text
stringlengths
8
5.74M
label
stringclasses
3 values
educational_prob
sequencelengths
3
3
Bush backs down to Nuclear North Korea as US Drops Sanctions There's been plenty of saber rattling and bold talk about forcing North Korea to abandon its nuclear weapons program, but after a 6 year standoff, Bush has decided to give in to Kim Jung Il's demands. The western media is characterizing the new developments as a “breakthrough”, but, in fact, Bush has retreated on every issue of consequence. It is as close to a total foreign policy failure as one can possibly imagine. Nothing has been achieved. The bottom line is this; Kim refused to budge from his original position, while Bush completely capitulated on his. This suggests that there may have to be a serious reworking of Dick Cheney's famous maxim that “We don't negotiate with evil; we defeat it”. Wrong again, Dick. The so-called “breakthrough” took place last month in a face-to-face meeting between Washington and Pyongyang in Berlin. The meeting was kept secret to conceal the administration's willingness to meet one-on-one with their North Korean counterparts. Up until then, the chest-thumping Bushies had refused to negotiate in person; choosing instead to hide behind the 6 party talks. Kim's detonation of a nuclear bomb last summertriggered a sudden reversal inthe administration's approach. (Iran has probably noticed Bush's eagerness to negotiate with nuclear-armed states.) “According to Japan's Asashi newspaper, the two sides signed a memorandum of understanding under which North Korea would make steps towards denuclearization at the same time as the US resumed annual shipments of 500,000 tonnes of oil, which were halted in 2002.” (UK Guardian) If this all sounds familiar, it is because the deal is identical to the “Agreed Framework” that was worked out by the Clinton administration in 1994 (and which the Bush administration stubbornly refused to honor for 6 years). The only difference now is that North Korea has nuclear weapons. The new agreement will drop US sanctions against the North and stop “freezing” their foreign banks accounts, a violation of international law. Kim will be expected to cease his nuclear activities at the Yongbyon reactor and allow inspectors from the IAEA, the UN nuclear watchdog agency, to resume their work. Kim agreed to all of these conditions10 years ago; his position has never changed. Only Bush has backed-down. US envoy, Christopher Hill, has tried to put a brave face on Washington's capitulation saying, “I sense a real desire to have progress.” “Progress”? Those who have followed the issue won't be so easily fooled. The administration is sending up the white flag and calling it victory. They've back-pedaled on every point of dispute and now they're back to “square one”. Other parts of Clinton's “Agreed Framework” are still being hammered out, but it isnearly certainthat Bush will be required to meet the terms of the original deal and provide food and 2 lightwater reactors for electrical power. More importantly, Kim is bound to push for “security guarantees” which are now de rigueur for any nation negotiating with the war-mongering US. The North will demand a written assurance (Treaty) that the administration will not preemptively attack them. (The US National Security Statement claims the right to preemptively attack whoever it chooses depending on US national interests) A signed treaty with North Korea would be agiant leapforward for nuclear nonproliferation as well as world peace. 6 years of failed policy, as well as wars that stretch across Central Asia and the Middle East, have finally pushed the blundering Bush administration to the bargaining table. The lesson is unavoidable: Bush CAN be forced to act rationally when all other options have been thoroughly exhausted. Perhaps, we can glean some small amount of hope from that. “The US and South Korea will play this up as a big success. But they are going back to where they were before. The US has talked tough without achieving anything. They have reached a new status quo in which North Korea is a nuclear weapons state”. The Market Oracle is a FREE Financial Markets Forecasting & Analysis web-site.(c) 2005-2018 MarketOracle.co.uk (Market Oracle Ltd) - Market Oracle Ltd asserts copyright on all articles authored by our editorial team and all comments posted. Any and all information provided within the web-site, is for general information purposes only and Market Oracle Ltd do not warrant the accuracy, timeliness or suitability of any information provided on this site. nor is or shall be deemed to constitute, financial or any other advice or recommendation by us. and are also not meant to be investment advice or solicitation or recommendation to establish market positions. We do not give investment advice and our comments are an expression of opinion only and should not be construed in any manner whatsoever as recommendations to enter into a market position either stock, option, futures contract, bonds, commodity or any other financial instrument at any time. We recommend that independent professional advice is obtained before you make any investment or trading decisions. By using this site you agree to this sites Terms of Use. From time to time we promote or endorse certain products / services that we believe are worthy of your time and attention. In return for that endorsement and only in the cases where you purchase directly though us may we be compensated by the producers of those products.
Low
[ 0.49785407725321806, 29, 29.25 ]
#Thu Aug 09 12:06:25 PDT 2012 eclipse.preferences.version=1 org.eclipse.jdt.core.compiler.codegen.inlineJsrBytecode=enabled org.eclipse.jdt.core.compiler.codegen.targetPlatform=1.6 org.eclipse.jdt.core.compiler.codegen.unusedLocal=preserve org.eclipse.jdt.core.compiler.compliance=1.6 org.eclipse.jdt.core.compiler.debug.lineNumber=generate org.eclipse.jdt.core.compiler.debug.localVariable=generate org.eclipse.jdt.core.compiler.debug.sourceFile=generate org.eclipse.jdt.core.compiler.problem.assertIdentifier=error org.eclipse.jdt.core.compiler.problem.enumIdentifier=error org.eclipse.jdt.core.compiler.source=1.6
Mid
[ 0.5483870967741931, 25.5, 21 ]
With eight holes of the Dubai Desert Classic to play, the storyline was set. Rory McIlroy, back at the scene of his first victory as a professional and in the early throes of what he regards as phase two in his golfing life, led by two from Li Haotong. Two hours later, dejection was writ large across McIlroy’s face as Li celebrated the finest win of his fledgling career. First, to the victor. Li played the event’s final six holes in four under par – and birdied the last two – in what proved a wonderful display of nerveless golf. His winning aggregate of 23 under par is a Desert Classic record. With McIlroy looking on and therefore in a position from which others would have wilted, Li converted from 10ft at the last to take the trophy by one. His Sunday 69 matched McIlroy’s scorecard. Li was already in this year’s Masters and the 22 year old would do well to look at quirks of recent history. The previous two winners of this tournament went on to prevail at Augusta National a little over two months later. “This is incredible and gives me so much confidence,” said Li. “Especially after I missed the cut last week. I just want more of this in the future. It was incredible to play with Rory and learn so much from him.” And to come out on top, presumably. Focus will inevitably fall on the wounded McIlroy. His post-round assessment of being “pissed off” was barely necessary. This one stung all right, to the point where McIlroy obviously had little interest in accentuating positives. “If someone had told me at the start of the year ‘You’ll finish third and second your first two events’ I’d say, ‘Yeah, I’d take that,’” McIlroy said. “But being in the positions I’ve been in and having two close calls the first couple of weeks of the year, it’s a little difficult. “The competitor in me is very disappointed right now. I wanted to win. I always want to win and I just didn’t do enough when I needed to.” There has been so much to admire about the four-times major champion’s return to competitive action during two Middle East events played in 40 under. In the cold light of day, this represents a strong start to McIlroy’s latest quest to become the Masters champion, not least after a period seriously disrupted by injury. Still, what sustains golfers of McIlroy’s standing is tournament glory. Having apparently swatted aside the challenge of Li, the 28-year-old produced arguably his worst shot of the week when finding a greenside bunker at the short 11th with only a nine-iron. A bogey was to follow. McIlroy was again profligate with short iron in hand at the par-five 13th. He was to three-putt in passing up a glorious birdie opportunity. McIlroy’s bogey on 16, a hole he commonly plays so well, was damaging in the context of Li’s stunning resurgence. Key to the latter scenario was a birdie putt holed from off the 15th green. “From being two ahead, standing on the 11th tee, to being level going into 16, it was a couple of bad shots, a couple of poor decisions, a couple of mental errors, a few tentative putts out there, as well,” McIlroy added. “I kept leaving myself in places where I couldn’t really give it a run at the hole because they were downhill, down grain, downwind. So I didn’t really leave it in the best spots to be aggressive with my putts. “I tried until the very end, made him win it in the end, which was all I could do, and he played very well on the way in, birdieing three of the last four. I just wish I could get a couple of those holes back.” Tyrrell Hatton had reached the 18th with aspirations of gatecrashing the championship party, only to lash his second shot into the pond. Hatton was to finish third at 20 under, one ahead of Alexander Levy. The biggest move on day four arrived from Scotland’s Richie Ramsay, who claimed a share of sixth courtesy of a 64.
Mid
[ 0.5575221238938051, 31.5, 25 ]
G01N1/30—Staining; Impregnating Fixation; Dehydration; Multistep processes for preparing samples of tissue, cell or nucleic acid material and the like for analysis G01N1/31—Apparatus therefor G01N1/312—Apparatus therefor for samples mounted on planar substrates G—PHYSICS G01—MEASURING; TESTING G01N—INVESTIGATING OR ANALYSING MATERIALS BY DETERMINING THEIR CHEMICAL OR PHYSICAL PROPERTIES G01N35/00—Automatic analysis not limited to methods or materials provided for in any single one of groups G01N1/00 - G01N33/00; Handling materials therefor G01N35/00584—Control arrangements for automatic analysers G01N35/00722—Communications; Identification G01N35/00871—Communications between instruments or with remote terminals G—PHYSICS G01—MEASURING; TESTING G01N—INVESTIGATING OR ANALYSING MATERIALS BY DETERMINING THEIR CHEMICAL OR PHYSICAL PROPERTIES G01N35/00—Automatic analysis not limited to methods or materials provided for in any single one of groups G01N1/00 - G01N33/00; Handling materials therefor G01N35/00584—Control arrangements for automatic analysers G01N35/0092—Scheduling G—PHYSICS G01—MEASURING; TESTING G01N—INVESTIGATING OR ANALYSING MATERIALS BY DETERMINING THEIR CHEMICAL OR PHYSICAL PROPERTIES G01N35/00—Automatic analysis not limited to methods or materials provided for in any single one of groups G01N1/00 - G01N33/00; Handling materials therefor G01N35/0099—Automatic analysis not limited to methods or materials provided for in any single one of groups G01N1/00 - G01N33/00; Handling materials therefor comprising robots or similar manipulators G—PHYSICS G01—MEASURING; TESTING G01N—INVESTIGATING OR ANALYSING MATERIALS BY DETERMINING THEIR CHEMICAL OR PHYSICAL PROPERTIES G01N35/00—Automatic analysis not limited to methods or materials provided for in any single one of groups G01N1/00 - G01N33/00; Handling materials therefor G01N35/00029—Automatic analysis not limited to methods or materials provided for in any single one of groups G01N1/00 - G01N33/00; Handling materials therefor provided with flat sample substrates, e.g. slides G01N—INVESTIGATING OR ANALYSING MATERIALS BY DETERMINING THEIR CHEMICAL OR PHYSICAL PROPERTIES G01N35/00—Automatic analysis not limited to methods or materials provided for in any single one of groups G01N1/00 - G01N33/00; Handling materials therefor G01N35/00029—Automatic analysis not limited to methods or materials provided for in any single one of groups G01N1/00 - G01N33/00; Handling materials therefor provided with flat sample substrates, e.g. slides G01N2035/00089—Magazines G—PHYSICS G01—MEASURING; TESTING G01N—INVESTIGATING OR ANALYSING MATERIALS BY DETERMINING THEIR CHEMICAL OR PHYSICAL PROPERTIES G01N35/00—Automatic analysis not limited to methods or materials provided for in any single one of groups G01N1/00 - G01N33/00; Handling materials therefor G01N2035/00178—Special arrangements of analysers G01N2035/00306—Housings, cabinets, control panels (details) G—PHYSICS G01—MEASURING; TESTING G01N—INVESTIGATING OR ANALYSING MATERIALS BY DETERMINING THEIR CHEMICAL OR PHYSICAL PROPERTIES G01N35/00—Automatic analysis not limited to methods or materials provided for in any single one of groups G01N1/00 - G01N33/00; Handling materials therefor G01N2035/00178—Special arrangements of analysers G01N2035/00326—Analysers with modular structure G—PHYSICS G01—MEASURING; TESTING G01N—INVESTIGATING OR ANALYSING MATERIALS BY DETERMINING THEIR CHEMICAL OR PHYSICAL PROPERTIES G01N35/00—Automatic analysis not limited to methods or materials provided for in any single one of groups G01N1/00 - G01N33/00; Handling materials therefor G01N2035/00346—Heating or cooling arrangements G01N2035/00356—Holding samples at elevated temperature (incubation) G01N2035/00366—Several different temperatures used G—PHYSICS G01—MEASURING; TESTING G01N—INVESTIGATING OR ANALYSING MATERIALS BY DETERMINING THEIR CHEMICAL OR PHYSICAL PROPERTIES G01N35/00—Automatic analysis not limited to methods or materials provided for in any single one of groups G01N1/00 - G01N33/00; Handling materials therefor G01N2035/00346—Heating or cooling arrangements G01N2035/00356—Holding samples at elevated temperature (incubation) G01N2035/00376—Conductive heating, e.g. heated plates G—PHYSICS G01—MEASURING; TESTING G01N—INVESTIGATING OR ANALYSING MATERIALS BY DETERMINING THEIR CHEMICAL OR PHYSICAL PROPERTIES G01N35/00—Automatic analysis not limited to methods or materials provided for in any single one of groups G01N1/00 - G01N33/00; Handling materials therefor G01N2035/00346—Heating or cooling arrangements G01N2035/00435—Refrigerated reagent storage G—PHYSICS G01—MEASURING; TESTING G01N—INVESTIGATING OR ANALYSING MATERIALS BY DETERMINING THEIR CHEMICAL OR PHYSICAL PROPERTIES G01N35/00—Automatic analysis not limited to methods or materials provided for in any single one of groups G01N1/00 - G01N33/00; Handling materials therefor G01N35/00584—Control arrangements for automatic analysers G01N35/00722—Communications; Identification G01N35/00871—Communications between instruments or with remote terminals G01N2035/00881—Communications between instruments or with remote terminals network configurations G—PHYSICS G01—MEASURING; TESTING G01N—INVESTIGATING OR ANALYSING MATERIALS BY DETERMINING THEIR CHEMICAL OR PHYSICAL PROPERTIES G01N35/00—Automatic analysis not limited to methods or materials provided for in any single one of groups G01N1/00 - G01N33/00; Handling materials therefor G01N35/00584—Control arrangements for automatic analysers G01N35/00722—Communications; Identification G01N2035/00891—Displaying information to the operator G—PHYSICS G01—MEASURING; TESTING G01N—INVESTIGATING OR ANALYSING MATERIALS BY DETERMINING THEIR CHEMICAL OR PHYSICAL PROPERTIES G01N35/00—Automatic analysis not limited to methods or materials provided for in any single one of groups G01N1/00 - G01N33/00; Handling materials therefor G01N35/00584—Control arrangements for automatic analysers G01N35/00594—Quality control, including calibration or testing of components of the analyser G01N35/00712—Automatic status testing, e.g. at start-up or periodic Y02A90/22— Y02A90/26— Y—GENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS Y—GENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS Y—GENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS Y10—TECHNICAL SUBJECTS COVERED BY FORMER USPC Y10T—TECHNICAL SUBJECTS COVERED BY FORMER US CLASSIFICATION Y10T436/00—Chemistry: analytical and immunological testing Y10T436/11—Automated chemical analysis Y—GENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS Y10—TECHNICAL SUBJECTS COVERED BY FORMER USPC Y10T—TECHNICAL SUBJECTS COVERED BY FORMER US CLASSIFICATION Y10T436/00—Chemistry: analytical and immunological testing Y10T436/11—Automated chemical analysis Y10T436/112499—Automated chemical analysis with sample on test slide Y—GENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS Y10—TECHNICAL SUBJECTS COVERED BY FORMER USPC Y10T—TECHNICAL SUBJECTS COVERED BY FORMER US CLASSIFICATION Y10T436/00—Chemistry: analytical and immunological testing Y10T436/11—Automated chemical analysis Y10T436/113332—Automated chemical analysis with conveyance of sample along a test line in a container or rack Y—GENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS Y10—TECHNICAL SUBJECTS COVERED BY FORMER USPC Y10T—TECHNICAL SUBJECTS COVERED BY FORMER US CLASSIFICATION Y10T436/00—Chemistry: analytical and immunological testing Y10T436/11—Automated chemical analysis Y10T436/113332—Automated chemical analysis with conveyance of sample along a test line in a container or rack Y10T436/114165—Automated chemical analysis with conveyance of sample along a test line in a container or rack with step of insertion or removal from test line Y—GENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS Y10—TECHNICAL SUBJECTS COVERED BY FORMER USPC Y10T—TECHNICAL SUBJECTS COVERED BY FORMER US CLASSIFICATION Y10T436/00—Chemistry: analytical and immunological testing Y10T436/11—Automated chemical analysis Y10T436/113332—Automated chemical analysis with conveyance of sample along a test line in a container or rack Y10T436/114998—Automated chemical analysis with conveyance of sample along a test line in a container or rack with treatment or replacement of aspirator element [e.g., cleaning, etc.] Y—GENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS Y—GENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS Abstract The present invention concerns an apparatus (1) for staining tissue samples, said apparatus (1) including a reagent section (2) or reagent containers (3); at least one staining section or tissue samples, a robotic head (22) or robotic element (20) that may move reagent to a predetermined tissue sample, said robotic element (20) being moveable above the reagent and the staining sections, a control element (85) that may manage a staining process, a 2-D optical sensor (86) to detect two-dimensional image data of a relevant property and that can feed the captured image data to the control element (86). By providing the robotic element (20) with a 2-D optical sensor (86), a common image processor may be provided having multiple functions. By using a 2-D optical image processing system, the control system of the apparatus may easily be adapted to read various types of data presentations, just as actual images for sections of the apparatus may be identified in order to assess the condition of the apparatus. The optical sensor may be used to automatically identify the slides and the reagent containers present in the apparatus, just as the optical sensor may be used for checking if a slide is misplaced at or absent from a slide position, etc. Description TECHNICAL FIELD [0001] The present invention relates to an apparatus and a method for automatic staining of tissue samples. It may further relate to systems for sample processing and data acquisition, data maintenance, and data retrieval for sample processing. Applications to which the present invention may especially relate include immunohistochemistry, in-situ hybridization, fluorescent in-situ hybridization, special staining, and cytology, as well as potentially other chemical and biological applications. BACKGROUND [0002] Tissue sample processing in immunohistochemical (IHC) applications and in other chemical and biological analyses, such as in-situ hybridization, special staining and cytology, may require one or more processing sequences or protocols as part of an analysis of one or more samples. The sample processing sequences or protocols may be defined by the individual or organization requesting an analysis, such as a pathologist or histologist of a hospital, or may be defined by dictates of a particular analysis to be performed, e.g. standardized protocols defined by an organization. [0003] In preparation for sample analysis, a biological sample may be acquired by known sample acquisition techniques and may comprise tissues which in some applications may even be one or more isolated cells. The tissue sample may be accommodated on a sample carrier such as a slide or perhaps a microscope slide. [0004] For example, immunologic applications may require processing sequences or protocols that comprise steps such as deparaffinisation, target retrieval, and staining. Previously, in some applications, these steps may have been performed manually, potentially resulting in a time consuming protocol and necessitating personnel to be actively involved in sample processing. In particular relating to the staining process, various devices for automated staining of tissue slides are known, as attempts have been made to automate sample processing to address the need for expedient sample processing and less manually burdensome operation. [0005] Aspects of the present invention may be especially applicable to sample processing having one or a plurality of processing steps to be performed on one, a portion, or an entirety of samples, such protocols identified in some instances by the individual carriers presenting the samples. Aspects of the present invention may be especially applicable to immunohistochemistry (IHC) techniques, as well as in-situ hybridization (ISH) and fluorescent in-situ hybridization (FISH), especially techniques incorporating the staining of samples. [0006] Embodiments of the invention may further relate to automated control systems for sample processing. Embodiments may also be directed to data acquisition, data maintenance, data retrieval for sample processing, especially information sharing of processing protocol and processing status, such as for individual samples or multiple batch processing, sample diagnostic features, and real-time or adaptive capabilities for multiple batch processing. [0007] U.S. Pat. No. 5,839,091 discloses an apparatus for automatic tissue staining where microscope slides are arranged in a number of rows and reagent vials are stored in a section next to this slide section. A robotic head picks up a predetermined amount of reagent from a bottle and deposits this amount of reagent on a predetermined slide and blows the liquid off the slides according to a control program. This program is run on a computer that is coupled to the staining apparatus. The apparatus is loaded with a number of slides, and each slide and its position is registered in the computer and a staining sequence is selected. The program also receives data relating to the reagents and their position in the reagent section. On the basis of these slide and reagent position data, the program calculates a staining run and controls the robotic motion in the apparatus. [0008] U.S. Pat. No. 6,352,861 discloses a carousel-type automatic staining apparatus in which the slides are arranged on a rotatable carousel slide support and the reagents are similarly arranged on a rotatably carousel reagent support above the slide support. A particular slide is then rotated to a delivery zone and a particular reagent vial is also rotated to this position and reagent is dispensed onto the slide. The slides and the reagent bottles are provided with bar codes and associated bar code readers are provided to identify the slides and the reagents respectively. A blowing zone and an identifying zone are also provided at the periphery of the slide carousel. The slide bar codes identify the slide samples and their particular immunohistochemical processes required for the particular samples. A reagent bar code reader is positioned to scan the reagent bar codes on the reagent bottles. The scanned information from the slide bar code reader and the reagent bar code reader is fed into a computer and correlated with the indexed position of the slide and the reagent carousel, respectively. This information is used to rotate the slide carousel and the reagent carousel to place the correct reagent bottle in the dispense zone for each slide treatment step for each slide. [0009] A drawback of the automated staining apparatus described in '091 is that the position of each of the tissue slides and each of the reagent vials in the slide section and in the reagent section, respectively, must be entered manually into the computer, since the control program cannot check the location of the particular slides and reagent vials. This involves the risk that a misplaced slide is treated with the wrong staining protocol and makes the apparatus very inflexible in use. [0010] Although the '861 patent uses a bar code identification of the slides and reagents, this carousel-type apparatus is time consuming in running the staining protocols, since this involves rotating the carousels with the entire reagent inventory and the slide carousel with all the slides for each step in a protocol. These rotations are time consuming and make this type of apparatus unsuitable for running of larger numbers of slides. Moreover, the bar codes can only carry a small amount of data, typically simply an identification code, which means that the control computer must be provided with corresponding data associated with the identification codes. DISCLOSURE OF INVENTION [0011] It is an object for the present invention to provide an automatic tissue sample processing apparatus of the initially mentioned kind, with automatic identification of the inventory of reagents and slides present in the machine. Another object is to provide identification of relevant properties of the apparatus to allow for automatic preparatory checks before a staining process of newly loaded slides is initiated. [0012] In one embodiment these objects are achieved by an apparatus of the initially mentioned kind wherein a robotic element, perhaps with a robotic head, is provided with an optical sensor, or perhaps a 2-D optical sensor means for detecting two-dimensional image data of a relevant property and with the capability of feeding the captured image data to the control means. [0013] The invention also provides a method of identifying at least one property in an automatic staining apparatus perhaps including at least one slide array and a reagent array and a robotic element or perhaps robotic means for performing staining of the slides also using reagents; said method including in one embodiment the steps of providing optical sensor means on the robotic head of the robotic means, moving the optical sensor means on said robotic head to a predetermined position, recording relevant image data at said position, and feeding said image data to a control system for manipulating the staining process according to said image data. [0018] Furthermore, the invention concerns a method of staining tissue samples in an automatic staining apparatus perhaps including at least one slide array and a reagent array, a robotic element or perhaps and robotic means for performing staining of the slides also using reagents according to tissue sample specific staining protocols; said method including in one embodiment the steps of: providing optical sensor means on the robotic head of the robotic means, moving the optical sensor means on said robotic head to a predetermined position, recording relevant image data at said position by said optical sensor means; feeding said image data to a control system for manipulating the staining process according to said image data; and staining a tissue sample also using reagent from a reagent container. [0023] In embodiments, the automatic staining apparatus 1, that is any apparatus that stains with at least some automated operation, may include a reagent container 3. One or more reagent containers 3 may be positioned in a reagent section 2 of the automatic staining apparatus 1. The automatic staining apparatus may also include a tissue sample 74 which may therein be placed on a slide. A plurality of slides with tissue samples thereon may also be positioned in a slide section 5 of the automatic staining apparatus 1. The invention, in embodiments, may also include a robotic element 20, some type of control element, and even an optical sensor (86), perhaps an image-capture 2-D optical sensor. As can be easily understood, the control element 85, may be a computer, software routine, or merely a particular programmable processor functionality. [0024] As mentioned, the present invention may provide for the capability of optically sensing a two dimensional image. This can occur through an image-capture 2-D sensor which may provide a two-dimensional image of an element in the auto staining apparatus 1. Through providing the robotic element or perhaps a robotic head with a 2-D optical sensor or means, as but one embodiment, a common image processing means is able to have multiple functions. By using a 2-D optical image processing system, the control system of the apparatus may easily be adapted to read various types of data presentations, just as actual images of elements or for sections of the apparatus may be identified in order to assess the condition of the apparatus. The optical sensor or optical sensor means may be used to automatically identify the slides and the reagent containers present in the apparatus, just as the optical sensor or optical sensor means may be used for checking if a slide is misplaced at or absent from a certain slide position, etc. [0025] An optical sensor provides a staining apparatus according to the invention with a hitherto unseen flexibility and possibility of automating the identification functions in a staining apparatus. By utilizing a CCD-camera or the like, perhaps on the robotic head or even the robotic element, individual identification means for each of the identification tasks may no longer be required. This means that controlling as well as maintenance of the apparatus is facilitated. The software controlling the apparatus may be adapted to include automated identifications of various properties and conditions of the apparatus, including slide and reagent information. By a method of identifying relevant properties in the staining apparatus and a method of performing the staining process according to the invention, the automated staining process may be less time-consuming and more qualitative checks may be included without loosing any significant speed in the slide staining operations. [0026] In one embodiment of the invention, the reagent section accommodates a plurality of reagent containers stationary arranged in a plurality of rows. Similarly, the tissue samples are accommodated on slides that are stationary arranged in a plurality of rows in the at least one staining section or slide section during the staining process. The layout of these sections is such that it presents a substantially planar platform work area for the robotic head, which is moveable in the X and Y-axis. In a particularly preferred embodiment, a row of slides and/or reagents can be removed and be replaced without interfering with the staining process. [0027] In another preferred embodiment, the apparatus comprises at least two staining sections separated by a reagent section, that is they may be arranged so that at least some of the tissue samples are closer to at least some of the reagent containers. Hereby, the movements required by the robotic head in order to reach all the slides may be significantly limited and the capacity of the staining apparatus can hereby be increased, just as a reduction in the time for running the staining protocols or other advantages may be achieved. It is further realized that these shorter processing times or other advantages may also be achieved by this layout of the slide and reagent sections without a vision system, e.g. an optical sensor. [0028] In other preferred embodiments of the invention, the optical sensor may be a camera or perhaps include a CCD element. By the term “camera” it should be understood that any image capture apparatus is intended whether or not is uses film, plates, memory, or any type of electronic media and whether or not it images light, visible electromagnetic radiation, or even non-visible electromagnetic radiation such as now well known. By recording the relevant image, relevant image data, or even recording digital image data, a computer processing of this data in the control system may be carried out in a quick manner by known image processing capabilities already available. Moreover, by using this digital technology relative complex images can be recorded with high resolution, just as a fast recording of several identifications, e.g. labels on an entire row of slides, may be achieved as the robotic head may be moved across the slide labels in a continuous movement, so stop and start time for each slide identification may be avoided. However, by the invention it is realized that other image sensors, e.g. solid state sensors, or perhaps CMOS sensors could also be used depending on the requirements for image resolution. [0029] As indicated above, the optical sensor may be adapted to record the individual reagent containers or bottles and slides present in the apparatus. While of course it may image larger areas, or perhaps even the entire device, it may be configured for individual imaging either electronically, optically, or positionally. Regardless, as a result of the imaging capability, predetermined positions of the slides or reagent containers or bottles that are loaded into the automatic staining apparatus may not be required, since the apparatus may be adapted to automatically identify new slides and reagent bottles once they are loaded into the apparatus. [0030] In an embodiment, the reagent containers and the slides may be provided with an optical identification element. For example, a reagent container may be provided with a reagent optical identification element and a slide may be provided with a slide optical identification element. These optical identification elements may contain machine readable data concerning the reagent type as well as other relevant data relating to the reagent in the bottle, and the slide identifiers may contain data concerning the tissue sample, such as identification of the patient, the staining protocol, etc. An optical identification element may include reiterated information or perhaps even redundant information. This may include information that is repeated or even partially repeated and may even include information that may or may not be in different versions which may relate to similar information. [0031] The optical identification element or alternatively optical identification means may be on or even mounted on the reagent container or on the slides in such a manner that the optical identification element is readable by the optical sensor. By being positioned “on” it is intended that any manner of association be encompassed; thus it should be understood that separate attachment or surface mounting is not required. Similarly, by being “above” it should be understood that this may exist not only in a sense such as with respect to gravity, but also in a figurative sense such as roughly perpendicularly above a surface or the like. In an embodiment, the optical identification element may be readable from above by the optical sensor or alternatively means. Furthermore, the optical identification element may be provided on a label, which is perhaps adhesively attachable to a specific slide or reagent bottle. Hereby, the labels or perhaps adhesive labels may be presented to the optical sensor means on the robotic head above the slides and the reagent bottles facilitating the reading of the optical identification means. By providing the optical identification means on a printed label which is attached to the slide, respectively the reagent bottle, individual labels may be prepared on site and the relevant data may be entered into a computer and a corresponding label carrying said relevant data may be printed on an associated label printer. [0032] In an embodiment of the invention, one type of optical identification element may be a two-dimensional high-resolution symbology code, e.g. of the so-called “Infoglyph™” type. The optical identification may also be more generically a two-dimensional symbology. Two-dimensional symbology may be representative of data including, but not limited to: tissue sample related data, patient identification data, staining protocol data, reagent related data, reagent type data, reagent volume related data, reagent durability related data, and the like data. By encoding the relevant information into numerous tiny, individual graphic elements, typically small lines in 45° diagonal lines as short as 0.02 mm ( 1/100 inch), a high resolution with high contrast encoded information label may be achieved which is printable in a printer and readable by a high resolution camera. The type of encoded 2-D symbology label may be provided in different colors and in a variety of materials. [0033] Alternatively, the optical identification means or alternatively the optical identification element may be a data matrix code or even a one-dimensional bar code, namely the identification code with a pattern of vertical bars whose width and spacing identifies an item marked. An advantage of using an optical sensor capable of reading 2-D symbology is that the apparatus may be capable of reading any kind of optical identifier, as this is only requires an adaptation in the software processing the captured perhaps digital image. [0034] In an embodiment, an optical identification element label may include a two-dimensional (2-D) symbology zone and even at least one human readable text zone, each as conceptually depicted in FIG. 5. Hereby, an extra visual inspection of the label by the operator may be provided for verification of the printed label. [0035] In a more advanced usage of the 2-D image capturing capability, the image processing capability or image processor element may be adapted to identify the texture or outline of the tissue sample itself captured by the optical sensor and may use said image-captured tissue property as an individual identification of the tissue sample. The optical sensor may be configured to identify desired features of the tissue samples such as but not limited to the texture, outline, a visual property, or even an individual feature of a tissue sample. Of course, various different features or properties may be identified as desirable to detect or perhaps identify, a property which may include any attribute, characteristic, or the like. This embodiment could make the use of slide labels obsolete, as the tissue texture itself or at least a predefined section thereof (with or without magnification) could be used as an identifier for a list of data in the control software. [0036] In one preferred embodiment of the invention, the optical sensor may be a moveable optical sensor which may be moveable along the areas above the staining and the reagent sections, and said optical sensor may be adapted to determine the presence of and the positions of slides in the at least one staining section. This may be facilitated by having the optical sensor movable in response to or perhaps on a robotic element. Once a new set of slides are being loaded into the apparatus, this feature would allow the staining apparatus according to this embodiment of the invention to automatically determine where the slides are positioned so that the optimal scheduling of treatment steps can be calculated. The optical sensor may even determine the approximate location and the approximate area of a tissue sample. Furthermore, this capability may also provide the apparatus control software with warning if a slide is not correctly positioned or other irregularities have occurred during the loading of the slides. [0037] In another embodiment of the invention, the optical sensor may be adapted to locate pre-selected reference locations for self-calibration of the robotic control system or robotic element controlling the movements of the robotic head. The camera can be used to teach the robotic arm critical locations necessary to calibrate the system, allowing the apparatus to properly position the robotic head to all required positions and locations within the platform work area. If the apparatus has been moved or otherwise been tampered with, e.g. due to maintenance, etc., this feature may provide the staining apparatus according to the invention with the capability of self-calibrating the robotic motion control system, e.g. if the slides are arranged in racks (intended to broadly encompass any locationally tied collection) by checking if the slide rack fit correctly into a receiving element in the apparatus, and/or by determining the position of predefined reference components of the apparatus. [0038] In another embodiment of the invention, the optical sensor may be a camera adapted to record an image of the finalized tissue sample after said tissue sample has been subjected to a staining protocol for recording an image of the manipulated tissue sample. Hereby, a picture or digital image of the stained tissue sample may be recorded, preferably in a high resolution, for later examination or for sending this digitalize picture to a remote location for examination. Accordingly, in embodiments the present invention may provide for storing an image relevant to the process of staining tissue samples. This may include images both before and after staining or some other operation, of course. Also, this feature of the invention may provide for archiving images of the about to be stained or the stained tissue samples for later verification of the tissue sample analysis or the identification if this should it be required. Thus the invention may automatically facilitate a user activity such as those mentioned. To understand the various possibilities, the automatic facilitation may be of activities including, but not limited to, later accessing a historical image of a stained tissue sample, remotely accessing an image of a stained tissue sample, archiving an image of a stained tissue sample, later accessing a historical image of an unstained tissue sample, remotely accessing an image of an unstained tissue sample, archiving an image of an unstained tissue sample, and the like activities. [0039] A sensor may be provided in some embodiments that may automatically identify information from one or more slides or reagent containers. In some embodiments, protocol information may be provided by the adaptive sample processing control system. The sample processing system may process one or more slides, or one or more batches of slides, concurrently, sequentially, or in any other temporal fashion, potentially in accordance with protocol information provided by a slide having a sample or provided by the adaptive sample processing control system. Sample batches or individual slides may be inserted or removed during processing protocol steps by the control and monitoring accomplished by the adaptive sample processing control system. [0040] Another embodiment of the present invention that may achieve the foregoing and other objects of invention may comprise a method of sample processing, comprising the steps of: accessing at least one of a plurality of drawers, providing at least one sample carrier retainment assembly configured with at least one sample carrier, configuring at least one of the drawers with the at least one sample carrier retainment assemblies, and adaptively processing the sample carriers. The step of adaptive processing may automate the processing of samples and may allow for either or both continuous or batch processing of slides, and may afford multiple independent slide processing and in some embodiments redundant slide processing to process each slide independently. [0041] Embodiments of the invention may further comprise a method of automated sample processing, comprising the steps of: acquiring protocol information, transmitting the protocol information to at least one sample processing system, adaptively processing samples, and acquiring sample processing information from the step of adaptively processing. Furthermore, embodiments may provide: maintaining the protocol information, maintaining the sample processing information, information sharing of protocol information, and sample processing information. These and other method steps may be provided for individual samples or multiple batch processing, sample diagnostic features, and real-time or adaptive capabilities for multiple batch processing. [0042] Many aspects of invention are applicable to immunohistochemistry (IHC) techniques, as well as in-situ hybridization (ISH) and fluorescent in-situ hybridization (FISH) special staining of samples, and microarrays, especially techniques incorporating target retrieval or the staining of samples. [0043] Support should be understood to exist for the following aspects and embodiments of the invention: An automatic staining apparatus comprising: at least one reagent container; at least one sample; a robotic element adapted to affect said reagent container and said sample; a control element to which said robotic element is responsive; and an image-capture 2-D optical sensor configured to two dimensionally image at least one element in said automatic staining apparatus. A method of identifying at least one property in an automatic staining apparatus comprising the steps of: providing at least one sample; providing at least one reagent container; providing a robotic element adapted to affect said reagent container and said sample; optically sensing a two dimensional image of at least one element in said automatic staining apparatus; recording relevant image data; and feeding said image data to a control element to which said robotic element is responsive. A method of staining samples in an automatic staining apparatus comprising the steps of: providing at least one sample; providing at least one reagent container; providing a robotic element adapted to affect said reagent container and said sample; providing an optical sensor responsive to said robotic element and adapted to sense a two dimensional image of at least one element in said automatic staining apparatus; recording relevant image data; and feeding said image data to a control element to which said robotic element is responsive. An automatic staining apparatus comprising: at least one reagent container; at least one sample; a robotic element adapted to affect said reagent container and said sample; a control element to which said robotic element is responsive; and a multifunction optical sensor configured to sense at least one element in said automatic staining apparatus. BRIEF DESCRIPTION OF DRAWINGS [0070] In the following the invention is described with reference to the accompanying drawings, in which: [0071] FIG. 1 is a schematic perspective view of a staining apparatus according to the preferred embodiment of the invention; [0072] FIG. 2 is a top view of the work area in the staining apparatus shown in FIG. 1; [0073] FIG. 3 is a detailed view of the robotic element in the staining apparatus according to some embodiments of the invention; [0074] FIG. 4 is a top view of a reagent bottle with optical identification means; [0075] FIG. 5 is a microscope slide with an optical identifier label thereon; [0076] FIG. 6 is an example of a lay-out of this label; and [0077] FIGS. 7 to 10 are examples of various kinds of optical identifying means on the slides. MODE(S) FOR CARRYING OUT THE INVENTION [0078] An automatic staining apparatus 1 according to the invention is shown in FIGS. 1 and 2. The automatic staining apparatus 1 comprises a rectangular frame 4 surrounding a reagent station or section 2 comprising an array of reagent bottle or container compartments, wherein each compartment a reagent vial or reagent container 3 is placed, and a first and second slide sections 5 wherein a number of separate racks 6 is placed, and where each rack 6 comprises a number of microscope slides 7 mounted side by side in the rack 6. A plurality of reagent containers or even slides may be placed in any desired order, an array. In the embodiment shown, each rack may hold up to 8 slides, but the rack may be designed to hold any suitable number of slides. With eight racks arranged side by side, the shown embodiments may hold up to 64 slides 7 each having a sample, e.g. a tissue mounted on the upper side of the slide, so that reagent may be applied from above to the sample on each slide. The sample processed may be any material, but is most likely a biologic material such as a biological sample or a biological specimen, perhaps such as a histological sample, e.g. tissue and cell specimens, cells, collections of cells, or tissue samples, the definition to include cell lines, proteins and synthetic peptides, tissues, cell preps, cell preparations, blood, bodily fluids, bone marrow, cytology specimens, blood smears, thin-layer preparations, and micro arrays. It should also be understood to include slide-based biological samples. [0079] As mentioned, the present invention may include a robotic element, which may somehow affect the reagent container and tissue sample. Thus any sort of action to, action resulting from, or merely information from the reagent container or tissue sample may be facilitated through the robotic element. The robotic element, in embodiments, may be adapted to perform staining of the slides with (including as a result of or in conjunction with) the reagent application or the like. The robot arm or robotic element 20 may also remove reagent from a reagent container to a predetermined tissue sample. For example, a robotic element 20 for moving a probe 10 in X and Y (as well as Z) direction as indicated by the arrows X and Y is arranged above the frame 4 of the staining apparatus. A robot arm may position the probe 10 above all reagent vials 3 as well as above all the slides 7, and may further operate the probe 10 to aspirate portions of reagent contained in any of the vials 3, to transfer the portion of reagent and apply it to any of the slides 7 in order to provide a selected staining or treatment of the sample on each slide 7. A control element may manage a staining process by controlling the entire process or even any portion of it. By use of a suitable control element or alternatively a control means e.g. capability within a computer (not shown) having the appropriate software and input data for the purpose, this staining apparatus 1 may be able to automatically stain or treat samples requiring different staining or treatment reagents and processes. [0080] As shown in FIGS. 1 and 3, the probe 10 is accommodated in a robotic head 22 and is manipulated by the robotic element 20. The probe 10 is raised to an upper position (in a Z direction) where it is clear of the vials 3 underneath the probe 10, but the robot may include means or element in the robotic head 22 for lowering the probe 10 in order to dip the probe tip into the content of a selected reagent vial 3 and to aspirate a selected amount of reagent for the selected staining or treatment process. In an embodiment, the present invention may include providing an optical sensor 86 on a robotic element and perhaps moving the optical sensor to a predetermined position through action of the robotic element. As but one example, the robotic head 22 may be provided with an optical sensor 86, perhaps even a CCD camera 25 pointing downwards. An optical sensor may be positioned on or perhaps more broadly in response to the robotic element. After the optical sensor is positioned, image data may be recorded at the location at which the optical sensor is established. [0081] In some embodiments a robotic element 20 or even a robotic head 22 may include a variety of components, including but not limited to a push tool 38 that may be connected to an air cylinder 39, a probe 10 that may be responsive to a probe movement element 36 which may even be connected to a syringe pump 37, and an optical sensor 86 as shown in FIG. 3. [0082] In embodiments, the optical sensor may detect two-dimensional image data of a relevant property. It may also be adapted to sense a two-dimensional image of an element in general. The camera may be utilized to determine status information of the slides and the reagent bottles and other features of the apparatus in the work area, for example reading a code provided on a reagent container to determine the reagent type and the reagent location within the system. The camera may also determine status of the tissue sample carriers, for example the location of a particular slide, informational indicia, such as a code, that indicate information about the tissue sample presented on the slide or the processing protocol to be performed. A camera may be used for diagnostic purposes. In some embodiments, the sample may be scanned for further analysis, potentially by a computer. The present invention may include, in embodiments, a computer image biological analysis element or perhaps even biologically analysing image data of a sample with a computer. [0083] As previously discussed, the invention may include recording a variety of relevant image data. Of course, a variety of relevant image data may be recorded. [0084] Importantly, this may include recording element calibration reference points, or perhaps even robotic element calibration reference positions on or in the apparatus. As mentioned, the invention may also provide for recording slide identification image data and reagent identification image data. A significant aspect of an embodiment is the possibility of recording an optical identification element of a particular slide or perhaps merely recording information relevant to an element. Such information may include information concerning the tissue sample, of course. Similarly, optical identification may be recorded on a reagent container that may include information concerning the reagent contained therein. It may provide for recording a two-dimensional symbology on a slide or even on a reagent container. Two-dimensional symbology recorded on a slide may represent data including, but not limited to: tissue sample related data, patient identification data, staining protocol data, or the like. Two-dimensional symbology recorded on a reagent container may represent data including, but not limited to: reagent related data, reagent type data, reagent volume related data, reagent durability related data, or the like. It may also provide a connection element through which captured image data may be transferred to the control element. It may include feeding the image data to a control element so that the robotic element may respond. After the relevant image data has been recorded, and perhaps as a result of feeding that data to the control element, the invention may manipulate a staining or other process according to that relevant image data. Thus the invention may perform staining of slides according to tissue specific protocols. [0085] The staining apparatus 1 of the present embodiment further comprises a probe washing station 8 and a reagent mixer 9, and the robotic element 20 is furthermore arranged to transfer the probe to the washing station 8 as well as to the reagent mixer 9. [0086] As shown in FIG. 4, the reagent bottle 3 may be provided with an area 30 on a surface on which to mount an optical identification element. This optical identifier may be an adhesive label 31 carrying encoded information about the content of the bottle 3, such as reagent type, date of manufacture, expiry date, etc. The encoded information could be in the form of a data matrix code, an Infoglyph code or any other kind of 2-D code, and could in principle also be a simple 1-D code, i.e. a bar code. Additionally, the label 31 may also be provided with human readable text to aid the operator handling the reagent bottles e.g. during loading of bottles into the staining apparatus. [0087] FIG. 5 shows a slide 7 with a label 71 mounted thereon. One layout of the label 71 is shown in FIG. 6. The label 71 may be an adhesive optical identifier, which may be prepared for the particular slide and printed on a label printer (not shown) or any other suitable printing device. It is even possible that in a particular situation, if a batch of slides is to be subjected to the same treatment, a series of identical labels could be provided for the slides. The label 71 may comprise an area 72 for encoded information about the tissue sample on the slide 7, such as patient data, date and file number, the staining protocol and/or the series of process steps. Furthermore, the label 71 may be provided with one or more rows 73 of human readable text and/or blank space for the laboratory personnel preparing the slides to write on the slide label. [0088] In FIGS. 7 to 9 various kinds of data encoded symbology for the label 71 (the entire label 71 as shown or only for the label area 72 (see FIG. 6)). [0089] In FIG. 7, an example of a 2-D symbology of the Infoglyph™ type is shown. This may include perhaps even an information carpet type of symbology. This type of 2-D symbology is advantageous since it can carry a large amount of optically machine-readable information. Making use of a high-resolution camera, this type of symbology may be readable in a high resolution and a large amount of information can be encoded therein. The symbology may be printed with tiny diagonal lines in different directions or perhaps even colors and can easily be read by a CCD camera or the like. [0090] FIG. 8 shows an example of a data matrix code that can be used as an alternative to the Infoglyph symbology. The data matrix is similarly readable with a CCD camera but may not carry as many data in the encoding as the Infoglyph. However, it is easier to print as it may have a less high resolution making it a simple and cost effective solution if less identification data on the slides and the reagent bottles is required. A yet simpler solution is shown in FIG. 9, where the symbology is the old bar code. In principle this means that only a bar code scanner is required for reading the slides and the reagent bottle information, but by using a 2-D sensor, the possibility of self-calibration and monitoring the installation of slides and reagents in the staining apparatus may be enhanced. [0091] In an embodiment, the optical identifiers on the slides and on the reagent bottles are the same type. This may facilitate the image processing of the identification process in the staining apparatus. [0092] A different approach to identifying the individual slides or as a way of facilitating the new capabilities of confirming identification or storing confirmatory information may be to record the contour and/or the texture of the tissue sample 74 itself, such as shown in FIG. 10. Utilizing the high-resolution of the image that can be recorded by the camera, the unique features of the tissue sample itself can be used as a graphical identifier of the slide. Furthermore, an image of the stained tissue sample can be recorded so that a digital representation of the tissue sample is produced. This digital image can be sent electronically to remote locations for instant examination and/or archived for later examination. This may provide the staining apparatus with a unique flexibility in use and may introduce new and advantageous methods of analyzing the tissue samples. [0093] Besides identifying the microscope slides and the reagent bottles in the staining apparatus, the 2-D optical sensor can also be used for self-calibration of the apparatus, e.g. after maintenance, if the apparatus has been disassembled or moved to another location. By identifying critical locations within the apparatus by capturing an image by the camera, the image processing software can compare the captured image with a reference image to determine if certain critical components in the apparatus are off-set from their predetermined positions, e.g. if a slide rack or a slide is slightly off-set, and if so, a set of correction data for the robotic motion control system may be calculated and this set of data may be used for calibrating the apparatus. If the correction needed exceeds a certain size, a warning could be automatically issued to an operator, so that it is ensured that the apparatus does not malfunction during the processing of the slides. Furthermore, this image analysis system could also be used for determining if a slide is present or dislocated in the rack in order to produce a warning signal. [0094] By the invention, it is realised that a variety of changes of the above description of some preferred embodiments of the invention may be made without departing from the scope of the invention as set forth in the claims. As can be easily understood, the basic concepts of the present invention may be embodied in a variety of ways. It involves both staining techniques as well as various systems, assemblies, and devices to accomplish staining and other functions. In this application, the staining techniques are also disclosed as part of the results shown to be achieved by the various systems, assemblies, and devices described and as steps that are inherent to utilization. They should be understood to be the natural result of utilizing the devices as intended and described. In addition, while some devices are disclosed, it should be understood that these not only accomplish certain methods but also can be varied in a number of ways. Importantly, as to all of the foregoing, all of these facets should be understood to be encompassed by this disclosure. [0095] The reader should be aware that the specific discussion may not explicitly describe all embodiments possible; many alternatives are implicit. It also may not fully explain the generic nature of the invention and may not explicitly show how each feature or element can actually be representative of a broader filmation or of a great variety of alternative or equivalent elements. Again, these are implicitly included in this disclosure. Where the invention is described in device-oriented terminology, each element of the device implicitly performs a function. Apparatus claims may not only be included for the device described, but also method or process claims may be included to address the functions the invention and each element performs. Neither the description nor the terminology is intended to limit the scope of the disclosure. [0096] It should also be understood that a variety of changes may be made without departing from the essence of the invention. Such changes are also implicitly included in the description. They still fall within the scope of this invention. A broad disclosure encompassing both the explicit embodiment(s) shown, the great variety of implicit alternative embodiments, and the broad methods or processes and the like are encompassed by this disclosure and may be relied upon to support additional claims for presentation in this or subsequent patent application. [0097] Further, each of the various elements of the invention and claims may also be achieved in a variety of manners. This disclosure should be understood to encompass each such variation, be it a variation of an embodiment of any apparatus embodiment, a method or process embodiment, or even merely a variation of any element of these. Particularly, it should be understood that as the disclosure relates to elements of the invention, the words for each element may be expressed by equivalent apparatus terms or method terms—even if only the function or result is the same. Such equivalent, broader, or even more generic terms should be considered to be encompassed in the description of each element or action. Such terms can be substituted where desired to make explicit the implicitly broad coverage to which this invention is entitled. As but one example, it should be understood that all actions may be expressed as a means for taking that action or as an element which causes that action. Similarly, each physical element disclosed should be understood to encompass a disclosure of the action which that physical element facilitates. Regarding this last aspect, as but one example, the disclosure of a “sensor” should be understood to encompass disclosure of the act of “sensing”—whether explicitly discussed or not—and, conversely, were there effectively disclosure of the act of “sensing”, such a disclosure should be understood to encompass disclosure of a “sensor” and even a “means for sensing”. It should also be understood that in jurisdictions where specific language may be construed as limiting, as but one example in the United States where some interpretations of “means for” elements can be construed narrowly, broader equivalent language (such as “element” or the like) may be used to avoid the narrow interpretation and should be understood as encompassed by this specification. Such changes and alternative terms are to be understood to be explicitly included in the description. [0098] Any patents, patent applications, publications, or other references mentioned in this application for patent are hereby incorporated by reference. In addition, as to each term used it should be understood that unless its utilization in this application is inconsistent with such interpretation, common dictionary definitions should be understood as incorporated for each term and all definitions, alternative terms, and synonyms such as contained in the Random House Webster's Unabridged Dictionary, second edition are hereby incorporated by reference. Finally, any priority case for this application is hereby appended and hereby incorporated by reference. [0099] Thus, the applicant(s) should be understood to have support to claim at least: i) each of the sample processing systems and subsystems as herein disclosed and described, ii) the related methods disclosed and described, iii) similar, equivalent, and even implicit variations of each of these systems, assemblies, devices and methods, iv) those alternative designs which accomplish each of the functions shown as are disclosed and described, v) those alternative designs and methods which accomplish each of the functions shown as are implicit to accomplish that which is disclosed and described, vi) each feature, component, and step shown as separate and independent inventions, vii) the applications enhanced by the various systems or components disclosed, viii) the resulting products produced by such systems or components, and ix) methods and systems, assemblies, devices, and apparatuses substantially as described hereinbefore and with reference to any of the accompanying examples, x) the various combinations and permutations of each of the elements disclosed, xi) each potentially dependent claim or concept as a dependency on each and every one of the independent claims or concepts presented, xii) processes performed with the aid of or on a computer as described throughout the above discussion, xiii) a programmable system as described throughout the above discussion, xiv) a computer readable memory encoded with data to direct a computer comprising means or elements which function as described throughout the above discussion, xv) a computer configured as herein disclosed and described, xvi) individual or combined subroutines and programs as herein disclosed and described, xvii) the related methods disclosed and described, xviii) similar, equivalent, and even implicit variations of each of these systems and methods, xix) those alternative designs which accomplish each of the functions shown as are disclosed and described, xx) those alternative designs and methods which accomplish each of the functions shown as are implicit to accomplish that which is disclosed and described, xxi) each feature, component, and step shown as separate and independent inventions, and xxii) the various combinations and permutations of each of the above. [0100] Further, if or when used, the use of the transitional phrase “comprising” or the like is used to maintain the “open-end” claims herein, according to traditional claim interpretation. Thus, unless the context requires otherwise, it should be understood that the term “comprise” or variations such as “comprises” or “comprising” or the like, are intended to imply the inclusion of a stated element or step or group of elements or steps but not the exclusion of any other element or step or group of elements or steps. Such terms should be interpreted in their most expansive form so as to afford the applicant the broadest coverage legally permissible. [0101] Any claims set forth at any time are hereby incorporated by reference as part of this description of the invention, and the applicant expressly reserves the right to use all of or a portion of such incorporated content of such claims as additional description to support any of or all of the claims or any element or component thereof, and the applicant further expressly reserves the right to move any portion of or all of the incorporated content of such claims or any element or component thereof from the description into the claims or vice-versa as necessary to define the matter for which protection is sought by this application or by any subsequent continuation, division, or continuation-in-part application thereof, or to obtain any benefit of, reduction in fees pursuant to, or to comply with the patent laws, rules, or regulations of any country or treaty, and such content incorporated by reference shall survive during the entire pendency of this application including any subsequent continuation, division, or continuation-in-part application thereof or any reissue or extension thereon. Claims (34) 1. An automatic staining apparatus comprising: at least one reagent container positioned within a reagent section; at least one sample; at least two staining sections separated by the reagent section; a robotic element adapted to affect said reagent container and said sample; a control element to which said robotic element is responsive; and an image-capture 2-D optical sensor configured to two dimensionally image at least one element in said automatic staining apparatus. 2. An apparatus according to claim 1, wherein the optical sensor is adapted to locate pre-selected reference features for self-calibration of the robotic element. 3. An apparatus according to claim 1, wherein the optical sensor is adapted to record an image of the finalised sample after said sample has been subjected to a staining protocol. 4. An apparatus according to claim 1, wherein at least one element comprises an element selected from a group consisting of: a two-dimensional high-resolution symbology code, a datamatrix code, a bar code, an adhesive label, a two dimensional symbology zone, and a human readable text zone; and wherein the optical sensor is adapted to record an image of the finalised sample after said tissue sample has been subjected to a staining protocol. 5. An apparatus according to claim 1, wherein the optical sensor is configured to identify a feature selected from a group consisting of: the texture of the sample, the outline of the sample, a visual property of the sample, and an individual identification feature of the sample; and wherein the optical sensor is adapted to record an image of the finalised sample after said sample has been subjected to a staining protocol. 6. A method of identifying at least one property in an automatic staining apparatus comprising the steps of: providing at least one sample; providing at least one reagent container; providing a robotic element adapted to affect said reagent container and said sample; optically sensing a two dimensional image of at least one element in said automatic staining apparatus; recording relevant image data; recording robotic element calibration reference points in the apparatus; and feeding said image data to a control element to which said robotic element is responsive. 7. A method of staining samples in an automatic staining apparatus comprising the steps of: providing at least one sample; providing slides in racks; providing at least one reagent container; providing a robotic element adapted to affect said reagent container and said sample; providing an optical sensor responsive to said robotic element and adapted to sense a two dimensional image of at least one element in said automatic staining apparatus; recording relevant image data; recording robotic element calibration reference positions for said racks; and feeding said image data to a control element to which said robotic element is responsive. 8. An automatic staining apparatus comprising: at least one reagent container; at least one sample; a robotic element adapted to affect said reagent container and said sample; a control element to which said robotic element is responsive; and an optical sensor adapted to locate pre-selected reference features for self-calibration of the robotic element. 9. An automatic staining apparatus comprising: at least one reagent container in a reagent section; at least one first sample contained on a slide in a first slide section; at least one second sample contained on a slide in a second slide section, wherein said first slide section and said second slide section are separated by said reagent section; a robotic element adapted to affect said reagent container and said first and said second samples; and a control element to which said robotic element is responsive. 10. An automatic staining apparatus comprising: at least one reagent container; at least one sample; a robotic element adapted to affect said reagent container and said sample; a control element to which said robotic element is responsive; and an image-capture 2-D optical sensor configured to two dimensionally image at least one element in said automatic staining apparatus, wherein said at least one element comprises an optical identification element having reiterated information. 15. An apparatus according to claim 11 wherein said optical identification element comprises a datamatrix code. 16. An apparatus according to claim 11 wherein said optical identification element comprises a bar code. 17. An automatic staining apparatus comprising: at least one reagent container; at least one sample; a robotic element adapted to affect said reagent container and said tissue sample; a control element to which said robotic element is responsive; an image-capture 2-D optical sensor configured to two dimensionally image at least one element in said automatic staining apparatus; and a computer image biological analysis element. 18. An apparatus according to claim 17 wherein said optical sensor comprises a camera. 19. An apparatus according to claim 18, wherein said camera comprises a CCD element. 20. An apparatus according to claim 17, wherein the samples comprises biological samples accommodated on slides. 21. A method of identifying at least one property in an automatic staining apparatus comprising the steps of: providing at least one sample; providing at least one reagent container; providing a robotic element adapted to affect said reagent container and said sample; optically sensing a two dimensional image of at least one element in said automatic staining apparatus; recording relevant image data; feeding said image data to a control element to which said robotic element is responsive; and biologically analysing image data of said at least one sample with a computer. 22. A method according to claim 21, wherein said step of optically sensing the two dimensional image of at least one element in said automatic staining apparatus comprises the step of utilizing a camera. 23. A method according to claim 22, wherein said step of utilizing a camera comprises the step of utilizing a CCD element. 24. A method according to claim 21, wherein said step of providing at least one sample comprises the step of utilizing a slide. 25. A method of staining tissue samples in an automatic staining apparatus comprising the steps of: providing at least one sample; providing at least one reagent container; providing a robotic element adapted to affect said reagent container and said sample; providing an optical sensor responsive to said robotic element and adapted to sense a two dimensional image of at least one element in said automatic staining apparatus; recording relevant image data; feeding said image data to a control element to which said robotic element is responsive; and biologically analysing image data of said at least one sample with a computer. 26. A method according to claim 25, wherein said step of providing at least one sample comprises the step of utilizing a slide. 27. A method according to claim 25, wherein said step of providing an optical sensor comprises the step of utilizing a camera. 28. A method according to claim 25, wherein said step of providing an optical sensor comprises the step of utilizing a CCD element. 29. A method according to claim 25, and further comprising the step of storing an image relevant to a process of staining tissue samples. 30. An automatic staining apparatus comprising: at least one reagent container; at least one sample; a robotic element adapted to affect said reagent container and said sample; a control element to which said robotic element is responsive; a multifunction optical sensor configured to sense at least one element in said automatic staining apparatus; and a computer image biological analysis element. 31. An apparatus according to claim 30, wherein said at least one sample comprises at least one sample accommodated on slides. 32. An apparatus according to claim 30, wherein said optical sensor comprises a camera. 33. An apparatus according to claim 30, wherein said optical sensor comprises a CCD element. 34. An apparatus according to claim 30, and further comprising a stored image relevant to the process of staining tissue samples. Assembly for coating the surfaces of a paper/cardboard web at the papermaking machine has a setting unit to act on the press rollers against their springs to give a low linear pressure in the press gap
Mid
[ 0.6096997690531171, 33, 21.125 ]
#ifndef FILETRASHER_H #define FILETRASHER_H /* * Copyright (C) 2007-2009 Sergio Pistone <[email protected]> * Copyright (C) 2010-2018 Mladen Milinkovic <[email protected]> * * This program is free software; you can redistribute it and/or modify * it under the terms of the GNU General Public License as published by * the Free Software Foundation; either version 2 of the License, or * (at your option) any later version. * * This program is distributed in the hope that it will be useful, * but WITHOUT ANY WARRANTY; without even the implied warranty of * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the * GNU General Public License for more details. * * You should have received a copy of the GNU General Public License * along with this program; if not, write to the * Free Software Foundation, Inc., 51 Franklin Street, Fifth Floor, * Boston, MA 02110-1301, USA. */ #include <QUrl> class FileTrasher { public: FileTrasher(const QUrl &url); FileTrasher(const QString &path); ~FileTrasher(); const QUrl & url(); bool exec(); private: QUrl m_url; }; #endif
Mid
[ 0.569794050343249, 31.125, 23.5 ]
Q: Multiple asynchronous call in cascade in recursive function JS I already know this question has been asked many times but I can't figure out how to oganize my code. I'm coming from C/C++ language and still have the way of think, and what I'm writting in JS looks 'meaningless'. I'm using a recursive function in order to generate a travel on a map. The thing is I need to make 2 asynchronous call of 2 different APIs, the second depending on the result of the first one. Actually, i'm always using callback functions, like this : function asyncFunction(param, callbackF) { // ... // $.get(url, function(data, status) { callbackF(data, status); }) } function asyncFunction2(param, callbackF) { // ... // $.get(url2, function(data, status) { callbackF(data, status); }) } function recursiveFunction(param1, param2, num, tab, distance) { //.. stuff with parameters // asynFunction(param1, function(result, status) { // .. stuff with parameters .. // //.. Algo stops when distance is 0 ..// if(!distance) { asyncFunction2(param, function(data, status) { // Final stuff // return; // End }); } else recursiveFunction(param1, param2, num, tab, distance); // parameters has been updated }); } recursiveFunction(param1, param2, num, tab, distance); It's working but ugly with a lot of imbrication, and I can't event know if this function went wrong (ex. a call to an API failed, etc). The question is how can I introduce Promises in this context or async/await terms in JS ? How can I turn this code into a more understanding way ? Thanks. A: $.get already returns a Promise-like object. You just need to get rid of callbacks and return the promise. function asyncFunction(param) { // ... // return $.get(url) } function asyncFunction2(param) { // ... // return $.get(url2) } Now you can use async/await with your functions. Something like this should work async function recursiveFunction(param1, param2, num, tab, distance) { const result = await asyncFunction(param1); // .. stuff with parameters .. // if(distance) { await recursiveFunction(param1, param2, num, tab, distance); // parameters has been updated } else { await asyncFunction2(param) } } recursiveFunction(param1, param2, num, tab, distance);
Mid
[ 0.646437994722955, 30.625, 16.75 ]
What’s your idea of a pleasant evening in America? I don’t watch reality television shows or participate in politics. I don’t spend hours endlessly looking through celebrity Twitter feeds or trolling Instagram. I even limit my time on Facebook. Further, I’m not very patriotic. I’ll never fly an American flag because I don’t believe America is better than other nations or that my way of life is superior to another. But I enjoy having unique experiences that make me feel good about myself and about the world. I like feeling proud to be part of the human race. Yesterday evening in Fort Worth was a good one for me – something that’s perhaps only available for experiencing in today’s America. It started at Chadra Mezza and Grill, a restaurant owned by a Lebanese couple where there’s pizza, pasta, gyro, hummus and Greek salad on the $8 Wednesday night buffet. There’s a beautiful patio where some men were enjoying a hookah and a family was enjoying the food. Inside, we ate plenty – and so do did the Catholic couple who prayed before their meal and then made the sign of the cross before eating lots of cucumbers, pita chips and mahummara. One older woman enjoyed three plates of food while her husband worked his way through a single piece of pizza. When we were done with dinner, we made a conscious effort to see what everyone else was doing by visiting Sundance Square Plaza downtown. There was a private party in progress apparently celebrating American Airlines and their new service to China. We were surprised to see American success story Luke Wade headlining the party, and there was plenty of room for the public to have a seat and watch. Luke is a small town boy like me, and he has overcome physical illness and injury to find success, thanks in large part to, ironically, a reality show. While he sang, Chinese businesspeople passed around cowboy hats, at fancy food from the Reata and stood around taking it all in. And people of all kinds stopped to sing along with the music and dance a bit. One group of women particularly liked Luke’s version of “Lean on Me”. In a shelter at the back of the pavilion, a group of young people played cards. A few tables over, a young man sat down facing Mecca and said his evening prayers. A few minutes later, his friends did the same thing. I was pleased to see that, especially since I had seen a Bible study group in that same shelter a few months ago. It just seemed right. At the restaurant and the plaza, I was among people who were enjoying themselves and each other. As the show ended at the plaza, the Muslim guys headed to the same parking garage where we parked. And we all went on with our lives here in America. It made me feel proud to have a great experience in a great American town. I didn’t see any flags. And it enhanced my experience to see that others of diverse background, religions and ideas were enjoying the same evening in the same town – doing pretty much the same things we were. Today’s America makes that uniquely American evening in Fort Worth possible. Freedom allows diverse people to come together and share their interests at the points where their interests touch and cross over. Today’s America is a place where everyone can do what they like and others have no reason to interfere, judge or feel limited. It’s a place where there’s plenty for everyone and no reason to feel scared or concerned when others get their share too. For me, being free in today’s America trumps everything else. Good or bad, the posts on Gip’s Front Yard are written by Gip Plaster, a professional web content writer. If you need internet content to help your site look and feel alive – or other high-quality text at an affordable rate – please email [email protected].
Mid
[ 0.622327790973871, 32.75, 19.875 ]
212 S.E.2d 690 (1975) 25 N.C. App. 241 Robert Lee WOOD, Jr., by his guardian ad litem Robert Lee Wood, Sr. v. B. Walton BROWN, Administrator of the Estate of Archie Merrell Creef, Jr., Deceased. No. 7419SC1087. Court of Appeals of North Carolina. April 2, 1975. Ottway Burton, Asheboro, for plaintiff appellant. *691 Smith & Casper by Archie L. Smith, Asheboro, for defendant appellee. HEDRICK, Judge. This case was first tried at the May 1972 Session of Superior Court held in Randolph County. Issues of negligence and contributory negligence at the first trial were submitted to and answered by the jury in the affirmative. From a judgment entered on the verdict dismissing his action, the plaintiff, represented then as now by Ottway Burton, appealed. The decision of this court finding error in the charge and ordering a new trial, filed 27 December 1973, is reported at 20 N.C.App. 307, 201 S.E.2d 225 (1973). When this case came on for trial again at the 29 July 1974 Session of Superior Court held in Randolph County, the defendant moved to consolidate the present case with three other civil actions instituted by three other plaintiffs against the same defendant for damages arising out of the same automobile accident. All of the plaintiffs in the four actions were represented by Mr. Burton. Two of the plaintiffs (James Creed Solesbee, Jr., and Ross Clarence Ayers) were passengers with Wood and the deceased driver in the automobile at the time of the accident. The third plaintiff (Robert Lee Ayers) is the father of the minor plaintiff (Ross Clarence Ayers) who, in his action, seeks to recover damages for medical expenses expended by him for treatment of injuries received by his son in the accident. Plaintiff Wood, through his attorney, made a motion to continue his case. The motion was supported by an affidavit of Era N. Wood, mother of the plaintiff, stating that the plaintiff Wood had been confined in the Glade Correctional Institution at Belle Glade, Florida since 28 January 1973, having received a sentence of three years, and that it would be impossible for him to be present at the trial of his case in the Superior Court of Randolph County during the week of 29 July 1974 because "the Florida correctional institute officials do not provide for furloughs out of the State on civil matters." The affiant further stated that she and the plaintiff's attorney were doing all they could to obtain a parole for the plaintiff "and that she expects some answer in the very near future as to her son's expected parole." The trial court denied plaintiff Wood's motion to continue, allowed the defendant's motion to consolidate all the cases for trial, and further ordered "that all of said cases be tried at this term of Court solely upon the questions of negligence and contributory negligence and that the trial of such cases insofar as issues of damages are concerned be tried at a subsequent term of this Court in the event that such trial shall become necessary after the trial thereof upon the issues of negligence and contributory negligence as herein ordered." Plaintiff first contends the trial court erred in denying his motion to continue. It is a well-established rule that continuances are addressed to the sound discretion of the trial judge and may be granted only for good cause shown and as justice may require. G.S. § 1A-1, Rule 40(b), Rules of Civil Procedure; Austin v. Austin, 12 N.C.App. 286, 183 S.E.2d 420 (1971). A motion for a continuance is addressed to the sound discretion of the trial judge and his ruling thereon is not reviewable in the absence of a manifest abuse of discretion. O'Brien v. O'Brien, 266 N.C. 502, 146 S.E.2d 500 (1966). Since Wood's attorney represented all the plaintiffs and had represented Wood at the first trial in May 1972, it is clear he had ample opportunity to prepare for trial. Although Wood was unable to testify in person, he had at his disposal for use his own testimony in the form of an adverse examination taken 19 March 1971 by the defendant and the transcript of his testimony at the first trial. In addition, plaintiff Wood had the benefit of the live testimony of three other witnesses who were passengers in the defendant's automobile at the time of the accident. Furthermore, plaintiff Wood *692 made no showing to the court that he would be able to attend the trial if the judge had granted his motion for a continuance for the term. In fact, the plaintiff made no showing as to the possibility of his attendance at any reasonable future time. The record discloses that Wood was imprisoned on 28 January 1973 and that unless paroled he would remain incarcerated until 28 January 1976. While we can sympathize with any litigant's desire to be in court when his case is tried, under the circumstances here presented we cannot say Judge Seay abused his discretion in refusing to continue the case for the term. See, Janousek v. French, 287 F.2d 616 (8th Cir. 1961); Cleeland v. Cleeland, 249 N.C. 16, 105 S.E.2d 114 (1958); Clolinger v. Callahan, 204 Ky. 33, 263 S.W. 700 (1924); 17 C.J.S. Continuances, §§ 27 and 31, Annot. 4 A.L.R.Fed. 929. Next, defendant contends the court erred in consolidating the four cases for trial and in ordering that the cases be tried only upon the issues of negligence and contributory negligence. G.S. § 1A-1, Rule 42(a), Rules of Civil Procedure, in pertinent part provides: "When actions involving a common question of law or fact are pending in one division of the court, the judge may order a joint hearing or trial of any or all the matters in issue in the actions; he may order all the actions consolidated; and he may make such orders concerning proceedings therein as may tend to avoid unnecessary costs or delay." It is well-settled that the trial court in the exercise of its discretion may consolidate several cases involving different plaintiffs against a common defendant when the causes of action grow out of the same transaction and substantially the same defenses are interposed if such consolidation does not result in prejudice or harmful complications to either party. 7 Strong, N.C. Index 2d, Trial § 8. Obviously, the four cases here arose out of the same transaction, i. e., the one car accident, and the same defenses were interposed to each claim. Plaintiff has failed to demonstrate that the order consolidating the cases for trial resulted in any harmful complications or prejudice to any party. Moreover, the trial judge supported his order to try the cases only on the issues of negligence and contributory negligence by finding that "considerable expense would be involved in the trial of the damage issues in the various cases, and that the ends of justice would best be served by a trial at this session on the negligence and contributory negligence issues only." Plaintiff has failed to demonstrate any abuse of discretion upon the part of Judge Seay in consolidating the four cases for trial on the issues of negligence and contributory negligence. These assignments of error are overruled. By his sixth, seventh, ninth, and tenth assignments of error, plaintiff contends the trial court erred in (1) allowing into evidence the results of a blood alcohol analysis performed upon the blood sample extracted from the deceased driver's corpse; (2) allowing a chemist from the SBI laboratory to give his opinion, based on the blood alcohol analysis, as to whether the deceased driver was under the influence of an intoxicating beverage at the time of the accident; (3) allowing a medical doctor to give his opinion, based on the blood alcohol analysis, as to whether the deceased driver was under the influence of an intoxicating beverage at the time of the accident; and (4) submitting to the jury an issue of contributory negligence. Upon evidence substantially identical to the evidence now before us, each of these questions was raised and argued by plaintiff in the prior appeal of this case. On authority of the opinion in the former appeal of Wood v. Brown, supra, and the citations therein, we hold these assignments of error to be without merit. Plaintiff has other assignments of error which he has argued in his brief which were not raised in the former appeal and which we have not discussed here. We have carefully considered each exception upon which *693 all of the assignments of error are based, including each exception to the charge, and conclude that plaintiff had a fair trial free from prejudicial error. No error. PARKER and CLARK, JJ., concur.
Mid
[ 0.555555555555555, 31.875, 25.5 ]
Q: Area between two polar curves using iterated integrals? The question is from a practice exam I am currently trying to do: I am really not sure how to go about this one. In essence, I'd imagine that the idea is to find the area of the greater curve, and then from that subtract the calculated area of the smaller one. How do I go about doing this? I figure you can do this with one iterated integral? Further, if possible, as an aside to this question, I am also wondering how to find the area of just one of these curves with iterated integrals? Thank you very much! A: You can just calculate the area of the $\text{outer curve} - \text{inner curve}$: $$\frac{1}{2} \int_0^{2\pi} \big(4 - \cos(3\theta) \big)^2 - \big(2 + \sin(3 \theta) \big)^2$$
High
[ 0.6633416458852861, 33.25, 16.875 ]
358 F.Supp. 900 (1973) W. A. LUCAS and A. S. Lucas, trading and doing business as Lucas Coal Company, et al., Plaintiffs, v. Rogers C. B. MORTON, Secretary of the Interior, et al., Defendants. Civ. A. No. 71-1117. United States District Court, W. D. Pennsylvania. May 15, 1973. *901 Henry J. Wallace, Jr., Reed, Smith, Shaw & McClay, Pittsburgh, Pa., for plaintiffs. Peter J. P. Brickfield, U. S. Dept. of Justice, Civil Div., Washington, D.C., and James Villanova, Asst. U. S. Atty., Pittsburgh, Pa., for defendants. Before ALDISERT and WEIS, Circuit Judges and SORG, District Judge. OPINION WEIS, Circuit Judge.[*] The plaintiffs are operators of surface coal mines (strip mines) located in Western Pennsylvania at whose behest this Three-Judge Court has been convened to consider challenges to the constitutionality of the Federal Coal Mine Health and Safety Act of 1969, 30 U.S. C.A. § 801 et seq. Certain features of the Act and its administration have come under attack by the plaintiffs who allege that: 1. The statute is discriminatory because its provisions include those applicable to deep coal mines as well as strip mines; 2. The statutory plan of enforcement denies due process; 3. Inadequate training of inspectors who administer the Act has resulted in harassment and unnecessary loss to the plaintiffs. The named plaintiffs are all independent owners and operators of strip mines located in Butler and Mercer Counties, Pennsylvania, constituting about 40 percent of small mine operators in these areas. During 1971 they produced a total *902 of approximately 900,000 tons of coal. Between October 6, 1971 and October 12, 1971, plaintiffs were served with notices of violations pursuant to Section 104(b) of the Act. These notices, which are quite similar to the usual form of citation, were based upon alleged violations of Mandatory Safety Standards for Surface Coal Mines and Surface Work Areas of Underground Coal Mines enacted by the Secretary of the Interior pursuant to authority granted by the Act. The specific notices, which plaintiffs have chosen to contest here, deal with failures to have adequate roll protection and audible backup warning devices on vehicles utilized in strip mine operations. Pursuant to Section 105[1] of the Act, the plaintiffs filed applications for review of the notices and hearings were held before authorized agency personnel on June 20 and June 22, 1972. No decisions have yet been rendered in those cases. At the time the citations or notices were issued, departmental representatives set initial periods of not exceeding 30 days within which the violations were to be abated. Hearings have not been scheduled on all of the notices as yet and no "orders of withdrawal", which is the sanction for failure to abate the violation, have been issued pursuant to agreement between the parties pending the decision in this case. In October of 1971 Lucas Coal Company was also served with an order of withdrawal pursuant to Section 104(a)[2] of the Act, which requires such action when an imminent danger exists. This order was later vacated after an appeal through the administrative procedures of the Department of the Interior. The plaintiffs are not now concerned with this particular incident and do not contend that Section 104(a) is unconstitutional since it may be invoked only when danger is said to be imminent. The Federal Coal Mine Health and Safety Act of 1969, which became effective on March 30, 1970, was designed to promulgate and provide enforcement of mandatory health and safety standards aimed at reductions in the number of coal mine accidents and incidents of occupational disease. Title I of the Act establishes the procedure for preparation of health and safety standards and their publication. On May 22, 1971 pursuant to this direction there were disseminated in the Federal Registry (36 F.R. 9364-Part 3), Part 77—Mandatory Safety Standards, Surface Coal Mines and Work Areas of Underground Coal Mines. Revisions were published on July 15, 1971 in 36 F.R. 13142. The main thrust of plaintiffs' attack centers on the provisions for enforcement set out in Section 104(b) which plaintiffs claim permit the inspectors to shut down the mine by means of a withdrawal order before the operator has an opportunity to have a hearing on notice of an alleged violation. Plaintiffs assert that a withdrawal order in effect deprives them of the opportunity to mine coal, to use their property, and thus results in severe financial loss. They contend that elementary due process requires that they be given the opportunity to be heard before a penalty is inflicted upon them. Section 104(b)[3] provides in effect that if a mine inspector finds that there is a violation of a mandatory safety *903 standard, which does not create an imminent danger, he may issue a notice to the operator fixing a reasonable period of time for the abatement. If at the end of that time the violation has not been corrected, the inspector issues an order to the operator requiring that all persons be withdrawn from the area where the mining is being carried on and which is affected by alleged infraction. In the context of the factual background of one of the violations, for example, when the mine inspector found that a large power shovel did not have the rollover protection set out in the mandatory safety standards, he issued a notice requiring compliance within a certain time. Failure to add the required equipment would result in a shutting down of the mine. Plaintiffs desired to present defenses alleging that such accessories are not readily if available at all on the market, are not desirable or necessary in the open strip mine type operation, and purchase would result in unnecessary and heavy expense. The administrative remedies available to the aggrieved operator are set out generally in Section 105(a)(1).[4] In essence the statute provides that an operator who has been issued such a notice may apply to the Secretary for review which permits an investigation by the Department and an opportunity for a public hearing. The Act, however, does not provide for a stay of the proceedings pending such public hearing, even though a petition for review is filed. It is possible to read the Act, therefore, as requiring an operator to make a choice between abating the alleged violation even though a hearing has not yet been held or subjecting himself to the severe penalties set out in the Act if his application for review is unsuccessful. Were such procedures mandated by the Act, we would indeed face serious claims of deprival of due process. The Department of Interior, in a decision by the Board of Mine Operations Appeals in the matter of Reliable Coal Corporation, Docket No. HOPE 71-50, has held that while Section 105 speaks only of the reasonableness of the time set out in the notice of violation as being a proper subject of review, this also includes the fact of violation itself. The Board reasoned that "any time for abatement is an unreasonable time if no violation exists," and that, "a decision *904 under 105(a) on the issue of reasonableness of time must inherently incorporate a determination if the violations did or did not occur." The Board went on to say, "In holding that an applicant's right of review under Section 105(a) of notices issued pursuant to Section 104(b) or (i) is limited to situations where the violation charged in the notice is unabated, we realize that any meaningful administrative review would have to take place within the time allowed by the Bureau for abatement. This is particularly significant since Section 105(d) provides that no temporary relief shall be granted in case of a notice issued under Section 104(b) or (i) of the Act. In these cases, therefore, the Office of Hearings and Appeals is prepared, upon request, to provide an expedited hearing and speedy ruling, where need be, to forestall the issuance of an order of withdrawal if it is determined that no valid basis exists for issuance of such order. We go further and say that the Office of Hearings and Appeals stands ready to provide expeditious review in any case where irreparable injury may result and time is of the essence to any applicant seeking to exhaust his administrative remedy." * * * * * * ". . . If there is undue or unreasonable delay, in prosecution of such cases, we recognize that such delay may be prejudicial and do violence to basic due process requirements for prompt and expeditious resolution of such proceedings, in which event remedial orders of an Examiner or this Board may be appropriate." It is apparent, therefore, that the Department of the Interior recognizes the requirements of due process which must be followed in the event of notices issued under Section 104(b). The Board of Appeals did point out that the statute itself, 105(d), says: "No temporary relief shall be granted in the case of a notice issued under Section 104(b) or (i) of this title." However, at oral argument the Government attorneys called our attention to Section 104(g) which does provide that "A notice or order issued pursuant to this section . . . may be modified or terminated by an authorized representative of the Secretary." Modification of an order, obviously, may consist of extending the time for abatement until after a hearing has been held and an opportunity extended to the operator to present his defenses. Further discretion is granted to the Secretary under Section 105(d) which provides that he may grant temporary relief from an order if a hearing has been held and that there is a likelihood that the findings of the Secretary will be favorable to the applicant and that such relief will not adversely effect the safety of the miners. Reduced to its simplest terms, the contention of the plaintiff, therefore, is that Sections 104(b) and 105(a) may be read and applied in such a fashion as to result in deprivation of their property before a hearing in situations where no imminent danger exists. Our analysis of the statute, however, leads us to the conclusion that by giving a broad interpretation to Section 104(g), the Secretary is enabled to take such steps as would be necessary to allow the plaintiffs to present their contentions to the administrative tribunal before imposition of an order of withdrawal. We have no reason to expect that the Secretary will not utilize such an approach since the decision of the Board of Mine Operations Appeals in the Reliable Coal case recognizes the due process issue and offers expedited hearings to cope with the problem. In a situation where alternative constructions of a statute are possible, due deference to the legislative branch of government and sound rules of statutory construction require us to choose that interpretation which will avoid a declaration of unconstitutionality. Since we find that such an interpretation is *905 possible in this case, we are unwilling to declare the statute unconstitutional on its face.[5] Having once adopted this position, we come now to consider the specific incidents of which the plaintiffs complain and the applicability of the doctrine of exhaustion of administrative remedies. We were advised by the Government at oral argument that administrative proceedings have already resulted in a modification of some of the mandatory standards which had been objectionable to the strip miners. This development and the vacation of the Lucas 104(a) withdrawal order through administrative action indicate that there is a possibility, if indeed not a probability, that the specific grievances of the plaintiffs in this case may be satisfactorily resolved by the departmental hearing method. Certainly the statute contemplates that the agency should have the opportunity to decide the disputes before there is recourse to the courts and decisional law supports such a policy. See McKart v. United States, 395 U.S. 185, 192, 89 S.Ct. 1657, 23 L.Ed.2d 194 (1969); Aircraft and Diesel Corp. v. Hirsch, 331 U.S. 752, 67 S.Ct. 1493, 91 L.Ed. 1796 (1947). For an analogous fact situation which arose under the Occupational Safety and Health Act of 1970, see Lance Roofing Co. v. Hodgson, 343 F.Supp. 685 (N.D.Ga.1972), cert. den. 409 U.S. 1070, 93 S.Ct. 679, 34 L. Ed.2d 659. Having found that the Act is not unconstitutional on its face, therefore, we will require the plaintiffs to exhaust their administrative remedies and will dismiss the Statutory Court phase of the litigation. We think it appropriate to note that we do not preclude the plaintiffs from applying to a single judge court for the issuance of an injunction in a situation where the Secretary would be infringing upon constitutional requirements of due process in failing to properly utilize his discretion under Section 104(g). If the aggrieved party can demonstrate, in a particular factual context, that irreparable harm will be done by failing to have a hearing before a withdrawal order is issued and that no countervailing interests of safety are involved, then the power of the court may be invoked under the authority exemplified by Mills v. Richardson, 464 F.2d 995 (2d Cir. 1972). The prohibition of injunctions set out in Section 513[6] of the Act refers to Titles II and III and, hence, would not be applicable, as we see it, to proceedings under Title I. We do not deem it necessary at this time to consider the effect of Section 106(c)(1)[7] in the event that a constitutional challenge to a specific action of the Secretary would be presented. We do not dwell long upon the plaintiffs' other main contention, that is, that there is unconstitutional discrimination embodied in the statute by its application to both deep coal mines and surface or strip mines. While a review of the Act supports the plaintiffs' contention that strip mines were added as an afterthought by Congress and that the verbiage might have been, but was not, appropriately revised to take care of the situation, nonetheless we find the contention of no merit. The regulations promulgated by the Secretary do delineate to some extent equipment used in surface type work as opposed to that in the deep mine. It is true that there is some grouping in other sections of the regulations but this in and of itself is not unconstitutional. There has been some understandable irritation by the plaintiffs and others in *906 the strip mining industry at the lack of appreciation by the Department and some of its new inspectors of the difference between surface mine conditions and those of the deep mines. We expect that modification of the pertinent regulations which is now in progress on a case-by-case basis, and experience gained by the inspectors will in time alleviate this problem. The issue of training of the inspectors which is mandated by the Act to be undertaken by the Secretary is not properly a matter for a Three-Judge Court and will be remanded to the single judge to whom this case will now be referred. We need express no opinion on that matter at this time. NOTES [*] At time this suit was filed and at argument, Judge Weis was a United States District Judge for the Western District of Pennsylvania. [1] 30 U.S.C. § 815. [2] 30 U.S.C. § 814(a). [3] "Except as provided in subsection (i) of this section, if, upon any inspection of a coal mine, an authorized representative of the Secretary finds that there has been a violation of any mandatory health or safety standard but the violation has not created an imminent danger, he shall issue a notice to the operator or his agent fixing a reasonable time for the abatement of the violation. If, upon the expiration of the period of time as originally fixed or subsequently extended, an authorized representative of the Secretary finds that the violation has not been totally abated, and if he also finds that the period of time should not be further extended, he shall find the extent of the area affected by the violation and shall promptly issue an order requiring the operator of such mine or his agent to cause immediately all persons, except those referred to in subsection (d) of this section, to be withdrawn from, and to be prohibited from entering, such area until an authorized representative of the Secretary determines that the violation has been abated." 30 U.S.C. § 814(b) [4] "An operator issued an order pursuant to the provisions of Section 104 [814] of this title, or any representative of miners in any mine affected by such order or by any modification or termination of such order, may apply to the Secretary for review of the order within thirty days of receipt thereof or within thirty days of its modification or termination. An operator issued a notice pursuant to section 104(b) or (i) [814(b) or (i)] of this title, or any representative of miners in any mine affected by such notice, may, if he believes that the period of time fixed in such notice for the abatement of the violation is unreasonable, apply to the Secretary for review of the notice within thirty days of the receipt thereof. The applicant shall send a copy of such application to the representative of miners in the affected mine, or the operator, as appropriate. Upon receipt of such application, the Secretary shall cause such investigation to be made as he deems appropriate. Such investigation shall provide an opportunity for a public hearing, at the request of the operator or the representative of miners in such mine, to enable the operator and the representative of miners in such mine to present information relating to the issuance and continuance of such order or the modification or termination thereof or to the time fixed in such notice. The filing of an application for review under this subsection shall not operate as a stay of any order or notice." 30 U.S.C. § 815(a)(1). [5] "To give such meaning is not barred by intellectual honesty. So to interpret is in the candid service of avoiding a serious constitutional doubt." United States v. Rumely, 345 U.S. 41, 47, 73 S.Ct. 543, 546, 97 L.Ed. 770 (1952). [6] 30 U.S.C. § 960. [7] 30 U.S.C. § 816(c)(1).
Low
[ 0.530837004405286, 30.125, 26.625 ]
The effect of parity on age-related degenerative changes in sagittal balance. Retrospective cohort study OBJECTIVE.: Evaluate the effects of parity (number of births) on measures of sagittal posture in older adult females. The long term objective of this study is to identify and mitigate factors contributing to age-related postural deformity in older adults. Adult spinal deformity is a prevalent condition that often requires costly surgical management. Females are disproportionately represented in spinal deformity surgical cases with up to 90% of patients being female. The potential contributions of pregnancy on postural degeneration have only begun to be acknowledged and require further study. Two hundred and eight females with standing lateral radiographs were selected from the TwinsUK register. Parity information was extracted from questionnaires. Sagittal balance measurements (thoracic kyphosis, TK; lumbar lordosis, LL; pelvic incidence, PI) were collected and PI-LL mismatch was calculated. One-way ANOVA tests were done between three separate age categories for measures of sagittal balance and parity and stepwise multivariate regression was done for PI-LL. Both age and PI-LL mismatch significantly differed between parity categories. PI-LL was on average 7.0 ± 2.5 ° greater in multiparous (3+ births) subjects than in nulliparous subjects (p < 0.01). Parity did not have an independent relationship with lumbar disc degeneration, lumbar BMD, or any of the individual sagittal balance parameters (p > 0.05 for all), except for PI-LL. From a sub-analysis of the effect of parity on sagittal alignment within twin pairs, we found that within pair differences in parity associate with within pair differences in thoracic kyphosis. This study established correlations between measures of spinal curvature in older women and parity for the first time. Longitudinal research is required to establish a causative relationship. 4.
High
[ 0.698005698005698, 30.625, 13.25 ]
Related Tags: The last sporting event of the 2010-11 academic year gets underway Friday with a few firsts at stake. Serra Catholic has gotten its act together since Chartiers-Houston upset the two-time district champion Eagles in the WPIAL Semifinals. Decisive wins over Elk County Catholic, Bishop Carroll, and Mercyhurst in the state playoffs have put Serra in position to win its first PIAA title, and it’s already the first team to make it to three title games in a row since the PIAA Baseball Championships began in 1979. The other WPIAL survivor is Riverside, which fought for wins over Karns City, Saegertown, and Martinsburg Central in the state tournament. The Panthers aim to become the first WPIAL team in history to win three PIAA baseball crowns after winning them back-to-back in 2005 and 2006. Meanwhile, the only District 7 team to reach the PIAA Softball Championships is Class AAA titlist Valley, which is trying to win its first-ever state championship in its first state final appearance. In between narrow victories over Punxsutawney and Bellefonte, the Vikings nipped WPIAL champion Yough to get there. A couple of firsts have already been etched in stone. For the first time ever the PIAA Baseball Championships will be played at Medlar Field at Penn State’s Lubrano Park, and the PIAA Softball Championships have moved to the brand-new Nittany Lion Softball Park on the PSU campus. Here’s what you need to know about the three games involving WPIAL teams: THE INSIDE PITCH: Can the Cinderella Cardinals of District 3, who barely snuck into the playoffs, find a way to hit Alain Girman? The Serra Catholic ace has pitched with a renewed purpose since a shaky outing against Carmichaels in the WPIAL Quarterfinals and will seek his 24th career varsity win in as many tries. He needs five strikeouts on Friday to reach 100 for the season. Furthermore, can Girman collect a few more hits of his own? He’s batting .438 with 22 RBI and nine extra base hits. Chris Miller, with a robust .638 average and eight postseason RBI, will be the real hitter to watch, however. It’s a tough task for Reading C.C. to contain this offense, but its own offense has come to life in the state playoffs with 19 runs in three rounds. Girman will have to worry about Mike Bean and Taylor Hafer, who went a combined 8-for-8 in the Semifinals, at the top of the order. He’ll also have to worry about keeping in check the emotions of Reading C.C., which is playing its last game before closing for good and merging with Holy Name School District to form Berks Catholic High School. PIAA CLASS AA BASEBALL CHAMPIONSHIP: Riverside (19-5) vs. Salisbury Township (20-6) – Friday, 3:30 THE INSIDE PITCH: The Panthers, after narrowly escaping Waynesburg at CONSOL Energy Park, have proven they can heat up their bats at will, and they may need that power against the Falcons’ explosive offense. Although Riverside certainly has the edge in terms of experience, Salisbury has a legitimate ace in Zach Harper, who has gone 8-2 with a 1.72 ERA and 75 strikeouts against just 29 walks. Look for Harper to try and help his own cause with his team-leading .395 average and 33 RBI. Most of the Falcons’ power comes from its young infield, led by Brad Vingoli, who enters the contest hitting .378 with 28 RBI at third base. Riverside’s offense seems to go whichever direction Ryan Finnegan goes; the shortstop/pitcher is hitting .426 and slugging .882 with 25 RBI and eight homers. But he has gotten help from guys like Tyler Falk, who has hit safely in ten of his last 11 games. Riverside’s success may very well depend on whether it can keep making contact and make Harper throw a lot of pitches. PIAA CLASS AAA SOFTBALL CHAMPIONSHIP: Valley (17-2) vs. Manheim Central (25-4) – Friday, 5:00 THE INSIDE PITCH: Following an emotional win over Yough and Nicole Sleith, one of the premier pitchers in the state, not to mention a heartbreaking loss in last year’s state playoffs on a controversial balk call, Valley pitcher Caitlin Nealer has been pretty much at the top of her own game. The Vikings have proven they can win any way imaginable, and they’ve shown the character of a champion by winning each of their state playoff games by one run, posting two shutouts in the process. The Barons, who play several underclassmen, have also showed mettle by winning close games in these PIAA playoffs, but unless they can play some serious small ball (and the Vikings’ defense really lets them down), don’t be surprised if and when Valley’s season ends with a gold medal ceremony.
Mid
[ 0.6099290780141841, 32.25, 20.625 ]
Q: HTML elements change location depending on window size Hello fellow web developers, I am quite new to web development and have been practicing on my own. I'm trying to create a website and am currently using HTML and CSS. I want the following presentation for the homepage of my website: I have been testing around with wrappers and body wrappers so that when I open the website on one monitor all the elements are displayed in the middle like the picture above, and when I open the website on my other smaller monitor it should be the same and display all the elements with the same layout. The problem is the navigation bar the title and everything changes position once the window size changes. Here is the code i currently have: <!DOCTYPE html> <html> <title>WUNI</title> <meta charset="UTF-8"> <meta name="viewport" content="width=device-width, initial-scale=1"> <link rel="stylesheet" href="styles.css"> <body> <!-- !PAGE CONTENT! --> <div> <!-- NAV BAR --> <a id="nav"> <a href="/archive.html" class="item" class="max-width">Archive</a> <a href="/index.html" class="item" class="max-width">Home</a> <a href="/contact.html" class="item" class="max-width">Contact</a> </a> <div id="title"> <h1 class="max-width">WUNI</h1> </div> <p id="motto" class="max-width">With a wide range of skills, we generate cohesive content that span from physical posters to interactive 3D web content </p> </div> <!-- BODY BORDER XD --> <div id="left"></div> <div id="right"></div> <div id="top"></div> <div id="bottom"></div> <!-- Footer --> <footer id="footer"> <i></i> </footer> </body> </html> and here is my css: body { background-color: red; margin-right: auto; margin-left: auto; max-width: 960px; padding-right: 10px; padding-left: 10px; } /** * Using max-width * will improve the browser's handling of small windows. * This is important when making a site usable on small devices. */ .max-width { max-width: 960px; margin-left: auto; margin-right: auto; } /* end of special */ /* NAV BAR */ #nav{ display: inline-block; padding-top: 20%; padding-left: 0%; } .item{ color: white; text-decoration: none; font-size: 50px; padding-bottom: 20px; padding-left: 50px; font-family: Impact; } .item:hover{ background-color: blue; } /* END NAV BAR */ #title{ position: absolute; color: white; font-size: 150px; text-align: center; font-family: Impact; top: 10%; left: 30%; } #motto{ position: absolute; color: white; font-size: 20px; text-align: center; font-family: Impact; top: 70%; left: 20%; } #footer{ position: fixed; left: -3%; bottom: 0; padding-bottom: 8%; width: 100%; background-color: transparent; color: white; text-align: center; } /* BODY BORDER */ #top, #bottom, #left, #right { background-color: white; position: fixed; } #left, #right { top: 0; bottom: 0; width: 30px; } #left { left: 0; } #right { right: 0; } #top, #bottom { left: 0; right: 0; height: 30px; } #top { top: 0; } #bottom { bottom: 0; } /* END BODY BORDER */ If anybody could help me out, I would greatly appreciate it! :D A: I would recommend using a grid system to achieve this. A grid system solves all the issues you are having currently with your css. One of my personal favorites is bootstrap as it works across browsers, various screen sizes and comes bundled with a bunch of other useful features as well. As you are new to web development and bootstrap, you can use a visual bootstrap builder such as layitout to get off the ground really quickly. Also another tip based on your css, you might want to think about making your font sizes responsive too. This answer should be a good starting point
Low
[ 0.508235294117647, 27, 26.125 ]
Q: Can a type in a lower universe be formed from types in higher universes? A type universe is a type of small types that is closed under the basic type formation operations (dependent product, sum, coproduct etc.), that is to say for example that from $A \colon U_i$ and $x \colon A \vdash B[x] \colon U_i$ derive $\prod(x\colon A).B[x] \colon U_i$. I haven't yet found anything in my reading that discusses the effects of having $\prod(x\colon A).B[x] \colon U_i$, $A \colon U_{i+1}$ and $x \colon A \vdash B[x] \colon U_{i+1}$ derivable, but $A \colon U_i$ and $x \colon A \vdash B[x] \colon U_i$ not derivable. Does anything interesting arise if we require the converse of type formation rules to hold, and add in "type formation conditions" stating e.g. "from $\prod(x\colon A).B[x] \colon U_i$ derive $A \colon U_i$" (or similar things for other types)? N.B. I've been thinking about this in the setting of Russell-style universes, and am equally unsure what happens in Tarski-style universes. Edit --- I have just realized that my question is somewhat silly in the usual context, where typing judgments are made in the presence of type contexts for variables, which requires one to derive $A \colon U_i$ etc. before being able to derive $\prod(x\colon A).B[x] \colon U_i$. I am however currently working in a different formulation which needs a bit more explaining, and so I'll add more information soon. A: I expect you're right that if the only primitive rules for universes are "closure" ones such as $$\frac{\vdash A:U_i \qquad x:A \vdash B[x] : U_i}{\vdash \prod(x:A). B[x] : U_i}$$ then there should be a metatheorem that whenever $\prod(x:A). B[x] : U_i$ it must have been derived by this rule so that we have $A:U_i$ and $x:A \vdash B[x] : U_i$ as well. (Such metatheorems are generally quite a lot of work to actually prove, so I hesitate to assert that there is such a theorem, but it seems plausible to me.) However, there are type theories containing primitive rules allowing types in smaller universes to be built out of types in bigger ones. Probably the most well-known of these is asking for a small universe such as $U_0$ to be "impredicative" in the sense that it is closed under products of arbitrarily sized domain: $$\frac{\vdash A:U_i \qquad x:A \vdash B[x] : U_0}{\vdash \prod(x:A). B[x] : U_0}$$ For instance, in the Predicative Calculus of Inductive Constructions that underlies the Coq proof assistant, the universe Prop is impredicative in this sense. The impredicative Calculus of Inductive Constructions, which can be turned on by the option --impredicative-set, also includes another impredicative universe Set, although these are "parallel" rather than "sequential" (that is, we have Prop : Type1 and Set : Type1 but not Prop : Set) --- I believe it is known to be inconsistent to have one impredicative universe containing another impredicative universe, although two "parallel" impredicative universes are known to be consistent (relative to standard set theory). Vladimir Voevodsky suggested another class of "bigger into smaller" universe rules that he called "resizing rules", and which can be described generally by "adding extra useless junk to a type shouldn't raise its universe level". For instance, one such rule is that if $A:U_i$ and $B : U_j$ for $j>i$, while $A\simeq B$ (an equivalence/isomorphism of types), then $B:U_i$. Another is that if $A:U_i$ and $A$ is a subsingleton (i.e. $\prod(x:A)(y:A). x=y$), then $A:U_0$. As far as I know, none of these rules are known to be consistent. A general framework for describing and studying type theories containing families of "universes" (not necessarily sequentially ordered) with arbitrarily chosen universe-assignments for the types in the $\prod$-formation rule is pure type systems. A PTS is specified by a set of sorts (the universes), a set of axioms of the form $s_1:s_2$ for sorts $s_1,s_2$ (specifying which universes belong to which others), and a set of rules of the form $(s_1,s_2,s_3)$ each specifying a way to assign universes to the types in $\prod$-formation: $$\frac{\vdash A:s_1 \qquad x:A \vdash B[x] : s_2}{\vdash \prod(x:A). B[x] : s_3}$$ PTS's are very general and include even the inconsistent theory $U:U$.
Mid
[ 0.5547785547785541, 29.75, 23.875 ]
Editor's Note: The Goat Parade contributor Omar Avalos, a Santa Ana resident, makes a case below as to why his city should be the home of LAFC. Approximately 32 miles south of Downtown Los Angeles, down the I-5 Santa Ana freeway, is the City of Santa Ana, that continues to be an option for a Major League Soccer club to locate to, as was revealed on the new Los Angeles Football Club's, website. Santa Ana is a name as synonymous with LA as any other, it's very commonplace, particularly if you're driving in a direction south of LA or if the Santa Ana winds, locally referred to as the "Santa Anas" by Angelenos have done a number on your front lawn, etc. etc. A number of pro soccer clubs have had something to do with Santa Ana over time, either in playing temporarily at Eddie West Field (Santa Ana Stadium) downtown, or in scouting young talent citywide, but for a time there was talk of bringing top level Major League Soccer here. Former professional soccer players like Santa Ana College coach José Vásquez, who played for the LA Galaxy and Chivas de Guadalajara, or "El Querétaro" Hernández, who played for Club América, have plied their trade here as coaches. This option to locate to Santa Ana remains, a bit surprising to outsiders, perhaps, but maybe not at all surprisingly because Santa Ana is recognized as a significant soccer market. Major League Soccer's LA Galaxy bombarded the area with billboards and ads on bus routes around in the past, and during their runs for MLS Cup for example, and they have an official pub at The Olde Ship here. In fact, their ads here are commonplace. It's no secret that Latinos makeup a very important soccer market, and that fact rings true here in Santa Ana. Cities in the Greater Santa Ana area like Anaheim, Orange, Costa Mesa, Placentia, and Fullerton also have significant Latino populations and quarters, with avid soccer practitioners and amateur leagues. No marketer is going to deny that this is a coveted soccer demographic; not Soccer United Marketing, MLS, Liga MX, nor LAFC. A Not So Little Saigon Inside and at Santa Ana city limits is Little Saigon, also referred to as "Bolsa," by local people of Vietnamese descent, in reference to the street where this Little Saigon commercial area sprouted. Little Saigon is perhaps more associated with the cities of Garden Grove, Westminster and Fountain Valley depending on who you talk to, but Santa Ana has always had historic ties to the Vietnamese diaspora. There are decades-old, and newer, Vietnamese-American places of worship in Santa Ana like the Bat Nha Buddhist Temple on Sullivan street between McFadden and Willits streets, The First Vietnamese Catholic Center on Harbor and 17th streets, Our Lady of La Vang Catholic Church also on Harbor, the newest Buddhist Temple on First street right at the Santa Ana River, nearing Fairview street, the temple on Newhope, near Fifth street... There are many Vietnamese centers inside of Santa Ana proper, well and far east of Euclid, that it throws into question why some call Euclid street, on the western-most side of Santa Ana, the Little Saigon boundary. Santa Ana is represented on the Orange County Board of Supervisors, with their headquarters in downtown Santa Ana, by Janet Nguyen (R), the first Vietnamese-American elected to that board. Why be near a Little Saigon? Maybe cultural, economic ties aren't important to investment groups, maybe they shouldn't be. I'm guessing that they are to Henry Nguyen, given that he has cultural and economic ties here and abroad. I don't think that anyone can ignore that this area, for it's proximity to a Little Saigon, is an attractive prospect, at least for him. Neither can anyone ignore it's proximity to Santa Ana's soccer market and it doesn't matter who or what you are: Peter Guber, Tom Penn, Magic Johnson, LA Galaxy (as they've already demonstrated with their repeated ads here), and so forth. And in case you're wondering, there is plenty of interest in soccer in the Vietnamese-American community as shown through the Vietnamese Orange County Soccer League. Santa Ana is diverse Not only are there important numbers of Latin-American and Asian-American populations in and around Santa Ana, there is an influx of the young and hip into the city's downtown, which is a common argument made for attracting something like LAFC. Santa Ana's downtown has been revitalized with original businesses only found here, making it very hip. Newcomers are choosing to settle here. Combine the demographics in Greater Santa Ana, including the cities of Orange, Irvine, Garden Grove, Anaheim, and you get a very diverse metropolitan area. So where in Santa Ana? Former talk of building a soccer stadium in Santa Ana included Willowick Golf Course near 5th and Harbor streets, by the Santa Ana River, and that option makes much sense still. Willowick happens to be at the edges of Santa Ana and Garden Grove, where there is the most intersecting of the local Mexican-American and Vietnamese-American communities of any place in Southern California. The cities of Santa Ana and Garden Grove are also expecting to build a street car / light rail along the old Pacific Electric Right of Way, and that route passes along Willowick. While completing construction on that proposed route is a ways off, the idea of having mass transit service that site is very appealing. The Santa Ana / Greater Santa Ana area has everything a club could ask for in diversity, youth, population and more. MLB, the NHL, Disneyland and Knott's Berry Farm are our neighbors. Their examples prove that there is a market for first-rate entertainment and sports entertainment here. Santa Ana truly is an ideal location. I love LA proper, downtown, Placita Olvera, Disney Hall, the Music Center, Grand Park... there's much to like about LA. I like riding the Blue, Red and Gold lines. Driving by the Sports Arena on the 110 freeway, looping on the junction to the 10 is fascinating, to me, when there's no traffic of course. I'm sure I'd enjoy catching a game there if the LAFC team manages to land a stadium deal at Exposition Park. But that there's a chance for LAFC to locate here means that it's my duty as a Santaniego, or "Santa Anan" if you will, to tell the leadership at LAFC and the world why it's such an ideal place for them here. I'd be remiss not to mention that up to today, Santa Ana remains the only political entity to table a memorandum of understanding, in a council meeting, as part of the people's business, to enter into discussions with MLS's second LA team. That's where we left off. What do you think? Leave a comment below!
Mid
[ 0.5995203836930451, 31.25, 20.875 ]
The present invention relates to a carriage assembly for a printer and in particular a detachable carriage assembly which can be quickly and easily detached and replaced as necessary. It should be understood that while the invention relates to a carriage assembly for any types of a printer, it will be discussed herein in relationship to a typewriter as the particular type of printer in which the invention is used and, therefore, whenever the word typewriter is used hereinafter, it is intended to cover all types of printers. The prior art carriage assembly for typewriters are attached to the typewriter frame in a very complicated and unwieldy manner. The carriage mechanism is integrally formed with a pulley support assembly and may include the daisy wheel or other print mechanism, the motor to drive the print mechanism, the solenoid to cause the print mechanism to engage the platen holding the paper, the ribbonholder and ribbon winding mechanism, any ribbons used for erasure, any electrical circuits for driving the electronics on the print mechanism, and other mechanical or electrical equipment. Further, since the carriage assembly usually moves on parallel horizontal shafts, bearings must be utilized on those shafts and as the bearings wear through use, and it becomes necessary to replace them, or if for any reason the carriage has to be removed, the entire carriage assembly and pulley support assembly must be removed and replaced and the cables removed and the procedure by which this is accomplished is very time consuming and complex. In such cases, the cable tension must be readjusted. In other cases, the shaft or shafts on which the pulley support assembly and combined carriage assembly ride must be removed entirely in order to remove the carriage assembly. This is also a complex and time consuming procedure. The present invention overcomes the disadvantages and complexities of the prior art by providing a carriage assembly having all the elements thereon as described above and yet which is detachably mounted on a pulley support assembly movably coupled to one of two spaced supports and slidably attached to a bearing assembly slidably mounted on the other of said spaced supports. Thus simply by removing two screws which hold the carriage assembly to the pulley support assembly, the carriage assembly may be lifted off the pulley support assembly and slidably removed from the bearing assembly on the other parallel support, the electrical cable disconnected and the entire unit removed and replaced in like manner in simply a matter of minutes. Further, the pulley support assembly on which the carriage assembly rides has an adjustable bearing by which it is mounted on the first parallel support whereby, as wear occurs, the bearing can be adjusted and tightened without having to remove the pulley support assembly. Further, the pulley support assembly has its own cable drive system which moves the pulley support assembly in a horizontal plane parallel to the cylindrical platen thereby carrying the carriage assembly in proximate spaced relationship to the platen for typing purposes. The pulley support assembly has its own cable tension adjusting means attached to the cable which can be adjusted separately to maintain the proper tension on the cable for proper carriage movement. Further, inasmuch as the pulley support assembly is carrying the detachable carriage assembly, it is desirable and necessary that means be provided for adjusting the relative position of the carriage assembly with respect to the cylindrical platen. Normally this is done by adjusting the cylindrical platen in both vertical and horizontal planes. In the present invention, it is accomplished by a simple adjustment of the parallel support carrying the pulley support assembly whereby the parallel support is adjusted in a horizontal plane by a simple movement thus enabling the carriage assembly riding upon the pulley support assembly to also be moved in relationship to the cylindrical platen.
Mid
[ 0.5613382899628251, 37.75, 29.5 ]
Masjid Semabok is an old mosque in Malacca. The imam there once was Cikgu Yusof bin Buntal. He left Malacca for his Hajj in Makkah on 10 June 1954 (about 2 months before the Hajj). Imam Yusof was the Qadhi for several Malay marriages which he conducted at Masjid Semabok. Some of the Malay couples have migrated to Western Australia and I met some of the couples while doing my PhD at UWA in 1986-89. They still remembered Imam Pak Ji Usop which was his call name. I don't have the date when Imam Yusof passed away. Will ask my Malacca cousins. These photos below were taken by my father after the Japanese war, after he returned to Malacca from Kirkby, England, and before he got married. They were retrieved from his collection of printed photos. Other photos of Imam Yusof's family (mainly his children) are in my Facebook. Cikgu Yusof standing in the anjung of his small wooden Malay house in Semabok, and facing the villagers who came to see him at home before he left for Makkah. A young Cikgu Yusof bin Buntal, Imam of Masjid Semabok in Malacca, before he went for Hajj. My father's handwritten notes on the back of Cikgu Yusof's photo. Cikgu Yusof was my father's elder brother-in-law and mentor, after his own father had passed away. Here is some update for Dr Abdul Aziz bin Omar, an early Malay doctor. 29 March 2013 I have managed to trace and contacted his eldest son's family in KL. I have sent a copy of my book Biography of the Early Malay Doctors to one of his granddaughters, Idora bt Abdul Rashid. Idora will get her father, Abdul Rashid bin Abdul Aziz, to check his father's biography which I have written before I knew the family and had any family contact. There is a younger daughter, Hjh Rashidah bt Abdul Aziz who lives in the family home at 3955 Jalan Telipot in Kelantan. I have the address as provided by Idora's mother but I haven't had the time to visit the house. I checked my photos of Telipot homes, and I have in my collection a 2011 photo of the entrance (opened gates) to the home. I will wait till I get corrections from Idora's parents and then try and make a visit to Telipot and also (in sya Allah) to KL to meet with Idora and her parents. Idora has not met her grandfather as he passed away before she was born. A reader also wrote comments about Dr Abdul Aziz bin Omar's Penang relatives somewhere in this blog. The reader knew the family members. I hope to be able to correct and edit the biography of Dr Abdul Aziz bin Omar and also insert better photos once I get them from his son and family, in sya Allah. I visited Hjh Rashidah at home on Telipot in 2018, and got a few photos of Dr Abdul Aziz bin Omar. Please write to me if you know Dr Abdul Aziz bin Omar or know him. Dr Abdul Aziz bin Omar was with Rotary Club in Kota Bharu, Kelantan in 1962/63. He was the immediate past president (in 1962). Dr. TINKER: DISRUPTIVE FORCES NO WORRYThe Straits Times, 22 January 1963, Page 7http://eresources.nlb.gov.sg/newspapers/Digitised/Article/straitstimes1963 Dr Hugh Russell Tinker, Reader in Politics and Government in the University of London, said here that territories wishing to join Malaysia should not worry too much about forces trying to disrupt the move. He was speaking at a weekly Rotary Club luncheon on the common ties of South-East Asia. Good move. The immediate past president of the club, Dr Abdul Aziz bin Omar, asked what he thought of Malaysia. Dr Tinker said: "I feel it is a good move that the countries proposing to join Malaysia can stand as a solid body. Countries joining Malaysia should not worry too much on outside forces aiming to stop the formation of Malaysia. These forces will get nowhere if you unite and achieve your aims."
Mid
[ 0.5839080459770111, 31.75, 22.625 ]
Q: Finding Occurrences in a String in Assembly x86 I have been working on this program where I have to input a string and then display the character distribution in that string. For example: if the input is “minecode” the output should be C – 1 O – 1 D – 1 E – 2 I – 1 M – 1 N – 1 Here is what I tried to do, but I really don't know how to traverse the loop and check for similar character and then increment the count. The assembler is MASM 615 running on a 32 bit machine. .686 .MODEL flat, stdcall .STACK INCLUDE Irvine32.inc .DATA msg0 BYTE "Enter a string of characters: ",0 msg1 BYTE "Character Distribution: ",0 MainArray dword 10000 dup (?) UniqueChar dword 10000 dup (?) CharCount dword 10000 dup (?) .CODE MAIN PROC lea edx, msg0 call WriteString call dumpregs ; 1 call ReadString mov MainArray, eax call dumpregs ; 2 mov MainArray, ebx call dumpregs ; 3 call CRLF lea edx, msg1 call WriteString call CharDist ; Calls the procedure call dumpregs ; 5 exit MAIN ENDP CharDist PROC mov ecx, lengthof MainArray mov esi, OFFSET MainArray L1: ; what to do here?? Loop L1: CharDist ENDP END MAIN A: One possible approach: make an array of 256 counters, store its base address in ebx, and for each byte in the string, increment the counter at that offset from ebx. Afterward, loop over your array of counters and print the nonzero counts. You never say whether this is a string terminated by a 0 byte (C-style), one preceded by its length (Pascal-style), or one whose length is passed in as a second parameter, but that will determine when you terminate the loop. If you’re looking for a terminating zero, test the byte you just read, and if you’re counting a specific number of bytes, keep the count of bytes remaining in ecx and test that. (There are special instructions to branch conditionally if ecx is not zero, if you feel like using them.) If you keep your pointer to the string in esi, you can load the next byte into al with the lodsb instruction. Alternatively, you can mov from [esi] and then inc esi. If you zero out eax before storing each byte in al, this will give you an index in eax that you can use with an array of counters. A: Other possible approach: Should be easier to understand and actually it is very "human" straightforward (like how would you do it on paper with pencil), so I wonder how you didn't come up with this one ... you should not only try to understand how this works, but also try to figure out why you didn't see it, what is confusing/blocking you. for all letters of alphabet [A-Z] as "letter" { counter = 0; for all characters in input string as "char" { if (letter ignore_case_equals char) ++counter; } if (0 < counter) { display "letter - counter" and new line. } } This may be actually faster for English alphabet and short string, like 3-5 letters (containing letters only); than the suggested count sort, as alphabet is 26 chars and count table is 256 bytes, so 256/26 = ~9. But count table will reveal count for any character, including non-alphabet ones and also it will stall less on branching. Also notice, how you did start with emitting code for prompts/input/etc... things you already could do in Assembly, avoiding the unknown. I did start with almost-English description of algorithm. Because I don't care, what I know to write in Assembly (I already know, that pretty much anything :) ), first I want to be sure I know what I want the code do for me and what kind of data I want to process. Then I will command the CPU to do it, by finalizing the data structures plan and splitting those English notes into simpler and simpler steps, until they start to resemble instructions, then I fill up the instructions between comments. Don't skip the native language reasoning phase, it may save you lot of work on the code, if you figure out some elegant way to organize data or cut down algorithm steps by reusing certain part of it. Not every problem has short elegant solution, but many have.
Mid
[ 0.5706806282722511, 27.25, 20.5 ]
T.C. Memo. 2003-227 UNITED STATES TAX COURT DAVID RUSSELL JACOBSON, Petitioner v. COMMISSIONER OF INTERNAL REVENUE, Respondent Docket No. 11372-01. Filed July 30, 2003. David Russell Jacobson, pro se. Luanne S. DiMauro, for respondent. MEMORANDUM FINDINGS OF FACT AND OPINION CHIECHI, Judge: Respondent determined the following defi- ciency in, and additions to, petitioner’s Federal income tax (tax): - 2 - Additions to Tax Year Deficiency Sec. 6651(a)(1)1 Sec. 6654(a) 1993 $18,904 $1,903.75 $266.45 The issues remaining for decision are:2 (1) Is petitioner entitled to deduct for 1993 certain claimed charitable contributions? We hold that he is not. (2) Is petitioner liable for 1993 for the addition to tax under section 6651(a)(1)? We hold that he is. (3) Is petitioner liable for 1993 for the addition to tax under section 6654(a)? We hold that he is. FINDINGS OF FACT Most of the facts have been stipulated by the parties and are so found. At the time petitioner filed the petition in this case, he resided in Chicago, Illinois. During the year at issue, petitioner received wages of $73,515 from OR Human Resources and other income of $4,280 from Occupational Medical Care, Inc. However, petitioner did not file a tax return for that year. 1 All section references are to the Internal Revenue Code in effect for the year at issue. All Rule references are to the Tax Court Rules of Practice and Procedure. 2 Petitioner concedes the determinations in the notice of deficiency (notice) to increase his income for the year at issue. Respondent concedes that, instead of the standard deduction (i.e., $3,100) that respondent allowed petitioner in the notice, petitioner is entitled to deduct for the year at issue $3,541 of mortgage loan interest and $1,083 of points paid during that year. - 3 - On July 31, 2001, respondent issued to petitioner a notice with respect to his taxable year 1993. In that notice, respon- dent determined, inter alia, that petitioner is liable for the year at issue for additions to tax under sections 6651(a)(1) and 6654. OPINION Respondent claims that section 7491 does not apply in the instant case because the examination of petitioner’s case began prior to July 22, 1998. The record does not establish when respondent’s examination of petitioner’s taxable year 1993 began. Assuming arguendo that that examination began after July 22, 1998, we find that petitioner’s burden of proof relating to the deficiency determination does not shift to respondent under section 7491(a). That is because petitioner has not complied with the substantiation and record-keeping requirements of section 7491(a)(2)(A) and (B). Accordingly, assuming arguendo that respondent’s examination of the year at issue began after July 22, 1998, we find that petitioner has the burden of proving that respondent’s deficiency determination is wrong. Rule 142(a); Welch v. Helvering, 290 U.S. 111, 115 (1933). With respect to any deductions that petitioner is claiming for the year at issue for charitable contributions, deductions are strictly a matter of legislative grace, and petitioner bears the burden of proving that he is entitled to any such deductions - 4 - claimed. INDOPCO, Inc. v. Commissioner, 503 U.S. 79, 84 (1992). Petitioner claimed at trial that he is entitled to deduct for the year at issue money that he contends he contributed to various charitable organizations during that year. In support of that claim, petitioner relied on his general, conclusory, and uncorrobrated testimony. We are unwilling to rely on that testimony. In order to be deductible, contributions of money must be substantiated by a canceled check, a receipt from the donee, or other reliable written records. Higbee v. Commis- sioner, 116 T.C. 438, 443 (2001); sec. 1.170A-13(a)(1), Income Tax Regs. On the record before us, we find that petitioner has failed to satisfy his burden of substantiating his claimed charitable contributions during 1993. We turn now to the determinations in the notice that peti- tioner is liable for additions to tax under sections 6651(a)(1) and 6654(a). With respect to section 6651(a)(1), petitioner concedes that he did not file a tax return for the year at issue. Assuming arguendo that respondent’s examination of the year at issue began after July 22, 1998, we find that respondent has satisfied respondent’s burden of production under section 7491(c) with respect to respondent’s determination under section 6651(a)(1). In support of his position that he is not liable for the addition to tax under section 6651(a)(1), petitioner claimed at - 5 - trial that he did not have the “proper information” and therefore could not file a tax return for 1993. In support of that claim, petitioner relied on his general, conclusory, and uncorroborated testimony. We are unwilling to rely on that testimony. Assuming arguendo that we were to accept petitioner’s testimony about why he failed to file a tax return for the year at issue, the un- availability of information or records does not necessarily establish reasonable cause for failure to file timely a tax return. See Elec. & Neon, Inc. v. Commissioner, 56 T.C. 1324, 1342-1343 (1971), affd. without published opinion 496 F.2d 876 (5th Cir. 1974). A taxpayer is required to file timely based upon the best information available and to file thereafter an amended return if necessary. Estate of Vriniotis v. Commis- sioner, 79 T.C. 298, 311 (1982). On the record before us, we find that petitioner has not met his burden of proving that he is not liable for the year at issue for the addition to tax under section 6651(a)(1). With respect to section 6654(a), petitioner does not dispute that he did not pay estimated tax for the year at issue. Assum- ing arguendo that respondent’s examination of the year at issue began after July 22, 1998, we find that respondent has satisfied respondent’s burden of production under section 7491(c) with respect to respondent’s determination under section 6654(a). Petitioner claimed at trial that his failure to make esti- - 6 - mated tax payments was somehow related to Form W-4, Employee’s Withholding Allowance Certificate (Form W-4), which was filed with an office of the government of the State of Kentucky. Petitioner has not made any argument that any of the exceptions in section 6654(e) apply in the instant case. On the record before us, we find that petitioner has not met his burden of proving that he is not liable for the year at issue for the addition to tax under section 6654(a). To reflect the foregoing and the concessions of the parties, Decision will be entered under Rule 155.
Low
[ 0.49119373776908004, 31.375, 32.5 ]
For the past year, we’ve ranked nearly 12,000 React.JS articles to pick the Top 10 stories (0.065% chance) that can help you prepare your Front-end career in 2017. This is an extremely competitive list and Mybridge has not been solicited to promote any publishers. Mybridge AI ranks articles based on the quality of content measured by our machine and a variety of human factors including engagement and popularity. This React list includes topics such as: Redux, React Native, Style Guide, Relay, Open Source, Components, Router, UI Kits Give a plenty of time to read all of the articles you’ve missed this year. You’ll find the experience and techniques shared by React leaders particularly useful If you are looking for open source projects,
High
[ 0.6600985221674871, 33.5, 17.25 ]
Jimmy’z Sporting Monte-Carlo Join the international jet set at the highly selective Jimmy’z Sporting Monte-Carlo nightclub. At the heart of the Sporting Monte-Carlo complex, Jimmy’z is one of the world’s legendary nightclubs and hosts the Riviera’s most glamorous nights out on the town. Spacious yet intimate, Jimmy’z unique design and location by the sea has created a very special atmosphere, attracting the world’s biggest names to the turntables: Bob Sinclar, Axwell, Martin Solveig, David Morales and Boy George to name a few. Year after year Jimmy’z continues to enchant a chic international clientele, including stars of show business, fashion and sport, who come to relax or celebrate important events. The new resort: 334 rooms including 22 suites, heated indoor and outdoor swimming pools, a sandy-bottomed lagoon, the Spa Cinq Mondes, state-of-the-art facilities and walking distance to the famous Sporting Monte-Carlo. Welcome to a legendary hotel that has been redesigned by India Mahdavi: 40 rooms, including 14 suites and junior suites, the gourmet Elsa restaurant, a sweeping view of the Mediterranean, a water sports club and Olympic-size swimming pool. The legendary terrace of the Café de Paris epitomises the very special ambiance of this venue on Place du Casino. Open all year round from breakfast until late at night, it offers a wide range of drinks and exotic cocktails for those who enjoy watching the glamorous world of Monte-Carlo go by. Basking in the sunshine, surrounded by lush greenery as you listen to the sound of the waves, this is an ideal spot to tuck into grilled fish or a buffet at lunchtime, or yield to the temptations of a well-orchestrated menu in the evening. From its lofty position on the eighth floor, this restaurant offers a new interpretation of Mediterranean gourmet cuisine. In summer the roof slides back to reveal one of the most beautiful views on the Côte d’Azur. A restaurant offering French gastronomy which welcomes gourmet players between two rounds of Chemin de Fer, without leaving the gaming rooms, with the bonus of an enchanting view of the sea and Cap-Martin. With its unusual design, terrace by the sea, billiards room and DJ, the Blue Gin is a venue you have to visit at least once when in Monaco. The spacious lounge is the perfect place to relax and peruse a highly original drinks menu. The legendary terrace of the Café de Paris epitomises the very special ambiance of this venue on Place du Casino. Open all year round from breakfast until late at night, it offers a wide range of drinks and exotic cocktails for those who enjoy watching the glamorous world of Monte-Carlo go by. A heavenly spot in which to relax in a lounge atmosphere under the palm trees: open daily from 4pm to 1am. Lulled by the lapping of the waves the Monte-Carlo Beach dozes in the sun before all five senses come alive at night. This SPA draws inspiration from the inherent harmony in the architecture and ambiance of the Monte-Carlo Beach itself: 80m² dedicated to well-being with three massage rooms, a hammam, and treatment products and programmes by La Prairie. Experience magical moments as a family at the Hôtel Hermitage Monte-Carlo. Children are offered a choice of multiple activities: indoors or out, playful or delicious, alone or accompanied, to reconcile fun for children and peace of mind for parents! The legendary terrace of the Café de Paris epitomises the very special ambiance of this venue on Place du Casino. Open all year round from breakfast until late at night, it offers a wide range of drinks and exotic cocktails for those who enjoy watching the glamorous world of Monte-Carlo go by. Basking in the sunshine, surrounded by lush greenery as you listen to the sound of the waves, this is an ideal spot to tuck into grilled fish or a buffet at lunchtime, or yield to the temptations of a well-orchestrated menu in the evening. From its lofty position on the eighth floor, this restaurant offers a new interpretation of Mediterranean gourmet cuisine. In summer the roof slides back to reveal one of the most beautiful views on the Côte d’Azur. A restaurant offering French gastronomy which welcomes gourmet players between two rounds of Chemin de Fer, without leaving the gaming rooms, with the bonus of an enchanting view of the sea and Cap-Martin.
Low
[ 0.518518518518518, 28, 26 ]
Study Makes Gastric Bypass and Gastric Sleeve Procedures Accessible to Patients with a Body Mass Index Lower than the Current Threshold to Qualify for Surgery New Jersey Bariatric Center is accepting new participants in a weight loss surgery study that makes bariatric surgery accessible to patients with a body mass index (BMI) of 30-35, lower than the current threshold to qualify for surgery. According to Ajay Goyal (New Jersey Bariatric Center surgical director and principal investigator),the study, which is the only of its kind in New Jersey, will add to the growing body of evidence that shows gastric bypass and sleeve gastrectomy are effective in reducing obesity related illnesses in patients suffering from moderate obesity. Current bariatric surgical guidelines, which were established in 1991, restrict gastric bypass and sleeve gastrectomy procedures to patients with a BMI over 40 or a BMI over 35 with obesity-related illnesses. The study will provide an updated perspective on the health benefits of bariatric surgery and is vital to reaching more patients with the potential to alleviate obesity-related chronic conditions, Dr. Goyal explained. Numerous studies have proven the safety and efficacy of bariatric surgery in patients with class 1 obesity, including the landmark 2012 STAMPEDE trial, which found the gastric bypass and sleeve gastrectomy in patients with a BMI of 27 to be effective in the treatment of type 2 diabetes. Based largely on this evidence in 2016, 45 international professional organizations, including the American Diabetes Association, issued guidelines urging that bariatric surgery be recommended or considered as a treatment option for some categories of people with diabetes, including those who are mildly obese and fail to respond to conventional treatment.
High
[ 0.660146699266503, 33.75, 17.375 ]
FRANKFURT, Oct 24 (Reuters) - A Stuttgart court ordered Porsche Automobil Holding SE to pay damages to shareholders and charged the company with violating disclosure rules tied to a 2015 diesel emissions scandal, two lawfirms said on Wednesday. The regional court in Stuttgart was not immediately available for comment. Porsche Automobil Holding SE shareholders sued the company for failing to inform its investors in a timely manner about a diesel emissions scandal which has cost Volkswagen more than 27 billion euros ($30.8 billion) in fines and penalties. At the time that regulators in the United States caught the German carmaker systematically cheating emissions tests, the company was headed by Martin Winterkorn, who was chief executive of both Volkswagen AG and Porsche Automobil Holding SE. Porsche Automobil Holding SE should have informed its investors in a more timely fashion about the regulatory risks facing the carmaker, the lawfirms said, citing the court’s ruling. Porsche Automobil Holding SE has a 30.8 percent stake in Volkswagen and holds a 52 percent voting stake in the carmaker. Lawfirm Nieding & Barth said the pension fund for the city of Wolverhampton was awarded 3.2 million euros in damages by the Stuttgart court on Wednesday. Lawfirm TILP said Porsche Automobil Holding SE was asked to pay 44 million euros to shareholders. The verdict is not enforceable yet as Porsche can still file an appeal, TILP said. ($1 = 0.8776 euros) (Reporting by Edward Taylor; Editing by Maria Sheahan)
Mid
[ 0.619718309859154, 38.5, 23.625 ]
Q: how to use arrow keys as an input in a batch file I was curious if there was a way to use the arrow keys on your keyboard to be able to receive input form them and use this information in a batch file? Thanks BurnE A: There a few ways that you can assign arrows symbols/keys to variable, but u can't use them as input as they are operational buttons in command prompt (move cursor and iterate trough the already executed commands) and you cant's detect their pressing. EDIT: @echo off CHCP 1251 ::Define a Linefeed variable set LF=^ ::above 2 blank lines are critical - do not remove endlocal call :hexPrint "0x1a" upArrow call :hexPrint "0x1b" downArrow call :hexPrint "0x18" rightArrow call :hexPrint "0x19" leftArrow echo %upArrow% %downArrow% %rightArrow% %leftArrow% goto :eof :hexPrint string [rtnVar] for /f eol^=^%LF%%LF%^ delims^= %%A in ( 'forfiles /p "%~dp0." /m "%~nx0" /c "cmd /c echo(%~1"' ) do if "%~2" neq "" (set %~2=%%A) else echo(%%A exit /b this will set the arrows to a variables , but result might depends on your CHCP.I've used this as reference .Will not work on XP if have no forfiles
Mid
[ 0.56, 35, 27.5 ]
Setting up the Trade Kills  Structured 3 man setups  Na`Vi push out B. In this scenario Aleksib will get a favorable duel because of his AUG. Na`Vi take short control. If this happens, Allu can get a kill. If he misses, he can fall back and call the info. Depending on what he sees, he can have sergej swing out and trade. Na`Vi go towards A. In this situation, sergej gives ENCE a chance to do the retake as he is cutting off players from pushing all the way into jungle or ticket.  Staying a step ahead of the meta  Setting up the long game:  The Push Back ENCE are one of the hottest rising teams in the world. Their finals at IEM Katowice 2019, top 8 finish at StarLadder i-League Season 7, and victory at BLAST Madrid put them as a solid top 5 team with potential to grow. What makes ENCE is that they don’t rely on individual players to carry the day. Unlike teams like FaZe, they don’t require their superstar player going off. Jere “sergej” Salo cam be alright for a tournament and other teammates can pick up the slack. At the Major for instance, we saw Sami “xseveN” Laasanen carry ENCE over the line with his great clutching. At BLAST, we saw Jani “Aerial” Jussila’s aggressive rifling making the difference. The most consistent factor that defines ENCE’s victory isn’t any of the star players, but rather Aleksi “Aleksib” Virolainen’s system and tactics. In some ways, the ENCE system resembles Astralis. Each of the players have a defined role within the system. The system is defined by Aleksib and Slaava “Twista” Rasanen, the coach. While the infrastructure is similar, there are subtle differences in how the roles are divvied up. On the T-side: Sergej and xseveN play the wings, Aleksib and Aerial take map control, and Aleksi “allu” Jalli is the AWPer. On the CT-side Aleksib supports Aerial in taking aggressive rifle duels, Allu is the AWPer, and sergej and xseveN largely play anchor positions. While the roles between ENCE and Astralis are different, the efficacy is similar in that each player can have impact within their designated role. The team does not fall apart if one of their star players happens to have a bad day. The reason for this is Aleksib’s tactics. Aleksib adheres to the fundamentals of CS:GO and has a level of detail that only the top in-game leaders can match. His tactical vision has established made ENCE’s map pool one of the best in the world. They play six of the seven maps (excluding Vertigo which just came into the map pool). ENCE are one of the top teams on maps like Train, Dust2, and Mirage. They broke Astralis’ win streak on nuke. Even their lesser maps of Overpass and Inferno still give them a chance to upset. On Overpass they go to double-digits against Na`Vi and tied Liquid 15-15. They beat Liquid on inferno at IEM katowice. While it is impossible to comprehensively go over ENCE’s playbook, I’ve picked out core ideas that give a good background to understand what makes Aleksib’s tactics some of the best in the world.The most important pillar of making a good CS:GO team is ensuring trades. In this section, I’ve picked out a round from BLAST Madrid. This round was from the group stages when ENCE played Astralis on Dust2.In Round 11, ENCE are go into a 4v4. xseveN got a pick through a smoke at long. When ENCE took short, Nicolai “device” Reedtz got an AWP pick and fell back. In this round Aleksib calls for an A-split. What’s interesting is how ENCE play it out. ENCE have sergej use two smokes from short. One for short and one to cover between car and long. ENCE then have three players push long. By using this chain of events, ENCE diminishes the trading power of Astralis while increasing their own. By having sergej throw the smokes, device cannot commit to trading the players at long. Sergej understands this and holds his position knowing that device will have to split his attention between short and long. This allows ENCE to have stronger trade potential for the three man pack as they clear pit. While ENCE are unable to close this round, it displays ENCE’s ability to use a passive lurker to allow increased trade potential for their main hit.ENCE is a team that also has a clear idea of what they want to do if they get in a small man situation on either side of the map. The two examples I’ve picked out from this section are two games from BLAST. One against Na`Vi on the CT-side and one against Astralis on the T-side.ENCE played Na`Vi at BLAST Madrid on Mirage. In the 14th round of the half, ENCE were in a 3v4 situation after losing out in the trades for mid control. In response to this, ENCE do a creative setup. They have Aleksib take control of B halls with his AUG, have Allu control short from window, and have sergej hold near connector towards A-site. In this scenario one of three things happens:In this particular round, it’s scenario number 2 as Na`Vi try to do a B split. Allu gets his shot off and sergej swings to get another player, leaving ENCE in a 3v2. From there they win the round. The second example comes from the finals against Astralis on Train.In the sixth round of that game, ENCE go for their standard four man execute on the B-site with xseveN lurking. Device gets two players in the hit, but ENCE are able to kill the two riflers on the site and plant the bomb. In this scenario, xseveN has some leeway in how he wants to play this round. He can rejoin his team, play from ivy, play from tcon, or hold ladder. In this instance, ENCE and xseveN understand that xseveN needs to buy as much space as possible. ENCE understand that a typical CT-side default is two on A, two on B, and a rotator. They have killed the small-site anchor and the rotator. The last remaining player is device at the back of the site. They have the utility they need to close the gap, but they need time to make it happen. Astralis understand this too, as both Emil “Magisk” Rief and Peter “dupreeh” Rasmussen start to look for potential aim duels against xseveN. XseveN cleverly runs out of T-main to olof. While he gets zero kills here, he forces both Magisk and dupreeh to run over and clear him out. This let’s his two teammates close the gap on device, kill him, and get a better postplant scenario in the 2v2. ENCE is one of the best teams at understanding how to maximize their positional advantages in the 3v3 scenarios and this has been on of the key reasons why they have been successful in 2019.ENCE often have clever setups or tactics that counter the established meta. The best example of this comes from their battle against Astralis on Train at BLAST Madrid.One of the typical ways of clearing out popdog as the T-side is to throw a molly to flush out the pop player. Then have someone throw a flash over T-main, and have a third play come out and kill now blind player. This is exactly what ENCE did to Astralis in the eighth round of this game. In the 22nd round, Astralis decided to use a similar tactic. Aerial had been playing fairly aggressively around olof for most of the half. In response, Astralis first cleared out that position. Upon realizing that he wasn’t there, they intuited that he was likely in popdog. They used the same molly, popflash combo to kill him. ENCE’s setup however was a counter to that typical tactic. When Aerial was mollied out of popdog, he strafes out of popdog and looks directly into the wall. At the same time, Aleksib throws his molly at T-main. Aerial then swings aorund and kills Dupreeh. This sequence is clever for multiple reasons. First it allows for Aerial to get a 50/50 duel against Dupreeh. Secondly, the timing of Aleksib’s molly means that only one player can make it out of T-main, so if Aerial wins the duel he cannot be traded. Finally, Aleksib can trade Aerial in the event that Dupreeh is the one who wins the duel. This attention to detail is one of the reasons why ENCE have been one of the best teams in the world.One of the trends that all of the great in-game leaders have is conditioning the opponent. They are able to string a bunch of rounds together that can manipulate or convince the enemy to run a certain type of aggression or setup. Aleksib has this characteristic as well. Two examples of this are from BLAST Madrid against Astralis and IEM Katowice against Na`Vi. ENCE played Astralis on Train in the finals of BLAST Madrid. In the first seven rounds of Train did not go for any structured take of ladder room. In the third, he had Allu rush it. In the fifth, sergej took it in mid round. In the sixth, they went for a 4 man hit on the B-site. It is only in the eighth we see ENCE use mass utility to take control of pop and in that round, they get two opening kills for their trouble. This round ordering seems to be by design. In the first few rounds of the half, ENCE didn’t do a safe clear of pop. They realize that Astralis will recognize this and will naturally start to put someone there. This is what happens in the sixth round as Dupreeh takes control of pop early. Later on in the round, xseveN lurks out mid and sees that Dupreeh was in pop. Once this information is relayed to Aleksib, that is when Aleksib decides to call for the molly take of pop in the next rifle round. He understands that there is a higher than average possibility that Astralis will go for pop control as they haven’t seen ENCE call for a full utility take of it yet and that is when Aleksib calls for it. Another example of Aleksib conditioning his opponents is from the semifinals of IEM Katowice Major.The game was also on Train. ENCE stuck to their bread and butter for most of the half as they opted for fast paced executes to either win rounds or grind down the economy of Na`Vi. What is notable here is that every time they went for the A-site, they always made sure to have xseveN lurk at ivy. He varied up the timings throughout the half and this sometimes caught Na`Vi off guard. By the time the 13th round starts, Na`Vi are conditioned into thinking that someone will lurk out from ivy. This was all a setup by Aleksib though as in this outer execute, he has xseveN join the pack. In addition to that, he has the team throw the smoke to cut off ivy from yard, rather than having it be in lane. This sequence of rounds allows for a few things. First it gives ENCE a better line of sight down lane so that they can trade. With 4 players instead of 3, there trading power is stronger than their previous hits. Secondly, they’ve conditioned Denis “electronic” Sharipov to focus on ivy, and this allows them to close the gap and kill Ioann “Edward” Sukhariev before electronic can adjust. Finally, by calling this round at this point in the half, Aleksib increases his chances at both winning the round and breaking the economy of Na`Vi.2018 saw ENCE grow throughout the season as they climbed up the competitive ladder through the tier two scene. In 2019 we have seen the fruits of those labors. Second at the IEM Katowice Major, top 3 at BLAST Sao Paulo, top 8 at StarSeries i-League Season 7, and a victory at BLAST Madrid. While each of the five players stepped up throughout this time period, the most consistent factor in ENCE’s success has been their tactics. These five months have been an incredible showing for Aleksib as one of CS:GO’s leaders. The next five months will be a push back from the elite teams in the world. Teams like Astralis, Na`Vi, and Liquid will now start to study ENCE in earnest. All of the top teams will soon recognize that ENCE’s greatest strength is their tactics and teamplay. Soon teams will specifically start to anti-strat ENCE’s trading tendencies, 3v3s, CT-side aggression, and multi-round setups and find ways to either counter it or diminish its effects. For Aleksib, the next five months will be a turning point in his career. If he can weather the storm and stay a step ahead of the competition, he will establish himself as one of the great tactical leaders of modern CS:GO. If you enjoyed this piece on ENCE, consider reading: ENCE, the Consolidation of Finnish Esports Follow the author on Twitter at @stuchiuWriter . Image courtesy of BLAST Pro Series
Mid
[ 0.6224256292906171, 34, 20.625 ]
Evaluation of Probiotic Diversity from Soybean (Glycine max) Seeds and Sprouts Using Illumina-Based Sequencing Method. There is increasing interest in the use of plant probiotics as environmental-friendly and healthy biofertilizers. The study aimed at selecting for novel probiotic candidates of soybean (Glycine max). The bacteriome and mycobiome of soybean sprouts and seeds were analyzed by Illumina-based sequencing. Seeds contained more diverse bacteria than those in sprouts. The seeds contained similar fungal diversity with sprouts. Total 15 bacterial OTUs and 4 fungal OTUs were detected in seeds and sprouts simultaneously, suggesting that the sprouts contained bacterial and fungal taxa transmitted from seeds. The Halothiobacillus was the most dominant bacterial genus observed and coexisted in seeds and sprouts. The OTUs belonged to Ascomycota were the most dominant fungal taxa observed in seeds and sprouts. Halothiobacillus was firstly identified as endophytic probiotics of soybean. The results suggested that sprouts might contain diverse plant probiotics of mature plants and Illumina-based sequencing can be used to screen for probiotic candidates.
Mid
[ 0.6457831325301201, 33.5, 18.375 ]
Q: Java getter/setter style question I have a question about Java style. I've been programming Java for years, but primarily for my own purposes, where I didn't have to worry much about style, but I've just not got a job where I have to use it professionally. I'm asking because I'm about to have people really go over my code for the first time and I want to look like I know what I'm doing. Heh. I'm developing a library that other people will make use of at my work. The way that other code will use my library is essentially to instantiate the main class and maybe call a method or two in that. They won't have to make use of any of my data structures, or any of the classes I use in the background to get things done. I will probably be the primary person who maintains this library, but other people are going to probably look at the code every once in a while. So when I wrote this library, I just used the default no modifier access level for most of my fields, and even went so far as to have other classes occasionally read and possibly write from/to those fields directly. Since this is within my package this seemed like an OK way to do things, given that those fields aren't going to be visible from outside of the package, and it seemed to be unnecessary to make things private and provide getters and setters. No one but me is going to be writing code inside my package, this is closed source, etc. My question is: is this going to look like bad style to other Java programmers? Should I provide getters and setters even when I know exactly what will be getting and setting my fields and I'm not worried about someone else writing something that will break my code? A: Even within your closed-source package, encapsulation is a good idea. Imagine that a bunch of classes within your package are accessing a particular property, and you realize that you need to, say, cache that property, or log all access to it, or switch from an actual stored value to a value you generate on-the-fly. You'd have to change a lot of classes that really shouldn't have to change. You're exposing the internal workings of a class to other classes that shouldn't need to know about those inner workings. A: I would adhere to a common style (and in this case provide setters/getters). Why ? it's good practise for when you work with other people or provide libraries for 3rd parties a lot of Java frameworks assume getter/setter conventions and are tooled to look for these/expose them/interrogate them. If you don't do this, then your Java objects are closed off from these frameworks and libraries. if you use setters/getters, you can easily refactor what's behind them. Just using the fields directly limits your ability to do this. It's really tempting to adopt a 'just for me' approach, but a lot of conventions are there since stuff leverages off them, and/or are good practise for a reason. I would try and follow these as much as possible. A: I don't think a good language should have ANY level of access except private--I'm not sure I see the benefit. On the other hand, also be careful about getters and setters at all--they have a lot of pitfalls: They tend to encourage bad OO design (You generally want to ask your object to do something for you, not act on it's attributes) This bad OO design causes code related to your object to be spread around different objects and often leads to duplication. setters make your object mutable (something that is always nice to avoid if you can) setters and getters expose your internal structures (if you have a getter for an int, it's difficult to later change that to a double--you have to touch every place it was accessed and make sure it can handle a double without overflowing/causing an error, if you had just asked your object to manipulate the value in the first place, the only changes would be internal to your object.
Low
[ 0.523178807947019, 29.625, 27 ]
WHO WE ARE We are a collective of advocates, yoga teachers, artists, therapists, lawyers, religious leaders, teachers, psychologists and activists committed to the emotional/mental health and healing of Black communities. OUR VISION We envision a world where there are no barriers to Black healing. OUR MISSION BEAM is a 501 (c)(3) organization. Our mission is to remove the barriers that Black people experience getting access to or staying connected with emotional health care and healing. We do this through education, training, advocacy and the creative arts. What We Believe 1. Dismantling the systems that dehumanize Black people in America is a long term project. In the face of this we must create community based systems of care that help alleviate the harm and trauma for present and future generations. 3. Effective emotional health strategies must include a variety of approaches. Practices such as dance, yoga, generative somatics, spiritual and religious practices, psychotherapy, creative arts, medication and more must be used together in order to transform our emotional health landscape. 4. Therapeutic and public health models that isolate individuals or subsets of the community and do not support the capacity of the broader community to support them; are not effective in transforming the emotional health of Black communities. 5. Emotional health work can not see progress, if that work is not done alongside addressing the inequities in the criminal legal system, economic reform, HIV/AIDS, transphobia, homophobia, racism, misogynoir, reproductive justice, sexual assault, intimate partner violence, child sexual abuse and other issues that challenge the wellness of Black communities. 6. In order to be sustainable, community based systems of care must integrate into current practices in Black life and build upon current traditions and norms in Black communities.
High
[ 0.684276729559748, 34, 15.6875 ]
Q: Optimization of a vectorized count function My question is one about R code optimization for a specific task. Let's say I have a vector of length size containing integers between 1 and x. I want to create a function that will output a vector of the same length counting the occurence of each element of the vector. There is plenty of ways to do that, but I want to do it the fastest as I can with large value of size. Let's do a quick example. I want a function f() that will give the following: f(5, 6) ## $input ## [1] 3 5 2 5 4 5 ## ## $output ## [1] 1 3 1 3 1 3 A first naive function to do so would be f1 <- function(x, size){ input <- sample(x, size, TRUE) list( input = input, output = sapply(input, function(i){sum(input==i)}) ) } set.seed(20190920) f1(5, 6) ## $input ## [1] 3 5 2 5 4 5 ## ## $output ## [1] 1 3 1 3 1 3 Here is another approach which is faster for large values of size f2 <- function(x, size){ input <- sample(x, size, TRUE) temp <- sapply(unique(input), function(i){setNames(sum(input==i), i)}) list( input = input, output = setNames(sapply(input, function(i){temp[as.character(i)]}), NULL) ) } set.seed(20190920) f2(5, 6) ## $input ## [1] 3 5 2 5 4 5 ## ## $output ## [1] 1 3 1 3 1 3 I did some bechmarking with different values of size to see the improvement of the median processing time of f2 over the one of f1. Here is the code for reference and the processed plot below: library(microbenchmark) library(ggplot2) library(data.table) library(magrittr) sizes <- seq(0, 20000, 1000) median_f1 <- sapply(sizes, function(size){ median(microbenchmark(f1(10, size))$time) }) median_f2 <- sapply(sizes, function(size){ median(microbenchmark(f2(10, size))$time) }) data.table(sizes, median_f1, median_f2) %>% melt(c("sizes")) %>% ggplot() + geom_point(aes(x=sizes, y=value, colour=variable)) + geom_line(aes(x=sizes, y=value, colour=variable)) + theme_classic() + theme(legend.position="bottom") I expanded the range of sizes just to confirm the (already apparent) trend: It is easy to see that f2() is way much faster than f1() but still, for my needs, it's too slow. I have to do the following over multi-dimensional arrays with the size parameter sometimes larger than 1M. I am looking for someone who could help me create an f3() function that would be significantly faster than f2(). A: My variant uses the function table(), it is the function f3() below: library("microbenchmark") f1 <- function(x, size){ input <- sample(x, size, TRUE) list( input = input, output = sapply(input, function(i){sum(input==i)}) ) } f2 <- function(x, size){ input <- sample(x, size, TRUE) temp <- sapply(unique(input), function(i){setNames(sum(input==i), i)}) list( input = input, output = setNames(sapply(input, function(i){temp[as.character(i)]}), NULL) ) } f3 <- function(x, size){ input <- sample(x, size, TRUE) list( input = input, output = table(factor(input, levels=1:x))[input] ) } microbenchmark(f1(5, 10000), f2(5, 10000), f3(5, 10000), unit="relative") # > microbenchmark(f1(5, 10000), f2(5, 10000), f3(5, 10000), unit="relative") # Unit: relative # expr min lq mean median uq max neval cld # f1(5, 10000) 241.73176 227.69538 230.40873 225.5085 225.12230 109.425800 100 c # f2(5, 10000) 13.36599 12.53868 12.10007 12.4553 12.48617 4.405781 100 b # f3(5, 10000) 1.00000 1.00000 1.00000 1.0000 1.00000 1.000000 100 a Here is also a function f4() which uses tabulate(): f4 <- function(x, size){ input <- sample(x, size, TRUE) list( input = input, output = tabulate(input, nbins=x)[input] ) } microbenchmark(f1(5, 10000), f2(5, 10000), f3(5, 10000), f4(5, 10000), unit="relative") # > microbenchmark(f1(5, 10000), f2(5, 10000), f3(5, 10000), f4(5, 10000), unit="relative") # Unit: relative # expr min lq mean median uq max neval cld # f1(5, 10000) 455.819135 453.731740 484.839866 447.794049 496.980368 627.25732 100 c # f2(5, 10000) 25.100383 24.890488 24.927370 24.409499 24.577944 27.29102 100 b # f3(5, 10000) 1.889913 1.914113 1.984959 1.950015 1.955407 5.10581 100 a # f4(5, 10000) 1.000000 1.000000 1.000000 1.000000 1.000000 1.00000 100 a
Mid
[ 0.590551181102362, 28.125, 19.5 ]
Additional Information Dress this maxi skirt up with a corset or go casual with a band tee. Either way, you're wearing this amazing skirt so you'll look like a total bad-ass. The matte black satin skirt has a Japanese cherry blossom brocade pattern embroidered all over. It features a high-waisted lace trimmed front panel with corset-style lacing on the back, draping hi-low skirt and ruffled hem. Side zipper closure. Fully lined. Recently Viewed Product Actions Rated 5 out of 5 by AutumnRose from AwesomeThis is a skirt that can be worn for many things, be it a steampunk outfit, or just the right thing to wear out and about. It's just fun to wear!!!! Date published: 2016-11-10 Rated 4 out of 5 by Rose Ren from Beautiful but runs a little smallThe skirt is absolutely beautiful. Great material and beautiful details. According to the details in the description, the back of the skirt is 42 inches and apparently applies to every size. Note that the model is wearing platforms. The back of it is really long, even in heels the back touches the ground (I'm 5'4 so that would put me at 5'7 with heels). I ordered an extra large and am right in the middle of the waist range in the size guide and it is a bit tight. The waist it also very high. All in all it's gorgeous and I'm going to keep it, I just might have to get it taken up since it's so long in the back.
Low
[ 0.49790794979079506, 29.75, 30 ]
getting impatient…. i still don’t have the results of my bone marrow biopsy/aspiration and i’m getting impatient. i can’t help but worry about a lot of things. the results are of such great importance as it will determine the next step for my sct. if there’s no leukemic cells present in the marrow then we proceed with the transplant, but if its the other way around then i’ll have to go back to chemo. (sigh sigh sigh). our bone marrow is a soft spongy tissue found inside the larger bones in our body. they contain stem cells that turn into blood cells. biopsy is a process of removing a tissue sample from the body for examination. aspiration, on the other hand, is the drawing of the liquid portion of the bone marrow by a hollow needle. in my case, several samples were taken so there were painful unexplainable stings that traveled down to my legs. i hope i get the results early next week and i’m praying that its a good one so i could proceed with my sct. please do keep me in your prayers as i go through this stage of my treatment.
Mid
[ 0.580786026200873, 33.25, 24 ]
Guest Editorial: Investors take aim causing Ruger to go on the defensive During Sturm, Ruger & Co.’s annual meeting earlier this month in Prescott, shareholders adopted a resolution by the Interfaith Center on Corporate Responsibility, which includes a coalition of nuns and health care networks, that requires the gun maker to report by February on how it tracks violence committed with its products; its efforts to develop safer firearms; and its assessment of the reputational and financial risk to the corporation of gun violence. (AP file photo/Lynne Sladky) Activist investors fired a warning shot during Sturm, Ruger & Co.’s annual meeting earlier this month in Prescott and management would be wise to pay attention. At the meeting, shareholders adopted a resolution by the Interfaith Center on Corporate Responsibility, which includes a coalition of nuns and health care networks, that requires the Connecticut-based gun maker, which has a large manufacturing presence in Newport, N.H., to report by February on how it tracks violence committed with its products; its efforts to develop safer firearms; and its assessment of the reputational and financial risk to the corporation of gun violence. Ruger’s board and management had urged investors to reject the proposal, but it apparently attracted support from two large institutional investors, BlackRock and Vanguard, that hold significant stakes in the company. BlackRock, in fact, asked Ruger for much the same information following the school shooting in Parkland, Fla., in February that left 17 people dead, a request that was essentially rebuffed. Ruger CEO Chris Killoy was defiant in response to the shareholders’ vote. “The proposal requires Ruger to prepare a report. That’s it, a report,” he said. “What the proposal does not, and cannot do, is to force us to change our business, which is lawful and constitutionally protected. What it does not do, and cannot do, is force us to adopt misguided principles created by groups who do not own guns, know nothing about our business, and frankly would rather see us out of business.” This is unduly defensive and shortsighted in a couple of respects. Gun safety advocates note that mass shootings are a small part of the gun violence problem in America (by some calculations, less than 2 percent of U.S. gun fatalities last year occurred in shootings in which there were four or more victims). They point out that the everyday gun violence that disproportionately affects communities of color is driven by a huge market in the illegal trafficking of handguns. The development of safety features such as so-called smart-gun technology could render illegally diverted firearms useless, they argue; and ensuring that distribution chains are made up solely of responsible dealers could put a big dent in unregulated sales, theft and straw purchases. Gun makers surely have no desire to fuel violent crime, so they should be open to doing what they can to curb it. Ruger’s motto is “Arms Makers for Responsible Citizens.” But arms makers must also be responsible corporate citizens. That requires the company to abandon its traditional stance of non-engagement with its critics and take seriously finding ways in which its products can be made safer and less susceptible to misuse. Investors call the tune in many respects for publicly traded companies such as Ruger, including voting for members of the board of directors, who in turn hire and fire top managers and are duty bound to look out for the shareholders’ best interests. The very modest step that Ruger’s shareholders approved at the annual meeting came even as they rejected gun activists’ efforts to distance the company from the National Rifle Association, to which it paid $9 million over the past two years for promotional and advertising services, according to The New York Times. So in that sense, Ruger dodged a bullet. But it’s reasonable to expect that activist shareholders will continue to seek to influence behavior across the gun manufacturing industry, and Ruger would do well to anticipate what the changing gun-safety landscape portends for its future. Editor's Note: This guest editorial was originally attributed to a different source. The correct source is the Valley News, West Lebanon, New Hampshire.
Low
[ 0.5199240986717261, 34.25, 31.625 ]
<?php class AdminEmailsController extends AdminEmailsControllerCore { }
Low
[ 0.46997929606625205, 28.375, 32 ]
His 61-year-old mother, Jamila, greets me warmly. We are in Moneem's childhood home in the western Tunisian city of Kasserine and the young man's eyes stare out from the photographs that plaster the living room walls. But Moneem is not here. He was killed four months ago in an attack 70km away, and Jamila is left with a pain so unbearable that no words can describe her loss. "He was my first boy. He was the dearest because he was the first ... I still can't believe he's gone," she says, her eyes wet, her hands tightly clasped. She uses the ends of her canary yellow headscarf to wipe away her tears. Early on the morning of June 15, Moneem, 32, a captain in the Tunisian National Guard who worked with the anti-terrorism brigade and then with the rapid intervention brigade, was at home, having just returned from a shift working as a security detail at a concert. The phone rang. It was his superiors in Tunis alerting him to an attack in Sidi Bouzid. Could he respond straight away, they asked him. "He was always the first to respond in these situations," says his younger brother, Najed, 30. Following in his father's footsteps, Moneem had, since 2006, been working with the national guard. He had participated in advanced crisis managementand securitytraining provided through the US state department. So, Moneem gathered his protective gear and weapons and jumped into a military vehicle with a driver. He had worked in dangerous situations before. The job was a natural fit for Moneem. He was smart and calm under pressure, but with an authoritative air. "No one dared to fight him or insult him," childhood friend Ayman Aloui, 32, recalls. He remained the same serious, steady person as he grew older. "He was someone good. Everyone in the community knew him," says Rabii Gharsalli, a resident of Kasserine. On that June night, as Moneem stepped out of the car, wearing a helmet and holding a Kalashnikov, he was confronted by seven armed fighters. In a moment of panic, his driver drove away. There was supposed to be back-up just 3km away, but it never came. For the next several minutes, Moneem single-handedly engaged in a shoot-out with the fighters, during which, according to the national guard, he sustained a shot to the knee. A continuing struggle Since the 2011 revolution, more than 7,000 Tunisians have left the country to fight with the Islamic State of Iraq and the Levant (ISIL) in Iraq, Libya, and Syria. The country has suffered two high-profile attacks, one at the Bardo Museumin March and a second at the Sousse beach resortin June, orchestrated by ISIL-affiliated fighters allegedly trained in Libya. While those two attacks almost exclusively killed foreign tourists - one police officer was killed in the Bardo Museum attacks - Tunisians have borne the brunt of ISIL-linked attacks in their country since 2012. Last month, a 16-year-old shepherd was beheaded by ISIL fighters. His severed head was sent in a bag to his family. Those working in the country's security apparatus are particularly vulnerable. Soldiers guarding checkpoints have been routinely attacked - 14 were killed in one incident in July 2014. On November 17, Tunisian security dismantled a 17-member sleeper cell that was allegedly planning to attack hotels and police stations. Only a few days later on, November 24, an ISIL-affiliated suicide bomber detonated his bomb ona buscarrying security personnel in Tunis. Twelve members of the presidential guard were killed. 'He died for Tunisia' Like others in the country, Moneem's family is left with only loss. "We were always scared for him," Jamila says, her voice catching. Her grief is deep. Najed brings out photo albums and diplomas, and together, mother and son thumb through certificates from Moneem's life and death, as well as the six-inch thick binders stuffed with his training material. Their pride in the documents and the person they represent is palpable. Moneem's status in the national guard, the way he took on family responsibilities after his father's deathin 2010, his marriage just a few months before he died, his hopes to start a family of his own all fill their memories now. But there is also anger and many unanswered questions. On the night of his death, the family says, Moneem was left on the ground to bleed for two hours before his lifeless body was retrieved. It is impossible to know if he would have survived had he been taken to hospital earlier - for no autopsy was ever performed. No photographs were taken of his body either. When Najed went to Sidi Bouzid to get answers about his brother's death, he was brushed off and told to contact the authorities in Tunis. After Moneem's burial in a cemetery near Kasserine, the government compensated the family with $3,917 and 20kg of spaghetti. "He died for Tunisia," his family says. In return, they received a sack of processed wheat. "The last time I saw Moneem was two months before he was assassinated," says Ayman, his friend. "I asked him if Tunisia was in danger, and he assured me that he was going to fight this germ of terrorism until the end of his life."
Low
[ 0.47309417040358703, 26.375, 29.375 ]
Hybrid Vegetable Seeds – Where Do They Come From? A friend asked me a question last summer that kind of blew my mind. “If we can’t expect seeds from hybrid tomatoes to ‘come true,’ then where do they get hybrid seeds from year after year?” Now, I definitely knew (or thought I did) what a hybrid was, and I had a canned answer for anyone who asked how hybrid varieties were made (well, breeders cross two varieties to come up with a new one). But I realized I hadn’t really ever understood the nitty gritty of hybrid seed production. I intended to hunker down and do some research, but it kept falling way down on the to do list until I started perusing this year’s seed catalogs, considering the varieties I wanted to try. When I order Sungold seeds each year, the seed company doesn’t have to continually grow the parent plants and cross them to get new seeds, right? That would be terribly labor intensive and it seems the seeds would be ridiculously expensive! Well, as it turns out, that is exactly what they do. If you’re curious to learn more, read on! First off, let’s get a little terminology straight (if you know all of this, feel free to skip to the next paragraph). I want to quell the notion that hybrid varieties of vegetables are genetically modified (GMO). Genetic modification is a completely different (and much newer) process that involves manipulating a plant’s DNA. It’s quite complicated and I won’t go any further with it here. Open pollinated (OP) varieties produce true seeds (meaning collected seed will produce the same plant) from year to year. However, many open pollinated varieties are the result of natural hybridization that has occurred over the years. And even some varieties that were originally created through manual hybridization means have stabilized to become open pollinated types (Rutgers tomatoes are one example). Heirloom varieties have no official definition, and most are just open pollinated varieties that have been around a long time, often passed down because they had qualities gardeners liked (and they usually have very charming names). And finally, hybrid varieties are created by crossing two “true line” parent varieties, and their seeds will not produce the same plant. They usually have qualities that exceed those of their parents. Here is a SIMPLIFIED version of the process using tomatoes as an example: Two parent tomato varieties are identified that have desirable characteristics, such as high yield, resistance to particular diseases, great taste, etc. These varieties are well established and reliably reproduce true from their own seeds; they are “true line” varieties. Since tomatoes flowers are complete, having both both male and female parts, and usually don’t get pollinated with the pollen of another tomato plant, the breeder has a couple of challenges to keep the plants from self-fertilizing. First, the breeder must decide which variety will have its male reproductive parts removed. This variety will then effectively become the “female” parent, the one which will bear the fruit with the hybrid seeds. Removing the male flower parts must be done manually and is quite a tedious task. Next, pollen needs to be transferred from the variety with non-modified flowers (the “male” parent) to the modified flowers on the “female” parent. This also has to be done manually. There are other tasks as well, including removing any fruit that resulted from self-fertilization that occurred before the flowers were modified. Then, when the desired fruit are ready, they must be harvested and the seeds collected – another process with several steps. If this is an established hybrid already for sale, the seeds are packaged and sold as an F1 hybrid (meaning first generation). If this is still part of a test for a new hybrid, the seeds are planted the next season and tested to see if the desired traits made it into the hybrid variety. And this process is done year after year. Amazing, isn’t it? Not surprisingly, given the immense amount of labor involved, nearly all of our hybrid seeds are being produced in China and India. Some smaller scale production is done in Mexico and Chile. When a breeder creates a hybrid variety, they own the rights to it, and information about the variety becomes their intellectual property. Hence, we don’t know which parent varieties were used to create many of the hybrid varieties that are available. However, people have taken popular hybrid varieties, such as Sungold (F1) and tried to create their own open pollinated versions. This would take several years and several generations of plants (F2, F3, F4, etc). Basically, they collect seed from the plant and then plant them the next year. Then they select the plants that are best or came nearest to “true” and collect their seeds. Then repeat again next year, and the next, etc, until all seeds reliably produce a consistent variety. This is important to know because if you truly are after the original Sungold F1 plant, you need to be sure you buy seeds that are labeled Sungold F1. (Some of the developed OP varieties still have “Sungold” in their name – Sungold Select, Big Sungold, etc.) Finally, if you are a risk taker and adventurous gardener at heart, and, most importantly, you have the space to spare, you can certainly try planting collected seed from your hybrid tomatoes (and F2 generation). If you do a little research ahead of time, you will find fellow gardeners who suggest hybrid varieties that are more likely to produce F2 plants and fruit that are close to “true” to the parent (F1) plant. Why some are more like to do this gets more deeply into the lineage of the parent plants of the F1 hybrid.
High
[ 0.66, 33, 17 ]
Protection by antiarrhythmic drugs against ischemia-induced arrhythmias occurring during coronary artery occlusion in the rat. Ligation of the left coronary artery in rats provides a relatively simple model for the assessment of antidysrhythmic compounds. This procedure results in severe arrhythmias in the initial postligation period (extrasystoles, bigeminae, tachycardia and fibrillation). Using this model we have compared the effectiveness of antiarrhythmic drugs which will be referred to class I, II and IV according to the VAUGHAN WILLIAM'S classification. All drugs have been shown to be antiarrhythmic against early occlusion arrhythmias. Especially the antiarrhythmics prevent the rhythm disturbances tachycardia and fibrillation. We conclude from the results that the coronary artery occlusion in rats is a valuable model to use in the screening of drugs for possible antidysrhythmic activity and with differing electrophysiological profiles.
High
[ 0.660194174757281, 34, 17.5 ]
El Chapo Univision's parent company is teaming up with Netflix to produce "El Chapo," a drama series based on the life of one of the world's most notorious criminals. It will air on Univision sister network UniMas in 2017, after which it will be available to Netflix subscribers.
Low
[ 0.27613104524180904, 11.0625, 29 ]
Careers The ACLU of Southern California is an equal opportunity employer. We value a diverse workforce and an inclusive culture. We encourage applications from all qualified individuals without regard to race, color, religion, gender, sexual orientation, gender identity or expression, age, national origin, marital status, citizenship, disability and veteran status. The ACLU SoCal undertakes affirmative action strategies in its recruitment and employment efforts to assure that persons with disabilities have full opportunities for employment in all positions. See current listings at other ACLU affiliates. The ACLU of Southern California seeks a Human Resources Director to join the organization and support its offices in San Bernardino, Santa Ana and Bakersfield. The Human Resources Director guides and manages the ACLU of Southern California’s human resources services, policies, and programs The American Civil Liberties Union of Southern California (ACLU SoCal) seeks to hire an experienced full-time Individual Giving Manager to manage and engage a portfolio of major gift level donors giving to the affiliate and national. The ACLU Foundation of Southern California (ACLU SoCal) seeks applicants for a senior-level Staff Attorney position to focus civil and human rights concerns in the Kern County region, with a particular focus on immigrants' rights and policing issues.
High
[ 0.6693121693121691, 31.625, 15.625 ]
In an unusual gift, Prime Minister Narendra Modi on July 24 presented 200 cows to poor villagers in Rwanda to support President Paul Kagame’s ambitious initiative for poverty reduction and tackling childhood malnutrition. The Girinka Programme was initiated by Mr. Kagame in 2006 to provide one cow per poor family for their nutritional and financial security. Mr. Modi, who is here on a two-day state visit, gifted these cows to poor families during a function at Rweru Model Village. Speaking on the occasion, Mr. Modi appreciated the Rwandan government’s ‘Girinka Programme’. He said people in India too would be pleasantly surprised to see the cow being given such importance as a means of economic empowerment in villages, in faraway Rwanda. He said that the Girinka Programme will help transform villages in Rwanda. “Being part of a transformative project towards economic development of Rwanda! PM @narendramodi donates 200 cows under #Girinka - One Cow per Poor Family Programme at Rweru village. Girinka is an ambitious projects that provides both nutritional and financial security to the poor,” Raveesh Kumar, the spokesperson for the Ministry of External Affairs, tweeted. Mr. Modi said that the Rwandan government can also work on honeybees on the lines of the Girinka Programme. “Honey can be produced along with milk and both businesses can be run together which would provide additional benefits,” Mr. Modi said, adding that the Indian government is ready to provide every support to the Rwandan government for this. The word Girinka can be translated as ‘may you have a cow’ and describes a centuries-old cultural practice in Rwanda whereby a cow was given by one person to another, as a sign of respect and gratitude, the Prime Minister’s Office said in a statement. The programme is based on the premise that providing a dairy cow to the poor transforms livelihoods, reconciles communities improving agricultural productivity through the use of manure as fertilizers which would lead to improving soil quality and reducing erosion through the planting of grasses and trees, it said. Since its introduction, hundreds of thousands have received cows through the Girinka Programme. The programme has contributed to an increase in agricultural production in Rwanda — especially milk production and products, reduced malnutrition and increased incomes.
High
[ 0.704156479217603, 36, 15.125 ]
[A comparative study of the effect of vinyl phosphoric acid esters on cholinesterase and carboxylesterase activities in mammals and arthropods]. Studies have been made of the effect of organophosphorus inhibitors on cholinesterase and carboxylesterase from various mammals (human erythrocytes, mouse brain, blood serum of mouse and rat, blood serum of horse) and arthropods (Calliphora vicina, Schizaphis graminum, Myzus persicae, Sitophilus oryzae, Pseudococcus maritimus, Tetranychus urticae). Organophosphorus inhibitors were presented by esters of vynylphosphoric acid containing normal and branched alkyls in the phosphoryl part of the molecule. The increase of the radical up to a propyl one increased the effect of organophosphorus inhibitors with respect to cholinesterase from the majority of the arthropods investigated. Organophosphorus compound with an isopropyl radical was found to be weaker for all the enzymes studied. Extremely high sensitivity of carboxylesterase from all arthropods to all organophosphorus inhibitors was noted; in some of the cases, anticarboxylesterase activity of all drugs was 2-3 orders higher than anticholinesterase one (P. maritimus, T. urticae). Regularities established for cholinesterase practically completely were confirmed on carboxylesterase. This finding evidently reveals similar structure of catalytic surface at the vicinity of esterase center in both enzymes.
High
[ 0.669902912621359, 34.5, 17 ]
We use cookies to allow us and selected partners to improve your experience and our advertising. By continuing to browse you consent to our use of cookies. You can understand more and change your cookies preferences here. My account Hello My account Nuisance calls - how bad is the problem? By Jon Barrow Our unique research into more than nine million phone calls reveals the extent of the nuisance calls epidemic. And it's getting worse. Put us to the test Our Test Labs compare features and prices on a range of products. Try Which? to unlock our reviews. You'll instantly be able to compare our test scores, so you can make sure you don't get stuck with a Don't Buy. Nuisance calls have become an unwelcome part of modern life. To discover just how bad the situation is, we've teamed up with call-blocking experts trueCall and work with them to track millions of calls made to trueCall customers across the country. We then regularly analyse the results to learn more about the rate of nuisance calls in the UK. Our latest finding, from autumn 2016, prove that the nuisance calls epidemic is even worse than anyone had previously thought. Our analysis of incoming phone calls over the last six months (April to September 2016) found that trueCall customers received an average of 25 unwanted calls a month. That's up from 24 per month in the preceding six month period (October 2015 to March 2016). Shockingly our data also showed that 39% of calls in September 2016 were a nuisance. This means that four out of every ten calls people got weren't from their family or friends, but were unsolicited calls from telemarketers. Discover the situation where you live with ourinteractive nuisance calls map This volume of annoying calls, promising to refund non-existent payment-protection insurance or asking about an accident you never had, is awful enough. But as the graphic above shows, many people get more. In fact, 10% of trueCall customers get more than 60 calls a month on average. That's two every day. Vulnerable people targeted As part of our analysis we also compared the data gathered by 658 people with a specialist trueCall box designed for older, vulnerable people, against 3,441 users of the standard trueCall unit. Shockingly, in the last six months the vulnerable customers received an average of 41 nuisance calls a month – that's 64% higher than the rate for users of the standard box (who received 25 nuisance calls a month). And a quarter of vulnerable people got more than 60 calls a month. These appalling figures show that companies are targeting older people, often calling again and again in an attempt to bully them in to signing up to services. And it's a vicious circle, as buying one unnecessary product is likely to result in the person being flagged as a soft target and their details then passed on to even more companies. The impact of this cynical approach can be devastating, and the constant harassment can leave the recipient afraid to pick up the phone. Nuisance calls in Scotland Our analysis also showed that Scotland faces the greatest nuisance calls problem. TrueCall customers there received an average of 42 nuisance calls each month – that's 17 more than the UK as a whole. And again, the situation is getting worse, with the figure jumping up from 35 per month between October 2015 and March 2016. Vulnerable customers in Scotland are especially hard hit, receiving an average of 52 nuisance calls per month (up from 41) and with 41% getting more than 60 such calls a month. Our research The figures in this report were analysed by trueCall and are taken from information automatically supplied by thousands of users of its call blockers. The data covers a three-year period from Jan 2013 to September 2016 and includes details on 9,075,075 incoming calls (with over 370,000 from April to September this year). These devices monitor every incoming call. We think this is a more reliable way of measuring nuisance calls than the paper diaries used in smaller studies, though accept that those buying a call blocker may be doing so because they receive a high number of unwanted calls. What can be done? Our research makes it clear just how bad the nuisance call problem is and shows that, while some progress has been made, the government and telecoms providers need to do more to bring it under control. Meanwhile, if you're bothered by lots of nuisance calls we'd recommend you back our nuisance calls campaign and sign up to the Telephone Preference Service (TPS). If you've already taken these steps a further option is to buy a call-blocking device. Our partner for this report, trueCall, makes these but it's not your only option.
Mid
[ 0.592427616926503, 33.25, 22.875 ]
Anselm Hannemann recently made a post about some of the misconceptions that front-end developers might have about web security. Since I had lots of questions about these things, I thought I’d interview Anselm to get his take on the surprising complexity of getting set up with HTTPS. We talk about things like generating certificates and how we might best make sense of the conflicting opinions many developers, including myself, have about third-party services such as Cloudflare. For those that aren’t familiar with web security, would you mind describing the differences between HTTP and HTTPS? Sure! The general difference between HTTP and HTTPS is simple: HTTP, or Hypertext Transfer Protocol, is the default protocol that we use to serve websites and transfer data. However, that information is sent in an unprotected, unencrypted way. HTTPS however combines HTTP and TLS (which is a cryptographic protocol) in order to protect data that is sent over a network by encrypting it. You may wonder why you would need to encrypt the connection to your website if the content is public anyway. Let’s assume that you use a CMS, like WordPress or Craft, for your website. If you log in over HTTP to your backend, your credentials are sent in plaintext to the server. So, anyone who intercepts your WiFi or internet connection now has access to your CMS (it’s super easy, really – just think of public WiFis in cafés). But not only that, HTTPS can also protect you from getting the wrong content. If HTTPS is set up properly, hackers can’t overtake DNS to serve different content on your domain anymore. With HTTPS it’s also not possible for software on your computer to inject ads or malware into webpages. You can think of HTTPS as the more secure version of HTTP which prevents you from data leaks to the public and also from falling for phishing. Why do we need SSL certificates to let the browser know the connection is secure? First, while you’ll find many people still talking of “SSL”, today we’re using “TLS” as the encryption method when we send information via HTTPS. “SSL” is an old method that shouldn’t be used anymore. HTTPS in general works with certificates, which you can get from your hosting company, to create a secure, encrypted channel in the HTTP protocol to send data. To encrypt the data you need a private key and a public key. To make this work, you need a so called “X.509”-certificate on your server that contains the information about the site’s authenticity, approved by a root certificate authority (Let’s Encrypt, StartSSL, or similar). All browsers, on the other hand, have a set of known and trusted root certificate authorities built-in. This is done for a more convenient user experience — the user does not need to review the certificate and approve it to establish the connection to the site. At some point you have probably seen a popup by the browser asking you if you want to trust the website connection because it’s using an unknown identity. This happens when the certificate has not been created by an official, trusted authority. Of course, there are many complex points I’m glossing over here so make sure to read more detailed resources if you’re interested in getting more information to a specific feature or technology (we link a few on the bottom of this article). A browser needs these certificates to verify if the keys match, this ensures that neither the server, client, or anything in between has been intercepted and (accidentally or otherwise) leaked your precious data. That sounds pretty secure, but there a couple of issues in the details that could still allow attackers to intercept the connection between the client and the server. HTTPS is no magic bullet, but it does make getting at your information a lot more difficult. As your article states, I was also under the naïve assumption that all I had to do was redirect my site to https in my server configuration file and then tell Cloudflare to switch to HTTPS. Can you describe why this is not the case? This is not entirely wrong. So, with a service like Cloudflare things are a bit more complex. They offer a bunch of services, for example: DNS hosting, performance optimization, and security enhancements. But a lot of people sign up for Cloudflare because they provide “free SSL”. This indeed is a great feature which totally makes sense as you want to serve all your content over HTTPS, so your CDN should support HTTPS as well. Unfortunately, and that is what most people don’t understand, they can only provide this for their part of the connection. This means that they start using HTTPS on their servers and then serve content from there to the client. If your website (the so called origin host) does not support HTTPS, this means the data is completely unprotected between your origin and Cloudflare. Even worse, this gives the user the impression that the site and data entered on the site is encrypted and protected while in fact it’s not. Cloudflare cannot modify settings on your server, so they can only do their part to make things safer. You still need to ensure that you’re providing security for the data on your origin server. That‘s what most people fail to understand. If you did the first thing right — enabled HTTPS on your origin server — then things are slightly better. In this case, you can tell Cloudflare to only connect to your origin over HTTPS and to only serve content to the client using HTTPS. Now we have one more problem: Cloudflare’s Full SSL does not validate the origin certificate – it just uses it, so it might be invalid, self-signed, malicious. At least it means the connection between the servers is always secured by HTTPS. There is what Cloudflare calls “Full SSL strict” which validates the certificate itself, but it’s more like “Basic SSL” because you can’t ensure your customer’s data is encrypted and safe. Cloudflare (or any other third party service) sits between browser and server and optimizes (i.e. modifies) content for delivery, or to prevent attacks on your server. The problem is that the data is unencrypted while it’s at Cloudflare. HTTPS works for the transfer but is not end-to-end encryption of the actual data sent. This means all content temporarily is unencrypted on the third party service’s machine. Even if you fully trust the company itself with your (and your client’s) data, then the problem is that another third party could gain access to such traffic-optimizing servers and read data or modify it, resulting in either the origin or the client getting modified content. If you can, you should additionally enable HSTS, or HTTP Strict Transport Security. You do this by adding a rule to your server config that sets this flag. If you set this flag, a browser will only connect to the specified domain over HTTPS for the given timeframe. The timeframe should be set very long, Twitter for example sets it to 20 years to avoid this rule being changed in the event of an attack on their servers. You can also opt-in to include subdomains in this rule. Finally, to prevent your site being exploited due to a compromised root certificate authority, you can set up HPKP, or HTTP Public Key Pinning, which fills the last gap on security for HTTPS. Unfortunately, if you do something wrong here, the consequences are really bad and could mean your website is not available anymore for the timeframe you’ve set (which shouldn’t be too short). You can read more on that matter and how to set HPKP up in this great article by Scott Helme. Let’s Encrypt seems like a big step in the right direction in terms of generating certificates but this still requires knowledge of the command line. Why is basic web security so complex? Why are there not simpler solutions to these problems? Oh yes, it’s great to finally see progress on this with Let’s Encrypt. HTTPS has been around since 1994 and so I’m quite happy that finally, people are beginning to work towards simplifying the process of setting up HTTPS. I see Let’s Encrypt only as the beginning. Talking about this specific service. It’s just reached public beta status. Currently, it only works on the CLI and is very limited when it comes to being run without root privileges. So although it’s great to see things getting simpler, there are still too many hurdles to overcome. I’m eagerly awaiting the point where all hosting companies begin to offer HTTPS for free with a super-easy and automated setup process of for any given domain. Because, honestly, today setting up HTTPS properly is way too complex, even for tech-savvy people. Who do you think should be responsible for web security? Should front-end developers spend more time learning about this stuff? Or is the onus on hosting companies to figure out a more elegant technical solution to the problem — like not offering HTTP access at all? This is a complex question that can’t be solved that easily. In an ideal world, setting up HTTPS properly for a domain would be easy as a click in a web host’s interface or a single command on a server for a server admin. There’s still a long way to go until we reach that point. Until this is the case, us developers need to take care of this. As a full-stack or backend developer, you should take care of setting up the certificate on the server. As a front-end or full-stack developer you should take care to enable HSTS and enforcing HTTPS by default, taking care of a proper Content Security Policy, along with other security measures. Each developer, regardless of their title, has a duty to ensure the built project creates a safe and encrypted environment for its users. Regarding not offering HTTP at all anymore—let’s talk about this again when we solved the still-remaining problems described above. Until then, I don’t believe we should aim to “deprecate” HTTP in general, especially as we still have a lot of legacy regarding hardware, cipher-support, and software out there in the world which would need to go away for a HTTPS-only world. Which resources would you recommend so that I can learn more about web security? Fortunately, these topics are well covered with lots of helpful blog posts out there. In general, you should read the articles written by Scott Helme to get into details of specific security features and how to enable them on your website. He has also built securityheaders.io, a tool that checks your site on how secure it is and what you should improve. If you want to start using Let’s Encrypt for your HTTPS, Tim Kadlec’s starter post is a good idea and also his post on how to enable HSTS with it. Finally, if you want to know more, check this security link list by Troy Hunt. And if you want to get an overview of the basic technologies then you can find good explanations on Wikipedia as well. Thanks Anselm!
Mid
[ 0.6532663316582911, 32.5, 17.25 ]
It has been a while since my last post….but summer is here! I’ll try to make my posts more regular as I’ll have more free time than usual. SO, for today’s recipe. I’m absolutely obsessed with the Food Network. I don’t usually watch the Chew, but I couldn’t resist their “Ultimate Meatless Monday” themed episode. The recipe that really looked amazing to me was Daphne Oz’s Utlimate Dragon Bowl. I eat too much rice already so i changed the ratios a bit (more kale, less rice) but kept almost everything else as it was in the original recipe. When I made this originally, I doubled it but I’ll half everything back to about the original, so it should be about 4 servings. All that aside and with no further ado, here’s the recipe: Ingredients 1 large sweet potato, peeled and sliced into 1/2″ pieces EVOO 1 – 14 ounce can of chick peas, rinsed and well drained 2 teaspoons dried cumin 2 teaspoons paprika 2 cloves of roasted garlic and/or smashed garlic about one cup rice or quinoa crushed red pepper flakes sprinkle of dried oregano about 3/4 of a bag of pre-washed and cut kale (take out the bigger stems if there are any left) 1 diced avocado 4 eggs over-easy, or sunny side-up (or even poached if you’re feeling adventurous!) Omit this step to make it 100% vegan Something spicy – the original calls for sriracha but that’s too much for me. I used bibimbap sauce (a Korean red sauce with a bit of heat) but really anything would work. Directions
Mid
[ 0.6322580645161291, 36.75, 21.375 ]
Delhi Waveriders stunned defending champions Ranchi Rays 7-4 in a hard-fought battle in the 4th Coal India Hockey India League on Thursday. The hosts, who won their first home match after losing four consecutive games, reignited their hopes of getting a berth in the play-offs to be played at Ranchi on February 20 and 21. An excellent forward line along with some critical and scintillating saves from Devon Manchester ensured the Waveriders managed a convincing victory over table toppers Ranchi Rays. With this win, Delhi Waveriders move to the fifth place in the table with 22 points to their kitty from nine games. Ranchi Rays still lead the points tally with 27 points. The match began on an attacking note with Delhi Waveriders pressing hard to score. The hosts seemed beaming with energy as most of the game was happening around the Ranchi Rays circle. Continuous attacks led to the home team's first success in the 7th minute through Mandeep Singh's field goal giving the Delhi Waveriders an early 2-0 lead. Delhi Waveriders did not settle down post this and kept on attacking and entering the opponents circle in quick successions. One such move yielded results in the 13th minute when the Waveriders were awarded a penalty corner and Talvinder Singh made no errors in converting it giving the home team a comfortable 3-0 lead. The defending champions were left stunned post these two goals and tried hard to reorganise themselves as the first quarter came to an end with Delhi Waveriders leading 3-0. The second quarter was no different as the hosts kept on pressing hard and struck for the third time in the 19th minute with a field goal through Talvinder Singh to give the hosts a massive lead of 5-0 in the first half. Delhi Waveriders started the second half on an attacking note but Ranchi Rays had collected themselves and their defence line played true to their reputation, foiling many attempts to score from the hosts. The visitors finally achieved success through captain Ashley Jackson in the 35th minute, making it 5-2 in favour of Delhi Waveriders. The Waveriders managed to add one more to their tally as Mandeep Singh scored his second goal of the day in the 42nd minute giving the hosts a strong 7-2 lead in the game. Ranchi Rays tried hard to score on the counter but Devon Manchester made some beautiful saves for the Waveriders as the third quarter came to an end with the score board reading 7-2. Ranchi found success in the 50th minute through a field goal from Trent Mitton to make it 7-4 still in the favour of Delhi Waveriders.
Mid
[ 0.636363636363636, 33.25, 19 ]
The Football Show A look at all the latest news from around the world of football, with discussion of the big talking points as the summer transfer window heads into its final few days. Also in HD
Low
[ 0.49126637554585106, 28.125, 29.125 ]
Time to Ax Federal Jobs Programs With the nation’s unemployment rate still above 9 percent and a steady stream of worrisome labor news (the latest statistic: 429,000 new unemployment claims last week), federal policymakers are facing pressure to do something about joblessness. The giant 2009 stimulus bill was supposed to cut unemployment to less than 7 percent by now — but that clearly hasn’t worked as planned. Some policymakers are now looking at expanding job training and other federal employment programs. Even conservative House Budget Committee ChairmanPaul Ryan (R-Wis.) proposed to “strengthen” these programs in his recent fiscal plan. Alas, the history of waste and failure in these programs argues for termination, not expansion. Federal programs for unemployed and disadvantaged workers now cost $18 billion a year, yet the Government Accountability Office recently concluded that “little is known about the effectiveness of employment and training programs we identified.” Indeed, many studies over the decades have found that these programs — though well intentioned — don’t help the economy much, if at all. Worse, federal jobs programs have long been notorious for wastefulness. The word “boondoggle” was coined in the 1930s, to describe the inefficiencies of New Deal jobs programs. Laborers on Works Progress Administration projects were generally viewed as slackers, and a popular song of the era went, “WPA, WPA, lean on your shovel to pass the time away.” The modern era of jobs programs began in the 1960s, under Presidents John F. Kennedy and Lyndon B. Johnson, who created an array of employment services. Indeed, so many overlapping programs were created that, in 1969, Labor Secretary George Shultz called the organization chart for jobs programs a “wiring diagram for a perpetual motion machine.” In the 1970s, President Richard Nixon created — and President Jimmy Carter then expanded — the Public Service Employment Program, which used federal dollars to create hundreds of thousands of jobs in local governments and community groups. The program was “scandal-ridden,” according to Congressional Quarterly, and led to many “newspaper exposés of local instances of nepotism, favoritism and other kinds of fraud.” Luckily, President Ronald Reagan killed the entire program. Unfortunately, he then backed a wasteful “conservative” solution to high unemployment — expanded job training. Reagan said the Job Training Partnership Act of 1982 would not be “another make-work, dead-end bureaucratic boondoggle.” But in his book, The Job Training Charade, University of Oregon labor professor Gordon Lafer found that “from its start, JTPA was plagued by widespread abuse and mismanagement.” A 1994 official study on JTPA found that job-training programs created no significant benefits for most participants. Subsequent legislation has allegedly improved these programs. But, Lafer notes, “as successive generations of job-training programs fail to produce the hoped-for results, policymakers have cycled through a stock repertoire of procedural fixes that promise to solve the problem.” They don’t, but politicians keep trying. Ryan now argues that the budget “is dotted with failed, unaccountable and duplicative job-training programs.” But rather than repealing them, his recent budget plan wants to make them more “targeted.” Ryan’s budget-reform efforts are laudatory, but he should follow his own plan’s advice to “limit government to its core constitutional roles” — and terminate federal jobs programs. The good news is that federal job-training and employment programs don’t fill any critical need that private markets can’t fill in the modern economy. The vast majority of U.S. job training, for example, is done by individuals and businesses without government help in the normal pursuit of higher wages and profits. U.S. organizations spent more than $120 billion a year on employee learning and development, according to the American Society for Training and Development. Other Labor Department activities are also redundant. The department helps fund 3,000 offices nationwide that provide unemployed workers with job-searching and job-matching services. In turns out that remarkably few people use these services, even with today’s high unemployment. To solve the federal budget mess, policymakers need to restrain their impulses to “help” the economy with spending programs. Federal help usually doesn’t work — it just consumes resources that would have created jobs and growth if left in the private sector. As Congress scours the budget looking for spending cuts, employment and training programs would be good targets.
Mid
[ 0.5425742574257421, 34.25, 28.875 ]
In Search of Love Description A survey of men and women's feelings on love, sex, hope, desire and relationships in the 1990s. The data has been compiled using Dateline's questionnaires and the study provides a history of love and how it has changed over the years. The author has also written "The Mating Trade".show more
Low
[ 0.524137931034482, 38, 34.5 ]
Cape Town - Plans to build a permanent desalination plant have been put on ice following the good rains. Although the City’s three temporary desalination plants in Strandfontein, Monwabisi and at the V&A Waterfront have already come online, Deputy Mayor Ian Neilson said a permanent plant had not been “triggered yet”. (The temporary plants) were part of the City’s drought emergency response. What our outlook document refers to is the consideration of permanent desalination as part of Cape Town’s water mix going into the future, along with other sources. A permanent desalination project has not yet been triggered. “Dam levels, consumption levels and trends; the progress on groundwater abstraction projects and relative costs are some of the factors that will be considered,” Neilson said. According to the latest Water Outlook Report, the procurement of a permanent desalination plant has not begun. The report states: “The project is in progress to enable water quality sampling over an extended period to feed into the site selection process for permanent desalination. While the immediate requirement to augment supply has not been agreed on, undertaking an updated feasibility study is seen as a no-regret endeavour.”
Mid
[ 0.556962025316455, 33, 26.25 ]
// // Copyright (C) 2002-2005 3Dlabs Inc. Ltd. // Copyright (C) 2013 LunarG, Inc. // // All rights reserved. // // Redistribution and use in source and binary forms, with or without // modification, are permitted provided that the following conditions // are met: // // Redistributions of source code must retain the above copyright // notice, this list of conditions and the following disclaimer. // // Redistributions in binary form must reproduce the above // copyright notice, this list of conditions and the following // disclaimer in the documentation and/or other materials provided // with the distribution. // // Neither the name of 3Dlabs Inc. Ltd. nor the names of its // contributors may be used to endorse or promote products derived // from this software without specific prior written permission. // // THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS // "AS IS" AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT // LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS // FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE // COPYRIGHT HOLDERS OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, // INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, // BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; // LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER // CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT // LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN // ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE // POSSIBILITY OF SUCH DAMAGE. // #ifndef _GLSLANG_SCAN_INCLUDED_ #define _GLSLANG_SCAN_INCLUDED_ #include "Versions.h" namespace glslang { // Use a global end-of-input character, so no translation is needed across // layers of encapsulation. Characters are all 8 bit, and positive, so there is // no aliasing of character 255 onto -1, for example. const int EndOfInput = -1; // // A character scanner that seamlessly, on read-only strings, reads across an // array of strings without assuming null termination. // class TInputScanner { public: TInputScanner(int n, const char* const s[], size_t L[], const char* const* names = nullptr, int b = 0, int f = 0, bool single = false) : numSources(n), // up to this point, common usage is "char*", but now we need positive 8-bit characters sources(reinterpret_cast<const unsigned char* const *>(s)), lengths(L), currentSource(0), currentChar(0), stringBias(b), finale(f), singleLogical(single), endOfFileReached(false) { loc = new TSourceLoc[numSources]; for (int i = 0; i < numSources; ++i) { loc[i].init(i - stringBias); } if (names != nullptr) { for (int i = 0; i < numSources; ++i) loc[i].name = names[i] != nullptr ? NewPoolTString(names[i]) : nullptr; } loc[currentSource].line = 1; logicalSourceLoc.init(1); logicalSourceLoc.name = loc[0].name; } virtual ~TInputScanner() { delete [] loc; } // retrieve the next character and advance one character int get() { int ret = peek(); if (ret == EndOfInput) return ret; ++loc[currentSource].column; ++logicalSourceLoc.column; if (ret == '\n') { ++loc[currentSource].line; ++logicalSourceLoc.line; logicalSourceLoc.column = 0; loc[currentSource].column = 0; } advance(); return ret; } // retrieve the next character, no advance int peek() { if (currentSource >= numSources) { endOfFileReached = true; return EndOfInput; } // Make sure we do not read off the end of a string. // N.B. Sources can have a length of 0. int sourceToRead = currentSource; size_t charToRead = currentChar; while(charToRead >= lengths[sourceToRead]) { charToRead = 0; sourceToRead += 1; if (sourceToRead >= numSources) { return EndOfInput; } } // Here, we care about making negative valued characters positive return sources[sourceToRead][charToRead]; } // go back one character void unget() { // Do not roll back once we've reached the end of the file. if (endOfFileReached) return; if (currentChar > 0) { --currentChar; --loc[currentSource].column; --logicalSourceLoc.column; if (loc[currentSource].column < 0) { // We've moved back past a new line. Find the // previous newline (or start of the file) to compute // the column count on the now current line. size_t chIndex = currentChar; while (chIndex > 0) { if (sources[currentSource][chIndex] == '\n') { break; } --chIndex; } logicalSourceLoc.column = (int)(currentChar - chIndex); loc[currentSource].column = (int)(currentChar - chIndex); } } else { do { --currentSource; } while (currentSource > 0 && lengths[currentSource] == 0); if (lengths[currentSource] == 0) { // set to 0 if we've backed up to the start of an empty string currentChar = 0; } else currentChar = lengths[currentSource] - 1; } if (peek() == '\n') { --loc[currentSource].line; --logicalSourceLoc.line; } } // for #line override void setLine(int newLine) { logicalSourceLoc.line = newLine; loc[getLastValidSourceIndex()].line = newLine; } // for #line override in filename based parsing void setFile(const char* filename) { TString* fn_tstr = NewPoolTString(filename); logicalSourceLoc.name = fn_tstr; loc[getLastValidSourceIndex()].name = fn_tstr; } void setFile(const char* filename, int i) { TString* fn_tstr = NewPoolTString(filename); if (i == getLastValidSourceIndex()) { logicalSourceLoc.name = fn_tstr; } loc[i].name = fn_tstr; } void setString(int newString) { logicalSourceLoc.string = newString; loc[getLastValidSourceIndex()].string = newString; logicalSourceLoc.name = nullptr; loc[getLastValidSourceIndex()].name = nullptr; } // for #include content indentation void setColumn(int col) { logicalSourceLoc.column = col; loc[getLastValidSourceIndex()].column = col; } void setEndOfInput() { endOfFileReached = true; currentSource = numSources; } bool atEndOfInput() const { return endOfFileReached; } const TSourceLoc& getSourceLoc() const { if (singleLogical) { return logicalSourceLoc; } else { return loc[std::max(0, std::min(currentSource, numSources - finale - 1))]; } } // Returns the index (starting from 0) of the most recent valid source string we are reading from. int getLastValidSourceIndex() const { return std::min(currentSource, numSources - 1); } void consumeWhiteSpace(bool& foundNonSpaceTab); bool consumeComment(); void consumeWhitespaceComment(bool& foundNonSpaceTab); bool scanVersion(int& version, EProfile& profile, bool& notFirstToken); protected: // advance one character void advance() { ++currentChar; if (currentChar >= lengths[currentSource]) { ++currentSource; if (currentSource < numSources) { loc[currentSource].string = loc[currentSource - 1].string + 1; loc[currentSource].line = 1; loc[currentSource].column = 0; } while (currentSource < numSources && lengths[currentSource] == 0) { ++currentSource; if (currentSource < numSources) { loc[currentSource].string = loc[currentSource - 1].string + 1; loc[currentSource].line = 1; loc[currentSource].column = 0; } } currentChar = 0; } } int numSources; // number of strings in source const unsigned char* const *sources; // array of strings; must be converted to positive values on use, to avoid aliasing with -1 as EndOfInput const size_t *lengths; // length of each string int currentSource; size_t currentChar; // This is for reporting what string/line an error occurred on, and can be overridden by #line. // It remembers the last state of each source string as it is left for the next one, so unget() // can restore that state. TSourceLoc* loc; // an array int stringBias; // the first string that is the user's string number 0 int finale; // number of internal strings after user's last string TSourceLoc logicalSourceLoc; bool singleLogical; // treats the strings as a single logical string. // locations will be reported from the first string. // Set to true once peek() returns EndOfFile, so that we won't roll back // once we've reached EndOfFile. bool endOfFileReached; }; } // end namespace glslang #endif // _GLSLANG_SCAN_INCLUDED_
Low
[ 0.46756152125279604, 26.125, 29.75 ]
Immunohistochemical characterization of inflammatory infiltrates in primary biliary cirrhosis. Ten liver biopsy specimens from nine patients with PBC stages II to IV were studied immunohistochemically with a broad panel of monoclonal antibodies. In areas of bile-duct proliferation, many BA1+ B-lymphocytes and OKT4+/Leu3a+ helper/inducer T-cells were observed, admixed with some C3b-receptor positive, mono- and polymorphonuclear OKM1+ cells. Numerous IgM-containing plasma cells were seen in portal tracts showing bile-duct proliferation. In contrast, areas of piecemeal necrosis and intralobular spotty necrosis consisted mainly of OKT4+/Leu3a+ helper/inducer, and OKT8+ suppressor/cytotoxic T-cells, admixed with some OKM1+ polymorphonuclear granulocytes. Almost no BA1+ B-lymphocytes or Ig-containing plasma cells were observed in areas of piecemeal necrosis and spotty necrosis. Major histocompatibility complex (MHC)-class I antigens (i.e. HLA-A,B,C) were demonstrated either on the liver cell membrane, or on sinusoidal lining cells. The latter also expressed MHC-class II antigens (i.e. HLA-DR). In two liver biopsies, an increased expression of HLA antigens was observed near areas of piecemeal and spotty necrosis. Our results indicate that several immune mechanisms each with a particular topographical distribution, are operative in PBC. Inflammatory cells, involved in humoral immunity, are present mainly in areas of bile duct proliferation. In contrast, the effector cells of antigen-specific cellular cytotoxicity are present in areas of piecemeal necrosis and spotty necrosis. In the latter areas, a pronounced expression of MHC products representing the afferent limb of the cell-mediated immune response, may permit an optimal T-cell-mediated immune effect or, eventually, result in adverse effects.
High
[ 0.7147058823529411, 30.375, 12.125 ]
Incidence of three-rooted mandibular first molars among contemporary Japanese individuals determined using multidetector computed tomography. The purpose of this study was to determine the incidence of three-rooted mandibular first molars in a contemporary Japanese population using multidetector computed tomography (MDCT) and examine whether this characteristic root form may be useful for identification purposes. Prior to their forensic autopsies, we obtained MDCT scans of 365 cadavers (255 males, 110 females) with mandibular first molars on both sides. Altogether, 730 mandibular first molars were examined morphologically on reconstructed CT images, and the incidence of three-rooted molars was recorded. The results were analyzed statistically to determine sex and left-right differences using the chi-square test. In all, 189 (25.9%) of the 730 mandibular first molars had three roots: 79 (31.0%) in the 255 males and 35 (31.8%) in the 110 females. No statistically significant difference was found between the sexes. In the 39 individuals who had unilateral three-rooted mandibular first molars, 7 (17.9%) were on the left side and 32 (82.1%) were on the right side, indicating a statistically significant predominance on the right side. The incidence of three-rooted mandibular first molars in contemporary Japanese individuals was 25.9%, with no statistically significant sex difference, but in the case of unilateral three-rooted teeth, with a statistically significant predominance on the right side. Our study found that Japanese and northeastern Asians have a high incidence of the three-rooted mandibular first molars among individuals of Mongolian origin; this finding may be a useful screening tool for identification of unknown individuals.
High
[ 0.6811594202898551, 35.25, 16.5 ]
Q: Outgoing FTP timing out/blocked On a Windows Server 2008 R2 Web server, I have a Windows Service which uploads files to an external FTP server. Actually multiple servers (Google, Bing, etc.). This is a .NET application which uses the built-in .NET FTP libraries. I'm getting a mixture of the following errors: The operation has timed out. The remote server returned an error: (425) Can't open data connection. Windows Firewall (Domain, Private, Public) is set to allow outbound connections. A: FTP is not a firewall-friendly protocol. It predates the Internet era where firewalls were common, so assumes it's perfectly oK for both sides of a conversation to open ports with each other. The COMMAND channel, which is what you open when you connect to an FTP server, is a connection you initiate between you and the server. The DATA channel, what you use to download stuff, is a connection initiated by the FTP Server to you. What's worse, the port your FTP chooses to present is a random high port so configuring your firewall to allow the right ports is tricky. This is why they created "Passive" mode in the FTP protocol. This is the PASV verb. This tells the FTP server to reverse the initiation direction of the DATA channel; it gives the client the high port to connect to, the client initiates the connection, and the server feeds data over that connection. Much easier to firewall. For .NET's libraries, you'll probably get better luck setting the UsePassive property to True.
High
[ 0.6858638743455491, 32.75, 15 ]
The One Airplane Joke That Kept The Directors From Getting Fired With the release of the most recent spoof movie Fifty Shades of Black we’ve written a bit around here about why the spoof genre may be dying before our eyes. While that would be a tragedy, the good news is that we will always have the great spoofs to go back to when we’re in need of great comedy. The original Zucker Brothers masterpiece Airplane! is one of those movies. The parody of great disaster movies was actually one of the first of its kind. The idea was so new that the studio considered firing the three filmmakers from the film after the first week. However, one joke helped the studio understand what the directors were trying to accomplish. It’s a really good thing that the "Don’t call me Shirley" line was filmed early. Paramount Pictures was apparently so nervous about the three unknown directors, brothers Jerry and David Zucker along with Jim Abrahams, playing with a concept that the studio apparently didn’t understand, that their contract was actually written so that Paramount had the right to fire them after the first week of filming. At the end of that first week, the dailies were reviewed and luckily the joke that would become the movies’ most well known struck a chord with the studio as well. As it turned out, the ‘Don’t call me Shirley’ scene was filmed on the first day of shooting. When Paramount Pictures watched the dailies and saw that joke and the way it played, they were relieved. They finally understood the concept and were much more comfortable dealing with us. According to their interview with Vulture, once the three had the studio’s support, it opened up the floodgates and they were able to make the movie they wanted to make. It turns out they hadn’t been given the ok to actually cast known actors like Robert Stack and Peter Graves until after they got approval from Paramount. Now that the studio understood what these guys were doing, they were trusted to not do any damage the valuable property that was these actors’ careers. What’s often forgotten today is that all of these actors were well known for being in serious films, including movies similar to the thrilling disaster movies that Airplane! was spoofing. While this film would start a second career for Leslie Nielsen doing almost exclusively spoofs, like the Police Squad TV series and it’s follow up Naked Gun movies, he had actually been a serious actor previously. Which, of course, was the point. The joke wasn’t simply the line, it was the guy saying the line. Luckily for all of us, Airplane! was made as the directors intended, leading to a number of other memorable spoof movies from the trio. Now, what do think it will take to get them back and making more of these great films? We could really use them.
Mid
[ 0.612826603325415, 32.25, 20.375 ]
Cheetah3D Cheetah3D is a computer graphics program for 3D modelling, animation and rendering. It is written in Cocoa for MacOS. The program is aimed at beginning and amateur 3D artists. It offers a number of medium and high-end features in conjunction with an intuitive user interface. Its simplicity is what makes it stand apart from other programs. It was initially released in 2003 and is currently available on Intel based Macs. A single user license is $99 US. A free demo version is available, with the limitation of the ability to save or export models. Features Cheetah3D is aimed primarily at amateur artists, and so focuses on providing features for creating simple 3D scenes. Its selection of features is narrow but focused to add in its usefulness and simplicity. It supports a variety of geometric primitives, including polygon meshes and Bezier curves. Its features also allow for box modeling with subdivision surfaces In addition, it has some simple animation support, including spline-based camera paths and targeted objects, skeletal deformations, morph targets, and subdivision surfaces, making its character animation effective. The program also has several advanced rendering settings, which allow for antialiasing, raytraced shadows, depth of field, HDRI, ambient occlusion, caustics lighting, soft shadowing and photon-mapped caustics. Many common 3D file formats are supported, including 3ds, obj, sia, and FBX. Media produced by the program can also be used in Unity, which is a game development tool. Cheetah3D 5.0 was released on 8 October 2009 and requires at least Mac OS X v10.4. This was also the last version to support the PowerPC. Features include a node-based material system, an improved render engine, new modelling tools such as a bevel tool and a bend modifier, and Collada file format support. Official video tutorials Cheetah3D for Beginners are currently available based on this version. Cheetah3D 6.0 was released on 13 April 2012 and requires Mac OS X v10.6 or later. Added features include Bullet Physics integration including rigid body and soft body simulation and integration with the existing particle system, isosurfaces, and support for Mac OS X Lion. A third-party manual Learn 3D With Cheetah 3D was released simultaneously with this version. Cheetah3D 6.0.1 - 6.3.2 were released between 26 July 2012 and 28 September 2014. Added features include support for Mac OS X Mountain Lion, Retina Display support, support for spline IK, improved Ring and Loop selection, ABF unwrapping, and an added split joint tool. Also included are improved Mac OS X Mavericks compatibility & support for GateKeeper v2 signatures. Cheetah3d 7 Beta was released on 1 May 2016. It added a UI update, a new renderer, NGon Booleans, movie textures, soft selections, Collada support, layers, motion blur for frame sequences (via the new renderer) and more. Cheetah3d 7.0 was released in October of 2017. References External links Official Web Site Category:3D graphics software Category:Animation software Category:MacOS-only software Category:2003 software
High
[ 0.6792452830188671, 31.5, 14.875 ]
Q: Using location with different control types I want to use the following method. private void LocationChange(Object obj, int first, int second) { // so then if i say obj.Location = new Point(first,second); } but this won't work for me is there a way around this? Thanks for the help A: Since Location is a property of Control, you ought to make the parameter of that type: private void LocationChange(Control control, int first, int second) { control.Location = new Point(first,second); } You can then pass any type that subclasses Control into that method. I'm not sure why you would allow any object to be passed into the method if it's meant to operate on a Control specifically, but if you had some other, non-control-specific logic in there, you could cast the parameter, like so: private void LocationChange(Object obj, int first, int second) { // Logic that operates on the object regardless of its type goes here... // Although I'm not sure what that logic would be. :) // This check works since .NET 2.0 (I believe?) and lets you avoid // an InvalidCastException if obj happens NOT to be a subclass of Control... if(obj is Control) { ((Control)obj).Location = new Point(first,second); } }
Mid
[ 0.5892857142857141, 33, 23 ]
using System; using MvvmCross.Core.ViewModels; namespace NavDrawer.Core.ViewModels { public class FriendsViewModel : MvxViewModel { public FriendsViewModel () { } } }
Low
[ 0.449411764705882, 23.875, 29.25 ]
YddG from Escherichia coli promotes export of aromatic amino acids. The inner membrane protein YddG of Escherichia coli is a homologue of the known amino acid exporters RhtA and YdeD. It was found that the yddG gene overexpression conferred resistance upon E. coli cells to the inhibiting concentrations of l-phenylalanine and aromatic amino acid analogues, dl-p-fluorophenylalanine, dl-o-fluorophenylalanine and dl-5-fluorotryptophan. In addition, yddG overexpression enhanced the production of l-phenylalanine, l-tyrosine or l-tryptophan by the respective E. coli-producing strains. On the other hand, the inactivation of yddG decreased the aromatic amino acid accumulation by these strains. The cells of the E. colil-phenylalanine-producing strain containing overexpressed yddG accumulated less l-phenylalanine inside and exported the amino acid at a higher rate than the cells of the isogenic strain containing wild-type yddG. Taken together, these results indicate that YddG functions as an aromatic amino acid exporter.
High
[ 0.668500687757909, 30.375, 15.0625 ]
What We Think "Learning the art of leadership development" By: Geoff Aigner True leadership requires a higher motivation as well as a highly developed skill set, says Geoff Aigner in this article in Fundraising & Philanthropy Australia magazine. "True leadership embodies a high dream and purpose. It means working out the kind of life we want to live and the world we want to live in. It also means that leadership is not a lot of things. It is not management, entrepreneurialism or dictatorship. It is the responsible use of power to make progress. And this progress means helping systems of people understand and solve their own problems."
Mid
[ 0.647058823529411, 35.75, 19.5 ]
861 So.2d 1145 (2003) Anwar Yasin CAMERON v. STATE of Alabama. CR-01-1845. Court of Criminal Appeals of Alabama. February 28, 2003. Rehearing Denied April 25, 2003. *1147 Gary L. Blume, Tuscaloosa, for appellant. William H. Pryor, Jr., atty. gen., and Elizabeth Ray Butler, asst. atty. gen., for appellee. COBB, Judge. I. Statement of the Case On May 18, 2001, Anwar Yasin Cameron was indicted for trafficking in marijuana, a violation of § 13A-12-231(1), Ala.Code 1975. On October 2, 2001, Cameron filed a motion to suppress the marijuana. On November 11, 2001, the trial court conducted a hearing. On February 28, 2002, the trial court denied Cameron's motion to suppress. On May 31, 2002, pursuant to a negotiated plea agreement, Cameron pleaded guilty to trafficking in marijuana, but expressly reserved his right to appeal the trial court's denial of his motion to suppress the marijuana. The trial court noted Cameron's reservation of the right to appeal the denial of the motion to suppress and sentenced him to 10 years in prison. The trial court also fined him $25,000 pursuant to § 13A-12-231(1)(a), Ala.Code 1975, fined him $1,000 pursuant to the Demand Reduction Assessment Act, see § 13A-12-281(a), Ala.Code 1975, and fined him $100 for the Alabama Forensic Sciences Trust Fund, see § 36-18-7(a), Ala. Code 1975. This appeal followed. *1148 II. Statement of the Facts On March 20, 2001, Officer Lee Watkins was on routine patrol when he noticed a vehicle parked on the lawn of a housing project. Officer Watkins testified that the vehicle was "backed up to the front porch... just about to the building." (R. 9.) Officer Watkins testified that he stopped at the apartment where the vehicle was parked because law enforcement officers had been advised by the Tuscaloosa Housing Authority to ask the owner of a vehicle parked on the lawn to move the vehicle. Officer Watkins got out of his patrol car and approached the door of the unit closest to the vehicle to determine whether the tenant of the unit owned the illegally parked vehicle, and, if so, to ask the tenant to move the vehicle. When Officer Watkins knocked on the door, Cameron answered. Officer Watkins testified that he "could smell a strong smell of marijuana," that it was "overwhelming," and that he could see "real[ly] heavy smoke ... in the apartment." (R. 11.) Officer Watkins testified that he had smelled marijuana before the date in question and that he was capable of recognizing the smell of marijuana. Officer Watkins asked to speak to the tenant. Officer Watkins testified that Cameron then turned and ran to the kitchen. Officer Watkins testified that, at that point, he entered the apartment without a search warrant. Officer Watkins saw Cameron "taking objects from the table that was in the kitchen and put[ting them] in a drawer in the kitchen." (R. 13.) Officer Watkins testified that, in his experience, when someone has marijuana in his possession and he sees the police, that person will "try to flush it, hide it, [or] get rid of it." (R. 30.) Officer Watkins asked Cameron to sit down at the kitchen table, where another black male was already seated. Officer Watkins testified that, at that point, he could hear someone else walking down the hallway behind him. Officer Watkins testified that he called for backup because the rest of the apartment was dark, and he could not ascertain how many other people were in the apartment or where those other people were. The tenant emerged from the hallway and began moving items around on the kitchen table. When Officer Watkins saw her put something from the table into an empty fast-food box, Officer Watkins asked her to sit down at the table with the other two men. While waiting for backup to arrive, Officer Watkins asked the three people for their identification and wrote down the information. Backup arrived shortly thereafter, and Officer Watkins looked through the apartment to determine whether there were other people in the back of the apartment. While Officer Watkins was looking through the apartment for other people, Officer Richard Mason talked with the tenant, who consented to the search of her apartment. The officers found a digital scale and approximately 2.4 pounds of marijuana, the majority of which was found in brick form in the tenant's bedroom. Cameron testified that he did not run when Officer Watkins asked for the tenant. He testified that he turned and merely walked to the kitchen and that running would have been impossible because only four or five feet of space separated the front door and the kitchen. Cameron testified that, when he entered the kitchen, he discovered that Officer Watkins had entered the apartment and followed him into the kitchen. Cameron also testified that, when he and Officer Watkins entered the kitchen, the tenant was already present at the kitchen table and that she did not emerge from the hallway behind Officer Watkins, as Officer Watkins had testified. *1149 Cameron testified that Officer Watkins's initial search was not the search for other people in the apartment; he maintained that, while waiting for backup to arrive, Officer Watkins searched through the garbage can and searched the drawer in the kitchen. III. Analysis "[A] trial court's ruling based upon conflicting evidence given at a suppression hearing is binding on this Court... and is not to be reversed absent a clear abuse of discretion." Jackson v. State, 589 So.2d 781, 784 (Ala.Crim.App. 1991). "It is well settled that warrantless entries to and searches of a residence are presumptively unreasonable and that the burden is on the government to demonstrate exigent circumstances justifying a warrantless entry and search. Welsh v. Wisconsin, 466 U.S. 740 (1984); Payton v. New York, 445 U.S. 573 (1980); Landreth v. State, 600 So.2d 440 (Ala.Cr.App.1992). To justify a warrantless entry and search, the state needs to show both the existence of probable cause and exigent circumstances. United States v. Rodgers, 924 F.2d 219 (11th Cir.1991), cert. denied, 501 U.S. 1221, 111 S.Ct. 2834, 115 L.Ed.2d 1003 (1991), appeal after remand, 981 F.2d 497 (11th Cir.1993); Etheridge v. State, 414 So.2d 157 (Ala. Cr.App.1982)." A.A.G. v. State, 668 So.2d 122, 126 (Ala. Crim.App.1995) (some internal citations altered). "The establishment of probable cause requires only that facts available to the officer at the moment of [entry] would warrant a person of reasonable caution to believe that the action taken by the officer was appropriate." A.A.G., 668 So.2d at 127. A. Probable Cause The first part of the inquiry requires us to determine whether the odor of marijuana emanating from the residence was sufficient to provide probable cause to believe that there was contraband in the residence. Although we have so held in the case of an automobile, see Smith v. State, 606 So.2d 174 (Ala.Crim.App.1992); Key v. State, 566 So.2d 251 (Ala.Crim.App.1990); and Sterling v. State, 421 So.2d 1375 (Ala. Crim.App.1982), we have yet to reach the question as it concerns a citizen's residence. In Johnson v. United States, 333 U.S. 10, 68 S.Ct. 367, 92 L.Ed. 436 (1948), police officers had received information from a confidential informant that someone was smoking opium in the Europe Hotel. Upon arrival, the narcotics officers, all of whom "were experienced in narcotic work[,] recognized at once a strong odor of burning opium which to them was distinctive and unmistakable. The odor led to Room 1. The officers did not know who was occupying that room. They knocked and a voice inside asked who was there. `Lieutenant Belland,' was the reply. There was a slight delay, some `shuffling or noise' in the room and then the defendant opened the door. The officer said, `I want to talk to you a little bit.' She then, as he describes it, `stepped back acquiescently and admitted us.' He said, `I want to talk to you about this opium smell in the room here.' She denied that there was such a smell. Then he said, `I want you to consider yourself under arrest because we are going to search the room.' The search turned up incriminating opium and smoking apparatus, the latter being warm, apparently from recent use. This evidence the District Court refused to suppress before trial and admitted over *1150 defendant's objection at the trial. Conviction resulted and the Circuit Court of Appeals affirmed." 333 U.S. at 12, 68 S.Ct. 367 (footnote omitted). Although the Court eventually found the warrantless entry and search to be unconstitutional because there were no "exceptional circumstances" to excuse the officers' dispensation with a warrant,[1] it also commented on whether the smell of the opium could constitute probable cause for issuing a warrant: "At the time entry was demanded the officers were possessed of evidence which a magistrate might have found to be probable cause for issuing a search warrant. We cannot sustain defendant's contention, erroneously made, on the strength of Taylor v. United States, 286 U.S. 1 [(1932)], that odors cannot be evidence sufficient to constitute probable grounds for any search. That decision held only that odors alone do not authorize a search without [a] warrant. If the presence of odors is testified to before a magistrate and he finds the affiant qualified to know the odor, and it is one sufficiently distinctive to identify a forbidden substance, this Court has never held such a basis insufficient to justify issuance of a search warrant. Indeed it might very well be found to be evidence of most persuasive character." 333 U.S. at 13, 68 S.Ct. 367. See Coolidge v. New Hampshire, 403 U.S. 443, 468, 91 S.Ct. 2022, 29 L.Ed.2d 564 (1971) ("Incontrovertible testimony of the senses that an incriminating object is on premises belonging to a criminal suspect may establish the fullest possible measure of probable cause."). See also United States v. McSween, 53 F.3d 684 (5th Cir.1995); United States v. Nicholson, 17 F.3d 1294 (10th Cir.1994); United States v. Reed, 882 F.2d 147 (5th Cir.1989); United States v. Haley, 669 F.2d 201 (4th Cir.1982); United States v. Garcia-Rodriguez, 558 F.2d 956 (9th Cir.1977); United States v. Curran, 498 F.2d 30 (9th Cir.1974); State v. Longo, 243 Conn. 732, 708 A.2d 1354 (1998); State v. Dorson, 62 Haw. 377, 615 P.2d 740 (1980). Officer Watkins testified that, when Cameron opened the door to the residence, a strong and overwhelming odor of marijuana emanated from the apartment. He also testified that he saw a large amount of smoke in the house. He testified that he recognized the smell as marijuana based on his experience and training as a police officer and based on the fact that he had previously encountered the smell. This testimony was uncontroverted. Additionally, Officer Watkins also testified that, upon seeing a police officer at the front door, Cameron ran from the room and from Officer Watkins. We hold that the strong and overwhelming smell of marijuana emanating from the house, combined with Officer Watkins's testimony regarding his ability to identify the distinctive odor of marijuana, established the existence of Officer Watkins's probable cause to believe that contraband was present inside the residence. B. Exigent Circumstances The burden rests on the State to prove the existence of an exigent circumstance to overcome the presumption of unreasonableness that attaches to warrantless residential entries and searches. McCammon v. State, 499 So.2d 811 (Ala. Crim.App.1986) (citing Welsh v. Wisconsin, 466 U.S. 740, 104 S.Ct. 2091, 80 *1151 L.Ed.2d 732 (1984)). See also Vale v. Louisiana, 399 U.S. 30, 34, 90 S.Ct. 1969, 26 L.Ed.2d 409 (1970) ("The burden rests on the State to show the existence of such an exceptional situation."). "`[N]o exigency is created simply because there is probable cause to believe that a serious crime has been committed.' Welsh [v. Wisconsin, 466 U.S. 740, 753, 104 S.Ct. 2091, 80 L.Ed.2d 732 (1984)]; Mincey [v. Arizona, 437 U.S. 385, 393, 98 S.Ct. 2408, 57 L.Ed.2d 290 (1978)]. `[T]he mere presence of narcotics, without more, is not such an exigent circumstance as would permit entry into private premises without a proper warrant.' People v. Lee, 83 A.D.2d 311, 444 N.Y.S.2d 100, 102-103 (1981), cert. denied, 460 U.S. 1044, 103 S.Ct. 1443, 75 L.Ed.2d 798 (1983). See also People v. Ouellette, 78 Ill.2d 511, 36 Ill.Dec. 666, 669-70, 401 N.E.2d 507, 510-11 (1979). `The presence of contraband without more does not give rise to exigent circumstances.' United States v. Torres, 705 F.2d 1287, 1297 (11th Cir.1983). "There have been various attempts to formulate an all encompassing definition of exigent circumstances. See Harbaugh and Faust, `Knock on Any Door'—Home Arrests After Payton and Steagald, 86 Dick.L.Rev. 191 (1982); Donnino and Girese, Exigent Circumstances For A Warrantless Home Arrest, 45 Alb.L.Rev. 90 (1980); Comment, Warrantless Arrests: Justification By Exigent Circumstances, 6 Hamline L.Rev. 191 (1983); W. LaFave, 2 Search and Seizure § 6.5 (1978). However, `[t]he exigent circumstances doctrine applies only when the inevitable delay incident to obtaining a warrant must give way to an urgent need for immediate action.' United States v. Satterfield, 743 F.2d [827, 844 (11th Cir.1984)]. The possibility that evidence will be destroyed is an exigent circumstance widely recognized by the courts. Note, Exigent Circumstances for Warrantless Home Arrests, 23 Ariz. L.Rev. 1171, 1177 (1981). `[W]hen police officers have probable cause to search a residence for evidence, and they reasonably believe that such evidence is threatened with loss from any source, they may make a warrantless search of the premises in order to preserve and protect that evidence.' Case note, Residential Searches to Prevent the Destruction of Evidence: An Emerging Exception to the Warrant Requirement, 47 U.Colo. L.Rev. 517, 532 (1976); Comment, Residential Searches to Prevent Destruction of Evidence: A Need for Strict Standards, 70 J.Crim. L. & Crim. 255 (1979); 2 Search § 6.5(b). "In finding the existence of exigent circumstances due to the threatened destruction of evidence, the courts have applied such broad tests as the `"great likelihood that the evidence will be destroyed or removed before a warrant can be obtained," that the evidence is "threatened with imminent removal or destruction," or that the police "reasonably conclude that the evidence will be destroyed or removed before they can secure a search warrant."' 2 Search at p. 438, § 6.5(b). "`When Government agents, however, have probable cause to believe contraband is present and, in addition, based on the surrounding circumstances or the information at hand, they reasonably conclude that the evidence will be destroyed or removed before they can secure a search warrant, a warrantless search is justified. The emergency circumstances will vary from case to case, and the inherent necessities of the situation at the time must be scrutinized. Circumstances which have seemed relevant to courts include (1) *1152 the degree of urgency involved and the amount of time necessary to obtain a warrant, ...; (2) reasonable belief that the contraband is about to be removed, ...; (3) the possibility of danger to police officers guarding the site of the contraband while a search warrant is sought, ...; (4) information indicating the possessors of the contraband are aware that the police are on their trail, ...; and (5) the ready destructibility of the contraband and the knowledge "that efforts to dispose of narcotics and to escape are characteristic behavior of persons engaged in the narcotics traffic."...' United States v. Rubin, 474 F.2d 262, 268-69 (3rd Cir.1973) (citations omitted). See also 2 Search at pp. 439-450." Youtz v. State, 494 So.2d 189, 193-94 (Ala. Crim.App.1986). In this case, as discussed above, Officer Watkins had probable cause to believe that there was marijuana in the residence. Officer Watkins testified that, upon seeing a policeman at the door asking for the tenant, Cameron ran from the front door back into the house to the kitchen. Officer Watkins testified that, upon reaching the kitchen, Cameron immediately began to hide things in the kitchen that had, until that point, been in plain view. Officer Watkins also testified that, in his experience, if a person in possession of illegal drugs becomes aware that a police officer is in the vicinity, that person will destroy the contraband at the first opportunity. Taking all of this into consideration, Officer Watkins could have reasonably concluded from Cameron's suspicious actions that he would likely destroy or remove some portion of the marijuana. Therefore, there existed an exigent circumstance that, when coupled with probable cause, justified Officer Watkins's warrantless entry of the premises. See, e.g., United States v. Tobin, 923 F.2d 1506 (11th Cir.1991) (holding that agents could reasonably conclude from the defendants' hurried actions and furtive looks that the defendants were either aware or afraid that someone was watching them; destruction or removal of some portion of the narcotics was therefore a possibility). See also United States v. Miravalles, 280 F.3d 1328 (11th Cir. 2002) (holding that a reasonable belief that relevant evidence in the apartment, including paper cigar labels, was in imminent danger of destruction and, therefore, exigent circumstances existed). For the reasons stated above, we hold that, under the limited circumstances of this case, that is, in a case where an officer approaches a residence for a legitimate and uncontrived reason and encounters the strong smell of marijuana and marijuana smoke emanating from the residence, coupled with the exigent circumstance of the potential destruction of contraband as evidenced by someone inside the residence running from the officer and attempting to hide or destroy contraband, a warrantless search is justified. Therefore, the trial court did not abuse its discretion by denying Cameron's motion to suppress, and its judgment is affirmed. AFFIRMED. McMILLAN, P.J., and BASCHAB, SHAW, and WISE, JJ., concur. NOTES [1] The Court also found that the warrantless entry and search were not justified as being incident to a lawful arrest. Johnson, 333 U.S. at 16, 68 S.Ct. 367.
Mid
[ 0.577367205542725, 31.25, 22.875 ]
Coalfield, Tennessee Coalfield is an unincorporated community and census-designated place (CDP) in Morgan County, Tennessee, United States. As of the 2010 census, the population of the CDP was 2,463, making Coalfield the most populous settlement in all of Morgan county. The community does have its own post office, with the ZIP code 37719. History Coalfield was originally known as "Ruffner's Station" after Shack Ruffner, an early settler who built a mill in the area. The name "Coalfield" reflects the community's coal mining tradition. It was the site of Coalfield Camp No. 1 and Coalfield Camp No. 2. Coalfield is still a growing community and has a local Post Office as well as locally owned grocery store, 2 convenient stores/gas stations and a Dollar General Store. Geography Coalfield is between Wartburg and Oliver Springs on Tennessee State Route 62. To the west are Frozen Head State Park and the community of Joyner, Tennessee. Education A Morgan County public school, Coalfield School is located in the heart of the community. It includes all grades from kindergarten to grade 12. Enrollment is approximately 500, averaging 45 to 50 graduates every year. The school's mascot is the Yellow Jacket. Coalfield High is noted for its football program, previously coached by University of Tennessee star Garry Kreis. Coalfield Won the Class A State Baseball Championship in 1998. Head Coach, David Treece. Football was Class A State Runner-Up in 2014. Notable people Sid Hudson, baseball player and coach, was a native of Coalfield. Garry Kreis, a Football player for the University of Tennessee between 1967-1969. He played WR position. He joined the coaching staff at Coalfield School in 1979 and was named the head coach in 1987. Kreis was one of the region's most successful head coaches. He led the Coalfield Yellow Jackets to the state semifinal game in 2004, and regularly had his teams in the state quarterfinals. He retired from coaching in 2008. Kreis is still a fixture in the Coalfield community and at University of Tennessee games. Coach Kreis died in 2017. References External links Coalfield School official site Category:Census-designated places in Tennessee Category:Coal towns in Tennessee Category:Unincorporated communities in Tennessee Category:Census-designated places in Morgan County, Tennessee
High
[ 0.713286713286713, 31.875, 12.8125 ]
Back in February, a Shanghai-based developer dropped $26 million on a lot at the southwest corner of Twelfth and Grand in Downtown's booming South Park. Though condos were expected to rise on the site, the land wasn't zoned for that (yet), and at $585 a square foot, the transaction was the most money anyone in Downtown had paid for a site that wasn't even prepped for "dense development." Now the prepping process has begun and the City Planning Commission got a sneak peek yesterday of what's planned for the lot, says the LA Times. Developer City Century envisions a 37-story, 126-unit condo tower, designed by Richard Keating, who designed the Gas Company Tower on Bunker Hill (there's no mention of retail for the groundfloor, which is unusual these days). "This is going to be an architectural building, not just a big slab," Keating assures. The 44,412-square-foot lot is not very roomy, so he's planning a "thin, delicate-looking" high-rise. There was once talk of putting two towers on the site; this skinny skyscraper does leave room for "perhaps another" on the site, but there don't seem to be plans for a second tower right now. When the $100-million project is completed, units are expected to list for between $600,000 and $4 million—about $1,000 per square foot, similar to the pricey prices at the nearby Metropolis megaproject, which is still under construction. The high-rise will have windows that residents can open (pretty rare in Downtown towers) and balconies. City Century managing partner Joseph Lin says that he's gunning for the future residents to be locals who were just waiting for the right skyscraper: "We are purposefully not trying to sell in China." (Chinese buyers have snapped up many units in nearby luxury towers.) That zoning change still needs to come through, though, in addition to the usual approvals for a project like this. Lin says if city officials sign off, work can start in early 2016, with construction taking just under two years. · Chinese developer unveils plans for luxury condo tower in downtown L.A. [LAT] · Two More Condo Towers Probably on the Way in South Park [Curbed LA] · Megaproject Metropolis's Condo Pricing, Renderings Revealed [Curbed LA] · Mapping 28 Projects on the Way in DTLA's Booming South Park [Curbed LA]
High
[ 0.6698795180722891, 34.75, 17.125 ]
In the past week President Donald Trump has criticized Amazon five times over tax issues and CEO Jeff Bezos' ownership of the Washington Post, sparking a decline of more than 8 percent in the company's shares since the first tweet over three trading sessions. But many of the companies Trump criticized on social media since his election victory thrived following his negative tweets. For example Trump repeatedly attacked The New York Times including a tweet on Nov. 13. 2016. Tweet Link The media company's shares rallied about 90 percent through Wednesday versus the S&P 500's approximate 22 percent gain in same time period due to its strong earnings and digital subscription growth. Defense companies have come under Trump's fire. The president went after Boeing for its Air Force One price tag on Dec. 6, 2016. Tweet Link Boeing shares are up more than 110 percent since the post versus the S&P 500's approximate 20 percent gain. The White House reached a new deal with the company for two new Air Force One planes in February. Lockheed Martin was also criticized by Trump for its F-35 "cost overruns" on Dec. 22, 2016. Tweet Link Its shares rallied about 35 percent through Wednesday versus the S&P 500's approximate 17 percent gain since the tweet. To be sure, much of the gains for Boeing and Lockheed came after meetings Trump had with the chief executives of both companies to discuss his criticism. The two stocks also benefited from Trump's budget, which increased defense spending by nearly $80 billion. And not every company rallies after a Trump critique. Merck suffered after the president blasted the drug maker for its prices on Aug. 14, 2017 Tweet Link Merck shares declined about 13 percent versus the market's 7 percent gain since the post. But overall it seems Trump's attacks aren't materially affecting stock prices over the long run. Trump may take more direct regulatory actions against Amazon. But using history as a guide, investors in the e-commerce giant shouldn't be too concerned.
Low
[ 0.521428571428571, 36.5, 33.5 ]
Stem Cell Transplant Update – 4 weeks later 0 likes 579 views Adequate progress is seen in the patient’s eye on who the first ever Stem Cell Transplant in Kenya and East Africa was done. Here are pre-surgery and post-surgery images of the eye. Notice the reduction in cloudiness of the cornea. Kudos to Dr. Joshi and his team!
High
[ 0.6822916666666661, 32.75, 15.25 ]
It makes sense that it’s Republicans introducing laws because they’re the ones whose views are out of fashion in the academy now. A 2016 study showed there were 36 speakers disinviited, and pretty much all were conservative. — Thomas Lindsay, director of the Center for Higher Education at the Texas Public Policy Foundation I went there that day to civilly protest Turning Point USA’s Professor Watch List...I brought a polite sign, stood silently and apart from everyone else. If someone encounters opposition, that does not mean their First Amendment rights have been violated. — Amanda Gailey, University of Nebraska professor I don’t want to feel that my ideas are unwelcome on my own campus. They just seem to go to great lengths to shut down the ideas of groups they don’t agree with. — Kaitlyn Mullen, University of Nebraska student The pitched battle over campus free speech is expanding into state legislatures, with eight enacting laws on the issue, and more than a dozen others considering measures aimed at protecting First Amendment rights in colleges and universities. Florida, Nebraska and Texas are in the midst of acting on introduced bills on campus free speech, and measures are pending in roughly 10 other states. Republicans are the force behind the bills, which vary from one another on some aspects, but at their core seek to change policies and practices on college campuses that lawmakers and their supporters say disproportionately have been used to censor or curtail conservative speakers and student groups. “Free speech is under pressure. We’re seeing a national push-back against censorship and the shout-downs on campuses,” said Thomas Lindsay, director of the Center for Higher Education at the Texas Public Policy Foundation, a conservative-leaning think tank. “It makes sense that it’s Republicans introducing laws, because they’re the ones whose views are out of fashion.” Lindsay said a 2016 study showed there were 36 speakers disinvited from campuses across the country, and said “pretty much all were conservative.” He drew parallels to the free speech campus movement of the 1960s, “when it was the left fighting for freedom of speech at colleges.” Lindsay, who testified on the issue recently at a Texas legislative hearing, said violent incidents last year at Berkeley and the University of Missouri “brought this issue to the forefront, and it’s gaining steam." States that have already enacted campus free speech laws are Virginia, Missouri, Arizona, Colorado, North Carolina, Tennessee, Utah and Wisconsin, according to the National Council of State Legislatures. The debates among state lawmakers, unsurprisingly, are playing themselves out largely along party lines. It makes sense that it’s Republicans introducing laws because they’re the ones whose views are out of fashion. A 2016 study showed there were 36 speakers disinvited, and pretty much all were conservative. — Thomas Lindsay, director of the Center for Higher Education at the Texas Public Policy Foundation Republicans generally are fighting for states to, as they see it, protect First Amendment rights on campuses by pushing for measures that ban the common practice of restricting free speech activities -- such as protests or even handing out fliers that take a social or political stand on an issue – to designated areas. Many would like to see colleges drop often-cumbersome criteria for approving a lecture by a high-profile speaker or student political event – which many say are unevenly applied to conservatives. Many Democrats say the Constitution already protects free speech, and that states have no need to micromanage how colleges handle student demonstrations and speakers. Many also object to the penalties some measures are calling for, such as fining or firing – in the case of professors and other college employees – those who are deemed to have deprived the free speech rights of a person or group. A Florida bill approved by the Senate Education Committee, for instance, bans free speech zones on campuses and allows for suing the institution up to $100,000 in damages if the First Amendment rights of a speaker or protester are “willfully” violated. “This is to address a flourishing of the limitation of free speech, particularly across the country,” said bill sponsor Sen. Dennis Baxley, a Republican, according to the Gainesville Sun. “Many of our universities are restricting free speech to free-speech zones. And there’s something antithetical about a free-speech environment saying you can only do it in this little square.” Democrat Sen. Perry Thurston unsuccessfully fought for the elimination of the liability provision, saying it presented a huge financial burden to colleges and universities that likely would be targeted in lawsuits. “This bill will chill freedom of expression on our state’s college campuses,” said Kara Gross, policy counsel for the American Civil Liberties Union of Florida, to the Orlando Sentinel. “Because it would be up to our state’s institutions of higher learning to expend significant resources in defending against such frivolous lawsuits, this bill incentivizes those institutions to restrict students’ speech and peaceful assembly out of concern that someone might boo too loudly.” Nebraska lawmakers are debating a campus free speech measure introduced by Republican State Sen. Steve Halloran following an incident that made national headlines last year. A student at the University of Nebraska in Lincoln who set up a table near the Student Union to recruit new members for her conservative group, Turning Point USA, was confronted by a graduate teaching assistant and two faculty members – an incident that reduced Kaitlyn Mullen, 20, to tears, and prompted her to go home. I brought a polite sign, stood silently and apart from everyone else…I oppose that organization (Turning Point USA) but I do not oppose her right to advocate for it and I would not harass a student. If someone encounters opposition, that does not mean their First Amendment rights have been violated. — University of Nebraska professor Amanda Gailey The graduate teaching assistant, Courtney Lawton, flipped off Mullen and called her a “neo-fascist,” videos of the incident show. The footage also shows Lawton saying, among other things, that the student “wants to destroy public schools, public universities.” A professor, Amanda Gailey, stood farther away than the others, off to the side of Mullen with a sign that read: “Turning Point: Please put me on your watch list. Prof. Amanda Gailey.” Turning Point USA advocates for conservative causes and maintains a “professor watch list” of faculty it views as radically liberal. Gailey said her intention was to express her opposition to Turning Point USA, which liberal groups say conducts witchhunts of professors who hold views they find objectionable. Critics of the group say Turning Point’s actions are not harmless because they encourage, even if inadvertently, threats and harassment of liberal professors. “I went there that day to civilly protest Turning Point USA’s Professor Watch List,” Gailey told Fox News. “I brought a polite sign, stood silently and apart from everyone else … I oppose that organization but I do not oppose her right to advocate for it, and I would not harass a student. If someone encounters opposition, that does not mean their First Amendment rights have been violated.” Gailey said that when she saw Mullen become upset, she “put down the sign to check on the student.” Mullen said she did not anticipate the tensions that erupted over her idea to set up a table – which she manned by herself -- in an area on campus that had heavy traffic, and to raise awareness about Turning Point USA. Mullen sees the incident as a vivid illustration of anti-conservative aggression happening around college campuses. “I don’t want to feel that my ideas are unwelcome on my own campus,” she said. “I’ve gotten a lot of support, but also I’ve heard from a lot of people who don’t think I should be on campus, or that my club should be allowed on campus. We have a socialist group on campus, I’ve seen them set their table up to recruit members. They just seem to go to great lengths to shut down the ideas of groups they don’t agree with.” Gailey notes that she does not agree with designated free speech zones, saying that in general "most public places on campus should be open to free speech." The university later decided not to renew Lawton’s teaching contract, and has made changes to ensure free speech. “They’ve made the right decision,” Mullen said. “It’s disappointing that it took so long.” Lawton did not respond to messages from Fox News seeking a comment. Lindsay said the free speech debates, as contentious as they are, occurring among college administrators and state lawmakers, speak well for the country. "Everyone sees there is a problem, and everyone agrees on affirming the primacy of free speech," he said. "That is very heartening." "The country is very polarized in many ways," Lindsay said. "That means there's growing anger on both sides. And when we become angry, we refuse to listen, and that is when the First Amendment is most in jeopardy, and it is also when the First Amendment is most needed."
Mid
[ 0.6454545454545451, 35.5, 19.5 ]
<?php /** * This source file is part of the open source project * ExpressionEngine (https://expressionengine.com) * * @link https://expressionengine.com/ * @copyright Copyright (c) 2003-2019, EllisLab Corp. (https://ellislab.com) * @license https://expressionengine.com/license Licensed under Apache License, Version 2.0 */ namespace EllisLab\ExpressionEngine\Core; /** * Core\ExpressionEngine */ class ExpressionEngine extends Core { /** * */ public function boot() { define('APPPATH', BASEPATH); define('INSTALLER', FALSE); get_config(array('subclass_prefix' => 'EE_')); parent::boot(); } }
Low
[ 0.5140845070422531, 36.5, 34.5 ]
--- abstract: 'We give a review of theoretical and experimental results concerning the magnetic susceptibility of the Weyl, Dirac, and nodal-line semimetals. In particular, dependences of the susceptibility on the chemical potential, temperature, and magnitude of the magnetic field are discussed. The presented results show that the specific features of the magnetic susceptibility can serve as a hallmark of the topological semimetals, and hence magnetic measurements can be useful in investigating these materials.' author: - 'G. P. Mikitik' - 'Yu. V. Sharlai' title: Magnetic susceptibility of topological semimetals --- =1 =7 Introduction {#intro} ============ In recent years much attention has been given to the topological Weyl, Dirac, and nodal-line semimetals; see, e.g., recent reviews [@armit; @bernevig; @gao; @wang-r; @weng-r; @fang-r; @chiu] and references therein. In the Weyl semimetals, the electron bands contact at discrete (Weyl) points of the Brillouin zone and disperse linearly in all directions around these critical points. The same type of the band contact occurs in the Dirac semimetals, but the bands are double degenerate in spin, i.e., a Dirac point can be considered as a superposition of two Weyl points in the quasi-momentum space. The chemical potential of electrons in the Weyl and Dirac semimetals is implied to be close to the band-contact energy $\varepsilon_d$. In the nodal-line semimetals the conduction and valence bands touch along lines in the Brillouin zone and disperse linearly in directions perpendicular to these lines. It is necessary to emphasize that the contact of the electron energy bands along the lines is the widespread phenomenon in crystals [@herring; @m-sh14; @kim; @fang]. For example, such contacts of the bands occur in graphite [@graphite], beryllium [@beryl; @beryl1], magnesium [@beryl1], aluminium [@al], LaRhIn$_5$ [@prl04]. However, the degeneracy energy of the bands, $\varepsilon_d$, is not constant along such lines, and the $\varepsilon_d$ varies in a finite interval between its minimum $\varepsilon_{min}$ and maximum $\varepsilon_{max}$ values, reaching them at certain points of the line. A crystal with the band-contact line can be named the topological semimetal if the difference $\varepsilon_{max}- \varepsilon_{min}\equiv 2\Delta$ is sufficiently small and if the chemical potential $\zeta$ of the electrons does not lie far away from the mean energy $\varepsilon_d^0 \equiv (\varepsilon_{max}+ \varepsilon_{min})/2$ of the line. A number of various Dirac [@wang; @neupane; @borisenko; @jeon; @liang; @ali; @liu; @crassee; @z.wang; @liu1; @gibson], Weyl [@h.weng; @huang; @S-Xu; @Lv; @sol; @c.wang; @ruan; @verg], and nodal-line semimetals [@kim; @fang; @hei1; @pie; @weng; @mullen; @xie; @yu; @yama; @phil; @schoop; @neupane1; @schoop1; @huang1; @bian; @chen] were predicted in recent years (see also [@zhang19]), and a part of these predictions have already been confirmed experimentally. It is well known that the topological semimetals are characterized by topologically protected surface states [@hei1; @wan; @balents], the giant transverse magnetoresistance [@liang; @he-r(h); @shek; @ali-wte2; @lv-r(h)], the nonlocal transport [@para; @zhang-nonl], the negative longitudinal magnetoresistance [@niel; @son] related with the so-called chiral anomaly, the anomalous Hall effect [@burk], and the quantum oscillations associated with surface Fermi arcs [@pott; @moll]. In this paper we call attention to the specific features of the bulk magnetic susceptibility of electrons in the topological semimetals. These features can be considered as one more hallmark of these materials. The specific properties of the susceptibility for the topological semimetals are due to the following: The Weyl and Dirac points, as well as the points of the band-contact lines with the energies $\varepsilon_{min}$ and $\varepsilon_{max}$, are the points of the electron topological transitions. In other words, if the electron chemical potential $\zeta$, which can vary with doping and crystal deformations, passes through one of the critical energies $\varepsilon_d$, $\varepsilon_{min}$, $\varepsilon_{max}$, the topology of the appropriate Fermi surface changes. However, these Fermi-surface transformations are not the $2\frac{1}{2}$-order topological transitions analyzed by Lifshitz [@lif]. These transitions have higher orders according to the classification of Ref. [@lif], and for weak magnetic fields, $\hbar \omega_c< T$, they are accompanied with giant anomalies in the orbital part of the magnetic susceptibility [@m-sv]. Here $T$ is the temperature, and $\omega_c$ is the electron cyclotron frequency which determines the spacing $\Delta\varepsilon_H$ between the Landau subbands in the magnetic field, $\Delta\varepsilon_H=\hbar \omega_c$. At higher magnetic fields, $\hbar\omega_c>T$, the well-known de Haas - van Alphen oscillations of the magnetization appear [@Sh]. However, these oscillations in the topological semimetals are shifted in phase as compared to the usual case discussed by Shoenberg [@Sh]. This shift is essentially associated with nonzero Berry phase generated by the Weyl and Dirac points [@berry] and by the band-contact lines [@prl]. With further increase of the magnetic field when $\Delta\varepsilon_H$ exceeds not only $T$ but also $|\zeta-\varepsilon_d|$ or $|\zeta-\varepsilon_{max}|$ (or $|\zeta-\varepsilon_{min}|$), the magnetization in this ultra-quantum regime exhibits special dependences on the magnetic field $H$. The types of these dependences are determined by the electron dispersion relations in the vicinity of the Dirac (Weyl) points and of the nodal lines. The paper is organized as follows: In Sec. \[spectr\], we describe the electron spectra of the Weyl and Dirac semimetals without magnetic field and with applied $H$. In Sec. \[d-w\] these spectra are used in analyzing the electron magnetic susceptibility in the weak and strong magnetic fields. In particular, we consider the feature of de Haas - van Alphen (and Shubnikov - de Haas) oscillations in these semimetals. In Sec. \[line\], the electron spectrum and the magnetic susceptibility of the nodal-line semimetals are discussed. Conclusions are presented in Sec. \[conc\]. It should be also noted that throughout this review article we restrict the theoretical analysis of the susceptibility to the case of noninteracting electrons. Although the electro-electron interaction in the Weyl (Dirac) and nodal-line semimetals was considered, e.g., in Refs. [@niss17; @niss18; @ghosh19; @huh16; @liu17; @Roy17], its effect on the bulk magnetic susceptibility of these materials remains to be studied. Electron spectrum in Dirac and Weyl semimetals {#spectr} ============================================== Spectrum without magnetic field {#sec2.1} ------------------------------- The Dirac and Weyl semimetals are characterized by a sufficiently strong spin-orbit interaction. With this interaction the most general ${\bf k}\cdot{\bf p}$ Hamiltonian $\hat H$ for the conduction and valence electron bands in the vicinity of a [*Dirac*]{} point has the form [@m-sv]: $$\begin{aligned} \label{1} \hat H=\left (\begin{array}{cccc} {\mathcal E}_{c} & R & 0 & S \\ R^* & {\mathcal E}_{v} & -S & 0 \\ 0 & -S^* & {\mathcal E}_{c} & R^* \\ S^* & 0 & R & {\mathcal E}_{v} \\ \end{array} \right), \end{aligned}$$ where $$\begin{aligned} \label{2} {\mathcal E}_{c,v}&=&\varepsilon_d+{\bf v}_{c,v}\cdot {\bf p}, \nonumber \\ R&=&{\bf r}\cdot {\bf p}, \\ S&=&{\bf s}\cdot {\bf p}, \nonumber \end{aligned}$$ the quasi-momentum ${\bf p}$ is measured from the Dirac point; ${\bf v}_{c,v}$ are intraband and ${\bf r}$ and ${\bf s}$ are interband matrix elements of the velocity operator calculated at ${\bf p}=0$; the vectors ${\bf v}_{c,v}$ are real, while ${\bf r}$ and ${\bf s}$ are generally complex quantities. In Hamiltonian (\[1\]) we have taken into account only the time-reversal symmetry and a twofold spin degeneracy of the electron bands in centrosymmetric crystals. In reality, the electron Hamiltonian for a topological semimetal is even simpler than that given by Eqs. (\[1\]), (\[2\]) [@yang-cl; @gao-cl] since for the Dirac point to be stable, an additional crystalline symmetry (other than the time-reversal and inversion symmetries) is necessary [@young]; see, e.g., the electron spectrum of Na$_3$Bi below. Diagonalization of the Hamiltonian (\[1\]), (\[2\]) gives the dispersion relations for the electron bands in the vicinity of the Dirac point: $$\begin{aligned} \label{3} \varepsilon_{c,v}({\bf p})&=&\varepsilon_d+{\bf a}\cdot{\bf p}+E_{c,v}({\bf p}), \\ E_{c,v}({\bf p})&=&\pm\{({\bf a'}\cdot {\bf p})^2+|R|^2+|S|^2 \}^{1/2}, \label{4} \end{aligned}$$ where the following notations have been introduced: $$\begin{aligned} {\bf a}=({\bf v}_c+{\bf v}_v)/2;\ \ \ {\bf a'}=({\bf v}_c-{\bf v}_v)/2. \end{aligned}$$ Equation (\[4\]) shows that $E_{c,v}^2$ is a quadratic form in the components of the vector ${\bf p}$. Hereafter we choose the coordinate axes along principal directions of this form. Let $b_{ii}$ ($i=1, 2, 3$) be its principal values, i.e., $$\begin{aligned} \label{5} E_{c,v}^2=b_{11}p_1^2+b_{22}p_2^2+b_{33}p_3^2, \end{aligned}$$ where $b_{ii}$ are expressible in terms of the components of the vectors ${\bf a'}$, ${\bf r}$, ${\bf s}$. The scaling of coordinate axes, $\tilde p_i=p_i\sqrt{b_{ii}}$, transforms Eqs. (\[3\]), (\[5\]) into the form that depends on the constant dimensionless vector $\tilde {\bf a}$ only: $$\begin{aligned} \varepsilon_{c,v}&=&\varepsilon_d+\tilde{\bf a}\cdot\tilde{\bf p}\pm |\tilde {\bf p}|, \end{aligned}$$ where its components are defined by $\tilde a_i=a_i/\sqrt{b_{ii}}$. The vector $\tilde{\bf a}$ characterizes a tilt of the spectrum. When the length of $\tilde {\bf a}$ is less than unity, $$\begin{aligned} \tilde a^2=\frac{a_1^2}{b_{11}}+ \frac{a_2^2}{b_{22}} +\frac{a_3^2}{b_{33}} < 1, \end{aligned}$$ the dispersion relations $\varepsilon_{c,v}({\bf p})$ looks like in Fig. 1a. In this case, at $\zeta<\varepsilon_d$, the Fermi surface is a [*hole*]{} closed pocket which, at $\zeta=\varepsilon_d$, shrinks into the point ${\bf p}=0$, and at $\zeta > \varepsilon_d$ a new closed [*electron*]{} Fermi pocked appears, Fig. 1a. Since near $\varepsilon_d$ a singular part of the electron energy of the crystal is proportional to $(\zeta-\varepsilon_d)|\zeta-\varepsilon_d|^3$, the electron topological transition at $\zeta=\varepsilon_d$ can be named as the $4$-order transition according to the classification of Lifshitz [@lif]. When $\tilde a^2>1$, there is always a direction in the ${\bf p}$-space along which the dispersion relations $\varepsilon_{c,v}({\bf p})$ look like in Fig. 1b, and open electron and hole pockets of the Fermi surface exist both at $\zeta < \varepsilon_d$ and $\zeta > \varepsilon_d$. Thus, there is no topological transition with changing $\zeta$ in the case $\tilde a^2>1$. ![\[fig1\] Dispersion relations $\varepsilon_c(p)$ and $\varepsilon_v(p)$ of the electron energy bands in the vicinity of their degeneracy point in the cases of $\tilde a^2<1$ (a) and $\tilde a^2>1$ (b). On the right the Fermi surfaces at $\zeta-\varepsilon_d<0$, $\zeta-\varepsilon_d=0$, and $\zeta-\varepsilon_d>0$ are shown together with the degeneracy point which is the origin of the coordinate axes. The shaded and white surfaces correspond to the electron and hole charge carriers, respectively. ](Fig1.pdf) The most general ${\bf k}\cdot{\bf p}$ Hamiltonian $\hat H$ for the conduction and valence electron bands in the vicinity of a [*Weyl*]{} point has the form: $$\begin{aligned} \label{6} \hat H= (\varepsilon_d + {\bf a}\cdot{\bf p})\sigma_0 + ({\bf a}'\cdot {\bf p})\sigma_z + ({\bf v}^{(1)}\cdot {\bf p})\sigma_x +({\bf v}^{(2)}\cdot {\bf p})\sigma_y . \end{aligned}$$ where ${\bf a}$, ${\bf a}'$, ${\bf v}^{(1)}$, ${\bf v}^{(2)}$ are real constant vectors, $\sigma_0$ is the unit matrix, and $\sigma_i$ are the Pauli matrices. In fact, this Hamiltonian coincides with the upper $2\times 2$ block of Hamiltonian (\[1\]) if one defines the complex vector ${\bf r}$ in Eq. (\[2\]) as follows: ${\bf r}={\bf v}^{(1)}- i{\bf v}^{(2)}$. Thus, formulas (\[3\])-(\[5\]) and the discussion accompanying them refer equally not only to the Dirac points but also to the case of the Weyl points. It is necessary to emphasize that the parameter $\tilde a^2$ specifying the tilt of the spectrum generally differs from zero for the Dirac and Weyl points. For example, such tilted spectra occur in Na$_3$Bi, Cd$_3$As$_2$, WTe$_2$, and in the TaAs family of the semimetals. If $\tilde a^2<1$, one has a type-I Weyl (Dirac) semimetal, while the case $\tilde a^2>1$ corresponds to the so-called type-II Weyl (Dirac) semimetals [@sol]. In particular, the spectrum of Na$_3$Bi in the vicinity of any of its two Dirac points is described by Eqs. (\[3\]), (\[5\]) with ${\bf a}=(0,0,a_3)$, $a_3=\pm 2C_1p_z^c/\hbar^2$, $b_{11}=b_{22}=A^2$, $b_{33}=(2M_1p_z^c/\hbar^2)^2$ where $A$, $C_1$, $M_1$, $p_z^c$ are the constant parameters introduced in Refs. [@z.wang], the axes $1$, $2$, and $3$ coincide with the crystallographic axes $x$, $y$, $z$, and the two Dirac points lie in the $z$-axis with the coordinates $p_z=\pm p_z^c$. Then, using the data of Ref. [@z.wang], we find $\tilde a^2=(C_1/M_1)^2\approx 0.68$. In other words, Na$_3$Bi is the type-I Dirac semimetal with the tilted spectrum. At small $|\zeta-\varepsilon_d|\neq 0$, its Fermi surface near any of the two Dirac points is an ellipsoid, with the center of the ellipsoid being shifted relative to the point $p_z=\pm p_z^c$ by the value $\Delta p_z=-a_3(\zeta-\varepsilon_d)/(b_{33}-a_3^2)$. Note that the shift of this sort occurs for any Dirac (Weyl) point with the tilted spectrum, Fig. \[fig1\]. Curiously, investigations of the type-I and type-II Weyl (Dirac) points can shed light on the astrophysical problems [@vol16; @vol17]. Spectrum in the magnetic field {#sec2.2} ------------------------------ In the case of Hamiltonian (\[1\]), (\[2\]), the appropriate electron spectrum in the magnetic field $H$ was obtained at an arbitrary direction of ${\bf H}$ and at any value of the parameter $\tilde a^2$ many years ago [@m-sh]. The derived formulas immediately describe the electron spectrum in the magnetic field near the Dirac points. Similar formulas for the case of the Weyl points were independently obtained in the papers [@yu16; @udag; @tch]. We present here the results of Ref. [@m-sh] and then point out a small difference between the spectra for the Dirac and Weyl points. In the magnetic field ${\bf H}={\bf n}H$ directed along a unit vector ${\bf n}$, the Landau subbands $\varepsilon^l(p_n)$ of a Dirac point are found from the equation [@m-sh]: $$\label{7} S(\varepsilon^{l},p_n)=\frac{2\pi\hbar e H}{c}l,$$ where $e$ is the absolute value of the electron charge, $l=0,1,2,\dots$, and $S(\varepsilon^{l},p_n)$ is the area of the cross-section of the constant-energy surface $\varepsilon_{c,v}({\bf p})=\varepsilon^l$ by the plane $p_n=$ const. Here $p_n= {\bf p}\cdot {\bf n}$ is the component of the quasi-momentum along the magnetic field. Although Eq. (\[7\]) looks like the semiclassical quantization condition, this formula determines the [*exact*]{} spectrum, i.e., it gives correct $\varepsilon^{l}(p_n)$ even at $l\sim 1$. We shall show in Sec. \[sec2.3\] that the exact and semiclassical spectra in the magnetic fields really coincide at all $l$ for the electrons with dispersion relation described by Eqs. (\[3\]) and (\[5\]). In the explicit form Eq. (\[7\]) yields $$\begin{aligned} \label{8} \varepsilon_{c,v}^l(p_n)&=&\varepsilon_d +vp_n \pm \left[\frac{e\hbar \alpha H}{c}\,l+L\cdot (p_n)^2 \right]^{1/2}, \end{aligned}$$ where $$\begin{aligned} \label{9} \alpha&=&\frac{2R_n^{3/2}}{b_{11}b_{22}b_{33}\tilde{\bf n}^2}, \nonumber \\ L&=&\frac{R_n}{b_{11}b_{22}b_{33}\tilde{\bf n}^4}=\frac{(1-\tilde a^2)\tilde{\bf n}^2+(\tilde {\bf a}\cdot\tilde{\bf n})^2}{\tilde{\bf n}^4}, \nonumber \\ R_n\!\!&=&\sum_{i,j=1}^{3}\kappa^{ij}n_in_j= b_{11}b_{22}b_{33}[(1-\tilde a^2)\tilde{\bf n}^2+(\tilde {\bf a}\cdot \tilde{\bf n})^2], \\ \kappa^{ij}\!\!&=&\frac{b_{11}b_{22}b_{33}}{(b_{ii}b_{jj})^{1/2}} \left[(1-\tilde a^2)\delta_{ij}+\tilde a_i\tilde a_j\right],\nonumber \\ v&=&\frac{(\tilde {\bf a}\cdot \tilde{\bf n})}{\tilde{\bf n}^2}, \nonumber \end{aligned}$$ the components of the vector $\tilde{\bf n}$ are determined by the relation: $\tilde n_i=n_i/\sqrt{b_{ii}}$, and hence $$\tilde{\bf n}^2=\frac{n_1^2}{b_{11}}+\frac{n_2^2}{b_{22}}+\frac{n_3^2}{b_{33}}.$$ All the Landau subbands $\varepsilon_{c,v}^l(p_n)$ of the Dirac point are double degenerate in spin apart from the subbands $\varepsilon_{c}^0(p_n)$ and $\varepsilon_{v}^0(p_n)$ which are nondegenerate. In deriving Eqs. (\[7\])-(\[9\]) we have neglected the direct interaction $(e\hbar/mc){\bf s}\cdot{\bf H}$ of the electron spin ${\bf s}$ with the magnetic field ${\bf H}$. The impact of this interaction on the Landau subbands (and on the magnetic susceptibility) is relatively small and is of the order of $m_*/m$ where $m$ is the electron mass and $m_*$ is its cyclotron mass, see below. For given ${\bf n}$, spectrum (\[8\]) describing the Landau subbands $\varepsilon^l_{c,v}(p_n)$ exists only if $R_n>0$. The geometrical meaning of $R_n$ is the following: The quantity $R_n$ is positive when the boundary of the cross-section of the Fermi surface by the plane perpendicular to $p_n$ is a closed curve (an ellipse), and hence the appropriate cross-section area is finite. When $\tilde a^2<1$, the $R_n$ is positive at [*any*]{} direction of the magnetic field. This is also evident from the Fermi surfaces shown Fig. 1a. When $\tilde a^2>1$, there are directions of the magnetic field for which $R_n<0$ and spectrum (\[8\]) does not exist; see Fig. 1b. In other words, for the type-II semimetals, a rotation of the magnetic field leads to collapse of the Landau subbands in a certain region of its directions. The electron spectrum in the magnetic field for the case of the Weyl points is described by the same formulas (\[7\])-(\[9\]) [@m-sh; @yu16; @udag; @tch], but the Landau subbands $\varepsilon_{c,v}^l(p_n)$ are nondegenerate, and the subband $\varepsilon^0(p_n)$ corresponding to $l=0$ is shared between the branches “$c$” and “$v$”. This subband has the form [@yu16; @udag; @tch]: $$\begin{aligned} \label{10} \varepsilon^0(p_n)&=&\varepsilon_d + (v - q_{ch}\sqrt L)p_n, \end{aligned}$$ where $q_{ch}={\rm sign}({\bf a}'\cdot[{\bf v}^{(1)}\times{\bf v}^{(2)}])=\pm 1$ is the chirality [@armit] of the Weyl point defined by Hamiltonian (\[6\]). It is also worth noting that the $p_n$-dependence of the zeroth Landau subband describing by Eq. (\[8\]) or Eq. (\[10\]) generally differs from the dispersion of the bands $\varepsilon_{c,v}({\bf p})$ in the direction ${\bf n}$ of the magnetic field if ${\bf a}\neq 0$ in Eqs. (\[3\]) and (\[6\]). This difference is due to the shift of the center of the ellipsoid $\varepsilon_{c,v}({\bf p})=\zeta$ relative to the Dirac (Weyl) point with the tilted spectrum, see Sec. \[sec2.1\] and Fig. \[fig1\]. Finally, it should be mentioned that the electron spectrum in the magnetic field can be found for Hamiltonian (\[1\]), (\[2\]) in which an energy gap between the bands “$c$” and “$v$” is introduced, and this spectrum is still described by Eq. (\[7\]) [@m-sh]. Semiclassical quantization {#sec2.3} -------------------------- It is instructive to compare the semiclassical electron spectrum in the magnetic field near the Dirac points with the exact one presented in Sec. \[sec2.2\]. If the electron bands in a crystal are double degenerate in spin, the general semiclassical quantization condition has the form [@Sh]: $$\label{11} S(\varepsilon^{l},p_n)=\frac{2\pi\hbar e H}{c}\left(l+\frac{1}{2}\pm \frac{gm_*}{4m}\right),$$ where $g$ is the electron $g$ factor; $m$ and $m_*=(1/2\pi)\partial S(\varepsilon,p_n)/\partial\varepsilon$ are the electron and cyclotron masses, respectively, and the other quantities are defined in the text near formula (\[7\]). The theory of the $g$ factor for itinerant electrons was elaborated in Refs. [@jetp; @g1]. This theory based on the ideas of Roth [@roth] takes into account the electron-spin dynamics caused by the spin-orbit interaction when the electron moves in its orbit in the magnetic field. Using this theory (and neglecting the Zeeman term $e\hbar{\bf s}\cdot{\bf H}/mc$), it was shown [@g2] that $g=2m/m_*$ for any electron orbit in the case of Hamiltonian (\[1\]), (\[2\]). Insertion of this value of the $g$ factor into formula (\[11\]) reproduces equation (\[7\]) determining the exact electron spectrum in the magnetic field. Interestingly, this large value $2m/m_*$ of the $g$ factor would occur even if the spin-orbit interaction were weak. In this limiting case the $g$ factor is the sum of the two terms, $g=g_1+g_2=2m/m_*$, where the first term $g_1$ is determined by the Berry phase $\Phi_B$ of the electron orbit while the second term $g_2$ is specified by an interband part $L$ of the electron orbital moment. If one considers a semiclassical electron as a wave packet, this $L$ can be interpreted as the orbital moment associated with self-rotation of the wave packet around its center of mass [@niu]. For the strong spin-orbit interaction the $g$ factor generally is not decomposed into the two independent parts determined by the Berry phase and the momentum, respectively. It is also worth noting that the result $g=2m/m_*$ remains true even if a gap appears in the Dirac spectrum [@g2]. In the case of a Weyl point the electron states are nondegenerate in spin, and the general semiclassical quantization condition can be written as follows [@Sh]: $$\label{12} S(\varepsilon^{l},p_n)=\frac{2\pi\hbar e H}{c}\left(l+\gamma\right),$$ where $\gamma$ is a constant. This constant depends on the Berry phase $\Phi_B$ of the electron orbit and on interband part $L$ of the electron orbital moment [@fuchs; @m-sh12; @alex]: $$\label{13} \gamma -\frac{1}{2}=-\frac{\Phi_B}{2 \pi} -\frac{1}{2 \pi\hbar m } \oint \frac{L({\bf p})} {v_{\perp}({\bf p})} d{\bf p} ,$$ where $v_{\perp}$ is the absolute value of projection of the electron velocity ${\bf v}= \partial \varepsilon_{c,v}({\bf p})/\partial {\bf p}$ on the plane perpendicular to ${\bf H}$, and the integration is carried out over the electron orbit in the Brillouin zone. Since for a nondegenerate band the direction of electron spin is uniquely dictated by an appropriate point of the ${\bf p}$-space, an electron is not free to adjust its spin to the orbital motion as it occurs in the double degenerate bands. It is for this reason that at any strength of the spin-orbit interaction, the difference $\gamma-\frac{1}{2}$ is the sum of the two independent terms associated with the Berry phase $\Phi_B$ and with the orbital moment $L$ averaged over the trajectory. Fuchs et al. [@fuchs] calculated the right hand side of Eq. (\[13\]) for the two-dimensional electrons with the Hamiltonian: $$\begin{aligned} \label{14} \hat H= \Delta\cdot \sigma_z + {\rm Re}(f(p_x,p_y))\cdot \sigma_x -{\rm Im}(f(p_x,p_y))\cdot \sigma_y , \end{aligned}$$ and obtained the universal value $\gamma -\frac{1}{2}=-\frac{1}{2}$. In Eq. (\[14\]), $\Delta$ is a constant, and $f(p_x,p_y)$ is a complex function of $p_x$ and $p_y$. It was shown in Ref. [@alex] (Appendix C) that for any electron orbit in the vicinity of a Weyl point, Hamiltonian (\[6\]) can be reduced to the form (\[14\]) by an appropriate unitary transformation if ${\bf a}=0$. This means that at least for the Weyl points without the tilt of their spectra, one has $\gamma=0$, and the semiclassical spectrum in the magnetic field coincides with the exact one. However, the semiclassical form of Eq. (\[7\]) seems to suggest that this statement remains true in the general case ${\bf a}\neq 0$. Note that in neglect of spin and the spin-orbit interaction, the constant $\gamma$ for electrons in an isolated band separated from other bands of the crystal by energy gaps takes another universal value $\gamma=1/2$ since both $\Phi_B$ and $L$ vanish. Magnetic susceptibility of Dirac and Weyl semimetals {#d-w} ==================================================== When the chemical potential $\zeta$ of electrons in a Dirac (Weyl) semimetal lies near the degeneracy energy $\varepsilon_d$, the total magnetization ${\bf M}_{\rm tot}$ and the total magnetic susceptibility tensor $\chi^{ij}_{\rm tot}$ consist of their special parts ${\bf M}$ and $\chi^{ij}$ determined by the electron states located near the Dirac (Weyl) point and the background terms ${\bf M}_0$ and $\chi^{ij}_0$ specified by electron states located far away from this point, $$\begin{aligned} M_{\rm tot}^{i}&=&M^{i}+M_{0}^{i}=M^i+ \sum_{j=1}^3\chi^{ij}_0H_j,\\ \chi_{\rm tot}^{ij}&=&\chi^{ij} +\chi^{ij}_0.\end{aligned}$$ It is the special term $\chi^{ij}$ that is responsible for dependences of the susceptibility on the chemical potential, temperature, and magnitude of the magnetic field. The background part $\chi^{ij}_0$ is practically constant and has no effect on the above-mentioned dependences. This part can have an impact only on angular dependence of ${\bf M}_{\rm tot}$ because the background magnetization ${\bf M}_0$ generally is not isotropic. Below we do not consider the background terms and discuss only the special parts of the magnetization and/or of the magnetic susceptibility which is assumed to be normalized to the unit volume. The magnetic-field behavior of the susceptibility essentially depends on interrelation between the three variable parameters: the temperature $T$, the characteristic spacing $\Delta\varepsilon_H =\hbar\omega_c$ between the Landau subbands, and the shift $\zeta- \varepsilon_d$ of the chemical potential $\zeta$ relative to the degeneracy energy $\varepsilon_d$. In weak magnetic fields when $\Delta\varepsilon_H$ is much less than the temperature $T$, the susceptibility $\chi^{ij}$ is practically independent of $H$. On the other hand, at $\Delta\varepsilon_H>T$ a noticeable $H$-dependence of $\chi^{ij}$ appears. In particular, at $|\zeta-\varepsilon_d|> \Delta\varepsilon_H>T$, the de Haas - van Alphen oscillations in the susceptibility occur. At higher magnetic fields, $\Delta\varepsilon_H > |\zeta- \varepsilon_d|$, $T$, i.e., in the ultra-quantum regime, these oscillations disappear, but ${\bf M}(H)$ remains a nonlinear function of the magnetic field. Using Eqs. (\[8\]) and (\[9\]), one can estimate the spacing $\Delta\varepsilon_H\sim (e\hbar HV^2/c)^{1/2}$ and the boundary $H_T\sim cT^2/e\hbar V^2$ between the regions of the weak and strong magnetic fields where the parameter $V$ characterizes the average slope of the Dirac (Weyl) cone, $V\sim \sqrt{b_{ii}}$. Since representative values of $V$ are of the order of $10^5-10^6$ m/s [@wang; @neupane; @borisenko; @jeon; @z.wang; @liu1], we obtain $H_T\sim 2-200$ Oe at $T=4$ K. In other words, at low temperatures, a noticeable dependence of $\chi^{ij}$ on $H$ can be observed for the Dirac (Weyl) semimetals even at low magnetic fields. Below we discuss the magnetic susceptibility produced by a Dirac (Weyl) point in the weak and strong magnetic fields and in the ultra-quantum regime. Since for the Dirac and Weyl points the spectra in the magnetic field almost coincide and differ from one another by the degeneracy of the Landau subbands, the susceptibility of the Weyl point is halved as compared to the susceptibility of the Dirac point. The role of the zero Landau subbands which differ for these two cases is discussed in Sec. \[sec3.3\]. Weak magnetic fields {#sec3.1} -------------------- In the case of the weak magnetic fields the orbital magnetic susceptibility of the electrons described by Hamiltonian (\[1\]), (\[2\]) was calculated many years ago [@m-sv], and a giant diamagnetic anomaly in the susceptibility was found. This anomaly is characterized by the logarithmic divergence of the susceptibility, $\chi_{ij}\propto \ln|\zeta-\varepsilon_d|$, when the chemical potential $\zeta$ approaches $\varepsilon_d$. This anomaly was also obtained and investigated by Koshino and Ando [@kosh] and by Koshino and Hizbullah [@kosh15] for the case of the Dirac (Weyl) points without the tilt of their spectra (see also recent publications [@thakur; @zhou18]). Finally, using the results of Ref. [@m-sv; @m-sh], the magnetic susceptibility of the Dirac and Weyl points with an arbitrary tilt of their spectra was analyzed in our paper [@m-sh16]. The calculation of the magnetic susceptibility $\chi^{ij}$ (per unit volume) in the region of the weak magnetic fields ($H\ll H_T$) for the case of the Dirac point leads to the following expression [@m-sv; @m-sh16]: $$\begin{aligned} \label{15} \chi^{ij}\!\!=\!-\frac{1}{6\pi^2\hbar}\!\left(\frac{e}{c}\right)^2\!\!\! \frac{\kappa^{ij}}{(b_{11}b_{22}b_{33})^{1/2}}\!\!\!\int_{0}^{\varepsilon_0} \!\!\frac{d\varepsilon}{\varepsilon}[f(-\varepsilon)\!-\!\!f(\varepsilon)], \end{aligned}$$ where $\kappa^{ij}$ is given by Eq. (\[9\]), $f(\varepsilon)$ is the Fermi function with the chemical potential $\zeta$, $$\begin{aligned} \label{16} f(\varepsilon)=\left[1+\exp\!\left(\frac{\varepsilon+\varepsilon_d -\zeta}{T}\right) \right ]^{-1}, \end{aligned}$$ and $\varepsilon_0$ is a sufficiently high energy specifying the interval ($\varepsilon_d-\varepsilon_0, \varepsilon_d+\varepsilon_0$) in which Hamiltonian (\[1\])–(\[4\]) is valid. Different choices of $\varepsilon_0$ are equivalent to a change of the background term $\chi^{ij}_0$. Formula (\[16\]) permits one to analyze dependences of the magnetic susceptibility on the temperature and the chemical potential that can shift by doping and deformations of the crystal. Calculating the integral in Eq. (\[15\]) in the limit $T\ll |\zeta- \varepsilon_d|$, we arrive at the following $\zeta$-dependence of the susceptibility: $$\begin{aligned} \label{17} \chi^{ij}\!\!=\!-\frac{1}{6\pi^2\hbar}\!\left(\frac{e}{c}\right)^2\!\!\! \frac{\kappa^{ij}}{(b_{11}b_{22}b_{33})^{1/2}}\ln\left( \frac{\varepsilon_0}{|\zeta-\varepsilon_d|}\right)\!. \end{aligned}$$ At $|\zeta-\varepsilon_d|\lesssim T$ the divergence of $\chi^{ij}(\zeta)$ in Eq. (\[17\]) is truncated, and at $\zeta=\varepsilon_d$ equation (\[15\]) yields, $$\begin{aligned} \label{18} \chi^{ij}(\varepsilon_d,T)\!\approx\!-\frac{1}{6\pi^2\hbar}\!\left( \frac{e}{c}\right)^2\!\!\! \frac{\kappa^{ij}}{(b_{11}b_{22}b_{33})^{1/2}}\ln\left( \frac{\varepsilon_0}{0.88T}\right)\!. \end{aligned}$$ In order to analyze the temperature dependence of the susceptibility at a fixed value of $\zeta-\varepsilon_d\neq 0$, it is convenient to consider the difference $\chi^{ij}(\zeta,T)-\chi^{ij}(\zeta,0)$, $$\begin{aligned} \label{19} \chi^{ij}(\zeta,T)-\chi^{ij}(\zeta,0)\!=\!-\frac{1}{6\pi^2\hbar}\!\left( \frac{e}{c}\right)^2\!\!\! \frac{\kappa^{ij}}{(b_{11}b_{22}b_{33})^{1/2}} \ Y\!\!\left(\!\frac{T}{|\zeta-\varepsilon_d|}\!\right), \end{aligned}$$ where the function $Y(x)$ is defined as follows: $$\begin{aligned} \label{20} Y\!\!\left(\!\frac{T}{|\zeta-\varepsilon_d|}\!\right)\!=\! \int_{0}^{\varepsilon_0} \!\!\frac{d\varepsilon}{\varepsilon}[f(-\varepsilon)\!-\!\!f(\varepsilon)] - \ln\left( \frac{\varepsilon_0}{|\zeta-\varepsilon_d|}\right). \end{aligned}$$ When $\varepsilon_0\gg T, |\zeta-\varepsilon_d|$, this function shown in Fig. \[fig2\] is independent of the parameter $\varepsilon_0$. It follows from Fig. \[fig2\] that the temperature dependence of the susceptibility is not monotonic, and its minimum is reached at $T\approx 0.443|\zeta-\varepsilon_d|=0.443\cdot S_{\rm max}/(\pi m_*)$, see Eqs. (\[25\]). Interestingly, a minimum in the temperature dependence of the magnetic susceptibility of TaAs was really observed at $T\approx 185$ K [@liu-JMMM]. However, to describe quantitatively the experimental data, one should take into account that two types of the Weyl points with different $|\zeta-\varepsilon_d|$ exist in TaAs [@arnold16]. ![\[fig2\] The function $Y\!(\!\frac{T}{|\zeta-\varepsilon_d}|)$ defined by Eq. (\[20\]). The maximum value of $Y\approx 0.208$ is reached at $T/|\zeta-\varepsilon_d| \approx 0.443$. ](Fig2.pdf) It is also instructive to compare Eqs. (\[17\])–(\[19\]) with the appropriate results for a semimetal or a doped semiconductor with a narrow gap $2\Delta_{\rm min}$ and a strong spin-orbit interaction [@m-sh]. As an example we refer to bismuth-antimony alloys with the magnetic field lying near the bisectrix direction [@buot72; @bra77; @m-sh00; @fuseya]. In this case the divergence in Eq. (\[17\]) is truncated at $\zeta -\varepsilon_d\sim \Delta_{\rm min}$ where $\varepsilon_d$ now marks the middle of the gap. The $\chi^{ij}(\varepsilon_d,T)$ is practically independent of $T$ when $T< \Delta_{\rm min}$, while at $T> \Delta_{\rm min}$ formula (\[18\]) becomes approximately valid again. The temperature dependence of the susceptibility at $\zeta-\varepsilon_d > \Delta_{\rm min}$ still has a minimum [@bra77; @m-sh00], but its depth and position change with decreasing ratio $(\zeta-\varepsilon_d)/\Delta_{\rm min}$. When this ratio is close to unity, the minimum almost disappears. Thus the small gap practically does not manifest itself in the susceptibility except for the case $|\zeta-\varepsilon_d|/\Delta_{\rm min}\lesssim 1$. It is necessary to emphasize that formulas (\[15\])–(\[19\]) describing the giant anomaly in the susceptibility are valid only under the condition $\tilde a^2<1$. If $\tilde a^2> 1$, the appropriate $\chi^{ij}$ proves to be a constant [@m-sv]. This constant is independent of $\zeta$ and $T$ and can be incorporated into the background term. Thus the giant anomaly in the magnetic susceptibility exists only for type-I Dirac and Weyl semimetals for which the electron topological transition occurs at $\zeta= \varepsilon_d$. In the case of type-II topological semimetals the anomaly is absent. Since the volume of the electron (hole) ellipsoid near a type-I Weyl (Dirac) point is equal to $$\frac{4\pi}{3}\frac{|\zeta- \varepsilon_d|^3}{(b_{11}b_{22}b_{33})^{1/2} (1-\tilde a^2)^2},$$ the charge carrier density $n\propto |\zeta-\varepsilon_d|^3$, and the appropriate density of states is small, $dn/d\varepsilon \propto (\zeta-\varepsilon_d)^2$. Therefore, contributions of the point to those physical quantities that are proportional to $dn/d\varepsilon$ are small, too. However, the [*orbital*]{} part of the magnetic susceptibility does not refer to such quantities since it is determined by virtual interband transitions of electrons under the action of the magnetic field. It is these virtual transitions between the close bands $\varepsilon_c({\bf p})$ and $\varepsilon_v({\bf p})$ that lead to the giant anomaly, and so measurements of the susceptibility can be the effective way of investigating the type-I Dirac and Weyl points. The giant anomaly in the susceptibility seems to reveal itself in the experimental data obtained many years ago [@rob]. In that paper a dependence of the magnetic susceptibility $\chi$ of the liquid alloys Na$_{1-x}$Bi$_x$ on the concentration $x$ of bismuth was measured at the temperature $900^\circ$ C, and a noticeable diamagnetic deep on a smooth background was observed at the concentration $x=0.25$ which corresponds to the stoichiometric formula Na$_3$Bi, Fig. \[fig3\]. This result can be qualitatively understood with Eq. (\[15\]) if one considers the $x$-dependence of the susceptibility near the concentration $x=0.25$ as the dependence of $\chi=(\chi^{11}+\chi^{22}+\chi^{33})/3$ on the chemical potential $\zeta$ for the two identical Dirac points in Na$_3$Bi. Since the electron band structure of the alloys undergoes an essential transformation with changing $x$ from $0$ to $1$, the background susceptibility $\chi_0$ cannot be considered as a constant in the whole interval of $x$. In our analysis we take $\chi_0$ as a smooth function that approximates the total susceptibility in the interval $0.5\le x \le 1$ and approaches the susceptibility of Na at $x=0$; see the dashed line in Fig. \[fig3\]. The function $\chi(\zeta)$ found with Eq. (\[15\]) is superimposed on this background; the solid line in Fig. \[fig3\]. In this calculation the parameters $\kappa^{ii}$ and $b_{ii}$ have been found from the data of Ref. [@z.wang], and we have used $\zeta(x)-\varepsilon_d=9.1(x-0.25)$ eV and $\varepsilon_0=2.6$ eV as adjustable parameters. ![\[fig3\] The magnetic susceptibility of Na$_{1-x}$Bi$_x$ alloys [@rob] (recalculated per unit volume) versus Bi concentration at the temperature $900^\circ$ C (solid circles). The dashed line depicts the background susceptibility $\chi_0$ taken here; see the text. The solid line shows $\chi=(\chi^{11}+\chi^{22}+\chi^{33})/3$ calculated with Eq. (\[15\]) and superimposed on $\chi_0$. The coefficient before the integral in the appropriate expression for $\chi$ is equal to $2\cdot 10^{-7}$ according to the data of Ref. [@z.wang]; $\zeta(x)-\varepsilon_d=9.1(x-0.25)$ eV; $\varepsilon_0=2.6$ eV. ](Fig3.pdf) So far we have discussed only the orbital part of the magnetic susceptibility. In the magnetic field $H$ the total electron Hamiltonian ${\mathcal H}_{\rm tot}$ is the sum of the orbital Hamiltonian (\[1\]), (\[2\]) in which ${\bf p}$ is replaced by ${\bf p}+e{\bf A}/c$ with ${\bf A}$ being the vector potential and the spin term ${\mathcal H}_{\rm s}=(e\hbar/mc){\bf s}\cdot{\bf H}$, i.e., ${\mathcal H}_{\rm tot}={\mathcal H}_{\rm or}+{\mathcal H}_{\rm s}$. In order to obtain the magnetic susceptibility, the appropriate thermodynamic potential has to be calculated in the second order in $H$. Then, this potential consists of the three parts determined by $({\mathcal H}_{\rm or})^2$, ${\mathcal H}_{\rm or}{\mathcal H}_{\rm s}$, $({\mathcal H}_{\rm s})^2$, respectively. The first part gives the orbital magnetic susceptibility $\chi_{\rm or}$ that has been analyzed above. The third and second parts specify the spin susceptibility $\chi_{\rm s}$ and the so-called cross susceptibility $\chi_{\rm s-o}$, respectively. For the Dirac and Weyl points the $\chi_{\rm s}$ and $\chi_{\rm s-o}$ were calculated in Ref. [@kosh15], see also Refs. [@ominato; @ominato1]. It is important that $\chi_{\rm s}$ and $\chi_{\rm s-o}$ are relatively small when $\zeta$ lies near $\varepsilon_d$ [@kosh15]: $$\ |\chi_{\rm s-o}|\sim \eta|\chi_{\rm or}|,\ \ \ |\chi_{\rm s}| \sim \eta^2 |\chi_{\rm or}|,$$ where the small dimensionless parameter $\eta$ is the ratio of the spin magnetic moment $\mu_B$ to the characteristic orbital magnetic moment $(g/2)\mu_B$ of an electron in the bands “$c$” and “$v$”, $\mu_B=e\hbar/2mc$ is the Bohr magneton, and $g$ is the appropriate electron $g$ factor. Taking into account the results of Sec. \[sec2.3\], one has $g=2m/m_*$ and $$\begin{aligned} \label{21} \eta\sim \frac{m_*}{m}\sim \frac{(\zeta-\varepsilon_d)}{mV^2}, \end{aligned}$$ where $m_*$ is the cyclotron mass of the charge carriers in the bands “$c$” and “$v$”, and $V$ is the average slope of the Dirac (Weyl) cone. The smallness of $\chi_{\rm s}$ and $\chi_{\rm s-o}$ permits one to disregard these parts of the susceptibility in the vicinity of the Dirac and Weyl points. Strong magnetic fields {#sec3.2} ---------------------- In the case of the strong magnetic fields, $H\gg H_T$, the magnetization ${\bf M}$ of the electrons described by Hamiltonian (\[1\]), (\[2\]) was calculated in Ref. [@m-sh], and the magnetic-field dependence $M\propto H\ln H$ was found for the ultra-quantum regime when $\Delta\varepsilon_H> |\zeta-\varepsilon_d|$, $T$. By analogy with Eq. (\[18\]), this dependence can be qualitatively understood if one truncates the divergence in formula (\[17\]) at $|\zeta-\varepsilon_d|\sim \Delta \varepsilon_H$ (there is also a parallel between the contribution $\propto H^2\ln H$ to the $\Omega$ potential and the appropriate result of the $3+1$ quantum electrodynamics with massless fermions [@niss18]). This logarithmic in $H$ factor in the magnetization was also obtained in the papers [@roy; @moll16] for the case of the isotropic Dirac (Weyl) points. Finally, using the results of Ref. [@m-sh], the magnetization of the Dirac and Weyl points with an arbitrary tilt of their spectra was analyzed in our recent paper [@m-sh16]. For the magnetic-field region $|\zeta-\varepsilon_d|>\Delta\varepsilon_H>T$, the de Haas - van Alphen oscillations associated with these points were theoretically investigated in Refs. [@m-sh; @wright; @ashby; @wang-prl16; @m-sh16]. ![\[fig4\] The function $\mathfrak{g}(u)$, Eq. (\[24\]), that describes the oscillations of the magnetization [@m-sh16]. At integers $u$ the function $\mathfrak{g}(u)$ exhibits sharp peaks. ](Fig4.pdf) The calculation of the magnetization in the region of the strong magnetic fields ($H\gg H_T$) for the case of the Dirac points gives [@m-sh; @m-sh16]: $$\begin{aligned} \label{22} M_i\!=\!H\!\sum_{j=1}^{3}\!\chi^{ij}_{H\to 0}\!\!\cdot\!n_j\!+\!\frac{e Q_i(\zeta- \varepsilon_d)^2 \mathfrak{g}(u)}{12\pi^2\!\hbar^2 c(b_{11}b_{22}b_{33})^{\!1\!/2}\!(1-\tilde a^2)R_n^{1/2}},~~ \end{aligned}$$ where $\chi^{ij}_{H\to 0}$ is the susceptibility in the weak magnetic fields, Eq. (\[17\]); ${\bf n}$ is the unit vector along the magnetic field, $H_j=n_jH$; $Q_i=\sum_j\kappa^{ij} n_j$; $\kappa^{ij}$ and $R_n$ are given by Eqs. (\[9\]), and $$\label{23} u\equiv \frac{(\zeta-\varepsilon_d)^2 c}{2e\hbar(1-\tilde a^2)R_n^{1/2}H}=\frac{S_{\rm max}c}{2\pi\hbar e H}.$$ Here $S_{\rm max}$ is the area of the maximal cross-section of the constant-energy surface $\varepsilon_{c,v}({\bf p})=\zeta$ by the plane perpendicular to the magnetic field ($p_n=$ const.); the maximum is found relative to $p_n$ that is the quasi-momentum along the magnetic field. The universal function $\mathfrak{g}(u)$ is independent of the parameters of the Dirac point: $$\begin{aligned} \label{24} \mathfrak{g}(u)=-\frac{\ln(2\sqrt u) +A-\frac{1}{4}}{u}+3+ \frac{6}{u}\sum_{m=1}^N\Bigg[\sqrt{u(u-m)} \nonumber \\ -2m\ln\left(\frac{\sqrt{u}+\sqrt{u-m}}{\sqrt{m}} \right)\Bigg],~~~~ \end{aligned}$$ where $A\approx 1.50$, and $N\equiv [u]$ is the integer part of $u$. This $N$ is the number of the Landau subbands occupied by electrons in the conduction band or by holes in the valence band. The function $\mathfrak{g}(u)$ for not-too-high $u$ is shown in Fig. \[fig4\], while at $u\gg 1$ it is given by the expression: $$\begin{aligned} \label{25} \mathfrak{g}(u)\approx -\frac{6}{u^{1/2}}\zeta(-1/2,\{u\})=-\frac{3}{\pi\sqrt{2u}} \sum_{n=1}^{\infty}\frac{1}{n^{3/2}}\,\sin\!\!\left(2\pi nu-\frac{\pi}{4}\right), \end{aligned}$$ where $\{u\}=u-[u]$, and $\zeta(s,a)$ is the Hurwitz zeta function. Formula (\[22\]) enables one to analyze both the de Haas - van Alphen oscillations of the magnetization and the $H$-dependence of ${\bf M}$ in the ultra-quantum regime. Using $M_i(\zeta-\varepsilon_d,H,T=0)$ given by Eq. (\[22\]), one can find the magnetization $M_i(\zeta-\varepsilon_d,H,T)$ at an arbitrary temperature, $$\label{26} M_i(\zeta-\varepsilon_d,H,T)=-\int_{\!-\varepsilon_0}^{\varepsilon_0}\!\! d\!\varepsilon\ M_{i}(\varepsilon,H,0) f'\!(\varepsilon),$$ where $f'(\varepsilon)$ is the derivative of the Fermi function defined by formula (\[16\]). It follows from this expression that the second (oscillating) term in Eq. (\[22\]) is suppressed at temperatures when $H_T \gg H$, and one again arrives at formula (\[15\]). ### Oscillations Consider now the longitudinal magnetization $M_{\parallel}=\sum_{i} M_i n_i$ in more detail. Taking into account the expressions for the maximal cross-section area $S_{\rm max}$ of the Fermi surface, the cyclotron mass $m_*$, and $|S''|$ corresponding to this cross section, $$\begin{aligned} \label{27} S_{\rm max}=\frac{\pi(\zeta-\varepsilon_d)^2}{R_n^{1/2}(1-\tilde a^2)}, \ \ m_*\equiv \frac{1}{2\pi}\frac{\partial S}{\partial \varepsilon}=\frac{(\zeta-\varepsilon_d)}{R_n^{1/2}(1-\tilde a^2)}, \nonumber \\ |S''|\equiv |\frac{\partial^2 S}{\partial p_n^2}|=\frac{2\pi b_{11}b_{22}b_{33}(1-\tilde a^2)}{R_n^{3/2}},\ \ \sum_{i}Q_in_i=R_n, \end{aligned}$$ we obtain the following formula for $M_{\parallel}$ from Eq. (\[22\]): $$\begin{aligned} \label{28} M_{\parallel}\!=\!\chi_{\parallel}(H\!\!\to\! 0)\!\cdot\! H\!\!+\!C\cdot\mathfrak{g}(u), \end{aligned}$$ where $\chi_{\parallel}(H\!\!\to\! 0)=\sum_{i,j} \chi^{ij}_{H\to 0}n_in_j$ is the longitudinal magnetic susceptibility in weak magnetic fields, and the coefficient $C$ before the oscillating function $\mathfrak{g}(u)$ looks like $$\begin{aligned} \label{29} C&=&\frac{e S_{\rm max}^{3/2}}{6\sqrt 2\pi^3\!\hbar^2 c|m_*||S''|^{1/2}}. \end{aligned}$$ For $u\gg 1$, i.e., for $\zeta-\varepsilon_d \gg \Delta \varepsilon_H$, the second term in formula (\[28\]) describes the well-known de Haas - van Alphen oscillations at $T=0$, with the familiar Lifshitz-Kosevich formula [@Sh] following from Eq. (\[25\]). Note that in the case of the Dirac points the so-called spin factors of this formula are now expressed via the phases of the harmonics (see below). The thermal damping factors of the formula are obtained with Eq. (\[26\]). In general the de Haas - van Alphen oscillations associated with an arbitrary extremal cross-section of a metal have the following functional form: $u^{-1/2}G(u-\phi)$ [@shen] where $G(x)$ is a periodic function, and the phase of the oscillations $\phi$ is determined by the subleading-order term in the quantization condition, i.e., by $\gamma$ or the $g$ factor. Specifically, $\phi=\gamma$ for the nondegenerate band, cf. Eq. (\[12\]), whereas Eq. (\[11\]) gives $\phi=1/2\pm (gm_*/4m)$ in the case of the doubly degenerate electron band (in the Lifshitz-Kosevich formula the part of the phase $\pm gm_*/4m$ is usually written as the spin factor). Comparing relation (\[7\]) with the general quantization condition given by Eq. (\[11\]) or Eq. (\[12\]), one finds $\phi=0$ for the Weyl and Dirac semimetals, and this conclusion also follows directly from formula (\[28\]). As a result, in the topological semimetals the phase of the oscillations is shifted as compared to the conventional metals. This phase shift is the characteristic property of the Dirac (Weyl) fermions. However, it is necessary to keep in mind that the same phase shift should be observed in a Dirac semimetal with a small induced gap (i.e., in a doped narrow-gap semiconductor with a strong spin-orbit interaction) since in this case the spectrum in the magnetic field is still described by Eq. (\[7\]), see the end of Sec. \[sec2.2\]. At low temperatures, $T\ll \Delta \varepsilon_H$, the phase of the oscillations in $M_{\parallel}$ can be experimentally determined with the so-called Landau-level fan diagram [@Sh], i.e., with plotting the dependence $1/H_l$ versus $l$ where $H_l$ is the magnetic field corresponding to $l$-th peak in the magnetization. This peak occurs when the $l$-th Landau-subband edge crosses the Fermi level, Fig. \[fig4\]. However, with increasing temperature the sharp peaks in the magnetization are smoothed, and these distinct markers of the subband edges die out. Besides, in real semimetals several electron orbits can contribute to the oscillations. In this case the phase of the oscillations is usually found with the Fourier analysis of the experimental data. The $n$-th harmonic $\Delta M_n$ of $M_{\parallel}$ looks like [@Sh]: $$\begin{aligned} \label{30} \Delta M_n \propto \frac{H^{1/2}}{n^{3/2}}\sin\!\left(\!\!2\pi n \!\left[\frac{F}{H}-\phi\!\right] \pm \frac{\pi}{4}\right), \end{aligned}$$ where $F=S_{\rm ex}c/2\pi\hbar e$ is the frequency determined by the extremal cross-section area $S_{\rm ex}$ of the Fermi surface, and the additional offsets $\pm \pi/4$ refer to the minimal and maximal $S_{\rm ex}$, respectively. This additional offset is due to the expansion of the function $G(x)$ in the Fourier series, cf. Eq. (\[25\]). Approximating the appropriate experimental data by a number of these harmonics, one can find their phase, i.e., $\gamma$ or the $g$ factor. The same considerations are applicable to the Shubnikov - de Haas oscillations of the conductivity $\sigma$ measured in the plane perpendicular to the magnetic field. Its $n$-th harmonic $\Delta \sigma_n$ is described by the formula that is similar to Eq. (\[30\]) [@LL10]: $$\begin{aligned} \label{31} \Delta \sigma_n \propto \frac{1}{n^{1/2}H^{3/2}}\cos\!\left(\!\!2\pi n\!\left[\frac{F}{H}-\phi \right] \pm \frac{\pi}{4}\right). \end{aligned}$$ Note that the use of the resistivity rather than conductivity in analyzing the oscillations can lead to an inaccurate determination of $\phi$ [@ando13]. At present the phase of the oscillations has been experimentally investigated for a number of the Weyl and Dirac semimetals [@huang15; @luo15; @hu16; @du16; @sergelius; @wang16; @he-r(h); @pari; @zhao15; @nara15; @xiang15; @desr; @cao15; @he16]. and values of $\phi$ lying between $0$ and $1/2$ were obtained in papers [@du16; @wang16; @pari; @zhao15; @cao15]. Let us briefly outline possible reasons of the deviation of $\phi$ from $0$ or $1/2$ in the experiments. First, when $H$ approaches the boundary $H_1$ of the ultra-quantum regime, see Sec. \[sec3.2.2\], the chemical potential begins noticeably depends on $H$ if there is no large electron group which stabilizes $\zeta$ in the crystal. As a result, the shape and the phase of the last oscillations in $1/H$ changes, and $\phi$ found with these oscillations may differ from the true value. Second, the magnetic breakdown [@Sh; @azbel; @alex1; @alex2] can lead to any value of $\phi$ lying in the interval from $0$ to $1$. However in this case a sharp dependence of $\phi$ on the direction of the magnetic field is expected. Interestingly, angular dependences of $\phi$ were really found in Refs. [@xiang15; @cao15]. Third, so far we have considered the situation when the chemical potential $\zeta$ is so close to the degeneracy energy $\varepsilon_d$ that $\eta \ll 1$ where the parameter $\eta$ is defined by Eq. (\[21\]). If this parameter is not-too-small (but the Fermi surfaces of different Weyl or Dirac points do not merge into a single surface), an incorporation of nonlinear in ${\bf p}$ terms in Hamiltonian (\[1\]), (\[2\]) may become necessary. These terms modify the spectrum (\[3\]), (\[5\]). Besides, in this approximation the $g$ factor is no longer equal to the universal value $2m/m_*$, i.e., $g_{c,v}=(2m/m_*)+\Delta g_{c,v}$. The corrections $\Delta g_{c,v}$ are caused not only by the spin term ${\mathcal H}_{\rm s}=(e\hbar/mc){\bf s}\cdot{\bf H}$ but also by contributions of the bands different from ‘$c$’’ and “$v$” to the orbital parts of $g_{c}$ and $g_{v}$. In principle these $\Delta g_{c,v}$ can be found with a perturbation theory [@g3]. As to the Weyl semimetals, it was demonstrated by Wright and McKenzie [@wright] that the parameter $\gamma$ may differ from its value $\gamma=0$ when nonlinear in ${\bf p}$ terms appear in the Hamiltonian, and if there is a gap in the spectrum. However, because of the tilt of the spectrum, the maximal cross-section in the Weyl semimetals generally does not pass through the point ${\bf p}=0$, see Sec. \[sec2.1\] and Fig. \[fig1\]. Therefore the gap always exists for the electrons in this cross-section. In other words, one may expect to detect a nonzero $\gamma$ when the nonlinear terms in the Hamiltonian become essential, and an estimate gives $\gamma \sim \eta$. In the case of the Dirac semimetals, if the corrections to the spectrum (\[3\]), (\[5\]) are known, the following generalization of Eq. (\[28\]) can be used to describe the oscillations in the magnetization $M_{\parallel}$ and to find the appropriate $\Delta g$ experimentally: $$\begin{aligned} \label{32} M_{\parallel}\!=\!\chi_{\parallel}(H\!\!\to\! 0)\!\cdot\! H\!\!+\!C\cdot\frac{\mathfrak{g}(u_+)+ \mathfrak{g}(u_-)}{2} , \end{aligned}$$ where $$\begin{aligned} u_{\pm}\!&=&u \pm \frac{m_* \Delta g}{4m}, \end{aligned}$$ and the quantities $S_{\rm ex}$, $m_*$, $S''$ defining the coefficient $C$ are calculated with the corrected spectrum. Formula (\[32\]) shows that the nonzero $\Delta g=g-(2m/m_*)$ leads to the splitting of the peaks in the magnetization. A similar splitting of the oscillations in the resistivity was really observed in large magnetic fields [@zhao15; @nara15; @cao15] when the condition $\Delta \varepsilon_H\gg T$ is well fulfilled, and the shape of the oscillations differs from a sinusoid. ### The ultra-quantum regime {#sec3.2.2} At $\Delta\varepsilon_H> |\zeta-\varepsilon_d|$, i.e. $u<1$, the de Haas - van Alphen oscillations in magnetization disappear, and the ultra-quantum regime occurs. From Eq. (\[23\]) and the condition $u=1$ we find the boundary $H_1$ of this regime, $$\label{33} H_1 =\frac{S_{\rm max}c}{2\pi\hbar e}= \frac{(\zeta-\varepsilon_d)^2 c}{2e\hbar(1-\tilde a^2)R_n^{1/2}}.$$ At $H>H_1$ the sum in Eq. (\[24\]) vanishes, and formula (\[22\]) for the magnetization of the Dirac point reduces to the expression: $$\begin{aligned} \label{34} M_i\!&=&\!-\frac{1}{6\pi^2\hbar}\!\left(\frac{e}{c}\right)^2\!\!\! \frac{Q_i H}{(b_{11}b_{22}b_{33})^{1/2}}\left [\frac{1}{2}\ln\left( \frac{2\varepsilon_0^2c}{e\hbar(1-\tilde a^2)R_n^{1/2}H}\right)\!+A-\frac{1}{4}\right] \nonumber \\ &+&\frac{e Q_i(\zeta- \varepsilon_d)^2}{4\pi^2\!\hbar^2 c(b_{11}b_{22}b_{33})^{\!1\!/2}\!(1-\tilde a^2)R_n^{1/2}}, \end{aligned}$$ We see that the magnetization in the ultra-quantum regime comprises the constant, the linear in $H$ term, and the nonlinear term which is proportional to $H\ln H$. Interestingly, the difference between this magnetization and that extrapolated from the region of the weak magnetic fields is independent of the cut-off parameter $\varepsilon_0$, and it is expressed in terms of the parameters of the Dirac point only, $$\begin{aligned} \label{35} M_i\!-\!H\!\sum_{j=1}^{3}\!\chi^{ij}_{H\to 0}n_j\!=-\frac{1}{6\pi^2\hbar}\!\left(\frac{e}{c}\right)^2\!\!\!\!\! \frac{Q_i H}{(b_{11}b_{22}b_{33})^{1/2}}\!\left [\!\frac{1}{2}\ln\!\!\left(\!\frac{4H_1}{H}\!\right)\!\!+\!A-\!\frac{1}{4} -\!\frac{3H_1}{H}\right]. \end{aligned}$$ An experimental investigation of this difference also permits one to eliminate the background susceptibility $\chi_0^{ij}$ from consideration. Using formula (\[34\]), one can easily calculate the magnetic torque ${\bf K}$ per unit volume: ${\bf K}=[{\bf M}\times {\bf H}]$. Discuss now the dependence of the chemical potential $\zeta$ on the magnetic field. In the regions of the weak magnetic fields and of the de Haas - van Alphen oscillations, this dependence is negligible as long as $H\ll H_1$. However, it becomes essential at $H\sim H_1$ and in the ultra-quantum regime when $H>H_1$. In particular, equating the charge carrier densities at $H>H_1$ and at $H=0$, we arrive at $$\zeta -\varepsilon_d = (\zeta_0 -\varepsilon_d)\frac{2H_1}{3H}\sim \frac{(\zeta_0 -\varepsilon_d)^3}{(\Delta \varepsilon_H)^2},$$ where $\zeta_0$ is the chemical potential at $H=0$, the field $H_1$ is given by formula (\[33\]), and $\Delta \varepsilon_H=\sqrt{e\hbar \alpha H/c}$ according to Eq. (\[8\]). Thus, $\zeta$ approaches the degeneracy energy $\varepsilon_d$ with increasing $H$. This $H$-dependence of $\zeta$ will suppress the last term in Eq. (\[34\]) which is proportional to $(\zeta_0 -\varepsilon_d)^2$. Of course, to find quantitatively this dependence for a real sample, it is necessary to take into account that different types of the Weyl (Dirac) points with different $|\zeta- \varepsilon_d|$ may exist in a topological semimetal along with Fermi pockets of the conventional charge carriers. In recent paper [@moll16] Moll with coauthors discovered a pronounced anomaly in the magnetic torque of the Weyl semimetal NbAs upon entering the ultra-quantum regime. The torque changed its sign in this regime, signalling a reversal of the magnetic anisotropy. A similar change in the torque, but without the reversal of its sign, was also observed in TaAs [@zhang-nc19]. If using Eqs. (\[17\]) and (\[34\]), one calculates the difference between the torque in the ultra-quantum regime and that extrapolated from the region of the weak magnetic fields, a formula closely resembling Eq. (\[35\]) is obtained (only the coefficients before the square brackets are different in these expressions). This means that the torque does change in the ultra-quantum regime. However to describe the experimental data quantitatively, one must take into account several charge-carrier groups existing in these semimetals. In order to estimate the effect of the small gap $2\Delta_{\rm min}$ in the Dirac spectrum on the magnetization in the ultra-quantum regime, it is convenient to introduce the characteristic field, $$H_{\Delta} = \frac{\Delta_{\rm min}^2 c}{2e\hbar(1-\tilde a^2)R_n^{1/2}},$$ that is similar to $H_1$ defined by Eq. (\[33\]). The meaning of $H_{\Delta}$ is that at $H> H_{\Delta}$ the spacing between the Landau subbands $\Delta\varepsilon_H$ exceeds $\Delta_{\rm min}$. If $H_1 > H_{\Delta}$, the gap has no effect on the magnetization in the ultra-quantum regime at $H>H_1$, and this magnetization is still described by Eqs. (\[34\]), (\[35\]) [@m-sh]. However, if $H_1 < H_{\Delta}$, the de Haas - van Alphen oscillations disappear at $H>H_1$, but the magnetization reaches its asymptotic behavior given by Eqs. (\[34\]), (\[35\]) only at $H> H_{\Delta}$. In other words, one may expect that the dependence $M_i(H)$ deviates from Eqs. (\[34\]), (\[35\]) in the interval $H_1<H< H_{\Delta}$. This dependence can be found with formulas of Ref. [@m-sh]. Besides, as in the case of the weak magnetic fields, the bismuth-antimony alloys with the magnetic field lying near the bisectrix direction provide the useful example for the investigation of the effect of the gap and nonlinear in ${\bf p}$ terms in Hamiltonian on the magnetization in the ultra-quantum regime [@bra77; @m-sh00]. Magnetization of the Weyl semimetals {#sec3.3} ------------------------------------ In Secs. \[sec3.1\] and \[sec3.2\] we have presented formulas mainly for the case of the Dirac points assuming that the susceptibility of a Weyl node is halved as compared to the susceptibility of the appropriate Dirac one. However the zeroth Landau subbands are distinct from each other for these two types of the points, cf. Eqs. (\[8\]) and (\[10\]). Let us represent a contribution of the zeroth Landau subband of a Weyl node to the $\Omega$ potential as a half of the contribution of the zeroth subband of the Dirac point plus some additional term $\delta \Omega$. At $\tilde a^2 <1$ this term has the form: $$\begin{aligned} \label{36} \delta \Omega=-q_{ch}\frac{eH}{(2\pi\hbar)^2c}\! \frac{(\tilde {\bf a}\cdot\tilde{\bf n})}{(1-\tilde a^2)}\!\left (\!\frac{(\varepsilon_0+\zeta-\varepsilon_d)^2}{2}+\!\frac{\pi^2T^2}{6}\!\right), \end{aligned}$$ while at $\tilde a^2 >1$ it looks like $$\begin{aligned} \label{37} \delta \Omega=-q_{ch}\frac{eH{\rm sign}(\tilde {\bf a}\cdot \tilde{\bf n})}{(2\pi\hbar)^2c}\! \frac{\sqrt{(1-\tilde a^2)\tilde{\bf n}^2+(\tilde {\bf a}\cdot \tilde{\bf n})^2}}{(\tilde a^2-1)}\!\left (\!\frac{(\varepsilon_0+\zeta - \varepsilon_d)^2}{2} +\!\frac{\pi^2T^2}{6}\!\right), \end{aligned}$$ where we have used the notations of Eqs. (\[9\]). This $\delta \Omega$ is the linear function of the magnetic field, and therefore it leads to the term ${\bf M}_{\rm sp}=-\partial(\delta\Omega)/\partial {\bf H}$ which is independent of $H$, i.e., to a spontaneous magnetization. However in Weyl semimetals, the Weyl nodes always occur in pairs of opposite chirality $q_{ch}$, and they cannot exist if both the time reversal and inversion symmetries are present in a crystal [@armit]. Let a Weyl node of the chirality $q_{ch}$ and with the tilt of the spectrum defined by the vector ${\bf a}$ be at the point ${\bf p}_0$ of the Brillouin zone. Consider the case when a crystal possesses the time reversal symmetry while the inversion symmetry is broken. The semimetals of the TaAs-family and the type-II semimetal WTe$_2$ just fall into this class. In this case another Weyl node of the same chirality and with the opposite ${\bf a}$ exists at the point $-{\bf p}_0$, see e.g. the supplemental material of Ref. [@yu16]. Thus the terms $\delta \Omega$ of these two Weyl points always cancel each other, and one may disregard them. In this case the magnetization of a Weyl point really can be calculated as a half of the magnetization for the appropriate Dirac point. Another situation takes place if there is a center of the inversion in a crystal, but the time reversal symmetry is broken. This situation occurs in magnetic Weyl semimetals. In this case the Weyl point at $-{\bf p}_0$ has the opposite vector ${\bf a}$ and chirality. Hence $\delta \Omega({\bf p}_0)=\delta \Omega(-{\bf p}_0)$, and the spontaneous magnetization generated by the Weyl points does may appear. Then it will renormalizes the magnetization of the semimetal, and the parameters of the Weyl points are established self-consistently. To gain insight into the magnitude of the spontaneous magnetization, $M_{\rm sp}$, generated by a Weyl point, let us take $\varepsilon_0 = 1$ eV (assuming that $T$, $\zeta- \varepsilon_d \ll \varepsilon_0$), $\tilde a^2=0.5$, and $b_{11}=b_{22}=b_{33}=V^2$ with $V= 10^6$ m/s. Then we obtain the following estimate from Eq. (\[36\]): $M_{\rm sp}\approx \tilde a(1-\tilde a^2)^{-1}\varepsilon_0^2 m \mu_B/(4\pi^2 \hbar^3 V) \approx 7\cdot 10^{20}\mu_B/{\rm cm}^3$ where $\mu_B$ is the Bohr magneton. Nodal-line semimetals {#line} ===================== As was mentioned in the Introduction, the band-contact lines in crystals always have a nonzero difference $\varepsilon_{max} -\varepsilon_{min}\equiv 2\Delta$ between the maximum and minimum band-degeneracy energies. However this difference in the nodal-line semimetals is relatively small as compared to the inherent energy scale of crystals ($1-10$ eV). Such nodal lines exist in rhombohedral graphite [@hei1; @pie; @mcclure; @kopnin], three-dimensional graphene networks [@weng], Ca$_3$P$_2$ [@xie], Cu$_3$NPd [@kim; @yu], CaAgP [@yama], ZrSiS [@schoop; @neupane1], ZrSiTe [@schoop1], alkaline-earth germanides and silicides [@huang1], PbTaSe$_2$ [@bian], and SrIrO$_3$ [@chen]. In the most of these nodal-line semimetals the spin-orbit interaction is weak, and the band-contact lines generally exist only if one neglects this interaction. The spin-orbit coupling lifts the degeneracy of the conduction and valence bands along the line, and a small gap between the bands appears, Fig. \[fig5\]. The effect of this gap on the magnetic susceptibility was studied in Refs. [@m-sv] and [@m-sh], and it was found that this effect, as a rule, is negligible. Because of this, we mainly neglect this gap below. ![\[fig5\] (a) The nodal line that has the shape of a ring; ${\bf t}$ is the unit tangent vector to the line at one of its points; $\theta$ is the angle between this ${\bf t}$ and the magnetic field ${\bf H}$; the coordinate $p_1$-$p_2$-$p_3$ are shown near a point of the line. (b) A dependence of the degeneracy energy $\varepsilon_d$ on the coordinate $p_3$ along the line; $\varepsilon_{min}$ and $\varepsilon_{max}$ are the minimum and maximum values of $\varepsilon_d(p_3)$. (c) The electron dispersion relation (the solid lines) in the vicinity of the nodal line in the $p_1$-$p_2$ plane perpendicular to this line. The dashed lines show this relation when the spin-orbit interaction leads to the gap $2\Delta_0$ at the point $p_1=p_2=0$. In this case the minimal indirect gap $2\Delta_{\rm min}=2\Delta_0 (1-\tilde a_{\perp}^2)^{1/2}$ exists in the spectrum. The black dots mark the minimum and maximum of the conduction and valence bands, respectively. ](Fig5.pdf) Electron spectrum near a band-contact line {#sec4.1} ------------------------------------------ In the vicinity of a band-contact line along which the conduction and valance bands touch, let us introduce orthogonal curvilinear coordinates so that the axis “$3$” coincides with the line. The axes “$1$” and “$2$” are perpendicular to the third axis at every point of the band-contact line, and the appropriate coordinate $p_1$ and $p_2$ are measured from this line, Fig. \[fig5\]. In these coordinates, the electron spectrum near the line has the form [@m-sh; @m-sh14]: $$\begin{aligned} \label{38} \varepsilon_{c,v}\!\!&=&\!\varepsilon_d(p_3)\!+\!{\bf a}_{\perp}\cdot {\bf p}_{\perp}\pm E_{c,v},\\ E_{c,v}^2\!\!&=&\!\Delta_0^2+b_{11}p_1^2+b_{22}p_2^2, \nonumber \end{aligned}$$ where $\varepsilon_d(p_3)$ describes a dependence of the degeneracy energy along the line (the $\varepsilon_{max}$ and $\varepsilon_{min}$ mentioned above are the maximum and minimum values of the function $\varepsilon_d(p_3)$), Fig. \[fig5\]; ${\bf p}_{\perp}=(p_1,p_2,0)$ and ${\bf a}_{\perp}=(a_1,a_2,0)$ are the vectors perpendicular to the line at every point of it; the parameters of the spectrum $b_{11}$, $b_{22}$, and ${\bf a}_{\perp}$ generally depend on $p_3$. It is implied here that the directions of the axes “1” and “2” are chosen so that the quadratic form $E_{c,v}^2$ is diagonal (these directions generally changes along the line). For completeness, in Eq. (\[38\]) we also take into account the gap $\Delta_0=\Delta_0(p_3)$ induced by the spin-orbit interaction along the line, Fig. \[fig5\]. However this gap, as a rule, is implied to be very small, $\Delta_0 \to 0$. The vector ${\bf a}_{\perp}(p_3)$ specifies the tilt of the Dirac spectrum in the $p_1$-$p_2$ plane which is perpendicular to the line at the point $p_3$. Below we shall consider only the case when the length of the vector $\tilde{\bf a}_{\perp}\equiv (a_1/\sqrt{b_{11}}, a_2/\sqrt{b_{22}},0)$ is less than unity, $$\begin{aligned} \tilde a_{\perp}^2=\frac{a_1^2}{b_{11}}+\frac{a_2^2}{b_{22}}<1, \end{aligned}$$ since at $\tilde a_{\perp}^2>1$ the magnetic susceptibility does not exhibit any essential anomaly in its dependences on $\zeta$, $H$, and $T$ [@m-sv; @m-sh; @m-sh16]. This means that if $\tilde a_{\perp}^2>1$ for a part of the band-contact line, this part should be disregarded in all subsequent formulas. ![\[fig6\] The Fermi surface in the nodal-line semimetal with the band-contact line shown in Fig. \[fig5\] at $\zeta>\varepsilon_d^0+\Delta$ (a), $\varepsilon_d^0+ \Delta>\zeta>\varepsilon_d^0-\Delta$ (b), and $\varepsilon_d^0- \Delta>\zeta$ (c). Letters e and h indicate the electron and hole types of the Fermi surface, respectively. ](Fig6.pdf) When the parameter $\Delta \equiv (\varepsilon_{max} -\varepsilon_{min})/2$ is small as compared to the characteristic scale $\varepsilon_0$ of electron band structure (i.e., $\Delta\ll \varepsilon_0\sim 1-10$ eV) and $\tilde a_{\perp}^2<1$, the Fermi surface $\varepsilon_{c,v}({\bf p}_{\perp},p_3)=\zeta$ of the semimetal looks like a narrow corrugated electron or hole tube for $\zeta-\varepsilon_d^0\gtrsim \Delta$ or $\zeta- \varepsilon_d^0 \lesssim -\Delta$, respectively, Fig. \[fig6\]. Here $\varepsilon_d^0\equiv (\varepsilon_{max}+ \varepsilon_{min})/2$ is the mean degeneracy energy of the nodal line. The band-contact line lies inside this tube. If $|\zeta- \varepsilon_d^0| < \Delta$, the Fermi surface has a self-intersecting shape and consists of the electron and hole pockets touching at some points of the line, i.e., it looks like “link sausages”, Fig. \[fig6\]. Thus, if the chemical potential $\zeta$ decreases and passes through the critical energies $\varepsilon_{max}=\varepsilon_d^0 + \Delta$ and $\varepsilon_{min}=\varepsilon_d^0 - \Delta$, the following two electron topological transitions of $3\frac{1}{2}$ order occur [@m-sh14; @m-sh-jltp]: The electron tube first transforms into the self-intersecting Fermi surface and then this surface transforms into the hole tube. We shall assume below that all transverse dimensions of the Fermi-surface tubes and pockets, which are of the order of $|\zeta- \varepsilon_d(p_3)|/V$ where $V\sim ({b_{11}b_{22}})^{1/4}$, are small, and they are essentially less than the characteristic radius of curvature for the band-contact line. In this case practically all electron orbits in the Brillouin zone, which are intersections of the Fermi surface with planes perpendicular to the magnetic field, have the elliptic shape and lie near the band-contact line. In other words, a small region in the Brillouin zone determines the local electron energy spectrum in the magnetic field almost for any point of the line. This spectrum has the form [@m-sh18]: $$\begin{aligned} \label{39} \varepsilon_{c,v}^l(p_3)&=&\varepsilon_{d}(p_3) \pm \!\left(\frac{e\hbar\alpha H|\cos\theta|}{c}l\right)^{1/2}\!, \\ \alpha&=&\alpha(p_3)=2(b_{11}b_{22})^{1/2}(1-\tilde a_{\perp}^2)^{3/2}, \label{40} \end{aligned}$$ where $l$ is a non-negative integer ($l=0$, $1$, …), with the single Landau subband $l=0$ being shared between the branches “$c$” and “$v$”, and $\theta=\theta(p_3)$ is the angle between the direction of the magnetic field and the tangent ${\bf t}={\bf t}(p_3)$ to the band-contact line at the point with a coordinate $p_3$, Fig. \[fig5\]. When $|\zeta- \varepsilon_d^0|$ and $\Delta$ are comparable, formula (\[39\]) is valid in the leading order in the small parameter $(\Delta\cdot\tan\theta/LV)^2 \sim (\Delta\cdot\tan\theta/\varepsilon_0)^2$. It is clear that formula (\[39\]) fails only for those points of the line for which $\theta$ is close to $\pi/2$. However, these points give a small contribution to the magnetization [@m-sh18], and hence they do not introduce essential errors into results of its calculations. Under the condition $\Delta\cdot\tan\theta/LV \ll 1$, spectrum (\[39\]) can be rewritten in the form that is similar to Eq. (\[7\]), $$\label{41} S(\varepsilon^{l},p_3)=\frac{S_0(\varepsilon^{l},p_3)}{|\cos\theta|} =\frac{2\pi\hbar e H}{c}l,$$ where $S(\varepsilon^{l},p_3)$ is the area of the cross-section of the constant-energy surface $\varepsilon_{c,v}({\bf p})=\varepsilon^l$ by the plane perpendicular to the magnetic field and passing through the point of the line with the coordinate $p_3$, and $S_0(\varepsilon^{l},p_3)$ is the area of the analogous cross-section by the plane perpendicular to the line. Comparing Eq. (\[41\]) with the semiclassical quantization condition (\[12\]) for spinless particles, one finds that $\gamma=0$. This result can be readily understood with Eq. (\[13\]). When the spin-orbit interaction is neglected, the orbital moment $L$ vanishes. On the other hand, if $\theta \neq \pi/2$, the electron orbits surround the nodal line, and the Berry phase $\Phi_B$ of the orbits is equal to $\pi$ [@prl]. It is significant that this result for $\Phi_B$ remains true even if terms of higher orders in $p_1$ and $p_2$ are included in spectrum (\[38\]). Besides, the spectrum in the magnetic field, Eq. (\[41\]), is not disturbed by the weak spin-orbit interaction when the gap $2\Delta_0(p_3)$ is induced along the nodal line. With this interaction, the semiclassical quantization condition (\[11\]) comes into play. In this condition the $g$ factor comprises the two terms $g=g_1(p_3)+g_2(p_3)$ [@jetp]. The first term is determined by the Berry phase, $$\begin{aligned} g_1=2\frac{m}{m_*}\left (1-\frac{\Delta_0}{\sqrt{(\zeta-\varepsilon_d)^2-\Delta_{\rm min}^2({\bf n})+\Delta_0^2}}\right ) , \end{aligned}$$ while the second one is caused by the orbital moment $L$, $$\begin{aligned} g_2=2\frac{m}{m_*}\frac{\Delta_0}{\sqrt{(\zeta-\varepsilon_d)^2-\Delta_{\rm min}^2({\bf n})+\Delta_0^2}} , \end{aligned}$$ where $m_*$ is the cyclotron mass of the electron orbit in the magnetic field directed along the unit vector ${\bf n}$, and $2\Delta_{\rm min}({\bf n})$ is the minimal indirect gap between the bands “$c$” and “$v$” in the plane of this orbit (it follows from Eqs. (\[38\]) that $\Delta_{\rm min}({\bf n})\approx \Delta_0(1-\tilde a_{\perp}^2)^{1/2}$ at $\Delta\cdot\tan\theta/LV \ll 1$). The formulas for $g_1$ and $g_2$ show that the Berry-phase term dominates over the the orbital-moment term at $\Delta_0 \to 0$. However, in any case one has $g=g_1+g_2=2m/m_*$, and the quantization condition (\[11\]) really reduces to Eq. (\[41\]). Magnetization {#sec4.2} ------------- As in the case of the Weyl and Dirac semimetals, the total magnetic susceptibility of the nodal-line semimetals consists of its special part determined by the electron states located in the vicinity of the band-contact line and a practically constant background term specified by electron states located far away from this line. It is the special part that is responsible for dependences of the susceptibility on the magnetic field, temperature, and the chemical potential $\zeta$ when this $\zeta$ lies inside or close to the narrow energy interval from $\varepsilon_d^0- \Delta$ to $\varepsilon_d^0 +\Delta$. Below we consider only the special contributions to the magnetization and to the magnetic susceptibility. The magnetic-field behavior of the susceptibility essentially depends on interrelation between the four parameters: the width $2\Delta$ of the degeneracy-energy dispersion along the nodal line, the temperature $T$, the characteristic spacing $\Delta\varepsilon_H=\hbar\omega_c$ between the Landau subbands, and the chemical potential $\zeta$ measured relative to the critical energy $\varepsilon_{\rm min}$ or $\varepsilon_{\rm max}$ of the line. In weak magnetic fields $H\ll H_T$, when $\Delta\varepsilon_H\ll T$, the special part of the magnetic susceptibility is practically independent of $H$, whereas at $H>H_T$ the magnetization becomes a nonlinear function of $H$. The boundary $H_T$ between the regions of weak and strong magnetic fields, $\Delta\varepsilon_H(H_T) \sim T$, is given by the same estimate as in the case of the Dirac (Weyl) semimetals. The giant anomaly in the magnetic susceptibility of metals with band-contact lines was theoretically studied both for weak [@m-sv] and for strong [@m-sh] magnetic fields. This anomaly is determined by the electron states located near the points of the $3\frac{1}{2}$-order electron topological transitions occurring at $\zeta=\varepsilon_{\rm min}$ and $\zeta=\varepsilon_{\rm max}$. In fact, it was assumed in the papers [@m-sv; @m-sh] that the parameter $\Delta$ is large, and it exceeds the other three parameters, i.e., $\Delta \gg T$, $\Delta\varepsilon_H$, $\zeta-\varepsilon_{\rm min}$ (or $\zeta-\varepsilon_{\rm max}$). In this situation each critical point can be considered independently. On the other hand, the magnetic susceptibility for a nodal-line semimetal with a band-contact ring characterized by constant $\varepsilon_d$ (i.e. by $\Delta=0$) was estimated by Koshino and Hizbullah [@kosh15] in the case of the weak magnetic fields. The ring was described by the model proposed in Ref. [@balents]. Using a similar model for the nodal ring with $\Delta=0$, the quantum oscillations of the density of the electron states, the susceptibility, and the resistivity were theoretically studied in Refs. [@liu17; @pal16; @li-prl18; @yang18; @orosz]. The magnetization of the semimetals with the band-contact lines of arbitrary shapes and at small but nonzero $\Delta$ was calculated in Refs. [@m-sh16; @m-sh18] for the weak and strong magnetic fields, including the region of the de Haas - van Alphen oscillations. These oscillations were further analyzed in Ref. [@fnt18]. At $T=0$ the general formula for the magnetization associated with a band-contact line in a nodal-line semimetal has the form [@m-sh18]: $$\begin{aligned} \label{42} {\bf M}(\zeta,H)\!=\!\frac{e^{3/2}H^{1/2}} {2\pi^2\hbar^{3/2}c^{3/2}}\!\!\int_{0}^{L}\!\!\!\!\!dp_3 |\cos\theta|^{1/2}\nu\!\sqrt{\alpha(p_3)} K(u){\bf t}, \end{aligned}$$ where the integration in the Brillouin zone is carried out over the length $L$ of the line; $\theta=\theta(p_3)$ is angle between ${\bf H}$ and the unit vector ${\bf t}={\bf t}(p_3)$ tangent to the line at the point $p_3$; $\nu=\nu(p_3)$ is a sign of $\cos\theta$; $$\begin{aligned} \label{43} K(u)\!\!\!&=&\!\!\! \frac{3}{2}\zeta(-\frac{1}{2},\![u]\!+\!1\!)+\sqrt{u}([u]+\frac{1}{2}), \end{aligned}$$ $\zeta(s,a)$ is the Hurwitz zeta function, the quantity $u$ is similar to that defined by Eq. (\[23\]), $$\label{44} u=\frac{[\zeta-\varepsilon_d(p_3)]^2 c}{e\hbar \alpha(p_3) H|\cos\theta|}=\frac{cS(p_3)}{2\pi e\hbar H},$$ $S(p_3)$ is the area of the Fermi-surface cross section by the plane perpendicular to the magnetic field and passing through the point of the line with the coordinate $p_3$, $[u]$ is the integer part of $u$. In Eq. (\[42\]), the two-fold degeneracy of the conduction and valence bands in spin is assumed. In the case of a noncentrosymmetric semimetal with a strong spin-orbit interaction (e.g., PbTaSe$_2$ [@bian]), where this degeneracy is absent, the right hand side of formula (\[42\]) should be divided by two. In obtaining formula (\[42\]), it was also supposed that Eqs. (\[39\]) and (\[40\]) are valid at all angles $\theta$ including $\theta=\pi/2$. As was mentioned above, this supposition does not lead to an essential error in the magnetization since the parts of line where $\theta \sim \pi/2$ give a small contribution to expression (\[42\]). For nonzero $T$, the magnetization $M_i(\zeta,H,T)$ can be calculated with the relationship: $$\begin{aligned} \label{45} M_{i}(\zeta,H,T)=-\int_{\!-\infty}^{\infty}\!\! d\varepsilon M_{i}(\varepsilon,H,0)f'(\varepsilon), \end{aligned}$$ where $f'(\varepsilon)$ is the derivative of the Fermi function, $$\label{46} f'(\varepsilon)=-\left[4T\cosh^2\left(\frac{\varepsilon- \zeta}{2T}\right)\right]^{-1}.$$ In the topological semimetals, charge carriers (electron and holes) are located near the band-contact line, and their chemical potential $\zeta$ generally depends on the magnetic field, $\zeta=\zeta(H)$. This dependence can be derived from the condition that the charge carrier density $n$ does not vary with increasing $H$, $$\label{47} n(\zeta,H)=n_0(\zeta_0),$$ where $n_0$ and $\zeta_0$ are the density and the chemical potential at $H=0$. On calculating $\zeta(H)$, one can find the magnetization as a function of $n_0$ or $\zeta_0$, inserting $\zeta(H)$ into Eq. (\[42\]). As in the case of the Dirac and Weyl semimetals, if there are no other electron pockets stabilizing the chemical potential in the nodal-line semimetal, the dependence $\zeta(H)$ has a noticeable effect on the magnetization in the ultra-quantum regime or when $H$ approaches its boundary $H_1$. However a specific feature of certain nodal-line semimetals is that the spacing $\Delta \varepsilon_H$ between the Landau subbands may become larger than their width even at $H \ll H_1$. In this situation the spectrum (\[39\]) transforms, in fact, into the spectrum of a two-dimensional electron system since different Landau subbands $\varepsilon_{c,v}^l(p_3)$ do not overlap, and they look like broadened Landau levels. In this quasi-two-dimensional case the chemical potential essentially depends on the magnetic field [@Sh], and its dependence noticeably changes the shape of the de Haas - van Alphen oscillations; see below. Formulas (\[42\]), (\[45\]) (and the appropriate expression for the $\Omega$ potential) enable one to analyze the cases of the weak and strong magnetic fields, including the region of the de Haas- van Alphen oscillations and the ultra-quantum regime [@m-sh18]. We now consider these cases in more detail. ### Weak magnetic fields {#weak-magnetic-fields} In the weak magnetic fields $H\ll H_T$, when $\Delta\varepsilon_H\ll T$, one has the following expressions for the magnetization and the longitudinal magnetic susceptibility $\chi_{\parallel}$ defining the magnetization component $M_{\parallel}=\chi_{\parallel}H$ parallel to the magnetic field [@m-sh16; @m-sh18]: $$\begin{aligned} \label{48} {\bf M}(\zeta,H,T)\!&=&\!\frac{e^{2}H} {12\pi^2\hbar c^{2}}\!\!\int_{0}^{L}\!\!\!\!\!dp_3 \alpha(p_3)f'(\varepsilon_d)\cos\theta\,{\bf t}. \\ \chi_{\parallel}\!&=&\!\frac{e^2}{12\pi^2\!\hbar c^2}\! \!\!\int_{0}^{L}\!\!\!\!\!dp_3\alpha(p_3)f'(\varepsilon_d) \cos^2\!\theta, \label{49} \end{aligned}$$ where $f'(\varepsilon_d)$ and $\alpha(p_3)$ are given by Eqs. (\[46\]) and (\[40\]), respectively. At low temperatures $T\ll 2\Delta$, formula (\[49\]) yields $\chi_{\parallel}(\zeta) =0$ if $\zeta$ does not lie between $\varepsilon_{\rm min}=\varepsilon_d^0-\Delta$ and $\varepsilon_{\rm max}=\varepsilon_d^0+\Delta$. In order to gain some insight into the behavior of $\chi_{\parallel}(\zeta)$ in the interval $|\zeta-\varepsilon_d^0|<\Delta$, consider a simple model of the nodal line. Let the band-contact line be a circle with constant $b_{11}$, $b_{22}$, $\tilde a_{\perp}^2$, and with $$\label{50} \varepsilon_d(p_3)=\varepsilon_d^0+\Delta \cos\!\left(\!\!\frac{2\pi p_3n}{L}\!\right),$$ where $n$ is an integer ($n=6$ in Fig. \[fig5\]). Within this model that may be appropriate for Ca$_3$P$_2$ [@xie], it follows from Eq. (\[49\]) that [@m-sh16]: $$\begin{aligned} \label{51} \chi_{\parallel}(\zeta)\!=\!\frac{C} {\pi \sqrt{\Delta^2-(\zeta-\varepsilon_d^0)^2}}=\frac{C} {\pi \sqrt{(\varepsilon_{\rm max}-\zeta)(\zeta-\varepsilon_{\rm min})}}, \end{aligned}$$ where $$\begin{aligned} \label{52} C=-\frac{e^2}{12\pi^2\!\hbar c^2} L(b_{11}b_{22})^{1\!/2}\!(1-\tilde a_{\perp}^2)^{3\!/2}\!\cos^2\theta_0 , \end{aligned}$$ and $\theta_0$ is the angle between the magnetic field and the plane of the nodal line. When $\zeta$ tends, e.g., to $\varepsilon_{\rm max}= \varepsilon_d^0 +\Delta$, the giant anomaly in the susceptibility, $\chi_{\parallel}\propto (\varepsilon_{\rm max}- \zeta)^{-1/2}$, occurs in agreement with Ref. [@m-sv]. Of course, at $|\varepsilon_{\rm max} -\zeta|\lesssim T$ the divergence of $\chi_{\parallel}$ in Eq. (\[51\]) is truncated as in the case of the Dirac points. In the middle of the interval $\varepsilon_{\rm min}\le \zeta \le \varepsilon_{\rm max}$ the susceptibility is still large due to a small value of $\Delta$ in the denominator of Eq. (\[51\]), and $\chi_{\parallel}$ essentially depends on $\zeta$, Fig. \[fig7\]. ![\[fig7\] The dependence of $\chi_{\parallel}$ on the chemical potential $\zeta$ at 1) $T\to 0$, Eq. (\[51\]) 2) $T/\Delta=0.25$ and 3) $T/\Delta=2$, Eq. (\[49\]). The susceptibility is measured in units of $C/\Delta$ where the constant $C$ is defined by formula (\[52\]). ](Fig7.pdf) When the temperature is not small as compared to $\Delta$ (and $T\gg \Delta\varepsilon_H$), the $\zeta$-dependence of $\chi_{\parallel}(\zeta,T)$ is shown in Fig. \[fig7\]. In the limiting case when $\Delta$ is so small (or the temperature is so high) that $\Delta\ll T$ (the interrelation between $\Delta$ and $\Delta\varepsilon_H$ may be arbitrary), the explicit formula for $\chi_{\parallel}(\zeta,T)$ can be obtained [@m-sh16]: $$\begin{aligned} \label{53} \chi_{\parallel}(\zeta,T)\!=\!\frac{C}{4T\cosh^2[(\varepsilon_d^0- \zeta)/2T]}. \end{aligned}$$ This formula, in fact, reproduces the result of Koshino and Hizbullah [@kosh15], and it well describes $\chi_{\parallel}(\zeta,T)$ calculated with Eqs. (\[49\]) even at $T/\Delta \gtrsim 2$. When the angle $\theta_0$ differs from zero and $\pi/2$, there is also a nonzero component $M_{\perp}$ of the magnetization that is perpendicular to the magnetic field ${\bf H}$. This component lies in the plane passing through the vector ${\bf H}$ and the normal to the plane of the nodal line, and it can be calculated with Eq. (\[48\]). It turns out that the magnetic susceptibility $\chi_{\perp}$ defined by the relation $M_{\perp}=\chi_{\perp}H$ is described by formulas (\[51\])– (\[53\]) in which $\cos^2\theta_0$ should be replaced by $\cos\theta_0\sin\theta_0$ [@m-sh16]. This $\chi_{\perp}$ determines the magnetic torque $K_{\phi}=\chi_{\perp}H^2$. Koshino and Hizbullah [@kosh15] estimated the spin $\chi_{\rm s}$ and cross $\chi_{\rm s-o}$ susceptibilities for the nodal ring. These susceptibilities are similar to those considered in Sec. \[sec3.1\] for the Dirac points. It follows from their results that $\chi_{\rm s}$ and $\chi_{\rm s-o}$ are relatively small as compared to the orbital part of the susceptibility considered above if $\Delta$ and $|\zeta-\varepsilon_d^0|$ are essentially less than $mV^2$ where $V^2\sim (b_{11}b_{22})^{1/2}$. Consider now an example of the band-contact line terminating on the opposite faces of the Brillouin zone. In particular, this situation occurs in BiTeI and BiTeCl although these crystals hardly be assigned to the representative set of the nodal-line semimetals since the parameter $\Delta$ is sufficiently large in them ($2\Delta\sim 0.3$ eV in BiTeI [@bahramy11]). It is well known that a large Rashba-type spin splitting induced by the strong spin-orbit interaction occurs in the bulk bands of the crystals BiTeI [@bahramy11; @mura13; @vangen; @Ye; @park15] and BiTeCl [@chen14; @martin14; @xiang-prb15] which have no center of the inversion. The splitting of the conduction band $\varepsilon_c({\bf p})$ into the two spin subbands $\varepsilon_c^{\pm}({\bf p})$ in the vicinity of the $A$-$\Gamma$-$A$ axis (the $z$ axis) of the Brillouin zone can be described by the following Hamiltonian: $$\begin{aligned} \label{54} \hat H=\left[\varepsilon_d(p_z)+ \frac{p_x^2+p_y^2}{2m_{\parallel}}\right]\sigma_0+ v_R\,{\bf \sigma}\cdot [{\bf e}_z \times {\bf p}], \end{aligned}$$ which leads to the dispersion relation: $$\begin{aligned} \label{55} \varepsilon_c^{\pm}({\bf p})= \varepsilon_d(p_z)+ \frac{p_x^2+p_y^2}{2m_{\parallel}} \pm v_R\sqrt{p_x^2+p_y^2}\,. \end{aligned}$$ Here the unit vector ${\bf e}_z$ is directed along the $z$ axis, $v_R=v_R(p_z)$ and $m_{\parallel}=m_{\parallel}(p_z)$ are the Rashba parameters, $\sigma_0$ and ${\bf \sigma}$ are the unit and Pauli matrices. It follows from Eq. (\[55\]) that at a fixed $p_z$ the minimum of the conduction band, $\varepsilon_{c,{\rm min}}^{-}(p_z)$, occurs at the distance $p_0=v_R m_{\parallel}$ from the $z$ axis and lies below $\varepsilon_d(p_z)$, $\varepsilon_{c, {\rm min}}^{-}(p_z) =\varepsilon_d(p_z)- p_0^2/2m_{\parallel}$. It is also clear that there is no spin splitting of the conduction band when ${\bf p}$ lies in this axis ($p_x=p_y=0$) although the point $A$ in BiTeI and the point $\Gamma$ in BiTeCl are frequently named as the Dirac points. In reality, the $A$-$\Gamma$-$A$ axis is the band-contact line in which the two spin subbands of the conduction band merge. In BiTeI the points $A$ and $\Gamma$ correspond to $\varepsilon_{\rm min}$ and $\varepsilon_{\rm max}$ of $\varepsilon_d(p_z)$, respectively, whereas in BiTeCl the opposite correspondence takes place: $\varepsilon_{\rm min}= \varepsilon_d(\Gamma)$ and $\varepsilon_{\rm max}=\varepsilon_d(A)$. The crystals BiTeI and BiTeCl are always doped, and the chemical potential $\zeta$ lies near $\varepsilon_{\rm min}$. With changing the doping, $\zeta$ crosses $\varepsilon_{\rm min}$, and the $3\frac{1}{2}$ order topological transition occurs [@m-sh14; @m-sh-jltp] which is known for these crystals as the transition from the ring torus to the so-called spindle torus [@Ye; @xiang-prb15]. Dependences of the magnetic susceptibility of BiTeI on $T$ and $\zeta$ were measured by Schober et al. [@schober] in the region of weak magnetic fields, and it was found that there is a diamagnetic anomaly in $\chi_{zz}(\zeta)$ superimposed on a paramagnetic background when $\zeta$ crosses $\varepsilon_{\rm min}$. This anomaly for the dispersion relation (\[55\]) was first studied theoretically by Boiko and Rashba [@boiko]. Their results can be readily reproduced with the general formula (\[49\]) if we take into account that $\alpha(p_3)=2v_R^2$ in the case of Eq. (\[55\]) and approximate $\varepsilon_d(p_z)$ near $\varepsilon_{\rm min}$ by the dependence $\varepsilon_d(p_z) \approx \varepsilon_{\rm min} +p_z^2/2m_z$ where $m_z$ is an effective mass. At low temperatures and at $\zeta\ge \varepsilon_{\rm min}$, the contribution of the band-contact line to $\chi_{zz}$ has the form: $$\begin{aligned} \label{56} \chi_{zz}=-\frac{e^2v_R^2\sqrt{2m_z}}{12\pi^2\!\hbar c^2\sqrt{\zeta-\varepsilon_{\rm min}}} , \end{aligned}$$ where the additional factor $1/2$ has been introduced since the bands are not degenerate in spin. The other components of the susceptibility tensor and $\chi_{zz}$ at $\zeta< \varepsilon_{\rm min}$ are equal to zero. Temperature dependences of the susceptibility can be easily obtained either with Eq. (\[49\]) or with Eqs. (\[45\]) and (\[56\]). In particular, the magnitude of the diamagnetic anomaly is proportional to $T^{-1/2}$. ### Oscillations Consider now the case of sufficiently strong magnetic fields, $H>H_T$, and begin with the situation when the chemical potential does not lie near $\varepsilon_{\rm min}$ or $\varepsilon_{\rm max}$ of the nodal line, i.e., when $|\zeta -\varepsilon_{\rm min}| \sim |\zeta -\varepsilon_{\rm max}|$. In this case it follows from Eq. (\[42\]) [@m-sh18] that in the region of the magnetic fields where $T\ll \Delta\varepsilon_H \ll |\zeta-\varepsilon_{min}|$, $|\zeta-\varepsilon_{max}|$, $2\Delta$, the magnetization is described by the usual formula for the de Haas - van Alphen effect in three-dimensional metals [@Sh], with the phase of the oscillations being shifted by a half of the period. In particular, the $n$-th harmonic $\Delta M_n$ of the magnetization component $M_{\parallel}$ parallel to the magnetic field looks like: $$\begin{aligned} \label{57} \Delta M_n \propto \frac{H^{1/2}}{n^{3/2}}\sin\!\left(\!\!2\pi n \!\left[\!\frac{F}{H}-\gamma \right] \pm \frac{\pi}{4}\right), \end{aligned}$$ where $F=S_{\rm ex}c/2\pi\hbar e$ is the frequency determined by the extremal (in $p_3$) cross-section area $S_{\rm ex}$ of the Fermi surface, $\gamma=1/2 -\Phi_B/2\pi$ [@prl], and the offsets $\pm \pi/4$ refer to the minimal and maximal $S_{\rm ex}$, respectively. The phase shift of the oscillations is due to the zero value of $\gamma$ that is caused by the Berry phase $\pi$ for the electron orbits surrounding this line, see Sec. \[sec4.1\]. This shift is the characteristic feature of such orbits in crystals with band-contact lines [@prl]. As in usual metals [@Sh], the dependence $\zeta(H)$ is sufficiently weak in this region of the magnetic fields and practically has no effect on the oscillations. In the doped nodal-line semimetals the additional relation $2\Delta \ll |\zeta-\varepsilon_{min}|$, $|\zeta-\varepsilon_{max}|$ is fulfilled. In this case, with increasing magnetic field when $T< 2\Delta \ll \Delta\varepsilon_H \ll |\zeta-\varepsilon_d^0|$, the three-dimensional spectrum (\[39\]) transforms, in fact, into the spectrum of a two-dimensional electron system if the width of the Landau subbands $\varepsilon_{c,v}^l(p_3)$ is of the order of $2\Delta$. In this situation different Landau subbands do not overlap, and they look like broadened Landau levels. In this magnetic-field region the $n$-th harmonic $\Delta M_n$ of the longitudinal magnetization $M_{\parallel}$ takes the form characteristic of two-dimensional metals [@luk04]: $$\begin{aligned} \label{58} \Delta M_n \propto \frac{1}{n}\sin\!\left(\!\!2\pi n \!\left[\!\frac{F_{2D}}{H}-\gamma \right]\right), \end{aligned}$$ where $F_{2D}=(S_{\rm max}+S_{\rm min})c/4 \pi \hbar e$, $S_{\rm max}$ and $S_{\rm min}$ are the maximum and minimum cross-section areas of the Fermi surface, and $\gamma=0$ [@m-sh18]. When $H$ changes within this region of the magnetic fields, the chemical potential $\zeta(H)$ moves together with one of these levels, and then, at a certain value of $H$, it jumps from this level to the neighboring one [@Sh]. The crossover from the three-dimensional electron spectrum to the quasi-two-dimensional one occurs at the field $H_{cr}$ determined by the condition $\Delta \varepsilon_H(H_{cr}) \sim \Delta$, while the boundary $H_1$ of the ultra-quantum regime is essentially larger than $H_{cr}$, and it is found from $\Delta\varepsilon_H(H_1) \sim |\zeta-\varepsilon_d^0|$ in this quasi-two-dimensional case. Using Eq. (\[39\]), one obtains the following estimates for $H_1$ and $H_{cr}$: $$\begin{aligned} \label{59} H_1&\sim& F_{2D}\sim \frac{(\zeta-\varepsilon_d^0)^2 c}{e\hbar \alpha }, \\ H_{cr}&\sim& \frac{(S_{\rm max}-S_{\rm min}) c}{2\pi e\hbar }\sim \frac{4\Delta |\zeta-\varepsilon_d^0| c}{e\hbar \alpha }\sim \frac{4\Delta}{|\zeta-\varepsilon_d^0|}H_1. \nonumber \end{aligned}$$ An example of the dependence $\zeta(H)$ both at $H<H_{cr}$ and $H>H_{cr}$ is shown in Fig. \[fig8\]. ![\[fig8\] The dependence of chemical potential $\zeta$ on $1/H$ calculated with Eq. (\[47\]) for rhombohedral graphite at $\zeta(H=0)\equiv \zeta_0=\varepsilon_d^0+20\Delta$. The magnetic field is directed along the $z$ axis (the axis of the band-contact helix); $u_0\equiv (\zeta_0-\varepsilon_d^0)^2 c/e\hbar \alpha H\cos\theta$, $\varepsilon_d(p_3)=\varepsilon_d^0 -\Delta \cos(6\pi p_3/L)$, $\cos\theta = 0.98$, $\alpha(p_3)=$const [@m-sh18]. We also mark the Landau subbands, Eq. (\[39\]), by the dark background, and the short and long dashes indicate the lower and the upper edges of these subbands, respectively. The crossover described in the text occurs at $u_0 \sim 5$. ](Fig8.pdf) Strictly speaking, the quasi-two-dimensional electron spectrum in magnetic fields does not develop for all electrons in a topological semimetals with small $\Delta$ since if $\cos\theta$ tends to zero in some part of the line, the $\Delta\varepsilon_H$ becomes less than $2\Delta$ there; see Eq. (\[39\]). For the quasi-two-dimensional spectrum to manifest itself, a change of the quantity $u\propto 1/\cos\theta$ defined by Eq. (\[44\]) has to be less than unity along an essential portion of the line, i.e., $\cos\theta$ may change only within a sufficiently small interval in this portion. This imposes a restriction on the shape of the nodal line. It is clear that the spectrum of this kind can appear for a straight band-contact line, i.e., for a symmetry axis, since $\theta(p_3)$ is constant in this case. The quasi-two-dimensional spectrum is also possible in the case of band-contact lines terminating on the opposite faces of the Brillouin zone for a certain region of the magnetic-field directions. In particular, this situation takes place in rhombohedral graphite in which the nodal line has the shape of a helix [@mcclure], and the quasi-two-dimensional spectrum is realized when the magnetic field $H>H_{cr}$ is perpendicular to the basal plane of the crystal [@m-sh18]. This type of the spectrum can also occur for a closed band-contact line composed of nearly straight arcs. This situation appears to take place in ZrSiS [@schoop; @neupane1]. The strong dependence $\zeta(H)$ for the quasi-two dimensional spectrum noticeably changes the shape of the de Haas - van Alphen oscillations and can mask the correct value of the Berry phase $\Phi_B$ when $\Phi_B$ is measured with these oscillations [@m-sh18; @fnt18]. In particular, if the quasi-two dimensional spectrum occurs for all the electrons near the nodal line, one can find $\gamma=1/2$ from these oscillations although the Berry phase is still equal to $\pi$, and the true $\gamma=0$. To illustrate this statement, in Fig. \[fig9\] we present the $H$-dependence of $M_z/H$ for rhombohedral graphite when the magnetic field is perpendicular to the basal plane of the crystal (i.e., $H$ is parallel to the $z$ axis). The de Haas - van Alphen oscillations are clearly visible in the figure. The dashed line shows the oscillations calculated at constant $\zeta$. As expected, the Landau-level fan diagram shown in the inset yields $\gamma=0$ for these oscillations. However, the electron spectrum is quasi-two-dimensional for the whole interval of the magnetic fields in Fig. \[fig9\], the chemical potential and the magnetization $M_z$ exhibit jumps, and the positions of these jumps do not coincide with the positions of the sharp peaks in $M_z/H$ calculated at a constant chemical potential. In other words, the dependence $\zeta(H)$ leads to the shift of the oscillations, and this shift imitates a change of $\gamma$. In particular, the appropriate Landau-level fan diagram suggests that $\gamma=1/2$. Interestingly, intermediate values of $\gamma$ (different from $0$ and $1/2$) can be found if there is an addition group of charge carriers in a nodal-line semimetal, i.e., if the electron groups with the quasi-two-dimensional and three-dimensional spectra coexist in this semimetal [@fnt18]. ![\[fig9\] Top: Dependences of $M_z/H$ on $1/H$ for rhombohedral graphite at $T=0$ and the magnetic field directed along the $z$ axis. The dependences are calculated numerically with Eqs. (\[42\])– (\[44\]); $\alpha(p_3)$, $\cos\theta$, are $\varepsilon_d(p_3)$ are the same as in Fig. \[fig8\]; $\Delta=1$ meV [@m-sh18]. The dashed line corresponds to the constant chemical potential $\zeta-\varepsilon_d^0=70$ meV, the solid line shows $M_z/H$ at $\zeta_0-\varepsilon_d^0=70$ meV, taking into account the $H$-dependence of $\zeta$ presented in the bottom panel. The inset: The Landau-level fan diagrams plotted with the positions of the maxima of the dashed and solid curves of the main panel. The diagrams give $\gamma=0$ and $\gamma=1/2$. Bottom: The $H$-dependence of the chemical potential calculated with Eq. (\[47\]) at $\zeta_0- \varepsilon_d^0 =70$ meV. The inset schematically shows the band-contact helix in rhombohedral graphite. ](Fig9.pdf) Recently, the de Haas - van Alphen [@Hu; @kumar; @Hu2; @Hu1; @Hu18], Shubnikov - de Haas [@Ali1; @wang1; @singha; @pez; @delft; @guo19], and thermoelectric power [@matus] oscillations in magnetic fields were experimentally investigated in ZrSiS family of the nodal-node semimetals, and intermediate values of the Berry phase (other than $0$ and $\pi$) were obtained for a number of the electron orbits. Taking into account the above considerations, we hypothesized [@m-sh18; @fnt18] that the essential dependence of chemical potential on the magnetic field reveals itself in these measurements, and this dependence is probably due to the coexistence of dissimilar electron groups in these materials. Under this assumption, the observed splitting of the oscillation frequencies with changing the magnetic-field direction [@kumar; @Hu1; @Ali1; @singha; @guo19] can be explained by the crossover from the frequency $F_{2D}\propto (S_{\rm max}+S_{\rm min})/2$ characteristic of the quasi-two-dimensional spectrum to the frequencies $F_{\rm max}\propto S_{\rm max}$ and $F_{\rm min}\propto S_{\rm min}$ inherent in the three-dimensional case. Another reason for the intermediate values of $\gamma$ may be due to the magnetic breakdown [@Sh; @azbel; @alex1; @alex2]. However, although the combination frequencies inhering in the magnetic breakdown were really detected in ZrSiS [@pez], ZrGeSe[@Hu2], and HfSiS [@delft], the intermediate values of $\gamma$ were not found for the appropriate orbits. On the other hand, the combination frequencies corresponding to the orbits $\beta \pm \alpha$ in Refs. [@Hu2; @delft] can appear when a noticeable dependence of $\zeta$ on $H$ occurs [@nakano]. As to the so-called magnetic interaction [@Sh] which can also generate the combination frequencies and change the phase of the oscillations, this interaction seems small in these semimetals, see the Supplemental Material to Ref. [@delft]. Finally, consider the case when the chemical potential is close to the energy $\varepsilon_{\rm min}$ or $\varepsilon_{\rm max}$. For definiteness, we imply that this energy is $\varepsilon_{\rm min}$, i.e., $|\zeta-\varepsilon_{\rm min}| \ll \Delta$. It is this case that is realized in BiTeI and BiTeCl. In this situation one has $$H_1\sim \frac{(\zeta-\varepsilon_{\rm min})^2 c}{e\hbar \alpha},$$ the oscillations at $H_T< H <H_1$ are always three-dimensional, and the $H$-dependence of the chemical potential is inessential except for the last oscillations at $H\sim H_1$. Hence, one may expect to find $\gamma=0$ for the electron orbits surrounding the nodal line. The experimental investigations of the Shubnikov - de Haas oscillations in BiTeI [@mura13; @vangen; @Ye; @park15] and BiTeCl [@xiang-prb15] did reveal that $\gamma=0$ for the extremal orbits lying on the Fermi surfaces $\varepsilon_c^-({\bf p})=\zeta$ and $\varepsilon_c^+({\bf p})=\zeta$ defined by Eq. (\[55\]). ### The ultra-quantum regime {#the-ultra-quantum-regime} In the ultra-quantum regime when $H>H_1$, the de Haas - van Alphen oscillations disappear. If the chemical potential is not close to the critical energies $\varepsilon_{\rm min}$ and $\varepsilon_{\rm max}$, the differences $ |\zeta-\varepsilon_{min}|\sim |\zeta-\varepsilon_{max}|$ are of the order of $\Delta$ or even essentially exceed $\Delta$ for the doped semimetals. In this situation, at $H\gg H_1$ when $|\zeta-\varepsilon_{min}|$, $|\zeta-\varepsilon_{max}|\ll \Delta\varepsilon_H$, the argument $u$ of the function $K(u)$ in Eq. (\[42\]) is small practically for all points of the band-contact line, and hence $K(u)= (3/2)\zeta(-1/2,1)+\sqrt{u}/2$. Then formula (\[42\]) gives $M_i=c_1H^{1/2}+c_2$, with the coefficients $c_1$, $c_2$ depending on the direction of the magnetic field and on the shape of the band-contact line. In particular, we find the following expression for longitudinal component of the magnetization [@m-sh16]: $$\begin{aligned} \label{60} M_{\parallel}(H)&\approx&\frac{3\zeta(-1/2,1)e^{3/2}H^{1/2}} {4\pi^2\hbar^{3/2}c^{3/2}}\!\!\int_{0}^{L}\!\!\!\!\!dp_3 |\cos\theta|^{3/2}\sqrt{\alpha(p_3)} \nonumber\\ &+&\frac{e}{4\pi^2\hbar^2 c}\!\!\int_{0}^{L}\!\!\!\!\!dp_3 |[\zeta-\varepsilon_d(p_3)]\cos\theta|. \end{aligned}$$ As an example, the $H$-dependence of $M_z$ in the ultra-quantum regime for rhombohedral graphite is shown in Fig. \[fig10\]. It is seen that the dependence given by Eq. (\[60\]) well describes $M_z(H)$ at constant $\zeta$. However in the ultra-quantum regime the chemical potential tends to $\varepsilon_d^0$, Fig. \[fig9\], and the second term in formula (\[60\]) becomes small. For this reason, $M_z(H)$ in the ultra-quantum regime is well described, in fact, by the first term of this formula when the $H$-dependence of $\zeta$ is taken into account. Note also that similar to the case of the Weyl (Dirac) semimetals, there is an analogy between the formulas in the ultra-quantum regime and the $2+1$ quantum electrodynamics with massless fermions [@niss18]. ![\[fig10\] Dependences of $M_z/H$ on $1/H$ for rhombohedral graphite at $T=0$ and the magnetic field directed along the $z$ axis. The dependences are calculated numerically with Eqs. (\[42\])– (\[44\]); the parameters are the same as in Fig. \[fig9\]. The dashed line corresponds to the constant chemical potential $\zeta-\varepsilon_d^0=70$ meV, the solid line shows $M_z/H$ at $\zeta_0-\varepsilon_d^0=70$ meV, taking into account the $H$-dependence of $\zeta$ presented in the bottom panel of Fig. \[fig9\]. The field $H_1\sim 35$ kOe. The circles and the black dots show $M_z/H$ calculated with Eq. (\[60\]), but the dots corespond to the case when the second term in Eq. (\[60\]) is omitted.](Fig10.pdf) If the chemical potential lies near the critical energy $\varepsilon_{\rm min}$ or $\varepsilon_{\rm max}$, at $H> H_1$ the de Haas - van Alphen oscillations disappear, but the spacing $\Delta \varepsilon_H$ between the Landau subbands is much less than $2\Delta$. In this case one arrives at $M_{\parallel} \propto H^{3/4}$ [@m-sh; @m-sh16]. If $H$ further increases, and $\Delta \varepsilon_H$ exceeds $2\Delta$, the dependence $M_{\parallel}\propto H^{3/4}$ crosses over to $M_{\parallel}\propto H^{1/2}$. The dependence $M_{\parallel}\propto H^{3/4}$ has to occur for BiTeI and BiTeCl in the ultra-quantum regime since $2\Delta$ is sufficiently large for these materials, and $|\zeta-\varepsilon_{\rm min}|\ll 2\Delta$. In particular, formula (\[42\]) in the case of the spectrum (\[55\]) leads to the following expression for longitudinal magnetization [@m-sh16]: $$\begin{aligned} \label{61} M_{\parallel}(H)\!=\!-\frac{0.158e^{7/4}(2v_R)^{3/4}\sqrt{2m_z}} {2\pi^2\hbar^{5/4}c^{7/4}}\cdot H^{3/4}(\cos\theta)^{7/4}, \end{aligned}$$ where the additional factor $1/2$ has been introduced analogously to Eq. (\[56\]), the effective mass $m_z$ is determined by the expansion $\varepsilon_d(p_z)\approx \varepsilon_{\rm min}+p_z^2/2m_z$, and $\theta$ is the angle between the magnetic field and the $z$ axis. As in the case of the weak magnetic fields, the magnetization in the region of strong magnetic fields has the component ${\bf M}_{\perp}$ that is perpendicular to ${\bf H}$ [@m-sh16]. Conclusions {#conc} =========== In this review article we show that by now the theory of the magnetic susceptibility for the Weyl, Dirac, and nodal-line semimetals has already been developed adequately, and we present the appropriate results for the susceptibility in the weak and strong magnetic fields, including the region of the de Haas - van Alphen oscillations and the ultra-quantum regime. The theory takes into account the tilt of the Dirac and Weyl spectra and the dispersion of the degeneracy energy along the band-contact line in the nodal-line semimetals. The following characteristic features of the magnetic susceptibility are analyzed in the article: The strong specific dependences of the susceptibility on the chemical potential and temperature for the weak magnetic fields, the phase shift of the de Haas - van Alphen oscillations, and the specific magnetic-field dependences of the magnetization in the ultra-quantum regime. These features can serve as hallmarks of the electron spectra inhering in the topological semimetals. The presented results are illustrated, discussing the following Dirac, Weyl, and nodal-line semimetals: Na$_3$Bi, Cd$_3$As$_2$, TaAs family, Ca$_3$P$_2$, ZrSiS, rhombohedral graphite, and also the bulk Rashba semiconductors BiTeI and BiTeCl in which a band-contact line exists. As to experimental investigations, there is a large number of experimental works that explore one of these hallmarks, viz., the phase shift of the oscillating part of the magnetization (or of the conductivity) by a half of the period. This offset is generally considered as evidence of a Weyl (Dirac) point or a nodal-line in a material under study. Interestingly, the phase shifts different from the predicted one were found in a number of these experiments. Possible explanations of such shifts are discussed in the article, too. As to other characteristic features of the magnetic susceptibility, there are only several experimental works that deal with non-oscillating part of the magnetization of the Weyl semimetals. In this context, extended experimental studies of the magnetization could provide additional useful information on the topological semimetals. N.P. Armitage, E.J. Mele, A. Vishwanath, Rev. Mod. Phys. [**90**]{}, 015001 (2018). A. Bernevig, H. Weng, Z. Fang, X. Dai, J. Phys. Soc. Jpn. [**87**]{}, 041001 (2018) H. Gao, J.W.F. Venderbos, Y. Kim, A.M. Rappe, Annual Review of Materials Research [**49**]{}, 153 (2019). S. Wang, B.-C. Lin, A.-Q. Wang, D.-P. Yu, Z.-M. Liao, Advances in Physics: X [**2**]{}, 518 (2017). H. Weng, X. Dai, Z. Fang, J. Phys.: Condens. Matter [**28**]{}, 303001 (2016). C. Fang, H. Weng, X. Dai, Z. Fang, Chin. Phys. B [**25**]{}, 117106 (2016). C.-K. Chiu, J.C.Y. Teo, A.P. Schnyder, S. Ryu, Rev. Mod. Phys. [**88**]{}, 035005 (2016). C. Herring, Phys. Rev. [**52**]{}, 365 (1937). G.P. Mikitik, Yu.V. Sharlai, Phys. Rev. B [**90**]{}, 155122 (2014) Y. Kim, B.J. Wieder, C. L. Kane and A.M. Rappe, Phys. Rev. Lett. [**115**]{}, 036806 (2015). C. Fang, Y. Chen, H.-Y. Kee, and L. Fu, Phys. Rev. B [**92**]{}, 081201(R) (2015). G.P. Mikitik, Yu.V. Sharlai, Phys. Rev. B [**73**]{}, 235112 (2006). G.P. Mikitik, Yu.V. Sharlai, Fiz. Nizk. Temp. [**41**]{}, 1279 (2015) \[Low Temp. Phys. [**41**]{}, 996 (2015)\]. R. Li, H. Ma, X. Cheng, S. Wang, D. Li, Z. Zhang, Y. Li, X.-Q. Chen, Phys. Rev. Lett. [**117**]{}, 096401 (2016). F. Szmulowicz, Solid State Comm. [**148**]{}, 410 (2008). G.P. Mikitik, Yu.V. Sharlai, Phys. Rev. Lett., 106403 (2004). Z. Wang, H. Weng, Q. Wu, X. Dai, Z. Fang, Phys. Rev. B [**88**]{}, 125427 (2013). M. Neupane, S.-Y. Xu, R. Sankar, N. Alidoust, G. Bian, C. Liu, I. Belopolski, T.-R. Chang, H.-T. Jeng, H. Lin, A. Bansil, F. Chou, M.Z. Hasan, Nat. Commun. [**5**]{}, 3786 (2014). S. Borisenko, Q. Gibson, D. Evtushinsky, V. Zabolotnyy, B. Büchner, R.J. Cava, Phys. Rev. Lett. [**113**]{}, 027603 (2014). S. Jeon, B.B. Zhou, A. Gyenis, B.E. Feldman,I. Kimchi, A.C. Potter, Q. Gibson, R.J. Cava, A. Vishwanath, A. Yazdani, Nature Materials [**13**]{}, 851 (2014). T. Liang, Q. Gibson, M.N. Ali, M. Liu, R.J. Cava, N.P. Ong, Nature Materials [**14**]{}, 280 (2015). M.N. Ali, Q. Gibson, S. Jeon, B.B. Zhou, A. Yazdani, R.J. Cava, Inorg. Chem. [**53**]{}, 4062 (2014). Z.K. Liu, J. Jiang, B. Zhou, Z.J. Wang, H.M. Weng, D. Prabhakaran, S-K. Mo, H. Peng, P. Dudin, T. Kim, M. Hoesch, Z. Fang, X. Dai, Z.X. Shen, D.L. Feng, Z. Hussain, Y.L. Chen, Nature Materials [**13**]{}, 677 (2014). I. Crassee, R. Sankar, W.-L. Lee, A. Akrap, M. Orlita, Phys. Rev. Materials [**2**]{}, 120302 (2018). Z. Wang, Y. Sun, X-Q. Chen, C. Franchini, G. Xu, H. Weng, X. Dai, Z. Fang, Phys. Rev. B [**85**]{}, 195320 (2012). Z.K. Liu, B. Zhou, Y. Zhang, Z.J. Wang, H.M. Weng, D. Prabhakaran, S.-K. Mo, Z.X. Shen, Z. Fang, X. Dai, Z. Hussain, Y.L. Chen, Science [**343**]{}, 864 (2014). Q.D. Gibson, L.M. Schoop, L. Muechler, L.S. Xie, M. Hirschberger, N.P. Ong, R. Car, R.J. Cava, Phys. Rev. B [**91**]{}, 205128 (2015). H. Weng, C. Fang, Z. Fang, B.A. Bernevig, X. Dai, Phys. Rev. X [**5**]{}, 011029 (2015). S-M. Huang, S.-Y. Xu, I. Belopolski, C.-C. Lee, G. Chang, B. Wang, N. Alidoust, G. Bian, M. Neupane, C. Zhang, S. Jia, A. Bansil, H. Lin, M.Z. Hasan, Nat. Commun. [**6**]{}, 7373 (2015). S.-Y. Xu, I. Belopolski, N. Alidoust, M. Neupane, G. Bian, C. Zhang, R. Sankar, G. Chang, Z. Yuan, C.-C. Lee, S.-M. Huang, H. Zheng, J. Ma, D.S. Sanchez, B. Wang, A. Bansil, F. Chou, P.P. Shibayev, H. Lin, S. Jia, M.Z. Hasan, Science [**349**]{}, 613 (2015). B.Q. Lv, H.M. Weng, B.B. Fu, X.P. Wang, H. Miao, J. Ma, P. Richard, X.C. Huang, L.X. Zhao, G.F. Chen, Z. Fang, X. Dai, T. Qian, H. Ding, Phys. Rev. X [**5**]{}, 031013 (2015). A. Soluyanov, D. Gresch, Z. Wang, Q. Wu, M. Troyer, X. Dai, and B.A. Bernevig, Nature [**527**]{}, 495 (2015). C. Wang et al., Phys. Rev. B [**94**]{}, 241119 (2016) J. Ruan, S.-K. Jian, D. Zhang, H. Yao, H. Zhang, S.-C. Zhang, D. Xing, Phys. Rev. Lett. [**116**]{}, 226801 (2016). Z. Wang, M.G. Vergniory, S. Kushwaha, M. Hirschberger, E.V. Chulkov, A. Ernst, N.P. Ong, R.J. Cava, A. Bernevig, Phys. Rev. Lett. [**117**]{}, 236401 (2016). T.T. Heikkilä and G.E. Volovik, JETP Lett. [**93**]{}, 59 (2011). D. Pierucci, H. Sediri, M. Hajlaoui, J.-C. Girard, T. Brumme, M. Calandra, E. Velez-Fort, G. Patriarche, M.G. Silly, G. Ferro, V. Soulière, M. Marangolo, F. Sirotti, F. Mauri, and A. Ouerghi, ACS Nano [**9**]{}, 5432 (2015). H. Weng, Y. Liang, Q. Xu, R. Yu, Z. Fang, X. Dai, Y. Kawazoe, Phys. Rev. B [**92**]{}, 045108 (2015). K. Mullen, B. Uchoa, D.T. Glatzhofer, Phys. Rev. Lett. [**115**]{}, 026403 (2015). L. S. Xie, L. M. Schoop, E. M. Seibel, Q. D. Gibson, W. Xie, and R. J. Cava, APL Mater. [**3**]{}, 083602 (2015). R. Yu, H. Weng, Z. Fang, X. Dai, X. Hu, Phys. Rev. Lett. [**115**]{}, 036807 (2015). A. Yamakage, Y. Yamakawa, Y. Tanaka, Y. Okamoto, J. Phys. Soc. Jpn. [**85**]{}, 013708 (2016). M. Phillips, V. Aji, Phys. Rev. B [**90**]{}, 115111 (2014). L.M. Schoop, M.N. Ali, C. Stra[ß]{}er, V. Duppel, S.S.P. Parkin, B.V. Lotsch, C.R. Ast, Nat. Commun. [**7**]{}, 11696 (2016). M. Neupane, I. Belopolski, M.M. Hosen, D.S. Sanchez, R. Sankar, M. Szlawska, S.-Y. Xu, K. Dimitri, N. Dhakal, P. Maldonado, P.M. Oppeneer, D. Kaczorowski, F. Chou, M.Z. Hasan, and T. Durakiewicz, Phys. Rev. B [**93**]{}, 201104(R) (2016). A. Topp, J.M. Lippmann, A. Varykhalov, V. Duppel, B.V. Lotsch, C.R. Ast, L.M. Schoop, New J. Phys. [**18**]{}, 125014 (2016). H. Huang, J. Liu, D. Vanderbilt, W. Duan, Phys. Rev. B [**93**]{}, 201114(R) (2016). G. Bian, T-R. Chang, R. Sankar, S.-Y. Xu, H. Zheng, T. Neupert, C.-K. Chiu, S.-M. Huang, G. Chang, I. Belopolski, D.S. Sanchez, M. Neupane, N. Alidoust, C. Liu, B. Wang, C.-C. Lee, H.-T. Jeng, C. Zhang, Z. Yuan, S. Jia, A. Bansil, F. Chou, H. Lin, M.Z. Hasan, Nat. Commun. [**7**]{}, 10556 (2016). Y. Chen, Y.-M. Lu, H.-Y. Kee, Nat. Commun. [**6**]{}, 6593 (2015). T. Zhang, Y. Jiang, Z. Song, H. Huang, Y. He, Z. Fang, H. Weng, C. Fang, Nature [**566**]{}, 475 (2019). X. Wan, A.M. Turner, A. Vishwanath, S.Y. Savrasov, Phys. Rev. B [**83**]{}, 205101 (2011). A.A. Burkov, M.D. Hook, L. Balents, Phys. Rev. B [**84**]{}, 235126 (2011). L.P. He, X.C. Hong, J.K. Dong, J. Pan, Z. Zhang, J. Zhang, S.Y. Li, Phys. Rev. Lett. [**113**]{}, 246402 (2014). C. Shekhar, A.K. Nayak, Y. Sun, M. Schmidt, M. Nicklas, I. Leermakers, U. Zeitler, Yu. Skourski, J. Wosnitza, Z. Liu, Y. Chen, W. Schneller, H. Borrmann, Yu. Grin, C. Felser, B. Yan, Nature Physics [**11**]{}, 645 (2015). M.N. Ali, J. Xiong, S. Flynn, J. Tao, Q.D. Gibson, L.M. Schoop,T. Liang, N. Haldolaarochchige, M. Hirschberger, N.P. Ong, R.J. Cava, Nature [**514**]{}, 205 (2014). Y.-Y. Lv, B.-B. Zhang, X. Li, S.-H. Yao, Y.B. Chen, J. Zhou, S.-T. Zhang, M.-H. Lu, Y.-F. Chen, Appl. Phys. Lett. [**108**]{}, 244101 (2016). S.A. Parameswaran, T. Grover, D.A. Abanin, D.A. Pesin, A. Wishwanath, Phys. Rev. X [**4**]{}, 031035 (2014). C. Zhang, E. Zhang, W. Wang, Y. Liu, Z.-G. Chen, S. Lu, S. Liang, J. Cao, X. Yuan, L. Tang, Q. Li, C. Zhou, T. Gu, Y. Wu, J. Zou, F. Xiu, Nat. Commum. [**8**]{} 13741 (2017). H. Nielsen, M. Ninomiya, Phys. Lett. [**130B**]{}, 389 (1983) D.T. Son, B.Z. Spivak, Phys. Rev. B [**88**]{}, 104412 (2013). A.A. Burkov, Phys. Rev. Lett [**113**]{}, 187202 (2014). A.C. Potter, I. Kimchi, A. Wishwanath, Nature Comm. [**5**]{}, 5161 (2014). P.J.W. Moll, N.L. Nair, T. Helm, A.C. Potter, I. Kimchi, A. Wishwanath, J.G. Analytis, Nature [**536**]{}, 266 (2016). I.M. Lifshitz, Zh. Eksp. Teor. Fiz. [**38**]{}, 1569 (1960) \[Sov. Phys. JETP [**11**]{}, 1130 (1960)\]. G.P. Mikitik, I.V. Svechkarev, Fiz. Nizk. Temp. [**15**]{}, 295 (1989) \[Sov. J. Low Temp. Phys. [**15**]{}, 165 (1989)\]. D. Shoenberg, [*Magnetic Oscillations in Metals*]{} (Cambridge University Press, Cambridge, England, 1984). M.V. Berry, Proc. R. Soc. London Ser. A [**392**]{}, 45 (1984). G.P. Mikitik, Yu.V. Sharlai, Phys. Rev. Lett., 2147 (1999). J. Nissinen, G.E. Volovik, JETP Letters [**105**]{}, 447 (2017). J. Nissinen, G.E. Volovik, Phys. Rev. D [**97**]{}, 025018 (2018). S. Ghosh, C. Timm, Phys. Rev. B [**99**]{}, 075104 (2019). Y. Huh, E.-G. Moon, Y.B. Kim, Phys. Rev. B [**93**]{}, 035138 (2016). J. Liu, L. Balents, Phys. Rev. B [**95**]{}, 075426 (2017). B. Roy, Phys. Rev. B [**96**]{}, 041113(R) (2017). B.-J. Yang, N. Nagaosa, Nat. Commun. [**5**]{}, 4898 (2014). Z. Gao, M. Hua, H. Zhang, X. Zhang, Phys. Rev. B [**93**]{}, 205109 (2016). S.M. Young, S. Zaheer, J.C.Y. Teo, C.L. Kane, E.J. Mele and A.M. Rappe, Phys. Rev. Lett. [**108**]{}, 140405 (2012). G.E. Volovik, JETP Letters [**104**]{}, 645 (2016). G.E. Volovik, K. Zhang, J. Low Temp. Phys. [**189**]{}, 276 (2017). G.P. Mikitik, Yu.V. Sharlai, Fiz. Nizk. Temp. [**22**]{}, 762 (1996) \[Low Temp. Phys. [**22**]{}, 585 (1996)\]. Z.-M. Yu, Y. Yao, S.A. Yang, Phys. Rev. Lett. [**117**]{}, 077202 (2016) M. Udagawa, E.J. Bergholtz, Phys. Rev. Lett. [**117**]{}, 086401 (2016) S. Tchoumakov, M. Civelli, M.O. Goerbig, Phys. Rev. Lett. [**117**]{}, 086402 (2016) G.P. Mikitik, Yu.V. Sharlai, Zh. Eksp. Teor. Fiz. [**114**]{}, 1375 (1998) \[JETP [**87**]{}, 747 (1998)\]. G.P. Mikitik, Yu.V. Sharlai, Phys. Rev. B [**65**]{}, 184426 (2002); L. M. Roth, Phys. Rev. [**145**]{}, 434 (1966). G.P. Mikitik, Yu.V. Sharlai, Phys. Rev. B [**67**]{}, 115114 (2003); D. Xiao, M.-C. Chang, Q. Niu, Rev. Mod. Phys. [**82**]{}, 1959 (2010). J.N. Fuchs, F. Piechon, M.O. Goerbig, G. Montambaux, Eur. Phys. J. B [**77**]{}, 351 (2010). G.P. Mikitik, Yu.V. Sharlai, Phys. Rev. B [**85**]{}, 033301 (2012); A. Alexandradinata, C. Wang, W. Duan. L. Glazman, Phys. Rev. X [**8**]{}, 011027 (2018). M. Koshino and T. Ando, Phys. Rev. B [**81**]{}, 195431 (2010). M. Koshino and I.F. Hizbullah, Phys. Rev. B [**93**]{}, 045201 (2016) A. Thakur, K. Sadhukhan, A. Agarwal, Phys. Phys. B [**97**]{}, 035403 (2018). J. Zhou, H.-R. Chang, Phys. Phys. B [**97**]{}, 075202 (2018). G.P. Mikitik, Yu.V. Sharlai, Phys. Rev. B [**94**]{}, 195123 (2016); Y. Liu, Z. Li, L. Guo, X. Chen, Y. Yuan, F. Liu, S. Prunchal, M. Helm, S. Zhou, J. of Magnetism and Magnetic Materials [**408**]{}, 73 (2016). F. Arnold, M. Naumann, S.-C. Wu, Y. Sun, M. Schmidt, H. Borrmann, C. Felser, B. Yan, E. Hassinger, Phys. Rev. Lett. [**117**]{}, 146401 (2016). F.A. Buot, J.W. McClure, Phys. Rev. B [**6**]{}, 4525 (1972). N.B. Brandt, M.V. Semenon, L.A. Falkovsky, J. Low Temp. Phys. [**27**]{}, 75 (1977). G.P. Mikitik, Yu.V. Sharlai, Fiz. Nizk. Temp. [**26**]{}, 54 (2000) \[Low Temp. Phys. [**30**]{}, 39 (2000)\]. Y. Fuseya, M. Ogata, H. Fukuyama, J. Phys. Soc. Jpn. [**84**]{}, 012001 (2015). E. Röber, K. Hackstein, H. Coufal, S. Sotier, Phys. Stat. Sol. (b) [**93**]{}, K99 (1979). Y. Ominato, K. Nomura, Phys. Rev. B [**97**]{}, 245207 (2018). Y. Ominato, S. Tatsumi, K. Nomura, Phys. Rev. B [**99**]{}, 085205 (2019). B. Roy and J.D. Sau, Phys. Rev. B [**92**]{}, 125141 (2015) P.J.W. Moll, A.C. Potter, N.L. Nair, B.J. Ramshaw, K.A. Modic, S. Riggs, B. Zeng, N.J. Ghimire, E.D. Bauer, R. Kealhofer, F. Ronning, J.G. Analytis, Nat. Commun. [**7**]{}, 12492 (2016). A.M. Wright, R.H. McKenzie, Phys. Rev. B [**87**]{}, 085411 (2013). P.E.C. Ashby, J.P. Carbotte, Eur. Phys. J. B [**87**]{}, 92 (2014). C.M. Wang, H.-Z. Lu, S.-Q. Shen, Phys. Rev. Lett.  [**117**]{}, 077201 (2016). G.P. Mikitik, Yu.V. Sharlai, Fiz. Nizk. Temp. [**33**]{}, 586 (2007) \[Low Temp. Phys. [**33**]{}, 439 (2007)\]. E. M. Lifshitz and L. P. Pitaevskii, [*Physical Kinetics*]{} (Pergamon Press, Oxford-NY-Toronto-Sydney-Paris-Frankfurt, 1981). Y. Ando, J. Phys. Soc. Jpn., [**82**]{}, 102001 (2013). X. Huang, L. Zhao, Y. Long, P. Wang, D. Chen, Z. Yang, H. Liang, M. Xue, H. Weng, Z. Fang, X. Dai, G. Chen, Phys. Rev. X [**5**]{}, 031023 (2015). Y. Luo, N.J. Ghimire, M. Wartenbe, H. Choi, M. Neupane, R.D. McDonald, E.D. Bauer, J. Zhu, J.D. Thompson, F. Ronning, Phys. Rev. B [**92**]{}, 205134 (2015). J. Hu, J.Y. Liu, D. Graf, S.M.A. Radmanesh, D.J. Adams, A. Chuang, Y. Wang, I. Chiorescu, J. Wei, L. Spinu, Z.Q. Mao, Sci. Rep. [**6**]{}, 18674 (2016). J. Du, H. Wang, Q. Chen, Q. Mao, R. Khan, B. Xu, Y. Zhou, Y. Zhang, J. Yang, B. Chen, C. Feng, M. Fang, Sci. China-Phys. Mech. Astron. [**59**]{}, 657406 (2016). P. Sergelius et al., Sci. Rep. [**6**]{}, 33859 (2016). Z. Wang, Y. Zheng, Z. Shen, Y. Lu, H. Fang, F. Sheng, Y. Zhou, X. Yang, Y. Li, C. Feng, Z.-A. Xu, Phys. Rev. B [**93**]{}, 121112 (2016). A. Pariari, P. Dutta, P. Mandal, Phys. Rev. B [**91**]{}, 155139 (2015). Y. Zhao, H. Liu, C. Zhang, H. Wang, J. Wang, Z. Lin, Y. Xing, H. Lu, J. Liu, Y. Wang, S.M. Brombosz, Z. Xiao, S. Jia, X.C. Xie, J. Wang, Phys. Rev. X [**5**]{}, 031037 (2015). A. Narayanan, M.D. Watson, S.F. Blake, N. Bruyant, L. Drigo, Y.L. Chen, D. Prabhakaran, B. Yan, C. Felser, T. Kong, P.C. Canfield, A.I. Coldea, Phys. Rev. lett. [**114**]{}, 117201 (2015). Z.J. Xiang, D. Zhao, Z. Jin, C. Shang, L.K. Ma, G.J. Ye, B. Lei, T. Wu, Z.C. Xia, X.H. Chen, Phys. Rev. lett. [**115**]{}, 226401 (2015). W. Desrat, C. Consejo, F. Teppe, S. Contreras, M. Marcinkiewicz, W. Knap, A. Nateprov, E. Arushanov, J. of Phys.:Conf. Ser. [**647**]{}, 012064 (2015). J. Cao, S. Liang, C. Zhang, Y. Liu, J. Huang, Z. Jin, Z.-G. Chen, Z. Wang, Q. Wang, J. Zhao, S. Li, X. Dai, J. Zou, Z. Xia, L. Li, F. Xiu, Nat. Commun. [**6**]{}, 7779 (2015). L.-P. He, S.-Y. Li, Chin. Phys. B [**25**]{} 117105 (2016). M.Ya. Azbel’, JETP [**12**]{}, 891 (1961). A. Alexandradinata, L. Glazman, Phys. Rev. Lett. [**119**]{}, 256601 (2017). A. Alexandradinata, L. Glazman, Phys. Rev. B [**97**]{}, 144422 (2018). G. P. Mikitik and Yu. V. Sharlai, Fiz. Nizk. Temp. [**30**]{}, 1293 (2004) \[Low Temp. Phys. [**30**]{}, 973 (2004)\]. C.-L. Zhang, C.M. Wang, Z. Yuan, X. Xu, G. Wang, C.-C. Lee, L. Pi, C. Xi, H. Lin, N. Harrison, H.-Z. Lu, J. Zhang, S. Jia, Nat. Commun. [**10**]{}, 1028 (2019). J.W. McClure, Carbon [**7**]{}, 425 (1969). N.B. Kopnin and T.T. Heikkilä, Surface Superconductivity in Rhombohedral Graphite, Ch. 9 in [*Carbon-based Superconductors: Towards High-Tc Superconductivity*]{}, Edited by Junji Haruyama (Pan Stanford, 2014), see also arXiv: 1210.7075. G. P. Mikitik and Yu. V. Sharlai, J. Low Temp. Phys. [**185**]{}, 686 (2016). G.P. Mikitik, Yu.V. Sharlai, Phys. Rev. B [**97**]{}, 085122 (2018). H.K. Pal, F. Piéchon, J.-N. Fuchs, M. Goerbig, G. Montambaux, Phys. Rev. B [**94**]{}, 125140 (2016). C. Li, C.M. Wang, B. Wan, X. Wan, H.-Z. Lu, X.C. Xie, Phys. Rev. Lett. [**120**]{}, 146602 (2018). H. Yang, R. Moessner, L.-K. Lim, Phys. Rev. B [**97**]{}, 165118 (2018). L. Oroszlany, B. Dora, J. Cserti, A. Cortijo, Phys. Rev. B [**97**]{}, 205107 (2018). G. P. Mikitik and Yu. V. Sharlai, Fiz. Nizk. Temp. [**44**]{}, 727 (2018) \[Low Temp. Phys. [**44**]{}, 567 (2018)\]. M.S. Bahramy, R. Arita, N. Nagaosa, Phys. Rev. B [**84**]{}, 041202(R) (2011). H. Murakawa, M.S. Bahramy, M. Tokunaga, Y. Kohama, C. Bell, Y. Kaneko, N. Nagaosa, H.Y. Hwang, Y. Tokura, Science [**342**]{}, 1490 (2013). D. VanGennep, S. Maiti, D. Graf, S.W. Tozer, C. Martin, H. Berger, D.L. Maslov, J.J. Hamlin, J. Phys. Condens. Matter. [**26**]{}, 342202 (2014). L. Ye, J.G. Checkelsky, F. Kagawa, Y. Tokura, Phys. Rev. B [**91**]{}, 201104(R) (2015). J. Park, K.-H. Jin, Y.J. Jo, E.S. Choi, W. Kang, E. Kampert, J.-S. Rhyee, S.-H. Jhi, J.S. Kim, Sci. Rep. [**5**]{}, 15973 (2015). F. Chen, D. Zhao, A.J. Xiang, C. Shang, X.G. Luo, B.Y. Pan, S.Y. Li, T. Wu, X.H. Chen, Phys. Rev. B [**90**]{}, 201202(R) (2014). C. Martin, A.V. Suslov, S. Buvaev, A.F. Hebard, P. Bugnon, H. Berger, A. Magrez, D.B. Tanner, Phys. Rev. B [**90**]{}, 201204(R) (2014). F.-X. Xiang, X.-L. Wang, M. Veldhorst, S.-X. Dou, M.S. Fuhrer, Phys. Rev. B [**92**]{}, 035123 (2015). G.A.H. Schober, H. Murakawa, M.S. Bahramy, R. Arita, Y. Kaneko, Y. Tokura, N. Nagaosa, Phys. Rev. Lett. [**108**]{}, 247208 (2012). I.I. Boiko, E.I. Rashba, Fiz. Tverd. Tela [**2**]{}, 1874 (1960) \[Sov. Phys. Solid State [**2**]{}, 1692 (1960)\]. I.A. Luk’yanchuk, Y. Kopelevich, Phys. Rev. Lett. [**93**]{}, 166402 (2004). J. Hu, Z. Tang, J. Liu, X. Liu, Y. Zhu, D. Graf., K. Myhro, S. Tran, C.N. Lau, J. Wei, Z. Mao, Phys. Rev. Lett., 016602 (2016). N. Kumar, K. Manna, Y. Qi, S.-C. Wu, L. Wang, B. Yan, C. Felser, C. Shekhar, Phys. Rev. B [**95**]{}, 121109(R) (2017). J. Hu, Y.L. Zhu, D. Graf, Z.J. Tang, J.Y. Liu, Z.Q. Mao, Phys. Rev. B [**95**]{}, 205134 (2017). J. Hu, Z. Tang, J. Liu, Y. Zhu, J. Wei, Z. Mao, Phys. Rev. B [**96**]{}, 045127 (2017). J. Hu, J. Zhu, X. Gui, D. Graf, Z. Tang, W. Xie, Z. Mao, Phys. Rev. B [**97**]{}, 155101 (2018). M.N. Ali, L.M. Schoop, C. Garg, J.M. Lippmann, E. Lara, B. Lotsch, S.S.P. Parkin, Science Advances [**2**]{}, e1601742 (2016). X. Wang, X. Pan, M. Gao, J. Yu, J. Jiang, J. Zhang, H. Zuo, M. Zhang, Z. Wei, W. Niu, Z. Xia, X. Wan, Y. Chen, F. Song, Y. Xu, B. Wang, G. Wang, R. Zhang, Adv. Electron. Mater. [**2**]{}, 1600228 (2016). R. Singha, A.K. Pariari, B. Satpati, P. Mandal, PNAS [**114**]{}, 2468-2473 (2017). S. Pezzini, M.R. van Delft, L.M. Schoop, B.V. Lotsch, A. Carrington, M.I. Katsnelson, N.E. Hussey, S. Wiedmann, Nature Physics [**14**]{}, 178 (2018). M.R. van Delft, S. Pezzini, T. Khouri, C.S.A. Muller, M. Breitkreiz, L.M. Schoop, A. Carrington, N.E. Hussey, S. Wiedmann, Phys. Rev. Lett. [**121**]{}, 256602 (2018). L. Guo, T.-W. Chen, C. Chen, L. Chen, Y. Zhang, G.-Y. Gao, J. Jang, X.-G. Li, W. Zhao, S. Dong, R.-K. Zheng, ACS Appl. Electron. Mater. [**1**]{}, 869 (2019). M. Matusiak, J.R. Cooper, D. Kaczorowski, Nature Commun. [**8**]{}, 15219 (2017). M. Nakano, J. Phys. Soc. Jpn. [**68**]{}, 1801 (1999).
High
[ 0.704, 27.5, 11.5625 ]
Empathy for others is a trait that must be learned -- and parents are the best people to teach it. Volunteering together is an excellent way to increase your child's social and emotional growth while spending quality time together. When you arrive home after a long workday, your mind is on your family ... plus the stack of bills to pay, the pile of laundry to do and the list of phone calls to return. But dinner? It's tough to imagine how you're going to make this meal happen at all, let alone make it healthy, tasty and maybe even fun. But believe it or not, you can. Here's how: 1. Get the Kids in on the Action "Parents often park their children in front of the TV, then rush around making supper. Why not get the kids to help?" says Miriam Weinstein, author of The Surprising Power of Family Meals: How Eating Together Makes Us Smarter, Stronger, Healthier, and Happier (Steerforth Press). "Making kids part of the effort gets them invested in what you're cooking together, so they're less likely to complain about it later." Younger kids can: • Get out the ingredients • Pour them into pots or bowls (you measure, they pour) • Wash fruits and veggies • Tear lettuce for a salad Older ones can: • Chop fruits and vegetables • Toss and dress the salad • Make pasta or rice • Measure and mix ingredients 2. Get Ready, Get Set … To make fast, enjoyable meals each day that are still healthy, you have to prepare, and sometimes cook, in advance. For starters, buy extra of things you use often so you always have staples on hand. Choose dishes that don't require you to stand at the stove: stews, roasts, casseroles that can be assembled the night before. While they are cooking or reheating, you can take the time to sift through your mail, check your child's homework, or return phone calls or emails. Things to do the night before: • Make the sauce • Chop the vegetables • Sautee the onions • Marinate the meat • Wash the lettuce (store in a plastic container in the fridge) 3. Double up Rather than making just one meal at a time, try doubling recipes when you cook. Freeze whatever you don't use for a later dinner that can be reheated easily. 4. Commit to the Ritual Studies show that eating together as a family reduces the risk of obesity and encourages children to try new foods. It also helps kids learn good manners. But the biggest benefit to having family dinner is that it brings everyone together -- for perhaps the only time during the day. It provides a regular opportunity to connect: to ask your kids about their days, joke around or make family plans. "Eating together is a gift you give yourself and your family," says Weinstein. "It doesn't matter if the food is perfect -- just that you enjoy it together. Then mealtime becomes a chance to feel good about your family instead of just one more chore." Copyright (c) 2010 Studio One Networks. All rights reserved. Elizabeth Hurchallais a freelance writer in Venice, Calif. She has written for Cosmopolitan, InStyle and many other publications.
High
[ 0.6666666666666661, 32.25, 16.125 ]
Q: In an MVC web.config file what does the setting compilation debug='true' do? For performance reasons an MVC app should have compilation debug='false' set in its web.config. What benefits does having it set to 'true' during development give? I know that it 'inserts debugging symbols into the compiled page' but what is that for? A: Check out this quite interesting link (very old, but still pertaining), which tries to explain in more detail the workings of either compilation mode, or, at least contrast between them well. In an attempt to directly answer your question regarding what debugging symbols are used for - these give extra information about the compiled code and allow for interrogation of the executing code-base when a debugger is attached; allowing you to step through the source, for instance, as the binary can now be mapped back to it's location in the source file, variable names etc.
High
[ 0.747967479674796, 34.5, 11.625 ]
snydeq writes: "The end of the world may or may not be nigh, but in the tech industry, many of these 12 possibilities could easily become reality for IT. From legislation against municipal fiber, to Oracle starting charging for the JDK, to the bad guys win the war on general-purpose computing, a number of scenarios could play out in the coming years to seriously damage the technology industry and all the people who depend on it."Link to Original Source
Mid
[ 0.606315789473684, 36, 23.375 ]
HUBZone HUBZone is a United States Small Business Administration (SBA) program for small companies that operate and employ people in Historically Under-utilized Business Zones (HUBZones). The HUBZone program was created in response to the HUBZone Empowerment Act created by the US Congress in 1998. Based on the Act, small businesses will be designated as HUBZone certified if they have the following criteria: The firm must be a small business based on the North American Industry Classification System (NAICS) for size standards. The business must be at least 51% owned and controlled by U.S. citizens, or a Community Development Corporation, an agricultural cooperative, or an Indian tribe (including Alaska Native Corporations). The firm's principal office (the location where the greatest number of employees perform their work, excluding contract sites) must be in a HUBZone. 35% of the firm's total workforce must reside in a HUBZone. On average, about 3,000 entities register for HUBZone certification each year. Definition HUBZones are 'historically under-utilized business zone', located within one or more: Qualified census tracts; Qualified non-metropolitan counties; Lands within the external boundaries of an Indian reservation; Qualified base closure area; or Redesignated area To determine if a location (residence or business) is in a HUBZone, the SBA web site has a feature the make this determination found at The primary goal of the program is to create incentives for the U.S. federal government to do contracting with businesses that operate and create jobs in communities with statistically proven economic needs. Government contracting requirements The agencies of the U.S. Federal Government are required by the HUBZone Empowerment Act to contract with HUBZone certified small businesses for more than 3% of their budget in the form of prime contracts to HUBZone firms. The government has made some progress towards these goals, but by and large remains below them. Because the program represents only 3% of the contracts awarded by federal agencies, the program has received an equivalent level of attention. In 2018, HUBZone companies started to become more proactive in trying to get opportunities 'set-aside' for HUBZone-certified companies. Through organizations such as the HUBZone Chamber of Commerce, companies are starting to collaborate to increase their responses to Sources Sought as posted through FedBizOpps.gov HUBZone creators Numerous legislators created and continue to support the HUBZone program. However, it is widely held that U.S. Senator Kit Bond (R-MO) was the true creator of the program and continues to be the champion. His motivation came from numerous meetings with business owners at events that discussed training. In those events, the feedback was grateful for the training for businesses in lower economic areas, but the training was slated as inadequate unless work was also going to be allocated to those communities. Based on the need for jobs, Senator Bond began the concept of HUBZones. Notable facts The first business to receive a contract under the HUBZone program's simplified acquisition program was Garrett Container based in Accident, Maryland. The US federal government approved $13+ billion dollars for annual distribution to HUBZone firms. Currently, approximately half of the money is actually being distributed. Many qualified businesses still encounter barriers to entry and are intimidated by the process. The program has not generated enough HUBZone contract dollars to have an impact on a national scale. When spread over an eight-year period across 2,450 metropolitan areas and counties with qualified census tracts, qualified counties, and Indian reservations, $6 billion has a limited impact. HUBZone set-asides are the most frequently used tool to award HUBZone contracts. HUBZone sole source and price preferences were least often used by contracting officers. Progress on HUBZone and all small business contracting rates is available on the government's Small Business Dashboard Businesses need to re-certify for the HUBZone program every three years. There is no limit to the length of time a business can continue to re-certify as long as it continues to qualify. References External links Required HUBZone certification map Important Change to HUBZone Definition of "Employee" Occurred May 3, 2010 Small Business Administration Small Business Administration HUBZone Program Congressional Research Service Category:Small Business Administration
Mid
[ 0.5666666666666661, 29.75, 22.75 ]
Iran to Assume Leadership of Bloc That Includes Key U.S. Allies and U.S. Aid Recipients Iranian President Mahmoud Ahmadinejad meets with former President Fidel Castro during a visit to Cuba in January 2012. Iran is assuming the rotating chairmanship of the NonMovement for three years, a position held by Cuba from 2006-2009. (Photo: Iranian presidency) (CNSNews.com) – At a time when the U.S. is leading efforts to isolate Iran, almost two-thirds of the worlds independent nations including key recipients of U.S. aid and nine of Americas major non-NATO allies belong to a intergovernmental organization that is about to let Tehran set its agenda for the next three years. Iranian President Mahmoud Ahmadinejad is preparing to host the 16th summit of the Non-Aligned Movement (NAM), a grouping of developing nations formed during the Cold War as a supposedly neutral bloc aligned neither with the West nor the Soviet Union. The August 26-31 summit kicks off Irans three-year chairmanship of the 120-member organization, taking over from Egypt. As the NAM lacks a permanent structure or secretariat, the government chairing it plays a key role in directing the bloc. (When communist Cuba hosted the 14th summit in 2006 to begin its three-year presidency, the gathering produced documents and declarations laden with veiled criticism of the U.S. numerous references to hegemony, unilateralism and attempts to impose a unipolar world as well as expressions of support for Venezuelan President Hugo Chavez in the face of U.S. aggression and backing for Irans right to nuclear energy.) Iran has already announced that one of its primary ambitions is to launch an international news agency to promote NAMs agenda. That agenda, according to a 1979 document called the Havana Declaration (the product of the last time Cuba held the chair), is to ensure the national independence, sovereignty, territorial integrity and security of non-aligned countries in their struggle against imperialism, colonialism, apartheid , racism and Zionism and all foreign aggression, occupation, domination, interference or hegemony as well as against great power and bloc politics. Irans foreign ministry says more than 30 heads of state have so far accepted invitations to attend the summit while others will send foreign ministers, ambassadors or other senior officials. NAM comprises scores of countries in Africa, Asia, Latin America and even one in Europe, Belarus together accounting for just short of two-thirds of the 193 countries making up the U.N. General Assembly. Members include nine of the ten countries receiving the most U.S. foreign aid in fiscal year 2012 Afghanistan, Pakistan, Iraq, Egypt, Jordan, Kenya, Nigeria, Ethiopia, Tanzania. (The exception is Israel.) NAMs ranks also include nine countries designated major non-NATO allies by U.S. administrations since 1989 Egypt, Jordan, Bahrain, the Philippines, Thailand, Kuwait, Morocco, Pakistan and Afghanistan. Other NAM members, regarded as crucial U.S. partners in their respective parts of the world, include India, Singapore, South Africa and Saudi Arabia. Governments whose relations with the U.S. or hostile or at least cool have dominated the NAM leadership in recent years, including Malaysia (chair from 2003-2006), Cuba (2006-2009) and now Iran (2012-2015). In three years time, Venezuela is set to take the helm. Once again, the so-called Non-Aligned Movement reveals itself to be very much aligned with anti-American rogue regimes, including its upcoming head, Iran, and former heads like the Castro brothers Cuba and Mugabes Zimbabwe, Rep. Ileana Ros-Lehtinen (R-Fla.), chairman of the House Foreign Affairs Committee, commented Tuesday. Apparently, at the NAM, sponsoring violent extremism and pursuing illicit nuclear weapons capabilities is an asset, not a black mark. Iran will use its new leadership position and the upcoming NAM summit in Tehran to advance its anti-American, anti-Israel, anti-freedom agenda, charged Ros-Lehtinen. Those member countries of NAM who do not buy in to this poisonous program should leave NAM, ending their association with this tool for rogue regimes. A handful of NAM members have withdrawn over the years, including Malta and Cyprus, which left the bloc when they joined the European Union in 2004; and Argentina, which pulled out in 1991, arguing that it had no reason to exist after the Soviet Union collapsed. Yugoslavia was a founding member and hosted the first ever NAM summit, in 1961, but after the country disintegrated in the 1990s none of the successor states joined the bloc. The bulk of members remained in the organization despite the end of the Cold War, however, and despite in some cases strong ties with the United States. While NAM is far from cohesive, bloc voting by many of its members is common in the U.N. General Assembly, where by sheer force of numbers it can wield considerable influence. Last October, for instance, NAM circulated in New York a request from the Assad regime for members not to support a European-drafted resolution on human rights abuses in Syria. That appeal from Damascus was not particularly successful, given the strong Arab views on the conflict, but even so, NAM members provided all 11 no votes as well as almost all of the 43 abstentions when the resolution was passed in December. The situation was basically repeated in February, and again last week, when the General Assembly voted on two further Syria resolutions.
Low
[ 0.530938123752495, 33.25, 29.375 ]
Pages Friday, October 12, 2012 IRELAND THRASHED AT HOME BY GERMANY Germany humiliated the Republic of Ireland 6-1 on a disastrous night for the hosts in the World Cup Group C qualifier at the Aviva Stadium. Borussia Dortmund winger Marco Reus scored twice in the first half to set Germany on their way.Ireland were left chasing shadows as the visitors eased to victory with further goals from Mesut Ozil (pen) and Miroslav Klose, as well as a brace by substitute Toni Kroos. Andy Keogh headed in a consolation goal in injury-time. Keogh headed in fellow sub Robbie Brady's corner for a consolation in injury-time.It was always going to be a difficult task for Giovanni Trapattoni's side against a team of Germany's calibre, but they played a significant part in their own downfall.There was no evidence of any disharmony in the German camp in this display.In truth, Ireland never tested them and were guilty of some woeful defending.A combination of retirements and injuries forced Trapattoni into a change of formation, but the new approach had little effect as the Euro 2012 woes linger and the pressure on the manager grows.The one bright spot was the late cameo by Brady, but it will not stop the critics rounding on Trapattoni.Germany were also missing several regulars, but they always had the strength in depth to cope and their mix of speed and skill was far too much for a disorganised Ireland.It had been a bright opening ten minutes by the home side, but they retreated to the edge of their box as Germany got into their stride.With Ozil, Bastian Schweinsteiger and Sami Khedira zipping the ball about with ease, Ireland's wide men, Simon Cox and Aiden McGeady, were forced to come inside to help out the midfield trio of Keith Andrews, Keith Fahey and James McCarthy.This only encouraged Germany's full-backs Marcel Schmelzer and Jerome Boateng to roam forward into the space.John O'Shea was fortunate to get away with not conceding a penalty after a tug on Reus, who had nicked the ball off him on the edge box.Reus was booked for diving by Italian referee Nicola Rizzoli, but he answered the boo boys within minutes by putting Germany ahead.The winger capitalised on slack marking by Ireland and fired in the opener off underside of the bar.Reus doubled the lead before the break when he finished a brilliant counter-attack move that spread across the pitch and back again.It started with Schweinsteiger at the back, went through Ozil and Boateng, before Reus took the ball in his stride and found the far corner.A few forays forward and Shane Long's introduction lifted the home crowd for a brief moment after the break.It was not to last however, as Germany restored order with ruthless efficiency before the hour.Darren O'Dea needlessly dived in on Miroslav Klose to give away a penalty and Ozil nonchalantly stroked the penalty past Westwood.O'Dea was caught out again moments later as Schweinsteiger slipped the ball into space for Klose.Westwood may have narrowed the angle but Klose is one of the most accomplished strikers at this level and he found the target from a narrow angle.Kroos got in on the act with a stunning volley after O'Shea's poor defensive header dropped to him on the edge of the box.The olés that echoed around the ground were coming for the away end for a change as the away fans revelled in their team's dominance.Kroos gave another example of his long-range shooting ability for the sixth of the night when he stepped into space and whipped the ball past Westwood at his near post. Keogh's late, late consolation brought the crowd to its feet but it is a sombre squad that head to the Faroe Islands for Tuesday's crucial qualifier.
Mid
[ 0.5429141716566861, 34, 28.625 ]
Quoting Ralf Baechle <[email protected]>: Ralf wrote: > There is no requirement at all for a system to have physical memory in > KSEG0 - the Octane to my knowledge one example. What every sane system > needs to have in KSEG0 are exception handlers. Of course they could also > reside in a ROM but that's insane so you should expect at least a few kb > of RAM at physical address zero. At this point I wouldn't put anything past SGI, but it's good to know my suspicions about kseg0 are confirmed. > > Due to the Octane's funky address space layout and the current tools > limitations the kernel will have to run in CKSEG2 instead of KSEG0 ... > > Ralf /nod. Onward and upward. Thanks, Erik -- Erik J. Green [email protected]
Mid
[ 0.6307277628032341, 29.25, 17.125 ]
You really haven't shopped around until you've called us. Our staff can offer the best price.1 (800) 774-2134 Write a Review Installing a stair lift in your home does not have to mean putting up with a clunky piece of medical equipment. The sleek and stylish AmeriGlide Horizon Stair Lift is easy to install and can be quickly and easily folded up and out of the way when not in use, allowing plenty of room for anyone to climb your staircase. This model also features our ERGO seat that provides superior comfort and comes in several different colors so that you can choose the option that best compliments your home. Best of all, the AmeriGlide Horizon Stair Lift comes standard with the most cutting edge features in stair lift technology. Just the armrests alone are equipped with a digital diagnostic display that will alert you of any operational problems and an ergonomic joystick control that can be manipulated even if you have limited mobility. Additional safety features include a security key switch that will stop unauthorized users from operating your stair lift, a seat swivel lever that allows you to rotate the seat for safe dismounts, and a safety edge that can detect obstructions as you travel up and down your staircase. Improve your mobility and regain your independence for a low, unbeatable price when you invest in the AmeriGlide Horizon Stair Lift.
Mid
[ 0.64587973273942, 36.25, 19.875 ]
In a trial involving 80 patients with irritable bowel syndrome (IBS), investigators from Harvard Medical School’s Osher Research Center and Beth Israel Deaconess Medical Center in Boston found that the so-called "placebo effect" may be more than just thinking that you’re taking a real drug. Placebo Patients Experience Greater Symptom Relief Ted Kaptchuk, ODM, an associate professor of medicine at Harvard Medical School and director of the Asian Medicine and Healing Program, and colleagues randomly assigned patients to one of two groups: those who were informed that they were to take placebo pills twice a day and those who received no treatment, but had the same quality of interactions with health care providers. In fact, the placebo pills were given out in a bottle labeled “placebo” and described as “placebo pills made of an inert substance, like sugar pills, that have been shown in clinical studies to produce significant improvement in IBS symptoms through mind-body self-healing processes.” After three weeks of treatment, nearly twice as many patients taking a placebo reported improvements in their symptoms as those who received no treatment, 59% vs. 35%. Moreover, patients taking a placebo doubled their rate to improvement, meaning they felt better more quickly, at almost the same rate if they had taken actual medications for their IBS. Midway through the study, side effects were reported by three placebo patients. By the end of the study, five placebo patients reported side effects, such as respiratory infection, pain, runny stools, and rash. Kaptchuk and his team questioned the ethics of prescribing a placebo without a patient’s knowledge and designed their study to determine whether the placebo effect would occur when a patient is informed that they are taking a placebo. Why a placebo might help reduce symptoms isn’t entirely clear. “We told the patients that they didn’t have to even believe in the placebo effect. Just take the pills,” Kaptchuk says in a prepared statement. “Nevertheless, these findings suggest that rather than mere positive thinking, there may be significant benefit to the very performance of medical ritual. I’m excited about studying this further. Placebo may work even if patients know it is a placebo.” The study is published in PLoS ONE and was funded by the National Center for Complementary and Alternative Medicine and Osher Research Center at Harvard Medical School.
High
[ 0.717815344603381, 34.5, 13.5625 ]
<?php return [ /** * Default table attributes when generating the table. */ 'table' => [ 'class' => 'table', 'id' => 'dataTableBuilder', ], ];
Low
[ 0.475409836065573, 36.25, 40 ]
West Wales Islamic Cultural Association & Masjid Anouncemnt Assalam Aleykum wa rahmatullah wa barikatu It is with a heavy heart that West Wales Islamic Centre announces, suspension of all its activities including Friday prayer until further notice. Support Your Masjid Spending in the sake of Allah is one of the most rewarding able deeds. Almighty Allah says: “The parable of those who spend their property in the way of Allah is as the parable of a grain growing seven ears (with) a hundred grains in every ear; and Allah multiplies for whom He pleases; and Allah is Ample-giving, Knowing.” (Al-Baqarah: 261) The Prophet (peace and blessings be upon him) said: “Wealth is never diminished by charitable spending” (At-Tirmidhi). WWICA Islamic Centre & Masjid is in need of your help to continue its activities and projects that serve the whole community; so your money returns to you and you get the reward on top. Donating is easy and we provide you with a different ways to make your payment. Choose that which is more convenient to you. BY TEXT MESSAGE: Direct Debit - Account Details: Jazak Allah Khairan Dear Brothers and Sisters, Asalamu alaykum We humbly solicit your kind donations to help us transform Bethania Chapel into a Muslim cultural centre for our growing community. There is much to do including disposing of church paraphernalia. Please please donate and share! Welcome to West Wales Islamic Cultural Association & Masjid To create a harmonious environment and promote the enhancement of human values, spiritual attainment and faith in the Almighty, through providing the community around Wales with focal point for a range of spiritual, social, cultural, educational and training activities, and this will enable the community to develop greater self-confidence through a sense of belonging in order to affirm its cultural identities and renew its zest of self-reliance. To create unity through religion and to improve and enhance skills, knowledge and capacity of the community to espouse values of diversity, tolerance and moderation and promote interfaith dialogue with other religious group, by reaching out and acting as a resource centre for the local communities, voluntary and statutory agencies and the wider community as a whole.
Mid
[ 0.6243781094527361, 31.375, 18.875 ]
class DropSourceAndDestinationFromStockMovement < ActiveRecord::Migration[4.2] def up change_table :spree_stock_movements do |t| t.remove_references :source, polymorphic: true t.remove_references :destination, polymorphic: true end end def down change_table :spree_stock_movements do |t| t.references :source, polymorphic: true t.references :destination, polymorphic: true end end end
Low
[ 0.47174447174447104, 24, 26.875 ]
Antitussive indole alkaloids from Kopsia hainanensis. Three new indole alkaloids, named kopsihainins A-C (1-3), and two known compounds, kopsinine (4) and methyl demethoxycarbonylchanofruticosinate (5), were isolated from the stems of Kopsia hainanensis. Their structures were determined using extensive spectroscopic methods. The two main constituents 4 and 5 exhibited significant antitussive activity in a citric acid induced guinea pig cough model. The antitussive effect of 4 was demonstrated to interact with the δ-opioid receptor. This is the first report of antitussive effects of aspidofractinine type and chanofruticosinate type alkaloids.
High
[ 0.676844783715012, 33.25, 15.875 ]
`import ContentPreview from 'box-ui-elements/es/elements/content-preview';` ### Screenshot ## <img src="https://user-images.githubusercontent.com/1075325/27419184-596b485c-56d4-11e7-8d42-c65328089c95.png" style="border: 1px solid #e8e8e8;" width="600" /> ### Props | Prop | Type | Default | Description | | -------------------- | ------------------- | ------- | ----------------------------------------------------------------------------------------------------------------------------------------------------------------------------------- | | fileId\* | string | | The id of the file to preview. | | token\* | string | | _See the [developer docs](https://developer.box.com/docs/box-content-preview#section-options)._ | | canDownload | boolean | `true` | Visually hides the download and print buttons in the preview header if this is set to `false`. _This prop has no effect when the file permission `can_download` is set to `false`._ | | collection | Array&lt;string&gt; | `[]` | _See the [developer docs](https://developer.box.com/docs/box-content-preview#section-options)._ | | contentOpenWithProps | Object | `{}` | Props that can be forwarded to the Content Open With UI Element. _See them in the props section of [Content Open With UI Element](#content-open-with-documentation)_ | | contentSidebarProps | Object | `{}` | Props that can be forwarded to the Content Sidebar UI Element. _See them in the props section of [Content Sidebar UI Element](#content-sidebar-documentation)_ | | hasHeader | boolean | `true` | Visually hides the preview header if this is set to `false`. | | language | string | `en-US` | _See the [Internationalization](../README.md#internationalization) section_ | | messages | Map<string, string> | | _See the [Internationalization](../README.md#internationalization) section_ | | onClose | function | | Callback function for when the file preview closes. If absent, the close button will not render in the header. | | onLoad | function | | Callback function for when a file preview loads. | | requestInterceptor | function | | _See the [developer docs](https://developer.box.com/docs/box-content-preview#section-options)._ | | responseInterceptor | function | | _See the [developer docs](https://developer.box.com/docs/box-content-preview#section-options)._ | | sharedLink | string | | _See the [developer docs](https://developer.box.com/docs/box-content-preview#section-options)._ | | sharedLinkPassword | string | | _See the [developer docs](https://developer.box.com/docs/box-content-preview#section-options)._ | | showAnnotations | boolean | `true` | _See the [developer docs](https://developer.box.com/docs/box-content-preview#section-options)._ | **_Note_**: Any other option listed here https://github.com/box/box-content-preview#parameters--options, which is also not listed or overriden above as a prop, will be passed on as-is to the Preview Library.
Mid
[ 0.553097345132743, 31.25, 25.25 ]
Q: What is the logic behind copying properties into a "fresh" variable for use in a method? The following code is from Apple's Core Data template, but I've seen similar code from many different developers: - (void)saveContext { NSError *error = nil; NSManagedObjectContext *managedObjectContext = self.managedObjectContext; if (managedObjectContext != nil) { if ([managedObjectContext hasChanges] && ![managedObjectContext save:&error]) { // Replace this implementation with code to handle the error appropriately. // abort() causes the application to generate a crash log and terminate. You should not use this function in a shipping application, although it may be useful during development. NSLog(@"Unresolved error %@, %@", error, [error userInfo]); abort(); } } } Why is there a new object created for the managedObjectContext? Why is self.managedObjectContext not sufficient. Personally, I would have used just that. What is the logic behind copying a property into a fresh, local variable when you could simply use the property? A: I think it's because when you call self.managedObjectContext you're really calling [self managedObjectContext] By assigning it to a variable temporarily, we can use the value without cycling through the code over and over again. Most of the time, it probably won't be a huge issue, but in general, it is probably a touch faster. Otherwise, you'd have to do if (self.managedObjectContext != nil) { if ([self.managedObjectContext hasChanges] && ![self.managedObjectContext save:&error]) { // Replace this implementation with code to handle the error appropriately. // abort() causes the application to generate a crash log and terminate. You should not use this function in a shipping application, although it may be useful during development. NSLog(@"Unresolved error %@, %@", error, [error userInfo]); abort(); } } which calls [self managedObjectContext] 3 times instead of 1 A: A. As mentioned in the comment to your Q, there is no new object. You should really understand the difference between (Objective-C) object and object pointer. In my books I usually use code like below to explain that: // Copy reference NSMutableString *ref1 = [@"Amin" mutableCopy]; NSMutableString *ref2 = ref1; [ref1 appendString:@" Negm"]; NSLog( @"%@ / %@", ref1, ref2 ); You will get $ Amin Negm / Amin Negm What? Both objects changed? No, there is only one object and two pointers to it. If you change the one object using one pointer it is the one changed object even you address it using the second pointer. I. e. this is the semantically difference between strong and copy for declared properties. To have two objects, you have to explicitly copy the first object: // Copy reference NSMutableString *ref1 = [@"Amin" mutableCopy]; NSMutableString *ref2 = [ref1 mutableCopy]; [ref1 appendString:@" Negm"]; NSLog( @"%@ / %@", ref1, ref2 ); In this case the object ref1 points to is copied, so we have two objects, and then the reference to the new object is assigned to ref2. In this case you have two different objects and you will get the expected result: $ Amin Negm / Amin B. Why should one assign the reference to a new var? Beside the reason mentioned in Logan's answer (which is not sufficient in this case, we are talking about saving, that means disk access and a method invocation does not change the performance in a relevant way), there is a different reason: Code readability 1: Using a second reference var has the advantage that the code is more compact. It is simply shorter and easier to overlook. 2: Using a second reference var has the advantage that you get a new label. Using var names like oldContext and newContext or backgroundContext and mainContext or $whatever makes it easy to the reader to follow the data flow in a complex algorithm.
Mid
[ 0.637904468412943, 25.875, 14.6875 ]
Tuesday, May 22, 2018 Investors short market in reaction to foul mouth new government A market player was lamenting yesterday of foreigners not only sold their stock market holdings but went short. What actually happened is more startling than the report by The Star here of foreign investors selling-off RM2.48 billion worth of shares caused the biggest fall to the Bursa since August 2013. Singapore's Business Times here reported all the foreign inflow into the stock market for 2018 outflowed within days after the general election. Prior to the election, foreign analysts forecasted BN to win and were generally supportive of the macroeconomic policies of former Prime Minister, Dato Mohd Najib Tun Abdul Razak. The BN loss was not taken well by foreign investors who views the unconventional policies by the new government not to their liking and would be disruptive to the Malaysian economy. Words coming out from the new government leaders does not indicate any intention to win back their confidence. In reaction to the sharp decline of ringgit and stock market abroad over the long holidays after the election, the Council of Elders attempted to calm the market with statements claiming the economic situation including its reserve is strong. This runs counter to Pakatan Harapan campaigners claim that the government is bankrupt. Damage done However, damage has been done by PH's campaign promises that is deemed as detrimental to the country's fiscal policies. The new government made bold and voter-friendly specific promises that they must commit to ensure the euphoria from their victory remain. The change-seeking young voters may not take kindly to broken promises. A WA message commented: Looking at PH govt from the perspective of a foreign investor: 1. The PM saying not to worry about credit ratings is telling foreign investors that Malaysia does not mind losing its A-grade investment status. 2. The govt decision to zero-rate GST because high oil prices allows some buffer is telling investors that the govt is over-relying on global oil prices again - something beyond the control of our govt - and that if oil prices goes down again, Malaysia is screwed. 3. Swearing in a Finance minister that is in the middle of a corruption trial means that the PH govt tolerates corruption even at the highest levels and has no intention of being accountable. 4. The new finance minister asking for the AG to drop its case is telling investors that the PH govt does not mind interfering with the independence of the institutions as long as political goals are met. 5. Shocking investors that the national debt is now RM1 trillion and not RM680m as previously reported is telling investors that none of Malaysia's economic data or its institutions such as BNM or treasury can be trusted or that the new PH govt does not mind lying to the world - even on crucial economic data - as long as there are political gains. Talking as government Another WA message reminded the new government to be watchful of their words: There is a difference of what you can say and cannot say when you are in the opposition or in government. For example, you can irresponsibly allege that there is RM1 trillion in national debt when you are in opposition and the consequences that you only lie to your voters to cheat them of their votes. But if you are in government and you still make such untrue statements, it will jolt the markets, undermine investor confidence and throw the entire financial system into doubt causing foreign investors to flee, capital outflows to accelerate and our ringgit to drop. Already, foreign outflows the week after PH won has seen foreign investors pull US$625 million out of Malaysia - close to wiping out all the inflows earlier this year. Our Ringgit has also weakened and is now close to RM4,00 to USD1. You can lie to Malaysians but you must not lie to the investors. They are smarter and more knowledgeable than us voters. Tell us exactly how you came to this figure of RM1 trillion? Was it official debt or off-balance sheet guarantees that are backed by assets? Surely, our auditor-general, all the hard-working civil servants in Treasury, BNM and EPU, all the financial analysts were wrong and colluding in giving a false figure? If this lie is a pre-paid excuse to not honour your many manifesto promises which many already said cannot be delivered then I am afraid that this new PH government is deceitful, incompetent and deserves to fall in the very next opportunity. Mat Sabu got the message and in his first statement as Minister of Defense, he said he must be watchful of his words from now on. However, yesterday's comment by Prime Minister Mahathir to question the official national debt of RM680 billion as fake and the debt should be RM1 trillion has myriad implications. Facebooker Tokong Tan commented: If you are a investor and is now suddenly told that Malaysia's national debt is actually RM1 trillion and not RM680m as reported by treasury and BNM, you can only come to two conclusions: 1. The previous BN government, all the institutions such as BNM, all the civil servants had faked all statements and financial data. None of what you see today can be trusted or used to make your investment decision; or 2. The new PH government are liars and would prefer to continue to play politics instead of running the country or being truthful to investors. So as an investor, what would you do know? Run away. Mahathir's comment to not worry of credit rating downgrade does not auger well. Mahathir is aware of the implications of his popularity seeking statements and gap in the government cashflow arising from the fiscal policy to remove GST and meeting PH campaign manifesto. It will take more than the presence of Tun Daim and Tan Sri Robert Kuok in the Council of Elders to return confidence to the market. Its a different world today. Sure hope he will not do the predictable move to reinstate the policy to fix ringgit as per the 2000 Selective Capital Control measures to insulate the economy. It will permanemtly steer sway both portfolio managers and direct FDI from Malaysia. Remember that the key ingredient of Malaysia's past economic success and its attractiveness as an investmemt destination that is missing today is political stability. Political stability translate into continuity or in other words, stable and consistent policies. For investors, it means no rude surprises. 5 comments: When you play politics when you are in govt and try to lie about the govt debt, the foreign investors leave. Since GE14, they have pulled out more than RM4 billion from the stock markets alone. Our Bursa index has dropped from as high as 1,895 points to 1816 points as at noon 23 May 2018. Our local funds which were asked by the new govt to defend Bursa after GE14 are now staring at billions in losses. We should now worry about our dividend rates at the end of this year. The new govt must disclose to the public how much our funds have lost so far. Gone are the days of high dividend rates under the Najib govt.---The FBM KLCI tumbled to its lowest level in three months *on renewed concerns* over national debt levels, following recent statements by Prime Minister Tun Dr Mahathir Mohamad and Finance Minister Lim Guan Eng which signalled the national debt had breached RM1 trillion. it will be a tough few years before we get better.enough of this fake najibnomics. the bubble will burst anyway.iets prick it now. all that guy did was to siphon for himself and his goons (you included) and btw, why not accept them as the government. not 'new' government. they won, in spite of the dirty tricks.
Mid
[ 0.552272727272727, 30.375, 24.625 ]
+ -5)*1/(-1). Calculate the common denominator of ((-131)/z)/(72/(-20)) and ((-18)/24)/(9/(-202)). 18 Let k(p) = -7*p - 97. Calculate the least common multiple of k(-17) and 18. 198 Suppose 0 = -5*v + x + 17, 5*x = 7*v - 4*v - 19. Suppose 2 = 4*w + u, -w = -2*u - 3*u - 11. Calculate the common denominator of 22*(w - v/18) and 22. 3 Suppose 3*q = 14 + 1. Calculate the least common multiple of 1 and q. 5 Let o be ((-2)/(-6))/((-2)/12). Find the common denominator of -19/16 and o/5 - (-41)/(-60). 48 Let y be 2*3/(-2)*1. Calculate the common denominator of -1 - 144/66 - -1 and 2/9*y/(-4). 66 Let s = -145846721/40 - -3645915. Let x = 1202/5 + s. What is the common denominator of 1*-1 + 43/(-7) and x? 56 Suppose -11*m - 4 = -3*f - 9*m, 3*m = -5*f + 13. What is the smallest common multiple of 20 and f? 20 Let v = -5002/3 + 1716. Let l be 17/(-2*(-1)/5). Let f = v - l. What is the common denominator of -11/16 and f? 48 Let i = -76 + 78. Calculate the lowest common multiple of 38 and i. 38 Find the common denominator of (-4)/(-22) + (-542)/77 and -16/3. 21 Let v = -19 - -13. Calculate the common denominator of 99/(-10) - (-3)/v and -1. 5 Suppose f + 4*k = -14, -4 = 4*f - 5*k + 10. What is the common denominator of 219/54 - 4/f and 119/12? 36 Let g = -3345/7 - -74227/154. Let s = 2643483462 - 47241693238315/17871. Let p = -1/11914 + s. Find the common denominator of p and g. 66 Let g(x) = 5*x. Calculate the least common multiple of 23 and g(2). 230 Let l = 2/1533 + 47503/15330. Calculate the common denominator of (-1)/(-3)*5/(-300)*-117 and l. 20 Let p be 2/3 + 41817/4. Let z = 10461 - p. Let r = z + -911/132. What is the common denominator of -25/7 and r? 77 Suppose 4*y = n - 5, -2*n - 7 = 5*y + 9. Let a be y/2*(2 - 7). Suppose 2*z + a - 25 = 0. Calculate the least common multiple of z and 16. 80 Suppose 4*h - 1781 = -16613. Let j = -29733/8 - h. Let x = 1/200 + -6301/200. What is the common denominator of j and x? 8 Suppose 54 = 11*m - 8*m. What is the smallest common multiple of 6 and m? 18 Suppose 0*s - 12 = -2*s. Let i(h) = 3*h - 6. Calculate the smallest common multiple of 4*(-2 - 10/(-4)) and i(s). 12 Let f be 3590596/(-336) - 4/14. Let s = f + 10696. What is the common denominator of s and -79/2? 12 Let c(m) = -9071*m. Let t be c(1). Let l = t + 108773/12. What is the common denominator of l and (-196)/(-12) - 1/(-6)? 12 Let t(v) = 2*v + 16. Let w be (12/18)/(2/(-21)). Calculate the smallest common multiple of t(w) and 5. 10 Let r = -13956/9779 - 2/1397. Calculate the common denominator of -3*(2/8 + 0) and r. 28 Suppose 0 = 4*j - 2 - 10. Suppose 0 = -0*m + j*m - 66. What is the smallest common multiple of m and 2? 22 Let t(i) = i - 5. What is the smallest common multiple of 60 and t(9)? 60 Let q(g) = -5*g + 2. Calculate the smallest common multiple of 16 and q(-4). 176 What is the lowest common multiple of 2 - -4 - 3 - 2 and 9? 9 Let h = 36 - 28. What is the least common multiple of 16 and h? 16 Suppose -4*p + 7 = -29. Let y = p - 50. Find the common denominator of 59/10 and (y/(-6))/((-8)/(-3)). 80 Let l = 4 - 0. Calculate the smallest common multiple of 4 and (-6)/(-12) - (-86)/l. 44 Suppose 50 = 4*t - 30. Calculate the smallest common multiple of t and 2. 20 Let m = -4557 - -50092/11. Calculate the common denominator of 0 + -1 + 1071/54 and m. 66 Let y(d) = -d**2 + 4*d - 5. Let r be y(4). Calculate the common denominator of ((-3)/9)/(1/r) and -52/3. 3 Let r = 9 + -4. Suppose c + 3 = -r*z - 4, c + 3 = -z. What is the common denominator of (z - -3)*(-132)/(-30) and 46/11? 55 Let h = 62/7 + -367/28. Find the common denominator of h and 67/2. 4 Let s = 300 - 5365/18. Let j = 773255/492 - 77/492. Let o = -1606 + j. What is the common denominator of s and o? 18 Let p = 38 - 34. Calculate the lowest common multiple of 1 and p. 4 Suppose -3 = -3*c + 2*o, 20 + 1 = 3*c + 4*o. Suppose -f = -c*f. What is the common denominator of f/5 + (-19)/(-8) and 43/6? 24 Let w(z) = z**2 - 14*z - 20. What is the common denominator of 33/4 and w(12)? 4 Suppose 13*s - 108 - 48 = 0. Calculate the lowest common multiple of s and 26. 156 Let o(s) = -51*s - 5. Let g be o(-5). Let j be (12/15)/(4/g). Find the common denominator of (j/(-7) - 1) + 1 and 47. 7 Suppose -3*m = d - 8, -5*d + 2*m = -1 - 5. Calculate the smallest common multiple of 1*6 - (-4 + d) and 12. 24 Let n = -65 - -101. Suppose -4*p - 3*z + n = -p, -3*p = 4*z - 38. Calculate the lowest common multiple of p and 1. 10 Suppose 0 = -6*a + 4*a + 40. Calculate the least common multiple of a and 18. 180 Let p = -313/12 - -74/3. Calculate the common denominator of p and (-6)/(-30) - 1426/180. 36 Suppose 0 = -0*m - 2*m + 16. Let f(w) = w**3 - 7*w**2 + 8*w - 9. Calculate the least common multiple of f(6) and m. 24 Let b = -8 - -13. Suppose 0 = -4*j + 3 + b. Suppose 0 = 3*v - w - 1, 5*w + 7 = j*v + 28. What is the smallest common multiple of v and 8? 8 Let i be (-17389)/10 + 26/65. Let h = -1701 - i. What is the common denominator of 48/5 and h? 10 Let a(u) = u - 6*u + u - 2 - u**2 - 2*u. Let r(m) = 2*m - 4. Calculate the lowest common multiple of r(4) and a(-3). 28 Let x(q) = -q**3 + 16*q**2 - 16*q + 25. What is the lowest common multiple of 1 and x(15)? 10 Suppose -3*q - 2*q + 30 = 0. Calculate the lowest common multiple of q and 18. 18 Let b(z) = z - 1. Let q(i) = -i**3 + 10*i**2 - 9*i + 5. Let x be q(9). Calculate the lowest common multiple of 2 and b(x). 4 Suppose -2*a = 2*a - 4. Let f be -4 + a/(3/(-6)). What is the common denominator of -47/16 and (f/(-4))/((-72)/(-316))? 48 Let h(y) = y**3 - 6*y**2 - y - 2. Calculate the common denominator of 53/5 and h(6). 5 Let w = 97 - 93. Let q = 5 - -11. Calculate the lowest common multiple of w and q. 16 Let c(v) = 2*v**2 - 5*v - 3. Suppose x - 2 - 10 = 0. What is the smallest common multiple of c(5) and x? 132 Suppose 0 = m - 0 - 1. Let p be ((-160)/100)/((-2)/(-10)). Let r = p - -18. Calculate the smallest common multiple of r and m. 10 Let h = 34/89 - -3691/356. What is the common denominator of (-12)/9 - 88/(-102) and h? 68 Let h = 1 + 0. Suppose x = -5*x + 42. What is the least common multiple of h and x? 7 Suppose -3*z + 20 + 57 = 5*i, i - 3*z - 19 = 0. Calculate the least common multiple of i and 50. 400 Let u = -8 - -14. Let a = -13 + 19. What is the least common multiple of a and u? 6 Let r = -4/71 + -1175/568. Let m = 335523 + -61065335/182. Let p = -3/91 - m. Find the common denominator of r and p. 56 Let y = -5874/109 + 904293/16568. Calculate the common denominator of -25/4 and y. 152 Suppose 5*x - 4 = 3*x. What is the least common multiple of 11 and (1/3)/(x/36)? 66 Let g = 3722065/2 - 22291969/12. Let y(r) = 842*r**2 + r - 4. Let w be y(2). Let p = g - w. Find the common denominator of p and 79/18. 36 Let l = -7557/4 + 13387/8. Let q = 18561/88 + l. Calculate the common denominator of q and 11/20. 220 Let n(p) = -p**2 + 5*p - 3. Let f(o) = o + 9. Let d be f(-5). Let a be n(d). Suppose a = 2*l - 7. Calculate the least common multiple of l and 4. 4 Let u = 1671/70 - 48/35. What is the common denominator of u and -2 + -1 + (-291)/(-24)? 8 Suppose 0 = 2*i + 3 - 9. Let h = -2 - -12. Calculate the least common multiple of h and i. 30 Calculate the common denominator of (-14)/(-77) + 1350/(-44) and -5/3. 6 Suppose 6*m = 9 - 3. What is the least common multiple of m and 11? 11 Let f = -50017/10 + 4997. Suppose 3*c - z = 2, -5*z + 2 = 4*c - 6*z. Find the common denominator of f and c - -1 - (-31)/(-10). 10 Let s = 4072/609 + -4/203. What is the common denominator of s and -61/4? 12 Let c = -19 - -27. Let z = -10 - -16. Let g = 12 - z. What is the smallest common multiple of c and g? 24 Let f = -331 - -1543. Let d be f*-1*2/4. Calculate the common denominator of (-2)/16*d/9 and -113/6. 12 Let v = -7 - -17. What is the least common multiple of 11 and v? 110 Suppose 5*c - 25 = 0, 2*g + 0*c - 3*c - 131 = 0. Calculate the lowest common multiple of 3 and g. 219 Let t = 48 - 40. Calculate the least common multiple of 2 and t. 8 Let i = -3748582537809/10472 + 715924865/2. Let r = -3/1496 - i. Calculate the common denominator of 4/10 - 488/70 and r. 7 Let b(f) = 2*f**3 - f**2 + 2*f - 1. Suppose 5*s - 7 = 2*u, -5*u - 7 + 2 = 0. Calculate the least common multiple of 9 a
Low
[ 0.505524861878453, 22.875, 22.375 ]
Q: Convert String to multi-level dictionary keys? I am giving the user the ability to check a specific key in a multi-level dictionary. My idea is that they will pass the path to the key like this: root.subelement1.subelement2.key This can be of arbitrary length and depth. Once I have the string (above) from the user, I'll split it and get a list of each individual component: elements = ['root', 'subelement1', 'subelement2', 'key'] All of this I can do. The next part is where I am stuck. How can I query the dictionary key, specified by the above when it's arbitrary length? My initial thought was to do something like my_dict[elements[0]][elements[1]]...but that doesn't scale or work when my user doesn't pass exactly the length I expect. How can I get the data at an arbitrary key depth, in this case? A couple examples: User passes country.US.NewYork => I query `my_dict['country']['US']['NewYork'] User passes department.accounting => I query my_dict['department']['accounting'] User passes id => I query my_dict['id'] User passes district.District15.HenryBristow.principal => I query my_dict['district']['District15']['HenryBristow']['principal'] A: you could do that using reduce which will query the keys in the nested dictionaries: q = "district.District15.HenryBristow.principal" my_dict = {"district" : {"District15" : {"HenryBristow" : {"principal" : 12}}}} from functools import reduce # python 3 only print(reduce(lambda x,y : x[y],q.split("."),my_dict)) result: 12 If you want to avoid to catch KeyError in case the data doesn't exist with this path, you could use get with a default value as empty dictionary: reduce(lambda x,y : x.get(y,{}),q.split("."),my_dict) Trying to get an unknown value returns an empty dictionary. The only drawback is that you don't know from where exactly the path got lost, so maybe leaving the KeyError be raised wouldn't be so bad: try: v = reduce(lambda x,y : x[y],q.split("."),my_dict) except KeyError as e: print("Missing key: {} in path {}".format(e,q)) v = None
Mid
[ 0.6320346320346321, 36.5, 21.25 ]
package com.lkl.springcloud.eureka; import org.springframework.boot.autoconfigure.EnableAutoConfiguration; import org.springframework.boot.autoconfigure.SpringBootApplication; import org.springframework.boot.builder.SpringApplicationBuilder; import org.springframework.cloud.netflix.eureka.EnableEurekaClient; import org.springframework.web.bind.annotation.RequestMapping; import org.springframework.web.bind.annotation.RestController; /** * Created by liaokailin on 16/4/30. */ @SpringBootApplication @EnableEurekaClient @RestController @EnableAutoConfiguration public class Application { @RequestMapping("/") public String home() { return "Hello world"; } public static void main(String[] args) { new SpringApplicationBuilder(Application.class).web(true).run(args); } }
Mid
[ 0.622478386167147, 27, 16.375 ]
India found wide-ranging support from other countries in its effort, including the entire G77+China bloc and surprisingly the U.S. too. India has scored an early victory at the climate negotiations here, ensuring that the talks remain focused on adapting agricultural practices to climate change and not on costly emission reduction measures that would impact farmers directly. India found wide-ranging support from other countries, including the entire G77+China bloc and, surprisingly, the United States. The developed countries, especially the European Union, have for several years been keen on ensuring that climate negotiations focus on reducing emissions in the agricultural sector. India, China and a large number of African countries have countered by pointing out that emission reduction efforts in the agricultural sector would affect farmers — who constitute a large percentage of the population, and are often the poorest, in the developing world. They also argue that the effort to reduce emissions should be focus on fossil-fuel-based activities that spew out carbon dioxide — the greatest contributor to global warming by far. As paddy fields and livestock are some of the biggest causes of emissions, emission reduction in the sector has major implications for India and China. The Indian delegation and other developing countries were taken by surprise on the first day of the Warsaw meet when it was announced by the elected chairs of the talks that there was a plan to have a formal decision adopted on the agriculture sector by the end of the two weeks of negotiations. Many objected, noting that such a plan had not been approved by the countries earlier and should not even be on the agenda of the talks. They pointed out that the countries had agreed only to an exchange of views in a workshop, a format in which only reports are generated and no formal decisions are adopted. Fast-forwarding the talks to bring out a decision at Warsaw on the agricultural sector, including on the emission reduction front (very often referred to simply as mitigation), would have opened the Pandora’s box, leading to emission reduction targets being set particularly for the agriculture sector in 2015, when the new global agreement is to be signed. Significant Indian intervention supported by many other countries ensured that the talks remained focused on adaptation and only a report on this specific matter is produced for the countries to discuss in future. “It’s the emphatic realisation and thrust on adaptation in agriculture, given the diversity of needs and concern of poor countries, that was realised by one and all,” said Ravi S. Prasad, one of the lead negotiators for India, explaining how many countries came together on the issue. While the door has not completely been shut on mitigation in agriculture, the window that had been surreptitiously opened this year has been firmly bolted down. The Indian government had mandated its delegation to Warsaw to ensure that mitigation in the agricultural sector does not find space at the negotiations. In the three days here, the delegation has secured the one red line it came here with. The decision on this took two days of closed-door talks and is likely to be announced officially at the end of the week.
Mid
[ 0.586433260393873, 33.5, 23.625 ]
Workbench Side Panel (Black) This manufacturer-approved side panel (part number 26655-EBE) is for workbenches.Side panel 26655-EBE is the exterior panel on the side of the workbench.Follow the instructions in your owner’s manual when installing this part. About Sears PartsDirect "Sears Parts Direct is the online access point for repair parts and accessories from every major brand – regardless of where it was purchased. From electronics to lawn and garden equipment, they offer genuine parts from the original manufacturers." --- Sears PartsDirect; More Details This manufacturer-approved chemical injection kit (part number 16741) is for pressure washers.Chemical injection kit 16741 contains the parts to replace the valve that injects chemicals into Read More » This manufacturer-approved inducer blower assembly (part number 0131G00000PS) is for furnaces.Inducer blower assembly 0131G00000PS removes fumes from the combustion chamber and blows them into the exhaust Read More » This manufacturer-approved ice actuator (part number WP2317240) is for refrigerators.Ice actuator WP2317240 controls the ice dispensing from the dispenser.Unplug the refrigerator before installing this part. Wear Read More » FEATURED PARTS This manufacturer-approved turntable motor (part number WPW10207749) is for microwaves.Turntable motor WPW10207749 rotates the glass tray inside the microwave oven.Because high-voltage capacitors in a microwave can Read More » Most Viewed This manufacturer-approved shock absorber (part number WPW10312625) is for washers.Shock absorber WPW10312625 absorbs the vibrations and movements of the outer washer tub.Unplug the washer before installing Read More » This manufacturer-approved spring (part number 732-04616B) is for lawn tractors, including MTD lawn tractor model 13A0785T055.Wear work gloves to protect your hands when installing the spring. Read More » Our Picks This manufacturer-approved shift rod support bracket (part number 790-00218A-0637) is for snowblowers.Shift rod support bracket 790-00218A-0637 attaches to the snowblower frame to support the shift rod Read More »
Low
[ 0.5110663983903421, 31.75, 30.375 ]
/**************************************************************************** * * File name : vpkt_uio.c * Function : SwsVpkt user mode I/O * Project : SwsVpkt * Authors : Lawrence Rust * Systems : ANSI C Win32 * **************************************************************************** * * Created by Lawrence Rust, Software Systems Consultants * [email protected]. Tel/Fax +33 5 49 72 79 63 * * 15-Jan-06, LVR, Created. * * Aug 2010, GV, changed for Watt-32. * * Comments: * -------- * This is an example of how to perform user mode network I/O. * **************************************************************************** */ #include "wattcp.h" #if defined(WIN32) #include "misc.h" #include "pcpkt.h" #include "winpkt.h" #include "w32_ndis.h" #include "swsvpkt.h" #if defined(__LCC__) #define QueueUserAPC_4th_ARG __int64 * #else #define QueueUserAPC_4th_ARG ULONG_PTR #endif static struct { uint64 rx_pkts; uint64 rx_bytes; uint64 rx_errors; uint64 tx_pkts; uint64 tx_bytes; uint64 tx_errors; } sws_stat; static DWORD WINAPI WorkerThread (void *); static void WINAPI StartReceivingApc (ULONG_PTR); static void WINAPI ReceiveComplete (DWORD, DWORD, OVERLAPPED*); static void WINAPI ResubmitRxBufferApc (ULONG_PTR); static BOOL QueueBuffer (struct SwsVpktUsr*, struct SRxBuffer*); /* * Open a handle to the packet driver */ struct SwsVpktUsr *SwsVpktOpen (const char *szName, const struct SwsVpktOpenInfo *pInfo) { struct SwsVpktUsr *pPacket; unsigned uRxBufs; size_t size; DWORD err; winpkt_trace_func = "SwsVpktOpen"; WINPKT_TRACE ("name = %s\n", szName); if (!pInfo || !pInfo->pfnRx) return (NULL); uRxBufs = pInfo->uRxBufs > 0 ? pInfo->uRxBufs : 16; /* Allocate instance data */ size = sizeof(*pPacket) + uRxBufs * sizeof(pPacket->rxBuffer[0]); pPacket = HeapAlloc (GetProcessHeap(), HEAP_ZERO_MEMORY, size); if (!pPacket) { err = GetLastError(); WINPKT_TRACE ("HeapAlloc() failed; %s\n", win_strerror(err)); SetLastError (err); return (NULL); } pPacket->hDevice = INVALID_HANDLE_VALUE; pPacket->uRxBufs = uRxBufs; pPacket->pfnRx = pInfo->pfnRx; /* Create overlapped Tx done event */ pPacket->txOverlap.hEvent = CreateEvent (NULL, TRUE, FALSE, NULL); if (!pPacket->txOverlap.hEvent) { err = GetLastError(); SwsVpktClose (pPacket); SetLastError (err); WINPKT_TRACE ("CreateEvent() failed; %s\n", win_strerror(err)); return (NULL); } /* Attach to packet driver */ pPacket->hDevice = CreateFileA (szName, GENERIC_READ | GENERIC_WRITE, FILE_SHARE_READ | FILE_SHARE_WRITE, NULL, /* Security */ OPEN_EXISTING, FILE_FLAG_OVERLAPPED | FILE_ATTRIBUTE_NORMAL, NULL); /* Template file */ if (pPacket->hDevice == INVALID_HANDLE_VALUE) { err = GetLastError(); SwsVpktClose (pPacket); SetLastError (err); WINPKT_TRACE ("CreateFileA() failed; %s\n", win_strerror(err)); return (NULL); } /* Start the worker thread */ pPacket->hWorker = CreateThread (NULL, 0, WorkerThread, pPacket, CREATE_SUSPENDED, NULL); if (!pPacket->hWorker) { err = GetLastError(); SwsVpktClose (pPacket); SetLastError (err); WINPKT_TRACE ("CreateThread() failed; %s\n", win_strerror(err)); return (NULL); } SetThreadPriority (pPacket->hWorker, THREAD_PRIORITY_ABOVE_NORMAL); ResumeThread (pPacket->hWorker); QueueUserAPC (StartReceivingApc, pPacket->hWorker, (QueueUserAPC_4th_ARG)pPacket); return (pPacket); } /* * Release packet driver resources */ BOOL SwsVpktClose (struct SwsVpktUsr *pPacket) { char res[100] = { '\0' }; BOOL rc = FALSE; winpkt_trace_func = "SwsVpktClose"; /* Signal the worker thread to exit */ pPacket->iWorkerExit = 1; if (pPacket->hWorker) { if (WaitForSingleObject(pPacket->hWorker, 300) == WAIT_TIMEOUT) { /* This will occur if the thread is waiting in a critical section * Resolve the deadlock by killing the thread */ TerminateThread (pPacket->hWorker, 1); strcpy (res, "thread killed, "); } CloseHandle (pPacket->hWorker); } if (pPacket->hDevice != INVALID_HANDLE_VALUE) { CloseHandle (pPacket->hDevice); pPacket->hDevice = INVALID_HANDLE_VALUE; strcat (res, "device closed, "); rc = TRUE; } if (pPacket->txOverlap.hEvent) { CloseHandle (pPacket->txOverlap.hEvent); strcat (res, "overlap event closed"); } WINPKT_TRACE ("rc: %d, res: %s\n", rc, res); HeapFree (GetProcessHeap(), 0, pPacket); return (rc); } /* * Send a frame */ UINT SwsVpktSend (struct SwsVpktUsr *pPacket, const void *pvBuf, UINT uLen) { DWORD sent = 0; BOOL bRet, overlapped = FALSE; pPacket->txOverlap.Offset = 0; pPacket->txOverlap.OffsetHigh = 0; bRet = WriteFile (pPacket->hDevice, pvBuf, uLen, &sent, &pPacket->txOverlap); if (!bRet && GetLastError() == ERROR_IO_PENDING) { /* Wait for completion */ sent = 0; GetOverlappedResult (pPacket->hDevice, &pPacket->txOverlap, &sent, TRUE); overlapped = TRUE; } if (sent) { sws_stat.tx_pkts++; sws_stat.tx_bytes += sent; } else sws_stat.tx_errors++; winpkt_trace_func = "SwsVpktSend"; WINPKT_TRACE ("overlapped: %d, bRet %d; %s\n", overlapped, bRet, sent == 0 ? win_strerror(GetLastError()) : "okay"); return (UINT)sent; } BOOL SwsVpktGetStatistics (const struct SwsVpktUsr *usr, struct PktStats *stats) { stats->in_packets = sws_stat.rx_pkts; stats->in_bytes = sws_stat.rx_bytes; stats->out_packets = sws_stat.tx_pkts; stats->out_bytes = sws_stat.tx_bytes; stats->in_errors = sws_stat.rx_errors; stats->out_errors = sws_stat.tx_errors; ARGSUSED (usr); return (TRUE); } BOOL SwsVpktGetAdapterState (const struct SwsVpktUsr *usr, struct SwsVpktAdapterState *state) { IOCTL_INFO info; BOOL rc; memset (&info, '\0', sizeof(info)); /* Get adapter info */ rc = SwsVpktDeviceRequest( usr->hDevice, /* Device handle */ (DWORD)IOCTL_GETINFO, /* IOCTL code */ NULL, 0, /* -> input buffer & size */ &info, /* -> output buffer */ sizeof(info), /* input buffer size */ NULL); /* Bytes returned */ if (rc) { state->isPowerOn = info.bPowerOn; state->isMediaConnected = !info.bMediaDisconnected; state->isWan = info.bWan; state->isWanDown = info.bWanDown; } winpkt_trace_func = "SwsVpktGetAdapterState"; WINPKT_TRACE ("rc %d, state: %d,%d,%d,%d\n", rc, state->isPowerOn, state->isMediaConnected, state->isWan, state->isWanDown); return (rc); } /* * Get the adapter's MAC address */ BOOL SwsVpktGetMacAddress (const struct SwsVpktUsr *pPacket, mac_address *pMac) { /* Get the device type etc */ return SwsVpktDeviceRequest ( pPacket->hDevice, /* Device handle */ (DWORD)IOCTL_GETMACADDR, /* IOCTL code */ NULL, 0, /* -> input buffer & size */ pMac, /* -> output buffer */ sizeof(*pMac), /* output buffer size */ NULL); /* Bytes returned */ } /* * Get the adapter's description. * Note: This IOCTL was added in ver 1.0.0.5 */ BOOL SwsVpktGetDescription (const struct SwsVpktUsr *pPacket, char *descr, size_t max) { return SwsVpktDeviceRequest ( pPacket->hDevice, /* Device handle */ (DWORD)IOCTL_GETDESC, /* IOCTL code */ NULL, 0, /* -> input buffer & size */ descr, /* -> output buffer */ max, /* output buffer size */ NULL); /* Bytes returned */ } /* * Get the NDIS version. */ BOOL SwsVpktGetNDISversion (const struct SwsVpktUsr *pPacket, DWORD *ver) { return SwsVpktDeviceRequest ( pPacket->hDevice, /* Device handle */ OID_GEN_DRIVER_VERSION, /* IOCTL code */ NULL, 0, /* -> input buffer & size */ ver, /* -> output buffer */ sizeof(*ver), /* output buffer size */ NULL); /* Bytes returned */ } /* * Return swsVpkt.sys file-version. */ static char swsVpkt_ver[64] = "?"; const char *SwsVpktGetDriverVersion (void) { if (swsVpkt_ver[0] == '?') get_file_version ("drivers\\swsVpkt.sys", swsVpkt_ver, sizeof(swsVpkt_ver)); return (swsVpkt_ver); } /* * Worker thread */ static DWORD WINAPI WorkerThread (void *pv) { struct SwsVpktUsr *pPacket = (struct SwsVpktUsr*)pv; /* Execute IO completion callbacks and APC's until exit */ while (!pPacket->iWorkerExit) SleepEx (100, TRUE); /* Cancel all pending reads */ CancelIo (pPacket->hDevice); SleepEx (10, TRUE); return (0); } /* * APC to start receiving */ static void WINAPI StartReceivingApc (ULONG_PTR ulContext) { struct SwsVpktUsr *pPacket = (struct SwsVpktUsr*)ulContext; UINT i; /* Submit all read buffers */ for (i = 0; i < pPacket->uRxBufs; i++) QueueBuffer (pPacket, &pPacket->rxBuffer[i]); } /* * Post a receive buffer */ static BOOL QueueBuffer (struct SwsVpktUsr *pPacket, struct SRxBuffer *pBuffer) { if (pPacket->iWorkerExit) return (FALSE); memset (&pBuffer->overlap, 0, sizeof(pBuffer->overlap)); pBuffer->overlap.hEvent = (HANDLE)pPacket; if (!ReadFileEx(pPacket->hDevice, pBuffer->buffer, sizeof(pBuffer->buffer), &pBuffer->overlap, ReceiveComplete)) { DWORD dwErr = GetLastError(); switch (dwErr) { case ERROR_OPERATION_ABORTED: break; default: /* Retry later */ QueueUserAPC (ResubmitRxBufferApc, pPacket->hWorker, (QueueUserAPC_4th_ARG)pBuffer); break; } return (FALSE); } return (TRUE); } /* * APC to resubmit an RxBuffer */ static void WINAPI ResubmitRxBufferApc (ULONG_PTR ulContext) { struct SRxBuffer *pBuffer = (struct SRxBuffer*) ulContext; struct SwsVpktUsr *pPacket = (struct SwsVpktUsr*) pBuffer->overlap.hEvent; /* Resubmit the buffer */ QueueBuffer (pPacket, pBuffer); } /* * ReadFileEx completion routine */ static void WINAPI ReceiveComplete ( DWORD dwErr, /* completion code */ DWORD dwBytes, /* number of bytes transferred */ OVERLAPPED *lpOverlapped) /* I/O information buffer */ { struct SRxBuffer *pBuffer = OVL2RXBUF (lpOverlapped); struct SwsVpktUsr *pPacket = (struct SwsVpktUsr*) pBuffer->overlap.hEvent; winpkt_trace_func = "ReceiveComplete"; WINPKT_TRACE ("dwErr %lu, got %lu bytes\n", (u_long)dwErr, (u_long)dwBytes); switch (dwErr) { case 0: (*pPacket->pfnRx) (pPacket, pBuffer->buffer, dwBytes); sws_stat.rx_pkts++; sws_stat.rx_bytes += dwBytes; break; case ERROR_OPERATION_ABORTED: sws_stat.rx_errors++; break; } /* Resubmit the buffer */ QueueBuffer (pPacket, pBuffer); } static const struct search_list ccode_list[] = { { IOCTL_GETINFO, "IOCTL_GETINFO" }, { IOCTL_GETMACADDR, "IOCTL_GETMACADDR" }, { IOCTL_GETDESC, "IOCTL_GETDESC" }, { OID_GEN_DRIVER_VERSION, "OID_GEN_DRIVER_VERSION" } }; /* * Make a synchronous DeviceIoControl call to a handle opened * using FILE_FLAG_OVERLAPPED */ BOOL SwsVpktDeviceRequest2 (HANDLE hDevice, DWORD dwIoControlCode, const void *lpInBuffer, DWORD nInBufferSize, void *lpOutBuffer, DWORD nOutBufferSize, DWORD *lpBytesReturned, const char *file, unsigned line) { BOOL bResult; HANDLE hEvent; OVERLAPPED overlap; DWORD bytesReturned, err; #if defined(USE_DEBUG) winpkt_trace_func = "SwsVpktDeviceRequest"; winpkt_trace_file = file; winpkt_trace_line = line; #endif /* Create a manual reset event for overlapped wait */ hEvent = CreateEvent (NULL, TRUE, FALSE, NULL); if (!hEvent) { err = GetLastError(); #if defined(USE_DEBUG) winpkt_trace ("CreateEvent failed; %s\n", win_strerror(err)); #endif SetLastError (err); return (FALSE); } memset (&overlap, 0, sizeof(overlap)); overlap.hEvent = hEvent; if (!lpBytesReturned) lpBytesReturned = &bytesReturned; bResult = DeviceIoControl (hDevice, dwIoControlCode, (void*)lpInBuffer, nInBufferSize, lpOutBuffer, nOutBufferSize, lpBytesReturned, &overlap); if (!bResult && GetLastError() == ERROR_IO_PENDING) { /* Wait for completion */ bResult = GetOverlappedResult (hDevice, &overlap, lpBytesReturned, TRUE); } err = GetLastError(); #if defined(USE_DEBUG) winpkt_trace ("%s, len %lu/%lu, bResult %d\n", list_lookup(dwIoControlCode,ccode_list,DIM(ccode_list)), (u_long)nInBufferSize, (u_long)*lpBytesReturned, bResult); #endif CloseHandle (hEvent); SetLastError (err); return (bResult); } #endif /* WIN32 */
Mid
[ 0.611439842209073, 38.75, 24.625 ]
The Human Genome Project (HGP) spurred a great increase in sequencing throughput and resulted in a corresponding drop in sequencing costs. In contrast to the 13 years and cost of nearly three billion US dollars per genome, sequencing costs have been reduced significantly—indeed two individual genomes have recently been completed (McGuire et al., Science 317:1687 (2007)). Personal genomes represent a paradigm shift in medical treatment for both patients and health care providers. By managing genetic risk factors for disease, health care providers can more readily practice preventative medicine and provide customized treatment. With large banks of completed genomes, drug design and administration can be more efficient, pushing forward the nascent field of pharmacogenomics. To popularize customized medical treatment for individuals, the US National Institutes of Health (NIH) National Human Genome Research Institute (NHGRI) set a benchmark of reducing per-genome sequencing costs from ten million to approximately one thousand U.S. dollars. Conventional high-throughput capillary electrophoresis and automated genome sequencing technology, however, cannot satisfy the increased demand for individual genome sequencing. In addition, existing sequencing methods require complicated and error-prone image acquisition and analysis steps. For example, many existing technologies require either the array or detection system to move in order to capture multiple images. The resulting images may then be arranged in order, aligned, and analyzed. Image acquisition, processing, and analysis steps are all prone to errors, take additional time, and require expensive equipment. Conversely, existing systems that do not involve moving optics are typically limited by a very modest number of detecting units. Finally, existing devices do not place the molecule being detected in close proximity to a corresponding detecting unit, which substantially limits the strength of the detected signal. Accordingly, a need exists for devices to reduce the cost of nucleic acid sequencing. To approach the “$1000 genome” paradigm, devices should be capable of sequencing multiple molecules in parallel, have simplified design and manufacture processes, and avoid the need of existing devices and methods for complicated and error-prone scanning and image analysis processes. Additionally, the devices should be capable of sequencing single molecules to avoid the known difficulty of asynchrony in both the amplification (e.g., drift between the sequences of ideally clonal templates) and sequencing (e.g., dephasing of the stepwise sequencing reactions amongst the sequencing templates) steps of clustered sequencing methods.
High
[ 0.7272727272727271, 32, 12 ]
Q: Modern C++ iteration over pointer to vector For this code std::vector<FOO> foo_vec; for (auto &f : foo_vec){ } What if we have std::vector<FOO> *foo_vec; ? Can I use a similar notation with pointer to vector ? A: With the pre-condition that the pointer actually points to a vector, you can use the indirection operator to get an lvalue to the pointed vector: *foo_vec. This vector lvalue can be use like any other vector lvalue, and can be used in a range-for loop.
High
[ 0.691891891891891, 32, 14.25 ]
/** * * Licensed to the Apache Software Foundation (ASF) under one or more * contributor license agreements. See the NOTICE file distributed with * this work for additional information regarding copyright ownership. * The ASF licenses this file to You under the Apache License, Version 2.0 * (the "License"); you may not use this file except in compliance with * the License. You may obtain a copy of the License at * * http://www.apache.org/licenses/LICENSE-2.0 * * Unless required by applicable law or agreed to in writing, software * distributed under the License is distributed on an "AS IS" BASIS, * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. * See the License for the specific language governing permissions and * limitations under the License. */ package com.frameworkset.commons.dbcp2.managed; import com.frameworkset.commons.pool2.ObjectPool; import com.frameworkset.commons.dbcp2.PoolingDataSource; import java.sql.Connection; import java.sql.SQLException; /** * The ManagedDataSource is a PoolingDataSource that creates ManagedConnections. * * @author Dain Sundstrom * @param <C> The kind of {@link Connection} to manage. * @version $Id: ManagedDataSource.java 1650024 2015-01-07 09:49:58Z tn $ * @since 2.0 */ public class ManagedDataSource<C extends Connection> extends PoolingDataSource<C> { private TransactionRegistry transactionRegistry; /** * Creates a ManagedDataSource which obtains connections from the specified pool and * manages them using the specified transaction registry. The TransactionRegistry must * be the transaction registry obtained from the XAConnectionFactory used to create * the connection pool. If not, an error will occur when attempting to use the connection * in a global transaction because the XAResource object associated with the connection * will be unavailable. * * @param pool the connection pool * @param transactionRegistry the transaction registry obtained from the * XAConnectionFactory used to create the connection pool object factory */ public ManagedDataSource(ObjectPool<C> pool, TransactionRegistry transactionRegistry) { super(pool); this.transactionRegistry = transactionRegistry; } /** * Sets the transaction registry from the XAConnectionFactory used to create the pool. * The transaction registry can only be set once using either a connector or this setter * method. * @param transactionRegistry the transaction registry acquired from the XAConnectionFactory * used to create the pool */ public void setTransactionRegistry(TransactionRegistry transactionRegistry) { if(this.transactionRegistry != null) { throw new IllegalStateException("TransactionRegistry already set"); } if(transactionRegistry == null) { throw new NullPointerException("TransactionRegistry is null"); } this.transactionRegistry = transactionRegistry; } @Override public Connection getConnection() throws SQLException { if (getPool() == null) { throw new IllegalStateException("Pool has not been set"); } if (transactionRegistry == null) { throw new IllegalStateException("TransactionRegistry has not been set"); } Connection connection = new ManagedConnection<C>(getPool(), transactionRegistry, isAccessToUnderlyingConnectionAllowed()); return connection; } }
Mid
[ 0.604444444444444, 34, 22.25 ]
Stellan Skarsgård in Chernobyl (Liam Daniel/HBO) The president’s haters can’t see the difference between his presidency and the Soviet empire of lies. The Godfather seen by the Left is not the same movie seen by the Right. A great work of art can appear different through the lenses we wear. So it is with HBO’s brilliant miniseries Chernobyl: It vivisects all things Soviet, yet many, including its creator, consider it also a warning about something a bit wide of Communism — Trumpism. I can scarcely praise Chernobyl enough. Creator Craig Mazin’s five-part miniseries, which just wrapped Monday night, is a masterful suspense tale directed with nerve-shredding gusto by Johan Renck: a whodunnit looking backward in time as the characters try to figure out the cause of the 1986 catastrophe but also a mystery moving forward, as the specialists try to figure out how to save millions from dying. It’s a terrifically stimulating lesson on the details of nuclear energy that artfully weaves in reams of expository and technical dialogue without ever disrupting the drama. Around the edges it courses with Kubrickian black comedy: The phrase “It’s only 3.6 roentgens” ought to enter the language as shorthand for any absurd effort to downplay bad news. Chernobyl is an exceptionally compelling human drama: The soot-faced leader of a company of miners is an archetype for all of the brave and suffering working men down through the ages who have had to put their backs into the job of correcting mistakes made by their educated betters. The way Mazin distills the complexity of the situation into potent dialogue is a marvel. Overarching all of the above is Chernobyl’s most vital quality: Its devastating exposure of gigantic political failure. The anti-Trump subtext that Mazin and others see in the series is not surprising if you understand their priors, but it suffers, as much analysis of the president does, from monomania or tunnel vision — a conceptual narrowness that excludes counterbalancing forces in the Trump era. What Trump haters see in Chernobyl is this: Like the Soviet bureaucracy, Trump is hostile to the truth and won’t budge even when told he’s wrong. In the Left’s caricature, Trump is also dangerously antagonistic toward science and reason. He is supposedly the bull-headed denier who won’t acknowledge the slow-developing Chernobyl that is climate change. Trump is the tech genius saying Reactor Number Four could not have exploded because that’s his opinion, and no facts can change it, even as chunks of evidence to the contrary rain down around him. Trump is the ancient party hack telling his comrades to knuckle down and remember that the priority is not to let the people know the truth. Trump is the spectacularly unqualified pol who gets told off by a feisty (woman) scientist: “I’m a nuclear physicist. Before you were deputy secretary you worked in a shoe factory.” Yes, replies the man, “I worked in a shoe factory. Now I’m in charge.” Trump has his problems with the truth, but this is beside the point, because the epistemological difference between the Trump era and the Soviet era is so vast. The Soviet Union was a system of lies, an empire of lies that endured only because it was enforced by terror. Lying was effective in the USSR. Trump, by contrast, does not scare anyone into repeating his version of reality, except for a handful of his personal appointees, and the only thing they fear is losing their jobs. Lying is not only ineffective for Trump; it causes him — not the country — substantial damage. The president is not the state. He has not created, and would not be able to create, a system of lies. He does not, to take a salient example, enjoy the ability to order Jim Acosta what to say about him. The Communist Party did not have this problem. After Chernobyl, it didn’t have to worry about whether state television was going to disseminate a message the Central Committee might find disobliging. The Soviet Union of the series, depicted with harrowing gravity and fascinatingly detailed production design, is nothing like the ever-contentious and self-questioning United States of America, in the Trump era or ever. The U.S. is undergirded not only by separation of powers among rivalrous branches of government but also liberties that create rival non-government institutions that exercise enormous influence and power. The media and the culture are free to take issue with Trump, and — have you noticed? — they do. Would Trump behave like a Soviet apparatchik if a Chernobyl-sized national emergency happened? Our friends on the left would emphatically say yes. I say it doesn’t matter: If he did, he wouldn’t be able to get away with it. It’s great to be American. If the hermetically sealed USSR of Chernobyl reminds you of an American president, it ought to be not Trump but Woodrow Wilson. The scientists and apparatchicks and coal miners and jurists and soldiers are all part of the same unit, all calling one another “Comrade.” All answer ultimately to the same authority, General Secretary Gorbachev. Wilson was frustrated by the competition of power centers and famously likened government to a living organism that must operate under one brain rather than have its functions diffused: “No living thing can have its organs offset against each other, as checks, and live.” The Soviet Communist Party is the realization of Wilson’s dream of a permanent, entrenched bureaucracy — the administrative state of technocratic experts who are too wise to be bound to any pesky acts of Congress. (“Administration cannot wait upon legislation, but must be given leave, or take it, to proceed without specific warrant.”) Chernobyl is a warning about a completely contained state looking after its own interests instead of its people’s, with little cause to worry that anyone might go off-script because the price to be paid for that is known to all. As the political head of the energy department, Boris Shcherbina, played by Stellan Skarsgard, says to physicist Ulana Khomyuk (Emily Watson) when she threatens to blow the whistle on a coverup: I’ve known braver souls than you, Khomyuk, men who had their moment and did nothing. Because when it’s your life and the lives of everyone you love, your moral conviction doesn’t mean anything. It leaves you. And all you want at that moment is not to be shot. The only reason the world started to find out what was happening at Chernobyl was that windborne nuclear fallout, unlike information, cannot be bottled up. When contamination started showing up in Sweden, the world’s scientists started to grasp the reality. It should not go unnoticed that Chernobyl happened to the Soviet Union at its best, when it was more or less functional, under the leadership of that (relative) sweetheart, Comrade Gorbachev. What would the reaction have been had Stalin been in charge? He would have started having people shot. Quickly he would have found himself unable to find anyone who was willing to tell him the truth. The exposed reactor might have continued to unleash its 48 Hiroshimas a day indefinitely. Europe might have been wiped out. Gorbachev at least proved willing to listen to experts instead of immediately looking for scapegoats. He applied the tourniquets needed to stop the hemorrhaging. One of many tableaus of irony is the sight of a propaganda banner hanging limply in the contamination zone outside Chernobyl: “Our goal is the happiness of all mankind.” The soldiers who see this are spending their days wandering the land shooting the area’s cats and dogs so they can’t spread the toxin. A Soviet remote-controlled device planned for a moon landing that never transpired is redeployed over the inferno that is the reactor core — a handy symbol of Soviet imagination crashing from the firmament to a poison pit of its own creation. Here are the last pages of the fantasy of socialism, a conclusion whose soundtrack was not brass bands victory at parades but the terrifying high-pitched static of the dosimeters wielded by terrified men in hazmat suits. Five years later, the Soviet Union would die. Chernobyl was the emetic manifestation of the illness that was Soviet socialism.
Mid
[ 0.5631578947368421, 26.75, 20.75 ]
Pictured Rocks National Lakeshore QUICK LINKS Pictured Rocks National Lakeshore encompasses over 40 miles of Lake Superior shoreline. Situated on the largest, deepest, coldest and most pristine of the Great Lakes, Pictured Rocks National Lakeshore derives its name from the many sandstone cliffs that dot the shoreline. In addition to the sandstone cliffs, the park includes beaches, sand dunes, waterfalls, lakes and forest.
High
[ 0.6609442060085831, 38.5, 19.75 ]
The Short Films of David Lynch The Short Films of David Lynch (2002) is a DVD collection of the early student and commissioned film work of American filmmaker David Lynch. As such, the collection does not include Lynch's later short works, which are listed in the filmography. The films are listed in chronological order, with brief descriptions of each film. The DVD contains introductions by Lynch to each film, which can be viewed individually or in sequence to each other. Six Figures Getting Sick (Six Times) Six Men Getting Sick (Six Times) (1966). Originally untitled, "Six Men Getting Sick" is a one-minute color animated film that consists of six loops shown on a sculptured screen of three human-shaped figures (based on casts of Lynch's own head as done by Jack Fisk) that intentionally distorted the film. Lynch's animation depicted six people getting sick: their stomachs grew and their heads would catch fire. Lynch made this film during his second year at the Pennsylvania Academy of Fine Art. The school held an experimental painting and sculpture exhibit every year and Lynch entered his work in the Spring of 1966. The animated film was shown on "an Erector-set rig on top of the projector so that it would take the finished film through the projector, way up to the ceiling and then back down, so the film would keep going continuously in a loop. And then I hung the sculptured screen and moved the projector back till just what I wanted was on the screen and the rest fell back far enough to disappear" (Chris Rodley, editor of Lynch on Lynch). Lynch showed the whole thing with the sound of a siren as accompaniment. The film cost $200 and was not intended to have any successors. It was merely an experiment on Lynch's part because he wanted to see his paintings move. The Alphabet The Alphabet (1968) combines animation and live action and goes for four minutes. It has a simple narrative structure relating a symbolically rendered expression of a fear of learning. The idea for The Alphabet came from Lynch's wife, Peggy Lentz, a painter whose niece, according to Lynch in Chris Rodley's Lynch on Lynch book, "was having a bad dream one night and was saying the alphabet in her sleep in a tormented way. So that's sort of what started The Alphabet going." Based on the merits of this short film, Lynch was awarded an American Film Institute production grant and became a minor celebrity. The Grandmother The Grandmother (1970, 33 minutes). After the success of The Alphabet, one of Lynch's friends, Bushnell Keeler, recommended that he check out the American Film Institute. Keeler's brother-in-law had been involved in setting up the AFI. Lynch submitted The Alphabet, and wrote a script for a short film entitled The Grandmother. He sent the script and a print of The Alphabet to the AFI in Washington. Lynch got a call from George Stevens Jr. and Tony Vellani at the AFI, who wanted to know if Lynch could make The Grandmother for $5,000 (it eventually cost $7,200). The short film combines live action and animation. The story revolves around a boy who grows a grandmother to escape neglect and abuse from his parents. It is mostly silent with only occasional vocal outbursts of gibberish and soundtrack cues used to convey story. The music in the film was provided by a local group known as Tractor, and marked the first time Lynch would work with Alan Splet, who was recommended to the filmmaker by the soundman of The Alphabet. Initially, Lynch and Splet intended to use a collection of sound effects records for the film, but after going through them all they found that none of them were useful. So, Lynch and Splet took sixty-three days to make and record their own sound effects. After finishing The Grandmother, Lynch took the film to be shown at the AFI in Washington, D.C. The head of the AFI at the time, George Stevens, Jr. found that after all the films had been categorized, only Lynch's defied easy categorization. Stevens and Vellani recommended that Lynch apply to the AFI's Center for Advanced Film Studies. This was a filmmaking conservatory that Vellani had recently started in Beverly Hills. Lynch and Splet both applied for scholarships, and on the strength of The Grandmother (which won awards at film festivals in Atlanta, Bellevue and San Francisco), they were accepted into the program. The Amputee The Amputee (1974) was made for the American Film Institute while Eraserhead was in financial limbo. The AFI was testing two different stocks of black and white video, and enlisted Frederick Elmes to test each one. Lynch asked Elmes if he could shoot something with this stock, and he allowed him, so Lynch and Catherine Coulson stayed up all night writing the script. The result was a one shot scene with Catherine Coulson about a woman attempting to write a letter while a nurse (played by Lynch) tends to her leg stumps. It exists in two versions: one that goes for 4 minutes and 50 seconds, and one that goes for 4 minutes and 4 seconds. The Cowboy and the Frenchman The Cowboy and the Frenchman (1988, 26 minutes) is slapstick, made for French television as part of the series The French as Seen by... by French magazine Figaro. It stars Harry Dean Stanton, Frederic Golchan and Jack Nance. Premonitions Following an Evil Deed Lumière: Premonitions Following an Evil Deed (1996, 52 seconds) was originally included as a segment in the 1995 film Lumière et compagnie. Forty acclaimed directors created works using the original Cinematographe invented by the Lumière brothers. References Bibliography Category:American avant-garde and experimental films Category:American short films Category:American films Category:Films with screenplays by David Lynch Category:Short film compilations Category:Home video releases Category:Short films directed by David Lynch
High
[ 0.668456375838926, 31.125, 15.4375 ]
Jacksonville native was found dead in his home on Saturday Fans remembered Ryan Freel as a throwback baseball player, a guy who didn’t mind crashing headfirst into a wall or leaping into the stands if it meant making a catch. But the people who knew him the best said that the highlights were just one part of Freel. He was a friend, a father, a coach, a brother, and a son, a guy whose recent missions in life were to grow his local baseball organization and spend as much time as he could with his three young girls. That’s how friends chose to remember Freel, 36, who died on Saturday in his Brookchase Lane residence from a self-inflicted shotgun wound. His tenacious and all-out playing style made him one of the most visible players in baseball during an eight-year Major League Baseball career, six of those with Cincinnati, although the physical toll was substantial. Freel admitted to suffering numerous concussions during his baseball tenure. A day after Freel’s death, tributes to the Jacksonville native continued to pour in at a steady pace. Freel’s Facebook page was filled with condolences, memories, bible verses and above all, shock, over a tragedy that left friends and fans across the country stunned. Almost collectively, though, mourners chose to remember Freel’s life, and how a relentless work ethic carried an undersized 10th-round draft pick through 16 seasons of pro baseball, and brought him full-circle to enjoying life with his three daughters more than anything. Those closest to Freel, like his best friend, Bryan Farford, said that his work ethic was unlike anything he’s seen. “This is such an international sport, from Japan to the Dominican Republic, guys all over the world, and here you had a guy who was 5-10 at his very best, 175 pounds, from Jacksonville, who worked himself through the chain to get himself in the big leagues,” said Farford, 37, a teammate of Freel’s at Arlington Little League and later at Sandalwood. “That’s a pretty tall order. Talent only gets you so far. He had the extra work ethic; that sealed the deal for him.” Since retiring from professional baseball in 2010 following 16 seasons, Freel had returned to Jacksonville to embark on teaching the game to kids, something friends say that Freel was highly passionate about. He founded Big League Dreams, a travel program with handpicked coaches whose ties to professional ball made it a thriving organization to play in. He’d accepted a head coaching position at St. Joseph Academy last summer, but opted to step away from that to focus on growing BLD, said coach Derrick Gutierrez, a 1998 Sandalwood graduate. Gutierrez said that Freel’s focus was staying involved with the game through coaching youth baseball and that he was in a sense, reborn in doing that. The league would continue, Gutierrez, said, because Freel “would have wanted it to.” “He was a professional, he always wanted to give back to the kids,” said Gutierrez, a 12th-round pick of Baltimore in 1998. “He was always upbeat, laughing, giggling just like he was when he was on the big league field. That’s the way he taught the game.” It was also just how Freel operated, with a desire to help wherever he could. Charley Frank, Executive Director of the Reds Community Fund, which handles all of the team’s outreach initiatives, said that Freel was one of the most giving players that he’s ever dealt with, returning to help run camps and make appearances even though he wasn’t required to. “We’ve never had another one like him, he was so good to us, so good to our kids, so good to our volunteers,” Frank said. “After he came once or twice, he’d come on his own, he’d just show up. He lifted our entire program up. I just can’t say enough good things about who he was.” St. Augustine resident Zach Wedekind, 14, played for Freel’s BLD Reds. A lifelong Reds fan from Cincinnati, Wedekind was thrilled when he found out Freel was in town coaching youth baseball. He made the Reds’ U14 team and said that Freel became far more than just a coach, often swapping text messages with him. “He was like a big brother to me,” Wedekind said. “He just made my life better, with baseball, and made me a better person.” Freel’s rise from local baseball star to the big leagues was something that people in the local baseball circuit still talk about. A baseball junkie, Freel was such a good athlete that he made an impression on anyone he came across in whatever sport he was involved in. “He went 110 mph every time he went out,” said friend Alvin Parker, a 1996 Sandalwood graduate. “One day on the football field, he didn’t even play football (consistently) and he put on pads one time and just shellacked everybody out there. He was good at everything he did. He was a tender-hearted, hard-nosed person.” Freel played at both Sandalwood and Englewood in high school, and was picked in the 13th round in 1994 by St. Louis. Freel didn’t sign and went to Tallahassee Community College for a season before being drafted by Toronto in the 10th round of the 1995 draft. “We’ve always had a background together, I was always second team all-state and he was always first team all-state,” said Providence coach Mac Mackiewitz. “Those years (in college and pro baseball) I really got to know him. You know, a lot of guys who go high school, college, pros may take it easy when the y get there. He did the exact opposite. He made it and was just playing relentless. He fought for every out. I always encouraged my guys, especially my smaller guys, to watch him.” Freel had a couple of scrapes with the law, pleading guilty to a drunken driving charge in 2005 and then being arrested in January 2006 for disorderly intoxication. Freel later said that he had given up drinking, and friends said that he matured noticeably over the years, as his focus shifted into being an ambassador to baseball and being a father. “One thing I would tell anybody is how good of a dad he really was to those girls,” Farford said. “His ability to discipline them, get them to listen to him and the adoration they had for him was so apparent. He loved those girls unconditionally. He really was a good dad.”
Mid
[ 0.6229508196721311, 33.25, 20.125 ]
Q: Multiple Arrays in php for csv exporting I am trying to output multiple arrays into a csv file with pre-set headers. so far i can only manage to output 2 of the exact same results into the csv (sql result 0). I believe i have my "for" statements in a muddle somehow and believe this is probably very easy to fix but for the life of me cannot see it. Does anyone have any ideas at all, or any better way to do this csv output? // output headers so that the file is downloaded rather than displayed header('Content-type: text/csv'); header('Content-Disposition: attachment; filename="SageImport.csv"'); // do not cache the file header('Pragma: no-cache'); header('Expires: 0'); // create a file pointer connected to the output stream $file = fopen('php://output', 'w'); // send the column headers fputcsv($file, array('Reference', 'Company Name', 'Currency', 'Credit Limit', 'Main Address Type', 'Main Address Line 1', 'Main Address Line 2', 'Main Address Town', 'Main Address County', 'Main Address Post Code', 'Main Address Country', 'Main Contact Name', 'Main Contact Phone', 'Main Contact Type', 'Main Contact Mobile', 'Main Contact Email', 'Main Contact Fax', 'Address 2 Type', 'Address 2 Line 1', 'Address 2 Line 2', 'Address 2 Town', 'Address 2 County', 'Address 2 Post Code', 'Address 2 Country', 'VAT Number', 'Ledger Account', 'Payment Terms', 'Notes', 'Bank Account Name', 'Bank Account Sort Code', 'Bank Account Number', 'Bank Account IBAN', 'Bank Account BIC' )); $query = "SELECT * FROM clients WHERE sageexport='0'"; $result = mysql_query($query) or die("Error: ".mysql_error()); while ($row = mysql_fetch_array($result, MYSQL_NUM)) {$info[] = $row;} for ($i = 0; $i < count($info); $i++) { if ($info[$i][10] = "yes") {$agreed = 'Agreement';} $data = array($info[$i][1], $info[$i][2], 'GBP', '', '', $info[$i][3], '', $info[$i][4], $info[$i][5], $info[$i][6], 'GB', '', $info[$i][8], '', '', $info[$i][7], '', '', '', '', '', '', '', '', '', '10001', '10', $agreed, '', '', '', '', ''); } $agreed = ""; // output each row of the data for ($i = 0; $i < count($info); $i++) { foreach (array($data) as $row2){fputcsv($file, $row2);} } exit(); A: You are getting the same row twice because you overwrite $data each time through your first loop with this line: $data = array($info[$i][1], $info[$i][2], 'GBP', '', '', $info[$i][3], '', $info[$i][4], $info[$i][5], $info[$i][6], 'GB', '', $info[$i][8], '', '', $info[$i][7], '', '', '', '', '', '', '', '', '', '10001', '10', $agreed, '', '', '', '', ''); Either write the data to the buffer in that loop (the simplest option) or append each row to the array (which is what you're actually trying to do). To append it, you want something like this: $data[] = array($info[$i][1], $info[$i][2], 'GBP', '', '', $info[$i][3], '', $info[$i][4], $info[$i][5], $info[$i][6], 'GB', '', $info[$i][8], '', '', $info[$i][7], '', '', '', '', '', '', '', '', '', '10001', '10', $agreed, '', '', '', '', ''); // ^ this is the change that makes it work A Bit More Explanation $data is an array, but that doesn't make it magical. If you assign something to it, like $data = array(...);, that replaces whatever was there. You can't get that information back. This means that the end of your code makes no sense, specifically this piece (which I have formatted to make it readable): // output each row of the data for ($i = 0; $i < count($info); $i++) { foreach (array($data) as $row2){ fputcsv($file, $row2); } } You're trying to loop twice, once based on the number of rows in your MySQL result and once (the inner loop) based on what's in $data. But, since you only ever stored one row in $data, the inner loop won't work. And you really only need the inner loop (the foreach) anyway; the outer loop doesn't add anything if you actually save all of the rows into $data. A Few Other Points You have a number of other, major problems in this code. Please don't use mysql_*; the mysql_* functions are outdated, deprecated, and insecure - they have been removed entirely from modern versions of PHP (version 7.0 and higher). Use MySQLi or PDO instead. Never, ever use for(...; $variable < count(something); ...).* That requires count() to run every time your loop executes. This is murderous to performance. See phpbench.com for examples of how bad this kind of thing can be. As Syscall pointed out, you are doing a comparison with = in if ($info[$i][10] = "yes"). This should be == or even ===. The array() wrapper in foreach (array($data) as $row2)... is unnecessary and actually causing problems. (Also pointed out by Syscall.) Take it out. Please format your code. It's extremely difficult to read it the way you have it written, which is going to make maintaining it very unpleasant. * There's one exception here, if something can change size within your loop. But in that case, there's probably a better design for whatever you're doing than a simple for loop. And you're not doing anything like that here, anyway.
Low
[ 0.536082474226804, 26, 22.5 ]
Q: .each loop iterate based on element type and name Currently I have the following: $("textarea").each(function () { }); I like to do the loop only for textareas where the element name starts with dvSummary. A: Use an 'attribute value starts with' selector, such as: $("textarea[name^='dvSummary']") See documentation here https://api.jquery.com/attribute-starts-with-selector for more examples.
Mid
[ 0.604336043360433, 27.875, 18.25 ]
$(function () { "use strict"; $(function () { $(".preloader").fadeOut(); }); jQuery(document).on('click', '.mega-dropdown', function (e) { e.stopPropagation() }); // ============================================================== // This is for the top header part and sidebar part // ============================================================== var set = function () { var width = (window.innerWidth > 0) ? window.innerWidth : this.screen.width; var topOffset = 70; if (width < 1170) { $("body").addClass("mini-sidebar"); $('.navbar-brand span').hide(); $(".scroll-sidebar, .slimScrollDiv").css("overflow-x", "visible").parent().css("overflow", "visible"); $(".sidebartoggler i").addClass("fa fa-bars"); } else { $("body").removeClass("mini-sidebar"); $('.navbar-brand span').show(); $(".sidebartoggler i").removeClass("fa-bars"); $(".sidebartoggler i").addClass("fa fa-arrow-circle-o-left"); } var height = ((window.innerHeight > 0) ? window.innerHeight : this.screen.height) - 1; height = height - topOffset; if (height < 1) height = 1; if (height > topOffset) { $(".page-wrapper").css("min-height", (height) + "px"); } }; $(window).ready(set); $(window).on("resize", set); // ============================================================== // Theme options // ============================================================== $(document).on('click','.sidebartoggler', function () { if ($("body").hasClass("mini-sidebar")) { $("body").trigger("resize"); $(".scroll-sidebar, .slimScrollDiv").css("overflow", "hidden").parent().css("overflow", "visible"); $("body").removeClass("mini-sidebar"); $('.navbar-brand span').show(); $(".sidebartoggler i").addClass("fa fa-bars"); } else { $("body").trigger("resize"); $(".scroll-sidebar, .slimScrollDiv").css("overflow-x", "visible").parent().css("overflow", "visible"); $("body").addClass("mini-sidebar"); $('.navbar-brand span').hide(); $(".sidebartoggler i").removeClass("fa-bars"); } }); // topbar stickey on scroll $(".fix-header .topbar").stick_in_parent(); // this is for close icon when navigation open in mobile view $(document).on('click',".nav-toggler",function () { $("body").toggleClass("show-sidebar"); $(".nav-toggler i").toggleClass("fa fa-bars"); $(".nav-toggler i").addClass("fa fa-times"); }); $(".sidebartoggler").on('click', function () { $(".sidebartoggler i").toggleClass("fa fa-times"); }); // ============================================================== // Auto select left navbar // ============================================================== $(function () { var url = window.location; var element = $('ul#sidebarnav a').filter(function () { return this.href == url; }).addClass('active').parent().addClass('active'); while (true) { if (element.is('li')) { element = element.parent().addClass('in').parent().addClass('active'); } else { break; } } }); // ============================================================== //tooltip // ============================================================== $('.tooltips').tooltip({ selector: "[data-toggle=tooltip]", container: "body" }) // ============================================================== //Popover // ============================================================== $(function () { $('[data-toggle="popover"]').popover() }) // ============================================================== // Sidebarmenu // ============================================================== $(function () { $('#sidebarnav').metisMenu(); }); // ============================================================== // Slimscrollbars // ============================================================== // ============================================================== // Resize all elements // ============================================================== $("body").trigger("resize"); // ============================================================== // To do list // ============================================================== $(".list-task li label").click(function () { $(this).toggleClass("task-done"); }); // ============================================================== // Collapsable cards // ============================================================== $(document).on("click", ".card-actions a", function(e) { if (e.preventDefault(), $(this).hasClass("btn-close")) $(this).parent().parent().parent().fadeOut(); }); (function ($, window, document) { var panelSelector = '[data-perform="card-collapse"]'; $(panelSelector).each(function () { var $this = $(this) , parent = $this.closest('.card') , wrapper = parent.find('.card-body') , collapseOpts = { toggle: false }; if (!wrapper.length) { wrapper = parent.children('.card-heading').nextAll().wrapAll('<div/>').parent().addClass('card-body'); collapseOpts = {}; } wrapper.collapse(collapseOpts).on('hide.bs.collapse', function () { $this.children('i').removeClass('fa fa-times').addClass('fa fa-plus'); }).on('show.bs.collapse', function () { $this.children('i').removeClass('fa fa-plus').addClass('fa fa-times'); }); }); $(document).on('click', panelSelector, function (e) { e.preventDefault(); var parent = $(this).closest('.card'); var wrapper = parent.find('.card-body'); wrapper.collapse('toggle'); }); }(jQuery, window, document)); });
Low
[ 0.48734177215189806, 28.875, 30.375 ]
require 'rubygems' require 'rake/testtask' begin require 'rcov/rcovtask' Rcov::RcovTask.new do |t| t.libs << "test" t.rcov_opts << "--exclude gems" t.test_files = FileList["test/**/*_test.rb"] end rescue LoadError warn "Proceeding without Rcov. gem install rcov on supported platforms." end begin require 'yard' YARD::Rake::YardocTask.new do |t| yardlib = File.join(File.dirname(__FILE__), "yardlib/llvm.rb") t.options = %W[-e #{yardlib} --no-private] t.files = Dir['lib/**/*.rb'] end rescue LoadError warn "Yard is not installed. `gem install yard` to build documentation." end Rake::TestTask.new do |t| t.libs << "test" t.test_files = FileList["test/**/*_test.rb"] end task :generate_ffi do require 'ffi_gen' mappings = { ["llvm-c/Core.h"] => "core_ffi.rb", ["llvm-c/Analysis.h"] => "analysis_ffi.rb", ["llvm-c/ExecutionEngine.h"] => "execution_engine_ffi.rb", ["llvm-c/Target.h"] => "target_ffi.rb", ["llvm-c/BitReader.h", "llvm-c/BitWriter.h"] => "core/bitcode_ffi.rb", ["llvm-c/Transforms/IPO.h"] => "transforms/ipo_ffi.rb", ["llvm-c/Transforms/Scalar.h"] => "transforms/scalar_ffi.rb", } mappings.each do |headers, ruby_file| FFIGen.generate( :module_name => "LLVM::C", :ffi_lib => "LLVM-3.1", :headers => headers, :cflags => `llvm-config --cflags`.split(" "), :prefixes => ["LLVM"], :blacklist => ["LLVMGetMDNodeNumOperands", "LLVMGetMDNodeOperand", "LLVMInitializeAllTargetInfos", "LLVMInitializeAllTargets", "LLVMInitializeNativeTarget"], :output => "lib/llvm/#{ruby_file}" ) end end task :default => [:test]
Mid
[ 0.5962732919254651, 36, 24.375 ]
We weren't expecting it, but we are HERE for it. Yes, Star Wars' JJ Abrams and Queen of Drag Race RuPaul are teaming up for a dramedy series about Ru's life. According to Deadline, the comedy-drama series will 'fictionalise' RuPaul's rise from club kid to global LGBTQ icon against the backdrop of 1980s New York. Exciting stuff, we know. The series will be written by Power and Orange Is the New Black's Gary Lennon, and Abrams' Bad Robot will produce alongside World of Wonder, who work on RuPaul's Drag Race. It's been a great year so far for RuPaul, who recently announced his marriage to long-time partner Georges LeBar. The couple, who have been together since 1994, tied the knot back in January but didn't reveal the news immediately as they prefer to keep their relationship private. Of his husband, Ru said recently: "He's a great guy, but he doesn't care about show business at all. He couldn't care less." Season 9 of RuPaul's Drag Race is finally returning to our screens this Friday (March 24) – and Lady Gaga is involved. Let's hope the contestants remember not to be a drag, just a queen. Twitter Related: JJ Abrams interview on Jimmy Fallon goes hilariously wrong Teasing the upcoming season as "bigger, better and more twisted than ever", Mama Ru thanked Logo for having faith in the series – which Digital Spy readers voted the best reality show ever, btw. "Thank you Logo for continuing to provide a powerful platform for these brave, gorgeous and creative souls to tell their stories," he said. "They represent the hopes and dreams of all the outsiders around the world." Want up-to-the-minute entertainment news and features? Just hit 'Like' on our Digital Spy Facebook page and 'Follow' on our @digitalspy Twitter account and you're all set. This content is created and maintained by a third party, and imported onto this page to help users provide their email addresses. You may be able to find more information about this and similar content at piano.io
Low
[ 0.5090543259557341, 31.625, 30.5 ]