text
stringlengths 8
5.74M
| label
stringclasses 3
values | educational_prob
sequencelengths 3
3
|
---|---|---|
Sunday 4 April 2004 It was Sunday, under the sign of Aries. The US president was George W. Bush (Republican). In that special week of April people in US were listening to Yeah! by Usher. In UK Cha Cha Slide by DJ Casper was in the top 5 hits. Before Sunset, directed by Richard Linklater, was one of the most viewed movies released in 2004 while The Da Vinci Code by Dan Brown was one of the best selling books.But much more happened that day: find out below.. Books PREMIUM MASS MARKET EDITION #1 Worldwide Bestseller—More Than 80 Million Copies Sold As millions of readers around the globe have already discovered, The Da Vinci Code is a reading experience unlike any other. #1 NEW YORK TIMES BESTSELLERIn 1970, Willie Traynor comes to Clanton, Mississippi, in a Triumph Spitfire and a fog of vague ambitions. Within a year, the twenty-three-year-old finds himself the owner of Ford County’s only newspaper, famous for its well-crafted ... | Mid | [
0.551724137931034,
34,
27.625
] |
KRISLOV v. REDNOUR April 21, 2000 CLINTON A. KRISLOV AND JOAN A. SULLIVAN, INDIVIDUALLY AND ON BEHALF OF ALL OTHERS SIMILARLY SITUATED, PLAINTIFFS,V.WANDA L. REDNOUR, CHAIRMAN OF THE STATE BOARD OF ELECTIONS; HANNELORE HUISMAN, VICE CHAIRMAN OF THE STATE BOARD OF ELECTIONS; RONALD D. MICHAELSON, EXECUTIVE DIRECTOR OF THE STATE BOARD OF ELECTIONS; AND KENNETH R. BOYLE, JUDITH A. JONES, MITCHELL P. KOBELINSKI, DAVID E. MURRAY, LANGDON D. NEAL, AND THERESA M. PETRONE, MEMBERS OF THE STATE BOARD OF ELECTIONS, DEFENDANTS. The opinion of the court was delivered by: Bucklo, District Judge. MEMORANDUM OPINION AND ORDER In 1996, Clinton Krislov ran for the Democratic party's nomination as a U.S. Senator, while Joan Sullivan sought nomination as a Representative in the U.S. House of Representatives. Pursuant to the Illinois Election Code, as administered by the Illinois State Board of Elections, to be placed on the primary ballot, a candidate must gather a requisite number of valid nominating signatures. The plaintiffs' nominating petitions contained more than the requisite number of signatures, but objectors challenged the validity of these signatures on various grounds set forth in the Election Code, including that the circulators that collected signatures on the petitions were not registered voters in the political division the plaintiffs were seeking nomination. Fighting these objections consumed time and resources; Mr. Krislov withdrew from the race, and Ms. Sullivan lost her bid for the nomination. As a result, Mr. Krislov brought this action, alleging that certain provisions of the Illinois Election Code and certain procedures and practices of the State Board of Elections violated their First and Fourteenth Amendment Rights. Joan Sullivan was added as a named plaintiff in the Amended Class Action Complaint which sought class-wide declaratory and injunctive relief pursuant to 42 U.S.C. § 1983. I granted the plaintiffs' motion for class certification but dismissed some of their claims. The parties thereafter settled all but one of the claims. On July 7, 1999, after the Supreme Court ruled on a very similar case, I granted summary judgment for the plaintiffs on the issue that the Election Code's requirement that a petition circulator be a registered voter in the candidate's political division is unconstitutional. Based on the grant of summary judgment, the plaintiffs move here for attorneys' fees and costs under 42 U.S.C. § 1988.*fn1 The defendants object claiming, first, that Mr. Krislov is not entitled to any fees because he represented himself, and second, that the attorneys' fees and costs sought are unreasonable. The plaintiffs first claim Kay does not apply because Krislov & Associates, not Mr. Krislov himself, was counsel in this litigation. This argument, that Mr. Krislov should be treated separately from the law firm that bears his name, and in which he is the only partner, is unconvincing. It is impossible to believe that Mr. Krislov was not calling the shots in this lawsuit, and he admits as much in the affidavit submitted along with the fee petition. Next, plaintiffs argue that the Kay rule does not apply where, as here, an attorney represents himself and other parties to the litigation. They rely upon Schneider v. Colegio De Abogados De Puerto Rico, 187 F.3d 30 (1st Cir. 1999), in which the First Circuit distinguished Kay and granted attorneys' fees to a plaintiff who represented himself and another attorney in a lawsuit which succeeded in invalidating the use of bar dues for ideological purposes by the mandatory bar of Puerto Rico. In so holding, the court stated: The first question is whether any fees should be awarded in light of the fact that attorney Schneider was a plaintiff as well as counsel. Here, Ramos is a plaintiff and Schneider also represented Ramos; the fees incurred by plaintiffs are essentially the same whether or not Schneider was also a plaintiff. . . . Thus, in our view, the prohibition in Kay against awarding attorney's fees to an attorney pro se litigant does not apply. Schneider, 187 F.3d at 32. The Court's holding in Kay, which creates a limited exception to the general policy in favor of recovery of attorneys' fees, is narrow: a pro se plaintiff, even one who is an attorney, is not entitled to an award of attorneys' fees under 42 U.S.C. § 1988. Kay v. Ehrler, 499 U.S. 432, 438, 111 S.Ct. 1435, 113 L.Ed.2d 486 (1991). Mr. Krislov was not a pro se plaintiff, so Kay does not control here. Were he the only plaintiff, he would be entitled to no attorneys' fees under Kay, but Ms. Sullivan is also a named plaintiff, the plaintiff class was certified, and Krislov & Associates was deemed adequate class counsel. The Kay Court stated that "the word `attorney' assumes an agency relationship as the predicate for an award under § 1988." Id. at 436, 111 S.Ct. 1435. Here, an attorney relationship existed between Mr. Krislov, Ms. Sullivan, and the rest of the plaintiff class, so the predicate is met. As to defendants' argument that this case has always been about only one plaintiff, Mr. Clinton Krislov, it is true that Mr. Krislov instituted this action because of events which occurred during his primary campaign, and he was the most obviously harmed by the restrictions. Nonetheless, he was not proceeding pro se. Oxendine v. Williams, 509 F.2d 1405 (4th Cir. 1975) (a pro se plaintiff cannot bring a class action). Moreover, his actions have changed the process for becoming a candidate and presumably opened up the democratic process. To this extent, Mr. Krislov has done a service to the citizens of Illinois, who may have been harmed either because they wished to run for office or because their choices were limited by these procedures. It is well-established that a prevailing plaintiff under civil rights legislation should receive attorneys' fees almost as a matter of course. Bond v. Stanton, 630 F.2d 1231, 1233 (7th Cir. 1980) (quoting Davis v. Murphy, 587 F.2d 362, 364 (7th Cir. 1978)). The Supreme Court has previously recognized that Congressional policy favors private enforcement of civil rights acts and mandates a liberal construction of attorney's fee statutes. Texas State Teachers Association v. Garland Independent School District, 489 U.S. 782, 109 S.Ct. 1486, 103 L.Ed.2d 866 (1989). I doubt the Court intended to extend Kay to prohibit attorneys' fees in all situations where an attorney-client relationship exists, but the attorney also has a personal interest in the outcome of the case and any fees awarded. I therefore conclude that Kay does not preclude the plaintiffs from recovering reasonable attorneys' fees.*fn2 II. Having determined that Mr. Krislov may seek attorneys' fees, I must now determine what award is appropriate. As a threshold matter, a party prevails for purposes of 42 U.S.C. § 1988 if it succeeds on a "significant issue in the litigation which achieves some of the benefits the plaintiffs sought in bringing suit." Zabkowicz v. West Bend Co., 789 F.2d 540, 548 (7th Cir. 1986). As I stated above, the plaintiffs, having won summary judgment, have prevailed on a significant issue of constitutional law and achieved a vindication of civil rights for the benefit of voters and candidates in Illinois. As such, they are entitled to their reasonable attorneys' fees.*fn3 To calculate attorneys' fees under Section 1988, I begin with the number of hours reasonably expended on the case multiplied by a reasonable hourly rate, then look to other factors*fn4 which may lead to an upward or downward adjustment of the fee. Hensley v. Eckerhart, 461 U.S. at 433-37, 103 S.Ct. 1933; Gekas v. Attorney Registration & Disciplinary Comm'n, 793 F.2d 846, 851-52 (7th Cir. 1986). The defendants object ... Our website includes the first part of the main text of the court's opinion. To read the entire case, you must purchase the decision for download. With purchase, you also receive any available docket numbers, case citations or footnotes, dissents and concurrences that accompany the decision. Docket numbers and/or citations allow you to research a case further or to use a case in a legal proceeding. Footnotes (if any) include details of the court's decision. If the document contains a simple affirmation or denial without discussion, there may not be additional text. Buy This Entire Record For $7.95 Download the entire decision to receive the complete text, official citation, docket number, dissents and concurrences, and footnotes for this case. | Low | [
0.528436018957345,
27.875,
24.875
] |
Hallucinations in Parkinson’s disease (PD) are usually visual, that is, seeing things that are not there. Auditory hallucinations do occur, but very infrequently. Although hallucinations are common in advanced Parkinson’s disease, they may also surface in early PD after medications are introduced. They are central clinical features in PD dementia and Dementia with Lewy Bodies (DLB), but drug-induced hallucinations may occur without dementia. Hallucinations often manifest as people or animals. For example, seeing strangers out the window, children in the yard, or animals in the house is common. In the mildest form, this may simply be a nondescript shape out of the corner of the eye, or bugs crawling. Insight varies, and some people recognize the absurdity of their illusions, whereas others may try to interact with the illusory phenomena. Hallucinations in PD may be very episodic and often not tied to any provocative factor. In view of this lack of predictability, PD patients with hallucinations must be told not to drive; they should resume driving only when cleared by the physician who must be satisfied that the hallucinations have completely resolved… hallucinations can usually be controlled with medication simplification and sometimes with additional drug therapy. Rapid eye movement (REM) sleep behavior may be mistaken for nocturnal hallucinations and must be distinguished. This had entirely different implications and treatment… …In most cases, PD drugs play a prominent role in the provocation of hallucinations and delusions. However, they are not the sole cause; the PD neurodegenerative process predisposes and they may occur even among patients not taking any drugs. Regardless, the initial theraputic focus is on potentially culpable drugs. In clinical trials enrolling previously untreated PD patients, dopamine agonists were 2-3 times more likely to induce hallucinations than carbidopa/levodopa monotherapy. This may relate to the fact that pramipexole, ropinirole, and rotigotine all have selectivity for D3 dopamine receptors. D3 receptors are primarily localized to the emotional/behavioral circuits of the limbic system. Adjunctive PD drug therapy, in general, substantially increases the risk of hallucinations/ delusions. Certainly, carbidopa/levodopa does occasionally provoke hallucinations, but once any adjuctive drug is added, the risks markedly escalate. This includes not only dopamine agonists, but also monoamine oxidase-B (MAO-B) inhibitors (selegiline, rasagiline) as well as the catechol-O-methyltransferase (COMT) inhibitors (entacapone, tolcapone). This propensity to provoke hallucinations and delusions is not confined to dopaminergic PD drugs. The glutamate N– methyl-D-aspartate (NMDA) antagonist, amantadine, may also provoke hallucinations, as may the pharmacologically similar Alzheimer’s drug, memantine. Also, the anticholinergic PD medications, trihexyphenidyl and benztropine, are notorious for not only impairing memory, but also occasionally causing psychosis. Certain of the urologic anticholinergic drugs may similarly exacerate hallucinations, especially hyoscyamine (Cystospaz, Levsin) and oxybutynin (Ditropan) and less frequently tolterodine (Detrol). Darifenacin, solifenacin, and trospium appear to have only marginal potential for this problem. Our Privacy Policy sets out how Oxford University Press handles your personal information, and your rights to object to your personal information being used for marketing to you or being processed as part of our business activities. We will only use your personal information to register you for OUPblog articles. my mum has parkinsons and has been seeing dead relatives an d small dogs and children Peter Draper25th January 2010 I was diagnosed 2005, and on 1gm levodopa (madopar – 200mg x 5) during the day. At night I often – while awake – hear a rustling and then feel an animal (maybe a cat – we have cats) crawling across the bed. It’s a bit scary. Turning on the lights makes it stop. My neurologist has prescribed Seroquel 25 mg, but it makes me so groggy that although I don’t wake up, my next day is like being in a sleep vice. no good. Better to put up with the hallucinations! My 87-year-old father has Parkinsons and has recently been admitted to a nursing home. He is being treated with carbidopa. Although he was never paranoid, combative or aggressive at home, since admittance to the nursing home, he is all three. It puzzles the family, and the staff doesn’t quite know what is triggering this either. Is this likely the disease process? The sudden change in environment (he had been at his home for the past 20 years), or a change in the dosage? Marines6th September 2010 John, did you mean eliminating the levodopa prescribed at bedtime? how are you doing 8 months later? Chrissy9th September 2010 My 70 year old mother was diagnosed with PD in 1995. Over the last couple of years she’s reported seeing flashes or illusions of people in her peripheral vision. About a year or so ago she had a scary incident of hallicinating and was told to stop taking one of her meds. This did the trick until recently when she began seeing people inside/outside of her house on a regular basis. Today one of her “friends”, as we now jokingly refer to them as, was with her all day. She said this was the first time she was actually scared. She describes the people she sees very vividly and that they are “ugly” and never speak, but just stare at her. She is very candid about these experiences and, most painfully, she is totally lucid and knows what she sees is not real. I am fearful that things are progressing quickly to a level that will not/cannot be remedied. Am I right? Don’t know what to do to help. Thanks. John, which medication are you on for the PD? Is it Sinimet? My husband has had PD since 1993. He was taking Stalevo and did not have th hallicinations until we changed to the Sinimet. They did not start immediately, now they are very annoying to me. my father is 78 and has had PD for about 10 years he has has hallucinations for about the last 5 years which started as incects and flies and have now progressed to evil looking people who he claims eat human flesh? at one stage he was taken into hospital because he was convinced that they were comming out of the walls and was so frightened he managed to walk almost a mile to the policve station to ask for help. He cant manage more than a dozen or more steps normally. Whilst he was in hospital they adjusted his drugs and for a short time he seems to be less bothered and saw the images less. He has now moved into extra care accomodation and has assistance with his drugs from carers but in the last few weeks has started seeing people in his room? its all a part of the condition we are told and there is nothing that can be done so we have to help him live with it? distracting him sometimes helps and we try to take him out as much as possible but as his condition develops this is difficult. i jusy hope it is not heredatary because i would rather go in my sleep than cope with what has happened to him. he has lost his independance and still thinks he is much younger man and is finding life frustrating. he is taking Stalevo. BRUCE22nd January 2014 my aunt has had pd for about 10 years now. she says she sees my uncle bringing another man in their house at wee hours of the night/morning. she has said she can hear them talking too. we think she is hallucinating as her comments are very off the wall for her. she is accusing my uncle of very bad things. She is very paranoid. she could never describe him but now she is giving descriptions of him. we are totally lost as to what to do here. help please Kurt24th July 2014 I am very intrested in the hallucinations caused by PD. Seems that the cats and dogs are seeing things also. I am in the onset of PD. I have noticed small shadowey creatures about the size of a cat that are just barely out of my vision. If my cat is inbetween us she is also looking in that direction when i glimps whatever it is, when it moves. I just thought it kinda weird. H17th October 2014 My dad had a very rapid progression with Parkinson’s. He was super intelligent and was very much a renaissance man, able to do anything he put his mind to and do it well. Parkinson’s took him down fast and he became confused. It made him very sad that he once could do so many things and knew so much and then all of a sudden lost track of thought and capability so quickly. His Parkinson’s doctors were some of the best and they knew very little about how to treat Parkinson’s. They adjusted his medication constantly like he was an experiment. He had a brain stimulator and they adjusted that as well. In his later stages he became more and more confused. He had hallucinations at night and would get up and leave the house and walk down the street normally, though he had trouble walking. At that point, I came to live with my parents so I could take care of him. He complained of seeing haints and children playing when there was no one there, he later complained of zombies and people in the house with glowing eyes tormenting him and staring at him. The doctors blamed the medication and the rapid progression as the cause. Truthfully they knew less about it than we did. Sadly Parkinson’s is still a medical mystery. One that doesn’t have a profitable enough cure. I left to go to Europe and took my dad and mom to stay with relatives while I was gone for 10 days. While I was gone he got anxious and had a bad spell with hallucinations and my family members allowed him to go home by himself. A few days before I got back I found out he killed himself in the front yard. No one I left him with was watching him. Now I wish I had never left. My neighbors told me they saw him running around the house like a young man, with full use of his legs. Last I saw him he could barely walk with a cane. He had told them he was seeing people in the house and cars and that they were trying to get him. Parkinson’s is a hateful, unforgiving, uncontrollable and traumatizing disease. To all those that have it I feel deep sorrow. I wish there could be a cure. I pray no one ever loses their loved ones to such circumstances. But If your loved one starts to hallucinate, do something, you have to. Don’t leave it up to others. Look after your loved ones. The medication may suppress the shaking but the side affects are often worse and add to the hallucinations. Do not get upset with your loved one, it’s not their fault and they are not crazy, they are just seeing things that you cannot see. Their minds are being manipulated by chemical reactions. D.k.Ray24th January 2017 My wife is having PD for the last five years.She is suffering from hallucinations for the last one week. Dr. has reduced dopamine dose. Is that ok? Jalen Albury9th May 2017 I now understand what it is like for Mr. Keniya, a friend of our family I have been DX with Dopa Responsive Dystonia have been on Sinimet for 4 years. Didn’t have hallucinations until 4 months ago. While I recognize them as hallucinations, and sleep with a light on, I am still bothered by this development. Heard auditory hallucination only once, but it was a deep growl coming from a cabinet. Of course there was nothing there. I am a retired Clinical Therapist, and feel better equipped than most to recognize the hallucinations for what they are. However, I do live alone and worry that I may leave the house at night. David10th July 2017 My wife has had dopa-responsive dystonia (DRD) diagnosed around 10 years ago, For the past couple of years, she has had worsening hallucinations, similar to those describe by others in this discussion. She is on Sinemet, which she takes at regular 3 hour intervals throughout the 24 hour period, and entacapone (Comtan) every 8 hours. We find that entacapone makes the symptoms worse, and that lowering the dose of that drug helps somewhat. Seroquel 25 mg at night helps her sleep and reduces hallucinations at night. We are searching for bette ways to control this without adding too much Seroquel, but it’s difficult without under-medicating. Her DRD has a lot of Parkinson’s-like features, which not all cases do. Very rare, so hard to generalize from one person’s experience. Every case seems a bit different. LeeAnn15th November 2017 Has anyone loved one with parkinson’s hallucinate a light source that moves and then a light source that is like two eyes and also a light source that is in a corner of the room and then the light almost looks like a figure. Help? Lori mcneal11th January 2018 My husband has PD and we have been there I am thinking we are not the only ones that going through all the different stages of this difficult disease Parkinson. We called the things he saw ghosts , and the rock people that came to life next door. When he is in an more open space they would be worse.The drug his DR put him on was Quetiapine fumarate 25 mg it help then they started to return so the Dr add Nuplazid 2 – 17 MG tabs so far so good time will tell. Ann Thompson2nd February 2018 Medical marijuana was legalized in this state. I applied for and got approved. I had been taking I dose of cinemet in the morning and 2 at night to prevent horrific cramping. I am happy to report that I am only taking my morning dose and no longer have hallucinations! Debra17th August 2018 My father has PD and I came home for the summer to take care of him and my mom. Needless to say it has been a really long summer. My dad has hallucinations, he has long conversations with people at night while he sleeps. He sees people he hasn’t seen in years, as if they where just there. He is taking Amantadine, (100 mg) Nuplazid (2x 17mg) and Quetiapine (25mg) Last night, after a call to his Dr, he recommended 2x Quetiapine at night… This extra 25 mg left him paralyzed in his bed, unable to get up and out of bed and he subsequently urinated all over himself and the bed. It was terrible for him…easy to clean, but left him feeling helpless. I am hoping someone out there has some thoughts on all these drugs and the use of them together. I have read that amantadine causes the hallucinations, and this is got me thinking …how important is amantadine? His tremors have never been a really big deal. It is only his right hand, not any where else on his body. So confused about all these drugs… Anyone else feel this way?? | Mid | [
0.627249357326478,
30.5,
18.125
] |
A Bharatiya Janata Party worker washed party MP Nishikant Dubey's feet and drank the water at a function in Jharkhand's Godda district, triggering an uproar. The incident came to light when Dubey went to lay the foundation stone of a bridge at Kanbhara village in Godda block -- around 330 km from Ranchi -- on Sunday, with Pawan Kumar Sah washing the feat of the BJP MP on a metal plate and then gulping it. The incident in full public view went viral on social media and sparked controversy. Criticising the incident, the state Congress described it as shameful. "WOW! Washing the feet has been tradition, says BJP. And making an OBC drink the same water is also BJP tradition? Shameful!" it posted on Twitter. Dubey, meanwhile, addressed a press conference here on Monday in the presence of Sah, alleging that the Opposition was harping on the incident after failing to cash in on issues like the Rafale deal and fugitive businessman Vijay Mallya. When pressed further, the two-time MP from Godda constituency pointed towards Sah and said he would answer. Justifying his act, Sah said Dubey was like his elder brother and he had decided to do the ritual after the sanction of the bridge. Denying any possibility of being forced to wash Dubey's feet, he said, "There was a knife with me. Had anybody put pressure on me I would have stabbed myself." "Washing his feet and consuming the water had been in my mind when I told him (Dubey) to construct a bridge, so that reaching to a hospital would be reduced by seven km," the party worker said, warning that he would to lodge a case if anybody indulged in misinformation. | Low | [
0.427991886409736,
26.375,
35.25
] |
When using a firearm, think SMART and be sure to follow the following five primary safety rules provided by the Pennsylvania Game Commission: S – Safe Direction: Keep your firearm pointed in a safe direction at all times. M – Make Sure: Positively identify your target. A – Always Check: Know what’s beyond your target before shooting. R – Respect Firearms: Treat all firearms as if they are loaded. T – Trigger Caution: Don’t touch the trigger until ready to shoot. The American Trauma Society, Pennsylvania Division (ATSPA) offers educational materials on hunting and gun safety. Visit www.atspa.org for more information. Visit the Pennsylvania Game Commission website for more information: https://www.pgc.pa.gov/ | High | [
0.699857752489331,
30.75,
13.1875
] |
Polymers of oxystyrene series primarily including hydroxystyrene are used as functional polymer materials in various industrial fields. In particular, such polymers are used in the field of electron materials, particularly as raw materials for resin components for semiconductor resists. Additionally, such polymers are now being investigated for use as photosensitive resin components for layer insulation films and surface protective films of semiconductor devices and the like. Improvement in the properties of oxystyrene-series polymers and imparting novel properties to oxystyrene-series polymers are desired due to the high integration and enlarged size of semiconductor devices, the thinner and downsized sealing resin packages, transfer to surface mounting with solder reflow and the like. In view of this, it is now attempted to introduce various structure units into oxystyrene-series polymers by copolymerizing oxystyrene-series polymers with monomers copolymerizable with the oxystyrene-series polymers. For example, Patent Document 1 proposes a photosensitive resin composition obtained by using a hydroxystyrene-series ABA-type triblock copolymer which uses an elastomer block including butadiene and isoprene as the component B. Patent Document 1 describes that the thermal shock resistance of polyhydroxystyrene can be improved by introducing the elastomer block including butadiene and isoprene. However, the segment including butadiene and isoprene has poor solubility in developing solutions and poor adhesion to substrates, so the ratio of the segment could not be raised and the effect of improving the thermal shock resistance was not sufficient. Alternatively, oxystyrene-series monomers primarily including hydroxystyrene have cationic polymerization reactivity, being greatly different from those of vinyl ether-series monomers. Hence, it has been very difficult to obtain a copolymer of an oxystyrene-series monomer and a vinyl ether-series monomer. For example, Patent Document 2 describes a method for producing a narrowly dispersible copolymer of an oxystyrene-series monomer and a vinyl ether-series monomer by living cationic polymerization, using a halogenated organic compound and a metal halide with Lewis acidity as initiators. Due to the difference in polymerization profiles between the respective monomers, the ratio of the vinyl ether monomer in the copolymer cannot be raised and thus, the ratio of the vinyl ether-series monomer incorporated in the copolymer was about 15 mol % at the most. In Patent Document 2, further, an oxystyrene-series monomer and a vinyl ether-series monomer are preliminarily mixed together and made to react using a monofunctional initiator. In such system, it is considered that only the vinyl ether-series monomer with fast reactivity is polymerized first and then, the oxystyrene-series monomer is polymerized continuously. Once an oxystyrene-series monomer is added to the resulting polymer, the vinyl ether-series monomer with significantly different reactivity no longer reacts with the resulting product, so the polymer obtained is not a random copolymer but a diblock copolymer, meaning that ABA-type triblock copolymer could not be obtained. Due to the same reason, it was difficult to synthetically prepare an ABA-type triblock copolymer by sequential reactions of an oxystyrene-series monomer and a vinyl ether-series monomer using a monofunctional initiator. Various approaches have been studied, including separately preparing a polystyrene-series polymer and polyvinyl ether under different polymerization conditions, subsequently introducing a substituent at the end of the polyvinyl ether, and linking the polystyrene-series polymer through the substituent to the polyvinyl ether. For example, Patent Document 3 discloses a method for producing a block polymer comprising a polystyrene-series polymer component and a polyvinyl ether-series polymer component, comprising preparing polyvinyl ether having hydroxyl group at the end of the polymer by living cationic polymerization of vinyl ether using a polymerization initiator with hydroxyl group protected with trimethylsilyl group and the like and subsequently conducting cationic polymerization of styrenes using the resulting polyvinyl ether as a terminator. Even in Patent Document 3, it is only a diblock polymer of polystyrene and poly(t-butyl vinyl ether) that is specifically described about the synthesis thereof. There are no examples shown in Patent Document 3 of the synthesis of an ABA-type triblock copolymer of polyvinyl ether and an oxystyrene-series polymer. Additionally, a block copolymer obtained by using polyvinyl ether comprising hydroxyl group at the end of the polymer as a terminator is disadvantageous in that it is thermally unstable because the polystyrene-series polymer component and the polyvinyl ether-series polymer component are linked together through an ether bond. Patent Document 4 discloses a method for producing polyalkenyl ether with thiol group at both ends of the polymer comprising living cationic polymerization of vinyl ether using alkenyl ether with thiocarbonyl ester bond at a side chain as an initiator and a specific thiocarboxylate salt or a thioester compound as a terminator. The polyalkenyl ether with thiol group at both ends as obtained by the above method are used as a chain transfer agent to polymerize various vinyl polymers which are radical-polymerizable to obtain an ABA-type triblock polymer having the polyalkenyl ether as the center block (as the component B). Patent Document 4 however does not show any specific synthetic example of the block polymer nor disclose any polymerization method of a ABA-type triblock copolymer of polyvinyl ether and an oxystyrene-series polymer. In case where the polyalkenyl ether with thiol group at the ends of the polymer is used as a chain transfer agent, the resulting ABA-type triblock copolymer is thermally unstable because the component A and the component B are bonded together through sulfur atom, so that the triblock copolymer is readily colored during drying or heating, which is disadvantageous. With the radical polymerization method, polymerization can be performed in a simple manner but the molecular weight distribution cannot be controlled. Hence, there is a problem that narrow polymer which is narrowly dispersible cannot be obtained by the method. In any of the methods, it is essential to prepare the segment comprising polyvinyl ether and the segment comprising an oxystyrene-series polymer synthetically in separate steps. Thus, the methods were laborious. As described above, there are no reports describing about a ABA-type triblock copolymer comprising polyvinyl ether and an oxystyrene-series polymer. Therefore, there is a demand for development of a thermally stable ABA-type triblock copolymer comprising polyvinyl ether as the center block and a simple process of producing the same. Patent Document 1: JP-A-2004-240143 Patent Document 2: JP-A-2003-342327 Patent Document 3: JP-A-2001-19770 Patent Document 4: JP-A-H6-116330 | High | [
0.661417322834645,
31.5,
16.125
] |
HIV Hunter Dr Indrani Sarkar and her team of scientists have created an enzyme that destroys the HIV virus under laboratory conditions. The Tre enzyme can detect HIV and specifically target, and unlike most medicines out there, the virus doesn't become immune to it, so the effects are long-term. According to IBN, "It's an engineered enzyme which recognises sequences in the HIV genome that is duplicated, integrated virus and by the process of recombination, it cuts out the virus from the genome." "The only way then to cure HIV is to get rid of the virus completely and Tre, the enzyme that Indrani constructed after a year and its 126 "cycles of mutation" totally deplete HIV in the human genome in three months in laboratory conditions." | Mid | [
0.646766169154228,
32.5,
17.75
] |
// Copyright (c) 2015-present Mattermost, Inc. All Rights Reserved. // See LICENSE.txt for license information. import {shallow} from 'enzyme'; import React from 'react'; import FileAttachment from 'components/file_attachment'; import SingleImageView from 'components/single_image_view'; import FileAttachmentList from './file_attachment_list'; describe('FileAttachmentList', () => { const post = {id: 'post_id', file_ids: ['file_id_1', 'file_id_2', 'file_id_3']}; const fileInfos = [ {id: 'file_id_3', name: 'image_3.png', extension: 'png', create_at: 3}, {id: 'file_id_2', name: 'image_2.png', extension: 'png', create_at: 2}, {id: 'file_id_1', name: 'image_1.png', extension: 'png', create_at: 1}, ]; const baseProps = { post, fileCount: 3, fileInfos, compactDisplay: false, enableSVGs: false, isEmbedVisible: false, locale: 'en', actions: {getMissingFilesForPost: jest.fn()}, }; test('should render a FileAttachment for a single file', () => { const props = { ...baseProps, fileCount: 1, fileInfos: [ {id: 'file_id_1', name: 'file.txt', extension: 'txt'}, ], }; const wrapper = shallow( <FileAttachmentList {...props}/>, ); expect(wrapper.find(FileAttachment).exists()).toBe(true); }); test('should render multiple, sorted FileAttachments for multiple files', () => { const wrapper = shallow( <FileAttachmentList {...baseProps}/>, ); expect(wrapper.find(FileAttachment)).toHaveLength(3); expect(wrapper.find(FileAttachment).first().prop('fileInfo').id).toBe('file_id_1'); expect(wrapper.find(FileAttachment).last().prop('fileInfo').id).toBe('file_id_3'); }); test('should render a SingleImageView for a single image', () => { const props = { ...baseProps, fileCount: 1, fileInfos: [ {id: 'file_id_1', name: 'image.png', extension: 'png'}, ], }; const wrapper = shallow( <FileAttachmentList {...props}/>, ); expect(wrapper.find(SingleImageView).exists()).toBe(true); }); test('should render a SingleImageView for an SVG with SVG previews enabled', () => { const props = { ...baseProps, enableSVGs: true, fileCount: 1, fileInfos: [ {id: 'file_id_1', name: 'image.svg', extension: 'svg'}, ], }; const wrapper = shallow( <FileAttachmentList {...props}/>, ); expect(wrapper.find(SingleImageView).exists()).toBe(true); }); test('should render a FileAttachment for an SVG with SVG previews disabled', () => { const props = { ...baseProps, fileCount: 1, fileInfos: [ {id: 'file_id_1', name: 'image.svg', extension: 'svg'}, ], }; const wrapper = shallow( <FileAttachmentList {...props}/>, ); expect(wrapper.find(SingleImageView).exists()).toBe(false); expect(wrapper.find(FileAttachment).exists()).toBe(true); }); test('should match state on handleImageClick', () => { const wrapper = shallow( <FileAttachmentList {...baseProps}/>, ); wrapper.setState({showPreviewModal: false, startImgIndex: 0}); const newImageIndex = 1; wrapper.instance().handleImageClick(newImageIndex); expect(wrapper.state('showPreviewModal')).toEqual(true); expect(wrapper.state('startImgIndex')).toEqual(newImageIndex); }); test('should match state on hidePreviewModal', () => { const wrapper = shallow( <FileAttachmentList {...baseProps}/>, ); wrapper.setState({showPreviewModal: true}); wrapper.instance().hidePreviewModal(); expect(wrapper.state('showPreviewModal')).toEqual(false); }); }); | Mid | [
0.554298642533936,
30.625,
24.625
] |
[Alizapride versus placebo in premedication for esophagogastroduodenoscopy. Double-blind clinical study. Experimental research in vitro]. The pronounced antiemetic properties of Alizapride, one of the new azimidobenzamides suggested the assessment of its efficacy on 40 patients due for oesophagogastroduodenoscopy. The drug proved highly satisfactory as premedication for the examination, significantly inhibiting vomiting and stomach wall tone during the examination as was indicated by in vitro studies. | High | [
0.6869983948635631,
26.75,
12.1875
] |
ite? True Suppose -4*d - 2174 = b, -4*d + 2899 + 1449 = -2*b. Is b*(3 + 7/(-2)) a composite number? False Let u(t) = -182*t + 30. Let p be u(-8). Let c = p + -319. Is c a composite number? True Suppose -6*g + 19 = -29. Suppose -6*h = -g*h + 230. Is h prime? False Let c = -4 + -2. Let p(l) = -l**3 - 5*l**2 + 7*l + 9. Let o be p(c). Suppose 4*n = -3*m + 25, -o*m = 2*m + 3*n - 60. Is m composite? True Suppose -2*p + 61 + 33 = 0. Is p a prime number? True Suppose -114436 + 23144 = -4*l + 2*u, -5*l + 2*u + 114113 = 0. Is l a prime number? False Let u = -1641 + 3109. Let z = u + -376. Suppose -4*q + z = -568. Is q a prime number? False Suppose 12*h = 3*h + 1017. Is h a prime number? True Let k = 21793 + -14006. Is k a prime number? False Let n(o) = 91*o + 40. Is n(27) prime? False Let m(r) = -40*r - 3. Let p be m(-3). Let g be ((-7)/3 - -2) + 2865/(-45). Let f = p + g. Is f composite? False Let x = 42 + -37. Suppose 8 = 4*w, -3*w = c - x*w - 73. Is c prime? False Let g(v) = -2*v**3 - 3*v**2 + 4*v + 11. Let z be g(-4). Suppose j + 5*t = 64, -3*t - z = -3*j + 207. Is j a prime number? True Suppose -3*v = -m + 3*m - 28, 3*m - 4 = 5*v. Let g be (129 + 0)*m/24. Suppose -5*f + 3*h + 239 = h, 0 = f - 2*h - g. Is f prime? False Let a(g) = 12491*g**2 - 3*g + 3. Is a(1) composite? False Suppose 5*x + 5 = 0, -t - 484 = -x - 84. Let v = 1197 - 1887. Let p = t - v. Is p composite? True Let j be (-50)/4 + (-4)/8. Let n = -17 - j. Is 729/21 - n/14 a prime number? False Let c(f) = -37*f - 5. Let z(q) = q**3 - 10*q**2 - 9*q - 11. Let t be z(11). Let n = t + -15. Is c(n) a prime number? False Let a = 1161 - 1952. Let o = -444 - a. Is o a composite number? False Let h(b) = -2*b - 6. Let q be h(-5). Suppose 2*v - q*r = 26, 2*v - 5 = -r + 1. Suppose v*w = -2*j - 2*j + 318, -j + 87 = 5*w. Is j a composite number? True Let l be (-2)/(4/(-6)) - 1. Suppose 3*u + 847 = r, 2*r = -l*u - 2*u + 1734. Is r prime? True Suppose 5*m - m - 1084 = 0. Suppose -3*j = 5*p - m, -3*j + 145 = 3*p - 20. Is p prime? True Let w(c) be the third derivative of 173*c**5/15 - c**4/8 - 2*c**3/3 + 18*c**2. Is w(-1) a prime number? True Suppose -1385*h = -1372*h - 242593. Is h a prime number? True Let v = -1927 + 2896. Let q = 1822 - v. Is q composite? False Suppose 37*k - 28*k = 3411. Is k composite? False Let t = 60 - 55. Suppose -t*w - 1143 = -8*w. Is w composite? True Let m be ((-114)/4)/(5/220*2). Let w = m + 1070. Is w prime? True Is 1294*6*(-11)/(-132) a composite number? False Suppose -7*y + 3*y = -k - 7671, -5*k = y - 1944. Is y prime? False Let q(m) = 0*m + 1 + 37*m + 14*m. Let o be q(-9). Let w = -207 - o. Is w a composite number? False Let a(x) = -2 - 4 + 0 + 12*x + 9*x**2 - 2. Is a(7) composite? True Suppose -12 - 13 = -5*l. Is 3142/l + 5*15/125 composite? True Let o(q) be the first derivative of 9*q**3 + 5*q**2/2 + q - 5. Is o(3) composite? True Let t be ((-3)/((-9)/8))/((-4)/1590). Is (-2)/(-9) - (t/9 + -1) a prime number? False Let k(g) = 3983*g**2 - 4*g + 2. Is k(-1) a composite number? False Let n = -19040 - -12943. Let o = n - -9600. Is o composite? True Let x(h) = 2*h**3 - 64*h**2 + 64*h - 27. Is x(38) composite? True Let c be ((-6)/(-1))/((-6)/(-2972)) + -1. Suppose 0 = -k + t + 867, -3*t = 3*k + 394 - c. Is k a prime number? True Let x be (6/3 - 75)/(-1). Let n = x - 21. Suppose t - 3*j + 12 - n = 0, 5*j + 44 = t. Is t a prime number? False Suppose -3*n - 2*n = -6330. Is ((-24)/36)/((-4)/n) composite? False Let b(v) = v**3 - 18*v**2 + 34*v - 28. Is b(27) composite? False Let q(t) = -t - 2. Let v be q(-2). Let u(l) = l + 395. Let f be u(v). Suppose 7*m - 2*m - f = 0. Is m composite? False Suppose -4*n - 38079 = -13*n. Let u = n + -966. Is u composite? True Let u(x) = -4670*x - 36. Is u(-11) a composite number? True Let b = -4414 - -10973. Is b a prime number? False Let c(r) = 4*r - 18. Let i = -5 + 10. Let z be c(i). Suppose 4*u - 93 = -g, -2*g = z*g - 3*u - 296. Is g a composite number? True Let h(n) = 126*n**3 + 1. Let t(c) = c**2 + 7*c + 1. Suppose 4*u - 2*u + 14 = 0. Let v be t(u). Is h(v) prime? True Suppose 3*j - 12 = g, 2*g - 3*g = -4*j + 15. Suppose 50 = 3*d - 5*f, -j*f + 3 - 6 = 0. Is d prime? False Let h(i) = -i**3 - 12*i**2. Suppose 0 = -5*f - 4*o - 68, -2*o + 44 = -4*f - 0*o. Let v be h(f). Suppose v = -w - 99 + 302. Is w composite? True Suppose 3*t + 4*w + 4 = t, -2*w = -t + 14. Let y(o) = -14 + 20*o**2 + 7 + t + 4. Is y(5) a composite number? False Let n = 2793 + 4105. Is n composite? True Let h = 7024 - -24895. Is h a prime number? False Suppose 3*n - 5635 - 3632 = 0. Let b = n - 1708. Is b a composite number? False Let y = 79765 - 36471. Is y composite? True Is 527 + 30 + (-4)/6*-3 composite? True Let h = 16 + -40. Let r be (-231)/6*h/7. Let d = 25 + r. Is d a prime number? True Let o(u) = -u**3 - 3*u**2 - 8*u + 43. Is o(-21) composite? True Let s be 96/42 + (-4)/14. Suppose -z + 603 = s*z. Is z composite? True Suppose 5*c + 5*t = -1880, -2*c - c - 1130 = 4*t. Let z be (c/(-6))/((-8)/(-24)). Let g = z - 108. Is g prime? True Let a = -13 - -7. Let m be 18972/27*a/4. Is m/(-8) - (-9)/(-12) composite? False Is ((21 - -2) + -1)/(22/90299) a composite number? True Suppose 23*r = 37*r - 9590. Is r prime? False Suppose 21*n - 306148 - 138653 = 0. Is n composite? True Suppose -70443 = -5*c - b, -2*c - 5*b + 28191 = -0*b. Suppose 0 = -4*o + 12*o - c. Is o composite? True Is 1973/(-3)*(2 + -10 - 1) prime? False Let f(g) = -2 + 2*g**2 + 5*g**2 - 6*g**2 + 3. Let t be f(0). Let q(d) = 748*d + 1. Is q(t) prime? False Let w = 74 + -65. Is (-2)/w + (-2)/(-54)*6999 a composite number? True Let r(n) = 68*n**2 - 7*n - 3. Is r(14) a composite number? True Suppose -4*z + 28 = 3*i, -75 = -5*i + z - 2*z. Suppose -7*c + 5*c + i = 0. Suppose 13*w - c*w = 2485. Is w a composite number? True Suppose -5 = 4*g + 19. Let p be -1 + (-12)/((-4)/1). Is (-1)/p - 1905/g composite? False Suppose 29*q = -19*q + 683664. Is q a prime number? True Let y be 20/3*351/6. Let q = -554 + y. Let n = 27 - q. Is n a prime number? True Let p(f) = -3*f - 15. Let r be p(-6). Is (1/r)/((-12)/(-15192)) a composite number? True Let z(r) = -r**3 - 2*r**2 - 3*r + 1. Let x be 136/24 + (-4)/6. Let s be z(x). Let t = 366 + s. Is t prime? False Let u be (10/35 - (-519)/21) + -1. Let g = u - 13. Is g a composite number? False Let o(g) = 4*g + 24. Let m be o(-5). Suppose 2*f + 10231 = 3*j, -2 = -f - m. Is j a prime number? False Suppose 3*s + 344 - 1235 = d, 879 = 3*s - 5*d. Is s composite? True Let v(l) = -l**3 - 8*l**2 - 2. Let h be (-48)/(-15) - (-1)/(-5). Suppose j = -4*x - 3*j - 44, 42 = -4*x - h*j. Is v(x) a prime number? True Let x = 14 + -12. Let j = 2 - x. Suppose 310 = l - 3*v, -5*l - 4*v = -j*v - 1531. Is l composite? False Let c = 88 - 50. Suppose c = -49*l + 50*l. Is l a prime number? False Let z(n) = 3*n**2 - 14*n + 66. Is z(-17) a composite number? False Let p(a) = 5*a**2 - 206*a + 563. Is p(84) prime? True Let q(s) = 357*s - 46. Is q(5) prime? False Let y = -2275 - -1055. Let i = y + 2229. Is i prime? True Let p(l) = -l**2 + 1764. Let q be p(0). Let f = -1057 + q. Is f a composite number? True Suppose 0 = -p + 1148 + 4793. Is p composite? True Let q be (36/(-20) - -2) + 12559/5. Suppose -4*r = -4*l + q, -l + 1251 = l - 3*r. Is l prime? False Let z = -3 + 6. Let y(q) = -q**3 + q - q - 4*q + z + 4*q**2. Is y(2) prime? True Let a(n) = n**2 - n - 137. Let l be a(0). Let z = -622 - -880. Let g = l + z. Is g prime? False Let y = -312 - 186. Let q be 285/75 - 2/(-10). Is (q/(-4) - y) + 0 a composite number? True Suppose -3*w = -0*a - a - 1692, 2*w = -3*a + 1117. Is w a composite number? False Suppose 2*i - 31735 = -5*v, -12*v - 4*i + 25376 = -8*v. Is v a composite number? True Let p(q) = -q**2 + 6*q - 3. Let j be p(3). Let z be ((-14)/j - -2)*-1446. Suppose z = 5*s - 113. Is s a prime number? False Let c(b) = b**3 - 6*b**2 - 15*b - 6. Let n be c(8). Suppose n*s + 2*s + 2508 = 0. Let r = -160 - s. Is r a composite number? False Suppose -25 = -53*c + 48*c. Let i(w) = 34*w - 11. Is i(c) a prime number? False Suppose 48*o - 2*o - 694186 = 0. Is o a composite number? False Let s(f) = f**2 - f + 4. Let u be s(0). Suppose -u*c = -7448 + 2764. Is c composite? False Is (-1)/(7 - 1307640/186804) a prime number? False Let | Low | [
0.494047619047619,
20.75,
21.25
] |
A pharmacological analysis of the responses of isolated aorta from rats with adjuvant arthritis. In order to investigate whether chronic inflammation alters the reactivity of vascular smooth muscle, the effects of various agonists have been compared on isolated aortae from rats with and without arthritis. No significant differences in the EC50 values and maximal responses to 5-hydroxytryptamine (5-HT), noradrenaline (NA) and potassium chloride (KCl) were observed. When calcium was removed from Krebs solution the responses to 5-HT and NA were significantly higher in the preparations from arthritic rats. Verapamil had the same inhibitory effect on the responses of both groups. This suggests that the reactivity of the aortic smooth muscle from arthritic rats is less dependent on extracellular calcium than that of the control preparations. | Mid | [
0.64207650273224,
29.375,
16.375
] |
.\" $NetBSD: rpc.5,v 1.3 2000/06/15 20:05:54 fvdl Exp $ .\" $FreeBSD: src/lib/libc/rpc/rpc.5,v 1.11 2005/01/20 09:17:04 ru Exp $ .\" $DragonFly: src/lib/libc/rpc/rpc.5,v 1.2 2003/06/17 04:26:45 dillon Exp $ .\" @(#)rpc.4 1.17 93/08/30 SMI; from SVr4 .\" Copyright 1989 AT&T .Dd December 10, 1991 .Dt RPC 5 .Os .Sh NAME .Nm rpc .Nd rpc program number data base .Sh SYNOPSIS .Pa /etc/rpc .Sh DESCRIPTION The .Nm file contains user readable names that can be used in place of RPC program numbers. For each RPC program a single line should be present with the following information: .Pp .Bl -enum -compact .It name of the RPC program .It RPC program number .It aliases .El .Pp Items are separated by any number of blanks and/or tab characters. A hash .Pq Dq Li # indicates the beginning of a comment; characters up to the end of the line are not interpreted by routines which search the file. .Sh FILES .Bl -tag -width /etc/nsswitch.conf -compact .It Pa /etc/nsswitch.conf .El .Sh EXAMPLES Below is an example of an RPC database: .Bd -literal # # rpc # rpcbind 100000 portmap sunrpc rpcbind rusersd 100002 rusers nfs 100003 nfsprog mountd 100005 mount showmount walld 100008 rwall shutdown sprayd 100012 spray llockmgr 100020 nlockmgr 100021 status 100024 bootparam 100026 keyserv 100029 keyserver .Ed .Sh SEE ALSO .Xr getrpcent 3 | Mid | [
0.5900900900900901,
32.75,
22.75
] |
Critical role of myofascial reeducation in pediatric sleep-disordered breathing. Limited studies suggest that pubertal development may lead to a recurrence of sleep-disordered breathing (SDB) despite previous curative surgery. Our study evaluates the impact of myofunctional reeducation in children with SDB referred for adenotonsillectomy, orthodontia, and myofunctional treatment in three different geographic areas. A retrospective investigation of children with polysomnographic analysis following adenotonsillectomy were referred for orthodontic treatment and were considered for myofunctional therapy. Clinical information was obtained during pediatric and orthodontic follow-up. Polysomnography (PSG) at the time of diagnosis, following adenotonsillectomy, and at long-term follow-up, were compared. The PSG obtained at long-term follow-up was scored by a single-blinded investigator. Complete charts providing the necessary medical information for long-term follow-up were limited. A subgroup of 24 subjects (14 boys) with normal PSG following adenotonsillectomy and orthodontia were referred for myofunctional therapy, with only 11 subjects receiving treatment. Follow-up evaluation was performed between the 22nd and 50th month after termination of myofunctional reeducation or orthodontic treatment if reeducation was not received. Thirteen out of 24 subjects who did not receive myofunctional reeducation developed recurrence of symptoms with a mean apnea-hypopnea index (AHI)=5.3±1.5 and mean minimum oxygen saturation=91±1.8%. All 11 subjects who completed myofunctional reeducation for 24 months revealed healthy results. Despite experimental and orthodontic data supporting the connection between orofacial muscle activity and oropharyngeal development as well as the demonstration of abnormal muscle contraction of upper airway muscles during sleep in patients with SDB, myofunctional therapy rarely is considered in the treatment of pediatric SDB. Absence of myofascial treatment is associated with a recurrence of SDB. | High | [
0.6892950391644901,
33,
14.875
] |
Cyclone Oswald Tropical Cyclone Oswald in 2013 passed over parts of Queensland and New South Wales, Australia over a number of days, causing widespread impact including severe storms, flooding, and water spouts. Coastal regions of Queensland were the most impacted with Mundubbera, Eidsvold, Gayndah and Bundaberg in the Wide Bay–Burnett hit severely. In many places the rainfall total for January set new records. Across the affected region, damage from severe weather and flooding amounted to at least A$2.4 billion. 7,500 residents of Bundaberg and patients at the Bundaberg Hospital were evacuated. Houses were completely washed away and parts of Bundaberg's sewage network were destroyed. Cuts to transport links including damage to numerous bridges, communication interruptions, electrical blackouts and water supply problems were experienced across wide areas. Several swiftwater rescues had to be undertaken. Meteorological history On 17 January, the Australian Bureau of Meteorology's Tropical Cyclone Warning Centres and the United States Joint Typhoon Warning Center (JTWC) started to monitor a tropical low that had developed within a marginal environment for further development over the Gulf of Carpentaria. Over the next two days, the cyclone slightly developed further before the system made landfall to the southwest of Borroloola early on 19 January, where the possibility for further development became stifled. By 20 January, the system completed a clockwise loop before re-emerging into the Gulf of Carpentaria. Once back over water, the system quickly organised and strengthened into Tropical Cyclone Oswald early on 21 January. At the same time, the JTWC began monitoring the system as Tropical Cyclone 11P. Radar imagery from Mornington Island depicted a well-defined low-level circulation with defined banding features wrapping into the centre. Situated in a very moist air mass and over the warm waters of the Gulf, some intensification was expected before Oswald struck the Cape York Peninsula. Approximately 12 hours after being named, the storm made its second landfall north of Kowanyama with winds of 65 km/h (40 mph) and the final advisory was issued by the TCWC in Brisbane. Although over land, the system was able to maintain a defined circulation and gradually reorganised as it moved southwestward. By 23 January, deep convection redeveloped over the circulation and a strong monsoonal flow became established to its north. A high pressure system over New Zealand blocked the low pressure system from moving east, away from the Queensland coast, allowing the low to move slowly along the Queensland coast also causing it to stall near Rockhampton and in southern Queensland; feeding moist air from the Coral Sea into the low which resulted in a large area of convective activity with associated heavy rainfall and a low pressure trough over New South Wales allowed the low to move south into the Tasman Sea. Favourable upper-level conditions and ample moisture allowed the system to maintain its identity despite remaining over land for a prolonged period of time. By 30 January, the system had travelled more than and its remnants passed south of Sydney in New South Wales, emerging into the Tasman Sea. Preparations Queensland As a precautionary measure, on 25 January Queensland Premier Campbell Newman ordered the pre-emptive release of water from Wivenhoe Dam to increase the dam's flood mitigation capacity. Releases from North Pine Dam were also made. New South Wales Due to the threat of heavy rains from Oswald, flood warnings were issued for much of northern New South Wales. By 28 January, moderate and major flood warnings were in place for the Bellinger, Kallang, Macleay, Manning, Nambucca, and Tweed Rivers, as well as Camden Haven, the Clarence Valley (including the Orara River), and Hastings. Severe weather warnings were also in place for much of the state, indicating the threat of heavy rains, destructive winds, and dangerous seas. Hundreds of travellers were stranded at Sydney Airport as flights were cancelled due to dangerous winds. Floods and severe weather Queensland Rainfall was initially the heaviest around Tully where approximately of rain fell, with falling over 48 hours. The town of Ingham was completely cut off due to high waters. Residents in the town were advised to stock up on emergency supplies as the Herbert River rose rapidly after of rain fell in the town in just three hours. A brief tornado or waterspout with winds of touched down near Hay Point. On the afternoon of 26 January, three separate tornadoes tore through the Bundaberg Region. At approximately 1:00 pm, the first tornado struck the town of Bargara, which brought down power lines, tore off roofs and smashed windows. At 3:30 pm, the town of Burnett Heads was battered by a second tornado, and soon after a third tornado struck Coonarr, south of Bargara. The tornadoes injured at least 17 people and damaged 150 properties. Weather conditions favoured tornadic activity because of strong low-level winds which were feeding into the low pressure system. The Burnett River reached a new recorded height of on 29 January. More than 7,500 residents of Bundaberg were forced to evacuate from about 2,000 homes as the river's waters rose. 130 patients were evacuated from the Bundaberg Hospital to hospitals in Brisbane. Staff and resources from the Department of Health, Queensland Ambulance Service, Australian Defence Force, CareFlight (now LifeFlight) and Royal Flying Doctor Service, including several aircraft, were used to transport patients. As of 29 January, the floods had claimed the lives of four people, including a three-year-old boy who died after being crushed by a falling tree at Gordon Park. On 28 January, the body of a man who was swept away by floodwaters the day before was pulled from Oxley Creek, while the bodies of two others – a 27-year-old man and an 81-year-old man – were also recovered in Gympie and Burnett Heads respectively. At Gympie flood waters from the Mary River swamped around 100 business and 25 residents. In Maryborough about 50 businesses and 150 homes were inundated as waters from the Mary River rose. In Mundubbera the Burnett River peaked at 22.9 m at 1 am on 28 January. 100 homes and businesses were inundated in the town with about the same number flooded in the surrounding area. In Gayndah, 60 homes and 12 businesses were flooded. A landslide severed the Burnett Highway between Gayndah and Mundubbera. Kumbarilla, Kogan and Tara west of Dalby were completely isolated after the new A$4.6 million Wilkie Creek Bridge on Dalby-Kogan road was submerged by rising creek levels as the Moonie Highway flooded. About 40 houses were flooded in the Darling Downs town of Warwick. Unlike the flooding which occurred in January 2011 at Ipswich and Brisbane, the flooding there was caused by the natural flooding of the creek system rather than deliberate dam releases. Waters in Laidley in the Lockyer Valley reached an all-time high with the main street in the town inundated. At Waterford in Logan City, the Logan River reached a peak of 9 m at midnight on 28 January. Flood waters were slow to recede along the river. A mudslide hit three houses in Logan City. During 29 January, Brisbane's main water treatment plant at Mount Crosby was shut down after the high levels of sediment and silt in the Brisbane River caused record turbidity levels, which resulted in Seqwater and Queensland Premier, Campbell Newman urging residents to conserve water and to only use it for "drinking, cooking and bathing". Water supplies in some suburbs of Brisbane were expected to run out during 30 January, after an increase in consumption. The Gold Coast Desalination Plant was engaged from standby mode to supplement supplies with of water a day. New South Wales An estimated 41,000 people were temporarily isolated by flooding in New South Wales. In the Tweed Valley the Tweed River peaked at on 28 January, the highest level recorded in 30 years. In Grafton the Clarence River peaked a new record height of . Records for the river height in Grafton go back to 1839. The city's levee was credited with preventing more severe flooding. Despite that, around 1,500 people who lived closed to the Clarence River were asked to evacuate on the night of 28 January. Maclean was spared flooding from the Clarence River due to the town's levee. The Clarence Valley was not as fortunate, with many properties cut off and without power. The area was officially declared a disaster zone, as was the Tweed Shire. Minor flooding and road closures were experienced in the Hunter Valley. Impact In many affected areas the flooding would have been worse had the weather prior to the heavy rains not been so dry. In the 24 hours to 5 am on 27 January the Queensland State Emergency Service logged more than 800 requests for assistance. An exclusion zone was set up by police in Bundaberg North because damaged buildings and infrastructure posed significant safety risks. It wasn't until 2 February before limited access was granted for around 1,000 residents. By 28 January, nearly a quarter of households in South East Queensland (around 300,000 homes and businesses) experienced power interruptions including 88,000 in Brisbane, 32,000 on the Sunshine Coast, 28,000 in Moreton Bay area and 28,000 on the Gold Coast. About 2,000 powerlines were brought down by storms. More premises lost power in this storm event than in the January 2011 floods. By 9pm 31 January approximately 5,300 premises were still without power. The main coastal fibre-optic cable was cut near Colosseum causing widespread disruptions. This was followed by further damage to the alternate cable north of Harlin late on 26 January, resulting in widespread failures of mobile, landline, ATM, EFTPOS, broadband services and the 000 Emergency response number. The result of both of Telstra's major communications routes in Queensland being cut was that the towns of Mackay, Freshwater, Cairns, Rockhampton, Mount Morgan, Townsville, Mount Isa and Gladstone were almost completely isolated from communications technology. Telstra services were largely restored within 24 hours of the incident. Power outages resulted in disruptions to a number of Optus phone services. The rail network in South East Queensland was heavily impacted by the storms, with inner city Brisbane lines particularly affected. The Bruce Highway, Bruxner Highway, Carnarvon Highway and Pacific Highway were all closed for some time. The Gwydir Highway was cut because of a landslide west of Grafton. Some coal production in Central Queensland had been impacted because of transport disruptions. The Port of Gladstone suspended ship loading on 26 January due to poor weather, however loading resumed the following day. Alumina and liquified natural gas production in the state experienced minor impacts with operations returning to normal levels shortly after the wild weather had passed. On the evening of 26 January, Awoonga Dam reached a new record water height level of . The citrus industry in the Wide Bay–Burnett region was hit hard with losses totalling hundreds of millions of dollars, higher than the cost of the 2011 floods. In Moreton Bay, seagrass beds are expected to endure greater damage than from the 2011 floods, when is some place 80% of the seafloor vegetation was lost. Sediment flows from the Brisbane River were expected to be much higher in this flood, placing the bay's dugong population at risk. Aftermath Impacts Campbell Newman launched the Red Cross Flood Appeal on 28 January. The state government donated $1 million to begin the appeal. By 4 February only $6 million had been raised for the flood appeal. Concerns were raised over the low figure as emergency payments alone would need funding of between $15 million to $25 million. Government of Queensland disaster assistance was being offered in 21 local government areas shortly after the floods. The new Community Recovery Minister is David Crisafulli whose local government responsibilities were expanded to deal with flood recovery. Plans for relocation rather than re-building as well as the construction of new dams and levees were put forward soon after the floods. On 1 February Deputy Commissioner of Police, Brett Pointing APM, was appointed to oversee the recovery activities in the Bundaberg and North Burnett Regions. On 3 February it was announced that Colonel Don Cousins AM, CSC would oversee recovery activities in North Queensland with Brigadier Bill Mellor, DSC, AM responsible for southern Queensland. On 8 February it was announced the state and federal governments had reached an agreement concerning funding to avenge public infrastructure. The arrangement which also includes sporting, recreational and community facilities, means that infrastructure can be rebuilt to a higher standard so that it may withstand future disasters. Around 28,000 claims for insurance were lodged in Queensland. In February 2013, more flash flooding occurred throughout Queensland and New South Wales, further impacting the damage already created from Cyclone Oswald the previous month, resulting in one death, and the need for some evacuations. See also 2010–11 Queensland floods 2012–13 Australian region cyclone season Cyclone Tasha Floods in Australia March 2010 Queensland floods References External links Flooding along the Fitzroy River: NASA Earth Observatory Australia floods Category:2013 in Australia Category:Floods in Australia Category:Floods in New South Wales Category:History of Queensland Category:History of Gold Coast, Queensland Category:History of Brisbane Category:Queensland floods Category:Weather events in Australia Oswald Oswald Category:2012–13 Australian region cyclone season Category:2013 disasters in Australia | Mid | [
0.582608695652173,
33.5,
24
] |
Email DOES THE GLOVE FIT? WHAT SCIENTISTS ARE OVERLOOKING Corrosive acid. Radioactive waste. Mutagenic agents. Handling hazardous materials is all in a day’s work for many scientists and researchers. But despite the potential risks associated with these substances, too many workers overlook a key piece of equipment meant to protect them: the humble hand glove. “I asked a room full of scientists, ‘How many of you were trained on how to select or pick out a glove?’” says Carolina Krevolin, senior category manager, Scientific Gloves at Kimberly-Clark Professional*. “Not one of them raised their hand.” The only thing separating scientists’ hands from the often toxic materials they work with is the glove. But proper glove fit isn’t always addressed in academic or professional settings. “I have a doctorate in chemistry, and no one ever discussed proper glove use with us,” Krevolin recalls. “A lot of the time, when I was an undergraduate, we didn’t even wear gloves in the laboratory.” Not Too Big, Not Too Small; Gloves Sized Just Right According to Krevolin, one of the most important questions scientists, and others who work with hazardous materials, should be asking themselves is, “Does the glove fit?” Gloves that are too small run the risk of ripping, exposing researchers to contamination. If a glove is too large, leaving unnecessary wiggle room, it can inhibit dexterity—once again making the wearer vulnerable to health risks. Krevolin notes that a perfect fit adheres without shrinking, molds itself to the hand’s natural shape and gives the wearer’s fingers maximum mobility. But hands come in all shapes and sizes. Therefore, to ensure safety, Krevolin stresses that wearers identify both the proper glove size and the appropriate glove length for the situation. For instance, a medical office professional could use a 9.5-inch, medium-size glove. But someone with a similarly sized hand working more directly with potentially harmful substances would want to use a 12-inch glove to cover the wrist while conducting lab work or a 16-inch glove while working in an anaerobic container. Latex and Nitrile and Polyisoprene—Oh My! Glove material is another key consideration. Latex is one of the most recognizable material types, but gloves made from nitrile can ensure an even greater level of safety in some situations. Since latex reverts to its original shape once it’s removed, it can be nearly impossible to spot pin-size holes. “[But] with nitrile you will see a tear in the glove,” Krevolin explains. “It is designed so that you can see where you are at risk of being contaminated.” Latex originates in the liquid of rubber trees found in areas like Thailand and Malaysia. Allergies to latex proteins are common, making nitrile gloves a popular alternative because they are made from the nonallergenic, synthetic byproduct of oil and latex. Professionals who work in some health care environments must also be sure that their gloves have been approved by the Food and Drug Administration (FDA). Indeed, medical exam gloves are subject to a battery of rigorous trials before they can be deemed medical-grade and sold with the word “exam” on the box. According to Krevolin, the FDA has several requirements before a glove can be sold. For instance, a glove needs to meet the FDA's minimum requirements for pinholes (AQL 2.5), which is the minimum pinhole level the manufacturer must meet to be considered a medical glove. If it does not, the FDA can put a hold on those gloves until the problem is fixed. Implementing Best Practices Given how entrenched researchers can be in their work, Krevolin acknowledges it can be difficult for them to find the time to stay on top of the best practices for glove use. But Kimberly-Clark Professional’s* APEX program serves as an instructional course for customers using Kimberly-Clark Professional* gloves in their facilities. APEX, which stands for ‘Alignment’ ‘Project Management’ ‘Engagement’ and ‘Exceptional Workplaces’ is a complimentary program where users are appropriately fitted with new gloves, trained on any relevant materials and given the opportunity to raise questions or concerns they may have about switching to new gloves. “Believe it or not, the glove business is a very drama-filled business,” Krevolin shares. “When it comes to your hands, people tend to be very particular about what they use.” | Mid | [
0.606315789473684,
36,
23.375
] |
He will order the U.S. government not to enforce the law against these 5 million, and declare that they are to be exempt from deportation and granted green cards. Where did Obama get his 4-5 million figure, not 2-4 million, or 5-7 million? Nowhere in law, but plucked out of his own mind, as to what he can get away with. Barack Obama just felt it was about right. Our rogue president has crossed an historic line, and so has the republic. Future presidents will cite the "Obama precedent" when they declare they will henceforth not enforce this or that law, because of a prior commitment to some noisy constituency. We have just taken a monumental step away from republicanism toward Caesarism. For this is rule by diktat, the rejection of which sparked the American Revolution. The political, psychological and moral effects of Obama's action will be dramatic. Sheriffs, border patrol, and immigration authorities, who have put their lives on the line to secure our broken borders, have been made to look like fools. Resentment and cynicism over Obama's action will be deeply corrosive to all law enforcement. Businessmen who obeyed the law and refused to hire illegals, hiring Americans and legal immigrants instead, and following U.S. and state law on taxes, wages and withholding, also look like fools today. Obama's action makes winners of the scofflaws and hustlers. Bosses who hired illegals off the books will also receive de facto amnesty. La Raza is celebrating. But, make no mistake, a corrupt corporate crowd is also publicly relieved and privately elated. Immigrants who waited in line for years to come to America, and those waiting still, have egg on their faces. Why, they are saying to themselves, were we so stupid as to obey U.S. laws, when it is the border-jumpers who are now on the way to residency and citizenship? When the world hears of the Obama amnesty, millions more from Latin America, Africa, Asia and the Middle East will be coming. And if they cannot get in legally, they will walk in, or fly in, and overstay their visas. Why not? It works. That this action will be as much a part of Obama's legacy as Obamacare is certain. The unanswered question is how the Obama amnesty will be remembered by history. His aides think that it will be seen as a second Emancipation Proclamation. Perhaps. But with this amnesty Obama takes custody of and responsibility for the entire illegal population. He is the patron saint of illegal aliens. And for what they do, he will be held accountable, as was Jimmy Carter for the Marielitos Castro sent and Carter welcomed. If the amnestied illegals contribute to the drug trade and violent crime, that will be Obama's legacy to his country. If they turn up disproportionately on the welfare rolls, exploding state and federal deficits, that will be Obama's legacy. If this amnesty is followed by a new invasion across the border America cannot control, that, too, will be Obama's gift to his countrymen. One wonders. Will poor and working class blacks and whites, Hispanics and Asians, welcome this unleashed competition from the amnestied illegals, for jobs where the wages never seem to rise? In the four decades before JFK, the nation had a pause in legal immigration. During that pause, the Germans, Irish, Italians, Jews, Poles, Greeks and Slav immigrants who had come in from 1890-1920, and their children and grandchildren, were fully assimilated. They had become not only U.S. citizens, but also identifiably American. The Melting Pot had worked. We had become one nation and one people, almost all speaking the same language, and steeped in the same history, heroes, culture, literature and faiths. Today, in 2014, after an influx of perhaps 50 million in 50 years, legal and illegal, no longer from Northwest Europe, or Europe at all, but Latin America, Africa, Asia, the Middle East, of every race, color, creed, culture and language we seem less a nation than some mammoth Mall of America. An economy, but not a country. Running in 2008, Obama said he intended to become a "transformational president." With this decision, he succeeds. He has accelerated and ensured the remaking of America. Now when the wives and children of the illegals arrive, and their extended families apply for and receive visas, and bring their wives and children, we will become the Third World country of Obama's dream, no more a Western nation. | Low | [
0.509513742071881,
30.125,
29
] |
Advances in echocardiographic diagnostic modalities for the pediatrician. Two-dimensional Doppler echocardiography has become the primary diagnostic tool in the assessment of infants and children with congenital and acquired heart disease. Over the past 10 years, specialized echocardiographic techniques have also become critical components in the evaluation and treatment of these patients. Using fetal echocardiography enables us to image the heart early in gestation and have begun to understand those lesions that can develop and progress in utero. Transesophageal echocardiography has allowed you to image the patient with congenital heart disease during repair in the operating room and in the cardiac catheterization laboratory so that adequacy of the repair can be assess and any residual lesions addressed immediately. Both of these specialized techniques are discussed in detail, with a brief overview at the three-dimensional future of echocardiography in the pediatric patient. | High | [
0.699421965317919,
30.25,
13
] |
Key Findings: Half of the public disapproves of the recent decision in Texas v. United States, in which a federal judge ruled that the 2010 Affordable Care Act (ACA) is unconstitutional and should not be in effect. While the judge’s ruling is broader than eliminating the ACA’s protections for people with pre-existing conditions, this particular issue continues to resonate with the public. Continuing the ACA’s protections for people with pre-existing conditions ranks among the public’s top health care priorities for the new Congress, along with lowering prescription drug costs. This month’s KFF Health Tracking Poll continues to find majority support (driven by Democrats and independents) for the federal government doing more to help provide health insurance for more Americans. One way for lawmakers to expand coverage is by broadening the role of public programs. Nearly six in ten (56 percent) favor a national Medicare-for-all plan, but overall net favorability towards such a plan ranges as high as +45 and as low as -44 after people hear common arguments about this proposal. Poll: Majorities favor a range of proposed options to expand public health coverage, including Medicare buy-in and #MedicareForAll Larger majorities of the public favor more incremental changes to the health care system such as a Medicare buy-in plan for adults between the ages of 50 and 64 (77 percent), a Medicaid buy-in plan for individuals who don’t receive health coverage through their employer (75 percent), and an optional program similar to Medicare for those who want it (74 percent). Both the Medicare buy-in plan and Medicaid buy-in plan also garner majority support from Republicans (69 percent and 64 percent). Moving forward, half of Democrats would rather see the new Democratic majority in the U.S. House of Representatives focus their efforts on improving and protecting the ACA (51 percent), while about four in ten want them to focus on passing a national Medicare-for-all plan (38 percent). Texas v. United States: The Future of the Affordable Care Act On December 14, 2018, a federal district court judge in Texas issued a ruling challenging the future of the 2010 Affordable Care Act (ACA).The judge sided with Republican state attorneys general and ruled that, since the 2017 tax bill passed by Congress zeroed out the penalty for not having health insurance, the ACA is invalid. Democrat attorneys general have already taken actions to appeal the judge’s ruling in the case and, due to the government shutdown, the 5th Circuit Court of Appeals has paused the case. Currently, the ACA remains the law of the land. If this ruling is upheld, the consequences will be far-reaching. Less than half of the public (44 percent) are aware of the judge’s ruling that the ACA is unconstitutional and most (55 percent) either incorrectly say that the judge ruled in favor of the ACA (20 percent) or are unsure (35 percent). Overall, a larger share of the public disapprove (51 percent) than approve (41 percent) of the judge’s ruling that the ACA is not constitutional. This is largely divided by party identification with a majority of Republicans (81 percent) approving of the decision while a majority of Democrats disapproving (84 percent). Independents are closely divided (49 percent disapprove v. 44 percent approve). The Trump administration had originally announced that as part of Texas v. United States, it would no longer defend the ACA’s protections for people with pre-existing medical conditions. While the judge’s ruling was broader than just the ACA’s pre-existing condition protections, KFF polling finds attitudes can shift when the public hears that these protections may no longer exist. Among those who originally approve of the federal judge’s ruling, about three in ten (13 percent of the public overall) change their mind after hearing that this means that people with pre-existing conditions may have to pay more for coverage or could be denied coverage, bringing the share who disapprove of the judge’s ruling to nearly two-thirds (64 percent) of the public. Fewer – but still about one-fifth (8 percent of total) – change their minds after hearing that as a result of this decision, young adults would no longer be able to stay on their parents’ insurance until the age of 26, bringing the total share who disapprove of the judge’s ruling to 60 percent. Overall, a slight majority of the public hold a favorable view of the ACA (51 percent) while four in ten continue to hold unfavorable views. (INTERACTIVE) Public’s Views of Democratic Health Care Agenda With the new Democratic majority in the U.S. House of Representatives, this month’s KFF Health Tracking Poll examines the public’s view of Congressional health care priorities including a national health plan. Proposals to Expand Health Care Coverage Most of the public favor the federal government doing more to help provide health insurance for more Americans and one way for lawmakers to expand coverage is by broadening the role of public programs, such as Medicare or Medicaid. The Kaiser Family Foundation has been tracking public opinion on the idea of a national health plan since 1998 (see slideshow). More than twenty years ago, about four in ten Americans (42 percent) favored a national health plan in which all Americans would get their insurance from a single government plan. In the decades that followed, there has been a modest increase in support – especially since the 2016 presidential election and Bernie Sanders’ rallying cry for “Medicare-for-all.” The most recent KFF Health Tracking Poll finds 56 percent of the public favor “a national health plan, sometimes called Medicare-for-all, where all Americans would get their insurance from a single government plan” with four in ten (42 percent) opposing such a plan. Larger majorities favor more incremental changes to the health care system including a Medicare buy-in plan for adults between the ages of 50 and 64 (77 percent), a Medicaid buy-in plan for individuals who don’t receive health coverage through their employer (75 percent), and an optional program similar to Medicare for those who want it (74 percent). A majority of Democrats and independents favor all of these proposals, but only the Medicare buy-in plan for adults 50 and older and the Medicaid buy-in for individuals who don’t receive health coverage through their employer receive a majority of support from Republicans (69 percent and 64 percent, respectively). MALLEABILITY in Attitudes Towards National Health Plan and Lingering Confusion About Possible Impacts This month’s KFF Health Tracking Poll finds the net favorability of attitudes towards a national Medicare-for-all plan can swing significantly, depending on what arguments the public hears. Net favorability towards a national Medicare-for-all plan (measured as the share in favor minus the share opposed) starts at +14 percentage points and ranges as high as +45 percentage points when people hear the argument that this type of plan would guarantee health insurance as a right for all Americans. Net favorability is also high (+37 percentage points) when people hear that this type of plan would eliminate all premiums and reduce out-of-pocket costs. Yet, on the other side of the debate, net favorability drops as low as -44 percentage points when people hear the argument that this would lead to delays in some people getting some medical tests and treatments. Net favorability is also negative if people hear it would threaten the current Medicare program (-28 percentage points), require most Americans to pay more in taxes (-23 percentage points), or eliminate private health insurance companies (-21 percentage points). While most Americans (77 percent) are aware they would have to pay more in taxes to cover the cost of health insurance if a national Medicare-for-all plan was put into place, there is some confusion about whether people would be able to keep their current health insurance. Most people under the age of 65 and who currently have employer-sponsored insurance say that if a national health plan was put into place, they would be able to keep their current coverage (55 percent) while about four in ten (37 percent) are aware they would not be able to keep their current coverage. And while majorities say low-income people and people who currently don’t have health insurance would be “better off” if a national Medicare-for-all plan was put into place, there is less certainty among the public about how much it would impact them, personally. Across demographic groups, about four in ten say that if a national Medicare-for-all plan was put into place it “would not have much impact” on them. Medicare-for-all And Seniors On October 10th, 2018, President Trump wrote an op-ed in USA Today arguing that a Medicare-for-all plan would “end Medicare as we know it and take away benefits they have paid for their entire lives.” One-fourth of adults 65 and older (26 percent) say seniors who currently get their insurance through Medicare would be “worse off” if a national Medicare-for-all plan was put into place. Four in ten Republicans, ages 65 and older, say seniors who currently get health coverage through Medicare would be “worse off” under a national Medicare-for-all plan. Overall, a larger share of the public say a Medicare-for-all plan will “not have much impact” on seniors (39 percent) or say that they would be “better off” (33 percent) than say seniors would be “worse off” (21 percent). Democrats Want Democratic Lawmakers to Focus on ACA Rather than Medicare-for-all Despite the recent attention on proposals to expand Medicare or Medicaid, when asked to choose Democrats would rather the new Democratic majority in the U.S. House of Representatives focus their efforts on “improving and protecting the ACA” rather than “passing a national Medicare-for-all plan.” Half (51 percent) of Democrats say House Democrats should focus on the ACA while four in ten (38 percent) say they should focus on passing a national Medicare-for-all plan. The share of Democrats who want Congress to focus on passing a national Medicare-for-all plan is down 10 percentage points from March 2018. Partisans Have different health priorities for Congress, Except for Prescription Drug Prices A majority of the public say it is either “extremely important” or “very important” that Congress work on lowering prescription drug costs for as many Americans as possible (82 percent), making sure the ACA’s protections for people with pre-existing health conditions continue (73 percent), and protecting people with health insurance from surprise high out-of-network medical bills (70 percent). Fewer – about four in ten – say repealing and replacing the ACA (43 percent) and implementing a national Medicare-for-all plan (40 percent) are an “extremely important” or “very important” priority. When forced to choose the top Congressional health care priorities, the public chooses continuing the ACA’s pre-existing condition protections (21 percent) and lowering prescription drug cost (20 percent) as the most important priorities for Congress to work on. Smaller shares choose implementing a national Medicare-for-all plan (11 percent), repealing and replacing the ACA (11 percent), or protecting people from surprise medical bills (9 percent) as a top priority. One-fourth said none of these health care issues was their top priority for Congress to work on. Continuing the ACA’s pre-existing condition protections is the top priority for Democrats (31 percent) and ranks among the top priorities for independents (24 percent) along with lowering prescription drug costs, but ranks lower among Republicans (11 percent). Similar to previous KFF Tracking Polls, repealing and replacing the ACA remains one of the top priority for Republicans (27 percent) along with prescription drug costs (20 percent). Table 1: Pre-Existing Condition Protections and Prescription Drug Costs Top Public’s Health Care Priorities for Congress; Republicans Still Focused on ACA Repeal Percent who say the following is the top priority for Congress to work on: Total Democrats Independents Republicans Making sure the ACA’s pre-existing condition protections continue 21% 31% 24% 11% Lowering prescription drug costs for as many Americans as possible 20 20 20 20 Implementing a national Medicare-for-all plan 11 20 8 3 Repealing and replacing the ACA 11 3 7 27 Protecting people from surprise high out-of-network medical bills 9 4 10 8 Note: If more than one priority was chosen as “extremely important,” respondent was forced to choose which priority was the “most important.” | Mid | [
0.622222222222222,
35,
21.25
] |
A 3D visual effect may be created by a projector system by operating the projector to deliver left and right images representing different viewpoints to a viewer (observer) who is wearing special 3D viewing eyeglasses. For example, the viewer may wear polarized eyeglasses having polarizing filters (e.g. linearly polarized eyeglasses or circularly polarized eyeglasses). In such case the left and right images are each polarized so that they can be seen by the intended eye but not the other eye when wearing the polarized eyeglasses. In other display technologies, the user may wear spectral filtration eyeglasses to view different left and right images. In such case the projector is operated to provide spectrally filtered light to the viewer so that the left eye is presented with light in a first set of spectral bands (providing a left image) and the right eye is presented with light in a complementary, second set of spectral bands (providing a right image). In each case the human visual system of the viewer combines and interprets the left and right images to perceive a single 3D image having the illusion of depth. Some 3D projector systems use a globally controlled polarizer mounted in front of a projector. For example, FIG. 1 shows a front-view projector system 20 having a projector 22 and a reflective screen 24 which reflects the light from projector 22 toward a viewing area in front of screen 24. A polarizer 26 is positioned in the light path between projector 22 and screen 24. Polarizer 26 is controllable to alternate between two opposite polarization states in synchronization with the display of left and right images L, R by the projector. Other 3D projector systems may use an optical element to modulate the polarization of light emitted from a projector so that left and right images are alternately displayed to a viewer. In 3D projector systems such as those described above, a design objective is to minimize crosstalk between left and right channels. Crosstalk occurs if one eye sees some residue of the image intended for the other eye. Typically, to minimize crosstalk for 3D projector systems, left and right images are alternately displayed such that the entire screen is made to appear and disappear to each eye of the viewer during each cycle. When a left image is presented to the left eye, a blank screen is presented to the right eye, and vice versa. Flickering and viewer eye fatigue may result if the refresh rate to each eye is below a flicker fusion threshold. 3D viewing is more prone to flickering than 2D viewing because the 3D refresh rate is half of the 2D refresh rate. For example, if a cinema projector is capable of displaying images at a maximum frame rate of 48 fps, then for 3D viewing the frame rate is 24 fps for each eye, which may be below the flicker fusion threshold. The flicker fusion threshold is variable from person to person and also depends on factors such as amount of modulation, intensity, image size (field of view) and brightness. FIG. 2 shows the use of a polarizer switching between opposite left and right polarization states P1, P2 for two projector subframe images I1, I2, respectively, to generate different images to the left and right eyes of the viewer. The numbers within each image represent the light intensity. In the illustrated example, the vertical polarizer state P1 directs all the light from image I1 toward the left eye while blocking all light to the right eye. The horizontal polarizer state P2 directs all the light from image I2 toward the right eye while blocking all light to the left eye. The resulting subframe images shown to each of the left and right eyes are L1, R1 for the first subframe and L2, R2 for the second subframe. The human visual system of the viewer combines the light from the two subsequent frames for each eye so that the viewer sees time-integrated left and right eye images LTI, RTI. As illustrated by FIG. 2, there is some reduction in the image intensity of time-integrated images LTI, RTI, from target images LTARGET, RTARGET. Also, as can be appreciated by comparing subframe images L1 to L2, and R1 to R2, the large differences in image intensity between subsequent frames for each eye may cause flicker and viewer eye fatigue. Patent literature describing technology in the general field of this invention includes: US20090040402 “Liquid crystal projector and control method for liquid crystal projector” (SONY CORP; 12 Feb. 2009); U.S. Pat. No. 7,190,518 “Systems for and methods of three dimensional viewing” (3ALITY INC; 13 Mar. 2007); JP2006301549 “Display method and display device” (EBARA J; Nov. 2, 2006); US20050105610 “Temporal smoothing apparatus and method for synthesizing intermediate image” (SAMSUNG ELECTRONICS CO LTD; 19 May 2005); US20060203339 “Systems for three-dimensional viewing and projection” (3ALITY INC; 14 Sep. 2006); U.S. Pat. No. 7,705,935 “Stereoscopic display system” (ECRANS POLAIRES INC; 27 Apr. 2010); U.S. Pat. No. 7,646,537 “High-resolution field sequential autostereoscopic display” (SAMSUNG ELECTRONICS CO LTD; 12 Jan. 2010); U.S. Pat. No. 6,111,598 “System and method for producing and displaying spectrally-multiplexed images of 3D imagery for use in flicker-free stereoscopic viewing thereof” (REVEO INC; 29 Aug. 2000); U.S. Pat. No. 5,548,427 “Switchable holographic apparatus” (SHARP K K; 20 Aug. 1996); US20080303962 “Liquid crystal projector and a method of controlling the same” (SONY CORP; 11 Dec. 2008); and JP9113862 “Stereoscopic video display device” (MITSUBISHI ELECTRIC CORP; 2 May 1997). The foregoing examples of the related art and limitations related thereto are intended to be illustrative and not exclusive. Other limitations of the related art will become apparent to those of skill in the art upon a reading of the specification and a study of the drawings. | Mid | [
0.6255924170616111,
33,
19.75
] |
Pages You Can't Get Here by Walking: Traveling between Coasts Thursday, July 16, 2015 The prompt for this piece was an exercise that I did at the Indiana University Writer’s Conference this year with our poetry teacher, Gabrielle Calvocoressi. A fan of 3 or 4 pronged projects, she challenged us to write a letter that was also a map leading to (at the retreat) a cemetery to someone we’d not seen in a while. I figured it was the perfect way to write about my cross-country tour from New Mexico to Indiana, then Detroit, Toronto, and Chicago before getting back on a 2-day train trip to Seattle. Check it out! Dear, You don’t get here by walking. You start out on a relay race of buses, trains, and airplanes with squalling babies all aboard. By the time you arrive, you’ve stripped off all the expectations of this place – you aren’t that kind of person whose researched and planned every moment of their travel, though there are moments you wished you were. Having so recently left the cramped dark city, the red rock cliffs astound you. The open spaces flecked with turkeys and mousing cats make you tingle with delight. Today, your friend helped guide a horse off a busy two-lane highway before you went on your way. There is laughter when you and your friend slather yourselves in mud and parade from hot spring to hot spring, feeling cleansed and sleepy on the way home. Home. This is the first state you’ve felt like you could live right when you stepped foot in it; you’ve fallen in love with the sprawling western-style houses and everything coated in chili. When are you getting here? You’ve just missed the shuttle. The airport is humid. You spend your time re-folding clothes in your bag on a cushioned bench. When are you getting here? You come upon the tiny town in less time than you thought and wander where there are no stoplights, looking for all the greasy food you can handle. When the classes start the next morning, it finally feels as if you’ve arrived – a solid 6-8 hours a day drawing doodles and weaving images into plain notebook paper. Who cares if they’re good? At least they’ve gotten there. When social interaction is too overwhelming, you disappear to watch Midwestern roller derby, but remember too late that small town buses don’t run at night. Then you find yourself walking two miles down a dark road in a town you’re unfamiliar with – a story you tell only after you’ve survived it. Landing in a new city across the border, your first instinct is to go to the cemetery. To the old jail-turned-health-center and the small farm across the way. You find ponds that inexplicably frighten you; places where you think they could easily dump a body. Something about the city tires you. You meet new friends and eat bad Indian food and try to stay out of the rain. Meet me at the Necropolis, you’d like to say. This is the last stop. It’s taken you an overwhelming amount of time to get here – night trains and day trains all conveniently delayed. By the time you’ve reached your host, you’ve started to flash back to New York. This is a scene familiar to you: big buildings clustered downtown, tourists flocking to the park. You get stopped by Christian college folk conducting surveys. You and your host pull out books and discuss them one by one. The night before you leave, you take in a play about Muslim women and post-9/11 Islamophobia that brings tears to your eyes. Then it’s yet another rain storm and yet another train. The world is flat until Montana. You catch a glimpse outside your window when you’re not sleeping or nose-deep in a book. No internet here, sometimes no cell signal either. Spending two days on a train makes your teeth go soft; you clench your fists at some of the conversations of your fellow passengers. But every once in a while they surprise you. The conservatively dressed Amish people who depart in a cluster midway through. The older Idaho farm consultant, burned red in the sun, who talks politics with you into the night. For someone used to speed, this is not the way to go. But though the mountains slow you down, they also whisper “welcome.” I'm Jordan Alam, and I'm a writer based out of south Seattle. My blog is focused on healing work through art, activism, and getting up close and personal. If you're looking for my creative and professional work, check out my professional site. Also consider supporting the other space I curate by visiting As[I]Am, an Asian American arts and activism online magazine I founded and currently edit. | Mid | [
0.599502487562189,
30.125,
20.125
] |
Austin joined Jan 1, 2008 I love PC games. I'm an expert at making and editing movies. I haven't modded much, but I sure love checking out other people's mods. My favorite games are Team Fortress 2, Far Cry 2, Bad Company 2, Modern Warfare 2, and several older games :p. Hello! Please, can you extract me Max voice from multiplayer of Max Payne 3? When he says "The message was delivered loud and clear"? Pleeeeease :3 I just saw your theme here Moddb.com and it's no there phrase of "loud and clear". 21 = LITTLE KID ****** THAT MADE IT AND SUCKS **** AND HAS NO LIFE :3 OF WATCHING ASHES AWESOME ZOMBIE HORDES SO IF U SEE THAT ******* TELL HIM GET OFF HIS COMPUTER AND GO GET A LIFE AND PLAY WITH TOYS | Low | [
0.45916114790286905,
26,
30.625
] |
Why The Great Petrodollar Unwind Could Be $2.5 Trillion Larger Than Anyone Thinks China’s transition to a new currency regime was supposed to represent a move towards a greater role for the market in determining the exchange rate for the yuan. That’s not exactly what happened. As BNP’s Mole Hau hilariously described it last week, "whereas the daily fix was previously used to fix the spot rate, the PBoC now seemingly fixes the spot rate to determine the daily fix, [thus] the role of the market in determining the exchange rate has, if anything, been reduced in the short term." Of course a reduced role for the market means a greater role for the PBoC and that, in turn, means FX reserve liquidation or, more simply, the sale of US Treasurys on a massive scale. The liquidation of hundreds of billions in US paper made national headlines this week, as the world suddenly became aware of what it actually means when countries begin to draw down their FX reserves. But in order to truly comprehend what’s going on here, one needs to look at China’s UST liquidation in the context of the epochal shift that began to unfold 10 months ago. When it became clear late last year that Saudi Arabia was determined to use crude prices to bankrupt US shale producers and secure other "ancillary diplomatic benefits" (think leverage over Russia), it ushered in a new era for producing nations. Suddenly, the flow of petrodollars began to dry up as prices plummeted. These were dollars that for years had been recycled into USD assets in a virtuous loop for everyone involved. The demise of that system meant that the flow of exported petrodollar capital (i.e. USD recycling) suddenly turned negative for the first time in decades, as countries like Saudi Arabia looked to their stash of FX reserves to shore up their finances in the face of plunging crude. Of course the sustained downturn in oil prices did nothing to help the commodities complex more broadly and as commodity currencies plunged, the yuan’s dollar peg meant China’s export-driven economy was becoming less and less competitive. Cue the devaluation and subsequent FX market interventions. In short, China’s FX management means that Beijing has joined the global USD asset liquidation party which was already gathering pace thanks to the unwind of the petrodollar system. To understand the implications, consider what BofAML said back in January: During the oil-boom era, oil-exporters used oil earnings to finance imports of goods and services, and channeled a portion of surplus savings into foreign assets. ‘Petrodollar’ recycling has in turn helped boost global demand, liquidity and asset prices. With the current oil price rout, external and fiscal balances of oil exporters are undermined, and the threat of lower imports and repatriation of foreign assets is cause for concern. Yes, the "recycling of Asia-dollars might partly replace the recycling of petrodollars." Unless of course a large Asian country is suddenly forced to become a seller of USD assets and on a massive scale. In that case, not only would the recycling of Asian-dollars not replace petrodollar recycling, but the "Eastern liquidation" (so to speak) would simply add fuel to the fire - and a lot of it. That’s precisely the dynamic that’s about to play out. A careful reading of the above from BofA also seems to suggest is that looking strictly at official FX reserves might underestimate the potential size of the petrodollar effect.Sure enough, a quick check across sellside desks turns up a Credit Suisse note on the "secular downtrend in EM reserves" which the bank says could easily be understated by focusing on official reserves. First, note the big picture trends (especially Exhibit 2): And further, here’s why the scope of the unwind could be materially underestimated. Taken into context, the year-to-date fall in EM reserves accounts for only 2% of the total stock of EM reserves. However, the change in the behavior of EM central banks from persistent buyers to now sellers of reserve assets carries important implications. Importantly, official reserves will likely underestimate the full scale of the reversal of oil exporters’ “petrodollar” accumulation. Crucially, for oil exporting nations, central bank official reserves likely underestimate the full scale of the reversal of oil exporters’ “petrodollar” accumulation. This is because a substantial part of their oil proceeds has previously been placed in sovereign wealth funds (SWFs), which are not reported as FX reserves (with the notable exception of Russia, where they are counted as FX reserves). Currently, oil exporting countries hold about $1.7trn of official reserves but as much as $4.3trn in SWF assets. In the 2009-2014 period, oil exporters accumulated about $0.5trn in official reserves but as much as $1.8trn of SWF assets. Now that the tide has turned, it is likely that not only official reserves drop but that SWF asset accumulation slows to nil or even reverses. SWF selling may be a slower process as assets tend to be less liquid, but the opportunity might still be taken to repatriate some investments, for instance to boost domestic rather than foreign infrastructure projects. In other words, looking at the total amount of official reserves for oil exporters understates the potential for petrodollar draw downs by around $2.5 trillion. Now obviously, it's unlikely that exporters will exhaust the entirety of their SWFs. Having said that, the fact that EM FX reserve accumulation turned negative for the first time in history during Q2 underscores how quickly the tide can turn and how sharp reversals can be. If one fails to at least consider the SWF angle then the effect is to underestimate the worst case scenario by $2.5 trillion, and if 2008 taught us anything, it's that failing to understand just how bad things can get leaves everyone unprepared for the fallout in the event the situation actually does deteriorate meaningfully. So that's the big picture. In other words, the above is a discussion of the pressure on accumulated petrodollar investments and is an attempt to show that the pool of assets that could, in a pinch, be sold off to finance things like massive budget deficits (Saudi Arabia, for instance, is staring down a fiscal deficit that amounts to 20% of GDP) is likely being underestimated by those who narrowly focus on official reserves. Switching gears briefly to consider what $50 crude means for the flow of petrodollars (i.e. what's coming in), RBS' Alberto Gallo has the numbers: If petroleum prices continue in to year end at their current YtD average ($52), this would represent a 60% decline in Petrodollar generated in 2015 vs between 2011 and 2014. Assuming that 30% of gross Petrodollars generated per year are invested in financial markets, this would imply $288bn ready for investments in 2015 vs a $726bn average between 2011 and 2014. Lower purchasing power from oil-exporting countries may in turn reduce demand for $-denominated fixed income assets, including $ IG and $ HY. US IG and HY firms have issued $918bn and $220bn YtD, which in total marks a record-high vs past years. And while all of this may seem complex, it's actually quite simple: less petrodollars coming in without a commensurate reduction in what's going out means the difference has to be made up somewhere and that somewhere is in the sale of USD reserve assets which are prone to being understated if one looks only at official FX reserves. Contrast this with the status quo which for years has been more petrodollars coming in than what's going out (in terms of expenditures) with the balance being reinvested in USD assets. Simplifying even further: the virtuous circle (for the dollar and for USD assets) has not only been broken, but it's now starting to reverse itself and the potential scope of that reversal must take into account SWF assets. Where we go from here is an open question, but what's clear from the above is that between China's FX reserve drawdowns in defense of the yuan and the dramatic decrease in petrodollar flow, the self-feeding loop that's sustained the dollar and propped up USD assets is now definitively broken and we are only beginning to understand the consequences. | Mid | [
0.628428927680798,
31.5,
18.625
] |
Paris Relocation…California Dreamin’ Q: Our family relocated to Paris from California in June 1995, and I was really excited about the move. But more than a year has gone by, and I find myself dreading the coming months, especially since returning from my recent summer trip home. I really miss California and my life there, and am sick of hearing people tell me how lucky I am to be here, or how wonderful Paris is. I don’t feel that way at all, and wonder if there are others like me out there. A: It sounds as though the grief over what you left behind runs deep for you, and is working against the capacities you obviously have (since you were successful in California) to build a life for yourself. But studies show that many people need about 18 months to reinvest in a new environment after a major move, so you are still within the norm. Work (or activity) and relationships being the two organizing poles in our lives, you probably need to search out one activity that piques your interest and to which you can redirect the energy that you are now using on feeling bad. A word of caution here: participating in monument and museum tours is interesting and informative, but will never provide enough involvement or commitment to get you out of yourself. Even if volunteering feels like a comedown to you, look at it as a strategy to help you become a participant rather than a spectator. In the area of friendships, it is essential to find one or two people with whom you resonate at a deeper-than-social level, so you won’t have to “fake it” all the time; this often happens within the context of a shared task. The autumn is a good time to consider both these areas, as helping people meet one another and find worthwhile projects for their energy is a major concern of all organizations in the English-speaking community at this time. Even if you attended Bloom Where You’re Planted or other such programs last year, be aware that you are in a different frame of mind now: don’t allow the discouraged part of you to prevent you from going again. Regularly scan the Free Voice and other publications for announcements about support groups, which can be extremely helpful when adjustment is a problem. And don’t shy away from the idea of a few counseling sessions: in allowing you to express fully what is going on, counseling might help you get a better handle on the deeper dynamics of your dissatisfaction. Jill Bourdais is a psychotherapist practicing in Paris both privately and in a hospital setting. A specialist in couple/family problems, she also teaches PAIRS, a skills-building course in intimate relationships | High | [
0.6825775656324581,
35.75,
16.625
] |
from __future__ import absolute_import from __future__ import division from __future__ import print_function import os import six.moves.cPickle as pickle from observations.util import maybe_download_and_extract def musedata(path): """Load the MuseData library of music scores. It includes both orchestral and piano classical music. Data is loaded in the piano-roll representation [@boulanger2012modeling], i.e., a binary matrix specifying which notes occur at each time step. Args: path: str. Path to directory which either stores file or otherwise file will be downloaded and extracted there. Filename is `MuseData.pickle`. Returns: list of `x_train, x_test, x_valid`, where each is a list of sequences. Each sequence is itself a list of time steps, and each time step is a list of the non-zero elements in the piano-roll at this instant (in MIDI note numbers, between 21 and 108 inclusive). """ path = os.path.expanduser(path) filename = 'MuseData.pickle' url = 'http://www-etud.iro.umontreal.ca/~boulanni/MuseData.pickle' if not os.path.exists(os.path.join(path, filename)): maybe_download_and_extract(path, url) with open(os.path.join(path, filename), 'rb') as f: data = pickle.load(f) return data['train'], data['test'], data['valid'] | Mid | [
0.624505928853754,
39.5,
23.75
] |
Dobson's history of perverse and shocking ideas about raising children is well-documented, but has escaped much media scrutiny. From Dobson's book "The Strong Willed Child": "When I told Sigmund [the family dog] to leave his warm seat and go to bed, he flattened his ears and slowly turned his head toward me. He deliberately braced himself by placing one paw on the edge of the furry lid, then hunched his shoulders, raised his lips to reveal the molars on both sides, and uttered his most threatening growl. That was Siggie's way of saying. "Get lost!" "I had seen this defiant mood before, and knew there was only one way to deal with it. The ONLY way to make Siggie obey is to threaten him with destruction. Nothing else works. I turned and went to my closet and got a small belt to help me 'reason' with Mr. Freud." . . . "What developed next is impossible to describe. That tiny dog and I had the most vicious fight ever staged between man and beast. I fought him up one wall and down the other, with both of us scratching and clawing and growling and swinging the belt. I am embarrassed by the memory of the entire scene. Inch by inch I moved him toward the family room and his bed. As a final desperate maneuver, Siggie backed into the corner for one last snarling stand. I eventually got him to bed, only because I outweighed him 200 to 12!" ... "But this is not a book about the discipline of dogs; there is an important moral to my story that is highly relevant to the world of children. JUST AS SURELY AS A DOG WILL OCCASIONALLY CHALLENGE THE AUTHORITY OF HIS LEADERS, SO WILL A LITTLE CHILD -- ONLY MORE SO." "[I]t is possible to create a fussy, demanding baby by rushing to pick him up every time he utters a whimper or sigh. Infants are fully capable of learning to manipulate their parents through a process called reinforcement, whereby any behavior that produces a pleasant result will tend to recur. Thus, a healthy baby can keep his mother hopping around his nursery twelve hours a day (or night) by simply forcing air past his sandpaper larynx." Keep your children far away from Dobson - and anyone who follows his teachings. On p.15 Dobson tells the story of a mother who spanks her 5 year old daughter and locks her in the garage for throwing some stones at cars. On p.18 he tells the story of a mother who slaps her 18 month old 9 separate times for reaching for a candy dish. On p.20 he tells the story of a mother who counts to three "and if the kids had not minded by then, they would have to face the wooden spoon." On p.61 Dobson says to spank a 6 year old for calling his parents "hot dog" or "moose" and on p.63 Dobson says to spank a 7 year old for lying. . . . On p. 135 Dobson is asked this question: "Q: How long do you think a child should be allowed to cry after being punished or spanked? Is there a limit? A: Yes, I believe there should be a limit. As long as the tears represent a genuine release of emotion, they should be permitted to fall. But crying can quickly change from inner sobbing to an expression of protest aimed at punishing the enemy. Real crying usually lasts two minutes or less but may continue for five. After that point, the child is merely complaining, and the change can be recognized in the tone and intensity of his voice. I would require him to stop the protest crying, usually by offering him a little more of whatever caused the original tears." On p.136 Dobson recommends using a switch or paddle to beat children. (link above) On p.137 Dobson says "The spanking may be too gentle. If it doesn't hurt, it doesn't motivate a child to avoid the consequence next time. A slap with the hand on the bottom of a diapered two-year-old is not a deterrent to anything. Be sure the child gets the message." One can only imagine with horror what goes in this man's household. Sick and crazy. More here if you want to be even more throughly repelled. But this will almost - almost- make you feel sorry for the man: A recent profile of Dobson sheds some light on these questions. As it turns out, Dobson’s parents physically and mentally abused him as a child, and he once got beaten up in school by a kid even Dobson admits was widely acknowledged to be a “sissy.” The article in a Denver magazine called “5280″ makes Dobson’s mother, Myrtle, sound like a real piece of work. Notes writer Eileen Welsome: Myrtle [tag]Dobson[/tag] was an amiable and social woman, but she didn’t hesitate to whack her son with a shoe or belt when she felt it was required. Consequently, Dobson writes, he learned at an early age to stay out of striking distance when he back-talked to his mother. One day he made the mistake of mouthing off when she was only four feet away and heard a 16-pound girdle whistling through the air. “The intended blow caught me across the chest, followed by a multitude of straps and buckles wrapping themselves around my midsection.” The girdle incident did not dampen his defiance, however. One evening, after Dobson’s mother forbid him from going to a dance, the recalcitrant teenager told her that he was going anyway; she picked up the telephone and called her husband. “I need you,” she said. The article continues: “‘What happened in the next few days shocked me down to my toes,’ writes Dobson.” His father canceled the next four years’ worth of speaking engagements, put the Oklahoma house up for sale, and took a pastor’s job in San Benito, Texas, a small town near the Mexican border. Dobson had two years of high school left, and when he started classes he found himself the target of a couple of bullies. Rather than turn the other cheek, Dobson wheeled around and threw his schoolbooks in the face of one annoying youth. “By the time he could see me again I was on top of him,” Dobson writes. Dobson also tried a little bullying himself, targeting a boy whom he sized up as a “sissy.” But the boy gave him such a thrashing that Dobson concluded bullying wasn’t for him. Elsewhere the story notes that in the Dobson household there were “a million rules…regulations and prohibitions for almost every imaginable situation.” Dobson recalls being “chewed out for using the expression ‘Hot dog!’ and forbidden from uttering ‘darn,’ ‘geez,’ or ‘dad-gummit’ because they were considered shorthand swear words.” Even more alarming, Dobson admits in one of his books that as a child he arranged a fight between two mismatched dogs. The battle involved a tenacious bulldog and a “sweet, passive Scottie named Baby,” and Dobson provoked it by throwing a tennis ball toward Baby. He writes what happened next: “The bulldog went straight for Baby’s throat and hung on. It was an awful scene. Neighbors came running from everywhere as the Scottie screamed in terror. It took ten minutes and a garden hose for the adults to pry loose the bulldog’s grip. By then Baby was almost dead. He spent two weeks in the animal hospital, and I spent two weeks in the doghouse. I was hated by the entire town.” As any child psychologist will tell you, this type of cruelty toward animals is a sign of a serious psychological disturbance. James Dobson is a sick, sick man. Instead of seeking help for the psychological damage he suffered as a child, he decided instead to inflict evil on others by manipulating them into beating their own children and telling them God wants them to. Talk about dragging Biblical understanding through the gutter. I will never on any day be listening to anything James Dobson has to say about the Bible or any other subject. Why the media gives his man any credence whatsoever is one of the great mysteries of life that will never be adequately explained. | Mid | [
0.576842105263157,
34.25,
25.125
] |
The 13 Best Movie Posters Of 2013 Kirsten Acuna Saturday Dec 28, 2013 at 12:01 AMDec 28, 2013 at 10:37 AM While we've been talking a lot about the best and worst movies of the year, we haven't discussed the ads used to promote them. Millions of dollars are spent on ad campaigns to get us into theater seats. While most posters are forgettable, here are the ones that went above and beyond to break the mold and capture our attention this year. 1. "Spring Breakers" There was the typical girls-in-bikinis ad for this movie. Then there was this trippy psychedelic one. Know who your audience is and make the poster feel like an all-out rager. 2. "Anchorman 2: The Legend Continues" While there were promotional posters highlighting the entire team in New York City, this poster highlighting Ron Burgundy's instantaneously recognizable mustache was genius. Outside Madison Square Garden in NYC there was a giant ad up with a 3D mustache for added effect. 3. "Side Effects" How do you market a psychological thriller starring Jude Law and Rooney Mara? Make the entire poster look like a subscription. It's not perfect — we may have checked off all the actor's names and would have substituted something else for expiration date since Feb. 8 was the film's release date — but it's still cool. 4. "A Good Day to Die Hard" You may not have cared for the fifth installment of the film, but you can't go wrong with the film's poster. Plain and simple. The iconic phrase from the original "Die Hard" paired with the actor famous for saying it. What else do you need to know from this poster to know what movie we're talking about? 5. "The Hunger Games: Catching Fire" Later advertisements focused on individual characters and the fire element in the title of the movie, but the first poster for the "Hunger Games" sequel was a classic retro throwback. Fans of the novel and films will notice the subtle hint of the cloud in the background shaped like a mockingjay — the symbol of the rebellion in the novels against a tyrannical government. In a series about an uprising — it's more than kid-killing, that's why it's non-existent in the second book for the most part — this poster sheds light (literally) on the one sign of hope for the people (Katniss). 6. "The Heat" You've probably seen these posters for the Sandra Bullock and Melissa McCarthy comedy; however, we prefer this retro action-packed look much more. 7. "Blue is the Warmest Color" Sometimes the best way you can advertise a movie is by using the negative space to fill in the blanks. 8. "The Wolverine" Instead of slapping another image of Hugh Jackman onto a one-sheet, Marvel and 20th Century Fox had gorgeous Japanese-inspired illustrations done to promote the film. 9. "Godzilla" In an effort to not show the monster, Warner Bros.' first teaser poster shown at San Diego Comic Con for the reboot showed a path of destruction outlined as the big bad Godzilla. Very clever. 10. "X-Men: Days Of Future Past" What better way to showcase that this movie will have both new and old actors? Combine both of their faces into one on the poster, torn apart by the iconic "X." 11. "Escape from Tomorrow" Not only does this poster for the guerrilla project made inside Disney World use contrasting yellow and red colors, but it also shows two of the most contrasting concepts: Mickey Mouse's hand and blood. A character symbolic with the happiest place on Earth drenched in violence. 12. "The Secret Life of Walter Mitty" If a poster can get you to turn your head to look at the world from a different perspective, then it's doing its job. Bravo. 13. "Gravity" Warner Bros. delivered not one, but two gorgeous posters for Alfonso Cuaron's space trip. Both posters have the same effect in different ways. The simple phrase "Don't let go" and an image of someone in a spacesuit floating hopelessly away from you sets up a perfect juxtaposition to gain viewer interest. Both tell us one thing while showing the complete opposite. In the first poster (above) we feel that exact moment when the astronaut breaks away. You're right there with them, frozen for a moment in time. The second does it simply on a vast black landscape that serves as the unknown abyss of space. We have no idea where they're going, but we know it must be bad since we're told we shouldn't let go.What was your favorite movie poster this year? Did we leave it off the list? | Low | [
0.52183908045977,
28.375,
26
] |
<?cs var:reference_tree ?> | Low | [
0.436893203883495,
22.5,
29
] |
1. Field of the Invention The present invention relates to video-tape recording and reproducing apparatus, and more particularly to video-tape recording and reproducing apparatus which can record and reproduce, via a fixed multi-channel magnetic head, multi-channel transformer signals obtained from field signals by the use of the Hadamard Transformation System or the Time-Sharing System; and especially which can cancel out cross talk current caused by interference between heads during recording. 2. Description of Prior Art Formerly, because of the special differential characteristics of recording and reproduction by magnetic heads used in this kind of video-tape recording and reproduction apparatus, the recording and reproduction of direct current components, which a transformer signal includes, has been difficult. Normally, the transformer signal is used to frequency modulate a charrier wave, so that the modulated carrier wave can be recorded and reproduced. But if a multi-channel head is used as the magnetic head, interference occurs between the magnetic heads, caused by the close proximity of modulated carrier waves to each other, so that in addition to the recording current which passes through the head, an interference current (hereinafter called the cross talk current) is also present, and is recorded by the magnetic tape. If the cross talk current is recorded, on reproduction a beat type noise is produced by a combination of the recording current carrier wave frequency and the cross talk current carrier wave frequency. FIG. 1 shows an FM modulated and demodulated frequency spectrum, and an explanation follows of the occurence of beat noise when cross talk current is reproduced. In FIG. 1, J.sub.0, +J.sub.1, +J.sub.2, -J.sub.1, -J.sub.2, represents the FM modulated recorded current frequency spectrum, and J.sub.c0, +J.sub.c1, +J.sub.c2, -J.sub.c2, represents the cross talk current spectrum. Also, the hatched area represents the FM modulated passing zone on reproduction. Therefore, if the lower frequency bands (-J.sub.1, -J.sub.2, -J.sub.3) drop into this zone, a beat disturbance will be created. Generally, the FM carrier wave frequency is chosen to be above that of the upper frequency limit of the above-mentioned passing zone. However, if a cross talk current exists, the difference in the carrier waves, i.e., in FIG. 1 among components such as J.sub.c0 -J.sub.0, J.sub.c1 -J.sub.1 and J.sub.c2 -J.sub.2, creates lower frequency band components which drop into the demodulated passing zone, so it is very difficult to avoid beat noise. One method of eliminating such noise might be to make a large frequency differential between J.sub.0 and J.sub.c0 in order that the lower frequency band values of J.sub.c0 -J.sub.0, J.sub.c1 -J.sub.1, J.sub.c2 -J.sub.2 become greater than the passing zone frequency and this is limited by the frequency band capacity of magnetic transformer parts. | Mid | [
0.652777777777777,
35.25,
18.75
] |
Brian Michael Bendis and Mike Oeming's tweeting odyssey on the "Powers" set continued this morning, and it seems as though the look of the new TV series may be having an impact on the comics. Bendis shared some sketch links, while Oeming described what the show is going for. Los Angeles-based tweeters seemed a little confused last night, thanks to a riot that broke out at the premiere for a documentary called "Electric Daisy Carnival Experience." Marc Bernardin shared some insight into that, while Brian Denham mourned the loss of a naked Wolverine sketch he drew last week at Comic-Con International. Find out what happened and how much it sold for down below. | Low | [
0.536,
33.5,
29
] |
1. Field of the Invention The present invention relates to a wireless communication system. More particularly, the present invention relates to a method for processing a Channel State Information Reference Signal (CSI-RS) in a wireless communication system based on a multiple access scheme. 2. Description of the Related Art In 3rd Generation (3G) advanced wireless mobile communication system standards, two types of reference signals are specified, namely a Common Reference Signal (CRS) and a Dedicated Reference Signal (DRS). CRS is referred to as either a cell-specific RS or Common RS (CRS) in a 3G Partnership Project (3GPP) Long Term Evolution (LTE) standard and is monitored by all User Equipments (UEs) in a cell of a corresponding base station. For multiple antenna transmission, reference signal patterns are defined to distinguish between the antenna ports for channel estimation and measurement. In an LTE system, a maximum of 4 antenna ports can be supported. DRS denotes a reference signal that is separately transmitted from a CRS and listened to by a UE indicated by the base station. In a 3GPP LTE-Advanced (LTE-A) system, this reference signal is referred to as a UE-specific RS, a DRS, or a Demodulation Reference Signal (DMRS) and is used for supporting a data traffic channel transmission with non-codebook based precoding at the base station. In the LTE-A system, which is an advanced form of the LTE system, a DeModulation Reference Signal (DM-RS) is transmitted for supporting channel estimation with 8 layers in addition to the aforementioned CRS and DRS. FIG. 1 is diagram illustrating configurations of a radio frame, a subframe, and a Physical Resource Block (PRB) for transmitting CRS in an LTE system according to the related art. Referring to FIG. 1, a radio frame is divided into 10 subframes, each having a length of 1 msec. This means that a radio frame has a length of 10 msec and consists of 10 subframes as shown in FIG. 1. In FIG. 1, reference number 110 denotes one of the subframes constituting the radio frame. For each subframe, an evolved Node B (eNB) performs transmission over the system bandwidth in Orthogonal Frequency Division Multiple Access (OFDMA). One subframe consists of a plurality of Physical Resource Blocks (PRBs). One PRB consists of 12 subcarriers. For one subframe, the subcarriers are arranged at a regular interval in the frequency domain. In FIG. 1, reference number 120 denotes one of the PRBs constituting the system bandwidth. In the LTE signal structure of FIG. 1, a number of PRBs is determined depending on the system bandwidth. The PRB 120 is a time-frequency resource region as denoted by reference number 130. As denoted by reference number 130 of FIG. 1, each PRB is a time-frequency resource region consisting of 12 subcarriers in the frequency domain and 14 OFDMA symbol durations in the time domain. The resource unit defined by one subcarrier and one OFDM symbol duration is referred to as a Resource Element (RE), and one RE can carry one data symbol or reference signal symbol. The PRB 130 consists of 12 subcarriers and 14 OFDM symbol durations. This means that a PRB 130 consists of a total of 168 REs. The first three OFDM symbol durations of the PRB 130 are assigned as a control region in which the eNB uses a control channel for transmitting control information with which the UE can receive a traffic channel. Although the control region is defined by the first three OFDM symbol durations, it can be configured with the first one or two OFDM symbol durations depending on the eNB's determination. In FIG. 1, reference number 140 denotes a data RE for use in transmitting traffic channel. Reference number 150 denotes a CRS RE for use in transmitting a CRS for a UE's channel estimation and measurement. Since the positions of the data RE and CRS RE are known to the eNB and UE, the UE can receive the CRS and traffic channel correctly in the PRB. Unless specifically stated otherwise, all indexing starts from 0 in the following description. For example, in FIG. 1, the 14 OFDM symbols constituting the PRB are indexed from 0 to 13. FIG. 2 is a diagram illustrating resources allocated for a UE to report a channel quality measurement to an eNB in an LTE system according to the related art. Referring to FIG. 2, the UE measures a channel quality of all the PRBs within the system band for the subframe 230 including a plurality of PRBs. In order to measure the channel quality in each PRB, the UE uses the CRS 220 transmitted by the eNB. Since the CRS is transmitted at the same transmission power in all of the PRBs, the UE can determine which PRB has relatively higher channel quality by comparing the received signal strengths of the CRSs received in respective PRBs. Also, it is possible to determine the data rate which each PRB can support depending on the absolute received signal strength. The channel quality information is mapped in the form of channel feedback information and then reported to the eNB using the uplink control channel as denoted by reference number 240 of FIG. 2. Based on the channel feedback information transmitted by the UE, the eNB performs downlink transmission in the subframes 251, 252, 253, 254, and 255. The eNB can acquire the information on the data rate, preferable precoding, and preferable PRB supported by the UE based on the channel feedback information transmitted by the UE and performs downlink scheduling and Adoptive Modulation and Coding (AMC) based on the acquired information. In FIG. 2, the eNB uses the channel feedback information 240 before the receipt of the next channel feedback information 260. Although it is depicted that only one UE transmits the channel feedback information in FIG. 2, a real world system is typically designed such that a plurality of UEs can transmit the channel feedback information simultaneously. However, the method described above has a number of problems. For example, in the LTE system, the UEs measure the channel quality based on the CRS transmitted by the eNB. In case of measuring the channel quality with a CRS as shown in FIG. 2, the number of layers for the eNB to transmit with Multiple-Input Multiple-Output (MIMO) technology is limited by the number of antenna ports of a CRS. According to the standard, the LTE system can support up to 4 antenna ports. Since more than four CRS antenna ports are not supported, the MIMO transmission of the eNB is limited to a maximum of four layers. Another problem with CRS-based channel estimation and measurement of the UEs is that the eNB must always transmit a CRS. Accordingly, in order to support more than four antenna ports, an additional CRS should be transmitted. This means that the limited radio resource is excessively concentrated on transmitting a CRS for channel estimation measurement, resulting in bandwidth inefficiency. | Mid | [
0.5751633986928101,
33,
24.375
] |
"...'Resident Evil: Afterlife' follows 'Alice' as she continues on her journey to find survivors and lead them to safety. When her deadly battle with the 'Umbrella Corporation' reaches new heights, Alice gets some unexpected help from an old friend. A new lead that promises a safe haven from the 'Undead' leads them to Los Angeles, but when they arrive the city is overrun by thousands of zombies as Alice and her comrades in arms are about to step into a deadly trap..." | Mid | [
0.613226452905811,
38.25,
24.125
] |
Translater Monday, 10 October 2011 AirSnort is a wireless LAN (WLAN) tool which recovers encryption keys. AirSnort operates by passively monitoring transmissions, computing the encryption key when enough packets have been gathered. 802.11b, using the Wired Equivalent Protocol (WEP), is crippled with numerous security flaws. Most damning of these is the weakness described in " Weaknesses in the Key Scheduling Algorithm of RC4 " by Scott Fluhrer, Itsik Mantin and Adi Shamir. Adam Stubblefield was the first to implement this attack, but he has not made his software public. AirSnort, along with WEPCrack, which was released about the same time as AirSnort, are the first publicly available implementaions of this attack. | Low | [
0.49565217391304306,
28.5,
29
] |
Ernie Roche Ernest Charles Roche (February 4, 1930 – January 2, 1988) was a Canadian professional ice hockey defenceman who played four games in the National Hockey League for the Montreal Canadiens. External links Category:1930 births Category:1988 deaths Category:Buffalo Bisons (AHL) players Category:Canadian ice hockey defencemen Category:Cincinnati Mohawks (AHL) players Category:Sportspeople from Montreal Category:Memorial Cup winners Category:Milwaukee Falcons players Category:Montreal Canadiens players Category:Montreal Junior Canadiens players Category:Springfield Indians players Category:Victoria Cougars (1911–1926) players Category:Ice hockey people from Quebec Category:Canadian expatriate ice hockey players in the United States | Mid | [
0.5685393258426961,
31.625,
24
] |
Archery Season opens in Minnesota, I’m not ready yet! Fall in Minnesota can be a busy time for most of us. Getting the cabin ready for winter, putting away the grill and…oh yes…. Hunting season! If your to-do list at home is cutting into your Bow hunting time, why not enlist the help of Archery expert Jared Hoefs at Smokey Hills in Park Rapids. He has years of experience helping customers select, setup and use a new bow correctly. We can even get all your arrows cut while you wait or replace your old worn out strings. With brands like PSE and Bear archery that have hundreds of accessories from sights to drop-away-rests, we are sure to have what you are looking for. Recent changes in Crossbow regulations (Persons over 60 years of age, now qualify to use a crossbow) have helped hundreds of people get back into archery again. Maybe an injury or father time kept you away from enjoying Archery ,now that can change. One of our most popular models is PSE Vang Crossbow, the Complete package retails for $399.99. We will even help you get it setup and take a couple practice shots, so you can get familiar with it. If that’s not enough, let’s not forget about fall fishing. Anyone brave enough will be rewarded with some of the best walleye fishing of the season. So don’t waste time selecting the right lure and bait, when Josh in the fishing department is doing all the hard work for you with his Fishing Report 09/03/16 – 09/18/16 Early Canada Goose season 09/10/16 – 10/16/16 Sandhill Crane season-NW zone-Tentative 09/17/16 – 12/31/16 Deer Hunt – Archery season 09/17/16 – 01/01/17 Ruffed and Spruce Grouse, Hungarian Partridge season 09/17/16 – 11/30/16 Sharptailed Grouse season 09/17/16 – 02/28/17 Small Game – Rabbits, Squirrels season 09/24/16 – 11/07/16 Woodcock season 09/24/16 – 10/02/16 Prairie Chicken season 09/24/16 – 09/25/16 Take-a-Kid Hunting weekend Don’t Forget to check out Tony’s video below about Deer Attractant. You also have a chance to WIN a bottle of Buck Venom Walleye -Swimming the deeper waters throughout the day and moving up onto the shallow flats in 12’-16’ of water through the evening hours. Tie up a Northland “Pro Walleye Micro Blade Spinner or Crawler harness” mostly pairing them with a rainbow minnow or crawler. Northern Pike – Sitting in the shallows from 8’-12’ of water looking for the smaller fish or minnow to swim by. Tie on an Acme “Little Cleo” to imitate a fish or minnow, helping to entice a trophy northern to strike during the fall bite! Bass – Slowly moving up to the shallows from 6’-12’ around the taller weeds, deeper docks, and lily pads looking for that easy prey. Start off by putting a bullet weight on the line then tying a VMC “Heavy duty wide gap” hook to the end. Rig up a YUM “Vibra King Tube” on the hook and mimic a crawfish retrieval. Sunfish/Crappie – Looking for the tallest weeds or structure in 8’-12’ of water. Waiting for a Northland tackle “ Gypsy or Fire Fly Jig” Either tipped with a crappie minnow or piece of crawler to fill the limits! Josh Severtson Need advice or help on how to do it? Come see Josh in the fishing department! | Mid | [
0.5452538631346571,
30.875,
25.75
] |
Background ========== Following increases in the early 2000s in Western European countries, the number of reported syphilis cases has recently stabilised; however many countries reported a high proportion of homosexually acquired syphilis (France, Denmark, Ireland, Germany, UK, Sweden, Netherlands) \[[@B1]\]. Increases among men who have sex with men (MSM) have been reported worldwide \[[@B2]\] and a significant proportion of them have been found to be co-infected with HIV \[[@B3],[@B4]\]. Infectious stages of syphilis are primary, denoted by a painless ulcer in about one third of patients, and secondary, with diverse symptoms. Patients in the latent stage are seemingly unaffected, but about 25% may experience relapses to secondary syphilis during the early latent stage (i.e. less than a year since infection) \[[@B4],[@B5]\]. Vertical transmission may result in congenital syphilis, difficult to recognise in seemingly asymptomatic newborns \[[@B6]\]. Untreated, syphilis may result in death and serious disability \[[@B4],[@B5]\], however effective penicillin-based treatment is inexpensive. Testing and treatment are free of charge in Norway. Serological tests for syphilis lack sensitivity and though some may be helpful in assessing the stage of infection, they are unreliable \[[@B7]\]. In determining the stage, particularly in asymptomatic patients, clinicians thus rely on previously documented syphilis tests, anamnesis (i.e. most likely time of exposure, data from contact tracing, known previous treatment) and clinical evaluation. Uncertain stage in asymptomatic patients with unknown duration of infection is an important limitation of early syphilis (i.e. primary, secondary and early latent syphilis) surveillance. Using data from the Norwegian Surveillance System for Communicable Diseases (MSIS), we describe the epidemiology of early syphilis in Norway from 1992-2008. Methods ======= Under the Infectious Disease Control Act, syphilis is a mandatory notifiable disease, therefore all clinicians and laboratories in Norway must notify all cases of newly diagnosed syphilis anonymously to the MSIS, based at the Norwegian Institute of Public Health (NIPH). Contact tracing and notification, mandatory by the same act, is the responsibility of the clinicians. Previously mandatory screening of pregnant women in Norway became optional in 1995; however, virtually all pregnant women are still tested. If a patient has a positive syphilis test, screening for other sexually transmitted infections (STIs) is recommended. Upon a positive syphilis test, all 22 local laboratories in Norway send their notification to both NIPH and the clinician involved. Both of these notification forms carry the same unique non-identifying number for an individual patient. Having received notification from the laboratory, clinicians fill out the corresponding clinical report on the stage of the disease, patient\'s demographic data, symptoms, co-existing STIs, risk behaviour (including most likely transmission route and time of exposure) and their source partner, and send it to the NIPH. There, only one co-existing STI can be entered into the MSIS database. If the patient is reported to have an HIV infection, HIV is always entered. At NIPH, only newly recognised cases with early syphilis, defined as laboratory confirmed, primary, secondary or early latent syphilis (less than a year since infection) are entered into the MSIS database. The reports on a single patient from laboratories and clinicians are merged using the unique non-identifying number. Every reported case is individually evaluated at NIPH and clinicians can be contacted if the stage of syphilis is unclear or if they failed to report on a case, notified by laboratory only. We used the following key variables from the reports: route of transmission, gender, month and year of birth, birthplace (country and continent), place of residence, reason for being in Norway, indications for testing, duration of symptoms, stage of disease, co-existent STI, relation to the source person, place of infection and the type of clinical practice where the diagnose was made. We also studied differences between HIV co-infected and HIV negative men, infected with syphilis homosexually. The data were analysed in categories as presented in Table [1](#T1){ref-type="table"}. ###### Selected characteristics of sexually infected cases with early syphilis reported to the Norwegian surveillance system for communicable diseases, absolute numbers, (N = 558), 1992-2008. ------------------------------------------------------------------------------------------------------------------------------------------------------------------------------ Characteristic Selected categories Sex P1\* P2\* -------------------------------------------- --------- ------------------------------------------ ----------- ------------ ------------ -------------------- ----------------- Age Median age in years 26 37 37 / / 15-24 years 22 (39.3) 8 (5.3) 33 (9.4) 0.222 \< 0.001 25-34 years 16 (28.6) 56 (36.8) 103 (29.4) 35-44 years 13 (23.2) 47 (30.9) 119 (34.0) ≥ 45 years 5 (8.9) 41 (27.0) 95 (27.1) Residence Oslo municipality 16 (28.6) 55 (36.2) 266 (76.0) \< 0.001 0.304 Other 40 (71.4) 97 (63.8) 84 (24.0) Birthplace Norway 32 (57.1) 97 (63.8) 290 (82.8) \< 0.001 0.773 Europe, other 8 (14.3) 20 (12.7) 28 (8.0) Asia 11 (19.6) 24 (15.8) 12 (3.4) Africa 3 (5.3) 9 (5.9) 6 (1.7) Other 2 (3.6) 2 (1.3) 14 (4.0) Reason for being in Norway Temporary visit 0 2 (1.3) 9 (2.6) 0.546 0.644 First generation immigrant/adopted 5 (8.9) 16 (10.5) 30 (8.6) Other, including permanent residents 51 (91.1) 134 (88.1) 311 (88.9) Indications for testing Symptoms 15 (26.8) 121 (79.6) 248 (70.8) \< 0.001 \< 0.001\*\* Contact tracing 17 (30.3) 12 (7.9) 29 (8.3) Own request 1 (1.8) 5 (3.3) 25 (7.1) Routine testing of an immigrant 6 (10.7) 6 (3.9) 0 Pregnancy 13 (23.2) / / No specific reason/other 4 (7.1) 8 (5.3) 48 (13.7) Median duration of symptoms in days\*\*\*\ 23\ 22\ 22\ / / (interquartile range) (19-47) (10-56) (9-44) Stage of early syphilis Primary 18 (32.1) 84 (55.3) 125 (35.7) \< 0.001 \< 0.001 Secondary 12 (21.4) 43 (28.3) 149 (42.6) Early latent 26 (46.4) 25 (16.4) 76 (21.7) Other reported STI\*\*\*\* none 52 (92.8) 140 (92.1) 239 (68.3) \< 0.001 0.959 HIV 1 (1.8) 2 (1.3) 85 (24.3) Chlamydia 1 (1.8) 4 (2.6) 16 (4.6) gonorrhoea 0 0 3 (0.9) herpes 0 2 (1.3) 3 (0.9) hepatitis B 1 (1.8) 2 (1.3) 3 (0.9) other 1 (1.8) 2 (1.3) 1 (0.3) Source partner Steady partner 32 (57.1) 20 (13.1) 56 (16.0) \< 0.001 \< 0.001 Casual partner 11 (19.6) 78 (51.3) 254 (72.6) Commercial sex worker 0 31 (20.4) 0 Other/Unknown 13 (23.2) 23 (15.1) 40 (11.4) Place of infection Abroad Total abroad 23 (41.1) 111 (73.0) 69 (19.7) Europe, other 8 (14.3) 43 (28.3) 57 (16.3) \< 0.001\*\*\*\*\* 0.001\*\*\*\*\* - In Russia 3 (5.4) 20 (13.1) 1 (0.3) Asia 9 (16.1) 34 (22.4) 4 (1.1) Africa 3 (5.4) 11 (7.2) 2 (0.6) South/Mid America 2 (3.6) 18 (11.8) 4 (1.1) Other 1 (1.8) 5 (3.3) 2 (0.6) Norway Total Norway 31 (55.4) 33 (21.7) 270 (77.1) - In Oslo 7 (12.5) 17 (11.2) 244 (69.7) Unknown 2 (3.6) 8 (5.3) 11 (3.1) Diagnosed by General practitioner, private specialist 32 (57.1) 71 (46.7) 85 (24.3) \< 0.001 0.440 Hospital 7 (12.5) 18 (11.8) 55 (15.7) Youth/STI clinic 15 (26.8) 59 (38.8) 210 (60.0) Other 2 (3.6) 4 (2.6) 0 ------------------------------------------------------------------------------------------------------------------------------------------------------------------------------ \*P-values for heterogeneity, using Pearson\'s chi squared test; P1 comparing homosexually and heterosexually infected men, P2 comparing women and heterosexually infected men \*\*Women diagnosed during pregnancy were excluded for comparison \*\*\* Data available for 19 women, 109 men, infected heterosexually, and 199 men, infected homosexually \*\*\*\* Only one co-infection can be recorded into the system: if reported, HIV is always recorded \*\*\*\*\* Seven categories were compared, including: Norway, Europe-other, Asia, Africa, South/Mid America, other (abroad), and unknown The data on all cases of early or congenital syphilis were obtained from MSIS. The size of population used for calculating incidence rate for each year was obtained from Statistics Norway \[[@B8]\] and was about 4.5 million. We used Stata 9.2 software (STATA Corp., TX, USA) for the analysis. Simple linear regression analysis was used to estimate trends over time. Given that the data between subsequent years may be correlated and the variability between the years may not be constant over time, the regression coefficients and their 95% confidence intervals (CI) were calculated using the Newey-West procedure. Bivariate comparisons between groups were performed using Pearson\'s chi squared test. Due to different mode of transmission, cases of congenital syphilis were described separately. Results ======= From 1992 to 2008, 562 cases of syphilis diagnosed in Norway were reported to MSIS, including four congenital cases. The incidence rate in the study period was 0.7 per 100 000 person-years (95% CI: 0.06-1.0); varying from 0.05 per 100 000 person-years in 1992 to 1.2 per 100 000 person-years in 2008. A peak was observed in 2002 with a rate of 1.5 per 100 000 person-years (Figure [1](#F1){ref-type="fig"}). On average, there was an increase of 3.8 cases each year (95% CI: 2.8-4.8, p for trend \< 0.001). No sexually infected case was younger than 15 years. Of the 502 (89%) men who were infected sexually, 350 (70%) were MSM. {#F1} Men, infected homosexually -------------------------- One man, infected homosexually in 1995, and 2 in 1998 were followed by a marked increase of 40 cases in 1999, representing 75% of all reported cases (Figure [1](#F1){ref-type="fig"}). More than a half (61%) of the total 350 cases were older than 34 years. The majority (76%) resided in Oslo and 83% were born in Norway. Before testing, 71% had symptoms. The largest proportion of cases was diagnosed in a secondary stage (43%). Almost one quarter of these men were also HIV positive (Table [1](#T1){ref-type="table"}). The proportion of those co-infected with HIV increased over time (p for trend \< 0.001) and reached 39% in 2008 (Figure [2](#F2){ref-type="fig"}). This increasing trend remained significant even if calculated from 1999, when HIV co-infected were first reported (p for trend = 0.009). Most homosexually infected men were infected by a casual partner (73%) and in Oslo municipality (72%), (Table [1](#T1){ref-type="table"}). Among 69 infected abroad, 18 (5% of all cases) were infected in Spain. {#F2} Men, homosexually infected with syphilis, who were also HIV positive, were more likely to be residents of Oslo (p = 0.001), being diagnosed with syphilis later in the course of disease (primary vs. secondary or early latent, p = 0.006) and in a hospital (p \< 0.001) than HIV negative, but they did not differ by age, birthplace, indications for syphilis testing, source partner and place of infection. Men, infected heterosexually ---------------------------- During the study period, 152 men were infected heterosexually. No obvious time trend was observed (p for trend = 0.158). More than half (57%) were older than 34 years. Most (64%) were Norwegian, with a notable proportion reporting a birthplace in Asia (16%). The majority (80%) reported symptoms and their infection was mostly discovered in the primary stage. Two men were HIV positive. Casual contacts and commercial sex workers (CSW) were the source of infection in 71%. Most acquired their infection abroad (73%) (Table [1](#T1){ref-type="table"}); predominantly in Russia (13%), Pakistan (10%), Brazil (7%) and Thailand (6%). Most Norwegians were infected abroad, mainly in other countries of Europe (36%), Asia (18%) and South and Mid America (16%). Immigrants were mainly infected during travels back to their continent of birth. Women ----- Among 56 women reported to be infected with syphilis from 1992-2008, 68% were younger than 35 years. Most of the cases were Norwegian (57%) and 55% acquired their infection in Norway. However, out of 31 infected in Norway, 14 reported their male partner had been infected abroad. Contact tracing was the predominant cause for testing in women (30%), followed by symptoms (27%) and pregnancy (23%). Almost half (46%) of all cases were discovered in the early latent stage of disease. STI co-infections were rare (Table [1](#T1){ref-type="table"}). Women reported a steady partner as the source of infection in 57%. Children with congenital syphilis --------------------------------- The age of the four patients with congenital syphilis at the time of diagnosis ranged from one to five years, one of them was a boy. Two of these children were adopted from abroad. The biological mother of one child was born in Norway, but acquired her infection abroad, while the mother of the other child was infected in Norway and tested positive with her second pregnancy in 2003, when the affected child was five years old. Discussion ========== Syphilis is a rare disease in Norway. However, since 1999, there has been a resurgence among MSM, disproportionately affecting HIV positive men. The epidemic among MSM is mainly concentrated in the capital Oslo. Up to 73% of heterosexual men and 41% of women reported being infected abroad. Compared to men, women seem to be more frequently diagnosed as late as the early latent stage and are diagnosed predominantly by contact tracing. Men infected heterosexually reported being infected by casual partner or a CSW in 71% of cases, as opposed to women, who appear to be mostly infected by their steady partners. One of the strengths of our study is a probable high coverage of diagnosed patients in MSIS \[[@B9],[@B10]\] due to double notifications from both laboratories and clinicians and a long tradition of reporting among the latter. A large set of variables on each patient is available; allowing for demographic and behavioural insight. Our study is subject to several limitations. Due to the clinical course of this disease, some infected may stay undiagnosed. Others, discovered by routine testing and possibly asymptomatic, need to be evaluated by a clinician for stage. We cannot completely exclude, however, that some patients, reported as \"early latent syphilis\" may have been infected longer than a year. This would particularly affect data on women in our study. Contrary to this, every year, about hundred cases are only lab-reported. Clinicians are aware we only include new cases of early syphilis in the database, as we publish this information in a yearly national MSIS report \[[@B11]\]. Contrary to our experience with gonorrhoea with high reporting from both laboratories and clinicians \[[@B9]\], clinicians may opt out from sending in their part of the reporting form for syphilis, if the person has been infected for more than a year or has been known to have a positive test from before. If the stage is unknown or in cases, only reported by the laboratories, internal evaluation at NIPH includes the testing sites (asylum centres), the immigrant status and unknown date of exposure of most of these cases, to determine the likelihood of late syphilis, however it may happen there are some missed early cases among them. Clinicians may also be contacted by NIPH to verify information. Furthermore, behaviour data is subject to response and recall bias. Data in a few variables are frequently missing, including co-infection data. We believe, however, that reporting is reliable on HIV co-infection. Capacity for entering several co-infections at a time should be improved in MSIS. The fact that hardly any cases were reported as homosexually acquired until 1999 cannot be explained by changes in the notification system or improved sexual behaviour reporting as in comparison, 10-42 cases of homosexually acquired gonorrhoea per year were reported in the same time period and in the same surveillance system \[[@B12]\]. Among European countries with various systems of syphilis surveillance, the highest incidence rates for early syphilis in 2007 (per 100 000 person-years) were reported from: the UK (4.4, primary and secondary stages only), Czech Republic (4.0), Sweden (2.6, less than two yeas since infection), Germany (2.5) \[[@B1],[@B13]\]. At NIPH, no total counts of reported syphilis cases are kept, but late latent probably represent a majority (more than 50%). In the period from 2002-2007, late cases represented 50-73% of all reported cases in Czech Republic, 35-51% in Germany and 24-50% in Slovenia \[[@B1]\]. Compared to infected women in our study, heterosexual men were older, more likely to be diagnosed in a primary stage and to report symptoms, and less likely to be diagnosed through contact tracing. Similar findings were reported from a London-based study \[[@B14]\]. Men are more likely than women to report having been infected abroad, which resembles the situation in Sweden, however women in Sweden acquired their infection abroad more frequently and had a higher median age (33 years) than women in Norway \[[@B13]\]. A prevalence of HIV co-infection among heterosexuals, much higher than in our study (from 6-13%), has been reported from London and France \[[@B14],[@B15]\]. Compared to London with 12% of heterosexual men reporting being clients of CSW \[[@B14]\], a higher proportion of men in Norway used commercial sex services, however they did so mostly abroad. Similar to many other European countries \[[@B16]\], the epidemics among MSM in Scandinavia are mainly concentrated in men above 30 in metropolitan areas \[[@B13],[@B17]\]. A high, but stable proportion of syphilis and HIV co-infections among MSM in several countries has been ascribed to serosorting, practice of oral sex and compromised immune system \[[@B14],[@B17],[@B18]\]. While information on co-infection is not always available, others have also reported a simultaneous increase of HIV and syphilis among MSM from 2000-2005 \[[@B19],[@B20]\]. HIV positive MSM were also less likely to be in the primary stage of syphilis when diagnosed as reported from London Enhanced Syphilis Surveillance programme (2001-2004) \[[@B14]\]. The increase of pharyngeal, frequently asymptomatic STIs among MSM has been associated with the practice of unprotected oral sex, which is perceived as low risk for HIV transmission \[[@B12],[@B18],[@B21]\]. This might explain the differences in syphilis stage at the time of diagnosis between homosexually and heterosexually infected men, as initial painless lesion (\"chancre\"), appearing in the oropharynx (as well as the rectum) may pass unnoticed among MSM. Differences in syphilis stage between serodiscordant homosexual men may be explained by potentially asymptomatic disease among the HIV positive \[[@B19]\] and a possible overlap of the primary and secondary stage \[[@B4]\]. Genital ulcers, including syphilitic chancre, can facilitate HIV acquisition and transmission \[[@B22]\], which may, together with frequent partner exchange, explain a simultaneous increase of both infections among MSM. Compared to official population data, foreign-born people are over-represented among syphilis cases in Norway \[[@B23]\]. The reason could be opportunistic testing of immigrants originating from countries with higher syphilis prevalence. Occasional increases of syphilis cases, linked to CSW, refugees/asylum seekers, immigrants from the eastern Europe, especially Russia, or travelling to these regions, were reported by several countries (Czech Republic, Slovenia, Finland, UK) \[[@B24]-[@B26]\]. In Norway, only sporadic syphilis cases related to Russia with limited secondary transmission were noted \[[@B27]\]. It needs to be emphasized, however, that sexual contact abroad is a key risk factor for heterosexually-acquired syphilis in Norway. Whether or not a proportion of reported cases with late syphilis represents a public health problem we should further focus on in Norway, is debatable. As noted, the majority of these cases are immigrants from countries with high syphilis prevalence and were infected in countries of their origin many years ago. On the other hand, mild, unspecific and painless syphilis symptoms make it difficult to diagnose the disease early, especially in women or MSM, who may not notice initial lesions in difficult-to-visualise areas \[[@B4]\]. The rarity of the disease in Norway makes it a diagnostic challenge. It is therefore important to focus diagnostic efforts on specific population groups such as MSM and immigrants and, to find women cases, to conduct thorough contact tracing. An evaluation of the recommendations for yearly syphilis testing of HIV positive MSM in the Netherlands revealed up to third of infections were asymptomatic and only discovered by screening \[[@B19]\]. Clinical care of HIV positive MSM, such as CD4 T cell count or HIV viral load, can conveniently include syphilis testing \[[@B28]\]. We recommend that the epidemic of syphilis among MSM, concentrated in Oslo, be tackled by enhanced syphilis testing for sexually active MSM, whenever they present at the STI clinic or at a general practitioner, ideally 2-4 times a year \[[@B29]\]. The evidence for cost-effectiveness of prenatal screening policy in a very low-risk population (\< 1%) seems to be contradictory \[[@B30]\] and universal screening does not prevent mothers from being infected later in the pregnancy. We estimate current recommendations and practice in Norway as sufficient. Conclusions =========== In summary, syphilis in Norway is mainly transmitted among MSM in Oslo. Increasing co-infection with HIV in this group underlines the need for enhanced screening and prevention programmes. We recommend sexually active MSM to be tested 2-4 times a year. Among heterosexuals, coincidental import from other countries has been observed, but further spread in Norway was limited. Competing interests =================== The authors declare that they have no competing interests. Authors\' contributions ======================= IJ drafted the manuscript. ØN collected and entered data and contributed with interpretation. IJ, AG and PA contributed to the design of the study, analysis and interpretation. All authors critically reviewed and approved the final version of this paper for publication. PA is the guarantor. Pre-publication history ======================= The pre-publication history for this paper can be accessed here: <http://www.biomedcentral.com/1471-2334/10/105/prepub> Acknowledgements ================ We thank Oliver Kacelnik from NIPH for language revision. | Mid | [
0.563991323210412,
32.5,
25.125
] |
OLD MAN HUGS. Regardless of what you think of Democratic Presidential candidate Bernie Sanders’ politics, the fact that he’s an adorable old man who looks like he just woke up after a long nap on a Vinnies couch is indisputable. Larry David devotes an inordinate amount of time to impersonating him; he runs for the train like an agitated turtle; he played a cranky rabbi in some long-forgotten ’90s B-movie, for cryin’ out loud. But the best adorable old duffers always come in pairs — think Sir Ian McKellen and Patrick Stewart, Statler and Waldorf, the Grumpy Old Men franchise. Now Bernie joins that hallowed list, with actor and fellow tiny old man Danny DeVito as his partner in crime. DeVito, a vocal Sanders supporter, volunteered to introduce a Sanders rally in St Louis last night, and the Sanders campaign has just posted footage of their meeting backstage. If you don’t enjoy two scruffy old men joyously giving each other bearhugs, don’t watch the video below. Also, you are not welcome on this website anymore, what is the matter with you. Excuse me while I pick up the slivers of my exploded heart off the carpet. I want a sitcom where they live in a loft in Brooklyn together and get into wacky scrapes each week, and I want it immediately. This picture of Danny DeVito and Bernie Sanders is the most important photo you’ll see today. pic.twitter.com/IJUm34fJqB — Tristan Brown (@Tristan_Brown1) March 13, 2016 bernie and Danny devito omg my heart pic.twitter.com/BNgRlWFVV3 — tina (@gnarlyprincess) March 14, 2016 If Sanders doesn’t secure the Democratic nomination, at least he can look forward to a blissful future riding around America having adventures and solving myseries with Danny DeVito on a pair of matching mobility scooters. | Mid | [
0.5877192982456141,
33.5,
23.5
] |
#include <pybind11/pybind11.h> #include <pybind11/operators.h> #include <pybind11/stl.h> #include <pybind11/stl_bind.h> #include <kmc_file.h> namespace py = pybind11; struct Count { uint64 value; }; struct CountVec { std::vector<uint32> value; }; struct LongKmerRepresentation { std::vector<uint64> value; }; PYBIND11_MODULE(py_kmc_api, m) { m.doc() = "Python wrapper for KMC_API."; // optional module docstring py::class_<LongKmerRepresentation>(m, "LongKmerRepresentation") .def(py::init<>()) .def_readwrite("value", &LongKmerRepresentation::value); py::class_<CountVec>(m, "CountVec") .def(py::init<>()) .def_readwrite("value", &CountVec::value); py::class_<Count>(m, "Count") .def(py::init<>()) .def_readwrite("value", &Count::value); py::class_<CKMCFileInfo>(m, "KMCFileInfo") .def(py::init<>()) .def_readwrite("kmer_length", &CKMCFileInfo::kmer_length) .def_readwrite("mode", &CKMCFileInfo::mode) .def_readwrite("counter_size", &CKMCFileInfo::counter_size) .def_readwrite("counter_size", &CKMCFileInfo::counter_size) .def_readwrite("lut_prefix_length", &CKMCFileInfo::lut_prefix_length) .def_readwrite("signature_len", &CKMCFileInfo::signature_len) .def_readwrite("min_count", &CKMCFileInfo::min_count) .def_readwrite("max_count", &CKMCFileInfo::max_count) .def_readwrite("both_strands", &CKMCFileInfo::both_strands) .def_readwrite("total_kmers", &CKMCFileInfo::total_kmers); py::class_<CKmerAPI>(m, "KmerAPI") .def(py::init<uint32>(), py::arg("length") = 1) .def(py::init<const CKmerAPI&>()) .def("assign", &CKmerAPI::operator=) .def(py::self == py::self) .def(py::self < py::self) .def("get_asci_symbol", &CKmerAPI::get_asci_symbol) .def("get_num_symbol", &CKmerAPI::get_num_symbol) .def("to_string", [](CKmerAPI& ptr) {return ptr.to_string(); }) .def("to_string", [](CKmerAPI& ptr, char* str) { ptr.to_string(str); }) .def("__str__", [](CKmerAPI& ptr) {return ptr.to_string(); }) .def("to_string", [](CKmerAPI& ptr, std::string& str) { ptr.to_string(str); }) .def("to_long", [](CKmerAPI& ptr, LongKmerRepresentation& res) {ptr.to_long(res.value); }) .def("reverse", &CKmerAPI::reverse) .def("get_signature", &CKmerAPI::get_signature) .def("from_string", [](CKmerAPI& ptr, const char* str) { return ptr.from_string(str); }) .def("from_string", [](CKmerAPI& ptr, const std::string& str) { return ptr.from_string(str); }); py::class_<CKMCFile>(m, "KMCFile") .def(py::init<>()) .def("OpenForRA", &CKMCFile::OpenForRA) .def("OpenForListing", &CKMCFile::OpenForListing) .def("ReadNextKmer", [](CKMCFile& ptr, CKmerAPI& kmer, Count& count) {return ptr.ReadNextKmer(kmer, count.value); }) .def("Close", &CKMCFile::Close) .def("SetMinCount", &CKMCFile::SetMinCount) .def("GetMinCount", &CKMCFile::GetMinCount) .def("SetMaxCount", &CKMCFile::SetMaxCount) .def("GetMaxCount", &CKMCFile::GetMaxCount) .def("GetBothStrands", &CKMCFile::GetBothStrands) .def("KmerCount", &CKMCFile::KmerCount) .def("KmerLength", &CKMCFile::KmerLength) .def("RestartListing", &CKMCFile::RestartListing) .def("Eof", &CKMCFile::Eof) .def("CheckKmer", [](CKMCFile& ptr, CKmerAPI& kmer, Count& count) { return ptr.CheckKmer(kmer, count.value); }) .def("IsKmer", &CKMCFile::IsKmer) .def("ResetMinMaxCounts", &CKMCFile::ResetMinMaxCounts) .def("Info", [](CKMCFile& ptr, CKMCFileInfo& info) {return ptr.Info(info); }) .def("Info", [](CKMCFile& ptr) { CKMCFileInfo info; ptr.Info(info); return info; }) .def("GetCountersForRead", [](CKMCFile& ptr, const std::string& read, CountVec& counters) { return ptr.GetCountersForRead(read, counters.value); }) ; } | Mid | [
0.618947368421052,
36.75,
22.625
] |
Opinion filed January 29, 2010 In The Eleventh Court of Appeals ___________ No. 11-08-00024-CV __________ MARGARET BROUSSARD, Appellant V. KELLY DOMINIC BROUSSARD, Appellee On Appeal from the 279th District Court Jefferson County, Texas Trial Court Cause No. F-189,385 MEMORANDUM OPINION This is an appeal from a divorce decree. The sole issue before the trial court was the division of the couple’s property. We affirm the trial court’s decree. Margaret and Kelly Broussard were married in 1981. They agreed on the disposition of all the property except for the K & M Broussard Company and whether the 1964 El Camino was an asset of the company. After a bench trial, the trial court awarded 100% of the shares and interest in the company to Kelly. It further awarded the El Camino, separate from its award of the company, to Kelly. Findings of fact and conclusions of law were neither requested nor entered. Margaret has briefed four issues in which she challenges the division of property. She argues that the trial court erred when it failed to award the El Camino as an asset of the company and when it awarded the company to Kelly. Margaret also argues that the evidence does not support the trial court’s division of property, that the trial court abused its discretion because the division of property was grossly disproportionate and because the property was undervalued, and that the trial court did not use the proper standard in determining the character and division of the disputed property. The trial court is provided a wide latitude under TEX . FAM . CODE ANN . § 7.001 (Vernon 2006) to order a division of the estate in a manner that the trial court deems “just and right, having due regard for the rights of each party.” Schlueter v. Schlueter, 975 S.W.2d 584, 588 (Tex. 1998). Absent an abuse of discretion, the trial court’s determination of the character of property and its distribution will not be disturbed on appeal. Murff v. Murff, 615 S.W.2d 696, 698-99 (Tex. 1981); Bigelow v. Stephens, 286 S.W.3d 619, 620 (Tex. App.—Beaumont 2009, no pet.); Wells v. Wells, 251 S.W.3d 834, 841 (Tex. App.—Eastland 2008, no pet.). Where findings of fact and conclusions of law have neither been requested nor filed, it is presumed that the trial court made all of the findings necessary to support its judgment or decree. Worford v. Stamper, 801 S.W.2d 108, 109 (Tex. 1990). The record reflects that the company was formed during the marriage and that Margaret and Kelly each owned 50% of the company. An inventory of both community and separate property was admitted without objection. In the inventory, the parties separately listed the community assets and the value attached to each. Both the El Camino and the company are listed as community assets. While the El Camino had been listed as a company asset in the March 2007 balance sheet of the company, it was undisputed that title was in Kelly’s name. It was undisputed that the company was a community asset; however, there were questions concerning how the company had been operated by Kelly since the couple had separated. The record before this court does not support Margaret’s contentions that the trial court erred in its characterization of the disputed property. In the decree, Kelly was ordered to pay Margaret $64,300. The record reflects that the parties agreed, at least at one point during the proceedings, that the value of the company according to Margaret’s CPA was $128,601. In Exhibit No. 1, Margaret shows that she had agreed at one time 2 to pay Kelly $50,000 for his interest in the company. Kelly further testified that he would pay Margaret $64,300 for her interest in the company. The record before this court does not support Margaret’s contentions that the trial court’s award was grossly disproportionate or not supported by the evidence. Likewise, the record does not support her contentions that the property was undervalued or that the trial court used the wrong standards. The record supports the trial court’s division of property as “just and right, having due regard for the rights of each party” pursuant to Section 7.001. The majority of the property was awarded pursuant to the parties’ agreement. The disputed property – the company and the El Camino – was awarded to Kelly along with the debt attributable to the El Camino and the provision that Kelly pay Margaret $64,300 in cash. All of Margaret’s contentions have been considered. Each is overruled. The decree of the trial court is affirmed. PER CURIAM January 29, 2010 Panel consists of: Wright, C.J., McCall, J., and Strange, J. 3 | Low | [
0.474820143884892,
33,
36.5
] |
On Thursday its the OKC Thunder vs. Dallas Mavericks in Round 3 of the NBA Playoffs. Odds for this Game 5 Western conference finals matchup are currently in favor of Dallas -6.5. Here is a preview and free NBA playoff betting pick… On Monday its the Dallas Mavericks vs. OKC Thunder in Round 3 of the NBA Playoffs. Odds for this Game 4 Western conference finals matchup are currently in favor of Dallas -5.5. Here is a preview and free NBA playoff betting pick… On Saturday its the Dallas Mavericks vs. OKC Thunder in Round 3 of the NBA Playoffs. Odds for this Game 3 Western conference finals matchup are currently in favor of Dallas -5.5. Here is a preview and free NBA playoff betting pick… On Thursday its the OKC Thunder vs. Dallas Mavericks in Round 3 of the NBA Playoffs. Odds for this Game 2 Western conference finals matchup are currently in favor of Dallas -5.5. Here is a preview and free NBA playoff betting pick… On Tuesday its the OKC Thunder vs. Dallas Mavericks in Round 3 of the NBA Playoffs. Odds for this Game 1 Western conference finals matchup are currently in favor of Dallas -6. Here is a preview and free NBA playoff betting pick… On Wednesday its the Dallas Mavericks vs Los Angeles Lakers in Round 2 of the NBA Playoffs. Odds for this Game 2 matchup are currently in favor of L.A. -7. Here is a preview and free NBA playoff betting pick… On Monday its the Dallas Mavericks vs Los Angeles Lakers in Round 2 of the NBA Playoffs. Odds for this Game 1 matchup are currently in favor of L.A. -6. Here is a preview and free NBA playoff betting pick… On Thursday its the Dallas Mavericks vs Portland Trail Blazers in Round 1 of the NBA Playoffs. Odds for this Game 6 matchup are currently in favor of Portland -4. Here is a preview and free NBA playoff betting pick… On Saturday its the Dallas Mavericks vs Portland Trail Blazers in Round 1 of the NBA Playoffs. Odds for this Game 4 matchup are currently in favor of Portland -4. Here is a preview and free NBA playoff betting pick… ABOUT CAPPERS PICKS BLOG! Our Mission is to Strive To Be The Best Handicapping, Sportsbook, and sports service tips site on the WWW. We provide top sports handicappers picks and selections, and up to date Online Sports Book Reviews. | Low | [
0.49237472766884505,
28.25,
29.125
] |
Patrick Holford's New Optimum Nutrition for the Mind How we think and feel is directly affected by what we take into our bodies. Eating the right food has been proven to boost IQ, improve mood and emotional stability, sharpen the memory, and keep the mind young. This book covers a wide range of important topics and should be of interest to anyone who wants to think and feel great. | High | [
0.685714285714285,
36,
16.5
] |
After passenger outrage over privacy concerns, United, Delta, And American Airlines are covering the cameras in their seatback entertainment systems, BuzzFeed News has learned. United Airlines has covered all the cameras in entertainment systems embedded in the backs of the airline's premium seats, BuzzFeed News learned on Friday. A United Airlines spokesperson said in a statement: “As with many other airlines, some of our premium seats have in-flight entertainment systems that came with cameras installed by the manufacturer. None of these cameras were ever activated and we had no plans to use them in the future, however we took the additional step to cover the cameras. The cameras are a standard feature that manufacturers of the system included for possible future purposes such as video conferencing." United will continue to cover the cameras as it adds premium seats on additional aircraft, the spokesperson said. A Delta spokesperson said on Monday that the airline has also added covers on all the cameras "as a visible way to reassure customers," and re-iterated that Delta has no plans to install the software necessary to use them. On Monday, a representative for American Airlines told BuzzFeed News the company "will be installing covers over the cameras" as well, and that the cameras "have always, and continue to be, de-activated." | Mid | [
0.5611222444889781,
35,
27.375
] |
Thrombogenicity of deflated intraaortic balloon: impact of heparin coating. In a calf model, 3 standard and 3 heparin coated intraaortic balloons (IAB) were inserted and left deflated in the descending aorta during 20 min to simulate balloon rupture. At the end of the experiment, the IAB were examined, and 3 samples of each were collected for scanning electron microscopy (SEM) analysis. None of the heparin coated IAB showed any sign of clot or deposit whereas all 3 standard IAB exhibited clots. SEM revealed no deposit on the heparin coated samples while 8 of the 9 standard samples disclosed deposits (p < 0.001). Morphometrically, 16.1+/-21.4% of the surfaces of the standard samples were covered with deposits whereas all the heparin coated samples were free (p = 0.004). The presence of clots on every standard IAB supports the hypothesis that other than local factors of the insertion site can play a role in the vascular complications of IAB. The absence of clots and deposits on the heparin coated IAB suggests a promising role of such devices in circumventing the tendency of clot formation on deflated balloons while avoiding the drawback of systemic anticoagulation. | Mid | [
0.646766169154228,
32.5,
17.75
] |
Lisa Madigan seeks record-breaking 5th term Illinois Attorney General Lisa Madigan will look to extend her record as the longest-serving attorney general in Illinois history. Her father, Illinois House Speaker Mike Madigan, has remained the state’s most powerful state legislative leader throughout her tenure. Illinois Attorney General Lisa Madigan plans to seek re-election in 2018. First sworn in as the state’s chief legal officer in 2003, she is already the longest-serving attorney general in Illinois history. When the attorney general was exploring a gubernatorial run in 2013, these two realities collided. Speaker Madigan made it clear he would not step down from the post he has now held for 32 of the last 34 years. Longtime political commentator Rich Miller wasn’t surprised by the move. “Maybe she expected her father would step aside, but nobody who knew him thought he would,” Miller said in an interview for a documentary on the speaker, produced by Illinois Policy, previously known as Illinois Policy Action. ———————————————————————————————————————————————– DEAR READER: To make informed decisions, the public must receive the unbiased truth. Unfortunately, that isn’t what we often get out of our elected officials or the legacy media. At the Illinois Policy Institute, that is something we are going to fix. We are an independent nonprofit consisting of more than 20 writers and policy experts. Our mission is to generate public policy solutions that promote personal freedom and prosperity in Illinois. We have produced the only viable plan to balance the state budget while also reducing the tax burden placed on residents like you. Our work is consumed by more than 500,000 Illinoisans each month, free of charge. We are funded solely by the support of the general public. We receive no government dollars. But to continue to provide unbiased reporting and viable policy solutions, we need your support. If you want to see a more prosperous Illinois for your family and friends, please take a minute to help make a difference. Thank you. Indeed, the attorney general decided not to run because of her father’s role in state government. “I feel strongly that the state would not be well-served by having a governor and speaker of the House from the same family and have never planned to run for governor if that would be the case,” Lisa Madigan said in a statement. “With Speaker Madigan planning to continue in office, I will not run for governor.” One wonders why Attorney General Madigan feels the governorship crosses an ethical line, but her current position does not. A 2016 review of legislative rules in all 50 states revealed House Speaker Madigan stands as the most powerful state legislative leader in the nation. | Mid | [
0.6328502415458931,
32.75,
19
] |
Persona 4 Arena Ultimax Trailer: Roll Cameras on Yukari When we last saw Yukari Takeba, she was still the confident, likable high school student we’ve known and loved since Persona 3. A new trailer for Atlus’ upcoming 2D fighter, Persona 4 Arena Ultimax, however, shows that the pink-clad archer has moved on since graduation, and taken on a role that will be very familiar to long-time Megaten fans: The Pink Argus. Yukari, renowned for her beauty and archery skills, has become an actress and joined the Persona-world’s answer to the Power Rangers, Phoenix Ranger Featherman R. If the trailer is any indication, the role suits her well, as she appears to kick significant quantities of ass. Using her bow as her primary weapon, Yukari shows promise as a balanced fighter with a variety of ranged attacks and quick melee combos. Her aerial attacks are aided by a pair of wings that look to be capable of lifting opponents into the air as well as Yukari herself. Yukari taking over as the Pink Argus makes sense, both visually and from a character standpoint, and she looks great in the costume. I just worry about the rumors that will inevitably rear their ugly heads about her. You know what they said about Amy Jo Johnson, the original American Pink Power Ranger. It wasn’t true, but they still said it. | Mid | [
0.589641434262948,
37,
25.75
] |
1. Field of the Invention The present invention relates to bait holders, and more particularly pertains to a new and improved catfish bait holder. Various forms of bait are available for use in fishing for catfish. For example, worms, artificial lures and various forms of live baits are utilized. All these forms of baits suffer either from a lack of effectiveness or from inconvenient and messy bait application. Additionally, these known forms of bait are very susceptible to loss while casting. In order to overcome these disadvantages, the present invention provides a new and improved bait holder which enable a paste type bait to be conveniently utilized. 2. Description of the Prior Art Various types of bait holders are known in the prior art. A typical example of such a bait holder is to be found in U.S. Pat. No. 339,952, which issued to A. Wakeman on Apr. 13, 1886. This patent discloses a spinning type lure provided with a wire cage for encircling a minnow. U.S. Pat. No. 1,452,377, which issued to A. Hanselman on Apr. 17, 1923, discloses a hook having an elongated shank provided with a pair of spaced rings adapted for use in encircling a live frog for use as bait. U.S. Pat. No. 2,402,730, which issued to D. Bucks on June 25, 1946, discloses a fish hook provided with a pair of dual opposed hooks connected to a single elongated shank. A pair of ring shaped bait encircling clamps are provided between the opposed hooks and are adapted for securing a live minnow. U.S. Pat. No. 2,634,540, which issued to G. Nelson et al on Apr. 14, 1953, discloses a fishing lure which provides a cage for retaining bread or other bait material above a fish hook. The bait holding cage is provided with inwardly extending projections for engagement with an annular recess of a fishing bobber. U.S. Pat. No. 2,972,831, which issued to J. Anselmi on Feb. 28, 1961, discloses a fishing lure provided with an elongated hollow cylindrical open mesh bait harness adapted to retain a live eel for use as bait. While the above mentioned devices are suited for their intended usage, none of these devices provide a bait holder which utilizes a cylindrical sponge in conjunction with a hollow open net mesh cylinder for retaining a paste type bait. Inasmuch as the art is relatively crowded with respect to these various types of bait holders, it can be appreciated that there is a continuing need for and interest in improvements to such bait holders, and in this respect, the present invention addresses this need and interest. | High | [
0.661904761904761,
34.75,
17.75
] |
package emissary.util.shell; import static org.hamcrest.Matchers.is; import static org.junit.Assert.assertEquals; import static org.junit.Assert.assertFalse; import static org.junit.Assert.assertNotNull; import static org.junit.Assert.assertNull; import static org.junit.Assert.assertThat; import static org.junit.Assert.assertTrue; import static org.mockito.Mockito.mock; import static org.mockito.Mockito.validateMockitoUsage; import static org.mockito.Mockito.when; import java.io.File; import java.io.RandomAccessFile; import java.nio.channels.FileChannel; import java.util.Arrays; import java.util.Collections; import java.util.HashMap; import java.util.HashSet; import java.util.Map; import java.util.Set; import java.util.stream.IntStream; import emissary.test.core.UnitTest; import org.junit.After; import org.junit.Before; import org.junit.Test; public class ExecutrixTest extends UnitTest { private Executrix e; private boolean isWindows = System.getProperty("os.name").indexOf("Window") != -1; @Override @Before public void setUp() throws Exception { this.e = new Executrix(); final String tmp = System.getProperty("java.io.tmpdir"); if (tmp == null || (tmp.indexOf("~") > -1 && this.isWindows)) { if (this.isWindows) { File f = new File("c:/tmp"); if (f.exists() && f.isDirectory()) { this.e.setTmpDir(f.getPath()); } else { f = new File("c:/temp"); if (f.exists() && f.isDirectory()) { this.e.setTmpDir(f.getPath()); } else { this.e.setTmpDir("/tmp"); } } } else { this.e.setTmpDir("/tmp"); } } } @Override @After public void tearDown() throws Exception { super.tearDown(); this.e = null; validateMockitoUsage(); } @Test public void testExecutrixParams() { this.e.setInFileEnding(".in"); this.e.setOutFileEnding(".out"); this.e.setOrder("NORMAL"); final String[] names = this.e.makeTempFilenames(); assertNotNull("names array produced null", names); assertTrue("names has not enough elements", names.length >= Executrix.OUTPATH); assertNotNull("names array has null DIR", names[Executrix.DIR]); assertNotNull("names array has null BASE", names[Executrix.BASE]); assertNotNull("names array has null BASE_PATH", names[Executrix.BASE_PATH]); assertNotNull("names array has null IN", names[Executrix.IN]); assertNotNull("names array has null OUT", names[Executrix.OUT]); assertNotNull("names array has null INPATH", names[Executrix.INPATH]); assertNotNull("names array has null OUTPATH", names[Executrix.OUTPATH]); assertTrue("names must use out file ending", names[Executrix.OUT].endsWith(".out")); assertTrue("names must use in file ending", names[Executrix.IN].endsWith(".in")); } @Test public void testExecutrixUniqueBase() { this.e.setInFileEnding(".in"); this.e.setOutFileEnding(".out"); this.e.setOrder("NORMAL"); final int COUNT = 1000; final Set<String> basePathSet = Collections.synchronizedSet(new HashSet<>(COUNT)); // Generate COUNT sets of names IntStream.range(0, COUNT).parallel().forEach(number -> { final String[] name = this.e.makeTempFilenames(); assertNotNull("name null DIR", name[Executrix.DIR]); assertNotNull("name null BASE", name[Executrix.BASE]); assertNotNull("name null BASE_PATH", name[Executrix.BASE_PATH]); basePathSet.add(name[Executrix.BASE_PATH]); }); assertEquals("Some BASE_PATH entries mismatch", COUNT, basePathSet.size()); } @Test public void testReadWrite() throws Exception { final String TMPDIR = this.e.getTmpDir(); assertTrue("File written", Executrix.writeDataToFile("aaa".getBytes(), 0, 3, TMPDIR + "/foo.dat", false)); byte[] data = Executrix.readFile(TMPDIR + "/foo.dat"); assertNotNull("Data must be read", data); assertTrue("Data must all be read", data.length == 3); // append assertTrue("File written", Executrix.writeDataToFile("aaa".getBytes(), 0, 3, TMPDIR + "/foo.dat", true)); data = Executrix.readFile(TMPDIR + "/foo.dat"); assertNotNull("Data must be read", data); assertTrue("Data must all be read", data.length == 6); data = Executrix.readFile(TMPDIR + "/foo.dat", 3); assertNotNull("Data must be read", data); assertTrue("Data must be read up to limit", data.length == 3); data = Executrix.readFile(TMPDIR + "/foo.dat", 3000); assertNotNull("Data must be read", data); assertTrue("Data must be read up to actual size", data.length == 6); assertFalse("Should not write null data", Executrix.writeDataToFile((byte[]) null, TMPDIR + "/foo.dat")); assertFalse("Should not write null data", Executrix.writeDataToFile((byte[]) null, TMPDIR + "/foo.dat", false)); assertFalse("Should not write null data", Executrix.writeDataToFile((byte[]) null, 0, 3, TMPDIR + "/foo.dat", false)); assertTrue("Overwrite longer file should truncate previous data", Executrix.writeDataToFile("aaa".getBytes(), TMPDIR + "/foo.dat", false)); data = Executrix.readFile(TMPDIR + "/foo.dat"); assertNotNull("Data must be read", data); assertTrue("Data must be read up to actual size", data.length == 3); data = Executrix.readDataFromFile(TMPDIR + "/foo.dat"); assertNotNull("Data must be read", data); assertTrue("Data must be read up to actual size", data.length == 3); data = Executrix.readDataFromFile(TMPDIR + "/filedoesnotexist.dat"); assertNull("Read non existent does not throw", data); assertFalse("Write to null path", Executrix.writeDataToFile("aaa".getBytes(), null)); assertFalse("Write to null path", Executrix.writeDataToFile("aaa".getBytes(), null, false)); assertFalse("Write to null path", Executrix.writeDataToFile("aaa".getBytes(), 0, 3, null, false)); RandomAccessFile raf = new RandomAccessFile(TMPDIR + "/foo.dat", "rw"); data = Executrix.readDataFromFile(raf); assertNotNull("Data must be read from raf", data); assertTrue("Data must all be read from raf", data.length == 3); raf.close(); raf = new RandomAccessFile(TMPDIR + "/foo.dat", "rw"); data = Executrix.readDataFromFile(raf, 2, 1); assertNotNull("Data must be read from raf", data); assertTrue("Data must all be read from raf", data.length == 1); raf.seek(0); data = Executrix.readDataFromFile(raf, 100, 200); assertNull("Data requested out of bounds", data); raf.seek(0); data = Executrix.readDataFromFile(raf, 0, 100); assertNotNull("Available data read from raf", data); assertTrue("All available data read from raf", data.length == 3); raf.seek(0); final FileChannel channel = raf.getChannel(); data = Executrix.readDataFromChannel(channel); assertNotNull("Available data read from channel", data); assertTrue("All available data read from channel", data.length == 3); data = Executrix.readDataFromChannel(channel, 0, 3); assertNotNull("Available data read from channel", data); assertTrue("All available data read from channel", data.length == 3); data = Executrix.readDataFromChannel(channel, 0, 1); assertNotNull("Available data read from channel", data); assertTrue("All limit data read from channel", data.length == 1); data = Executrix.readDataFromChannel(channel, 0, 100); assertNotNull("Available data read from channel", data); assertTrue("All limit data read from channel", data.length == 3); data = Executrix.readDataFromChannel(channel, 50, 100); assertNull("Out of bounds data on channel returned non-null", data); channel.close(); raf.close(); final File f = new File(TMPDIR + "/foo.dat"); f.delete(); } @Test public void testReadWriteTempDir() { String[] names = this.e.writeDataToNewTempDir("aaa".getBytes()); assertNotNull("names on temp dir write", names); readAndNuke(names[Executrix.INPATH]); Executrix.cleanupDirectory(names[Executrix.DIR]); names = this.e.writeDataToNewTempDir("aaa".getBytes(), 0, 1); assertNotNull("names on temp dir write", names); readAndNuke(names[Executrix.INPATH]); Executrix.cleanupDirectory(names[Executrix.DIR]); } @Test public void testCopyFile() throws Exception { final String TMPDIR = this.e.getTmpDir(); assertTrue("File written", Executrix.writeDataToFile("aaa".getBytes(), 0, 3, TMPDIR + "/foo.dat", false)); Executrix.copyFile(TMPDIR + "/foo.dat", TMPDIR + "/bar.dat"); final byte[] data = Executrix.readFile(TMPDIR + "/bar.dat"); assertNotNull("Data read from copy", data); assertTrue("All data read from copy", data.length == 3); File f = new File(TMPDIR + "/foo.dat"); f.delete(); f = new File(TMPDIR + "/bar.dat"); f.delete(); } @Test public void testCleanupNonExistentDir() throws Exception { final File dirToDelete = mock(File.class); when(dirToDelete.exists()).thenReturn(false); final boolean result = Executrix.cleanupDirectory(dirToDelete); assertThat(result, is(true)); } @Test public void testCleanupNonDir() throws Exception { final File dirToDelete = mock(File.class); when(dirToDelete.exists()).thenReturn(true).thenReturn(true).thenReturn(false); when(dirToDelete.isFile()).thenReturn(true); when(dirToDelete.delete()).thenReturn(false).thenReturn(true); final boolean result = Executrix.cleanupDirectory(dirToDelete); assertThat(result, is(true)); } @Test public void testCleanupIOProblemDir() throws Exception { final File dirToDelete = mock(File.class); when(dirToDelete.exists()).thenReturn(true).thenReturn(true).thenReturn(false); when(dirToDelete.isFile()).thenReturn(false); when(dirToDelete.delete()).thenReturn(false).thenReturn(true); when(dirToDelete.listFiles()).thenReturn(null); final boolean result = Executrix.cleanupDirectory(dirToDelete); assertThat(result, is(false)); } @Test public void testWriteWithCleanup() throws Exception { final String TMPDIR = this.e.getTmpDir(); assertTrue("File Written in subdir", Executrix.writeDataToFile("abc".getBytes(), TMPDIR + "/foo/bar/baz.dat")); byte[] data = Executrix.readFile(TMPDIR + "/foo/bar/baz.dat"); assertNotNull("Data read from subdir", data); assertTrue("All data read from subdir", data.length == 3); assertTrue("Cleanup removes all", Executrix.cleanupDirectory(TMPDIR + "/foo")); data = Executrix.readDataFromFile(TMPDIR + "/foo/bar/baz.dat"); assertNull("Data read from non-existent subdir", data); } @Test public void testExecute() { // if (isWindows) // { // logger.debug("This test needs to be made to work on windoze"); // return; // } final String[] names = this.e.makeTempFilenames(); logger.debug("Names for testExecute is " + Arrays.asList(names)); final File tdir = new File(names[Executrix.DIR]); tdir.mkdirs(); assertTrue("Temp dir exists", tdir.exists() && tdir.isDirectory()); assertTrue("File written", Executrix.writeDataToFile("aaa".getBytes(), names[Executrix.INPATH])); final byte[] data = Executrix.readDataFromFile(names[Executrix.INPATH]); assertNotNull("Data must be read from " + names[Executrix.INPATH], data); final String cyg = System.getProperty("CYGHOME"); final boolean cyghome = cyg != null && cyg.indexOf(":") > -1; final String cmd = (this.isWindows ? (cyghome ? "/bin/cp" : "copy") : "cp") + " <INPUT_NAME> <OUTPUT_NAME>"; String[] c = this.e.getCommand(cmd, names); assertNotNull("Command returned", c); assertEquals("Command runner", (this.isWindows ? "cmd" : "/bin/sh"), c[0]); this.e.setCommand(cmd); c = this.e.getCommand(names); assertNotNull("Command returned", c); assertEquals("Command runner", (this.isWindows ? "cmd" : "/bin/sh"), c[0]); logger.debug("Command to exec is " + Arrays.asList(c)); int pstat = -1; final StringBuffer out = new StringBuffer(); final StringBuffer err = new StringBuffer(); pstat = this.e.execute(c, out, err); logger.debug("Stdout: " + out.toString()); logger.debug("Stderr: " + err.toString()); assertTrue("Process return value", pstat >= 0); readAndNuke(names[Executrix.OUTPATH]); pstat = this.e.execute(c, out); assertTrue("Process return value", pstat >= 0); readAndNuke(names[Executrix.OUTPATH]); pstat = this.e.execute(c, out, "UTF-8"); assertTrue("Process return value", pstat >= 0); readAndNuke(names[Executrix.OUTPATH]); pstat = this.e.execute(c, out, err, "UTF-8"); assertTrue("Process return value", pstat >= 0); readAndNuke(names[Executrix.OUTPATH]); final StringBuilder sout = new StringBuilder(); final StringBuilder serr = new StringBuilder(); pstat = this.e.execute(c, sout); assertTrue("Process return value", pstat >= 0); readAndNuke(names[Executrix.OUTPATH]); pstat = this.e.execute(c, sout, serr); assertTrue("Process return value", pstat >= 0); readAndNuke(names[Executrix.OUTPATH]); pstat = this.e.execute(c, sout, serr, "UTF-8"); assertTrue("Process return value", pstat >= 0); readAndNuke(names[Executrix.OUTPATH]); final Map<String, String> env = new HashMap<String, String>(); env.put("FOO", "BAR"); pstat = this.e.execute(c, sout, serr, "UTF-8", env); assertTrue("Process return value", pstat >= 0); readAndNuke(names[Executrix.OUTPATH]); pstat = this.e.execute(c); assertTrue("Process return value", pstat >= 0); readAndNuke(names[Executrix.OUTPATH]); this.e.setProcessMaxMillis(0); // wait forever pstat = this.e.execute(c, sout, serr, "UTF-8", env); assertTrue("Process return value", pstat >= 0); readAndNuke(names[Executrix.OUTPATH]); assertTrue("Temp area clean up removes all", Executrix.cleanupDirectory(tdir)); assertFalse("Temp area should be gone", tdir.exists()); } private void readAndNuke(final String name) { final File f = new File(name); assertTrue("File " + name + " must exist", f.exists()); final byte[] data = Executrix.readDataFromFile(name); assertNotNull("Data read from " + name + " was null", data); f.delete(); } } | Mid | [
0.6134453781512601,
27.375,
17.25
] |
A 1-year-old boy was among two people shot and injured in Brooklyn on Saturday evening, police said. Shots rang out near Sutter and Van Sinderen avenues in East New York shortly before 5:15 p.m., according to police. Witnesses say the shooting started off as an argument inside a nearby store. The boy was with his mother and grandfather when a bullet grazed his knee, police said. He was rushed to Kings County Hospital and is expected to be alright. A 20-year-old man was also hit by a bullet in his right leg. He was taken to Brookdale Hospital and is also expected to survive. "When I got out of the store, I saw the guy walking up the block. He was bleeding," a man, who gave his name as Noel, said. "It's sad," said Ishmael Gomez, who lives nearby. "Older person, young person. It's sad for both families." Amid the gunshots, people leaving the nearby Sutter Avenue L line station scattered. Some people didn't hear the gunfire because a train was roaring by as the shots went off, witnesses said. Police put up posters at the Sutter Avenue station on Saturday evening, asking for help finding the gunman. No one has been arrested. Police said they've reviewed surveillance video and are looking for a thin, 20-year-old man with braided hair. | Low | [
0.44337811900191904,
28.875,
36.25
] |
Q: grep -E mismatching subdomains with mailids In my Apache access log I want to find all URLs matching *.google.com. I tried this with grep -E *.google.com but it also matched [email protected], which is not desired. How do I avoid this? A: The * at the beginning makes no sense. . in a regular expression matches anything, i.e. it matches the @ in the address. To match literal dot, use \.. echo [email protected] | grep -E '\.google\.com' || echo no match | Low | [
0.491803278688524,
22.5,
23.25
] |
Fighting Game Clothing, Shirts, Apparel and More! At First Attack Clothing we strive to bring you the most fashionable fighting game apparel / clothing and shirts around. If you like playing street fighter, umvc3, tekken or any fighting game, we have shirts you will love. We want to keep the Fighting Game Community strong, so we will do all we can to support it and help it grow! If you like fighting game shirts, check out our website and blog. | Low | [
0.37727272727272704,
20.75,
34.25
] |
Video Game Voters Network has published an official statement regarding the recent UN Women report entitled "Cyber Violence Against Women and Girls." Feminist Frequency creator and host Anita Sarkeesian and game developer Zoe Quinn were both speakers at the event in which the report was detailed. Both individuals are persons of interest in the #GamerGate controversy. The statement by the VGVN slams the report for falling into the "tired strategy of using hyperbolic, outlandish and outdated notions of video games and gamers" and points out that the report cited an opinion article from 2000 "filled with outdated views from noted and debunked anti-video game pundits." Here's the meat of it: This report cites an opinion article written in 2000 filled with outdated views from noted and debunked anti-video game pundits. As an example, the report quotes Lyndon LaRouche and his wife, Helga Zepp LaRouche, and further the U.N.’s source material cites Zepp La Rouche’s work, “The Mark of the Beast: America’s Children Are in Mortal Danger,” in which she mistakenly reports that children as young as two are abusing digital entertainment. A claim that has been specifically (and repeatedly) denied by medical professionals. It is embarrassing that the U.N. would even consider these as reliable sources for a report on video games or gamers. The Video Game Voters Network strongly supports empowering women and minorities and creating an inclusive online environment that is welcoming of all views and perspectives. However, the U.N. does this issue serious harm by spreading stereotypes and misinformed opinions that undercut its credibility. The safety of Internet users on all platforms will not be helped by reports citing dubious sources, 15-year-old webpages and attempts to incite moral panics about games and gamers. Medical professionals, researchers, and courts have all debunked these types of stereotypes and faulty research. In addition, the U.S. Supreme Court ruled that “psychological studies purporting to show a connection between exposure to violent video games and harmful effects on children do not prove that such exposure causes minors to act aggressively.” We should be past the point of having to defend video games' right to exist, but as long as organizations such as the U.N. keep dredging up bad research, we'll keep pointing out their mistakes. Video Game Voters Network is a project sponsored by the game industry's Entertainment Software Association. The purpose of the project is to provide a place for American gamers to organize and defend against threats to the medium by registering to vote and letting Congress know the importance of the issue. In other words, it's to prevent precisely these kind of moral panics from gaining a foothold in the mainstream. | Mid | [
0.589073634204275,
31,
21.625
] |
Numerous shingle products are known in the prior art. Most shingle products known have a number of goals. First and foremost of these goals is to preclude the elements from entering into the building (typically, a residential dwelling) with which the shingle is used. In furtherance of this objective, shingle manufacturers seek to make their products so they are resistant to hail, wind, and other aspects of the elements which might tend to deteriorate their products over the passage of time. Another goal of shingle products is resistance to fire. The typical application for shingle products is in use in residential dwellings. Consequently, safety is an important consideration in the construction of a shingle product. It is desirable that a shingle be retardant to fire not only so that it does not, itself, burn, but also that it retards the spread of fire within the structure. A third goal of all shingle products is that they be easy to apply. Included in this objective are the desires that the product be easy to handle, easy to position, and easy to mount. The capstone goal of a shingle product is that it be aesthetically pleasing. Because of the particular application of shingle products in the residential dwelling market, purchasers frequently look to the aesthetics of the product in ultimately deciding on a particular product they wish to use. It is to these dictates and problems of the prior art that the present invention is directed. It is an improved roofing shingle product which serves to solve numerous problems of the prior art without sacrificing desirable characteristics already afforded by prior art structures. | High | [
0.6886446886446881,
35.25,
15.9375
] |
parameters: root: C:\Anaconda\envs\ conda_env: # this param must be set clean_conda: true steps: - script: | call conda env remove -n ${{parameters.conda_env}} -y if exist ${{parameters.root}}${{parameters.conda_env}} rmdir /s /q ${{parameters.root}}${{parameters.conda_env}} workingDirectory: tests displayName: 'Conda remove' continueOnError: true condition: always() # this step will always run, even if the pipeline is canceled enabled: ${{parameters.clean_conda}} - script: | del /q /S %LOCALAPPDATA%\Temp\* for /d %%i in (%LOCALAPPDATA%\Temp\*) do @rmdir /s /q "%%i" displayName: 'Remove Temp Files' condition: succeededOrFailed() | Mid | [
0.5647558386411891,
33.25,
25.625
] |
Q: 2D Rectangle Collision detection in Android I have many images that I need to place on a canvas over a long period of time so that they look random. However, I don't want any of the images to overlap with each other. My solution so far is to randomly place the image somewhere on the canvas. If it overlaps I'll generate a new random location to try. Now the tricky part is to see if where I am about to place the image is going to overlap with another image. I was going to make a large array of 1's and 0's and manually mark off where I put the images. However, I was wondering if anyone knew of a way to "auto detect" using a method if where I am about to place an image will overlap with an existing image? Or if there is a way to do collision detection using some Android function? A: Checking to see if two rectangles overlap is really simple, just use Rect.intersect() Check out the Rect docs for more information: http://developer.android.com/reference/android/graphics/Rect.html Although I would recommend you try something different than what you have described above. In the beginning the probability of a collision will be very low. However as the screen fills up the probability of a collision will rise. This result in a lot of collisions and wasted computational power. You should use something more efficient, off the top of my head you could try something like this: Split the screen into a grid of size MxN Keep a list of all unpopulated grid locations Pick a random grid location for a new image i Pick a random width and height for image i If i intersects a grid location that is already populated or it if goes off the screen shrink it Draw i If all grid locations are taken quit, else go to 3 A: A simple 2D isinbox function could be: bool IsInBox(int x1, int y1, int width1, int height1, int x2, int y2, int width2, int height2) { int right1 = x1 + width1; int right2 = x2 + width2; int bottom1 = y1 + height1; int bottom2 = y2 + height2; // Check if top-left point is in box if (x2 >= x1 && x2 <= right1 && y2 >= y2 && y2 <= bottom1) return true; // Check if bottom-right point is in box if (right2 >= x1 && right2 <= right1 && bottom2 >= y2 && bottom2 <= bottom1) return true; return false; } Not sure if works though xd Or you could use Rect.Intersect() | Mid | [
0.601398601398601,
32.25,
21.375
] |
Product category In the mathematical field of category theory, the product of two categories C and D, denoted and called a product category, is an extension of the concept of the Cartesian product of two sets. Product categories are used to define bifunctors and multifunctors. Definition The product category has: as objects: pairs of objects , where A is an object of C and B of D; as arrows from to : pairs of arrows , where is an arrow of C and is an arrow of D; as composition, component-wise composition from the contributing categories: ; as identities, pairs of identities from the contributing categories: 1(A, B) = (1A, 1B). Relation to other categorical concepts For small categories, this is the same as the action on objects of the categorical product in the category Cat. A functor whose domain is a product category is known as a bifunctor. An important example is the Hom functor, which has the product of the opposite of some category with the original category as domain: Hom : Cop × C → Set. Generalization to several arguments Just as the binary Cartesian product is readily generalized to an n-ary Cartesian product, binary product of two categories can be generalized, completely analogously, to a product of n categories. The product operation on categories is commutative and associative, up to isomorphism, and so this generalization brings nothing new from a theoretical point of view. References Definition 1.6.5 in Category:Category theory | High | [
0.6872037914691941,
36.25,
16.5
] |
Review highlights Good to know Nearby About Nestled on the island's southern tip, the Pearl South Padre Island Resort is a premier oceanfront resort for families and couples who want to experience tranquil views and soft sand beaches in South Texas. Warm rays of sunshine and tropical breezes await your arrival. From the moment you drive down the palm tree lined brick road and discover our lush landscaping and pristine beaches, you'll know why the Pearl South Padre is South Texas' "Best on the Beach" resort destination. Search for Pearl South Padre discounts in South Padre Island with KAYAK. Search for the cheapest hotel deal for Pearl South Padre in South Padre Island. KAYAK searches hundreds of travel sites to help you find and book the hotel deal at Pearl South Padre that suits you best. KAYAK is part of The Priceline Group, the world leader in online travel & related services. Would you like to save as your currency permanently or for this visit only? | Low | [
0.507246376811594,
30.625,
29.75
] |
Q: Event ID 3 / Source: Print I came across an Event error on System. Event ID:3 Source: Print Description: Printer HP LaserJet on [domainname] (from IT01) in session 2 was deleted. The IT01 is my PC at work, and I have not done any printing today. Also there are 6 printers configured on the Print Server, and for each printer I have the same error. I really have no idea why, and I can't find anything related in a google search. Hopefully someone here can help me with this. Thanks in advance A: The answer you're looking for depends on a couple of things. If the printer still works when you try again, then the terminal services session that loaded your printer has deleted the link to your printer when the session was terminated. If the printer does not work, according to here: http://www.eventid.net/display.asp?eventid=3&source=print The printer may have been deleted by something different | Low | [
0.47708894878706204,
22.125,
24.25
] |
Filled with premium 600 fill-power Hungarian white goose down, these pillows and duvets are the ultimate in lightweight warmth. Sateen shell is jacquard woven from smooth long-staple cotton in an elegant laurel pattern and piped in satin. An exceptionally thorough cleaning process makes the down hypoallergenic while preserving its silkiness and loft. Each piece is covered in a 312-thread-count down-proof white sateen. Duvet covers are baffle boxed for evenness and finished with mitered corners. Made in the USA. Customer Reviews for Laurel Down Duvet & Pillow This product has not yet been reviewed. Click here to continue to the product details page. | Mid | [
0.608899297423887,
32.5,
20.875
] |
Why do so many ex-offenders go back to prison? A new study suggests they don't - nickalewis http://www.slate.com/articles/news_and_politics/crime/2015/10/why_do_so_many_prisoners_end_up_back_in_prison_a_new_study_says_maybe_they.html ====== tyingo I personally know several people that did go back. The common thread was parole and/or probation programs that just weren't achievable. Requirements vary, but typically there's: \- tons of recurring fees (classes, mandatory drug testing, etc) \- reimbursement of the court's costs \- classes, parole officer, drug testing, etc, located in areas away from public transportation \- judges that chronically no-show, after you've paid to get there, parking, etc. I spoke to one in-depth...it's about $500/month in direct costs, not including indirect costs like transportation. In many areas you would really have to own a vehicle to get to the required places. Which, for a felon, also means "special" high cost SR-22 insurance. Couple that with the sort of jobs available to a convicted felon, and... ~~~ danieltillett If you choose to serve out your sentence in full do you still have to go through all these different fees and classes? Do all felons have to have SR-22 insurance or only those convicted of vehicle offences? ~~~ tyingo You can choose to serve the full sentence, and you would not have all of the fees, but you would still have some...like reimbursement of court costs. You're also subject to some classes. Drug offenders, in some states, have to take classes if they want their driver's license back. (even if the offense was not vehicle related in any way). It's also not a trivial trade-off. Varies by state, but in Texas, for example, you could be choosing between 2.5 years + probation or 5 full years. Not all felons need SR-22 insurance, but many whose offenses were NOT vehicle related have to have it. Drug convictions, for example, even if it had nothing at all to do with a vehicle. ------ srgseg A way of explaining it that (hopefully) makes it clearer: Let's say you have just invented the concept of prison, and let's say 50% of people come back every year after going to prison for the first time, and 50% never come back again. In year 2, you'd observe that of the year 1 population, 50% returned, and 50% didn't. In year 2, you'd also add a new influx of prisoners. Therefore, in year 3, you'd observe that of the year 2 population, 75% returned and 25% didn't. But, the real underlying recidivism rate is still 50%, not 75%. ~~~ srgseg To expand on their mall analogy: There is a big difference between asking "what percentage of this week's mall visitors will return next week", and asking "when people visit this mall for the first time, what percentage of them will return the following week". ~~~ gsibble So the difference in their studies is what percentage of first time offenders will return to prison vs. what percentage of overall prisoners will return to prison? ~~~ Abraln Seems more like one counts (Number of prison stays)/(people who have gone to prison), while the other counts (people who have gone to prison more than once)/(The number of people who have gone to prison in total) ------ tptacek A better source, with a previous HN discussion, that says much the same thing, is far better sourced, and makes a lot of other important points: [https://news.ycombinator.com/item?id=10091586](https://news.ycombinator.com/item?id=10091586) HN readers will be unhappy to read that the war on drugs is not principally, directly responsible for US incarceration rates. HN readers will probably thrilled to read that responsibility for over- incarceration is placed squarely on overzealous prosecutors; the rate at which arrestees are charged with felonies has climbed sharply, despite an overall drop in crime. ~~~ ncallaway While it may not be the principal account for incarceration rates, the paper does note that 17% of the current prison population is in prison on drug- related charges. Additionally, it notes that 20% of the growth in prison populations can be attributed to drug-related charges, and that about 20% of the flow of prisoners can be attributed to drug-related charges. That 20% number is still a _massive_ number of people incarcerated on drug- related charges. It's still a massive problem and solving it will put a huge dent in the insane incarceration rate that we see. Of course a problem as large as the over-incarceration of the US population is going to be complicated and is going to require many solutions rather than a single silver bullet. I'm all for prosecutorial reform as well as drug reform; I'm willing to bet I'll need to discover several other things that we need to reform in order to bring our incarceration rates down. Put another way, if I'm optimizing some code and I see 20% of CPU-time is being spent on a trivial operation that is definitely a section of the code that I'm going to evaluate and attempt to readdress even if it doesn't fully resolve the performance issues. ~~~ gsibble If the CPU usage of my code jumped by a massive percentage, and only 20% of it can be attributed to one problem, I'm certainly going to pay attention to it. But I'm going to pay a lot more attention to the problems causing the other 80%. ~~~ scottshepard Not if the 20% was the single largest individual process sucking up power. ~~~ jccc And whose solution was simple (even if not immediately easy to achieve). [Edit for focus: And whose solution was obvious.] ------ VLM There is a slight mistake in the article toward the end where the interviewer asks what good the BJS statistics are and the response is polite waffling and its wrong. What its actually extremely useful for is numerical prediction of how many beds you'll need in 10 years so build X prison beds per year etc, based on greater population growth and "repeat customer" rates. I'm not talking about conspiracy level stuff or isn't the prison industrial complex evil signalling, but just predictive numbers. The meta problem that the article does overall get correct is trying to apply "how many beds to build" statistics to "what fraction of prisoners turn their lives around" is totally useless as the interviewee properly states. In that way the BJS stats are awesome for construction budget projections while being simultaneously totally useless for pontificating on cultural problems. The dude interviewed basically gets this correct in long format, only screwing up this one question. No one else has caught the obvious startup analogy of freemium model whales, AFAIK. Most people playing freemium games do not pay in. On the other hand a huge fraction of freemium revenue comes from whales. Therefore you can make all kinds of weird inaccurate statements about the revenue vs population distribution. Like if all your revenue comes from whales, all your customers must be whales, right? Or all your revenue comes from repeat customers therefore most customers are repeat customers. Strange logic like that. ------ kenjackson The article would have been better with actual data. Its unclear to me if the effect is large or small. Seems like it could be either depending on several factors. ------ jessriedel The academic discussion of prison sentences and recidivism must be completely dysfunctional if this sort of elementary mistake is derailing things. This is truly a Statistics 101 idea. ~~~ Camillo Welcome to sociology. ------ _dps While the overrepresentation of the repeat offenders is a valid concern, I feel like this makes a big point out of a relatively small change in conclusion. Old Analysis: slightly over half were incarcerated again New Analysis: about one third are incarcerated again So regardless of how you measure it, there's an enormous _relative_ risk of recidivism -- the general population is incarcerated at a mere 0.66% level [1] so that's still a 50x relative risk (compared to a 75x under the old calculation). There is no avoiding the conclusion that ex-convicts are vastly more likely to perform crimes than the general population. From the perspective of risk management and policy design, 50x vs 75x doesn't seem to change much to me. And I could forgive a lay person for taking the 50x relative risk to mean "ex convicts tend to return to jail" even if it's "only" 1 in 3. The general rate of incarceration is nowhere near 1 in 3. [1] [http://www.sentencingproject.org/template/page.cfm?id=107](http://www.sentencingproject.org/template/page.cfm?id=107) ~~~ Camillo Well, of course. Criminals tend to commit multiple crimes. Would you prefer a world where crimes are just randomly committed by anyone, including you and your family, with uniform distribution? If you would, you know where to start. ~~~ TheCoelacanth Kind of a cop out answer. Obviously some recidivism is caused by some people being predisposed to crime, but when some countries have recidivism rates that are half of other countries' rates, can you really claim that it explains all of it? ------ Overtonwindow Interesting article... I think many go back because we set them up for failure during reentry. Housing and jobs can discriminate against those with criminal records, making it difficult to reintegrate with society. ------ erikb The first thing I think when reading the headline is that friends paradox on social networks. Feels like that. But I don't know if these paradoxes are interrelated. ~~~ jqgatsby It is related, and is called the inspection paradox. Identified for me by Allen Downey, with some explanation below: [http://allendowney.blogspot.com/2015/11/recidivism-and- singl...](http://allendowney.blogspot.com/2015/11/recidivism-and-single-case- probabilities.html?showComment=1448932959307#c8157557553082969443) ------ jeffmould Like anything with a political undertone, how recidivism rates are calculated is defined by the messenger. A politician wanting to take a hard nose approach to crime is going to want a higher recidivism rate so he/she can say that keeping people in prison reduces crime. On the flip side, the reality is that by providing jobs, education, and general opportunities, upon release there is a less chance that someone will recommit. The real problem, as someone else pointed out, is that in most cases the individual is set up to fail in the justice system. I will use myself as an example. I served a one-year supervised felony probation. On the last day of my probation I was cleared by my probation officer. Although technically my probation did not end until midnight, when I met with my probation officer in the morning she gave me a letter stating I had met my obligations and at midnight would be clear from further supervision. I had been planning a move out of the state the following day and in preparation had rented a moving van and was beginning to pack my things. With the van parked in front of my house, an overzealous sheriff deputy who knew I was on probation, stopped to see what was going on. Simply because I had already begun packing the van, he decided he would violate my probation for moving without permission. I was arrested again for a violation and subsequently spent the night in jail until a judge released me the following morning. Luckily my attorney was able to convince the state not to press for additional time and my probation was terminated. It cost me a little over $1000 in additional legal fees (or as my attorney so eloquently put it, do you want me just to play golf with state's attorney or take him to dinner afterwards) for my attorney to handle that for me. I was fortunate enough to be able to afford the costs, however, I have seen first hand how others without the means would have been violated and most likely would have served time or an additional length of probation resulting in additional costs. While someone else pointed out that high incarceration rates are not entirely to blame on the war on drugs, they are directly related. We live in a society where zero-tolerance laws take precedence over common-sense laws. We incarcerate people at the highest rate in the world. The system is like a giant ponzi scheme. We incarcerate so many people that we have to charge outrageous court and other fees to afford to support the cycle of incarceration. Yet the failure to pay these same fees are often one of the leading reasons that people are violated on probation or parole. We have people serving mandatory sentences for charges that in today's society are no longer crimes. However, if a politician attempts to make a change and get those individuals released they are viewed as being soft on crime. An interesting study would really be a comparison of fees paid to sentence served. I know I was able to essentially pay more in fees to reduce my probation time. Similar to getting a mortgage and paying points up front to reduce your interest rate. | Mid | [
0.5448577680525161,
31.125,
26
] |
This invention relates to the field of compact electrically powered heaters mounted in exhaust streams from chemical or manufacturing processes or from engines, both mobile and stationary. One can use such heaters (a) for bringing exhaust streams up to temperature rapidly under cold start conditions, for emission control, and (b) for holding exhaust streams at sufficiently high temperatures, such that a catalyst can be heated to and held at or above its light-off temperature, where it becomes effective, and (c) for general process heating. In a particular application of the invention, an electrically heatable cord is close-coupled to a conventional catalyst or catalysts in the exhaust system of a vehicle. The heatable core serves to heat the conventional catalyst during initial cold start conditions, according to a predetermined heating-control strategy, by means of radiative and convective transfer of heat energy. In a second embodiment of the invention, the heated elements (metal strips) are coated with catalyst materials and can be positioned upstream of a conventional catalyst or catalysts. The light-off of the catalyst adhered directly to the strip is more rapid than in the case above. In this latter case, the heater is known as an "electrically heated converter" (EHC). Descriptions of EHCs appear in U.S. Pat. Nos. 4,928,485, 4,976,929, and 5,070,694. This specification hereby incorporates by reference the disclosures of all of the above-cited patents. In either the first or the second embodiment of the invention, the new devices trigger the release of chemical energy to provide heat to light-off the main catalyst and maintain the gas stream at the light-off temperature. In its most general form, the present invention comprises an electrically powered non-catalytic heater which can be used to heat a gas stream. | Mid | [
0.577689243027888,
36.25,
26.5
] |
9. GPL Advantages and Disadvantages A common reason to use the GPL is when modifying or extending the gcc compiler. This is particularly apt when working with one-off specialty CPUs in environments where all software costs are likely to be considered overhead, with minimal expectations that others will use the resulting compiler. The GPL is also attractive to small companies selling CDs in an environment where "buy-low, sell-high" may still give the end-user a very inexpensive product. It is also attractive to companies that expect to survive by providing various forms of technical support, including documentation, for the GPLed intellectual property world. A less publicized and unintended use of the GPL is that it is very favorable to large companies that want to undercut software companies. In other words, the GPL is well suited for use as a marketing weapon, potentially reducing overall economic benefit and contributing to monopolistic behavior. The GPL can present a real problem for those wishing to commercialize and profit from software. For example, the GPL adds to the difficulty a graduate student will have in directly forming a company to commercialize his research results, or the difficulty a student will have in joining a company on the assumption that a promising research project will be commercialized. For those who must work with statically-linked implementations of multiple software standards, the GPL is often a poor license, because it precludes using proprietary implementations of the standards. The GPL thus minimizes the number of programs that can be built using a GPLed standard. The GPL was intended to not provide a mechanism to develop a standard on which one engineers proprietary products. (This does not apply to Linux applications because they do not statically link, rather they use a trap-based API.) The GPL attempts to make programmers contribute to an evolving suite of programs, then to compete in the distribution and support of this suite. This situation is unrealistic for many required core system standards, which may be applied in widely varying environments which require commercial customization or integration with legacy standards under existing (non-GPL) licenses. Real-time systems are often statically linked, so the GPL and LGPL are definitely considered potential problems by many embedded systems companies. The GPL is an attempt to keep efforts, regardless of demand, at the research and development stages. This maximizes the benefits to researchers and developers, at an unknown cost to those who would benefit from wider distribution. The GPL was designed to keep research results from transitioning to proprietary products. This step is often assumed to be the last step in the traditional technology transfer pipeline and it is usually difficult enough under the best of circumstances; the GPL was intended to make it impossible. | Low | [
0.536263736263736,
30.5,
26.375
] |
<?xml version="1.0"?> <CodeBlocks_project_file> <FileVersion major="1" minor="6" /> <Project> <Option title="example-audiowaveform" /> <Option makefile="makefile" /> <Option pch_mode="2" /> <Option compiler="gcc" /> <Option virtualFolders="addons\;src\;" /> <Build> <Target title="release"> <Option output="bin\$(PROJECT_NAME)" prefix_auto="1" extension_auto="1" /> <Option working_dir="bin" /> <Option object_output="obj\release" /> <Option external_deps="..\..\..\libs\openFrameworksCompiled\lib\win_cb\openFrameworks.lib;" /> <Option type="1" /> <Option compiler="gcc" /> <Option projectLinkerOptionsRelation="2" /> <Compiler> <Add option="-O2" /> </Compiler> <Linker> <Add option="-s" /> <Add option="../../../libs/openFrameworksCompiled/lib/win_cb/openFrameworks.lib" /> </Linker> </Target> <Target title="debug"> <Option output="bin\$(PROJECT_NAME)_DEBUG" prefix_auto="1" extension_auto="1" /> <Option working_dir="bin" /> <Option object_output="obj\debug\" /> <Option external_deps="..\..\..\libs\openFrameworksCompiled\lib\win_cb\openFrameworksDebug.lib;" /> <Option type="1" /> <Option compiler="gcc" /> <Option projectLinkerOptionsRelation="2" /> <Compiler> <Add option="-g" /> </Compiler> <Linker> <Add option="../../../libs/openFrameworksCompiled/lib/win_cb/openFrameworksDebug.lib" /> </Linker> </Target> </Build> <Compiler> <Add option="-Wno-multichar" /> <Add directory="..\..\..\libs\glu\include" /> <Add directory="..\..\..\libs\freetype\include" /> <Add directory="..\..\..\libs\freetype\include\freetype2" /> <Add directory="..\..\..\libs\FreeImage\include" /> <Add directory="..\..\..\libs\quicktime\include" /> <Add directory="..\..\..\libs\rtAudio\include" /> <Add directory="..\..\..\libs\fmodex\include" /> <Add directory="..\..\..\libs\videoInput\include" /> <Add directory="..\..\..\libs\glew\include" /> <Add directory="..\..\..\libs\glut\include" /> <Add directory="..\..\..\libs\openFrameworks" /> <Add directory="..\..\..\libs\openFrameworks\3d" /> <Add directory="..\..\..\libs\openFrameworks\app" /> <Add directory="..\..\..\libs\openFrameworks\communication" /> <Add directory="..\..\..\libs\openFrameworks\events" /> <Add directory="..\..\..\libs\openFrameworks\gl" /> <Add directory="..\..\..\libs\openFrameworks\graphics" /> <Add directory="..\..\..\libs\openFrameworks\math" /> <Add directory="..\..\..\libs\openFrameworks\sound" /> <Add directory="..\..\..\libs\openFrameworks\types" /> <Add directory="..\..\..\libs\openFrameworks\utils" /> <Add directory="..\..\..\libs\openFrameworks\video" /> <Add directory="..\..\..\libs\poco\include" /> <Add directory="..\..\..\libs\tess2\include" /> <Add directory="..\..\..\libs\cairo\include\cairo" /> <Add directory="../../../addons/ofxXmlSettings/libs" /> <Add directory="../../../addons/ofxXmlSettings/src" /> <Add directory="../../../addons\ofxXmlSettings\libs" /> <Add directory="../../../addons\ofxXmlSettings\src" /> <Add directory="../../../addons/ofxMSATimer/libs" /> <Add directory="../../../addons/ofxMSATimer/src" /> <Add directory="../../../addons\ofxMSATimer\src" /> <Add directory="../../../addons/ofxRange/libs" /> <Add directory="../../../addons/ofxRange/src" /> <Add directory="../../../addons\ofxRange\src" /> <Add directory="../../../addons/ofxTextInputField/libs" /> <Add directory="../../../addons/ofxTextInputField/src" /> <Add directory="../../../addons\ofxTextInputField\src" /> <Add directory="../../../addons/ofxTimecode/libs" /> <Add directory="../../../addons/ofxTimecode/src" /> <Add directory="../../../addons\ofxTimecode\src" /> <Add directory="../../../addons/ofxTimeline/libs" /> <Add directory="../../../addons/ofxTimeline/src" /> <Add directory="../../../addons\ofxTimeline\libs\kiss" /> <Add directory="../../../addons\ofxTimeline\libs\kiss\include" /> <Add directory="../../../addons\ofxTimeline\libs\kiss\src" /> <Add directory="../../../addons\ofxTimeline\libs\ofOpenALSoundPlayer_TimelineAdditions" /> <Add directory="../../../addons\ofxTimeline\libs\ofOpenALSoundPlayer_TimelineAdditions\src" /> <Add directory="../../../addons\ofxTimeline\libs\openal" /> <Add directory="../../../addons\ofxTimeline\libs\openal\include" /> <Add directory="../../../addons\ofxTimeline\libs\openal\include\AL" /> <Add directory="../../../addons\ofxTimeline\libs\openal\libs" /> <Add directory="../../../addons\ofxTimeline\libs\openal\libs\win_cb" /> <Add directory="../../../addons\ofxTimeline\libs\openal\libs\win_cb\EFX-Util_MT" /> <Add directory="../../../addons\ofxTimeline\libs\openal\libs\win_cb\EFX-Util_MTDLL" /> <Add directory="../../../addons\ofxTimeline\libs\sndfile" /> <Add directory="../../../addons\ofxTimeline\libs\sndfile\include" /> <Add directory="../../../addons\ofxTimeline\libs\sndfile\lib" /> <Add directory="../../../addons\ofxTimeline\libs\sndfile\lib\win_cb" /> <Add directory="../../../addons\ofxTimeline\libs\sndfile\redist" /> <Add directory="../../../addons\ofxTimeline\src" /> <Add directory="../../../addons/ofxTween/libs" /> <Add directory="../../../addons/ofxTween/src" /> <Add directory="../../../addons\ofxTween\src" /> <Add directory="../../../addons\ofxTween\src\Easings" /> </Compiler> <Linker> <Add library="..\..\..\libs\FreeImage\lib\win_cb\FreeImage.lib" /> <Add library="..\..\..\libs\rtAudio\lib\win_cb\librtaudio.a" /> <Add library="..\..\..\libs\quicktime\lib\win_cb\qtmlClient.lib" /> <Add library="..\..\..\libs\cairo\lib\win_cb\libcairo.a" /> <Add library="..\..\..\libs\cairo\lib\win_cb\libpixman-1.a" /> <Add library="..\..\..\libs\freetype\lib\win_cb\libfreetype.a" /> <Add library="..\..\..\libs\glut\lib\win_cb\libglut.a" /> <Add library="..\..\..\libs\videoInput\lib\win_cb\videoInputLib.a" /> <Add library="..\..\..\libs\fmodex\lib\win_cb\libfmodex.a" /> <Add library="..\..\..\libs\glew\lib\win_cb\glew32s.lib" /> <Add library="..\..\..\libs\glu\lib\win_cb\glu32.lib" /> <Add library="..\..\..\libs\poco\lib\win_cb\libPocoNet.a" /> <Add library="..\..\..\libs\poco\lib\win_cb\libPocoUtil.a" /> <Add library="..\..\..\libs\poco\lib\win_cb\libPocoXML.a" /> <Add library="..\..\..\libs\poco\lib\win_cb\libPocoFoundation.a" /> <Add library="..\..\..\libs\tess2\lib\win_cb\libtess2.a" /> <Add library="opengl32" /> <Add library="gdi32" /> <Add library="msimg32" /> <Add library="glu32" /> <Add library="dsound" /> <Add library="winmm" /> <Add library="dxguid" /> <Add library="strmbase" /> <Add library="strmiids" /> <Add library="z" /> <Add library="uuid" /> <Add library="ole32" /> <Add library="oleaut32" /> <Add library="setupapi" /> <Add library="wsock32" /> <Add library="ws2_32" /> <Add library="Iphlpapi" /> <Add library="Comdlg32" /> <Add library="../../../addons\ofxTimeline\libs\openal\libs\win_cb\EFX-Util_MT\EFX-Util.lib" /> <Add library="../../../addons\ofxTimeline\libs\openal\libs\win_cb\EFX-Util_MTDLL\EFX-Util.lib" /> <Add library="../../../addons\ofxTimeline\libs\openal\libs\win_cb\OpenAL32.lib" /> <Add library="../../../addons\ofxTimeline\libs\sndfile\lib\win_cb\libsndfile-1.lib" /> </Linker> <ExtraCommands> <Add after="xcopy /e /i /y "$(PROJECT_DIR)..\..\..\export\win_cb\*.dll" "$(PROJECT_DIR)bin"" /> <Add after="cmd /c if not exist "$(PROJECT_DIR)bin/data" mkdir "$(PROJECT_DIR)bin/data"" /> <Mode after="always" /> </ExtraCommands> <Unit filename="src\main.cpp"> <Option virtualFolder="src" /> </Unit> <Unit filename="src\testApp.cpp"> <Option virtualFolder="src" /> </Unit> <Unit filename="src\testApp.h"> <Option virtualFolder="src" /> </Unit> <Extensions> <code_completion /> <debugger /> <envvars /> </Extensions> <Unit filename="../../../addons\ofxXmlSettings\src\ofxXmlSettings.cpp"> <Option virtualFolder="addons\ofxXmlSettings\src" /> </Unit> <Unit filename="../../../addons\ofxXmlSettings\src\ofxXmlSettings.h"> <Option virtualFolder="addons\ofxXmlSettings\src" /> </Unit> <Unit filename="../../../addons\ofxXmlSettings\libs\tinyxml.cpp"> <Option virtualFolder="addons\ofxXmlSettings\libs" /> </Unit> <Unit filename="../../../addons\ofxXmlSettings\libs\tinyxml.h"> <Option virtualFolder="addons\ofxXmlSettings\libs" /> </Unit> <Unit filename="../../../addons\ofxXmlSettings\libs\tinyxmlerror.cpp"> <Option virtualFolder="addons\ofxXmlSettings\libs" /> </Unit> <Unit filename="../../../addons\ofxXmlSettings\libs\tinyxmlparser.cpp"> <Option virtualFolder="addons\ofxXmlSettings\libs" /> </Unit> <Unit filename="../../../addons\ofxMSATimer\src\ofxMSATimer.cpp"> <Option virtualFolder="addons\ofxMSATimer\src" /> </Unit> <Unit filename="../../../addons\ofxMSATimer\src\ofxMSATimer.h"> <Option virtualFolder="addons\ofxMSATimer\src" /> </Unit> <Unit filename="../../../addons\ofxRange\src\ofRange.h"> <Option virtualFolder="addons\ofxRange\src" /> </Unit> <Unit filename="../../../addons\ofxTextInputField\src\ofxTextInputField.cpp"> <Option virtualFolder="addons\ofxTextInputField\src" /> </Unit> <Unit filename="../../../addons\ofxTextInputField\src\ofxTextInputField.h"> <Option virtualFolder="addons\ofxTextInputField\src" /> </Unit> <Unit filename="../../../addons\ofxTimecode\src\ofxTimecode.cpp"> <Option virtualFolder="addons\ofxTimecode\src" /> </Unit> <Unit filename="../../../addons\ofxTimecode\src\ofxTimecode.h"> <Option virtualFolder="addons\ofxTimecode\src" /> </Unit> <Unit filename="../../../addons\ofxTimeline\src\ofxHotKeys.h"> <Option virtualFolder="addons\ofxTimeline\src" /> </Unit> <Unit filename="../../../addons\ofxTimeline\src\ofxHotKeys_impl_linux.cpp"> <Option virtualFolder="addons\ofxTimeline\src" /> </Unit> <Unit filename="../../../addons\ofxTimeline\src\ofxHotKeys_impl_mac.mm"> <Option virtualFolder="addons\ofxTimeline\src" /> </Unit> <Unit filename="../../../addons\ofxTimeline\src\ofxHotKeys_impl_win.cpp"> <Option virtualFolder="addons\ofxTimeline\src" /> </Unit> <Unit filename="../../../addons\ofxTimeline\src\ofxRemoveCocoaMenu.h"> <Option virtualFolder="addons\ofxTimeline\src" /> </Unit> <Unit filename="../../../addons\ofxTimeline\src\ofxRemoveCocoaMenu.mm"> <Option virtualFolder="addons\ofxTimeline\src" /> </Unit> <Unit filename="../../../addons\ofxTimeline\src\ofxTimeline.cpp"> <Option virtualFolder="addons\ofxTimeline\src" /> </Unit> <Unit filename="../../../addons\ofxTimeline\src\ofxTimeline.h"> <Option virtualFolder="addons\ofxTimeline\src" /> </Unit> <Unit filename="../../../addons\ofxTimeline\src\ofxTLAudioTrack.cpp"> <Option virtualFolder="addons\ofxTimeline\src" /> </Unit> <Unit filename="../../../addons\ofxTimeline\src\ofxTLAudioTrack.h"> <Option virtualFolder="addons\ofxTimeline\src" /> </Unit> <Unit filename="../../../addons\ofxTimeline\src\ofxTLBangs.cpp"> <Option virtualFolder="addons\ofxTimeline\src" /> </Unit> <Unit filename="../../../addons\ofxTimeline\src\ofxTLBangs.h"> <Option virtualFolder="addons\ofxTimeline\src" /> </Unit> <Unit filename="../../../addons\ofxTimeline\src\ofxTLCameraTrack.cpp"> <Option virtualFolder="addons\ofxTimeline\src" /> </Unit> <Unit filename="../../../addons\ofxTimeline\src\ofxTLCameraTrack.h"> <Option virtualFolder="addons\ofxTimeline\src" /> </Unit> <Unit filename="../../../addons\ofxTimeline\src\ofxTLColors.cpp"> <Option virtualFolder="addons\ofxTimeline\src" /> </Unit> <Unit filename="../../../addons\ofxTimeline\src\ofxTLColors.h"> <Option virtualFolder="addons\ofxTimeline\src" /> </Unit> <Unit filename="../../../addons\ofxTimeline\src\ofxTLColorTrack.cpp"> <Option virtualFolder="addons\ofxTimeline\src" /> </Unit> <Unit filename="../../../addons\ofxTimeline\src\ofxTLColorTrack.h"> <Option virtualFolder="addons\ofxTimeline\src" /> </Unit> <Unit filename="../../../addons\ofxTimeline\src\ofxTLCurves.cpp"> <Option virtualFolder="addons\ofxTimeline\src" /> </Unit> <Unit filename="../../../addons\ofxTimeline\src\ofxTLCurves.h"> <Option virtualFolder="addons\ofxTimeline\src" /> </Unit> <Unit filename="../../../addons\ofxTimeline\src\ofxTLEmptyKeyframes.cpp"> <Option virtualFolder="addons\ofxTimeline\src" /> </Unit> <Unit filename="../../../addons\ofxTimeline\src\ofxTLEmptyKeyframes.h"> <Option virtualFolder="addons\ofxTimeline\src" /> </Unit> <Unit filename="../../../addons\ofxTimeline\src\ofxTLEmptyTrack.cpp"> <Option virtualFolder="addons\ofxTimeline\src" /> </Unit> <Unit filename="../../../addons\ofxTimeline\src\ofxTLEmptyTrack.h"> <Option virtualFolder="addons\ofxTimeline\src" /> </Unit> <Unit filename="../../../addons\ofxTimeline\src\ofxTLEvents.h"> <Option virtualFolder="addons\ofxTimeline\src" /> </Unit> <Unit filename="../../../addons\ofxTimeline\src\ofxTLFlags.cpp"> <Option virtualFolder="addons\ofxTimeline\src" /> </Unit> <Unit filename="../../../addons\ofxTimeline\src\ofxTLFlags.h"> <Option virtualFolder="addons\ofxTimeline\src" /> </Unit> <Unit filename="../../../addons\ofxTimeline\src\ofxTLImageSequence.cpp"> <Option virtualFolder="addons\ofxTimeline\src" /> </Unit> <Unit filename="../../../addons\ofxTimeline\src\ofxTLImageSequence.h"> <Option virtualFolder="addons\ofxTimeline\src" /> </Unit> <Unit filename="../../../addons\ofxTimeline\src\ofxTLImageSequenceFrame.cpp"> <Option virtualFolder="addons\ofxTimeline\src" /> </Unit> <Unit filename="../../../addons\ofxTimeline\src\ofxTLImageSequenceFrame.h"> <Option virtualFolder="addons\ofxTimeline\src" /> </Unit> <Unit filename="../../../addons\ofxTimeline\src\ofxTLImageTrack.cpp"> <Option virtualFolder="addons\ofxTimeline\src" /> </Unit> <Unit filename="../../../addons\ofxTimeline\src\ofxTLImageTrack.h"> <Option virtualFolder="addons\ofxTimeline\src" /> </Unit> <Unit filename="../../../addons\ofxTimeline\src\ofxTLInOut.cpp"> <Option virtualFolder="addons\ofxTimeline\src" /> </Unit> <Unit filename="../../../addons\ofxTimeline\src\ofxTLInOut.h"> <Option virtualFolder="addons\ofxTimeline\src" /> </Unit> <Unit filename="../../../addons\ofxTimeline\src\ofxTLKeyframes.cpp"> <Option virtualFolder="addons\ofxTimeline\src" /> </Unit> <Unit filename="../../../addons\ofxTimeline\src\ofxTLKeyframes.h"> <Option virtualFolder="addons\ofxTimeline\src" /> </Unit> <Unit filename="../../../addons\ofxTimeline\src\ofxTLLFO.cpp"> <Option virtualFolder="addons\ofxTimeline\src" /> </Unit> <Unit filename="../../../addons\ofxTimeline\src\ofxTLLFO.h"> <Option virtualFolder="addons\ofxTimeline\src" /> </Unit> <Unit filename="../../../addons\ofxTimeline\src\ofxTLPage.cpp"> <Option virtualFolder="addons\ofxTimeline\src" /> </Unit> <Unit filename="../../../addons\ofxTimeline\src\ofxTLPage.h"> <Option virtualFolder="addons\ofxTimeline\src" /> </Unit> <Unit filename="../../../addons\ofxTimeline\src\ofxTLPageTabs.cpp"> <Option virtualFolder="addons\ofxTimeline\src" /> </Unit> <Unit filename="../../../addons\ofxTimeline\src\ofxTLPageTabs.h"> <Option virtualFolder="addons\ofxTimeline\src" /> </Unit> <Unit filename="../../../addons\ofxTimeline\src\ofxTLSwitches.cpp"> <Option virtualFolder="addons\ofxTimeline\src" /> </Unit> <Unit filename="../../../addons\ofxTimeline\src\ofxTLSwitches.h"> <Option virtualFolder="addons\ofxTimeline\src" /> </Unit> <Unit filename="../../../addons\ofxTimeline\src\ofxTLTicker.cpp"> <Option virtualFolder="addons\ofxTimeline\src" /> </Unit> <Unit filename="../../../addons\ofxTimeline\src\ofxTLTicker.h"> <Option virtualFolder="addons\ofxTimeline\src" /> </Unit> <Unit filename="../../../addons\ofxTimeline\src\ofxTLTrack.cpp"> <Option virtualFolder="addons\ofxTimeline\src" /> </Unit> <Unit filename="../../../addons\ofxTimeline\src\ofxTLTrack.h"> <Option virtualFolder="addons\ofxTimeline\src" /> </Unit> <Unit filename="../../../addons\ofxTimeline\src\ofxTLTrackHeader.cpp"> <Option virtualFolder="addons\ofxTimeline\src" /> </Unit> <Unit filename="../../../addons\ofxTimeline\src\ofxTLTrackHeader.h"> <Option virtualFolder="addons\ofxTimeline\src" /> </Unit> <Unit filename="../../../addons\ofxTimeline\src\ofxTLVideoThumb.cpp"> <Option virtualFolder="addons\ofxTimeline\src" /> </Unit> <Unit filename="../../../addons\ofxTimeline\src\ofxTLVideoThumb.h"> <Option virtualFolder="addons\ofxTimeline\src" /> </Unit> <Unit filename="../../../addons\ofxTimeline\src\ofxTLVideoTrack.cpp"> <Option virtualFolder="addons\ofxTimeline\src" /> </Unit> <Unit filename="../../../addons\ofxTimeline\src\ofxTLVideoTrack.h"> <Option virtualFolder="addons\ofxTimeline\src" /> </Unit> <Unit filename="../../../addons\ofxTimeline\src\ofxTLZoomer.cpp"> <Option virtualFolder="addons\ofxTimeline\src" /> </Unit> <Unit filename="../../../addons\ofxTimeline\src\ofxTLZoomer.h"> <Option virtualFolder="addons\ofxTimeline\src" /> </Unit> <Unit filename="../../../addons\ofxTimeline\libs\kiss\include\kiss_fft.h"> <Option virtualFolder="addons\ofxTimeline\libs\kiss\include" /> </Unit> <Unit filename="../../../addons\ofxTimeline\libs\kiss\include\kiss_fftr.h"> <Option virtualFolder="addons\ofxTimeline\libs\kiss\include" /> </Unit> <Unit filename="../../../addons\ofxTimeline\libs\kiss\src\kiss_fft.c"> <Option virtualFolder="addons\ofxTimeline\libs\kiss\src" /> </Unit> <Unit filename="../../../addons\ofxTimeline\libs\kiss\src\kiss_fftr.c"> <Option virtualFolder="addons\ofxTimeline\libs\kiss\src" /> </Unit> <Unit filename="../../../addons\ofxTimeline\libs\kiss\src\_kiss_fft_guts.h"> <Option virtualFolder="addons\ofxTimeline\libs\kiss\src" /> </Unit> <Unit filename="../../../addons\ofxTimeline\libs\ofOpenALSoundPlayer_TimelineAdditions\src\ofOpenALSoundPlayer_TimelineAdditions.cpp"> <Option virtualFolder="addons\ofxTimeline\libs\ofOpenALSoundPlayer_TimelineAdditions\src" /> </Unit> <Unit filename="../../../addons\ofxTimeline\libs\ofOpenALSoundPlayer_TimelineAdditions\src\ofOpenALSoundPlayer_TimelineAdditions.h"> <Option virtualFolder="addons\ofxTimeline\libs\ofOpenALSoundPlayer_TimelineAdditions\src" /> </Unit> <Unit filename="../../../addons\ofxTimeline\libs\openal\include\AL\al.h"> <Option virtualFolder="addons\ofxTimeline\libs\openal\include\AL" /> </Unit> <Unit filename="../../../addons\ofxTimeline\libs\openal\include\AL\alc.h"> <Option virtualFolder="addons\ofxTimeline\libs\openal\include\AL" /> </Unit> <Unit filename="../../../addons\ofxTimeline\libs\openal\include\AL\efx-creative.h"> <Option virtualFolder="addons\ofxTimeline\libs\openal\include\AL" /> </Unit> <Unit filename="../../../addons\ofxTimeline\libs\openal\include\AL\EFX-Util.h"> <Option virtualFolder="addons\ofxTimeline\libs\openal\include\AL" /> </Unit> <Unit filename="../../../addons\ofxTimeline\libs\openal\include\AL\efx.h"> <Option virtualFolder="addons\ofxTimeline\libs\openal\include\AL" /> </Unit> <Unit filename="../../../addons\ofxTimeline\libs\openal\include\AL\xram.h"> <Option virtualFolder="addons\ofxTimeline\libs\openal\include\AL" /> </Unit> <Unit filename="../../../addons\ofxTimeline\libs\sndfile\include\sndfile.h"> <Option virtualFolder="addons\ofxTimeline\libs\sndfile\include" /> </Unit> <Unit filename="../../../addons\ofxTween\src\Easings\easing_terms_of_use.html"> <Option virtualFolder="addons\ofxTween\src\Easings" /> </Unit> <Unit filename="../../../addons\ofxTween\src\Easings\ofxEasing.cpp"> <Option virtualFolder="addons\ofxTween\src\Easings" /> </Unit> <Unit filename="../../../addons\ofxTween\src\Easings\ofxEasing.h"> <Option virtualFolder="addons\ofxTween\src\Easings" /> </Unit> <Unit filename="../../../addons\ofxTween\src\Easings\ofxEasingBack.cpp"> <Option virtualFolder="addons\ofxTween\src\Easings" /> </Unit> <Unit filename="../../../addons\ofxTween\src\Easings\ofxEasingBack.h"> <Option virtualFolder="addons\ofxTween\src\Easings" /> </Unit> <Unit filename="../../../addons\ofxTween\src\Easings\ofxEasingBounce.cpp"> <Option virtualFolder="addons\ofxTween\src\Easings" /> </Unit> <Unit filename="../../../addons\ofxTween\src\Easings\ofxEasingBounce.h"> <Option virtualFolder="addons\ofxTween\src\Easings" /> </Unit> <Unit filename="../../../addons\ofxTween\src\Easings\ofxEasingCirc.cpp"> <Option virtualFolder="addons\ofxTween\src\Easings" /> </Unit> <Unit filename="../../../addons\ofxTween\src\Easings\ofxEasingCirc.h"> <Option virtualFolder="addons\ofxTween\src\Easings" /> </Unit> <Unit filename="../../../addons\ofxTween\src\Easings\ofxEasingCubic.cpp"> <Option virtualFolder="addons\ofxTween\src\Easings" /> </Unit> <Unit filename="../../../addons\ofxTween\src\Easings\ofxEasingCubic.h"> <Option virtualFolder="addons\ofxTween\src\Easings" /> </Unit> <Unit filename="../../../addons\ofxTween\src\Easings\ofxEasingElastic.cpp"> <Option virtualFolder="addons\ofxTween\src\Easings" /> </Unit> <Unit filename="../../../addons\ofxTween\src\Easings\ofxEasingElastic.h"> <Option virtualFolder="addons\ofxTween\src\Easings" /> </Unit> <Unit filename="../../../addons\ofxTween\src\Easings\ofxEasingExpo.cpp"> <Option virtualFolder="addons\ofxTween\src\Easings" /> </Unit> <Unit filename="../../../addons\ofxTween\src\Easings\ofxEasingExpo.h"> <Option virtualFolder="addons\ofxTween\src\Easings" /> </Unit> <Unit filename="../../../addons\ofxTween\src\Easings\ofxEasingLinear.cpp"> <Option virtualFolder="addons\ofxTween\src\Easings" /> </Unit> <Unit filename="../../../addons\ofxTween\src\Easings\ofxEasingLinear.h"> <Option virtualFolder="addons\ofxTween\src\Easings" /> </Unit> <Unit filename="../../../addons\ofxTween\src\Easings\ofxEasingQuad.cpp"> <Option virtualFolder="addons\ofxTween\src\Easings" /> </Unit> <Unit filename="../../../addons\ofxTween\src\Easings\ofxEasingQuad.h"> <Option virtualFolder="addons\ofxTween\src\Easings" /> </Unit> <Unit filename="../../../addons\ofxTween\src\Easings\ofxEasingQuart.cpp"> <Option virtualFolder="addons\ofxTween\src\Easings" /> </Unit> <Unit filename="../../../addons\ofxTween\src\Easings\ofxEasingQuart.h"> <Option virtualFolder="addons\ofxTween\src\Easings" /> </Unit> <Unit filename="../../../addons\ofxTween\src\Easings\ofxEasingQuint.cpp"> <Option virtualFolder="addons\ofxTween\src\Easings" /> </Unit> <Unit filename="../../../addons\ofxTween\src\Easings\ofxEasingQuint.h"> <Option virtualFolder="addons\ofxTween\src\Easings" /> </Unit> <Unit filename="../../../addons\ofxTween\src\Easings\ofxEasingSine.cpp"> <Option virtualFolder="addons\ofxTween\src\Easings" /> </Unit> <Unit filename="../../../addons\ofxTween\src\Easings\ofxEasingSine.h"> <Option virtualFolder="addons\ofxTween\src\Easings" /> </Unit> <Unit filename="../../../addons\ofxTween\src\ofxTween.cpp"> <Option virtualFolder="addons\ofxTween\src" /> </Unit> <Unit filename="../../../addons\ofxTween\src\ofxTween.h"> <Option virtualFolder="addons\ofxTween\src" /> </Unit> </Project> </CodeBlocks_project_file> | Mid | [
0.595936794582392,
33,
22.375
] |
391 F.2d 420 Joseph SCHENFELD, Appellant,v.NORTON COMPANY, Appellee. No. 9386. United States Court of Appeals Tenth Circuit. March 25, 1968. Rehearing Denied July 2, 1968. Philip Hornbein, Jr., Denver, Colo. (Roy O. Goldin, Denver, Colo., was with him on brief), for appellant. John C. Mott, Denver, Colo. (of Zarlengo, Mott & Carlin, Denver, Colo.), for appellee. Before MURRAH, Chief Judge, and BARROW and DELEHANT*, District Judges. MURRAH, Chief Judge. 1 Appellant Joseph Schenfeld was injured in the course of his employment with Western Foundries, Inc., when a grinding wheel he was using flew into pieces, one or more of which struck him in the face. The wheel was mounted on a power grinder by means of a metal mount. Schenfeld brought suit against appellee Norton Company (the manufacturer and supplier of both the grinding wheel and metal mount), alleging: (1) breach of an implied warranty that the grinding wheel was in all respects fit, proper and safe to be used when mounted in the manner in which it was, and (2) negligence. At the close of the evidence the trial judge sustained Norton's motion to dismiss the implied warranty claim. He found that the metal mount was not sold by Norton to Schenfeld's employer, and concluded that in the absence of a "sale", there could be no implied warranty. The case was submitted to the jury on the negligence count, the court instructing on both negligence and contributory negligence. Judgment was entered on the jury verdict in favor of Norton. On appeal, Schenfeld contends that the trial judge erred in: (1) instructing the jury on contributory negligence, and (2) dismissing the implied warranty claim. 2 The record discloses the following pertinent facts. Norton manufactures and markets approximately 250,000 varieties of grinding wheels. The type being used by Schenfeld at the time of the accident was a so-called "raised hub" grinding wheel, designed to perform a particular grinding operation. Norton markets, as a separate item, a fiber mount to be used for mounting raised hub wheels. For some time prior to the accident Western Foundries' Foreman Grieve had purchased hub grinding wheels and fiber mounts from Danielson, Norton's salesman who made monthly visits to the foundry. Grieve became dissatisfied with the fiber mounts because they wore down too quickly and, about a month before Schenfeld's injury, asked Danielson if there was a metal mount that could be used in place of the fiber one. Danielson replied that although Norton did not make a metal mount for sale as a separate item, it did market, as a complete unit, a metal mount and grinding wheel attached together by means of a cement adhesive. This unit was called a "dis-card mount wheel" or a "throw-away mount wheel" because the mount was discarded along with the wheel when the wheel was worn out. Danielson said he would get Grieve one or two of these metal dis-card mounts which, after removal from the attached grinding wheels, could be used in place of the fiber mounts. A few days later Danielson brought two of the throw-away mounts to Western Foundries and told Grieve "to give these a try and see if they would work."1 3 On the morning of the accident, Grieve personally mounted a hub wheel (admittedly manufactured and marketed by Norton) on a portable grinder by means of one of the supplied metal mounts. He subsequently assigned the grinder to Schenfeld to remove rough places from a cast iron irrigation gate. Schenfeld testified that after checking the grinding wheel for chips, he started the grinder and had "barely touched" the gate with the grinding wheel when the accident occurred. 4 The trial of the case was essentially a battle of experts. In support of his negligence and breach of warranty counts, Schenfeld presented expert testimony to the effect that there was a mismatch between the metal mount supplied by Danielson and the grinding wheel; that this mis-match created a gap between the mount and the wheel; and that when the two were placed on the grinder and tightened, a stress was created in the grinding wheel, causing it to break and injure Schenfeld. This conclusion as to the cause of the accident was refuted by two expert witnesses called by Norton. Based upon their examination of the wheel fragments, they concluded that the grinding wheel broke as the result of being "jammed" by the operator, i. e. banged suddenly into the work piece. 5 At the close of the evidence, the trial judge, over objection by Schenfeld's counsel, instructed the jury to return a verdict for Norton if the jury found that Schenfeld was guilty of contributory negligence. On appeal, Schenfeld argues that the expert testimony to the effect that the accident was caused by jamming on the part of Schenfeld was merely "surmise, speculation and conjecture", and did not form a sufficient basis upon which to predicate an instruction on contributory negligence. On the contrary, we think the instruction was proper. 6 It is true of course that contributory negligence, like primary negligence, must be based upon something more than speculation or surmise, but negligence, either primary or contributory, may be established by reasonable inferences drawn from the facts and circumstances surrounding the accident. See Martin K. Eby Construction Co. v. Neely, 10 Cir., 344 F.2d 482; McCready v. United Iron and Steel Co., 10 Cir., 272 F.2d 700; and Remley v. Newton, 147 Colo. 401, 364 P.2d 581. Norton's experts examined the wheel fragments as they existed immediately following the accident, and listened to Schenfeld's description of the manner in which he was holding the grinder when the accident occurred. From the information thus gathered, they concluded that the accident resulted from "jamming" on the part of the operator. We think the opinion they formed and expressed was permissible under the facts and circumstances, and warranted an instruction on contributory negligence. 7 Before considering the propriety of the trial judge's dismissal of Schenfeld's implied warranty claim, it seems appropriate to quickly review the development and present status of the various potential recovery routes open to a claimant injured by a defective product. One such avenue of redress is, of course, an action for negligence. Since MacPherson v. Buick Motor Co., 217 N.Y. 382, 111 N.E. 1050, it is no longer doubted that the supplier of a chattel negligently made is liable for foreseeable harm to anyone injured, regardless of privity. See Prosser, The Assault Upon the Citadel (Strict Liability to the Consumer), 69 Yale L.J. 1099, 1100-1103 (1960). 8 Independently of the negligence route, recovery has been traditionally allowed for breach of an express or implied warranty. Such a warranty was considered to be a part of the contract between the seller and buyer and thus had its basis in contract law. See Dagley v. Armstrong Rubber Co., 7 Cir., 344 F.2d 245. With the advent of the Uniform Sales Act, now replaced in the vast majority of states by the Uniform Commercial Code, recovery became conditioned upon compliance with its pertinent warranty provisions. USA §§ 12 and 15. Recovery was often precluded, however, by the assertion of certain recognized contractual defenses such as lack of privity or the existence of a disclaimer. See Annot., 75 A.L.R.2d 39, 47-54. In response to a felt need, many courts circumvented these defenses by using theories of fictitious agency or third party beneficiary.2 The theory which has become more or less agreed upon in later years is that of a "warranty" running with the goods or made directly to the consumer on the basis of public policy.3 The net effect of these cases was to impose on the manufacturer strict liability, i. e., liability in the absence of either negligence or privity. This strict liability was first imposed in breach of warranty cases involving food and drink4, and was gradually extended to include articles for intimate bodily use. See Graham v. Bottenfields, Inc., 176 Kan. 68, 269 P.2d 413. Finally, in the leading case of Henningsen v. Bloomfield Motors, Inc., 32 N.J. 358, 161 A.2d 69, 75 A.L.R.2d 1 (1960), the Supreme Court of New Jersey extended strict liability to cover the sale of any defective product which may be expected to cause harm to the consumer.5 The floodgates were thus opened6, and a surge of cases soon followed the New Jersey court's lead.7 9 The next step was to shed the warranty guise under which strict liability had been traditionally imposed and give it an honest label. This task was undertaken in 1963 by the California Supreme Court in Greenman v. Yuba Power Products, Inc., 59 Cal.2d 57, 27 Cal.Rptr. 697, 377 P.2d 897, 13 A.L.R.3d 1049. With characteristic clarity and succinctness, Justice, now Chief Justice, Traynor imposed strict liability in the name of "tort": "Although in these cases strict liability has usually been based on the theory of an express or implied warranty running from the manufacturer to the plaintiff, the abandonment of the requirement of a contract between them, the recognition that the liability is not assumed by agreement but imposed by law * * *, and the refusal to permit the manufacturer to define the scope of its own responsibility for defective products * * * make clear that the liability is not one governed by the law of contract warranties but by the law of strict liability in tort." 27 Cal.Rptr. at 701, 377 P.2d at 901. 10 The impact of the Greenman decision was immediate, and other courts quickly added their approval.8 The American Law Institute has confirmed the transition in nomenclature in its Restatement of Torts (Second), § 402A: "(1) One who sells any product in a defective condition unreasonably dangerous to the user or consumer or to his property is subject to liability for physical harm thereby caused to the ultimate user or consumer, or to his property, if (a) the seller is engaged in the business of selling such a product, and (b) it is expected to and does reach the user or consumer without substantial change in the condition in which it is sold. (2) The rule stated in Subsection (1) applies although (a) the seller has exercised all possible care in the preparation and sale of his products, and (b) the user or consumer has not bought the product from or entered into any contractual relation with the seller." Restatement at 347, 348. 11 Comment m to the Restatement makes it clear that the liability stated in § 402A is strict liability based upon tort rather than warranty; that warranty has become so identified in practice with a contract of sale that the warranty theory has become something of an obstacle to the recognition of strict liability where there is no such contract; and that the rule stated in the section is not governed by the provisions of the Uniform Sales Act or those of the Uniform Commercial Code, as to warranties. See Restatement of Torts (Second), § 402A, p. 355-356. 12 Following our concept of Oklahoma law, in Speed Fastners, Inc. v. Newsom, 10 Cir., 382 F.2d 395, we sustained a claim for breach of implied warranty and imposed strict liability on the manufacturer of a defective product without privity. In doing so, we assumed that Oklahoma would embrace the generally prevalent dictates of public policy in implied warranty cases. We had no occasion to consider strict liability in terms of tort, which seems to be the more rational approach to the characterization of strict liability in cases of this kind. 13 As we have seen, Schenfeld lost to the jury on negligence and to the court on implied warranty for want of a sale. Apparently the trial judge believed that Schenfeld's implied warranty action was necessarily founded upon the warranty provisions of the Colorado Uniform Sales Act9 which are generally thought to be confined to sales situations. On appeal, Schenfeld contends, in effect, that his implied warranty action below was based upon strict liability rather than the warranty provisions of the Colorado Uniform Sales Act; that Colorado would adopt the strict liability doctrine as stated in § 402A of the Restatement of Torts (Second); and that under such theory, an initial sale of the product is no longer essential to recovery. In fairness to the trial judge it should be noted that he did not consider, and indeed was not asked to consider, the asserted claim in the light of strict liability in terms of either warranty or tort.10 The suitor spoke in terms of negligence and implied warranty without invoking strict liability on any theory. And ordinarily a claimant cannot expect to lose in the trial court on one theory and win on appeal under another. See United States v. Gates, 10 Cir., 376 F.2d 65; Hidden Splendor Mining Co. v. General Ins. Co. of America, 10 Cir., 370 F.2d 515; First National Bank of Dodge City, Kansas v. Perschbacher, 10 Cir., 335 F.2d 442. But the rule is not inflexible and may be departed from in the interest of justice. See In Re Linda Coal and Supply Co., 3 Cir., 255 F.2d 653; Daugharty v. Gladden, 9 Cir., 257 F.2d 750. In this metamorphic state of the law of products liability, and in view of the paucity of product liability cases in Colorado, we are hesitant to foreclose a claimant's right of recovery because he failed to perceive the vogue and sweep of the law. See Lonzrick v. Republic Steel Corp., 1 Ohio App.2d 374, 205 N.E.2d 92. Cf. Keene Lumber Co. v. Leventhal, 1 Cir., 165 F.2d 815. 14 We do not know but surmise that Colorado will, in a proper case, embrace the concept of strict liability for all defective products, either in the name of tort or warranty.11 The Colorado trial court is the first judge, however, of Colorado law. One judge of the federal court in Colorado, when faced with the situation, was reasonably sure that Colorado would adopt strict liability in tort as embodied in § 402A. Newton v. Admiral Corp., 280 F.Supp. 202 (D.C., Aug. 15, 1967). We think the interest of justice will be served, without prejudice to anyone, if the case is remanded to the trial court for a consideration, in the first instance, whether Colorado would embrace the concept of strict liability as stated in § 402A, and if so, whether the technicalities of a sale are essential to recovery. As to that, see Delaney v. Towmotor Corp., 2 Cir., 339 F.2d 4, 5. If, upon reconsideration, the court decides that in these circumstances Colorado would apply the strict liability theory, it then remains to be determined: (1) whether the product was, in fact, dangerously defective, and (2) if so, whether such condition proximately caused the harm complained of. See Greeno v. Clark Equipment Co., D.C., 237 F.Supp. 427. 15 The judgment of the court, insofar as it relates to the implied warranty claim, is vacated and the case is remanded for further proceedings in accordance with the views herein expressed. Notes: * By special designation 1 The metal mounts appeared to be in used rather than new condition, and the evidence is in dispute as to whether Danielson or Grieve removed the attached grinding wheels from the metal mounts 2 E. g., Wisdom v. Morris Hdw. Co., 151 Wash. 86, 274 P. 1050; Ward Baking Co. v. Trizzino, 270 Ohio App. 475, 161 N.E. 557. See also Prosser, The Assault Upon the Citadel (Strict Liability to the Consumer), 69 Yale L.J. 1099, 1124-1126 (1960) 3 E. g., Worley v. Procter & Gamble Mfg. Co., 241 Mo.App. 1114, 253 S.W.2d 532; Le Blanc v. Louisiana Coca Cola Bottling Co., 221 La. 919, 60 So.2d 873 4 E. g., Parks v. G. C. Yost Pie Co., 93 Kan. 334, 144 P. 202, L.R.A.1915C, 179; Davis v. Van Camp Packing Co., 189 Iowa 775, 176 N.W. 382, 17 A.L.R. 649; Jacob E. Decker & Sons, Inc. v. Capps, 139 Tex. 609, 164 S.W.2d 828, 142 A.L.R. 1479 5 Mr. Henningsen had purchased a new car, and his wife was injured while driving it when a defective steering mechanism caused the car to crash into a wall. Proceeding on a warranty theory as did the earlier cases, the court allowed Mrs. Henningsen to recover from both the manufacturer and dealer without any showing of negligence and without privity of contract. The court reasoned that the "burden of losses consequent upon use of defective articles [should be] borne by those who are in a position to either control the danger or make an equitable distribution of the losses when they occur." 161 A.2d 80-81 6 Although the Henningsen case is recognized as the landmark decision in this area, it should be noted that prior thereto, several courts applied strict liability to products other than food or those intended for intimate bodily use. Indeed, in the 1959 decision of B. F. Goodrich Co. v. Hammond, 269 F.2d 501, Judge Phillips, speaking for the Tenth Circuit and applying the laws of Kansas and Missouri, imposed strict liability on the part of the seller to the ultimate user of an automobile tire. The basis of the decision was an implied warranty based on public policy 7 See Prosser, The Fall of the Citadel (Strict Liability to the Consumer), 50 Minn.L.Rev. 791, 794-798 (1966), for a complete list of jurisdictions extending strict liability to manufacturers of all types of products. See also Donovan, Recent Development in Products Liability Litigation in New England: The Emerging Confrontation Between the Expanding Law of Torts and the Uniform Commercial Code, 19 Maine L.R. 181 (1967); Wade, Strict Tort Liability of Manufacturers, 19 Southwestern L.J. 5 (1964) 8 See cases collected in Annot., 13 A.L.R. 3d 1057 (1967), and the following recent cases: O. S. Stapley Co. v. Miller, 6 Ariz.App. 122, 430 P.2d 701; Bailey v. Montgomery Ward and Co., 6 Ariz.App. 213, 431 P.2d 108; Morrow v. Caloric Appliance Corp., 372 S.W.2d 41 (Mo.); Shoshone Coca-Cola Bottling Co. v. Dolinski, 420 P.2d 855 (Nev.); Rosenau v. City of New Brunswick, 51 N.J. 130, 238 A.2d 169; McKisson v. Sales Affiliates, Inc., 416 S.W.2d 787 (Tex.); Dipangrazio v. Salamonsen, 64 Wash.2d 720, 393 P.2d 936; Hacker v. Rector, D.C., 250 F.Supp. 300 9 Colorado Rev.Stat. § 121-1-15 (1963). The Uniform Commercial Code did not become effective in Colorado until five months after the date of the accident 10 At the close of the evidence, and while ruling on the implied warranty claim, the trial judge observed that his decision might have been otherwise if the suit was viewed in strict liability 11 Professor Prosser points out in Prosser, The Fall of the Citadel (Strict Liability to the Consumer), 50 Minn.L.R. 791, 796, that Colorado effectively joined the ranks of the states adopting the rule of strict liability when its Legislature enacted a revised § 2-318 of the Uniform Commercial Code: "A seller's warranty whether express or implied extends to any person who may reasonably be expected to use, consume, or be affected by the goods and who is injured by breach of the warranty. A seller may not exclude or limit the operation of this section. Colo.Rev.Stat.Ann. § 155-2-318 (1963)." | Mid | [
0.5622222222222221,
31.625,
24.625
] |
The final version of the international Anti-counterfeiting Trade Agreement (ACTA) leaves the door open for countries to introduce the so-called three-strikes rule, which would see Internet users cut off if they download copyrighted material. The controversial paragraph in the text allows that signatories to the agreement can order ISPs to disclose personal information about customers. Although the text has been somewhat watered down from the original wording, which said that parties "shall" provide laws to demand information from ISPs. Sources close to the negotiations said that the current document can be seen as suggesting "what is considered best practice," which may be interpreted as encouraging countries to introduce such draconian measures. Members of Parliament who have been angry about the secrecy surrounding the negotiations received the text at the same time as the media and will not be briefed on the negotiations until Thursday. Some parliamentarians have threatened to block the accord if they are not given sufficient time to consider its ramifications. (More to come.) | Low | [
0.530534351145038,
34.75,
30.75
] |
“Sure, these micro-apartments may be fantastic for young professionals in their 20's,” says Dak Kopec, director of design for human health at Boston Architectural College and author of Environmental Psychology for Design. “But they definitely can be unhealthy for older people , say in their 30’s and 40’s, who face different stress factors that can make tight living conditions a problem.” Home is supposed to be a safe haven, and a resident with a demanding job may feel trapped in a claustrophobic apartment at night—forced to choose between the physical crowding of furniture and belongings in his unit, and social crowding, caused by other residents, in the building’s common spaces. Research, Kopec says, has shown that crowding-related stress can increase rates of domestic violence and substance abuse. For all of us, daily life is a sequence of events, he explains. But most people don’t like adding extra steps to everyday tasks. Because micro-apartments are too small to hold basic furniture like a bed, table, and couch at the same time, residents must reconfigure their quarters throughout the day: folding down a Murphy bed, or hanging up a dining table on the wall. What might seem novel at the beginning ends up including a lot of little inconveniences, just to go to sleep or make breakfast before work. In this case, residents might eventually stop folding up their furniture every day and the space will start feeling even more constrained. Susan Saegert, professor of environmental psychology at the CUNY Graduate Center and director of the Housing Environments Research Group, agrees that the micro-apartments will likely be a welcome choice for young New Yorkers who would probably otherwise share cramped space with friends. But she warns that tiny living conditions can be terrible for other residents—particularly if a couple or a parent and child squeeze into 300 square feet for the long term, no matter how well a unit is designed. “I’ve studied children in crowded apartments and low-income housing a lot,” Saegert said, “and they can end up becoming withdrawn, and have trouble studying and concentrating.” In these situations, modern amenities—such as floor to ceiling windows, extra storage and a communal roof deck— won’t compensate for a fundamental lack of privacy in a child’s home every day. She also doubts whether it’s a valid public goal to develop smaller units on city land. “In New York, property is just gold,” she points out. “Isn’t this something a developer could do in a [Brooklyn] neighborhood like DUMBO and make a lot of money?” By the same token, if micro-apartments are indeed the wave of the future, Saegert argues, they increase the “ground rent,” or dollar per square foot that a developer earns and comes to expect from his investment. So over time, New Yorkers may actually face more expensive housing, paying the same amount to rent a studio in the neighborhood where they used to be able to afford a one-bedroom. With the gradual erosion of zoning rules, the micro-apartment could very well become the unit of the future, the only viable choice for a large number of renters. | High | [
0.6570048309178741,
34,
17.75
] |
Sickle cell crisis presenting as a masquerade syndrome complicated by macular ischemia. To report the case of a young boy, homozygous for the hemoglobin S, who presented a pseudouveitis in the setting of severe sickle cell retinopathy complicated by macular infarction. Case report. A 15 year-old boy with a history of hypertensive uveitis of two months duration was reffered to our institution. He was treated with topical prednisolone acetate, beta-blockers and acetazolamide.The visual acuity was 20/200 RE and 20/25 LE. Anterior inflammation included fine inferior keratic precipitates with 2+ cells RE and 1+ cells LE. Vitreous haze was 2+ preventing clear view of subretinal infiltrates scattered around the posterior pole and midperipheral retina, some of them having a salmon patch appearance. Fluorescein angiograms revealed multiple preretinal haemorrahge and some areas of retinal ischemia. Fundus examination of the left eye was normal. A diagnosis of panuveitis was done and a sickle cell retinopathy was suspected. Systemic workup showed an hemoglobin at 8,2 mg/dl and sickle cells on direct examination. Two days later he developed sudden loss of vision in the right eye. Funduscopy an angiogram revealed macular infarction with occlusion of the retinal arterioles surrounding the foveal avascular zone. The clinical picture was not improved by erythrocyte transfusion. Intraocular pressure raised again after few days, and was finally controlled by anterior chamber paracentesis. The patient was later found to be homozygous for HbS. Sickle cell retinopathy can rarely masquerade as panuveitis, and can lead to severe ocular complications as an irreversible macular ischemia. | High | [
0.6826666666666661,
32,
14.875
] |
Q: Möbius strip and $\mathscr O(-1)$. Or $\mathscr O(1)$? On the real $\textbf P^1$ we have these algebraic line bundles: $\mathscr O(1)$ and $\mathscr O(-1)$. Which one corresponds to the Möbius strip? (Both are $1$-twists of $\textbf P^1\times\textbf A^1$, so how to distinguish them? Yes, by means of their transition functions, but how do they tell me which one has the Möbius strip as total space?) And what is the total space of the other one? I can only imagine that non-orientability should correspond to the absence of global sections, so I would bet on $-1$, but with no real reason. Also, I can't figure if to every $\mathscr O(d)$ there corresponds a different total space, or there are repetitions. Of course, by viewing those bundles as holomorphic bundles, there are only two surfaces up to diffeomorphism. But what about the algebraic category? Thank you for any help! A: Edit This is a corrected answer. Many thanks to Ben who pointed out the idiocy of my original version. Given an arbitrary field $k$, the Picard group of $\mathbb P^1_k$ (consisting of the isomorphism classes of algebraic line bundles) is isomorphic to $\mathbb Z$ via the degree map $$\text {deg} : \text {Pic} (\mathbb P^1_k) \stackrel {\cong }{\to} \mathbb Z ,$$ the inverse isomorphism being $$ \mathbb Z \stackrel {\cong }{\to} \text {Pic} (\mathbb P^1_k) :n\mapsto \mathscr O(n) $$ In the case $k=\mathbb R$ things become quite interesting because the real points $\mathbb P^1_\mathbb R (\mathbb R)$ of the projective line $\mathbb P^1_\mathbb R$ are endowed with the structure of a real differentiable manifold diffeomorphic to the circle $S^1$. And that manifold has a differentiable Picard group $\text {Pic}^{\text {diff}} (\mathbb P^1(\mathbb R)) $ of order two generated by the Möbius bundle $M$, so that we have a group isomorphism $$ \text {Pic}^{\text {diff}} (\mathbb P^1(\mathbb R)) \stackrel {\cong }{\to} \mathbb Z/2\mathbb Z: M\mapsto \bar 1 $$ We then have a forgetful group homomorphism $\text {Pic} (\mathbb P^1_\mathbb R)\to \text{Pic}^{\text {diff}} (\mathbb P^1(\mathbb R)) $ forgetting the algebraic structure of a line bundle and retaining only its differentiable structure. In the above identification this morphism is just reduction modulo $2$: $$\text {Pic} (\mathbb P^1_\mathbb R)\to \text{Pic}^{\text {diff}} (\mathbb P^1(\mathbb R))\cong \mathbb Z: \mathscr O(n) \mapsto M^n\cong \bar n$$ In particular both $\mathscr O(1)$ and $\mathscr O(-1)$ are sent to the Möbius bundle, which answers your question (I hope!) | Mid | [
0.595078299776286,
33.25,
22.625
] |
June 2017: Swimming with Sharks Swimming with Sharks by Mark Harris Welcome aboard the Atlantis salvage team. One of your fellow divers brought this map up from the Lost Continent below. It shows the plan of the Temple of the Nereids, which contains vast riches. Unfortunately, the temple also contains 20 guardian sharks with long, nasty teeth. The sharks aren’t particularly alert, though, so you’ll be safe swimming through any chamber of the temple occupied by one of them as long as you never enter by the door that its mouth is pointing toward—if you do, then the shark is instinctually obligated to eat you. And of course, you’d better not revisit any of the chambers, since you’re not likely to catch a shark napping twice. Here’s the plan: Enter the temple through any of the four outer doors, visit all 25 chambers—sure, most of the loot is bound to be in the five treasure chambers, but you never know where some other priceless trinket might be stashed—and exit through one of the three remaining outer doors. Don’t get discouraged just because the last five guys we sent in never came out; a smart diver like you should have no problems. | Low | [
0.45605700712589003,
24,
28.625
] |
Nurse who raped unconscious patients took pictures in Batley gym A nurse who filmed himself raping two unconscious women patients in a hospital A&E department has been jailed for 18 years. Andrew Hutchinson, 29, carried out the sickening attacks while the women were in his care at Oxford’s John Radcliffe Hospital in 2011 and 2012, having drunk too much on nights out. The serial pervert recorded himself sexually assaulting two other unconscious drunk women while volunteering in the medical tent at the Wilderness Festival in Oxfordshire in August 2013. Because they were unconscious at the time, none of his victims knew they had been attacked until police investigating Hutchinson painstakingly pieced together what had happened. The staff nurse’s sex crimes came to light after he was arrested for voyeurism in November 2013. He had been illicitly filming young girls, including one aged just nine, underneath the cubicle walls in unisex changing rooms at the White Horse Leisure Centre in Abingdon, Oxfordshire. A police search of his home uncovered footage of the sex attacks on his phone and computer equipment as well as child pornography and “hundreds if not thousands” of other voyeuristic pictures of women dating back years. They included “upskirt” shots taken on the London Underground while Hutchinson was volunteering at the 2012 Olympics and images taken at a gym in Batley where he had worked before becoming a nurse. He said: “When they were unconscious requiring your help and your assistance as their nurse, you raped them and you filmed it. It is impossible to conceive of a greater breach of trust in our society than that.” He ordered Hutchinson to serve an extended licence period of seven years on top of his maximum jail term after he was released from prison. Prosecutor Matthew Walsh told the judge he might struggle to “imagine a case where there was a more vulnerable victim”, with footage showing how Hutchinson escalated from voyeurism to attacking women “clearly in a state of unconsciousness”. He said: “It was also clear from one glance they were in hospital and wearing white gowns. What was quite quickly apparent was that he had these women in his professional care.” Hutchinson, of Garford, near Abingdon, admitted 27 charges including rape, sexual assault, voyeurism, outraging public decency, making indecent images of children, theft of a nasal endoscope to help him take his images, and possessing of ketamine. Hutchinson’s voyeurism charges covered pictures taken inside the John Radcliffe Hospital and the leisure centre, with many female victims unidentifiable from pictures that showed them from the waist down. Mr Walsh said police had “hundreds, if not thousands” of other images taken by Hutchinson over the course of years, but had been unable to trace those in them. Claire Fraser, for Hutchinson, said he had been receiving therapy for his voyeuristic urges before his arrest in December. She produced a letter the sex attacker wrote to the court, apologising to his victims for the “distress” he had caused them, and also to fellow medics for bringing the profession into disrepute. “He hopes with the support of his family and any help he can receive, that one day he will be a productive, working member of society,” she said. Trending Police find shops willing to sell knives illegally to children in West Yorkshire Don't get caught up in war of fly-tippers - Councillor warns residents | Low | [
0.441379310344827,
24,
30.375
] |
// RUN: grep -Ev "// *[A-Z-]+:" %s > %t-input.cpp // RUN: not clang-tidy %t-input.cpp -checks='-*,google-explicit-constructor,clang-diagnostic-missing-prototypes' -export-fixes=%t.yaml -- -Wmissing-prototypes > %t.msg 2>&1 // RUN: FileCheck -input-file=%t.msg -check-prefix=CHECK-MESSAGES %s -implicit-check-not='{{warning|error|note}}:' // RUN: FileCheck -input-file=%t.yaml -check-prefix=CHECK-YAML %s #define X(n) void n ## n() {} X(f) int a[-1]; // CHECK-MESSAGES: -input.cpp:2:1: warning: no previous prototype for function 'ff' [clang-diagnostic-missing-prototypes] // CHECK-MESSAGES: -input.cpp:1:19: note: expanded from macro 'X' // CHECK-MESSAGES: {{^}}note: expanded from here{{$}} // CHECK-MESSAGES: -input.cpp:2:1: note: declare 'static' if the function is not intended to be used outside of this translation unit // CHECK-MESSAGES: -input.cpp:1:14: note: expanded from macro 'X' // CHECK-MESSAGES: -input.cpp:3:7: error: 'a' declared as an array with a negative size [clang-diagnostic-error] // CHECK-YAML: --- // CHECK-YAML-NEXT: MainSourceFile: '{{.*}}-input.cpp' // CHECK-YAML-NEXT: Diagnostics: // CHECK-YAML-NEXT: - DiagnosticName: clang-diagnostic-missing-prototypes // CHECK-YAML-NEXT: DiagnosticMessage: // CHECK-YAML-NEXT: Message: 'no previous prototype for function // ''ff''' // CHECK-YAML-NEXT: FilePath: '{{.*}}-input.cpp' // CHECK-YAML-NEXT: FileOffset: 30 // CHECK-YAML-NEXT: Replacements: [] // CHECK-YAML-NEXT: Notes: // CHECK-YAML-NEXT: - Message: 'expanded from macro ''X''' // CHECK-YAML-NEXT: FilePath: '{{.*}}-input.cpp' // CHECK-YAML-NEXT: FileOffset: 18 // CHECK-YAML-NEXT: Replacements: [] // CHECK-YAML-NEXT: - Message: expanded from here // CHECK-YAML-NEXT: FilePath: '' // CHECK-YAML-NEXT: FileOffset: 0 // CHECK-YAML-NEXT: Replacements: [] // CHECK-YAML-NEXT: - Message: 'declare ''static'' if the function is not intended to be used outside of this translation unit' // CHECK-YAML-NEXT: FilePath: '{{.*}}-input.cpp' // CHECK-YAML-NEXT: FileOffset: 30 // CHECK-YAML-NEXT: Replacements: // CHECK-YAML-NEXT: - FilePath: '{{.*}}-input.cpp' // CHECK-YAML-NEXT: Offset: 30 // CHECK-YAML-NEXT: Length: 0 // CHECK-YAML-NEXT: ReplacementText: 'static ' // CHECK-YAML-NEXT: - Message: 'expanded from macro ''X''' // CHECK-YAML-NEXT: FilePath: '{{.*}}-input.cpp' // CHECK-YAML-NEXT: FileOffset: 13 // CHECK-YAML-NEXT: Replacements: [] // CHECK-YAML-NEXT: Level: Warning // CHECK-YAML-NEXT: BuildDirectory: '{{.*}}' // CHECK-YAML-NEXT: - DiagnosticName: clang-diagnostic-error // CHECK-YAML-NEXT: DiagnosticMessage: // CHECK-YAML-NEXT: Message: '''a'' declared as an array with a negative size' // CHECK-YAML-NEXT: FilePath: '{{.*}}-input.cpp' // CHECK-YAML-NEXT: FileOffset: 41 // CHECK-YAML-NEXT: Replacements: [] // CHECK-YAML-NEXT: Level: Error // CHECK-YAML-NEXT: BuildDirectory: '{{.*}}' // CHECK-YAML-NEXT: Ranges: // CHECK-YAML-NEXT: - FilePath: '{{.*}}-input.cpp' // CHECK-YAML-NEXT: FileOffset: 41 // CHECK-YAML-NEXT: Length: 1 // CHECK-YAML-NEXT: ... | Mid | [
0.556626506024096,
28.875,
23
] |
1. Field of the Invention The present invention relates to phenylenediamine derivatives and methods for using the same. In one particular aspect of the present invention, phenylenediamine derivatives of the present invention are used as an additive in chemically amplified photoresist films for increasing the energy latitude (EL) margin, and improving a contrast value and post exposure delay (PED) stability. 2. Description of the Background Art Use of chemical amplification-type photoresists (i.e., photoresist compositions) is currently being investigated in photolithography processes to achieve a high sensitivity in minute image-formation on semiconductor devices. Such photoresists are generally prepared by blending a photoacid generator with a matrix resin polymer (i.e., photoresist polymer) having an acid labile group. In a photolithography process for producing semiconductor devices, the resolution of an image depends on the wavelength of the light used. Thus, the shorter the wavelength, higher the resolution, i.e., shorter wavelengths allow smaller pattern formation. In order to be useful in a photolithography process, a photoresist (PR) must have an excellent etching and heat resistance, and adhesiveness. Moreover, to reduce the cost of manufacturing semiconductor devices, a PR should be capable of being developed by a common developing solution, such as a 2.38 wt % aqueous tetramethylammonium hydroxide (TMAH) solution. These qualities are particularly important in photolithography processes utilizing a deep ultraviolet light source (i.e., short wavelength light source), including KrF (248 nm), ArF (193 nm) and EUV. While it is difficult to synthesize a photoresist polymer that satisfies all of these requirements, a variety of photoresist polymers with improved etching resistance, adhesiveness and resolution have been developed. Unfortunately, however, most chemically-amplified photoresists currently available have a relatively short post exposure delay (PED) stability. In general, when there is delay between exposure of the photoresist to light and development of the exposed photoresist, acids that are generated on the exposed area are neutralized by amine compounds which may be present in the production atmosphere. Since the pattern formation depends on acids that are generated by the exposure, neutralization of acids by atmospheric amine compounds reduce, prevent or alter a pattern formation, e.g, a T-topping phenomenon may occur where the top portion of the pattern forms a T-shape. In theory, one may overcome the aforementioned disadvantages by improving the photoresist polymer or by adding an additive to improve the PED stability of the photoresist composition. In the conventional art, various amine compounds, in particular amine compounds that are weakly basic and/or have bulky groups have been employed as an additive to increase the PED stability. However, most of these additives dissolve relatively equally well in the exposed and unexposed regions. In addition, most of these additives are relatively volatile liquids which escape into the atmosphere during the post exposure delay; therefore, photoresists containing these amine compounds have poor reproducibility. Furthermore, since these amine compounds are volatile, it is difficult to control the precise amount of these additives present in the photoresist during a photolithiography process. Therefore, there is a need for a photoresist additive compound which overcomes the above-mentioned disadvantages. It is therefore an object of the present invention to provide a photoresist additive compound which increases the PED stability of a photoresist. It is also an object of the present invention to provide a photoresist additive compound which increases the energy latitude (EL) margin and improves the contrast value of the photoresist. In order to achieve the above-described objectives, the present invention provides novel phenylenediamine derivatives. Without being bound by any theory, it is believed that phenylenediamine derivatives of the present invention improve PED stability of a photoresist by preventing or reducing the number of contacts between the acid that is generated on the exposed area and environmental amine compounds. | High | [
0.6600496277915631,
33.25,
17.125
] |
Post navigation Ministry – Judith James Judith James was the planned speaker at Meeting for Worship on August 31, 2014. Throughout the history of the Religious Society of Friends we have recognized that to anyone may come, at any time, a special inward calling to carry out a particular service. It is characterized by a feeling of have been directly called by God and by an imperative to act. Many speak of the peace that came to them with the certainty that they were working with God. Quakers recognize a variety of ministries. In our worship these include those who speak under the guidance of the Spirit, and those who receive and uphold the work of the Spirit in silence and prayer. We also recognize as ministry service on our many committee, hospitality and childcare, the care of finance and premises, and any other tasks. We value those whose ministry is not an appointed task but is in teaching, counseling, listening, prayer, enabling the service of others, or service in the meeting or in the world. The purpose of all our ministry is to lead us and other people into closer communion with God and to enable us to carry out those tasks which the Spirit lays upon us. Recently I was at the ordination of my friend’s daughter and I was struck by the authority that passed to her upon her ordination. She was given this new identity as minister and therefore the affirmation of her calling to minister to others. As a Quaker rarely is there this external affirmation from the Society where it is announced that yes you are a minister. As John Wilhelm Rowntree stated in 1899 “We as Friends are seeking a rich and well-tilled soil from which every type of ministry shall spring forth with a robust growth.” My calling to the service of others, my ministry, is legitimized when I act and have the experience that through my actions I am in closer communion with the Spirit. I first became aware of what a calling to communion with another meant when I did pastoral care at Messiah Lutheran in the Phillips neighborhood. When I first arrived The Lead Pastor, Pastor Lee, told me, “Here at Messiah pastoral care means finding a pack of disposal diapers for a mother whose child has been in the same diaper all day, or rounding up some food from the food pantry for a hungry immigrant family that just arrived in Minneapolis, or sitting with a mentally disturbed community member who was disoriented and agitated.” Giving advice and counsel wasn’t in the job description, and at that time in my mind those seemed to be my best strengths. What I found was I needed to meet people where they were at, stand by them not as a professional, but as a human being. The London Yearly Meeting Quaker Faith and Practice states that Quaker ministry is giving of oneself and allowing others to give to us; our common humanity enables us to minister. In being connected to those struggling by finding our common humanity, or what is often referred to as the God within the other, a light shone to direct me. What I received was this sense of being in communion with the Spirit, the Presence of the living God in me that saw and reacted to the Presence of the Living God in another. How this was different from the past for me as an educator, diversity worker or counselor was when I was a professional doing professional work I wanted to do something important, change something, and be someone good. I found with this approach I could became self-righteous and arrogant, professing I knew what the truth was for others and what needed to change for a better world. In essence I did justice work, even loved kindness, but I did not walk humbly with God. When I sought to be present with the living God in another I was humbled by what happened. I felt immensely moved by the goodness in them and in standing with them blessed by their trust in me and their willingness to share their story, and I was lifted up. This experience opened me to recognize an inward calling of ministry to the disadvantaged and poor. In ministering to a person living with tremendous loss, I found a communion with God and that knew with certainty that the presence of love can change anything and allow for miracles. Let me say for all those who might think I am saying this is a constant way I behave, you know me better than that. I know these experiences are blessings because they are intermittent, but none the less they give me a sense that I have this gift of ministry and that this Loving Presence is always with me and I can experience it if I do justice, love kindness, and walk humbly with God. | Mid | [
0.5907990314769971,
30.5,
21.125
] |
Communicating Effectively About Clinical Trials With African American Communities: A Comparison of African American and White Information Sources and Needs. Clinical trial (CT) participation is low among African Americans (AAs). To better communicate with AAs about the importance of CTs, the purpose of this study was to explore the communication sources and perceived effective communication channels and strategies through which the general public, AAs, and White individuals receive CT information. A quantitative telephone survey was conducted with AAs and Whites in one Southern state (N = 511). The measures assessed CT sources of information, perceived effectiveness of communication channels and strategies, CT understanding, and CT participation. Descriptive and bivariate analyses were used to compare responses overall and by race. AAs reported being exposed to more CT information than Whites. AAs received CT information most often through television, social media, and doctors compared to Whites. Perceived effectiveness of communication strategies and channels varied by race. AAs preferred simple and easy-to-understand CT information distributed through faith-based organizations. Whites preferred to receive CT information through a trustworthy source (e.g., doctor). There were no significant differences between AAs and Whites in their perceived effectiveness of media sources (e.g., Internet). Recommendations are provided to help health promotion practitioners and CT recruiters tailor information and communicate it effectively to potential AA and White CT participants. | Mid | [
0.6537530266343821,
33.75,
17.875
] |
How it works: The IIFYM diet lets you eat anything you want and you’ll lose weight as long as you meet your prescribed daily set of macronutrients (carbs, proteins and fats). Calculate your personal macros by figuring out your total daily expenditure, then how many calories you should eat per day to lose weight. From there, you’ll divide the calories into the percentage of calories that should come from fat (20 percent), protein (40 percent) and carbohydrates (40 percent). Having trouble finding an affordable pinot noir? Blame Hollywood! According to economists, the 2004 movie Sideways completely reversed the wine’s falling price, with the most dramatic increase in $20 to $40 wines. Also contributing to the hype: Multiple studies have demonstrated that pinot noir consistently contain the highest levels of resveratrol among wines— and resveratrol has been shown to blast fat. One study found that pinot had more than five times the amount found in California cabernet sauvignon. “There are many diet plans on the market today that promote good health,” says Emily Kyle, RDN, who is in private practice in Rochester, New York. “The key is finding one that does not cause you stress or agony.” Ask yourself questions such as: Would the diet guidelines make you happy? Anxious? Stressed? Are you able to follow them long term? “Factors such as enjoyment, flexibility, and longevity should be strongly considered,” adds Kyle. The idea is that the fasting induces mild stress to the cells in your body, helping them become better at coping with such stress and possibly helping your body grow stronger. The verdict is still out regarding the diet’s long-term effectiveness with weight loss, according to a review of preliminary animal research published in January 2017 in Behavioral Sciences. (17) Many of today’s trending craft beers have as much as 200–250 calories per pint, and that’s just for one. Wine has around 120 calories per 5-ounce pour, if you can limit it to just a glass. Cocktails mixed with sodas, simple syrups and tonic waters add up quickly, too — and come in much smaller portions that “vanish” rapidly. Limiting alcoholic beverages is one of the first steps you can take for successful weight loss. Some popular beliefs attached to weight loss have been shown to either have less effect on weight loss as commonly believed or are actively unhealthy. According to Harvard Health, the idea of metabolism being the "key to weight" is "part truth and part myth" as while metabolism does affect weight loss, external forces such as diet and exercise have an equal effect.[43] They also commented that the idea of changing one's rate of metabolism is under debate.[43] Diet plans in fitness magazines are also often believed to be effective, but may actually be harmful by limiting the daily intake of important calories and nutrients which can be detrimental depending on the person and are even capable of driving individuals away from weight loss.[44] Charles Bukowski is an acquired taste and his work isn't something I would recommend to my girlfriend or mother. With that said, "Women" was probably the most entertaining novel I've experienced because of how easy it is to read and the honest humor. Charles lived the way life is meant to be lived: in excess with no regard for the opinion of others or the consequences of his actions. Haha. Reading this book is like having a conversation with the man himself as he shares with you the many triumphs and fewer follies of his insatiable appetite for long legs and alcohol...a true connoisseur of women, he is always able to find something to adore in each woman he met and you get a sense that there were some who he truly wanted to care for--just not enough to be faithful because, unfortunately, God made too many good ones. Give this book a try. You won't believe how much fun you can have by yourself without looking at porn. Girls' bodies undergo gradual changes during puberty, analogous to but distinct from those experienced by boys. Puberty is the process of physical changes by which a child's body matures into an adult body capable of sexual reproduction to enable fertilisation. It is initiated by hormonal signals from the brain to the gonads-either the ovaries or the testes. In response to the signals, the gonads produce hormones that stimulate libido and the growth, function, and transformation of the brain, bones, muscle, blood, skin, hair, breasts, and sexual organs. Physical growth—height and weight—accelerates in the first half of puberty and is completed when the child has developed an adult body. Until the maturation of their reproductive capabilities, the pre-pubertal, physical differences between boys and girls are the genitalia, the penis and the vagina. Puberty is a process that usually takes place between the ages 10–16, but these ages differ from girl to girl. The major landmark of girls' puberty is menarche, the onset of menstruation, which occurs on average between ages 12–13.[30][31][32][33] best diet to lose weight fast Grapefruit symbolizes the zenith of detox principles. When ripe, the uniquely bitter citrus is rife with vitamin A. This is particularly helpful if detoxification is meant to address an overdose or addiction. Unwanted drug reactions can be stopped by introducing grapefruit to the body. It acts fast to reverse adverse chemical responses. Meanwhile, the cucumber increases waters ability to flush the system clean. Oranges finalize the dietary advantages by instilling high concentrations of vitamin C. Harmful chemical agents simply do not stand a chance against this tangy drink. The resulting good health is truly glamorous. Before a workout, turbocharge the fat-blasting effects by sipping a cup of green tea. In a recent 12-week study, participants who combined a daily habit of 4-5 cups of green tea each day with a 25-minute sweat session lost an average of two more pounds than the non tea-drinking exercisers. Thank the compounds in green tea called catechins, flat belly crusaders that blast adipose tissue by triggering the release of fat from fat cells (particularly in the belly), and then speeding up the liver’s capacity for turning that fat into energy. See how tea can help you lose up to 10 pounds in one week on THE 17-DAY GREEN TEA DIET. Organically raised cows are not subject to the same hormones and antibiotics that conventional cows are; no antibiotics for them means no antibiotics for you. Grass fed cows have been shown to have higher levels of omega-3 fatty acids (good) and two to five times more CLA (conjugated linoleic acid) than their corn and grain fed counterparts. CLA contains a group of chemicals which provides a wide variety of health benefits, including immune and inflammatory system support, improved bone mass, improved blood sugar regulation, reduced body fat, reduced risk of heart attack, and maintenance of lean body mass. Go for 2%. Skim is mostly sugar. fast weight loss plan Women in different parts of the world dress in different ways, with their choices of clothing being influenced by local culture, religious tenets traditions, social norms, and fashion trends, amongst other factors. Different societies have different ideas about modesty. However, in many jurisdictions, women's choices in regard to dress are not always free, with laws limiting what they may or may not wear. This is especially the case in regard to Islamic dress. While certain jurisdictions legally mandate such clothing (the wearing of the headscarf), other countries forbid or restrict the wearing of certain hijab attire (such as burqa/covering the face) in public places (one such country is France - see French ban on face covering). These laws are highly controversial.[67] For a richer approach to detoxifying, you cannot surpass the diverse qualities of this renowned recipe. While it relies on the industry standard of lemon and cucumber, this is clearly only just the start. Frozen cranberries are integrated to rebuild the kidneys and restore the urinary tract. A more complete detox experience is generated by the rich presence of cilantro and Italian parsley. Unless you are a diehard dieter, this drink may be hard to consume. Still, it is definitely worth the effort. If your mouth can stomach it, then your stomach definitely can too. Just anticipate the unrepentantly spicy sourness! Switch to Lighter Alternatives. Whenever you can, use the low-fat versions of salad dressings, mayonnaise, dairy products, and other products. "You can trim calories effortlessly if you use low-fat and lighter products, and if the product is mixed in with other ingredients, no one will ever notice," says Magee. More smart substitutions: Use salsa or hummus as a dip; spread sandwiches with mustard instead of mayo; eat plain roasted sweet potatoes instead of loaded white potatoes; use skim milk instead of cream in your coffee; hold the cheese on sandwiches; and use a little vinaigrette on your salad instead of piling on the creamy dressing. Food for thought: In some cases, a diet based exclusively on plant foods may increase the risk of nutrient deficiencies. Because of this, vegans should eat fortified foods and/or supplements to get enough calcium, vitamin D, zinc, iodine, iron and vitamin B12. When done right with whole-plant foods and limited processed foods, a vegan diet can be healthy and result in weight loss. "Soups have a high water content, which means they fill your stomach for very few calories," says Rolls. Broth-based bean soups, in particular, contain a hefty dose of fiber and resistant starch -- a good carb that slows the release of sugar into the bloodstream -- to make that full feeling really stick. "Once in the stomach, fiber and water activate stretch receptors that signal that you aren't hungry anymore," Rolls says. All this for a measly 150 calories per cup. Interested in following a more historical approach to eating? The Primal Blueprint is similar to the Paleo diet, which has roots in how our long-ago ancestors supposedly ate. This plan ditches grain, sugars, and processed foods while focusing on clean eating with plenty of protein (both animal- and plant-based), lots of vegetables, fruits, and healthy fats. The Primal Blueprint acknowledges other health factors too, advocating for lots of low-intensity activity, some high-intensity exercise, strength training, and plenty of sleep. Although a greater number of women are seeking higher education, their salaries are often less than those of men. CBS News claimed in 2005 that in the United States women who are ages 30 to 44 and hold a university degree make 62 percent of what similarly qualified men do, a lower rate than in all but three of the 19 countries for which numbers are available. Some Western nations with greater inequity in pay are Germany, New Zealand and Switzerland.[50] How-life writer and unrepentant alcoholic Henry Chinaski was born to survive. After decades of slacking off at low-paying dead-end jobs, blowing his cash on booze and women, and scrimping by in flea-bitten apartments, Chinaski sees his poetic star rising at last. Now, at fifty, he is reveling in his sudden rock-star life, running three hundred hangovers a year, and maintaining a sex life that would cripple Casanova. Food for thought: Moskovitz considers Volumetrics one of the best options for weight loss. The diet plan teaches you the caloric value of foods without the need to track everything you eat. It’s not disruptive to your lifestyle either. Simply choose low-calorie foods that fill you up. Volumetrics is also a great option for weight maintenance, she says. At any given time, there are dozens of weight-loss hypes in the marketplace that claim to take off 10 pounds in 10 days, or whatever. Desperation can tempt us to try anything — from "clean eating" to cutting out food groups entirely. Keep in mind: Just because an avocado-walnut-"crunchy"-kale-salad dripping in coconut oil is deemed "clean" by a so-called "expert" on your Instagram feed does not make it an unlimited food. Moral of the story? Avoid fads, eat real food, watch some Netflix, and unwind (perhaps with a glass of wine in hand). Now that's my kind of detox. The goal? Reverse (or prevent) heart disease. Nutrition of course plays a huge role in a healthy ticker, and Dr. Ornish's plan keeps you focused on eating the super healthy stuff: fruits, vegetables, whole grains, legumes, soy, nonfat dairy, egg whites, and omega 3s. The challenge is no meat, poultry, or fish or caffeine (so it can be hard to follow), but you can eat unlimited calories if you're doing it for health rather than weight loss. Not only is it ranked a top plant-based and heart-healthy diet by U.S. News & World Report, but research shows people on the diet had healthier cholesterol levels and they lost about seven pounds after a year. Juice can have as many calories as soda, but it has more nutrients. This presents a dilemma: You want the vitamins and antioxidants without all the extra sugar. Look for 100% fruit juice. Steer clear of juice drinks that have added sweeteners. Check the nutrition label for the percentage of real juice. You can also slash calories by drinking water with a tiny bit of juice added. What makes some grub extra satisfying? "Fiber and protein can help," says Barbara Rolls, author of "The Ultimate Volumetrics Diet." Getting more bang for your bite matters, too: Low-energy-density foods, which yield big portions for few calories, "allow you to eat more without gaining weight," Rolls says. Want some of that? Make room for these secret-weapon picks. Health.com is part of the Meredith Health Group. All rights reserved. The material in this site is intended to be of general informational use and is not intended to constitute medical advice, probable diagnosis, or recommended treatments. All products and services featured are selected by our editors. Health.com may receive compensation for some links to products and services on this website. Offers may be subject to change without notice. See the Terms of Service and Privacy Policy (Your California Rights)for more information. Ad Choices | EU Data Subject Requests One study, published in JAMA in 2007, compared four weight-loss diets ranging from low to high carbohydrate intake. This 12-month trial followed over 300 overweight and obese premenopausal women, randomly assigning them to either an Atkins (very low carbohydrate), Zone (low carbohydrate), LEARN (high carbohydrate), or Ornish (very high in carbohydrate) diet. Female education includes areas of gender equality and access to education, and its connection to the alleviation of poverty. Also involved are the issues of single-sex education and religious education in that the division of education along gender lines as well as religious teachings on education have been traditionally dominant and are still highly relevant in contemporary discussions of educating females as a global consideration. diet plan weight loss Low-calorie diets: It is harmful to reduce your daily calorie intake lower than 1400 calories per day, because your body adjusts to a semi-starvation state and looks for alternative sources of energy. In addition to burning fat, your body will eventually burn muscle tissue. Because your heart is a muscle, prolonged starvation will weaken it and interfere with its normal rhythms. Low-calorie diets don't meet the body's nutrition needs, and without nutrients your body cannot function normally. The best diet is the one we can maintain for life and is only one piece of a healthy lifestyle. People should aim to eat high-quality, nutritious whole foods, mostly plants (fruits and veggies), and avoid flours, sugars, trans fats, and processed foods (anything in a box). Everyone should try to be physically active, aiming for about two and a half hours of vigorous activity per week. For many people, a healthy lifestyle also means better stress management, and perhaps even therapy to address emotional issues that can lead to unhealthy eating patterns. | Low | [
0.527397260273972,
28.875,
25.875
] |
UPSSSC Nalkoop Mistri Recruitment 2016 Uttar Pradesh SSSC Tubewell Mechanic has released the latest job notification UPSSSC Nalkoop Mistri Recruitment 2016 for filling up 672 vacant positions. UPSSSC invites the online applications from interested and eligible candidates. Online applications are now available on its official website. Suitable applicants may download the online application form and fill it with correct details of the candidate and submit the filled application form on or before closing date 24th October, 2016. Vacancy Details about UPSSSC Nalkoop Mistri Recruitment 2016: Total Number of Posts: 672 Vacancies. Name of the Posts: Nalkoop Mistri (Tubewell Mechanic). Age Limit: Candidates minimum age should be 18 years and maximum age should be 40 years. Age relaxation will be provided as per government rules. Educational Qualification: Applicants must possess their 10th class with ITI in relevant trade from any recognized board. Selection Procedure: Candidates will be selected for the tube well mechanic posts based on personal interview only. Salary Details: Shortlisted applicants will get attractive salary as Rs.5200/- to Rs.20200/- with grade pay Rs.2400/- per month. Application Fee: For General and OBC category applicants should pay the fee as Rs.105/- per application. For SC and ST category candidates must pay the application fee as Rs.85/-. | Mid | [
0.6538461538461531,
34,
18
] |
Conrad of Ivrea Conrad Cono(n) () (died 1001) was the Margrave of Ivrea from 970 to his death and Duke of Spoleto and Camerino (996-1001). He was the third son of Berengar II of Italy and Willa of Tuscany. His elder brothers were Adalbert and Guy, both of whom ruled the march before him. His father made him, possibly, the first Count of Ventimiglia. According to the Gesta Mediolanensium, Conrad made peace with the Germans under Otto I when his father and brothers did not. For this he was created count of Milan in 957. On 12 September 962, Otto granted land in the counties of Modena and Bologna that had formerly belonged to him and his brother Guy to the bishop of Modena. Otto installed him as margrave of Ivrea in 965, following his abandonment of his brother Adalbert. Sometime before 987, Conrad married Richilda, daughter of Arduin Glaber, thus confirming an alliance with the neighbouring margrave of Turin. Sometime around 990, he passed Ivrea along to his relative Arduin. Category:1001 deaths Category:Anscarids Category:Margraves of Ivrea Category:Year of birth unknown Category:10th-century dukes of Spoleto Category:11th-century Italian people | Mid | [
0.6216931216931211,
29.375,
17.875
] |
package ch.cyberduck.core.local; /* * Copyright (c) 2002-2014 David Kocher. All rights reserved. * http://cyberduck.io/ * * This program is free software; you can redistribute it and/or modify * it under the terms of the GNU General Public License as published by * the Free Software Foundation; either version 2 of the License, or * (at your option) any later version. * * This program is distributed in the hope that it will be useful, * but WITHOUT ANY WARRANTY; without even the implied warranty of * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the * GNU General Public License for more details. * * Bug fixes, suggestions and comments should be sent to: * [email protected] */ import ch.cyberduck.core.Local; public interface WorkingDirectoryFinder { Local find(); } | Low | [
0.521400778210116,
33.5,
30.75
] |
VDJ recombination. The ability of lymphocyte receptor V, D and J gene segments to rearrange generates much of the receptor diversity that is the hallmark of the immune system. Naturally, the mechanisms of immunoglobulin and T-cell receptor gene recombination are of enormous interest. Here, Fred Alt and colleagues review current understanding of the process and speculate on future findings. | High | [
0.704301075268817,
32.75,
13.75
] |
Advantages and limitations of multiple-trait genomic prediction for Fusarium head blight severity in hybrid wheat (Triticum aestivum L.). Predictabilities for wheat hybrids less related to the estimation set were improved by shifting from single- to multiple-trait genomic prediction of Fusarium head blight severity. Breeding for improved Fusarium head blight resistance (FHBr) of wheat is a very laborious and expensive task. FHBr complexity is mainly due to its highly polygenic nature and because FHB severity (FHBs) is greatly influenced by the environment. Associated traits plant height and heading date may provide additional information related to FHBr, but this is ignored in single-trait genomic prediction (STGP). The aim of our study was to explore the benefits in predictabilities of multiple-trait genomic prediction (MTGP) over STGP of target trait FHBs in a population of 1604 wheat hybrids using information on 17,372 single nucleotide polymorphism markers along with indicator traits plant height and heading date. The additive inheritance of FHBs allowed accurate hybrid performance predictions using information on general combining abilities or average performance of both parents without the need of markers. Information on molecular markers and indicator trait(s) improved FHBs predictabilities for hybrids less related to the estimation set. Indicator traits must be observed on the predicted individuals to benefit from MTGP. Magnitudes of genetic and phenotypic correlations along with improvements in predictabilities made plant height a better indicator trait for FHBs than heading date. Thus, MTGP having only plant height as indicator trait already maximized FHBs predictabilities. Provided a good indicator trait was available, MTGP could reduce the impacts of genotype environment [Formula: see text] interaction on STGP for hybrids less related to the estimation set. | High | [
0.6632911392405061,
32.75,
16.625
] |
746 P.2d 574 (1987) Gayla Goo GABRIEL, Plaintiff, v. Leonard GABRIEL, Defendant, In re Max Nakata GARCIA, Real Party in Interest, Appellant. No. 11711. Intermediate Court of Appeals of Hawaii. December 2, 1987. *575 Walter R. Schoettle, Honolulu, for appellant. Susan L. Gochros, Deputy Atty. Gen., Dept. of the Atty. Gen., Honolulu, for Judge Evelyn B. Lance. Before BURNS, C.J., and HEEN and TANAKA, JJ. TANAKA, Judge. Appellant Max Nakata Garcia (Garcia), attorney for defendant-husband in a divorce proceeding, appeals his criminal contempt of court conviction. Finding that the family court violated Garcia's procedural due process right of sufficient notice of hearing, we vacate the judgment of criminal contempt. I. On November 19, 1985, plaintiff Gayla Goo Gabriel (Wife), represented by attorney John D. Himmelmann (Himmelmann), filed a complaint for divorce against defendant Leonard Gabriel (Husband). Appearing for Husband, Garcia filed an answer to the complaint. On August 11, 1986, Wife filed a motion to compel discovery. Himmelmann's affidavit stated that on June 4, 1986, he had served copies of a request for production of documents and interrogatories on Garcia and Husband had not responded to the request and interrogatories. At the hearing of the motion on August 25, 1986, Himmelmann apprised District Family Court Judge Evelyn B. Lance that the purpose of the discovery was to obtain information relating to an alleged asset by way of investment in or loan to Bright Aviation, Inc. Garcia represented to the court that the only document his client had regarding Bright Aviation was a September 23, 1983 letter[1] indicating a $5,000 "cash investment" in Bright Aviation, which Garcia had "provided to" Himmelmann. August 25, 1986 Transcript at 6, 7. Himmelmann denied that Garcia had provided him with the letter, stating that his own client had given him the document "back in January[.]" Id. *576 at 10. At the close of the hearing, Judge Lance stated: The Court will order that the answers to interrogatories be provided on or before September 15th, 1986 at 4:00 p.m. and the Court will set a hearing on September 19th at 8:15 in the morning in regard to sanctions for any potential non-compliance with today's orders. At that hearing on September 19th, Mr. Garcia, you may show cause to this Court why you should not be found guilty of contempt of Court for telling the Court an untruth this morning. Id. at 13-14. On September 19, 1986, at 7:51 a.m. an "Order Re: Motion to Compel Discovery" was filed. That order included the following provisions: IT IS HEREBY ORDERED THAT: 1. Plaintiff shall be entitled to subpoena directly from Bright Aviation, Inc. all documents related to the parties financial involvement therein and Defendant and/or his counsel shall be liable for costs. 2. Defendant shall serve Answers to First Request for Answers to Plaintiff's Interrogatories to Defendant Leonard Gabriel and First Request for Production of Documents and Things to Defendant Leonard Gabriel no later than 4:00 o'clock p.m., on September 15, 1986. 3. This matter shall come on for further hearing on September 19, 1986, at 8:15 a.m. for determination of the following: a. Sanctions for non-compliance, if any, of Orders 1 and 2 above. b. Counsel for Defendant shall show cause why he should not be held in contempt of court for making a false statement to the court at the hearing on August 25, 1986, concerning Bright Aviation documents he allegedly provided to Plaintiff's counsel. c. The date on which Plaintiff's counsel served Defendant's counsel with a filed copy of the Motion to Compel Discovery, and sanctions against Defendant's counsel, if any, for not appearing for said Motion on time. Record at 97. Judge Lance presided at the September 19, 1986 hearing and examined both Himmelmann and Garcia.[2] Garcia was given full opportunity to explain the charges made against him. At the conclusion of the hearing, Judge Lance excused Garcia's late appearance at the August 25, 1986 hearing, but found him in contempt of Court for failing to comply with a request for production of documents, for failing timely to submit interrogatories to his client for his client to respond to them and for actively misleading the Court at the hearing on August 25th, 1986 in regard to his conduct of the case. September 19, 1986 Transcript at 18. In its judgment of criminal contempt filed on October 6, 1986, the court concluded, inter alia, that: Garcia is guilty of criminal contempt in violation of HRS Section 710-1077(1)(c) and (3)(b) based upon the following facts: 1. Garcia failed to timely submit Plaintiff's First Request for Answers to Interrogatories sent to him on June 4, 1986 to his client for response. 2. Garcia actively misled the Court at a hearing held on August 25, 1986 in regard to Plaintiff's Motion to Compel Discovery, by stating to the Court that he had provided to Plaintiff's attorney in response to Plaintiff's First Request for Production of Documents a letter dated September 1, 1983[3] regarding the value of Defendant's interest in Bright Aviation Corp. [sic], when in fact Plaintiff's attorney had received the document from Plaintiff. Record at 101-102. Thereafter, Garcia timely appealed.[4] *577 II. Preliminarily, we note that in this jurisdiction there are two types of contempt of court, civil and criminal. See Murray v. Murray, 60 Haw. 160, 587 P.2d 1220 (1978); Hawaii Pub. Employment Relations Bd. v. Hawaii State Teachers Ass'n, 55 Haw. 386, 520 P.2d 422 (1974). Criminal contempt, in turn, may be classified as either summary (direct) contempt or constructive (indirect) contempt. Summary contempt occurs when "the offense [is] committed in the immediate view and presence of the court, or under such circumstances that the court has knowledge of all of the facts constituting the offense[.]" Hawaii Revised Statutes (HRS) § 710-1077(3)(a) (1985). See also In re Nam, 65 Haw. 119, 648 P.2d 1101 (1982). Other contumacious offenses are deemed constructive criminal contempt. See HRS § 710-1077(3)(b) (1985); State v. Ryan, 59 Haw. 425, 583 P.2d 329 (1978); In re Bettencourt, 55 Haw. 430, 521 P.2d 668 (1974). The parties concur that the alleged misconduct in this case constituted constructive criminal contempt, rather than summary criminal contempt. We agree. It appears that Judge Lance treated the constructive criminal contempt as a petty misdemeanor. See HRS § 710-1077(3)(b). III. We start with the precept that "[c]riminal contempts are crimes and the accused is entitled to the benefit of all constitutional safeguards[.]" Hawaii Pub. Employment Relations Bd. v. Hawaii State Teachers Ass'n, 55 Haw. at 392, 520 P.2d at 426. Two of those safeguards are the procedural due process rights to reasonable notice and an opportunity to be heard. Taylor v. Hayes, 418 U.S. 488, 94 S.Ct. 2697, 41 L.Ed.2d 897 (1974); Miranda v. Southern Pac. Transp. Co., 710 F.2d 516, 522 (9th Cir.1983). In proceedings for constructive criminal contempt,[5] "the alleged contemner must be given notice of the purpose of the hearing, including the nature of the acts of contempt that he is alleged to have committed." People v. Razatos, 699 P.2d 970, 974 (Colo. 1985). Moreover, procedural due process requires that the accused be accorded adequate notice of, and time to prepare for, a contempt hearing. United States v. McAnlis, 721 F.2d 334, 337 (11th Cir.1983), cert. denied, 467 U.S. 1227, 104 S.Ct. 2681, 81 L.Ed.2d 877 (1984); United States v. Hawkins, 501 F.2d 1029, 1031 (9th Cir.), cert. denied, 419 U.S. 1079, 95 S.Ct. 668, 42 L.Ed.2d 674 (1974). Applying these standards to the facts of this case, we hold that Garcia's procedural due process right to sufficient notice was violated and the judgment of criminal contempt cannot be permitted to stand.[6] A. The written notice of hearing containing the contempt charges against Garcia is contained in the September 19, 1986 order which was filed 24 minutes before the scheduled commencement of the contempt hearing. Clearly, this notice was insufficient for it failed to give Garcia a reasonable time to prepare for the hearing. B. The statute provides that when an alleged constructive criminal contempt of court occurs and the court elects to treat it as a petty misdemeanor, "the court shall order the defendant to appear before it to answer a charge of criminal contempt of *578 court[.]" HRS § 710-1077(3)(b). Although some jurisdictions have, by rule, permitted oral notice of the charges in a constructive contempt situation, see e.g. Rule 42(b), Federal Rules of Criminal Procedure, no such rule exists in this jurisdiction. See Hawaii Rules of Penal Procedure. In the absence of such a rule, it is our view that the order called for in HRS § 710-1077(3)(b) should be in the form of a written order to show cause served on the accused. Assuming for discussion purposes, however, that Judge Lance's August 25, 1986 oral order constituted the order required under HRS § 710-1077(3)(b), that order was inadequate because it failed to give Garcia "notice of the specific charges[.]" Taylor v. Hayes, 418 U.S. at 499, 94 S.Ct. at 2703, 41 L.Ed.2d at 908. First, although Judge Lance found Garcia "guilty of criminal contempt in violation of HRS Section 710-1077(1)(c),"[7] Record at 101-102, there was no mention of that statute in the August 25, 1986 oral order. Second, although in the judgment of criminal contempt Garcia was found to have "failed to timely submit [the interrogatories]... to his client for response," Record at 102, Judge Lance did not orally charge Garcia with criminal contempt in that regard. Judge Lance ordered Garcia to provide the answers to the interrogatories on or before September 15, 1986 and set the September 19, 1986 hearing "in regard to sanctions for any potential non-compliance with today's orders." August 25, 1986 Transcript at 13-14. At the August 25, 1986 hearing, Judge Lance used the term "contempt of Court" only with reference to "telling the Court an untruth this morning." Id. at 14. Nonetheless, in the October 6, 1986 judgment, Judge Lance found Garcia in contempt of court for both having actively misled the court and having failed to submit the interrogatories to his client in a timely manner. Thus, the court failed to give Garcia adequate notice of the specific charges for which he was held in criminal contempt of court. We therefore vacate the October 6, 1986 judgment of criminal contempt. NOTES [1] At the August 25, 1986 hearing, the document was referred to as the "letter dated September 23rd, 1983[.]" August 25, 1986 Transcript at 10. In the judgment of criminal contempt filed on October 6, 1986, the document is referred to as the "letter dated September 1, 1983[.]" Record at 102. Since the letter is not part of the record, we do not know which date is correct. [2] Neither Himmelmann nor Garcia was sworn as a witness. [3] See note 1, supra. [4] On November 21, 1986, Garcia withdrew as counsel for defendant-husband and was replaced by other counsel. [5] Procedural due process protections are excepted in summary criminal contempt proceedings since "`instant action is necessary to protect the judicial institution itself.'" Miranda v. Southern Pac. Transp. Co., 710 F.2d 516, 522 (9th Cir.1983) (quoting In re Gustafson, 650 F.2d 1017, 1022 (9th Cir.1981)). However, even in a situation involving summary contempt, where the trial court postpones announcing the punishment for the offense that has occurred in its presence during trial, the contemner "should have reasonable notice of the specific charges and opportunity to be heard in his own behalf." Taylor v. Hayes, 418 U.S. 488, 499, 94 S.Ct. 2697, 2703, 41 L.Ed.2d 897, 908 (1974). [6] Since our holding on procedural due process grounds is dispositive of the appeal, we do not discuss the other issues raised by Garcia. [7] Hawaii Revised Statute § 710-1077(1)(c) (1985) provides: (1) A person commits the offense of criminal contempt of court if: * * * (c) As an attorney, clerk, or other officer of the court, he knowingly fails to perform or violates a duty of his office, or knowingly disobeys a lawful directive or order of a court[.] | Low | [
0.5,
27.625,
27.625
] |
d a prime number? False Let v(d) = 7*d**2 - 15*d - 23. Is v(-9) prime? False Let g(x) = x**2 + 10*x + 19. Let m = -9 - 4. Is g(m) a composite number? True Suppose -4*t = t. Suppose -2*d + 0*d + 5*g + 69 = t, -d + 32 = -2*g. Is d a composite number? True Suppose -49 - 13 = -2*v. Is v a prime number? True Let s(n) = 438*n + 1. Is s(8) composite? True Suppose 5*f - 3*f - 364 = 0. Suppose 345 - 2597 = -4*u. Suppose -3*i = -u + f. Is i a composite number? False Is (26126/10 - (-30)/(-50)) + -1 a prime number? False Let l(i) = -i**3 + i**2 + 191. Let m(a) = 4*a. Let s be m(2). Suppose 4*r = -3*d - s, -4*d + 3*r = -0 - 6. Is l(d) a prime number? True Suppose 0 = 4*s - 2*t - 9220, 2295 = s - 4*t + t. Is s composite? True Suppose 58 - 183 = -k. Suppose 3*s - 3*j - 873 = 0, k = -3*s - 3*j + 1010. Is s a prime number? True Is (-10 - 4)/((-6)/87) a prime number? False Is (-1 + 899)*66/44 a prime number? False Let x(f) = 10*f**2 - 3*f + 1. Let p be x(3). Suppose -2*z + 333 = 4*g - 7*z, z + p = g. Is g a composite number? True Is ((-15)/6)/((-5)/1910) composite? True Is 3 + 8/(-3) - 7958/(-3) prime? False Suppose u + 0*u = x, 0 = 2*u + 4*x + 18. Let z(r) = -20*r + 4. Let a(p) = 20*p - 3. Let b(t) = -5*a(t) - 4*z(t). Is b(u) composite? False Let p(a) = -a**3 - 2*a**2 + 2*a - 19. Is p(-5) prime? False Let r(g) = 8*g**2 - 3*g - 1. Is r(-8) a composite number? True Let u(j) = -3*j**2 - j**3 + 6*j + j + 2*j**2 + 4 + 0*j**2. Is u(-5) prime? False Let u(v) = v**3 + 7*v**2 + 4. Let c be 100/(-15) + 1/(-3). Let d be u(c). Suppose -d*m - 2*j + 524 = 0, -5*j - 262 = -m - m. Is m a composite number? False Suppose -7*w + 3005 = 450. Is w prime? False Suppose -3*t = 6, -5*z + 10 = -z + 5*t. Suppose -2*o = 2*o - 2576. Suppose -z*b = -9*b + o. Is b a composite number? True Suppose -112*h + 108*h = -12940. Is h composite? True Suppose -3*d + 0*d = -6. Let h(q) = 0*q - d*q - 4 + 7*q. Is h(6) composite? True Let d(u) = -6 + 19*u + 1 + 3. Let w be d(3). Let f = w + -20. Is f composite? True Let v(o) = o**2 + 12*o - 9. Let s be v(-13). Suppose 0*f = s*f - 1484. Is f a composite number? True Let s = -196 - -381. Is s prime? False Suppose 0 = 4*x - 2 - 2. Let c(r) = 22*r**2 + 1. Is c(x) a prime number? True Let s(g) = 2*g**2 + 17*g + 12. Let c(x) = x**3 + 7*x**2 + 8*x + 1. Let z be c(-6). Is s(z) a prime number? True Is (0 + 5 + 552)*1 a prime number? True Suppose o + 0*o = 541. Is o prime? True Is (1 - (-636)/2)*1 a composite number? True Suppose 9*h + 92 = 13*h. Is h a prime number? True Let b(d) = -158*d**3 - 7*d**2 - 4*d - 7. Let r(p) = -158*p**3 - 6*p**2 - 3*p - 6. Let u(j) = 5*b(j) - 6*r(j). Is u(1) a prime number? False Suppose -2*w + 1447 = -3*b, 2*w - 7*b + 2*b - 1453 = 0. Is w prime? True Let d(u) = -48*u + 7. Is d(-4) a composite number? False Let b(o) = -6*o**3 - 5*o**2 - 6*o - 3. Is b(-2) prime? True Let k(b) = -b**2 + 2*b + 111. Is k(0) a composite number? True Let o(m) = -5*m**2 + 10*m + 5. Let l be o(-7). Let s be (l/2)/(4/(-28)). Suppose -5*y = -f - s, y - 4*f = 5*y - 868. Is y a prime number? False Let g be (-826)/(-8) + 5/(-20). Let i = -41 + g. Is i a composite number? True Let c = 1 - 5. Is (4/(-6))/(c/198) composite? True Let v = 113 + -28. Let y = v - 6. Is y prime? True Suppose 0 = -5*n - 3*w + 55, -5*n + 25 + 5 = -2*w. Suppose o = 3*o + n. Is 37 - (-2 - o - 2) a composite number? False Let h be (-11)/(-3) + (-1)/(-3). Let q be ((-21)/(-6))/(2/h). Let c(x) = 11*x. Is c(q) prime? False Let f(r) be the second derivative of -3*r**2 + 0 + 1/3*r**3 - 2*r. Is f(5) composite? True Let g(j) = -2*j + 2. Let k = 5 + -1. Let d be g(k). Let s = 85 + d. Is s a prime number? True Let f(l) = 2*l + 2. Let p be f(-7). Is (-178)/(-8) + (-9)/p prime? True Suppose -3*c = c - 2*y - 11340, 2*c + 4*y - 5690 = 0. Is c a composite number? False Suppose -2*z = 5*f - 151, -4*z - 2*f + 0*f = -278. Suppose 198 = 3*x - 3*h, -x + 0*x - h + z = 0. Is x composite? False Suppose 5*s - 2*j + 5 = 3*j, -2*j - 28 = 4*s. Let u(d) = -18*d + 3. Let w be u(s). Suppose -3*m + 3*k + 31 = -2*m, -k = -3*m + w. Is m composite? False Suppose 0 = 5*v + 7 - 2. Let h be (v/(3/(-69)))/1. Suppose -3*x - h = -r, 5*x + 13 + 2 = 0. Is r prime? False Is (-5)/(-5*(-4)/(-24)) a prime number? False Let w = -5 - -5. Let c = w - -15. Is 6/c + 563/5 a prime number? True Suppose -313 = v - 3*v - 5*k, -5*k = -5*v + 765. Suppose -4*a + v = -106. Is a prime? False Let m(j) be the third derivative of 1/6*j**4 + 0*j - 1/60*j**5 + 0 - 1/60*j**6 + 0*j**3 - j**2. Is m(-3) a prime number? False Let c be 6/(-33) + 805/11. Suppose 40 - 166 = 3*f. Let m = c + f. Is m a prime number? True Suppose -5*p = -3*p - 4. Suppose -3 + 1 = -u - p*o, -2*u + 3*o = 10. Is (-4)/((-24)/(-921))*u prime? True Suppose 4*a + 5*t + 68 = 0, a + 3*t - 7 + 17 = 0. Is (-4)/22 - 1962/a a composite number? False Let v = 131 - -1206. Is v composite? True Let x be 297 - 5/((-5)/2). Let o = x - -2. Is o a composite number? True Let n(l) = -1657*l**3 + 3*l + 3. Is n(-1) a prime number? True Let d be (-250)/(-8) - 3/12. Let v = 59 - d. Suppose 138 - v = 5*p. Is p a composite number? True Let l(q) = -q**3 + 7*q**2 + 7. Let d(w) = -2*w + 9. Suppose -k - 3 = -10. Let u be d(k). Is l(u) composite? False Let m = 3 - 1. Suppose 0 = 4*o - m*o. Let p(j) = j**2 - j + 43. Is p(o) composite? False Suppose -2*n + 2*i + 4 = 0, 4*n - 20 = -5*i + 6. Let l(c) = 10*c**2 - 5*c + 5. Is l(n) prime? False Let i(g) = -21*g - 23. Is i(-8) composite? True Let z be 0/(-3 + 2 + -1). Is 158*1/2 + z a composite number? False Suppose -5*b + 1015 = -0*b. Is b prime? False Suppose -i + 6*i + 30 = 0. Let j be 0/(i/(-2 + -1)). Suppose 5*f = -j*f + 515. Is f a composite number? False Let w(v) = 107*v - 4. Let z = 18 + -15. Is w(z) a composite number? False Suppose 142 + 166 = -4*s. Let l = 450 + s. Is l a composite number? False Suppose -2*b + 4*t = -24, -3*b + 0*t - 2*t = 4. Is b prime? True Let v(x) = -3*x + 2. Let a be 50/(-18) + (-2)/9. Let d(m) = -9*m + 6. Let k(w) = a*d(w) + 8*v(w). Is k(3) a composite number? False Let l be 0/(-3 + 5) - -2. Suppose l*p = -0*p + 1934. Is p a prime number? True Let d = -5 - -10. Suppose 0 = d*s + 3*o - 545, -2*s + 3*o + o + 192 = 0. Suppose -2*y = -0*y - s. Is y composite? False Let s = 406 - -191. Let k = s + -118. Is k prime? True Let k(v) = -v**3 - v**2 + 5*v + 9. Is k(-4) prime? True Let g be (-10)/4*(15 + -13). Is (-2898)/(-35) + (-1)/g a prime number? True Suppose 0 = -3*t + b + 8 - 4, -t + b + 4 = 0. Let z = -13 - -47. Suppose t = -w + z + 19. Is w a prime number? True Let n = 4 + 1. Let o(j) be the first derivative of j**4/4 - 4*j**3/3 + j**2 + 2*j + 1. Is o(n) composite? False Let d(h) = -h**3 + 4*h**2 - h - 2. Let a be d(2). Suppose -m - 83 = -a*l, -2*l + 4*l - 40 = 2*m. Is l a prime number? False Let n = 4775 - 2836. Is n composite? True Let z = -1138 - -1681. Is z a prime number? False Let p(h) = 51*h**2 - 6*h - 29. Let x(y) = 17*y**2 - 2*y - 10. Let s(a) = 6*p(a) - 17*x(a). Is s(3) composite? True Let d = 109 - -24. Is d a prime number? False Let a = 180 + 497. Is a prime? True Let i(z) = z**2 - 6*z**2 + 4*z**2 + 6 + 7*z. Let r be (-2 - -5)/((-6)/(-14)). Is i(r) a composite number? True Let k(t) = -t + 1. Let m be k(1). Suppose -5*b = -5*d - b + 55, m = 3*b. Is d composite? False Suppose 4*n = -r - 1981, n - 106 + 604 = -3*r. Let q = n - -754. Is q composite? True Suppose -6*u + 5*u - 158 = 0. Is 3 - ((-3 - -3) + u) prime? False Let m(f) = f**2 - 9*f + 3. Let s be m(9). Suppose 0 = -q - s*q + 176. Suppose -7*k - 5*i + 171 = -3*k, 0 = -k - i + q. Is k prime? False Let n = 0 + 0. Let b be (-2)/3*(3 + n). Is 5 - (-3 - b)*2 composite? False Is 0 + -4 - (-4561 + 22) prime? False Let r(v) = -v**3 - v**2 + 2*v + 2. Let z be r(-2). Let h(x) = -3 - 1 - 6*x**3 + z - 2*x**3. Is h(-2) composite? True Let p = 53 + 754. Is p a composite number? True Let d(i) = -5 + 5 + i + 2*i**2. Let s be 3/(-4)*-4 + 2. Is d(s) prime? False Suppose a + 0*h = h + 139, 421 = 3*a - 4*h. Let d = a + -50. Is d a composite number? True Suppose 0 = 3*s - 2*w - 9, -3*s + w + 8 - 2 = 0. Is 46 - (-3 + s - -2) a composite number? True Suppose 2 = -2*m - 3*d, -4*m = -3*m - d + 1. Let p(o) = -39*o**3 - o**2 + 1. Is p(m) prime? False Let a = -24 - -209. Suppose -a - 35 = -4*t. Is t | Low | [
0.48730964467005006,
24,
25.25
] |
YOUR CART Susan Shaw Love, love, love, that is the soul of genius.”― Wolfgang Amadeus Mozart I'm delighted you found my web page! I'm a professional flutist, teacher of flute, and chamber musician in greater Cleveland and Northeast Ohio and offer private instruction in flute, baroque flute, and recorder to students of all ages, abilities, and musical levels at my studio located in Brunswick, Ohio.I hold a Master of Music degree from Oberlin Conservatory of Music and a Bachelor of Arts degree in History (summa cum laude/Phi Beta Kappa) from SUNY/University at Buffalo. I spent an additional three extraordinary years pursuing advanced music performance studies at the Hochschule für Musik und darstellende Kunst in Vienna, Austria. (And yes, I do speak German.) As a freelance musician I've taught and performed in many different venues throughout the United States, Europe, and North Africa. Since 2010 I've invested more time in studying and performing on the one-keyed or baroque flute. I'm always thrilled to find opportunities to unite my background in history with my passion for baroque music — however I can also truthfully say that I enjoy ALL styles of music including folk and jazz. FLUTE LESSONS I offer private lessons in flute, baroque flute, and recorder and enjoy teaching students of ALL ages, levels and abilities. If you are focused and want to improve rapidly, then I will push you to help you realise your goal — such as getting into the local youth symphony or applying for music school. If you're looking for a more casual learning experience, I will help you in your pursuit of enjoyable music-making. I love helping my students gain confidence in their playing and musicality.It's not where you start, it's where you end up!Studio hours are flexible. Contact me for available times, current rates, and to arrange for your first lesson! "Working with Susan was wonderful. She is totally dedicated to her students. She takes her instruction seriously and is patient with her students in helping them mature to their next level. Worth the investment."—Patty E., middle school band parent, Brunswick, Ohio Hear me on SoundCloud Follow me on Facebook How to find me My flute studio is conveniently located in the Brunswick United Methodist Church, at the intersection of Pearl and Center Roads in Brunswick, Ohio. There is ample parking and a comfortable waiting area for parents. The building is handicap accessible and Wi-Fi- equipped. | High | [
0.7230769230769231,
29.375,
11.25
] |
Subscribe To VAMPIRE WONDERLAND Twitter.com/wilkravitz Tuesday, June 26, 2012 A LITTLE VAMPIRE TRAVELING MUSIC PLEASE Done. It was settled. The mermaid-hag goes free. Doctor Franklin was convinced he couldn't learn anymore from her. She was crazy. She was old. She had to go home. We can't tell you exactly how old, because we don't know. Some sea captain... a whaling era sea captain... sold her to the Anti- Enchantment-Bureau way back when it was still called The Junto. This was like in early Federalist times. You know, lots of blinding, white neck linen and Beau Brummel top hats. If you need a visual, Google the Cholly Knickerbocker guy from The New Yorker. Medics seem to think mer-folk age like whales... and some of them are believed to be more than two hundred years old. Not much, compared to vampires and all, but, hey, I'll take it. Just in case you're wondering, it's me, wilkravitz. They got me back doing channeling duty. Didn't get no new sneakers yet. I'll let you know when and if.... So it's gonna be Papa, Luna and the crazy, old, cackling sea-hag. I think they decided on Luna because she was originally some kind of physician and they always send a saw-bones on these things. Remember STAR TREK? A helicopter's takin' 'em out to the western edge of The Gulf Stream. Papa wanted to sublimate, but the sea-hag opted for the 'sky ride,' as she called it and after all she's been through, they gave it to her. It's one of those big choppers, like the army has, 'cept ain't no army guys flying it. This is strictly a Doctor Franklin (and that means Anti-Enchantment-Bureau) joint. But they wear mirrored sunglasses too. And some of 'em talk with these phony, real clipped, 'South'ron' accents, so what's the diff? Like army guys dipped in a little bit a Hogwarts sauce. That's what they are. Got a little tank for the old mermaid. Has to have a lid so the water don't go sloshing all around. Couldn't get her no raw salmon. Not enough time. So some guy ran out to the Acme (Albertson's to non-Philly people) and grabbed a whole lot a Mrs. Paul's crap. (n0, I DON'T mean that it's actual crap. We just talk that way, so deal with it. I eat it too. So shut your mouth. OK?). She don't like the bread crumb part, but the stuff 'under' is all right. Papa and Luna are already naked. They have to be naked when they hit the water, in order to meld with the whales. And did I tell you they once had a 'thing' going? I know I must have. Look, if you're a regular reader, you know all that. Sarah almost bit off a titty. But now she don't care. She's the 'wife.' This one (Luna) is just the slut. That's how it is. Like in the British aristocracy. Pilot takes 'em down real low. WHUMP-WHUMP-WHUMP from the blades echos up from the surf....waves fan out in concentric circles. Wind blowin'. Moon shinin'. Gulls screamin' (they feed out here.) Whales singin'. Papa takes Luna's hand. He leans in and kisses her, as they jump. Then about eight mirrored sunglasses guys tip the tank and send the loony sea-hag back where she belongs. Oh, she was SO happy, clappin' her hands and singin' Popeye the Sailor..... Funny thing is, when she hit the water she got younger. Not that she looked any better...Just acted it. Started beatin' her ratty old fluke up and down, just like a dolphin. Papa let her go. She knows the way. But he did wrap her up in a real tight hoo-doo (magic barrier) to keep away the sharks and orcas. 'Bout forty eight heartbeats later, he sees the whale.... real big one, like a fin, or a great blue... something like that. Rises up from the depths like a giant ghost, or maybe like a Jules Verne submarine. You know they can be more than one hundred feet long? 'Bout fourteen times longer than Papa. If you were a whale and say like six feet tall, them little vampires would be just under five and a quarter inches.... like a salt shaker, or something like that..... Like the native guy in King Kong The Original's mouth...... So instinctively Luna tenses up. But Papa starts rubbin' her flanks and ticklin' her thighs to make her relax. Then he wraps her in his arms real tight and they sink down onto the great, broad back of this prince of the sea. Ten heartbeats later they stretch out flat, belly to the beast, as the mucus starts oozing from specialized pours, enveloping them in a thick, heavy, protective cocoon... We couldn't travel like that. We'd die. But vampires can. It's how they cross the sea. It's how they've always crossed the sea. You know the Story 'Bout Jonah? Well, in reality it was something like this... ~~~~~~~~~~~~~~~~~~~~~~~~~~~ ><> ><> ><> ><> ><>><> ><> please hit the SHARE BUTTON. help us build some traffic. COMMENTS would be real nice too. thank you very much... Pages Total Pageviews About Me Been running the http://vampirewonderland.blogspot.com site for about four years. my by-line has appeared in various regional glossies. Wrote four screenplays. The blog is an outgrowth of one of them --PHILADELPHIA AFTER DARK. I like dogs and am lactose dependent rather than lactose intolerant. That means I go through a lot of ice cream and cheese. | Low | [
0.446028513238289,
27.375,
34
] |
A "dose on demand" Biomarker Generator for automated production of [(18)F]F(-) and [(18)F]FDG. The University of Oklahoma-College of Pharmacy has installed the first Biomarker Generator (BG75) comprising a self-shielded 7.5-MeV proton beam positive ion cyclotron and an aseptic automated chemistry production and quality control module for production of [(18)F]F(-) and clinical [(18)F]FDG. Performance, reliability, and safety of the system for the production of "dose on demand" were tested over several months. No-carrier-added [(18)F]F(-) was obtained through the (18)O(p,n)(18)F nuclear reaction by irradiation (20-40 min) of a >95% enriched [(18)O]H2O target (280 μl) with a 7.5-MeV proton beam (3.5-5.0 μA). Automated quality control tests were performed on each dose. The HPLC-based analytical methods were validated against USP methods of quality control. [(18)F]FDG produced by BG75 was tested in a mouse tumor model implanted with H441 human lung adenocarcinoma cells. After initial installment and optimization, the [(18)F]F(-) production has been consistent since March 2011 with a maximum production of 400 to 450 mCi in a day. The average yield is 0.61 mCi/min and 0.92 mCi/min at 3.8 µA and 5 µA, respectively. The current target window has held up for over 25 weeks against >400 bombardment cycles. [(18)F]FDG production has been consistent since June 2012 with an average of six doses/day in an automated synthesis mode (RCY≈50%). The release criteria included USP-specified limits for pH, residual solvents (acetonitrile/ethanol), kryptofix, radiochemical purity/identity, and filter integrity test. The entire automated operation generated minimal radiation exposure hazard to the operator and environment. As expected, [(18)F]FDG produced by BG75 was found to delineate tumor volume in a mouse model of xenograft tumor. In summary, production and quality control of "[(18)F]FDG dose on demand" have been accomplished in an automated and safe manner by the first Biomarker Generator. The implementation of a cGMP quality system is under way towards the ANDA submission and first clinical use of [(18)F]FDG produced by BG75. | High | [
0.6787709497206701,
30.375,
14.375
] |
LONDON (Reuters) - Queen Elizabeth told the British people on Sunday that they would overcome the coronavirus outbreak if they stayed resolute in the face of lockdown and self-isolation, invoking the spirit of World War Two in an extremely rare broadcast to the nation. In what was only the fifth televised address of her 68-year reign, Elizabeth called upon Britons to show the resolve of their forbears and demonstrate they were as strong as generations of the past. "We will meet again", she pointedly said in a direct reference to the most famous British song from the war years of the 1940s, when she was a teenager. "Better days will return." "Together we are tackling this disease, and I want to reassure you that if we remain united and resolute, then we will overcome it," the 93-year-old monarch said in the address from her Windsor Castle home where she is staying with her husband Prince Philip, 98. "While we have faced challenges before, this one is different. This time we join with all nations across the globe in a common endeavour, using the great advances of science and our instinctive compassion to heal. We will succeed - and that success will belong to every one of us." The broadcast came hours after officials said the death toll in Britain from the virus had risen by 621 in the last 24 hours to 4,934 with high fatalities still expected in the next week. Prime Minister Boris Johnson is among those in self-isolation after testing positive for COVID-19, and the queen's own son and heir Prince Charles, 71, has recovered after suffering mild symptoms of the virus. Like many countries in Europe, Britain is in a state of virtual lockdown, with people told to stay at home unless it was essential to go out. Health minister Matt Hancock said even stricter riles might be imposed if the current rules to curb the spread of the virus were flouted. WORLD WAR TWO SPIRIT Elizabeth thanked those who were staying at home, thereby helping to spare others from suffering the grief already felt by some families, but acknowledged self-isolation could be hard. She also paid tribute to health care staff for their selfless work and commended the "heart-warming" stories of people across the Commonwealth, of which she is head, and beyond for delivering food and medicines to those who needed them. Sunday's address was an extremely rare as the queen usually only speaks to the nation in her annual televised Christmas Day message. In order to ensure any risk to the elderly monarch herself was mitigated, it was filmed in a big room to ensure a safe distance between her and the cameraman, who wore gloves and a mask and was the only other person present. Elizabeth said the situation reminded her of her first ever broadcast in 1940, when she and her late sister Margaret spoke from Windsor to children who had been evacuated from their homes to escape bombing raids by Nazi German aircraft. "Today, once again, many will feel a painful sense of separation from their loved ones. But now, as then, we know, deep down, that it is the right thing to do," she said. In the future people could take pride in how they too had dealt with disruption to their lives, and that the wartime stoicism of the British was not something from the past, but part of the present and future. "Those who come after us will say the Britons of this generation were as strong as any," she said. "That the attributes of self-discipline, of quiet good-humoured resolve and of fellow-feeling still characterise this country." She concluded by invoking the words of the song "We'll Meet Again" by Vera Lynn from World War Two which became a symbol of hope for Britons during the conflict. "We should take comfort that while we may have more still to endure, better days will return," she said. "We will be with our friends again; we will be with our families again; we will meet again." | Mid | [
0.626794258373205,
32.75,
19.5
] |
Adenovirus-mediated expression of human paraoxonase 3 protects against the progression of atherosclerosis in apolipoprotein E-deficient mice. We have previously reported that human paraoxonase 3 (PON3) is an HDL-associated protein capable of preventing LDL oxidation in vitro. The objective of the present study was to determine whether elevated levels of human PON3 in mice could protect against the progression of atherosclerosis in vivo. Twenty-six week-old apolipoprotein E-deficient mice were injected with 3x10(11) particles of adenovirus expressing either GFP alone (AdGFP) or together with human PON3 (AdPON3). Three weeks after injection, lesion area was significantly lower in AdPON3-treated mice compared with AdGFP controls. Serum from AdPON3 mice contained significantly lower levels of lipid hydroperoxides and exhibited an enhanced potential to efflux cholesterol from cholesterol-loaded macrophages. In addition, LDL was less susceptible to oxidation, whereas HDL was more capable of protecting against LDL oxidation. Exogenous human PON3 was not detected in the serum or HDL and more surprisingly we demonstrate that endogenous mouse PON3 is not associated with HDL, suggesting that the antioxidant function of PON3 is at the cellular level in mice. This study demonstrates for the first time that PON3 enhances the antiatherogenic capacity of serum and protects against the progression of atherosclerosis in vivo. | High | [
0.670050761421319,
33,
16.25
] |
The outcome of liver resection and lymphadenectomy for hilar lymph node involvement in colorectal cancer liver metastases. Hepatic hilar lymph node (HLN) involvement is considered as a poor prognostic factor during liver resection in colorectal liver metastases (CLM). The purpose of this study is to identify the clinical factors that distinguish HLN-positive patients from those who are hilar lymph node negative and to evaluate the frequency of macroscopic involvement of hepatic HLN, to investigate the impact of HLN involvement on survival after resection for CLM with lymphadenectomy and adjuvant chemotherapy. Between January 2000 and August 2012, 73 selected CLM patients underwent liver resections with lymphadenectomy in the Hepatopancreatobiliary Surgery Department I of Beijing Cancer Hospital. Clinical data, surgical outcome, and prognosis after operation of patients with HLN involvement were compared with that of patients without HLN involvement. Of the 73 patients who underwent liver resections with lymphadenectomy, 12 (16.4 %) patients had HLN involvement identified by pathology. Compared with patients without HLN involvement, the frequency of lymph nodes metastasis for primary tumor was significantly higher in HLN-positive patients (p = 0.023). For CLM patients with and without HLN involvement, 5-year overall survival (OS) was 16.2 and 37.1 %, respectively (p = 0.04). Five-year disease-free survival (DFS) rates were 0 and 32.9 % (p = 0.034). Multivariate analysis showed that involved resected HLN was an independent risk factor for overall survival. We should suspect HLN involvement in patients with colorectal cancer liver metastases when they have regional lymph nodes of primary tumor metastasis. Liver resection with HLN dissection might offer a unique curative opportunity for CLM patients with HLN involvement. | High | [
0.7096774193548381,
31.625,
12.9375
] |
Characterization of superior cervical ganglion neurons that project to the submandibular glands, the eyes, and the pineal gland in rats. These studies sought to determine whether the cell bodies of rat superior cervical ganglion neurons projecting to three very different target organs differ in terms of their size, number, location within the ganglion and/or neuropeptide content, and whether these features are altered in response to neonatal deafferentiation of the ganglion. A series of retrograde tracer, immunocytochemical, and double-labeling studies revealed differences in the size, number, location and neuropeptide content of superior cervical ganglion neurons that project to the submandibular salivary glands, eyes, or pineal gland. The mean areas of the cell bodies of neurons projecting to the submandibular gland are largest, those projecting to the eye are smallest, and those projecting to the pineal are intermediate in size. Submandibular gland projecting neurons are found throughout the ganglion, while the eye and pineal projecting populations are localized to the rostral quadrants. The different subpopulations of target organ specific superior cervical ganglion neurons are heterogeneous in their content of vasoactive intestinal peptide-, neuropeptide Y- and somatostatin-like immunoreactivity. A greater percentage of submandibular gland than of pineal projecting neurons display vasoactive intestinal peptide-like immunoreactivity, but there are no differences in the percentage of neurons displaying neuropeptide Y- or somatostatin-like immunoreactivity between the target organ specific groups. Neonatal deafferentiation does not result in changes in the size, number or distribution of target organ specific neurons, or in the percentage of immunoreactive neurons in these populations. In conclusion, these studies provide evidence that the size and distribution of neurons and percentage of peptide-containing neurons in the superior cervical ganglion is related to the target organ innervated, but provides no evidence of exclusive target organ-peptide relationships. | High | [
0.665127020785219,
36,
18.125
] |
Q: What is the most durable way to paint a wood floor in a high traffic area? I have to replace the floor on the landings of our stairs and love the look of painted wooden floors. However, it is a high traffic area, and I've seen many painted wood floors floors lose their finish sooner rather than later, which is something I would like to avoid (I realize I'll have to refinish them every so often, but less would definitively be better). What is the most durable way to paint a wood floor? A: The success of the paint job very much depends on the nature of the traffic. If it is accessed with road shoes, the sand on the shoes will quickly sand down any kind of paint. In case, I would go for clear boat paint and put a mat over the traffic area. In case you want to go without a mat, go for a satin or matte finish paint. That way, the wear doesnt show as much. If it is mostly accessed with clean (indoor) shoes, you can go for a number of good floor paints. I´ve had success both with a water based lacquer and a wax based open pore treatment. A: They make paints specially designed for floors that wear better .... but you can also add a clear polyurethane top coat over some other paint. ... and of course, adding runners or other carpeting in the highest traffic area (both to collect sand and grit that might be on shoes, and to prevent contact in those specific areas) can help to extend the life, too. It might not be good for the landing, but a small rug at the bottom of the stairs might help without becoming a hazard. A: As hinted at, boat coverings can be pretty tough. Spar varnish has such a reputation, and then there are the epoxy paints, which are actually probably the toughest, and most costly. | High | [
0.679045092838196,
32,
15.125
] |
It's been 10 years since Microsoft and Nvidia colaborated on a console development project, but a clause in the agreement between the two companies could still have ramifications for the GPU manufacturer. The company's recent FY 2011 report with the SEC states: On March 5, 2000, we entered into an agreement with Microsoft in which we agreed to develop and sell graphics chips and to license certain technology to Microsoft and its licensees for use in the Xbox. Under the agreement, if an individual or corporation makes an offer to purchase shares equal to or greater than 30% of the outstanding shares of our common stock, Microsoft may have first and last rights of refusal to purchase the stock. The Microsoft provision and the other factors listed above could also delay or prevent a change in control of NVIDIA. This isn't new information; NV's FY 2010 10-K (and presumably all the years previous) contained the same statement. The dusty old disclosure is attracting fresh interest thanks to the evolution of the market. With the Intel/Microsoft alliance splintering in the face of tablet-driven computing, there's talk that Microsoft could block a third-party acquisition bid for the GPU designer--or even buy Nvidia for itself. This particular ship sailed ten years ago. Such tidbits make for juicy gossip, but not much else. Even if Microsoft wanted an ARM development team, there are simpler ways to acquire one. Despite Nvidia's long-term goals, the vast majority of the company's revenue derives from GPU-related sales. Integrating the two companies would be a logistical nightmare; both Intel and AMD would likely argue that the deal violated antitrust legislation by handing Microsoft an unfair monopoly. The open, licensed nature of ARM means MS has precious little reason to invest in its own hardware. It makes more sense for the company to explicitly *avoid* any hint of favoritism while stressing that its upcoming Windows 8 runs on as many ARM designs as possible. Companies that choose to develop specific, dedicated silicon in-house typically do so because they have needs that aren't adequately met by existing mass-market options. Apple's A4/A5 processors are both bog-standard ARM Cortex processors without the variety of I/O blocks that typically accompany garden-variety implementations. Building chips without those blocks allowed Apple to trim CPU power consumption and further improve battery life. Regardless of how popular its products are, Apple is just one company. Microsoft intends to market Windows 8 across a range of solutions, including future x86 processors. Any attempt to play both the hardware and software angles would raise huge red flags and likely sink the entire operation under a bog of red tape. | Low | [
0.5150375939849621,
34.25,
32.25
] |
Earthquake early warning sensor installed at BMSC An earthquake early warning sensor was installed at BMSC by Ocean Networks Canada last week – one of many sensors being deployed along the west coast. A combination of an accelerometer and a GPS receiver will estimate the size and location of earthquakes, and potentially detect the earlier, weaker, primary ‘P’ wave from the earthquake, providing a warning before the stronger, secondary ‘S’ wave from the earthquake reaches people. | Mid | [
0.655086848635235,
33,
17.375
] |
Famous Roberto Cavalli Flamenco Corset Dress sz. L Will fit anyone size 8-10 USA It has asymmetrical hemline with long train which can be bustled for more comfort Dress is Pre-owned and is in great condition (worn once) | Low | [
0.38814016172506705,
18,
28.375
] |
Fitting a number of rectangular die on a round wafer typically has a single goal—arranging the die so that as many die as possible can be placed on a single wafer. The die are arranged on the wafer during an exposure process, such as photolithography, and a typical exposure process will use a mask or “reticle”. The reticle will often have 1, 2, or more die, and a reticle is typically exposed or processed at a single time, so that all of the die in the reticle are exposed at one time. The wafer can then be moved to a next location and the group of dies in the reticle are exposed again. Through trial and error or mathematical algorithm, a determination can be made as to how many dies can be placed on a wafer, and the number of good dies. The number of “good” dies on wafer includes all the dies, excluding those dies that are exposed but will never be fully operational because they are incomplete (e.g., they are only partially on the wafer) and/or they are fatally flawed (e.g., they are located on a beveled edge of the wafer). It is understood that a good die may be incomplete or fatally flawed for other reasons, such as a wafer defect or particle—but a good die has the potential to be a full and functional die. The present disclosure provides a method for optimizing die placement that goes beyond simply finding the greatest number of good die per wafer. The present disclosure considers other factors, including processing time and peripheral die yield. | High | [
0.663774403470715,
38.25,
19.375
] |
1. Field of the Invention This invention relates to an energy meter and a method of metering consumed energy. This invention is particularly applicable to the supply of energy in the form of fuel gas. 2. Discussion of the Background Conventionally energy consumption in the form of fuel gas is determined for billing purposes by measuring the volume of gas supplied to the consumer by providing a gas flow meter at the point of delivery. The gas supplier also remotely monitors the quality of gas supplied to a distribution area occupied by the consumer using the calorific value (CV) of the gas which is the fundamental measure of energy per unit volume, generally measured with a large and expensive chromatograph. From the CV of the gas supplied to the area together with the reading of the volume of fuel gas consumed by the customer, the gas supplier is able to determine the energy consumption from which the consumer is charged. As the customer is only able to determine the volume, of gas consumed without knowing the gas quality, he is unable to precisely monitor how much he will be charged. This is particularly disadvantageous for pre-payment xe2x80x9ccoin operatedxe2x80x9d gas meters. According to a first aspect of the present invention an energy meter comprises: means to measure a volume of gas supplied; means to measure a calorific value of the gas supplied; and means to calculate an energy value corresponding to the measured volume of gas supplied and the measured calorific value wherein both of the means to measure a volume of gas supplied and the means to measure a calorific value of the gas supplied are provided in a single integral meter unit. According to a second aspect of the present invention a method of determining a quantity of energy supplied to a consumer comprises: measuring a volume of gas supplied; measuring a calorific value of the gas supplied; and calculating an energy value of the supplied gas corresponding to the measured volume of gas supplied and the measured calorific value wherein both the measuring of a volume of gas supplied and the measuring of a calorific value of the gas supplied are performed at substantially the point of delivery to the consumer. The provision of an energy reading at the customer,s premises enables the consumer to monitor how much he will be charged. This is especially advantageous for pre-payment meters. According to a further aspect of the present invention an energy meter comprises: means to measure a volume of gas supplied; an apparatus to measure a calorific value of the gas including means to measure the speed of sound in the gas and means to use the speed of sound in an operation producing the calorific value of the gas corresponding to said speed of sound; and means to calculate an energy value corresponding to the measured volume of gas supplied and the measured calorific value. According to a still further aspect of the present invention a method of determining a quantity of energy supplied comprises: measuring a volume of gas supplied; measuring a calorific value of the gas supplied including measuring the speed of sound in the gas and using the speed of sound in an operation producing the calorific value of the gas corresponding to said speed of sound; and calculating an energy value of the supplied gas corresponding to the measured volume of gas supplied and the measured calorific value. The means to measure a volume of gas supplied and the apparatus to measure the calorific value of the gas are preferably provided in a single unit. The means to calculate an energy value may also be provided in the same unit but may additionally or alternatively be provided remotely, for example at the gas supplier""s billing department. Since the speed of sound of a gas can be determined by a conveniently compact and inexpensive device it can be provided in a small meter unit and provided with correspondingly compact means, preferably in the form of control electronics or a processing means, to produce the calorific value from the measured speed of sound. Such an apparatus to measure a calorific value of the gas is much smaller, cheaper and easier to operate than a conventional calorific value measuring device such as a chromatograph. Consequently, this enables the production of a meter to measure energy which is small, cheap and reliable when used with a means to measure a volume of gas supplied. The calorific value of a gas is preferably measured by making a measure of a first thermal conductivity of the gas at a first temperature, making a measure of a second thermal conductivity of the gas at a second temperature which differs from the first temperature, and using the speed of sound and the first and second thermal conductivities in an operation producing the calorific value of the gas corresponding to said speed of sound and said first and second thermal conductivities. The above described meter and method are suitable for both domestic and industrial use. All references to the calorific value include parameters equivalent to calorific value such as Wobbe Index x{square root over (RD)}. All references to calorific value also include parameters dependent upon calorific value which when considered with the volume of gas supplied produce a parameter dependent upon the energy value. All references to energy value include parameters dependent upon energy values such as cost in the local currency. The cost is determined by multiplying the consumed energy, measured in Joules or Watt hours for example, by the cost per unit of energy. | Mid | [
0.612975391498881,
34.25,
21.625
] |
Can Herpes Simplex Virus Cause Cancer? Genital Herpes Tips Genital herpes such as vaginal herpes is caused by the Herpes Simplex Virus (HSV) which is from the same family of viruses that cause cold sores. Cold sores are generally caused by a type of Herpes Simplex Virus called Herpes Simplex Virus 1, and genital herpes such as vaginal herpes is usually caused by Herpes Simplex Virus 2. However, both... [Read more] Herpes has various types and various herpes symptoms. For each kind of herpes, there are corresponding herpes signs and herpes symptoms. Herpes Simplex Virus infection causes several distinct medical disorders. Common herpes infection of the skin or mucosa may affect the face and mouth (orofacial herpes), genitalia (genital herpes), or hands... [Read more] Choosing the right therapy for Herpes Simplex Virus depends on the site of the herpes infection and whether the attack is primary or recurrent. To be effective against recurrent Herpes Simplex Virus infection, treatment of herpes must be initiated in the first week of a primary herpes infection. Later herpes treatment has limited effect in preventing... [Read more] There are a number of herpes viruses which can cause the disease. Herpes simplex type 1 (HSV-1) generally causes mild outbreaks of cold sores on the mouth or lips. Herpes simplex type 2 (HSV-2) is more severe and causes genital herpes, though the mouth can also be affected. Both herpes infections can cause painful herpes blisters which are highly... [Read more] Many are finding out that herpes viruses are much more prevalent and much more dangerous than anyone ever imagined. Dr Robert Sinnott reported research has revealed a new clue to the mysterious connection between herpes viruses and connective tissue disease. He explains: “Herpes viruses have long been known to cause human diseases. But we’re... [Read more] Genital Herpes Resource Ocular herpes, herpes that affects the eye, is usually caused by the same virus responsible for cold sores on the lip, herpes simplex virus type 1. This type of herpes simplex virus can cause inflammation and scarring of the cornea that sometimes is referred to as a cold sore on the eye. Ocular herpes, which usually affects one eye, is... [Read more] Herpes is a kind of a sexually transmitted disease. A person with herpes and genital herpes can easily spread the herpes virus via skin contact. If you compare herpes to any flu virus that you can get through the air, herpes spreads by direct contact in the skin. This happens when a person with herpes or oral herpes or genital herpes, is in close... [Read more] Herpes is an infection that is caused by a herpes simplex virus (HSV). There are two types of herpes disease. The first herpes type is oral herpes which is commonly caused by herpes simplex type 1 and the second type of herpes is genital herpes which is commonly caused by herpes simplex type 2. Oral herpes causes herpes cold sores around the... [Read more] A PCR herpes test is conducted when someone is having herpes outbreaks. Generally, there are two approaches to diagnosing herpes, either through laboratory herpes tests or through herpes physical examination and herpes history. In a laboratory herpes test, the herpes viruses are detected directly from infected skin lesions by herpes. A swab is... [Read more] In the United States alone, genital herpes simplex virus 2 infections are reaching epidemic proportions. The recent herpes data from the Center for Disease Control (CDC) indicate that as many as 21.9% of the population between 12 and 74 years of age are infected with herpes simplex virus 2. The overwhelming majority of these are genital herpes infections.... [Read more] | Mid | [
0.584382871536523,
29,
20.625
] |
Exit Plan - How to Retire Abroad: Costa Rica More From Personal Finance A Guide to Retirement in Costa Rica When the time comes to retire, not everyone wants a condo in Boca Raton. Many people want to spend their later years in another culture, one that makes them feel like they’ve stumbled upon a secret paradise. One such place is Costa Rica. Its name means “rich coast,” which is appropriate considering its location on the Central American isthmus. Its equatorial setting keeps the climate tropical year-round, and the Pacific Ocean on its west coast and the Caribbean Sea to the east make it everything the retired beachcomber could possibly hope for. Just one look at some photos makes the tiny nation look incredibly enticing, but just as there’s more to retirement than simply quitting one’s job and not getting a new one, there’s more to Costa Rica than its beaches. Therefore, those seriously considering picking up stakes to live there should look a little closer. CNBC.com used data from the State Department, the Costa Rica tourism board and experiences of some Americans who have lived there to gain insight into the nation’s economy, real estate market, healthcare resources and other issues that retirees should weigh when relocating. Read ahead to find out more about making Costa Rica your own retirement haven. | Mid | [
0.6375000000000001,
38.25,
21.75
] |
Rohan Bopanna has confirmed his partnership with American Rajeev Ram for the next ATP season, the move comes in the wake of Mahesh Bhupathi-Bopanna combine deciding to part ways. While Bhupathi will be partnering Canadian Daniel Nestor, Bopanna will be seen pairing up with long-time friend Rajeev on the ATP circuit next year. The duo has a combined experience of 17 years on the professional circuit. "Rohan and Rajeev had decided a few months ago to combine forces to make what they believe an extremely formidable partnership, given their complementary styles of play and strong service games," a release from Play Right, the firm which manages Bopanna, stated on Tuesday. Bopanna had a successful year with Bhupathi, which included two titles at Dubai and Paris and runner-up finish at the just-concluded season-ending London Masters. He also attained his career-best ranking of eight in March this year. "I played with Mahesh in 2012 with a special focus on preparing for the London Olympics and now that it's over, I want to concentrate on the ATP circuit and I am eager to build a strong, sustainable partnership," Bopanna said about his decision. "Rajeev is a great player and given our individual strengths, and his command of the deuce court, I believe that we can complement each other very well on the court," he added. The duo had earlier made an appearance as a team at the Australian Open in 2008, where as an unseeded combination they proceeded to the pre-quarters defeating higher ranked teams along the way. With a career best doubles ranking of 33, Rajeev has maintained a fine balance between the singles and doubles circuits. The 28-year-old, however, has limited his singles appearances in the last couple of years and is concentrating more on the doubles game. Rajeev earlier this year in September won the St Petersburg Open along with Nenad Zimonjic. "I am very excited to play with Rohan in 2013. He is not only one of the best doubles players in the world but also a good friend. It is a great opportunity for me and I am looking forward to it," Rajeev said. With a total of 14 ATP doubles titles between them, Rohan and Rajeev are looking to recapture the magic in 2013. "2012 has been a good season for both of us and we hope to continue the momentum into 2013. However, we really want to focus on one match at a time," said Bopanna. His new partner was, though, was in no mood to look too far ahead. "Looking at the first month of the year, there are two big events in Chennai and the Australian Open so there is no need to look any further than that," Rajeev pointed. "We haven't played together since Australia in 2008 so it has been a while. I just hope to continuously improve so that we can reach our full potential," he added. The newly-formed combination will open their campaign in 2013 at the Chennai Open, where Rajeev won the title in 2009 partnering Eric Butorac. | High | [
0.6876513317191281,
35.5,
16.125
] |
Fonterra said 70 per cent of Indians were younger than 45, were digital-savvy, had disposable income, and wanted to consume higher quality and higher nutritional dairy products. Indian consumers will soon be eating and drinking dairy products using Fonterra milk. The dairy giant has signed a joint venture partnership with one of India's largest consumer companies, Future Consumer, to produce a range of consumer and foodservice products. Fonterra first entered the Indian market in 2001 but the venture fell through. In recent years, exports of dairy products to the second-most populous nation have been scant. The first products will be launched by the middle of 2019, using both locally sourced milk and dairy products from New Zealand. READ MORE: * Fonterra aims to be ahead of the disruption game, looks for next big thing * Fonterra in talks over 40,000 cow farm in India Fonterra's chief operating officer global consumer and foodservice Lukas Paravicini said the products would be similar to ones that were popular in India, but "with a twist". He gave the examples of the fresh cheese paneer or the cultured butter ghee. The partnership will be known as Fonterra Future Dairy Partners. Future Consumer has plans to launch 1100 stores this year. It is present in 26 of 31 Indian states with over 2000 modern trade outlets, 5000 public distribution outlets and a nationwide cold-chain network. 123RF In recent years, exports of dairy products to the second-most populous nation have been scant. Paravicini said 70 per cent of Indians were younger than 45, were digital-savvy, had disposable income, and wanted to consume higher quality and higher nutritional dairy products. "Consumer demand for dairy in India over the next seven years is set to increase by 82 billion litres – seven times the forecasted growth for China," Paravicini said. The time between now and the launch of the products would be used to "settle in the partnership infrastructure, learn the market and prioritise geographies". Group chief executive officer, Future Group Sethi. Kishore Biyani, said the association with Fonterra came at a time when the dairy industry in India was flourishing, and consumption of milk and other dairy products was increasing. | Mid | [
0.622406639004149,
37.5,
22.75
] |
Photo credit: KUTV Authorities in Grantsville, Utah say that they've made an arrest in the case if a pedophile who lured young girls over Snapchat to meet him so he could take advantage of them and forcefully commit rape. This case should serve as a warning to parents of children who use social media platforms such as Snapchat to monitor what their children are doing and who they're talking to. 29 Year Old Dakota L. Parker used Snapchat to communicate with the thirteen year old girl conning her into meeting him at his home in Grantsville. According to court documents the child said that, “he gave her something and she woke up naked the next morning”, unaware of where she was or how she arrived there. The girl told police that she had chatted with Parker on Snapchat at which time the child's mother then handed over her device to Grantsville City Police Detective Lydon Allred who then checked the Snapchat account records and verified the claims. The detective then pretended to be the child and contacted Parker wanting to meet again. Once Parker agreed for a second meeting law enforcement agencies were waiting to take him into custody for his crimes. Parker has since been charged with rape of a child and sodomy on a child, first-degree felonies; and with sex abuse of a child and two counts of enticing a minor over the internet, each being second-degree felonies. The child is a West Valley resident, who's in complete shock after what's happened to her from a man who manipulated her trust on the internet. Source: http://wdtn.com/2017/10/09/arrest-made-in-snapchat-rape/ —<i>[email protected]</i> <i>On Twitter:</i> <a href="https://www.twitter.com/IWillRedPillYou">@IWillRedPillYou</a> Tips? Info? Send me a message! | High | [
0.7102526002971761,
29.875,
12.1875
] |
The government has ordered blocking of 857 porn websites and plans to put in place an ombudsman to look into cyber content-related issues, even as a debate raged on social media over Internet censorship. The Department of Electronics and Information Technology has asked Internet service providers to take down 857 porn websites, an official said. The official, however, said it was a temporary measure till the final orders are pronounced by the top court. Explaining rationale for the decision, a top government official said the government has merely complied with the Supreme Court directive asking for measures to block porn sites, particularly those dealing with child pornography. The official, however, said that since the issue is very complicated, the case must be heard in detail by involvement of NGOs, civil society, parental groups, child councillors, ISPs and government, and after hearing the views of all, let the court come with some guidelines. Also Read: Why a porn ban in India is futile There is a view in the government that when proper guidelines on the issue will come, it will create a healthy stabilising factor in the country. "The government must be away from this whole process (blocking of porn sites). On the issue of national security, terrorism, extremism, communalism, government will have the final say...beyond that the social media divide comes into operation, let there be an ombudsman to take a call, like the TV ombudsman is there," the official said. The ombudsman could be a retired SC judge or somebody from the civil society. The official said all the stakeholders can give their views regarding the regulatory mechanism that should be adopted for the cyber content related issues. The order to block porn websites, however, faced flak over social media with commentators calling it censorship of Internet. | Low | [
0.522540983606557,
31.875,
29.125
] |
Liverpool captain Steven Gerrard admits his 'buzz' for playing changed when he learned he would be starting less Departing Liverpool captain Steven Gerrard admits the "buzz" of playing changed when he learned he was to have a restricted role and that was when he decided to sever ties with his boyhood club. The midfielder, who turns 35 later this month, retired from England duty last July in order to extend his lifespan at club level but early in the season he discovered he would no longer be a regular starter under manager Brendan Rodgers. That proved to be a major factor in him not signing a contract extension and opting to move to California for a new challenge with the Los Angeles Galaxy at the end of the campaign. "I think the signs this year were that I'm going to become a squad player, play less," said Gerrard, speaking at the 5Times Liverpool Former Player Association Gala Dinner. "I'm going to come on as a sub and the buzz changes. "For me, I go to work on a Monday morning and I look forward to Saturday, to prepare to go to battle with some wonderful people - with good mates - and that's my buzz. "When a manager gets you into the office and says that's going to change and it's going to become more limited - that's when you make your decision. "It's not a selfish thing; coming on as a sub's just not the same buzz so things have changed this year." Gerrard, who has carried the burden of leading Liverpool over the last decade, recently spoke of how he is looking forward to not having as much pressure on his shoulders in Major League Soccer. Despite his vast achievements for the club he has been associated with since joining their academy at the age of nine he will find a life of relative anonymity on the west coast of the United States. "It lets you give a little back to your family," he added. "You step out of the city, you breathe for a bit, you enjoy your kids and you go to a place where you are going to enjoy it. "I think the league's going to be good, I can still start games and I can still enjoy it." Gerrard, who will be honoured in his final match at Anfield against Crystal Palace on Saturday, will not be the only one to leave this summer. Full-back Glen Johnson has not been offered a new deal while fellow defender Kolo Toure and goalkeeper Brad Jones also have contracts which expire this summer. Toure has been offered new terms but it seems increasingly unlikely the 34-year-old will stay on but full-back Jon Flanagan, also in the last few weeks of his contract, is expected to be offered a new deal despite knee surgery ruling him out until well into next season. Gerrard urged Fenway Sports Group, who sanctioned nearly £120million of spending last summer, to invest again to fill the void left by his departure. "Hopefully the owners will dig deep so the squad can be strengthened with the quality needed to bring more good times in the future," he said. Press Association Sport understands 19-year-old winger Jordon Ibe is close to signing a new agreement which will reflect his emergence into the first team this season but the future of Raheem Sterling, a year older, remains unclear. The England international still has more than two years to run on his existing deal but turned down Liverpool's £100,000-a-week offer earlier in the year and will not reopen talks until the end of the season. Former Reds captain Phil Thompson believes the writing is on the wall for the youngster, who has been pressed into an unfamiliar central striker role this season because of injuries to Daniel Sturridge. "I think it will be very difficult for him to stay at Liverpool now. He's shown all the signs that he's ready and prepared to leave the club," Thompson told Sky Sports. "But if he was to stay I would like to think his role will be on the flanks - I don't think Liverpool can even contemplate him being their main striker next season, because he's not a natural goalscorer. "Liverpool need somebody who's going to get you at least 15 league goals and maybe 25 overall - Raheem Sterling is not going to get you that. "He's done well for the team - he's helped them out up front this season, but I think everyone can see that he's not quite strong enough for it. "So, no matter where he is next season, I think his best role is out wide rather than through the middle." Your Comments COMMENT RULES: Comments that are judged to be defamatory, abusive or in bad taste are not acceptable and contributors who consistently fall below certain criteria will be permanently blacklisted. The moderator will not enter into debate with individual contributors and the moderator’s decision is final. It is Belfast Telegraph policy to close comments on court cases, tribunals and active legal investigations. We may also close comments on articles which are being targeted for abuse. Problems with commenting? [email protected] | Mid | [
0.5540838852097131,
31.375,
25.25
] |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.