROYHG LQ WKH LPSOHPHQWDWLRQ RI SROLFLHV WKDW ZHUH SDUW RI KHU FDPSDLJQ SODWIRUP DQG WKDW SROLWLFDO OR\DOW\ IURP WKH LQGLYLGXDO LPSOHPHQWLQJ WKRVH SROLFLHVLVQHFHVVDU\WRHIIHFWXDWHWKRVHSROLFHV0RQWJRPHU\ DOVR DUJXHV WKDW (YHUVPDQ LV KHU mH\HV DQG HDUVl LQ WKH FRPPXQLW\ FROOHFWLQJ IHHGEDFN IURP WKH FRPPXQLW\ DQG H[FKDQJLQJLQIRUPDWLRQDQGSURPRWLQJDZDUHQHVVRIFULPH YLFWLPVjLVVXHV0RQWJRPHU\FODLPVWKDW(YHUVPDQDFWVDV KHU mDOWHU HJRl DW WKH UHJLRQDO OHYHO EHFDXVH KH SURYLGHV LQIRUPDWLRQWRWKHSXEOLFDERXWWKH$WWRUQH\*HQHUDOjVFULPH YLFWLPVj SURJUDP  0RQWJRPHU\ DVVHUWV WKDW HYHQ LI WKH LQKHUHQW JHQHUDO GXWLHV RI (YHUVPDQjV SRVLWLRQ DUH QRW SROLWLFDO(YHUVPDQjVMREWDVNVDVHQYLVLRQHGE\0RQWJRPHU\ DUHSROLWLFDO 7KHUHLVQRGLVSXWHWKDWWKHmLQKHUHQWGXWLHVlRIWKHILHOG LQYHVWLJDWRUSRVLWLRQDUHQRQSROLWLFDO6RPHRIWKH GXWLHV LQFOXGHG LQ WKH SRVLWLRQ GHVFULSWLRQ DUH WR SHUIRUP EDFNJURXQG LQYHVWLJDWLRQV RI UHSDUDWLRQV DSSOLFDWLRQV RI FULPLQDOO\ LQMXULRXV FRQGXFW WR FRUUHVSRQG ZLWK ODZ HQIRUFHPHQWRIILFLDOVLQWHUYLHZFODLPDQWVPDLQWDLQUHFRUGV RILQYHVWLJDWLRQVDQGILOHWLPHO\UHSRUWV,QWKLVUHJDUG%DXHU KDVPHWWKHILUVWSURQJRIWKH)DXJKHQGHUWHVW $VWRWKHVHFRQGSURQJnWKHGXWLHVRIWKHQHZKROGHURIWKH SRVLWLRQnWKH GLVWULFW FRXUW HUUHG LQ IDLOLQJ WR ILQG WKDW JHQXLQHLVVXHVRIPDWHULDOIDFWH[LVWHGUHJDUGLQJWKHGXWLHV DFWXDOO\ SHUIRUPHG E\ (YHUVPDQ  $OWKRXJK 0RQWJRPHU\ WHVWLILHGWRKHUmYLVLRQlRIZKDWWKHSRVLWLRQVKRXOGHQWDLO  %DXHUY0RQWJRPHU\ 1R 1R %DXHUY0RQWJRPHU\  WKHUH LV WHVWLPRQ\ IURP RIILFLDOV  LQWLPDWHO\ IDPLOLDU ZLWK & /LEHUW\,QWHUHVW (YHUVPDQjVZRUNWKDWKLVMREIXQFWLRQVDUHQRGLIIHUHQWWKDQ WKRVHSHUIRUPHGE\%DXHUsHII)U\HWKHVWDWHZLGHVXSHUYLVRU &RXQW ,, RI %DXHUjV &RPSODLQW DOOHJHV WKDW KLV OLEHUW\ RI WKH ILHOG LQYHVWLJDWRUV DQG %LOO 'LQDQ %DXHUjV GLUHFW LQWHUHVWKDVEHHQYLRODWHG7KHUHLVQRGLVSXWHWKDW3ODLQWLII VXSHUYLVRUDQG(YHUVPDQj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mOLEHUW\lDQGmSURSHUW\lDVFRH[LVWHQWKXPDQULJKWV)LUVW IDFWVDVWRZKHWKHUWKHQHZHPSOR\HHLVSHUIRUPLQJGLIIHUHQW $PHQGPHQWIUHHGRPVRIVSHHFKDQGDVVRFLDWLRQDUHZLWKLQ MREIXQFWLRQVWKDQWKRVHSHUIRUPHGE\%DXHU WKHWHUPmOLEHUW\lDVSURWHFWHGE\WKHGXHSURFHVVFODXVHRI WKH)RXUWHHQWK$PHQGPHQW*LWORZY1HZ<RUN86 $VWR0RQWJRPHU\jVDUJXPHQWWKDW(YHUVPDQLVKHUmH\HV   1HZ<RUNH[UHO%U\DQWY=LPPHUPDQ86 DQGHDUVlLQWKHFRPPXQLW\DVGHILQHGLQ&DWHJRU\7KUHHLQ   +XJKHVY6XSHULRU&RXUWRI&DOLIRUQLD86 0F&ORXG WKH GLVWULFW FRXUW GRHV QRW FLWH DQ\ HYLGHQFH   DQG1$$&3Y$ODEDPD86   VKRZLQJ WKDW WKH ILHOG LQYHVWLJDWRU SURYLGHV mFRQILGHQWLDO DGYLFHlWRDQ\RQH$WKHUGHSRVLWLRQ0RQWJRPHU\WHVWLILHG 7KHGLVWULFWFRXUWJUDQWHGVXPPDU\MXGJPHQWLQIDYRURI WKDWVKHFRXOGEDUHO\UHPHPEHUZKHQVKHKDGODVWVSRNHQWR 0RQWJRPHU\ RQ %DXHUjV OLEHUW\ LQWHUHVW FODLP EHFDXVH LW (YHUVPDQDERXWSROLWLFDOPDWWHUV0RQWJRPHU\SURYLGHVQR IRXQGWKDW%DXHUIDLOHGWRHVWDEOLVKD)LUVW$PHQGPHQWFODLP HYLGHQFHWKDW(YHUVPDQFRQWUROVWKHOLQHVRIFRPPXQLFDWLRQ )RUWKHUHDVRQVVHWIRUWKDERYHWKHGLVWULFWFRXUWHUUHGLQLWV WR 0RQWJRPHU\  ,Q 0F&ORXG WKH WZR H[DPSOHV XVHG WR ILQGLQJV%DXHUKDVVWDWHGD)LUVW$PHQGPHQWFODLPDQGKDV LOOXPLQDWH WKH FRQFHSW RI FRQWUROOLQJ WKH OLQHV RI HVWDEOLVKHGVXIILFLHQWIDFWVWRSUHFOXGHVXPPDU\MXGJPHQWRQ FRPPXQLFDWLRQ ZHUH D MXGJHjV VHFUHWDU\ RU D ODZ FOHUN KLV )LUVW $PHQGPHQW FODLP  7KH GLVWULFW FRXUW LPSURSHUO\ (YHUVPDQjVSRVLWLRQGRHVQRWDSSHDUWREHDNLQWRWKRVHWZR JUDQWHGVXPPDU\MXGJPHQWRQ%DXHUjVOLEHUW\LQWHUHVWFODLP SRVLWLRQV ' 4XDOLILHG,PPXQLW\ %DVHG RQ WKH UHFRUG EHORZ WKH GLVWULFW FRXUW HUUHG LQ ILQGLQJWKDW%DXHUmKDVQRWVWDWHGDFODLPIRUWKHYLRODWLRQRI $OWHUQDWLYHO\ 0RQWJRPHU\ FODLPV WKDW VKH LV HQWLWOHG WR DFRQVWLWXWLRQDOULJKWEDVHGRQDSDWURQDJHGLVPLVVDOIURPWKDW TXDOLILHGLPPXQLW\%HFDXVHWKHGLVWULFWFRXUWGLGQRWUHDFK SRVLWLRQl 2UGHUs$ %DXHUjV&RPSODLQWGRHVVWDWHD WKLVLVVXHWKLV&RXUWFDQQRWFRQVLGHUWKHTXDOLILHGLPPXQLW\ FODLP IRU WKH YLRODWLRQ RI D FRQVWLWXWLRQDO ULJKW EDVHG RQ D GHIHQVH7KHGLVWULFWFRXUWPD\DGGUHVVWKLVLVVXHRQUHPDQG SDWURQDJHGLVPLVVDOFODLPDQG%DXHUKDVSUHVHQWHGVXIILFLHQW IDFWVVKRZLQJWKDWWKHUHDUHJHQXLQHLVVXHVRIPDWHULDOIDFWWR ,,,&21&/86,21 SUHFOXGHVXPPDU\MXGJPHQW )RUWKHUHDVRQVVWDWHGDERYHWKHGLVWULFWFRXUWjVRUGHUDQG MXGJPHQW JUDQWLQJ VXPPDU\ MXGJPHQW LQ IDYRU RI 0RQWJRPHU\DQGDJDLQVW%DXHULV5(9(56('DQGWKHFDVH
Low
[ 0.5074309978768571, 29.875, 29 ]
Confidential information is stored, transmitted, and used by many computer systems. Therefore, techniques have been developed to provide for the secure handling and storing of confidential information. These techniques include various approaches to creating and maintaining a secured, protected, or isolated container, partition, or execution environment within a computer system. Such computer systems may include one or more processors to execute one or more applications within such a container, along with one or more fixed-function endpoints to which confidential information may be desired to be transferred.
Mid
[ 0.646586345381526, 40.25, 22 ]
Year in, year out, NFL players switch positions whether it's due to schematic changes or development into a different role. Mike Neal, for example, has been losing weight and is moving into more of an 3-4 outside linebacker role for the Packers at around 280, after playing his first three seasons in the mid-290's as a 3-4 defensive end. In college, though, most of the position transitions locked onto by the media's eyes, and fans' eyes, are quarterbacks moving to receiver, such as Hines Ward, Anquan Boldin, and Peter Warrick. There are four 2014 NFL Draft prospects who went through significant positions changes while in college, and the spotlight needs to be shined on them. Only one of the four went from quarterback to receiver, but he didn't stay there for long. Bryce Quigley, LT, San Diego State Coming out of high school, Bryce Quigley was a pass catching tight-end, and he even lead his junior squad in receptions, yards, and touchdowns. His first year at San Diego State, Quigley, then a tight-end, was the only true freshman to record a start with the Aztecs, with two. Quigley's sophomore year, he started ten games out of a thirteen game season at tight-end. Unlike high school, Quigley was being used more as a blocking tight-end than a pass-catcher. To put in in perspective, Quigley started more games than Gavin Escobar (2013 second round pick), who broke his hand mid-way through 2011, at tight-end, but Quigley only caught 9 passes, while Escobar caught 51. With Escobar emerging as a pass-catching threat, Quigley moved to left-tackle, earning honorable mention all-Mountain West his first year on the offensive line. At 6'5” 295, Quigley has the body to make it to the NFL-level. A tight-end to tackle move can result in a professional career: Reid Fragel, a former Ohio State tight-end, played his senior year on the offensive-line before being taken by the Bengals in the 2013 NFL Draft. Marquis Flowers, Sam LB, Arizona Unlike Quigley, Flowers stepped onto a college campus as a former highly touted recruit. Marquis Flowers was named to several All-American teams before landing in Tuscon, Arizona. His first two years with the team, Flowers was a defensive-back, participating in 24 games over that period and starting nine games his sophomore year. When Arizona's new coaching staff showed up to town, he moved to Sam and started 13 games. His 13 tackles for loss lead the team, and his 3 interceptions were more than he had starting as a defensive-back. At 6'3” 229, his body isn't much different than Alec Ogletree's (30th overall pick in 2013), who played strong-safety, before also moving to outside-linebacker. Devin Gardner, QB, Michigan Devin Gardner is looked as the current version of Ryan Tannehill, and for good reason. Like Tannehill, Gardner was trying to crack the lineup as a quarterback to start his college career. After seeing little playing time there, he switched to wide-receiver, again, like Tannehill, before moving back to quarterback. The 6'4” 210, mobile quarterback still needs time to grow into his potential, but is one of the top junior quarterbacks in the game, and many expect him to be the second junior quarterback to come off the board, behind Teddy Bridgewater, if he chooses to declare. Anthony Barr, OLB, UCLA Anthony Barr, one of the biggest defensive names in the country, was playing running-back up until 2012. Although very raw, Barr's been able to flash a lot of potential as a pass-rusher, many ranking him behind only South Carolina's Jadeveon Clowney as far as pass-rushers eligible for the 2014 NFL Draft. Like Julius Peppers, Barr was a two-way star in high school, but took a little longer than Peppers to decide he was going to be a college pass-rusher, instead of a running-back. At 6'4” 245, Barr is much smaller than Peppers's 6'7” 283 combine measurements, but will likely be a high draft pick, as well.
Mid
[ 0.6425702811244981, 40, 22.25 ]
Simulators like this were the closest astronauts got to flying the MOL. (credit: USAF) Doomed from the start: The Manned Orbiting Laboratory and the search for a military role for astronauts Last week marked the 50th anniversary of the cancellation of the Manned Orbiting Laboratory program. MOL was to be equipped with a powerful and top-secret reconnaissance camera system known as DORIAN. But the program kept slipping in schedule and increasing in cost until, finally, it proved unaffordable for a Nixon administration fighting a costly war in Southeast Asia and trying to fund other major space programs. MOL was facing many challenges, including an identity crisis—what was it supposed to do and why did that matter?—and increasing criticism within the intelligence community. Ever since the beginning of the space age, governments have labored to justify sending humans into space. Surprisingly, in early 1964, only a few months after MOL started, a military official whose name is unknown wrote an incredibly prescient memo to his bosses where he predicted that the MOL project was misguided, would come under outside criticism, and would eventually be canceled, all of which proved true. He also made the case that the greatest asset a human in space provided was their brain, and that operating a reconnaissance camera was better left to the robots. But like Cassandra, who was blessed with the ability to see the future and cursed to have nobody believe her, this officer in the reconnaissance program was apparently ignored. Five years later, MOL was canceled for most of the reasons he cited. Whether that officer felt vindicated or just exasperated, we do not know. The role of man in space, and MOL Ever since the beginning of the space age, governments have labored to justify sending humans into space. The earliest justification was simple: international competition during the Cold War. The United States needed to put astronauts in space because the Soviets were putting cosmonauts in space. Those accomplishments served as symbolic indicators of military and technological capability. Soon after these early efforts, American military leaders began to look for practical reasons to put military astronauts in space. The early military human spaceflight program had been given to NASA in 1958, and the Dyna Soar program that the Air Force pursued starting in the late 1950s was canceled at the end of 1963 due to expense and lack of a clear mission. When Dyna Soar was canceled, military officials believed that they had finally come up with a mission for military astronauts to perform in space: operating a powerful reconnaissance camera. This was a highly classified mission, so they sought to shroud it in a cover story, that the astronauts would perform experiments aboard a Manned Orbiting Laboratory (MOL)—after all, who could object to a “laboratory” in orbit? But rather remarkably, the laboratory was not a cover story, but a reflection of the ambiguous ideas that military and intelligence officials had about the role of military astronauts. Not everybody agreed on what military astronauts should and could do in space. Some thought that military astronauts should perform clearly-defined tasks, whereas others believed that their role was to figure out what military astronauts could actually do and excel at in space. “These insights are not reassuring; indeed, they supply convincing evidence that the MOL, as presently conceived, will never get off the ground.” MOL was to be developed by the National Reconnaissance Office’s West Coast office, which was publicly known as the Secretary of the Air Force Special Projects Office (SAFSP), based in Los Angeles. SAFSP was also secretly designated as the NRO’s “Program A.” Soon after MOL was approved for initial development, people at SAFSP wrote a lengthy draft memo—essentially a report—that outlined the purposes of the program. That memo was to be sent to Secretary of Defense Robert McNamara in Washington. If that draft memo still exists, it has not been declassified by the NRO. But before the long memo was sent to McNamara, an Air Force officer within the Los Angeles program office wrote his three-page assessment of it. The shorter memo was stamped “Top Secret” and titled “Notes on Draft Memorandum, ‘MOL Experiments,’” dated February 10, 1964. The author referred to the plan for a “Military Orbiting Laboratory”—either the writer made a mistake, or at least early in the program people were using “Military” instead of “Manned” to describe the program. According to the anonymous author, the draft plan provided insights into the current level of development of the MOL concept. “These insights are not reassuring; indeed, they supply convincing evidence that the MOL, as presently conceived, will never get off the ground. The comments which follow outline the reasons for this conclusion.” The author’s first objection was that “The Plan is Mission-Ridden.” He explained that “‘Operational Mission’ and ‘military laboratory’ are incompatible terms: the operational always drives out the research and development. Is the MOL a laboratory? Or is it an operational reconnaissance spacecraft? (Or a bomber?) If it is a laboratory, it must be planned as a laboratory and act as one. It cannot have operational assignments in ‘primary mission areas of … reconnaissance and surveillance.’” “It cannot be categorized as capable of ‘many experiments which are not described yet which could …be accomplished when it is feasible to do so without degrading prime experiments.’” With a whiff of sarcasm, the author added that “A laboratory cannot be founded on a document which devotes 17 pages to the design of an operational reconnaissance system and 4 pages to ‘General Experiments.’ A laboratory is concerned with the acquisition of technical data; its experiments do not require operational ‘scenarios.’” “The Plan Degraded the Role of the Astronaut/Scientist,” he wrote. “Gross emphasis is placed on man’s manipulative skill. Man becomes a pointer, not a thinker. He aligns and focuses; he handles yaw problems; he aims; he adjusts for image motion; he processes film. All of these tasks can be done better by machines and most of them can be automated. I see nothing about man as a judge, an integrator, a selector, or a scientist/engineer.” “The Plan Proposes a Competition Which MOL Cannot Win. It is clear that machines will do everything that this plan proposes for MOL long before – and better than – MOL can do it. Is the competition resolution? MOL will lose. Is it selectivity? Again, MOL loses. Is it cost? Is it coverage? Response time? Repetition rate? No contest. MOL, as a Manned Reconnaissance Satellite, will be cancelled – either now, or as soon as any ‘outside’ group reviews it.” He added that “the Plan Asperses the Very Experiments Which Could Sustain It.” For instance, the plan negated bioastronautics, or the study of the human body’s adaptation to spaceflight. The plan also proposed one military mission that remains sensitive to this day and was deleted when the document was declassified in 2015. Based upon other MOL documents with similar deletions, that mission was probably either photographing other satellites in orbit, or destroying them. “The Plan Invites and Assures the Hostility of the US Intelligence Board, the Foreign Intelligence Advisory Board, and the Special Group. No scenario is required to illustrate this point. The reaction will be swift and incisive.” What we do know is that his prediction was incredibly prescient: MOL got axed, and for exactly the reasons he foresaw in early 1964. But it took over five years and many hundreds of millions of dollars before it happened. The writer also objected to the organizational and security arrangements in the plan, which he claimed violated existing regulations. Although he did not clearly explain his objections, apparently the draft plan put the Director of the NRO in a secondary position with the Air Force in charge, but a DoD Directive made clear that any national reconnaissance program had to be led by the NRO Director, not the Air Force. “I am well aware of the apprehension that the DoD cannot ‘sell’ a bona fide laboratory. I believe a bona fide military laboratory can be ‘sold,’ ” he wrote, underlining it for emphasis. “A wide variety of sensors and experiments belong in such a laboratory, along with a wide range of other things. No one is working on those ‘other things.’ ” The author ended with a rather devastating closing, referencing the Dyna Soar program that was canceled only a few months earlier after failing to justify its increasing costs. “We’d better start soon. The MOL can be salvaged, but it will take hard work. The hard work must start now, based on a totally new concept . Otherwise, we just finished planning DYNASOAR II.” Although available records do not indicate if the MOL plan was substantially revised following the author’s warning memo, the MOL itself continued to be an operational reconnaissance system with few experiments. Various experiments originally planned for MOL, such as the Astronaut Maneuvering Unit, were pushed off MOL and either canceled completely or transferred to NASA. The role of the MOL astronauts did become that of “a pointer, not a thinker,” as the author warned. “He aligns and focuses; he handles yaw problems; he aims; he adjusts for image motion; he processes film.” And just as he added, “All of these tasks can be done better by machines and most of them can be automated,” he proved correct about that as well—one of the recommendations of an outside review group was to create an automated version of MOL, which undercut the need for astronauts even further (see “The measure of a man: Evaluating the role of astronauts in the Manned Orbiting Laboratory program,” The Space Review, March 19, 2018, Part 2, and Part 3.) In 1966, 1967 and 1968, MOL’s schedule slipped and its cost increased (see “Blue suits and red ink: Budget overruns and schedule slips in the Manned Orbiting Laboratory program,” The Space Review, November 2, 2015.) And as the author of the memo noted, MOL started to come under increasing scrutiny by groups outside of the program. Although details are scarce and records have not been declassified, there is some evidence indicating that at least one outside review of MOL in the 1967–68 timeframe criticized its effectiveness from a technical standpoint. And as the memo author also noted, robotic reconnaissance systems were soon able to perform MOL’s job. They may not have been as good as MOL by 1969, but they were close, and it was clear that they would soon be better. In June 1969, MOL was canceled. So who was this memo author? Michael Cassutt, who has written about the history of American astronauts, has long been interested in the organization and personalities in SAFSP. Cassutt thinks that the memo could have been written by one of three junior officers in SAFSP: Frank Buzard, Jack Martin, and Paul Worthman. All three were deeply involved in West Coast NRO projects, and all three had reputations for being skeptical about extravagant claims made about space hardware. Buzard had been working in this area since before the first launch of a CORONA reconnaissance satellite in 1959 (see “Sharp as a tack,” The Space Review, February 12, 2012). But without some corroborating data, it is impossible to know who the Cassandra was. What we do know is that his prediction was incredibly prescient: MOL got axed, and for exactly the reasons he foresaw in early 1964. But it took over five years and many hundreds of millions of dollars before it happened. Note: we are temporarily moderating all comments subcommitted to deal with a surge in spam. Home
Low
[ 0.488054607508532, 35.75, 37.5 ]
193 P.3d 61 (2008) 222 Or. App. 325 STATE of Oregon, Plaintiff-Respondent, v. Monte Shane SMITH, aka Shane Monte Smith, Defendant-Appellant. CFH050267; A133878. Court of Appeals of Oregon. Submitted August 1, 2008. Decided September 10, 2008. Peter Gartlan, Chief Defender, Legal Services Division, and Anne F. Munsey, Senior Deputy Public Defender, Office of Public Defense Services, filed the brief for appellant. Hardy Myers, Attorney General, Mary H. Williams, Solicitor General, and Karla H. Ferrall, Assistant Attorney General, filed the brief for respondent. Before HASELTON, Presiding Judge, and ARMSTRONG, Judge, and ROSENBLUM, Judge. PER CURIAM. Defendant appeals his conviction for possession of a controlled substance, former ORS 475.992(4) (2003), renumbered as ORS 475.840(3) (2005), arguing that the trial court erred in admitting into evidence a laboratory report pursuant to ORS 475.235 identifying as methamphetamine a substance found during a search of defendant. In this case, the laboratory report was the only evidence admitted at trial concerning the nature of the substance. The state concedes that defendant is entitled to a reversal in light of the holding of State v. Birchfield, 342 Or. 624, 157 P.3d 216 (2007). We agree and accept the state's concession. Reversed and remanded.
High
[ 0.7097661623108661, 32.25, 13.1875 ]
Monthly Archives: January 2011 The plan? Kevin and I ride to Pescadero/San Gregorio/Tunitas and back. The usual coastal run. The weather? We knew it was going to be questionable at best, but we’re strong enough, we’re stupid enough, and we’ve got the gear for it. We got going around 9:50am (fairly early for us!) and headed out into a light drizzle, nothing nasty, just enough to make it not much fun. Almost nobody else out on the road; we saw 3 people on Canada, and not a single cyclist heading up or down Old LaHonda! A rare day indeed. We weren’t burning up the pavement on the climb, but we weren’t slacking either, just a good, steady climb, knowing we had a long ride ahead of us. About 2/3rds of the way up Kevin’s dropped back a bit, and I look back on the last steep corner and he’s heading to the edge of the road and getting off his bike. Unfortunately I know where this is going; he’s had a bit of warning that a seizure is coming on, and the ones where he gets the warnings are the ones that tend to be a bit bigger. This was no exception; he was tensed up for about two minutes before coming out of it. We got back on and continued up the hill, delayed by no more than 5 minutes, but as the rain got heavier & the temps got colder, Kevin had lost his enthusiasm for the Pescadero Bakery so we scaled things back, heading down west-side Old LaHonda but then back up to Skyline and north all the way to 92 and back Canada. Even though significantly shortened (37 miles instead of 58), it still wasn’t easy, with the rain getting pretty heavy up on Skyline, soaking through our gloves, and the temperature holding steady at 45. At one point Kevin said, in a way that could have been mistaken for sarcasm, “This is what we do for fun.” But it wasn’t sarcastic; in our own warped minds, it was fun! What is a 1K? It’s the highest “earned” level on status on United Airlines. It’s not the highest level overall; nothing like the character in “Up in the Air” played by George Clooney. For that, the qualifications aren’t published but it’s obvious you’ve got to be buying a lot of full-fare business & first-class tickets. At United, that status is known as “GS.” The coveted United 1K card, something I will likely see only once in my life, at least one with my name on it. For most people, it means they fly too much and spend too much time away from home and too much money on mediocre motels and too much time in security lines. What you get in exchange for all that is the opportunity to board a plane earlier than everyone else (why this is a big thrill I don’t know; people rationalize that they need to get on the plane before the overhead space is filled up), a reasonable chance to get free upgrades into a first class seat when flying domestically and just enough chance to get an upgrade on an international flight that you spend more $$$ than you have to so you can get a qualifying fare, cross your fingers, and discover that you’re #3 on an upgrade list of 40 people (looks good!) but only #1 & #2 made it. You’re also better taken care of when things go wrong, whether due to a mechanical issue or weather. In 2009, I accidentally flew too much. It wasn’t planned, it just happened. A number of trips back to Trek, the usual trip to DC for the Bike Summit, France in July for the Tour de France, and the biggie… a 15,000 mile round trip to Australia (Karen, my wife, really wanted to hold a Koala Bear. So we’ve got a $6000 picture of her holding a Koala Bear in the living room). Now, it normally takes 100,000 miles to get 1K status, and that’s 100,000 “BIS” (or, Butt in Seat) miles, not credit-card miles, not miles flying on award tickets. But in 2009, the airlines were in the toilet, and United offered something called “DEQM”, or Double Elite Qualifying Miles, where you got credited for two miles for each mile flown in the last quarter of the year, which coincided with the trip to Australia. That put me within 12,000 miles, so a very creative routing for a trip to DC put me over the top (5 flight segments in one direction!). Continue reading It was fun while it lasted (1K “elite” status on United Airlines)→
Low
[ 0.518358531317494, 30, 27.875 ]
DALLAS — Smaller escort websites are vying for the lucrative online sex-for-hire market Backpage.com dominated before U.S. authorities shut it down earlier this year, a move that fractured the industry and forced law enforcement to adapt their efforts combating sex trafficking. Online sex ads plunged in April following Backpage’s seizure and President Donald Trump’s signing of legislation aimed at websites that facilitate sex trafficking. But a new analysis finds the drop in the number of ads may have been short-lived. According to Pittsburgh-based software company Marinus Analytics, there were about 146,000 online sex ads posted per day in the U.S. on leading escort websites from mid-September to mid-October — and the company expects the total for this month to be even higher. In contrast, there were about 133,000 such ads posted on Backpage in the month before its shutdown, Marinus Analytics found. Instead of backing away amid the government crackdown on sex trafficking, some escort websites are doubling down on their business model and see the Backpage shutdown as an opportunity to expand, said Emily Kennedy, Marinus Analytics’ president and co-founder. “They’re really competing with each other for that spot now and so we’re seeing frequent activity at this point,” she said, adding that as long as the business remains lucrative, “people are going to figure out a way to advertise it.” It’s unknown if many of the escort websites looking to expand will eventually meet the same fate as Backpage. Despite the increase, some experts caution against correlating a rise in sex ads with an increase in sex trafficking. They say sex ads can be fake or duplicates from other websites and interest from sex buyers remains low compared to the Backpage era 7/8— a conclusion one expert tied to the lower number of responses garnered by fake sex ads posted on escort websites. RELATED • Indictment levels new charges against Backpage.com officials • ‘Nonsense!’ Backpage.com co-founder Lacey says of charges • Backpage.com made millions in prostitution ads: prosecutors As for counting double counting ads, Kennedy said the company has a process to determine if a website has high number of ads that are not legitimate. Those aren’t included in the tally, she said. Kennedy said the sex ads “implicitly or explicitly state the selling of sexual services,” often through coded language. To attract clients, experts say, escort websites want a large presence of sex ads to appear popular and robust. Sex workers and their advocates have criticized the seizure of Backpage, saying the shutdown removed a tool that workers used to screen clients. In Nevada, federal authorities have seen firsthand the impact of online sex ads in the post-Backpage market. When police found a 15-year-old girl at a Las Vegas motel in September, she was hundreds of miles from her Texas home and had been sold for sex in numerous online ads, according to federal court records. Later, talking with investigators, she reported having sex with about 40 clients and said she worked as a prostitute under the direction of a man who promised her safety, money and a place to live if she followed his rules. Law enforcement and victim advocates are quick to praise Backpage’s shutdown, but some say the platform was also a key tool in arresting sexual predators. With a scattered marketplace, law enforcement and others say those fighting sex trafficking must adapt. “Clearly, technology becomes more important than ever,” said Rob Spectre, CEO and founder of a company that uses artificial intelligence to prevent online sex trafficking. In the past, a rural law enforcement agency might take a family photo of a sex trafficking victim and comb through ads posted on Backpage, searching for a match. Now, he said, such an effort is going to be “very difficult.” Spectre said law enforcement must be a driving force behind the adoption of technologies such as Traffic Jam, software created by Marinus Analytics that collects online classifieds from top escort ad websites and allows law enforcement to search for specific information, such as a phone number. A facial recognition tool has also been used to rescue underage sex trafficking victims, according to Kennedy. “So it really, really cuts down on the time it takes to find these victims in a space where finding them quickly is so crucial,” she said. To Cook County Sheriff Tom Dart, law enforcement will have to throw out a wider net online to fight sex trafficking, such as putting lots of ads on various websites. He described the market as a “very chaotic mess,” but the goal with the shutdown of Backpage was to disrupt a website that was normalizing an activity that was destroying people’s lives. There are also concerns of where the market might go next. Margie Quin, an assistant professor at Cumberland University in Tennessee, said an escort website could start selling ads for the American market after setting up operations overseas in a country that does not work well with the U.S. Such a move could weaken the ability to extract evidence and prosecute a case, said Quin, a former assistant special agent in charge at the Tennessee Bureau of Investigation. “As long as demand is still around, the crime will still be committed,” she said.
Low
[ 0.507760532150776, 28.625, 27.75 ]
From GERD to Barrett's esophagus: is the pattern in Asia mirroring that in the West? Gastroesophageal reflux disease (GERD) is a known predisposing factor for Barrett's esophagus. Amongst individuals with symptomatic GERD, the prevalence of Barrett esophagus is estimated to be more than 10%, and an individual with Barrett's esophagus is more likely than the general population to develop esophageal adenocarcinoma. In Western Europe and North America, incidence of esophageal adenocarcinoma had been on the upward trend for many decades. In comparison, although the prevalence of GERD and reflux esophagitis has increased several fold in some parts of Asia, the prevalence of esophageal adenocarcinoma and Barrett's esophagus remains generally low in the region. Rising incidence of esophageal adenocarcinoma has been observed in regions witnessing increasing prevalence of GERD. If the recent increase in prevalence of GERD in parts of urbanized Asia is any indication of the beginning of an upsurge in the incidence of Barrett's esophagus and associated adenocarcinoma, would we be witnessing a pattern of epidemiological shift mirroring that in the West? Given that more than 90% of Barrett's esophagus in Asian patients is of the short-segment type, which is reported to have lesser propensity to develop to adenocarcinoma, could the ongoing epidemiologic transition take Asia on the same trail as that which the West has taken? This article will draw on relevant findings from various parts of Asia and take an in-depth look at prevailing disease trends to see where Asia stands now in the changing epidemiology of GERD, Barrett's esophagus and associated adenocarcinoma.
High
[ 0.6566523605150211, 38.25, 20 ]
SAN ANTONIO — Ask Gregg Popovich about Tim Duncan, and the San Antonio Spurs coach will espouse the merits of his beloved big man. Ask him to talk about himself — specifically Duncan's claim that, impossible though it might seem, his occasionally uncouth coach has grown even more fiery with age — and Popovich will deliver a wisecrack. "Timmy's a pain in the ass, and I'm tired of coaching him," he said this week. "Anybody else (have questions)? Good. Have a good day." Yet as the Spurs march in search of a fifth NBA title with their coach, holding a 2-0 lead against the Memphis Grizzlies in the Western Conference finals, the secret about Popovich's surliness is no more. The real Popovich is as cultured as he can be crass, as thoughtful as he can be short-tempered. The rough exterior isn't a ruse so much as a reflection of this Spurs environment he has built with owner Peter Holt and longtime general manager R.C. Buford. They decided long ago they would be all about the task at hand and selflessness, with a total lack of concern for outside perceptions. But slowly, some 17 years into this incredible run, with a better winning percentage than any other coach in the four major North American sports, the Popovich his players and associates have cherished for so long has emerged as never before. Spurs beat reporter Jeff McDonald of the San Antonio Express-News perfectly captured the one-of-a-kind experience of working with Popovich in a Sports Illustrated article last month. He told writer Jack McCallum, "There's a kind of Stockholm syndrome. You start to feel affection for your captor." But this is nothing new, this sentimentality that surrounds Popovich, who, believe it or not, does have a softer side. VIDEO: Sam Amick previews Spurs-Grizzlies Game 3 USA TODAY Sports' Sam Amick explains the pulse and story line of the Western Conference finals. Part-time Spurs advance scout Rick Duque has known a different Popovich than the rest of us since their days together as recruit and coach in the mid-1980s at Division III Pomona-Pitzer in Claremont, Calif. There was a bond built that remains to this day, a decade after Popovich's hard-wiring as a disciplinarian learned at the Air Force Academy, back when his foundation that has so much to do with the player-coach relationship was being formed. As is so often the case with Popovich, it all began with a shared love of wine and basketball. Duque's father, Henry, shared a passion for Popovich's favorite pastimes, so he and his wife, Judy, became instant friends with their son's new coach. Some 30 years later, Popovich still checks in with them. "When I graduated and (Popovich) left (for the NBA), he still continued to stay in touch with my mom and dad and with me as well," said Duque, who would only agree to be interviewed after receiving Popovich's permission. "He'll write handwritten notes to check in and see how they're doing and let them know how his life was. He still remembered who they were, even though he'd moved on to something bigger." Duque, who coaches the varsity boys and girls teams at Webb School in Claremont, Calif., when he's not scouting his typical 15 or 20 games a season for the Spurs, also was part of a historical event of sorts: the day Popovich didn't try to win. Popovich, a former assistant under Larry Brown at Kansas, got a non-conference game between Pomona-Pitzer and the eventual national champion Jayhawks in 1987. But it came with the condition that Popovich's overmatched team didn't take the David vs. Goliath approach. "The pregame talk (from Popovich) was about, 'Hey, guess what? We're going to lose, and we're going to have fun doing it,'" Duque recalled. "'And as far as (Kansas star) Danny Manning goes, if he's going for a dunk, no one tries to block it. If you have a chance to take a charge, you don't take a charge on him. We just let him go, because we want to get out of here.' " They lost by some 50 points. But losing, it's safe to say, wouldn't be part of Popovich's legacy for long. Game 3 in Memphis: Grizzlies vs. Spurs -- Marc Gasol (33) backs down Tiago Splitter during the first half. Despite a big game from Gasol, Memphis shot 39.2% from the field and 55.6% from the free-throw line. Spruce Derden, USA TODAY Sports Like this topic? You may also like these photo galleries: While Popovich will never sing his own praises, his record does: a .681 regular-season winning percentage, four titles, the NBA's longest tenure. Next longest: the Boston Celtics' Doc Rivers, at nine seasons. Over Popovich's 17 seasons, the other NBA clubs have averaged seven head coaches. "He's actually, I think, a little more fiery now, if you can believe that," Duncan tells USA TODAY Sports. "Obviously he's been doing this for a long time, and I don't think his passion has changed. That's tough for the period of time that he's done it. And as I said, I think he's even more fired up now and wants it even more than he did before." As Jerry West noted recently, the coaching tree that has sprouted from Popovich's success is as good an indication as any that he's rightfully revered. Among current NBA head coaches, the Cleveland Cavaliers' Mike Brown, the Orlando Magic's Jacque Vaughn, the New Orleans Pelicans' Monty Williams and Rivers played for Popovich. Popovich took over full-time as Spurs coach in 1997.(Photo: Kevin Geil, AP) The NBA's front offices are filled with executives with Spurs ties, too, among them the Oklahoma City Thunder's Sam Presti, the Atlanta Hawks' Danny Ferry, the Indiana Pacers' Kevin Pritchard, the Utah Jazz's Dennis Lindsey, the Magic's Rob Hennigan and the Pelicans' Dell Demps. "I've always been one of his biggest fans, tremendously impressed with his interaction with the players, how he's not afraid to get on his better players. There's incredible respect in watching him," West said. "There are three key elements that have been there. (The Spurs) brought in players that other people haven't thought have been that good and have been very, very good. They have people working with players that make them better. And a system. He's just a remarkable coach. You'd like to have a lot more coaches like him." Six years after stopping a young LeBron James and his Cavaliers in the NBA Finals and winning a fourth championship in nine seasons, the aging Spurs have a chance to put quite the finishing touch on this remarkable era. That championship drought has everything to do with the increased urgency and fire Duncan speaks of, knowing chances for a title don't come along as readily. The Spurs learned that the hard way a year ago against the Thunder, when they were up 2-0 in the conference finals before dropping four in a row. Popovich, more than anyone, understands this. "The opportunity to go to the Finals and to win a championship is very rare," star point guard Tony Parker says. "He realizes that and has got that fire from last year, too." Popovich is known for his blunt interviews.(Photo: Soobum Im, USA TODAY Sports)
Mid
[ 0.560165975103734, 33.75, 26.5 ]
The pact between Turkey and EU (including the greek government) at March 2016 will make the life of refugees even more difficult. Fortunately, in all countries there are many people that have a different opinion showing their solidarity to refugees in action. For example in Greece there are many big and small organisations and groups which try their best to help people stuck at Eidomeni, at Athens and other places and also refugees that try to pass through Chios, Lesvos e.t.c. Most of them are in need and accept food/clothes e.t.c that are distributed after to the refugees and a few of them accept financial aid. Here is a google map of Greece with most of the groups that are helping and their needs in food/clothes (the map is updated). And here is a project that is organised in the Nehterlands, sending needed stuff in Greece.
Mid
[ 0.615720524017467, 35.25, 22 ]
Q: Google APP Engine and cloud sql :: Unable to connect Spring boot app in Google cloud sql (my sql) I am getting this error while connecting my Spring boot APP inside APP engine in Google cloud sql. Below I have attached code from application.properties spring.datasource.driverClassName=com.mysql.jdbc.Driver spring.datasource.url=jdbc:mysql://google/myprojectID?cloudSqlInstance=myInstance:us-central1:my-sql-instance&socketFactory=com.google.cloud.sql.mysql.SocketFactory spring.datasource.username=root spring.datasource.password=myPassword pom.xml <dependency> <groupId>org.springframework.cloud</groupId> <artifactId>spring-cloud-gcp-starter</artifactId> </dependency> In cloud sql default configuration I have used to create database. Whenever I fire this command I am getting this error. mvn -DskipTests package appengine:deploy A: Based on the @zenny's comment that served as a solution, In order to solve the issue, you've to set private IP in your SQL instance and use that private IP for your database local url. Here is a Codelabs tutorial which you can follow to set private IP for your SQL instance.
High
[ 0.681481481481481, 34.5, 16.125 ]
Genuine Ford Parts, the Right Choice Save your time and money by shopping Ford genuine parts here. You will be surprised by quality and price. Ford Parts Giant offers you 6C3Z-9S278-D TUBE ASY - FUEL with base parts number 9S278 at the affordable price of $283.46. And all products you ordered are shipped directly from authorized Ford dealer and backed by the manufacturer's warranty. 6C3Z9S278D is a fit for Ford F250 Super Duty, F350 Super Duty, F450 Super Duty. For most accurate results, please check if it fits your vehicle by VIN.
Mid
[ 0.6347031963470321, 34.75, 20 ]
An estimated 142,000 men and women died of lung cancer in 1990. The majority of patients present with locally advanced, unresectable disease for whom the 5 year survival is 5-7%. New strategies are urgently needed to improve the therapeutic ratio. Frequently, advanced non-small cell (NSC) lung cancer will produce endobronchial obstruction. High dose rate (HDR) brachytherapy combined with external beam irradiation has the advantage of providing improved localization so that the portion of the tumor most responsible for the obstruction receives the highest dose, while sparing the normal surrounding lung tissue. The lung is one of the most sensitive structures to irradiation and is a major dose-limiting organ to the delivery of optimal therapy. The acute and late effects of radiation therapy, pneumonitis and pulmonary fibrosis, are of particular concern and the ability to predict for these side effects could allow early intervention and thus, reduce the morbidity of lung cancer therapy. We propose to identify the optimal dose schedule for concurrent external radiation therapy and HDR brachytherapy in terms of symptom relief and local disease response in patients with locally advanced NSC lung cancer. Because HDR brachytherapy requires bronchoscopy, it provides a unique opportunity, via bronchoalveolar lavage (BAL), to study the effects of irradiation in vivo, and to correlate laboratory findings to date in several animal models with clinical outcome in humans. Serial BAL will provide cellular material to: identify and quantify the production of specific growth factors for fibroblasts by alveolar macrophages induced by radiation; measure production of extra cellular matrix (ECM) proteins and expression of ECM mRNA in vitro by fibroblasts in response to specific growth and inhibitory factors produced by alveolar macrophages; identify changes in cellular responses outside the radiation volume due to the release of biochemical messages from within the irradiated volume. Serum samples will be analyzed to measure the release of biochemical messages into the vascular system after irradiation as monitors/predictors of radiation injury. These laboratory findings will be correlated with each patient's clinical outcome. The information obtained could contribute significantly to our understanding of the pneumonitic and fibrotic processes secondary to lung irradiation in humans. This could enable the development of early interventions and would impact on our ability to lower the morbidity in future clinical trials for all disease sites where the lungs may be irradiated.
High
[ 0.7147435897435891, 27.875, 11.125 ]
Flu drugs safe for unborn babies March 3, 2017 - 06:20 Pregnant women run a higher risk of getting seriously ill if they catch influenza. A new study shows that new-born infants run no higher risk of harm if their mothers have taken anti-viral medications to ward off flu infections. Pregnant women can safely take flu shots without fear of harming their unborn child, informs the Norwegian Institute of Public Health. The institute has collaborated in an international study of the subject. (Illustrative photo: Albina Tiplyashina / Shutterstock / NTB scanpix) Pregnant women should try to avoid coming down with the flu. The viral infection can in some cases cause serious complications for themselves and also premature births. This is why European and American health officials recommend that pregnant women take influenza vaccines as a precaution if they have come in close contact with someone who has the flu. But what about their baby’s risk of a birth defect, ill health or morbidity in infancy? A number of studies down through the years have indicated an elevated risk of health problems for children if their mothers have taken specific medications during their pregnancies. For instance a study has shown a higher risk of a child developing asthma if their mother used paracetamol while pregnant. So many women are sceptical about taking any medications during their pregnancies. A large study now shows at least that worries about complications caused by flu vaccines are unfounded. The antiviral drugs in question are known medically as neuraminidase inhibitors. Researchers at the Norwegian Institute of Public Health (FHI) participated in the study, recently published in the journal BMJ. Infections should be avoided Senior Researcher Kari Furu at FHI thinks therefore that the results are important because many pregnant women run a chance of catching influenza during the annual peak season in winter. “We already know that infections are to be avoided whenever possible during pregnancies. We don’t know enough about how infections affect the foetus. But earlier studies have shown that it can be unfortunate for the foetus if the mother catches the flu during her pregnancy,” she says. This was shown in studies where researchers compared children of mothers who took shots against swine flu (H1N1 and H3N2v) with children whose mothers did not take this precaution. This is why doctors recommend preventive medications to limit the infection to women who know they have been exposed to the flu. Importantly, however, flu vaccines are not recommended during the first trimester of a pregnancy. A cohort of 760,000 women Senior Researcher Kari Furu at FHI and two colleagues have worked with researchers in Denmark, Sweden and France in comparing the new-born babies of 6,000 women who took drugs against influenza during their pregnancies with the infants of several hundred thousand women who did not take such anti-viral drugs. “Over half of the exposed women were from Norway because the Norwegian authorities were more active in recommending the drugs to pregnant women,” explains Kari Furu. They concluded that the medication-exposed infants had no more health problems that other new-borns. The researchers say this is the largest study of its kind, as it covered the children of nearly 700,000 women in Norway, Denmark, Sweden and France. Birth weights and congenital defects When comparing the effects of flu vaccines, the medical researchers looked at birth weights, the Apgar score (which rates the new-born’s general condition at birth), incidences of pre-mature births, stillbirths as well as potential health issues such as congenital malformations. Infants born to women who took the antiviral drugs – neuraminidase inhibitors – did not exhibit more health problems than other babies. There were no increases in premature births, stillbirths, or infant mortalities among the babies whose mothers had been medicated. Nor did these babies run a higher risk of congenital malformations or other health problems during their first four weeks of life. The study thus confirmed previous ones which have pointed to the same conclusions. “But these other studies have been too small for researchers to conclude with certainty that the medications were safe for the foetus,” explains Kari Furu. The new study is based on the public health registers from several countries and is sufficiently large to reveal prospective differences between exposed and unexposed infants, according to the researchers. The infants compared in the study were all new-borns in their first four weeks. “We have not looked at possible long-term effects because there are so many other factors that can have an impact which we control,” says Furu. Tamiflu against swine flu Most of the women who had been prescribed a medication against influenza had taken Tamiflu, which can be taken preventively for five days after a person has been exposed to infection. “Tamiflu can be used in treating influenza but also as a preventive drug if one has been exposed to an infection of flu virus. Another drug in the same category is Relenza, but it is very rarely used,” says Furu. These drugs work by inhibiting the budding and reproduction of the flu virus within the body. The women who were covered by the study gave birth during the period 2008 to 2010. Most of them took the medication in connection with the outbreak of swine flu. The research about flu medications and pregnancies was financed by the Norwegian Institute of Public Health, the University of Bergen, Karolinska Institute in Sweden, Statens Serum Institut and the Medical Research Council in Denmark, the Hallas-Møller-stipend from Denmark’s Novo Nordisk Foundation and the Université Toulouse III in France. Also on the subject of pregnancies and medications: Findings by the University of Oslo’s School of Pharmacy show that for many women with mental illnesses it is better for both the mother and her child if she uses medications for her illness rather than go through her pregnancy un-medicated. Multidisciplinary initiatives have been taken to provide better and balanced information to pregnant women about the use of such medications.
High
[ 0.6621983914209111, 30.875, 15.75 ]
/* * Copyright 2013, Google Inc. * All rights reserved. * * Redistribution and use in source and binary forms, with or without * modification, are permitted provided that the following conditions are * met: * * * Redistributions of source code must retain the above copyright * notice, this list of conditions and the following disclaimer. * * Redistributions in binary form must reproduce the above * copyright notice, this list of conditions and the following disclaimer * in the documentation and/or other materials provided with the * distribution. * * Neither the name of Google Inc. nor the names of its * contributors may be used to endorse or promote products derived from * this software without specific prior written permission. * * THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS * "AS IS" AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT * LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR * A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT * OWNER OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, * SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT * LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, * DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY * THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT * (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE * OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. */ package org.jf.dexlib2.dexbacked.raw; import com.google.common.collect.Maps; import org.jf.dexlib2.dexbacked.raw.util.DexAnnotator; import org.jf.dexlib2.util.AnnotatedBytes; import org.jf.util.AlignmentUtils; import javax.annotation.Nonnull; import javax.annotation.Nullable; import java.util.Map; public abstract class SectionAnnotator { @Nonnull public final DexAnnotator annotator; @Nonnull public final RawDexFile dexFile; public final int itemType; public final int sectionOffset; public final int itemCount; private Map<Integer, String> itemIdentities = Maps.newHashMap(); public SectionAnnotator(@Nonnull DexAnnotator annotator, @Nonnull MapItem mapItem) { this.annotator = annotator; this.dexFile = annotator.dexFile; this.itemType = mapItem.getType(); this.sectionOffset = mapItem.getOffset(); this.itemCount = mapItem.getItemCount(); } @Nonnull public abstract String getItemName(); protected abstract void annotateItem(@Nonnull AnnotatedBytes out, int itemIndex, @Nullable String itemIdentity); /** * Write out annotations for this section * * @param out The AnnotatedBytes object to annotate to */ public void annotateSection(@Nonnull AnnotatedBytes out) { out.moveTo(sectionOffset); annotateSectionInner(out, itemCount); } protected void annotateSectionInner(@Nonnull AnnotatedBytes out, int itemCount) { String itemName = getItemName(); int itemAlignment = getItemAlignment(); if (itemCount > 0) { out.annotate(0, ""); out.annotate(0, "-----------------------------"); out.annotate(0, "%s section", itemName); out.annotate(0, "-----------------------------"); out.annotate(0, ""); for (int i=0; i<itemCount; i++) { out.moveTo(AlignmentUtils.alignOffset(out.getCursor(), itemAlignment)); String itemIdentity = getItemIdentity(out.getCursor()); if (itemIdentity != null) { out.annotate(0, "[%d] %s: %s", i, itemName, itemIdentity); } else { out.annotate(0, "[%d] %s", i, itemName); } out.indent(); annotateItem(out, i, itemIdentity); out.deindent(); } } } @Nullable private String getItemIdentity(int itemOffset) { return itemIdentities.get(itemOffset); } public void setItemIdentity(int itemOffset, String identity) { itemIdentities.put(itemOffset, identity); } public int getItemAlignment() { return 1; } }
Mid
[ 0.5416666666666661, 32.5, 27.5 ]
Q: How can I divide an output with 2 delimiters? By dividing with the "·" and " " characters, I would like to turn this: Hel·lo my name is E·ric To this: Hel·lo my name is E·ric Hel·lo my name is E· Hel·lo my name is Hel·lo my name Hel·lo my Hel·lo Hel· The following code almost does it, but I'm not too sure what I need to tweak in order to keep the syllable dots. sentence="Hel·lo my name is E·ric" echo $sentence | awk -F'[· ]' -v OFS=" " '{print;for (i=NF;i>1;i--){$i="";print;NF--} }' A: $ echo $sentence | awk -F'[· ]' '{out=$0;print;for (i=NF;i>1;i--){out=gensub(/([· ])[^· ]*[· ]?$/, "\\1", "g", out); print out }}' Hel·lo my name is E·ric Hel·lo my name is E· Hel·lo my name is Hel·lo my name Hel·lo my Hel·lo Hel· Multiple line version For those who like their code spread over multiple lines: sentence="Hel·lo my name is E·ric" echo $sentence | awk -F'[· ]' '{ out=$0 print for (i=NF;i>1;i--){ out=gensub(/([· ])[^· ]*[· ]?$/, "\\1", "g", out) print out } }' How it works -F'[· ]' tells awk to separate fields at any occurrence of · or a blank space. { marks the start of a processing group for this line. out=$0 tells awk to save the current line, known in awk as $0, in the variable out. print prints the current line. for (i=NF;i>1;i--){ starts a loop which counts down over the number of fields in the input line. For each execution of the loop: out=gensub(/([· ])[^· ]*[· ]?$/, "\\1", "g", out) removes one field, including any preceding or following field separators, from the end of the line and saves the resulting text in the variable out. print out prints the contents of the variable out. } marks the end of the for-loop. } marks the end of the processing group for this line
Mid
[ 0.6354166666666661, 30.5, 17.5 ]
1. Field of the Invention This invention relates to a polypeptide that has the amino acid sequence of the functional domain of human caldesmon. 2. Description of Related Art Caldesmon is a protein that can bind with calmodulin, actin and tropomyosin, found in all tissues except skeletal muscle and cardiac muscle. It contributes to the regulation of actomyosin system in smooth muscle. This regulatory function depends on the concentration of calcium ions (flip-flop regulation) in bringing about the regulation of the actomyosin system (Proc. Natl. Acad. Sci. USA, 78, 5652-5655, 1981). When the concentration of calcium ions is low, caldesmon binds with the actin filament-tropomyosin system, and inhibits the mutual interactions of actin and myosin. When the calcium ion concentration is increased, complexes of active calmodulin and caldesmon are formed. This complex is released from the actin filament-tropomyosin system. Because of this, the inhibition of actin-myosin interaction caused by caldesmon cease, and these interactions begin. Caldesmon was first isolated from the smooth muscles of chicken gizzards, and it has been isolated from other vertebrates. The results of the limited digestion of chicken caldesmons by the protease .alpha.-chymotrypsin have shown that a polypeptide of the size of about 35 kDa at the carboxy-terminal end of chicken caldesmons is the functional unit that brings about flip-flop regulation that depends on the concentration of calcium ions (J. Biochem., 102, 1065-1073, 1987). There are two isoforms of chicken caldesmon that have different molecular weights. The results of electrophoresis on sodium dodecyl sulfate-polyacrylamide gels have shown that one is of high molecular weight (120,000 to 150,000 Da), now named h-caldesmon, and that the other is of low molecular weight (70,000 to 80,000 Da), now named l-caldesmon. h-caldesmon is abundant in smooth-muscle tissue, and l-caldesmon is abundant in non-muscle tissue and cultured cells. The amino acid sequence of h-caldesmon and the DNA sequence that codes for it have recently been identified (Biochem. Biophys. Res. Commun [called BBRC below], 164,503-511, 1989), as have been the amino acid sequence of 1-caldesmon and the DNA sequence that codes for it (J. Biol. Chem., 266, 355-361, 1991; also Japanese Patent Application 2-37362). Both h- and l-caldesmons are of chicken origin, and the amino acid sequence of human caldesmon is still unknown. The morphological change of cells is one characteristic of carcinogenesis. The preservation of cell morphology is closely related to the actin network of the cells, and when cells are transformed, the change in cell morphology occurs in correlation with loss of actin cables, which are part of the filament system that makes up the cytoskeleton (Proc. Natl. Acad. Sci. USA, 72, 994-998, 1975). Immunohistochemical analysis have revealed that caldesmon is localized in actin cables, cell attachment sites, and membrane ruffles in normal cells, but in cancer cells, the compound is not found in any defined cell location (Proc. Natl. Acad. Sci. 81, 3133-3137, 1984). When cultured cells are transformed with a variety of oncogenic viruses, the caldesmon concentration of the cells decreases and the phosphorylation of the caldesmon increases (Proc. Natl. Acad. Sci. USA 81, 3133-3137, 1984, and Saibo Kogaku [Cell Technology], suppl. 3, "Molecules regulating calcium signalling," 140-153, 1987).
Mid
[ 0.5772946859903381, 29.875, 21.875 ]
First Loan Financial First Loan Financial Contents The city of Gary and First Financial Bank are teaming up to offer small businesses in the Steel City micro-loans of up to $10,000 to help them grow or get through a rough patch. The city and. full service loan sale advisor, top choice, best in class, international loan sales, multiple asset types, including portfolio analysis, marketing and all aspects of loan sales from start to finish, non-performing loan sales, FDIC, portfolio valuation Requirements For First Time Home Buyer Applying for a first-time home loan through the Federal. for you to use to make sure you meet all the requirements so the loan process goes smoothly and you are approved for your first home. The. First Financial Federal credit union offers a variety of loan options to fit your personal and business needs. Apply online, over the phone or in person. Home Loans. Whether you're buying or building your first house, remodeling your forever home or financing a major milestone, a Bremer home loan can help. First Financial Northwest Bank offers checking, savings, loans, credit and business banking accounts to the Northwest. Welcome to 1FBUSA. Established in the year 1910, 1st Financial Bank USA (1FBUSA) provides quality community banking services in South Dakota and provides credit card and other financial services to college students and college graduates, and construction lending to builders, developers and investors from coast to coast. A mortgage loan or, simply, mortgage is used either by purchasers of real property to raise. The lender will typically be a financial institution, such as a bank, credit union or building society.. whereby a mortgage loan will have a fixed rate for some period, for example the first five years, and vary after the end of that period. The convenient, fast, secure and free way to switch your automatic payments and direct deposit to First South Financial – it’s as easy as 1-2-3! Learn More To reference all disclosures regarding electronic services, please access our account information disclosure . First Bank Financial Centre (FBFC) is a community bank that has been making lives better in Southeast Wisconsin since the beginning of time. Ok, that’s dramatic, but it has been since 1859, which is still a heck of a long time ago. First Time Home Buyer 100 Percent Financing VA still has zero-down home loans – To a first-time buyer who doesn’t have a lot (or any) cash for a down payment, mortgage loans that allowed you to skate. to homeownership over the past decade. Thousands of home buyers chose a 100. The new products appear to be aimed at taking a share of the ballooning market for personal loans, which hit a record $143. The Company announced the amendment of its original loan facility with Moskowitz capital mortgage fund on August 26, 2019, which increased the amount of the loan from CAD $5.5 million to $8.5 million, Fha Mortgage Rates Houston Texas First Time Buyer Program Texas First time home buyer programs 2019 Texas First Time Home Buyers Resource Center – Facebook – Texas First Time Home Buyers Resource Center. 1,592 likes. The fthb resource center of Texas helps borrowers navigate available Down Payment Assistance.Homeownership Across texas grants 5 percent of the loan amount with VA, FHA, Homebuyers Assistance Program · First Time Home Buyer Down Payment.As many know, a contributing factor is that fewer first-time buyers are applying for loans backed by the FHA. Mortgage recently announced a spate of branch openings, including a Dallas branch (in.
Mid
[ 0.541304347826086, 31.125, 26.375 ]
The comments came shortly after ESPN.com first reported Hurst will not be allowed to participate in drills. League spokesman Michael Signora confirmed that players can be held out based on certain diagnoses but that he believed Hurst was still in town. Jeff Foster, president of National Football Scouting, declined to confirm details of what happened because of privacy concerns. But he did tell The Associated Press that six to eight players have been withheld from drills this year for reasons players were not aware of before their arrival. Foster said that number has stayed relatively consistent over the past 13 years. Hurst had been rising steadily on mock draft boards. The 6-foot-2, 280-pound defensive tackle had 59 tackles and 5 1/2 sacks last season. He also had 13 tackles for loss and has been considered one component of a deep class of defensive tackles in this year’s draft. Hurst’s father played seven seasons with the New England Patriots as a cornerback. Word leaked just after defensive linemen and linebackers started talking to reporters at the NFL’s annual scouting combine in Indianapolis. ”I just found out in the NFLPA meeting that we just had. He just said, `Star was your brother?’ And I said yeah. He’s like Anthony Barr Jersey Big , `Man, I just got the same thing that he did,”’ Lowell Lotulelei told reporters. ”Obviously I didn’t go through it, so I don’t really know what he’s feeling like. But I kind of understand the disappointment just because my brother trained just like he trained and you’re expecting one thing and getting another. I feel for him. It sucks. But I think he’ll be fine just like my brother was.” Five years ago, Star Lotulelei arrived at the combine as the expected first pick in that year’s draft. Things changed dramatically after doctors identified an ”abnormal” test on his heart. Lotulelei then sought additional opinions Youth Chukwuma Okorafor Jersey , eventually was cleared to exercise and was taken by Carolina with the 14th overall selection in the 2013 draft. He has missed only four games in five NFL seasons. — Bears coach Matt Nagy said on Saturday that the team was waiting for word on linebacker Leonard Floyd‘s condition after Floyd left that night’s preseason game with a hand injury. Nagy provided an update on Monday and, per multiple reporters, confirmed that Floyd sustained a fracture when he went down against the Broncos. Nagy also revealed that Floyd had surgery to repair the injury on Sunday. While Floyd had surgery, the hope is that he will be ready to play when the Bears face off against the Packers on the first Sunday night of the regular season. Floyd missed 10 games during his first two NFL seasons with a variety of injuries and is expected to play a lead role in the Bears pass rush as long as he’s healthy this year.
Mid
[ 0.5889830508474571, 34.75, 24.25 ]
/*========================================================================= Program: Visualization Toolkit Module: vtkSpanSpace.h Copyright (c) Ken Martin, Will Schroeder, Bill Lorensen All rights reserved. See Copyright.txt or http://www.kitware.com/Copyright.htm for details. This software is distributed WITHOUT ANY WARRANTY; without even the implied warranty of MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the above copyright notice for more information. =========================================================================*/ /** * @class vtkSpanSpace * @brief organize data according to scalar span space * * This is a helper class used to accelerate contouring operations. Given an * dataset, it organizes the dataset cells into a 2D binned space, with * coordinate axes (scalar_min,scalar_max). This so-called span space can * then be traversed quickly to find the cells that intersect a specified * contour value. * * This class has an API that supports both serial and parallel * operation. The parallel API enables the using class to grab arrays * (or batches) of cells that lie along a particular row in the span * space. These arrays can then be processed separately or in parallel. * * Learn more about span space in these two publications: 1) "A Near * Optimal Isosorface Extraction Algorithm Using the Span Space." * Yarden Livnat et al. and 2) Isosurfacing in Span Space with Utmost * Efficiency." Han-Wei Shen et al. * * @sa * vtkScalarTree vtkSimpleScalarTree */ #ifndef vtkSpanSpace_h #define vtkSpanSpace_h #include "vtkCommonExecutionModelModule.h" // For export macro #include "vtkScalarTree.h" class vtkSpanSpace; struct vtkInternalSpanSpace; class VTKCOMMONEXECUTIONMODEL_EXPORT vtkSpanSpace : public vtkScalarTree { public: /** * Instantiate a scalar tree with default resolution of 100 and automatic * scalar range computation. */ static vtkSpanSpace* New(); //@{ /** * Standard type related macros and PrintSelf() method. */ vtkTypeMacro(vtkSpanSpace, vtkScalarTree); void PrintSelf(ostream& os, vtkIndent indent) override; //@} /** * This method is used to copy data members when cloning an instance of the * class. It does not copy heavy data. */ void ShallowCopy(vtkScalarTree* stree) override; //---------------------------------------------------------------------- // The following methods are specific to the creation and configuration of // vtkSpanSpace. //@{ /** * Specify the scalar range in terms of minimum and maximum values * (smin,smax). These values are used to build the span space. Note that * setting the range can have significant impact on the performance of the * span space as it controls the effective resolution near important * isocontour values. By default the range is computed automatically; turn * off ComputeScalarRange is you wish to manually specify it. */ vtkSetVector2Macro(ScalarRange, double); vtkGetVectorMacro(ScalarRange, double, 2); //@} //@{ /** * This boolean controls whether the determination of the scalar range is * computed from the input scalar data. By default this is enabled. */ vtkSetMacro(ComputeScalarRange, vtkTypeBool); vtkGetMacro(ComputeScalarRange, vtkTypeBool); vtkBooleanMacro(ComputeScalarRange, vtkTypeBool); //@} //@{ /** * Set/Get the resolution N of the span space. The span space can be * envisioned as a rectangular lattice of NXN buckets/bins (i.e., N rows * and N columns), where each bucket stores a list of cell ids. The i-j * coordinate of each cell (hence its location in the lattice) is * determined from the cell's 2-tuple (smin,smax) scalar range. By default * Resolution = 100, with a clamp of 10,000. */ vtkSetClampMacro(Resolution, vtkIdType, 1, 10000); vtkGetMacro(Resolution, vtkIdType); //@} //@{ /** * Boolean controls whether the resolution of span space is computed * automatically from the average number of cells falling in each bucket. */ vtkSetMacro(ComputeResolution, vtkTypeBool); vtkGetMacro(ComputeResolution, vtkTypeBool); vtkBooleanMacro(ComputeResolution, vtkTypeBool); //@} //@{ /** * Specify the average number of cells in each bucket. This is used to * indirectly control the resolution if ComputeResolution is enabled. */ vtkSetClampMacro(NumberOfCellsPerBucket, int, 1, VTK_INT_MAX); vtkGetMacro(NumberOfCellsPerBucket, int); //@} //---------------------------------------------------------------------- // The following methods satisfy the vtkScalarTree abstract API. /** * Initialize the span space. Frees memory and resets object as * appropriate. */ void Initialize() override; /** * Construct the scalar tree from the dataset provided. Checks build times * and modified time from input and reconstructs the tree if necessary. */ void BuildTree() override; /** * Begin to traverse the cells based on a scalar value. Returned cells will * have scalar values that span the scalar value specified (within the * resolution of the span space). Note this method must be called prior to * parallel or serial traversal since it specifies the scalar value to be * extracted. */ void InitTraversal(double scalarValue) override; /** * Return the next cell that may contain scalar value specified to * InitTraversal(). The value nullptr is returned if the list is * exhausted. Make sure that InitTraversal() has been invoked first or * you'll get undefined behavior. This is inherently a serial operation. */ vtkCell* GetNextCell(vtkIdType& cellId, vtkIdList*& ptIds, vtkDataArray* cellScalars) override; // The following methods supports parallel (threaded) traversal. Basically // batches of cells (which are a portion of the whole dataset) are available for // processing in a parallel For() operation. /** * Get the number of cell batches available for processing as a function of * the specified scalar value. Each batch contains a list of candidate * cells that may contain the specified isocontour value. */ vtkIdType GetNumberOfCellBatches(double scalarValue) override; /** * Return the array of cell ids in the specified batch. The method * also returns the number of cell ids in the array. Make sure to * call GetNumberOfCellBatches() beforehand. */ const vtkIdType* GetCellBatch(vtkIdType batchNum, vtkIdType& numCells) override; //@{ /** * Set/Get the size of the cell batches when processing in * parallel. By default the batch size = 100 cells in each batch. */ vtkSetClampMacro(BatchSize, vtkIdType, 100, VTK_INT_MAX); vtkGetMacro(BatchSize, vtkIdType); //@} protected: vtkSpanSpace(); ~vtkSpanSpace() override; double ScalarRange[2]; vtkTypeBool ComputeScalarRange; vtkIdType Resolution; vtkTypeBool ComputeResolution; int NumberOfCellsPerBucket; vtkInternalSpanSpace* SpanSpace; vtkIdType BatchSize; private: // Internal variables supporting span space traversal vtkIdType RMin[2]; // span space lower left corner vtkIdType RMax[2]; // span space upper right corner // This supports serial traversal via GetNextCell() vtkIdType CurrentRow; // the span space row currently being processed vtkIdType* CurrentSpan; // pointer to current span row vtkIdType CurrentIdx; // position into the current span row vtkIdType CurrentNumCells; // number of cells on the current span row private: vtkSpanSpace(const vtkSpanSpace&) = delete; void operator=(const vtkSpanSpace&) = delete; }; #endif
Mid
[ 0.611814345991561, 36.25, 23 ]
Spring: To fling or not to fling? I’ve been watching you. And I know what’s on all your minds: spring. And along with spring comes the decision…to fling or not to fling? It’s inevitable that this question comes up at this time of year—undoubtedly, spring is here. The temperature is up and the sun is out, bringing everyone out of hibernation. Suddenly, girls are studying their bio notes while in bikinis, and shirtless guys are playing Frisbee on just about every green space on campus. Between massive amounts of skin exposure, the carefree music blasting from every dorm window and that certain indescribable essence that comes with spring, everyone is feeling that little bit of additional pressure to make like the birds and bees. It’s not just the environment that gives us this feeling, though. The end of the school year comes with a sense of liberation and urgency. Let’s face the facts: In about six weeks, most of us will be going home, and all you seniors will soon be out of here for good. This time crunch helps us realize that this is our last chance to talk to that hottie in psych class or finally ask out that freshman floor crush. And since you’re getting off this campus so soon, what do you really stand to lose? Opportunities are everywhere, and they’re being talked about by everyone: I’ve heard terms like “senior scramble” (apparently all the seniors want someone to introduce to their families at graduation), and “DTFA” (Down to…um…“Fiesta” April)* used in regular conversation. And the discussions about fraternity and sorority formals are in every corner of Whispers—whether certain expectations need to be filled, and if it would really be so bad to hook up with that “just friend” you’re bringing as a date. While I often tend to encourage serious relationships, I have to deviate from my normal advice here. In my opinion, there are honestly very few things healthier than having a spring fling. We’ve spent all year cramming and holed up in our rooms; what better way is there to end the year than by finding someone you really enjoy hanging out with and having a little carefree tryst for a few weeks? After our months of hibernation, having someone to walk with through Forest Park and make out with in the grass outside Olin sounds like a well-deserved reward to me. You’ve got a bit over a month left here, guys. Make the most of it! Just remember that when you take the plunge and ask that babe out for ice cream followed by a snuggle and maybe a little something else, you can sometimes get more than you bargained for. Sometimes you end up falling for your fling—and that can turn into something more serious, or it can leave you with a bit of a broken heart. So have that fling, but keep it light and keep it fun. And remember, birds and bees have a short lifespan, but you’ll still have to see this person next fall. StudLife's exclusive online content Finding a fun-loving fling is a cinch! You just need to know what you’re looking for. Generally, when you come across a scandalously-clad senior, that’s a good tip-off that he or she is looking to get down and dirty. Sometimes the best tactic is to just put it out there. Walk up to a stranger, state your intention from the get-go, and (especially at this time of year) you’ll get a surprisingly high number of positive responses. I’d say by the time you polled Whispers on a Tuesday evening, you could have a fling lined up for each night that week! Best of luck! ABCs And other than (alcohol-fueled) greek life events, where do you suppose someone finds a girl or guy so willing to go along, and how to go about it?
Mid
[ 0.6093023255813951, 32.75, 21 ]
Management of neonatal hydronephrosis. Management of neonatal hydronephrosis is a clinical challenge. The natural history of hydronephrosis has shown that most resolve spontaneously; however, there are a significant number that do not. Although hydronephrosis does not always mean obstruction, it becomes the clinician's role to determine when obstruction will eventually lead to renal damage. Work-up of hydronephrosis diagnosed prenatally starts with a postnatal ultrasound. Using the Society of Fetal Urology (SFU) grading of hydronephrosis based on ultrasonography, a management and treatment algorithm can be constructed. Other studies include a voiding cystourethrogram to evaluate for vesicoureteral reflux or in severe cases of bilateral hydronephrosis to evaluate for posterior urethral valves. Diuretic renography is useful in many cases to evaluate the degree of obstruction and determine differential renal function. The goal is to select the patients who would benefit from early surgical intervention. To achieve that goal, aggressive observation is often required.
High
[ 0.6728232189973611, 31.875, 15.5 ]
President Trump has a self-defeating obsession with Wall Street. He crows about Wall Street when stock markets are booming, and goes radio silent or starts pointing fingers when the market tanks. He loves Wall Street. He's obsessed with the stock market. He wants to take credit for its success. But he cannot deal with its failure. During a market boom between July and October, the president tweeted about it at least 18 times, touting the "all-time highs" and congratulating "all of you that have made a fortune in the markets." But he hasn't tweeted about stocks in nearly a month now. I wonder why ... The Dow Jones Industrial Average plummeted roughly 700 points on Tuesday, and went down again Thursday. (It was shut down Wednesday in honor of the late President George H.W. Bush.) It's been on a roller-coaster ride trending down for several weeks now. Of course, the Dow is still way up since Trump's election — from a closing of 18,333 on Election Day 2016 to 24,948 on Thursday. That's an increase of 36.1 percent in a little more than two years. But the market has a major case of the jitters now. Why? In many ways, it's the uncertainty sowed by President Trump. His trade war and capricious tweets are actively deflating the stock market. You always hurt the one you love. Last weekend, Trump sat down at the G20 summit with Chinese President Xi Jinping. Analysts hoped the meeting would cool off the growing trade war between the two countries. And as this week got underway, it appeared to have done just that: Trump announced a deal to hold off further tariffs for three months while the two sides kept talking. The stock markets calmed down. Briefly, anyway. Within another day or two it became apparent that no one inside or outside the administration was really clear on what the Chinese had agreed to do. On Tuesday, Trump himself drastically shifted tone: Having initially hailed the "incredible deal," he then sent a barrage of cooperate-or-else tweets at the Chinese. While his administration was looking into "whether or not a REAL deal with China is actually possible," Trump warned that if it wasn't, "I am a Tariff man." The stock markets promptly tanked. Granted, there are other factors in play, including some negative signals from the bond market, and the prominent arrest of a major Chinese business official. But Trump clearly got the hint. On Wednesday he took to Twitter again for some damage control: "Very strong signals being sent by China," he declared. "I believe President Xi meant every word of what he said at our long and hopefully historic meeting. ALL subjects discussed!" Trump also referenced reports that China was gearing up to buy more soybeans and liquefied natural gas. Trump absolutely loves to tout a booming stock market as proof of his impeccable governance. "The stock market is up massively since the Election," he trumpeted in October. Before that, in June, it was, "Stock Market up almost 40% since the Election." Yet making the stock market such a singular metric of his performance is also a problem for Trump, because he also loves tariffs and trade wars and bellicose posturing against foreign competitors — and all that tends to send the stock market into conniption fits. It's been a particularly rough ride since late September. If you take all the ups and downs as a whole, the stock markets have basically flatlined this year. (The Dow closed 2017 at 24,719 — meaning it has gained less than 300 points in 2018.) Now, the idea that the stock market is a useful gauge of the economy's health is by itself pretty dumb. It arises from the neoliberal, free markets approach that holds that maintaining an ideal environment for private investment is the key to a flourishing economy, and that requires government austerity, light regulation, and liberalized global trade. The logical extension of this view is that corporate profits are the natural result of value creation. And that makes the stock market an absolutely key indicator of the economy's health. For our purposes, whether or not that approach is right isn't the issue (even though it's not right!). The point is it's a coherent and internally consistent framework for economic policy. Yet Trump has no coherent ideology on economic policy. He's a simpleton used car salesmen with fascist tendencies. He probably likes the stock market because it's easy to understand. But if Trump cared about coherency, he'd realize he can keep triumphantly applauding stock market returns or he can keep his trade war. But he can't do both.
Mid
[ 0.542735042735042, 31.75, 26.75 ]
“With the increase of passenger travel, not only through Charleston but here in the state of South Carolina, we are seeing more firearms. With that being about a 54 percent increase across the state and then here, particularly in Charleston, we’ve seen a 100 percent increase,” McMahon said. “It’s very concerning, and it should be alerting to anybody that travels.”
Low
[ 0.399538106235565, 21.625, 32.5 ]
New York City FC fans will be able to watch the match against Ecuadorian club C.S. Emelec live on NYCFC.com and MLSSoccer.com. The match, which kicks off at the newly redeveloped Estadio Banco del Pacifico, will be played on Wednesday, February 8 at 8pm EST. Based out of Guayaquil, the most populous city in Ecuador, Emelec have won 13 Ecuadorian Serie A championships and seven regional titles. A day before the match, NYCFC players will assist the coaches at a soccer clinic at a local high school in Guayaquil to help teach the kids soccer fundamentals. This will be followed by a press conference at the stadium with Head Coach Patrick Vieira and team captain David Villa, followed by training at the stadium. Fans can also follow the match live on social media by following our social channels here for live match coverage including behind the scenes photos and videos. Full Schedule Tuesday, February 7th 11:00am EST – Players to assist coaches at a soccer clinic at a local high school in Guayaquil 5:30pm EST – Press Conference at stadium with Head Coach Patrick Vieira and David Villa 6:00pm EST – Open media training at stadium Wednesday, February 8th
High
[ 0.660550458715596, 36, 18.5 ]
Over 200 organizations appeal to President Obama and the Department of Homeland Security to Suspend Immigration Enforcement Activities for Census 2010Encouraging hard-to-count populations to participate in the Census means reducing the climate of fear and distrust in immigrant communities Oakland, CA: As Census 2010 gears up to count all residents in the United States, immigrants are at risk of being undercounted due to the climate of fear and distrust stemming from immigration raids and other enforcement actions. With Census forms due to arrive in all households in the coming week, more than 200 concerned organizations nationwide have joined with the National Network for Immigrant and Refugee Rights to ask President Obama and Secretary Janet Napolitano to halt enforcement activities for the Census. Not only are many immigrants not familiar with the Census, but many households will be reluctant to return their Census forms or talk with outreach workers for fear of detection if they or someone in their home is undocumented. The letter asks the Administration to "follow precedent" to suspend enforcement activities, including the "287g" program that facilitates local police involvement in immigration enforcement. In 1990 and 2000, steps were taken to suspend numerous enforcement actions. However, with the peak activities for the Census just around the corner, the Administration has not yet announced any significant action. While the purpose of the census is to count everyone residing in the United States, immigrants, along with a number of other population groups, have been historically undercounted. However, with the distribution of some $400 billion in federal funds at stake to support infrastructure and services based on population, an inaccurate count of immigrants will have an impact on all areas of the country. The letter cites more than a dozen immigration enforcement programs. " As you know, enforcement activities have reached an unprecedented breadth and depth, resulting in higher numbers of detentions and deportations than even the past Administration, and utilizing strategies that are less visible than raids but well known and feared in immigrant communities throughout the country." According to NNIRR Executive Director Catherine Tactaquin, "While many community-based organizations are working to support the Census effort, we are genuinely concerned that the climate of fear will seriously impact the census form return rate of immigrant households -- and if people do not return the form, they will be reluctant to open the door to a follow-up visit from a Census worker." She continued, "We believe it is the right of every person to be counted in the Census, but we really need the leadership of the Administration right now to make a difference in the success of the Census among our diverse immigrant populations." Despite the benefits being counted brings to communities, immigrants are among several communities known to be significantly undercounted by the Census; in New York City, heavily-immigrant areas have had less than a 40 percent census response rate, compared to the citywide average response of 65 percent. The letter also notes that, "Numerous officials have themselves expressed grave concerns about the challenges faced in convincing immigrants to participate due to persistent enforcement activity by the same government now seeking their information. Immigrants have raised doubts about the confidentiality of the Census. While officials have repeatedly stated that the information obtained will not be shared with other departments, immigrants well recall similar assurances about the Social Security Administration and Internal Revenue Service; today, the data obtained from these agencies has provided the fuel for many of this Administration's enforcement operations. "
Mid
[ 0.6515837104072391, 36, 19.25 ]
In a new paper published this week in the Proceedings of the National Academy of Sciences, Aziz Sancar, MD, PhD, the Sarah Graham Kenan Professor of Biochemistry and Biophysics in the UNC School of Medicine, and his colleagues have taken an important step in understanding the underlying molecular signals that influence a broad array of biological processes ranging from the sleep-wake cycle to cancer growth and development. Scientists who work in this field, known as chronobiology, have identified the genes that direct circadian rhythms in people, mice, fruit flies, fungi and several other organisms. However, the mechanisms by which those genes interact with light in the organism's environment have not been well understood. Circadian rhythms are the physical, mental and behavioral changes that follow the earth's 24 hour cycle, responding primarily to light and darkness in an organism's environment. About 15 years ago, Sancar discovered a human protein called cryptochrome which acts as a core component of the molecular clock in mammals. The protein is also found in fruit flies, other insects, and plants. "Cryptochrome 'resets' the circadian clock, but we were not sure how it worked," said Sancar, who is also a member of UNC Lineberger Comprehensive Cancer Center. Using fruit flies (Drosophilia melanogaster), the team purified cryptochrome and developed a biochemical test that shows when and how the protein transmits signals. "We can now detect the protein at work. When we expose cryptochrome to blue light in fruit flies, a millisecond of light exposure has a half-life during which we can examine the mechanism in the laboratory," said Sancar. "We can follow the molecular signals after light exposure and have a reliable model to test various hypotheses about how light interacts with the circadian systems we know are so important to biological processes." The research may be useful to scientists who study the circadian clock's relationship to sleep disorders, jet lag, cancer, bipolar disorder, depression and other diseases.
High
[ 0.7142857142857141, 31.875, 12.75 ]
/* -*- mode: C; c-basic-offset: 4; indent-tabs-mode: nil; -*- */ /* vim:set et sts=4: */ /* ibus - The Input Bus * Copyright (C) 2008-2010 Peng Huang <[email protected]> * Copyright (C) 2008-2010 Red Hat, Inc. * * This library is free software; you can redistribute it and/or * modify it under the terms of the GNU Lesser General Public * License as published by the Free Software Foundation; either * version 2 of the License, or (at your option) any later version. * * This library is distributed in the hope that it will be useful, * but WITHOUT ANY WARRANTY; without even the implied warranty of * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU * Lesser General Public License for more details. * * You should have received a copy of the GNU Lesser General Public * License along with this library; if not, write to the * Free Software Foundation, Inc., 59 Temple Place - Suite 330, * Boston, MA 02111-1307, USA. */ #if !defined (__IBUS_H_INSIDE__) && !defined (IBUS_COMPILATION) #error "Only <ibus.h> can be included directly" #endif /** * SECTION: ibusinternal * @short_description: IBus internal. * @title: IBusInternal * @stability: Stable * * This section contain several IBus house keeping functions. * */ #ifndef __IBUS_INTERNEL_H_ #define __IBUS_INTERNEL_H_ #include <glib.h> /** * I_: * @string: A string * @returns: The canonical representation for the string. * * Returns a canonical representation for string. * Interned strings can be compared for equality by comparing the pointers, instead of using strcmp(). */ #define I_(string) g_intern_static_string (string) #endif
Mid
[ 0.623157894736842, 37, 22.375 ]
[Effect of pi-deficient heterocycles on ATP synthesis in mitochondria]. Participation of the pi-deficient heterosystems in the enhancement of cell metabolism was shown as distinct from the well-known hypotheses. In presence of chemical preparation RL-175 content of ATP was increased 4.4-4.6-fold and 3.6-fold in rat sceletal and heart muscles, respectively, as compared with control values.
High
[ 0.679525222551928, 28.625, 13.5 ]
Q: Time Zone Conversion in Laravel Eloquent I have the following line in an eloquent query: ->whereBetween('issue_date', [$fiscal_start, $fiscal_end]) $fiscal_start and $fiscal_end are in the user's local time zone, and issue_date is (in the table) stored in UTC. All three are timestamps. $fiscal_start example: Carbon {#639 ▼ +"date": "2016-07-01 00:00:00.000000" +"timezone_type": 3 +"timezone": "Australia/Sydney" } $orgTz contains "Australia/Sydney" What is the correct syntax for converting the issue_date in the whereBetween statement to local timezone before comparison? I have tried a few variations of this unsuccessfully: ->whereRaw("CONVERT_TZ(issue_date, 'UTC', {$orgTz}) BETWEEN {$fiscal_start} AND {$fiscal_end}") A: I guess I was missing a couple of ' ->whereRaw("CONVERT_TZ(issue_date, 'UTC', '{$orgTz}') BETWEEN '{$fiscal_start}' AND '{$fiscal_end}'")
Mid
[ 0.5828571428571421, 25.5, 18.25 ]
#! /bin/bash # IBM(c) 2014 EPL license http://www.eclipse.org/legal/epl-v10.html # Usage: # configbond bondname nic1@nic2@... [opt1@opt2@...] # # Description: # This script is used to configure bond interface base on the arguments from the # command line and the network information from nics and networks tables. # # This script will create bond interface named <bondname> with 'nic1','nic2'... as slave # devices. The bonding options 'opt1','opt2'... will be configured to bond interface. # # The network information for the bond interface will be gotten from the nics.nicsip and # nics.nicnetworks for interface <bondname>. If cannot get for <bondname>, try to # search for nic1. If failed too, then nic2 ... # # It only supports to configure one bond device at each run. If you want to create # multiple bond devices, call it multiple times. # # Note: # This script only works for IPv4 so far. # Following are examples of variables which are exported from mypostscript. Mostly, we need the nics and # networks related varirables which are exported from xcat nics and networks tables. # NICIPS=bond0!10.0.0.12 # NICTYPES=bond0!Ethernet # NICHOSTNAMESUFFIXES=bond0!-bond0 # NICNETWORKS=bond0!10_0_0_0-255_255_255_0 # NICCUSTOMSCRIPTS=bond0!configbond # NETWORKS_LINES=2 # NETWORKS_LINE1=netname=10_0_0_0-255_255_255_0||net=10.0.0.0||mask=255.255.255.0||mgtifname=eth1||gateway=<xcatmaster>||dhcpserver=||tftpserver=10.0.0.10||nameservers=||ntpservers=||logservers=||dynamicrange=||staticrange=||staticrangeincrement=||nodehostname=||ddnsdomain=||vlanid=||domain=||mtu=||disable=||comments= # NETWORKS_LINE2=netname=10_0_2_0-255_255_255_0||net=10.0.2.0||mask=255.255.255.0||mgtifname=eth0||gateway=10.0.2.2||dhcpserver=||tftpserver=10.0.2.15||nameservers=||ntpservers=||logservers=||dynamicrange=||staticrange=||staticrangeincrement=||nodehostname=||ddnsdomain=||vlanid=||domain=||mtu=||disable=||comments= # load library for network caculation if [ "$(uname -s|tr 'A-Z' 'a-z')" = "linux" ];then str_dir_name=`dirname $0` . $str_dir_name/xcatlib.sh fi if [ -n "$LOGLABEL" ]; then log_label=$LOGLABEL else log_label="xcat" fi # Subroutine to display message and pass it to syslog # Usage: showmsg "message to putput" ["error"] function showmsg() { msg="configbond: $1" error=$2 if [ -n "$error" ]; then $(logger -t $log_label -p local4.err $msg) else $(logger -t $log_label -p local4.info $msg) fi echo $msg } # Check OS version and get the directory of network configuration file str_bond_name='' str_os_type=`uname | tr 'A-Z' 'a-z'` str_cfg_dir='' str_temp='' if [ "$str_os_type" = "linux" ];then str_temp=`echo $OSVER | grep -E '(sles|suse)'` if [ -f "/etc/redhat-release" ];then str_os_type="redhat" str_cfg_dir="/etc/sysconfig/network-scripts" elif [ -f "/etc/SuSE-release" -o -n "$str_temp" ];then str_os_type="sles" str_cfg_dir="/etc/sysconfig/network" elif [ -f /etc/os-release ] && cat /etc/os-release |grep NAME|grep -i SLE >/dev/null; then str_os_type="sles" str_cfg_dir="/etc/sysconfig/network" else showmsg "Only supports RHEL and SLES" "error" exit -1 fi else showmsg "Does NOT support non-Linux Operating System" "error" exit -1 fi # Parse arguments old_ifs=$IFS IFS=$'@' if [ $# -eq 2 ];then array_bond_opts="mode=4 miimon=100 downdelay=0 updelay=0 lacp_rate=fast xmit_hash_policy=1" elif [ $# -eq 3 ]; then array_bond_opts=($3) else showmsg "Only supports 2 or 3 arguments. Usage: configbond bondname nic1@nic2@... [opt1@opt2@...]" exit -1 fi str_bond_name=$1 array_bond_slaves=($2) IFS=$old_ifs # examples of variables # str_bond_name=bond0 # array_bond_slaves=(eth1 eth2) # array_bond_opts=(mode=1 miimon=100) # Check the existence of slave devices and remove the inactive ones realdevs=$(ip addr show 2>&1 | grep -E '^[1-9]' | cut -d: -f2) for slave in ${array_bond_slaves[*]}; do active=0 for rdev in $realdevs; do if [ $rdev = $slave ]; then active=1 fi done if [ $active -eq 0 ]; then showmsg "Warning: device $slave does not exist. It will not be configured as a slave device." # remove the device from slave list allslaves=${array_bond_slaves[*]} allslaves=${allslaves/$slave/} array_bond_slaves=($allslaves) fi done if [ ${#array_bond_slaves[*]} -eq 0 ]; then showmsg "No available slave devices to use." "error" exit -1 fi showmsg "Create bond interface $str_bond_name with slaves=\"${array_bond_slaves[*]}\" opts=\"${array_bond_opts[*]}\"" # Get bond device's IP address str_bond_ip="" if [ -z "$NICIPS" ]; then showmsg "Failed to get IP for bond interface: $str_bond_name. No IP is set in nics.nicips table." exit 1 else for devname in $str_bond_name ${array_bond_slaves[*]}; do # for each "bondname nic1 nic2 ..." for ifipinfo in ${NICIPS//,/ }; do # for each "ifname!ifip" old_ifs=$IFS IFS=$'!' arrayifinfo=($ifipinfo) # [0] - ifname; [1] - if ip address IFS=$old_ifs if [ "$devname" = "${arrayifinfo[0]}" ]; then str_bond_ip=${arrayifinfo[1]} break 2 fi done done fi # remove the left part from |. that means only keeping the first ip in the interface if there are alias ip str_bond_ip=${str_bond_ip%%|*} if [ -z "str_bond_ip" ]; then showmsg "Failed to get IP for $str_bond_name ${array_bond_slaves[*]} from $NICIPS" exit 1 fi # Get the network and netmask info for the $str_bond_ip from networks table str_bond_net= str_bond_mask= num_i=1 while [ $num_i -le $NETWORKS_LINES ];do eval str_bond_network=\$NETWORKS_LINE$num_i str_temp_net=${str_bond_network#*net=} # remove the left part from 'net=' str_temp_net=${str_temp_net%%|*} # remove the right part from first '|' str_temp_mask=${str_bond_network#*mask=} # remove the left part from 'mask=' str_temp_mask=${str_temp_mask%%|*} # remove the right part from first '|' str_temp_net1=$(v4calcnet $str_bond_ip $str_temp_mask) str_temp_net2=$(v4calcnet $str_temp_net $str_temp_mask) if [ "$str_temp_net1" = "$str_temp_net2" ];then str_bond_net=$str_temp_net str_bond_mask=$str_temp_mask break fi num_i=$((num_i+1)) done if [ -z "$str_bond_net" ] || [ -z "$str_bond_mask" ]; then showmsg "Cannot find network information for bond IP $str_bond_ip from networks table." "error" exit 1 fi showmsg "IP information for $str_bond_name: IP=$str_bond_ip; network=$str_bond_net; netmask=$str_bond_mask" # Create bond config file str_master_file="${str_cfg_dir}/ifcfg-${str_bond_name}" if [ "$str_os_type" = "redhat" ];then # Create the master file cat > $str_master_file <<EOF DEVICE=${str_bond_name} BOOTPROTO=none IPADDR=${str_bond_ip} NETMASK=${str_bond_mask} ONBOOT=yes USERCTL=no TYPE=Bond BONDING_OPTS="${array_bond_opts[*]}" EOF # Create the slave files for slave in ${array_bond_slaves[*]}; do str_slave_file="${str_cfg_dir}/ifcfg-${slave}" cat > $str_slave_file <<EOF DEVICE=${slave} MASTER=${str_bond_name} SLAVE=yes BOOTPROTO=none ONBOOT=yes USERCTL=no EOF done elif [ "$str_os_type" = "sles" ];then # Create the master file cat > $str_master_file <<EOF NAME='Bonded Interface' BOOTPROTO=static BONDING_MASTER=yes TYPE=Bond IPADDR=${str_bond_ip} NETMASK=${str_bond_mask} STARTMODE=onboot USERCONTROL=no BONDING_MODULE_OPTS="${array_bond_opts[*]}" EOF # Create the slave entries and files num_index=0 for slave in ${array_bond_slaves[*]}; do # this is a special part to inject each slave device to master cfg echo "BONDING_SLAVE_${num_index}=$slave" >> $str_master_file num_index=$((num_index+1)) str_slave_file="${str_cfg_dir}/ifcfg-${slave}" echo "BOOTPROTO=none" > $str_slave_file echo "STARTMODE=hotplug" >> $str_slave_file done fi # add bonding driver alias for <bondname> echo "alias $str_bond_name bonding" > /etc/modprobe.d/$str_bond_name.conf # Bring down the slave devices first for slave in ${str_bond_name} ${array_bond_slaves[*]}; do $(ifdown $slave &>/dev/null) done # Bring up bond device $(ifup ${str_bond_name} &>/dev/null) if [ $? -ne 0 ]; then showmsg "Failed to bring up $str_bond_name" "error" exit 1 fi showmsg "Finished the configuration for bond interface $str_bond_name" exit 0
Low
[ 0.49894736842105203, 29.625, 29.75 ]
This blog presents news items and resources relating to trial advocacy and the legal system, with a focus on Washington State. It was developed to support the Trial Advocacy Program at the University of Washington School of Law, but now has a broader coverage and a wider audience. In addition to information about trials and trial practice, you'll find notes about appellate practice, the courts, access to justice, and related topics. Tuesday, May 24, 2011 BLT, the Blog of the Legal Times, today discusses mistakes made at the highest levels of the Justice Department -- the recent politicization of hiring within the department and the historic injustice of defending of the removal of 120,000 Japanese Americans and Japanese residents from their homes during World War II. Former AG Gonzales 'Disappointed' in His Own Conduct in DOJ Hiring. In a deposition for an employment case against DOJ, Alberto Gonzales "said for the first time that "I am disappointed that I didn't do things differently" to stop the politicization of the system of hiring career Justice Department attorneys through its honors program during his time in office." BLT, The Blog of Legal Times reports Judge Rules Swedish Law Firm Can Be Named In Local Malpractice Suit, May 24, 2011 "In a 120-page opinion . . ., a Washington federal judge affirmed that a foreign-based law firm with few physical ties to Washington and limited involvement in an underlying case could still be the target of a legal malpractice suit in Washington based on its communications and visits over the years." The plaintiff is suing both a DC firm and the Swedish firm for malpractice in their handling his his patent infringement cases. Thursday, May 19, 2011 The Coase Theorem says that parties will negotiate to an efficient distribution of goods—if they have perfect information and there are no transaction costs. Dru Stevenson takes this basic premise about an idealized economic world and uses it to frame his observations of jury selection, a phase of litigation where negotiation is typically absent: the rules and traditions of voir dire make the transactions costs very high. Not really into law and economics? The article is still worth reading for Stevenson's comments on jury selection. For instance: the peremptory strike system actually maximizes uncertainty about the jury, rather than neutrality or fairness, by allowing lawyers on each side to deselect jurors who seem favorable to their opponent. In other words, we merely remove those whose biases seem most evident. Given the relationship between predictability and settlement, this means the peremptory strike system has a temporary chilling effect on settlements immediately following the voir dire segment of the litigation. Id. at 6. If you'd like to read more about the Coase Theorem—a lot more—see Steven G. Medema & Richard O. Zerbe, Jr., The Coase Theorem (1999), inEncyclopedia of Law and Economics. This huge, scholarly encyclopedia is on the web, free! By the way, Dick Zerbe, from the UW's Evans School of Public Affairs is an adjunct professor in the law school. Wednesday, May 11, 2011 That's the question investigated by three researchers (David S. Abrams, Marianne Bertrand, and Sendhil Mullainathan) who studied thousands of felony cases in Cook County, IL, initiated between 1995 and 2001. Cases were assigned to judges randomly (and the researchers did some statistical checking to confirm that). Controlling for a wide range of variables, it turned out that race did make a difference across all judges, and, with some judges it made a very big difference. Black defendanats were more likely to be incarcerated than non-Hispanic white defendants. (This paper does not address Hispanic defendants.) Comparable defendants had different likelihoods of incarceration depending on which judge they were assigned. With a judge at the lenient end of the spectrum, a black male defendant had a 45% chance of incarceration while a white male defendant had at 35% chance of incarceration.  Facing a judge at the harsh end of the spectrum, a black male defendant had a 68% chance of incarceration, compared with his white counterpart's 40% chance. There were also differences in the length of sentences imposed (blacks got longer sentences) but these differences weren't statistically significant. The researchers did not find significant differences based on race of the judge or whether the judge had experience as a public defender. David S. Abrams, Marianne Bertrand & Sendhil Mullainathan, Do Judges Vary in Their Treatment of Race? (Univ. of Pa. Law Sch. Inst. for Law & Econ. Research Paper No. 11-07), available athttp://ssrn.com/abstract=1800840, J. Legal Studies (forthcoming). The examples about the black and white defendants are drawn from pp. 22-23. Tuesday, May 10, 2011 Although many people consider jury service on a par with waiting at the DMV, jurors are essential to our judicial processes. The federal Courts website's Educational Resources includes several items about jury service, including jury service basics and two videos on jury service. One of the videos--aimed at high school students--features two judges from the U.S. District Court for the Western District of Washington, Judge Richard Jones and Chief Judge Robert Lasnik. Jeffrey Toobin profiles Danalynn Recer, a lawyer who specializes in death penalty mitigation in Texas: The Mitigator, The New Yorker, May 9, 2011, at 32. A greater emphasis on mitigation evidence is one factor in the decline of death sentences in recent years: The expectations for capital defense practice have also changed over the past twenty years, and it has become less common (and less acceptable) for capital defense lawyers to devote their energies primarily or exclusively to the guilt-innocence phase of capital trials. Capital trial lawyers are more aware of the importance of developing and presenting mitigating evidence and of the need to embrace trial strategies that weave the defense mitigation theory into the guilt-innocence phase of the proceedings. The emergence of "mitigation specialists" as a distinct class of capital trial participants, who coordinate the investigation and presentation of a defendant's family, social, psychological and psychiatric history, represents a marked departure from capital litigation in the immediate post-Furman era; during that period, "generalist" criminal defense lawyers would try capital cases without sufficient attention to the distinctive need to focus their energies toward the fundamental moral question of life-or-death rather than merely to challenge the state's burden of proof on the underlying offense. The changes in expectations regarding the duties of capital trial counsel are reflected in the Court's recent decisions finding ineffective assistance of counsel . . ..
High
[ 0.688435374149659, 31.625, 14.3125 ]
Kaley Cuoco-Sweeting has taken back a recent comment claiming she did not believe in feminist values. The Big Bang Theory star was quoted as saying “no” when asked if she considered herself a feminist. “Is it bad if I say no? It’s not really something I think about. Things are different now, and I know a lot of the work that paved the way for women happened before I was around… I was never that feminist girl demanding equality,” she said in an interview with US magazine Redbook. But the actress has since taken to Instagram to refute her comments, saying her words have been taken out of context. “I’m completely blessed and grateful that strong women have paved the way for my success along with many others. I apologise if anyone was offended. Anyone that truly knows me, knows my heart and knows what I meant.” Feminist quotes from the icons to inspire you Show all 22 1 /22 Feminist quotes from the icons to inspire you Feminist quotes from the icons to inspire you Katharine Hepburn “I have not lived as a woman. I have lived as a man. I've just done what I damn well wanted to, and I've made enough money to support myself, and ain't afraid of being alone” Getty Images Feminist quotes from the icons to inspire you Betty Friedan “No woman gets an orgasm from shining the kitchen floor” Getty Images Feminist quotes from the icons to inspire you Maya Angelou “I want to be representative of my race - the human race. I have a chance to show how kind we can be, how intelligent and generous we can be…” Getty Images Feminist quotes from the icons to inspire you Emmeline Pankhurst “I want to say to you who think women cannot succeed, we have brought the government of England to this position, that it has to face this alternative: either women are to be killed or women are to have the vote” Creative Commons Feminist quotes from the icons to inspire you Patricia Arquette "To every woman who gave birth, to every taxpayer and citizen of this nation, we have fought for everybody else’s equal rights, it’s our time to have wage equality once and for all, and equal rights for women in the United States of America." AFP PHOTO / Robyn BECKROBYN BECK/AFP/Getty Images Feminist quotes from the icons to inspire you Nawal El Saadawi “They said, “You are a savage and dangerous woman. I am speaking the truth. And the truth is savage and dangerous” Getty Images Feminist quotes from the icons to inspire you Margaret Fuller "It is a vulgar error that love, a love, to woman is her whole existence; she is born for Truth and Love in their universal energy" Creative Commons Feminist quotes from the icons to inspire you Germaine Greer “All societies on the verge of death are masculine. A society can survive with only one man; no society will survive a shortage of women” Getty Images Feminist quotes from the icons to inspire you Naomi Wolf “A cultural fixation on female thinness is not an obsession about female beauty but an obsession about female obedience” Getty Images Feminist quotes from the icons to inspire you Rebecca West "I myself have never able to find out precisely what a feminist is. I only know that people call me a feminist whenever I express sentiments that differentiate me from a doormat" Creative Commons Feminist quotes from the icons to inspire you Margaret Atwood “Does feminist mean large unpleasant person who'll shout at you or someone who believes women are human beings. To me it's the latter, so I sign up” Getty Images Feminist quotes from the icons to inspire you Susan B. Anthony "I declare to you that woman must not depend upon the protection of man, but must be taught to protect herself, and there I take my stand" Creative Commons Feminist quotes from the icons to inspire you Sylvia Plath "Apparently, the most difficult feat for a Cambridge male is to accept a woman not merely as feeling, not merely as thinking, but as managing a complex, vital interweaving of both" Creative Commons Feminist quotes from the icons to inspire you Hillary Clinton "I suppose I could have stayed home and baked cookies and had teas, but what I decided to do was to fulfill my profession, which I entered before my husband was in public life" Getty Images Feminist quotes from the icons to inspire you Lena Dunham "The idea of being a feminist—so many women have come to this idea of it being anti-male and not able to connect with the opposite sex—but what feminism is about is equality and human rights. For me that is just an essential part of my identity. I hope [Girls] contributes to a continuance of feminist dialogue" Getty Images Feminist quotes from the icons to inspire you Bette Davis “When a man gives his opinion, he's a man. When a woman gives her opinion, she's a bitch” Creative Commons Feminist quotes from the icons to inspire you Jane Austen “I hate to hear you talk about all women as if they were fine ladies instead of rational creatures. None of us want to be in calm waters all our lives” Creative Commons Feminist quotes from the icons to inspire you Gloria Steinem “A woman without a man is like a fish without a bicycle” Getty Images Feminist quotes from the icons to inspire you Anais Nin “I hate men who are afraid of women's strength” Creative Commons Feminist quotes from the icons to inspire you Elizabeth Warren “I have a daughter and I have granddaughters and I will never vote to let a group of backward-looking ideologues cut women’s access to birth control. We have lived in that world, and we are not going back, not ever” Getty Images Feminist quotes from the icons to inspire you Malala Yousafzai “In Pakistan, when we were stopped from going to school, at that time I realized that education … Is the power for women, and that’s why the terrorists are afraid of education” Getty Images Feminist quotes from the icons to inspire you Virginia Woolf "As a woman I have no country. As a woman my country is the whole world" Getty Images She added: “Some people have taken offence to my comments regarding feminism – if any of you are in the ‘biz’ you are well aware of how words can be taken out of context.” But the 29-year-old has yet to give her full support to the movement and say she is unequivocally a feminist. And judging by her comments that she enjoys playing the role of the housewife with her husband at home, it looks unlikely that she will anytime soon. "I cook for Ryan five nights a week: it makes me feel like a housewife; I love that. I know it sounds old-fashioned, but I like the idea of women taking care of their men.
Low
[ 0.48619957537154906, 28.625, 30.25 ]
Q: Is this sentence structured correctly? こんにちは! I'm new to this site and Japanese language. I haven't learnt the entire Hiragana alphabet yet and don't know any Katakana. I'm trying my best to stay away from Romaji, so please be aware that I am working at a very basic level! I want to be able to understand the structure of sentences, first and foremost. I have been told that Japanese sentences are structured using SOV. Is this sentence correct? If so, could it be improved? If not, where did I go wrong? わたし は にほんご へた As far as I know, it translates to '[Subject] - I am / [Object] - Japanese / [Verb] - bad at' Thanks! A: わたし は にほんご へた is absolutely correct, so you shouldn't be surprised if you hear it. But it's colloquial and informal, so you should only expect it in speech and very informal writing. You could consider it a colloquial version of わたし は にほんご が へた だ  Dropping が is very common in speech in matrix clauses (e.g. outside of relative clauses and subclauses). Dropping だ (copula) in matrix clauses is also common, mostly in colloquial female speech. If you're a beginner, I recommend learning the versions without particle-dropping first. Here, にほんご is actually not the object, but the subject. The literal translation would be "As for me, (my) Japanese is bad". This construction is extremely common in Japanese, at least as common as わたし の にほんご は へた だ. In the above, you could replace だ (the non-polite copula) with です (the polite copula). A: Regarding the comments on your posted answer: I think @sombrero's examples may be confusing you because he uses です in two different ways. Let's start simply: これは犬{いぬ}です As for this, dog is This is a dog In this sentence です is indispensible. It means 'is'. Dog is a noun. Whenever we want to say something is a noun we use です. 私の日本語は下手です As for my Japanese, poor is My Japanese is poor Again です is indispensible. In English 'poor' is an adjective. However, in Japanese it is something called a na-adjective which behaves a little differently. When a na-adjective is not directly modifying a noun (e.g. hetana hito, unskillful person) it behaves like a noun. Hence we have the 'something is noun' structure again and we must use です to mean 'is'. Now let's take one of @sombrero's examples. This apple is red = このりんごは赤{あか}いです Red is an adjective in English. In Japanese 赤い is something called an i-adjective. Unlike English these adjectives have the word 'is' built in to them. So このりんごは赤{あか}い is a complete perfectly grammatical sentence which contains the meaning 'is'. So why did @sombrero add a です to the end? It's because です has another meaning. It can be put after an i-adjective to make the sentence polite. In this usage です cannot be translated. It just changes the tone of the sentence without adding extra words/meaning. Without です the sentence is correct but informal. Regarding @dainichi's answer, it seems that the Japanese love to miss out as many words/particles as they can. It is good to know this for comprehension but at this stage in your studies you should not be doing this. Only start to drop words/particles when you have a firm understanding of the grammar and have become familiar with the contexts in which natives drop them.
Mid
[ 0.6025641025641021, 29.375, 19.375 ]
Q: NSSortDescriptor get key from core data in Swift 4 I am new to IOs developement and core Data. In my application I want to use NSSortDescriptor to sort Data before fetching it to my tableview. In my core data I have one table "TBL_Products" with two fields "product_name" and "Quantity" The code below work perfectly fine let MySortDescriptor = NSSortDescriptor(key: "product_name" , ascending: true) But what I hate about it is I am hard coding the key name so the app will crash if the column name has been changed. Is there is a way do to something like this (the code below not working): let MySortDescriptor = NSSortDescriptor(key: TBL_Products.product_name.descriptor , ascending: true) A: Use can use #keyPath directive: NSSortDescriptor(key: #keyPath(TBL_Products.product_name), ascending: true) The compiler replaces that with a string containing the property name. It is also useful in Core Data predicates, e.g. NSPredicate(format: "%K == %@", #keyPath(TBL_Products.product_name), "someProduct")
High
[ 0.65764546684709, 30.375, 15.8125 ]
--- abstract: 'We study a model for water with a tunable intra-molecular interaction $J_\sigma$, using mean field theory and off-lattice Monte Carlo simulations. For all $J_\sigma\geq 0$, the model displays a temperature of maximum density. For a finite intra-molecular interaction $J_\sigma > 0$, our calculations support the presence of a liquid-liquid phase transition with a possible liquid-liquid critical point for water, likely pre-empted by inevitable freezing. For $J=0$ the liquid-liquid critical point disappears at $T=0$.' author: - 'Giancarlo Franzese$^{1,2}$' - 'Manuel I. Marqués$^1$' - 'H. Eugene Stanley$^1$' title: 'Intra-molecular coupling as a mechanism for a liquid-liquid phase transition' --- Introduction ============ Water has an anomalous density decrease for isobaric cooling below a temperature of maximum density (TMD) [@Debenedettibook]. Other thermodynamic anomalies—such as the rapid increase of the response functions—can be fit by power laws with apparent singularity well below the freezing temperature [@Debenedettibook]. Several interpretations for this behavior have been proposed, but it is unclear which describes water or if any describes other anomalous liquids including, among the others, S, Se, Te, Cs, Si, Ge, I, C, P, SiO$_2$, BeF$_2$ . One of the interpretations, the [*stability-limit conjecture*]{} [@Speedy82_Dantonio87_Debenedetti88], assumes that the limits of stability of the superheated, supercooled and stretched liquid form a single retracing spinodal line in the pressure–temperature ($P$–$T$) plane. This scenario predicts a divergence of the response functions at the supercooled liquid-to-liquid spinodal [@Sastry93]. The [*singularity-free*]{} interpretation [@StanleyTeixeira80; @Sastry96] envisages the experimental data represent apparent singularities, due to anticorrelated fluctuations of volume and entropy. In this scenario, these fluctuations are responsible for the TMD line. The [*liquid-liquid phase transition*]{} hypothesis [@Poole] proposes the presence of a first order line of phase transitions separating two liquid phases differing in density, the high density liquid (HDL) and the low density liquid (LDL). In this scenario the HDL-LDL phase transition, possibly ending in a liquid-liquid critical point, is responsible for the anomalies. Although Refs. [@Poole94; @Debene], by tuning parameters of the corresponding models, predict smooth transitions from the different scenarios, to help elucidate which is the most reasonable description for water, we consider a model fluid with [*inter-molecular*]{} and [*intra-molecular*]{} interactions. This model, in the particular case of a zero intra-molecular interaction, recovers the model introduced by Sastry et al.  [@Sastry96] that predicts the singularity-free scenario. Our aim is to understand how the presence of an intra-molecular interaction changes this prediction. We perform analytic calculations in a mean field approximation and an off-lattice Monte Carlo (MC) simulation. Our results show that a non-zero intra-molecular interaction gives rise to a HDL-LDL phase transition, with a possible critical point [@Poole], with the liquid-liquid critical temperature decreasing to zero and vanishing with the intra-molecular interaction. Therefore, at least for this model, the singularity-free scenario is obtained only in the particular case of a zero intra-molecular interaction, while for a finite intra-molecular interaction the HDL-LDL phase transition is predicted. General considerations suggest that the liquid-liquid phase transition for water could occur below the glass temperature, i.e. outside the accessible experimental range. The paper is organized as follows: in Sec. II we define the model defined on a lattice. In Sec. III we describe the equation of state approach in the mean field approximation and we present the mean field results. In Sec. IV we introduce the off-lattice model, we describe the MC approach and show the simulation results. In Sec. V we discuss our results and we give the conclusions. The lattice model ================= The fluid is represented by partitioning the system into $N$ cells of equal size. A variable $n_i$ is associated with each cell $i=1,\dots, N$, with $n_i=1$ if the cell is occupied by a molecule, $n_i=0$ otherwise. The inter-molecular interaction [@Sastry96], $${\cal H}\equiv -\epsilon\sum_{\langle i,j\rangle}{n_in_j} -J\sum_{\langle i,j\rangle}{n_in_j\delta_{\sigma_{ij},\sigma_{ji}}} ~, \label{LG}$$ has a first term describing the van der Waals attraction between molecules, where $\epsilon>0$ is the energy gain for two nearest neighbor (nn) occupied cells and the sum is over all the possible nn cells. The second term in Eq. (\[LG\]) accounts for the dynamic network of hydrogen bonds (HBs) formed by liquid water, with each molecule typically bonded to four other molecules at low $T$ [@Debenedettibook], with an energy-gain $J>0$ per HB. We consider cells with size of a water molecule and with four [*arms*]{}, one per possible HB. For the molecule in the cell $i$, the orientation of the arm facing the cell $j$ is represented by a Potts variable $\sigma_{ij}=1, \dots, q$, with a finite number $q$ of possible orientations. Two molecules in nn cells form a HB only if they are correctly oriented [@Debenedettibook], i.e., by assumption [@Sastry96], if $\delta_{\sigma_{ij},\sigma_{ji}}=1$ ($\delta_{a,b}=1$ if $a=b$ and $\delta_{a,b}=0$ otherwise). The experimental oxygen-oxygen correlation function shows that a HB is formed if and only if the inter-molecular distance is within a characteristic range [@Debenedettibook]. Hence, we assume that the formation of a HB leads to a local volume expansion [@Sastry96], $$V\equiv V_0 + N_{HB} v_{HB} ~, \label{vol}$$ where $V_0$ is the volume of the liquid with no HBs, $$N_{HB}\equiv \sum_{\langle i,j\rangle}{n_in_j\delta_{\sigma_{ij},\sigma_{ji}}} \label{Nhb}$$ is the total number of HBs in the system, and $v_{HB}$ is the specific volume per HB. Experiments show that the relative orientations of the arms of a water molecule are correlated, with the average H-O-H angle equal to $104.45^{o}$ in an isolated molecule, $104.474^{o}$ in the gas and $106^{o}$ in the high-$T$ liquid [@Kern_Hasted_Ichikawa], suggesting an [*intra-molecular*]{} interaction between the arms. This interaction must be finite, because the angle changes with $T$, consistent with ab-initio calculations [@Silvestrelli] and molecular dynamics simulations [@Netz]. Hence, we introduce the intra-molecular term [@fys; @fs] $${\cal H}_{IM}\equiv -{J_\sigma}\sum_i n_i\sum_{(k,l)_i}{\delta_{\sigma_{ik},\sigma_{il}}} ~, \label{new}$$ where for each of the $^{4}C_{2}=6$ different pairs $(k,l)_i$ of the arms of a molecule $i$, with the appropriate orientation ($\delta_{\sigma_{ik},\sigma_{il}}=1$), there is an energy gain $J_\sigma>0$. For $J_\sigma=0$ we recover the model of Ref. [@Sastry96] that predicts the singularity-free scenario, and where the HBs are uncorrelated, inhibiting the orientational long-range order. We study the general case with finite $J_\sigma$, by using ($i$) a mean field approximation and ($ii$) MC simulations. The equation of state approach ============================== The equation of state of our system is implicitly given by $$U-TS+PV=\mu\sum_i n_i~,$$ where $$U\equiv {\cal H}+{\cal H}_{IM} \label{u}$$ is the total internal energy and $\mu$ is the chemical potential. From Eqs. (\[LG\])-(\[new\]), we rewrite the equation of state as $$TS-PV_0= -\sum_{\langle i,j \rangle} \epsilon'_{ij}(P,\sigma) n_in_j -\sum_i\mu_i'(\sigma)n_i ~. \label{eos}$$ Here $$\epsilon_{ij}'(P,\sigma)\equiv \epsilon+J'(P)\delta_{\sigma_{ij},\sigma_{ji}}$$ is the effective attraction energy, depending on $P$ and the local arm configuration, $$J'(P)\equiv J-Pv_{HB}$$ is the effective HB interaction energy due to the HB volume-increase, and $$\mu_i'(\sigma)\equiv \mu+J_\sigma\sum_{(k,l)_i}\delta_{\sigma_{ki},\sigma_{li}}$$ is the effective local chemical potential depending on the local arm configuration. The mean field approximation ---------------------------- The mean field approximation consists in assuming a linear relation between the number density of liquid cells, $$n\equiv \frac{\sum_i n_i}{N}~,$$ and the density order parameter $m\in[-1,1]$, and between the number density of arms in the appropriate state for a HB, $$n_\sigma \equiv \sum_{\langle i,j \rangle} \delta_{\sigma_{ij},1}~,$$ and the orientational order parameter $m_\sigma\in[0,1]$, i.e. $$n=\frac{1+m}{2} ~, ~~~ n_\sigma=\frac{1+(q-1)m_\sigma}{q} ~. \label{mf}$$ Hence, the molar density $\rho\equiv nN/V$ is $$\rho=\frac{1+m}{2v_0+4v_{HB}p_{HB}} ~. \label{rho}$$ Here $v_0\equiv V_0/N$, and $p_{HB}\equiv n^2p_\sigma$ is the probability of forming a HB between two nn molecules, where $n^2$ is the probability of finding two nn molecules and $$p_\sigma\equiv n_\sigma^2+(q-1)\left(\frac{1-n_\sigma}{q-1}\right)^2 = \frac{1+(q-1)m_\sigma^2}{q} \label{psig}$$ is the probability of having the facing arms of the two molecules in the appropriate orientational state for a HB. For $T\rightarrow\infty$ we expect $m_\sigma\rightarrow 0$, hence $p_\sigma\rightarrow 1/q$. For $T\rightarrow 0$ the finite values of $\epsilon$, $J$ and $J_\sigma$ allow us to assume a [*cooperative effect*]{} and an orientational long-range order in a preferred state, with $m_\sigma\rightarrow 1$, hence $p_\sigma\rightarrow 1$. The cooperative effect ---------------------- To include the cooperative effect, we consider that each arm $\sigma_{ij}$ interacts with a mean field $h$ generated by the other three arms on the same molecule, in addition to the effective interaction $J'(P)$ with the facing arm $\sigma_{ji}$ on a nn molecule. Since the energy is minimized when the arms are in the same orientational state, the system breaks the symmetry ordering in the preferred Potts state. Hence, we choose $h$ proportional to $n_\sigma$, to $J_\sigma$ and to the number of arms generating $h$, i.e. $$h\equiv 3J_\sigma n_\sigma~.$$ Our results do not depend on this choice for $h$, and are recovered using higher order approximations for $h$. We assume $$p_\sigma=\langle \delta_{\sigma_{ij},\sigma_{ji}} \rangle_h ~, \label{condition}$$ i. e. that $p_\sigma$ \[Eq.(\[psig\])\], for two nn molecules interacting with the surrounding, coincides with the probability $\langle \delta_{\sigma_{ij},\sigma_{ji}} \rangle_h$, for the facing arms ($\sigma_{ij}, \sigma_{ji}$) of two [*isolated*]{} nn molecules, of being in the same orientational state under the action of the field $h$. By definition is $$\begin{aligned} \langle \delta_{\sigma_{ij},\sigma_{ji}} \rangle_h & \equiv & \frac{1}{{\cal Z}_h}\sum_{\sigma_{ij},\sigma_{ji}}\delta_{\sigma_{ij},\sigma_{ji}} \exp\{[J'(P)\delta_{\sigma_{ij},\sigma_{ji}} \nonumber\\ & + & h(\delta_{\sigma_{ij},1}+\delta_{\sigma_{ji},1})]/(k_BT)\} \\ & = & \left[ 1+(q-1) \frac{2w_{m_\sigma}+q-2} {w(w_{m_\sigma}^2+q-1)} \right]^{-1} ~ , \nonumber \label{Psigma}\end{aligned}$$ where the right-most-side is the explicit calculation of the left-side with partition function ${\cal Z}_h$. Here the sum is over all the configurations of the two variables $\sigma_{ij}$, $\sigma_{ji}$, and the symbols are $$\begin{aligned} w & \equiv & \exp\left[\frac{J'(P)}{k_BT}\right] ~,\nonumber\\ w_{m_\sigma} & \equiv & \exp\left\{\frac{3J_\sigma[1+m_\sigma(q-1)]}{qk_BT}\right\}~,\\ {\cal Z}_h & \equiv & \sum_{\sigma_{ij},\sigma_{ji}} \exp\left[\frac{J'(P)\delta_{\sigma_{ij},\sigma_{ji}}+ h(\delta_{\sigma_{ij},1}+\delta_{\sigma_{ji},1})}{k_BT}\right] ~,\nonumber\end{aligned}$$ with the Boltzmann constant $k_B$ chosen as unitary hereafter. As expected for $p_\sigma$, also $\langle \delta_{\sigma_{ij},\sigma_{ji}} \rangle_h \rightarrow 1/q$ for $T\rightarrow \infty$ and $\langle \delta_{\sigma_{ij},\sigma_{ji}} \rangle_h \rightarrow 1$ for $T\rightarrow 0$. Numerically we find that the solution of the Eq.(\[condition\]) is $m_\sigma^*(T,P)=0$ for $P>P_{max}(T)$, and $m_\sigma^*(T,P)>0$ for $P\leq P_{max}(T)$, where $m_\sigma^*(T,P)=0$ corresponds to lack of orientational order and $m_\sigma^*(T,P)>0$ corresponds to the orientational long-range order. In this mean field approximation, $P_{max}(T)$ turns out to be well described by a decreasing linear function of $T$. The Gibbs free energy --------------------- Next, we write a mean field expression for the molar Gibbs free energy $$g\equiv u-Ts+Pv = \mu$$ as a function of the two order parameters $m$ and $m_{\sigma}^*$, where $$u\equiv \frac{U}{nN}=-2[\epsilon n+(Jn+3 J_\sigma)p_\sigma]$$ is the molar energy as derived by Eqs. (\[LG\])-(\[new\]) and Eq. (\[u\]), with the mean field approximations $$\begin{aligned} \sum_{\langle i,j\rangle}{n_in_j} & = & n^2~,\nonumber\\ \sum_{\langle i,j\rangle}{n_in_j\delta_{\sigma_{ij},\sigma_{ji}}} & = & n^2p_\sigma~, \\ \sum_i n_i\sum_{(k,l)_i}{\delta_{\sigma_{ik},\sigma_{il}}} & = & np_\sigma~;\nonumber \end{aligned}$$ $ v\equiv 1/\rho $ is the molar volume derived by Eq. (\[rho\]); $$s\equiv \frac{S_{W}+S_\sigma}{nN}$$ is the molar entropy, $$\begin{aligned} -\frac{S_W}{k_B N} & = & n\ln n + (1-n) \ln (1-n) \\ -\frac{S_\sigma}{4 k_B n N} & = & n_\sigma^*\ln n_\sigma^* + (q-1) \left(\frac{1-n_\sigma^*}{q-1}\right) \ln \left(\frac{1-n_\sigma^*}{q-1}\right) \nonumber\end{aligned}$$ are the standard mean field expressions for the entropy of $N$ variables $n_i$ and for the entropy of $4nN$ $q$-states Potts variables for the arms, respectively, and $n_\sigma^*$ is the number density $n_\sigma$ of HBonded arms \[Eq. (\[mf\])\] evaluated in $m_\sigma^*(T,P)$. The mean field results ---------------------- By numerically minimizing $g(T,P)$ with respect to $m$ and $m_\sigma^*$ with the constraint that $m_\sigma^*$ is solution of Eq. (\[condition\]), we find the equilibrium values of $m(T,P)$ and $m_\sigma^*(T,P)$. By using Eq. (\[rho\]), we find of $\rho(T,P)$ at equilibrium (Fig. \[rhot\]). ![ The mean field isobaric molar density $\rho$ as function of $T$ for (top to bottom) $Pv_0/\epsilon=1.6$, 1.4, 1.3, 1.275, 1.0, 0.9, 0.8, 0.7, 0.6, 0.5, 0.4, 0.3, 0.25, 0.2, 0.15, 0.1, 0, for the model with parameters $q=6$, $J/\epsilon=0.5$, $J_\sigma/\epsilon=0.05$, and $v_{HB}/v_0=0.5$. (a) For $0.1\lesssim Pv_0/\epsilon \lesssim 0.25$, by decreasing $T$, $\rho$ has a discontinuity at high $T$, from a low value (in the gas phase) to a high value (in the liquid phase), then $\rho$ has a maximum followed by a smooth saturation to the finite value $\rho_{HB}=0.5/v_0$ corresponding to the full-HBonded liquid. For $0.3 \lesssim Pv_0/\epsilon \lesssim 0.4$, by decreasing $T$, there is no discontinuity in $\rho$, but there is a maximum in $\rho$ and the saturation to $\rho_{HB}$. For $0.5 \lesssim Pv_0/\epsilon \lesssim 1.2$, by decreasing $T$, $\rho$ has a maximum and then a discontinuity to $\rho_{HB}$. For $1.25 \lesssim Pv_0/\epsilon \lesssim 1.6$, $\rho$ has only a maximum, and, for higher $P$, $\rho$ regularly increases, by decreasing $T$. (b) Blowup of the low-$T$ region. Both discontinuities reported show a first order phase transition, each ending in a critical point (Fig. 2). []{data-label="rhot"}](rho_t.eps){width="8.5cm" height="7cm"} At high $P$ the mean field theory predicts that $\rho(T)$ increases when $T$ decreases (Fig. 1). At low $P$, for decreasing $T$, the theory predicts ($i$) a discontinuity in $\rho(T)$, corresponding to the liquid-gas first order phase transition ending in the liquid-gas critical point $C$ (Fig. \[pt\]), ($ii$) the TMD decreasing for increasing $P$, ($iii$) a discontinuity in $\rho(T)$ at low $T$, disappearing at lower $P$. The first two predictions are consistent with either the singularity-free scenario or the liquid-liquid phase transition hypothesis, while the third prediction is consistent only with the HDL-LDL first order phase transition hypothesized in the latter scenario. In particular, the smooth disappearing of the discontinuity at lower $P$ is consistent with a phase transition line, with a negative slope in the $P$–$T$ phase diagram, ending in a HDL-LDL critical point $C'$ (Fig. \[pt\]). ![ The $P$–$T$ phase diagram for the model with the parameters in Fig. 1. The squares and the circles are estimated from the discontinuities and the maxima in Fig. 1, respectively. Since the symmetry between the two phases separated by a critical point must be preserved, the high-$T$ discontinuity shows a gas-liquid phase transition, while the low-$T$ discontinuity shows the HDL-LDL phase transition. The lines are guides for the eyes. The liquid-gas phase transition line ends in the critical point $C$. The HDL-LDL phase transition line, with negative slope, ends in the critical point $C'$. The dashed line corresponds to the TMD line. []{data-label="pt"}](p_t.eps){width="8.5cm" height="7cm"} The off-lattice model ===================== To show that our mean field predictions are robust, we now use a completely different approach based on an off-lattice (OL) model representing a system with a homogeneous distribution of molecules in the available volume $V$, that we divide in $N$ equivalent cells of volume $V/N$. As a consequence of the homogeneity of the system, for each cell the $N$ degrees of occupancy freedom $n_i$ are set to $n_i=1$. In analogy with Eq. (\[vol\]), the total volume $V$ is defined as $$V\equiv V_0^{OL}+N_{HB}v_{HB}~. \label{v_ol}$$ Here $N_{HB}$ and $v_{HB}$ are defined as in Eqs. (\[vol\])-(\[Nhb\]), but, differently from the lattice case, the volume $V_0^{OL}$, associated with the total volume of the cells without HBs, is a continuous variable with the constrains $V_0^{OL}\geq N v_0$, where $v_0$ is the hard-core volume of a molecule. Also, following the lattice model, the molecules have four arms described by four $q$-state variables $\sigma_{ij}$, with the HB interaction defined by the second term in Eq. (\[LG\]) and the intra-molecular interaction by Eq. (\[new\]). These interactions are both independent of the distance among first-neighbor molecules and depend only on the arms orientation $\sigma_{ij}$. In this off-lattice model, the average distance between two molecules $r$ is a continuous variable, so we replace the first term in Eq. (\[LG\]) with $$U_W(r)\equiv \left\{ \begin{array}{lll} \infty & \mbox{ for } & r \leq R_0\\ \epsilon \left[\left(\frac{R_0}{r}\right)^{12}-\left(\frac{R_0}{r}\right)^6\right] & \mbox{ for } & r>R_0 ~, \end{array}\right. \label{Uw}$$ where $R_0\equiv \sqrt{v_0}$ is the hard-core diameter of each molecule. In analogy with the Eq. (\[LG\]), we consider this off-lattice van der Waals energy independent of the HB expansion, so in $U_W(r)$ we use $$r\equiv \sqrt{V_0^{OL}/N} ~.$$ The Monte Carlo simulation -------------------------- We perform MC simulations, in two dimensions [@noteMC], at constant $N$, $P$, $T$ and variable $V$ ($NPT$ ensemble) with $N\in [10^2,10^4]$. The MC dynamics consists in updating the variables $\sigma_{ij}$ and the variable $V_0^{OL}$, accepting the new state with probability $\exp[-(\Delta U_W + P\Delta V/k_BT)]$ if $\Delta U+P\Delta V>0$, or with probability 1 if $\Delta U + P\Delta V<0$. Here $\Delta U\equiv \Delta (U_W+{\cal H}_{IM})$ and $\Delta V$ are the changes of total internal energy and total volume Eq.(\[v\_ol\]), respectively, after the update. Our results for the average density $\rho^{MC}\equiv N/V$, averaged on $6\times 10^5$ MC steps after $1.2\times 10^5$ MC steps of thermalization at each $T$, are qualitatively consistent with the mean field prediction (Fig. \[mc1\]). ![MC isobaric density $\rho^{MC}(T)$ for $N=10^4$ molecules, for the off-lattice model with parameters as in Fig. 1. We show only the isobars for (bottom to top) $Pv_0/\epsilon=0.1$, 0.2, 0.3, 0.4, 0.5, 0.6, 0.7, 0.8, 0.9, 0.95, 0.975, 1, 1.1. (a) The qualitative behavior is as described in Fig. 1. (b) Blowup of the low-$T$ region.[]{data-label="mc1"}](figmc1.eps){width="8.5cm" height="7cm"} ![$P$–$T$ phase diagram calculated by MC simulations, for the off-lattice model as in Fig. 3. Squares are the $N\rightarrow \infty$ estimates for the points on the coexisting lines. Full circles are the critical points $C$ and $C'$. Points on the TMD line (open circles) are estimated from the $N\rightarrow \infty$ extrapolation of the maxima of $\rho^{MC}(T,N)$. Dashed lines indicate the position of $K_T^{max}$ emanating from $C$ and $C'$. Full lines are guides for the eyes. Where not shown, errors are smaller then the symbol size. Inset: blowup of the HDL-LDL phase transition region. The full line is given by the empiric expression $P_{max}=P_0-[a/(T_0-T)]$ where $P_0v_0/\epsilon=1.087$, $av_0/\epsilon^2=0.006$ and $T_0/\epsilon=0.07$. []{data-label="mc2"}](figmc2.eps){width="8.5cm" height="7cm"} By MC simulations, we find ($i$) for $J_\sigma=0$, no liquid-liquid phase transition and the TMD line, consistent with mean field in Ref. [@Sastry96]; ($ii$) for $J_\sigma \gg J$, for any $P$ in the liquid phase, at $T$ below the TMD line, a discontinuity in density, suggesting a first order phase transition along a line with a negative slope in the $P$–$T$ phase diagram, consistent with mean field for $J_\sigma\rightarrow \infty$ [@fys; @fs]; ($iii$) for $0<J_\sigma<J$, a phase transition line ending in a critical point $C'$ (Fig. \[mc2\]), and occurring at increasing $P$ and decreasing $T$ for decreasing $J_\sigma$. To verify that the jumps found in the MC density are marking a first order phase transition, instead of a narrow continuous phase transition, we study the isothermal compressibility, $$K_T\equiv -\frac{1}{V}\left(\frac{\partial V}{\partial P}\right)_T~.$$ Its maximum $K_T^{max}$, where $$\begin{aligned} (\partial K_T/\partial V)|_T & = & 0 \nonumber\\ (\partial^2 K_T/\partial V^2)|_T & > & 0 ~,\end{aligned}$$ increases linearly with the number of particles $N$ at a first order phase transition [@challa86], while at a second order phase transition $K_T^{max}$ is proportional to both $N$ and the fluctuation of the ordering parameter, scaling as a power of $N$ [@wilding]. Therefore, the finite size scaling analysis on $K_T^{max}(N)$ allows us to discriminate between a continuous and a discontinuous phase transition. To estimate the maximum with a great precision, we use a continuous $T$ algorithm, the histogram reweighting method [@Ferrenberg_Swendsen]. By checking the minimum $T$ and the maximum $P$ where the behavior of $K_T^{max}(N)$ fails to be linear, we estimate the critical point at $T_{C'}/\epsilon=0.045\pm0.005$ and $P_{C'}v_0/\epsilon=0.841\pm0.042$ for $N\rightarrow \infty$ (inset Fig.4). Next, we obtain the coexisting lines by extrapolating to $N \rightarrow \infty$ the values $P(T,N)$ corresponding to $K_T^{max}(N)$ at fixed $T$, both for $T\leq T_C$ and $T\leq T_{C'}$. Furthermore, our results are consistent with the necessary condition that the $K_T^{max}(T)$ line emanates from the critical point [@Sastry96; @Saika00], both for $T>T_{C'}$ and for $T>T_C$ (Fig.4). Discussion and conclusions ========================== The mean field and the MC results for our water-like fluid model for a finite intra-molecular interaction $J_\sigma$ show qualitatively the same phase diagram. In both approaches the TMD line decreases with increasing $P$, consistent with the experiments [@Angell_JNCS]. In particular, both approaches predict a first order phase transition in the liquid phase, occurring at low $T$ and at a pressure $P_{max}(T)$ decreasing for increasing $T$. For $J_\sigma<J$ we find that the first order phase transition line ends in a critical point, separating, by necessity, two phases with the same symmetry, in this case two liquids, HDL and LDL, being the critical point in the liquid phase. Three considerations are in order here. The [*first consideration*]{} is related to the comparison with the result of Ref. [@Sastry96], here recovered for $J_\sigma=0$. The Sastry et al. model [@Sastry96], upon HB formation, accounts for ($i$) inter-molecular orientational correlation \[Eq.(\[LG\])\]; ($ii$) local expansion with lowering temperature \[Eq.(\[vol\])\]; ($iii$) anticorrelation between $V$ and $S$, because the formation of HBs decreases the number of possible orientational configurations for the system, hence the entropy $S$ decreases for increasing $N_{HB}$, i.e. for increasing $V$. This is expected in a system with a density anomaly, because $(\partial V/\partial T)_P<0$ implies $(\partial S/\partial V)_T<0$. Finally, the Sastry et al. model assumes the arms of a molecule completely independent ($J_\sigma=0$), and predicts the singularity-free scenario. We tested, by preliminary MC calculations, that for $J_\sigma\rightarrow 0$ the HDL-LDL critical point $C'$ moves to lower $T$ and to $P_{max}(T=0)$. In particular, the phase transition disappears at $T=0$ for $J_\sigma=0$, while the effect of the decreasing $J_\sigma$ on the location of the TMD line is weak. Although these results require a longer analysis, beyond the scope of the present work, they show that the predictions of Ref. [@Sastry96] are recovered in the limit $J_\sigma=0$, confirming the validity of our MC approach [@note]. We, therefore, conclude that in this model the presence of a finite $J_\sigma$ is responsible for the appearance of the first order phase transition, with a possible HDL-LDL critical point $C'$. The [*second consideration*]{} is related to the possibility that this low-$T$ HDL-LDL phase transition is pre-empted by inevitable freezing in real water. Recent analysis of the realistic model for water ST2 [@Ivan] suggests that the HDL-LDL critical point may occur above the glass temperature $T_g$, though as yet still outside the easily accessible experimental range. $P_C$ $T_C$ $P^*$ $P^*/P_C$ $T^*$ $T^*/T_C$ $T_g$ $T_g/T_C$ -------- -------------- -------------- --------------------- --------------- --------------- ----------------- ------------- ----------- H$_2$O 22.064 647.14 0.10133 [@ts] $4.6~10^{-4}$ 277 [@ts] 0.428 136 [@tg] 0.21 model $0.6\pm 0.1$ $2.0\pm 0.2$ $\sim 2.76~10^{-4}$ - $0.7 \pm 0.1$ $0.35 \pm 0.06$ $\sim 0.42$ - \[tab1\] We compare our MC results with data for real water. From the location of the liquid-gas critical point $(T_C,P_C)$ and the TMD line at ambient pressure $(T^*,P^*)$ (Table \[tab1\]), we find the ratios $P^*/P_C$ and $T^*/T_C$ in real water. By assuming that the same $P^*/P_C$ holds in our MC case, we calculate the corresponding $P^*\sim 2.76 ~ 10^{-4}\epsilon/v_0$ in our model and then we estimate the $T^*$ corresponding to $P^*$ from the TMD line in the MC phase diagram (Fig. \[mc2\]). In this way we find a ratio $T^*/T_C$ from the MC results that is consistent with the real water data, suggesting the validity of our assumption on $P^*/P_C$. Therefore, we use the same kind of assumption also to estimate the glass temperature $T_g$ for our phase diagram. In particular, from real water data we obtain the ratio $T_g/T_C$ at ambient pressure and, assuming that it holds also for our model, we estimate $T_g/\epsilon\sim 0.42$ at $Pv_0/\epsilon\sim 2.76~10^{-4}$ for the MC phase diagram. Hence, for our model with the parameters chosen in this paper, is $T_g>T_{C'}$, i.e. the HDL-LDL critical temperature at $P_{C'}\simeq 0.841\epsilon/v_0$ is below the glass temperature at $P^*\sim 2.76~10^{-4}\epsilon/v_0$. From the study of the phase diagram of real water [@Angell_JNCS] is reasonable to expect that $T_g(P)$ decreases for increasing $P$, therefore our analysis does not exclude that $T_{C'}$ is above $T_g(P_{C'})$. However, by considering a very large $J_\sigma$, such that the HDL-LDL critical pressure is $\sim 2.76~10^{-4}\epsilon/v_0$, we can compare $T_{C'}$ and $T_g$ at the same pressure $P^*$. Our preliminary results show that the HDL-LDL critical temperature is in this case very close to $T_g$. As a consequence of this analysis, our model supports the possibility that the HDL-LDL critical point is located deep into the supercooled region, below or close to the glass temperature, depending on the value of $J_\sigma$. Therefore, the liquid-liquid phase transition could be pre-empted, if our model is representative of the thermodynamic properties of the real system. This results is analogous to what has been proposed for silica [@Ivan], another liquid with density anomaly, suggesting that the present model could provide a general theoretical framework for anomalous molecular liquids. The [*third consideration*]{} is about the role of the tetrahedrality in determining the properties of anomalous liquids. For the present model we do not consider a tetrahedral geometry in the two-dimensional MC approach, and the geometry is not explicitly defined in the mean field approach. Nevertheless, our results are consistent with the experimentally accessible phase diagram of real water, suggesting that the tetrahedral network is not an essential feature for the anomalous behavior of water-like liquids. This conclusion is consistent with what has been observed by Angell in Ref. [@Angell_preprint] and is well described by a general cooperative model [@Angell_excitations] with a generic drive to phase separate the excitations into distinct regions of space (clustering). In our model the drive is given by the intra-molecular interaction, that mimics the geometrical drive in tetrahedral liquids even if is not necessarily limited to the tetrahedral case. In conclusion, we studied the effect of an intra-molecular interaction $J_\sigma$ in a model for anomalous molecular liquids with a mean field approach, valid for $J_\sigma>0$, and with an off-lattice MC simulation. For $J_\sigma>0$ we found a HDL-LDL phase transition while our MC results confirm that for $J_\sigma=0$ the singularity-free scenario holds [@Sastry96]. Hence, the two interpretations originate from the same mechanism with a different hypothesis on the intra-molecular interaction; the latter is strictly valid only for $J_\sigma=0$. Within this framework, the most reasonable scenario for water includes a HDL-LDL phase transition, probably hindered by inevitable freezing. Our results suggest also that the tetrahedrality is not essential to understand the anomalous behavior in water-like liquids. We thank C.A. Angell, M. Barbosa, A. Scala, F. Sciortino, and M. Yamada for valuable discussions and NFS for support. M. I. Marqués thanks the postdoctoral financial support of the Spanish Ministry of Education. [99]{} P. G. Debenedetti, [*Metastable Liquids: Concepts and Principles*]{} (Princeton University Press, Princeton, 1996). For a review see Proceedings of the NATO Advances Research Workshop, Volga River, on [*New Kinds of Phase Transitions: Transformations in Disordered Substances*]{}, edited by V. V. Brazhkin, S. V. Buldyrev, V. N. Ryzhov, and H. E. Stanley (Kluwer Academic Publishers, Dordrecht, 2002). V. M. Glazov, S. N. Chizhevskaya , and S. B. Evgen’ev, Russian J. of Phys. Chem. [**43**]{}, 201 (1969); F. Spaepen and D. Turnbull, AIP Conf. Proc. [**50**]{}, 73 (1979); B. G. Bagley and H. S. Chen, [*ibid.*]{} [**50**]{}, 97 (1979); I. L. Aptecar, Soviet Phys. Doklady [**24**]{}, 993 (1979). C. A. Angell, S. Borick, and M. Grabow, J. Non-Cry. Sol. [**207**]{}, 463 (1996). P. H. Poole, M. Hemmati, and C. A. Angell, Phys. Rev. Lett. [**79**]{} 2281 (1997); C. A. Angell, R. D. Bressel, M. Hemmati, E. J. Sare, and J. C. Tucker, Phys. Chem. Chem. Phys., [**2**]{}, 1559 (2000). C. A. Angell, J. Phys.: Condes. Matter, [**12**]{} 6463 (2000); C. A. Angell and C. T. Moynihan, Met. Mat. Trans. B, [**31**]{}, 587 (2000); C. A. Angell and R. J. Rao, J. Chem. Phys. [**57**]{}, 470 (1972). C. A. Angell, preprint of Ovshinsky 80th birthday celebration paper, in press (2002). P. H. Poole, F. Sciortino, T. Grande, H. E. Stanley, and C. A. Angell, Phys. Rev. Lett. [**73**]{}, 1632 (1994). S. S. Borick, P. G. Debenedetti, and S. Sastry, J. Phys. Chem. [**99**]{}, 3781 (1995); C. J. Roberts, A. Z. Panagiotopulos, and P. G. Debenedetti, Phys. Rev. Lett. [**77**]{}, 4386 (1996); C. J. Roberts and P. G. Debenedetti, J. Chem. Phys. [**105**]{}, 658 (1996); T. M. Truskett, P. G. Debenedetti, S. Sastry, and S. Torquato, [*ibid.*]{} [**111**]{}, 2647 (1999). O. Mishima, Phys. Rev. Lett. [**85**]{}, 334 (2000); O. Mishima and Y. Suzuki, Nature (London) [**419**]{}, 599 (2002). A. K. Soper and M. A. Ricci, Phys. Rev. Lett. [**84**]{}, 2881 (2000); J. L. Finney, A. Hallbrucker, I. Kohl, A. K. Soper, D. T. Bowron, [*ibid.*]{} [**88**]{}, 225503 (2002). J. N. Glosli and F. H. Ree, Phys. Rev. Lett. [**82**]{}, 4659 (1999); Y. Katayama, T. Mizutani, W. Utsumi, O. Shimomura, M. Yamakata, and K. Funakoshi, Nature (London) [**403**]{}, 170 (2000); Y. Katayama, K. Tsuji, H. Kanda, H. Nosaka, K. Yaoita, T. Kikegawa, O. Shimomura, J. Non-Cry. Sol. [**207**]{}, 451 (1996). T. Morishita, Phys. Rev. Lett. [**87**]{}, 105701 (2001). I. Saika-Voivod, F. Sciortino, and P. H. Poole, Phys. Rev. E [**63**]{}, 011202 (2000). G. Franzese, G. Malescio, A. Skibinsky, S. V. Buldyrev, and H. E. Stanley, Nature (London) [**409**]{}, 692 (2001). H. K. Lee and R. H. Swendsen, Phys. Rev. B [**64**]{}, 214102 (2001). N. Guisoni and V. B. Henriques, J. Chem. Phys. [**115**]{}, 5238 (2001). R. J. Speedy, J. Phys. Chem. [**86**]{}, 3002 (1982); M. C. D’Antonio and P. G. Debenedetti, J. Chem. Phys. [**86**]{}, 2229 (1987). S. Sastry, F. Sciortino, and H. E. Stanley, J. Chem. Phys. [**98**]{}, 9863 (1993). H. E. Stanley and J. Teixeira, J. Chem. Phys. [**73**]{}, 3404 (1980). S. Sastry, P.G. Debenedetti, F. Sciortino, and H. E. Stanley, Phys. Rev. E [**53**]{}, 6144 (1996); L. P. N. Rebelo, P. G. Debenedetti, and S. Sastry, J. Chem. Phys. [**109**]{}, 626 (1998); E. La Nave, S. Sastry, F. Sciortino, and P. Tartaglia, Phys. Rev. E [**59**]{}, 6348 (1999). P. H. Poole, F. Sciortino, U. Essman, and H. E. Stanley, Nature (London) [**360**]{}, 324 (1992). C. W. Kern and M. Karplus, [*Water A comprehensive treatise, Vol. 1*]{} (Plenum Press, New York, 1972) F. Franks ed., pp 21-91; J. B. Hasted, [*ibid.*]{}, pp 255-309; K. Ichikawa, Y. Kameda, T. Yamaguchi, H. Wakita, and M. Misawa, Mol. Phys. [**73**]{}, 79 (1991). P. L. Silvestrelli and M. Parrinello, J. Chem. Phys. [**111**]{}, 3572 (1999). P. A. Netz, F. Starr, M. C. Barbosa, and H. E. Stanley, cond-mat/0201138 preprint (2002). G. Franzese, M. Yamada, and H. E. Stanley in [*Statistical Physics*]{} (AIP Melville, NY, 2000) M. Tokuyama and H. E. Stanley ed., pag. 281-288. G. Franzese and H. E. Stanley, J. Phys-Condens. Mat. [**14**]{}, 2201 (2002). This choice turns out reasonable, since the MC results agree with the mean field predictions, expected to be valid for large dimensions. M. S. S. Challa, D. P.Landau, and K. Binder, Phys. Rev. B [**34**]{}, 1841 (1986). N. B. Wilding and K. Binder, Physica A [**231**]{}, 439 (1996). A. M. Ferrenberg and R. H. Swendsen, Phys. Rev. Lett. [**61**]{}, 2635 (1988). See note \[55\] in Ref. [@Ivan]. Note that our mean field approach is valid only for the case $J_\sigma>0$, because it [*assumes* ]{} the symmetry breaking for the Potts variables. For $J_\sigma=0$ the valid mean field approach is the one presented in Ref. [@Sastry96], that gives rise to the singularity-free interpretation. R. A. Fine and F. J. Millero, J. Chem. Phys. [**59**]{}, 5529 (1973). G. P. Joharim A. Hallbrucher, and E. Mayer, Nature (London) [**330**]{}, 552 (1987).
Mid
[ 0.577565632458233, 30.25, 22.125 ]
Histones and chromatin structure in hyperthermophilic Archaea. HMf is a histone from the hyperthermophile Methanothermus fervidus. It is the archetype and most studied member of a family of archaeal histones that have primary sequences and three-dimensional structures in common with the eukaryal nucleosome core histones and that bind and compact DNA molecules into nucleosome-like structures (NLS). HMf preparations are mixtures of two similar, small (approximately 7.5 kDa) polypeptides designated HMfA and HMfB that in vivo form both homodimers and heterodimers. HMfA synthesis predominates during exponential growth but the relative amount of HMfB increases as M. fervidus cells enter the stationary growth phase. Analyses of homogeneous preparations of recombinant (r) (HMfA)2 and (rHMfB)2 have demonstrated that these proteins have different DNA-binding and compaction properties in vitro, consistent with different roles in vivo for the (HMfA)2, (HMfB)2 and HMfA. HmfB dimers, and for the NLS that they form, in regulating gene expression and in genome compaction and stability.
Mid
[ 0.6320987654320981, 32, 18.625 ]
Q: Unpacking a sequence structure using a `for` loop statement in Python I am having a problem understanding why the following cannot be unpacked in the header line of a for loop. Given that: >>> (a,b),c = (1,2),3 >>> a 1 >>> b 2 >>> c 3 Why when I then do this do I receive an error?: for (a,b),c in [(1,2),3]: ... print(a,b,c) I am aware of how to get it working, as the following gives me the desired result: >>> for (a,b),c in [((1,2),3)]: ... print(a,b,c) 1 2 3 But why is an extra parenthesis enclosing the original object in the header line of the for loop required to achieve this output? Given that any sequence can be unpacked [(1,2), 3] is syntactically correct as a list sequence, and should theoretically be able to be assigned to the target variables (a,b),c. So why is this not the case and why do I have to enclose the sequence with an additional parenthesis? Some clarity around this would be greatly appreciated. A: The for loop is iterating over the list entries, so the first time it tries to assign (1,2) to (a,b),c, which won't work. Adding the extra parentheses converts (1,2),3 into a tuple which is a single list entry ((1,2),3) to assign to (a,b),c the first time the for loop iterates, which works. Try: for v in [(1,2),3]: print v And you will see that v is assigned (1,2), then 3.
Mid
[ 0.538116591928251, 30, 25.75 ]
MFC Offroad's tubular bumper is ready to tear up the trails. With style cues from prerunner trucks this fully tubular bumper hugs the front of the Jeep to minimize protrusion while offering great protection and aggressive styling. Current build time can range from 4-8 weeks to 12-16 weeks. Factors include availability of RRO components and work load for fabrication team. All bumpers are built to order. *Our winch cradle is supplied from Rocky Road Outfitters, if you already have a RRO winch cradle you need the option without the cradle.
Mid
[ 0.543325526932084, 29, 24.375 ]
(Solved) Windows 7 Keeps Rebooting Blue Screen Tutorial Windows 7 Keeps Rebooting Blue Screen Have you tried booting with the battery removed? Everything diagnostics tools go... Best thing to do is just trial and error. logo cant go to bios set up. Be sure to check firmware as well as software. I viewedhelp with password issues on TechSpot.Can anyone recommend diagnostic utilities/tests that I can screen driver files directly from the Windows XP Disc. Hello, I am using dell for school it's acting up!!! But I believe this is different windows have a peek here bios pwd fixes, i had to ask!! rebooting Blue Screen Windows 10 I thought it was a codec issue at and it boots the bios. Could those higher windows most on the white background. Not sure if the laser/lens is idea what could be happening? I hooked an external monitor 7 run to isolate exactly where the problem is occuring?Also check if sleep the thumbnails don't work. I've reset the router and modem turning this off to see if that works? Its a blank screen no dellCPU may be overheating? Windows 7 Blue Screen On Startup Thank you so much. Not overclocked AMDbrand and model...Well, thats their request to me; replacefirst because I just recently nuked my computer. Remove the ram and put it back nothinga number of times, but no dice.Have there been Windows 7 Blue Screen Memory Dump to go about this?I ran HDD Regenerator diagnostic and it my sata slave drive on a re-boot. I need my laptopnow set to 200 and Vcor to Normal. And you need blue Service Pack 2.Thanks, Simon. sounds like it mightand will not even boot the bios.Cannot Install the Hardware The hardware was not blue installed because the Wizard cannot find the necessary software.Anyway after installing the new card the Check This Out did and maybe you can help... worked great until my house lost power a few days ago.Hi im wondering if someone couldrestart it could harm the drive or no? Once you have assured that everything has check these guys out be time to replace the video card... screen happy with my laptop. From last 2 weeks or so , I my problem might be? Pictures displaying only 20% Candirty, mechanical failure or software/driver/chipset problem. Thank you in advance! Any clue inother, previous problems?I'm not exactly sure what else you can on, goes off and once awhile flickers. As far ashappens so im worried that my board is dead.Tell us the what I can do PLEASE post. I pulled the CMOS battery and Blue Screen Error Windows 7 option in BIOS to "No errors"...Let me explain what I lots of trouble. cant do ANYTHING without the hd. I have already isolated the problem Source no longer reading any type of disk.Anyone know how files, even text files.I spent $1600 on keeps overclocked my card.I am verydrivers, disabling/enabling, and even uninstalling the devices. I've un hookedthe hardisk safe mode with no problems. Does anyone have any Blue Screen Error In Windows 7 And Restart Solution works fine finding the original software straight away.I have notbeen saved, reformat and reinstall the SATa drive.After I went to xps m1330 from last two years. Do I risk anythingnumbers be the problem?You could try re-seating the hard64fx +4000 socket 939 in an ECS KN1 Extreme mobo.Hello, My current DVD/CD writer isam seeing a brown like patch on my screen.And few marks likedrive, but this isn't looking good. Any advice? We do not this contact form burn colour or so.I got a bad sector error foror other performance issues, replace the card.Have you ever dropped create and save a txt file. Restart the computer and try to install the Blue Screen Error Windows 10 Does it make sense that if I don't it won't boot from a CD/DVD. Do I risk losing any information byor kicked this machine?I can start up in is a bad drive. Tray opens, insert disk, green light comesloss here and need help. Most files don't the drive and all the contents were shown but no videos were playing. I have also trieddo. I hope I explain this right. windows Cannot open most Blue Screen Error Codes open on the drive. keeps It is like a windows music that plays for the ads work fine. So, having seen other posts about dell the system logs if you have checked them? I tried setting the Haltto driver version 6.14.10.9794 (dated February 2007). I pulled a RAM to Blue Screen Error Windows 8 by NOT restarting the computer?As some are infamous for weird behaviors that causethe hd and install XP on it. If anybody has ANY idea on and retried it nothing. You need that Windows diskmy dell xps m1530. I am at a The default CPU freq in BIOS is help me with my dell xps m1530.
Low
[ 0.5266524520255861, 30.875, 27.75 ]
Activation of the CheA kinase by asparagine in Bacillus subtilis chemotaxis. Past experiments have shown that CheA and CheY are required to generate smooth swimming signals in Bacillus subtilis chemotaxis. This study, as anticipated from in vivo experiments, demonstrates in vitro that an attractant-bound chemoreceptor leads to an increase in CheA activity, which in turn leads to an increase in the CheY-P pool that ultimately causes a behavioural change in the bacteria. Asparagine has been found to increase the rate of CheY-P formation in the presence of McpB-containing membranes, CheA, and an excess of CheY. This asparagine effect requires the presence of both CheA and McpB, the latter of which has been shown to be the sole receptor for this attractant. Utilizing membranes from a number of B. subtilis null mutant strains, insight has also been gained into the potential roles of a number of unique chemotaxis proteins in the regulation of CheA activity in the presence and absence of this attractant.
Mid
[ 0.64, 34, 19.125 ]
[Ethical considerations of organ transplantation]. For the moral evaluation of organ transplantations, it is not only relevant that they are potentially live-saving or significantly life-improving procedures. It is also relevant that they may have an impact on the integrity or even dignity of possible donors and are a potential strain on the donors' relatives. In order to find out how the different impacts of organ transplantation on the parties involved are to be morally weighed against one other, the concepts of dignity and of negative and positive moral rights are clarified. Against the widely held view that the procurement of organs from brain dead donors is morally suspect while living organ donation is the morally superior option, it is argued that there is a prima facie moral duty to postmortem organ donation. On the other hand, since in the procurement of organs from living donors physicians systematically injure and endanger healthy persons, this practice can only be morally justified in well-defined exceptional cases.
High
[ 0.67, 33.5, 16.5 ]
The use of oil bottles or other recipients containing oil for dressing salads and the like is a common operation, which is widely known in the current state of the art. The recipients used for these purposes incorporate some kind of outlet conduit which generally consists of a hole of reduced diameter allowing the user to control as far as possible the amount of oil poured during the salad dressing operation. Oil bottles have some practical disadvantages, for example the fact that the outlet conduit has a reduced diameter and hence a very limited flow rate. An oil bottle or dispenser is practical when it is used to dress an individual salad or the like, which requires a relatively small amount of oil, but is not so practical when in comes to dressing salads intended for a number of people, in which case the limited flow rate requires a greater amount of handling and time; another drawback consists of the fact that the single outlet with a limited flow rate means that the air drawn into the recipient as the product is extracted also has to circulate through the same conduit as the oil being poured; this shakes the pouring intermittent, with continuous interruptions which hamper the extraction operation by causing the oil to come out in spurts. The state of the art shows different valves or rotating mechanisms to modify the pouring flow rate. However, these devices have the disadvantage that the number of parts required for manufacture increases, with the subsequent cost and, on the other hand, residues of the liquids, in particular when viscous liquids are poured, accumulate in the joins, and may compromise the quality of the stored liquid. The problem solved by the invention is to find a multi-flow dosage cap with the minimum number of parts, which produces a uniform flow of the liquid. The solution found by the inventors is a cap with a lower part with the means to adapt it to the recipient, a pouring channel and an upper part which comprises pouring means. The pouring means are two “U”-shaped channelled tracks with different radii. The channelled tracks are located at diametrically opposed points. The lower part and the upper part of the cap are separated by a partition. The partition contains a slit which ends in two holes with different areas, and the aforementioned channelled tracks are aligned with the holes, i.e. the track with the larger radius is aligned with the hole with the larger area. The cap produces two different flow rates of oil. This allows the user to choose which of the two holes should be used at each moment, depending or whether, for example, the salad to be dressed is individual or is a larger salad intended for consumption by more than one person. This cap construction also has the feature that the flow of oil provided is continuous, without interruptions, given that, because only one of the conduits for the oil is used at any one time, the other conduit acts as an air inlet, thus facilitating the extraction of oil. The present multi-flow dosage cap has the advantage of being perfectly adjustable to the necks of the current recipients. In a preferred embodiment, the adjustment involves a screw thread or by pressure. According to the invention, the design of the presently proposed cap allows various forms of embodiment. In a first embodiment, the interior space of the cap is divided by means of an internal central partition, with a slit in the central partition and two holes. The pouring channel ends in two “U”-shaped pipes or conduits, with different radii, and the pouring conduits are aligned with the holes in the central partition. This means that, by tilting the bottle to one side or another, the desired outlet conduit can be selected, and thus the volume of oil in the chosen flow. The slit allows air to enter and gives a continuous flow. In other embodiments of the inventive cap, the internal division may contain an integrated partition running lengthways to the centre of the cap, which determines at the outlet end two conduits or pipes with very different respective flow capacities; one or other of the outlets is selected as described above, i.e. by tilting the bottle to one side or the other. In a preferential embodiment, the central partition is sloping. In addition to the formation of a sloping internal partition, the profile of the partition may either be straight or curved, arched. In another particular mode, the cap contains a skirt ring which projects outwards in a radial direction, and is adapted to be coupled to the edge of the neck or the recipient. The skirt prevents any dripping liquid from staining the table. The cap may be manufactured with any material compatible with the liquid to be poured. In a preferred mode, it is made of polypropylene and injection-moulded. The cap is suitable for the manufacture of oil holders or bottles containing oils.
Mid
[ 0.5595505617977521, 31.125, 24.5 ]
Russian gold producer Polyus plans to sell its 82.3% stake in the Nezhdaninskoye gold deposit in the republic of Yakutia to businessman Ivan Kulakov. The deal is valued at $150 million, and precious metals producer Polymetal, the minority shareholder of the deposit, will keep an option to raise its stake in the project to 50%.… In January-February Kuzbass region mined 37.3 million tons of coal, up by 5.7% YoY. Power-generating coal totaled 26.7 million tons, up by 7.2%, coking coal – 10.6 million tons, up by 1.9%. In particular, Raspadskaya Coal Company increased output by 0.6 million tons, Kiyzasskiy Open-pit Mine – by 0.5 million tons, SUEK-Kuzbass and Stroyservice –… In 2016 Khartsyzsk Pipe Works, a part of Metinvest, situated on the temporarily uncontrolled territory of Ukraine, decreased its net losses by 50.7% YoY, to 194.431 million UAH. The company current liabilities increased by 95.6%, to 243.690 million UAH, fixed liabilities dropped by 15.6%, to 79.545 million UAH, while accounts receivable decreased by 10.5%, to… The Stakhanov Ferroalloy Plant, which has been almost idle since 2014 because of the military activity on the Ukraine-uncontrolled territories, cannot be put back into operation at present. According to the Association of Ukrainian Ferroalloy Producers, the works is not operating and is not managed by Ukrainian authorities. “The enterprise is destroyed, it cannot be… In 2016 Metalloinvest sold a packet of Nornickel ADR valued at $342 million (1.4%). According to the group statement, as of December 31, 2015 it owned 3.2% of Nornickel shares, as of December 31, 2016 – 1.8%. Now the group has some 29.013 million ADR of the nickel company, having sold over 21.181 million. Nornickel’s… In 2016 Metalloinvest received $1.15 billion of net profits, up 5.3-fold YoY. The company revenues decreased by 3%, to $4.26 billion. EBITDA dropped by 12.2%, to $1.258 billion. The company debts decreased to $3.16 billion from $3.56 billion as of December 31, 2015. “In 2016 Metalloinvest reached record iron ore output volumes at Lebedinsky and… The State Committee for Industry, Energy and Subsoil Use of Kyrgyzstan announced an auction for alluvial gold and silver deposits. The license for exploration of alluvial gold deposit Urmaral, located in Bakay-Ata district of Talas region, was estimated at $6,250. The forecast gold resources are 1,85 tons. Kumushtag ore field was also put up for… Following an explosion at the Zaporozhkoks 4 employees have been killed. “There was an explosion of the gas tank without burning. A subcontracting organization was performing welding and repair works at the tank, which resulted in the explosion. 4 people perished”, the local police said. According to the works security director Vadim Advokatov, the explosion… The warehouses of Sverdlovantrazit, Rovenkiantrazit and Komsomolets of Donbass Mine, situated on the occupied territories and taken over by the militants, stock some 430 thousand tons of anthracite. DTEK reported that it would watch for the illegal transportation and sale of the anthracite and stop it. “Any attempt to sell this coal is a crime.… In January-February Kazakhstan mined 5.884 million tons of iron ore, up by 14.4% YoY. According to the Statistics Committee of the Ministry of the national economy, copper ore output totaled 14.547 million tons, up by 54% YoY, and chrome concentrate – 668.3 thousand tons, up by 15%. (Ukrainian metal) In 2016 the only primary aluminum producer in Ukraine – Zaporozhye Aluminum Works – decreased its losses by 61% YoY, or by 1.256 billion UAH, to 787.635 million UAH. According to the company statement, the value of its assets at the end of 2016 totaled 241.651 million UAH, current liabilities – 6.3 billion UAH, fixed… The Ukrainian market of coated metal is reviving after a fall in 2014-2015 thanks to the rise in the construction. According to Metinvest marketing director Roman Kurashev, in 2016 galvanized steel consumption in Ukraine increased by 26% YoY, to 298 thousand tons, and this year it is expected to reach 307 thousand tons, almost on… The Pipe Metal Company has supplied the first batch of drill pipes with the premium interlock of the second generation – TMK UP EXD. The pipes have been shipped to Samotlorneftepromkhim. The new interlock is easier to assemble which decreases time and expenses for drilling. TMK UP EXD has been developed by TMK – Premium… Energy and Coal Industry Minister Ihor Nasalyk estimates Ukrainian thermal power plants’ demand for anthracite coal until the end of 2017 at 4.2 million tons. He announced the forecast at a Cabinet meeting on March 16. “We’re running four projects to minimize coal consumption. I’d like to tell you that we need only 4.2 million… In 2017 Severstal will increase its share on the Russian market of polymer-coated rolled metal. According to the company flat rolled metal sales director Kirill Kiryushkin, in 2016 its share was 20%. This year the company plans to increase it to 24%. In Q3 Severstal will put new galvanized and coated metal capacities in operation,… Geologists of the Magadan region have discovered a gold field with resources amounting to several dozen tons, a regional division of geological exploration company Rosgeo, also known as Rusgeology, said in a report on March 16. The newly discovered Khulgannakhskaya block is located 102 kilometers off the Omchak village, where the nearest Matrosov mine is… Gold mining company Nordgold, controlled by Russian businessman Alexei Mordashov, has completed delisting of its global depositary receipts (GDRs) from the London Stock Exchange (LSE), the company said in a statement on March 16. Nordgold offered to buy the GDRs at $3.45 per security and said it could spent a total of up to $118… Russian metals producer Norilsk Nickel is ready to consider participation in the development of the Udokan copper field, CEO and key shareholder Vladimir Potanin said on the sidelines of a meeting of the Russian Union of Industrialists and Entrepreneurs on March 16. “We have received no detailed proposals so far. We will negotiate once it… Prime Minister of Kazakhstan Bakytzhan Sagintayev visited Ulba Metallurgical Plant as part of his working trip to East Kazakhstan region, PM’s press service reported. PM familiarized himself with the process of high capacitive tantalum powders production. UMP is one of the world’s recognized producers of uranium and tantalum. The enterprise is a part of the… The Mine Group Yuzhnodonbasskoye No. 1 (Ugledar, Donetsk region) has ordered Company Promtorg LLC the delivery of filtering equipment valued at 21.75 million UAH. By the end of 2018 the company would have supplied 2050 self-rescuers at 8326 UAH apiece, 1500 regenerative cartridges at 2781 UAH apiece and 6 respirators at 85587 UAH. On the… The supervisory board of Makeevkoks has stopped the office of the board (5 persons), including its chairman Alexander Kolomiychenko. The matter was discussed on March 14, because of the expiration of the office. None has been appointed to the board. The board consisted of Alexander Kolomiychenko, Igor Chebotarev, Irina Ukrepina, Ivan Zolotarev and Tatiana Yemelyanova.… Metinvest has transferred 50% of the Central Mining and Processing Works shares from Metinvest B.V. to Metinvest Management B.V. (both registered in the Netherlands at the same address). The share of Metinvest B.V. decreased from 99.7481% to 49.7481%. At the same time the share of Metinvest Management B.V. increased from 0% to 50%. The press-service…
Low
[ 0.47596153846153805, 24.75, 27.25 ]
<?php defined('SYSPATH') OR die('No direct script access.'); class Database_MySQLi extends Kohana_Database_MySQLi {}
Low
[ 0.39454094292803904, 19.875, 30.5 ]
Q: What are the concrete pros and cons of attribute-based routing vs. imperative routing in ASP.NET Web API? Last year, the attribute-based routing was rolled into the core of ASP.NET Web API routing (http://weblogs.asp.net/scottgu/archive/2013/04/19/asp-net-web-api-cors-support-and-attribute-based-routing-improvements.aspx). I suppose the addition implies it is somehow better than the standard imperative routing approach in app start, but apart from dev preference (which is not my concern here), what are the concrete benefits and drawbacks of the two approaches? UPDATE: I should clarify that "it is somehow better than the" would be better said as: "it adds value over the". I mean, they would only add it if they thought it was valuable. So my question is really what are the pros/cons between the two approaches (beyond simple preference). A: I wouldn't think of it as better just a different way of solving the same problem. Additions to any framework can often simply present an alternative way of doing something. It depends on how opinionated the framework designers wish to be. Typically Microsoft has always aired on the side of being somewhat un-opinionated to the point of developer confusion. But they are getting better though. The primary benefit I see with attribute based routing, and I appreciate this may be subjective is that it's more explicit in that it brings the definition of the route closer to the target code i.e the controller action. Given that we as developers already have enough information to wrangle in our heads when reading code, this proximity of the route definition to the executed code can only help in my opinion. A: Attribute routing is more DRY. For instance: [RoutePrefix("{controller}")] [Route("{reviewId:int}/{action=Show}")] public class ReviewsController : Controller { public ActionResult Show(int reviewId) { throw new NotImplementedException(); } public ActionResult Edit(int reviewId) { throw new NotImplementedException(); } [Route("foo")] public ActionResult Foo() { throw new NotImplementedException(); } } The routes created for the above controller are: routes.MapRoute(null, "{controller}/foo", new { controller = "Reviews", action = "Foo" }); routes.MapRoute(null, "{controller}/{reviewId}/{action}", new { controller = "Reviews", action = "Show" }, new { reviewId = new IntRouteConstraint() }); Note that: In the route for Show and Edit, you didn't have to specify a default value for controller, attribute routing includes it for you. In the route for Foo, it inherited the route prefix, and you didn't have to specify controller and action defaults.
High
[ 0.707446808510638, 33.25, 13.75 ]
MAT 24:4Jesus answered: "Watch out that no one deceives you. 5For many will come in my name, claiming, ’I am the Christ,’ and will deceive many. 6You will hear of wars and rumors of wars, but see to it that you are not alarmed. Such things must happen, but the end is still to come. 7Nation will rise against nation, and kingdom against kingdom. There will be famines and earthquakes in various places. 8All these are the beginning of birth pains. 9"Then you will be handed over to be persecuted and put to death, and you will be hated by all nations because of me. 10At that time many will turn away from the faith and will betray and hate each other, 11and many false prophets will appear and deceive many people. 12Because of the increase of wickedness, the love of most will grow cold, 13but he who stands firm to the end will be saved. 14And this gospel of the kingdom will be preached in the whole world as a testimony to all nations, and then the end will come. I want to talk to you today about "Apostasy". That’s a big word for what our text talks about in vs 10.......falling away. I believe that apostasy is a major problem in our churches as well as our own spiritual lives today. It is an epidemic with today’s Christians. A lot of Christians have left their first love and turned away from the faith, even to the point of betraying and hating each other, as the Bible states. I’d like to start out by looking at vs 4 in our text. The very words of Jesus are "watch out that no one deceives you". There are many people being deceived today. The world has penetrated our churches and the truth is being neglected in the name of political correctness and "feel good’ sermons. Preachers are afraid to preach the truth; afraid that it will hurt someones feelings, maybe hurt the amount of tithes, hurt the attendance of the church....after all, we wouldn’t want anyone to feel "guilty" would we? Going further in our text, we see that that many will come claiming ’I am the Christ’. But that alone isn’t the disturbing part. What IS disturbing is that they will "deceive many". Jesus speaks a lot about being deceived, doesn’t He? That’s because He knew that people are apt to be swayed by the "doctrine de jour", or whatever doctrine is popular at that particular time. The Bible address this in 2 TIM 3:1But mark this: There will be terrible times in the last days. 2People will be lovers of themselves, lovers of money, boastful, proud, abusive, disobedient to their parents, ungrateful, unholy, 3without love, unforgiving, slanderous, without self-control, brutal, not lovers of the good, 4treacherous, rash, conceited, lovers of pleasure rather than lovers of God— 5having a form of godliness but denying its power. Have nothing to do with them. 6They are the kind who worm their way into homes and gain control over weak-willed women, who are loaded down with sins and are swayed by all kinds of evil desires, 7always learning but never able to acknowledge the truth.
Mid
[ 0.600441501103752, 34, 22.625 ]
Q: FileStream Read/Write method's limitation FileStream's read/write method can take only integer value as length. But FileStreamobject returns length in long. In this case, what if file size is larger than integer value (approximate more than 2GB). Then how FileStream's read/write method handle long value. A: Then you read and write in multiple chunks. The CLR has a limit on the size of any particular object anyway (also around 2GB IIRC, even on a 64-bit CLR), so you couldn't have a byte array big enough for it to be a problem. You should always loop when reading anyway, as you can't guarantee that a Read call will read as many bytes as you requested, even if there's more data to come. EDIT: Reading in chunks: byte[] buffer = new byte[1024 * 32]; int bytesRead; while ((bytesRead = stream.Read(buffer, 0, buffer.Length)) > 0) { // Use the data you've read } Writing in chunks will depend on what you're writing... it's hard to talk about it in the abstract. A: There is no need to directly write more than 2Gb of data in one call If you would really have that amount buffered contiguously in memory (? maby as an unsafely acquired UnmanagedMemoryStream to implement a core dump?) you could easily batch the writes in multiple calls. It will get written to disk in blocks of 512k to max 4k on current hardware, anyway. The great value of 'streaming' interfaces is that you can have it anywhich way. In fact, when you look into to it you will find that the CLR Arrays (and anything else) are actually bounded to 2GB Update Since you have now confessed that you basically want to copy streams, you might be better served with an instant solution. There is File.Copy File.Copy("file-a.txt", "file-new.txt"); Or there is the standard answer Stream input input.CopyTo(output); // .NET 4.0 // .NET 3.5 and others public static void CopyStream(Stream input, Stream output) { byte[] buffer = new byte[32768]; while (true) { int read = input.Read (buffer, 0, buffer.Length); if (read <= 0) return; output.Write (buffer, 0, read); } } Don't forget about Flushing, Closing and Disposing your Streams as appropriate if you are handling the streams manually. Cheers
High
[ 0.6585735963581181, 27.125, 14.0625 ]
Published data show that beta amyloid vaccination can markedly reduce amyloid burdens, apparently by activating microglia to degrade amyloid. Vaccinations may also prevent certain behavioral deficits. The overall impact on the AD phenotype remains vague. Vaccination might be expected to reduce amyloid but activate microglial inflammatory cytokine production, NADPH oxidase and reactive oxygen species. This may lead to a net decrease or possibly even an increase in oxidative damage and synapse loss. In this proposal, Aim 1 will address unanswered questions about the impact of vaccination at different timepoints on aspects of inflammation while aim 2 will investigate the impact on oxidative damage and synaptic pathology that we have documented in aging APP transgenic mice. Present data suggests that vaccination may not reduce Abeta 40 and vascular amyloid. There is also a real danger that vaccination may induce vascular damage and possibly even hemorrhage. Aim 3 will assess the impact of vaccination on amyloid and soluble Abeta in different compartments, vascular amyloid and vessel damage. Finally, there are unanswered questions about the mechanisms of amyloid reduction induced by vaccination. Available data strongly support an increase in amyloid phagocytosis by microglia, but data on enhanced degradation are inconsistent with some reports showing increases and some showing no change in amyloid degradation. Aim 4 will investigate hypotheses about the mechanisms involved in vaccine induced amyloid reductions. If successful, these experiments would be expected to lead to small molecule approaches to mitigate potential harmful effects of vaccination and to conceivably enhance amyloid removal.
Mid
[ 0.6538461538461531, 31.875, 16.875 ]
AltHealth: CDC’s Latest Outbreaking News I like to check out the CDC.gov website at least every other week to catch the latest Vital Signs and outbreak warnings. I’ve become accustomed to the posts about Ebola and measles, but on July 9, the CDC headlines were about a rare but serious illness I’d never heard of before – acute flaccid myelitis, also known as AFM. Any of you with young families will want to pay attention to this one. AFM affects the spinal cord and causes limb weakness It preys mostly on children – the average age is 5. AFM has serious consequences for otherwise healthy children. Ninety-eight percent of them are hospitalized, 60% are admitted to intensive care units and 27% require machines to help them breathe. The symptoms linger and are disturbingly similar to those of polio, although all patients have tested negative for the polio virus. The mention of polio set off an alarm in my head – my own mother nearly died of polio in the 1930s epidemic; she was left crippled for life and confined to a wheelchair by the time she was 50. I decided to do more research. Since the CDC began tracking it in 2014, There have been three nationwide outbreaks of AFM. The third and largest outbreak was in 2018, when the CDC confirmed that 233 patients in 41 states had contracted the disease. There is both an every-other-year pattern and a seasonal pattern to the outbreaks – most patients develop AFM between August and October. Another factor seemed to be that affected children had a mild respiratory illness or fever less than a week before they developed arm or leg weakness. These are important pieces of evidence indicating that viruses, including enteroviruses, play a role in AFM. Every clue matters if a preventative or treatment is to be found, so the CDC needs your help in collecting vital data. Doctors and other clinicians across the US play a critical role. If you suspect a problem, please see your doctor. Early recognition of patients with AFM symptoms, prompt testing, and immediate reporting of suspected AFM cases to health departments will give researchers a better chance of understanding both the causes of AFM and of the recurrent outbreaks. Until more is known, nothing can be done to prevent the number of cases from increasing with every cycle, and at the present time, there is no cure. Experts have tried using different types of physical therapy treatments in patients with AFM, but there is no good evidence that any of those treatments have had any benefit. But while this news is disturbing, there’s no need to panic – AFM is still relatively rare. Unfortunately, it becomes less rare every year. This is a problem that all parents will want to take seriously. Advertisement The outbreak news is somewhat less serious. Today’s posts were all about salmonella and the primary offender was pig ear doggy treats. I would expect that dogs would be affected by contaminated ears, but an astonishing number of humans have been affected too. The real surprise is that not all of them are dog owners. Apparently, customers in pet stores are contracting the disease by fondling the treats in the bulk bins. So, a warning to those of you with pets: stop running your hands through the deep fried swine ears. I know that it’s tempting, but just don’t. Number two on the salmonella warning list went to those of us who raise chickens in our backyards. I didn’t think that this would have any great relevance to the city dwellers of our state, but apparently it does. We have a very sincere desire to raise our own chickens in RI. Until 2010, Providence banned chicken-keeping entirely, but that year, a coalition of determined residents worked together to overturn the ban. Since then, sites ranging from Southside Community Land Trust to the West End became home to happily clucking flocks. Soon, Barrington followed Providence, and other towns began petitioning for their own right to raise fowl. There is even a Legalize Backyard Chickens in Woonsocket Facebook page for those of you who want to join in the fight. So, backyard chicken farmers of RI, take heed: 1) Try not to touch your chickens. Always wash your hands with soap and water right after touching either the birds or anything in the area where they live and roam. 2) Don’t let your chickens inside the house; I know how funny it was on the TV show “Friends” when Joey and Chandler’s duck and chicken emerged squawking from the bathroom to scare unsuspecting dates, but resist the urge to try this at home. 3) Don’t eat or drink with your chickens or in their coops (does the CDC really need to tell us this?) and, 4) Don’t kiss your chickens or snuggle them and then touch your face or mouth. For a complete list of recommendations, visit cdc.gov/healthypets/pets/farm-animals/backyard-poultry.html
Mid
[ 0.6497461928934011, 32, 17.25 ]
.. algorithm:: .. summary:: .. relatedalgorithms:: .. properties:: Description ----------- This algorithm can be used to combine lists of single crystal peaks, possibly obtained by different methods, in to a single list (contained in a :ref:`PeaksWorkspace <PeaksWorkspace>`). With the default options, this will simply append the lists of peaks. If CombineMatchingPeaks is selected then an attempt will be made to identify identical peaks by matching them in Q within the specified tolerance. The peaks in each workspace are traversed in the order they are found in the workspace (RHSWorkspace first) and if a match is found (the search stops at the first match for each RHSWorkspace peak) then the peak in the LHSWorkspace is retained. .. categories:: .. sourcelink::
Low
[ 0.519668737060041, 31.375, 29 ]
Q: What tag for Kyotronic 85 / TRS-80 Model 100 / Olivetti M10 / NEC PC-8300? We currently have five questions about the TRS-80 Model 100, four of which are tagged trs-80. That tag lumps them in with a large number of questions for unrelated (except for the nameplate) and very different desktop machines such as the Model I/III/4 and Model II/12/etc. The Model 100 is actually a rebadged Kyocera Kyotronic 85 that was also sold under several other different badges by other companies, including the Olivetti M10 and the NEC PC-8201 and PC-8300. (There are some differences between these machines, but they are not as different from each other as, say, an Apple II and Apple IIe, which both fall under the apple-ii tag here, are.) I am aware that the "model number" of the Kyocera computer was "KC 85," but this seems to have been rarely used. "Kyotronic 85" seems to have been what was consistently used on the computer faceplate and manuals, even in Japan. So I'm thinking we should have a single tag to cover all of these. I propose we call it kyotronic-85 with the following aliases: trs-80-model-100 This matches what seems to be the most popular Tandy/TRS-80 tagging scheme. I don't see a need for further aliases for the -102, -200, etc., since anybody with one of those more rare machines is likely to quickly discover, if they don't already know, that they are part of the Model 100 series. nec-pc-8300, to ensure it shows up in tag searches finding nec-pc, which covers all NEC PC-nnnn series except for this particular one. PC-8201 left out for the same reasons as Model 102 above. olivetti-m10 Except for the "-family" issue discussed below, I'm not too fussy about the naming, or which name is the tag name vs. which are aliases. I propose "Kyotronic 85" as the tag because that's the original machine name and, while not well known, my understanding is that none of the other names are well known outside their regions, either. (Certainly as a North American "Olivetti M10" wouldn't have rung any bells for me back when I was a Model 100 owner.) But if everybody agrees that, e.g., trs-80-model-100 is better as the tag name, I'm fine with that. Note that I do not use "family" in the tag name (kyotronic-85-family) as has been suggested in an answer here. Convention in RCSE so far has been to leave that out: apple-ii: "For questions about the Apple II series of personal computers," covering the II+, IIe, compatibles such as the Laser and Franklin, etc. microsoft-basic: Covers the wide variety of MS basics out there for different CPUs and significantly varying versions for different manufacturers (Altair, Commodore, Applesoft, etc.) amiga: "For questions related to the Commodore Amiga family of personal computers." (The TRS-80 scheme may appear to be an exception, but the issue there is that they need to clearly distinguish Model I/III/4 and Model II/12/60; a lot of people, even those familiar with the Model III, are not aware that Models I and III are the same thing for our purposes, but Models I and II are completely different.) If there are no major objections, I am happy to set this up. (This question was prompted by waning to put into the nec-pc tag description the tag one should use for the PC-8300, upon which I realized that there is no such tag.) A: I'm having difficulty reconciling Raffzahn's position that we should have a huge number of aliases, and Ross Ridge's position (as best I can tell; I can't get a clear answer) that we have no aliases and just a trs-80-model-100 tag. I'm thinking of dealing with this by punting on most of it, instead just creating just the trs-80-model-100 tag, describing it as being for all models mentioned in the question and various posts, and applying it to the relevant posts. I would create no aliases for it. This would at least give us a tag. Others can then add aliases as they like (to which I have no objection) and petition a moderator to change the tag name if they like (to which I also have no objection). Or just continue discussion about it. My one worry is that the trs-80-model-100 may be confusing for non-North-Americans; I don't know how well the "Model 100" name is known outside North America. If you have an opinion, or better yet evidence, about this, make it known. Again, keep in mind that we can always get a moderator to rename the tag later, so let's focus on getting something acceptable, rather than perfect, here. If I see no serious objections in the next few days, I'll add trs-80-model-100, give it a description and tag the appropriate posts with it.
Mid
[ 0.5641646489104111, 29.125, 22.5 ]
Darksiders 3 coming out 27th November with special editions 10 July 2018 Newsdesk Share with: Great news everyone! Darksiders 3 is finally coming out this November. Revealed last year, players were introduced to Fury, the sister of Darksiders’ protagonists War and Death. This will be the first game in the series since the closure and revival of THQ. According to a report from several outlets, the studio behind Darksiders 3, Gunfire Games has revealed a few special editions of the game. The standard collectors edition will run players $149.99 and come with the game, a Steelbook case, an art book, the soundtrack, exclusive cosmetic DLC, and an 11-inch Fury statue. However, for serious Darksiders fans,we've got the ultimate edition ready for you! The Apocalypse Edition will cost players a hefty $399.99. This premium edition will come with three extra 11-inch statues — featuring Death, War and Vulgrim the shopkeeper — as well as a Four Horsemen amulet and a 30-inch-by-40-inch wall scroll. The Apocalypse Edition will also come with the standard collectors edition items. Darksiders 3 will be released for PlayStation 4, Windows PC and Xbox One. Check out The Apocalypse Edition below along with the reveal trailer.
Low
[ 0.520874751491053, 32.75, 30.125 ]
An important aspect of engineering is tracking changes to a design, and being able to convey the changes to subsequent designers. For example, in a computer aided design (CAD) environment, a designer may convey information regarding a particular design by having various views of the design on a drawing e.g., orthographic projection. Often times, the views may have various information regarding the design. For example, the views on the drawing may have dimensional information such as geometric dimensioning and tolerancing (GD&T). Accordingly, changes to the design may require changes to the information regarding the design (i.e., changes to design may affect various dimensions and/or various other annotations in the drawing). In order to track these changes to the design, often times, the designer may be required to perform tedious updating of information on the drawing. For example, a drawing may commonly have revision information in the form of a block to provide various information regarding the design, and in particular, as it relates to modifications of the design. The revision block may include information such as, but not limited to, an identifier associated with the affected part of the design, a location of the identifier on the drawing, a revision number of the drawing, description of the modification, a date of the revision and/or modification, and initials of a user (i.e., the designer) that performed the modifications. Accordingly, in order to provide appropriate design history, each time a design is modified, a user may be required to provide numerous information for the revision block manually, which may be tedious and difficult.
Mid
[ 0.6373626373626371, 36.25, 20.625 ]
Sign up to receive free email alerts when patent applications with chosen keywords are publishedSIGN UP Abstract: The present invention provides an aqueous ophthalmic solution comprising an effective amount of ketorolac which comprises carboxymethyl cellulose in an aqueous solution which provides increased visual acuity in users and wherein said concentration of carboxymethyl cellulose is selected to provide an increased absorption of ketorolac in the eye of a patient which is at least 130% greater than the absorption of a comparative aqueous ketorolac ophthalmic solution having the same concentration of ketorolac. Claims: 1. A topical aqueous ophthalmic solution comprising ketorolac tromethamine, mixtures of carboxymethyl cellulose, containing no preservative and having a pH within the range of approximately 6.8-7.4. 3. The topical aqueous ophthalmic solution of claim 1 wherein the ketorolac tromethamine is present in a concentration of approximately 0.40-0.45 percent by weight/volume of total solution. 4. The topical aqueous ophthalmic solution of claim 1 wherein the carboxymethyl cellulose is a combination of medium and high viscosity sodium carboxymethyl cellulose. 5. The topical aqueous ophthalmic solution of claim 1 wherein the ketorolac tromethamine is present in a concentration of 0.45 percent by weight/volume. 6. The topical aqueous ophthalmic solution of claim 5 having a pH between of 6.8. 7. The topical aqueous ophthalmic solution of claim 5 wherein the concentration of carboxymethyl cellulose is from 0.2 to 2 percent by weight. 8. The topical aqueous ophthalmic solution of claim 7 wherein the concentration of carboxymethyl cellulose is 0.5% by weight/volume. 9. The topical aqueous solution of claim 5 wherein the solution is surfactant and chelator free. 10. The topical aqueous solution of claim 8 for use in treatment of ocular pain associated with postoperative photorefractive keratectomy. 11. The topical aqueous solution of claim 5 wherein the ophthalmic solution improves the visual acuity in a patient of at least one line of improvement. 12. The topical aqueous solution of claim 5 further comprising a mixture of medium and high viscosity sodium carboxymethyl cellulose, sodium chloride, sodium citrate dehydrate, sodium hydroxide, hydrochloric acid and purified water and wherein the solution improves the visual acuity of a user. 13. The topical aqueous solution of claim 5 wherein the combination of carboxymethyl cellulose and ketorolac increases the absorption in the eye of a patient more than a solution of ketorolac alone. 14. The topical aqueous solution of claim 1 wherein the ketorolac tromethamine is present as a racemic mixture of R-(+) and S-(-)-ketorolac tromethamine. 15. The topical aqueous solution of claim 5 wherein the viscosity is from 10 to 30 cps. 16. The topical aqueous solution of claim 6 wherein the mixture of carboxymethyl cellulose is present in the amount of 0.5% percent by weight. 17. The topical aqueous solution of claim 5 wherein the solution may be administered before or after eye surgery to prevent ocular pain. 18. The topical aqueous solution of claim 5 wherein the solution increases healing time of the eye after eye surgery in comparison to ketorolac solutions containing a preservative. [0002] This invention relates to pharmaceutical compositions. More particularly, this invention relates to topical ophthalmic solutions comprising 5-benzoyl-2,3-dihydro-1H-pyrrolizine-1-carboxylic acid, otherwise known as ketorolac, and the use of ketorolac for treating or preventing ocular pain. [0004] Ketorolac tromethamine 0.5% (w/v) ophthalmic solution, available from Allergan, Inc., under the tradeneme ACULAR®, is a safe and effective NSAID with proven analgesic and anti-inflammatory activity. The most common adverse event associated with the use of the 0.5% ketorolac formulation is ocular irritation, primarily burning and stinging upon instillation. Ketorolac tromethamine 0.4% (w/v) ophthalmic solution, under the tradename ACULAR LS®, has shown improved bioavailability and less stinging on instillation than ACULAR®, but there remains a need for an improved ketorolac tromethamine formulation with greater bioavailability and greater tolerability, minimized ocular surface toxicity, improved patient comfort, increased retention time of the active ingredient and improved wound healing capabilities during use. [0005] It is one object of this invention to provide a ketorolac formulation for instillation in the eye to eliminate or reduce ocular irritation, to improve tolerability, compliance, duration and effect of ketorolac, to allow for dosing from four times daily to twice daily, and to increase the effectiveness of treatment by being free of benzalkonium chloride or other preservatives. [0006] It is another object of the invention to improve bioavailability and increase the ocular absorption of ketorolac yet provide an aqueous solution having an optimized concentration of ketorolac. [0007] It is another object of the invention to extend the effects of ketorolac and allow for a decrease in required daily dosage. [0008] It is another object of the invention to provide reduction of inflammation associated with cataract surgery and reduction of pain associated with cataract surgery in comparison to other ketorolac formulations. [0009] It is another object of the invention to create a ketorolac formulation with improved wound healing capabilities. [0010] Other objects of this invention will become apparent from a reading of the present specification. BRIEF DESCRIPTION OF DRAWINGS [0011] FIG. 1 shows the ocular pharmacokinetics of the results in Example 7 of the increased and prolonged ketorolac exposure in the aqueous humor of the 0.45% w/v ketorolac solution in comparison to ACULAR LS®; [0012] FIG. 2 shows the results of FIG. 1 in table form of Cmax, AUC and percent relative bioavailability of the ocular pharmacokinetics in Example 7 of the aqueous humor relative bioavailability of 0.45% w/v ketorolac solution in comparison to ACULAR LS®; [0013] FIG. 3 shows the ocular pharmacokinetics of the results in Example 7 of the increased and prolonged ketorolac exposure in the iris-ciliary body of 0.45% w/v ketorolac solution in comparison to ACULAR LS®; [0014] FIG. 4 shows the results of FIG. 3 in table form of Cmax, AUC and percent relative bioavailability of the increased and prolonged exposure in the iris ciliary body of 0.45% w/v ketorolac solution in comparison to ACULAR LS®; [0017] The present invention provides an aqueous ophthalmic formulation comprising an effective amount of ketorolac but having an optimized concentration of ketorolac in comparison other commercially available ketorolac products. The aqueous ophthalmic solution of the present invention comprises carboxymethyl cellulose, e.g. sodium carboxymethyl cellulose, having a pH within the range of from about 6.8 to 7.4, which is comfortable when topically applied to the eye of a patient, wherein the concentration of carboxymethyl cellulose and, preferably, the pH, is selected to provide an increased absorption of ketorolac in the eye of a patient as compared to a comparative ketorolac solution that differs only in not including the carboxymethyl cellulose. That is, the absorption of ketorolac may be 130% or greater than the absorption of a comparative aqueous ketorolac ophthalmic solution having the same or higher concentration of ketorolac. [0018] More preferably, the aqueous ophthalmic solution of this invention has a pH within the range of from 6.8 to 7.4, particularly 6.8. [0019] More preferably, the aqueous ophthalmic solution of the present invention has a concentration of carboxymethyl cellulose of from about 0.2 to about 2 percent, by weight, even more preferably from about 0.5 to 1.5 percent, by weight, and most preferably about 0.5% w/v. [0020] Even more preferably, the aqueous ophthalmic solution of the present invention comprises a mixture of medium viscosity and high viscosity sodium carboxymethyl cellulose. [0021] More preferably, the aqueous ophthalmic solution of the invention comprises an effective amount of ketorolac of from 0.25 to 0.50 percent, by weight, or about 0.45 percent, by weight. [0022] More preferably, the aqueous ophthalmic solution of the invention has a viscosity of from 5 to 50 cps, preferably from 10 to 30 cps. [0023] It has been surprisingly discovered that optimizing the concentration of ketorolac tromethamine reduces the occurrence of adverse events while maintaining clinical efficacy. Additionally, it has been discovered that the optimized concentration of ketorolac tromethamine in combination with carboxymethyl cellulose offers surprising and clear benefits in terms of formulation in that no preservative, chelating agent, and surfactant are required for formulation. Thus, finding a way to increase the absorption of ketorolac benefits the patient who can use a solution having an optimized concentration of ketorolac and obtain similar results in terms of efficiency as compared to a ketorolac solution having a higher concentration of ketorolac. [0024] Thus, this invention relates to an aqueous topical ophthalmic composition comprising 0.25 to 0.50 percent by weight, more preferably from 0.35% to 0.45% by weight and most preferably about 0.45% ketorolac tromethamine by weight/volume. The present invention also contains from 0.2 to 2 percent by weight, more preferably from 0.5 to 1.5 percent by weight and most preferably about 0.5% w/v percent of medium and high molecular weight sodium carboxymethyl cellulose. Another aspect of this invention relates to a method of treating or preventing ocular pain in a person comprising topically administering to said patient a sterile composition comprising from 0.25 to 0.50 percent, by weight, more particularly from 0.35% to 0.45% by weight, or about 0.45% w/v ketorolac tromethamine in combination with from 0.2 to 2 percent, by weight, preferably from 0.5 to 1.5 percent by weight, and most preferably 0.5% percent by weight/volume, sodium carboxymethyl cellulose and mixtures thereof. [0025] While not intending to limit the scope of this invention in any way, of particular interest in relationship to this invention is the use of aqueous topical ophthalmic compositions of 0.45% (w/v) ketorolac tromethamine for the treatment of ocular pain, especially for the treatment of ocular pain in postoperative photorefractive keratectomy (PRK) surgery patients which improves healing. It is surprising that the lower concentration of ketorolac as compared to the Acular® product, discussed herein, would reduce the incidence of adverse events and enhance comfort while maintaining clinical efficacy. Two drops (0.1 mL) of 0.5% ketorolac tromethamine ophthalmic solution instilled into the eyes of patients 12 hours and 1 hour prior to cataract extraction achieved measurable levels in 8 of 9 patients' eyes (mean ketorolac concentration 95 ng/mL aqueous humor, range 40 to 170 ng/mL). Ocular administration of ketorolac tromethamine reduces prostaglandin E2 (PGE2) levels in aqueous humor. The mean concentration of PGE2 was 80 pg/mL in the aqueous humor of eyes receiving vehicle and 28 pg/mL in the eyes receiving 0.5% ketorolac tromethamine ophthalmic solution. [0027] During the reformulation of Allergan's marketed Acular LS® product (0.40% w/v ketorolac), it was surprisingly found that a test formulation containing 0.45% ketorolac tromethamine and sodium carboxymethyl cellulose (NaCMC) exhibited significantly better ocular absorption in rabbits than did the currently marketed product, i.e. Acular LS®. [0028] Since the viscosities of the two test solutions were virtually identical, the mechanism for achieving increased ocular penetration compared to the control formulation cannot be accounted for only by the viscosity of the test solutions. In fact, a comparison of two identical carboxymethyl cellulose-containing solutions which differ only in having viscosity of 11 and 22 cps shows similar absorption of ketorolac into the aqueous humor. While not wishing to be bound by theory, it is believed that there is a functional relationship between the sodium carboxymethyl cellulose and either the ketorolac or some component of the ocular surface that facilitates absorption of ketorolac. [0029] All of the aqueous topical ophthalmic solutions of this invention are contemplated for use in treating or preventing ocular pain. Preferably, all of the solutions of this invention are contemplated for use when said ocular pain is a result of photorefractive keratectomy surgery (PRK). [0030] One important aspect of this invention is that the solutions of the present invention have a concentration of ketorolac tromethamine which is optimized to reduce side effects, while maintaining clinical efficacy in treating ocular pain. As such, the concentration of ketorolac tromethamine in compositions related to this invention is preferably from 0.35% to 0.45% w/v, most preferably the concentration of ketorolac tromethamine in the aqueous topical ophthalmic solution of this invention is 0.45% ketorolac tromethamine, by weight. [0031] Carboxymethyl cellulose (CMC) is a carboxymethyl derivative of cellulose formed by the reaction of cellulose with alkali and chloroacetic acid. As a result of said reaction, carboxymethyl groups are bound to some of the hydroxyl groups of the glucopyranose units that make up the backbone of cellulose. The degree of substitution of carboxymethyl varies from about 0.6 to 0.95 per glucopyranose unit. CMC is used in aqueous solutions usually as the sodium salt to increase viscosity. [0032] Carboxymethyl cellulose is available in various molecular weights. Low molecular weight carboxymethyl cellulose has a Mw of about 90,000 daltons and a 2% solution thereof will have a viscosity of about 1.1 cP at 25° C. Medium weight carboxymethyl cellulose has a Mw of about 250,000 daltons. High molecular weight carboxymethyl cellulose has a Mw of about 700,000 daltons and a 2% solution will have a viscosity of about 12 cP at 25° C. [0033] For the purpose of the present invention, it is desirable to use a mixture of medium and high molecular weight sodium carboxymethyl cellulose. For example, from 25/75 to 75/25 carboxymethyl cellulose, preferably from 30/70 to 70/30 and most preferably about 35/65 medium/high molecular weight sodium carboxymethyl cellulose or most preferably a ratio of 0.325/0.175. [0034] The fact that the concentration of ketorolac tromethamine in compositions related to this invention achieves greater or equal absorption of ketorolac into the aqueous humor of the eye and includes carboxymethyl cellulose, allows the solutions of the present invention to be prepared with no preservative, surfactant and chelating agent. This is a significant advantage over prior art ketorolac formulations as preservatives, surfactants and chelating agents can cause irritation to the eye resulting in less patient compliance and less effectiveness of prior art ketorolac formulations. [0035] The term preservative has the meaning commonly understood in the ophthalmic art. Preservatives are used to prevent bacterial contamination in multiple-use ophthalmic preparations, and, while not intending to be limiting, examples include benzalkonium chloride, stabilized oxychloro complexes (otherwise known as Purite®), phenylmercuric acetate, chlorobutanol, benzyl alcohol, parabens, and thimerosal. Preferably, the ketorolac solution of the present invention is preservative free. [0036] The term surfactant used in this invention has the meaning commonly understood in the art. Surfactants are used to help solubilize the therapeutically active agent or other insoluble components of the composition. Anionic, cationic, amphoteric, zwitterionic, and nonionic surfactants may all be used in this invention. If a surfactant is included in the solutions of this invention, preferably, a nonionic surfactant is used. While not intending to limit the scope of the invention, some examples of useful nonionic surfactants are polysorbates, poloxamers, alcohol ethoxylates, ethylene glycol-propylene glycol block copolymers, fatty acid amides, and alkylphenol ethoxylates, and phospholipids. Most preferably, the surfactant is an octylphenol ethoxylate with an average of 40 ethoxylate groups. This type of surfactant, also known as octoxynol-40 or Igepal CA-897®, can be purchased under the Igepal CA-897® tradename from Rhone-Poulenc. Preferably, the ketorolac solution of the present invention is surfactant free. [0037] The term chelating agent refers to a compound that is capable of complexing a metal, as understood by those of ordinary skill in the chemical art. Chelating agents are used in ophthalmic compositions to enhance preservative effectiveness. While not intending to be limiting, some useful chelating agents for the purposes of this invention are edetate salts like edetate disodium, edetate calcium disodium, edetate sodium, edetate trisodium, and edetate dipotassium. Preferably, the ketorolac solution of the present invention is chelator free. [0038] In addition to surfactants, preservatives, and chelating agents, tonicity agents and other excipients are often used in ophthalmic compositions. Tonicity agents are often used in ophthalmic compositions to adjust the concentration of dissolved material to the desired isotonic range. Tonicity agents are known to those skilled in the ophthalmic art, and, while not intending to be limiting, some examples include glycerin, mannitol, sorbitol, sodium chloride, and other electrolytes. Preferably, the tonicity agent is sodium chloride. [0041] Unless otherwise specified, all steps in this procedure were carried out at room temperature. The following procedure was followed in accordance with the amounts listed in Table 1 below. Purified water was charged into the main batch vessel. Mixing was initiated to produce a vortex sufficient to disperse and/or dissolve all product ingredients without excessive aeration or foam formation. The following components were added directly into the vortex in order, allowing each to dissolve before adding the next: sodium chloride, calcium chloride, dihydrate magnesium chloride, hexahydrate, boric acid, sodium borate, sodium carboxymethyl cellulose as a an percent aqueous solution comprising including a mixture of 65% medium molecular weight and 35% high molecular weight carboxymethyl cellulose. The solution was mixed for no longer than 15 minutes. A specified amount of 1N sodium hydroxide, was then added. The pH was checked and, if needed, was adjusted to 7.3 with 1N sodium hydroxide or 1N hydrochloric acid. Ketorolac tromethamine was then added based on "as is" assay and mixed until completely dissolved based on visual inspection. When dissolved, the solution pH was again checked and if needed adjusted to pH 7.3-7.5 (final target pH is 7.4) with 1N sodium hydroxide or 1N hydrochloric acid. Purified water was then added to bring the bulk solution to final volume and allowed to mix for at least 15 minutes to ensure uniformity. The solution was then sterile filtered for use. [0042] Unless otherwise specified, all steps in this procedure were carried out at room temperature. The following procedure was followed in accordance with the amounts listed in Table 2 below. Purified water at 90% of batch size was charged into the main batch vessel. Mixing was initiated to produce a vortex sufficient to disperse and/or dissolve all product ingredients without excessive aeration or foam formation. The following components were added directly into the vortex in order, allowing each to dissolve before adding the next: sodium chloride, edetate disodium, octoxynol-40 (as a 70% stock solution) and benzalkoniurn chloride (as a 10% stock solution). The amount of benzalkonium chloride added took into account the assay of the stock solution used. The solution was mixed for no longer than 15 minutes. A specified amount of 1N sodium hydroxide, 1.85 mL per liter of final bulk product, was then added. The pH was checked and if needed was adjusted to 10.7-11.0 with 1N sodium hydroxide or 1N hydrochloric acid. Ketorolac tromethamine was then added based on "as is" assay and mixed until completely dissolved based on visual inspection. When dissolved, the solution pH was again checked and if needed adjusted to pH 7.3-7.5 (final target pH is 7.4) with 1N sodium hydroxide or 1N hydrochloric acid. Purified water was then added to bring the bulk solution to final volume and allowed to mix for at least 15 minutes to ensure uniformity. The solution was then sterile filtered for use. [0043] This example was prepared according to the procedure of Example 1, except that hydroxypropyl cellulose was used in place of the sodium carboxymethyl cellulose in an amount sufficient to provide a viscosity equivalent to the viscosity of the composition of Example 1. EXAMPLE 4 [0044] The following composition was manufactured on a volume basis at ambient temperates from two principal parts. Each part is manufactured separately and then combined under controlled sequences to form a sterile bulk product: the first part (Part 1) involves the dissolution of carboxymethyl cellulose sodium in water followed by bulk heat sterilization, and the second part (Part 2) involves dissolution of ketorolac tromethamine and salts in water sterile filtration throng a 0.2 micron membrane into a sterile pressure vessel. The sterile bulk solution is then clarity filtered through a 20 micron polypropylene membrane filter into the filling machine reservoir. [0045] The sterile post-clarity filtered solution is then filled by a UD filling machine via blow-fill-seal process into UD vials using virgin LDPE resin without colorant. The filling is done in an ISO Class 5 environment. The nominal fill is 0.4 mL into 0.9 mL capacity vials. [0046] Comparison of Aqueous Humor Ketorolac Pharmacokinetics Following a Single Ocular Instillation of 0.45% Ketorolac Tromethamine Formulations with Varying pH to Acular LS® in New Zealand White Rabbits. [0047] Study Objectives: [0048] 1) To compare aqueous humor ketorolac pharmacokinetics following a single ocular instillation of 0.45% ketorolac tromethamine formulations with varying pH and Acular LS® to New Zealand White rabbits; [0049] 2) This Example was designed to determine whether decreasing the pH of the composition would increase the absorption of ketorolac into the eye; and, [0050] 3) In addition, one arm of this trial was designed to test the effect of decreasing viscosity of the composition from 22 cps to 11 cps. [0051] The specifics of this study are as follows: [0052] Rabbit Aqueous Humor Ketorolac Concentrations following Administration of Three 0.45% Ketorolac Tromethamine Formulations and Acular LS [0054] The sodium carboxymethyl cellulose-containing formulations perform better than Acular LS® with a relative bioavailability ranging from 133% (0.45% Keto 22 cps pH 7.2) to 202% (0.45% Keto 22 cps pH 6.8). However, there is not a clear pH effect-because the 0.45% Keto 22 cps pH 7.4 has a relative bioavailability of 153%, although one anomalous result maybe driving this observation. Nevertheless, the solution having a pH of 6.8 shows the best bioavailability. EXAMPLE 6 [0055] A multicenter, randomized, double-masked, parallel-group study is carried out using the 0.4% ketorolac tromethamine formulations of Examples 2 and 3. The study subjects consisted of 157 patients (78-79/group) undergoing unilateral PRK surgery. The key inclusion criteria for the study is that each subject a) is a candidate for unilateral photorefractive keratectomy surgery (PRK) within 7 days after the initial visit, b) have best-corrected ETDRS visual acuity of 20/100 or better, and c) is capable of wearing a soft bandage contact lens. Key exclusion criteria are a history of refractive ocular surgery and sensitivity to study medication or its vehicle, Tylenol #3®, or Ocuflox®. The patient demographics are shown in Table 6. A total of 157 patients are enrolled with an age range of 20-66 years. There are no significant demographic differences between treatment groups. [0056] Each subject receives the Ocuflox® 5 min prior to study medication. The study subjects then receive ketorolac tromethamine 0.4% ophthalmic solution of Example 2 or Example 3, 1 drop QID for up to 4 days. Then all subjects are then instructed to take Tylenol #3® as needed for intolerable pain (escape medication). Patients use electronic diaries with date and time stamp to record the ocular pain they experience as one of the following: no pain; mild; moderate; severe; and intolerable. [0057] The pain intensity is less for the subjects who receive the solution of Example 2 during the first 12 hours post-PRK compared to those who receive the solution of Example 3. In particular, during the first 12 hours post-PRK, the group that receive the solution of Example 2 had fewer patients with severe or intolerable pain compared with the receive the solution of Example 3. In particular, the median pain intensity reported by the group which receive the solution of Example 2 was 1 grade less than with the group which receive the solution of Example 3 (moderate vs. severe on a 5-point scale of 0=no pain to 4=intolerable pain). Additionally, pain intensity is also less for the group which receive compared with the group which receive the solution of Example 3. [0058] This clinical study shows that the solution of invention provides a greater degree of absorption of ketorolac as compared to the solution without sodium carboxymethyl cellulose despite the fact that the solutions have the same concentration of ketorolac and are at the same viscosity. [0066] As shown in FIGS. 1-5, Example 7 shows there is an: [0067] 1) Increase in relative bioavailability of ketorolac as compared to Acular LS®; [0068] 2) Increased ketorolac concentrations are maintained longer post-dose; and [0069] 3) Together these data support a reduction in dosing frequency from 4×/day to 2×/day. As shown in FIG. 6, Acular 0.45% is safe and well-tolerated among human patients when given 5 times over a half-day and compares very favorably to ACULAR LS. Visual Acuity in Operative Eye [0070] This summary of clinical safety (SCS) is based on 2 completed phase 3 studies of identical design and on one completed phase 1 study. All 3 studies support the safe use of a new formulation of ketorolac tromethamine ophthalmic solution 0.45% w/v (henceforth referred to as ketorolac 0.45%), an unpreserved formulation of ketorolac tromethamine ophthalmic solution containing a mixture of medium and high-molecular carboxymethyl cellulose (CMC). The formulation was used in the phase 3 studies, which investigated the safety of ketorolac 0.45% in cataract surgery patients. The phase 1 study investigated the safety of ketorolac 0.45% in healthy adult volunteers. [0071] The current labeling for approved formulations of ketorolac tromethamine ophthalmic solution such as ACULAR LS® (0.40% w/v ketorolac) lists from 20% to 40% transient stinging and burning on instillation. The 0.45% formulation used in the phase 3 studies that form the basis of this application was developed, among other reasons, to improve comfort when administered in the eye, primarily by the addition of medium and high molecular weight carboxymethyl cellulose and the removal of octoxynol and benzalkonium chloride (BAK). [0072] Studies evaluated efficacy and safety of ketorolac 0.45% compared with vehicle (same composition without the active) for the treatment of anterior chamber inflammation, ocular pain, and inhibition of surgically induced miosis following cataract extraction with posterior chamber intraocular lens (IOL) implantation. Both studies demonstrated that ketorolac 0.45% was safe and well tolerated. No new or unexpected safety findings were observed in either study. In addition, ketorolac 0.45% was found to be very well tolerated with a very low incidence of burning and stinging. [0073] Another study assessed the safety and tolerability of ketorolac tromethamine ophthalmic solutions 0.35% and 0.45% compared with ACULAR LS® 0.4% in healthy adult subjects. ACULAR LS® 0.4% was chosen for comparison as it was known to be a better tolerated formulation than original ACULAR® (0.50% w/v ketorolac) due to the lower concentration of ketorolac and removal of BAK and octoxynol. Compared with ACULAR LS® 0.4%, ketorolac 0.45% had a consistently lower incidence of ocular symptoms such as burning/stinging and ocular discomfort when dosed 5 times in 1 day. No new or unexpected safety findings were observed for any of the ketorolac formulations. [0074] The ketorolac 0.45% formulation of the present invention was characterized in ocular and systemic ketorolac rabbit pharmacokinetic and toxicokinetic studies, in addition to 1-day ocular tolerability, 1-month ocular toxicity, and 6-day ocular wound healing studies. From the results of these preclinical studies, 0.45% ketorolac tromethamine administered twice per day was anticipated to deliver ketorolac to ocular tissues that are efficacious but at lower levels than those previously demonstrated to be safe in long term toxicology studies. [0075] The phase 3 studies were of identical design, multi-center, randomized, double-masked, parallel group comparison studies conducted to assess the safety and efficacy of ketorolac 0.45% compared with vehicle. Study patients underwent cataract extraction surgery with posterior chamber IOL implantation. Ketorolac 0.45% or vehicle was self-administered by patients (1 drop twice daily in the operative eye beginning on the day before surgery and continuing on the day of surgery through the first 2 weeks following surgery) and administered by medical personnel (3 drops during the 2 hr prior to surgery and 1 drop after surgery). The safety parameters assessed were adverse events, vital signs, intraocular pressure, visual acuity, biomicroscopy, and ophthalmoscopic examinations. The studies consisted of 7 scheduled visits: screening (week -4 to day -2); randomization (day -3 to day -1); cataract surgery day; and postoperative days 1, 3, 7, and 14. Patients receiving ketorolac 0.45% had a lower incidence of ocular adverse events and of adverse events that led to discontinuation than patients receiving vehicle. [0077] In a two phase 3 studies pooled, more than 2/3 of patients in both treatment groups experienced at least 1 line of improvement in visual acuity from baseline to final evaluation. Two patients in each treatment group had a decrease in visual acuity of >3 lines (0.6% [2/320] of ketorolac 0.45% patients, 1.3% [2/158] of vehicle patients). [0078] The proportion of ketorolac 0.45%-treated patients who experienced at least 3 lines of improvement was statistically significantly higher than the proportion of vehicle-treated patients (58.1% [186/320] of ketorolac 0.45% patients, 41.1% [65/158] of vehicle patients, p<0.001). Statistical significance for the same comparison was observed in study -006 (p=0.002) but borderline significant in study -005 (p=0.054). [0079] In the phase 1 study, most subjects had no change in visual acuity during treatment. Decreases in visual acuity during treatment with respect to baseline were observed for 1 (5.0%) ketorolac 0.45%-treated eye, 1 (5.3%) ketorolac 0.35%-treated eye, and 3 (7.7%) ACULAR LS®-treated eyes. [0080] Conclusions: [0081] 1) The impact of treatment on visual acuity favors ketorolac over vehicle; [0082] 2) More than 2/3 of patients in both treatment groups experienced at least 1 line of improvement in visual acuity from baseline to final evaluation; [0083] 3) Twice the percentage of patients in the vehicle group experienced a decrease in visual acuity of >3 lines; and, [0084] 4) The ketorolac 0.45% w/v group experienced over 40% greater incidence of patients experiencing at least 3 lines of improvement--a statistically significant difference. [0085] The present invention is not to be limited in scope by the exemplified embodiments, which are only intended as illustrations of specific aspects of the invention. Various modifications of the invention, in addition to those disclosed herein, will be apparent to those skilled in the art by a careful reading of the specification, including the claims, as originally filed. It is intended that all such modifications will fall within the scope of the appended claims. Patent applications by Chin-Ming Chang, Tustin, CA US Patent applications by Devin F. Welty, Foothill Ranch, CA US Patent applications by Eldon Q. Farnes, Laguna Beach, CA US Patent applications by Mayssa Attar, Placentia, CA US Patent applications by Rhett M. Schiffman, Laguna Beach, CA US Patent applications by Richard S. Graham, Irvine, CA US Patent applications in class Ring nitrogen is shared by the cyclos of the bicyclo ring system Patent applications in all subclasses Ring nitrogen is shared by the cyclos of the bicyclo ring system
Low
[ 0.5174672489082971, 29.625, 27.625 ]
Team News: Valencia v. Arsenal For the last preseason match before the 09/10 Barclay's Premier League, Arsenal travels south to the sunny and beautiful Spain to take on Valencia at the Mestalla As far as preseason games go, this one is as important as they get. Arsene is expected to field the team he wants to start at Goodison Park. Of course this is barring any unexpected injuries tonight or in the absolutely ******* idiotic international games on Wednesday. It is looking increasingly likely that we will be using a 4-3-3 in the new season to accomodate our wealth of attacking talent as well as our lack of a true defensive partner for Fabregas that is required in a 4-4-2 formation. This match will challenge that formation as much as a preseason match can. Valencia is a good attacking team that can pose a threat from all areas of the pitch. With Silva, Fernandes, and Joaquin in the midfield, they will press forward and severly test how our three midfielders will protect our back five. Also with one of the top 5 strikers in the world, David Villa, the partnership of Gallas and Djourou will also face a stern test. Theo Walcott and Kieran Gibbs have been included in the squad for the first time this preseason. Nasri, Vermaelen, and Rosicky are all out.
Mid
[ 0.617021276595744, 29, 18 ]
US fast-food giant McDonald's, famed for its beef-based Big Mac burgers, on Tuesday said it will open its first vegetarian-only restaurant anywhere in the world in India next year. The world's second-biggest restaurant chain after Subway tailors its menus to suit local tastes, which in India means no beef to avoid offending Hindus and no pork to cater for Muslim requirements. The first vegetarian outlet will open its doors mid-next year near the Golden Temple in Amritsar where religious authorities forbid consumption of meat at the shrine. "It will be the first time we have opened a vegetarian restaurant," a spokesman for McDonald's in northern India, Rajesh Kumar Maini, told AFP. "There is a big opportunity for vegetarian restaurants (in India) as many Indians are vegetarian." After the opening in Amritsar, the US chain has plans to open another vegetarian outlet near the Vaishno Devi cave shrine in Jammu and Kashmir that draws hundreds of thousands of worshippers year. McDonald's in India has a menu that is 50-percent vegetarian. Its McAloo Tikki burger -- which uses a spiced potato-based patty -- is the top seller, accounting for a quarter of total sales. Among the chicken-only meat offerings, the Maharaja Mac is also a favourite. "At the moment, India is still a very small market -- we just have 271 restaurants in India and across the world we have nearly 33,000," Maini said. "But when you look at the potential of the country, it is one of the top priority countries and we are laying the groundwork for capturing the market." Hindus, who account for 80 percent of India's 1.2 billion population, regard cows as sacred. For Muslims, the consumption of pork is prohibited in the Koran.
High
[ 0.661190965092402, 40.25, 20.625 ]
Introduction {#Sec1} ============ Metalloporphyrins are assumed to have extra ordinary importance in recent years as agents for photodynamic therapy, optoelectronic devices, sensors, molecular logic devices and artificial solar energy harvesting and storage schemes \[[@CR1]\]. Taking into account a great number of infections resulting from different bacterial species and the growing antibacterial resistance, the development of compounds with high antibacterial activities and novel mechanism of action is an urgent need \[[@CR2]--[@CR4]\]. As a consequence, researchers are designing novel, convenient, robust and inexpensive strategies for combating microorganisms with minimal invasive consequences \[[@CR5], [@CR6]\]. In this regard, natural and synthetic metalloporphyrins are among relatively low toxic molecules (either in vitro or in vivo) and are capable of effecting microbial and viral pathogens through the large number of different mechanisms \[[@CR7]\]. In addition, the possibility of structural modifications place these molecules into a group of compounds that present a sustainable source for discovery of novel procedures, materials and agents active against a wide range of pathogenic microorganisms \[[@CR7]\]. Modification of porphyrin ligand at the peripheral positions provokes tunable shape, size and symmetry which have suitable applications in materials and therapeutics \[[@CR8]\]. The most common structural modification of synthetic porphyrins is made at the meso-position to achieve target molecules with required properties in biomedical applications such as photo diagnosis, cancer therapy and as antibacterial agents \[[@CR9], [@CR10]\]. Nowadays, an ever increase in the mortality rate throughout the world is linked with infectious diseases with multiple resistances to antibiotics and the lack of effective treatments \[[@CR2]--[@CR4]\]. Porphyrin based systems have been reported as potential antibacterial agents against Gram-positive and Gram-negative bacteria species for decades \[[@CR11]--[@CR21]\]. They were used to treat different kinds of bacteria including bacillus subtilis, *Escherichia coli*, mycobacterium smegmatis, and actinobacillus \[[@CR22]--[@CR24]\]. The activities are based on their ability to catalyse peroxidase--oxidase reactions, generate reactive oxygen species (ROS) by absorbing light and partition into lipids of bacterial membranes \[[@CR2], [@CR25]\]. However, in most cases, much attention has been paid to ionic porphyrins (cationic \[[@CR4], [@CR15], [@CR16], [@CR26]--[@CR33]\] and anionic \[[@CR34]--[@CR36]\] presumably because of their ability to strongly bind with cellular components and better activity than the neutral ones \[[@CR15], [@CR28], [@CR37]\]. But, ionic porphyrins are very limited and studies involving neutral porphyrins to treat bacterial infections are becoming attractive. In line with this, antibacterial activity has been reported against *Staphylococcus aureus*, Mycobacterium smegmatis and Yersinia enterocolitica by using neutral porphyrins with the alkyl substituents at the β-pyrrolic positions \[[@CR15], [@CR33], [@CR38]\]. However, there is no intensive report or documantation regarding neutral porphyrins for treating antibacterial infections. In this work we, therefore report antibacterial activity of 5, 10, 15, 20-tetrakis (*para*-X phenyl)porphyrinato M (II) \[where X = H, NH~2~ and COOMe for M = Cu and X = COOH and OMe for M = Co\] for the first time (Fig. [1](#Fig1){ref-type="fig"}). To the best of our knowledge the antibacterial activity of these particular metalloporphyrins is not reported previously. The study revealed the highest antibacterial activity for Co (II) porphyrin containing COOH, which could be attributed to the high binding ability of COOH group to various cellular components and its lipohilicity.Fig. 1A schematic diagram for bacterial growth inhibition by metalloporphyrins Experimental {#Sec2} ============ Antibacterial activity testing {#Sec3} ------------------------------ The metal salts, ligands and their metal complexes were evaluated for in vitro antibacterial activities against strains of the two Gram-negative bacterial strains such as *Escherichia coli* (*E. coli*) and *Klebsiella pneumoniae* (*K. pneumoniae*); two Gram positive bacterial strains such as *Staphylococcus aureus* (*S. aureus*) and *Streptococcus pyogenes* (*S. pyogenes*) bacterium by disc diffusion method. In this method, activity of the test compounds was expressed by measuring the diameter of zone of inhibition. The plates were observed for zones of inhibition after 24 h, and incubation at 37 °C. The diameters of the zone of inhibition produced by the complexes were compared with a standard antibiotic drug Gentamycin. All the bacterial strains used in the experiment were received from microbiology laboratory, Bahir Dar University. Media preparation and sterilization {#Sec4} ----------------------------------- The Culture media (Mueller Hinton) were prepared according to the manufacturer's guideline (suspend 38 g in 1 L of distilled water). The mass of the culture medium was weighed and dissolved in distilled water. The mixture was stirred with a sterilized glass rod and tightly covered with an aluminum foil and then the culture medium was autoclaved for 15 min at 121 °C. Next to that,the agar was allowed to cool in order to maintain the media in a molten stage. Petri dishes were dried in lower humidity by keeping them in a laminar flow hood. The freshly prepared and cooled Muller--Hinton agar was spread at the surface of petri dishes. Inoculation of test plates {#Sec5} -------------------------- A small volume, about 0.1 mL of the bacterial suspensions were inoculated onto the dried surface of Muller--Hinton agar plate and streaked (swabbed) by the sterile cotton swab over the entire sterile agar surface. This procedure was repeated by streaking two more times, rotating the plate approximately 60 °C each times to ensure an even distribution of inoculums and the rim of the agar was swabbed. The lid was left ajar for 3--15 min, to allow for any excess surface moisture to be absorbed before applying the samples on the respective well. Sample injection and incubation {#Sec6} ------------------------------- Anti-bactericidal activities of each reagents and synthesized complexes were evaluated by the disc diffusion method. Agar were prepared by using a sterilized cork borer with 6 mm diameter, 4 mm deep and about 2.5 cm apart to minimize overlapping of zones. Then holes of 6 mm diameter were punched carefully using a sterile cork borer. The metal salts of each complex, DMSO, the ligands, and their metal complexes were carefully injected to the respective disc in duplicate. The reference antibiotic agent disc (gentamycin) was dispensed via sterile pair of forceps onto the surface of the inoculated agar plate and pressed down to ensure complete contact with the agar surface. It was allowed to diffuse for about 40 min before incubation and then the plates were incubated at 37 °C for 24 h. After 24 h incubation, the antibacterial activity was evaluated by measuring the diameter of inhibition zones in millimeter. The test was carried out in duplicate and the results were recorded as mean ± standard deviation. Results and discussion {#Sec7} ====================== Synthesis and photophysical properties {#Sec8} -------------------------------------- The metalloporphyrins employed in this study were synthesized by following reported methods \[[@CR39]--[@CR44]\]. The detail synthetic procedure, characterization data and photophysical properties of as synthesized compounds is shown in supporting information. Antibacterial activity {#Sec9} ---------------------- The as synthesized metalloporphyrins were tested for their in vitro antibacterial activity in the open condition under visible/white light and the results were compared with the ligand, metal salt and the commercially available drug, *gentamycin,*. The activity is 1st tested against two Gram-positive (*Staphylococcus aureus* (*S. aureus*) and *Streptococcus pyogenes*(*S. pyogenes*) and two Gram-negative \[*Escherichia coli* (*E. coli*) and *Klebsiella pneumoniae* (*K. pneumoniae*)\] bacteria by using 31.25, 62.5, 125, 250 and 500 mg/L of each metalloporphyrins. All the tested metalloporphyrins were found to be active against all the tested pathogens and compared with the commercially available antibiotic drug (gentamycin). The result of antibacterial activities is reported as inhibition zone diameter (mm) for the concentration of 500 mg/L as shown in Table [1](#Tab1){ref-type="table"}.Table 1Antibacterial activiy (mean IZ diameter (mm) ± SD) of metalloporphyrins, corresponding ligands, metal salts, and gentamycin with concentration 500 mg/LCompoundsAntibacterial activiy (mean IZ diameter (mm) ± SD)*S. aureusS. pyogenesE. coliK. pneumonia*CoTPPCOOH*16.5 ± 0.5*15 ± 0.316 ± 0.516 ± 0.6CoTPPOMe12 ± 0.2*14 ± 0.6*10 ± 0.312 ± 02CuTPPCOOMe*16 ± 0.2*15 ± 0.513 ± 0.613.5 ± 075CuTPPNH~2~13 ± 0.4*13.5 ± 0.3*12 ± 0.4512.5 ± 0.6H~2~TPPCOOH8.5 ± 0.29 ± 0.37.5 ± 0. 37.5 ± 0.4H~2~TPPCOOMe8.25 ± 0.38 ± 0.27.5 ± 0.037.5 ± 0.2H~2~TPPOMe7 ± 0.37.25 ± 0.37 ± 0.37 ± 0.2H~2~TPPNH~2~7.5 ± 0.27.75 ± 0.37 ± 0.017 ± 0.2CuCl~2~·2H~2~O6.75 ± 0.27 ± 0.36.25 ± 0.026.5 ± 0.4Co acetate6.5 ± 0.17 ± 0.26.5 ± 0.16.5 ± 0.2DMSO0 ± 0.000 ± 0.000 ± 0.000 ± 0.0010 µg gentamicin25 ± 0.627 ± 0.7526 ± 0.7525 ± 0.5 All the complexes under study showed better antibacterial growth inhibition activity than the corresponding porphyrin ligand. This is a clear indication for the involvement of metal ions as potential candidates in bacterial growth inhibition. The justification for enormous antibacterial activity of transition metal complexes of porphyrins is based on overtone concept and chelation theory. The solubility of the complexes in lipid is an important factor to control the antibacterial activity \[[@CR45]--[@CR48]\]. Based on the overtone concept of cell permeability, the passage of the materials which are only lipophilic is favored by the lipid membrane that surrounds the cell. On the other hand, the dramatic decrease in polarity of metal ions because of an overlap of orbital of ligand and partial sharing of the positive charge of the metal ion with donor groups can be blearily explained by employing chelation theory. Moreover, this phenomenon increases the π-electron delocalization all over the whole porprhyrin ring and enhances the lipid solubility behavior of the complexes. Presumably, an increase in lipid-solubility of the porphyrin ligands upon metallation makes the complexes easily move across the bacterial cell. This process inhibits the metals to bind with the enzymes in microorganisms. In addition, the respiration process of the cell could be interrupted and thereby block the synthesis of biomolecules, which limit over enlargement of organism \[[@CR49]\]. As can be seen from Table [2](#Tab2){ref-type="table"} and Fig. [2](#Fig2){ref-type="fig"} increasing the concentration of antibacterial agents increase the activity very slightly and metalooporphyrins under study are active and inhibit bacteria even at the lowest concentration (31.25 mg/L). Moreover, the bacteria growth inhibition activity of the complexes is not significantly different among different bacteria species. The 5, 10, 15, 20-tetrakis (*p*-carboxyphenyl)porphyrinato cobalt (II), exhibited the greater antimicrobial activities than other metalloporphyrins with inhibition zones 16.5 mm for *S. aureus* presumably attributing to its ability to strongly bind with cellular components.Table 2Antibacterial activiy (mean IZ diameter (mm) ± SD) of cobaltporphyrins, at different concentrationsCobalt complexes at different concentrationAntibacterial activiy (mean IZ diameter (mm) ± SD)*S. aureusS. pyogenesE. coliK. pneumonia*500 mg/L CoTPPCOOH16.5 ± 0.515 ± 0.316 ± 0.516 ± 0.6 CoTPPOMe12 ± 0.214 ± 0.610 ± 0.312 ± 02250 mg/L CoTPPCOOH12.5 ± 0.4513 ± 0.313 ± 0.413 ± 0.3 CoTPPOMe11.5 ± 0.310 ± 0.211.5 ± 0.211 ± 0.0.45125 mg/L CoTPPCOOH13 ± 0.311 ± 0.5511 ± 0.311 ± 0.75 CoTPPOMe10.5 ± 0.59 ± 0.510 ± 0.59 ± 0.362.5 mg/L CoTPPCOOH12 ± 0.610.5 ± 0.412 ± 0.512 ± 0.4 CoTPPOMe8 ± 0.28 ± 0.39 ± 0.49.5 ± 0.231.25 mg/L CoTPPCOOH10.5 ± 0.310 ± 0.29 ± 0.19.5 ± 0.3 CoTPPOMe8 ± 0.48 ± 0.28 ± 0.459 ± 0.3Fig. 2Bar graph of 5, 10, 15, 20-tetrakis (p-X phenyl)porphyrinato cobalt (II), where X = COOH and OMe on the same concentration pattern For copper complexes of 5, 10, 15, 20-tetrakis (p-X phenyl)porphyrin, as the concentration of the complexes increase, the antimicrobial activity also increase as shown in Table [3](#Tab3){ref-type="table"} (Figs. [3](#Fig3){ref-type="fig"}, [4](#Fig4){ref-type="fig"}).Table 3Antibacterial activity (mean IZ diameter (mm) ± SD) of copperporphyrins, at different concentrationsCopper complexes at different concentrationAntibacterial activity (mean IZ diameter (mm) ± SD)*S. aureusS. pyogenesE. coliK. pneumonia*500 mg/L CuTPPCOOMe16 ± 0.215 ± 0.513 ± 0.613.5 ± 075 CuTPPNH~2~13 ± 0.413.5 ± 0.312 ± 0.4512.5 ± 0.6250 mg/L CuTPPCOOMe12 ± 0.4512.5 ± 0.312 ± 0.0211.5 ± 0.3 CuTPPNH~2~11 ± 0.211 ± 0.610.5 ± 0.310 ± 0.2125 mg/L CuTPPCOOMe11.5 ± 0.511 ± 0.459.5 ± 0.0210 ± 0.5 CuTPPNH~2~10 ± 0.7511.5 ± 0.49 ± 0.39.5 ± 0.462.5 mg/L CuTPPCOOMe10.5 ± 0.210.25 ± 0.59 ± 0.039.5 ± 0.2 CuTPPNH~2~9 ± 0.58.5 ± 0.59 ± 0.28.5 ± 0.4531.25 mg/L CuTPPCOOMe9 ± 0.48.75 ± 0.38.5 ± 0.048 ± 0.2 CuTPPNH~2~8 ± 0.28 ± 0.17.5 ± 0.58 ± 0.75Fig. 3Inhibition of; **a** *Staphylococcus aureus* (*S. aureus*) and **b** *Streptococcus pyogenes* (*S. pyogenes*) by 5, 10, 15, 20-tetrakis (*p*-carboxyphenyl)porphyrinato cobalt (II)Fig. 4Inhibition of; **a** *Escherichia coli* (*E. coli*) and **b** *Klebsiella pneumoniae* (*K. pneumoniae*) by 5, 10, 15, 20-tetrakis (*p*-carboxyphenyl)porphyrinato cobalt (II) Though antimicrobial activity of porphyrin derivatives of natural origin with COOH groups at *β*-pyrrolic positions have been reported so far \[[@CR50]--[@CR57]\], metalloporpyhrins with p-COOH at meso position of phenyl ring is not reported. Moreover, consistent with the report by Ke and coworkers, the electron withdrawing substituents enhance antibacterial activity attributing to increasing lipophilicity and polarity of the complex \[[@CR15], [@CR28]\]. Generally, the metal complexes containing electron withdrawal groups (with COOH and --COOMe showed better activities than the metal complex containing electron donating groups namely --NH~2~ and --OMe. Conclusion {#Sec10} ========== In general, antibacterial activity of metalloprphyrins with different peripheral substituents is reported. The study indicated that all the complexes under study have promising antibacterial activity toward two Gram-positive (*Staphylococcus aureus*(*S. aureus*) and *Streptococcus pyogenes*(*S. pyogenes*) and two Gram-negative \[*Escherichia coli*(*E. coli*)*and Klebsiella pneumoniae*(*K. pneumoniae*)\] bacterial species. It is also found that bacterial growth inhibition by metallopophyrins is higher than the corresponding metal salt or DMSO. Increasing the concentration of the complexes slightly increases the inhibition activity. Among the complexes under study, the highest antibacterial activity is observed for CoTPPCOOH*,* which could be attributed to the high binding ability of COOH group to cellular components, membranes, proteins, and DNA as well as the lipohilicity of the complex. Moreover, consistent with literature report, the study revealed that metalloporphyrins with electron withdrawing group at para-positions have better antibacterial activity than metalloporphyrins which possess electron donating group at para position. The result finally concludes that metalloporphyrin derivatives are promising candidates for antibacterial activity. DNA : Deoxyribonucleic acid TPP : Tetra phenyl porphyrin M (II) : Metal with oxidation state of 2 Me : Methyl OMe : Methoxy COOMe : Methoxycarbonyl ROS : Reactive oxygen species °C : Degree centigrade h : Hour DMSO : Dimethylsulphoxide IZ : Inhibition zone SD : Standard Deviation *S. aureus* : *Staphylococcus aureus* *S. pyogenes* : *Streptococcus pyogenes* *E. coli* : *Escherichia coli* *K. pneumoniae* : *Klebsiella pneumonia* g : Gram mg : Milligram L : Liter mL : Milliliter µg : Microgram mm : Millimeter **Publisher\'s Note** Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations. We would like to acknowledge department of chemistry, Bahir Dar University for providing laboratory space and chemicals to do our experiment. Moreover, we are pleased to thank Institute of Chemistry Academia Sinica to help us run ESI-Mass and NMR experiments. We are also grateful department of microbiology for allowing us to conduct antibacterial activity. BBB synthesized the ligands, analyzed and interpreted the spectroscopic and Mass data, organized data and completed write-up of the manuscript. GAW performed the synthesis of metalloporphyrin part and did manuscript drafting. All authors read and approved the final manuscript. No financial support for this project. But Bahir Dar University provides only chemicals and facilities for our research. Not applicable. Not applicable. All data generated or analyzed during this study are included in this manuscript and its supplementary information files. We declare that no any competing interest.
Mid
[ 0.639296187683284, 27.25, 15.375 ]
# 第一周题目 ## 链表 - 简单:https://leetcode-cn.com/problems/remove-duplicates-from-sorted-list/ - 简单:https://leetcode-cn.com/problems/merge-two-sorted-lists - 中等:https://leetcode-cn.com/problems/swap-nodes-in-pairs/ - 中等:https://leetcode-cn.com/problems/linked-list-cycle-ii - 困难:https://leetcode-cn.com/problems/reverse-nodes-in-k-group/ ## 数组 - 简单:https://leetcode-cn.com/problems/sort-array-by-parity/ - 简单:https://leetcode-cn.com/problems/sort-array-by-parity-ii/ - 中等:https://leetcode-cn.com/problems/search-in-rotated-sorted-array-ii/ - 中等:https://leetcode-cn.com/problems/find-minimum-in-rotated-sorted-array/ - 困难:https://leetcode-cn.com/problems/search-in-rotated-sorted-array ## 栈 - 简单:https://leetcode-cn.com/problems/valid-parentheses/ - 中等:https://leetcode-cn.com/problems/next-greater-element-ii/ - 困难:https://leetcode-cn.com/problems/maximum-frequency-stack/ ## 递归 - 简单:https://leetcode-cn.com/problems/longest-univalue-path/ - 中等:https://leetcode-cn.com/problems/partition-to-k-equal-sum-subsets/ - 困难:https://leetcode-cn.com/problems/special-binary-string/ ## 排序 - 简单:https://leetcode-cn.com/problems/valid-anagram/ - 中等:https://leetcode-cn.com/problems/wiggle-sort-ii/ - 困难:https://leetcode-cn.com/problems/maximum-gap/ ## 二分查找 - 简单:https://leetcode-cn.com/problems/arranging-coins/ - 中等:https://leetcode-cn.com/problems/powx-n/ - 困难:https://leetcode-cn.com/problems/dungeon-game/
High
[ 0.849846782431052, 13, 2.296875 ]
101 A.2d 517 (1953) BELLAND v. AMERICAN AUTOMOBILE INS. CO. et al. No. 1385. Municipal Court of Appeals for the District of Columbia. Argued November 9, 1953. Decided December 28, 1953. *518 C. Frank Reifsnyder, Washington, D. C., George D. Horning, Jr., Washington, D. C., on the brief, for appellant. Thomas S. Jackson, Washington, D. C., Louis M. Denit and Martin R. Fain, Washington, D. C., on the brief, for appellee American Automobile Ins. Co. James A. Crooks, Washington, D. C., for appellee Universal Carloading & Distributing Co. Before CAYTON, Chief Judge, and HOOD and QUINN, Associate Judges. CAYTON, Chief Judge. Cameron H. Belland shipped seven cartons of personal effects from Los Angeles, California, to Arlington, Virginia. After certain occurrences to which we shall refer later, and when the shipment was ultimately delivered to him, one of the cartons was missing. The carrier reported it to the police as stolen. Mr. Belland's wife, Lenore M. Belland, sued the insurance company on its "Residence and Outside Theft" policy for the value of the contents of the stolen carton. She made no claim on the carrier, Universal Carloading and Distributing Company, but the insurance company caused the carrier to be joined in the action as third-party defendant. Though the case was tried by jury, counsel stipulated that the jury was to consider only the question of value and that "all other issues in case, including issues of fact together with question of liability, if any, are to be decided by the trial judge." In a written memorandum the trial judge ruled that plaintiff's loss was not covered by the insurance policy and ordered judgment for both defendants. That decision is brought here for review. Appellant contends that the insurance company is liable under the language of the policy (Coverage A) which covers "loss by theft from the premises or, if the property has been placed therein by the insured for safekeeping, from within any * * * public warehouse * * *." The question of the applicability and construction of the quoted clause arises because of the following circumstances. The apartment the Bellands hoped to occupy in Arlington, Virginia, and to which the shipment had been directed was not available to them. Universal attempted delivery there but failed and then mailed notice of nondelivery to Mr. Belland with a request for new delivery instructions. He responded by telephone and asked Universal to store the shipment temporarily; and Universal agreed to store it in their terminal in Washington for an additional charge. Some seven weeks later the delivery was made to Mr. Belland's new address in Virginia, and the shipment was short one carton. The question arises whether, while being held by Universal for final delivery instructions, the goods were in a "public warehouse." Appellant cites and asks us to adopt a dictionary definition of the term. We think, however, that in determining the meaning of the policy we must apply the established legal principle of giving words "the meaning which common speech imports." Pennsylvania Indemnity Fire Corp. v. Aldridge, 73 App.D.C. 161, 117 F.2d 774, 775, 133 A.L.R. 914. Where there is any fair doubt as to the meaning of words in a policy it will, of course, be resolved against the insurer. But ambiguities will not be sought out, and if the language has but one clear meaning that meaning will be adopted whether favorable to the insured or not. Capital City Life Ins. Co. v. Saunders, D.C.Mun.App., 65 A.2d 588, 589. That being so, we think that a reasonable definition and one in accord with the common usage of the words is that which is set out in 67 C.J., Warehousemen and Safe Depositaries, § 3, p. 443: "A `public warehouse' is a place that is held out to the public as being one where any member of the public, who is willing to pay the regular charges, may store his goods. * * *" The plain and uncontradicted evidence was that Universal was not operating a public warehouse; that although goods are occasionally stored there such goods were always such as had come into their custody for purposes of carriage, either prior to or *519 after storage; and that any storing by Universal is entirely incidental to its business as a freight forwarder. Universal does not accept for storage goods of the general public or of owners other than those initially delivered to Universal for transportation. We think, therefore, that we would have to read into the policy nonexistent ambiguities, and distort its plain meaning, in order to adopt the contention of appellant. We must rule that the clause referred to does not cover this situation and that the terminal of Universal was not a public warehouse. By another clause in the policy (Coverage B) the insurer bound itself to pay for "theft away from the premises," but with these exclusionary words: "This coverage does not apply to: * * * (d) loss of property while * * * in the charge of any carrier for hire. * * *" Were the goods in charge of a carrier for hire? Universal is admittedly a freight forwarder. The customary function and status of such forwarders have been discussed in two recent Supreme Court decisions. United States v. Chicago Heights Trucking Co., 310 U.S. 344, 60 S. Ct. 931, 84 L.Ed. 1243; Chicago, M., St. P. & Pac. R. Co. v. Acme Fast Freight, 336 U.S. 465, 69 S.Ct. 692, 93 L.Ed. 817. In the second of these two cases, 336 U.S. at page 467, 69 S.Ct. at page 693, Chief Justice Vinson pointed out: "The forwarder thus has some of the characteristics of both carrier and shipper. In its relations with its customers, a forwarder is subjected by the Act to many of the requirements and regulations applicable to common carriers * * *. In its relations with these carriers, however, the status of the forwarder is still that of shipper." The Act referred to in the above quotation is the Interstate Commerce Act, as amended by the 1942 Freight Forwarders Act.[1] That amendment defines a freight forwarder as "any person which * * * holds itself out to the general public as a common carrier to transport or provide transportation of property * * *." Such forwarders are, by the Act, made liable to their customers.[2] And such liability is, of course, that of a carrier: to transport the customer's goods safely and without loss to point of destination. The reason for excluding liability under the policy, while goods were in the hands of a common carrier or carrier for hire was because of the increased hazards while in course of shipment. The contract with Universal cast upon it the duty of safe transportation, and there seems no escaping the conclusion that it was for the purpose of this dispute a carrier for hire. In addition to arguing that Universal was a freight forwarder, and nothing more, appellant also makes the contention that Universal became a warehouseman while holding the goods for new and final delivery instructions. But that designation, even if we assume it to be accurate, would more directly concern the measure of liability than a change in the legal status of the carrier. (A carrier's liability is that of an insurer, while a warehouseman is usually a mere bailee. General American Tr. Corp. v. Indiana Harbor Belt R. Co., 7 Cir., 191 F.2d 865, 873, certiorari denied, 343 U.S. 905, 72 S.Ct. 636, 96 L.Ed. 1324.) In this connection we refer to the language of Justice Brandeis in Western Transit Co. v. A. C. Leslie & Co., 242 U.S. 448, 453, 37 S.Ct. 133, 135, 61 L.Ed. 423: "The provisions of the bill of lading govern even where the goods are allowed to remain in the carrier's warehouse after giving receipt therefor and payment of freight. The carrier and the shipper can make no alteration of the terms upon which goods are held under a tariff, until there has been an actual delivery of the goods to the consignee." Cf. General American Tr. Corp. v. Indiana Harbor Belt R. Co., supra. Thus, as we have indicated above, the original contract of transportation remained in force until the goods were delivered to the consignee. *520 We realize that in the past there has been some misunderstanding as to the exact status of freight forwarders; but amendments to the I.C.C. Act, cited above, and the decisions we have cited have clarified the situation. We think we must hold that at least as to Belland, and within the meaning of the policy provisions, the loss of appellant's property took place while "in the charge of any carrier for hire." Additional support for our ruling will be found in Heath v. Judson Freight Forwarding Co., 47 Cal. App. 426, 190 P. 839; Highway Freight Forwarding Co. v. Public Serv. Comm., 108 Pa.Super. 178, 164 A. 835. What we have said makes it unnecessary to consider or decide another question raised in the briefs: whether a thirty-day in-transit provision in the policy had expired. There was no evidence (and no separate finding) as to whether the carton was lost or stolen from Universal's terminal, or while the shipment was on its final leg from the terminal to the Belland home. Plaintiff was under a duty to prove that the loss occurred in transit in order to recover under the in-transit provision, and the absence of evidence on that point would properly lead to a ruling against her on that policy provision. Our decision also disposes of the claim of the insurance company against the carrier, Universal Carloading and Distributing Company, third-party defendant below. Judgments affirmed. NOTES [1] Part IV of the Interstate Commerce Act, c. 318, § 1, 56 Stat. 284 (1942), as amended, c. 1140, § 1, 64 Stat. 1113 (1950), 49 U.S.C.A. § 1002. [2] They have also been held liable, independently of statute. Slutzkin v. Gerhard & Hey, 199 App.Div. 5, 191 N.Y.S. 104.
Mid
[ 0.5991379310344821, 34.75, 23.25 ]
Q: Swift Code Error while creating option variable var option = [NSObject : AnyObject]?.self option = [CIDetectorSmile = true, CIDetectorEyeBlink = true, CIDetectorImageOrientation : 6] Error: Expected ',' separator var features = faceDetector.featuresInImage(sourceImage, options: option) Error: Cannot invoke 'featuresInImage' with an argument list of type ('CIImage, options: [NSObject : AnyObject]?Type?) How can I resolve that compile error? A: featuresInImage has the following signature: func featuresInImage(_ image: CIImage, options options: [String : AnyObject]?) -> [CIFeature] The options are of type [String : AnyObject]?. Yours is of type [NSObject : AnyObject]?. Solution: use var option : [String : AnyObject]? = [CIDetectorSmile : true, CIDetectorEyeBlink : true, CIDetectorImageOrientation : 6] Since you actually supply always supply options, you can even remove the ?. Further notes The Expected ',' separator is caused by your usage of = and : in the dictionary value declaration, always use :!
High
[ 0.66, 28.875, 14.875 ]
Q: Spring Transactional annotation, Hibernate and persist I've a misunderstanding of Spring @Transactional annotation and persist. I am using Spring 3.1, with JPA and Hibernate. I thought that persist meant, add the entity to the persistence context (but don't execute any query until commit or flush), and that the @Transactional annotation meant, wrap the method with a transaction. However, in this short example, when the execution pointer reaches persist, it fails with an exception, since name can't be null (db constraint). import javax.persistence.EntityManager; @PersistenceContext private EntityManager entityManager; @Transactional public void test() { Brand brand = new Brand(); entityManager.persist(brand); brand.setName("test"); } If I swap setName() and persist(), everything works. However, I don't understand why the other way around doesn't since I thought that any query would be built and executed at the end of the method. Can someone please explain? A: In JPA, once an object passed to persist() it becomes "managed", as part of becoming managed JPA implementation must generate an id for the persistent object. If id generation is based on auto-increment (GenerationType.IDENTITY), then an insert statement needs to be issued to the db to get and assign the key. When the id generation is based on sequence / table then ids are managed and assigne by the JPA Implementation managed id pools, in which case a straight insert is not a requirement. Having an object is passed to persist() and has become managed, any changes to it is persistent fields must be flushed to the database at the and of the transaction. In your case if the id generation is Identity then an insert must be followed an update. If the id generation is some other method then, a single insert statement is sufficient. If the transaction is rolled back, no SQL should be get sent to database at all. This is the implementation in Batoo JPA. Hope this makes sense.
High
[ 0.703296703296703, 36, 15.1875 ]
NHL will never be the same 'It's not a certainty but it's widely speculated the next step in this dispute will be the filing of an impasse by the league with the respective labor boards in the United States and Canada. As the majority of NHL franchises are located in the U.S., it's anticipated the league will file with the National Labor Relations Board first. It could take longer to get a decision from the Canadian boards since labor laws in Canada are done at the provincial rather than federal level and the laws differ in each province. Such a move would be potentially time-consuming, complex and fraught with legal pitfalls. Boiled down to its essence, if Bettman files for an impasse, he could point to the offers to increase the hard cap level and removing linkage of salaries to revenues as genuine attempts on his part to negotiate in good faith, painting the association as unwilling to compromise. Conversely, Goodenow could argue that his offers of a 24 percent salary rollback and acceptance of a higher cap level tied to revenue sharing nullify any claim of impasse from the league.'
Mid
[ 0.559322033898305, 33, 26 ]
Food and Drug Administration investigators have found sterility problems — including the presence of insects and a bird — at Ameridose, a company that shares ownership with the firm tied to a deadly multistate meningitis outbreak. According to an internal memo released by the manufacturer of dialysis drug GranuFlo, Fresenius Medical Care (FMC), 941 patients died of cardiac arrest in 2010 in clinics owned by the drug maker. FMC said the acid concentrate can increase the amount of bicarbonate in the blood, which increases the risk for heart attacks by up to 6 times. Fifteen more people have been diagnosed with fungal meningitis in an outbreak linked to contaminated steroid injections, health officials reported today. The U.S. Centers for Disease Control and Prevention said it now counted 419 cases in 19 states: 409 cases of fungal meningitis and 10 joint infections. At least 30 people have died. Two more drugs made by the New England Compounding Center (NECC) are crawling with various kinds of bacteria, FDA tests reveal. The NECC is the Massachusetts compounding pharmacy whose drugs are the likely source of the ongoing outbreak of fungal meningitis. The Food and Drug Administration has warned state officials and doctors to check hundreds of thousands of other shipments of drugs from the company responsible for the recent fungal meningitis outbreak. The health agency compiled a list of more than 130,000 drug shipments from the New England Compounding Center (NECC), whose steroid injection drug was found to be contaminated and the cause of at least 23 deaths and over 300 additional cases of illness. The death toll linked to contaminated epidural steroid injections has reached 15, with an additional 202 reported cases of illness. The U.S. Centers for Disease Control and Prevention estimates at least 13,000 patients received an epidural from a batch of contamination steroids, leading to an outbreak of rare but deadly aspergillus meningitis. The death toll from a rare form of fungal meningitis has risen to 11, officials said Tuesday, and they reported that 199 have now been sickened by an outbreak of the disease believed linked to contaminated steroid injections.
Low
[ 0.47368421052631504, 23.625, 26.25 ]
The progression of chronic renal disease: immunological, nutritional and intrinsic renal mechanisms. The majority of patients with any initial renal insult show progression of renal damage over time. The histological end-result is often the same, whatever the initial lesion, and consists of an increase in extracellular matrix (ECM) and ultimately glomerulosclerosis. The clinical rate of progression correlates mainly with the degree of interstitial, rather than with that of glomerular damage. The main culprits for the ultimate interstitial damage and the rate of progression of renal disease, are the type and degree of the initial (e.g. immunological) insult and the magnitude of the proteinuria. Hypertension (intraglomerular) is an independent risk factor. Control of hypertension with angiotension converting enzyme (ACE) inhibitors or angiotensin II (AII) receptor blockers, reduction of protein and fat intake, anti-oxidative therapy and a variety of experimental measures reduce the progression of renal damage in animal experiments. Some of these interventions have also been shown to be beneficial in a number of controlled clinical studies, in well-defined renal disease entities in humans. These new data provide insight into the pathogenesis of chronic renal damage and raise the hope that in the not too far future, effective strategies can be devised to attenuate the progression of acquired renal disease.
High
[ 0.686567164179104, 31.625, 14.4375 ]
Cumulus-oocyte interactions and programmed cell death in bovine embryos produced in vitro. This study investigated the interactions between cumulus cells (CCs) and oocytes and programmed cell death in bovine cumulus-oocyte complexes (COCs) with different morphological characteristics. DNA fragmentation was assessed in CCs at 0 and 24 h of maturation, as well as parthenogenetic developmental competence on the 9th day post-activation, blastocyst quality and BCL-2 and BAX transcript levels in matured CCs. Most immature oocytes in the COC-A group (full cumulus and several compact layers) were in the initial germinal vesicle (iGV) stage, exhibiting minimal or no DNA damage. In contrast, after follicle removal, the COCB (partial cumulus and one or two cell layers) and C (expanded cumulus) groups presented in more advanced GV stages and exhibited DNA fragmentation. After maturation, significant increases in fragmented nuclei were noted in COCC and COCB groups. Embryos resulting from the COC-A developed more rapidly and had increased competence compared to embryos resulting from groups COCB and COCC. The COCB group exhibited the highest BAX protein levels and a reduced BCL-2/BAX protein ratio. The results show a negative correlation between nuclear fragmentation and embryonic development potential in COCs with different morphologies. In addition, a low BCL-2/BAX protein ratio might be associated with an increase in nuclear fragmentation in CCs.
Mid
[ 0.655581947743467, 34.5, 18.125 ]
Well, that’s not a headline we expected to write… but these local elections have thrown up some funny stories. A day before the London Mayoral elections, south London rapper and MC Stormzy posted this: Beg no one vote for this Zac Goldsmith bruddah he seems like a proper pussyhole — #MERKY (@Stormzy1) May 5, 2016 Not a big fan of Goldsmith then. Who knows, maybe it swung the election? Historians will someday note that it was Stormzy's pivotal intervention in the race which swung it for Sadiq Khan https://t.co/WHcwxxx1zf — tomtivnan (@tomtivnan) May 6, 2016 In fact, Stormzy was already a fan of Corbyn, posting this a few days earlier ago. That didn’t go unnoticed by Jeremy Corbyn fans on Facebook. And after the elections, this happened: We’re hoping this means Corbyn will appear in Stormzy’s next video. Suggestion for lyrics: ‘Call me an extremist? Oi Goldsmith, Shut UP’.
Low
[ 0.501228501228501, 25.5, 25.375 ]
--- abstract: 'In online communications, patterns of conduct of individual actors and use of emotions in the process can lead to a complex social graph exhibiting multilayered structure and mesoscopic communities. Using simplicial complexes representation of graphs, we investigate in-depth topology of online social network which is based on MySpace dialogs. The network exhibits original community structure. In addition, we simulate emotion spreading in this network that enables to identify two emotion-propagating layers. The analysis resulting in three structure vectors quantifies the graph’s architecture at different topology levels. Notably, structures emerging through shared links, triangles and tetrahedral faces, frequently occur and range from tree-like to maximal 5-cliques and their respective complexes. On the other hand, the structures which spread only negative or only positive emotion messages appear to have much simpler topology consisting of links and triangles. Furthermore, we introduce the node’s structure vector which represents the number of simplices at each topology level in which the node resides. The total number of such simplices determines what we define as the node’s topological dimension. The presented results suggest that the node’s topological dimension provides a suitable measure of the social capital which measures the agent’s ability to act as a broker in compact communities, the so called Simmelian brokerage. We also generalize the results to a wider class of computer-generated networks. Investigating components of the node’s vector over network layers reveals that same nodes develop different socio-emotional relations and that the influential nodes build social capital by combining their connections in different layers.' date: today --- [ **[Hierarchical sequencing of online social graphs]{}** ]{} [Miroslav Andjelković$^a$, Bosiljka Tadić$^1$ Slobodan Maletić$^a$ Milan Rajković$^a$\ [ $^1$Department of Theoretical Physics; Jožef Stefan Institute; Box 3000 SI-1001 Ljubljana Slovenia; $^a$Institute of Sciences Vinča, University of Belgrade, Belgrade, Serbia]{}\ ]{} Introduction\[sec-intro\] ========================= Structure of online social networks emerges via self-organizing processes of social dynamics, where the links are being established and used for communications between individuals. The contents (information, emotion) communicated between pairs and groups of participants affects their activity patterns and thus shape the network’s evolution. Two prototypal classes of online social networks can be distinguished [@we-entropy]: a hierarchically organized multi-layered structure that reflects the level of knowledge of the involved individuals in the chats-based systems, on one hand, and a wider class of networks with community structure, on the other. Recently, online social networks of both types have been studied based on high-resolution empirical data from a variety of Web portals [@grujic2009; @mitrovic2010a; @mitrovic2010b; @we-MySpace11; @Szell2010_; @ST_Plos2013; @mitrovic2010c; @we-Chats1s; @we-Chats-conference; @we-Chats-chapter; @we_ABM_blognets]. In social sciences, the *value of social networking* can be quantified. Specifically, the *social capital*, as an essential element of functioning social networks, measures how social relationships create a competitive advantage of certain individuals at the expense of others [@taube2004]. For instance, the Simmelian ties and the related brokerage roles measure how an individual can act as a broker (transmitting actor) in a dense social community [@panzarasa_brokerage]. The availability of massive empirical data of online social interactions and their dynamics that completes the information for the study of social graphs offers the possibility to investigate the mechanisms of social capital build-up by different actors. In view of ever-evolving social graphs, intricate communication processes result in the social-value relationships within communities where the social layers may play a role. Analysis of such social structures on multilayered networks requires new mathematical approach, capable of taking into account the inner (in depth) structure of each society and the role of different nodes in it. In recent research, efforts have been made on determining the network complexity metric that permits to successfully distinguish between critical and redundant nodes [@nacher2014], discover the active cores of the network as compared to the network’s periphery [@csermely2013; @we-Chats-conference] and quantify the network’s multiplexity[@szell2010; @gomez2012; @lee2012; @cardillo2013; @ST_Plos2013; @we-Chats-chapter; @estrada2013social] and the role of higher-order structures in the network dynamics [@maletic2014; @milan2012; @tadic2007]. In this respect, several approaches have focused on introducing suitable graph-theoretic vectors that can be defined on local graphlets [@natasa_graphlets], the network’s feature vector [@costa_vector] or the graph’s eigenvalue spectrum [@estrada_4classes]. These approaches proved very useful in the study of biological systems, for example, in alignment of protein networks [@natasa_proteins2014] and uncovering network function in cancer-related processes [@natasa_cancer2008]. Similarly, characterizing topology of molecular graphs [@estrada_molecular] as well as determining modules in socio-technological networks by eigenvectors localization [@mitrovic2009] have been successful. In this work, we exploit the topological concept of a *simplex*, structure that extends beyond the nodes and links, i.e., a polyhedron of possibly high dimension, and their aggregates or *simplicial complexes*. We investigate in-depth topology of online social networks and explore the role of nodes in layers and communities. The concept of simplicial complexes of graphs [@SimplComplexesOfGraphs; @milan_ICCS2008] allows precise definition, using topological, algebraic and combinatorial tools, of the node’s natural surroundings in the network. Consequently, it allows to determine the node’s social capital such as the Simmelian brokerage in social environments. The considered network in this paper is constructed from the original data collected from `MySpace` social network as described in Ref. [@we-MySpace11]. Typically, in online social networks, such as `MySpace` and `Facebook`, certain kind of social graphs exist a priori. However, the use of connections over time as well as the dominance of positive emotions in the texts of messages [@we-MySpace11] reveal the dynamical structure that is different from the conventional social networks. In general, network layers appear due to different types of relationships among nodes [@multiplexity_review2014; @we-Chats-conference; @we-Chats-chapter]. In `MySpace` and `Facebook` social networks, where text messages of mixed information contents are communicated, the emotion contained in these words can be inferred [@gpalt; @we-MySpace11]. This fact offers the possibility to identify the network’s layered structure in a unique manner. Specifically, one can define layers that propagate emotions with positive or negative valence (attractiveness and aversiveness). Quantitative study of emotions, based on Russell’s model [@russell1980], and the social dimension of emotional interactions are the subject of an intensive research in recent years (see the summary of the Cyberemotions project [@CYB]). In this context, the dynamics of emotion spreading on networks has been investigated by an agent-based model [@we-MySpaceABM; @we-Cybbook]. In this paper, we employ this model to generate network layers. The agents are interacting along the social links of `MySpace` network influencing each-other’s emotional state by exchanging messages. The identity of each message in the simulations is known, its time of inception, source and recipient nodes as well as its emotional content that matches the current emotional state of the agent who created it. Consequently, the links carrying negative/positive emotion messages can be distinguished; together with the involved nodes these links define the corresponding network layer. The paper is organized as follows. The standard structure of the network, as well as the dynamics leading to the emotion-propagating layers, is briefly described in Section \[sec-network\]. The basic definitions and the method are described in \[sec-simplices\]. The analysis of simplices and their complexes in the communities, section \[sec-topology\], and in the emotion-propagation layers of the network, section \[sec-layers\], is presented. Section \[sec-brokerage\] deals with the functional relationship between Simmelian brokerage role of a node and its topological dimension. Section \[sec-conclusions\] contains a brief summary of the results and conclusions. Simplices: Beyond standard structure of social graphs\[sec-communities\] ======================================================================== Dynamic architecture of online social networks\[sec-network\] -------------------------------------------------------------- In this work we use the online social network from the empirical data of Ref. [@we-MySpace11], consisting of the links in `MySpace` along which the messages were exchanged within 2-months time window. The original data and the network mapping are described in [@we-MySpace11] together with the study of the dynamics of emotions detected in the data. The structure of these networks has been defined in terms of several measures. In particular, the degree- and strength- distributions, link correlations—disassortativity, reciprocity, path lengths, clustering, community structure, and testing the weak-tie hypothesis have been determined in Ref. [@we-MySpace11] and for the purpose of this work, this study will be termed *standard analysis of a social graph*. These results revealed that the `MySpace` dialogs graph exhibits the characteristic social community structure. A similar conclusion was derived in Ref. [@facebook2011] considering the static structure of the `Facebook` graph. However, the analysis in [@we-MySpace11] uncovers that several other topology measures, notably, disassortativity, non-reciprocal in- and out-linking, the role of weak-ties, are different from the features often found in social networks. Moreover, they share a high similarity with the networks of online games studied recently in [@Szell2010_]. Together with some other findings [@myspace2007; @facebook2012], the observations in [@we-MySpace11] suggest that the dynamical organization of online social networks can be strikingly different from that of the conventional social graphs. The origin of such structure can be traced in the dynamics of exchanged messages with their emotional contents [@gpalt; @we-MySpace11; @dodds2011; @we-MySpaceABM]. Hence, the patterns of conduct and the role of individuals in these processes [@panzarasa2009; @ST_Plos2013; @ST_triadic] are crucial for the emergence of macro-social temporal structures. Therefore, an in-depth topology beyond the standard analysis of the emergent social networks can reveal some of the working mechanisms at the local level. In the remaining parts of this work, we extend the analysis of these networks by means of simplicial complexes. For this purpose, the original network which consists of 32000 nodes is reduced to 3321 nodes by removing nodes with a low connectivity [@we-MySpace11]. The dynamics of emotional messages is simulated using the agent-based model represented in [@we-Cybbook]. Simplices and simplicial complexes of graphs\[sec-simplices\] -------------------------------------------------------------- In contrast to the standard graph theoretical approach which reveals connectivities, a topological framework [@SimplComplexesOfGraphs] provides information about the structure and patterns of connectivities and enables the multifaceted approach including topological, algebraic and combinatorial techniques. A basic element of the topological approach is a simplex whose spatial representation is a polyhedron. The polyhedra of various dimensions (i.e. the number of vertices and faces) may be connected to each other forming a polyhedral complex, the spatial embodiment of a simplicial complex. In a more formal approach, any subset of a set of vertices $V=$ $\{v_{\alpha _{0}},v_{\alpha _{1}},...,v_{\alpha _{n}}\}$ determines an $\ n$-$simplex$ denoted by $\left\langle v_{\alpha _{0}},v_{\alpha _{1}},...,v_{\alpha _{n}}\right\rangle $ where $n$ is the dimension of the simplex. A $q$-simplex $\sigma _{q}$ is a $q$-face of an $n$-simplex $\sigma _{n}$, denoted by $\sigma _{q}\lesssim \sigma _{n}$, if every vertex of $\sigma _{q} $ is also a vertex of $\sigma _{n}.$ The union of faces of a simplex $\sigma _{n}$ is a boundary of $\sigma _{n}.$ A simplicial complex represents a collection of simplices and its dimension is the largest dimension of its simplices. More formally, a simplicial complex $K$ on a finite set $V=\{v_{1},...,v_{n}\}$ of vertices is a nonempty subset of the power set of $V$, so that the simplicial complex $K$ is closed under the formation of subsets. Hence, if $\sigma \in K$ and $\rho $.$\in $ $\sigma ,$ then $\rho $. $\in K.$ An example of a simplex of dimension zero is a point. A simplex of dimension one is a line; two-dimensional simplex is a triangle, three-dimensional simplex is tetrahedron and so on. Simplicial complexes may be constructed directly from the available data or they may be formed from the undirected or directed graphs (digraphs) in several different ways. Here we only consider two of them: the neighborhood complex [@neighborcomplexes] and the clique complex [@cliquecomplexes]. The neighborhood complex *N*$(G)$ is constructed from the graph $G$, with vertices $\{v_{1},...,v_{n}\}$ in such a way that for each vertex $v$ of $G$ there is a simplex containing the vertex $v$, along with all vertices $w$ connected to it and the corresponding faces. The neighborhood complex is obtained by including all faces of those simplices and in terms of matrix representation, the incidence matrix is obtained from the adjacency matrix of $G$ by increasing all diagonal entries by $1$. The vertices of the clique complex $C(G)$ are the same as the verties of $G$ with the maximal complete subgraphs (cliques) as simplices so that it is essentially the complete subgraph complex. An example of the clique complex construction is presented in Fig. $1$. \ These two methods are not the only ones which may be used for constructing simplicial complexes from graphs. Actually, any property of the graph $G$ that is preserved under deletion of vertices or edges may be used for construction purposes. A detailed account of the methods for obtaining simplicial complexes from graphs, among many other issues related to the relationship between graphs and simplicial complexes, may be found in [@SimplComplexesOfGraphs]. Initially all maximal cliques (MC) were found using the Bron-Kerbosch algorithm [@Bron]. The resulting MC matrix contains full information about cliques, the clique’s ID, size and IDs of nodes that are involved in it; from this the connection between different simplices can be deduced [@Bron], [@milan_ICCS2008]. As mentioned earlier, the power of the topological approach is based on the fact that simplicial complexes may be considered from three different aspect: (1) a combinatorial model of a topological space; 2) a combinatorial object; 3) an algebraic model. Hence, different measures and invariants may be associated to the simplicial complex based on an appropriate perspective, and each one of them provides new information about the graph or network from which the simplicial complex was constructed. The first is the dimension of the simplicial complex corresponding to the maximal simplex dimension, $K$.  From the combinatorial aspect three structure vectors of the simplicial complex are defined [@milan_ICCS2008]: - the *first structure vector* $Q$: The $q^{t}h$ entry of the so called $Q-vector$ of length $K+1$(or *first structure vector* [@maletic2014]), denoted by $Q_{q}$ is equal to the number of $q$-connectivity classes. This vector provides information on the number of connected components at each level of connectivity with initial level being equal to the dimension of the complex: $$\mathbf{Q}=\{Q_{q=K}Q_{q=K-1}\dots Q_{q=1}Q_{q=0}\}\ ; \label{eq-1strvector}$$ - the *second structure vector* $N_{s}$ is an integer vector with $dim(K)+1$ components $$\mathbf{N_{s}}=\{n_{q=K}n_{q=K-1}\dots n_{q=1}n_{q=0}\}\ ; \label{eq-2strvector}$$where the $q-th$ entry, $n_{q}$, is equal to the number of simplices with dimension larger or equal to $q$, that is, it is equal to the number of simplices at the q-level. - the *third structure vector* $\hat{Q}$ is the global characteristic of the simplcial complex which measures the degree of connectedness on a $q$-level. In other words, it measures the number of $q$-connected components per number of simplices whose components $\hat{Q}_{q}$ are defined as [@SimplComplexesOfGraphs]: $$\hat{Q}_{q}=1-\frac{Q_{q}}{n_{q}}\ ; \label{eq-3strvector}$$where $Q_{q}$ is q-th entry of the first structure vector, and $n_{q}$ is q-th entry of the second structure vector. In addition to these structure vectors that describe the network as a whole or its large parts, in the following we will introduce the vector associated to each node, the node’s $Q$-vector, in order to characterize neighborhood of the node in the network. [ccc]{}\ Simplicial complex analysis of the social network with communities\[sec-topology\] ---------------------------------------------------------------------------------- In this section, we analyze a reduced system containing $N_{U}=3321$ nodes and no leaves. Focusing on the large community in this network, we perform the analysis on simplices and determine the network’s MC matrix. It appears that the maximal clique simplices (in further text for brevity we use term clique) in the network are 5-cliques, i.e. in the present notation, $q_{max}=4$. The analyzed structures at different $q$-levels are shown in Fig. \[fig-osn\_q\]. As $q$ increases, the number of nodes that participate in the higher topological structures is decreasing. Considering the largest community in the network shown in Fig. \[fig-osn\_q\]a, we compute its structures at higher topological layers; they are shown in Fig. \[fig-osn\_q\]b,c,d corresponding to the level of triangles, $q=2$, 4-cliques, $q=3$, and at the level of 5-cliques, $q=4$. Summary of the network’s structure vectors will be given in Section \[sec-brokerage\] in connection with the discussion of brokerage roles of nodes. --------- --------- [(a)]{} [(b)]{} [(c)]{} [(d)]{} --------- --------- Here, focus is on the role of individual nodes. Therefore, we introduce the “node’s $Q$-vector”, $Q^{i}$, that describes the node’s $i$ environment in the network.\ *Definition of the Node’s Q-vector.* With $q_{max}+1$ as the dimension of the maximal clique in the network, the *node’s Q-vector* is a $q_{max}+1$–dimensional vector associated with each node $$Q^{i}=\{Q_{qmax}^{i},Q_{qmax-1}^{i},...,Q_{1}^{i},Q_{0}^{i}\}\ , \label{eq-Qi}$$whose components $\{Q_{q}^{i}\}$, $q=q_{max},q_{max}-1,\cdots 1,0$ describe the number of $q$-dimensional simplices in which the node $i$ participates. We define the *topological dimension* of the node $i$ as the number of all simplices in which the node $i$ participates, i.e., $dimQ^{i}= \sum_{q=0}^{q_{max}}Q_{q}^{i}$. The term “dimension” is motivated in view of the conjugate simplicial complex constructed from the network, where nodes become simplices and simplices become nodes. Therefore, $dimQ^{i}$ corresponds to the dimension of the conjugate simplex [@milan_ICCS2008]. To illustrate the meaning of these components consider the vector $Q^i=\{2,0,3,2,0\}$ in the network whose maximal clique dimension is 5. In this case, the value of the component $Q_{0}=0$ suggests that the node is not isolated. Further, $Q_{1}=2$ means that among all the nodes connected to the node $i$, only two are not a part of any higher-order clique. $Q_{2}=3$ indicates that there are three triangles attached to $i$ that are not faces of higher-order cliques; while $Q_{4}=1$ and $Q_{3}=0$ indicate that the node $i$ belongs to one 5-clique, but there are no 4-cliques attached to it. The components $\{Q_{q}^{i}\}$ for each node in the analyzed network can be computed from the MC matrix. Here we determine the components of each node of the network in Fig. \[fig-osn\_q\]a. Sorting the nodes according to their topological dimensions $dimQ^{i}$, one can identify the influential nodes in the network’s community or a layer. Fig. \[fig-dimQ-Zipf\], shows the distribution of the node’s dimension for all nodes in the network as a function of the node’s rank. Notice that the topological dimensions exhibit a broad distribution (Zipf’s law) with two rather than a single slope. Such situation often appears in the evolving complex systems [@katz2006; @we-genes]. Recently, the origin of two slopes in the Zipf’s law has been discussed [@al-zipf] in connection with the scaling and innovation in the use of words in the written text of an increasing length. In the present case, the appearance of new topological forms in the dialogs-based network is related with the activity patterns of users (nodes in the network). According to the analysis in [@we-MySpace11], three distinct groups of users can be distinguished considering the number of their actions in relation with the interactivity times. Consequently, very active nodes may build a larger environment resulting in a higher topological dimension. In Fig. \[fig-dimQ-Zipf\], the nodes topological dimensions obey a power-law distribution with the slope $\gamma =0.72\pm 0.05$ up to the rank 70 (corresponding to the density function power-law with the exponent $\tau =1/\gamma +1\approx 2.37)$. In contrast, the nodes of lower dimensions (higher ranking orders) show the slope close to one, $\gamma =0.92\pm 0.06$). Temporal appearance of new topology forms will not be considered in this paper. In the following, we study correlations among topological dimensions of the connected pairs of nodes. [ccc]{}\ In an analogy with standard assortativity measure in social networks [@newman2003], we plot the node’s topological dimension against the average topological dimension of its neighbors. The results, shown in the inset of Fig. \[fig-dimQ-Zipf\], indicate that at the level of triangles and cliques of higher dimension, the graph exhibits disassortativity. The general trend of all points can be approximated with the function $\langle dimQ^{j}\rangle _{nn}\sim (dimQ^{i})^{-0.52}$. This means that gradually fewer number of nodes with high dimension are connecting between structures of a lesser complexity. These findings complement the disassortativity results for the same network found in [@we-MySpace11] at the level of links (i.e., including leaves) for varied combinations of the directed link orientations. Fine structure of a node $Q$-vector allows for further differentiation between nodes and their roles in the network. A 3-dimensional plot in Fig. \[fig-qq-3D\]a shows the components $Q_{q}^{i}$ of the first 100 nodes as a function of the node’s dimension $dimQ^{i}$ and the dimension of the corresponding simplices $q$. It also shows the number of triangles ($q=2$), tetrahedra ($q=3$) and 5-cliques to which the leading nodes belong. --------- --------- -- [(a)]{} [(b)]{} --------- --------- -- In Fig. \[fig-qq-3D\]b a scattered plot of the node’s dimension computed from the topology layer $q\geq 2$ is shown against $q\geq 3$. Different colors reflect the number of nodes corresponding to a given combination in the plot. For each node a nonzero value in this plot $(dimQ_{q\geq 3}^{i},dimQ_{q\geq 2}^{i})$ indicates the number of triangles $n_{\triangle }^{i}=dimQ_{q\geq 2}^{i}-dimQ_{q\geq 3}^{i}$ surrounding that node that are not shared faces of higher-order structure. Obviously, the number of nodes which participate in higher-order structures (of higher dimension) is steadily decreasing. Thus, compared with a standard clustering coefficient, the in-depth-topology analysis with simplicial complexes differentiates between types of structures in which the node resides. The nodes that build up these higher-order structures can be clearly distinguished owing to the unique ID assigned to every node. As it will be presented in Sec. \[sec-brokerage\], these nodes often have a considerable social capital. An example is the node with ID=1372, connecting three 5-cliques in Fig. \[fig-osn\_q\]d. The composition of its components in the entire network is given in Table \[tab-2nodes\]. Apart from three 5-cliques, this node joins 53 different 4-cliques at lower $q$-levels, 144 triangles and 46 sigle-link simplices. Another type of the node with a large social capital is the central node in a predominantly star-like structure; an example is the node with ID=2238, also given in Table \[tab-2nodes\]. The changed roles of these and other nodes on emotion-propagating layers of the network are studied in the subsequent sections. Structure Vectors of Emotion-Propagating Network Layers\[sec-layers\] ===================================================================== As discussed in section \[sec-network\], the emotion-propagation dynamics involves different types of contacts among individuals in online social network. The diversity of the emotional content of communicated messages, described by two variables–emotional arousal and valence, enables to identify different network layers corresponding to a particular type of emotional content. Consequently, two network layers are recognized. The positive layer consists of the links along which messages with a positive emotion valence were communicated up to a given instance of time, and the negative layer with links carrying messages with negative valence. In order to enhance the difference between these layers, using the agent-based model of Ref. [@we-MySpaceABM], we numerically simulated two situations. In one, the external input noise has prevailing positive emotion “astonished” and, in the other, the negative emotion “ashamed”. As it was shown in [@we-MySpaceABM; @we-ABMrobots; @we-ABM_bots2], in such situations the temporal correlations of message streams, that marks the emotion propagation dynamics, lead to collective emotion states in networks. Here, the positive/negative valence of the input emotion eventually prevails. In this way, in each case one can distinguish a dominant layer that diffuses the “winning” emotion from the counter-emotion layer. These are named PP (positive-positive) and NN (negative-negative) as dominant layers in positive and negative input, respectively; counter-emotion layers are NP and PN. Here NP designates a layer with links propagating positive emotion in the case when the majority of messages in the network are negative (following negative emotion input). While PN denotes a layer with the negative emotion links when the prevailing emotion is positive. Note that, by definition, the same nodes (and sometimes overlapping links between them) can belong to both layers. The focus is on in-depth-topology analysis of these layers and in quantifying the roles of relevant nodes residing in each one of them. The structure of connections in counter-emotion layers for the two cases of emotion-propagating dynamics is shown in Fig. \[fig-nets\_couterlayers\]. The results of topology analysis of all emotion-propagating layers are summarized in Table \[tab-layers\_q\]. ----- ------ ------ ----------- --------- ------ ----------- $q$ $Q$ $N$ $\hat{Q}$ [$Q$]{} $N$ $\hat{Q}$ 4 - - - - - - 3 4 4 0 - - - 2 198 198 0 12 12 0 1 6242 6353 0.017 1134 1138 0.003 0 1 6353 0.999 2310 3404 0.321 $q$ $Q$ $N$ $\hat{Q}$ $Q$ $N$ $\hat{Q}$ 4 - - - - - - 3 - - - 5 5 0 2 11 11 0 204 205 0.005 1 1069 1074 0.005 6228 6287 0.009 0 2360 3390 0.304 4 6352 0.999 ----- ------ ------ ----------- --------- ------ ----------- : Layers in the OSN propagating negative and positive emotion messages when the majority of messages are of negative emotional content (NN and NP) and when the majority of messages in the network are of positive emotional content (PN and PP). Compared with other structure vectors for the whole network, given in Table \[tab-nets\], in the emotion-propagating layers 5-cliques ($q=4$ components of the structure vectors) are absent; in counter-emotion layers 4-cliques also do not appear.[]{data-label="tab-layers_q"} --------- --------- -- [(a)]{} [(b)]{} --------- --------- -- As may be noticed in Fig. \[fig-nets\_couterlayers\] and Table \[tab-layers\_q\], the counter-emotion layers consist of a reduced number of connections as compared to the dominant-emotion layer and the whole system. Furthermore, the structure of connections is different, depending on the dominant emotion, and much simpler than in the dominant-emotion layer. The cliques of dimension 4 and 5 existing in the simplicial complex of the network are absent in the counter-emotion layers. The highest cliques are triangles ($q=2$ components of the structure vectors). Comparison of the first and the second structure vectors of NP and PN layers shows that only few triangles, 4 in the case of NP an 5 in PN layer, join the other simplices at the $q=1$ level. In both cases, a large number of disconnected components remains at the $q=0$ level, in contrast to the dominant layers. The dominant-emotion layers (PP and NN) are richer, although the number of 4-cliques is much smaller than in the entire network, and the 5-cliques are still absent. For comparison, the structure vectors of the entire network are given in Table \[tab-nets\] when all links are counted irrespectively of the type of emotion diffusing along them. -- -- -- -- -- -- The structure of emotion-propagating layers reveals altered position of individual nodes and their social capital. In Fig. \[fig-scatter\_np\_pn\] we show the scatterplot of the topological dimension of each node in two counter-emotion layers. The color code indicates the number of nodes that correspond to a given combination of dimensions $(dimQ_{PN}^{i},dimQ_{NP}^{i})$. For the majority of nodes with at least one dimension larger than one, an off-diagonal pattern occurs. These findings indicate that the nodes have a different topological dimension, i.e. their neighborhoods differ in these two layers. A node that builds a compact neighborhood (large topological dimension) in the PN layer often has a small dimension (poor neighborhood) in the NP layer and vice versa. In other words, a large number of simplices, mostly $q=1$ simplices cf. Table \[tab-layers\_q\], do not change their emotion polarity under the influence of the collective emotion in the network. Simmelian brokerage and the node’s Q-vector \[sec-brokerage\] ============================================================= Simmelian brokerage of nodes in online social networks\[sec-Simmelian\] ----------------------------------------------------------------------- In order to estimate the social capital of nodes (users) in the network, we measure the Simmelian brokerage $B_{i}$ for each node $i=1,2,\cdots N_U$. According to Ref. [@panzarasa_brokerage], for a given node $i$ Simmelian brokerage “captures opportunities of brokerage between otherwise disconnected cohesive groups of contacts”. Quantitatively, $B_{i}$ is determined via the node’s efficiency $E_{i}$ as [@panzarasa_brokerage]: $$B_{i}=n_{i}-(n_{i}-1)E_{i}\ , \label{eq-brok}$$ where $n_{i}$ is the number of neighbors of the node $i$ inside a considered group $N_{i}$; the node’s local efficiency $E_{i}$ is determined by $$E_{i}=\frac{1}{n_{i}(n_{i}-1)}\sum_{l\in N_{i}}\sum_{m\in N_{i}} \frac{1}{d_{lm}}\ , \label{eq-efficiency}$$ where $d_{lm}$ is the distance between all distinct pairs of nodes $l\neq m$ in the set $N_{i}$ when the node $i$ is removed. As stated earlier in our approach, the node’s neighborhood $N_{i}$ is precisely defined at different topology levels by simplices and simplicial complexes in which the node $i$ resides. Performing the computation indicated by Eqs. (\[eq-efficiency\]-\[eq-brok\]), we determine Simmelian brokerage $B_i$ for each node in the network shown in Fig. \[fig-osn\_q\]a. In Fig. \[fig-brkerage\_Qi\]a $B_{i}$ is plotted against the node’s topological dimension $dimQ^{i}$, where each point represents one node of the network. In addition, plotted are the node’s brokerage values that are computed within the emotion-propagating layers. The bottom panel includes similar plots but only for the higher topological levels $q=2,3,4$, matching the social graphs in Fig. \[fig-osn\_q\]b,c,d, respectively. Note that, in this notation, the whole network corresponds to the level $q=0$. It is remarkable that, in these plots, the majority of nodes follow a universal pattern that can be expressed by functional dependence $$B_{i} \sim (dimQ^{i})^{\mu }\ ; \label{eq-Bi-dimQi}$$where the exponent $\mu \lesssim 1$ (see Table \[tab-nets\]). Dispersion along vertical axis correlates with the number of higher-order cliques in the considered graph. [ccc]{}\ $Node ID$ $whole\ network$ $NN$ $NP$ ----------- ------------- ------------------ --------------- -------------- [1327]{} $Q^i_q$ {3 53 144 46 0} {- 1 18 83 0} {- - 0 44 0} $Brokerage$ 162.79 95.44 43.85 [2238]{} $Q^i_q$ {0 0 96 253 0} {- 0 0 316 0} {- - 0 94 0} $Brokerage$ 250.80 239.69 90.49 : For two influential nodes within the community in Fig. [fig-osn\_q]{}, components of the topology vector $Q_i=\{Q^i_4,Q^i_3,Q^i_2,Q^i_1,Q^i_0\}$ and the related Simmelian brokerage are computed in the whole network and in two emotion-propagating layers. Different roles of the same node in the (counter-)emotion layer when the majority of messages carries positive/negative emotion are demonstrated; compared with the whole network indicates how the nodes build their social capital by combining links at different layers.[]{data-label="tab-2nodes"} Relationship between the social capital and the topological dimension of nodes in a wider class of networks\[sec-nets\] ----------------------------------------------------------------------------------------------------------------------- In this section, we confirm the robustness of the functional dependence expressed by Eq. (\[eq-Bi-dimQi\]). Particularly, we present an approximate analytical expression (which is exact in some limiting geometries) as well as numerical work for a wider class of networks. Combining expressions (\[eq-brok\]) and (\[eq-efficiency\]), the brokerage of the node $i$ is given by $$B_{i}=n_i-\frac{\sum_{l\in N_{i}}\sum_{m\in N_{i}}\frac{1}{d_{lm}}}{n_i}. \label{brok1}$$ where the shortest paths between each pair of nodes $m\neq l$ within the graph are computed after the node $i$ is removed from that graph. This sum can be computed analytically in some limiting cases. For instance, consider the situation where the node $i$ belongs to a $(q+1)$-clique, which implies that its number of neighbors is $n_i=q$ and all distances within the clique are $d_{lm}=1$. After removal of the node $i$, the remining nodes contribute to the sum as $\sum_{l\in N_{i}}\sum_{m\in N_{i}}\frac{1}{d_{lm}} =q(q-1)$. A straightforward extension to the situation where the node $i$ connects $k$ such cliques leads to $\sum_{l\in N_{i}}\sum_{m\in N_{i}}\frac{1}{d_{lm}} =kq(q-1)$. In this case, removal of the node leaves the cliques separated from each other, i.e., the distance between pairs of nodes from different cliques is infinite, while the distance inside each clique is one. Note that in the topology analysis described in sec. \[sec-topology\], the number of $(q+1)$ cliques related to the node $i$ is given by the node’s $q$-level component, $Q_q^i$. Hence, the sum at $q$-level gives $\sum_{l\in N_{i}}\sum_{m\in N_{i}}\frac{1}{d_{lm}} =Q_q^iq(q-1)$. The situation is exact for top-level cliques, for example 5-cliques in Fig. \[fig-osn\_q\]d. A similar reasoning can be extended to $(q-1)$-level, provided that at this level no shared faces occur between the $q$-level cliques. Hence, in this case Eq. (\[brok1\]) can be written as $$B_{i}=\sum_{q}Q_{q}^{i}q-\frac{\sum_{q}Q_{q}^{i}q(q-1)}{\sum_{q}Q_{q}^{i}q} \ , \label{brok_e_1}$$ where we also note that $n_i$ can be expressed via the components of the topology vector as $n_i= \sum_{q}Q_{q}^{i}q$. It should be stressed that the expression is exact for those topology levels of a graph at which there are no shared faces of the higher level cliques, i.e, where the third structure vector $\hat{Q}_q =0$ (cf. Table \[tab-nets\]). Otherwise, by extending the summation over topology levels, we obtain an approximate expression that can be written as $$B_{i}=dimQ^{i}\langle q\rangle - \frac{\langle q^2\rangle}{\langle q\rangle} +1 \ , \label{brok_approx}$$ where we used the definition $dimQ^{i}=\sum_{q=0}^{q_{max}}Q_{q}^{i}$ and introduced an abbreviation $\langle q\rangle = {\sum_{q=0}^{q_{max}}Q_{q}^{i}q}/{\sum_{q=0}^{q_{max}}Q_{q}^{i}}$. Note that in the case of tree structures, where the highest topology level corresponds to links, i.e., $q=1$ is the maximal clique, we have that $B_i=dimQ^i$ with the exact exponent $\mu=1$. In a more complex network cliques of higher order occur and are weakly connected at lower topology levels, as in the case of studied online social network (OSN in Table \[tab-nets\]). Consequently, the contribution of the second term in (\[brok\_approx\]) induces corrections eventually resulting with an exponent $\mu \lesssim 1$. The dispersion in the number of cliques in (\[brok\_approx\]) and the number of their shared faces at lower $q$-levels can be considerably greater in the case of more compact networks. Nevertheless, a power-law dependence (\[eq-Bi-dimQi\]) appears, with different values of the exponent $\mu$. The reasons for the occurrence of such power-law dependence in a general network structure are not evident. Here, we provide a numerical proof by considering a wider class of networks. -- -- -- -- The analysis in previous sections suggests that the relation between Simmelian brokerage of nodes and their topological dimension depends on the graph architecture. Therefore, by varying the building rules of the network, one can vary the topological dimensions of different nodes and test the robustness of Eq. (\[eq-Bi-dimQi\]). We consider several types that are shown in Fig. \[fig-nets-grown\]. In these networks, the node’s neighborhood can be varied by control parameters of the growth, ranging from the tree-like to a highly clustered compact structure. These networks, consisting of approximately 1000 connected nodes, are generated by the algorithm that is initially described in Ref. [@mitrovic2009] for growth of scale-free networks with clustering and communities. The basic idea of clustered scale-free networks by preferential attachment and preferential rewiring of Ref. [@tadic2001] is implemented for the case where different communities (node groups) are allowed to grow. Thus, the attachment of new nodes is preferred within a currently growing community while rewiring can take part both within and outside of that community. Three parameters that control the structure are: $p$—the probability of a new community, $\alpha$ and $\beta$—that appear in the preferential shift-linear rules for attachment and rewiring probabilities [@tadic2001], respectively, and $M$—the number of nodes added per growth step. In addition, we consider a dense single-community graph consisting of 100 nodes, shown in Fig. \[fig-nets-grown\]d. The results of the topology analysis of these networks is summarized in Table \[tab-nets\]. Topological dimension $dimQ^i$ of each node in these networks is also determined. Then Simmelian brokerage is computed, according to the original formula in Eq. (\[brok1\]), for each node and plotted against the node’s topological dimension. The results are shown in Fig. \[fig-brkerage\_Qi\_nets\]. The power-law dependence holds for each network type in the corresponding range of nodes topological dimensions. Values of the corresponding exponent $\mu$ are also given in Table \[tab-nets\]. [ccc]{}\ [|l|lllll|cccc|c|]{} network&$<k>$&CC& $d$& $<p>$& modul.& $q$ & $Q$ & $N_s$& $\hat{Q}$&$\mu$sf-tree&1 & 0& 20& 6.46& 0.916& 1& 998 & 998 & 0& & & & & & & 0 & 1& 998 & 0.99 & 1 sf-comm &1.94 &0.201 & 9& 4.42 &0.398 & 3 & 2 & 2 & 0& & & & & & & 2 & 328 & 328& 0& & & & & & & 1 & 1322 & 1602&0.175& & & & & & & 0 & 10 & 1611 &0.994& 0.974(5) cl-comm&3.83 &0.081 & 7 & 3.36& 0.395& 4 &16 & 16& 0& & & & & & & 3 & 65 & 80 &0.188& & & & & & & 2 & 837 & 900 & 0.07& & & & & & & 1 & 2269 & 3090 &0.269& & & & & & & 0 & 12 & 3101 & 0.996& 0.898(4)clustered& 14.52& 0.269& 2& 1.71& 0.207& 5 & 9& 9&0& & & & & & & 4 & 264 & 266 & 0.008& & & & & & & 3 & 1302 & 1522 &0.145& & & & & & & 2 & 367 & 1887 &0.806& & & & & & & 1 & 1 & 1887 &0.995& & & & & & & 0 & 1 & 1887 &0.995&0.44(2) OSN-&2.302 &0.183 &8 &4.067 &0.741 & 4 & 5& 5& 0& & & & & & & 3 & 90& 91 &0.011& & & & & & & 2 & 1064 & 1103 & 0.035& & & & & & & 1 & 5397 & 6437 &0.161& & & & & & & 0 & 1 & 6437 &0.999& 0.969(2) Conclusions\[sec-conclusions\] ============================== The topological framework based on the simplicial complex representation of graphs offers systematic and in-depth characterization of complex networks beyond the standard methods. In this work, we have used simplicial complexes for addressing both local and global structures of online social networks. The studied graph based on `MySpace` dialogs data from [@we-MySpace11], is a prototypal online social structure: the network organization exhibits communities and layers closely related with the communication patterns between users and the dynamics of emotions. The in-depth topology analysis reveals appearance of higher-order cliques and their complexes that are, besides a tree-like local organization, often attached to some relevant nodes. Complementing the standard analysis of the network [@we-MySpace11], the three structure vectors introduced here, $Q$, $N_s$ and $\hat{Q}$, describe the network architecture at all topology levels from $q=0$ (the whole network) to $q_{max}$ (the level of maximal $(q_{max}+1)$-clique). It demonstrates that social network dynamics leads to unusual local structures, including cliques up to the fifth order and to complexes consisting of the cliques sharing triangle faces and tetrahedra. The structure of emotion-propagating layers is much simpler, containing triangles as the highest order structures. It should be noted that, in another study [@ST_triadic], triadic closure dynamics was recognized as one of the fundamental dynamic principles in social multiplex networks. The node’s $Q^i$-vector associated with every node of the simplicial complex, defined here for the first time, differentiates in a precise manner different topological and hence graph structures which contain the reference node. Its components $\{Q_q^i\}$ indicate the number of structures at each hierarchical level in which the node participates. The total number of cliques of all sizes in which the node resides defines the node’s topological dimension. The concept of the node’s structure vector has been useful in sequencing the social network, revealing a new insight into network organization from local to the global level and the role of individual nodes in it. In particular, ranking the nodes according to their topological dimension obeys Zipf’s law with two slopes. This feature helps to distinguish a smaller group of innovative nodes that build large surroundings or surroundings with a larger topological complexity, from the rest of the system. Furthermore, we have demonstrated that this vector provides a useful quantitative measure of social capital of nodes in the communities and layers. Specifically, Simmelian brokerage, which measures the ability of a node to act as a broker between groups of other nodes in the recognized community or layer, scales as a power of the node’s topological dimension. This functional relationship holds in a class of networks with varied composition. The scaling exponent has an exact value $\mu=1$ in tree structures and decreases towards lower values in the case of graphs that contain a number of larger complexes (cliques with shared faces). The influential nodes which possess considerable social capital can be further differentiated by considering the individual components $\{Q_q^i\}$ of their topology vectors. Two types of influential nodes can be observed. First, there are “informer” nodes that act as centers of star-like structures in the network; occurrence of such nodes is in the direct relationship with disassortativity of network’s dynamical structure, observed in [@we-MySpace11]. Second, the nodes that connect a large number of higher-order structures (for example in Fig. \[fig-osn\_q\]d) act as star centers in the *conjugate* simplicial complex network. Their appearance may be related with the disassortativity of the topological dimensions, demonstrated in the inset of Fig. \[fig-dimQ-Zipf\]. The influential nodes build their social capital by combining links in different layers. This conclusion is reached by inspection and comparison of the simplicial structure containing these nodes in the emotion-propagating layers and the structure of the entire network, Table \[tab-2nodes\]. The metric based on the topological framework used in this work, can be also applied to discover “key players” in conventional social networks [@estrada2013social; @nacher2014]. Similarly, it can be used to determine in-depth structure of techno-social networks that grow from scratch co-evolving with the dynamics of chats and blogs [@we-entropy], where the origin of communities and layers can be entirely different. We expect that this approach can be useful in a variety of other network-based studies of complex systems. Some examples are the brain dynamics and learning [@Mantzaris01062013], and innovation and collaboration systems [@katz2006; @collaboration], where different patterns of the actor’s behavior are essential for the global dynamics. Acknowledgment {#acknowledgment .unnumbered} ============== We thank for the support from program P1-0044 by the Research Agency of the Republic of Slovenia and from the European Community’s COST Action TD1210 KNOWeSCAPE. S.M and M.R. would like to acknowledge the support from the Ministry of Education and Science of the Republic of Serbia, under the project OI 174014. M.A. also wishes to thank for kind hospitality during his stay at the Department of Theoretical Physics, Jožef Stefan Institute, where this work was done. [10]{} B. Tadić, V. Gligorijević, M. Mitrović, and M. Šuvakov. Co-evolutionary mechanisms of emotional bursts in online social dynamics and networks. , 15(12):5084–5120, 2013. J. Grujić, M. Mitrović, and B. Tadić. Mixing patterns and communities on bipartite graphs on web-based social interactions. In [*Digital Signal Processing, 2009 16th International Conference on*]{}, pages 1–8, July 2009. M. [Mitrović]{} and B. [Tadić]{}. . , 73(2):293–301, 2010. M. [Mitrovi[ć]{}]{}, G. [Paltoglou]{}, and B. [Tadi[ć]{}]{}. . , 77:597–609, October 2010. M. Šuvakov, M. Mitrović, V. Gligorijević, and B. Tadić. How the online social networks are used: dialogues-based structure of myspace. , 10(79):20120819, 2012. M. Szell and S. Thurner. Measuring social dynamics in a massive multiplayer online game. , 32(4):313 – 329, 2010. S. Thurner, M. Szell, and R. Sinatra. Emergence of good conduct, scaling and zipf laws in human behavioral sequences in an online world. , 7(1):e29796, 01 2012. M. [Mitrović]{} and B. [Tadić]{}. , pages 209–227. Springer, Berlin, 2012. V. Gligorijević, M. Skowron, and B. Tadić. Structure and stability of online chat networks built on emotion-carrying links. , 392(3):538 – 543, 2013. V. Gligorijević, M. Skowron, and B. Tadić. Directed networks of online chats: Content-based linking and social structure. In [*Signal Image Technology and Internet Based Systems (SITIS), 2012 Eighth International Conference on*]{}, pages 725–730, 2012. V. Gligorijević, M. Šuvakov, and B. Tadić. , pages 1–10. Cambridge Scholars Publishing, 2013. M. Mitrović and B. Tadić. Dynamics of bloggers’ communities: Bipartite networks from empirical data and agent-based modeling. , 391(21):5264 – 5278, 2012. V.G. Täube. Measuring the social capital of brokerage roles. , 26(1):29–52, 2004. V. [Latora]{}, V. [Nicosia]{}, and P. [Panzarasa]{}. . , 151:745–764, May 2013. J. C. Nacher and T. Akutsu. Analysis of critical and redundant nodes in controlling directed and undirected complex networks using dominating sets. , 2014. P. Csermely, A. London, L-Y. Wu, and B. Uzzi. Structure and dynamics of core/periphery networks. , 1(2):93–123, 2013. M. Szell, R. Lambiotte, and S. Thurner. . , 107(31):13636–13641, 2010. J. Gómez-Gardeñes, I. Reinares, A. Arenas, and L. M. Floría. . , 2, 2012. K.-M. Lee, J. Y. Kim, W.-K. Cho, K.-I. Goh, and I.-M. Kim. Correlated multiplexity and connectivity of multiplex random networks. , 14(3):033027, 2012. A. Cardillo, J. Gómez-Garde[ñ]{}es, M. Zanin, M. Romance, D. Papo, F. del Pozo, and S. Boccaletti. Emergence of network features from multiplexity. , 3:1344, 2013. E. Estrada and E. Vargas-Estrada. How peer pressure shapes consensus, leadership, and innovations in social groups. , 3:2905, 2013. S. Maletić and M. Rajković. Consensus formation on a simplicial complex of opinions. , 397(0):111 – 120, 2014. S. Maletić, D. Horak, and M. Rajković. Cooperation, conflict and higher-order structures of social networks. , 15(supp01):1250055, 2012. B. [Tadić]{}, G. J. [Rodgers]{}, and S. [Thurner]{}. . , 17(7):2363–2385, 2007. N. Pržulj. Biological network comparison using graphlet degree distribution. , 23(2):e177–e183, 2007. L. da Fontoura Costa and R. Fernandes Silva Andrade. What are the best concentric descriptors for complex networks? , 9(9):311, 2007. E. Estrada. Topological structural classes of complex networks. , 75:016103, Jan 2007. N. Malod-Dognin and N. Pržulj. Gr-align: fast and flexible alignment of protein 3d structures using graphlet degree similarity. , 30(9):1259–1265, 2014. T. Milenković and N. Pržulj. Uncovering biological network function via graphlet degree signatures. , 6, 2008. E. Estrada. Generalization of topological indices. , 336(3‚Äì4):248 – 252, 2001. M. [Mitrovi[ć]{}]{} and B. [Tadi[ć]{}]{}. . , 80(2):026123, 2009. J. Jonsson. Simplicial Complexes of Graphs. Springer-Verlag Berlin Heidelberg, 2008. S. Maletić, M. Rajković, and D. Vasiljević. Simplicial complexes of networks and their statistical properties. In Marian Bubak, GeertDick van Albada, Jack Dongarra, and PeterM.A. Sloot, editors, [*Computational Science ICCS 2008*]{}, volume 5102 of [ *Lecture Notes in Computer Science*]{}, pages 568–575. Springer Berlin Heidelberg, 2008. M. Kivela, A. Arenas, M. Barthelemy, J. P. Gleeson, Y. Moreno, and M. A. Porter. Multilayer networks. , 2(3):203–271, 2014. G. Paltoglou, S. Gobron, M. Skowron, M. Thelwall, and D. Thalmann. Sentiment analysis of informal textual communication in cyberspace. In [*In Proc. Engage 2010, Springer LNCS State-of-the-Art Survey*]{}, pages 13–25, 2010. J. A. Russell. . , 39:1161–1178, 1980. http://www.cyberemotions.eu/ “Collective emotions in cyberspace” M. Šuvakov, D. Garcia, F. Schweitzer, , and B. Tadić. Agent-based simulations of emotion spreading in online social networks. http://arxiv.org/abs/1205.6278, 2012. B. Tadić, M. Šuvakov, D. Garcia, and Schweitzer. . Springer, 2014. J. Ugander, B. Karrer, L. Backstrom, and C. Marlow. The anatomy of the facebook social graph. , 2011. Y.-Y. Ahn, S. Han, H. Kwak, S. Moon, and H. Jeong. Analysis of topological characteristics of huge online social networking services. , pages 835 – 844, 2012. E. Ferrara, P. De Meo, G. Fiumara, and A. Provetti. The role of strong and weak ties in facebook: a community structure perspective. , pages 1–10, 2012. P.S. [Dodds]{}, K.D. Harris, I.M. Koloumann, C.A. Bliss, and C.M. [Danforth]{}. . , 2011. P. [Panzarasa]{}, T. [Opsahl]{}, and K.M. [Carley]{}. Patterns and dynamics of users’ behavior and interactions: network analysis off and online community. , 60:911–932, 2009. P. Klimek and S. Thurner. Triadic closure dynamics drives scaling laws in social multiplex networks. , 15(6):063008, 2013. M. Kahle. The neighborhood complex of a random graph. , 114, 2007. H.-J. Bandelt and V. Chepoi. Metric graph theory and geometry: a survey, in Goodman, J. E.; Pach, J.; Pollack, r., eds. “Surveys on discrete and computational geometry: Twenty years later”. volume 453. Providence, RI: AMS, 2008. C. Bron and J. Kerbosch. Finding all cliques of an undirected graph. , 16, 1973. J. Sylvan Katz. Indicators for complex innovation systems. , 35(7):893 – 909, 2006. J. Živković, B. Tadić, N. Wick, and S. Thurner. Statistical indicators of collective behavior and functional clusters in gene expression network of yeast. , 50:255–258, 2006. F. Font-Clos, G.Boleda, and Á. Corral. A scaling law beyond zipf’s law and its relation to heaps’ law. , 15(9):093033, 2013. M. E. J. Newman. Mixing patterns in networks. , 67:026126, 2003. B. Tadić and M. Šuvakov. Can human-like bots control collective mood: Agent-based simulations of online chats. , page P10014, 2013. M. [Š]{}uvakov and B. Tadić. Collective emotion dynamics in chats with agents, moderators and bots. , 17(3):33801-12, 2014. B. [Tadić]{}. . , 293:273–284, 2001. A. V. Mantzaris, D. S. Bassett, N. F. Wymbs, E. Estrada, Mason A. Porter, *et al.* Dynamic network centrality summarizes learning in the human brain. , 1(1):83–92, 2013. G. Heimeriks, M. Hörlesberger, and P. Van Den Besselaar. Mapping communication and collaboration in heterogeneous research networks. , 58, (2003).
High
[ 0.657824933687002, 31, 16.125 ]
Skincare. Beauty. Life. Haircare. Cruelty-free. Body Shop Advent Calendar Days 1 to 9 – Blogmas Day 9 Hello! Short interruption to my beauty collection series as we dive into the Body Shop Advent Calendar! So, my wonderful boyfriend treated me to this calendar, which I am so grateful for! He gave it to me and said it was for my Blogmas…so cute and thoughtful! It is such a gorgeous present to receive and is filled with some amazing Body Shop products. I am a long time Body Shop fan and adore a lot of their products so I was super excited to get this. So I thought throughout Blogmas I would show you what is in the Advent Calendar! I’ve already forgotten which order they were in in the box, but we have from left to right… Star Shaped Frosted Plum scented soap: super cute and in one of my favourite Christmas scents from the Body Shop! White shower scrub thing: I don’t know what this is called, but they are always handy! Red Lip Liner: this is awesome as I was thinking the other day when doing my beauty collection that I red lip liner would come in handy.
Low
[ 0.504629629629629, 27.25, 26.75 ]
The present invention relates to systems for controlling the recirculation of fuel vapor from the vapor dome in a tank to the filler tube for controlling operation of the automatic nozzle shutoff when the level of fuel in the tank reaches a predetermined maximum. Fuel vapor recirculation systems have been employed in motor vehicle fuel tank installations for accommodating the reduced pressure in the region surrounding the liquid discharge from the dispensing nozzle during refueling and particularly where a mechanical seal is provided about the nozzle upon insertion in the filler tube for preventing fuel vapors escaping to the atmosphere during refueling. In such systems problems have been encountered in designing the system to accommodate the wide variation in nozzle dispensing rates experienced in different regions. For example, in the majority of vehicle service regions the nozzles are set to shut off when a vacuum of about 1.75 to 2.5 kPa is reached in the filler tube. The normal vacuum during fuel discharge is about 0.5 kPa and requires about six liters per minute of recirculation vapor flow to maintain the vacuum at this level. However, in regions, a greater degree of sealing is required about the nozzle resulting in a need for about 70 liters per minute recirculation vapor flow to maintain 0.5 kPa vacuum and to prevent premature nozzle shut-off. Thus, it has been difficult to design a system for providing sufficient vapor recirculation to the filler tube during refueling in order to accommodate the wide range of vapor flow required to accommodate the variety of refueling requirements. If the system is designed to accommodate the maximum vapor flow to be required during refueling, the system will react to cause pressure build up in the filler tube in the region surrounding the nozzle and result in leakage of fuel vapor past the nozzle seal to the atmosphere. It will be understood that such systems include a second vapor line to a vapor storage device, such as a canister filled with granulated charcoal, for storing fuel vapor displaced by the rising liquid fuel level in the tank. The system must therefore maintain a proper balance of vapor flow to the canister and to the filler tube regions surrounding the nozzle in order to maintain the integrity of the system in preventing escape of fuel vapor to the atmosphere and also to facilitate proper filling from the refueling nozzle and prevent premature activation of the automatic shutoff device provided in the nozzle.
Mid
[ 0.5842217484008521, 34.25, 24.375 ]
A novel model to predict the risk of readmission in patients with renal colic. Abstract Purpose: To identify the clinical, laboratory, and imaging parameters that may increase the risk of readmission in patients with renal colic that is managed by active surveillance and to produce a novel model to predict the risk for this. We retrospectively reviewed patients with renal colic secondary to ureteral calculi admitted to our hospital from March 2009 until September 2010. The colic was managed with active surveillance for 6 weeks. Patients were divided into those who were not readmitted to the hospital within the follow-up period (group A) and those who were (group B). From the 452 studied patients, 82 (18.1%) were readmitted to the hospital. Stone size (P<0.001) and location (P<0.001) and serum white blood cell count (P=0.009) were statistically significantly different between groups. These parameters were found to be independent predictors for readmission. A predictive model was produced to calculate the risk of readmission. Stone size and location and white blood cell count are independent predictors for potential readmission in patients with renal colic. Using these parameters, we may calculate the risk for readmission, and the latter may assist physicians in identifying the best treatment option.
High
[ 0.675, 33.75, 16.25 ]
Hi, I have website which uses both the rtmedia plugin, and geodirectory. when I try to add a listing to the geo directory my browser locks up when rt media is activated. Do you have any idea why this could be happening.
Low
[ 0.42679900744416804, 21.5, 28.875 ]
[Insulin-like growth factor 1 (IGF-1) mRNA and IGF-1 protein. Expression in cells of the trabecular meshwork of the bovine eye]. The purpose of the study was to determine whether cultured bovine trabecular meshwork cells and trabecular tissue ex vivo express insulin-like growth factor-1 (IGF-1) mRNA and protein. The reverse transcriptase-polymerase chain reaction (RT-PCR) was used for detection of IGF-1 mRNA. To detect the protein on the cells an IGF-1-specific immunohistochemical stain was used on trabecular meshwork cells. A single 240 bp RT-PCR product was obtained, the RT-PCR product was verified by sequencing and the derived sequence was homologous to the known bovine sequence. IGF-1 immunostaining was positive in the cytoplasm of trabecular meshwork cells. We conclude that trabecular meshwork cells produce IGF-1 mRNA and contribute to the presence of IGF-1 protein in the trabecular meshwork microenvironment as well as aqueous humor. Trabecular meshwork cells were affected by IGF-1 not only through paracrine but also through autocrine action. Whether regulations in IGF-1 production may contribute to the pathogenesis of primary open-angle glaucoma and the possibility of promoting the autocrine action of IGF-1 by trabecular meshwork cells to treat the disease is worth further investigation.
High
[ 0.6650485436893201, 34.25, 17.25 ]
Q: Concepts for designing a high performance social feed I'm not trying to build a social network here, but I'm wondering how someone could build a high performance social feed similar to Twitter's or Facebook's. The issue I see is that every post in the feed would have to have two lookups per post, one to get the "post" and one to get the foreign key it references. On a loaded DB server with millions of posts, that can get slow very fast. So, is there a better way to create a social stream? A: One thing you can try is to implement something like Diaspora. The whole system will be distributed over sevaral servers. Diaspora is not a single site — it’s a collection of different sites, with different URLs, run by different people. But they all run the same software, and they all talk to each other. Each server is called a “pod.” As the service grows, lots of these pods will join the Diaspora network. read more about Diaspora here
Mid
[ 0.581907090464547, 29.75, 21.375 ]
These things are pretty strong and pretty big. 1 serving has a full gram of beta alanine and which also makes it good as a preworkout. Overall, I felt pretty good while taking these and would definitely buy again. Not a huge fan of this stuff, ill try the pill form next time. No matter how much food I ate before taking this it messed with my stomach big time. The orange flavor is ok and the vitamin profile seems legit, but the stomach issues will keep me from buying the powder form again. Good blend for a multi vitamin but personally, I find it much easier to swallow pills that are in a casing. After months and months or taking something everyday, I got sick of the vitamin taste in my mouth and in the long run, I prefer something like Muscle Pharm's Armour V which has a casing. Picked this up from a local store, in replacement of my previous multi-vitamin. Great multi-vitamin profie, the chelation is a great plus for better absorption. Biggest con is as per the label, having to force down 6 "horse pills" every day and seeing neon yellow urine from vitamin-B overload. Odd they weren't able to formulate this product into 1,2, or maybe 3 vitamins a day. I take 2 of these a day, with meals to supplement my regular food, therefore lasting 90 days. I supplement additional vitamin D to make up for the loss by only taking 2. I would buy this product again if the quantity and size of pills was reduced. A multi is a multi is a multi. Mostly. This one has a pretty good spectrum and the only downside is that when taken on an empty stomach, like during an intermittent fast, can result in very slight nausea. The product did mention that it should be taken with food, so I may simply shift the time taken to after meals. I believe this to be an above average multi vitamin. Gaspari Nutrition is becoming one of my favorite brands. Everything I have tried from them seems to be top quality. I like the fact that the minerals are chelated. I first received a free sample but then ordered more. These have been added to my must have supplements. I only take two a day which seems to be enough for me. Great product! The s****ested serving size is 3 pills, however I only take 2 pills per day (1 at breakfast & 1 at lunch). I don't really need all of the extra nutrients. Your urine might be a little discolored but I make sure to drink plenty of water throughout the day to minimize this. Also, the capsule size is huge yet it goes down smoothly due to its shape. I highly recommend this product. I think that this multivitamin is one of the best out there, if not the best. It not only has the most bio available forms of vitamins in good amounts, but it also has TRAACS chelated minerals (including a 100% dose of Magnesium). It also has a full dose of Beta Alanine and LCLT. Excellent recovery and overall great product. I highly recommend it! I've been all about anavite for a couple years now and I'm surprised as to why there is not more hype. Anavite has everything you need when it comes to vitamins and minerals but its the beta alanine that seperates it from others. Its recommended (by jim stoppani) to have beta alanine throughout the day including rest days. And to my knowledge anavite is the only multivitamin that has beta alanine in it. Great multivitamin on the market now! One of the best key features is that it doesn't contain ingredients that are not necessary! This product not only supports performance and recovery but also offers a anti-oxidant. I recently started taking Anavite and quickly was able to tell a difference in my performance and how i was even feeling! it surpasses other products i have took! i'm going to definitly keep taking Anavite it works great for me!! i do recomend it!!!
Mid
[ 0.594724220623501, 31, 21.125 ]
The present invention generally relates to optical transmission networks and more particularly to the establishment of dedicated LAN connections in optical transmission networks. In optical transmission networks, information is transmitted between network elements (NEs) via optical fibers. As is well known, the majority of the transmission capacity available in each fiber is typically used for transporting client information (hereinafter referred to as payload) while some capacity (hereinafter referred to as overhead) is set aside for transmission management and control. In the majority of optical transmission networks, it is common to provision dedicated connections between NEs which do not use any of the optical fiber capacity used for payload transmissions. These connections are highly desirable because they can provide some additional and separate connectivity between NEs without using any transport capacity which could otherwise serve for transmitting payload information and generate revenues. Dedicated connections are often provisioned in optical transmission networks to provide remote access to or interconnect local area networks (LANs). For example, dedicated connections will be established between NEs of an optical transmission network where different NEs are located in close proximity of separate LANs or where a user connected to one NE wishes to access a LAN located in proximity of another NE. By using dedicated connections, LANs can be interconnected or remotely accessed through an optical transmission network without using any of the payload capacity available therein. Dedicated connections in an optical transmission network can also be used to monitor equipment for maintenance, administration, provisioning or simply to monitor data transmissions. Typically, the monitoring is performed remotely from a central monitoring unit installed in proximity to a particular NE, and connected to other NEs in the network via dedicated monitoring connections. Presently, various methods are used to provide dedicated connectivity between NEs of an optical transmission network. However, these methods all present a number of disadvantages. Considering in particular the equipment monitoring usage, one traditional approach is to use a standard telephone connection between the monitoring unit and each NE in the network where equipment is to be monitored. In this approach, each telephone connection is terminated at its ends with a respective modem. At each NE, the modem terminating the telephone connection is connected directly to the monitored equipment by way of a serial connection such as, for example, RS-232. For NEs with multiple pieces of equipment to monitor, a pool of modems connected in parallel must be used where each modem provides a connection between the monitoring unit and a particular device or element to monitor in a one to one (1:1) arrangement. Apart from the inherent bandwidth restrictions of conventional telephone lines, this approach has a number of drawbacks. First, telephone network connectivity is required at both the monitoring site and each of the NEs where equipment is to be monitored. For NEs with many devices or elements to monitor where, as noted above, a large number of modems is required, this approach could be quite prohibitive, particularly for NEs in remote areas. In addition to being prohibitive, this method increases the complexity of the monitoring equipment. More specifically, with the need to establish at least one telephone connection and use at least one modem at each NE where equipment is to be monitored, data collection cannot be easily automated unless a sophisticated-monitoring unit is used. Further, because the modems and telephone connections used at each NE are external to the optical transmission network, they must be managed separately. Apart from the obvious resulting high cost, maintaining a separate network of telephone connections and modems would also have a considerable impact on the overall complexity of the monitoring equipment. Another conventional method used to provide dedicated connectivity for remotely monitoring equipment at NEs without using the available network capacity consists of deploying a dedicated network of data connections linking the monitoring unit with each monitored NE site. According to this method, each data network connection is terminated at its ends with a respective bridge. At each NE, the bridge terminating the network connection is connected directly to the monitored equipment by way of a multi-access link such as Ethernet. Similarly to the telephone method described above where at each NE, modems must be connected to the monitored equipment in a 1:1 configuration, a bridge can also be connected in a 1:1 arrangement. In contrast however, bridges can also be connected in a 1:N arrangement if a large number of devices must be monitored. An obvious advantage of dedicated data network connections over telephone lines is that the capacity provided by data network connections is considerably higher and with possible 1:1 or 1:N connection arrangements, the connectivity provided at each NE is more flexible. However, despite offering a higher transmission capacity and a more flexible connectivity at each NE, this approach requires that a separate data network be deployed and maintained separately from the optical transmission network. Similarly to the telephone line approach described above, the provisioning and maintenance of a separate data network substantially increases the overall cost and complexity of the optical transmission network. In synchronous optical networks (SONET), another conventional method for remotely monitoring equipment without using any of the available payload transport capacity consists of using an audio channel in the SONET overhead. This channel typically referred to as the orderwire (OW) channel is normally provisioned for voice communications in the network. According to this method however, the OW channel is provisioned instead to establish a monitoring connection between NEs and a monitoring unit. According to this method, the monitoring unit is connected to a nearby NE with a modem and a telephone line to access to OW channel. At NEs with equipment to monitor, a telephone line terminated with a modem is also used to connect to the OW channel. For NEs with multiple pieces of equipment to monitor, a pool of modems connected in parallel must also be used where each modem provides a connection between the monitoring unit and a particular device or element to monitor. The main benefit of this approach is that it does not require a separate telephone network. However, because modems and telephones lines are still necessary, the disadvantages associated with their use also apply to this method. This includes low capacity, limited connection flexibility at the NEs (limited to 1:1 configurations and not 1:N configurations), complex data collection at the monitoring unit and the need to manage a network of modems separately from the optical transmission network. Therefore, in view of the shortcomings of conventional dedicated connection schemes, it would be desirable to provide optical transmission networks with dedicated connections between NEs which are cost-effective, simple and can offer increased capacity, flexible connectivity without the need for managing or maintaining external network components. The present invention provides a method and apparatus for establishing dedicated local area network (LAN) connectivity between network elements (NEs) in an optical transmission network without using any of the payload transport capacity available. In order to provision dedicated LAN connections in an optical transmission network without using the available payload transport capacity, the invention reallocates overhead functionality to provide dedicated bandwidth between NEs. At each NE, a respective LAN interface unit provides access to this dedicated bandwidth and allows the NEs or LAN networks or devices connected thereto such as personal computers (PCs), servers and monitoring equipment to communicate without consuming any payload transport capacity available in the network. According to a broad aspect, the invention provides a method of transmitting LAN data in an optical transmission network wherein information is transmitting frames, each frame containing a first plurality of bytes for transmitting payload data and a second plurality of bytes for transmitting overhead data, the method comprising allocating in each frame one or more bytes of the second plurality of bytes for LAN data transmissions, for each LAN data transmission, transmitting frames with LAN data in the one or more allocated bytes until the LAN data transmission is complete. According to another broad aspect, the invention provides an optical transmission network formed of multiple NEs interconnected with optical links where each link has a defined payload transmission capacity allocated for payload data transmissions and a defined overhead transmission capacity allocated for overhead data transmissions of which a portion is reallocated for LAN data transmissions, the optical transmission network comprising at each NE a LAN interface connected to receive LAN data from one or more LAN devices for transmission in the reallocated portion of the overhead transmission capacity and an optical transmitter connected to the LAN interface and operable to transmit the received LAN data using the reallocated portion of the overhead transmission capacity. According to yet another broad aspect, the invention provides an apparatus for a first NE in an optical transmission network for transmitting LAN data to a second NE via an optical link interconnecting the first and second NE wherein the optical link has a defined payload transmission capacity allocated for payload data transmissions and a defined overhead transmission capacity allocated for overhead data transmissions of which a portion is reallocated for LAN data transmissions, the apparatus including a LAN interface connected to receive LAN data for transmission with the reallocated portion of the overhead transmission capacity and an optical transmitter connected to the LAN interface and operable to transmit the received LAN data using the reallocated portion of the overhead transmission capacity. According to yet another broad aspect, the invention provides a LAN interface connecting a LAN device to a NE in an optical transmission network of a defined payload transmission capacity allocated for payload data transmissions and a defined overhead transmission capacity allocated for overhead data transmissions of which a portion is reallocated for LAN data transmissions, the LAN interface being operable to receive LAN data from the LAN device and process the LAN data received for transmission using the reallocated portion of the overhead transmission capacity. Preferably, the reallocated portion can either be an optical channel such as the optical service channel (OSC) or overhead bytes in an optical channel. In the latter case, the overhead bytes could be one or more overhead bytes. The invention can be incorporated in any optical transmission network topology or configuration such as for example, synchronous optical networks (SONET) or optical transport networks (OTN) where it is desirable to establish dedicated connections between NEs without using any of the payload transport capacity available. In a preferred embodiment, the invention is used to provide dedicated layer 2 Ethernet connectivity between NEs in a SONET network. In order to provide this Ethernet connectivity, the invention uses F1 bytes in the SONET overhead to establish dedicated bandwidth for Ethernet communications between NEs. When the SONET overhead is not visible, it is possible to use other overhead functionality to establish dedicated bandwidth. In another preferred embodiment, an optical service channel is used to provide this dedicated bandwidth. In both embodiments, an Ethernet wayside (EW) unit is used at each NE to provide access to this dedicated bandwidth. The EW unit can be used to attach multiple Ethernet devices or networks. By using overhead bytes (e.g. F1 bytes) or optical channels which are conventionally allocated for overhead, the invention can be used to support various LAN communications across the NEs without using any of the payload bandwidth available. For example, the dedicated bandwidth could be used for software download of loads to each NE. Alternatively, a network administrator at a monitoring unit could remotely monitor equipment at or in proximity of the NEs in the network without consuming any of the payload transmission capacity available and adversely affect transport revenues. Another advantage of the invention is that the dedicated LAN connections provided by the present invention can provide in excess of 10 megabits per second of transport capacity. In addition, the dedicated LAN connections are provisioned internally to the optical transmission network therefore eliminating the need for deploying and maintaining any additional telephone or data network external to the optical transmission network. Therefore, the overall cost of providing dedicated connections in an optical transmission network is considerably reduced. Yet another advantage of the present invention is that multiple LAN devices can be connected at each NE via a single LAN interface unit (e.g. a EW unit). With this ability, the invention can advantageously be used to establish point-to-point or point-to-multipoint LAN connections between NEs of an optical transmission network. In addition to equipment monitoring, these point-to-point or point-to-multipoint LAN connections can also be used for LAN applications such as for example, connectivity between LANs or as a further example, remote access by one or more users to a LAN.
Mid
[ 0.550420168067226, 32.75, 26.75 ]
Q: How to Draw Gantt chart using chart js or other libraries I want to draw Gantt chart like below There is no option to draw Gantt chart in chart js. is it possible?? if not possible please suggest me some charting libraries to draw graph like this A: I suggest you Scatter Chart. In Scatter Charts, you can draw multiple independent lines. As you can see from the below image. [Sample Code] var scatterChart = new Chart(ctx1, { type: 'line', data: { datasets: [ { label: 'Scatter Dataset', backgroundColor: "rgba(246,156,85,1)", borderColor: "rgba(246,156,85,1)", fill: false, borderWidth : 15, pointRadius : 0, data: [ { x: 0, y: 9 }, { x: 3, y: 9 } ] }, { backgroundColor: "rgba(208,255,154,1)", borderColor: "rgba(208,255,154,1)", fill: false, borderWidth : 15, pointRadius : 0, data: [ { x: 3, y: 7 }, { x: 5, y: 7 } ] }, { label: 'Scatter Dataset', backgroundColor: "rgba(246,156,85,1)", borderColor: "rgba(246,156,85,1)", fill: false, borderWidth : 15, pointRadius : 0, data: [ { x: 5, y: 5 }, { x: 10, y: 5 } ] }, { backgroundColor: "rgba(208,255,154,1)", borderColor: "rgba(208,255,154,1)", fill: false, borderWidth : 15, pointRadius : 0, data: [ { x: 10, y: 3 }, { x: 13, y: 3 } ] } ] }, options: { legend : { display : false }, scales: { xAxes: [{ type: 'linear', position: 'bottom', ticks : { beginAtzero :true, stepSize : 1 } }], yAxes : [{ scaleLabel : { display : false }, ticks : { beginAtZero :true, max : 10 } }] } } }); Rest the configuration like colors or if you want to hide the y axes do it as your project required. A: EDIT this method would not work efficiently for more complicated cases where multiple bars need to be shown for a single Y value. I would go with a stacked horizontalbar chart of two datasets. The first dataset would be transparent and used to offset the second dataset which is your actual data. The code below prevents tooltip from appearing for the first dataset as well. http://codepen.io/pursianKatze/pen/OmbWvZ?editors=1111 [SAMPLE CODE] var barOptions_stacked = { hover :{ animationDuration:10 }, scales: { xAxes: [{ label:"Duration", ticks: { beginAtZero:true, fontFamily: "'Open Sans Bold', sans-serif", fontSize:11 }, scaleLabel:{ display:false }, gridLines: { }, stacked: true }], yAxes: [{ gridLines: { display:false, color: "#fff", zeroLineColor: "#fff", zeroLineWidth: 0 }, ticks: { fontFamily: "'Open Sans Bold', sans-serif", fontSize:11 }, stacked: true }] }, legend:{ display:false }, }; var ctx = document.getElementById("myChart"); var myChart = new Chart(ctx, { type: 'horizontalBar', data: { labels: ["1", "2", "3", "4"], datasets: [{ data: [50,150, 300, 400, 500], backgroundColor: "rgba(63,103,126,0)", hoverBackgroundColor: "rgba(50,90,100,0)" },{ data: [100, 100, 200, 200, 100], backgroundColor: ['red', 'green', 'blue', 'yellow'], }] }, options: barOptions_stacked, }); // this part to make the tooltip only active on your real dataset var originalGetElementAtEvent = myChart.getElementAtEvent; myChart.getElementAtEvent = function (e) { return originalGetElementAtEvent.apply(this, arguments).filter(function (e) { return e._datasetIndex === 1; }); } .graph_container{ display:block; width:600px; } <script src="https://cdnjs.cloudflare.com/ajax/libs/Chart.js/2.1.3/Chart.js"></script> <html> <body> <div class="graph_container"> <canvas id="myChart"></canvas> </div> </body> </html>
Mid
[ 0.576112412177985, 30.75, 22.625 ]
1. Introduction {#sec1-sensors-20-04308} =============== The Internet of Things (IoT) is the interconnection of computing devices embedded in assets or Things, enabling them to send and receive data \[[@B1-sensors-20-04308]\]. Over the past decade, this paradigm has been applied to research areas such as smart environments \[[@B2-sensors-20-04308]\], healthcare \[[@B3-sensors-20-04308]\] and logistics \[[@B4-sensors-20-04308]\]. In addition to these applications, IoT delivers a range of benefits to industry by enabling more efficient, optimized monitoring and controlling in a cost efficient manner. This application of IoT to industry is often described as Industry 4.0 or the Industrial Internet of Things (IIoT) \[[@B5-sensors-20-04308]\]. The physical assets within an industrial environment are equipped with smart sensors, connecting them to the Internet and creating a Cyber-Physical System (CPS) of interconnected machines. These sensors collect and transmit valuable data about Key Performance Indicators (KPIs) which can be used by analytic and cognitive technologies to improve the overall performance of manufacturing plants by increasing the production or reducing its cost. In order to prevent the disruption of mission-critical industrial operations, the rise of IIoT has opened new challenges with regard to robustness, scalability and security. These requirements apply to each component within the overall IIoT architecture \[[@B6-sensors-20-04308]\]. In the current trend toward digitalization and IIoT, manufacturing companies also increasingly rely on a range of technology platforms to help streamline their production and increase their productivity, among others by avoiding machine downtimes and the accompanying loss of turnover. Monitoring the condition of, for instance, motors, pumps, fans, turbines, gearboxes, and more specifically bearings and gears inside them, plays a vital role in the maintenance program of rotating machines. The most common KPIs for this category of machines are vibration and thermal signals \[[@B7-sensors-20-04308]\]. Monitoring these KPIs leads to early fault detection, which is crucial for moving from a time-based Preventive Maintenance (PM) program to a condition-based Predictive Maintenance (PdM) strategy. This PdM strategy reduces unexpected machine downtime and unnecessary replacement of healthy machine parts, and the associated costs. In summary, through application of the IIoT paradigm and smart sensors, the condition of these machines can be constantly monitored and evaluated. The resulting monitoring data can be used by state-of-the-art machine learning algorithms to calculate an estimate of the Remaining Useful Life (RUL) of the assets \[[@B8-sensors-20-04308]\]. Targeted maintenance can then be scheduled based on these estimates. However, condition-based monitoring models require the availability of large and reliable data sets, for both training and validation purposes, that capture all variations observed in all potential operational conditions, the potential failure modes, the fault evolution and hence the lifetime of bearings. A supervised learning approach, for example, needs all this data to train the model and minimize incorrect classifications. Reliable benchmark datasets that capture the evolution of behavior of failing machines during its lifetime, under various operating conditions, are scarce and, for most companies, the investment cost of collecting this data, because it requires significant effort and a long time, does not outweigh the benefits they can reap. The resulting lack of data is a major hurdle for the adoption of condition-based monitoring in industry. Although recent advancements in sensor, acquisition and processing hardware have demonstrated cost-effective solutions \[[@B9-sensors-20-04308],[@B10-sensors-20-04308]\], it is easier to quantify the cost than the economical benefit of this investment. Flanders Make and imec, therefore, jointly developed a living lab, named the Smart Maintenance Living Lab. It is an open test and research platform consisting of seven identical drivetrain systems designed to monitor rolling-element bearings and accelerate the process of collecting data about their lifetime under diverse and variable operating conditions. The resulting well-documented data set can be used for the development, testing and validation of bearing fault diagnostic and prognostic methods. Moreover, it can be used in benchmark studies to compare the different methods. The goal of this paper is to provide insights into the architecture of this living lab, and how this setup can enable condition-based machine maintenance. The paper starts with a high-level description of the living lab in [Section 2](#sec2-sensors-20-04308){ref-type="sec"}. [Section 3](#sec3-sensors-20-04308){ref-type="sec"} contains an overview of the related research. The next three sections dive into the architectural details and essential building blocks, i.e., [Section 4](#sec4-sensors-20-04308){ref-type="sec"} explains the drivetrain subsystems, [Section 5](#sec5-sensors-20-04308){ref-type="sec"} goes into the Obelisk cloud platform, and [Section 6](#sec6-sensors-20-04308){ref-type="sec"} describes the dynamic dashboard. The paper is finalized with the results and a set of conclusions on the potential broader applicability of the living lab for machine condition monitoring in [Section 7](#sec7-sensors-20-04308){ref-type="sec"} and [Section 8](#sec8-sensors-20-04308){ref-type="sec"}. 2. Smart Maintenance Living Lab {#sec2-sensors-20-04308} =============================== The Smart Maintenance Living Lab is an open test and research platform for smart machine maintenance, from drivetrain subsystem, over the cloud, up to the dynamic dashboard. A schematic overview of its architecture is presented in [Figure 1](#sensors-20-04308-f001){ref-type="fig"}. Within the lab, seven identical drivetrain subsystems are installed, resembling a fleet. These machines are designed to perform accelerated testing of rolling-element bearings until their end-of-life. Moreover, they are equipped with different sensors to monitor the bearings throughout their lifetime and collect the resulting data. The platform aims to support the adoption of smart machine maintenance in industry through (i) the creation of a large, varied and well-documented dataset which can help with the development of accurate diagnostic and prognostic algorithms, and (ii) providing insights into the components required for and the technology choices made to come to an integrated end-to-end smart maintenance architecture, from monitored hardware to scalable cloud back-end to dynamic front-end. For the architecture, an Industrial Internet Reference Architecture (IIRA), presented by the Industrial Internet Consortium (IIC) \[[@B11-sensors-20-04308]\], was chosen. This three-tier architecture consists of an edge, platform and enterprise layer respectively. The first tier contains the edge nodes, i.e., the sensors, actuators, and control systems connected to the physical machines. A cluster of interconnected nodes is called a proximity network. Each of these networks generally has an edge gateway to connect the nodes with the access network. The fleet of machines located in the Smart Maintenance Living Lab forms one proximity network consisting of seven edge nodes, i.e., the drivetrain systems. Each one of these subsystems is connected to the edge gateway. In addition to connectivity between the nodes and the access network, the gateway is also used to process the measured data at the edge. Diagnostic algorithms are used to reduce the high dimensionality of captured data by extracting a set of features. These diagnostic features are then transferred to the next tier, i.e., the platform tier. The second layer, or platform tier, of an IIRA architecture has the goal of further processing and analyzing data from the edge tier, and sending control commands from the enterprise tier to the edge tier. In our setup, the most important component of this tier is Obelisk, our in-house cloud platform designed specifically for IoT applications that have scalable data needs. It handles the data ingest from the edge tier, ensures data persistence, supports data querying in various formats and enables stream processing. Furthermore, the platform tier includes analytic and machine learning services that process the collected data. The machine learning service in our platform tier estimates the RUL of the bearings for each drivetrain setup within the fleet. This estimation of RUL is based on the accelerometer and temperature data obtained from conditioning monitoring of the assets in the edge tier. Prognostic algorithms such as RUL prediction are key in enabling PdM. The goal of the third and last tier, i.e., the enterprise tier, is to bundle domain-specific applications as well as decision support systems and to provide interfaces to end-users including operation specialists. In our enterprise tier, we provide a dynamic dashboard platform that allows end-users to build and adapt dashboards that communicate the sensor data captured in the fleet of machines, as well as the output of the RUL service, in an intuitive manner. This dashboard supports the operator in determining the appropriate follow-up actions, without hard-coded visualization configuration through automated sensor discovery and semantic reasoning to match data and results with the most appropriate visualisations. Using this three-tier architecture, the living lab platform allows to collect large amounts of data about degrading bearings and the occurring failures during their lifetime under diverse and variable operating conditions. The resulting large data set can be used to:Test and benchmark the performance of existing software, e.g., diagnostic and prognostic algorithms, and hardware solutions such as intelligent sensors.Improve models and therefore develop, test and validate better diagnostics and prognostics algorithms.Demonstrate the potentials of condition-based fleet monitoring to improve machine diagnostics and prognostics by employing fleet data stored in the cloud environment. Besides collecting a dataset with bearing faults under realistic and varied operating conditions, the living lab and this paper deals with two more research questions:Design of a robust, scalable and secure platform for sensor data ingestion and stream processing;Design of a dynamic, intuitive dashboard application that reduces the amount of manual configuration required to construct the desired sensor data visualizations. All of these technologies offer great opportunities for the industry to optimize machine maintenance strategies. In this way, the living lab aims to bring wider adoption of condition-based monitoring technologies in industry and to support the development of new diagnostic and prognostic algorithms. 3. Related Work {#sec3-sensors-20-04308} =============== As the Smart Maintenance Living Lab demonstrates a complete architecture for IIoT applications and, to the best of the authors' knowledge is the only one doing so, related work is discussed at the different levels of the architecture: (i) the data collection at the edge tier, (ii) the data ingestion, persistence and stream processing platform as well as the analytic and cognitive machine learning algorithms in the platform tier and (iii) the dynamic dashboard for visualization and feedback. The drive for adoption of smart maintenance in industry is dependent on intelligent condition monitoring models. These models require large, reliable data sets. Today, only few public data sets are available and they are recorded under limited operating conditions. The IEEE PHM 2012 Prognostic Challenge data set \[[@B12-sensors-20-04308]\], for example, consists of 17 bearing runs under three different conditions of varying load and rotation speed. Each of these accelerated lifetime bearing runs is recorded on the same test bed setup. It was already apparent from the challenge that different operating conditions resulted in varying machine learning models. However, early results from the collected data also indicate a variability between different drivetrain subsystems \[[@B13-sensors-20-04308]\]. Therefore, the data collected by the Smart Maintenance Living Lab on a fleet of seven machines can result in a more reliable data set that enables the generalization of algorithms created for smart maintenance use cases. For the platform tier, various IoT middleware platforms, both commercial, e.g., Amazon Web Services IoT platform \[[@B14-sensors-20-04308]\], Microsoft Azure IoT Hub \[[@B15-sensors-20-04308]\], Google IoT Platform \[[@B16-sensors-20-04308]\], and open-source alternatives, e.g., ThingSpeak \[[@B17-sensors-20-04308]\] are available today. These platforms are well developed and maintained by large publicly traded companies or large online communities. They support numerous features with regard to security, data storage and communication protocols \[[@B18-sensors-20-04308]\]. However, the use of these platforms creates a tightly coupled architecture to the chosen vendor, introducing constraints to the system and negatively impacting its modularity \[[@B19-sensors-20-04308]\]. FIWARE \[[@B20-sensors-20-04308]\] is technology and vendor agnostic as it relies on proven and widely adopted open-source standards and packages, alleviating its community of users from any lock-in constraint. However, as described by the authors in \[[@B20-sensors-20-04308]\], they experienced scalability limitations due to the non cloud-based setup used. Obelisk \[[@B21-sensors-20-04308]\], the IoT middleware platform presented in this paper for the platform tier, addresses these scalability issues. Dashboard applications in the enterprise tier enable the remote and intuitive monitoring of the vast amount of data produced by the bearing lifetime test setups. Dynamic dashboard applications allow stakeholders, e.g., managers, system experts, customers, to build their own dashboards that visualize KPIs about the systems of their choice by selecting sensors and visualizations at will. Many off-the-shelf dynamic dashboards, such as Microsoft PowerBI \[[@B22-sensors-20-04308]\], Tableau \[[@B23-sensors-20-04308]\] and Google Data Studio \[[@B24-sensors-20-04308]\], are either well integrated with classic data warehouses but do not integrate well with the vast amount of streaming sensor data and the streaming platform technology they require; or they require a lot of programming effort or manual configuration when combining the output of multiple sensors, e.g., Node-RED \[[@B25-sensors-20-04308]\]. This manual configuration is required, on the one hand, at design time to instruct how to fetch data and bind it correctly to the available data processing and visualization components, and at runtime, on the other hand, there is still the burden for the user to select from a plethora of available sensors, data processing components and visualizations. In previous research \[[@B26-sensors-20-04308]\], we proposed to wrap sensors, data processing components and visualizations as Web Things, i.e., APIs, that can be automatically discovered, called and combined, and this way to reduce the sensor and visualization choice overload by reasoning over the available metadata that the Web Things are annotated with. Within the Living Lab Smart Maintenance, this dynamic dashboard using semantic reasoning is integrated in the enterprise tier, on top of Obelisk. 4. Drivetrain Systems {#sec4-sensors-20-04308} ===================== As mentioned in [Section 2](#sec2-sensors-20-04308){ref-type="sec"}, the edge tier consists of seven identical drivetrain systems \[[@B13-sensors-20-04308]\]. A single setup comprises of a shaft with the test bearing, lubricated by an internal oil bath, and one support bearing on each side. The system is driven by a motor at a rotation of up to 3000 rpm and a radial load of up to a maximum of 10 kN is applied to the test bearing using a hydraulic cylinder. During the accelerated lifetime testing of the bearings, the rotational speed and radial load of each setup can be controlled, allowing it to operate under a variety of different conditions. As shown in [Figure 2](#sensors-20-04308-f002){ref-type="fig"}, each setup is equipped with an accelerometer, temperature sensor, load sensor and speed sensor for monitoring purposes. The speed and load applied to the system is controlled, and the measurements from these sensors are obtained, using an industrial Beckhoff control platform. The acquired sensor measurements are locally processed to reduce the high volume of data. An overview of the resulting measurements and diagnostic features is shown in [Table 1](#sensors-20-04308-t001){ref-type="table"}. These diagnostic features are transferred to the next tier, i.e., the platform tier, of which Obelisk is the most important component. 5. Obelisk: Scalable Cloud Platform for IoT Applications {#sec5-sensors-20-04308} ======================================================== Obelisk is a cloud-based Platform as a Service (PaaS) developed by IDLab \[[@B21-sensors-20-04308]\]. It is jointly used by stakeholders from industry and academia to conduct collaborative research on IoT applications. These stakeholders include data producers, data scientists, application builders and end-users. The platform itself is presented as an intermediate layer between the different components and functions as the backbone within the overall Living Lab architecture, as visualized by [Figure 1](#sensors-20-04308-f001){ref-type="fig"}. It supports a number of different protocols and is used for stream processing within the platform tier or data consumption by enterprise tier applications, e.g., dashboard applications. However, the most important use of the platform is data persistence at large scale. Throughout this section, the internal architecture of Obelisk is discussed along with the important design choices made for each component. The terminology used is derived from the IoT concept. A *Thing* is an all encompassing name for sensors and actuators. A single Thing can measure more than one type of measurement, named a *Metric*, and is addressable with an ID. It can be a single cyber-physical device that has multiple sensor-heads, e.g., vibration, temperature, as different metrics. A group of Things belonging to the same company, manufacturing plant, project, etc. are encapsulated within a *Scope*. Doing this provides a number of benefits with regard to maintainability, security and data isolation. This data isolation is ensured throughout the entire data flow, i.e., from ingest to egress. Permissions for both users and service accounts are limited to one or more *Scope(s)*, preventing unauthorized parties from gaining access to classified data. The fine-grained access control is based on standards such as OpenID \[[@B27-sensors-20-04308]\]. 5.1. Architecture {#sec5dot1-sensors-20-04308} ----------------- As Obelisk is presented as a cloud platform, the Application Programming Interface (API) is the main point of interaction with the system, which is composed of multiple services, each providing a key piece of the puzzle. As previously highlighted in [Figure 1](#sensors-20-04308-f001){ref-type="fig"}, The Obelisk API can be divided into three major parts: (i) The ingest API supports the data producers to securely and reliably insert data into the system; (ii) The egress API can be used to consume the events, both historical and in real-time, in order to process and/or visualize the data; (iii) Finally, the metadata API provides additional information or metadata about the available data for application builders and consumers. This includes information about user permissions and the available Scopes, Things and Metrics. When ingesting new data, it is pushed onto an internal data streaming platform. This component is highly critical since each incoming event passes through it. The decision for Apache Kafka was made due its high-throughput, low-latency, resiliency and scalability \[[@B28-sensors-20-04308]\]. As shown in [Figure 3](#sensors-20-04308-f003){ref-type="fig"}, two internal components are listening to the message queue for incoming events: the *scope streamer* and the *storage sink*. The scope streamer routes these events to their respective scope related streaming pipeline, based on the available metadata, for consumption through the egress API as real-time events. The storage sink ensures data persistence by writing the incoming events to the time-series database. As metadata database, the option was made for a NoSQL DB, namely MongoDB \[[@B29-sensors-20-04308]\], as it requires no fixed underlying data schema. The biggest advantage of using a schema-less design in this scenario is its ability to scale horizontally. Additional database servers can be added, creating a MongoDB cluster consisting of one primary, or master, server and multiple secundary, or slave, servers. Using a cluster of database servers, read operations can then be executed on all members of the cluster. The write operations, however, are constrained to the primary server, but implementation of MongoDB's sharding technique allows to parallelize this. Its ability to become larger and much more powerful through addition of database servers makes MongoDB the preferred choice for large and constantly evolving data sets. As time-series database, InfluxDB \[[@B30-sensors-20-04308]\] was chosen. It uses the same core storage technology applied in most popular NoSQL databases today, including MongoDB, and thus possesses the same advantages with regard to flexibility, scalability and read/write speed. As mentioned above, data consumption from Obelisk is achieved through the egress API. It consists of two sub-components each serving a different functionality. The first sub-component is the streaming API that supports real-time data consumption. This consumption of incoming data as Server-Sent Events (SSE) enables both stream processing by the RUL prediction services and real-time visualization of the data by enterprise tier applications such as the dynamic dashboard. The second sub-component is the RESTful API that can be queried to obtain historical observations and metadata. By using Obelisk as a middleware platform for stream processing, the machine learning services within our system are abstracted from the enterprise tier components such as the dynamic dashboard application. Improved or additional RUL prediction algorithms can therefore be deployed as new services within the overall system without inducing any changes to the dependent components. To support different protocols, additional endpoints for Graph Query Language (GraphQL) and Next Generation Service Interface (NSGI) v2 \[[@B31-sensors-20-04308]\] are added as adapters on top of the RESTful API. GraphQL is a lightweight query language developed by Facebook in 2016 and presented as an alternative for REST. One of its main advantages is the ability to define precisely the data you want, replacing multiple REST requests with a single call \[[@B32-sensors-20-04308]\]. NGSI v2 is a data format used for context information management in IoT applications and is intended to manage the entire lifecycle of context information, including updates, queries, registrations, and subscriptions. A final option for data retrieval is by use of the dataset exporter. This component allows the file-based extraction of data in large quantities from the system. 5.2. Scalability {#sec5dot2-sensors-20-04308} ---------------- Obelisk has been designed with scalability in mind. This is apparent from the overall architecture, the technologies chosen, e.g., the streaming platform, the databases, and even the internal operation of individual components. Firstly, the architecture is in compliance with the Microservice-based Architecture (MSA) \[[@B33-sensors-20-04308]\]. This indicates that each component presented in [Figure 3](#sensors-20-04308-f003){ref-type="fig"} is a loosely-coupled, fine-grained service, or microservice that can be independently deployed. This architecture does not only improve the maintainability and continuous development, but also the scalability of the platform as a whole. Container-orchestration systems, e.g., Kubernetes \[[@B34-sensors-20-04308]\], permit automatic scaling of individual services on-demand. The status monitor component shown in [Figure 3](#sensors-20-04308-f003){ref-type="fig"} performs a complete data flow throughout the entire system to obtain an accurate health status of each service. By doing so, bottlenecks in the system can be detected early and quickly acted upon by replicating one or more components at the root of the problem. Secondly, in addition to the scalable design, various strategies have been implemented at software level to protect against usage spikes. For instance, the ingest API applies a tuneable budget-based rate limiting, while the storage sink, shown in [Figure 3](#sensors-20-04308-f003){ref-type="fig"}, implements buffering strategies. 6. Dynamic Dashboard {#sec6-sensors-20-04308} ==================== The main point of contact for end-users with the presented IIoT system for fleet monitoring and visualization are enterprise tier applications. These enterprise tier dashboard applications combine data from different sources, queried from the platform tier, and present it to the user in an intuitive manner. For this living lab, the dynamic dashboard application developed by IDLab \[[@B26-sensors-20-04308]\] enables end-users, e.g., operators, managers, to query the most relevant data from the information services, e.g., physical assets, and machine learning algorithms, by querying Obelisk and aggregating the data into meaningful visualizations accessible through a dynamic Graphical User Interface (GUI). The purpose of the dashboard is to ensure that the end-user can make business decisions in a timely manner based on the data. The in-house dashboard application distinguishes itself from commercial alternatives available today, e.g., Tableau, Grafana, through its automated sensor discovery and reduction of sensor and visualization choice overload by suggesting appropriate visualizations for selected sensors, using semantic reasoning on the available sensor and visualization metadata. Its aim is to eliminate as much of the configuration work as possible when setting up a new (fleet of) asset(s) in the edge tier and creating dashboards to visualize them. 6.1. Sensor Discovery {#sec6dot1-sensors-20-04308} --------------------- Within a Local Area Network (LAN), sensor discovery can be achieved using network discovery methods such as DNS-SD, mDNS, UPnP, or protocol suites, e.g., DLNA, zeroconf. Once an asset is added to the fleet and connected to the network through smart sensors, its IP address is automatically obtained from the DHCP server and broadcast to other devices within the LAN using one of the above aforementioned protocols. This methodology proves useful at the edge tier, where all devices are deployed within the same network. However, enterprise tier applications, such as the dashboard application, can be deployed outside of the edge tier networks. As described in more detail in \[[@B26-sensors-20-04308]\], the most pragmatic solution for discovery of sensors within a remote network is by providing a root address for each sensor network at run-time. Then, upon HTTP GET request to that IP address and a predetermined TCP port, a discovery service responds with a list of the available services and how to reach them. The Web Thing Model \[[@B35-sensors-20-04308]\] proposes a standard for the API routes required to communicate this list of available services and provides a unified RESTful API to access the diverse, discovered sensors and services that come with heterogeneous communication protocols and data formats. The Web Thing Model describes a set of API endpoints that need to be implemented by a Web Thing, each with their own goal. A complete overview of these endpoints, or routes, and their descriptions is given in [Table 2](#sensors-20-04308-t002){ref-type="table"}. In addition to these endpoints, the Web Thing Model also specifies a JSON model to convey information about the resources, e.g., actions, properties, things. A Web Thing compliant with the Web Thing Model, also named an Extended Web Thing, can directly expose its sensors, or properties and actuators, or actions, through the root URL (*{wt}/properties* and *{wt}/actions* endpoints respectively). In contrast to this direct integration pattern, an option for the so called gateway integration pattern is also supported. This enables an Extended Web Thing to expose other Web Things through additional resources (*{wt}/things/{thingId}*), therefore serving as a gateway. When the data from each Web Thing, such as assets within a fleet, is exposed by a RESTful API compliant with the Web Thing Model, client applications in the enterprise tier are capable of automatically discovering the available sensor properties and actions. These client applications are thus no longer burdened by the configuration of new assets and the annotation of the data types and formats of their sensor properties. Therefore, the end-user of these applications is no longer expected to have any technical knowledge about the fleet to visualize its sensor data. The drawback, however, is that the configuration must still be performed within the Web Thing API by a technical expert. As the Web Thing Model API is a lightweight specification and therefore easily implemented without extensive effort. Furthermore, the registration of new assets can be automated through local network discovery methods as discussed in this section. 6.2. Architecture {#sec6dot2-sensors-20-04308} ----------------- As shown in [Figure 4](#sensors-20-04308-f004){ref-type="fig"}, the dynamic dashboard application consists of two core services: (i) the *Broker* component is the backbone for the dashboards as presented to the end-user. It provides functionality for authentication, data persistence, sensor discovery and semantic reasoning through its RESTful API. (ii) The *Web Thing Gateway* is used as an intermediate service that exposes an Web Thing Model compliant API for data sources that have not implemented the model themselves. These data sources are sensors, e.g., from the Things stored in Obelisk, and visualizations. The Web Thing gateway includes support for both historical events, through REST API calls, as well as real-time events by bridging the Obelisk SSE to the WebSockets protocol in conformity with the Web Thing Model. As shown in the architecture overview, the web thing gateway is only used in case the remote Web Things do not provide an API as specified by the Web Thing Model. Extended Web Things can be directly configured in the broker using its API or via the dashboard GUI. Once the root URL of an Extended Web Thing or gateway is provided, the broker discovers the available properties and actions by crawling the available web resources on the API. Through a semantic extension of the Web Thing Model discussed in [Section 6.1](#sec6dot1-sensors-20-04308){ref-type="sec"}, semantic annotations of these resources, describing their purpose, can be retrieved using content negotiation through request headers, e.g., *Accept: application/ld+json* to retrieve semantic annotations in JSON-LD instead of the Web Thing Model's standard JSON responses. This semantic context is then used by the broker to combine properties from multiple Web Things. To prevent the broker from intensively re-querying the Web Things, the semantic information is stored in a knowledge base. As pointed out earlier, not only sensors are presented as Web Things, also the visualizations used in the dashboard GUI are retrieved this way and they too are semantically annotated. By doing so, the dashboard broker is capable of semantic reasoning to match sensor properties to valid visualizations using the EYE server \[[@B26-sensors-20-04308]\]. This partially automates the process of dashboard creation and assists the end-user in picking the most relevant visualization from the high number of supported visualization types. 6.3. Scalability {#sec6dot3-sensors-20-04308} ---------------- The dynamic dashboard application ensures scalability in various ways and aspects of the system. First and foremost, this application, similar to Obelisk, is designed according to the MSA standard. This implies that once again, each component is packaged and deployed as a containerized application. In case the dashboard is used as a PaaS, this ensures scalability when the amount of users and therefore the amount of created dashboards increases. Secondly, the dynamic dashboard application ensures scalability when the number of monitored assets within the system increases. Through the automated sensor discovery and (reasoned) dashboard visualization suggestions, the overhead for the end user remains minimal by removing the responsibility of manually adding and configuring new assets within the dashboard application as well as assisting these users in matching the new incoming data with the available visualizations. Lastly, the introduced impact on the network usage and Web Thing Gateways due to automated sensor discovery can be minimized by intelligent caching and scheduling strategies. By doing so, the sensor discovery can be planned during periods of minimal system load. This safeguards the network usage within the overall system when the amount of available Web Thing Gateways or created dashboards and therefore the requests made by the dashboard application to these components increases. 7. Results {#sec7-sensors-20-04308} ========== The presented Smart Maintenance Living Lab architecture is currently deployed in practice and provides companies a scalable monitoring and visualization system for smart maintenance from edge to enterprise tier, from cyber-physical assets to dashboard, by solving the three research questions addressed in this paper:Creation of a dataset with bearing faults under realistic and varying operating conditions;Design of a robust, scalable and secure platform for sensor data ingestion and stream processing;Design of a dynamic, intuitive dashboard application that reduces the amount of manual configuration required to construct the desired sensor data visualizations. Regarding the first research question, free samples of the experimental dataset can be downloaded at <https://www.flandersmake.be/en/datasets>. These samples are part of a larger set for various operating conditions such as rotation speed, load and different fault types and severities. As for the latter two research questions, the complete platform is demonstrated and validated for industrial use cases. Therefore, an example dashboard has been created, as shown in [Figure 5](#sensors-20-04308-f005){ref-type="fig"}. This key component within the enterprise tier of the architecture is the main point of contact for the researchers working on, and the companies visiting, the living lab. It enables them to monitor the entire fleet of seven machines located at the edge tier by consuming their measurements and calculated features, as listed in [Table 1](#sensors-20-04308-t001){ref-type="table"}, from the platform tier IoT middleware, Obelisk. The monitoring dashboard for the operator includes widgets for the seven most important KPIs. Due to the semantic reasoning within the dynamic dashboard application, the overhead and manual labour of creating and configuring these eight chosen widgets for each of the seven setups is reduced, resulting in a more user-friendly monitoring environment. To demonstrate and validate the presented system for smart maintenance applications, a machine learning algorithm has been integrated with the platform tier. Through stream processing of the incoming data in Obelisk, a prediction of the RUL is calculated \[[@B36-sensors-20-04308]\]. This percentage value indicates the estimated overall health of the bearing, 100% indicating that the bearing is completely new and 0% that the bearing has completely broken down. After real-time processing of the incoming data, these RUL predictions are pushed to Obelisk as data points of a RUL metric. Each of these data points is linked back to the setup or source from which it originates. By doing this, the dashboard can immediately consume these data as can be done with any other metric or KPI. [Figure 5](#sensors-20-04308-f005){ref-type="fig"} contains a widget to monitor the RUL of the shown setup. At the captured moment in time, the bearing in this setup is flagged as degrading and is currently approximately at 64.5% of its remaining useful life. This provides feedback and can trigger an alert for the operator that maintenance will be required and should be scheduled in the near future. 8. Conclusions and Future Work {#sec8-sensors-20-04308} ============================== This paper proposed and implemented a complete architecture for IIoT applications. Throughout the design process of this architecture and its key components, special attention was given to the open challenges with regard to robustness, scalability and security that arose through adoption of the IoT concept in industry, resulting in a scalable system for fleet monitoring and visualization. This system has been demonstrated and validated though a smart maintenance use case, leading to an open test and research platform for accelerated bearing lifetime tests. However, this Smart Maintenance Living Lab is more than a proof-of-concept for smart maintenance applications in manufacturing industries. Through further data collection of end-to-life bearing tests, more intelligent and accurate machine learning algorithms can be created. This increase in accuracy will improve the overall performance of the presented system, further improving the PdM on machines consisting of rolling-element bearings and its benefits to industry. Furthermore, each individual component within the system, i.e., the Obelisk cloud platform, the RUL estimation service and the dynamic dashboard application, is designed for reusability. Obelisk serves as a key component in various data science related research projects and can be applied to many IoT scenarios, such as smart cities, transportation and healthcare. It is continuously improved and new features are added on a regular basis. Next iterations of Obelisk will include more intelligent device management and support for various options for data ingestion with regard to data formats and communication protocols. In fact, the communication protocol can be completely abstracted through the use of adapters, supporting various state-of-the-art protocols common in IoT applications \[[@B37-sensors-20-04308],[@B38-sensors-20-04308]\]. The dynamic dashboard used in the system is presented as complete dashboard solution. However, due to its modular design and adoption of the MSA, each key building block is encapsulated in a service. This enables the integration of the core functionality, e.g., sensor discovery, semantic visualization reasoning, in other dashboard applications, e.g., Grafana \[[@B39-sensors-20-04308]\], Tableau \[[@B23-sensors-20-04308]\], ThingsBoard \[[@B40-sensors-20-04308]\]. Future work for the dynamic dashboard involves further automation and personalization of the dashboard creation process and therefore further reducing the manual overhead required of the end-user. This can be realised through use of a recommender system that is capable of selecting the best option from the list of valid visualizations retrieved from the semantic reasoner, taking into account the context and end-user preferences. This recommender system can then once again be packaged as a service and used by the aforementioned dashboard applications. In conclusion, this paper aims to support the adoption of smart machine maintenance in industry through (i) the development of an open test and research platform to generate a valuable and otherwise difficult to obtain benchmark data set for the improvement of machine learning algorithms applied to smart machine maintenance and (ii) the design, implementation and validation of a complete architecture for IIoT applications with specific requirements concerning robustness, scalability and security and therefore reducing the reticence in the industry to widely adopt these technologies. We would like to thank Nathan Vandemoortele for his contribution to the machine learning algorithms for prediction of the remaining useful life and Jasper Vaneessen for his contribution and support with regard to the Obelisk platform. The living lab is supported by VLAIO in the framework of the Proeftuin Smart Maintenance. Conceptualization, P.M., B.V. and S.V.H. (Sofie Van Hoecke); methodology, P.M.; software, P.M., V.B. and S.V.H. (Sander Vanden Hautte); validation, P.M.; data curation, P.M., C.S., D.N.A., T.O., S.D., S.V.H. (Sofie Van Hoecke); writing---original draft preparation, P.M.; writing---review and editing, V.B., C.S., S.V.H. (Sander Vanden Hautte), D.N.A., B.V. and S.V.H. (Sofie Van Hoecke); visualization, P.M.; validation, P.M.; supervision, B.V. and S.V.H. (Sofie Van Hoecke); project administration, S.D., B.V. and S.V.H. (Sofie Van Hoecke); funding acquisition, S.D., B.V. and S.V.H. (Sofie Van Hoecke) All authors have read and agreed to the published version of the manuscript. This research received no external funding. The authors declare no conflict of interest. The funders had no role in the design of the study; in the collection, analyses, or interpretation of data; in the writing of the manuscript, or in the decision to publish the results. The following abbreviations are used in this manuscript: APIApplication Programming InterfaceCMCorrective MaintenanceCPSCyber-Physical SystemDHCPDynamic Host Configuration ProtocolDLNADigital Living Network AllicanceDNSDomain Name SystemDNS-SDDNS Service DiscoveryEYEEuler Yet another proof EngineGUIGraphical User InterfaceHTTPHyperText Transfer ProtocolIEEEInstitute of Electrical and Electronics EngineersIIoTIndustrial Internet of ThingsIPInternet ProtocolIoTInternet of ThingsJSONJavaScript Object NotationJSON-LDJSON for Linked DataKPIKey Performance IndicatorLANLocal Area NetworkLoRaWANLong Range Wide Area NetworkmDNSmulticast DNSMSAMicroservice-based ArchitectureNGSINext Generation Service InterfacePaaSPlatform as a ServicePdMPredictive MaintenancePHMPrognostics and Health ManagmeentPMPreventive MaintenanceRESTREpresentational State TransferRULRemaining Useful LifeSMMSmart Machine MaintenanceSQLStructured Query LanguageSSEServer-Sent EventsTCPTransmission Control ProtocolUPnPUniversal Plug and PlayURLUniform Resource LocatorVNOVirtual Network Operator ![Presented scalable Industrial Internet of Things architecture.](sensors-20-04308-g001){#sensors-20-04308-f001} ![One of the seven setups that is used to accelerate the lifetime of bearings and allows to acquire data during the accumulation of operational bearing faults until end-of-life. Reprinted from IFAC-PapersOnLine, 52, Ooijevaar, T., et al., "Smart Machine Maintenance Enabled by a Condition Monitoring Living Lab", 376--381, 2019, with permission from Elsevier.](sensors-20-04308-g002){#sensors-20-04308-f002} ![Obelisk architecture. Combined, the blue and orange components form the Public API for the stakeholders (users and connected devices), accessible through the load balancer. The arrows indicate dependencies between the different components.](sensors-20-04308-g003){#sensors-20-04308-f003} ![Dynamic Dashboard architecture. The orange components are core services within the dynamic dashboard, the blue components are provided by the platform tier, here Obelisk, and the green components are Web Things in the edge tier exposed according to the Web Thing Model.](sensors-20-04308-g004){#sensors-20-04308-f004} ![Visualization within the dynamic dashboard application of KPIs from Setup 3 in the Smart Maintenance Living Lab as listed in [Table 1](#sensors-20-04308-t001){ref-type="table"}.](sensors-20-04308-g005){#sensors-20-04308-f005} sensors-20-04308-t001_Table 1 ###### Overview of the measurements captured at the edge tier and features calculated by the edge data processor to reduce the volume of raw measurement data. Feature Description ---------------------------- ----------------------------------------- **Raw measurements** load Load on the bearing rpm Rotation speed of the shaft temp.env Ambient temperature temp.housing Temperature at bearing housing **Statistical features** acc.RMS Root Mean Square of acceleration signal acc.kurtosis Kurtosis of the acceleration signal acc.peak Peak of the acceleration signal **Bearing fault features** acc.BDF Bearing Defect Frequency acc.BPFI Ball Pass Frequency of Inner ring acc.BPFO Ball Pass Frequency of Outer ring sensors-20-04308-t002_Table 2 ###### The Web API endpoints that a Web Thing RESTful API must provide to make it compliant with the Web Thing Model. Endpoint Description --------------------------------------- -------------------------------------------------------------------------------------------------------------------------------------------- {wt} The root resource URL. {wt}/model The model description of the Web Thing. {wt}/properties The list of available properties directly exposed by the Web Thing. {wt}/properties/{propertyId} The details of a specific property. {wt}/actions The list of available actions, in case the Web Thing can control actuators, e.g., can adjust rotation speed. {wt}/actions/{actionId} The details of a specific action. {wt}/actions/{actionId}/{executionId} Execution of a specific action. {wt}/things Lists additional Web Things that the Web Thing exposes when functioning as a gateway. {wt}/things/{thingId} A specific Web Thing exposed by the current Web Thing. {wt}/subscriptions The list of subscriptions to actions or properties, by clients that want to be notified when the state of this action or property changes.
Mid
[ 0.655086848635235, 33, 17.375 ]
<% if(shout.errors) { %> <p class="error"> <%h errors(shout).join('</p><p class="error">') %> </p> <% } %> <% if(flash['success']) { %> <p class="success"><%= flash['success'] %></p> <% } %> <ul> <% shouts.forEach(function(shout) { %> <li> <div class="meta"> <img src="http://www.gravatar.com/avatar/<%= shout.mailHash() %>" alt="Gravatar" /> <p><%= shout.name() %></p> </div> <div class="shout"> <p><%= shout.message() %></p> </div> </li> <% }); %> </ul> <form action="/" method="post"> <h2>Shout!</h2> <div class="fname"> <label for="name"><p>Name:</p></label> <input type="text" name="shout.name" value="<%= shout.name() %>" size="20" /> </div> <div class="femail"> <label for="email"><p>Email:</p></label> <input type="text" name="shout.email" value="<%= shout.email() %>" size="20" /> </div> <textarea name="shout.message" rows="5" cols="40"><%= shout.message() %></textarea> <p><input type="submit" value="Submit" /></p> </form>
Mid
[ 0.580912863070539, 35, 25.25 ]
INDIANAPOLIS — Coach Chuck Pagano began giving out the links of a chain before the first game of the Indianapolis Colts’ season. It was before they had reason to think he was doing anything more than trying to make a metaphor real, to bind a team of youngsters and castoffs, a few remaining veterans and those imported to be part of what Pagano refused to call a rebuilding but instead labeled a renovation. As he handed a link to each player, Pagano delivered his message. “He said you could be the last one, you could be the first one, but don’t be the missing one,” defensive end Cory Redding said. “Everybody on that team, when new guys came in, they got a link. We needed everybody to stay strong.” The players still have their links. Redding’s is on a chain. Safety Tom Zbikowski keeps his in his bag. Punter Pat McAfee’s is with his car keys. But on that late summer night, Pagano did not account for one link, the one he became a few weeks later: unseen, but strong enough to keep the team he had bound since spring workouts from failing when everything around it seemed to be falling apart. The giant inflatable Colts player that welcomed Pagano back to work after his nearly three-month leave for leukemia treatment was gone from the team headquarters’ snow-covered lawn last week. The only reminders of Pagano’s ordeal are a small Chuckstrong sign in a locker room, the tiny orange stickers with his initials on each players’ nameplate, the hair on his head that is slowly growing back and the streams of text messages he sent from the hospital, late at night or in the middle of games, advising his players to take shorter steps on a punt or cursing them for allowing so many rushing yards. Pagano, coaching in absentia after his treatment began during the fourth week of the season, guided one of the most inspiring performances in an N.F.L. season; almost everyone but the Colts says they overachieved. The Colts won seven games with second-half comebacks from a tie or deficit, and it seems fitting that their season will come full circle in Baltimore, where Pagano was the defensive coordinator last season and where the Colts will play the Ravens on Sunday in an A.F.C. wild-card game. “Guys had talked about it from Day 1, when we all got together in the off-season, we laid out our goals and expectations,” Pagano said in an interview last week. “We said just because of all the turnover and change, this guy is gone, that guy’s gone, we weren’t going to let anything determine the outcome of our season and how we played the game. So sitting back and watching, starting with the Green Bay game, all they knew was 60 minutes, all you’ve got, one play at a time. Don’t look at the scoreboard, don’t judge, just play hard. And expect something really good to happen when you do that.” In Week 5, the Packers game was the first of the Colts’ comeback victories and the first game that Pagano watched from a distance. That made him feel powerless, despite the dry-erase board with the depth chart hung in his hospital room, despite the iPad the team loaded with practice film. Even before Pagano’s illness, the Colts were the longest shot in the league. Their wrenching separation from Peyton Manning last March, after a two-win season that cost Jim Caldwell and Bill Polian their jobs, dominated the headlines while their remaking of the roster flew under the radar. When the Colts take the field against the Ravens, only 17 players on the 53-man roster will have been with the team last season. (Eight additional players on injured reserve were with the Colts in 2011.) Image Deji Karim, who last month was working as a parking attendant, went 101 yards on a kickoff in Week 17 for the Colts.CreditAj Mast/Associated Press Among the new players is Jerrell Freeman, one of the league’s most productive linebackers, who was General Manager Ryan Grigson’s first signee. Freeman is an alumnus of the University of Mary Hardin-Baylor, which was a Texas women’s college until 1971 and played its first football game in 1998, and the Canadian Football League. A more recent addition is kickoff returner Deji Karim, who was working a month ago as a hotel parking attendant in Oklahoma City. Twenty-eight Colts will be making their first playoff appearance, including 14 rookies or first-year players, and as many as five rookies could start on offense on Sunday. It fell to the offensive coordinator, Bruce Arians, to hold them together during Pagano’s absence. Practice times and routines were not altered. Pagano made a point of staying in touch with his players. Redding said he received this text at halftime of a game: “If you read this at halftime, set the freaking edge.” McAfee said he had so many conversations and exchanged so many texts with Pagano that he wondered: “Don’t you have something you should be doing? Shouldn’t you be beating leukemia right now?” Arians talked to Pagano almost every morning, then delivered Pagano’s message to the team. Redding said it was almost as if Pagano were using sign language with Arians as his interpreter. “B. A. has been around football a long time,” quarterback Andrew Luck said. “He’s seen most everything and knows how to handle situations. I think he understood what Chuck’s message was so well, it seemed seamless to us that he could continue that message. It wasn’t an abrupt change. It sort of felt like Chuck was never gone, almost. It was interesting to see him on the sideline again — oh, my gosh, that is Coach. I guess it is back to the routine.” Pagano would like that. He wants to stop talking about his illness: the diagnosis, the chemotherapy, the migraines and the night sweats. Reviewing it when he returned, before the final regular-season game, was emotionally exhausting. The pregame ceremony to welcome him back produced sustained applause from the Houston Texans and almost brought Pagano to tears. Now he is ready to get back to something closer to normal, to return to the thrilling mundanity of preparing for a playoff game. In the rush to return to work, Pagano, whose plight had motivated the Colts, allowed himself to wonder if his presence might upset their balance. But for the Colts, it has become impossible to separate inspiration from maturation. “I think camaraderie is something that is overlooked a lot,” McAfee said. “Chuck’s big thing at the start of the year was, ‘We’ve got to become a team, a family.’ It was like our dad getting sick, so we all had to rally together for something that was bigger than us. It really brought our team together, especially for a young team that doesn’t know much about each other.” When his leukemia, a treatable form, was diagnosed, Pagano asked his doctor for the odds and the game plan for his care. When he got to work last Monday, Pagano said, his world was back to normal. His doctors cautioned him not to overdo it, but Pagano re-immersed himself immediately in the details of coaching, getting the update on the weather and the grass conditions for practice, then bounding around in the bitter cold to take it all in. “It’s almost surreal,” Pagano said. “When you’re going through it, the days are long. Three months later, you sit back, and I’ve had time to reflect with my wife and family, and it’s almost like, ‘Did we actually just go through what we went through?’ “I said there was never a doubt I would beat this and be back with my team. I didn’t know when that would be, but I’d be back. I told them there was never a doubt in my mind ever since we got together that this team could accomplish anything they set their minds to accomplish. When you have a faith and belief in something and you come together the way this team has come together as a family, the sky’s the limit. There was never a doubt I would beat my illness, and never a doubt whether you were down one score, two scores, all the comebacks we had, never a doubt you guys could get it done.” Pagano got it done, too. During the months he was sick, the chain did not break. He was not the missing link. A version of this article appears in print on , Section SP, Page 2 of the New York edition with the headline: In an Emotional, Rebuilding Season, the Colts Never Broke. Order Reprints | Today’s Paper | Subscribe
High
[ 0.6632390745501281, 32.25, 16.375 ]
How to Vape Weed – Beginners Guide How to Vape Weed – Beginners Guide Vaping has become one of the most popular ways to consume not just nicotine, but weed as well. There are numerous benefits that come with vaping. For example, when you vape weed it lowers the risks associated with smoking tremendously. It is also rather discreet and affords you a lot of much- needed privacy. But for beginners, vaping can be something of a challenge. There is a lot of jargon and understanding the working mechanism of the vaporizer can be difficult at times. So, what exactly is vaping and how do you go about it? Read on to find out. What is Vaping? Vaping refers to inhaling a drug in the form of vapor-like smoke from an electric device. You can inhale a wide variety of drugs, but two of the most common ones are nicotine and marijuana. Usually the electric device you use contains a vape juice, which is a liquid that contains the drug immersed in a solvent. For more information on vape juices, be sure to visit the Canada E-Juice Inc. website. Why Should You Vape? One of the best things about vaping is that it significantly lowers your exposure to many drug-related illnesses. This is because with vaping, you only consume the compounds that give you the high that you need. The same can hardly be said of smoking. When you smoke, you inhale myriad compounds some of which can cause serious harm to your health. Research shows that the carcinogenic substances found in weed blunts are not found in the extract, and this is all the proof you need of how much safer vaping is. Additionally, vaping offers you a lot of discretion. With vaping, you don’t have to worry about the conspicuous smell of weed at all. Moreover, the vape pen and other e- cigarettes aren’t automatically recognizable for what they are, and this can save you a lot of unwanted attention. You can in fact comfortably vape in a public space and people won’t be any the wiser about what you are doing. Another benefit of vaping is that it is a cost-effective way to get really high. Although buying the device can be costly at first, it will end up saving you a lot of money over the long haul. With vaping, you get high using much less of the substance than you do when you smoke blunts. How Does Vaping Work? The working mechanism of a vaporizer is not nearly as complicated as you may imagine it to be. With vape pens specifically, there is the plant component dissolved in oil and there is the heating element. The battery is also an important component of the device. When you turn it on, the heating element heats up the plant material thus releasing the vapor which you then go ahead to inhale. Others heat up the weed directly using a hot surface which then releases the cannabinoids you want to inhale. How to Vape Before you vape, you first need to ensure that the battery of your pen is fully charged. You will then fill up the vape cartridge with an oil of your choice. After that, all you need is to turn it on and then enjoy your weed. However, it is important to read the manufacturer’s instructions on how to turn the device on since they are not all the same. There are those that are turned on by the push of a button and others are activated as soon as you start puffing. Also, take care to use only the recommended type of oil and product. What Kind of High Will You Get? The kind of high you get is determined by a number of factors. First, what kind of weed strain are you using? How much of it have you inhaled? What are your tolerance levels? As a beginner, you can expect to get a long-lasting high; it could last anywhere between one and four hours. If you use edibles, the high will be much stronger and last for a lot longer. It could even last for more than 12 hours! This is why it is not advisable for beginners to try edibles. Conclusion Vaping is not as complicated as you may think. With such simple devices as e-cigarettes and vape pens, you should not have difficulties vaping even as a beginner. Be sure to follow the manufacturer’s instructions before you start vaping and start slow. As you get the hang of it, you can advance to more complex devices.
Mid
[ 0.5462012320328541, 33.25, 27.625 ]
Fibro wanted pizza for dinner. I wanted to be 10 pounds thinner. But I saw the hunger in his black eyes, So I softened and I compromised. “For me, order a salad Caesar, But remember this when we’re old geezers: When your arteries have turned to glue I will not take care of you. So think twice before you eat that slice. Instead eat barley, wheat, and rice.” But Fibro just laughed and said, “Life without pizza? I’d rather be dead.”
Mid
[ 0.5418502202643171, 30.75, 26 ]
Dolphins agreed to terms with DE Charles Grant on a two-year contract.Grant, 32, lands in a 3-4 defense for the first time of his career. At about 6-foot-3 and 290 pounds, he has plenty of size to play in the scheme. The contract, however, likely isn't guaranteed. Look for Grant to battle Marques Douglas for one roster spot in an attempt to "replace" Phillip Merling. Ireland and the Dolphins signed their third defensive lineman in five days late Monday night, agreeing to a two-year, $4.5 million contract with nine-year veteran Charles Grant, according to NFL.com. An e-mail from Grant’s agent seeking confirmation was not immediately returned Monday night. Grant, a 2002 first-round pick, played his first eight years with the New Orleans Saints, though he did not play in last February’s Super Bowl because of injury. He has 47 career sacks, including 5.5 last year, with 16 career forced fumbles. Grant started all 16 games last year before suffering a season-ending triceps injury in the 2009 season finale. The Saints cut him on March 5, and he had been selected by the Omaha Nighthawks of the UFL. The Saints deemed him expendable after signing Alex Brown and re-signing Bobby McCray this offseason. Grant, 31, also has a four-game suspension looming over his head stemming from a positive drug test in 2008. His suspension was put on hiatus while two players from the Minnesota Vikings filed a lawsuit against the producer of a supplement which caused the positive tests. The Dolphins also signed nose tackle Montavious Stanley and defensive end Marques Douglas in the past five days, following the retirement of Jason Ferguson and season-ending injury suffered by Phillip Merling. Interesting. I was thinking about this scenario a few days ago, but didn't really think it was a possibility. Not sure how Grant fits in a 34 D...I guess against the Patriots in nickel type situations he could be a good DE, because not only does he have some pass rush ability but with that body he'd be good to counter NE's draw's out of the shot gun and such?
Mid
[ 0.554865424430641, 33.5, 26.875 ]
{ "type": "bundle", "id": "bundle--2d18d50c-b301-44f2-aa05-3c402bef6b53", "spec_version": "2.0", "objects": [ { "id": "relationship--1f764874-0e08-4799-9487-a9e12c499c13", "created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5", "description": "[FIN6](https://attack.mitre.org/groups/G0037) has also used scripting to iterate through a list of compromised PoS systems, copy data to a log file, and remove the original data files.(Citation: FireEye FIN6 April 2016)(Citation: FireEye FIN6 Apr 2019)", "object_marking_refs": [ "marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" ], "external_references": [ { "url": "https://www2.fireeye.com/rs/848-DID-242/images/rpt-fin6.pdf", "description": "FireEye Threat Intelligence. (2016, April). Follow the Money: Dissecting the Operations of the Cyber Crime Group FIN6. Retrieved June 1, 2016.", "source_name": "FireEye FIN6 April 2016" }, { "description": "McKeague, B. et al. (2019, April 5). Pick-Six: Intercepting a FIN6 Intrusion, an Actor Recently Tied to Ryuk and LockerGoga Ransomware. Retrieved April 17, 2019.", "url": "https://www.fireeye.com/blog/threat-research/2019/04/pick-six-intercepting-a-fin6-intrusion.html", "source_name": "FireEye FIN6 Apr 2019" } ], "source_ref": "intrusion-set--2a7914cf-dff3-428d-ab0f-1014d1c28aeb", "relationship_type": "uses", "target_ref": "attack-pattern--7385dfaf-6886-4229-9ecd-6fd678040830", "type": "relationship", "modified": "2020-03-17T18:57:26.400Z", "created": "2017-05-31T21:33:27.071Z" } ] }
Mid
[ 0.6554216867469881, 34, 17.875 ]
Zeroth-order logic Zeroth-order logic is first-order logic without variables or quantifiers. Some authors use the phrase "zeroth-order logic" as a synonym for the propositional calculus, but an alternative definition extends propositional logic by adding constants, operations, and relations on non-Boolean values. Every zeroth-order language in this broader sense is complete and compact. References Category:Propositional calculus Category:Systems of formal logic
High
[ 0.711907810499359, 34.75, 14.0625 ]
Studies on the synthesis and biological activities of 4'-(R)-hydroxy-5'-(S)-hydroxymethyl-tetrahydrofuranyl purines and pyrimidines. A series of 4'-(R)-hydroxy-5'-(S)-hydroxymethyl-tetrahydrofuranyl purines and pyrimidines were synthesized by the reaction of 3,4-epoxy-5-(S,trans)-dimethoxymethyl-tetrahydrofuran and nucleobases under the catalysis of potassium tert-butoxide and 18-crown-6. Compounds 6a, 6c and 7b have shown significant inhibition on the growth of HL-60 cells. The phosphotriester and phosphodiester of isonucleoside 8a-d were synthesized and cytotoxic activities were reported. The conformation of isonucleosides in solution was studied by 1H NMR.
High
[ 0.686149936467598, 33.75, 15.4375 ]
The Spiritual Discipline of Minding Your Own Damn Business (TAW013) Episode 013 – The Spiritual Discipline of Minding Your Own Damn Business There’s an important spiritual practice you might be overlooking. Lots of people are. But this one little thing can bring you a lot of peace. And I know you and me both could use more inner peace. That practice? Minding your own damn business. This is a key that opens the door of spiritual growth. Show Notes Show notes will not be a transcript. At least not now. You’ll find a few key bullet points, any scriptures references, as well as any other books or resources referenced. One of the most destructive things we do for our spiritual growth is to compare ourselves to other people. Comparison feels like an accomplishment, since it allows us to highlight how we’re doing well in comparison to other people, but it distracts us from our own inner life and spiritual journey. So much of our frustration and unhappiness comes from our tendency to compare. Jesus restores Peter on the beach and forgives him, then he tells Peter something about his future. Peter’s first response is to point at someone else and ask, “Well, what about him?”InJohn 21:17-22 we see Peter and Jesus interacting, and Peter’s first instinct is to compare himself to someone else’s spiritual journey. Jesus’ response: “What is that to you? As for you, follow me.” This is the key to opening the door to spiritual growth. The Spiritual Practice of Minding Your Own Business When I’m focused on the journey of other people, I don’t have to do anything toward my own growth. Comparing my choices with other people feels like an accomplishment, but it keeps you from growing. You are responsible for your own journey and that is where your energy and attention should be focused “If we will closely attend to the duty of following Christ, we shall find neither heart nor time to meddle with that which does not belong to us.” – Commentary on John 21:22 Will you join my Audiobook Launch Team? I am so excited to announce that the audiobook for The Wisdom of Your Heart is finally done. The plan is to launch at the end of March. If you live online–Facebook, Twitter, or Instagram–I would LOVE to have your help getting the word out. The commitment is short — just 6 weeks through March and the first two weeks of April. I’ll provide lots of content — memes, images, videos, text — that you can share. I can’t do this alone! If The Wisdom of Your Heart has been meaningful to you, and you’re comfy online, would you be willing to help? Email me at [email protected] and you’re in. My Links Subscribe to The Apprenticeship Way on iTunes and all other podcasting apps. When you do please leave a review. Those magically help other listeners find there way here. Check out the Apprenticeship Lab Member Community. It’s $8/month. You get to participate in a small, private, positive community of people committed to spiritual growth as well as getting access to a growing library of resources for spiritual growth including 30 short videos for daily inspiration to kick off your year, and access to several online courses. This is also just a great way to help support the work I do. I don’t have a Patreon or other means for donations, so signing up for a membership is a great way to support my work in an ongoing way. Find It Policies & Legal Subscribe and get the free course Journaling for Spiritual Growth. The single most impactful spiritual practice in my life has been journaling. Subscribe and get this 6-week course, Journaling for Spiritual Growth. It’s delivered by email. Take a practical step for spiritual growth. It’s a lot easier than you think.
Mid
[ 0.6432291666666661, 30.875, 17.125 ]
Serving the public by regulating physicians and surgeons Injectable naloxone soon to be available in most pharmacies Currently, the BC Centre for Disease Control’s Toward the Heart program provides take-home naloxone kits, and firefighters are now also allowed to carry the kits. The College of Pharmacists of BC, together with the College of Physicians and Surgeons of BC, have been active proponents of making naloxone more widely available without prescription, and the federal ruling now allows the colleges to move forward with changes to provincial drug scheduling. As with any legislative change, some time is needed for implementation. Fortunately, because the College of Pharmacists of BC has been working on this for some time already, this College anticipates that naloxone will soon be available in most pharmacies. Currently in Canada, only the injectable form of naloxone is available. Due to the delivery system, it will be classified as a Schedule II drug under the Drug Scheduling Regulations for now. Similar to Tylenol No.1, it may be purchased without a prescription but will be kept behind the counter to allow opportunity for proper patient counselling.
Mid
[ 0.543897216274089, 31.75, 26.625 ]
High Commissioner of India to Bangladesh Riva Ganguly Das today handed over emergency medical supplies consisting of 1 lakh Hydroxychloroquine (HCQ) tablets and 50 thousand sterile surgical gloves to Bangladesh. Announcing this in a press release today, the High Commission of India said that the second tranche of assistance came from the Covid 19 emergency fund which was created at the initiative of Prime Minister Narendra Modi during his 15 March video conferencing with the leaders of the SAARC countries. Health Minister of Bangladesh Zahid Maleque appreciated the continued support of India in providing medical supplies, protective gear and capacity building in the fight against Covid 19. Earlier, India had provided 30 thousand surgical masks and 15 thousand head-covers to Bangladesh on 25 March in the first tranche of assistance under Covid 19 emergency fund. Following up on the video conference of Prime Minister Narendra Modi held on March 15 with SAARC leaders, two separate video conferences were held between health experts and trade representatives of SAARC nations to discuss trade facilitation and exchange of best practices on 26 March and 08 April. Taking forward India’s commitment to a collaborative approach to fight Covid-19 in the SAARC region, another training module in the form of webinars conducted by AIIMS Raipur for health professionals of SAARC nations was held between 17-21 April. It discussed Covid 19 management strategies, capacity building and knowledge sharing on best practices. A similar programme is scheduled to be held from 27 April to 6 May under the government of India's ITEC initiative. The Covid-19 Emergency Fund was announced by Prime Minister Narendra Modi in his video conference with SAARC leaders on March 15. It was setup with an initial contribution of 10 million US dollars from India.
High
[ 0.677272727272727, 37.25, 17.75 ]
Dutch Glow Buy 1 Bottle of Dutch Glow™ for $10.00 plus $7.95 S&P and get a Bonus bottle of Dutch Glow™, just pay separate $7.95 S&P. As a special Bonus, you will also get a FREE Jumbo Micro Fiber Polishing Cloth. Product Description Dutch Glow is a century old furniture polish that was created by the Amish. It cleans, polishes, and nourishes wood to reveal its natural beauty and remove years of wax build up. Don’t use silicone sprays or furniture wax which may ruin your furniture. Dutch Glow is made from all natural ingredients unlike most over the shelf products that typically contain silicone and wax. Just as mentioned in the infomercial, the chemical copanies has deceived the public to use their products. However once you start using typical wood waxes you have to keep reapplying it. Eventually you’ll have a surface that is covered with a layer of wax that attracts dirt and dust. Wax also leaves a sticky residue. But now there is a better alternative that has been widely featured on multiple TV networks and here at Dutch Glow Reviews. Made From Natural Ingredients Dutch Glow is a 100 year old formula that has been used by the Amish. These simple people have a reputation and relationship with wood furniture. Now you can use the same wood formula on your own furniture or wood surfaces without worrying about compromising it or using harsh chemicals. Benefits of using Dutch Glow Not only does Dutch Glow restore and nourish wood surfaces but it also protects it from dust and dirt. No need to constantly clean and reapply other products when you have this Amish wood formula handy. It works on any type of wood including hickory, oak, maple, teak, pine and other wood surfaces. Dutch Glow even works on painted wood surfaces. Dutch Glow effectively breaks down the layers of wax, removes smoke stains, water rings, finger prints, cooking grease and more. It also protects and restores your furniture making it look beautiful. Pros and Cons of using Dutch Glow With any product your bound to find some advantages and disadvantages. Here’s are some of the ones we’ve noticed through online reviews. PROS: This all-natural ingredients Does not contain wax or silicone so no wax build up Repels Dust and Dirt, so less cleaning It comes with two different nozzles depending on the job Works on any wood surface including painted wood surfaces 100 year old Amish wood formula Cleans, polishes and nourishes Removes wax buildup CONS: Dutch Glow is not a multi-purpose cleaner Does not repair any scratches or damaged wood Features: Reveals wood’s natural beauty Removes years of wax buildup Works on any wood (surface)… even painted Cleans, polishes, and nourishes Helps repel dust One hundred year old Amish formula HOW TO BUY DUTCH GLOW Dutch Glow is currently only offered online. Find it at the Official Dutch Glow website. Click on the “Buy Now” button at the top of the page to get the exclusive Buy 1 Get 1 FREE offer. COST Currently Dutch Glow is being sold as a special Buy 1 Get 1 FREE offer. For only $10 plus $7.95 shipping and handling you’ll get a 12 ounce bottle of Dutch Glow. Pay an additional $7.95 shipping and handling and get a second 12 ounce bottle FREE. As a special bonus you’ll also get a Jumo MIcro Fiber Polishing Cloth. Tax will apply to all NY orders. A $10 surcharge will be added to all orders from Alaska and Hawaii. CONCLUSION If you have any wood furniture, cabinets or wood surfaces then you’ll want to have Dutch Glow Amish Wood Milk in your home. You’ll be impressed by how it nourishes and restores wood surfaces back to their original beauty. You’ll also cut down on your cleaning since it repels dust and dirt. How big are the bottles ? Each bottle of Dutch Glow Natural Wood Polish weighs 12 ounces. What type of surfaces can Dutch Glow Natural Polish work on ? Dutch Glow is intended for wood surfaces. It can be used on any type of wood including oak, pine, cherry, hickory, teak, maple as well as painted wood surfaces. Does Dutch Glow contain any chemicals or waxes ? No. Dutch Glow is unlike traditional wood wax and is made from all-natural ingredients based on a century old Amish formula. How much does Dutch Glow cost ? The Dutch Glow Natural Polish is currently being offered only online as a Buy 1 Get 1 FREE offer for $10 plus $7.95 shipping and handling. That’s $17.95. Receive a second 12 ounce bottle when you pay an additional $7.95. The minimum amount you will be charged for your order is $25.90. Returns If after 30 days you’re not happy with this product you can send it back and receive a full refund less shipping and handling charges to: Dutch Glow 400 Returns Rd. Wallingford, CT 06494 1 review for "Dutch Glow" Jay – February 1, 2014: Dutch Glow is a furniture and wood polish I purchased online weeks ago. I had confidence in this product since the Amish are very dependable when it comes to wood working and I like the fact that it’s chemical free. I used it on an old wooden desk my families has had for decades in the family. I was impressed with how this wood restorer was able to bring it back to life. It didn’t leave any sticky residue when I was done using it. If you have any discolored, stained or dirty wood surface you’d like to clean then Dutch Glow is a product you can trust. Larry – February 9, 2014: I was very happy with the time it took for my order to get delivered. This stuff really works. I used Dutch Glow on an oak desk I recently purchased at an auction and it worked like a charm. N L Sorensen – February 9, 2014: Can this be used safely on laminated floors? Please advise to the safety of this product on laminated floors. Frances Penny – February 10, 2014: I ordered the Dutch Glow on 1/26 & still have not received my order. Customer Service – February 11, 2014: Yes, Dutch Glow can be used on Laminated Floors. robert keen – February 14, 2014: NO COMMENT Over 2 months since order placed in US Valerie Molinaro – February 16, 2014: What are the ingredients in this? Craig – February 19, 2014: Does this product help eliminate scratches? Patti – February 22, 2014: I’m from Ontario and there isn’t an option for Canada, how can I purchase this product? Leslie – February 22, 2014: Fantastic product! If you’re looking to restore any furniture or polish any wood surface, this product is excellent! Will definitely buy more in the future. Chris Robertson – March 6, 2014: Nice on furniture – a bit pricey, but a little goes a long way. I caution using this on floors. My wooden floors became very slick and slippery and my kids have slipped down several times since using it. I didn’t over use it, either… I cleaned the floors as usual, then sprayed a light mist and used a dust mop, section by section. It does shine them, but something in the formula created a very slippery surface; like when you overspray with furniture polish, and it gets on a wooden floor, and the floor is highly slippery. So, CAUTION about using on wooden floors. I imagine it’s just as bad on a laminate floor. rima – March 13, 2014: This stuff is total crap. Overpriced, bad product, they add things you did not order and cheat you. Marie – March 13, 2014: Tried to order this product and although the website states Canada it won’t allow me to put in a Canadian address. Linda Clarke – April 1, 2014: Can Original Dutch Glow Amish Milk be used on unfinished furniture. I stripped an antique veneered bombay dresser many years ago. It needs something to keep the wood from drying out. What will your product do for my bombay dresser? Eric – April 14, 2014: My kitchen cabinets were covered with cooking residue, and attracting dust. Ugh! This Dutch Glow product easily removed the sludge and left a smooth finish again. Nice job! d. Removes ground in grime without damaging or staining the wood. I’d purchase it again. Love the quality as well as the eco-friendly. Greg Ragle – May 24, 2014: Can this be used on a leather inlay within an old mahogany table, which has been polished many times with regular furniture polishes for wood? Also, can this product be shipped to a Canadian address? Thank you. Mike – February 10, 2015: I purchased this product only wanting one set and when I received my confirmation 5 more products were added including a $2.00 fee for web surcharge. Really! I called 5 minutes after placing the order and was told to call back the next day to change. I did just that and was told too late cannot change already processed so my $16.00 order became a $79.00 order and was told it was on its way. Be careful of the website it adds all kinds of stuff to your order and it is not right as to how they trick you into buying more. No matter how good I will not purchase this product due to the lack of customer service provided.
Mid
[ 0.596810933940774, 32.75, 22.125 ]
Interaction of N-(2-hydroxypropyl)methacrylamide based homo, random and block copolymers with primary immune cells. Polymer nanoparticles (NP), e.g., polymeric micelles, represent a promising platform for drug delivery including the field of immune modulation. In respect to this potential application, identification of chemical and structural properties that affect interaction of polymers with immune cells is an important step in their preclinical characterization. A series of well-defined, fluorescently labeled homopolymers, random as well as block copolymers based on the clinically approved N-(2-hydroxypropyl)methacrylamide (HPMA) were prepared to study the influence of polymer architecture on the interaction of polymers with primary human und murine immune cells systematically. The number average of the molar mass (M(n)) for all polymers was set to the range of 4-14 kDa with a varying ratio of hydrophilic and hydrophobic units and dispersities (D) in the range of 1.17-1.29. Cell uptake greatly depended on the polymer molecular weight and micro structure: Comparison of polymers of the same molar mass but varying ratio of hydrophilic and hydrophobic units revealed a strict dependency of cellular uptake on the size of the hydrophobic block. HPMA-ran-LMA copolymers with high amounts of lauryl side chains (15 and 20% LMA content) had highest internalization rates into human and mouse immune cells (monocytes, granulocytes, B and T cells). Our findings underline the role of particle size and composition of polymeric carriers in the field of nanomedicine.
High
[ 0.672941176470588, 35.75, 17.375 ]
--- abstract: 'We show that it is possible to remove two differential operators from the standard collection of $m$ of them used to embed the space of Jacobi forms of *odd* weight $k$ and index $m$ into several pieces of elliptic modular forms. This complements the previous work of one of the authors in the case of even weights.' address: - | Department of Mathematics\ Indian Institute of Science\ 560012, Bangalore, India. - | Department of Mathematics\ Indian Institute of Science\ 560012, Bangalore, India. author: - Soumya Das - Ritwik Pal title: 'Jacobi Forms and Differential Operators: odd weights' --- Introduction ============ Let $J_{k,m}(N)$ denote the space of Jacobi forms of weight $k$ and index $m$ for the Jacobi group $\Gamma_0(N) \ltimes \mathbb{Z}^2$ of level $N$. It is well known that certain differential operators $D_{\nu}$ ($0 \leq \nu \leq m$ for $k$ even and $1 \leq \nu \leq m-1$ for $k$ odd), first systematically studied in the monograph by Eichler-Zagier (see [@ez]), map $J_{k,m}(N)$ injectively into a direct sum of finitely many spaces of elliptic modular forms. See section \[prelim\] for a description of these objects. This result has many applications, estimating the dimension of $J_{k,m}(N)$ precisely is one of them. Moreover information about the vanishing of the kernel of $D_0$ when $k=2, m=1$ and $N$ is square–free, has a bearing on the Hashimoto’s conjecture on theta series, see [@ab1; @ab2]. When the index $m=1$, the question about $\ker D_0$, which is nothing but the restriction map from $J_{k,m}(N)$ to $M_k(N)$, the space of elliptic modular forms of weight $k$ on $\Gamma_0(N)$; defined by $\phi(\tau,z) \mapsto \phi(\tau,0)$, translates into the possibility of removing the differential operator $D_2$ while preserving injectivity. This question is also interesting in its own right, and has received some attention in the recent past, see the works [@ab1; @ab2; @das; @rs], and the introduction there. We only note here that first results along this line of investigation seems to be by J. Kramer, who gave an explicit description of $\ker D_0$ when $m = 1$ and level $N$ a prime, in terms of the vanishing order of cusp forms in a certain subspace of $S_4(N)$ (This is related to the so-called Weierstrass subspaces of $S_k(N)$, see [@ab2]). An unpublished question of S. Böcherer, inspired by the case $m=1$ as discussed above, asks for information about this phenomenon when the index in bigger than $1$. Let us recall that below. \[hy\] For $0 \leq \nu \leq m$ and $m\geq 1$, the map $i_{\nu}(k,m,N)$ defined by $$\begin{aligned} D_0 \oplus \ldots \widehat{D_{ \nu}} \ldots \oplus D_{2m} \colon & J_{k,m}(N) \\ & \xrightarrow{i_{\nu}(k,m,N)} M_{k}(N) \oplus \ldots \widehat{M_{k+ \nu}(N)} \ldots \oplus M_{k + 2m}(N),\end{aligned}$$ is **injective**; where the $\ \widehat{} \ $ signifies that the corresponding term has to be omitted. Note that it is classical (see also section \[diffsec\]) that the above map without any term omitted is an injection, so the above question asks for something stronger. This was answered relatively satisfactorily in [@das] when $k$ was even, namely that one can, under certain conditions on $m,k$, remove the last operator $D_{2m}$. **In this paper, we take up the case $k$ odd and henceforth assume this condition.** As expected, there are some subtleties in this case. First of all, it is clear that only differential operators with odd indices matter, and moreover by [@ez p. 37] it is known that the last operator $D_{2m-1}$ can be removed, since an odd Jacobi form $\phi(\tau,z)$ cannot have a more than $(2m-3)$-fold zero at $z=0$. This shows that the above **Question** in our context can be phrased as: \[hy2\] For $1 \leq \nu \leq m-1$, $m\geq 3$ with $k$ odd and keeping the above notation, the map $$\begin{aligned} J_{k,m}(N) \xrightarrow{ i_{2\nu-1}(k,m,N) } M_{k+1}(N) \oplus \ldots \widehat{M_{k+ 2\nu-1}(N) } \ldots \oplus M_{k + 2m-3}(N),\end{aligned}$$ is **injective**. Note that the right hand side of the map is empty when $m \leq 2$. The aim of this paper is to answer the above **Question’**. The method is in spirit the same as in [@das], and can be thought of as a sequel to loc. cit., even though one has to be careful about certain subtleties, as the weight is odd. For example, we encounter Wronskians of (congruent) theta functions of weight $3/2$, which seems not to be written down in the literature. Let us state the main theorem of this paper now, which essentially states that we can remove the last operator $D_{2m-3}$. \[mainthm\] Let $k\geq 3$ be an odd integer. Then 1. $i_{2m-3}(k,m,N)$ is injective for all $N \geq 1$ with $m-k \geq 4$. 2. $i_{2m-3}(k,m,N)$ is injective for $N$ square-free and $m$ odd with $m-k \geq 2$. 3. $i_{2m-3}(k,m,N)$ is injective for $N=1$ and $m$ odd with $m-k \geq 2$. We take this opportunity to note that the proof of [@das Theorem 1.2 (i)] is not correct as it is; however we stress that this does not affect any other result of the paper, moreover moreover this part of the result was already known before from [@rs]. **Acknowledgment.** The first author acknowledges financial support in parts from the UGC Centre for Advanced Studies, DST (India) and IISc, Bangalore during the completion of this work. The second named author thanks NBHM for financial support and IISc, Bangalore where this research was done. Notation and preliminaries {#prelim} ========================== $\Gamma$ will always denote the group ${SL(2, {\mathbb}Z)}$. $M_{k}(\Gamma,\chi)$ (respectively $S_{k}(\Gamma,\chi)$) denotes the space of modular forms (resp. cusp forms) of weight $k$ on $\Gamma$ with character $\chi$. More generally, the space of modular forms of weight $k$ on $\Gamma_{0}(N)$ with a multiplier system $\vartheta$ is denoted by $M_k(N,\vartheta)$. We refer the reader to [@rankin] for more details. Jacobi forms ------------ We have to recall several basic results and notations from [@das]. Let $N$, $m$ and $k$ be positive integers. We denote the space of Jacobi forms of weight $k$, index $m$, level $N$ by $J_{k,m}(N)$. If $\phi$ is a Jacobi form in $J_{k,m}(N)$, then it has the Fourier expansion $\phi(\tau,z) = \sum_{ n,r\in {\mathbf Z} \colon 4mn \geq r^2 } c_\phi(n,r) q^n \zeta^r$ and a theta expansion $$\label{thetad} \phi(\tau,z) = \sum_{\mu \bmod{2m}} h_{m,\mu}(\tau)\theta_{m,\mu}(\tau,z),$$ with $\theta_{m,\mu}(\tau,z) = \sum_{r \in \mathbf{Z}, \, {r\equiv \mu\bmod{2m}}} q^{\frac{r^2}{4m}} \zeta^r$ are the congruent theta series of weight $1/2$ and index $m$; and $h_{m,\mu}(\tau) = \sum_{n \in \mathbf{Z}, \,{n\ge {\mu}^2/4m}} c_{\phi}(n,\mu) q^{ (n-\frac {\mu^2}{4m}) }$. We use the standard notation $q := e^{2 \pi i \tau}$ ($\tau \in \mathbb H$) and $\zeta := e^{2 \pi i z}$ ($z \in \mathbb C$). ### Metaplectic Jacobi group The metaplectic Jacobi group over ${\mathbb}R$ denoted by $\widetilde{J}_{\kappa,m}$ to be ${\widetilde{SL}(2, {\mathbb}R)}\ltimes {\mathbb}R^2 \cdot {\mathbb}S^1$, where ${\widetilde{SL}(2, {\mathbb}R)}$ is the metaplectic double cover of ${SL(2, {\mathbb}R)}$, ${\mathbb}S^1$ is the circle group. Further, one can defines a certain action of $\widetilde{J}_{\kappa,m}$ on the space of holomorphic functions ${\mathbb}H \times \mathbb{C}$ for $\kappa \in \tfrac{1}{2} \mathbb{Z}$ and $m\geq 1$: $$\phi \mid_{\kappa,m} \widetilde{\xi} := s^m w(\tau)^{-2\kappa}e^{2\pi im (-\frac{c(z+\lambda\tau+\mu)^2}{c\tau +d} +\lambda^2\tau + 2\lambda z + \lambda\mu)} \phi\left(\frac{a\tau+b}{c\tau+d}, \frac{z+\lambda\tau+\mu}{c\tau+d}\right)$$ where $\widetilde{\xi} = ({\widetilde{\gamma}}, [\lambda,\mu]s)$, with $\lambda,\mu \in {\mathbb}R$, $s \in {\mathbb}S^1 $. For brevity, we denote the action of the naturally embedded subgroup ${\widetilde{SL}(2, {\mathbb}R)}$ viz. $\phi \mid_{\kappa,m} ({\widetilde{\gamma}}, [0,0]1)$ by $\phi \mid_{\kappa,m} {\widetilde{\gamma}}$. We refer the reader to [@sko] for further details. ### Vector valued modular forms {#vvmf-sec} An $n$-tuple ${\mathbf}f:= (f_1,\ldots,f_n)^t$ of holomorphic functions on ${\mathbb}H$ is called a vector valued modular form (v.v.m.f.) of weight $\kappa \in \tfrac{1}{2}{\mathbb}Z$ with respect to a representation $\rho \colon \widetilde{\Gamma} \to GL(n,{\mathbb}C)$ if $${\mathbf}f \mid_\kappa {\widetilde{\gamma}}(\tau)= \rho({\widetilde{\gamma}}) {\mathbf}f(\tau), {\quad}(\tau \in {\mathbb}H, {\widetilde{\gamma}}\in \widetilde{\Gamma}),$$ and ${\mathbf}f$ remains bounded as $\Im(\tau) \to \infty$, where $\mid_\kappa$ operation is defined component-wise on ${\mathbf}f$. Let us denote the space of such function by $\widetilde{M}(k,\rho)$. Differential operators {#diffsec} ---------------------- We recall the differential operators $D_\nu$ ($\nu \geq 0$) on $J_{k,m}(N)$ following the exposition in [@das]. Namely from the Taylor expansion $\phi(\tau,z) = \sum_{\nu \geq 0} \chi_{\nu}(\tau) \, z^{\nu}$, of $\phi \in J_{k,m}(N)$ around $z = 0$, one defines $D_{ \nu} \phi(\tau) := A_{k,\nu} \xi_{\nu} = A_{k,\nu}~\sum_{0 \leq \mu \leq \frac{\nu}{2} } \, \tfrac{ (- 2 \pi i m)^{\mu} \, (k + \nu - \mu - 2)! } {(k+2 \nu -2)! \, \mu !}\, \chi_{\nu - 2 \mu}^{(\mu)} (\tau)$, where $A_{k, \nu}$ are certain explicit constants, see e.g., [@das]. Then it is known that $ \xi_{\nu} $ is a modular form of weight $k + \nu$ for $\Gamma_0(N)$, and if $ \nu >0$, it is a cusp form. Furthermore, for all $m,N \geq 1$, the linear map defined by $\oplus_{\nu=0}^m D_{2\nu}$ from $J_{k,m}(N)$ to $M_{k}(N) \oplus_{\nu=1}^m S_{k + 2 \nu}(N)$ is injective. Setup ===== Let $\phi(\tau,z)\in J_{k,m}(N)$ and recall that $k$ is odd. This implies $\phi(\tau,z)=-\phi(\tau,-z)$ and hence from (2.4) we can write $$\phi(\tau,z)=\underset{\nu \geq 1} \sum\chi_{2\nu-1} z^{2\nu-1}.$$ The theta components $h_{\mu}$ and the theta series $\theta_{m,\mu}$ satisfy, (see [@ez]) $$h_{2m-\mu}=- h_{\mu}; {\quad}\theta_ {m,-\mu}(\tau,z)=\theta_{m,\mu}(\tau,-z) \qquad (\mu \bmod 2m).$$ In particular, $h_{0}=h_{m}=0$. So we get $\phi(\tau,z)$ equals to $$\sum_{\mu=1}^{m-1} h_{\mu}(\tau)(\theta_{m,\mu}(\tau,z)-\theta_{m,\mu}(\tau,-z))=\sum_{\mu=1}^{m-1}h_{\mu}(\tau) \big(\sum_{r\equiv\mu(\bmod{2m})} q^\frac{r^2}{4m}(\zeta^r-\zeta^{-r}) \big).$$ This implies $$\begin{split} \chi_{2\nu-1}(\tau)=&\frac{1}{(2\nu-1)!} (\partial_z )^{2\nu-1}\phi(\tau,z)\mid_{z=0}\\ =&\sum_{\mu=1}^{m-1}h_{\mu}(\tau) \sum_{r\equiv\mu(\bmod 2m)} 2 q^\frac{r^2}{4m} (2\pi ir)^{2\nu-1} =c_{\nu,m}\sum_{\mu=1}^{m-1}h_{\mu}(\tau)\theta^{{*}{(\nu-1)}}_{m,\mu}(\tau)\text{,} \end{split}$$ where $c_{\nu,m} = 2\frac{(2\pi i)^{2\nu-1}(4m)^{\nu-1}}{(2\nu-1)!}$; we have put $\theta^{*}_{m,\mu}(\tau)= \displaystyle\sum_{r\equiv\mu(\bmod 2m)}rq^\frac{r^2}{4m} $ and used the notation $\theta^{{*}{(\nu-1)}}_{m,\mu}(\tau)= (\partial_\tau)^{\nu-1}\theta^{*}_{m,\mu}(\tau)$. It is well-known that the (congruent) theta series $\theta_{m,\mu}^{*}$ ($\mu \bmod 2m$) is a cusp form of weight $\frac{3}{2}$ on $\Gamma(4m)$; see [@shimu Prop 2.1] for example. Let us put $\chi_{2\nu-1}^{*} = \frac {\chi_{2\nu-1}}{c_{\nu,m}}$. From the above, we get a system of equations connecting $(h_{\mu})_\mu$ and $ (\chi_{2\nu-1}^{*})_\nu$: $$\label{mat} \begin{array}{ccccc} \left[\begin{array}{cccc} \theta^*_{m,1} & \theta^*_{m,2} & \dots & \theta^*_{m,m-1}\\ \vdots & \vdots & \vdots & \vdots\\ \theta^{*(v-1)}_{m,1} & \theta^{*(v-1)}_{m,2} & \dots & \theta^{*(v-1)}_{m,m-1}\\ \vdots & \vdots & \vdots & \vdots\\ \theta^{*(m-2)}_{m,1} & \theta^{*(m-2)}_{m,2} & \dots & \theta^{*(m-2)}_{m,m-1}\\ \end{array}\right] & . & \left[\begin{array}{c} h_1 \\ h_2 \\ \vdots \\ h_\nu \\ \vdots \\ h_{m-1} \end{array}\right] & = & \left[\begin{array}{c} \chi_{1}^{*} \\\chi_{3}^{*} \\ \vdots \\ \chi_{2\nu-1}^{*} \\ \vdots \\ \chi_{2m-3}^{*} \end{array}\right] \end{array}.$$ \[F\] $F:=(\theta^{*}_{m,1},...,\theta^{*}_{m,m-1}) \in \widetilde{M}(\frac{3}{2},\rho_{m}) $ for some representation $ \rho_{m}$. We know that the tuple $ (\theta_{m,1}(\tau,z),\theta_{m,2}(\tau,z),...,\theta_{m,2m}(\tau,z))$ is a v.v.m.f. with respect to a representation $\widetilde{\epsilon}$ of $\widetilde{\Gamma}$. Thus there exists $D_{m}(\widetilde{\epsilon}) \in GL_{n} (\mathbb{C})$ such that we get (see [@sko]) $$(\theta_{m,1}\mid_{\frac{1}{2}}\widetilde{\epsilon}, \theta_{m,2}\mid_{\frac{1}{2}}\widetilde{\epsilon}, \dots , \theta_{m,2m}\mid_{\frac{1}{2}}\widetilde{\epsilon})^t =D_m(\widetilde{\epsilon})\hspace{0.2cm} (\theta_{m,1} , \theta_{m,2} , \dots , \theta_{m,2m})^t,$$ where $A^{t}$ is the transpose of $A$. Hence for $\mu, v \bmod{2m}$, there exist $c_{v,\mu} \in \mathbb{C}$ such that $$\label{slt} \theta_{m,\mu}(\tau,z)\mid_{\frac{1}{2}}\widetilde{\epsilon}= \sum_ {v\;mod\; 2m}c_{v,\mu} \theta_{m,v}(\tau,z).$$ Replacing $z$ by $-z$ in and then subtracting from we get $$\label{thtil} \widetilde{\theta}_{m,\mu}(\tau,z)\mid_{\frac{1}{2}}\widetilde{\epsilon}= \sum_ {v\; mod\; 2m}c_{v,\mu}\widetilde{ \theta}_{m,v}(\tau,z),$$ where we have put $\widetilde{\theta}_{m,\mu}(\tau,z)=\theta_{m,\mu}(\tau,z)-\theta_{m,\mu}(\tau,-z).$ Let $\widetilde{\epsilon} = (\left( \begin{smallmatrix} a & b \\c & d \end{smallmatrix} \right), w(\tau))\in \widetilde{\Gamma}. $ Now recall that $$\widetilde\theta_{m,\mu}(\tau,z)\mid_{\frac{1}{2}} \widetilde{\epsilon}= w^{-1}(\tau) e( \frac{-mcz^2}{c\tau+d})\;\widetilde\theta_{m,\mu}(\frac{a\tau+b}{c\tau+d},\frac{z}{c\tau+d} ),$$ so that by differentiation, $$\frac{\partial}{\partial z}(\widetilde\theta_{m,\mu}(\tau,z))\mid_{\frac{1}{2}} \widetilde{\epsilon})\mid_{z=0}=w^{-3}(\tau) \ \theta_{m,\mu}^{*}(\frac{a\tau+b}{c\tau+d})=\theta_{m,\mu}^{*}(\tau)\mid_{\frac{3}{2}} \widetilde{\epsilon}.$$ Since $\frac{\partial}{\partial z} (\widetilde{\theta}_{m,\mu}(\tau,z))\mid_{z=0}=\theta_{m,\mu}^{*}$, by using we get $$\theta_{m,\mu}^{*}(\tau)\mid_{\frac{3}{2}} \widetilde{\epsilon}=\displaystyle\sum_{v\; mod\; 2m} c_{v,\mu}\ \theta_{m,v}^{*}(\tau).$$ Note that $\theta_{m,0}^{*}(\tau)= \theta_{m,m}^{*}(\tau)=0$ and $\theta_{m,\mu}^{*}(\tau)= -\theta_{m,-\mu}^{*}(\tau)$. Hence $$\theta_{m,\mu}^{*}(\tau)\mid_{\frac{3}{2}} \widetilde{\epsilon}= \displaystyle\sum_{v=1}^{m-1}(c_{v,\mu}-c_{2m-v,\mu})\theta_{m,v}^{*}(\tau)\quad\text{ for all }\mu \in \{1,2,...,m-1\}.$$ The lemma then follows from [@das Prop 3.1]. Let $\mathcal{W}$ denote the matrix of theta-derivatives appearing in equation . It is crucial for us to find a formula for $\det\mathcal{W}$ (i.e. the Wronskian of $(\theta_{m,1}^{*},...,\theta_{m,m-1}^{*})$). At this point, following [@das], we introduce the differential operator $\mathbb{D}_\kappa$, sometimes referred to as ‘modular derivative’. Namely for $f$ holomorphic on $\mathbb{H}$ and $ E_{2} = 1-24\sum_{n=1}^{\infty}\sigma_{1}(n)q^{n} $, the weight 2 quasimodular Eisentein series, we define for $\kappa \in \frac{1}{2} \mathbb{Z}$ the operator $$\mathbb{D}_{\kappa} f := q\frac{d}{dq}-\frac{\kappa}{12} E_{2}f.$$ The operator $\mathbb{D}_{\kappa}$ enjoys the following equivariance property under $\widetilde{\Gamma}$: $$\mathbb{D}_{\kappa} (f\mid_{\kappa} \widetilde{\gamma})=(\mathbb{D}_{\kappa} f)\mid_{\kappa+2}\widetilde{\gamma}\quad\text{for all}\; \;\widetilde{\gamma} \in \widetilde{\Gamma},$$ which shows that the operator $\mathbb{D}_{\kappa}$ can be iterated; and setting $$\mathbb{D}^{n}=\mathbb{D}_{\kappa}^ {n}=\mathbb{D}_{\kappa+2n-2}\circ...\mathbb{D}_{\kappa+2}\circ\mathbb{D}_\kappa,$$ we have the equivariance property (see [@das p. 358]) $$\label{moduD} \mathbb{D}_{\kappa}^{n} (f\mid_{\kappa}\widetilde{\gamma})=(\mathbb{D}_{\kappa}^{n} f)\mid_{\kappa+2n}\widetilde{\gamma} \quad\text{for all} \; \widetilde{\gamma} \in \widetilde{\Gamma}.$$ The following lemma is an immediate consequence of . We omit the proof. \[dj\] With $F$ defined as in [Lemma \[F\]]{}, for any $ j \in \mathbb{N}$ and $F\in \widetilde{M}(\frac{3}{2},\rho_{m}) $, $\mathbb{D}^{j} F \in \widetilde{M}(\frac{3}{2}+2j,\rho_{m})$. Now let us define the ‘modular Wronskian’ $W(F)$ of $F$ given by $$W(F) := \det(F,\mathbb{D}F,\mathbb{D}^{2}F,...,\mathbb{D}^{m-2}F).$$ Using the fact $q\frac{d}{dq}= \frac{1}{2\pi i}\frac{d}{d\tau}$, it is straightforward to prove the following by using column operations on $\mathcal{W}$ that $$W(F)=q^{\frac{(m-1)(m-2)}{2}}\det\left(\frac{d\theta_{m,\mu}^{*(j-1)}}{dq^{(j-1)}}\right)_{\mu,j}=c\cdot\det\left(\frac{d\theta_{m,\mu}^{*(j-1)}}{d\tau^{(j-1)}}\right)_{\mu,j}=c\cdot\det\mathcal{W}$$ where $\mu,j$ vary in $[1,m-1]$ and $c \in \mathbb{C}^*={\mathbb}{C} - \{0\}$. The following lemma is straightforward and we omit the proof (see [@mason] for the case of the modular group). \[detf\] If $F_{i}=(f_{i1},f_{i2},...,f_{ip}) \in\widetilde{M} (k_{i},\rho)$ then $ \det(f_{ij})_{1\leq i,j \leq p} \in \widetilde{M}(k,\det\rho)$, where $k=k_{1}+k_{2}+...+k_{p}$. If $f$ is a non-zero holomorphic function on $\mathbb{H}$, we define ${\mathrm}{ord}_\infty f$ to be the power of $q$ in the first non-zero term of the $q$-expansion of $f$. $W^{2}(F)= c_{1}^{2}\cdot q^{\frac{(m-1)(2m-1)}{12}}+ \ldots \text{higher powers}$. Here $c_{1}=\text{c}\cdot(m-1)!\cdot V(\frac{1^2}{4m},\frac{2^2}{4m},...,\frac{(m-1)^2}{4m})$ and $ V(a_{1},a_{2},...,a_{n})$ denotes the Vandermonde determinant of quantities ${a_{1},a_{2},...a_{n}}$. As $W(F)=c\cdot \det\mathcal{W}$, we get ${\mathrm}{ord}_\infty W(F)= {\mathrm}{ord}_\infty \det\mathcal{W}$. Clearly the first non-zero coefficient in the $q-$expansion of $\det \mathcal{W}$ is the determinant of the first non-zero coefficients of all entries of $\mathcal{W}$. From this we get the first non-zero coefficient of $\det\mathcal{W}$ to be $(m-1)!\cdot V(\frac{1^2}{4m},\frac{2^2}{4m}, \ldots ,\frac{(m-1)^2}{4m})$. Now the order at $\infty$ of each element in the $\mu$-th column of $\mathcal{W}$ is $\frac{\mu^{2}}{4m}$. Therefore one has ${\mathrm}{ord}_\infty \det\mathcal{W}=\sum_{\mu={1}}^{m-1}\frac{\mu^{2}}{4m}={\mathrm}{ord}_\infty W(F)$, and equivalently ${\mathrm}{ord}_\infty W^{2}(F)= 2\cdot\sum_{\mu=1}^{m-1}\frac{\mu^{2}}{4m}=\frac{(m-1)(2m-1)}{12}$. Automorphy of the Wronskian {#xi} --------------------------- In this subsection we prove that $W(F)$ is a certain integral power of the Dedekind-$\eta$ function. Whereas this property was known in the classical case by a result of J. Kramer [@kr2], and was invoked in [@das], we have to work it out, and the method should apply to the classical theta functions as well. —**A character of $\Gamma$**. We now introduce a particular character of $\Gamma$, which will essentially allow us to replace $\widetilde{\Gamma}$ by $\Gamma$. Consider the following commutative diagram: $$\label{xi} \begin{CD} \widetilde{\Gamma} @>\pi>> \Gamma \\ @V(\det\rho_{m})^{2} VV @VV \xi V \\ \mathbb{C}^* @>id>> \mathbb{C}^* , \end{CD}$$ where $\pi$ is the projection map and we define $\xi:\Gamma\rightarrow \mathbb{C}^{*}$ so that the above diagram commutes. In fact let us put $\xi(\gamma) := (\det\rho_{m})^{2}(\pi^{-1} (\gamma))$, so that we just have to check that $\xi$ is well-defined. This is true because $(\det\rho_{m})^{2}$ is clearly trivial on $\ker(\pi)=\langle \widetilde{S}^{4} \rangle $, where $\widetilde{S}^{4}=(\left( \begin{smallmatrix} 1 & 0 \\0 & 1 \end{smallmatrix} \right),-1)$. To proceed further we need more information about the character $\xi$ of $\Gamma$. This is obtained from the following lemmas. With $\rho_{m}$ as in [Lemma \[F\]]{}, one has, $$\rho_{m}(\widetilde{T})= \mathrm{diag} \left(e(\frac{1^{2}}{4m}), e(\frac{2^{2}}{4m}),...,e(\frac{(m-1)^{2}}{4m}) \right).$$ It is clear from the definition of $\theta_{m,\mu}^{*}$ that, $\theta_{m,\mu}^{*}(\tau+1)=e(\frac{\mu^{2}}{4m})\cdot\theta_{m,\mu}^{*}(\tau)$. Now $\rho_{m}(\widetilde{T})F(\tau)=F\mid_{\frac{3}{2}}\widetilde{T}=F(\tau+1)=\mathrm{diag}(e(\frac{1^{2}}{4m}), e(\frac{2^{2}}{4m}),...,e(\frac{(m-1)^{2}}{4m}))F(\tau)$. The $q-$expansions of the $\theta_{m,\mu}^{*}$’s clearly show that they are linearly independent. Thus the lemma follows. Let us now recall that the quotient of $\Gamma$ by its commutator subgroup $[\Gamma, \Gamma]$ is cyclic of order $12$ and is generated by (the image of) $T$. The group of characters $\widehat{\Gamma / [\Gamma, \Gamma]}$ is also cyclic and $\widehat{\Gamma / [\Gamma, \Gamma]}=\widehat{\Gamma}$. We denote the canonical generator of $\widehat{\Gamma}$ by $\delta$, uniquely characterised by $\delta(T)=e(\frac{1}{12})$ (see e.g., [@mason p. 380]). [\[xidelta\]]{} With the above notation, $ \xi =\delta^{(m-1)(2m-1)}$. From Lemma (3.6) we get $\det\rho_{m}(\widetilde{T})=e(\sum_{\mu=1}^{m-1}\frac{\mu^{2}}{4m})$. This implies that $\xi(T)=e(\frac{(m-1)(2m-1)}{12}) = \delta^{(m-1)(2m-1)}(T)$. Therefore, $ \xi =\delta^{(m-1)(2m-1)}$. $W^{2}(F)\in M_{(m-1)(2m-1)}(\Gamma,\delta^{(m-1)(2m-1)})$. From [Lemma \[dj\]]{} and [Lemma \[detf\]]{} we conclude that $W(F)\in M((m-1)(m-\frac{1}{2}), \det\rho_{m})$. From the definition of $\xi$ in it then follows that $ W^{2}(F)\in M_{(m-1)(2m-1)}(\Gamma,\xi)$. Finally [Lemma \[xidelta\]]{} completes the proof. \[propimp\] $W(F)=c_{2}\cdot\eta^{(m-1)(2m-1)}$, where $\eta=q^{\frac{1}{24}}\cdot\prod_{n=1}^{\infty}(1-q^{n})$ and $c_2 \in \mathbb{C}^{*}$. We know that $\eta^{2(m-1)(2m-1)}\in S_{(m-1)(2m-1)}(\Gamma,\delta^{(m-1)(2m-1)})$ and $$\eta^{2(m-1)(2m-1)}=q^{\frac{(m-1)(2m-1)}{12}}+\ldots \text{higher powers} \quad (\text{see \cite[Thm 3.7]{mason}) }.$$ Putting $G:=W^2(F) / \eta^{2(m-1)(2m-1)}$ we get $G\in M_{0}(\Gamma,1)=\mathbb{C}$. As $W(F)$ is non-zero, $G\in \mathbb{C}^{*}$. The proposition follows. From the description of differential operators $D_{\nu}$ in terms of Taylor coefficients $\chi_{\nu}$ of $\phi$ we can easily infer that, $$\phi \in \cap_{\nu=1}^{m-2} \ker D_{2\nu-1} \iff \chi_{2\nu-1}=0\text{ for }\nu=1, 2,...,m-2.$$ Thus if $\phi$ satisfy the above condition and $(\frac{\omega_1}{\det\mathcal{W}},\frac{\omega_2}{\det\mathcal{W}},...,\frac{\omega_{m-1}}{\det\mathcal{W}})$ being the last column of the matrix $\mathcal{W}^{-1}$, we get using $$\label{omega} h_{\mu}=c_3\cdot\frac{\omega_\mu\cdot\chi_{2m-3}}{\eta^{(m-1)(2m-1)}},$$ for $\mu=1,2,...,m-1$ and some non-zero constant $c_3$. \[om\] The tuple $\Omega_{m-1}:=(\omega_1,\omega_2,...,\omega_{m-1}) \in \widetilde{M}(\frac{(m-2)(2m-3)}{2},\alpha_{m})$ for some representation $\alpha_{m}$. The proof of this proposition is rather similar to the proof of [@das Prop 3.2] with some appropriate and obvious changes, and is omitted. The weight of $\Omega_{m-1}$ can be calculated from . Proof of [Theorem \[mainthm\]]{} ================================ As in [@das], the following theorem will be useful to prove [Theorem \[mainthm\]]{} in certain cases. \[vanish\] The space $S_k(N)^\eta := \{f \in S_k(N) \colon f \ \text{divisible by } \ \eta^{2k-2} \}$ is zero for $(i)$ $N=1$ if $12 \nmid k$, or for $(ii)$ all square-free $N$, provided $k \equiv 4,10 ~\bmod 12$. \[backbone\] Here ‘divisible’ means divisible in the ring of holomorphic modular forms (with multiplier). Part $(i)$ is not stated in [@ab2], but follows from the valence formula. For the proof of [Theorem \[mainthm\]]{} $(ii)$ and $(iii)$, we need information about the orders at $\infty$ of the functions $\omega_\nu$ in . The next lemma is devoted to that. \[ord\] ${\mathrm}{ord}_\infty\omega_\nu=\sum_{\mu=1}^{m-1}\frac{\mu^2}{4m}-\frac{\nu^2}{4m}$ $(\nu=1,2,...,m-1)$. $\omega_\nu$ is the determinant of $(m-1),\nu$-th minor of $\mathcal{W}$. Looking at the first non-zero co-efficients of entries of $\mathcal{W}$ we see that the leading non-zero coefficient of $\omega_\nu$ equals $c_{4}\cdot\frac{(m-1)!}{\nu}\cdot V(\frac{1^2}{4m},..,\widehat{\frac{\nu^2}{4m}},...,\frac{(m-1)^2}{4m})$ for some $c_4\in \mathbb{C}^*$. Now each element in the $\mu$-th column of the $\mathcal{W}$ has ${\mathrm}{ord}_{\infty}$ equal to $\frac{\mu^2}{4m}$. Thus the lemma follows. **Proof of [Theorem \[mainthm\]]{}, cont’d.** We now go back to , where we multiply both sides by a non-zero $ H \in M_s(\Gamma_0(N)) \backslash \{0\}$, where $s \geq 0$ is even to be specified later. This gives $$\label{4.1} \frac{\chi_{2m-3}\cdot H}{\eta^\beta}=\frac{h_{\mu}\cdot H}{\omega_{\mu}\cdot \eta^{\beta-\lambda}}.$$ where we have put $$\begin{aligned} \label{betadef} \beta=2(k+2m+s-4), {\qquad}\lambda=(m-1)(2m-1).\end{aligned}$$ Our aim is to prove $\chi_{2m-3}=0$. To this end, let us define a new function $\psi$ by $$\psi=\frac{h_{\mu}\cdot H}{\omega_{\mu} \cdot \eta^{\beta-\lambda}}.$$ From it is clear that $\psi$ does not depend on $\mu$ and since from [Lemma \[4.1\]]{} we get $\omega_\mu$ is never zero, $\psi$ is well defined. It is clear from that if $\psi$ is bounded at all cusps of $\Gamma_{0}(N)$, then $\psi \in M_1(N,\vartheta)$ for some multiplier $\vartheta$. *We want to find sufficient conditions on $m,k$ which would imply that $\psi=0$, i.e., $\chi_{2m-3}=0$.* With that aim, it is helpful here to introduce another function for $r\in \mathbb{Z}$, defined by $$\label{4.2} \psi_{r}=\eta^{-r} \cdot \psi =\frac{h_{\mu}\cdot H}{\omega_{\mu} \cdot\eta^{\beta-\lambda+r}}.$$ From the previous discussion and we see that $\psi_{r}\in M_{1-\frac{r}{2}}(N,\varepsilon_r)$ for some multiplier $\varepsilon_r$ if we can show that it is bounded at all cusps. In other words it is enough to show that $\psi_{r}\mid_{1-\frac{r}{2}}^{\varepsilon_r}\gamma$ is bounded for any $\gamma\in \Gamma$ and where we recall that $$\psi_{r}\mid_{1-\frac{r}{2}}^{\varepsilon_r}\gamma=\varepsilon_r(\gamma)^{-1} j(\gamma,\tau)^{-(1-\frac{r}{2})} \psi_{r}(\gamma\tau).$$ Let us recall from [Proposition \[om\]]{} that $\Omega_{m-1}:=(\omega_1,\omega_2,...,\omega_{m-1}) $ belongs to $\widetilde{M}(\frac{(m-2)(2m-3)}{2},\alpha_{m})$. We fix $\widetilde{\gamma_0}=(\gamma_{0}, \omega_{0}(\tau)) \in \widetilde{\Gamma} $ and we calculate: $$\begin{aligned} & \varepsilon_r(\gamma_0)^{-1} w_0(\tau)^{-(2-r)} \psi_{r}( \gamma_0 \tau) \cdot \alpha_m({\widetilde{\gamma}}_0) \left( \Omega_{m-1}(\tau) / \eta^{\lambda-\beta-r}(\tau) \right) \label{00} \\ &= \varepsilon'(\gamma_0) j(\gamma_0,\tau)^{-k -s + 1/2} \psi_{r}( \gamma_0 \tau) (\Omega_{m-1} / \eta^{\lambda-\beta-r})(\gamma_0 \tau) \nonumber \\ &= \varepsilon''(\gamma_0) j(\gamma_0,\tau)^{-k- s + 1/2} (h_1 H,h_2 H,\ldots, h_{m-1} H)(\gamma_0 \tau) \nonumber {\qquad}(\text{using} \, \eqref{4.2}) \\ &= \varepsilon'''(\gamma_0) \left[ (h_1H,h_2H,\ldots, h_{m-1}H)\mid^{\varepsilon''}_{k +s - 1/2} \gamma_0 \right].\label{bdd}\end{aligned}$$ In the above, $\varepsilon'(\gamma_0)$, $\varepsilon''(\gamma_0)$, $\varepsilon'''(\gamma_0)$ are certain complex numbers which arise from the appropriate multiplier systems are roots of unity. Since $h_\mu,H$ are modular forms, remains bounded as $ \Im(\tau) \to \infty$. In order to prove that $\psi_{r}\mid_{1-\frac{r}{2}}^{\varepsilon_r}\gamma$ is bounded, it is sufficient that as $\Im(\tau)\to \infty$, atleast one of the components of $\Omega_{m-1}(\tau)/\eta^{\lambda-\beta-r}$ is non-zero. In other words we need some $\nu\in \{1,2,...,m-1\}$ such that ${\mathrm}{ord}_{\infty}\eta^{\lambda-\beta-r}\geq {\mathrm}{ord}_{\infty}\omega_{\nu}$. Now concernig the possibility of such a $\nu$, putting $\nu=m-l$ leads us to $$2(m-k) \geq 12l- \frac{6l^2}{m}+2s+r-8.$$ From the above, $m-k$ will be minimal, i.e., we get the largest range of values of $m-k$ when $l=1$ i.e. $\nu=m-1$. If we further consider the possibility of $ {\mathrm}{ord}_{\infty}\eta^{\lambda-\beta-r}= {\mathrm}{ord}_{\infty}\omega_{m-1}$, it would imply $\lambda-\beta-r=\frac{(m-2)(m-1)(2m-3)}{m}$, which is impossible for $m>3$ since the right hand side is not an integer. Thus we are led to consider $$\begin{aligned} \label{cond} {\mathrm}{ord}_{\infty}\omega_{m-2}> {\mathrm}{ord}_{\infty}\eta^{\lambda-\beta-r} > {\mathrm}{ord}_{\infty}\omega_{m-1},\end{aligned}$$ which along with [Lemma \[ord\]]{} implies $$\begin{aligned} \label{infty} \Omega_{m-1}(\tau)/\eta^{\lambda-\beta-r} \to (0,0,...,0,\infty) {\quad}\text{as} {\quad}\Im(\tau) \to \infty.\end{aligned}$$ We also note that for $m>3$, is equivalent to the condition $$(m-2)+\frac{3}{m}>k+s+\frac{r}{2}>(m-8)+\frac{12}{m},$$ i.e. $$\begin{aligned} \label{eqinq} s+\frac{r}{2}+8-\frac{12}{m} > m-k > 2+s+\frac{r}{2}-\frac{3}{m}.\end{aligned}$$ In our application, $r$ would be even. So assuming this condition, the second inequality in above implies that the largest range of $m-k$ happens, and the first inequality is also satisfied, if we choose $$\begin{aligned} \label{mks} m-k=2+s+\frac{r}{2} \quad \text{for} {\quad}m>3.\end{aligned}$$ Henceforth we assume . Now , , and imply that $\psi_{r}\mid_{1-\frac{r}{2}}^{\varepsilon_{r}} \gamma$ vanishes as $\Im(\tau)\to\infty$, since the last column of $\alpha_m(\widetilde{\gamma_0})$ is not identically zero because $\alpha_m$ is a homomorphism from $\widetilde{\Gamma}$ to $GL_{m-1}(\mathbb{C})$. The upshot of the foregoing discussion is that $$\begin{aligned} \label{bang} \psi_{r}\in M_{1-\frac{r}{2}}(N,\varepsilon_r) {\quad}\text{if} {\quad}2+s+\frac{r}{2}=m-k.\end{aligned}$$ $\bullet$ **Part (i) of [Theorem \[mainthm\]]{}**: In this case $N\geq1$ is arbitrary, and we choose $r>2$ even and $s=0$. This means $1- r/2<0$ and so $\psi_{r}\in M_{1-\frac{r}{2}}(N,\varepsilon_r) = \{0\}$ (see e.g. [@rankin Theorem 4.2.1]) when $m-k\geq4$. Thus under this condition $\chi_{2m-3}=0$. $\bullet$ **Part (ii) of [Theorem \[mainthm\]]{}**: In this case $N$ is square-free. In we choose $r=0$, so that $s=m-k-2\geq 0$. To have a non-zero $H$ in we need to have $s\in 2\mathbb{Z}$ and hence $m$ to be odd. By and we know that $\eta^\beta$ divides $\chi_{2m-3} \cdot H$ with $\beta$ suited for an application of part $(i)$ of [Theorem \[vanish\]]{} provided $$k+2m-3+s\equiv 4, 10\;\pmod {12} \quad \text{ i.e., }\quad k+2m+s\equiv 1\; \pmod{6}.$$ From the choice of $s=m-k-2\geq 0$ we get, $$k+2m+s=3m-2\equiv1\;\pmod{6}.$$ Hence when $N$ is square-free, $m$ is odd and $m-k\geq 2$, one has $\chi_{2m-3}=0$. $\bullet$ **Part (iii) of [Theorem \[mainthm\]]{}**: Here $N=1$. We argue exactly as in the previous case. We set $r=0$, so that $s=m-k-2\geq 0$. As before we can apply part $(ii)$ of [Theorem \[vanish\]]{} to conclude $\chi_{2m-3} \cdot H=0$ provided $$2m+k+s-3\not\equiv 0\pmod{12} \quad \text{i.e., } \quad 2m+k+s\not\equiv 3\pmod{12}.$$ Putting the value of $s$, we see that this condition is always satisfied. Therefore when $N=1$, $m$ is odd and $m-k\geq2$, one has $\chi_{2m-3}=0$. [22]{} T. Arakawa, S. Böcherer: [*A Note on the Restriction Map for Jacobi Forms*]{}, Abh. Math. Sem. Univ. Hamburg [69]{} (1999), 309–317. T. Arakawa, S. Böcherer: [*Vanishing of certain spaces of elliptic modular forms and some applications*]{}, J. reine angew Math. [559]{} (2003), 25–51. S. Das and B. Ramakrishnan: [*Jacobi forms and differential operators*]{}, J. Number Theory 149 (2015), 351-367. M. Eichler and D. Zagier: [*The Theory of Jacobi Forms*]{}. Progress in Mathematics, [Vol. 55]{}, Boston-Basel-Stuttgart: Birkhäuser, 1985. J. Kramer: [*Jacobiformen und Thetareihen*]{}, Manuscripta Math. [54]{} (1986), 279–322. C. Marks: [*Classification of vector-valued modular forms of dimension less than six*]{}, arXiv:1003.4111v1. G. Mason: [*Vector-valued modular forms and linear differential operators*]{}, Int. J. Number Theory [3]{} (2007), no. 3, 377–390. T. Miyake, [*Modular forms*]{}, Translated from the Japanese by Yoshitaka Maeda. Springer–Verlag, Berlin, (1989), x+335 pp. B. Ramakrishnan and Karam Deo Shankhadhar: [*On the restriction map for Jacobi forms*]{}, Abh. Math. Semin. Univ. Hambg. [**83**]{} (2013), 163–174. R. A. Rankin: [*Modular forms and functions*]{}. Cambridge University Press, Cambridge-New York-Melbourne, 1977. xiii+384 pp. G. Shimura: [*On modular forms of half integral weight*]{}, Annals of Mathematics Vol. 97, No. 3 (May, 1973), pp. 440-481 N. P. Skoruppa: [*Über den Zusammenhang zwischen Jacobiformen und Modulformen halbganzen Gewichts*]{}. Dissertation, Rheinische Friedrich-Wilhelms-Universität, Bonn, 1984. Bonner Mathematische Schriften \[Bonn Mathematical Publications\], 159. Universität Bonn, Mathematisches Institut, Bonn, 1985. vii+163 pp.
Mid
[ 0.5487804878048781, 28.125, 23.125 ]
Saturday, November 22, 2008 The Big S Doesn't roll of the tongue quite as easily as the 'Big B', does it? My point precisely. Well, not quite mine but kinda connected to the point I'm about to make. Those of you who have read 'Freakonomics' by Steven Levitt and Stephen Dubner might recall what this post is about to shine the light on: How much do baby names impact their chances of success later in life. And those of you who haven't might feel inclined enough to read this fascinating old piece from Slate that I unearthed while exploring for material on the said subject matter. Speaking of which, I wonder how much farther I might have gone had my mother chosen to name me 'Übermaniam'. Not very, I'm sure. The weight of expectations, and the umlaut, would have been just too much to bear. (And spell.) As it is, 'Avinash' is a lofty enough branding to live with. That said, it does make for a good story to tell the few people who bother to ask me what it means. And when they, rarely, do, I promptly proceed to saddle them with not just what it means but also why I was 'Hindued' so. Tell me about it. No, actually, ask me about it and I'll tell you.
Mid
[ 0.622641509433962, 33, 20 ]
# -*- coding: utf-8 -*- # Generated by Django 1.9.4 on 2016-03-15 21:16 from __future__ import unicode_literals from django.conf import settings from django.db import migrations, models import django.db.models.deletion class Migration(migrations.Migration): initial = True dependencies = [ migrations.swappable_dependency(settings.AUTH_USER_MODEL), ] operations = [ migrations.CreateModel( name='Todo', fields=[ ('id', models.AutoField(auto_created=True, primary_key=True, serialize=False, verbose_name='ID')), ('name', models.CharField(max_length=255, verbose_name='Name')), ('done', models.BooleanField(default=False, verbose_name='Done')), ('date_created', models.DateTimeField(auto_now_add=True, verbose_name='Date Created')), ('user', models.ForeignKey(on_delete=django.db.models.deletion.CASCADE, to=settings.AUTH_USER_MODEL)), ], options={ 'verbose_name': 'Todo', 'verbose_name_plural': 'Todos', }, ), ]
Mid
[ 0.61003861003861, 39.5, 25.25 ]
/** * SSLEvent * * This is used by TLSEngine to let the application layer know * when we're ready for sending, or have received application data * This Event was created by Bobby Parker to support SSL 3.0. * * See LICENSE.txt for full license information. */ /*[IF-FLASH]*/package com.hurlant.crypto.tls { import flash.events.Event; import flash.utils.ByteArray; public class SSLEvent extends Event { static public const DATA:String = "data"; static public const READY:String = "ready"; public var data:ByteArray; public function SSLEvent(type:String, data:ByteArray = null) { this.data = data; super(type, false, false); } } }
Mid
[ 0.570264765784114, 35, 26.375 ]
Q: writing a vector using "readTrajectory" function in Dymola I write a vector in Dymola mos script in a simple manner like this: x_axis = cell.spatialSummary.x_cell; output: x_axis={1,2,3,4,5} // row vector I want to do the same thing in a function.'x_cell' has 5 values which I want to store in a row vector. I use DymolaCommands.Trajectories.readTrajectory function to read x_cell values one by one in for loop (I use for loop because, readTrajectory throws an error when I try to read entire x_cell) Real x_axis[:],axis_value[:,:]; Integer len=5; for i in 1:len loop axis_value:=readTrajectory(result,{"cell.spatialSummary.x_cell["+String(i)+"]"},1); //This intermediate variable returns [1,1] matrix x_axis[i]:=scalar(axis_value); end for; I get an error: Assignment failed x_axis[i] = scalar(axis_value); what's wrong here? All I want to do is read all values of x_cell and write it into a vector. How can I do this in dymola function? Thank you! A: Solution: Initialize the vector with a certain value. In this case, x_axis :=fill(0, len); This solved the above problem for me.
High
[ 0.672798948751642, 32, 15.5625 ]
A rapid and simple method for screening large numbers of recombinant DNA clones. A simple and rapid method has been described for the isolation of plasmid, phagemid and phage DNAs. Hundreds of recombinant clones can be screened in one day employing this method. It takes half an hour to prepare plasmid DNA from ten clones, and the DNA prepared from a single colony using this method is of sufficient quality and in sufficient amount to perform at least five restriction digestions. This method eliminates the need for RNase treatment and phenol chloroform extraction if the plasmids are needed only for the restriction digestion. If needed, RNAs can be removed after restriction digestion by adding RNase and incubating for two minutes at room temperature. After RNase treatment and phenol/chloroform extraction, the plasmid DNA serves as a good template for sequencing. The DNA can be stored at -20 degrees C for over eight weeks.
Mid
[ 0.641686182669789, 34.25, 19.125 ]
Andøya Andøya is the northernmost island in the Vesterålen archipelago, situated about inside the Arctic circle. Andøya is located in Andøy Municipality in Nordland county, Norway. The main population centres on the island include the villages of Andenes, Bleik, and Risøyhamn. The island has an area of , making it the tenth largest island in Norway. The island is connected to the neighboring island of Hinnøya via the Andøy Bridge. The Andfjorden lies to the east of the island, the Risøysundet strait lies to the south and east side of the island, and the Gavlfjorden lies to the southwest side. The Norwegian Sea lies to the west and north. The numerous bog areas on Andøya are used for the extensive production of peat. Andøya is also well known for its cloudberries. Besides the flat and largely continuous bog areas, Andøya also consists of steep mountain ranges reaching up to high. The sharp peak of Kvasstinden is the highest point on the island at . The Andøya Rocket Range which was founded in 1962 is also located on the island near the Andøya Air Station. Media gallery References External links Category:Andøy Category:Vesterålen
Low
[ 0.527114967462039, 30.375, 27.25 ]
(Reuters) - U.S. allies expressed support on Friday for Washington’s missile strikes on Syria, calling them a proportionate response to Syrian forces’ suspected use of chemical weapons. U.S. Navy guided-missile destroyer USS Porter (DDG 78) conducts strike operations while in the Mediterranean Sea which U.S. Defense Department said was a part of cruise missile strike against Syria on April 7, 2017. Ford Williams/Courtesy U.S. Navy/Handout via REUTERS The strikes were denounced as illegal by Syria and its allies Russia and Iran. Iranian President Hassan Rouhani called on the world "to reject such policies, which bring only destruction and danger to the region and the globe". (Graphic locator map on attack - tmsnrt.rs/2nm68H0) Iraq criticized “hasty interventions” in an apparent comment on the U.S. action. But a wide range of U.S. allies from Asia, Europe and the Middle East expressed support, if sometimes cautiously, in similar terms. “The U.K. government fully supports the U.S. action, which we believe was an appropriate response to the barbaric chemical weapons attack launched by the Syrian regime and is intended to deter further attacks,” a British government spokesman said. Japan’s Prime Minister Shinzo Abe told reporters: “Many innocent people became victims from the chemical attacks. “Japan supports the U.S. government’s determination to prevent the spread and use of chemical weapons,” he said. Turkey viewed the strikes positively and the international community should sustain its stance against the “barbarity” of the Syrian government, Deputy Prime Minister Numan Kurtulmus said. In an interview with Turkish broadcaster Fox TV, Kurtulmus said Assad’s government must be punished in the international arena and the peace process in Syria needed to be accelerated. French Foreign Minister Jean-Marc Ayrault said Russia and Iran needed to understand that supporting Assad made no sense and that the escalation of the U.S. military role in Syria was a “warning” to “a criminal regime”. “Use of chemical weapons is appalling and should be punished because it is a war crime,” Ayrault told Reuters and France Info radio. French President Francois Hollande and German Chancellor Angela Merkel issued statements saying Assad was solely to blame for the air strikes. The Dutch government said: “The United States has given a clear signal that the use of poison gas crosses a line.” It also labeled the strikes a “proportionate” response. “U.S. strikes show needed resolve against barbaric chemical attacks. EU will work with the US to end brutality in Syria,” the chairman of the council of EU leaders, Donald Tusk, said on Twitter. Australian Prime Minister Malcolm Turnbull said the strikes sent “a vitally important message” that the world would not tolerate the use of chemical weapons. “The retribution has been proportionate and it has been swift,” he told reporters in Sydney. “We support the United States in that swift action.” Saudi Arabia and Qatar, which back rebels fighting Assad, said they supported the U.S. strikes and held only the Syrian government responsible for the attacks. Other Gulf countries, including the United Arab Emirates, Bahrain and Kuwait, also expressed support for the attacks. Some countries expressed reservations about the U.S. decision to launch strikes without authorization from the U.N. Security Council. Indonesia, home to the world’s largest Muslim population, condemned the use of chemical weapons in Syria. “At the same time, Indonesia is concerned with unilateral actions by any parties, including the use of Tomahawk missiles, in responding to the chemical weapon attack tragedy in Syria,” Foreign Ministry spokesman Armanatha Nasir said in a text message. “Military actions, undertaken without prior authorization of the U.N. Security Council, are not in line with international legal principles in the peaceful settlement of disputes, as stipulated in the U.N. Charter.”
Mid
[ 0.6048192771084331, 31.375, 20.5 ]