text
stringlengths 8
5.74M
| label
stringclasses 3
values | educational_prob
sequencelengths 3
3
|
---|---|---|
Studies on immune competence in the rat: changes with age, sex, and strain. Reticuloendothelial capacity (determined by colloidal carbon clearance) and cell-mediated immunity (determined by xenograft skin grafts and macrophage migration inhibition in vitro) were studied as a function of age for the first time in male and female Sprague-Dawley rats. The results of all three tests in the female rat indicated that maximal immune competence was reached at the onset of puberty (4 weeks) and, depending on the immune response, immune competence declined significantly with age (4 to 96 weeks). In the male Sprague-Dawley, a similar pattern was found in two out of the three tests (colloidal carbon clearance, xenograft skin grafts). Macrophage migration inhibition in the male was unaffected by age (4 to 40 weeks). Cell-mediated immunity (xenograft skin grafts) was also studied in male and female rats of another strain (Long Evans) as a function of age. Maximal competence occurred at the onset of puberty and declined thereafter. | Mid | [
0.651515151515151,
32.25,
17.25
] |
--- title: SQL Server 和 ADO.NET description: 了解用于 SQL Server 的 .NET Framework 数据提供程序的功能和行为,用于封装特定于数据库的协议。 titleSuffix: '' ms.date: 03/30/2017 ms.assetid: c18b1fb1-2af1-4de7-80a4-95e56fd976cb ms.openlocfilehash: a517bccd9b60d00f6c6c636c9164d63fb5966de3 ms.sourcegitcommit: 5b475c1855b32cf78d2d1bbb4295e4c236f39464 ms.translationtype: MT ms.contentlocale: zh-CN ms.lasthandoff: 09/24/2020 ms.locfileid: "91197386" --- # <a name="sql-server-and-adonet"></a>SQL Server 和 ADO.NET 本节描述适用于 SQL Server 的 .NET Framework 数据提供程序 (<xref:System.Data.SqlClient>) 特定的功能和行为。 <xref:System.Data.SqlClient> 提供对 SQL Server 各版本的访问权限,这些版本封装有数据库特定的协议。 该数据提供程序设计的功能与 OLE DB、ODBC 和 Oracle 的 .NET Framework 数据提供程序的功能类似。 <xref:System.Data.SqlClient> 包含一个表格格式数据流 (TDS) 分析程序,它用于直接与 SQL Server 通信。 > [!NOTE] > 要使用 SQL Server .NET Framework 数据提供程序,应用程序必须引用 <xref:System.Data.SqlClient> 命名空间。 ## <a name="in-this-section"></a>本节内容 [SQL Server 安全性](sql-server-security.md) 简要介绍 SQL Server 安全功能,以及创建面向 SQL Server 的安全 ADO.NET 应用程序的应用程序方案。 [SQL Server 数据类型和 ADO.NET](sql-server-data-types.md) 描述如何使用 SQL Server 数据类型以及这些数据类型如何与 .NET Framework 数据类型进行交互。 [SQL Server 二进制和大值数据](sql-server-binary-and-large-value-data.md) 介绍如何在 SQL Server 中使用大值数据。 [ADO.NET 中的 SQL Server 数据操作](sql-server-data-operations.md) 介绍如何使用 SQL Server 中的数据。 包含有关大容量复制操作、MARS、异步操作和表值参数的部分。 [SQL Server 功能和 ADO.NET](sql-server-features-and-adonet.md) 介绍对 ADO.NET 应用程序开发人员而言有用的 SQL Server 功能。 [LINQ to SQL](./linq/index.md) 描述创建 LINQ to SQL 应用程序所需的基本构造块、进程和技术。 有关 SQL Server 数据库引擎的完整文档,请参见你正在使用的 SQL Server 版本的 SQL Server 联机丛书。 [QL Server 联机丛书](/sql/sql-server/sql-server-technical-documentation) ## <a name="see-also"></a>请参阅 - [保证 ADO.NET 应用程序的安全](../securing-ado-net-applications.md) - [ADO.NET 中的数据类型映射](../data-type-mappings-in-ado-net.md) - [数据集、数据表和数据视图](../dataset-datatable-dataview/index.md) - [在 ADO.NET 中检索和修改数据](../retrieving-and-modifying-data.md) - [ADO.NET 概述](../ado-net-overview.md) | High | [
0.8350983358547651,
17.25,
3.40625
] |
PLC restarting UR3 program after impact I am currently working on programming a UR3 and have set up communications with an Allen-Bradley PLC via ethernet/ip. I am able to send signals back and forth between the UR and the PLC via int and boolean registers, however, I would like for the PLC to be able to re-intialize the robot after a collision without having to use the teach pendant. Also, is there a way for the PLC to confirm the safety configuration via ethernet/ip as well? | Mid | [
0.623115577889447,
31,
18.75
] |
The hugely successful BLACKEST NIGHT action figure line continues!Included in this eighth installment of the series are: Black Lantern Black Flash, Professor Zoom's reanimated corpse, holds curious sway over The Flash's other undead rogues; Orange Lantern Lex Luthor, the new Orange Power Ring seeks out Lex Luthor for his avarice and lust for power; Indigo Tribe The Atom, with compassion and sense of duty stronger than ever, Ray Palmer serves as the binding force uniting the spectrum of power; Sinestro Corps Member Scarecrow, delights in instilling fear in others and is rewarded with the Yellow Ring of Power. The Black Lantern Black Flash figure stands at 6.75" high, features multiple points of articulation and includes a display base. Character-appropriate accessories are also included. | High | [
0.658536585365853,
33.75,
17.5
] |
1. Field of the Invention The present invention relates to a driving circuit for an active matrix type display device, and more particularly to a scan driving circuit for driving pixel rows in an organic light emitting display device. 2. Discussion of Related Art In general, an active matrix type display device, such as the organic light emitting display device, includes a pixel array arranged in a matrix pattern at cross over regions between data lines and scan lines. Here, the scan lines include horizontal lines (i.e., row lines) of a display region (including the pixel array), and sequentially provide a predetermined signal, namely, a scan signal, from a scan driving circuit to the pixel array. FIG. 1 is a block diagram showing a conventional scan driving circuit. With reference to FIG. 1, the conventional scan driving circuit includes a plurality of stages ST1 to STn, which are serially coupled to a start pulse SP input line. The start pulse SP may also be referred to as a start signal. The plurality of stages ST1 to STn sequentially shift a clock signal C in response to the start pulse SP to generate output signals SO1 to SOn, respectively. Each of second to nth stages ST2 to STn receives and shifts an output signal of a previous stage as a start pulse. Accordingly, the stages generate output signals SO1 to SOn by sequentially shifting the start pulse SP, and provide the output signals to the pixel array. FIG. 2 is a circuit diagram of a stage in the scan driving circuit shown in FIG. 1. FIG. 3 is an input/output waveform diagram of the stage shown in FIG. 2. Referring to FIG. 2 and FIG. 3, each stage of a scan driving circuit conventionally uses a master-slave flip-flop. When a clock clk is at low level, such a flip-flop continues to receive an input and maintains a previous output. In contrast, when the clock clk is at high level, the flip-flop maintains an input signal In received when the clock clk is at the low level and outputs it as an output signal Out1, but no longer receives the input signal In. In the aforementioned circuit, an inverter included in the flip-flop has a problem in that a static current flows when an input In to the inverter is at low level. Furthermore, in the flip-flop, the number of inverters receiving a high-level input is the same as that of inverters receiving a low-level input. Accordingly, the static current flows through one half of all the inverters in the flip-flop, thereby causing increased power consumption. An inset in FIG. 2 shows a more detailed circuit for the inverter. A voltage value corresponding to a ratio of resistances connected between a power supply VDD (e.g., a first voltage source) and a ground GND (e.g., a second voltage source) determines a high level of an output voltage out of the inverter including transistors M1′ and M2′. A low level of the output voltage out is set to be greater than the voltage level of the ground GND by a threshold voltage Vth of the transistor M2′ used in the inverter circuit. Due to characteristic deviations of the transistors, since levels of an input voltage is different according to the respective stage, in the case where the circuit of FIG. 2 is used, deviation occurs when the output voltage is at high level, with the result that the circuit may be erroneously operated. Moreover, the deviation in the low level of the output voltage causes a deviation in on-resistance of an input transistor of an inverter included in the circuit of FIG. 2 to occur, thereby impacting a deviation in a high level of the output voltage. In particular, since a display panel of an organic light emitting display device uses a transistor having a large characteristic deviation, such a problem is more serious. Further, in the inverter, an electric current flows through the input transistor to charge an output terminal, whereas the electric current flows through a load transistor to discharge the output terminal. Upon charging of the output terminal, a source-gate voltage of the load transistor is gradually reduced, and accordingly a discharge current is rapidly reduced. This causes the discharge efficiency to be deteriorated. | Mid | [
0.5483870967741931,
34,
28
] |
1st episode screened at Korean film fest in October Production I.G announced on October 24 that its B: The Beginning animated series won the Jury Prize in the TV & Commissioned Films competition category at the 20th Bucheon International Animation Film Festival (BIAF) in South Korea. The first episode screened at the festival on October 20 and October 21. It competed against 17 other works, including director Takuto Katayama's four-minute animated music video "LoTus." Netflix began streaming the 12-episode first season worldwide simultaneously on March 2, and it will get a second season. Netflix describes the story: In a world powered by advanced technology, crime and action unfold in the archipelagic nation of Cremona. Koku, the protagonist. Keith, the legendary investigator of the royal police force RIS. A mysterious criminal organization. A wide variety of characters race through the fortified city as it is beset by the serial killer, Killer B, and a chain of crimes in this suspense drama by director Kazuto Nakazawa and Production I.G . Kazuto Nakazawa ( Kill Bill 's animated segment, Moondrive , Parasite Dolls ) and Production I.G are listed as the original creators. Nakazawa and Yoshiki Yamakawa ( Little Busters! ) directed the series, and Nakazawa also designed the characters and served as key animation supervisor. Katsuya Ishida wrote the screenplay. Yoshihiro Ike ( Rage of Bahamut Genesis , Tiger & Bunny ) composed the music. The show's theme song "The Perfect World " is a collaboration between Marty Friedman (song-arrange-guitar), MAN WITH A MISSION 's Jean-Ken Johnny (vocals), KenKen (bass), and Kōji Fujimoto (arrange-programming). Thanks to Daniel Zelter for the news tip. Source: Production I.G | High | [
0.7110036275695281,
36.75,
14.9375
] |
More from his interview with the Daily Caller: President Donald Trump warned violent leftists and Antifa members that an opposition to them may “mobilize,” and it would mean “big trouble” for the leftist group. “They better hope that the opposition to Antifa decides not to mobilize,” the president told The Daily Caller in an exclusive Oval Office interview Wednesday. “These people, like the Antifa — they better hope that the opposition to Antifa decides not to mobilize. Because if they do, they’re much tougher. Much stronger. Potentially much more violent. And Antifa’s going to be in big trouble. But so far they haven’t done that and that’s a good thing,” he continued. “[Antifa] better hope that the other side doesn’t mobilize,” Trump concluded, “Because if you look, the other side, it’s the military. It’s the police. It’s a lot of very strong, a lot of very tough people. Tougher than them. And smarter for them. They’re sitting back and watching and they’re getting angrier and angrier.” | Low | [
0.447058823529411,
23.75,
29.375
] |
Welcome to the Cisco Sizzle! Each month, we’re rounding up the best of the best from across our social media channels for your reading pleasure. From the most read blog posts to the top engaging content on Facebook or LinkedIn, catch up on things you might have missed, or on the articles you just want to see again, all in one place. Let’s take a look back at the top content from March… Tomorrow Starts Here Explore how the Internet of Everything will change the way we work, live, play and learn. Connected World Technology Report Calling all IT professionals! Over two thirds of the IT managers agree that Big Data will be a strategic priority for their companies in 2013 and over the next five years as well. Do you agree? Is Big Data a strategic priority for your company? Cisco on Fortune’s Most Admired Once again, Cisco is honored to be on Fortune Magazine’s “World’s Most Admired Companies” List. Fortune tells us that the Most Admired list is the “definitive report card on corporate reputations.” Congratulations to our employees, and thanks to Fortune for the honor! Understanding the Different Types of Wireless Routers If your small business has grown and your workforce has become more mobile, you may be considering adding wireless to your network. Cisco explains the basics so you can identify which wireless router best fits your needs. TeleWork Week If you telecommuted for a week, how much time do you think you would save? Governments around the world understand the importance of a national ICT infrastructure and the role it can play in the economic and social development of a country. However, there is a significant industry trend called Big Data that, I believe, presents a major opportunity for governments to deliver more targeted services to citizens and businesses. Three key aspects of Big Data are already impacting governments around the world: Volume: Each interaction with a government entity creates digital records, network traffic, and storage requirements. The compound annual growth rates of global consumer and business data are expected to climb by 36 percent and 22 percent, respectively, between 2010 and 2015. Velocity: Data is being collected at greater and greater speeds. One example of the new velocity of data is the U.K. government’s transition to real-time tax reporting, where employers submit earnings and taxation information on a monthly rather than annual basis. Variety: In addition to traditional documents and forms, governments now must deal with torrents of less-structured data such as video from public safety and security systems, along with social media feedback. The multiple channels through which people now interact with government have also created a challenge. It is not the data itself that creates innovative opportunities for governments, but the potential for analytics and insight around this vast array of information across many formats. Big Data could enable governments to shorten the daily commute for citizens by developing predictive analytics on traffic flows and actual traffic data affecting traffic signaling in real time. Or perhaps governments could help with rapid identification and control of disease outbreaks—from flu, to infectious diseases, to food contaminants. It was not that long ago that whenever I read an article about IPv6, it usually discussed how the IPv4 Address depletion in other countries. At that time, the adoption of IPv6 was coming from other countries that where the v4 address space was depleted, the US Government, or Service Provider. Well fast forward only a few years and you can include Enterprise Networks in that mix. Driving this IPv6 train for enterprise networks is wireless technology and the enabling by-product, BYOD. Wireless technology, in particular, Wi-Fi has grown from a toy to a requirement in most businesses today. We have moved from 802.11b which gave you a max datarate of a paltry 11Mbps to 802.11n to a max datarate of 450Mbps if you currently deploy the Aironet 3600 Access Point that supports 4×4 MIMO; if not, it’s a max datarate of 300Mbps. Never mind the fact that we will soon see the Wave 1 version of 802.11ac will have a datarate of 1.3Gbps and Oh BTW, Wave 2 promises a scorching datarate of 6.9Gbps! Local government agencies are facing increased pressure to improve agency agility and performance, while creating efficiencies and reducing costs in order to better serve the public, and cloud solutions could be just the answer. Today marks the kick-off of our thought leadership blog series designed to provide local government leaders around the world with specifics on how cloud solutions can enable citizen services and drive transformation for a more connected, more efficient government. Throughout the series, our industry experts will examine a variety of topics from the value proposition of cloud to a review of how specific agencies are effectively using cloud to meet department imperatives. Below is an example showing how the regional government of Castilla-La Mancha in Spain is using cloud to increase its ability to quickly provision new projects, realize operating and capital cost savings, and offer new services to its widely dispersed citizens and workforce. Two weeks ago, we had the pleasure of hosting a TelePresence roundtable for 46 Public Sector CxO-level executives from 20 locations throughout Europe, Middle-East and Africa (see map below). The event was moderated by Jens Mortensen (Director Central Government & Healthcare, Cisco EMEAR) and the main objectives were: To present and debate on 3 perspectives of Government Cloud Governance: Policy, Insourcing Model, Outsourcing Model To share best practices and alternative governance models with peers in different countries To help shape, plan and implement a proven strategy for government cloud The CTO of a central ICT agency in Europe reported: “I valued the pragmatic approach (presentations from people in the public sector who actually have a service running) and the possibility to ‘network’ with very relevant people for the cloud project [my organization] is working on).” The CEO of an ICT Provider for Government agencies reported: “I enjoyed the discussion very much. Clearly there are very many different approaches to implementation of domain cloud solutions for both public and private sector needs based on local supply structures and government culture.” Some of the individuals posting to this site, including the moderators, work for Cisco Systems. Opinions expressed here and in any corresponding comments are the personal opinions of the original authors, not of Cisco. The content is provided for informational purposes only and is not meant to be an endorsement or representation by Cisco or any other party. This site is available to the public. No information you consider confidential should be posted to this site. By posting you agree to be solely responsible for the content of all information you contribute, link to, or otherwise upload to the Website and release Cisco from any liability related to your use of the Website. You also grant to Cisco a worldwide, perpetual, irrevocable, royalty-free and fully-paid, transferable (including rights to sublicense) right to exercise all copyright, publicity, and moral rights with respect to any original content you provide. The comments are moderated. Comments will appear as soon as they are approved by the moderator. | Mid | [
0.584946236559139,
34,
24.125
] |
A father tells me his son was asked by the school principal to remove this jersey during a patriotic-themed football game after people complained. Dad, a registered Democrat, says his son complied but felt humiliated. @HarnettCoSchool says it supports expression not disruptions pic.twitter.com/W9U9v2vBLF Conservative Tribune reported: TRENDING: This Is America? Young Mother TASED, CUFFED AND ARRESTED for Not Wearing Face-Mask at Mostly Empty Stadium to Watch HS Football Game According to WTVD, ABC 11 in Durham, an 18-year-old student was ordered to change a jersey he wore with the name “Trump” and the number “45” for a football game Friday night, then marched off the premises by the school’s principal. And his father isn’t happy about it at all. “I think any mother or father would feel like I feel,” Mike Collins told the news station. “We don’t want any kids violated. We don’t want to see kids embarrassed over something like this,” Collins said. “He was not disrespectful. He was not acting in a manner that would cause attention to him.” | Low | [
0.512658227848101,
30.375,
28.875
] |
Definitions from Wiktionary, Creative Commons Attribution/Share-Alike License n. the largest city in Virginia; long overshadowed by Norfolk but growing rapidly since 1970; with 28 miles of public beaches tourism is a major factor in the economy; site of three United States Navy bases | High | [
0.707736389684813,
30.875,
12.75
] |
// !$*UTF8*$! { archiveVersion = 1; classes = { }; objectVersion = 46; objects = { /* Begin PBXBuildFile section */ 02480D013C12BAEF0EA2A041 /* Pods-KRVideoPlayer-dummy.m in Sources */ = {isa = PBXBuildFile; fileRef = 5D08CBE92CDB828902A17FC9 /* Pods-KRVideoPlayer-dummy.m */; }; 067F2309CDEF00643AA5FD4B /* Pods-KRVideoPlayer-KRVideoPlayer-dummy.m in Sources */ = {isa = PBXBuildFile; fileRef = 4F0F151515C1A9A0B5ABEFC0 /* Pods-KRVideoPlayer-KRVideoPlayer-dummy.m */; }; 0AA9566317217D2B2FA987A4 /* [email protected] in Resources */ = {isa = PBXBuildFile; fileRef = 807922251DE9363140E66EFC /* [email protected] */; }; 223B7F03B55FEEBC8D1FC764 /* [email protected] in Resources */ = {isa = PBXBuildFile; fileRef = 82A9F08C53225CA9AFCDB37B /* [email protected] */; }; 2A4EC34E1C9ABB9DB3E3FF8E /* Foundation.framework in Frameworks */ = {isa = PBXBuildFile; fileRef = E49222C9B3BED7FA24221B04 /* Foundation.framework */; }; 51FFBB7CCFB293ABB621CE5F /* [email protected] in Resources */ = {isa = PBXBuildFile; fileRef = 055442B892151E10F55666F0 /* [email protected] */; }; 558BB1B538B4306B985ADE4F /* KRVideoPlayerControlView.m in Sources */ = {isa = PBXBuildFile; fileRef = 34B902AB0FB30663FE32CF6F /* KRVideoPlayerControlView.m */; }; 5F1154E7A26EF7E2FB49D8F0 /* KRVideoPlayerController.h in Headers */ = {isa = PBXBuildFile; fileRef = FAAF5C420342FF70D4B19B09 /* KRVideoPlayerController.h */; }; 698059AB13C8DEDA9D69E30F /* [email protected] in Resources */ = {isa = PBXBuildFile; fileRef = 2968BE8345359F7028AA931A /* [email protected] */; }; 6993F9026EC7C3F98F2D3CFF /* Foundation.framework in Frameworks */ = {isa = PBXBuildFile; fileRef = E49222C9B3BED7FA24221B04 /* Foundation.framework */; }; 6C84141BEF6E6902DBEAD2A5 /* [email protected] in Resources */ = {isa = PBXBuildFile; fileRef = E75DC9B4B99F6BE48434FD5D /* [email protected] */; }; 6C9865C8FFC344385E59B4D2 /* [email protected] in Resources */ = {isa = PBXBuildFile; fileRef = 9C0544AE0D36D461C749E412 /* [email protected] */; }; 73F6BDC8B14D3FE014C04703 /* MediaPlayer.framework in Frameworks */ = {isa = PBXBuildFile; fileRef = 0C19EFDB85BACF433AE5D02D /* MediaPlayer.framework */; }; 79139762FBDB52D0C99477F8 /* UIKit.framework in Frameworks */ = {isa = PBXBuildFile; fileRef = 9231DA0FE4CB0F1BD02913FE /* UIKit.framework */; }; 84AA3B9C927B9F050E500884 /* [email protected] in Resources */ = {isa = PBXBuildFile; fileRef = F0F81706D52CB108A1016A08 /* [email protected] */; }; 932D92D41E5C8D10CAACCA95 /* [email protected] in Resources */ = {isa = PBXBuildFile; fileRef = 9B5363758AD65D5416F34437 /* [email protected] */; }; 9C4D97F91F0ABE19FA295592 /* [email protected] in Resources */ = {isa = PBXBuildFile; fileRef = CF8E3445540C16455F668035 /* [email protected] */; }; 9E59717CE6D6125831F4CCAD /* [email protected] in Resources */ = {isa = PBXBuildFile; fileRef = DF17335ECC89EC8D0A7E3E0F /* [email protected] */; }; CDCEAEBBB5CF26FE8A1C0D54 /* KRVideoPlayerController.m in Sources */ = {isa = PBXBuildFile; fileRef = 3D7197CF55924FEAAD0B4FE8 /* KRVideoPlayerController.m */; }; D6483FE0DE26CD29ACF15050 /* [email protected] in Resources */ = {isa = PBXBuildFile; fileRef = 74C4AA26DEE9B7DE30FB70F9 /* [email protected] */; }; D75C5E810E72A8E1EEC54E23 /* KRVideoPlayerControlView.h in Headers */ = {isa = PBXBuildFile; fileRef = 786CB666E4C8398438D6F956 /* KRVideoPlayerControlView.h */; }; E3173503A5F8FAD451F785A9 /* [email protected] in Resources */ = {isa = PBXBuildFile; fileRef = 1C98E48A7794D60D5B1C7A7A /* [email protected] */; }; /* End PBXBuildFile section */ /* Begin PBXContainerItemProxy section */ 480E9A448C13506276843C8C /* PBXContainerItemProxy */ = { isa = PBXContainerItemProxy; containerPortal = 1F6A9A65718A4142431AF5D9 /* Project object */; proxyType = 1; remoteGlobalIDString = 5A2D9B2954C0DD27294DCDA9; remoteInfo = "Pods-KRVideoPlayer-KRVideoPlayer"; }; 873436703E9E5786C146826C /* PBXContainerItemProxy */ = { isa = PBXContainerItemProxy; containerPortal = 1F6A9A65718A4142431AF5D9 /* Project object */; proxyType = 1; remoteGlobalIDString = 62E0FFBC51104C48B20D4F1C; remoteInfo = "Pods-KRVideoPlayer-KRVideoPlayer-KRVideoPlayer"; }; /* End PBXContainerItemProxy section */ /* Begin PBXFileReference section */ 055442B892151E10F55666F0 /* [email protected] */ = {isa = PBXFileReference; includeInIndex = 1; lastKnownFileType = image.png; path = "[email protected]"; sourceTree = "<group>"; }; 0C19EFDB85BACF433AE5D02D /* MediaPlayer.framework */ = {isa = PBXFileReference; lastKnownFileType = wrapper.framework; name = MediaPlayer.framework; path = Platforms/iPhoneOS.platform/Developer/SDKs/iPhoneOS8.3.sdk/System/Library/Frameworks/MediaPlayer.framework; sourceTree = DEVELOPER_DIR; }; 104FE7CC9DCA0F9578196050 /* Podfile */ = {isa = PBXFileReference; includeInIndex = 1; lastKnownFileType = text; name = Podfile; path = ../Podfile; sourceTree = SOURCE_ROOT; xcLanguageSpecificationIdentifier = xcode.lang.ruby; }; 119500CF852101E1C363EAB7 /* Pods-KRVideoPlayer-acknowledgements.plist */ = {isa = PBXFileReference; includeInIndex = 1; lastKnownFileType = text.plist.xml; path = "Pods-KRVideoPlayer-acknowledgements.plist"; sourceTree = "<group>"; }; 1B048855E3704A07E0B4C0AD /* Pods-KRVideoPlayer-resources.sh */ = {isa = PBXFileReference; includeInIndex = 1; lastKnownFileType = text.script.sh; path = "Pods-KRVideoPlayer-resources.sh"; sourceTree = "<group>"; }; 1C98E48A7794D60D5B1C7A7A /* [email protected] */ = {isa = PBXFileReference; includeInIndex = 1; lastKnownFileType = image.png; path = "[email protected]"; sourceTree = "<group>"; }; 23ADDF228BDF89BB29AE22EC /* Pods-KRVideoPlayer-KRVideoPlayer-Private.xcconfig */ = {isa = PBXFileReference; includeInIndex = 1; lastKnownFileType = text.xcconfig; path = "Pods-KRVideoPlayer-KRVideoPlayer-Private.xcconfig"; sourceTree = "<group>"; }; 2968BE8345359F7028AA931A /* [email protected] */ = {isa = PBXFileReference; includeInIndex = 1; lastKnownFileType = image.png; path = "[email protected]"; sourceTree = "<group>"; }; 34B902AB0FB30663FE32CF6F /* KRVideoPlayerControlView.m */ = {isa = PBXFileReference; includeInIndex = 1; lastKnownFileType = sourcecode.c.objc; path = KRVideoPlayerControlView.m; sourceTree = "<group>"; }; 3D7197CF55924FEAAD0B4FE8 /* KRVideoPlayerController.m */ = {isa = PBXFileReference; includeInIndex = 1; lastKnownFileType = sourcecode.c.objc; path = KRVideoPlayerController.m; sourceTree = "<group>"; }; 4497B197CEE6876576DF0B76 /* libPods-KRVideoPlayer-KRVideoPlayer.a */ = {isa = PBXFileReference; explicitFileType = archive.ar; includeInIndex = 0; path = "libPods-KRVideoPlayer-KRVideoPlayer.a"; sourceTree = BUILT_PRODUCTS_DIR; }; 4F0F151515C1A9A0B5ABEFC0 /* Pods-KRVideoPlayer-KRVideoPlayer-dummy.m */ = {isa = PBXFileReference; includeInIndex = 1; lastKnownFileType = sourcecode.c.objc; path = "Pods-KRVideoPlayer-KRVideoPlayer-dummy.m"; sourceTree = "<group>"; }; 5D08CBE92CDB828902A17FC9 /* Pods-KRVideoPlayer-dummy.m */ = {isa = PBXFileReference; includeInIndex = 1; lastKnownFileType = sourcecode.c.objc; path = "Pods-KRVideoPlayer-dummy.m"; sourceTree = "<group>"; }; 5D3B6AACB979F2DA4D196512 /* KRVideoPlayer.bundle */ = {isa = PBXFileReference; explicitFileType = wrapper.cfbundle; includeInIndex = 0; path = KRVideoPlayer.bundle; sourceTree = BUILT_PRODUCTS_DIR; }; 71A32742569C35D15B6F348F /* libPods-KRVideoPlayer.a */ = {isa = PBXFileReference; explicitFileType = archive.ar; includeInIndex = 0; path = "libPods-KRVideoPlayer.a"; sourceTree = BUILT_PRODUCTS_DIR; }; 74C4AA26DEE9B7DE30FB70F9 /* [email protected] */ = {isa = PBXFileReference; includeInIndex = 1; lastKnownFileType = image.png; path = "[email protected]"; sourceTree = "<group>"; }; 750EF5D300B863BAB6182602 /* Pods-KRVideoPlayer.release.xcconfig */ = {isa = PBXFileReference; includeInIndex = 1; lastKnownFileType = text.xcconfig; path = "Pods-KRVideoPlayer.release.xcconfig"; sourceTree = "<group>"; }; 786CB666E4C8398438D6F956 /* KRVideoPlayerControlView.h */ = {isa = PBXFileReference; includeInIndex = 1; lastKnownFileType = sourcecode.c.h; path = KRVideoPlayerControlView.h; sourceTree = "<group>"; }; 807922251DE9363140E66EFC /* [email protected] */ = {isa = PBXFileReference; includeInIndex = 1; lastKnownFileType = image.png; path = "[email protected]"; sourceTree = "<group>"; }; 821E09E9D5B6B5363F57EC88 /* Pods-KRVideoPlayer-KRVideoPlayer-prefix.pch */ = {isa = PBXFileReference; includeInIndex = 1; lastKnownFileType = sourcecode.c.h; path = "Pods-KRVideoPlayer-KRVideoPlayer-prefix.pch"; sourceTree = "<group>"; }; 82A9F08C53225CA9AFCDB37B /* [email protected] */ = {isa = PBXFileReference; includeInIndex = 1; lastKnownFileType = image.png; path = "[email protected]"; sourceTree = "<group>"; }; 84D1BDE1D53CB610F6BC66AF /* Pods-KRVideoPlayer-KRVideoPlayer.xcconfig */ = {isa = PBXFileReference; includeInIndex = 1; lastKnownFileType = text.xcconfig; path = "Pods-KRVideoPlayer-KRVideoPlayer.xcconfig"; sourceTree = "<group>"; }; 9231DA0FE4CB0F1BD02913FE /* UIKit.framework */ = {isa = PBXFileReference; lastKnownFileType = wrapper.framework; name = UIKit.framework; path = Platforms/iPhoneOS.platform/Developer/SDKs/iPhoneOS8.3.sdk/System/Library/Frameworks/UIKit.framework; sourceTree = DEVELOPER_DIR; }; 94761AADE1FF07678E1445F0 /* Pods-KRVideoPlayer-environment.h */ = {isa = PBXFileReference; includeInIndex = 1; lastKnownFileType = sourcecode.c.h; path = "Pods-KRVideoPlayer-environment.h"; sourceTree = "<group>"; }; 95E0E1A190277618DE705D19 /* Pods-KRVideoPlayer-acknowledgements.markdown */ = {isa = PBXFileReference; includeInIndex = 1; lastKnownFileType = text; path = "Pods-KRVideoPlayer-acknowledgements.markdown"; sourceTree = "<group>"; }; 9B5363758AD65D5416F34437 /* [email protected] */ = {isa = PBXFileReference; includeInIndex = 1; lastKnownFileType = image.png; path = "[email protected]"; sourceTree = "<group>"; }; 9C0544AE0D36D461C749E412 /* [email protected] */ = {isa = PBXFileReference; includeInIndex = 1; lastKnownFileType = image.png; path = "[email protected]"; sourceTree = "<group>"; }; CF8E3445540C16455F668035 /* [email protected] */ = {isa = PBXFileReference; includeInIndex = 1; lastKnownFileType = image.png; path = "[email protected]"; sourceTree = "<group>"; }; DC23D9D0B91BF2814B883F7B /* Pods-KRVideoPlayer.debug.xcconfig */ = {isa = PBXFileReference; includeInIndex = 1; lastKnownFileType = text.xcconfig; path = "Pods-KRVideoPlayer.debug.xcconfig"; sourceTree = "<group>"; }; DF17335ECC89EC8D0A7E3E0F /* [email protected] */ = {isa = PBXFileReference; includeInIndex = 1; lastKnownFileType = image.png; path = "[email protected]"; sourceTree = "<group>"; }; E49222C9B3BED7FA24221B04 /* Foundation.framework */ = {isa = PBXFileReference; lastKnownFileType = wrapper.framework; name = Foundation.framework; path = Platforms/iPhoneOS.platform/Developer/SDKs/iPhoneOS8.3.sdk/System/Library/Frameworks/Foundation.framework; sourceTree = DEVELOPER_DIR; }; E75DC9B4B99F6BE48434FD5D /* [email protected] */ = {isa = PBXFileReference; includeInIndex = 1; lastKnownFileType = image.png; path = "[email protected]"; sourceTree = "<group>"; }; F0F81706D52CB108A1016A08 /* [email protected] */ = {isa = PBXFileReference; includeInIndex = 1; lastKnownFileType = image.png; path = "[email protected]"; sourceTree = "<group>"; }; FAAF5C420342FF70D4B19B09 /* KRVideoPlayerController.h */ = {isa = PBXFileReference; includeInIndex = 1; lastKnownFileType = sourcecode.c.h; path = KRVideoPlayerController.h; sourceTree = "<group>"; }; /* End PBXFileReference section */ /* Begin PBXFrameworksBuildPhase section */ 0CC92971C0F2F9AA00B21911 /* Frameworks */ = { isa = PBXFrameworksBuildPhase; buildActionMask = 2147483647; files = ( 2A4EC34E1C9ABB9DB3E3FF8E /* Foundation.framework in Frameworks */, 73F6BDC8B14D3FE014C04703 /* MediaPlayer.framework in Frameworks */, 79139762FBDB52D0C99477F8 /* UIKit.framework in Frameworks */, ); runOnlyForDeploymentPostprocessing = 0; }; B59195C6E7DA5E786914825A /* Frameworks */ = { isa = PBXFrameworksBuildPhase; buildActionMask = 2147483647; files = ( ); runOnlyForDeploymentPostprocessing = 0; }; C8079F244C174E830F9C5BB5 /* Frameworks */ = { isa = PBXFrameworksBuildPhase; buildActionMask = 2147483647; files = ( 6993F9026EC7C3F98F2D3CFF /* Foundation.framework in Frameworks */, ); runOnlyForDeploymentPostprocessing = 0; }; /* End PBXFrameworksBuildPhase section */ /* Begin PBXGroup section */ 0A33C9017B8365F77B27810C /* Targets Support Files */ = { isa = PBXGroup; children = ( 7D5ABAB733BF50D57C99300D /* Pods-KRVideoPlayer */, ); name = "Targets Support Files"; sourceTree = "<group>"; }; 1E98AB8B8C25FEE9788542DF /* Frameworks */ = { isa = PBXGroup; children = ( 20C3B6094CD066C9765D7DF0 /* iOS */, ); name = Frameworks; sourceTree = "<group>"; }; 20C3B6094CD066C9765D7DF0 /* iOS */ = { isa = PBXGroup; children = ( E49222C9B3BED7FA24221B04 /* Foundation.framework */, 0C19EFDB85BACF433AE5D02D /* MediaPlayer.framework */, 9231DA0FE4CB0F1BD02913FE /* UIKit.framework */, ); name = iOS; sourceTree = "<group>"; }; 3E0424A197EEAD295FB9449F /* Classes */ = { isa = PBXGroup; children = ( 786CB666E4C8398438D6F956 /* KRVideoPlayerControlView.h */, 34B902AB0FB30663FE32CF6F /* KRVideoPlayerControlView.m */, FAAF5C420342FF70D4B19B09 /* KRVideoPlayerController.h */, 3D7197CF55924FEAAD0B4FE8 /* KRVideoPlayerController.m */, ); path = Classes; sourceTree = "<group>"; }; 3F9F381B55DEA2A008622FA2 = { isa = PBXGroup; children = ( 104FE7CC9DCA0F9578196050 /* Podfile */, DDFA866A68FFDB81CF514C61 /* Development Pods */, 1E98AB8B8C25FEE9788542DF /* Frameworks */, DF4A1548E3C7D3F9AF5160AB /* Products */, 0A33C9017B8365F77B27810C /* Targets Support Files */, ); sourceTree = "<group>"; }; 7AE0501C812DD0B5D27F5B34 /* Assets */ = { isa = PBXGroup; children = ( 055442B892151E10F55666F0 /* [email protected] */, F0F81706D52CB108A1016A08 /* [email protected] */, 82A9F08C53225CA9AFCDB37B /* [email protected] */, 9B5363758AD65D5416F34437 /* [email protected] */, E75DC9B4B99F6BE48434FD5D /* [email protected] */, DF17335ECC89EC8D0A7E3E0F /* [email protected] */, 9C0544AE0D36D461C749E412 /* [email protected] */, 807922251DE9363140E66EFC /* [email protected] */, 1C98E48A7794D60D5B1C7A7A /* [email protected] */, CF8E3445540C16455F668035 /* [email protected] */, 2968BE8345359F7028AA931A /* [email protected] */, 74C4AA26DEE9B7DE30FB70F9 /* [email protected] */, ); path = Assets; sourceTree = "<group>"; }; 7D5ABAB733BF50D57C99300D /* Pods-KRVideoPlayer */ = { isa = PBXGroup; children = ( 95E0E1A190277618DE705D19 /* Pods-KRVideoPlayer-acknowledgements.markdown */, 119500CF852101E1C363EAB7 /* Pods-KRVideoPlayer-acknowledgements.plist */, 5D08CBE92CDB828902A17FC9 /* Pods-KRVideoPlayer-dummy.m */, 94761AADE1FF07678E1445F0 /* Pods-KRVideoPlayer-environment.h */, 1B048855E3704A07E0B4C0AD /* Pods-KRVideoPlayer-resources.sh */, DC23D9D0B91BF2814B883F7B /* Pods-KRVideoPlayer.debug.xcconfig */, 750EF5D300B863BAB6182602 /* Pods-KRVideoPlayer.release.xcconfig */, ); name = "Pods-KRVideoPlayer"; path = "Target Support Files/Pods-KRVideoPlayer"; sourceTree = "<group>"; }; 87A50C82ACE39C61697D4DCE /* Support Files */ = { isa = PBXGroup; children = ( 84D1BDE1D53CB610F6BC66AF /* Pods-KRVideoPlayer-KRVideoPlayer.xcconfig */, 23ADDF228BDF89BB29AE22EC /* Pods-KRVideoPlayer-KRVideoPlayer-Private.xcconfig */, 4F0F151515C1A9A0B5ABEFC0 /* Pods-KRVideoPlayer-KRVideoPlayer-dummy.m */, 821E09E9D5B6B5363F57EC88 /* Pods-KRVideoPlayer-KRVideoPlayer-prefix.pch */, ); name = "Support Files"; path = "Example/Pods/Target Support Files/Pods-KRVideoPlayer-KRVideoPlayer"; sourceTree = "<group>"; }; 94B11DADDD593247158E04EB /* KRVideoPlayer */ = { isa = PBXGroup; children = ( E92B0EECB539C8023C9A60B4 /* Pod */, C54025B173941D50C14DC2F7 /* Resources */, 87A50C82ACE39C61697D4DCE /* Support Files */, ); name = KRVideoPlayer; path = ../..; sourceTree = "<group>"; }; 9B78AD143B5BA6E9409C1AA4 /* Pod */ = { isa = PBXGroup; children = ( 7AE0501C812DD0B5D27F5B34 /* Assets */, ); path = Pod; sourceTree = "<group>"; }; C54025B173941D50C14DC2F7 /* Resources */ = { isa = PBXGroup; children = ( 9B78AD143B5BA6E9409C1AA4 /* Pod */, ); name = Resources; sourceTree = "<group>"; }; DDFA866A68FFDB81CF514C61 /* Development Pods */ = { isa = PBXGroup; children = ( 94B11DADDD593247158E04EB /* KRVideoPlayer */, ); name = "Development Pods"; sourceTree = "<group>"; }; DF4A1548E3C7D3F9AF5160AB /* Products */ = { isa = PBXGroup; children = ( 5D3B6AACB979F2DA4D196512 /* KRVideoPlayer.bundle */, 71A32742569C35D15B6F348F /* libPods-KRVideoPlayer.a */, 4497B197CEE6876576DF0B76 /* libPods-KRVideoPlayer-KRVideoPlayer.a */, ); name = Products; sourceTree = "<group>"; }; E92B0EECB539C8023C9A60B4 /* Pod */ = { isa = PBXGroup; children = ( 3E0424A197EEAD295FB9449F /* Classes */, ); path = Pod; sourceTree = "<group>"; }; /* End PBXGroup section */ /* Begin PBXHeadersBuildPhase section */ 5A56B4FFFB474B012DF57AFA /* Headers */ = { isa = PBXHeadersBuildPhase; buildActionMask = 2147483647; files = ( D75C5E810E72A8E1EEC54E23 /* KRVideoPlayerControlView.h in Headers */, 5F1154E7A26EF7E2FB49D8F0 /* KRVideoPlayerController.h in Headers */, ); runOnlyForDeploymentPostprocessing = 0; }; /* End PBXHeadersBuildPhase section */ /* Begin PBXNativeTarget section */ 194D7764FE8186DF9F4E15C1 /* Pods-KRVideoPlayer */ = { isa = PBXNativeTarget; buildConfigurationList = 98E2C96B1A295028D2F10B36 /* Build configuration list for PBXNativeTarget "Pods-KRVideoPlayer" */; buildPhases = ( F5362D83DBAC9588930BEBAA /* Sources */, C8079F244C174E830F9C5BB5 /* Frameworks */, ); buildRules = ( ); dependencies = ( EB92838769F16DBE62838B1B /* PBXTargetDependency */, ); name = "Pods-KRVideoPlayer"; productName = "Pods-KRVideoPlayer"; productReference = 71A32742569C35D15B6F348F /* libPods-KRVideoPlayer.a */; productType = "com.apple.product-type.library.static"; }; 5A2D9B2954C0DD27294DCDA9 /* Pods-KRVideoPlayer-KRVideoPlayer */ = { isa = PBXNativeTarget; buildConfigurationList = 61FFD57991AB94C2CCDAF6AD /* Build configuration list for PBXNativeTarget "Pods-KRVideoPlayer-KRVideoPlayer" */; buildPhases = ( E910170FD8E6CDA3A97FD5AF /* Sources */, 0CC92971C0F2F9AA00B21911 /* Frameworks */, 5A56B4FFFB474B012DF57AFA /* Headers */, ); buildRules = ( ); dependencies = ( 05A1154ECA7D340FA7D6D515 /* PBXTargetDependency */, ); name = "Pods-KRVideoPlayer-KRVideoPlayer"; productName = "Pods-KRVideoPlayer-KRVideoPlayer"; productReference = 4497B197CEE6876576DF0B76 /* libPods-KRVideoPlayer-KRVideoPlayer.a */; productType = "com.apple.product-type.library.static"; }; 62E0FFBC51104C48B20D4F1C /* Pods-KRVideoPlayer-KRVideoPlayer-KRVideoPlayer */ = { isa = PBXNativeTarget; buildConfigurationList = 3C2D862458C88FC96E04EB22 /* Build configuration list for PBXNativeTarget "Pods-KRVideoPlayer-KRVideoPlayer-KRVideoPlayer" */; buildPhases = ( 1EDDE7D6B8DF727DB32814DD /* Sources */, B59195C6E7DA5E786914825A /* Frameworks */, 290B20EA14631980E0ACF9EE /* Resources */, ); buildRules = ( ); dependencies = ( ); name = "Pods-KRVideoPlayer-KRVideoPlayer-KRVideoPlayer"; productName = "Pods-KRVideoPlayer-KRVideoPlayer-KRVideoPlayer"; productReference = 5D3B6AACB979F2DA4D196512 /* KRVideoPlayer.bundle */; productType = "com.apple.product-type.bundle"; }; /* End PBXNativeTarget section */ /* Begin PBXProject section */ 1F6A9A65718A4142431AF5D9 /* Project object */ = { isa = PBXProject; attributes = { LastUpgradeCheck = 0640; }; buildConfigurationList = 53C8FE275774592403B6CA61 /* Build configuration list for PBXProject "Pods" */; compatibilityVersion = "Xcode 3.2"; developmentRegion = English; hasScannedForEncodings = 0; knownRegions = ( en, ); mainGroup = 3F9F381B55DEA2A008622FA2; productRefGroup = DF4A1548E3C7D3F9AF5160AB /* Products */; projectDirPath = ""; projectRoot = ""; targets = ( 194D7764FE8186DF9F4E15C1 /* Pods-KRVideoPlayer */, 5A2D9B2954C0DD27294DCDA9 /* Pods-KRVideoPlayer-KRVideoPlayer */, 62E0FFBC51104C48B20D4F1C /* Pods-KRVideoPlayer-KRVideoPlayer-KRVideoPlayer */, ); }; /* End PBXProject section */ /* Begin PBXResourcesBuildPhase section */ 290B20EA14631980E0ACF9EE /* Resources */ = { isa = PBXResourcesBuildPhase; buildActionMask = 2147483647; files = ( 51FFBB7CCFB293ABB621CE5F /* [email protected] in Resources */, 84AA3B9C927B9F050E500884 /* [email protected] in Resources */, 223B7F03B55FEEBC8D1FC764 /* [email protected] in Resources */, 932D92D41E5C8D10CAACCA95 /* [email protected] in Resources */, 6C84141BEF6E6902DBEAD2A5 /* [email protected] in Resources */, 9E59717CE6D6125831F4CCAD /* [email protected] in Resources */, 6C9865C8FFC344385E59B4D2 /* [email protected] in Resources */, 0AA9566317217D2B2FA987A4 /* [email protected] in Resources */, E3173503A5F8FAD451F785A9 /* [email protected] in Resources */, 9C4D97F91F0ABE19FA295592 /* [email protected] in Resources */, 698059AB13C8DEDA9D69E30F /* [email protected] in Resources */, D6483FE0DE26CD29ACF15050 /* [email protected] in Resources */, ); runOnlyForDeploymentPostprocessing = 0; }; /* End PBXResourcesBuildPhase section */ /* Begin PBXSourcesBuildPhase section */ 1EDDE7D6B8DF727DB32814DD /* Sources */ = { isa = PBXSourcesBuildPhase; buildActionMask = 2147483647; files = ( ); runOnlyForDeploymentPostprocessing = 0; }; E910170FD8E6CDA3A97FD5AF /* Sources */ = { isa = PBXSourcesBuildPhase; buildActionMask = 2147483647; files = ( 558BB1B538B4306B985ADE4F /* KRVideoPlayerControlView.m in Sources */, CDCEAEBBB5CF26FE8A1C0D54 /* KRVideoPlayerController.m in Sources */, 067F2309CDEF00643AA5FD4B /* Pods-KRVideoPlayer-KRVideoPlayer-dummy.m in Sources */, ); runOnlyForDeploymentPostprocessing = 0; }; F5362D83DBAC9588930BEBAA /* Sources */ = { isa = PBXSourcesBuildPhase; buildActionMask = 2147483647; files = ( 02480D013C12BAEF0EA2A041 /* Pods-KRVideoPlayer-dummy.m in Sources */, ); runOnlyForDeploymentPostprocessing = 0; }; /* End PBXSourcesBuildPhase section */ /* Begin PBXTargetDependency section */ 05A1154ECA7D340FA7D6D515 /* PBXTargetDependency */ = { isa = PBXTargetDependency; name = "Pods-KRVideoPlayer-KRVideoPlayer-KRVideoPlayer"; target = 62E0FFBC51104C48B20D4F1C /* Pods-KRVideoPlayer-KRVideoPlayer-KRVideoPlayer */; targetProxy = 873436703E9E5786C146826C /* PBXContainerItemProxy */; }; EB92838769F16DBE62838B1B /* PBXTargetDependency */ = { isa = PBXTargetDependency; name = "Pods-KRVideoPlayer-KRVideoPlayer"; target = 5A2D9B2954C0DD27294DCDA9 /* Pods-KRVideoPlayer-KRVideoPlayer */; targetProxy = 480E9A448C13506276843C8C /* PBXContainerItemProxy */; }; /* End PBXTargetDependency section */ /* Begin XCBuildConfiguration section */ 4AFA2612C8E99E881DC63C93 /* Release */ = { isa = XCBuildConfiguration; baseConfigurationReference = 23ADDF228BDF89BB29AE22EC /* Pods-KRVideoPlayer-KRVideoPlayer-Private.xcconfig */; buildSettings = { ENABLE_STRICT_OBJC_MSGSEND = YES; GCC_PREFIX_HEADER = "Target Support Files/Pods-KRVideoPlayer-KRVideoPlayer/Pods-KRVideoPlayer-KRVideoPlayer-prefix.pch"; IPHONEOS_DEPLOYMENT_TARGET = 6.0; MTL_ENABLE_DEBUG_INFO = NO; OTHER_LDFLAGS = ""; OTHER_LIBTOOLFLAGS = ""; PRODUCT_NAME = "$(TARGET_NAME)"; SDKROOT = iphoneos; SKIP_INSTALL = YES; }; name = Release; }; 6549CB64F21ABB6641D5E72B /* Debug */ = { isa = XCBuildConfiguration; baseConfigurationReference = 23ADDF228BDF89BB29AE22EC /* Pods-KRVideoPlayer-KRVideoPlayer-Private.xcconfig */; buildSettings = { ENABLE_STRICT_OBJC_MSGSEND = YES; PRODUCT_NAME = KRVideoPlayer; SDKROOT = iphoneos; SKIP_INSTALL = YES; WRAPPER_EXTENSION = bundle; }; name = Debug; }; 764BA55BD643587AB0795DBE /* Debug */ = { isa = XCBuildConfiguration; baseConfigurationReference = DC23D9D0B91BF2814B883F7B /* Pods-KRVideoPlayer.debug.xcconfig */; buildSettings = { ENABLE_STRICT_OBJC_MSGSEND = YES; IPHONEOS_DEPLOYMENT_TARGET = 6.0; MTL_ENABLE_DEBUG_INFO = YES; OTHER_LDFLAGS = ""; OTHER_LIBTOOLFLAGS = ""; PODS_ROOT = "$(SRCROOT)"; PRODUCT_NAME = "$(TARGET_NAME)"; SDKROOT = iphoneos; SKIP_INSTALL = YES; }; name = Debug; }; A0758B6D36A398A172EFC719 /* Release */ = { isa = XCBuildConfiguration; buildSettings = { ALWAYS_SEARCH_USER_PATHS = NO; CLANG_CXX_LANGUAGE_STANDARD = "gnu++0x"; CLANG_CXX_LIBRARY = "libc++"; CLANG_ENABLE_MODULES = YES; CLANG_ENABLE_OBJC_ARC = YES; CLANG_WARN_BOOL_CONVERSION = YES; CLANG_WARN_CONSTANT_CONVERSION = YES; CLANG_WARN_DIRECT_OBJC_ISA_USAGE = YES; CLANG_WARN_EMPTY_BODY = YES; CLANG_WARN_ENUM_CONVERSION = YES; CLANG_WARN_INT_CONVERSION = YES; CLANG_WARN_OBJC_ROOT_CLASS = YES; CLANG_WARN_UNREACHABLE_CODE = YES; CLANG_WARN__DUPLICATE_METHOD_MATCH = YES; COPY_PHASE_STRIP = YES; ENABLE_NS_ASSERTIONS = NO; GCC_C_LANGUAGE_STANDARD = gnu99; GCC_PREPROCESSOR_DEFINITIONS = "RELEASE=1"; GCC_WARN_64_TO_32_BIT_CONVERSION = YES; GCC_WARN_ABOUT_RETURN_TYPE = YES; GCC_WARN_UNDECLARED_SELECTOR = YES; GCC_WARN_UNINITIALIZED_AUTOS = YES; GCC_WARN_UNUSED_FUNCTION = YES; GCC_WARN_UNUSED_VARIABLE = YES; IPHONEOS_DEPLOYMENT_TARGET = 6.0; STRIP_INSTALLED_PRODUCT = NO; SYMROOT = "${SRCROOT}/../build"; VALIDATE_PRODUCT = YES; }; name = Release; }; C1D8BB19D19D92026D044CA7 /* Release */ = { isa = XCBuildConfiguration; baseConfigurationReference = 750EF5D300B863BAB6182602 /* Pods-KRVideoPlayer.release.xcconfig */; buildSettings = { ENABLE_STRICT_OBJC_MSGSEND = YES; IPHONEOS_DEPLOYMENT_TARGET = 6.0; MTL_ENABLE_DEBUG_INFO = NO; OTHER_LDFLAGS = ""; OTHER_LIBTOOLFLAGS = ""; PODS_ROOT = "$(SRCROOT)"; PRODUCT_NAME = "$(TARGET_NAME)"; SDKROOT = iphoneos; SKIP_INSTALL = YES; }; name = Release; }; CAE39C0B8E3879021E3DBF06 /* Release */ = { isa = XCBuildConfiguration; baseConfigurationReference = 23ADDF228BDF89BB29AE22EC /* Pods-KRVideoPlayer-KRVideoPlayer-Private.xcconfig */; buildSettings = { ENABLE_STRICT_OBJC_MSGSEND = YES; PRODUCT_NAME = KRVideoPlayer; SDKROOT = iphoneos; SKIP_INSTALL = YES; WRAPPER_EXTENSION = bundle; }; name = Release; }; D2347762004107E13CF360F1 /* Debug */ = { isa = XCBuildConfiguration; baseConfigurationReference = 23ADDF228BDF89BB29AE22EC /* Pods-KRVideoPlayer-KRVideoPlayer-Private.xcconfig */; buildSettings = { ENABLE_STRICT_OBJC_MSGSEND = YES; GCC_PREFIX_HEADER = "Target Support Files/Pods-KRVideoPlayer-KRVideoPlayer/Pods-KRVideoPlayer-KRVideoPlayer-prefix.pch"; IPHONEOS_DEPLOYMENT_TARGET = 6.0; MTL_ENABLE_DEBUG_INFO = YES; OTHER_LDFLAGS = ""; OTHER_LIBTOOLFLAGS = ""; PRODUCT_NAME = "$(TARGET_NAME)"; SDKROOT = iphoneos; SKIP_INSTALL = YES; }; name = Debug; }; F49A5983F7DD90795DD285D4 /* Debug */ = { isa = XCBuildConfiguration; buildSettings = { ALWAYS_SEARCH_USER_PATHS = NO; CLANG_CXX_LANGUAGE_STANDARD = "gnu++0x"; CLANG_CXX_LIBRARY = "libc++"; CLANG_ENABLE_MODULES = YES; CLANG_ENABLE_OBJC_ARC = YES; CLANG_WARN_BOOL_CONVERSION = YES; CLANG_WARN_CONSTANT_CONVERSION = YES; CLANG_WARN_DIRECT_OBJC_ISA_USAGE = YES; CLANG_WARN_EMPTY_BODY = YES; CLANG_WARN_ENUM_CONVERSION = YES; CLANG_WARN_INT_CONVERSION = YES; CLANG_WARN_OBJC_ROOT_CLASS = YES; CLANG_WARN_UNREACHABLE_CODE = YES; CLANG_WARN__DUPLICATE_METHOD_MATCH = YES; COPY_PHASE_STRIP = NO; GCC_C_LANGUAGE_STANDARD = gnu99; GCC_DYNAMIC_NO_PIC = NO; GCC_OPTIMIZATION_LEVEL = 0; GCC_PREPROCESSOR_DEFINITIONS = ( "DEBUG=1", "$(inherited)", ); GCC_SYMBOLS_PRIVATE_EXTERN = NO; GCC_WARN_64_TO_32_BIT_CONVERSION = YES; GCC_WARN_ABOUT_RETURN_TYPE = YES; GCC_WARN_UNDECLARED_SELECTOR = YES; GCC_WARN_UNINITIALIZED_AUTOS = YES; GCC_WARN_UNUSED_FUNCTION = YES; GCC_WARN_UNUSED_VARIABLE = YES; IPHONEOS_DEPLOYMENT_TARGET = 6.0; ONLY_ACTIVE_ARCH = YES; STRIP_INSTALLED_PRODUCT = NO; SYMROOT = "${SRCROOT}/../build"; }; name = Debug; }; /* End XCBuildConfiguration section */ /* Begin XCConfigurationList section */ 3C2D862458C88FC96E04EB22 /* Build configuration list for PBXNativeTarget "Pods-KRVideoPlayer-KRVideoPlayer-KRVideoPlayer" */ = { isa = XCConfigurationList; buildConfigurations = ( 6549CB64F21ABB6641D5E72B /* Debug */, CAE39C0B8E3879021E3DBF06 /* Release */, ); defaultConfigurationIsVisible = 0; defaultConfigurationName = Release; }; 53C8FE275774592403B6CA61 /* Build configuration list for PBXProject "Pods" */ = { isa = XCConfigurationList; buildConfigurations = ( F49A5983F7DD90795DD285D4 /* Debug */, A0758B6D36A398A172EFC719 /* Release */, ); defaultConfigurationIsVisible = 0; defaultConfigurationName = Release; }; 61FFD57991AB94C2CCDAF6AD /* Build configuration list for PBXNativeTarget "Pods-KRVideoPlayer-KRVideoPlayer" */ = { isa = XCConfigurationList; buildConfigurations = ( D2347762004107E13CF360F1 /* Debug */, 4AFA2612C8E99E881DC63C93 /* Release */, ); defaultConfigurationIsVisible = 0; defaultConfigurationName = Release; }; 98E2C96B1A295028D2F10B36 /* Build configuration list for PBXNativeTarget "Pods-KRVideoPlayer" */ = { isa = XCConfigurationList; buildConfigurations = ( 764BA55BD643587AB0795DBE /* Debug */, C1D8BB19D19D92026D044CA7 /* Release */, ); defaultConfigurationIsVisible = 0; defaultConfigurationName = Release; }; /* End XCConfigurationList section */ }; rootObject = 1F6A9A65718A4142431AF5D9 /* Project object */; } | Mid | [
0.538904899135446,
23.375,
20
] |
Man pleads guilty in death of monkey at Boise zoo BOISE, Idaho—A man charged with beating a monkey to death with a tree branch at Boise's zoo last fall has pleaded guilty to animal cruelty. Michael Watkins, 22, of Weiser, reached a plea agreement with prosecutors Tuesday for his role in the Nov. 17 death of one of Zoo Boise's two Patas monkeys. Watkins pleaded guilty to one felony count of attempted grand theft and a misdemeanor count of animal cruelty. In return, Ada County prosecutors dropped felony charges of grand theft and burglary. Watkins faces up to seven years in prison for the felony and six months incarceration on the animal cruelty charge. He is scheduled to be sentenced May 16 by 4th District Judge Lynn Norton. Watkins had initially pleaded not guilty. In interviews with police, he said the monkey attacked him as he was trying to set it free after he entered the zoo in the early morning hours. He said he hit the monkey in the head in self-defense. But prosecutors alleged Watkins tried to steal the monkey after a night of heavy drinking. During earlier court hearings, prosecutors said Watkins manipulated a lock to get into the primate enclosure and removed the monkey by wrapping it in a jacket. The monkey's death stirred shock and outrage, but it also caused concern among zoo officials about the welfare of the surviving monkey. Patas monkeys are extremely social and the prospect of having it live alone led zoo officials to consider shipping it to another zoo. Advertisement Instead, the Rosamund Gifford Zoo in Syracuse, N.Y., donated two companions in December. | Low | [
0.5295238095238091,
34.75,
30.875
] |
Photoinduced nucleation of water vapor. Strong photoinduced nucleation of pure water vapor was found to occur in a wavelength range where no ultraviolet absorption of water vapor has been reported. Systematic studies were made of the dependence of the nucleation rate and the delay time for the initiation of nucleation on light intensity. The results obtained were accurately fitted by a phenomenological mechanism whereby the nucleation is initiated by clusters accumulating an appropriate number of photoexcited water molecules. | High | [
0.7045123726346431,
30.25,
12.6875
] |
Q: mod_rewrite for a 301 redirect. Not redirecting to proper location I'm trying to use a RewriteRule (using ISAPI, NOT on an Apache server) to 301 redirect a url such as: http://www.mydomain.com/news/story-title/ to http://www.mydomain.com/news/detail/story-title/ What I've gotten so far is: RewriteRule ^news/(?!detail)/?$ news/detail/$1/ [L,R=301] which successfully ignores urls that already have the "detail" in them (in some of my first attempts I ended up with a loop and a url like "/news/detail/detail/detail..."), but visiting /news/story-title/ gives me a 404 so it's not redirecting to the proper location. A: Change your rewrite rule to RewriteRule ^news/(?!detail)([^/]+)/?$ news/detail/$1/ [L,R=301] EDIT : (How it works?) /(?!detail) is a negative lookahead but it's also non-capturing i.e. it matches / but not what comes after it; just makes sure that it isn't "detail". So, I added a capturing group ([^/]+) to capure those characters (one or more + of anything that's not a/) optionally ending with a /. Hence, the $1 now gets replaced with the matched directory name. | High | [
0.679817905918057,
28,
13.1875
] |
Clinical efficacy of transluminal extraction coronary atherectomy. Mechanical revascularization has revolutionized the treatment of coronary artery disease. The transluminal extraction-endarterectomy catheter (TEC) system was developed recently and permits the excision and extraction of atherosclerotic lesions of the coronary artery and the bypass graft. The system includes a motor-driven flexible torque catheter with rotating conical shaped stainless steel blades distally. The proximal end of the TEC system consists of a mechanical housing which controls the vacuum, the rotating cutter (750 RPM) and the cutter excursion (4 cm). After safety testing of the TEC system in dogs and human peripheral arterial disease, percutaneous transluminal coronary atherectomies employing the TEC have been performed in 25 patients (six women, 19 men, mean age, 64 +/- 12 years) with the diameter of the stenosis greater than or equal to 75% in one or more coronary arteries. Twenty-eight atherosclerotic lesions were treated in 26 native coronary arteries. The overall success rate (less than 50% residual stenosis in all lesions) was 92%. There was one instance of hematoma proximal to the excised target lesion, and one instance of atherectomized debris embolization. There were no instances of dissection, perforation, coronary spasms or death related to the procedure. The results indicate that the TEC system can be used safely and effectively to treat coronary artery disease with a high success rate. | Mid | [
0.6443298969072161,
31.25,
17.25
] |
By Vivienne Parry Radio 4's Inside the Ethics Committee Catherine could not make her own red blood cells Catherine is a little girl condemned by genetic disease to a gruelling regime of treatment. She could be released from it by a sibling, but the sibling is not yet conceived. And can one child's health ever be put at risk to save another's? When Catherine, the first child of Charles and Clara, was born in 2001, she seemed healthy - but not for long. "She was very listless and would fall asleep in the middle of a feed," said her mother. "When she was 11 weeks old, she was pretty much pure white, you couldn't even see her lips. We took her into A&E." Tests revealed that Catherine had virtually no red blood cells. She was eventually diagnosed with Diamond Blackfan Anaemia (DBA), a genetic disease in which few if any red blood cells are produced by the bone marrow, producing anaemia. DBA can be treated with day long monthly transfusions. However, every transfusion adds iron to the body which will cause irreversible organ damage unless removed. Removal involves giving a drug given as a continuous transfusion through a needle, all through the night, five nights a week. "Catherine hated it, screaming 'I don't want it, I don't want it'," said Clara. "She got used to it, but often said: 'Why can't I be normal'." Risk of early death DBA carries a one in four chance of early death because of organ damage and an increased risk of childhood cancer. "Once we saw what her quality of life was and the problems that she might have in the future, we started saying is there something else we can do?", said Clara. A bone marrow transplant was the only option. One from an unrelated donor carried up to a 30% risk of death for Catherine, one from a related donor a 5% risk. Charles and Clare had intended having another baby anyway and hoped that a baby brother or sister would be a tissue match. With each pregnancy there is the same one in four chance of a match. But it is possible to use a technique normally used in pre-implantation genetic diagnosis (PGD), in which a cell from the three-day-old embryo is taken to screen out serious genetic disease, for tissue typing, to guarantee that a sibling is a tissue match, before being replaced. The uncertainty of IVF gives a one in 10 chance of successful pregnancy with such a match. Spontaneous mutation There was however a major problem: DBA can be inherited or arise as a spontaneous mutation. Which sort did Catherine have? This is not preventing harm to a child, this is creating a sibling for someone else - is that sufficient moral reason to go ahead? Deborah Bowman Kings College Hospital There was no family history of the condition. Tests on Catherine showed she didn't have any of the known mutations that cause DBA, but there are some as yet uknown. It meant that no-one could test whether another baby had the condition or not. Not being able to rule out DBA was a major ethical issue. So Clara and Charles decided to have a baby naturally. But the new baby wasn't a match. By this time, Catherine was three and the couple were acutely aware that her condition was deteriorating. She had to have a transplant before she became too sick to survive the procedure. They decided to go for tissue typing. To do this they needed to have a licence from the Human Fertilisation and Embryology Authority. But at the time, the HFEA only allowed PGD to be used for tissue typing where a disease could be screened out. This was not possible in Catherine's case. So the couple went to the US, where it was permitted. But two attempts failed. They were psyching themselves up for a third attempt, when they read about a UK couple in the same situation as themselves, who had been given a licence by the HFEA following a judicial review. They decided to try for a 'saviour sibling' using PGD. Devastating blow The procedure of taking stem cells for a bone marrow transplant would not harm Catherine's sibling, because they could be obtained from cord blood at birth. When baby sister, McKenzie was born, not enough stem cells could be collected for a transplant. It was a devastating blow - but at least she was free from DBA. "Every picture I took of them together had added meaning because Catherine was looking at her lifeline," said Clara. A much more invasive collection of bone marrow from McKenzie involving 90 minutes of general anaesthesia was now required. There is no benefit to the donor, and McKenzie was not able to provide consent. The chances of success for Catherine were getting less as time went on, but the younger McKenzie was, the greater the risks of anaesthesia for her. Competing interests Here the ethical issues are the competing 'best interests' of the sisters. There is also the issue that the donation will only cure Catherine's symptoms, not rid her of the condition. There is a good chance it could fail. How would McKenzie feel later knowing that her donation failed to save her sister? And should Catherine's kidneys fail, then once again, McKenzie would be the first choice of donor. The Clinical Ethics Committee decided that the bone marrow transplant should go ahead. It took place 18 months ago. It was a success and Catherine continues to do well. The case will be discussed on Inside the Ethics Committee will be broadcast on Wednedsay 6 August at 2000 BST on BBC Radio 4, and for seven days on BBC iPlayer Your Comments: As a mum, I feel for the couple. I would chop my own legs off for my daughter if it came to saving her life. However, I don't think "saviour siblings" are ethical or fair on the child being born to "save" the other. They have no say in what is done to their body for someone else's benefit. Why should a healthy baby have to go through that? At what point do they get the right to say no? Karen Reekie, London, UK It's disgusting that anyone can be forced to be a donor of any part of their body without their consent. If I found out that my parents had used me in that way I would be full of loathing for them. The "saviour sibling" is being put at risk, for no benefit to themselves, before they can even understand what's going on. Babies are people, not raw materials. Gabriel, Leicester, UK If I had a child with Diamond Blackfan Aneamia,or any other fatal childhood illness, I would try everything to cure him or her and I'm confident it'd be the same with any parent. Realistically if someone told you there was a cure for your dying child you'd take it, regardless of the sketchy ethics involved. In regards to the point that this will not "cure" Catherine it is important to note that the symptoms themselves are incredibly dangerous. It is like arguing against Chemotherapy which doesn't cure cancer, but instead treats the symptoms. Ryan Mclean, Leeds, UK As a bone marrow donor myself, I find this dilemma interesting and heartbreaking at the same time. I cannot imagine the impossible situation these parents found themselves in. However, I do find it hard to accept that it is moral to "produce" a child to order, to save another, reducing its status to that of a laboratory animal. The risks to the donor child are great, and there is the chance of losing both of them. If a donation goes ahead and fails, the parents are left with trying to love the donor child without allowing the failure to cloud their feelings. I wish the whole family continued good health and hope other cases are small in number. Julie Fenwick, Gateshead, UK Faced with the same situation, I would have pursued the same course of action. Mckenzie would never feel bad if things turned out differently to expectaions. It is better to know that you saved your sister from certain death, or at least tried to do something for her. Ethics are there but they do not always put things into pespective. Jessica m Thole, Lusaka, Zambia This is a really difficult matter. I do not honestly know how I would decide. Yet I know that as long as one believes in the individual and his or her rights, it cannot be right to have another child only to save the first one. The difficulty arises in the fact that this is never the only reason. If Catherine is doing well, if the treatment was a success, then the justification for the procedure is there - but too late! If the sibling is willing to help (and able to understand this), then there is no problem. But the parents must realise that the sibling is not just a source of aid. D. Fear, Heidelberg, Germany E-mail this to a friend Printable version Bookmark with: Delicious Digg reddit Facebook StumbleUpon What are these? | Mid | [
0.575238095238095,
37.75,
27.875
] |
Follow Laura’s Progress Laura Hutson Education Georgia Southern University is the fourth-largest public university in the state of Georgia and the largest and most comprehensive center of higher education south of Atlanta. A public Carnegie Doctoral/Research institution founded in 1906, the Univ... On May 6 and 7, Georgia Southern University held its annual spring commencement ceremonies for graduate and undergraduate students at Hanner Fieldhouse and Allen E. Paulson Stadium. Interim University President Jean E. Bartels, Ph.D., R.N., conferred more than 3,300 doctoral, master's, specialist and bachelor's degrees from the University's eight colleges during two separate ceremonies. Georgia Southern University recently recognized nearly 2,600 students for excellence in academics on the 2016 Spring Semester Dean's List. To be eligible for the Dean's List, a student must have at least a 3.5 grade point average and carry a minimum of 12 hours for the semester. Colleges across the country are recognizing students from Mary Persons High School for their on-campus success. Click any achievement to discover alumni from Mary Persons High School, view their personalized Merit pages, and learn about what they are a... | Mid | [
0.5409252669039141,
38,
32.25
] |
What Overseas Removals Is – and What it Is Not Removals are sometimes a difficult thing for adults, therefore for kids, they’re definitely very tricky to manage. In the long term, overseas removals may be an exciting time provided that you just take the chance to organize them correctly. Your home removal doesn’t need to be a tension-filled event. Your move is going to be cared for by our specialist team, helping you to plan for your life from the uk. Planning a worldwide relocation is a lengthy, arduous process that requires an immense quantity of organization nicely beforehand. Excess International Movers is among the largest international moving companies in the uk after 30 years inside the business. They can take you wherever on the planet anytime you want for. Details of Overseas Removals The simplest approach to acquiring accurate and in-depth quotes for foreign removals is to enter the particulars of your planned move on the site by clicking the Get Quotes button. Taking out insurance to your possessions is surely an option you should think about. It’s probable you will nevertheless need to take out insurance. Remember your overall shipping quote typically doesn’t consist of insurance, inspection expenditures, and storage of your belongings when you move to your nation. The expense of insurance depends on several unique factors, including the essence of the items that you’re sending, the manner of transportation, and the destination they’ll be shipped to. Regardless of our outstanding reputation and proficient company, our rates are really fair. Rather, if you would rather pack matters yourself we can provide all you have to do the job. It is vital for you to submit all suitable immigration paperwork with your new residence country before you even employ a mover. It’s vitally important to explore your requirements entirely with your removal company so you will be aware of how much you will invest, what things to expect after your possessions have come and what paperwork you will need to finish to make sure you collect all your items easily. While going into a different continent may be a stressful experience, we’ll make certain at Britannia that your birth is smooth and trouble-free. Moving to another country might be a bureaucratic nightmare in case you don’t understand what is expected of you once you get there. Overseas moves need significant and sensible planning to execute smoothly. Moving to the other side of Earth isn’t likely to be cheap. At the start, an overseas elimination specialist would realize your residence and create a record of each of the furnishings and home products which must be moved. Crown’s highly trained consultants will visit your house and go over your own private circumstance. You are going to have dedicated Moving Consultant who will encourage you every step of the way. Our international removals advisers have the proven capacity to manage relocations from start to finish and are in a position to deal with any questions, concerns or requirements throughout the whole process. The chance to find as much as possible in regards to the removal company that’s facilitating the move of your residence or office is until you truly do the moving, not while you’re moving or following the move. The more you look in the removal provider that you are considering, the greater your odds are of being fully met with the move you are thinking about. The Removals firm you opt to move your possessions is critical. There are many companies on the market. You are also able to receive a business that’s careless in regards to moving your things or doesn’t possess the suitable manpower for the job or the most appropriate van. Many foreign removals companies provide insurance as an add-on. But it’s also feasible to obtain it from third parties and also to use something known as a marine insurance policy broker. Contemplating the issues that may come up, locating a trusted and dependable removals firm to conduct the move ought to be the first priority. Life, Death, and Overseas Removals If you’re moving house, we’d love to offer an assist. When it is to a brand new house, city or state, we understand how stressful and hard moving could be. The public who want to transfer from the nation oftentimes calls for plenty of bears. Foreign Moving is here to assist. Read With a comprehension of the moving procedure can offer decent help by means of your move planning, especially when moving overseas. Because of this, you can utilize the assistance of any firm that would have the ability to satisfy your requirements. Instead, you can elect for our packaging services. You are in a position to benefit from part loading services to conserve money or total load for quicker service. | Mid | [
0.56,
33.25,
26.125
] |
Q: Syntax error near unexpected token « done » error m2tsac3.sh: ligne9: Syntax error near unexpected token « done » m2tsac3.sh: ligne9: ` done' script #!/bin/bash find . -name "*.m2ts" | while read line do name="$(basename "${line}" .m2ts)" echo "${name}" ffmpeg -i "${name}".m2ts -map 0:1 -acodec ac3 "${name}".ac3 done hello i have an syntax error the script is to extract audio from m2ts file to AC3 for all the m2ts file from folder thank you in advance A: ffmpeg reads from standard input, consuming the rest of the input from find. Redirect its standard input from /dev/null: find . -name "*.m2ts" | while read line do name="$(basename "${line}" .m2ts)" echo "${name}" ffmpeg -i "${name}".m2ts -map 0:1 -acodec ac3 "${name}".ac3 < /dev/null done | Mid | [
0.6288659793814431,
30.5,
18
] |
2019 point guard Tyger Campbell, a five-star player, has committed to DePaul! 5-star PG Tyger Campbell commits to DePaul, reclassifies to 2018, he tells Scout | Story: https://t.co/b2uJ3LOGis pic.twitter.com/hY0QamAAxk — Evan Daniels (@EvanDaniels) May 9, 2017 Yup, you read that right. Campbell, who currently attends La Lumiere School in La Porte, Indiana will be reclassifying to the Class of 2018 as the aforementioned tweet by Scout.com’s Evan Daniels states. Thus, the DePaul Blue Demons will have themselves an uber-talented floor general stepping onto the floor for them next fall. This is a bit of a big maneuver for DePaul as Tyger Campbell is their first five-star player in a decade. Power forward Mac Koshwal, a Chicago native, was the last blue-chipper for the Blue Demons back in 2007 and the only other one since 247Sports began keeping record back in the year 2000. His Crystal Ball was 100 percent in favor of the Michigan State Spartans. His last recorded contact with them was back on January 29 according to 247Sports, as he took an unofficial visit on that day. Since then, he’d been offered by the Marquette Golden Eagles, and visited DePaul’s campus twice including this past Friday. Three days later, Tyger decided to make an early commitment. For now, as far as his 2019 standing, he’s the second best player in his class behind Fort Wayne’s Keion Brooks. He’s the sixth-best player at his position and the 25th-best player in the nation. But, again, that will soon change after his reclassification goes through. That’s what’cha call a power move. Congrats to Tyger Campbell and best of luck to him with DePaul! | High | [
0.675862068965517,
36.75,
17.625
] |
Impact of weight loss between pregnancies on recurrent preterm birth. Low maternal pre-pregnancy body-mass index (BMI) has been associated with preterm birth (PTB). Women delivering preterm are at increased for recurrent PTB. Our goal was to determine whether change in BMI between pregnancies alters the risk of PTB. From our electronic perinatal database, we identified women who delivered consecutive pregnancies at our institution. Women were grouped by prepregnancy BMI category (underweight: <18.5, normal: 18.5-24.9, overweight: 25-29.9, obese: >30 kg/m2). They were then grouped based on change in actual BMI ("increase": >5 kg/m2, "stable": within 5 kg/m2, "decrease": >5 kg/m2) and change in BMI category between pregnancies. The risk of PTB was correlated to change in BMI. P < .05 was considered significant. One thousand two hundred forty-one women met inclusion criteria. Women with a PTB in their first pregnancy had more PTB in their second than those with a term birth in their first pregnancy (33.6% vs 8.0%, P < .001). Women whose BMI decreased more than 5 kg/m2 had more frequent PTB in the second pregnancy than those who did not (21.1% vs 9.3%, P = .01). For those with a term birth in the first pregnancy, PTB in the second did not increase with declining BMI. However, for women with a PTB in the first pregnancy, PTB was more frequent in the second if their BMI decreased a BMI category (53.8% vs 27.6%, P = .05) or if BMI decreased more than 5 kg/m2 (80.0% vs 28.2%, P = .01). Women whose BMI declines between pregnancies are at increased risk for PTB, particularly if they delivered a prior preterm gestation. | High | [
0.697247706422018,
33.25,
14.4375
] |
Publican Donal and son Damien Crowley survey the damage to their beer garden in Bandon, Co Cork. Photo: Daragh McSweeney Taoiseach Enda Kenny speaking to media in Athlone during the flooding Taoiseach Enda Kenny chats with Cllr Tom Farrell Mayor of Athlone in Carrickobreen during the flooding Taoiseach Enda Kenny chats with Cllr Tom Farrell Mayor of Athlone in Carrickobreen during the flooding Taoiseach Enda Kenny chats with Cllr Tom Farrell Mayor of Athlone in Carrickobreen during the flooding Taoiseach Enda Kenny speaking to media in Athlone during the flooding Taoiseach Enda Kenny speaking to media in Athlone during the flooding ENDA Kenny has visited some of the areas worst hit by Storm Frank as the clean-up continues. “To see first-hand the scale of the flooding throughout the country … clearly the countryside is saturated, there are thousands of location affected”, he told reporters. Expand Expand Expand Expand Expand Previous Next Close Floodwaters burst through the doors of buildings in Graiguenamanagh, Co Kilkenny Ninety five year old Billy Ashe and his daughter Annette with their pet Teddy Licious being rescued by the Civil Defence during the floods in Inistiogue Co Kilkenny. Photo: Pat Moore Pat Moore The River Nore in flood at Inistioge Co. Kilkenny. Photo: Dylan Vaughan Dylan Vaughan Taoiseach Enda Kenny as he tours the area of Carrick-On-Shannon following flooding Debris from the beach in Garretstown, Co Cork. Pic Daragh Mc Sweeney/Provision / Facebook Twitter Email Whatsapp Floodwaters burst through the doors of buildings in Graiguenamanagh, Co Kilkenny “There are significant problems in some urban areas, and there are problems in a number rural areas throughout the country where people are isolated. “It is only right to pay tribute to the volunteers or organisations throughout the country, they're fighting heroic battles every day to keep the water at bay. He said he is expecting reports from local authorities on how to ensure rural isolated areas do not become cut off in future weather events. The Taoiseach was visiting areas of the countryside with Junior Minister Simon Harris, Minister Heather Humphries and Environment Minister Alan Kelly. Expand Expand Expand Expand Expand Expand Previous Next Close A member of the fire service takes a short break as flooding continues in Bandon, Co. Cork, following storm Frank. Photo: Brian Lawless/PA Wire PA Anita Mundow at her mother Ann Connolly’s flooded home at Ballinastague near Kinvara, Co Galway. Photo: Andrew Downes Andrew Downes A person wades through flood water in Straiton, Scotland, as Storm Frank begins to batter the UK on its way towards flood-hit areas. Photo: PA PA Storm Frank damaged the roof of an apartment block in Clondalkin Credit: Twitter/Dublin Fire Brigade Members of the fire service work as flooding continues in Bandon, Co Cork, following Storm Frank Flooding Crookstown N22 Macroom: Tom Creedon Park under water after severe rainfall on Tuesday night after Storm Frank unleashed his power over the country John Delea. / Facebook Twitter Email Whatsapp A member of the fire service takes a short break as flooding continues in Bandon, Co. Cork, following storm Frank. Photo: Brian Lawless/PA Wire The bad weather is set to continue Met Eireann has warned - with heavy rainfall over the next three weeks set to add to the flooding and heartache affecting thousands of homeowners across the country. Flood defences and emergency personnel will be pushed to breaking point as the country braces itself for another onslaught. The aftermath of Storm Frank has left communities around the country without power, with many submerged in flood water and braced for worse to come. Read More This morning, there are approximately 3,000 premises without power - and some of these are likely to remain without power for a number of days due to flood waters and difficulties accessing the premises. Among the worst affected areas are Macroom and Fermoy, Brittas Bay and Arklow. Met Éireann has a Status Yellow wind warning in operation this morning and warned of severe winds and gusts of up to 110km/h. That warning will continue until 2pm this afternoon. The warning is in place for Wexford, Donegal, Galway, Leitrim, Mayo, Sligo, Clare, Cork, Kerry and Waterford for several hours. Gales are expected to hit 50 and 65 km/h and gust up to 95 or 110 km/h at times. Thundery showers are also expected to hit many areas today with more heavy rains expected tomorrow and into Saturday. Experts said that, even after the rain does eventually ease, river levels will continue to rise for some time. Rescue crews are said to be at the point of exhaustion as they continue to battle the elements and try to save homes and businesses. Read more: "There is no real sign of an end to this wet, unsettled and windy weather," said Gerald Fleming of Met Éireann. He added that the unsettled conditions will last well into the middle of next week, "and beyond". This would mean that flooding is likely to continue for weeks into January. Emergency services said it was a miracle that nobody had been killed amid the devastation wreaked by the storm over the past few days. The west coast felt the brunt of Storm Frank, but the east also fared badly - with transport across Enniscorthy, Co Wexford, only possible by boat. The River Barrow and the Duiske stream burst their banks in Graiguenamanagh, Co Kilkenny. In Cork, the Defence Forces were deployed in Midleton to evacuate a housing estate, and Bandon suffered its second serious flood in less than a month. Water levels in the Shannon catchment area have risen again - with the river at Shannon now more than 10cm above its December 16 peak. Several Coalition ministers visited flood-hit areas yesterday but the Government has been on the back foot over the failure of Taoiseach Enda Kenny to make any public appearance. Read More After days of pressure, Mr Kenny is finally set to visit areas devastated by the floods - with indications that he will visit areas affected in the midlands later today. Meanwhile, the Tanaiste Joan Burton is set to visit people hit by the flooding in Kilkenny. In terms of power outages, some of the worst affected areas were across the south and into the east of the country from Bandon and Macroom in Cork up to Enniscorthy in Wexford and on to Arklow in Wicklow. "We can't restore power to a flooded premises," an esb networks spokeswoman said. A large fault struck Fermoy, Co Cork, in the morning leaving about 1,200 people with no power. ESB Networks said that after a series of winter storms swept in, over the last week its crews have restored supplies to 130,000 customers since December 27. The National Coordination Group continues to meet in Dublin to oversee the work of several government departments and agencies, including emergency response and forecasting Scores of roads are closed or affected by floods around the country with motorists urged to use AA Roadwatch for updates and for planning their journeys. Updates Parts of Cork remain on high alert for flooding as water levels remain exceptionally high on the rivers Lee, Blackwater, Funcheon, Bandon and Bridewell. A massive clean up operation is now underway in the flood hit towns of Middleton, Bandon, and Glanmire. Middleton trader Declan O'Connell stressed that the town needs help to recover from the worst floods in over thirty years. "There have been about four floods here in my time operating Lee Travel, but this is the worst that I have ever seen. We have lost virtually everything in the shop", he told Independent.ie. Clare County Council says that water levels on the Lower River Shannon at Springfield, Clonlara, reached the November 2009 peak level during Wednesday afternoon but have since receded by approximately 100mm (10cm). The Council has received confirmation from the ESB of its decision to maintain the spill rate at Parteen Weir at 440 cubic metres per second (cumecs) during today The Council says it is monitoring water levels at Springfield having regard to any potential increase in the spill rate at Parteen Weir and flood levels on the Mulkear River, which enters the River Shannon south of Annacotty. Meanwhile at Ballycoree Bridge, Ballyalla, Ennis, the River Fergus has recorded its third highest flow rate on record. The flow rate on Thursday morning was 66.8 cumecs, which compares to 68.2 cumecs on December 13th 2015 and 79.9 cumecs in November 2009. The Council is continuing to monitor water levels countywide. Limerick City and County Council says water levels on the Lower River Shannon at Castleconnell and Montpelier maintained the same levels overnight. Council staff are continuing pumping operations in Castleconnell and Montpelier while flood defences are being maintained in flood prone locations along the river. The Council is also monitoring water levels on the Mulkear River, which enters the River Shannon downstream of Annacotty. Online Editors | Low | [
0.5021929824561401,
28.625,
28.375
] |
TEXAS COURT OF APPEALS, THIRD DISTRICT, AT AUSTIN NO. 03-04-00078-CR Donald Ray Gunn, Appellant v. The State of Texas, Appellee FROM THE COUNTY COURT AT LAW NO. 2 OF WILLIAMSON COUNTY NO. 02-3485-2, HONORABLE TIMOTHY L. WRIGHT, JUDGE PRESIDING MEMORANDUM OPINION At his bench trial for driving while intoxicated, appellant Donald Ray Gunn objected to any testimony regarding his appearance and conduct after being stopped by the police, including the results of his intoxilyzer test, on the ground that the evidence was the fruit of an unlawful detention. The objection was overruled, and appellant was adjudged guilty and sentenced to 180 days in jail and a $2000 fine, probated. The sole issue on appeal is whether the stop violated the Fourth Amendment and article I, section 9. U.S. Const. amend. IV; Tex. Const. art. I, § 9.1 We find that the stop was lawful and affirm the conviction. On the night in question, appellant had an altercation with the cashier and manager of a Round Rock fast-food restaurant. Appellant, who smelled of alcoholic beverage and appeared 1 Appellant does not argue that the state constitution affords him greater protection under the circumstances than does the federal constitution. to be intoxicated, insisted that he had been short-changed by the cashier. The manager took appellant to her office, counted the change drawer, and explained to him that there was no discrepancy. Appellant stormed out of the restaurant and drove away after making several threatening gestures toward the manager. The manager called the police and reported what had happened. She gave the dispatcher appellant’s physical description and the description and license plate number of the pickup truck he was driving. Three police officers in separate units were in the area and responded to the reported disturbance. Meanwhile, appellant returned to the restaurant, drove around it twice, then stopped and began to pound on the drive-through service window. The manager made another call to the police, and this information was also dispatched to the officers. Officer Jeff Eckard was the first officer to arrive at the restaurant. He saw appellant’s pickup pulling away from the service window and recognized that both the truck and the driver fit the description he had been given by the dispatcher. He also saw a person, later identified as the manager, wearing what appeared to be a restaurant uniform. She was waiving frantically and pointing at the departing truck, which was the only vehicle in the driveway. Eckard drove up to the rear of appellant’s truck as it waited at a red light and initiated the stop. We must decide if, under the circumstances, Officer Eckard had a reasonable basis for suspecting that appellant was or had been engaged in criminal activity. See Terry v. Ohio, 392 U.S. 1, 30 (1968) (grounds for temporary investigative detention); Davis v. State, 829 S.W.2d 218, 221 (Tex. Crim. App. 1992) (same); and see Guzman v. State, 955 S.W.2d 85, 89 (Tex. Crim. App. 1997) (standard of review). Appellant argues that he did not, citing the officer’s testimony that he 2 stopped appellant “based on what my observations of something may have gone on inside the restaurant.” We agree with the State that this one sentence taken out of context does not accurately reflect the facts and circumstances known to the officer. Officer Eckard knew that a disturbance had been reported at the restaurant involving a man who appeared to be intoxicated. He had a description of the man and of the vehicle he was driving, and he knew that the man had returned to the restaurant and initiated a second disturbance at the service window. When the officer arrived at the restaurant moments after receiving the second report, he saw a pickup truck driving away from the window. This truck and its driver, appellant, matched the descriptions he had been given. An obviously excited woman who appeared to be a restaurant employee was waiving at the officer and pointing at the departing pickup truck. We hold that these facts reasonably warranted appellant’s detention for further investigation. The evidence supporting appellant’s conviction for driving while intoxicated was not the fruit of an unlawful detention. The judgment of conviction is affirmed. __________________________________________ Jan P. Patterson, Justice Before Chief Justice Law, Justices Patterson and Puryear Affirmed Filed: July 6, 2005 Do Not Publish 3 | Mid | [
0.5994962216624681,
29.75,
19.875
] |
1. Field of the Invention The present invention relates generally to computer network search engines, and more particularly to search engines for performing online monitoring activities. 2. Related Art Over the past several years, there has been an explosion of computers, and thus people, connected to the global Internet and the World-Wide Web (WWW). This increase of connectivity has allowed computer users to access various types of information, disseminate information, and be exposed to electronic commerce activities, all with a great degree of freedom. Electronic commerce includes large corporations, small businesses, individual entrepreneurs, organizations, and the like who offer their information, products, and/or services to people all over the world via the Internet. The rise in the usage of the Internet, however, has also had a negative side. Given the Internet""s vastness and freedom, many unscrupulous individuals have taken the opportunity to profit by violating the intellectual property of others. For example, it has been estimated that billions of dollars in profits are lost each year due to piracy of copyrighted materials over the Internet. These lost profits result from unscrupulous individuals making available through the Internet, either free or for their own profit, copyrighted materials such as music, movies, magazines, software, and pictures. Also, an individual, a company, an organization, or the like may be concerned with other intellectual property violations such as the illegal sale of their products, or the sale of inferior products using their brand namesxe2x80x94that is, patent and trademark infringements. Furthermore, an individual, a company, an organization, or the like may be concerned with false information (i.e., xe2x80x9crumorsxe2x80x9d) that originate and spread quickly over the Internet, resulting in the disparagement of the individual, company, organization, or the like. Such entities may also be interested in gathering data about how they and their products and/or services are perceived on the Internet (i.e., a form of market research). Individual artists, writers, and other owners of intellectual property are currently forced to search Internet Web sites, File Transfer Protocol (FTP) sites, chat rooms, etc. by visiting over thousands of sites in order to detect piracy or disparagement at offending sites. Such searching is currently done either by hand or using commercial search engines. Each of these methods is costly because a great amount of time is required to do such searchingxe2x80x94time that detracts from positive, profit-earning activities. Adding to the frustration of detecting infringements is the fact that commercial search engines are infrequently updated and typically limit the resulting number of sites (xe2x80x9chitsxe2x80x9d) that a search request returns. Furthermore, the task of visiting each site to determine whether there is indeed an infringement or disparagement and if so, the extent and character of it, also demands a great deal of time. Therefore, in view of the above, what is needed is a system, method and computer program product for an online (i.e., Internet or intranet) monitoring search engine. Such online monitoring would enhance the ability of intellectual property owners and business owners to detect and prioritize their response to infringements and disparagements. Further, what is needed is a system, method and computer program product that searches the Internet""s Web pages, FTP sites, FSP sites, Usenet newsgroups, chat rooms, etc. for data relevant to the intellectual property and goodwill owned by an entity and produces a detailed, customized report of offending sites. The present invention is a system, method and computer program product for an online monitoring search engine that satisfies the above-stated needs. The method involves receiving search criteria from a user, where the search criteria reflects the user""s intellectual property infringement or disparagement concerns. Then a search of the Internet (or intranet) is done for uniform resource locators (URL""s) (i.e., addresses) that specify sites which contain contents matching the search criteria. After a list of URL""s containing probable infringements or disparagement is obtained, the pages of each URL are downloaded, archived, and scored. The method also obtains contact information for each registrant of the offending URL""S. The method then produces a report listing the offending URL""s and the score for each of the URL""s. The report may then be utilized by the user to plan intellectual property infringement or disparagement enforcement activities. In a preferred embodiment of the present invention, before generating a report, the pages are also grouped into xe2x80x9cactual sitesxe2x80x9d to reduce the magnitude of information contained in the report. The method may also list the highest scoring page for each of the actual sites, as well as the highest ranking actual site. The online monitoring system of the present invention includes a Web server for receiving search criteria, search setup, and management inputs from users, an intellectual property infringement server (IPIS) for searching the Internet (or any computer network) for URL""s that contain contents matching the search criteria to thereby compile a list of offending URL""s. The system also includes a file system for storing pages from each of the offending URL""s and a relational database for allowing the IPIS to perform queries of the pages in order to produce a report. In a preferred embodiment, the system also includes a plurality of Web clients that provide a graphical user interface (GUI) for users to enter their search criteria, as well as view pages of the offending URL""s by communicating with the Web server. One advantage of the present invention is that intellectual property owners may quickly and efficiently search and find infringements and disparagements contained on Web, FTP, and FSP sites, as well as chat rooms and Usenet newsgroups within the Internet. Another advantage of the present invention is that detailed and customizable reports listing offending sites and associated metrics are produced allowing intellectual property owners to focus their enforcement activities. Another advantage of the present invention is that its back-end (search engine) and front-end (user interface) are designed to operate independently of each other, thus allowing greater throughput and availability of the system as a whole. Yet another advantage of the present invention is that lists of probable offending URL""s may be grouped and prioritized, both in an automated and manual fashion, in order to arrive at a manageable set of data to focus intellectual property enforcement activities. Further features and advantages of the invention as well as the structure and operation of various embodiments of the present invention are described in detail below with reference to the accompanying drawings. | Mid | [
0.605150214592274,
35.25,
23
] |
Year-Round School May Be Coming to Kalamazoo Sooner Than You Think Summer vacation may soon be a thing of the past as two Kalamazoo schools are back in session as a pilot program for year-round classes. Known for the scholarships of the Kalamazoo Promise, our city has leaned progressive when it comes to education and now, the shift may be on to year-round classes in Kalamazoo. Washington Writers Academy and Woodward School for Technology cut short Summer break and returned to the classroom on July 23. This pilot program is designed to include the same number of school days each year, but with more frequent but shorter breaks than the long Summer stretch. Kalamazoo Public Schools Superintendent Michael Rice told NewsChannel 3 Their breaks are spaced more evenly throughout the year, so we anticipate that they’re going to be a little fresher at the end of the year. We think both students and staff will be fresher at the end of the year. -KPS Superintendent Michael Rice As you might guess, discussion on Facebook was divided with some arguing for more family time during the Summer and others touting free meals and a place to be as important reasons for sending kids back to school. For now, these 2 Kalamazoo Public Schools are back in session and, if all goes well, more could make the switch to the year-round model and Summer vacation might be something you tell your grandkids about someday. | Mid | [
0.627634660421545,
33.5,
19.875
] |
<?php /** * Zend Framework * * LICENSE * * This source file is subject to the new BSD license that is bundled * with this package in the file LICENSE.txt. * It is also available through the world-wide-web at this URL: * http://framework.zend.com/license/new-bsd * If you did not receive a copy of the license and are unable to * obtain it through the world-wide-web, please send an email * to [email protected] so we can send you a copy immediately. * * @category Zend * @package Zend_Gdata * @subpackage Analytics * @copyright Copyright (c) 2005-2015 Zend Technologies USA Inc. (http://www.zend.com) * @license http://framework.zend.com/license/new-bsd New BSD License * @version $Id$ */ /** * @see Zend_Gdata_Query */ require_once 'Zend/Gdata/Query.php'; /** * @category Zend * @package Zend_Gdata * @subpackage Analytics */ class Zend_Gdata_Analytics_AccountQuery extends Zend_Gdata_Query { const ANALYTICS_FEED_URI = 'https://www.googleapis.com/analytics/v2.4/management/accounts'; /** * The default URI used for feeds. */ protected $_defaultFeedUri = self::ANALYTICS_FEED_URI; /** * @var string */ protected $_accountId = '~all'; /** * @var string */ protected $_webpropertyId = '~all'; /** * @var string */ protected $_profileId = '~all'; /** * @var bool */ protected $_webproperties = false; /** * @var bool */ protected $_profiles = false; /** * @var bool */ protected $_goals = false; /** * @param string $accountId * @return Zend_Gdata_Analytics_AccountQuery */ public function setAccountId($accountId) { $this->_accountId = $accountId; return $this; } /** * @return string */ public function getAccountId() { return $this->_accountId; } /** * @param string $webpropertyId * @return Zend_Gdata_Analytics_AccountQuery */ public function setWebpropertyId($webpropertyId) { $this->_webpropertyId = $webpropertyId; return $this; } /** * @return string */ public function getWebpropertyId() { return $this->_webpropertyId; } /** * @param string $profileId * @return Zend_Gdata_Analytics_AccountQuery */ public function setProfileId($profileId) { $this->_profileId = $profileId; return $this; } /** * @return string */ public function getProfileId() { return $this->_profileId; } /** * @param string $accountId * @return Zend_Gdata_Analytics_AccountQuery */ public function webproperties($accountId = '~all') { $this->_webproperties = true; $this->setAccountId($accountId); return $this; } /** * @param string $webpropertyId * @param string $accountId * @return Zend_Gdata_Analytics_AccountQuery */ public function profiles($webpropertyId = '~all', $accountId = '~all') { $this->_profiles = true; if (null !== $accountId) { $this->setAccountId($accountId); } $this->setWebpropertyId($webpropertyId); return $this; } /** * @param string $webpropertyId * @param string $accountId * @param string $accountId * @return Zend_Gdata_Analytics_AccountQuery */ public function goals($profileId = '~all', $webpropertyId = '~all', $accountId = '~all') { $this->_goals = true; if (null !== $accountId) { $this->setAccountId($accountId); } if (null !== $webpropertyId) { $this->setWebpropertyId($webpropertyId); } $this->setProfileId($profileId); return $this; } /** * @return string url */ public function getQueryUrl() { $url = $this->_defaultFeedUri; // add account id if ($this->_webproperties or $this->_profiles or $this->_goals) { $url .= '/' . $this->_accountId . '/webproperties'; } if ($this->_profiles or $this->_goals) { $url .= '/' . $this->_webpropertyId . '/profiles'; } if ($this->_goals) { $url .= '/' . $this->_profileId . '/goals'; } $url .= $this->getQueryString(); return $url; } } | Low | [
0.525691699604743,
33.25,
30
] |
Description Wild men have dwelt in the North of Middle-earth since the Elder Days, troubling even the ancestors of the Dúnedain in times long forgotten. When Elendil and his sons came to Eriador after the fall of Númenor, they found these lands occupied by these Men of Darkness, and warred with them when they founded their kingdom of Arnor upon the shores of Lake Evendim. The wild men withdrew from the might of Arnor, but they were not vanquished. In time, they came back to power: the Hill-men wrested control of the kingdom of Rhudaur, while in the west, in lands emptied by the abandonment of Annúminas, another clan took control. These were the Gauredain, the Wolf-men, and they remain blood enemies of the Dúnedain to this day. The Gauredain, followers of the Witch-king of Angmar during his war against Arnor, have an ancient affinity for the Wolves of the North. They emulate these vicious beasts, wearing wolf-hides and going about on all fours when entering battle. These savage men use their fearsome behavior to terrify their prey, though even more terrifying is the rumor that they eat flesh . . . any flesh. | Mid | [
0.5708737864077671,
36.75,
27.625
] |
# Event 58 - MFMFAudio_Render_StreamSink ###### Version: 0 ## Description None ## Data Dictionary |Standard Name|Field Name|Type|Description|Sample Value| |---|---|---|---|---| |TBD|object|Pointer|None|`None`| |TBD|hnsSampleTime|Int64|None|`None`| |TBD|hnsSampleDuration|Int64|None|`None`| ## Tags * etw_level_Informational * etw_opcode_AudStreamSink_ShouldSampleBeDropped * etw_task_MFMFAudio_Render_StreamSink | Low | [
0.381188118811881,
19.25,
31.25
] |
It’s time to purge the World Health Organization and other international bodies of Communist Chinese influence One thing has become abundantly clear to most reasonable, thinking Americans in lieu of the Wuhan coronavirus pandemic: The Communist Chinese government is not a force for good, cannot be trusted to do the right thing, and has no intention of playing by international rules and norms. What’s also become blatantly obvious is that far too many international organizations kowtow and cater to the ChiComs, either out of fear or because they are like-minded authoritarians. That is especially true of the World Health Organization. The head of WHO, Ethiopian microbiologist Tedros Adhanom Ghebreyesus, did almost nothing to warn the world of the burgeoning outbreak that he and other members of his organization had to know was coming. Instead, Tedros served as chief China propagandist, deflecting criticism of the ChiCom regime while covering for Beijing’s lies about how bad COVID-19 really was, where it actually came from, and what effects it had on humans. The WHO, the United Nations, and any other global body that continues to bend to China’s will instead of being deferential to the world’s democracies, should be forced to reform or we should abandon them. And the sooner, the better. As John Hayward at Breitbart News notes, it was good to see President Donald Trump call out the WHO and its director-general, Tedros, over it’s “China-centric” attitude while also threatening to withhold funding from the organization. However, “we should be demanding specific measures to purge it of Chinese influence, beginning with a list of mandatory resignations topped by” Tedros, Hayward writes, adding: WHO should also present an action plan for cleansing itself of Chinese Communist Party (CCP) influence, and every other international organization that asks for American funding should do the same. One simple step in the right direction would be banning anyone from a country that participates in China’s Belt and Road Initiative (BRI) from assuming top leadership posts. The UN has never been any good at what it was designed to do, either The BRI is a financial vehicle used by Beijing to ‘buy’ influence in other countries and in globalist organizations. Billed as an infrastructure investment initiative, what it really does is allow Beijing to exert undue influence over governments who often go into Beijing’s debt by accepting money for internal projects those countries really can’t afford to build. In exchange, China gets an IOU and ‘access.’ Also, most of the time the projects are built with imported Chinese labor. But the United States also invests in countries, and we do so, generally speaking, with few strings attached. And even so, if there were requirements for our investment, we aren’t an authoritarian regime; our government stands for and promotes freedom and democracy, while China’s does just the opposite. As for WHO and Tedros, Hayward argues — correctly — that he did more to spread the virus than contain it. Even into January, Tedros was shilling for the Chinese. He lavished praise on the ChiComs, and later, when governments like ours began slapping travel bans on China, Tedros criticized them as unnecessarily unfair and harmful to Beijing’s economy. In mid-January, WHO tweeted: “Preliminary investigations conducted by the Chinese authorities have found no clear evidence of human-to-human transmission of the novel #coronavirus (2019-nCoV) identified in #Wuhan, #China.” For the record, as The Daily Caller adds, lying about the means of transmission wasn’t the only one told by the Communist regime in Beijing. The government reported that the first cases of the virus were recorded in mid-December, but later, outside sources reported that Chinese health officials were documenting and tracking cases a month earlier, but failed to report it. The UN has never been any good at what it was designed to do — serve as a world forum to prevent conflicts. And obviously, the WHO is being led by people who have more in common with tyrants than republics. | Mid | [
0.539906103286385,
28.75,
24.5
] |
Q: Cordova/Phonegap ignores fullscreen preference in config.xml on iOS I have defined <preference name="Fullscreen" value="true"/> But deploying through Xcode it ignores this. Even if I set hide status bar on the build settings. All my other config.xml settings seem to work, but not this. A: Fullscreen does not work on iOS 7 and above. Instead you can use Cordova HiddenStatusbarOverlay Plugin to hide the statusbar. Another way to hide it is to use a gap:config-file element to overwrite the UIViewControllerBasedStatusBarAppearance property: <gap:config-file platform="ios" parent="UIViewControllerBasedStatusBarAppearance" overwrite="true"> <false/> </gap:config-file> A: use following preference tag. that works fine for me. <preference name="StatusBarOverlaysWebView" value="true" /> | Mid | [
0.632478632478632,
37,
21.5
] |
Q: How to find all file names in a directory using windows wildcards i have two files: asdf.txt.txt asdf.txt Is it possible to use cmd to find only the file ending .txt and not the file above it: .txt.txt? I have : dir *.txt but it still yields both files is it possible to do this ps this is for a homework assignment but i looked on line and can't find any way to do this from the cmd line A: Since this is homework, I won't provide the full answer. But there is a simple solution that uses pipes (|) and FINDSTR. | Low | [
0.5308056872037911,
28,
24.75
] |
Tag Archives: first amendment Congress shall make no law respecting an establishment of religion, or prohibiting the free exercise thereof; or abridging the freedom of speech, or of the press; or the right of the people peaceably to assemble, and to petition the Government for a redress of grievances. That’s the First Amendment to the Constitution of the United States of America. It’s kind of a big deal around here. The trouble is, sometimes we forget the value and the importance of those core principles and ideas that allowed this nation to prosper for the last 200 years. And sometimes we forget that we don’t have these rights because a piece of paper in Washington D.C. says so. These rights are written down on that piece of paper because our nation is founded on the idea that people inherently deserve and possess these rights. These memory lapses seem to come around every four years or so, like Leap Year’s Day. Strange, isn’t it? Some atheists decided that they had a message for the two main political parties during all this buildup to the elections. These atheists want to make their case that religion doesn’t belong in politics and that the political parties should pursue ideas, not ideologies. You may agree or disagree, and you can be vocal about it. You have that right. It’s written down on that piece of paper. The atheists used their money and resources to create billboards, and then sought advertising agencies willing to put up the images near the national conventions of both parties. There was no such agency in Florida. For whatever reason, none of them wanted to carry a controversial message about religion. They have that right. It’s also written down. An agency in North Carolina was willing to put up the atheist organization’s message. So these billboards were spotted in the last two weeks: The offending billboards You might strongly disagree with the messages. (I do.) We have that right. However, the billboards are now being pulled down, as a response to a reported flood of “vitriol, threats, and hate speech against our staff, volunteers, and Adams Outdoor Advertising,” according to Amanda Knief, managing director of American Atheists, quoted in a Fox News article. And that’s where our rights cross the line. When my free exercise of religion or speech threatens the safety of another person, then maybe I’ve missed the point of both my religion and my freedom. I’ve said before, as a religious person, it’s reasonable to support everyone else’s right to express their religious views, even if–or especially if–those views differ from my own. As soon as we permit the government or the public to decide what is an acceptable religious view and what is not, then we are giving up the principle behind those rights written down in Washington. It’s not my job just to make a case for my own faith and for my own freedom. It’s my job to make the case that everyone else should have the same freedom as me to express their point of view without fear of violent retribution from government or from their fellow citizens. This all makes sense from the civic political perspective. I can’t go around threatening the free speech or free religion of others without expecting the same treatment. I can’t push for government to make laws that limit free speech or free religion (or lack of religion) for others without expecting that some day the same government might limit my freedoms. It’s also sensible from the perspective of Jesus’ teachings. Do unto others as you’d have them do unto you, right? I’m not sure what my fellow believers are asking for “them” to do unto us, if we’re engaging in threats and vitriol just because some atheists don’t believe what we believe. Newsflash: That’s kind of the point of atheism. Of course, this is North Carolina, where religion and politics have clashed quite often in the past few months. North Carolina recently voted on an amendment to their state constitution prohibiting gay marriage, or defining marriage as one man and one woman, or however you want to put that. North Carolina was also in the spotlight thanks to Pastor Charles Worley of “electric fence” fame, who suggested maybe we could lock “all the gays” behind an electric fence and let them die off. (To be fair, he did suggest dropping food and supplies into the fenced area so they could not starve to death… so, I mean, there’s the Christian compassion we were all hoping for, I guess.) I think the latter is worse, to be honest. To be fair, everyone can say what they want about other religions, about atheism, about Democrats, about Republicans, about anyone who is “not like me.” As much as I may disagree with their speech, I defend the right of Americans to say what we want. We can shout down voices of ignorance and hate. Threats of violence are not the way to do it. To my fellow believers who have raged against those billboards: You want to do something useful with your anger? “Your values aren’t our values. We know about your plans to open doors in our city, and we want you to know you’re not welcome here.” Sound familiar? Maybe… but I’m not talking about Chick-Fil-A and Boston (or Chicago… or probably a list of cities that will want to jump on this bandwagon to show how progressive and tolerant they are…) The “threat” to America I’m talking about Murfreesboro, Tennessee, and the unremarkable but apparently controversial mosque being built there. Based on the estimate in the July 19th news story in the link, the worshipers might have already had their grand opening. I sure hope so. I hope they’re having the best Ramadan ever. And I hope their opponents are choking on bile as they see it happening. There’s a thing called the First Amendment in the Constitution. It goes something like this: These apply to everyone,Not just people we like. Congress shall make no law respecting an establishment of religion, or prohibiting the free exercise thereof; or abridging the freedom of speech, or of the press; or the right of the people peaceably to assemble, and to petition the Government for a redress of grievances. In this case, no one’s worried about Congress. The Federal government is (to my knowledge) not involved at all. But what the folks in Tennessee seem to be forgetting is that the amendment that lets us freely step into our churches on Sunday wherever we’d like is the same amendment that permits Muslims to build a place for worship wherever they’d like. Intolerance and fear are clearly a part of the issue. One resident talked about the Buddhist place of worship in town and how no one seems to pay those guys any mind. “Well, with 9/11 and the whole terrorism thing, people are just a bit nervous about having a mosque in town.” That’s a paraphrase, but you can read the sentiment in the article for yourself. To that I’d say, “With the vandalism and arson on private property, and the open hostility, maybe the Muslims are a bit more frightened of you than you are of them.” I’d say that, but I’m afraid that (were they ever to read my pointless rant in this corner of the Web) the perpetrators of this fear-mongering would feel proud at the thought. “Look at how we stood up to those Muslims! We sure let them know they’re not wanted here.” Yeah, good job. Way to go against one of the key reasons America was founded. Way to stand up against one of the freedoms men and women have fought and died to protect for the last 226 years. Take that, religious expression! I approve that. I applaud that. I don’t want the government telling us what is approved speech and what is not. And I know the vast majority of Americans feel the same. But that allows for voices of thinly-veiled hatred to speak terribly insensitive and frightening thoughts. Horrible thoughts like the North Carolina preacher a few months back with his “I got an idea… we build an electric fence, and we take all the gays an’ put ’em behind it.” Horrible thoughts like the mindless venom pouring out of the mouths of Westboro Baptist Church members. I won’t even quote their signs. You’ve seen them on the news, or you can google them and you’ll know exactly what I’m talking about. Horrible thoughts like that of one of the leading opponents of the Murfreesboro mosque. “I know we weren’t going to win the legal battle… I just wanted to show ’em they’re not welcome here. And I plan to keep up the fight.” What fight? Once the mosque is built, as is permitted by local, state, and federal government, and by our fundamental freedoms inAmerica, what fight is there? I have several friends and coworkers who are gay. Some have made the point that they have come out in public because they don’t want to give anyone the impression that they will sit quietly while people malign or threaten them. They’re all sensible, thoughtful people who would love to leave that part of their lives off the radar. It’s such a minor thing to them, and it’s so not anyone else’s business. But oftentimes the terrible treatment they receive from others necessitates a harsh response, so they stand up and are counted. They stand up and say, “This mistreatment will not stand,” because they know there’s probably someone else sitting in quiet fear, too afraid to speak out in their own defense. To my fellow Christians, I’ll say, how long are we going to sit in peace and quiet, shaking our heads, muttering a little tsk-tsk in shame, looking at stories like Murfreesboro or Westboro or the electric fence guy? I’ve often heard people ask, “Where are all the moderate Muslims to denounce what the radicals are doing?” Sauce for the goose is sauce for the gander. Maybe we think it goes without saying. “Everybody knows” that Westboro Baptist Church is a bunch of nutjobs that have nothing to do with Christianity. “Everybody knows” that what that NC preacher is saying is horrific and wrong. “Everybody knows” that the First Amendment protects the rights of these Muslims in Tennessee. Apparently everybody doesn’t know. Welcome to America.Check your hate at the door. It’s time we stand up and be counted. Make sure that those who would wrap themselves in the American flag while clutching a Bible to their chest properly understand the significance of both of those symbols. Make sure we speak out to those who would spread hate and fear in the name of Christ, and let them clearly understand: | Mid | [
0.541935483870967,
31.5,
26.625
] |
This is a unique set of ride and structure supports made with a texture that suggests the supports are made of poured concrete. The inner and outer corner pieces are available in all four depths. The straight pieces are available in all four depths and in all five lengths. The pieces in this set place at quarter tile increments. Suitable for support walls and retaining walls. Not colorable. To review the history of this set and to see how it might be used, see our article here. | Mid | [
0.5377532228360951,
36.5,
31.375
] |
The Red Devils boss has criticized the 24-year-old English defender for his actions in Sunday's Manchester derby defeat at the Etihad Many favored Manchester City to beat neighbors and arch-rivals Manchester United when the two sides met at the Etihad in Sunday's highly-anticipated Manchester derby. However, when 24-year-old English full-back Chris Smalling was given his marching orders in the 39rd minute after receiving a second booking, all hopes of walking away from the match with at least a point evaporated. Man City vs Man United will be featured live in the Premier League this weekend at the Etihad Stadium on Sunday, the 2nd of November. The Citizens have been in a poor run of form having failed to record a win in any of their last three matches in all competitions. After losing to West Ham in the Premier League, the defending champions failed to create an impression in the subsequent match losing 2-0 to Newcastle. However Sunday's encounter will hold much more importance for the City players who would want to ensure that they... Dating back to an incident that occurred during the 2014 World Cup, the Argentine team-mates will come face to face on opposite sides at the Etihad When English Premier League giants Manchester United travel to face neighbors and fierce rivals Manchester City in Sunday's highly-anticipated Manchester derby, all eyes might be on two particular players: Marcos Rojo and Sergio Aguero. A rift between the Argentine team-mates, both part of La Albiceleste's impressive run to the 2014 World Cup final at the famous Maracana Stadium, was the reason... The Dutchman is set to make his Manchester derby managerial debut when his Man United side squares off against fierce rivals Man City. After guiding Netherlands to an impressive third place finish in the World Cup, much was expected from Louis van Gaal to transform a Man United side which endured its worst campaign in more than a decade. The Dutchman's appointment was a breath of fresh air for United fans who had been heavily distraught by his predecessor David Moyes who just after spending one season as the United boss was... The Citizens will face tough opposition against the Red Devils, who will have Louis van Gaal working his magic to confuse Manuel Pellegrini's team One of the most anticipated matches in this Premier League season is without a doubt, the Manchester Derby. With United coming off one of their worst seasons ever, the Red Devils will try to start turning things around against their neighbors, who ended up bagging another Premier League title in their time of despair. This should be an interesting match, in which Manuel Pellegrini's crew will have... Louis van Gaal has confirmed a piece of news which won't make Manchester United fans happy ahead of Sunday's Manchester Derby in the English Premier League. El Tigre is not feeling well. The Colombian star missed the Red Devils' crucial match at home to Chelsea. Today, he is set to miss the big clash away to Manchester City as well. Dutch manager Louis van Gaal declared four words, four sad words from the point of view of avid Mancunian supporters. Sunday's big match might feature three of the most feared strikers in the continent. The likes of Aguero, Rooney and Falcao will all be keen to create an impression during the Manchester Derby. Man City star Sergio Aguero has been in blistering form in recent games and currently heads the scorers chart having registered nine goals in the Premier League. He got himself on the scoresheet four times as the Citizens dismantled Tottenham 4-1 at the Etihad Stadium and was arguably his side's best player when they faced CSKA Moskva in the Champions League. The first Manchester Derby of the 2014/15 English Premier League season takes place at the Etihad Stadium. Here’s where to watch Manchester City vs Manchester United live on November 2, 2014. Manuel Pellegrini is under pressure to elevate Manchester City following Wednesday’s shocking 2-0 loss against Newcastle United in the Capital One Cup. Last season’s great achievements are gone and focusing on the current campaign – in Europe as well as domestically – seems hard for the Citizens. Before tempers explode, Pellegrini must find this special something to boost... The Citizens boss saw his star midfield duo limp out of Wednesday night's Capital One Cup loss to Newcastle, as their Etihad Stadium clash with the Red Devils grows closer Manchester City boss Manuel Pellegrini has admitted his side's recent form is a cause of worry as the reigning English Premier League champions prepare to host city rivals Manchester United in Sunday's highly-anticipated Manchester derby. The Citizens coach made these comments after seeing his side fall to a shock 2-0 loss to Newcastle United as last season's Capital One Cup champions were dumped... As Manchester City welcome arch rivals Manchester United to the Etihad Stadium, here is a look at the top five battles between the opposing players that could decide the outcome of the Manchester derby. Sergio Aguero vs Rio Ferdinand The Argentine has so far, been a joy to watch this season. Despite being more of a number 10 player, Aguero has performed admirably as a secondary striker where his tenacity and supreme skill level becomes a nuisance for the best defenders out there. Indeed, Rio Ferdinand will have his work cut out for him. Over the years, the England international has lost... Manchester United vs Manchester City ends three-day action of English Premier League football; count on ESPN networks to broadcast it live on Monday, April 8, 2013 Miami Beach, Florida (April 4, 2013) – As always, LiveSoccerTV.com (@LiveSoccerTV) has it all packed when it comes to data of live stream and TV schedules for English Premier League fixtures. This weekend, our coverage is even bigger with four matches highlighting Matchday 32. Mind games, physical battles, tactical choices and concentration – the English Premier League title race between Manchester United and Manchester City has gone to the final two matches. Monday’s Manchester derby did not decide the winner of the league. The outcome of the match put the Citizens and the Red Devils on equal terms ahead of the next 180 minutes of football. The top two zone is tight; City and United both have 83 points. In terms of goal difference and head-to-head, the advantage is clearly Manchester City’s. However, those remarkable stats could come to nothing... According to Sir Alex Ferguson, Manchester United’s hop across town to play bitter rivals Manchester City on Monday, will be the “biggest Manchester derby” in the club’s history as it could decide the destination of the 2011/12 Premier League title. As recent as three weeks back, the door to the title seemed firmly shut in the face of City as United enjoyed an eight point lead at the summit of English football. Recent results, however, including the dramatic 4-all draw against Everton have re-opened the door for City. The match is exclusively live on SuperSport and in High Definition. Community Shield participants Manchester United and Manchester City naturally form some of the greatest rivalry matches in England. The 2 clubs meet this weekend, in a clash that will have a great effect on both teams’ current status. As the contest usually rewards winners with a considerable boost of confidence ahead of the ensuing season, it will be important for each giant to get the upper hand over the other. United and City have met 159 times at competitive level, and unsurprisingly, it is the Red Devils who have... Manchester United are ready to host Manchester City at Old Trafford in what could be the biggest fixture of the Premier League calendar. Live Soccer TV takes you through the history of this Manchester rivalry! The History Behind The Historical Manchester Derby The whole drama began on November 12th of 1881 when Newton Heath (later to become Manchester United) visited West Gorton (later to become Manchester City). Newton Heath won the game 3-0, but there wasn't anything special in this fixture because both were just part of a bunch of clubs in Manchester. It's been said that although Manchester United may be the most popular team in the world, they're not the most popular team in Manchester. That distinction, so the saying goes, belongs to United's local rivals, Manchester City. As City supporters are quick to point out, United doesn't even play in Manchester, their home being located in the borough of Trafford. There can be no doubt, however, that when Manchester football is mentioned it is the team in red that most people think of. The rivalry between Manchester United and Manchester City goes back a long way, almost as far back as the beginning of football... | Low | [
0.49358974358974306,
28.875,
29.625
] |
Melvin Rabin, the psychologist accused of having sex with a patient, has surrendered his license and acknowledged in his resignation letter that he failed to maintain professional boundaries and put his patient “at risk of harm.’’ Mel Rabin — Linkedin The Board of Registration of Psychologists accepted the license surrender Friday, more than two years after the patient, Lisa Grover, filed her complaint. State law and professional ethics prohibit psychotherapists from having romantic or sexual relationships with patients. Rabin’s resignation was dated Tuesday, the day after the Globe reported on Grover’s allegations that Rabin lured her into a relationship that started with flirtatious e-mails, progressed to hugs and kisses, and eventually led to sex on his office couch. Grover, who was seeking to recover from childhood sexual abuse, said the relationship with Rabin was emotionally devastating. | Mid | [
0.5638051044083521,
30.375,
23.5
] |
Smoothies, Shakes, and Juices: Drinking Healthy 101 If you want your fruity goodness as a drink, pull back on the frozen ingredients and just use fruit and greens like spinach. Unless you’ve been living inside of a Burger King, you’ve heard about the benefits of juicing and drinking shakes and smoothies. It’s about time to graduate from Drinking Healthy 101 and, with our help, become a bit of an expert. The difference between shakes, juices, and smoothies is varying to some degree, having mostly to do with ingredients and methods used for preparation. Shakes and smoothies are very similar. Their difference has nothing to do with the thickness, rather the ingredients used. Smoothies are a fruit dance party in your mouth. They’re filled with frozen fruits, fresh fruits and fruit juices, but don’t contain any milk or yogurt. They incorporate a supplement that is mixed with water (enter hand shakers) to add a nutritional component to their diet. Shakes, on the other hand, usually contain milk, yogurt, ice cream, et cetera. (Pretty easy to remember since ‘shakes’ is derived from ‘milkshakes’.) That’s it! Now, if you want your fruity goodness as a drink, pull back on the frozen ingredients and just use fruit and greens like spinach. If you’re looking to make a treat with a thicker consistency, add more of the frozen kinds of fruits and ice. Adding protein into any smoothie makes it an instant meal that should sustain you for a few hours. Juicing Smoothies offer fiber, while juices offer quicker absorbable nutrients with no fiber to hinder absorption. Using a blender for shakes keeps the fibrous materials intact, meaning that you are not pulling the juice out of the pulp, but rather blending the pulp along with it. Juicing separates the juice from the skin to retain nutrients, vitamins and enzymes. In this way, blending is very different from juicing. Consider this when making a shake versus making a juice. The benefits of juicing go beyond what it does for your body. Studies show that juicing fruits and vegetables can help improve skin tone and affect carotenoid levels. Carotenoids can prevent age-related diseases like heart disease and cancer. If you haven’t seen the film Fat, Sick and Nearly Dead, you probably should. There are two different types of juicers you can use: centrifugal or a masticating. Centrifugal vs. Masticating Juicers Centrifugal juicers are found in the common kitchen because generally, they’re more affordable. Standing upright, these juicers’ shred food into a pulp and pull juice out of the pulp through a filter. They work well with fruits and vegetables, but not really with leafy greens (which is where the most nutrients come from!) Enter: masticating juicers. These bad boys sit horizontally and utilize an auger to crush and squeeze juice out of fruits, vegetables, and leafy greens. Since these juicers crush slower and squeeze harder, leafy greens and even wheatgrass can all be juiced through them. While you all juices are best consumed right away, any juice produced through a masticating juicer can last longer than that of a centrifugal. Our list will introduce you to several great smoothies, juices, and shakes that can help get you on a healthier track in a heartbeat. Earthbound Farm This company recently launched Smoothie Kickstarts, which provide the perfect proportions of organic fruits and veggies to make smoothies and shakes — just add juice, yogurt, or milk. Green Star Elite by Tribest This claims to be only juicer on the market that mirrors what our body does naturally to protect the most delicate of vital nutrients and extract maximum nutrition. Its technology helps the juice last up to 72 hours in the fridge. | High | [
0.6602409638554211,
34.25,
17.625
] |
High Temperature PERIFLEX® VN | Stromag Newly Developed High Temperature Compound (up to 120 °C) The Periflex® VN is a highly flexible elastomer coupling with linear spring characteristic ideal for diesel engine drives. The new compound has been developed for higher temperature stability and is suitable up to 120 °C ambient temperature. Further, the advantages of this compound are high mechanical strength, good abrasion resistance and improved media resistance against oil and ozone. The newly developed compound is available with flywheel connections according to the SAE J620 standard, also for shaft-shaft connections. | High | [
0.7070063694267511,
27.75,
11.5
] |
Sign up to FREE email alerts from MyLondon - MyWestLondon News Subscribe Thank you for subscribing See our privacy notice Invalid Email Liberal Democrat London Mayor candidate Caroline Pidgeon has launched her manifesto, outlining her vision for London. The full list of 12 mayoral candidates has now been announced ahead of polling day on May 5. Ms Pidgeon, who has been a member of the London Assembly for the last eight years, told an audience at the Lewisham & Southwark College in Deptford she was in the election “to be something, but to do something". At the college, where construction skills are taught, she said: "This manifesto sets out how we Liberal Democrats would create a London that works for everyone. "It’s optimistic about the future, and about the power of the mayoral office to make a difference to every Londoner’s life. "We say we can build 50,000 council homes in the next four years. We say we can relieve overcrowding on the tube. We say we can cut violent crime. "And we show that you don’t have to preach fantasy economics to promise change.” But exactly what does the party's manifesto that "works for everyone" include? Here are the 14 things you should know about the Liberal Democrats' plan: 1. Olympics tax will fund new homes As a Londoner, you will continue to pay your £20 a year council tax which funded the London Olympics, but instead, to fund an “Olympic” effort to build 50,000 council homes and 150,000 other homes to rent or buy in the next four years. 2. Found a new construction company to build them A Greater London Authority run construction company will be started to get those homes built. 3. And a quarter will be genuinely affordable One in four of these homes are said to be "genuine, affordable social housing". 4. Equip youngsters with construction skills A construction academy will be created to equip young Londoners with the skills needed to help in the planning and building of these new homes. 5. Half price transport fares A one hour bus ticket will be introduced, and fares before 7.30am will be halved for people using Transport for London Tube and rail services. 6. More policing on transport 3,000 extra police will also be recruited focused on transport hotspots. 7. No lorries during rush hour HGV's will be banned during rush hour times to protect cyclists and a better use of the Thames could be introduced. 8. Pedestrianise Oxford Street The Liberal Democrats have plans to pedestrianise Oxford Street and supports a higher charge for diesel vehicles used in Central London. 9. Reduce knife crime through education Knife awareness programmes are to be introduced to schools across London. 10. Keep the PSCOs Plans to scrap PCSOs are to be abolished to protect community policing efforts. 11. Crossrail 2 supported The mayoral hopeful wants to secure Crossrail 2 and supports the plans. 12. Heathrow congestion charge Drivers would have to pay to enter a Heathrow congestion charge zone under new proposals 13. Make London a 'digital city' A digital ambassador would be introduced at City Hall to look more closely at Tech City and how London can lead as a digital city with businesses 14. Childcare for working parents A wrap-around childcare system for parents working long hours would be introduced by training more child minders, funded through a new London Children's Fund from a tourist levy on hotels like in Paris and New York | High | [
0.6666666666666661,
27.5,
13.75
] |
As bone marrow cell growth enhancers, there are known erythropoietin (Miyake, T. et al., J.B.C., 252, 5558, 1977) and G-CSF (Nicola, N. A., Annu. Rev. Biochem., 339, 27-30, 1989). However, these enhancers are protein preparations and thus unsuitable for frequent administrations. Therefore, it has been desired to find a low molecular weight compound having an activity comparable to these substances. | Mid | [
0.63578947368421,
37.75,
21.625
] |
#include "qqlatestmessagelistwidget.h" QQLatestMessageListWidget::QQLatestMessageListWidget(MainForm *mainWidget, QWidget *parent) : QWidget(parent), m_layout(new QVBoxLayout), m_mainWidget(mainWidget) { m_mesCounter = 0; if(NULL == m_mainWidget) return; QVBoxLayout *mainLayout = new QVBoxLayout(); mainLayout->setContentsMargins(0,0,0,0); mainLayout->setSpacing(0); m_contentsWidget = new QWidget; m_layout->setContentsMargins(0,0,0,0); m_layout->setSpacing(0); m_contentsWidget->setLayout(m_layout); m_scrollArea = new QScrollArea(this); m_scrollArea->setWidgetResizable(true); m_scrollArea->setAlignment(Qt::AlignLeft); m_scrollArea->setWidget(m_contentsWidget); mainLayout->addWidget(m_scrollArea); setLayout(mainLayout); setStyleSheet("QWidget{border: 0;}"); //创建右键菜单 //creatMenu(); } /************************************************* Function Name: addItem() Description: 添加 *************************************************/ void QQLatestMessageListWidget::addItem(QWidget *item){ // Remove last spacer item if present. int count = m_layout->count(); if(count>1){ m_layout->removeItem(m_layout->itemAt(count-1)); } // Add item and make sure it stretches the remaining space. m_layout->addWidget(item); m_layout->addStretch(1); emit timerStatus(true); } /************************************************* Function Name: removeItem() Description: 删除 *************************************************/ void QQLatestMessageListWidget::removeItem(QWidget *item){ m_layout->removeWidget(item); if(m_layout->count() ==1){ m_layout->removeItem(m_layout->itemAt(0)); emit timerStatus(false); } } /************************************************* Function Name: size() Description: 返回消息item的数目 *************************************************/ int QQLatestMessageListWidget::size(){ m_mesCounter = m_layout->count(); if(m_mesCounter>1) --m_mesCounter; return m_mesCounter; } | Low | [
0.5121951219512191,
36.75,
35
] |
<?php namespace Payum\Core\Tests; use Payum\Core\ApiAwareTrait; use Payum\Core\Exception\LogicException; use Payum\Core\Exception\UnsupportedApiException; use PHPUnit\Framework\TestCase; class ApiAwareTraitTest extends TestCase { public function testThrowIfSetApiButApiClassNotConfigured() { $object = new ApiAwareClass; $object->setApiClass(null); $this->expectException(LogicException::class); $this->expectExceptionMessage('You must configure apiClass in __constructor method of the class the trait is applied to.'); $object->setApi(new \stdClass()); } public function testThrowIfSetApiButApiClassIsNotValidClass() { $object = new ApiAwareClass; $object->setApiClass('invalidClass'); $this->expectException(LogicException::class); $this->expectExceptionMessage('Api class not found or invalid class. "invalidClass"'); $object->setApi(new \stdClass()); } public function testThrowUnsupportedApi() { $object = new ApiAwareClass; $object->setApiClass($this->getMockClass(\stdClass::class)); $this->expectException(UnsupportedApiException::class); $this->expectExceptionMessage('It must be an instance of Mock_stdClass'); $object->setApi(new \stdClass); } public function testShouldSetApiIfSupported() { $expectedApi = new \stdClass; $object = new ApiAwareClass; $object->setApiClass(\stdClass::class); $object->setApi($expectedApi); $this->assertAttributeSame($expectedApi, 'api', $object); } public function testShouldSetApiIfSupportedWithInterface() { $expectedApi = new FooApi; $object = new ApiAwareClass; $object->setApiClass(FooInterface::class); $object->setApi($expectedApi); $this->assertAttributeSame($expectedApi, 'api', $object); } } class ApiAwareClass { public function setApiClass($apiClass) { $this->apiClass = $apiClass; } use ApiAwareTrait; } interface FooInterface { } class FooApi implements FooInterface { } | Mid | [
0.630331753554502,
33.25,
19.5
] |
Lambda Telescopii λ Telescopii, Latinized as Lambda Telescopii, is a solitary, white-hued star in the southern constellation of Telescopium. It is visible to the naked eye as a faint point of light with an apparent magnitude of +4.87. This body is located approximately 610 light years from the Sun based on parallax. At that distance, the visual magnitude of the star is diminished by an extinction of 0.18 due to interstellar dust. This is a late B- or early A-type main-sequence star that is generating energy through core hydrogen fusion. The star is 268 million years old with a relatively high rate of spin, showing a projected rotational velocity of 110. It has a higher than solar metallicity – the abundance of elements more massive than Helium. The star is radiating 350 times the Sun's luminosity from its photosphere at an effective temperature of 10,139 K. References Category:B-type main-sequence stars Category:A-type main-sequence stars Telescopii, Lambda Category:Telescopium (constellation) Category:Durchmusterung objects 175510 093148 7314 | High | [
0.6649484536082471,
32.25,
16.25
] |
The trophy cabinet in our Academy at Cobham is full with every notable piece of silverware it can win in development football. The Under-18 Premier League national title secured in May was the last remaining prize now sitting alongside FA Youth Cups, UEFA Youth Leagues and Under-21 titles. Players who have been at the club for a decade, having signed as Under-9s, are also stepping into the limelight whether it be as part of Antonio Conte’s first team squad last season; as members of England’s World Cup-winning Under-20 side this summer; or someone such as Tammy Abraham who scored 26 goals during his maiden loan spell at Bristol City. Bath has watched them all advance through the system during 13 years in his current role and believes they are reaping the rewards of an environment of excellence at the club. A challenging and diverse games programme forms a significant part of a player’s journey through the youth system, including a gradual introduction to the demands of winning provided by Premier League tournaments and foreign tours. They test players against different styles and opponents, and Bath is a firm believer in cultivating a winning mentality in players and teams at a formative stage of development. ‘Throughout the year, all our Academy age groups participate in overseas tours and tournaments which prepares them for future tournament football and for the challenge of winning,’ he tells the official Chelsea website. ‘We go out every weekend trying to win our games but we also have clear principles of play so we develop our players technically, tactically and physically. Playing to win is a big part of development because it challenges the players’ mentally as well. ‘You can see the benefits of that with our achievements in winning trophies at the older age groups in recent years and now with our boys involved in successes with England. You hear a lot in the media about club versus country but in youth development it’s so important to work together to find the best way to develop players and the experience of playing for your country should complement the competitions in academy football. ‘These competitions and the international tournaments are an important way to bridge the gap to senior football. Players like Tammy and Andreas Christensen have played in them all and I’m sure the experience has helped in their transition to the senior game.’ | High | [
0.701834862385321,
38.25,
16.25
] |
I do love the mood being set by the editing and art direction. So many quick cutaways to slightly ominous shots of things barely glimpsed through doorways or shots in which the distant background comes into focus and the camera lingers juuust long enough to make you think someone or something is going to emerge but then it cuts quickly away again. Every shot is pregnant with a kind of tension and dread that I haven't really experienced since the first season of True Detective. For some reason I am beginning to suspect Alan. The little exchange about how he should spend the night with Adora and he gets the immediate rejection might be telling. Then again, it could be just another red herring.posted by Ber at 12:57 PM on July 24, 2018 [1 favorite] I'm glad that we know why she keeps listening to the same music over and over again. I'm sad that I didn't catch a single hidden word this episode, I felt like I won that game in episodes 1 and 2.posted by sacrifix at 6:34 PM on July 24, 2018 There are hotels/motels in Wind Gap. Even after recently spoiling the story for myself by reading about the book, I still don't understand why Camille is staying at home after fleeing the small town for the big city.posted by emelenjr at 8:43 AM on July 25, 2018 I still don't understand why Camille is staying at home after fleeing the small town for the big city. Because many people who grew up in dysfunctional families never get over it - and clearly Camille certainly hasn't. I think it informs a lot about her character that she's voluntarily putting herself back in that house with her abusive mother. She doesn't see another option.posted by something something at 12:58 PM on July 25, 2018 [4 favorites] Oh, that was brutal, in a way that I can't shake. I'm glad I can't binge this right now, because it's pretty grim right now. This show's timeline is harder to follow than WestWorld. It's not as extended, so it doesn't feel as disjointed or tricky. Skimming over the Wikipedia article on the miniseries gave me some hints that I didn't pick up directly from the show, which I won't mention here in case they're spoilers unless you've read the book. Because many people who grew up in dysfunctional families never get over it - and clearly Camille certainly hasn't. I think it informs a lot about her character that she's voluntarily putting herself back in that house with her abusive mother. She doesn't see another option. To complicate things, her mother has this (inflated) sense of needing to appear normal, and the normal thing to do is have visiting family stay with you, if you have the means, and they definitely have the means. Despite having a toxic family, she still wants to make her momma happy. Also, a happy mother means a mother less likely to interfere with her job. For some reason I am beginning to suspect Alan. The little exchange about how he should spend the night with Adora and he gets the immediate rejection might be telling. I was starting to suspect Alan, too, in part because I mis-heard him call Amma a grown woman, but he was talking about Camille. Still, it got me thinking on the teeth, and the show's focus on "almost a woman" -- I started thinking that pulling teeth was somehow trying to hide the fact that these young teenage girls are adults by pulling out the adult teeth. And he's featured in the show, but not featured. Camille Preaker's step-dad, apparently wealthy but not because of the town's hog industry (unless there's a Crellin Farm somewhere, in addition to the Preaker Farm). Composed in the face of conflict, but not shying away or playing blind. It might not be him, but it feels like they've eliminated other suspects, and I don't get the feeling this show would not introduce the "villain" by this point, considering that the show season is only 8 episodes long, and it sounds like this is a one-season miniseries. I'm sad that I didn't catch a single hidden word this episode, I felt like I won that game in episodes 1 and 2. Vulture is updating their "subtle words" article and it now includes episode 3. "Delicious, Nourishing Meat" is pretty dark. I was going to say it seems like there were fewer hidden words in this episode, but I see I'm quite wrong, based on the Vulture article. And because this is the sort of show that gets in my head, here are my musings on the fans: - Fans are not air conditioning, which changes the air (drying and cooling) - Fans keep on spinning, move air and make you feel cooler, but they don't really change things - Or fans push things along, move them (again, without really changing them) This show weighs on my mind, which is a good mark for the show, but now I have to find something happy to think about for a while.posted by filthy light thief at 10:35 PM on July 25, 2018 I think Camille is fairly typical in deciding to stay at her mother's house. People from abusive backgrounds do this all the time. And the story wouldn't really work without her being thrust back into all of that; Camille sitting in her car drinking a mini of vodka before stepping into the house for the first time is very relatable. Also, Adora's seeming ambivalence about having her there is excellent. It suggests there is something to be learned, something she is guarding, as well as playing into the dynamic of the toxic family. Despite everything, Camille is still trying to win her over on some level. In addition, Camille's insider status-- however ambivalent-- is giving her an entrée in a number of ways. Showing up to the funeral from a motel where you're staying is much different from showing up with your socially prominent mother with whom you are staying. And then sneaking around the kid's room? People will accept this sort of thing from a member of Adora's family, not from a black sheep who is visiting for the weekend. Further, Camille needs the information she can get from her family and their friends. Nothing in this series is serving only one purpose, and usually more than two.posted by BibiRose at 7:05 AM on July 26, 2018 [4 favorites] I see Camille as still being very cowed and terrorized by her mother. She can manage enough to leave town and limit communication, but that's because those are the only ways she can deal with her mother. She can't set boundaries. I don't know that she even has boundaries per se, her self-harm is the physical reflection of her emotional self. Over and over she's placating and submissive to her mother. The private moment between them after Marian's funeral, when she tentatively attempted to place her head in her mother's lap only to be rebuffed (or made irrelevant by her sister), is a model of their relationship. Even now. Despite herself, she still yearns. She's fearfully attached. She can be distant for a while, but she's still in orbit. A lot of things are different because of gender roles, but I think the reason this show makes me so anxious is because I had a narcissistic, abusive parent who, in a very real sense, terrorized me. Even assuming Camille could resist the pull and stay in a motel, the size and culture of the town means that just being there places her squarely inside her mother's context, aware (without being told, but nevertheless repeatedly told) that at the other end of everything she does or says is her mother's reaction. She'd be on eggshells, anyway; at least this way (she tells herself) nothing will come as a surprise. Really, though, there's this compulsive need to attempt to manage, as if that were possible. Strikingly, it's Amma who seems to most have succeeded in navigating her mother's treacherous waters. But at a profound cost -- she's the inverse of Camille. She's nothing but barriers within barriers. I have to say that it really seems like the show is building an argument for Amma as the killer. She's nearly always sinister, off-center, predatory. And both she and her mother have connections to the victims. When this occurred to me, my main thought was that I will not be able to suspend disbelief if the show goes that direction. Not because I find the underlying psychology incredible, but the actualization. When I was in my early twenties, one night I had a very vivid dream. I was in a diner and there was a guy in the booth behind me who was becoming increasingly angry and abusive with the woman who was with him. I finally said something, which enraged him; we ended up fighting and the denouement of the dream, the moment from which I awoke with a sense of profundity, found me atop him with a brick in my hand, smashing his teeth out, and telling him that I was doing this so that every morning thereafter he'd look in the mirror and know he was an asshole. I related this dream to a psychiatrist and his comment was that teeth can symbolize someone's power. I mean, obviously. It's not clear to me what it would mean to the killer to symbolically obliterate a young teen girl's power by the removal of her teeth. Whatever it is, it explains everything.posted by Ivan Fyodorovich at 12:12 PM on July 26, 2018 [6 favorites] If we're guessing, I'm guessing the murders either had something to do with Amma or with Ashley (the girlfriend). I don't necessarily even think the two murders are connected really. Like maybe Amma and her friends killed the first girl (I could definitely see them pulling some kind of mean girls shit). Then maybe Ashley killed the sister because she was jealous (god that whole interview scene was soooo uncomfortable) and then made it look connected to the other girl. Really, though, there's this compulsive need to attempt to manage, as if that were possible. Hoo boy the mother issues in this are hitting home right now. Alot of it is a little too on the nose for my life right now.posted by LizBoBiz at 11:59 PM on July 26, 2018 For budget reasons I got a one-month HBO subscription, so catching up on some episodes before watching remainder "live" as they air. (And I have not read the book.) The step-dad was on my radar from the first. I'm now suspecting Adora. She looks like a woman in white. And of course after episode 3, the smart-ass half-sister. "My friends love me, they'd do anything for me." But I wonder if the twist will be that Camille did it. (We don't know where she was when the two disappeared, only that she was in town when the 2nd body showed up.) IOW it feels like it has to lead to someone in the dysfunctional center of the story, and all the townspeople are red herrings. A comment in these threads makes me feel like this is the not-obvious obvious thing. Speaking of townspeople - what's up with that overly-touchy friend who was the only person "genuinely nice" to Camille. I think the sheriff's also supposed to be a bit creepy. It also seems we haven't heard anything near the whole story on Camille's childhood, the earlier flashbacks: (Her running through the woods being chased by boys, that porn cabin.) I'm kinda into the atmospheric lighting, the teasing snippets of editing which give us flashes of memory. The acting is pretty good. But OTOH I also feel it's a bit preciously arty. But I'm hooked and hope to read no spoilers.posted by NorthernLite at 12:13 PM on July 30, 2018 [1 favorite] | Low | [
0.533568904593639,
37.75,
33
] |
Bogus student warnings ignored The UK Border Agency ignored more than 150,000 warnings in three years from universities and colleges concerned that their foreign students were bogus, a damning report reveals. The UK Border Agency ignored more than 150,000 warnings in three years from universities and colleges concerned that their foreign students were bogusPhoto: ALAMY By Wesley Johnson, Home Affairs Correspondent 9:39PM GMT 28 Nov 2012 Staff failed to check tens of thousands of tips-offs about overseas students including worries that some had not even enrolled at the start of term. The blunder meant 23,000 bogus students were allowed to remain in Britain when they should have been sent home, many of whom have still not been traced. John Vine, the independent chief inspector of borders and immigration, said it demonstrated a ‘significant failure,’ while MPs called for officials to hand back their bonuses. It also emerged that compliance officers who visited universities and colleges had no powers of arrest, so could take ‘little or no action’ even if they found someone had no right to be in the country. Some 153,000 warnings were issued by sponsors in the three years to March this year, but inspectors found the agency had no targets to address them and “they were only dealt with when resources permitted”. “There is little point in requiring universities and colleges to notify the agency of such cases unless the agency develops the willingness and capacity to identify, curtail the leave of, and remove students who are no longer complying with the terms of their entry clearance,” Mr Vine said. It comes after a damning report last week found the agency made virtually no effort to trace more than 120,000 asylum seekers and migrants, despite reassuring MPs that “extensive checks” were being carried out. Jonathan Sedgwick, the agency’s director of international operations and visas, and its former chief executive Lin Homer both apologised to MPs for inadvertently supplying the wrong information. Keith Vaz, chairman of the Commons home affairs select committee, said it was “extremely disappointing that last week’s damning report did not mark the end of revelations about UKBA’s incompetence”. “Both the committee and the government have been clear about the importance of removing bogus students from this country,” he said. “On the basis of these two reports, senior officials at the UKBA who oversaw this shambles should hand their bonuses back immediately.” The figures will make uncomfortable reading for the Coalition which has pledged to clampdown on bogus students and has closed down 500 colleges in the past 18 months. In August border officials stripped London Metropolitan University of its right to sponsor non-EU students leaving more than 2,000 students facing deportation. In today’s report, Mr Vine said he could find “no evidence that targets were in place to effectively manage notifications to the agency from sponsors that students were, for example, not attending courses”. “Over 150,000 notifications had accumulated and were awaiting action, meaning that potentially thousands of students had retained leave to remain when they should not have done so,” he said. “This was a significant failure.” Mr Vine also drew a “concerning parallel between the agency’s lack of proactivity on these cases and its failure to deal with the 159,000 cases in the migration refusal pool”, which lists people refused permission to stay in the UK but who have not been traced. More than 350,000 applications for student visas were made in 2010/11 and, at the time of the inspection between the end of April and July, 2,100 universities, colleges and language schools were registered as sponsors. The 153,000 warnings over potential bogus students included 62,085 reports of a significant change to a student’s circumstances, 29,001 reports of a university or college having stopped sponsoring a student and 16,314 warnings that a student had discontinued his or her studies. A further 31,930 notifications warned that a student had failed to enrol on the course within the correct timeframe, 11,697 said students had missed contacts without permission and 1,766 reported a student may have breached the conditions of his or her leave to remain in the UK. Mr Vine added that compliance officers who visited universities and colleges “did not have a power of arrest and could take little or no action if they encountered someone who was in breach of immigration laws”. If they found a student who had overstayed under the terms of their existing visa, the officer could only refer the issue to an enforcement team, he said. “They had to leave the sponsor premises and the student and hope that the follow-up action was carried out. “This was an area of weakness which the agency should address.” Chris Bryant, the shadow immigration minister, said: “Time and time again the chief inspector has found problems with UKBA. “The blame for this lies squarely at Theresa May’s door for cutting 5,000 staff from UKBA.” Sir Andrew Green, chairman of the Migration Watch UK campaign group, added the report showed “tens of thousands of students seem to have disappeared”. “Bogus students are running circles round the Home Office who are seriously under-staffed,” he said. “The way to deal with this is to weed out these students before they arrive and interviews are the way to do it.” But Mark Harper, the immigration minister, said the government was tackling the “historically high levels of abuse in the student visa system”, toughening up the rules “to ensure that genuine students are not taken advantage of by organisations looking to sell immigration not education”. A UKBA spokesman added the agency reviewed all the cases in May and curtailed the leave of 23,000 students. Work is under way to trace them and remove them from the UK. “There were a number of notifications that were outstanding - these have now been worked through,” he said. “Compliance action has been taken where necessary and as a result over 23,000 students have had their leave curtailed. “We have taken action to make sure these people have left the country through our work with Capita. “We prefer people to leave the UK voluntarily - those who do not depart voluntarily will continue to be removed.” | Mid | [
0.6221198156682021,
33.75,
20.5
] |
Neurofibrillary tangles are one of the primary hallmarks of Alzheimer disease, and closely correlate with clinical severity. They consist of hyperphosphorylated tau that aggregates in the neuronal cell body. Cross sectional histological studies suggest that tangles kill neurons. Tau disaggregation is thus a major target of the pharmaceutical industry, with at least one drug already in human clinical trials. However, recent data suggest that tangles may not be toxic. We propose to test an alternative hypothesis, in which soluble tau induced toxicity leads to activation of apoptosis related cascades, followed by tangle formation. In order to test this model, we have developed in vivo multiphoton based longitudinal imaging techniques for tangles, caspase activation, and propidium iodide (a marker of loss of membrane integrity). Aim 1 applies this approach to Tg4510 P301L tau mice that develop NFT and neuronal loss. Surprisingly, we see caspase activation that appears to precede and predict tangle formation. We will also use array tomography, an advanced microscopic method using ultrathin sections of tissue, to determine the characteristics of the caspase positive, tangle negative cells to test the hypothesis that kinase activation leads to phosphorylation of tau, and that caspase activation leads to the truncation of tau -the combination of which causes tau aggregation into a tangle. We will use gene transfer and pharmacological studies to further dissect this pathway, to ask whether caspase activation, and caspase truncation of tau, are necessary or sufficient to cause tangle formation, neuronal distress or death. Aim 2 asks if NFT remain in viable cells and are long lived, or if they are toxic to the neurons in which they are found either in terms of structure or function. These experiments take advantage of the power of longitudinal in vivo multiphoton imaging to follow the fate of individual tangle bearing neurons for weeks to months. We will also test the hypothesis that tangle bearing neurons are excluded from participation in normal neural system activation from physiological stimuli by exposing animals to an enriched environment, then examining individual neurons in hippocampal subfields for immediate early gene (Arc) expression and the presence or absence of tangles. Aim 3 will rigorously test the hypothesis that wild type, nonmutant tau, undergoes similar phenomenon and that the toxic effects of tau over expression are due, in large part, to soluble tau. We take advantage of 3 models: examination of an alternative transgenic model, the hTau mice which express a minigene of wild type human tau (on a tau null background), introduction of wild type tau (or truncated forms of tau) into wild type mice using gene transfer approaches with AAV2 gene vectors, and the Tg4510 mice, which harbor a tet-response element driving the tau gene. These models allow comparison of wild type and mutant tau, and will also allow us to distinguish te effects of soluble tau from those of misfolded or aggregated tau. Taken together, our proposed studies will test the hypotheses that a non-tangle related mechanism of tau toxicity initiates apoptotic cascades, and that tangles may be a relatively nontoxic, long lived species. The results will have direct impact on design of therapeutic agents destined for clinical trials. | Mid | [
0.5714285714285711,
32,
24
] |
Severely Stumped There's allegory and there's excess, and in his latest, longest feature to date, Czech animator-cum-director Jan Svankmajer seems to have lost sight of the line between making his point and gouging us with it. Our story focuses on a loving couple in Prague (Veronika Zilková and Jan Hartl), whose hopeful smiles are being rotted out by the dismay of fertility problems. Observed by a little neighbor girl (Kristina Adamcová, excellent) they feign pregnancy and parenthood with an anthropomorphized tree stump that magically and monstrously comes to life, hungry for human flesh. (Our friends at Earth First! oughta love this.) Issuing a derisive statement about human gluttony, Svankmajer's project doesn't want for uniqueness; it's just that his nasty baby's too obvious for the faithful and too icky for the uninitiated, arriving less as a profound proclamation than a protracted peculiarity. In addition to an animated folktale to parallel the story, Svankmajer litters his work with moral appraisals and grotesqueries--often simultaneously--yet Little Otik spends much of its screen time struggling between tedious gross-out redundancy and pseudo-porn. Still, heavy-handed delivery notwithstanding, this thing is matched by little in terms of sheer imagination and social resonance. | Low | [
0.5,
26.75,
26.75
] |
A judge has dismissed a lawsuit against Hain Celestial over the marketing of its BluePrint high-pressure-processed (HPP) juices on the grounds that the plaintiff derailed his own case by submitting scientific papers to the court which contradicted his own arguments. What you can and can’t say about HPP-treated beverages without getting into legal hot water has been a subject of intense debate recently, with the FDA confirming that you “can't call [a juice] ‘fresh ‘if you put it under HPP [see 21 CFR 101.95 ], but acknowledging that with respect to the word ‘raw’, there is no specific regulation. Meanwhile, manufacturers of some HPP-treated juices have been slapped with false advertising lawsuits alleging that shoppers have been duped into paying over the odds for a product that is essentially the same as regular heat pasteurized juice. Plaintiff: BluePrint products are nothing more than run-of-the-mill, pasteurized juices Hain Celestial, which owns the BluePrint Cleanse super-premium juice brand, was one of the most high profile targets, finding itself at the receiving end of a class action lawsuit filed in California last December by plaintiff Samuel F Alamilla alleging that it falsely advertises its HPP-treated juices as ‘Unpasteurized’ and ‘100% Raw’. Alamilla also alleged that HPP’s effects are “identical to those of traditional pasteurization – inactivated enzymes, inactivated probiotics, altered physical properties of the product, and denatured proteins” and that the BluePrint products are therefore “nothing more than run-of-the-mill, pasteurized juices”. Judge: The articles the plaintiffs cite contradict the allegation upon which their entire complaint hinges However, in a July 3 order dismissing the case with prejudice (which means it is effectively closed), US district judge Vince Chhabria pointed out that to support his arguments, the plaintiff had submitted academic papers which undermined his own case. Alamilla, noted Chhabria, “quotes and incorporates by reference an article that concludes that pressurization has ‘little or no effects on nutritional and sensory quality aspects of foods’,” while “both articles repeatedly make the point that pressurization has less impact on nutritional value than pasteurization”. And this effectively contradicts his central argument, added Chhabria, who did not however directly address whether HPP products should be considered 'raw'. “The articles the plaintiffs cite thus contradict the allegation upon which their entire complaint hinges—namely, that pressure treatment deprives juice of nutritional value to a similar degree as pasteurization. Accordingly, the complaint is dismissed with prejudice.” Avure: HPP products should be considered raw Speaking to FoodNavigator-USA earlier this year, leading HPP provider Avure Technologies Inc (which is not named in the lawsuit), said HPP doesn't have the destructive effects claimed by some of its detractors. A similar case filed against Suja Life over claims made about its HPP-treated juices was voluntarily dismissed in May 2014. However, the firm no longer uses the word 'raw' on its packaging Indeed, Dr Errol Raghubeer, VP microbiology & food technology at Avure, pointed out that one of the primary reasons firms use HPP rather than traditional heat-pasteurization is precisely because key nutrients are not damaged. He told FoodNavigator-USA: “Under the HPP conditions used for the commercial application of HPP to juice and other food products, vitamins such as ascorbic acid, niacin and folic acid in orange juice; bioactive compounds such as chlorophyll and lutein in wheat grass; phytochemicals such as chicoric and chlorogenic acids in Echinacea purpurea; and food enzyme systems such as polyphenol oxidase and pectin methyl esterase, among others, are not affected.” Asked about probiotics, he said: “Most probiotic microorganisms (strains of lactic acid bacteria) are not significantly inactivated under these processing conditions. These strains of bacteria quickly reach original population levels after HPP. “These are the primary microbiological determent of the shelf life of HPP products and it is the reason, together with the control of enzyme activity, that HPP products require refrigeration for microbiological and chemical stability and should be considered raw.” Attorney: No reasonable consumer could think that packaged juices are not processed in any way Meanwhile, Rebecca Cross, an attorney at San Francisco-based law firm BraunHagey & Borden LLP, argued that consumers generally understand 'raw' to mean unheated, adding: "No reasonable consumer could think that packaged juices are not processed in any way." What is high pressure processing? HPP allows products to be treated in their final packaging, with flexible containers carrying the product into a high-pressure chamber, which is flooded with cold water and pressurized. The pressure causes lethal damage to the cellular structure of bacteria, molds and yeasts, but maintain colors, textures, flavors and nutrients that can be damaged by heat treatment, enabling firms to significantly increase the shelf-life of products and retain their ‘clean-label’ credentials by avoiding additives. A judge has dismissed a lawsuit against Hain Celestial over the marketing of its BluePrint high-pressure-processed (HPP) juices on the grounds that the plaintiff derailed his own case by submitting scientific papers to the court which contradicted his own arguments. | Low | [
0.535372848948374,
35,
30.375
] |
China’s COFCO Group is merging a pair of real estate developers with a combined market cap of $4.7 billion dollars as the state-owned conglomerate follows through on restructuring plans related to state-owned enterprise reform and cross-border transactions first announced in January. The move brings the equity listing of one of China’s biggest commercial real estate developers back to a mainland exchange at the same time that the government is urging its largest tech players to list in Shanghai or Shenzhen. Shenzhen-listed COFCO Property will buy its controlling stake in Joy City for RMB 14.76 billion ($2.35 billion) from Vibrant Oak Ltd, a wholly-owned subsidiary of COFCO, a filing to the Shenzhen Stock Exchange shows. In return, Vibrant Oak will get 2.14 billion shares issued by COFCO Property. COFCO Aims for Real Estate Synergy Shanghai Joy City, which will soon be owned by COFCO Property “The transaction will inject new commercial real estate elements into the core business of the company and release the synergistic effect of the integration of the residential and commercial sectors,” COFCO Property said in the statement. “After the completion of the transaction, COFCO Property will become COFCO’s sole platform that covers residential and commercial real estate.” COFCO Property and Joy City Property could then allocate resources more effectively, and realise the sharing of both risks and benefits, the company added. COFCO Property is also planning to issue shares to no more than 10 investors to raise as much as RMB 2.4 billion ($382 million) for the development of two projects, the statement says. The company plans to allocate RMB 916 million ($146 million) to COFCO Landmark Plaza and RMB 1.5 billion to a Joy City shopping mall in Hangzhou. Hong Kong-listed Joy City Property was known as COFCO Land Holdings until 2015, when it was renamed to highlight the flagship Joy City shopping centre brand. Food Conglomerate Part of State Restructuring China’s biggest foodstuffs conglomerate has been undertaking a company-wide restructuring programme as the central government strives to make state-owned companies more efficient. In July 2014, COFCO was selected as one of six central government-controlled state-owned enterprise groups to pilot mixed-ownership reforms. The group embarked on its restructuring program in February 2015 when the government approved its reform plan. COFCO Merges Commercial and Residential Real Estate Divisions Based out of Shenzhen, COFCO Property focuses on residential and industrial property development. It owns projects in 12 first and second-tier cities including Beijing, Shanghai, Shenzhen, Chengdu, Shenyang and Yantai, according to its corporate website. Hong Kong-listed Joy City Property primarily engages in the development, operation, sales, lease and management of commercial complexes under the flagship brand “Joy City (大悅城)”. As of late 2016, the Joy City has nine Joy City urban complexes in seven mainland cities including Beijing, Shanghai, Tianjin, Shenyang, Yantai, Hangzhou and Chengdu. It owns Beijing COFCO Plaza and Hong Kong COFCO Tower. | Mid | [
0.624434389140271,
34.5,
20.75
] |
**PURPOSE:** Patients undergoing mastectomy and DIEP flap breast reconstruction may experience psychosocial distress in the perioperative period. We hypothesized that preoperative patient and family education improves levels of anxiety, and increases excitement for surgery as well as level of preparedness. **METHODS:** An educational class for patients and families preparing for DIEP flap surgery was initiated. The class was held on the in-patient floor where subjects would be recovering. The session was led by a plastic surgeon, a floor nurse, and a mid-level practitioner who was on the inpatient care team. Participants toured the inpatient unit, and were oriented to rooms. A group presentation was held discussing details around each day in the hospital, flap monitoring, pain management, perioperative goals, and discharge instructions. Patients were asked to complete a survey pre- and post-class, as well as upon discharge. **RESULTS:** All patients who attended educational sessions reported positive significant change in preoperative levels of anxiety, excitement, and preparedness. The majority of subjects (94%) thought that the course was very helpful. Postoperatively, subjects described significantly less anxiety during their inpatient stay than pre- and post- class and felt more prepared for what they experienced in the hospital. **CONCLUSION:** Pre-surgery patient education including detailed information about perioperative care, as well as exposure to inpatient facilities and pertinent providers significantly decreases levels of anxiety and increases excitement and preparedness for DIEP surgery. These findings highlight the importance of patient instruction prior to autologous breast reconstruction and stress the need for structured information sessions for prospective DIEP candidates. | High | [
0.6996197718631171,
34.5,
14.8125
] |
Q: Which one is better: NOT EXIST [data] vs ISNULL([data], '') = 0 The situation In an attempt to find a row where a specific column has a null value, one of my colleagues verified if data in a column is null by making the data empty if null: IF (SELECT * FROM [table] WHERE ISNULL([column], '')) = '' But from I understood from multiple example here on Stack Overflow (example 1 and example 2), this form is more common: IF EXIST (SELECT [column] FROM [table]) By trying to make our code more performant and by trying to adopt similar coding behavior/standard we came across this interrogation. I expect the second way to be more performant, because it does not call a function, but I am far from being an expert in SQL. The question: Which one is more performant? Which one is better practice? A: In an attempt to find a row where a specific column has a null value, one of my colleague verify if a data in a column is null by making the data empty if null: ...WHERE ISNULL([column], '') = '' Regardless of any other efficiencies that can be found, it seems a bit silly to use ISNULL() when instead this condition can very easily be expresseed as: WHERE [column] IS NULL Now, in cases when you are needing to test to see if "at least 1" row meets a particular condition, then yes, using EXISTS is nearly always (maybe even always) more efficient than not using EXISTS because the EXISTS operator is designed to exit upon finding the first row. When no rows are returned then maybe both methods are equivalent, but if at least one row is present, then the EXISTS is definitely better because it won't process any additional result rows since the answer has already been logically determined as true. The efficiency is more apparent when there are many rows that meet the filtering condition(s). Hence, the most efficient means of doing this particular test would be: IF (EXISTS(SELECT * FROM [Table] WHERE [Column] IS NULL)) BEGIN ... END; So yes, try to always use EXISTS (whenever possible). And please read the MSDN page for the EXISTS operator as it has additional info regarding using it in WHERE clauses. For info on how to test for efficiency, please refer to the related question that you posted on DBA.StackExchange: Performance and profiling on SELECT * FROM [table] ISNULL([column], '') = '' VS EXIST (SELECT * FROM [table] WHERE [condition]) | Mid | [
0.552699228791773,
26.875,
21.75
] |
OAKLAND — Twelve workers, some left trapped knee-deep in wet concrete and others dangling from scaffolding, were injured Friday morning when a building under construction in the Pill Hill area partially collapsed, authorities said. Workers were in the process of pouring concrete on the second floor when scaffolding collapsed, causing some to fall more than 10 feet and land in “quicksand-like” fresh cement, officials said. Some were able to get to safety on their own and others were assisted by firefighters. When emergency crews arrived, workers were using shovels to dig their colleagues out of the wet concrete. Footage from a news helicopter showed firefighters tending to at least three workers, two of whom were strapped to stretchers. The injured were taken to hospitals for cuts, bruises and strains, but no fatalities or major injuries were reported. Oakland Fire Battalion Fire Chief Ian McWhorter, who was still cleaning wet cement off his boots almost four hours later, said earlier the on-site workers “did an excellent job of extricating” their fellow workers before firefighters arrived and took over. McWhorter said the cement was “kind of like quicksand” and rescuers used plywood and planks to reach trapped workers so they would not sink. The collapse was reported about 9:34 a.m. on Hawthorne Street between Broadway and Webster Street near Summit Medical Center. What caused the structure to fail was not immediately known. The site, 3093 Broadway, is the former Bay City Chevy dealership and slated to become 423 wood-frame apartments over two stories that include concrete podiums and retail space on the ground floor, according to the website of the general contractor, Johnstone Moyer Inc. A person who answered the phone at the San Carlos-based company declined to comment. A spokeswoman for the developer, CityView, did not immediately have information. The project is part of a larger plan to turn the old Auto Row on Broadway into a neighborhood with homes and retail. The construction site abuts Sprouts Market. Jerry Ogden was on the 10th floor of the nearby medical center when the collapse happened, and said he and others “felt a small shake. Everyone assumed it was a small earthquake and we just went about our business.” CalOSHA representatives were on the scene as well as city building engineers to determine what caused the collapse. Numerous streets in the area were shut down during the rescue operation. Check back for updates. Staff writer David DeBolt contributed to this story. | Low | [
0.5,
33.5,
33.5
] |
...only one of the major statewide candidates had filed a post-election report. Secretary of State Ruth Johnson, a Republican who defeated Democrat Jocelyn Benson, filed her report a day early on Wednesday. | Mid | [
0.60759493670886,
36,
23.25
] |
H04L63/08—Network architectures or network communication protocols for network security for supporting authentication of entities communicating through a packet data network H04L63/0892—Network architectures or network communication protocols for network security for supporting authentication of entities communicating through a packet data network by using authentication-authorization-accounting [AAA] servers or protocols Abstract A method, device and system for obtaining a local domain name are provided. A Dynamic Host Configuration Protocol (DHCP) request from a User Equipment (UE) is received, in which the request carries an option for indicating returning a domain name of a local domain where the UE is located; and the domain name of the local domain where the UE is located is obtained according to the DHCP request, and the domain name of the local domain where the UE is located is carried in a DHCP reply message to be returned to the UE. A device and system for obtaining a local domain name are also provided, which solve the problem that a user is incapable of obtaining a local domain name after full authentication, so that a UE can perform fast re-authentication during a handover, thereby reducing a handover delay and improving the user experience. Description CROSS-REFERENCE TO RELATED APPLICATION This application is a continuation of International Application No. PCT/CN2009/072618, filed on Jul. 3, 2009, which is hereby incorporated by reference in this entirety. FIELD OF THE INVENTION The present invention relates to the field of communications, and in particular, to a method, device and system for obtaining a local domain name. BACKGROUND OF THE INVENTION An Extensible Authentication Protocol (EAP) defines an authentication and key management architecture. An EAP authentication method is end-to-end authentication between an EAP client and an EAP server. An EAP packet can be borne by different protocols between different network entities on an authentication path. For example, an Authentication, Authorization and Accounting (AAA) protocol is adopted between an authenticator and the EAP server, which may be Diameter, Radius, or the like. The EAP authentication is widely applied in network access control. As shown in FIG. 1 which is an EAP authentication model: An Extensible Authentication Protocol (EAP)-client, EAP client, also called a peer or a supplicant (all of these names can be used interchangeably), is a function entity of a user terminal, and is configured to respond to the EAP authentication initiated by an authenticator on a link and implement the authentication between the EAP client and an EAP server. The authenticator is generally located on a Network Access Server (NAS), and is configured to initiate an EAP authentication process on the link, so as to implement the authentication between the EAP client and the EAP server. During the authentication process, the authenticator forwards an EAP message and performs underlying protocol conversion. For example, an EAP packet of the EAP client borne by a layer 2/3 protocol is received, a packet header of the layer 2/3 protocol is removed, and then the EAP packet is encapsulated through the AAA protocol and is sent to the EAP server. The EAP server, also called a backend authentication server, an AAA server, or a re-authentication server (during re-authentication), or called a domain server for short, is configured to provide the authenticator with an authentication service, that is, authenticate the EAP client. When a node leaves a home domain, after the node performs a complete EAP authentication with a home server, a shared key is set up by the home domain server for the node (the EAP client) and a local domain server. When the node performs re-authentication in a local domain, the node can use the key to perform authentication with the local domain server, in which the process for generating the key of the re-authentication is as follows. The shared key of the local domain server and the EAP client is called a Domain Specific Root Key (DSRK). The calculation method of the key is DSRK=KDF (EMSK, Domain_ID|NULL|Peer_ID|Key_length), where “|” is a connecting symbol, for example, in A|B, if A represents a character string “good” and B represents “night”, A|B represents “good night”; KDF represents a key derivation function, generally a unidirectional Hash function; EMSK is an extended master session key; Domain_ID is a local domain name; Peer_ID is a user identity; and Key_length is a key length. Since the local domain server does not have the master key EMSK for generating the DSRK (which is saved on the home EAP server and the EAP client), the local domain server needs to obtain the master key EMSK from the home EAP server. The process of obtaining the master key EMSK is classified into an implicit process and an explicit process. The implicit process is an implicit EAP Re-authentication Protocol (ERP) bootstrapping process, which is included in a full authentication process, in which the local domain server requests, from the home domain server, informations relevant to a key such as the DSRK. The explicit process is an explicit ERP bootstrapping process, which is initiated by the EAP client when the EAP client does not have a local domain name, in which the local domain server may also incidentally request, from the home domain server, the informations relevant to a key such as the DSRK. When the node hands over from one authenticator to a new authenticator during movement, or re-acknowledgement of its accessing (re-authentication) is performed, the existing EAP architecture requires that the node perform a complete EAP process with the home domain authentication server. Generally, one complete EAP authentication process requires multiple rounds interaction of a EAP authentication message. Moreover, the distance from the current authenticator to the home authentication server is long, and multiple hops exist. Since the EAP client does not know the local domain name to which the client belongs, a full authentication process must be performed again. Therefore, the node needs to spend a long time performing the complete authentication once, when the node leaves the home domain. Network accessing authentication and key management during the handover are one of main factors causing a handover delay, and the handover delay caused by the re-authentication performed by the node is one of the biggest problems of the mobile network. SUMMARY OF THE INVENTION Accordingly, main objects of the embodiments of the present invention are to provide a method, device and system for obtaining a local domain name, to solve the problem that a user is incapable of obtaining a local domain name after full authentication, so that a User Equipment (UE) can perform fast re-authentication during a handover, thereby reducing the handover delay and improving the user experience. In order to achieve the above objectives, the present invention provides the following technical solutions. An embodiment of the present invention provides a method for obtaining a local domain name, where the method includes: receiving a Dynamic Host Configuration Protocol (DHCP) request from a UE, in which the request carries an option for indicating returning a domain name of a local domain where the UE is located; and obtaining, according to the DHCP request, the domain name of the local domain where the UE is located, and carrying, in a DHCP reply message to be returned to the UE, the domain name of the local domain where the UE is located. An embodiment of the present invention provides another method for obtaining a local domain name, where the method includes: sending a DHCP request to a first server, in which the request carries an option for indicating returning a domain name of a local domain where a UE is located; and receiving a DHCP reply message returned by the first server, and obtaining, from the reply message, the domain name of the local domain where the UE is located. An embodiment of the present invention provides a device for obtaining a local domain name, where the device includes: a first receiving unit, configured to receive a DHCP request from a UE, in which the request carries an option for indicating returning a domain name of a local domain where the UE is located; an obtaining unit, configured to obtain, according to the DHCP request, the domain name of the local domain where the UE is located; and a first sending unit, configured to carry, in a DHCP reply message to be returned to the UE, the domain name, obtained by the obtaining unit, of the local domain where the UE is located. An embodiment of the present invention provides another device for obtaining a local domain name, where the device includes: a second sending unit, configured to send a DHCP request to a first server, in which the request carries an option for indicating returning a domain name of a local domain where a UE is located; and a second receiving unit, configured to receive a DHCP reply message returned by the first server, and obtain, from the reply message, the domain name of the local domain where the UE is located. An embodiment of the present invention provides a system for obtaining a local domain name, where the system includes: a UE, configured to send a DHCP request to a first server, in which the request carries an option for indicating returning a domain name of a local domain where the UE is located; and receive a DHCP reply message returned by the first server, and obtain, from the reply message, the domain name of the local domain where the UE is located; and a first server, configured to receive the DHCP request from the UE; and obtain, according to the DHCP request, the domain name of the local domain where the UE is located, and carry, in the DHCP reply message to be returned to the UE, the domain name of the local domain where the UE is located. It can be seen from the specific implementation solutions according to the embodiments of the present invention that, the UE sends the DHCP request to the first server, in which the request carries the option for indicating returning the domain name of the local domain where the UE is located; and the first server, according to the DHCP request, carries, in the DHCP reply message to be returned to the UE, the domain name of the local domain where the UE is located, which solves the problem that a user is incapable of obtaining a local domain name after full authentication, so that the UE can perform fast re-authentication during a handover, thereby reducing a handover delay and improving the user experience. BRIEF DESCRIPTION OF THE DRAWINGS FIG. 1 shows an EAP authentication model in the prior art; FIG. 2 is a flow chart of a method for obtaining a local domain name according to an embodiment of the present invention; FIG. 3 is a flow chart of another method for obtaining a local domain name according to an embodiment of the present invention; FIG. 4 is a flow chart of a specific implementation for obtaining a local domain name according to an embodiment of the present invention; FIG. 4a is a schematic structural view of a local domain name option in a DHCP Version 4 (DHCPv4) message according to an embodiment of the present invention; FIG. 4b is a schematic structural view of a local domain name option in a DHCP Version 6 (DHCPv6) message according to an embodiment of the present invention; FIG. 5 is a flow chart of another specific implementation for obtaining a local domain name according to an embodiment of the present invention; FIG. 6 is a schematic structural view of a device for obtaining a local domain name according to an embodiment of the present invention; FIG. 7 is a schematic structural view of another device for obtaining a local domain name according to an embodiment of the present invention; and FIG. 8 is a schematic structural view of a system for obtaining a local domain name according to an embodiment of the present invention. DETAILED DESCRIPTION OF THE EMBODIMENTS In order to the make the objectives, technical solutions, and advantages of the present invention more comprehensible, embodiments of the present invention are further described in detail in the following with reference to the accompanying drawings. Apparently, the embodiments to be described are only a part rather than all of the embodiments of the present invention. Persons of ordinary skill in the art can derive other embodiments based on the embodiments of the present invention without creative efforts, which all fall within the scope of the present invention. FIG. 2 is a flow chart of a method for obtaining a local domain name according to an embodiment of the present invention. The method includes: Step S200: A DHCP request of a UE is received, in which the request carries an option for indicating returning a domain name of a local domain where the UE is located. The UE may be a user, a user terminal, an ERP client, a DHCP client, a peer, a supplicant, or the like, all of which have the same physical meaning in this solution. The domain name of the local domain where the UE is located, called a local domain name for short, is a name of a domain where a current network to which the UE is attached is located. The current network mainly refers to a visited network, and may also be a home network. Step S202: The domain name of the local domain where the UE is located is obtained according to the DHCP request, and the domain name of the local domain where the UE is located is carried in a DHCP reply message to be returned to the UE. The obtaining the domain name of the local domain where the UE is located is specifically as follows. The domain name of the local domain where the UE is located is obtained from a first server itself; or after a second server receives the DHCP request and inserts the domain name of the local domain where the UE is located into the DHCP request, the domain name of the local domain where the UE is located is obtained from the DHCP request, into which the domain name of the local domain where the UE is located is inserted and which is forwarded by the second server, in which the domain name of the local domain where the UE is located is obtained by the second server from a third server. The first server may be a DHCP server, in which the DHCP server is preferably located in a local network, and may also be located in a home network. The second server may be a NAS which is used as a relay or an agent of the DHCP server, and may also be a DHCP relay or a DHCP agent, or may implement a relay or agent function of the DHCP server through an internal module interface between an authenticator and a DHCP relay/agent. The second server and the first server may be separated or coexist physically. The third server is a local EAP server, a home EAP server, an AAA server with an EAP function, or an AAA server with an ERP function. The carrying, in the DHCP reply message to be returned to the UE, the domain name of the local domain where the UE is located specifically includes: setting the domain name of the local domain where the UE is located in a local domain name option, and encapsulating the local domain name option in the DHCP reply message to be sent to the UE. It can be seen from the specific implementation solution according to the embodiment of the present invention that, the DHCP request of the UE is received, in which the request carries the option for indicating returning the domain name of the local domain where the UE is located; and the domain name of the local domain where the UE is located is obtained according to the DHCP request, and the domain name of the local domain where the UE is located is carried in the DHCP reply message to be returned to the UE, which solves the problem that a user is incapable of obtaining a local domain name after full authentication, so that the UE can perform fast re-authentication during a handover, thereby reducing a handover delay and improving the user experience. FIG. 3 is a flow chart of another method for obtaining a local domain name according to an embodiment of the present invention. Step S300: A DHCP request is sent to a first server, in which the request carries an option for indicating returning a domain name of a local domain where a UE is located. The sending the DHCP request to the first server specifically includes the following step. The DHCP request is directly sent to the first server; or the DHCP request is sent to a second server, and after the second server receives the DHCP request and inserts the domain name of the local domain where the UE is located into the DHCP request, the DHCP request is forwarded to the first server through the second server, in which the domain name of the local domain where the UE is located is obtained by the second server from a third server. The domain name of the local domain where the UE is located, called a local domain name for short, is a name of a domain where a current network to which the UE is attached is located. The current network mainly refers to a visited network, and may also be a home network. Step S302: A DHCP reply message returned by the first server is received, and the domain name of the local domain where the UE is located is obtained from the reply message. The sending the DHCP request to the first server specifically includes: sending, by the second server, the DHCP request to the first server, in which the first server and the second server are integrated on one server or disposed separately. The UE may be a user, a user terminal, an ERP client, a DHCP client, a peer, a supplicant, or the like, all of which have the same physical meaning in this solution. The first server may be a DHCP server, in which the DHCP server is preferably located in a local network, and may also be located in a home network. The second server may be a NAS which is used as a relay or an agent of the DHCP server, and may also be a DHCP relay or a DHCP agent, or may implement a relay or agent function of the DHCP server through an internal module interface between an authenticator and a DHCP relay/agent, and may also be a server with an authenticator function and a DHCP relay/agent function. The second server and the first server may be separated or coexist physically. It can be seen from the specific implementation solution according to the embodiment of the present invention that, the DHCP request is sent to the first server, in which the request carries the option for indicating returning the domain name of the local domain where the UE is located; and the DHCP reply message returned by the first server is received, and the domain name of the local domain where the UE is located is obtained from the reply message, which solves the problem that a user is incapable of obtaining a local domain name after full authentication, so that the UE can perform fast re-authentication during a handover, thereby reducing a handover delay and improving the user experience. FIG. 4 is a flow chart of a specific implementation for obtaining a local domain name according to an embodiment of the present invention. Step S400: After accessing a network, a UE performs EAP full authentication. The UE may be a user, a user terminal, an ERP client, a DHCP client, a peer, a supplicant, or the like, all of which have the same physical meaning in this solution. Specifically, the UE performs EAP access full authentication with a third server, and after the authentication succeeds, the following steps are performed. The third server is a local EAP server, a home EAP server, an AAA server with an EAP function, or an AAA server with an ERP function. Step S402: The UE initiates a DHCP request message, in which the request carries an option for indicating returning a domain name of a local domain where the UE is located. The domain name of the local domain where the UE is located, called a local domain name for short, is a name of a domain where a current network to which the UE is attached is located. The current network mainly refers to a visited network, and may also be a home network. The DHCP request message may be a DHCP DISCOVERY message or a DHCP REQUEST message of DHCPv4, or a DHCP Solicit message, a DHCP Request message, or a DHCP Information Request message of DHCPv6. Option information for requesting the local domain name is carried in the request message. For the DHCPv4, a code of a local domain name option is carried in a Parameter Request List; and for the DHCPv6, the code of the local domain name option is carried in an Option Request Option. Specifically, for schematic structural views of the option for indicating information of returning the domain name of the local domain where the UE is located in the DHCP request message, reference can be made to FIGS. 4a and 4b. FIG. 4a is a schematic structural view of a local domain name option in a DHCPv4 message, in which the option is used for indicating or bearing the information of returning the domain name of the local domain where the UE is located. Code represents a serial number of the option for distinguishing the option from other options. For example, when Code is “100”, the option represents a local domain name option (a specified value may also be defined as a value of Code); when the value of Code is “101” (a specified value may also be defined as the value of Code), the option may also represent a sub-option of a relay-agent-information option, in which the sub-option is used for a DHCP relay/agent to insert local domain name information. Length represents a length of the option. Local Domain Name is used for indicating the domain name of the local domain where the UE is located, an encoding format of which is the same as that of a common domain name, for example, www.example.com. FIG. 4b is a schematic structural view of a local domain name option in a DHCPv6 message (a DHCPv6 local domain name option). “OPTION_LOCAL_DOMAIN_NAME” represents a code value of the DHCPv6 local domain name option. For example, if “OPTION_LOCAL_DOMAIN_NAME” is “103”, the option represents a local domain name option (a specified value may also be defined as the code value). Length represents a length of the option. Local Domain Name is used for indicating the domain name of the local domain where the UE is located, an encoding format of which is the same as that of a common domain name. The option in the message is extended to carry the domain name of the local domain where the UE is located, which omits the process for the UE to perform authentication again after the EAP full authentication, so that the UE can perform fast re-authentication, thereby reducing a handover delay. Step S404: A first server receives the DHCP request, and obtains, according to the request, the domain name of the local domain where the UE is located. Step S406: The domain name of the local domain where the UE is located is carried in a DHCP reply message to be returned to the UE. Specifically, the first server, for example, a DHCP server, sets the local domain name in a local domain name option according to the DHCP request, and then carries the local domain name option in the DHCP reply message to be sent to the UE. The reply message may be a DHCP DISOFFER message or a DHCP ACK message of the DHCPv4, or a DHCP Advertise message, a DHCP Reply message, or a DHCP Information Reply message of the DHCPv6. The first server may be located in a local network or a home network. Step S408: The UE receives the DHCP reply message and obtains the local domain name from the message. It can be seen from the specific implementation solution according to the embodiment of the present invention that, after the EAP full authentication performed by the UE succeeds, the UE initiates a DHCP request, in which the request carries information for indicating returning the domain name of the local domain where the UE is located, and the first server receives the DHCP request and carries the domain name of the local domain where the UE is located in the DHCP reply message to be returned to the UE, which solves the problem that a user is incapable of obtaining a local domain name after full authentication, so that the UE can perform fast re-authentication during a handover, thereby reducing a handover delay and improving the user experience. FIG. 5 is a flow chart of another specific implementation for obtaining a local domain name according to an embodiment of the present invention. Step S500: After accessing a network, a UE performs EAP full authentication. The UE may be a user, a user terminal, an ERP client, a DHCP client, a peer, a supplicant, or the like, all of which have the same physical meaning in this solution. Specifically, the UE performs EAP access full authentication with a third server, and after the authentication succeeds, the following steps are performed. Step S502: The third server sends an access success message containing local domain name information to a second server. Specifically, the UE performs EAP access full authentication with a third server, and after the authentication succeeds, the following steps are performed. The third server is a local EAP server, a home EAP server, an AAA server with an EAP function, or an AAA server with an ERP function. The second server may be a NAS which is used as a relay or an agent of a DHCP server, or may implement a relay or agent function of the DHCP server through an internal module interface between an authenticator and a DHCP relay/agent, and may also be a server with an authenticator function and a DHCP relay/agent function. The second server and the first server may be separated or coexist physically. Step S504: The second server receives and saves a domain name of a local domain where the UE is located. Step S506: The UE initiates a DHCP request message, in which the request carries an option for indicating returning the domain name of the local domain where the UE is located. The DHCP request message may be a DHCP DISCOVERY message or a DHCP REQUEST message of the DHCPv4, or a DHCP Solicit message, a DHCP Request message, or a DHCP Information Request message of the DHCPv6. Option information for requesting the local domain name is carried in the request message. For the DHCPv4, a code of the local domain name option is carried in a Parameter Request List; and for the DHCPv6, the code of the local domain name option is carried in an Option Request Option. Specifically, for schematic structural views of the option for indicating information of returning the domain name of the local domain where the UE is located in the DHCP request message, reference can be made to FIGS. 4a and 4b. The schematic structural views of the option have been described in detail in the description of FIG. 4 and will not be described herein again. Step S508: The second server receives the DHCP request, inserts the domain name of the local domain where the UE is located into the request, and forwards the DHCP request to the first server. Step S510: The first server obtains local domain name information of the network node from the request according to the received DHCP request, and carries the domain name of the local domain where the UE is located in a DHCP reply message to be returned to the UE. In step S508, the second server may also not insert the domain name of the local domain where the UE is located into the DHCP request when forwarding the DHCP request; and in step S510, when the DHCP server sends the DHCP reply message, the second server forwards the DHCP reply message, inserts the obtained domain name of the local domain where the UE is located into the reply message, and sends the domain name to the UE through the DHCP reply message. Step S512: The UE receives the DHCP reply message and obtains the local domain name from the message. It can be seen from the specific implementation solution according to the embodiment of the present invention that, after the EAP full authentication performed by the UE succeeds, the second server obtains the domain name of the local domain where the UE is located from the third server and stores the domain name of the local domain where the UE is located; when the UE initiates the DHCP request, the second server inserts the local domain name information into the DHCP request message to be sent to the first server; after receiving the DHCP request message, the first server obtains the local domain name information and carries, in the DHCP replay message to be sent to the UE, the local domain name information, which solves the problem that a user is incapable of obtaining a local domain name after full authentication, so that the UE can perform fast re-authentication during a handover, thereby reducing a handover delay and improving the user experience. FIG. 6 is a schematic structural view of a device for obtaining a local domain name according to an embodiment of the present invention. The device for obtaining a local domain name includes a first receiving unit 600, an obtaining unit 602, and a first sending unit 604. The first receiving unit 600 is configured to receive a DHCP request of a UE, in which the request carries an option for indicating returning a domain name of a local domain where the UE is located. The obtaining unit 602 is configured to obtain, according to the DHCP request, the domain name of the local domain where the UE is located. The first sending unit 604 is configured to carry, in a DHCP reply message to be returned to the UE, the domain name, obtained by the obtaining unit, of the local domain where the UE is located. The obtaining unit 602 is specifically configured to obtain the domain name of the local domain where the UE is located from the device itself; or after a second server receives the DHCP request and inserts the domain name of the local domain where the UE is located into the DHCP request, obtain the domain name of the local domain where the UE is located from the DHCP request, into which the domain name of the local domain where the UE is located is inserted and which is forwarded by the second server, in which the domain name of the local domain where the UE is located is obtained by the second server from a third server. The domain name of the local domain where the UE is located, called a local domain name for short, is a name of a domain where a current network to which the UE is attached is located. The current network mainly refers to a visited network, and may also be a home network. The UE may be a user, a user terminal, an ERP client, a DHCP client, a peer, a supplicant, or the like, all of which have the same physical meaning in this solution. The first server may be a DHCP server, in which the DHCP server is preferably located in a local network, and may also be located in a home network. The second server may be a NAS which is used as a relay or an agent of the DHCP server, and may also be a DHCP relay or a DHCP agent, or may implement a relay or agent function of the DHCP server through an internal module interface between an authenticator and a DHCP relay/agent. The second server and the first server may be separated or coexist physically. The third server is a local EAP server, a home EAP server, an AAA server with an EAP function, or an AAA server with an ERP function. The DHCP request message may be a DHCP DISCOVERY message or a DHCP REQUEST message of the DHCPv4, or a DHCP Solicit message, a DHCP Request message, or a DHCP Information Request message of the DHCPv6. Option information for requesting the local domain name is carried in the request message. For the DHCPv4, a code of a local domain name option is carried in a Parameter Request List; and for DHCPv6, the code of the local domain name option is carried in an Option Request Option. Specifically, for schematic structural views of the option for indicating information of returning the domain name of the local domain where the UE is located in the DHCP request message, reference can be made to the description of FIGS. 4a and 4b, and the details will not be described herein again. It can be seen from the specific implementation solution according to the embodiment of the present invention that, after EAP full authentication is implemented, the first receiving unit receives the DHCP request of the UE, in which the request carries information for indicating returning the domain name of the local domain where the UE is located; the obtaining unit obtains the domain name of the local domain where the UE is located according to the DHCP request; and the first sending unit carries the domain name, obtained by the obtaining unit, of the local domain where the UE is located in the DHCP reply message to be returned to the UE, which solves the problem that a user is incapable of obtaining a local domain name after full authentication, so that the UE can perform fast re-authentication during a handover, thereby reducing a handover delay and improving the user experience. FIG. 7 is a schematic structural view of another device for obtaining a local domain name according to an embodiment of the present invention. The device for obtaining a local domain name includes a second sending unit 702 and a second receiving unit 704. The second sending unit 702 is configured to send a DHCP request to a first server, in which the request carries an option for indicating returning a domain name of a local domain where a UE is located. The second receiving unit 704 is configured to receive a DHCP reply message returned by the first server, and obtain, from the reply message, the domain name of the local domain where the UE is located. The second sending unit is specifically configured to directly send the DHCP request to the first server; or send the DHCP request to a second server, and after the second server receives the DHCP request and inserts the domain name of the local domain where the UE is located into the DHCP request, forward the DHCP request to the first server through the second server, in which the domain name of the local domain where the UE is located is obtained by the second server from a third server. The first server may be a DHCP server, in which the DHCP server is preferably located in a local network, and may also be located in a home network. The second server may be a NAS which is used as a relay or an agent of the DHCP server, and may also be a DHCP relay or a DHCP agent, or may implement a relay or agent function of the DHCP server through an internal module interface between an authenticator and a DHCP relay/agent. The second server and the first server may be separated or coexist physically. The domain name of the local domain where the UE is located, called a local domain name for short, is a name of a domain where a current network to which the UE is attached is located. The current network mainly refers to a visited network, and may also be a home network. The device may be a DHCP server, in which the DHCP request message may be a DHCP DISCOVERY message or a DHCP REQUEST message of the DHCPv4, or a DHCP Solicit message, a DHCP Request message, or a DHCP Information Request message of the DHCPv6. Option information for requesting the local domain name is carried in the request message. For the DHCPv4, a code of a local domain name option is carried in a Parameter Request List; and for the DHCPv6, the code of the local domain name option is carried in an Option Request Option. Specifically, for schematic structural views of the option for indicating information of returning the domain name of the local domain where the UE is located in the DHCP request message, reference can be made to FIGS. 4a and 4b. It can be seen from the specific implementation solution according to the embodiment of the present invention that, after EAP full authentication is implemented, the second sending unit sends the DHCP request to the first server, in which the request carries information for indicating returning the domain name of the local domain where the UE is located; and the second receiving unit receives the DHCP reply message returned by the first server, and obtains, from the reply message, the domain name of the local domain where the UE is located, which solves the problem that a user is incapable of obtaining a local domain name after full authentication, so that the UE can perform fast re-authentication during a handover, thereby reducing a handover delay and improving the user experience. FIG. 8 is a schematic structural view of a system for obtaining a local domain name according to an embodiment of the present invention. The system for obtaining a local domain name includes a UE 802 and a first server 804. The UE 802 is configured to send a DHCP request to the first server after implementing EAP full authentication, in which the request carries an option for indicating returning a domain name of a local domain where the UE is located; and receive a DHCP reply message returned by the first server, and obtain the domain name of the local domain where the UE is located from the reply message. The first server 804 is configured to receive the DHCP request of the UE after the EAP full authentication is implemented; and obtain the domain name of the local domain where the UE is located according to the DHCP request, and carry, in the DHCP reply message to be returned to the UE, the domain name of the local domain where the UE is located. The system also includes a second server. The second server 806 is configured to obtain, from a third server, the domain name of the local domain where the UE is located, and store the domain name of the local domain where the UE is located; and after receiving the DHCP request and inserting the domain name of the local domain where the UE is located into the DHCP request, forward the DHCP request to the first server. The first server 804 is specifically configured to obtain, from the DHCP request forwarded by the second server, the domain name of the local domain where the UE is located, or obtain the domain name of the local domain where the UE is located from the first server itself. The UE may be a user, a user terminal, an ERP client, a DHCP client, a peer, a supplicant, or the like, all of which have the same physical meaning in this solution. The domain name of the local domain where the UE is located, called a local domain name for short, is a name of a domain where a current network to which the UE is attached is located. The current network mainly refers to a visited network, and may also be a home network. The first server may be a DHCP server, in which the DHCP server is preferably located in a local network, and may also be located in a home network. The second server may be a NAS, which is used as a relay or an agent of the DHCP server, and may also be a DHCP relay or a DHCP agent, or may implement a relay or agent function of the DHCP server through an internal module interface between an authenticator and a DHCP relay/agent, and may also be a server with an authenticator function and a DHCP relay/agent function. The second server and the first server may be separated or coexist physically. The third server is a local EAP server, a home EAP server, an AAA server with an EAP function, or an AAA server with an ERP function. Through the system for obtaining a local domain name according to the embodiment of the present invention and interaction between each UE and the first server in the system, the problem that a user is incapable of obtaining a local domain name after full authentication is solved, so that the UE can perform fast re-authentication during a handover, thereby reducing a handover delay and improving the user experience. Although the present invention is described above with some exemplary embodiments, the scope of the present invention is not limited thereto. Variations or replacements that can be easily thought of by persons skilled in the art within the technical scope of the present invention should be considered falling within the protection scope of the present invention. Therefore, the protection scope of the invention falls in the appended claims. Claims (4) What is claimed is: 1. A network server, comprising: a processor; and a memory coupled to the processor and storing computer-executable instructions, wherein the processor is configured to execute the computer-executable instructions to: store a domain name of a local domain for a user device based on an access success message received from a server in a home domain for the user device, wherein the access success message includes the domain name of the local domain, wherein the access success message indicates that the user device is authenticated in the home domain, and wherein the home domain is separate from the local domain; receive, after storing the domain name of the local domain in the network server, a Dynamic Host Configuration Protocol (DHCP) request from the user device, the DHCP request addressed to a DHCP server, wherein the DHCP request comprises an indicator indicating a request for the domain name of the local domain; update the DHCP request with the stored domain name of the local domain for the user device; and forward the updated DHCP request with the stored domain name of the local domain for the user device to the DHCP server. 2. The network server according to claim 1, wherein the network server includes a Network Access Server (NAS), a relay or proxy of the DHCP server, or a server with functions of Authenticator, DHCP relay/proxy. 3. A method for requesting a domain name, comprising: storing, by a network server, a domain name of a local domain for a user device based on an access success message received from a server in a home domain for the user device, wherein the access success message includes the domain name of the local domain, wherein the access success message indicates that the user device is authenticated in the home domain, and wherein the home domain is separate from the local domain; receiving, by the network server, a Dynamic Host Configuration Protocol (DHCP) request from the user device, the DHCP request addressed to a DHCP server, wherein the DHCP request comprises an indicator indicating a request for the domain name of the local domain for the user device, and wherein the DHCP request is received after the domain name of the local domain is stored by the network server; updating, by the network server, the DHCP request with the stored domain name of the local domain for the user device; and, forwarding, by the network server, the updated DHCP request with the stored domain name of the local domain for the user device to the DHCP server. 4. A non-transitory computer readable medium storing computer readable instructions which, when executed by a processor, cause the computer to perform a method, the method comprising: storing a domain name of a local domain for a user device based on an access success message received from a server in a home domain for the user device, wherein the access success message includes the domain name of the local domain, wherein the access success message indicates that the user device is authenticated, and wherein the home domain is separate from the local domain; receiving, after storing the domain name of the local domain, a Dynamic Host Configuration Protocol (DHCP) request from the user device, the DHCP request addressed to a DHCP server, wherein the DHCP request comprises an indicator indicating that the domain name of the local domain for the user device; updating the DHCP request with the stored domain name of the local domain for the user device; and, forwarding the updated DHCP request with the stored domain name of the local domain for the user device to the DHCP server. US133399432009-07-032011-12-29Method, device and system for obtaining local domain name Active2032-04-30US9602463B2 (en) | Mid | [
0.5397489539748951,
32.25,
27.5
] |
Outside the Memorial Student Center at Texas A&M University a group called “Texas A&M Anti-Racism” practiced protest chants. Their October 6 “No More Emails March” was one of several demonstrations this semester. This one was in response to multiple mass emails from university President Michael K. Young addressing on-campus racism – action protesters such as Emilio Bernal say doesn’t go far enough. “What we’re trying to say is we don’t want anymore emails, we don’t want anymore fake apologies,” Bernal says. “We want to see real change, we want to see more students and faculty of color here, we want to see a mandatory anti-racism class, and that’s just to begin with.” The Texas A&M Anti-Racism group formed last February after a group of touring high school students were the victims of hate speech. The group hopes to combat what they call a culture and history of racism at A&M. The group met with President Young and other university administrators last spring about creating a mandatory racism awareness class. Group member Justin Hale was a part of those meetings – he says Young was supportive. “A great quote he had coming out that meeting was ‘to deny racism at A&M is blind’ and I think he hit the nail on the head,” Hale says. But Hale says progress in forming the course is slower than he’d like. Administrators cite funding and faculty availability issues as a barrier but Hale is skeptical. “We’re at one of the most affluent schools in America, and especially the state of Texas,” he says. “We built a half a billion dollar stadium within two years, heck this year we’ve built a parking garage that they wanted within a couple of months. We have more than enough money and this has been an issue that has taken course over decades, over decades, so time is really just up.” The demand for such an anti-racism class mirrors pre-existing efforts within the university to revamp A&M’s International and Cultural Diversity or IDC credit – a degree requirement all students must fulfill in order to graduate. For administrators, it’s the obvious place to direct the student group’s demands, but Dr. Julie Harlin, co-chair of the Core Curriculum Committee, says a single class would be too difficult to implement. “When we’re trying to serve as many students as we have on this campus, 45,000 undergraduates, trying to have one course requirement has all kinds of challenges that logistically we could not navigate,” Harlin says. Right now there isn’t a single class at A&M that every student has to take. Vice President of Student Affairs Dr. Daniel Pugh says the it’s hard to fit a new class into every degree plan. “It’s got to fit across all of the different colleges and it’s got to fit within the constructs of what the state says we have to do within a core curriculum,” Pugh says. “And you can’t just add on another three hours or six hours – it’s got to fit within that degree number that’s there.” Instead of a single class labeled as “anti-racism”, the Core Curriculum Committee will propose a new requirement called “Cultural Discourse” filled with several different course options and a common online module. But students like junior Jessica Carachure doubt such courses would be welcomed, or effective, at all. “I feel like it’s hard to change people’s opinions on things and there would be a lot of conflicts coming up from that like people saying ‘I don’t need this class I already know this’ and stuff, so, I don’t know about that,” Carachure says. TAMU Anti-Racism member Amanda Gomez sees things differently. “People of color for decades on this campus have faced violence, not a few minutes of discomfort, not a class-period of discomfort – actually violence, verbal assault, physical assault,” Gomez says. “So I think two or three times a week, being in a class you might not want to be in isn’t so bad compared to that.” While TAMU Anti-Racism has been critical of what they see as a slow response by administrators to their complaints, pilot classes similar to the group’s proposals could be coming to the A&M campus as soon as next semester. | Mid | [
0.54147465437788,
29.375,
24.875
] |
County commits $450,000 for UMBC research facility Revenue, jobs cited in approval of funds September 10, 1991|By Dennis O'Brien | Dennis O'Brien,Baltimore County Bureau of The Sun Despite opposition from neighbors, Baltimore County Executive Roger B. Hayden has committed $450,000 toward construction of the $80 million research park at the University of Maryland Baltimore County. UMBC officials said yesterday that the county funds represent the first commitment of public money for the research center, which is to be built on 36 acres on the southern tip of the 500-acre Catonsville campus. The funds will cover one-third of the initial costs for roads and water and sewer improvements. UMBC needs the funds to secure a $1.4 million state loan from the Maryland Industrial and Commercial Redevelopment Fund to help pay the total $4.8 million expense for roads and utility lines, said Mark Behm, vice president of administrative affairs at UMBC. The proposed center promises the county $2 million in added annual property tax revenues and employment for up to 2,000 people, UMBC officials say. Mr. Hayden acknowledged community opposition to the project yesterday, but said he agreed to commit the money, which will come from next year's budget, because of the jobs and tax revenues the project will bring. "We have to have a balance between the people who need these jobs and the impact such projects have on the communities," he said. As news of the $80 million project has seeped out to community groups, some have come forward to object. Residents complain that the project will increase traffic and alter thecharacter of their streets and neighborhoods, many of which were there before the campus was built in the early 1960s. "In these times of economic uncertainty, there's no reason why the taxpayers should be subsidizing this kind of activity," said Kathleen Valdaras, president of the Maiden Choice Community Association, a group representing 2,500 homes neighboring the campus. The project's critics worry that it could be a white elephant. They say that nationwide, an estimated 50 percent or more of such research and development parks fail and point out that the University of Maryland Foundation is owed $800,000 on its first research park -- 466 acres in Bowie -- that after a decade of planning has attracted only one tenant. "By putting these commercial enterprises in there, it crosses over the line from being an academic institution to being a commercialized area," said William Bauman, past president of the Southwest Coalition, which also represents area communities. But Mr. Behm said the project will revitalize the area and has the support of business and community-based groups, including the Catonsville Chamber of Commerce. "There is certainly vocal opposition, but there's a lot of support out there as well," he said. He said university officials plan to request more money from the state Board of Public Works in November and hope to break ground next spring. Frank Traynor, a spokesman for Gov. William Donald Schaefer, said the governor is undecided about including money for the project in his proposals for the General Assembly. Plans call for 12 buildings, averaging three stories each, to be built by 2002. Private companies would rent state land but finance their own buildings. | Mid | [
0.582278481012658,
34.5,
24.75
] |
A day in the life of women with a serious mental illness: a qualitative investigation. Few studies have taken a holistic perspective to the lives of women with a serious mental illness (SMI). This qualitative study of women with an SMI describes and interprets women's experiences and provides a new understanding about the nature and needs of these women. A convenience sample of 30 poor, urban, predominantly African-American women with a diagnosis of an SMI was recruited from an ongoing National Institutes of Mental Health study. Data collection involved face-to-face, in-depth interviews. The interviews were audio-recorded and transcribed verbatim. Data analysis occurred concurrently with data collection using a modified constant comparative method. The majority of the women self-identified as African American, single, having completed high school, and at the time of the interview were either unemployed or on disability. The most common SMI was major depression. A common topic in the women's reflections on their lives was that of social disadvantage both before being diagnosed as well as after to their diagnosis with an SMI. Salient themes of their stories included social isolation, experiencing loss, and having a lack of control over one's own life decisions. The findings from this study revealed varied experiences among these women as well as the complexity of their situation. The enhanced understanding of women's situation will allow mental health professionals to improve the quality of life for women with an SMI by taking a contextual approach to the treatment of their mental illness. | High | [
0.65679012345679,
33.25,
17.375
] |
Steroidogenic acute regulatory (StAR) protein (p25) and prohibitin (p28) from cultured rat ovarian granulosa cells. This study has identified and characterized two intracellular proteins (25 and 28 kDa) during ongoing differentiation of rat granulosa cells isolated from preantral and early antral follicles. The identity of p25 was confirmed as the mitochondria associated StAR protein by western blotting analysis. In the culture conditions used, this protein was expressed only when granulosa cells were stimulated with FSH to produce progesterone. It is apparent that the steroidogenic differentiation of granulosa cells affects StAR expression. Amino acid sequence analysis of p28 identified it as prohibitin and was corroborated by western blot analysis with antibodies specific for rat prohibitin. During the ongoing differentiation of granulosa cells there were changes in the expression of p28/prohibitin. Although prohibitin is constitutively expressed in granulosa cells, there is an increase in the more acidic isoform of prohibitin when oestrogen concentrations are raised by increased production or exogenous addition. This increase in this acidic isoform of prohibitin is due to phosphorylation. It is possible that oestrogen induces phosphorylation of prohibitin and, thus, may be involved in the regulation of granulosa cell proliferation and the ontogeny of the ovarian follicle. | High | [
0.6615384615384611,
32.25,
16.5
] |
*z*z)*z))**(-3/14) assuming z is positive. z**(57/14) Simplify z**(7/6)*z*z**(-12/17)*z/(z*z*z/z**(1/12))*z/z**(-35) assuming z is positive. z**(2417/68) Simplify ((x**(5/6)/(x/x**(-6)))/(x**(5/6))**(-47))**(-47) assuming x is positive. x**(-1551) Simplify ((p**1)**(-1/17))**(-16)*(p**(1/2)*p**(-3))**(-18/11) assuming p is positive. p**(941/187) Simplify (p**(-1/2)*p)**(10/7)*(p**(-1))**(-45)*(p**6/(p*(p**(-2/11)/p)/p))**(8/5) assuming p is positive. p**(22024/385) Simplify (o**(2/15)/o*(o*o*(o**6*o)/o)/o*(o**(-1)*o)/o**(-3/5))/((((o/(o**(4/11)*o))/o)/o**(-5))/(o**(4/7)/o**3)) assuming o is positive. o**(772/1155) Simplify ((z*(z**(-1)/z)/z*z)**(-32))**(1/49)/((z**(-7/6)*z)/(z/z**(-11)))**(-4/7) assuming z is positive. z**(-926/147) Simplify (((((w*w/w**0)/w)**(2/87))**(-7))**11)**(10/3) assuming w is positive. w**(-1540/261) Simplify (o**(-27)/o**(-2/21)*(o/o**9)**(-2/11))**(-1/72) assuming o is positive. o**(5879/16632) Simplify ((((((s*s**(-1/4))/s)/s)/((s**4/s*s)/s))/(s**(3/7)/(s/(s**(-2)/s))))**(1/5))**(9/13) assuming s is positive. s**(-171/1820) Simplify (j**1*(j**(4/5)/j*j)/j)**(-9/2)/((j*j/(j/((j**(-1/5)*j)/j))*j*j)**(13/5)/((j**(-5)/j)/(j*j**1))) assuming j is positive. j**(-472/25) Simplify ((u*u/u**25)/(u/(u/((u*u**(-1/12)/u)/u))))/((u**(1/20)/u)/u)**(-9/2) assuming u is positive. u**(-3683/120) Simplify (((r**20/((r**(-12)/r)/r))**33)**35)**(-23) assuming r is positive. r**(-903210) Simplify (h**(-2/27)/(h/(h**(1/5)/h)*h))**(1/24)/((h/(h*h/(h*h**8)))/h**(-6))**(-2/19) assuming h is positive. h**(20837/15390) Simplify (((x*x**5*x*x*x**(-11))**(-4/3))**(-5/6))**(-38) assuming x is positive. x**(380/3) Simplify ((((z**(-4)/z)/(z*z**(-1)))**(-25/6))**2)**39 assuming z is positive. z**1625 Simplify (h*h**(-1/5)/h*h*h*h*h*h**(2/21)*h*h*h*h/(h/(h*h/h**(-21)*h)*h)*h*h**12)**(3/8) assuming h is positive. h**(563/35) Simplify u**35/u*u**16*u*(u*u**(-2/3))/(u*u*u**(1/27)) assuming u is positive. u**(1331/27) Simplify (j**(-3)/(j**(-4)*j*j)*(j*(j*j**(-1/2)/j)/j)/j*j**(-4))/((j*j**0/j*j*j**(1/5)/j)/(j/(j*j**(2/3)))**(-1/43)) assuming j is positive. j**(-8623/1290) Simplify (l/(l*l*l**(9/5)*l*l)*l**(-1/4)*(l/(l/l**(4/15)))/(l*l**20/l*l))**(35/2) assuming l is positive. l**(-10829/24) Simplify ((z/z**(-10)*z**(-1)*z/(z**(2/3)*z*z)*z/z**(-2/19))**36)**5 assuming z is positive. z**(32280/19) Simplify ((q**(1/6)*q)**(-1/3)/((q/q**(10/9))/(q**4/q)))**(-8) assuming q is positive. q**(-196/9) Simplify (((n/n**2)/(n/n**5))/(n**0)**(-25))/(n*n**4*n**(-3/5))**(-10) assuming n is positive. n**47 Simplify (h**(2/5)/h**(4/5))**(6/19)/(h**(-4/7)*(h/h**(-9/4)*h)/h*h**(-2/13)*(h*h**(-9))/h) assuming h is positive. h**(219547/34580) Simplify ((h/h**(-33))/h*h*h**(-2/13)/h*(h*h**25*h)/h**(-45))**48 assuming h is positive. h**(65424/13) Simplify (((x/(x*x**(1/2)*x*x))/x)**41/(((x**(-2/17)*x)/x)/(x/x**(-9))))/(((x**(2/7)*x)/x)**(-22/5))**(-21) assuming x is positive. x**(-27163/170) Simplify ((((q**(-2))**(-18/13))**(2/43))**(7/13))**(-2/113) assuming q is positive. q**(-1008/821171) Simplify (d**(-2/9)*d*d*d**(3/4)*d*d)/(d/(d**(-1/2)/d))**(6/13)*d**(-2/3)*(d*d**(-4/7)*d)/d*d*d**0/d**(-1/2) assuming d is positive. d**(15187/3276) Simplify (m**(1/4)*m**4*m*m)**19*m**(-1/3)/m**(4/7)*(m**(-1)*m)**42 assuming m is positive. m**(9899/84) Simplify (j/(j**(3/4)*j*j)*j**(-2))**38*((j*(j**(-2)*j)/j)/j**(-1/6))/(j**4*j**(-1)) assuming j is positive. j**(-439/3) Simplify ((r/r**(-4))**(-17)/(r/(r/(r/((r*r/(r/(r/((r*r**(-4)*r)/r*r))))/r)*r)*r))**26)**42 assuming r is positive. r**(-1386) Simplify ((f*f**1/f*f)/(f/f**5))**(1/6)/(f**(-2)*f**(-7/2)/f*f**(-1/4)/((f*f**(1/3)*f)/f*f)) assuming f is positive. f**(121/12) Simplify j*(j*j*j**(-2/11)*j)/j*j*(j/(j/(j/j**30)))/j*(j**(3/5)/j*j)/j**36 assuming j is positive. j**(-3387/55) Simplify ((b**(1/25)*b*b**(-2))/(b**(-27)/(b*b*b*b**(-5)*b*b)))**35 assuming b is positive. b**(4557/5) Simplify x*x**(-4)*(x/(x/(x*x**(12/7)*x)))/x*x/(x*x**28)*(x/x**(-7))/x assuming x is positive. x**(-149/7) Simplify ((u*u/(u/((u*u**11)/u))*u)/(u/(u*u**(-5/6)*u))*(u*u**20)/(u*(u**(-1/10)*u)/u))**(3/16) assuming u is positive. u**(499/80) Simplify (u/(u/(u*(u*u*u/(u*u**(-4/9)/u*u)*u)/u*u*u))*u*(u*u/u**26)/u)/(u**(-1/14)/(u/((((u*u**(7/3))/u)/u*u)/u*u*u))) assuming u is positive. u**(-2623/126) Simplify ((h/(h/(h*h**1*h)))**16)**(8/7)/((h**(-1/2))**35/(h**(-3/7)/(h/h**(-1/8)))) assuming h is positive. h**(3965/56) Simplify ((c/c**(-2))/c**(-2/7))**1/((c*(c*c/c**(-1/4))/c)**(-46))**(-14/3) assuming c is positive. c**(-3358/7) Simplify (((((k*k**(-2/5))/k)/((k/(k*k**(-2)))/k))/(k**(-2/5)*k**(-6)*k))**(-35))**(2/13) assuming k is positive. k**(-280/13) Simplify (((p**36*p*p)/((p/(p/(p/p**22)))/p))/((((p/(p/p**25))/p)/p*p)/((p*p**(-34)/p)/p)))**(1/21) assuming p is positive. p**(1/21) Simplify (((y**(-1))**(-21)/((y*y**(1/3)/y)/((y/y**(-2))/y)))**(-40))**(-1/27) assuming y is positive. y**(2720/81) Simplify p**(-2/29)/(p/(p**(-2/3)*p*p)*p)*p**0*p**0*p*p*(p/(p/(p*((p/(p/p**(3/5)))/p)/p)*p)*p**1/p)**21 assuming p is positive. p**(-12239/435) Simplify ((j*j**4/j)**(1/27)*j*j/j**11*j**7)**0 assuming j is positive. 1 Simplify ((r/(r/((r**(-1/4)/r)/r)*r))**(-10))**44*(((r**(-2/7)*r)/r)/r)**(-9)*(r**2/r*r)**3 assuming r is positive. r**(10133/7) Simplify (n**(-2/7)/n**(-2/7)*n**5/(n**(4/7)/n*n))/(n**5*n**0/n)**(-2/3) assuming n is positive. n**(149/21) Simplify ((((j**(-2/25)/j)/j**(-2/11))**(-1/6))**5)**20 assuming j is positive. j**(494/33) Simplify ((s/(s/(s/s**(-6)*s)))/(s*s*s*s/s**(1/5)))**49/((s/s**(-2/3))**9/(s**7/(s/(s/s**1*s)))) assuming s is positive. s**(989/5) Simplify ((l**(-1/19)*l**(1/4)*(l**(-1/4))**6)**(5/7))**(-2/75) assuming l is positive. l**(33/1330) Simplify ((d**(-12))**6/(((d/d**(-14))/d)/(d/d**(1/18))))**(-18) assuming d is positive. d**1531 Simplify ((a**(-1))**(-2/51))**23*((a**0)**(-43))**(-42) assuming a is positive. a**(46/51) Simplify ((q**(-1)/(q**(-3/7)/q))/(q**6/q**(4/5)))/(q/(q**(1/5)*q)*q**10)**(-6) assuming q is positive. q**(1891/35) Simplify ((i*i**(-23)*i*i)/i)**(-14/3)*i**(-1/38)*i**(-19) assuming i is positive. i**(3001/38) Simplify (((w*w/w**(5/6)*w*w/(w/(w**(-11)*w)))/((w/w**(1/2))/w*w**11))**(-24))**(-27) assuming w is positive. w**(-11880) Simplify (((w*w/(w*w**(2/3))*w*w)**(-7/11)*(w**(1/5))**(-1/34))**(-16))**27 assuming w is positive. w**(602136/935) Simplify ((i**(-1)/i)/i)**(26/9)*i**2*(i**(-1/2)/i)/i*((i*i**(2/5))/i)**21*(i*(i*i*i/(i/(i/i**(-1)))*i)/i)/((i/(i**(-2/7)/i))/i) assuming i is positive. i**(619/210) Simplify (r**(1/6)*r*r/(r/(r*r/(r**(-3)*r*r)*r)))**22/((r*r*r*r**0)**(1/41)/((r*((r*r*r**(-5))/r)/r)/r**(-1/4))) assuming r is positive. r**(54043/492) Simplify (((b/(b/(b*b/b**(-1/8))))/b)/b*b**(-3))**33*(b/b**(-7)*b**(-7))/((b*b**(-8)/b*b)/(b*b*b*(b*b**(-8)/b)/b*b)) assuming b is positive. b**(-735/8) Simplify ((n**(-1)*(n*n*n**(-1))/n*n*n)/(n**(-3)*n*n/(n/(n/(n/(n**(-1)*n))))))/(n**(-2)*n**(2/19)*n**(-7/4)*n*n*n*(n**(2/3)/n)/n) assuming n is positive. n**(1135/228) Simplify (i/i**(-4))/i*(i**4/i)/i*(i*i**0*i)**(-11)*((i*i**(1/5))**(10/9))**(2/3) assuming i is positive. i**(-136/9) Simplify (((c**(-9)*c**3)**(-3/11))**(1/8))**(21/5) assuming c is positive. c**(189/220) Simplify t**(-4/37)/(t**(4/7)/t)*(t*t/((t*t/((t/t**9*t)/t))/t)*t)**21 assuming t is positive. t**(-32551/259) Simplify (((s*s*s/s**5*s*s/(((s*s*s*s**(-3/2))/s)/s)*s)**(-1/39))**21)**8 assuming s is positive. s**(-84/13) Simplify ((l*l**(-1/5)*l*l*l)/(l/l**(-2)))/((l/(l*l**(2/7)*l))/l)**(-2/45)*l**6/((l/(l*l/l**(2/7)*l))/l)*(l**(-1/4))**(-8) assuming l is positive. l**(719/63) Simplify (j**17*j/(j*j**(7/3))*j**(-6)*j**(-2/33)*j)**(-7/11) assuming j is positive. j**(-2219/363) Simplify ((w/(w*w/w**1)*w*w*w**(3/7)*w)/((w/(w**(1/14)/w))/(w*w*w/w**(-19))))**(22/7) assuming w is positive. w**(517/7) Simplify (p*p/p**(-1))/p*p*(p/((p**(-4)*p)/p))/p*(p**(1/4))**(10/7)*(p*p**(-2))/((p*p**0)/p)*(p*p**1/p)**(-49) assuming p is positive. p**(-597/14) Simplify (r*r**5*r/r**1)/(r**(2/11)*r**(-4/7)/r)*(r/(r*r/(r**5/r)))/(r**(2/3)*r)*((r/(r*r**0*r))/r)/(r/((r/r**(-2/9))/r)) assuming r is positive. r**(4120/693) Simplify ((d**15*d*d**(2/3))/(d**(-9/5)/d**(-2/5)))**(47/3) assuming d is positive. d**(12737/45) Simplify ((n/n**(-12/7))/(((n**4/n)/n)/n))**( | Low | [
0.514435695538057,
24.5,
23.125
] |
Bill Laidlaw William Laidlaw (1914 – 20 October 1941) was a Scottish professional golfer. He finished tied for 7th place in the 1937 Open Championship and won the 1938 Daily Mirror Assistants' Tournament. He was killed during an RAF bombing raid on Bremen, aged 27. Golf career Laidlaw was an assistant professional at Gleneagles Hotel (from 1932) and Malden (from 1934) and then with Henry Cotton at Ashridge Golf Club from the start of 1937. He became full professional at West Herts Golf Club in early 1939. Laidlaw's big win was in the 1938 Daily Mirror Assistants' Tournament at Blackpool North Shore. He scored 289 for the 72 holes and won by 9 strokes from Alan Waters and Geoff White. Later in 1938 he was second in the Czechoslovak Open, although 11 strokes behind the winner, Henry Cotton. Death Pilot Officer Laidlaw was killed during an RAF raid on the night of 20/21 October 1941. Laidlaw was in No. 50 Squadron RAF and was involved in a raid on Bremen. He had left RAF Swinderby in a Handley Page Hampden. Laidlaw married Pamela Mary Tanner, a singer, in 1940. They had a son, William, who was born in 1942. Tournament wins 1938 Daily Mirror Assistants' Tournament Results in major championships Note: Laidlaw only played in The Open Championship. CUT = missed the half-way cut "T" indicates a tie for a place Team appearances England–Scotland Professional Match (representing Scotland): 1935, 1936, 1938 Triangular Professional Tournament (representing Scotland): 1937 (winners) References Category:Scottish male golfers Category:British military personnel killed in World War II Category:Royal Air Force personnel of World War II Category:Sportspeople from Perth, Scotland Category:1914 births Category:1941 deaths | High | [
0.6725663716814161,
28.5,
13.875
] |
Being an SCCM Administrator, I use PowerShell daily. I'm no expert at it, but know enough to piece things together and make things work. I purchased a license for PowerShell Studio a while back, but haven't used it until I thought it would be the perfect solution to build USB media for SCCM purposes. The only thing is that even after 3-4 hours working on it, I have a few questions, please. Below is an explanation of what I'm trying to do as well as all information about the project followed by the questions... Explanation of ProjectIf interested at all... With our SCCM environment, we create two types of USB media - "Bootable" (~500mb) which is used to boot systems to be imaged over the network and "Standalone" which images systems using source data on the actual USB stick (~21gb.) The reason I want to put it in a GUI is that people are selecting the wrong distribution point to build it from causing ~20gb of data to start transferring over the WAN instead of local LAN. Yikes! Plan for GUI I have already created PowerShell scripts which when run will build the media automatically. My plan was to have 3 questions with radio buttons to choose answer followed by two buttons - one to create media and the other to exit the app. The plan was to have selection of radio buttons set certain variables then when they click "Create Media," it combines everything together. OSDGUI.png (26.13 KiB) Viewed 702 times Source Strings & Variables Below are two execution strings which once variables are set from the radio buttons from the location and drive groups, will build the media. Samples of the variables are below them... Issues / Questions1. How to configure radio button select to determine which string to execute? If this project only offered to create on type of media, this would be simple as only one string is needed and all I'd have to do is create radio buttons to fill in variables. However, depending on what is selected in the first radio group, one of two different strings will be executed. That's why my included script is incomplete.What's the best way to do this? 2. Possible to (somewhat easily) be able to have options loaded as needed when started? I'd much prefer having the script automatically select the location and thought the easiest way would be when run to have it ping 3 hostnames. Only one of the 3 (if any) would have a response time of under 10ms and if so it would be selected. If none have that time or below, a message will appear and you won't be able to create media. As for the USB media, I'm trying to find scripting which will examine drives, determine which have USB media attached, and if only one set it as the variable. Is this doable for someone at my level? 3. Importing the Module from File These strings require that the SCCM module be imported and you be on the site's drive before they will work. Due to this, I added an "import-module filename.psd1" and "cd ABC:" lines under the "$OnLoadFormEvent" section. Is this correct? Surely there's a better way. I have it loading the .psd1 file from a share but didn't know if there was a way to import the profile into the project or similar. Think that's about it - as if it wasn't enough. If you took the time to read this, I really appreciate it. I'll happily take whatever suggestions anyone may have. I had to swap out some hostnames since it wouldn't let me post with them. Thank you!!! [quote="bzowkyIssues / Questions1. How to configure radio button select to determine which string to execute? If this project only offered to create on type of media, this would be simple as only one string is needed and all I'd have to do is create radio buttons to fill in variables. However, depending on what is selected in the first radio group, one of two different strings will be executed. That's why my included script is incomplete.What's the best way to do this? 2. Possible to (somewhat easily) be able to have options loaded as needed when started? I'd much prefer having the script automatically select the location and thought the easiest way would be when run to have it ping 3 hostnames. Only one of the 3 (if any) would have a response time of under 10ms and if so it would be selected. If none have that time or below, a message will appear and you won't be able to create media. As for the USB media, I'm trying to find scripting which will examine drives, determine which have USB media attached, and if only one set it as the variable. Is this doable for someone at my level? 3. Importing the Module from File These strings require that the SCCM module be imported and you be on the site's drive before they will work. Due to this, I added an "import-module filename.psd1" and "cd ABC:" lines under the "$OnLoadFormEvent" section. Is this correct? Surely there's a better way. I have it loading the .psd1 file from a share but didn't know if there was a way to import the profile into the project or similar. [/quote] Quite a lengthy post. Let me begin by noting that complete project review is beyond the scope of all technical forums. I quickly read you discussion and extracted the questions which we can try to address. 1. Radio buttons have events like all other controls. The event is where you would execute code. Radio buttons are grouped within the parent container and can be extracted in a way that allows you to detect the selected button and its associated text. 2. YOU cab save values in many types of files and reload them at startup. Search for blog posts describing the various methods for initializing a script. 3. Modules stored in the $env:PsModulePath will auto load. Any module can be loaded by direct full path reference. I recommend starting by reading and referring to the Sapien blog posts on GUI design and control usage. | Low | [
0.514970059880239,
32.25,
30.375
] |
Virus-fighting protein could lead to better HIV treatment Greenville, N.C. (May 25, 2010) — An East Carolina University scientist’s research involving a naturally occurring cellular protein could lead to better treatments for HIV as well as cancers and other viruses. Colin Burns, an associate professor of chemistry, with help from graduate student Chris Wilson, narrowed down which part of that protein, prothymosin-alpha, contains the highest concentration of virus-fighting capabilities. That finding, in turn, has helped researchers at Duke University and the Mount Sinai School of Medicine learn how the protein can block viral replication once the human immunodeficiency virus invades cells. “Some of the molecules that we’re developing will allow us to study HIV replication in a little more detail,” Burns said. “Then, once we have active molecules and we know what it’s interacting with in the cells, particularly, we have a target that we can use to design more active compounds that are even more effective or more potent.” The scientists’ findings were published last week in the Proceedings of the National Academy of Sciences. The findings may help researchers find more effective, more economical ways to combat the spread of the human immunodeficiency virus in infected people. Prothymosin-alpha appears to tell human cells to produce interferon, a substance that triggers the immune system to eradicate pathogens such as viruses. An effective virus fighter, interferon is used in treating hepatitis. In combination with other therapies, interferon is also used to treat certain cancers. The injections are costly, however, Burns said; understanding prothymosin-alpha’s properties may help scientists design an antiviral medication that is more economical and, ultimately, more potent. To gain understanding, Burns’ lab synthesized pieces of prothymosin-alpha and found the part of the protein molecule that has the ability to suppress HIV replication. “Proteins are usually rather large molecules,” Burns said. “Sometimes it’s only a part of it that is responsible for the majority of the biological activity. A lot of times you can make a small piece of the molecule, and that way you’ve reduced the complexity of the problem.” Burns’ collaborators have identified a key molecule that prothymosin-alpha interacts with called Toll-like Receptor 4, he said. “We are planning to study how it and prothymosin-alpha fit together, as it is their interaction that ultimately leads to production of interferon,” Burns said. “With this knowledge, we may be able to design more potent molecules.” The study was reported by Mary Klotman, chair of the department of medicine at Duke and the senior author of the paper; Mount Sinai assistant professors Arevik Mosoian and Avelino Teixeira; and colleagues Leif Sander, G. Luca Gusella, Cijiang He, Magarian Blander and Paul Klotman from Mount Sinai; as well as Burns. Burns’ research was funded in part by a $25,000 N.C. Biotechnology Center grant. | High | [
0.711462450592885,
33.75,
13.6875
] |
POCATELLO — The Pocatello Police Department didn’t have to go far to arrest 25-year-old Shawn Earl Barkdull. He was taken into custody in the police station parking lot for a misdemeanor driving-under-the-influence and felony possession of methamphetamine. Police received calls from a man around 8:00 p.m. Friday, Jan. 8 who said he was being followed by Barkdull after they got into an altercation. The individual drove to the police station and Barkdull followed him, police spokeswoman Dianne Brush told EastIdahoNews.com According to investigators, Barkdull willingly drove into the parking lot and pulled up right behind the other man. Detectives were waiting and performed a dexterity test on Barkdull. Barkdull was booked into the Bannock County Jail where he remains incarcerated on $11,000 bond for possession of a controlled substance and a DUI. | Low | [
0.46332046332046306,
30,
34.75
] |
De Arte Cabbalistica De Arte Cabbalistica (Latin for On the Art of Kabbalah) is a 1517 text by the German Renaissance humanist scholar Johann Reuchlin, which deals with his thoughts on Kabbalah. In it, he puts forward the view that the theosophic philosophy of Kabbalah could be of great use in the defence of Christianity and the reconciliation of science with the mysteries of faith. It builds on his earlier work De Verbo Mirifico. See also Humanist Latin Scholasticism References Category:Christian Kabbalah Category:Christian apologetic works Category:Kabbalah texts Category:Renaissance literature Category:Renaissance humanism Category:1517 books Category:16th-century Latin books | High | [
0.7065868263473051,
29.5,
12.25
] |
A taste of my world Masala Kaju – Spicy Roasted Cashew Did you know that the cashew nuts or better known as Kaju in Hindi is actually a seed? Cashew nuts come from cashew apple which has a single seed attached at the bottom of the fruit. This seed is what we eat as a cashew nut. I love cashews and often roast them with some spices to enjoy with my evening tea. Masala kaju is a perfect tea time snack and so easy to prepare at home. Watch This quick video to make these Spicy Roasted Cashews! You can make them in larger quantity and store these Spicy Roasted Cashews even upto 3 months in a cool place. So, enjoy some Masala kaju today and see you all soon with another recipe. | Low | [
0.49603174603174605,
31.25,
31.75
] |
We have contributed to an intramural NIH collaboration that has cloned the MEN1 gene. We are continuing to explore its clinical and its basic implications. We have proven that it causes nonendocrine tumors (angiofibroma, collagenoma, and leiomyoma). We have identified an MEN1 variant in three large families with infrequent gastrinoma. We find germline mutations in 70-80% of probands with familial MEN1 or at lower prevalence in cases with sporadic MEN1. In contrast, probands with familial isolated hyperparathyroidism have rare (about 5%) MEN1 mutations. Among the MEN1-like families without MEN1 mutation, a rare family shows mutation of the p27 gene. p27 mutation in MEN1 is about 1% the frequency of MEN1 mutation. We have also found rare mutation of p15, p18, or p21 cyclin dependent kinase inhibitor (CDKI) genes. We will continue to explore these and other states for germline MEN1 mutations. We have also found somatic MEN1 mutation in 15 to 35% of sporadic tumors of many endocrine organs. Thus MEN1 is the gene most frequently implicated in common endocrine tumors. We will also determine the spectrum of pathologic states that the MEN1 or the CDKI genes contribute to through mutation and other mechanisms. | High | [
0.663265306122448,
32.5,
16.5
] |
1. Field of the Invention The present invention relates to an apparatus to prevent accidental transfusion of mismatched blood types from a blood bag containing pre-typed blood to a patient of a different blood type. More particularly, each of a connected series of decreasingly sized individual cannula spikes is configured to be matingly received by, and uniquely coded to, its unique and matching female receptacle which is permanently attached to the blood bag. 2. Description of the Prior Art Various inventions are known which have been proposed to help prevent the fatal effect of infusion of an improperly matched blood type to a patient. Each of such inventions have major drawbacks which generally stem from a requirement that the healthcare provider take positive, cognitive actions to avoid an improper match. The prior inventions, although serving to alert or remind the healthcare provider that a mismatch can occur, generally do little to actually physically prevent and actively discourage an incorrect connection between a typed blood bag and a cannulated patient otherwise effected by an unobservant or persistent healthcare provider. To appreciate the disadvantages of the known art, an understanding of the blood typing system and the elements common to all patient cannulations is necessary. Typically, when blood is donated, the blood is prepared and typed according a universal blood typing system: A, B, AB, and O wherein AB is a universal recipient and O is a universal donor. The rh-factor of blood is also typed as positive (+) or negative (-). Hence, each bag may contain any one of eight different blood types and is so labelled for future use and for cold storage. This critical point provides the first opportunity to modify the blood bag to prevent future mistakes. When a patient is in need of blood, the patient is also blood typed, and may be labelled too, whether by bracelet or other means. However, not all patients must receive an exactly matched blood type. Some blood types are acceptable to some patients in accordance with the universal blood typing system: AB patients may receive all blood types, AB, A, B or O; A patients may receive A or O type blood; B patients may receive B or O type blood; but, O patients may receive only O. Moreover, mismatched rh-factors (+ instead of -, and vice versa), may be critical to the welfare of the patient, nevertheless, often are not critical. Therefore, an rh-factor mismatch may be voluntarily risked in certain emergency cases, so long as the proper blood type is available and chosen. Based upon such information, the appropriately labelled blood bag is matched to the patient. Each bag is typically provided with a pilot tube depending from a lowermost edge, which is provided with a puncturable diaphragm. A cannula, typically having a bag end attached to a hollow spike for puncturing the diaphragm and a patient end adapted for venous infusion, is provided as a separate unit which, when inserted into both bag and patient, allows the bag to be hung on an I.V. pole and allow the red blood cells to infuse by gravity into the patient. When simple labelling techniques are used to identify blood bags, the ease of making a mistake is obvious. By merely misreading a label, the wrong blood bag may be chosen by the health care provider even when both donor blood and recipient patient are correctly typed. Statistics show that this type of accident is the most frequently observed in practice, whereas blood bag labelling mistakes rarely occur during the labelling process itself. The likelihood of such cognitive mistakes arising is an inherent and major disadvantage of the following devices intended to avoid such mistakes. For example, U.S. Pat. No. 5,314,421 issued May 24, 1994 to Leuenberger describes a microporous plastic film blood pack label which avoids wrinkling and thus distortion of its printed indicia. U.S. Pat. No. 3,698,383 issued Oct. 17, 1972 to Baucom describes combined elements including a patient identification band, having removable labels and a fastener, integrally combined with a pilot tube depending from a blood bag from which the band is ultimately separated. This system is used strictly to cross-identify, by means of printed indicia, a biological fluid and its recipient and fails to provide any physical impediments to mismatching the pilot tube with a patient cannula. Other devices focus on preventing accidents by use of physical impediments, which do tend to limit the failure of use of cognitive skills which cause accidents. For example, U.S. Pat. No. 4,678,458 issued Jul. 7, 1987 to Fredeking describes an apparatus and method using a lock and key to avoid mistakes during plasmapheresis, which involves taking blood and then returning the red blood cells back to the same donor. The flow of returned blood cells is allowed only by using a unique key to unlock a lock box which controls a roller clamp interposed on a flexible tubing cannula between the blood bag and the donor patient. U.S. Pat. No. 5,125,920 issued Jun. 30, 1992 to Ishida is directed towards the prevention of mislabelling blood component bags at the time of blood donation (rather than towards prevention of misidentifying the bags at transfusion time), by providing several component bags interconnected by tubing for receiving blood. However, an inherent problem with such devices includes the inordinate amount of time necessary to operate the device thus tending to dedicate its use exclusively to autologous circumstances and teaching away from its use in emergency settings. Finally, U.S. Pat. No. 4,150,673 issued Apr. 24, 1979 to Watt describes a blood bag having coded inlet-outlet fitments directed at preventing improper transfusions of bag contents. Like a child's peg and hole playset, a series of port fitments attached to the blood bag are coded according to various geometric shapes, which requires that only a correctly shaped hollow spike is allowed into the correctly coded port to permit puncture of the bag and thereby start flow of the fluid contained therein. FIG. 5 and FIG. 6 of the Watt patent show additional embodiments of the fitments and a brief accompanying description suggests that overlay fitments provided as a separate unit can be used to convert a bag having a conventional port to the coded system. Although the simple Watt system does limit the inadvertent mismatch of ports and spikes of different shapes, it fails to teach the use of any one port as specifically matching a specific blood type (e.g. the square port is blood type B-). Thus, the chance of fatal error by providing mismatched blood is still high unless a consistent use or method is established wherein one type of port is used for one type of blood. Such a method is not taught. Moreover, the variously configured structures of each port cause serious practical disadvantages to arise during use. Various mating configurations require that a multitude of pairs of parts be manufactured, and ultimately stored by the healthcare provider. Thus, depending on the frequency of need or if a sudden "run" on a particular blood type occurs, a mating part (the spike and attached infusion cannula) may become temporarily unavailable despite the availability of blood type and properly coded bag. Thus, to prepare for such contingencies, the provider must store an overabundance of each of the mating parts (cannulas having differently spiked ends) leading to unnecessary and increased costs. In an environment having limited storage space considerations, such as ambulances, such stock piling is highly impractical. Furthermore, the presence of multiple parts require added time to locate the properly stored part, such time often being unavailable to a health care provider in emergency situations. The present invention provides a means by which all of these problems are overcome, the inherent structure of such means obviating the need to have excess storage for multiple parts and most importantly, preventing the inadvertent cross-matching of different blood types. None of the above inventions and patents, taken either singly or in combination, is seen to describe the instant invention as claimed. | Mid | [
0.555282555282555,
28.25,
22.625
] |
More Topics Weather Forecast Farmington traffic stop turns up forged checks What could have been a routine traffic stop turned into a much bigger problem for a 20-year-old Burnsville woman Dec. 11 in Farmington. A Farmington police officer stopped Megan Elizabeth Weiss at around 10 p.m. that night after watching her fail to stop at a stop sign and pull out in front of oncoming traffic. According to a complaint filed last week in the Dakota County Attorney’s office, Weiss pulled over but then put her truck into reverse and hit the squad car. While searching the truck, the police officer found two checks made out to Weiss for $1,425 and $1,368. Police determined the business and address listed on the check did not exist. In a statement to police, Weiss admitted doing meth with her boyfriend the previous evening. She said he made the counterfeit checks and admitted cashing one the previous evening in Apple Valley. If convicted on a charge of possessing counterfeit checks, Weiss could spend up to 10 years in jail and pay up to $20,000 in fines. | Low | [
0.46038543897216205,
26.875,
31.5
] |
Adam Parker of Fratello's shows how to make one of the restaurant's specials. Adam Parker of Fratello's shows how to make one of the restaurant's specials. Share Shares Copy Link {copyShortcut} to copy Link copied! Updated: 12:52 PM EDT May 25, 2016 Hide TranscriptShow Transcript WEBVTT AND SUNDAY MONDAY. NO WASHOUTS FOR THE HOLIDAY WEEKEND. ERIN: TODAY I'M JOINED BY ADAM PARKER FROM FRATELLOS. HE'S MAKING A CHICKEN PEPPERDOUGH PESTO PASTA. YOU HAVE THE CHICKEN GOING AND'. GUEST THE PESTO. GUEST: WE GOT A NICE SEAR ON IT. WE WILL ADD OUR ONIONS TO IT. RIGHT ABOUT NOW I WANT TO ADD THE CHICKEN STOCK TO HELP COOK SOME OF THAT DOWN. ERIN: WHAT DO YOU USE IN YOUR PESTO? GUEST: WE USE BASIL, OLIVE OIL, AND PARMESAN CHESE. TYPICALLY YOU PUT PINE NUTS IN IT, BUT WE TRY TO BE AS ALLERGY SENSITIVE AS WE CAN. ERIN: THIS LOOKS LIKE BEAUTIFUL FRESH PASTA. GUEST: IT IS MADE FRESH. THE PO APARDELLE IS LONG AND BIG. IT IS MADE WITH SEMOLINA, WHICH GIVES IT A NICE MOUTH FEEL. ERIN: WHAT NEXT? GUEST: I HAVE MY TOMATOES AND ONIONS AND CHICKEN. I'M GOING TO ADD THE ALFREDO SAUCE. AND A LITTLE BIT MORE SAUCE. YOU CAN'T HAVE TOO MUCH ALFREDO SAUCE. ERIN: THE MORE CHOOSE THE BETTER. GUEST: AND WE AT THE PESTO. ERIN: GARLIC IN THERE AS WELL? GUEST: YOU BET. ERIN I THINK OUR CREW HAS BEEN EYEING THAT. GUEST: I PROMISED EVERYBODY WOULD GET FED. ERIN: THIS IS SOMETHING YOU CAN COOK REALLY QUICKLY. GUEST: I END UP PREPPING SOME OF THIS STUFF IN THE MORNING. IT JUST GOES IN A SAUTE PAN AND YOU ARE DONE. THE THING WITH FRESH PASTA IS IT DOES COOK VERY QUICKLY. ERIN: THANK YOU SO MUCH FOR SHARING THIS. WE REALLY APPRECIATE IT. ASK FOR COMING IN. THE HOMESTEAD RESTAURANT. WE WILL BE RIGHT BACK. THANK YOU. Chicken pesto Adam Parker of Fratello's shows how to make one of the restaurant's specials. | Mid | [
0.563559322033898,
33.25,
25.75
] |
EAST HARLEM, Manhattan (WABC) -- Fire marshals have determined that the fire under elevated Metro-North tracks in East Harlem Tuesday night was accidental, caused by fuel spilled on a hot generator during re-fueling.The fire at a garden center halted train service for hours and continued to affect service for the Wednesday commute.Metro-North will operate on an Enhanced Saturday schedule until Friday morning on all three lines.Trains continue to run with delays in and out of Grand Central."We are confident there will be normal service by first thing Friday morning," said MTA CEO Tom Prendergast. "We are working very hard to improve on that time."Train service into and out of Grand Central was suspended on Tuesday night after a large tractor-trailer caught fire under the tracks at East 119 Street and Park Avenue.During the Wednesday morning commute, Metro-North trains traveled through the fire area and took passengers directly to Grand Central Terminal. They ran on the two outside tracks of the viaduct where the fire took place.Train speeds are reduced from 60 mph to a maximum allowable speed of 30 mph. Trains are operating as far as stations in the Bronx, where customers traveling to Manhattan can transfer to the subway to continue their trips.Nearly 100 Metro-North personnel worked through the night to inspect the viaduct to determine the extent of the structural damage and make temporary repairs.Workers brought out heavy machinery to replace damaged beams that support the train overpass, beams compromised by the intense heat of the fire."There are the beams that have been cut to be able to do the temporary repair so that we can take the load off that column, transfer it to another section, open up the two center tracks of the structure and restore normal service," said Prendergast. "It took a while to put out, it was a very intense fire. You can see the damage that was sustained by the structure. The center column is deformed."The heat damaged parts of the original column, which dates back to the viaduct's initial construction in the 19th century.At least 10 cars also caught fire when the two-alarm blaze broke out shortly before 7 p.m. Tuesday. There were some explosions in the fire that were so hot and strong, they blew bolts out of steel.Here's video captured by an Eyewitness News viewer:Though witness reports suggested several propane tanks had ignited, fire officials believe bolts popping out of the elevated track's steel supports sounded like a series of blasts. Firefighters removed 20 propane tanks to prevent explosions.Buildings on both sides of the street were evacuated. | Mid | [
0.5575757575757571,
34.5,
27.375
] |
Q: What is the best way to get the external IP of a machine in python? I'm playing around with some server side things in Python and I'd like the program to be able to be used outside of my LAN. What would be the best way about this? A: Off the top of my head you could use an external webpage that returns your ip. For example using the page myip.dnsdynamic.org: import urllib2 myip = urllib2.urlopen("http://myip.dnsdynamic.org/").read() | Mid | [
0.566596194503171,
33.5,
25.625
] |
Q: Best way to map JAXB to a database table I have an inbound xml which I am mapping to JAXB objects using the xjc tool (to build the pojos) I am wondering what the best approach is to map these objects to various tables. An Object / Xml can map to multiple tables which rules hibernate out i think. As a basic solution I believe i need someway to annotate the fields in the objects maybe (via tags in the xsd? i dont know) to database column names. Has anyone encountered this before? Thanks A: I guess you need Hyperjaxb3 that provides relational persistence for JAXB objects. @lexicore is the author about this project. A: You can use an extension for xjc - hyperjaxb hyperjaxb2 - Relational persistence for XML data, with JAXB and Hibernate. hyperjaxb3 - Persistence layer for JAXB objects. For this purpose, hyperjaxb3 will be preferable. Here is link to some tutorial Generate JPA Java classes from XSD schema file using Maven | High | [
0.711111111111111,
30,
12.1875
] |
Wabash Students 'Ring Out' Whites by Howard W. Hewitt • April 25, 2013 Share: President Patrick White delivered the final Chapel Talk Thursday of his seven-year presidency with passion, occasional humor, and considerable emotion. “During this time, gentlemen, we have all worked hard to be worthy of the nurturing love of Wabash College,” the President told a packed Chapel crowd. “ We have laughed and cried together. We have worried together, disagreed about matters of very grave importance, and you have told me when you thought I was decidedly wrong in no uncertain terms. Faculty and staff, we have worked so hard and I have been so amazed at your love and care for the students of Wabash, for your constant creativity in so many ways, nurturing of one another and of our best imagination of who we can be as Wabash.” He called Wabash a community of learners – students, faculty, staff and alumni. He said all four groups “taught me so much daily about what it means to be Wabash, about leadership and wisdom.” The morning talk included a few very emotional moments. Jeremy Wentzel ’14, Student Body President, gave brief remarks and presented certificates to the President and Chris White naming them Honorary Senators. Click here to watch the President's entire Chapel Talk and the following presentation. But the moment that caught the Whites by surprise and brought a few tears to the Chapel came at the end of Wentzel’s presentation. Students stood in the balcony and used small replicas of Caleb Mills’ bell to “ring out’ the President. “Here at Wabash, with our Wabash friends, with our colleagues and students, we feel accepted, valued, nurtured, and challenged,” the President said. “I suggest we love this place, this college because here we feel worthy of love. Here our lives matter. You have all heard me praise you gentlemen, saying, you have no idea how good you are. This is another way of saying you have no idea how worthy of respect, how worthy of love you are. “Family, community, home, friendship, brotherhood, all come to mind as we talk about this place, this world, but Wabash is all these and more, we are a collegio, literally a binding together, a college, bound together not only in the pursuit of knowledge, but in attention, care, affection, and dare I say it, love for one another." Near the end of his remarks he asked everyone to stand and shake hands with friends, teachers, and those who would be teachers just as he has done each of the past seven Augusts during Freshman Saturday. He then offered his farewell: “So no goodbye but fare thee well, Wabash, I will always love thee, and may we together hold this college deep in our care and have it live and prosper as we return to Wabash the love and courage and the power we have learned. May we remember forever, | Mid | [
0.64,
32,
18
] |
INTRODUCTION ============ Secondary hemorrhage after hysterectomy is a rare but life-threatening complication that may require prompt medical and surgical intervention. Although the overall incidence of secondary hemorrhage is low, gynecologists do come across secondary hemorrhage of varying degrees of severity.^[@B1]^ A few studies have shown the overall incidence of hemorrhage to be 0.2% and 2% after hysterectomy, which includes reactionary and secondary hemorrhage.^[@B1][@B2][@B4]^ Our center has been performing laparoscopic hysterectomies since 1994, and we have encountered 1 or 2 cases of secondary hemorrhage per year in the second or third postoperative week that necessitates hospitalization and active treatment. We believe this incidence is higher after laparoscopic hysterectomy than after the other modes of hysterectomy. The purpose of this study is to estimate the cumulative incidence of secondary hemorrhage resulting after laparoscopic hysterectomy. The second goals of this study are to describe the patient characteristics of those with secondary hemorrhage after hysterectomy and to identify the potential risk factors. MATERIALS AND METHODS ===================== All women who underwent total laparoscopic hysterectomy (TLH) performed by the first author at Paul\'s Hospital between January 2004 and April 2012 were included in this study. The medical records of the patients were reviewed to ensure that those patients who had bleeding per vaginam between 24 hours and 6 weeks after primary surgery and those requiring some intervention in the form of vaginal packing, vault suturing, laparoscopy, laparotomy, or embolization procedures were included in the analysis. The institutional review board approved the data collection, aggregation, and analysis for this project. The following data were studied: age, parity, body mass index, indication for hysterectomy, size of uterus, details of surgical procedure, administration of antibiotics, time interval between hysterectomy and secondary hemorrhage presenting symptoms, hemodynamic status, and type of intervention needed to manage secondary hemorrhage. TLH procedures were performed by dissecting the entire uterus laparoscopically; the uterine arteries were coagulated with a bipolar method or Enseal (Ethicon Endo-Surgery, Somerville, New Jersey); and laparoscopic culdotomy was performed with a monopolar hook with a 60-W cutting current at a level above the uterosacral attachment, preserving the uterosacral arch. Additional hemostasis was achieved with bipolar forceps. Specimens were removed vaginally after morcellation with a knife and without undue traction. The vaginal cuff was closed vaginally in a continuous nonlocking fashion vertically or in transverse fashion with No. 1-0 Polysorb (Covidien, Mansfield, MA, USA), Vicryl (Ethicon Endo-Surgery), or Dexon (Covidien, Mansfield, MA, USA). The vault was inspected laparoscopically at the end of the procedure and complete hemostasis ensured. All patients received 2 doses of antibiotics, the first dose intraoperatively and the second dose postoperatively, and they were discharged on postoperative day 1. Statistical analyses were performed with the χ^2^ test, Kruskal-Wallis test, and analysis of variance. *P* \< .05 was considered statistically significant. RESULTS ======= A total of 1613 patients underwent TLH during the study period, and 21 patients had secondary hemorrhage after hysterectomy. The overall cumulative incidence of secondary hemorrhage after TLH was 1.3%. The annual cumulative incidence of secondary hemorrhage after TLH was also analyzed **([Table 1](#T1){ref-type="table"})**. Patient characteristics and clinical presentation were reviewed **([Table 2](#T2){ref-type="table"})**. ###### Overall and Annual Cumulative Incidence of Secondary Hemorrhage After TLH 2004 2005 2006 2007 2008 2009 2010 2011 January to April 2012 Total -------------------------------------------------- ------ ------ ------ ------ ------ ------ ------ ------ ----------------------- ------- No. with secondary hemorrhage 3 3 3 2 3 4 2 1 0 21 Total No. with TLH 127 193 248 203 143 208 193 209 89 1613 Cumulative incidence of secondary hemorrhage (%) 2.36 1.55 1.21 0.99 2.10 1.92 1.04 0.48 0.00 1.30 ###### Demographic Characteristics of Patients With Secondary Hemorrhage After Total Laparoscopic Hysterectomy Variable Patients With Hemorrhage (n = 21) Patients Without Hemorrhage (n = 1592) *P* Value --------------------------------------------------- ----------------------------------- ---------------------------------------- ----------- Age (mean ± SD) (y) 45.8 ± 4.5 46.3 ± 6.1 .7 Parity 0 0 66 (4.1%) 1 4 (19%) 284 (17.8%) .5 ≥2 17 (81%) 1236 (77.6%) Mode of delivery Vaginal 15 (71.4%) 1101 (69.2%) .5 Cesarean 6 (28.6%) 415 (26.1%) BMI^[a](#TF2-1){ref-type="table-fn"}^ (mean ± SD) 27.22 ± 3.7 27.02 ± 4.7 .8 BMI = body mass index. The indications for the hysterectomies are shown in **[Table 3](#T3){ref-type="table"}**, with the main indication being myoma uterus in both groups. Surgical details of patients are described in **[Table 4](#T4){ref-type="table"}**. The mean size of the uterus was 541.4 g in the secondary hemorrhage group and 318.9 g in patients without hemorrhage, which was statistically significant. The mean duration of surgery was 100.7 minutes and the mean blood loss was 266.7 mL in patients with secondary hemorrhage, which were greater than those in the patients without hemorrhage but not statistically significant. In patients with hemorrhage after TLH, a bipolar cautery was used in 14 cases and Enseal was used to coagulate the uterine pedicle in the remaining 7 patients. The vagina was closed transversely in 10 patients and vertically in 11 patients. The suture material used for vault suturing was Dexon, Vicryl, and Polysorb in 6, 8, and 7 patients, respectively, in the group with secondary hemorrhage. The median time interval between hysterectomy and secondary hemorrhage was 13 days. ###### Indications for Hysterectomy Hemorrhage Group Nonhemorrhage Group ------------------------------------ ------------------ --------------------- Indication 15 (71.4%) 1000 (62.8%) Myoma Cervical pathology 0 14 (0.86%) Myoma and endometriosis 2 (9.5%) 112 (7.0%) Myoma and ovarian pathology 1 (4.8%) 28 (1.8%) Adenomyosis 1 (4.8%) 163 (10.3%) Dysfunctional Uterine Bleeding 1 (4.8%) 76 (4.8%) Endometrial hyperplasia 0 20 (1.3%) Ovarian pathology 0 52 (3.3%) Postmenopausal bleeding 1 (4.8%) 64 (4.0%) Uterine prolapse 0 7 (0.4%) Total 21 1592 ###### Surgical Details Hemorrhage Group (n = 21) Nonhemorrhage Group (n = 1592) *P* Value ------------------------------------------------------ --------------------------- -------------------------------- --------------------------------------- Previous laparotomy No 16 1147 Yes 05 445 .5 Energy source of uterine artery Bipolar 14 900 Enseal 7 692 .4 Technique of vault suturing Transverse 11 771 Vertical 10 821 .7 Type of suture material Dexon 6 322 Vicryl 8 824 .43 Polysorb 7 446 Duration of surgery (mean ± SD) (min) 100.7 ± 24.5 85.2 ± 38.6 .07 Estimated blood loss during surgery (mean ± SD) (mL) 266.7 ± 92.6 228.5 ± 125.4 .2 Weight of uterus (mean ± SD) (g) 541.4 ± 444.5 318.9 ± 258.4 .04^[a](#TF4-1){ref-type="table-fn"}^ Statistically significant. All patients presented with bleeding per vaginam of varying degrees **([Table 5](#T5){ref-type="table"})**. The amount of bleeding was mild in 10 cases and severe (\>200 mL) in 11 cases. Along with bleeding, 2 patients had a fever and 1 patient had a cough. Three patients were in a state of hypovolemic shock at the time of hospitalization. Blood transfusions were needed in 5 patients. ###### Clinical Presentation and Treatment of Secondary Hemorrhage Symptoms/Treatment No. of Patients With Secondary Hemorrhage ------------------------------------------------ ------------------------------------------- Associated symptoms Fever 2 Cough 1 Severity of hemorrhage Mild ≤200 mL 10 Profuse \>200 mL 11 Hemodynamic status Stable 20 Shock 3 Treatment Blood transfusion 5 Vaginal packing 13 Vault suturing 6 Laparoscopic coagulation of uterine artery 1 Uterine artery embolization 1 For the management of secondary hemorrhage, vaginal packing was sufficient to control bleeding in 13 patients whereas 6 patients required vault suturing. Laparoscopic coagulation of the uterine artery was performed in 1 patient, in whom the source of bleeding could not be identified vaginally. Uterine artery embolization was performed twice in 1 patient to control the bleeding. Resumption of sexual intercourse was not found in any of these patients because all of them presented within 6 weeks after surgery. The period of abstinence advised after TLH was 6 to 8 weeks. DISCUSSION ========== Hemorrhage after hysterectomy is a rare but life-threatening complication.^[@B1]^ In our study, 21 patients (1.3%) had secondary hemorrhage among 1613 hysterectomies. There are few published reports of the incidence of secondary hemorrhage after hysterectomy. Holub and Jabor^[@B4]^ reported 2 cases (0.17%) of secondary hemorrhage in their series of 1167 patients with laparoscopic hysterectomy and vaginal hysterectomy. Wilke et al^[@B1]^ reported an incidence of secondary hemorrhage of 0.23% after vaginal hysterectomy and laparoscopic hysterectomy. In an earlier study by Bhattacharya et al,^[@B3]^ the incidence of secondary hemorrhage was 0.45% after vaginal hysterectomies. The cumulative incidence of secondary hemorrhage is higher in our study than the incidence in the previous studies. An infrequent occurrence of secondary hemorrhage, failure to report to the center where hysterectomy was performed, or nondocumentation of cases may be the possible reason for the lower incidences reported in the literature. Possible factors that may play a role in secondary hemorrhage are vaginal vault infection, vault hematoma, poor surgical technique including excessive thermal injury by electrocoagulation, and early resumption of physical activity. Another possible reason for the higher rate of secondary hemorrhage in our study is our technique of preserving the arch of the uterosacral ligaments, which includes more cervical tissue and may have a greater chance of bleeding. TLH is a feasible and safe technique in cases of enlarged uteri, which permits avoidance of laparotomy with evident benefits for the patients.^[@B5]^ The size of the uterus was significantly higher among patients in the secondary hemorrhage group. High vascularity and large-sized vessels may be responsible for the increased incidence of secondary hemorrhage in large-sized uteri. The source of bleeding in secondary hemorrhage can be from the uterine vessels or descending cervical/vaginal vessels. Because the source of bleeding was from the uterine vessels in only 2 cases in our study, it appears that the use of an energy source for the uterine vessels is unlikely to increase the incidence of secondary hemorrhage after TLH. Occasionally, uterine artery pseudoaneurysm can cause delayed heavy vaginal bleeding after laparoscopic hysterectomy.^[@B6]^ Monopolar energy was used for culdotomy in all patients in the TLH group. The use of thermal energy may result in increased tissue damage to the vaginal cuff.^[@B2]^ Vault bleeding was responsible for secondary hemorrhage in 19 of 21 cases. Hence the use of an energy source for the vault may be responsible for the higher incidence of secondary hemorrhage after TLH. It may be advisable to minimize the use of thermal energy so that the tissue is not overdesiccated.^[@B2]^ The technique of vaginal vault closure may also contribute to the occurrence of secondary hemorrhage. Reich^[@B7]^ recommends laparoscopic vaginal vault closure with McCall culdeplasty for good support of the vaginal vault. The first suture brings the uterosacral ligaments, cardinal ligament, and posterior vaginal fascia together across the midline. The rest of the vagina and overlying pubocervicovesicular fascia are closed vertically with 1 or 2 No. 0 Vicryl interrupted sutures. However, in our study the vaginal cuff was closed vaginally in a continuous nonlocking fashion vertically or in transverse fashion with No. 1-0 Polysorb, Vicryl, or Dexon. The vault was inspected laparoscopically at the end of the procedure, and complete hemostasis was ensured. In a study by Uccella et al,^[@B6]^ the rate of postoperative vaginal bleeding was lower after transvaginal cuff closure than after laparoscopic cuff suturing. There was less need for vaginal cuff resuturing when transvaginal closure was performed compared with laparoscopic closure. The time interval between hysterectomy and the onset of secondary hemorrhage ranged between 3 and 22 days. For the few reported cases in the literature, the time interval varied from 3 to 18 days.^[@B1],[@B2],[@B4]^ In our study we have used vaginal packing to control secondary hemorrhage occurring from the vaginal cuff. Vaginal packing should be tight enough to stop the bleeding, although it is unpleasant for the patient without anesthesia. In the initial few cases we examined the patient while under short-lasting general anesthesia after packing to determine whether the bleeding had completely stopped. Later, we found it unnecessary if the pack was dry and discontinued this practice. The pack was usually removed after 24 hours. Most patients could be treated with vaginal packing alone, and this finding implies that the source of bleeding could be from the vaginal cuff. Any active bleeding that cannot be controlled by packing can be secured with suture. In another study the vaginal cuff bleeding in 3 cases was managed by vaginal repair and packing without laparoscopic re-exploration or transfusion.^[@B4]^ Laparoscopic surgery in patients with postoperative bleeding after hysterectomy is feasible and may be recommended if the source of bleeding cannot be identified by vaginal examination or if the symptoms indicate that the source of bleeding is intra-abdominal.^[@B4]^ Laparoscopy provides good magnification, which allows closer inspection, as well as a more precise use of bipolar coagulation or suturing for management of hemorrhage.^[@B1]^ In our study, one patient underwent laparoscopic coagulation of the uterine artery after TLH. Emergency therapeutic arterial embolization is a safe and effective minimally invasive procedure for patients in whom postoperative hemorrhage develops after gynecologic laparoscopic surgery.^[@B9]^ In our study, one patient with secondary hemorrhage in the TLH group underwent uterine artery embolization twice. Vaginal vault dehiscence is one of the rare complications after hysterectomy.^[@B10]^ In our study, we did not come across any cases of vaginal vault dehiscence. Minimal use of diathermy on the vault and the technique of vaginal suturing, which included the pericervical tissue, may be the reason for the nonoccurrence of vault dehiscence. The exact cause for increased incidence of secondary hemorrhage after TLH is unknown. We may hypothesize that the application of thermal energy to tissues may cause more tissue necrosis and devascularization than sharp culdotomy in abdominal and vaginal hysterectomies. Treatment of secondary hemorrhage through the vaginal approach in the form of packing, suturing, and drainage of hematoma appears to be feasible as an initial intervention to control bleeding. In addition, care must be taken while performing TLH in large uteri and limiting the overly enthusiastic use of thermal energy. TLH is still recommended over abdominal hysterectomy because of the obvious advantages.^[@B10][@B11][@B12]^ The limitation of this study is that it is a retrospective observational study. Further prospective randomized controlled trials are needed to validate our results. CONCLUSION ========== Our data suggest that secondary hemorrhage is rare but may occur more often after TLH than after other hysterectomy approaches. The comparison of different energy sources such as ultrasonic or bipolar methods with scissors for culdotomy in TLH is worth studying. A large uterus size, excessive use of an energy source for the uterine artery, and culdotomy may play a role. | High | [
0.6589861751152071,
35.75,
18.5
] |
Q: Creating indexed view that compiles automatically on certain time In Oracle database the materialized views can be created that can automatically be refreshed at certain time interval. How can this be implemented in SQL Server using indexed views or other technique? The underlying table being very large and the change in base table is very often. A: As far as I understand, an Indexed View will always return current results. Updates need not be scheduled because the DBMS will automatically refresh the view if underlying data changes. If you don't want to incur the overhead of maintaining the indexed view, you can drop it while not needed and then re-create before you will use it (e.g. before daily / weekly / monthly reporting runs). | Mid | [
0.6502463054187191,
33,
17.75
] |
Spring Hill fire district needs tax revenue in order to keep operating Financing the local fire department shouldn't be construed as a poke in the eye to democracy. But that is the inaccurate portrayal offered up by critics of the Spring Hill Independent Fire District, which is seeking Hernando County's permission to continue levying a property tax rate of 2.5 mills ($2.50 per $1,000 of a property's assessed taxable value). The district needs the county's blessing because of a fickle Spring Hill electorate. The public voted in 2008 for a fire district removed from county oversight, then returned to the polls in 2010 and denied the newly independent district the ability to set its maximum tax rate. There is no denying that past actions by the elected Fire Commission didn't instill voter confidence in its ability to carry out the fiduciary responsibilities of overseeing a department. But the alternative is a public safety agency unable to pay its bills, meaning a potential shutdown of fire and ambulance services to Spring Hill's 90,000 residents on Oct. 1. There are legal obstacles to navigate, including an inter-local agreement and a past judicial ruling, but neither should be considered a permanent impediment to keeping the fire department functioning. The fire commission — as voters' elected representatives — approved a resolution asking for the county to continue collecting the tax payments until another ballot referendum can be scheduled. It is a reasonable request and the County Commission should grant it. Voters unhappy with the fire district's operations or with the fire commission's performance in setting the policies should express that displeasure when voting for fire commissioners. Expecting the department to operate absent property tax revenue is absurd. And, attempting to govern by referendum is a poor way to ensure firefighters are available to answer emergency calls. | Mid | [
0.5995893223819301,
36.5,
24.375
] |
Last month I had the pleasure of speaking with Latha Palaniappan, M.D., M.S., a Stanford physician doing interesting research on whether and why Asian Indian-Americans are so susceptible to coronary heart disease and diabetes even though the group has a lower rate of obesity. In a 2011 academic op/ed piece titled "Incorporation of whole, ancient grains into a modern Asian Indian diet to reduce the burden of chronic disease," Dr. Palaniappan and her co-authors concluded that a big reason for this phenomenon is that too many refined grain products have infiltrated all kinds of Indian dishes. They argue that to reclaim our healthy traditional diets, we must reclaim the whole grains of our heritage. I was gladdened when she agreed to answer a few questions by e-mail. Without further ado, our Q&A. Dr. Niraj "Raj" Patel: What made you interested in studying chronic disease in Asian Indian-Americans?Dr. Latha Palaniappan: I became interested in studying chronic disease in Asian Indians because they are one of the highest-risk groups for chronic diseases such as diabetes and cardiovascular disease. I experienced this personally, as my dad died of a heart attack, at the age of 39. In addition to research, I believe that it is also important to put research into practice by implementing culturally tailored healthcare and education to increase patient and provider awareness surrounding these health issues. NRP: Was it surprising that Asian Indians have among the highest rates of heart disease and diabetes in California? LP: More than 2.8 million Asian Indians currently live in the United States and California has had one of the highest Asian Indian population growth rates. Given the high rates of diabetes and heart disease in Asian Indians around the world, it is not surprising that Asian Indians in California have among the highest rates of diabetes and heart disease. NRP: Although Asian Indians have a relatively low prevalence of obesity compared with other groups in the U.S., why do Asian Indians have higher rates of heart disease & diabetes? This sounds counter-intuitive. LP: Our research has shown that Asian Indians have higher rates of diabetes and heart disease despite lower body mass index (a marker of obesity and overweight), compared with Non-Hispanic Whites. While this does sound counterintuitive, it suggests that there are other unique biological and socio-cultural risk factors that play a role in the increased prevalence of these chronic diseases among Asian Indians. While research is ongoing, emerging biological risk factors, such as differential body fat distribution, increased levels of lipoprotein (a), and high-sensitivity C-reactive protein levels may play an important role in the development of chronic disease in Asian Indians. NRP: In the 2011 Nutrition Reviews paper, which I found to be an amazing read, you and your coauthors describe the history by which refined grains infiltrated the modern Asian Indian diet. Can you briefly explain for our readers how this came to pass? LP: Since the 1951 Green Revolution in India, refined carbohydrates, such as white rice and flour, have become the mainstay of the modern Asian Indian diet. The Green Revolution was an attempt by the Indian government to avoid reliance on foreign food aid (following independence from British imperialism) by developing and subsidizing inexpensive, high-yield crops. However, prior to the Green Revolution, whole grains such as amaranth, barley, brown rice, millet, and sorghum were more commonly used in Asian Indian cooking. These ancient, whole grains are nutritionally advantageous and can be substituted and incorporated into the modern Asian Indian diet. NRP: Among your Asian Indian patients, do you find a lot of resistance to replacing white rice with brown rice? How about to adopting ancient grains that aren't indigenous to India? Also, does the resistance differ based on age (older versus younger) or citizenship status (American-born versus recent immigrant)? Finally, has it changed any over the years? LP: Fortunately, we are blessed in the U.S. with ready access to ancient, whole grains, which were originally available only in health food stores, but now can be found in more mainstream grocery stores. My older patients can actually remember having ancient grains in their childhood diets, especially if they have a history of living in rural areas. Younger patients are more likely to experiment with non-indigenous grains and incorporating them into traditional Indian recipes. My American-born patients tend to eat traditional Asian Indian foods less often, but healthier carbohydrate choices can be made in all cuisines. NRP: How has your work and what you've read changed how you eat and feed your family? LP: We eat whole grains every day, with 4-5 grams of fiber at least per carbohydrate serving. My daughter was so used to eating whole wheat bread that, when she was 5, she went to a friend’s house, and came back wide-eyed and said “Mommy, they made peanut butter and jelly sandwiches on cake!” After eating whole wheat bread, white bread does seem like cake, and a treat that we should have only once in a while. NRP: If a family can only make one change to what they eat everyday (presuming they eat a typical modern diet, which for Asian Indians would include food like puri on occasion and white rice on a regular basis), what one change would you advise for improved health in the long-term? LP: The key dietary change that I would advise for improved health is limiting the intake of refined carbohydrates, such as white rice and flour. Instead, refined carbohydrates can be substituted with whole grains, such as amaranth, barley, brown rice, millet and sorghum. Asian Indians can replace white rice with brown rice, whole-wheat couscous, quinoa, or barley. While these alternative grains have a different taste and texture than white rice, they are much more nutritionally dense and can dramatically reduce the risk of type 2 diabetes and chronic disease. NRP: Latha, thank you for the insightful interview! Dear reader, please visit a website that Dr. Palaniappan is involved with: http://www.pamf.org/southasian. All italics and emphasis with underlines were mine. Disclaimer: The facts, advice and opinion on www.healthyindiandiet.com are based on scientific evidence published in journals. However, no content should be construed as medical advice. You should seek the counsel of your physician before making changes based on the content, especially if you have a medical condition. This site is for people who want to eat healthy and love Indian food. Consult your physician before making changes to your diet. To the fullest extent of the law, neither the publisher or authors assume any liability for consequences to persons or property arising out of or related to any use of the material on this website. | Mid | [
0.606896551724137,
33,
21.375
] |
Monthly Archives: January 2015 We are all familiar with the effects of epinephrine (adrenaline) and norepinephrine (noradrenaline) on us when placed in a position of stress, such as public speaking or even worse danger. We flush, shake, our heart rate accelerates and many of us we begin to sweat profusely, thus visibly advertising our distress; sometimes embarrassingly so if we have an antiperspirant fail and happen to be wearing a dark shirt. Those seeing these symptoms may feel a degree of sympathy for the victim, but do not usually flee the scene, although they may sometimes feel tempted to do so. The case with aphids is very different. Aphids, when perceiving a threat to their neighbours by a predator or parasite, flee the scene rapidly, by flight, if winged, on foot if not, or even by leaping from their host-plant to the ground below. The pea aphid, Acyrthosiphon pisum walks away or drops from their plant (Clegg & Barlow, 1982) as does the rose-grain aphid, Metopolophium dirhodum (Larsen, 1988). This may seem a risky move since it seems that about 10% of all aphids that fall from their host plant don’t manage to get back (Sunderland et al., 1986), but for a clonal organism the risk is obviously worth it. So how does this communal fright and flight response come about? Most aphids have a pair of siphunculi or cornicles at the rear of their abdomen. These vary in size and shape, in some aphids being long and slender, in others short and stubby and in yet others reduced to a shallow indentation (pore) or in a few species, totally absent. The role of aphid siphunculi has been debated since the days of Linneaus and Reaumur who considered them to be the source of honeydew (Hottes, 1928). Hottes himself in a comprehensive review of the various theories put forward for the function of the siphunculi, dismissed the defence theory of Busgen (1891) and plumped for an excretory role, although he did suggest that volatile substances were produced by the siphunculi in addition to the waxy visible drops. By the middle of the last century it was generally accepted that the siphunculi were involved in defence, but in a purely physical way, in that the waxy exudate was used to deter or disable the attacking predators or parasites (e.g. Dixon, 1958; Edwards, 1966). At about the same time, the chemical composition of the visible exudate was confirmed as being primarily triglycerides with myristic acid being the major fatty acid present (Strong, 1966). Hawthorn-parsley aphid Dysaphis apiifolia producing sipuncular exudates whilst under attack by a parasitic wasp. Many thanks to Tom Pope for permission to use this clip. In 1968 an alarm pheromone was identified and isolated from the cotton stainer, Dysdercus intermedius (Calam & Youdeowei, 1968) so it was not surprising that attention should be focused on aphids, many of which show a similar group dispersive behaviour when a predator approaches them. The aphid alarm pheromone (E)-β-farnesene was, however, not formally identified until 1972 (Bowers et al, 1971), although Maria Dahl had demonstrated the previous year that a solution made from crushed aphids would cause an alarm response in other aphids of the same and different species (Dahl, 1971). Unsurprisingly, as during the 1970s and 1980s scientists from the USA were notorious for only citing papers written in English, Bowers et al. (1972), failed to cite her in their paper, instead citing two other American authors (Kislow & Edwards, 1972). This discovery resulted in a flurry of papers from around the world as insect physiologists vied to be the first to isolate alarm pheromone from different aphid species (e.g. Weintjens et al., 1973; Montgomery & Nault, 1977; Wohlers, 1980). There were also more ecological studies such as that examining the way alarm pheromone in ant-attended aphids enhances the relationship between them and their ant farmers (Nault et al., 1976) thus acting as a synomone (Nordlund & Lewis, 1976). As time has gone on the interest in aphid alarm pheromone has remained unabated with new twists and surprises being discovered. For example, as well as stimulating the escape response, the alarm pheromone also stimulates those surviving pea aphids to produce winged offspring thus facilitating future long-distance dispersal away from the predators (Kunert et al., 2005). Aphid alarm pheromone can also act to help natural enemies find their aphid prey (e.g. Micha & Wyss, 1996), in this case acting as a kairomone. An allomone is any chemical substance produced and released by an individual of one species that affects the behaviour of a member of another species to the benefit of the originator but not the receiver e.g. the ability of some plants to release aphid alarm pheromen and thus deter aphids form landing on them. An apneumone is any substance produced by nonliving material that benefits a recipient species but is detrimental to a different species associated with the non-living material A kairomone is a semiochemical, emitted by an organism, which mediates interspecific interactions in a way that benefits an individual of another species which receives it, without benefiting the emitter. For a detailed critique of the term kairomone see Ruther et al. (2002). A pheromone is a secreted or excreted chemical factor that triggers a social response in members of the same species. Pheromones are chemicals capable of acting outside the body of the secreting individual to impact the behaviour of the receiving individual e.g. alarm pheromones, food trail pheromones and sex pheromones. A synomone is a substance produced by an individual of one species that benefits both the producer and the recipient which is of a different species. An example is the release of chemical elicitors by plants that attract entomophagous insects when they are attacked by herbivores. They are of course, designed to do just that and so as entomologists we should be happy that they are so good at their job. The secret of their success lies in their colour, yellow, which is highly attractive to many flying insects, flies (Disney et al., 1982) and aphids (Eastop, 1955) being particularly attracted to them as are bees and wasps (Vrdoljak & Samways, 2012; Heneberg & Bogusch, 2014). They are also attractive to thrips (Thysanoptera) (Kirk, 1984) and have long been the subject of many comparative studies (e.g. Heathcote, 1957), although the prize for one of the most elaborate and labour intensive studies involving pan traps must go to my friend and former colleague Thomas Döring (Döring et al., 2009) who ran an experiment using pan traps of seventy, yes seventy, different colours! They are easy to deploy and range from expensively bought made-to-order versions to yellow plastic picnic plates, yellow washing up basins and even Petri dishes painted yellow. They can be mounted on poles and sticks or just placed on the ground; to say that they are versatile is a bit of an understatement. So who invented the pan trap? I have of course given the name of the inventor away in the title of this article. They were invented surprisingly relatively recently, by the German entomologist Volker Moericke (Moericke, 1951), although I suspect that he used them some years before the publication of the paper. These first pan or Moericke traps as we should call them, were made of tin, painted yellow, and mounted on three wooden sticks. They were 22 cm in diameter and 6 cm deep and filled with a mixture of water and formaldehyde . Moericke was working on the aphid Myzus persicae . He was particularly interested in aphid vision and host location (Moericke, 1950). He observed that the aphids were able to distinguish between the red-yellow-green end of the spectrum and the blue-violet end. This then stimulated him to try trapping aphids using coloured pan traps (Moericke, 1951). He observed that the aphids were attracted to the yellow pan traps and behaved as if over a host plant resulting in them landing in the liquid from which they were unable to escape. Although he noted that the traps were extremely effective at catching aphids he did not comment on what other insects he found in the traps. The first Moericke (yellow) Pan trap (from Moericke, 1951). This simple, yet effective design has now become an essential part of the entomologist’s tool kit being used by field entomologists of every ilk working across the world in every habitat. They are truly an influential invention and worth of being named an entomological classic. Given the wide usage of these traps and their remarkable efficacy I think that we should make every effort to acknowledge their inventor by calling their modern plastic counterparts Moericke Traps. Although I have recently written about my two years of blogging and tweeting, I couldn’t resist the temptation to begin 2015 with a quick round-up of 2014 on Don’t Forget the Roundabouts. A gratuitous roundabout – collected summer 2014 Hook of Holland on our way back from our summer holiday. According to the statistics provided by WordPress, I reached 145 countries (112 in 2013), and received about 24 000 views (14 349 in 2013). Once again my most viewed post was Not All Aphids are Vegans with my post about saving UK plant sciences in second place. I continue to be surprised at how many people appear (or think that they have) to be bitten by aphids. In all my years of working with aphids I have only been probed (bitten, stung) twice. Looking at the distribution of hits for the post though it does seem to reflect the times of year when aphids are most active. This post is obviously filling a need as the number of views has more than doubled since last year. An innovation for 2014 was my series on entomological classics, mainly equipment, but I also included Southwood’s 1961 paper under that heading. This coming year I will continue much as before, posts about aphids, more entomological classics (look out for yellow water traps next), the odd rant or two and a new series on those scientific papers and authors that have really inspired me over the years. I would really like to have more comments and interactions via the blog; at the moment Twitter is where most exchanges occur. It would also be nice if everyone who followed me on Twitter read my blog! That said I must acknowledge my most frequent commenters and bestowers of likes. These are Emily Scott http://adventuresinbeeland.com/, Jeff Ollerton http://jeffollerton.wordpress.com/, Amelia from A French Garden, and Emma Tennant http://missapismellifera.com/. I am also very grateful to the 135 people who subscribe to my blog. Many thanks to you all for your interest and kind words. I write about politics, nature + the environment. Some posts are serious, some not. These are my views, I don't do any promotional stuff and these views are not being expressed for anyone who employs me. Welcome to the lounge, where entomologists and insect enthusiasts can relax, grab a cup and put on a nice music. Step out of your day job, and step into your zone, where you reconnect with your passion for insects and enrich yourself with more knowledge. | Low | [
0.513725490196078,
32.75,
31
] |
Private First Class Bradley Manning stole 251,000 State Department documents, many of them secret international embassy reports. Manning smuggled the security documents out on a CD labeled “Lady Gaga.” Manning was bitter after a breakup with his boyfriend. Manning, smuggled the information out of a secure facility on a CD. Never before had a superpower lost control of such vast amounts of sensitive information. In April 2014 a Kansas judge allowed Manning to change his name to “Chelsea.” Army Pfc. Bradley Manning poses for a picture in a wig and lipstick. (AP) Obama commuted Chelsea Manning’s sentence in January from 35 years to 7 years. TRENDING: Unhinged Quebec Woman Pascale Ferrier Identified as Suspect in Case of Ricin Letter Sent to Trump White House In May Chelsea Manning was released from prison and became a free person. On Wednesday President Trump announced transgender people will no longer be allowed to serve in the United States military. Chelsea Manning responded to the president’s decision on Twitter. She wants the military disbanded. today is further reason we should dismantle the bloated and dangerous military/intel/police state to fund #healthcare for all #WeGotThis — Chelsea E. Manning (@xychelsea) July 26, 2017 She calls the military a social experiment. militaries, esp. U.S., have always been a social experiment just as much as a fighting force its how it got so bloated #WeGotThis https://t.co/HtNa54AeSP — Chelsea E. Manning (@xychelsea) July 26, 2017 And Clelsea wants to defund the F-35. so, biggest baddest most $$ military on earth cries about a few trans people but funds the F-35? sounds like cowardice #WeGotThis — Chelsea E. Manning (@xychelsea) July 26, 2017 It’s not likely that Chelsea is helping out her cause much here. | Low | [
0.5327102803738311,
28.5,
25
] |
Acute cellular rejection resulting in sinusoidal obstruction syndrome and ascites postliver transplantation. The cause of ascites formation postliver transplantation (LT) is multifactorial. Sinusoidal obstruction syndrome (SOS) is a rare cause of ascites post-LT and has been reported to occur as a sequela of acute cellular rejection (ACR). We sought to examine the histologic features of patients developing ascites in the setting of ACR. By using the pathology database, we identified five patients with ACR who had ascites and 10 control patients with severe ACR without ascites. Features of SOS such as congestion, central venulitis, and hepatocyte necrosis were scored (zero absent, one mild, two moderate, and three severe) and perivenular fibrosis (zero absent, one mild, two fibrous septa present, three bridging fibrous septa, and four numerous septa with architectural distortion). Rejection activity index (Banff criteria) was determined. Clinical, biochemical and outcome information were obtained from chart review. All five ascites patient had histologic evidence of SOS. Statistical significance was noted between the ascites and control groups for perivenular fibrosis score (3.6 vs. 0.8, P=0.0004), congestion (3 vs. 1.2, P=0.000005), and central venulitis (3 vs. 1.7, P=0.002). All patients in the ascites group required re-LT or died whereas all control patients remain alive. No significant statistical difference was noted with donor age despite the mean being older in the ascites group (52.8 vs. 35.8 years). ACR resulting in SOS and associated with significant perivenular fibrosis, central venulitis and congestion may be the cause of ascites post-LT and may portend a poor prognosis for recovery. | High | [
0.661807580174927,
28.375,
14.5
] |
Distinctive effect of ginseng saponins on development of morphine tolerance in guinea-pig ileum and mouse vas deferens. Studies on the effect of ginseng saponins on the development of tolerance to morphine have been carried out using isolated preparations of guinea-pig ileum (GPI) and mouse vas deferens (MVD). Incubation of GPI preparation with morphine resulted in the development of tolerance to the inhibitory effect of morphine on the electrically evoked contractions. Ginseng total saponins and one of the constituents, protopanaxatriol saponin, suppressed the development of morphine tolerance in a concentration dependent manner in GPI preparation, though another constituent, protopanaxadiol saponin, did not affect the tolerance development substantially. In the MVD preparation, the development of tolerance to the morphine effect was observed as well, but none of the ginseng saponins affected it. It has been well established that electrically evoked contractions of GPI and MVD are mediated by acetylcholine and norepinephrine, respectively, and presumably their release is regulated presynaptically by opioid receptors. The fact that ginseng saponins suppressed the development of morphine tolerance only in the GPI preparation suggest that the inhibitory effect is mediated through and effect on the cholinergic system, without the involvement of direct action on opioid receptors. | Mid | [
0.633165829145728,
31.5,
18.25
] |
me factors of p(o)? 2, 5 Let v(x) = -11*x**3 - 2*x**2 - 2*x - 2. Let o be v(-2). Suppose d = -2*g - 3*d + 68, -2*d = 3*g - o. List the prime factors of g. 2, 3 Suppose x - 29 = -5. What are the prime factors of x? 2, 3 Let m(r) = r**3 + r**2 + r + 3. Let f be m(0). List the prime factors of -2 + 33/f + 1. 2, 5 Suppose -2*i - 32 = -2*h, 72 = -0*h + 5*h - i. List the prime factors of h. 2, 7 Let s = 9 + 61. Suppose -t = 4*t - s. What are the prime factors of t? 2, 7 Suppose -3*z + 45 = 2*z. Suppose 0 = -5*y + 51 + z. List the prime factors of y. 2, 3 Let o(u) = u**2 + 7*u + 7. Let k(x) = -2*x**2 - 14*x - 13. Let h(g) = -6*k(g) - 11*o(g). Let i be h(-6). List the prime factors of (-2)/(-4) + i/(-2). 3 Suppose 4*l + 5 = 3*l. Let t(g) = 17*g + 24. Let v(u) = 4*u + 6. Let b(n) = 2*t(n) - 9*v(n). What are the prime factors of b(l)? 2 Let k(z) = z + 2. Let h be k(4). What are the prime factors of 68/h - 4/(-6)? 2, 3 Suppose 45*n = 46*n - 202. List the prime factors of n. 2, 101 Let m be 1 + 3/3 + -1. Let l = m - 2. List the prime factors of 30/3 - 1/l. 11 Let t = 138 + -57. List the prime factors of t. 3 Let h(k) be the third derivative of -k**6/120 - 3*k**5/20 + 7*k**3/6 + k**2. What are the prime factors of h(-9)? 7 Let b = 35 - 21. Let a be 1/(-3*(-3)/18). Suppose -4*g + 50 = 5*p + 13, 2*p = a*g - b. What are the prime factors of g? 2 Let x(l) = -l**2 - 6*l - 8. Let j be x(-8). List the prime factors of -4*9/j*2. 3 Let m be (1 - -2) + (2 - 3). Let k(v) = 4 + 4*v**3 + 0*v**2 - 5*v**3 - v**m. List the prime factors of k(0). 2 Let p be 3 + -4 + 3 + -1. Let h = p + 3. Suppose 44 = 3*x - 0*x + h*i, -x = 2*i - 18. List the prime factors of x. 2 Let a be (0 - (0 - 1))*-3. Let y = a - -5. Suppose 0 = y*h - 0 - 4. List the prime factors of h. 2 Suppose 0 = 3*l - 0 - 6. Suppose 2*o - 3*y = -7*y + l, 2*o - 16 = 3*y. Suppose -10 = -o*n + 40. List the prime factors of n. 2, 5 Suppose 0 = i - 3*i - 38. Let o = -4 - i. List the prime factors of o. 3, 5 Let u(o) = o**2 + 10*o. Let r be u(-10). Let k = -1 - r. What are the prime factors of k/2*2*-13? 13 Let m(l) be the second derivative of l**4/4 + 5*l**3/6 - 5*l**2/2 - 9*l. List the prime factors of m(-4). 23 Let f(l) = -5*l - 10. Let h be f(-11). Suppose -z = -6*z + h. List the prime factors of z. 3 Let x = 6 + -4. Suppose -x*r - 1 - 27 = 0. Let f = r + 21. What are the prime factors of f? 7 Suppose -2*x + l = -176, 2*l = 3*x - 179 - 85. List the prime factors of x. 2, 11 Suppose 5*i + s = 845, -2*i + 525 = i - 3*s. List the prime factors of i. 2, 5, 17 Suppose z - 5*m + 4*m + 1 = 0, z + 5*m - 29 = 0. Let l = 9 - z. List the prime factors of l. 5 Let r = -2 - -6. List the prime factors of r/(-10) - 36/(-15). 2 List the prime factors of 1/(-3) - (-2204)/6. 367 Let a(t) be the first derivative of t**4/4 + t**2/2 + 2*t + 2. List the prime factors of a(2). 2, 3 Suppose 41*n - 1420 = 37*n. List the prime factors of n. 5, 71 Let c(s) = s + 3. Let j be c(-9). Let y be (-3 + 26)/((-3)/j). What are the prime factors of (y/(-6))/(3/(-9))? 23 Suppose 0 = -0*j - 2*j. Let h = 1 + j. Let t = 2 + h. What are the prime factors of t? 3 Let d = 14 - 9. What are the prime factors of 69/d - (-6)/30? 2, 7 Let i(z) = -2*z. Let n be i(1). List the prime factors of -3*(4/(-6) + n). 2 Let o = 70 - 36. What are the prime factors of o? 2, 17 Let s = -10 - -11. List the prime factors of s/4 + (-575)/(-20). 29 Let n = -8 - -6. Let l = 15 + n. List the prime factors of l. 13 Let w be (-6)/39 + 76/(-13). Let p(q) = -5*q - 2. What are the prime factors of p(w)? 2, 7 Let g(t) = -t**2 + 6*t - 8. Let k be g(4). Suppose 75 = 3*i - k*i. What are the prime factors of i? 5 Let p(i) = 3*i - 5*i - 1 - i**2 + 4*i. Let n be p(4). List the prime factors of 2/3 + (-75)/n. 3 Suppose -2*j - 4 = -0*j. Let x(m) = -2*m + 2. List the prime factors of x(j). 2, 3 Suppose 0*b - 17 = -b - u, -4*b - u = -53. List the prime factors of 2/3 + 196/b. 17 What are the prime factors of -2 + 0/(-2) + 1926/18? 3, 5, 7 Suppose -m = -4 + 2. Let d(s) = s**3 - 2*s**2 - 2*s + 3. Let y be d(m). What are the prime factors of (-1 - y) + (-18)/(-3)? 2, 3 Let i = 45 + -12. Suppose 2*d - 5*q + 11 = i, 3*q + 51 = 3*d. List the prime factors of d. 3, 7 Suppose 2*n - 2 = f + 7*n, -4*f + 3*n - 8 = 0. Let d be (-2)/2*4*f. Suppose 11 = 5*u + k, 0 = -3*k + k - d. What are the prime factors of u? 3 Suppose 2 + 6 = 4*p. Suppose 0 = -q + g + 27, 2*q - g = -p*g + 69. What are the prime factors of q? 2 Suppose -7*a = -12*a + 215. What are the prime factors of a? 43 Let c(t) = -t + 1. Let u be c(-5). Suppose -8 - u = -2*h. List the prime factors of h. 7 Suppose 0*x + 9 = 3*x. Suppose z = l + 4 - x, 3*l = -4*z + 18. Suppose 0 = z*s - 2 - 19. What are the prime factors of s? 7 Suppose 2*q - 3*i = 1, 5*q = 2*i - 1 + 20. Suppose 2*b = -0*b + 8, q*o + b = 64. What are the prime factors of o? 2, 3 Suppose 14 = 3*a - 10. Suppose -5*g = a - 3, -5*s + g = -11. List the prime factors of s. 2 Let r = -1 + 3. What are the prime factors of r*(-1 + 3 + -1)? 2 Let r(g) = -g**3 - 9*g**2 + 9*g - 10. Let z be r(-10). Suppose -3*s + z*s + 12 = -3*o, o = -s. Suppose 0 = -3*d - s*d + 10. What are the prime factors of d? 2 Suppose 2*s - 3*c = -6*c - 2, -s - 8 = 5*c. Suppose 3*r = -5*w + 13 + 21, 4 = -s*r + 2*w. List the prime factors of r. 3 Let v(i) = -i**2 - 9*i + 19. Let c(a) = -9*a + 1. Let h be c(1). List the prime factors of v(h). 3 Let w(j) = -j**2 - 9*j - 6. Let b be w(-8). List the prime factors of b*1 - (4 + -4). 2 What are the prime factors of (2 + -3)/((-2)/110)? 5, 11 Let x(v) = v. Let z be x(3). Suppose 4*m + 2*o + 46 = 0, -m = 4*m + z*o + 59. List the prime factors of (2/5)/((-1)/m). 2 Suppose -4*o + 682 + 710 = 0. List the prime factors of o. 2, 3, 29 Let c(f) = -5*f - 6. What are the prime factors of c(-7)? 29 Let c(o) = -2*o**3 - 5*o**2 - 3*o. What are the prime factors of c(-3)? 2, 3 Let v = -35 - -191. List the prime factors of v. 2, 3, 13 Suppose 0*p + 2*p - 6 = 0. Let r(l) = p*l - 2 + 0*l - 4*l + 0*l. What are the prime factors of r(-5)? 3 Let z = 4 - -4. Let b = z + -3. What are the prime factors of b? 5 Suppose 0 = -2*k - 0*k + 386. List the prime factors of k. 193 Let j be (4/(-8))/((-2)/(-32)). Let d = -1 - j. What are the prime factors of d? 7 Let x(q) = q**2 - q - 1. What are the prime factors of x(6)? 29 Suppose g - 274 = -2*i, -542 = i - 5*i + g. What are the prime factors of i? 2, 17 Let f be (-20)/(-6)*3/2. Suppose 0 = f*r - 4*i - 8 - 35, -r = -5*i + 4. List the prime factors of r. 11 Let i = 23 - 2. List the prime factors of 15/(-35) + 387/i. 2, 3 Let k(w) = w + 1. Let q(r) = -17*r - 13. Let g(d) = 18*k(d) + 2*q(d). Let y be g(-5). Suppose -2*b - 2*b = -y. What are the prime factors of b? 2, 3 Let k = -11 - -21. List the prime factors of k. 2, 5 Let m(x) = x**3 - 6*x**2 + 12*x - 2. List the prime factors of m(6). 2, 5, 7 Let b = 13 - 9. Suppose -5*k + 93 = 3*d, -b*k + 0*d + 68 = -4*d. Suppose -s = s - k. What are the prime factors of s? 3 Let j = -5 - -8. Let a = j - 0. List the prime factors of (-8)/a*3/(-2). 2 Suppose 2*p + 6 = 2. Let m be (p - (-5)/2)*8. Let r = 2 + m. What are the prime factors of r? 2, 3 Let g = -7 + 28. List the prime factors of g. 3, 7 Let r(f) = f + 6. Suppose -4*g + 2*g = 0. Let i be r(g). Let m = i + -4. What are the prime factors of m? 2 Suppose 2 = 5*x - 38. Suppose 3*w = w + x. List the prime factors of w. 2 Let c = 49 + 18. Let p = c - 39. Let w = p - 13. List the prime factors of w. 3, 5 Suppose -a = -0 - 2. Suppose 2*y + a*s - 16 = 0, 2*s + 3*s - 5 = 2*y. Let g(u) = -u**2 + 5*u + 5. What are the prime factors of g(y)? 5 Let i = 107 + -67. List the prime factors of i. 2, 5 Let j be (-4)/14 - 80/(-35). Suppose -j + 58 = 4*x. What are the prime factors of x? 2, 7 Suppose 0*v - 2*v = -5*w + 182, w - 4*v = 40. List the prime factors of w. 2, 3 Let y(o) = -3*o**3 + 1. Let t be y(-1). Suppose -b = -5*b + x + 19, -t*b + 29 = x. What are the prime factors of b? 2, 3 Suppose 2*d - i + 2 = 4, -3*d - 7 = -4*i. What are the prime factors of d? 3 Suppose -2*a - 2*a = 0. Suppose -4*d - 8 = a, 5*d = -h - 2*h + 98. List the prime factors of h. 2, 3 Let w(f) = f + 4. Let x be w(0). Let l(n) = n**2 - 3*n - 1. What are the prime factors of l(x)? 3 Let x = -55 + 99. What a | Low | [
0.510928961748633,
23.375,
22.375
] |
Saskatoon couples have embraced the tradition of placing a lock with initials engraved as a sign of their everlasting love, but those symbolic promises of forever have now been removed by the city. The locks were collected on the stairway leading up to the city's romantic wooden rail bridge that spans the South Saskatchewan River, near the weir. City hall, however, isn't buying into the romance of love locks. The locks were unceremoniously removed Wednesday. Here's what the city's Director of Transportation Angela Gardiner told reporters in an e-mail: "As part of regular spring cleaning and maintenance City crews removed the locks attached to the CPR bridge staircase. The City maintains the staircase and walkway. City crews can't do repairs or paint and preserve the staircase fencing if locks are attached. The locks have the potential to damage the fencing and in turn will cause unnecessary repairs which cost the City more. The locks are also a safety hazard if they rust through or come loose and fall to the path and parking lot below. Unfortunately, we see this as no different than someone drawing a love heart on city property with a marker or someone carving their sweetheart's initials into a tree. This will damage city amenities that are there for everyone, and we have to protect those assets." | Low | [
0.49323017408123704,
31.875,
32.75
] |
Q: Translating generic eager load method from EF6 to EF Core For EF6, I had a method in my generic repository that I exposed to all service layers in order to retrieve entities from the database with any nested properties as needed: public IQueryable<T> OldMethod(params Expression<Func<T, object>>[] includeProperties) { var queryable = set.AsQueryable(); return includeProperties.Aggregate(queryable, (current, includeProperty) => current.Include(includeProperty)); } This way, I could use the method in the following way: var data = repo.OldMethod(x => x.Papers, => x.People.Select(y => y.Addresses)).ToList(); In EF6, this would load the Papers navigation property, the People navigation property, and the Addresses navigation property on each person. This, as expected, throws an exception in EFCore. Because of the switch to Include-->ThenInclude method in EFCore, I'm not quite sure how to easily replicate this at my service layer which I'd like to not require any information about EntityFramework. A: This has been asked many times since the initial release of EF Core. Earlier prerelease versions of EF Core even were supporting it, but then it has been removed from EF Core code (I guess in order to promote the new Include / ThenInclude pattern). While Include / ThenInclude pattern looks more clear (besides the current Intellisense issues), it has one major drawback - requires access to EntityFrameworkQueryableExtensions, thus reference to Microsoft.EntityFrameworkCore assembly. While paramsExpression>` pattern has no such requirement. The good thing is the one can relatively easily add that functionality. The EF6 source code is publicly available on GitHub, and from there we can see that it uses a method called TryParsePath to build dot separated string path which then is passed to the string overload of Include method. The same can be applied in EF Core. We can probably use the EF6 code, but I'm going to provide my own version. It can be easily be seen that the supported constructs are member accessors or calls to method called Select with 2 arguments, the second being LambdaExpression. Following is my interpretation of the above, encapsulated in two custom extension methods: using System; using System.Collections.Generic; using System.Linq; using System.Linq.Expressions; namespace Microsoft.EntityFrameworkCore { public static class IncludeExtensions { public static IQueryable<T> Include<T>(this IQueryable<T> source, IEnumerable<string> includePaths) where T : class => includePaths.Aggregate(source, (query, path) => query.Include(path)); public static IQueryable<T> Include<T>(this IQueryable<T> source, IEnumerable<Expression<Func<T, object>>> includePaths) where T : class => source.Include(includePaths.Select(e => GetIncludePath(e?.Body))); static string GetIncludePath(Expression source, bool allowParameter = false) { if (allowParameter && source is ParameterExpression) return null; // ok if (source is MemberExpression member) return CombinePaths(GetIncludePath(member.Expression, true), member.Member.Name); if (source is MethodCallExpression call && call.Method.Name == "Select" && call.Arguments.Count == 2 && call.Arguments[1] is LambdaExpression selector) return CombinePaths(GetIncludePath(call.Arguments[0]), GetIncludePath(selector.Body)); throw new Exception("Invalid Include path."); } static string CombinePaths(string path1, string path2) => path1 != null ? path1 + "." + path2 : path2; } } The first is simply helper for calling multiple string includes (taken from my answer to Entity Framework Core 2.0.1 Eager Loading on all nested related entities). The second is the method in question, which converts the expressions to strings and call the first. The main work is done by GetIncludePath private method which recursively processes the expression based on the aforementioned rules, plus one additional rule - when navigating bottom up, it should end with lambda parameter. Now the implementation of the method is question is simple as that: public IQueryable<T> OldMethod(params Expression<Func<T, object>>[] includeProperties) => set.Include(includeProperties); | High | [
0.6666666666666661,
27.75,
13.875
] |
using System; using Android.Content; using Android.OS; using Android.Views; using Android.Widget; using Topeka.Adapters; using Topeka.Helpers; using Topeka.Models.Quizzes; namespace Topeka.Widgets.Quizzes { public class SelectItemQuizView : AbsQuizView<SelectItemQuiz> { const string KeyAnswers = "ANSWERS"; bool[] answers; ListView listView; bool[] Answers => answers = answers ?? new bool[Quiz.Options.Length]; protected override bool IsAnswerCorrect => AnswerHelper.IsAnswerCorrect (listView.CheckedItemPositions, Quiz.Answer); public override Bundle UserInput { get { var bundle = new Bundle (); bundle.PutBooleanArray (KeyAnswers, answers); return bundle; } set { if (value == null) return; answers = value.GetBooleanArray (KeyAnswers); if (answers == null) return; var adapter = listView.Adapter; for (int i = 0; i < answers.Length; i++) listView.PerformItemClick (listView.GetChildAt (i), i, adapter.GetItemId (i)); } } public SelectItemQuizView (Context context, Category category, SelectItemQuiz quiz) : base (context, category, quiz) { answers = Answers; } protected override View CreateQuizContentView () { listView = new ListView (Context) { Divider = null, Adapter = new OptionsQuizAdapter (Quiz.Options, Resource.Layout.item_answer_start, Context, true), ChoiceMode = ChoiceMode.Single }; listView.SetSelector (Resource.Drawable.selector_button); listView.ItemClick += (sender, e) => { AllowAnswer (); ToggleAnswerFor (e.Position); }; return listView; } void ToggleAnswerFor (int answerId) { Answers [answerId] = !answers [answerId]; } } } | Mid | [
0.6284403669724771,
34.25,
20.25
] |
Q: Log4j2: How to define multiple loggers I have defined the multiple loggers as seen below(com.xyz and org.xyz). Log4j2 is ignoring the first logger definition and loads only the second one. In the example, the org.xyz is not loaded. { "configuration": { "name": "Default", "appenders": { "Console": { "name": "Console-Appender", "target": "SYSTEM_OUT", "PatternLayout": {"pattern": "[%-5level] %d{yyyy-MM-dd HH:mm:ss.SSS} [%t] %c{1} - %msg%n"} } }, "loggers": { "logger": { "name": "org.xyz", "level": "info", "appender-ref": [{"ref": "Console-Appender","level": "info"}] }, "logger": { "name": "com.xyz", "level": "debug", "appender-ref": [{"ref": "Console-Appender", "level": "debug"}] }, "root": { "level": "warn", "appender-ref": {"ref": "Console-Appender","level": "warn"} } } } } Find below the log4j2 debug messages. DEBUG StatusLogger Processing node for object loggers DEBUG StatusLogger Processing node for object logger DEBUG StatusLogger Node name is of type STRING DEBUG StatusLogger Node level is of type STRING DEBUG StatusLogger Node additivity is of type STRING DEBUG StatusLogger Processing node for array appender-ref DEBUG StatusLogger Processing appender-ref[0] DEBUG StatusLogger Returning logger with parent loggers of type logger:class org.apache.logging.log4j.core.config.LoggerConfig DEBUG StatusLogger Processing node for object root DEBUG StatusLogger Node level is of type STRING DEBUG StatusLogger Processing node for object appender-ref DEBUG StatusLogger Node ref is of type STRING DEBUG StatusLogger Node level is of type STRING DEBUG StatusLogger Returning appender-ref with parent root of type appender-ref:class org.apache.logging.log4j.core.config.AppenderRef DEBUG StatusLogger Returning root with parent loggers of type root:class org.apache.logging.log4j.core.config.LoggerConfig$RootLogger DEBUG StatusLogger Returning loggers with parent root of type loggers:class org.apache.logging.log4j.core.config.LoggersPlugin DEBUG StatusLogger Completed parsing configuration DEBUG StatusLogger Building Plugin[name=logger, class=org.apache.logging.log4j.core.config.LoggerConfig]. DEBUG StatusLogger createLogger(additivity="false", level="DEBUG", name="com.xyz", includeLocation="null", ={Console-Appender}, ={}, Configuration(Default), Filter=null) DEBUG StatusLogger Building Plugin[name=appender-ref, class=org.apache.logging.log4j.core.config.AppenderRef]. DEBUG StatusLogger createAppenderRef(ref="Console-Appender", level="WARN", Filter=null) DEBUG StatusLogger Building Plugin[name=root, class=org.apache.logging.log4j.core.config.LoggerConfig$RootLogger]. DEBUG StatusLogger createLogger(additivity="null", level="WARN", includeLocation="null", ={Console-Appender}, ={}, Configuration(Default), Filter=null) DEBUG StatusLogger Building Plugin[name=loggers, class=org.apache.logging.log4j.core.config.LoggersPlugin]. DEBUG StatusLogger createLoggers(={com.xyz, root}) Is my configuration correct? A: For defining multiple loggers in log4j2 JSON configuration file, you should declare logger as array. With logger array, your configuration file would change to below - { "configuration": { "name": "Default", "appenders": { "Console": { "name": "Console-Appender", "target": "SYSTEM_OUT", "PatternLayout": {"pattern": "[%-5level] %d{yyyy-MM-dd HH:mm:ss.SSS} [%t] %c{1} - %msg%n"} } }, "loggers": { "logger": [ { "name": "org.xyz", "level": "info", "appender-ref": [{"ref": "Console-Appender","level": "info"}] }, { "name": "com.xyz", "level": "debug", "appender-ref": [{"ref": "Console-Appender", "level": "debug"}] } ], "root": { "level": "warn", "appender-ref": {"ref": "Console-Appender","level": "warn"} } } } } | Mid | [
0.591478696741854,
29.5,
20.375
] |
Q: Ember.js itemController and model and controller confusion Let's assume that I've set everything up correctly. I have a model App.User and I have a controller App.UsersIndexUserController. GOOD GOOD GOOD GOOD GOOD The following view template ... <script type="text/x-handlebars" data-template-name="users_index_template"> {{#each user in users}} {{log user}} {{#linkTo users.user user}}{{user.name}}{{/linkTo}} {{/each}} </script> ... this outputs the following in browser's console.log ... <App.User:ember258> { created_at="2013-03-05T01:51:15Z", id=76 ... etc ... } BAD BAD BAD BAD BAD However, when using itemController directive in my template, like so ... <script type="text/x-handlebars" data-template-name="users_index_template"> {{#each user in users itemController="usersIndexUser"}} {{log user}} {{#linkTo users.user user}}{{user.name}}{{/linkTo}} {{/each}} </script> ... this outputs the following in browser's console.log ... <App.UsersIndexUserController:ember253> { target=<Ember.ArrayController:ember245> ... etc ... } I'm expecting {{log user}} to return an instance of App.User for both cases. But as you can see above, it returns an instance of App.UsersIndexUserController when using itemController directive, and returns and instance of App.User when not using itemController directive. Should my App.UsersIndexUserController explicitly return some object such that in both cases above, {{log user}} will return App.User? App.UsersIndexUserController = Ember.ObjectController.extend({ }); I'm using Ember.js v1.0.0-rc1 // Version: v1.0.0-rc.1 // Last commit: 8b061b4 (2013-02-15 12:10:22 -0800) A: I think this behaviour is right. In the second case you are explicitly telling ember to wrap each of your user objects in a proxy (UsersIndexUserController). Therefore the logging of the variable user yields an instance of this proxy. From a debugging perpspective, i absolutely agree with the behaviour of the log helper. It may not be intuitive at first, but would this be not the case, you would not see the real object you are working on there. Imagine your itemController would define a computed property also called name. In this case {{user.name}} would access the property on the controller instead of the model. This could likely be an error and with this behaviour of the helper, you can spot the error much easier. | Mid | [
0.628140703517588,
31.25,
18.5
] |
Late Summer’s Gifts – Ripe blazing colours that taste as strong and sweet as the air in the field Many of my friends were pulling full heads of lettuce out of the ground in June. I had barely been planting much by then, although I was relishing my pickaxe and how I can now plant anything I want anywhere I can slam it into the land. It’s a grey day and no promise of anything other than more grey––the rain has been unspectacular, no thunder. I made a pie from not ripe peaches, hoping the cooking of it would miraculously make them flavourful and ripe seeming. Then with the extra crust I made a small blueberry pie, using the large BC blueberries, although I believe the smaller ones to be more flavourful. After all of this activity and endlessly washing dishes and raw pie goop off of everywhere, and eating some pie, and feeling quite full (summer demands we comsume beer, pie, ice cream), I decided to take a walk out in the yard and to the back of the lot. It’s amazing to see all of the edibles ripening. I get my tomato seedlings down the road from a woman, Vicki, who produces over 150 different kinds of heirloom tomatoes. I bought and planted five. Everyday now, I have enough for a salad. I’ll buy some bushels for my tomato sauce later this month. I had reconciled myself to not having any raspberries this year, this being the second season of the raspberry bush. Sometime late in the season they appeared, not red yet and I wonder if it will happen. But today I did notice two absolutely red and ready and after I took this picture we ate them. I wandered to the back of the field and found that our old apple tree, in dormancy last year, had yielded a huge amount of apples, many of them on the ground now. On the way back to the house, judging by the amount of deer poop on the ground, I figured that the deer were making good use of the apples. Half way back I noticed that our juniper trees, red cedar we usually call them, are covered with little blue berries. When you pinch them they small like, yes, gin. I have looked for recipes for gin but the closest I can get is to buy vodka and infuse it with the berries. I suppose I would have to buy a distillery to actually make gin. Add this to my to do list. I should also be looking for something to press sunflower seeds for the oil. The sunflowers are now twice my height, although this one, one of the shortest is at eye level. I’ll get the seeds before the birds or squirrels do, save them for next year’s crop and maybe give away some for Christmas presents. In the meantime I’ll be having tomato salad for dinner and probably more pie. | Mid | [
0.553610503282275,
31.625,
25.5
] |
Q: Show a sequence is decreasing I'm stuck trying to show that the following sequence is decreasing $$a_{n} = \left(\frac{n+x}{n+2x}\right)^{n}$$ where $x>0$. I've tried treating $n$ as a real number and took derivatives but it didn't lead to anything promising. Any hints would be appreciated. A: Fix $x>0$. Our aim is to show that $a'(n)<0$. Note that $$ a(n)=\left(1-\frac{x}{n+2x}\right)^n>0 $$ $$ (\log a(n))'=\frac{a'(n)}{a(n)} $$ Hence it is enough to show that $(\log a(n))'<0$. Well this is indeed true. Using inequality $\log(1-t)<-t$ we obtain $$ (\log a(n))'= \frac{\left(n^2+3 n x+2 x^2\right)\log\left(1-\frac{x}{n+2 x}\right)+n x}{(n+x) (n+2 x)}\leq $$ $$ \frac{\left(n^2+3 n x+2 x^2\right)\left(\frac{-x}{n+2 x}\right)+n x}{(n+x) (n+2 x)}= \frac{-x^2}{(n+x) (n+2 x)}<0 $$ And now we are done A: $$\frac{a_{n}}{a_{n+1}}=\frac{\left(\frac{n+x}{n+2x}\right)^{n}}{ \left(\frac{n+1+x}{n+1+2x}\right)^{n+1}}= \frac{n+1+2x}{n+1+x}\left( \frac{n+1+2x}{n+1+x} \frac{n+x}{n+2x}\right)^n$$ Lets observe that $$ \frac{n+1+2x}{n+1+x} \frac{n+x}{n+2x}=\frac{n^2+n+3nx+x+2x^2}{n^2+n+3nx+2x+2x^2}=1-\frac{x}{n^2+n+3nx+2x+2x^2}$$ Then, by Bernoulli $$\frac{a_{n}}{a_{n+1}} \geq (1+\frac{x}{n+1+x})(1-n\frac{x}{n^2+n+3nx+2x+2x^2}) $$ An easy computation shows that $$(1+\frac{x}{n+1+x})(1-n\frac{x}{n^2+n+3nx+2x+2x^2}) \geq 1 \Leftrightarrow$$ $$\frac{x}{n+1+x} \geq \frac{nx}{(n+1+x)(n+2x)} +\frac{x}{n+1+x}\frac{nx}{(n+1+x)(n+2x)} \Leftrightarrow $$ $$x(n+1+x)(n+2x) \geq nx(n+1+x)+nx^2 \Leftrightarrow $$ $$n^2x+nx+3nx^2+2x^2+2x^3 \geq n^2x+nx+nx^2+nx^2 \Leftrightarrow $$ $$ nx^2+2x^2+2x^3 \geq 0 $$ Thus $$\frac{a_{n}}{a_{n+1}} \geq 1$$ | Mid | [
0.615776081424936,
30.25,
18.875
] |
Q: Doxygen comments for variant C functions with similar signatures I'm writing a program in C. Due to the language's static typing, Its necessary to duplicate functions in the following way: void foo_8(uint8_t thingy); void foo_16(uint16_t thingy); void foo_32(uint32_t thingy); When it comes to doxygen comments, you're forced to copy-paste the same comment block several times. Does doxygen have facilities/tags to say "This function is the same as another focuntion"? A: You can use copydoc, copybrief or copydetails : \copydoc foo_8() or \brief \copybrief foo_8() \details \copydetails foo_8() | Mid | [
0.552845528455284,
34,
27.5
] |
Item 642 - Space Shuttle Tile Catalog 396 (Nov 2012) (we are no longer accepting bids on this item) Minimum Bid: $100.00 Sold Price: $624.00 (includes buyer's premium) Description Available to US bidders only. A 1.75 x 1.5 x 1 scrap of orbiter thermal protection tile. Tile is accompanied by a printed caption which reads, “This piece of scrap thermal protection tile, from the space shuttle orbiter is presented to you with our thanks for your ongoing support of the American space program and our work at Kennedy Space Center.” In fine condition, with a few small chips. RRAuction COA. | Low | [
0.5111111111111111,
28.75,
27.5
] |
Forest Matte Black Eyeglasses Forest’s modest and lightweight design is perfect for any occasion. Its keyhole nose bridge gives an angular accent to this simple rectangular frame. These black glasses are a perfect staple piece for any style. 14 day Fit & Style guaranty Free replacement, Free Shipping, no questions asked Lens Types Available for This Frame Single Vision LensesIncluded Bifocal Lenses$41 Progressive Lenses$69 Non-Prescription Included Frame Details Size: Medium Weight: 12g - Lightweight All EBD frame weights displayed are without the lenses. Lightweight frames weigh 15 grams or lighter. All other frames weigh 16 grams or more. Rate this frame Write a product review Our frame sizes EyeBuyDirect offers 4 different frame sizes (XS, S, M, L) so choosing the right one is key to making sure your new glasses correctly fit your face. Each size group is based on frame width and lens height My frame size Take your current frame and measure its total width (from temple screw to temple screw) and its lens height. Once you have both numbers, enter the results in the fields below to find your best fit Frame width Lens height My frame widthmminch My lens heightmminch My best fit(s): We advise you to also check your frame dimensions to ensure you've got the best fit for your face. | Low | [
0.49411764705882305,
31.5,
32.25
] |
COMFREY ROOT ORGANIC Regular price £1.50 Sale price £1.50 Sale Quantity must be 1 or more Size Quantity COMFREY ROOT Symphytum officinalis Many fantastic stories are told about this incredible herb, and its common names, bone-knit, boneset, bruisewort, knit bone and the like attest to its healing power. Comfrey, a member of the Borage family, has long been a standard first aid remedy in any herbal medicine chest. Yet, recent research by the Henry Doubleday Foundation that studied the viability of Comfrey as a food crop, has brought Comfrey into the crossfire. It was found that Comfrey (though it is unclear which species of Comfrey was tested) contains certain pyrrolizidine alkaloids, which, it appears, caused rats that had been fed on a diet of Comfrey for 6 months to develop liver cancer. Alarm bells went off everywhere cautioning people to avoid Comfrey and labelling it a dangerous herb. While pyrrolizidine alkaloids do cause cancer of the liver, it should be mentioned that the quantities contained in a normal dose of Comfrey are extremely small. Most herbalists agree that unless vast quantities were consumed on a daily basis it is unlikely that Comfrey would cause any serious damage at all. After all, Comfrey has been used for generations, both internally and externally, without apparent ill effects and many Comfrey fans continue to swear by it, despite the bad press. However, such matters are nowadays in the hands of regulators who don't really know anything about herbs. Still, to be on the cautious side, use the leaves for internal use and roots externally and don't overdo it - as Paracelsus said: Everything is poison; it's the dose that makes the medicine. Traditional Comfrey roots can be applied as a poultice for all manner of bruises, sprains or other damage to the connective tissues, including broken bones and badly healing ulcers and sores as well as for inflammatory swellings. Regulation has deemed internal use of Comfrey roots unsafe and the traditional application of the root for treating stomach ulcers, irritable bowel syndrome and piles, as well as for bronchial afflictions, have been transferred to Comfrey leaves. MagicalIn Medieval times Comfrey was used in sympathetic magic for healing bones. In modern magical herbalism it is recommended for safe travels and also to safeguard one's luggage. | Mid | [
0.58780487804878,
30.125,
21.125
] |
Chemical sex discrimination in the crayfishProcambarus clarkii: Role of antennules. Chemical sex discrimination of conspecifics by male and female crayfish (Procambarus clarkii) was tested. Intact female subjects were more attentive in the presence of stimulus water from males than from females and showed more aggressive postures in the presence of stimulus water from females than from males. Intact males showed more aggressive postures in the presence of stimulus water from males than from females. Females and males with only one inner antennule ramus and one outer ramus performed discrimination and localization almost as well as intact subjects. Subjects with only the two inner rami or only the two outer rami were disadvantaged in either responding to the stimuli or localizing them. The relevance of this outcome to previous conflicting reports on the use of antennules in sex discrimination in crayfish is discussed. | Mid | [
0.5884955752212391,
33.25,
23.25
] |
About the property A bay fronted three bedroom semi-detached home located on the edge of town in a semi-rural spot between Keynsham and Burnett. * Semi-detached * Rural location * Fantastic views * Entrance hallway * Two reception rooms * Kitchen * Landing * Three bedrooms * Bathroom * Large garden * Parking for several vehicles * A larger than average double bay fronted three bedroom home that fronts onto neighbouring countryside. The property offers spacious accommodation throughout and is ideally suited to those looking to put their own stamp on the property. Offering delightful views of countryside, whilst in easy reach to the town centre and local amenities. The accommodation comprises of an entrance hallway, two generous reception rooms and kitchen to the ground floor. The first floor boasts three bedrooms, (two are large... Read more A larger than average double bay fronted three bedroom home that fronts onto neighbouring countryside. The property offers spacious accommodation throughout and is ideally suited to those looking to put their own stamp on the property. Offering delightful views of countryside, whilst in easy reach to the town centre and local amenities. The accommodation comprises of an entrance hallway, two generous reception rooms and kitchen to the ground floor. The first floor boasts three bedrooms, (two are large doubles) and family bathroom. Externally, the home sits within delightful, larger than average gardens and offers parking for several vehicles. In fuller detail the accommodation comprises (all measurements are approximate):- FRONT OF PROPERTY: Mainly laid to lawn with wall and fence boundaries, path leading to front door. REAR GARDEN: Mainly laid to lawn with fence and shrub boundaries, well stocked flower bed, gated lane access from the rear of the property, parking for several cars. AGENTS NOTE: Perspective purchasers are to be made aware that no residential development is to take place without the current seller's permission. Please ask a member of Davies and Way for more details if required. Consumer Protection from Unfair Trading Regulations 2008. The Agent has not tested any apparatus, equipment, fixtures and fittings or services and so cannot verify that they are in working order or fit for the purpose. A Buyer is advised to obtain verification from their Solicitor or Surveyor. References to the Tenure of a Property are based on information supplied by the Seller. The Agent has not had sight of the title documents. A Buyer is advised to obtain verification from their Solicitor. Items shown in photographs are NOT included unless specifically mentioned within the sales particulars. They may however be available by separate negotiation. Buyers must check the availability of any property and make an appointment to view before embarking on any journey to see a property. Read less Follow us About us We are an independent firm of Chartered Surveyors, Valuers, Auctioneers and Estate Agents who have been selling, letting and surveying homes locally for over 50 years and are regulated by the Royal Institution of Chartered Surveyors (RICS). | High | [
0.6848249027237351,
33,
15.1875
] |
This month marks the two-year anniversary of one of the most important articles ever written on journalism. On Aug. 7, 2016, after Donald Trump formally secured the Republican nomination and the general election was underway, New York Times media columnist James Rutenberg began with a question: “If you’re a working journalist and you believe that Donald J. Trump is a demagogue playing to the nation’s worst racist and nationalistic tendencies, that he cozies up to anti-American dictators and that he would be dangerous with control of the United States nuclear codes, how the heck are you supposed to cover him?” Under the Times’ traditional standards, the right answer is that you wouldn’t be allowed to cover any candidate you were so biased against. But that’s not the answer Rutenberg gave. Instead, quoting an editor who called Hillary Clinton “normal” and Trump “abnormal,” Rutenberg suggested “normal standards” didn’t apply. To continue reading on The New York Post click here. | Mid | [
0.604118993135011,
33,
21.625
] |
Welcome to Relax Inn, located at 3200 LancasterHwy, Richburg, SC. We are glad to see that you have chosen our website for your motel accommodation in Richburg, SC. The only place where ya’ll get good old southern hospitality is at the Relax Inn. We accommodate families on vacation or business traveler on the go. Relax Inn is where you'll find quality room and low prices. Our Surrounding cities are Rock Hill, Chester, Great Falls, Lancaster, and Fort Mill, our prices & friendly staff are thebest in town. Relax Inn in Richburg, SC is only minutes away from Winthrop College in Rock Hill, York Tech in Chester, York Tech in Rock Hill, Lancaster USC in Lancaster and 35 minutesaway from University of South Carolina in Columbia. Our clean and spacious rooms provide plenty ofroom to spread out for families and business travelers. With our comfortable beds you will have good nights rest and wake up refreshed and ready for the day. Our Outside parking always free and provides easy access to every room. Business travelers canappreciate the fact that our rooms are furnished witha desk big enough to accommodate a laptop computer, and provide Wi-Fi wireless Internet and extra space left over to work comfortably. Families will love our pet friendly hotel. For a small pet fee, you are welcome to have your pet stay right in yourroom with you. Families traveling on vacation will also find that several area attractions are within easy driving distance of the Richburg motel. We have various activities such as: walks at the chester state park and sight-seeing at the landlord canal state park, Saturday night dirt track racing at the I-77 speedway, Horseback riding or a fun-filled game of golf at the Chester golfor pine tuck golf Course are all close to the Richburg motel, Around Relax Inn we have a variety of restaurants to choose from in walking distance such as: the Famous Waffle House, Subway, China wok, and Bo jangles. Other Richburg restaurants located with in 1 mile are McDonald's, Burger King, and Taco Bell/Kentucky Fried Chicken, and for more of a dine-in family style restaurant in Richburg with some country cooking from the Front Porch or Country Omelet and enjoy a few drinks at Fatbackz sport bar and grill (right across the street). Only 7 miles down the road you will find a family own and operated local restaurants in business for 30 yrs and can accommodate your parties, banquets or receptions in our private dining room with only Certified Angus Beef, 100 percent USDA chuck and much more at the Wagon Wheel of Fort Lawn, SC. Thanks you for choosing relax inn, Richburg, SC. We hope that you will enjoy your stay and will return in the future. Please feel free to let us know of anything that we can do to better accommodate your needs or make you stay better. Also feel free to visit our website at www.relaxinnsc.com or give us a call at 803.789.6363 for any other questions, concerns or reservations. (Fill out our feedback form and get 20% Discount off rack rate, on your next stay. Please leave us a review and let us know whatwe can do to make your stay more enjoyable. Internet SPECIAL Rate for Travelers1 Queen (1-2 people) $34.95($5.00 extra on weekend)2 Doubles or King (1-2 people) $39.95($5.00 extra on weekend) (Not valid during special events)Call Now To Reserve a Room (803)789-6363 $10.00 (Non refundable pet fee)This offer is good for travelers only,this does not include local residents within 20milesReceive 10% discount on local restaurants.Weekly, Monthly and Group rates available | High | [
0.6599496221662461,
32.75,
16.875
] |
// // ViewController.swift // Drawing Images // // Created by Vandad Nahavandipoor on 6/24/14. // Copyright (c) 2014 Pixolity Ltd. All rights reserved. // // These example codes are written for O'Reilly's iOS 8 Swift Programming Cookbook // If you use these solutions in your apps, you can give attribution to // Vandad Nahavandipoor for his work. Feel free to visit my blog // at http://vandadnp.wordpress.com for daily tips and tricks in Swift // and Objective-C and various other programming languages. // // You can purchase "iOS 8 Swift Programming Cookbook" from // the following URL: // http://shop.oreilly.com/product/0636920034254.do // // If you have any questions, you can contact me directly // at [email protected] // Similarly, if you find an error in these sample codes, simply // report them to O'Reilly at the following URL: // http://www.oreilly.com/catalog/errata.csp?isbn=0636920034254 import UIKit class ViewController: UIViewController { override func viewDidLoad() { super.viewDidLoad() // Do any additional setup after loading the view, typically from a nib. } override func didReceiveMemoryWarning() { super.didReceiveMemoryWarning() // Dispose of any resources that can be recreated. } } | Low | [
0.47572815533980506,
30.625,
33.75
] |
MONTREAL — Shippers are flying into uncharted territory as the COVID-19 pandemic upends delivery patterns, with surging consumer demand mitigating a slumping global economy exacerbated by border closures and travel controls. E-commerce is on the rise as non-essential businesses remain closed in Ontario and Quebec and the prime minister encourages Canadians to stay home. Amazon Inc., the country’s largest online retailer, said Tuesday it is hiring more than 1,000 workers in Ontario, British Columbia and Alberta to handle the spike in direct-to-consumer sales. Business-to-business (B2B) deliveries are down, however, despite exceptions such as grocery store suppliers, said Marc Wulfraat, president of Montreal-based logistics consulting firm MWPVL International Inc. “The B2B business — which dominates FedEx and UPS in terms of their package volumes, that’s down,” Wulfraat said, noting bulk deliveries tend to yield higher margins than business-to-consumer (B2C) shipments. “The B2C, that’s up. But that’s not the lion’s share of what these companies are doing.” Greater labour shortages — already an entrenched problem in trucking — are looming, adding to shippers’ woes. “When you make the children stay home from school, a lot of people can’t go to work. Those are the same people that drive the trucks and go to warehouses and do all the things we take for granted,” Wulfraat said. Teamsters Canada, whose truckers work for Purolator Inc. and United Parcel Service Inc., said that long-haul deliveries continue apace in spite of the economic downdraft. “Based on the information we — and it’s changing every minute — the package delivery business is doing OK,” said Francois Laporte, president of Teamsters Canada. Canada Post, which relies heavily on direct-to-consumer parcels, said volumes remain “steady.” At Cargojet Inc., rising e-commerce sales have offset a downturn in international deliveries, said Laurentian Bank Securities analyst Mona Nazir. The Mississauga, Ont.-based cargo airline “may be a net beneficiary in the current environment.” Nazir said Amazon’s surge in sales has directly impacted Cargojet, which provides charter aircraft services to move packages from Amazon warehouses to distribution centres for final delivery. Air Canada has started using its aircraft to operate cargo-only flights to Europe, with other flights planned for Latin America and South America. The planes have no passengers, but instead carry time-sensitive shipments, including medical supplies, the airline said Wednesday. The flights come as Air Canada slashes capacity in response to plunging travel demand due to government measures to stem the spread of the novel coronavirus. The first cargo-only flights departed from Toronto for Frankfurt, London and Amsterdam this past week on Boeing 787 aircraft capable of carrying 35 tonnes of freight. Air Canada said it is also exploring opportunities to offer the service domestically using smaller Air Canada Express regional aircraft. | Low | [
0.5148514851485141,
32.5,
30.625
] |
Placental sonolucency and pregnancy outcome in women with elevated second trimester serum alpha-fetoprotein levels. Women with unexplained elevation of serum alpha-fetoprotein (AFP) are at increased risk for adverse pregnancy outcomes, including small for gestational age neonate, preterm labor, abruptio placentae, preeclampsia, intrauterine fetal death, and congenital malformations. This study investigated the association between placental sonolucency, elevation of maternal serum AFP, and pregnancy outcomes. Singleton pregnancies (n = 168) with second trimester serum AFP level >/= 2.0 weight-adjusted multiples of the median (MoM) were recruited as the study group. Women with second trimester serum AFP level between 0.4 and 2.0 weight-adjusted MoM (n = 150) served as controls. A maternal Kleihauer-Betke stain was obtained for all participants. All participants were prospectively evaluated and the pregnancy complications were assessed by chart analysis after delivery. Compared with control subjects, women with placental sonolucent areas were not at increased risk for pregnancy complications, while women without sonolucent areas had higher risk of pregnancy complications. Singleton pregnancies with elevated serum AFP level had increased incidence of feto-maternal hemorrhage when placental sonolucency was observed. Our data suggest that feto-maternal hemorrhage may be the major factor contributing to elevated maternal serum AFP levels in pregnancies carrying placental sonolucencies. Screening for pregnancies with both elevated serum AFP and placental sonolucencies would help to identify the low-risk cases and facilitate cost-effective obstetric management. | High | [
0.6650124069478901,
33.5,
16.875
] |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.